text stringlengths 8 5.77M |
|---|
Wednesday, March 21, 2018
Too Late, Germany Realizes Its Mistake
German Chancellor Angela Merkel's disastrous decision to throw open an essentially defenseless western Europe to hordes of military-age males from the Islamic ummah will go down in history as one of Christendom's greatest blunders, either a triumph of wishful childless-feminist thinking or a malevolent act of epic proportions. So this statement by new Interior Minister Horst Seehofer, while welcome, is way too little, and far too late:
Merkel and some of her fans
New Interior Minister Horst Seehofer said Islam does not belong to Germany, and set out hardline immigration policies in his first major interview since being sworn in this week, as he sought to see off rising far-right challengers.
Note that in the European media -- and soon enough in the American -- any conservative defender of tradition is now labeled "far-right." As I've often said on Twitter (@dkahanerules), on the Left, "treason is the highest form of patriotism." |
[Alternation of ST segment and T wave in experimental acute myocardial ischemia].
Acute myocardial ischemia and reperfusion in 49 young pigs were produced by balloon occlusion of the left anterior descending coronary artery. Alternations of ST segment and T wave (STTA) were detected in 33 pigs during ischemia. They started at 30 seconds to 14 minutes (mean 5.4 +/- 4.1 minutes) after occlusion and maintained for 4.0 +/- 3.4 minutes. The start and end of STTA might be gradual or abrupt. Abrupt STTA provoked by ventricular premature beat (VPB), and might be reset by VPB and short run of non-sustained repetitive ventricular firing. In leads V1 and V4 simultaneously recorded, STTA showed concordant in most cases and the discordant alternation was transient STTA was a significant discriminator in identifying cases in whom ventricular fibrillation or tachcardia was inducible in acute myocardial ischemia (P < 0.01). We conclude that STTA may provide a non-invasion measure of cardiac electrical stability during acute myocardial ischemia. |
Photo : Lindsey Wasson ( Getty Images )
On Monday night, the Seattle Mariners did something they’ve been doing a lot of lately—winning baseball games, baby. This particular game featured some things that most of their other recent wins have not, including 1) a good team as an opponent in the Angels and therefore 1a) two Mike Trout home runs, and 2) a margin of victory greater than one run. It was 5-3, in this case. The Mariners have won a lot of close games of late, and won a lot in general; after Monday’s win, they’ve won nine of their last 11.
Recent Video This browser does not support the video element. Sorry, There is No Double Standard to See Here
That win was a good encapsulation of how they’ve been doing it lately, which is to say in the most inexplicable way possible. Lefty junkball vagabond Wade LeBlanc is currently doing a convincing imitation of a fine, capable starter, and he tossed five sturdy innings of two-run ball as the Ms and Angels swapped dingers all game long. LeBlanc now has posted a 2.45 ERA in 40 1/3 innings through eight starts since the Mariners moved him into the rotation, which is nearly two runs below his career mark. Nelson Cruz, who’s still crushing shit in his age-37 season, also had a pair of dingers last night, including one that rocketed off the bat at 114.6 mph. Denard Span, acquired in a trade after Robinson Cano’s 80-game PED suspension came down, is now in the building, and still sliding and diving around as his beard gets grayer and grayer. Dee Gordon, who’d been faking it in center, slid back to second base. Span’s OPS since coming to Seattle 11 games ago is .892; Gordon is leading all of baseball in steals.
You may have noticed that very little of this really makes sense. The Mariners have gone 19-7 since Cano began serving the suspension, and while it’s mostly been a cupcake stretch—six games against the Rays, preceded by various series against the Rangers, Twins, A’s, and Tigers—that is still 19 wins in 26 games. Things will get harder from here. After the Angels series, the Mariners face the Yankees and Red Sox in consecutive series. These are all teams that won’t necessarily let you get by on one-run luckies, as the Mariners have this season—they’re an astonishing 21-9 in one-run games.
Trot Into Summer With a Fresh New Pair of Running Shoes Read on The Inventory
You could point to all the ways in which this is unsustainable, from all the one-run wins piling up to the fact that the Astros have a run differential that’s more than 100 runs higher than the Mariners. But the Mariners are winning games, even without Cano, even with the monument of Felix Hernandez still taking the mound every five games. James Paxton’s gone full-on psychedelic this year, fully taking The Leap or whatever term you prefer after that 16-strikeout game and no-hitter. Mitch Haniger’s a solid guy to have around, and has been solid. Jean Segura’s playing at what would otherwise be an MVP-caliber level in a world in which Mike Trout, Mookie Betts, and J.D. Martinez were not all also doing what they are currently doing.
Despite not making a playoff appearance since Ichiro’s dynamo rookie year in 2001, there has long been a contingent of the Baseball Knower community that believed in the Mariners, whether because they’ve always been extremely busy with transactions or because they’ve always had at least a few big stars on hand. And yet, for the better part of two decades, it hasn’t happened. If it wasn’t the Rangers, it was the A’s; now it’s the Astros. That probably won’t change this year, honestly—regression is inevitable at a number of positions, and all of that will show up in the standings. But given how shaky the American League seems beyond the AL East juggernauts and the defending World Series champions in Houston, this could very well be the year those Mariners hang around for a Wild Card push. It probably won’t look like this, but it should at least be more fun than the usual. |
#include <usb-arch.h>
#include <usb-interrupt.h>
#include <AT91SAM7S64.h>
#include <stdio.h>
#include <debug-uart.h>
/* #define DEBUG */
#ifdef DEBUG
#define PRINTF(...) printf(__VA_ARGS__)
#else
#define PRINTF(...)
#endif
#define USB_PULLUP_PIN AT91C_PIO_PA16
#ifndef AT91C_UDP_STALLSENT
#define AT91C_UDP_STALLSENT AT91C_UDP_ISOERROR
#endif
/* Bits that won't effect the state if they're written at a specific level.
*/
/* Bits that should be written as 1 */
#define NO_EFFECT_BITS (AT91C_UDP_TXCOMP | AT91C_UDP_RX_DATA_BK0 | AT91C_UDP_RXSETUP \
| AT91C_UDP_ISOERROR | AT91C_UDP_RX_DATA_BK1)
/* Also includes bits that should be written as 0 */
#define NO_EFFECT_MASK (NO_EFFECT_BITS | AT91C_UDP_TXPKTRDY)
#define RXBYTECNT(s) (((s)>>16)&0x7ff)
static inline void
udp_set_ep_ctrl_flags(AT91_REG *reg, unsigned int flags,
unsigned int write_mask, unsigned int check_mask)
{
while ( (*reg & check_mask) != (flags & check_mask)) {
*reg = (*reg & ~write_mask) | flags;
}
}
#define UDP_SET_EP_CTRL_FLAGS(reg, flags, mask) \
udp_set_ep_ctrl_flags((reg), \
(NO_EFFECT_BITS & ~(mask)) | ((flags) & (mask)), (mask) | NO_EFFECT_MASK,\
(mask))
#define USB_DISABLE_INT *AT91C_AIC_IDCR = (1 << AT91C_ID_UDP)
#define USB_ENABLE_INT *AT91C_AIC_IECR = (1 << AT91C_ID_UDP)
#define USB_DISABLE_EP_INT(hw_ep) *AT91C_UDP_IDR = (1 << (hw_ep))
#define USB_ENABLE_EP_INT(hw_ep) *AT91C_UDP_IER = (1 << (hw_ep))
#if CTRL_EP_SIZE > 8
#error Control endpoint size too big
#endif
#if USB_EP1_SIZE > 64
#error Endpoint 1 size too big
#endif
#if USB_EP2_SIZE > 64
#error Endpoint 2 size too big
#endif
#if USB_EP3_SIZE > 64
#error Endpoint 3 size too big
#endif
static const uint16_t ep_xfer_size[8] =
{
CTRL_EP_SIZE,
USB_EP1_SIZE,
USB_EP2_SIZE,
USB_EP3_SIZE
};
#define USB_EP_XFER_SIZE(ep) ep_xfer_size[ep]
typedef struct _USBEndpoint USBEndpoint;
struct _USBEndpoint
{
uint16_t status;
uint8_t addr;
uint8_t flags;
USBBuffer *buffer; /* NULL if no current buffer */
struct process *event_process;
unsigned int events;
uint16_t xfer_size;
};
#define USB_EP_FLAGS_TYPE_MASK 0x03
#define USB_EP_FLAGS_TYPE_BULK 0x00
#define USB_EP_FLAGS_TYPE_CONTROL 0x01
#define USB_EP_FLAGS_TYPE_ISO 0x02
#define USB_EP_FLAGS_TYPE_INTERRUPT 0x03
#define EP_TYPE(ep) ((ep)->flags & USB_EP_FLAGS_TYPE_MASK)
#define IS_EP_TYPE(ep, type) (EP_TYPE(ep) == (type))
#define IS_CONTROL_EP(ep) IS_EP_TYPE(ep, USB_EP_FLAGS_TYPE_CONTROL)
#define IS_BULK_EP(ep) IS_EP_TYPE(ep, USB_EP_FLAGS_TYPE_BULK)
#define USB_EP_FLAGS_ENABLED 0x04
/* A packet has been received but the data is still in hardware buffer */
#define USB_EP_FLAGS_RECV_PENDING 0x08
/* The pending packet is a SETUP packet */
#define USB_EP_FLAGS_SETUP_PENDING 0x10
/* The data in the hardware buffer is being transmitted */
#define USB_EP_FLAGS_TRANSMITTING 0x20
/* The receiver is waiting for a packet */
#define USB_EP_FLAGS_RECEIVING 0x40
/* For bulk endpoints. Both buffers are busy are in use, either by
hardware or software. */
#define USB_EP_FLAGS_DOUBLE 0x80
/* The next packet received should be read from bank 1 if possible */
#define USB_EP_FLAGS_BANK_1_RECV_NEXT 0x10
/* States for double buffered reception:
Packets being received 0 1 2 1 0 0
Packets pending 0 0 0 1 2 1
RECVING 0 1 1 1 0 0
RECV_PENDING 0 0 0 1 1 1
DOUBLE 0 0 1 0 1 0
*/
/* States for double buffered transmission:
Packets being transmitted 0 1 2
TRANSMITTING 0 1 1
DOUBLE 0 0 1
*/
/* Index in endpoint array */
#define EP_INDEX(addr) ((addr) & 0x7f)
/* Get address of endpoint struct */
#define EP_STRUCT(addr) &usb_endpoints[EP_INDEX(addr)];
/* Number of hardware endpoint */
#define EP_HW_NUM(addr) ((addr) & 0x7f)
static USBEndpoint usb_endpoints[USB_MAX_ENDPOINTS];
struct process *event_process = 0;
volatile unsigned int events = 0;
static void
notify_process(unsigned int e)
{
events |= e;
if (event_process) {
process_poll(event_process);
}
}
static void
notify_ep_process(USBEndpoint *ep, unsigned int e)
{
ep->events |= e;
if (ep->event_process) {
process_poll(ep->event_process);
}
}
static void
usb_arch_reset(void)
{
unsigned int e;
for (e = 0; e < USB_MAX_ENDPOINTS; e++) {
if (usb_endpoints[e].flags &USB_EP_FLAGS_ENABLED) {
USBBuffer *buffer = usb_endpoints[e].buffer;
usb_endpoints[e].flags = 0;
usb_disable_endpoint(e);
while(buffer) {
buffer->flags &= ~USB_BUFFER_SUBMITTED;
buffer = buffer->next;
}
}
}
usb_arch_setup_control_endpoint(0);
}
void
usb_arch_setup(void)
{
unsigned int i;
/* Assume 96MHz PLL frequency */
*AT91C_CKGR_PLLR = ((*AT91C_CKGR_PLLR & ~AT91C_CKGR_USBDIV)
| AT91C_CKGR_USBDIV_1);
/* Enable 48MHz USB clock */
*AT91C_PMC_SCER = AT91C_PMC_UDP;
/* Enable USB main clock */
*AT91C_PMC_PCER = (1 << AT91C_ID_UDP);
/* Enable pullup */
*AT91C_PIOA_PER = USB_PULLUP_PIN;
*AT91C_PIOA_OER = USB_PULLUP_PIN;
*AT91C_PIOA_CODR = USB_PULLUP_PIN;
for(i = 0; i < USB_MAX_ENDPOINTS; i++) {
usb_endpoints[i].flags = 0;
usb_endpoints[i].event_process = 0;
}
usb_arch_reset();
/* Enable usb_interrupt */
AT91C_AIC_SMR[AT91C_ID_UDP] = AT91C_AIC_SRCTYPE_INT_HIGH_LEVEL | 4;
AT91C_AIC_SVR[AT91C_ID_UDP] = (unsigned long) usb_int;
*AT91C_AIC_IECR = (1 << AT91C_ID_UDP);
}
static void
usb_arch_setup_endpoint(unsigned char addr, unsigned int hw_type)
{
unsigned int ei = EP_HW_NUM(addr);
USBEndpoint *ep = EP_STRUCT(addr);
ep->status = 0;
ep->flags = USB_EP_FLAGS_ENABLED;
ep->buffer = 0;
ep->addr = addr;
ep->events = 0;
ep->xfer_size = 0;
*AT91C_UDP_IDR = 1<<ei;
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[ei], hw_type | AT91C_UDP_EPEDS,
AT91C_UDP_EPTYPE | AT91C_UDP_EPEDS);
*AT91C_UDP_IER = 1<<ei;
};
void
usb_arch_setup_control_endpoint(unsigned char addr)
{
unsigned int ei = EP_HW_NUM(addr);
USBEndpoint *ep = EP_STRUCT(addr);
usb_arch_setup_endpoint(addr, AT91C_UDP_EPTYPE_CTRL);
ep->flags |= USB_EP_FLAGS_TYPE_CONTROL;
ep->xfer_size = ep_xfer_size[ei];
}
void
usb_arch_setup_bulk_endpoint(unsigned char addr)
{
unsigned int ei = EP_HW_NUM(addr);
USBEndpoint *ep = EP_STRUCT(addr);
usb_arch_setup_endpoint(addr, ((addr & 0x80)
? AT91C_UDP_EPTYPE_BULK_IN
: AT91C_UDP_EPTYPE_BULK_OUT));
ep->flags |= USB_EP_FLAGS_TYPE_BULK;
ep->xfer_size = ep_xfer_size[ei];
}
void
usb_arch_setup_interrupt_endpoint(unsigned char addr)
{
unsigned int ei = EP_HW_NUM(addr);
USBEndpoint *ep = EP_STRUCT(addr);
usb_arch_setup_endpoint(addr, ((addr & 0x80)
? AT91C_UDP_EPTYPE_INT_IN
: AT91C_UDP_EPTYPE_INT_OUT));
ep->flags |= USB_EP_FLAGS_TYPE_BULK;
ep->xfer_size = ep_xfer_size[ei];
}
void
usb_arch_disable_endpoint(uint8_t addr)
{
USBEndpoint *ep = EP_STRUCT(addr);
ep->flags &= ~USB_EP_FLAGS_ENABLED;
*AT91C_UDP_IDR = 1<<EP_HW_NUM(addr);
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[EP_HW_NUM(addr)], 0, AT91C_UDP_EPEDS);
}
#define USB_READ_BLOCK 0x01 /* The currently submitted buffers
can't hold the received data, wait
for more buffers. No data was read
from the hardware buffer */
#define USB_READ_NOTIFY 0x02 /* Some buffers that had the
USB_BUFFER_NOTIFY flags set were
released */
#define USB_READ_FAIL 0x04 /* The received data doesn't match the
submitted buffers. The hardware
buffer is discarded. */
/* Skip buffers until mask and flags matches*/
static USBBuffer *
skip_buffers_until(USBBuffer *buffer, unsigned int mask, unsigned int flags,
unsigned int *resp)
{
while(buffer && !((buffer->flags & mask) == flags)) {
USBBuffer *next = buffer->next;
buffer->flags &= ~USB_BUFFER_SUBMITTED ;
buffer->flags |= USB_BUFFER_FAILED;
if (buffer->flags & USB_BUFFER_NOTIFY) *resp |= USB_READ_NOTIFY;
buffer = next;
}
return buffer;
}
static void
read_hw_buffer(uint8_t *data, unsigned int hw_ep, unsigned int len)
{
AT91_REG *fdr;
fdr = &AT91C_UDP_FDR[hw_ep];
while(len-- > 0) {
*data++ = *fdr;
}
}
#define USB_WRITE_BLOCK 0x01
#define USB_WRITE_NOTIFY 0x02
void
write_hw_buffer(const uint8_t *data, unsigned int hw_ep, unsigned int len)
{
AT91_REG *fdr;
fdr = &AT91C_UDP_FDR[hw_ep];
/* PRINTF("Write %d\n", len); */
while(len-- > 0) {
*fdr = *data++;
}
}
static unsigned int
get_receive_capacity(USBBuffer *buffer)
{
unsigned int capacity = 0;
while(buffer && !(buffer->flags & (USB_BUFFER_IN| USB_BUFFER_SETUP|USB_BUFFER_HALT))) {
capacity += buffer->left;
buffer = buffer->next;
}
return capacity;
}
static int
handle_pending_receive(USBEndpoint *ep)
{
int short_packet;
unsigned int len;
unsigned int copy;
unsigned int res = 0;
unsigned int hw_ep = EP_HW_NUM(ep->addr);
USBBuffer *buffer = ep->buffer;
uint8_t *setup_data = NULL;
unsigned int flags = ep->flags;
if (!(flags & USB_EP_FLAGS_ENABLED) || !buffer) return USB_READ_BLOCK;
len = RXBYTECNT(AT91C_UDP_CSR[hw_ep]);
PRINTF("handle_pending_receive: %d\n", len);
switch(flags & USB_EP_FLAGS_TYPE_MASK) {
case USB_EP_FLAGS_TYPE_CONTROL:
if (flags & USB_EP_FLAGS_SETUP_PENDING) {
/* Discard buffers until we find a SETUP buffer */
buffer =
skip_buffers_until(buffer, USB_BUFFER_SETUP, USB_BUFFER_SETUP, &res);
ep->buffer = buffer;
if (!buffer || buffer->left < len) {
res |= USB_READ_BLOCK;
return res;
}
/* SETUP packet must fit in a single buffer */
if (buffer->left < len) {
buffer->flags |= USB_BUFFER_FAILED;
buffer->flags &= ~USB_BUFFER_SUBMITTED ;
if (buffer->flags & USB_BUFFER_NOTIFY) res |= USB_READ_NOTIFY;
ep->buffer = buffer->next;
res |= USB_READ_FAIL;
return res;
}
setup_data = buffer->data;
} else {
if (buffer->flags & (USB_BUFFER_SETUP|USB_BUFFER_IN)) {
buffer->flags |= USB_BUFFER_FAILED;
buffer->flags &= ~USB_BUFFER_SUBMITTED ;
if (buffer->flags & USB_BUFFER_NOTIFY) res |= USB_READ_NOTIFY;
ep->buffer = buffer->next;
res |= USB_READ_FAIL;
return res;
}
if (len == 0) {
/* Status OUT */
if (buffer->left > 0) {
buffer->flags |= USB_BUFFER_FAILED;
res |= USB_READ_FAIL;
}
buffer->flags &= ~USB_BUFFER_SUBMITTED ;
if (buffer->flags & USB_BUFFER_NOTIFY) res |= USB_READ_NOTIFY;
ep->buffer = buffer->next;
return res;
}
if (get_receive_capacity(buffer) < len) return USB_READ_BLOCK;
}
break;
case USB_EP_FLAGS_TYPE_INTERRUPT:
case USB_EP_FLAGS_TYPE_BULK:
case USB_EP_FLAGS_TYPE_ISO:
if (get_receive_capacity(buffer) < len) {
return USB_READ_BLOCK;
}
break;
}
short_packet = len < ep->xfer_size;
do {
if (buffer->left < len) {
copy = buffer->left;
} else {
copy = len;
}
len -= copy;
buffer->left -= copy;
read_hw_buffer(buffer->data, hw_ep, copy);
buffer->data += copy;
if (len == 0) break;
/* Release buffer */
buffer->flags &= ~(USB_BUFFER_SUBMITTED | USB_BUFFER_SHORT_PACKET);
if (buffer->flags & USB_BUFFER_NOTIFY) res |= USB_READ_NOTIFY;
/* Use next buffer. */
buffer = buffer->next;
} while(1);
if (short_packet) {
buffer->flags |= USB_BUFFER_SHORT_PACKET;
}
if ((buffer->left == 0)
|| (buffer->flags & USB_BUFFER_PACKET_END)
|| (short_packet && (buffer->flags & USB_BUFFER_SHORT_END))) {
/* Release buffer */
buffer->flags &= ~USB_BUFFER_SUBMITTED;
if (buffer->flags & USB_BUFFER_NOTIFY) res |= USB_READ_NOTIFY;
/* Use next buffer. */
buffer = buffer->next;
}
ep->buffer = buffer;
if (setup_data) {
/* Set direction according to request */
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[0],
((setup_data[0] & 0x80)
? AT91C_UDP_DIR : 0), AT91C_UDP_DIR);
}
return res;
}
static void
start_receive(USBEndpoint *ep)
{
ep->flags |= USB_EP_FLAGS_RECEIVING;
}
#if 0
static unsigned int
get_transmit_length(USBBuffer *buffer)
{
unsigned int length = 0;
while(buffer && (buffer->flags & USB_BUFFER_IN)) {
length += buffer->left;
buffer = buffer->next;
}
return length;
}
#endif
static int
start_transmit(USBEndpoint *ep)
{
unsigned int res = 0;
USBBuffer *buffer = ep->buffer;
unsigned int len;
unsigned int hw_ep = EP_HW_NUM(ep->addr);
unsigned int ep_flags = ep->flags;
len = ep->xfer_size;
if (!(ep_flags & USB_EP_FLAGS_ENABLED) || !buffer) return USB_WRITE_BLOCK;
switch(ep_flags & USB_EP_FLAGS_TYPE_MASK) {
case USB_EP_FLAGS_TYPE_BULK:
if (buffer->flags & USB_BUFFER_HALT) {
if (ep->status & 0x01) return USB_WRITE_BLOCK;
ep->status |= 0x01;
if (!(ep->flags & USB_EP_FLAGS_TRANSMITTING)) {
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],
AT91C_UDP_FORCESTALL, AT91C_UDP_FORCESTALL);
PRINTF("HALT IN\n");
}
return USB_WRITE_BLOCK;
}
case USB_EP_FLAGS_TYPE_ISO:
if (!(ep->flags & USB_EP_FLAGS_TRANSMITTING)) {
if (AT91C_UDP_CSR[hw_ep] & AT91C_UDP_TXPKTRDY) return USB_WRITE_BLOCK;
}
break;
default:
if (AT91C_UDP_CSR[hw_ep] & AT91C_UDP_TXPKTRDY) return USB_WRITE_BLOCK;
}
while (buffer) {
unsigned int copy;
if (buffer->left < len) {
copy = buffer->left;
} else {
copy = len;
}
len -= copy;
buffer->left -= copy;
write_hw_buffer(buffer->data, hw_ep, copy);
buffer->data += copy;
if (buffer->left == 0) {
if (buffer->flags & USB_BUFFER_SHORT_END) {
if (len == 0) {
/* Send zero length packet. */
break;
} else {
len = 0;
}
}
/* Release buffer */
buffer->flags &= ~USB_BUFFER_SUBMITTED;
if (buffer->flags & USB_BUFFER_NOTIFY) res = USB_WRITE_NOTIFY;
/* Use next buffer. */
buffer = buffer->next;
}
if (len == 0) break;
}
ep->buffer = buffer;
if (ep->flags & USB_EP_FLAGS_TRANSMITTING) {
ep->flags |= USB_EP_FLAGS_DOUBLE;
} else {
ep->flags |= USB_EP_FLAGS_TRANSMITTING;
}
PRINTF("start_transmit: sent %08x\n",AT91C_UDP_CSR[hw_ep]);
/* Start transmission */
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],
AT91C_UDP_TXPKTRDY, AT91C_UDP_TXPKTRDY);
return res;
}
static void
start_transfer(USBEndpoint *ep)
{
unsigned int hw_ep = EP_HW_NUM(ep->addr);
int res;
while (1) {
if (!(ep->addr & 0x80)) {
if (ep->buffer && (ep->buffer->flags & USB_BUFFER_HALT)) {
if (ep->status & 0x01) return ;
ep->status |= 0x01;
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[EP_HW_NUM(ep->addr)],
AT91C_UDP_FORCESTALL, AT91C_UDP_FORCESTALL);
PRINTF("HALT OUT\n");
*AT91C_UDP_IDR = 1<<hw_ep;
return;
}
}
if (!(ep->flags & USB_EP_FLAGS_RECV_PENDING)) break;
res = handle_pending_receive(ep);
if (res & USB_READ_NOTIFY) {
notify_ep_process(ep, USB_EP_EVENT_NOTIFICATION);
}
PRINTF("received res = %d\n", res);
if (res & USB_READ_BLOCK) {
*AT91C_UDP_IDR = 1<<hw_ep;
return;
}
if (AT91C_UDP_CSR[hw_ep] & AT91C_UDP_RXSETUP) {
/* Acknowledge SETUP */
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],0, AT91C_UDP_RXSETUP);
} else if (AT91C_UDP_CSR[hw_ep] & (AT91C_UDP_RX_DATA_BK1)) {
/* Ping-pong */
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],0,
(ep->flags & USB_EP_FLAGS_BANK_1_RECV_NEXT)
? AT91C_UDP_RX_DATA_BK1
: AT91C_UDP_RX_DATA_BK0);
ep->flags ^= USB_EP_FLAGS_BANK_1_RECV_NEXT;
} else {
/* Ping-pong or single buffer */
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],0,
AT91C_UDP_RX_DATA_BK0);
ep->flags |= USB_EP_FLAGS_BANK_1_RECV_NEXT;
}
if (ep->flags & USB_EP_FLAGS_DOUBLE) {
ep->flags &= ~USB_EP_FLAGS_DOUBLE;
} else if IS_CONTROL_EP(ep) {
ep->flags &= ~(USB_EP_FLAGS_RECV_PENDING|USB_EP_FLAGS_SETUP_PENDING);
} else {
ep->flags &= ~USB_EP_FLAGS_RECV_PENDING;
}
if (res & USB_READ_FAIL) {
/* Only fails for control endpoints */
usb_arch_control_stall(ep->addr);
return;
}
*AT91C_UDP_IER = 1<<hw_ep;
}
if (ep->flags & (USB_EP_FLAGS_TRANSMITTING | USB_EP_FLAGS_RECEIVING)) {
#if 0
if (!IS_BULK_EP(ep) || (ep->flags & USB_EP_FLAGS_DOUBLE)) {
#else
if(1) {
#endif
PRINTF("Busy\n");
return;
}
}
if (ep->status & 0x01) return; /* Don't start transfer if halted */
if (ep->buffer) {
if (ep->buffer->flags & USB_BUFFER_IN) {
res = start_transmit(ep);
if (res & USB_WRITE_NOTIFY) {
notify_ep_process(ep, USB_EP_EVENT_NOTIFICATION);
}
} else {
start_receive(ep);
}
}
}
void
usb_arch_transfer_complete(unsigned int hw_ep)
{
unsigned int status = AT91C_UDP_CSR[hw_ep];
USBEndpoint *ep = &usb_endpoints[hw_ep];
PRINTF("transfer_complete: %d\n", hw_ep);
if (status & AT91C_UDP_STALLSENT) {
/* Acknowledge */
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],0, AT91C_UDP_STALLSENT);
}
if (status & (AT91C_UDP_RXSETUP
| AT91C_UDP_RX_DATA_BK1 | AT91C_UDP_RX_DATA_BK0)) {
if (status & AT91C_UDP_RXSETUP) {
PRINTF("SETUP\n");
ep->flags |= USB_EP_FLAGS_SETUP_PENDING;
}
if (ep->flags & USB_EP_FLAGS_DOUBLE) {
ep->flags &= ~USB_EP_FLAGS_DOUBLE;
} else {
ep->flags &= ~USB_EP_FLAGS_RECEIVING;
}
if ( ep->flags & USB_EP_FLAGS_RECV_PENDING) {
ep->flags |= USB_EP_FLAGS_DOUBLE;
} else {
ep->flags |= USB_EP_FLAGS_RECV_PENDING;
}
start_transfer(ep);
}
if (status & AT91C_UDP_TXCOMP) {
PRINTF("Sent packet\n");
if (ep->flags & USB_EP_FLAGS_DOUBLE) {
ep->flags &= ~USB_EP_FLAGS_DOUBLE;
} else {
ep->flags &= ~USB_EP_FLAGS_TRANSMITTING;
}
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],0, AT91C_UDP_TXCOMP);
if (ep->status & 0x01) {
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[hw_ep],
AT91C_UDP_FORCESTALL, AT91C_UDP_FORCESTALL);
PRINTF("HALT IN\n");
} else {
start_transfer(ep);
}
}
}
void
usb_set_ep_event_process(unsigned char addr, struct process *p)
{
USBEndpoint *ep = &usb_endpoints[EP_INDEX(addr)];
ep->event_process = p;
}
/* Select what process should be polled when a global event occurs */
void
usb_arch_set_global_event_process(struct process *p)
{
event_process = p;
}
unsigned int
usb_arch_get_global_events(void)
{
unsigned int e;
USB_DISABLE_INT;
e = events;
events = 0;
USB_ENABLE_INT;
return e;
}
unsigned int
usb_get_ep_events(unsigned char addr)
{
unsigned int e;
unsigned int ei = EP_HW_NUM(addr);
USB_DISABLE_INT;
e = usb_endpoints[ei].events;
usb_endpoints[ei].events = 0;
USB_ENABLE_INT;
return e;
}
void
usb_submit_recv_buffer(unsigned char ep_addr, USBBuffer *buffer)
{
USBBuffer **tailp;
USBEndpoint *ep = &usb_endpoints[EP_INDEX(ep_addr)];
if (!(ep->flags & USB_EP_FLAGS_ENABLED)) return;
/* PRINTF("buffer: %p\n", ep->buffer); */
/* dbg_drain(); */
USB_DISABLE_INT;
tailp = (USBBuffer**)&ep->buffer;
while(*tailp) {
tailp = &(*tailp)->next;
}
*tailp = buffer;
while(buffer) {
buffer->flags |= USB_BUFFER_SUBMITTED;
buffer = buffer->next;
}
start_transfer(ep);
USB_ENABLE_INT;
}
void
usb_submit_xmit_buffer(unsigned char ep_addr, USBBuffer *buffer)
{
USBBuffer **tailp;
USBEndpoint *ep = &usb_endpoints[EP_INDEX(ep_addr)];
if (!(ep->flags & USB_EP_FLAGS_ENABLED)) return;
/* PRINTF("usb_submit_xmit_buffer %d\n", buffer->left); */
USB_DISABLE_INT;
tailp = (USBBuffer**)&ep->buffer;
while(*tailp) {
tailp = &(*tailp)->next;
}
*tailp = buffer;
while(buffer) {
buffer->flags |= USB_BUFFER_SUBMITTED | USB_BUFFER_IN;
buffer = buffer->next;
}
start_transfer(ep);
USB_ENABLE_INT;
}
void
usb_arch_discard_all_buffers(unsigned char ep_addr)
{
USBBuffer *buffer;
volatile USBEndpoint *ep = &usb_endpoints[EP_INDEX(ep_addr)];
USB_DISABLE_EP_INT(EP_HW_NUM(ep_addr));
buffer = ep->buffer;
ep->buffer = NULL;
USB_ENABLE_EP_INT(EP_HW_NUM(ep_addr));
while(buffer) {
buffer->flags &= ~USB_BUFFER_SUBMITTED;
buffer = buffer->next;
}
}
uint16_t
usb_arch_get_ep_status(uint8_t addr)
{
if (EP_INDEX(addr) > USB_MAX_ENDPOINTS) return 0;
return usb_endpoints[EP_INDEX(addr)].status;
}
void
usb_arch_set_configuration(uint8_t usb_configuration_value)
{
/* Nothing needs to be done */
}
void
usb_arch_control_stall(unsigned char addr)
{
if (EP_INDEX(addr) > USB_MAX_ENDPOINTS) return;
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[EP_HW_NUM(addr)],
AT91C_UDP_FORCESTALL, AT91C_UDP_FORCESTALL);
}
/* Not for control endpoints */
void
usb_arch_halt_endpoint(unsigned char ep_addr, int halt)
{
if (EP_INDEX(ep_addr) > USB_MAX_ENDPOINTS) return;
if (!usb_endpoints[EP_INDEX(ep_addr)].flags & USB_EP_FLAGS_ENABLED) return;
*AT91C_UDP_IDR = 1<<EP_HW_NUM(ep_addr);
if (halt) {
usb_endpoints[EP_INDEX(ep_addr)].status |= 0x01;
/* Delay stall if a transmission is i progress */
if (!(usb_endpoints[EP_INDEX(ep_addr)].flags & USB_EP_FLAGS_TRANSMITTING)){
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[EP_HW_NUM(ep_addr)],
AT91C_UDP_FORCESTALL, AT91C_UDP_FORCESTALL);
}
} else {
USBEndpoint *ep = &usb_endpoints[EP_INDEX(ep_addr)];
ep->status &= ~0x01;
*AT91C_UDP_IDR = 1<<EP_HW_NUM(ep_addr);
UDP_SET_EP_CTRL_FLAGS(&AT91C_UDP_CSR[EP_HW_NUM(ep_addr)],
0, AT91C_UDP_FORCESTALL);
*AT91C_UDP_RSTEP = 1<<EP_HW_NUM(ep_addr);
*AT91C_UDP_RSTEP = 0;
/* Release HALT buffer */
if (ep->buffer && (ep->buffer->flags & USB_BUFFER_HALT)) {
ep->buffer->flags &= ~USB_BUFFER_SUBMITTED;
if (ep->buffer->flags & USB_BUFFER_NOTIFY) {
notify_ep_process(ep,USB_EP_EVENT_NOTIFICATION);
}
ep->buffer = ep->buffer->next;
}
/* Restart transmission */
start_transfer(&usb_endpoints[EP_INDEX(ep_addr)]);
}
*AT91C_UDP_IER = 1<<EP_HW_NUM(ep_addr);
}
int
usb_arch_send_pending(uint8_t ep_addr)
{
return usb_endpoints[EP_INDEX(ep_addr)].flags & USB_EP_FLAGS_TRANSMITTING;
}
void
usb_arch_set_address(unsigned char addr)
{
*AT91C_UDP_FADDR = AT91C_UDP_FEN | addr;
*AT91C_UDP_GLBSTATE |= AT91C_UDP_FADDEN;
}
void
usb_arch_reset_int()
{
usb_arch_reset();
notify_process(USB_EVENT_RESET);
}
void
usb_arch_suspend_int()
{
notify_process(USB_EVENT_SUSPEND);
}
void
usb_arch_resume_int()
{
notify_process(USB_EVENT_RESUME);
}
|
An inhibitor specific for the mouse T-cell associated serine proteinase 1 (TSP-1) inhibits the cytolytic potential of cytoplasmic granules but not of intact cytolytic T cells.
We have investigated a proteinase inhibitor, designed according to the preferred amino acid sequence that is cleaved by the murine T-cell specific serine proteinase 1 (TSP-1) for its effect on the cytolytic potential of cloned cytotoxic T-cell lines (CTLL) and of cytoplasmic granules, derived from these cells. Pretreatment of effector cells with H-D-Pro-Phe-Arg-chloromethyl-ketone (PFR-CK) prior to the cytotoxicity assay did not result in inhibition of cytolytic activity of three independent CTLL and did not effect their granule-associated TSP-1 activity after extraction with Triton X-100. Furthermore, PFR-CK did not interfere with cytolysis of target cells by CTLL when present for the entire incubation period. In contrast, PFR-CK inhibited in a dose-dependent manner both TSP-1 activity and the hemolytic/cytolytic potential of isolated cytoplasmic granules after their pretreatment with high-salt concentration. We interpret these results to mean that cytolysis of target cells by CTLL involves the granule-associated proteinase TSP-1, which probably becomes active upon exocytosis following effector-target cell interactions. |
January 27, 2008
Of all the treasures Germany gained from reunification, none excels Dresden for the sheer quality and scope of its attractions. Nearly bombed out of existence on the night of February 13, 1945, when it suffered casualties estimated to be between 50,000 and 100,000 civilians (or more, no one is sure), as well as the total destruction of some 75 percent of its Old City, Dresden has only now recovered after many decades of neglect under communist rule. Many of its treasures have been restored to the condition they were in when the city was famed as the "Florence of the North." There's more than enough to see and do here in a single day, so perhaps you might consider staying overnight, or coming back for another visit. In any case, the walking tour described here will serve as an introduction to the splendors — and the fun — that awaits visitors to this great city.
GETTING THERE:
Trains, mostly of the EC class, depart Berlin's Hauptbahnhof Station for the two-hour run to Dresden. Check the schedules carefully, as some of other classes require one or two changes and can take three hours. Reservations might be a good idea. Return service operates until mid-evening.
Some of the major museums are closed on Mondays, others on Tuesdays or Thursdays, and one of the smaller ones on Fridays — so check the individual listings to match your interests. Boat excursions on the Elbe operate from about late April until early October.
The local Tourist Information Office(Dresden Werbung & Tourismus), T: (0351) 4919-2100, W: Dresden-tourist.de, is at Prager Strasse 2a, between the train station and the Altmarkt. There is also a branch in front of the Semper Opera House. Ask about the Dresden-City-Card, which covers free public transportation, admission to 12 major museums, and many discounts on other attractions. Dresden has a population of about 485,000.
FOOD AND DRINK:
Alte Meister (Theaterplatz 1a, by the Zwinger, facing the Opera) Modern light German cuisine in an historic building, with an outdoor terrace facing the Opera. T: (0351) 481-0426. €€ and €€€
Italienisches Dörfchen (Theaterplatz 3, just east of the Opera) Gourmet-level Saxon and International cuisine in three restaurants. T: (0351) 498-160. €€ and €€€
Café Aha (Kreuzstr. 7, a block east of Altmarkt. Light vegetarian and other healthy fare, both environmentally and sociologically sound, served in an attractive setting. T: (0351) 496-0673. €
Rauschenbach (Weisse Gasse 2, a block east of the Altmarkt) A favorite with the young crowd for light meals and sandwiches. T: (0351) 821-2760. €
X-Fresh (in the Altmarkt Galerie, by the Altmarkt) Salads and other healthy light dishes in a modern shopping mall. T: (0351) 484-2791. €
SUGGESTED TOUR:
Numbers in parentheses correspond to numbers on the map.
On stepping out of the main train station(Hauptbahnhof) (1), your first impression will be of anything but charm. Ahead of you stretches Prager Strasse, a prime example of the "brave new world" of socialist planning — row after row of sterile modernist cubes arranged as a pedestrian mall. Since reunification it has at least become a lively place, with booming retail businesses, hotels, and fast-food outlets, but nothing can save the souless architecture. Stop by the Tourist Information Office for some brochures, then hurry on down the block to the Altmarkt (2). Although today it's often a parking lot, this is Dresden's oldest square, a scene of bustling trade since the 14th century. Germany's oldest Christmas market — the Striezelmarkt — is still held here, as are other outdoor markets.
Turn left on Wilsdruffer Strasse, a broad avenue once used for communist parades, then right at Postplatz to Dresden's number-one attraction. The *Zwinger (3) is certainly one of the most impressive royal complexes on Earth. This triumph of Baroque architecture was created in the early 18th century purely as a setting for the pleasures of Frederick Augustus I (Augustus the Strong) (1690-1733) a bon vivant, art lover, and swinger who allegedly sired some 300 illegitimate children when he wasn't busy as King of Poland. It consists of seven interconnected buildings arranged around an inside courtyard, best approached through the Glockenspiel Pavilion on Sophienstrasse. On the other side of the street stands the Royal Palace (Schloss) itself, which you will come to later. The Zwinger complex (photo, below) was largely destroyed in the World War II firebombing, but has since been skillfully restored and today houses an intriguing collection of museums.
The Old Masters occupy three floors of the side facing Theaterplatz. Upon entering, you will pass a series of tapestries created from cartoons by Raphael, then some remarkable 18th-century townscapes of Dresden by Canaletto Belotto — nephew of the Canaletto — so accurately drawn that they were used as a guide to reconstructing the city after World War II. Upstairs are major works by such Dutch Masters as Jan van Eyck, Rembrandt, Rubens, and Vermeer; German masterpieces by the elder Cranach, Holbein, and Dürer; 17th-century French paintings; and works of the Italian Renaissance by Tintoretto, Veronese, Titian, Correggio and others. The *Sistine Madonna by Raphael can be immediately recognized by those two little cherubs at its base — you've seen that image again, and again, and again. Rounding out the collection on the next floor are paintings by Watteau, Tiepolo, El Greco, Velázquez, and many others.
Dresden's Armory features a vast collection of suits of armor, weapons, firearms, and the like. Some of these, created for ceremonial use by royalty (and their horses) are real works of art. You'll also see tiny armor made for play jousting by the littlest princes, an early introduction to the arts of war.
Saxony is famous for its porcelain, so it's entirely fitting that a section of the Zwinger should be devoted to the:
Until the 18th century the making of fine porcelain was still a mystery to Europeans, who imported these luxury goods from the Far East. Then an alchemist named Johann Böttger (1682-1719) arrived on the local scene. Having failed at making gold, he was put to work by the royals at duplicating the quality of the Chinese and, in a vault under Dresden's nearby Brühl Terrace he finally succeeded in his assigned task. A factory was set up in nearby Meissen, and the rest is history. The finest examples of German, Chinese, and Japanese porcelains, some of incredible delicacy, are on display here.
A visit here sounds rather daunting, but is actually quite interesting. Historic instruments of all sorts are displayed here, including clocks, thermometers, globes, and the like. Among the treasures is an Arabic globe from 1279 and a wonderful *planetary clock created in the 16th century for Augustus the Strong that tracks the movements of all the planets known at that time.
Just north of the Zwinger complex stands another architectural triumph of world renown, the Semper Opera House(Semperoper) (4) (photo, above). The only theater in Germany to bear the name of its architect, it was built in the 1870s to plans by Gottfried Semper, totally destroyed in 1945, and rebuilt by the East German regime in the early 1980s. Hour-long tours of its splendid interior are offered when the theater is not in use, T: (0351) 491-1496, W: semperoper.de, for information. Better still, plan on attending a performance — the season last from October until early July.
Cross Sophienstrasse to the Catholic Cathedral(Katholische Hofkirche) (5), built in the mid-18th century as a private basilica for the royals, who had converted to Roman Catholicism in order to claim the throne of Poland. It did not attain cathedral status until 1980, when it became the seat of the Diocese of Dresden and Meissen. This is the largest church in all of Saxony, and arguably the most magnificently decorated — both inside and out. At one time it was connected to the adjacent Royal Palace by a covered bridge, which led to an arcaded gallery in the church, where the rulers sat. Forty-nine Saxon kings are buried here, as is the heart of Augustus the Strong, whose other remains are in Kraków, Poland. Guided tours are offered at various times during the day, or you can just wander through on your own. Just across from this is the:
The Historic Green Vault(Historisches Grünes Gewölbe) requires advance timed tickets, available at tourist offices, online or by phone at the number and website above, at an extra charge of €€€. For the Historic Green Vault you must arrive no later than the time indicated. All bags and outerwear must be checked, and cameras or cell phones are verboten.
Recently restored and now open to the public, Dresden's Royal Palace was mostly built between 1709 and 1722. Besides the fabulous interiors and exquisite room settings, the palace is most noted for its two green vaults, both stuffed with incredible objets d'art. One of these, the New Green Vault(Neues Grünes Gewölbe) is included in the palace admission. The other, the *Historic Green Vault(Historisches Grünes Gewölbe) requires an advance timed ticket and extra fee (see above). If you love crown jewels and such, it's well worth the extra trouble.
For a great *view of the city, you can climb the palace's Hausmannsturm to its 300-foot height. Along the way you'll pass historic photos of Dresden right after the devastation of February 13, 1945. Open April-Oct., Wed.-Mon., 10-6. €.
View of Dresden's Baroque skyline
Another part of the palace complex is reached by following Augustusstrasse past the Procession of the Princes(Fürstenzug), an enormous mosaic wall stretching for some 335 feet and depicting — in 24,000 Meissen tiles — all of the Saxon rulers from 1123 to 1904. This leads to the Johanneum (7), once the royal stables and now the:
For anyone fascinated by trains, buses, trams, cars, bicycles, and the like, this is surely a must-see. Among the items on display is a railroad car used by the royal family, early automobiles, historic vehicles by Mercedes-Benz, and a 1930's streetcar.
Now follow the map to the Augustusbrücke (8), a reconstructed bridge spanning the Elbe River and linking the Old City (Altstadt) with the New (Neustadt). There are some excellent views from halfway across. If you feel up to a little walk, a side trip through the "New" (well, not quite as old as the Alt) City will prove interesting. Once across the water, turn immediately left and follow along the river bank to the Japanese Palace(Japanisches Palais) (9), begun in 1715 to house Augustus the Strong's vast collection of Oriental porcelain. Its design, although mostly Baroque, has a distinctly Asiatic roof resembling that of a Japanese castle, as well as Chinese decorations in the courtyard. The porcelains, of course, today reside in the Zwinger, and this palace now houses two rather uninspired museums, one of prehistory and the other of ethnology. From behind the building you can get the *classical view of Dresden as painted by Canaletto in the 18th century.
Cross the busy Grosser Meissner Strasse and continue up Königstrasse to the Albert Platz (10), a spacious garden circle enlivened with interesting statuary. Turning down Hauptstrasse, an unusually pleasant tree-shaded pedestrian way, you will soon come to the Kügelgenhaus (11) at number 13. The Romantic artist Wilhelm von Kügelgen (1802-67) lived here and received such guests as Caspar David Friedrich and Goethe; today it houses the small Museum of Early Romanticism(Museum zur Dresdner Frühromantik), an off-the-beaten-path gem of immense charm. T: (0351) 804-4760, W: stmd.de. Open Wed.-Sun. 10-6. €.
Off to the left, in the 17th-century Jägerhaus, is the Museum of Saxon Folk Art(Museum für Sächsische Volkskunst) (12). A rewarding detour for those interested in the subject, the museum is filled with all manner of Saxon arts and crafts, such as Christmas decorations, toys, painted furniture, and the like. A new attraction is the collection of theatrical puppets on the upper floor. T: (0351) 491-42000, W: stmd.de. Open Tues.-Sun. 10-6. €.
You've been hearing all about him, now meet his gilded likeness. The larger-than-life equestrian statue of Augustus the Strong (13), ruler of Saxony, King of Poland, alleged father of countless illegitimate offspring, builder of the Zwinger, and creator of this "New" City, shines like the overpowering person he undoubtedly was.
A pedestrian tunnel leads under the busy Grosse Meissner Strasse and back onto the Augustus Bridge. At its far end, back in the Old City, climb some steps to the left and stroll down the delightful Brühl Terrace (14). The views along here (photo, above) are just gorgeous, both toward town and across the river. Boat trips are offered from several piers along the quay, some as short as 90 minutes and others making connections all the way to the Czech Republic. A few of these are aboard historic steam-powered sidewheelers. Ask at the tourist office orT: (0351) 866-090,W: saechsische-dampfschifffahrt.de for details.
Follow the map around to the:
*ALBERTINUM (15), T: (0351) 491-4660, W: skd-dresden.de. Open Wed.-Mon. 10-6. €€. NOTE: The Albertinum is presently under renovation. Until completion, some of the art can be seen in the Old Masters Gallery in the Zwinger (3), above.
This is Dresden's other great art museum. Its *Collection of 19th- and 20th-Century Paintings(Gemäldegalerie Neue Meister) has world-class examples of such schools as the Biedermeier, Romanticism, Realism, Jugenstil, Expressionism, and Impressionism, along with works by little-known artists of the former East Germany. Among its treasures are *Two Men Contemplating the Moon by Caspar David Friedrich, and works by Böcklin, Feuerbach, Manet, Monet, Degas, Gauguin, Toulouse-Lautrec, Van Gogh, Schmidt-Rottluff, Nolde, Feininger, Dix, and Max Liebermann. Another section displays the Sculpture Collection(Skulpturensammlung), featuring classical sculpture from Roman and Egyptian times along with some carved wall sections from ancient Assyria.
Stroll over to Neumarkt to visit the magnificent *Frauenkirche (16), completed in 1743 as the first really large Protestant church in Germany. It was reduced to rubble during that terrible night in 1945, and its pile of ruins remained until recently as a monument to the folly of war. Now that reconstruction is finally finished, visitors can once again marvel at its Baroque beauty. T: (0351) 498-1131,W: frauenkirche-dresden.org. Open to visitors on weekdays 10-noon and 1-6. Free. Tower and cupola open daily 10-6, €.
Nearby, the City History Museum(Stadt Museum) (17) in the former Landhaus of 1770 documents the savage firebombing of World War II, widely regarded as a pointless exercise in revenge (Dresden was of little strategic value), along with a thorough history of the city from the 12th century until the overthrow of the communist regime. T: (0351) 656-480,W: stadtmuseum.dresden.de. Open Tues.-Sun. 10-6. €.
On the way back to the station, you might want to stop at the Kreuzkirche (18), founded around 1200 and rebuilt several times since. Its choirmaster during the 17th century was the noted composer Heinrich Schütz, regarded as the "Father of German Music" and the forerunner of Bach. His choir, the world-famous Kreuzchor, is still going strong. Although the interior is spatan, you can climb — on foot — the tower for a bird's-eye view of the Old City.
Dresden has one last attraction, and it's not far out of the way. The Deutsches Hygiene Museum (19) may have a name that only a communist bureaucrat could love, but its displays of the workings of the human body are first rate. Devoted to good health and an ecological awareness, the museum has such exhibits as the "glass lady," an anatomically correct transparent model of a human being, and opportunities to test your oen senses. T: (0531) 4846-670. W: dhmd.de. Open Tues.-Sun. 10-6. €€.
January 23, 2008
One very popular daytrip destination for American servicemen stationed around Tokyo in the 1950s was Hakone National Park — the lake, the mountains, the hot spring resorts — all in the shadow of magnificent Mount Fuji. Easy to get to and a complete break from the daily routine, Hakone was also a cheap little vacation. I went there several times when I was stationed at Oji Camp in 1957-58, and several more times while at North Camp Drake in 1958-59. The first time was by car, the rest by train. In 1964 I revisited Hakone on vacation, and again in 1971 while on a business trip.
The map above covers most of the national park, showing transportation routes by train, bus, cable car, and boat.
Hakone's central attraction is Lake Ashi, across whose blue waters rises the serene image of Mount Fuji — that is, if sky conditions cooperate and the view is not obscured by haze. The photo at the top of this page is of the 17th-century red torii entrance to Hakone Shrine, a sacred spot in the Shinto religion that sits right on the water's edge. This was first founded in the 8th century.
Lake Ashi was easily reached by taking a train to Odawara, then a bus.
Being a popular tourist destination, Hakone abounds in colorful characters, such as this bird-whistle seller (photo, left). Much of the activity takes place around the small lakeside town of Moto-Hakone, located at the southern end. My roomate and I once had a cheap lunch there, filling up on curry rice for a mere ¥50 (14¢ U.S.). Beer cost a few yen more, but not much. Just about everything in Japan was dirt cheap back in the 1950s, so even peon soldiers could afford to live it up. Unhappily, this is no longer true.
These kids are at the edge of Lake Ashi.
Nearby is a section of the ancient Tokaido Road, which linked the imperial capital of Kyoto with the headquarters of the shogunate in Edo (today's Tokyo). A barrier was erected here in 1618 to control the flow of feudal lords (daimyos) and their retainers, thus protecting the shogun's dominance over the land. The barrier was demolished during the Meiji Restoration in 1869, but has since been rebuilt as a tourist attraction.
From this end of the lake we would take a boat (photo, right) to Togendai at the north end, then a cable car (photo, below) to Owakudani, a stop midway on the ropeway to Sounzan. Getting off here offers a fabulous view of Mount Fuji (weather permitting!) and a chance to stroll about the smelly Valley of Greater Boiling, where sulphuric fumes rise from hellish crevasses in the old crater of Mount Kamiyama.
Continuing on to Sounzan, we changed to a funicular to Gora. There we connected with a switchback railway for a hair-raising descent to Odawara. Then it was a regular JNR train back to Tokyo Central or the Odakyu train to Tokyo Shinjuku.
January 22, 2008
Since starting this blog, I have received several inquiries regarding Richard Avedon's methods of lighting his photographs. Here's what I remember from the periods when I assisted him in 1952 to 1956 and 1960 to 1965.
In the beginning there was the sun and it came in through a skylight. Both his studio at 640 Madison Avenue in New York City and the later one at the northeast corner of Third Avenue and 49th Street had large skylights. The 49th Street studio also had a very large window of frosted glass facing south, which combined with the overhead skylight yielded a clean white background and ample light in the foreground, controlled by large reflectors. During sittings we always had to be on the lookout for passing clouds.
The photo above shows Avedon preparing for a theatrical sitting under the skylight at 640 Madison Ave, circa 1952. Note the reflector at a 45-degree angle. Along the wall behind it are two tungsten keg lights and two Saltzman 1,500-watt tungsten lights on stands. The curtained doorway in the center led to the dressing room. Avedon is the man in shirtsleeves.
The photo on the right shows a leg model preparing for a hosiery shot under the skylight at 640 Madison Ave., circa 1953. Avedon is on the right. Note the large reflectors.
The small photo, left, shows a Saltzman 5,000-watt tungsten light. Two of these were used for bounce lighting only, as they were blindingly bright. In front of it is Marty, the second assistant in 1952-53 (I was the lowly third).
The large photo above shows a Saltzman 1,500-watt tungsten lamp on a counterbalanced stand, with a 5,000-watt unit behind it, pointed to the ceiling. In case you're wondering, that's me playing matador with a fake bull. This was part of a fashion ad with my head between the horns, ogling Dovima the model. The final result is on the right. The fashions are very 1953.
When the sun didn't shine, or when Dick wanted more controlled lighting, we used tungsten lights, mostly the 1,500-watt and 5,000-watt Saltzman models on wheeled stands, and two more 1,500-watters on portable stands. These were all color-balanced at 3,200 degrees Kelvin, matched to Type B color films. When the 1,500-watt types were aimed directly at the models, they sported spun-glass diffusers to soften the glare.
The next studio, at 110 East 58th Street, also had a skylight, but to my knowledge it was never used as by that time (1959) strobes had pretty much taken over.
Sometime during the late 1950s, while I was away in the U.S. Army, Avedon began using what he called his "Beauty Light," actually a 1,500-watt Saltzman lamphead on an aluminum stand with a thick amount of spun glass for diffusion. This was a major advance as it could be hand-held by a (strong) assistant and moved about as both he and the model shifted positions. It was always kept very close to the model, just outside of the camera's field of view. Doing so allowed a high ratio of light fall off from one side of the model's face to the other, giving great dimensionality, contrast, and separation from the background.
In time, this same single-source lighting plan was also used on some portraits, especially those of celebs. Controlling this light became a bit of an art as the assistant manning it had to anticipate what both Avedon and the sitter would do next. And, of course, the distance from the sitter to the lamp had to remain constant to maintain a consistent exposure, especially with color films.
By the late 1950s tungsten lighting was gradually replaced with strobes, although the hot "Beauty Light" remained in use for its unique properties. The first strobe unit, which was still in use even after I left in the fall of 1965, was a massive ASCOR unit, with a control console on wheels, and two banks of ten capacitors, each of which weighed close to a hundred pounds. These were also on wheels and could be combined in various ways by rearranging the thick cables connecting them. This whole beast sucked huge amounts of electricity, made noise, and recycled almost instantly. It outputed to four flash heads on stands, and to one huge lamp head on a boom stand. The flash tube alone on the latter was about a foot long and six inches in diameter, and was bounced off a hanging white panel.
All of this light allowed the use of very small f-stops, even down to f/32, even with the slow color films in use at the time. The result was tremendous depth of field with both medium- and large-format cameras, so the models could move around without changing focus.
My rough sketch above shows a typical setup for flat lighting with a bright white background using the big ASCOR strobes. This allowed the model to move freely and still be well lit. A setup like this was especially effective in color using an 8x10 view camera.
In the early 1960s we began using the much smaller BALCAR 1200 strobes, imported from France by the Thomas Instrument Company. These were easily portable and could be safely plugged into household circuits. The earliest ones were none too reliable, however, so we always had to have spares on hand. They had a maximum output of 1,200 joules, which was adequate, and used a bounce umbrella to diffuse the light. In time, one of these was used to replace the hot tungsten "Beauty Light."
January 01, 2008
More photos and anecdotes are coming in. Here's one taken at the Rocker 4 Club in downtown Tokyo in September of 1956 during Lt. Malloy's and Sp 5 Phil Hood's going home party, sent in by Noel Garland.
The above is from September 1954, depicting a parade on the retirement of the Post Commander, Col. Edwin G. Greiners. Taken from third floor of mess hall building, motor pool in background.
The dark structure atop the Headquarters building billets was, I think, NCO quarters, but in early 1958 it became what was left of the Personnel Processing Detachment, most of which had moved to Hawaii. By spring I was about the only guy living in it, last set of windows on the right, just before the taller building.
Does anyone remember the ASA Star? I don't, but this post newspaper of ASAPAC at Oji may have ceased publication before I got there — or else I was oblivious to it, being stuck in a far corner of the camp. Anyway, Noel Garland of Texas sent me some copies of two editions, both from 1956. Here are excerpts from them, more to follow. Enlarging the images will make them much clearer.
This edition of March 3, 1956 has a story about the Personnel Processing Detachment, of which I became the Assistant Detachment Clerk upon arrival in Japan in July, 1957. The two photos on the left of the above image are of the place, headed by Lt. William Russell. This is the man who arranged for me to stay in Tokyo instead of the place I was assigned to, Korea. By that time he was a Captain, and was soon replaced by Lt. Edwin Hutchins. Click here to read all about it.
The story continues in the text above. We of the cadre had our own room across from the Orderly Room, and our own bathroom, but it was still crowded. That's the post motor pool behind the men in formation in the above photo.
ANYWAY, here's some more for that trip down Memory Lane. Enlarging the pages will make them much more readable. OR, download desired pages (each page is a separate JPEG file) into any picture editor program and blow them up there.
More later. If you yhave anything to add, please contact me through the Comments thingy below.
More photos and anecdotes are coming in from guys who were there — CLICK HERE to view page 6. |
I am realize that all people really wants to obtain with the cheapest selling price within AWAYTR 2019 Winter Velvet Knotted Headband for Women Vintage Fashion Hair Band Hair Accessories for Girls Headwear Hairband. But sometimes more expensive yet it really is swifter shipment, it is a great alternative to popular looking...
Information
Customer Service
Extras
My Account
Search results are displayed by balas.freeddns.org is as a reference. Suitability price, details, specifications, pictures and other information is the responsibility of the seller. By using cintakl.tk services, you agree to comply with this regulation. |
Dedicated to the preservation & promotion of pure Sanatan Hindu Sikhi heritage which the great Gurus strived to uphold.Today it is systematically being Talibanised by Neo-Sikhs,who are painting an Abrahamic picture of pure Sikhi traditions and brainwashing the Sikh youth into accepting a Sikh history which the Shiromani Guru Prabandhak Committee (SGPC), Tat Khalsa Singh Sabha & Akhand Kirtani Jatha (AKJ) have edited & rewritten shamelessly.
I would like to begin with the true accounts of Hindu Sikh history which have been supressed for so many years by narrow minded neo Sikhs, who have behaved as stooges of the SGPC & Tat Khalsa Singh Sabha, that was initially set up by the British colonial forces to enslave the Hindu Sikh nation by spreading distorted history, through cutting out, editing, expunging the true facts of Sanatan Hindu Sikh history.Instead, today we are fed on a Sikhism which is based on lies, biased views & anti Brahmin/ Hindu agendas of the neo-Sikhs who have completely suceeded in Talibanisation of the ever changing 'Sikh history' and the rich Hindu heritage of Shri Adi Granth. They are the Tat Khalsa Singh Sabha & the Shiromani Gurudwara Prabandhak Committee (S.G.P.C).
All our ten Gurus were in fact from Hindu families and lived as Hindus until their final days. They stood for Hindu Dharma & preservation of the spriritual essence of Sanatan Dharma.They married under the Hindu ceremonies officiated by Brahmin pandits also. The Sanatan Sikhs regard Classical Sikhism – which arose from the Sanatan Dharma and Vedic culture - to be a denomination of Sanatan Dharma. In the early days of Sikh history, the Gurudwaras were managed by Mahants (caretakers) who were descendants of the Gurus. Frescos of Hindu deities, murtis of Hindu deities as well as images of Sikh gurus formed part of the sanctum since the time of Guru Nank Devji. When Punjab fell under the British rule, hordes of missionaries moved in to harvest the lost souls in the name of Jesus. A Sikh religious administrative body, Sanatan Sikh Sabha was established in 1873 by Sanatani Sikhs in Amritsar to counter the rising influence of Christianity and conversion to Christianity when several Sikhs had been converted at the time. Those who had been converted by the missionaries worked as paid agents for the British colonialists in destroying the Sanatan Hindu history of Punjab.In many such cases, valuable material, rare literature, architecture and signs of much celebrated memories were completely destroyed. Their sole purpose was to destroy all evidence of Hindu philosophy, Hindu history & Hindu lifestyles of our ten Gurus - to separate Sanatan Sikhism from Hindu Vedic roots in order to divide & rule over Punjab, making it easy to exploit the Punjabi nation wherever/whenever it suited them.
The history writing by the British was a deliberate & systematic effort. The British used history of India as a tool for demoralizing the Indian natives. History of India was twisted, falsified and misinterpreted on a grand scale. In the South, false Aryan invasion theories were floated to alienate the Hindus of the South from their Vedic brothers in the North, who actually share the same DNA with them as has been proven in recent years. The respected Brahmins had become outcasts due to anti Brahminism spurred by the British missionaries - their's was to weaken Sanatan Dharma from its roots & the Brahmins had proved to them to represent the strong roots of ancient Dharmic traditions, which was the main secret behind the once powerful India. In a letter dated December 16, 1868 the famous Indologist Max Muller wrote to the Duke of Argyll, the then Secretary of State of India, 'India has been conquered once, but India must be conquered again and that second conquest should be a conquest by education'.. (Ref: 'The Life and Letter of F. Max Muller, edited by Mrs. Max Muller, 1902, Vol.1, p.357). Prof. Max Muller was not just a philosopher, he was also an examiner for the Indian Civil Service (ICS) examination. Teaching of falsified history played a great part in this 'second conquest'.
Who were these British history writers ? They were mainly army officers and administrators of the East India Company. For example:
Major General John Malcolm - A Memoir of the Central India (1824)
Captain Grant Duff - History of the Marathas (1826)
Gen. Briggs - History of the Rise of Mohammedan Power in India (1829)
Lt.Colonel James Todd - Anals and Antiquities of Rajasthan (1829-32)
M. Elphinstone (Resident at Peshwa Court, later Governor of Bombay), History of India (1841)
Joseph Cunningham (brother of Gen.A.Cunningham) History of Sikhs (1849)
In Lahore Punjab, the Tat Khalsa Singh Sabha movement emerged from the neiferious designs of the Colonial parasites in 1879 & it began radically to alter the Sanatan philosophy of the Gurus as it had existed since Guru Nanak Devji, so to ensure it conformed to their new British Raj -accomodating perception.The leader of this movement was Max Arthur Macauliffe who helped establish a bunch of puppets known as the Singh Sabha scholars ( Teja Singh, Jodh Singh, Kahn Singh Nabha to name a few) to suit the whims of the British who ruled by creating divisions through tactics which included altering and editing Guru's scriptures & historical facts to divide and conquer and keep the native Indians subjugated, ignorant and subservient. All forms of Indian Nationalism and unifying aspects like religion were manipulated and suppressed.
Max Arthur Macauliffe, the British Deputy Commissioner of Punjab, saw an opportunity with the establishment of Sanatan Sikh Sabha and engineered the formation of a second Sabha, Tat Khalsa (the 'True Khalsa') Singh Sabha in Lahore in 1879, as a political rival to the Sanatan Sikh Sabha. Whereas the Sanatan Dharma Sikhism acknowledges its roots in the Vedic culture and believes in Hindu-Sikh unity; the Tat Khalsas are focused more on having a Sikh identity, separate from the non-Sikh Punjabis. So, the motive for the formation of this Tat Sabha were primarily to push Sikhs over to a pro-Muslim stance, put a wedge between the Sikhs and non-Sikh Punjabis thereby weakening the Hindus, and also to propagate the belief among the Sikh soldiers serving the Raj that their Guru’s prophecies coincided with the interests of the British Raj. It was a deliberate act in their “divide and rule” tactics and to get the Tat Khalsa Sikhs to be loyal to the British Raj.
Soon after their establishment, the Tat Khalsas with the institutional support of the Colonial missionaries & rulers, began throwing out the Jathedars from the management of the Gurudwaras; using force when needed. To promote a Sikh identity separate from the former glory of Hindu-Sikh days, a reform movement was initiated - older source material was suppressed, marginalized, denied, invalidated or even, as in case of Gurbilas, banned outright. Sikh scriptures were reinterpreted to expunge any hint of Hindu-ness in them. All Hindu frescos, paintings and murtis were removed from the Gurudwaras and all practices deemed to be Hindu were discontinued. Rumours were spread that the Jathedars were promoting rituals that were 'forbidden by the Gurus'. HariMandir ( Vishnu Temple) became to be known as Darbar Sahib, which is Arabic/Persian for 'The court of God'. In 1905, the murtis removed from HariMandir included lifesized murtis of Lord Vishnu, Chandi-Durga, Lord Krishna, Lord Shiva & of Guru Ram Das Sodhi. Gurubanis were highly mistranslated & Janamsakhis of Guru Nanak Devji were not spared either.
Most of the stories of the Gurus are now obvious copies of Bible & Kuranic stories & even though it is well known that the Gurus throughout their lives kept good company of eminent Brahmin sadhus, scholars & teachers to help them with the translations of sanskrit verses of the Vedas & Upanishads, a hint of anti Brahminism eventually had crept in. All Brahmin practises were being frowned upon by using the Gurus as those very people who were against the Janeu or the sacred thread as well as murti puja. There is a famous story where Guru Nanakji himself is mentioned as 'throwing' the sacred thread at the family Brahmin priest & rejecting the sacred thread altogether- again highly questionable since he himself was born into a Brahmin family. Most of whatever Guru Nanak Devji has been quoted to have said against Dharmic traditions, as per the re-interpretations of the Singh Sabha stooges, seem more like verses full of hatred, contempt & Hindu bashing for the very ancient traditions that the great saint had spent most of his life promoting. The Singh Sabha have spoken of NanakDevji as a Khatri, a farmer, a Jatt, sometimes a Vaishnava but have conveniently left out the fact that he was born into a Brahmin family & his name has also been twisted around with the last name Bedi attached to it. The present so called history & twisting of the Shri Adi Granth is full of contradictions throughout - an open case of fraud perpetrated upon us the Sikhs of Punjab.
The British further instigated & fanned more fire by adding their own conclusions & opinions:
The Religion of the Sikhs(London, 1914), p. 19: Granthstrongly suggests that Sikhism should be regarded as a new and separate world-religion, rather than as a reformed sect of the Hindus.
To quote Dorothy Field, the author of History of Sikhs:
'There is a tendency at the present day to reckon the Sikhs as a reformed sect of the Hindus; and this has become a matter for controversy among the Indians themselves. The word Hinduism is undoubtedly capable of a very wide application, but it is questionable whether it should be held to include the Sikhs in view of the fact that the pure teachings of the Gurus assumed a critical attitude towards the three cardinal pillars of Hinduism, the priesthood, the caste system, and the Vedas. A reading of the Granth strongly suggests that Sikhism should be regarded as a new and separate world-religion, rather than as a reformed sect of the Hindus'.
Teja Singh Bhasauria was an employee of the British Government. He was given a school and funding to finance both the school and a printing press by the British. He intended to change Gurbani as directed to him by his British masters and his own ideas that were against the Brahmins & Hindu Dharma or any association of Hinduism in Gurbani. This has been recorded in history both by Prof Sahib Singh, and by the fact that a Hukamnama ex-communicated him from the Akal Takht. One of his associates Giani Kartar Singh Kalaswalia was the head Granthi of Sri Harimandir Sahib. It was during his term of seva that the Chaupai and Dohira were removed. Teja Singh's son Ran Singh, wrote Dasam Granth Nirney in 1919, in which he claims that another Bani starts after the 25th pauri - Dustt dokh tay layho bachaaee. This is untrue. This is the first reference to the short Chaupai Sahib. Before this time there has not been discovered any reference of anything but the full Chaupai Sahib.
Ancient Hindu martial aspects of Sanatan Sikhism have become mostly symbolic in modern times. The overall goal was to make Sanatan Hindu Sikhism as a strictly Bhakti (devotional) religion instead of the Shakti/Bhakti (power/devotion) balance which it always had. With the Bir Ras (warrior spirit) Banis compromised, the Sikh identity disappearing, and martial aspects becoming purely symbolic the British had their way to control Sikhism. Then it was a matter of bribery, intimidation and manipulation of Sikh leaders to create a new 'modern Sikhism'
Over the last few decades, Sanatan Sikhism has become a cult of the 'Book' like that of Islam & Christianity & Sikh youth have become brainwashed & indoctrinated into the Tat Khalsa mold. With over 3000 websites on the internet, all dedicated to & preaching the Singh Sabha version of a 'new' religion known as Sikhism, there has been a steady Talibanisation of the Sanatan heritage of Sikhism. Rife with anti Brahminism & articles demeaning Hindu Dharma, the message of most of these websites is that Sikhs are not Hindus & the Gurus preached as prophets a new religion which was devoid of any varna (caste) system, rituals etc, ignoring the fact that we Sikhs are very much divided into our respective castes just as the Gurus had been during their times.
As for rituals, the neo-Sikhs have overlooked the fact that despite their efforts to point fingers at various ones practised by Hindus, Sikhs still practise similar ones such as bathing in Amritsarovar just as any Hindu would in the sacred Ganga. Symbolism too which is part of Hindu Dharma is still being practised by worshipping the Khanda, an ancient array of weapons sacred to the Hindus also, along with the similar style of Kesari jhanda, found on top of all Hindu temples. Worshiping of the Book Shri Adi Granth as an object, clothing it & placing it on one's head when taking it inside another room so to put it to sleep - all this is murti puja in its various form - again this is part of Hindu Dharma. The Tilak [mark on forehead] is also frowned upon but if we take a closer look at the original paintings before the time of the Singh Sabha British puppets, we see historic portraits of Nanak Devji with sandlewood and kum kum Tilaks on his forehead, at the same time with Rudraksha mala around his neck, looking very much a Hindu in the exact manner that he was, but newer paintings of him generated by the Singh Sabhias, portray him similar to those of Muslim sufi saints & those Arabs from the Bible stories of Jesus.
It is truly disheartening to see where we Sikhs are actually headed by this intense brainwashing & manipulation,Tat Khalsa style, whose intentions it seems are not that Pure in the first place. At this rate, we will not have any ancient history nor any heritage left, unless we stand up & expose the fraud that we have been forcefully succumbed to during the last century.
Famous words of Master Tara Singh:“Protection of Dharma is our Dharma. Khalsa Panth was born for that purpose. Never have I left Hinduism. Guru Govind Singh has produced a lot of Gurumukhi literature based on Vedas, Puranas and the like. Are we to leave all that? In fact Hindus and Sikhs are not two separate communities. Name is Sikh and beard… Mona (non beard) Sikh and Sevak… That is all… Sikhs live if Hinduism exists. If Sikhs live Hinduism lives. They are not two separate communities. They are one indeed. Lack of mutual confidence has been a small problem. This situation must be put to an end. I want to see that. A Hindu revival movement is very necessary and it will certainly come up.”
|
Comparison of immunosuppressive properties of hydatidiform mole decidua and trophoblast extracts.
The immunologic privilege afforded the fetus relies upon immunoregulation within the maternal-fetal interface. Trophoblast and decidua-derived immunoregulatory factors enforce this privilege by locally suppressing maternal responses to trophoblast antigens. The relative contribution of trophoblast or decidua immunosuppressive factors to pregnancy immunotolerance are not well characterized. The purpose of this study was to compare the suppressive effects of hydatidiform mole trophoblast and decidua extracts on interleukin-2-dependent proliferation. Tissue extracts were prepared from hydatidiform mole trophoblast and decidua following uterine evacuation. Samples were submitted to interleukin-2-dependent and -independent cell proliferation assays. Hydatidiform mole trophoblast extract significantly (P < 0.05) suppressed interleukin-2-dependent proliferation but did not affect interleukin-2-dependent cell proliferation. In contrast, molar decidua extract suppressed both cell lines. Human hydatidiform mole trophoblast contains factor(s) that specifically abrogate interleukin-2-dependent clonal expansion of murine cytotoxic T-cells. In contrast, extracts of molar decidua suppressed both interleukin-2-dependent and -independent responses. This indicates that the trophoblast antagonizes critical interleukin-2-mediated immunologic responses, but that the decidua uses nonspecific antiproliferative mechanisms for immunoregulation. |
package com.babylonhx.postprocess.renderpipeline;
/**
* ...
* @author Krtolica Vujadin
*/
@:expose('BABYLON.PostProcessRenderPipelineManager') class PostProcessRenderPipelineManager {
private var _renderPipelines:Map<String, PostProcessRenderPipeline>;
public function new() {
this._renderPipelines = new Map();
}
public function addPipeline(renderPipeline:PostProcessRenderPipeline) {
this._renderPipelines[renderPipeline._name] = renderPipeline;
}
public function attachCamerasToRenderPipeline(renderPipelineName:String, cameras:Dynamic, unique:Bool = false) {
var renderPipeline:PostProcessRenderPipeline = this._renderPipelines[renderPipelineName];
if (renderPipeline == null) {
return;
}
renderPipeline._attachCameras(cameras, unique);
}
public function detachCamerasFromRenderPipeline(renderPipelineName:String, cameras:Dynamic) {
var renderPipeline:PostProcessRenderPipeline = this._renderPipelines[renderPipelineName];
if (renderPipeline == null) {
return;
}
renderPipeline._detachCameras(cameras);
}
public function enableEffectInPipeline(renderPipelineName:String, renderEffectName:String, cameras:Dynamic) {
var renderPipeline:PostProcessRenderPipeline = this._renderPipelines[renderPipelineName];
if (renderPipeline == null) {
return;
}
renderPipeline._enableEffect(renderEffectName, cameras);
}
public function disableEffectInPipeline(renderPipelineName:String, renderEffectName:String, cameras:Dynamic) {
var renderPipeline:PostProcessRenderPipeline = this._renderPipelines[renderPipelineName];
if (renderPipeline == null) {
return;
}
renderPipeline._disableEffect(renderEffectName, cameras);
}
public function update() {
for (renderPipelineName in this._renderPipelines.keys()) {
if (this._renderPipelines[renderPipelineName] != null) {
var pipeline = this._renderPipelines[renderPipelineName];
if (!pipeline.isSupported) {
pipeline.dispose();
this._renderPipelines[renderPipelineName] = null;
}
else {
pipeline._update();
}
}
}
}
public function _rebuild() {
for (renderPipelineName in this._renderPipelines.keys()) {
if (this._renderPipelines[renderPipelineName] != null) {
var pipeline = this._renderPipelines[renderPipelineName];
pipeline._rebuild();
}
}
}
public function dispose() {
for (renderPipelineName in this._renderPipelines.keys()) {
if (this._renderPipelines[renderPipelineName] != null) {
var pipeline = this._renderPipelines[renderPipelineName];
pipeline.dispose();
}
}
}
}
|
[Perforating plantar ulcers in alcoholic polyneuritis. Physiopathology; clinical and instrumental findings].
Notes on the anatomical and physiological features of the circulation are followed by a description of the main physiopathological aspects of the terminal circulation of the lower extremities. Reference is made to the pathogenesis and clinical and instrumental diagnosis of plantar ulcers in alcoholic polyneuritis, along with the symtoms constantly observed in a series of some 30 cases. |
Toxicological analysis points to a lower tolerable daily intake of melamine in food.
Intensified food safety concern over melamine has prompted national authorities to assess its tolerable daily intake (TDI) for protection of general population including young children. TDI is calculated by dividing a no-observed-adverse-effect level (NOAEL) by a safety factor (SF). Based on appropriate choices of values, the US Food and Drug Administration determined two TDI values in the unit of mg per kg body weight per day as first 0.63 and then 0.063, while the World Health Organization, 0.5 and then 0.2, as a result of increasing the SF values in calculation. We used a similar procedure, with judicious selection of pertinent values, to obtain a TDI of 0.0081. Arguments in support of this lower TDI value were provided to alert the international community. |
Matthias Gross
Matthias Gross (German spelling: Groß, pronounced , ; born 1969) is a German sociologist and science studies scholar. He currently is Full Professor of Environmental Sociology at the University of Jena, and by joint appointment, at Helmholtz Centre for Environmental Research – UFZ in Leipzig, Germany.
Gross received a PhD in sociology from Bielefeld University in 2001. Between 2002 and 2005 he co-directed the research group “Real World Experiments” at the Institute of Science and Technology Studies at Bielefeld University and from 2005 to 2013 he was senior research scientist at the Helmholtz Centre in Leipzig. He held research positions and visiting professorships at the University of Wisconsin, Madison, Loyola University Chicago, and the Martin Luther University of Halle, Germany. He is co-editor of the interdisciplinary journal Nature + Culture. Between 2006 and 2018 he was Chair of the German Sociological Association's Section on Environmental sociology and from 2011 to 2019 he was Chair of the European Sociological Association's Research Network on Environment and Society. In 2013 he has won the Sage Prize for Innovation and Excellence from the British Sociological Association for his paper on Georg Simmel and nonknowledge and in 2018 the Frederick H. Buttel Prize of the International Sociological Association (ISA)
Selected books
References
External links
Personal Homepage at the University of Jena
Homepage at Helmholtz Centre for Environmental Research in Leipzig
Sociology of Ignorance Website
Category:1969 births
Category:Living people
Category:German sociologists
Category:University of Jena faculty
Category:Environmental sociologists
Category:Academic journal editors
Category:German male writers
Category:Sociologists of science |
Techniques for permitting secure access to computing resources have limits. For example, when users seek access to secured computers, or secure applications or data accessible via a computing resource, the users may be prompted for authentication, authorization, or some other type of verification before access is permitted. While these techniques are designed to verify access to secure computing resources at the beginning of a session, they are powerless to detect improper access or wrongful activity during a session, much less control such behavior.
Improper access to an otherwise authorized computing session may occur in numerous ways. For example, after a user logs in to their computer in their office, they may leave the office for a period of time before returning. If the computing session is open while the user leaves, it is vulnerable to a malicious individual improperly using the session while the user is gone. As another illustration, while a user is accessing a secure application or data in a public area, such as a coffee shop or airport, they may temporarily step away from their computer to use the restroom, pay a cashier, or talk with another person. In that situation, a malicious individual may potentially view or utilize the secure application or data. A further situation may involve a user's computer being stolen while logged into a secure session. The thief may potentially be able to use the secure session while the session is ongoing. Ultimately, in these scenarios and many others, sensitive or privileged access to computing resources may be limited initially, but not while a session is ongoing.
One attempt to address these problems may include installing a dedicated software agent on the user's computer. According to such a technique, the dedicated agent may detect when the user is no longer physically present, or may detect a period of inactivity, and may consequently lock the computer screen. One significant technical deficiency in this approach is that it requires the user to download and use the dedicated software agent. Because the dedicated agent is separate software from the software being used by the user which is to be secured, issues of compatibility and integration may exist. Further, this type of technique is significantly limited in its capabilities. This technique simply detects inactivity over time, but not other forms of insecure actions, behavior, or situations. For example, this technique generally cannot detect when a malicious user begins to access a computing device soon after the authorized user has left the computing device. Because no period of inactivity over a threshold amount of time would be detected, this technique would detect no threat or vulnerability. Thus, even if the user's computer is stolen and used by a malicious individual, this type of technique would detect no problem.
Another attempted approach may involve monitoring actual network traffic exchanged between an endpoint computing device and a remote computer or application. While this technique may allow for continuous evaluation of a user's session, it is high-overhead in terms of bandwidth, latency, processing, and storage. These problems are exacerbated when implementations scale up to involve many users or machines being monitored. Further, this approach gives rise to serious privacy concerns, both for end users and for the computers or applications they are communicating with. These privacy problems, together with the inefficiencies of this approach, make it unsuitable in most if not all implementations.
Accordingly, in view of these and other deficiencies in existing techniques for controlling access to secure network resources, technological solutions are needed for automatically and transparently detecting potential compromises or unauthorized use of endpoint computing devices or sensitive data. Solutions should advantageously be agentless and transparent from the perspective of an endpoint computing device and the user who uses the endpoint computing device. That is, no dedicated software agent should be required to be installed on the endpoint machine. While the user's session with the endpoint machine is ongoing, the techniques for detecting potential compromises or unauthorized use should in some embodiments be hidden or transparent to the user. The technical effectiveness of such solutions would also be improved by allowing various types of compromises or unauthorized use to be detected. Further, additional technical improvements would result from allowing multiple different types of control actions to be implemented (e.g., terminating a session, freezing a session, requiring re-authentication, generating an alert, recording a session, making a session read-only, etc.) when compromises or unauthorized use are detected. Additional technical advantages may arise from embodiments where the control or management session running on the endpoint device integrates code (e.g., Java™, HTML, Python, etc.), into the user's session (e.g., into the HTML-based, Java™-based, or other type of web-based document). In this manner, the code may instruct the user's session to perform one or more of the above control actions when the control or management session is lost. Thus, even if a malicious user unplugs the network connection (e.g., CAT-5, etc.) to the endpoint device or disables its wireless adapter card, a control action may still be implemented in that situation. Namely, the inserted code may instruct the endpoint computing device to perform the control action, even after a network connection is lost. These and other technological improvements over current secure access techniques are discussed below. |
My #abs will start to disappear soon, No flexing still got some abs. 😄❤️ going to #7weeks My Pregnancy has been good to me; no morning sickness, no dizziness, no throwing up, I don’t get too hungry, not a lot of cravings. I actually don’t feel pregnant 😂 still hard to believe (I only get sleepy more than usual) 🤣 ❤️ #fitmommy #gym #workout #dedication #babyontheway #OctoberBaby |
Warren Parrish
Warren F. Parrish (also Warren Parish) (January 10, 1803 – January 3, 1877) was a leader in the early Latter Day Saint movement. Parrish held a number of positions of responsibility, including that of scribe to church president Joseph Smith. Parrish and other leaders became disillusioned with Smith after the failure of the Kirtland Safety Society and left the Church of Jesus Christ of Latter Day Saints. Parrish remained in Kirtland, Ohio, with other disaffected former church leaders and formed a short-lived church which they called the Church of Christ, after the original name of the church organized by Smith. This church disintegrated as the result of disagreement between church leaders, and Parrish later left Kirtland and became a Baptist minister.
Activity in Latter Day Saint church
Baptism by Brigham Young
Parrish married Elizabeth Patten, the sister of David W. Patten, one of the original Latter Day Saint apostles. Patten records that on "May 20, 1833, brother Brigham Young came to Theresa, Indian River Falls, where I had been bearing testimony to my relatives; and after preaching several discourses, he baptized my brothers Archibald and Ira Patten, Warren Parrish, Cheeseman and my mother and my sister, Polly."
Mission to Missouri
In September 1834, Parrish and Patten traveled throughout upper Missouri together "to preach the Gospel." Patten reports that "we baptized twenty, during which time several instances of the healing power of God were made manifest."
Participation in Zion's Camp
In 1834, Joseph Smith said he received a revelation from God, calling for a militia to be raised in Kirtland which would then march to Missouri and "redeem Zion." Parrish volunteered to join a group of about 200 men to form the militia, which became known as "Zion's Camp."
In 1835, Parrish joined the leadership of the church as a member of the First Quorum of Seventy.
Attempts at translation
Joseph Smith recorded in his journal that Parrish had been promised the ability to "know of hidden things" and be "endowed with a knowledge of hidden languages." During the fall of 1835, Parrish, along with Oliver Cowdery, William W. Phelps and Frederick G. Williams, attempted unsuccessfully to make translations of characters from the Book of Abraham papyrii by matching them with English sentences that Smith had already produced. Parrish and Phelps eventually produced a set of documents called the "Grammar & A[l]phabet of the Egyptian Language."
Preaching in Tennessee
In May 1836, Parrish traveled from Kirtland to Tennessee to join Patten and Wilford Woodruff. According to Woodruff, they traveled through Kentucky and Tennessee "preaching the word of God, healing the sick, and the Spirit of God was with us and attended our ministrations." During this time, Parrish, Woodruff and Patten were arrested by a local sheriff at the urging of Matthew Williams, a Methodist minister, who claimed that they were making false prophecies. The group was accused of preaching "that Christ would come the second time before this generation passed away" and that "four individuals should received the Holy Ghost within twenty-four hours." A mock trial was held in which they were not allowed to speak, at the end of which they were pronounced guilty. They were later released unharmed on the condition that they pay court costs and leave the area within ten days.
Scribe to Joseph Smith
Parrish was scribe and secretary to church founder and president Joseph Smith, primarily in Kirtland, Ohio, from 1835 to 1837.
Dissent and conflict with Smith
Failure of the Kirtland Safety Society
In 1836, Joseph Smith organized the Kirtland Safety Society Antibanking Company, a joint-stock company with note issuing powers. Parrish later became the company's treasurer. Smith encouraged church members to invest in the Kirtland Safety Society. By 1837, the "bank" had failed, partly as the result of Parrish and other bank officers stealing funds. As a result of Parrish's role in this, he was excommunicated from the church. From this time forward, Parrish sought to destroy Joseph Smith and the church, and as a result Smith was forced to leave Kirtland. Soon after Smith and Sidney Rigdon left on July 26, 1837 a crisis formed within the church at Kirtland during their absence.
Armed confrontation in the Kirtland Temple
In addition to Parrish, the failure of the bank caused a major rift among some other church leaders as well, who concluded that Smith could not be a true prophet if he could not foresee that the "bank" would be unsuccessful.
Parrish and those supporting him soon claimed ownership of the Kirtland Temple. Eliza R. Snow relates that Parrish and a group of others came into the temple during Sunday services "armed with pistols and bowie-knives and seated themselves together in the Aaronic pulpits, on the east end of the temple, while father Smith [Joseph Smith, Sr.] and others, as usual, occupied those of the Melchizedek priesthood on the west." Parrish's group interrupted the services and, according to Snow "a fearful scene ensued—the apostate speaker becoming so clamorous that Father Smith called for the police to take that man out of the house, when Parrish, John Boynton, and others, drew their pistols and bowie-knives, and rushed down from the stand into the congregation; John Boynton saying he would blow out the brains of the first man who dared to lay hands on him." Police arrived and ejected the troublemakers, after which the services continued.
Public statements
Parrish wrote letters to several newspapers expressing his anger with church leaders, referring to them as "infidels." In one such letter, Parrish claims that "Martin Harris, one of the subscribing witnesses; has come out at last, and says he never saw the plates, from which the book purports to have been translated, except in vision; and he further says that any man who says he has seen them in any other way is a liar, Joseph not excepted; – see new edition, Book of Covenants, page 170, which agrees with Harris's testimony." Wilford Woodruff recorded his reaction to some of Parrish's writings in his journal entry of April 4, 1838, stating that they were "full of slander and falsehoods against Joseph Smith Jr."
Parrish's Church of Christ
Parrish eventually led a group of dissenters that formed a new church based in Kirtland, which they called the Church of Christ, after the original name of the church organized by Joseph Smith. George A. Smith wrote that the group intended "to renounce the Book of Mormon and Joseph Smith, and take the 'Mormon' doctrines to overthrow all the religions in the world, and unite all the Christian churches in one general band, and they to be its great leaders." Among those who associated themselves with this church was Martin Harris. Parrish's group believed that Joseph Smith had become a fallen prophet. By the beginning of 1838, Parrish's church had taken control of the Kirtland Temple as Smith and those loyal to him left Kirtland to gather in Far West, Missouri.
A debate arose among Parrish's group regarding the validity of the Book of Mormon and the existing revelations, with Parrish, John F. Boynton, Luke S. Johnson, and several others claiming that it was all nonsense. George A. Smith reported: "One of them told me that Moses was a rascal and the Prophets were tyrants, and that Jesus Christ was a despot, Paul a base liar and all religion a fudge. And Parrish said he agreed with him in principle." This resulted in a permanent division between Parrish's supporters and other leaders, including Martin Harris, who cautioned them not to reject the book. Cyrus Smalling, Joseph Coe and several others "declared [Harris's] testimony was true." Parrish's church dissolved soon after this division.
Later life
After the dissolution of his church, Parrish left Kirtland altogether. In 1844, Parrish was working as a Baptist minister for a salary of $500 per year. In 1850 Parrish was living in Mendon, New York, where he was listed as a "clergyman" by the census. By 1870, he had apparently lost his sanity and was living in Emporia, Kansas, where he died in 1877.
Notes
References
.
.
.
.
.
.
.
.
.
.
.
.
External links
Grampa Bill's General Authority Pages
Warren Parrish (1803–1877)
Category:1803 births
Category:1877 deaths
Category:Former Latter Day Saints
Category:Converts to Mormonism
Category:American Latter Day Saint leaders
Category:American Latter Day Saint missionaries
Category:Baptist ministers from the United States
Category:People excommunicated by the Church of Christ (Latter Day Saints)
Category:People from Mendon, New York
Category:Doctrine and Covenants people
Category:Latter Day Saint missionaries in the United States
Category:Baptists from New York (state) |
Q:
NodeJS: Breaking a large amount of synchronous tasks into async tasks
I am processing large amounts of jobs and then writing them into the database. The workflow is that:
Read about 100 MB of data into buffer
Loop through the data and then process (sync work) and write to disk (async work)
The problem I am having is that, it will finish looping through all 100 MB of data and in the meantime queue up all the writing to disk behind the event loop. So, it will first iterate through all the data, and then run the async job.
I would like to break the synchronous task of iterating through the array so that each iteration gets queued as behind the event loop.
var lotsOfWorkToBeDone = ['tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job']
while (true) {
var job = lotsOfWorkToBeDone.pop()
if (!job) {
break
}
var syncResult = syncWork(job)
asyncWork(syncResult)
}
function syncWork(job) {
console.log('sync work:', job)
return 'Sync Result of ' + job
};
function asyncWork(syncResult) {
setTimeout(function() {
console.log('async work: ', syncResult)
}, 0)
}
// Desire Outcome
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// Actual Outcome
// sync work: tens of thousands of job
// sync work: tens of thousands of job
// sync work: tens of thousands of job
// sync work: tens of thousands of job
// sync work: tens of thousands of job
// sync work: tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// async work: Sync Result of tens of thousands of job
// async work: Sync Result of tens of thousands of job
// async work: Sync Result of tens of thousands of job
// async work: Sync Result of tens of thousands of job
// async work: Sync Result of tens of thousands of job
// async work: Sync Result of tens of thousands of job
Note: The example is simplified version of reality. I don't have an array that I can iterate through. And I have a big buffer and I process until EOF (therefore, the while loop)
A:
Using async.whilst seems to achieve the desired outcome.
I won't accept my own answer for now as I am interested in what comments people would like to make on this solution. There may be a better solution
var async = require('async')
var lotsOfWorkToBeDone = ['tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job', 'tens of thousands of job']
var job;
async.whilst(function() {
job = lotsOfWorkToBeDone.pop()
return job
}, function(callback) {
var syncResult = syncWork(job)
asyncWork(syncResult, callback)
}, function(err) {
console.log('error: ', err)
})
function syncWork(job) {
console.log('sync work:', job)
return 'Sync Result of ' + job
};
function asyncWork(syncResult, callback) {
setTimeout(function() {
console.log('async work: ', syncResult)
callback()
}, 0)
}
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
// sync work: tens of thousands of job
// async work: Sync Result of tens of thousands of job
|
I'm looking for the original wheels & gold weiman crankset for the Raleigh Record Sprint, I've had a few absurd offers nearing £100 just for these two part so, to be clear, my budget is £40 for the wheels and £20 for the crank. If anyone is amenable to this price please let me know!
Who is online
Users browsing this forum: No registered users and 7 guests
You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum |
The antireflux ureteroileal reimplantation in children and adults.
We report on 6 patients with 11 ureters who underwent antireflux ureteroileal reimplantation as part of various reconstructive procedures. A success rate of 82 per cent (9 ureters) was obtained. Our preliminary report shows that the ureteroileal reimplantation represents a satisfactory alternative for urinary diversion and undiversion or a vesical augmentation procedure with the small bowel. |
Ex-Premier League referee admits to booking a player who asked to be carded!
Former Premier League referee Mark Halsey says he’s experienced players asking to be booked — and he’s obliged in a chat on CNN.
Halsey recalls a Premier League game from 2011 when a player approached him quite literally asking for a yellow card.
“He’s just said ‘listen, look, we’ve got a game Tuesday. If I don’t get cautioned now and get one Tuesday, I’ll miss the big derby on the Saturday,” Halsey told CNN.
“So he just asked me if I could show a yellow. And I did actually.
“I said to him, ‘Alright, we’ve got 10 minutes to go, when I give a free-kick against you’ — and I knew I would because he’s that sort of player — ‘just leather the ball 50 yards away and I can caution you for dissent.’ |
Q:
How to extract 'numbers in word form' from a string
Has anyone any idea where to start?
For example, extract "two" from "I have two apples".
I'm looking in the direction of NLP or QDA. Any leads for how to go about it would be appreciated.
A:
You might be interested in Stanford NER system.
It identifies numeric entities.
You can try it here: http://nlp.stanford.edu:8080/corenlp/
|
The evolutionary maintenance of same-sex sexual behaviour (SSB) has received increasing attention because it is perceived to be an evolutionary paradox. The genetic basis of SSB is almost wholly unknown in non-human animals, though this is key to understanding its persistence. Recent theoretical work has yielded broadly applicable predictions centred on two genetic models for SSB: overdominance and sexual antagonism. Using Drosophila melanogaster , we assayed natural genetic variation for male SSB and empirically tested predictions about the mode of inheritance and fitness consequences of alleles influencing its expression. We screened 50 inbred lines derived from a wild population for male–male courtship and copulation behaviour, and examined crosses between the lines for evidence of overdominance and antagonistic fecundity selection. Consistent variation among lines revealed heritable genetic variation for SSB, but the nature of the genetic variation was complex. Phenotypic and fitness variation was consistent with expectations under overdominance, although predictions of the sexual antagonism model were also supported. We found an unexpected and strong paternal effect on the expression of SSB, suggesting possible Y-linkage of the trait. Our results inform evolutionary genetic mechanisms that might maintain low but persistently observed levels of male SSB in D. melanogaster , but highlight a need for broader taxonomic representation in studies of its evolutionary causes.
1. Introduction
Studies of same-sex sexual behaviour (SSB) have focused on a diverse range of animal taxa, from deep sea squid to insects [1–6]. The core of such research hinges on the assumption that SSB imposes a direct fitness cost on individuals that express it, and therefore represents an ‘evolutionary paradox’ demanding explanation (e.g. [7–10]). However, SSB is no different from any other trait that might appear inexplicably costly when benefits are not immediately obvious. Historically, similar traits have included aggression, altruism and sexual ornamentation [11].
Characterizing the genetic basis of SSB in a broad range of species is critical to better understanding its evolutionary persistence, but biologists studying non-human animals are hampered by a lack of empirical genetic data. We are aware of only a pair of artificial selection experiments using the flour beetle Tribolium castaneum [12,13], a report of intersexual correlation for SSB in the seed beetle Callosobruchus maculatus [14], plus a number of candidate gene studies in Drosophila melanogaster that document male–male courtship as an incidental effect of mutations affecting sex recognition (see [3] or [6] for reviews). The latter have elegantly illuminated proximate neurogenetic mechanisms that influence the expression of SSB in Drosophila, but they have limited power to explain the evolutionary forces that shape this complex, quantitative trait in natural populations [15]. The deficit of genetic data on SSB in non-human animals is compounded by the limited number of theoretical studies that quantitatively model its genetic basis (reviewed in [4]; see also [16–20]).
Theoretical work by Gavrilets & Rice [16] formulated explicit predictions to detect modes of selection maintaining SSB. Their models focus on two genetic hypotheses for SSB—overdominance and sexual antagonism—that have garnered recent attention in the literature, though their conceptual origins date back to the 1950s or earlier [4,16,21]. The Gavrilets & Rice [16] models are formulated in the context of human sexual orientation, but they are applicable to SSB in any diploid dioecious organism. Under overdominance, costly SSB could be maintained in a population if alleles that increase an individual's tendency to exhibit SSB in the homozygous state confer a balancing fitness advantage when expressed in heterozygotes. By contrast, sexual antagonism could maintain costly SSB if alleles increasing its expression in one sex cause a countervailing fitness advantage when expressed in the opposite sex. The hypotheses are not mutually exclusive, and they yield predictions about the inheritance and fitness effects of alleles influencing SSB (table 1).
Table 1.Predictions for overdominance and sexual antagonism models of SSB (adapted from [16]) evaluated in this study. Collapse predictionsa traits overdominance sexual antagonism chromosomes autosomal inheritance strong X-linkage dominance dominance effects no dominance effects fecundity heterozygote fitness advantage male SSB correlated with female fitness sex ratio no sex ratio bias male SSB correlated with female-biased sex ratio
Here, we empirically test predictions outlined by Gavrilets & Rice [16]. We used the Drosophila Genetic Reference Panel (DGRP) [22], which consists of inbred D. melanogaster lines originally derived from the wild. Male–male courtship in D. melanogaster is well documented, it occurs in wild-type flies at low but persistent levels, and SSB phenotyping protocols have been developed and validated [23,24]. SSB in insects is often thought to be caused by poor sex recognition [6,25,26]. In D. melanogaster, flies express sex-specific cuticular hydrocarbons (CHCs), and wild-type flies can detect and differentiate these cues [27]. We designed our study to minimize misidentification that can occur when young adult flies have not yet developed sex-specific CHC profiles, because we were interested in SSB that occurs despite the presence of cues for sexual identity [28].
First, we screened inbred lines to establish the existence of genetic variation for SSB. Second, we identified and validated lines showing consistently high levels of SSB (‘high-SSB’) and lines showing consistently low levels of SSB (‘low-SSB’) for use in crosses. Third, we performed experimental crosses using these high and low lines to test predictions about parental contributions to offspring SSB and levels of dominance. Finally, we estimated female fecundity, an important fitness component, from the crosses to test predictions about the fitness of different genotypic combinations under each model. Our results reveal inheritance patterns and fitness effects that provide mixed support for both models, but in aggregate are most consistent with overdominance. We also uncovered an unexpected paternal effect on the expression of SSB.
2. Material and methods
(a) Origin and maintenance of fly lines
We used 50 inbred lines from the DGRP as focal test flies in SSB assays. The DGRP was derived from a wild population in Raleigh, NC, USA. Lines were subjected to a minimum of 20 generations of full-sib mating and have an estimated inbreeding coefficient of F = 0.986 [22], although this is now likely to be an underestimate owing to their maintenance in laboratory culture for additional generations after 2012. It is likely that rare allelic variants were lost during the production of the inbred lines, limiting the power to detect small-effect loci in association studies [29]. However, this means that any phenotypic differences we found in our screen represent a conservative assessment of genetic variation for male SSB. Establishing which lines show consistent variation in male SSB enabled us to then perform crosses and evaluate modes of inheritance and fitness effects.
We used an additional D. melanogaster strain carrying a yellow-body mutation on a wild-type background, Hmr2, as a consistent genotype against which to test DGRP individuals in paired trials. The yellow-body strain was used so that each fly within a vial could be distinguished and assigned specific behaviours. Hmr2 flies originated from the Bloomington Stock Center (FlyBase ID: FBal0144848) [30]. The yellow-body mutation could conceivably exert pleiotropic effects on behavioural traits [31], although prior work suggests this is not likely to have a strong effect in our trials [24]. Furthermore, we avoided confounding our experimental design by always pairing focal DGRP flies with the Hmr2 strain.
Stock flies were kept in large vials (25 × 95 mm) on cornmeal agar medium seeded with yeast. They were maintained at 18°C on a 12 L : 12 D photoperiod. During experiments, virgin males were collected under light CO 2 anaesthesia from stock vials, whereupon they were transferred individually to small vials (16 × 95 mm) and allowed to recover. Experimental flies were kept at 23°C until they were used in assays. We were specifically interested in situations where the sex of interacting partners was unambiguous and readily detectable, so we only used virgin yellow-body males 3–5 days old and virgin DGRP males 6–8 days old in SSB trials.
(b) Initial same-sex sexual behaviour screen and validation
Some of the data below have been reported in a previous study focusing on indirect genetic effects on male tapping behaviour in yellow-body flies [32]. These data are the tapping behaviour of yellow males, and orienting, following, tapping, licking, singing, abdomen curling and general activity of DGRP males, for both the initial screen and validation (Dryad doi:10.5061/dryad.d4s1k). Here, we focus on variation in same-sex courtship elements exhibited by DGRP males while interacting with yellow-body partners in paired trials. We focused on male SSB only. Female sexual behaviour in D. melanogaster is generally assessed in the context of mate rejection, and while females will partly determine the outcome of any male mating attempt, quantifying female courtship is problematic owing to the lack of observable active courtship elements such as can be readily scored in males [33]. We used the behavioural assay described by Bailey et al. [24] to quantify male SSB. All DGRP lines were screened against the common strain to enable comparison among the inbred lines. We quantified three male courtship behaviours that characterize same-sex sexual interactions: licking, singing and abdomen curling (i.e. attempted mounting). We also scored orienting, following and tapping behaviours, but restrict our focus here to licking, singing and abdomen curling. These behaviours are unambiguously expressed during the context of opposite-sex courtship and copulation interactions, whereas orienting, following and tapping are known to function in non-sexual contexts such as aggression [34,35]. Detailed descriptions and links to videos of exemplar behaviours can be found in Bailey et al. [24].
We recorded behaviours exhibited by both the focal DGRP male and his interacting yellow partner using an interval sampling technique [24,32]. One DGRP male and one Hmr2 male were introduced into a small (16 × 95 mm) vial oriented horizontally, and behaviour was observed for 3 min spread over three evenly spaced 1 min observation periods. Five trials were run simultaneously under fluorescent interior lighting and indirect sunlight between 19.4°C and 24.9°C during morning hours. We performed 39 or 40 trials for each DGRP line. Five trials were excluded from analysis after it was discovered they were performed at too low a temperature (17.1–17.2°C); their exclusion did not qualitatively affect the results.
To validate our behavioural assay, we repeated the above procedure on a subset of eight DGRP lines, with the observer blind to line identity. We selected three validation lines that exhibited high levels of SSB in the initial assay, and four that exhibited low levels of SSB. One intermediate line (RAL_897) was selected as it showed an unusual pattern of reaction norm variation in a different experiment (N.W.B. 2015 unpublished data). The selection was made only with respect to the behaviours involved in SSB: licking, singing and abdomen curling. Maintenance, rearing and behavioural observations (n = 40 per line) were performed as before.
We quantified SSB in each trial using a binary assessment of whether licking, singing or abdomen curling occurred. If any of those behaviours were exhibited by a male during the 3 min trial period, then he received an SSB score of 1. We calculated line mean trait values as the proportion of trials in which the DGRP male exhibited SSB. There are advantages and disadvantages to using this system of quantifying behaviour [24]. Estimating the intensity of SSB within different lines (i.e. the number of bouts of SSB during trials) had the potential to create a bias owing to the proportionally heavier weighting of data from lines in which very few males exhibited the behaviour. Following analysis of the validation data, overall SSB line means for the eight retested lines were calculated by combining the original and validation data.
(c) Behaviour diallel
Our validation study indicated that SSB among lines could be consistently classified as ‘high-SSB’ or ‘low-SSB’. We selected two lines that exhibited high levels of SSB (RAL_149 and RAL_75) and two lines that exhibited low levels of SSB (RAL_223 and RAL_38) to perform a complete diallel cross. The identities of these lines remained blind to the observer throughout the diallel experiments. Maintenance and rearing procedures were as described above. The complete diallel included diagonal (intra-line) and off-diagonal (inter-line) crosses, including reciprocals. Each of the 16 crosses was established by housing 10 virgin males and 10 virgin females from the designated parental lines. Virgin male F 1 offspring from these crosses were collected and maintained individually in small (16 × 95 mm) vials as before. For each of the 16 crosses, we performed behavioural observations on F 1 males (n = 39–50 F 1 males per cross), using the same protocol with yellow-body males as a standard strain against which to quantify the expression of SSB.
(d) Fecundity diallel
We estimated a component of female fitness by measuring early fecundity of the F 1 diallel offspring. We set up F 2 crosses using the diallel F 1 offpsring as parents. Virgin male and female full sibs were mated, with 10 replicate full-sib matings set up for each of the 16 cross types. One-day-old virgin parents were kept in small vials (16 × 95 mm) for 2 days to enable mating and oviposition, whereupon they were transferred to a fresh vial for an additional 2 days and then removed. Once eclosion commenced, adults were counted and sexed daily until no new adults were observed to eclose. Total offspring numbers were calculated by pooling the counts across all collections for each cross replicate. Two blocks were run approximately two weeks apart to allow for uncontrolled environmental effects. While our estimate of fitness only captured early-life fecundity, early-life fitness appears to be genetically correlated with later-life fitness in D. melanogaster [36].
(e) Analysis
Statistical analyses focused on (i) the correspondence between original and validation SSB screens, (ii) inter-line variation in SSB, (iii) comparison of SSB levels in F 1 offspring from diallel crosses, and (iv) fecundity differences among the diallel crosses. Analyses were performed in Minitab v. 12.21 and SAS v. 9.3.
(i) We tested whether the subset of validated DGRP lines showed the same relative levels of male SSB in a blind validation block as they did in our original screen using a binary logistic regression with a logit link function. There were only two factor levels in ‘block’, preventing accurate covariance estimates if modelled as a random effect, so we modelled it as a fixed effect. The subsequent experiments required us to cross lines that displayed high levels of SSB with lines that displayed low SSB. Because we selected high- and low-SSB lines to validate, we tested whether the three high-SSB and four low-SSB lines yielded consistently high and low estimates of SSB across experimental blocks by including ‘SSB level’ and the ‘block × SSB level’ interaction as fixed effects. To account for variation arising from lines within ‘high-SSB’ and ‘low-SSB’, we nested ‘line’ within ‘SSB level’. Temperature was included as a covariate. As a secondary verification that our measurement of line means for SSB was consistent across blocks, we regressed line mean SSB from the validation block on line mean SSB from the original block for all eight retested lines.
(ii) Finding no evidence for experimental block effects, we assessed variation in SSB across all 50 lines, combining the original and validation data for those eight lines that had been retested. We used a mixed-model binary logistic regression in which ‘line’ was modelled as a random effect and temperature was included as a covariate. A logit link was used and degrees of freedom were estimated using the Satterthwaite method. We also estimated broad-sense heritability by calculating H2 = V g /V p . We obtained V g using variance components from a standard analysis of variance (ANOVA), where V g = (MS a − MS w )/[(1/a − 1)(ΣN i − Σ(N i 2)/ΣN i )], MS a is mean squares among groups, MS w is means squares within groups, a is the number of groups and N i is each group size. V p is the overall phenotypic variance.
(iii) SSB expression was compared among male F 1 offspring of our diallel crosses using a binary logistic regression and a logit link. The aim was to estimate the relative contributions of maternal versus paternal genotypes to the expression of SSB in offspring, so the model included ‘maternal line’, ‘paternal line’ and the ‘maternal × paternal’ interaction as fixed factors. Temperature was modelled as a covariate. Parental lines were not modelled as random effects for the same reasons given previously, and also because they had been selected for use in planned contrasts between ‘low-SSB’ and ‘high-SSB’ lines [37].
(iv) Fecundity and offspring sex ratio (daughters/total offspring) of the diallel families was assessed using general linear models (GLMs). Offspring sex ratio data were natural-log-transformed prior to analysis. The key comparison for testing our predictions was among offspring from the four types of inter-line crosses, but we first evaluated the difference between inbred crosses (diagonal of the diallel) and all outbred crosses (off-diagonals). We therefore modelled ‘inbreeding’ as a fixed effect with two factor levels. Experimental block and its interaction with ‘inbreeding’ were modelled as fixed effects. Because the same lines were used in multiple crosses, we included maternal and paternal line identity as fixed effects to assess the impact of ‘inbreeding’ above and beyond any line-specific effects. Including the interaction between maternal and paternal line identity was hindered by the fact that we lacked data from one cross in one of the experimental blocks due to failed matings, so it was not included.
Inbreeding was a major source of variation in fecundity, so we proceeded to examine fecundity of the inter-line crosses only. A post hoc GLM was performed on the same dataset excluding information from the inbred crosses. We tested for variation in fecundity among high–high, high–low, low–high and low–low inter-line crosses, modelled as ‘cross type’, and included the interaction between ‘cross type’ and ‘block’. The same model structures were applied to the natural log-transformed offspring sex ratio data. In both analyses, we excluded data from replicates for which three or fewer offspring collections could be made (n = 13).
3. Results
(a) Behavioural screen and validation
We performed 2320 behavioural trials. The interaction between ‘SSB level’ and ‘block’ in our validation analysis was a key indicator of how consistently we were able to quantify variation in SSB across blocks (figure 1). We found neither a significant ‘block’ effect (binary logistic regression: Wald , p = 0.310) nor a significant ‘block × SSB level’ interaction (binary logistic regression: Wald , p = 0.948), which provided confidence that our scoring technique reliably distinguished high-SSB and low-SSB lines across independent experiments. Line effects nested within each SSB level were similarly non-significant (binary logistic regression: Wald , p = 0.427). As expected, the ‘SSB level’ term in our model indicated that high-SSB and low-SSB lines differed significantly (binary logistic regression: Wald , p = 0.0016). Temperature did not affect the expression of SSB (binary logistic regression: Wald , p = 0.415). We confirmed the overall consistency of SSB measurements in a follow-up regression comparing all eight line means in the original versus validation blocks, which showed variation in SSB among lines to be positively correlated across experiments (linear regression: adjusted r2 = 0.461, F 1,6 = 6.98, p = 0.038). Figure 1. Original SSB screen compared with blind validation screen in eight DGRP lines. Solid black lines indicate DGRP lines that expressed high-SSB in the original screen, whereas dashed black lines indicate lines that expressed low-SSB in the original screen. The intermediate-SSB line is shown in grey. The lowest line has been jittered to aid visualization.
We detected considerable variation in the expression of male SSB across the 50 tested DGRP lines. The proportion of trials in which males displayed SSB ranged from 0.0 to 42.5% (figure 2; mixed-model binary logistic regression: n = 2315, Z = 3.81, p < 0.001). As before, temperature did not affect SSB expression (mixed-model binary logistic regression: F 1,2268 = 1.36, p = 0.244). Broad-sense heritability calculated across the lines using a standard ANOVA was H2 = 0.11, but this is probably an underestimate owing to inflated within-group variance relative to among-group variance, caused by the binomial scoring of SSB. Figure 2. Variation in the expression of male SSB among focal lines. For lines that were retested in the blind validation procedure, the values indicate the combined incidence of SSB across both blocks. Lines are ordered on the x-axis according to their original numerical identifier.
(b) Behaviour diallel
The genotype of fathers, but not mothers, exerted a considerable influence on offspring SSB in diallel crosses: F 1 males expressed SSB patterns more similar to their father's line than their mother's line (figure 3). The paternal contribution to offspring SSB expression is evident from a significant ‘paternal line’ effect (binary logistic regression: Wald , p = 0.001), while in contrast, ‘maternal line’ did not influence offspring SSB expression (binary logistic regression: Wald , p = 0.154). Any interaction between maternal and paternal genotypes did not appear to be strong (binary logistic regression: Wald , p = 0.070), and temperature had no effect (binary logistic regression: Wald , p = 0.720). Figure 3. SSB in male offspring from crosses between low- and high-SSB parents. Paternal influences on the expression of SSB were stronger than maternal influences: offspring show SSB levels that resemble the trait value of their father's line more closely than that of their mother's line. Data from the appropriate within-line crosses (low–low or high–high) are included to allow comparison with maternal and paternal trait values. Note that data from each of the two low–low and two high–high crosses appear twice in the graph. We used two low-SSB and two high-SSB lines in crosses, so there were four possible combinations involving a pair of low and high lines. These are grouped along the horizontal rows, with the lines used indicated to the left. Shading in the circles indicates which parents were low-SSB or high-SSB.
(c) Fecundity diallel
Fecundity of F 1 females derived from diallel crosses showed a complex pattern of inheritance (figure 4a). As expected, there was a clear difference between inbred (diagonal) and outbred (inter-line) crosses (table 2a). However, fecundity of inter-line crosses was greater for crosses between lines showing high values of SSB, and F 1 crosses between high- and low-SSB lines. Females from crosses involving two low-SSB parents produced on average 25 fewer offspring than those derived from crosses involving either one high-SSB and one low-SSB parent or two high-SSB parents. This key fecundity difference was significant in our post hoc comparison examining only inter-line crosses (table 2b and figure 4a). Overall, fecundity differed across the two experimental blocks, but the non-significant ‘cross type × block’ interaction indicated that differences among cross types occurred in a consistent direction (table 2a). Both maternal and paternal line identities also affected F 1 female fecundity, and mothers from high-SSB lines produced more offspring than those from low-SSB lines (figure 4a and table 2a). Although the overdominance model classically predicts that crosses should be most extreme, our results, showing that crosses between different high-SSB lines and high- and low-SSB lines have higher early fecundity, are compatible with directional overdominance maintaining SSB in this population.
Table 2.GLM of female fecundity in diallel crosses. (a) Comparison of all crosses, examining differences between diagonal (inbred) crosses and off-diagonal (outbred) crosses. (b) Post hoc analysis examining variation among off-diagonal cross types to assess whether low-SSB × low-SSB crosses show lower fecundity than the rest. Collapse factor d.f. F p (a) initial analysis including all crosses block 1 23.18 <0.001 inbreeding 1 96.33 <0.001 block × inbreeding 1 0.77 0.380 maternal genotype 3 11.45 <0.001 paternal genotype 3 9.52 <0.001 error 242 (b) post hoc analysis excluding diagonal data block 1 75.17 <0.001 cross type 3 7.36 <0.001 block × cross type 3 1.86 0.138 error 205
Figure 4. (a) Fecundity of female offspring from diallel crosses. Cross type is indicated above the graph; circles indicate means and error bars indicate 1 s.e. The order of the cross is indicated as mother–father. (b) Maternal and paternal effects on offspring sex ratio. Untransformed sex ratio data are shown, and the dashed line indicates a 1 : 1 offspring sex ratio. Circles indicate means and error bars show 1 s.e. Circle shading corresponds to parental genotypes. In both panels, overlapping data points were jittered to facilitate visualization.
Offspring sex ratio of mated F 1 females was generally unaffected by diallel cross type, although a significant block interaction suggested that patterns of cross-specific variation were inconsistent (figure 4b and table 3a,b). The original maternal lineage did not affect sex ratio, but the original paternal lineage did (figure 4b and table 3a). Despite this paternally induced variation, there was no discernible pattern linking offspring sex ratio to the level of SSB expressed in the paternal line (figure 4b).
Table 3.GLM of offspring sex ratio in diallel crosses. (a) Comparison of all crosses, examining differences between diagonal (inbred) crosses and off-diagonal (outbred) crosses. (b) Post hoc analysis examining variation among off-diagonal crosses to assess whether offspring sex ratio varied among cross types. Collapse factor d.f. F p (a) initial analysis including all crosses block 1 2.70 0.102 inbreeding 1 0.04 0.845 block × inbreeding 1 3.90 0.049 maternal genotype 3 0.36 0.781 paternal genotype 3 3.61 0.014 error 242 (b) post hoc analysis excluding diagonal data block 1 0.38 0.538 cross type 3 2.27 0.081 block × cross type 3 0.56 0.644 error 205
4. Discussion
We found considerable, and repeatable, variation in male SSB when we screened 50 inbred D. melanogaster lines, which confirms a heritable genetic basis for the trait. Like any other trait that potentially reduces fitness, the evolutionary maintenance of SSB requires a countervailing fitness benefit. Genetic models of SSB [16] have illustrated that such a benefit need not accrue to the individual expressing SSB, but can occur as a result of a fitness advantage specific to the alleles influencing the expression of SSB.
Phenotypic and fitness patterns from diallel crosses among lines with the highest and lowest SSB trait values supported predictions under both genetic models. The diallel results involved only a sample of extreme lines, and assaying a wider range of female fitness components might yield different results. Taken in aggregate, however, our results lend more support to an overdominant fitness advantage occurring when alleles influencing SSB are present in a heterozygous state in crosses between lines, as opposed to an antagonistic advantage that is only revealed when such alleles are expressed in females. The two models are in fact not mutually exclusive and SSB may be maintained by a combination of mechanisms, a possibility that is highlighted by the fact that we did not find exclusive support for a single model of SSB in D. melanogaster. Instead, we found a complex mix of inheritance patterns and fitness effects, plus an unusual pattern of paternal effects on the expression of male SSB.
A sexually antagonistic mode of selection maintaining male SSB predicts that we are more likely to find X-linkage of loci influencing SSB [16]. We did not find this, as there was no detectable maternal effect on the expression of SSB in sons from diallel crosses. This model also predicts that females from high-SSB lines should experience increased fecundity and contribute to a female-biased sex ratio, the latter owing to greater accumulation of male-deleterious mutations on X chromosomes carrying SSB-increasing alleles. The first of these predictions received support, but the latter did not. Fecundity was influenced by both maternal and paternal genotypes; it was higher in crosses where the mother had a high-SSB genotype (figure 4a), which is what the sexual antagonism model predicts (table 1). Offspring sex ratio was influenced by paternal, but not maternal, genotype, but not in a pattern that related to whether fathers were from high-SSB or low-SSB lines.
We also detected evidence consistent with the heterozygote fitness advantage predicted by the overdominance model. When lines that carried alleles for high levels of SSB were crossed, the resulting offspring had higher fecundity than those from low–low crosses. In offspring from the former crosses, heterozygosity at loci affecting SSB is expected because the parents were derived from different high-SSB lines. Moreover, these effects were not driven purely by heterosis, as we set up high–high and low–low crosses with different high-SSB and low-SSB lines, respectively. Fecundity of offspring from low–low crosses was more than 15% lower than the other crosses. However, sex-specific patterns of dominance in our data might also be consistent with a model in which loci under sexually antagonistic selection are X-linked [38]. Gavrilets & Rice [16] noted that under such a scenario, SSB is expected to be recessive in the sex in which it reduces fitness, and dominant in the sex in which it increases fitness. Consistent with this, male SSB appeared to show recessivity in our crosses (figure 3), whereas loci causing high male SSB had a dominant effect on female fitness in the fecundity assay derived from those crosses (figure 4a).
The paternal effects uncovered in our analyses of male SSB and offspring sex ratio were unexpected, and suggest a promising area for future research. Our screen of all 50 inbred lines revealed modest but significant broad-sense heritability. Crosses between a subset of extreme lines confirmed this genetic variation for SSB by revealing a clear parent-of-origin effect on offspring SSB levels, but surprisingly the paternal genotype exerted a strong influence on the expression of male SSB and on offspring sex ratio, while the maternal genotype did not. Relatively few loci have been identified on the heterochromatic Y chromosome of D. melanogaster, but those that have been studied appear to be strongly implicated in male fitness [39]. In an analysis of polymorphic Y chromosomes crossed into a common wild-type D. melanogaster background, Chippindale & Rice [40] found substantial epistatic fitness effects of variation on the Y. Intriguingly, such male fitness effects may arise from variation in sperm competition and mating behaviour. Several genes with putative spermatogenesis functions have been characterized on the Y [41], and Y-linked effects on male mating behaviours such as courtship song have been documented in Drosophila virilis [42]. Evidence for strong epistatic effects of Y-linked variation on patterns of autosomal gene expression [43] suggests a mechanism whereby Y-linked variation influences SSB: if balancing selection maintains polymorphism on the Y because of fitness benefits in some genetic backgrounds but not others, detrimental epistatic fitness effects mediated by the Y chromosome could manifest as high levels of male SSB. For example, epigenetic modifications disrupting sexually dimorphic gene expression have been suggested as a plausible mechanism underlying the development of SSB [17,44]. If genetic variation on the Y is associated with male SSB, it might be productive to test which autosomal genes interact with such Y-linked variation, and whether they are susceptible to epigenetic modification.
Until further empirical work is performed, the diversity of genetic mechanisms maintaining SSB will remain unknown. Such studies would benefit not only from focusing on different systems, but also from expanding the scope of quantitative genetic experiments to capture a broader range of genetic variation via inbred lines or pedigree-based animal model approaches. Our study focused on male SSB because active courtship behaviour in D. melanogaster is sex-limited, although it would be useful to perform similar genetic analyses in species amenable to studying female SSB. Such work could clarify whether male and female SSB are maintained by similar selective pressures or whether intersexual correlations arise due to incomplete sexual differentiation of sexual behaviours [14,45]. Apart from demonstrating a genetic basis for the trait in Coleopteran beetles [12–14], additional information about the evolutionary genetics of SSB is derived almost exclusively from studies of human homosexuality (in particular, male homosexuality) [46–51]. Despite these comparatively more extensive research efforts, SSB and sexual orientation are obviously not homologous traits [3], and drawing direct parallels between such taxonomically distinct species as human beings and fruitflies is unlikely to be of much value [15]. Nevertheless, with increased research attention in other organisms, it may eventually become feasible to study the genetics of SSB using a comparative approach, which would enable researchers to test the generality of evolutionary hypotheses for its maintenance.
It is debatable whether SSB represents a unified phenomenon across taxa or whether its functions and evolutionary origins are too multifarious to be studied except in the context of a single species or taxonomic group. Some broad themes are beginning to emerge, with reviews of arthropods [16] and work on other invertebrates such as the deep sea squid Octopoteuthis deletron [52] suggesting indiscriminate mate choice may underlie SSB when mating opportunities are limited. In addition, studies in avian taxa have used the comparative method to examine life-history correlates of female–female pair bonding and test phylogenetic signals underlying the expression of SSB [53], and primatologists have studied SSB from a perspective more focused on its role in social transactions in highly social species [2]. These studies suggest different sources of selection maintain this apparently non-adaptive trait with different indirect fitness benefits depending on a variety of ecological and life-history factors. To critically evaluate evolutionary hypotheses about the origins and maintenance of SSB, more genetic research is clearly required across a broader range of organisms.
Data accessibility
Behavioural data unique to this study, plus fecundity data, are archived at Dryad (http://dx.doi.org/10.5061/dryad.t0c3s). Additional DGRP phenotype data are archived at http://dgrp.gnets.ncsu.edu/.
Authors' contributions
N.W.B. and M.G.R. designed experiments. J.L.H. executed experiments and collected data. N.W.B. and M.G.R. performed statistical analyses. N.W.B., J.L.H. and M.G.R. wrote the manuscript.
Competing interests
We declare we have no competing interests.
Funding
This study was supported by Natural Environment Research Council (NERC) fellowships to N.W.B. ( NE/G014906/1 and NE/L011255/1 ) and a NERC grant to N.W.B. and M.G.R. ( NE/I016937/1 ).
Acknowledgements We are grateful to Tanya Sneddon, Maureen Cunningham, David Forbes, Harry Hodge and Keith Haynes for technical assistance.
Footnotes |
Introduction {#s1}
============
The ability of pathogenic microorganisms to assimilate nutrients from their host environment is one of the most fundamental aspects of infection. To counteract this, hosts attempt to withhold essential micro-nutrients from potentially harmful microbes to limit, or even prevent, their growth. This process is called nutritional immunity. For example, vertebrates, such as humans, express several iron-binding molecules to maintain extremely low free levels of this metal in the body. To overcome this restriction, successful pathogens have evolved sophisticated mechanisms to assimilate iron. These include high affinity transporters, siderophores, and transferrin-, ferritin-, and haem-binding proteins [@ppat.1003034-Hood1], [@ppat.1003034-Almeida1]. Indeed, iron acquisition is considered a vital virulence factor for many pathogens. However, nutritional immunity does not begin and end with iron. Vertebrates have also developed mechanisms to sequester other essential metals, such as zinc [@ppat.1003034-Corbin1], [@ppat.1003034-Urban1]. The importance of zinc sequestration and the strategies that successful pathogens employ to overcome this has only recently been realized.
Why Is Zinc So Important? {#s2}
=========================
Zinc is essential for life, with an astonishing 9% of eukaryotic proteins predicted to be zinc metalloproteins [@ppat.1003034-Andreini1]. The role of this metal in human health is well-documented [@ppat.1003034-Chasapis1] and zinc is known to play key roles in both adaptive and innate immunity. However, host zinc sequestration from pathogens, as a means to control microbial growth, is an emerging field [@ppat.1003034-KehlFie1]. Accompanying this, a growing body of literature is illuminating the role of bacterial zinc acquisition systems in virulence [@ppat.1003034-Hood1]. But what about fungal pathogens? Fungi also rely on zinc for growth, as this metal serves as a cofactor for several enzymes, including superoxide dismutase and alcohol dehydrogenase, along with numerous other proteins, such as transcription factors [@ppat.1003034-Colvin1]. Therefore, in order to cause infections, pathogenic fungi must assimilate zinc from their host environment. Here, we will discuss the mechanisms of zinc exploitation by human pathogenic fungal species.
How Can the Host Sequester Zinc from Potential Invaders? {#s3}
========================================================
Although zinc is the second most abundant transition metal in the human body, its spatial distribution is highly dynamic. In mammals, this is largely mediated at the cellular level by zinc transporters. These include ZIPs (Zrt-, Irt-like proteins/solute carrier family 39, SLC39), which deliver zinc into the cytoplasm and ZnTs (zinc transporter), which pump zinc out of the cell or into vesicles [@ppat.1003034-Liuzzi1]. Within the cell, zinc availability is tightly regulated via sequestration within organelles and binding to proteins such as metallothioneins [@ppat.1003034-Colvin1]. During acute inflammation, hepatocytes remove zinc from the plasma via ZIP14 [@ppat.1003034-Liuzzi2], reducing availability to extracellular pathogens. On the other hand, ZnT transporters reduce cytoplasmic zinc levels, possibly limiting access to intracellular pathogens; indeed, *Listeria monocytogenes* relies on two zinc uptake systems for intracellular growth [@ppat.1003034-Corbett1]. Furthermore, it would appear that ZIP-mediated export of zinc from phagosomes may also be employed to limit the growth of phagocytosed intracellular pathogens [@ppat.1003034-Aydemir1], [@ppat.1003034-Serafini1]. In contrast, it has also been shown that phagocytes attempt to kill intracellular pathogens, such as *Mycobacterium tuberculosis*, by increasing the heavy metal content of intracellular compartments to potentially toxic levels [@ppat.1003034-Botella1], [@ppat.1003034-Botella2]. Therefore, both metal restriction and metal overload represent potential mechanisms to control pathogenic microorganisms.
In addition to cellular import/export, zinc can also be limited via calprotectin, an antimicrobial peptide with zinc (and manganese) chelation properties [@ppat.1003034-Corbin1]. Neutrophils (one of the most important antifungal effectors) contain high levels of calprotectin and these phagocytes decorate their NETs (neutrophil extracellular traps) with this potent antimicrobial peptide. Indeed, calprotectin is particularly important for the candidacidal activity of NETs [@ppat.1003034-Urban1].
Intriguingly, *Salmonella* Typhimurium can actually exploit calprotectin-mediated zinc sequestration in the inflamed guts of infected mice, thus out-competing rival commensal species [@ppat.1003034-Liu1]. Nutrient acquisition from this antimicrobial peptide represents a striking example of a pathogen gaining an upper hand in the continuous arms-race with its host. It remains an open question whether fungal pathogens can also exploit this potential zinc source during infection.
How Do Fungi Obtain Zinc? {#s4}
=========================
A number of studies have investigated the mechanisms of zinc homeostasis in the model yeast *Saccharomyces cerevisiae*. This fungus encodes two plasma membrane transporters, Zrt1 and Zrt2 ([Figure 1A and 1B](#ppat-1003034-g001){ref-type="fig"}), which are up-regulated by the transcription factor Zap1 and transport zinc into the cell. If cellular levels become too high, these importers are rapidly down-regulated [@ppat.1003034-Eide1].
{#ppat-1003034-g001}
The fungal vacuole is also extremely important for cellular zinc homeostasis: Cot1/Zrc1 (ZnT type transporters) import zinc into the fungal vacuole, thus protecting the cell from potentially toxic levels of the metal; conversely, if the cell experiences zinc starvation, the zinc pool stored in the vacuole can be mobilized via the vacuolar zinc exporter, Zrt3 ([Figure 1B](#ppat-1003034-g001){ref-type="fig"}) [@ppat.1003034-MacDiarmid1]. Indeed, vacuolar storage and mobilization can significantly buffer the cytosol from both zinc excess and depletion. Unlike bacteria, which express cell membrane-localized zinc efflux systems [@ppat.1003034-Hantke1], fungi do not appear to actively export zinc in this manner [@ppat.1003034-Eide1] and rather rely on vacuolar sequestration to detoxify this metal.
The CtpC zinc efflux system of *M. tuberculosis* is required for survival within macrophages, as these immune cells attempt to poison phagocytosed bacteria with potentially toxic levels of zinc [@ppat.1003034-Botella1], [@ppat.1003034-Botella2]. Although it is at present unknown whether phagocytosed fungi also experience zinc toxicity, vacuolar detoxification would represent a promising mechanism for counteracting this [@ppat.1003034-Yasmin1]. Indeed, orthologues of vacuolar zinc transporters are found in several pathogenic fungi.
As well as counteracting metal toxicity, intra-vacuolar storage can also endow yeasts with an extraordinary capacity to withstand zinc starvation. Simm et al. have demonstrated that the storage capacity of the *S. cerevisiae* vacuole is sufficient for a single mother cell to produce many progeny, even in the absence of zinc uptake [@ppat.1003034-Simm1]. Thus vacuolar zinc storage may have serious implications for virulence studies aimed at elucidating zinc uptake systems in fungal pathogens. Zincosomes represent another potential intracellular zinc store ([Figure 1B](#ppat-1003034-g001){ref-type="fig"}). Zincosomes are vesicles that contain labile zinc and have been observed in both mammalian and yeast cells. Zincosomes may serve to both detoxify excess zinc and mobilize this metal upon deprivation (analogous to the fungal vacuole); however, the exact nature of these compartments, and the mechanisms by which they function, remain unclear [@ppat.1003034-Eide1].
Zinc acquisition by a pathogenic fungus has been most extensively investigated in *Aspergillus fumigatus* by the Calera group. *A. fumigatus* encodes three zinc transporters (*zrfA*-*C*), all of which are positively regulated by ZafA, the functional orthologue of yeast Zap1 [@ppat.1003034-Amich1], [@ppat.1003034-Moreno1]. Although the role of these transporters in *A. fumigatus* pathogenicity has not yet been directly examined, deletion of their transcriptional activator, ZafA, abrogates virulence, suggesting a role for zinc uptake during infection [@ppat.1003034-Moreno1]. Similarly, *Candida albicans* Zap1 is required for the expression of zinc transporter encoding genes and plays a crucial role in biofilm formation, an important pathogenicity attribute of this fungus [@ppat.1003034-Nobile1]. Therefore, the transcriptional regulation of zinc transporters would appear to be conserved, at least amongst *S. cerevisiae*, *C. albicans*, and *A. fumigatus*.
Phylogenetic studies have identified zinc transporters in numerous other pathogenic fungi [@ppat.1003034-Citiulo1] and [Figure 1A](#ppat-1003034-g001){ref-type="fig"}; however, their roles in virulence remain largely unexplored. In addition to transporter-mediated assimilation, zinc can also be scavenged via the zincophore system.
The Fungal Zincophore System {#s5}
============================
We recently reported sequestration of host zinc by the major human fungal pathogen *C. albicans* [@ppat.1003034-Citiulo1]. We hypothesized that, analogous to siderophore-mediated iron acquisition, the fungus might secrete a zinc-binding molecule to scavenge this metal from its environment---we proposed the term "zincophore" for such a scavenger. Indeed, we found that *C. albicans* secretes a zinc-binding protein (Pra1, pH-regulated antigen), which can sequester this metal from the environment and is required for stealing zinc from host cells ([Figure 1B](#ppat-1003034-g001){ref-type="fig"}). Moreover, Pra1 reassociation with the fungal cell (a prerequisite for a functional zincophore system) was found to be mediated by the plasma membrane zinc transporter (Zrt1), encoded at the same locus as the zincophore. Therefore, Zrt1 of *C. albicans* likely has dual transporter and receptor functions ([Figure 1B](#ppat-1003034-g001){ref-type="fig"}).
The Calera lab has shown that the Pra1 and Zrt1 orthologues of *A. fumigatus* (Aspf2 and ZrfC, respectively) are also syntenically encoded, regulated by environmental zinc status and required for growth under zinc starvation [@ppat.1003034-Amich1], indicating functional conservation of zinc-acquisition loci between *Candida* and Aspergilli.
Indeed, we found the zincophore locus in both ascomycetes and basidiomycetes, groups of fungi that diverged around half a billion years ago---clearly, this system is not specific to human pathogens. Rather, it appears to be associated with zinc foraging in certain niches of neutral/alkaline pH. In line with this, both characterized systems (in *A. fumigatus* and *C. albicans*) are strongly repressed by acidic pH, even under conditions of zinc limitation [@ppat.1003034-Amich1], [@ppat.1003034-Citiulo1]. Although the zincophore system is essential for *C. albicans* zinc scavenging during host cell invasion [@ppat.1003034-Citiulo1], many other human fungal pathogens do not encode Pra1 [@ppat.1003034-Citiulo1]. These other species must rely on alternative acquisition systems. It is possible that some species rely solely on transporters for zinc uptake. Alternatively, another, convergently evolved, secreted zinc-binding protein may be deployed. Finally, it is possible that some fungi may secrete small molecule zinc chelators to sequester this metal.
The most well characterized zincophore-encoding species, *C. albicans* and *A. fumigatus*, are both notable for aggressive, hypha formation-mediated tissue invasion and inflammation. Indeed, Pra1 is immuno-modulatory [@ppat.1003034-Zipfel1] and is the major ligand for leukocyte integrin αMβ2 [@ppat.1003034-Soloviev1]. Similarly, the *A. fumigatus* homologue Aspf2 is a major allergen, which cross-reacts with over 80% of sera from patients suffering from aspergilloma or allergic bronchopulmonary aspergillosis [@ppat.1003034-Segurado1].
Therefore, an intriguing possibility is that the loss of the zincophore system by contemporary human fungal pathogens [@ppat.1003034-Citiulo1] may actually contribute to their capacity to evade certain aspects of immune recognition. Whilst foregoing zincophore-mediated zinc scavenging, yeasts such as *C. glabrata*, *Cryptococcus neoformans* and *Histoplasma capsulatum* may benefit from avoiding unwanted attention from aggressive host immune responses.
In summary, as the scope of nutritional immunity expands beyond iron to encompass other metals, the molecular mechanisms that pathogenic microorganisms deploy to circumvent host metal restriction represents fertile ground for the identification of novel virulence factors.
We would like to thank all of the members of MPM for ever helpful discussions and Matthias Brock and François Mayer for critical reading of the manuscript.
[^1]: The authors have declared that no competing interests exist.
|
Introduction
============
A wound is termed chronic when it cannot achieve anatomical and functional integrities through normal, orderly, and timely repair processes under the influence of various internal or external factors.^\[[@R1]\]^ Wounds are injuries that have not healed and have no tendency to heal after more than one month of treatment.^\[[@R2]\]^ A bacterial biofilm (BBF) in a chronic wound is a membranous tissue formed by bacteria attached to the wound bed and fused with extracellular matrix (ECM) secreted by the film.^\[[@R3]\]^ It is composed of bacteria and their products, ECM, necrotic tissue, and so on.^\[[@R2]\]^ Clinic is more common in pressure ulcer, diabetic foot ulcer, lower extremity arteriovenous ulcer, and other chronic wounds.^\[[@R4],[@R5]\]^ For example, the annual incidence of foot ulcers in diabetic patients is 1% to 4% in the United States, with a lifetime risk of occurrence between 15% and 25%.^\[[@R3]\]^ In 2006, the cost of the treatment, amputation, rehabilitation, and long-term care of diabetic foot ulcers in the United States totaled \$10.9 billion^\[[@R6]\]^; approximately 85% of amputations are preceded by this types of ulcers. These figures will increase as the number of diabetes diagnoses is expected to rise. Pressure/decubitus ulcers are a common problem in nursing homes, rehabilitation clinics, and home care patients. Further, venous leg ulcers affect 1% of the worldwide population.^\[[@R3]\]^ Surgical site infections occur in 5% of procedures and are an increasingly common type of post-operative complication; an average of 0.5% of the total hospital budget in the United States is allocated to manage these infections in affected patients.^\[[@R7]\]^ The science of how a wound heals is fascinating, and new discoveries clarifying the mechanisms of physiologic wound repair are constantly being reported. In recent years, the role of BBFs in the formation of chronic wounds has attracted increased attention. The BBF may be an important factor that impairs the healing of chronic wounds.^\[[@R8]\]^ In this review, the basic concepts of BBF will be discussed, with a focus on current practices in the treatment of chronic wounds and future directions in wound care.
Definition and Structural Characteristics of BBF
================================================
In 1978, the Canadian scholar Costerton first proposed the concept of "biofilm". Thereafter, scientists used this concept to describe microbial colonies embedded in an extracellular polymeric matrix secreted by themselves. A BBF has a growth pattern corresponding to plankton cells formed on the surface of inert or active materials, and they adapt to the living environment during the growth of the bacteria. Its structure includes bacteria and extracellular polymeric substance (EPS) secreted by themselves.^\[[@R9]\]^ This phenotype is the best condition for bacteria to inhabit, and is different from free bacteria that have been widely studied in the laboratory. The main components of a BBF include proteins, polysaccharides, extracellular DNA (eDNA), water, and so on. The formation of a biofilm is a dynamic process; it has been found that bacteria can form a mature biofilm on a wound within 24 h.^\[[@R10]\]^ The formation of a BBF includes four stages.^\[[@R5],[@R11]--[@R13]\]^ (1) Adhesion: the wound bed contains organic or inorganic nutrients on which bacteria get attached, and most are implanted biomaterials and their own tissue lesions. (2) Reproduction: when bacteria are adhered to the wound surface, they initiate gene expression, secrete a large number of EPS, attract each other to form a microbial colony, and thereafter form a mushroom structure. (3) Maturation: bacteria are buried deep in the matrix and become mature biofilms. (4) Shedding: when the biofilm matures, a small cluster of bacterial cells separate from the biofilm, spread to other environments, and cause infections; thus, chronic wound infection occurs repeatedly in clinics. Further, recent studies have found biofilms resistant to anti-microbial agents; biofilms may be 1000 times more resistant to anti-microbial agents than ordinary-free organisms.^\[[@R14]\]^ The eDNA in biofilm plays an important role in drug resistance. Chiang *et al* found that the protective effect of eDNA makes *Pseudomonas aeruginosa* resistant to aminoglycoside drugs.^\[[@R15]\]^ Evidence showed that eDNA had anti-microbial activity; chelating cations could make the cells split, stabilize the lipopolysaccharide and outer membrane of bacteria.^\[[@R16]\]^ By adding DNA lyase to the biofilm formation process, it was found that DNA lyase could not act on the mature biofilm or mucinous biofilm of *P. aeruginosa*.^\[[@R17]\]^ eDNA is an important component of biofilm matrix in both Gram-negative or Gram-positive bacteria.^\[[@R18]\]^ The production of eDNA is related to quorum sensing (QS) in the wild-type biofilm of *P. aeruginosa*, and the regulation of QS system can lead to cell cleavage and provide eDNA for the biofilm.^\[[@R15]\]^
Clinical Diagnosis of BBF in Chronic Wound
==========================================
It is unlikely that bacterial aggregates in biofilms in the wound can be visualized with the naked eye because they are often less than 100 μm in size and lack macroscopically distinguishable features.^\[[@R19]\]^ Clinical workers usually need to use a bacterial culture to detect bacteria in the wound; however, the diagnosis of chronic infection caused by BBF lacks accuracy. Currently, there is no specific clinical manifestation for the diagnosis of biofilm.^\[[@R20]\]^ Previous studies have shown that the clinical symptoms of BBF that colonize wounds are similar to those of chronic infection wounds, such as pale wound bed, yellow exudate, necrotic tissue, and clear tissue fluid.^\[[@R21]\]^ Some scholars have used granulation tissue morphology and color as the criteria for identifying BBF.^\[[@R22]\]^ Bacterial species and distribution in the biofilm of the wound were summarized and used as one of the diagnostic criteria by extracting the specimens of different kinds of chronic wounds.^\[[@R23]\]^ In 2003, Parsek *et al*^\[[@R24]\]^ put forward the diagnostic criteria of Parsek-Singh experiment: (1) the relationship between the bacterial infection and wound surface tissue; (2) the pathological examination of the wound tissue, which showed that bacteria were gathered and encapsulated by a matrix; (3) infection in local tissues, with or without systemic infection; and (4) the resistance of bacteria to conventional antibiotics. In 2012, a World Biofilm Seminar summarized the clinical diagnostic criteria of a biofilm infection: (1) pale and edema wound bed; (2) a fragile granulation tissue; (3) large amount of yellow exudate; (4) necrotic and rotting tissue; (5) wound pain; and (6) pungent smell.^\[[@R25]\]^ This criteria was updated in 2017, which included: (1) recalcitrant to treatment with antibiotics or antiseptics; (2) treatment failure despite using appropriate antibiotics or antiseptics; (3) delayed healing; (4) cycles of recurrent infection/exacerbation; (5) excessive moisture and wound exudate; (6) low-level chronic inflammation; and (7) low-level erythema.^\[[@R26]\]^ Recent guidelines on medical biofilms by the European Society of Clinical Microbiology and Infectious Diseases study group for biofilms stated that approaches such as the use of scanning electron microscopy (SEM) and confocal laser scanning microscopy are the most reliable types of diagnostic techniques. The SEM technique can identify biofilms in wounds that do not show any evidence of acute infection.^\[[@R27]\]^ However, these imaging techniques are highly specialized and not practical in a typical clinical setting.^\[[@R28]\]^ To improve the accuracy and scientific nature of the clinical diagnosis of BBF, some new methods have been developed, such as polymerase chain reactions, fluorescence *in situ* hybridization, and denaturing gradient gel electrophoresis.
Therapeutic Strategies
======================
Wound debridement is the first key step in the removal of BBF. Sharp debridement is commonly used in clinical practice to remove inactivated tissue, slough and necrotic tissue, foreign bodies, and poor healing tissues, which provide an attachment point for bacterial colonization and biofilm formation; thus, it is important to remove necrotic tissue and foreign bodies in time.^\[[@R29]\]^ Late debridement and residues of necrotic tissues and foreign bodies can lead to bacterial colonization of *Staphylococcus aureus* and *P. aeruginosa*, which can cause secondary infections. To improve patient tolerance to debridement, painless debridement has gained considerable attention.^\[[@R30]\]^ Hydrosurgical debridement is a painless debridement technique developed recently, and its basic principle is the application of precisely controlled ultrasonic fine water flow to remove carrion, tissue fragments, colonies, and so on from the wound bed based on liquid jet technology, while keeping the wound bed clean and moist. Caputo *et al*^\[[@R31]\]^ used this technique to debride wounds in 22 patients with chronic leg ulcer; 19 patients with similar ulcers were treated with surgical debridement as the control group. Results showed that ultrasonic atomization of water flow debridement was quicker than that of surgical debridement. In addition, the use of gauze, physiological saline, and other materials was reduced, in addition to the decrease in the pain. Therefore, ultrasonic atomization technology can improve the effectiveness and safety of debridement. In future applications, it is necessary to explore its characteristics, operating methods, and cost-effectiveness, to popularize this technique.
Negative pressure wound therapy (NPWT) has been a widely used method for wound treatment in the last 20 years.^\[[@R32],[@R33]\]^ This therapy can improve local blood flow, reduce tissue edema, promote the growth of granulation tissue, and effectively reduce the number of bacteria.^\[[@R34]\]^ In 2012, Ngo *et al*^\[[@R35]\]^ first reported that the number of bacteria in BBF significantly decreased after treatment using negative pressure combined with silver foam for 2 weeks, by establishing an *in vitro* model of *P. aeruginosa* biofilm. It is speculated that the micromorphology of the wound tissue caused by negative pressure may destroy the original thickness structure of BBF, control the spread of bacteria in the membrane, and thus effectively reduce the wound infection. Further, Phillips *et al* used an infected pig-skin biofilm as a research object.^\[[@R36]\]^ It was found that NPWT combined with different flushing solutions can effectively remove bacteria in the biofilm in the wound. In 2016, Wang *et al*^\[[@R37]\]^ used concanavalin A staining *in vitro* and found that negative pressure environment could reduce biofilm formation compared with normal pressure environment based on observations through a fluorescence microscope. In the model of a rabbit ear biofilm infection, the early treatment of *S. aureus* infection with NPWT could effectively inhibit the formation of the biofilm; however, it could not clear the mature biofilm.^\[[@R13]\]^ In addition, in this *in vitro* experiment, the authors found that a negative pressure environment can reduce the total amount of eDNA in the *S. aureus* biofilm. Further, as eDNA plays an important role in bacterial drug resistance, it is suggested that negative pressure may play a role in reducing bacterial drug resistance. However, there is a lack of research and direct evidence in this area. Negative pressure wound therapy instillation is an improvement on NPWT and one of the treatment methods for biofilms.^\[[@R13]\]^ Phillips *et al*^\[[@R36]\]^ found that flushing NPWT-binding active anti-bacterial substances could enhance the bacterial clearance of the wound by NPWT and destroy the BBF effectively.
Ultrasound can destroy and remove biofilms via electron-hole pairs and foaming. Nursing staff certified to perform wound treatments can administer ultrasonic treatment independently after training. The effect of ultrasound combined with antibiotics on micro-organisms was studied by Teresa *et al*^\[[@R38]\]^ It was found that ultrasound could significantly enhance the bactericidal efficacy of gentamicin against *P. aeruginosa* and *Escherichia coli*. Zhu *et al*^\[[@R39]\]^ found that when the parameters of high intensity focused ultrasound were set to a focal length of 150 mm and an output frequency of 40 W, linear scanning radiation, scanning speed of 3 mm/s, scanning length of 10 mm, and scanning interval of 5 mm, it can kill *P. aeruginosa* and destroy its biofilm structure to a certain extent. Ultrasound, as a physical cleaning method, has been well developed in clinical wound nursing in recent years.
Antibiotic treatment of wounds has always been controversial; generally, only when the wound is accompanied by inflammatory reactions such as redness, swelling, heat, pain, or symptoms of bacteremia, and whole-body anti-bacterial treatment is considered.^\[[@R26]\]^ For chronic wounds with BBF but no symptoms of infection, the efficacy of systemic anti-bacterial therapy was reduced by 25% to 30%. The drug resistance of bacteria after biofilm formation can increase to 1000 to 1500 times of that in the free state,^\[[@R40]\]^ and improper use of antibiotics can promote membrane formation.^\[[@R41]\]^ Antibiotic resistance of micro-organisms within a biofilm can have a significant influence on wound healing in mammalian medicine. When wound isolates are grown in the biofilm phenotypic state, they exhibit enhanced tolerance to antibiotics. This tolerance of a biofilm occurs through phenotypic rather than genotypic changes. Many studies have reported the evidence of antibiotic-resistant isolates in biofilms, in particular methicillin-resistant *S. aureus*, vancomycin-resistant *Enterococcus*, and multi-drug resistant *Acinetobacter baumannii*,^\[[@R22],[@R42]\]^ and; therefore, it is suggested that antibiotics should be used in combination with other antibiotics. Meanwhile, antibiotics should be used according to the structural characteristics of BBF.^\[[@R43]\]^ For example, fluoroquinolones have the strongest scavenging effect on biofilms, but imipenem and ceftazidime have a weaker effect. Macrolides have the strongest penetrating effect on the bacterial extracellular polysaccharide matrix, while fluoroquinolones and β-lactams are the second, with aminoglycosides being the weakest.^\[[@R44]\]^ At present, the combination of traditional antibiotics and specific anti-BBF agents against BBF is the research focus, and it includes using the combination of linazolamine and acetylcysteine. Acetylcysteine can degrade extracellular polysaccharides and destroy bacterial adhesion; therefore, it can inhibit the formation of BBF. Further, the combination of the two can play a synergistic effect, effectively reduce the formation of BBF in *Staphylococcus epidermidis*.^\[[@R45]\]^ Although new anti-bacterial agents are being developed globally, there are many research studies on single active ingredients, lacking clinical trials and comprehensive pharmacokinetic analysis, and this is expected to become another research hotspot to conquer BBF in the future.
Nanoparticles are versatile and bioactive, and they are becoming increasingly popular for use as a biofilm-targeting approach. Nanoparticles with intrinsic anti-microbial activity, primarily inorganic materials such as silver, can act as biofilm-targeting agents or as nanocoatings. Owing to their flexible chemical structures, they can also function as drug delivery vehicles (nanocarriers) with organic nanoparticles, accounting for over two-thirds of the systems approved for use in humans. Further, both inorganic and organic nanoparticles can be combined or modified by adding molecules (hybrid nanoparticles) to enhance their biological properties or provide multi-functionality. Excellent in-depth reviews on the principles and current applications of nanoparticles, particularly silver, are available.^\[[@R9]\]^ Silver-containing dressing is recognized as a broad-spectrum anti-bacterial dressing. Silver ion dressing is the first choice in the treatment of BBF wounds. When the concentration of silver ion is as high as 5 to 10 g /mL, 90% of the bacteria in the wound BBF could be cleared within 24 h and 100% within 48 h.^\[[@R46]\]^ The silver ions can prevent various micro-organisms including bacteria and fungi from competing with the host cell for oxygen and nutrients, inhibit the production of the metabolic toxin, reduce the expression of the growth factor and the local anti-inflammatory effect, and effectively control the growth of the micro-organisms in the wound environment^\[[@R47]\]^ thereby significantly improving the healing of the wound.
Honey has a very high osmotic pressure and low pH value, and it contains hydrogen peroxide and acetone aldehyde and other bactericidal components; it can reduce bacterial adhesion, inhibit biofilm formation, interfere with QS, hinder the formation of early biofilm structure, and remove or destroy established biofilms.^\[[@R48]\]^ According to the guidelines of the European Wound Management Association, clinical wound nurses can choose different types and concentrations of honey according to the type of bacteria and the stage in which they are located, to perform effective clinical nursing care of the wound.^\[[@R49]\]^ Maddocks *et al*^\[[@R50]\]^ found that honey inhibited the specific adhesion of *S. aureus*, *P. aeruginosa,* and *Streptococcus pyogenes* to fibronectin, fibrinogen, and collagen, respectively, and prevented it from attaching to human keratinocytes. Meluca honey at 8% concentration inhibited 95% of the biofilm formation of *S. aureus*, which could reach 97% if the concentration reached 10%, while only 50% of the biofilm formation was inhibited by artificial honey. The minimum inhibitory concentrations of Meluca honey on *S. aureus*, *P. aeruginosa,* and *S. pyogenes* biofilms were 16%, 50%, and 30%, respectively.
Traditional Chinese medicine (TCM) has a long history in the treatment of chronic wounds and has unique advantages in the prevention and treatment of BBF infection. Wound nurses should actively learn TCM anti-bacterial therapy in clinics, understand the advantages of TCM anti-bacterial therapy, and actively organize multi-disciplinary joint diagnosis and treatment in clinical nursing, for example, carry out joint wound treatment with the TCM department.^\[[@R39]\]^ The advantages of TCM should be integrated into the clinical nursing of wound. Study by Gong *et al*^\[[@R51]\]^ showed that the oral decoction of peony bark (125 mg/L) and ginger (250 mg/L) could inhibit *Candida albicans* biofilms to a certain extent. It was found that a wet compress of gallnut ethanol extract had a scavenging effect on *P. aeruginosa* biofilms. The minimum inhibitory concentration (MIC) was 19.5 μg/mL, and two times ethanol extract of gallnut had a complete scavenging effect on the *P. aeruginosa* biofilm.^\[[@R52]\]^ Chen *et al*^\[[@R53]\]^ found that andrographolide with the concentration of 30 μg/mL could interfere with the bacterial aggregation of *P. aeruginosa* wild strain, reduce the adhesion force of *P. aeruginosa* and destroy the biofilm structure by wet dressing or lavage within 72 h.
Maggot debridement therapy refers to the use of sterile medical maggots to nibble away necrotic tissue and bacteria that hinder wound healing, reduce inflammation, and promote tissue regeneration.^\[[@R54]\]^ The advantage of this therapy is that the debridement using maggots does not affect the healthy tissue around the wound. Maggots can enter deep wounds and pathogens that are difficult to reach by surgery, such as lurking pathogens and sinuses, which can easily form BBF because of anaerobic bacteria. The excrement or secretion of maggots after ingesting rotten meat contains unique collagenase, trypsin, chymotrypsin, and anti-bacterial phthalein, which decomposes necrotic tissue into semi-liquid foam, and then it is digested to degrade the bacteria.^\[[@R55]\]^ An aseptic maggot is used to remove Gram-positive bacteria biofilms, but bacteria-pre-treated maggots fed with many kinds of bacteria can inhibit Gram-negative bacteria biofilms more effectively than the aseptic maggot, such as *P. aeruginosa* and others.^\[[@R56]\]^ The debridement of maggots in the future may be a promising method for the removal of biofilms; however, the mechanism needs to be further studied to better grasp the application methods and timing in clinical practice.
Some metal ions have a certain bactericidal ability. In addition to the extensive use of silver ions in the management of infected wounds, transition metal gallium has recently been found to inhibit and kill *P. aeruginosa* in zooplankton and BBF.^\[[@R57]\]^ In the model of pulmonary infection in rats, early gallium therapy can reduce the number of bacteria by about 1000 times, which indicates that gallium has good potential in treating both acute and chronic infections.^\[[@R39],[@R58],[@R59]\]^
Phage therapy
-------------
Phages are found in abundance and can be isolated from a wide range of environments. They are usually specific to narrow host ranges, and due to their self-replication, a low dosage is sufficient. Their high mutation rate helps them to adapt as the host bacteria undergoes genetic alterations to survive in a given environment. Phages have been effective in eradicating biofilms of single or mixed bacterial species and can lyse a biofilm grown on a chronic wound.^\[[@R60]\]^
Lactoferrin
-----------
It is an important non-heme iron-binding glycoprotein in milk, and its anti-bacterial activity is the most remarkable. Lactoferrin can inhibit and kill many micro-organisms, including Gram-positive, Gram-negative aerobes, anaerobes, and some fungi.^\[[@R59]\]^*In vitro* experiments showed that through adhesion and decomposing the extracellular polysaccharide of BBF, lactoferrin accelerates infiltration into the membrane to kill bacteria.^\[[@R61]\]^
Extracellular polymeric substance
---------------------------------
Treatment for the composition and structure of EPS has been a popular therapy in recent years. Extracellular polysaccharide degrading enzymes are typical examples, such as the glucose hydrolase (glucanase and insoluble glucanase), dispersin B, which can destroy the matrix of pathogenic biofilms in the oral cavity. Glycoside hydrolases are used to degrade biofilms on wounds infected with mixed bacteria (*S. aureus* and *P. aeruginosa*).^\[[@R62]--[@R64]\]^ Lysozyme (bacteriophage-encoded peptidoglycan hydrolases) can destroy bacteria in biofilms by degrading peptidoglycan in the bacterial cell wall.^\[[@R65]\]^ The engineered peptidoglycan hydrolases can bind to different anti-bacterial substances, and then cleave bacteria by binding to different binding sites of peptidoglycan. This method has been applied specifically to *S. aureus*.^\[[@R66]\]^ It has been proved to be effective in killing bacteria and removing biofilms.
Cationic anti-microbial peptides
--------------------------------
These peptides are a new family of anti-bacterial peptides found in recent years. It is a low molecular cationic peptide rich in arginine, which is widely distributed in animals, plants, and insects.^\[[@R67]\]^ It has high efficiency and broad spectrum anti-bacterial activity, and does not cause drug resistance and adverse reactions like other antibiotics; thus, it has good application prospects. It has been reported that RNA III inhibitory peptide is very effective in the treatment of severe microbial infections, including highly resistant bacteria such as methicillin-resistant *S. aureus*.^\[[@R68]\]^
QS system
---------
Because a quorum-sensing signal system plays a central role in regulating bacterial pathogenic factors, researchers assume that it may be a new target for the control of infectious diseases.^\[[@R59]\]^ It is hoped that it can inhibit the expression of pathogenic factors to achieve a therapeutic purpose.^\[[@R69]\]^ Therefore, signal molecular inhibitors in the QS system have been paid increasing attention in biomembrane therapy. For example, an in vitro study found that QS system autoinducer inhibitor can effectively inhibit bacterial adhesion and dissemination.^\[[@R70]\]^ Quorum-sensing inhibitor type I autoinducing peptide can dissolve methicillin-resistant *S. aureus*, which is clustered on the surface of titanium, making it more sensitive to rifampicin and levofloxacin.
Phytochemicals
--------------
Plant-based chemicals called phytochemicals are being increasingly explored as possible anti-therapeutic agents as they can kill micro-organisms with diverse mechanisms of action with a minimal chance for bacteria to develop resistance. Phytochemicals such as 7-hydroxycoumarin (7-HC), indole-3-carbinol (I3C), salicylic acid, and saponin have shown inhibitory activity against the planktonic culture of *E. coli* and *S. aureus,* and they were also able to restrict the growth of the biofilm partially. The phytochemicals I3C and 7-HC had a more pronounced effect on QS inhibition and bacterial motility for both *E. coli* and *S. aureus*.^\[[@R71]\]^
Hyperbaric oxygen therapy (HBOT) uses 100% oxygen at pressures greater than atmospheric pressure. HBOT has been successfully used as adjunctive therapy for wound healing.^\[[@R72]\]^ It can increase tissue metabolism, which can not only reduce the exudation and edema of damaged tissue, improve the local blood circulation, but also promote the formation of neovascularization, accelerate the establishment of collateral circulation, and accelerate the repair of epithelial tissue.^\[[@R73]\]^ Zhang *et al*^\[[@R74]\]^ studied the efficacy of hyperbaric oxygen in the treatment of submandibular cellulitis in children, and found that hyperbaric oxygen could promote the absorption of inflammation, accelerate wound healing, reduce the infection rate of post-operative incision, and shorten hospitalization time. Cimsit *et al*^\[[@R75]\]^ also suggested that hyperbaric oxygen can effectively control wound infection and accelerate wound healing. However, if hyperbaric oxygen is overused or treated incorrectly, adverse reactions such as barotrauma, oxygen poisoning, and decompression sickness will occur. Therefore, for the application of hyperbaric oxygen in biofilm chronic wounds, it is necessary to follow normal operation, strictly control the oxygen pressure and speed, and so on, to avoid unnecessary injury.
Other methods include scavenging enzyme and anti-oxidant enzymes, including alginase lyase, deoxyribonuclease I, poly-phosphate kinase, and others.^\[[@R75]\]^ Natural products such as proanthocyanidins in North American cranberry juice, ursolic acid in black sandalwood, and green tea polyphenols all have a good inhibitory effect on biofilms.^\[[@R76]\]^ The type II DNA-binding proteins can destroy the integrity of the eDNA structure.^\[[@R77]\]^ Integration host factor with high affinity can specifically bind to nucleic acid protein in biomembranes, and it has been widely used in animal models.^\[[@R78],[@R79]\]^ There are also genetic engineering drugs and stem cell therapy.^\[[@R80]\]^ Current therapeutic approaches being devised and used in the clinic are shown in Figure [1](#F1){ref-type="fig"}.
{#F1}
Future Prospects
================
This review provides clarity on the identification and management of biofilms, and it can be used as a tool by clinicians seeking to gain a better understanding of biofilms and a way for translating research to best clinical practice. Diagnostic guidelines are essential for evaluating the treatments of BBF; the efficacy of anti-biofilm treatment must indicate a significant reduction in bacteria as an outcome.^\[[@R25]\]^ BBFs are difficult to diagnose because cultures are not necessarily an accurate indicator of BBF. Thus, to investigate biofilms *in vivo*, identify an infectious etiology, or evaluate treatments, clear clinical signs, and symptoms of BBF are required.
Currently, researches on biofilms are still in the exploratory stage. With the extensive and in-depth development of related research, people will have a deeper and comprehensive understanding of the chronic recurrent infection caused by biofilms and its drug-resistance mechanism. From as early as 2008, the concept of "biofilm-based wound care," which aims to successfully remove BBF by inhibiting BBF re-formation, led to the improvement of other therapeutic care schemes (such as skin grafting, skin flap, or negative pressure wound treatment), which could change the wound from a difficult state to a treatable state.^\[[@R81]\]^ An increasing number of wound care experts believe many factors that delay wound healing, such as diabetes mellitus, endocarditis, periodontitis, osteomyelitis, and other systemic diseases; the use of graft and prosthesis like catheter indwelling, artificial heart valve, and joint replacement; patients with low autoimmune function, systemic malnutrition, and cell dysfunction,^\[[@R25]\]^ also increase the risk of BBF formation. Therefore, constantly updating the knowledge of BBF can help identify clinically high-risk patients and treat wounds.
Although successful cases of the clinical removal of BBF have been reported, specific methods and strategies are still in their initial stages. Thus, we predict that future studies will focus on the following: (1) increase in clinical studies on biofilm infections through the combination of clinical and laboratory identification tools to explore the effects of different intervention methods on the removal of biofilm; (2) analysis of the therapeutic target, considering how to exert the synergy and efficiency maximization of combined therapy according to the individual differences of wounds, and summarizing the nursing process of BBF wounds; (3) large-sample randomized controlled trials using active biofilm dressing in clinics and obtaining the best practice evidence; (4) joint diagnosis and treatment of multi-disciplinary medical nursing and emphasizing the importance of wound specialist nursing; and (5) consideration of a drug to penetrate existing biofilms as this feature affects both potential cytotoxicity and anti-bacterial efficacy, and the potential for *de novo* emergence of anti-microbial resistance.
Funding
=======
This work was supported by grants from the Program on Clinical Research Center for Wound Healing in Hunan province funded under the Science and Technology Department of Hunan Province (No. 2018SK7005), the Guiding Plan of Clinical Medical Technology Innovation in Hunan Province (No. 2018SK50905), the Innovation Platform Program: the Introduction of Foreign Intellectual Special in Hunan Province (No. 2019YZ3035), and National Major Special Research (No. ZDZX2017ZL-04-HN).
Conflicts of interest
=====================
None.
**How to cite this article:** Wei D, Zhu XM, Chen YY, Li XY, Chen YP, Liu HY, Zhang M. Chronic wound biofilms: diagnosis and therapeutic strategies. Chin Med J 2019;00:00--00. doi: 10.1097/CM9.0000000000000523
|
# SOME DESCRIPTIVE TITLE.
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the PACKAGE package.
# Chris Leonard <cjl@laptop.org>, 2012.
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2016-01-30 14:24+0000\n"
"PO-Revision-Date: 2017-05-06 18:00+0000\n"
"Last-Translator: Chris <cjl@sugarlabs.org>\n"
"Language-Team: Sugar Labs\n"
"Language: rw\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Pootle 2.5.1.1\n"
"X-POOTLE-MTIME: 1494093630.000000\n"
#: ../data/org.sugarlabs.gschema.xml.h:1
msgid "Migrated to GSettings"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:2
msgid "This key shows whether or not GConf values were migrated to GSettings"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:3 ../data/sugar.schemas.in.h:11
msgid "Backup URL"
msgstr "Garura URL"
#: ../data/org.sugarlabs.gschema.xml.h:4 ../data/sugar.schemas.in.h:12
msgid "URL where the backup is saved to."
msgstr "URL y'aho backup ibikwa."
#: ../data/org.sugarlabs.gschema.xml.h:5 ../data/sugar.schemas.in.h:31
msgid "Show Log out"
msgstr "Erekana Log out"
#: ../data/org.sugarlabs.gschema.xml.h:6 ../data/sugar.schemas.in.h:32
msgid "If TRUE, Sugar will show a \"Log out\" option."
msgstr "If TRUE, Sugar irerekana amahitamo yo \"Kuvamo\"."
#: ../data/org.sugarlabs.gschema.xml.h:7 ../data/sugar.schemas.in.h:33
msgid "Show Restart"
msgstr "Erekana Kongera gutangiza"
#: ../data/org.sugarlabs.gschema.xml.h:8 ../data/sugar.schemas.in.h:34
msgid "If TRUE, Sugar will show a \"Restart\" option."
msgstr "If TRUE, Sugar irerekana amahitamo yo \"Kongera gutangira\"."
#: ../data/org.sugarlabs.gschema.xml.h:9 ../data/sugar.schemas.in.h:35
msgid "Show Shutdown"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:10 ../data/sugar.schemas.in.h:36
#, fuzzy
msgid "If TRUE, Sugar will show a \"Shutdown\" option."
msgstr "If TRUE, Sugar irerekana amahitamo yo \"Kuvamo\"."
#: ../data/org.sugarlabs.gschema.xml.h:11 ../data/sugar.schemas.in.h:37
msgid "Show Register"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:12 ../data/sugar.schemas.in.h:38
msgid "If TRUE, Sugar will show a \"Register\" option in the buddy palette."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:13 ../data/sugar.schemas.in.h:63
msgid "Bundle IDs of protected activities"
msgstr "Ibirango by'ibizingo by'ibikorwa birinzwe"
#: ../data/org.sugarlabs.gschema.xml.h:14 ../data/sugar.schemas.in.h:64
msgid ""
"Users will not be allowed to erase these activities through the list view."
msgstr ""
"Abakoresha mudasobwa ntabwo bazemererwa gusiba igikorwa banyuze kureba "
"irondora."
#: ../data/org.sugarlabs.gschema.xml.h:15 ../data/sugar.schemas.in.h:79
msgid "A limit to the number of simultaneously open activities."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:16 ../data/sugar.schemas.in.h:80
msgid ""
"This int is used to set a limit to the number of open activities. By default "
"(0), there is no limit."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:17 ../data/sugar.schemas.in.h:1
msgid "User Name"
msgstr "Izina ry'ukoresha"
#: ../data/org.sugarlabs.gschema.xml.h:18 ../data/sugar.schemas.in.h:2
msgid "User name that is used throughout the desktop."
msgstr "izina rikoreswa kuri desktop hose."
#: ../data/org.sugarlabs.gschema.xml.h:19 ../data/sugar.schemas.in.h:3
msgid "Default nick"
msgstr "Nick yicyitegererezo"
#: ../data/org.sugarlabs.gschema.xml.h:20 ../data/sugar.schemas.in.h:4
msgid ""
"\"disabled\" to ask nick on initialization; \"system\" to reuse UNIX account "
"long name."
msgstr ""
"\"disabled\" kubaza nick mu itangira; \"system\" kongera gukoresha izina "
"rirerire rya konte UNIX."
#: ../data/org.sugarlabs.gschema.xml.h:21 ../data/sugar.schemas.in.h:5
msgid "User Color"
msgstr "Koresha Ibara"
#: ../data/org.sugarlabs.gschema.xml.h:22 ../data/sugar.schemas.in.h:6
msgid ""
"Color for the XO icon that is used throughout the desktop. The string is "
"composed of the stroke color and fill color, format is that of rgb colors. "
"Example: #AC32FF,#9A5200"
msgstr ""
"Ibara ry'akarango ryakoreshejwe kuri mudasobwa. String igizwe na stroke "
"color ndetse na fill color, foruma ni rgb. urugero: #AC32FF,#9A5200"
#: ../data/org.sugarlabs.gschema.xml.h:23
msgid "User Gender"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:24
msgid "Gender of the Sugar user, either male, female, or unassigned"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:25
msgid "User Birth Timestamp"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:26
msgid "Birth timestamp (seconds since the epoch)"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:27
msgid "Group Label"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:28
msgid "Label associated with age, e.g., '2nd Grade'"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:29
msgid "Background image path"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:30
msgid "Path to the image to be used as a background."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:31
msgid "Background alpha level"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:32
msgid "The opacity of the background image."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:33
msgid "Mimetype registry"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:34
msgid "Consists of key-value pairs mimetypes and their corresponding activity"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:35 ../data/sugar.schemas.in.h:7
msgid "Volume Level"
msgstr "ingano y'ijwi"
#: ../data/org.sugarlabs.gschema.xml.h:36 ../data/sugar.schemas.in.h:8
msgid "Volume level for the sound device."
msgstr "ingano y'ijwi y'igikoresho gisohora amajwi."
#: ../data/org.sugarlabs.gschema.xml.h:37 ../data/sugar.schemas.in.h:9
msgid "Sound Muted"
msgstr "Ijwi rya zimijwe"
#: ../data/org.sugarlabs.gschema.xml.h:38 ../data/sugar.schemas.in.h:10
msgid "Setting for muting the sound device."
msgstr "Setinga kuzimya ijwi ry'igikoresho."
#: ../data/org.sugarlabs.gschema.xml.h:39
msgid "Brightness Level"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:40
msgid "Brightness level for the computer screen."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:41
#: ../extensions/cpsection/datetime/view.py:66 ../data/sugar.schemas.in.h:13
msgid "Timezone"
msgstr "Igihe fatizo"
#: ../data/org.sugarlabs.gschema.xml.h:42 ../data/sugar.schemas.in.h:14
msgid "Timezone setting for the system."
msgstr "Gushyira ku gihe systeme."
#: ../data/org.sugarlabs.gschema.xml.h:43
msgid "Home views"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:44
msgid ""
"List of home views, including the view icon, the favorite icon and the layout"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:45
msgid "Launcher animation interval"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:46
msgid ""
"Delay in milliseconds between animation updates for launcher pulsing icon."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:47 ../data/sugar.schemas.in.h:19
msgid "Edge Delay"
msgstr "Gutinda kw'impande"
#: ../data/org.sugarlabs.gschema.xml.h:48 ../data/sugar.schemas.in.h:20
msgid "Delay for the activation of the frame using the edges."
msgstr "Gutinda kwemeza frame ukoresheje impera."
#: ../data/org.sugarlabs.gschema.xml.h:49 ../data/sugar.schemas.in.h:21
msgid "Corner Delay"
msgstr "Gutinda kw'inguni"
#: ../data/org.sugarlabs.gschema.xml.h:50 ../data/sugar.schemas.in.h:22
msgid "Delay for the activation of the frame using the corners."
msgstr "Gutinda kwemeza frame ukoresheje inguni."
#: ../data/org.sugarlabs.gschema.xml.h:51
msgid "Trigger Size"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:52
msgid "Size of the frame trigger area, in px from the corner/edge."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:53 ../data/sugar.schemas.in.h:23
msgid "Jabber Server"
msgstr "Seriveri Jabber"
#: ../data/org.sugarlabs.gschema.xml.h:54 ../data/sugar.schemas.in.h:24
msgid "URL of the jabber server to use."
msgstr "URL ya server jabber yo gukoreswa."
#: ../data/org.sugarlabs.gschema.xml.h:55 ../data/sugar.schemas.in.h:29
msgid "Publish to Gadget"
msgstr "Amamaza kuri Gadget"
#: ../data/org.sugarlabs.gschema.xml.h:56 ../data/sugar.schemas.in.h:30
msgid ""
"If TRUE, Sugar will make us searchable for the other users of the Jabber "
"server."
msgstr "If TRUE, Sugar izatuma tubonekera abandi bakoresha seriveri Jabber."
#: ../data/org.sugarlabs.gschema.xml.h:57
msgid "Social Help Server"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:58
msgid "URL of the social help server to use with protocol."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:59 ../data/sugar.schemas.in.h:25
msgid "Power Automatic"
msgstr "Umuriro otomatike"
#: ../data/org.sugarlabs.gschema.xml.h:60
#: ../extensions/cpsection/power/view.py:55 ../data/sugar.schemas.in.h:26
msgid "Automatic power management (increases battery life)"
msgstr "Ubugenzuzi bw`ingufu buri otomatike (ongera ubuzima bwa batiri)"
#: ../data/org.sugarlabs.gschema.xml.h:61 ../data/sugar.schemas.in.h:27
msgid "Power Extreme"
msgstr "Umuriro ku mpera"
#: ../data/org.sugarlabs.gschema.xml.h:62 ../data/sugar.schemas.in.h:28
msgid ""
"Extreme power management (disables wireless radio, increases battery life)"
msgstr ""
"Imicungire yo mu rwego rwo hejuru y'umuriro (ihagarikwa rya radiyo "
"idakoresha urusinga, byongera ubuzima bwa bateri)"
#: ../data/org.sugarlabs.gschema.xml.h:63 ../data/sugar.schemas.in.h:39
msgid "Keyboard layouts"
msgstr "Imimerere ya mwandikisho"
#: ../data/org.sugarlabs.gschema.xml.h:64 ../data/sugar.schemas.in.h:40
msgid ""
"List of keyboard layouts. Each entry should be in the form layout(variant)"
msgstr ""
"Rondora imigargarire ya mwandikisho. Ikinjijwe kigomba kuba mu "
"buryolayout(variant)"
#: ../data/org.sugarlabs.gschema.xml.h:65 ../data/sugar.schemas.in.h:41
msgid "Keyboard options"
msgstr "ihitamo rya mwandikisho"
#: ../data/org.sugarlabs.gschema.xml.h:66 ../data/sugar.schemas.in.h:42
msgid "List of keyboard options."
msgstr "Irondora ry'ubwoko bwa mwandikisho."
#: ../data/org.sugarlabs.gschema.xml.h:67 ../data/sugar.schemas.in.h:43
msgid "Keyboard model"
msgstr "ubwoko bwa mwandikisho"
#: ../data/org.sugarlabs.gschema.xml.h:68 ../data/sugar.schemas.in.h:44
msgid "The keyboard model to be used"
msgstr "Ubwoko bwa mwandikisho bwo gukoreswa"
#: ../data/org.sugarlabs.gschema.xml.h:69 ../data/sugar.schemas.in.h:45
msgid "Default font face"
msgstr "Imyandikire yicyitegererezo"
#: ../data/org.sugarlabs.gschema.xml.h:70 ../data/sugar.schemas.in.h:46
msgid "Font face that is used throughout the desktop."
msgstr "Akarango gakoreswa kuri desktop hose."
#: ../data/org.sugarlabs.gschema.xml.h:71 ../data/sugar.schemas.in.h:47
msgid "Default font size"
msgstr "Ingano y'amagambo y'ikitegerezo"
#: ../data/org.sugarlabs.gschema.xml.h:72 ../data/sugar.schemas.in.h:48
msgid "Font size that is used throughout the desktop."
msgstr "Ingano ikoreswa kuri desktop hose."
#: ../data/org.sugarlabs.gschema.xml.h:73 ../data/sugar.schemas.in.h:61
msgid "Show Sugar Ad-hoc networks"
msgstr "Erekana imiyooboro ya Sugar Ad-hoc"
#: ../data/org.sugarlabs.gschema.xml.h:74 ../data/sugar.schemas.in.h:62
msgid ""
"If TRUE, Sugar will show default Ad-hoc networks for channel 1,6 and 11. If "
"Sugar sees no \"known\" network when it starts, it does autoconnect to an Ad-"
"hoc network."
msgstr ""
"If TRUE, Sugar irerekana imiyoboro Ad-hoc y'mirongo 1,6 na 11. Iyo Sugar "
"itabonye imiyoboro \"izwi\" mu itangira, ihita yihuza ku miyoboro Ad-hoc."
#: ../data/org.sugarlabs.gschema.xml.h:75
msgid "Enable Ad-hoc autoconnect"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:76
msgid "If TRUE, Sugar will autoconnect to Ad-hoc networks."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:77 ../data/sugar.schemas.in.h:49
msgid "GSM network username (DEPRECATED/UNUSED)"
msgstr "Izina ry'ukoresha umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:78 ../data/sugar.schemas.in.h:50
msgid "GSM network username configuration (DEPRECATED/UNUSED)"
msgstr "Iboneza ry'izina ry'ukoresha umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:79 ../data/sugar.schemas.in.h:51
msgid "GSM network password (DEPRECATED/UNUSED)"
msgstr "ijambo banga ry'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:80 ../data/sugar.schemas.in.h:52
msgid "GSM network password configuration (DEPRECATED/UNUSED)"
msgstr "iboneza ry'ijambo banga ry'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:81 ../data/sugar.schemas.in.h:53
msgid "GSM network number (DEPRECATED/UNUSED)"
msgstr "umubare w'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:82 ../data/sugar.schemas.in.h:54
msgid "GSM network telephone number configuration (DEPRECATED/UNUSED)"
msgstr "iboneza rya numero ya telefoni y'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:83 ../data/sugar.schemas.in.h:55
msgid "GSM network APN (DEPRECATED/UNUSED)"
msgstr "APN y'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:84 ../data/sugar.schemas.in.h:56
msgid "GSM network access point name configuration (DEPRECATED/UNUSED)"
msgstr "iboneza ry'izina rya access point y'umuyoboro GSM(DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:85 ../data/sugar.schemas.in.h:57
msgid "GSM network PIN (DEPRECATED/UNUSED)"
msgstr "PIN y'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:86 ../data/sugar.schemas.in.h:58
msgid ""
"GSM network personal identification number configuration (DEPRECATED/UNUSED)"
msgstr "Iboneza ry'umubare uranga bwite ry'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:87 ../data/sugar.schemas.in.h:59
msgid "GSM network PUK (DEPRECATED/UNUSED)"
msgstr "PUK y'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:88 ../data/sugar.schemas.in.h:60
msgid "GSM network personal unlock key configuration (DEPRECATED/UNUSED)"
msgstr "Iboneza ry'urufunguzo bwite rw'umuyoboro GSM (DEPRECATED/UNUSED)"
#: ../data/org.sugarlabs.gschema.xml.h:89
msgid "TODO: add summary"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:90
msgid "TODO: add description"
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:91 ../data/sugar.schemas.in.h:65
msgid "Pitch value for the speech sugar service"
msgstr "Agaciro ka Pitch ka serivise ya speech"
#: ../data/org.sugarlabs.gschema.xml.h:92 ../data/sugar.schemas.in.h:66
msgid "Pitch value used by the speech service in Sugar"
msgstr "Agaciro ka Pitch kakoreshejwe na serivise ya speech muri sugar"
#: ../data/org.sugarlabs.gschema.xml.h:93 ../data/sugar.schemas.in.h:67
msgid "Rate value for the speech sugar service"
msgstr "Tanga agaciro ka serivisi ya speech muri sugar"
#: ../data/org.sugarlabs.gschema.xml.h:94 ../data/sugar.schemas.in.h:68
msgid "Rate value used by the speech service in Sugar"
msgstr "Tanga agaciro k'ibikoreswa muri serivise ya speech muri sugar"
#: ../data/org.sugarlabs.gschema.xml.h:95 ../data/sugar.schemas.in.h:69
msgid "Activity update backend."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:96 ../data/sugar.schemas.in.h:70
msgid ""
"Activity update backend module, followed by a period, followed by the class "
"name."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:97 ../data/sugar.schemas.in.h:71
msgid "Microformat update URL."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:98 ../data/sugar.schemas.in.h:72
msgid ""
"URL used by the microformat update backend for activity update information."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:99 ../data/sugar.schemas.in.h:73
msgid "Automatic update frequency."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:100 ../data/sugar.schemas.in.h:74
msgid ""
"Frequency of automatic activity updates, measured in days. 0 means disabled."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:101 ../data/sugar.schemas.in.h:75
msgid "Timestamp of last activity update."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:102 ../data/sugar.schemas.in.h:76
msgid ""
"A unix timestamp (seconds since epoch) of the last successful activity "
"update."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:103
msgid "New ASLO update.json URL."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:104
msgid "URL used by the new ASLO updater to download activity data."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:105 ../data/sugar.schemas.in.h:77
msgid "A description of the hardware available to the user."
msgstr ""
#: ../data/org.sugarlabs.gschema.xml.h:106 ../data/sugar.schemas.in.h:78
msgid "This string is displayed in the control panel, about computer section."
msgstr ""
#: ../extensions/cpsection/aboutme/__init__.py:23
msgid "About Me"
msgstr "Ibinyerecyeyeho"
#: ../extensions/cpsection/aboutme/model.py:51
msgid "You must enter a name."
msgstr "Ugomba kwinjiza izina."
#: ../extensions/cpsection/aboutme/model.py:83
#, python-format
msgid "stroke: color=%s hue=%s"
msgstr "stroke: ibara=%s igihu=%s"
#: ../extensions/cpsection/aboutme/model.py:86
#, python-format
msgid "stroke: %s"
msgstr "stroke: %s"
#: ../extensions/cpsection/aboutme/model.py:88
#, python-format
msgid "fill: color=%s hue=%s"
msgstr "fill: color=%s igihu=%s"
#: ../extensions/cpsection/aboutme/model.py:90
#, python-format
msgid "fill: %s"
msgstr "fill: %s"
#: ../extensions/cpsection/aboutme/model.py:102
msgid "Error in specified color modifiers."
msgstr "Ikosa mu mpindura y'ibara yavuzwe."
#: ../extensions/cpsection/aboutme/model.py:105
msgid "Error in specified colors."
msgstr "Ikosa mu mabara yavuzwe."
#: ../extensions/cpsection/aboutme/view.py:243
msgid "Click to change your color:"
msgstr "Kanda kugirango uhindure ibara:"
#: ../extensions/cpsection/aboutme/view.py:294
#: ../src/jarabe/intro/window.py:203
msgid "Select gender:"
msgstr ""
#: ../extensions/cpsection/aboutcomputer/__init__.py:21
msgid "About my Computer"
msgstr "Ibyerekeye mudasobwa yanjye"
#: ../extensions/cpsection/aboutcomputer/model.py:37
msgid "Not available"
msgstr "Ntibibashije kuboneka"
#: ../extensions/cpsection/aboutcomputer/view.py:76
msgid "Identity"
msgstr "Ikiranga"
#: ../extensions/cpsection/aboutcomputer/view.py:87
msgid "Model:"
msgstr ""
#: ../extensions/cpsection/aboutcomputer/view.py:91
msgid "Serial Number:"
msgstr "Numero ya seri:"
#: ../extensions/cpsection/aboutcomputer/view.py:103
msgid "Software"
msgstr "Porogaramu"
#: ../extensions/cpsection/aboutcomputer/view.py:112
msgid "Build:"
msgstr "Kubaka:"
#: ../extensions/cpsection/aboutcomputer/view.py:117
msgid "Sugar:"
msgstr "Sugar:"
#: ../extensions/cpsection/aboutcomputer/view.py:122
msgid "Firmware:"
msgstr "Firmware:"
#: ../extensions/cpsection/aboutcomputer/view.py:127
msgid "Wireless Firmware:"
msgstr "Wireless Firmware:"
#: ../extensions/cpsection/aboutcomputer/view.py:134
#, python-format
msgid "%d days ago"
msgstr ""
#: ../extensions/cpsection/aboutcomputer/view.py:136
#: ../src/jarabe/journal/journaltoolbox.py:169
msgid "Today"
msgstr "Uyu munsi"
#: ../extensions/cpsection/aboutcomputer/view.py:139
msgid "Last system update:"
msgstr ""
#: ../extensions/cpsection/aboutcomputer/view.py:150
msgid "Copyright and License"
msgstr "Uburenganzira bw'ikoporora n'amabwiriza"
#. TRANS: The word "Sugar" should not be translated.
#: ../extensions/cpsection/aboutcomputer/view.py:169
msgid ""
"Sugar is the graphical user interface that you are looking at. Sugar is free "
"software, covered by the GNU General Public License, and you are welcome to "
"change it and/or distribute copies of it under certain conditions described "
"therein."
msgstr ""
"Sugar ni garafike user interface muri kureba.Sugar ni software "
"y'ubuntu,igengwa na Lisense ya GNU,kandi ushobora kuyihindura cyangwa "
"gutanga amacopies ukurikije uburenganzira bugenga ikoporora buhari."
#: ../extensions/cpsection/aboutcomputer/view.py:181
msgid "Full license:"
msgstr "Uburenganzira bwuzuye:"
#: ../extensions/cpsection/background/__init__.py:21
msgid "Background"
msgstr "Mbuganyuma"
#: ../extensions/cpsection/background/view.py:48
msgid "Select a background:"
msgstr ""
#: ../extensions/cpsection/background/view.py:57
msgid "Clear background"
msgstr ""
#: ../extensions/cpsection/datetime/__init__.py:21
msgid "Date & Time"
msgstr "Itariki n'igihe"
#: ../extensions/cpsection/datetime/model.py:100
#, fuzzy
msgid "Error: timezone does not exist."
msgstr "Ikosa timezone ntiribaho."
#: ../extensions/cpsection/frame/__init__.py:21
msgid "Frame"
msgstr "Frame"
#: ../extensions/cpsection/frame/view.py:26
msgid "never"
msgstr "ntibizongere"
#: ../extensions/cpsection/frame/view.py:27
msgid "instantaneous"
msgstr "by'ako kanya"
#: ../extensions/cpsection/frame/view.py:28
#, python-format
msgid "%s seconds"
msgstr "%s amasegonda"
#: ../extensions/cpsection/frame/view.py:52
msgid "Activation Delay"
msgstr "Gutinda kwa activation"
#: ../extensions/cpsection/frame/view.py:68
#, fuzzy
msgid "Activation Area"
msgstr "Gutinda kwa activation"
#: ../extensions/cpsection/frame/view.py:85
msgid "Corner"
msgstr "Inguni"
#: ../extensions/cpsection/frame/view.py:104
msgid "Edge"
msgstr "Inkuta"
#: ../extensions/cpsection/frame/view.py:123
msgid "Size"
msgstr ""
#: ../extensions/cpsection/frame/view.py:221
msgid "toolbar size"
msgstr ""
#: ../extensions/cpsection/frame/view.py:226
msgid "exact corner or edge"
msgstr ""
#: ../extensions/cpsection/frame/view.py:228
msgid "exact corner"
msgstr ""
#: ../extensions/cpsection/frame/view.py:230
msgid "exact edge"
msgstr ""
#: ../extensions/cpsection/frame/view.py:232
msgid "ignored"
msgstr ""
#. TRANS: px as in pixels
#: ../extensions/cpsection/frame/view.py:235
msgid "{}px"
msgstr ""
#: ../extensions/cpsection/keyboard/__init__.py:21
#: ../extensions/cpsection/keyboard/view.py:38
msgid "Keyboard"
msgstr "Mwandikisho"
#: ../extensions/cpsection/keyboard/view.py:240
msgid "Keyboard Model"
msgstr "ubwoko bwa mwandikisho"
#: ../extensions/cpsection/keyboard/view.py:301
msgid "Key(s) to change layout"
msgstr "Infunguzo zihindura imimerere"
#: ../extensions/cpsection/keyboard/view.py:369
msgid "Keyboard Layout(s)"
msgstr "Imimerere ya mwandikisho"
#: ../extensions/cpsection/language/__init__.py:21
#: ../extensions/cpsection/language/view.py:39
msgid "Language"
msgstr "Ururimi"
#: ../extensions/cpsection/language/model.py:29
msgid "Could not access ~/.i18n. Create standard settings."
msgstr "Ntibishobotse kwinjira ~/.i18n. Rema ibipimo nyabyo."
#: ../extensions/cpsection/language/model.py:156
#, python-format
msgid "Language for code=%s could not be determined."
msgstr "Ururimi rwa code=%s ntirushoboye kuboneka."
#: ../extensions/cpsection/language/model.py:179
#, python-format
msgid "Sorry I do not speak '%s'."
msgstr "Ihangane sinshoboye kuvuga '%s'."
#: ../extensions/cpsection/language/view.py:75
msgid ""
"Add languages in the order you prefer. If a translation is not available, "
"the next in the list will be used."
msgstr ""
"Ongeraho indimi mu buryo ushaka.Niba ubusobanuro butabonetse,urukurira ku "
"rutonde nirwo rukoreswa."
#: ../extensions/cpsection/language/view.py:383
#, python-format
msgid "Error writting language configuration (%s)"
msgstr ""
#: ../extensions/cpsection/modemconfiguration/__init__.py:21
msgid "Modem"
msgstr ""
#: ../extensions/cpsection/modemconfiguration/view.py:94
msgid ""
"You will need to provide the following information to set up a mobile "
"broadband connection to a cellular (3G) network."
msgstr ""
"Ugomba gutanga amakuru akurikira kugirango connection ya mobile broadband "
"(3G) ikore."
#: ../extensions/cpsection/modemconfiguration/view.py:117
msgid "Country:"
msgstr ""
#: ../extensions/cpsection/modemconfiguration/view.py:118
msgid "Provider:"
msgstr ""
#: ../extensions/cpsection/modemconfiguration/view.py:119
msgid "Plan:"
msgstr ""
#: ../extensions/cpsection/modemconfiguration/view.py:160
msgid "Username:"
msgstr "Izina ukoresha:"
#: ../extensions/cpsection/modemconfiguration/view.py:167
msgid "Password:"
msgstr "Ijambo ry'ibanga:"
#: ../extensions/cpsection/modemconfiguration/view.py:174
msgid "Number:"
msgstr "Umubare:"
#: ../extensions/cpsection/modemconfiguration/view.py:181
msgid "Access Point Name (APN):"
msgstr "Izina rya Access Point(APN):"
#: ../extensions/cpsection/modemconfiguration/view.py:188
msgid "Personal Identity Number (PIN):"
msgstr "Ikiranga Umuntu Cyihariye(PIN):"
#: ../extensions/cpsection/modemconfiguration/model.py:162
#, python-format
msgid "Plan #%s"
msgstr ""
#: ../extensions/cpsection/modemconfiguration/model.py:292
#, python-format
msgid "Provider %s"
msgstr ""
#: ../extensions/cpsection/network/__init__.py:21
#: ../extensions/cpsection/network/view.py:30
msgid "Network"
msgstr "Rezo"
#: ../extensions/cpsection/network/model.py:88
msgid "State is unknown."
msgstr "States ntizizwi."
#: ../extensions/cpsection/network/model.py:104
msgid "Error in specified radio argument use on/off."
msgstr "Ikosain specified radio argument use on/off."
#: ../extensions/cpsection/network/model.py:197
msgid "Error in specified argument use 0/1."
msgstr "Ikosa muri argument yasobanuwe koresha 0/1."
#: ../extensions/cpsection/network/view.py:65
msgid "Wireless"
msgstr "Rezo itagira intsinga"
#: ../extensions/cpsection/network/view.py:73
msgid "The wireless radio may be turned off to save battery life."
msgstr ""
#: ../extensions/cpsection/network/view.py:86
msgid "Radio"
msgstr "Radiyo"
#: ../extensions/cpsection/network/view.py:103
msgid ""
"Discard wireless connections if you have trouble connecting to the network"
msgstr ""
#: ../extensions/cpsection/network/view.py:113
msgid "Discard wireless connections"
msgstr ""
#: ../extensions/cpsection/network/view.py:129
msgid "Collaboration"
msgstr "Ubufatanye"
#: ../extensions/cpsection/network/view.py:137
msgid ""
"The server is the equivalent of what room you are in; people on the same "
"server will be able to see each other, even when they aren't on the same "
"network."
msgstr ""
"Seriveri ihwanye n'icyumba urimo;abantu bari kuri seriveri imwe babasha "
"kubonana ku murongo,niyo bataba bari kuri rezo zimwe."
#: ../extensions/cpsection/network/view.py:147
msgid "Server:"
msgstr "Seriveri:"
#: ../extensions/cpsection/network/view.py:163
msgid ""
"Social Help is a forum that lets you connect with developers and discuss "
"Sugar Activities. Changing servers means discussions will happen in a "
"different place with different people."
msgstr ""
#: ../extensions/cpsection/network/view.py:173
msgid "Social Help Server:"
msgstr ""
#: ../extensions/cpsection/power/__init__.py:24
msgid "Power"
msgstr "Ingufu"
#: ../extensions/cpsection/power/model.py:90
msgid "Error in automatic pm argument, use on/off."
msgstr "Ikosa muri automatic pm argument,koresha on/off."
#: ../extensions/cpsection/power/view.py:45
msgid "Power management"
msgstr "Ubugenzuzi bw`ingufu"
#: ../extensions/cpsection/updater/__init__.py:21
msgid "Software Update"
msgstr "Ihindurwa rya software"
#: ../extensions/cpsection/updater/view.py:70
msgid ""
"Software updates correct errors, eliminate security vulnerabilities, and "
"provide new features."
msgstr ""
"Amakosa nyayo mu gushyira ku gihe software,kuraho ububi,kandi utange ibindi "
"bishya."
#: ../extensions/cpsection/updater/view.py:84
msgid "Update in progress..."
msgstr ""
#: ../extensions/cpsection/updater/view.py:119
msgid "Checking for updates..."
msgstr "Kugenzura ibiri ku gihe..."
#: ../extensions/cpsection/updater/view.py:121
msgid "Installing updates..."
msgstr "Gushyiramo ibiri ku gihe..."
#: ../extensions/cpsection/updater/view.py:150
#, python-format
msgid "Checking %s..."
msgstr "kugenzura %s..."
#: ../extensions/cpsection/updater/view.py:152
#, fuzzy
msgid "Looking for updates..."
msgstr "Kugenzura ibiri ku gihe..."
#: ../extensions/cpsection/updater/view.py:154
#, python-format
msgid "Downloading %s..."
msgstr "Kuzana ikintu %s..."
#: ../extensions/cpsection/updater/view.py:156
#, python-format
msgid "Updating %s..."
msgstr "Gushyira ku gihe %s..."
#: ../extensions/cpsection/updater/view.py:166
msgid "Your software is up-to-date"
msgstr "Software yawe yashizwe ku gihe"
#: ../extensions/cpsection/updater/view.py:168
#, python-format
msgid "You can install %s update"
msgid_plural "You can install %s updates"
msgstr[0] "ushobora kwinjiza %s y'ivugurura"
msgstr[1] "ushobora kwinjiza %s y'amavugurura"
#: ../extensions/cpsection/updater/view.py:183
msgid "Can't connect to the activity server"
msgstr ""
#: ../extensions/cpsection/updater/view.py:186
msgid "Verify your connection to internet and try again, or try again later"
msgstr ""
#: ../extensions/cpsection/updater/view.py:206
#, python-format
msgid "%s update was installed"
msgid_plural "%s updates were installed"
msgstr[0] "%s ikiri ku gihe cyashizwemo"
msgstr[1] "%s ibiri ku gihe byashyizwemo"
#: ../extensions/cpsection/updater/view.py:288
msgid "Install selected"
msgstr "Shyiramo ibyo wahisemo"
#: ../extensions/cpsection/updater/view.py:307
#, python-format
msgid "Download size: %s"
msgstr "Zana ibingana na: %s"
#: ../extensions/cpsection/updater/view.py:399
#, python-format
msgid "From version %(current)s to %(new)s (Size: %(size)s)"
msgstr "Kuva kuri verisiyo %(current)s kujya kuri %(new)s (Ingano: %(size)s)"
#: ../extensions/cpsection/updater/view.py:406
#, python-format
msgid "Version %(version)s (Size: %(size)s)"
msgstr ""
#. TRANS: download size is 0
#: ../extensions/cpsection/updater/view.py:423
msgid "None"
msgstr "Nta nakimwe"
#. TRANS: download size of very small updates
#: ../extensions/cpsection/updater/view.py:426
msgid "1 KB"
msgstr "KB 1"
#. TRANS: download size of small updates, e.g. '250 KB'
#: ../extensions/cpsection/updater/view.py:429
#, python-format
msgid "%.0f KB"
msgstr "%.0f KB"
#. TRANS: download size of updates, e.g. '2.3 MB'
#: ../extensions/cpsection/updater/view.py:432
#, python-format
msgid "%.1f MB"
msgstr "%.1f MB"
#: ../extensions/cpsection/webaccount/__init__.py:24
msgid "Web Services"
msgstr ""
#: ../extensions/cpsection/webaccount/view.py:65
#, python-format
msgid ""
"No web services are installed.\n"
"Please visit %s for more details."
msgstr ""
#: ../extensions/deviceicon/audio.py:69
msgid "My Audio"
msgstr ""
#: ../extensions/deviceicon/audio.py:330
msgid "Speaker"
msgstr ""
#: ../extensions/deviceicon/audio.py:331
msgid "Microphone"
msgstr ""
#: ../extensions/deviceicon/battery.py:69
msgid "My Battery"
msgstr "Batiri yanjye"
#: ../extensions/deviceicon/battery.py:151
msgid "Removed"
msgstr "Yakuweho"
#: ../extensions/deviceicon/battery.py:154
msgid "Charging"
msgstr "Gusharija"
#: ../extensions/deviceicon/battery.py:157
msgid "Very little power remaining"
msgstr "Hasiagaye ingufu nke cyane"
#. TRANS: do not translate %(hour)d:%(min).2d it is a variable,
#. only translate the word "remaining"
#: ../extensions/deviceicon/battery.py:164
#, python-format
msgid "%(hour)d:%(min).2d remaining"
msgstr "%(hour)d:%(min).2d isigaye"
#: ../extensions/deviceicon/battery.py:167
msgid "Charged"
msgstr "Yasharijwe"
#: ../extensions/deviceicon/display.py:187
msgid "My Display"
msgstr ""
#: ../extensions/deviceicon/display.py:189
msgid "Take a screenshot"
msgstr ""
#: ../extensions/deviceicon/display.py:211
msgid "Brightness"
msgstr ""
#: ../extensions/deviceicon/display.py:239
msgid "Display"
msgstr ""
#: ../extensions/deviceicon/frame.py:53
msgid "Show my keyboard"
msgstr "Erekana mwandikisho yanjye"
#: ../extensions/deviceicon/network.py:48
#, python-format
msgid "IP address: %s"
msgstr "IP address: %s"
#: ../extensions/deviceicon/network.py:80
#: ../extensions/deviceicon/network.py:297
#: ../src/jarabe/desktop/networkviews.py:134
#: ../src/jarabe/desktop/networkviews.py:510
msgid "Disconnect"
msgstr "Tandukanya"
#: ../extensions/deviceicon/network.py:106
#: ../extensions/deviceicon/network.py:290
#: ../src/jarabe/desktop/networkviews.py:250
#: ../src/jarabe/desktop/networkviews.py:552
#: ../src/jarabe/desktop/networkviews.py:696
msgid "Connecting..."
msgstr "Ihuza..."
# TODO: show the channel number
#: ../extensions/deviceicon/network.py:110
#: ../extensions/deviceicon/network.py:181
#: ../src/jarabe/desktop/networkviews.py:257
#: ../src/jarabe/desktop/networkviews.py:558
#: ../src/jarabe/desktop/networkviews.py:702
msgid "Connected"
msgstr "Byahujwe"
#: ../extensions/deviceicon/network.py:123
msgid "No wireless connection"
msgstr "Nta guhuzwa kw'umurongo udakoresha intsinga"
#: ../extensions/deviceicon/network.py:137
#: ../extensions/deviceicon/network.py:140
msgid "Channel"
msgstr "Umuyoboro"
#: ../extensions/deviceicon/network.py:138
#: ../src/jarabe/journal/expandedentry.py:386
#: ../src/jarabe/journal/listmodel.py:191
#: ../src/jarabe/journal/listmodel.py:199
msgid "Unknown"
msgstr "Kitazwi"
#: ../extensions/deviceicon/network.py:156
msgid "Wired Network"
msgstr "Network y'insinga"
#: ../extensions/deviceicon/network.py:184
msgid "Speed"
msgstr "Umuvuduko"
#: ../extensions/deviceicon/network.py:209
msgid "Wireless modem"
msgstr "Modemu idakoresha intsinga"
#: ../extensions/deviceicon/network.py:278
msgid "Please wait..."
msgstr "ihangane gato..."
#: ../extensions/deviceicon/network.py:282
#: ../src/jarabe/desktop/networkviews.py:128
#: ../src/jarabe/desktop/networkviews.py:504
#: ../src/jarabe/desktop/networkviews.py:647
msgid "Connect"
msgstr "Huza"
#: ../extensions/deviceicon/network.py:283
msgid "Disconnected"
msgstr "Byatandukanijwe"
#: ../extensions/deviceicon/network.py:289
#: ../src/jarabe/controlpanel/toolbar.py:121
#: ../src/jarabe/frame/activitiestray.py:693
#: ../src/jarabe/frame/activitiestray.py:815
#: ../src/jarabe/frame/activitiestray.py:848
#: ../src/jarabe/journal/expandedentry.py:157
#: ../src/jarabe/journal/journaltoolbox.py:587
#: ../src/jarabe/journal/palettes.py:166
msgid "Cancel"
msgstr "Kuraho"
#: ../extensions/deviceicon/network.py:327
msgid "Try connection again"
msgstr "Ongera ugerageze guhuza"
#: ../extensions/deviceicon/network.py:330
#, python-format
msgid "Error: %s"
msgstr "Ikosa: %s"
#: ../extensions/deviceicon/network.py:334
#, python-format
msgid "Suggestion: %s"
msgstr "ibyifuzo: %s"
#: ../extensions/deviceicon/network.py:344
#, python-format
msgid "Connected for %s"
msgstr "Bihujwe kuri %s"
#: ../extensions/deviceicon/network.py:349
#: ../extensions/deviceicon/network.py:350
#, python-format
msgid "%d KB"
msgstr "%d KB"
#: ../extensions/deviceicon/network.py:355
msgid "Check your PIN/PUK configuration."
msgstr "Genzura uko PIN/PUK yawe imeze."
#: ../extensions/deviceicon/network.py:358
msgid "Check your Access Point Name (APN) configuration"
msgstr "Genzura uko umurongo uguhuza wawe umeze(APN)"
#: ../extensions/deviceicon/network.py:362
msgid "Check the Number configuration."
msgstr "Genzura umubare w'iboneza."
#: ../extensions/deviceicon/network.py:364
msgid "Check your configuration."
msgstr "Genzura iboneza ryawe."
#: ../extensions/deviceicon/network.py:619
msgid "Mesh Network"
msgstr "Urusobe rwa rezo"
#: ../extensions/deviceicon/network.py:665
#, python-format
msgid "Mesh Network %s"
msgstr "Rezo ya Mesh %s"
#: ../extensions/deviceicon/network.py:782
msgid "No GSM connection available."
msgstr "Nta guhuzwa kwa GSM guhari."
#: ../extensions/deviceicon/network.py:783
msgid "Create a connection in My Settings."
msgstr ""
#: ../extensions/deviceicon/speech.py:49
msgid "Speech"
msgstr "Ijambo"
#: ../extensions/deviceicon/speech.py:72
#: ../extensions/deviceicon/speech.py:147
#: ../extensions/deviceicon/speech.py:152
msgid "Say selected text"
msgstr "Vuga interuro yahiswemo"
#: ../extensions/deviceicon/speech.py:80
msgid "Stop playback"
msgstr "Hagarika Gukina"
#: ../extensions/deviceicon/speech.py:89
msgid "Pitch"
msgstr "Pitch"
#: ../extensions/deviceicon/speech.py:104
msgid "Rate"
msgstr "Ikigereranyo"
#: ../extensions/deviceicon/speech.py:142
msgid "Pause playback"
msgstr "Hagarika akanya gato gukina"
#: ../extensions/deviceicon/touchpad.py:36
msgid "finger"
msgstr "urutoki"
#: ../extensions/deviceicon/touchpad.py:36
msgid "stylus"
msgstr "stylus"
#: ../extensions/deviceicon/touchpad.py:61
msgid "My touchpad"
msgstr "Touchpad yanjye"
#: ../extensions/deviceicon/volume.py:62 ../src/jarabe/view/palettes.py:210
msgid "Show contents"
msgstr "Erekana ibigize"
#: ../data/sugar.schemas.in.h:15
msgid "Favorites Layout"
msgstr "Ingano wihitiyemo"
#: ../data/sugar.schemas.in.h:16
msgid "Layout of the favorites view."
msgstr "Ingano y'ishusho wihitiyemo."
#: ../data/sugar.schemas.in.h:17
msgid "Favorites resume mode"
msgstr "Uburyo bw'isubukura wihitiyemo"
#: ../data/sugar.schemas.in.h:18
msgid ""
"When in resume mode, clicking on a favorite icon will cause the last entry "
"for that activity to be resumed."
msgstr ""
"Uri mu buryo bw'isubukura, gukanda kucyo wahisemo biratuma ibyakozwe "
"bwanyuma kuri icyo gikorwa bisubukurwa."
#: ../src/jarabe/controlpanel/cmd.py:28
#, python-format
msgid ""
"sugar-control-panel: WARNING, found more than one option with the same name: "
"%s module: %r"
msgstr ""
"sugar-control-panel: WARNING, found more than one option with the same name: "
"%s module: %r"
#: ../src/jarabe/controlpanel/cmd.py:30
#, python-format
msgid "sugar-control-panel: key=%s not an available option"
msgstr "sugar-control-panel: urufunguzo=%s uburyo ntibushoboye kuboneka"
#: ../src/jarabe/controlpanel/cmd.py:31
#, python-format
msgid "sugar-control-panel: %s"
msgstr "sugar-control-panel: %s"
# TRANS: Translators, there's a empty line at the end of this string,
# which must appear in the translated string (msgstr) as well.
#. TRANS: Translators, there's a empty line at the end of this string,
#. which must appear in the translated string (msgstr) as well.
#: ../src/jarabe/controlpanel/cmd.py:38
msgid ""
"Usage: sugar-control-panel [ option ] key [ args ... ] \n"
" Control for the sugar environment. \n"
" Options: \n"
" -h show this help message and exit \n"
" -l list all the available options \n"
" -h key show information about this key \n"
" -g key get the current value of the key \n"
" -s key set the current value for the key \n"
" -c key clear the current value for the key \n"
" "
msgstr ""
"Imikoreshereze: sugar-control-panel [ option] urufunguzo [ args ...] \n"
" Ikontororwa ry'imimerere ya sugar. \n"
" Uburyo: \n"
" -h yerekana inyandiko yo gufasha no kurekeraho \n"
" -l itondagura uburyo bwose buboneka \n"
" -h urufunguzo yerekana inkuru ijyanye n'uru "
"rufunguzo\n"
" -g urufunguzo izana agaciro k'urufunguzo \n"
" -s urufunguzo ihindura agaciro k'urufunguzo \n"
" -c urufunguzo Kuraho agaciro gasanzwe k'urufunguzo \n"
" "
#: ../src/jarabe/controlpanel/cmd.py:52
msgid ""
"To apply your changes you have to restart Sugar.\n"
"Hit ctrl+alt+erase on the keyboard to trigger a restart."
msgstr ""
#: ../src/jarabe/controlpanel/gui.py:373 ../src/jarabe/journal/palettes.py:194
#: ../src/jarabe/journal/palettes.py:364 ../src/jarabe/journal/palettes.py:424
#: ../src/jarabe/journal/volumestoolbar.py:304
msgid "Warning"
msgstr "Icyitonderwa"
#: ../src/jarabe/controlpanel/gui.py:374
#: ../src/jarabe/controlpanel/sectionview.py:45
msgid "Changes require restart"
msgstr "impinduka zikenera kongera gutangira"
#: ../src/jarabe/controlpanel/gui.py:379
msgid "Cancel changes"
msgstr "Kureka impinduka"
#: ../src/jarabe/controlpanel/gui.py:384
msgid "Later"
msgstr "nyumaho gato"
#: ../src/jarabe/controlpanel/gui.py:388
msgid "Restart now"
msgstr "Ongera utangire ubu"
#: ../src/jarabe/controlpanel/gui.py:419 ../src/jarabe/view/buddymenu.py:137
msgid "An activity is not responding."
msgstr ""
#: ../src/jarabe/controlpanel/gui.py:420 ../src/jarabe/view/buddymenu.py:138
msgid "You may lose unsaved work if you continue."
msgstr ""
#: ../src/jarabe/controlpanel/toolbar.py:56
#: ../src/jarabe/desktop/viewtoolbar.py:129
#: ../src/jarabe/journal/journaltoolbox.py:94
#, python-format
msgid "Search in %s"
msgstr "Shaka muri %s"
#: ../src/jarabe/controlpanel/toolbar.py:56
msgid "Settings"
msgstr "Amategura"
#: ../src/jarabe/controlpanel/toolbar.py:65 ../src/jarabe/intro/window.py:349
msgid "Done"
msgstr "Icyakozwe"
#: ../src/jarabe/controlpanel/toolbar.py:127
msgid "Ok"
msgstr "Nibyo"
#: ../src/jarabe/desktop/activitieslist.py:340
#, python-format
#, python-format,
msgid "Version %s"
msgstr "Verisiyo %s"
#: ../src/jarabe/desktop/activitieslist.py:424
#: ../src/jarabe/journal/listview.py:566 ../src/jarabe/journal/iconview.py:301
msgid "Clear search"
msgstr "Kuraho ishakisha"
#: ../src/jarabe/desktop/activitieslist.py:510
msgid "No matching activities"
msgstr "Nta bikorwa bihuye"
#: ../src/jarabe/desktop/activitieslist.py:546
msgid "Confirm erase"
msgstr "Emeza gusiba"
#: ../src/jarabe/desktop/activitieslist.py:548
#, python-format
msgid "Confirm erase: Do you want to permanently erase %s?"
msgstr "Emeza gusiba: Urashaka gusiba burundu %s?"
#: ../src/jarabe/desktop/activitieslist.py:552
#: ../src/jarabe/frame/clipboardmenu.py:65
#: ../src/jarabe/view/viewsource.py:383
msgid "Keep"
msgstr "Gumana"
#: ../src/jarabe/desktop/activitieslist.py:555
#: ../src/jarabe/desktop/activitieslist.py:625
#: ../src/jarabe/journal/expandedentry.py:151
#: ../src/jarabe/journal/journaltoolbox.py:545
#: ../src/jarabe/journal/journaltoolbox.py:582
#: ../src/jarabe/journal/journaltoolbox.py:806
#: ../src/jarabe/journal/journaltoolbox.py:812
#: ../src/jarabe/journal/palettes.py:138 ../src/jarabe/journal/palettes.py:161
msgid "Erase"
msgstr "Gusiba"
#: ../src/jarabe/desktop/activitieslist.py:641
msgid "Remove favorite"
msgstr "Kuraho icyo ukunda"
#: ../src/jarabe/desktop/activitieslist.py:645
msgid "Make favorite"
msgstr "Kora icyo ukunda"
# TRANS: label for the freeform layout in the favorites view
#. TRANS: label for the freeform layout in the favorites view
#: ../src/jarabe/desktop/favoriteslayout.py:209
msgid "Freeform"
msgstr "Freeform"
# TRANS: label for the ring layout in the favorites view
#. TRANS: label for the ring layout in the favorites view
#: ../src/jarabe/desktop/favoriteslayout.py:305
msgid "Ring"
msgstr "Isone"
#. TRANS: label for the spiral layout in the favorites view
#: ../src/jarabe/desktop/favoriteslayout.py:469
msgid "Spiral"
msgstr "Spiral"
#. TRANS: label for the box layout in the favorites view
#: ../src/jarabe/desktop/favoriteslayout.py:537
msgid "Box"
msgstr "Agasanduku"
#. TRANS: label for the box layout in the favorites view
#: ../src/jarabe/desktop/favoriteslayout.py:580
msgid "Triangle"
msgstr "Mpandeshatu"
#: ../src/jarabe/desktop/favoritesview.py:376
msgid "Registration"
msgstr ""
#: ../src/jarabe/desktop/favoritesview.py:377
msgid "Please wait, searching for your school server."
msgstr ""
#: ../src/jarabe/desktop/favoritesview.py:387
msgid "Registration Failed"
msgstr "Kwiyandikisha birananiranye"
#: ../src/jarabe/desktop/favoritesview.py:390
msgid "Registration Successful"
msgstr "Kwiyandikisha byatunganye"
#: ../src/jarabe/desktop/favoritesview.py:391
msgid "You are now registered with your school server."
msgstr "Ubu wanditswe muri server y`ishuri."
#: ../src/jarabe/desktop/favoritesview.py:680
msgid "Register"
msgstr "Kwiyandikisha"
#: ../src/jarabe/desktop/favoritesview.py:682
msgid "Register again"
msgstr "Ongera wiyandikishe"
#: ../src/jarabe/desktop/homewindow.py:255
#: ../src/jarabe/desktop/viewtoolbar.py:73
#: ../src/jarabe/frame/zoomtoolbar.py:57 ../src/jarabe/model/screenshot.py:63
#: ../src/jarabe/view/viewhelp.py:76
msgid "Home"
msgstr "Murugo"
#: ../src/jarabe/desktop/homewindow.py:262
#: ../src/jarabe/frame/zoomtoolbar.py:53 ../src/jarabe/model/screenshot.py:61
#: ../src/jarabe/view/viewhelp.py:73
msgid "Group"
msgstr "Itsinda"
#: ../src/jarabe/desktop/homewindow.py:269
#: ../src/jarabe/frame/zoomtoolbar.py:49
msgid "Neighborhood"
msgstr "Ubuturanyi"
#: ../src/jarabe/desktop/keydialog.py:92
#, python-format
msgid ""
"A wireless encryption key is required for\n"
" the wireless network '%s'."
msgstr ""
"Urufunguzo rwa \n"
"rezo idakoresha itsinga rurakenewe '%s'."
#: ../src/jarabe/desktop/keydialog.py:141
msgid "Key Type:"
msgstr "Ubwoko bw'Urufunguzo:"
#: ../src/jarabe/desktop/keydialog.py:161
msgid "Authentication Type:"
msgstr "Ubwoko bwo Kwivuga:"
#: ../src/jarabe/desktop/keydialog.py:224
msgid "WPA & WPA2 Personal"
msgstr "WPA & WPA2 yihariye"
#: ../src/jarabe/desktop/keydialog.py:233
msgid "Wireless Security:"
msgstr "Umutekano w'umuyoboro udakoresha intsinga:"
# TRANS: Action label for resuming an activity.
#. TRANS: Action label for resuming an activity.
#: ../src/jarabe/desktop/meshbox.py:82
#: ../src/jarabe/journal/journaltoolbox.py:659
#: ../src/jarabe/journal/palettes.py:83 ../src/jarabe/view/palettes.py:98
msgid "Resume"
msgstr "Subukura"
#: ../src/jarabe/desktop/meshbox.py:89
#: ../src/jarabe/frame/activitiestray.py:208
msgid "Join"
msgstr "Huza"
#: ../src/jarabe/desktop/networkviews.py:499
#, python-format
msgid "Ad-hoc Network %d"
msgstr "Umuyoboro Ad-hoc %d"
#: ../src/jarabe/desktop/networkviews.py:643
#, python-format
msgid "Mesh Network %d"
msgstr "Urusobe rwa rezo %d"
#: ../src/jarabe/desktop/schoolserver.py:144
msgid "Cannot connect to the server."
msgstr "Ntishoboye kwihuza na seriveri."
#: ../src/jarabe/desktop/schoolserver.py:151
msgid "The server could not complete the request."
msgstr "Seriveri ntishoboye kurangiza ibisabwa."
#: ../src/jarabe/desktop/viewtoolbar.py:95
msgid "List view"
msgstr "Ibigaragara ku rutonde"
#: ../src/jarabe/desktop/viewtoolbar.py:97
#: ../src/jarabe/desktop/viewtoolbar.py:196
#: ../src/jarabe/desktop/viewtoolbar.py:210
#, python-format
#, python-format,
msgid "<Ctrl>%d"
msgstr "<Ctrl>%d"
#: ../src/jarabe/frame/activitiestray.py:213
#: ../src/jarabe/frame/activitiestray.py:657
msgid "Decline"
msgstr "Kwanga"
#: ../src/jarabe/frame/activitiestray.py:598
#, python-format
msgid "%dB"
msgstr "%dB"
#: ../src/jarabe/frame/activitiestray.py:600
#, python-format
#, python-format,
msgid "%dKB"
msgstr "%dKB"
#: ../src/jarabe/frame/activitiestray.py:602
#, python-format
msgid "%dMB"
msgstr "%dMB"
#. TRANS: file transfer, bytes transferred, e.g. 128 of 1024
#: ../src/jarabe/frame/activitiestray.py:620
#, python-format
msgid "%s of %s"
msgstr "%s bya %s"
#: ../src/jarabe/frame/activitiestray.py:634
#, python-format
msgid "Transfer from %s"
msgstr "Vana kuri %s"
#: ../src/jarabe/frame/activitiestray.py:648
#: ../extensions/cpsection/backup/view.py:324
msgid "Accept"
msgstr "Emeza"
#: ../src/jarabe/frame/activitiestray.py:722
#: ../src/jarabe/frame/activitiestray.py:736
#: ../src/jarabe/frame/activitiestray.py:878
msgid "Dismiss"
msgstr "Sezerera"
#: ../src/jarabe/frame/activitiestray.py:750
msgid "The other participant canceled the file transfer"
msgstr "undi mufatanyije yahagaritse iyohereza ry'ubutumwa"
#: ../src/jarabe/frame/activitiestray.py:800
#, python-format
msgid "Transfer to %s"
msgstr "Ohereza kuri %s"
#: ../src/jarabe/frame/clipboardmenu.py:54
msgctxt "Clipboard"
msgid "Remove"
msgstr "Kuraho"
#: ../src/jarabe/frame/clipboardmenu.py:60
#: ../src/jarabe/frame/clipboardmenu.py:83
msgid "Open"
msgstr "Fungura"
#: ../src/jarabe/frame/clipboardmenu.py:88
msgid "Open with"
msgstr "Fungura na"
#: ../src/jarabe/frame/clipboardobject.py:50
#, python-format
msgid "%s clipping"
msgstr "%s birengeje"
#: ../src/jarabe/frame/zoomtoolbar.py:50
msgid "F1"
msgstr "F1"
#: ../src/jarabe/frame/zoomtoolbar.py:54
msgid "F2"
msgstr "F2"
#: ../src/jarabe/frame/zoomtoolbar.py:58
msgid "F3"
msgstr "F3"
#: ../src/jarabe/frame/zoomtoolbar.py:62 ../src/jarabe/model/screenshot.py:69
msgid "Activity"
msgstr "Igikorwa"
#: ../src/jarabe/frame/zoomtoolbar.py:63
msgid "F4"
msgstr "F4"
#: ../src/jarabe/intro/window.py:135
msgid "Name:"
msgstr "Izina:"
#: ../src/jarabe/intro/window.py:174
msgid "Click to change color:"
msgstr "Kanda uhindure ibara:"
#: ../src/jarabe/intro/window.py:337 ../src/jarabe/journal/detailview.py:95
msgid "Back"
msgstr "Inyuma"
#: ../src/jarabe/intro/window.py:352
msgid "Next"
msgstr "Ibikurikira"
#: ../src/jarabe/intro/agepicker.py:38
msgid "Select grade:"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:39
msgid "Preschool"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:39
msgid "Kindergarten"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:39
msgid "1st Grade"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:40
msgid "2nd Grade"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:40
msgid "3rd Grade"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:40
msgid "4th Grade"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:41
msgid "5th Grade"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:41
msgid "6th Grade"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:41
msgid "7th Grade"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:42
msgid "High School"
msgstr ""
#: ../src/jarabe/intro/agepicker.py:42
msgid "Adult"
msgstr ""
#: ../src/jarabe/journal/expandedentry.py:153
#: ../src/jarabe/journal/journaltoolbox.py:584
#: ../src/jarabe/journal/palettes.py:163
#, python-format
msgid "Do you want to permanently erase \"%s\"?"
msgstr "Ushaka gusiba burundu \"%s\"?"
#: ../src/jarabe/journal/expandedentry.py:296
#: ../src/jarabe/journal/listmodel.py:185 ../src/jarabe/journal/model.py:794
#: ../src/jarabe/journal/palettes.py:72 ../src/jarabe/journal/palettes.py:621
#: ../src/jarabe/journal/volumestoolbar.py:134
#: ../src/jarabe/journal/iconmodel.py:110
msgid "Untitled"
msgstr "Nta mutwe w`amagambo"
#: ../src/jarabe/journal/expandedentry.py:366
msgid "No preview"
msgstr "Nta kibanziriza"
#: ../src/jarabe/journal/expandedentry.py:386
#, python-format
msgid "Kind: %s"
msgstr "Ubwoko: %s"
#: ../src/jarabe/journal/expandedentry.py:387
#, python-format
msgid "Date: %s"
msgstr "Itariki: %s"
#: ../src/jarabe/journal/expandedentry.py:388
#, python-format
msgid "Size: %s"
msgstr "Ingano: %s"
#: ../src/jarabe/journal/expandedentry.py:412
#: ../src/jarabe/journal/misc.py:131
msgid "No date"
msgstr "Nta tariki"
#: ../src/jarabe/journal/expandedentry.py:421
msgid "Participants:"
msgstr "Abagize uruhare:"
#: ../src/jarabe/journal/expandedentry.py:459
msgid "Description:"
msgstr "Igisobanuro:"
#: ../src/jarabe/journal/expandedentry.py:465
msgid "Tags:"
msgstr "Tags:"
#: ../src/jarabe/journal/expandedentry.py:470
msgid "Comments:"
msgstr ""
#: ../src/jarabe/journal/journalactivity.py:182
#: ../src/jarabe/journal/journaltoolbox.py:94
#: ../src/jarabe/journal/palettes.py:260
#: ../src/jarabe/journal/volumestoolbar.py:349
#: ../src/jarabe/view/viewhelp.py:79
msgid "Journal"
msgstr "Ikinyamakuru"
#: ../src/jarabe/journal/journaltoolbox.py:103
msgid "Favorite entries"
msgstr ""
# TRANS: Item in a combo box that filters by entry type.
#. TRANS: Item on a palette that filters by entry type.
#: ../src/jarabe/journal/journaltoolbox.py:112
#: ../src/jarabe/journal/journaltoolbox.py:403
#: ../src/jarabe/journal/journaltoolbox.py:479
msgid "Anything"
msgstr "Icyo aricyo cyose"
#: ../src/jarabe/journal/journaltoolbox.py:118
#: ../src/jarabe/journal/journaltoolbox.py:165
#: ../src/jarabe/journal/journaltoolbox.py:483
msgid "Anytime"
msgstr "Igihe icyo aricyo cyose"
#: ../src/jarabe/journal/journaltoolbox.py:172
msgid "Since yesterday"
msgstr "Kuva ejo hashize"
# TRANS: Filter entries modified during the last 7 days.
#: ../src/jarabe/journal/journaltoolbox.py:175
msgid "Past week"
msgstr "Icyumweru gishize"
# TRANS: Filter entries modified during the last 30 days.
#: ../src/jarabe/journal/journaltoolbox.py:178
msgid "Past month"
msgstr "Ukwezi gushize"
# TRANS: Filter entries modified during the last 356 days.
#: ../src/jarabe/journal/journaltoolbox.py:181
msgid "Past year"
msgstr "Umwaka ushize"
#: ../src/jarabe/journal/journaltoolbox.py:521
#: ../src/jarabe/journal/palettes.py:105
msgid "Copy to"
msgstr "Kopororera ku"
#: ../src/jarabe/journal/journaltoolbox.py:529
#: ../src/jarabe/journal/palettes.py:116 ../src/jarabe/view/viewsource.py:379
msgid "Duplicate"
msgstr "Subiramo"
#: ../src/jarabe/journal/journaltoolbox.py:535
msgid "Refresh"
msgstr ""
#: ../src/jarabe/journal/journaltoolbox.py:577
#: ../src/jarabe/journal/palettes.py:156 ../src/jarabe/journal/palettes.py:374
#: ../src/jarabe/journal/volumestoolbar.py:312
#, python-format
msgid "Error while copying the entry. %s"
msgstr "Ikosa mu gukoporora icyinzizwa. %s"
#: ../src/jarabe/journal/journaltoolbox.py:578
#: ../src/jarabe/journal/palettes.py:157 ../src/jarabe/journal/palettes.py:375
#: ../src/jarabe/journal/volumestoolbar.py:313
msgid "Error"
msgstr "Ikosa"
# TRANS: Action label for starting an entry.
#. TRANS: Action label for starting an entry.
#: ../src/jarabe/journal/journaltoolbox.py:662
#: ../src/jarabe/journal/palettes.py:86
msgid "Start"
msgstr "Tangira"
#: ../src/jarabe/journal/journaltoolbox.py:682
#: ../src/jarabe/journal/palettes.py:100 ../src/jarabe/journal/palettes.py:513
msgid "No activity to start entry"
msgstr "Nta Gikorwa cyafungura ibyinjijwe"
#: ../src/jarabe/journal/journaltoolbox.py:700
msgid "Sort view"
msgstr "Tandukanya ukureba"
#: ../src/jarabe/journal/journaltoolbox.py:711
msgid "Sort by date modified"
msgstr "Tandukanya uhereye ku itariki byahinduriweho"
#: ../src/jarabe/journal/journaltoolbox.py:712
msgid "Sort by date created"
msgstr "Tandukanya uhereye ku itariki byakorewe"
#: ../src/jarabe/journal/journaltoolbox.py:713
msgid "Sort by size"
msgstr "Tandukanya uhereye ku ngano"
#: ../src/jarabe/journal/journaltoolbox.py:778
msgid "Deselect all"
msgstr ""
#: ../src/jarabe/journal/journaltoolbox.py:791
msgid "Select all"
msgstr ""
#: ../src/jarabe/journal/journaltoolbox.py:817
#, python-format
msgid "Do you want to erase %d entry?"
msgid_plural "Do you want to erase %d entries?"
msgstr[0] ""
msgstr[1] ""
#: ../src/jarabe/journal/journaltoolbox.py:831
#: ../src/jarabe/journal/palettes.py:378
msgid "Copy"
msgstr ""
#. TRANS: Do not translate %(selected)d and %(total)d.
#: ../src/jarabe/journal/journaltoolbox.py:882
#, python-format
msgid "Selected %(selected)d of %(total)d"
msgstr ""
#: ../src/jarabe/journal/journaltoolbox.py:917
msgid "Select filter"
msgstr ""
#: ../src/jarabe/journal/listview.py:473 ../src/jarabe/journal/iconview.py:212
msgid "Your Journal is empty"
msgstr "Ikinyamakuru cyawe ntakintu cyanditsemo"
#: ../src/jarabe/journal/listview.py:476 ../src/jarabe/journal/iconview.py:215
msgid "Your documents folder is empty"
msgstr "Ububiko bw'inyandiko zawe burimo ubusa"
#: ../src/jarabe/journal/listview.py:478 ../src/jarabe/journal/iconview.py:217
msgid "The device is empty"
msgstr "Igikoresho kiriho ubusa"
#: ../src/jarabe/journal/listview.py:480 ../src/jarabe/journal/iconview.py:220
msgid "No matching entries"
msgstr "Nta bihuye n'ibyinjijwe bibonetse"
#: ../src/jarabe/journal/misc.py:313
#, python-format
msgid "Older Version Of %s Activity"
msgstr "Verisiyo ya kera y'igikorwa %s"
#: ../src/jarabe/journal/misc.py:314
#, python-format
msgid "Do you want to downgrade to version %s"
msgstr "Ese ushako kumanura kuri versio %s"
#: ../src/jarabe/journal/modalalert.py:63
msgid "Your Journal is full"
msgstr "Ikinyamakuru cyawe kiruzuye"
#: ../src/jarabe/journal/modalalert.py:68
msgid "Please delete some old Journal entries to make space for new ones."
msgstr "Siba ibishaje mu kinyamakuru kugirango ubone umwanya w'ibishya."
#: ../src/jarabe/journal/modalalert.py:82
msgid "Show Journal"
msgstr "Erekana ikinyamakuru"
#: ../src/jarabe/journal/objectchooser.py:171
msgid "Choose an object"
msgstr "Hitamo ikintu"
#: ../src/jarabe/journal/objectchooser.py:176
#, python-format
msgid "Choose an object to open with %s activity"
msgstr ""
#: ../src/jarabe/journal/objectchooser.py:184
#: ../src/jarabe/view/viewhelp.py:335 ../src/jarabe/view/viewsource.py:579
msgid "Close"
msgstr "Funga"
#: ../src/jarabe/journal/palettes.py:84
msgid "Resume with"
msgstr "Subukura na"
#: ../src/jarabe/journal/palettes.py:87
msgid "Start with"
msgstr "Tangiza"
#: ../src/jarabe/journal/palettes.py:124
msgid "Send to"
msgstr "Ohereza kuri"
#: ../src/jarabe/journal/palettes.py:133
msgid "View Details"
msgstr "Reba Birambuye"
#: ../src/jarabe/journal/palettes.py:193
msgid "Entries without a file cannot be sent."
msgstr "Ibyinjijwe bidafite ububiko ntibishobora kwoherezwa."
#: ../src/jarabe/journal/palettes.py:272
#: ../src/jarabe/journal/volumestoolbar.py:214
msgid "Documents"
msgstr "Inyandiko"
#: ../src/jarabe/journal/palettes.py:363 ../src/jarabe/journal/palettes.py:423
#: ../src/jarabe/journal/volumestoolbar.py:303
msgid "Entries without a file cannot be copied."
msgstr "ibinjijwe bidafite ububiko ntibishobora gukopororwa."
#: ../src/jarabe/journal/palettes.py:383
#, python-format
msgid "Do you want to copy %d entry?"
msgid_plural "Do you want to copy %d entries?"
msgstr[0] ""
msgstr[1] ""
#: ../src/jarabe/journal/palettes.py:408
msgid "Clipboard"
msgstr "Clipboard"
#: ../src/jarabe/journal/palettes.py:478
msgid "No friends present"
msgstr "Nta shuti zihari"
#: ../src/jarabe/journal/palettes.py:483
msgid "No valid connection found"
msgstr "Nta muyoboro ubonetse"
#: ../src/jarabe/journal/palettes.py:511
msgid "No activity to resume entry"
msgstr "Nta gikorwa cyasubukura icyinjizwe"
#: ../src/jarabe/journal/palettes.py:580 ../src/jarabe/view/palettes.py:133
msgid "Stop"
msgstr "Hagarara"
#: ../src/jarabe/journal/palettes.py:585
#: ../extensions/cpsection/backup/view.py:212
#: ../extensions/cpsection/backup/view.py:265
msgid "Continue"
msgstr ""
#: ../src/jarabe/journal/palettes.py:622
#, python-format
msgid "%(index)d of %(total)d : %(object_title)s"
msgstr ""
#: ../src/jarabe/journal/volumestoolbar.py:375
#: ../src/jarabe/view/palettes.py:251 ../src/jarabe/view/palettes.py:317
#, python-format
msgid "%(free_space)d MB Free"
msgstr "%(free_space)d MB Free"
#: ../src/jarabe/model/desktop.py:85
#, python-format
#, python-format, fuzzy
msgid "Favorites view %d"
msgstr "Reba ibyagushimishije %d"
#: ../src/jarabe/model/network.py:217
msgid "The reason for the device state change is unknown."
msgstr "Impamvu y'ihinduka ry'imiterere y'igikororesho ntizwi."
#: ../src/jarabe/model/network.py:219
msgid "The state change is normal."
msgstr "Ihinduka rirasanzwe."
#: ../src/jarabe/model/network.py:221
msgid "The device is now managed."
msgstr "Ubu igikoresho kiragenzuwe."
#: ../src/jarabe/model/network.py:223
msgid "The device is no longer managed."
msgstr "Igikoresho ntikikigenzuwe."
#: ../src/jarabe/model/network.py:225
msgid "The device could not be readied for configuration."
msgstr "Igikoresho nticyashoboye gutungannwa ngo kibonezwe."
#: ../src/jarabe/model/network.py:227
msgid ""
"IP configuration could not be reserved (no available address, timeout, etc)."
msgstr ""
"Iboneza rya IP ntiryabashije kubikwa(nta aderesi ihari, igihe "
"cyarangiye,...)."
#: ../src/jarabe/model/network.py:230
msgid "The IP configuration is no longer valid."
msgstr "Iboneza rya IP ntirigifite agaciro."
#: ../src/jarabe/model/network.py:232
msgid "Secrets were required, but not provided."
msgstr "Amabanga yasabwe, ariko ntiyatanzwe."
#: ../src/jarabe/model/network.py:234
msgid ""
"The 802.1X supplicant disconnected from the access point or authentication "
"server."
msgstr "Usaba 802.1X yavuye kuri Access point changwa kuri seriveri y'emeza."
#: ../src/jarabe/model/network.py:237
msgid "Configuration of the 802.1X supplicant failed."
msgstr "Iboneza rya 802.1X usaba ntiryakunze."
#: ../src/jarabe/model/network.py:239
msgid "The 802.1X supplicant quit or failed unexpectedly."
msgstr "usaba 802.1X yavuyeho cg yananiwe bitunguranye."
#: ../src/jarabe/model/network.py:241
msgid "The 802.1X supplicant took too long to authenticate."
msgstr "usaba 802.1X yatwaye igihe kirekire mu kwimwnyekanisha."
#: ../src/jarabe/model/network.py:243
msgid "The PPP service failed to start within the allowed time."
msgstr "Servise ya PPP yananiwe gutangira mu gihe kemewe."
#: ../src/jarabe/model/network.py:245
msgid "The PPP service disconnected unexpectedly."
msgstr "Sevise ya PPP yavuye kumurongo bitunguranye."
#: ../src/jarabe/model/network.py:247
msgid "The PPP service quit or failed unexpectedly."
msgstr "Service ya PPP yavuyeho cyangwa yananiwe bitunguranye."
#: ../src/jarabe/model/network.py:249
msgid "The DHCP service failed to start within the allowed time."
msgstr "Service ya DHCP yananiwe gutangira mu gihe cyemewe."
#: ../src/jarabe/model/network.py:251
msgid "The DHCP service reported an unexpected error."
msgstr "Service ya DHCP yagaragaje ikosa ritunguranye."
#: ../src/jarabe/model/network.py:253
msgid "The DHCP service quit or failed unexpectedly."
msgstr "Service ya DHCP yavuyeho cyangwa yananiwe bitunguranye."
#: ../src/jarabe/model/network.py:255
msgid "The shared connection service failed to start."
msgstr "Service y'umuyoboro uhuriweho yananiwe gutangira."
#: ../src/jarabe/model/network.py:257
msgid "The shared connection service quit or failed unexpectedly."
msgstr "Service y'umuyoboro uhuriweho yavuyeho cyangwa yananiwe bitunguranye."
#: ../src/jarabe/model/network.py:260
msgid "The AutoIP service failed to start."
msgstr "Service ya AutoIP yananiwe gutangira."
#: ../src/jarabe/model/network.py:262
msgid "The AutoIP service reported an unexpected error."
msgstr "Service ya AutoIP yagaragaje ikosa ritunguranye."
#: ../src/jarabe/model/network.py:264
msgid "The AutoIP service quit or failed unexpectedly."
msgstr "Service ya AutoIP yavuyeho cyangwa yananiwe bitunguranye."
#: ../src/jarabe/model/network.py:266
msgid "Dialing failed because the line was busy."
msgstr "Guhamagara byananiranye kubera umurongo wari uri gukoreswa."
#: ../src/jarabe/model/network.py:268
msgid "Dialing failed because there was no dial tone."
msgstr "Guhamagara byananiranye kubera nta jwi rihamagara ririmo."
#: ../src/jarabe/model/network.py:270
msgid "Dialing failed because there was no carrier."
msgstr "Guhamagara byananiranye kubera nta cyohereza gihari."
#: ../src/jarabe/model/network.py:272
msgid "Dialing timed out."
msgstr "Guhamagara byarengeje igihe."
#: ../src/jarabe/model/network.py:274
msgid "Dialing failed."
msgstr "Guhamagara byananiranye."
#: ../src/jarabe/model/network.py:276
msgid "Modem initialization failed."
msgstr "Itangira rya modem ryananiranye."
#: ../src/jarabe/model/network.py:278
msgid "Failed to select the specified GSM APN"
msgstr "Ihitamo rya GSM APN yagaragajwe ryananiranye"
#: ../src/jarabe/model/network.py:280
msgid "Not searching for networks."
msgstr "Ntabwo uri gushakisha imiyoboro."
#: ../src/jarabe/model/network.py:282
msgid "Network registration was denied."
msgstr "Kwandikisha umuyoboro byahakanwe."
#: ../src/jarabe/model/network.py:284
msgid "Network registration timed out."
msgstr "Kwandikisha umuyoboro byarengeje igihe."
#: ../src/jarabe/model/network.py:286
msgid "Failed to register with the requested GSM network."
msgstr "Kwandikisha ukoresheje umuyoboro GSM wasabwe byananiranye."
#: ../src/jarabe/model/network.py:288
msgid "PIN check failed."
msgstr "Igenzura rya PIN ryananiranye."
#: ../src/jarabe/model/network.py:290
msgid "Necessary firmware for the device may be missing."
msgstr "Firmware ikenewe y'igikoresho ishobora kuba ibura."
#: ../src/jarabe/model/network.py:292
msgid "The device was removed."
msgstr "Igikoresho cyakuweho."
#: ../src/jarabe/model/network.py:294
msgid "NetworkManager went to sleep."
msgstr "NetworkManager yagiye gusinzira."
#: ../src/jarabe/model/network.py:296
msgid "The device's active connection was removed or disappeared."
msgstr "Ukwihuza kw'igikoresho kwakuweho cyangwa cyabuze."
#: ../src/jarabe/model/network.py:299
msgid "A user or client requested the disconnection."
msgstr "Uwukoresha cyangwa umukiriya yasabwe kwitandukanya ku muyoboro."
#: ../src/jarabe/model/network.py:301
msgid "The device's carrier/link changed."
msgstr "Carrier/link y'igikoresho yahinduwe."
#: ../src/jarabe/model/network.py:303
msgid "The device's existing connection was assumed."
msgstr "Ukwihuza kwigikoresho kwaraketswe."
#: ../src/jarabe/model/network.py:305
msgid "The supplicant is now available."
msgstr "Supplicant arahari noneho."
#: ../src/jarabe/model/network.py:307
msgid "The modem could not be found."
msgstr "Modemu ntiyabashije kuboneka."
#: ../src/jarabe/model/network.py:309
msgid "The Bluetooth connection failed or timed out."
msgstr "Ukwihuza kwa Bluetooth kwananiranye cyangwa kwarengeje igihe."
#: ../src/jarabe/model/network.py:311
msgid "Unused."
msgstr "Ntikoreshejwe."
#: ../src/jarabe/model/screenshot.py:59 ../src/jarabe/view/viewhelp.py:70
msgid "Mesh"
msgstr "Urusobekerane"
#: ../src/jarabe/model/screenshot.py:72
msgid "Screenshot"
msgstr "Ekara ntoya"
#: ../src/jarabe/model/screenshot.py:74
#, python-format
msgid "Screenshot of \"%s\""
msgstr "ifoto ya ekara \"%s\""
#: ../src/jarabe/view/alerts.py:38 ../src/jarabe/view/alerts.py:48
msgid "Activity launcher"
msgstr ""
#: ../src/jarabe/view/alerts.py:39
#, python-format
msgid "%s is already running. Please stop %s before launching it again."
msgstr ""
#: ../src/jarabe/view/alerts.py:49
msgid ""
"The maximum number of open activities has been reached. Please close an "
"activity before launching a new one."
msgstr ""
#: ../src/jarabe/view/buddymenu.py:73
msgid "Remove friend"
msgstr "Kuraho inshuti"
#: ../src/jarabe/view/buddymenu.py:76
msgid "Make friend"
msgstr "Gira inshuti"
#: ../src/jarabe/view/buddymenu.py:108
msgid "Shutdown"
msgstr "Zimya"
#: ../src/jarabe/view/buddymenu.py:113
msgid "Restart"
msgstr "Ongera utangire"
#: ../src/jarabe/view/buddymenu.py:119
msgid "Logout"
msgstr "Vamo"
#: ../src/jarabe/view/buddymenu.py:124
msgid "My Settings"
msgstr "Amahitamo yanjye"
#: ../src/jarabe/view/buddymenu.py:183
#, python-format
msgid "Invite to %s"
msgstr "Tumira ku %s"
#: ../src/jarabe/view/launcher.py:159
#, python-format
msgid "<b>%s</b> failed to start."
msgstr "<b>%s</b> yananiwe gutangira."
#: ../src/jarabe/view/palettes.py:53
msgid "Starting..."
msgstr "Gutangira..."
#: ../src/jarabe/view/palettes.py:63
msgid "Activity failed to start"
msgstr "Igikorwa cyananiwe gutangira"
#. TODO: share-with, keep
#: ../src/jarabe/view/palettes.py:105
msgid "View Source"
msgstr "Reba inkomoko"
#: ../src/jarabe/view/palettes.py:112
msgid "View Help"
msgstr ""
#: ../src/jarabe/view/palettes.py:179
msgid "Start new"
msgstr "Tangira igisha"
#: ../src/jarabe/view/palettes.py:266
msgctxt "Volume"
msgid "Remove"
msgstr "Kuraho"
#: ../src/jarabe/view/viewhelp.py:304
msgid "Help Manual"
msgstr ""
#: ../src/jarabe/view/viewhelp.py:318
msgid "Social Help"
msgstr ""
#: ../src/jarabe/view/viewhelp.py:326
#, python-format
msgid "Help: %s"
msgstr ""
#: ../src/jarabe/view/viewsource.py:364
msgid "Instance Source"
msgstr "Inkomoko itunguranye"
#: ../src/jarabe/view/viewsource.py:392
#, python-format
msgid "Do you want to duplicate %s Activity?"
msgstr ""
#: ../src/jarabe/view/viewsource.py:394
msgid "This may take a few minutes"
msgstr ""
#: ../src/jarabe/view/viewsource.py:408
msgid "Duplicating activity..."
msgstr ""
#: ../src/jarabe/view/viewsource.py:447
#, fuzzy
msgid "Duplicated"
msgstr "Subiramo"
#: ../src/jarabe/view/viewsource.py:448
msgid "The activity has been duplicated"
msgstr ""
#: ../src/jarabe/view/viewsource.py:462
msgid "Duplicated activity already exists"
msgstr ""
#: ../src/jarabe/view/viewsource.py:463
msgid "Delete your copy before trying to duplicate the activity again"
msgstr ""
#: ../src/jarabe/view/viewsource.py:478
msgid "Source"
msgstr "Inkomoko"
#: ../src/jarabe/view/viewsource.py:542
msgid "Activity Bundle Source"
msgstr "Inkomoko ya Activity Bundle"
#: ../src/jarabe/view/viewsource.py:561
msgid "Sugar Toolkit Source"
msgstr "Inkomoko ya Sugar Toolkit"
#: ../src/jarabe/view/viewsource.py:568
#, python-format
#, python-format,
msgid "View source: %s"
msgstr "Reba inkomoko: %s"
#: ../src/jarabe/view/viewsource.py:569
#, python-format
msgid "View source: %r"
msgstr "Reba inkomoko: %r"
#: ../src/jarabe/view/viewsource.py:809
msgid "Please select a file in the left panel."
msgstr ""
#: ../extensions/cpsection/backup/__init__.py:22
msgid "Backup"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:61
#: ../extensions/cpsection/backup/backends/volume.py:171
msgid "Please connect a device to continue"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:69
#: ../extensions/cpsection/backup/backends/volume.py:178
msgid "Select your volume"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:78
msgid "Not enough space in volume"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:122
#, python-format
msgid "Backup from user %s"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:191
msgid "No checkpoints found in the device"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:199
msgid "Select your checkpoint"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:210
msgid "Not enough space in disk"
msgstr ""
#: ../extensions/cpsection/backup/backends/volume.py:329
msgid "Local Device Backup"
msgstr ""
#: ../extensions/cpsection/backup/view.py:133
msgid "Save the contents of your Journal"
msgstr ""
#: ../extensions/cpsection/backup/view.py:141
msgid "Restore the contents of your Journal"
msgstr ""
#: ../extensions/cpsection/backup/view.py:223
msgid "Please close all the activities, and start again"
msgstr ""
#: ../extensions/cpsection/backup/view.py:229
msgid "Select where you want create your backup"
msgstr ""
#: ../extensions/cpsection/backup/view.py:231
msgid "Select where you want retrieve your restore"
msgstr ""
#: ../extensions/cpsection/backup/view.py:271
msgid "Retry"
msgstr ""
#: ../extensions/cpsection/backup/view.py:290
msgid "Starting backup..."
msgstr ""
#: ../extensions/cpsection/backup/view.py:294
msgid "Starting restore..."
msgstr ""
#: ../extensions/cpsection/backup/view.py:321
msgid ""
"I want to restore the content of my Journal. In order to do this, my Journal "
"will first be emptied of all its content; then the restored content will be "
"added."
msgstr ""
#: ../extensions/cpsection/backup/view.py:327
msgid "Confirm"
msgstr ""
#: ../extensions/cpsection/backup/view.py:365
msgid "Operation started"
msgstr ""
#: ../extensions/cpsection/backup/view.py:377
msgid "Backup finished successfully"
msgstr ""
#: ../extensions/cpsection/backup/view.py:379
msgid "Restore realized successfully."
msgstr ""
#: ../src/jarabe/frame/notification.py:62
msgid "Clear notifications"
msgstr ""
|
Q:
Differential Equation RLC circuit analysis.
RLC circuit analysis
I am stuck solving this problem. I've attached the question and my solution. My particular solution seems to cancel!
Thanks in advance for the help!
A:
The problem is that your "guess" fits the general form of a homogeneous solution. Since it's a solution to the homogeneous problem, plugging it in on the left side gives you zero.
The solution to this problem is to modify your particular solution. Use
$$
i_p(t) = Ate^{-10t}
$$
|
News // Academic strike in Ontario college system
More than 12,000 Ontario college professors, instructors, counsellors and librarians took job action Oct. 16 seeking longer contracts for partial-load faculty and the adoption of academic freedom guarantees. Represented by the Ontario Public Sector Employees Union, the teachers are also calling for the number of full-time faculty to match the number of faculty members on contract with the College Employer Council.
“College teachers in Ontario are taking a stand for quality education, and they have the support of academic staff across the country,” says CAUT executive director David Robinson. “The principles at stake — job security, academic freedom, and better governance — are ones worth fighting for.”
The issues have resonated with university teachers across the country, with many academic staff association members and CAUT standing in solidarity with the striking workers, joining picket lines and attending rallies throughout Ontario. |
A simple large-scale droplet generator for studies of inkjet printing.
A simple experimental device is presented, which can produce droplets on demand or in a continuous mode and provides a large-scale model for real inkjet printing systems. Experiments over different regimes of Reynolds and Weber number were carried out to test the system. The ranges of Reynolds and Weber numbers were adjusted by modifying the liquid properties or the jetting parameters. Reynolds numbers from 5.6 to 1000 and Weber numbers from 0.5 to 160 were obtained using water/glycerol mixtures in the drop-on-demand mode and Reynolds numbers from 30 to 5500 and Weber numbers from 20 to 550 for the continuous jet mode. The nozzle diameter can be varied from 0.15 to 3.00 mm and drop velocities were achieved in the range from 0.3 to 6.0 ms depending on the jetting parameters and the driving mode. Droplet, printer nozzle, drop on demand and continuous jet. |
Wawa station
Wawa station is a defunct commuter rail station on the SEPTA Regional Rail R3 West Chester Line, located adjacent to U.S. Route 1 in Chester Heights, Pennsylvania. Originally built by the West Chester and Philadelphia Railroad, it later served the Pennsylvania Railroad's West Chester Branch, which finally became SEPTA's R3 line. The outer section of the line, including Wawa station, was closed in 1986.
SEPTA will restore service on the Media/Elwyn Line from its current terminus at Elwyn station to Wawa at the end of 2021.
History
The West Chester and Philadelphia Railroad (WC&P) began constructing its rail line from Philadelphia in 1852 and reached Wawa in 1857. The remainder of the line to West Chester was completed in 1858. The WC&P merged with the Philadelphia and Baltimore Central Railroad (P&BC) in 1881, and both were controlled by the Pennsylvania Railroad.
Wawa station was originally known as the Baltimore Central Junction Station, being the northern terminus of the P&BC, later called the Octoraro Branch. This line was built by the P&BC between 1855 and 1868, and originally connected with the Columbia & Port Deposit Railroad in Maryland. Tourist operator Wawa & Concordville Railroad leased the Concordville-Wawa segment in 1967 and 1968 to operate passenger trains. Damage caused by Hurricane Agnes 1972 rendered the line unusable.
The station, and all of those west of Elwyn station, was closed in September 1986, due to deteriorating track conditions and Chester County's desire to expand facilities at Exton station on SEPTA's Paoli/Thorndale Line. Service was "temporarily suspended" at that time, with substitute bus service provided. Wawa Station still appears in publicly posted tariffs.
Wawa station was demolished shortly after service ended. Some concrete foundations remain, as do the concrete curb for the platform edge, and the pedestrian tunnel under the track. The pedestrian tunnel is sealed off with sheets of metal. The access road and parking lot still exist albeit in a state of decay.
Planned service restoration
In the early 1990s, SEPTA began discussing the prospect of restoring commuter rail service between Elwyn and Wawa. Little was done until June 2005, when engineering and design for the resumption of rail service finally began. SEPTA initially estimated that the cost for the 3-mile extension of service would be $51 million; the estimate cited in SEPTA's 2009 Capital Budget was $80 million. The construction project will include new track, catenary, signals, communications equipment, and structures; and a new station at Wawa with a large park-and-ride facility.
Wawa was chosen as the new terminal due to its proximity to the heavily travelled U.S. Route 1. The new ADA-compliant Wawa station will have high platforms, a sales office, ticket vending machines, and a passenger waiting room. SEPTA will also construct a new railcar storage facility at the Lenni station.
Wawa station is estimated to have 500 commuters on a typical weekday. The engineering phase of the terminal project began in July 2005. This included preliminary engineering, environmental impact analysis, and final engineering. Shortfalls in funding delayed completion of this phase due to the failing economy in 2008. SEPTA announced in 2015 in their "Rebuilding for the Future" project that service is expected to return to Wawa Station by, at the latest, 2020. Construction will take 24 to 36 months to complete. As of May 2018, the total budget has been revised to $177,900,000 with construction completing at the end of 2021.
References
External links
Pictures of former Wawa Station - post 1950s
Picture of former Wawa Station - pre-1928
More pictures and history of former Wawa Station
Category:Railway stations closed in 1986
Category:SEPTA Regional Rail stations
Category:Stations on the West Chester Line
Category:Demolished railway stations in the United States
Category:1986 disestablishments in Pennsylvania
Category:Former railway stations in Pennsylvania
Category:Railway stations in Delaware County, Pennsylvania |
Delta emulator brings Nintendo games to your iPhone without a jailbreak
Moments after Super Mario Run launched on iOS devices last week, Nintendo fans began wondering if and when the company might bring the classic 2D Mario games to mobile devices. It seemed like a no-brainer, but in an interview with Wired, Mario creator Shigeru Miyamoto shot down any speculation.
At the moment, Nintendo has no plans to port any NES or SNES games to iOS or Android, which is why the upcoming Delta emulator might be the most anticipated iPhone app in recent memory.
Several years ago, mobile developer Riley Testut released an emulator for the iPhone called GBA4iOS. Not only was it one of the most robust and capable Game Boy emulators on a mobile device, it was also possible to download it without a jailbreak. In 2014, Apple closed the “date trick” loophole that allowed iOS users to download and use the app without going through the App Store, effectively killing GBA4iOS, but now, two years later, Testut is back with a much more ambitious sequel called Delta.
Unlike GBA4iOS, Delta will be able to emulate a wide range of consoles, including the Game Boy, Game Boy Advance, Super Nintendo and Nintendo 64. In a blog post, Testut said he would add even more in the future, but these popular Nintendo consoles will be the first batch he focuses on.
While the Delta emulator won’t be made available to the public until early 2017, we managed to gain access to the first beta release this week and have some quick hands-on impressions to share with you.
Despite being weeks or possibly even months away from release, Delta already feels like a completed product. At the moment, it only plays SNES and GBA games, but the quality of the emulation is the best I’ve ever seen on the iPhone. There are a few known bugs with SNES games, but I haven’t run into any yet.
Adding ROMs to the app is relatively simple, though the options are more limited than they were for GBA4iOS. The only two options present in the current beta are through iTunes and iCloud Drive. It’s also not possible to simply drag and drop ROMs into the app — you actually have to import the games. That said, it’s obviously an exceptionally small price to pay to have stellar emulation on your non-jailbroken iPhone.
The customization settings are limited at the moment, giving users the ability to adjust the opacity of the virtual controller on the screen and choose a new input method (MFi controllers are supported by the app).
The UI is clean and attractive, the controller skins look nice (despite not being finalized) and the app is as fast as any emulator I’ve ever played with. As Testut continues to add features to the app, we’ll continue to provide updates, so be on the lookout for more Delta reports in the near future. |
INTRODUCTION
============
COPD is a highly prevalent disorder characterized by incompletely reversible airflow limitation. Emphysema is a major pathological change of COPD that is characterized by an abnormal and permanent enlargement of distal air spaces and alveolar wall destruction. It is estimated that these pathological changes caused by an inflammatory response of the lung to noxious particles and gases \[[@R1]\].
Several investigators reported emphysema phenotypes or subtypes \[[@R2]-[@R5]\]. Sverzellati *et al*. \[[@R2]\] reported females exhibited an emphysema phenotype less extensive in each pulmonary lobule characterized by smaller emphysematous areas and less concentrated in the core of the lung, compared with males. Saitoh *et al*. \[[@R3]\] reported pulmonary function was significantly different when emphysema developed predominantly in the upper or lower lobes. Adir *et al*. \[[@R4]\] reported a phenotype with severe precapillary pulmonary hypertension in patients presenting with normal spirometry and severely reduced diffusion capacity. In addition, the severity of emphysema varies widely despite the same disease stage of COPD \[[@R5]\]. Therefore, emphysema is a heterogenous disorder that arises from lung tissue destruction and small airway disease in varying combinations and severity within an individual.
Centrilobular emphysema (CLE) is usually associated with destruction of alveolar walls in the central portion of acinus, it is more often found in upper lung zones and is commonly associated with cigarette smoking \[[@R6]\]. Low attenuation areas (LAA) were reportedly detected by high-resolution computed tomography (CT), which allows for early detection of emphysema \[[@R7]\]. LAA located in centrilobular area is a radiological manifestation of CLE lesions, and several types of LAA are observed. There are supposed to be morphological features of LAA in each patient with CLE.
Our preliminary study using CT-pathologic correlations showed LAA shape indicated the destructed or dilated sites in secondary lobules in early stage of CLE \[[@R8]\]. According to our observation of LAA within 10 mm in diameter, LAA with round or oval shape with well-defined border, LAA with polygonal or irregular shape with ill-defined border, and LAA with irregular shape with ill-defined border coalesced with each other related to dilatation of bronchioles, destruction of proximal part of alveolar ducts, and destruction of distal part of alveolar ducts, respectively. However, the relationships between LAA shapes and pulmonary function and between LAA shapes and cigarette smoking remain unknown.
The aim of this study was to investigate whether morphological features of LAA affect pulmonary function in CLE. Therefore, we classified patients with CLE into three subtypes according to the morphological features of LAA and compared them with their pulmonary function tests (PFT) and smoking index.
MATERIALS AND METHODS
=====================
Patients
--------
All patients were Japanese and recruited from Sapporo Medical University Hospital. The radiological findings and the clinical information were evaluated retrospectively. The patients who were examined by both CT and PFT in a month were selected. Between August 2005 and December 2009, 73 patients (63 males, 10 females) with an average age of 70.3 ± 8.9 years (aged 45 to 92 years) were selected from our medical records. Their average smoking index was 53.0 ± 25.1 pack-years (mean ± SD). All patients were current or former smokers.
The level of serum alpha-1 antitripsin was not measured because its deficiency is very rare in Japan. We excluded the patients with infectious diseases, allergic diseases, collagen diseases, granulomatous diseases and neoplastic diseases. In addition, we excluded the patients who received lung operation. Also we excluded the patients with CLE with severe bullous changes and/or with severe emphysematous changes, because it was difficult to determine CLE subtype in relation with secondary lobules and they were not fully able to undergo pulmonary function tests.
Informed written consent was obtained from all patients. This study was approved by the Institutional Review Board of Sapporo Medical University.
CT
--
Chest CT scans were obtained on a Light Speed Ultra scanner (GE, USA) using 1.25 mm collimation at 5 mm intervals from the sternal notch to below the diaphragm during breath-holding after deep inspiration in a supine position at 140 kVp, 170 mA. The lungs were imaged at the window width of 1000 HU and the window level of -700 HU.
CLE Subtypes
------------
The patients were classified into three CLE subtypes based on the CT findings as follows:
> *Subtype A; CLE which showed round or oval LAA with well-defined border, individually surrounded by normal lung density*
> *Subtype B; CLE which showed polygonal or irregular-shaped LAA with ill-defined border, individually surrounded by normal lung density*
> *Subtype C; CLE which showed irregular-shaped LAA with ill-defined border, coalesced with each other*
When we recognized the characteristic LAA as more than 50% of all LAA by visual assessment, we determined it as dominant LAA. Representative CT images of three subtypes were shown in Fig. (**[1](#F1){ref-type="fig"}**). Because Subtype C is similar to panlobular emphysema, we determined it as Subtype C when patients with emphysema had partly LAA with ill-defined border with centrilobular distribution.
CT Score
--------
We evaluated the extent of CLE by visual scoring in bilateral lung fields according to the method of Goddard \[[@R9]\]. In brief, both lungs were divided into totally six areas consist of three lung fields; aortic arch, carina and inferior pulmonary vein levels. The extent was estimated using a five-point scale for each lesion. Total scores were calculated (maximum total: 24 points) and the severity of emphysema was graded as follows; 0 point (no emphysematous lesions), 1 point (LAA \< 25% of the entire lung field), 2 points (25% ≦ LAA \< 50% of the entire lung field), 3 points (50% ≦ LAA \< 75% of the entire lung field), and 4 points (75% ≦ LAA of the entire lung field).
Visual Assessment for CLE Subtypes
----------------------------------
Determination of CLE subtypes and scoring of its distribution were performed with no knowledge of patients' information and independently by two chest physicians who are expert for chest image diagnosis (M.T and G.Y.). The method of recognition of morphological features of LAA was a subjective one based on visual judgment. When there was a conflict in evaluation, they discussed the problem together to reach a consensus.
PFT
---
Chestac 9800 (Chest Co, Tokyo, Japan) was used for PFT. We used parameters as follows; predicted percentage of vital capacity (%VC), forced vital capacity (FVC), forced expiratory volume in one second to forced vital capacity ratio (FEV~1~%), predicted percentage of forced expiratory volume in one second (%FEV~1~), residual volume to total lung capacity ratio (RV/TLC%), 50% of maximum mid expired flow rate of forced vital capacity ($\overset{\cdot}{V}50$) and 25% ($\overset{\cdot}{V}25$) and maximum mid expiratory flow (MMF). We measured predicted percentage of diffusion capacity (%DLco) and predicted percentage of diffusion capacity divided by the alveolar volume (%DLco/VA) according to single-breath carbon monoxide uptake.
Statistical Analysis
--------------------
The results of CT scores and PFT were expressed as median with first quartile point (25 percentile) and third quartile point (75 percentile). The differences between the three groups were assessed by using the Kruskal Wallis H-test. When the differences were considered statistically significant, subsequently Mann-Whitney U-test with Bonferroni correction was performed for post hoc test. The differences were considered statistically significant when the *p* value was less than 0.05.
RESULTS
=======
Frequency of CLE Subtypes
-------------------------
A total of 73 CLE patients were classified into three groups according to the CT findings (Table **[1](#T1){ref-type="table"}**). Twenty (27%), 45 (62%) and 8 cases (11%) of patients were grouped into Subtype A, Subtype B and Subtype C groups, respectively. Subtype B group was the most superior in patient number. In addition, there was no significant difference in age among three groups. Concordance rate between the two reviewers of CT about determination of CLE subtypes was 76.7 %.
Smoking Index
-------------
Smoking index was compared among three subtype groups and there were significant differences among them (Table **[1](#T1){ref-type="table"}**). Smoking index of both Subtype B and Subtype C were significantly higher than that of Subtype A groups (Fig. **[2](#F2){ref-type="fig"}**). In addition, there was no significant difference between Subtype B and Subtype C groups.
CT Score
--------
CT scores were compared among three subtype groups and there were significant differences among them (Table **[1](#T1){ref-type="table"}**). CT scores of both Subtype B and Subtype C were significantly higher than that of Subtype A groups (Fig. **[3](#F3){ref-type="fig"}**). In addition, there was no significant difference between Subtype B and Subtype C groups.
Pulmonary Function Findings
---------------------------
PFT values were compared among three groups and there were significant differences in FEV~1~%, %FEV~1~, %DLco/VA and %DLco among them (Table **[1](#T1){ref-type="table"}**).
FEV~1~% was significantly lower in Subtype C as compared to both Subtype A and Subtype B groups. There was no significant difference between Subtype A and Subtype B groups. %FEV~1~ was significantly lower in Subtype C as compared to Subtype A groups. There was no significant difference between Subtype A and Subtype B, and between Subtype B and Subtype C groups (Fig. **[4](#F4){ref-type="fig"}**). Both %DLco/VA and %DLco were significantly lower in Subtype B as compared to Subtype A groups. There was no significant difference between Subtype A and Subtype C, and between Subtype B and Subtype C groups (Fig. **[4](#F4){ref-type="fig"}**). In addition, there was no significant difference in %VC, FVC, RV/TLC%, $\overset{\cdot}{V}50$, $\overset{\cdot}{V}25$ and MMF among three subtypes.
DISCUSSION
==========
LAA is the characteristic findings in CLE, which relate with emphysematous lesions and occur from the center of the secondary lobule. According to CT-pathologic correlation studies \[[@R6],[@R8],[@R10]\], LAA is consistent with the affected sites in the secondary lobule, which influence on airflow limitation and diffusion capacity. In this study, we focused on three subtypes determined by morphological features of LAA on CT, and examined their pulmonary function and the influences of cigarette smoking.
There were characteristic differences among three subtypes. Subtype A showed lower CT scores and higher values including FEV~1~%, %FEV~1~, %DLco/VA and %DLco in PFT. Because pulmonary function was not so impaired in Subtype A, destruction and/or dilatation of alveolar structures were supposed to be mild. Subtype B was the most frequent among three groups and showed approximately intermediate values between Subtype A and Subtype C in PFT. Destruction and/or dilatation of alveolar structures were supposed to be moderate in Subtype B. Subtype C showed higher CT scores and lower values including FEV~1~% and %FEV~1~. Because airflow limitation was evident in Subtype C, destruction and/or dilatation of alveolar structures were supposed to extend to the entire secondary lobule in Subtype C. However, Subtype C did not show a significant difference in diffusion capacity in spite of the higher CT scores. We thought Subtype C did not show significant reduced diffusion capacity because of relatively large variation in values of both %DLco/VA and %DLco. A small number of patients with Subtype C might also influence on the results. According to our results, we concluded that LAA with ill-defined border might be a sign showing airflow limitation and reduced diffusion capacity.
We speculate that deposition sites of the particles or gases from cigarette smoking relate with morphological features of LAA on CT. Cigarette smoke has approximately 10^9^ to 10^10^ particles /ml, and particles range in size from 0.1 to 1.0μm with a mean of 0.2μm \[[@R11]\]. Gases generated by cigarette smoking include highly levels of carbon monoxide and hydrogen cyanide, those interfere oxygen transport and metabolism \[[@R12]\]. The long term cigarette smoking is toxic to airway epithelial cells and leads to destruction of pulmonary parenchyma. Very small particles or gases will deposit in alveolar wall and cause inflammation there, leading to Subtype B or Subtype C. Similarly, small particles deposited in terminal bronchioles will cause destruction and/or dilatation of bronchioles, leading to Subtype A.
CT scores and smoking index in both Subtype B and Subtype C were higher than Subtype A. Therefore, both Subtype B and Subtype C were visually progressive and more affected by cigarette smoking as compared to Subtype A. Subtype B and Subtype C have similar properties of peripheral border of LAA. It is likely to progress from Subtype B to Subtype C. Mishima *et al*. \[[@R13]\] reported that the neighboring smaller LAA clusters tend to coalesce and form larger clusters as the weak elastic fibers separating them break under tension. This process leaves the percentage of the lung field occupied by LAA unchanged and increases the number of large clusters. It may be possible that Subtype B progresses to Subtype C. On the other hand, Subtype A is morphologically different from Subtype B or Subtype C. Susceptibility to smoking particles may exist among these subtypes. Even ex-smokers with emphysema had reportedly showed evidence of persistent airway inflammation and progression of emphysema \[[@R14]\]. Progression or extension of CLE lesions is thought to be very slow. Long term study will be necessary to elucidate progress of three subtypes.
There are limitations in this study. First, pathological confirmation was not performed. Affected sites of each subtype depend on our speculation based on CT and PFT findings. Comparison between pathological findings and LAA may be required. Second, our results came from only qualitative visual inspection. Extensive research may be need using a quantitative CT-based metrics to define structural abnormality of CLE \[[@R15]\]. Third, we could not exclude the contribution of small airway disease to airflow limitation in PFT studies. CLE is considered to be a chronic inflammatory process, which is not only lung parenchymal disease but also airway disease. Fourth, the relationship with each subtype and response to the treatment has not been studied. Since there were differences between each subtype by PFT, differences may exist in the effect of the drug such as long acting β2 agonists or anti-cholinergic agents. In the future, it is necessary to examine the effect of treatment with each subtype.
Our subjective visual assessment for CLE is easy to perform. CLE subtypes described in the present study may be useful for predicting PFT in patients with CLE.
All authors thank Dr. Masahiko Yamagishi (Department of Internal Medicine, Sapporo Kojin-kai Hospital) for his useful suggestions.
CONFLICT OF INTEREST
====================
The authors confirm that this article content has no conflict of interest.
{#F1}
{#F2}
{#F3}
{#F4}
######
CT Score, Smoking Index and Pulmonary Function Test in Three CLE Subtypes
Subtype (n) A (20) B (45) C (8) p Value
-------------------------------- -------------------- --------------------- -------------------- ---------
Male/Female 15/5 40/5 8/0
Smoking index (pack-years) 33.8 (17.5-50.0) 55.0 (41.1-75.0) 49.4 (44.0-73.3) \<0.05
age (y/o) 74.0 (68.5-82) 72.0 (63.5-75.3) 68.5 (63.0-71.5) NS
CT score (points) 6.0 (6-9.5) 11.0 (7.8-14.0) 19.0(10.0-20.5) \<0.05
%VC (%) 117.9(101.2-124.7) 114.8 (103.6-123.9) 98.25 (81.5-120.8) NS
FEV1% (%) 64.2 (49.5-75.7) 58.9 (43.7-70.5) 38.3 (33.4-43.0) \<0.05
%FEV1 (%) 93.4 (72.2-115.6) 88.5 (64.5-106.9) 48.3 (38.3-71.3) \<0.05
FVC (L) 3.1 (2.7-3.8) 3.5 (3.0-4.0) 3.2 (2.5-3.5) NS
RV/TLC (%) 35.8 (30.0-44.5) 37.4 (32.7-45.3) 43.3 (37.6-57.7) NS
$\overset{\cdot}{V}50$ (L/sec) 1.1 (0.6-2.2) 1.1 (0.4-1.9) 0.4 (0.3-0.7) NS
$\overset{\cdot}{V}25$ (L/sec) 1.2 (0.6-2.3) 0.3 (0.1-0.5) 0.2 (0.1-0.3) NS
MMF (L) 0.8 (0.4-1.7) 0.8 (0.3-1.4) 0.3 (0.3-0.6) NS
%DLco/VA (%) 70.4 (56.7-76.3) 47.2 (36.7-58.1) 29.0 (19.0-67.4) \<0.05
%DLco (%) 62 (46.0-72.3) 43.3 (36.2-55.4) 35.7 (21.3-60.7) \<0.05
There were significant differences in CT score, smoking index and pulmonary function test including FEV~1~%, %FEV~1~, %DLco/VA and %DLco. The data was expressed as median with first quartile point (25 percentile) and third quartile point (75 percentile).
|
Q:
Remove elements after an item in a list, jQuery
Here's my question:
I have a list of elements contained within a main container like so:
<span class="main_container">
<span id=".." class=".." position="1"...> </span>
<span id=".." class=".." position="2"...> </span>
<span id=".." class=".." position="3"...> </span>
<span id=".." class=".." position="4"...> </span>
<span id=".." class=".." position="5"...> </span>
<span id=".." class=".." position="6"...> </span>
</span>
I use the ID and position for different purposes. Now, when I click let's say on element at position 4, I want the system to delete span 4, and all the ones below it. i.e 5, 6.
How do I do this is jQuery? I tried .parents() but that didn't do it.
Thanks
A:
You want to use this:
http://api.jquery.com/nextAll/
$('.main_container').find('span').click(function(){
var jq_this = $(this);
jq_this.nextAll().remove(); // remove all later siblings
jq_this.remove(); // removes self
});
|
We noticed that you're using an unsupported browser. The TripAdvisor website may not display properly.We support the following browsers:Windows: Internet Explorer, Mozilla Firefox, Google Chrome. Mac: Safari.
Really having a big name in Bhubaneswar as it acquires a eye catching view. Everything is awesome here,nothing can be called negative about this place.Even the Indian cricket team stays in this place during the matches.
I have had numerous services here and enjoy the setting and treatments. While the services can lack consistency because some staff have more training that others, I have found some good providers (yay, Mina!) who really are world-class.
If you can afford it, Mayfair offers the best food in the town. It has multiple restaurants within the complex and each has something unique to offer.
Super Snax - as the name suggests, you get good evening snacks here. Quality food and the best...More
Last month I had gone for dinner with my family to Mayfair lagoon's Supper Snax restaurant.I order one paneer masala dosa and a plain masala dosa,as per my previous experiences it was good but what they served this time is unexpectable.A dosa divided to 3...More
Thank ansujit
afsarkhan2017, DGM Food and Beverage at Mayfair Lagoon, responded to this reviewResponded yesterday
Dear Guest ,
Thank you very much for patronizing "Super Snax" @ MAYFAIR Lagoon - The Best South Indian Specialty Restaurant in Bhubaneswar which also serves arrays of Chaat, Indian Sweets & much more
We regret to hear that your experience at "Super Snax" did...More
We went there to have Dinner. The place was good, beautiful and attractive. The menu and rates were also decent. The food was also tasty and worth the price. Only problem we had was with the Service. Awful Service which made the visit little bad....More
Thank rohitpatni3
Management response:Responded 25 May 2017
Dear Guest,
Thank you very much for choosing to dine at MAYFAIR Lagoon, Bhubaneswar
We have noted your comments with great concern on service & apologize that the services were not up to your expectations ,We assure you that a corrective action in this regard...More
PreviousNext
123456…31
Updating list...
Nearby
Nearby Restaurants
Trident Hotel Restaurant
101 reviews
.96 km away
The Zaika
132 reviews
.87 km away
Lemon Grass
29 reviews
.74 km away
Nearby Attractions
Nandankanan Zoological Park
666 reviews
3.47 km away
Ram Mandir, Bhubaneswar
236 reviews
4.02 km away
Udayagiri Caves
389 reviews
4.86 km away
ISKCON Temple
157 reviews
1.12 km away
Questions & Answers
Get quick answers from Mayfair Lagoon staff and past visitors.
Note: your question will be posted publicly on the Questions & Answers page. |
//
// XMPPIQRequest.m
// iKnow
//
// Created by curer on 11-10-21.
// Copyright 2011 iKnow Team. All rights reserved.
//
#import "XMPPIQRequest.h"
#import "XMPPIDTracker.h"
static const int ddLogLevel = LOG_LEVEL_ERROR;
#define IQTIMEOUT 10
#define TIMEOUT IQTIMEOUT + 5
@interface XMPPIQRequest(PrivateAPI)
- (void)iqSyncResult:(XMPPIQ *)iq withInfo:(id <XMPPTrackingInfo>)info;
- (void)iqAsyncResult:(XMPPIQ *)iq withInfo:(id <XMPPTrackingInfo>)info;
@end
@implementation XMPPIQRequest
- (id)init
{
return [self initWithDispatchQueue:NULL];
}
- (id)initWithDispatchQueue:(dispatch_queue_t)queue
{
if ((self = [super initWithDispatchQueue:queue]))
{
xmppIDTracker = [[XMPPIDTracker alloc] initWithDispatchQueue:self.moduleQueue];
waitObjects = [[NSMutableDictionary alloc] initWithCapacity:3];
}
return self;
}
- (BOOL)activate:(XMPPStream *)aXmppStream
{
if ([super activate:aXmppStream])
{
//XMPPLogVerbose(@"%@: Activated", THIS_FILE);
// Custom code goes here (if needed)
return YES;
}
return NO;
}
- (void)deactivate
{
//XMPPLogTrace();
// Custom code goes here (if needed)
[super deactivate];
}
- (NSString *)moduleName
{
// Override me to provide a proper module name.
// The name may be used as the name of the dispatch_queue which could aid in debugging.
// this supper class XMPPModule , create dispatch queue with this name
return @"XMPPIQRequest";
}
- (void)dealloc
{
RELEASE_SAFELY(xmppIDTracker);
RELEASE_SAFELY(response);
RELEASE_SAFELY(waitObjects);
[super dealloc];
}
#pragma mark method
- (XMPPIQ *)sendSync:(XMPPIQ *)iq;
{
// this method can invoke on any thread
NSAssert(receipt == nil, @"这部分代码,现在只能允许一个同步操作");
if ([xmppStream isDisconnected]) {
return nil;
}
XMPPIQ *sendIQ = [XMPPIQ iqFromElement:iq];
receipt = [[XMPPElementReceipt alloc] init];
RELEASE_SAFELY(response); // 清除掉上一次调用结果
dispatch_block_t block = ^{
[xmppIDTracker addID:[sendIQ elementID]
target:self
selector:@selector(iqSyncResult:withInfo:)
timeout:IQTIMEOUT];
};
if (dispatch_get_current_queue() == self.moduleQueue)
block();
else
dispatch_sync(self.moduleQueue, block);
[xmppStream sendElement:sendIQ];
BOOL bRes = [receipt wait:TIMEOUT];
RELEASE_SAFELY(receipt);
if (bRes) {
[multicastDelegate iqRequestFinish:self];
}
else {
//这里几乎永远不会遇到,如果遇到了,那么说明发生了dead lock
//这是防止发生dead lock的最后措施
//当然,如果我们真的遇到了,bad things happen and find out
//TTDASSERT(0);
DDLogError(@"%@, %@, dead lock happen", THIS_FILE, THIS_METHOD);
}
if (response == nil) {
//this means that server not response us
//so time out happen
return nil;
}
//not fix me with copy
//because XMPPIQ need to be set by runtime class method
//so common copy method will cause crash at runtime
return [XMPPIQ iqFromElement:response];
//这里,我们不能避免所有可能发生的dead lock,但是,已经很低*/
//return [self sendSyncEx:iq];
}
- (XMPPIQ *)sendSyncEx:(XMPPIQ *)iq;
{
// this method can invoke on any thread
if ([xmppStream isDisconnected]) {
return nil;
}
XMPPIQ *sendIQ = [XMPPIQ iqFromElement:iq];
if (sendIQ == nil || [[sendIQ elementID] length] == 0) {
return nil;
}
XMPPIQRequestPakage *pakage = [[XMPPIQRequestPakage alloc] init];
XMPPElementReceipt *aReceipt = [[XMPPElementReceipt alloc] init];
pakage.receipt = aReceipt;
[aReceipt release];
dispatch_block_t block = ^{
[waitObjects setObject:pakage forKey:[sendIQ elementID]];
[xmppIDTracker addID:[sendIQ elementID]
target:self
selector:@selector(iqAsyncResult:withInfo:)
timeout:IQTIMEOUT];
};
if (dispatch_get_current_queue() == self.moduleQueue)
block();
else
dispatch_sync(self.moduleQueue, block);
[xmppStream sendElement:sendIQ];
BOOL bRes = [pakage.receipt wait:TIMEOUT];
if (!bRes) {
//这里几乎永远不会遇到,如果遇到了,那么说明发生了dead lock
//这是防止发生dead lock的最后措施
//当然,如果我们真的遇到了,bad things happen and find out
//TTDASSERT(0);
DDLogError(@"%@, %@, dead lock happen", THIS_FILE, THIS_METHOD);
}
XMPPIQ *iqReceive = pakage.iqReceive;
if (iqReceive == nil || [iqReceive isErrorIQ]) {
//this means that server not response us
//so time out happen
RELEASE_SAFELY(pakage);
return nil;
}
[pakage autorelease];
//not fix me with copy
//because XMPPIQ need to be set by runtime class method
//so common copy method will cause crash at runtime
return [XMPPIQ iqFromElement:iqReceive];
//这里,我们不能避免所有可能发生的dead lock,但是,已经很低
}
- (void)iqSyncResult:(XMPPIQ *)iq withInfo:(id <XMPPTrackingInfo>)info
{
NSAssert(dispatch_get_current_queue() == self.moduleQueue,
@"Invoked on incorrect queue");
if (iq) {
response = [iq retain];
[receipt signalSuccess];
}
RELEASE_SAFELY(response);
[receipt signalFailure];
}
- (void)iqAsyncResult:(XMPPIQ *)iq withInfo:(id <XMPPTrackingInfo>)info
{
NSAssert(dispatch_get_current_queue() == self.moduleQueue,
@"Invoked on incorrect queue");
XMPPIQRequestPakage *pakage = [waitObjects objectForKey:[iq elementID]];
//we are safe , because pakage retain by other
if (iq) {
pakage.iqReceive = iq;
[pakage.receipt signalSuccess];
}
else {
pakage.iqReceive = nil;
[pakage.receipt signalFailure];
}
[waitObjects removeObjectForKey:[iq elementID]];
}
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
#pragma mark XMPPStream Delegate
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
- (void)xmppStream:(XMPPStream *)sender didReceiveIQ:(XMPPIQ *)iq
{
NSAssert(dispatch_get_current_queue() == self.moduleQueue, @"Invoked on incorrect queue");
NSString *type = [iq type];
if ([type isEqualToString:@"result"] || [type isEqualToString:@"error"])
{
[xmppIDTracker invokeForID:[iq elementID] withObject:iq];
}
}
@end
@implementation XMPPIQRequestPakage
@synthesize iqReceive;
@synthesize receipt;
- (void)dealloc
{
[iqReceive release];
[receipt signalFailure];
[receipt release];
[super dealloc];
}
@end
|
[Echographic localization for percutaneous internal jugular vein catheterization].
The standard internal jugular vein access is an anatomical-landmark method and the individual variations causes technical difficulty and sometimes morbidity. Ultrasound guidance for percutaneous puncture of internal jugular vein is used in 20 patients for hemodialysis catheter insertion. This method allow the visualization of jugular permeability and needle progression during puncture. A control historical group comparison emphasized the advantage of this technique with lower access time (20 s vs 90 s), more first needle pass success (90% vs 50%) and reduced morbidity (carotid puncture, hematomas). The ultrasound guidance is very simple and safe but major disadvantage is the cost of the equipment. |
If you would like this card sent directly from the studio for no extra charge we can write a personalised note and pop it in the post for you. Just pop a little note when at checkout and make sure that your shipping address is correct!
Stella the sausage dog is a popular instagram star, she is one of our pet portrait commissions and looked so cute and adorable we had to have her in our collection! She has been given a christmassy twist with the addition of some antlers in gold foiling detail. |
A comprehensive analysis of the best Coinbase alternatives
Shockingly, there are over 254 different cryptocurrency exchanges trading a combined market capitalization over $300 billion. But what exactly is a crypto exchange? In short, it’s a business that acts as a marketplace where buyers and sellers can come to exchange digital currencies for fiat money or other digital currencies. For some investors, the exchange also doubles as a coin tracker and digital wallet.
Coinbase: A Quick Overview
In recent years, Coinbase has risen to the top of the digital currency exchange pack. Coinbase offers something for everyone, making the job of buying, storing, and selling cryptocurrencies relatively straightforward. Headquartered in San Francisco, the company has even forged partnerships with businesses, most notably Overstock and Dell.
Not everyone is sold on Coinbase. This leading exchange has run into a host of problems that may cause some to be wary. In March 2018, the news organization Quartz reported a doubling of customer complaints against the exchange giant. More recently in June of 2019, the exchange’s servers crashed, sending Bitcoin price plummeting $1,400 within minutes. If these problems weren’t enough, the IRS hit 10,000 Coinbase customers with warning letters regarding federal tax law transgressions.
Modern investors know that exchange fees are an important component of a successful trading strategy. Exorbitant fees can squeeze profits from each trade. As of this writing, Coinbase charges a spread of 0.50% on the buying and selling of cryptos, plus additional fees that can go as high as a whopping 4%, shown below.
Source: Coinbase
Users are not shying away from expressing their dissatisfaction with Coinbase. a Twitter trend started back in March of 2019 with the hashtag #DeleteCoinbase after the exchange announced its acquisition of Neutrino, a software organization that was founded by a team of well-known hackers and spy-wear developers.
The company is also facing a negligence suit for Bitcoin Cash’s launch back in 2017, with accusations of insider trading and manipulation. With these disadvantages in mind, many investors are starting to look for other exchanges.
Coinbase Alternatives: What to Consider?
There are several factors to consider when choosing an exchange. While fees are a key consideration, they aren’t the only dimension to examine.
Supported countries Security Reputation Cryptocurrencies supported Fees, commissions, exchange rates Payment methods Geographic location Ease of use Verification requirements
Try beginning from the top, going down the list one by one as you consider an exchange.
For example, increasing regulatory pressure has forced many exchanges to stop supporting US-based customers. If an exchange is available, consider if it has the necessary security in place to all-but-guarantee your precious coins won’t vanish. After that, make sure the exchange is held in high regard and that it trades the cryptocurrencies you want to deal in. Last, but certainly not least, consider the fees imposed by the exchange. Low fees equal more money in your pocket.
Top 7 Coinbase Alternatives
With the above guidelines in mind, we have selected five exchanges that every savvy investor should consider. They are:
Liquid – Best up-and-coming
Gemini – Best for institutions and whales
Binance – Best for volume & crypto options
Bitstamp – Best for overall lowest fees
Kraken – Best for trading tools provided
BitMEX – Best for margin traders
IDEX – Best DEX
Let’s dive into each exchange, the pros and cons, and the fee structures.
This Japan-based exchange has had an impressive record so far. In just a span of two years, Liquid achieved “high liquidity” status, by clocking in over $250 million in daily trading volume, all whilst not yet serving the US market. The company has an impressive roadmap and focuses on regulatory compliance.
Pros: + Competitive fees
+ Margin trading of up to 100x
+ 80+ cryptos, +200 trading pairs
+ Regulatory compliance Cons: – Not available in US markets (yet)
Fees:
Trading: 0.05% when using QASH (native exchange currency) Withdrawals: Cryptocurrency – None, Fiat – 5 USD Deposits: None
Additional Info:
Mobile app available on iOS and Android and is fully functional. You can execute margin trades, view your balances and look at charts
Liquid exchange is scheduled to launch its US-based entity in 2020
Besides not being available for US residents, it is difficult to find any cons for Liquid. The exchange has listed over 80 different cryptocurrencies to trade from, has competitive trading fees, offers margin trading, fully functional mobile app, and is fully licensed and compliant in Japan, the company’s headquarters.
Full throttle growth seems to be the name of the game. Once Liquid launches in US markets, it is very easy to imagine it leading the board in terms of trading volume. It’s UI and features appeal to both beginners and more advanced traders.
This US-based exchange founded by the Winklevoss twins was the first fully regulated exchange, an important step towards legitimizing cryptocurrencies world-wide. The exchange trades in the following cryptos: Bitcoin, Ethereum, Ripple, Litecoin, Zcash, and Bitcoin Cash.
Pros: + Good security measures
+ Discounts up to 0% for volume traders
+ Regulation equates to trust for many investors Cons: – Relatively low 30-day volume
– Available in limited markets
– No margin trading
– A limited list of cryptocurrencies (6 total)
Fees:
Trading: 0 – 0.1% and up to 1% depending on the trade structure Withdrawals: Cryptocurrency – Up to 0.002 BTC, SEPA/Wire/Debit card – none Deposits: Cryptocurrency – none, Wire – none, ACH – none
Additional Info:
ACH bank transfers are limited to a maximum of $500 a day
Mobile App available for iOS and Android
Can create different account levels and API access permissions (Administrator, Manager, Trader, Auditor)
Despite being on the high side of fees, Gemini does a great job when it comes to deposits and withdrawals. In addition, trading fees decrease the more your trade within a 30-day period. Starting from 0.25% for under 1,000 BTCs to 0% when your total monthly trading volume reaches 5,000 BTCs or 100,000 ETH.
Gemini Seems to be the best fit for larger institutions or for the lack of a better term, crypto whales. Being headquartered in the United States, and their strong commitment to regulatory compliance makes Gemini one of the safest cryptocurrency exchanges to trade on.
This exchange launched back in 2017 and quickly became one of the largest exchanges by adjusted trading volume. With more than 160 cryptocurrencies to trade and over 500 trading pairs, Binance, by far offers the largest selection. It is headquartered in Malta and works closely with the Maltese government to ensure regulatory compliance.
Pros: + Over 160 Cryptocurrencies
+ High liquidity
+ Mobile and Desktop apps
+ No deposit or withdrawal fees
+ Competitive fee options with BNB token Cons: – Limited advanced trading tools
– Shaky reputation after the recent hack
– 2 BTC daily withdrawal limit for unverified users
Fees:
Trading: 0.1% (25% discount for BNB holders) Withdrawals: Cryptocurrency – none, SEPA – €0.90 EUR, Wire – 0.09% Deposits: Cryptocurrency – none, SEPA – None, Wire – 0.05%
Additional Info:
No KYC required to start trading
Launching a separate exchange for US citizens which will dilute liquidity
Runs a successful IEO launchpad (initial exchange offering)
Has a DEX (decentralized exchange)
Binance is a strong contender for being the number one Coinbase alternative. It exceeds all the other exchanges by trading volume and by the number of cryptocurrencies offered. In addition, buying BNB (the native exchange token) allows users to get a 25% trading fee discount. It is unknown, however, how long this promotion will last.
This Luxembourg-based exchange has won hearts and minds since its inception in 2011. Bitstamp is considered one of the top four exchanges and is Europe’s oldest cryptocurrency exchange. The exchange trades in the following coins: Bitcoin, Ethereum, Ripple, Litecoin, and Bitcoin Cash.
Pros: + Low, transparent fees
+ Good reputation and strong security
+ Several fiat deposit and withdrawal methods Cons: – Relatively low 30-day volume
– Limited markets (EU focused)
– No margin trading
– A limited list of cryptocurrencies (5 total)
Fees:
Trading: .25% for low volume, down to .10% for high volume Withdrawals: Cryptocurrency – none, SEPA – €0.9, Wire – .09%, Debit card – $10 under $1000 and 2% for amounts over $1000 Deposits: Cryptocurrency – none, SEPA – none, Wire – .05%+, Debit card – 5%+
Additional Info:
Fiat withdrawals take around 2-3 business days
Average response time for support tickets is 24-72 hours.
You can fund your account via wire-transfer or a credit card.
Mobile app is available for iOS and Android devices.
While not perfect, given its limited market reach, low volume, and list of only 14 crypto pairs, this is still a strong alternative to Coinbase. Particularly because of its relatively low fees, and most notably, free cryptocurrency deposits and withdrawals. Meaning that you can send your crypto here to test out the platform without incurring any costs.
Another of the oldest and most recognizable exchanges, Kraken was created in 2011 and has continued to grow through funding the past eight years. This exchange trades in the major coins and a slew of other minor coins.
Pros: + Perfect security record
+ Serves over 200 countries
+ Margin trading up to 5x
+ Good for trading altcoins (20 cryptos total) Cons: – No mobile app
– Complicated fees structure
– Does not support credit card crypto purchases (not that it’s a good idea to do so)
Fees:
Trading: Maker 0% to .16%; Taker .10% to .26% (changes depending on volume) Withdrawals: Cryptocurrency – variable, SEPA – €0.9, Wire/ACH – $5 Deposits: Cryptocurrency – variable, SEPA – none, Wire/ACH – $5
Additional Info:
Advanced charting & trading tools are available on Kraken Pro.
Can fund account with 5 different fiat currencies (USD, GPB, JPY, EUR, CAD)
No KYC for the Starter tier
Depending on your geographical location and charting tool requirements, trading on Kraken might be best suited for you.
BitMEX is one of the first exchanges to offer margin trading for Bitcoin. Launching back in 2014, the exchange now offers 9 different cryptocurrencies to pick from. Users can only margin trade on BitMEX, meaning that you cannot buy Bitcoin directly from their platform. In order to deposit funds, you’ll need to first use a fiat to crypto exchange, then transfer your Bitcoin to your BitMEX account.
Pros: + Up to 100x leverage
+ High liquidity
+ Advanced trading tools and charts
+ Supports anonymity Cons: – Platform sometimes overloads
– Restricted for US users
– Difficult user-interface to learn
Fees:
Trading: Maker .025%; Taker .075% Settlement: .05% Withdrawals: None Deposits: None
Additional Info:
No KYC required
US restriction can be bypassed by VPN (we do not condone users to attempt this)
Contracts do not expire
Although BitMEX and Coinbase are targeted towards different types of users, it is worth exploring whether BitMEX is the right exchange for you. users who are looking to trade cryptocurrencies with leveraged positions should look no further. With a whopping 100x leverage on Bitcoin and up to 50x on Ethereum, BitMEX is the best choice for high-risk traders and degenerate gamblers.
Bonus: Coinbase DEX Alternative
A decentralized exchange (DEX) is a type os cryptocurrency exchange where buyers and sellers exchange cryptos directly, without a third-party acting as an escrow and holding the coins being traded. This peer to peer protocol empowers users by eliminating the need for a middle man to control your private keys. As the saying goes, “not your keys, not your crypto”.
As of today (08/09/2019), 56% of all DEX transactions occur on IDEX. This makes this decentralized exchange a clear market leader. The runner up in terms of trading transactions is Kyber Network with 12% market share. IDEX utilizes Ethereum smart contracts and support stop and limit orders.
Pros: + Most liquid DEX
+ Competitive fees
+ Available worldwide
+ Supports anonymity
+ Over 400 cryptocurrencies pairs Cons: – Only ERC-20 tokens
– Crypto deposits only
– ETH-based trading pairs
– Low volume compared to centralized exchanges
Fees:
Trading: Maker 0.10%, Taker 0.20%+ gas fees Minimum order limits: Maker $20, Taker $10
Additional Info:
Allows users to cancel trades without wasting gas
Can trade directly from ledger wallets
Withdrawals of up to $5,000 USD per day for unverified users
With exchange hacks becoming commonplace, users should start taking into consideration DEXs as alternative options. If we buy and sell decentralized cryptocurrencies, why are we not doing so on decentralized exchanges?
Overall: What Is the Best Coinbase Replacement?
Binance is without a doubt the top contender for Coinbase. Users globally agree with this conclusion as the exchange is number one in terms of verified trading volume. With more than 160 cryptocurrencies and over 500 trading pairs, it should scratch all your crypto itches.
Even though the exchange recently suffered from a hack resulting in 7,000 Bitcoins stolen, Binance refunded all their users and promised to increase their security measures. They are also working on building their own decentralized exchange to compete with IDEX, and recently started offering leverage trading options to compete with BitMEX.
Track Your Crypto Portfolio
Whichever exchange you decide on, you’ll be able to track your investments with Crypto Pro – The all-in-one cryptocurrency tracker. Our API import feature allows you to connect to 60+ exchanges and automatically pull in your balances and populate your portfolio(s).
Stay in Touch
We like to keep in touch with like-minded people. You can follow us on Twitter, join our Telegram Group, like us on Facebook, and even send us an email at [email protected] if you need assistance or have a suggestion in mind. |
Q:
How to execute netsh command from Golang on Windows
How to execute
netsh
command from Golang which requires "run as Admin"?
err1 := exec.Command("netsh", "interface ipv6 set privacy state=disable").Run()
fmt.Printf("Exec1 err: %+v\n", err1)
A:
Try exec.Command("netsh", "interface", "ipv6", "set", "privacy", "state=disable").Run()
|
**5 - 379381*x**4 - 2*x**2 + 225058*x - 44.
1080*x**3 - 4552572*x**2 - 4
What is the second derivative of 34*q**5 + 698*q**4 - 2*q**2 + 19105424*q - 1 wrt q?
680*q**3 + 8376*q**2 - 4
What is the second derivative of 973379757*f**2 + f + 62423339 wrt f?
1946759514
Find the third derivative of 62819990*z**3 + 2*z**2 - 9282280 wrt z.
376919940
What is the derivative of 2*c**2 + 200870939*c + 240619401?
4*c + 200870939
Find the second derivative of 44887249*m**2 - 100950625*m.
89774498
Find the third derivative of 385365*z**5 + z**4 + 37*z**3 - 2*z**2 - 5341*z + 2271.
23121900*z**2 + 24*z + 222
What is the second derivative of -20927*s**4 + 16*s**3 - 7*s**2 - 15454187*s wrt s?
-251124*s**2 + 96*s - 14
Differentiate -194*c*t*z + c*t + 12*c*z**3 - 48056*c + 1205*t*z**3 + 5*t - 2*z**3 with respect to t.
-194*c*z + c + 1205*z**3 + 5
What is the first derivative of 15129*a*t*z**3 + 6*a*t*z - 189439*a*z**3 - 35*a + 9*t - z**2 wrt t?
15129*a*z**3 + 6*a*z + 9
Find the second derivative of -615*l**4 + 4204*l**2 - 123*l + 8663.
-7380*l**2 + 8408
Find the second derivative of 3*n**3 - 2423289*n**2 + 8082*n - 385 wrt n.
18*n - 4846578
Find the third derivative of 3859839*s**6 - 531942*s**2 + 14.
463180680*s**3
What is the derivative of -35493392*d*k**2 + 4*k**2 - 2*k + 471169 wrt d?
-35493392*k**2
What is the second derivative of 2139*j**5 - 312*j**3 - j**2 - 6302673*j?
42780*j**3 - 1872*j - 2
Differentiate b**3*f**2 + 78707003*b**3 + 480092*b**2*f**2 with respect to f.
2*b**3*f + 960184*b**2*f
What is the second derivative of -8583*k**3*o + 83*k**3 - 6*k**2*o + k*o - 18*k - 14*o - 4520 wrt k?
-51498*k*o + 498*k - 12*o
Find the third derivative of 1861359*n*z**4 - n*z**3 - 4247*n*z**2 + 84*n*z - 2*n + 8*z**3 - z**2 - 2 wrt z.
44672616*n*z - 6*n + 48
Find the third derivative of 1338036*b**3*u**3 - 2*b**3*u**2 - 117*b**3*u + b*u**3 + 308*b*u**2 + 7*b*u + u wrt u.
8028216*b**3 + 6*b
Find the third derivative of 5289015*o**6 + 948*o**2 + 4*o + 677.
634681800*o**3
Find the third derivative of -12281837*n**5 + 17*n**2 - 4*n - 69077.
-736910220*n**2
What is the second derivative of 35605665*z**4 + 30544127*z?
427267980*z**2
What is the third derivative of 3786615*t**3*z**6 + 25*t**3*z**2 - t**2*z**2 - 476*t*z**2 + 2*z**2 wrt z?
454393800*t**3*z**3
Find the third derivative of -1165714628*i**3 - 1008313299*i**2 wrt i.
-6994287768
Find the second derivative of -1424092*q**5 - q**4 + 3*q**2 + 176334631*q.
-28481840*q**3 - 12*q**2 + 6
Find the third derivative of 134123949*r**4 + r**2 - 55738878*r wrt r.
3218974776*r
Find the second derivative of -182*k**3*p**2 - 114*k**3*p + 6*k**3 + 1614*k**2*p**2 + 13*k*p**2 + 355*k - 24 wrt p.
-364*k**3 + 3228*k**2 + 26*k
Find the second derivative of -527158*l**3 - 27*l**2 + 49868020*l.
-3162948*l - 54
What is the second derivative of -3*k**2*l + 8278192*k**2 + 1168451*k - 6*l wrt k?
-6*l + 16556384
What is the second derivative of -k**2*q**3 + 11780799*k**2 - 3*k*q**3 - 312*k - 303*q + 2 wrt k?
-2*q**3 + 23561598
Find the first derivative of 10669958*y + 1771711.
10669958
What is the second derivative of 62094568*n**4 + 64968665*n wrt n?
745134816*n**2
What is the second derivative of -11122115*d**3 + 7180754*d?
-66732690*d
Find the third derivative of -333*b**4 + 124054*b**3 + 4880855*b**2 + 49.
-7992*b + 744324
What is the third derivative of 70220853*r**3 + 1367121*r**2 - r + 1 wrt r?
421325118
What is the third derivative of -w**5 - 14087055*w**4 + 4410*w**2 - 4*w + 217 wrt w?
-60*w**2 - 338089320*w
What is the second derivative of 1048016949*q**2 - 1150367806*q wrt q?
2096033898
Find the second derivative of 91*b**3*x**2 - 79*b**3*x - 3*b**3 + 2*b**2 + 73067*b*x**2 - 7*b*x - 45*x wrt x.
182*b**3 + 146134*b
Differentiate -152796056*w**3 - 45781422 wrt w.
-458388168*w**2
Differentiate 266*s**3*y**2 - 13*s**3*y - 65*s**3 + 312*s + y**4 - 30 wrt y.
532*s**3*y - 13*s**3 + 4*y**3
What is the derivative of -28819843*x - 59799372 wrt x?
-28819843
Find the third derivative of -955674831*o**3*s**3 - o**3*s**2 - 48*o**3*s - 18*o**2*s**2 - 234*o*s + s**2 wrt s.
-5734048986*o**3
Find the third derivative of 2065376*k**2*v**4*z**2 - 3617*k**2*v*z + 94*k*z**2 + v**5 - 3*v**2*z**2 wrt v.
49569024*k**2*v*z**2 + 60*v**2
What is the third derivative of -13714764*h**3*w + h**3 - 3*h**2*w + 2*h**2 + 2*h*w - 44392*h - 3*w - 3 wrt h?
-82288584*w + 6
What is the third derivative of -426555135*b**3 + 249*b**2 - 84943*b?
-2559330810
What is the first derivative of -61181437*l**4 + 273154574?
-244725748*l**3
Differentiate 3*t**3*x**2 + 4696554*t**3*x + 28652775*t**3 wrt x.
6*t**3*x + 4696554*t**3
Find the third derivative of -6*b**4 - 387491*b**3 + 126*b**2 - 12188*b wrt b.
-144*b - 2324946
Differentiate -322152514*k - 176959500 with respect to k.
-322152514
What is the third derivative of -459*m**4 - 5276*m**3 - 15730237*m**2 wrt m?
-11016*m - 31656
Find the second derivative of n**3*q**3*v - 35*n**3*q*v**2 - 619356*n**2*q**3*v**2 + n**2*q**3*v - 318*n**2*v + 5540*n*q**3*v - 2*n - 12*q**2*v wrt v.
-70*n**3*q - 1238712*n**2*q**3
Find the first derivative of 44*z**3 + 6*z**2 - 1244*z - 312897915 wrt z.
132*z**2 + 12*z - 1244
Differentiate -2*f**2*n - 130*f*i*n - 2009*f*n + 2462*i*n + 939*n with respect to f.
-4*f*n - 130*i*n - 2009*n
What is the derivative of 1045*h**2*l*s + 2*h**2*s - 2*l*s + 1318*l + 1103463*s wrt l?
1045*h**2*s - 2*s + 1318
Find the second derivative of -19*u*y**3 + 1010*u*y**2 + 2*u*y - u + 2*y**3 - 21*y**2 - 2680528*y - 5 wrt y.
-114*u*y + 2020*u + 12*y - 42
What is the derivative of -63997728*w + 117896824 wrt w?
-63997728
What is the third derivative of -94497*f**5*r**2 + 23*f**4 - 44*f**2*r**2 - f**2*r + 8*f*r - 1181 wrt f?
-5669820*f**2*r**2 + 552*f
Differentiate 37*d*g*k**3 - 828*d*g - d*k**3 - 130*g**3 + 831*k**3 - 193*k**2 - 2*k + 2 with respect to g.
37*d*k**3 - 828*d - 390*g**2
Differentiate -14243056*t*u**3*v**2 - 3*t*v**2 - 6*u**3*v**2 + 7927657*u*v**2 with respect to t.
-14243056*u**3*v**2 - 3*v**2
What is the second derivative of 298575102*l**4 - 578*l + 564734 wrt l?
3582901224*l**2
What is the second derivative of -25*x**5 + 755*x**4 + 501*x**3 + 694588791*x?
-500*x**3 + 9060*x**2 + 3006*x
Find the second derivative of 12811*c**2*o*y**2 + 109*c**2*y**3 - 2*c*o*y**2 + 31034*c*y**3 - 60*o + 1 wrt c.
25622*o*y**2 + 218*y**3
Find the second derivative of -54984884*k**5*m**2 + 1304130360*k*m**2 wrt k.
-1099697680*k**3*m**2
Find the first derivative of 4*m**4 - 106*m**3 - 4*m**2 + 439*m + 43746995 wrt m.
16*m**3 - 318*m**2 - 8*m + 439
Find the second derivative of 2139088*b**3*h**4 + 265*b**3 + 9456*h wrt h.
25669056*b**3*h**2
What is the second derivative of 182*a*y**2 - 109*a - 17203*y**4 + 52456*y wrt y?
364*a - 206436*y**2
What is the second derivative of 13665238*u**4 - 15035025*u?
163982856*u**2
Find the second derivative of -4007755*y*z**5 - 6*y*z**3 + y*z + 170*z - 24690 wrt z.
-80155100*y*z**3 - 36*y*z
Find the second derivative of -207382007*l**2 + 554791596*l.
-414764014
Find the third derivative of 1552111*z**5 - z**3 - 10586189*z**2 wrt z.
93126660*z**2 - 6
Find the second derivative of 38127*k*w**2 + 719228*k*w - 106*k - 2803*w**4 wrt w.
76254*k - 33636*w**2
What is the second derivative of -1062556827*s**2 + 92865*s - 4891 wrt s?
-2125113654
Find the second derivative of 31619071*g**2*y**2 - 4*g**2 - 2*g*y**2 + 7*g*y - 2*g + 59673*y**2 - y + 1 wrt g.
63238142*y**2 - 8
What is the second derivative of 3706845*m**2 + 14305553*m?
7413690
Find the second derivative of -6115*i**4 - 6*i**3 - i**2 - 9*i - 65 wrt i.
-73380*i**2 - 36*i - 2
Differentiate -3*v**3 + 2850165*v + 38693134 wrt v.
-9*v**2 + 2850165
Find the second derivative of -12269155*d**3 - 61*d - 3934 wrt d.
-73614930*d
What is the first derivative of -5971736*j - 7185091 wrt j?
-5971736
Find the second derivative of 437773197*q**2 - 89*q - 3063095.
875546394
What is the third derivative of -2*k**3*s**3 + 12*k**3*s**2 + 161397*k**3 + 86643*k**2*s**3 - 125*k**2*s**2 wrt k?
-12*s**3 + 72*s**2 + 968382
Find the third derivative of 16301587*x**5 + 8*x**2 + 86070*x + 1 wrt x.
978095220*x**2
What is the derivative of 1537808*t*y**2 + 5*t*y - 916150*y**2 wrt t?
1537808*y**2 + 5*y
What is the third derivative of 3*f*o*y**3 + 5*f*o*y**2 - 155*f*o*y - 64*f |
- 1 = c for i.
0
Suppose 3*r = 5*c - 59, 3*c + 5*r - 9 = 6. Suppose -3*y = -5*m + c, 0 = m + m - 5*y - 4. Solve -5*s = -2*a + 8, 3*a - 11 = m*s + 1 for a.
4
Let y(u) = 15*u. Let r be y(-1). Let f be (r/(-9) + -2)*-9. Solve 4*t = 4, b + f*t = 6*t - 3 for b.
0
Let j be 1/(-1*(-2)/6). Let b(g) be the first derivative of -g**3/3 + 4*g**2 - 4*g - 3. Let s be b(5). Solve -5*k + 2*d = s - 1, 8 = j*k - 4*d for k.
-4
Suppose -3*a + 2*a = -2*p + 26, -4*p = 4*a - 64. Suppose d = 5*x + 2*d - p, 2 = x + d. Solve -21 = 4*j + 3*g, 0*j - 4*g = -3*j + x for j.
-3
Let s be (-2)/3 - 14/(-3). Suppose -6*y - s*k = -2*y, -2*y + 4*k + 6 = 0. Suppose -4*w + 5*n = 0, -w + 2*n + y = n. Solve 4*x - w*q = 36, 0 + 4 = -q for x.
4
Suppose -5 - 1 = -3*l. Suppose -l*h = -h. Solve f + 5 = h, -o + 28 = -5*o - 4*f for o.
-2
Suppose -5 = 4*p + 4*m - 1, -2*p = -5*m - 26. Solve -3*z + p - 9 = w, -5*z - 11 = 2*w for w.
-3
Suppose -2 = n + 5*s - 0, -s = -4*n - 8. Let q = n + 4. Let y be (-30)/4*q/(-3). Solve 0 = -4*b + 3*d + 1 + 18, y*d + 1 = -b for b.
4
Let t(l) = l**3 + l**2 + 1. Let r be t(-1). Let z be 1*(2 + -1) - r. Solve -5*k - 2*q - 8 = z, -3*k - 6 = 3*q - 3 for k.
-2
Suppose -2*o = 3 - 1. Let l be o/(-2) + (-18)/(-4). Solve -r + 10 = -4*g, 5*r - l = 5 for g.
-2
Let j(h) = -h**3 + 3*h**2 - 2. Let i be j(2). Let y be -2 - ((-12)/2 - -2). Solve y*r - 4 = -b + 2, -r = i*b for r.
4
Let h be 6/9*(-15)/2. Let r = h - -5. Solve 0 = 4*z - r - 4, 23 = -5*y + 3*z for y.
-4
Suppose -2*u + u = -7. Solve -10 - u = -4*h + f, 24 = 3*h + 3*f for h.
5
Suppose -3*b - 15 = -6*b. Let a = 7 - b. Suppose -3*c - a*c = 0. Solve 5*t = c, q = -q - t for q.
0
Suppose -5*v + 18 = -3*z - 7, -v - 3*z = -5. Suppose -5 = v*o - 3*k - 0, -k + 5 = 0. Solve o*s = -h - 0*s + 8, -2*h = -3*s + 5 for h.
2
Let i = 2 - -2. Suppose 0 = i*z - 43 - 13. Suppose 5*k + 4*s - z = 2, 0 = -2*k - 3*s + 5. Solve 3*n = g - 6 - 10, k*n = 4*g - 24 for g.
1
Let n(f) = f**2 + 7*f. Let g be n(-6). Let v(i) = -i**3 - 6*i**2 + i + 7. Let p be v(g). Solve 0 = 5*h + 4*q - 13, -4*h = h - 3*q + p for h.
1
Suppose 4*m - 22 + 14 = 0. Solve 0 = -2*s - 5*u - 3 - 2, m*u - 27 = 5*s for s.
-5
Let v be (-7 + 8)/(2/8). Solve v*f + 4*h + 5 = 13, -4*f + 18 = -h for f.
4
Let p be 80/45 + (-2)/(-9). Suppose 0 = -x + 3*g + 16, p = 3*x - 4*g - 26. Solve -m = -0*m + 5, -4*i = x*m + 4 for i.
4
Suppose 4*x - x + 9 = 0. Let s be (6 + x)*1/1. Solve -s*b = 5*j + 17, 0 = b + b + 8 for j.
-1
Let j = 1 - 1. Suppose 2*q - 3 - 5 = j. Suppose 4*k + 3*h = 3 - 2, -5*h = -2*k + 33. Solve 4*a = 5*g + k, -q*a - 3*g = 32 - 4 for a.
-4
Let f be -3*((-30)/9 - -2). Suppose 3 = -f*b - 17. Let y be 2/(-5)*1*b. Solve -5*v + 15 = -y*l, -4*l - 5*v + 35 = -2*l for l.
5
Let o(j) = -j + 12. Let i be o(6). Let c(a) = 2*a - 8. Let h be c(i). Solve h*m - s - 22 = 4*s, m + 3 = -3*s for m.
3
Let u be ((-1)/2)/((-1)/8). Let p(o) = o**3 + o**2. Let s be p(-1). Suppose s = -0*f + 2*f. Solve 0 = u*j + j - 5*n + 25, f = 4*j + 2*n - 4 for j.
-1
Let a be 1 + 1 - 0/15. Suppose 5*q = -0*f - f + 10, -4 = a*f - 2*q. Solve 0*i = -2*z + i + 10, 4*z - 4*i - 24 = f for z.
4
Let l be (36/20)/((-12)/(-40)*2). Let w = -7 + 12. Solve -5*z + 12 + 10 = l*b, 0 = -b - w*z + 24 for b.
-1
Let s be 1/(-3) + (-1)/(-3). Let q = -35 + 63. Suppose 3*v + 4 = -v, -d = -3*v - q. Solve y = -s*y + 2, 3*k - 5*y + d = 0 for k.
-5
Let h(o) = 7*o**2 - o**3 - 2 + 6 - 1 + 1. Let y = -4 - -11. Let f be h(y). Solve 8 = 2*v - 4*v - f*u, 0 = -4*v - 3*u - 11 for v.
-2
Let v(y) = y**3 - 8*y**2 - 5*y - 16. Let c be v(9). Solve -4*g + 30 = 3*m - 5, 3*m = -g + c for g.
5
Let o(i) = -17*i - 1. Let j be o(1). Let d = -15 - j. Solve 2*s = 4*y + 6, y + d*s + 7 = 23 for y.
1
Let l be (-8)/(16/(-30)) - 1. Solve -u + 2*s = -l, -3*s + 21 = -u - 8*s for u.
4
Let h(o) = -2*o - 14. Let k be h(-10). Let d = 6 + -4. Let y = k - d. Solve 0*l + 9 = -y*f + l, 5*l - 26 = f for f.
-1
Let a(k) = -2*k**3 + 2 + 3 + 2*k**3 + k**3. Let b be a(0). Solve -n + 3 - b = 0, 30 = 4*u - 5*n for u.
5
Let d be (-5)/15 + (-146)/(-6). Suppose 3*o - d = -0*o - 2*k, -2*o = 5*k - 27. Solve 2*f - 8 = g, 4*g - o*g - 11 = -3*f for g.
2
Let f be 8 - ((-12)/2)/(-2). Solve 0 = -5*y - 4*g - f, 2 - 1 = -y + 4*g for y.
-1
Let x = -44 - -46. Solve j + g = 5*j - 25, -x*j + 15 = -g for j.
5
Let j be (2/(4/(-10)))/(-1). Suppose 2*f = 13 - j. Solve 5*q + 25 = 2*p, -f*p = -6*q + 5*q - 23 for p.
5
Let l = 93 - 28. Let g = l - 37. Solve -3*q - 17 = -5*h, -4*h - 12 = -g for q.
1
Let o = 3 + 1. Let u be (30/(-25))/(o/(-50)). Solve 0 = 5*l + 5*z + u, 2*z = l + z + 1 for l.
-2
Suppose -2*s - 5 - 15 = 0. Let h = 13 + s. Solve p - 9 = 2*p + 2*g, 2*p - 10 = h*g for p.
-1
Suppose -25 - 19 = 2*a. Let m = 39 + a. Solve -m = 4*g + q, 0 = -3*g - 4*q - 0*q - 16 for g.
-4
Suppose 2*i = -i + 27. Suppose 13*t - 48 = 5*t. Solve 3*h + 3*d + i = t*d, -h = -3*d + 7 for h.
-1
Let n(z) = 7*z + 14. Let d(s) = -10*s - 21. Let y(w) = 5*d(w) + 7*n(w). Let a be y(-7). Solve m = -2*m - 2*v - 11, 3*m + 3*v + 15 = a for m.
-1
Suppose 2*z = 5*z - 15. Suppose y = -4*y. Suppose 3*r = 5*m + 12 - 82, y = -m - r + 14. Solve 3*a - 2 = z*f, f - m = -2*a - 2*f for a.
4
Suppose 5*k - 9*k = 0. Suppose k = -2*c + 9 + 33. Solve 3*t + 3*a + 29 = -a, -c = 2*t + 3*a for t.
-3
Let s be (2 - (-3)/6)*30. Suppose 5*q - s = -0*q. Solve c - 5*t = 19, -t - q = -c + 3*t for c.
-1
Let n(k) = 3*k**3 + 4*k**2 + 4*k - 1. Let i be n(-3). Let d be i/(-5) + 16/40. Solve 2*r - r = 0, -r = -3*f + d for f.
4
Let i(j) = -j**3 + 5*j**2 + j. Let h be i(5). Suppose 3*x = -2*x - w - 20, 4*w = -5*x - 20. Let b = 7 + x. Solve -q = -c + 4*c, b*c = -h*q for q.
0
Let w(l) = l**3 - 2*l + 1. Let r be w(2). Solve -v + 21 = -r*x, v - 5*v - 31 = 3*x for v.
-4
Suppose -2*q - 3*q = 0. Let l be 31 + (1 + 1 - 3). Solve p - 2*i + 9 = -q*i, -5*i = -4*p - l for p.
-5
Suppose 3*f + 8 = 29. Let s = f - -14. Suppose 0 = -5*p - 4*h - h - 15, p - s = 5*h. Solve -2*n + 3*n = -3*g - p, -3*n = 3*g + 9 for n.
-4
Let b be 1*2 + (-1 - -2). Let p = 17 + -9. Suppose 2*c = 2*w + p, 20 = 5*c + 2*w + 2*w. Solve 0 = -4*k, -c*d + b = 4*k - 1 for d.
1
Let u = 0 - 0. Let n be (-1)/2*-2*2. Suppose p - n - 1 = u. Solve 3*h = 3*f - p, -h - f + 16 = -5*h for h.
-5
Let j(k) be the second derivative of k**3/6 - 4*k. Let c be j(0). Suppose c*s - s = 0. Solve 3*p + 5*g + 16 = s, p + 4 = -3*g - 4 for p.
-2
Suppose 5*f + 0*b + 5*b = 5, 0 = -3*f - 2*b + 5. Suppose -7 - 5 = -f*s. Solve -2 = -h + s*n, h - 2*n + 4*n = 2 for h.
2
Let p = -38 - -40. Solve -u + 11 = -0*u - p*h, 17 = u - 4*h for u.
5
Let t = -1 + 6. Suppose 0 = t*c - 10*c. Suppose c = -0*q + q. Solve -3*v - 18 = 2*r, -5*v + q*r = r + 23 for v.
-4
Suppose 4*q = 5*q. Let k(i) = -3*i - 3. Let h be k(-2). Suppose -h*b = -0*b. Solve 3*y + 2*g - 3*g - 3 = q, b = 5*g + 15 for y.
0
Suppose u + 0 = 10. Suppose 6*x - 3*x - 2*k + 4 = 0, -u = -5*k. Solve 2*d + d = -5*w + 24, x = -5*d + w + 12 for d.
3
Let b(m) = m**3 - 4*m**2 + 2*m - 5. Let p be b(4). Suppose -3*n = i - 39, -69 = -5*n - 5*i + 2*i. Solve 2*r = -r - p*s - n, -3*s - 14 = 4*r for r.
-2
Suppose -2*z + 11 = s, -3*s + 15 - 42 = -4*z. Suppose 0 = 5*a + 2*l - 5*l - 22, -2*a + l + 8 = 0. Solve -3*y + a*y - z = -t, 5*t - y - 14 = 0 for t.
2
Suppose -y - 2 = 0, -3*y + 0 - 1 = u. Solve -f = u*t - 22, 2 + 13 = 3*t for f.
-3
Suppose r + 2*n - 5 = 0, 4*n - 5 = -0*r + 3*r. Let s be r/1 - (-5)/1. Solve -5*a + 4*l - s*l = -5, -5 = -5*a + 3*l for a.
1
Let i be (-8 - 1)/(1*12/(-8)). Solve -4*t = 5*h + 32, 4*h - i*h = 3*t + 17 for h.
-4
Let j be 0 + -5*(0 - 1). Let v = 43 - 20. Suppose 0 = r + 2*r - 15. Solve -w + n = r, -w - j*n = -4*w - v for w.
-1
Let b be 3/15 - (-84)/30. Solve 1 = -m + 3*q, 2*q = b + 1 for m.
5
Let w = 43 - 41. Solve -4*y + 8 + 6 = w*c, 4*y = c - 1 for y.
1
Let t(n) = -n**2 + 3*n + 1. Let k be t(2). Solve 5 = -4*i + i - 4*p, 0 = -3*i - 3*p - k for i.
1
Let k(l) = -3*l + 4. Let i be k(0). Let c(z) = 14*z**2 + z + 1. Let h be c(-1). Solve -a = i*a + 4*j + h, 2*j = a for a.
-2
Let u = 13 - 2. Solve 4*i + 0*h + 3*h - u = 0, i - 19 = -4*h for i.
-1
Suppose 2*o = s + 31 + 33, -3*o - 2*s + 89 = 0. Solve -3*d = -3*f + 21, 0 = 2*f + 3*f - 4*d - o for f.
3
Let r = 1 + -7. Let s be (r/5)/((-4)/10). Suppose -2 = 6*v - v + 4*o, 9 = -s*o. Solve 5*p + 40 = -v*g + 7, g = -3*p - 19 for g.
-4
Let o(m) |
Story highlights
The ring allegedly helped scores of customers find organs by targeting poor men
One analyst believes the shortage of donated organs in China is the main motive
A Beijing court has prosecuted more than a dozen people for organizing the illegal sale of 51 human kidneys worth about 10 million yuan (US$1.6 million) in one of China's biggest organ trafficking cases.
The ring, headed by Zheng Wei, allegedly helped scores of customers find organs by paying mostly young and poor men approximately 25,000 yuan each. Their kidneys were then sold for about 200,000 yuan, according to the state-controlled People's Daily.
The Beijing Haidian District People's Procuratorate prosecuted Zheng and 15 others involved in the scam, including some doctors from state-run hospitals.
According to reports, an operation room from a township hospital in Jiangsu Province was set up between March and June of 2010, where more than 20 kidneys were removed from living "sellers" and sent to Beijing for patients suffering from kidney disease.
Zheng then purportedly moved the operational base to Beijing in the second half of the year to ensure easier transportation of the organs and to minimize their spoiling. Police busted up the ring in December.
One analyst believes the shortage of donated organs in China is the main motive for the growing practice, but added that the issue of ethics played its part.
"The involvement of medical staff in such illegal acts reflects management loopholes in hospitals. Strengthening professional ethics of doctors is important to wiping out the illegal dealings," Zhou Zijun, a professor at Peking University's School of Public Health, told the People's Daily. |
Tupelo Regional Airport
Tupelo Regional Airport is a public use airport located three nautical miles (6 km) west of the central business district of Tupelo, a city in Lee County, Mississippi, United States. It is owned by the Tupelo Airport Authority. The airport is mostly used for general aviation, but is also served by one commercial airline with scheduled passenger service subsidized by the Essential Air Service program. Many college football teams visiting the University of Mississippi (Ole Miss), 49 miles west in Oxford, fly into Tupelo.
As per the Federal Aviation Administration, this airport had 15,985 passenger boardings (enplanements) in calendar year 2008, 13,319 in 2009, and 12,749 in 2010. The National Plan of Integrated Airport Systems for 2011–2015 categorized it as a primary commercial service airport.
Facilities and aircraft
Tupelo Regional Airport covers an area of 1,061 acres (429 ha) at an elevation of 346 feet (105 m) above mean sea level. It has one runway designated 18/36 with an asphalt surface measuring 6,502 by 150 feet (1,982 x 46 m).
For the 12-month period ending December 31, 2011, the airport had 50,916 aircraft operations, an average of 139 per day: 56% general aviation, 38% military, 6% air taxi, and <1% scheduled commercial. At that time there were 68 aircraft based at this airport: 35% single-engine, 22% multi-engine, 9% jet, 3% helicopter, and 31% military. An additional primary function of the airport is to serve as an aircraft boneyard, including scrapping, parts recycling and aircraft storage.
Historical Air Service
Back in the '70s, Tupelo was served by Southern Airways with direct flights to Columbus, Memphis, and Tuscaloosa using Martin 404 piston airliners. In the '80s, Scheduled Skyways began service to Memphis and Meridian using Nord 262s and Swearingen Metroliners. When Memphis began growing as a Northwest hub, Northwest Airlink began Saab 340 turboprop service to Tupelo, with a continuing flight to Muscle Shoals. During the merger between Northwest and Delta, the Muscle Shoals flight was cut, and eventually all Northwest Airlink service was replaced by Delta Connection. Delta Connection had direct flights to Memphis and Atlanta, with the Memphis flight eventually being cut. They served Tupelo with Bombardier CRJ-200 aircraft. In 2012, after Delta Connection left, Silver Airways began service to Greenville, Muscle Shoals, and Atlanta using Saab 340s. Silver Airways terminated service in October 2014 and was replaced by Seaport Airway. Seaport flew for one year, leaving at the end of October 2015. The Airport was without service for five months until April 2016 when [Contour Airlines] began service with five daily flights to [Nashville International Airport Nashville]. Since April 2016, Contour has upgraded service three times going from twin turboprop with nine seat to ERJ35s. Tupelo's annual enplanements have steadily grown and the Airport has once again obtained [Primary Airport] status with the [FAA] in 2017, 2018 and 2019.
Airlines and destinations
Passenger
Contour Airlines began daily flights to Nashville using British Aerospace Jetstream 31 turboprop aircraft. On April 1st 2016, this service was upgraded to the Embraer E135 regional jet.
Cargo
Tupelo has no scheduled cargo service, but gets various cargo charters from time to time, most notably Embraer EMB120s by Berry Aviation and ATR 72s by FedEx.
Tupelo Army Aviation Support Facility
Mississippi Army National Guard has Apache and Lakota helicopters based at the facility.
2018 Presidential Visit
On Monday 26th November 2018 President Donald Trump visited the airport onboard an Air Force Boeing C-32 on his way to a Republican rally.
Statistics
References
Further reading
Essential Air Service documents (Docket DOT-OST-2009-0160) from the U.S. Department of Transportation:
Ninety-day notice (July 14, 2009): from Mesaba Aviation, Inc. of its intent to discontinue unsubsidized scheduled air service at the following communities, effective October 12, 2009: Paducah, KY; Alpena, MI; Muskegon, MI; Hancock, MI; Sault Ste. Marie, MI; International Falls, MN; Tupelo, MS and Eau Claire, WI.
Essential Air Service documents (Docket DOT-OST-2009-0305) from the U.S. Department of Transportation:
Memorandum (November 19, 2009): closing out docket DOT-2009-0160 and opening up eight new dockets for the various communities (Alpena, MI; Eau Claire, WI; Hancock/Houghton, MI; International Falls, MN; Muskegon, MI; Paducah, KY; Sault Ste. Marie, MI; Tupelo, MS).
Order 2010-5-18 (May 13, 2010): setting final past-period subsidy rates for Mesaba Airlines, Inc., d/b/a Delta Connection, for its forced service at Alpena and Sault Ste. Marie, Michigan, International Falls, Minnesota, and Tupelo, Mississippi. Also selecting Mesaba to provide essential air service (EAS) at three of these four communities on a prospective basis. At the fourth community, Tupelo, we are tentatively selecting Mesaba to provide service based on a pro-rata application of the rate Mesaba agreed to which the staff applied to a reduced service level.
Ninety Day Notice (July 15, 2011): from MESABA AVIATION, INC. and PINNACLE AIRLINES, INC. of termination of service at Tupelo, MS.
Order 2011-9-5 (September 13, 2011): prohibiting suspension of service and requesting proposals
Order 2012-5-17 (May 22, 2012): selecting Silver Airways, formerly Gulfstream International Airways, to provide Essential Air Service (EAS) at Muscle Shoals, Alabama, Greenville, Laurel/Hattiesburg, and Tupelo, Mississippi, and Greenbrier/White Sulphur Springs, West Virginia (Lewisburg), using 34-passenger Saab 340 aircraft, for a combined annual subsidy of $16,098,538. Tupelo will receive 18 weekly round trips over a Greenville-Tupelo-Atlanta routing
Order 2012-6-3 (June 6, 2012): extending the Essential Air Service obligation of the two wholly owned subsidiaries of Pinnacle Airlines Corporation -- Mesaba Aviation, Inc. and Pinnacle Airlines, d/b/a Delta Connection at the eight communities listed below (Muscle Shoals, AL; Alpena, MI; Iron Mountain/Kingsford, MI; Brainerd, MN; International Falls, MN; Greenville, MS; Laurel/Hattiesburg, MS; Tupelo, MS) for 30 days, through, July 9, 2012.
Notice of Intent (April 9, 2014): of Silver Airways Corp. ... to discontinue subsidized scheduled air service between Atlanta, Georgia (ATL) and each of Muscle Shoals, Alabama (MSL), Greenville, Mississippi (GLH), Laurel/Hattiesburg, Mississippi (PIB), and Tupelo, Mississippi (TUP). Silver Airways intends to discontinue this service on July 8, 2014 or such earlier date as permitted by the Department in any final order terminating the eligibility of any of these communities under the essential air service (EAS) program.
Order 2014-4-24 (April 22, 2014): prohibits Silver Airways Corp., from terminating service at Muscle Shoals, Alabama, Greenville, Laurel/Hattiesburg, Meridian, and Tupelo, Mississippi, for 30 days beyond the end of the air carrier's 90-day notice period, i.e. August 7, 2014. We are also requesting proposals from air carriers interested in providing Essential Air Service (EAS) at Muscle Shoals, Greenville, Laurel/Hattiesburg, Meridian, and/or Tupelo.
External links
Tupelo Regional Airport, official site
Aerial image as of March 1996 from USGS The National Map
Category:Airports in Mississippi
Category:Essential Air Service
Category:Tupelo, Mississippi
Category:Buildings and structures in Lee County, Mississippi
Category:Transportation in Lee County, Mississippi |
/*
* Copyright (c) 2013 The WebM project authors. All Rights Reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#ifndef WEBMDEC_H_
#define WEBMDEC_H_
#include "./tools_common.h"
#ifdef __cplusplus
extern "C" {
#endif
struct VpxInputContext;
struct WebmInputContext {
void *reader;
void *segment;
uint8_t *buffer;
const void *cluster;
const void *block_entry;
const void *block;
int block_frame_index;
int video_track_index;
uint64_t timestamp_ns;
int is_key_frame;
int reached_eos;
};
// Checks if the input is a WebM file. If so, initializes WebMInputContext so
// that webm_read_frame can be called to retrieve a video frame.
// Returns 1 on success and 0 on failure or input is not WebM file.
// TODO(vigneshv): Refactor this function into two smaller functions specific
// to their task.
int file_is_webm(struct WebmInputContext *webm_ctx,
struct VpxInputContext *vpx_ctx);
// Reads a WebM Video Frame. Memory for the buffer is created, owned and managed
// by this function. For the first call, |buffer| should be NULL and
// |*buffer_size| should be 0. Once all the frames are read and used,
// webm_free() should be called, otherwise there will be a leak.
// Parameters:
// webm_ctx - WebmInputContext object
// buffer - pointer where the frame data will be filled.
// buffer_size - pointer to buffer size.
// Return values:
// 0 - Success
// 1 - End of Stream
// -1 - Error
int webm_read_frame(struct WebmInputContext *webm_ctx, uint8_t **buffer,
size_t *buffer_size);
// Guesses the frame rate of the input file based on the container timestamps.
int webm_guess_framerate(struct WebmInputContext *webm_ctx,
struct VpxInputContext *vpx_ctx);
// Resets the WebMInputContext.
void webm_free(struct WebmInputContext *webm_ctx);
#ifdef __cplusplus
} // extern "C"
#endif
#endif // WEBMDEC_H_
|
Q:
Exibir uma string em um campo de texto que está bloqueado para edição
Desenvolvi um chat cliente-servidor e estou incrementando algumas funções para deixa-lo mais apresentável e completo. Uma coisa que ainda não sei como faz é exibir uma string dentro de um campo de texto.
Assim que eu executo o programa, peço para que o usuário digite seu nome em campo de diálogo e armazeno em uma string.
Gostaria que essa string fosse mostrada em um campo de texto (abaixo a foto do chat e do respectivo campo onde quero que seja mostrado a String nome).
A:
Você não forneceu um exemplo Mínimo, Completo e Verificável, mas nos testes que fiz, não houve problema algum utilizar settext() para definir o texto do JTextField, mesmo que esteja bloqueado pra edição:
O fato do campo estar bloqueado para edição ou até mesmo esteja desativado não impede de ser inserido/alterado/apagado texto nele, desde que seja feito programaticamente.
|
package gostub
import (
"fmt"
"reflect"
)
// Stub replaces the value stored at varToStub with stubVal.
// varToStub must be a pointer to the variable. stubVal should have a type
// that is assignable to the variable.
func Stub(varToStub interface{}, stubVal interface{}) *Stubs {
return New().Stub(varToStub, stubVal)
}
// StubFunc replaces a function variable with a function that returns stubVal.
// funcVarToStub must be a pointer to a function variable. If the function
// returns multiple values, then multiple values should be passed to stubFunc.
// The values must match be assignable to the return values' types.
func StubFunc(funcVarToStub interface{}, stubVal ...interface{}) *Stubs {
return New().StubFunc(funcVarToStub, stubVal...)
}
type envVal struct {
val string
ok bool
}
// Stubs represents a set of stubbed variables that can be reset.
type Stubs struct {
// stubs is a map from the variable pointer (being stubbed) to the original value.
stubs map[reflect.Value]reflect.Value
origEnv map[string]envVal
}
// New returns Stubs that can be used to stub out variables.
func New() *Stubs {
return &Stubs{
stubs: make(map[reflect.Value]reflect.Value),
origEnv: make(map[string]envVal),
}
}
// Stub replaces the value stored at varToStub with stubVal.
// varToStub must be a pointer to the variable. stubVal should have a type
// that is assignable to the variable.
func (s *Stubs) Stub(varToStub interface{}, stubVal interface{}) *Stubs {
v := reflect.ValueOf(varToStub)
stub := reflect.ValueOf(stubVal)
// Ensure varToStub is a pointer to the variable.
if v.Type().Kind() != reflect.Ptr {
panic("variable to stub is expected to be a pointer")
}
if _, ok := s.stubs[v]; !ok {
// Store the original value if this is the first time varPtr is being stubbed.
s.stubs[v] = reflect.ValueOf(v.Elem().Interface())
}
// *varToStub = stubVal
v.Elem().Set(stub)
return s
}
// StubFunc replaces a function variable with a function that returns stubVal.
// funcVarToStub must be a pointer to a function variable. If the function
// returns multiple values, then multiple values should be passed to stubFunc.
// The values must match be assignable to the return values' types.
func (s *Stubs) StubFunc(funcVarToStub interface{}, stubVal ...interface{}) *Stubs {
funcPtrType := reflect.TypeOf(funcVarToStub)
if funcPtrType.Kind() != reflect.Ptr ||
funcPtrType.Elem().Kind() != reflect.Func {
panic("func variable to stub must be a pointer to a function")
}
funcType := funcPtrType.Elem()
if funcType.NumOut() != len(stubVal) {
panic(fmt.Sprintf("func type has %v return values, but only %v stub values provided",
funcType.NumOut(), len(stubVal)))
}
return s.Stub(funcVarToStub, FuncReturning(funcPtrType.Elem(), stubVal...).Interface())
}
// FuncReturning creates a new function with type funcType that returns results.
func FuncReturning(funcType reflect.Type, results ...interface{}) reflect.Value {
var resultValues []reflect.Value
for i, r := range results {
var retValue reflect.Value
if r == nil {
// We can't use reflect.ValueOf(nil), so we need to create the zero value.
retValue = reflect.Zero(funcType.Out(i))
} else {
// We cannot simply use reflect.ValueOf(r) as that does not work for
// interface types, as reflect.ValueOf receives the dynamic type, which
// is the underlying type. e.g. for an error, it may *errors.errorString.
// Instead, we make the return type's expected interface value using
// reflect.New, and set the data to the passed in value.
tempV := reflect.New(funcType.Out(i))
tempV.Elem().Set(reflect.ValueOf(r))
retValue = tempV.Elem()
}
resultValues = append(resultValues, retValue)
}
return reflect.MakeFunc(funcType, func(_ []reflect.Value) []reflect.Value {
return resultValues
})
}
// Reset resets all stubbed variables back to their original values.
func (s *Stubs) Reset() {
for v, originalVal := range s.stubs {
v.Elem().Set(originalVal)
}
s.resetEnv()
}
// ResetSingle resets a single stubbed variable back to its original value.
func (s *Stubs) ResetSingle(varToStub interface{}) {
v := reflect.ValueOf(varToStub)
originalVal, ok := s.stubs[v]
if !ok {
panic("cannot reset variable as it has not been stubbed yet")
}
v.Elem().Set(originalVal)
}
|
July 04, 2012
C'mon, More Berries!
My raspberry bush is as healthy as can be this year! Funny to think that it was only a year ago I received it from a 'freecycler' online, who's raspberry plants had overrun her back yard. I can't wait for them to overrun mine! So far I've been able to collect and consume four ruby red fruits from it with only one casualty. One which I think was overly ripe and just couldn't hold on to it's core any longer, falling to it's death on the ground to become a juicy snack for critters.
I've got a lot of tomato plants out in the garden...maybe 20 of them..in a small space. lol I over-planted just in case some of them didn't make it through the season and now that they're all looking quite strong and healthy, I can't bring myself to disrupt them, none the less dig them up!
The strawberry plant from Walmart's garden center is doing well. It was a buck and I've never had one before. I'll be the happiest girl, if I get even one berry. :)
No comments:
Post a Comment
About
Hi, I'm Janetta from Toronto. I cook, bake and make big messes. I photograph nearly everything and those photos will most likely end up being posted here. I've got a little black cat named Tank, who's super cute and a little bit nosy. You'll see a lot of photos of her too! |
33,000 sq ft of Solar Control Window Film
Private Office
Decorative Window Film
Private Office
Gradient Window Film for Privacy
Private Office
Frost Window Film for Privacy
Trust Sun Tint for All Your Window Film & Window Tint Needs
You want the job done right… We know you’re busy and want to work with a company you can rely on. Rest assured knowing Sun Tint is on the job.
Easy… Simply make one phone call to 512.467.6767 or email the job specifics to 512.467.0500and let us take care of the rest!
Years of valuable experience… We’ve been in the window tint business since 1982 making us the most experienced business of our kind here in central Texas.
Cost effective & offer competitive pricing… We study square footage & glass dimension requirements to limit as much film waste as possible to save you money.
Knowledgeable & accurate…We offer current technology window film types. We take into account the type of glass & window (ie: glass thickness & single pane vs. double pane) and only install the correct type of window film to avoid damage caused by improper film application.
Accustomed to working in occupied spaces… From the hospitality industry to office & cubicle situations to high security government environments, we understand the nuances of working with & around people in their personal spaces.
Fully Insured including Worker’s Comp… We carry better than industry average liability amounts and our safety record is spotless.
Familiar with Austin Energy procedures…We can determine if your job qualifies for rebates from Austin Energy and we’ll take care of proper documentation.
MINI SHOWROOM
LINKS
For LEEDS Professionals, please use the following link to see how our window films can add to your LEEDS Credits:http://solargard.com/Energy/Home (carbon footprint… etc)
They Say
Our Company has been using Sun Tint for 12 years and love them! They are very professional and always provide great service. Their workmanship is wonderful and they will continue to be the only tinting company we use. We also enjoy working with the owners, what great people!
Kerry & Julie Morris, owners of Morris Glass Company
I approached many local tint Companies with a fairly large project for our Crowne Plaza Hotel. Russell Haertl and his entire staff with Sun Tint were my easy choice and the job they completed met all our expectations. His guarantee not to disrupt our guests and his time frame on completing the job were all met and exceeded. I highly recommend Sun Tint and will complete another job with them in the near future. |
Q:
Java call type performance
I put together a microbenchmark that seemed to show that the following types of calls took roughly the same amount of time across many iterations after warmup.
static.method(arg);
static.finalAnonInnerClassInstance.apply(arg);
static.modifiedNonFinalAnonInnerClassInstance.apply(arg);
Has anyone found evidence that these different types of calls in the aggregate will have different performance characteristics? My findings are they don't, but I found that a little surprising (especially knowing the bytecode is quite different for at least the static call) so I want to find if others have any evidence either way.
If they indeed had the same exact performance, then that would mean there was no penalty to having that level of indirection in the modified non final case.
I know standard optimization advice would be: "write your code and profile" but I'm writing a framework code generation kind of thing so there is no specific code to profile, and the choice between static and non final is fairly important for both flexibility and possibly performance. I am using framework code in the microbenchmark which I why I can't include it here.
My test was run on Windows JDK 1.7.0_06.
A:
If you benchmark it in a tight loop, JVM would cache the instance, so there's no apparent difference.
If the code is executed in a real application,
if it's expected to be executed back-to-back very quickly, for example, String.length() used in for(int i=0; i<str.length(); i++){ short_code; }, JVM will optimize it, no worries.
if it's executed frequently enough, that the instance is mostly likely in CPU's L1 cache, the extra load of the instance is very fast; no worries.
otherwise, there is a non trivial overhead; but it's executed so infrequently, the overhead is almost impossible to detect among the overall cost of the application. no worries.
|
Channel 12 low-power TV stations in the United States
The following low-power television stations broadcast on digital or analog channel 12 in the United States:
K12AA-D in Troy, Montana
K12AH in Big Piney, etc., Wyoming
K12AK-D in Crested Butte, Colorado
K12AL-D in Waunita Hot Springs, Colorado
K12AV-D in Pateros/Mansfield, Washington
K12AZ in Spring Glen, etc., Utah
K12BA-D in Winthrop-Twisp, Washington
K12BE-D in Orondo, etc., Washington
K12BF-D in Ardenvoir, Washington
K12BK in Worland, Wyoming
K12CD in Kanarraville, Utah
K12CE in Scofield, Utah
K12CV-D in Riverside, Washington
K12CW-D in Malott/Wakefield, Washington
K12CX-D in Tonasket, Washington
K12DE-D in Lund & Preston, Nevada
K12DL in Duchesne, etc., Utah
K12FB-D in Saco, Montana
K12FG in Roosevelt, etc., Utah
K12FY in Big Laramie, etc., Wyoming
K12GI in Morgan, etc., Utah
K12GP-D in Dodson, Montana
K12JI in Newberry Springs, California
K12JJ-D in Benbow, etc., California
K12LA-D in Kenai, etc., Alaska
K12LF-D in Coolin, Idaho
K12LI in Thayne, etc., Wyoming
K12LO-D in Ferndale, Montana
K12LR in Forsyth, Montana
K12LS-D in Challis, Idaho
K12LU-D in West Glacier, etc., Montana
K12LV-D in Dryden, Washington
K12LX-D in Powderhorn, Colorado
K12MD in Sleetmute, Alaska
K12MI-D in Laketown, etc., Utah
K12MM-D in Girdwood Valley, Alaska
K12MO in Copper Center, Alaska
K12MS-D in Elko, Nevada
K12MW-D in Manhattan, Nevada
K12NH-D in Hobbs, New Mexico
K12NO in Sheep Mountain, Alaska
K12NP in Atmautluak, Alaska
K12NR in Kake, Alaska
K12NS in Akiak, Alaska
K12NW in Halibut Cove, Alaska
K12NZ in Idaho Falls, Idaho
K12OC-D in Red River, New Mexico
K12OF-D in Bullhead City, Arizona
K12OG-D in Taos, New Mexico
K12OR in Mesa, Colorado
K12OV-D in Shelter Cove, California
K12PN-D in Cedar Canyon, Utah
K12PO in Temecula, California
K12PT-D in Ryndon, Nevada
K12QH-D in Dolores, Colorado
K12QM-D in Thomasville, Colorado
K12QO-D in Aspen, Colorado
K12QQ-D in Cedar City, Utah
K12QS-D in Mink Creek, Idaho
K12QT-D in Trout Creek, etc., Montana
K12QV in San Bernardino, California
K12QW-D in Silver City, New Mexico
K12QY-D in Leamington, Utah
K12QZ-D in San Luis Obispo, California
K12RA-D in Colstrip, Montana
K12RD-D in Coulee City, Washington
K12RE-D in Denton, Montana
K12RF-D in Healy, etc., Alaska
K12XC-D in Salina & Redmond, Utah
K12XD-D in Aurora, etc., Utah
K44FU-D in Long Valley Junction, Utah
KJOU-LP in Bakersfield, California
KSVC-LD in Marysvale, Utah
KTBV-LD in Los Angeles, California
KWSJ-LP in Snowflake, Arizona
KWVG-LD in Malaga, etc., Washington
KYAV-LD in Palm Springs, California
W12AQ in Black Mountain, North Carolina
W12AR in Waynesville, etc., North Carolina
W12AU in Burnsville, North Carolina
W12BJ in Owensboro, Kentucky
W12CI in Hot Springs, North Carolina
W12DI-D in Key West, Florida
W12DK-D in Young Harris, Georgia
WBQP-CD in Pensacola, Florida
WCQA-LD in Springfield, Illinois
WDNV-LD in Athens, Georgia
WHDC-LD in Charleston, South Carolina
WMOE-LP in Mobile, Alabama
WPRQ-LD in Clarksdale, Mississippi
WWDG-CD in Rome, New York
WWPX-TV in Washington, D.C.
WXII-LP in Cedar, Michigan
The following low-power stations, which are no longer licensed, formerly broadcast on analog channel 12:
K12CT in Koosharem, Utah
K12DV in Potter Valley, California
K12HY in Beowawe, Nevada
K12IT in Smith, Nevada
K12IX in Austin, Nevada
K12JM in Peoa/Oakley, Utah
K12KZ in Fruitland, Utah
K12LC in Wanship, Utah
K12MJ in Riverton, etc., Wyoming
K12ND in Kanab, Utah
WPXU-LD in Amityville, New York
WRMX-LP in Nashville, Tennessee
WZPC-LP in Panama City, Florida
References
12 low-power |
0))**2.
-2440 - 160*sqrt(5)
Simplify 1 + ((sqrt(1008) + 0)*-2 - (1*sqrt(1008) + 3)).
-36*sqrt(7) - 2
Simplify ((1*sqrt(99) - sqrt(99))*-3 + sqrt(99) + 6*(sqrt(99) - 1*sqrt(99)))/(sqrt(54)/((2*sqrt(54))/sqrt(9) + sqrt(6))).
3*sqrt(11)
Simplify 1*(-1*sqrt(2156) - sqrt(2156) - (sqrt(2156)*2 - sqrt(44)))/(6*1*sqrt(100)).
-9*sqrt(11)/10
Simplify ((-2*(sqrt(152)*1 - sqrt(152)) - sqrt(152)) + -5*sqrt(152)*2)/(sqrt(32)/(sqrt(4) + sqrt(144) + sqrt(144) + sqrt(144)*-1 + sqrt(4) + sqrt(4))).
-99*sqrt(19)
Simplify -5 + -1*((2*sqrt(204) - sqrt(204))/sqrt(12) + ((sqrt(17) + -1)*1)**2 + -3).
-20 + sqrt(17)
Simplify (-2*sqrt(252))**2 + (sqrt(3087)*-2 - sqrt(63)) + 2.
-45*sqrt(7) + 1010
Simplify (-1*(3*sqrt(13)*-1 + -1 - (sqrt(468)*1 + sqrt(13))*-1))**2.
-8*sqrt(13) + 209
Simplify (sqrt(70)*2*-5 + 3*(sqrt(70) + (1*sqrt(70) + sqrt(70) - sqrt(70))))/(sqrt(1210) + -1*(sqrt(1210) + sqrt(1210)*2 - sqrt(1210))).
4*sqrt(7)/11
Simplify ((-2*sqrt(450) - sqrt(450))/sqrt(9) + sqrt(500)/(sqrt(50)/sqrt(5)))/(sqrt(50)/sqrt(5)*-3 + (sqrt(10) + -1*sqrt(1210) - sqrt(10) - sqrt(10))).
2*sqrt(5)/15
Simplify -4*(3 + (-6*-1*sqrt(114))/(sqrt(96) + 1*sqrt(96))).
-3*sqrt(19) - 12
Simplify 4 + 4*(-5 + sqrt(44)/sqrt(4) - ((sqrt(891))**2 + 2)).
-3588 + 4*sqrt(11)
Simplify 4*(sqrt(13) + (5 + 1*sqrt(13) + sqrt(13) - sqrt(13)) - sqrt(13)) + 4 + 3 + 1 + (sqrt(1300) - ((-1*sqrt(1300))**2 - sqrt(1300))).
-1272 + 24*sqrt(13)
Simplify (sqrt(1331)*-4*3 - sqrt(1331))**2 + sqrt(1331) + sqrt(33)/(sqrt(27)*1).
34*sqrt(11)/3 + 224939
Simplify (sqrt(1539) + (sqrt(1539) - (-3 + sqrt(1539))) + -2 + sqrt(1539) - (5 + 4*sqrt(1539)))**2.
144*sqrt(19) + 6172
Simplify (3 + (sqrt(432)*-1*-4 - 2*(sqrt(432) - (sqrt(432) + -1))))**2.
96*sqrt(3) + 6913
Simplify ((-4*(1 + sqrt(612)) + 1)*2*-1 + 0)**2.
576*sqrt(17) + 39204
Simplify (sqrt(2541)*1)/(sqrt(243)*-1 - sqrt(243) - sqrt(3)) - (sqrt(847)*1 + -4 + ((1*sqrt(847) - sqrt(847)) + -4 + sqrt(847) - sqrt(847))**2).
-220*sqrt(7)/19 - 12
Simplify (sqrt(220)/(sqrt(88)/sqrt(8))*3)/(-1*sqrt(10)*2*6).
-sqrt(2)/4
Simplify (sqrt(84) + (sqrt(84) - 1*(sqrt(84) - -1*sqrt(84))) - -3*sqrt(84)*-1)/(-2*sqrt(300) + (1*sqrt(588) - sqrt(12))).
3*sqrt(7)/4
Simplify sqrt(25)/(sqrt(405) - sqrt(405)*3 - sqrt(405)) - (4 + (sqrt(220)/sqrt(11))**2).
-24 - sqrt(5)/27
Simplify (sqrt(252)*3 + 4)**2 + 3*(sqrt(7) + 0) + sqrt(14)/(sqrt(8)/sqrt(4)).
148*sqrt(7) + 2284
Simplify ((sqrt(832) + 4 + sqrt(832)*-2 - (4 + (sqrt(832) - sqrt(832)*-3))) + 2 + 3)**2.
-400*sqrt(13) + 20825
Simplify (-2*3*sqrt(170))/((sqrt(70)*-2)/sqrt(7)).
3*sqrt(17)
Simplify ((-2*(-2 + sqrt(325) + (sqrt(325) + 0 - sqrt(325) - sqrt(325)) + sqrt(325)) + 4)*-1)**2.
-160*sqrt(13) + 1364
Simplify (-5*sqrt(280)/sqrt(5))/(sqrt(35)/sqrt(5)*4*-6).
5*sqrt(2)/12
Simplify ((1*sqrt(216)*-5)/sqrt(9))/(sqrt(36)/sqrt(3)*-6 - sqrt(12)*1*-2).
5*sqrt(2)/4
Simplify ((-2*sqrt(448))/sqrt(8))/(3*(sqrt(2) - sqrt(2)*-3)).
-sqrt(7)/3
Simplify 4 + (sqrt(33)/sqrt(108))**2 - (sqrt(7920)*-2)/sqrt(5).
155/36 + 24*sqrt(11)
Simplify (1*sqrt(200)*-1)/(sqrt(1210) - (sqrt(1210) + -5*(sqrt(1210) - (sqrt(1210) + sqrt(1210)*-1)) + sqrt(1210) + sqrt(1210))).
-2*sqrt(5)/33
Simplify -5 + (-1*(sqrt(2448)*-2)**2 + (-4 + -4*sqrt(2448) + sqrt(2448))**2 + sqrt(2448))*-1.
-12261 - 300*sqrt(17)
Simplify (sqrt(91)/(sqrt(7) + sqrt(63)) - ((sqrt(156) - (sqrt(156) - 2*sqrt(156)))/sqrt(12) - sqrt(13)) - sqrt(39)/(sqrt(30)/(-2*sqrt(10))))**2.
325/16
Simplify (1 + -2 + sqrt(112) + 2*(sqrt(112)*2 + sqrt(112)))**2*6.
-336*sqrt(7) + 32934
Simplify 4*sqrt(704)*-1*3 - (0 + 5*(sqrt(275) + 2*sqrt(275))).
-171*sqrt(11)
Simplify -1 + (-4*(sqrt(110) + (sqrt(110) - ((sqrt(110) - (sqrt(110) - (sqrt(110) + (sqrt(110) - sqrt(110)*2)))) + sqrt(110)))))/(-1*sqrt(90)).
-1 + 4*sqrt(11)/3
Simplify sqrt(75)*-2 + 1 + (2 + 0 + sqrt(3))*-2 + -2.
-12*sqrt(3) - 5
Simplify ((sqrt(9)/sqrt(3)*6*-2)**2 + ((sqrt(15)/sqrt(5) - sqrt(3))**2 + -4)*1)*2.
856
Simplify -3*((sqrt(640)*3)/(sqrt(2) - sqrt(8)/sqrt(196)))**2.
-11760
Simplify 4*(sqrt(567) - ((sqrt(567) + -1)**2*4 - sqrt(567))) - (-1 + sqrt(567)/sqrt(144))**2.
-145487/16 + 723*sqrt(7)/2
Simplify (-1*-3*((sqrt(180) - (1 + -1*sqrt(180) + sqrt(180))) + 4))**2.
324*sqrt(5) + 1701
Simplify -3*(5*(((sqrt(117) + -3 - sqrt(117))*-5 + sqrt(117))*4 + 2))**2.
-428700 - 111600*sqrt(13)
Simplify -3 + 2 + sqrt(1584) + sqrt(1584) + 5 + sqrt(1584) + sqrt(1584) + (sqrt(1584) + -2 - sqrt(1584) - sqrt(1584))**2.
96*sqrt(11) + 1592
Simplify ((sqrt(102)*2 + sqrt(102))*2)/(-2*sqrt(30)/sqrt(5) - sqrt(6))*4.
-8*sqrt(17)
Simplify ((sqrt(567)*-5*4 + sqrt(567) + -3*2*sqrt(567))*-5)**2.
8859375
Simplify ((sqrt(180)/sqrt(4))/sqrt(3))/((sqrt(300) + sqrt(300) + 1*sqrt(300) - sqrt(300)) + sqrt(300)) + -2.
-2 + sqrt(5)/30
Simplify (1*sqrt(60)*5 - sqrt(180)/sqrt(48))/(sqrt(72)/sqrt(24)*6).
19*sqrt(5)/12
Simplify ((1*sqrt(896)*-3)/((sqrt(7) - -6*sqrt(63)) + -2*sqrt(28) + sqrt(28)))**2.
1152/289
Simplify -5*(2 + sqrt(17) + sqrt(17) + -1 + 5 + -3*-1*sqrt(17)*2).
-40*sqrt(17) - 30
Simplify ((sqrt(170) - 6*sqrt(170)*-2)*-4)/(-4*-2*sqrt(10) - (sqrt(90)/(sqrt(9)*2) - sqrt(10))).
-104*sqrt(17)/17
Simplify sqrt(228)/(sqrt(12)*1)*-4 - sqrt(152)/(sqrt(392)*5).
-141*sqrt(19)/35
Simplify (((sqrt(1300) - ((sqrt(1300) - (sqrt(1300) + 1))**2 + sqrt(1300) + sqrt(1300))) + sqrt(1300) - (-1 + sqrt(117))**2) + -2*sqrt(832)*1)*-1.
10*sqrt(13) + 119
Simplify -3 + (6*(0 + sqrt(612)) + 3)**2*-5.
-110208 - 1080*sqrt(17)
Simplify (-6*(sqrt(32)/(sqrt(6)/sqrt(3)))/((2*sqrt(72))/sqrt(9)))**2 + -1.
17
Simplify (2 + (sqrt(432)*-2*-1)**2)*6.
10380
Simplify (sqrt(80)/(sqrt(5)*1)*5)/((sqrt(96) - -1*sqrt(96)*-3)/sqrt(12)).
-5*sqrt(2)/2
Simplify ((sqrt(162) + 1)**2 + sqrt(2) + sqrt(10)/sqrt(5) + -5 + 3)*-5.
-805 - 100*sqrt(2)
Simplify 2*((sqrt(245) - (sqrt(245) + -4))*5 - sqrt(245))**2 + 3.
-560*sqrt(5) + 1293
Simplify ((sqrt(68)*-2 - sqrt(68))*-2)/(sqrt(144)*1 - sqrt(144) - sqrt(144))*2.
-2*sqrt(17)
Simplify (0 + sqrt(180) + (sqrt(180) + sqrt(180) + -2 - sqrt(180))*2 + sqrt(180))**2 + 0.
-192*sqrt(5) + 2896
Simplify -3*(5*(sqrt(136) - sqrt(136)*-3 - sqrt(136)) + sqrt(136) - sqrt(136))/(sqrt(56)/(sqrt(56)/sqrt(8)))*6.
-270*sqrt(17)
Simplify -4 + (sqrt(22) + (-2*sqrt(176) - sqrt(176))/sqrt(8))/(sqrt(11) + (-1*sqrt(1100) - sqrt(11)))*4.
-4 + 4*sqrt(2)/5
Simplify (sqrt(245)*2*2 + -4)**2 + 3*(-1 + sqrt(125)) + -3.
-209*sqrt(5) + 3930
Simplify sqrt(156)/(sqrt(972) + sqrt(972) + (sqrt(972) - sqrt(972)*5) - sqrt(972)) - (2*4*sqrt(91))/sqrt(7).
-217*sqrt(13)/27
Simplify ((sqrt(156)/(sqrt(32)/(sqrt(8) + (sqrt(8) - sqrt(128)))))/(sqrt(300) - -1*sqrt(300) - 1*sqrt(75)))**2.
52/225
Simplify (-1*sqrt(100))/(sqrt(50)/(1*sqrt(10))) + (sqrt(80)*4 - (-3 + sqrt(25)/sqrt(5))).
3 + 13*sqrt(5)
Simplify -2*(sqrt(68)*1*-3 - -3*(sqrt(68)*-2 - sqrt(68)))/(sqrt(100)*2 - 1*sqrt(256)).
12*sqrt(17)
Simplify (1*-5*(sqrt(224) + sqrt(224)*1))/(1*(sqrt(8) - sqrt(8)*2)*-1).
-20*sqrt(7)
Simplify (6*(sqrt(605) + -2)*2*-6)**2.
-228096*sqrt(5) + 3157056
Simplify ((sqrt(11) + 1 + -4)*3 - (3 + (1 + sqrt(891))**2)) + -3.
-907 - 15*sqrt(11)
Simplify (4 + -1*sqrt(637) + sqrt(637) + (sqrt(637) - (-2 + sqrt(637)*2)) + ((sqrt(637) + sqrt(637) + -1)*1 - ((sqrt(637) - (sqrt(637) + 1)) + 1)))**2.
70*sqrt(13) + 662
Simplify (sqrt(117) + sqrt(117) + -3)*-3 + (sqrt(13) - (2 + (sqrt(637))**2)) + -4.
-634 - 17*sqrt(13)
Simplify (-5*sqrt(3)*-1 - sqrt(3) - (1 + sqrt(48)))**2 + (2*sqrt(15))/sqrt(5) + (sqrt(3) - (sqrt(3) + 2 + -2)).
1 + 2*sqrt(3)
Simplify (sqrt(200) + 6*(sqrt(200) + (sqrt(200) - (sqrt(200)*-3 - sqrt(200)) - sqrt(200))) - (4 + 5*sqrt(200)))**2.
-2080*sqrt(2) + 135216
Simplify (sqrt(84)/(5*sqrt(6)*-2))/(6*-4*sqrt(72)).
sqrt(7)/1440
Simplify (5 + (sqrt(245) + sqrt(245) + 0 - sqrt(245))*1*-6 + -3)**2.
-168*sqrt(5) + 8824
Simplify (sqrt(200)/sqrt(5)*2)/(sqrt(8) - (sqrt(40)/(sqrt(35)/sqrt(7) + sqrt(5) + sqrt(5)) - sqrt(8))).
6*sqrt(5)/5
Simplify sqrt(77)/(sqrt(56)/(sqrt(8) - sqrt(128)) - sqrt(7) - sqrt(7)) - (sqrt(704)*2 - sqrt(704))*-6.
333*sqrt(11)/7
Simplify -3*(2*(0 + sqrt(2)) - (sqrt(98)*-1)**2).
-6*sqrt(2) + 294
Simplify (2*sqrt(980) - (sqrt(240) - sqrt(240)*2)/sqrt(12))/(sqrt(32)/(sqrt(32)*-1)).
-30*sqrt(5)
Simplify 4*((-2 + 4 + sqrt(180)*-2 + sqrt(180) + 2)**2 + -1).
-192*sqrt(5) + 780
Simplify (sqrt(77) - 1*sqrt(77) - sqrt(77))/sqrt(7) + sqrt(11) + 1 + -3 + |
Sunday, July 26, 2009
Confessions of a Nuclear Blogger: Part II
The genesis of Nuclear Green lay in my attempt to determine if a global post carbon energy solution was possible. I concluded that not only was it possible, but that the LFTR solution was necessary because renewable energy approaches would almost certainly fail. The problem of indeterminacy plagued both wind and solar electrical generation systems, and the reliability problem seemingly bonded renewable generation systems to fossil fuel burning, CO2 emitting technology. For those who doubt my assessment I will call attention to the Greenpeace energy plan, Energy [R]evolution: A Sustainable U.S.A. Energy Outlook.
The [r]evolution plan involves two stages of development, with continued developments in the use of fossil fuels continuing to play a major role in the energy mix for the next 20 years. Only after 2030 does the report envision moving away from a deep dependency on fossil fuels. The Greenpeace plan calls for a shift from coal, lignite, and oil products to natural gas during the next decade with gas-fired electrical generation capacity increasing from 340 GWs in 2005 to 505 installed GWs in 2020 while the number of coal and lignite burning facilities are expected to drop.
My original conclusions were that solar and/or wind based energy systems would either require an expensive system of energy storage, or an ongoing, long term dependency on fossil fuels. Since the establishment of Nuclear Green I have repeatedly attempted to test that conclusion, and have been unable to find strong evidence contradicting it. Thus the renewables paradigm has been shown to to be based on false assumptions.
I would argue that conventional nuclear power advocates appear to have not developed a post carbon energy paradigm, and are content with statements such as nuclear power belongs in the post-carbon energy mix. This statement creates a huge black box marked "post-carbon energy mix." Nothing inside the box is explained, so we have no detailed account of how various post carbon energy needs are to be meet using nuclear sourced solutions. In addition, conventional nuclear technology is expensive, and has proven unpopular with the public, despite very significant improvements in areas like nuclear safety. The problem of nuclear waste, which is closely tied to the inefficient use of fuel in the conventional nuclear uranium fuel cycle, remains a problem for the conventional nuclear industry.
One of the functions of Nuclear Green has been an ongoing analysis of the role of LFTR technology in the post carbon society. Even before the creation of Nuclear Green, I had concluded that the LFTR had the potential for supplying all the electrical energy required by our society. I also concluded that the LFTR would serve as the source of land based transportation energy, through the electrification of land based transportation.
Probably no more than a thousand people in the entire world fully understands the paradigm, although thousands more understand bits and pieces of it. Much of the paradigm was shaped by Eugene Wigner, a authentic genius and a man of singular vision. Wigner foresaw the need for extracting the enormous energy potential from thorium and using it to sustain human civilization. Wigner's vision included a heavy-water fluid-core reactor as the instrument through which thorium was to be transformed into nuclear fuel. Alvin Weinberg, Wigner's former student and another genius, later realized that the Molten Salt Reactor was a far superior tool for realizing the full energy potential of the thorium fuel cycle, and the potential to increase energy efficiency to increase its energy potential even further by coupling it with massive desalinization projects in desert countries.
I explained that my role was to explore the LFTR paradigm on a conceptual level. I must add that I am far from alone in understanding the LFTR paradigm. Certainly Kirk Sorensen and David Walters do, as well as many of the contributers to the EfT Discussion Forum. As I noted
The LFTR paradigm then suggests that the technology for a low cost transformation of American electrical generation already exists, and is capable of rapid development and deployment in little more than a decade provided Manhattan project type resource commitments are made to realizing the paradigm. Like all new paradigms, the LFTR paradigm is poorly understood, and its potential is only seen by a limited number of people. However the LFTR paradigm is being discussed on the Internet, and knowledge of the paradigm could spread rapidly. Skeptics might argue that there is no such thing as a silver bullet to solve the energy problem, yet the paradigm suggests that there is a liquid thorium bullet.
My view is that the LFTR paradigm represents nothing less than the future energy course for world society, an inevitable course. The importance of the LFTR paradigm is obscure to most people who think about energy. As i explained:
Early phases of paradigm shifts are often periods of confusion. There is now a great deal of confusion about the LFTR. People, who fail to understand how radically different the LFTR is from better understood Light Water Reactors still wonder how the LFTR could not have all of the flaws of LWRs. In fact the LFTR paradigm offers solutions to all of the major problems of LWRs without difficult and expensive fixes and workarounds. Until people adjust their thinking to include the new paradigm, the confusion will continue to be common
Confused, irrational thinking about the cost of renewables can also be attributed to disorganized discourse about renewable energy options. Discussions of renewable energy options often replace facts with wishful thinking. Thus future energy production tends to be over estimated while capital costs associated with future renewable energy tends to be underestimated. This problem is often notable when the projected cost of renewables is compared with the projected cost of conventional nuclear power.
I have explored the LFTR paradigm on Energy from Thorium, Nuclear Green, the Oil Drum and elsewhere. The LFTR paradigm can be expressed:
There is a vary large amount recoverable energy in the form of thorium found in the crust of the earth. The amount of recoverable thorium in the earths crust would exceed even the most optimistic estimate of human energy consumption by a factor of at least 10.
The Liquid Fluoride Thorium Reactor capable of burning thorium at 98% efficiency. The LFTR can be manufactured in factories and installed almost anywhere at a low cost.
The LFTR is extremely scalable and has the potential for rapid large scale deployment.
The LFTR is extremely safe.
The LFTR eliminates from 99% to 99.9% of nuclear waste produced by conventional reactors.
The LFTR does not produce weapons useful nuclear materials, and the LFTR would would not be a practical tool for nuclear proliferation.
Fission byproducts from the nuclear process in LFTRs would be very valuable, and would provide a second source of income for reactor owners.
LFTRs can be deployed to control CO2 emissions from fossil fuel burning within 40 years.
LFTRs can provide heat for industrial processes.
LFTRs can provide electricity for surface transportation systems.
LFTRs can be used to produce liquid and gaseous fuels from air and water.
Waste heat from LFTRs can be used to desalinate sea water.
The savings on the cost of fossil fuels burned in fossil fuel electrical plants will pay the cost of replacing fossil fuel plants with LFTRs.
3 comments:
donb
said...
The Greenpeace plan states:The [r]evolution plan involves two stages of development, with continued developments in the use of fossil fuels continuing to play a major role in the energy mix for the next 20 years. Only after 2030 does the report envision moving away from a deep dependency on fossil fuels.
I have learned a few things during my 58+ years of existance. One thing is that projects that are 1 year out probably will happen. Those that are 2 to 4 years out may happen. And those 5+ years out probably won't happen.
I have also learned that economics is a strong motivator for getting things to happen.
I believe that we will be forced to decarbonize our energy sources at some point because of increasing costs due to scarcity. But until cost of fossil fuels becomes economically unsustainable, I expect the fossil fuel providers to fight tooth and nail to hang on. When we have proven solutions making nuclear energy clearly cheaper than fossil energy, then a massive switch to nuclear will begin because the path forward is clear.
Even then, this massive switch will take some time, probably on the order of 20 years.
Right now the path forward is NOT clear. The path proposed by Greenpeace offers only higher costs and decreased reliability. The nuclear path is not clear either right now due to the high costs of conventional nuclear.
High costs for nuclear energy are being driven by a lot of non-value-added requirements (especially "safety") - encouraged by fear, ignorance, and vested interests such as fossil fuel providers and (unfortunately short sighted) equipment providers.
When will things change? Only when the cost of fossil fuels becomes too painful. Such economic pain has the effect of clearing the mind of wishful thinking and causing it to focus on reality. I hope we have several LTFRs in operation at that point. These LTRFs will need to be built in spite of government, as we largely get the government we deserve.
Domb, If the LFTR prices can be kept as low as I have argued, and LFTRs can be deployed as rapidly as I suspect they can be, then the conversion from fossil fuels to LFTRs will be relatively painless. Fuel savingswould fairly quickly pay for the conversion.
It has been fascinating to watch your vision come into sharp focus over the last few years. I think you have got it right, excellent job.
To be conservative my recommendation is still to level the playing field and build demonstration plants of every technology and let the marketplace pick the best technology.
http://www.theoildrum.com/node/4961#comment-459021
Baring an unforeseeable breakthrough I am confident that your vision would come to dominate a level playing field.
The huge amount of money being spent to mass produce impractical expensive intermittent energy systems is a total waste. Even if the U.S. could somehow reduce its CO2 emissions to zero with wind and solar, the developing world would soon eat up those savings. Developing countries cannot afford to build those systems and the backup plants they require. The money wasted on these impractical systems could pay for the R&D program.
U.S. energy policy should be focused on a single goal.
Develop alternative energy systems that can be mass produced to provide unlimited supplies of clean safe reliable energy at a cost less than the cost of fossil fuel.
Once that happens nations around the world will scramble to acquire that technology as fast as possible, no stick required. It could become a great export industry providing thousands of high paying jobs and leveling our trade imbalance. |
Computational Study of Proton Transfer in Tautomers of 3- and 5-Hydroxypyrazole Assisted by Water.
The tautomerism of 3- and 5-hydroxypyrazole is studied at the B3LYP, CCSD and G3B3 computational levels, including the gas phase, PCM-water effects, and proton transfer assisted by water molecules. To understand the propensity of tautomerization, hydrogen-bond acidity and basicity of neutral species is approached by means of correlations between donor/acceptor ability and H-bond interaction energies. Tautomerism processes are highly dependent on the solvent environment, and a significant reduction of the transition barriers upon solvation is seen. In addition, the inclusion of a single water molecule to assist proton transfer decreases the barriers between tautomers. Although the second water molecule further reduces those barriers, its effect is less appreciable than the first one. Neutral species present more stable minima than anionic and cationic species, but relatively similar transition barriers to anionic tautomers. |
Saturday, August 8, 2009
Even as airlines hit out at private airport developers against the "exorbitant" charges being collecting from carriers, the Association of Private Airports Operators (APAO) — comprising private airport operators of India — has come up with a study that puts operating costs at major Indian airports as among the lowest when compared to other major airports around the world.
"The association wishes to clarify the misconception that airport charges in India are amongst the highest in the world," it said. In a survey conducted in 2008 by Jacob Consultancy, which specialises in aviation consultancy, Mumbai airport was ranked 50th in a sample of 50 worldwide representative airports. "This indicates that charges at Mumbai (Delhi airport has similar charges) were amongst the lowest," said APAO secretary general K L Kanthan.
Mumbai's charges are 16 per cent of what Toronto — which charges the maximum fee — collects from airlines. However, airlines do not buy the argument. "There are three components to airport charges. The passenger service fee (PSF), the navigation charges and finally the airport charges. Taken together, it forms a substantial chunk of our operating costs," said a senior official from Air India.
The APAO has also argued that airport charges in India were increased by 10 per cent only once after eight years against the aggregate inflation of 48 per cent, based on average annual cost inflation of 5 per cent. "The fact is that airport charges in India constitute only about 3.25 per cent to 3.5 per cent of total operating cost of airlines as compared to ATF (aviation turbine fuel) which constitutes 40 per cent of the costs."
However, according to Centre for Asia Pacific Aviation (CAPA), while there has to be a recovery model in the billions of dollars being invested in these airports, the introduction of airport development fees (ADF) and user development fees (UDF) came at a very wrong time.
"Airlines in India should understand that such investments need to be absorbed. But from their point of view these new charges came at a very wrong time when the industry was in bad shape and the extra costs passed on to passengers could not be absorbed by them”.
"Unlike airlines, which have the flexibility of focusing on profitable routes and reducing capacity, airports have to maintain the same level of service and facilities irrespective of numbers of passengers. Investment in airport capacity needs to be done with a 5-10 year future horizon to take care of future growth in traffic," the APAO statement said. |
Friday, February 09, 2007
Thursday, February 08, 2007
Random Thoughts
I think my oldest doesn’t like her birthday or something. Every year right before her birthday Super Girl becomes Super Brat. I don’t understand this. Out of the 7 birthdays she’s had, I’ve canceled two of them two years in a row. She’s very, very close to having her 8th birthday canceled due to extreme brattyness and she’s only got 5 more days until her birthday.
Correction on the Dead Gerbil post: The wishes followed on the gerbil burial were the wishes of Cabbage Patch not the deceased gerbil who did not have a will and at the time of his horrible demise had not verbalized his wishes for burial or otherwise.
Peanuts. Does anyone actually LIKE that comic/cartoon? I absolutely despise each and EVERY one of their holiday specials. The best thing about growing up was not EVER having to watch another Peanuts holiday special. Okay maybe that’s not the BEST part of being a grown up… Being able to buy booze and having sex and not having a curfew and… well you get the picture… but not having to watch that crap is still damn good.
Why is dating so fucking difficult? No really, WHY? Why do the few guys I DO like seem to lose interest after the first date? And WHY do all the other guys I want to forget me continue to pursue me almost to the point of needing a restraining order or a witness protection order? (some idiot is messaging me at this very moment) Honestly are there any nice, intelligent, good looking, straight men out there who aren’t just out for sex and want to date me (believe me, the freaky sex will come to those who wait)? Maybe I should just join a convent… oh wait… I’m Jewish.
I think the lone male gerbil is lonely… or maybe he’s a bit psychotic and he’s pondering how he murdered Spike.
Where the hell did the warm weather go? Yesterday I was walking around in shorts and a t-shirt and today, well today I damn near froze my ass off in my shorts when I took Coco out.
And that is all. The End.
PS - the best insult in the world is to call someone a TWAT, as in "(fill in the name) is a TWAT." Thank you Savol for putting it in perspective and giving me a giggle.
This past weekend I ventured to Houston to attend Queen Mystic’s Super Bowl Party. K procured tickets for me from his adorable boyfriend who is employed at a major carrier and could get me a good price on the ticket (i.e. FREE).
Saturday morning I got up at the obscene hour of 4:25 am to shower and get packed (oh like you don’t wait until the last minute also) and be ready to leave casa de Karmically Challenged at 6:45 am to arrive at the airport by 7:15 am. Moments before we left I had this brilliant idea to put the things I needed into a new purse instead of cleaning out the old purse that contained many extraneous items that probably wouldn’t make it through airport security (as in the small bottle of vodka – Absolute I think, (oddly enough it came from an airplane and was gifted to me by D after one of her many trips abroad), the cute pink flask of tasty loki with my name on the front of it (Judypooh), the various packets of ketchup, jelly and taco sauce deposited there by my offspring, I’m sure there is probably a knife – possibly plastic, possibly metal -, a spork and the makings of some kind of explosive with detailed instructions any 5 year old could understand also deposited there by my progeny). Part way to the airport I discovered that my brilliant idea might have been really great if I had actually put things in my purse that I’d really need – as it was I only had my driver’s license, $15, lipstick, a book, house keys, some mints and a Starbucks card – because, come on, who really needs a debit card when you have a Starbucks card with $15 on it??? That’s like 4.5 lattes!
K deposited me at the airport and I kissed the family then waved them off as I headed to catch my flight. First stop, the ticket counter to collect my tickets from Will Call. I approached the counter and told the clerk that my tickets were in Will Call and gave her the confirmation number K had passed along to me. She tapped something in the computer and stared at it asking me if I had my tickets because she had my reservations but I needed tickets. I looked at her and considered panicking but decided not to as K had informed me on the way to the airport that he had left his phone at home so hopefully I wouldn’t have any problems. BASTARD! Fine. After 5 minutes of exchange and bewildered looks, I again mentioned Will Call and my tickets being there (actually it was the third time I mentioned it) her mental light bulb went off and she said “Oh why didn’t you say so. Will Call is different.” And before I could give her the bitch slap she deserved she disappeared behind a door to search for the tickets. Ms. Clerk took entirely too long to find the tickets but finally did reappear all smiles and sunshine and directed me to head for security.
And now the real fun part happens! I followed the other passengers to the security line like grazing cattle and presented the first security person with proof that I should be in the line at all – my ticket and my driver’s license. The security person looked at the ticket and then at the license, then looked at me then back at the documents. I smiled back, anxious to get through this and get on my flight. Then she said “Do you have up to date identification?” I said no and wondered how in the world she knew that the address was incorrect on my license (yes I am blond at times). She said okay and told me to go to Lane 1. Lane 1 was a shorter security line so I was happy to go there. I followed a couple of other people to that lane and casually looked down at my license to compare it to my ticket and at that moment I realized that my damned license is expired! Shit! I shoved everything back in my purse and put it and my boots, and my coat into the plastic bin and put my luggage on the belt next to the bin. Then I proceeded to prove to airport security that I’m a total ‘tard because I can’t go through the metal detector right. After my second walk through the metal detector I was told that due to my license being out of date I had to be searched as well as my bags. Oh FUN! How was I to know that an expired driver’s license is a sure sign of being a member of Al-Qaeda?
I stepped aside with two security officers and got politely felt up by the female officer while the male looked on and prepared to paw through all my belongings. Dude, it’s all good – I hadn’t had a date in a couple of weeks so it was like a double date for a moment. As I watched them go through my belongings I was hit with a pang of regret that I hadn’t packed anything more interesting than a couple of books and some lipstick. I suddenly wished I had a bag full of batteries, vibrators, whips and hand cuffs so I could smile knowingly and mumble “business trip” to their curious looks. But no, nothing so exciting as that – not even garb as I chose not to garb because I didn’t want to have to deal with the extra weight in my bag. Bad planning on my part. And then it was over, no phone number, no thank you, no ‘call me sometime’, just ‘have a nice flight’. I’ve had dates like that before, just not usually felt up in public at an airport nor has it ever happened so quickly. Bastards.
After my encounter with the security people, I raced to my gate having realized that all this fun left me with a mere 10 minutes to get to the gate. No worries though, I got there and on the plane right away then I text messaged K “I got searched!” and turned off my phone. I figured that would give him something to think about for the next hour.
Wednesday, February 07, 2007
Dead Gerbils Are No Fun
So it’s done, I told the wee child of the demise of her gerbil. After a brief discussion with K I decided to go with the cold hard truth as he was unwilling to come up with a good lie. Not that really mattered, the whole thing went like this:
Me: Cabbage Patch, I have something to tell you.Her: What?Me: Look in the gerbil cage and tell me what’s missing.Her: The food?Me: No.Her: *looking more closely* The water?Me: No. *rolling eyes and cursing her father for her getting his observation skills*Her: Da wheel?Me: No, no, no. That’s all in there. Your gerbil. He’s dead.Her: *looking at me with surprise* He’s dead.Me: Yeah honey. Spike is dead. *pulls her into a hug*Her: *muffled sniffles*Me: It’s okay honey. *getting teary eyed*Her: *looking up at me* Can I see him?Me: Umm… no, it’s gross. Her and her sister: I wanna see. It won’t be gross.Me: NO. It’s GROSS.Her: Can I get a new gerbil?Me: Um… yeah, I guess.Her: Okay, can I play outside now?
And that was the end of that. K buried the corpse in a small soap box under a tree by the creek per her instructions (actually she wanted it buried much closer to home but that just seemed a bit to creepy for me.
Tuesday, February 06, 2007
To Tell The Truth or Make A Fantastic Lie?
Which should I do? I’m completely torn. I’m a terribly truthful person but I’m in a quandary as to what I should do at this very moment. I just discovered Cabbage Patch’s gerbil quite dead. EWWWW! Now I’m not certain if I should tell her and let my tiny 5 year old experience grief for the first time or if I should concoct a fabulous tale and have K purchase a replacement Spike.
Internet if I ever needed you it’s RIGHT NOW! Give me your input! I have until 4 pm to decide what to do about this dead gerbil problem. Do I tell her Spike has gone to the big running wheel in the sky or do I tell her that her daddy took Spike to the vet for a check up? |
Temperature Coupling in the Vocal Communication System of the Gray Tree Frog, Hyla versicolor.
The gray tree frog mates over a temperature range of at least 9 degrees C. Gravid females, tested at two different temperatures, preferred synthetic mating calls with temperature-dependent temporal properties similar to those produced by a male at about the same temperature as their own. Thus, the vocalization system and the temporal pattern recognition system are affected by temperature in a qualitatively similar fashion. |
President Trump may be waffling on his vow to boost background checks, after a talk with National Rifle Association boss Wayne LaPierre this week.
Please, Mr. President: Don’t. You’d be making a big mistake — for the nation as well as your reelection campaign.
Reports say that Trump told LaPierre “universal background checks” were “off the table,” and LaPierre was pleased.
According to a New York Times story Tuesday quoting White House sources, Trump assured LaPierre that “he was not interested in legislation establishing universal background checks and that his focus would be on the mental health of the gunmen, not their guns.”
The president himself argued that “we already have very serious background checks.” He said he didn’t “want to take away people’s Second Amendment rights.”
And over the weekend, he warned of gun control’s “slippery slope” and stressed the need to keep guns out of the hands of people who are unfit to own them.
All of which has drawn alarm and criticism from those worried he might backpedal on the promises he made after the El Paso and Dayton shootings.
“We cannot let those killed in El Paso, Texas, and Dayton, Ohio, die in vain,” he said back then. “Republicans and Democrats must come together and get strong background checks.”
Don’t give up on Trump yet: He did, after all, acknowledge “loopholes” in the current background-check system and insisted he’ll plug them: “I have an appetite for background checks,” he said, noting that he’s working with Democrats and Republicans to fill in “some of the loopholes.”
That’s encouraging, but the nation has heard promises on gun control before — only to be let down.
Let’s be honest: Background checks don’t come close to the exaggerated claim that Uncle Sam wants to take away people’s guns. Rather, they’re a sensible way to do what Trump says he wants to do — keep dangerous weapons from criminals and others who shouldn’t own guns. That’s why polls show deep public support for them.
LaPierre and his group oppose even the slightest gun restrictions so they can be seen as fierce warriors to their members (and donors). They are the ones who warn about the “slippery slope.”
But it’s an unreasonable fear. Besides, Trump should understand that the NRA doesn’t speak for most Americans — maybe not even most of his base.
He should also know this: If he backs off “meaningful” checks, he won’t just be doing the nation a disservice; as his own daughter, Ivanka, suggested, according to The Atlantic, he’ll be missing a chance to sign a “historic” document, and maybe win positive media attention for a change.
Surely Trump wouldn’t be opposed to that, right? |
name: test
on:
pull_request:
jobs:
golang:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Setup Golang
uses: actions/setup-go@v2
with:
go-version: 1.15.x
- uses: actions/cache@v1
with:
path: ~/go/pkg/mod
key: ${{ runner.os }}-go-${{ hashFiles('**/go.sum') }}
restore-keys: |
${{ runner.os }}-go-
- name: Test
run: ci/test.sh
- name: Build
run: ci/build.sh
- uses: codecov/codecov-action@v1
with:
flags: go
|
/*
* Copyright 2000-2020 Vaadin Ltd.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License. You may obtain a copy of
* the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations under
* the License.
*/
package com.vaadin.flow.component.html;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method;
import com.vaadin.flow.component.Component;
import com.vaadin.flow.shared.util.SharedUtil;
public class ComponentProperty {
public String name;
public Object defaultValue, otherValue;
public boolean optional;
public boolean removeDefault;
public Class<?> type;
private Class<? extends Component> componentType;
public <T> ComponentProperty(Class<? extends Component> componentType,
String name, Class<T> type, T defaultValue, T otherValue,
boolean optional, boolean removeDefault) {
this.componentType = componentType;
this.name = name;
this.type = type;
this.defaultValue = defaultValue;
this.optional = optional;
this.removeDefault = removeDefault;
this.otherValue = otherValue == null ? name + name : otherValue;
}
public boolean isOptional() {
return optional;
}
public Object getUsingGetter(Component component)
throws NoSuchMethodException, SecurityException,
IllegalAccessException, IllegalArgumentException,
InvocationTargetException {
return getGetter().invoke(component);
}
public Method getGetter() throws NoSuchMethodException, SecurityException {
String getterName;
if (boolean.class.equals(type)) {
getterName = "is" + SharedUtil.capitalize(name);
} else {
getterName = "get" + SharedUtil.capitalize(name);
}
Method m = componentType.getMethod(getterName, (Class<?>[]) null);
return m;
}
public Method getSetter() throws NoSuchMethodException, SecurityException {
String setterName = "set" + SharedUtil.capitalize(name);
Method m = componentType.getMethod(setterName, type);
return m;
}
public void setToOtherValueUsingSetter(Component component) {
try {
setUsingSetter(component, otherValue);
} catch (IllegalAccessException | IllegalArgumentException
| InvocationTargetException | NoSuchMethodException
| SecurityException e) {
throw new AssertionError(e);
}
}
public void setUsingSetter(Component component, Object someValue)
throws IllegalAccessException, IllegalArgumentException,
InvocationTargetException, NoSuchMethodException,
SecurityException {
getSetter().invoke(component, someValue);
}
}
|
With the increasing development of elevator system arrangement, more and more elevators are arranged by a V-shaped traction system. Generally, car of this traction system adopts arrangement of car sheave, and has an obvious characteristic that an included angle between suspension ropes running through two sides of the car sheave varies as the elevator moves up and down in a shaft, rather than 0 degree as conventional system. Car top of the elevator often serves as a working platform for maintenance or installation personnel; the car sheave, as a rotating part, is on a position that a worker can reach, and the car sheave is reasonably protected to avoid unintentional injury of the worker. But in the V-shaped traction system, the included angle between the suspension ropes on two sides of the car sheave is variable. Normal static shield fails to offer a safety clearance meeting GB12265.1. |
Estimation of wall thinning in mild steel using laser ultrasound Lamb waves and a non-steady-state photo-emf detector.
In this work, a non-steady-state photo-emf receiver has been used to detect the lower frequency fundamental a0 Lamb waves in mild steel. Experimentally, the Lamb waves are laser-generated in the thermoelastic regime using a Q-switched, 20 ns, pulsed Nd:YAG laser and a line source. Typical Lamb waves had centre frequencies of 250 kHz but with frequency components that extended beyond 1 MHz. In mild steel, higher order Lamb wave modes were not considered to be significant below a frequency thickness product of 1.6 MHz mm. Below this level, associated velocity dispersion curve offered phase velocity changes that were sensitive to thickness change. Samples up to 5 mm in thickness were examined without significant interference from higher order modes. A non-steady-state photo-emf detector used as the ultrasonic detector had the advantage of a lower frequency cut-off at 100 kHz compared to a confocal Fabry-Pérot interferometer (CFPI) of about 2 MHz. Both schemes offered greater stand-off distance (>20 cm) than is possible with EMATs, which have a stand-off distance less than 1.0 mm. Progress made in detecting wall thinning in steel plate with thickness up to 5 mm is reported. |
No business like snow business
This is the view at the end of our driveway in Madison. The blizzard has dumped about 18 inches of snow in the area and while some streets have been plowed, ours has not. I can only imagine what a herculean task it’s been to clear away this wet, heavy snowfall. I lost track of the number of times we shoveled the driveway yesterday.
Madison remains largely shut down today. Schools were closed for a second day, and the Metro buses were not running. Many people around Wisconsin were without power this morning. Let’s all give thanks to the people who work to get the lights back on and the roads cleared. |
Cummins to meet EPA regs with current engine platform Cummins recently announced that it has achieved an important milestone in the application of existing combustion technologies and hardware for its industrial engines required to meet the Tier 3 emissions standard. The company demonstrated it could meet the Tier 3 requirements without the addition of aftertreatment devices or other costly hardware. It will launch EPA compliant engines prior to the 2006 deadline.
Cummins says that by achieving Tier 3 standards with existing engine platforms, electronic fuel systems and existing fuels, it has minimized engineering and product development costs "without the addition of expensive and unproven aftertreatment devices." For more information, visit www.cummins.com.
Cleaner fuel Diesel engine manufacturers aren’t the only companies under pressure. The EPA is also pressuring refiners to reduce the sulfur content of diesel fuel.
In the mid 1990s, EPA regulations reduced the sulfur content in diesel fuel from 5,000 to 500 parts per million (ppm). Although these sulfur reductions decreased soot and toxic emissions, they also led to significant wear problems in high-pressure diesel fuel pumps. These wear problems are expected to mushroom because the EPA has proposed reducing the sulfur content of diesel fuel to 15 ppm by 2007. Lubricity is becoming a very important attribute for diesel fuel components.
The good news for farmers is that biodiesel may be the best lubricity additive on the market. In addition to its use in low blends, biodiesel can be used in a 20% blend with petroleum diesel (B20) or straight (B100) without expensive engine modifications. This flexibility has made biodiesel one of the most attractive options for federal, state and municipal fleet managers who must comply with the federal Energy Policy Act of 1992. Other fuel options require the purchase of special vehicles or expensive retrofit procedures. For further reading, visit www.mda.state.mn.us/ams/ecoimpsoydiesel.html.
Diesel alternatives? Rudolph Diesel patented the idea for the diesel engine in 1892. By its design and the fuel it burns, the diesel engine was 30% more efficient than the gasoline engine. In terms of energy burned for work produced, the diesel engine still rules.
It’s not that other inventors haven’t tried. Sir William Robert Grove actually beat Diesel by building the first fuel cell in 1845. His fuel cell electrolyzed water into hydrogen and oxygen, then combined these gases back into water to produce electricity. Later versions of the fuel cell would use natural gas or other fuels as a hydrogen source. But since the byproduct is pure water, all fuel cells are basically pollution-free.
In 1959, Allis Chalmers introduced the first fuel cell-powered farm tractor. NASA space vehicles have been powered by fuel cells. And ammonia fuel and cryogenic oxygen were once used to power a fuel cell forklift.
The downside of fuel cells is the expense. Fuel cells require large amounts of expensive platinum as a catalyst. So the technology never caught on.
In recent years, however, several companies have found ways to reduce the amount of platinum needed to make a fuel cell vehicle run efficiently. This has raised hope that fuel cell-powered economy cars might become practical as early as 2004. So could it be time for the fuel cell tractor to make a comeback?
None of the tractor companies we talked with will admit to having a fuel cell, or alternate power, tractor program. However, a company called UQM Technologies, which specializes in fuel cells and hybrid electric vehicles, has already built a hybrid electric HUMVEE for the U.S. Army which actually outperforms the conventional diesel version in acceleration, range and torque. Interestingly enough, UQM is also under contract with John Deere to develop hybrid electric vehicles and components for future John Deere products. UQM would not comment further due to a nondisclosure agreement it has with Deere, and Deere isn’t talking either. |
Netflix’s highly watched four-part series, When They See Us earned the most nominations for the streaming giant with a whopping 16 Emmy noms including Outstanding Limited Series. After the nominations were read, show director, co-writer, and producer Ava DuVernay hopped on Twitter to thank the real-life series subjects—Antron McCray, Kevin Richardson, Yusef Salaam, Raymond Santana, and Korey Wise—affectionately dubbed The Exonerated Five.
“Thank you to the real men for inviting me to tell their story,” DuVernay wrote. “Thank you @TelevisionAcad for honoring the work. Saluting every single crew and cast member. And saluting Raymond, Korey, Antron, Yusef and Kevin. Love you, brothers.”
DuVernay also picked up writing and directing noms for the series, while Jharrel Jerome, Aunjanue Ellis, Niecy Nash, Asante Black, John Leguizamo, and Michael K. Williams were among the series stars recognized for their acting performance.
When They See Us, which follows the five Harlem teens who were incorrectly convicted first in the media and then twice in the courts for the brutal rape of a jogger in the NYC park, was one of the most popular series on the streaming platform, showing up on more than 23 million accounts worldwide
See DuVernay’s tweet below: |
In chemical treatment of hair, such as in bleaching or a permanent waving carried out with the help of sulphur bridges reducing agent, the active agent is allowed to act on the hair chemically for a suitable time. The hair treatment operations of this kind are usually performed by dosing a suitable amount of liquid substance to the hair, which substance contains a suitable amount of active agent.
The problem in the use of liquid substances is their correct dosage. In addition to dosage problems, for avoiding a non-uniform effect of the active substance, various protective measures must be taken. Further, there exists the danger that excess liquid gets onto the skin of the person performing the treatment or the person being treated, which in the worst case causes skin irritation and allergy. Depending on the quality of the active agent the handling of liquids may cause also odors.
U.S. Pat. No. 4,848,377 discloses a hair treatment product, which consists of a non-woven fabric and a solution with which it is impregnated and which can be for example some reducing solution commonly employed in permanent waving. The patent suggests among other things the wetting of a continuous tape with a solution containing active agent and its cutting to pieces of predetermined lengths, which are packaged in a damp state, whereby the said pieces are ready for use to be wrapped together with the hair into a desired shape in the permanent treatment. Various spongy or fibrous elastic materials which are capable of retaining a sufficient quantity of fluid, such as paper and non-woven fabric, are mentioned as possible carrier materials.
German Offenlegungsschrift 4129769 in turn suggests the packaging of wetted pieces into packaging materials, which are either disposable or can be used several times. |
//
// RZAppDelegate.h
// RZViewActionsDemo
//
// Created by Rob Visentin on 12/12/14.
// Copyright (c) 2014 Raizlabs. All rights reserved.
//
@import UIKit;
@interface RZAppDelegate : UIResponder <UIApplicationDelegate>
@property (strong, nonatomic) UIWindow *window;
@end
|
Water is a human right. But, the United States has a water affordability problem. In places like Detroit, Baltimore, and other cities, families unable to afford their water bills have their water shut off. When this happens, kids can't bathe, people can't wash dishes, and grandparents can't flush their toilets. The Human Utility is non-profit organization providing help to families and makes sure they always have running water at home. |
EF-1 alpha is a target site for an inhibitory effect of quercetin in the peptide elongation process.
The effect of quercetin (3,3',4',5,7-pentahydroxyflavone) on the polypeptide elongation system isolated from rat liver cells, was investigated. Quercetin inhibited [14C]leucine incorporation into proteins in vitro and the inhibitory effect is being directed towards the elongation factor eEF-1, but not to eEF-2 and ribosomes. Quercetin was found to form a complex with EF-1 alpha, which was inactive in GTP-dependent binding to ribosomes. It can be suggested that quercetin can block the total or the part of the domain of EF-1 alpha structure that is responsible for formation of the ternary complex EF-1 alpha-GTP-[14C]Phe-tRNA and therefore preventing formation of the quaternary complex with ribosomes. |
Q:
AceGen: How to use MinGW in Compile[]?
Note: This question is about AceGen package for automatic code generation for finite element analysis.
MinGW compiler is recommended for compiling finite element subroutines generated by AceGen and is bundled with the installation. How can I use this compiler for compiling other Mathematica expressions to C (e.g. Compile[...,CompilationTarget->"C"]) and make them faster?
The problem is that my MinGW compiler is not automatically detected by Mathematica. Command CCompilers[] returns empty list.
<< CCompilerDriver`;
CCompilers[]
(* {} *)
A:
I don't know why the MinGW compiler used by the AceGen is not automatically found by Mathematica. Maybe because it is not installed to some specific location or because it is missing some metadata?
This is a workaround. We choose generic compiler and then set its installation path and name to MinGW.
(* This is valid for 64-bit Windows OS *)
<< CCompilerDriver`;
$CCompiler = {
"Compiler" -> CCompilerDriver`GenericCCompiler`GenericCCompiler,
"CompilerInstallation" ->
FileNameJoin[{$UserBaseDirectory, "Applications", "MinGW",
"MinGW64", "bin"}],
"CompilerName" -> "x86_64-w64-mingw32-gcc.exe"
};
This example is taken from documentation for Compile. For some functions compiling to C can give really significant speedup.
(* Function without compilation. *)
f[x_, n_] := Module[ {sum, inc},
sum = 1.; inc = 1.;
Do[inc = inc*x/i; sum = sum + inc, {i, n}];
sum
]
(* Compile to Wolfram virtual machine *)
fCompile = Compile[ {{x, _Real}, {n, _Integer}},
Module[ {sum, inc},
sum = 1.; inc = 1.;
Do[inc = inc*x/i; sum = sum + inc, {i, n}];
sum
]
];
(* Compile to C *)
fCompileToC = Compile[ {{x, _Real}, {n, _Integer}},
Module[ {sum, inc},
sum = 1.; inc = 1.;
Do[inc = inc*x/i; sum = sum + inc, {i, n}];
sum
], CompilationTarget -> "C"
];
f[1.5, 1000000] // AbsoluteTiming
(*{3.1352802071330084`, 4.481689070338066`}*)
fCompile[1.5, 1000000] // AbsoluteTiming
(*{0.06240285331664793`, 4.481689070338066`}*)
fCompileToC[1.5, 1000000] // AbsoluteTiming
(*{0.008644816153883178`, 4.481689070338066`}*)
|
Q:
Server 2008 - 1st NIC's traffic stops when 2nd NIC is plugged in
I have a file server running Windows Server 2008 R2 with 2 NICs in the back. These are their configurations:
Connection #1
Local Area Connection
10.1.37.6
255.255.255.0
[No Gateway]
Connection #2
Local Area Connection 2
10.1.35.49
255.255.255.0
10.1.35.254
At the moment I have connection #2 hooked up and working just fine. I have just created connection #1 in an attempt to connect to a private switch for iSCSI traffic.
Issue
When I plug in the ethernet cable into connection #1, some services related to connection #2 are turned off. Specifically, we can not log in using Remote Desktop and all of our printers (hosted on this file server as well) can no longer connect to fileserver1 to authenticate logins. However connection #2 is still pingable and the actual files stored on this server are still accessible to everyone. This issue reverts when connection #1 is unplugged.
Solutions Attempted
Changed network adapter's advanced settings "Adapters and Bindings"
to prioritize traffic to connection #2
Changed NIC metric on connection #2 to be lower than connection #1
Removed gateway from connection #1 since that connection is only
communicating with things on the 10.1.37.0 net
Checked file server routing table to confirm proper routes
Attempted to enable connection #1 as the iSCSI initiator adapter,
hoping that once it was marked as being used for iSCSI, no other
traffic would attempt to pass through it.
My understanding of this scenario is that once connection #1 is plugged in, it's attempting to direct traffic through that adapter instead of connection #2. I've done everything I think I'd need to to set up the priorities adapters.
Appreciate the help
A:
Have you checked the below . . .
Just a thought for something to check. I'm not certain about not having a GW on the second NIC though.
Source from below: https://social.technet.microsoft.com/forums/windowsserver/en-US/58e53691-64cd-44b9-98a2-ff1697e3ea83/unidentified-network-default-gateway
CHANGING UNIDENTIFIED NETWORKS (Windows Firewall Rules Applied)
Start --> run --> MMC --> press enter
In MMC console , from menu file select Add/Remove Snap-in
Select Group Policy Object editor --> Press Add --> select Local computer --> press OK -->press OK
Open Computer configration -->Windows Settings -->Security Settings -->select Network list manger policies
on the right Side you will see options for :
double click -->Unidentified networks
then you can select the option to consider the Unidentified networks
as private and if user can change the location.
I hope that is will help you and is clear .
the good News that this have changed in windows 7 and Windows 2008 R2
, where user can change the connection type from an easy interface
Other Resources:
https://social.technet.microsoft.com/forums/windowsserver/en-US/8cbc6a56-3847-4afd-aa46-8be1cf69bd9b/windows-2008-r2-64-bit-losing-connection-to-the-network
Windows server losing connectivity
https://www.softwareab.net/wordpress/solve-unidentified-network-error-for-windows-server-2008/
|
<?xml version="1.0" encoding="utf-8"?>
<!--
~ Copyright (C) 2017-2018 Manbang Group
~
~ Licensed under the Apache License, Version 2.0 (the "License");
~ you may not use this file except in compliance with the License.
~ You may obtain a copy of the License at
~
~ http://www.apache.org/licenses/LICENSE-2.0
~
~ Unless required by applicable law or agreed to in writing, software
~ distributed under the License is distributed on an "AS IS" BASIS,
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
~ See the License for the specific language governing permissions and
~ limitations under the License.
-->
<LinearLayout
xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:orientation="vertical"
tools:context="com.wlqq.phantom.plugin.component.MainActivity">
<TextView
android:layout_width="match_parent"
android:layout_height="56dp"
android:background="@color/colorPrimary"
android:gravity="center_vertical"
android:paddingLeft="16dp"
android:text="Plugin Component"
android:textColor="@android:color/white"
android:textStyle="bold"
android:textSize="@dimen/action_bar_title_size"/>
<android.support.v4.view.ViewPager
android:id="@+id/view_pager"
android:layout_width="fill_parent"
android:layout_height="fill_parent">
<android.support.v4.view.PagerTabStrip
android:id="@+id/pager_tabstrip"
android:layout_width="match_parent"
android:layout_height="wrap_content"/>
</android.support.v4.view.ViewPager>
</LinearLayout>
|
Loebl Schlossman & Hackl
Loebl Schlossman & Hackl is an American architecture firm based in Chicago, Illinois.
Founded in 1925 and known by various names through the years, the firm is responsible for the design of several major Chicago landmarks including the 1975 Water Tower Place and the 1990 Two Prudential Plaza.
History
The firm's first major project was the Temple Sholom at 3480 N. Lake Shore Drive. Armour Institute students Jerrold Loebl (1899-1978) and Norman J. Schlossman (1901-1990) largely developed the design while in school. With a third architect John DeMuth, the young team was named as associate architects for the project, behind leads Coolidge and Hodgdon.
In the war years Loebl and Schlossman concentrated on war-related public housing projects on government contracts. This included some 500 units in Seymour, Indiana and Rosiclaire, Illinois. Further projects for the Chicago Housing Authority included the West Chesterfield Homes in 1944, Wentworth Gardens in 1946, and the 800 units in mid-rise, six-story, and nine-story residential towers on the 16 acres of the south-side Dearborn Homes in 1950.
The firm expanded with the addition of Richard M. Bennett (1907-1996), who had been chairman of the Yale Architecture Department, in 1947. Bennett took the lead in the site plan and the architectural components of the suburban planned community of Park Forest, Illinois, which occupied the firm for years. The town's innovative 1949 Park Forest Plaza shopping center developed into another sideline for the firm: a genre of rambling, cleverly landscaped, village-like outdoor malls. These include Old Orchard Shopping Center in Skokie, Illinois in 1956, and the 1962 Oakbrook Center in Oak Brook.
Designer Edward D. Dart joined in 1965 and triggered another wave of ambitious projects. Bennett left in 1974 to teach at the Harvard Graduate School of Design; Dart's career hadn't peaked when he died of an aneurysm in July 1975.
The firm continues in business as of 2017. It has operated as:
Loebl and Schlossman (1925)
Loebl, Schlossman and DeMuth (1926-c.1933)
Loebl and Schlossman (c.1933-1946)
Loebl, Schlossman and Bennett (1947-1965)
Loebl, Schlossman, Bennett and Dart (1965-1975)
Loebl Schlossman & Hackl (1976- )
Work
All structures are in Chicago unless otherwise noted:
Temple Sholom at 3480 N. Lake Shore Drive, 1928
complete design for the planned community of Park Forest, Illinois, 1947
Dearborn Homes, 1949-50
Park Forest Plaza, Park Forest, Illinois, 1949
Temple Beth-El, with architectural sculpture by Mitzi Cunliffe, South Bend, Indiana, 1950
West Suburban Temple Har Zion, with architectural sculpture by Milton Horn, River Forest, Illinois, 1950
twin residential towers at 1350 Lake Shore Drive, the former location of the Palmer Mansion, 1951
Old Orchard Shopping Center, with landscape architect Lawrence Halprin, Skokie, Illinois, 1956
Oakbrook Center, also with Halprin, Oak Brook, Illinois, 1962
Winton Place residential high-rise, Lakewood, Ohio, 1963
associate architects for the Richard J. Daley Center, 1965
River Oaks Center, Calumet City, Illinois, 1966
Norris University Center, Northwestern University, Evanston, Illinois, 1971
Water Tower Place, the tallest reinforced concrete building in the world until 1990, 1975
Pick-Staiger Concert Hall, Evanston, 1975
Mary and Leigh Block Museum of Art, Evanston, 1980
Two Prudential Plaza, 1990
Emil and Patricia Jones Convocation Center, 2007
renovation of The Palmer House Hilton, 2007-2009
Wentz Concert Hall and Fine Arts Center, North Central College, Naperville, 2008
References
Category:Architecture firms based in Chicago
Category:Architects from Illinois |
Postoperative antibiotics are not associated with decreased wound complications among patients undergoing appendectomy for complicated appendicitis.
The objective of this study was to determine the role of postoperative antibiotics in reducing complications in patients undergoing appendectomy for complicated appendicitis. We performed a 5-year retrospective cohort study of adult patients who underwent appendectomy for acute appendicitis. Patients with complicated appendicitis (perforated or gangrenous) were analyzed on the basis of whether they received postoperative antibiotics. Main outcome measures were wound complications, length of stay (LOS), and readmission to hospital. Of 410 patients with complicated appendicitis, postoperative antibiotics were administered to 274 patients (66.8%). On univariate and multivariate analyses, postoperative antibiotics were not associated with decreased wound complications or readmission, but independently predicted an increased LOS (P = .01). Among patients with complicated appendicitis, postoperative antibiotics were not associated with a decrease in wound complications but did result in an increased hospital LOS. |
DogeCar Social Pit Crew – NYC and LA! Such Party So Dogecoin |
NASA has announced its plans for a nuclear-powered aerial drone, Dragonfly, that will fly from place to place on Saturn’s moon Titan. Dragonfly is planned to launch in 2026 for an expected landing in 2034. The lengthy flight will include a gravity-assist maneuver to increase the probe’s velocity.
The wild card that may change that is the SpaceX Starship, capable of sending Dragonfly on a quicker, more direct route, which may be available as early as 2021.
Dragonfly will be the first space probe that will travel on an alien world entirely by air. It will have a suite of cameras that will take pictures both at a distance and close up. Dragonfly will also carry a mass spectrometer to analyze the chemical makeup of the materials it encounters. It will be able to conduct meteorological studies while in flight and seismographic studies of Titan’s interior at each site where it lands.
ADVERTISEMENT
Dragonfly’s primary mission will be to search for signs of life, flying to diverse sites, including organic dunes and an impact crater where scientists believe water and prebiotic materials may have existed together in the distant past. The examination of these sites in the unique environment of Titan will advance astrobiology by tremendous leaps and bounds.
Dragonfly will hop from place to place using eight helicopter rotors for distances of up to five miles. It will visit dozens of sites during the primary science mission that is scheduled to last 2.7 years. Because of Titan’s thick atmosphere and its distance from the sun, Dragonfly will be powered by a nuclear energy device similar to the one used by the Mars Curiosity rover.
Titan is one of the weirdest and therefore most interesting worlds that humanity is aware of. It is the second-largest moon in the solar system. Its surface is comprised of rock and water ice. The moon’s atmosphere consists of nitrogen and methane. Liquid methane and ethane comprise lakes and streams on Titan’s surface, evaporating into clouds before condensing as rain or light snow, in short creating a weather cycle much like water does on Earth.
Titan is unlikely to contain life, at least as we know it. The moon of Saturn is 886 million kilometers from the sun and regularly experiences temperatures of -290 degrees Fahrenheit, Because Titan’s atmosphere is so thick, four times that of Earth’s, the surface pressure is 50 percent higher than that of our home planet. Still, no one will know for sure about life on Titan until explorers — robotic and perhaps, in the distant future, human — traverse Saturn’s largest moon. Indeed, NASA engineer Janelle Wellons once speculated that a human settlement could be established on Titan.
Titan has been extensively explored from above by the Cassini probe which orbited Saturn between 2004 and 2017. While images of Titan that were taken from space resemble an orangish blob, Cassini also brought with it the Huygens probe. That was courtesy of the European Space Agency, which entered the moon’s atmosphere and touched down on its surface after being slowed by a parachute. Huygens took images of Titan’s surface, an orange plain peppered with water ice pebbles under a misty, methane sky. The Huygens remains the most distant landing of any human spacecraft in history.
Dragonfly is part of the New Frontiers series of space probes, several of which are still in operation. The OSIRIS-REx is currently in orbit around the asteroid Bennu. Juno is in a polar orbit of Jupiter and has imaged parts of the largest planet in the solar system hitherto unseen by humans. The most famous of the series, New Horizons, flew past Pluto, returning the first images of the dwarf planet and its moons. It then head out toward an unusual Kuiper Belt world called Ultima Thule. Dragonfly, it is hoped, will add to the wealth of scientific discoveries yielded by her predecessors.
Mark R. Whittington is the author of space exploration studies “Why is It So Hard to Go Back to the Moon? as well as “The Moon, Mars and Beyond.” |
Birds crash into Airbus A-321 during takeoff in Moscow
A passenger of the Airbus A-321 aircraft, which performed hard landing at the airport of Zhukovsky near Moscow captured the moment, when birds, most likely gulls, crashed into the engines of the plane during takeoff.
The video shows that the incident occurred at the moment when the plane is taking off from the runway. Other passengers also said that something went wrong immediately after takeoff.
Airbus A-321 performed an emergency landing near the Zhukovsky airport after one of the engines of the aircraft caught fire. The airliner was bound for Simferopol. There were 226 passengers and seven crew members on board. Many suffered bruises and minor injuries. The crew evacuated all the passengers. It was possible to avoid the fire on board; no one was killed.
The plane landed 15 minutes after takeoff at a distance of about one kilometer from the airport runway. The aircraft did not extend the landing gear as the liner landed on its belly in the cornfield.
It was reported that 23 of the passengers, including five children, were hospitalized with minor injuries.
First pilot Damir Yusupov managed to land the aircraft safely on the cornfield. He also supervised the evacuation of the passengers. Yusupov's flight experience counts over 3,000 hours. Damir Yusupov, 41, graduated from the St. Petersburg State University of Civil Aviation and was hired by Ural Airlines soon afterwards. Second pilot Georgy Murzin is 23 years of age, he has 600 flight hours of experience.
Dmitry Peskov, the official representative of the Kremlin administration, told reporters on Aug 15 that the pilots of the A321 aircraft performed indeed a heroic act. The passengers and the crew remained alive, so one should thank pilots for that in the first place, Peskov said.
In June, a TUI plane made an emergency landing in Scotland after a bird crashed into the plane. The plane was damaged as a result of the collision and had to land in Glasgow. No one was hurt. |
Council bosses have defended road layout changes in Accrington town centre after critics labelled it a ‘dogs dinner’.
Conservative group leader Tony Dobson said the works have ‘left many residents and business owners angry’ and claims a lack of consultation has left the council looking ‘unprofessional and incompetent’.
Coun Dobson claimed the Conservative group had not been informed of many of the changes and said it was a ‘disgrace and a whitewash’.
He told a council meeting: “Regular as clockwork I met with the leader of the council about his suggestions for the opening of the space outside the Yorkshire Bank. Never once did he say Holme Street was going to be turned.
“It was going to stay in that direction to get traffic from one side of Accrington to the new bus station as quickly as possible.
“This is a dogs dinner. It stinks.”
Councillor Clare Cleary, portfolio holder for regeneration, defended the council’s consultation exercise and said the plans have ‘been in the public domain since June 2015’.
She told the council meeting that discussions had taken place with the Chamber of Trade, a walkabout was held with local businesses and consultation events were run in the Market Hall attracting nearly 400 responses.
Coun Cleary said the changes to the highways have been made through a temporary traffic regulation order (TRO).
She said: “This is a consultation exercise for six months where feedback needs to go back to county council.
“The other option is to keep talking about the plans but never implement them.
“The changes to St James Street had to be done quickly to coincide with the opening of the new bus station.
“It was a now or never decision and the consensus from the consultation held included the Chamber of Trade and they thought it was a good idea.
“I do think we have carried out a good range of consultation events and reached several hundred people in the process, probably more than most projects.” |
Complications during percutaneous cardiovascular interventions
ESC Congress 2010
30 Aug 2010
Dr. Imad Sheiban
Topic(s):
Dr Eeckhout introduced the session and defined the learning objectives, which were to analyse why complication may occur during percutaneous intervention and when and how it is possible to prevent complications by integrating complication cases with interactive discussion.
Dr A. Colombo, from Milan, presented the key points that should be kept in mind by interventionalists in order to minimize the occurrence of complication through appropriate selection of catheters, wires, balloons and stents, and appropriate and weighted decisions when some trouble comes up.
Dr Eeckhout presented a case with multivessel disease undergoing PCI. The procedure was complicated by stent mispositioning during deployment at the right coronary artery (RCA) ostium, protruding into the aorta dorsal long segment. He discussed with the Panel and the audience how to successfully manage this complication and he illustared how the stent could be snared and retrieved from the patient.
Dr Clemmensen showed a case with occlusive restensois on proximal RCA previously treated by brachytherapy, totally collateralized from the left coronary system. Clinical indications and procedural strategy were discussed. The procedure was complicated by dissection on proximal RCA involving the ascending aorta. How to proceed in this situation was discussed. Dr Clemmensen showed how they handled this complication by deployment of a covered stent on the ostial and proximal RCA. Despite the persistence of an important dissection of the ascending aorta, they decided to wait and watch. The dissection was totally healed at follow-up CT and the RCA was patent.
Finally, Dr R Waksman from Washington, presented a case of severe calcified aortic stenosis in and 81 year old patient, selected for transcatheter aortic valve implantation. An Edwards Sapien valve was implanted, but complicated by severe aortic regurgitation. TEE performed during the procedure confirmed the severe trans-prosthetic regurgitation due to a malfunctioning valve leaflet. Aortic regurgitation was mainly caused by a malfunctioning valve leaflet, which should be treated with a second valve in valve implantation. The implantation of a second valve was complicated by valve migration from the delivery balloon and the valve was retrieved to thoracic aorta and deployed at that level, and finally a third valve was implanted at aortic level with excellent results. The case underlined the importance of TEE during these procedures, which allows us to understand and appropriately treat the mechanism underlying trans-catheter valve failure.
The session was really interesting and showed again how every Interventional Cardiologist one day or another could be confronted with an unexpected procedural complication. Sharing these experiences and discussion is always very useful to enlarge our knowledge on the management of procedural complications, which can often differ from case to case
References
185
SessionTitle:
Complications during percutaneous cardiovascular interventions
The content of this article reflects the personal opinion of the author/s and is not necessarily the official position of the European Society of Cardiology. |
Q:
What is sum of totatives of n(natural numbers $ \lt n$ coprime to $n$ )?
Same question as in title:
What is sum of natural numbers that are coprime to $n$ and are $ \lt n$ ?
I know how to count number of them using Euler's function, but how to calculate sum?
A:
Let's call this function $f$. Then $$f(n) = \sum_{i = 1}^{n - 1} \delta_{1}^{\gcd(i, n)} i = \frac{n \phi(n)}{2},$$ where $\delta$ is the Kronecker delta function and $\phi$ is Euler's totient function. Clearly if $n$ is prime, then $f(n) = T_{n - 1}$, where $T_n$ is the $n$th triangular number.
Work a few examples. I'll do two for you: $f(6) = 1 + 5 = \frac{6 \times 2}{2} = 2$ and $f(8) = 1 + 3 + 5 + 7 = \frac{8 \times 4}{2} = 16$.
Now, I didn't figure this out on my own. The answer comes from here: Sloane's OEIS A023896.
As for why I like the Kronecker delta function, that's because I'm a demon.
A:
Assume $n>2$. Then, if $n/2$ is an integer, then $n/2$ is certainly not a totative. Now it's easy to see that if $k$ is a totative, then $n-k$ is also a totative. So we can split $\phi(n)$ totatives into $\phi(n)/2$ pairs $\{k,n-k\}$, each containing two distinct elements (because $n/2$ isn't a totative) which sum to $n$. So sum of all totatives is $n\cdot\phi(n)/2=\frac{n\phi(n)}{2}$
|
businessman who was chairman of Hooters, the restaurant chain that features scantily clad, buxom waitresses. There are now 430 restaurants in 46 states and 20 countries. “Good food, cold beer, and pretty girls never go out of style,” he said. |
Spike in firearm thefts putting guns in hands of criminals
Share this story
»Play VideoThe King County Sheriff's Office seized 17 guns from the South Seattle home of suspected criminals in February. (Courtesy of King County Sheriff's Office)
SEATTLE -- Last month, someone stole a revolver, a rifle and two shotguns from shelves inside a neglected and unoccupied West Seattle home. The week before that, a burglar got into a Green Lake house through an open window and took a handgun from an unlocked bedside drawer. Nine days before that, someone stole two rifles equipped with trigger locks from a West Seattle home but also stole the keys.
While state legislators focus on expanding background checks on people purchasing firearms -- a ballot initiative was filed Tuesday that would require background checks for online and private sales -- more guns than ever are being stolen from homes, business and vehicles, putting firearms directly in the hands of criminals. And, law-enforcement officials say it's up to gun owners to stop that.
"We need to talk about gun-owner responsibilities," Det. Ed Troyer of the Pierce County Sheriff's Office said. "Every right comes with a responsibility. Gun owners need to secure their weapons so that they are not misused or stolen."
Stolen firearms on the rise
According to numbers from the Washington State Association of Sheriff's and Police Chiefs, more than $387,000 worth of stolen firearms were reported to the Pierce County Sheriff's Office in 2012, an increase of 14 percent from 2011. Pierce County handled more incidents of stolen firearms, 347, than any other law-enforcement agency in 2012. (Note: the King County Sheriff's Office did not report stolen firearm statistics.)
But, the Pierce County Sheriff's Office isn't alone. The Seattle Police Department reported a 43-percent increase in stolen firearms between 2010 and 2012. And, the Thurston County Sheriff's Office reported a 53-percent increase in incidents of stolen firearms.
All told, $2.8 million worth of firearms were reported stolen by 150 Washington law-enforcement agencies covering 65 percent of the state's population in 2012.
Lt. Greg Elwin of the Thurston County Sheriff's Office said part of that increase can be attributed to the rise in burglaries in general. But, the Seattle Police Department reported a decrease in property crimes last year, and yet the number of stolen firearms went up.
Lt. Loretta Cool with the Tacoma Police Department, which reported more than $252,000 worth of firearms stolen in 2012 for an increase of 55 percent over the previous year, said the increase in stolen firearms can be attributed to more people than ever owning guns.
Burglars are also increasingly targeting firearms because the street value of guns is increasing, Elwin said. And, he said that's a serious problem.
What can be done to curb firearm thefts?
Sgt. Sean Whitcomb with the Seattle Police Department said police will continue their push to keep guns out of the hands people who are not legally permitted to carry them, but gun owners need to do their part to keep their firearms secure.
“Once guns are on the streets, it’s impossible to control who gets them: violent offenders, kids, the mentally ill," Whitcomb said.
Elwin said gun owners should record the serial numbers of their firearms, which allows stolen firearms to be entered in a national database and makes it easier for law-enforcement agencies to track firearms used in crimes.
Cool said gun owners can provide the serial number, police can make sure every officer knows the gun was stolen, where it was stolen from, and what it looks like. It's a step police don't take for TV sets or microwaves, she said.
Just like homeowners stay safe by keeping their doors and windows locked, gun owners should keep their firearms secure by locking them up instead of tossing them into drawers or under the bed, Cool said.
“If you have a safe and the safe is bolted to the floor, chances are real good the burglar is not going to get your firearm," she said. "If you throw your firearm in a dresser or a nightstand drawer, you’ve probably just armed the burglar.”
Dave Workman, a spokesperson for Bellevue's Second Amendment Foundation, said there are a lot of ways to keep guns out of sight and out of reach of a burglar. In addition to gun safes, which he described as small fortresses for guns, Workman said he once knew a man who had a false wall built into his house where he stored his hunting rifles.
"It was the damndest thing I ever saw; there were hidden hinges and everything," he said.
But, there are no guarantees for firearm security. Entire gun safes were stolen from homes in West Seattle, Laurelhurst and Magnolia this spring. Nearly 20 firearms were stolen out of gun safes that were broken into in Greenwood and Rainier Beach earlier this month.
That's why Whitcomb said he advises gun owners to get their guns, like prescription medications, out of their homes if they are no longer using them.
Could legislation help keep firearms secure?
Out of five gun-related bills introduced in the Washington State legislature this session, only one passed, creating a list of felons prohibited from owning firearms for law-enforcement use. Of those bills, only one was even related to gun security.
House Bill 1676 would have made a gun owner guilty of reckless endangerment if they left a firearm somewhere where a child could and did get access to it. It would not apply if the gun was stored in a locked box or other secure space. The bill would also require every gun dealer to offer to sell or give the buyer a locked box or device to keep the gun from firing.
Representatives of the state's law-enforcement agencies seemed doubtful gun security is something that could be handled successfully at the state level. And, Workman said most gun owners really dislike the idea of the government telling them how to store their firearms.
Instead, the focus is on steps like universal background checks, which is the subject of one of this year's failed bills as well as the ballot initiative filed this week. But, Workman said the issue of background checks is a red herring.
"Criminals do not go to gun shows to buy their guns; they steal them," he said.
That means the responsibility to keep legally owned firearms out of the hands of criminals remains largely with the gun owners themselves.
"The bottom line is that gun owners need to be responsible with the record keeping and storage of their weapons," Elwin said. "And, all people should be careful and vigilant with the security of their property."
Grand Opening for Forte Studios in Kennewick WA. A Studio for Photographers to have access to a fully stocked photo studio without the cost of owing their own studio. Great for amateur and professionals looking for a great place to produce some great photos. |
Limoncello Cake
Limoncello Cake
A delicious Italian delight great for the Lemon Lovers out there! Two moist layers of yellow cake sandwich delicious, creamy lemon filling. To top it off, we've added scrumptious crumbs and powdered sugar for a taste beyond compare. We may even convert some people to Team Lemon! Includes a greeting cared that you can personalize and arrives packaged in an elegant gift box.
Some Important Info: Gifts are perishable and on-time delivery is of utmost importance! We cannot be held responsible for incorrect/incomplete addresses. Apartment numbers and suites for residential and business deliveries must be included. Please ensure you have the full address - delays due to missing or wrong information nullifies guaranteed delivery. We want your gift to arrive fresh and delicious!
We suggest our customers to check in Navigations/Maps Apps regarding the address reference.
Please Note: Deliveries are done only from Tuesday and Friday, If the Delivery is on Saturday or on Monday, please add on extra shipping charges in the below drop down button,WE WILL SHIP THE PRODUCT ON NEXT BUSINESS WORKING DAY IF THE ADD IS ON NOT ADDED ON SPECIAL DELIVERIES.We suggest to order atleast 2 days prior to the delivery date to avoid next immediate charges.Please contact our whatsapp support team at +918790604818 or Email us at support@expressluv.in round the clock for any assistance, we are always happy to assist our customers.
Delivery is done between 9Am to 6PM local time as per UPS service flexibility, no service on Sunday and other federal holidays. |
Q:
If A fails to pay C under a contract between A and B to do so, can C sue A?
A promises B to pay C a sum of money, say Rs.500. However, A does not pay the amount to C.
Can C take legal action against A for non-performance?
A:
Nobody can take action against A. In order for anybody to obligate A, they must give something to A, which is not the case here (there has to be "consideration"). In this case, we don't even know if B is alive or A and B speak the same language. You can make a promise to a tree, or to a person who doesn't understand you. Only an agreement can be binding, and we have no evidence that there is any meeting of the minds, or even a second mind. You can remedy this, e.g. A promises B to pay C Rs. 500 if B gives him an egg. C could not sue unless the local law recognised a third-party beneficiary right to sue (this right is apparently not recognized in India, but is in the UK). Since C didn't (given the fact in front of us) rely on this promise, there will be no suit. But perhaps C could fix that by releasing B from an obligation to return a hatchet based on the Rs. 500, and also by being sure that this all took place in the UK. Or, you could remedy this by making C part of the agreement, so that A has a contract with B and C.
|
Portland is one the most under-rated cities in America, possibly because travellers rarely make it this far northwest. The many city parks and gardens make it a delightfully green city with a pleasant, almost northern-European climate, something that has contributed to its reputation as the “Rose Capital of America”.
Portland has a growing reputation as a culinary centre, and combined with having played a proud role in America’s micro-brewery revolution, it is a great place for a few nights on the town. The many diverse museums plus the city’s proximity to the wonderful open spaces and natural attractions of the Pacific Northwest region make it the perfect base from which to explore.
Where you stay is the heart of your holiday. Location reigns supreme but do you prefer resort facilities or unique and boutique? Historic and old world or modern and shiny?
We aim to present choices across the spectrum but there are many hundreds of places to stay
and not room to feature them all. Do speak to your Bon Voyage travel consultant and click the
video for our take on this important topic.
We would rate the Bellagio as one of the best hotels we have ever stayed in.
Fabulous, glitzy, exciting. We loved having breakfast at the poolside
café... one of our best experiences ever. If it hadn't been for you we
wouldn't have had the suite or cabana and we loved them. We both agreed
that the hotel was the best for us and you had suggested that so well done!
Leonore & Mike Rumford
Hotel Fifty
Set in an enviable location in the city of Portland, where the downtown meets the river. |
Year: 2018
Developers: From Software, Japan Studio
Genre&Topics: Fantasy Drama, mature fable, childhood nostalgy, orphans, life & death, PSVR exclusive
This is one of the most meaningful games so far! First of all, since today it’s the privileged testimonial of the new wave of games meant as expressive media, as serious interactive experiences and not necessarily as challenging electronic toys. Why privileged testimonial? Because the mind behind Déraciné is the well reknown Hidetaka Miyazaki, creator of some of the most successfull action-packed, fight-based and challenging games ever: Dark Souls and Bloodborne. I think this is going to help the evolution of gaming market towards the expressive path desired and expected by VGArt; it’s going to recruit new audience and attention for storydriven games intended as virtual experiences, and also for VR. The second benefit is that now you can clearly see the artistic sensibility and expression hidden behind the heavily action-packed, fight-based and challenging gameplay of Dark Souls; now the artist can be truly an artist, free to express his inner thoughts, he needs no more to develop virtual challenges behind which hiding deep contents. Now he can tell stories and put contents at the core of the interactive experience, just like in other forms of expressive art; now you can fully understand your old vague and elusive feeling that Dark Souls had something special and different: the latent artistic sensibility of its author. It’s not so easy to categorize Déraciné, it belongs to none of the usual game categories following mechanics (RPG, FPS, etc.); it belongs to expressive and narrative genres, just as movies, novels or comics do; it’s a fantasy drama! I can understand why so many young critics were difficult to review the last game from Dark Souls creator and gave it low ratings; they obviously were wrong: Déraciné is a virtual interactive experience meant for mature and sensible audience. I want to underline that there are no opposition between traditional games meant as challenges and contemporary games meant as serious virtual experiences, they can peacefully coexist; gaming market is expanding, trying to meet the needs of a more and more mature audience. It’s a natural evolution of the medium; sadly some people, in particular immature gamers that see video games just as usual challenging toys, they have conservative attitude, they are not open minded, they try to foolishly resist the new wave, they cannot understand the importance of artistic, expressive and narrative features; I’m not surprised of this: it’s the history of humankind!
Is Déraciné a so called walking simulator? Not at all! First of all, the label “walking simulator” has no sense, as I explained here; moreover you’re not walking for contemplating open air environments.
You’re a kind fairy teleporting through an orphanage of the XIX century. Déraciné is the french word for “uprooted”, people with no roots, just like the main characters, orphans. Déraciné is a poetic, elegiac, romantic experience. When you wear the headset you’re catapulted in such dreaming past made of ghosts and childhood memories where time cannot flow, just as you’re part of an old family photo album. Nostalgy of childhood and of an idealized past engulfs you. Thanks to the graceful Miyazaki touch for fantasy, you can feel both the magic and the sadness of life through the innocent thoughts of children and their odd adventures. Miyazaki make you feel the children so real and alive, near to you as a family, and orphanage becomes your home, with its secrets and its hearth-warming Victorian style. Child actors and their voice acting are at the state of art, dialogues and monologues are divinely written. Story is really compelling, full of mistery and fantasy, slowly growing towards the surprising and original end.
Despite its undoubtable expressive and narrative value, I cannot say Déraciné to be a masterpiece, because of its static gameplay and not original interactive mechanics. You can just teleport from spot to spot; I would have preferred free smooth locomotion for wandering like a true spirit through the three spatial dimensions. One of the most intriguing feature is the possibility to travel through the fourth dimension, time. That’s a feature so many games have accustomed us to (Prince of Persia: The Sands of Time, Life Is Strange, The Invisible Hours, Braid, etc.). Manipulation of time is a great resource for Video Games; nevertheless in Déraciné there are no interactive mechanics linked to time manipulation. You just move up and down from present to past and viceversa following the chapters progression. Be careful: you could get lost in time loops! I would have preferred an engaging mechanic for rewinding, forwarding and freezing time at your will, in the style of VR masterpiece The Invisible Hours. When you are exploring the orphanage, children are litterary frozen, suspended in time; that’s very effective for expressive purpose and has not to be meant as a defect. Main mechanic reminded me of The Chinese Room‘s Everybody’s Gone To The Rapture: you can activate memories from the past interacting with little floating circular flames. You have to make flames appear by solving simple environmental puzzles, essentially searching and finding items, putting them in the right place or giving them to the right kid. That’s the only way to move story forward; you’re engaged because you want story to go on, you cannot wait for interacting with children and listening or watching their memories. Once you have unlocked memories, children keep reviving but on the contrary your gameplay is interrupted! That’s not good! Events are told through cinematic cut scenes where you cannot interact or move; Déraciné falls in the traditional detachment between interactivity and storytelling. By the way it makes good use of VR, because you feel really immersed in the virtual scenario and very empathetic with the children, as they were real people.
Maybe not a masterpiece of interactivity, perhaps because of intrinsic technological limits of today VR, but for sure a great meaningful and artistic narrative experience you should not absolutely miss; a delicate and compelling fable for mature audience that allows Miyazaki to fully express his inner and deep art. It is worth of full price, the experience will bring you immersed for about eight unfogettable hours, depending on your game style.
Rating: 84/100 |
<?php
namespace Oro\Bundle\EmailBundle\Controller\Configuration;
use FOS\RestBundle\Controller\Annotations\Delete;
use Oro\Bundle\EmailBundle\Entity\Mailbox;
use Oro\Bundle\FormBundle\Model\AutocompleteRequest;
use Sensio\Bundle\FrameworkExtraBundle\Configuration\ParamConverter;
use Sensio\Bundle\FrameworkExtraBundle\Configuration\Template;
use Symfony\Bundle\FrameworkBundle\Controller\Controller;
use Symfony\Component\HttpFoundation\JsonResponse;
use Symfony\Component\HttpFoundation\Request;
use Symfony\Component\HttpFoundation\Response;
use Symfony\Component\HttpKernel\Exception\HttpException;
use Symfony\Component\Routing\Annotation\Route;
/**
* The controller for the mailboxes functionality.
*
* Actions in this controller are protected by MailboxAuthorizationListener because access to them is determined
* by access to Organization entity which is not even always available.
* @see \Oro\Bundle\EmailBundle\EventListener\MailboxAuthorizationListener
*/
class MailboxController extends Controller
{
const ACTIVE_GROUP = 'platform';
const ACTIVE_SUBGROUP = 'email_configuration';
/**
* @Route(
* "/mailbox/update/{id}",
* name="oro_email_mailbox_update"
* )
* @ParamConverter(
* "mailbox",
* class="OroEmailBundle:Mailbox"
* )
* @Template("@OroEmail/Configuration/Mailbox/update.html.twig")
*
* @param Mailbox $mailbox
* @param Request $request
*
* @return array
*/
public function updateAction(Mailbox $mailbox, Request $request)
{
return $this->update($mailbox, $request);
}
/**
* Prepares and handles data of Mailbox update/create form.
*
* @param Mailbox $mailbox
* @param Request $request
*
* @return array
*/
private function update(Mailbox $mailbox, Request $request)
{
$provider = $this->get('oro_config.provider.system_configuration.form_provider');
list($activeGroup, $activeSubGroup) = $provider->chooseActiveGroups(self::ACTIVE_GROUP, self::ACTIVE_SUBGROUP);
$jsTree = $provider->getJsTree();
$handler = $this->get('oro_email.form.handler.mailbox');
if ($handler->process($mailbox)) {
$this->get('session')->getFlashBag()->add(
'success',
$this->get('translator')->trans(
'oro.email.mailbox.action.saved',
['%mailbox%' => $mailbox->getLabel()]
)
);
return $this->get('oro_ui.router')->redirectAfterSave(
[
'route' => 'oro_email_mailbox_update',
'parameters' => ['id' => $mailbox->getId()]
],
$this->getRedirectData($request),
$mailbox
);
}
return [
'data' => $jsTree,
'form' => $handler->getForm()->createView(),
'activeGroup' => $activeGroup,
'activeSubGroup' => $activeSubGroup,
'redirectData' => $this->getRedirectData($request),
];
}
/**
* @Route("/mailbox/create", name="oro_email_mailbox_create")
* @Template("@OroEmail/Configuration/Mailbox/update.html.twig")
*
* @param Request $request
*
* @return array
*/
public function createAction(Request $request)
{
return $this->update(new Mailbox(), $request);
}
/**
* @Delete(
* "/mailbox/delete/{id}",
* name="oro_email_mailbox_delete"
* )
* @ParamConverter(
* "mailbox",
* class="OroEmailBundle:Mailbox"
* )
*
* @param Mailbox $mailbox
*
* @return Response
*/
public function deleteAction(Mailbox $mailbox)
{
$mailboxManager = $this->getDoctrine()->getManagerForClass('OroEmailBundle:Mailbox');
$mailboxManager->remove($mailbox);
$mailboxManager->flush();
return new Response(Response::HTTP_OK);
}
/**
* This is a separate route for user searing within mailbox organization.
*
* @Route(
* "/mailbox/users/search/{organizationId}",
* name="oro_email_mailbox_users_search"
* )
*
* @param Request $request
* @param int $organizationId
*
* @return JsonResponse
*/
public function searchUsersAction(Request $request, $organizationId)
{
$autocompleteRequest = new AutocompleteRequest($request);
$validator = $this->get('validator');
$isXmlHttpRequest = $request->isXmlHttpRequest();
$code = 200;
$result = [
'results' => [],
'hasMore' => false,
'errors' => []
];
if ($violations = $validator->validate($autocompleteRequest)) {
foreach ($violations as $violation) {
$result['errors'][] = $violation->getMessage();
}
}
if (!$this->get('oro_form.autocomplete.security')->isAutocompleteGranted($autocompleteRequest->getName())) {
$result['errors'][] = 'Access denied.';
}
if (!empty($result['errors'])) {
if ($isXmlHttpRequest) {
return new JsonResponse($result, $code);
}
throw new HttpException($code, implode(', ', $result['errors']));
}
$searchHandler = $this->get('oro_email.autocomplete.mailbox_user_search_handler');
$searchHandler->setOrganizationId($organizationId);
return new JsonResponse(
$searchHandler->search(
$autocompleteRequest->getQuery(),
$autocompleteRequest->getPage(),
$autocompleteRequest->getPerPage(),
$autocompleteRequest->isSearchById()
)
);
}
/**
* @param Request $request
*
* @return array
*/
protected function getRedirectData(Request $request)
{
return $request->query->get(
'redirectData',
[
'route' => 'oro_config_configuration_system',
'parameters' => [
'activeGroup' => self::ACTIVE_GROUP,
'activeSubGroup' => self::ACTIVE_SUBGROUP,
]
]
);
}
}
|
LCD considers QC's future as recorder
THE LORD Chancellor's Department is considering the future of David Cocks QC as a recorder following complaints made to the Bar Council about his role in the Roger Levitt fraud trial.
The complaint centres on allegations that Cocks, prosecution counsel for the Serious Fraud Office on Levitt and head of chambers at 5 King's Bench Walk, shared responsibility with the SFO and the Attorney General for misleading Parliament over the handling of the 1993 trial.
An LCD spokesman said its judicial appointments section “is aware of complaints to the Bar Council and is currently considering whether David Cocks should sit as a recorder while the Bar Council is investigating the complaints”.
Under the Courts Act 1971 the Lord Chancellor has powers to terminate the office of a recorder, he said.
The LCD stressed its consideration of the situation was not a judgement on the validity or otherwise of the complaints against Cocks and it had not yet informed him of its conclusions.
But Cocks said: “If a complaint is made against me, however ill-conceived or unfounded it is, I would not sit until it is satisfactorily resolved.”
The trial led to a complaint by Cocks against Levitt's counsel Jonathan Goldberg QC, of 3 Temple Gardens, for allegedly misleading the jury. There were complaints against Cocks by MPs and Levitt's solicitor John Perry, of Davies Goldkorn Mathias, for allegedly misleading the SFO and against the Attorney General for the handling of the case. |
Q:
Prove that field $Q(x)$ is a field of fractions of ring $F[x]$
Let $F$ be a commutative ring without zero divisors and $Q$ its field of fractions. How can I prove that field $Q(x)$ is a field of fractions of ring $F[x]$? And also why is it that field $Q((x))$ can't match with the field of fractions of ring $F[[x]]$? Thanks!
A:
I can show you an example of an element of $Q[[x]]$ that is not a fraction of two elements of $F[[x]]$, but I’m afraid it’s ridiculously advanced. I’m sure that others will give better examples.
I’m going to take $F=\Bbb Z_p$ and $Q=\Bbb Q_p$, the $p$-adic integers and numbers respectively. A basic tool for handling $\Bbb Z_p[[x]]$, or indeed power series over any complete local ring, is the Weierstrass Preparation Theorem. It’s incredibly powerful, but not at all deep, and my contention is that if $n$ mathematicians sit down to prove it, you’ll get $n$ different proofs, or more.
Weierstrass Preparation says this: Let $f(x)\in\Bbb Z_p[[x]]$, with first unit coefficient in degree $d$ (“unit” means that the coefficient has absolute value $1$). Then there is a monic polynomial $q(x)$ of degree $d$, with all coefficients in lower degrees divisible by $p$ (i.e. of absolute value less than $1$), and a unit power series $U(x)\in\Bbb Z_p[[x]]^*$ (so that $U(0)$ is a unit of $\Bbb Z_p)$, such that $f=qU$. Furthermore, $q$ and $U$ are unique with this property.
Notice that a power series in $\Bbb Z_p[[x]]$ may be evaluated at any element $\alpha$ in the (an) algebraic closure $\overline{\Bbb Q_p}$ of $\Bbb Q_p$ for which $|\alpha|<1$, because $\Bbb Q_p(\alpha)$ is a finite extension, and $|*|_p$ is uniquely extendible to such a field, which is even complete with respect to this absolute value. (So we don’t need to complete the algebraic closure for this purpose.) When we examine how W-Prep is involved here, we see that all the roots of $q$ have absolute value less than $1$, and that $U$ has no roots $\alpha$
at all with $|\alpha|<1$. Thus W-Prep says that a power series over $\Bbb Z_p$ has only finitely many zeros in the maximal ideal of the integers of the algebraic closure.
Once I exhibit a series $L(x)$ over $\Bbb Q_p$ that may be evaluated at any $\alpha\in\overline{\Bbb Q_p}$ for which $|\alpha|<1$, and which has infinitely many zeros of this type, it follows that $G$ is not the quotient of two $\Bbb Z_p$-power series $q$ and $r$. For, if $L=q/r$, we also have $rL=q$, infinitely many zeros on the left, only finitely many on the right.
My example of an $L$ as above is $\log(x)=x-x^2-2+x^3/3-x^4/4+\cdots$, just the ordinary logarithmic series. You easily check that it may be evaluated at any $\alpha$ with $|\alpha|<1$, and you can check with a little more difficulty that it vanishes at all the numbers $\zeta-1$, with $\zeta$ running through the $p$-power roots of unity in the algebraic closure, of which there are of course infinitely many.
|
Australian airports could reportedly shutdown indefinitely as major ground operations company Swissport considers dramatically cutting staff and liquidating assets.
Executive vice-president Asia-Pacific Glenn Rutherford says Virgin's collapse has had a knock-on impact on his company with the airline owing Swissport several million dollars in unpaid bills.
Swissport is looking at cutting up to 80 per cent of its staff.
A general view of the empty Virgin Australia boarding gates at Sydney Domestic Airport. (AAP Image/Dan Himbrechts) (AAP)
"This will have a material impact when (the government) eventually turns the industry back on," Mr Rutherford told The Australian.
"As soon as they open the borders and gates, it may take months ... and all those skills and equipment will be gone. There will be a crisis in getting it back into operation."
The newspaper reports that the mothballing of Swissport could impact border security as well with its staff trained to keep an eye out for terrorism and criminal threats in the nation's airports.
Virgin Australia has announced it has gone into voluntary administration but will continue to operate. (AAP Image/Dan Peled) NO ARCHIVING (AAP)
Deputy Prime Minister and Transport Minister Michael McCormack will consider an $125 million bailout request from Swissport.
"I will seriously look at what they put in front of me ... I'm happy to talk to the company ... I understand what role they play," he told The Australian.
"I wouldn't downplay what they have put in front of me ... we will treat it in the normal way. I don't treat this as an ambit claim." |
"Does he care at all that Canada is now the only complex multiparty democracy in the developed world which still relies on a 15th century voting system designed for medieval England?" young Canadian Alliance MP Jason Kenney asked a Liberal MP one afternoon in February 2001, the former aggrieved by the latter's "partisan rant."
"Does he care at all that 60% of Canadians in the last election voted against his government's program and yet the government holds 100% of the political power?"
A few months earlier, the Liberal Party had indeed won 57 per cent of the seats with 41 per cent of the popular vote.
"Does he," Kenney continued, "have the capacity for one moment to transcend partisanship and his government's defence of the status quo to suggest that yes, perhaps this place, the voice of the people, the place where we speak, Parliament, should consider an electoral system which allows the plurality and diversity of political views to be properly reflected in this, the people's House?"
Up for consideration that day was an NDP motion calling for a special committee to study electoral reform.
Fifteen years later, when the minister of democratic institutions noted for the House's benefit last month that Canada was one of only three countries in the OECD to still use first-past-the-post, Kenney reminded her "that those three OECD countries" — the United States, Britain and Canada — "are also the oldest and most stable continuing democracies in the world."
But at least a committee now exists to consider all relevant questions and context; it will meet for the first time on Tuesday. Its members, including Jason Kenney, could spend the next six months seriously sorting through the profound questions inherent in any meaningful consideration of putting democratic ideals into electoral practice.
Summer of electoral reform
Joining Kenney are two other Conservatives: Scott Reid and Gérard Deltell. The Liberals have assigned four rookies (John Aldag, Matt DeCourcey, Sherry Romanado and Ruby Sahota) and one veteran (Francis Scarpaleggia). The NDP is offering prominent lieutenants Nathan Cullen and Alexandre Boulerice, while the Bloc Québecois will be represented by Luc Thériault and the Greens by the party's leader and lone MP, Elizabeth May.
The committee will elect its chair on Tuesday and is expected to hold hearings through the summer. The next few months will also include what is being described as "a series of national outreach engagements" with the minister of democratic institutions, Maryam Monsef, and her parliamentary secretary, Mark Holland.
The summer of electoral reform might thus be upon us (possibly rivaling 2010's summer of the long-form census for whimsy and spectacle).
Minister of Democratic Institutions Maryam Monsef discusses the decision to support the NDP proposed structure for the electoral reform committee. 8:17
At the very least, the discussion might now expand beyond the question of whether a referendum is necessary before implementing reform — a question the Conservatives are insistent upon and that will hang over this debate — to get to a debate about the actual merits of various electoral systems.
Choices to replace 'medieval' system
The Canadian Alliance position in 2001 seems to have been that the first-past-the-post system was broken, but Conservative insistence on a referendum is not new. As a Canadian Alliance MP, Scott Reid actually argued for two referendums during a debate in 2001 and a supplementary opinion added by Conservative MPs to a House committee report in 2005 included a commitment that a Conservative government would not implement substantial electoral reform without a national vote.
But that opinion also specified that Conservatives "would be unwilling to make any changes to the electoral system that would weaken the link between MPs and their constituents, that would create unmanageably large ridings, or that would strengthen the control of party machinery over individual members of Parliament."
At the Liberal government's behest, the new electoral reform committee is to bear in mind another set of principles. The optimal reform will reduce "distortion" and strengthen "the link between voter intention and the election of representatives." It will "foster greater civility and collaboration in politics," but also "avoid undue complexity in the voting process."
And it will "recognize the value that Canadians attach ... to members of Parliament understanding local conditions and advancing local needs at the national level."
The trick is merely agreeing on a system that somehow satisfies those ideals.
The shortcomings of our current first-past-the-post system are well documented. Popular vote across the country does not always equate to seats in the House. Parties with something less than 50 per cent support regularly win governing majorities.
But it is also nicely straightforward. The candidate with the most votes in each riding wins and the legislature is comprised of 338 equally elected representatives.
Prime Minister Justin Trudeau promised 2015 was the last election to be fought on first-past-the-post. What shape could electoral reform take? 2:39
The ranked ballot can increase the disparities of first-past-the-post.
The multiple-member proportional (MMP) system, which has voters cast two votes, would produce two classes of MPs: local representatives and compensatory MPs added to create a proportional result.
The single-transferable vote (STV), which uses a ranked ballot to elect multiple representatives per district, requires larger ridings.
(The Conservative objections could be used to rule out STV and MMP proposals.)
All such proportional systems are more likely to produce coalition governments, which are either worthy tools of compromise and consensus or messy little arrangements that can unduly empower smaller parties.
Like most general elections, the reform debate offers a choice of rather imperfect options. All of which will now be submitted to a committee of 12 MPs.
Poisoned by self-interest?
Only the New Democrats, with their expressed support for MMP, are particularly aligned with a given system.
The Liberals committed last year to abandon first-past-the-post, but without specifying an alternative. While Justin Trudeau has mused of supporting a ranked ballot, the small Liberal caucus of the last Parliament split in half when the NDP asked MPs to vote on adopting "some form" of MMP in 2014. (Francis Scarpaleggia was among those who voted no.)
Elizabeth May supported that motion, but the Green Party platform in 2015 promised merely to pursue proportional representation and May says she has no preferred option.
Conservatives might conceivably find they like a particular alternative or emerge as hearty defenders of the status quo.
In 2011, Scott Reid suggested that any attempt by MPs to choose a new system would be inherently poisoned by self-interest: "If we try as a group to select a system in advance, I can guarantee that the system will be reviewed and analyzed by each person and each party with one question foremost in mind: how will this help me or how will this hurt me?"
That might yet prove to be the case. A lack of consensus could necessitate a referendum.
But the possibility of underlying cynicism hasn't prevented MPs from debating any number of other topics. And even if they struggle to transcend partisanship, they might at least give our medieval system and its possible alternatives a decent airing. |
Extra
A Brief History of Cell Death Research
The stereotypical developmental 'regression' of various fetal and larval structures was known to the ancients, including possibly Aristotle. By the 1840's, technical developments in microscopy and the elaboration of the cell theory by Schleiden & Schwann, allowed for such events to be placed into a cellular context by Vogt and others: developmental regression in toads and insects was understood to involve the death of individual cells. In an early example of the application of chemistry to understand biology (what today we would call 'chemical biology'), textile dyes used in the 1880's by Walther Fleming and others to stain cells subsequently enabled the visualization of new intracellular features of dying cells, such as 'chromatolysis' - the regulated destruction of the chromosomes.
In the 20th Century it became clear from studies of animal development that some cells formed during early development were subsequently eliminated. The name apoptosis was coined by Kerr, Wyllie & Currie in 1972 to describe one characteristic process of programmed cell death. The nematode worm C. elegans, introduced as a genetic model of animal development in the 1970's by Sydney Brenner, was used by Robert Horvitz's lab in the 1980's and 1990's to isolate specific genes involved in this process. Converging lines of research demonstrated that cell death pathways were highly conserved and important for development and the prevention of diseases such as cancer in mammals. A subsequent explosion of work has identified numerous biochemical pathways that, when activated, can trigger some form of regulated cell death. |
LEDs as light sources for illumination have greatly improved, enabling applications for so-called general light purposes, as opposed to the prior use as warning lights, for example. While LEDs now approach the performance level of traditional light sources, they require the heat-dissipaters to maintain their light output and expected life times. While this problem (heat removal) is not great when low-power LEDs (below 0.5 watts) are used, it becomes a serious problem in applications that call for high power density.
Typically, heat dissipation is dealt with by a variety of means, such, for example, as substantial heat sinks; forced convection, circulating cooling liquid; heat pipes; or various combinations of these devices.
For example, U.S. Pat. No. 6,910,794 discloses an automotive lighting assembly that includes a metal heat pipe using an evaporation area and condensing area located remote from the evaporation area. Such structures are relatively massive and difficult to fabricate.
Other, large scale heat pipes have also been proposed, for large scale cooling operations, for example, those shown in U.S. Pat. Nos. 2,350,348 and 3,229,759; however, these relatively massive devices are virtually incompatible with small scale LEDs and, moreover, do not provide for direct LED mounting. |
[Monitoring of the treatment of endogenous depression with imipramine and amitriptyline (preliminary report)].
Monitored treatment of a depressed phase of unipolar affective disorder was conducted in 11 female patients receiving imipramine and in 12 females taking amitriptyline. Patients were randomly assigned to one of the drug and in 6 patients the drugs were switched because of the lack of response to the first used compound. In the imipramine treated group a satisfactory response after 4 weeks of management (less than 6 points on Hamilton's depression scale) was observed in 6 patients and in amitriptyline treated group in 5 patients. Patients displaying a satisfactory response to amitryptyline had significantly higher--as compared to remaining patients in the group--plasma levels of the drug after two and four weeks of treatment. Such an association was not observed in patients treated wtih imipramine. Severity of depression and motor retardation before the treatment was similar both in patients with satisfactory and with poor response to imipramine as well as to amitriptyline. However the intensity of anxiety symptoms was higher in patients exhibiting poor response to treatment with amitriptyline and imipramine as well. |
//
// HMSideMenu.h
// HMSideMenu
//
// Created by Hesham Abd-Elmegid on 4/24/13.
// Copyright (c) 2013 Hesham Abd-Elmegid. All rights reserved.
//
#import <UIKit/UIKit.h>
typedef enum {
HMSideMenuPositionLeft,
HMSideMenuPositionRight,
HMSideMenuPositionTop,
HMSideMenuPositionBottom
} HMSideMenuPosition;
@interface HMSideMenu : UIView
/**
Current state of the side menu.
*/
@property (nonatomic, assign, readonly) BOOL isOpen;
/**
Spacing between each menu item and the next. This will be the horizontal spacing between items in case the menu is added on the top/bottom, or vertical spacing in case the menu is added on the left/right.
*/
@property (nonatomic, assign) CGFloat itemSpacing;
/**
Duration of the opening/closing animation.
*/
@property (nonatomic, assign) CGFloat animationDuration;
/**
Position the side menu will be added at.
*/
@property (nonatomic, assign) HMSideMenuPosition menuPosition;
/**
Initialize the menu with an array of items.
@param items An array of `UIView` objects.
*/
- (id)initWithItems:(NSArray *)items;
/**
Show all menu items with animation.
*/
- (void)open;
/**
Hide all menu items with animation.
*/
- (void)close;
@end
///--------------------------------
/// @name UIView+MenuActionHandlers
///--------------------------------
/**
A category on UIView to attach a given block as an action for a single tap gesture.
Credit: http://www.cocoanetics.com/2012/06/associated-objects/
@param block The block to execute.
*/
@interface UIView (MenuActionHandlers)
- (void)setMenuActionWithBlock:(void (^)(void))block;
@end |
Three-combination probiotics therapy in children with salmonella and rotavirus gastroenteritis.
Quantitative Vesikari scales and qualitative severe diarrhea (Vesikari scale ≥11) assessments were used to grade the Salmonella-induced and rotavirus-induced gastroenteritis severity. A significant reduction in severe diarrhea (Vesikari score ≥11) was used to evaluate the efficacy of three-combination probiotics (BIO-THREE). Several studies have shown that rotavirus and Salmonella infections are the leading causes of infectious gastroenteritis. Although probiotics have been effective in some studies, the use of 3-combination formulation probiotics is rare. This single-center, open-label, randomized, controlled trial included 159 patients (age range, 3 mo to 14 y) hospitalized with infectious gastroenteritis between February 2009 and October 2010. Patients were grouped according to the pathogen identified (48, Salmonella; 42, rotavirus; and 69, unknown origin). The total diarrhea duration was significantly shorter for children who received BIO-THREE (P<0.0001). After BIO-THREE administration, there were significantly less intervention group patients with severe diarrhea at intervention day 3. Vesikari scale or diarrhea frequency results did not reveal significant differences between groups (except for day 5 in patients with rotavirus), and there were no significant changes in other clinical parameters or the length of hospital stay. Seven-day BIO-THREE administration demonstrated high efficacy and safety in infants and children with severe gastroenteritis. The incidence of severe gastroenteritis was significantly reduced in the rotavirus origin and BIO-THREE intervention groups. |
ve 1 = -2*c - i, 2*c + 4*i - 2*i - 2 = 0 for c.
-2
Solve 6020*i - 6017*i = f - 5, -3*f - 18 = 2*i for i.
-3
Solve 3*d = 4*o - 1, 0 = 5*d - 20*o + 18*o - 3 for d.
1
Solve 3*r - 5*a = 2, -32568*a = -r - 32571*a - 18 for r.
-6
Solve 33 = -3*j - 3*y, 29*j - 28*j + 27 = -5*y for j.
-7
Solve 3*w = -5*c - 22, w - 6*w + 2*c - 16 = 0 for w.
-4
Solve 0 = 20*y - 24*y - 3*j + 4, y = -16*j + 62 for y.
-2
Solve k = -s + 2*k - 7, 26 = -2*s + 3*k for s.
5
Solve 2*n + 19 = -5*o, 4*o + 6 = -2*n - 8 for o.
-5
Solve 448*j - 452*j = u + 8, -4*u + 22 = -11*j for j.
-2
Solve -3*m - 12 = 0, 557*n - 12 - 3 = 564*n + 2*m for n.
-1
Solve -3*l = -2*n + 9, 210*n + 14 = -5*l + 213*n for l.
-1
Solve -6025*n + 12047*n + 5*k = 6019*n - 26, 9*n = -4*k - 34 for n.
-2
Solve 4*i = -88*b + 87*b + 21, 0 = -2*b + 5*i - 10 for b.
5
Solve 3*l = -q + 9, -123*l + 35 = -118*l + 5*q for l.
1
Solve 4*d + 2*s = 0, 540*d + 5 = 539*d + 2*s for d.
-1
Solve -3*b - 10*x - 43 + 25 = 0, -4*b + 28 = -4*x for b.
4
Solve -140 = -5*s - 2*h - 135, -4*h - 92 = -24*s for s.
3
Solve 50 = -2*q + 2*h + 60, 5*q + 5*h + 35 = 0 for q.
-1
Solve -23235 = -2*p + 3*a - 23228, -13*a = -2*p + 57 for p.
-4
Solve 39*v - 36 = 40*v + 8*g, -4*v = g - 11 for v.
4
Solve 4*a - 82*q + 79*q = 20, -2*a + 4*q = -10 for a.
5
Solve 5*z + 3*l + 21 = 0, -5661*z = -5656*z + 2*l + 24 for z.
-6
Solve 4*i = -5*c + 14, 2 = -4*i - 3 + 9 for c.
2
Solve 0 = 4*c + 3*j + 5528 - 5504, -4*c = 2*j + 20 for c.
-3
Solve -7*h = -5*f - 37, 5*h = 5*f + 6*h + 29 for f.
-6
Solve -18*b = 5*g - 144 - 69, 0 = 3*b + g - 36 for b.
11
Solve 4*f - 7 - 9 = 0, -77*j + 74*j = f - 7 for j.
1
Solve 3*f = 2*c - 14 - 5, -14*f = -2*c + 74 for f.
-5
Solve -30 = 6*j, 32 = x - 3*x - 4*j - 0*j for x.
-6
Solve 5*l = -4*w + 71, -24*l + 27*l = -9*w + 36 for l.
15
Solve -l + 1 = f, -4*l + 21 = 37 for f.
5
Solve 298*p - 301*p = -4*s + 50, 4*s - 60 = 4*p for s.
5
Solve 23 = r + 5*x, -1129 + 1131 = -2*r + 2*x for r.
3
Solve -3*u - 29 + 10 = -4*a, -24 = -5*a + 4*u for a.
4
Solve -2*r = -8*c - 94, -3*c - 6 - 28 = -r for c.
-13
Solve -5*b + 73 = 2*r + 57, -4*b = -16 for r.
-2
Solve -5*r - 2 = 2*m + 7, -5*r - 15 = 5*m for m.
-2
Solve -c + 141 = 2*l + 119, c = -5*l + 61 for c.
-4
Solve -427*r = -4*d - 432*r + 36, 8 = 2*r for d.
4
Solve -29 = -922*l + 918*l - j, 3*l + j - 24 = 0 for l.
5
Solve 2*t - 132 = -169*i + 100*i, -4*i + t + 11 = 0 for i.
2
Solve -13*p + 17*p - 9 = 3*l, -13 = 16*p - 5*l for p.
-3
Solve 0 = 5*f + 20, 7*j + 156*f - 153*f - 23 = 0 for j.
5
Solve -c = -4*a - 23, 54*a - 52*a = -2*c - 24 for c.
-5
Solve 29 = p - 2*n, -34*p + 9*n = -30*p - 132 for p.
-3
Solve 0 = -n - 3*j + 5, -11 = 178*n - 173*n - 3*j for n.
-1
Solve -2*d = -6*q - 22*q + 50, 16*d = -q + 15*d - 10 for q.
1
Solve -15 = 5*q, 3*k + 3*q - 22 = -22 for k.
3
Solve 1003*a - 2 = 999*a + 5*q, 2*a - 2*q = 2 for a.
3
Solve 5*o + 3 = 103*l - 100*l, 5*o - 1 = 4*l for l.
-4
Solve 135*l = 131*l + 3*j + 39, l - 2*j - 16 = 0 for l.
6
Solve 6*x + 6 = 3*j, -1802*x + j - 2 = -1804*x for x.
0
Solve 0 = 4*i - 5*a + 93 - 69, 5*i + 17 = 3*a for i.
-1
Solve -5*x + 30 = 5*n, 4*x - 222*n = -223*n + 15 for x.
3
Solve 13*u + 20 = 8*u - 3*i, -2*i = 4*u + 16 for u.
-4
Solve 3*y - h = 6, 5*y - 4*h = -0*h + 24 for y.
0
Solve -110*n + 107*n - 4*z = -77, 13*z = 5*n - 30 for n.
19
Solve -p - k = 17, -49 = 276*p - 274*p + 5*k for p.
-12
Solve 2*p - 3 = 5*o, 349 - 385 = 5*p + 2*o for p.
-6
Solve -13*r = -65, -10*a = -11*a - 4*r + 24 for a.
4
Solve 46607 = 5*k + 2*m + 46600, 5 = 6*k - m for k.
1
Solve 4*u - 26 = 5*j, 3*j = -142*u + 140*u + 2 for u.
4
Solve 566*g - w + 29 = 563*g, 4*g - 6*w + 62 = 0 for g.
-8
Solve 3*d = -4*b - 7, -6*b = -2*b - 2*d - 18 for b.
2
Solve -3*n = d - 94 + 80, 5*d - 2*n = -15 for d.
-1
Solve 18 = -85*a + 88*a, 4*n + 3*a - 6 = 0 for n.
-3
Solve -11*l + 13*l + 32 = -4*s, -7*l - 42 = 4*s for s.
-7
Solve 29*h - v = -31*h + 59*h + 9, 2*v + 20 = 0 for h.
-1
Solve -4*g - 41*o + 38*o = 29, -9 = g - o for g.
-8
Solve -3 = w, -101*u + 5 = -103*u - w for u.
-1
Solve -2*f - f - 5*x = 22, -4*f + 14 = -2*x for f.
1
Solve -32*y - 3*k = -33*y - 64, -101*y = -96*y + k for y.
-4
Solve 3*y + 5*u = 0, 0 = 11*y - 13*y + 12*u + 46 for y.
5
Solve 2*r - 316*h + 303*h = 23, -4*h - 20 = r for r.
-8
Solve -14*s = -9*s - 6*a - 26, a = -4*s - 14 for s.
-2
Solve 3*y = -5*i + 10, -16*y + 15*y + 3*i = 6 for y.
0
Solve 324*n - 329*n + 3*f - 13 = 0, -9 = n + f for n.
-5
Solve -44*t + 4*z = -45*t + 12, -2*z = 4*t + 8 for t.
-4
Solve -4*s + 3*y - 20 = 0, 15 = -2*s - 5*y + 31 for s.
-2
Solve 27 = 6*r - 11*r + 6*s, -r = 2*s - 1 for r.
-3
Solve 4*s - 31 = -5*z, -597*s + 3 = -594*s - 3*z for s.
4
Solve -11*c = -6*t - 27, -5946 = 2*c - 5952 for t.
1
Solve 0 = 5*h - c - 11, -4*h + 4*c = -2084 + 2088 for h.
3
Solve 8 = 5*f - 10*r + 6*r, 2*f - 5*r = 10 for f.
0
Solve -2*v - 3154*x = -3152*x + 6, 3*v - 23 = 5*x for v.
1
Solve 3*b - 2*k = -26, -3*b - 11 = -k - 4*k for b.
-12
Solve 17 = 5*c + 1297*y - 1300*y, 0 = -5*c + 4*y + 21 for c.
1
Solve 0 = -2*c + 26*w + 178, -3*c + 4*w = 6*w + 20 for c.
-2
Solve 0 = -2*q - w + 1, 38*w - 33*w = -25 for q.
3
Solve -23 + 20 = -h - 4*f, 4*f - 13 = h for h.
-5
Solve -46 = 25881*u - 25886*u - 2*o, 5*u = 3*o + 56 for u.
10
Solve i - 4*y + 24 = 0, -917*y + 916*y + 39 = -3*i for i.
-12
Solve 5*c - 2*u + 20 = 0, -4*u - 383 = -403 for c.
-2
Solve 150*g + 3 = 145*g - k, 0 = 5*g + 3*k + 9 for g.
0
Solve -3234*f + 3237*f - 33 = -3*r, -2*r + 169 = 23*f for f.
7
Solve -14 - 11 = 5*x, -40*n + 42*n + 3*x = -20 + 3 for n.
-1
Solve -5*u - 6*z = 218 - 126, -8 = 4*z for u.
-16
Solve 18*b = -4*n + 18, 3*n = -6*b + 13 - 7 for b.
1
Solve -5*k - 831*f + 835*f - 10 = 0, -3*k = -4*f + 6 for k.
-2
Solve 0 = x - 3*t + 874 - 884, 0 = 5*x - 3*t - 50 for x.
10
Solve -241*h + 252*h = -4*q - 128, 5*h + 3*q + 83 = 0 for h.
-4
Solve -4*h + 24*q - 8*q = 36, 9 = 5*h - 2*q for h.
3
Solve 2*j + 114 = -8*s, j - 3*j = s + 23 for s.
-13
Solve 5*i - 30 = 0, -109*w - 109*w + 215*w + 18 = 5*i for w.
-4
Solve -76*q + 75*q = -2*r - 5, 0 = -2*q + 3*r + 8 for q.
1
Solve -16*i = -15*i - 10, 4*f - 5*i + 42 = 0 for f.
2
Solve -4*h - 145 = -6*o - 189, 0 = -2*o - 8 for h.
5
Solve 0 = 2*i + 3*d - 90 + 86, -3*i = -4*d + 11 for i.
-1
Solve -v + 29 + 2 = 16*x, -5*x - 45 = 5*v - 50 for v.
-1
Solve -j - 91 = -23*f, 8*j + 4*f = 12*j + 12 for j.
1
Solve y + 3*l - 31 = 0, 0 = 3*y + 47*l - 50*l + 27 for y.
1
Solve -7 = -19361*c + 19365*c + w, c = 4*w - 6 for c.
-2
Solve -6 = -3*n - 3*r, 3*n + 2*n + 4*r = 13 for n.
5
Solve -q - 9 = -7*z, 4*q - 3*z = -48 + 62 for q.
5
Solve 40*k + 5*l + 10 = 35*k, 16 = -2*k + 4*l for k.
-4
Solve -105*d = 2*p - 108*d + 16, p - 5*d + 15 = 0 for p.
-5
Solve 5*p = -4*k - 22, 0 = k + 3*p - 94 + 103 for k.
-3
Solve -256*q + 252*q + 18*x = -92, -5*x = q + 15 for q.
5
Solve -2*f = 4*v, -59 = 4*f + 4*v - 79 for f.
10
Solve 5*t - 22 = 4*g, 180 = -g + 2*t + 173 for g.
-3
Solve -n = -2*v - 14, -63*v + 53*v = 2*n + 42 for n.
4
Solve 3*s - 237*y = -233*y - 32, -y = -s - 7 for s.
4
Solve -v - 13 = -3*d - 15, 5*v = -3*d - 8 for v.
-1
Solve 2*g - 91 = -2*r - 109, 3*g + 5*r = -35 for g.
-5
Solve 5*x = -b - 18 + 5, 5*b - 5*x - 25 = 0 for b.
2
Solve -x + 8 = -2*n + n, 13*x - 10 = -13*x + 16 for n.
-7
Solve q + 320 = 5*p + 305, 22 = -4*q + p for q.
-5
Solve 4*u = -7*b - 37, -6*b - 4*u = -9*b + 47 for b.
1
Solve 0 = 5*x + 40, 10*y + 38 = 9*y - 5*x for y.
2
Solve 33 = -5*q - 2*s, -3*q - 41 = -4*s - 42 for q.
-5
Solve -3*c + 5*a = 0, -3*c + 2*a = 4*a for c.
0
Solve -358*d = -12*v - 353*d - 3, 2*v - d + 1 = 0 for v.
1
Solve -25*k + 21*k + 8 = -2*t, 6 = -2*t + 3*k for t.
0
Solve -l + 4*b + 13 = 0, 4*l - 18 = 5*b - 3*b - 3*b for l.
5
Solve 4*v - 40 + 48 = -2*u, 4*u = -4*v - 8 for u.
0
Solve -5*o - 16 = 2*n, -11*n = 9*o - 10*n + 21 for o.
-2
Solve -2*s = -5*y - 12, 5*s + 24 = -236*y + 235*y for y.
-4
Solve -3*w - 30 = -3*d, -3*d - 320 = -9*w + 31*w for d.
-4
Solve 0 = -2*j + a + 9, 4*j - j - a - 11 = 0 for j.
2
Solve -5*y + 38 = -8*v + 6*v, 0 = -5*v + 2*y - 32 for v.
-4
Solve 26 = -4*w - 2*t, -2*t - 12 + 0 = 2*w for w.
-7
Solve -4*n - 5 = x, -11*n + 9*n + 5*x + 25 = 0 for n.
0
Solve 10*s - 3*w - 4 = 14*s, -24 = s - 5*w for s.
-4
Solve 2*b = 4*j - 16, 0 = 3144*j - 3145*j + 5*b + 13 for j.
3
Solve a - 583 = -5*i - 550, -19 = i - 3*a for i.
5
Solve 7*i = 5*s + 8 - 31, 5*s = |
CONDITIONS WE CAN HELP WITH...
Bloating
It is well recognised that a good diet is of little value unless the food that is eaten is absorbed properly. We are what we absorb rather than 'you are what you eat'. Poor digestion and absorption of food can lead to malnutrition and ill-health. There are many causes of malabsorption of food including: lack of acidity in the stomach, pancreatic and bile insufficiency, inflammation of the small intestine, bacterial infection of the bowel and diarrhoea. Symptoms that are associated with malabsorption may be: bloatedness, wind, burping, nausea, abdominal pain and abdominal spasms.
Your nutritional therapist can identify what may be causing your symptoms and adjust your diet accordingly so that your gastro-intestinal tract is running more efficiently and your body is getting the nutrients it needs in order to function well.Back
I have been consulting Nutrition Mission for a problem with an underactive thyroid and the advice and recommendations I have received have been excellent. Also Nutrition Mission's enthusiasm and positivity have had a good influence on me. |
Individual characterisation of the metastatic capacity of human breast carcinoma.
The clinical implications of understanding the invasive and metastatic proclivities of an individual patient's tumour are substantial because the choice of systemic therapy needs to be guided by the likelihood of occult metastasis as well as by knowing when the metastases will become overt. Malignant potential is dynamic, progressing throughout the natural history of a tumour. Required of tumours is the development of critical phenotypic attributes: growth, angiogenesis, invasion and metastagenicity. Characterisation of the extent of tumour progression with regard to these major tumour phenotypes should allow the fashioning of individual therapy for each patient. To examine the clinical parameters and molecularly characterise the metastatic proclivity we have been studying a series of regionally treated breast cancer patients who received no systemic therapy and have long follow-up. Clinically we describe two parameters: metastagenicity - the metastatic proclivity of a tumour, and virulence--the rate at which these metastases appear. Both attributes increase with tumour size and nodal involvement. However, within each clinical group there is a cured population, even in those with extensive nodal involvement, underscoring the heterogeneity of breast cancers within each group and the need for further molecular characterisation. Using biomarkers that characterise the malignant phenotype we have determined that there is progression in the phenotypic changes. Angiogenesis and loss of nm23 are earlier events than the loss of E-cadherin, or abnormalities in TP53. The strongest biomarkers of poor prognosis are p53 and E-cadherin, but even when both are abnormal 42% of node-negative patients are cured indicating that other determinative steps need to occur before successful metastases are established. Identification of these critical later events will further increase the efficacy of determining the malignant capacities of individual tumours. |
Évariste Galois, (born October 25, 1811, Bourg-la-Reine, near Paris, France—died May 31, 1832, Paris), French mathematician famous for his contributions to the part of higher algebra now known as group theory. His theory provided a solution to the long-standing question of determining when an algebraic equation can be solved by radicals (a solution containing square roots, cube roots, and so on but no trigonometry functions or other nonalgebraic functions).
Galois was the son of Nicolas-Gabriel Galois, an important citizen in the Paris suburb of Bourg-la-Reine. In 1815, during the Hundred Days regime that followed Napoleon’s escape from Elba, his father was elected mayor. Galois was educated at home until 1823, when he entered the Collège Royal de Louis-le-Grand. There his education languished at the hands of mediocre and uninspiring teachers. But his mathematical ability blossomed when he began to study the works of his countrymen Adrien-Marie Legendre on geometry and Joseph-Louis Lagrange on algebra.
Under the guidance of Louis Richard, one of his teachers at Louis-le-Grand, Galois’s further study of algebra led him to take up the question of the solution of algebraic equations. Mathematicians for a long time had used explicit formulas, involving only rational operations and extractions of roots, for the solution of equations up to degree four, but they had been defeated by equations of degree five and higher. In 1770 Lagrange took the novel but decisive step of treating the roots of an equation as objects in their own right and studying permutations (a change in an ordered arrangement) of them. In 1799 the Italian mathematician Paolo Ruffini attempted to prove the impossibility of solving the general quintic equation by radicals. Ruffini’s effort was not wholly successful, but in 1824 the Norwegian mathematician Niels Abel gave a correct proof.
Galois, stimulated by Lagrange’s ideas and initially unaware of Abel’s work, began searching for the necessary and sufficient conditions under which an algebraic equation of any degree can be solved by radicals. His method was to analyze the “admissible” permutations of the roots of the equation. His key discovery, brilliant and highly imaginative, was that solvability by radicals is possible if and only if the group of automorphisms (functions that take elements of a set to other elements of the set while preserving algebraic operations) is solvable, which means essentially that the group can be broken down into simple “prime-order” constituents that always have an easily understood structure. The term solvable is used because of this connection with solvability by radicals. Thus, Galois perceived that solving equations of the quintic and beyond required a wholly different kind of treatment than that required for quadratic, cubic, and quartic equations. Although Galois used the concept of group and other associated concepts, such as coset and subgroup, he did not actually define these concepts, and he did not construct a rigorous formal theory.
While still at Louis-le-Grand, Galois published one minor paper, but his life was soon overtaken by disappointment and tragedy. A memoir on the solvability of algebraic equations that he had submitted in 1829 to the French Academy of Sciences was lost by Augustin-Louis Cauchy. He failed in two attempts (1827 and 1829) to gain admission to the École Polytechnique, the leading school of French mathematics, his second attempt marred by a disastrous encounter with an oral examiner. Also in 1829 his father, after bitter clashes with conservative elements in his hometown, committed suicide. The same year, Galois enrolled as a student teacher in the less prestigious École Normale Supérieure and turned to political activism. Meanwhile he continued his research, and in the spring of 1830 he had three short articles published. At the same time, he rewrote the paper that had been lost and presented it again to the Academy—but for a second time the manuscript went astray. Jean-Baptiste-Joseph Fourier took it home but died a few weeks later, and the manuscript was never found.
The July Revolution of 1830 sent the last Bourbon monarch, Charles X, into exile. But republicans were deeply disappointed when yet another king, Louis-Philippe, ascended the throne—even though he was the “Citizen King” and wore the tricoloured flag of the French Revolution. When Galois wrote a vigorous article expressing pro-republican views, he was promptly expelled from the École Normale Supérieure. Subsequently, he was arrested twice for republican activities; he was acquitted the first time but spent six months in prison on the second charge. In 1831 he presented his memoir on the theory of equations for the third time to the Academy. This time it was returned but with a negative report. The judges, who included Siméon-Denis Poisson, did not understand what Galois had written and (incorrectly) believed that it contained a significant error. They had been quite unable to accept Galois’s original ideas and revolutionary mathematical methods.
The circumstances that led to Galois’s death in a duel in Paris are not altogether clear, but recent scholarship suggests that it was at his own insistence that the duel was staged and fought to look like a police ambush. In any case, anticipating his death the night before the duel, Galois hastily wrote a scientific last testament addressed to his friend Auguste Chevalier in which he summarized his work and included some new theorems and conjectures.
Galois’s manuscripts, with annotations by Joseph Liouville, were published in 1846 in the Journal de Mathématiques Pures et Appliquées. But it was not until 1870, with the publication of Camille Jordan’s Traité des Substitutions, that group theory became a fully established part of mathematics.
Britannica Web sites
(1811-32). The work of a French mathematician, the prodigy Evariste Galois, was important in the development of modern algebra. His vital contributions to group theory, a part of higher algebra, showed the impossibility of trisecting the angle and squaring the circle, and answered many other long-standing questions.
Article Contributors
Article History
Feedback
Corrections? Updates? Help us improve this article!Contact our editors with your feedback. |
---
abstract: |
We generalize the notion of spectral triple with reality structure to multitwisted real spectral triples, the class of which is closed under the tensor product composition. In particular, we introduce a multitwisted order one condition (characterizing the Dirac operators as an analogue of first-order differential operator). This provides a unified description of the known examples, which include conformally rescaled triples and (on the algebraic level) triples on quantum disc and on quantum cone, that satisfy twisted first order condition of [@BCDS16; @BDS19], as well as asymmetric tori, non-scalar conformal rescaling and noncommutative circle bundles. In order to deal with them we allow twists that do not implement automorphisms of the algebra of spectral triple.
[RÉSUMÉ.]{} Nous généralisons la notion de triple spectral avec structure de réalité à des triples spectraux réels ,,multitordus”, dont la classe est fermée sous la composition de produit tensoriel. En particulier, nous introduisons une condition d’ordre un miltitordu (caractérisant les opérateurs de Dirac en tant qu’analogue d’un opérateur différentiel de premier ordre). Ceci fournit une description unifiée des exemples connus, qui incluent des triplets rééchelonnés de manière conforme (et en niveau algébrique) triple sur disque quantique et sur cône quantique, qui répondent au premier ordre [@BCDS16; @BDS19], ainsi que les tores quantiques asymétriques, le rééchelonnément conforme non scalaire et la non-commutative espace fibré avec la fibre d’un cercle. Afin de les traiter, nous permettons les torsions qui ne mettent pas en oeuvre des automorphismes de l’algèbre du triple spectral.
address:
- 'SISSA (Scuola Internazionale Superiore di Studi Avanzati), Via Bonomea 265, 34136 Trieste, Italy'
- 'Institute of Physics, Jagiellonian University, prof. Stanisława Łojasiewicza 11, 30-348 Kraków, Poland.[and]{} Institute of Mathematics of the Polish Academy of Sciences, Śniadeckich 8, 00-950 Warszawa, Poland.'
author:
- 'Ludwik Dbrowski${}^\dagger$'
- 'Andrzej Sitarz${}^\ddagger$'
title: 'Multitwisted real spectral triples.'
---
[^1] [^2]
Introduction
============
Spectral triples were introduced [@CoBk94] as a setup to generalize differential geometry to noncommutative algebras that carries topological information and allows explicit analytic computations of index parings [@CoMo95]. The concept of [*real spectral triples*]{} [@Co95] was motivated by successful applications to the Standard Model of particle physics and also by the quest for the equivalence in the commutative case with the geometry of spin manifolds, culminating in the reconstruction theorem [@Co13]. The role of the real structure in noncommutative examples became evident in the relation between the classes of equivariant real spectral triples and the spin structures on noncommutative tori [@PaSi06].
While the theory of real spectral triples gained more and more examples [@CoLa01; @GGBISV; @DLSSV], some interesting noncommutative geometries did not fit into the original set of axioms for real spectral triples. Remarkable ones were the twisted (or modular) spectral triples on the curved noncommutative torus [@CoTr11], intensively studied afterwards. A scheme to incorporate the above conformally rescaled noncommutative geometries in the framework of usual spectral triples though with twisted reality structure, together with a generalized first order condition was proposed in [@BCDS16]. It was further studied in [@BDS19], where the relation between spectral triples with twisted real structure and real twisted spectral triples [@LaMa] was uncovered.
Yet even these generalizations do not embrace the recent examples of partially rescaled conformal torus [@DaSi15] and spectral triples over a circle bundle with the Dirac operator compatible with a given connection [@DaSi13]. Moreover, neither the class of spectral triples with a twisted first order condition nor the twisted spectral triples is closed under the tensor product composition of spectral triples. We propose here a further generalization, which complies with tensor products, allows for fluctuations and covers almost all known interesting examples.
Multitwisted real spectral triples
==================================
Consider a spectral triple $(A,H,D)$, where $A$ is a $*$-algebra identified with a subalgebra of bounded operators $B(H)$ on a Hilbert space $H$, and $D$ is a densely defined selfadjoint operator on $H$ such that $D$ has a compact resolvent and for each $a\!\in\!A$ the commutator $[D,a]$ is bounded. Let $J$ be an antilinear isometry on $H$, such that $J^2 = \pm 1$ and $$\label{0oc}
[a,J bJ^{-1} ] = 0,$$ in which case (with a slight abuse of terminology) we call $(A,H,D,J)$ a real spectral triple. If in addition there is a grading $\gamma$ of $H$, $\gamma^2=1$, such that $D\gamma=-\gamma D$ and $[\gamma,a]=0$ for all $a$ in $A$, we call $(A,H,D,J,\gamma)$ a real even spectral triple.
\[multi\] We say that $(A,H,D,J)$ is [*multitwisted real*]{} spectral triple if there are $N$ densely defined operators $D_\ell$, $\ell=1,\ldots,N$, with $ \sum_{\ell=1}^N D_\ell = D$ and for every $\ell$ there exists an operator $\nu_\ell \in B(H)$, with bounded inverse, such that for every $a,b \!\in\!A$ the [*multitwisted zero order condition*]{} holds $$\label{mutw0oc}
[a, J \bar{\nu}_\ell(b) J^{-1} ] = 0 = [a, J \bar{\nu}_\ell^{-1}(b) J^{-1} ],$$ where $\bar{\nu}_\ell:=Ad_{\nu_\ell} \in Aut(B(H))$. Additionally, if the spectral triple is even we assume $$\label{mutwgamma}
\gamma \nu_\ell^2 = \nu_\ell^2 \gamma, \quad \forall\,\ell .$$ We say that [*multitwisted first-order condition*]{} holds if $$\label{mutw1oc}
[D_\ell, a] J \bar{\nu}_\ell(b) J^{-1} = J \bar{\nu}_\ell^{-1}(b) J^{-1} [D_\ell, a],$$ and that [*multitwisted $\epsilon'$ condition*]{} holds if $$\label{mutwec}
D_\ell J \nu_\ell = \epsilon' \nu_\ell J D_\ell, \quad
{\rm where} \quad \epsilon' = \pm 1$$ and we call the multitwisted real spectral triple [*regular*]{} if $$\label{mutwregc}
\nu_\ell J \nu_\ell = J,$$ for each $\ell$. [$\diamond$]{}
We implicitly assume that the domain of the full Dirac operator $D$ is contained in the domains of all operators $D_\ell$ so the decomposition makes sense at least on this domain. However, in principle it is not required that individually each $D_\ell$ is selfadjoint with compact resolvent and each $[D_\ell,a]$ is bounded as in order to obtain a spectral triple only the sum $D$ of all $D_\ell$ is required to have these properties. $\diamond$
The notion of a spectral triple with a twisted real structure in [@BCDS16; @BDS19] fits this definition as a special case when $N\!=\!1$ and $\bar\nu_1$ is an automorphism of $A$, since then the multitwisted zero order condition is equivalent with , and the relation (\[mutw1oc\]), though it appears slightly different, is equivalent with the previous twisted order one condition by taking $b=\bar{\nu}(c)$. Definition \[multi\] is however slightly more general as we do not assume that $\bar{\nu_\ell}$ are automorphisms of the algebra $A$, and in order that the multitwisted first order condition be satisfied for all one forms, that is if $\omega_\ell = \sum_i a_i [D_\ell, b_i]$ then ${\omega_\ell J \bar{\nu}_\ell(b) J^{-1} = J \bar{\nu}_\ell^{-1}(b) J^{-1} \omega_\ell}$, we require that besides also ${[a, J \bar{\nu}_\ell(b) J^{-1} ]=0}$ holds. Furthermore, the consistency with the $A$-bimodule structure of 1-forms requires also that $[a, J \bar{\nu}_\ell^{-1}(b) J^{-1} ]=0$, however, thanks to the consistency under the adjoint operation in $A$, if $\nu_\ell^*\!=\!\nu_\ell$, it suffices to impose one of these two conditions. $\diamond$
Properties of multitwisted real spectral triples
------------------------------------------------
The important feature of the spectral triples which are multitwisted real is that they are closed under the product.
\[tensor\] Let $(A',H',D',J',\gamma')$ and $(A'',H'',D'',J'')$ be multitwisted real spectral triples (the first one even and satisfying $J'\gamma'=\gamma'J'$), with $D' =\sum_{j=1}^{N'} D_j'$ and $D'' = \sum_{k=1}^{N''} D_k''$, for the twists $\nu'_j\!\in\!B(H')$ and $\nu_k''\!\in\!B(H'')$, respectively. Then $${(A' \otimes A'', H' \otimes H'', D' \otimes \id + \gamma' \otimes D'', J' \otimes J'')}$$ is a multitwisted real spectral triple with the Dirac operator decomposing as a sum of $$D_\ell = \begin{cases} D'_\ell \otimes \id, & 1 \leq \ell \leq N' \\
\gamma' \otimes {D}_{\ell-N'}'', & N'+1 \leq \ell \leq N'+N''
\end{cases}$$ for the twists $$\nu_\ell =
\begin{cases} \nu'_\ell \otimes \id, & 1 \leq \ell \leq N' \\
\id \otimes \nu''_{\ell-N'}, & N'+1 \leq \ell \leq N'+N''.
\end{cases}$$ Furthermore, if both triples satisfy the multitwisted zero or first order conditions, and are regular then this holds for their tensor product.
Note that the resulting spectral triple is not even (as a product of an even and an odd triple). All other cases of the product of even and odd spectral triples can be also considered and we postpone the full discussion till future work.
In [@BCDS16] we have demonstrated that, with an appropriate definition of the fluctuated Dirac operator, a perturbation of $D$ by a one form and its appropriate image in the commutant of the algebra $A$ yields the Dirac operator with the same properties. This functorial property holds also in the multitwisted case.
Assume that $(A,H,D)$ and $J$ is a multitwisted real spectral triple with the operators $D=\sum_{\ell=1}^{N} D_\ell$ satisfying the twisted zero and first order condition , and let $\omega = \sum_i a_i [D,b_i]$ be a selfadjoint one-form. Then $(A,H,D_\omega)$, where $D_\omega=D+\omega$, together with $J$ is again a multitwisted real spectral triple satisfying the twisted zero and first order condition , with $D_\omega = \sum_{\ell=1}^{N} (D_\omega)_\ell$, where $(D_\omega)_\ell=D_\ell + \omega_\ell $ and $\omega_\ell = \sum_i a_i [D_\ell, b_i] $, and with the same twists. Moreover, if $(A,H,D)$ is regular then so is $(A,H,D_\omega)$.
Note that the above construction does not preserve the multitwisted $\epsilon'$-condition . To cure this problem, we modify the manner of fluctuations of $D$.
If $(A, H, D)$ and $J$ is a multitwisted real spectral triple satisfying , and $\omega$ is a one-form as in the proposition above, then with, $$(D_\omega)'_\ell = D_\ell + \omega_\ell
+ \epsilon' \nu_\ell J (\omega_\ell) J^{-1} \nu_\ell ,$$ $(A, H, D_\omega')$ and $J$, where $D_\omega' = \sum_{\ell=1}^N (D_\omega)'_\ell$, is a multitwisted spectral triple with the same twists, satisfying the conditions , and . Moreover, for each $a \!\in\!A,$ $$[(D_\omega)'_\ell ,a] = [(D_\omega)_\ell, a].$$
Observe that, in principle, the above fluctuation of the Dirac operator may be an unbounded operator unless we assume that the sum, $ \sum_{\ell=1}^N \nu_\ell J (\omega_\ell) J^{-1} \nu_\ell$ is bounded. To avoid problems with the other properties of the Dirac operator (like the compactness of the resolvent) we restrict possible fluctuations only to these which do not change these properties.
It is also worth noting that one can extend the possible fluctuations of the Dirac operator to the sums of partial fluctuations that is, fluctuating each of $D_\ell$ by $\omega_\ell$, which may differ each from other, provided that the resulting full Dirac operator $D_\omega'$ is a bounded perturbation of $D$.
The notion of a spectral triple with a twisted real structure in [@BCDS16; @BDS19] was largely motivated by spectral triples conformally rescaled by a positive element in $JAJ$. We have a generalization of this construction as follows.
\[multiconf\] Suppose $(A,H,D)$ and $J$ is a real spectral triple and $D= \sum_{\ell=1}^N D_\ell$ such that each $D_\ell$ satisfy the first order condition for every $\ell=1,\ldots N$. Let $k_\ell$ be positive elements from $A$ with bounded inverses. Then $(A,\tilde{D},J,H)$, where $$\tilde{D} := (D_1)_{k_1}+ \cdots + (D_N)_{k_N},$$ with $(D_\ell)_{k_\ell}= (Jk_\ell J^{-1}) D_\ell (Jk_\ell J^{-1})$ satisfies a multitwisted zero first order condition with $$\nu_\ell= k_\ell^{-1}\, Jk_\ell J^{-1},$$ and is regular .
Examples
========
Multiconformally rescaled spectral triples {#crst}
-------------------------------------------
A specific example of the above construction, motivated by the study of possible spectral triples over the noncommutative torus, which give rise to non-flat metric and non-vanishing curvature was given as the asymmetric torus in [@DaSi15]. Let $\partial_1$ and $\partial_2$ denote the operators that extend the standard derivations of $C^\infty(T^2_\theta)$ to $H= L^2(T^2_\theta)\otimes \mathbb{C}^2$ as selfadjoint (unbounded) operators and $J$ be usual antilinear isometry $J$. Then for any positive invertible $k_1,k_2 \in C^\infty(T^2_\theta)$, the Dirac operator $$\tilde{D} = Jk_1 J^{-1}\sigma^1 \partial_1 Jk_1 J^{-1} +
Jk_2 J^{-1}\sigma^2 \partial_2 Jk_2 J^{-1},$$ where $\sigma^1$ and $\sigma^2$ are the usual Pauli matrices, makes $(C^\infty(T^2_\theta), L^2(T^2_\theta)\otimes \mathbb{C}^2, \tilde{D}, J)$ a multitwisted real spectral triple satisfying by Proposition\[multiconf\] all conditions including , , . In [@DaSi15] we considered a particular case with $k_1\!=\!1$ (which is not a product spectral triple). A four-dimensional generalization (of product type) with two different scalings was studied in [@CoFa13].
Conformal rescaling without an automorphism
-------------------------------------------
Consider the following situation, which further generalizes the construction from the subsection \[crst\]. Let $(A,H,D,J)$ be a real spectral triple, which satisfies the usual first order condition and let $k\!\in\! Cl_D(A)$ be an invertible element with bounded inverse. Note that unlike in the case of conformal rescaling by an element from $A$, the automorphism of the algebra $B(H)$, $\bar{\nu}(x) = k^{-1} x k$, does not necessarily preserve the algebra $A$, so $k^{-1} a k \!\notin\! A$. Nevertheless, the following relation holds for $D_k = JkJ^{-1} D JkJ^{-1}$: $$[D_k,a] J \bar{\nu}(b) J^{-1} = J \bar{\nu}^{-1}(b)J^{-1} [D_k,a],$$ for any $a,b \!\in\!A$, which is precisely . It is easy to see that also the condition is satisfied.
Further generalization of the above situation to the case of multiconformal scaling provides new multitwisted real spectral triples. A geometric motivation comes from Dirac operators over noncommutative circle bundles [@DaSi03], instance of which is a three-dimensional noncommutative torus seen as the $U(1)$ bundle over the two-dimensional noncommutative torus. Namely, for the $U(1)$ action given as in [@DaSi03] a $U(1)$ connection over $C^\infty(\TT^3_\theta)$ is given by a one-form: $$\omega = \sigma^3 + \sigma^2 \omega_2 + \sigma^1 \omega_1,
\label{astco}$$ where $\omega_1,\omega_2 \in \TT^2_\theta$ are $U(1)$-invariant elements of the algebra $C^\infty(\TT^3_\theta)$.
For any selfadjoint connection $\omega$ (\[astco\]) there exists a compatible in the sense of [@DaSi03] Dirac operator over $A=C^\infty(\TT^3_\theta)$, which has the form $${\mathcal D}_{\omega} = \sigma^1 \partial_1 + \sigma^2 \partial_2 + J w J^{-1} \partial_3,$$ where $J$ is the usual real structure on $A$ and $$w = \sigma^3 - \sigma^1 \omega_1 - \sigma^2 \omega_2.$$ Although ${\mathcal D}_\omega$ does not satisfy a twisted first order condition, it can be decomposed as $D_{(2)} + D_w$, with $D_{(2)}= \sigma^1 \partial_1 + \sigma^2 \partial_2$ and $D_w=J w J^{-1} \partial_3$, so that for each $a,b \!\in\! A$, $$\begin{aligned}
&[D_{(2)},a] J b J^{-1} = J bJ^{-1} [D_{(2)},a], \\
&[D_w,a] J \bar{\nu} (b) J^{-1} = J \bar{\nu}^{-1}( b)J^{-1} [D_w,a],
\end{aligned}$$ where $\bar{\nu}(x) = w^{-\frac{1}{2}} x w^{\frac{1}{2}}$. Note that the condition is also satisfied since $w$ is in the completion of Clifford algebra and therefore $J\bar{\nu}(a)J^{-1}$ is in the commutant of $A$.
Conclusions and outlook
=======================
The proposed here new notion of multitwisted real spectral triples has a few major advantages. Firstly, it is consistent with the usual definition of [*spectral triples*]{} (unbounded Fredholm modules) thus, allowing to use the power of Connes-Moscovici local index theorem. Secondly it vastly extends the realm of examples, covering almost all known spectral triples, including those motivated by geometrical constructions, like conformal rescaling or noncommutative principle fibre bundles. Moreover, it is closed under the tensor product operation.
In particular, the multitwisted first order condition may provide a better understanding of the notion of first order differential operators in noncommutative geometry, which we hope will allow to finer apprehend the examples arising from the quantum groups and quantum homogeneous spaces as constituting noncommutative manifolds.
[99]{}
T. Brzeziński, N. Ciccoli, L. Dbrowski, A. Sitarz, [*Twisted reality condition for Dirac operators*]{}, Math. Phys. Anal. Geom. 19, no. 3, Art. 16, 11 pp. (2016).
T. Brzeziński, L. Dbrowski, A. Sitarz, [*On twisted reality conditions*]{}, Lett. Math. Phys (2019) 109: 643
A. Connes, *Noncommutative geometry.* Academic Press, Inc., San Diego, CA, 1994.
A. Connes, [*Noncommutative geometry and reality*]{}, J. Math. Phys. [36]{}, 6194–6231 (1995)
A. Connes, H. Moscovici, [*The local index formula in Noncommutative Geometry*]{}, GAFA 5, 174–243 (1995)
A. Connes, G. Landi, [*Noncommutative manifolds, the instanton algebra and isospectral deformations*]{}, Comm. Math. Phys. 221, 141–159 (2001)
A. Connes, H. Moscovici, “Type III and spectral triples”, in: [*Traces in number theory, geometry and quantum fields*]{}, Aspects Math.Friedt.Vieweg E 38, Wiesbaden Germany (2008), p.57
A. Connes, P. Tretkoff, [“The Gauss-Bonnet theorem for the noncommutative two torus”]{}, In: [*Noncomm.Geom,Arithmetic, and Related Topics*]{}, 141–158 J. Hopkins University Press (2011)
A. Connes, [*On the spectral characterization of manifolds"*]{}, J.Noncom. Geom., 1–82 (2013)
A. Connes, F. Fathizadeh, [*The term $a_4$ in the heat kernel expansion of noncommutative tori*]{}, arXiv:1611.09815
L. Dbrowski, A. Sitarz: [*Dirac operator on the standard Podleś quantum sphere*]{}, [Noncommutative geometry and quantum groups]{}, Banach Center Publ. [61]{}, pp. 49–58, Warsaw (2003)
L. Dbrowski, A. Sitarz, [*Noncommutative circle bundles and new Dirac operators*]{}, Comm. Math. Phys., 318, 111–130 (2013)
L. Dbrowski, A. Sitarz, [*Asymmetric noncommutative torus*]{}, SIGMA 11, 075–086 (2015)
L. Dbrowski, G. Landi, A. Sitarz, W. van Suijlekom, J.C. Varilly, [*The Dirac operator on $SU_q(2)$*]{}, Comm. Math. Phys.259, 729–759 (2005)
V. Gayral, J.M. Gracia-Bondía, B. Iochum, T. Schücker J.C. Várilly: [*Moyal planes are spectral triples*]{}, Comm. Math. Phys. [246]{}, 569–623 (2004)
G. Landi, P. Martinetti, [*On twisting real spectral triples by algebra automorphisms,*]{} arXiv:1601.00219
M. Paschke, A. Sitarz, [*On spin structures and Dirac operators on the noncommutative torus*]{}, Lett. Math. Phys 77, 317–327 (2006)
[^1]: ${}^\dagger$ [Partially supported]{} by H2020-MSCA-RISE-2015-691246-QUANTUM DYNAMICS
[^2]: ${}^\ddagger$ [Partially supported]{} by the Polish National Science Centre grant 2016/21/B/ST1/02438
|
emitters {
id: "emitter"
mode: PLAY_MODE_ONCE
duration: 0.5
space: EMISSION_SPACE_WORLD
position {
x: 0.0
y: 0.0
z: 0.0
}
rotation {
x: 0.0
y: 0.0
z: 0.0
w: 1.0
}
tile_source: "/shared/shrapnel.tilesource"
animation: "large"
material: "/builtins/materials/particlefx.material"
blend_mode: BLEND_MODE_ADD
particle_orientation: PARTICLE_ORIENTATION_INITIAL_DIRECTION
inherit_velocity: 0.0
max_particle_count: 40
type: EMITTER_TYPE_SPHERE
start_delay: 0.0
properties {
key: EMITTER_KEY_SPAWN_RATE
points {
x: 0.0
y: 4000.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_SIZE_X
points {
x: 0.0
y: 2.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_SIZE_Y
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_SIZE_Z
points {
x: 0.0
y: 0.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_LIFE_TIME
points {
x: 0.0
y: 2.0
t_x: 1.0
t_y: 0.0
}
spread: 0.5
}
properties {
key: EMITTER_KEY_PARTICLE_SPEED
points {
x: 0.0
y: 531.0
t_x: 1.0
t_y: 0.0
}
spread: 100.0
}
properties {
key: EMITTER_KEY_PARTICLE_SIZE
points {
x: 0.0
y: 20.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_RED
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_GREEN
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_BLUE
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_ALPHA
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_ROTATION
points {
x: 0.0
y: 0.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
particle_properties {
key: PARTICLE_KEY_SCALE
points {
x: 0.0
y: 0.7
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_RED
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_GREEN
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_BLUE
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_ALPHA
points {
x: 0.0
y: 0.96742266
t_x: 0.9855853
t_y: 0.16917957
}
points {
x: 0.36883628
y: 0.44181666
t_x: 0.3252373
t_y: -0.94563246
}
points {
x: 1.0
y: -0.022787122
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_ROTATION
points {
x: 0.0
y: 0.0
t_x: 1.0
t_y: 0.0
}
}
modifiers {
type: MODIFIER_TYPE_DRAG
use_direction: 0
position {
x: 1.926407
y: 0.0
z: 0.0
}
rotation {
x: 0.0
y: 0.0
z: 0.0
w: 1.0
}
properties {
key: MODIFIER_KEY_MAGNITUDE
points {
x: 0.0
y: 4.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
}
modifiers {
type: MODIFIER_TYPE_RADIAL
use_direction: 0
position {
x: 0.0
y: 0.0
z: 0.0
}
rotation {
x: 0.0
y: 0.0
z: 0.0
w: 1.0
}
properties {
key: MODIFIER_KEY_MAGNITUDE
points {
x: 0.0
y: 10000.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: MODIFIER_KEY_MAX_DISTANCE
points {
x: 0.0
y: 100.0
t_x: 1.0
t_y: 0.0
}
}
}
size_mode: SIZE_MODE_MANUAL
}
emitters {
id: "emitter"
mode: PLAY_MODE_ONCE
duration: 0.1
space: EMISSION_SPACE_WORLD
position {
x: 0.0
y: 0.0
z: 0.0
}
rotation {
x: 0.0
y: 0.0
z: 0.0
w: 1.0
}
tile_source: "/builtins/graphics/particle_blob.tilesource"
animation: "anim"
material: "/builtins/materials/particlefx.material"
blend_mode: BLEND_MODE_ADD
particle_orientation: PARTICLE_ORIENTATION_DEFAULT
inherit_velocity: 0.0
max_particle_count: 4
type: EMITTER_TYPE_SPHERE
start_delay: 0.0
properties {
key: EMITTER_KEY_SPAWN_RATE
points {
x: 0.0
y: 80.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_SIZE_X
points {
x: 0.0
y: 112.77144
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_SIZE_Y
points {
x: 0.0
y: 12.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_SIZE_Z
points {
x: 0.0
y: 0.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_LIFE_TIME
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_SPEED
points {
x: 0.0
y: 300.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_SIZE
points {
x: 0.0
y: 500.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_RED
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_GREEN
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_BLUE
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_ALPHA
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
properties {
key: EMITTER_KEY_PARTICLE_ROTATION
points {
x: 0.0
y: 0.0
t_x: 1.0
t_y: 0.0
}
spread: 0.0
}
particle_properties {
key: PARTICLE_KEY_SCALE
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_RED
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_GREEN
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_BLUE
points {
x: 0.0
y: 1.0
t_x: 1.0
t_y: 0.0
}
}
particle_properties {
key: PARTICLE_KEY_ALPHA
points {
x: 0.0
y: 0.0
t_x: 0.97729266
t_y: 0.21189404
}
points {
x: 0.5947955
y: 0.08570701
t_x: 0.93523186
t_y: -0.35403576
}
points {
x: 1.0
y: -0.020526249
t_x: 0.94810784
t_y: -0.31794894
}
}
particle_properties {
key: PARTICLE_KEY_ROTATION
points {
x: 0.0
y: 0.0
t_x: 1.0
t_y: 0.0
}
}
size_mode: SIZE_MODE_MANUAL
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.