text stringlengths 8 5.77M |
|---|
Role of actin polymerization in monocyte phagocytosis of yeast cells effect of cytochalasin B.
The role of the cortical actomyosin-like contractile system in monocyte phagocytosis was studied by means of inhibition with cytochalasin B. Monocyte phagocytosis of yeast cells was assayed with a fluorescence extinction technique of surface-located phagocytosis which distinguishes between adherence and ingestion phases of total phagocytosis. Cytochalasin B, 10 micrograms/ml, inhibited monocyte phagocytosis by 20-30%. The cytochalasin inhibition was significant and restricted to the ingestion phase. The finding supported the hypothesis that the contractile structures of the cell have a contributory role in IgG-mediated monocyte phagocytosis on a surface. It is suggested that the cytochalasin effect reflected the role of chemotaxis in monocyte phagocytosis assayed by the present technique. |
Now Just Fire Wayne Hagin Already and We'll Be All Set
Click to enlarge
For a time, life was Good. Or at least it seemed Good, because for the most part it looked Good. So even when fate threw various obstacles in our path — which, in retrospect, happened more often than not — at least the tableau unfolding before us was generally pleasing to the eye.
But then the Dark Plague began its devastating infestation. The first symptom was the appearance of blackened pustules on the chest. These soon spread to the extremities, and before long the malignancy had proliferated throughout the body. So began the dire times we have experienced, lo these past dozen years.
Despite our best efforts to fight the Dark Plague, it has proven to be a resilient enemy. And so even in those fleeting moments when life was Good, it usually did not look Good, and consequently it did not feel Good. Although there have always been those of us who refused to give up hope, deep down we wondered if we would ever live to see the day when the Dark Plague finally succumbed to the forces of Good.
My friends, that day is finally at hand.
Any way you slice it, the news coming out of Shea yesterday (which was 50 years to the day after they unveiled their first logo, incidentally) was a win-win. Or maybe a win-win-win-win-win-win. Here’s rundown of the developments, nearly all of them positive:
• The black drop shadow has been removed from the white, pinstriped, and gray jerseys. You can see high-res versions of those jerseys here, here, and here.
• The black/blue hybrid cap (which had been the official road cap but was also frequently worn at home) has been eliminated. The blue cap will now be worn with the white, pinstriped, and gray jerseys.
• The black undersleeves and socks, which were always worn on the road and sometimes at home, have been eliminated. The white, pinstriped, and gray jerseys will now be paired with blue accessories.
• The herringbone-patterned glacier twill lettering fabric has been eliminated. The new jerseys are using conventional tackle twill. (Here’s how it looks on the script.)
• Although all of these changes are being introduced to coincide with the team’s 50th anniversary, they are not one-year changes. I have confirmed through a team source that the plan is to retain all of the above-listed changes for the long term. I repeat: There are no plans to bring back any of the black elements.
• The team has a new anniversary logo, which is being worn as a sleeve patch on the jerseys. Interestingly, there’s a slight discrepancy between the logo and the patch: Note the color of the baseball stitching on the left side. The version on the left is how it’s shown in the style guide. Weird.
• The anniversary logo is also being worn as a rear cap patch. Can’t say I’m 100% in love with this, but it’s better than putting a patch on the side of the cap (I hate that look — always makes the cap feel unbalanced), and I think this execution is much better than the giant patch the Yankees used a few years ago.
Disappointments? I count three, all fairly minor: (1) The black alternate jersey and solid-black cap have not been eliminated — yet. They’ll be used sparingly on the road in 2012, and then scrapped altogether in 2013. (2) I was hoping they’d go back to a blue squatchee for 2012, but they’re sticking with orange. (3) I was also hoping they’d restore the little “NY” to the skyline logo, but no dice. In the grand scheme of things, however, I can live with all of these.
And there you have it. After a dozen years of campaigning for most of these moves, I don’t mind saying that the long-awaited ditching of the black — VB Day — tastes pretty sweet. Today my giant souvenir Mets cup is filled with champagne. (Actually, I don’t own a souvenir cup, and I don’t particularly like champagne. But you get the idea.)
My thanks to everyone else who’s helped with the cause over the years, especially Shannon Shark over at Mets Police (who, unlike me, has actually been diplomatic enough to break bread with some of the team’s front office types and, I’m fairly certain, has made them take this kind of stuff more seriously). Enjoy the moment, people — an all-too-rare triumph of Good over Stupid.
+ + + + +
Notre Dame auction update: The auction for the Notre Dame promo box is continuing. The high bid as of this morning was $4301, which means today’s minimum bid is $4401. If nobody bids today, the minimum bid will increase to $4501 tomorrow.
Full details on how to bid, and everything else regarding the auction, can be found here.
+ + + + +
Hahahahahahahahahahahaha: Here, see for yourself.
+ + + + +
Uni Watch News Ticker: New 35th-anniversary patch for the Mariners. … Blue Jays will unveil their new set on Friday. … Teeny-tiny cap logo adjustment for the Dodgers. … Small item on this page indicates that the Pirates will be wearing camouflage uniforms on Memorial Day weekend, and will also be giving away camo jerseys to kids, which seems like a truly repellant idea. … Speaking of camo, it’s bad enough that the Blue Jackets just became the latest team to pull the camo warm-up stunt. But Rick Nash broke new ground on the G.I. Joe front by using — get this — camouflage tape on his stick. Just give every player an M-16 and get it over with already (from Adam Sgriccia). ”¦ A Canadian minor league baseball team is drawing criticism because it’s named after Jack the Ripper. ”¦ Here’s another great taffy-pull jersey shot. It’s from the Clemson/FSU game a few years ago (big thanks to Chip Powell). ”¦ Tosh.0 star Daniel Tosh wore nine different Oregon outfits during last night’s show (screen shots by Matt Dubroff). ”¦ I was recently interviewed by a Nebraska football equipment blog. … Just what the world needs: the glove-palm salute as a T-shirt (from Kate Sutter). … The Sabres are running a promotion to let fans design Ryan Miller’s mask (from Tim Tryjankowski). … Renfrew Hockey Tape — the brand that’s “synonymous with tape for hockey players worldwide,” according to a press release — now has its own web site. … The NFL is launching a new monthly magazine. … Who are these guys? None other than (from left) weekend editor Phil Hecken, readers Conn Nugent and Chance Michaels, and yours truly. The four of us celebrated VB Day last night by meeting up at the Harvard Club for cocktails and then moseyed around the block to a Brazilian restaurant, which is where that photo was taken (yes, they serve more than water, although you wouldn’t know it from that photo). A splendid evening all around, and fine capper to a very, very good day. |
Transport Oxygen Concentrator Markets were at $135 million market in 2016. The worldwide aging population is driving an increased need for supplemental oxygen.
Transport Oxygen Concentrators are needed for night use by patients on portable oxygen concentrators during the day. People on oxygen wish to continue usual activities, the portable devices are useful for that during the day. Distributors are concentrated on determining which stationary oxygen concentrator supports patient lifestyle.
Transport Oxygen Concentrators and supplies are used for EWOT therapy. concentrators are operating in doctor’s offices, clinics, rehabilitation facilities, and by Individuals who want to experience the benefits of exercising with oxygen therapy. EWOT packages come complete with a 5 or 10 LPM oxygen concentrator.
The non – rebreather mask humidifier bottle and tubing provide access to oxygen. Transport oxygen concentrators support exercising. They increase a sense of wellbeing. Major factors driving the market for transport oxygen concentrators include ability to provide oxygen under all circumstances.
An increase in the number of people with COPD and other respiratory diseases represents the portion of the market that is dedicated to providing medical oxygen. Advantages of newer transport oxygen concentrator devices are that they weigh less, are somewhat quieter than older units, and are easy to use. They are generally affordable markets.
According to Susan Eustis, lead author of the team that wrote the study, “In order for the continuous flow transport oxygen concentrators to meet a wider range of oxygen demands, these machines are generally bigger than other portable units on the market. The typical weight of one of a continuous flow unit is 18 pounds up to 35 pounds, not including additional accessories. These are often just heavy enough that they require the use of a cart to transport the oxygen supply. While a continuous flow transport oxygen machine is portable, it is less portable than many of the pulse dose varieties available.”
Transport Oxygen Concentrator Market ForecastsTransport oxygen concentrator markets are set to become a $2.4 billion market in 2023 because they bring enormous value to people who use them while they are exercising and sleeping with a CPAP. Steady growth is anticipated because the transport units provide continuous oxygen flow capability.
About Us:Hexa Reports is a market research and consulting organization, offering industry reports, custom research and consulting services to a host of key industries across the globe. We offer comprehensive business intelligence in the form of industry reports which help our clients obtain clarity about their business environment and enable them to undertake strategic growth initiatives. |
Joe Rider and his wife Marian are canned peach connoisseurs.
They'll gladly tuck into a tin of the preserved fruit if it's from South Africa. But canned clingstones from China?
Forget it.
"We don't even eat peaches anymore from China because they're soft," Joe said recently over coffee and a donut at a Vineland rest stop. "They call them choice quality but really, they would be standard quality."
Standard — and, therefore, lesser — compared to a Canadian canned peach, that now extinct preserve that Joe knew so well from his 40 years working in canneries in Niagara, Exeter, Simcoe and Penticton.
Be it peaches or other fruit and veggies, Joe knows what goes in to putting up the season's bounty. He's also familiar with the story of an industry that ceased to exist on a large scale in Canada in 2008 when CanGro in St. Davids was shuttered. It was the last fruit cannery in the country and one that Joe oversaw in his career with Canadian Canners.
The 85-year-old, who know calls Brantford home, talks about how it once was when he managed workers and factories where produce grown by local farmers was processed in his autobiography The Way It Was: My Life Story Including a 40 Year Cannery Career.
When Joe started his career as assistant soup room foreman at Canadian Canners in Simcoe in 1951, there were 50 canneries in Canada, some of which he had to close. There were only five left when he retired in 1991.
The closures were a repetitive task that earned him the monikers Closin' Joe and Hatchet Man, neither of which he said he's overly fond.
"I was only the messenger," Joe said. "I liked the people (I worked with). They worked hard to make it a good operation and then it was gone. It bothered me they closed all the places I worked. They locked the door."
And today, save for a few small-batch, craft canners that have popped up in CanGro's wake, such as The Bumpercrop, there are no canneries left. That's why Joe gets his canned peach fix from South African imports, snubbing the Chinese editions, which is where CanGro, owner of the Del Monte and Aylmer labels, moved its operations.
Still, even though the 50 canneries that existed when Joe started his career may seem astronomical, the industry was already shrinking due to consolidation back then. Canadian Canners once had more than 150 plants to its name. At least eight of those were in Niagara, Joe said.
Consumer tastes changed and canned goods gave way to a hunger for more fresh food, which is one of the reason's for the industry's demise.
Despite the sadness he says he felt telling people they were out of work — sometimes seeing the same people lose their jobs more than once — Joe is pragmatic about the end of an industry that sustained him.
Joe's self-published look back is also one of the only historical accounts of the Canadian canning industry. He started writing his memoir after settling in Brantford in 2008 and, after getting feedback from friends and former colleagues, was encouraged to polish his words and add a few thousand more. He re-wrote the book five times by hand until he had a draft he was happy with — one that would let people know just how relevant Canadian Canners once was.
"People did not realize how big this company was," Joe said. "This was a national company with 150 canneries down to 50 down to none. It's really globalization at work and we got the worst of it.
Since releasing the book last summer at a launch at Ravine Vineyard, Joe has made the rounds on a speaking tour, visiting the towns where he once worked and sharing his story with former employees, farmers and most recently at the Vineland Research and Innovation Centre, a place that, at one time, devoted a lot of research to creating the perfect canning fruit varieties.
"It was all part of Canadian agriculture," Joe said.
Now, it's relegated to a history book telling the story of one man's life in the midst of it all.
"We provided not only a lot of employment, people paid their taxes," Joe said. "We provided a great boost to Canada and now it's gone." |
Primary cilia are small projections present on the surface of most vertebrate cell types. Defects in these structures have been associated with a growing list of disorders including Bardet-Biedl Syndrome, Polycystic Kidney Disease, and Nephronophthisis, among others. Though several developmental signaling pathways are known to be regulated by cilia, a clear understanding of the extent of their involvement in signal transduction remains elusive. Notch signaling, in particular, may be associated with cilia and may, therefore, underlie ciliopathy phenotypes. We hypothesize that defects in primary cilia result in perturbation of Notch signaling and that this regulation results in disruption of associated developmental processes. Specifically, we hypothesize that cilia-dependent defects in Notch underlie pancreatic defects and diabetes, which are prevalent in ciliopathy patients. Using a zebrafish model and in vitro systems, we propose to test this hypothesis by two specific aims. First, we will investigate the mechanistic link between disruption of ciliary function and perturbation of Notch signaling during development. We will then investigate a role for cilia in pancreatic development and function. The proposed research builds on Dr. Zaghloul's previous training in developmental genetics and ciliary biology. She will be guided by mentors with expertise in the areas of molecular mechanisms and genetics of diabetes, pancreatic development and function, and zebrafish development. The expertise gained as a result of this Career Development Award will poise Dr. Zaghloul to launch a fully independent career investigating cililary regulation of complex phenotypes. The research studies outlined here will establish a zebrafish model of ciliary dysfunction with a specific focus on pancreatic phenotypes. The overall proposal is strengthened by: 1) a specific focus on Notch signaling and an associated phenotype that has been largely unexplored in the context of cilia, and 2) a strong team of mentors with recognized expertise investigating these phenotypes. An improved understanding of the molecular mechanisms underlying these phenotypes may suggest common links between ciliopathies and common traits and provide new insights into the treatment of these conditions. |
2008–09 McGill Martlets women's ice hockey season
The McGill Martlets represented McGill University in the 2008-09 Canadian Interuniversity Sport women's hockey season. The Martlets posted an unblemished 33-0 record against CIS opponents to go undefeated for the second straight season en route to capturing another CIS banner. Catherine Ward, Chantal Gauvin and goaltender Kalie Townsend were the only graduating players from the Martlets.
Exhibition
Alberta Panda Presence Pre-season Tournament
(3 games @ Edmonton)
NCAA Exhibition
Regular season
Roster
{|class="wikitable" width="80%"
|- align="center" style="background:#A50024;color:white;"
| Number || Name || Position || Height|| Year
|- align="center" bgcolor=""
|24 ||Ann-Sophie Bettez||Forward ||5'4" ||2
|- align="center" bgcolor=""
|09 ||Julie Casavecchia||Forward ||5'7" ||2
|- align="center" bgcolor=""
|14 ||Alyssa Cecere||Forward ||5'7" ||3
|- align="center" bgcolor=""
|08 ||Cathy Chartrand||Defence ||5'10" ||2
|- align="center" bgcolor=""
|25 ||Vanessa Davidson||Forward ||5'8" ||4
|- align="center" bgcolor=""
|19 ||Chantal Gauvin||Defence ||5'8" T||5
|- align="center" bgcolor=""
|06 ||Caroline Hill||Forward ||5'5" ||3
|- align="center" bgcolor=""
|22 ||Marie-Andree Leclerc-Auger||Forward ||5'5 ||1*
|- align="center" bgcolor=""
|07 ||Alessandra Lind-Kenny||Forward ||5'6" ||2
|- align="center" bgcolor=""
|11 ||Rebecca Martindale||Forward ||5'5" ||4
|- align="center" bgcolor=""
|10 ||Jordanna Peroff||Forward ||5'6" ||2
|- align="center" bgcolor=""
|16 ||Shaunn Rabinovich||Defence ||5'9 ||1*
|- align="center" bgcolor=""
|18 ||Jasmine Sheehan||Defence ||5'5" ||3
|- align="center" bgcolor=""
|20 ||Lainie Smith||Forward ||5'6 ||1*
|- align="center" bgcolor=""
|30 ||Gabrielle Smith||Goal ||5'8" ||4
|- align="center" bgcolor=""
|21 ||Amy Soberano||Forward ||5'4" ||3
|- align="center" bgcolor=""
|02 ||Stacie Tardif||Defence ||5'5" ||1*
|- align="center" bgcolor=""
|29 ||Kalie Townsend||Goal ||5'10" ||5
|- align="center" bgcolor=""
|17 ||Catherine Ward||Defence ||5'6" ||3
|- align="center" bgcolor=""
|23 ||Victoria Wells||Forward ||5'7" ||2
|- align="center" bgcolor=""
|13 ||Alexandra Wells||Forward ||5'7" ||2
|- align="center" bgcolor=""
|15 ||Lisa Zane||Defence ||5'4" ||3
|- align="center" bgcolor=""
|}
Schedule
The Martlets participated in the Theresa Humes Tournament at Concordia University from January 2–4.
Player stats
Rebecca Martindale, a 21-year-old education senior, posted a career-best 18 goals, 16 assists (34 points) in 42 games. Martindale doubled her points output from the previous season (42 games, 8 goals, 12 assists, 20 points). Chantal Gauvin, scored once and added 13 assists. She finished her McGill career with 7 goals, 29 assists and 36 points in 143 career contests.
Postseason
QSSF Tournament
Semifinals
Finals (for Ed Enos Trophy)
CIS Tournament
Awards and honors
Ann-Sophie Bettez, Athlete of the Week: Jan 6, 08
Ann-Sophie Bettez, Athlete of the Week: Mar 2, 08
Ann-Sophie Bettez, Athlete of the Week: Oct 19, 08
Ann-Sophie Bettez, Athlete of the Week: Nov 9, 08
Ann-Sophie Bettez, Athlete of the Week: Nov 16, 08
Ann-Sophie Bettez, Athlete of the Week: Jan 11, 09
Cathy Chartrand, Athlete of the Week: Dec 29, 08 – Jan 04, 09
Vanessa Davidson, Athlete of the Week: Mar 02, 09 – Mar 08, 09
Marie-Andree Leclerc-Auger, Athlete of the Week: Feb 16, 09 – Feb 22, 09
Marie-Andree Leclerc-Auger, CIS Rookie of the YearLeclerc-Auger became the third member of the Martlets in three years to be named as the top rookie in CIS women's hockey. This marked the first time in CIS history that players from the same school in a team sport were honoured as the nation's best freshman for three consecutive years. Catherine Ward and Ann-Sophie Bettez received the award in 2006-07 and 2007-08.''
Charline Labonté, nominee BLG Award (honouring the top CIS female and male athletes for the 2008-09 season)
Jordana Perroff, Athlete of the Week: Feb 09, 09 – Feb 15, 09
Catherine Ward, Athlete of the Week: Sep 29, 08 – Oct 05, 08
Team awards
Goaltender Charline Labonté and forward Ann-Sophie Bettez of Sept-Iles, Que., shared the honor as co-MVPs of the McGill women's hockey team
Chantal Gauvin, Most dedicated player honours.
Marie-Andrée Leclerc-Auger, earned Martlets rookie-of-the-year honours
Marie-Andrée Leclerc-Auger, Martlets top sniper.
Rebecca Martindale, Most improved player
Catherine Ward, Most outstanding defenceman award.
Catherine Ward won silver with Canada Under 22 team at the 2009 MLP Nations Cup in Germany
All-Canadian honors
Goaltender - Charline Labonté, First Team
Defence - Catherine Ward, First Team
Forward - Ann-Sophie Bettez, First Team
Defence - Cathy Chartrand, Second Team
Forward - Vanessa Davidson, Second Team
Forward - Marie-Andrée Leclerc-Auger, All-Rookie Team
References
External links
McGill women’s hockey
The official site of McGill athletics & recreation
The official site of CIS Women's Hockey Championship
See also
McGill Martlets ice hockey
2011–12 McGill Martlets women's ice hockey season
2010–11 McGill Martlets women's hockey season
2009–10 McGill Martlets women's hockey season
McGill
Category:McGill Martlets women's ice hockey
Mc |
---
abstract: 'We consider a 1-parameter family of self-adjoint extensions of the Hamiltonian for a particle confined to a finite interval with perfectly reflecting boundary conditions. In some cases, one obtains negative energy states which seems to violate the Heisenberg uncertainty relation. We use this as a motivation to derive a generalized uncertainty relation valid for an arbitrarily shaped quantum dot with general perfectly reflecting walls in $d$ dimensions. In addition, a general uncertainty relation for non-Hermitean operators is derived and applied to the non-Hermitean momentum operator in a quantum dot. We also consider minimal uncertainty wave packets in this situation, and we prove that the spectrum depends monotonically on the self-adjoint extension parameter. In addition, we construct the most general boundary conditions for semiconductor heterostructures such as quantum dots, quantum wires, and quantum wells, which are characterized by a 4-parameter family of self-adjoint extensions. Finally, we consider perfectly reflecting boundary conditions for relativistic fermions confined to a finite volume or localized on a domain wall, which are characterized by a 1-parameter family of self-adjoint extensions in the $(1+1)$-d and $(2+1)$-d cases, and by a 4-parameter family in the $(3+1)$-d and $(4+1)$-d cases.'
author:
- |
M. H. Al-Hashimi and U.-J. Wiese\
\
Albert Einstein Center for Fundamental Physics\
Institute for Theoretical Physics, Bern University\
Sidlerstrasse 5, CH-3012 Bern, Switzerland\
\
title: |
From a Particle in a Box to the\
Uncertainty Relation in a Quantum Dot\
and to Reflecting Walls for Relativistic Fermions
---
Introduction
============
The subtle differences between Hermiticity and self-adjointness of quantum mechanical operators, which were first understood by von Neumann [@Neu32], are rarely emphasized in quantum mechanics textbooks. This already affects the elementary textbook problem of a particle in a box [@Bon01]. Almost exclusively, the students are taught to set the wave function to zero at the boundary, in order to ensure its continuity. However, it is sufficient to guarantee that no probability leaks outside the box, i.e. that the probability current (but not necessarily the wave function itself) vanishes at the boundary. The resulting most general perfectly reflecting boundary condition contains a real-valued parameter that characterizes a family of self-adjoint extensions of the quantum mechanical Hamiltonian. In general, the wave function then does not go to zero at the boundary, and consequently the probability density to find the particle directly at the wall does not vanish. This is consistent with classical intuition of a ball bouncing off a perfectly reflecting wall.
While the self-adjoint extensions of the Hamiltonian are certainly known to the experts, in the beginning of this paper we introduce them in a pedagogical manner, since they, unfortunately, seem not to constitute common knowledge in quantum mechanics. When re-doing the standard textbook problem of a particle in a box, we will find states of negative energy for a particle with only kinetic energy. Such states seem to violate the Heisenberg uncertainty relation. In order to clarify this issue we then derive a generalized uncertainty relation valid for a particle confined to an arbitrarily shaped region with general perfectly reflecting walls in $d$ dimensions. This situation is relevant in the context of quantum dots. The most general perfectly reflecting boundary condition ensures that the component of the current normal to the reflecting surface must vanish. Again there is a 1-parameter family of self-adjoint extensions. The real-valued parameter that characterizes the boundary condition is a material-specific constant whose value could be determined experimentally for actual quantum dots. In particular, this parameter enters the generalized uncertainty relation. We also consider minimal uncertainty wave packets in a general quantum dot. Interestingly, when the self-adjoint extension parameter vanishes, a constant wave function of zero energy has $\Delta p = 0$ and saturates the generalized uncertainty relation. While the purpose of our paper is to some extent pedagogical, to the best of our knowledge the generalized uncertainty relation for quantum dots has not been derived before. Perfectly reflecting boundary conditions for relativistic fermions have been investigated in the context of the MIT bag model [@Cho74; @Cho74a; @Has78]. Here we construct the most general boundary condition for relativistic Dirac fermions, which is characterized by a 1-parameter family of self-adjoint extensions in the $(1+1)$-d case, and by a 4-parameter family in the $(3+1)$-d case. Finally, we extend the discussion to domain wall fermions in $(2+1)$-d and $(4+1)$-d space-times.
The paper is organized as follows. In section 2 we discuss a particle confined to a finite interval with general perfectly reflecting boundary conditions, and we derive the corresponding generalized uncertainty relation. In section 3 this relation is extended to an arbitrarily shaped quantum dot with perfectly reflecting walls in $d$ dimensions. We also derive a general uncertainty relation for non-Hermitean operators and apply it to the non-Hermitean momentum operator. In addition, we construct the corresponding most general minimal uncertainty wave packet, and we prove that the spectrum varies monotonically with the self-adjoint extension parameter. We also construct the most general boundary conditions for semiconductor heterostructures. In section 4, we extend the discussion to relativistic Dirac fermions in $(1+1)$-d and $(3+1)$-d, and in section 5 to domain wall fermions in $(2+1)$-d and $(4+1)$-d space-times. Finally, section 6 contains our conclusions.
Particle in a 1-d Box with General Perfectly Reflecting Walls
=============================================================
Let us consider a particle of mass $m$ moving in the 1-d interval $\Omega = [-L/2,L/2]$. This problem has been discussed in the context of self-adjoint extensions in [@Bon01]. Other examples of quantum mechanical problems involving the theory of self-adjoint extensions are discussed, for example, in [@Ara04]. We use natural units in which $\hbar = 1$. For simplicity, we restrict the Hamiltonian to the kinetic energy operator $$H = \frac{p^2}{2 m} = - \frac{1}{2 m} {\partial}_x^2.$$ The wave function $\Psi(x,t)$ gives rise to the probability current density $$\label{current}
j(x,t) = \frac{1}{2 m i} [\Psi(x,t)^* {\partial}_x \Psi(x,t) -
{\partial}_x \Psi(x,t)^* \Psi(x,t)],$$ which together with the probability density $\rho(x,t) = |\Psi(x,t)|^2$ obeys the continuity equation $${\partial}_t \rho(x,t) + {\partial}_x j(x,t) = 0.$$ In the following discussion, we can ignore the time-dependence of the wave function and simplify the notation to $\Psi(x)$.
Spatial Boundary Conditions
---------------------------
In order to guarantee probability conservation, one must demand that the probability current vanishes at the boundary, i.e.$$j(L/2) = j(-L/2) = 0.$$ The most general local boundary condition that implies this takes the form $$\gamma(x) \Psi(x) + {\partial}_x \Psi(x) = 0, \quad x = \pm L/2.$$ Indeed, one then obtains $$j(x) = \frac{1}{2 m i} [- \Psi(x)^* \gamma(x) \Psi(x) +
\gamma(x)^* \Psi(x)^* \Psi(x)] = 0 \ \Rightarrow \ \gamma(x) \in {{\mathbb{R}}}, \quad
x = \pm L/2.$$ The two real-valued parameters $\gamma(L/2)$ and $\gamma(-L/2)$ characterize a 1-parameter family of self-adjoint extensions of the Hamiltonian at each of the two ends of the interval $\Omega$. In order not to break parity via the boundary conditions, we restrict ourselves to $$\gamma(L/2) = - \gamma(-L/2) = \gamma \in {{\mathbb{R}}},$$ such that $$\label{bc}
\gamma \Psi(L/2) + {\partial}_x \Psi(L/2) = 0, \quad
- \gamma \Psi(-L/2) + {\partial}_x \Psi(-L/2) = 0.$$
Self-Adjointness of the Hamiltonian
-----------------------------------
In order to investigate whether the Hamiltonian is indeed self-adjoint when the wave functions obey the boundary conditions eq.(\[bc\]), we now consider $$\begin{aligned}
\langle\chi|H|\Psi\rangle&=&
- \frac{1}{2 m} \int_{-L/2}^{L/2} dx \ \chi(x)^* {\partial}_x^2 \Psi(x) \nonumber \\
&=&\frac{1}{2 m} \int_{-L/2}^{L/2} dx \ {\partial}_x \chi(x)^* {\partial}_x \Psi(x) -
\frac{1}{2 m} \left[\chi(x)^* {\partial}_x \Psi(x)\right]_{-L/2}^{L/2} \nonumber \\
&=&- \frac{1}{2 m} \int_{-L/2}^{L/2} dx \ {\partial}_x^2 \chi(x)^* \Psi(x) +
\frac{1}{2 m}
\left[{\partial}_x \chi(x)^* \Psi(x) - \chi(x)^* {\partial}_x \Psi(x)\right]_{-L/2}^{L/2}
\nonumber \\
&=&\langle\Psi|H|\chi\rangle^* + \frac{1}{2 m}
\left[{\partial}_x \chi(x)^* \Psi(x) - \chi(x)^* {\partial}_x \Psi(x)\right]_{-L/2}^{L/2}.\end{aligned}$$ The Hamiltonian is Hermitean (or symmetric in mathematical parlance) if $$\langle\chi|H|\Psi\rangle = \langle H^\dagger \chi|\Psi\rangle =
\langle H \chi|\Psi\rangle = \langle\Psi|H|\chi\rangle^*,$$ which is indeed the case if $$\label{symmetricH}
\left[{\partial}_x \chi(x)^* \Psi(x) - \chi(x)^* {\partial}_x \Psi(x)\right]_{-L/2}^{L/2} = 0.$$ The domain $D(H)$ of the Hamiltonian contains the at least twice-differentiable square-integrable wave functions $\Psi(x)$ that obey the boundary condition eq.(\[bc\]). Using that condition, eq.(\[symmetricH\]) reduces to $$\Psi(L/2) \left[{\partial}_x \chi(L/2)^* + \gamma \chi(L/2)^*\right] -
\Psi(-L/2) \left[{\partial}_x \chi(- L/2)^* - \gamma \chi(-L/2)^*\right] = 0.$$ Since $\Psi(L/2)$ and $\Psi(-L/2)$ can take arbitrary values, the Hamiltonian is Hermitean if $$\gamma \chi(L/2) + {\partial}_x \chi(L/2) = 0, \quad
- \gamma \chi(-L/2) + {\partial}_x \chi(-L/2) = 0,$$ i.e. if the wave function $\chi(x)$ also obeys the boundary condition eq.(\[bc\]). Imposing this boundary condition also on $\chi(x)$ implies that the domain of $H^\dagger$ coincides with the domain of $H$, $D(H^\dagger) = D(H)$. Since $H$ is indeed Hermitean when both $\Psi(x)$ and $\chi(x)$ obey eq.(\[bc\]), and since, in addition, $D(H^\dagger) = D(H)$, the Hamiltonian is, in fact, self-adjoint.
It should be noted that there is even a 4-parameter family of self-adjoint extensions of $H$ [@Car90]. Here we have encountered only two parameters, $\gamma(L/2)$ and $\gamma(-L/2)$, which we have reduced to one parameter $\gamma$ by demanding parity symmetry. The other two parameters of the 4-parameter family of self-adjoint extensions relate the values of the wave function and its derivative at $x = L/2$ to the corresponding values at $x = - L/2$. Such a boundary condition violates locality and is thus not physically meaningful in the present context.
Non-Hermiticity of the Momentum Operator
----------------------------------------
In order to investigate whether the momentum operator $p = - i {\partial}_x$ is self-adjoint or at least Hermitean, let us also consider $$\begin{aligned}
\langle\chi|p|\Psi\rangle&=&- i \int_{-L/2}^{L/2} dx \ \chi(x)^* {\partial}_x \Psi(x)
\nonumber \\
&=&i \int_{-L/2}^{L/2} dx \ {\partial}_x \chi(x)^* \Psi(x) -
i \left[\chi(x)^* \Psi(x)\right]_{-L/2}^{L/2} \nonumber \\
&=&\langle\Psi|p|\chi\rangle^* - i \left[\chi(x)^* \Psi(x)\right]_{-L/2}^{L/2}.\end{aligned}$$ Hence, $p$ would be Hermitean only if $$\label{symmetricp}
\chi(L/2)^* \Psi(L/2) = \chi(-L/2)^* \Psi(-L/2).$$ There is no reason why this should be the case when $\Psi(x)$ and $\chi(x)$ obey the boundary condition eq.(\[bc\]). Hence, in the domain $D(H)$ of the Hamiltonian, the momentum operator $p$ is not even Hermitean, and thus certainly not self-adjoint.
The only self-adjoint extension of the momentum operator on a finite interval results from the boundary condition $$\label{bcpsi}
\Psi(L/2) = \lambda \Psi(-L/2), \quad \lambda \in {{\mathbb{C}}}.$$ Inserting this relation in eq.(\[symmetricp\]), we obtain $$\label{bcphi}
\chi(L/2)^* \lambda \Psi(-L/2) = \chi(-L/2)^* \Psi(-L/2) \ \Rightarrow \
\chi(L/2) = \frac{1}{\lambda^*} \chi(-L/2).$$ If $\Psi(x)$ obeys eq.(\[bcpsi\]) and $\chi(x)$ obeys eq.(\[bcphi\]) the operator $p$ is Hermitean (i.e. symmetric). The domain $D(p)$ contains those at least once-differentiable square-integrable wave functions $\Psi(x)$ that obey eq.(\[bcpsi\]). The domain $D(p^\dagger)$, on the other hand, contains the corresponding wave functions $\chi(x)$ that obey eq.(\[bcphi\]). The operator $p$ is self-adjoint only if $D(p) = D(p^\dagger)$ which implies $$\begin{aligned}
\label{bcp}
&&\lambda = \frac{1}{\lambda^*} \ \Rightarrow \ \lambda = \exp(i \theta) \
\Rightarrow
\nonumber \\
&&\Psi(L/2) = \exp(i \theta) \Psi(-L/2), \quad
\chi(L/2) = \exp(i \theta) \chi(-L/2).\end{aligned}$$ Hence, the momentum operator is self-adjoint only if the probability density is a periodic function, i.e. $\rho(L/2) = |\Psi(L/2)|^2 = |\Psi(-L/2)|^2 =
\rho(-L/2)$. Since non-local periodic boundary conditions make no physical sense in the present context, and since the wave functions in the domain of the self-adjoint Hamiltonian obey the boundary condition eq.(\[bc\]), but not eq.(\[bcp\]), in this case the momentum operator is neither Hermitean nor self-adjoint. Hence, we must conclude that, in the present context, momentum is not a physical observable. This indeed makes sense for a particle that is confined to a finite region of space. After all, a momentum measurement would put the particle in a momentum eigenstate, which also exists outside the box and would therefore require infinite energy. An alternative point of view is taken in [@Gar04; @Dia07] where the infinite potential in the energetically forbidden region is approached as a limit of a large but finite potential.
Energy Spectrum and Energy Eigenstates
--------------------------------------
Let us now consider the energy eigenstates and the corresponding energy eigenvalues for the particle in a box with general reflecting boundary conditions parameterized by $\gamma$. First, we consider positive energy states of even parity, i.e.$$\Psi_n(x) = A \cos(k_n x), \ E_n = \frac{k_n^2}{2 m}, \ n = 0,2,4,\dots,\infty.$$ The boundary condition eq.(\[bc\]) then implies $$\gamma \cos(k_n L/2) - k_n \sin(k_n L/2) = 0 \ \Rightarrow \
\frac{\gamma}{k_n} = \tan(k_n L/2).$$ Interestingly, for $\gamma = 0$ there is a zero-energy solution with $k_n = 0$ and a constant wave function $\Psi_0(x) = \sqrt{1/L}$.
Similarly, the positive energy states of odd parity take the form $$\Psi_n(x) = A \sin(k_n x), \ E_n = \frac{k_n^2}{2 m}, \ n = 1,3,5,\dots,\infty,$$ and must obey $$\gamma \sin(k_n L/2) + k_n \cos(k_n L/2) = 0 \ \Rightarrow \
\frac{\gamma}{k_n} = - \cot(k_n L/2).$$ In this case, a zero-energy solution exists for $\gamma = - 2/L$ with the wave function $\Psi_1(x) = \sqrt{12/L^3} \ x$. While this solution emerges from $\Psi_1(x) = A \sin(k_1 x)$ in the limit $\gamma \rightarrow - 2/L$, it also follows directly from the zero-energy Schrödinger equation ${\partial}_x^2 \Psi(x) = 0$, and the boundary condition $(- 2/L) \Psi(L/2) + {\partial}_x \Psi(L/2) = 0$.
Next, let us consider eigenstates of negative energy and even parity. In that case, the wave function takes the form $$\Psi_0(x) = A \cosh(\varkappa x), \ E_0 = - \frac{\varkappa^2}{2 m},$$ and must obey $$\gamma \cosh(\varkappa L/2) + \varkappa \sinh(\varkappa L/2) = 0 \ \Rightarrow \
\frac{\gamma}{\varkappa} = - \tanh(\varkappa L/2).$$ Again, for $\gamma = 0$ one recovers the zero-energy state $\Psi_0(x) = \sqrt{1/L}$.
Finally, we consider the negative energy eigenstates with odd parity, i.e. $$\Psi_1(x) = A \sinh(\varkappa x), \ E_1 = - \frac{\varkappa^2}{2 m},$$ which must obey $$\gamma \sinh(\varkappa L/2) + \varkappa \cosh(\varkappa L/2) = 0 \ \Rightarrow \
\frac{\gamma}{\varkappa} = - \coth(\varkappa L/2).$$ In this case, for $\gamma = - 2/L$ we recover the zero-energy eigenstate $\Psi_1(x) = \sqrt{12/L^3} \ x$.
The spectrum as a function of $\gamma$ as well as the corresponding wave functions are illustrated in figure 1. For $\gamma = \infty$, we recover the standard textbook case with $\Psi(L/2) = \Psi(-L/2) = 0$. In that case, the energy spectrum takes the familiar form $$E_n(\gamma \rightarrow \infty) = \frac{\pi^2 (n + 1)^2}{2 m L^2}, \quad
n = 0,1,2,\dots,\infty.$$ As $\gamma$ decreases to zero, the energy eigenvalues decrease such that $$E_n(\gamma = 0) = \frac{\pi^2 n^2}{2 m L^2}, \quad n = 0,1,2,\dots,\infty.$$ For $- 2/L < \gamma < 0$ there is one negative energy state, and for $\gamma < - 2/L$ there are even two negative energy states, which reach negative infinite energies in the limit $\gamma \rightarrow - \infty$, i.e. $$E_{0,1}(\gamma \rightarrow - \infty) \rightarrow - \frac{\gamma^2}{2 m}
\rightarrow - \infty.$$ In the limit $\gamma \rightarrow - \infty$, the wave functions of the negative energy states reduce to $\delta$-function-like structures localized at the boundaries. The rest of the spectrum is exactly as in the standard textbook case (i.e. $\gamma = \infty$), namely $$E_n(\gamma \rightarrow - \infty) = \frac{\pi^2 (n-1)^2}{2 m L^2}, \quad
n = 2,3,4,\dots,\infty.$$
-1.5cm\
0.5cm
The existence of negative energy states is somewhat counter-intuitive. In particular, since the boundary conditions are perfectly reflecting, one may expect that the particle cannot bind to the wall. However, quantum mechanics does indeed allow the existence of walls which are perfectly reflecting for positive energy states and, at the same time, “sticky” for negative energy states. Since negative energy states have $E = \langle p^2/2 m\rangle < 0$, they seem to violate the Heisenberg uncertainty relation $\Delta x \Delta p \geq \frac{1}{2}$. Obviously, any state confined to the box has $\Delta x \leq L/2$. Hence, the Heisenberg uncertainty relation seems to suggest that $\Delta p \geq 1/L$, which would be in conflict with $\langle p^2 \rangle < 0$. To resolve this puzzle, one must realize that the Heisenberg uncertainty relation was derived for an infinite volume, and thus needs to be reconsidered in a finite box with perfectly reflecting boundary conditions.
Uncertainty Relation for a 1-d Box with Perfectly Reflecting Boundary Conditions
--------------------------------------------------------------------------------
Let us derive a variant of the Heisenberg uncertainty relation, taking into account the boundary condition eq.(\[bc\]). We follow the standard procedure by constructing the non-negative integral $$I = \int_{-L/2}^{L/2} dx \ |{\partial}_x \Psi(x) + \alpha x \Psi(x) + \beta \Psi(x)|^2
\geq 0.$$ Here $\alpha \in {{\mathbb{R}}}$ and $\beta = \beta_r + i \beta_i \in {{\mathbb{C}}}$ are parameters to be varied in order to minimize $I$ and thus derive the most stringent inequality. Using partial integration as well as the boundary condition eq.(\[bc\]), it is straightforward to obtain $$\label{I}
I = \langle p^2 \rangle - \alpha + \beta_r^2 + \beta_i^2 +
\alpha^2 \langle x^2 \rangle + 2 \alpha \beta_r \langle x \rangle +
2 \beta_i \overline p + \alpha a - b + \beta_r c,$$ where we have introduced $$\begin{aligned}
&&a = \frac{L}{2} [\rho(L/2) + \rho(-L/2)], \nonumber \\
&&b = \gamma [\rho(L/2 + \rho(-L/2)], \nonumber \\
&&c = \rho(L/2) - \rho(-L/2), \quad \rho(\pm L/2) = |\Psi(\pm L/2)|^2.\end{aligned}$$ We have also defined $$\overline p = \Re \int_{-L/2}^{L/2} dx \ \Psi(x)^* (- i {\partial}_x) \Psi(x).$$ If $p = - i {\partial}_x$ were a self-adjoint operator, $\overline p$ would simply be the momentum expectation value. However, since $p$ is not self-adjoint in this case, the corresponding expectation value is in general complex. In particular, $\overline p$ is not the expectation value of any observable associated with a self-adjoint operator.
By varying $\alpha$, $\beta_r$, and $\beta_i$ in order to minimize $I$, one obtains $$\begin{aligned}
&&\frac{{\partial}I}{{\partial}\alpha} = - 1 + 2 \alpha \langle x^2 \rangle +
2 \beta_r \langle x \rangle + a = 0, \nonumber \\
&&\frac{{\partial}I}{{\partial}\beta_r} = 2 \beta_r + 2 \alpha \langle x \rangle + c = 0 \
\Rightarrow \ \beta_r = - \alpha \langle x \rangle - \frac{c}{2}, \nonumber \\
&&\frac{{\partial}I}{{\partial}\beta_i} = 2 \beta_i + 2 \overline p = 0 \
\Rightarrow \ \beta_i = - \overline p,\end{aligned}$$ which implies $$\alpha = \frac{1 + c \langle x \rangle - a}{2 (\Delta x)^2}, \quad
(\Delta x)^2 = \langle x^2 \rangle - \langle x \rangle^2 =
\langle (x - \langle x \rangle)^2 \rangle.$$ Inserting these results for $\alpha$, $\beta_r$, and $\beta_i$ back into the expression for $I$, eq.(\[I\]), one obtains $$I = \langle p^2 \rangle - {\overline p}^2 -
\left(\frac{1 + c \langle x \rangle - a}{2 \Delta x}\right)^2 - b -
\frac{c^2}{4} \geq 0,$$ which implies the generalized uncertainty relation $$\label{uncertain}
\langle p^2 \rangle \geq {\overline p}^2 +
\left(\frac{1 + c \langle x \rangle - a}{2 \Delta x}\right)^2 + b +
\frac{c^2}{4}.$$ In the infinite volume limit, the wave function vanishes at infinity, such that $a = b = c = 0$. Furthermore, the momentum operator would then be self-adjoint with $\langle p \rangle = \overline p$. Hence, in the infinite volume limit, the inequality (\[uncertain\]) reduces to the standard Heisenberg uncertainty relation $$\langle p^2 \rangle \geq \langle p \rangle^2 +
\left(\frac{1}{2 \Delta x}\right)^2 \ \Rightarrow \
\Delta x \Delta p \geq \frac{1}{2}, \quad
(\Delta p)^2 = \langle p^2 \rangle - \langle p \rangle^2 =
\langle (p - \langle p \rangle)^2 \rangle.$$
Interestingly, thanks to time-reversal invariance, the eigenfunctions of the particle in the 1-d box are real-valued and thus $\overline p = 0$. Since $H = p^2/2m$, for energy eigenstates the generalized uncertainty relation takes the form $$2 m E_n = \langle p^2 \rangle \geq
\left(\frac{1 + c \langle x \rangle - a}{2 \Delta x}\right)^2 + b +
\frac{c^2}{4}.$$ The zero-energy eigenstate $\Psi_0(x) = \sqrt{1/L}$ for $\gamma = 0$ has $a = 1$, $b = c = 0$, such that the uncertainty relation reduces to $2 m E_0 \geq 0$, which is indeed satisfied as an equality. This means that this state represents a minimal uncertainty wave packet. The zero-energy state $\Psi_1(x) = \sqrt{12/L^3} \ x$ for $\gamma = - 2/L$, on the other hand, has $a = 3$, $b = - 12/L^2$, $c = 0$, as well as $\Delta x = \sqrt{3/20} \ L$, such that the inequality reduces to $2 m E_1 \geq - 16/(3 L^2)$, which is again satisfied, but not saturated as an equality. Hence, in this case, the state does not represent a minimal uncertainty wave packet.
Constructing a Wall with $\gamma < \infty$
------------------------------------------
It is interesting to ask whether perfectly reflecting walls with $\gamma < \infty$ are just a mathematical curiosity or whether they can also be constructed physically. Of course, it is clear that, independent of the value of $\gamma$, a perfectly reflecting wall is always a mathematical idealization. Any real wall will eventually be penetrable if it is hit by a sufficiently energetic particle. In this context it may be interesting to mention the MIT bag model [@Cho74; @Cho74a; @Has78], in which quarks are confined by restricting them to a finite region of space with perfectly reflecting boundary conditions. While this model is quite successful in modeling the confinement of quarks, in the fundamental QCD theory confinement does not arise through perfectly reflecting walls but through confining strings. When a dynamical QCD string connects a very energetic quark-anti-quark pair, the string can break by the dynamical creation of further quark-anti-quark pairs. Since perfectly reflecting walls do not even exist in the confining theory of the strong force, they certainly do not exist in condensed matter either. However, when low-energy particles hit a very high energy barrier, it acts effectively like a reflecting wall. In this sense, the self-adjoint extension parameter $\gamma$ can be viewed as a low-energy parameter that characterizes the reflection properties of a very high energy barrier.
Since $\gamma$ appears as a natural mathematical parameter characterizing a perfectly reflecting wall, there is no reason to expect that it cannot be physically realized. To show this explicitly, we now construct a wall with an arbitrary value of $\gamma$ as a limit of square-well potentials.[^1]
-1cm
Let us consider the potential illustrated in figure 2, which consists of a perfectly reflecting wall at $x = 0$ with the standard textbook value $\gamma = \infty$, and a very narrow and very deep square-well potential of size $\epsilon > 0$ and depth $- V_0 < 0$ next to it. The wave function then takes the form $$\Psi(x) = A \sin(q x), \quad 0 \leq x \leq \epsilon, \quad
E = \frac{q^2}{2 m} - V_0.$$ For $x \geq \epsilon$, the wave function is determined by enforcing continuity of the wave function itself and its derivative at $x = \epsilon$. When $\epsilon \rightarrow 0$, we can determine the resulting value of $\gamma$ from $$- \gamma \Psi(\epsilon) + {\partial}_x \Psi(\epsilon) = 0 \ \Rightarrow \
\gamma = q \cot(q \epsilon).$$ In order to keep $\gamma$ fixed as $\epsilon \rightarrow 0$, we must hence let $q$ go to infinity such that $$q = \frac{\pi}{2 \epsilon} - \frac{2}{\pi} \gamma.$$ For all states of finite energy $E$, this is achieved by sending $V_0 = q^2/2m \rightarrow \infty$, in such a way that $$V_0 = \frac{1}{2m} \left(\frac{\pi}{2 \epsilon} - \frac{2}{\pi} \gamma\right)^2.$$ It goes without saying that a perfectly reflecting wall with an arbitrary value of $\gamma$ can also be constructed in many other ways, for example, by using an attractive $\delta$-function potential next to the wall.
Experimental Determination of $\gamma$
--------------------------------------
It is natural to ask how one can determine the value of $\gamma$ for some perfectly reflecting wall that can be investigated experimentally. For example, for a planar homogeneous perfectly reflecting wall, the material-specific parameter $\gamma$ can be determined from the scattering phase shift $\delta(k)$ of an incident plane wave that propagates perpendicular to the surface. Assuming that the incident wave propagates in the negative $x$-direction in the region $x > 0$, and scatters off a perfectly reflecting wall at $x = 0$, the wave function takes the form $$\Psi(x) = \exp(- i k x) + R \exp(i k x), \quad x \geq 0.$$ Imposing the boundary condition $$\label{wallboundary}
- \gamma \Psi(0) + {\partial}_x \Psi(0) = 0,$$ one obtains $$- \gamma (1 + R) - i k (1 - R) = 0 \ \Rightarrow \ R = \exp(i \delta(k)) =
- \frac{\gamma + i k}{\gamma - ik}.$$ Hence, by measuring the phase shift $$\delta(k) = 2 \arctan(k/\gamma) + \pi,$$ one can determine the material-specific self-adjoint extension parameter $\gamma$.
Uncertainty Relation for a Quantum Dot with General Perfectly Reflecting Boundary Conditions
============================================================================================
In this section we consider an arbitrarily shaped $d$-dimensional region $\Omega$ with general perfectly reflecting walls at the boundary ${\partial}\Omega$. This may be viewed as a model for a quantum dot, in which electrons are confined inside a finite region of space. As illustrated in figure 3, $\Omega$ may have multiple disconnected boundaries. For a mathematical exposition of boundary value problems for operator differential equations we refer to [@Gor91].
Let us consider the Hamiltonian $$H = \frac{{\vec p \,}^2}{2 m} + V(\vec x) = - \frac{1}{2 m} \Delta + V(\vec x),$$ where $V(\vec x)$ is a non-singular potential. In $d$ dimensions, the continuity equation for local probability conservation takes the form $${\partial}_t \rho(\vec x,t) + \vec \nabla \cdot \vec j(\vec x,t) = 0,$$ with the probability density and current density given by $$\rho(\vec x,t) = |\Psi(\vec x,t)|^2, \quad
\vec j(\vec x,t) = \frac{1}{2 m i}
\left[\Psi(\vec x,t)^* \vec \nabla \Psi(\vec x,t) -
\vec \nabla \Psi(\vec x,t)^* \Psi(\vec x,t)\right].$$ Again, in the following discussion the time-dependence is not essential and we simplify the notation to $\Psi(\vec x)$.
Spatial Boundary Conditions
---------------------------
As in the 1-d case, we demand that no probability may leak outside the region $\Omega$. This is ensured by requiring that the component of the probability current density normal to the surface vanishes, i.e. $$\vec n(\vec x) \cdot \vec j(\vec x) = 0, \quad \vec x \in {\partial}\Omega,$$ where $\vec n(\vec x)$ is the unit-vector normal to the surface ${\partial}\Omega$ at the point $\vec x$. The most general local boundary condition that ensures this takes the form $$\label{bcdot}
\gamma(\vec x) \Psi(\vec x) + \vec n(\vec x) \cdot \vec \nabla \Psi(\vec x) = 0,
\quad x \in {\partial}\Omega,$$ and one then indeed obtains $$\vec n(\vec x) \cdot \vec j(\vec x) = \frac{1}{2 m i}
[- \Psi(\vec x)^* \gamma(\vec x) \Psi(\vec x,t) +
\gamma(\vec x)^* \Psi(\vec x,t)^* \Psi(\vec x,t)] = 0, \quad
\vec x \in {\partial}\Omega,$$ which again implies $\gamma(\vec x) \in {{\mathbb{R}}}$. In general $\gamma(\vec x)$ will depend on the position $\vec x \in {\partial}\Omega$ on the boundary. In a real system such as a quantum dot, $\gamma(\vec x)$ is a material-specific parameter, to be determined experimentally.
Self-Adjointness of the Hamiltonian
-----------------------------------
Let us again convince ourselves that the Hamiltonian endowed with the boundary condition eq.(\[bcdot\]) is indeed self-adjoint. For this purpose, we consider $$\begin{aligned}
\langle\chi|H|\Psi\rangle&=&
\int_\Omega d^dx \ \chi(\vec x)^*
\left[- \frac{1}{2 m} \Delta + V(\vec x)\right] \Psi(\vec x) \nonumber \\
&=&\int_\Omega d^dx \
\left[\frac{1}{2 m} \vec \nabla \chi(\vec x)^* \cdot \vec \nabla \Psi(\vec x) +
\chi(\vec x)^* V(\vec x) \Psi(\vec x) \right] \nonumber \\
&-&\frac{1}{2 m}
\int_{{\partial}\Omega} d\vec n \cdot \chi(\vec x)^* \vec \nabla \Psi(\vec x)
\nonumber \\
&=&\int_\Omega d^dx \ \left\{\left[- \frac{1}{2 m} \Delta + V(\vec x)\right]
\chi(\vec x)^* \right\} \Psi(\vec x) \nonumber \\
&+&\frac{1}{2 m} \int_{{\partial}\Omega} d\vec n \cdot
\left[\vec \nabla \chi(\vec x)^* \Psi(\vec x) -
\chi(\vec x)^* \vec \nabla \Psi(\vec x)\right] \nonumber \\
&=&\langle\Psi|H|\chi\rangle^* + \frac{1}{2 m} \int_{{\partial}\Omega} d\vec n \cdot
\left[\vec \nabla \chi(\vec x)^* \Psi(\vec x) -
\chi(\vec x)^* \vec \nabla \Psi(\vec x)\right].\end{aligned}$$ Hence, the Hamiltonian is Hermitean if $$\label{symmetricHdot}
\int_{{\partial}\Omega} d\vec n \cdot
\left[\vec \nabla \chi(\vec x)^* \Psi(\vec x) -
\chi(\vec x)^* \vec \nabla \Psi(\vec x)\right] = 0.$$ Using the boundary condition eq.(\[bcdot\]), the integral in eq.(\[symmetricHdot\]) reduces to $$\int_{{\partial}\Omega} d^{d-1}x \left[\vec n(\vec x) \cdot \vec \nabla \chi(\vec x)^* +
\gamma(\vec x) \chi(\vec x)^*\right] \Psi(\vec x) = 0.$$ Since $\Psi(\vec x)$ itself can take arbitrary values at the boundary, the Hermiticity of $H$ requires that $$\vec n(\vec x) \cdot \vec \nabla \chi(\vec x) + \gamma(\vec x)^* \chi(\vec x) =
0.$$ For $\gamma(\vec x) \in {{\mathbb{R}}}$, this is again the boundary condition of eq.(\[bcdot\]), which ensures that $D(H^\dagger) = D(H)$, such that $H$ is indeed self-adjoint. In complete analogy to the 1-d case, it is easy to convince oneself that the momentum operator $\vec p = - i \vec \nabla$ is not even Hermitean in the domain $D(H)$ of the Hamiltonian, which contains those twice-differentiable and square-integrable wave functions that obey the boundary condition eq.(\[bcdot\]).
Generalized Uncertainty Relation
--------------------------------
Mathematical investigations of generalized uncertainty relations can be found, for example, in [@Fef83; @Esc10]. In this subsection, we derive a generalized uncertainty relation for an arbitrarily shaped quantum dot in $d$ dimensions, by considering the non-negative integral $$\label{Idot1}
I = \int_\Omega d^dx \ |\vec \nabla \Psi(\vec x) + \alpha \vec x \Psi(\vec x) +
\vec \beta \Psi(\vec x)|^2 \geq 0.$$ Again, $\alpha \in {{\mathbb{R}}}$ and $\vec \beta = \vec \beta_r + i \vec \beta_i \in {{\mathbb{C}}}^d$ are parameters to be varied in order to minimize $I$. Using the boundary condition eq.(\[bcdot\]) after performing some partial integrations, one finds $$\label{Idot2}
I = \langle {\vec p \,}^2 \rangle - \alpha d + \vec \beta_r^2 + \vec \beta_i^2 +
\alpha^2 \langle {\vec x \,}^2 \rangle +
2 \alpha \vec \beta_r \cdot \langle \vec x \rangle +
2 \vec \beta_i \cdot \overline{\vec p} +
\alpha \langle \vec n \cdot \vec x \rangle -
\langle \gamma \rangle +
\vec \beta_r \cdot \langle \vec n \rangle.$$ Here we have defined $$\begin{aligned}
&&\langle \vec n \cdot \vec x \rangle =
\int_{{\partial}\Omega} d\vec n \cdot \vec x \rho(\vec x), \nonumber \\
&&\langle \gamma \rangle =
\int_{{\partial}\Omega} d^{d-1}x \ \gamma(\vec x) \rho(\vec x), \nonumber \\
&&\langle \vec n \rangle =
\int_{{\partial}\Omega} d\vec n \ \rho(\vec x), \quad
\rho(\vec x) = |\Psi(\vec x)|^2.\end{aligned}$$ In analogy to the 1-d case, we have also introduced $$\overline{\vec p} = \Re \int_\Omega d^dx \
\Psi(\vec x)^* (- i \vec \nabla) \Psi(\vec x).$$ If $\vec p = - i \vec \nabla$ had been a self-adjoint operator, $\overline{\vec p}$ would be the momentum expectation value. However, in this case, $\overline{\vec p}$ is again not the expectation value of any observable physical quantity.
By varying $\alpha$, $\vec \beta_r$, and $\vec \beta_i$, one obtains $$\begin{aligned}
&&\frac{{\partial}I}{{\partial}\alpha} = - d + 2 \alpha \langle {\vec x \,}^2 \rangle +
2 \vec \beta_r \cdot \langle \vec x \rangle +
\langle \vec n \cdot \vec x \rangle = 0, \nonumber \\
&&\frac{{\partial}I}{{\partial}\beta_r^j} = 2 \beta_r^j + 2 \alpha \langle x^j \rangle +
\langle n^j \rangle =
0 \ \Rightarrow \
\vec \beta_r = - \alpha \langle \vec x \rangle -
\frac{\langle \vec n \rangle}{2}, \nonumber \\
&&\frac{{\partial}I}{{\partial}\beta_i^j} = 2 \beta_i^j + 2 \overline{p^j} = 0 \
\Rightarrow \ \vec \beta_i = - \overline{\vec p},\end{aligned}$$ which then implies $$\alpha = \frac{d +
\langle \vec n \rangle \cdot \langle \vec x \rangle -
\langle \vec n \cdot \vec x \rangle}{2 (\Delta x)^2},
\quad (\Delta x)^2 = \langle {\vec x \,}^2 \rangle - \langle \vec x \rangle^2 =
\langle (\vec x - \langle \vec x \rangle)^2 \rangle.$$ Again, by inserting the results for $\alpha$, $\vec \beta_r$, and $\vec \beta_i$ back into eq.(\[Idot2\]), one obtains $$I = \langle {\vec p \,}^2 \rangle - {\overline{\vec p} \,}^2 -
\left(\frac{d +
\langle \vec n \rangle \cdot \langle \vec x \rangle -
\langle \vec n \cdot \vec x \rangle}{2 \Delta x}\right)^2 -
\langle \gamma \rangle -
\frac{\langle \vec n \rangle^2}{4} \geq 0,$$ which finally implies the generalized uncertainty relation $$\label{uncertaindot}
\langle {\vec p \,}^2 \rangle \geq {\overline{\vec p} \,}^2 +
\left(\frac{d +
\langle \vec n \rangle \cdot \langle \vec x \rangle -
\langle \vec n \cdot \vec x \rangle}{2 \Delta x}\right)^2 +
\langle \gamma \rangle +
\frac{\langle \vec n \rangle^2}{4}.$$
It is not obvious that eq.(\[uncertaindot\]) is invariant under a spatial translation $\vec x \rightarrow {\vec x}\,' = \vec x + \vec d$. While $\langle {\vec p \,}^2 \rangle$, $\overline{\vec p}$, $\Delta x$, $\langle \gamma \rangle$, and $\langle \vec n \rangle$ are translation invariant by construction, $\langle \vec x \rangle$ and $\langle \vec n \cdot \vec x \rangle$ are not. It is thus reassuring to realize that the combination $$\langle \vec n \rangle \cdot \langle {\vec x}\,' \rangle -
\langle \vec n \cdot {\vec x}\,' \rangle =
\langle \vec n \rangle \cdot (\langle \vec x \rangle + \vec d) -
\langle \vec n \cdot \vec x \rangle -
\langle \vec n \cdot \vec d \rangle =
\langle \vec n \rangle \cdot \langle \vec x \rangle -
\langle \vec n \cdot \vec x \rangle,$$ that enters the generalized uncertainty relation is indeed translation invariant.
All quantities entering the uncertainty relation, except $\overline{\vec p}$, are directly related to physically observable quantities. However, since the momentum is not a self-adjoint operator and hence not observable in a finite volume, despite the fact that it is mathematically completely well-defined, the quantity $\overline{\vec p}$ seems not to be physically measurable. In that case, the question arises how the generalized uncertainty relation should be interpreted physically. Since momentum cannot even be measured inside a quantum dot, $(\Delta p)^2 = \langle {\vec p \,}^2 \rangle - {\overline{\vec p} \,}^2$ can obviously not be interpreted as the uncertainty of momentum. Still, $\langle {\vec p \,}^2 \rangle$ determines the energy of an eigenstate of the free particle Hamiltonian with $V(\vec x) = 0$. Since time-reversal invariance guarantees that energy eigenstates have real-valued wave functions, for those states we know that $\overline{\vec p} = 0$. In that case, the generalized uncertainty relation reduces to $$2 m E_n = \langle {\vec p \,}^2 \rangle \geq \left(\frac{d +
\langle \vec n \rangle \cdot \langle \vec x \rangle -
\langle \vec n \cdot \vec x \rangle}{2 \Delta x}\right)^2 +
\langle \gamma \rangle +
\frac{\langle \vec n \rangle^2}{4},$$ which indeed contains measurable physical quantities only.
General Uncertainty Relation for non-Hermitean Operators
--------------------------------------------------------
For two general self-adjoint operators $A$ and $B$, the uncertainty relation is sometimes quoted as $\Delta A \Delta B \geq \frac{1}{2} |\langle [A,B] \rangle|$. However, a more stringent form of the inequality is given by $$\Delta A \Delta B \geq |\langle \widetilde A \widetilde B \rangle| =
|\langle A B \rangle - \langle A \rangle \langle B \rangle|, \quad
\widetilde A = A - \langle A \rangle, \quad
\widetilde B = B - \langle B \rangle.$$ In the case discussed before, the momentum operator is not even Hermitean. Hence, the question arises, how the uncertainty relation looks like for a general pair of non-Hermitean operators $A \neq A^\dagger$ and $B \neq B^\dagger$. In that case, it is natural to define $$(\Delta A)^2 = \langle \widetilde A \Psi|\widetilde A \Psi \rangle =
\langle \widetilde A^\dagger \widetilde A \rangle =
\langle A^\dagger A \rangle - \langle A^\dagger \rangle \langle A \rangle =
\langle A^\dagger A \rangle - |\langle A \rangle|^2 \geq 0.$$ Here we have used $\langle A^\dagger \rangle = \langle A \rangle^*$. Using the Schwarz inequality, we then obtain $$\begin{aligned}
(\Delta A)^2 (\Delta B)^2&=&
\langle \widetilde A \Psi|\widetilde A \Psi \rangle
\langle \widetilde B \Psi|\widetilde B \Psi \rangle \nonumber \\
&\geq&|\langle \widetilde A \Psi|\widetilde B \Psi \rangle|^2 =
|\langle \widetilde A^\dagger\widetilde B \rangle|^2 =
|\langle A^\dagger B \rangle - \langle A^\dagger \rangle \langle B \rangle|^2,\end{aligned}$$ such that $$\label{generaluncertainty}
\Delta A \Delta B \geq
|\langle A^\dagger B \rangle - \langle A^\dagger \rangle \langle B \rangle|.$$
Let us compare the general uncertainty relation (\[generaluncertainty\]) for non-Hermitean operators with the generalized uncertainty relation (\[uncertaindot\]) that we obtained for a particle confined to the region $\Omega$. In that case, we can identify $A$ with the self-adjoint operator $\vec x$ and $B$ with the non-Hermitean operator $\vec p = - i \vec \nabla$. The uncertainty of the momentum is then given by $$(\Delta p)^2 =
\langle {\vec p \,}^\dagger \cdot \vec p \,\rangle -
|\langle \vec p \,\rangle|^2.$$ Since ${\vec p \,}^\dagger \neq \vec p$, in this case, ${\vec p \,}^\dagger \cdot \vec p \neq {\vec p \,}^2$. In particular, we obtain $$\begin{aligned}
\langle {\vec p \,}^\dagger \cdot \vec p \,\rangle&=&
\langle \vec p \, \Psi|\vec p \, \Psi \rangle =
\int_\Omega d^dx \ \vec \nabla \Psi(\vec x)^* \cdot \vec \nabla \Psi(\vec x)
\nonumber \\
&=&- \int_\Omega d^dx \ \Psi(\vec x)^* \Delta \Psi(\vec x) +
\int_{{\partial}\Omega} d\vec n \cdot \Psi(\vec x)^* \vec \nabla \Psi(\vec x)
\nonumber \\
&=&\langle {\vec p \,}^2 \rangle -
\int_{{\partial}\Omega} d^{d-1}x \ \gamma(\vec x) \Psi(\vec x)^* \Psi(\vec x) =
\langle {\vec p \,}^2 \rangle - \langle \gamma \rangle.\end{aligned}$$ Furthermore, decomposing $\langle \vec p \,\rangle$ into real and imaginary parts, we find $$\langle \vec p \, \rangle = \Re \int_\Omega d^dx \
\Psi(\vec x)^* (- i \vec \nabla) \Psi(\vec x) +
i \Im \int_\Omega d^dx \ \Psi(\vec x)^* (- i \vec \nabla) \Psi(\vec x) =
\overline{\vec p} - \frac{i}{2} \langle \vec n \rangle.$$ Here we have used $$\begin{aligned}
\Im \int_\Omega d^dx \ \Psi(\vec x)^* (- i \vec \nabla) \Psi(\vec x)&=&
\frac{1}{2 i} \int_\Omega d^dx
\left[\Psi(\vec x)^* (- i \vec \nabla) \Psi(\vec x) -
\Psi(\vec x) (i \vec \nabla) \Psi(\vec x)^*\right] \nonumber \\
&=&- \frac{1}{2} \int_{{\partial}\Omega} d\vec n \ \Psi(\vec x)^* \Psi(\vec x) =
- \frac{1}{2} \langle \vec n \rangle,\end{aligned}$$ and hence we obtain $$(\Delta p)^2 = \langle {\vec p \,}^2 \rangle - \langle \gamma \rangle
- {\overline{\vec p} \,}^2 - \frac{\langle \vec n \rangle^2}{4}.$$ The generalized uncertainty relation (\[uncertaindot\]) can thus be rewritten as $$\Delta x \Delta p \geq \frac{1}{2}
|d + \langle \vec n \rangle \cdot \langle \vec x \rangle -
\langle \vec n \cdot \vec x \rangle|.$$ On the other hand, in this case the general uncertainty relation for non-Hermitean operators (\[generaluncertainty\]) takes the form $$\Delta x \Delta p \geq
|\langle \vec x \cdot \vec p \,\rangle - \langle \vec x \rangle \cdot
\langle \vec p \,\rangle|.$$ Introducing $\overline{\vec x \cdot \vec p} = \Re \langle \vec x \cdot \vec p \,\rangle$ and using $$\begin{aligned}
\Im \langle \vec x \cdot \vec p \,\rangle&=&
\frac{1}{2i} \int_\Omega d^dx
\left[\Psi(\vec x)^* \vec x \cdot (- i \vec \nabla) \Psi(\vec x) -
\Psi(\vec x) \vec x \cdot (i \vec \nabla) \Psi(\vec x)^*\right] \nonumber \\
&=&\frac{1}{2}
\int_\Omega d^dx \ \Psi(\vec x)^* \vec \nabla \cdot \vec x \, \Psi(\vec x) -
\frac{1}{2}
\int_{{\partial}\Omega} d\vec n \cdot \vec x \, \Psi(\vec x)^* \Psi(\vec x) \nonumber \\
&=&\frac{1}{2}(d - \langle \vec n \cdot \vec x \rangle),\end{aligned}$$ one obtains $$\langle \vec x \cdot \vec p \,\rangle - \langle \vec x \rangle \cdot
\langle \vec p \,\rangle = \overline{\vec x \cdot \vec p} -
\langle \vec x \rangle \cdot \overline{\vec p} +
\frac{i}{2}(d - \langle \vec n \cdot \vec x \rangle +
\langle \vec n \rangle \cdot \langle \vec x \rangle),$$ such that $$\Delta x \Delta p \geq
\sqrt{\left(\overline{\vec x \cdot \vec p} -
\langle \vec x \rangle \cdot \overline{\vec p}\right)^2 +
\frac{1}{4}\left(d - \langle \vec n \cdot \vec x \rangle +
\langle \vec n \rangle \cdot \langle \vec x \rangle\right)^2}.$$ Hence, unless $\overline{\vec x \cdot \vec p} =
\langle \vec x \rangle \cdot \overline{\vec p}$, the general uncertainty relation for non-Hermitean operators (\[generaluncertainty\]) is more stringent than the generalized uncertainty relation (\[uncertaindot\]). Since energy eigenstates have a real-valued wave function, for them $\overline{\vec x \cdot \vec p} = 0$ and $\overline{\vec p} = 0$, such that both inequalities are then equivalent.
Minimal Uncertainty Wave Packets
--------------------------------
It is interesting to ask which wave functions saturate the generalized uncertainty relation (\[uncertaindot\]), and thus satisfy it as an equality. First of all, when $\gamma(\vec x) = 0$ everywhere at the boundary, the constant wave function $\Psi(\vec x) = 1/\sqrt{V}$, where $V$ is the volume of $\Omega$, is an energy eigenstate of zero energy. In that case, we obtain $\overline{\vec p} = 0$, $\langle \gamma \rangle = 0$, as well as $$\begin{aligned}
&&\langle \vec n \cdot \vec x \rangle =
\frac{1}{V} \int_{{\partial}\Omega} d\vec n \cdot \vec x =
\frac{1}{V} \int_\Omega d^dx \ \vec \nabla \cdot \vec x = d, \nonumber \\
&&\langle \vec n \rangle = \frac{1}{V} \int_{{\partial}\Omega} d\vec n =
\frac{1}{V} \int_\Omega d^dx \ \vec \nabla 1 = 0,\end{aligned}$$ such that the inequality (\[uncertaindot\]) then reduces to $2 m E = \langle {\vec p \,}^2 \rangle \geq 0$. Hence, the zero-energy state indeed saturates the inequality. In this sense, it can be viewed as a state of minimal uncertainty. Of course, one should not forget that, since in this case momentum is not even a physical observable, $\langle {\vec p \,}^2 \rangle$ cannot be interpreted as the uncertainty of a momentum measurement.
Are there other minimal uncertainty wave packets beyond the zero-energy state with a constant wave function that exists for $\gamma(\vec x) = 0$? It is clear by construction, that the inequality (\[uncertaindot\]) can be saturated only if the integrand in eq.(\[Idot1\]) vanishes, i.e. if $$\label{minimal}
\vec \nabla \Psi(\vec x) + \alpha \vec x \Psi(\vec x) + \vec \beta \Psi(\vec x)
= 0.$$ Using the boundary condition eq.(\[bcdot\]), for points $\vec x \in {\partial}\Omega$ this implies $$\left(- \gamma(\vec x) + \alpha \vec n(\vec x) \cdot \vec x +
\vec n(\vec x) \cdot \vec \beta\right)
\Psi(\vec x) = 0 \ \Rightarrow \
\gamma(\vec x) = \vec n(\vec x) \cdot (\alpha \vec x + \vec \beta).$$ Since $\gamma(\vec x) \in {{\mathbb{R}}}$, we must further demand $\vec \beta_i =
- \overline{\vec p} = 0$. This implies that $\gamma(\vec x)$ must have a very peculiar form at the boundary, which will generically not be the case. Thus, in general, there are no minimal uncertainty wave packets in a finite volume. In the bulk eq.(\[minimal\]) is satisfied just by the standard Gaussian wave packet $$\Psi(\vec x) =
A \exp\left(- \frac{\alpha}{2}{\vec x \,}^2 -
\vec \beta \cdot \vec x\right),$$ which is known to saturate the Heisenberg uncertainty relation in the infinite volume. We then also have $$\alpha = \frac{d +
\langle \vec n \rangle \cdot \langle \vec x \rangle -
\langle \vec n \cdot \vec x \rangle}{2 (\Delta x)^2}, \quad
\vec \beta = - \alpha \langle \vec x \rangle -
\frac{\langle \vec n \rangle}{2},$$ such that $\gamma(\vec x)$ must satisfy $$\gamma(\vec x) =
\vec n(\vec x) \cdot \left(\alpha (\vec x - \langle \vec x \rangle) -
\frac{\langle \vec n \rangle}{2}\right) \ \Rightarrow \
\langle \gamma \rangle = \alpha (\langle \vec n \cdot \vec x \rangle -
\langle \vec n \rangle \cdot \langle \vec x \rangle) -
\frac{\langle \vec n \rangle^2}{2}.$$ Only if $\gamma(\vec x)$ happens to be such that the Gaussian wave packet automatically satisfies the boundary condition, it remains a minimal uncertainty wave packet in the finite volume.
$\gamma$-Dependence of the Energy Spectrum
------------------------------------------
In this subsection we assume that $\gamma(\vec x) = \gamma \in {{\mathbb{R}}}$ is a constant independent of the position $\vec x \in {\partial}\Omega$ on the boundary. We then ask how the energy spectrum changes with $\gamma$. A similar calculation for the Dirac operator in a relativistic field theory was performed in [@Wip95]. Let us introduce the energy eigenvalues $E_n$ and the corresponding wave functions $\Psi_n(\vec x)$, i.e. $$H \Psi_n(\vec x) = \left(- \frac{1}{2m} \Delta + V(\vec x)\right) \Psi_n(\vec x)
= E_n \Psi_n(\vec x).$$ Both $E_n$ and $\Psi_n(\vec x)$ depend on $\gamma$ via the boundary condition $$\gamma \Psi_n(\vec x) + \vec n(\vec x) \cdot \vec \nabla \Psi_n(\vec x) = 0,
\quad \vec x \in {\partial}\Omega.$$ The $\gamma$-dependence of the energy spectrum follows from $$\begin{aligned}
\label{monotonic}
{\partial}_\gamma E_n&=&{\partial}_\gamma \int_\Omega d^dx \ \Psi_n(\vec x)^* H \Psi_n(\vec x)
\nonumber \\
&=&\int_\Omega d^dx \ \left[{\partial}_\gamma \Psi_n(\vec x)^* H\Psi_n(\vec x)
+ \Psi_n(\vec x)^* H {\partial}_\gamma \Psi_n(\vec x)\right] \nonumber \\
&=&\int_\Omega d^dx \ \left[{\partial}_\gamma \Psi_n(\vec x)^* H \Psi_n(\vec x)
+ H \Psi_n(\vec x)^* {\partial}_\gamma \Psi_n(\vec x)\right] \nonumber \\
&+&\frac{1}{2 m} \int_{{\partial}\Omega} d\vec n \cdot \left[
\vec \nabla \Psi_n(\vec x)^* {\partial}_\gamma \Psi_n(\vec x) -
\Psi_n(\vec x)^* \vec \nabla {\partial}_\gamma \Psi_n(\vec x)\right] \nonumber \\
&=&E_n \ {\partial}_\gamma \int_\Omega d^dx \ \Psi_n(\vec x)^* \Psi_n(\vec x)
\nonumber \\
&+&\frac{1}{2 m} \int_{{\partial}\Omega} d^{d-1}x \left[
- \gamma \Psi_n(\vec x)^* {\partial}_\gamma \Psi_n(\vec x) +
\Psi_n(\vec x)^* {\partial}_\gamma \left(\gamma \Psi_n(\vec x)\right)\right]
\nonumber \\
&=&\frac{1}{2 m} \int_{{\partial}\Omega} d^{d-1}x \ \Psi_n(\vec x)^* \Psi_n(\vec x) =
\frac{1}{2 m} \int_{{\partial}\Omega} d^{d-1}x \ \rho_n(\vec x) \geq 0,\end{aligned}$$ which shows that the spectrum is monotonically rising with $\gamma$.
Indeed, in the 1-d case, the spectrum illustrated in figure 1 is monotonic in $\gamma$. In that case, eq.(\[monotonic\]) reduces to $${\partial}_\gamma E_n = \frac{1}{2 m}\left[\rho_n(L/2) + \rho_n(- L/2)\right].$$ Let us explicitly verify this equation for the positive energy eigenstates of even parity $$\Psi_n(x) = A \cos(k_n x), \quad E_n = \frac{k_n^2}{2 m}, \quad
\frac{\gamma}{k_n} = \tan \frac{k_n L}{2}.$$ In this case, one obtains $${\partial}_\gamma E_n = \frac{k_n {\partial}_\gamma k_n}{m} =
\frac{2 k_n \cos^2(k_n L/2)}{m[k_n L + \sin(k_n L)]},$$ as well as $$\rho_n(L/2) + \rho_n(- L/2) = 2 |A|^2 \cos^2\frac{k_n L}{2}.$$ The normalization condition for the wave function implies $$|A|^2 \int_{-L/2}^{L/2}dx \ \cos^2\frac{k_n L}{2} =
|A|^2 \frac{1}{2 k_n} \left(k_n L + \sin(k_n L)\right) = 1,$$ such that indeed $$\frac{1}{2 m}\left[\rho_n(L/2) + \rho_n(- L/2)\right] =
\frac{2 k_n}{m[k_n L + \sin(k_n L)]} \cos^2\frac{k_n L}{2} = {\partial}_\gamma E_n.$$ It is straightforward to repeat this check for states of odd parity or negative energy.
General Boundary Conditions for Heterostructures
------------------------------------------------
Semiconductor heterostructures such as quantum dots, quantum wires, and quantum wells are separated into regions with different effective electron masses [@Har05]. Until now we have considered quantum dots consisting of a single region isolated from an energetically forbidden environment. In this subsection, we construct the most general condition at the boundary ${\partial}\Omega$ separating two regions, $\Omega_{{\rm I}}$ and $\Omega_{{\rm I\hspace{-0.3mm}I}}$ as illustrated in figure 4, with different effective electron masses $m_{{\rm I}}$ and $m_{{\rm I\hspace{-0.3mm}I}}$.
1.3cm
In the two regions the Hamiltonian is then given by $$H_{{\rm I}} = \frac{{\vec p \,}^2}{2 m_{{\rm I}}} + V_{{\rm I}}(\vec x), \quad
H_{{\rm I\hspace{-0.3mm}I}} = \frac{{\vec p \,}^2}{2 m_{{\rm I\hspace{-0.3mm}I}}} + V_{{\rm I\hspace{-0.3mm}I}}(\vec x).$$ For points at the boundary ${\partial}\Omega$, the Hermiticity condition takes the form $$\begin{aligned}
\label{HermiteI,II}
&&\vec n(\vec x) \cdot \frac{1}{2 m_{{\rm I}}}
\left[\chi_{{\rm I}}(\vec x)^* \vec \nabla \Psi_{{\rm I}}(\vec x) -
\vec \nabla \chi_{{\rm I}}(\vec x)^* \Psi_{{\rm I}}(\vec x)\right] = \nonumber \\
&&\vec n(\vec x) \cdot \frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}}
\left[\chi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x) -
\vec \nabla \chi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)\right].\end{aligned}$$ The self-adjointness condition can now be expressed as $$\left(\begin{array}{c} \Psi_{{\rm I}}(\vec x) \\
\frac{1}{2 m_{{\rm I}}} \vec n(\vec x) \cdot \vec \nabla \Psi_{{\rm I}}(\vec x)\end{array}
\right) =
\Gamma(\vec x) \left(\begin{array}{c} \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x) \\
\frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}} \vec n(\vec x) \cdot \vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)
\end{array}\right), \quad \Gamma(\vec x) \in GL(2,{{\mathbb{C}}}),$$ which turns the Hermiticity condition eq.(\[HermiteI,II\]) into $$\begin{aligned}
&&\left[\Gamma_{21}(\vec x) \chi_{{\rm I}}(\vec x)^* - \Gamma_{11}(\vec x)
\frac{1}{2 m_{{\rm I}}} \vec n(\vec x) \cdot \vec \nabla \chi_{{\rm I}}(\vec x)^* +
\frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}} \vec n(\vec x) \cdot \vec \nabla \chi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \right]
\Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x) + \nonumber \\
&&\left[\Gamma_{22}(\vec x) \chi_{{\rm I}}(\vec x)^* - \Gamma_{12}(\vec x)
\frac{1}{2 m_{{\rm I}}} \vec n(\vec x) \cdot \vec \nabla \chi_{{\rm I}}(\vec x)^* -
\chi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \right] \frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}} \vec n(\vec x) \cdot
\vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x) = 0. \nonumber \\ \,\end{aligned}$$ In order to satisfy this relation we must thus demand $$\left(\begin{array}{c} \chi_{{\rm I\hspace{-0.3mm}I}}(\vec x) \\
\frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}} \vec n(\vec x) \cdot \vec \nabla \chi_{{\rm I\hspace{-0.3mm}I}}(\vec x)
\end{array}\right) =
\left(\begin{array}{cc} \Gamma_{22}(\vec x)^* & - \Gamma_{12}(\vec x)^* \\
- \Gamma_{21}(\vec x)^* & \Gamma_{11}(\vec x)^* \end{array}\right)
\left(\begin{array}{c} \chi_{{\rm I}}(\vec x) \\
\frac{1}{2 m_{{\rm I}}} \vec n(\vec x) \cdot \vec \nabla \chi_{{\rm I}}(\vec x)\end{array}
\right),$$ Self-adjointness requires equality of the domains, $D(H^\dagger) = D(H)$, which thus implies $$\begin{aligned}
\Gamma(\vec x)^{-1}&=&\frac{1}{\Gamma_{11}(\vec x) \Gamma_{22}(\vec x) -
\Gamma_{12}(\vec x) \Gamma_{21}(\vec x)}
\left(\begin{array}{cc} \Gamma_{22}(\vec x) & - \Gamma_{12}(\vec x) \\
- \Gamma_{21}(\vec x) & \Gamma_{11}(\vec x) \end{array}\right) \nonumber \\
&=&\left(\begin{array}{cc} \Gamma_{22}(\vec x)^* & - \Gamma_{12}(\vec x)^* \\
- \Gamma_{21}(\vec x)^* & \Gamma_{11}(\vec x)^* \end{array}\right).\end{aligned}$$ This condition is satisfied by a 4-parameter family of self-adjoint extensions which satisfy $$\Gamma_{ij}(\vec x) \in \exp(i \theta(\vec x)) \, {{\mathbb{R}}}, \quad
\Gamma_{11}(\vec x) \Gamma_{22}(\vec x) -
\Gamma_{12}(\vec x) \Gamma_{21}(\vec x) = \exp(2 i \theta(\vec x)),$$ i.e. $\Gamma(\vec x)$ is real with determinant 1, up to an overall phase $\exp(i \theta(\vec x))$.
Using this form of $\Gamma(\vec x)$, it is straightforward to show that self-adjointness implies probability current conservation, i.e. $$\begin{aligned}
i \vec n(\vec x) \cdot \vec j_{{\rm I}}(\vec x)&=&
\vec n(\vec x) \cdot \frac{1}{2 m_{{\rm I}}} \left[
\Psi_{{\rm I}}(\vec x)^* \vec \nabla \Psi_{{\rm I}}(\vec x) -
\vec \nabla \Psi_{{\rm I}}(\vec x)^* \Psi_{{\rm I}}(\vec x)\right] \nonumber \\
&=&\vec n(\vec x) \cdot \frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}}
\Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)
\left[\Gamma_{11}(\vec x)^* \Gamma_{22}(\vec x) -
\Gamma_{21}(\vec x)^* \Gamma_{12}(\vec x)\right] \nonumber \\
&+&\vec n(\vec x) \cdot \frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}}
\vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)
\left[\Gamma_{12}(\vec x)^* \Gamma_{21}(\vec x) -
\Gamma_{22}(\vec x)^* \Gamma_{11}(\vec x)\right] \nonumber \\
&+&\vert\Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)\vert^2
\left[\Gamma_{11}(\vec x)^* \Gamma_{21}(\vec x) -
\Gamma_{21}(\vec x)^* \Gamma_{11}(\vec x)\right] \nonumber \\
&+&\vert\vec n(\vec x) \cdot \frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}} \vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)
\vert^2 \left[\Gamma_{12}(\vec x)^* \Gamma_{22}(\vec x) -
\Gamma_{22}(\vec x)^* \Gamma_{12}(\vec x)\right] \nonumber \\
&=&\vec n(\vec x) \cdot \frac{1}{2 m_{{\rm I\hspace{-0.3mm}I}}}
\left[\Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x) -
\vec \nabla \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)^* \Psi_{{\rm I\hspace{-0.3mm}I}}(\vec x)\right] \nonumber \\
&=&i \vec n(\vec x) \cdot \vec j_{{\rm I\hspace{-0.3mm}I}}(\vec x). \end{aligned}$$ Here we have used again that $\Gamma(\vec x)$ is real with determinant 1 up to the overall phase $\exp(i \theta(\vec x))$, which implies $$\begin{aligned}
&&\Gamma_{11}(\vec x)^* \Gamma_{22}(\vec x) -
\Gamma_{21}(\vec x)^* \Gamma_{12}(\vec x) = 1, \nonumber \\
&&\Gamma_{12}(\vec x)^* \Gamma_{21}(\vec x) -
\Gamma_{22}(\vec x)^* \Gamma_{11}(\vec x) = - 1, \nonumber \\
&&\Gamma_{11}(\vec x)^* \Gamma_{21}(\vec x) -
\Gamma_{21}(\vec x)^* \Gamma_{11}(\vec x) = 0, \nonumber \\
&&\Gamma_{12}(\vec x)^* \Gamma_{22}(\vec x) -
\Gamma_{22}(\vec x)^* \Gamma_{12}(\vec x) = 0.\end{aligned}$$
Reflecting Walls for Relativistic Fermions
==========================================
In this section we consider perfectly reflecting boundary conditions for relativistic fermions. Such boundary conditions have been introduced in the MIT bag model to mimic the confinement of quarks and gluons inside hadrons. Here we construct the most general perfectly reflecting boundary conditions for relativistic Dirac fermions both in one and in three spatial dimensions, as well as for the resulting non-relativistic fermions described by the Pauli equation.
Reflecting Boundary Conditions for 1-d Dirac Fermions
-----------------------------------------------------
General boundary conditions for a Dirac particle in a box have been investigated in [@Alo97]. Here we consider a Dirac fermion moving on the positive $x$-axis with a perfectly reflecting wall at $x = 0$. The corresponding free particle Hamiltonian is then given by $$\label{alphabeta}
H = \alpha p c + \beta m c^2, \quad
\alpha = \left(\begin{array}{cc} 0 & 1 \\ 1 & 0 \end{array}\right), \quad
\beta = \left(\begin{array}{cc} 1 & 0 \\ 0 & - 1 \end{array}\right).$$ The Hamiltonian acts on a 2-component spinor $\Psi(x,t)$, and the corresponding continuity equation $${\partial}_t \rho(x,t) + {\partial}_x j(x,t) = 0,$$ is satisfied by $$\rho(x,t) = \Psi(x,t)^\dagger \Psi(x,t), \quad
j(x,t) = c \Psi(x,t)^\dagger \alpha \Psi(x,t).$$
Let us investigate the Hermiticity of the Hamiltonian on the positive $x$-axis $$\begin{aligned}
\langle \chi|H|\Psi\rangle&=&\int_0^\infty dx \ \chi(x)^\dagger
\left[- c \alpha i {\partial}_x + \beta m c^2\right] \Psi(x) \nonumber \\
&=&\int_0^\infty dx \ \left\{\left[- c \alpha i {\partial}_x + \beta m c^2\right]
\chi(x)\right\}^\dagger \Psi(x) - i c \chi(0)^\dagger \alpha \Psi(0) \nonumber \\
&=&\langle \Psi|H|\chi\rangle^* - i c \chi(0)^\dagger \alpha \Psi(0),\end{aligned}$$ which thus leads to the Hermiticity condition $$\label{Dirachermiticity1d}
\chi(0)^\dagger \alpha \Psi(0) = 0.$$ We now introduce the self-adjoint extension condition $$\label{Diracselfadjointness1d}
\Psi_2(0) = \lambda \Psi_1(0), \quad \lambda \in {{\mathbb{C}}},$$ which reduces eq.(\[Dirachermiticity1d\]) to $$\chi(0)^\dagger
\left(\begin{array}{cc} 0 & 1 \\ 1 & 0 \end{array}\right) \Psi(0) =
\left[\chi_1(0)^* \lambda + \chi_2(0)^*\right] \Psi_1(0) = 0 \
\Rightarrow \ \chi_2(0) = - \lambda^* \chi_1(0).$$ In order to guarantee self-adjointness of $H$, i.e. $D(H) = D(H^\dagger)$, we must request $$\lambda = - \lambda^*,$$ i.e. $\lambda$ must be purely imaginary. For 1-d Dirac fermions, there is thus a 1-parameter family of self-adjoint extensions that characterizes a perfectly reflecting wall. The self-adjointness condition eq.(\[Diracselfadjointness1d\]) implies $$\begin{aligned}
j(0)&=&c \Psi(0)^\dagger \alpha \Psi(0) = c \Psi(0)^\dagger
\left(\begin{array}{cc} 0 & 1 \\ 1 & 0 \end{array}\right) \Psi(0) =
c \left[\Psi_1(0)^* \Psi_2(0) + \Psi_2(0)^* \Psi_1(0)\right] \nonumber \\
&=&c \left[\Psi_1(0)^* \lambda \Psi_1(0) + \Psi_1(0)^* \lambda^* \Psi_1(0)\right]
= 0.\end{aligned}$$
In the chiral limit, $m = 0$, not only the vector current but also the axial current is conserved. In the basis we have chosen, the $\gamma$-matrices take the form $$\label{gamma2d}
\gamma^0 = \beta = \left(\begin{array}{cc} 1 & 0 \\ 0 & - 1 \end{array}\right),
\quad
\gamma^1 = \gamma^0 \alpha =
\left(\begin{array}{cc} 0 & 1 \\ - 1 & 0 \end{array}\right), \quad
\gamma^3 = \gamma^0 \gamma^1 =
\left(\begin{array}{cc} 0 & 1 \\ 1 & 0 \end{array}\right).$$ Thus the axial charge density and the axial current density are given by $$\begin{aligned}
&&\rho_A(x,t) = \Psi(x,t)^\dagger \gamma^3 \Psi(x,t), \nonumber \\
&&j_A(x,t) = c \Psi(x,t)^\dagger \gamma^0 \gamma^1 \gamma^3 \Psi(x,t) =
c \Psi(x,t)^\dagger \Psi(x,t).\end{aligned}$$ Indeed, it is easy to convince oneself that ${\partial}_t \rho_A(x,t) + {\partial}_x j_A(x,t) = 0$ in the chiral limit $m = 0$. Let us now consider the axial current at the boundary $x = 0$ $$j_A(0) = c \left[|\Psi_1(0)|^2 + |\Psi_2(0)|^2\right] =
c \left(1 + |\lambda|^2\right) |\Psi_1(0)|^2 \geq 0.$$ Since in general $\Psi_1(0) \neq 0$, the axial current does not vanish at the boundary. Hence, chiral symmetry is explicitly broken by the most general perfectly reflecting boundary condition. It is well-known that this is indeed the case for the boundary condition in the MIT bag model [@Cho74; @Cho74a; @Has78]. Only in the chiral bag model the axial current is conserved because it is carried by a pion field outside the bag [@Ino75; @Bro79].
It is interesting to ask how the self-adjoint extension parameter $\lambda$ in the relativistic case is related to the parameter $\gamma$ in the non-relativistic limit, in which $$\Psi_2(x) = \frac{p}{2 m c} \Psi_1(x) = \frac{1}{2 m c i} {\partial}_x \Psi_1(x).$$ Inserting this relation in the relativistic current, $$\begin{aligned}
j(x)&=&c \Psi(x)^\dagger \alpha \Psi(x) =
c \left[\Psi_1(x)^* \Psi_2(x) + \Psi_2(x)^* \Psi_1(x)\right]
\nonumber \\
&=&\frac{1}{2 m i} \left[\Psi_1(x)^* {\partial}_x \Psi_1(x) - {\partial}_x \Psi_1(x)^*
\Psi_1(x)\right],\end{aligned}$$ we indeed recover the non-relativistic current of eq.(\[current\]). In the non-relativistic limit, the relativistic self-adjointness condition eq.(\[Diracselfadjointness1d\]) takes the form $$\frac{1}{2 m c \, i} {\partial}_x \Psi_1(0) = \lambda \Psi_1(0) \ \Rightarrow \
- 2 m c \, i \lambda \Psi_1(0) + {\partial}_x \Psi_1(0) = 0.$$ Hence, the non-relativistic self-adjoint extension parameter of eq.(\[wallboundary\]) can be identified as $$\gamma = - 2 m c \, i \lambda,$$ which is indeed real because $\lambda$ is purely imaginary.
Reflecting Boundary Conditions for 3-d Dirac Fermions
-----------------------------------------------------
Let us now consider Dirac fermions coupled to an external static electromagnetic field and confined to a finite domain $\Omega$. The corresponding Hamiltonian then takes the form $$\begin{aligned}
&&H = \vec \alpha \cdot \left(\vec p c + e \vec A(\vec x)\right) + \beta m c^2 -
e \Phi(\vec x) = - i \vec \alpha \cdot \vec D c + \beta m c^2 - e \Phi(\vec x),
\nonumber \\
&&\vec \alpha = \left(\begin{array}{cc} {0\hspace{-1.65mm}0}& \vec \sigma \\ \vec \sigma & {0\hspace{-1.65mm}0}\end{array}\right), \quad
\beta = \left(\begin{array}{cc} {1\!\!1}& {0\hspace{-1.65mm}0}\\ {0\hspace{-1.65mm}0}& - {1\!\!1}\end{array}\right).\end{aligned}$$ Here ${1\!\!1}$ and ${0\hspace{-1.65mm}0}$ are the $2 \times 2$ unit- and zero-matrix, and $\vec \sigma$ is the vector of Pauli matrices, while $\Phi(\vec x)$ and $\vec A(\vec x)$ are the scalar and vector potential, and $e$ is the electric charge. The covariant derivative is given by $$\vec D = \vec \nabla + i \frac{e}{c} \vec A(\vec x).$$ The Dirac Hamiltonian acts on a 4-component spinor $\Psi(\vec x,t)$. In this case, the continuity equation $${\partial}_t \rho(\vec x,t) + \vec \nabla \cdot \vec j(\vec x,t) = 0,$$ is satisfied by $$\rho(\vec x,t) = \Psi(\vec x,t)^\dagger \Psi(\vec x,t), \quad
\vec j(\vec x,t) = c \Psi(\vec x,t)^\dagger \vec \alpha \Psi(\vec x,t).$$ Under time-independent gauge transformations, the gauge fields as well as the Dirac spinor transform as $$^\varphi\Phi(\vec x) = \Phi(\vec x), \
^\varphi\vec A(\vec x) = \vec A(\vec x) - \vec \nabla \varphi(\vec x), \
^\varphi\Psi(\vec x) = \exp\left(i \frac{e}{c} \varphi(\vec x)\right)
\Psi(\vec x).$$
In order to investigate the Hermiticity of the Hamiltonian in the finite spatial domain $\Omega$, we consider $$\begin{aligned}
\langle \chi|H|\Psi\rangle&=&\int_\Omega d^3x \ \chi(\vec x)^\dagger
\left[\vec \alpha \cdot \left(- i c \vec \nabla + e \vec A(\vec x)\right) +
\beta m c^2 - e \Phi(\vec x)\right] \Psi(\vec x) \nonumber \\
&=&\int_\Omega d^3x \ \left\{\left[\vec \alpha \cdot
\left(- i c \vec \nabla + e \vec A(\vec x)\right) + \beta m c^2 - e \Phi(\vec x)
\right]\chi(\vec x)\right\}^\dagger \Psi(\vec x) \nonumber \\
&-&i c \int_{{\partial}\Omega} d\vec n \cdot \chi(\vec x)^\dagger \vec \alpha
\Psi(\vec x) \nonumber \\
&=&\langle \Psi|H|\chi\rangle^* -
i c \int_{{\partial}\Omega} d\vec n \cdot \chi(\vec x)^\dagger \vec \alpha \Psi(\vec x),\end{aligned}$$ which thus leads to the Hermiticity condition $$\label{Dirachermiticity}
\chi(\vec x)^\dagger \vec n(\vec x) \cdot \vec \alpha \Psi(\vec x) = 0,
\quad \vec x \in {\partial}\Omega.$$ We now introduce the self-adjoint extension condition $$\label{Diracselfadjointness}
\left(\begin{array}{c} \Psi_3(\vec x) \\ \Psi_4(\vec x) \end{array}\right) =
\lambda(\vec x)
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \end{array}\right),
\quad \lambda(\vec x) \in GL(2,{{\mathbb{C}}}), \quad \vec x \in {\partial}\Omega,$$ which reduces eq.(\[Dirachermiticity\]) to $$\begin{aligned}
&&\chi(\vec x)^\dagger
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& \vec n(\vec x) \cdot \vec \sigma \\
\vec n(\vec x) \cdot \vec \sigma & {0\hspace{-1.65mm}0}\end{array}\right) \Psi(\vec x) =
\nonumber \\
&&\left[\left(\chi_1(\vec x)^*,\chi_2(\vec x)^* \right)
\vec n(\vec x) \cdot \vec \sigma \lambda(\vec x) +
\left(\chi_3(\vec x)^*,\chi_4(\vec x)^* \right)
\vec n(\vec x) \cdot \vec \sigma \right]
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \end{array}\right)
= 0 \ \Rightarrow \nonumber \\
&&\left(\begin{array}{c} \chi_3(\vec x) \\ \chi_4(\vec x) \end{array}\right) =
- \vec n(\vec x) \cdot \vec \sigma \lambda(\vec x)^\dagger
\vec n(\vec x) \cdot \vec \sigma
\left(\begin{array}{c} \chi_1(\vec x) \\ \chi_2(\vec x) \end{array}\right),\end{aligned}$$ In order to guarantee self-adjointness of $H$, i.e. $D(H) = D(H^\dagger)$, we now demand $$\lambda(\vec x) = - \vec n(\vec x) \cdot \vec \sigma \lambda(\vec x)^\dagger
\vec n(\vec x) \cdot \vec \sigma \ \Rightarrow \
\vec n(\vec x) \cdot \vec \sigma \lambda(\vec x) = -
\left[\vec n(\vec x) \cdot \vec \sigma \lambda(\vec x)\right]^\dagger.$$ Hence, $\vec n(\vec x) \cdot \vec \sigma \lambda(\vec x)$ is anti-Hermitean. For Dirac fermions, there is thus a 4-parameter family of self-adjoint extensions that characterizes a perfectly reflecting wall. It is important to note that the self-adjointness condition eq.(\[Diracselfadjointness\]) is gauge covariant and implies $$\begin{aligned}
\vec n(\vec x) \cdot \vec j(\vec x)\!\!\!\!&=&\!\!\!\!c \Psi(\vec x)^\dagger
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& \vec n(\vec x) \cdot \vec \sigma \\
\vec n(\vec x) \cdot \vec \sigma & {0\hspace{-1.65mm}0}\end{array}\right) \Psi(\vec x) =
\nonumber \\
&=&\!\!\!\!c \left[\left(\Psi_1(\vec x)^*,\Psi_2(\vec x)^* \right)
\vec n(\vec x) \cdot \vec \sigma \lambda(\vec x) +
\left(\Psi_3(\vec x)^*,\Psi_4(\vec x)^* \right)
\vec n(\vec x) \cdot \vec \sigma \right]
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \end{array}\right)
\nonumber \\
&=&\!\!\!\!c \left(\Psi_1(\vec x)^*,\Psi_2(\vec x)^* \right) \left[
\vec n(\vec x) \cdot \vec \sigma \lambda(\vec x) +
\lambda(\vec x)^\dagger \vec n(\vec x) \cdot \vec \sigma \right]
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \end{array}\right)
= 0.\end{aligned}$$
Let us again consider the chiral limit $m = 0$, in which the axial current is also conserved. The $\gamma$-matrices now take the form $$\label{gamma4d}
\gamma^0 = \beta =
\left(\begin{array}{cc} {1\!\!1}& {0\hspace{-1.65mm}0}\\ {0\hspace{-1.65mm}0}& -{1\!\!1}\end{array}\right),
\quad
\vec \gamma = \gamma^0 \vec \alpha =
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& \vec \sigma \\ - \vec \sigma & {0\hspace{-1.65mm}0}\end{array}
\right), \quad
\gamma^5 = i \gamma^0 \gamma^1 \gamma^2 \gamma^3 =
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& {1\!\!1}\\ {1\!\!1}& {0\hspace{-1.65mm}0}\end{array}\right).$$ Hence the axial charge density and the axial current density are given by $$\begin{aligned}
&&\rho_A(\vec x,t) = \Psi(\vec x,t)^\dagger \gamma^5 \Psi(\vec x,t),
\nonumber \\
&&\vec j_A(\vec x,t) =
c \Psi(\vec x,t)^\dagger \gamma^0 \vec \gamma \gamma^5 \Psi(\vec x,t) =
- c \Psi(\vec x,t)^\dagger
\left(\begin{array}{cc} \vec \sigma & {0\hspace{-1.65mm}0}\\ {0\hspace{-1.65mm}0}& \vec \sigma \end{array}\right)
\Psi(\vec x,t), \end{aligned}$$ such that the axial current at the boundary is $$\begin{aligned}
\vec n(\vec x) \cdot \vec j_A(\vec x)\!\!\!\!&=&\!\!\!\!- c \Psi(\vec x)^\dagger
\left(\begin{array}{cc} \vec n(\vec x) \cdot \vec \sigma & {0\hspace{-1.65mm}0}\\
{0\hspace{-1.65mm}0}& \vec n(\vec x) \cdot \vec \sigma \end{array}\right) \Psi(\vec x) =
\nonumber \\
&=&\!\!\!\!- c \left(\Psi_1(\vec x)^*,\Psi_2(\vec x)^* \right)
\left[\vec n(\vec x) \cdot \vec \sigma +
\lambda(\vec x)^\dagger \vec n(\vec x) \cdot \vec \sigma \lambda(\vec x)\right]
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \end{array}\right).
\quad \quad\end{aligned}$$ As in the 1-d case, in general, the axial current does not vanish at the boundary. Hence, chiral symmetry is again explicitly broken by the most general perfectly reflecting boundary condition.
Reflecting Boundary Conditions in the Non-relativistic Limit
------------------------------------------------------------
In the non-relativistic limit, the lower components of the Dirac spinor are given by $$\label{nrlimit}
\left(\begin{array}{c} \Psi_3(\vec x) \\ \Psi_4(\vec x) \end{array} \right) =
\frac{\vec \sigma \cdot \left(\vec p c + e \vec A(\vec x)\right)}{2 m c^2}
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \end{array} \right) =
\frac{1}{2 m c \, i} \vec \sigma \cdot \vec D \Psi(\vec x),$$ with the 2-component Pauli spinor $$\Psi(\vec x) =
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \end{array} \right).$$ The Dirac equation then reduces to the Pauli equation. Expanding up to the leading Zeemann term, but neglecting the higher order spin-orbit coupling and Darwin terms, the Hamiltonian entering the Pauli equation takes the form $$\label{PauliH}
H = m c^2 + \frac{\left(\vec p c + e \vec A(\vec x)\right)^2}{2 m c^2} -
e \Phi(\vec x) + \mu \vec \sigma \cdot \vec B(\vec x),$$ where $\vec B(\vec x) = \vec \nabla \times \vec A(\vec x)$ is the magnetic field and $\mu = e/2 m c$ is the magnetic moment of the fermion.
Using eq.(\[nrlimit\]), the relativistic current reduces to $$\begin{aligned}
\vec j(\vec x)&=&c
\left(\Psi_1(\vec x)^*,\Psi_2(\vec x)^*,\Psi_3(\vec x)^*,\Psi_4(\vec x)^*\right)
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& \vec \sigma \\ \vec \sigma & {0\hspace{-1.65mm}0}\end{array}\right)
\left(\begin{array}{c} \Psi_1(\vec x) \\ \Psi_2(\vec x) \\
\Psi_3(\vec x) \\ \Psi_4(\vec x) \end{array} \right) \nonumber \\
&=&\frac{1}{2 m i} \left[\Psi(\vec x)^\dagger \vec D \Psi(\vec x) -
(\vec D \Psi(\vec x))^\dagger \Psi(\vec x)\right] \nonumber \\
&-&\frac{1}{2 m}
\left[\Psi(\vec x,t)^\dagger \vec \sigma \times \vec D \Psi(\vec x,t) -
(\vec D \Psi(\vec x,t))^\dagger \times \vec \sigma \Psi(\vec x,t)\right]
\nonumber \\
&=&\frac{1}{2 m i}
\left[\Psi(\vec x,t)^\dagger \vec D \Psi(\vec x,t) -
(\vec D \Psi(\vec x,t))^\dagger \Psi(\vec x,t)\right] \nonumber \\
&+&\frac{1}{2 m} \vec \nabla \times
\left[\Psi(\vec x,t)^\dagger \vec \sigma \Psi(\vec x,t)\right].\end{aligned}$$ As a curl, the spin term entering the current is automatically divergenceless. In this case, the continuity equation $${\partial}_t \rho(\vec x,t) + \vec \nabla \cdot \vec j(\vec x,t) = 0,$$ is satisfied with the probability density $\rho(\vec x,t) = \Psi(\vec x,t)^\dagger \Psi(\vec x,t)$.
Introducing the gauge covariant boundary condition $$\label{sadjnonrel}
\gamma(\vec x) \Psi(\vec x) + \vec n(\vec x) \cdot
\left[\vec D \Psi(\vec x) - i \vec \sigma \times \vec D \Psi(\vec x)\right] =
0, \quad \gamma(\vec x) \in GL(2,{{\mathbb{C}}}), \quad \vec x \in {\partial}\Omega,$$ we obtain $$\begin{aligned}
\vec n(\vec x) \cdot \vec j(\vec x)&=&\frac{1}{2 m i}
\left[\Psi(\vec x)^\dagger \vec n(\vec x) \cdot \vec D \Psi(\vec x) -
(\vec n(\vec x) \cdot \vec D \Psi(\vec x))^\dagger \Psi(\vec x)\right]
\nonumber \\
&-&\frac{1}{2 m} \left[\Psi(\vec x,t)^\dagger \vec n \cdot
\left(\vec \sigma \times \vec D \Psi(\vec x,t)\right) -
\vec n \cdot \left((\vec D \Psi(\vec x,t))^\dagger \times \vec \sigma\right)
\Psi(\vec x,t)\right] \nonumber \\
&=&\frac{1}{2 m i}
\left[- \Psi(\vec x)^\dagger \gamma(\vec x) \Psi(\vec x) +
\Psi(\vec x)^\dagger \gamma(\vec x)^\dagger \Psi(\vec x)\right] = 0,\end{aligned}$$ which immediately implies $$\gamma(\vec x)^\dagger = \gamma(\vec x).$$ Hence, again there is a 4-parameter family of self-adjoint extensions, now parameterized by a $2 \times 2$ Hermitean matrix.
In complete analogy to the previous cases, by partial integration one arrives at the Hermiticity condition for the Pauli Hamiltonian of eq.(\[PauliH\]) $$\label{Hnonrel}
\int_{{\partial}\Omega} d\vec n \cdot \left[\left(\vec D \chi(\vec x)\right)^\dagger
\Psi(\vec x) - \chi(\vec x)^\dagger \vec D \Psi(\vec x)\right] = 0.$$ One also readily derives $$\left(\vec D \chi(\vec x)\right)^\dagger \times \vec \sigma \Psi(\vec x) -
\chi(\vec x)^\dagger \vec \sigma \times \vec D \Psi(\vec x) =
\vec \nabla \times \left(\chi(\vec x)^\dagger \vec \sigma \Psi(\vec x)\right).$$ Using Stoke’s theorem as well as ${\partial}({\partial}\Omega) = \emptyset$, (i.e. the boundary of a boundary is an empty set), one then obtains $$\begin{aligned}
&&\int_{{\partial}\Omega} d\vec n \cdot
\left[\left(\vec D \chi(\vec x)\right)^\dagger \times \vec \sigma \Psi(\vec x) -
\chi(\vec x)^\dagger \vec \sigma \times \vec D \Psi(\vec x)\right] = \nonumber \\
&&\int_{{\partial}\Omega} d\vec n \cdot
\vec \nabla \times \left(\chi(\vec x)^\dagger \vec \sigma \Psi(\vec x)\right) =
\int_{{\partial}({\partial}\Omega)} d\vec l \cdot \chi(\vec x)^\dagger \vec \sigma \Psi(\vec x) =
0,\end{aligned}$$ such that the Hermiticity condition eq.(\[Hnonrel\]) may be rewritten as $$\int_{{\partial}\Omega} d\vec n \cdot \left[\left(\vec D \chi(\vec x) -
i \vec \sigma \times \vec D \chi(\vec x)\right)^\dagger \Psi(\vec x) -
\chi(\vec x)^\dagger \left(\vec D \Psi(\vec x) - i \vec \sigma \times
\vec D \Psi(\vec x) \right)\right] = 0.$$ Using the self-adjointness condition eq.(\[sadjnonrel\]), this relation reduces to $$\int_{{\partial}\Omega} d^2x \ \left[\chi(\vec x)^\dagger \gamma(\vec x)^\dagger
\Psi(\vec x) - \chi(\vec x)^\dagger \gamma(\vec x) \Psi(\vec x) \right] = 0,$$ which is indeed satisfied because $\gamma(\vec x)$ is Hermitean.
It is again interesting to ask how the Hermitean matrix $\gamma(\vec x)$ emerges from the matrix $\lambda(\vec x)$ in the non-relativistic limit. Noting that the self-adjointness condition eq.(\[sadjnonrel\]) can also be expressed as $$\gamma(\vec x) \Psi(\vec x) + \vec n(\vec x) \cdot \vec \sigma \,
\vec \sigma \cdot \vec D \Psi(\vec x) =
\gamma(\vec x) \Psi(\vec x) + 2 m c \, i \vec n(\vec x) \cdot \vec \sigma
\lambda(\vec x) \Psi(\vec x) = 0,$$ one immediately identifies $$\gamma(\vec x) = - 2 m c \, i \, \vec n(\vec x) \cdot \vec \sigma
\lambda(\vec x).$$ Since $\vec n(\vec x) \cdot \vec \sigma \lambda(\vec x)$ is anti-Hermitean, the resulting matrix $\gamma(\vec x)$ is indeed Hermitean.
Domain Wall Fermions
====================
Using Shamir’s variant [@Sha93] of Kaplan’s domain wall fermions [@Kap92], let us imagine that our world has an additional hidden spatial dimension and that we live very near a perfectly reflecting flat domain wall. For simplicity, we first explore this idea in $(2+1)$-d and then extend it to $(4+1)$-d. Since there is no notion of chirality in odd space-time dimensions, it is natural to consider massive Dirac fermions.
Domain Wall Boundary Conditions in $(2+1)$-d
--------------------------------------------
Let us consider fermions moving freely along the $x_1$-direction and localized near a perfectly reflecting wall located at $x_3 = 0$ at very small positive values of $x_3$. We denote the two spatial coordinates by $x_1$ and $x_3$, while time is denoted by $x_0$. We would reserve $x_2$ for Euclidean time which, however, does not play a role in the present paper. Starting from the $\gamma$-matrices of eq.(\[gamma2d\]), it is more convenient to change to a chiral basis by performing the unitary transformation $$\begin{aligned}
&&\!\!\!\!\!\!\!\!\!\!\widetilde \gamma^0 = U \gamma^0 U^\dagger =
\left(\begin{array}{cc} 0 & 1 \\ 1 & 0 \end{array}\right), \quad
\widetilde \gamma^1 = U \gamma^1 U^\dagger =
\left(\begin{array}{cc} 0 & -1 \\ 1 & 0 \end{array}\right), \nonumber \\
&&\!\!\!\!\!\!\!\!\!\!\widetilde \gamma^3 = U \gamma^3 U^\dagger =
\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right), \quad
U = \frac{1}{\sqrt{2}}
\left(\begin{array}{cc} 1 & 1 \\ 1 & -1 \end{array}\right) = U^\dagger,
\nonumber \\
&&\!\!\!\!\!\!\!\!\!\!\widetilde \alpha =
\widetilde \gamma^0 \widetilde \gamma^1 =
\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right), \quad
\widetilde \beta = \widetilde \gamma^0 =
\left(\begin{array}{cc} 0 & 1 \\ 1 & 0 \end{array}\right), \quad
\widetilde \alpha^3 = - i \widetilde \gamma^0 \widetilde \gamma^3 =
i \left(\begin{array}{cc} 0 & 1 \\ -1 & 0 \end{array}\right). \nonumber \\ \,\end{aligned}$$ The domain wall fermion Hamiltonian then takes the form $$H = \widetilde \alpha p c + \widetilde \beta m c^2 + \widetilde \alpha^3 p_3 c =
\widetilde \alpha p c + \widetilde \beta m c^2 - i \widetilde \alpha^3 c {\partial}_3,$$ and the 3-component of the current is given by $$\begin{aligned}
j^3(x_1,x_3)&=&c \Psi(x_1,x_3)^\dagger \widetilde \alpha^3 \Psi(x_1,x_3)
\nonumber \\
&=&i c \left(\Psi_R(x_1,x_3)^*,\Psi_L(x_1,x_3)^*\right)
\left(\begin{array}{cc} 0 & 1 \\ -1 & 0 \end{array}\right)
\left(\begin{array}{c} \Psi_R(x_1,x_3) \\ \Psi_L(x_1,x_3) \end{array}\right).\end{aligned}$$ In complete analogy to the cases discussed before, the Hermiticity condition then reads $$\left(\chi_R(x_1,0)^*,\chi_L(x_1,0)^*\right)
\left(\begin{array}{cc} 0 & 1 \\ -1 & 0 \end{array}\right)
\left(\begin{array}{c} \Psi_R(x_1,0) \\ \Psi_L(x_1,0) \end{array}\right) = 0.$$ Introducing the self-adjointness condition $$\label{boundwall}
\Psi_R(x_1,0) = \eta \Psi_L(x_1,0),$$ the Hermiticity condition turns into $$\left(\chi_R(x_1,0)^* - \chi_L (x_1,0)^* \eta\right) \Psi_L(x_1,0) = 0 \
\Rightarrow \ \chi_R(x_1,0) = \eta^* \chi_L(x_1,0).$$ Thus, in order to ensure $D(H^\dagger) = D(H)$ and hence self-adjointness, we must demand $$\eta = \eta^* \in {{\mathbb{R}}}.$$ Since the boundary condition eq.(\[boundwall\]) couples left- and right-handed components, which transform differently under the $(1+1)$-d Lorentz group, it explicitly breaks $(1+1)$-d Lorentz invariance (unless $\eta = 0$ or $\pm \infty$).
The Dirac equation takes the form $$\left(\begin{array}{cc} p c & m c^2 + c {\partial}_3 \\ m c^2 - c {\partial}_3 & - p c
\end{array}\right)
\left(\begin{array}{c} \Psi_R(x_1,x_3) \\ \Psi_L(x_1,x_3) \end{array}\right) =
E \left(\begin{array}{c} \Psi_R(x_1,x_3) \\ \Psi_L(x_1,x_3) \end{array}\right).$$ Inserting the ansatz $$\Psi_R(x_1,x_3) = A_R \exp(i p x_1) \exp(- \varkappa x_3), \quad
\Psi_L(x_1,x_3) = A_L \exp(i p x_1) \exp(- \varkappa x_3),$$ for a state localized on the domain wall, the Dirac equation reduces to $$\left(\begin{array}{cc} p c & m c^2 - c \varkappa \\ m c^2 + c \varkappa &
- p c \end{array}\right) \left(\begin{array}{c} A_R \\ A_L \end{array}\right) =
E \left(\begin{array}{c} A_R \\ A_L \end{array}\right).$$ Imposing the boundary condition eq.(\[boundwall\]), one then obtains $$E = \frac{2 \eta}{1 + \eta^2} m c^2 -
\frac{1 - \eta^2}{1 + \eta^2} p c, \quad
c \varkappa = \frac{1 - \eta^2}{1 + \eta^2} m c^2 +
\frac{2 \eta}{1 + \eta^2} p c.$$ This is the energy-momentum dispersion relation of a fermion moving with the speed $$v = \left\vert\frac{1 - \eta^2}{1 + \eta^2}\right\vert c \leq c,$$ and coupled to a chemical potential $$\mu = \frac{2 \eta}{1 + \eta^2} m c^2.$$ Only for $\eta = 0$ or $\pm \infty$, one obtains $v = c$ and $\mu = 0$, as a consequence of $(1+1)$-d Lorentz invariance. It is important to note that normalizability of the state localized on the domain wall requires $\varkappa > 0$, which restricts the allowed range of $p$. Only for $\eta = 0$ or $\pm \infty$, there is no restriction and one obtains a relativistic massless left-handed domain wall fermion with $E = - p c$. This means that particles (i.e. positive energy states) are left-moving ($p < 0$) while anti-particles are right-moving.
Domain Wall Boundary Condition in $(4+1)$-d
-------------------------------------------
Let us now consider domain wall fermions in $(4+1)$-d localized near a perfectly reflecting wall located at $x_5 = 0$ at very small positive values of $x_5$. We denote the four spatial coordinates by $x_1, x_2, x_3$ and $x_5$, reserving $x_4$ for Euclidean time. In this case, the $\gamma$-matrices are given by eq.(\[gamma4d\]). Again, it is useful to change to a chiral basis $$\begin{aligned}
&&\!\!\!\!\!\!\!\!\!\!\widetilde \gamma^0 = U \gamma^0 U^\dagger =
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& {1\!\!1}\\ {1\!\!1}& {0\hspace{-1.65mm}0}\end{array}\right), \quad
\widetilde{\vec \gamma} = U \vec \gamma U^\dagger =
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& - \vec \sigma \\ \vec \sigma & {0\hspace{-1.65mm}0}\end{array}\right), \nonumber \\
&&\!\!\!\!\!\!\!\!\!\!\widetilde \gamma^5 = U \gamma^5 U^\dagger =
\left(\begin{array}{cc} {1\!\!1}& {0\hspace{-1.65mm}0}\\ {0\hspace{-1.65mm}0}& - {1\!\!1}\end{array}\right), \quad
U = \frac{1}{\sqrt{2}}
\left(\begin{array}{cc} {1\!\!1}& {1\!\!1}\\ {1\!\!1}& - {1\!\!1}\end{array}\right) = U^\dagger,
\nonumber \\
&&\!\!\!\!\!\!\!\!\!\!\widetilde{\vec \alpha} =
\widetilde \gamma^0 \widetilde{\vec \gamma} =
\left(\begin{array}{cc} \vec \sigma & {0\hspace{-1.65mm}0}\\ {0\hspace{-1.65mm}0}& - \vec \sigma
\end{array}\right), \quad
\widetilde \beta = \widetilde \gamma^0 =
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& {1\!\!1}\\ {1\!\!1}& {0\hspace{-1.65mm}0}\end{array}\right), \quad
\widetilde \alpha^5 = - i \widetilde \gamma^0 \widetilde \gamma^5 =
i \left(\begin{array}{cc} {0\hspace{-1.65mm}0}& {1\!\!1}\\ - {1\!\!1}& {0\hspace{-1.65mm}0}\end{array}\right).
\nonumber \\ \,\end{aligned}$$ The domain wall fermion Hamiltonian is now given by $$H = \widetilde{\vec \alpha} \cdot \vec p c + \widetilde \beta m c^2 +
\widetilde \alpha^5 p_5 c =
\widetilde{\vec \alpha} \cdot \vec p c + \widetilde \beta m c^2 - i
\widetilde \alpha^5 c {\partial}_5,$$ and the 5-component of the current takes the form $$\begin{aligned}
j^5(\vec x,x_5)&=&c \Psi(\vec x,x_5)^\dagger \widetilde \alpha^5 \Psi(\vec x,x_5)
\nonumber \\
&=&i c \left(\Psi_R(\vec x,x_5)^\dagger,\Psi_L(\vec x,x_5)^\dagger\right)
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& {1\!\!1}\\ - {1\!\!1}& {0\hspace{-1.65mm}0}\end{array}\right)
\left(\begin{array}{c} \Psi_R(\vec x,x_5) \\ \Psi_L(\vec x,x_5)
\end{array}\right),\end{aligned}$$ where $\Psi_R(\vec x,x_5)$ and $\Psi_L(\vec x,x_5)$ are 2-component Weyl spinors. The Hermiticity condition now reads $$\label{Hermitewall}
\left(\chi_R(\vec x,0)^\dagger,\chi_L(\vec x,0)^\dagger\right)
\left(\begin{array}{cc} {0\hspace{-1.65mm}0}& {1\!\!1}\\ - {1\!\!1}& {0\hspace{-1.65mm}0}\end{array}\right)
\left(\begin{array}{c} \Psi_R(\vec x,0) \\ \Psi_L(\vec x,0)
\end{array}\right) = 0,$$ and the self-adjointness condition takes the form $$\label{boundwall5}
\Psi_R(\vec x,0) = \eta \Psi_L(\vec x,0), \quad \eta \in GL(2,{{\mathbb{C}}}).$$ Inserting this in the Hermiticity condition eq.(\[Hermitewall\]), one obtains $$\left(\chi_R(\vec x,0)^\dagger - \chi_L (\vec x,0)^\dagger \eta\right)
\Psi_L(\vec x,0) = 0 \ \Rightarrow \ \chi_R(\vec x,0) = \eta^\dagger
\chi_L(\vec x,0).$$ In order to ensure $D(H^\dagger) = D(H)$, we must hence demand $$\eta = \eta^\dagger = \eta_0 {1\!\!1}+ \vec \eta \cdot \vec \sigma.$$ In this case, there is a 4-parameter family of self-adjoint extensions. For general $\eta$, the boundary condition explicitly breaks $(3+1)$-d Lorentz invariance, and for $\vec \eta \neq 0$ it even breaks 3-d spatial rotation invariance.
The Dirac equation now takes the form $$\left(\begin{array}{cc} \vec \sigma \cdot \vec p c & m c^2 + c {\partial}_5 \\
m c^2 - c {\partial}_5 & - \vec \sigma \cdot \vec p c \end{array}\right)
\left(\begin{array}{c} \Psi_R(\vec x,x_5) \\ \Psi_L(\vec x,x_5)
\end{array}\right) =
E \left(\begin{array}{c} \Psi_R(\vec x,x_5) \\ \Psi_L(\vec x,x_5)
\end{array}\right).$$ In analogy to the $(2+1)$-d case, we make the ansatz $$\Psi_R(\vec x,x_5) = A_R \exp(i \vec p \cdot \vec x) \exp(- \varkappa x_5),
\quad
\Psi_L(\vec x,x_5) = A_L \exp(i \vec p \cdot \vec x) \exp(- \varkappa x_5),$$ which reduces the Dirac equation to $$\left(\begin{array}{cc} \sigma_3 |\vec p \,| c & m c^2 - c \varkappa \\
m c^2 + c \varkappa & - \sigma_3 |\vec p \,| c \end{array}\right)
\left(\begin{array}{c} A'_R \\ A'_L \end{array}\right) =
E \left(\begin{array}{c} A'_R \\ A'_L \end{array}\right).$$ Here we have performed a unitary transformation $U(\vec p \,)$ to diagonalize $\vec \sigma \cdot \vec p$, i.e. $$U(\vec p \,) \vec \sigma \cdot \vec p \, U(\vec p \,)^\dagger =
|\vec p \,| \sigma_3,
\quad A'_R = U(\vec p \,) A_R, \quad A'_L = U(\vec p \,) A_L.$$ For simplicity, we now restrict ourselves to the rotation invariant case $\vec \eta = 0$, such that the boundary condition reduces to $A'_R = \eta_0 A'_L$ with $\eta_0 \in {{\mathbb{R}}}$. One then obtains $$E = \frac{2 \eta_0}{1 + \eta_0^2} m c^2 \mp
\frac{1 - \eta_0^2}{1 + \eta_0^2} |\vec p \,| c, \quad
c \varkappa = \frac{1 - \eta_0^2}{1 + \eta_0^2} m c^2 \pm
\frac{2 \eta_0}{1 + \eta_0^2} |\vec p \,| c.$$ Again, this is the dispersion relation of a massless fermion moving with the speed $$v = \left\vert\frac{1 - \eta_0^2}{1 + \eta_0^2}\right\vert c \leq c,$$ and coupled to a chemical potential $$\mu = \frac{2 \eta_0}{1 + \eta_0^2} m c^2.$$ The normalizability of the domain wall state requires $\varkappa > 0$ which again implies restrictions on $\vec p$. Only for $\eta_0 = 0$ or $\pm \infty$ there is no restriction and one obtains a relativistic massless left-handed domain wall fermion with $E = |\vec p \,| c$.
Conclusions
===========
While the results presented here are easy to derive, they seem not to constitute common knowledge in quantum mechanics. The theory of self-adjoint extensions is not only mathematically elegant, but also physically relevant. Therefore, we hope that our paper contributes to changing the view on elementary textbook problems such as the particle in a box. While it may not be appropriate to discuss the most general reflecting boundary condition in a first encounter with the Schrödinger equation, one might at least point out that other boundary conditions are possible as well.
Since the main purpose of this paper is of conceptual nature, we have not made an attempt to determine the value of the self-adjoint extension parameter $\gamma$ for actual quantum dots. In typical cases, $\gamma$ may be very large, so that the wave function practically vanishes at the boundary. However, there may be specific situations that lead to much smaller values of $\gamma$ and thus to quantitatively or even qualitatively different behavior, such as bound states localized at the wall of a quantum dot. It would certainly be interesting to investigate this in more detail. As a special case of the general uncertainty relation for non-Hermitean operators, we have derived a generalized uncertainty relation for the self-adjoint position and the non-Hermitean momentum operator in a quantum dot. Interestingly, additional boundary terms enter this relation. In particular, negative energy states, which may seem to be inconsistent with the uncertainty relation, are in perfect agreement with the generalized relation. Minimal uncertainty wave packets, which saturate the corresponding inequality and satisfy it as an equality, have been constructed as well. They are standard Gaussian wave packets, but require very special boundary conditions and thus generically do not exist. If the self-adjoint extension parameter $\gamma(\vec x)$ vanishes everywhere at the boundary, a constant wave function plays the role of a minimal uncertainty wave packet. Furthermore, we have shown that the spectrum depends monotonically on the self-adjoint extension parameter $\gamma$.
We have also applied the theory of self-adjoint extensions to theories of relativistic fermions described by the Dirac equation. In $(1+1)$ and $(3+1)$ dimensions, we have considered the most general perfectly reflecting boundary condition as a generalization of the one used in the MIT bag model. All these boundary conditions necessarily explicitly break chiral symmetry. This can be avoided in the chiral bag model were the axial current is carried by a pion field outside the bag. We have also discussed generalized domain wall fermion boundary conditions both in $(2+1)$ and in $(4+1)$ dimensions. The most general perfectly reflecting boundary condition explicitly breaks $(1+1)$-d or $(3+1)$-d Lorentz invariance or even 3-d spatial rotation invariance. A relativistic massless chiral fermion arises only for a particular choice of the self-adjoint extension parameters. For other values of the self-adjoint extension parameters, one obtains a fermion at non-zero chemical potential, with a linear energy-momentum dispersion relation, however, with a speed $v < c$.
We conclude this paper by expressing our hope that it may contribute to emphasizing the sometimes subtle differences between Hermiticity and self-adjointness also in the teaching of quantum mechanics.
Acknowledgments {#acknowledgments .unnumbered}
===============
We are indebted to F. Niedermayer and C. Tretter for very interesting discussions. We also like to thank V. Maz’ya and B. Plamenevsky for hints to the mathematical literature. This work is supported in parts by the Schweizerischer Nationalfonds (SNF).
[10]{}
J. von Neumann, Mathematische Grundlagen der Quantenmechanik, Berlin, Springer (1932).
G. Bonneau, J. Faraut, and G. Valent, Am. J. Phys. 69 (2001) 322.
A. Chodos, R. L. Jaffe, K. Johnson, C. B. Thorn, V. F. Weisskopf, Phys. Rev. D9 (1974) 3471.
A. Chodos, R. L. Jaffe, K. Johnson, C. B. Thorn, Phys. Rev. D10 (1974) 2599.
P. Hasenfratz and J. Kuti, Phys. Rept. 40 (1978) 75.
V. S. Araujo, F. A. B. Coutinho, and J. F. Perez, Am. J. Phys. 72 (2004) 203.
M. Carreau and E. Farhi, Phys. Rev. D42 (1990) 1194.
P. Garbaczewski and W. Karwowski, Am. J. Phys. 72 (2004) 924.
N. C. Dias, A. Posilicano, and J. N. Prata, arXiv:0707.0948.
V. I. Gorbachuk and M. L. Gorbachuk, Boundary value problems for operator differential equations, Kluwer (1991).
C. L. Fefferman, Am. Math. Soc. 9 (1993) 129.
L. Escauriaza, C. E. Kenig, G. Ponce, and L. Vega, Duke Math. J. 155 (2010) 163.
A. Wipf and S. Dürr, Nucl. Phys. B443 (1995) 201.
P. Harrison, Quantum wells, wires and dots, John Wiley and Sons Ltd. (2005).
V. Alonso and S. De Vincenzo, J. Phys. A: Math. Gen. 30 (1997) 8573.
T. Inoue and T. Maskawa, Prog. Theor. Phys. 54 (1975) 1833.
G. E. Brown and M. Rho, Phys. Lett. 82 (1979) 177.
Y. Shamir, Nucl. Phys. B406 (1993) 90.
D. B. Kaplan, Phys. Lett. B288 (1992) 342.
[^1]: We like to thank F. Niedermayer for suggesting this construction.
|
[Cardioprotective capabilities of drug meldonium in secondary prevention after percutaneous coronary intervention in patients with documented myocardial ischemia].
The purpose of research — analysis of capabilities in cytoprotective drug mеldonium, in complex in the cardioprotective effect of secondary prevention after percutaneous coronary intervention (PCI). Patients with stable coronary heart disease (n=35 ) aged ≤65 years with incomplete revascularization at 6 months after PCI and positive exercise test (SFI) were randomized 1:1 to groups controlled physical training (CPT) with intensity 80% and a duration of 2 weeks (10 SFI): group 1 (n=17; 53,9±6,2 years) and group 2 (n=18; 56,1±4,8 years). Patients in Group 1, in addition to SFI mеldonium administered at a dose of 1000 mg/ml intravenously. In the 1st group on the background mеldonium adjunctive therapy showed a significant increase in the duration from 15±2 to 32±7 min for the 10th CPT (p<0.05). Index of maximum oxygen consumption after 10 intense CPT increased to 20.8±1.06 ml/kg/min compared to baseline (18.6±1.1 ml/kg/min, p<0.05) and the control group (18.5±1.5 ml/kg/min, p<0.05). Use of meldonium was also associated with decrease of maximum ST-segment depression (from -0.18±0.1 to 0.10±0.2 mV), increases of exercise duration (from 364±22 to 556±29 s) threshold heart rate (from 118±12 to 132±5 bpm), decrease of time of ST segment recovery to baseline (from 385±32 to 242±22 s, p<0.05). Final level of free fatty acids in the meldonium group was significantly lower than that in the control group (0.248±0.047 vs. 0.265±0.031 mg/dl). Inclusion of meldonium in complex treatment after PCI potentiates cardioprotective effect of intensive CPT as evidenced by the positive dynamics of ECG and biochemical markers of myocardial ischemia. |
Q:
firebase admin with node.js: update in nested JSON tree
I use the below code on my Node.js admin server to retrieve data from my JSON tree, which works fine and prints the content of all snapshot2's to the console.
ref.once("value", function(snapshot0) {
snapshot0.forEach( function(snapshot1) {
snapshot1.child("Food").forEach( function(snapshot2) {
console.log(snapshot2.val());
});
});
});
However, how can I edit the data held at snapshot2?
If I try to call e.g.
snapshot2.update({250:42})
then it gives me the following error:
TypeError: snapshot2.update is not a function
I am really confused and think this must be a problem many people have?
A:
You cannot update a snapshot. but you can update a reference, and you can get reference from snapshot by doing
snapshot.ref
, then you can do this to update
snapshot.ref.update({250:42})
|
Benefits of Continuous Guttering
Continuous guttering is rollformed on site and cut to the exact required length which means there are no ugly leaking lap joins and no costly waste. They are join free and seamless from corner to corner. They will never need painting and are covered by a written perforation and external paint finish warranty. |
/*
* (c) Copyright 2020 Palantir Technologies Inc. All rights reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.palantir.lock.watch;
import java.util.OptionalLong;
import java.util.UUID;
import com.palantir.common.annotation.Idempotent;
import com.palantir.lock.LockDescriptor;
public interface VersionedLockWatchState {
/**
* The last known log version that was used to build this lock watch state.
*/
OptionalLong version();
/**
* The id of the timelock leader that the lock watch state is associated with.
*/
UUID leaderId();
/**
* Given a lockDescriptor, returns the associated lock watch info given the current lock watch state.
*/
@Idempotent
LockWatchInfo lockWatchState(LockDescriptor lockDescriptor);
/**
* Returns the last update that was used to create this state.
*/
LockWatchStateUpdate lastUpdate();
}
|
/* swc: swc/internal.h
*
* Copyright (c) 2013-2019 Michael Forney
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#ifndef SWC_INTERNAL_H
#define SWC_INTERNAL_H
#include <wayland-server.h>
#include <stdbool.h>
enum {
SWC_EVENT_ACTIVATED,
SWC_EVENT_DEACTIVATED,
};
struct swc {
struct wl_display *display;
struct wl_event_loop *event_loop;
const struct swc_manager *manager;
struct wl_signal event_signal;
bool active;
struct swc_seat *seat;
const struct swc_bindings *const bindings;
struct wl_list screens;
struct swc_compositor *const compositor;
struct swc_shm *shm;
struct swc_drm *const drm;
struct wl_global *data_device_manager;
struct wl_global *kde_decoration_manager;
struct wl_global *panel_manager;
struct wl_global *shell;
struct wl_global *subcompositor;
struct wl_global *xdg_decoration_manager;
struct wl_global *xdg_shell;
#ifdef ENABLE_XWAYLAND
const struct swc_xserver *const xserver;
#endif
};
extern struct swc swc;
void swc_activate(void);
void swc_deactivate(void);
#endif
|
Q:
WinApi compression, decompression in python3
I have a small client application designed to run on windows machines. It is written in C/C++ (more in C). I want to keep it small and therefore I would prefer not to use external libraries and stick to WinAPI on client side.
On the other hand I have a backend server which is implemented in python3. Here I'm happy to use any existing lib. Now I want to add compression layer to increase transfer speed. The problem I've encountered is that it seems that WinAPI provides only:
// source: https://docs.microsoft.com/en-us/windows/win32/cmpapi/using-the-compression-api
XPRESS
XPRESS with Huffman encoding
MSZIP
LZMS
which seem to be a unique Microsoft compression algorithm implementation and I cannot find a way to decompress the data on the server side in python3.
Is there anything I am missing? I would love to hear some solutions:)
Thanks in advance
UPDATE
I've decided to use zlib https://zlib.net/ as suggested in the comment. The answer suggesting using ctypes was also very interesting, but unfortenately my backend is running on UNIX system.
As I am compiling my client part agains Multi-threaded CRT (and not DLL) I had some problems as zlib is being linked agains the Muli-threaded DLL. If anyone has enountered such issue, I have found a great and super simple solution here: https://yongweiwu.wordpress.com/2017/10/02/a-journey-of-purely-static-linking/
I will copy-paste it here:
zlib
This part requires a small change to the build script (for version 1.2.11).
I need to open win32\Makefile.msc and change all occurrences of ‘-MD’ to ‘-MT’.
Then these commands will work:
nmake -f win32\Makefile.msc zlib.lib
A:
I found this Python script, and reverse-engineered it to produce a quick library to handle WinAPI Compression/Decompression. Basically, you can just use ctypes and call the WinAPI from Python. Please keep in mind that I haven't extensively tested this, but it should give you a pretty good place to start :)
EDIT: As requested, I've included the implementations of the compress and decompress functions in case the links ever go down.
def compress(UncompressedBuffer, UncompressedBufferSize, Format, Engine):
CompressedBuffer = (ctypes.c_ubyte * UncompressedBufferSize)()
CompressionFormatAndEngine = ctypes.c_uint16(Format.value | Engine.value)
CompressBufferWorkSpaceSize = ctypes.c_uint32()
CompressFragmentWorkSpaceSize = ctypes.c_uint32()
WorkSpace = (CompressFragmentWorkSpaceSize.value * ctypes.c_ubyte)()
FinalCompressedSize = ctypes.c_uint32()
WinDLLCall(RtlGetCompressionWorkSpaceSize,
CompressionFormatAndEngine,
ctypes.byref(CompressBufferWorkSpaceSize),
ctypes.byref(CompressFragmentWorkSpaceSize))
WinDLLCall(RtlCompressBuffer,
CompressionFormatAndEngine,
ctypes.byref(UncompressedBuffer),
ctypes.c_uint32(UncompressedBufferSize),
ctypes.byref(CompressedBuffer),
ctypes.c_uint32(UncompressedBufferSize),
UncompressedChunkSize,
ctypes.byref(FinalCompressedSize),
ctypes.byref(WorkSpace))
return CompressedBuffer, FinalCompressedSize
def decompress(CompressedBuffer, CompressedBufferSize, UncompressedBufferSize, Format):
UncompressedBuffer = (ctypes.c_ubyte * UncompressedBufferSize)()
FinalUncompressedSize = ctypes.c_uint32()
WinDLLCall(RtlDecompressBuffer,
Format,
ctypes.byref(UncompressedBuffer),
ctypes.c_uint32(UncompressedBufferSize),
ctypes.byref(CompressedBuffer),
ctypes.c_uint32(CompressedBufferSize),
ctypes.byref(FinalUncompressedSize))
return UncompressedBuffer, FinalUncompressedSize
The WinAPI functions are loaded with the following code:
import ctypes
RtlDecompressBuffer = ctypes.windll.ntdll.RtlDecompressBuffer
RtlCompressBuffer = ctypes.windll.ntdll.RtlCompressBuffer
RtlGetCompressionWorkSpaceSize = ctypes.windll.ntdll.RtlGetCompressionWorkSpaceSize
Here are some other useful resources if you end up tinkering around:
WinAPI Compress/Decompress Documentation: https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/ntifs/nf-ntifs-rtlcompressbuffer
Header File: https://github.com/tpn/winsdk-10/blob/master/Include/10.0.14393.0/km/ntifs.h
Status Codes: https://github.com/tpn/winsdk-10/blob/master/Include/10.0.10240.0/shared/ntstatus.h
|
An unusual cause of epidemic thyrotoxicosis.
We describe the case of four patients consulting for headache and tachycardia of brutal onset. Their biological data were compatible with primary hyperthyroidism with low TSH and high T4 serum levels. Serum thyroglobulin level was low and Tc-scintigraphy showed decreased uptake with a homogenous pattern. These results allowed to conclude a thyrotoxicosis caused by thyroid hormones intake. History taking revealed consumption of beef neck meat containing all or parts of the bovine thyroid gland. Evolution was favourable with beta-blockers. A literature review of « hamburger thyrotoxicosis » is presented. |
Q:
URL field inherited despite separate cross reference item
The following code produces a list of references that contains the URL three times. I use crossreferencing to save space. Is there a way to get rid of the URL in the entries that refere to a main entry?
\documentclass{article}
\usepackage{natbib}
\usepackage{url}
\begin{document}
\citet{Flickinger2008a,VanEynde2008a}
\bibliographystyle{plainnat}
\bibliography{test}
\end{document}
test.bib:
@inproceedings{Flickinger2008a,
Author = {Daniel P. Flickinger},
Crossref = {Mueller2008a-ed},
Title = {Transparent Heads}}
@inproceedings{VanEynde2008a,
Author = {Frank {Van Eynde}},
Crossref = {Mueller2008a-ed},
Pages = {253--273},
Title = {Predicate Complements}}
@proceedings{Mueller2008a-ed,
Booktitle = {Proceedings of the 15th International Conference on Head-Driven Phrase Structure Grammar},
Editor = {Stefan M{\"u}ller},
Title = {Proceedings of the 15th International Conference on Head-Driven Phrase Structure Grammar},
Url = {http://cslipublications.stanford.edu/HPSG/9/},
Year = {2008}}
A:
This seems to be a design decision in the plainnat style. I get no URL for the @inproceedings entries if I modify plainnat.bst to have the following inproceedings function:
FUNCTION {inproceedings}
{ output.bibitem
format.authors "author" output.check
author format.key output
new.block
format.title "title" output.check
new.block
crossref missing$
{ format.in.ed.booktitle "booktitle" output.check
format.bvolume output
format.number.series output
format.pages output
address empty$
{ organization publisher new.sentence.checkb
organization output
publisher output
format.date "year" output.check
}
{ address output.nonnull
format.date "year" output.check
new.sentence
organization output
publisher output
}
if$
format.isbn output
format.doi output
format.url output
}
{ format.incoll.inproc.crossref output.nonnull
format.pages output
}
if$
% format.isbn output
% format.doi output
% format.url output
new.block
note output
fin.entry
}
The commented out lines are responsible for adding the isbn, doi and url fields and have been moved in the "false" branch of the test crossref missing$, so that @inproceedings entries without a crossref field will get the URL.
As usual, you should make a copy of plainnat.bst under a new name, say myplainnat.bst. Similar modifications should be made to the inbook and incollection functions.
|
Viburnum tinus
Viburnum tinus (laurustinus or laurustine) is a species of flowering plant in the family Adoxaceae, native to the Mediterranean area of Europe and North Africa. Laurus signifies the leaves' similarities to bay laurel.
Description
It is a shrub (rarely a small tree) reaching tall and broad, with a dense, rounded crown. The leaves are evergreen, persisting 2–3 years, ovate to elliptic, borne in opposite pairs, 4–10 cm long and 2–4 cm broad, with an entire margin. The flowers are small, white or light pink, produced from reddish-pink buds in dense cymes 5–10 cm diameter in the winter. The fragrant flowers are bisexual and pentamerous. The flowering period is from October to June. Pollination is by insects. The fruit is a dark blue-black drupe 5–7 mm long.
There are three subspecies:
Viburnum tinus subsp. tinus. Mediterranean region.
Viburnum tinus subsp. rigidum (syn. V. rigidum). Canary Islands.
Viburnum tinus subsp. subcordatum. Azores.
Leaves have domatia where predatory and microbivorous mites can be housed.
Habitat
It grows mainly in the Mediterranean maquis and in oak forests. It prefers shady, moist areas, at an altitude of above sea level.
Cultivation
Viburnum tinus is widely cultivated for its winter blooms and metallic blue berries. It is hardy down to . The cultivars ‘Eve Price’, ‘French White’ and ‘Gwenllian’ have gained the Royal Horticultural Society’s Award of Garden Merit.
Other uses
V. tinus has a very beneficial medicinal property. The active ingredients are viburnin (a substance or more probably a mixture of compounds) and tannins. Tannins can cause stomach upset. The leaves when infused have antipyretic properties. The fruits have been used as purgatives against constipation. The tincture has been used lately in herbal medicine as a remedy for depression. The plant also contains iridoid glucosides.
Pests
In south-east Britain Viburnum tinus is the principal host of the viburnum beetle (Pyrrhalta viburni), the country's "number one pest species" according to the Royal Horticultural Society.
References
External links
Flora Europaea: Viburnum tinus
Eriksson, O., et al. 1979. Flora of Macaronesia: checklist of vascular plants
Pignatti S. - Flora d'Italia – Edagricole – 1982, Vol. II, pag. 639
Biolib
Viburnum tinus
Gallery
tinus
Category:Medicinal plants
Category:Garden plants
Category:Plants described in 1753
Category:Taxa named by Carl Linnaeus |
If there was ever a man who was driving to earn a seat, it was Jean-Éric Vergne this weekend at Formula E. He may have been taken out of contention due to a suspension failure, but taking pole and battling for the lead in his Formula E debut says one thing to his ex-team in F1:PFFFFFFFFTTTTT!»12/14/14 9:04am 12/14/14 9:04am
Today marked the beginning of the all-electric open-wheel racing series, Formula E, and holy crap did it get off with a bang. Though that banging just may have been the sound of Nick Heidfeld's car smacking a curb, a barrier, and flipping onto its roof in a whole bunch of pieces. »9/13/14 9:16am 9/13/14 9:16am
Up until now, we've seen Formula E cars running in low power mode, with output limited to around 178 hp, like it is during a race. Now we get to see a lap with the dial cranked, and even better, we get it from the driver's perspective. »7/14/14 8:53pm 7/14/14 8:53pm
Imagine if you took a high powered one-tenth scale electric car and blew it up to full size? And then what if you did a standing start with them? This is the first standing start for Formula E, and though they aren't engines, they just sound rad. »7/04/14 12:30pm 7/04/14 12:30pm
Top Gear got an exclusive go-round in one of the first Formula E prototypes, and that included a very specific exiting procedure to avoid frying the driver if the battery fails. »6/20/14 2:48pm 6/20/14 2:48pm
[Jarno Trulli recently announced he is to form and manage a new team for the FIA Formula E Championship – entitled TrulliGP Formula E Team – with which he will race in the unique all-electric series.]»6/19/14 5:15pm 6/19/14 5:15pm
All that energy we waste screaming at the screen when our favorite racer gets passed on the final straight is about to be put to good use. It's called "tweet to boost" and I'm not sure if it's brilliant or blasphemy. »6/04/14 3:56pm 6/04/14 3:56pm
Some say that his helmet is sewn to his face, and that his underwear is actually a suit of bees. All we know is that Ben Collins' white Stig was (is?) the best part of the BBC's Top Gear. Now, with Collins' addition to the Formula E roster, the inaugural season of Formula E racing is really starting to look exciting! »2/15/14 1:24pm 2/15/14 1:24pm |
A state judge has slammed the door on a legal challenge by opponents of Uber, clearing the way for the rideshare giant to run traditional taxis off the road.
In a decision unveiled Wednesday, Queens Supreme Court Justice Allan Weiss ruled that for-hire vehicles could use electronic hails to compete with yellow cabs—something they have been doing well enough to threaten the existence of the iconic 80-year-old industry.
If that means yellow-cab medallions worth a collective $10 billion or so just two years ago become worthless, the judge suggested, so be it.
“Any expectation that the medallion would function as a shield against the rapid technological advances of the modern world would not have been reasonable,” he wrote. “In this day and age, even with public utilities, investors must always be wary of new forms of competition arising from technological developments.”
The plaintiffs, led by four Queens credit unions who lent heavily to medallion buyers, plan to appeal.
“In the meantime, however, a catastrophe is unfolding, as an entire industry continues to be illegally destroyed, while elected officials allow it to happen on their watch,” their lawyer Todd Higgins said in a statement that apparently referred to defendants Mayor Bill de Blasio and Attorney General Eric Schneiderman. “It is a stunning abdication of leadership and responsibility that will haunt New York City for years to come.”
The “catastrophe” he cited is the possible slew of loan defaults in the coming months if owners stop making payments on medallions that have plunged in value since peaking at more than $1 million and don’t generate enough income for the borrowers to repay their debts. No medallions have been sold since February, when two went for $700,000 each. A wave of foreclosure auctions could reveal that the market now considers medallions to be worth substantially less, which could trigger more defaults and auctions—a so-called death spiral.
Judge Weiss made clear that that’s not his concern. “It is not the court’s function to adjust the competing political and economic interests disturbed by the introduction of Uber-type apps,” he wrote.
Uber was not a defendant in the lawsuit, which sought to compel the city’s Taxi and Limousine Commission and the attorney general to stop livery cars from scooping up passengers who hail them from the street using smartphones. But the de Blasio administration defended Uber’s interests by arguing that e-hails are pre-arranged travel, which does not require a taxi medallion. The judge said it was regulators' right to make that determination, and that e-hails are not the same as street hails made by lifting one's arm or whistling.
Taxi and Limousine Commission Chairwoman Meera Joshi said, “This decision is a victory for the riding public, and leaves no question as to the appropriateness of our regulatory approach to app-dispatched services. Passengers will remain free to continue to enjoy the many transportation options available to them."
Earlier this summer, Uber had fought with the commission and Mr. de Blasio over their proposal to cap rideshare companies' growth in the city while a study of their effect on traffic was conducted. The plan was tabled by the City Council after a public-relations blitz by Uber and the company's agreement to turn over trip data the administration wanted.
Uber's e-hail app reached the city in 2011, but it was in mid 2014 that the company took off, heavily recruiting drivers and flooding the streets with 20,000 vehicles that could respond to Manhattan smartphone hails within two minutes. Taxi revenues began to sag, and some of the 13,000-plus yellow cabs sat idle for entire shifts for lack of drivers.
Melrose Credit Union, which has 78% of its loan portfolio tied to medallions, and three other lenders filed their suit in May and sought an injunction to stop Uber, arguing that they would suffer irreparable harm if nothing was done while the case proceeded. The case was combined with two other lawsuits from medallion owners, taxi drivers, leasing agents and other yellow-cab interests. The ruling was far worse than they expected: not only no injunction, but outright dismissal of the case.
"We are pleased that the court found that the city has acted appropriately in its regulatory approach to this technological innovation—electronic apps for dispatch in the for hire vehicles—which are separate and distinct from traditional street hails," said Michelle Goldberg-Cahn, the city lawyer who handled the case, in a statement.
Unless the suit is reinstated on appeal, the plaintiffs’ predictions of doom will be tested. Taxi trips and revenues have dipped but not plummeted, and medallion values could stabilize in the way that the housing market did after the 2008 crash. Yellow cabs have a new, exclusive app of their own called Arro, which their owners hope will catch on. Even Uber executives have said repeatedly that there will always be a place for yellow cabs in New York City.
But with technology shortening waits for liveries and black cars, and the cost of entry being so much less for yellow cabs’ rivals, medallion owners might have to continue reducing the price of leasing their cabs in order to attract drivers. Only a few years ago, competition to drive taxis was so intense that drivers sometimes bribed leasing agents for the right to rent cabs while also paying the maximum lease rate allowed by city regulators. Now so many taxis are idle that some garages don’t have room for them all, prompting complaints from nearby residents about cabs hogging street parking. |
David Cameron Losing Allies in Anti-Juncker Campaign
The opposition to Jean-Claude Juncker’s European Commission President candidacy is increasingly waning, much to the disliking of UK Prime Minister David Cameron.
Italy was seen as Cameron’s strong ally in voting against Juncker’s nomination, but it now seems as though Prime Minister Matteo Renzi could be heading in another direction. On Wednesday, he met with European Council President Herman Van Rompuy, where the two reportedly discussed next week’s EU summit for designating an EC presidential candidate.
Renzi’s demands are that the next Commission will focus on reforms that would move away from the austerity policies. He did not, however, clarify his position on Juncker.
Two of Cameron’s other allies in the anti-Juncker campaign, the Netherlands and Sweden, are also softening to the prospect of the ex-Luxembourg Prime Minister’s nomination and “do not rule it out as a possibility”, EurActiv informed.
Both the Dutch and Swedish Prime Ministers were cautious in their latest comments, saying that the content of the upcoming discussions will be far more important than the names put forward.
German Chancellor Angela Merkel, a supporter of Juncker’s candidacy, has criticized Cameron’s approach and is hoping for a sooner decision, in order to avoid an institutional crisis in Brussels.
Search
Keyword:
Search
Share:
Bulgaria news
Novinite.com (Sofia News Agency - www.sofianewsagency.com) is unique with being a real time news provider in English that informs its readers about the latest Bulgarian news. The editorial staff also publishes a daily online newspaper "Sofia Morning News."
Novinite.com (Sofia News Agency - www.sofianewsagency.com) and Sofia Morning News publish the latest economic, political and cultural news that take place in Bulgaria.
Foreign media analysis on Bulgaria and World News in Brief are also part of the web site and the online newspaper.
News Bulgaria |
Tottenham Hotspur: 10 Reasons to Hate Arsenal on Derby Day
The North London Derby is easily one of the most hate-filled, animosity-driven rivalries in the modern world of football. But it's also a rivalry with deep roots and a long, long history dating back to the early years of the 20th century.
Most of that history has been forgotten by the younger generations of Tottenham supporters, so in the spirit of the North London Derby I'm teaming up with Arsenal featured columnist Charlie Melman to remind the fans just why we hate each other in the first place.
While putting this together, it occurred to me that Charlie and I represent two sides of a regionally derived rivalry existing in a city thousands of miles away from either of us, regarding two clubs that exist just four miles apart. Meanwhile, we live 3000 miles from each other, and are planning to express both sides of that rivalry as intensely as anybody who resides right in the heart of it.
A bit odd, when you think about it. But as Charlie himself pointed out following my mindless musings of the absurdity of our situations, "that's the magic of football."
Still, our support for our clubs, I assure you, is just as heartfelt as anybody's in the city of London itself.
Territory Invasion
Between 1882 and 1913, North London belonged to Tottenham. There was some competition, of course, since Clapton Orient also had their roots in the area, but Tottenham's early success in the league and popularity amongst regional supporters made the region undisputedly theirs.
That is, until Arsenal decided to move in just four miles next door.
Both Tottenham and Clapton immediately protested the move, fearing the dilution of their fan bases and simply seeing no reason for Arsenal to need to be there.
But the protests fell on deaf ears in the Football League, as some alleged shady dealings and strategic friendships between Arsenal's owner and the governing body allowed Arsenal to invade Tottenham's territory, with little to no resistance from anybody who could realistically stop it.
To this day, Spurs share North London with Arsenal, but not exactly in the friendly sort of way. As far as the original North Londoners are concerned, the invaders are an uninvited nuisance that has no right to be there.
They Never Earned Their Right to Be in the Top Tier
Following the first world war, the Football League decided to expand the first division from 20 clubs to 22.
In the last season before the war began, Arsenal finished fifth in the second division, but managed to convince the league that the top two second division sides should move up, and a vote should take place to determine whether or not another second division side should move up with them.
Instead of just promoting the third place organization from the second division, the league went with Arsenal's idea. Through more alleged shady dealings, the fifth best club in the second division was promoted to the top tier, because counting is hard.
Arsenal never earned their right to play in the first division, and they have never been relegated since that vote.
Essentially, they are that guy who snuck into your house party when nobody was looking, didn't leave for 100 years, and wouldn't stop complaining that you didn't put Robin van Persie on your list of EPL's best penalty takers, despite his statistically unremarkable conversion rate.
They Kicked Spurs out of the First Division
There's one thing that I failed to mention in the last slide. When Arsenal, the fifth best club in the second division, sweet-talked their way into a permanent promotion that they never earned, one club from the top tier had to be relegated to accommodate the divisional restructuring.
Just six years after (allegedly) gaming the system to make an invasion of Tottenham's territory totally cool with every league official Arsenal (allegedly) paid off, they were already scheming to kick Spurs out of the division entirely.
As for Tottenham, the club won the second division title in their first go at it with a record number of points, thus earning their right to be in the first division as legitimately as possible. And no money had to change hands behind closed doors to make it happen, either.
They Kicked Spurs out of the First Division...Again!
In the 1927-28 season, Arsenal were hovering around the middle of the league table with Tottenham Hotspur flirting dangerously with the relegation zone.
Since Arsenal was still far away from any hope of winning the league, and there wasn't any real benefit at that point in finishing the season in any spot other than first place, what were the Gunners to do when the season began to come to a close?
The answer: mess with their North London rivals, of course!
Rumor has it that Arsenal intentionally lost two matches at the end of the season to give Burnley and Portsmouth an edge over Spurs in the final tally, leaving Tottenham to relegation once again as the second-to-last club in the division.
Tottenham didn't earn their ticket back into the top tier for another five seasons following the relegation. The second time that they fought their way from being forced into relegation by alleged Arsenal scheming happened to come in the same season that Arsenal won the league they never deserved to play in for the second time in their existence.
Having the Nerve to Play at White Hart Lane During the War
In the midst of the second world war, Arsenal's Highbury Stadium was requisitioned for use as an air raid precautions facility. Despite this, football continued to be played, leaving Arsenal without a grounds to use for their home fixtures.
With nowhere to turn, they went knocking on White Hart Lane's door.
To truly understand the nerve of this request, imagine that that you just found out that your neighbor found a legal loophole to claim half of your property as his own. Six years later, he comes to visit just to kick you in the groin. Eight years after that, he kicks you in the groin again, just for fun. And then another decade after that, he shows up at your house and says "Germany wants to bomb my house, can I stay with you?"
Of course, Tottenham said ok and allowed Arsenal to play their home matches at White Hart Lane while Highbury was under government control. Because that's the type of organization that Tottenham always has been and always will be.
One-Nil to the Arsenal
Arsenal may be well known for playing very attractive, attack-minded football in modern times, paving the way for the recruitment of legions of fans around the world who follow them for the simply joy of seeing them score goals and lots of them.
But that was not always the case. Decades ago, Arsenal was known for playing the exact opposite variety of football: boring, defensive crap.
The style had a way of infuriating fans of the game who thought it was cheap and entirely uninteresting to watch, and it was even more infuriating when it worked and saw Arsenal winning by narrow scorelines and securing Championships.
To add to the frustrations of opposing sides, Gooners came up with a fun little way to gloat about their success in utilizing the most boring tactics imaginable in the game: a chant called "One-nil to the Arsenal."
Like the tactics themselves, the chant was entirely uninspired, with lyrics consisting of "one-nil to the Arsenal" repeated over and over again. Clever.
St. Totteringham's Day
It's one thing to consistently finish above your local rivals (whose territory you stole) in the league (which you never earned the right to play in), and it's another thing entirely to shove that fact into the faces of Spurs fans—after scheming to kick them out of the league twice and then using their facilities during difficult war times.
That doesn't bother Arsenal though, who created a holiday just for presenting a giant middle finger to White Hart Lane on an annual basis.
St. Totteringham's day is a versatile holiday, almost never occurring on the same day of the year twice. Namely, it is celebrated on the exact day that Arsenal is mathematically assured to finish ahead of Tottenham in the league.
Of course, they do this to every side when they've clinched a superior spot in the final table, right? Nope, just the club that said "of course you can you use our facilities while your stadium gets bombed!"
Stealing Players
Mike Hewitt/Getty Images
Transfers occur all the time in the world of football, usually to little or no fan reaction or negative response. But when Arsenal manages to land a player from White Hart Lane, it always seems—well—sleazy.
It's a rare occurrence for a Spurs player to ever find forgiveness amongst the supporters when crossing the line to the rival side. One such player to make the switch was Sol Campbell in the early 21st century, when his contract expired amidst months of reassurances that he would gladly stay with the club.
His assurances led Spurs to avoid selling him and making a profit, because he was totally going to stick around, right? Instead, his contract expired, and Arsenal wooed him into their ranks with promises of European football and league titles on a free transfer.
Campbell turned down a contract that would have made him the highest paid player in Spurs history to do it, too.
And now Arsenal are rumored to be after Tottenham favorite Rafael van der Vaart in the January transfer window? These guys are shameless.
Just Because
Sure, there are plenty of reasons to hate on Arsenal when derby day comes around at White Hart Lane, many extending decades back before most of us were born.
Those stories and legends have been passed down among the generations in North London, but it's difficult to truly feel the same degree of animosity that the forefathers of modern Tottenham supporters felt in the early 20th century.
These days, the hatred exists largely for the same reasons that most regionally-derived rivalries around the world exist: just because.
And that's fine. It works most everywhere else in the world, and it works just fine in North London.
It's a hatred derived from mostly harmless bickering amongst family members and coworkers supporting two different clubs that happen to exist just a bit too close to one another.
The historically-derived justifications for hating Arsenal are still as valid as ever, but what's wrong with Spurs fans and Arsenal fans who know nothing about those histories just hating each other because they hate each other?
Those Dreadful, Dreadful Fans
Shaun Botterill/Getty Images
I can assure you that Tottenham supporters are hardly alone in being entirely fed up with the egotistical nature of Gooners in modern times, but few truly rival the degree to which we loathe Arsenal fans in this day and age.
Gooners are quite the frustrating bunch, really. Entirely unabashed regarding their club's true right to play in the Premier League after scheming their way in nearly a century ago. Completely delusional about where their side truly ranks among the league's best, remarkably clueless in so many cases regarding their club's own history.
Arsenal certainly has a rather extensive legion of international fans around the world, often criticized for being glory hunters and fair-weather supporters, keen to jump ship the day the Gunners fail to secure Champions League football.
Charlie, like most Arsenal fans, boasts some of the most impressively potent body odor you'll ever encounter in your daily life, but he has assured me that the smell almost never makes its way through digital media networks. And I assure you, his talent with the written word and humorous nature entirely make up for it if it does. |
Hisseo
Hisseo is a
collaborative research project to
explore the issues related to the compilation of floating-point
programs.
Abstract
Thanks to widespread hardware support, IEEE 754 floating-point
computations are increasingly finding their way into embedded C code,
and in particular into critical embedded C code.
Floating-point computations are notorious for the traps they lay on
the programmer's path. The programmer who uses them should be aware
that the result of a floating point operation is (depending on the
rounding mode and on the operation itself) only one of the real
numbers that can be represented as a floating-point number and that
approximates more or less closely the actual result (as computed in
the reals). In the worse cases, these approximations may accumulate
and compound each other to the point that the final result obtained
with floating-point computations is meaningless.
The Hisseo project (that started in October 2008) does not intend to
tackle these issues, which are being adressed elsewhere. The Hisseo
project will focus on the problems related to the treatment of
floating-point computations in the compilation process, especially in
the case of the compilation of critical C code.
Trusting compiled floating-point computations?
The compilation of IEEE 754 computations in a C program was not
defined univocally until the C99 standard, and as of 2008, many
compilers still implement the loose semantics of the previous standard
(the previous standard allows reordering floating-point operations as
if they were associative, when they aren't. The C99 standard mandates
left-to-right ordering). Compiler makers focus on performance, and are
not in a hurry to implement a subpart of the standard that removes
optimization opportunities.
This situation is unlikely to improve quickly, because the majority
of programmers are not concerned by details of this level.
Instruction sets of several popular architectures create performance
penalties for trying to do the right thing. Processor designers try
to get an edge over the competition by introducing ``improved''
floating-point instructions in their architectures. Architectures
evolve very slowly (new models of processors come out all the time,
but they have to be compatible with previous models). The historical
Intel 8087 floating-point coprocessor introduced a 80-bit format that
causes ``double rounding'' problems for the float
and double C types. The PowerPC introduced a Floating
Multiply-Add instruction which does not always produce the same result
as a a multiplication followed by an addition.
The processor designers mean well! 80 bits is more precise than 32
or 64. The fmadd instruction introduces less rounding than a
multiplication followed by an addition. But, because it is impossible
to guess whether the compiler will be able to keep the results in
80-bit registers or use the special instructions, it becomes
impossible to predict what the binary will compute looking only at the
source code
The choice of a compiler for critical embedded C code is already quite
constrained as it is. It is not always feasible to choose the compiler
that implements the C99 version of the standard with respect to
floating-point computations, even assuming that one can be found.
To be acceptable to producers of critical C code, a solution may need
to take the reverse-engineering path, and obtain the necessary information
from the output of the compiler
Three complementary solutions
The Hisseo project will be the opportunity to study three different
approaches to the problem of trusting the compiled floating-point
computations. The three solutions will face some of the same
challenges and will also benefit from each other's results.
Making a correct compiler
In this subtask, formal semantics for floating point
computations will be defined and be put to use in the formal
verification of a C compiler.
Analyzing the assembly code
At the assembly level, almost all the sources of non-determinism
in the computations have disappeared, but some of the information
regarding the structure of the program remains. This is the ideal
point to verify by static analysis the translation done
by an off-the-shelf C compiler.
Testing the uninstrumented binary
A proven approach to the verification of run-time properties is to
insert sanity checks within the source code. Unfortunately, in the
case of floating-point computations, any modification of the source
code may change other, unrelated computations because optimization
opportunities may appear or disappear with the modifications. Hence,
the tested binary computes differently from the binary finally
executed. The tests may fail to find a problem that appears only in
the latter.
One way to improve the trustability of tests is to make sure that
the tested binary is the same as the finally executed binary. |
Moishe Mana
Moishe Mana (born 1956) is a billionaire businessman, and real estate developer. Originally from Israel, Mana emigrated to the US in 1983, where he founded his first business, Moishe's Moving Systems. He started further businesses including GRM Document Management, the country's third largest document storage business, Milk Studios, a media and entertainment conglomerate, and Mana Contemporary, an art gallery.
Mana is currently developing real estate in Miami and Jersey City.
Early life
Moishe grew up in the Hatikva neighborhood of Tel Aviv, the second of five children in a poor family. His parents were Iraqi-born immigrants who worked in various businesses, including real estate. After serving as an intelligence officer in the IDF, he studied law at Tel Aviv University for a year before leaving to pursue business in the private sector.
Career in New York
Moishe moved to New York City in 1983 with less than a thousand dollars in his pocket. He slept on park benches, and his first job was as a dishwasher in Greenwich Village. He transitioned into the construction industry, where a short-on-cash employer allowed him the use of the company van at night in lieu of wages. In a widely reported NYC "Rags to Riches" story, Moishe saved enough money to buy his own van. Realizing that anyone with a van and a strong back could start a moving company in 1980s New York, Moishe quickly began hiring other Israeli immigrants, and was able to swiftly undercut his competition. Within six years his company was one of the city’s top residential movers. It eventually evolved into Moishe's Moving Logistics.
Moishe’s Moving Logistics
By the late 1980s Moishe's Moving Logistics had become the largest moving company in the tri-state area. As the company grew, Moishe began purchasing warehouse space and offering storage solutions. By 1998, he had amassed more than 1.5 million square feet of commercial real estate. Today, Moishe owns a conglomerate of fifteen companies including Moishe’s Guarantee Asset Management, Mana Fine Arts, Moishe’s Guarantee Wine Storage, GRM Document Management, Moishe’s Self Storage, and MANA Common (New Jersey, Chicago, Wynwood, and Downtown Miami).
GRM Information Management
Mana launched GRM Information Management in 1986, and it is now the third largest document and digital storage company in the US, with additional branches in China and Latin America. It was the first document storage company to utilize barcodes in its warehouses. In 2011, the former CEO of Emptoris, Avner Schneur, took charge of GRM.
MILK Studios
In 1995, Mana began to focus on the Meatpacking District of New York City, which was then an underdeveloped part of Manhattan. Fashion entrepreneur Mazdack Rassi convinced him to convert one of his mini storage facilities into an event and office space, and thus MILK Studios was born.
Mana opened MILK Studios Los Angeles, and today the MILK Group includes a number of additional companies: MILK Agency, a brand development outfit; Velem, a post production studio; Milk Makeup; and House Casting. The NYC location also operates MILK Gallery, an art space.
MANA Contemporary
By the late 2000s Mana had become a contemporary art collector. He questioned how art was collected, stored, and managed in cloistered facilities.
In 2009, Mana and his long-time business partner Eugene Lemay began assembling over two million square feet of empty warehouses in Jersey City, New Jersey for the purposes of disrupting the art storage market. He then converted this assemblage into an arts community called MANA Contemporary. With services, spaces, and programming for artists, collectors, curators, performers, students and community, MANA Contemporary includes artist studios, living space, creative, photography, fashion, exhibition spaces, and storage.
MANA Contemporary Chicago
Mana set his sights on developing a arts community in the Chicago neighborhood of Pilsen. MANA Contemporary Chicago houses dozens of artists studios, exhibition spaces, classrooms, a central cafe, a library, and more. The Pilsen cultural complex is composed of the 450,000 square foot building plus additional land marked for residential and commercial development.
MANA Wynwood
In 2009 Moishe Mana took on the challenge of transforming Miami from a tourist destination into a vibrant, diversified city with art, fashion, technology, and a global trading hub that connects South America, the Far East, and North America.
Mana began laying the groundwork for a massive business and art complex in the Wynwood neighborhood of Miami, Florida by purchasing acres and acres of underused warehouses and vacant lots. Among his purchases were a former free trade zone. The assemblage, MANA Wynwood, accommodates large scale productions from feature films and television shows to events and trade shows, doubling as a convention center or concert venue, hosting art openings, fashion shows, block parties, and the monthly ritual that has become a cultural touchstone in the area: the Wynwood Art Walk. As Mana’s presence in the area helped shape an artistic renaissance, the neighborhood has rapidly changed, evolving into a hyper-Instagrammable hipster mecca dotted with street murals and boutique businesses.
Mana has gotten approval from the city to start building a ten million square foot hub that will facilitate all trade between the Far East, South America, and North America. Named the China-Latin America Trade Hub, the facility is designed to service companies involved in that trade stream. The broader development project includes facilities that will serve creative industries such as fashion, technology, and entertainment. The complex is designed to have over three million square feet of showrooms and future corporate global headquarters in one neighborhood. The complex will also host banking, agriculture, global manufacturers, and other diversified industries, all of which will be backed by digital platforms. Mana’s ultimate goal is to develop Miami into a mini Hong Kong due to its location and its international fabric. It is estimated that building the project would create 14,850 non-recurring jobs. Once it's completed, MANA Wynwood would create more than 19,400 direct and indirect jobs.
MANA Common Project - Flagler District
Moishe Mana is pursuing a second project in Miami, the MANA Common Project, which will be located in the newly created Flagler District of Downtown Miami. This development will consist of over 45 assembled buildings spanning four streets, all of which he has purchased between 2013 and the present.
Taking advantage of Miami’s unique zoning laws which allow anyone who owns more than nine contiguous acres of property to apply for a special zoning district, Mana’s current plan is to renovate the existing building and create a collaborative community where residents can live, work, and play in over 5,000 micro-units, and the community can come together in collaborative working spaces. The strategy is in furtherance of his belief that investing in people’s talents and passion is infinitely more rewarding than being a mere landlord, leading him to invest in numerous startups in multiple industries. The plan also represents an addition of sorely needed middle income housing for a city suffering from a housing crisis.
MANA Contemporary Miami
Based in the historic 777 International Mall in Downtown Miami, MANA Contemporary Miami is a growing arts center that unites artist studios, exhibition spaces, and programming to facilitate conversation and collaboration among its creative community. Established in 2017, MANA Contemporary Miami is primarily focused on connecting with Miami-based artists and organizations, with the idea of further creating new avenues for conversation and opportunities, ultimately serving as an ongoing platform to engage Miami arts and culture in dynamic and sustainable ways. The center has most recently hosted a series of pop-up spaces and studios for local artists.
Political activism and philanthropy
Mana has vocally opposed Donald Trump. During Trump’s campaign for the office of the presidency, Mana offered to donate first one million, then two million dollars to the charity of Trump’s choice in exchange for the presidential candidate making his tax returns public.
The September before Trump’s election, a naked statue of him appeared atop one of Mana’s Wynwood offices. The statue was subsequently stolen and returned, albeit headless.
Mana also commissioned a large mural of then-candidate Trump which luridly depicted the developer-turned-politician as The Joker from The Dark Knight. The mural was modified after the election by the original artists to remove Trump's likeness.
Mana donated $10 million to Florida International University’s CARTA (College of Communication, Architecture + The Arts) Program. The gift is $2.5 million in cash and an in-kind donation of 15,000 square feet of studio and classroom space at MANA Wynwood.
References
External links
Category:1950s births
Category:Living people
Category:American Jews
Category:American people of Israeli descent
Category:Israeli emigrants to the United States
Category:People from Tel Aviv
Category:American real estate businesspeople
Category:American billionaires
Category:American people of Iraqi-Jewish descent |
Maricel is joining our family this coming Saturday! Isaac is so excited. I've prepared a welcome gift for her and I'm going to get Isaac to help wrap the gift tonight!
I had been preparing Isaac for her arrival since the day we've picked her. He's seen her photo, liked get smile and clothes, even told me he wanted his mattress and hers to 'join' together - in his own words - 'no need to leave a gap in between'.
I guess it's nice to have someone else to listen to him talk other than two parents who are always preoccupied with daily stressors lolz.
I hope she would be nice too... And not give us too much trouble like what many detractors of "getting helpers" are saying...
I hope she won't miss her children too much... Poor girl - two kids around my sons' age group.
I hope chris would take the infringement of privacy gracefully...
Sigh. So many things to worry about. When are we going to quit worrying and enjoy coupledom? |
Q:
Is this structure valid in XML RPC?
Is it valid in XML-RPC to have an unbounded array of elements without having them inside of a array/data parent? From my limited experience with XML-RPC I have seen that arrays should be listed as such:
<member>
<name>Name</name>
<value>
<array>
<data>
<value>
<string>Red</string>
</value>
<value>
<string>Blue</string>
</value>
</data>
</array>
</value>
</member>
...with the parent Name having children strings Red and Blue. However, the 3rd party RPC service we are integrating with sends arrays of unbounded elements without having them inside of the array/data element, but inside a struct, e.g.
<member>
<name>Name</name>
<value>
<struct>
<member><name>Option0</name>
<value><string>Red</string>
</member>
<member><name>Option1</name>
<value><string>Blue</string>
</member>
</struct>
</value>
</member>
...With the values of Option1 and Option2 encapsulated inside of a struct.
The problem I am facing is that when designing the classes that will be serialized, I would have to design my class such as
private string Option0
private string Option1
...
...instead of:
private string[] Name
As I do not know the number of unbounded fields coming back in the structure, it seems the right way to accomplish the task would be to have an array of strings to enumerate through. However, there are no arrays in the resoponse XML, just structures with a dynamic number of fields. Because of that, I would have to list a large number of fields to conform to the structure, even though it's not really a structure, but an array. Is there something I am missing with the XML-RPC?
A:
Yes it is quite valid XML-RPC struct. We also have such case and are using Cook Computings' XML-RPC.NET. It works perfectly. Check it, there is a special class there called XmlRpcStruct. You just need to use it in your XML-RPC method request or response.
|
Your program compiles and runs successfully on mymachine. There is no program error.<br><br>The problem isthat you are applying some logic that should not beapplied, in this case.<br><br>To compile java modules, youMUST supply the .java extension: javacApp.java<br><br>But, to execute, you must NOT supply the .classextension. Therefore:<br>java App // works<br>java App.class// throws the error<br><br>Consistency does not holdin this case.<br><br>Try again and see if that worksfor you (removing .class). |
Ludhiana, March 11: Days after Congress president Rahul Gandhi credited the state government for ending the menace of drugs in Punjab, Lok Insaf Party MLA Simarjit Singh Bains attempted to bust his claim, by purchasing 'chitta' or heroin in Ludhiana on Facebook Live. The clip, while buying the drugs, was streamed by him on social media.
Bains told the viewers that white heroin is being sold "like potatoes" in Ludhiana, alleging that the police administration is hand-in-glove with the drug mafia. The legislator further asked how the Station House Officers (SHOs) are unaware while the banned substances are being sold openly in the city. Medicines Causing Pollution? Traces of Pharmaceutical Drugs Found in Freshwater, Posing Environmental Risk
Watch Video of Simarjit Bains Buying Drugs in Ludhiana on Facebook Live:
The Facebook live video continued till Bains approached the Ludhiana Police Commissioner Sukhchain Singh Gill, handing him over half of the purchased drugs for laboratory tests. The other half, the MLA said, was not given by him to the police fearing that they could manipulate the chemical test report. He claimed that he would get the remaining of chitta examined from a private lab.
Punjab has been reeling under drug menace over the past few years. Ahead of the assembly polls in 2017, the Congress and the Aam Aadmi Party (AAP) had vowed to eradicate the issued "within weeks" of forming the next government. In his then poll rallies, Congress chief Rahul Gandhi had claimed that nearly 70 per cent of Punjab's youth has turn addicted due to "misgovernance" of the Akali-BJP regime.
(The above story first appeared on LatestLY on Mar 11, 2019 06:30 PM IST. For more news and updates on politics, world, sports, entertainment and lifestyle, log on to our website latestly.com). |
Q:
Clases dinámicas en Laravel
Tengo en mi proyecto laravel en la carpeta views otra carpeta layouts en la que tengo un archivo aplicacion.blade.php donde tengo el header y el footer de mi proyecto, la etiqueta html title la tengo de la siguiente forma:
<title>@yield('title','Mi Primer Proyecto')</title>
Cuando creo una pagina nueva envío el contenido al title de la siguiente forma:
@extends('layouts.aplicacion')<br>
@section('title')<br>
Home<br>
@endsection
ejemplo de la pagina home.blade.php
Lo que necesito es crear en la etiqueta nav una clase dinámica que tenga el valor del title, si fuera php y en la pagina home.blade.php llamaría una variable $title_page="Home"; y en la etiqueta li algo asi:
<li class="<?php if ($title_page=="Home"){ echo "active"; } ?>">
<a href="home.blade.php" >Home</a>
</li>
lo que necesito es capturar el contenido del blade que tengo en home.blade.php y evaluar lo para motivos del css
A:
Para poder realizar el menú dinámico tienes que hacer uso de Request::segment(), sabiendo como esta constituido tu menú puedes realizar la verificación de los segmentos de la url.
Ejemplo:
<?php $segment = Request::segment(1); ?>
<li class="<?php if ($segment=="Home"){ echo "active"; } ?>">
<a href="home.blade.php" >Home</a>
</li>
En la documentación de laravel puedes ver las formas de hacer uso de los segmentos de url, el numero indica el segmento que estas tomando.
Por ejemplo:
http://example.com/index.php/news/local/metro/crime_is_up
Los números de segmento serían estos:
news
local
metro
crime_is_up
Cabe mencionar que tienes que agregar use Request;.
|
/******************************************************************************
* SOFA, Simulation Open-Framework Architecture *
* (c) 2006 INRIA, USTL, UJF, CNRS, MGH *
* *
* This program is free software; you can redistribute it and/or modify it *
* under the terms of the GNU Lesser General Public License as published by *
* the Free Software Foundation; either version 2.1 of the License, or (at *
* your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, but WITHOUT *
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or *
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License *
* for more details. *
* *
* You should have received a copy of the GNU Lesser General Public License *
* along with this program. If not, see <http://www.gnu.org/licenses/>. *
*******************************************************************************
* Authors: The SOFA Team and external contributors (see Authors.txt) *
* *
* Contact information: contact@sofa-framework.org *
******************************************************************************/
#define SOFA_COMPONENT_CONTAINER_MECHANICALOBJECT_CPP
#include <SofaBaseMechanics/MechanicalObject.inl>
#include <sofa/helper/Quater.h>
#include <sofa/core/ObjectFactory.h>
namespace sofa
{
namespace component
{
namespace container
{
using namespace core::behavior;
using namespace defaulttype;
int MechanicalObjectClass = core::RegisterObject("mechanical state vectors")
.add< MechanicalObject<Vec3Types> >(true) // default template
.add< MechanicalObject<Vec2Types> >()
.add< MechanicalObject<Vec1Types> >()
.add< MechanicalObject<Vec6Types> >()
.add< MechanicalObject<Rigid3Types> >()
.add< MechanicalObject<Rigid2Types> >()
;
// template specialization must be in the same namespace as original namespace for GCC 4.1
// g++ 4.1 requires template instantiations to be declared on a parent namespace from the template class.
template class SOFA_BASE_MECHANICS_API MechanicalObject<Vec3Types>;
template class SOFA_BASE_MECHANICS_API MechanicalObject<Vec2Types>;
template class SOFA_BASE_MECHANICS_API MechanicalObject<Vec1Types>;
template class SOFA_BASE_MECHANICS_API MechanicalObject<Vec6Types>;
template class SOFA_BASE_MECHANICS_API MechanicalObject<Rigid3Types>;
template class SOFA_BASE_MECHANICS_API MechanicalObject<Rigid2Types>;
template<>
void MechanicalObject<defaulttype::Rigid3Types>::applyRotation (const defaulttype::Quat q)
{
helper::WriteAccessor< Data<VecCoord> > x = *this->write(core::VecCoordId::position());
for (unsigned int i = 0; i < x.size(); i++)
{
x[i].getCenter() = q.rotate(x[i].getCenter());
x[i].getOrientation() = q * x[i].getOrientation();
}
}
template<>
void MechanicalObject<defaulttype::Rigid3Types>::addFromBaseVectorDifferentSize(core::VecId dest, const defaulttype::BaseVector* src, unsigned int &offset )
{
if (dest.type == sofa::core::V_COORD)
{
helper::WriteAccessor< Data<VecCoord> > vDest = *this->write(core::VecCoordId(dest));
const unsigned int coordDim = DataTypeInfo<Coord>::size();
const unsigned int nbEntries = src->size()/coordDim;
for (unsigned int i=0; i<nbEntries; i++)
{
for (unsigned int j=0; j<3; ++j)
{
Real tmp;
DataTypeInfo<Coord>::getValue(vDest[i+offset],j,tmp);
DataTypeInfo<Coord>::setValue(vDest[i+offset],j, tmp + src->element(i*coordDim+j));
}
helper::Quater<double> q_src;
helper::Quater<double> q_dest;
for (unsigned int j=0; j<4; j++)
{
Real tmp;
DataTypeInfo<Coord>::getValue(vDest[i+offset],j+3,tmp);
q_dest[j]=tmp;
q_src[j]=src->element(i * coordDim + j+3);
}
//q_dest = q_dest*q_src;
q_dest = q_src*q_dest;
for (unsigned int j=0; j<4; j++)
{
Real tmp=q_dest[j];
DataTypeInfo<Coord>::setValue(vDest[i+offset], j+3, tmp);
}
}
offset += nbEntries;
}
else
{
helper::WriteAccessor< Data<VecDeriv> > vDest = *this->write(core::VecDerivId(dest));
const unsigned int derivDim = DataTypeInfo<Deriv>::size();
const unsigned int nbEntries = src->size()/derivDim;
for (unsigned int i=0; i<nbEntries; i++)
{
for (unsigned int j=0; j<derivDim; ++j)
{
Real tmp;
DataTypeInfo<Deriv>::getValue(vDest[i+offset],j,tmp);
DataTypeInfo<Deriv>::setValue(vDest[i+offset],j, tmp + src->element(i*derivDim+j));
}
}
offset += nbEntries;
}
}
template<>
void MechanicalObject<defaulttype::Rigid3Types>::addFromBaseVectorSameSize(core::VecId dest, const defaulttype::BaseVector* src, unsigned int &offset)
{
if (dest.type == sofa::core::V_COORD)
{
helper::WriteAccessor< Data<VecCoord> > vDest = *this->write(core::VecCoordId(dest));
const unsigned int coordDim = DataTypeInfo<Coord>::size();
for (unsigned int i=0; i<vDest.size(); i++)
{
for (unsigned int j=0; j<3; j++)
{
Real tmp;
DataTypeInfo<Coord>::getValue(vDest[i],j,tmp);
DataTypeInfo<Coord>::setValue(vDest[i],j,tmp + src->element(offset + i * coordDim + j));
}
helper::Quater<double> q_src;
helper::Quater<double> q_dest;
for (unsigned int j=0; j<4; j++)
{
Real tmp;
DataTypeInfo<Coord>::getValue(vDest[i],j+3,tmp);
q_dest[j]=tmp;
q_src[j]=src->element(offset + i * coordDim + j+3);
}
//q_dest = q_dest*q_src;
q_dest = q_src*q_dest;
for (unsigned int j=0; j<4; j++)
{
Real tmp=q_dest[j];
DataTypeInfo<Coord>::setValue(vDest[i], j+3, tmp);
}
}
offset += vDest.size() * coordDim;
}
else
{
helper::WriteAccessor< Data<VecDeriv> > vDest = *this->write(core::VecDerivId(dest));
const unsigned int derivDim = DataTypeInfo<Deriv>::size();
for (unsigned int i=0; i<vDest.size(); i++)
{
for (unsigned int j=0; j<derivDim; j++)
{
Real tmp;
DataTypeInfo<Deriv>::getValue(vDest[i],j,tmp);
DataTypeInfo<Deriv>::setValue(vDest[i], j, tmp + src->element(offset + i * derivDim + j));
}
}
offset += vDest.size() * derivDim;
}
}
template<>
void MechanicalObject<defaulttype::Rigid3Types>::draw(const core::visual::VisualParams* vparams)
{
vparams->drawTool()->saveLastState();
vparams->drawTool()->setLightingEnabled(false);
if (showIndices.getValue())
{
drawIndices(vparams);
}
if (showVectors.getValue())
{
drawVectors(vparams);
}
if (showObject.getValue())
{
const float scale = showObjectScale.getValue();
helper::ReadAccessor<Data<VecCoord> > x = *this->read(core::VecCoordId::position());
const size_t vsize = d_size.getValue();
for (size_t i = 0; i < vsize; ++i)
{
vparams->drawTool()->pushMatrix();
float glTransform[16];
///TODO: check if the drawtool use OpenGL-shaped matrix
x[i].writeOpenGlMatrix ( glTransform );
vparams->drawTool()->multMatrix( glTransform );
vparams->drawTool()->scale ( scale );
if (getContext()->isSleeping())
{
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ), Vec4f(0.5,0.5,0.5,1) );
}
else switch( drawMode.getValue() )
{
case 1:
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ), Vec4f(0,1,0,1) );
break;
case 2:
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ), Vec4f(1,0,0,1) );
break;
case 3:
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ), Vec4f(0,0,1,1) );
break;
case 4:
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ), Vec4f(1,1,0,1) );
break;
case 5:
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ), Vec4f(1,0,1,1) );
break;
case 6:
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ), Vec4f(0,1,1,1) );
break;
default:
vparams->drawTool()->drawFrame ( Vector3(), Quat(), Vector3 ( 1,1,1 ) );
}
vparams->drawTool()->popMatrix();
}
}
vparams->drawTool()->restoreLastState();
}
}
} // namespace component
} // namespace sofa
|
Q:
Are there metrics of nonnegative Gaussian curvature on these surfaces?
Let $\Sigma$ be a compact surface of genus $g \geq 1$ and having $r \geq 1$ boundary components. Are there metrics of nonnegative Gaussian curvature on $\Sigma$? If $\Sigma$ were closed, then the Gauss Bonnet theorem implies that no such metrics exist, except for the flat torus ($g = 1$).
A:
There do indeed exist such metrics. The idea is that any compact surface with nonempty boundary can be smoothly immersed in the plane, and hence in $S^2$, and so you can get a metric of constant Gaussian curvature $+1$ by pulling back the Riemannian metric on $S^2$ under the immersion. What I say is true as long as $\Sigma$ is orientable, an assumption that I believe you are using too, so I will proceed with that assumption. (One could do the non-orientable case too by immersion into the projective plane).
Your surface $\Sigma$ can be obtained from a regular polygon $P \subset \mathbb R^2$ with $4k$ sides, $k \ge 1$, by indexing the sides in some order, choosing a pairing of the even-indexed sides, and then, for any pair of even-indexed sides $E,E'$, choosing a gluing diffeomorphism $E \leftrightarrow E'$ that reverses counter-clockwise orientation.
For instance, think of the torus as obtained by identifying opposite sides in the usual fashion, but before doing the identifications first truncate the corners to get an octagon; the resulting identifications of the even-indexed opposite side pairs of that octagon gives a one-holed torus, $g=1$, $r=1$.
So then, instead of actually identifying a certain side pair $E,E'$ of $P$, instead use a smooth embedding $[0,1] \times [0,1] \hookrightarrow \mathbb R^2$ so that the image of this embedding intersects $P$ along $[0,1] \times 0 \approx E$ and $[0,1] \times 1 \approx E'$ (the existence of this smooth embedding uses the assumption that the gluing diffeomorphism $E \leftrightarrow E'$ reverses counterclockwise orientation). This gives a topological immerison of $\Sigma$ which is smooth except at each corner of $P$, but a bit of smoothing will iron out the corners.
|
Spain's Sendero Histórico
The GR1
"The Sendero Histórico, or GR1, is a long traverse of northern Spain from west to east over 1250km of remote country and mountain walking. Crossing the Cantabrian mountains, the plains of Navarre and the foothills of the Pyrenees, and visiting 6 provinces, this fascinating trail traces Spain's history along the Medieval Moorish-Christian frontier. Arguably one of the best long-distance paths in Spain, the GR1 features stunning views and ancient sites along centuries-old tracks. Although a great distance in total, it can be tackled in sections and the walking is accessible for any well-prepared trekker."--Page [4] of cover. |
Pets are allowed
Description
This beautiful holiday home is located in the small village of Radosic in the dalmatian hinterland. Surrounded by delightful fruit trees, which guests can use and enjoy, the house extends over two floors which are seamlessly connected by an external staircase.
Guests can enjoy and relax by their own pool, with the benefit of a barbecue area and childrens facilities too, and can discover the town of Togir which is nearby. This holiday home is within a secure fenced plot which is also fitted with video survelliance.
About holiday home
Kitchen
Carport / Garage
Living room
Sauna
Activity room
Fitness
Staircase
Covered Terrace/Balcony
Terrace/Balcony
North
Not available
Toilet/Bathroom
Whirlpool
Swimming pool
2nd floor
1st floor
Ground floor
Basement
Bedroom
Front door
Conservatory
Facts
Building material: Stone
View over the landscape
Pets: 1
Build (year): 2017
Our quality rating: 4
Guests: 8
Facilities
Outdoor swimming pool: 18 m2
Dart
1 TV
Cable TV
Wireless internet From 07-01-2017
Pool open May - end September From 13-01-2018
Cot amount: 1
Rooms
Kitchen: Hot and cold water
Bathroom no. 1
WC: Hot and cold water , Shower
Bathroom no. 2
WC: Hot and cold water , Shower
Bedroom no. 1
Double bed(s) (2 spaces)
Bedroom no. 2
Double bed(s) (2 spaces)
Bedroom no. 3
Double bed(s) (2 spaces)
Bedroom no. 4
Double bed(s) (2 spaces)
Kitchen/living room no. 1
Amenities
Gas/electric cooker
Refrigerator
Cooker hood
Deep freeze: 30 l
Coffee brewer
Microwave
Dishwasher
Heating / Energy
All year round insulated
Electric heating
Air conditioning cold/hot: 2 pcs From 07-01-2017
Outside
Natural site: 1000 m2
Fenced plot
Garden furniture
Parking on the site: 4 parking spaces
Swing
Barbecue
Seesaw From 07-01-2017
Badminton net From 07-01-2017
Extra sun beds amount: 8
Terrace or similar no. 1: 4 m2
Open terrace
Terrace or similar no. 2: 3 m2
Open terrace
Terrace or similar no. 3: 10 m2
Covered terrace
Terrace or similar no. 4: 3 m2
Balcony
Nearby
SPU: 19 km From 13-01-2018
Distance shopping: 10 km
Distance restaurant: 200 m
Distance nearest city: 20 km (Trogir)
Distance water: 15 km (Stone/Pebble beach)
Please note that the distances above are approximate, and in direct line from the property grounds. |
525 F.Supp.2d 150 (2007)
Hashima AGAPITO, et al., Plaintiffs,
v.
DISTRICT OF COLUMBIA, et al., Defendants.
Civil Action No. 05-1935 (RMC).
United States District Court, District of Columbia.
November 30, 2007.
*151 Tilman L. Gerald, James E. Brown & Associates, PLLC, Washington, DC, for Plaintiffs.
Amy Caspari, Office of the Attorney General, Carol Elaine Burroughs, Assistant Attorney General for the District of Columbia D.C. Department of Corrections, Washington, DC, for Defendants.
MEMORANDUM OPINION
ROSEMARY M. COLLYER, District Judge,
The question before the Court is whether attorneys who appear in administrative hearings under the Individuals with Disabilities Education Improvement Act of 2004 ("IDEIA"), 20 U.S.C. § 1400 et seq., should be compensated according to the Laffey Matrix[1] or the attorney fee guideline rates adopted by the District of Columbia Public Schools ("DCPS"). Persuaded by the Attorney General of the District of Columbia, the Court finds that the DCPS rates are applicable and appropriate in this case and will award attorneys' fees accordingly.
I. BACKGROUND
This case began as' a claim for attorneys' fees by lawyers associated with the firm of James E. Brown & Associates PLLC. In a *152 memorandum opinion issued on March 7, 2007, this Court held that lawyers not licensed to practice in D.C. cannot collect attorneys' fees under the IDEIA. See Mem. Op. [Dkt. # 23]. On this basis, the fee applications for. Domiento Hill, Brenda McAllister, and Christopher West were denied; the Court ordered attorneys Miguel Hull and Marshall Lammers to submit evidence adequate to meet their burden to establish the reasonableness of their rates. See id. at 18-23. When they did so, the Court issued a memorandum opinion and order to show cause to DCPS why the District should not pay the fees set out in that opinion for Messrs. Hull and Lammers and Ms. Busso, which followed the Laffey Matrix. See March 23, 2007 Mem. Op. & Order [Dkt. # 25]. DCPS responded on April 5, 2007, urging the Court to adopt its guideline rates. See Defs.' Response to Court's Mem. Op. & Order to Show Cause ("Defs.' Response") [Dkt. # 26]. There has been no reply from the attorneys at the Brown firm.
II. ANALYSIS
The Laffey Matrix was developed by the United States Attorney's Office for the District of Columbia to track prevailing attorneys' hourly rates for complex federal litigation. It "creates one axis for a lawyer's years of experience in complicated federal litigation and a second [axis] for rates of compensation." Griffin v. Wash. Convention Ctr., 172 F.Supp.2d 193, 197 (D.D.C.2001). The District emphasizes that the Laffey Matrix involves "the prevailing market rates for complex federal litigation in the District of Columbia." Covington v. Dist. of Columbia, 57 F.3d 1101, 1103 (D.C.Cir.1995). Attorneys "have to state their federal court experience in order to get Laffey rates." Id. at 1108 n. 17. The District contrasts these standards with the much less formal and much less complex IDEIA litigation at issue here.
There are nine administrative proceedings for which fees are being sought. Only four involved a presentation to a hearing officer, as the parties reached settlement agreements on the others. Preparation for a due process hearing requires (1) the filing of a hearing request form; (2) participation in`a resolution/mediation session prior to the. hearing; (3) submission of all documents and witnesses to be introduced at the hearing; and (4) representation of the student and parent at the hearing itself, which involves putting on witnesses, cross-examining witnesses, and introducing evidence. See Defs.' Response, Ex. 2, Decl. of Quinne Lindsey-Harris ("Lindsey-Harris Decl.") ¶¶ 6-9. Legal argument may also be made. Id. While an IDEIA case may be more complicated, the invoices and Hearing Officer Decisions (HODS) in the record show that these particular matters were not. There were no pre-hearing interrogatories or discovery, no`production of documents or depositions, no psychiatrists or psychologists testifying about learning disabilities, no briefings of intricate statutory or constitutional issues, no pre-trial briefings, no lengthy hearings, no protracted arguments, and few, if any, motions filed. Cf. Covington, 57 F.3d at 1106 (noting the statement by the district court that "[p]laintiffs' counsel handled very well this complicated federal case, which involved the constitutional claims of ten plaintiffs against sixteen defendants, lengthy discovery, many motions and a jury trial").
The billing records here demonstrate the nature`of the work performed. A variety of items show similar work performed by legal assistants, non-attorney advocates and attorneys, with billing by a legal assistant at $105 per hour, by a non-attorney advocate at $175 per hour, and $350 per *153 hour by Attorney Lammers for the same kind of tasks. See Compl., Exs. 3, 11, 21, 32, 36, 41 & 42. For example, D.B.'s invoice shows that Mr. Lammers billed $350 per hour to call a parent about a signature on an Individual Education Plan ("IEP") while a legal assistant called the parent in R.O.'s invoice for a non-legal matter and billed at the rate of $105, per hour. Compare Compl., Ex, 2, p. 3 with Compl., Ex. 32. Similar comparisons abound.
Veleter M.B. Mazyck, former General Counsel of DCPS, distributed the "DCPS Guidelines for the Payment of Attorney Fees in IDEA Matters" to the special education bar by memo dated February 1, 2005, See Defs.' Response, Ex. 4. It was updated on October 1, 2006, and may have been updated since. Id. Quinne Lindsey Harris, Acting Supervisory Attorney Advisor in the Office of the General Counsel, oversees attorneys representing DCPS in IDEIA hearings. See Defs.' Response, Ex. 2, Lindsey Harris Decl. ¶¶ 2-3. Ms. Lindsey-Harris also provides the final legal review of attorney fee invoices submitted to DCPS. Id. ¶ 10. She has noted the following patterns over the past year:
Attorneys possessing 10 to 20 years of experience, [sic] invoice their rate within the range of $200.00 to $295.00. . . .
Attorneys possessing 20 years or more in experience invoice their rate within the range of $300.00 to $350.00 per hour.
Therefore, DCPS has determined that any billing rate of over $350.00 per hour irrespective of the length of experience is excessive and unreasonable, and not consistent with the prevailing market rate in the D.C. community, given that the administrative hearings are not complicated.
Id. ¶¶ 14-15. The DCPS guidelines set hourly rates for lawyers in the District of Columbia who handle IDEIA Matters as follows:
a. Lawyers admitted to the bar for less than five years: $135-170
b. Lawyers admitted to the bar for five to eight years: $150-225
c. Lawyers admitted to the bar for more than eight years: $200-275
d. Legal assistants and law clerks: $90
See Def.'s Response at 11 & Ex. 4. The IDEIA provides that an award of attorneys' fees "shall be based on rates prevailing in the community in which the action or proceeding arose for the kind and quality of services furnished." 20 U.S.C. § 1415(i)(3)(C). The District of Columbia argues that its guideline rates pertain to the "kind and quality of services furnished" and should be applied here.
A. Christina Busso
Upon review of the submitted invoices, the Court noted that many of the Plaintiffs were represented by Christina Busso before Mr. Lammers joined the firm. For these Plaintiffs, Ms. Busso was billed out at $350 per hour. Plaintiffs have submitted no information about Ms. Busso. Knowing only Ms. Busso's admission to the D.C. Bar from its website, the Court tentatively awarded attorney's fees for her hours at the Laffey rate selected for Mr. Lammers: $185 per hour. See Dkt. # 25.
The District of Columbia justifiably protests. It notes that Plaintiffs bear the burden of establishing all elements of the requested fee award, including an entitlement to the award, the documentation of appropriate hours, and justification for the reasonableness of the rates. See Blum v. Stenson, 465 U.S. 886, 896, 104 S.Ct. 1541, 79 L.Ed.2d 891 n. 11 (1984); Hensley v. Eckerhart, 461 U.S. 424, 437, 103 S.Ct. 1933, 76 L.Ed.2d 40 (1983); Covington, 57 F.3d at 1107; Smith v. Roher, 954 F.Supp. 359, 365 (D.D.C.1997). None of this information *154 has been submitted for Ms. Busso and Plaintiffs actually claimed that Mr. Lammers worked those hours. As the District succinctly argues:
With due respect, the Court having properly held the burden of demonstration to be the Plaintiffs,' and having directly found a total absence of information supporting any rate for Ms. Busso, the Court could not properly conclude any rate to be proper.
Defs.' Response at 14. Accordingly, the Court has reconsidered its award of attorney's fees for Ms. Busso's work and determined that there is insufficient evidence to support any award.
B. Miguel Hull
Mr. Hull graduated from law school in May 1998 and, during the pertinent time period, had between four and seven years of relevant experience. See Mem. to Supp. Plaintiffs' Claims for an Award of Reasonable, Attorney Fees and Costs ("Pls.' Mem."), Ex. 3 (Hull Decl. and Resume). The invoices attached to the Complaint billed him out at $350 per hour although he has declared that he believes his hourly rate to be $235 per hour. The District argues that its attorneys' fees guideline rates are the prevailing market rates for IDEIA work in this community and should be applied here. Mr. Hull has presented no additional facts or counter-argument. Having found that the Laffey Matrix does not apply to these straight-forward IDEIA matters (recognizing that other IDEIA cases might so qualify), the Court concludes that the DCPS guideline rates should be adopted here. As a result, Mr. Hull's rate should be $170, not $225 as indicated by the Laffey Matrix.
C. Marshall Lammers
Mr. Lammers graduated from law school in May 2004. He became associated with the Brown firm during the last week of March 2005 and represented some of the Plaintiffs during April and May 2005, with the exception of R.B., whom he represented until June 6, 2005. The District of Columbia proposes that the appropriate rate for Mr. Lammers would be $135 per hour, its guideline rate for novice IDEIA attorneys, and not $185, the rate from the Laffey Matrix. Mr. Lammers has presented no additional facts or counter-argument. The Court will therefore adopt the District's proposal and award fees for Mr. Lammers's work at a rate of $135 per hour.
D. Award
With the adjustments discussed above, the attorney fee awards for each outstanding matter will be as follows:
---------------------------------------------------------------------------
Complaint Fees Costs Total
Exhibit Student Requested Requested Requested Award
---------------------------------------------------------------------------
2 D.B. 7,034.65 222.92 7,257.57 2,409.02
3 R.B. 8,778.00 281.79 9,059.79 4,167.09
11 R.C. 6,376.65 562.39 6,939.04 5,059.29
21 D.G. 6,841.80 314.78 7,156.58 3,711.43
32 R.O. 4,961.95 175.68 5,137.63 2,087.93
36 C.R. 7,156.10 449.74 7,605.84 3,231.69
41 E.S. 16,462.25 318.27 16,780.52 1,111.32
42 T.T. 16,589.65 551.27 17,140.92 6,212.92
52 J.W. 6,956.60 138.22 7,094.82 2,233.97
---------------------------------------------------------------------------
*155 III. CONCLUSION
The Court declines to rely on the Laffey Matrix for these relatively simple and straightforward IDEIA cases. It finds that the District of Columbia has presented the applicable rates in the community for IDEIA attorneys on these kinds of cases and therefore adopts those guideline rates for the outstanding claims in question. A memorializing order accompanies this Memorandum Opinion.
NOTES
[1] See Laffey v. Northwest Airlines, Inc., 572 F.Supp. 354 (D.D.C.1983), aff'd in part, rev'd in part on other grounds, 746 F.2d 4 (D.C.Cir. 1984), cert. denied, 472 U.S. 1021, 105 S.Ct. 3488, 87 L.Ed.2d 622 (1985), as modified by Save Our Cumberland Mountains, Inc. v. Hodel, 857 F.2d 1516, 1524 (D.C.Cir.1988).
|
Thursday, 2 August 2007
The barra or doughy outside for want of a better description, begins this way. I cannot begin to describe the speed of this operation. We were on our way to Asa Wright and stopped for breakfast opposite the Arima race track. The corner is well known and the saheena and baiganee are legendary. They very nicely let me jump up into their mobile truck/kitchen and take some pictures.Into the pot and a quick puff and they are ready to come out again.Here they are heading for the curried channa filling.
About Me
Gardening in the rain, watering at dusk with a glass of red wine and making up new recipes that I can never reproduce are just some of the things that I like to do. I live under a large saman tree in a nostalgic old house with my husband, Ross, my daughter, Hayley, five dogs and two cats. |
Varicella zoster virus infections following allogeneic bone marrow transplantation: frequency, risk factors, and clinical outcome.
Reactivation of varicella zoster virus (VZV) is a common event in patients undergoing allogeneic bone marrow transplantation (BMT) and may lead to life-threatening complications. We retrospectively analyzed the incidence, clinical outcome, and risk factors for VZV infections occurring within the first 5 years of transplantation in 100 consecutive adults undergoing allogeneic BMT between 1992 and 1997. Forty-one patients (41%) developed VZV reactivation a median of 227 days (range 45-346 days) post-transplantation. Twelve percent of VZV reactivation occurred in the first 100 days and 88% within the first 24 months. Among those who survived for 2 or more years after transplantation (n = 47), 59% developed VZV infection. Forty percent of patients with VZV reactivation required admission with a mean hospital stay of 7.2 days. Two patients developed encephalitis, and 1 died despite antiviral therapy. The most frequent complications were post-herpetic neuralgia and peripheral neuropathy (68%). Thoracic dermatomal zoster represented 41% of the infections; disseminated cutaneous involvement was observed in 17% of patients. No clinical or epidemiologic risk factors were associated with recurrence. Administration of ganciclovir for prevention of cytomegalovirus infection delayed the onset of VZV infection beyond 4 months (P = .06). In a further subset analysis, patients with a limited chronic graft-versus-host disease (GVHD) had a lower estimated incidence of VZV reactivation compared with those with extensive chronic GVHD (P = .11). We conclude that complications from reactivation of VZV infection are common and associated with considerable morbidity and mortality in patients undergoing allogeneic BMT. |
Q:
What does NSArray's count return?
Does -[NSArray count] return the number of objects (i.e. the first object would be 1, etc.) or does it return the max index of the object (i.e. the first one would be 0)?
A:
It returns the total number of objects. For example, if you have an object at index 0, 1, and 2, then it will return a count of 3.
|
Spiral-shaped iatrogenic arterial dissection during superior mesenteric arteriography: a latent risk of diagnostic angiography using the power injector.
We report a rare case of iatrogenic arterial dissection of the superior mesenteric artery (SMA) during diagnostic angiography. A conventional superior mesenteric arteriogram obtained using an automated power injector revealed an arterial dissection 2s after the initiation of contrast-medium injection. This case indicates that although careful catheter manipulations during angiography are essential, certain unavoidable complications may occur. |
Honduran Election: Democracy or Whitewash of a Coup?
The international community refused to recognize the coup of June 28th, which ousted the elected president of Honduras. On November 29th an election was held, but most nations do not recognize it as legitimate. On this Portside, Burt Cohen gets the lowdown on the realities on the ground in Honduras from Vicki Gass of the washington Office on Latin America. What does all this mean for US relations with Latin America? |
Pro-Tech Tactical Response 3: TR-3 Manual Integrity Folder
After many requests from customers, ProTech has re-invented this fantastic manual action frame-lock folder. Rock solid titanium frame lock version of our popular TR-3 style folder.
The custom TR-3 Integrity folders are built in very small batches from the highest possible quality materials. Solid titanium frames, custom hardware and thumb studs, the fit and finish is superb! Smooth one hand opening and the solid locking of the .125" titanium frame, even the pocket clips are custom made titanium. |
r"""HTTP cookie handling for web clients.
This module has (now fairly distant) origins in Gisle Aas' Perl module
HTTP::Cookies, from the libwww-perl library.
Docstrings, comments and debug strings in this code refer to the
attributes of the HTTP cookie system as cookie-attributes, to distinguish
them clearly from Python attributes.
Class diagram (note that BSDDBCookieJar and the MSIE* classes are not
distributed with the Python standard library, but are available from
http://wwwsearch.sf.net/):
CookieJar____
/ \ \
FileCookieJar \ \
/ | \ \ \
MozillaCookieJar | LWPCookieJar \ \
| | \
| ---MSIEBase | \
| / | | \
| / MSIEDBCookieJar BSDDBCookieJar
|/
MSIECookieJar
"""
__all__ = ['Cookie', 'CookieJar', 'CookiePolicy', 'DefaultCookiePolicy',
'FileCookieJar', 'LWPCookieJar', 'LoadError', 'MozillaCookieJar']
import copy
import datetime
import re
import time
import urllib.parse, urllib.request
try:
import threading as _threading
except ImportError:
import dummy_threading as _threading
import http.client # only for the default HTTP port
from calendar import timegm
debug = False # set to True to enable debugging via the logging module
logger = None
def _debug(*args):
if not debug:
return
global logger
if not logger:
import logging
logger = logging.getLogger("http.cookiejar")
return logger.debug(*args)
DEFAULT_HTTP_PORT = str(http.client.HTTP_PORT)
MISSING_FILENAME_TEXT = ("a filename was not supplied (nor was the CookieJar "
"instance initialised with one)")
def _warn_unhandled_exception():
# There are a few catch-all except: statements in this module, for
# catching input that's bad in unexpected ways. Warn if any
# exceptions are caught there.
import io, warnings, traceback
f = io.StringIO()
traceback.print_exc(None, f)
msg = f.getvalue()
warnings.warn("http.cookiejar bug!\n%s" % msg, stacklevel=2)
# Date/time conversion
# -----------------------------------------------------------------------------
EPOCH_YEAR = 1970
def _timegm(tt):
year, month, mday, hour, min, sec = tt[:6]
if ((year >= EPOCH_YEAR) and (1 <= month <= 12) and (1 <= mday <= 31) and
(0 <= hour <= 24) and (0 <= min <= 59) and (0 <= sec <= 61)):
return timegm(tt)
else:
return None
DAYS = ["Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"]
MONTHS = ["Jan", "Feb", "Mar", "Apr", "May", "Jun",
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"]
MONTHS_LOWER = []
for month in MONTHS: MONTHS_LOWER.append(month.lower())
def time2isoz(t=None):
"""Return a string representing time in seconds since epoch, t.
If the function is called without an argument, it will use the current
time.
The format of the returned string is like "YYYY-MM-DD hh:mm:ssZ",
representing Universal Time (UTC, aka GMT). An example of this format is:
1994-11-24 08:49:37Z
"""
if t is None:
dt = datetime.datetime.utcnow()
else:
dt = datetime.datetime.utcfromtimestamp(t)
return "%04d-%02d-%02d %02d:%02d:%02dZ" % (
dt.year, dt.month, dt.day, dt.hour, dt.minute, dt.second)
def time2netscape(t=None):
"""Return a string representing time in seconds since epoch, t.
If the function is called without an argument, it will use the current
time.
The format of the returned string is like this:
Wed, DD-Mon-YYYY HH:MM:SS GMT
"""
if t is None:
dt = datetime.datetime.utcnow()
else:
dt = datetime.datetime.utcfromtimestamp(t)
return "%s %02d-%s-%04d %02d:%02d:%02d GMT" % (
DAYS[dt.weekday()], dt.day, MONTHS[dt.month-1],
dt.year, dt.hour, dt.minute, dt.second)
UTC_ZONES = {"GMT": None, "UTC": None, "UT": None, "Z": None}
TIMEZONE_RE = re.compile(r"^([-+])?(\d\d?):?(\d\d)?$", re.ASCII)
def offset_from_tz_string(tz):
offset = None
if tz in UTC_ZONES:
offset = 0
else:
m = TIMEZONE_RE.search(tz)
if m:
offset = 3600 * int(m.group(2))
if m.group(3):
offset = offset + 60 * int(m.group(3))
if m.group(1) == '-':
offset = -offset
return offset
def _str2time(day, mon, yr, hr, min, sec, tz):
# translate month name to number
# month numbers start with 1 (January)
try:
mon = MONTHS_LOWER.index(mon.lower())+1
except ValueError:
# maybe it's already a number
try:
imon = int(mon)
except ValueError:
return None
if 1 <= imon <= 12:
mon = imon
else:
return None
# make sure clock elements are defined
if hr is None: hr = 0
if min is None: min = 0
if sec is None: sec = 0
yr = int(yr)
day = int(day)
hr = int(hr)
min = int(min)
sec = int(sec)
if yr < 1000:
# find "obvious" year
cur_yr = time.localtime(time.time())[0]
m = cur_yr % 100
tmp = yr
yr = yr + cur_yr - m
m = m - tmp
if abs(m) > 50:
if m > 0: yr = yr + 100
else: yr = yr - 100
# convert UTC time tuple to seconds since epoch (not timezone-adjusted)
t = _timegm((yr, mon, day, hr, min, sec, tz))
if t is not None:
# adjust time using timezone string, to get absolute time since epoch
if tz is None:
tz = "UTC"
tz = tz.upper()
offset = offset_from_tz_string(tz)
if offset is None:
return None
t = t - offset
return t
STRICT_DATE_RE = re.compile(
r"^[SMTWF][a-z][a-z], (\d\d) ([JFMASOND][a-z][a-z]) "
"(\d\d\d\d) (\d\d):(\d\d):(\d\d) GMT$", re.ASCII)
WEEKDAY_RE = re.compile(
r"^(?:Sun|Mon|Tue|Wed|Thu|Fri|Sat)[a-z]*,?\s*", re.I | re.ASCII)
LOOSE_HTTP_DATE_RE = re.compile(
r"""^
(\d\d?) # day
(?:\s+|[-\/])
(\w+) # month
(?:\s+|[-\/])
(\d+) # year
(?:
(?:\s+|:) # separator before clock
(\d\d?):(\d\d) # hour:min
(?::(\d\d))? # optional seconds
)? # optional clock
\s*
([-+]?\d{2,4}|(?![APap][Mm]\b)[A-Za-z]+)? # timezone
\s*
(?:\(\w+\))? # ASCII representation of timezone in parens.
\s*$""", re.X | re.ASCII)
def http2time(text):
"""Returns time in seconds since epoch of time represented by a string.
Return value is an integer.
None is returned if the format of str is unrecognized, the time is outside
the representable range, or the timezone string is not recognized. If the
string contains no timezone, UTC is assumed.
The timezone in the string may be numerical (like "-0800" or "+0100") or a
string timezone (like "UTC", "GMT", "BST" or "EST"). Currently, only the
timezone strings equivalent to UTC (zero offset) are known to the function.
The function loosely parses the following formats:
Wed, 09 Feb 1994 22:23:32 GMT -- HTTP format
Tuesday, 08-Feb-94 14:15:29 GMT -- old rfc850 HTTP format
Tuesday, 08-Feb-1994 14:15:29 GMT -- broken rfc850 HTTP format
09 Feb 1994 22:23:32 GMT -- HTTP format (no weekday)
08-Feb-94 14:15:29 GMT -- rfc850 format (no weekday)
08-Feb-1994 14:15:29 GMT -- broken rfc850 format (no weekday)
The parser ignores leading and trailing whitespace. The time may be
absent.
If the year is given with only 2 digits, the function will select the
century that makes the year closest to the current date.
"""
# fast exit for strictly conforming string
m = STRICT_DATE_RE.search(text)
if m:
g = m.groups()
mon = MONTHS_LOWER.index(g[1].lower()) + 1
tt = (int(g[2]), mon, int(g[0]),
int(g[3]), int(g[4]), float(g[5]))
return _timegm(tt)
# No, we need some messy parsing...
# clean up
text = text.lstrip()
text = WEEKDAY_RE.sub("", text, 1) # Useless weekday
# tz is time zone specifier string
day, mon, yr, hr, min, sec, tz = [None]*7
# loose regexp parse
m = LOOSE_HTTP_DATE_RE.search(text)
if m is not None:
day, mon, yr, hr, min, sec, tz = m.groups()
else:
return None # bad format
return _str2time(day, mon, yr, hr, min, sec, tz)
ISO_DATE_RE = re.compile(
"""^
(\d{4}) # year
[-\/]?
(\d\d?) # numerical month
[-\/]?
(\d\d?) # day
(?:
(?:\s+|[-:Tt]) # separator before clock
(\d\d?):?(\d\d) # hour:min
(?::?(\d\d(?:\.\d*)?))? # optional seconds (and fractional)
)? # optional clock
\s*
([-+]?\d\d?:?(:?\d\d)?
|Z|z)? # timezone (Z is "zero meridian", i.e. GMT)
\s*$""", re.X | re. ASCII)
def iso2time(text):
"""
As for http2time, but parses the ISO 8601 formats:
1994-02-03 14:15:29 -0100 -- ISO 8601 format
1994-02-03 14:15:29 -- zone is optional
1994-02-03 -- only date
1994-02-03T14:15:29 -- Use T as separator
19940203T141529Z -- ISO 8601 compact format
19940203 -- only date
"""
# clean up
text = text.lstrip()
# tz is time zone specifier string
day, mon, yr, hr, min, sec, tz = [None]*7
# loose regexp parse
m = ISO_DATE_RE.search(text)
if m is not None:
# XXX there's an extra bit of the timezone I'm ignoring here: is
# this the right thing to do?
yr, mon, day, hr, min, sec, tz, _ = m.groups()
else:
return None # bad format
return _str2time(day, mon, yr, hr, min, sec, tz)
# Header parsing
# -----------------------------------------------------------------------------
def unmatched(match):
"""Return unmatched part of re.Match object."""
start, end = match.span(0)
return match.string[:start]+match.string[end:]
HEADER_TOKEN_RE = re.compile(r"^\s*([^=\s;,]+)")
HEADER_QUOTED_VALUE_RE = re.compile(r"^\s*=\s*\"([^\"\\]*(?:\\.[^\"\\]*)*)\"")
HEADER_VALUE_RE = re.compile(r"^\s*=\s*([^\s;,]*)")
HEADER_ESCAPE_RE = re.compile(r"\\(.)")
def split_header_words(header_values):
r"""Parse header values into a list of lists containing key,value pairs.
The function knows how to deal with ",", ";" and "=" as well as quoted
values after "=". A list of space separated tokens are parsed as if they
were separated by ";".
If the header_values passed as argument contains multiple values, then they
are treated as if they were a single value separated by comma ",".
This means that this function is useful for parsing header fields that
follow this syntax (BNF as from the HTTP/1.1 specification, but we relax
the requirement for tokens).
headers = #header
header = (token | parameter) *( [";"] (token | parameter))
token = 1*<any CHAR except CTLs or separators>
separators = "(" | ")" | "<" | ">" | "@"
| "," | ";" | ":" | "\" | <">
| "/" | "[" | "]" | "?" | "="
| "{" | "}" | SP | HT
quoted-string = ( <"> *(qdtext | quoted-pair ) <"> )
qdtext = <any TEXT except <">>
quoted-pair = "\" CHAR
parameter = attribute "=" value
attribute = token
value = token | quoted-string
Each header is represented by a list of key/value pairs. The value for a
simple token (not part of a parameter) is None. Syntactically incorrect
headers will not necessarily be parsed as you would want.
This is easier to describe with some examples:
>>> split_header_words(['foo="bar"; port="80,81"; discard, bar=baz'])
[[('foo', 'bar'), ('port', '80,81'), ('discard', None)], [('bar', 'baz')]]
>>> split_header_words(['text/html; charset="iso-8859-1"'])
[[('text/html', None), ('charset', 'iso-8859-1')]]
>>> split_header_words([r'Basic realm="\"foo\bar\""'])
[[('Basic', None), ('realm', '"foobar"')]]
"""
assert not isinstance(header_values, str)
result = []
for text in header_values:
orig_text = text
pairs = []
while text:
m = HEADER_TOKEN_RE.search(text)
if m:
text = unmatched(m)
name = m.group(1)
m = HEADER_QUOTED_VALUE_RE.search(text)
if m: # quoted value
text = unmatched(m)
value = m.group(1)
value = HEADER_ESCAPE_RE.sub(r"\1", value)
else:
m = HEADER_VALUE_RE.search(text)
if m: # unquoted value
text = unmatched(m)
value = m.group(1)
value = value.rstrip()
else:
# no value, a lone token
value = None
pairs.append((name, value))
elif text.lstrip().startswith(","):
# concatenated headers, as per RFC 2616 section 4.2
text = text.lstrip()[1:]
if pairs: result.append(pairs)
pairs = []
else:
# skip junk
non_junk, nr_junk_chars = re.subn("^[=\s;]*", "", text)
assert nr_junk_chars > 0, (
"split_header_words bug: '%s', '%s', %s" %
(orig_text, text, pairs))
text = non_junk
if pairs: result.append(pairs)
return result
HEADER_JOIN_ESCAPE_RE = re.compile(r"([\"\\])")
def join_header_words(lists):
"""Do the inverse (almost) of the conversion done by split_header_words.
Takes a list of lists of (key, value) pairs and produces a single header
value. Attribute values are quoted if needed.
>>> join_header_words([[("text/plain", None), ("charset", "iso-8859/1")]])
'text/plain; charset="iso-8859/1"'
>>> join_header_words([[("text/plain", None)], [("charset", "iso-8859/1")]])
'text/plain, charset="iso-8859/1"'
"""
headers = []
for pairs in lists:
attr = []
for k, v in pairs:
if v is not None:
if not re.search(r"^\w+$", v):
v = HEADER_JOIN_ESCAPE_RE.sub(r"\\\1", v) # escape " and \
v = '"%s"' % v
k = "%s=%s" % (k, v)
attr.append(k)
if attr: headers.append("; ".join(attr))
return ", ".join(headers)
def strip_quotes(text):
if text.startswith('"'):
text = text[1:]
if text.endswith('"'):
text = text[:-1]
return text
def parse_ns_headers(ns_headers):
"""Ad-hoc parser for Netscape protocol cookie-attributes.
The old Netscape cookie format for Set-Cookie can for instance contain
an unquoted "," in the expires field, so we have to use this ad-hoc
parser instead of split_header_words.
XXX This may not make the best possible effort to parse all the crap
that Netscape Cookie headers contain. Ronald Tschalar's HTTPClient
parser is probably better, so could do worse than following that if
this ever gives any trouble.
Currently, this is also used for parsing RFC 2109 cookies.
"""
known_attrs = ("expires", "domain", "path", "secure",
# RFC 2109 attrs (may turn up in Netscape cookies, too)
"version", "port", "max-age")
result = []
for ns_header in ns_headers:
pairs = []
version_set = False
for ii, param in enumerate(re.split(r";\s*", ns_header)):
param = param.rstrip()
if param == "": continue
if "=" not in param:
k, v = param, None
else:
k, v = re.split(r"\s*=\s*", param, 1)
k = k.lstrip()
if ii != 0:
lc = k.lower()
if lc in known_attrs:
k = lc
if k == "version":
# This is an RFC 2109 cookie.
v = strip_quotes(v)
version_set = True
if k == "expires":
# convert expires date to seconds since epoch
v = http2time(strip_quotes(v)) # None if invalid
pairs.append((k, v))
if pairs:
if not version_set:
pairs.append(("version", "0"))
result.append(pairs)
return result
IPV4_RE = re.compile(r"\.\d+$", re.ASCII)
def is_HDN(text):
"""Return True if text is a host domain name."""
# XXX
# This may well be wrong. Which RFC is HDN defined in, if any (for
# the purposes of RFC 2965)?
# For the current implementation, what about IPv6? Remember to look
# at other uses of IPV4_RE also, if change this.
if IPV4_RE.search(text):
return False
if text == "":
return False
if text[0] == "." or text[-1] == ".":
return False
return True
def domain_match(A, B):
"""Return True if domain A domain-matches domain B, according to RFC 2965.
A and B may be host domain names or IP addresses.
RFC 2965, section 1:
Host names can be specified either as an IP address or a HDN string.
Sometimes we compare one host name with another. (Such comparisons SHALL
be case-insensitive.) Host A's name domain-matches host B's if
* their host name strings string-compare equal; or
* A is a HDN string and has the form NB, where N is a non-empty
name string, B has the form .B', and B' is a HDN string. (So,
x.y.com domain-matches .Y.com but not Y.com.)
Note that domain-match is not a commutative operation: a.b.c.com
domain-matches .c.com, but not the reverse.
"""
# Note that, if A or B are IP addresses, the only relevant part of the
# definition of the domain-match algorithm is the direct string-compare.
A = A.lower()
B = B.lower()
if A == B:
return True
if not is_HDN(A):
return False
i = A.rfind(B)
if i == -1 or i == 0:
# A does not have form NB, or N is the empty string
return False
if not B.startswith("."):
return False
if not is_HDN(B[1:]):
return False
return True
def liberal_is_HDN(text):
"""Return True if text is a sort-of-like a host domain name.
For accepting/blocking domains.
"""
if IPV4_RE.search(text):
return False
return True
def user_domain_match(A, B):
"""For blocking/accepting domains.
A and B may be host domain names or IP addresses.
"""
A = A.lower()
B = B.lower()
if not (liberal_is_HDN(A) and liberal_is_HDN(B)):
if A == B:
# equal IP addresses
return True
return False
initial_dot = B.startswith(".")
if initial_dot and A.endswith(B):
return True
if not initial_dot and A == B:
return True
return False
cut_port_re = re.compile(r":\d+$", re.ASCII)
def request_host(request):
"""Return request-host, as defined by RFC 2965.
Variation from RFC: returned value is lowercased, for convenient
comparison.
"""
url = request.get_full_url()
host = urllib.parse.urlparse(url)[1]
if host == "":
host = request.get_header("Host", "")
# remove port, if present
host = cut_port_re.sub("", host, 1)
return host.lower()
def eff_request_host(request):
"""Return a tuple (request-host, effective request-host name).
As defined by RFC 2965, except both are lowercased.
"""
erhn = req_host = request_host(request)
if req_host.find(".") == -1 and not IPV4_RE.search(req_host):
erhn = req_host + ".local"
return req_host, erhn
def request_path(request):
"""Path component of request-URI, as defined by RFC 2965."""
url = request.get_full_url()
parts = urllib.parse.urlsplit(url)
path = escape_path(parts.path)
if not path.startswith("/"):
# fix bad RFC 2396 absoluteURI
path = "/" + path
return path
def request_port(request):
host = request.host
i = host.find(':')
if i >= 0:
port = host[i+1:]
try:
int(port)
except ValueError:
_debug("nonnumeric port: '%s'", port)
return None
else:
port = DEFAULT_HTTP_PORT
return port
# Characters in addition to A-Z, a-z, 0-9, '_', '.', and '-' that don't
# need to be escaped to form a valid HTTP URL (RFCs 2396 and 1738).
HTTP_PATH_SAFE = "%/;:@&=+$,!~*'()"
ESCAPED_CHAR_RE = re.compile(r"%([0-9a-fA-F][0-9a-fA-F])")
def uppercase_escaped_char(match):
return "%%%s" % match.group(1).upper()
def escape_path(path):
"""Escape any invalid characters in HTTP URL, and uppercase all escapes."""
# There's no knowing what character encoding was used to create URLs
# containing %-escapes, but since we have to pick one to escape invalid
# path characters, we pick UTF-8, as recommended in the HTML 4.0
# specification:
# http://www.w3.org/TR/REC-html40/appendix/notes.html#h-B.2.1
# And here, kind of: draft-fielding-uri-rfc2396bis-03
# (And in draft IRI specification: draft-duerst-iri-05)
# (And here, for new URI schemes: RFC 2718)
path = urllib.parse.quote(path, HTTP_PATH_SAFE)
path = ESCAPED_CHAR_RE.sub(uppercase_escaped_char, path)
return path
def reach(h):
"""Return reach of host h, as defined by RFC 2965, section 1.
The reach R of a host name H is defined as follows:
* If
- H is the host domain name of a host; and,
- H has the form A.B; and
- A has no embedded (that is, interior) dots; and
- B has at least one embedded dot, or B is the string "local".
then the reach of H is .B.
* Otherwise, the reach of H is H.
>>> reach("www.acme.com")
'.acme.com'
>>> reach("acme.com")
'acme.com'
>>> reach("acme.local")
'.local'
"""
i = h.find(".")
if i >= 0:
#a = h[:i] # this line is only here to show what a is
b = h[i+1:]
i = b.find(".")
if is_HDN(h) and (i >= 0 or b == "local"):
return "."+b
return h
def is_third_party(request):
"""
RFC 2965, section 3.3.6:
An unverifiable transaction is to a third-party host if its request-
host U does not domain-match the reach R of the request-host O in the
origin transaction.
"""
req_host = request_host(request)
if not domain_match(req_host, reach(request.origin_req_host)):
return True
else:
return False
class Cookie:
"""HTTP Cookie.
This class represents both Netscape and RFC 2965 cookies.
This is deliberately a very simple class. It just holds attributes. It's
possible to construct Cookie instances that don't comply with the cookie
standards. CookieJar.make_cookies is the factory function for Cookie
objects -- it deals with cookie parsing, supplying defaults, and
normalising to the representation used in this class. CookiePolicy is
responsible for checking them to see whether they should be accepted from
and returned to the server.
Note that the port may be present in the headers, but unspecified ("Port"
rather than"Port=80", for example); if this is the case, port is None.
"""
def __init__(self, version, name, value,
port, port_specified,
domain, domain_specified, domain_initial_dot,
path, path_specified,
secure,
expires,
discard,
comment,
comment_url,
rest,
rfc2109=False,
):
if version is not None: version = int(version)
if expires is not None: expires = int(expires)
if port is None and port_specified is True:
raise ValueError("if port is None, port_specified must be false")
self.version = version
self.name = name
self.value = value
self.port = port
self.port_specified = port_specified
# normalise case, as per RFC 2965 section 3.3.3
self.domain = domain.lower()
self.domain_specified = domain_specified
# Sigh. We need to know whether the domain given in the
# cookie-attribute had an initial dot, in order to follow RFC 2965
# (as clarified in draft errata). Needed for the returned $Domain
# value.
self.domain_initial_dot = domain_initial_dot
self.path = path
self.path_specified = path_specified
self.secure = secure
self.expires = expires
self.discard = discard
self.comment = comment
self.comment_url = comment_url
self.rfc2109 = rfc2109
self._rest = copy.copy(rest)
def has_nonstandard_attr(self, name):
return name in self._rest
def get_nonstandard_attr(self, name, default=None):
return self._rest.get(name, default)
def set_nonstandard_attr(self, name, value):
self._rest[name] = value
def is_expired(self, now=None):
if now is None: now = time.time()
if (self.expires is not None) and (self.expires <= now):
return True
return False
def __str__(self):
if self.port is None: p = ""
else: p = ":"+self.port
limit = self.domain + p + self.path
if self.value is not None:
namevalue = "%s=%s" % (self.name, self.value)
else:
namevalue = self.name
return "<Cookie %s for %s>" % (namevalue, limit)
def __repr__(self):
args = []
for name in ("version", "name", "value",
"port", "port_specified",
"domain", "domain_specified", "domain_initial_dot",
"path", "path_specified",
"secure", "expires", "discard", "comment", "comment_url",
):
attr = getattr(self, name)
args.append("%s=%s" % (name, repr(attr)))
args.append("rest=%s" % repr(self._rest))
args.append("rfc2109=%s" % repr(self.rfc2109))
return "Cookie(%s)" % ", ".join(args)
class CookiePolicy:
"""Defines which cookies get accepted from and returned to server.
May also modify cookies, though this is probably a bad idea.
The subclass DefaultCookiePolicy defines the standard rules for Netscape
and RFC 2965 cookies -- override that if you want a customised policy.
"""
def set_ok(self, cookie, request):
"""Return true if (and only if) cookie should be accepted from server.
Currently, pre-expired cookies never get this far -- the CookieJar
class deletes such cookies itself.
"""
raise NotImplementedError()
def return_ok(self, cookie, request):
"""Return true if (and only if) cookie should be returned to server."""
raise NotImplementedError()
def domain_return_ok(self, domain, request):
"""Return false if cookies should not be returned, given cookie domain.
"""
return True
def path_return_ok(self, path, request):
"""Return false if cookies should not be returned, given cookie path.
"""
return True
class DefaultCookiePolicy(CookiePolicy):
"""Implements the standard rules for accepting and returning cookies."""
DomainStrictNoDots = 1
DomainStrictNonDomain = 2
DomainRFC2965Match = 4
DomainLiberal = 0
DomainStrict = DomainStrictNoDots|DomainStrictNonDomain
def __init__(self,
blocked_domains=None, allowed_domains=None,
netscape=True, rfc2965=False,
rfc2109_as_netscape=None,
hide_cookie2=False,
strict_domain=False,
strict_rfc2965_unverifiable=True,
strict_ns_unverifiable=False,
strict_ns_domain=DomainLiberal,
strict_ns_set_initial_dollar=False,
strict_ns_set_path=False,
):
"""Constructor arguments should be passed as keyword arguments only."""
self.netscape = netscape
self.rfc2965 = rfc2965
self.rfc2109_as_netscape = rfc2109_as_netscape
self.hide_cookie2 = hide_cookie2
self.strict_domain = strict_domain
self.strict_rfc2965_unverifiable = strict_rfc2965_unverifiable
self.strict_ns_unverifiable = strict_ns_unverifiable
self.strict_ns_domain = strict_ns_domain
self.strict_ns_set_initial_dollar = strict_ns_set_initial_dollar
self.strict_ns_set_path = strict_ns_set_path
if blocked_domains is not None:
self._blocked_domains = tuple(blocked_domains)
else:
self._blocked_domains = ()
if allowed_domains is not None:
allowed_domains = tuple(allowed_domains)
self._allowed_domains = allowed_domains
def blocked_domains(self):
"""Return the sequence of blocked domains (as a tuple)."""
return self._blocked_domains
def set_blocked_domains(self, blocked_domains):
"""Set the sequence of blocked domains."""
self._blocked_domains = tuple(blocked_domains)
def is_blocked(self, domain):
for blocked_domain in self._blocked_domains:
if user_domain_match(domain, blocked_domain):
return True
return False
def allowed_domains(self):
"""Return None, or the sequence of allowed domains (as a tuple)."""
return self._allowed_domains
def set_allowed_domains(self, allowed_domains):
"""Set the sequence of allowed domains, or None."""
if allowed_domains is not None:
allowed_domains = tuple(allowed_domains)
self._allowed_domains = allowed_domains
def is_not_allowed(self, domain):
if self._allowed_domains is None:
return False
for allowed_domain in self._allowed_domains:
if user_domain_match(domain, allowed_domain):
return False
return True
def set_ok(self, cookie, request):
"""
If you override .set_ok(), be sure to call this method. If it returns
false, so should your subclass (assuming your subclass wants to be more
strict about which cookies to accept).
"""
_debug(" - checking cookie %s=%s", cookie.name, cookie.value)
assert cookie.name is not None
for n in "version", "verifiability", "name", "path", "domain", "port":
fn_name = "set_ok_"+n
fn = getattr(self, fn_name)
if not fn(cookie, request):
return False
return True
def set_ok_version(self, cookie, request):
if cookie.version is None:
# Version is always set to 0 by parse_ns_headers if it's a Netscape
# cookie, so this must be an invalid RFC 2965 cookie.
_debug(" Set-Cookie2 without version attribute (%s=%s)",
cookie.name, cookie.value)
return False
if cookie.version > 0 and not self.rfc2965:
_debug(" RFC 2965 cookies are switched off")
return False
elif cookie.version == 0 and not self.netscape:
_debug(" Netscape cookies are switched off")
return False
return True
def set_ok_verifiability(self, cookie, request):
if request.unverifiable and is_third_party(request):
if cookie.version > 0 and self.strict_rfc2965_unverifiable:
_debug(" third-party RFC 2965 cookie during "
"unverifiable transaction")
return False
elif cookie.version == 0 and self.strict_ns_unverifiable:
_debug(" third-party Netscape cookie during "
"unverifiable transaction")
return False
return True
def set_ok_name(self, cookie, request):
# Try and stop servers setting V0 cookies designed to hack other
# servers that know both V0 and V1 protocols.
if (cookie.version == 0 and self.strict_ns_set_initial_dollar and
cookie.name.startswith("$")):
_debug(" illegal name (starts with '$'): '%s'", cookie.name)
return False
return True
def set_ok_path(self, cookie, request):
if cookie.path_specified:
req_path = request_path(request)
if ((cookie.version > 0 or
(cookie.version == 0 and self.strict_ns_set_path)) and
not req_path.startswith(cookie.path)):
_debug(" path attribute %s is not a prefix of request "
"path %s", cookie.path, req_path)
return False
return True
def set_ok_domain(self, cookie, request):
if self.is_blocked(cookie.domain):
_debug(" domain %s is in user block-list", cookie.domain)
return False
if self.is_not_allowed(cookie.domain):
_debug(" domain %s is not in user allow-list", cookie.domain)
return False
if cookie.domain_specified:
req_host, erhn = eff_request_host(request)
domain = cookie.domain
if self.strict_domain and (domain.count(".") >= 2):
# XXX This should probably be compared with the Konqueror
# (kcookiejar.cpp) and Mozilla implementations, but it's a
# losing battle.
i = domain.rfind(".")
j = domain.rfind(".", 0, i)
if j == 0: # domain like .foo.bar
tld = domain[i+1:]
sld = domain[j+1:i]
if sld.lower() in ("co", "ac", "com", "edu", "org", "net",
"gov", "mil", "int", "aero", "biz", "cat", "coop",
"info", "jobs", "mobi", "museum", "name", "pro",
"travel", "eu") and len(tld) == 2:
# domain like .co.uk
_debug(" country-code second level domain %s", domain)
return False
if domain.startswith("."):
undotted_domain = domain[1:]
else:
undotted_domain = domain
embedded_dots = (undotted_domain.find(".") >= 0)
if not embedded_dots and domain != ".local":
_debug(" non-local domain %s contains no embedded dot",
domain)
return False
if cookie.version == 0:
if (not erhn.endswith(domain) and
(not erhn.startswith(".") and
not ("."+erhn).endswith(domain))):
_debug(" effective request-host %s (even with added "
"initial dot) does not end with %s",
erhn, domain)
return False
if (cookie.version > 0 or
(self.strict_ns_domain & self.DomainRFC2965Match)):
if not domain_match(erhn, domain):
_debug(" effective request-host %s does not domain-match "
"%s", erhn, domain)
return False
if (cookie.version > 0 or
(self.strict_ns_domain & self.DomainStrictNoDots)):
host_prefix = req_host[:-len(domain)]
if (host_prefix.find(".") >= 0 and
not IPV4_RE.search(req_host)):
_debug(" host prefix %s for domain %s contains a dot",
host_prefix, domain)
return False
return True
def set_ok_port(self, cookie, request):
if cookie.port_specified:
req_port = request_port(request)
if req_port is None:
req_port = "80"
else:
req_port = str(req_port)
for p in cookie.port.split(","):
try:
int(p)
except ValueError:
_debug(" bad port %s (not numeric)", p)
return False
if p == req_port:
break
else:
_debug(" request port (%s) not found in %s",
req_port, cookie.port)
return False
return True
def return_ok(self, cookie, request):
"""
If you override .return_ok(), be sure to call this method. If it
returns false, so should your subclass (assuming your subclass wants to
be more strict about which cookies to return).
"""
# Path has already been checked by .path_return_ok(), and domain
# blocking done by .domain_return_ok().
_debug(" - checking cookie %s=%s", cookie.name, cookie.value)
for n in "version", "verifiability", "secure", "expires", "port", "domain":
fn_name = "return_ok_"+n
fn = getattr(self, fn_name)
if not fn(cookie, request):
return False
return True
def return_ok_version(self, cookie, request):
if cookie.version > 0 and not self.rfc2965:
_debug(" RFC 2965 cookies are switched off")
return False
elif cookie.version == 0 and not self.netscape:
_debug(" Netscape cookies are switched off")
return False
return True
def return_ok_verifiability(self, cookie, request):
if request.unverifiable and is_third_party(request):
if cookie.version > 0 and self.strict_rfc2965_unverifiable:
_debug(" third-party RFC 2965 cookie during unverifiable "
"transaction")
return False
elif cookie.version == 0 and self.strict_ns_unverifiable:
_debug(" third-party Netscape cookie during unverifiable "
"transaction")
return False
return True
def return_ok_secure(self, cookie, request):
if cookie.secure and request.type != "https":
_debug(" secure cookie with non-secure request")
return False
return True
def return_ok_expires(self, cookie, request):
if cookie.is_expired(self._now):
_debug(" cookie expired")
return False
return True
def return_ok_port(self, cookie, request):
if cookie.port:
req_port = request_port(request)
if req_port is None:
req_port = "80"
for p in cookie.port.split(","):
if p == req_port:
break
else:
_debug(" request port %s does not match cookie port %s",
req_port, cookie.port)
return False
return True
def return_ok_domain(self, cookie, request):
req_host, erhn = eff_request_host(request)
domain = cookie.domain
# strict check of non-domain cookies: Mozilla does this, MSIE5 doesn't
if (cookie.version == 0 and
(self.strict_ns_domain & self.DomainStrictNonDomain) and
not cookie.domain_specified and domain != erhn):
_debug(" cookie with unspecified domain does not string-compare "
"equal to request domain")
return False
if cookie.version > 0 and not domain_match(erhn, domain):
_debug(" effective request-host name %s does not domain-match "
"RFC 2965 cookie domain %s", erhn, domain)
return False
if cookie.version == 0 and not ("."+erhn).endswith(domain):
_debug(" request-host %s does not match Netscape cookie domain "
"%s", req_host, domain)
return False
return True
def domain_return_ok(self, domain, request):
# Liberal check of. This is here as an optimization to avoid
# having to load lots of MSIE cookie files unless necessary.
req_host, erhn = eff_request_host(request)
if not req_host.startswith("."):
req_host = "."+req_host
if not erhn.startswith("."):
erhn = "."+erhn
if not (req_host.endswith(domain) or erhn.endswith(domain)):
#_debug(" request domain %s does not match cookie domain %s",
# req_host, domain)
return False
if self.is_blocked(domain):
_debug(" domain %s is in user block-list", domain)
return False
if self.is_not_allowed(domain):
_debug(" domain %s is not in user allow-list", domain)
return False
return True
def path_return_ok(self, path, request):
_debug("- checking cookie path=%s", path)
req_path = request_path(request)
if not req_path.startswith(path):
_debug(" %s does not path-match %s", req_path, path)
return False
return True
def vals_sorted_by_key(adict):
keys = sorted(adict.keys())
return map(adict.get, keys)
def deepvalues(mapping):
"""Iterates over nested mapping, depth-first, in sorted order by key."""
values = vals_sorted_by_key(mapping)
for obj in values:
mapping = False
try:
obj.items
except AttributeError:
pass
else:
mapping = True
for subobj in deepvalues(obj):
yield subobj
if not mapping:
yield obj
# Used as second parameter to dict.get() method, to distinguish absent
# dict key from one with a None value.
class Absent: pass
class CookieJar:
"""Collection of HTTP cookies.
You may not need to know about this class: try
urllib.request.build_opener(HTTPCookieProcessor).open(url).
"""
non_word_re = re.compile(r"\W")
quote_re = re.compile(r"([\"\\])")
strict_domain_re = re.compile(r"\.?[^.]*")
domain_re = re.compile(r"[^.]*")
dots_re = re.compile(r"^\.+")
magic_re = re.compile(r"^\#LWP-Cookies-(\d+\.\d+)", re.ASCII)
def __init__(self, policy=None):
if policy is None:
policy = DefaultCookiePolicy()
self._policy = policy
self._cookies_lock = _threading.RLock()
self._cookies = {}
def set_policy(self, policy):
self._policy = policy
def _cookies_for_domain(self, domain, request):
cookies = []
if not self._policy.domain_return_ok(domain, request):
return []
_debug("Checking %s for cookies to return", domain)
cookies_by_path = self._cookies[domain]
for path in cookies_by_path.keys():
if not self._policy.path_return_ok(path, request):
continue
cookies_by_name = cookies_by_path[path]
for cookie in cookies_by_name.values():
if not self._policy.return_ok(cookie, request):
_debug(" not returning cookie")
continue
_debug(" it's a match")
cookies.append(cookie)
return cookies
def _cookies_for_request(self, request):
"""Return a list of cookies to be returned to server."""
cookies = []
for domain in self._cookies.keys():
cookies.extend(self._cookies_for_domain(domain, request))
return cookies
def _cookie_attrs(self, cookies):
"""Return a list of cookie-attributes to be returned to server.
like ['foo="bar"; $Path="/"', ...]
The $Version attribute is also added when appropriate (currently only
once per request).
"""
# add cookies in order of most specific (ie. longest) path first
cookies.sort(key=lambda a: len(a.path), reverse=True)
version_set = False
attrs = []
for cookie in cookies:
# set version of Cookie header
# XXX
# What should it be if multiple matching Set-Cookie headers have
# different versions themselves?
# Answer: there is no answer; was supposed to be settled by
# RFC 2965 errata, but that may never appear...
version = cookie.version
if not version_set:
version_set = True
if version > 0:
attrs.append("$Version=%s" % version)
# quote cookie value if necessary
# (not for Netscape protocol, which already has any quotes
# intact, due to the poorly-specified Netscape Cookie: syntax)
if ((cookie.value is not None) and
self.non_word_re.search(cookie.value) and version > 0):
value = self.quote_re.sub(r"\\\1", cookie.value)
else:
value = cookie.value
# add cookie-attributes to be returned in Cookie header
if cookie.value is None:
attrs.append(cookie.name)
else:
attrs.append("%s=%s" % (cookie.name, value))
if version > 0:
if cookie.path_specified:
attrs.append('$Path="%s"' % cookie.path)
if cookie.domain.startswith("."):
domain = cookie.domain
if (not cookie.domain_initial_dot and
domain.startswith(".")):
domain = domain[1:]
attrs.append('$Domain="%s"' % domain)
if cookie.port is not None:
p = "$Port"
if cookie.port_specified:
p = p + ('="%s"' % cookie.port)
attrs.append(p)
return attrs
def add_cookie_header(self, request):
"""Add correct Cookie: header to request (urllib.request.Request object).
The Cookie2 header is also added unless policy.hide_cookie2 is true.
"""
_debug("add_cookie_header")
self._cookies_lock.acquire()
try:
self._policy._now = self._now = int(time.time())
cookies = self._cookies_for_request(request)
attrs = self._cookie_attrs(cookies)
if attrs:
if not request.has_header("Cookie"):
request.add_unredirected_header(
"Cookie", "; ".join(attrs))
# if necessary, advertise that we know RFC 2965
if (self._policy.rfc2965 and not self._policy.hide_cookie2 and
not request.has_header("Cookie2")):
for cookie in cookies:
if cookie.version != 1:
request.add_unredirected_header("Cookie2", '$Version="1"')
break
finally:
self._cookies_lock.release()
self.clear_expired_cookies()
def _normalized_cookie_tuples(self, attrs_set):
"""Return list of tuples containing normalised cookie information.
attrs_set is the list of lists of key,value pairs extracted from
the Set-Cookie or Set-Cookie2 headers.
Tuples are name, value, standard, rest, where name and value are the
cookie name and value, standard is a dictionary containing the standard
cookie-attributes (discard, secure, version, expires or max-age,
domain, path and port) and rest is a dictionary containing the rest of
the cookie-attributes.
"""
cookie_tuples = []
boolean_attrs = "discard", "secure"
value_attrs = ("version",
"expires", "max-age",
"domain", "path", "port",
"comment", "commenturl")
for cookie_attrs in attrs_set:
name, value = cookie_attrs[0]
# Build dictionary of standard cookie-attributes (standard) and
# dictionary of other cookie-attributes (rest).
# Note: expiry time is normalised to seconds since epoch. V0
# cookies should have the Expires cookie-attribute, and V1 cookies
# should have Max-Age, but since V1 includes RFC 2109 cookies (and
# since V0 cookies may be a mish-mash of Netscape and RFC 2109), we
# accept either (but prefer Max-Age).
max_age_set = False
bad_cookie = False
standard = {}
rest = {}
for k, v in cookie_attrs[1:]:
lc = k.lower()
# don't lose case distinction for unknown fields
if lc in value_attrs or lc in boolean_attrs:
k = lc
if k in boolean_attrs and v is None:
# boolean cookie-attribute is present, but has no value
# (like "discard", rather than "port=80")
v = True
if k in standard:
# only first value is significant
continue
if k == "domain":
if v is None:
_debug(" missing value for domain attribute")
bad_cookie = True
break
# RFC 2965 section 3.3.3
v = v.lower()
if k == "expires":
if max_age_set:
# Prefer max-age to expires (like Mozilla)
continue
if v is None:
_debug(" missing or invalid value for expires "
"attribute: treating as session cookie")
continue
if k == "max-age":
max_age_set = True
try:
v = int(v)
except ValueError:
_debug(" missing or invalid (non-numeric) value for "
"max-age attribute")
bad_cookie = True
break
# convert RFC 2965 Max-Age to seconds since epoch
# XXX Strictly you're supposed to follow RFC 2616
# age-calculation rules. Remember that zero Max-Age is a
# is a request to discard (old and new) cookie, though.
k = "expires"
v = self._now + v
if (k in value_attrs) or (k in boolean_attrs):
if (v is None and
k not in ("port", "comment", "commenturl")):
_debug(" missing value for %s attribute" % k)
bad_cookie = True
break
standard[k] = v
else:
rest[k] = v
if bad_cookie:
continue
cookie_tuples.append((name, value, standard, rest))
return cookie_tuples
def _cookie_from_cookie_tuple(self, tup, request):
# standard is dict of standard cookie-attributes, rest is dict of the
# rest of them
name, value, standard, rest = tup
domain = standard.get("domain", Absent)
path = standard.get("path", Absent)
port = standard.get("port", Absent)
expires = standard.get("expires", Absent)
# set the easy defaults
version = standard.get("version", None)
if version is not None:
try:
version = int(version)
except ValueError:
return None # invalid version, ignore cookie
secure = standard.get("secure", False)
# (discard is also set if expires is Absent)
discard = standard.get("discard", False)
comment = standard.get("comment", None)
comment_url = standard.get("commenturl", None)
# set default path
if path is not Absent and path != "":
path_specified = True
path = escape_path(path)
else:
path_specified = False
path = request_path(request)
i = path.rfind("/")
if i != -1:
if version == 0:
# Netscape spec parts company from reality here
path = path[:i]
else:
path = path[:i+1]
if len(path) == 0: path = "/"
# set default domain
domain_specified = domain is not Absent
# but first we have to remember whether it starts with a dot
domain_initial_dot = False
if domain_specified:
domain_initial_dot = bool(domain.startswith("."))
if domain is Absent:
req_host, erhn = eff_request_host(request)
domain = erhn
elif not domain.startswith("."):
domain = "."+domain
# set default port
port_specified = False
if port is not Absent:
if port is None:
# Port attr present, but has no value: default to request port.
# Cookie should then only be sent back on that port.
port = request_port(request)
else:
port_specified = True
port = re.sub(r"\s+", "", port)
else:
# No port attr present. Cookie can be sent back on any port.
port = None
# set default expires and discard
if expires is Absent:
expires = None
discard = True
elif expires <= self._now:
# Expiry date in past is request to delete cookie. This can't be
# in DefaultCookiePolicy, because can't delete cookies there.
try:
self.clear(domain, path, name)
except KeyError:
pass
_debug("Expiring cookie, domain='%s', path='%s', name='%s'",
domain, path, name)
return None
return Cookie(version,
name, value,
port, port_specified,
domain, domain_specified, domain_initial_dot,
path, path_specified,
secure,
expires,
discard,
comment,
comment_url,
rest)
def _cookies_from_attrs_set(self, attrs_set, request):
cookie_tuples = self._normalized_cookie_tuples(attrs_set)
cookies = []
for tup in cookie_tuples:
cookie = self._cookie_from_cookie_tuple(tup, request)
if cookie: cookies.append(cookie)
return cookies
def _process_rfc2109_cookies(self, cookies):
rfc2109_as_ns = getattr(self._policy, 'rfc2109_as_netscape', None)
if rfc2109_as_ns is None:
rfc2109_as_ns = not self._policy.rfc2965
for cookie in cookies:
if cookie.version == 1:
cookie.rfc2109 = True
if rfc2109_as_ns:
# treat 2109 cookies as Netscape cookies rather than
# as RFC2965 cookies
cookie.version = 0
def make_cookies(self, response, request):
"""Return sequence of Cookie objects extracted from response object."""
# get cookie-attributes for RFC 2965 and Netscape protocols
headers = response.info()
rfc2965_hdrs = headers.get_all("Set-Cookie2", [])
ns_hdrs = headers.get_all("Set-Cookie", [])
rfc2965 = self._policy.rfc2965
netscape = self._policy.netscape
if ((not rfc2965_hdrs and not ns_hdrs) or
(not ns_hdrs and not rfc2965) or
(not rfc2965_hdrs and not netscape) or
(not netscape and not rfc2965)):
return [] # no relevant cookie headers: quick exit
try:
cookies = self._cookies_from_attrs_set(
split_header_words(rfc2965_hdrs), request)
except Exception:
_warn_unhandled_exception()
cookies = []
if ns_hdrs and netscape:
try:
# RFC 2109 and Netscape cookies
ns_cookies = self._cookies_from_attrs_set(
parse_ns_headers(ns_hdrs), request)
except Exception:
_warn_unhandled_exception()
ns_cookies = []
self._process_rfc2109_cookies(ns_cookies)
# Look for Netscape cookies (from Set-Cookie headers) that match
# corresponding RFC 2965 cookies (from Set-Cookie2 headers).
# For each match, keep the RFC 2965 cookie and ignore the Netscape
# cookie (RFC 2965 section 9.1). Actually, RFC 2109 cookies are
# bundled in with the Netscape cookies for this purpose, which is
# reasonable behaviour.
if rfc2965:
lookup = {}
for cookie in cookies:
lookup[(cookie.domain, cookie.path, cookie.name)] = None
def no_matching_rfc2965(ns_cookie, lookup=lookup):
key = ns_cookie.domain, ns_cookie.path, ns_cookie.name
return key not in lookup
ns_cookies = filter(no_matching_rfc2965, ns_cookies)
if ns_cookies:
cookies.extend(ns_cookies)
return cookies
def set_cookie_if_ok(self, cookie, request):
"""Set a cookie if policy says it's OK to do so."""
self._cookies_lock.acquire()
try:
self._policy._now = self._now = int(time.time())
if self._policy.set_ok(cookie, request):
self.set_cookie(cookie)
finally:
self._cookies_lock.release()
def set_cookie(self, cookie):
"""Set a cookie, without checking whether or not it should be set."""
c = self._cookies
self._cookies_lock.acquire()
try:
if cookie.domain not in c: c[cookie.domain] = {}
c2 = c[cookie.domain]
if cookie.path not in c2: c2[cookie.path] = {}
c3 = c2[cookie.path]
c3[cookie.name] = cookie
finally:
self._cookies_lock.release()
def extract_cookies(self, response, request):
"""Extract cookies from response, where allowable given the request."""
_debug("extract_cookies: %s", response.info())
self._cookies_lock.acquire()
try:
self._policy._now = self._now = int(time.time())
for cookie in self.make_cookies(response, request):
if self._policy.set_ok(cookie, request):
_debug(" setting cookie: %s", cookie)
self.set_cookie(cookie)
finally:
self._cookies_lock.release()
def clear(self, domain=None, path=None, name=None):
"""Clear some cookies.
Invoking this method without arguments will clear all cookies. If
given a single argument, only cookies belonging to that domain will be
removed. If given two arguments, cookies belonging to the specified
path within that domain are removed. If given three arguments, then
the cookie with the specified name, path and domain is removed.
Raises KeyError if no matching cookie exists.
"""
if name is not None:
if (domain is None) or (path is None):
raise ValueError(
"domain and path must be given to remove a cookie by name")
del self._cookies[domain][path][name]
elif path is not None:
if domain is None:
raise ValueError(
"domain must be given to remove cookies by path")
del self._cookies[domain][path]
elif domain is not None:
del self._cookies[domain]
else:
self._cookies = {}
def clear_session_cookies(self):
"""Discard all session cookies.
Note that the .save() method won't save session cookies anyway, unless
you ask otherwise by passing a true ignore_discard argument.
"""
self._cookies_lock.acquire()
try:
for cookie in self:
if cookie.discard:
self.clear(cookie.domain, cookie.path, cookie.name)
finally:
self._cookies_lock.release()
def clear_expired_cookies(self):
"""Discard all expired cookies.
You probably don't need to call this method: expired cookies are never
sent back to the server (provided you're using DefaultCookiePolicy),
this method is called by CookieJar itself every so often, and the
.save() method won't save expired cookies anyway (unless you ask
otherwise by passing a true ignore_expires argument).
"""
self._cookies_lock.acquire()
try:
now = time.time()
for cookie in self:
if cookie.is_expired(now):
self.clear(cookie.domain, cookie.path, cookie.name)
finally:
self._cookies_lock.release()
def __iter__(self):
return deepvalues(self._cookies)
def __len__(self):
"""Return number of contained cookies."""
i = 0
for cookie in self: i = i + 1
return i
def __repr__(self):
r = []
for cookie in self: r.append(repr(cookie))
return "<%s[%s]>" % (self.__class__, ", ".join(r))
def __str__(self):
r = []
for cookie in self: r.append(str(cookie))
return "<%s[%s]>" % (self.__class__, ", ".join(r))
# derives from IOError for backwards-compatibility with Python 2.4.0
class LoadError(IOError): pass
class FileCookieJar(CookieJar):
"""CookieJar that can be loaded from and saved to a file."""
def __init__(self, filename=None, delayload=False, policy=None):
"""
Cookies are NOT loaded from the named file until either the .load() or
.revert() method is called.
"""
CookieJar.__init__(self, policy)
if filename is not None:
try:
filename+""
except:
raise ValueError("filename must be string-like")
self.filename = filename
self.delayload = bool(delayload)
def save(self, filename=None, ignore_discard=False, ignore_expires=False):
"""Save cookies to a file."""
raise NotImplementedError()
def load(self, filename=None, ignore_discard=False, ignore_expires=False):
"""Load cookies from a file."""
if filename is None:
if self.filename is not None: filename = self.filename
else: raise ValueError(MISSING_FILENAME_TEXT)
f = open(filename)
try:
self._really_load(f, filename, ignore_discard, ignore_expires)
finally:
f.close()
def revert(self, filename=None,
ignore_discard=False, ignore_expires=False):
"""Clear all cookies and reload cookies from a saved file.
Raises LoadError (or IOError) if reversion is not successful; the
object's state will not be altered if this happens.
"""
if filename is None:
if self.filename is not None: filename = self.filename
else: raise ValueError(MISSING_FILENAME_TEXT)
self._cookies_lock.acquire()
try:
old_state = copy.deepcopy(self._cookies)
self._cookies = {}
try:
self.load(filename, ignore_discard, ignore_expires)
except (LoadError, IOError):
self._cookies = old_state
raise
finally:
self._cookies_lock.release()
def lwp_cookie_str(cookie):
"""Return string representation of Cookie in an the LWP cookie file format.
Actually, the format is extended a bit -- see module docstring.
"""
h = [(cookie.name, cookie.value),
("path", cookie.path),
("domain", cookie.domain)]
if cookie.port is not None: h.append(("port", cookie.port))
if cookie.path_specified: h.append(("path_spec", None))
if cookie.port_specified: h.append(("port_spec", None))
if cookie.domain_initial_dot: h.append(("domain_dot", None))
if cookie.secure: h.append(("secure", None))
if cookie.expires: h.append(("expires",
time2isoz(float(cookie.expires))))
if cookie.discard: h.append(("discard", None))
if cookie.comment: h.append(("comment", cookie.comment))
if cookie.comment_url: h.append(("commenturl", cookie.comment_url))
keys = sorted(cookie._rest.keys())
for k in keys:
h.append((k, str(cookie._rest[k])))
h.append(("version", str(cookie.version)))
return join_header_words([h])
class LWPCookieJar(FileCookieJar):
"""
The LWPCookieJar saves a sequence of "Set-Cookie3" lines.
"Set-Cookie3" is the format used by the libwww-perl libary, not known
to be compatible with any browser, but which is easy to read and
doesn't lose information about RFC 2965 cookies.
Additional methods
as_lwp_str(ignore_discard=True, ignore_expired=True)
"""
def as_lwp_str(self, ignore_discard=True, ignore_expires=True):
"""Return cookies as a string of "\\n"-separated "Set-Cookie3" headers.
ignore_discard and ignore_expires: see docstring for FileCookieJar.save
"""
now = time.time()
r = []
for cookie in self:
if not ignore_discard and cookie.discard:
continue
if not ignore_expires and cookie.is_expired(now):
continue
r.append("Set-Cookie3: %s" % lwp_cookie_str(cookie))
return "\n".join(r+[""])
def save(self, filename=None, ignore_discard=False, ignore_expires=False):
if filename is None:
if self.filename is not None: filename = self.filename
else: raise ValueError(MISSING_FILENAME_TEXT)
f = open(filename, "w")
try:
# There really isn't an LWP Cookies 2.0 format, but this indicates
# that there is extra information in here (domain_dot and
# port_spec) while still being compatible with libwww-perl, I hope.
f.write("#LWP-Cookies-2.0\n")
f.write(self.as_lwp_str(ignore_discard, ignore_expires))
finally:
f.close()
def _really_load(self, f, filename, ignore_discard, ignore_expires):
magic = f.readline()
if not self.magic_re.search(magic):
msg = ("%r does not look like a Set-Cookie3 (LWP) format "
"file" % filename)
raise LoadError(msg)
now = time.time()
header = "Set-Cookie3:"
boolean_attrs = ("port_spec", "path_spec", "domain_dot",
"secure", "discard")
value_attrs = ("version",
"port", "path", "domain",
"expires",
"comment", "commenturl")
try:
while 1:
line = f.readline()
if line == "": break
if not line.startswith(header):
continue
line = line[len(header):].strip()
for data in split_header_words([line]):
name, value = data[0]
standard = {}
rest = {}
for k in boolean_attrs:
standard[k] = False
for k, v in data[1:]:
if k is not None:
lc = k.lower()
else:
lc = None
# don't lose case distinction for unknown fields
if (lc in value_attrs) or (lc in boolean_attrs):
k = lc
if k in boolean_attrs:
if v is None: v = True
standard[k] = v
elif k in value_attrs:
standard[k] = v
else:
rest[k] = v
h = standard.get
expires = h("expires")
discard = h("discard")
if expires is not None:
expires = iso2time(expires)
if expires is None:
discard = True
domain = h("domain")
domain_specified = domain.startswith(".")
c = Cookie(h("version"), name, value,
h("port"), h("port_spec"),
domain, domain_specified, h("domain_dot"),
h("path"), h("path_spec"),
h("secure"),
expires,
discard,
h("comment"),
h("commenturl"),
rest)
if not ignore_discard and c.discard:
continue
if not ignore_expires and c.is_expired(now):
continue
self.set_cookie(c)
except IOError:
raise
except Exception:
_warn_unhandled_exception()
raise LoadError("invalid Set-Cookie3 format file %r: %r" %
(filename, line))
class MozillaCookieJar(FileCookieJar):
"""
WARNING: you may want to backup your browser's cookies file if you use
this class to save cookies. I *think* it works, but there have been
bugs in the past!
This class differs from CookieJar only in the format it uses to save and
load cookies to and from a file. This class uses the Mozilla/Netscape
`cookies.txt' format. lynx uses this file format, too.
Don't expect cookies saved while the browser is running to be noticed by
the browser (in fact, Mozilla on unix will overwrite your saved cookies if
you change them on disk while it's running; on Windows, you probably can't
save at all while the browser is running).
Note that the Mozilla/Netscape format will downgrade RFC2965 cookies to
Netscape cookies on saving.
In particular, the cookie version and port number information is lost,
together with information about whether or not Path, Port and Discard were
specified by the Set-Cookie2 (or Set-Cookie) header, and whether or not the
domain as set in the HTTP header started with a dot (yes, I'm aware some
domains in Netscape files start with a dot and some don't -- trust me, you
really don't want to know any more about this).
Note that though Mozilla and Netscape use the same format, they use
slightly different headers. The class saves cookies using the Netscape
header by default (Mozilla can cope with that).
"""
magic_re = re.compile("#( Netscape)? HTTP Cookie File")
header = """\
# Netscape HTTP Cookie File
# http://curl.haxx.se/rfc/cookie_spec.html
# This is a generated file! Do not edit.
"""
def _really_load(self, f, filename, ignore_discard, ignore_expires):
now = time.time()
magic = f.readline()
if not self.magic_re.search(magic):
f.close()
raise LoadError(
"%r does not look like a Netscape format cookies file" %
filename)
try:
while 1:
line = f.readline()
if line == "": break
# last field may be absent, so keep any trailing tab
if line.endswith("\n"): line = line[:-1]
# skip comments and blank lines XXX what is $ for?
if (line.strip().startswith(("#", "$")) or
line.strip() == ""):
continue
domain, domain_specified, path, secure, expires, name, value = \
line.split("\t")
secure = (secure == "TRUE")
domain_specified = (domain_specified == "TRUE")
if name == "":
# cookies.txt regards 'Set-Cookie: foo' as a cookie
# with no name, whereas http.cookiejar regards it as a
# cookie with no value.
name = value
value = None
initial_dot = domain.startswith(".")
assert domain_specified == initial_dot
discard = False
if expires == "":
expires = None
discard = True
# assume path_specified is false
c = Cookie(0, name, value,
None, False,
domain, domain_specified, initial_dot,
path, False,
secure,
expires,
discard,
None,
None,
{})
if not ignore_discard and c.discard:
continue
if not ignore_expires and c.is_expired(now):
continue
self.set_cookie(c)
except IOError:
raise
except Exception:
_warn_unhandled_exception()
raise LoadError("invalid Netscape format cookies file %r: %r" %
(filename, line))
def save(self, filename=None, ignore_discard=False, ignore_expires=False):
if filename is None:
if self.filename is not None: filename = self.filename
else: raise ValueError(MISSING_FILENAME_TEXT)
f = open(filename, "w")
try:
f.write(self.header)
now = time.time()
for cookie in self:
if not ignore_discard and cookie.discard:
continue
if not ignore_expires and cookie.is_expired(now):
continue
if cookie.secure: secure = "TRUE"
else: secure = "FALSE"
if cookie.domain.startswith("."): initial_dot = "TRUE"
else: initial_dot = "FALSE"
if cookie.expires is not None:
expires = str(cookie.expires)
else:
expires = ""
if cookie.value is None:
# cookies.txt regards 'Set-Cookie: foo' as a cookie
# with no name, whereas http.cookiejar regards it as a
# cookie with no value.
name = ""
value = cookie.name
else:
name = cookie.name
value = cookie.value
f.write(
"\t".join([cookie.domain, initial_dot, cookie.path,
secure, expires, name, value])+
"\n")
finally:
f.close()
|
Top Tabs
Saturday, February 4, 2012
The Upside Of Irrationality: Chapter 7
Through a series of experiments, Dan Ariely documents the many ways in which humans behave irrationally. By understanding these human tendencies, we can both learn to behave more rationally when it is to our benefit, and better understand why those around us are behaving in the way they are.
Another way we adapt is in how we choose our mates or dating partners. Ariely notes that people of certain attractiveness levels appear to date others of similar levels (e.g. attractive people date attractive people, unattractive people date unattractive people), and he set out to find out how this happens.
Through experiments using Internet dating sites, Ariely was able to arrive at a few interesting conclusions. First, no matter how attractive we are (as judged by others), our scale of how attractive others are doesn't seem to change. That is, both unattractive people and attractive people rate others in a similar way.
But what does change is who we are likely to approach. We appear much more likely to approach people who are of a similar level of attractiveness to our own, even though we find others more attractive.
Through other experiments, Ariely finds that we do this by altering what we consider to be important in a mate. By stressing features other than attractiveness (e.g. sense of humour), we can actually make ourselves more attracted to someone who is nearer to our attractiveness level. This adaptation can serve to make us happy even when we are with someone whom we don't judge to be as attractive as others. |
Mindfulness for Psychosis Groups; Within-Session Effects on Stress and Symptom-Related Distress in Routine Community Care.
There is an emerging evidence base that mindfulness for psychosis is a safe and effective intervention. However, empirical data on the within-session effects of mindfulness meditation was hitherto lacking. The aim of the study was to assess the impact of taking part in a mindfulness for psychosis group, using a within-session self-report measure of general stress, and symptom-related distress. Users of a secondary mental health service (n = 34), who experienced enduring psychotic symptoms, took part in an 8-week mindfulness for psychosis group in a community setting. Mindfulness meditations were limited to 10 minutes and included explicit reference to psychotic experience arising during the practice. Participants self-rated general stress, and symptom-related distress, before and after each group session using a visual analogue scale. Average ratings of general stress and symptom-related distress decreased from pre- to post-session for all eight sessions, although not all differences were statistically significant. There was no increase in general stress, or symptom-related distress across any session. There was evidence of positive effects and no evidence of any harmful effects arising from people with psychotic symptoms taking part in a mindfulness for psychosis session. |
-module(cover).
-export([ cover/0]).
cover()->
io:format("~n********************************************************************************~n"),
io:format("Running Tests~n~n"),
cover:start(),
_R = cover:compile_beam_directory("ebin/"),
Modules = cover:modules(),
[eunit:test(Module) || Module <- Modules],
Coverage = [cover:analyse(Module, calls, line) || Module <- Modules],
L = lists:merge([Lines || {ok, Lines} <- Coverage]),
NonTestModules = lists:filter(fun({{Module, _}, _} )->
Es = lists:reverse(string:tokens(atom_to_list(Module),"_") ),
lists:nth(1, Es) =/= "test"
end,L),
Zeros = lists:filter(fun ({{_Module, _Line}, Count}) ->
Count =:= 0
end, NonTestModules),
[io:format("src/~p.erl:~p: No Code Coverage~n",[Module, Line])|| {{Module, Line}, 0} <-Zeros],
init:stop().
|
using System;
namespace Server.Engines.Craft
{
public class CraftSkillCol : System.Collections.CollectionBase
{
public CraftSkillCol()
{
}
public void Add( CraftSkill craftSkill )
{
List.Add( craftSkill );
}
public void Remove( int index )
{
if ( index > Count - 1 || index < 0 )
{
}
else
{
List.RemoveAt( index );
}
}
public CraftSkill GetAt( int index )
{
return ( CraftSkill ) List[index];
}
}
} |
This disclosure relates in general to IC signal interfaces and in particular to IC signal interfaces related to JTAG based test, emulation, debug, and trace operations. This disclosure is a further development of a previous disclosure application Ser. No. 12/182,605 titled “Optimized JTAG Interface”. The previous material of application Ser. No. 12/182,605 is completely incorporated into this new disclosure. The new material of this disclosure starts with FIG. 29. |
Q:
Pivot text data in R from columns to row
I have a problem trying to pivot text data in R from columns to rows. The data has numeric and text columns but the text columns won't pivot? I have tried using dplyr but will use anything that works?
Code
long=pivot_longer(original, c('Col1','Col2','Col3' ))
Dput:
structure(list(Name = c("Joe", "Sanj", "Rob"), Date = c("12/08/2020",
"13/08/2020", "14/08/2020"), Col1 = c(20, 60, 40), Col2 = c("blue",
"red", "black"), Col3 = c(100, 233, 500)), row.names = c(NA,
-3L), class = c("tbl_df", "tbl", "data.frame"))
A:
Here is a data.table solution:
setDT(dt)
melt(dt, id=1:2, measure = 3:5)
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!-- NewPage -->
<html lang="en">
<head>
<!-- Generated by javadoc (1.8.0_262) on Mon Aug 03 15:38:39 EDT 2020 -->
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>PaymentAuthWebViewActivity</title>
<meta name="date" content="2020-08-03">
<meta name="keywords" content="com.stripe.android.view.PaymentAuthWebViewActivity class">
<meta name="keywords" content="onCreate()">
<meta name="keywords" content="onDestroy()">
<meta name="keywords" content="onCreateOptionsMenu()">
<meta name="keywords" content="onOptionsItemSelected()">
<meta name="keywords" content="onBackPressed()">
<link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="Style">
<script type="text/javascript" src="../../../../script.js"></script>
</head>
<body>
<script type="text/javascript"><!--
try {
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="PaymentAuthWebViewActivity";
}
}
catch(err) {
}
//-->
</script>
<noscript>
<div>JavaScript is disabled on your browser.</div>
</noscript>
<!-- ========= START OF TOP NAVBAR ======= -->
<div class="topNav"><a name="navbar.top">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.top.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-all.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../../com/stripe/android/view/IconTextInputLayout.html" title="class in com.stripe.android.view"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../../../../com/stripe/android/view/PaymentFlowActivity.html" title="class in com.stripe.android.view"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../../index.html?com/stripe/android/view/PaymentAuthWebViewActivity.html" target="_top">Frames</a></li>
<li><a href="PaymentAuthWebViewActivity.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_top">
<li><a href="../../../../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_top");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.top">
<!-- -->
</a></div>
<!-- ========= END OF TOP NAVBAR ========= -->
<!-- ======== START OF CLASS DATA ======== -->
<div class="header">
<div class="subTitle">com.stripe.android.view</div>
<h2 title="Class PaymentAuthWebViewActivity" class="title">Class PaymentAuthWebViewActivity</h2>
</div>
<div class="contentContainer">
<ul class="inheritance">
<li>com.stripe.android.view.PaymentAuthWebViewActivity</li>
</ul>
<div class="description">
<ul class="blockList">
<li class="blockList">
<hr>
<br>
<pre>public class <span class="typeNameLabel">PaymentAuthWebViewActivity</span></pre>
</li>
</ul>
</div>
<div class="details">
<ul class="blockList">
<li class="blockList">
<!-- ========= CONSTRUCTOR DETAIL ======== -->
<ul class="blockList">
<li class="blockList"><a name="constructor.detail">
<!-- -->
</a>
<h3>Constructor Detail</h3>
<a name="PaymentAuthWebViewActivity--">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>PaymentAuthWebViewActivity</h4>
<pre>public PaymentAuthWebViewActivity()</pre>
</li>
</ul>
</li>
</ul>
<!-- ============ METHOD DETAIL ========== -->
<ul class="blockList">
<li class="blockList"><a name="method.detail">
<!-- -->
</a>
<h3>Method Detail</h3>
<a name="onCreate-savedInstanceState-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>onCreate</h4>
<pre>protected void onCreate(@Nullable
android.os.Bundle savedInstanceState)</pre>
</li>
</ul>
<a name="onDestroy--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>onDestroy</h4>
<pre>protected void onDestroy()</pre>
</li>
</ul>
<a name="onCreateOptionsMenu-menu-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>onCreateOptionsMenu</h4>
<pre>public boolean onCreateOptionsMenu(@NotNull
android.view.Menu menu)</pre>
</li>
</ul>
<a name="onOptionsItemSelected-item-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>onOptionsItemSelected</h4>
<pre>public boolean onOptionsItemSelected(@NotNull
android.view.MenuItem item)</pre>
</li>
</ul>
<a name="onBackPressed--">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>onBackPressed</h4>
<pre>public void onBackPressed()</pre>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
</div>
<!-- ========= END OF CLASS DATA ========= -->
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<div class="bottomNav"><a name="navbar.bottom">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.bottom.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-all.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../../com/stripe/android/view/IconTextInputLayout.html" title="class in com.stripe.android.view"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../../../../com/stripe/android/view/PaymentFlowActivity.html" title="class in com.stripe.android.view"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../../index.html?com/stripe/android/view/PaymentAuthWebViewActivity.html" target="_top">Frames</a></li>
<li><a href="PaymentAuthWebViewActivity.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_bottom">
<li><a href="../../../../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_bottom");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.bottom">
<!-- -->
</a></div>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
</body>
</html>
|
Commissioners in one North Dakota county voted on Monday night to continue accepting refugees, a split decision that came about because of a Trump administration policy that gives local officials the extraordinary option to reject people fleeing persecution.
The vote by the Burleigh County Commission, which followed a nearly four-hour session of public comment with emotional pleas from residents on both sides of the issue, came as governors and local officials across the country weigh an executive order by President Trump that requires local consent for new refugee arrivals.
So far, it is not believed that any local government has refused to take refugees next year. But the North Dakota commissioners voted, 3-2, to cap refugee admissions in their county at 25, about the same number as last year, and also asked for an annual report on the new arrivals. It was not immediately clear whether they had the authority to set those conditions.
The Burleigh County commissioners had originally planned to debate the issue last week, but they postponed the hearing after a large crowd turned up to speak. Ahead of the rescheduled meeting, which was moved to a middle school with more space, commissioners’ inboxes were flooded with emails from residents for and against the proposal. |
Q:
Is it possible to send a pygame key event through bluetooth?
I dont have any trial code to show as I dont know where to start even after researching this, but what I'm asking is if it's possible to send a pygame event.type like pygame.KEYDOWN from let's say a raspberry pi Zero to a pc using a bluetooth connection. So that the pc where the game is being run receives a event in pygame.event.get() to handle whatever code you have connected to that event.
Is this at all possible? If so, how would one send such an event? Establishing a bluetooth connection isnt the big issue, as there is documentation about that to be found.
A:
Sure, just use pygame.event.post to put an event into the event queue.
pygame.event.get will receive it as usual. You maybe want to create a second thread to listen for your bluetooth events, and then just post a new pygame event in response.
|
Q:
Ruby on Rails Problem PotionStore
I am trying to install the PotionStore on my Mac OS X 10.6 server with Ruby on Rails 3 installed. Upon launching the server on port 3000 and pointing safari to this address, I get this:
NameError in
Store/orderController#index
uninitialized constant
ActiveRecord::ConnectionAdapters::PostgreSQLAdapter::PGconn
What does this mean? I'm not too advanced with Ruby on Rails, so this throws me a bit.
A:
The application is configured to use PostgreSQL, as I already stated in the comment. You can change the adapter value here to mysql to change it to use MySQL. The README says it works, but it may not.
I feel I need to elaborate further on what this application specifically is. It's a Ruby on Rails 2 application and if you've installed Rails 3 and you're trying to use it to boot the application then you're going to run into some headaches. 3 is not backwards compatible with 2.
You've got three options.
The first is to upgrade the application (which it sounds like you're not familiar with) to Rails 3 and get all the latest and greatest goodies, such as Bundler for example.
The second is to ask the potionfactory guys / girls nicely if they wouldn't mind upgrading it to Rails 3 because "it's a really great application and I want to use it".
The third is to leave it in it's old state and switch to using an older version of Rails (2.1 or "higher" the README states), anything in the 2.1.x - 2.3.x range should work, but for reasons that should be obvious, you should be using the latest 2.3.x release. This would be made much easier by using RVM and its gemsets functionality.
|
Q:
Force URL root to be HTTPS instead of HTTP for RoR application
I am attempting to run Redmine (RoR) through an Apache reverse proxy. Mongrel serves plain-text pages which Apache protects with SSL and serves to my users. The problem is that various links and redirects within Redmine send users to http:// instead of https:// .
The settings on the admin page are configured for https but this doesn't seem to help. I also added this line to environment.rb to solve a relative root problem (that fixed it, but not the https problem):
ActionController::AbstractRequest.relative_url_root = "/r/"
How can I force Redmine to always use https?
Note that a redirect won't work because my server only has :443 open and thus :80 requests wouldn't be seen to be rewritten. A rewrite of the site's data could work but seems less than ideal.
A:
Each of these refer to setting X_FORWARDED_PROTO to 'https' in your Apache config:
http://www.redmine.org/issues/1145
http://briancochran.blogspot.com/2008/05/https-with-mongrel-and-apache.html
Best of luck.
|
CREW Asks FCC to Deny Renewal of News Corp.’s Broadcast License
Today, Citizens for Responsibility and Ethics in Washington (CREW) filed a petition with the Federal Communications Commission (FCC), asking the agency to deny renewal of three broadcast licenses held by Fox television stations. Because their licenses are set to expire in October, two Fox stations in Washington, D.C. and one in Baltimore – which are wholly owned subsidiaries of News Corp. – filed to renew the licenses this past June.
CREW is objecting to the renewals because under U.S. law, broadcast frequencies may be used only by people of good “character,” who will serve “the public interest,” and speak with “candor.” Significant character deficiencies may warrant disqualification from holding a license.
“It is well-established that News Corp. has been involved in one of the biggest media scandals of all time. Its reporters hacked voicemails and bribed public officials while top executives – including Rupert Murdoch – either approved the conduct or turned a blind eye,” said CREW Executive Director Melanie Sloan. “To say those responsible are not of good character is a colossal understatement – ‘despicable’ and ‘loathsome’ are more apt. Retaining U.S. broadcast licenses is a privilege, not a right. Based on its egregious actions, News Corp. should lose that privilege.” |
Q:
Fatal error: Maximum function nesting level of '100' reached, aborting! with ionCube loader
I am getting Fatal error: Maximum function nesting level of '100' reached, aborting! with ionCube loader.And I don't want to uninstall IonCube.So what should I do ?
A:
Some solutions
Rewrite your code to make sure you never reach 100 nested calls
Raise limit on xdebug: xdebug.max_nesting_level = 200 in php.ini
|
Melania Trump’s fashion choice once again caught everyone’s attention Monday when she and her President Trump welcomed the President of Panama to the White House.
POTUS and FLOTUS welcomed President Juan Carlos Varela and Mrs. Varela at the South Portico of the White House Monday morning, and the dress the first lady was wearing was simply breathtaking.
Melania was dressed in a form-fitting, off-the-shoulder, Carolina blue dress that came down just to her knees. Mrs. Varela wore a green dress of similar length for the occasion.
The president and the first lady posed for a few photos outside with their guests before going inside and visiting in the Oval Office.
The first lady officially moved into the White House just last week. She and Barron Trump had stayed in New York City so that he could finish the school year before moving to Washington.
Melania seems to to be adjusting to her full-time role as first lady with ease. |
Low social support and poor emotional regulation are associated with increased stress hormone reactivity to mental stress in systemic hypertension.
There is strong evidence for a physiological hyperreactivity to stress in systemic hypertension, but data on associated or potentially moderating psychological factors are scarce. The objective of the study was to identify psychological correlates of physiological stress reactivity in systemic hypertension. This was a cross-sectional, quasi-experimentally controlled study. Study participants underwent an acute standardized psychosocial stress task combining public speaking and mental arithmetic in front of an audience. The study was conducted in the population in the state of Zurich, Switzerland. Subjects included 22 hypertensive and 26 normotensive men (mean +/- sem 44 +/- 2 yr). We assessed the psychological measures social support, emotional regulation, and cognitive appraisal of the stressful situation. Moreover, we measured salivary cortisol and plasma epinephrine and norepinephrine before and after stress and several times up to 60 min thereafter as well as blood pressure and heart rate. We found poorer hedonistic emotional regulation (HER) and lower perceived social support in hypertensives, compared with normotensives (P < 0.01). Compared with normotensives, hypertensives showed higher cortisol, epinephrine, and norepinephrine secretions after stress (P < 0.038) as well as higher systolic and diastolic blood pressure (P < 0.001). Cortisol reactivity and norepinephrine secretion were highest in hypertensive men with low HER (P < 0.05). In contrast, hypertensives with high HER did not significantly differ from normotensives in both cortisol and norepinephrine secretion after stress. Epinephrine secretion was highest in hypertensives with low social support but was not different between hypertensives with high social support and normotensives. The findings suggest that both low social support and low HER are associated with elevated stress hormone reactivity in systemic hypertension. |
Statistics from Altmetric.com
No Altmetric data available for this article.
Carpenter ranked Ferrier’s cerebral localisation among the greatest advances in the physiology of the nervous system made in the past 50 years.1 It formed a direct link between Jackson and Sherrington, with both of whom he had worked.
Born in Aberdeen, Ferrier studied there under Alexander Bain, on whose advice in 1864 he visited Heidelberg, to study psychology with Helmholtz and Wundt. Wundt had just (1862) completed the Beiträge zur theorie der sinneswahrnehmung that contained the first statement of his “physiological psychology”. Ferrier completed his medical training at Edinburgh where Thomas Laycock,2–3 inclined him towards neurology.
He worked in London from 1880, and was appointed Professor of Neuropathology, King’s College Hospital, in 1889. But his major research began earlier at The West Riding Lunatic Asylum, Wakefield. There he showed that stimulation of the cerebral cortex could produce movements and fits, and that cerebral functions were localised in definable discrete areas.
Before him, in 1866, Friedrich Albert Lange (1828–75) had distinguished between localisation of function and localisation of symptoms. Broca, Bouillaud,4 Flourens,5 and others had tried to relate behaviour, language, and disease to different areas of the brain, but Franz Joseph Gall’s (1758–1828) phrenology was still accepted by many.6 Influenced by Bain and Spencer, Ferrier7–8 tested Hughlings Jackson’s notion that motor and sensory functions must be represented in an organised fashion in the cortex. Gustav Theodor Fritsch and Eduard Hitzig in 1870, using galvanic stimulation of the cerebrum in the dog9, had recently shown that circumscribed cortical areas control movements of the contralateral limbs and that ablation of these areas caused weakness in these limbs. Their findings established electrophysiology as an experimental tool and showed the localisation of motor function in the hemispheres.
Ferrier used faradic rather than galvanic current to elicit movements that resembled primate walking, grasping, scratching, and thereby confirmed and extended the results of Fritsch and Hitzig. Ferrier localised smell in the uncus of the temporal lobe; hearing in the superior temporosphenoidal convolution; and primate vision in the angular gyrus, although this was later corrected by Munk’s discovery of the occipital visual cortex. Ferrier used both ablation and electrical stimulation to produce topography of localisation of function in several species.
Removal of the precentral gyrus, he found, caused paralysis and a hemiplegic position of the contralateral limbs. In 1876 he collected his results to produce his acclaimed The functions of the brain.10 This demonstrated that ablations and faradic stimulation of the brain were better than the galvanic techniques of Fritsch and Hitzig. He had thereby mapped sensory and motor areas across several species, thus expanding both understanding11 and localisation of motor and sensory functions.12–14
Ferrier also performed decerebration experiments to distinguish between voluntary and reflex movement, and examined the control of eye movements by electrical stimulation of the cerebellum. He was not obsessed by the anatomical localisation. The functions of the cerebrum were sensorimotor:
“From the complexity of mental phenomena and the participation in them of both motor and sensory substrata, any system of localization of mental faculties which does not take both factors into account must be radically false.” He thus anticipated 20th century holistic concepts of cerebral function.
“Ferrier was more than an experimenter; he was, rather, a philosopher who did not philosophise but who experimented,” remarks Rioch.15
By making lesions in the anterior frontal cortex, he deduced the effect on function:
“while not actually deprived of intelligence . . .they had lost the faculty of attentive and intelligent observation.”
Thus, the frontal lobes might subserve the function of selection and inhibition of competing ideas.
He dedicated his work to Jackson:
“To Dr Hughlings Jackson who from a clinical and pathological standpoint anticipated many of the more important results of recent experimental investigation into the functions of the cerebral hemispheres, this work is dedicated as a mark of the author’s esteem and admiration.” Ferrier The functions of the brain (1876).
Jackson, similarly, had been inspired by Spencer and frequently cited his writings. Sherrington, in turn, dedicated his lectures on The integrative action of the nervous system (1906) to Ferrier. And in his obituary notice of Ferrier for the Royal Society,16 Sherrington remarked:
“Ferrier has done the most important research in proving cerebral localization, in placing it at the centre of neurological interest, and in providing the basis for a “scientific phrenology””.11
He continued his clinical work applying these experimental findings to patients, and encouraging surgeons to operate on intracranial lesions; thus, Rickman Godlee said he was a powerful force in initiating brain surgery.
Among many honours, he received an Hon DSc, University of Cambridge, in 1914 and in 1911 a Knighthood. He was elected FRS in 1876, FRCP in 1877, and Goulstonian Lecturer in 1878. Not least of this great pioneer’s achievements was the foundation of the journal Brain, with Hughlings Jackson, Sir John Bucknill, and Sir James Crichton-Browne.
Request permissions
If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways. |
Main menu
You are here
Random DNSSEC / DANE / TLSA resources and infos
Having recently thrown the switch on DNSSEC and DANE/TLSA for a couple of domains, here are some random infos.
DNSSEC
The setup of DNSSEC with Bind9 (Debian package bind9) is pretty well covered in various HowTos, so I won't repeat them here. One rather official one is at https://dlv.isc.org/about/using ("ISC does BIND" may sound like a movie title to you, but it's not).
Generating the needed keys might be a bit cumbersome, so I'd suggest using the DNSSEC-Tools from http://www.dnssec-tools.org/ (Debian package dnssec-tools) and their command zonesigner1. donutsd and rollerd are also nice helper apps to keep things working after initial setup2.
ISC's DLV (DNSSEC Look-aside Validation Registry) is also a good place to go if your ISP or domain registrar doesn't allow to add the necessary records to the TLD of your domain.
Of course, you can also check for yourself using dig (package dnsutils on Debian) or unbound's drill (package ldnsutils). For this you'll have to fetch the root TLD DNSSEC keys first as a trust anchor. Unfortunately the 2 tools use different defaults locations: dig uses /etc/trusted-key.key (or searches for the file in the current directory), drill searches for /etc/unbound/root.key. Either way, to fetch them, use
The +dnssec won't of course do any good unless your resolving nameservers (in /etc/resolv.conf) are already DNSSEC-enabled, but it won't hurt either.
Afterwards, assuming you have placed the trusted keys so that dig/drill can find them, you can use
dig +topdown +sigchase +multiline -ta <yourdomain>
or
drill -V 5 -s -S <yourdomain>
for really verbose validation of the whole chain of certificates from the root TLD down to your DNS zone. BTW, even ISC suggests using drill (see https://lists.isc.org/pipermail/bind-users/2012-May/087779.html and the follow up), and even current dig on Debian sid shows the "We are in a Grand Father Problem: See 2.2.1 in RFC 3568" error when validating TLDs.
DANE/TLSA
First off, the TLSA resource record (RR) types are rather new, so if your tools (host, dig, bind) don't work with it, use the alternative TYPE52 RR type.
Creating the necessary hash from a certificate is easy. There are various RR type decisions to make when creating the TLSA record, depending on how the trust should be established, if public key or whole certificate is verified against the TLSA record and if the TLSA has the full certificate/public key present or just a hash (see the full spec at http://tools.ietf.org/html/rfc6698#section-2 and reading section 1 is probably a good idea as well).
So, I chose to use "3 0 1" for these type fields, and to create the needed sha256 hash3 I used
2 donuts/donutsd from DNSSEC-Tools seems to have problems with TLSA RRs, or rather the libnet-dns-perl package on wheezy has, reporting the following error:
Net::DNS::typesbyname() argument (TLSA) is not TYPE### at /usr/lib/perl5/Net/DNS.pm line 206
It only got added to Net::DNS in 0.69 (wheezy is at 0.66), but it's an easy enough change, so I just added the needed RR type 52, here's the diff: (note: you'll have to re-apply if the Debian package gets updated, or use dpkg-divert)
3 Replace with sha512sum for a sha512 hashing. Both tools are part of coreutils, so no need to rely on openssl being recent enough to expose the needed subcommands. Besides you can't even check in openssl's manpage for "dgst" beforehand because it's outdated even on recent versions. |
A peptidase activity from primate liver that inactivates oxytocin in vitro: purification and partial characterization.
An aminopeptidase from monkey (Macaca radiata) liver, inactivating oxytocin in vitro and located predominantly in the lysosomal and microsomal fractions, was purified by chromatography on Bio-Gel HTP, DEAE-Sephacel and nickel ion chelate gel and gel filtration on Sephacryl S300. Absence of binding to nickel ion chelate gel indicated the absence of exposed histidine and thiol residues on the enzyme. The enzyme appeared to be a high molecular weight (Mr 106,000) monomeric protein. It was sensitive to inhibition by metal chelators and was found to be a zinc metalloprotein by atomic absorption spectrophotometry. Divalent metal ions Ni2+ and Co2+, and sulphydryl activators glutathione and 2-mercaptoethanol had activating effects, while 4-chloro mercuribenzoate, amino acids with large hydrophobic side chains and L-cystine, beta-lactam antibiotic cloxacillin and peptidase inhibitor amastatin had inhibitory effects on the enzyme activity. The enzyme was most active against S-benzyl L-cysteine 4-nitroanilide substrate. The properties of the enzyme were distinct from those of the well-characterized alanine and leucine aminopeptidases (EC 3.4.11.2 and EC 3.4.11.1 respectively) of liver, and of primate placental cystine aminopeptidases (EC 3.4.11.3). |
Isolated in 1997 from an Okinawan marine sponge, nakadomarin A is a highly complex and unprecedented hexacyclic alkaloid derived from the manzamine family of natural products. In addition to its intriguing molecular architecture, nakadomarin A has exhibited very promising biological activities including antitumor, antifungal, and antimicrobial properties. Unfortunately, the insufficient availability of the alkaloid natural product (only 6.0 mg isolated from 1.0 kg of wet sponge) has limited further biological evaluation of the therapeutic effects. Synthetic methods and routes toward nakadomarin A are currently inefficient, thus a more concise synthesis is necessary. The focus of this proposal is the development of an efficient and enantioselective total synthesis of nakadomarin A. To achieve this goal, the diastereoselective [3+2] cycloaddition of butenolide-derived azomethine ylides will be developed (Specific Aim 1). Simple model studies will be devised to rapidly investigate this proposed strategy. The development of a concise and versatile synthesis of nakadomarin A will generate ample material allowing for extensive biological evaluation of the alkaloid natural product (Specific Aim 2). Also, intermediates prepared during the synthesis will comprise a collection of distinct molecular scaffolds for further biological study. Through a collaboration with the state-of-the-art high through put screening facility (HTS) established at Memorial Sloan-Kettering Cancer Center, nakadomarin A and the library of intermediates developed during the proposal period will be tested against a panel of known cancer cell lines. PUBLIC HEALTH RELEVANCE: Nakadamorin A is an unprecendented marine-derived natural product exhibiting promising biological activities including antitumor, antifungal, and antimicrobial properties. The development of a concise and efficient chemical synthesis of nakadomarin A will facilitate its use as a biochemical probe and cancer therapeutic agent, as well as allow for the generation of nonnatural analogues for drug discovery. |
Q:
Crear array de suma de elementos iguales en otro array
De una respuesta anterior obtuve el siguiente código:
var result2Graph = [];
data2Graph.forEach(function (amountDay) {
if (!this[amountDay.date]) {
this[amountDay.date] = {
date: amountDay.date,
TotalAmount: 0
};
result2Graph.push(this[amountDay.date]);
};
this[amountDay.date].TotalAmount += amountDay.amount;
});
console.log(result2Graph);
Intento agregar este codigo a un API para que me devuelva un valor JSON con el resultado CADA VEZ QUE SEA INVOCADA de la siguiente forma:
api.get('/dashboard/graph1', function (req, res) {
const data2Graph = [
{ date: '06-01-2020', amount: 225 },
{ date: '06-01-2020', amount: 180 },
{ date: '06-01-2020', amount: 180 },
{ date: '06-01-2020', amount: 180 },
{ date: '06-01-2020', amount: 100 },
{ date: '06-01-2020', amount: 250 },
{ date: '06-01-2020', amount: 100 },
{ date: '06-01-2020', amount: 225 },
{ date: '06-01-2020', amount: 125 },
{ date: '06-01-2020', amount: 100 },
{ date: '07-01-2020', amount: 180 },
{ date: '07-01-2020', amount: 125 },
{ date: '07-01-2020', amount: 125 }]
var result2Graph = [];
data2Graph.forEach( function (amountDay) {
if (!this[amountDay.date]) {
this[amountDay.date] = {
date: amountDay.date,
TotalAmount: 0
};
result2Graph.push(this[amountDay.date]);
};
this[amountDay.date].TotalAmount += amountDay.amount;
});
console.log(result2Graph);
await res.json(result2Graph);
};);
El problema es que todo funciona bien la primera vez que invoco el api me da como resultado lo esperado:
[
{ date: '06-01-2020', TotalAmount: 1665 },
{ date: '07-01-2020', TotalAmount: 430 }
]
Pero la segunda vez que invoco el API me da un array en blanco []
Tengo que reiniciar el servidor express y vuelve a funcionar.
¿Me podrían ayudar encontrar una solución al problema inicial, y obtener el resultado esperado?
A:
El problema que veo es que esta usando this, cuando podrías usar directamente result2Graph.
Al estar usando continuamente this, cuando llega a la comparación dentro del bucle (está la fecha dentro de this?--> en la segunda iteración si lo está) se salta el procedimiento que has creado. Te basta con usar la variable que creas en cada llamada en vez de this:
data2Graph = [
{ date: '06-01-2020', amount: 225 },
{ date: '06-01-2020', amount: 180 },
{ date: '06-01-2020', amount: 180 },
{ date: '06-01-2020', amount: 180 },
{ date: '06-01-2020', amount: 100 },
{ date: '06-01-2020', amount: 250 },
{ date: '06-01-2020', amount: 100 },
{ date: '06-01-2020', amount: 225 },
{ date: '06-01-2020', amount: 125 },
{ date: '06-01-2020', amount: 100 },
{ date: '07-01-2020', amount: 180 },
{ date: '07-01-2020', amount: 125 },
{ date: '07-01-2020', amount: 125 }]
var result2Graph = [];
data2Graph.forEach( function (amountDay) {
if (!result2Graph[amountDay.date]) {
result2Graph[amountDay.date] = {
date: amountDay.date,
TotalAmount: 0
};
result2Graph.push(result2Graph[amountDay.date]);
};
result2Graph[amountDay.date].TotalAmount += amountDay.amount;
});
console.log(result2Graph);
|
[Characteristics of pharmacotherapy of epilepsy in the elderly].
Parallel to the steady increase of the percentage of elderly people, treatment of epilepsy in the elderly is becoming more common. The pharmacotherapy of epilepsy in the elderly differs in some aspects from treatment in younger patients. In general, due to pharmacokinetic and pharmacodynamic changes with reduction of metabolism and elimination, dose reductions are suitable to avoid drug intoxications. A standard treatment rule is to "start low and go slow". As the prognosis is favourable in the majority of patients the choice of a drug is influenced not only by its efficacy but also by possible side effects. |
Q:
Abort Printing of Huge Amounts of Text in Terminal
This has happened to me in a variety of instances:
Sometimes I accidentally copy/paste the wrong thing into vim, and
then I have to wait around 10 minutes for it to print through all
that text.
I would love the SQL extension of IPython, but because it doesn't seem to have a good way of returning large queries, again, I have to wait a long time after each query to go through all that text.
Surely, there has to be a way of interrupting that?
A:
Finally figured it out. CTRL + S pauses sending any more text to the tty -- at which point you can (usually) do a CTRL+C to send a SIGINT to the subprocess to stop it from printing.
That way, if you're in vim or IPython, you don't have to kill the process and can remain in your session.
Also, in the SqlMagic extension of IPython, you can prevent it from happening at all by setting SqlMagic.displaylimit.
|
Success
Success
Black Velvet Booth Seating - Corner
This black velvet corner booth seat is part of our extensive modular booth seating range. This range provides a really flexible seating solution for event organizers as the various sections can be arranged in pretty much any configuration to ensure you've got the perfect seating for your event.
Our modular booth seating comes in 4 different sections, choose from middle, end, back and corner sections, and together you can create seating to suit any space or seating requirements. Create stylish booth seating, bench style seating or even creative curved seating arrangements
Our booth seating is available leather or velvet and comes in a vast array of different colours. Our modular booth seating provides a truly versatile choice really will make the most of your space whilst creating a cosy seating area for your guests and clients. Boasting Chesterfield style button detail, deep seats and high backrests the range is built for comfort and style. |
Q:
Django 1.1 TemplateSyntaxError - could not import *.static.views
I'm attempting to import a site from an old server that's using Django 1.1 onto a new server. For compatability reasons, I haven't been able to upgrade to the new version of Django.
When I attempted to view localhost:8080/admin/, I was able to access the login screen, but after that point I ran into a TemplateSyntaxError. The specific error that it is giving me is:
TemplateSyntaxError at /admin/
Caught ViewDoesNotExist while rendering: Could not import cmldb.static.views. Error was: No module named static.views
The error is completely correct - there is no module cmldb.static. There is one reference to cmldb.static.views in the urls.py file, though when I change this value I run across the same error. Furthermore, the site that I am importing from has the same urls.py file, yet there is no cmldb.static module in that project either, though that site runs fine.
The traceback shows all files that are located within Django package, rather than any files located within my cmldb package, so I am not sure what code, if any, to post. My main confusion is over which file is actually causing this error.
Error is:
In template /usr/local/lib/python2.7/dist-packages/django/contrib/admin/templates/admin/base.html, error at line 30
Which reads:
30 {% url django-admindocs-docroot as docsroot %}
A:
I'm still unsure as to where the reference to cmldb.static.views originated from, but I discovered that there was a missing folder in my svn database that solved the problem. The cmldb.static.views module is now in place, and the site is up and running.
|
n base 16?
-7cf24
Convert -412106 (base 7) to base 8.
-211342
Convert -b712 (base 14) to base 4.
-13231110
-2bc340 (base 13) to base 10
-1083680
110010012101 (base 4) to base 3
100220012220102
What is -1223784 (base 9) in base 13?
-1a3ba8
What is c22767 (base 14) in base 10?
6537671
Convert 100111110010001000100 (base 2) to base 13.
368496
What is 1200111012 (base 3) in base 11?
22a07
What is -128a6 (base 14) in base 6?
-551110
-11001120201 (base 3) to base 12
-3a291
23651161 (base 7) to base 12
85ab97
232104133 (base 6) to base 14
7dd61b
Convert 2512550 (base 13) to base 16.
b0258c
b062c (base 14) to base 10
423792
What is 2c7d62 (base 14) in base 12?
631a96
-148c7 (base 16) to base 10
-84167
Convert 431162 (base 9) to base 10.
256745
883166 (base 12) to base 13
5a907b
What is cefc2 (base 16) in base 9?
1531871
28ee0 (base 15) to base 8
401032
Convert -12211211012221 (base 3) to base 2.
-1011110110011001111101
2500256 (base 8) to base 10
688302
What is 5aa20 (base 13) in base 12?
80423
-16e6a3 (base 15) to base 16
-10f746
Convert -72268a (base 11) to base 9.
-2157347
What is -d32a41 (base 14) in base 13?
-1621357
What is 2152225 (base 6) in base 11?
74233
1660424 (base 10) to base 2
110010101011000001000
101011110101000001000110 (base 2) to base 3
210121201102111
Convert -141b31 (base 16) to base 15.
-1b0656
-82962 (base 14) to base 11
-1a5460
Convert -33c4c (base 14) to base 5.
-13012100
What is -343908 (base 12) in base 15?
-117a38
1b32762 (base 12) to base 16
5858ba
Convert 200222 (base 9) to base 11.
80958
Convert 100001011100111100010 (base 2) to base 10.
1096162
Convert -9751 (base 10) to base 4.
-2120113
What is -5ab8d (base 16) in base 8?
-1325615
What is -154134422 (base 6) in base 9?
-6146355
1022001012120 (base 3) to base 4
2220121320
6496044 (base 10) to base 6
351122140
-2112021310 (base 4) to base 8
-2261164
Convert -22310023231 (base 4) to base 2.
-1010110100001011101101
Convert -40522545 (base 6) to base 16.
-11ba81
What is -13103212 (base 5) in base 7?
-1043542
Convert b04c5 (base 14) to base 2.
1100111011001101101
What is 404662 (base 8) in base 16?
209b2
What is -225716 (base 8) in base 6?
-1351154
What is 7e16 (base 15) in base 3?
1100202110
What is 1241223301 (base 5) in base 11?
180796a
What is -110111000000101111010 (base 2) in base 11?
-1021374
-100110110110011010 (base 2) to base 10
-159130
Convert -45206 (base 9) to base 3.
-1112020020
21001032 (base 4) to base 2
1001000001001110
Convert 21168 (base 13) to base 8.
164266
What is 87640 (base 10) in base 6?
1513424
23023 (base 13) to base 4
33203332
Convert -4576563 (base 8) to base 16.
-12fd73
Convert 21200330323 (base 4) to base 14.
48cdbd
-3122202321 (base 4) to base 12
-372049
1110010210022 (base 3) to base 4
2330011133
11000010000111111 (base 2) to base 10
99391
Convert 7b8b5 (base 15) to base 6.
12233342
Convert 10020200222022 (base 3) to base 6.
100555525
Convert 11012122102000 (base 3) to base 5.
1033034434
What is 9fa93 (base 16) in base 12?
276557
Convert -9300f (base 16) to base 5.
-123232002
What is -10cbcb (base 13) in base 11?
-253319
-10bca4 (base 16) to base 7
-12215603
What is -53ca1c (base 13) in base 4?
-13201000303
What is 21201034 (base 5) in base 16?
2b85d
-c857b (base 13) to base 16
-58327
1033397 (base 10) to base 7
11532551
-1a286b (base 15) to base 11
-7a0423
Convert -224544 (base 6) to base 5.
-1103331
What is -7542521 (base 8) in base 4?
-13230111101
Convert 6701 (base 13) to base 2.
11100000011110
Convert 1717837 (base 9) to base 2.
11101001101011001010
What is 64066 (base 8) in base 15?
7d88
Convert 10001101011110010010 (base 2) to base 13.
1739ac
What is 1412203134 (base 5) in base 6?
205501141
Convert -11101110100100011111 (base 2) to base 16.
-ee91f
-11101000011000111000 (base 2) to base 16
-e8638
What is -768e6 (base 15) in base 12?
-161b69
Convert -5b26bb (base 12) to base 13.
-3c91ca
-2171131 (base 8) to base 10
-586329
Convert -34522 (base 12) to base 8.
-210352
What is 14fd39 (base 16) in base 12?
564049
What is -8431 (base 14) in base 15?
-6b39
Convert -211012212110121 (base 3) to base 13.
-25a5330
Convert 110213311 (base 5) to base 8.
1641661
-12532023 (base 7) to base 6
-40355410
-1003222311 (base 4) to base 16
-43ab5
Convert 88287 (base 11) to base 2.
11111010001110001
-4382a (base 13) to base 12
-5a893
10101221110002 (base 3) to base 2
110111001110100101000
What is -1b10b4 (base 15) in base 9?
-2431367
What is -4412 (base 11) in base 14?
-219b
d6934c (base 15) to base 13
21649c5
What is 20414000 (base 5) in base 6?
3350243
-552163 (base 9) to base 14
-881c2
-1241562 (base 7) to base 9
-265473
-1413006 (base 7) to base 9
-316276
Convert 1571a (base 14) to base 13.
1b49b
Convert -241342003 (base 5) to base 10.
-1121503
What is -3231320221 (base 4) in base 10?
-974377
161393 (base 12) to base 2
1011011101011011111
Convert 130660 (base 7) to base 16.
5f1a
Convert 10362203 (base 8) to base 14.
41b683
Convert -32144515 (base 6) to base 8.
-3471677
What is -24534415 (base 6) in base 15?
-109258
Convert 67b1b (base 15) to base 14.
88308
What is -1a0943 (base 13) in base 6?
-22040303
Convert -31353202 (base 8) to base 15.
-8bc76a
-79a6c8 (base 15) to base 9
-11830058
Convert 362302 (base 9) to base 7.
1566125
What is -8a85 (base 12) in base 8?
-36005
What is -1285c (base 13) in base 7?
-202150
Convert -1008198 (base 13) to base 10.
-4844679
Convert -215321343 (base 6) to base 15.
-520299
Convert 2056a9 (base 13) to base 4.
2320100210
Convert 106b9b (base 15) to base 7.
6435413
What is 432b (base 13) in base 4?
2101310
-6431424 (base 7) to base 2
-10111110101001010010
426644 (base 7) to base 8
221256
Convert -1104145 (base 6) to base 3.
-2210221102
What is 120220112211221 (base 3) in base 12?
29b8a14
1230120444 (base 5) to base 8
13257101
11012201130 (base 4) to base 6
44355500
112001012 (base 3) to base 9
15035
What is -1340221133 (base 5) in base 6?
-201501504
Convert -21131355 (base 6) to base 4.
-2113000313
Convert 1c234b (base 13) to base 16.
af88d
Convert 334631 (base 10) to base 3.
122000000202
Convert 1036300 (base 7) to base 9.
213254
778ca (base 14) to base 6
10113550
What is -31224330 (base 6) in base 3?
-1201000020200
-24333 (base 7) to base 16
-18c9
Convert -7541520 (base 9) to base 4.
-33122333220
What is -740755 (base 8) in base 16?
-3c1ed
-69fae (base 16) to base 13
-12277b
What is 226743 (base 10) in base 16?
375b7
Convert 56732a (base 11) to base 12.
376565
-70222 (base 9) to base 5
-2433414
What is 111313442 (base 5) in base 4?
1320310120
What is -32101032113 (base 4) in base 16?
-391397
-11430 (base 16) to base 13
-2624a
7b8063 (base 16) to base 14
11098c3
10100000011000100111 (base 2) to base 3
1020101010221
Convert -31103 (base 11) to base 5.
-2423003
-81bc (base 14) to base 5
-1203224
-505671 (base 9) to base 5
-34040230
Convert -100010001001100111 (base 2) to base 9.
-232781
What is -1613744 (base 11) in base 9?
-5162383
Convert -b6b2c (base 14) to base 7.
-3515255
What is -100101100100000111000 (base 2) in base 9?
-2275431
-1350425 (base 7) to base 13
-640a6
132112210 (base 4) to base 10
124324
What is -11100110101101010 (base 2) in base 3?
-20000000220
1010000101001001010111 (base 2) to base 10
2642519
What is -331624 (base 8) in base 16?
-1b394
Convert 5aa39 (base 14) to base 7.
1611602
Convert -133101130022 (base 4) to base 5.
-4044313043
Convert -3074404 (base 8) to base 7.
-6643061
What is 100011110002122 (base 3) in base 13?
1016b85
Convert 142837 (base 12) to base 7.
2600560
-2ab319 (base 15) to base 5
-1012002244
What is -c86ff (base 16) in base 2?
-11001000011011111111
-1231121 (base 4) to base 2
-1101101011001
What is -30839 (base 12) in base 3?
-10012222100
4472866 (base 12) to base 5
11322322402
Convert 8ed068 (base 16) to base 8.
43550150
-501ad (base 14) to base 3
-100202222000
231024 (base 5) to base 10
8264
163102 (base 7) to base 12
16831
42526432 (base 8) to base 10
9088282
-351511 (base 6) to base 12
-15597
-56670 (base 11) to base 7
-461023
Convert 2010210202010 (base 3) to base 5.
242402113
Convert -881a7a (base 14) to base 12.
-1666690
-31131535 (base 6) to base 5
-212223142
3604441 (base 9) to base 8
7344226
Convert 9dad28 (base 14) to base 12.
196b674
What is -1d415 (base 14) in base |
Cystatins S and C in human whole saliva and in glandular salivas in periodontal health and disease.
Cystatins are inhibitors of cysteine proteinases and could play a protective and regulatory role under inflammatory conditions. Since total cystatin activity of whole saliva was increased in periodontal patients (Henskens et al., 1993), we wanted to investigate the types or origins of cystatins involved in this increase. Distinct types of cystatins were identified by isoelectric focusing and immunoblotting with specific antibodies against one of the salivary acidic isoforms, cystatin S. and the widely distributed basic cystatin C. Clarified human whole saliva (CHWS) of healthy subjects contained cystatin S, whereas cystatin C was barely detectable. In contrast, in CHWS of gingivitis and periodontitis patients, both cystatin C and S levels were higher. The origin of cystatin activity was investigated by collecting submandibular (SM), sublingual (SL), and parotid (PAR) saliva from seven subjects with mild gingivitis. Total cystatin activity was about five times higher in SM saliva than in PAR saliva. In SM and SL saliva, both cystatins S and C were demonstrated. In contrast, in PAR samples, solely cystatin C was detectable. The introduction of experimental gingivitis in one periodontally healthy subject resulted in the appearance of a cystatin C band in PAR saliva and in an increase of cystatins S and C in SM saliva. We conclude that the previously observed increase of cystatin activity in whole saliva in inflammatory periodontal disease is, at least in part, due to an increased glandular output of both the isoform cystatin S (pI 4.7) and the basic cystatin C (pI 9.0). |
Q:
How to hide my own page (Qt Installer Framework)
I have a page with serial number checking (SerialCodePage). It is implemented and added in installer code after IntroductionPage.
This page is needed for Pro version, and for Lite I would like to hide it, without recompile installer code.
I tried to implement it with the help of installer.removeWizardPage (component, "SerialCodePage"); in componentscript and controlscript, but the function always returns false.
How do I hide this page?
A:
Apparently removeWizardPage works only for pages added in QJS.
In my case, I had to add this page to ScriptEngine::generateQInstallerObject and use installer.setDefaultPageVisible(QInstaller.SerialCode, false);
|
Mary Farrell
Mary Farrell, co-founder of MEF Associates, serves as Executive Vice President of the firm. She brings 25 years of experience studying and evaluating human service programs.
Mary’s work involves managing program evaluations, leading data collection efforts, conducting implementation studies, and conducting cost-benefit studies. Mary has directed or managed numerous projects targeting low-income families, former prisoners, disability beneficiaries, noncustodial parents, and refugees. She is currently working on random assignment evaluations of subsidized employment programs, career pathways programs, and behavioral interventions targeting noncustodial parents and TANF recipients. She is also working on several qualitative studies including studies of organizational culture in TANF offices, innovative employment programs for TANF families, and policies that support families experiencing homelessness.
Prior to founding MEF Associates, she was a Vice President at The Lewin Group, where she directed the income security and employment work within the Federal Human Services Practice. She previously worked at MDRC and the U.S. Department of Education’s Planning and Evaluation Service.
Mary earned her master’s degree in Public and Private Management (MPPM) from Yale University and her bachelor’s degree in mathematics and economics from the University of California at Berkeley. |
import { RouteConfig } from './types';
const routes: RouteConfig[] = [
{
id: 'trialLogs',
needAuth: true,
path: '/det/trials/:trialId/logs',
title: 'Trial Logs',
},
{
id: 'trialDetails',
needAuth: true,
path: '/det/trials/:trialId',
title: 'Trial',
},
{
id: 'experimentDetails',
needAuth: true,
path: '/det/experiments/:experimentId',
title: 'Experiment',
},
{
icon: 'logs',
id: 'taskLogs',
needAuth: true,
path: '/det/:taskType/:taskId/logs',
title: 'Task Logs',
},
{
icon: 'tasks',
id: 'taskList',
needAuth: true,
path: '/det/tasks',
title: 'Tasks',
},
{
icon: 'experiment',
id: 'experimentList',
needAuth: true,
path: '/det/experiments',
title: 'Experiments',
},
{
icon: 'cluster',
id: 'cluster',
needAuth: true,
path: '/det/cluster',
title: 'Cluster',
},
{
icon: 'logs',
id: 'masterLogs',
needAuth: true,
path: '/det/logs',
title: 'Master Logs',
},
{
icon: 'user',
id: 'dashboard',
needAuth: true,
path: '/det/dashboard',
title: 'Dashboard',
},
{
id: 'signIn',
needAuth: false,
path: '/det/login',
title: 'Login',
},
{
id: 'signOut',
needAuth: false,
path: '/det/logout',
title: 'Logout',
},
];
export default routes;
|
Involvement of xanthine oxidase and hypoxia-inducible factor 1 in Toll-like receptor 7/8-mediated activation of caspase 1 and interleukin-1β.
Inflammatory reactions to ssRNA viruses are induced by the endosomal Toll-like receptors (TLRs) 7 and 8. TLR7/8-mediated inflammatory reaction results in activation of the Nalp3 inflammasome via an unknown mechanism. Here we report for the first time that TLR7/8 mediate activation of xanthine oxidase (XOD) in an HIF-1α-dependent manner. XOD produces uric acid and reactive oxygen species, which could activate Nalp3 and therefore induce activation of caspase 1, known to convert inactive pro-IL-1β into active IL-1β. Specific inhibition of the XOD activity attenuates TLR7/8-mediated activation of caspase 1 and IL-1β release. These results were obtained using human THP-1 myeloid macrophages. The findings were verified by conducting in vivo experiments on mice. |
Q:
Rails ActionMailer ignores settings in environment.rb
I put my ActionMailer config in my config/environment.rb file like so:
MyApp::Application.initialize!
MyApp::Application.configure do
config.action_mailer.delivery_method = :smtp
config.action_mailer.smtp_settings = {
address: "smtp.elasticemail.com",
port: 2525,
domain: "myapp.com",
authentication: "plain",
user_name: "my_username",
password: "my_password",
enable_starttls_auto: true
}
end
My understanding is that this is the correct way to configure settings that will apply to all your environments.
This worked fine in development, but when I deployed to my staging server (which uses a custom config/environments/staging.rb config file) I got a "connection refused" error when it tried to deliver mail. staging.rb has no mailer-related settings in it at all.
So I fired up the console on the staging server with RAILS_ENV=staging rails c, and "puts Rails.application.config.action_mailer" shows that the settings I put in environment.rb are indeed in effect, but for some reason ActionMailer is not using them.
Through experimentation I found that copying the config directly into staging.rb solves the problem. Why is this necessary? If the rails console shows the settings are in effect, why isn't ActionMailer using them?
Digging deeper, I see that my mailer class's delivery_method is not set as expected:
MyMailer.foo(Person.find(1)).delivery_method
=> #<Mail::SMTP:0x0000000370d4d0 @settings={:address=>"localhost", :port=>25, :domain=>"localhost.localdomain", :user_name=>nil, :password=>nil, :authentication=>nil, :enable_starttls_auto=>true, :openssl_verify_mode=>nil, :ssl=>nil, :tls=>nil}>
A:
put
MyApp::Application.configure do
config.action_mailer.delivery_method = :smtp
config.action_mailer.smtp_settings = {
address: "smtp.elasticemail.com",
port: 2525,
domain: "myapp.com",
authentication: "plain",
user_name: "my_username",
password: "my_password",
enable_starttls_auto: true
}
end
before MyApp::Application.initialize!
|
Quoted (Double Edition): Erykah Badu on Female Sexuality and Emotions
When Erykah Badu walked naked for 13 seconds (when the video was shot, she had the full song sped up to one minute and 32 seconds, then slowed back down in editing), it was for her art and not sexual consumption. It’s a stance she feels contributed to the outrage. “We’re just not fashioned for [nudity],” says Badu. “Especially the Black women, the ‘Hottentot Venus’ women, big-booty women, the large posterior, with no shoes on and a scarf on her head, you know that ain’t sexy.” [...]
“Society has a problem with female nudity when it is not . . . ”—Badu pauses to get her words together; she wants this point to be very clear—“. . . when it is not packaged for the consumption of male entertainment. Then it becomes confusing.” [...]
“To me it’s like traditional performance art like Yoko Ono, or Nina Simone. Research some of those women. They all seem to live by the same theme: Well-behaved women rarely make history. Even looking at people like Harriet Tubman and those types of women. When you have strong convictions about something you know what you already gonna do. I look at some other videos. I’m not naming names, because I don’t want that to be mentioned. There is the thing with sexuality. I’m naked for 13 seconds, and these people are naked the whole time and gyrating and saying come “lick on my lollipop,” and “suck on my cinnamon roll,” and, you know, suggesting sex. People are uncomfortable with sexuality that’s not for male consumption. Could be ‘cause I did it in public too. Do you think people would have been complaining if I had on high-heel shoes?”
Arise: Earlier, you called performance your therapy. Is performance how you deal with pain?
Erykah Badu: I accept pain as part of growing. Everyone goes through it. And in the process of it, it’s unpleasant, but I’m still peaceful and happy.
A: Does pain ever blind you?
EB: Not at this point. Joy blinds me. Joy, happiness, sadness – they are all blinding, if you lose yourself in any of those things. I feel that I have to stay very accepting and in the moment and not get to a point where I am complacent. I am continually evolving.
A: Do you practice meditation?
EB: Yes. It’s at a point where I walk in meditation. I practise being here, being present, and not being consumed with the chatter of my mind. Being aware of my experiences and the people that I meet. Truly giving them my full attention. I am practising it now.
A: Do you feel fear?
EB: I don’t know if it’s fear I feel. Sometimes, I have caution. And it’s based on fears I’ve had in the past. Neurologically, sometimes I see something that reminds me of something I’ve feared before. I caution myself. But I don’t think there are very many things that scare me right now. Especially human beings.
A: Have you ever experienced betrayal?
EB: [Long pause] What I perceived as betrayal. But it wasn’t really betrayal. Each person has his own path. I mean I don’t blame people for the things they do. That is not for me to judge. I can’t believe I am saying all these things to you because I generally don’t get into conversations like this. Because sometimes, when it’s written, it’s not written in the spirit that I’m saying it. So it becomes confusing. I’m cautious of that. But I don’t believe in betrayal. People follow their own minds and hearts. I guess that’s a part of what detachment is about.
A: How can you be present and detached at the same time?
EB: Well, being present means you are aware of everything around you. When I say detachment, it means that you don’t connect with the emotion that others have for you. The fear or envy someone has for you, the need to leave you, or leave the situation. That’s their stuff. What they feel or think about you is really none of your business. Your business is to be aware and always know that you are synonymous with what is going on around you. And that way, your feelings don’t get hurt when they make a decision that doesn’t agree with you.
Race, Culture, and Identity in a Colorstruck World
About This Blog
Racialicious is a blog about the intersection of race and pop culture. Check out our daily updates on the latest celebrity gaffes, our no-holds-barred critique of questionable media representations, and of course, the inevitable Keanu Reeves John Cho newsflashes.
Latoya Peterson (DC) is the Owner and Editor (not the Founder!) of Racialicious, Arturo García (San Diego) is the Managing Editor, Andrea Plaid (NYC) is the Associate Editor. You can email us at team@racialicious.com. |
If You Think You're Good At Multitasking, You Probably Aren't
Everybody complains that people shouldn't talk on cellphones while driving. And yet it seems pretty much everybody does it.
That may be because so many of us think we're multitasking ninjas, while the rest of the people nattering away while driving are idiots.
But scientists say that the better people think they are at multitasking, the worse they really are at juggling.
Researchers at the University of Utah wanted to find out which personalities were more likely to try to do two tasks at once. They're keenly interested in people who talk on the phone or text while driving, since there's plenty of data that even using a hands-free phone boosts the risks of accidents.
That bit isn't exactly breaking news.
For quite a few years, researchers have been making the case that people who drive while using phones drive as badly as people who are legally drunk. But we persist in thinking we can handle it.
How come? The Utah folks speculated that multitaskers would be more apt to test high for traits like risk-taking, sensation-seeking and impulsivity. Turns out the researchers were right.
They asked student volunteers whether they used cellphones while driving, and whether they were good at multitasking. Then they tested the students' multitasking ability by asking them to solve math problems while remembering random strings of letters.
They found that the people who multitasked the most in real life — the impulsive risk-takers — were actually much worse at juggling tasks than people who rarely drove while phoning.
Even worse, these demon multitaskers thought they were terrific at it, though the cold, hard data proved they weren't.
"People don't multitask because they're good at it," says David Sanbonmatsu, a professor of psychology at the University of Utah and lead author of the study, which was published online in the journal PLOS One. "They do it because they are more distracted. They have trouble inhibiting the impulse to do another activity."
Seventy percent of the study participants, all college undergraduates, said they thought they were better than average at multitasking. Of course, that's statistically impossible — a drivers' ed version of Lake Wobegon, with all multitasking drivers above average.
Texting drivers aren't the only ones who think they're aces at jobs they're actually flubbing. There's plenty of other research showing that people tend to overestimate personal attributes like attractiveness and talent. That proved true in this study, too. It was the non-risk-taking non-texters who actually turned out to be better at multitasking. They could maintain focus and get the job done.
"People sometimes think multitasking means greater productivity," Sanbonmatsu told Shots. "That's not what the findings in the literature say at all. A lot of times people multitask because they can't focus on the task that's most important to them."
Sanbonmatsu and his colleagues are now going to look into why we keep driving while texting, even though we know it's dangerous. Maybe it's because we think that, unlike the other mopes on the highway, we're just darned good at it. |
1. Field of the Invention
The present invention relates to a vehicle battery control system.
2. Description of Related Art
Recently, development and commercialization of a system that is driven using inputtable/outputtable electric power information from a battery controller as it travels such as a vehicle equipped with a hybrid system using a battery and an electric vehicle have been advanced. These vehicles use the battery based upon information of the state of charge, the inputtable/outputtable electric power, and the like from the battery controller. The state of charge and the inputtable/outputtable electric power of the battery are calculated based upon information having been input via a variety of sensors such as a voltage sensor. |
Q:
Having unique text in database
I making a MCQ app and I need to maintain unique questions and their choices in the database so I cant have more than one question with the same question string and choices. But how should I make that efficiently?! I have the question strings saved in the database as TEXT type in a table and another table containing the choices as a one to many relationship does any one have any thoughts? as I think making the question string as unique would be very slow right?!
A:
If I understand your question correctly you need to maintain unique questions in your database. I've a suggestion in which we can find out the keywords (Tags) of from the Question String. To find out the keywords (Tags) from the question we can use 2 ways.
1. Tags:
When a question is inserted. we can also take the tags which is related to Question.
For Example:
Q1. What colour is the sky?
Tags:- colour, sky
Q2. The sky is what colour?
Tags:- sky, colour
2. Finding the tags automatically
Here we can put the normally used words in table of DB like
Helping Verb.
be, do, have, is, does, had, are, did, has, am, were, was, being, been
Articles
The, A, An
Five Ws
When, Who, How, Why, What, Where
you can find more like that and then we acually subtract this words (keywords/tags) from the string and find the tags automatically.
Either ways we find out the tags. after finding the tags
Conclude
Letz say if we found 20 tags in a question then we can query that if a question match morethan 15 tags will list and thus can find whether the question is repeat or not.
|
Q:
Erlang: Will adding type spec to code make dialyzer more effective?
I have a project that doesn't have -spec or -type in code, currently dialyzer can find some warnings, most of them are in machine generated codes.
Will adding type specs to code make dialyzer find more errors?
Off the topic, is there any tool to check whether the specs been violated or not?
A:
Adding typespecs will dramatically improve the accuracy of Dialyzer.
Because Erlang is a dynamic language Dialyzer must default to a rather broad interpretation of types unless you give it hints to narrow the "success" typing that it will go by. Think of it like giving Dialyzer a filter by which it can transform a set of possible successes to a subset of explicit types that should ever work.
This is not the same as Haskell, where the default assumption is failure and all code must be written with successful typing to be compiled at all -- Dialyzer must default to assume success unless it knows for sure that a type is going to fail.
Typespecs are the main part of this, but Dialyzer also checks guards, so a function like
increment(A) -> A + 1.
Is not the same as
increment(A) when A > 100 -> A + 1.
Though both may be typed as
-spec increment(integer()) -> integer().
Most of the time you only care about integer values being integer(), pos_integer(), neg_integer(), or non_neg_integer(), but occasionally you need an arbitrary range bounded only on one side -- and the type language has no way to represent this currently (though personally I would like to see a declaration of 100..infinity work as expected).
The unbounded-range of when A > 100 requires a guard, but a bounded range like when A > 100 and A < 201 could be represented in the typespec alone:
-spec increment(101..200) -> pos_integer().
increment(A) -> %stuff.
Guards are fast with the exception of calling length/1 (which you should probably never actually need in a guard), so don't worry with the performance overhead until you actually know and can demonstrate that you have a performance problem that comes from guards. Using guards and typespecs to constrain Dialyzer is extremely useful. It is also very useful as documentation for yourself and especially if you use edoc, as the typespec will be shown there, making APIs less mysterious and easy to toy with at a glance.
There is some interesting literature on the use of Dialyzer in existing codebases. A well-documented experience is here: Gradual Typing of Erlang Programs: A Wrangler Experience. (Unfortunately some of the other links I learned a lot from previously have disappeared or moved. (!.!) A careful read of the Wrangler paper, skimming over the User's Guide and man page, playing with Dialyzer, and some prior experience in a type system like Haskell's will more than prepare you for getting a lot of mileage out of Dialyzer, though.)
[On a side note, I've spoken with a few folks before about specifying "pure" functions that could be guaranteed as strongly typed either with a notation or by using a different definition syntax (maybe Prolog's :- instead of Erlang's ->... or something), but though that would be cool, and it is very possible even now to concentrate side-effects in a tiny part of the program and pass all results back in a tuple of {Results, SideEffectsTODO}, this is simply not a pressing need and Erlang works pretty darn well as-is. But Dialyzer is indeed very helpful for showing you where you've lost track of yourself!]
|
This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers, click the "Reprints" link at the bottom of any article.
April 27, 2012
Sen. McCaskill to EBSA: Reopen Fiduciary Dialogue
McCaskill says EBSA and the industry can 'design an informative but achievable data request'
Sen McCaskill, D-Mo., at hearing in Congress in November. (Photo: AP)
More On Legal & Compliance
from The Advisor's Professional Library
RIAs and Customer Identification
Just as RIAs owe a duty to diligently protect their clients privacy and guard against theft, firms also play a vital role in customer identification. Although RIAs are not subject to an anti-money laundering rule, securities regulators expect advisors to address these issues in their policies and procedures.
Agency and Principal Transactions
In passing Section 206(3) of the Investment Advisers Act, Congress recognized that principal and agency transactions can be harmful to clients. Such transactions create the opportunity for RIAs to engage in self-dealing.
Sen. Claire McCaskill, D-Mo., is pressing the Department of Labor’s Employee Benefits Security Administration (EBSA) to re-open the dialogue EBSA started with industry trade groups regarding its data request on its fiduciary re-proposal so that both parties can “design an informative but achievable data request.”
“While I am glad that EBSA is seeking hard data to inform its rulemaking, I am worried that the EBSA and the industry do not seem to have a constructive relationship,” McCaskill told EBSA head Phyllis Borzi in a April 23 letter.
McCaskill told Borzi that industry trade groups have told her that EBSA has “rebuffed their offers for a continued dialogue.” The stakeholders, she told Borzi, have “confirmed that they are ready to work with the EBSA to design information request to provide data that will meet the EBSA’s needs without unjustifiable cost of undue administrative burden,” McCaskill wrote.
An EBSA spokerperson told AdvisorOne that Borzi (left) has received the McCaskill letter and that EBSA “will be responding” to the Senator. However, the spokesperson would not comment on whether EBSA had rebuffed industry groups’ attempts to re-open the dialogue.
EBSA has been disappointed that industry trade groups could not provide more data by its Feb. 24 deadline to fulfill the department’s request regarding what impact the conflicts of interest faced by brokers and advisors who advise on IRAs have on IRA investors.
When EBSA released its original rule proposal on fiduciary duty under ERISA in October 2010, EBSA received comments suggesting that it had not adequately demonstrated or quantified the harm that can arise when investment advisors’ interests conflict with those of the IRA owners they advise.
In response to the comments, EBSA began examining a wide array of evidence and developing a robust economic analysis, and sent out two data requests: one issued on Dec. 16 for the data underlying the Oliver Wyman report; and the second was a request from EBSA’s Office of Policy Research on Dec. 15 that industry trade groups voluntarily assist EBSA in its expanded “regulatory impact analysis” to assess the impact of the department’s reproposed fiduciary rule on ERISA plans and IRAs. That data request was due to EBSA by Feb. 24. |
Q:
Style mapsforge map like google map or mapsme
I'd like to know if there are existing rendertheme for mapsforge that would mimick GoogleMaps maps style, or even better mapsme (mapswithme) style ?
I'm currently using rendertheme-v4 which is not as nice looking and clear than the 2 other mentionned above.
If none exist how could we build one ?
A:
I am not aware of a mapsforge render theme copying the style of GoogleMaps, but by making changes to the osmarender theme included in the mapsforge resources you can style a map any way you want. With my own (very reduced) theme I highlight a number of buildings on a (very local) map. Here is just one tile from it:
Here you can get instructions on how to make those changes to your render theme.
|
Eight pollution control stations in the upper northern provinces were on Tuesday blanketed with PM2.5 fine dust pollution, prompting urgent measures to be implemented to deal with the problem, according to the Department of Pollution Control (DPC).
The department reported yesterday that severe PM2.5 pollution was detected by eight air-quality monitoring stations in Chiang Rai, Chiang Mai, Phayao, Mae Hong Son and Nan.
The eight stations in "red" danger zones are in Chiang Rai, tambon Wiang in Muang district where the pollution was measured at 102 microgrammes per cubic metre (µg/m³) of air and tambon Wiang Phang Kham in Mae Sai district at 145 µg/m³; in Chiang Mai, tambon Chang Phueak where the PM2.5 level was recorded at 104µg/m³, the Sri Phum area of Muang district at 97µg/m³ and the Chiang Dao district at 180µg/m³; in Mae Hong Son, the pollution hit 109µg/m³ in Muang district; in Phayao, the dust surged to 116µg/m³ in Muang district; and in Nan, the pollution rose to 99µg/m³ in Chalerm Prakiat district.
Poor air was also lingering over other northern provinces including Lampang, Kamphaeng Phet and Uttaradit.
PM2.5 readings above 50µg/m³ are considered hazardous to health by the Thai government.
Pralong Dumrongthai, the department director-general, said in the summer when there is little wind and rain, the dust tends to hover over specific areas.
The problem is exacerbated by slash-and-burn farming practices which have continued despite repeated warnings by the authorities threatening tough legal action against offenders, he added.
The southwesterly monsoon wind that blows fine particulate matter from neighbouring countries into Thailand has also worsened the dust pollution in vast areas of the upper North.
The department chief said that it will ask the countries concerned to reduce forest burning activities on their sides of the borders.
At the same time, the department is looking to deploy water spraying techniques to increase humidity in the air. The fine mist will cause the dust particles flowing in the air to drop to the ground. Water trucks, as well as planes, will be used in the operation, Mr Pralong said.
Department chief said Chiang Mai provincial governor Charoenrit Sanguansat was working to enlist the air force's help in the mission.
In Phrao district of Chiang Mai, fire extinguishers are in short supply to combat bushfires which are raging deep in the mountains, he said. |
Herein we take a look at offerings from two of the vaping community’s most beloved juice slingers: Bombies’ ‘Nana Cream and Grizzly Vapes’ Nanner Bear.
These two mixologists are interesting in that they both sprung up from the feverish depths of vaping fandom when they saw something lacking in the existing liquid landscape. They each decided to perfect just a handful of juices, rather than be everything to everyone. Both also appeal to the permanent vaping subculture, not so much the average Joe and Jane just trying to quit smoking.
Each has a fervent following. And funnily enough they both seem to have made their name on the milk of the nanner. I should admit here what I privately told each of these lab wizards, “I don’t like banana. I don’t want to vape banana. There’s nothing you can do to make me try your juice.” And then I promptly shut up and ordered it anyway. It’s true, I’m not a fan of synthetic banana flavorings, but there were so many bananafans of both juices, I had to give them a shot.
So let’s play Mr. Bananagrabber…
Bombies ‘Nana Cream: It’s becoming harder and harder to get this stuff, it’s so popular. But I procured – and then cured – some. On first drip, I got it. Yeah, it tastes like banana. Sort of. It’s not so much that it’s banana-flavored as it’s just good. This is probably the best cream style juice I’ve ever had. I am often disappointed in cream flavors, but this seems to be just what I was looking for.
Bottom-Lined: Hype justified. Get you hands on it now.Pointlessly Subjective Rating: 10/10
Grizzly Vapes Nanner Bear: This is a vaper’s juice made by a vaper. This guy knows what his people want, and he delivers. It’s max VG, so if you’re looking for throat hit, look elsewhere. But if you want delicious flavor and billowy clouds, this is it. An all-day vape in the truest sense of the term. My only complaint is it’s just a tad too sweet for me. I suffer from a bit of flavor overload after several hours. But I am quite certain this is just me, as a blissful legion of steamheads can’t be wrong.
Bottom-Lined: Float away on a banana cloud. An Arbitrary Number That Can’t Possibly Mean Anything to You: 9/10
It’s plantain as day: these are both great juices.
Special note: I wanted very much to work in a banana stand reference, but I could not find a suitable place; this will have to do.
Bonus Bombies and Grizzly Coverage!
Bombies White Gummy B: This was the first Bombies juice I ever tried, and with the first draw I was sold. It’s clean, fresh, and flavorful. But after a bit, I have to admit it does not hold up well as an all-day vape. There’s just something about it that fails to resonate. It lacks impact or complexity. That’s not a bad thing, and in fact, that may make it perfect for certain folks.
Bombies Tiger Style: This is a bit more like it, Mr. Bombie. I have to admit, this is not really my thing, but I appreciate the more robust flavor compared to White Gummy B. It reminds me of the long-time standard, (well, a long time in vaping terms) Bloody Mango from The Vapor Chef. It’s just a solid vape, and I know there is a fan base out there for this one, even if I won’t be returning to it.
Bottom-Lined: Remember those popsicles the lecherous ice cream man used to roofie you with?Foolish Attempt to Quantify Taste: 7/10
Grizzly Vapes Simple 5: I have to give Grizzly Vapes a lot of credit for making high quality juice and keeping the cost down with their “Simple” line. But by keeping it so simple, there’s something lost. If you’re a volume vaper, this may just be the thing for you. BTW, it tastes like Tootsie Roll washed down with a shot of orange juice.
Bottom-Lined: It’s cheap, high quality, tastes like a Tootsie Roll.Completely Pointless Number System Says: 7/10 |
Granulocytic sarcoma of the lung in acute myeloid leukemia.
Granulocytic sarcoma, an uncommon solid, extra-medullary tumor is a rare presentation of acute myeloid leukemia. A seven-year old boy admitted to the hospital for treatment of leukemia having radiological findings of consolidation in one lung. A bronchoalveolar lavage was done which was negative for tubercular, bacterial, and fungal infection but showed blast cells. On day seven of chemotherapy, a repeat chest x-ray showed resolution of the lesion. A high-resolution Computerized tomography of chest repeated after one month of induction showed resolution. A consolidation on chest radiograph in acute myeloid leukemia can be a granulocytic sarcoma of the lung; a bronchoalveolar lavage may be offered to confirm or refute this diagnosis. |
Effect of exogenous nitric oxide and superoxide on interleukin-8 from human polymorphonuclear leucocytes.
Patients with acute inflammatory lung injury are commonly treated with inhaled nitric oxide. Nitric oxide has profound immunoregulatory effects. Increased concentrations of the cytokine interleukin-8 (IL-8) in bronchoalveolar lavage fluid has been associated with disease severity. We have investigated the effects of a nitric oxide donor and a combined nitric oxide-superoxide donor on lipopolysaccharide-mediated accumulation of IL-8 from cultured human neutrophils. Interleukin-8 was measured in culture supernatant after 20 h using enzyme immunoassay. The combined nitric oxide-superoxide donor, 3-morpholinosydnonimine (SIN-1), dose-dependently decreased lipopolysaccharide-mediated IL-8 accumulation (P < 0.01). SIN-1 also decreased IL-8 accumulation from unstimulated neutrophils (P < 0.001). In contrast, the pure nitric oxide donor, 1,2,3,4-oxatriazolium 5-amino chloride (GEA-3162), increased stimulated IL-8 accumulation (P < 0.01) and also increased IL-8 accumulation in unstimulated cells (P < 0.002). Nitric oxide and superoxide have profound effects on IL-8. These results have important implications for the treatment of patients with acute lung injury with inhaled nitric oxide. |
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
(clueless to the end. well, at least he didn't say it was going to be "hard work.")
At Coretta Scott King's funeral in early 2006, Ethel Kennedy, the widow of Robert Kennedy, leaned over to him and whispered, "The torch is being passed to you." "A chill went up my spine," Obama told an aide. (Newsweek)
We face extreme danger. Unless there is immediate intervention on every front by all the major powers acting in concert, we risk a disintegration of global finance within days. Nobody will be spared, unless they own gold bars.
At Coretta Scott King's funeral in early 2006, Ethel Kennedy, the widow of Robert Kennedy, leaned over to him and whispered, "The torch is being passed to you." "A chill went up my spine," Obama told an aide. (Newsweek)
Thank you Barney Frank and every useless Dem that got us into this mess.
No, I think the blame falls on all of them not just Democrats but Republicans as well......good part the rich are in trouble but with Bushes plan now they won't have to stand in the unemployment line its a shame too they should see how the average American feels when they are out of work............
A credit default swap (CDS) is a contract in which a buyer pays a series of payments to a seller, and in exchange receives the right to a payoff if a credit instrument goes into default or on the occurence of a specified credit event (such as bankruptcy or restructuring). The associated instrument does not need to be associated with the buyer or the seller of this contract.
Originally used as a form of insurance against bad debts, these instruments became a tool for financial speculation when the Commodity Futures Modernization Act of 2000 specifically barred regulation of these trades.
Definition
A credit default swap (CDS) is a credit derivative contract between two counterparties, whereby the "buyer" pays periodic payments to the "seller" in exchange for the right to a payoff if there is a default[2] or credit event in respect of a third party or "reference entity".
In the event of default in the reference entity:
* the buyer typically delivers the defaulted asset to the seller for a payment of the par value. This is known as "physical settlement".
* Or the seller pays the buyer the difference between the par value and the market price of a specified debt obligation. This is known as "cash settlement".
At Coretta Scott King's funeral in early 2006, Ethel Kennedy, the widow of Robert Kennedy, leaned over to him and whispered, "The torch is being passed to you." "A chill went up my spine," Obama told an aide. (Newsweek)
Everytime you make a post that puts this on Bush, I'll be there to put it on the Dems.
McCain won’t do one thing different than his predecessor. Nothing.
We’re just going to get more of the same. The same hasn’t worked. In fact, its been an a complete and embarrassing failure, around the world. John has no idea of what the fundamentals are, even as the financial markets collapse around us.
OBL gets a second victory and our grandchildren get to pay for our overseas idiocy that has acted as the tipping point for this present situation. We are no longer capable of fighting a multi-front war, militarily or financially - hence the public retreat of our allies all over the globe.
At Coretta Scott King's funeral in early 2006, Ethel Kennedy, the widow of Robert Kennedy, leaned over to him and whispered, "The torch is being passed to you." "A chill went up my spine," Obama told an aide. (Newsweek)
We’re just going to get more of the same. The same hasn’t worked. In fact, its been an a complete and embarrassing failure, around the world. John has no idea of what the fundamentals are, even as the financial markets collapse around us.
OBL gets a second victory and our grandchildren get to pay for our overseas idiocy that has acted as the tipping point for this present situation. We are no longer capable of fighting a multi-front war, militarily or financially - hence the public retreat of our allies all over the globe.
You don't think McCain would work to cut spending, even though he has a track record of doing so? Do you think Obama would? The high cost of the war surely contributed to these problems, but that is by no stretch of the imagination the primary factor.
We’re just going to get more of the same. The same hasn’t worked. In fact, its been an a complete and embarrassing failure, around the world. John has no idea of what the fundamentals are, even as the financial markets collapse around us.
OBL gets a second victory and our grandchildren get to pay for our overseas idiocy that has acted as the tipping point for this present situation. We are no longer capable of fighting a multi-front war, militarily or financially - hence the public retreat of our allies all over the globe.
I'd be willing to bet McCain/Palin hit the ground running on Financial mkts reform. Wether it will all be for the good is debateable but I'd bet it would be a top priority in their administration.
The 21st century. The age of Smart phones and Stupid people.
It is said that branches draw their life from the vine. Each is separate yet all are one as they share one life giving stem . The Bible tells us we are called to a similar union in life, our lives with the life of God. We are incorporated into him; made sharers in his life. Apart from this union we can do nothing. |
Q:
How can access particular String from Resource file with using Resource.getString(id) in Android
I want to know that I have the string.xml Resource file which contains status messages. Now I want to process them according their id. I have written the following code but it fails on Message = res.getString(Msgid); and logs Resource not found Exception.
Can any one help me?
public void FileStatusMsg(int Msgid)
{
String Message = null;
Resources res = this.getResources();
Message = res.getString(Msgid);
//Display Status Messages..
AlertDialog.Builder builder = new AlertDialog.Builder(OfficeLinQ.this);
builder.setMessage(Message).setCancelable(false).setPositiveButton(
"OK", new DialogInterface.OnClickListener()
{
public void onClick(DialogInterface dialog, int id)
{
dialog.cancel();
}
});
AlertDialog alert = builder.create();
alert.show();
}
A:
Suppose you have a value
<string name="msg">Message</string>
inside strings.xml.
To access this value, in your activity give:
this.getText(R.string.msg).toString()
|
Q:
Sum of items in JSONArray doubling on activity relaunch
I'm using Fast Android Networking library to parse a JSONArray generated from my PHP/MySQL API. I'm using a for loop to sum all integer values in the JSONArray. Everything works great when I first launch the activity the data is sent to (as static references), but on relaunch, the data is doubled i.e if on first launch sum was 500, on relaunch it returns 1000.
This is the method I use to parse the JSONArray
public void getGroupStats() {
MaterialDialog.Builder builder = new MaterialDialog.Builder(Splash.this)
.progress(true, 100)
.content("Loading...")
.cancelable(false);
dialog = builder.build();
dialog.show();
AndroidNetworking.post(Helper.Header + "/savings/api/Api.php?apicall=getgroups")
.addBodyParameter("goal", sharedPreferences.getString("Goal", ""))
.addBodyParameter("type", sharedPreferences.getString("Type", ""))
.setPriority(Priority.MEDIUM)
.build()
.getAsJSONObject(new JSONObjectRequestListener() {
@Override
public void onResponse(JSONObject response) {
JSONArray jsonArray = null;
try {
jsonArray = response.getJSONArray("savings");
for (int j = 0; j < jsonArray.length(); j++) {
obj = (JSONObject) jsonArray.get(j);
groupsaving += Integer.parseInt(obj.getString("saving"));
groupsaved += Integer.parseInt(obj.getString("saved"));
Helper.Members = jsonArray.length();
}
Intent intent = new Intent(Splash.this, Statistics.class);
intent.putExtra("Title", textView.getText().toString());
if (textView.getText().toString().contains("SAVVY SAVER")) {
Helper.Image = "smallest_bag";
} else if (textView.getText().toString().contains("POWER SAVER")) {
Helper.Image = "small_bag";
} else if (textView.getText().toString().contains("SUPER SAVER")) {
Helper.Image = "big_bag";
} else {
Helper.Image = "biggest_bag";
}
startActivity(intent);
} catch (JSONException e) {
e.printStackTrace();
}
Helper.GroupSaving = groupsaving;//to be used in next activity
Helper.GroupSaved = groupsaved;
Toast.makeText(getApplicationContext(), String.valueOf(groupsaved) + " " + String.valueOf(groupsaving), Toast.LENGTH_LONG).show();
dialog.cancel();
}
@Override
public void onError(ANError error) {
Toast.makeText(getApplicationContext(), error.toString(), Toast.LENGTH_LONG).show();
dialog.cancel();
}
});
}
What am I doing wrong?
A:
Cant you just make your variables zero before the loop?
|
ZQ
ZQ, Z.Q. or Zq may refer to:
Zq, the molecular Hamiltonian charge of a nucleus: atomic number Z * q (electrons' negative elementary charge)
ZQ, the non-US model series numbers for the Sharp Wizard electronic organizer
Zainab Qayyum (born 1975), a Pakistani model, actress, and television host |
Q:
Is there a good way to determine if a variable is referencing a user defined function?
The isValid function doesn't support this capability as far as I can tell, and there is no built-in "isUDF" or "isFunction" function. So far, the best I've been able to come up with is
findNoCase("func", myUDF.getClass.getSimpleName()) neq 0
When used on a UDF, the Java method getClass().getSimpleName() always seems to return a value with the substring func in it. I know very little about Java, though, so I have no idea how reliable this is.
Is there a better way to identify a reference to a function?
A:
isCustomFunction() or isClosure(). CFML should not require two functions here, but due to - I suspect - poor understanding of the concept of closure on the part of the Adobe ColdFusion team, they kinda messed this up. Commentary on this: "Am I right to think this is stupid?"
|
Half-metallicity in organic single porous sheets.
The unprecedented applications of two-dimensional (2D) atomic sheets in spintronics are formidably hindered by the lack of ordered spin structures. Here we present first-principles calculations demonstrating that the recently synthesized dimethylmethylene-bridged triphenylamine (DTPA) porous sheet is a ferromagnetic half-metal and that the size of the band gap in the semiconducting channel is roughly 1 eV, which makes the DTPA sheet an ideal candidate for a spin-selective conductor. In addition, the robust half-metallicity of the 2D DTPA sheet under external strain increases the possibility of applications in nanoelectric devices. In view of the most recent experimental progress on controlled synthesis, organic porous sheets pave a practical way to achieve new spintronics. |
I think this umbrella is my favorite item in the box. I love the bamboo handle and the fact that the umbrella is made out of recycled materials.Verdict: I love that Seasons Box is both a “treat yourself” box and a eco-friendly box – it’s a perfect combination to me! Also, I think this is one of the best subscription boxes if you are looking to give a subscription as a gift. The items are all thoughtfully curated and the box is literally wrapped like a present! What do you think of Seasons Box?
Liz is the founder of My Subscription Addiction. She’s been hooked on subscription boxes since 2011 thanks to Birchbox, and she now subscribes to over 100 boxes. Her favorites include POPSUGAR Must Have, FabFitFun, and any box that features natural beauty products!
All views in this review are the opinion of the author. My Subscription Addiction will never accept payment in exchange for a review, but will accept a box at no cost to provide honest opinions on the box. This post may contain affiliate/referral links. If you buy something, MSA may earn an affiliate commission. Read the complete My Subscription Addiction disclosure. |
326 Pa. Superior Ct. 14 (1984)
473 A.2d 584
DASET MINING CORPORATION, a Pennsylvania Corporation, Jacobs Contracting Corporation, a Pennsylvania Corporation, Tased Coal Sales, Inc., a Pennsylvania Corporation, Armstrong Land Company, Inc., a Pennsylvania Corporation, Seven Sisters Mining Company, Inc., a Pennsylvania Corporation, and Jacobs, Jacobs & Jacobs, a Partnership Composed of Seaborn Jacobs, Terrence Jacobs, and Darryl Jacobs
v.
INDUSTRIAL FUELS CORPORATION, a Delaware Corporation, Peoples Energy Corporation, a Corporation, and Twin Oaks Coal Company, a Delaware Corporation, Appellants.
DASET MINING CORPORATION, a Pennsylvania Corporation, Jacobs Contracting Corporation, a Pennsylvania Corporation, Tased Coal Sales, Inc., a Pennsylvania Corporation, Armstrong Land Company, Inc., a Pennsylvania Corporation, Seven Sisters Mining Company, Inc., a Pennsylvania Corporation, and Jacobs, Jacobs & Jacobs, a Partnership Composed of Seaborn Jacobs, Terrence Jacobs and Darryl Jacobs, Appellants,
v.
INDUSTRIAL FUELS CORPORATION, a Delaware Corporation, Peoples Energy Corporation, a Corporation, and Twin Oaks Coal Company, a Delaware Corporation.
TWIN OAKS COAL COMPANY, a Delaware Corporation,
v.
DASET MINING CORPORATION, a Pennsylvania Corporation, Jacobs Contracting Corporation, a Pennsylvania Corporation, Tased Coal Sales, Inc., a Pennsylvania Corporation, Armstrong Land Company Inc., a Pennsylvania Corporation, Jacobs, Jacobs & Jacobs, a Partnership, Seaborn Jacobs, Terrence S. Jacobs, Darryl M. Jacobs and Martha R. Jacobs, Appellants.
TWIN OAKS COAL COMPANY, a Delaware Corporation, Appellant,
v.
DASET MINING CORPORATION, a Pennsylvania Corporation, Jacobs Contracting Corporation, a Pennsylvania Corporation, Tased Coal Sales, Inc., a Pennsylvania Corporation, Armstrong Land Company, Inc., a Pennsylvania Corporation, Seven Sisters Mining Company, Inc., a Pennsylvania Corporation, Jacobs, Jacobs & Jacobs, a Partnership, Seaborn Jacobs, Terrence S. Jacobs, Darryl M. Jacobs and Martha R. Jacobs.
Supreme Court of Pennsylvania.
Argued May 24, 1983.
Filed March 2, 1984.
Petition for Allowance of Appeal Denied July 2, 1984.
*18 David B. Fawcett, Jr., Pittsburgh, for Daset, etc., appellants (at Nos. 753 and 754) and appellees (at No. 634 and 648).
Frederick J. Francis, Pittsburgh, for Industrial Fuels, appellant (at No. 634) and appellee (at No. 753) and for Twin Oaks, appellant (at No. 648) and appellee (at No. 754).
*19 Before CAVANAUGH, ROWLEY and CIRILLO, JJ.
CIRILLO, Judge:
This breach of contract case is really two cases, which were consolidated for trial, because they relate to the same factual situation and legal conflicts among the parties. In the Spring of 1980, Twin Oaks Coal Company (hereinafter "Twin Oaks") instituted an action in trespass and assumpsit in the Common Pleas Court of Allegheny County against Daset Mining Corporation, Jacobs Contracting Corporation, Tased Coal Sales, Inc., Armstrong Land Company, Inc., Seven Sisters Mining Company, Inc., Jacobs, Jacobs & Jacobs; a partnership composed of Seaborn Jacobs, Terrence S. Jacobs, Darryl M. Jacobs, and Martha Jacobs (hereinafter all referred to collectively as "Daset"). On June 3, 1980, Daset filed in Westmoreland County, a complaint in Assumpsit and Trespass against Twin Oaks, Industrial Fuels Corporation ("IFC"), and Peoples Energy Company (hereinafter "Peoples").[1] The case in Westmoreland County was subsequently transferred to Allegheny County and the two were consolidated. B.H. & H., Inc. was brought in as an additional defendant by Daset.
Greatly simplified, the basic facts underlying the controversy are that Twin Oaks purchased the coal-related assets of Daset, which were mainly a large number of coal leases and some strip mining equipment. The sale was consummated with a lengthy integrated agreement dated April 11, 1979. The contract stipulated that Twin Oaks was to pay Daset $3,405,026.00 and assume some of Daset's outstanding obligations. These included the reclamation of some stripped land, which had not yet been performed by Daset and the remaining payment owed by Daset to B.H. & H. The greater part of the equipment and many of the coal leases had been previously acquired by Daset from B.H. & H. At the time that the agreement was executed, Twin Oaks paid $2,405,026.00, and gave Daset a note for the *20 remaining million, which was payable a year later.[2] Shortly before the due date of the note, Twin Oaks refused to pay Daset and B.H. & H. because of a number of legal grievances against Daset. Subsequently, Twin Oaks filed suit on the basis that there was a breach of the important warranty given by Daset in the agreement of April 11, 1979; namely, that the lands assigned to Twin Oaks by Daset, contained not less than four million (4,000,000) tons of recoverable bitminous coal. Daset filed suit for non-payment of the note and took the position that there was no such breach; but brought B.H. & H. into the case on the theory that if there was such a breach, it would be partly the responsibility of the latter because a number of the coal leases had been acquired from it.
At the trial, Twin Oaks did not elect to prosecute any claim against Daset except this important alleged breach of the warranty of four million (4,000,000) tons of coal. In addition, it alleged that this breach created a right to recover for the loss of tonnage and for its great expenditures for reclamation of stripped land.[3]
*21 After a lengthy jury trial, the judge submitted interrogatories to the jury. The jury found that the lease-holds sold to Twin Oaks by Daset contained four million (4,000,000) or more tons of recoverable bituminous coal as defined in the agreement. This resulted in verdicts against Twin Oaks and in favor of Daset in the amount of $1,394,892.86, and in favor of B.H. & H. in the amount of $598,701.60. Twin Oaks filed a motion for a new Trial, and Daset filed a limited motion for a new trial on the ground that the court should not have restricted its claim for interest to six percent (6%). B.H. & H. settled and has discontinued. The motions of the parties were denied and both parties appealed. We will address their claims seriatim.
As a foundation for the discussion of the parties' claims, we turn our attention to the contract. This comprehensive agreement, which embodies the rights and obligations of the parties, is a lengthy document, which was thoroughly negotiated prior to its execution on April 11, 1979. However, the controversy now before us revolves around only those certain passages, which deal with the warranty made by Daset, which state as follows:
That on, in and under the lands described in those leases listed in Section 1 of Exhibit I to the Assignment Agreement (Schedule G hereto), and which leases are effectively assigned to Buyer on the date hereof in the title condition required by this Agreement (and not subject to those exceptions or conditions that may be specified on Schedule L attached hereto), there are not less than Four Million (4,000,000) tons of recoverable bituminous coal.
In addition, the definitions section of the agreement defines the term "recoverable bituminous coal" as follows:
Whenever used in this Agreement, the term "recoverable bituminous coal" shall mean bituminous coal that, as of the date hereof, can be mined and removed with the use of modern mining methods considering the generally accepted maximum stripping ratios in the area in which Sellers have conducted their mining operations.
*22 Admission of Evidence.
The appellant, Twin Oaks', initial contention concerns the admission of various documents and other evidence, which it asserts were irrelevant and prejudicial.[4] More specifically, Twin Oaks alleges that the admission of any testimony beyond the scope of the issue of whether there were four million (4,000,000) tons of "recoverable bituminous coal", as defined in the agreement, is grounds for reversal because it tended to divert the jury from the issue and confused or misled them.
A trial court may properly exclude evidence if its probative value is substantially outweighed by the danger of unfair prejudice, confusion of issues or misleading the jury. U.S. v. Hively, 547 F.Supp. 318 (M.D.Pa. 1982); Belmont Industries, Inc. v. Bethlehem Steel Corp., 62 F.R.D. 697 (1974), affirmed 512 F.2d 434 (3 Cir. 1975); Short v. Allegheny Trust Co., 330 Pa. 55, 198 A. 793 (1938); Whistler Sportswear, Inc. v. Rullo, 289 Pa.Super. 230, 433 A.2d 40 (1981). However, "prejudice" for the purposes of this rule, does not mean detrimental to a party's case, but rather, an undue tendency to suggest a decision on an improper basis. Whistler, supra. In Pennsylvania, the trial judge has broad discretion regarding the admission of potentially misleading and confusing evidence. Bowers v. Garfield, 382 F.Supp. 503 (E.D.Pa. 1974), affirmed 503 F.2d 1398 (3 Cir. 1974).
Appellant alleges error in the admission of three documents. The first document was a memorandum, dated *23 March 27, 1979, from the Treasurer of Peoples to the chairman of the Board of Peoples. A portion of it entitled Reserves stated, "In place reserves of bituminous seam coal are estimated to exceed 6,000,000 tons." A second memorandum, dated February 26, 1979, stated, "I concur with their reserve [Daset's] estimate of 5.5 million raw tons in place contained in a total of 4,107 surface acres . . .".[5] The court also admitted another document which showed that the appellant allocated the write off of the mineral rights of the coal leases using a figure of six million two hundred thousand (6,200,000) tons.
Appellant argues that because these documents all mentioned amounts of coal in excess of that warranted, they were highly prejudicial and as such had a tendency to compel an improper decision. Further, Twin Oaks asserts that this testimony was irrelevant because neither estimates of coal reserves or in place coal nor "write off figures" are germane to the warranty of the amount of "recoverable bituminous coal", as defined in the agreement. Twin Oaks further contends that these figures all included "deep mined coal", which the trial court ruled was not included in the warranty made by Daset.
Regarding the admission of these documents, we fail to see how they prejudiced the appellant's case. The trial judge clearly ruled that the amount of coal that was being warranted was no less than four million (4,000,000) tons. He also ruled that coal reserves that could be mined by deep mining methods were excluded, as is evidenced by the following discussion:
MR. MCGINLEY: Judge, what about coal that could be deep mined as well as stripped?
*24 THE COURT: What I have said I don't think has anything to do with that. A person may elect to mine coal by the deep mining method but for the purposes of the warranty and shall I say this sale of coal, I'm ruling that it was contemplated a minimum of four million tons of coal susceptible of being mined by stripping.
MR. MCGINLEY: As long as I understand the Court to beholding (sic) that the danger in the case, Judge, and what we're just trying to set forth was that if some of these mines which could have been stripped had been deep mined, that coal would have accounted for the warranties.
THE COURT: Well, it didn't happen. So, we're not faced with that.
MR. SMITH: But as I understand your ruling, Your Honor, if that particular coal that Mr. McGinley is referring to could not be stripped, then that coal which could on the other hand been deep mined, that coal is not included in the warranty; is that correct?
THE COURT: That's correct.
Further, when the estimates of coal reserves were introduced, Judge Weir overruled appellant's objections on the basis that they were admissions of the appellant that were relevant "to how much [coal] is there". At no time was this evidence purported to be estimates of the amount of coal reserves covered by the contract warranty. This testimony did not indicate the amount of "recoverable bituminous coal", which could be obtained by strip mining, but only established that the appellant estimated that there was a certain amount of coal contained in, on and under the lands in question. As to the testimony which concerned the figure used by the appellant in preparing its taxes; at no time during the testimony was there any suggestion that the figure used for depletion of these coal reserves had any correlation to the amount of coal warranted.[6] In addition, *25 when the jury was charged, the judge reiterated that the figure to be considered in determining breach of the warranty was four million (4,000,000) tons and provided the jury with a copy of the definition of "recoverable bituminous coal" to use during its deliberations. Therefore, we fail to see how, under the circumstances, any confusion could have resulted from the admission of this testimony.
Appellant next contends that it was improper to permit testimony concerning Twin Oaks' financial condition and operations after the agreement was executed by the parties.[7] The trial court permitted this testimony because it determined that it was relevant to the appellant's motive for not paying the monies owed. Asserting that evidence of motive is irrelevant in an action for breach of warranty, appellant cites Seneca Falls Machine Co. v. McBeth, 246 F.Supp. 271 (W.D.Pa. 1965), vacated and remanded 368 F.2d 915 (3 Cir. 1966); Otto v. Imperial Casualty & Indemnity Co., 277 F.2d 889 (8 Cir. 1960); and Lane v. Bisceglia, 15 Ariz.App. 269, 488 P.2d 474 (1971).
In Seneca Falls Machine Co., the Federal District Court, applying Pennsylvania law, held that the reasons for terminating an oral contract were irrelevant when no provision was made in the contract for termination. The court then concluded that the contract could be terminated by either *26 party at will or after a reasonable time. In Otto the appellant-agent attempted to recover punitive damages from the appellee-insurance company in an action for breach of contract. The court held that, under Missouri law, punitive damages are not recoverable in a breach of contract action. The appellant had attempted to circumvent this rule, by alleging that appellee's termination of the contract was malicious and willful. The court held that, ". . . [T]he motive of one who has the right to terminate a contract at any time is immaterial . . ." Id. at 893, 894. (Emphasis supplied). In Lane, the parties entered an agreement for the sale of a property, which was conditioned upon the purchasers being able to assume the existing mortgage at a six percent (6%) interest rate. When the mortgagee would only permit the assumption at a six and three-quarter percent (6 3/4%) interest rate, the buyers refused to purchase the property and the seller retained the $5,000.00 earnest money on deposit. The purchasers then brought suit to recover the money. The court held that the seller materially breached the contract by not providing the purchasers with the mortgage at the agreed rate. Thus, the purchasers' motive for rescinding the contract was immaterial.
As the appellee, Daset, correctly counters in its brief, these cases are inapposite to the case at bar because they concern the exercise of a contractual right; not the breach of a duty to pay. In the instant case, Twin Oaks neither had a contractual right to terminate the contract nor to refuse to pay the monies owed. In fact, its refusal to pay was in derogation of the terms of the contract, which did provide the remedy in the event that the amount of recoverable bituminous coal was less than the four million (4,000,000) tons warranted. This remedy, which was properly alleged at trial, was provided in Article VII, paragraph two, which states:
2. With respect to the representations and warranties set forth in paragraph 17 of Article IV above [recoverable bituminous coal], it is acknowledged and agreed by the *27 parties hereto that the truth and accuracy thereof is of the essence of this Agreement and that the damages that would be incurred by Buyer in the event that said representations and warranties were untrue in any respect would be extremely difficult to measure and determine. Therefore, the parties hereto agree that, to the extent there are less than Four Million (4,000,000) tons of recoverable bituminous coal, Sellers and Warrantors jointly and severally agree to promptly reimburse Buyer in the amount of One Dollar ($1.00) per ton for each ton less than Four Million (4,000,000) tons of recoverable bituminous coal existing on in and under the lands described in the leases listed in Section 1 of Exhibit I to the Assignment Agreement (Schedule G hereto). It is agreed by Buyer and Sellers that such sum shall be paid as liquidated damages ("Liquidated Damages") for the breach of the representations and warranties set forth in said paragraph 17 of Article IV.
As stated previously, the trial judge has broad discretion regarding the admission of potentially misleading and confusing evidence. Bowers, supra. This trial was a lengthy proceeding with a great number of witnesses, many exhibits and extensive testimony. In reviewing the entire record, we can neither say that the trial judge erred in admitting any of this evidence nor that its admission constituted an abuse of discretion such that the court's judgment was manifestly unreasonable or the result of partiality, prejudice, bias or ill will. Commonwealth ex rel. Berman v. Berman, 289 Pa.Super. 91, 432 A.2d 1066 (1981); Straub v. Tyahla, 274 Pa.Super. 411, 418 A.2d 472 (1980). Also in the aggregate, we cannot say that if this testimony had been excluded, it would have changed the outcome of the case. See, Redevelopment Authority of City of Chester v. Bosacco, 46 Pa.Cmwlth. 242, 406 A.2d 1163 (1979), appeal after remand 53 Pa.Cmwlth. 550, 417 A.2d 1350 (1980).
Parol Evidence
Appellant next contends that the trial court erred by permitting the introduction into evidence of prior negotiations *28 and agreements. Twin Oaks argues that the admission of such testimony was highly prejudicial and improper; and was in violation of the parol evidence rule because the agreement contained an integration clause. The Restatement (Second) of Contracts § 213 explains the effect of such a clause as follows:
§ 213. Effect of Integrated Agreement on Prior Agreements (Parol Evidence Rule)
(1) A binding integrated agreement discharges prior agreements to the extent that it is inconsistent with them.
(2) A binding completely integrated agreement discharges prior agreements to the extent that they are within its scope.
(3) An integrated agreement that is not binding or that is voidable and avoided does not discharge a prior agreement. But an integrated agreement, even though not binding, may be effective to render inoperative a term which would have been part of the agreement if it had not been integrated.
However, Section 214 of the Restatement (Second) also ennumerates the limited circumstances in which evidence of prior or contemporaneous agreements and negotiations may be admitted as follows:
§ 214. Evidence of Prior or contemporaneous Agreements and Negotiations
Agreements and negotiations prior to or contemporaneous with the adoption of a writing are admissible in evidence to establish
(a) that the writing is or is not an integrated agreement;
(b) that the integrated agreement, if any, is completely or partially integrated;
(c) the meaning of the writing whether or not integrated;
(d) illegality, fraud, duress, mistake, lack of consideration, or other invalidating cause;
*29 (e) ground for granting or denying rescission, reformation, specific performance, or other remedy. (emphasis supplied)
Comment b. states as follows:
b. Interpretation. Words, written or oral, cannot apply themselves to the subject matter. The expressions and general tenor of speech used in negotiations are admissible to show the conditions existing when the writing was made, the application of the words, and the meaning or meanings of the parties. Even though words seem on their face to have only a single possible meaning, other meanings often appear when the circumstances are disclosed. In cases of misunderstanding, there must be inquiry into the meaning attached to the words by each party and into what each knew or had reason to know. See § 201. (emphasis supplied)
It is well settled in Pennsylvania law that in the absence of fraud, accident or mistake, parol evidence as to preliminary negotiations or oral agreements is not admissible in evidence if it adds to, modifies, contradicts or conflicts with the written agreement between the parties. Servomation Mathias Pa., Inc. v. Lancashire Hall, Inc., 442 Pa. 602, 276 A.2d 547 (1971); Nicolella v. Palmer, 432 Pa. 502, 248 A.2d 20 (1968); Keyser v. Margolis, 422 Pa. 553, 223 A.2d 13 (1966). However, it is equally well settled that this general rule does not apply where the agreement is ambiguous. In such a situation parol evidence is admissible to explain the agreement and resolve ambiguities to ascertain the meaning of the parties. Mellon Bank, N.A. v. Aetna Business Credit, Inc., 619 F.2d 1001 (1980 3rd Cir.); Silver v. Gene K. Kolber Advertising, Inc., 518 F.Supp. 939 (E.D.Pa. 1981); In Re Fessman's Estate, 386 Pa. 447, 126 A.2d 676 (1956); Pavlich v. Ambrosia Coal Co., 441 Pa. 210, 273 A.2d 343 (1971); Kohn v. Kohn, 242 Pa.Super. 435, 364 A.2d 350 (1976). In addition, our Supreme Court has held that, "[T]he parol evidence rule does not apply in its ordinary strictness where the existence of a custom or usage to explain the meaning of words in a writing is *30 concerned." Electric Reduction Co. v. Colonial Steel Co., 276 Pa. 181, 186, 120 A. 116, 118 (1923). ". . . [W]here terms are used in a contract which are known and understood by a particular class of persons in a certain special or peculiar sense, evidence to that effect is admissible, for the purpose of applying the instrument to its proper subject-matter." Id., 276 Pa. at 188, 120 A. at 118. Accord, Easton v. Washington County Insurance Co., 391 Pa. 28, 137 A.2d 332 (1957). In Carter v. Edwin J. Schoettle Co., 390 Pa. 365, 134 A.2d 908 (1957), the court held that where there is an integrated agreement, evidence of prior negotiations is inadmissible to show an intent at variance with the language of the written agreement, but is admissible to show local usage, which would give a particular meaning to the language.
Appellant concedes in its brief that an agreement may be interpreted in accordance with "relevant usage" and cites the Restatement (Second) of Contracts § 220, which states as follows:
§ 220. Usage Relevant to Interpretation
(1) An agreement is interpreted in accordance with a relevant usage if each party knew or had reason to know of the usage and neither party knew or had reason to know that the meaning attached by the other was inconsistent with the usage.
(2) When the meaning attached by one party accorded with a relevant usage and the other knew or had reason to know of the usage, the other is treated as having known or had reason to know the meaning attached by the first party.
As the learned Judge Weir stated in his opinion, unless an individual had prior exposure to strip mining, it would be impossible to understand the correct meaning of such a simple term as "stripping ratios". Thus, without explanatory testimony the jurors would be unable to determine what if any meaning the parties attached to various terms. Testimony in the record revealed that both parties accorded the same meaning to the term "generally accepted maximum *31 stripping ratios". However, Twin Oaks contends that the admission of other extrinsic evidence concerning prior negotiations or drafts of the agreement to define local usage was improper. We disagree.
The contract in the case at bar concerns an industry that is highly technical in nature and the attendant terms employed by the parties have no meaning to individuals who are not acquainted with coal mining and therefore have no understanding of the terminology employed by those involved in the business. Moreover, because of the significance attached to various pivotal phrases in the agreement it was of great importance for the jury to hear testimony on how the terms were negotiated. This testimony would then provide sufficient background for evaluation of the intent of the parties in employing the particular language used.
Furthermore, the Restatement (Second) of Contracts § 212 provides for the interpretation of an integrated agreement as follows:
§ 212. Interpretation of Integrated Agreement
(1) The interpretation of an integrated agreement is directed to the meaning of the terms of the writing or writings in the light of the circumstances, in accordance with the rules stated in this Chapter.
(2) A question of interpretation of an integrated agreement is to be determined by the trier of fact if it depends on the credibility of extrinsic evidence or on a choice among reasonable inferences to be drawn from extrinsic evidence. Otherwise a question of interpretation of an integrated agreement is to be determined as a question of law.
c. Statements of intention. The rule of Subsection (1) permits reference to the negotiations of the parties, including statements of intention and even positive promises, so long as they are used to show the meaning of the writing.
In support of its argument, Twin Oaks cites a number of cases in which prior drafts and negotiations were ruled inadmissible. However, these cases are inapposite to the *32 case at bar because they all involve situations where the proffered testimony contradicted or attempted to add terms to the agreement. In both Carter, supra and National Cash Register, supra, the parties attempted to introduce evidence which would have contradicted or changed the terms of the agreements. In Fischer & Porter Co. v. Porter, 364 Pa. 495, 72 A.2d 98 (1950), the Supreme Court held that it was improper to admit testimony, which would create an ambiguity where none existed. The situations in these cases are not at all analagous to that in the case at bar. None of the disputed testimony contradicted or varied the terms of the finalized agreement, but only served to illuminate the intent of the parties in utilizing the specific language which was finally incorporated into the contract. Mr. McGinley, the lawyer who had been involved in negotiating the contract on behalf of Daset, testified about terms that had been rejected and the reasoning behind the language actually used as follows.
Q. All right. So, that eliminated the language of economically marketable; is that correct?
A. Yes.
Q. Okay.
A. In the context of the negotiations, it was defined further in that there was a handwritten note, "minable and merchantable bituminous coal shall mean bituminous coal that when reached in the course of mining operations, can be mined and removed with the use of modern mining methods and sold at a reasonable profit under then current market conditions."
Q. And was there further language negotiated between the parties?
A. Yes. We again negotiated that language and the following draft stated, "That on, in and under the lands described in the leases listed on the attached Schedule A, there are not less than 4,000,000 tons of marketable and merchantable bituminous coal," and again that was the typed version where the definition stated, "shall mean bituminous coal that can be reached in the normal mining *33 operations and can be mined and removed with the use of modern mining methods and sold at a reasonable profit under then current market conditions."
Q. Did you object to those definitions?
A. We negotiated them, yes.
Q. And what was the problem with that language as far as your client was concerned?
A. It was subjective and dependent upon the success of the Twin Oaks mining operation.
Q. And was this whole business deal to rest upon the success or failure of the Twin Oaks mining operation?
A. It was not.
Q. Then what happened?
A. From that definition we evolved to the definition of recoverable bituminous coal as defined in the agreement with reference to maximum stripping ratios in the area.
Q. And that final agreement the language of merchantable and selling them at market price and the economic factors that were negotiated out during the negotiations; is that right?
A. Yes.
Q. And therein lies the basis for your opinion with regard to the final definition, being the generally accepted maximum stripping ratio in the area at the time of the agreement.
A. Yes.
Q. As to govern the extent of the warranty of coal.
A. Yes.
MR. FAWCETT: All right.
MR. SMITH: Mr. Pietragallo.
MR. PIETRAGALLO: No, thank you.
RECROSS EXAMINATION
Appellant contends that the above testimony created an ambiguity where none had previously existed. Twin Oaks also asserts that this testimony removed the economic element, which others had testified was an important component of the contract. Appellant's analysis of the testimony *34 is overbroad and not precisely correct. Mr. McGinley's testimony regarding the negotiation of the terms only showed that Daset did not want the warranty of the amount of recoverable bituminous coal to rise or fall on the expertise or lack of same, on the part of Twin Oaks. In other words, the economic factor in the contract was not to be pegged to Twin Oaks' ability or inability to successfully mine the coal in an economically feasible manner. Rather, the standard, which was finalized in the contract, was that which would be "generally" accepted in the area. Accordingly, if Twin Oaks operation was not efficient and could not successfully mine these leases, there could be no assertion on its part that there was not the amount of coal warranted. Therefore, we do not agree with Twin Oaks that the economic element was removed from the contract. What was removed was the subjective standard of the appellant. The final negotiated contract was based on an economic standard, which would be acceptable to others engaged in a similar business in the area. Therefore, we hold that the trial judge did not err by permitting testimony of prior negotiations and agreements.
Appellee's only contention on appeal is that the trial court erred in not awarding more than the legal interest rate, in prejudgment interest, on the monies due Daset on the note. Appellee asserts that to restrict the interest rate to six percent (6%), when market interest rates are greatly in excess of that amount, only encourages non-payment of obligations and protracted litigation. Furthermore, Daset argues that Twin Oaks has engaged in tactics, which unjustly enriches itself to the financial detriment of appellee. Appellee concedes that the trial judge's decision is historically correct, but posits that the dramatic change in the economic situation and the correlating high market interest rates render this decision manifestly unjust.
The legal rate of interest in Pennsylvania is fixed at six percent (6%) by statute 41 P.S. § 202[8] as follows:
§ 202 Legal rate of interest
*35 Reference in any law or document enacted or executed heretofore or hereafter to "legal rate of interest" and reference in any document to an obligation to pay a sum of money "with interest" without specification of the applicable rate shall be contrued to refer to the rate of interest of six percent per annum.
Traditionally, Pennsylvania has followed the Restatement (Second) of Contracts § 354[9] which states as follows:
§ 354. Interest as Damages
(1) If the breach consists of a failure to pay a definite sum in money or to render a performance with fixed or ascertainable monetary value, interest is recoverable from the time for performance on the amount due less all deductions to which the party in breach is entitled.
Comment:
a. Scope. This Section deals with an injured party's right to interest as damages in compensation for the deprivation of a promised performance. Had the performance been rendered when it was due, the injured party would have been able to make use of it. Interest is a standardized form of compensation to the injured party for the loss of that use, in the absence of agreement to the contrary. It is payable without compounding at the rate, commonly called the "legal rate," fixed by statute for this purpose. (Emphasis supplied).
In contract cases, prejudgment interest is awardable as of right. Eazor Express, Inc. v. International Brotherhood of Teamsters, Chauffeurs, Warehousemen and Helpers of America, 520 F.2d 951 (3rd Cir. 1975), cert. denied; Gold & Co. Inc. v. Northeast Theatre Corp., 281 Pa.Super. 69, 421 A.2d 1151 (1980). In claims that arise out of a contractual right, interest has been allowed at the legal rate from the date that payment was wrongfully withheld, where the damages are liquidated and certain, and the interest is readily ascertainable through computation. Paul Revere Protective Life Ins. Co. v. Weis, 535 F.Supp. 379 *36 (E.D.Pa. 1981); Girard Bank v. John Hancock Mutual, 524 F.Supp. 884 (E.D.Pa. 1981); Formigli Corp. v. Fox, 348 F.Supp. 629 (E.D.Pa. 1972); Miller v. City of Reading, 369 Pa. 471, 87 A.2d 223 (1952). Moreover, in contracts concerning payment of a sum of money, which bear an interest rate higher or lower than the legal rate; if the parties do not contract that it shall be the rate after the debt becomes due; then, the interest rate fixed by law attaches for the detention of the principal sum. Ludwick v. Huntzinger, 5 Watts & S. 51 (1841); Weinberger v. Wickert, 5 Berks 36 (1912); 41 P.S. § 202; 11 Williston, Contracts § 1416 (3rd Ed. 1968). However, contract provisions for non-payment of money due, which provide for a specific rate of interest have been upheld. See, O'Brien & Gere Engineers, Inc. v. Taleghani, 525 F.Supp. 750 (E.D.Pa. 1981) (amount not paid by stipulated date, simple interest of 12% per annum).
A review of the case law reveals that the trend of the courts has been to take an equitable approach in determining interest as an element of damages. See, E.I. Du Pont de Nemours & Co. v. Lyles & Lang Construction Co., 219 F.2d 328 (4th Cir. 1955) (interest to be awarded not at legal rate, but at rate plaintiff would have had to pay upon loan of similar amount in view of state money market); Davis Cattle Co. v. Great Western Sugar Co., 544 F.2d 436 (10th Cir. 1976) (interest awarded at 11.5% per annum, not statutory rate of 6%); Peterson v. Crown Financial Corp., 553 F.Supp. 114 (E.D.Pa. 1982) (interest awarded at rate of 2 1/2% above prime rate); Nedd v. United Mine Workers of America, 488 F.Supp. 1208 (M.D.Pa. 1980) (no interest awarded where union did not benefit from breach of trust). But see, Traffic Safety Co. Inc. v. Horan, 21 B.R. 669 (Bkrtcy.Pa. 1982) (former trustee of estate only liable for interest at legal rate, not rate which estate would have earned if money invested).
The Pennsylvania courts have also adopted this approach, and in equity cases, the award and rate of interest allowed is at the discretion of the chancellor. Sack v. Feinman, 489 Pa. 152, 413 A.2d 1059 (1980); decided after *37 remand 495 Pa. 100, 432 A.2d 971 (1981). Our Supreme Court in Murray Hill Estates, Inc. v. Bastin, 442 Pa. 405, 410, 276 A.2d 542, 545 (1971), stated as follows:
An examination of the cases dealing with the charge and allowance of interest will disclose many difficulties, but the decided trend of courts of law and courts of equity has been `to break away from hard and fast rules and charge and allow interest in accordance with principles of equity, in order to accomplish justice in each particular case'.
* * * Unless a case be found, which is a conclusive precedent, the safest and at the same time the fairest way for a court is to decide questions pertaining to interest according to a plain and simple consideration of justice and fair dealing.
quoting McDermott v. McDermott, 130 Pa.Super. 127, 130, 196 A. 889, 890 (1938).
See also, In re Kenin's Estate, 343 Pa. 549, 23 A.2d 837 (1942) (court reduced interest rate from 6% to 2 1/2%); Barale v. Barale, 282 Pa.Super. 213, 422 A.2d 1082 (1980) (no interest on partition sale of property).
In the tort area,[10] the Supreme Court has promulgated Pa.R.Civ.Pro., Rule 238, which provides as follows:
Rule 238. Award of Damages for Delay in an Action for Bodily Injury, Death or Property Damage
(a) Except as provided in subdivision (e), in an action seeking monetary relief for bodily injury, death or property damage, or any combination thereof, the court or the arbitrators appointed under the Arbitration Act of June 16, 1836, P.L. 715, as amended, 5 P.S. § 30 et seq., or the Health Care Services Malpractice Act of October 15, 1975, P.L. 390, 40 P.S. § 1301.101 et seq. shall
(1) add to the amount of compensatory damages in the award of the arbitrators, in the verdict of a jury, or in *38 the court's decision in a nonjury trial, damages for delay at ten (10) percent per annum, not compounded which shall become part of the award, verdict or decision;
While these "delay damages" are not termed prejudgment interest as such, they are most certainly a contract prejudgment counterpart. The purpose behind this rule was explained by the Supreme Court as follows, "[T]his rule serves to compensate the plaintiff for the inability to utilize funds rightfully due him, but the basic aim of the rule is to alleviate delay in the disposition of cases, thereby lessening congestion in the courts." Laudenberger v. Port Authority of Allegheny County, 496 Pa. 52, 59, 436 A.2d 147, 151 (1981), appeal dismissed, 456 U.S. 940, 102 S.Ct. 2002, 72 L.Ed.2d 462 (1982). See also, American Enka Co. v. Wicaco Machine Corp., 686 F.2d 1050 (1982) (applying Pennsylvania law, damages awarded under Rule 238).
Appellee urges that in light of the above, it is obsolete for the award of prejudgment interest to be limited to the legal rate of six percent (6%).[11] It also contends that with the present high interest rates, it is to a debtor's advantage to withhold payment and litigate. In the event of loss, the money unjustly withheld, if properly invested will generate sufficient income to pay for all costs and interest. This unjust enrichment of the debtor, is in derogation of the principles of equity and is in contravention of the concept underlying the award of interest.
Appellee submits that 41 P.S. § 202 does not prevent the recovery of interest at a rate greater than six percent (6%) where the principles of restitution are utilized. In Peterson v. Crown Financial Corp., 661 F.2d 287 (3rd Cir. 1981), the Court of Appeals held that the appellant's claim sounded in restitution. However, in Peterson, the court determined that a situation where money was extracted and unjustly withheld was not analogous to a case where a promise to *39 pay money or render a service had been breached. The court reasoned that the appellant's claim was removed from the purview of the Restatement of Contracts and sounded in restitution. In so doing, Judge Adams stated,
. . . [I]t is difficult to draw a logical distinction between the present case a wrongful demand and acceptance of a sum paid under protest and the refusal to pay funds due under a contract. It may be inequitable to require debtors to pay only six percent under present Pennsylvania law yet force creditors who have made wrongful demands to disgorge at money-market rates. As to the former situation, however, Pennsylvania has provided clear if questionable precedent to which a federal court sitting in diversity is bound.
Id. at 298.
Unfortunately, while we find appellee's arguments logical and persuasive, the law in Pennsylvania, at this time, does not permit an award of prejudgment interest in an amount greater than six percent. Appellee's claim is under the purview of the Restatement and as such does not sound in restitution. Further, we do not agree with appellee that this is a matter for judicial reform. Being statutory, reform in this matter is the province of the legislature.
Additionally, we are mindful that this contract was extensively negotiated by skillful and knowledgeable individuals, who should have been well aware of the applicable law and the possible consequences in the event of breach of the agreement. The contract specifically provided that the note for one million dollars, which was payable on or before one year from the date of the execution of the agreement, was to generate six percent (6%) interest per annum on the balance remaining unpaid until the due date. However, since the parties neglected to make any provision on the rate of interest on the note in the event of breach, the trial court could only award prejudgment interest at the legal *40 rate prescribed by statute. Accordingly, appellee's counterclaim is dismissed.
Judgment affirmed.
NOTES
[1] Peoples owns all of the stock of IFC; IFC owns all of the stock of Twin Oaks. Peoples, IFC, and Twin Oaks shall be collectively referred to as "Twin Oaks".
[2] The section of the contract dealing with payment stated as follows:
3. (B)(iii) The remaining balance of One Million ($1,000,000.00) Dollars shall be paid on or before one year from the date hereof, together with interest on the balance remaining unpaid from time to time at the rate of six percent (6%) per annum, which obligation shall be evidenced by a non-negotiable promissory note in the form set forth in Schedule E (attached hereto and by reference made a part hereof).
[3] The trial judge ruled that the contract precluded recovery of reclamation costs. He did so on the basis that under INDEMNIFICATION, Paragraph 2 of the agreement stated as follows:
Therefore, the parties hereto agree that to the extent there are less than four million tons of recoverable bituminous coal, sellers and warrantors jointly and severally agree to promptly reimburse Buyer in the amount of One Dollar ($1.00) per ton for each ton less than Four Million (4,000,000) tons of recoverable bituminous coal existing on, in and under the lands described in the leases listed in Section 1 of Exhibit I to the Assignment Agreement (Schedule G hereto). It is agreed by Buyer and Sellers that such sum shall be paid as liquidated damages ("Liquidated Damages") for the breach of the representations and warranties set forth in said paragraph 17 of Article IV.
[4] The appellee argues that most of Twin Oaks contentions on the basis of relevancy and prejudice have been waived because the only objections made at trial were on the basis of the Parol Evidence Rule, and some of these issues were not raised in post-trial motions. Issues not raised in post-trial motions in the trial court are not preserved for consideration on appeal. O'Malley v. Peerless Petroleum Inc., 283 Pa.Super. 272, 423 A.2d 1251 (1980). In appellant's Motion for New Trial, it is asserted that the trial judge erred in allowing evidence to be given concerning negotiations prior to the agreement of April 11, 1979. Many of the specific issues raised on appeal would be characterized as negotiations. Therefore, we decline to find all of appellant's allegations waived.
[5] Appellant also raises the issue of the competency of the individuals who made these estimates. However, no such objection was raised at trial or in post-trial motions. Matters raised for the first time on appeal will not be considered. Gibson v. Miller, 265 Pa.Super. 597, 402 A.2d 1033 (1979); Mawhinney v. Hotzhauer, 168 Pa.Super. 283, 77 A.2d 734 (1951); Zoni v. Mutual Life Ins. Co. of New York, 153 Pa.Super. 1, 33 A.2d 445 (1943); Stevens et al. v. Frank et al., 151 Pa.Super. 222, 30 A.2d 161 (1943).
[6] Appellant also argues that the admission of this document could have led the jury to believe that it cheated on its taxes. We find such a contention extreme. At no time was such a suggestion made nor was there any inference that that was the purpose for using the 6.2 million ton figure for write-off purposes.
[7] Appellant also contends that the trial court erred in admitting evidence of Twin Oaks expectation of profit and motives for entering into the agreement. We have carefully reviewed the record and appellant's motion for a new trial. This issue was never raised prior to the appeal to this Court. A party may not raise an issue for the first time on appeal. Vend-A-Matic, Inc. v. Frankford Trust Co., 296 Pa.Super. 492, 442 A.2d 1158 (1982); Gibson v. Miller, 265 Pa.Super. 597, 402 A.2d 1033 (1979); Mazza v. Berlanti Const. Co., 206 Pa.Super. 505, 214 A.2d 257 (1965); Robinson v. Brown, 195 Pa.Super. 384, 171 A.2d 865 (1961). Additionally, a reason for new trial not assigned as error in the court below may not be raised and will not be considered for the first time on appeal. Risbon v. Cottom, 387 Pa. 155, 127 A.2d 101 (1956); Schneider v. Albert Einstein Medical Center, Northern Division, 257 Pa.Super. 348, 390 A.2d 1271 (1978); Baccare v. Mennella, 246 Pa.Super. 53, 369 A.2d 806 (1976). Therefore, we find that appellant has waived this contention.
[8] Act of Jan. 30, 1974, P.L. 13, No. 6, § 202 imd. effective.
[9] This section was formerly § 337.
[10] We are also mindful that in the area of workmen's compensation the interest on awards has been raised from six percent (6%) to ten percent (10%). 77 P.S. § 717.1; C.W. Brown Coal Co. v. Workmen's Compensation Appeal Bd., 62 Pa.Cmwlth. 539, 437 A.2d 458 (1981).
[11] In appellee's original complaint, it asked for interest at the rate of ten percent (10%) from the time of breach. However, on appeal, Daset did not limit its argument to any specific amount.
|
In recent years, Boris Johnson has excelled at making ignorant pronouncements and illiterate blunders. From offensive remarks on burqas to reciting Kipling in Myanmar and his ludicrous statements on Brexit, Johnson has perfected the art of getting it wrong. It feels like he’s managed to offend just about everyone. For video game educators like myself, that moment arrived way back in 2006, when Johnson attacked video games as a learning tool.
“They [young people] become like blinking lizards, motionless, absorbed, only the twitching of their hands showing they are still conscious,” he wrote. “These machines teach them nothing. They stimulate no ratiocination, discovery or feat of memory – though some of them may cunningly pretend to be educational.”
Johnson was speaking from an entirely unenlightened position, of course, but his views are not uncommon. While the last decade has seen an explosion of educational games and apps aimed at school-age children, the uptake of game-based learning at university level has been less prolific.
This disparity is undoubtedly related to how complex university-level education is. There’s no need to teach basic literacy and numeracy through simple, colourful game-based experiences. A higher education graduate should possess not only a robust understanding of their chosen discipline but also a range of skills and competencies that equip them for 21st-century employment. Yet something is going wrong when employers regularly bemoan the lack of employability skills among graduates.
How could video games – which supposedly “stimulate no ratiocination” – possibly develop such skills? Commercial video games are designed for entertainment, not education, but still require players to exercise a range of essential competencies including communication skills, resourcefulness, adaptability and critical thinking.
This is not a new idea. Scholars including James Paul Gee, Constance Steinkuehler and Kurt Squire have suggested that much of the pleasure we gain from playing video games is derived from the joy of learning. Such advocates of game-based learning argue that games are complex systems which players must work hard to understand. They must communicate with one another if they are to coordinate their strategies in multiplayer games, exercise critical thinking to solve puzzles, and adapt to the ever-changing circumstances that games present.
The problem is that there’s a relative lack of empirical evidence for using video games in higher education. Are these ideas and intuitions well founded?
To answer this question, I conducted a study that sought to put games to the test. We assigned undergraduate students to one of two groups: one played games together for two hours per week, the other did not. Both groups had to self-report on measures of communication resourcefulness and adaptability.
While the majority of games selected for the study were multiplayer, emphasising teamwork and collaboration, the variety of eight games was intended to exercise participants’ adaptability. A game like Papers, Please, for example, requires an entirely different skill set to that demanded by the team-based mayhem of a title such as Team Fortress 2.
After eight weeks, the students in the game-playing group scored significantly higher for communication, resourcefulness and adaptability. Looking at it another way, a significantly greater number of students in the game-playing group increased their scores than in the control group. The game-based intervention worked, for most students.
This suggests that video games may have a role to play in universities, and can offer an engaging and low-cost way of developing graduate skills. If we encourage students to join university sports teams to gain useful experience, then why not include video games in the list of worthwhile extra-curricular activities? Certainly, the possibility is worth exploring. |
Monday, August 26, 2013
Just wanted to make a list for losing weight by lowering sign of hirsutism with a custom diet and for others out their who suffer with this condition. When estrogen levels are low and can really effect are mood and even cause depression and this also is same too for males that have low testosterone can make them depress or moody. But today's focus is boosting your estrogen levels with low calorie diet that is known to help lower the symptoms of hirsutism. But doesn't hurt after about 60-90 days(this how long it take for hormones to stabilize) to add your favorite vegetable or fruit that does boost your testosterone or estrogen levels ever once in a while. If you decide to go vegan this also help to balance out hormones but for about 30 days is just fine to go without meat because the diet can make you a little weak if your not use to it. Also staying away from processed sugars and salt especially when your out and about and decide to buy a diet-aspartame-caffeinated soda instead of ordering ice tea, tea, water with lemon, and freshly squeezed lemonade/orange juice. If your trying to lose weight here is what you can do since, women have calorie cap at around 1800-2000 cal. so, about after month you want slowly bring it down 1500-1200 and then at the third month 1000 this with injunction of 30-60 min work out (20-30 minute: 5min. stretch, 10-20 min. cardio/run and 5min. cool down/ double it up for the 60 minute). If you want to exercise everyday then 30 minute workout should be adequate but if your schedule is all over place then suggest taking hour on your day off to do 60 minute workout. |
ION Energy, a Mumbai-based company that works in the area of energy storage systems and electric vehicle infrastructure, said it has acquired French battery management company, Freemens SAS. As part of the cash plus equity deal, the entire Freemens engineering and sales team will join the core team of ION.
India’s thermal power plants are the mainstay for meeting the demand for electricity in the country. Ninety per cent of the thermal power plants depend on fresh water for cooling and 40 per cent of these plants experience high water stress, says the World Resourcew Institite (WRI). |
&HEAD CHID='simple_test', TITLE='Simple demonstration case.' /
&MESH IJK=36,24,24, XB=0.0,3.6,0.0,2.4,0.0,2.4 /
&TIME T_END=60.0 /
&REAC FUEL='PROPANE', SOOT_YIELD=0.01 /
&SURF ID='BURNER', HRRPUA=1000., COLOR='RED' /
&OBST XB=0.0,0.4,1.0,1.4,0.0,0.2 /
&VENT XB=0.0,0.4,1.0,1.4,0.2,0.2, SURF_ID='BURNER' /
&VENT XB=3.6,3.6,0.8,1.6,0.0,2.0, SURF_ID='OPEN' /
&BNDF QUANTITY='GAUGE HEAT FLUX' /
&SLCF PBY=1.2, QUANTITY='TEMPERATURE', VECTOR=.TRUE. /
&TAIL /
|
Q:
Reset default key binding zsh
I've modified a key binding and know I don't know how to return to what it did before.
Basically I've been trying what some key bindings did and which one worked for me and know I want to go back to the default.
A:
bindkey -d
Deletes all existing keymaps and reset to the default state. (as quoted from info zsh bindkey.
You an also always restart zsh:
exec zsh
To know what is bound by default to a given key or sequence, you can do:
(bindkey -d; bindkey '^A')
(replace ^A with the representation of the character or character sequence that is sent upon pressing the key. ^A itself is the representation of the SOH control character (0x1 byte value) that is generally sent by terminals when you press Ctrl + A).
|
[ Academia ] [ Litigation ] [ Regulatory & Policy ] [ Transactional ] as a Relevant Course outside SLS for those interested in Lifesciences: Innovations : Health care and biotech lawyers should be aware of the many ways their clients use and develop technology, whether in their system infrastructure or in the delivery of health care products and services. Students should select a course like this one that considers clinical and business models for adopting new technology, including the regulatory framework and criteria for reimbursements of their costs.
General course
Description:
This course examines health care businesses and how they use technology (primarily biotechnology, medical technology and information technology) to improve patient outcomes and manage costs. New technologies are commercialized by innovator companies (biotech and pharmaceutical companies, device manufacturers, diagnostics developers, and health IT companies). They are adopted by providers (hospitals, physicians) in patient care and paid for by third-party payers (commercial and government). We will use case studies to examine the following:
For the innovators,
a) financing and managing new product development
b) clinical trial management and gaining regulatory approval,
c) marketing, communication and sales strategies (both physician and patient communication and sales) to drive product adoption and gain third party reimbursement.
d) Business models to drive innovation.
For the providers,
a) The clinical and business case for adopting a new technology
b) The organizational changes new technology may necessitate especially when it generates new patient safety risks.
For the payers,
a) the process and criteria they use to make reimbursement and coverage decisions and how these criteria affect innovators,
b) selective provider network design to manage the added costs of these new technologies,
and c) new it-intensive business models.
Through these case studies, the students will not only gain an in depth understanding of how new technologies get developed and commercialized in health care but how the whole health care value chain adapts to these new technologies. Interviews, panel discussions, and guest lecturers from prominent industry leaders will supplement the case discussions. Speakers and panelsts in previous years included senior executives from Genentech, Gilead, Onyx Pharmaceuticals, Medtronic, Jazz Pharmaceuticals, United Health, DaVita, and Genomic Health; venture investors from Essex Woodland Health Ventures and Prospect Ventures; and heads of the health care/biotech practices at McKinsey and Goldman Sachs.
Course Style: A Substantive course teaches the law, theory, and policy in a particular area of law |
Ray Trew became Notts County chairman in 2010
Ray Trew has stepped down as chairman of Notts County and has announced that the League Two club is for sale.
Trew became owner and chairman in 2010 but said he made the decision after his family were subjected to "foul and mindless abuse" in recent days.
Notts, who appointed Jamie Fullarton as manager in January, are 16th in League Two having been relegated last season.
BBC Radio Nottingham reports local businessman Alan Hardy is in talks to buy the club.
"It is with very mixed emotions that I announce the end of my tenure," Trew wrote in an open letter to fans. external-link
"This is not me backing away from a challenge, I do not do that and, indeed, if I'd have wanted to I would have done so some time ago because it has been a difficult journey at times.
"However, when my family are subjected to the kind of foul, mindless abuse that they have been in recent days, both in person and courtesy of the oh so brave keyboard warriors, regardless of whether this is just the minority ruining it for the larger supporter base, I have to make changes."
The Notts side that won the League Two title in Trew's first season as owner in 2009-10 had Kasper Schmeichel in goal and was managed by Steve Cotterill
Trew paid £1 to buy the Magpies from then chairman Peter Trembling six years ago and took on debts of more than £1.5m, which were built up during Munto Finance's brief period as owners.
Despite initial success, with the club winning the League Two title at the end of Trew's first season, Notts have had nine full-time managers during his time.
Trembling bought Notts from Munto Finance for a nominal fee, only five months after the Middle Eastern consortium took over at Meadow Lane.
Analysis
Mark Stallard - BBC Radio Nottingham summariser and former Notts County striker
"Given the events of the weekend and the apparent confrontation Aileen Trew had with a group of fans - and the feeling around the place - it's not an absolute shock.
"I know what can go on online. And if the Trews feel it has been serious enough, and face-to-face abuse as well, that that they have to step away from it then that is most unfortunate. You don't want anyone to come under such fire and vitriol.
"Initially it will undermine the club and make it unstable because it is a period of uncertainty. Hopefully there will be buyers lined up.
"Ray Trew leaves the club with the infrastructure in better shape than when he took over; you have to be thankful for what has has done.
"Notts are a great club in a great city and are a great prospect for somebody to get hold of and progress them on and off the pitch." |
) = -5*w**2 + 8*w + 5. Let i(j) = 2*j**2 - 3 + 3*j**2 - 5*j - 2*j**2. Suppose 84*h = 103*h - 95. Give h*b(c) + 8*i(c).
-c**2 + 1
Let c(u) = -u + 1. Let o(g) = -4*g**3 + g**2 - g - 3. Let a be o(-1). Let h be (-3 - (2 - a)) + 1 + 0. Let n(y) = 2*y**2 - 8*y + 4. Give h*n(p) + 6*c(p).
-2*p**2 + 2*p + 2
Let x(w) = -26*w**2 - 4*w + 503. Let q(h) = -6*h**2 - h. Give 8*q(k) - 2*x(k).
4*k**2 - 1006
Let i(l) = l. Let m(v) = -36*v**2 - v - 1. Determine i(j) - m(j).
36*j**2 + 2*j + 1
Let l(r) = 2*r**2 + 2. Let k(s) = -3145*s**3 - 170*s**2 - 170. Determine -k(q) - 85*l(q).
3145*q**3
Let j(k) = 2*k**2 - k. Let d(c) = 2*c**2 - c. Suppose 128 = -2*o + 50. Let p = 42 + o. Calculate p*d(f) - 4*j(f).
-2*f**2 + f
Let r(c) = -c. Let p = -316 - -319. Let l(f) = -p + 0 + 5 + f - 7*f - 1. Determine -l(w) + 4*r(w).
2*w - 1
Let h(t) = -2*t + 2. Let l(b) = -29 + b - 36 + 151 - 44 - 43. Determine -3*h(q) - 4*l(q).
2*q - 2
Let p(k) = k. Let c(h) = -7*h + 6. Suppose 0 = -g + 3, 3*g = -2*w - 32 + 171. Suppose 0 = 16*q + 15 + w. Give q*p(y) - c(y).
2*y - 6
Let m(v) = 5*v**2 + 2*v - 2. Let q(y) = -3*y**2 - y + 1. Suppose 7 = 4*j - 5. Let o be -14 + 2 + 1 + j. Let a = -4294 - -4289. Determine a*m(g) + o*q(g).
-g**2 - 2*g + 2
Let s(z) be the first derivative of z**2/2 + 3*z + 1662. Let u(a) = -a**2 + 1. What is s(y) - u(y)?
y**2 + y + 2
Let q(h) = 6*h**2 - 2*h - 4. Suppose 23*u = 9*u + 210. Suppose -10*m + u = -25. Let a(d) = -d - 1. What is m*a(z) - q(z)?
-6*z**2 - 2*z
Suppose -13 = -7*l + 15. Suppose 2*r = 2*b - 4 - 10, -b + l*r = -10. Let y(w) = 12*w**3 + 2*w + 6. Let j(f) = -f**3 - 1. What is b*j(d) + y(d)?
6*d**3 + 2*d
Let s(m) be the first derivative of 0*m**2 + 11/3*m**3 - 132 - m. Let t(k) = 16*k**2 - 1. Determine -7*s(i) + 5*t(i).
3*i**2 + 2
Let o be 3*3 + (7 - 10). Let s(v) = 7*v**3 - 5*v**2 - v + 6. Let g(a) = -a**3 - 1. Let b = 10364 - 10363. Determine b*s(l) + o*g(l).
l**3 - 5*l**2 - l
Let l = -22059 + 22057. Let s(n) = n - 9. Let z(b) = b. Determine l*z(v) + s(v).
-v - 9
Let z(c) = c**2 - 7*c + 9. Let k be z(7). Let p(l) = -106 + k*l - 3*l + 104. Let b(r) = 10*r - 86. Let y be b(9). Let n(q) = q. Calculate y*n(u) - p(u).
-2*u + 2
Let m(a) = -22*a + 11. Let t(s) = -4*s + 2. What is 2*m(v) - 14*t(v)?
12*v - 6
Let z(c) = -10621*c**3 + 473*c**2 + 473*c - 473. Let u = -3432 + 2959. Let k(g) = 45*g**3 - 2*g**2 - 2*g + 2. Give u*k(i) - 2*z(i).
-43*i**3
Suppose 0 = -123*l + 118*l - 10. Let y(m) = 59. Let n(x) = 623. Let d(f) = 2*n(f) - 21*y(f). Let k(t) = t + 7. Calculate l*k(w) + 3*d(w).
-2*w + 7
Let i(k) = 3*k**2 - 17*k. Let m(a) = 3*a - a**2 - 4*a - 5*a + 2*a**2. Let f = -106 - -98. What is f*m(r) + 3*i(r)?
r**2 - 3*r
Let h(f) = 12*f + 1. Let a(x) be the second derivative of x**3/6 + 2*x + 1621. Determine 3*a(l) - h(l).
-9*l - 1
Suppose 0 = 5*o - 8*o. Let z be 9 + 8/16*(o - 2). Let c(y) = -2*y - 3*y + z*y. Let d(g) = -g. What is 6*c(n) + 17*d(n)?
n
Let w(b) = -4*b**3 - 3*b**2 - 3*b. Let o(a) be the second derivative of 84*a - 3/20*a**5 - 1/2*a**2 + 0 - 1/6*a**4 - 1/3*a**3. What is 3*o(t) - 2*w(t)?
-t**3 - 3
Let w(f) = -2*f**2 + 3*f + 3. Let b = -313 - -315. Suppose 4 = -b*a, -22 = -3*s + 4*a - 5. Let n(z) = z**2 - 2*z - 2. Determine s*n(t) + 2*w(t).
-t**2
Let m(t) = 20*t - 81. Let r(i) = -77*i + 322. Give 23*m(d) + 6*r(d).
-2*d + 69
Let h be 12*(-43)/(3741/29). Let r(q) = 5*q**3 + 4*q**2 + 5*q - 7 + 3 + 0*q**3. Let c(v) = v**3 + v**2 + v - 1. What is h*c(z) + r(z)?
z**3 + z
Let r(h) = 5491*h + 3. Let x(d) = -5500*d - 3. Give -4*r(z) - 5*x(z).
5536*z + 3
Let c(n) = 9 + 224*n**2 + 2 + 12 - 226*n**2 - 25. Suppose 3*y + 12 = y. Let w(s) = 3*s**2 + 3. What is y*w(m) - 10*c(m)?
2*m**2 + 2
Let j(r) = -13*r**3 + 4*r**2 - 8*r + 123. Let o(s) = -18*s**3 + 5*s**2 - 10*s + 125. Calculate 5*j(t) - 4*o(t).
7*t**3 + 115
Let k(a) = -8*a - 1257. Let p(b) = -15*b - 2516. Calculate 11*k(c) - 6*p(c).
2*c + 1269
Let h(n) = -14*n - 836. Let o(m) = 39*m + 2505. Calculate 11*h(s) + 4*o(s).
2*s + 824
Suppose 6*a = -28 + 16. Let v be a/10 - 27/(1620/(-312)). Let f(d) = 3*d**3 + 4. Let u(q) = -2*q**3 - 3. Determine v*f(b) + 6*u(b).
3*b**3 + 2
Let v(z) = -6*z**2 + 104*z - 3814. Let t(y) = 2*y**2 - 32*y + 1271. What is -13*t(r) - 4*v(r)?
-2*r**2 - 1267
Let a(r) = 2*r**3 + r + 3 + 9*r**2 - r - 4 - 5*r. Let b(h) = 5*h**2 - 2*h**2 - 2*h**2 + 4*h - 5*h. Let d = -1939 - -1944. What is d*b(w) - a(w)?
-2*w**3 - 4*w**2 + 1
Let h(c) = 78*c - 1. Suppose -6 = -k - 5*a, 20 = -2*k + 3*a + 6. Let v(r) = 79*r - 1. What is k*h(p) + 3*v(p)?
-75*p + 1
Let p(l) = -13*l + 2. Let i(j) be the second derivative of -319*j**3/3 + 99*j**2/2 + 15339*j. What is 4*i(u) - 198*p(u)?
22*u
Let k(v) = 2669*v - 28. Let j(t) = 1020448*t - 10704. Determine -7*j(q) + 2676*k(q).
-892*q
Let j(s) = s**2 - 1. Suppose 14 = 4*b - 2*o, 0 = -6*b + 10*b + o - 23. Suppose 0 = -6*y + 3 + 3. Let r(u) = -7*u**2 + 3*u + 5. Calculate b*j(k) + y*r(k).
-2*k**2 + 3*k
Let r(j) = 48*j**2 + 11*j + 876. Let z(l) = -9*l**2 - 2*l - 176. Determine 2*r(x) + 11*z(x).
-3*x**2 - 184
Let a(d) = 417*d**2 + 12*d + 58. Let x(q) = 836*q**2 + 25*q + 126. Determine -13*a(j) + 6*x(j).
-405*j**2 - 6*j + 2
Let q(n) = 4*n + 150. Let t(w) = -11*w - 147. Give 9*q(h) + 8*t(h).
-52*h + 174
Let g(m) = -6*m - 33. Let b(j) = -5*j - 32. Let l be (-6)/(-22 - 280/(-14)). Determine l*g(r) - 4*b(r).
2*r + 29
Let j(h) = -17*h**2 + 8*h - 15. Let z(u) = -8*u**2 + 4*u - 7. Let b be ((-260)/650)/((4 + -2)*(-2)/(-130)). Give b*z(q) + 6*j(q).
2*q**2 - 4*q + 1
Let a(t) = 2*t**3 + 6*t - 4. Let r = -143 - -153. Let s(c) = -1 + 10*c + 3*c**3 + r*c + 5*c - 18*c - 4. What is 5*a(z) - 4*s(z)?
-2*z**3 + 2*z
Let j = 599 - 594. Let b be (10/j*-5)/2. Let s(f) = 5*f**3 + 4*f + 3. Let t(v) = 6*v**3 + 5*v + 3. Give b*s(l) + 4*t(l).
-l**3 - 3
Let u(c) = 2*c + 23. Let v(f) be the third derivative of -f**4/12 - 4*f**3 - 641*f**2 + f - 3. What is 4*u(y) + 3*v(y)?
2*y + 20
Let v(h) = -57*h**3 - 4*h**2 - 51*h - 13. Let r(t) = 27*t**3 + 2*t**2 + 25*t + 6. What is -13*r(o) - 6*v(o)?
-9*o**3 - 2*o**2 - 19*o
Let g(k) = 6*k - 8*k - k**3 + 3*k. Let c(y) be the first derivative of 3*y**4/4 - 2*y**3/3 - y**2/2 - y + 1351. Give c(v) + g(v).
2*v**3 - 2*v**2 - 1
Let r(o) = -12*o**2 - 6*o + 7. Let b(t) = -t**3 + 23*t**2 + 13*t - 12. What is -3*b(c) - 5*r(c)?
3*c**3 - 9*c**2 - 9*c + 1
Suppose z - 5*z = 4*t - 228, -4*z + 4*t = -188. Let i(b) = 60*b + z*b - 111*b. Let m(w) = 4*w. Give -9*i(c) + 2*m(c).
-c
Let n(d) = 49*d + 150 - 42*d - 153. Let i be (-4)/10 + (-3)/5. Let k(r) = r. Calculate i*n(v) + 5*k(v).
-2*v + 3
Let h(r) = -200*r**2 - 162*r - 5. Let x(d) = 109*d**2 + 81*d + 3. Give -6*h(m) - 11*x(m).
m**2 + 81*m - 3
Let g(f) = -3*f - 26. Let m(n) = -15*n - 129. What is 11*g(u) - 2*m(u)?
-3*u - 28
Let l(i) = 7*i**2 - 5*i - 2. Let v(j) = -8*j**2 - 33*j + 22. Let g(u) = -3*u**2 - 12*u + 8. Let a(d) = -11*g(d) + 4*v(d). Determine -5*a(s) + l(s).
2*s**2 - 5*s - 2
Let f(y) = 14*y**2 - 3*y - 87. Let r(j) = 2*j**2 - j - 22. What is -2*f(i) + 9*r(i)?
-10*i**2 - 3*i - 24
Let h(v) = -v**2 - 16*v - 539. Let f(u) = -2*u**2 - 43*u - 1615. Determine -3*f(w) + 8*h(w).
-2*w**2 + w + 533
Let s(h) = 22*h**2 - 6*h + 1. Let i(y) = 16*y**2 + y + 13. Let q(u) = 15*u**2 + 2*u + 15. Let b(a) = 7*i(a) - 6*q(a). Calculate -6*b(t) + 5*s(t).
-22*t**2 - 1
Let u(b) = 8*b**2 - 2*b. Let s(y) be the second derivative of -y**4/12 - 1556*y. Calculate 5*s(k) - u(k).
-13*k**2 + 2*k
Let z(a) = 1 + 2 - 2*a + 1 - 6 - a**3. Let w(l) = -6*l**3 - 10*l - 11. Let c be 268/9 - -2*(-3)/(-27). Let t = c - 28. What is t*w(q) - 11*z(q)?
-q**3 + 2*q
Let r(i) = 2*i + 4 + i**2 + i**2 - 3*i. Let y(l) = l**2 + 2. Let k = 5346 - 5355. What is k*y(t) + 4*r(t)?
-t**2 - 4*t - 2
Let i(m) = -5*m**3 + m**2 - 3*m - 3. Let d(z) = -9*z**3 + 2*z**2 - 7*z - 5. Suppose f + 4*w - 145 = -132, -f = -5*w + 23. Calculate f*d(j) + 5*i(j).
2*j**3 - j**2 + 6*j
Let m(c) be the second derivative of 2*c**2 + 13/6*c**3 - c + 1/6*c**4 + 0. Let u(v) = v**2 + 6*v + 2. Let y be (-18 - -1) + 4004/154. What is y*u(r) - 4*m(r)?
r**2 + 2*r + 2
Let b(g) be the second derivative of 2/3*g**4 + 3 + 2/3*g**3 + 16*g + 0*g**2. Suppose 12*v + 16 = 8*v. Let l(j) = 9*j**2 + 5*j. Calculate v*l(u) + 5*b(u).
4*u**2
Let i(r) = -17*r**2 - 22*r**2 + 19*r**2 - 6*r**2 - 1 - 3*r**2. Let s(o) = -115*o**2 - 4. Determine -9*i |
Area schools ‘heighten awareness’ after Conn. tragedy
Michael Kirby/Auburn JournalStacey Hopkinson of Newcastle picks up her children, 9-year-old twins Chase and Belle, from Skyridge Elementary School on Monday. When she learned of the elementary school shooting in Connecticut on Friday, Hopkinson fought the urge to take them home immediately. “It’s just scary,” Hopkinson said. “It’s just very sad.”
What happens in a lockdown?
Kelly Loveall, administrative assistant at E.V. Cain Charter Middle School, broke down some of the key points of what goes on during its school lockdown, based on national emergency response guidelines.
Ideally, a call is made over the P.A. telling students, wherever they are, to get inside the closest classroom, and teachers lock the door until law enforcement unlocks it.
All blinds are closed, students stay low and away from windows. Staff in the office calls classrooms and asks for a “red card” or a “green card,” red indicating a problem – either a missing child or extra child inside the room.
If a child gets locked out, they are instructed to hide in a bathroom stall and stand on the toilet seat, so their feet are not visible from outside.
Notes from staff are compared to account for students in all the classrooms, including matching up missing students that had been in a different classroom.
-- Jon Schultz
When Stacey Hopkinson learned of the Newtown, Conn. elementary school shooting that killed 27 people Friday, including 20 children, she had been at her Newcastle home, her 9-year-old twins at Skyridge Elementary School in Auburn.
“I wanted to rush up there and get them and not bring them back. I wanted to home school them,” Hopkinson said Monday, able to laugh now about her initial reaction, even though at the time it was “very hard” to endure. “It was just very terrifying. It scares me because I am a worrywart anyways. I walk them in and I walk them out every day. They don’t ride buses. So it’s just scary. It’s just very sad.”
On Monday, Auburn elementary administrators worked hard to ensure students and their parents knew their schools were safe.
The Auburn Union School District went into a phase of “heightened awareness” with its campus security, ensuring all visitors check in, necessary gates are locked and increasing visibility of administrators, said Michele Schuetz, district superintendent.
“We go on break Wednesday afternoon, so until we go on break we will continue that just to be aware,” Schuetz said. “You never think there’s going to be copy cats out there, but we just want to make sure we are doing our due diligences to make sure our campuses are safe.”
During the weekend, Skyridge Principal Jennifer Lewandowski said she heard many stories from parents similar to Hopkinson’s of wanting to drop everything, go to their children’s school and sweep them into the comfort of their arms.
“Luckily, we didn’t have a lot of that,” actually happen, Lewandowski said. “Because I think that might have caused a little bit of ‘What’s going on here?’ with the kids.”
Auburn Elementary School and Skyridge both reported having a police officer present during the school day to help mitigate concerns, and administrators at all the district’s schools were asked to be more alert and monitor the halls, as well.
Auburn Elementary closed its campus Friday and it will remain that way until break begins Wednesday, forcing people to enter through a door near the office, making it easier to monitor all who come and go, Principal Sam Schug said.
That also comes with a push to be increasingly stringent on making visitors sign in, a policy that sometimes can be difficult to enforce, Schug said.
Both Schug and Lewandowski said they had reviewed their safety plans Monday with the school resource officer.
Hopkinson said she would be in favor of heightening school security, though she’s unsure of how that could be accomplished.
“You can walk in and out of this place pretty easy, and it scares me even though we do live in a really nice community,” she said of Skyridge’s campus. “I don’t know what else they could do. We can’t be afraid our whole lives for this.”
Administrators from Auburn Elementary and Skyridge decided against having staff formally discuss the shooting with students, while E.V. Cain Charter Middle School Principal Randy Ittner said during the morning P.A. announcement he told students, “Because of the tragedy that happened Friday we will be going over the lockdown procedures to make sure we’re safe in school.”
Ittner told teachers to keep the discussion “in perspective” and not go “too in depth” with what happened.
At Auburn Elementary and Skyridge, administrators instructed teachers to answer questions as best they could if students raised the issue. Lewandowski, who has a kindergartener and fifth-grader at Skyridge, said although it had been a topic of discussion among older children, the school’s youngest haven’t been asking about it.
“I had a call from a fifth-grade parent who wanted nothing to be said in school. She wanted to have that conversation at home,” said Lewandowski, adding she had given staff literature on how to talk to children of different ages on tough issues. “So I think to do something schoolwide may not be the best idea, because people know the maturity level of their students and how to explain things.”
Skyridge and E.V. Cain reported having their last lockdown drill in October. Auburn Elementary had a “shelter in place” drill on Dec. 6, Schug said.
Coincidentally, Amanda Rogers, community service officer with Placer County Sheriff’s Office, wrapped up the two-day Safety Awareness For Elementary presentation Monday at Auburn Elementary, he said. When Rogers talked to fourth graders, the Shady Hook shootings “came up a little bit,” in second grade she talked about safety, and in kindergarten it wasn’t part of the discussion, Schug said.
Hopkinson said her children heard about it on television.
“I just kind of explained what happened and said there was some evil and it was just really heartbreaking, and I didn’t have much to say to them,” she said. “They didn’t ask a lot of questions, and I don’t know why, but they just didn’t, so I just didn’t go there.”
Like many parents across the country, she held them closer Friday night.
“They slept in our bed. We had four in our bed, it wasn’t fun,” Hopkinson said. “You hold them a little tighter, and it just breaks your heart. These people lost their babies, and it’s just not right.”
Jon Schultz can be reached at jons@goldcountrymedia.com. Follow him on Twitter @Jon_AJNews |
Kobe Bryant Won’t Be Coming Back This Season
Immediately after the Los Angeles Lakers declared Kobe Bryant out for the season, he already was thinking about how to make sure the Lakers will be much less miserable when he returns.
Bryant expressed only mild frustration Wednesday after the long-expected decision to end his 18th NBA season after just six games. The superstar guard’s broken bone in his left knee has kept him out since shortly before Christmas, and it still hasn’t healed enough for weight-bearing exercise.
With just five weeks left in their injury-ravaged season, the Lakers (22-42) elected to preserve Bryant for next year, when he’ll be 36. And though Bryant has barely played, he is determined to make sure the Lakers’ failures of this season aren’t repeated in 2014-15.
The Lakers’ ruthlessly competitive scorer can’t take much more of this incompetence from his 16-time NBA champion franchise.
“I feel like killing everybody every time I go to the arena,” Bryant said. “I’m just on edge all the time. Yeah, I still feel it, probably more than anybody in the organization does. I probably feel it more, and it drives me absolutely crazy.”
Bryant clearly identified the Lakers’ top offseason priorities in his mind, and they didn’t include specific free-agent additions. The fourth-leading scorer in NBA history called on the Lakers’ front office – and owner Jim Buss in particular – to set “a clear direction” for the franchise’s return to the top after they miss the playoffs this spring for just the second time in his career.
“You’ve got to start with Jim,” Bryant said. “You’ve got to start with Jim and Jeanie (Buss), and how that relationship plays out. It starts there, and having clear direction and clear authority. And then it goes down to the coaching staff, and what’s Mike (D’Antoni) going to do, what they want to do with Mike, and then it goes from there. It’s got to start at the top.”
Phil Jackson’s apparent decision to take a front-office job with the New York Knicks also drew a negative reaction from Bryant. The Lakers flirted with re-hiring the 11-time NBA champion coach early last season before unexpectedly choosing D’Antoni, whose two injury-plagued teams have gone 62-74.
“You know how I feel about Phil,” Bryant said. “I have so much admiration for him, and respect, and have a great relationship with him. Personally, it would be hard for me to understand that happening twice. It would be tough. I don’t really get it.”
Bryant said nothing about his relationship with D’Antoni, and the coach said he hadn’t spoken to Bryant about the decision to shut him down.
But Bryant said he won’t be satisfied with another rebuilding year for the Lakers, even though his two-year, $48 million contract extension starting next season will absorb a large chunk of the team’s upcoming salary-cap space. Most of Los Angeles’ roster will be free agents in the summer, and Bryant has said he wants center Pau Gasol to return.
“How can I be satisfied with it?” Bryant asked. “We’re like 100 games under .500. I can’t be satisfied with that at all. This is not what we stand for. This is not what we play for. A lot of times, it’s hard to understand that message if you’re not a die-hard Laker fan. It’s hard to really understand where we’re coming from, what we’re used to, what we’re accustomed to, which is playing for championships. Everything else is a complete failure. That’s just how it is.”
Exactly 11 months after tearing his Achilles, Bryant remained confident he can return in something close to top form. He plans to approach his remaining rehabilitation as “a seven-month training program,” giving him ample time to rebuild strength in his left leg.
“I don’t want to say I’ll be back at the top of my game,” Bryant said. “Because everybody is going to think I’m crazy, and it’s the old-player-not-letting-go sort of thing. But that’s what it’s going to be.”
Bryant missed the first 19 games of this season after tearing his left Achilles tendon last April, returning Dec. 8. The five-time NBA champion was back in uniform for just 10 days before fracturing the top of his shinbone in Memphis.
The Lakers initially thought Bryant could return shortly after six weeks of recovery, but the bone has been slow to heal.
“With Kobe’s injury still not healed, the amount of time he’d need to rehab and be ready to play, and the amount of time remaining in the season, we’ve simply run out of time for him to return,” Lakers trainer Gary Vitti said.
Los Angeles began the day in a three-way tie for last place in the Western Conference with 29 losses in its last 38 games heading into Thursday’s trip to Oklahoma City.
Steve Nash hasn’t been formally shut down for the season, but D’Antoni indicated it’s also unlikely the two-time MVP guard will return this season. The 40-year-old Nash, who has one year left on his contract, has played in only 10 games this season while dealing with back problems and related woes.
D’Antoni said Jordan Hill and Nick Young are both unlikely to play on the Lakers’ upcoming two-game road trip, but Gasol is probable despite skipping part of practice Wednesday. |
NASHVILLE, Tenn. (WTVF) — President Donald Trump arrived in Putnam County Friday to survey some of the hardest-hit areas from this week's deadly tornadoes.
Air Force One touched down at Berry Field at Nashville International Airport around 10 a.m. President Trump then boarded Marine One, where he flew to Putnam County.
Once on the ground in Putnam County, Trump said FEMA was doing a great job and pledged to get the community the help it needs. "God be with them," Trump added.
Dozens waited outside Jefferson Avenue Church of Christ to see the @POTUS motorcade. @NC5 pic.twitter.com/2tRMFpeOcJ — Matthew Torres (@NC5_MTorres) March 6, 2020
At least four large ‘Our President Cares!’ digital boards showing @POTUS hugging the American flag could be seen as you drive into Cookeville. @realDonaldTrump will make a stop in Putnam County to survey damage caused by an EF-4 tornado today. @NC5 pic.twitter.com/v5lSmfvAVs — Matthew Torres (@NC5_MTorres) March 6, 2020
Trump has approved federal aid and disaster relief to help with the clean-up efforts. Federal aid is available in Putnam, Davidson and Wilson counties.
Putnam County is one of the hardest-hit areas. State Rep. Ryan Williams (R – Cookeville) said he didn't waste any time getting help. He's been in Nashville working with TEMA and the National Guard. Rep. Williams says there will be more help soon.
“God was not in this tornado but he has been in our response. We are excited to see that come to fruition in the next days, weeks, and months as we get back to what it is we do here in Putnam County,” Williams said. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.