text stringlengths 8 5.77M |
|---|
<iframe src=”http://player.vimeo.com/video/28422261?title=0&byline=0&portrait=0″ width=”601″ height=”338″ frameborder=”0″></iframe>
Excerpts from Episode 3 of Reconnecting With Canada: The North |
import SimpleSchema from 'simpl-schema';
import ErrorSchema from '/imports/api/properties/subSchemas/ErrorSchema.js';
/*
* Effects are reason-value attached to skills and abilities
* that modify their final value or presentation in some way
*/
let EffectSchema = new SimpleSchema({
name: {
type: String,
optional: true,
},
operation: {
type: String,
defaultValue: 'add',
allowedValues: [
'base',
'add',
'mul',
'min',
'max',
'set',
'advantage',
'disadvantage',
'passiveAdd',
'fail',
'conditional',
'rollBonus',
],
},
calculation: {
type: String,
optional: true,
},
//which stats the effect is applied to
stats: {
type: Array,
defaultValue: [],
},
'stats.$': {
type: String,
},
});
const ComputedOnlyEffectSchema = new SimpleSchema({
// The computed result of the effect
result: {
type: SimpleSchema.oneOf(Number, String, Boolean),
optional: true,
},
// The errors encountered while computing the result
errors: {
type: Array,
optional: true,
},
'errors.$':{
type: ErrorSchema,
},
});
const ComputedEffectSchema = new SimpleSchema()
.extend(ComputedOnlyEffectSchema)
.extend(EffectSchema);
export { EffectSchema, ComputedEffectSchema, ComputedOnlyEffectSchema };
|
Q:
Layer 2 ARQ protocols
Some authors (i.e. Tanenbaum, Stallings) reference ARQ protocols as layer 2 mechanisms for handling errors.
Even this page from Wikipedia says that
these protocols reside in the Data Link or Transport Layers
Which ARQ techniques/protocols are used for handling errors in Ethernet?
Or, different question... which L2 protocols use "Go-back-n", "sliding window" or "stop-and-wait" as ARQ?
A:
Ethernet's link layer uses CRC32 in the Frame Check Sequence field, trailing the payload data. If FCS fails the frame is dropped. Other reasons for dropping a frame include link congestion, QoS, ACL filtering. In any case, there's no recovery and it's up to higher level protocols to cope with it (or not).
10 gigabit and faster speed PHYs may use additional forward error correction (FEC). Minor errors are corrected on the fly while larger errors get the frame dropped as well.
Most commonly, errors are handled by the almost ubiquitous TCP transport layer protocol. TCP uses a sliding send window that resends packets that have not been acknowledged within the usual round-trip time.
|
Image caption The number of Christians who said they went to church regularly was up from 31% to 33%
The number of people who call themselves Christians in England and Wales has fallen by almost 10% in five years, an official survey suggests.
The government-commissioned Citizenship Survey found 70% of the population said they were Christian in 2010, compared with 77% in 2005.
Over the same period, the number of people who said they had no religion rose from 15% to 21%.
The survey covers a sample of about 10,000 adults each year.
The interviews were conducted face-to-face and 10,307 adults were questioned this year.
'Unsustainable'
"While Christianity remained the most prevalent faith in England and Wales, between 2005 and 2010 there was a steady decrease in the proportion of people who identified themselves as Christian," the report found.
"As in previous years, Christian people were much less likely than all other main religions to say that they practised their religion, while Muslim people were most likely to practise their religion."
However, the number of Christians who said they went to church regularly was up over the same period, from 31% to 33%.
The survey's findings on race, religion and ethics are an update to the 2010 Citizenship Survey, which was published in September.
Set up in 2001, the survey asks adults questions on subjects including race equality, faith, attitudes towards violent extremism, volunteering and charitable giving, and feelings about their community.
Earlier this year, Communities Secretary Eric Pickles announced the survey would be scrapped, saying its £4m cost was "unsustainable" at a time of cuts.
Last week, Prime Minister David Cameron spoke about the importance of Christianity to Britain, saying the UK is a "Christian country" and "we should not be afraid to say so".
In a speech in Oxford on the 400th anniversary of the King James Bible, the prime minister called for a revival of traditional Christian values to counter Britain's "moral collapse". |
Q:
Palindromize this string!
Your task is to palindromize a string as follows:
Take the string.
abcde
Reverse it.
edcba
Remove the first letter.
dcba
Glue it onto the original string.
abcdedcba
But here's the catch: since this challenge is about palindromes, your code itself also has to be a palindrome.
Remember, this is code-golf, so the code with the smallest number of bytes wins.
A:
05AB1E, 1 byte
û
Try it online!
A:
Python 3, 41 bytes
lambda t:t+t[-2::-1]#]1-::2-[t+t:t adbmal
Try it here.
A:
Dip, 1 byte
B
Body must be at least 30 characters; you entered 13.
|
1. Field of the Invention
The present invention pertains to a device and method for providing non-invasive intraoral electromuscular stimulation to a patient to treat a breathing disorder, such as obstructive sleep apnea, and, in particular, to a device and method wherein electromuscular stimulation is provided to the patient at a time prior to the onset of inspiration and continues through a major portion of the inspiratory phase and is applied at a level sufficient to induce muscle contraction without pain and/or is provided bilaterally at sublingual locations posterior to the frenulum in an anterior-to-posterior and/or posterior-to-anterior direction.
2. Description of the Related Art
Obstructive sleep apnea (OSA) is a medical condition in which the upper airway is repeatedly occluded during sleep despite continued respiratory effort. Those afflicted with OSA experience sleep fragmentation and complete or nearly complete cessation of ventilation intermittently during sleep with potentially severe degrees of oxyhemoglobin desaturation. An OSA sufferer typically experiences many apnea and/or hyponea events throughout the night. During an apnea event, the resulting hypoxia typically progresses until arousal occurs, which reestablishes airway patency.
Symptoms of OSA include snoring, choking and/or gasping during sleep, fragmented sleep, daytime sleepiness, fatigue and poor concentration. Airway obstruction can lead to a reduction in tidal volume, oxygen desaturation and progressive increases in respiratory rate. The long-term effects of OSA may be translated clinically into extreme daytime sleepiness, cardiac arrhythmias, pulmonary-artery hypertension, congestive heart failure and/or cognitive dysfunction. Other consequences of OSA include right ventricular dysfunction, carbon dioxide retention during wakefulness, as well as during sleep, and continuous reduced arterial oxygen tension. Hypersomnolent sleep apnea patients may be at risk for excessive mortality from these factors as well as by an elevated risk for accidents while driving and/or operating potentially dangerous equipment.
Studies of the mechanism of collapse of the airway suggest that during some stages of sleep, there is a general relaxation of the muscles that stabilize the upper airway segment. This general relaxation of the muscles is believed to be a factor contributing to OSA. More specifically, it is generally understood that the patency of the airway depends on the activity of the pharyngeal dilator muscles. Common sites of obstruction are behind the tongue and at the level of the soft palate. In a normal state, the muscles of the tongue, the genioglossus, hyoglossus, styloglossus, palatoglossus and the superior, inferior, transverse and vertical linguals, act to protrude or retract the tongue. Posterior fibers of the genioglossus draw the base of the tongue forward and anteriorly. One or more of these muscles normally contract reflexively during inspiration. However, it is generally understood that OSA suffers experience a reduction of lingual muscle activity during sleep as compared to nonapneics, thereby causing a reduction in airway patency.
Several therapeutic remedies exist for treating OSA. The most invasive, yet most likely to be successful, is a tracheotomy, which creates an airway bypass around the site of obstruction. Other surgical remedies include removal of deformed, loose or swollen structures or tissues in the upper airway. It is also known to apply positive air pressure at the mouth and/or nose of the patient to “splint” the airway, thereby maintaining an open passage to the lungs. In addition, pharmacological solutions have also been pursued.
None of these therapies is successful in all cases. Surgical relief is invasive, introduces a potential for surgical complications and is appropriate in only a small percentage of cases. On the other hand, the nasal or nasal/oral mask needed to apply a positive air pressure is not tolerated by some OSA patients. Pharmacological therapies have been, in general, less than satisfactory, and side effects are frequent.
It is also been proposed to treat OSA by electrically stimulating the musculature of the upper airway to prevent its relaxation and/or induce contraction, thereby preventing or minimizing subsequent blockage of the airway. There are two methods in which electromuscular stimulation can be applied to a patient; invasively or non-invasively. Invasive electrical stimulation of a muscle involves implanting one or more electrodes, either permanently or temporarily within the patient. These subcutaneous electrodes are typically located on or near the nerves that control the muscle to be stimulated. In some applications, the electrodes are placed in direct contact with the target muscle. Subcutaneous electrodes positioned adjacent the muscle or on or near the nerve controlling the muscle to be stimulated have the benefit of focusing the electrical energy on the muscle/nerve to be stimulated.
However, electrical muscle stimulation utilizing implanted electrodes requires surgical intervention, the permanent presence of foreign materials within the patient's tissue, and, in some applications, at least one electrical connection protruding from the patient. Consequently, there is a potential for infection or irritation at the surgical site and at the site where the electrode or electrical connection protrudes through the surface of the patient. In addition, it is reasonable to expect that some patients may be apprehensive about having a foreign object surgically placed within their body.
Non-invasive electrical stimulation of the muscles in the upper airway involves placing an electrode in direct contact with a surface of the patient and passing a current through the surface tissues adjacent the electrode. For example, U.S. Pat. No. 5,123,425 to Shannon et al. teaches applying an electrical stimulation to the exterior surface of the patient's neck below the chin to induce contraction of the upper airway muscles. In addition, U.S. Pat. No. 5,792,067 to Karell teaches an intraoral device that applies electrical stimulation to the hard palate, soft palate or pharyngeal area to induce contraction of the upper airway muscles. U.S. Pat. No. 5,190,053 to Meer teaches an intraoral device that applies electrical stimulation to the genioglossus muscle via electrodes located on the mucosa on the floor of the mouth on either side of the frenulum, which is the connecting membrane under the tongue that attaches the anterior portion of the tongue to the floor of the mouth.
While each of these non-invasive stimulation techniques claim to achieve some degree of success in opening the airway, it not clear that they are successful in a sufficient number of patients to render any one of these techniques a viable replacement to the other conventional treatments discussed above.
In addition to using either invasive or non-invasive stimulation on a patient, conventional electromuscular stimulation treatments typically initiate stimulation in one of two alternative timing methods. In a first timing method, stimulation is applied only when needed to counteract a detected breathing disorder, for example, at the onset of an apnea or when snoring is detected. This technique has the advantages of, for example, conserving energy and minimizing muscle fatigue. However, it is not clear that this stimulation timing method is sufficiently successful in breaking an apnea or stopping snoring in a significant number of OSA sufferers to be suitable for widescale and/or practical use.
According to a second timing method, stimulation is provided independent of the occurrence of a breathing disorder, such as an apnea, snore or other symptoms of respiratory distress. In this second method, stimulation is typically provided during each inhalation phase of a patient's breathing cycle and typically is initiated at the onset of inspiration. For example, U.S. Pat. Nos. 5,540,732 and 5,522,862 both to Testerman teach an invasive electrical stimulation system in which stimulation is applied to the patient in response to sensed inspiration. In an alternative method, such as that taught by U.S. Pat. No. 5,158,080 to Kallok, stimulation is provided at all times during the patient's breathing cycle, i.e., during the entire inspiratory phase and the entire expiratory phase. Although some success has been claimed when stimulation is provided independent of the occurrence of a breathing disorder, it not clear that the degree of success of either technique is sufficient to warrant the use such a timing technique on a widescale basis.
Other investigators, such as R. P. Schnall et al., as indicated, for example, in an article entitled “Dilatory Effects of Upper Airway Muscle Contraction Induced by Electrical Stimulation in Awake Humans,” published in Volume 75 of the Journal of Applied Physiology in 1995, pages 1950-65, have experimented with various stimulation techniques, including the timing at which stimulation is initiated and the corresponding placement of the electrodes within the patient. However, as concluded in this article, the stimulation techniques attempted by Mr. Schnall et al. were unsuccessful in decreasing the number of breathing disorder events occurring in the test patients. |
>> "CAPITOL REPORT" IS A
PRODUCTION OF SENATE MEDIA
SERVICES.
>> THIS WEEK, THE SECRETARY OF
STATE OUTLINES WHAT VOTERS
NEED TO KNOW FOR THE NOVEMBER
ELECTION.
AND A KEY LAWMAKER HAS THE
LATEST ON CHRONIC WASTING
DISEASE IN THE DEER
POPULATION.
PLUS, HOW THE UNIVERSITY OF
MINNESOTA PLANS TO MANAGE
COVID-19 IN RESIDENCE HALLS.
STAY TUNED FOR THIS WEEK'S
"CAPITOL REPORT."
♪
>> WELCOME TO THIS WEEK'S
PROGRAM.
I'M SHANNON LOEHRKE.
ELECTION SEASON IS UPON US,
AND VOTERS MAY BE WONDERING
WHAT OPTIONS ARE AVAILABLE TO
VOTE THIS NOVEMBER.
THERE IS NO BETTER PERSON TO
ANSWER THESE QUESTIONS THAN
THE SECRETARY OF STATE, STEVE
SIMON.
I SPOKE WITH HIM THIS WEEK.
IN THIS TIME OF UNPRECEDENTED
EVENTS, THIS COMING FALL
ELECTION HAS SOME
UNPRECEDENTED CHALLENGES.
FOR EXAMPLE, THERE'S THE
POTENTIAL DISRUPTIONS WITH THE
POSTAL SERVICE, THERE'S A
GLOBAL PANDEMIC, AND THERE'S
POSSIBLE FOREIGN INTERFERENCE.
ARE YOU WORRIED?
>> WELL, IT'S MY JOB TO BE
WORRIED.
IT'S MY JOB TO GAME THESE
THINGS OUT AND THINK ABOUT THE
WORST POSSIBLE SCENARIO.
THAT'S WHAT WE DO, NOT JUST IN
OUR OFFICE, WHAT OUR PARTNERS
AT THE COUNTIES AND CITIES DO.
SO WE'RE IN CONSTANT CONTACT
WITH ONE ANOTHER AS TEAMMATES.
I'M ON MULTIPLE CALLS A WEEK,
LARGE ZOOM CALLS, WITH COUNTY
ADMINISTRATORS AND CITY CLERKS
AND OTHERS THINKING THROUGH
THOSE THINGS.
SO, AM I WORRIED?
YEAH, IT'S MY JOB TO BE
WORRIED.
I WOULD SAY THAT HAVING AN
ELECTION, A STATEWIDE
ELECTION, IN A TIME OF A
PANDEMIC IS A BIG, BIG
CHALLENGE.
AND I THINK MOST PEOPLE WHO
ARE IN THIS WORK AT THE COUNTY
OR CITY LEVEL, TOO, WE AGREE
THAT WE HAVE TO VIEW THIS
THROUGH A PUBLIC HEALTH LENS,
AT LEAST TO SOME EXTENT, AND
THAT'S WHAT WE'RE DOING.
AND PART OF IT COMES DOWN TO A
MATH PROBLEM, REALLY, TO BE
HONEST.
AND THE MATH IS THIS.
WE'VE GOT ABOUT 3,000 POLLING
PLACES IN MINNESOTA.
AND WE'RE EXPECTING ABOUT 3
MILLION VOTERS IN MINNESOTA.
THAT MAY BE A CAUTIOUS OR
CONSERVATIVE NUMBER.
THAT MATH ORKS OUT QUITE
EASILY TO 1,000 PEOPLE PER
POLLING PLACE.
ON AVERAGE, VERY ROUGH
AVERAGE, SOME PLACES LOWER,
SOME PLACES HIGHER.
BUT A WORKING AVERAGE IS 1,000
PEOPLE PER POLLING PLACE.
AND FROM A PUBLIC HEALTH
STANDPOINT, WE WANT TO TRY TO
GET THAT NUMBER DOWN.
THAT WOULD BE A GOOD THING.
BECAUSE YOU'RE TALKING ABOUT
1,000 PEOPLE AND THEIR
DROPLETS CIRCULATING IN CLOSE
QUARTER, TIGHT QUARTERS, OVER
A 13-HOUR PERIOD, 7:00 A.M. TO
8:00 P.M., THOSE ARE THE POLL
HOURS IN MINNESOTA.
I VOTE AT A CHURCH FEW
BLOCKS FROM WHERE I'M TALKING
TO YOU, IT'S IN A BASEMENT OF
A CHURCH, THERE IS NOT A WHOLE
LOT OF ROOM DOWN THERE TO
EXPAND OR GROW OR GO TO OTHER
PLACES.
SO WE'RE TRYING TO GET THAT
NUMBER DOWN.
BALANCING WITH THAT EVERYONE'S
RIGHT TO VOTE IN THE POLLING
PLACE, OF COURSE.
WE ARE URGING PEOPLE TO
STRONGLY CONSIDER VOTING FROM
HOME.
IT TAKES FIVE MINUTES,
MAXIMUM, AT A WEBSITE,
MNVOTES.ORG, AND WHEN YOU GO
TO MNVOTES.ORG, YOU TYPE IN
YOUR INFORMATION, T COMES
RIGHT TO YOU.
SO THAT'S THE PRIMARY FOCUS
RIGHT IN FRONT OF US, IS
TREATING THIS AS A PUBLIC
HEALTH EVENT, WHICH IT IS.
YOU MENTIONED A LOT OF THINGS
IN THAT QUESTION, I'M SURE
WE'LL GET TO THEM.
>> YES.
BECAUSE MY NEXT QUESTION,
THEN, YOU'RE ENCOURAGING
ABSENTEE BALLOTS, YOU KNOW,
PEOPLE REQUEST ABSENTEE
BALLOT, CAST IT.
THEN, THEREFORE, THEY DON'T
HAVE TO GO TO THE POLLING
PLACE.
BUT WHAT IMPACT ARE THESE
POTENTIAL PROBLEMS WITH THE
POSTAL SERVICE GOING TO HAVE
ON THE ABILITY TO CAST THAT
ABSENTEE BALLOT?
>> WELL, SO, M I CONCERNED
AND EVEN OUTRAGED BY THE
REPORTS ABOUT DELAYS AT THE
POSTAL SERVICE, THINGS WHICH
WERE AVOIDABLE, THINGS WHICH
WERE CONSCIOUS DECISIONS WHICH
RESULTED IN DELAYS?
OF COURSE I AM.
BUT DOES THAT STOP ME HAD ANY
WAY FROM -- ME IN ANY WAY FROM
URGING PEOPLE TO VOTE FROM
HOME THIS YEAR IF THAT'S AN
OPTION THAT THEY'RE
COMFORTABLE WITH?
NO, IT DOES NOT STOP ME.
IT'S FULL STEAM AHEAD.
HERE'S WHY.
WE HAVE MULTIPLE WORKAROUNDS
TO ACCOMMODATE EVEN DELAYS.
STARTING WITH A MESSAGE I'LL
GIVE NOW, WHICH IS, FOLKS
SHOULD GO TO MNVOTES.ORG, EVEN
IF THEY THINK THEY MIGHT VOTE
FROM HOME, I SAY THAT BECAUSE
THAT DECISION IS REVERSIBLE.
YOU CAN CHANGE YOUR MIND.
SO WHATEVER YOU DO, DON'T WAIT
UNTIL LATE OCTOBER.
BECAUSE IF YOU DO THAT, YOU'RE
GOING TO SLAM PEOPLE RIGHT
WHEN THEY SHOULDN'T GET
SLAMMED.
THAT'S WHEN ELECTIONS
ADMINISTRATORS IN COUNTIES AND
CITIES ARE AT THEIR ABSOLUTE
WIT'S END, AT THEIR ABSOLUTE
BUSIEST N. OTHER STATES IN THE
PRIMARY PROCESS, WHERE THEY
SAW CHAOS, PART OF IT COULD BE
TRACED TO THAT, PEOPLE GOING
TO THE LAST MINUTE, GO TO
MNVOTES.ORG NOW.
NUMBER TWO, WORKAROUND OF
POSTAL DELAYS, ONCE YOU KNOW
YOUR CHOICES, GET YOUR BALLOT
IN.
IT'S EVERYONE'S RIGHT TO WAIT
UNTIL ELECTION DAY, TO GET THE
MORE SELL OF INFORMATION FROM
THE DAY BEFORE, THE LAST AD,
THE LAST DEBATE, IF YOU'RE A
PERSON WHO KNOWS WHO THEY'RE
GOING TO VOTE FOR TWO WEEKS
OUT, THREE WEEKS OUT, NOTHING
IS GOING TO CHANGE YOUR MIND,
GET THE BALLOT IN.
THIRD, THIS IS CRITICAL AND
CRUCIAL, THIS YEAR AND THIS
YEAR ONLY, VERY ON BRAND FOR
2020, THIS YEAR AND THIS YEAR
ONLY, BECAUSE OF SOME
LITIGATION THAT RESULTED IN A
STANDING COURT ORDER, WHICH NO
ONE IS APPEALING, ALL THE
PARTIES, EVERYONE, IS AGREEING
WITH THIS, OKAY, IT'S NO
LONGER THE SUBJECT OF EBATE,
WE HAVE A NEW RULE FOR GETTING
YOUR BALLOT IN.
THE RULE ONLY FOR THIS YEAR IS
IT CAN BE POSTMARKED AS LATE
AS ELECTION DAY, NOVEMBER
3rd, AS LONG AS IT GETS IN
A WEEK LATER BY NOVEMBER
10th.
WHAT THAT MEANS, IN TERMS OF
YOUR QUESTION ABOUT THE MAIL,
IS THERE'S AN AUTOMATIC
ONE-WEEK UFFER PERIOD BUILT
IN, NO MATTER HOW LATE YOU GO,
EVEN IF YOU'RE A
PROCRASTINATOR OR YOU DO IT AT
THE LAST POSSIBLE SECOND, YOU
CAN HAVE NO FEWER THAN SEVEN
DAYS OF A BUFFER BETWEEN
GETTING THAT BALLOT FROM POINT
A TO POINT B.
THAT IS A HUGE, HUGE
WORKAROUND ANY POTENTIAL
POSTAL DELAYS.
NEXT, I WOULD SAY, JUST KEEP
IN MIND THAT BECAUSE YOU
GET -- JUST BECAUSE YOU GET
THE BALLOT BY MAIL DOESN'T
MEAN YOU HAVE TO RETURN IT
THAT WAY.
YOU ARE FREE TO HAND DELIVER
THE BALLOT TO THE ADDRESS
THAT'S ON THE ENVELOPE OR YOU
CAN HAVE SOMEONE YOU KNOW AND
TRUST DELIVER IT FOR YOU.
SO THERE ARE MULTIPLE
WORKAROUNDS.
AND THEN ANOTHER ONE, I
FORGOT, WHICH IS WE HAVE A
FEATURE ON OUR WEBSITE,
MNVOTES.ORG, WHERE YOU CAN
TRACK YOUR BALLOT.
YOU DON'T HAVE TO JUST PUT IT
IN THE MAIL AND SAY A LITTLE
PRAYER AND HOPE SOMEHOW THAT
IT GETS THERE.
YOU CAN KNOW WITH CERTAINTY
WHETHER IT HAS.
GO TO MNVOTES.ORG, YOU TYPE IN
THE INFORMATION, I DID THIS
MYSELF FOR THE PRIMARY, AND IT
WILL TELL YOU THE EXACT DATE
THAT IT HAS ARRIVED AND IT
WILL TELL YOU IN BLACK AND
WHITE THAT IT IS BEING
PROCESSED OR IT HAS BEEN
PROCESSED.
SO THOSE ARE SOME OF THE
WORKAROUNDS WE HAVE.
YES, IT IS UNFORTUNATE THAT
THERE ARE POSTAL DELAYS?
OF COURSE IT IS.
ARE SOME OF THE REPORTS
OUTRAGEOUS?
SURE.
BUT IS THAT GOING TO SLOW DOWN
DEMOCRACY IN MINNESOTA?
NO, IT'S NO.
THIS IS A YEAR, DURING A
PANDEMIC, WHEN IT'S A -- ONE
THAT'S A SAFE AND EFFECTIVE
OPTION AND NE THAT'S IN MANY
WAYS A PUBLIC SERVICE MEANING
THAT EVERYONE WHO VOTES FROM
HOME IS MAKING THE POLLING
PLACE JUST A LITTLE BIT SAFER
FOR THOSE WHO CHOOSE THAT
OPTION, IN THIS EAR OF ALL
YEAR, IT'S FULL STEAM AHEAD,
PEOPLE SHOULD STRONGLY
CONSIDER USING THE MAIL AND
VOTING FROM HOME.
>> NOW YOU MENTIONED THAT YOU
CAN TRACK YOUR BALLOT ONCE YOU
SEND IT BACK IN.
LET'S SAY YOU'VE SENT IT BACK
IN, YOU'RE TRACKING IT, IT'S
NOT SHOWING UP, IT'S NOT
SHOWING UP, IT'S NOT SHOWING
UP.
WHAT DO YOU DO THEN?
>> YEAH.
AND IT HAPPENS, YOU KNOW, IT'S
JUST BOUND TO HAPPEN
SOMETIMES.
THERE ARE TWO OPTIONS.
WELL, I GUESS THREE OPTIONS,
DEPENDING ON WHEN IN THE
CALENDAR OR HOW SOON BEFORE
ELECTION DAY.
ONE IS JUST TO ORDER ANOTHER
ONE.
HAVE IT COME TO YOU.
AND THAT IS DONE FROM TIME TO
TIME.
IF THERE ISN'T ENOUGH TIME, IF
WE'RE TALKING LIKE THREE DAYS
BEFORE THE ELECTION, FOUR DAYS
BEFORE THE ELECTION, THEN
THERE ARE STILL TWO REMAINING
OPTIONS.
ONE IS IN-PERSON ABSENTEE,
THERE ARE TWO WAYS TO VOTE
ABSENTEE, ONE IS TO GO TO
MNVOTES.ORG, ORDER THE BALLOT
TO COME TO YOU AT HOME.
THE OTHER IS TO DROP BY EITHER
YOUR CITY HALL OR A COUNTY
OFFICE, AND IF YOU DON'T KNOW
WHERE THAT LACE IS, GO TO
THAT SAME WEBSITE AND THEY'LL
TELL YOU.
SO YOU CAN VOTE IN PERSON
ABSENTEE ON ANY DAY UP TO THE
DAY BEFORE THE ELECTION.
MONDAY BEFORE THE TUESDAY.
AND THEN, FINALLY, MAYBE
OBVIOUSLY, EVEN THOUGH THAT
MIGHT NOT HAVE BEEN YOUR FIRST
CHOICE, YOU STILL ALWAYS HAVE
THE OPTION OF GOING IN AND
VOTING ON ELECTION DAY.
SO JUST BECAUSE YOU'VE ORDERED
AN ABSENTEE BALLOT DOESN'T
MEAN YOU'RE LOCKED IN TO THAT
CHOICE.
>> I'M GLAD YOU SAID THAT
BECAUSE THAT ACTUALLY WAS ONE
OF MY QUESTIONS.
YOU KNOW, IF YOU ORDER AN
ABSENTEE UT YOU ARE LIKE ME
AND YOU REALLY WANT TO GO TO
THE POLLING PLACE IF YOU CAN
BECAUSE IT'S PART OF THE WHOLE
EXPERIENCE, DO YOU HAVE THAT
OPTION?
AND THE ANSWER IS YES, YOU DO
HAVE THAT OPTION.
>> ABSOLUTELY, YOU DO.
SO YOU CAN CHANGE YOUR MIND.
OR MAYBE YOUR HAND WAS FORCED
BECAUSE OF THE SCENARIO YOU
JUST LAID OUT.
YOU WANTED TO VOTE FROM HOME,
YOU MAILED IT IN, AND YOU'RE
PUSHING REFRESH CONSTANTLY TO
SEE IF IT'S GOTTEN IN AND IT
HASN'T, YOU FIGURE, WELL, I
GOT TO GO IN AND DO IT MYSELF.
>> ONE MORE QUESTION --
ACTUALLY, TWO MORE QUESTIONS
BEFORE YOU GO.
IS FOREIGN ELECTION INFERENCE
IMPACTING THIS ELECTION?
IT'S NOT SOMETHING WE'VE
TALKED ABOUT AS MUCH AS MAYBE
IN PRIOR ELECTIONS, BUT IS IT
STILL HAPPENING?
>> SO, IT'S STILL A CRUCIALLY
AND CRITICALLY IMPORTANT
ISSUE.
OBVIOUSLY COVID-19 HAS KIND OF
BLOTD OUT THE SUN WHEN IT
COMES TO COVERAGE AND CRUTINY
AND ATTENTION.
BUT THIS IS ABSOLUTELY STILL
AN ISSUE.
I AND A FEW MEMBERS OF MY
STAFF GOT A CONFIDENTIAL
INTELLIGENCE BRIEFING, ON
EXACTLY THIS SUBJECT AT THE
FBI HEADQUARTERS, WE'RE GOING
TO GET AT LEAST ONE MORE
BEFORE THE GENERAL ELECTION.
WE ARE RIGHT NOW UNDERGOING
OUR LATEST ROUND OF
PENETRATION TESTING THAT THE
DEPARTMENT OF HOMELAND
SECURITY WHERE THEY BOTH COME
INTO OUR OFFICE AND REMOTELY
BASICALLY TEST OUR SYSTEMS.
IN ESSENCE, TRY TO HACK US.
TO FIND OUT WHERE THE SOFT
SPOTS ARE.
SO WE'VE BEEN GETTING THOSE
BRIEFINGS.
WE'VE BEEN ACTING ON THEIR
RECOMMENDATIONS IN TERMS OF
WHAT WE NEED TO DO TO HARDEN
OUR SYSTEMS.
SO WE'RE VERY MUCH PAYING
ATTENTION TO THAT.
BUT WE FEEL CAUTIOUSLY
OPTIMISTIC ABOUT WHERE WE ARE,
NOT ONLY IN MINNESOTA BUT AS A
COUNTRY.
>> AND THEN, FINALLY, BECAUSE
PEOPLE WILL HAVE UP TO A WEEK
AFTER ELECTION DAY FOR THEIR
BALLOT TO BE COUNTED AND ALSO
BECAUSE YOU ARE STRONGLY
ENCOURAGING PEOPLE O TAKE
ADVANTAGE OF THAT ABSENTEE
BALLOT, HOW LONG WILL IT BE
BEFORE WE POTENTIALLY KNOW
SOME OF THE OUTCOMES OF SOME
OF THESE ELECTIONS?
>> I'M GLAD YOU USED THE WORD
YOU JUST DID.
YOU USED THE WORD "OUTCOMES."
AND YOU'RE ONE OF THE FIRST
PEOPLE TO DO THAT AND GOOD FOR
YOU BECAUSE I WANT TO
DISTINGUISH BETWEEN RESULTS
AND OUTCOMES.
SO, IN EVERY STATE IN AMERICA
THIS YEAR ELECTION NIGHT IS
GOING TO LOOK A LITTLE
DIFFERENT THAN WHAT WE'RE USED
TO.
AND I JUST WANT TO MAKE SURE
EVERYONE UNDERSTANDS THAT
GOING IN.
SO WHEN YOU SEE, NOT IF, WHEN
YOU SEE ON ELECTION NIGHT THAT
YOU DON'T HAVE 100% OF THE
RESULTS, DON'T BLAME YOUR
COUNTY OR YOUR CITY.
DON'T ASSUME THAT SOMEONE FELL
ASLEEP AT THE SWITCH OR FELL
DOWN ON THE JOB.
NO.
THIS IS LITERALLY BY DESIGN.
BY DESIGN OF THE MINNESOTA
LEGISLATURE THIS YEAR, GIVING
MORE TIME TO COUNT BALLOTS AND
BY DESIGN OF THE COURTS IN
WHAT IS NOW AN AGREED-TO,
NONAPPEALABLE COURT ORDER THAT
I MENTIONED EARLIER, WHICH IS
THAT WE NOW HAVE ELECTION DAY
PLUS SEVEN DAYS TO GET THE
BALLOTS IN.
SO THAT MEANS BY DEFINITION,
WE WON'T KNOW THE FINAL
RESULTS UNTIL SEVEN DAYS AFTER
THE ELECTION DATE.
BUT YOU USED A KEY WORD, WHICH
IS OUTCOMES.
I PREDICT, FOR WHAT IT'S
WORTH, THAT WE WILL KNOW THE
VAST MAJORITY OF OUTCOMES WELL
BEFORE THAT.
WE MIGHT NOT KNOW FINAL VOTE
TALLIES BUT OUTCOMES.
SO WE ARE WORKING HARD IN OUR
OFFICE TO GET AS DETAILED
INFORMATION AS WE CAN FOR
ABSENTEE BALLOTS.
LET ME GIVE YOU A
HYPOTHETICAL.
LET'S SAY IN ELECTION NIGHT,
LEGISLATIVE CONTEST, CANDIDATE
A IS AHEAD OF CANDIDATE B BY
1,000 VOTES AND WE'RE ABLE TO
ANNOUNCE EITHER ON ELECTION
NIGHT OR SHORTLY THEREAFTER,
THAT THERE ARE IN THAT RACE
700 ABSENTEE BALLOTS LEFT TO
COUNT.
OUTSTANDING ABSENTEE BALLOTS.
WELL, YOU CAN CALL THAT RACE,
RIGHT?
CANDIDATE A HAS WON, SHE'S
AHEAD BY 1,000 VOTES, THERE
ARE ONLY 700 VOTES LEFT TO
COUNT.
EVEN IF THEY ALL GO FOR HER
OPPONENT, MATHEMATICALLY, SHE
HAS STILL WON.
SO WILL WE KNOW THE RESULT OF
THAT ELECTION?
NO, WE WON'T KNOW BY HOW MUCH
SHE'S WON.
WAS IT A LOT, WAS IT A LITTLE,
WAS IF TWO POINTS, WAS IT FIVE
POINTS.
BUT WE WILL KNOW THE OUTCOME.
I THINK IN A VAST MAJORITY OF
CASES, WE WILL SOONER, RATHER
THAN LATER, IF NOT ON ELECTION
NIGHT, SHORTLY THEREAFTER, I
DON'T KNOW WHAT "SHORTLY"
MEANS, BUT SHORTLY THEREAFTER
WE'LL HAVE THE VAST MAJORITY
OF OUTCOMES.
WE'LL KNOW THE WINNERS, WE
WON'T HAVE TO WAIT A WEEK, I
THINK, IN THE VAST MAJORITY OF
CASES.
>> SECRETARY OF STATE STEVE
SIMON, I WANT TO THANK YOU FOR
TAKING THE TIME.
>> IT'S MY PLEASURE.
THANK YOU.
♪
>> HOUSE AND SENATE
ENVIRONMENT COMMITTEES HELD A
VIRTUAL MEETING THIS WEEK FOR
AN UPDATE ON THE STATE'S
MANAGEMENT OF CHRONIC WASTING
DISEASE IN THE DEER
POPULATION.
>> CWD REMAINS A RARE DISEASE
IN MINNESOTA, WHICH IS STILL A
GOOD THING.
WE DO HAVE IT IN CERTAIN
AREAS, BUT WE HAVE IT AT VERY
LOW LEVELS AND WE'RE WORKING
DILIGENTLY TO TRY TO CONTINUE
TO HAVE IT BE LESS PRESENT OR
AT LEAST LESS RISK IN OTHER
PARTS OF OUR STATE.
WE HAVE AN AGGRESSIVE APPROACH
THAT'S MAINTAINED THROUGH THE
HUNTING SEASON, EVEN THOUGH
OUR SAMPLING BECAME VOLUNTARY, D
NOTHING IN OUR AGGRESSIVE
APPROACH TO MANAGING THE
DISEASE WITH THE NUMBER OF
AVAILABLE LICENSES AND TAGS.
SORRY, IN OUR HARVEST
STRATEGIES.
WE'RE GOING TO CONTINUE WITH
CULLING THIS COMING WINTER.
SO ALL OF THOSE TOOLS ARE
STILL IN PLACE AND EXTREMELY
IMPORTANT IN TRYING TO MANAGE
THIS DISEASE.
WE WILL ADAPT AS WE CAN TO
MAKE SURE THAT WE REMAIN
EFFECTIVE IN OUR WORK.
AND THAT WE CANNOT BE
SUCCESSFUL WITHOUT THE HELP OF
OUR HUNTERS AND COOPERATORS
AND BUSINESSES AND LANDOWNERS
IN THIS EFFORT BECAUSE WE ALL
HAVE TO BE IN THIS TOGETHER TO
MAKE SURE THAT WE CAN DO THE
BEST WE CAN FOR THIS RESOURCE.
♪
>> REPRESENTATIVE JAMIE
BECKER-FINN IS THE VICE CHAIR
OF THE HOUSE ENVIRONMENT AND
NATURAL RESOURCES POLICY
COMMITTEE.
I SPOKE WITH HER THIS WEEK
ABOUT HOW WELL THE STATE IS
MANAGING CHRONIC WASTING
DISEASE AS WE APPROACH DEER
HUNTING SEASON.
I WANTED TO PEAK WITH YOU FOR
A LONG TIME BECAUSE YOU ARE AN
AVID HUNTER.
AND, SO, REGARDING DEER
HUNTING AND CHRONIC WASTING
DISEASE, YOU BRING A UNIQUE
PERSPECTIVE, BOTH A PERSONAL
ONE AND A POLICY ONE.
SO FROM THAT JOINT
PERSPECTIVE, HOW IS MINNESOTA
DOING IN MANAGING CHRONIC
WASTING DISEASE?
>> SO THE SHORT ANSWER IS THAT
WE'RE DOING BETTER THAN WE
WERE PREVIOUSLY, BUT THERE'S
STILL A LOT MORE TO DO.
FOR ANYONE WHO IS FAMILIAR
WITH CHRONIC WASTING DISEASE,
THIS ISN'T GOING TO BE AN EASY
DISEASE TO TACKLE.
BUT I THINK PARTICULARLY IN
THE LAST TWO YEARS THE DNR HAS
REALLY MADE SOME IMPORTANT
STEPS AND WE'VE BEEN ABLE TO
MAKE SOME IMPORTANT CHANGES IN
THE LEGISLATURE, BOTH WITH
FUNDING AND CHANGING SOME
POLICIES ISSUES TO HOPEFULLY
KEEP THIS DISEASE IN CHECK.
>> SO, LAST YEAR THE
LEGISLATURE PROVIDED FUNDS FOR
FURTHER RESEARCH EFFORTS AT
THE UNIVERSITY OF MINNESOTA TO
DEVELOP MORE ROBUST DIAGNOSTIC
TOOLS, INCLUDING, I THINK, THE
DEVELOPMENT OF FIELD TESTS.
HOW IS THE RESEARCH
PROGRESSING RIGHT NOW?
>> WE ACTUALLY GOT REALLY GOOD
NEWS AT OUR HEARING YESTERDAY.
SO Dr. PETER LARSON AT THE
UNIVERSITY OF MINNESOTA HAS
REALLY BEEN THE ONE LEADING
THE WAY ON THIS.
AND I CAN'T SAY ENOUGH GOOD
THINGS ABOUT HIM AND HIS TEAM
AND THE WORK THEY'VE BEEN
PUTTING IN TO THIS.
SO WHAT THEY SHARED WITH US
YESTERDAY IS THAT THEY ARE
MAKING IMPORTANT STRIDES IN A
LOT OF IT WAS REALLY
TECHNICAL, BUT ESSENTIALLY
THEY ARE DEVELOPING AND
GETTING CLOSER TO A TEST THAT
CAN -- ESSENTIALLY IT'S A MUCH
MORE SENSITIVE TEST.
SO PREVIOUSLY WE HAD TO HAVE,
IN ORDER TO FIND THE PRIXONS,
WE HAD TO HAVE BRAIN TISSUE OR
SPINAL TISSUE, YOU KNOW, AREAS
WHERE THE PRIONS WERE HIGHER
AND, SO, THIS NEW TEST THAT
THEY'RE WORKING ON WOULD BE
ABLE TO DETECT IT IN SALIVA,
BLOOD, URINE OR EVEN THE DIRT,
SO IT'S A MUCH MUCH MORE
SENSITIVE TEST AND THEY ARE
STARTING TO INVEST N THE
EQUIPMENT AND MOVING FORWARD
ON THAT.
OBVIOUSLY WE'D STILL BE USING
THEIR LABS AND SUCH, BUT
REALLY IMPORTANT STRIDES THAT
WE'RE MAKING, REALLY EXCITING
STUFF THAT'S HAPPENING BECAUSE
RIGHT NOW HUNTERS ARE HAVING
TO FIND, LIKE, SPECIFIC TISSUE
SAMPLES AND WAIT SEVERAL DAYS,
IF NOT WEEKS, TO GET THEIR
RESULTS.
AND THE TURNAROUND ON THIS
MORE SENSITIVE TEST IS ALSO
MUCH QUICKER.
STILL SOME TECHNICAL ISSUES TO
GET IT ROLLED OUT TO THE
PUBLIC, BUT THINGS ARE LOOKING
REALLY GOOD.
>> HAVE YOU HEARD ANYTHING
SPECIFIC FROM HUNTERS WHO
DON'T WANT TO GO THROUGH THE
RIGAMAROLE OF TESTING A DEER,
SO THEY JUST SIMPLY ARE NOT
FOLLOWING THE RECOMMENDATIONS?
>> SO OBVIOUSLY I'M NOT
HEARING FROM THOSE PEOPLE
BECAUSE THAT WOULD BE -- YOU
KNOW, THEY WOULDN'T BE
FOLLOWING THE LAW IF THAT'S
WHAT THEY WERE DOING.
ONE IMPORTANT THING TO NOTE
THAT WE DID HEAR FROM THE DNR,
SOME OF US HAVE ONE GIVEN --
HAVE GIVEN SORT OF A HEADS-UP
WHEN THEY WERE SENDING A
BOOKLET, SO YOU GET A BOOKLET
EVERY YEAR FROM THE DNR WITH
ALL YOUR HUNTING RULES AND
REGULATIONS IN IT, AND
BECAUSE OF COVID-19, THEY WILL
NOT HAVE STAFF OUT IN THE
FIELD TESTING HUNTER-HARVESTED
DEER.
AND, SO, IT'S GOING TO BE
VOLUNTARY THIS YEAR AND THERE
WILL BE ESSENTIALLY DROP SITES
THROUGHOUT THE IMPACTED AREAS,
THE DIFFERENT ZONES THAT ARE
CONSIDERED CWD ZONES.
SO WE REALLY ARE GOING TO RELY
ON HUNTERS VOLUNTARILY
COMPLYING WITH THIS.
AND ANOTHER PIECE TO THAT IS
THAT PART OF THE WORK THAT
SOME OF THE FUNDS TO THE
U OF M AND THE CENTER FOR
PRION RESEARCH, AND THE WORK
THEY'RE DOING, IS -- THEY 3D
PRINTED A HEAD OF A DEER SO
YOU CAN SEE THE LYMPH NODES
AND THEY CAN REALLY -- SO THE
IDEA WAS HOPEFULLY THEY WOULD
BE ABLE TO GO OUT TO THE
COMMUNITIES AND SHOW PEOPLE
REALLY HANDS-ON WHAT THE
SAMPLES ARE THAT THEY NEED.
SO IT WILL BE A LITTLE BIT
MORE CHALLENGING THIS YEAR,
BUT WE CERTAINLY ARE HEARING
FROM DEER HUNTERS THAT THIS IS
AN IMPORTANT ISSUE AND, SO,
YOU KNOW, MOST FOLKS FEEL LIKE
IT'S WORTH IT TO MAKE SURE
THAT WE'RE FINDING THE DISEASE
AND THAT HOPEFULLY WE'RE NOT
CONSUMING IT AS WELL.
>> IS IT THE GOAL, THEN,
BECAUSE MY UNDERSTANDING IS
THESE PRIONS LIVE IN THE
ENVIRONMENT FOR QUITE SOME
TIME, IS THE GOAL, REALLY, TO
JUST KEEP THE SPREAD UNDER
CONTROL AS MUCH AS HUMANLY
POSSIBLE?
>> YES.
AND I THINK, YOU KNOW, WE ALL
MAYBE NOW IN COVID TIMES HAVE
A LITTLE BIT MORE NUANCED
UNDERSTANDING OF DISEASE,
DISEASE CONTROL AND HOW WE
MANAGE DISEASE.
SO THAT'S REALLY WHAT WE'RE
LOOKING AT IS MANAGING IT.
YOU KNOW, AS I NOTED BEFORE,
YOU KNOW, SORT OF THE LEVEL OF
PRIONS FOUND IN DIFFERENT
TISSUES OR THE ENVIRONMENT IS
ALSO GOING TO BE REALLY
CRITICAL.
FOR INSTANCE, IN THE DUMPSTER
PROGRAM THAT WE STARTED LAST
YEAR, TO MAKE SURE PEOPLE ARE
DISPOSING OF THEIR DEER
CARCASSES, YOU KNOW, THE PARTS
THAT THEY DON'T EAT, SAFELY,
YOU KNOW, IT'S PROBABLY --
IT'S FINE THAT THAT GOES TO A
LANDFILL.
YOU KNOW, IN THE GRAND SCHEME
OF HOW MUCH ELSE IS IN THAT
LANDFILL, YOU KNOW, THE
CHANCES THAT SOMEBODY'S GOING
TO OR ANOTHER ANIMAL S GOING
TO CONSUME ENOUGH OF A DEER
PART TO GET THE DISEASE IS
RELATIVELY RARE.
THAT WOULD BE DIFFERENT THAN
YOU EATING A STEAK, A VENISON
STEAK, YOU KNOW, FRESH FROM
THE IELD.
SO IT'S MANAGING ALL OF THAT
AND KEEPING IT IN CHECK SO IT
DOESN'T SPREAD ANY FURTHER
THAN WE CAN KEEP IT FROM
SPREADING.
BUT, YEAH, THE CHANCES THAT
WE'RE GOING TO COMPLETELY
ERADICATE CWD AT THIS POINT
AREN'T LOOKING TOO GOOD, BUT I
THINK THAT WE REALLY CAN KEEP
IT MANAGED IN A WAY THAT IT'S
NOT NEGATIVELY IMPACTING YOUR
AVERAGE HUNTER OR AVERAGE
FAMILY OR AVERAGE MINNESOTAN
WHO CARES ABOUT THE DEER
POPULATION.
>> NOW, THIS COMING BUDGET
YEAR IS GOING TO BE A
CHALLENGE BECAUSE OF THE
PROJECTED DEFICIT, MEANING
THAT THOSE FINANCIAL RESOURCES
THAT ANY NUMBER OF STATE
AGENCIES RELY ON ARE SCARSER
AND SCARSER -- SCARCER AND
SCARCER.
SO AS A LAWMAKER PLANNING
FOR, YOU KNOW, REDUCED BUDGET
FIGURES, HOW IMPORTANT IS IT
THAT FUNDING REMAIN FOR THE
MANAGEMENT OF CHRONIC WASTING
DISEASE?
>> I THINK IT'S STILL REALLY
IMPORTANT.
OBVIOUSLY EVERYTHING THAT
WE'RE GOING TO BE TRYING TO BE
FUNDING NEXT YEAR IS GOING TO
BE REALLY A CHALLENGE.
BUT I THINK FOR A COUPLE
REASONS, I THINK, YOU KNOW,
ONCE THIS DISEASE -- IF THIS
DISEASE WERE TRULY TO GET OUT
OF CONTROL, IT WOULD BE REALLY
DIFFICULT, IF NOT IMPOSSIBLE,
TO SORT OF, LIKE, FORCE IT
BACK INTO THE BOX.
AND, SO, I THINK THE TIMING IS
REALLY CRITICAL BECAUSE WE ARE
AT A STAGE RIGHT NOW WHERE,
YOU KNOW, IN THE LAST YEAR
WE'VE HAD THREE NEW POSITIVES
SHOW UP IN THREE
DIFFERENT -- YOU KNOW, MORE
THAN THREE, BUT THREE
DIFFERENT COUNTIES THAT ARE
NOW SORT OF ON THE RADAR OF
HAVING TO BE MANAGED FOR
CHRONIC WASTING DISEASE.
TWO OF THOSE FROM A DEER FARM
SITUATION AND, SO, WE'RE GOING
TO HAVE TO FIND A WAY.
AND I THINK U KNOW, WE'RE
PROBABLY GOING TO HAVE TO GET
CREATIVE AND, OVERALL, IN
DEALING WITH THIS PROBLEM, YOU
KNOW, WE KNOW THAT SOME OF THE
POSITIVES ARE CONNECTED TO
KIND OF THE FOR-PROFIT FARMING
SECTOR AND THOSE ARE MANAGED
THROUGH THE BOARD OF ANIMAL
HEALTH, WHICH IS DIFFERENT
THAN THE DNR BECAUSE THE DNR
IS MANAGING IT AS THE WILD
DEER POPULATION AS NATURAL
RESOURCE.
HOWEVER, THEY'RE THE SAME
SPECIES.
AND, SO, THEY STILL CAN
INTERACT THROUGH A FENCE OR
DEER ESCAPE FROM THEIR
ENCLOSURES.
SO WE MAY BE LOOKING AT, OU
KNOW, WE'RE ALL GOING TO HAVE
TO WORK TOGETHER TO FIGURE OUT
HOW TO PAY FOR THIS.
I DO THINK HISTORICALLY THAT
HUNTERS HAVE BORNE MOST OF THE
BURDEN TO MANAGE THIS DISEASE
THROUGH LICENSE SALES.
BUT THE RESEARCH THAT'S
CURRENTLY GOING ON AT THE
U OF M WAS ACTUALLY FUNDED
THROUGH THE ENTRF, SO THE
TRUST FUND DOLLARS OR LOTTERY
DOLLARS PAID FOR SOME OF THAT.
AND, SO, WE DO HAVE SOME
OPTIONS HERE IN MINNESOTA THAT
OTHER STATES MAY NOT HAVE.
>> REPRESENTATIVE JAMIE
BECKER-FINN, THAT IS ALL THE
TIME WE HAVE, BUT I WANT TO
THANK YOU.
>> YEAH, THANK YOU VERY MUCH
FOR HAVING ME AND THANKS FOR
PAYING ATTENTION TO CHRONIC
WASTING DISEASE.
♪
>> ALSO THIS WEEK, UNIVERSITY
OF MINNESOTA PRESIDENT JOAN
GABEL OUTLINED THEIR COVID
PREPAREDNESS PLAN FOR MANAGING
STUDENTS WHO CHOOSE TO LIVE ON
CAMPUS.
>> WE HAVE ADDED ANOTHER
CHAPTER TO THE UNIVERSITY'S
SUNRISE PLAN THAT WE'RE
CALLING THE MAROON AND GOLD
SUNRISE.
OF COURSE WE ARE.
AND THE MAROON AND GOLD
SUNRISE IS HOW WE'RE GOING TO
MOVE STUDENTS IN TO UNIVERSITY
HOUSING.
IT S A PHASED APPROACH.
IT STILL USES THE HYBRID
COURSE DELIVERY OF SOME
FACE-TO-FACE, SOME HYBRID,
SOME DISTANCE LEARNING THAT
YOU'VE HEARD FROM EVERYBODY,
IN THE PRIVATE SCHOOLS AND IN
THE MINNESOTA STATE SYSTEM.
SO THIS PLAN REFERS
SPECIFICALLY TO HOW -- REFERS
SPECIFICALLY TO HOW WE NOW
RE-OPEN UNIVERSITY HOUSING AND
ACTUALLY BRING STUDENTS BACK
TO CAMPUS, TWIN CITIES,
DULUTH, AND ROCHESTER
CAMPUSES.
IN THE FIRST PHASE, WHICH WILL
START A LITTLE EARLIER IN
DULUTH THAN IN THE TWIN CITIES
AND ROCHESTER, JUST BECAUSE OF
HOW THE CLASS SCHEDULES WORK,
STUDENTS WILL MOVE INTO
UNIVERSITY HOUSING FOR AN
AVERAGE OF TEN DAYS, DEPENDING
ON WHEN THEY MOVE IN, THEY
WILL BE IN SORT OF THE DORM
VERSION OF A STAY-AT-HOME
ORDER WHERE THEY CAN LEAVE TO
ATTEND CLASSES, TO EAT, TO
EXERCISE, IF THEY HAVE TO
WORK.
THERE ARE WHAT I WOULD CALL
COMMON-SENSE EXCEPTIONS.
BUT OTHERWISE THEY SHOULD STAY
AT HOME, WHICH WOULD BECOME
THEIR DORM ROOM.
IF THAT PHASE OR STEP GOES
WELL, USING A HOLISTIC REVIEW
THAT I'LL DETAIL FOR YOU AT
THE END BECAUSE I KNOW YOU'D
LIKE TO LEARN MORE ABOUT THAT,
THEN WE WOULD MOVE TO THE NEXT
STEP.
STEP TWO OPENS ACCESS TO MORE
CAMPUS FACILITIES, THE REC,
LIBRARIES, STUDENT UNIONS, THE
SURROUNDING COMMUNITY, AND
ASKS THAT STUDENTS BE HOME BY
9:00 P.M.
WITH THE SAME COMMON-SENSE
EXCEPTIONS, IF THEY WORK OR
HAVE OTHER REASONABLE REASONS
THAT THEY WOULD HAVE TO BE OUT
LATER THAN THAT.
IF THAT GOES WELL, USING THE
SAME HOLISTIC REVIEW, WE WOULD
EXTEND THE BE HOME BY TIME TO
AND IF THAT GOES WELL, WEKS.-
WOULD REMOVE THE BE HOME BY
LIMIT AND STUDENTS WOULD BE ON
CAMPUS DOING WHAT STUDENTS DO
IN WHAT WE ARE NOW CALLING
COVID NORMAL, WEARING MASKS,
SIX FEET APART, AVOIDING LARGE
GATHERINGS, BUT OTHERWISE ABLE
TO ACCESS ALL OF CAMPUS
FACILITIES.
>> IT IS REALLY AN ODD TIME, I
UNDERSTAND THAT.
BUT COULD YOU FOR ME,
PRESIDENT GABEL, YOU MENTIONED
IN YOUR COMMENTS THAT YOU
WOULD LIKE TO DO ALL THAT YOU
CAN TO CREATE AN ENVIRONMENT
WHERE STUDENTS WOULD WANT TO
COME ON CAMPUS.
AND I DIDN'T REALLY, FROM MY
PERSPECTIVE, I DIDN'T REALLY
HEAR MANY BULLET POINTS THAT
WOULD MAKE A STUDENT WANT TO
COME ON CAMPUS.
IT SOUNDED TO ME LIKE A
STAY-AT-HOME PLAN IN A 12 X
15-FOOT DORMITORY ROOM COULD
BE PROBLEMATIC ON NUMEROUS
LEVELS, PARTICULARLY MENTAL
HEALTH, BUT ALSO JUST THE LOSS
OF AUTONOMY.
>> I DON'T THINK I COULD BE
ANYTHING BUT HONEST WITH YOU
TO SAY THAT THAT FIRST PERIOD
IS NOT GOING TO BE MUCH FUN.
RIGHT?
IT'S NOT GOING TO BE ZERO FUN.
BUT IT'S GOING TO BE A VERY
TAMPED-DOWN LEVEL OF AMPUS
LIFE WHILE WE REINTEGRATE ON
THE TWIN CITIES CAMPUS AND
CERTAINLY IN DULUTH, THOUSANDS
OF STUDENTS ALL AT ONE TIME
INTO AN ECOSYSTEM.
BUT THIS IS THE WAY THAT WE
THINK WE CAN DO IT AND THEN
SUSTAIN IT.
BUT IF WE CAN DO THIS RIGHT,
IN A MATTER OF LESS THAN TWO
WEEKS, THEN WE START TO OPEN
THINGS UP AGAIN.
AND IT STARTS TO FEEL A LOT
MORE LIKE THE NEW NORMAL, I
KNOW WE ALL HATE THAT PHRASE,
BUT WHERE YOU CAN GO TO
DIFFERENT THINGS, YOU CAN BE
OUT AND DO -- YOU CAN HAVE
STUDY GROUP MEETINGS AND YOU
CAN MEET WITH YOUR PROFESSOR,
IF THEY'RE ON CAMPUS, AND YOU
CAN GO OFF CAMPUS AND EAT.
YOU JUST GET HOME BEFORE THE
BIGGEST TEMPTATION STARTS.
AND IF THAT GOES WELL, THEN WE
START TO OPEN THINGS UP
GRADUALLY.
SO WE FEEL LIKE THIS IS THE
WAY TO BALANCE EXACTLY HAT
YOU'RE SAYING.
BUT IT GETS A LOT MORE FUN
OVER TIME IF WE MAKE THE ARD
CHOICES IN THE BEGINNING.
>> WHAT WOULD YOU TELL THE
LEGISLATURE WOULD BE THE MOST
HELP FOR YOU IN TRYING TO, YOU
KNOW, IF YOU WOULD, ALMOST IN
AN EMPEROR KIND OF FASHION,
YOU GET TO DECIDE, YOU GET TO
TELL THE LEGISLATURE WHAT IT
IS YOU'D LIKE US TO DO TO MAKE
YOUR JOB EASIER AND THE
STUDENT EXPERIENCE BETTER?
>> FIRST AND FOREMOST, WE
ALWAYS APPRECIATE, AS
CHANCELLOR MALHOTRA MENTIONED,
THE NVESTMENT BY THE STATE
INTO HIGHER EDUCATION.
I WOULD BE REMISS IF I DIDN'T
START WITH APPRECIATION FOR
THE WAY IN WHICH RESOURCES
SOLVE SO MANY OF OUR
CHALLENGES.
BUT WITH THAT SAID, OVER TIME
REAL SUPPORT FOR THE
PARTNERSHIP BETWEEN WHAT ALL
OF US ARE DOING THAT HAVE
LARGE GROUPS OF PEOPLE
TOGETHER AND WHAT'S HAPPENING
TO SUPPORT OUR ABILITY TO DO
THE RESEARCH INTO VACCINES,
MITIGATING TREATMENT AND
CHEAP, FAST TESTING, WE HAVE
THE SCIENTISTS TO DO IT, IT'S
JUST A UESTION OF THE
INVESTMENT INTO THOSE THINGS.
♪ DRAMATIC MUSIC ♪
>> JOIN US AGAIN NEXT WEEK AS
WE DELVE INTO MORE TOPICS
AFFECTING MINNESOTANS.
I'M SHANNON LOEHRKE AND ON
BEHALF OF ALL OF US AT SENATE
MEDIA SERVICES, THANKS FOR
WATCHING.
|
Purification and properties of mercuric reductase from Yersinia enterocolitica 138A14.
A mercuric ion-reducing flavoprotein was purified from Yersinia enterocolitica 138A14 using dye matrix affinity chromatography. The purified enzyme had a characteristic absorption spectrum similar to those of flavin compounds, and FAD was detected as a part of the purified enzyme by thin-layer chromatography. Freshly purified preparations of the enzyme showed a single band on SDS polyacrylamide gel electrophoresis with a molecular weight of 70,000. The isolated enzyme had a molecular weight of about 200,000 as determined by gel filtration and disc gel electrophoresis. These results suggest an apparently trimeric structure of the enzyme. Dithiothreitol treatment disrupted the trimer into a dimeric structure of 140,000. Along with ageing, as well as limited proteolytic digestion, the enzyme evolved to give a dimeric molecule of 105,000 composed of two identical subunits of 52,000. The combination of the purified enzyme with HgCl2, or unexpectedly with merthiolate, oxidised the NADPH, which was followed spectrophotometrically. The Km for HgCl2 was dependent on the concentration of exogenous thiol compounds. A comparison of physical properties as well as kinetic characteristics indicated that the enzyme from Y. enterocolitica 138A14 is similar to mercuric reductases isolated from other mercury-resistant bacteria. |
Q:
Is there the way to change white color of a main page mask of "react-native-drawer" component?
As I see in android applications almost all drawers in open state makes a black "mask" above main content.
white mask in "react-native-drawer:
black color example:
It is possible to change the color of this "mask" in "react-native-drawer" component to black?
A:
Was looking for the same thing and found a solution at GitHub.
tweenHandler={ratio => ({
main: {
opacity: 1,
},
mainOverlay: {
opacity: ratio / 2,
backgroundColor: 'black',
},
})}
Tested it out and here's what I got (made it pink for visibility):
<Drawer
tweenHandler={ratio => ({
main: {
opacity: 1,
},
mainOverlay: {
opacity: ratio / 2,
backgroundColor: 'pink',
},
})}
ref={(ref) => { this._drawer = ref; }}
content={ navigationView }
side="right"
panOpenMask={.25}
>
Screenshot:
|
BHA and Kerzner International Donate To Red Cross
Friday, 23 December 2011 18:10
News Editor
Several hundred residents in Cat Island and the Family Islands who were victims of Hurricane Irene will rest better over the holidays and next year as a result of a contribution of mattresses, frames, linens and other items which have been donated to the Bahamas Red Cross by the Bahamas Hotel Association and Atlantis.
Immediately following the hurricane, BHA appealed to its members to provide cash and relief items to those in need. A number of hotels and other tourism-related businesses responded immediately including Sandals, Baha Mar and Atlantis. Over the past several months it was also determined that many residents lost bedding and other furnishings; and since then have been doing without.
“We are pleased that BHA, in partnership with Atlantis, was able to provide this assistance” states BHA President Stuart Bowe. “Working with the Bahamas Red Cross, NEMA and John Nixon at the Ministry of Tourism and Aviation who provided ground support on Cat Island, we identified those individuals in need of the mattresses and related items and established a distribution system to reach them” he added.
Close to 300 mattresses and frames, several hundred sets of linens, shampoo and body bath items were part of the donation.
Thanks to coordination efforts by BHA, the Red Cross, NEMA and the Ministry of Tourism, the first shipment of materials reached Cat Islanders before Christmas. Over the coming weeks additional deliveries will be made to Cat Island and Eleuthera. |
Luba Goy
Luba Goy (; born November 8, 1945) is a Canadian actress, comedian and one of the stars of Royal Canadian Air Farce.
Life and career
Goy was born in Haltern, Germany, to Ukrainian parents and raised in Ottawa, Ontario, Canada. They immigrated to Canada in 1951. She is a graduate of the Glebe Collegiate Institute in Ottawa, Ontario. In 1969, she graduated from the National Theatre School of Canada, then went on to act in theatre productions in Stratford, Ontario. In 1971, she joined "The Jest Society", a comedy troupe, which evolved into the Royal Canadian Air Farce in 1973. In the early 1980s, she starred (as herself, alongside Billy Van) in an educational series on computers called Bits and Bytes. Produced by TVOntario, the show was aired by PBS stations in the United States.
Later that decade, she played Lotsa Heart Elephant, Treat Heart Pig and Gentle Heart Lamb in Nelvana's animated Care Bears franchise. As part of the Air Farce team, Goy has won 15 ACTRA awards, a Juno, the Maclean's Honour Roll, and was among the first Canadians to be inducted into the International Humour Hall of Fame. In 1993, Goy and her Air Farce cast members received Honorary Doctor of Law degrees from Brock University. In 1996, Goy received the Outstanding Achievement Award from Women in Film and Television. In 1998, Goy, along with her Air Farce colleagues, received the Governor General's Performing Arts Award for Lifetime Artistic Achievement, Canada's highest honour in the performing arts.
She has also done voices for various animated TV series featuring The Elephant Show, Babar, AlfTales, My Pet Monster, Sylvanian Families, Tales from the Cryptkeeper, The Rosey and Buddy Show, Rupert, The New Archies, Little Shop, Jayce and the Wheeled Warriors, and Wild C.A.T.s.
Within the Ukrainian Canadian community she occasionally has comedy performances that highlight her Ukrainian heritage. One such example was her involvement in 1999 with the Ukrainian pavilion at Folklorama, a cultural festival in Winnipeg, Manitoba. She speaks Ukrainian fluently. Luba's film roles have included an 18th-century innkeeper in the Ukrainian film Vid'ma (Відьма, Witch), filmed in 1990 in Kiev.
In 2011, she performed at the Toronto Ukrainian Festival. In May 2012 Luba Goy debuted her one-person show Luba, Simply Luba at the Berkeley Street Theatre, Toronto.
Characters portrayed by Goy
Yoko Ono
Ann Medina
Hillary Clinton
Anne McLellan
Ethel Blondin-Andrew
Barbra Streisand
Wendy Mesley
Elizabeth II
Alexa McDonough
Pamela Wallin
Sheila Copps
Adrienne Clarkson
Elizabeth Taylor
Rita MacNeil
Laura Bush
Bev Oda
Bobbie Battista
Margaret Atwood
Elizabeth May
Martha Stewart
Suze Orman
Lorena Bobbitt
Kim Campbell
Madeleine Albright
Sharon Carstairs
Donald Duck
Anita Sarkeesian
John Leguizamo
Theresa May
List is Incomplete
Filmography
Television
References
External links
Category:Canadian television personalities
Category:Canadian television actresses
Category:Canadian voice actresses
Category:Canadian women comedians
Category:Canadian film actresses
Category:Royal Canadian Air Farce
Category:Governor General's Performing Arts Award winners
Category:National Theatre School of Canada alumni
Category:German emigrants to Canada
Category:Canadian people of Ukrainian descent
Category:1945 births
Category:Living people
Category:Canadian radio personalities
Category:Canadian sketch comedians
Category:Actresses from Ottawa |
Effect of target composition on proton energy spectra in ultraintense laser-solid interactions.
We study how the proton density in a target irradiated by an ultraintense laser affects the proton spectrum, with analytical models and Vlasov simulations. A low relative proton density gives rise to peaks in the energy spectrum. Furthermore, a target with the protons confined to a thin, low density layer produces a quasimonoenergetic spectrum. This is a simple technique for producing proton beams with a narrow energy spread for proton radiography of laser-plasma interactions. |
Why we're all proud of Liverpool
Why we're all proud of Liverpool
Get the Echo newsletter - it has never been more important to stay informed Sign me up now Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
Born again Liverpool has been declared “a city of great energy and charm” and a “dynamic, exciting place” in the new edition of The Rough Guide To Great Britain.
The city scores highly in countless areas, with the travel bible happy to make a series of recommendations for visitors.
Now in all good book shops and available online, The Rough Guide to Great Britain (£18.99, from the Rough Guides website) paints a bright, vivid and vibrant picture of a city recently revitalised and regenerated.
SHOPPING
“Liverpool is fabulous for shopping,” says the guide, which highlights the “brilliantly-designed” Liverpool One, as well as Bold Street’s independent stores and the “arty originals” in the Baltic Triangle.
NIGHTLIFE AND ENTERTAINMENT
More plaudits here, with some of the city’s popular festivals – including Beatles Week and the Liverpool International Music Festival – getting a mention, while the book states: “Liverpool’s club scene is famously unpretentious, with posing playing second fiddle to drinking and dancing, while particularly rich in home-grown live music.”
It also discusses the massive showpiece events Liverpool does so well, with the visits of the Giants said to be “jaw-dropping”.
EATING AND DRINKING
The guide discusses the delights to be found in Albert Dock, around Hardman and Hope streets, and along Berry and Nelson streets, and says the “blossoming” Baltic Triangle has become “the city’s most creative and cutting-edge quarter”.
Namechecked restaurants include Lunya, Delifonseca and Yuet Ben, while Ye Cracke, Berry and Rye and Camp and Furnace are in the pubs and bars section.
ATTRACTIONS
All manner of attractions are detailed, including, as you would expect, traditional favourites such as St George’s Hall, the Walker Art Gallery, Central Library, World Museum Liverpool, the Merseyside Maritime Museum and the two cathedrals, while the four-year-old Museum of Liverpool is described as “huge and flashy” and “brilliant”.
And while saying children will enjoy its Little Liverpool gallery, the guide states “anyone with any interest in popular culture will have an absolute ball at Wondrous Place, a memorabilia-rich celebration of sports and music”.
In pictures: 28 top Liverpool tourist attractions
ACCOMMODATION
Hope Street Hotel, the “unspeakably beautiful” 2 Blackburne Terrace (which was featured in the ECHO earlier this year) and the Racquet Club are among the hotels featured in the guide’s accommodation section, which also points out that budget chains are well-represented in the city.
Look inside 2 Blackburne Terrace
CROSBY BEACH
This is among those spots outside the centre which the guide is happy to point out as being worthy of a visit. It says: “Crosby Beach was an innocuous, if picturesque, spot until the arrival in 2005 of Antony Gormley’s haunting Another Place installation, spread along more than 1000 yards of the shore.”
And, finally, we were pleased to see the guide say “the Liverpool ECHO’s website is always current.”
An increasing number of people - daytrippers and holidaymakers - are making a beeline for Liverpool and its many attractions, and the latest offering from the hugely-respected Rough Guide series will help them navigate their way around this fast-changing “dynamic, exciting place.” |
Oxidative phosphorylation and ATPase activities of human tumor mitochondria.
Studies were carried out with intact mitochondria isolated from human astrocytoma, oat cell carcinoma and melanoma which were propagated in athymic mice. These human tumor mitochondria were capable of coupled oxidative phosphorylation. They also showed significant uncoupler-stimulated ATPase if defatted bovine serum albumin was included in the assay media. However, the uncoupler response curves were different and the magnitude of the ATPase activity was lower than could be obtained with mitochondria of a normal tissue, such as liver. Some of these characteristics were also exhibited by mitochondria from several animal hepatomas and Ehrlich ascites tumor. In the three tumors studied, mitochondria from oat cell carcinoma were more labile, whereas higher respiratory control ratios and greater stimulation of ATPase by uncouplers were obtained with melanoma mitochondria. The mitochondrial ATPase was not the major cellular ATPase in any of the three tumors. This was indicated by a low inhibition of the ATPase activity of tumor cell homogenates by oligomycin. A very large fraction of the cellular ATPase activities was recovered in the microsomal fractions. |
---
data:
train:
paths:
- "egs/mock_text_nlu_joint_data/nlu-joint/v1/data/train.txt"
eval:
paths:
- "egs/mock_text_nlu_joint_data/nlu-joint/v1/data/dev.txt"
infer:
paths:
- "egs/mock_text_nlu_joint_data/nlu-joint/v1/data/test.txt"
task:
name: TextNLUJointTask
preparer:
enable: true
name: TextNLUJointPreparer
done_sign: "egs/mock_text_nlu_joint_data/nlu-joint/v1/exp/prepare.done"
reuse: true
use_dense: false
language: english
split_by_space: true
vocab_min_frequency: 0
use_custom_vocab: True
text_vocab: "egs/mock_text_nlu_joint_data/nlu-joint/v1/data/text_vocab.txt"
label_vocab:
- "egs/mock_text_nlu_joint_data/nlu-joint/v1/exp/intent_label_vocab.txt"
- "egs/mock_text_nlu_joint_data/nlu-joint/v1/exp/slots_label_vocab.txt"
max_seq_len: 30
batch_size: 10
epochs: 2
num_parallel_calls: 12
num_prefetch_batch: 2
shuffle_buffer_size: 2000
need_shuffle: true
classes:
- positive_id: 1
num_classes: 2
- positive_id: 1
num_classes: 2
model:
name: JointBilstmCrfModel
type: keras # raw, keras or eager model
use_pre_train_emb: False
net:
structure:
embedding_size: 300
cell_type: lstm
cell_dim: 100
num_units: 300
num_layers: 1
batch_size: 10
max_len: 30
dropout_rate: 0.5
l2_reg_lambda: 0
fc_dim: 100
solver:
name: RawNLUJointSolver
adversarial:
enable: false # whether to using adversiral training
adv_alpha: 0.5 # adviseral alpha of loss
adv_epslion: 0.1 # adviseral example epslion
model_average:
enable: false # use average model
var_avg_decay: 0.99 # the decay rate of varaibles
optimizer:
name: adam
loss:
- CrossEntropyLoss
- CrfLoss
label_smoothing: 0.0 # label smoothing rate
learning_rate:
rate: 0.001 # learning rate of Adam optimizer
type: exp_decay # learning rate type
decay_rate: 0.99 # the lr decay rate
decay_steps: 100 # the lr decay_step for optimizer
batch_size: 10
epochs: 1
clip_global_norm: 3.0 # clip global norm
metrics:
- pos_label: 1
cals:
- name: AccuracyCal
arguments: Null
- pos_label: 1
cals:
- name: CrfCal
arguments:
label_vocab_path: "egs/mock_text_nlu_joint_data/nlu-joint/v1/exp/slots_label_vocab.txt"
postproc:
- name: SavePredPostProc
res_file: "egs/mock_text_nlu_joint_data/nlu-joint/v1/res/intent_infer_res.txt"
- name: SavePredEntityPostProc
res_file: "egs/mock_text_nlu_joint_data/nlu-joint/v1/res/slots_infer_res.txt"
saver:
model_path: "egs/mock_text_nlu_joint_data/nlu-joint/v1/exp/ckpt/bilstmcrf/"
max_to_keep: 10
save_checkpoint_steps: 30
print_every: 10
service:
model_path: "egs/mock_text_nlu_joint_data/nlu-joint/v1/exp/bilstmcrf/service"
model_version: "1"
run_config:
tf_random_seed: null
allow_soft_placement: true
log_device_placement: false
intra_op_parallelism_threads: 10
inter_op_parallelism_threads: 10
allow_growth: true
|
The one who held that poor, already restrained animal is just as guilty as the one who took the knife across its throat.
If an aggressive animal can upset them so much that they panic and do such a terrible thing, they do not belong on the force.
How about the people who deliver our mail, also UPS and Federal Express? How about delivery men who carry pepper spray or dog treats? They don't carry knives. It's frightening to think that police officers are carrying knives and guns if they scare that easily.
If these two officers don't both lose their jobs I will completely lose respect for the police department and the criminal justice system in Baltimore City. |
This disclosure relates generally to a user interface automation framework and, more particularly, to generating input values for a test dataset from a datastore based on semantic annotations.
A number of different tools are commercially available for automated testing of software applications. For example, Rational Functional Tester™ (RFT) is a tool for automated testing of software applications that allows software developers to create tests that mimic the actions of a human tester. RFT is primarily used by software quality assurance (SQA) teams to perform automated regression testing. A test recorder of RFT allows software developers to create test scripts that capture actions of a tester during testing of an application under development. A test script is usually produced as either a Java or Visual Basic .NET application and may be presented as a series of screen shots that form a visual storyboard. In general, test scripts may be edited using standard language commands and syntax or by interacting with screen shots in a storyboard. Test scripts can then be executed to validate functionality of an application under development. Typically, test scripts are run in a batch mode where several scripts are grouped together and run unattended.
Regression testing refers to any type of software testing that seeks to uncover new software bugs (regressions) in existing functional and non-functional areas after changes (e.g., enhancements, patches or configuration changes) have been made to the software. One of the main reasons for regression testing software is to ensure that a change to one part of the software does not adversely affect other parts of the software. Regression testing may include re-running previously executed tests and checking whether program behavior has changed and/or whether previously fixed faults have re-emerged. Regression testing can be used to test a system efficiently by systematically selecting the appropriate minimum set of tests needed to adequately cover a particular change. Regression tests can be broadly categorized as functional tests or unit tests. Functional tests exercise the complete program with various inputs. Unit tests exercise individual functions, subroutines, or objects of the program.
During the recording phase, verification points may be introduced to capture an expected system state, e.g., a specific value in a field or a given property of an object, such as enabled or disabled. During playback, any discrepancies between a baseline captured during recording and the actual results achieved during playback may be noted in a log. The tester can then review the log to determine if an actual software bug was discovered. Storyboard testing enables testers to edit test scripts by acting against screen shots of an application under test.
In RFT, an object map is the underlying technology used to locate and act against objects within an application. An object map may be automatically created by a test recorder when tests are created and typically includes a list of properties used to identify objects during playback. During playback, RFT uses the object map to locate and act against the application interface. However, during development, objects may change between the time a test script is recorded and when the test script is executed. In RFT, discrepancies between object definitions captured during recording and playback may be ignored to ensure that test script execution runs uninterrupted.
It is common for a single functional regression test to be executed multiple times with different data. To facilitate execution of a functional regression test with different data, a test recorder may automatically parameterize data entry values and store the data entry values in a spreadsheet, e.g., a test dataset. Automatic parameterization of data entry values enables a tester to add additional test data cases to a test dataset without having to modify any test code. In general, automatic parameterization of data entry values increases test coverage and the value of a given functional test. In order for RFT to interact with a given object in an application, RFT must be able to understand interfaces of an object. Understanding interfaces of an object is typically not a problem for standard objects, e.g., edit fields, buttons, and list boxes. However, in some cases, application developers create their own custom objects to meet application requirements. In the case of custom objects, developers can create an object proxy to identify and code the interfaces to the custom objects. For example, an object proxy may be created using a software development kit (SDK) interface that allows users to program in Java or .NET to add functional testing support for Java and .NET custom controls. |
Many of monomers having reactive unsaturated bonds can produce polymers by selecting a catalyst for cleaving the unsaturated bonds and causing a chain reaction and appropriate reaction conditions. Such monomers having unsaturated bonds are typified, for example, by versatile monomers including vinyl aromatic compounds such as styrene, alkylstyrene, and alkoxystyrene. In addition, a wide variety of resins are being synthesized by polymerizing each of the vinyl aromatic compounds alone or copolymerizing the vinyl aromatic compounds with each other.
However, applications of polymers resulting from such vinyl aromatic compounds are mainly limited to fields of relatively inexpensive consumer appliances. The polymers are hardly applied to advanced technologies, which require high functionality and high thermal and mechanical characteristics, such as printed circuit boards in electrical and electronic fields. One of the reasons is that a thermal characteristic such as heat resistance or thermal stability and processability such as solvent solubility or film moldability cannot be attained simultaneously.
As for a method of solving such drawbacks in conventional vinyl aromatic-based polymers, Patent Document 1 discloses a soluble polyfunctional vinyl aromatic copolymer obtained by polymerizing a divinyl aromatic compound with a monovinyl aromatic compound at a temperature of 20 to 100° C. in the presence of a Lewis acid catalyst and an initiator having a specific structure in an organic solvent. Further, Patent Document 2 discloses a production method for a soluble polyfunctional vinyl aromatic copolymer having a molecular weight distribution controlled by subjecting monomer components containing 20 to 100 mol % of a divinyl aromatic compound to cationic polymerization at a temperature of 20 to 120° C. using a Lewis acid catalyst and an initiator having a specific structure in the presence of a quaternary ammonium salt. The soluble polyfunctional vinyl aromatic copolymer obtained by the technology disclosed in each of those two patent documents is excellent in solvent solubility and processability and can be used to provide a cured product having a high glass transition temperature and being excellent in heat resistance.
The soluble polyfunctional vinyl aromatic copolymer obtained by each of those technologies has itself a polymerizable double bond and hence is cured to give a cured product having a high glass transition temperature. It can therefore be said that the cured product or the soluble polyfunctional vinyl aromatic copolymer is a polymer excellent in heat resistance or a precursor thereof. Moreover, the soluble polyfunctional vinyl aromatic copolymer is copolymerized with any other radical polymerizable monomer to give a cured product. Moreover, the cured product is also a polymer excellent in heat resistance.
From the viewpoints of compatibility during copolymerization of the soluble polyfunctional vinyl aromatic copolymer with any other radical polymerizable monomer, and heat discoloration resistance after curing, the compatibility or solubility with a highly versatile (meth)acrylate compound is insufficient, and the thermal stability to high process temperatures is also insufficient. Thus, some kinds of (meth)acrylate compounds give opaque compositions in many cases, resulting in a difficulty of uniform copolymerization of the (meth)acrylate compound with the soluble polyfunctional vinyl aromatic copolymer. This causes a drawback of reducing the degree of freedom of designing for compounding formulations. In addition, failures such as blistering and discoloration occur through a high thermal history of around 280 to 300° C. in some cases.
Meanwhile, Patent Document 3 discloses a production method for an isobutylene-based polymer having a hydroxy group at the termination end, the method involving subjecting cation polymerizable monomers each containing isobutylene to living cationic polymerization at a low temperature in the presence of a halogen-containing organic compound having a specific structure serving as an initiator and also serving as a chain transfer agent and an Lewis acid to synthesize an isobutylene-based polymer having an isobutyryl group at the end, and further performing a Friedel-Crafts-type reaction of the isobutylene-based polymer having an isobutylene group at the end with a phenol-based compound having a specific structure in the presence of a Lewis acid. However, there has been a problem in that the isobutylene polymer having isobutylene at the end synthesized by the production method has no pendant vinyl group owing to the use of no polyfunctional vinyl aromatic compound, and hence a molded product has a low glass transition temperature and is not applicable to advanced technological fields, which require high functionality and high thermal and mechanical characteristics, such as electrical and electronic fields. Further, the terminal group introduced in the production method is a phenolic hydroxy group derived from a phenol-based compound.
Further, Patent Documents 4 to 6 each disclose a phenol aralkyl resin obtained by allowing an aromatic compound containing a phenolic hydroxy group to react with an aromatic compound containing at least two or more ethylenically unsaturated bonds.
Still further, Patent Document 7 discloses a soluble polyfunctional vinyl aromatic copolymer obtained by copolymerizing a divinyl aromatic compound with a monovinyl aromatic compound, in which the copolymer has a linear hydrocarbon group or an aromatic hydrocarbon group via an ether bond or a thioether bond as part of terminal groups. However, such end-modified soluble polyfunctional vinyl aromatic copolymer is also insufficient in compatibility, heat resistance, and the like in some cases. In addition, the end group having an ether bond disclosed in Patent Document 7 has been introduced through a reaction mechanism in which an OH group in an OH group-containing compound such as benzyl alcohol reacts with a polymer chain end. Patent Document 1: JP 2004-123873 A Patent Document 2: JP 2005-213443 A Patent Document 3: JP 04-20501 A Patent Document 4: JP 3206672 B2 Patent Document 5: JP 08-73570 A Patent Document 6: JP 08-259665 A Patent Document 7: JP 2007-332273 A Patent Document 8: JP 2003-306619 A Patent Document 9: JP 2006-240292 A Patent Document 10: JP 2005-213443 A Patent Document 11: JP 11-61081 A Patent Document 12: JP 05-86136 A Patent Document 13: JP 2002-20441 A Patent Document 14: JP 2006-193660 A Patent Document 15: JP 2002-509273 A
Meanwhile, plastic is used in a large amount in various industries such as the automobile industry, the household appliance industry, and the electrical and electronic industry. The reason why plastic is used in a large amount is based on its light weight, low cost, optical characteristics, and the like in addition to its processability and transparency. However, plastic is softer as compared to glass and the like and hence has drawbacks such as a large sensitivity to surface scratches. In order to solve those drawbacks, a method involving coating the surface of plastic with a hard coating agent has been employed as generally used means.
Used as the hard coating agent is a thermocurable hard coating agent such as a silicon-based coating material, an acrylic coating material, or a melamine-based coating material. Of those, in particular, a silicon-based hard coating agent has been heavily used because of its high hardness and excellent quality. This type of coating agent is mostly used for high-value-added products such as eyeglasses and lenses. However, the coating agent has a long curing time and is expensive, and thus is far from being suitable for hard coating of a film or sheet (hereinafter, referred to as a film or the like) to be subjected to continuous processing.
In recent years, a photosensitive acrylic hard coating agent has been developed and utilized. A photosensitive hard coating agent is cured immediately by irradiation with light such as ultraviolet rays to form a hard coated film to thereby provide a high processing speed and has excellent performance such as scratch resistance, leading to reduced total cost. Thus, the photosensitive hard coating agent is a primary hard coating agent at present. In particular, the photosensitive hard coating agent is suitable for continuous processing of a film or the like made of polyester or the like. There are exemplified, as materials for a film or the like made of plastic, polyester, polyacrylate, acryl, polycarbonate, vinyl chloride, triacetylcellulose, and polyether sulfone. A film or the like made of polyester, polycarbonate, and acryl is one kind of most widely used films or the like because of its various excellent features. Such film or the like made of a resin is widely used for a glass scattering preventing film, a light shielding film for automobiles, a surface film for whiteboards, a system kitchen surface antifouling film, or the like, and for a functional film or sheet for touch panels, liquid crystal displays, CRT flat televisions, and the like as an electronic material. In all of those applications, the hard coating agent is applied in order to prevent a surface from being easily scratched (Patent Documents 8 and 9).
In addition, in a display such as a CRT display and an LCD display using a film or the like coated with the hard coating agent, a problem arises in that reflection degrades the visibility of a display screen, with the result that eyes are easily tired. Thus, some of applications need a hard coat treatment having a surface reflection preventing ability. There is exemplified, as a method of preventing surface reflection, a method of preventing reflection by coating a film or sheet with a dispersion of an inorganic filler or an organic microparticle filler in a photosensitive resin to make irregularities on a surface (AG treatment), a method of preventing glare and reflection based on a difference in refractive index by providing a high refractive index layer and a low refractive index layer as a multi-layer structure in the stated order on a film or sheet (AR treatment), or an AG/AR treatment method using the above-mentioned two methods in combination.
It should be noted that Patent Document 1 and 10 each disclose a soluble polyfunctional vinyl aromatic copolymer obtained by subjecting a divinyl aromatic compound (a) and a monovinyl aromatic compound (b) to polymerization at a temperature of 20 to 100° C. in the presence of a Lewis acid catalyst and an initiator having a specific structure in an organic solvent. In addition, the patent documents disclose that the soluble polyfunctional vinyl aromatic copolymer is excellent in solvent solubility and processability, and can be used to provide a cured product excellent in heat resistance and thermal stability. However, none of the patent documents teaches applications to the hard coating agent.
In a photosensitive resin composition for hard coating used for a film substrate made of polyacryl, polyester, an MS resin, or the like used for a film or sheet provided with a hard coated layer, a polyfunctional resin is often used in order to increase a crosslinking density and improve hardness. Thus, because the photosensitive resin composition for hard coating has high hardness but is insufficient in flexibility and stiffness, cracking occurs during bending as secondary processing or failures such as floating, peeling and cracking occur during punching processing. Therefore, the improvement of secondary processability has been a critical issue. Further, the blending of the polyfunctional resin in a large amount results in large curing shrinkage and high polarity. Thus, in low-polar, poorly adhesive resins such as an MS resin, polyacryl, and polycycloolefin, in particular, there have been problems in that drawbacks such as insufficient adhesiveness and warpage of a hard coated film or sheet occur. In contrast, when the adhesiveness is emphasized, there has been a problem in that the use of a resin having low polarity and having a small number of functional group leads to insufficient improvements in hardness and scratch resistance. Therefore, a hard coating agent for a film or sheet substrate made of a poorly adhesive MS resin, polyacryl, polycycloolefin, and the like is insufficient in terms of adhesiveness, scratch resistance, and punching processability. Accordingly, there is a demand for a photosensitive resin composition for hard coating, by which those problems can be solved, and a cured product thereof, a hard coated film or sheet, and an optical device and an image display device having such hard coated films or sheets laminated.
Hitherto, in general, an acrylic resin or a cycloolefin resin excellent in transparency and light resistance or a polycarbonate resin excellent in heat resistance has been heavily used as a resin for an optical member. Meanwhile, the resin for an optical member utilized in fields of optics and electronics requires heat resistance and mechanical characteristics during mounting processes to electronic substrates and the like and high-temperature operations, and an epoxy-based resin has been frequently used as the resin. However, as a result of the growth of application fields of an optical member in recent years, there is a demand for a resin having more improved optical characteristics, heat resistance, and mechanical characteristics, having more excellent moldability, and having less characteristic change due to an environmental change than ever before. For example, in fields of optics and electronics for vehicles, various monitors and sensors are considered to be installed in response to electronic control and system modularization, and an optical member to be used in each of the monitors and sensors requires high reliability.
However, the above-mentioned optical resin material satisfies only a part of various characteristics necessary in advanced technical fields, which require the resistance to the use in such harsh environments, that is, various characteristics such as low water absorbency, heat resistance, moldability, mold transfer property, and mold release property. Thus, in the present circumstances, although the resin material has excellent degree of freedom of shape, lightweight property, and moldability as compared to a glass material, the resin material is not used as a material for an optical member in advanced technical fields, which require such strict environmental resistance characteristics, optical characteristics, and moldability, and the glass material is mainly used instead.
Hitherto, investigations have been made on a curable resin composition containing a polymerizable unsaturated monomer having a cycloalkyl group as a material solving the above-mentioned drawbacks of the resin material which has been used for an optical member in a large amount and being excellent in transparency, heat resistance, and low water absorbency (Patent Documents 11 to 13).
Patent Document 14 discloses a resin composition containing a (meth)acrylate having an aliphatic hydrocarbon group having 4 or less carbon atoms in an ester moiety as a monomer component (A), an alicyclic polyfunctional (meth)acrylate as a monomer component (B), and a polymerization initiator (D), in which the resin composition is cured with heating or light.
Patent Document 15 discloses a polymerizable organic composition containing (a) an aromatic monomer having at least two vinyl groups, (b) a polythiol monomer having at least two thiol groups, and (c) an anhydride monomer having at least one ethylenically unsaturated group, provided that a polymerizate of the polymerizable organic composition has a refractive index of at least 1.57 and an Abbe number of at least 33 for the purpose of attaining an improvement in a refractive index. |
Systemic rather than local heme oxygenase-1 overexpression improves cardiac allograft outcomes in a new transgenic mouse.
Heme oxygenase-1 (HO-1), a rate-limiting enzyme in heme catabolism, exhibits potent antioxidant and anti-inflammatory properties. We developed HO-1 transgenic (Tg) mice using a rat HO-1 genomic transgene under the control of the endogenous promoter. Transgene expression was demonstrated by RT-PCR in all studied tissues, and a modest HO-1 overexpression was documented by Western, ELISA, and enzyme activity assays. To assess the effect of local vs systemic HO-1 in the acute rejection response, we used Tg mice as organ donors or recipients of MHC-incompatible heart grafts. In the local HO-1 overexpression model, Tg allografts survived 10.5 +/- 0.7 days (n = 10), compared with 6.5 +/- 0.4 days (n = 6) for wild-type donor controls (p = 0.0001). In the systemic HO-1 overexpression model, Tg recipients maintained allografts for 26.8 +/- 3.4 days (n = 10), compared with 6.3 +/- 0.1 days (n = 12) in wild-type controls (p = 0.00009). Inhibition of HO activity by treatment with tin protoporphyrin blunted survival advantage in Tg mice and resulted in acute graft rejection (n = 3). Increased carboxyhemoglobin levels were consistently noted in Tg mice. Comparisons of grafts at day 4 indicated that HO-1 overexpression was inversely associated with vasculitis/inflammatory cell infiltrate in both models. Hearts transplanted into Tg recipients showed decreased CD4(+) lymphocyte infiltration and diminished immune activation, as judged by CD25 expression. Thus, although local and systemic HO-1 overexpression improved allograft outcomes, systemic HO-1 led to a more robust protection and resulted in a significant blunting of host immune activation. This Tg mouse provides a valuable tool to study mechanisms by which HO-1 exerts beneficial effects in organ transplantation. |
An integrated pre-service course and content experience for those interested in a teaching career. Activities will include a focus on developing systematic observation skills and an overview of the dimensions of teaching. Students will participate in a minimum of 16 contact hours in P-12 classrooms with varied and diverse student populations. The field observations will take place in four settings: early childhood, elementary, middle, and high schools. The field observations will be used to support the connection of theory to actual practice. Students in EDUC 1301 must pass a criminal history background check and complete 16 hours of field observations in the public schools. Field observations will be scheduled during public school hours Monday-Thursday. Background checks and placements will be addressed during the first week of class.
An enriched, integrated, pre-service and content experience that provides an overview of schooling and classrooms from the perspectives of language, gender, socioeconomic status, ethnic/ethnicity, sexual orientation and academic diversity, and equity with an emphasis on factors that facilitate learning. Students will participate in a minimum of 16 contact hours in P-12 classrooms with varied and diverse student populations. Service learning will be used to support the connection of theory to the actual practice of developing meaningful learning experiences for diverse students. Students in EDUC 2301 must pass a criminal history background check and complete 16 hours of service learning in the public schools. Service Learning will be scheduled during public school hours Monday-Thursday. Background checks and placements will be addressed during the first week of class. |
Basic Autoflower Series
Basic Autoflower Series
This 7 week video series is broken up into 6 videos, 1 video per week (Week 6 & 7 are one video). Once you have germinated your seeds and have grown them through the seedling phase, you are ready to start week 1 in this series. Happy Growing!
Still need Additional Help with Growing your Cannabis Plants? Subscribe to one of our Patreon Rewards via the button above, to Unlock 1-on-1 Talk & Video Chats with a Grow Expert!
Week 1
Week 2
Week 3
Week 4
Week 5
Start Flushing
Weeks 6 & 7
*Once you have completed this series, you are ready to move on to the Harvest & Curving video section below. |
Q:
How to populate a dynamically added dropdownlist from a stronglyTyped Model
A lot of questions on SO are about using Ajax data to populate dropdownsList.
But, I already have the data in a strongly typed model that contains SelectList items. I want to use that to fill my dropdownlist - how do I do this?
So, after adding a new row to a table with a dropdownlist, how to populate/bind the newly cloned dropDownList from the data in the cities Model.
// List of cities in my Model, Location
LocationModel {
...
IEnumerable<City> Cities }
Cloned row: and in my view I cloned a row
<table id="rowtemplate">
<tr>
<td>
<input type="hidden" name="Records.Index" value="#" />
<span class="citiesCss">
//DropDownList to clone
<select class="form-control citiesCssId" id="Records_[#]__SelectedCityFromList" name="Records[#].SelectedCityFromList">
<option value="">Default</option>
</select>
</span>
</td>
<td> ... another cell
</td>
</tr>
</table>
How can I bind/populate the newly cloned dropdown from the CityList model values?
$("#CloneButton").click(function () {
var index = (new Random());
var clone = $('#rowtemplate').clone();
clone.html($(clone).html());
clone.find('.cities').text(cities);
$('#MainTable').append(clone.find('tr'));
});
A:
You can just create the options in your template based on your collection when the view is generated. Assuming Citycontains properties Id and Name, then
<table id="rowtemplate">
....
<select class="form-control citiesCssId" name="Records[#].SelectedCityFromList">
<option value="">Default</option>
@foreach(var city in Model.Cities)
{
<option value="@city.Id">@city.Name</option>
}
</select>
....
</table>
Now when you use var clone = $('#rowtemplate').clone(); to copy the template, the value of clone also includes the <option> elements
|
Photo Galleries
O’Donnell’s publicist and a spokesman for the Oprah Winfrey Network say the host of “The Rosie Show” told her studio audience about the engagement Monday during a commercial break. The Emmy Award-winning talk show host’s new program debuted in September. She tapes in Winfrey’s former Chicago studio.
Rounds is a 40-year-old headhunter for an information technology company. O’Donnell is a mother of four and was previously married. She and former partner Kelli Carpenter publicly wed in San Francisco in 2004, two weeks after the mayor authorized granting marriage licenses to same-sex couples. The licenses were later voided by the California Supreme Court. |
1. Field of the Disclosure
The present disclosure relates to a light guide plate and a related backlight module, and more particularly, to a light guide plate and a related backlight module with the optical microstructure to increase luminance and uniformity.
2. Description of the Prior Art
The light guide plate is utilized to transform a point light source into a planar light source. The lighting unit is disposed on the lateral surface of the light guide plate. The beam outputted from the lighting unit can enter the light guide plate and transmit out of the light emitting surface of the light guide plate to form the planar light source. The optical microstructure is selectively disposed on the low surface, the upper surface (the light emitting surface), the lateral surface (the light inputting surface) and the inner of the light guide plate for uniformity of the planer light source. The optical microstructure can be adapted to destroy total internal reflection of the light guide plate to guide the beam transmitted through the light emitting surface. The conventional optical microstructure includes the hemisphere structure, the V-cut structure and the R-cut structure, which have drawbacks of luminance nonuniformity, low luminance and edge leakage. |
Athamanika
Athamanika or Tzoumerka (Greek: Αθαμανικά or Τζουμέρκα) is a mountain range in northwestern Greece, part of the wider Pindus mountain range. Its highest point is the mountain Kakarditsa, at 2,429 m. Its length is approximately 40 km from north to south and its width is approximately 15 to 20 km from east to west. The only major road crossing the Athamanika is the Greek National Road 30 (Arta - Trikala - Karditsa - Volos).
Geography
The Athamanika is situated on the borders of the regional units of Arta, Ioannina, Karditsa and Trikala. It covers (part of) the municipalities North Tzoumerka, Central Tzoumerka, Pyli and Argithea.
It has a low population density. Forests dominate the low-lying areas of the mountain. Grasslands, shrubs and barren rocks dominate the higher elevations. The main rivers draining the Athamanika are the Arachthos in the west, and the Achelous in the east.
History
The Athamanika mountain range became the main base of the EDES resistance organization during the Axis occupation of Greece (1941-1944).
See also
List of mountains in Greece
References
External links
Greek Mountain Flora
Category:Landforms of Arta (regional unit)
Category:Mountain ranges of Greece
Category:Landforms of Ioannina (regional unit)
Category:Landforms of Trikala (regional unit)
Category:Landforms of Epirus (region)
Category:Landforms of Thessaly
Category:Pindus |
Therapeutic applications of the versatile fatty acid mimetic WY14643.
WY14643 - also known as pirinixic acid - is a versatile fatty acid mimetic that was originally developed as lipid lowering agent without knowledge of its molecular target. Various later studies discovered somewhat promiscuous activity of the compound on several receptors and enzymes. Pirinixic acid though never having reached clinical use was subjected to many in vivo studies and exerted beneficial effects in a variety of disease models. Areas covered: Inventions claiming the use of WY14643 for numerous indications ranging from the originally intended application in metabolic dysbalances over cancer and inflammation to some rare syndromes have been evaluated. Expert opinion: It is rather unlikely that pirinixic acid will gain relevance in treatment of metabolic diseases for which it was originally developed because more efficient and selective alternatives are available. Instead, several other claimed activities of the compound e.g. in inflammation, neurodegeneration and cancer seem very promising. However, some of the underlying studies are biased and for some effects of pirinixic acid, the molecular target and mode of action remain to be identified. |
A woman fatally shot a car burglary suspect Monday night in the parking lot of her northwest Houston apartment complex, police said.
The woman, who is eight months pregnant, told Houston police she shot the man about 9 p.m. after she spotted him breaking into her car parked outside the apartment in the 5900 block of Pinemont at Alabonson.
The man still had a screwdriver in his hand when the woman opened fire with a shotgun. The door lock to her car also had been popped open, officers at the scene said.
He was pronounced dead at the scene. The woman was still being questioned late Monday.
The shooting remains under investigation, Houston police said.
mike.glenn@chron.com |
/* TEMPLATE GENERATED TESTCASE FILE
Filename: CWE680_Integer_Overflow_to_Buffer_Overflow__new_fgets_03.cpp
Label Definition File: CWE680_Integer_Overflow_to_Buffer_Overflow__new.label.xml
Template File: sources-sink-03.tmpl.cpp
*/
/*
* @description
* CWE: 680 Integer Overflow to Buffer Overflow
* BadSource: fgets Read data from the console using fgets()
* GoodSource: Small number greater than zero that will not cause an integer overflow in the sink
* Sink:
* BadSink : Attempt to allocate array using length value from source
* Flow Variant: 03 Control flow: if(5==5) and if(5!=5)
*
* */
#include "std_testcase.h"
#define CHAR_ARRAY_SIZE (3 * sizeof(data) + 2)
namespace CWE680_Integer_Overflow_to_Buffer_Overflow__new_fgets_03
{
#ifndef OMITBAD
void bad()
{
int data;
/* Initialize data */
data = -1;
if(5==5)
{
{
char inputBuffer[CHAR_ARRAY_SIZE] = "";
/* POTENTIAL FLAW: Read data from the console using fgets() */
if (fgets(inputBuffer, CHAR_ARRAY_SIZE, stdin) != NULL)
{
/* Convert to int */
data = atoi(inputBuffer);
}
else
{
printLine("fgets() failed.");
}
}
}
{
size_t dataBytes,i;
int *intPointer;
/* POTENTIAL FLAW: dataBytes may overflow to a small value */
dataBytes = data * sizeof(int); /* sizeof array in bytes */
intPointer = (int*)new char[dataBytes];
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* may write beyond limit of intPointer if integer overflow occured above */
}
printIntLine(intPointer[0]);
delete [] intPointer;
}
}
#endif /* OMITBAD */
#ifndef OMITGOOD
/* goodG2B1() - use goodsource and badsink by changing the 5==5 to 5!=5 */
static void goodG2B1()
{
int data;
/* Initialize data */
data = -1;
if(5!=5)
{
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
}
else
{
/* FIX: Set data to a relatively small number greater than zero */
data = 20;
}
{
size_t dataBytes,i;
int *intPointer;
/* POTENTIAL FLAW: dataBytes may overflow to a small value */
dataBytes = data * sizeof(int); /* sizeof array in bytes */
intPointer = (int*)new char[dataBytes];
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* may write beyond limit of intPointer if integer overflow occured above */
}
printIntLine(intPointer[0]);
delete [] intPointer;
}
}
/* goodG2B2() - use goodsource and badsink by reversing the blocks in the if statement */
static void goodG2B2()
{
int data;
/* Initialize data */
data = -1;
if(5==5)
{
/* FIX: Set data to a relatively small number greater than zero */
data = 20;
}
{
size_t dataBytes,i;
int *intPointer;
/* POTENTIAL FLAW: dataBytes may overflow to a small value */
dataBytes = data * sizeof(int); /* sizeof array in bytes */
intPointer = (int*)new char[dataBytes];
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* may write beyond limit of intPointer if integer overflow occured above */
}
printIntLine(intPointer[0]);
delete [] intPointer;
}
}
void good()
{
goodG2B1();
goodG2B2();
}
#endif /* OMITGOOD */
} /* close namespace */
/* Below is the main(). It is only used when building this testcase on
its own for testing or for building a binary to use in testing binary
analysis tools. It is not used when compiling all the testcases as one
application, which is how source code analysis tools are tested. */
#ifdef INCLUDEMAIN
using namespace CWE680_Integer_Overflow_to_Buffer_Overflow__new_fgets_03; /* so that we can use good and bad easily */
int main(int argc, char * argv[])
{
/* seed randomness */
srand( (unsigned)time(NULL) );
#ifndef OMITGOOD
printLine("Calling good()...");
good();
printLine("Finished good()");
#endif /* OMITGOOD */
#ifndef OMITBAD
printLine("Calling bad()...");
bad();
printLine("Finished bad()");
#endif /* OMITBAD */
return 0;
}
#endif
|
That's her philosophy about dog training and the underpinning of Good Dog! Training—her 16-year-old business that opened its very first brick-and-mortar facility at 1575 Haslett Road in Haslett this fall.
"I'm not really working with dogs, I'm working with owners," says Smith. "While training of the dog is involved, it's really about teaching the owners how to train their dogs."
Smith started Good Dog! Training in 1998 after a need to train her dog gradually developed into a passion for the profession. Smith left her job in retail to teach classes through Doggy Day Care and Spa, and was subsequently recruited as a trainer for the Capital Area Humane Society. In the last few years, she returned to life as an independent trainer and concentrated on helping dog owners create lasting, trusting bonds with their pets.
Good Dog! Training offers basic, intermediate and advanced dog training classes; Canine Good Citizen certification training; and dog-and-people friend classes like agility, fly ball, rally, nose games and more. Specialty classes are available for shy dogs, aggressive dogs, and "bully" breeds, and private lessons can be arranged for dogs with temperament issues. Smith also offers a new "stay and train" service that provides busy clients the option to drop off their pet in the morning for a day of training and pick them up toward close of business.
"I think what people need to understand is that every time you interact with a dog, you're training it," says Smith. "Either the dog is training you, or you're training the dog."
Smith holds classes and one-on-one training in a repurposed 3,800-square-foot plaza storefront on the corner of Marsh and Haslett Roads. Before opening for business, she installed a rubber floor, painted, created a small waiting area, and decked out the windows with creative graphics. She also sectioned off a small retail area that offers tools and resources like leashes, harnesses, fitness products, and books.
Good Dog! Training will be holding a grand opening event in the near future. Old, new and interested customers are invited to attend and see what Smith says is the only facility in Greater Lansing set up exclusively for companion and pet dog training.
While the original plan for Dawne Botke's business was inspired by a psychic fair, no one could have predicted the longevity of Lansing's oldest new age bookstore.
In 1993, Botke opened Triple Goddess Bookstore with her mother and best friend. The bookstore operated from a repurposed farmhouse on Hamilton Road for two decades, fostering a symbiotic relationship with area businesses and restaurants. After her mother and best friend passed away, and when a redevelopment plan prompted her move, Botke relocated to build another trilogy on Lansing's East Side.
"We were lucky to be there for 20 years, but we're lucky now, too," says Botke. "I can walk to work now since I live in the neighborhood."
In early 2014, Triple Goddess began sharing storefront space with Everybody Reads and Creating Heroes Stephen's Way at 2019 E. Michigan Ave. Her 800-square-foot space is also easily accessible through an interior doorway to The Avenue—a popular music and gathering spot.
Triple Goddess carries an array of books and tools for growth and transformation, including music, herbs, candles, incense, statuary, smudge, crystals and jewelry. Customers can also find new and used books, journals and tarot cards; attend classes on new age topics; and have tarot card or astrology readings.
"I'm also doing a lot more collectibles now," says Botke. "That's one way that I'm fighting the Kindle revolution. They can't download me or collectibles."
New items include unique tarot cards and decks, and handcrafted gifts by local artists. Some of the artists, Botke says, are people she knew from her Okemos days, including an artist from the Nokomis Learning Center who makes 3-D dream catchers.
"One of the things I love about being here is that we're all banding together so it's one-stop shopping," says Botke. "And this block has a little bit of everything. You can get a haircut, have lunch or coffee, and come to us for a tarot reading. It's very friendly and awesome."
A specialty food and drink store in Okemos just got bigger thanks to the steady growth of clientele.
In early November, store owner and manager Curt Kosal doubled the footprint of Vine & Brew to 2,000 square feet. That extra footage, he says, will allow him to accommodate a wider selection of food, craft beer and wine, as well as to host occasional events.
"We saw the demand was there and wanted to offer our customers a bigger selection," says Kosal. "And now that we're in place, we'll be looking at new and collaborative events with area restaurants and other places."
Kosal opened Vine & Brew in early 2012 after amassing close to 20 years of experience working in the beverage industry. He and his wife, Leslie, took the leap and open the store, keeping the focus on small, boutique brands and Michigan products.
Vine & Brew only carries craft beers and boasts an extensive selection of Belgian brews. Customers can mix and match beers and create their own six-pack, as well as choose and create mixed cases from more than 1,000 wines. Specialty food items include Michigan chocolates, snack foods, and hand-made biscotti.
"Our focus is specialty items and smaller, boutique brands," says Kosal. "We work hard to go out and find those thing, often going directly to the distributor or manufacturer."
Kosal says he is always on the lookout for new products, and that the new space allows him room to grow and add inventory. Vine & Brew is located at 2311 Jolly Road, and has two staff in addition to the Kosals.
In keeping with their play-on-words, long-time friends Nick Sinicropi and Zach Corbin will "keep on truckin'" as they start serving up breakfast and lunch through a brick and mortar version of a popular food truck.
Good Truckin' Diner opened in early November, bringing artisan style diner fare to 1107 S. Washington Ave. in REO Town. The diner follows the success of Sinicropi's Good Truckin' Food truck that has wheeled out lunchtime fare since early summer.
And another word favored by Sinicropi?
"Potential," he says. "That's my one-word answer for why we came to REO Town."
Sinicropi says the sit-down diner wasn't in his plans for this year, but after being invited to tour the real estate, he was in. He noticed right away the positive vibe on S. Washington, and decided that REO Town wasn't the same neighborhood he remembered from coming-of-age on Lansing's Southside.
"I was really surprised when I came down here," says Sinicropi. "We want to get in on the ground floor and help build this area back up rather than coming in afterward."
Sinicropi knew the timing was right and joined forces with Corbin to get the restaurant moving. Leveraging his inclination for carpentry, Corbin gave the 800-square foot space an old-fashioned, industrial feel by using galvanized steel, a repurposed picket fence, old hubcaps, license plates and an Oldsmobile grill. He also framed two vintage state and city maps to enhance the hometown, automotive flair.
"Zach is really the mind behind the inside," says Sinicropi. "We wanted to keep the truck theme and he had some great ideas."
With décor in place, the diner began serving made-from-scratch meals for breakfast and lunch. Some creations are original, others are twists on traditional favorites. Plates run an average of $7.99 with popular fare including eggs and omelets, craft burgers, sandwiches, burritos and soups.
"Nick came up with a great menu," says Corbin. "He likes to get crazy, so you'll find things like a blacken burger with jalapeno cream cheese and habanero relish. We also have a Bourbon Street French toast with caramelized bananas."
Good Truckin' Diner seats 28, created five new restaurant jobs, and is open for breakfast and lunch every day but Monday.
As the owner of three party stores, Sam Shango instantly recognized the need for a specialty adult beverage shop in downtown Charlotte.
After a few months of searching, Shango found the right space at the right time. With a little ingenuity, a little marketing, and a lot of applied knowledge, Shango opened the doors to Cork and Bottle in early October and brought an outlet for craft beer, wine and liquor to the town 30 minutes southwest of Lansing.
"It's not your average party store," says Shango. "We have 5,200 square feet of micro brews, wines from local regions, and craft liquors. Anything made in Michigan, you'll find here."
For Shango, it's all about location, location, location as well as selection, selection, selection. The vacated grocery store a few blocks west of Charlotte's business district provided ample visibility, while the space itself was easily adaptable to products displayed in warehouse style.
"When it comes to stores like this it's not so much about the physical store, it's what inside," says Shango. "We're a specialty place, and we're all about the product."
Originally from Detroit, Shango settled in Greater Lansing after attending college in the area. He's both a wine sommelier and a beer cicerone, and trains his staff in the finer points of adult beverages.
"If you come in here and you're looking for a particular type of wine, we'll find you a bottle that will suit you taste," he says. "We'll do that with beer and liquor, too, and we'll win you in quality and price."
Shango loves the regional trends he's seeing in beer, wine and liquors, particularly when it gives him the opportunity to meet the people who make the product.
"We actually 'sell' the people along with the beverage," remarks Shango. "It's a good feeling to be able to tell customers about the people who make the beer, wine or liquor, and to help them succeed, too."
Cork and Bottle also carries basic pantry staples and convenience foods. The store created 11 jobs and became Shango's fourth operation behind similar stores like the Rainbow Party Store in DeWitt, St. Johns and Detroit. He's currently looking to expand his concept across mid-Michigan.
You could call it a "son and pop shop." Or a "son and pop and sister" shop.
Located in a 900-square-foot free-standing building just outside the city square, Mason Computer Repair offers personalized service on sophisticated electronics while keeping it all in the family.
Matt LaClear opened the repair shop in mid-October with his sister Danielle Peffers and his son Jordan Strayer. The three also run a marketing business out of the building, zeroing in on the advertising, marketing and social media needs of small businesses.
"Working from home just wasn't conducive anymore," says LaClear who moved his business operations into the previous Tiki Jim's Hawaiian Food Hut at 100 State Street. "I needed the 'lair' to get away from my kids."
LaClear says Strayer, his eldest of seven children, has always been into computer repair, and monitored what his dad could "throw away" when computers went awry or upgrades were pending.
"He was always piecing them back together," says LaClear who been a business owner for 25 years. "He's been at it a long time."
Mason Computer Repair had served more than 75 customers in its first few weeks of business. The business specializes in residential and commercial repair of computers, as well as small electronics like cell phones and video game consoles. Repairs are typically done on-site, with some house calls on request.
Many computer problems, LaClear says, relate to software viruses, or to simple, fixable things like a broken hinge or screen on a laptop. He says sometimes all it takes is a simple repair that run no more than $75 to get a computer back up to speed.
"I used to be like everyone else and wanted to upgrade," says LaClear. "But with seven kids and needing to be economically-minded, I realized that you can have a five-year-old computer and it can do most everything you need it to if you maintain it properly."
In a region that often laments the "brain drain" of local talent, one entrepreneur is bucking the trend by setting her sights on the local eye care industry.
In mid-July, Dr. Jamie Norton purchased an existing eye care business and positioned a newly rebranded practice to grow and provide vision care for the local community.
Located at 4660 S. Hagadorn Road in the East Lansing Eyde Building, Norton Eye Care occupies about 3,000 square feet, employs four staff, and serves about 3,000 patients.
"This is exactly where I need to be to take care of people and start my practice," says Norton. "I want to be accessible and available to patients with hours that are convenient for them."
Norton graduated from the Michigan College of Optometry at Ferris State University and has been a practicing optometrist in Greater Lansing for more than six years. During that time, the Alpena native became increasingly attached to her patients as well where she lived and worked.
"My husband and I considered moving to a different area to open up a practice, but I'm very comfortable and happy here," says Norton. "It's hard to think of not being here to take care of my patients."
Norton sees patients of all ages beginning with children as young as 6 months old. Her certified optical team has more than 60 years of combined experience, and provides assistance with eye care and eye wear needs.
Norton's office suite is on the first floor of a six-story building populated with medical and like-minded service professionals. That, she says, adds to the convenience factor, with many of her patients stopping in after other appointments with questions on eye wear or eye care. The practice boasts one of the largest eye wear dispensaries in the area with more than 500 selections, including brands such as Gucci, Ogi and Vera Wang.
"It's a very modern in here," says Norton. "We have lots of windows and open spaces for people to move around."
They tried one store. Then opened a second. Now the Lansing-area family will launch a third venture in Lansing, building on the name recognition and quality reputation of a quick-casual restaurant.
In November, a husband, wife and two brothers opened a new Penn Station East Coast Subs at 5417 W. Saginaw, Suite B. The store is among the eight that Mark, Cheryl, Jeff and Chris Kellogg aspire to own in Lansing and Southeast Michigan, and follows Frandor and Okemos locations opened within the last two years.
"While there are a lot of sub concepts out there, we hear day after day about the quality of the sandwiches," says Mark Kellogg. "That reinforces our thought that Penn Station is one of the better products out there."
Kellogg says he and his spouse, Cheryl, were looking for business opportunities and stumbled upon Penn Station after visiting a friend who owned a franchise in their hometown of Coldwater. They were so impressed with the quality of the hot and cold subs, the made-to-order fries, the hand-squeezed lemonade, and fresh-baked chocolate chunk cookies that they decided to bring the concept to Lansing.
"Penn Station knows what they're good at and don't try to deviate from that," says Kellogg. "They've been around for about 25 years and their track record is very strong."
Penn Station was originally founded in Cincinnati, Ohio, has more than 235 restaurants in 13 states. Michigan is a targeted expansion state, and the Kelloggs brought the first franchise to Lansing. The 1,800-square foot restaurant near the Lansing Mall seats 45 people and created 20 part- and full-time jobs, similar to the other two Greater Lansing locations.
"We were excited about being able to bring Penn Station here," says Kellogg. "Cheryl and I have been in Lansing since 1985 and we're appreciative of the Lansing community and how they contribute to our success."
Jeff Chaffin believes that even the best athlete needs coaching to continue to improve. And he applies that analogy to the world of business.
Working from a small office suite in downtown Lansing, Chaffin helps successful business leaders work through big challenges that may be standing in the way of peak performance. It's a calling he's been attracted to throughout his business career. So in early 2014, Chaffin opened the doors to The Executive Influence Coaching and Consulting at 120 N. Washington Square and applied his experience as a certified professional business coach.
"There are certain things that can happen as a company grows, including reaching a point where they encounter roadblocks or get stuck," says Chaffin. "We work with owners who tell us the life they are leading today isn't what they envisioned when they were getting off the ground."
Chaffin says small businesses face issues similar to those of large firms. Sales growth, marketing, recruitment and retention, and succession planning are just a few. And while large companies have access to more resources to address challenges, smaller companies don't have as many to draw on.
That, says Chaffin, is where executive coaches come in.
"We can help smaller businesses get to where they want to be," says Chaffin. "We follow their goals and their priorities. I don't come in telling them what they should do. We work with their vision. And we get results."
Chaffin enjoys consulting with small businesses, as well as with owners and employees. He welcomes the challenge of helping organizations find solutions, fix situations, and stay on the pathway to growth. He meets regularly with about 10 companies on a wide variety of issues. Those companies range in size from five to 600, with revenues from three-quarter of a million up to $50 million.
Chaffin works with two part-time assistants in the 600-square-foot office that includes access to three shared conference rooms. And his goals as a business owner?
"We want to make Lansing our center of operations," he says. "We can grow east, west and south, but I want this to be the hub. I love this area. It's ideal."
While the décor is minimal, the newest nail salon and spa in Okemos has rapidly gained a reputation for services that exceed expectations.
Linh Phan opened A Perfect Ten Nails and Spa in mid-summer after months of remodeling the space at 2160 W. Grand River to exacting specifications. With cool white walls, golden accent lights, a line of comfortable chocolate chairs, and a panel of sheer aqua room dividers, A Perfect Ten provides a relaxing setting for top-of-the-line manicures and pedicures.
"Everything is personal and nothing is shared with another customer," says Linh Phan, manager/partner-owner. "Everything is personalized and nothing is shared with another customer. It's a very clean and relaxing place."
As a professional nail technician, Phan decided to start her own business as her daughter grew up and went on to attend medical school. Originally from Vietnam, Phan came to the United States in 1993, attended beauty college in Georgia, and moved to the Okemos-East Lansing area in 2002.
Phan says she loves being close to Michigan State University. That sense of comfort is reflected in the environment she's created for her customers—one that's relaxing, attentive and based on customer service.
A Perfect Ten carries up to 400 colors of OPI nail polish. Manicures take 30 to 45 minutes depending on whether customers go for the "no-chip" polish. Pedicures take up to 45 minutes, with customers having the option to add a hot rock massage.
"We do our personal best," says Phan. "I've been in the field a long time and love being here."
Phan hired four technicians when she opened the 2,000-square foot space. She hopes to hire more as her customer base grows.
Denise Krumm knew her dance business had kicked into high gear when her customers lined the hallways, waiting for the next class.
"I looked at my husband and said, 'we're packed in here like sardines,'" she says. "I knew we needed to expand."
In October, Krumm unveiled the new, expanded location for Kick It Out Dance Studio at 1760 E. Grand River Ave., in East Lansing. Just a mile or so from her original studio on Haslett Road, the new space more than doubles the studio's square footage from 1,000 to 2,200, and enables Krumm to continue offering dance and fitness programs to students of all ages and abilities.
Krumm launched Kick It Out Dance in July 2012. Starting her own studio was a natural progression in her life-long pursuit of dance and allowed her to coach, teach and educate others in the art of dance.
Kick It Out started with 14 students. In the second year Krumm counted 35. In 2014, 63 students came to Krumm's studio for courses in jazz, hip hop, tap, lyrical, contemporary and ballet, as well as fitness courses and workouts in Zumba, Zumba Toning, pound fit, and PiYo. Courses are tailored for students ages 2 through adult, and can follow both recreational and competitive pathways.
"Everybody has something to offer and to bring to the program," says Krumm. "That's part of our philosophy. I came from a very family-oriented studio and try to carry that through with my own business."
Krumm painted her new studio in her signature colors of dark purple and neon green. The bright, airy space includes two studio rooms with custom-built sprung dance sub floors, additional studios with Harlequin Cascade Marley floors, a spacious lobby, and rooms for students to do homework and store their personal items. Visitors and waiting parents can enjoy music, television and WiFi in the lobby.
"People just love the new studio," says Krumm. "It's a nice feeling to hear people say 'wow, this is nice.'"
The studio has added six employees since opening two years ago. The current staff of 13 includes six dance instructors, two assistant dance instructors and five fitness instructors.
Although November harkens the start of winter festivities, one new retailer in Williamston believes that parties aren't bound by the season.
Melissa Cogswell opened The Party Shoppe in mid-October as a way to expand the 10-year-old home-based business she co-owns with Amy Cogswell. She says the brick-and-mortar store at 151 E. Grand River offers a unique selection of party supplies for themed and all occasions, including plates, cups, napkins, table ware, latex and foil balloons, balloon bouquets, gift bags, tissue paper, bulk and nostalgic candy, a variety of cold drinks and gourmet sodas, and fresh popped popcorn. Party planners can also rent bounce houses and machines that make popcorn, cotton candy and sno-cones, and hire face-painters and balloon twisters through the 600-square foot, boutique-style shop.
"We're here to help people have fun," says Cogswell. "At the end of the day, that's all that matters."
Cogswell says she and Amy got into the party business as an offshoot of their graphic design careers. The two soon built a loyal clientele as face painters and balloon twisters at parties and school events. When clients began clamoring for bounce houses and carnival-style food machines, Cogswell added rentals to the mix and found herself in full-time party mode.
The Party Shoppe, Cogswell says, services gatherings that range in size from 10 to the 100s. Equipment rentals come with free delivery and set-up, as well as on-the-spot instruction for how to make the best popcorn, cotton candy and sno-cones.
"We joke that we're in more birthday and party photographs than anyone else," says Cogswell. "It's a wonderful business to be in."
Chelsea Brown can't remember a time that someone in her family wasn't doing some type of art. So for her, it was a natural progression to follow her dad into the tattoo business by co-owning and managing a new shop in East Lansing.
Brown and her father, Bill, opened Ink & Needle in August. The Brown family also owns two other tattoo shops in Greater Lansing, including Southside Tattoo and Noble Ink.
"Everyone in my whole family is into art," says Brown. "My dad has always drawn as a hobby, and one day, he just decided to go for it and turn it into a career."
Ink & Needle offers residents and visitors to East Lansing a cozy and relaxing environment for getting a tattoo or piercing. The 1,200-square-foot space at the corner of Abbot and Albert has booths and chairs to accommodate up to four tattoo clients, plus a private piercing room.
The shop employs four tattoo artists and a full-time piercer. Brown herself is learning the trade by apprenticing with her father. She hopes to be ready to apply her skills by next April.
"It's nerve wracking and exciting at the same time," says Brown of learning from her dad. "He does amazing work. It's a nice bonding experience, and it's cool he can pass on his knowledge to me."
Brown says that her dad is considered among the best in the area for cover-ups. The other artists at the shop specialize in custom designs. Customers can view employee portfolios and choose the artist they want to do the work. Tattoos can take as little as 10 minutes or as long as eight hours. Some clients, depending on the design, may return for multiple sessions. Free touch-ups are also provided on all Ink & Needle work.
"We always like to make sure that the customer leaves with a great experience, not just a great tattoo," says Brown. "We make it about the client and not the shop. I really love art and giving people artwork that they can cherish forever."
He believes so strongly that he brought a revolutionary fitness program to his Lansing gym and became one of about 90 specialized and credentialed strength trainers in the United States.
In mid-October, Kurisko hung a banner on Black Iron Training proclaiming the facility's status as a "Starting Strength Gym." It's a designation, he says, that is claimed by only one other gym in Michigan.
"Starting Strength is a very unique and detailed approach to strength training that focuses on proper form and technique and how to effectively do each exercise," says Kurisko. "It's very well regarded and a growing movement in the fitness industry."
The Starting Strength training system is designed to safely and efficiently improve strength through barbell exercise. Developed by competitive power lifter and Olympic weight lifting coach Mark Rippetoe, the system leverages basic movements that work the entire body and gradually increases weight loads to make the whole body stronger.
Kurisko launched Black Iron Training in 2011 with the number one goal of helping individuals build strength—a focus he says aligns perfectly with the Starting Strength philosophy. After building a base of about 100 clients, he moved from his original 600-square-foot facility in April 2013 to 3233 Saginaw Highway, doubling the gym's size to about to 1,200 square feet.
"I think that people genuinely want to feel better, feel healthier, and want to take care of themselves," says Kurisko. "It's an underlying urge that we all have to be able to take care of ourselves the best we can."
Kurisko plans to add one or two private classes for beginners, and is also looking to bring on one or two staff as interest grows. Clients train using weights, barbells, platforms and racks, and range in age from 12 to 80. All instruction is private, by appointment, and done under the guidance of a professional coach.
"I'm working hard to get the message across the strength is for everyone and the foundation for all fitness," says Kurisko. "We're going to teach people how to do things correctly and how to follow a plan so they can progress toward their goals."
Chances are you can have it your way or at least one of 17 million ways at a food franchise new to Mid-Michigan.
Nourish by The Big Salad opened in early October, offering made-to-order salads, soups, sandwiches, smoothies and specialty drinks. Located inside Alive, a health park run by Hayes Green Beach Memorial Hospital, the Charlotte location is the sixth restaurant in the Royal Oak-based chain. It's also the first in The Big Salad franchise that's located in a smaller market outside of Southeast Michigan.
The possibility of 17 million choices, CEO and founder John Bornoty says, comes from a make line of fresh ingredients that includes three different types of lettuce, 32 toppings, five meats and 29 dressings.
"Our generation not only wants healthy eating, they want food the way they want it," says Bornoty. "We are accustomed to choices and everyone wants things customized."
CEO Patrick Sustrich of Alive agreed, and says that Nourish by The Big Salad is a great model that meshes perfectly with the Charlotte health park. Alive had been looking for an outside restaurant to house inside the facility for several years. So when Sustrich heard about The Big Salad and their mission of promoting health and wellness, he invited Bornoty to partner with Alive and its existing cafe.
"Food service is a critical piece to helping people be and stay healthy," says Sustrich. "And it's something that can attract people to our building and keep them here for events, conferences and functions. Now with the new restaurant, we have people coming here just for lunch."
Although other Big Salads serve areas with populations of 100,000-plus, the small-town location in Charlotte represents an additional growth strategy for the chain.
"We love the model of what we're doing with Alive," says Bornoty. "We want to expand on the micro-franchise concept and take it to airports and hospitals. There's lots of opportunity in Michigan, and we're a Michigan-based company."
Nourish by The Big Salad employs 10 people and can seat up to 40 diners in the 700-square foot space. Take out is also available, with options to order online or through kiosks throughout Alive.
"You're not limited to sitting in Nourish by The Big Salad," says Sustrich. "We have people who find spots to sit and eat along our walking path, in our beautiful gardens, and other areas in our 65,000-square foot facility." |
package cbn
//Licensed under the Apache License, Version 2.0 (the "License");
//you may not use this file except in compliance with the License.
//You may obtain a copy of the License at
//
//http://www.apache.org/licenses/LICENSE-2.0
//
//Unless required by applicable law or agreed to in writing, software
//distributed under the License is distributed on an "AS IS" BASIS,
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
//See the License for the specific language governing permissions and
//limitations under the License.
//
// Code generated by Alibaba Cloud SDK Code Generator.
// Changes may cause incorrect behavior and will be lost if the code is regenerated.
import (
"github.com/aliyun/alibaba-cloud-sdk-go/sdk/requests"
"github.com/aliyun/alibaba-cloud-sdk-go/sdk/responses"
)
// EnableCenVbrHealthCheck invokes the cbn.EnableCenVbrHealthCheck API synchronously
// api document: https://help.aliyun.com/api/cbn/enablecenvbrhealthcheck.html
func (client *Client) EnableCenVbrHealthCheck(request *EnableCenVbrHealthCheckRequest) (response *EnableCenVbrHealthCheckResponse, err error) {
response = CreateEnableCenVbrHealthCheckResponse()
err = client.DoAction(request, response)
return
}
// EnableCenVbrHealthCheckWithChan invokes the cbn.EnableCenVbrHealthCheck API asynchronously
// api document: https://help.aliyun.com/api/cbn/enablecenvbrhealthcheck.html
// asynchronous document: https://help.aliyun.com/document_detail/66220.html
func (client *Client) EnableCenVbrHealthCheckWithChan(request *EnableCenVbrHealthCheckRequest) (<-chan *EnableCenVbrHealthCheckResponse, <-chan error) {
responseChan := make(chan *EnableCenVbrHealthCheckResponse, 1)
errChan := make(chan error, 1)
err := client.AddAsyncTask(func() {
defer close(responseChan)
defer close(errChan)
response, err := client.EnableCenVbrHealthCheck(request)
if err != nil {
errChan <- err
} else {
responseChan <- response
}
})
if err != nil {
errChan <- err
close(responseChan)
close(errChan)
}
return responseChan, errChan
}
// EnableCenVbrHealthCheckWithCallback invokes the cbn.EnableCenVbrHealthCheck API asynchronously
// api document: https://help.aliyun.com/api/cbn/enablecenvbrhealthcheck.html
// asynchronous document: https://help.aliyun.com/document_detail/66220.html
func (client *Client) EnableCenVbrHealthCheckWithCallback(request *EnableCenVbrHealthCheckRequest, callback func(response *EnableCenVbrHealthCheckResponse, err error)) <-chan int {
result := make(chan int, 1)
err := client.AddAsyncTask(func() {
var response *EnableCenVbrHealthCheckResponse
var err error
defer close(result)
response, err = client.EnableCenVbrHealthCheck(request)
callback(response, err)
result <- 1
})
if err != nil {
defer close(result)
callback(nil, err)
result <- 0
}
return result
}
// EnableCenVbrHealthCheckRequest is the request struct for api EnableCenVbrHealthCheck
type EnableCenVbrHealthCheckRequest struct {
*requests.RpcRequest
ResourceOwnerId requests.Integer `position:"Query" name:"ResourceOwnerId"`
CenId string `position:"Query" name:"CenId"`
HealthCheckTargetIp string `position:"Query" name:"HealthCheckTargetIp"`
HealthyThreshold requests.Integer `position:"Query" name:"HealthyThreshold"`
VbrInstanceOwnerId requests.Integer `position:"Query" name:"VbrInstanceOwnerId"`
VbrInstanceRegionId string `position:"Query" name:"VbrInstanceRegionId"`
ResourceOwnerAccount string `position:"Query" name:"ResourceOwnerAccount"`
OwnerAccount string `position:"Query" name:"OwnerAccount"`
OwnerId requests.Integer `position:"Query" name:"OwnerId"`
HealthCheckSourceIp string `position:"Query" name:"HealthCheckSourceIp"`
HealthCheckInterval requests.Integer `position:"Query" name:"HealthCheckInterval"`
VbrInstanceId string `position:"Query" name:"VbrInstanceId"`
}
// EnableCenVbrHealthCheckResponse is the response struct for api EnableCenVbrHealthCheck
type EnableCenVbrHealthCheckResponse struct {
*responses.BaseResponse
RequestId string `json:"RequestId" xml:"RequestId"`
}
// CreateEnableCenVbrHealthCheckRequest creates a request to invoke EnableCenVbrHealthCheck API
func CreateEnableCenVbrHealthCheckRequest() (request *EnableCenVbrHealthCheckRequest) {
request = &EnableCenVbrHealthCheckRequest{
RpcRequest: &requests.RpcRequest{},
}
request.InitWithApiInfo("Cbn", "2017-09-12", "EnableCenVbrHealthCheck", "Cbn", "openAPI")
return
}
// CreateEnableCenVbrHealthCheckResponse creates a response to parse from EnableCenVbrHealthCheck response
func CreateEnableCenVbrHealthCheckResponse() (response *EnableCenVbrHealthCheckResponse) {
response = &EnableCenVbrHealthCheckResponse{
BaseResponse: &responses.BaseResponse{},
}
return
}
|
---
abstract: 'To each of the Johnson, Grassmann and Hamming graphs we associate a lattice and characterize the eigenspaces of the adjacency operator in terms of this lattice . We also show that each level of the lattice induces in a natural way a tight frame for each eigenspace. For the most important eigenspace we compute explicitly the constant associated to the tight frame. Using the lattice we also give a formula for the product of the Norton algebra attached to that eigenspace.'
author:
- 'C. Maldonado$^\dag$ and D. Penazzi\*'
title: |
Lattices and Norton algebras of\
Johnson, Grassmann and Hamming graphs
---
\#1[p\_[1,1]{}\^[\#1]{}]{} Ł \#1\#2[\_[ q]{}]{}
\#1)[\_[\#1]{}]{}
[^1]
05E30,06D99,17D99
Johnson, Grassmann, Hamming, lattice, adjacency operator, tight frame, Norton algebra
Introduction
============
Distance regular graphs are important in Algebraic Combinatorics [@BCN] and have been generalized into other combinatorial objects such as association schemes [@Godsil; @MT]. Some classical examples include the Johnson, Grassmann and Hamming graphs. Diverse algebras are associated to them, see for instance the Terwilliger Algebra in
[@BST; @C; @CD; @HKM; @KLW; @LMP2006; @T]. Another algebra involved to such schemes is the Norton Algebra. In the 1970’s Norton constructed some commutative nonassociative algebras (called “Norton Algebras" by Conway and by Smith in [@Smith]), whose automorphism groups contain finite groups generated by 3-transpositions, and in [@CGS] this notion of algebra was applied to the case of an algebra constructed on the eigenspaces of the adjacency operator of an association scheme. (As is well known, related to this, Griess constructed the Monster simple group [@Griess] as the automorphism group of a commutative nonassociative algebra of dimension 196883+1. This algebra is known as the Monster algebra but also as the Conway-Griess-Norton algebra.)
In a recent work [@LMP], we have studied the Norton algebra (in the sense of [@CGS]) related to the dual polar graphs. While studying this problem we realized that the construccion of a lattice associated to these spaces was helpful and that it has some interesting properties of its own . In particular the eigenspaces of the adjacency operator of the graph can be reconstructed from the lattice (see below). We wanted to extend these lattice results to the case of the Johnson, Grassmann and Hamming graphs, since there are some technical differences between them and the dual polar graphs. Using this framework, we also study their Norton Algebras.
Let $X$ be the set of vertices of these graphs. The adjacency operator $\L$ of the set of functions $\RR^{X}=\{ f:X
\rightarrow \RR\}$ induced by the distance on the graph gives a decomposition of $\RR^{X}$ into eigenspaces of $\L$.
We construct a graded lattice associated to the graph and characterize the eigenspaces of $\L$ in terms of this lattice (Theorem \[eigen\]).
We show that the elements of each level of the lattice induces in a natural way a tight frame for each eigenspace (Theorem \[tightframe\]). For references about the theory of finite normalized tight frames see for example [@BF; @FMRHO; @KC1; @KC2; @VW1; @VW2].
The eigenspace $V_1$ corresponding to the second largest eigenvalue of $\L$ is of particular importance since one can reconstruct the whole graph from the projections of the canonical basis onto it. We explicitly compute the constant of the tight frame attached to $V_1$.(Proposition \[lambda1\])
We use these and other constants associated to the lattice to give a formula for the product of the Norton algebra attached to $V_1$.(Theorem \[nortonproduct\]).
This article is organized as follows: In Section \[def\] we give definitions. In Section \[ldpg\], we define the lattice. In section \[embedding\], we give a convenient description for the eigenspaces $V_i$ of $\L$. The technical Proposition \[arribayabajo\] is crucial for the proof of Theorem \[eigen\]. In Section \[Frames\] we obtain tight frames and calculate the different\
constants associated to them for each of the cases Johnson, Grassmann and Hypercube. In Section \[norton\] we compute the Norton product using these constants.
Definitions {#def}
===========
Distance regular graphs and their Adjacency algebras
----------------------------------------------------
[@BI]\[drg\]
Given $\Gamma=(X,E)$ a graph with distance $d(\ ,\ )$ we say that it is distance regular if for any $(x,y) \in X\times X$ such that $d (x,y)=h$ and for all $i,j\ge 0$ the cardinal of the set $\{z \in X \mid
d (x,z)=i \ \mbox{and}\ d (y,z)=j \}$ is a constant denoted by $p_{ij}^h$ which is independent of the pair $(x,y).$
Let $\Gamma=(X,E)$ be a distance regular graph of diameter $d$. Let $Mat_{X}(\RR)$ denote the $\RR$-algebra of matrices with real entries, where the rows and columns are indexed by the elements of $X$. For $0 \leq i \leq d$, the [*ith adjacency matrix*]{} of $\Gamma$ is: $ (A_i)_{xy} = \left \{ \begin{array}{ll}
1 & \mbox{if} \ d(x,y)=i \\
0 & \mbox{if} \ d(x,y)\neq i
\end{array}
\right. $. It is easy to see that the adjacency matrices satisfy:
(i’) $A_0=I$ where $I$ is the identity matrix; (ii’) $A_0+\dots +A_d=J$ where $J$ is the all $1' s$ matrix; (iii’) $ A_iA_j=\sum_{h=0}^d p_{ij}^h A_h \ (0\leq i,j \leq d)$; (iv’) ${A_i}^t=A_i$. Thus $A_0,\dots, A_d$ form a basis for a subalgebra $\mathcal{A}$ of $Mat_{X}(\RR)$ called the [*adjacency algebra*]{} of $\Gamma$.
Recall that there exists a decomposition $\RR^X=\oplus_{j=0}^{d}
W_j$ where $\{W_j\}_{j=0}^{d}$ are common eigenspaces of $\{A_i\}_{i=0}^{d}$. Let $p_i(j)$ the eigenvalue of $A_i$ on the eigenspace $W_j$. By Proposition 1.1 of section 3.1 of Chapter III of [@BI], $\{A_i\}_{i=0}^{d}$ and the eigenvalues $\{p_i(j)\}_{i,j=0}^{d}$ of a given $\Gamma$ satisfy: $ A_i=v_i(A_1) , \quad
p_i(j)=v_i(\theta_j),$ where $\theta_j=p_1(j)$, and $\{v_i\}_{i=0}^{d}$ are polynomials of degree $ i$. We will order the decomposition according to $\theta_0 > \theta_1
>...>\theta_d$. In Theorem 5.1 of III.5 of [@BI], one can find formulas for the polynomials associated to each $\Gamma$.
We will use the standar notations concerning the space of functions $\RR^X$:\
i) $\mathbf{0}$ will denote the constant $\mathbf{0}(x)= 0 , \forall \ x \in
X$, ii) the same for the constant $\mathbf{1}$, iii) $<f,g>:=\sum_{x\in
X}f(x)g(x)$, iv) $||f||^{2}:=<f,f>$, v) for $U\subseteq \RR^X$, $U^{\perp}=\{f \in \RR^X :\ <f,g>=0 \ \forall \ g \ \in U\}$.
In addition, for ease of writing, we will use the following notation due to Iverson and Knuth ([@I; @K]).
(Iverson Bracket)
For any statement $P$, let $[P]=\begin{cases} 1 &
\mbox{if}\ P\ \mbox{is true.}\ \cr 0& \mbox{if}\ P \ \mbox{is
false.}\
\end{cases}
$
\[definicionA\] Let $\L:\RR^X\mapsto \RR^X$ denote the adjacency operator defined by $$\L(f)(x)=\sum_{y\in X}[d(x,y)=1]f(y)=\sum_{y\in X :\ d(x,y)=1}f(y)$$
Observe that $
\L (f)(x)
=\sum_{y\in X}(
A_1)_{xy}f(y)$. Then $\{W_j\}_{j=0}^{d}$ are eigenspaces of $\L$ with $\theta_j$ as corresponding eigenvalues.
$\L$ is symmetric and it holds that $<\L(f),g>=<f,\L(g)>$.
Johnson, Grassman and Hypercube graphs {#dpg}
--------------------------------------
We define the distances regular graphs that we will use in the rest of the paper.[@BCN]
[*Johnson graph*]{} The vertex set of $J(n,k)=(X,E)$ ($2k \leq n $) is the set of all $k$ -subsets of $[n]=\{1,...,n\}$, two vertices $x,y \in X $ being adjacent if and only if $|x\cap y|= k-1$ and as a consequence $d(x,y)=j \Leftrightarrow |x\cap y|= k-j. $ $J(n,k)$ has diameter $d=k$.
[*Grassman graph*]{} Let $V$ be an n-dimensional vector space over a field $F$ of $q$ elements. The vertex set of $J_q(n,k)=(X,E)$ is the collection of linear subspaces of $V$ of dimension $k$. Two vertices $x,y \in X $ are adjacent if and only if $dim(x\cap y)= k-1$ and clearly $d(x,y)=j \Leftrightarrow \ \dim (x\cap y)= k-j. $ $J_q(n,k)$ has diameter $d=k$.
Take $S$ a set with two elements. The vertex set of\
$H(n,2)=(X,E)$ is $S^n= \times _{i=1}^n S$ the cartesian product of $n$ copies of $S$, two vertices $x,y \in X $ being adjacent if and only if they differ precisely in one coordinate and therefore $d(x,y)=j \Leftrightarrow x $ and $y$ differ precisely in $ j $ coordinates. $H(n,2)$ has diameter $d=n$.
Lattice
-------
We recall the following definitions (see [@Stanley]) and in the next section we associate a lattice to each one of the distance regular graphs previously defined.
- A partial order is a binary relation “$\leq$” over a set P which is reflexive, antisymmetric, and transitive.
- A partially ordered set (poset) $(P,\leq)$ is a set $P$ with a partial order $\leq$.
- A lattice $(\La,\leq,\wedge,\vee)$ is a poset $(\La,\leq)$ in which every pair of elements $u, w \in \La$ has a least upper bound and a greatest lower bound. The first is called the join and it is denoted by $u\vee w$ and the second is called the meet and it is denoted by $u\wedge w$.
- A bounded lattice has a greatest (or maximum) and a least (or minimum) element, denoted $\hat{1}$ and $\hat{0}$ by convention.
Lattice associated with Johnson, Grassman and Hypercubes graphs {#ldpg}
===============================================================
[**Johnson graph**]{} $J(n,k)$
$\bullet$ For $j=0,...,k$ let $\Omega_j$ be the vertex set of $J(n,j)$ and $\Omega_{k+1}:=\{\hat 1\}$ where $\hat 1=[n]$
$\bullet$ $\La=\cup_{\ell=0}^{k
+1}\Omega_\ell$ and for $x,y \in \La$ , $x \leq y \
\Leftrightarrow x \subseteq y $.
$\bullet$ With that order $\La$ is a lattice with: $x\wedge \ y=x\ \cap \ y,\ x\ \vee\ y=\left \{ \begin{array}{ll}
\!\! x \cup y &\mbox{if} \ |x \cup y |\leq k \\
\!\! \hat 1 &\mbox{if not}
\end{array}
\right. $
[**Grassman graph $J_q (n , k)$**]{}
$\bullet$ For $j=0,...,k$ let $\Omega_j$ be the vertex set of $J_q (n,j)$ and $\Omega_{k+1}:=\left\{\hat 1\right\}$ where $\hat 1=V$
$\bullet$ $\La=\cup_{\ell=0}^{k
+1}\Omega_\ell$ and for $x,y \in \La$ , $x \leq y \
\Leftrightarrow x \subseteq y $
$\bullet$ With that order $\La$ is a lattice with: $$x\wedge y=x \cap y\ ,\ x\vee y=\left \{ \begin{array}{ll}
& span \left\{x \cup y \right\}\ \mbox{if} \ dim(span\ \left\{x \cup y\right\} )\leq k \\
& \hat 1 \ \mbox{if not}
\end{array}
\right.$$
[**The Hypercube $H(n,2)$**]{} has as vertex set all words of length $n$ with symbols taken from a set of $2$ elements. We will take as our set of two elements the set $\{1,-1\}$, (instead of looking at words of $1$’s and $0$’s, as is traditional).
Let $e_i$ be the vector with $n$ coordinates that has a $1$ in position $i$ and $0$ elsewhere, and let $f_i=-e_i$. Then, each word in $H(n,2)$ is simply a sum of some $e_i$’s ($i\in I$) and some $f_j$’s,($j\in J$) with the only restrictions on $I $ and $J
$ that $I \cap J =\emptyset$ and $I \cup J =[n]$. Then the lattice associated is the following:
$\bullet$ For $0 \leq \ell \leq n $ we set $\Omega_\ell=\{\sum_{\{i \in I\}} e_i +\sum_{\{j \in J\}} f_j \ : \ I \cap J=\emptyset
,\ |I \cup J |= \ell\}.$ Given $ x \in \Omega_\ell,$ we represent $x=(I_x , J_x)$ where $x=\sum_{\{i \in
I_x\}} e_i +\sum_{\{j \in J_x\}} f_j $\
$I_x \cap J_x=\emptyset$ and $ |I_x \cup J_x |= \ell$.
For $x,y \in \cup_{\ell=0}^{n}\Omega_\ell ,$ we define $x \leq y \ \Leftrightarrow \ I_x \subseteq J_x \
\mbox{and} \ I_y \subseteq J_y $.
Observe that in the previous two cases $\Omega_\ell$ is a member of the family of association schemes to which $X$ belongs even when $\ell < n$. This does not happen in this case since the words in $\Omega_\ell$ have $1,-1$ and $0$ in their entries while those in $X$ have only $1$’s and $-1$’s.
$\bullet$ Notice that $\Omega_0:= \left\{(0,0,...,0)\right\}$ and we add a dummy element $\hat{1}$ above all other elements, defining $\Omega_{n+1}:=\left\{\hat 1\right\}$ , that is $x\leq \hat 1 , \ \forall \ x \in \cup_{\ell=0}^{n}\Omega_\ell$.
$\bullet$ With that order the set $\La=\cup_{\ell=0}^{n+1}\Omega_\ell$ is a lattice with: $$x\wedge y=(I_x\cap I_y,J_x\cap J_y),\quad
x\vee y=\!\!\begin{cases} (I_x\cup I_y,J_x\cup J_y) & \mbox{if}\
(I_x\cup I_y)\cap (J_x\cup J_y)=\emptyset\cr \hat 1&
\mbox{otherwise}
\end{cases}$$ (for $x,y \in \La-\left\{\hat 1\right\} $. Obviously $x\wedge\hat 1=x,\ x\vee\hat 1=\hat 1$)
\(1) Recall ([@Stanley]) that given elements $u,w$ of a poset one says that
$u$ covers $w$; or $w$ is covered by $u$, if $w < u$ but there is no $z$ such that $w<z<u$.
We denote it by $u\gcunor w$ or $w\lcunor u$.
\(2) A bounded lattice is ranked if the poset $\La$ is equipped with a rank function $ \rk:\La \rightarrow \mathbb{Z}$ compatible with the ordering (so $\rk (u)\leq \rk(w)$ whenever $u \leq w$) and such that if $w$ covers $u$ then $ \rk(w)= \rk(u)+1$. In our cases the lattices are clearly ranked, the rank of $w\in \Omega_\ell$ being $\ell$.
(3)An atom is an element that covers $\hat 0$ and a coatom is an element covered by $\hat 1$. For $\Gamma=(X,E)$ any of the considered graphs, the set of atoms is $\Omega_1$ and the set of coatoms is $\Omega_d$ where “$d$” is the diameter of $\Gamma$. Since in fact the set of coatoms $\Omega_d$ is the set of vertices $X$ we will use both notations.
Is not difficult to prove that for each graph defined above, $(\La,\leq,\wedge,\vee)$ is a finite, bounded, ranked lattice with lowest element $\hat 0$ and greatest element $\hat 1$.
\[loquenosolvidamos\] In all the cases: $d(x,y)=j \Leftrightarrow x\wedge y\in \Omega_{d-j}.$
$$\begin{aligned}
d(x,y)=j\Leftrightarrow \ \left\{
\begin{array}{lll}
|x\cap y|=k-j &\mbox{for} \ J(n,k)\\
\dim (x\cap y)=k-j&\mbox{for} \ J_q(n,k)\\
x\mbox{ and } y\mbox{ have } n-j\\
\mbox{coordinates in common}&\mbox{for} \ H(n,2)\\
\end{array}\right\}\
\Leftrightarrow x\wedge y\in \Omega_{d-j} \ .\end{aligned}$$
\[prop\]
The lattice $\La$ has the following properties:
1. $\La$ is atomic, that is every element of the lattice is a join of atoms.
2. $\forall u, w \in \La$ such that $ u\vee w\not=\hat 1\Rightarrow \rk(u)+\rk(w)=\rk(u\vee w)+\rk(u\wedge
w)$ \[modularity\]
\(1) In the Johnson case, each element of the lattice is a set of elements taken from $[n]$, so if $z=\{i_1,...,i_j\}$, then $z=\{i_1\}\vee \{i_2\}\vee...\vee \{i_j\}$ is a join of atoms.
In the Grassman case, each element $z$ of the lattice is a subspace of $GF(q)^n$, so taking a basis $\{v_1,...,v_j\}$ of $z$, we obtain that $z=span(v_1)\vee span(v_2)\vee ...\vee span(v_j)$ is a join of atoms.
In the Hamming case, $\hat 1= e_1 \vee f_1$ and an element $z\neq \hat 1$ of the lattice is of the form $z=\sum_{i\in I_z}e_i+\sum_{j\in J_z}f_j$ with $I_z\cap J_z=\emptyset$, so $z=\bigvee_{i\in I_z}e_i\vee\bigvee_{j\in J_z}f_j$ is a join of atoms.
\(2) In the Johnson case, $\rk(z)$ is the cardinality of $z$, so the previous formula is simply the inclusion-exclusion formula for 2 sets: $|A|+|B|=|A\cup B|+|A\cap B|$.
In the Grassman, the rank of an element is the dimension, so the formula is true because of the well known identity $dim(V+W)=dim(V)+dim(W)-dim(V\cap W)$.
In the Hamming case, $\rk(z)=|I_z|+|J_z|$ so again the formula is true because of the inclusion-exclusion formula for sets.
\[first\]
If $\tau $ and $\sigma $ are different atoms such that $\ \tau\vee\sigma\ne \hat 1 $, then $\rk(\tau\vee\sigma)=2 .$
\[coverproperty\]
Let $u$ and $w$ be elements of the lattice which are not coatoms, then $(u\vee w \ \gcunor u , \ w) \Rightarrow (u , w \gcunor u \wedge w)$.
Reciprocally $(u , w\ \gcunor u\wedge
w\ \mbox{and} \ u\vee w\ne\hat 1) \Rightarrow \ u\vee
w \ \gcunor \ u , w$.
In order to prove the first statement, observe that $z \gcunor w \Leftrightarrow z\ge w$ and $\ \rk(z)=\rk(w)+1$. So, $u\vee w \gcunor u \mbox{ and} \ u\vee w \gcunor w \Leftrightarrow \rk(u\vee w)=\rk(u)+1=\rk(w)+1$ (in particular, we must have that $\rk(u)=\rk(w)$). Also, since $u$ and $w$ are not coatoms and $\rk(u\vee w)=\rk(u)+1$ we deduce that $u\vee w\ne\hat 1$. Then, by Lemma \[prop\] (\[modularity\]),we get $\rk(u)+\rk(w)-\rk(u\wedge w)=\rk(u)+1$, i.e., $\rk(w)=\rk(u\wedge w)+1$, which implies that $w \gcunor
u\wedge w$. The proof is similar for $u$.
Reciprocally, if $u \gcunor u\wedge
w$ and $w \gcunor u\wedge
w \Rightarrow \rk(u)=\rk(w)=\rk(u\wedge w)+1$. Using Lemma \[prop\] (\[modularity\]) we get $\rk(w)=\rk(u)+\rk(w)-\rk(u\vee w)+1$ which implies $\rk(u)+1=\rk(u\vee w)$ and then that $u\vee w$ covers $u$ (and similarly $w$).
Description of the eigenspaces using the associated lattice {#embedding}
===========================================================
In this section let $\Gamma=(X,E)$ be any of the distance regular graphs of diameter $d$ already defined ($J(n,k),J_q(n,k)$ or $H(n,2)$), together with its associated decomposition: $\ \RR^{X}=\oplus_{i=0}^{d} W_i , \ $ where $\{W_i\}_{i=0}^{d}$ are the common eigenspaces of the adjacency matrices of $\Gamma$.
We will describe each of the eigenspaces $\{W_i\}_{i=0}^{d}$, using the lattice previously defined. The description give us a recursive formulae for the eigenvalues $\left\{\theta_j\right\}_{j=0}^d$ associated to each graph $\Gamma=(X,E)$ defined in Subsection \[dpg\].
\[defal\] For $z\in\Omega_j$, define:
$$a_j^{\ell}=\begin{cases} \{y\in \Omega_{\ell}:z\le y\} \
\mbox{if}\ j\le \ell \cr \{y\in
\Omega_{\ell}:y\le z\}\ \mbox{if}\ j>\ell\cr \end{cases}\quad
a_j=\vert \{x\in X:z\le x\} \vert$$
Note that $a_j=a_j^{d}$ if $j\le d$, but $a_{d+1}=0$.
The previous definitions seem to depend on $z$, we show next this is not so.
Recall that $\qbin {i}j$ is the number of $j$-dimensional subspaces of $GF(q)^i$. A formula is given by: $\qbin {i}
j=\frac{[i]_q[i-1]_q ...[i-j+1]_q}{[j]_q[j-1]_q ...[1]_q}$ where $[i]_q=\left\{
\begin{array}{ccc} \frac{q^{i}-1}{q-1} & \forall \
i \geq 1\\ 0 & \forall \ i < 1 \end{array},\right .$
\[al\] $$a_j^{\ell}=\begin{cases} {j \choose \ell} & \ \mbox{for}\ J(n,k)\cr \qbin {j}{\ell}&\ \mbox{for}\ J_q(n,k)\cr
{j \choose \ell} & \ \mbox{for}\ H(n,2) \cr
\end{cases}\ \mbox{if}\quad \ell \le j \
\quad
a_j^{\ell}=\begin{cases} {n-j\choose l-j}& \ \mbox{for}\ J(n,k)\cr \qbin {n-j}{l-j}&\ \mbox{for}\ J_q(n,k)\cr
2^{\ell-j} {n-j \choose \ell-j} & \ \mbox{for}\ H(n,2) \cr
\end{cases}\ \mbox{if}\quad \ell \ge j $$
Given $z \in \Omega_j$ and $\ell \le j,$ we have to count the elements of the set\
$\{y\in \Omega_{\ell}:y\le z\}$. Looking at the construction of the lattice, the lemma follows straightforward in this case.
In the case $j \le \ell$ the proof is also easy for $J(n,k)$ and $J_q(n,k)$. For the case $H(n,2)$, if we fix $z\in\Omega_j$ and we count the elements of $\{y\in
\Omega_{\ell}:z\le y\}$, we have to choose $l-j$ coordinates from the $n-j$ not used by $z$, and we can fill each of them whith $1$ or $-1$.
\[defiota\]
$\iota:\La \rightarrow \RR^X:z\mapsto \newiote z)$ is the map defined by $
\newiote z)(x)= [z\le x] \ \forall \ z \in \La ,\ x\in X .$
\[iotahat\]
For $\ j=0,1,...,d$ and $ \forall \ z,y \in \La,$
$\begin{array}{llll}
& i)\ \newiote z)=\mathbf{0} \Leftrightarrow z=\hat 1\quad & ii)\ \newiote z)=\mathbf{1}\Leftrightarrow z=\hat 0 \
\quad iii)\ ||\newiote z)||^2=a_j\ \FA \ z\in \Omega_j
\\
\\
& iv)\
\newiote z)\newiote y)=\newiote z\vee y)
& v) <\newiote z),\newiote y)>=||\newiote z\vee y)||^2 \
\end{array}$
$i), ii)$ and $iii)$ are easy to prove. For $iv)$ $$\newiote z)(x)\newiote y)(x)=[z\le x][y\le x]
=[z\vee y\le x]=\newiote z\vee y)(x)$$
To prove $v)$, observe that $$<\newiote z),\newiote y)>=\sum_{x\in X}\newiote z)(x)\newiote y)(x)
=\sum_{x\in X}\newiote z\vee y)(x)
=\sum_{x\in X}(\newiote z\vee y)(x))^2=||\newiote z\vee y)||^2$$
[(i)]{} $z\vee y=\hat 1$ if and only if $\newiote z)$ and $\newiote y)$ are orthogonal to each other.
[(ii)]{} If $z\vee y\in \Omega_j$, then $<\newiote z),\newiote y)>=a_j$
[(iii)]{} If $\tau $ and $\sigma$ are both atoms then $<\newiote \tau ),\newiote \sigma)>=\begin{cases}
a_1& {\rm if}\ \tau=\sigma \cr 0& {\rm if}\ \tau \vee
\sigma=\hat{1} \cr a_2& {\rm otherwise}
\end{cases}$
A filtration for $\RR^{X}$.
---------------------------
\[deflambdaj\]
For $j=0,1,...,d$, let $\Lambda_j \subseteq \RR^{X}$ be the subspace generated by $\{\newiote x)\}_{x \in \Omega_j}$.
We want to show that $\Lambda_j\subseteq\Lambda_{j+1}$ . That is, they form a filtration for $\RR^{X}$. We need some tools first.
\[stars\] Given $w\in \La$, let: $$\begin{aligned}
w^*=\sum_{v}[v\gcud w]\newiote v)\qquad
w_*=\sum_{v}[v\lcunor w]\newiote v)\end{aligned}$$
\[lemawstar\]Given $w\in \Omega_{j} \subseteq \La$ $$\begin{aligned}
w^* &=&c_{j} \ \newiote w) \ \mbox{where}\ c_{j} \ \mbox{only depends on}\ j=\rk(w) \\
w_* &=&a_{j}^{j-1}\ \newiote w)+ \Phi_w \ \mbox{where}\ \Phi_w:X\rightarrow \left\{0,1\right\}, \ \Phi_w(x)=\left[w\wedge x \in \Omega_{j-1}\right]\end{aligned}$$
\(1) Given $x\in X$, We have: $$\begin{aligned}
w^*(x)&=\sum_v[v\gcud w][v\le x]=\left|\{v\in \Omega_{j+1}:w\le v\le x\}\right|\\
&= \left\{
\begin{array} {cll} 0 & \mbox{if}\ w \not\le x \\
\left\{
\begin{array} {cll} k-j & \mbox{for} \ J(n,k)\\
\left[k-j\right]_q & \mbox{for}\ J_q(n,k)\\
n-j & \mbox{for} \ H(n,2) \quad \end{array}\right.& \mbox{if}\ w \le x \\
\end{array}\right.
$$ The last equality is easy to prove for Johnson and Grassman graphs. In the Hamming case, if $w=\sum_{i\in I_w}e_i+\sum_{j\in
J_w}f_j$ and $x=\sum_{i\in I_x}e_i+\sum_{j\in J_x}f_j$ to build $v$ we need to add to the sum constituing $w$ one $e_i$ with $i\in I_x-I_w$ or else one $f_j$ with $j\in J_x-J_w$. So: $$\begin{aligned}
|\{v\in \Omega_{j+1}:w\le v\le x\}|&=| I_x-I_w|+| J_x-J_w|
\\
&=| I_x|+| J_x|-(|I_w|+|J_w|)
=n-j\end{aligned}$$ That is $w^* =c_{j} \ \newiote w)$ and the constant $c_{j}$ only depends on the $ \rk(w)=j$.
To prove the identity (2), given $x\in X$ we have $$\begin{aligned}
w_*(x)&=\sum_v[w\gcud v]\newiote v)(x)=\left|v : \ v\lcunor w \ \mbox{and} \ v\le x\right|\\
&\stackrel{(\dag)}{=}\left\{
\begin{array} {lll}
& a_{j}^{j-1}& \mbox{if} \ w\le x \ (\mbox{equivalently} \ \rk(w\wedge x) = j) \\
& 1 & \mbox{if} \ \rk(w\wedge x) = j-1 \\
& 0& \mbox{if}\ \rk(w\wedge x) <j-1\\
\end{array} \right.
\end{aligned}$$
Thus $w_* =a_{j}^{j-1}\ \newiote w)+ \Phi_w $. The proof of $(\dag)$ follows from the fact in the case $ \rk(w\wedge x) < j-1$ there cannot be any such $v$. This is because if $v\le x$ and $v\lcunor w$ then $v=v\wedge x \le w\wedge x$ and $ j-1=\rk(v)\le \rk(w\wedge x)$.
\[corolambdas\] $\Lambda_0\subseteq\Lambda_1\subseteq...\subseteq \Lambda_{d}=\RR ^X$
It follows from definition of $ \Lambda_j$ and part (1) of previous lemma.
Let $V_0=\Lambda_0$ and $V_j=\Lambda_j\cap\Lambda_{j-1}^\perp
\quad j=1,...,d$.
We have that $\Lambda_j=V_0\oplus V_1\oplus ...\oplus V_j = \Lambda_{j-1} \oplus V_j$. We want to show that for $j=1,...,d$, $V_j\neq \{0\}$, that is $\Lambda_{j-1} \neq \Lambda_{j}$ . To prove this, we need more lemmas. Recall (Definition \[definicionA\]) that the operator $\L$ is $\L(f)(x)=\sum_{y\in X }[d(x,y)=1]f(y)$.
If $x\in X$, then $\L(\newiote x))=\sum_{y\in X }[d(x,y)=1]\newiote y)$.
Note that for $x,y\in X$ we have $\newiote x)(y)=[x=y]$ Thus, if $z\in X$: $$\begin{aligned}
\L(\newiote x))(z)&=\sum_{y\in X}[d(z,y)=1]\newiote x)(y)
=\sum_{y\in X}[d(z,y)=1][x=y]
=[d(z,x)=1]\\
&=\sum_{y\in X}[d(x,y)=1][y=z]
=(\sum_{y\in X}[d(x,y)=1]\newiote y))(z)
$$
\[lemasumaiotas\] Let $x\in X$. Then $x_*=\L(\newiote x))+\newiote x)a_d^{(d-1)}$.
Note that for $x,y \in X=\Omega_d$ we have by the previous proof that\
$\L(\newiote x))(y)=[d(x,y)=1]=[x\wedge y\in \Omega_{d-1}]=\Phi_x(y)$, where $\Phi$ is as in Lemma \[lemawstar\]. Hence, the result follows from that lemma.
\[arribayabajo\] For each $j<d$ there are constants $\alpha_j,\beta_j$ such that if $w\in \Omega_j$ then: $$\sum_{u\gcunor w}u_*=\alpha_j \newiote w)+\beta_jw_*$$ The constants are:
$\alpha_j=\left\{\begin{array}{ll}
n-2j& J(n,k)\\ \left[n-2j\right]_qq^j& J_q(n,k)\\ 2(n-j)& H(n,2) \end{array}\right.
,\ \beta_j=\left\{\begin{array}{ll}
c_{j-1}\quad J(n,k) , J_q(n,k) \\ c_{j-1}-1 \quad H(n,2)
\end{array}\right.$\
where $c_j$ was given in the proof of Lemma \[lemawstar\].
$$\begin{aligned}
\sum_{u\gcunor w}u_*&=&\sum_{u\gcunor w}\sum_{z\lcunor u}\newiote z)=\sum_{u\in \Omega_{j+1}}\sum_{z\in \Omega_j}[z\vee w\leq u]\ \newiote z)\\
&=&\sum_{u\gcunor w} \newiote w)+\sum_{u\in \Omega_{j+1}}\sum_{z\in \Omega_j-w}[z\vee w=u]\ \newiote z)\\
&{=}&a_j^{j+1}\newiote w)+\sum_{z\in \Omega_j}[\rk(z\vee w)=j+1]\newiote z)\quad (1)\end{aligned}$$ Similar arguments show that $\sum_{v\lcunor w}v^*=a_j^{j-1}\newiote w)+\sum_{z\in \Omega_j} [\rk(z\wedge w)=j-1]\newiote z)\quad (2)$
For $J(n,k)$ and $J_q(n,k)$ it follows from Lemma \[prop\] (\[modularity\]) that $
\rk(z\vee w)=j+1 \Leftrightarrow \rk( z\wedge w)=j-1
$ so the sums at the rightmost side in (1) and (2) are equal and $$\sum_{u\gcunor w}u_*- \sum_{v\lcunor w}v^* =(a_j^{j+1}-a_j^{j-1})\newiote w)$$ By Lemma \[lemawstar\] $\sum_{v\lcunor w}v^*=\sum_{v\lcunor w}c_{j-1}\newiote v)=c_{j-1}w_*$, thus in the Johnson and Grassman cases we have $\sum_{u\gcunor w}u_*=(a_j^{j+1}-a_j^{j-1})\newiote w)+c_{j-1}w_*$. The values of $\alpha_j=a_j^{j+1}-a_j^{j-1}$ and $\beta_j=c_{j-1}$ follow from Lemmas \[al\] and \[lemawstar\].
The case of $H(n,2)$ is different because it is easy to prove that in this case $$\begin{aligned}
&&\left\{z\in \Omega_j: \rk(z\wedge w)=j-1\right\}=\\
&& \left\{z\in \Omega_j \ : \ \rk(z\vee w)=j+1 \right\} \cup \left\{z\in \Omega_j: \rk(z\wedge w)=j-1\ \mbox{and} \ z\vee w=\hat{1} \right\} ,\end{aligned}$$ $$\begin{aligned}
.^..\sum_{u\gcunor w}u_*- \sum_{v\lcunor w}v^*
& =&(a_j^{j+1}-a_j^{j-1})\newiote w)\\
&&- \underbrace{\sum_{z\in \Omega_j}\left[ \rk(z\wedge w)=j-1\right] \left[ z\vee w=\hat{1}\right]\newiote z)}_{\Psi_w} .\ (3)\end{aligned}$$ Now given $x \in X$ we will evaluate $\Psi_w(x)$. $$\begin{aligned}
\Psi_w(x)&=& \sum_{z\in \Omega_j}\left[ \rk(z\wedge w)=j-1\right] \left[ z\vee w=\hat{1}\right]\left[z \le x\right]\\
&=&\left| \left\{z\in \Omega_j: \rk(z\wedge w)=j-1 , \ z\vee w=\hat{1} \ \mbox{and} \ z\le x\right\}\right|.\end{aligned}$$
Suppose that there is such a $z$. Such $z$ must be unique: since $z\wedge w\in \Omega_{j-1}$ then it must be $w=(z\wedge w)\vee \sigma$, where $\sigma\in \Omega_1$. Similarly $z=(z\wedge w)\vee \tau$ for some $\tau$. Since $z\vee w=\hat 1$ it must be $\tau=-\sigma$. Thus $z$ is uniquely defined if it exists.
Moreover, since $(z\le x \ \Rightarrow \ w \wedge z \le w \wedge x)$ then we must have $j-1 \leq \ \rk(w \wedge x) $. But $\rk(w \wedge x) = j \Leftrightarrow w\leq x$ and since $z\leq x$ this implies that $ z \vee w \leq x$ which is an absurd since $z \vee w=\hat{1}$. So $ \rk(w \wedge x) = j-1$ and $w \wedge x=w \wedge z$. Thus $w\wedge x \in \Omega_{j-1}$ must hold if $z$ exists. Conversely, if $w\wedge x \in \Omega_{j-1}$ and $w=(x\wedge w)\vee \sigma$ then $z=(x\wedge w)\vee (-\sigma)$ satisfies all the conditions. Thus, we conclude that $\Psi_w(x)=\left[w\wedge x \in \Omega_{j-1}\right]=\Phi_w(x)$. Hence by Lemma \[lemawstar\] (2) equation (3) becomes $$\begin{aligned}
\sum_{u\gcunor w}u_*- \sum_{v\lcunor w}v^*
&=&(a_j^{j+1}-a_j^{j-1})\newiote w)-\Phi_w \\
&=&(a_j^{j+1}-a_j^{j-1})\newiote w)-\left(w_* - a_j^{j-1}\newiote w)\right)=a_j^{j+1} \ \newiote w) - w_*.\end{aligned}$$ As before, $\sum_{v\lcunor w}v^*=c_{j-1}w_*$, thus $\sum_{u\gcunor w}u_*=a_j^{j+1} \ \newiote w)+(c_{j-1}-1) w_*$. Again the values of $\alpha_j=a_j^{j+1}$ and $\beta_j=c_{j-1}-1$ follow from Lemmas \[al\] and \[lemawstar\].
\[mui\] For $0\leq j\leq d ,$ there exist a constant $
\lambda_j$ such that $\L(v)-\lambda_j v\in \Lambda_{j-1}$, $\forall\ v\in \Lambda_j.$
It is enough to prove it for elements of the spanning set $ \left\{\newiote u)\right\}_{u\in \Omega_j}$. The proof is by reverse induction on the levels of the lattice, starting at $j=d$. The inductive hypothesis will be:
There exists constants $\lambda_{j}$ and $\nu_{j}$ such that $\L(\newiote u))=\lambda_{j}\newiote u)+
\nu_{j}u_*$ for all $ u\in \Omega_{j}. $
This will prove the lemma since by Definition \[stars\], $u_* \in \Lambda_{j-1}$.
The inductive hypothesis is true for $j=d$ since if $x\in \Omega_d$ then by Lemma \[lemasumaiotas\] $\L(\newiote x))=-a_d^{(d-1)}\newiote x)+x_*$. Now assume the hypotesis true for $j+1$ and let us prove it for $j$. Let $ w \in \Omega_j$. By Lemma \[lemawstar\] $\newiote w)= \frac{1}{c_j} \
w^* =\frac{1}{c_j} \sum_{u\gcud w}\newiote u)$, thus $$\begin{aligned}
\L(\newiote w))&=\frac{1}{c_j} \sum_{u\gcud w}
\L(\newiote u)){=}\frac{1}{c_j} \sum_{u\gcud w} \left(
\lambda_{j+1}\newiote u)+
\nu_{j+1}u_* \right) \\
&\stackrel{(\ref{arribayabajo})}{=}\frac{\lambda_{j+1}}{c_j} \ w^*+\frac{\nu_{j+1}}{c_j} \left(\alpha_j\newiote w)+\beta_jw_*\right)\\&\stackrel{(*)}{=}\left(\lambda_{j+1}+\frac{\nu_{j+1}\alpha_j}{c_j}\right)\ \newiote w)+ \frac{\nu_{j+1}\beta_j}{c_j}w_*\end{aligned}$$
\[Linv\] For $j=0,...,d$, $\Lambda_j$ are $\L$-invariant subspaces of $\RR^{X}$.
This follows directly by the previous Lemma and Corollary \[corolambdas\].
\[eigen\]For $j =0,...,d$, $V_j=\Lambda_j \cap \Lambda_{j-1}^{\perp}$ are the eigenspaces $W_j$ of $\L$ given in \[drg\], in that order. The corresponding eigenvalues $\theta_j$ are the $\lambda_j$’s given in Lemma \[mui\].
Take $v\in V_j\ (\subseteq \Lambda_j)$. By Lemma \[mui\] $\L(v)=\lambda_jv+v'$ with $v'\in \Lambda_{j-1}$ and by Corollary \[Linv\] $\L(v')\in \Lambda_{j-1}$. Then by definition of $V_j$: $$\begin{aligned}
0&=&<v,\L(v')>=<\L(v),v'>=<\lambda_jv+v',v'>\\
&=&<\lambda_jv,v'>+<v',v'>=||v'||^2\end{aligned}$$ thus $\L(v)=\lambda_jv \ \forall \ v\in V_j$. Therefore, $\RR^{X}=\bigoplus_{j=0}^{d} V_j$ where each $V_j$ is either zero or an eigenspace of $\L$. Since $X=\Omega_{d}$ is the set of vertices of $\Gamma=(X,E)$; a distance regular graph of diameter ${d}$; there are exactly $d+1$ eigenspaces of the adjacency matrix $A_1$, therefore of $\L$. Thus each $V_j$ is indeed an eigenspace of $\L$ (hence $V_j\neq 0 \ \forall \ j$) and $\lambda_j$ are the eigenvalues of $\L$.
From the proof of Lemma \[mui\] (identity $(*)$) we get that $\nu_d=1$ and the recursion $\nu_j=\frac{\nu_{j+1}\ \beta_j}{c_j} \ \forall j < d $. From the values of the constants, it follows that $\nu_j=c_{j-1}$ in the Johnson and Grassman cases and $\nu_j=1$ in the Hamming case. Therefore we conclude that $\lambda_j=\lambda_{j+1}+\alpha_j$ in the first two cases and $\lambda_j=\lambda_{j+1}+\frac{\alpha_j}{c_j}=\lambda_{j+1}+2$ in the latter case. Therefore it is clear that $\lambda_0>\lambda_1>...>\lambda_d$. This imply (by the ordering of \[drg\]) that $\lambda_j=\theta_j$.
From the recursion of the $\lambda$’s and the fact that $\lambda_j=\theta_j$, we obtain that the eigenvalues of $\L$ satisfy the following recursive formulae: $$\theta_d =\left\{\begin{array}{lll}&- k&\mbox{for } J(n,k)\\
&- [k]_q& \mbox{for } J_q(n,k)\\
&- n&\mbox{for } H(n,2)
\end{array}\right.\qquad
\theta_j = \left\{\begin{array}{lll}
&\theta_{j+1}+n-2j & \mbox{for } J(n,k)\\
&\theta_{j+1}+[n-2j]_qq^j & \mbox{for } J_q(n,k)\\
&\theta_{j+1}+2& \mbox{for } H(n,2)
\end{array}\right.$$ hence they are: $$\theta_j=\left\{\begin{array}{lll}
&(k-j)(n-k-j)-j & \mbox{for } J(n,k)\\
&q^{j+1}[k-j]_q[n-k-j]_q-[j]_q & \mbox{for } J_q(n,k)\\
&n-2j & \mbox{for } H(n,2)
\end{array}\right.$$ The formulae for $\theta_j$ can be founded in the literature (see Chapter 9 of [@BCN]). The proof above gives another way to compute them.
Tight Frames for the eigenspaces {#Frames}
================================
In this section we will consider $\Gamma=(X,E)$ any of the graphs already defined, $\La$ the associated lattice described in Section \[ldpg\] and $\RR^{X}=\oplus_{j=0}^{d} V_j$ the corresponding decomposition. We will prove that each $\Omega_j$ induces a finite tight frame on each $V_j$ via the map defined in \[defiota\]. We will give a formula for the constants associated to these tight frames and in the case of the eigenspace of the second largest eigenvalue we will compute explicitly the constant associated.
For $j=0,1,...,d$; let $\pi_j$ be the orthogonal projection $\pi_j:\RR^{X}\rightarrow V_j$. Then for each $u\in \Omega_j$, denote $\check u^j=\pi_j(\newiote u))$. Since the set $\left\{ \newiote u)\right\}_{u\in \Omega_j}$ span $\Lambda_j$, the projections $\left\{\check u^j\right\}_{u\in \Omega_j}$ span $V_j$. When it is obvious from the context we will denote it by $\check u$.
\[Uj\] For $j=0,1,...,d$, let $U^{j} \in \RR^{X\times X}$ be the matrix $$(U^{j})_{x,y}=(x,y)^j
=\sum_{u\in \Omega_j}\newiote u)(x)\newiote u)(y).$$Then for every $j=0,...,d$, ${\check u^j}$ is an eigenvector of $U^{j} $ with eigenvalue\
$\mu_j=\sum_{i=0}^{d-j} a_{d-i}^j p_{i}(j)$ where $p_{i}(j)$ are the eigenvalues of $A_i$ (the $i$-th adjacency matrix of the graph) corresponding to the eigenspace $V_j$.
Let $(x,y) \in X\times X$ and $l=\rk(x\wedge y )$. $$\begin{array}{rcll}U^{j}_{x,y}&=&(x,y)^j
=\sum_{u\in \Omega_j}\newiote u)(x)\newiote u)(y)
=\sum_{u\in \Omega_j}[u\le x][u\le y]
=\sum_{u\in\Omega_j}[u\le x\wedge y]\\
&&\\
&=&\left\{\begin{array}{ccl}
|\{u\in\Omega_j:u \le x\wedge y \}| \ &\mbox{if} &\ j\le l \\
0 &\mbox{if}& \ j > l \end{array} \right. \qquad
= \left\{\begin{array}{ccl}
a_l^j \ &\mbox{if} &\ j\le l \\
0 &\mbox{if}& \ j > l \end{array} \right. \\
\end{array}$$
This and Remark \[loquenosolvidamos\] shows that $U^{j}=\sum_{l=j}^{d}a_l^j A_{d-l}.$ Then, as ${\check u^j} \in V_j$ is an eigenvector of the adjacency matrices, we have that for every $0\leq j \leq d$, ${\check u^j}$ is an eigenvector of $U^{j} $ with eigenvalue $\mu_j=\sum_{l=j}^{d} a_l^j p_{d-l}(j)$.
Making the change of variable $i=d-l$, we have: $\mu_j=\sum_{i=0}^{d-j}a_{d-i}^j p_{i}(j)$.
Let $V$ be a finite vector space with inner product $<,>$. A finite tight frame on $V$ is a finite set $F \subseteq V$ which satisfies the following condition: there exists a non-zero constant $\mu$ such that: $$\sum_{v\in F} | <f,v>|^{2} = \mu \ \| \ f \|^{2} \quad \forall \ f \in V.$$
\[tightframe\] For $j=0,...,d$ and for all $f\in V_j$, it holds $$\sum_{u\in\Omega_j}<{\check u^j},f>{\check u^j}= \mu_j\ f$$ where $\mu_j$ is the eigenvalue of Proposition \[Uj\].
In particular the set $\{{\check u^j}\}_{u\in\Omega_j}$ is a finite tight frame for $V_j$.
Let $w,v\in \Omega_j$. $$\begin{aligned}
<\mu_j {\check w^j},{\check v^j}>&=\sum_{x\in X}\mu_j {\check w^j}(x){\check v^j}(x)\stackrel{\ref{Uj}}{=}\sum_{x\in X}(\sum_{y\in X}(x,y)^j{\check w^j}(y)\ ){\check v^j}(x) \\
&=\sum_{x,y\in X}\sum_{u\in \Omega_j}\newiote u)(x)\newiote u)(y){\check w^j}(y){\check v^j}(x)\\
&=\sum_{u\in \Omega_j}<\newiote u),{\check w^j}><\newiote u),{\check v^j}>=\sum_{u\in \Omega_j}<{\check u^j},{\check w^j}><{\check u^j},{\check v^j}>\\ &=<\sum_{u\in \Omega_j}<{\check u^j},{\check w^j}>{\check u^j},{\check v^j}>.\end{aligned}$$ Since this is true for an arbitrary elements of the spanning set $\left\{\check v^j\right\}_{v\in \Omega_j}$ of $V_j$ then $\mu_j {\check w^j}=\sum_{u\in \Omega_j}<{\check u^j},{\check w^j}>{\check u^j}$, and again since this holds for arbitrary $w$ then it holds for any element of $V_j$.
Computation of $\mu_1$
----------------------
In the following we give a more explicit calculation of $\mu_1$, the constant associated to the tight frame corresponding to $V_1$; the second largest eigenspaces of $\Gamma=(X,E)$
\[lambda1\] $$\mu_1= \left\{\begin{array}{lll}
{n-2 \choose k-1} &\ \mbox{for} \ J(n,k) \\
\qbin {n-2} {k-1} q^{k-1} &\ \mbox{for} \ J_q(n,k) \\
2^{n-1} & \ \mbox{for} \ H(n,2) \end{array}\right.$$
By Proposition \[Uj\] we have that $\mu_1=\sum_{i=0}^{d-1} a_{d-i}^1 p_{i}(1)$. One cand find the following formulae for $p_{i}(1)$ in pages 220 of [@BI] for $J(n,k)$; 262,263, 302 of [@BI] for $J_q(n,k)$ and 210 of [@BI] for $H(n,2)$; $$p_{i}(1)=
\left\{ \begin{array}{lll}&\sum_{t=0}^i (-1)^t
{1 \choose t} {k-1 \choose i-t}{n-k-1 \choose i-t} & \mbox{for} \ J(n,k)\\
\\
&\left(1-\frac{\left[i\right]_q \left[n\right]_q}{\left[k\right]_q \left[n-k\right]_q \ q^i} \right)q^{i^2} \qbin k i \qbin {n-k} i &\mbox{for} \ J_q(n,k)\\
\\
& {n \choose i}- 2 {n-1 \choose i-1} &\mbox{for} \ H(n,2)
\end{array}\right.$$
Then by Proposition \[Uj\]:
$\bullet$ For $ J(n,k)$: $$\begin{aligned}
\mu_1&=&\sum_{i=0}^{k-1}a_{k-i}^1 \ p_{i}(1)=\sum_{i=0}^{k-1} (k-i) \left(\sum_{t=0}^i (-1)^t
{1 \choose t} {k-1 \choose i-t} {n-k-1 \choose i-t} \right)\\
&=&\sum_{i=0}^{k-1} (k-i)\left({k-1 \choose i} {n-k-1 \choose i}-{k-1 \choose i-1} {n-k-1 \choose i-1}\right)\end{aligned}$$ Defining $b_i={k-1 \choose i} {n-k-1 \choose i}$ (hence $b_i=0$ for $i < 0$). $$\begin{aligned}
&=& \sum_{i=0}^{k-1} k\left(b_i-b_{i-1}\right)-\sum_{i=0}^{k-1} i\left(b_i-b_{i-1}\right) \\
&=&k\ b_{k-1}-\left(b_1-b_0+2(b_2-b_1)+3(b_3-b_2)+...\right)\\
&=& k\ b_{k-1}-\left(-\sum_{i=0}^{k-1} b_i + k \ b_{k-1}\right)=\sum_{i=0}^{k-1}b_i={n-2 \choose k-1}\end{aligned}$$ (the last equation by the Chu-Vandermonde identity: $ \sum_{i=0}^n {s \choose i} {t \choose n-i} = {s+t \choose n}$).
$\bullet$ For $ J_q(n,k)$: $$\begin{aligned}
\mu_1&=&\sum_{i=0}^{k-1}a_{k-i}^1 \ p_{i}(1) \\
&=&\sum_{i=0}^{k-1} \left[k-i\right]_q \left(1-\frac{\left[i\right]_q \left[n\right]_q}{\left[k\right]_q \left[n-k\right]_q \ q^i} \right)q^{i^2} \qbin k i \qbin {n-k} i\\
&=&\sum_{i=0}^{k-1} \left[k-i\right]_q q^{i^2} \qbin k i \qbin {n-k} i -
\sum_{i=0}^{k-1} \frac{\left[k-i\right]_q \left[i\right]_q \left[n\right]_q q^{i^2} \qbin k i \qbin {n-k} i}{\left[k\right]_q \left[n-k\right]_q \ q^i} \\
$$$$\mbox{Since:}\ \frac{\left[k-i\right]_q}{\left[k\right]_q}\ \qbin k i= \qbin {k-1} {i}=\qbin {k-1} {k-1-i},$$ $$\mbox{and:}\ \frac{\left[i\right]_q}{\left[n-k\right]_q} \qbin {n-k} i= \qbin {n-k-1} {i-1} = \qbin {n-k-1} {n-k-i},$$ $$\mbox{then:}\
\mu_1
= \left[k\right]_q \sum_{i=0}^{k-1} \qbin {k-1} {k-1-i} \qbin {n-k} i \ q^{i^2}- \
\left[n\right]_q \sum_{i=0}^{k-1} \qbin {k-1} i \qbin {n-k-1} {n-k-i} q^{i^2-i}$$
Using $q$-Vandermonde: $\sum_{i} \qbin m {k-i} \qbin {n} {i} q^{i(m-k+i)} = \qbin {m+n} k$ and $[k]_q[n-1]_q=[n]_q[k-1]_q+[n-k]_qq^{k-1}$ we have: $$\begin{aligned}
\mu_1&=&\left[k\right]_q \qbin {n-1} {k-1}- \
\left[n\right]_q \qbin {n-2} {n-k}=\left[k\right]_q \qbin {n-1} {k-1}-\left[n\right]_q\qbin {n-2} {k-2} \\
&=& \qbin {n-2} {k-2}\left(\left[k\right]_q \frac{\left[n-1\right]_q}{\left[k-1\right]_q}-\left[n\right]_q\right)\\
&=& \qbin {n-2} {k-2}\ \frac{\left[n-k\right]_q}{\left[k-1\right]_q}\ \ q^{k-1}
=\qbin {n-2} {k-1}\ \ q^{k-1}\\\end{aligned}$$
$\bullet$ For $ H(n,2)$, $$\begin{aligned}
\mu_1&=&\sum_{i=0}^{n-1}a_{n-i}^1 \ p_{i}(1) =\sum_{i=0}^{n-1} (n-i) \left( {n \choose i}- 2 {n-1 \choose i-1} \right)\\
&=&\sum_{i=0}^{n-1} (n-i) \ {n \choose i}- 2 \sum_{i=0}^{n-1} (n-i) {n-1 \choose i-1} \\
&=&\sum_{i=0}^{n-1} n \ {n-1 \choose i}- 2 \sum_{i=1}^{n-1} (n-1) {n-2 \choose i-1} \\
&=& n 2^{n-1}-2(n-1)2^{n-2}= 2^{n-1}
\end{aligned}$$
Application: Norton product on $V_1$ {#norton}
====================================
Given the decomposition $\RR^{X}=V_0\oplus V_1\oplus...\oplus
V_d$, in this section we describe the product of a Norton algebra attached to the eigenspace $V_1$.
The Norton algebra on $V_1$ is the algebra given by the product $f\star g=\pi_1(fg)$ for $f,g\in V_1$.
It is easy to check that it is a commutative, nonassociative algebra. We want to compute the $\star $ product in $V_1$ for the graphs concerning on this paper. Since $\Lambda_1=span\{\newiote \tau):\tau\in \Omega_1 \}$ the set $\{\check \tau\}_{\tau\in \Omega_1}$ spans $V_1$ and we have proved in Theorem \[tightframe\] that they are a a finite tight frame for $V_1$. We will describe $\cht\star \chs$ in a simplified form using such a frame.
For this we need the following results.
\[taucheck\] For all $\tau\in\Omega_1$, $\cht=\newiote \tau)- \frac{a_1}{| X |}
\mathbf{1} $ with $a_1$ given in Lemma \[al\].
Recall that $<\newiote \hat{0})>=\Lambda_0 \ \subseteq
\Lambda_1=<\{\newiote \tau)\}_{\tau \in \Omega_1}>$, and $\Lambda_1=\Lambda_0\oplus V_1$. Since $\forall \ \tau\in\Omega_1 ,\ \cht=\pi_1(\newiote \tau))
\in V_1$, we have $\cht= \newiote \tau) -t.\mathbf{1}$ for some $t \in \RR$.\
From the fact that $<\cht,\mathbf{1}>=0$ we conclude $t=\frac{<
\newiote \tau) ,\mathbf{1}>}{||\mathbf{1}||^2}=\frac{\sum_{x\in
X}[\tau\leq x]}{ |X|}=\nn$.
\[pitheorem\] Let $h \in \RR^{X}$, then $\pi_1(h)=\sum_{\tau\in \Omega_1}\frac{< \newiote \tau) ,h>}{\mu_1}
\check \tau .$
$$\begin{aligned}
\mu_1\pi_1(h)&\stackrel{\ref{tightframe}}{=}\sum_{\tau\in \Omega_1}< \check \tau ,\pi_1(h)>\check \tau \stackrel{\dag}{=}\sum_{\tau\in \Omega_1}< \check \tau ,h>\check \tau
\stackrel{\ref{taucheck}}{=}\sum_{\tau\in \Omega_1}< \newiote \tau)-\frac{a_1}{| X |} \mathbf{1}
,h>\check \tau\\
&=\sum_{\tau\in \Omega_1}< \newiote \tau), h>\check
\tau -<\frac{a_1}{| X |} \mathbf{1} ,h> \sum_{\tau\in
\Omega_1}\check \tau
\stackrel{*}{=}\sum_{\tau\in \Omega_1}< \newiote \tau), h>\check
\tau\end{aligned}$$ ($\dag$ holds since $h=\pi_0(h)+\pi_1(h)+...+\pi_d(h)$, $\pi_i(h)\in V_i $ and $<V_i,V_j>=0 \ \forall \ i\neq j$; $*$ holds since $\sum_{\tau\in \Omega_1} \newiote \tau) \in \Lambda_0\Rightarrow \sum_{\tau\in
\Omega_1}\check \tau=\mathbf{0}$)
\[taustarsigma\] $$\cht\star\chs=
\pi_1\left( \newiote \tau \vee \sigma)\right)-\nn (\cht+\chs)$$
Recall by Lemma \[taucheck\] $\cht= \newiote \tau) -\frac{a_1}{| X |}\mathbf{1}$. Then: $$\begin{aligned}
\cht \star \chs
&=&\pi_1 (\cht\ \chs)= \pi_1\left( ( \newiote \tau) -\frac{a_1}{| X |}\mathbf{1})(\newiote \sigma)-\frac{a_1}{| X |}\mathbf{1} ) \right)\\
&=&\pi_1\left( \newiote \tau) \newiote \sigma)-\frac{a_1}{| X |}\left( \newiote \tau) +\newiote \sigma) \right)+(\frac{a_1}{| X |})^2\ \mathbf{1} \right)\\
&=&\pi_1\left(\newiote \tau) \newiote \sigma)\right)-\frac{a_1}{| X
|}\pi_1\left(\newiote \tau) +\newiote \sigma) \right)+(\frac{a_1}{| X
|})^2\pi_1(\mathbf{1})\\
&=&\pi_1\left( \newiote \tau \vee \sigma)\right)-\nn (\cht+\chs)\quad\end{aligned}$$
\[rhotausigma\] If $a_j$ are as in Lemma \[al\], then $<\newiote \rho), \newiote \tau \vee \sigma)
>=a_{\rk(\rho\vee\tau\vee\sigma)}.$
$$\begin{aligned}
<\newiote \rho), \newiote \tau \vee \sigma) >&=&
\sum_{x\in X}\newiote \rho)(x) \newiote \tau \vee \sigma) (x)=\sum_{x\in X}[\rho\leq x][\tau \vee \sigma\leq x]\\
&=&\sum_{x\in X}[\rho\vee\tau \vee\sigma\leq x]=|\{x\in X:\rho\vee\tau \vee\sigma\leq x\}|=a_{\rk(\rho\vee\tau\vee\sigma)}\\\end{aligned}$$
\[nortonproduct\][For]{} $H(n,2)$, $\cht\star\chs=\mathbf{0}$.
$\cht\star\cht=(1-\frac{2k}{n})\cht$ in the Johnson case and $(1-\frac{2\left[k\right]_q}{\left[n\right]_q})\cht$ in the Grassmann case, while for $\tau\neq\sigma$: $$\cht\star\chs=\begin{cases}
\frac{2k-n}{n \ (n-2)} (\cht+\chs)
&\mbox{For} \ J(n,k)\cr
\cr
- \frac{[k]_q}{[n]_q}(\cht+\chs)+
\frac{[k-1]_q}{q[n-2]_q}\sumarara &
\mbox{For} \ J_q(n,k) \cr
\end{cases} $$
By Lemma \[taustarsigma\], if $\tau=\sigma $ we have that $\cht\star\cht= \cht-2 \nn \cht
$. Replacing $a_1$ by Lemma \[al\] the formulae follow straighforward for all the graphs.
For the case $\tau\neq\sigma $ we will use the notation $\Psi_j=\{\rho\in \Omega_1: \rk(\rho\vee\tau\vee\sigma)=j\}$. Using Lemmas \[taustarsigma\] and \[rhotausigma\]: $$\begin{aligned}
\cht\star\chs&=& -\nn
(\cht+\chs)+\pi_1(\newiote \tau \vee \sigma))\\
&=& -\nn
(\cht+\chs)+
\sum_{\rho\in\Omega_1}\frac{<\newiote \rho), \newiote \tau \vee \sigma) >}{\mu_1}\chr = -\nn
(\cht+\chs)+\sum_{\rho\in\Omega_1}\frac{a_{\rk(\rho\vee\tau\vee\sigma)} }{\mu_1} \chr\\
&=& -\nn
(\cht+\chs)+\frac{a_2}{\mu_1}\sum_{\rho\in\Psi_2}\chr+\frac{a_3}{\mu_1}\sum_{\rho\in\Psi_3}\chr+\mathbf{0}\end{aligned}$$ The last zero since $a_{d+1}=0$. Also, since: $$\sum_{\rho\in\Psi_3} \chr=\sum_{\rho\in\Omega_1} \chr-\sum_{\rho\in\Psi_2} \chr-\sum_{\rho\in\Psi_{d+1}} \chr$$ and $\sum_{\rho\in\Omega_1} \newiote \rho) \in \Lambda_0\Rightarrow \sum_{\rho\in\Omega_1} \chr=\mathbf{0} $ we have then: $$(\diamondsuit)\quad \cht\star\chs= -\nn
(\cht+\chs)+ \frac{a_2-a_3}{\mu_1}\sum_{\rho\in\Psi_2}\chr-\frac{a_3}{\mu_1}\sum_{\rho\in\Psi_{d+1}} \chr$$ Then, we have, in each case:
$\bullet$ For $J(n,k)$, $\Psi_2=\{\tau,\sigma\}$ and $\Psi_{d+1}=\emptyset$. In this case then $(\diamondsuit)$ becames: $$\begin{aligned}
\cht\star\chs &=&
-\nn
(\cht+\chs)+\frac{a_2-a_3}{\mu_1}(\cht+\chs)\\
&=&\left(-\frac{{n-1 \choose k-1}}{{n \choose k}}+\frac{ {n-2 \choose k-2}-{n-3 \choose k-3}}{{n-2 \choose k-1}}\right)(\cht+\chs)\\
&=& \left(-\frac{k}{n}+\frac{k-1}{n-2}\right) (\cht+\chs)=
\frac{2k-n}{n\ (n-2)} (\cht+\chs)\end{aligned}$$ $\bullet$ For $J_q(n,k)$, $\Psi_2=\{\rho\in\Omega_1:\rho \le \tau\vee \sigma\}$ and $\Psi_{d+1}=\emptyset$.
Then $(\diamondsuit)$ becames: $\cht\star\chs =
-\nn
(\cht+\chs)+\frac{a_2-a_3}{\mu_1} \sum_{\rho \le \tau\vee \sigma} \chr
$
Recall that in this case, $a_j=\qbin {n-j}{k-j}$ (Lemma \[al\]), $|X|=\qbin nk$ and $\mu_1=\qbin {n-2} {k-1} q^{k-1}$ (Proposition \[lambda1\]). $$\begin{aligned}
\mbox{Thus}\quad \cht\star\chs &=&- \frac{[k]_q}{[n]_q}(\cht+\chs)+
\frac{1-\frac{[k-2]_q}{[n-2]_q}}
{\frac{[n-k]_q}{[k-1]_q}\ q^{k-1}}\sumarara\\
&=&- \frac{[k]_q}{[n]_q}(\cht+\chs)+
\frac{([n-2]_q-[k-2]_q)[k-1]_q}{[n-2]_q[n-k]_qq^{k-1}}\sumarara\\
&=&- \frac{[k]_q}{[n]_q}(\cht+\chs)+
\frac{\left((q^{n-2}-1)-(q^{k-2}-1)\right)(q^{k-1}-1)}{(q^{n-2}-1)(q^{n-k}-1)q^{k-1}}\sumarara\\
&=&- \frac{[k]_q}{[n]_q}(\cht+\chs)+
\frac{q^{k-2}\left(q^{n-k}-1)\right)(q^{k-1}-1)}{(q^{n-2}-1)(q^{n-k}-1)q^{k-1}}\sumarara\\
&=&- \frac{[k]_q}{[n]_q}(\cht+\chs)+
\frac{[k-1]_q}{[n-2]_q\ q}\sumarara\end{aligned}$$
$\bullet$ For $H(n,2)$ $\Psi_2=\{\tau , \sigma\}$ and $\Psi_{d+1}=\{-\tau , -\sigma\}$ and it holds that $\forall \rho \in \Omega_1$ $\quad \newiote \rho)+\newiote -\rho)= \mathbf{1} $ therefore: $ \check{\rho}+\check{(-\rho)}=\mathbf{0}\ \forall \rho \in \Omega_1$, i.e. $\check{(-\rho)}=-\check{\rho}$. Then: $$\begin{aligned}
\cht\star\chs &=&
-\nn
(\cht+\chs)+\frac{a_2-a_3}{\mu_1} (\cht+\chs)-\frac{a_3}{\mu_1} \left(\check{(-\tau)}+\check{(-\sigma)}\right)\\
&=&-\frac{2^{n-1}}{2^{n}}(\cht+\chs)+\frac{2^{n-2}-2^{n-3}}{2^{n-1}}(\cht+\chs)-\frac{2^{n-3}}{2^{n-1}}\left(-\cht-\chs\right)\\
&=&-\frac{1}{2}(\cht+\chs)+\frac{1}{2}\left(\cht+\chs\right)
=\mathbf{0}\end{aligned}$$
The fact that in the Hamming case the Norton product reduces to zero can also be deduced from Theorem 5.2 of [@CGS] since it can be shown that the “Krein parameters" $q_{1,1}^1$ are $0$ in this case.
Conclusion
==========
For each of the Johnson, Grassmann and Hamming graphs we constructed a ranked (finite) lattice which we embeed into $\RR^X$ (Definition \[defiota\]). For the levels $\Omega_j$ the corresponding embeedings $\Lambda_j$ in $\RR^X$ are shown to be a filtration, and we characterized the eigenspaces $W_j$ of the adjacency operator in terms of these $\Lambda_j$s. (Theorem \[eigen\]). We also show that each $\Omega_j$ induces in a natural way a tight frame for each eigenspace. Using the lattice we give a formula for the product of the Norton algebra attached to $W_1$.
[Carolina]{} Brouwer, A. E.; Cohen, A.; Neumaier, A. [ Distance-regular graphs.]{} Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Springer-Verlag. xvii, 495 p. (1989). Bannai E.; Ito T.,[ Algebraic Combinatorics I:Association Schemes.]{}, Benjamin Cummings. London,1984 Benedetto, John J.; Fickus, Matthew, [ Finite normalized tight frames.]{}, Adv. Comput. Math. [18]{} No.2-4 (2003) 357-385. Gargi Bhattacharyya, Sung Y. Song and Rie Tanaka, [ Terwilliger algebras of wreath products of one-class association schemes]{} Journal of Algebraic Combinatorics, Vol 31 No 3 (2010) 455-466. Caughman J.S. IV, Maclean M. S. and Terwilliger P., The Terwilliger algebra of an almost bipartite P- and Q-polynomial association scheme, Discrete Mathematics 292 No 1-3 (2005) 17-44. Brian Curtin and Ibtisam Daqqa, [ The subconstituent algebra of strongly regular graphs associated with a Latin square]{}, Designs, Codes and Cryptography,[52]{} No. 3 (2009) 263-274. Cameron, P.; Goethals,J.; Seidel, J., [The Krein condition, spherical designs, Norton algebras and permutation groups]{}, Indag. Math. [40]{} Fasc. 2 (1978) 196-206. Diaconis, P.; Rockmore, D. [ Efficient computation of isotypic projections for the symmetric group.]{} DIMACS, Ser. Discrete Math. Theor. Comput. Sci. [11]{} (1993) 87-104. Foote, Richard; Mirchandani, Gagan; Rockmore, Daniel N.; Healy, Dennis; Olson, Tim, [ A wreath product group approach to signal and image processing. I: Multiresolution analysis.]{}, IEEE Trans. Signal Process [48]{} No.1 (2000) 102-132 . C.D. Godsil, Algebraic Combinatorics, Chapman and Hall, New York, 1993. Griess Jr, R.L. [, The Friendly Giant]{}, Invent. Math. 69 (1982) 1-102 Hanaki, Akihide(J-SHINSS); Kim, Kijung(KR-POST); Maekawa, Yu(J-SHINSS) [, Terwilliger algebras of direct and wreath products of association schemes,]{} J. Algebra (2011) 195-200. Knuth, Donald. [, Two Notes in Notation]{}, American Mathematical Monthly, [99]{} No 5 (1992) 403-422. Kovačević, J.; Chebira, A., [, Life beyond bases: The advent of frames (Part I)]{}, IEEE Signal Processing Mag. [24]{} No. 4 (2007) 86-104. Kovačević, J.; Chebira, A., [*Life beyond bases: The advent of frames (Part II)*]{}, IEEE SP Mag. [24]{} No. 5 (2007) 115-125. Qian Kong, Benjian Lv, Kaishun Wang. Terwilliger algebra of Odd\
graphs, http://arxiv.org/abs/1112.0410 Iverson, Kenneth. [A programming Language]{},(New York, Wiley, 1962). Levstein, F.; Maldonado, C.; Penazzi, D. [The Terwilliger algebra of a Hamming scheme $H(d; q)$.]{} Eur. J. Comb. [27]{} No. 1 (2006) 1-10. Levstein F.,Maldonado C., Penazzi D. [,Lattices, frames and Norton algebras of dual polar graphs,]{} Contemporary Mathematics 544 (2011) 1-16. W.J. Martin, H. Tanaka, Commutative association schemes, European J. Combin. [30]{} (2009) 1497-1525. Smith, Stephen D. [,Nonassociative commutative algebras for triple covers of 3-transposition groups]{} Michigan Math. J. [24]{} (1977) 273-287. Stanley,Richard [Enumerative Combinatorics]{}, Cambridge Studies in Advanced Mathematics 49, Cambridge University Press, 1995. Stanton, Dennis. [,Some q-Krawtchouk polynomials on Chevalley groups,]{} Am. J. Math. [102]{} (1980) 625-662. Stanton, D. [Orthogonal polynomials and Chevalley groups.]{} Special functions: Group theoretical aspects and applications, Math. Appl.[18]{} (1984) 87-128. Rie Tanaka, [,Classification of commutative association schemes with almost commutative Terwilliger algebras,]{} Journal of Algebraic Combinatorics [33]{} No. 1 (2011) 1-10 Vale, Richard; Waldron, Shayne. [,Tight frames and their symmetries,]{} Constructive Approximation [21]{} No. 1 (2005) 83-112. Vale, Richard; Waldron, Shayne. [, Tight frames generated by finite nonabelian groups,]{} Numer. Algorithms [48]{} No. 1-3 (2008) 11-27.
[^1]: Partially supported by Secyt-UNC, CIEM-CONICET, ANPCyT
|
import { Flex, Sans } from "@artsy/palette"
import React from "react"
import { createFragmentContainer, graphql } from "react-relay"
import { ArtistTopWorksRail_artist } from "v2/__generated__/ArtistTopWorksRail_artist.graphql"
import { Carousel } from "v2/Components/Carousel"
import FillwidthItem from "v2/Components/Artwork/FillwidthItem"
import { Media } from "v2/Utils/Responsive"
import { StyledLink } from "v2/Apps/Artist/Components/StyledLink"
import { scrollIntoView } from "v2/Utils/scrollHelpers"
import { useTracking } from "v2/Artsy"
import styled from "styled-components"
import { ContextModule, OwnerType, clickedEntityGroup } from "@artsy/cohesion"
const HEIGHT = 300
interface ArtistTopWorksRailProps {
artist: ArtistTopWorksRail_artist
onOverviewTab?: boolean
}
export const ArtistTopWorksRail: React.FC<ArtistTopWorksRailProps> = ({
artist,
onOverviewTab,
}) => {
const tracking = useTracking()
const artworks = artist?.filterArtworksConnection?.edges ?? []
const handleViewWorksClick = overviewTab => {
const ms = overviewTab ? 500 : 0
tracking.trackEvent(
clickedEntityGroup({
contextModule: ContextModule.topWorksRail,
contextPageOwnerType: OwnerType.artist,
destinationPageOwnerType: OwnerType.artist,
destinationPageOwnerId: artist.slug,
destinationPageOwnerSlug: artist.slug,
type: "viewAll",
contextPageOwnerSlug: artist.slug,
contextPageOwnerId: artist.id,
})
)
return setTimeout(
() => scrollIntoView({ offset: 60, selector: "#jump--artworkFilter" }),
ms
)
}
return artworks.length > 0 ? (
<Flex flexDirection="column">
<Flex my={1} justifyContent="space-between">
{/**
* The H2 tag was added for SEO purposes
* TODO: Remove when palette provides the ability to override typography element
*/}
<H2>
<Sans size="4" color="black100">
Notable Works
</Sans>
</H2>
<StyledLink
data-test="link-to-works-for-sale"
onClick={() => handleViewWorksClick(onOverviewTab)}
to={onOverviewTab ? `/artist/${artist.slug}/works-for-sale` : null} // no need to route if already on Works tab
>
<Media at="xs">
<Sans size="4" color="black60">
View all
</Sans>
</Media>
<Media greaterThan="xs">
<Sans size="4" color="black60">
View all works
</Sans>
</Media>
</StyledLink>
</Flex>
<Carousel arrowHeight={HEIGHT}>
{artworks.map(({ node }, index) => {
const { id, slug } = node
return (
<FillwidthItem
key={id}
contextModule={ContextModule.topWorksRail}
artwork={node}
hidePartnerName
hideArtistName
imageHeight={HEIGHT}
showMetadata
showExtended={false}
onClick={() => {
tracking.trackEvent(
clickedEntityGroup({
contextModule: ContextModule.topWorksRail,
contextPageOwnerType: OwnerType.artist,
destinationPageOwnerType: OwnerType.artwork,
destinationPageOwnerId: id,
destinationPageOwnerSlug: slug,
horizontalSlidePosition: index + 1,
type: "thumbnail",
contextPageOwnerSlug: artist.slug,
contextPageOwnerId: artist.id,
})
)
}}
/>
)
})}
</Carousel>
</Flex>
) : null
}
const H2 = styled.h2``
export const ArtistTopWorksRailFragmentContainer = createFragmentContainer(
ArtistTopWorksRail,
{
artist: graphql`
fragment ArtistTopWorksRail_artist on Artist {
slug
id
filterArtworksConnection(sort: "-weighted_iconicity", first: 10) {
edges {
node {
id
slug
...FillwidthItem_artwork
}
}
}
}
`,
}
)
|
Re: BoA inqs.....
I have had 2 CLI from boa. The first one was for a small amount online and was approved with a soft pull. The second one was over the phone with a senior analyst and resulted in a hard pull on TU. I requested a much higher amount the second time.
Re: BoA inqs.....
flowfaster wrote:
I have had 2 CLI from boa. The first one was for a small amount online and was approved with a soft pull. The second one was over the phone with a senior analyst and resulted in a hard pull. I requested a much higher amount the second time.
How small was the first one? My BofA CLI from $600 to $1,000 via online request resulted HP.
Re: BoA inqs.....
trumpet-205 wrote:
flowfaster wrote:
I have had 2 CLI from boa. The first one was for a small amount online and was approved with a soft pull. The second one was over the phone with a senior analyst and resulted in a hard pull. I requested a much higher amount the second time.
How small was the first one? My BofA CLI from $600 to $1,000 via online request resulted HP.
I requested 1K to 2.5K. It was an nstant approval from the online luv button. No inq ever showed up on any report.
IMPORTANT INFORMATION: All FICO® Score products made available on myFICO.com include a FICO® Score 8, along with additional FICO® Score versions. Your lender or insurer may use a different FICO® Score than the versions you receive from myFICO, or another type of credit score altogether. Learn more
FICO, myFICO, Score Watch, The score lenders use, and The Score That Matters are trademarks or registered trademarks of Fair Isaac Corporation.
Equifax Credit Report is a trademark of Equifax, Inc. and its affiliated companies.
Many factors affect your FICO Scores and the interest rates you may receive. Fair Isaac is not a credit repair organization as defined under federal or state law, including the Credit Repair Organizations Act. Fair Isaac does not provide "credit repair" services or advice or assistance regarding "rebuilding" or "improving" your credit record, credit history or credit rating.
FTC's website on credit.
IMPORTANT INFORMATION: All FICO® Score products made available on myFICO.com include a FICO® Score 8, along with additional FICO® Score versions. Your lender or insurer may use a different FICO® Score than the versions you receive from myFICO, or another type of credit score altogether. Learn more
FICO, myFICO, Score Watch, The score lenders use, and The Score That Matters are trademarks or registered trademarks of Fair Isaac Corporation. Equifax Credit Report is a trademark of Equifax, Inc. and its affiliated companies. Many factors affect your FICO Score and the interest rates you may receive. Fair Isaac is not a credit repair organization as defined under federal or state law, including the Credit Repair Organizations Act. Fair Isaac does not provide "credit repair" services or advice or assistance regarding "rebuilding" or "improving" your credit record, credit history or credit rating. FTC's website on credit. |
1. Field of the Invention
This invention relates to a bullet loader, more particularly, to a device for reloading bullets into the magazine or clip of a firearm.
2. Prior Art
Many small arms, including both rifles and hand guns are provided with magazines or clips in which the bullets are stored for immediate use. In these firearms, ammunition is placed into an elongated, generally rectangular, container, known as a magazine or clip, which is then fitted into a portion of the firearm approximate to the firing chamber; in the case of a pistol, this clip or magazine can be inserted into the handle of the gun. The magazine or clip is closed on five (5) sides of the rectangular shape and open on one rectangular shaped end. Such magazines or clips are spring loaded and are further provided with retaining members over the open end. Ammunition can be placed into the open end of the magazine, piece by piece, and each piece slips past the retaining members to be held until used. As the magazine is being loaded, each succeeding round of ammunition compresses the spring further and each bullet becomes harder to insert.
When a magazine is fully loaded, it is fitted into a position adjacent to or against the firing chamber of the weapon. Normally, a bolt it used to extract a round and force it into the firing chamber. As each round is fired, the bolt is forced back, picks up the next round and forces the next round into the firing chamber. The force of the spring pushes each round up into its position in the magazine where the bolt can push it into the firing chamber.
The use of a magazine in a firearm provides the convenience of holding a large number of bullets in position for loading in successive order into the firing chamber, thereby allowing for rapid fire of some or all of the loaded bullets. Once the loaded bullets are expended, however, the empty magazine can be quickly removed and a new fully loaded magazine can be quickly inserted into the firearm to resume firing.
Thus, the use of magazines is a convenient and effective method of feeding bullets, in rapid succession, into a weapon's firing chamber. On the other hand, reloading bullets into the spent magazine is known to be problematic. More particularly, the structural design of the magazine requires each bullet to be individually loaded through the top ejection end of the magazine past the retainers and downwardly against the force of the compression spring in order to receive the bullet within the magazine. As each bullet is loaded, in sequence, the compression spring in the magazine becomes progressively compressed until the magazine is fully loaded with bullets. Naturally, the resistance of the compression spring against the downward force of loading the bullets into the magazine becomes greater with each successive bullet loaded into the magazine.
For many years, bullets have been loaded into empty magazines of firearms by hand, using the fingers to force each bullet downwardly against the force of the compression spring and into captured arrangement within the magazine. This process is time consuming, and quite often frustrating, particularly when the resistance of the compression spring begins to increase. This is particularly true on cold days when a person's fingers are numb, or are enclosed in a glove or mitten, or in a situation such as (military combat) when speed of reloading may be of the essence.
A number of devices exist which are adapted to assist the marksman in accomplishing this reloading task. In particular, U.S. Pat. No. 4,464,855 issued to Musgrave on Aug. 14, 1984 teaches a device somewhat useful in solving the above described problem. It teaches a slidably attached apparatus which is provided with a pulling handle and a protrusion which is adapted to push a round of ammunition down into the magazine for insertion of the next round. After each successive round of ammunition is loaded into the magazine, the apparatus must be removed from the magazine and reinserted for the next round. While it does facilitate in solving the problem of reloading, the requirement of removal and reinsertion makes its use somewhat tedious.
U.S. Pat. No. 4,689,909 issued to Howard on Sep. 1, 1987, teaches a device which can be fitted over an ammunition magazine. It is adapted with a spring loaded plunger which, when the device is fitted over the magazine and somehow held in place, is used to push the uppermost round down into the magazine to facilitate sliding in the next round. Then the plunger, which is spring loaded, is depressed and the cartridge is fitted all the way into the back of the magazine. Howard is also somewhat helpful, but difficulties may be encountered in holding the device in place against the magazine. |
"There's only one hard and fast rule in running: sometimes you have to run one hard and fast."
Thursday, May 13, 2010
Progress report
So...
I went from not being able to fully extend my left knee to being able to do it painfully to being able to do it without pain, but not being able to also point my toes at the same time. Today I can extend the knee, point the toes and tap the toes on the floor (this is getting to sound weird even to me) with just a little discomfort, but not if the leg is rotated outward at the hip.
That's a complicated manouevre that I'm not sure is required in trail running. Tomorrow I expect I'll be able to do that without much discomfort.
My Movie Blog
About Me
Steve says hi. Like in the last line of a letter (remember when people wrote letters?) between two people who both know him. Like that. Hi.
Oh, and I write about running. 35 years and nearly 600 races thus far. |
48 F.3d 530
Campbellv.Scott
NO. 93-01385
United States Court of Appeals,Fifth Circuit.
Feb 09, 1995
Appeal From: N.D.Tex., No. 3:92-CV-1050-R
1
AFFIRMED.
|
The Queensland Government needs some new advisers who can prepare logical, coherent arguments as to why particular assets such as ports and electricity businesses should be privatised, because the current Strong Choices campaign has flopped (see the Brisbane Times article Strong choices on budget spark debate). The campaign appears to have been developed by PR consultants, but it doesn’t present any facts or logic that would convince the public on the need to sell assets. It doesn’t address the primary concern people have over asset sales – that the community will get ripped off and private operators will make monopoly profits. The Government needs to explain how the proposed sale process and post-sale regulation will protect the public from getting ripped off. Given I support the Government’s position on asset sales, I’m disappointed that it is being let down by poor PR advice.
Steve Austin and I had a good chat about the problems with the Strong Choices campaign and the People’s Budget website application on 612 ABC Brisbane radio yesterday morning:
Mark makes a great point about the failure of the website application to offer genuine choices around changing the tax mix:
Sadly, there was no interactive option which allowed me to play with abolishing stamp duties on insurance and property transactions in return for a broad based land tax. More sadly the responses they are likely to receive on the info provided could well lock out any such reform. The explanatory information provided on land taxes will inevitably skew a more negative response.
The Queensland Treasury needs to pay less attention to its PR consultants and instead focus on producing solid economic analysis of the pros and cons of asset sales, which can then inform a serious public debate.
7 Responses to Strong Choices poorly received by public – Treasury needs to do a lot more work
Hi Gene, I agree that the Government needs a lot more work with asset sales and hopefully that this is only the first part. I think it’s actually a very good interactive tool but I am sure over 95% of the public just wont use it. Too hard
The government has been doing some good work in places but unfortunately it has been very poor in communicating this message.
Long way to go
Hmmm, I actually went to the presentation yesterday and in front of a cold audience the Treasurer took all questions and in my view answered all questions well. However the point I think that many pundits have failed to hear for whatever reason is that this is a consultation, at the end there will be a plan with further consultation and then it goes to an election and we vote on it. As the Treasurer said last night “If you don’t like the plan we come up with for the election in 2016 don’t vote for us”.
I saw the Treasurer take many questions about regulation and impact of sale vs lease and these were handled well on the basis that the QCA already provides for framework about access to leased infrastructure and other such questions and the person and group asking the question seemed calm and accepting of those responses and examples, however it is impossible to provide the sort of detail you refer to without a final plan in place such as Sale or lease and what regulations go with it. There’s just too many details to get into when everything is on the table Judging by the Treasurers responses he is thinking about these sort of issues.
In terms of the comments above about land tax vs stamp duty etc etc I would suggest you write a submission to the Treasurer with your suggestion including costings given the described disappointment about not being able to show that impact. Its all very well commenting via the PR machine whether that be the ABC or the Govt PR machine and not attending and asking your questions directly or spending the time to contribute.
Overall I thought the session was well structured I don’t recall the last Govt doing any such consultations but by action breaking the promise not to sell assets but then three months later actually doing it. I find it strange the electorate wants engagement, gets it, then parts of it complains about it when the consultation is not able to cope with every permutation and computation that can be thought up, personally I think this process is much better than the last non existent one .
Holden Lover, thanks for your comment. I’m pleased the Treasurer is answering the questions at the consultations well and is across the detail. I take your point about contributing a submission to the Treasurer. |
Q:
Smallest Number of Sets of Independent Edges in Sparse Graph
I have a very sparse undirected graph. I need to decompose it into n sets of edges. In each of these sets, all edges are independent (no two edges share any vertices). Every edge in the graph is contained in exactly one of these sets.
The goal here is to minimize n. Note that this problem is somewhat different from the classic largest independent edge set problem in that EVERY edge must go into SOME set. We just want as few of these sets as possible.
I have a simple algorithm that provides decent results. In Python-like pseudocode:
start = ... #All of the edges are initially in the graph "start".
sets = {} #The result of the algorithm: n independent sets, together containing all the edges
while size(start) > 0:
new_set = {}
for edge in start:
if "edge" is independent of any edge in "new_set":
start.remove(edge)
new_set.add(edge)
sets.add(new_set)
I can easily demonstrate by counterexample that it is nonoptimal. Consider the graph (note the edges' numbering):
#----# #----# #----# #----# #----#
| V1 |----E1----|-V2-|----E2----|-V3-|----E4----|-V4-|----E3----|-V5-|
#----# #----# #----# #----# #----#
The optimal solution is the set {{E1,E4},{E2,E3}}, but the above algorithm will output {{E1,E3},{E2},{E4}}, because it chooses E3 before E4. On (my) real data, it takes about 11% more sets than is optimal.
Does a better algorithm exist to solve this problem?
Speed is of some concern, but it is in the context of an amortized operation, so it's not terribly important. Right now, I'm interested in if an optimal algorithm actually exists/is known.
A:
The problem is equivalent to finding the minimum number of colors to color the edges of a graph. The problem is NP-complete in general, and even for sparse graphs, but there are polynomial time algorithms which color the graph with at most one color more than the optimal coloring.
In some other cases, such as bipartite graphs, we can find the optimal coloring in polynomial time. You can read more about this problem here
|
[Clinical neurological findings in brain-dead patients].
Most of university hospitals have their own criteria for brain death, based on the national criteria. Here the term "brain death" has been restricted to cases with irreversible deep coma and lack of spontaneous respiration secondary to "total destruction of the brain" for which the cause of the primary brain disease should be known and the most vigorous treatments have been given in vain. In evaluating patients with brain death, careful and accurate neurological examinations are mandatory. The level of consciousness should be in deep coma even after deep painful stimuli, without any movements including decorticate and decerebrate postures. The absence of spontaneous respiration is a crutial determinant for the diagnosis. The more sophisticated apnea testing has been standardized for clinical use. This will be discussed by another speaker. However, unusual spontaneous upper limb movements, called "Lazarus' sign", should be appreciated by examiners. This complex spinal movements need not exclude brain death. Brainstem functions such as reactivity of pupils, corneal reflex, ocular motility, pharyngeal reflex and cough reflex should be totally absent for the diagnosis. The isoelectric EEG is a predictor of brain death, if the technical requirements are carefully followed. But according to our experiences, brain-dead patients may have several waves on BAEP recordings even after obtaining a flat EEG. Because of this, BAEP examination and absence of the cerebral circulation were included in our criteria for brain death. |
With an on-premises pool and the overall clothing-optional vibe of Miami, the new Marlins ballpark is ripe for sighting people without their pants on. We just figured the first person to be spotted sin pantalones would be a spectator, not a player. But ESPN did us right by grabbing this shot of the Cardinals'… »4/04/12 9:10pm 4/04/12 9:10pm |
Q:
Java byte type is weird?
Could someone explain the java byte type?
This doesn't compile:
byte b1 = 9;
byte b2 = 1;
byte b3 = b1 + b2;
While this does:
byte b4 = 9 + 1;
byte b5 = (char)(9+1);
In addition, assignment to a long doesn't work, even if the value fits into a byte:
byte b7 = (long)127;
It gets even weirder with wrappers
This compiles:
Byte b6 = (int)3;
But this doesn't:
Integer i = (byte)3;
A:
Java Language Specification 5.6.2 Binary Numeric Promotion: "Otherwise, both operands are converted type int".
So Java converts both operands to and int, so the result of the addition is an int.
Addition: The difference between b3 and b4 is, that in b4 it's an Constant Expression (15.28), in b3 it's literal.
A:
b6 does work due to compile-time narrowing of literal constants. b7 does not work because compile-time narrowing is limited to all primitives but long (kind of strange, no idea why)
The interesting part is §5.2 of the JLS:
In addition, if the expression is a constant expression (§15.28) of type byte, short, char or int :
A narrowing primitive conversion may be used if the type of the variable is byte, short, or char, and the value of the constant expression is representable in the type of the variable.
A narrowing primitive conversion followed by a boxing conversion may be used if the type of the variable is :
- Byte and the value of the constant expression is representable in the
type byte.
- Short and the value of the constant expression is representable in
the type short.
- Character and the value of the constant expression is representable in the type char.
If the type of the expression cannot be converted to the type of the variable by a conversion permitted in an assignment context, then a compile-time error occurs.
No idea why i does not work though - widening should work just fine and in fact, the compiler should generate something like Integer.valueOf((byte)3); anyhow. Using the explicit call works as expected, i.e. widening is happening.
Interestingly enough using the eclipse Java compiler Integer i = (byte) 3; compiles just fine, which leads me to believe you just found a bug in javac - congratulations! (well either that or a bug in the eclipse compiler; but eclipse's behavior seems the correct one to me). FWIW I've reported the bug against javac to oracle..
Finding the right part in the JLS was less work than formatting this that it's somewhat readable - so probably easier if you follow the link instead.
|
The Star Wars game by the Titanfall devs is expected to be out by March 2020
In case you’d forgotten - it’s been a while since we’ve heard anything about it - Titanfall developers Respawn Entertainment are currently working on a third-person action-adventure title set in the Star Wars universe. That was announced nearly two years ago, and we haven’t heard much about it since, but now we’ve got at least one new detail.
During today’s earnings call, EA said they expect the title to release during fiscal year 2020, which would make it somewhere between April 2019 and March 2020. They also said they’ve yet to decide on the timing for the next Battlefront, you probably shouldn’t expect a follow-up to that series any time soon. |
Bengaluru: Ramachandran, better known as Raman, is not exactly pious like the Hindu God he was named after. He is one eyed, could turn rogue at the smallest sound of a cracker, and has killed about a dozen people so far.
At 55 years old, he would have been put behind the bars if he was human. But Raman is an elephant. So if not found near the temple Thechikottukavu, which owns him, Raman could be usually seen being paraded at some public event like a temple 'pooram' (procession), or attending a Gulf returnee's housewarming, surrounded by his fans. In one such housewarming event in February, he crushed two people to death after he lost his cool over the sound of firecrackers.
The jumbo has now a political headache for the Communist Party of India (Marxist) government in Kerala, whose forest department has banned Raman from public appearances in March, citing his need to rest to control stress.
But as big as 10 ft 4 inches, nearly the second tallest of his kind in all of Asia, Raman is the undisputed jumbo king, the 'Ekachatradhipathi' as his fans put it. He has fans running Facebook and Instagram pages with thousands of likes and shares.
The ban has failed to go down well with the fans who expect him to begin 13 May's Thrissur Pooram, as has been the practice for years.
Thrissur Pooram is the biggest festival in Kerala, attended by millions, where two main temples lead idol processions to Thrissur district's Vadakkunathan temple, adorned by some 100 elephants, 'Pancha Vadyam' orchestra, and some of the loudest firecrackers.
A task force that checked the elephant recently found it almost blind and having problems with digestion. As a result, Thrissur’s young district collector T.V. Anupama, known for tough decisions, banned Raman from the Thrissur Pooram. Forest Minister K. Raju backed the decision.
The move has triggered protests, with the Kerala Elephants Owners Federation calling a strike. They are the sole federation of private elephant owners in Kerala, which has around 100 elephants, and has decided not to send any elephants for the Thrissur Pooram, or any other festival in future, until the government change its stand on Ramachandran.
"One Pulsar bike may get involved in an accident, so will we ban all Pulsar bikes?" the federation president P Sasikumar said in an angry press meeting on Wednesday.
Meanwhile, Hindu right wing workers and the Bharatiya Janata Party have held protests in Thrissur, calling the move an unnecessary intervention of the communists in temple rites.
The signs are clear. In the land that inspired Sabarimala protests, Ramachandran and his elephant friends risk trampling Chief Minister Pinarayi Vijayan and his party with the latest ire of the Hindus.
With only four days to go for the pooram, insiders say the government is in a hurry to defuse tensions with elephant owners, with local Communist Party of India (CPI) MLA and agriculture minister V S Sunil Kumar taking on the role of a middleman.
On Thursday, temple affairs minister Kadakampally Surendran will hold another discussion with the owners. The government is also working on a back-up plan, keeping ready its pack of 100 elephants from forest department and public-run temple trusts to be moved to Thrissur to make sure the pooram spectacle is not affected.
The problem partly lies in the way elephants are immensely popular in Kerala, said animal rights activist Venkitachalam, who has received death threats for advocating a ban on elephants for temple festivals, in an earlier interview.
The elephant is more than just an animal in Kerala, a state where almost half of the land is still covered with forests. They are deeply connected to the cultural fabric and religious ethos, said Venkitachalam. It is not for any other reason that an elephant walking down the road, chewing his Panampatta (palm tree leaves) meal, is as common a sight across Kerala as a rally or a strike.
But on the other side, climatic and usage changes has made life tougher for elephants, and they rebel. The forest cover as a percentage of total land area of Kerala has been reduced to 42.15% from 66.2%, a 2017 Mint analysis showed. But more and more captive elephants get added to private owners every year, while the nature of temple festivities remains unchanged, he said.
Subscribe to Mint Newsletters * Enter a valid email * Thank you for subscribing to our newsletter.
Share Via |
Age differences in the perception of goal structure in everyday activity.
Human activity is structured by goals and subgoals. To understand an everyday activity, a viewer must perceive its goal structure, and viewers may segment activity into units that correspond to perceived goals. In this study, we examined age differences in the ability to perceive hierarchical goal structure in ongoing activity. A group of younger and older adults viewed short movies of an actor doing everyday activities, segmented them into events, and described the events as they segmented. We investigated how participants' event descriptions were related to the hierarchical goal structure, and whether participants' event segmentation was related to moment-by-moment changes in actor goals. We found that both coarse and fine event segmentation behavior was related to changes in the goal hierarchy. Descriptions of coarse-grained events were more likely to contain information about higher level goals, and descriptions of fine-grained events were more likely to mention lower level goals. Critically, in both segmentation behavior and event descriptions, younger adults showed these effects more strongly than older adults. These results show that event segmentation recovers the hierarchical goal structure of events, and that older adults may have difficulty perceiving that structure. (PsycINFO Database Record (c) 2019 APA, all rights reserved). |
The president of Kosovo said Thursday he thinks there is "good momentum" to reach an agreement this year to normalize ties with Serbia.
Kosovo commemorates its 2008 declaration of independence on Feb. 17 each year. It is recognized as its own country by 116 nations, but not by the one from which it unilaterally separated, Serbia.
Kosovo is a success story, President Hashim Thaci told The Associated Press in an interview.
"Kosovo's independence has brought more peace and stability in the Western Balkans," he said.
Thaci mentioned strong support from the United States and the European Union, and Russia's pledge to accept a Pristina-Belgrade agreement.
Many challenges lie ahead, all of which should be resolved through the EU-facilitated dialogue with Serbia that started in 2011, he said.
The talks are stalled, however.
Last year Kosovo decided to set a 100 percent import tariff on Serb goods until Belgrade recognized its sovereignty and stopped preventing it from joining international organizations.
Serbia has said the tariff is costing a lot to its businesses and it won't take part in the dialogue until the measure is lifted.
Thaci urged his government to temporarily suspend the tariff, but also said Serbia should not make it a condition of resuming dialogue.
Both Washington and Brussels have urged an end of the tariff. Pristina has not responded so far.
Kosovo's stubbornness seems to have angered Washington, Kosovo's biggest strategic partner. An army general who was due to visit Kosovo for the 11th independence anniversary canceled his trip.
"But there is no coldness (from U.S.) toward Kosovo as a country or its population," Thaci said.
The European Union has told Serbia and Kosovo they need to settle their differences before joining the EU.
___
Llazar Semini contributed from Tirana, Albania.
___
Follow Llazar Semini on Twitter: https://twitter.com/lsemini |
Genes expressed in human tumor endothelium.
To gain a molecular understanding of tumor angiogenesis, we compared gene expression patterns of endothelial cells derived from blood vessels of normal and malignant colorectal tissues. Of over 170 transcripts predominantly expressed in the endothelium, 79 were differentially expressed, including 46 that were specifically elevated in tumor-associated endothelium. Several of these genes encode extracellular matrix proteins, but most are of unknown function. Most of these tumor endothelial markers were expressed in a wide range of tumor types, as well as in normal vessels associated with wound healing and corpus luteum formation. These studies demonstrate that tumor and normal endothelium are distinct at the molecular level, a finding that may have significant implications for the development of anti-angiogenic therapies. |
Mike Ehrmann | Getty Images
Randy Miller | NJ Advance Media for NJ.com
ST. PETERSBURG, Fla. — The Yankees have been downplaying catcher Gary Sanchez's laziness since he joined them for good around this time two summers ago.
We've all seen his lollygagging behind the plate and his lack of hustle running out ground balls for three years and it cost the Yankees big-time in Monday night's 7-6 loss to Tampa Bay Rays at Tropicana Field.
On Tuesday, rumors that Sanchez had aggravated a groin injury surfaced as an alibi, and ESPN's Buster Olney reported that Sanchez would be placed on the disabled list -- which is curious because neither Sanchez nor anyone in the Yankees organization mentioned a possible injury after the loss Monday.
In the first inning, Rays first baseman Jake Bauers scored a two-out run from second base because Sanchez didn’t initially hustle to chase down a passed ball that bounced off his glove and rolled about 15 feet up the third-base line in foul territory.
Sanchez looked bad taking his time going for the ball until he finally sped up when noticing Bauers had rounded third and broke for the plate. To top off this ugliness, Sanchez’s weak throw home hit Bauers in the back.
Don't Edit
Sanchez looked worse jogging all night to first base in his five of his at-bats, and his final display of dogging it prevented the Yankees from scoring the tying run with two outs in the ninth inning.
With the bases loaded and the Rays clinging to a one-run lead, Sanchez hit a hard grounder to short and was thrown out by two steps at first base after Aaron Hicks beat a throw to second because he actually was running hard.
Sanchez’s jogging was so slow on this night that it made you wonder if this was just another night of no hustle or if he had re-aggravated his right groin, which had him on the disabled list from June 25 until last Friday due to a strain.
Sanchez was the big story in the Yankees clubhouse after the game.
Here's what Sanchez, manager Aaron Boone, left fielder Brett Gardner and pitcher Luis Severino had to say about this laziness costing the Yankees a game that left them six games behind the Boston Red Sox in the AL East standings:
Don't Edit
Al Bello | Getty Images
Is Sanchez hurt?
Sanchez hasn’t been running hard since he returned from a groin injury last Friday, the Yankees’ first game after the All-Star break, and his lack of hustle running out three groundballs, a popup and a single on Monday night was hard to miss.
Is his groin still hurting?
Boone was asked first if Sanchez is hurt.
“No,” the manager responded. “He should be able to get after it. He’s here and back and should be fine getting after things.”
Later, Sanchez was asked if his groin is still hurting or if he’s tentative about running hard out of fear of straining it again.
“I’m fine,” he said. “The injury and thinking about it definitely is behind me.”
Don't Edit
Mike Ehrmann | Getty Images
How Boone reacted
Yankees rookie manager Aaron Boone has gone out of his way all season to protect Sanchez, who was criticized by former manager Joe Girardi in a post-game news conference last season for poor defense.
Boone had a hard time defending Sanchez after Monday’s game.
After about Sanchez not running hard to first base in the ninth inning, Boone responded, "I'd have to watch (the replay), but he's got to find his gate quickly and he should be able to do that now."
Don't Edit
On the Rays scoring a run from second base due to Sanchez not hustling to chase down his passed ball, Boone wasn’t aware of it until it came up in his post-game presser.
“It’s another thing I’ve got to look at (on replay) because when the ball skipped away, I was watching Bauers run from second knowing he might be a little aggressive coming around,” Boone said. “So I was kind of yelling for (pitcher Luis Severino) to cover home and I was watching the runner. So that’s another play I’ve got to watch back.”
Don't Edit
Don't Edit
Mike Ehrmann | Getty Images
How Sanchez reacted
Gary Sanchez often seems to get agitated when he’s pressed about his defensive issues in interviews.
On Monday, he admitted he didn't run hard to chase down his first-inning passed ball or bust it to first base on his game-ending grounder.
Here’s what Sanchez had to say about his ninth-inning mistake:
“I think I could have done a better job for sure there running. I hit the ball well. When the play developed and I saw the runner safe at second base, I tried to beat the play but I couldn’t. ... I should have run harder. There was a chance (Aaron Hicks) was going to be out at second base, but that didn’t happen. He was safe."
Don't Edit
And here’s how Sanchez responded to not hustling after his passed ball that gifted the Rays the game’s first run:
“That’s another instance there where if I would have done a better job being quicker getting that ball, maybe we have a chance to get (Jake Bauers) out at home and that’s my fault. It was a cross-up on the signs there (with Luis Severino), and like I said, I should have gotten that ball quicker there.”
After blaming himself for his lack of hustle, Sanchez was asked what he has to say to the people who now think that he doesn't care enough to play hard all the time.
“You learn a lot in this game and this is one of those instances where you learn from it,” Sanchez said. “You put it behind and you look forward to tomorrow."
Don't Edit
Nathan Denette | The Canadian Press via AP
How Gardner reacted
Veteran left fielder Brett Gardner is one of the Yankees’ biggest leaders along with pitcher CC Sabathia.
Here’s what Gardner had to say about Sanchez not running hard to first base in the ninth inning;
“I was in the dugout watching it live. I didn’t see a replay. I thought Aaron Hicks did a great job of getting to second base and beating the play and you’ve got to give credit to Tampa Bay’s middle infielders. They didn’t stop the play. They kept going and finished it at first and it was kind of deflating for us.
“Gary hit that ball hard, then you see their shortstop catch it and you see Hicks beat the throw to second and you think we tied it, and it turns out we didn’t.”
The Yankees didn’t tie the game because Sanchez didn’t run hard until seeing Hicks was safe at second.
Will Gardner be a clubhouse policeman and address Sanchez’s repeated lack of hustle now that it cost the Yankees a game.
“Whether it’s me or anybody younger - guys who have been around a while or not – that’s something that we talk about amongst ourselves and hopefully we all collectively try to do a better job,” Gardner said.
Don't Edit
Mike Carlson | AP
Severino's reaction
Before Gary Sanchez admitted that he didn’t hustle chasing down his first-inning passed ball, pitcher Luis Severino tried protecting his catcher and fellow Dominican when meeting with the press.
“He told me that he didn’t see the ball and, to me, I think he didn’t see it,” Severino said.
If you watch the replay, it’s easy to tell that Sanchez saw the ball the whole time after it rolled away from him because he went after it right away. He just didn’t hustle after it right away.
Don't Edit
WATCH: Sanchez's loafing costs Yankees in 7-6 loss
Don't Edit
Don't Edit
Mike Carlson | AP
Will Sanchez be punished?
Manager Aaron Boone said that he planned to talk to Sanchez about his lack of hustle.
Would there be some yelling behind closed doors or a friendly “you can’t do that” sermon?
Boone didn’t say.
Boone also didn’t give a good answer when he was asked if he’d consider benching Sanchez on Tuesday or perhaps immediately remove him from a game if and when it happens again.
“First off, I’ve got to watch (the replays) and see what exactly we’re seeing,” Boone said. “I’m always having conversations with our guys positive, negative, whatever. But I have to see what went on first.”
Don't Edit
NJ Advance Media
Randy Miller may be reached at rmiller@njadvancemedia.com. Follow him on Twitter @RandyJMiller. Find NJ.com on Facebook. |
Q:
Link row in one SQL table to multiple rows in different table,
I'm making a web based tool to parse URLs. It works with two tables. One for the URLs, and one for the words found and their parses/number of occurrences. Here is a simplified example:
URLs
url-id url
----------------------------------------------------
1 www.example.net/this-is-a-sentence
2 www.example.org/this-is-another-sentence
Words
word-id word category occurences
----------------------------------------------------
1 this pronoun 2
2 is verb 2
3 a det 1
4 sentence noun 2
5 another det 1
I'm trying to figure out a way to link each URL in the URL table to each of its words in the Words table. This way, if a user decides to delete one of the URLs, all the appropriate occurrence counts can be decremented. I'm totally new to SQL so I have no clue how it's capable of storing information in cells, but I want to have some kind of dynamically sized list of all the word-ids in a URL.
url-id url words
---------------------------------------------------------------------------
1 www.example.net/this-is-a-sentence 1,2,3,4
2 www.example.org/this-is-another-sentence 1,2,3,5
I am open to suggestions of entirely different ways to organize the data within SQL.
Note - I can't simply parse the URLs again when deleting, because there is user input required to verify the parse when multiple are possible.
A:
You need a bridging table like this:
url-id word-id (represents, not part of table)
-------------------
1 1 url-id 1 has word-id 1 (this)
1 2 url-id 1 has word-id 2 (is)
1 3 url-id 1 has word-id 3 (a)
1 4 url-id 1 has word-id 4 (sentence)
2 1 url-id 2 has word-id 1 (this)
2 2 url-id 2 has word-id 2 (is)
2 5 url-id 2 has word-id 5 (another)
2 4 url-id 2 has word-id 4 (sentence)
This is called a Many to Many relationship. A URL can have many Words and a Word can belong to many URL's. Here is a good article describing different relationships in SQL.
|
Q:
how to access remote sql server database from vb.net windows form application
i want to develop an application with SQL Server 2008 and Vb.Net.
my SQL server will running in one system and i want this server to be accessed by Vb application which is running in other computer (not in the same network/LAN).
my question is that,
Is is possible to access SQL Server Database from remote computers(which are running in different network - different part of the world) ?
will it require that all the computers which are accessing this server should be in running in same "Domain" ?
please help me in this.
please provide a simple vb.net code( windows form application) which will connect to Remote SQL Server Database.
Hearty thanks in advance..
A:
To access a SQL database across the internet (using a non-VPN connection), you would need to use a connection string such as the following:
Data Source=x.x.x.x,1433;Network Library=DBMSSOCN;Initial Catalog=myDataBase;User ID=myUsername;Password=myPassword;
Data Source = Remote server. You can use either the IP or full DNS name. If you are using a non-standard port (something other than 1433), you can specify it after the comma.
Initial Catalog = Database name on the remote server.
User ID = SQL user name and password. This will use SQL authentication, not integrated windows security.
Password = Password for the respective User ID.
A few things (warnings) about the remote server:
It will need to expose SQL through the internet. Firewalls would need to be configured to allow the connection to the SQL port.
It will need to be set to allowed Mixed Mode authentication with SQL user accounts setup that you can use in your connection string.
Simple VB.NET Code is available lots of places. Here is a sample on Microsoft's site. You would use the SqlClient connection information.
|
// Copyright 2015 go-swagger maintainers
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package middleware
import (
"encoding"
"encoding/base64"
"fmt"
"io"
"net/http"
"reflect"
"strconv"
"github.com/go-openapi/errors"
"github.com/go-openapi/spec"
"github.com/go-openapi/strfmt"
"github.com/go-openapi/swag"
"github.com/go-openapi/validate"
"github.com/go-openapi/runtime"
)
const defaultMaxMemory = 32 << 20
var textUnmarshalType = reflect.TypeOf(new(encoding.TextUnmarshaler)).Elem()
func newUntypedParamBinder(param spec.Parameter, spec *spec.Swagger, formats strfmt.Registry) *untypedParamBinder {
binder := new(untypedParamBinder)
binder.Name = param.Name
binder.parameter = ¶m
binder.formats = formats
if param.In != "body" {
binder.validator = validate.NewParamValidator(¶m, formats)
} else {
binder.validator = validate.NewSchemaValidator(param.Schema, spec, param.Name, formats)
}
return binder
}
type untypedParamBinder struct {
parameter *spec.Parameter
formats strfmt.Registry
Name string
validator validate.EntityValidator
}
func (p *untypedParamBinder) Type() reflect.Type {
return p.typeForSchema(p.parameter.Type, p.parameter.Format, p.parameter.Items)
}
func (p *untypedParamBinder) typeForSchema(tpe, format string, items *spec.Items) reflect.Type {
switch tpe {
case "boolean":
return reflect.TypeOf(true)
case "string":
if tt, ok := p.formats.GetType(format); ok {
return tt
}
return reflect.TypeOf("")
case "integer":
switch format {
case "int8":
return reflect.TypeOf(int8(0))
case "int16":
return reflect.TypeOf(int16(0))
case "int32":
return reflect.TypeOf(int32(0))
case "int64":
return reflect.TypeOf(int64(0))
default:
return reflect.TypeOf(int64(0))
}
case "number":
switch format {
case "float":
return reflect.TypeOf(float32(0))
case "double":
return reflect.TypeOf(float64(0))
}
case "array":
if items == nil {
return nil
}
itemsType := p.typeForSchema(items.Type, items.Format, items.Items)
if itemsType == nil {
return nil
}
return reflect.MakeSlice(reflect.SliceOf(itemsType), 0, 0).Type()
case "file":
return reflect.TypeOf(&runtime.File{}).Elem()
case "object":
return reflect.TypeOf(map[string]interface{}{})
}
return nil
}
func (p *untypedParamBinder) allowsMulti() bool {
return p.parameter.In == "query" || p.parameter.In == "formData"
}
func (p *untypedParamBinder) readValue(values runtime.Gettable, target reflect.Value) ([]string, bool, bool, error) {
name, in, cf, tpe := p.parameter.Name, p.parameter.In, p.parameter.CollectionFormat, p.parameter.Type
if tpe == "array" {
if cf == "multi" {
if !p.allowsMulti() {
return nil, false, false, errors.InvalidCollectionFormat(name, in, cf)
}
vv, hasKey, _ := values.GetOK(name)
return vv, false, hasKey, nil
}
v, hk, hv := values.GetOK(name)
if !hv {
return nil, false, hk, nil
}
d, c, e := p.readFormattedSliceFieldValue(v[len(v)-1], target)
return d, c, hk, e
}
vv, hk, _ := values.GetOK(name)
return vv, false, hk, nil
}
func (p *untypedParamBinder) Bind(request *http.Request, routeParams RouteParams, consumer runtime.Consumer, target reflect.Value) error {
// fmt.Println("binding", p.name, "as", p.Type())
switch p.parameter.In {
case "query":
data, custom, hasKey, err := p.readValue(runtime.Values(request.URL.Query()), target)
if err != nil {
return err
}
if custom {
return nil
}
return p.bindValue(data, hasKey, target)
case "header":
data, custom, hasKey, err := p.readValue(runtime.Values(request.Header), target)
if err != nil {
return err
}
if custom {
return nil
}
return p.bindValue(data, hasKey, target)
case "path":
data, custom, hasKey, err := p.readValue(routeParams, target)
if err != nil {
return err
}
if custom {
return nil
}
return p.bindValue(data, hasKey, target)
case "formData":
var err error
var mt string
mt, _, e := runtime.ContentType(request.Header)
if e != nil {
// because of the interface conversion go thinks the error is not nil
// so we first check for nil and then set the err var if it's not nil
err = e
}
if err != nil {
return errors.InvalidContentType("", []string{"multipart/form-data", "application/x-www-form-urlencoded"})
}
if mt != "multipart/form-data" && mt != "application/x-www-form-urlencoded" {
return errors.InvalidContentType(mt, []string{"multipart/form-data", "application/x-www-form-urlencoded"})
}
if mt == "multipart/form-data" {
if err = request.ParseMultipartForm(defaultMaxMemory); err != nil {
return errors.NewParseError(p.Name, p.parameter.In, "", err)
}
}
if err = request.ParseForm(); err != nil {
return errors.NewParseError(p.Name, p.parameter.In, "", err)
}
if p.parameter.Type == "file" {
file, header, ffErr := request.FormFile(p.parameter.Name)
if ffErr != nil {
return errors.NewParseError(p.Name, p.parameter.In, "", ffErr)
}
target.Set(reflect.ValueOf(runtime.File{Data: file, Header: header}))
return nil
}
if request.MultipartForm != nil {
data, custom, hasKey, rvErr := p.readValue(runtime.Values(request.MultipartForm.Value), target)
if rvErr != nil {
return rvErr
}
if custom {
return nil
}
return p.bindValue(data, hasKey, target)
}
data, custom, hasKey, err := p.readValue(runtime.Values(request.PostForm), target)
if err != nil {
return err
}
if custom {
return nil
}
return p.bindValue(data, hasKey, target)
case "body":
newValue := reflect.New(target.Type())
if !runtime.HasBody(request) {
if p.parameter.Default != nil {
target.Set(reflect.ValueOf(p.parameter.Default))
}
return nil
}
if err := consumer.Consume(request.Body, newValue.Interface()); err != nil {
if err == io.EOF && p.parameter.Default != nil {
target.Set(reflect.ValueOf(p.parameter.Default))
return nil
}
tpe := p.parameter.Type
if p.parameter.Format != "" {
tpe = p.parameter.Format
}
return errors.InvalidType(p.Name, p.parameter.In, tpe, nil)
}
target.Set(reflect.Indirect(newValue))
return nil
default:
return errors.New(500, fmt.Sprintf("invalid parameter location %q", p.parameter.In))
}
}
func (p *untypedParamBinder) bindValue(data []string, hasKey bool, target reflect.Value) error {
if p.parameter.Type == "array" {
return p.setSliceFieldValue(target, p.parameter.Default, data, hasKey)
}
var d string
if len(data) > 0 {
d = data[len(data)-1]
}
return p.setFieldValue(target, p.parameter.Default, d, hasKey)
}
func (p *untypedParamBinder) setFieldValue(target reflect.Value, defaultValue interface{}, data string, hasKey bool) error {
tpe := p.parameter.Type
if p.parameter.Format != "" {
tpe = p.parameter.Format
}
if (!hasKey || (!p.parameter.AllowEmptyValue && data == "")) && p.parameter.Required && p.parameter.Default == nil {
return errors.Required(p.Name, p.parameter.In, data)
}
ok, err := p.tryUnmarshaler(target, defaultValue, data)
if err != nil {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
if ok {
return nil
}
defVal := reflect.Zero(target.Type())
if defaultValue != nil {
defVal = reflect.ValueOf(defaultValue)
}
if tpe == "byte" {
if data == "" {
if target.CanSet() {
target.SetBytes(defVal.Bytes())
}
return nil
}
b, err := base64.StdEncoding.DecodeString(data)
if err != nil {
b, err = base64.URLEncoding.DecodeString(data)
if err != nil {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
}
if target.CanSet() {
target.SetBytes(b)
}
return nil
}
switch target.Kind() {
case reflect.Bool:
if data == "" {
if target.CanSet() {
target.SetBool(defVal.Bool())
}
return nil
}
b, err := swag.ConvertBool(data)
if err != nil {
return err
}
if target.CanSet() {
target.SetBool(b)
}
case reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:
if data == "" {
if target.CanSet() {
rd := defVal.Convert(reflect.TypeOf(int64(0)))
target.SetInt(rd.Int())
}
return nil
}
i, err := strconv.ParseInt(data, 10, 64)
if err != nil {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
if target.OverflowInt(i) {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
if target.CanSet() {
target.SetInt(i)
}
case reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:
if data == "" {
if target.CanSet() {
rd := defVal.Convert(reflect.TypeOf(uint64(0)))
target.SetUint(rd.Uint())
}
return nil
}
u, err := strconv.ParseUint(data, 10, 64)
if err != nil {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
if target.OverflowUint(u) {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
if target.CanSet() {
target.SetUint(u)
}
case reflect.Float32, reflect.Float64:
if data == "" {
if target.CanSet() {
rd := defVal.Convert(reflect.TypeOf(float64(0)))
target.SetFloat(rd.Float())
}
return nil
}
f, err := strconv.ParseFloat(data, 64)
if err != nil {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
if target.OverflowFloat(f) {
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
if target.CanSet() {
target.SetFloat(f)
}
case reflect.String:
value := data
if value == "" {
value = defVal.String()
}
// validate string
if target.CanSet() {
target.SetString(value)
}
case reflect.Ptr:
if data == "" && defVal.Kind() == reflect.Ptr {
if target.CanSet() {
target.Set(defVal)
}
return nil
}
newVal := reflect.New(target.Type().Elem())
if err := p.setFieldValue(reflect.Indirect(newVal), defVal, data, hasKey); err != nil {
return err
}
if target.CanSet() {
target.Set(newVal)
}
default:
return errors.InvalidType(p.Name, p.parameter.In, tpe, data)
}
return nil
}
func (p *untypedParamBinder) tryUnmarshaler(target reflect.Value, defaultValue interface{}, data string) (bool, error) {
if !target.CanSet() {
return false, nil
}
// When a type implements encoding.TextUnmarshaler we'll use that instead of reflecting some more
if reflect.PtrTo(target.Type()).Implements(textUnmarshalType) {
if defaultValue != nil && len(data) == 0 {
target.Set(reflect.ValueOf(defaultValue))
return true, nil
}
value := reflect.New(target.Type())
if err := value.Interface().(encoding.TextUnmarshaler).UnmarshalText([]byte(data)); err != nil {
return true, err
}
target.Set(reflect.Indirect(value))
return true, nil
}
return false, nil
}
func (p *untypedParamBinder) readFormattedSliceFieldValue(data string, target reflect.Value) ([]string, bool, error) {
ok, err := p.tryUnmarshaler(target, p.parameter.Default, data)
if err != nil {
return nil, true, err
}
if ok {
return nil, true, nil
}
return swag.SplitByFormat(data, p.parameter.CollectionFormat), false, nil
}
func (p *untypedParamBinder) setSliceFieldValue(target reflect.Value, defaultValue interface{}, data []string, hasKey bool) error {
sz := len(data)
if (!hasKey || (!p.parameter.AllowEmptyValue && (sz == 0 || (sz == 1 && data[0] == "")))) && p.parameter.Required && defaultValue == nil {
return errors.Required(p.Name, p.parameter.In, data)
}
defVal := reflect.Zero(target.Type())
if defaultValue != nil {
defVal = reflect.ValueOf(defaultValue)
}
if !target.CanSet() {
return nil
}
if sz == 0 {
target.Set(defVal)
return nil
}
value := reflect.MakeSlice(reflect.SliceOf(target.Type().Elem()), sz, sz)
for i := 0; i < sz; i++ {
if err := p.setFieldValue(value.Index(i), nil, data[i], hasKey); err != nil {
return err
}
}
target.Set(value)
return nil
}
|
/* Multiple versions of wcscmp.
All versions must be listed in ifunc-impl-list.c.
Copyright (C) 2017-2018 Free Software Foundation, Inc.
This file is part of the GNU C Library.
The GNU C Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
The GNU C Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with the GNU C Library; if not, see
<http://www.gnu.org/licenses/>. */
/* Define multiple versions only for the definition in libc. */
#if IS_IN (libc)
# define wcscmp __redirect_wcscmp
# define __wcscmp __redirect___wcscmp
# include <wchar.h>
# undef wcscmp
# undef __wcscmp
# define SYMBOL_NAME wcscmp
# include "ifunc-sse2.h"
libc_ifunc_redirected (__redirect_wcscmp, __wcscmp, IFUNC_SELECTOR ());
weak_alias (__wcscmp, wcscmp);
#endif
|
Q:
Delphi - How to set suiImageButton vertically in suiToolbar?
I'm using delphi 7 with tsuiToolbar and tsuiImageButton. In this case i want set toolbar vertically with tsuitoolbar include inside the toolbar there are tsuiImageButtons for menu items. TsuiImageButton also placed vertically.
At a moment, i've finished set tsuiToolbar in vertical with align=alLeft. When i placed first tsuiImageButton at inside tsuiToolbar, its oke. But second tsuiImageButton cannot placed below first tsuiImageButton. The second tsuiImageButton automatically place beside of first tsuiImageButton.
And how can i fix it for placing tsuiImageButton below each other?
A:
Set TSuiToolBar.Wrapable = True and all buttons Wrap property as: TSuitToolButton.Wrap = True.
It may not be visible at design time (try to force an update by resizing the TSuiToolBar), but it will be at run time.
|
package org.matsim.contrib.analysis.time;
import org.junit.Test;
import java.util.Map;
import static org.junit.Assert.*;
public class TimeBinMapTest {
@Test
public void getTimeBin() {
TimeBinMap<Map<String, String>> map = new TimeBinMap<>(10);
TimeBinMap.TimeBin<Map<String, String>> bin = map.getTimeBin(15);
assertEquals(10, bin.getStartTime(), 0.001);
}
@Test
public void getTimeBinWithStartTime() {
TimeBinMap<Map<String, String>> map = new TimeBinMap<>(10, 20);
TimeBinMap.TimeBin<Map<String, String>> bin = map.getTimeBin(25);
assertEquals(20, bin.getStartTime(), 0.001);
}
@Test(expected = IllegalArgumentException.class)
public void getTimeInvalidTime_exception() {
TimeBinMap<Map<String, String>> map = new TimeBinMap<>(10, 20);
TimeBinMap.TimeBin<Map<String, String>> bin = map.getTimeBin(19);
assertEquals(20, bin.getStartTime(), 0.001);
}
@Test
public void getMultipleTimeBins() {
TimeBinMap<Map<String, String>> map = new TimeBinMap<>(10);
TimeBinMap.TimeBin<Map<String, String>> first = map.getTimeBin(15);
TimeBinMap.TimeBin<Map<String, String>> second = map.getTimeBin(111);
TimeBinMap.TimeBin<Map<String, String>> third = map.getTimeBin(0);
TimeBinMap.TimeBin<Map<String, String>> fourth = map.getTimeBin(30);
assertEquals(10, first.getStartTime(), 0.001);
assertEquals(110, second.getStartTime(), 0.001);
assertEquals(0, third.getStartTime(), 0.001);
assertEquals(30, fourth.getStartTime(), 0.001);
}
@Test
public void getEndOfLastTimeBucket() {
TimeBinMap<Map<String, String>> map = new TimeBinMap<>(10);
map.getTimeBin(15);
map.getTimeBin(111);
map.getTimeBin(0);
map.getTimeBin(30);
assertEquals(120, map.getEndTimeOfLastBin(), 0.0001);
}
@Test
public void getAllTimeBins() {
TimeBinMap<Map<String, String>> map = new TimeBinMap<>(10);
map.getTimeBin(15);
map.getTimeBin(111);
map.getTimeBin(0);
map.getTimeBin(30);
assertEquals(4, map.getTimeBins().size());
}
@Test
public void timeBin_setEntry() {
final String testValue = "some-value";
TimeBinMap<String> map = new TimeBinMap<>(10);
TimeBinMap.TimeBin<String> bin = map.getTimeBin(15);
assertFalse(bin.hasValue());
bin.setValue(testValue);
assertTrue(bin.hasValue());
assertEquals(testValue, bin.getValue());
}
}
|
Q:
Printing unicode to console
I'm trying to create a custom print stream that can print localized messages to the console. I encountered a problem doing this on Windows. Here is what I'm attempting to do
I have a unicode string
Convert unicode string to bytes using UTF-8 encoding
Convert bytes to a new string with console encoding
Print new string to console with console encoding
In this code, I tried to do the above steps but it fails miserably. Strangely the default System.out.println call works correctly. However, I want to use a custom print stream and not rely on the default System.out.
Can someone explain how I can print unicode to the console using my custom print stream? And why is the default System.out already equipped to print things correctly?
Here is my code - I compiled it and ran it from the command line. I set my system locale to zh-CN beforehand.
public static void main(String[] args) throws Exception{
Charset defaultCharset = Charset.defaultCharset();
System.out.println(defaultCharset);
// charset is windows-1252
String unicodeMessage =
"\u4e16\u754c\u4f60\u597d\uff01";
System.out.println(unicodeMessage);
// string is printed correctly using System.out (世界你好!)
byte[] sourceBytes = unicodeMessage.getBytes("UTF-8");
String data = new String(sourceBytes , defaultCharset.name());
PrintStream out = new PrintStream(System.out, true, defaultCharset.name());
out.println(data);
// prints gibberish: ??–????????????
}
A:
windows-1252 charset is the problem here. We need to use UTF-8 charset to print. Following worked for me:
public static void main(String[] args) throws Exception{
Charset utf8Charset = Charset.forName("UTF-8");
Charset defaultCharset = Charset.defaultCharset();
System.out.println(defaultCharset);
// charset is windows-1252
String unicodeMessage = "\u4e16\u754c\u4f60\u597d\uff01";
System.out.println(unicodeMessage);
// string is printed correctly using System.out (世界你好!)
byte[] sourceBytes = unicodeMessage.getBytes("UTF-8");
String data = new String(sourceBytes , defaultCharset.name());
PrintStream out = new PrintStream(System.out, true, utf8Charset.name());
out.println(data);
}
|
Per our conversation at the law conference, you may want to consider how the
TW negotiated rate transactions play againt PR such as that listed below.
Nov 16,2000
California Power Plants Get Jolt
As Natural-Gas Supplies Are Cut
By Rebecca Smith
Staff Reporter of The Wall Street Journal
LOS ANGELES -- Southern California power plants, already stressed to their
limits last summer, got another jolt this week as a cold snap caused a sharp
curtailment of supplies of natural gas used to generate electricity.
The power plants were able to switch to burning oil and continue to produce
electricity. But the unusual curtailment of natural gas underlines concerns
that an increased reliance on gas for power generation across the U.S. is
putting the reliability of the nation's electricity supply at risk.
That's because virtually all power plants now under construction in the U.S.
burn gas and only gas. The units affected this week in San Diego were able to
shift to oil only because they were older plants that originally were
constructed to burn oil. Generators have been reluctant to add a dual-fuel
flexibility to plants in recent years because oil is far more polluting than
gas and generally has been costlier.
In California, where gas-supply problems first surfaced on Monday in San
Diego, there is pessimism about a Hydra-like energy crisis that seems to grow
new heads every day. The state weathered three-dozen electrical emergencies
last summer, caused by a shortage of electricity. Officials had hoped to
solve the problem by speeding up construction of new generating plants. Now,
they're finding the state may be building its way out of an electrical
problem and into a gas problem.
One official, who has been warning of the danger of reliance on a single
fuel, said this week's disruption pointed out the necessity of developing a
comprehensive energy policy that recognizes how changes in usage of oil, gas
and electricity affect each other. "We don't just need new generating plants
and transmission lines, we may need pipelines, too," said Terry Winter, chief
executive officer of the California Independent System Operator, the
organization responsible for maintaining adequate electricity supplies. "You
can't look at these things in isolation."
The natural-gas problems surfaced when the local gas-distribution company,
San Diego Gas & Electric Co., notified power-plant operators and a handful of
industrial users that it would be restricting their gas use by about half. In
California, residential and small businesses have first crack at natural gas,
and industrial uses are regarded as secondary, even if they are generating
plants. Dynegy Inc., the Houston-based energy concern that owns some of the
older plants that serve San Diego, immediately switched to oil. But it didn't
like doing so; its plants create three times as much pollution when they
burn oil and exhaust valuable air-pollution emission credits that power
plants here need to operate.
The San Diego units couldn't simply be shut down, because the state was short
of power. Roughly 30% of the state's capacity already was off-line, including
many of its nuclear units, as most of those plants are now undergoing repair
after being run at capacity limits throughout the summer.
What's more, the gas-pipeline system that feeds San Diego isn't big enough to
begin with. The system was built primarily to serve residential customers and
not big power plants.
The problems could persist, off and on, through the winter. That's because
gas-storage levels are down sharply from a year ago throughout the nation,
but especially in California, because it ran its gas-fired units so hard last
summer. This time last year, Southern California had 87 billion cubic feet of
gas in storage. Now, it's roughly 50 billion cubic feet, or 43% less. Prices
also have moved up sharply, from roughly $2.50 a million British thermal
units to around $8 this week. Nationally, storage levels are down about 8%
from a year ago.
"Gas is trading higher in California than anywhere else in the nation," said
John Lavorato, chief operating officer of Enron North America, a unit of
Enron Corp. of Houston. But he said they're headed up in the Northeast, based
on cold weather forecast for the next 10 days to two weeks.
High prices for fuel also push up prices for the end product, electricity. In
California the average price for electricity to be delivered Thursday was
$228 per megawatt hour. That's double the price a week ago and five times the
price a year earlier. |
The possibility has existed, and been anticipated by many, since the NFL outfitted its officials with wireless communication last year. In a world where conspiracy theories erupt by the minute, it was easy to wonder: Who is talking to the referees? What are they saying? And why?
This week the NFL codified a limited expansion of communication for the postseason between referees and members of the league's officiating command center in New York. In a press release, the league said vice president of officiating Dean Blandino, or his designee, will consult not only on replay reviews but also on "administrative" issues "regarding the correct application of playing rules" such as penalty yardage and clock operation.
It insisted that Blandino "will not call or change a foul or become involved in on-field judgment calls beyond what is already part of the replay review process," but here's a dirty little secret: Many people in the officiating community aren't buying it and remain highly suspicious of the true purpose and use of the wireless communication system.
The theory has been advanced by none other than Mike Pereira, one of Blandino's predecessors who now works as an analyst for Fox Sports. In an interview this week, Pereira reiterated his belief -- which he first voiced in September -- that Blandino or a member of his staff has been whispering in the ears of referees for some time.
The league has denied it, but Pereira -- still highly respected in the football community -- said: "Of course they're going to say that publicly because it was against the rules."
Pereira added: "There's really no context in the rule book [before this week's expansion] for allowing the replay official or New York to give any input [beyond replay], so it's not something they would acknowledge. But really, to think that it wasn't happening is probably being very, very, very naive."
It sounds like on-the-field referees will be getting more information from New York in the playoffs. AP Photo/Bill Wippert
The upside of this week's announcement is that it will minimize the possibility of an embarrassing mistake in a playoff game. If a referee loses track of downs, as Pete Morelli's crew appeared to do in a Week 12 game between the Cardinals and 49ers, Blandino could catch and correct it. If a clock operator allows time to run off in error, Blandino could restore it. From my perspective, as discussed in September, this expansion provides a painless safety net for the most correctable errors.
The bigger question: Where could this modification lead? Questions of consistency, accountability, motive and transparency grow more complicated upon the introduction of a new dynamic.
"I would hope they'll limit this to correcting only the most egregious of errors," said retired NFL referee Gerald Austin, now an ESPN analyst. "I don't want to sound critical, but there have been some inconsistencies in the decisions that New York has made on replays this year. So what would you be doing? Would you just be shifting the inconsistency you may perceive on the field for the inconsistency from New York?"
On a philosophical level, Pereira said, the questions grow more basic. Officials are in place to be the objective, uninfluenced third-party administrators of games. What would it mean to introduce the possibility of, in essence, a wizard pulling levers behind the curtain?
"Everything up to the point of putting the earpiece into the referee's ear," Pereira said, "has been accountable. It was what you saw on the field. A conversation with someone in New York, that's the unknown. I would understand a coach being concerned about that. How do you know what's being said? How do you know they're only covering the plays that are reviewable? And what are you left to think if they have that in place and still miss something?"
Said former NFL official and supervisor Jim Daopoulos: "If they're going to be in the ears of the officials, how do you determine who is accountable? Say an official makes a call on the field and the flag is picked up, as happens from time to time. Is it picked up because the crew got together and decided it needed to be, or was it because someone in New York doesn't like the call?"
Indeed, nearly every NFL fan base -- and some team owners -- have taken turns assuming the league plays favorites. (The issue was covered extensively in this ESPN investigation into Deflategate.) Blandino already has experienced the assumptions caused by the most minor of mistakes -- TMZ cameras caught him last year exiting a bus owned by Cowboys owner Jerry Jones during a night out in Los Angeles -- and Pereira believes the wireless connection during games will only fuel future concerns.
"Basically, what it looks like is that the league office is making decisions on who possibly wins or loses the game," Pereira said. "You could go back to the old theory of the conspiracy of the Raiders, that the league didn't like [former owner] Al Davis and all the stuff that went along with it.
"All of a sudden, decisions that were being made on the field or in the stadium, all of a sudden are being made in the league office. That seems to be the wave of where this is going. Things have changed so much, but this ... strive for perfection really isn't attainable. I wish I could be effusive in praise of all of the changes and the technology, that it can make things better.
"Maybe I will someday." |
Renal alterations induced by Cerastes cerastes cerastes venom.
The purpose of the present study was to determine the structural and functional alterations in the kidneys of rats experimentally envenomated with the viper Cerastes cerastes cerastes. The effects of a single i.p. sub-LD50 (0.73 mg Kg-1) for 24 hr and 7 consecutive doses (0.42 mg Kg-1; daily injection) on the kidneys of rats were studied. Histological examination of the kidneys in envenomated rats revealed the presence of atrophied glomeruli, cloudy materials within the proximal and distal convoluted tubules, atrophy and hypertrophy of quite a large number of tubular nuclei and mesangial proliferation. Hemorrhagic areas, dilated thrombosed vessels, fibrosis, and mitotic indices were also among the histopathological alterations in the renal cortex of the venom-injected animal groups. Electron microscopical findings revealed the presence of cell debris and electron dense materials within the lumen of the distal and proximal convoluted tubules. The cell lining of the proximal convoluted tubules underwent variable degrees of degeneration, and most of their intracellular organelles were deteriorated. The glomeruli contained quite large areas of mesangial matrix, and the lumen of most of their blood capillaries enclosed a moderately electron dense matrix. The cells of the endothelial lining of these capillaries were hypertrophied, and most of them lost their integrity and diffused with the surrounding matrix of the capillary lumen. Several leukocytic aggregates were observed in the intertubular spaces and blood capillaries. In addition, the erythrocytes of most of these capillaries displayed different patterns of electron density. |
Q:
how to convert text input to java.time.LocalDateTime?
i'm trying to make form, which will add new Lecture to my University dataBase.
So, model class Lecture has field LocalDateTime date and i need to convert input text from form to LocalDateTime, i getting issue:
Failed to convert property value of type java.lang.String to required type java.time.LocalDateTime for property date; nested exception is org.springframework.core.convert.ConversionFailedException: Failed to convert from type [java.lang.String] to type [java.time.LocalDateTime]
my controller:
@GetMapping("/createNew")
public String showSignUpForm(Model model) {
Lecture lecture = new Lecture();
model.addAttribute("lecture", lecture);
return "lecture/SaveLecture";
}
@PostMapping("/addLecture")
public String createLecture(@Valid Lecture lecture, BindingResult result, Model model) {
if (result.hasErrors()) {
return "lecture/SaveLecture";
}
try {
lectureService.save(lecture);
} catch (TimeTableOverlayException e) {
return "lecture/SaveLecture";
}
return this.getAllLectures(model);
}
and form:
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css" integrity="sha384-9aIt2nRpC12Uk9gS9baDl411NQApFmC26EwAOH8WgZl5MYYxFfc+NcPb1dKGj7Sk" crossorigin="anonymous">
<title>Save new lecture</title>
</head>
<body>
<div>
<form action="#" th:action="@{/lecture/addLecture}" th:object="${lecture}" method="POST">
...
<label for="date">Date</label>
<input type="text" th:field="*{date}" id="date" placeholder="Date&Time">
<span th:if="${#fields.hasErrors('date')}" th:errors="*{date}"></span>
<br/>
...
<input type="submit" value="Add lecture">
</form>
</div>
</body>
</html>
my Lecture class:
public class Lecture {
private int id;
private List<Group> groups = new ArrayList<>();
private Teacher teacher;
private Subject subject;
private LocalDateTime date;
private Audience audience;
public Lecture(int id) {
this.id = id;
}
public Lecture() {
}
public Lecture(Teacher teacher, Subject subject, LocalDateTime date) {
this.teacher = teacher;
this.subject = subject;
this.date = date;
}
public Lecture(int id, Teacher teacher, Subject subject, List<Group> groups, LocalDateTime dateTime) {
this.id = id;
this.teacher = teacher;
this.subject = subject;
this.groups = groups;
this.date = dateTime;
}
public Lecture(int id, Teacher teacher, Subject subject, LocalDateTime dateTime) {
this.id = id;
this.teacher = teacher;
this.subject = subject;
this.date = dateTime;
}
public int getId() {
return id;
}
public void setId(int id) {
this.id = id;
}
public void setGroups(List<Group> groups) {
this.groups = groups;
}
public void setTeacher(Teacher teacher) {
this.teacher = teacher;
}
public void setSubject(Subject subject) {
this.subject = subject;
}
public void setDate(LocalDateTime dt) {
this.date = dt;
}
public void setAudience(Audience audience) {
this.audience = audience;
}
public List<Group> getGroups() {
return groups;
}
public Teacher getTeacher() {
return teacher;
}
public Subject getSubject() {
return subject;
}
public LocalDateTime getDate() {
return date;
}
public Audience getAudience() {
return audience;
}
@Override
public int hashCode() {
final int prime = 31;
int result = 1;
result = prime * result + ((audience == null) ? 0 : audience.hashCode());
result = prime * result + ((date == null) ? 0 : date.hashCode());
result = prime * result + ((groups == null) ? 0 : groups.hashCode());
result = prime * result + id;
result = prime * result + ((subject == null) ? 0 : subject.hashCode());
result = prime * result + ((teacher == null) ? 0 : teacher.hashCode());
return result;
}
@Override
public boolean equals(Object obj) {
if (this == obj)
return true;
if (obj == null)
return false;
if (getClass() != obj.getClass())
return false;
Lecture other = (Lecture) obj;
if (audience == null) {
if (other.audience != null)
return false;
} else if (!audience.equals(other.audience))
return false;
if (date == null) {
if (other.date != null)
return false;
} else if (!date.equals(other.date))
return false;
if (groups == null) {
if (other.groups != null)
return false;
} else if (!groups.equals(other.groups))
return false;
if (id != other.id)
return false;
if (subject == null) {
if (other.subject != null)
return false;
} else if (!subject.equals(other.subject))
return false;
if (teacher == null) {
if (other.teacher != null)
return false;
} else if (!teacher.equals(other.teacher))
return false;
return true;
}
}
how i can convert it to LocalDateTime? I saw exaples with converting in contollers with annotation @DateTimeFormat, but i dont understand how i can use it in my case...
A:
Remove placeholder="Date&Time".
And use a default date :
@GetMapping("/createNew")
public String showSignUpForm(Model model) {
Lecture lecture = new Lecture();
lecture.setDate(LocalDateTime.now())
model.addAttribute("lecture", lecture);
return "lecture/SaveLecture";
}
|
Explore nine years of illuminating articles that sharply question what we know. Created to complement the Zimmermania YouTube channel, this blog explores the best of holistic medicine and daily practices. Come explore the many avenues to smarter living and higher consciousness. Welcome to Zimmermania Health.
Bret Stetka is an Editorial Director at Medscape (a subsidiary of WebMD) and a freelance health, science and food writer. He received his MD in 2005 from the University of Virginia and writes regularly for Wired Magazine about brains, genomics and sometimes both. Follow Bret on Twitter @BretStetka
Changing Our DNA through Mind Control?
A study finds meditating cancer patients are able to affect the makeup of their DNA
“I think, therefore I am” is perhaps the most familiar one-liner in western philosophy. Even if the stoners, philosophers and quantum mechanically-inclined skeptics who believe we’re living an illusion are right, few existential quips hit with such profound, approachable simplicity. The only catch is that in Descartes’ opinion, “we” – our thoughts, our personalities, our “minds” – are mostly divorced from our bodies.
The polymathic Frenchman and other dualist philosophers proposed that while the mind exerts control over our physical interaction with the world, there is a clear delineation between body and mind; that our material forms are simply temporary housing for our immaterial souls. But centuries of science argue against a corporeal crash pad. The body and mind appear inextricably linked. And findings from a new study published in Cancer by a Canadian group suggest that our mental state has measurable physical influence on us – more specifically on our DNA.
Lead investigator Dr. Linda E. Carlson and her colleagues found that in breast cancer patients, support group involvement and mindfulness meditation – an adapted form of Buddhist meditation in which practitioners focus on present thoughts and actions in a non-judgmental way, ignoring past grudges and future concerns -- are associated with preserved telomere length. Telomeres are stretches of DNA that cap our chromosomes and help prevent chromosomal deterioration -- biology professors often liken them to the plastic tips on shoelaces. Shortened telomeres aren't known to cause a specific disease per se, but they do whither with age and are shorter in people with cancer, diabetes, heart disease and high stress levels. We want our telomeres intact.
In Carlson’s study distressed breast cancer survivors were divided into three groups. The first group was randomly assigned to an 8-week cancer recovery program consisting of mindfulness meditation and yoga; the second to 12-weeks of group therapy in which they shared difficult emotions and fostered social support; and the third was a control group, receiving just a 6-hour stress management course. A total of 88 women completed the study and had their blood analyzed for telomere length before and after the interventions. Telomeres were maintained in both treatment groups but shortened in controls.
Previous work hinted at this association. A study led by diet and lifestyle guru Dr. Dean Ornish from 2008 reported that the combination of a vegan diet, stress management, aerobic exercise and participation in a support group for 3 months resulted in increased telomerase activity in men with prostate cancer, telomerase being the enzyme that maintains telomeres by adding DNA to the ends of our chromosomes. More recent work looking at meditation reported similar findings. And though small and un-randomized, a 2013 follow up study by Ornish, again looking at prostate cancer patients, found that lifestyle interventions are associated with longer telomeres.
The biologic benefits of meditation in particular extend well beyond telomere preservation. Earlier work by Carlson found that in cancer patients, mindfulness is associated with healthier levels of the stress hormone cortisol and a decrease in compounds that promote inflammation. Moreover, as she points out, “generally healthy people in a work-based mindfulness stress reduction program have been shown to produce higher antibody titers to the flu vaccine than controls, and there has been promising work looking at the effects of mindfulness in HIV and diabetes.” Past findings also show that high stress increases the risk of viral infections – including the common cold – as well as depression and cardiovascular disease.
The therapeutic potential of the mind-body intersect is well-known. Biofeedback – in which sensor-clad patients learn awareness of and control over various physiologic functions – has been around for decades and is used to treat pain, headache, high blood pressure and sleep problems, among numerous other conditions. And of course there’s the placebo effect, the complicated yet very real psychobiological benefit achieved from a patient’s expectations of a treatment rather than the treatment itself.
Though optimistic that meditative and social approaches are mental means toward better physical, and not just psychologic well-being, Carlson rightly hedges. “The meaning of the maintenance of telomere length in this study is unknown. However, I think that processing difficult emotions is important for both emotional and physical health, and this can be done both through group support with emotional expression, and through mindfulness meditation practice,” she says.
Carlson wonders if mentally-rooted telomeric changes are long-lasting, if the same patterns would hold true in other cancers and conditions, and what the effects of mental intervention would be if offered at the time of diagnosis and treatment – all questions she hopes to pursue.
According to a report published by Harvard Medical School in 2011, 6.3 million Americans were using mind-body therapies at the advice of conventional doctors – a surprisingly high number that has surely since grown. Still, prescription meditation – especially in the interest of physical health -- is far from the norm in Western medicine. And it remains unclear whether or not preserved telomeres actually prolong survival in cancer patients; or in anyone for that matter. But stress reduction in the interest of chromosomal preservation, and other possible health benefits, seems like a pursuit even a 17th Century dualist philosopher could get behind. |
Q:
What execCommand commands are available in CKEditor?
Can anyone tell me what execCommand commands are available in CKEditor?
Like editor.execCommand('bold')
A:
The commands that are available to you depend on the installed plugins.
This list of available CKEditor commands can be found using CKEDITOR.instances.editor1.commands
A:
Unfortunately commands are not specified in JSDocs.
However, every command is added to editor by editor#addCommand method, so you can grep the code for them:
> grep -R addCommand *
Regarding Daevo's response - toolbar config consists of buttons names - not command names. Usually each button has corresponding command, but it doesn't have to be a rule.
Tnnks for ur rply..Is there any command to select particular text..?
There are three commands related to selection - "selectAll", "selectNextCell", "selectPreviousCell". But if you want to do custom selection take a look on Range and Selection APIs. In short - you have to create range and call range#select method.
|
Q:
Merge FDF data into a PDF file using PHP
Is it possible to merge FDF data with a PDF file using PHP alone? Or is there no option but to use a 3rd party command line tool to achieve this?
If that is the case can someone point me in the direction of one?
I am currently outputting the FDF file to the browser in the hope that it will redirect the user to the filled in PDF but for some people that is not the case. The FDF contents is being output to the screen, even though I am using header('Content-type: application/vnd.fdf');
A:
For future reference, it looks like there isn't a reliable way of doing it without a 3rd party app. Pdftk (http://www.accesspdf.com/pdftk/) ended up being my solution.
I first generated the FDF file as before, and then merged it into my PDF file using the following PHP code
header('Content-type: application/pdf');
header('Content-Disposition: attachment; filename="Download.pdf"');
passthru("pdftk file.pdf fill_form data.fdf output - ");
exit;
It was much easier than I thought it would be. This instantly eliminates the need to hack around with headers and file extensions to ensure all browsers handle an FDF properly, as it simply makes the browser download the PDF file.
If you want the PDF output file to no longer be editable, use
passthru("pdftk file.pdf fill_form data.fdf output - flatten");
Apologies if this is basic stuff, just thought I'd put it all in one place so that people don't go through the headache that I endured.
N.B. If your PATH variable is not set, you will need to use the full path to pdftk i.e.
passthru("/usr/local/bin/pdftk file.pdf fill_form data.fdf output - flatten");
A:
There is another way to day that not using passthru nor pdftk but just a script made in 2004 but still working well : forge_fdf
it helps you to build a fdf that you can incoporate straithly in your pdf, it means that you
Save this in a php file, let's say generatePdf.php
require_once('forge_fdf.php');
// leave this blank if we're associating the FDF w/ the PDF via URL
$pdf_form_url= "";
// default data; these two arrays must ultimately list all of the fields
// you desire to alter, even if you just want to set the 'hidden' flag;
//
//
$fdf_data_names= array(); // none of these in this example
$fdf_data_strings= array(); // none of these in this example
$fdf_data_strings['email']=mb_strtolower($row_delivreur['firstname']).'.'.mb_strtolower($row_delivreur['lastname']).'@gmail.com';
$fields_hidden= array();
$fields_readonly= array();
// set this to retry the previous state
$retry_b= false;
header( 'content-type: application/vnd.fdf' );
echo forge_fdf( $pdf_form_url,
$fdf_data_strings,
$fdf_data_names,
$fields_hidden,
$fields_readonly );
Making a link to Pathtoyourpdf/nameofpdffile.pdf#FDF=generatePdf.php will open your PDF file in browser (alternatively there is a way to save it to disk i think i remember) and the field email will be filled with data from MYSQL : mb_strtolower($row_delivreur['firstname']).'.'.mb_strtolower($row_delivreur['lastname']).'@gmail.com'
It works with checkboxes, radio button,... It opens well in firefox, it has to be tested with other browsers.
More infos on PDF HACKS
|
When a multilayer ceramic capacitor is used for decoupling around a CPU, an excessively low equivalent series resistance (ESR) of the multilayer ceramic capacitor causes the problem that oscillation due to parallel resonance occurs on a circuit, resulting in an increase in impedance. In order to avoid this problem, in the multilayer ceramic capacitor for use in the application, there has been a request to control the ESR to several 10 to several 1000 mΩ. As a multilayer ceramic capacitor satisfying the request, a multilayer ceramic capacitor having a resistive element in external electrodes has been proposed.
For example, Japanese Unexamined Patent Application Publication No. 11-54368 (Patent Document 1) discloses, as a CR composite electronic component, a multilayer ceramic capacitor having a specific resistance of external electrodes of 6.9×10−6 Ωcm or more, while causing a main composition of a conductive material in the external electrodes to contain at least one of Cu and Ni.
Japanese Unexamined Patent Application Publication No. 2001-223132 (Patent Document 2) discloses external electrodes including a three layer structure with a first conductive layer having oxidation-resistant metal, a second conductive layer formed thereon and including a mixture of a conductive oxide and an insulating oxide, and a third conductive layer formed thereon and including oxidation-resistant metal, to thereby increase ESR.
International Publication No. 2006/022258 document (Patent Document 3) discloses external electrodes including a conductive layer containing a complex oxide which reacts with Ni or a Ni alloy and a glass component in a multilayer ceramic capacitor including an internal electrode containing Ni or a Ni alloy. It also disclosed that use of an In—Sn complex oxide as the complex oxide is preferable.
However, the technique disclosed in each of Patent Documents 1 to 3 has following problems to be solved.
Since the external electrodes contain conductive metal, such as at least one of Cu and Ni, as a main component according to the technique disclosed in Patent Document 1, at least one of Cu and Ni sinter, causing metallic conduction to be dominant, and thereby obtainment of sufficient resistance (ESR) is difficult. Although Patent Document 1 also discloses increasing the resistance by adding a dissimilar metal to be alloyed, the increase in the resistance by such alloying is as small as about 10−6 Ω·cm to 10−4 or 10−5 Ω·cm. This indicates that, even when the external electrodes of a film thickness of 100 μm are formed on an end surface of a multilayer ceramic capacitor having a planar size of 20 mm×1.2 mm, for example, a resistive component of the external electrodes is about from 10−6 Ω·cm to 10−7 Ω·cm, and causes the development of sufficient resistance to be difficult.
In contrast, since the second conductive layer in the external electrodes contains, for example, a ruthenium oxide, a ruthenium oxide compound, or graphite as a main component, sufficient resistance can be obtained according to the technique disclosed in Patent Document 2. However, the technique disclosed in Patent Document 2 has a problem that since expensive metal, such as at least one selected from a group of Pd, Ag, Pt, Au, Rh, Ir, and Ru, for example is used as oxidation-resistant metal forming the first and third conductive layers of the external electrodes, the material cost of the first and third conductive layers increases. The technique disclosed in Patent Document 2 also has a problem that the external electrodes have a three layer structure and each of the first to third conductive layers is formed by being printed and has thick film thickness, so that the thickness of the whole external electrode increases to inhibit reduction in size of component.
The above-described problems encountered in the technique of each of Patent Documents 1 and 2 can be solved by the technique disclosed in Patent Document 3. Briefly, according to the technique of Patent Document 3, sufficient resistance can be obtained without requiring a three layer structure or expensive metal to be used.
However, weather resistance and bonding strength with an internal electrode of the conductive layer which is included in the external electrodes and contains a complex oxide reacting with Ni or a Ni alloy, such as an In—Sn complex oxide, and a glass component according to the technique disclosed in Patent Document 3, are not sufficient. Thus, a favorable bonding state is difficult to maintain against a thermal shock, bending, etc. Patent Document 3 also discloses addition of Ag to control resistance applied by the external electrodes. However, since Ag hardly has a solid solution region with the Ni contained in the internal electrode, the problem that bonding properties with the internal electrode decrease according to an increase of Ag arises. The problem of the favorable bonding with the internal electrode being impeded causes reduction of electrostatic capacitance applied by a multilayer ceramic capacitor.
Patent Document 1: Japanese Unexamined Patent Application Publication No. 11-54368
Patent Document 2: Japanese Unexamined Patent Application Publication No. 2001-223132
Patent Document 3: International Publication No. 2006/022258 document |
Last week, Eliana Johnson and Jillian Kay Melchior at National Review uncovered something interesting about Sen. Elizabeth Warren (D-MA); she made tens of thousands of dollars flipping houses. Yet, she wrote in her 2014 autobiography, “everyone seemed to have a story about someone they knew who was getting rich by flipping houses” when touching upon the events leading up to the 2008 financial meltdown. She apparently omitted her flipping houses prowess that is shown pervasively on HGTV [emphasis mine]:
Nearly two years after Veo Vessels died, her daughter, 70-year-old Mary Frances Hickman, decided to sell the home her mother had left to her. A sprawling brick house in Oklahoma City’s historic Highland Park neighborhood, it was built in 1924, just a year after Mary’s birth. Decades later, one of Vessels’ great-grandchildren fondly recalls the wood and tile floors, the fish pond, the butler’s quarters, and the multi-car garage where children played house. “It was really, really nice,” says Hickman’s granddaughter, Andrea Martin. That’s part of the reason she’s so surprised her grandmother sold the home in 1993 for a mere $30,000. Despite a debilitating stroke, Martin says Hickman remained sharp, and she had always been business-savvy. As an Avon saleswoman, she had at times ranked among the top ten in the country. “So I don’t know why,” Martin says. “Maybe she just wanted out from underneath it, but to sell it for such a low number — I don’t know. Maybe she got bad advice, maybe she was just tired.” The home’s new owner: Elizabeth Warren, today a Massachusetts senator who has built a political career on denouncing the sort of banking titans and financial sophisticates who make a buck off the little guy. Five months after purchasing Veo Vessels’ old home, Warren flipped the property, selling it for $115,000 more than she’d paid, according to Oklahoma County Property Assessor records. … Warren rose to political prominence in the wake of the 2008 financial crisis as a crusader against big banks and a dispenser of common-sense economic advice. She campaigned for the creation of the Consumer Financial Protection Bureau, intended to shield people from the predations of the mortgage and credit-card industries, among others. In her 2006 book All Your Worth, co-authored with her daughter, Amelia, Warren lists as a top myth the idea that “you can make big money buying houses and flipping them quickly.” She has made a career out of telling people how to behave in financially responsible ways, and out of creating laws that will make it illegal for them to do otherwise. But Warren bought and sold at least five properties for profit at a different time in her life, before the cratering economy and a political career made her a star. … In 1993, Warren bought a foreclosed property on N.W. 14th Street in Oklahoma City for $4,000. National Review attempted to contact the couple who had owned it. No phone number or email could be found on record for them, and they did not respond to a letter mailed to their last known address, in Colorado. No public records could be found elaborating on the events that led to the foreclosure of their home. In 2004, Warren transferred the home to her brother, John Herring, and his wife, who sold it for $30,000 in 2006, a 650 percent increase over what Warren initially paid for it. Neither Warren nor her brother filed any permits to make improvements. In June 1993, Warren bought another foreclosed property in Oklahoma City, this one on West Wilshire Boulevard, for $61,000 from the U.S. Department of Housing and Urban Development. Because properties purchased from HUD are sold as is, and because foreclosed homes can have damage ranging from simple poor upkeep to stripped copper, “the only reason you do that is for profit,” says Steve Stout, residential field supervisor at the Oklahoma County Assessor’s Office. … Warren has been outspoken about the dangers of home foreclosure. In a 2002 book, The Fragile Middle Class, co-authored with Teresa Sullivan and Jay Lawrence Westerbrook, she wrote that foreclosures are “notorious for fetching low prices.” And as a professor at Harvard Law School, in the wake of the financial crisis, Warren served as a member of the congressional panel overseeing the Troubled Asset Relief Program. The panel produced, among other things, a report on the foreclosures taking place across the country. It began with a paean to the place of the home in American life: “Foreclosures are about the home,” it said, which is “the physical and emotional nexus of many households as well as the centerpiece of many Americans’ finances.” Foreclosures, it concluded, “can harm other homeowners both by encouraging additional foreclosures and by reducing home sale prices, while decreased property values hurt local businesses and reduce state and local tax revenues.” A year after buying the foreclosed property on West Wilshire Boulevard, Warren also bought the house next door for $72,000. Despite filing no building permits to renovate at either property, Warren pocketed $34,000 in profits when she sold the first house in December 1994, and she and her husband, Bruce Mann, made an additional $32,000 when they sold the one next door in 1998. That same year, Warren sold another home she and Mann owned for a sizeable profit. The couple had purchased the property, at 4721 Dove Tree Lane, in 1991, filing permits for mechanical and plumbing repairs, according to Oklahoma County Assessor’s Office records. “We’re talking about more than just painting or minor repairs,” says Stout, adding that it could add up to tens of thousands of dollars. “It’s serious work.” Still, the investment seems to have paid off: Warren and her husband paid only $50,000 for the house and sold it for $109,500, a 119 percent gain. The profits from these flipped homes adds up: Even excluding the property sold by her brother, Warren and her husband have made at least $240,500 flipping homes (before deducting the unknown sum they invested in remodeling).
For Warren, the far left has ended their effort to get her to run in 2016–Sen. Bernie Sanders (I-VT) is now the progressive alternative to Hillary. So, this story isn’t going to go anywhere as close to the endless saga surrounding the Clintons and their non-profit. Nevertheless, some of Warren’s closest confidants, like Camden Fine of the Independent Community Bankers of America, noted that she probably would admit–privately–to the fact that she’s not ready to run for president; Clinton’s political machine would destroy her; and she’s done a lot in protecting the middle class Senate.
Fine’s neutrality regarding the Consumer Financial Protection Agency led to its creation; the agency that was the brainchild of Warren’s probably would have never gotten off the ground if community bankers balked at the idea in public. Also, Warren worked behind the scenes to end Larry Summers and Antonio Weiss’ Treasury nominations. Weiss had supported the move by companies to relocate their headquarters in foreign countries with better tax codes. Summers is another story (via National Journal c. 2013):
Summers has made a lot of errors in the past 20 years, despite the eminence of his research. As a government official, he helped author a series of ultimately disastrous or wrongheaded policies, from his big deregulatory moves as a Clinton administration apparatchik to his too-tepid response to the Great Recession as Obama's chief economic adviser. Summers pushed a stimulus that was too meek, and, along with his chief ally, Treasury Secretary Timothy Geithner, he helped to ensure that millions of desperate mortgage-holders would stay underwater by failing to support a "cramdown" that would have allowed federal bankruptcy judges to have banks reduce mortgage balances, cut interest rates, and lengthen the terms of loans. At the same time, he supported every bailout of financial firms. All of this has left the economy still in the doldrums, five years after Lehman Brothers' 2008 collapse, and hurt the middle class. Yet in no instance has Summers ever been known to publicly acknowledge a mistake.
Warren is a stalwart for the progressive left, and her work is emblematic of her political orientation. At the same time, none of this would have been relevant if Warren had come clean about her housing work. There’s nothing wrong with flipping houses or making a lot of money. But, when you channel that passion into becoming the Dark Knight of the middle class, say that foreclosures are a problem, being one of the overseers for the TARP program, and then partake in buying foreclosed homes to bath in the green, it sort of makes you look like the typical politician. Oh wait; someone (Barack *cough* Obama) has already called her out on being “a politician like everyone else” when it comes to other issues, like the Trans-Pacific Partnership. It seems to apply to other issues as well.
Again, it may be helpful to keep this little tidbit on Warren in the backburner for a later date. |
3/315)
Simplify ((s/(s**(-1/3)*s)*s**2)/(s**3/(s/(s*s**(-1/9)))))/((s/s**7)/(s**(-3/2)*s)*s*s**(-1/5)*s**(-8)*s*s) assuming s is positive.
s**(913/90)
Simplify ((f**(-1/2))**48)**(-35)/((f**1*f)**(-33)*(f/((f*f*f**(3/5)*f)/f))/f**2) assuming f is positive.
f**(4548/5)
Simplify l**(2/45)*l*l/(l*(l/l**6)/l)*(l**(-16)*l)/((l**15/l)/l) assuming l is positive.
l**(-943/45)
Simplify (d/(d/d**(1/2))*((d/(d/(d/(d*d*d**(-16)))*d*d*d))/d*d*d)/d*d**(-5/8)*d**(2/7))**26 assuming d is positive.
d**(8853/28)
Simplify ((s*s**(-11))/s**6)**(-24/7)*(s/s**11*s*s**0)**(4/13) assuming s is positive.
s**(4740/91)
Simplify (((c**(-2)/c**(2/3))/(c**3)**21)**(-6))**2 assuming c is positive.
c**788
Simplify ((q/q**0*q)**(-2/37)*q**(-27)/(q*q/((q/q**(2/67)*q)/q)))**(-20) assuming q is positive.
q**(1395080/2479)
Simplify ((d**(-2/3))**8/(d*d**1*d)**(-12))/((d**3/(d**(2/13)*d))/(d**(4/5)*d*d**(1/2)/d)) assuming d is positive.
d**(11747/390)
Simplify (((((k*k**(2/7)/k)/k)/k)**(1/13)/(k**(-2/5)/(k/k**(-2))))**(-2/5))**(1/13) assuming k is positive.
k**(-2974/29575)
Simplify (d**(5/2)*d*d*d/(((d**(-13)*d*d)/d)/d)*d*d)**(2/63)*((d**(-4/3))**(2/11))**(7/8) assuming d is positive.
d**(304/693)
Simplify ((h**(-3))**(-15/4)*((h*(h*(h*h/(h*h**(-9)))/h)/h*h)/h)/h**(-1))**18 assuming h is positive.
h**(801/2)
Simplify ((((k**(1/13)*k)/k)/((k*k**(-1/24)*k*k)/k))/((k**(-2/7)*k)/(k**25/k)))**(-3/41) assuming k is positive.
k**(-46747/29848)
Simplify ((u*u**(1/5))/(u*u/(u**25*u*u)*u)*(u/(u/u**11))**6)**(-39) assuming u is positive.
u**(-17784/5)
Simplify ((t*t**(-4/9))/(t**(-6)*t))/(t**(2/9))**(3/7)*(t*t**0/t*t*t*t/(t/t**(-3))*t)**(15/7) assuming t is positive.
t**(344/63)
Simplify (w/w**(-4)*w**1*w)**(-5/3)*((w**0*w)/w**(-3))/(w**(3/4)/w**(-5)) assuming w is positive.
w**(-161/12)
Simplify a**(6/11)*a*a/(((a*a*a**(-4)*a)/a)/a)*a*a*a**(-2/27)*a**(-5)*(a**(6/7)/a**(-2/3))/((a*(a/a**(-4/7))/a*a)/(a*a**(-8)*a)) assuming a is positive.
a**(-9514/2079)
Simplify ((s/(s/s**(-5/2))*s*s/(s/(s/(s**18/s))))/(s*s**(-1/9)/s)**48)**(-2/51) assuming s is positive.
s**(73/153)
Simplify ((u**(-1/4)*u)/(u*u**0))**(-2/45)/((u**(-5/3)/u)/u**(3/2)*u**(-1/4)/(u/(u*u*u/u**1))) assuming u is positive.
u**(617/180)
Simplify (s**(-12)/s*s)**(-12)*(s*(s/(s*s**(-37)/s))/s)**(-37) assuming s is positive.
s**(-1262)
Simplify ((n*n/(n**1*n))**(-2)/((n/(n*n/(n/(n*n*n**1))))/(((n/(n/n**(2/31)))/n)/n)))**(28/3) assuming n is positive.
n**(308/31)
Simplify (y/(y*y/y**(4/7))*y*y**(1/3))/((y/((y/y**(2/5))/y))/y)**(15/2)*((y/(y*(y**(1/10)/y)/y)*y)/y**(-1))/(y**(-2/9)/y**(-2)) assuming y is positive.
y**(17/630)
Simplify ((c*c/(c**(-2/33)*c))**(-1/18)*(c**(-2/9))**(6/5))**(-2/203) assuming c is positive.
c**(967/301455)
Simplify ((i*(i/(i/((i/(i/(i/i**(4/13))))/i)))/i)/(i*((i**26*i)/i)/i)*(i**(-6))**(-28/5))**(-44) assuming i is positive.
i**(-20856/65)
Simplify ((z/(z/((z*z*z/z**19)/z)))**14*z**28*z*z*(z*z**(4/19))/z)**(1/14) assuming z is positive.
z**(-282/19)
Simplify (q**(-2/17)*q*q**(-6/7)*q*(q**(-1))**(-12))/(((q/q**(1/3))/(q/(q**(4/5)/q)))/(q**(2/5))**(-1/36)) assuming q is positive.
q**(145093/10710)
Simplify ((l**(7/6)*l**(1/15))/(l**(-2/21))**(-13))**(-1/9) assuming l is positive.
l**(1/1890)
Simplify ((q*q/(q/(q**2/q)))/q)**28/(q/(q**1/q))**33*(q**1)**30/(q*q*(q/(((q/(q/q**0))/q)/q))/q*q*q*q/q**6) assuming q is positive.
q**24
Simplify (g**2*g)**47*g**(1/15)*g*g**(-4/7)*((g**(-6)*g*g)/(g**0/g))**(3/5) assuming g is positive.
g**(14668/105)
Simplify (m**(3/2)*m**(-7/4))/(m**1*m)**18*((m**(1/3)*m)/m)/(m**(-7)/m*m*m*m)*(m*(m/m**(-7))/m)/(m*m**4) assuming m is positive.
m**(-335/12)
Simplify ((w/(w**(-2)/w)*w)**43)**2/((w**(-3)*w)**(-1/46))**(11/4) assuming w is positive.
w**(39549/92)
Simplify ((r**(-12)/r*r)/((r**(1/3)*r)/r))**38*(((r**(-2/15)*r)/r)/(r**5/r))**(-3/8) assuming r is positive.
r**(-28027/60)
Simplify ((f/(f*(f*f**(3/4)/f*f)/f))/(f/(f/(f*f**(-5)))))**(-49)/(f**(-4)*f*f*f**(-2)*f*(f**(-1/6)*f*f)/(f/(f*f**(1/7)*f))) assuming f is positive.
f**(-13375/84)
Simplify (((k**(-1/2)/k*k*k/((k*k**3/k)/k)*k)/(k**0)**0)**(-12))**(-43) assuming k is positive.
k**(-258)
Simplify (((p**(1/2)/p)**(-46)/(p**(1/3)*p*p**(-1/4)))**44)**(2/45) assuming p is positive.
p**(5786/135)
Simplify (f*f*f**(2/7)*f**(2/5)*((f**5*f)/f)/(f*f**7/f))/(f/f**(2/9)*f*f**0)**0 assuming f is positive.
f**(24/35)
Simplify ((i*i**5)**(2/7))**47/(i/(i*i**(2/3))*i**(1/8)*i*i**7*i*i**(-4)*i) assuming i is positive.
i**(12619/168)
Simplify s**(1/34)*s**(-1)*s*s*(s/(s/(s/(s**(2/61)*s))))/s*s**(-1/12) assuming s is positive.
s**(-1079/12444)
Simplify (x/((x**(-4)/x)/x)*x**(-1/2))**(-47)*(x**(1/4)*(x*x**(-4))/x)/(x/((x**(-1)*x)/x))**(-14) assuming x is positive.
x**(-1125/4)
Simplify ((u**7/((u/(u*(u**(-6)/u)/u))/u))/(u**(1/14)*u*(u/u**(-3))/u*u*u))/(((u/(u/(u**(-1)/u)))/u)**(-2/41)/(u**(-8)*(u*u**(1/8))/u)) assuming u is positive.
u**(-32357/2296)
Simplify (y**(1/13)*y**(1/15)*(y**(-24))**(-42))**(-2/65) assuming y is positive.
y**(-393176/12675)
Simplify ((k/((k*k*k**(-1/10)*k)/k))**(4/21)*(k/((k*k**24)/k))**(-8))**(1/14) assuming k is positive.
k**(3217/245)
Simplify (l**3/(l**(1/5)/l)*(l**(1/3)*l*l*l)**(-26))/((l/l**(-1/5))/(l*l**(5/2))*(l*l*l**1*l)**(-35)) assuming l is positive.
l**(1783/30)
Simplify (i**(2/3)/i**(-6))**(-1/7)*i**(-5/4)/i**(-2/11)*i**2/(i/(i*i**(3/7))*i) assuming i is positive.
i**(-547/924)
Simplify (a/a**(-14/5))**(-8)*a*a/(a/(a/((a*a**(6/11))/a*a)))*a*(a*a**(-7))/a assuming a is positive.
a**(-1977/55)
Simplify (((k/k**4)/k)/(k/k**(-5)))**(-23)/(((k**(-4)*k)/k)/k**(-6/5))**(-40) assuming k is positive.
k**118
Simplify ((((u**(2/9)*u*u)/u*u*u**(1/3))**(-11))**(18/13))**(-23) assuming u is positive.
u**(11638/13)
Simplify ((s**(2/13)/(s/(s**7*s)))/(s/(s*s/s**0)*s*s**0))/(s**4*s*s*(s*s**(-2)*s)/s*(s/s**(2/9))/s*s/s**(-2/13)) assuming s is positive.
s**(11/9)
Simplify (((k/(k/(k**(6/7)*k)*k)*k*k*k**4/k)/(k*k/k**(1/7)*k*k**(2/17)))**(-30))**50 assuming k is positive.
k**(-73500/17)
Simplify ((g**(-1)/(g/(((g/(g/((g/(g**(3/7)*g))/g))*g)/g)/g)*g))/((g*g**(-1/6))/(g*g/(g**(-3/2)*g))))**(-8/13) assuming g is positive.
g**(632/273)
Simplify (q**3*(q*q*q/q**3)/q)**(-3/28)*q**5/(q/q**2)*q**0*q**(2/7)*q assuming q is positive.
q**(99/14)
Simplify ((i*i**(-1))**34/(i**0)**(12/13))/((i**(-5/6)*i/i**(-6))/(i**(6/11)/i**(4/3))) assuming i is positive.
i**(-153/22)
Simplify (h*(h**(-2/5)*h)/h)**(1/2)/(h**0/(((h/h**(-4))/h)/h))*((h*h**(-6))/h**0)**(2/9) assuming h is positive.
h**(197/90)
Simplify ((((l/(l*l/(l/l**3)))/l)/l)/l**4)/((l*(l/l**1)/l*l)/l)**(1/17)*l**(-1/4)/(((l/(l**(2/5)*l))/l)/l)*(l*l*l**(-5))/l**1 assuming l is positive.
l**(-217/20)
Simplify ((r*r/r**(-2/5)*r)**40/(r**7*r**(-3/7)))/(r*r/((r*(r*r**(3/5)*r)/r*r*r)/r*r)*r**(-6)/r*r*(r**(-2/3))**(5/4)) assuming r is positive.
r**(29161/210)
Simplify ((n/(n*(n*n**(-12))/n))/(n*n*n/(n/(n*(n**4*n*n)/n))*n)*(n*n**(-3/10)*n)**(-12/7))**32 assuming n is positive.
n**(96/35)
Simplify (o/(o*o**(-2/9)*o*o))**50/((o*o/(o**4*o*o))/(o*o/o**(-3)))*((o*o*o/(o*o**1*o*o))/o)**(1/35)/(((o*o**(-2)*o)/o)/(o**(-2/9)/o*o)) assuming o is positive.
o**(-24938/315)
Simplify ((q**5*(q*q*q*q*q**(4/7)*q*q)/q)/(q*(q/(q*q*q*q*q*q*q/q**(-6)*q*q*q))/q)**(1/2))**40 assuming q is positive.
q**(5060/7)
Simplify ((q*q*q**(-1/54))/q**(-26))/((q*q**(4/13)/q)/(q*q/(q/(q*q*q**(10/7))*q))) assuming q is positive.
q**(152837/4914)
Simplify (((i*i/(i*i**(-4/5)))/i**25)/((i/i**22)/i**(-5/6)))**40 assuming i is positive.
i**(-364/3)
Simplify y**30*y/y**(2/107)*(y**(-28))**(5/4) assuming y is positive.
y**(-430/107)
Simplify ((d**24)**(-1/18)*d**(6/17)/(d**(-1/2)/d))**(-33) assuming d is positive.
d**(-583/34)
Simplify ((a/(a/(a/((a/(a/(a*a**7)))/a))))/a*a*a**3)/(a/a**(-1/4))**(-7)*a/(((a/(a**(-2/7)/a)*a)/a)/a)*a*a**5*(a**(-2/3)*a)**31 assuming a is positive.
a**(1831/84)
Simplify (o**(10/3)/(o/o**5)*(o**(-2/7)/o)**(-24/7))**(-2/31) assuming o is positive.
o**(-3452/4557)
Simplify (((o**(-9/4)*o)/o)/(o/o**6))**(-2/79)/(o**(-7)*o**(1/3)*(o/(o/o**4))/o**(2/11)) assuming o is positive.
o**(14489/5214)
Simplify ((a**0)**(-8/3))**42*a*a*(a/(a*a*a**(-1)*a*a)*a)/a*a*a/a**(-3)*a*((a/a**0)/a)**(-2/31) assuming a is positive.
a**6
Simplify ((g**(-2/3))**(-2/59)/(g/(g*g*(g/g**2)/g*g))**(-13/5))**(2/139) assuming g is positive.
g* |
Q:
How are the controllers for a specific view called?
I'm trying to understand how to component com_installer (the componenent for installing the extensions) in the administrator folder in joomla works under the hood. In particular, I'm trying to understand what happens when you submit the uploaded extension zip.
In default.php in
com_installer/views/install/tmpl
I've found the following code:
<form enctype="multipart/form-data" action="<?php echo JRoute::_('index.php?option=com_installer&view=install');?>" method="post" name="adminForm" id="adminForm" class="form-horizontal">
which seems to indicate that the uploaded file is sent to the same install view itself (the same view you are in when you upload the file). Now in the controller that corresponds to the view, it seems like it takes the corresponding model and calls the relevant function in the model to install the extension.
Now what I suspected, is that when you request a certain view, Joomla will first go to the corresponding controller (if any exists) and see if there exists a function with the same name as the view (in the case of the installer, the view is install, there is a controller install with a function install() inside).
However making a simple test for this, where I have a view called contentimporter, and the corresponding controller:
class ContentImporterControllerContentImporter extends JControllerLegacy
{
public function contentImporter() {
$redirect_url = 'index.php?option=com_installer';
$this->setRedirect($redirect_url);
}
now if this function did indeed get called when going to index.php?component=com_contentimporter&view=contentimporter then I would be redirected to the installer component, but I'm not.
Any help as to how I'm thinking wrong would be greatly appreciated!
A:
You also need to take into account the data that is posted with the form. So if you look at line 179 of that default.php template file you will see:
<input type="hidden" name="task" value="install.install" />
The string is in the format "controller.method". This tells Joomla load the install controller (com_installer/controllers/install.php) and call it's install() method.
You can see how the controller instance is generated and loads the controller based on the task value by looking at libraries/legacy/controller/legacy.php line 230 onwards:
public static function getInstance($prefix, $config = array())
One last thing to note is often JavaScript on the 'save' button will also set/alter the task input's value, so that is worth double checking when trying to figure out what task is being submitted.
|
Q:
Ogre3D : seeking advices about game files management
I'm working on a new game, and its related level editor, based on Ogre3D.
I was thinking about how i could manage the game files, knowing that Ogre use .mesh files for models, .material for materials/texture information etc... .
At first i thought about a common .zip folder decompressed at runtime (the same way Torchlight and Ogre samples do). But this way the game assets become a monolithic archive, loading takes time, and could be difficult to eventually patch them.
So, let's say i have a game object named "Cube" i want to load in my program.
Going for modularity, what if i create a compressed file (using zlib compression routines) named Cube.extname, containing its sub-files Cube.mesh, Cube.material and so on ?
Are there any alternatives or should i stick with compressed objects?
PS: Just to clear things, the answer is unrelated to my program code, at the moment i'm using "resources.cfg" pointing to the OgreSDK media directory.
A:
You can have the assets of the game organized with any structure. Ogre only needs to know a parent directory or more ( this depends if you separate the assets to use on different nivels or to load at different times ), this information is written to the file "resources.cfg".
This is a valid approach, but package the files in a zip archive has some advantages:
It's open format.
The virtual files within a ZIP archive "remember" their relative path.
ZIP archives may be compressed: less space
ZIP archives are modular: useful for localization, for example.
Obviously is faster decompress a large chunk of bytes that multiples small chunks. You should use streaming decompression and use a loading bar at first of a level.
You can see more about Resource Managers at the book:
Title: "Game Engine Architecture"
Author: Jason Gregory
Chapter: 6. Resources and the File System
|
Q:
Tool to remove all non-package files on a system
If you want to keep for example a build or server system clean, it is very useful to be able to check that all files are present and accounted for by the package metadata. At work we have a very nice tool which, if run without any parameters, simply creates a file with rm/rmdir statements for any and all files/directories not mentioned by any package (excluding some trees like /home). This is different from rpm -V and debsums, which only check the files already mentioned by a package.
Is there a tool like this for DEB/RPM/Ports/other packaging systems? DEB would be the best, but porting from another system (or our own, if nothing else exists) would probably be feasible.
PS: I am not looking for alternative architectures. The issue here is to have absolutely every file on the system accounted for. VMs and such are not applicable.
A:
If what you want is a file integrity checker, then RPM will do what you want. rpm -qaV(note the uppercase V). That will go through and check:
file size
mode(permission and file type)
MD5 checksum
device number(checks if someone's hiding a file by mounting another partition there
readlink path(if the symlink points to a different file)
user ownership
group ownership
modification time
That should be a fairly comprehensive list.
rpm -qa --filesbypkg | awk '{print $2}' will list all the files on the system that have been accounted for.
find / | grep -vf /tmp/files-on-system.txt will find all files on the system that are not in the RPM database. Another way of accomplishing these two commands in one command would be rpm -qf 'find /'#replace single quote with backtick NOTE: This will also flag as erroneous files in directories like
/dev
/home
/proc
/var/run
/var/log
/var/lib
/tmp
|
Fifteen states have statutes allowing students who are in the United States without legal permission and were brought to this country as children by their parents to be eligible for in-state tuition. To qualify, they have to have graduated from a high school in the state and meet other requirements, such as having been a state resident for two years or three years. |
We hear a lot about the potential and implications of the gene-editing technique CRISPR, but it’s not like just anyone can open up an app, pick a gene they don’t like, and build the molecular machinery needed to snip it out. That’s the goal, though, and Synthego is one of the companies pursuing it by creating a sort of ready-made CRISPR sandbox to start new researchers off.
“80 percent of users getting into CRISPR have never done genetic engineering at all. So we simplified the process,” said Synthego founder Paul Dabrowski on stage at Disrupt today. “It’s a beautiful interface… but there’s a lot of heavy lifting in the background.”
If you want to use CRISPR, you need the genome of the animal you want to use, the DNA code gene you’re targeting, and a corresponding piece of RNA that leads the genetic scissors to the right location. And it’s as difficult to share and compare with others as it is to do in the first place.
[gallery ids="1491387,1491385,1491384,1491382,1491381,1491375,1491374,1491373,1491372,1491371,1491369"]
Dabrowski compared it to GPS. It isn’t much use to the average person if it’s just a readout of code. You need a compass, maps, images, and an interface if you want it to be useful. The genetic engineering equivalent of that metadata, if you can imagine that, is what Synthego wants to provide, and empower would-be researchers in the process.
Perhaps the most obvious benefit of the Synthego platform is its selection of genomes: 100,000 of them, belonging to 9,000 species. So if you’re a small research outfit looking to test the effect of an insecticide on local amphibians, you may not have to use up time and money sequencing them.
“You can design CRISPR for pretty much any organism out there,” Dabrowski said with evident pride. Now, to be clear, a lot of that list is bacteria. I couldn’t find any bears, but I did find dogs.
Once you specify the gene you’re looking to disable (no adding genes yet — that’s more difficult and more ethically dubious), Synthego generates the “guide” RNA strand needed to take the CRISPR molecules to their targets. Or, if you already have the guide RNA, the platform can double check it for accuracy — and then you can order a few strands right there.
Dabrowski hopes that this vastly simplified interface will allow more people to perform more experiments, and generally increase the amount of work in the space. Part of that would also be from the ability to easily share your design or compare with existing work. Who knows what techniques or discoveries might help build a new vaccine or treatment, if only the data pertaining to these small-scale experiments were more liquid.
On stage, Dabrowski described the genesis of the company, which started just last year and is already shipping RNA to 35 countries. He and his brother both worked at SpaceX, and both left at the same time in 2009. (Not 2016, as this paragraph read originally — that’s just when Synthego was founded.)
“There was an opportunity to apply a pure engineering, agile software mindset to biotech here,” Dabrowski recalled. (Unfortunately, “Elon wasn’t necessarily the happiest.”)
“There are applications in therapeutics and in biofuels,” he said. “We’re starting to build out all the informatics behind the scenes, and over time we’ll become more of a software company.”
But for now he and Synthego are definitely focused on biotech: Dabrowski expects “an unprecedented level of understanding” when it comes to biology and genetics over the next decade, and demand for free, accessible tools like this one will go through the roof. |
EC President Jean-Claude Juncker. STEPHANIE LECOCQ / EFE
European Commission President Jean-Claude Juncker on Friday expressed concern about the Catalan crisis in Spain, noting that a breakup could lead to further splintering across Europe.
“If we allow Catalonia – and it is not our business – to separate, others will do the same,” he said in a speech at Luxembourg University. “I do not want that. I wouldn’t like a European Union in 15 years that consists of some 98 states,” he said, alluding to the 98 major regions that the EU is composed of, according to Eurostat.
I wouldn’t like a European Union in 15 years that consists of some 98 states
EC chief Jean-Claude Juncker
“It’s already relatively difficult with 28 and with 27 not easier, but with 98 it would simply be impossible,” he added, illustrating the fact that barely half a dozen European countries can say that they lack any kind of territorial dispute within their borders.
Juncker insisted that the Catalan crisis remains an internal issue but also unveiled that he has been pressuring the conservative Spanish leader to take decisive steps to break the impasse.
“For days I have been asking (Prime Minister Mariano) Rajoy to take measures to ensure the situation does not get out of hand,” he said, in a veiled criticism of the conservative Popular Party (PP) government’s handling of the ongoing crisis. “Things have been done, but there is still much left to do.”
The EC chief also said that Brussels will not mediate in the dispute unless Rajoy asks for it
The EC chief also said that Brussels will not mediate in the dispute unless Rajoy specifically asks for it, as the Catalan government has already done. And the Spanish leader is ruling out that option, as it would entail some degree of recognition for the breakaway Catalan authorities.
Instead, the Spanish government has agreed to the opposition Socialists’s proposal to open up to the possibility of reforming the Constitution to find a better fit for Catalonia within Spain. In exchange, however, Catalan premier Carles Puigdemont must retract his plans for independence.
Next Monday at 10am marks the end of the five-day deadline which Madrid has given Puigdemont to clarify beyond any shadow of a doubt whether independence has already been declared in Catalonia or not.
This request follows Tuesday’s ambiguous parliamentary address by the regional premier, who declared independence then immediately placed it on hold, arguing that he is still open to talks with Madrid.
If the answer is yes, Catalan authorities will then have until Thursday to change their mind. After that, Rajoy has pledged to activate Article 155 of the Spanish Constitution, which grants the central government the right to temporarily intervene in a region’s internal affairs to force it to obey national legislation. The Socialists and the reform party Ciudadanos support this move, while Podemos does not.
Leaders of CUP, the small far-left party whose support is critical to Puigdemont’s minority government, on Friday urged the Catalan leader to go ahead and declare a Catalan republic.
“If [the central government] means to keep applying the provisions of Article 155 of the Spanish Constitution, let them do so with the republic already proclaimed,” reads the CUP’s letter to Puigdemont. |
Great Location
Property ID1544118
Lovely 3 bedroom unit, with open plan living polished floor boards throughout. perfectly located to schools and shops. Walking into a great seized lounge with central heating and cooling separate dinning area with adjoining kitchen with gas cooking facilities and dishwasher, perfect walk in pantry. 3 great sized bedrooms and 2 with B.I.R's and ceiling fans, separate bathroom and laundry. Great backyard and single garage. Don't miss this..!!Call our office to make an appointment today. |
The present invention relates to a method for predicting remaining charge of a battery, such as a rechargeable battery of a portable electronic device.
In general, chargeable lithium ion batteries are widely used for portable electronic devices, such as notebook personal computers. The lithium ion batteries have advantages such that the operational cost of portable electronic devices can be reduced and the capacity of the current which is instantaneously dischargeable is large. Normally, a machine which has a rechargeable battery so called secondary battery, such as a lithium ion battery, installed therein incorporates a charging circuit which is to be connected to an external power supply to charge the rechargeable battery. To meet the demands for higher performance and size reduction, recent portable devices require a compact charging circuit which can quickly charge a rechargeable battery to a full level. General portable electronic devices include a capability for predicting the remaining charge of a rechargeable battery, when they are in use, in order to avoid problems with data loss by notifying users of the consumption states of the batteries. The prediction of the remaining battery charge should be carried out accurately.
As shown in FIG. 1, an ordinary portable electronic device 101, such as a notebook personal computer (PC); is connected to a battery pack 102 which has a plurality of built-in rechargeable batteries (e.g., lithium ion batteries) 102a and 102b and operates on power from each rechargeable battery 102a or 102b. The portable device 101 is also operable on power which is supplied from an external power supply such as an AC adapter 103.
A power supply unit for the portable device 101 will be discussed below. The portable device 101 includes a power-supply microcomputer 104, a charger 105, a selection circuit 108, first and second DC—DC converters 109 and 110 and a Low Drop Out regulator (LDO) 111 as a switching regulator.
The charger 105, which is connected to the battery pack 102 and the AC adapter 103, supplies a charge voltage and charge current to the rechargeable batteries 102a and 102b in accordance with a control signal from the power-supply microcomputer 104 to charge the rechargeable batteries 102a and 102b with a constant voltage and a constant current.
The selection circuit 108 selects at least one of the battery pack 102 (rechargeable batteries 102a and 102b) and the AC adapter 103. The input voltage from the selected power supply is supplied to the first and second DC—DC converters 109 and 110 and the LDO 111.
The first DC—DC converter 109 generates a supply voltage to be supplied to a CPU (not shown) from the input voltage. The second DC—DC converter 110 generates a supply voltage to be supplied to peripheral circuits (not shown) from the input voltage. The LDO 111 generates a supply voltage for generating a clock signal (not shown) from the input voltage.
The portable device 101 has a remaining-charge predicting capability for predicting the remaining charge of the battery and notifying a user of the predicted remaining charge.
The remaining-charge predicting capability will be discussed below. Generally speaking, lithium ion batteries are susceptible to overdischarging. If a user erroneously overdischarges a lithium ion battery, therefore, the performance of the lithium ion battery may not be recovered if it is charged. To prevent such overdischarging, the battery pack 102 incorporates a protection circuit 112 which detects when the voltage of one of the rechargeable batteries 102a and 102b drops below a specified voltage and stops further discharging. When the protection circuit 112 functions, the supply of the power from the rechargeable battery 102a or 102b to the portable device 101 is stopped and the portable device 101 stops operating. At this time, the portable device 101 such as a notebook PC, may suffer loss of data which is being processed. To avoid such a problem, the portable device 101 predicts the remaining charge of each of the rechargeable battery 102a and 102b and notifies the user of the consumption state of the rechargeable battery.
The prediction of the remaining battery charge is executed in consideration of various characteristics of the rechargeable batteries 102a and 102b (lithium ion batteries) incorporated in the battery pack 102. The following will explain the characteristics of an ordinary lithium ion battery.
FIG. 2A shows a change in discharge characteristic caused by an increase in the number of times a battery set (rechargeable battery) comprising three cells is used (the number of charges/discharges which will be hereinafter called “cycle number”). The vertical scale shows the discharge voltage and the horizontal scale shows the discharge time. A curve A indicates the discharge characteristic with the cycle number being 1 (initial state), and curves B, C and D respectively indicate the discharge characteristics with the cycle number being about 250, about 400 and about 500. A curve E shows the discharge characteristic with the cycle number being about 650. It is apparent from FIG. 2A that as the cycle number increases, the dischargeable capacity of the rechargeable battery decreases, so that the discharge time (usable time) becomes shorter. This phenomenon is called the “cycle degradation characteristic”.
In FIG. 2B, the horizontal scale of FIG. 2A has been normalized. The horizontal scale indicates the discharge capacity and shows the end time at 100% discharge. FIG. 2B shows that the rate of voltage reduction of the rechargeable battery is nearly constant irrespective of the cycle number.
The cycle life characteristic of the rechargeable battery will be discussed below.
FIG. 3 shows the relationship between the cycle number and the discharge capacity which have been measured for three kinds of rechargeable batteries. The discharge capacity of the rechargeable battery decreases as the cycle number increases. For example, a curve F indicates that the discharge capacity when the cycle number is 600 (the capacity at the time of full charge) has dropped to about 30 to 40% of the maximum capacity.
The following will discuss the degradation characteristic of the rechargeable battery which varies according to the environment of use.
A curve H in FIG. 4 shows the characteristic of the rechargeable battery that has been left out for one month at 45° C., and a curve G shows the characteristic of the rechargeable battery before it has been subjected to the foregoing treatment. The discharge time (use time) of the rechargeable battery varies also depending on the temperature at which it has been used.
FIG. 5 is an explanatory diagram showing the relationship between the discharge power and dischargeable capacity at different temperatures of use for two kinds of rechargeable batteries. Curves I to K respectively show the characteristics when one type of rechargeable battery is used at 5° C., 25° C. and 45° C. Curves L to N respectively show the characteristics when the other rechargeable battery is used at 5° C., 25° C. and 45° C.
The rechargeable battery that is indicated by the curve I for use temperature of 5° C. can be used for about 2.8 hours with a discharge power of 10 W. The rechargeable battery of the same kind that is indicated by the curve K for use temperature of 45° C. can be used for about 3.2 hours with a discharge power of 10 W. The rechargeable battery of the other kind that is indicated by the curve L for use temperature of 5° C. can be used for about 2.8 hours with a discharge power of 10 W. The rechargeable battery of the same kind that is indicated by the curve N for use temperature of 45° C. can be used for about 3.1 hours with a discharge power of 10 W. Apparently, the dischargeable capacity of the rechargeable battery varies depending on the type, the use temperature and the discharge power.
The prediction of the remaining charge of a rechargeable battery has been carried out conventionally in consideration of the aforementioned various characteristics. The remaining charge predicting methods include a method for predicting the remaining charge based on, for example, the battery voltage of the rechargeable battery and a method for predicting the remaining charge based on the integrated values of the charge current and discharge current of the rechargeable battery.
FIG. 6 is a schematic diagram of a portable device 121 and a battery pack 122 according to a first prior art system that is equipped with a remaining charge predicting function.
The portable device 121 is, for example, a notebook PC. The portable device 121 has a built-in battery pack 122 called a smart battery or an intelligent battery.
The battery pack 122 includes plural (three) rechargeable batteries 122a to 122c, a protection circuit 123, a discharge control switch 124, a charge control switch 125, a remaining charge meter 126 as a remaining charge predicting device, an electrically erasable and programmable read only memory (EEPROM) 127 and a first sense resistor 128. FIG. 6 shows only a part of the portable device 121 that actually includes a second sense resistor 129, a charger 130 and a microcomputer 131, for example, a keyboard, which is one type of microcomputer.
The rechargeable batteries 122a to 122c, each of which is, for example, a lithium ion battery, are connected in series to one another to form a battery set. The positive terminal of the rechargeable battery 122a is connected to the positive terminal, t1, of the battery pack 122 via the discharge control switch 124, the charge control switch 125 and the first sense resistor 128, and the negative terminal of the rechargeable battery 122c is connected to the negative terminal, t2, of the battery pack 122. The discharge control switch 124 and the charge control switch 125 are formed by first and second P channel MOS transistors. The source of the discharge control switch 124 is connected to the positive terminal of the rechargeable battery 122a. The drains of both switches 124 and 125 are connected together. The source of the charge control switch 125 is connected to the positive terminal t1 of the battery pack 122 via the first sense resistor 128. The transistors of both switches 124 and 125 are connected in such a way that the back gates constitute a forward-biased diode with respect to the charge current and the discharge current.
The protection circuit 123 includes an overcharge preventing circuit and overdischarge preventing circuit (neither shown). The protection circuit 123 detects the terminal voltages (cell voltages) of the rechargeable batteries 122a to 122c and turns off the discharge control switch 124 to inhibit discharging when at least one of the cell voltages decreases to or below the specified voltage or reaches an overdischarge state. When at least one of the cell voltages rises above the specified voltage or reaches an overcharge state, on the other hand, the protection circuit 123 turns off the charge control switch 125 to inhibit charging.
At the time of charging, the charge current is supplied to the rechargeable batteries 122a to 122c via the charge control switch 125 which has been turned on and the discharge control switch 124. The charger 130 of the portable device 121 is connected to an AC adapter 132 connected to an external power supply. The charger 130 controls the charge current based on the value of the current that flows across the second sense resistor 129.
At the time of discharging, each of the rechargeable batteries 122a to 122c supplies the discharge current to the portable device 121 via the discharge control switch 124 which has been turned on and the charge control switch 125.
The remaining charge meter 126 includes a microcomputer (not shown) which measures the charge current/discharge current that flows across the first sense resistor 128 and predicts the remaining charge based on the integral value of that measured current and each cell voltage detected by the protection circuit 123. The remaining charge meter 126 stores the predicted remaining charge in the EEPROM 127 and supplies the predicted remaining charge to the keyboard microcomputer 131 provided in the portable device 121. When receiving the predicted value for the remaining charge from the remaining charge meter 126, the keyboard microcomputer 131 displays the remaining battery charge on an unillustrated display unit.
FIG. 7 shows a second prior art system equipped with a remaining charge predicting function.
A portable device 141 is, for example, a notebook PC. The portable device 141 has a built-in battery pack 142. According to the second prior art, the battery pack 142 differs from the battery pack in FIG. 6 in that it has a integrating current meter 143 as a remaining charge predicting device.
The integrating current meter 143 measures the charge current/discharge current that flows across the first sense resistor 128 and supplies a current integrated value to a power management microcomputer 144 of the portable device 141. Then, the power management microcomputer 144 calculates a remaining charge predicted value based on the current integrated value output from the integrating current meter 143 and displays the remaining battery charge on an unillustrated display unit based on the predicted value.
These prior art systems have the following shortcomings:
1. Shortcoming Pertaining to Prediction of Remaining Charge
In the first prior art system shown in FIG. 6, the remaining charge meter 126 calculates a remaining charge predicted value based on the cell voltage of each of the rechargeable batteries 122a to 122c and the integrated values of the charge current and discharge current and supplies the predicted value to the portable device 121. While this ensures highly precise prediction of the remaining charge, the manufacturing cost for the battery pack 122 increases due to the microcomputer provided in the remaining charge meter 126. This makes the battery pack 122 expensive.
In the second prior art system shown in FIG. 7, on the other hand, because the battery pack 142 is not equipped with a microcomputer, an increase in the manufacturing cost for the battery pack 142 is nit incurred. However, in the battery pack 142, the integrating current meter 143 predicts the remaining charge of the rechargeable battery only by detecting the current value. As shown in FIG. 3, when the cycle number of the rechargeable battery increases, the discharge capacity decreases, so that mere prediction of the remaining charge based on current integration would result in inaccurate prediction of the remaining charge. In a case where the battery pack 142 incorporates plural rechargeable batteries 122a to 122c, particularly, their capacities (terminal voltages) vary, thus lowering the precision of the prediction of the remaining charge.
2. Charge-Oriented Shortcoming
In the first prior art system, the charger 130 detects the charge current that flows across the second sense resistor 129 and charges the rechargeable batteries 122a to 122c with the constant voltage and constant current based on the detection result. To precisely perform such charging with the constant voltage and constant current, it is necessary to improve the precision of the current detection done by the charger 130. In this respect, normally, a sense resistor of a high precision type is used as the second sense resistor 129 that is provided to detect the current. This disadvantageously increases the manufacturing cost for the charger 130. Further, such a high precision type resistor is large in size, which undesirably enlarges the charger 130. This shortcoming also arises in the second prior art system. |
import I18n from "I18n";
import { warn } from "@ember/debug";
import {
displayErrorForUpload,
validateUploadedFiles,
} from "discourse/lib/uploads";
import getUrl from "discourse-common/lib/get-url";
import { on } from "@ember/object/evented";
import Mixin from "@ember/object/mixin";
import bootbox from "bootbox";
import { deepMerge } from "discourse-common/lib/object";
export default Mixin.create({
uploading: false,
uploadProgress: 0,
uploadDone() {
warn("You should implement `uploadDone`", {
id: "discourse.upload.missing-upload-done",
});
},
validateUploadedFilesOptions() {
return {};
},
calculateUploadUrl() {
return (
getUrl(this.getWithDefault("uploadUrl", "/uploads")) +
".json?client_id=" +
(this.messageBus && this.messageBus.clientId) +
this.uploadUrlParams
);
},
uploadUrlParams: "",
uploadOptions() {
return {};
},
_initialize: on("didInsertElement", function () {
const $upload = $(this.element);
const reset = () => {
this.setProperties({ uploading: false, uploadProgress: 0 });
document.getElementsByClassName("hidden-upload-field")[0].value = "";
};
const maxFiles = this.getWithDefault(
"maxFiles",
this.siteSettings.simultaneous_uploads
);
$upload.on("fileuploaddone", (e, data) => {
let upload = data.result;
this.uploadDone(upload);
reset();
});
$upload.fileupload(
deepMerge(
{
url: this.calculateUploadUrl(),
dataType: "json",
replaceFileInput: false,
dropZone: $upload,
pasteZone: $upload,
},
this.uploadOptions()
)
);
$upload.on("fileuploaddrop", (e, data) => {
if (maxFiles > 0 && data.files.length > maxFiles) {
bootbox.alert(
I18n.t("post.errors.too_many_dragged_and_dropped_files", {
max: maxFiles,
})
);
return false;
} else {
return true;
}
});
$upload.on("fileuploadsubmit", (e, data) => {
const opts = deepMerge(
{
bypassNewUserRestriction: true,
user: this.currentUser,
siteSettings: this.siteSettings,
},
this.validateUploadedFilesOptions()
);
const isValid = validateUploadedFiles(data.files, opts);
const type = this.type;
let form = type ? { type } : {};
if (this.data) {
form = $.extend(form, this.data);
}
data.formData = form;
this.setProperties({ uploadProgress: 0, uploading: isValid });
return isValid;
});
$upload.on("fileuploadprogressall", (e, data) => {
const progress = parseInt((data.loaded / data.total) * 100, 10);
this.set("uploadProgress", progress);
});
$upload.on("fileuploadfail", (e, data) => {
displayErrorForUpload(data, this.siteSettings);
reset();
});
}),
_destroy: on("willDestroyElement", function () {
this.messageBus && this.messageBus.unsubscribe("/uploads/" + this.type);
const $upload = $(this.element);
try {
$upload.fileupload("destroy");
} catch (e) {
/* wasn't initialized yet */
}
$upload.off();
}),
});
|
Q:
Making quote renewenvironment have ttfamily font
I want my quote environment
\documentclass{article}
\let\@ldquote=\quote
\let\@ldendquote=\endquote
\renewenvironment{quote}
{\@ldquote\setlength{\baselineskip\ttfamily}{\singlebaselineskip}}
{\@ldendquote}
\begin{document}
Some text.
\begin{quote}
A quotation.
\end{quote}
\end{document}
To appear with \tttext or \ttfamily whichever one is supposed to use in environments.
So that
\begin{quote}
...
\end{quote}
appears as \tttext{...}.
How does one achieve that?
A:
Judging by the code snippets you've posted, it would appear to be the case that you not only want to use a monospaced font in the quote environment, but also that you wish to use single-spacing in these environments. If that's the case, I suggest you include the following instructions in the preamble:
\usepackage{etoolbox,setspace}
\AtBeginEnvironment{quote}{\ttfamily\raggedright\frenchspacing\setstretch{1.0}}
A full MWE (mininum working example):
\documentclass{article}
\usepackage{etoolbox,setspace,lipsum}
\AtBeginEnvironment{quote}{\ttfamily\raggedright\frenchspacing\setstretch{1.0}}
\doublespacing % or "\onehalfspacing"?
\begin{document}
\lipsum[1] % filler text
\begin{quote}
\lipsum[2] % more filler text
\end{quote}
\lipsum[3] % still more filler text
\end{document}
|
Lignin peroxidases can also oxidize manganese.
The peroxidase isozymes secreted by the white rot fungus Phanerochaete chrysosporium include lignin peroxidases and manganese-dependent peroxidases. The major isozymes, called lignin peroxidases, are thought to oxidize chemicals directly. The manganese-dependent peroxidases (H3, H4, H5, and H9) are relatively minor, making up only a fraction of the total peroxidase protein. However, we have found that lignin peroxidases will also catalyze the H2O2-dependent oxidation of Mn2+ to Mn3+. We have used lignin peroxidase isozyme H2 (LiPH2) to characterize the manganese peroxidase activity of lignin peroxidases. Transient state kinetic studies were used to obtain a second-order rate constant of 4.2 x 10(4) M-1 S-1 for the reaction of LiPH2-compound I with free or chelated Mn2+ at pH 6.0. This reaction was too fast to monitor at pH 4.5. Only chelated Mn2+ could reduce LiPH2-compound II to ferric enzyme. The Mn(2+)-chelate (oxalate) first bound LiPH2-compound II with a Kd of (1.5 +/- 0.3) x 10(-5) M and then reduced LiPH2-compound II to ferric enzyme with a first order rate constant of 215 +/- 6 S-1. Steady-state kinetic studies on LiPH2 were performed by directly monitoring the formation of Mn(3+)-oxalate. These results show that oxidation of Mn2+ by a lignin peroxidase does not occur through free radical mediation as proposed previously [Popp et al. (1990) Biochemistry 29, 10475-10480). Electron spin resonance and oxygen evolution studies also indicate that Mn2+ is directly oxidized by LiPH2.(ABSTRACT TRUNCATED AT 250 WORDS) |
Work
Work
The changing landscape of work in an age of robots
Work in the Second Machine Age
Clearly new technologies, especially artificial intelligence, is changing the way we work. Career opportunities are going to be very different in the not too distant future, some will cease to be, new ones will be created. This Department is tracking work in the second machine age.
At the “AI and the Future of Work” summit at MIT in November of 2017, MIT President L. Rafael Reif echoed the fears of many working Americans when he said that “72% of of Americans say they feel worried about a future [in which] robots and computers can do many human...
The ABC have published a database that answers the question of how susceptible your job is to automation. You can find the database and search for your job here http://www.abc.net.au/news/2017-08-08/could-a-robot-do-your-job-artificial-intelligence/8782174 The ABC...
A recent news report says that five million Australian jobs are at risk because of robotics. Quoting futurist Shara Evans who says that "40 per cent of current jobs in Australia won’t exist in 10 to 15 years due to automation — that’s five million jobs gone,” citing...
New report discusses how the prevalence of automated machines impacts jobs, employee value and wage inequality. A new study from the University of Chicago Booth School of Business’ Michael Gibbs finds that technological advances, particularly in machines that can...
Position Open
Work Department Head
Matthew is Editor-in-Chief of The Neuropsychotherapist, a psychotherapist with a keen interest in neuroscience and technology. |
Personally I opted for the regular cover and passed on the white sketch variant cover. I’m a sucker for motorcycles on the cover but that’s a side tangent.
I find the ordering qualifications for the Hit-Girl #1 variant to be interesting. This was orchestrated differently than the 1 of 10 or 1 of 25 chase variants where a shop has to hit certain goals in order to pick up the retail incentive.
Blank Cover Variant Edition of HIT-GIRL #1, the new Marvel spin-off series from the original KICK-ASS series, worked differently than most. Retailers could only order these special variant editions of #1 from Marvel Comics if they exceeded the number of copies previously ordered on KICK ASS VOLUME 2 #7, so these Blank Cover Variants of HIT-GIRL #1 are actually quite scarce, and only available from a select few comics retailers. |
Tight Clinton-Trump Race Roiled by New Probe of Her Emails. EEUU.
Democrat Hillary Clinton and Republican Donald Trump remain locked in a
tight contest for the U.S. presidency, nine days ahead of the November 8
election, with the campaign roiled by the new investigation into her emails
while she served as secretary of state. One
tracking poll of voter sentiment, by The Washington Post and ABC News, showed
Clinton clinging to a narrow edge over Trump by a single percentage point, 46
to 45 percent.
The two news outlets said the poll of likely voters covered part of the
time after FBI Director James Comey announced that investigators are taking a
new look at her use of a private email server while she was the country's top
diplomat from 2009 to 2013. It came in a probe Comey previously ended in July
when he declared that she had been "extremely careless" in her
handling of national security material found in her emails, but said that no
criminal charges were warranted.
Impact on November 8 vote
The Post-ABC survey said that more than six in 10 voters said the new
investigation would make no difference in their vote on November 8, but of
those who said it would matter, more than 3 in 10 said it would make them less
likely to vote for her, and only 2 percent that it would influence them to vote
for her. New polling by a raft of news organizations and universities in the
coming days could give a better idea whether the FBI investigation will matter
in how people vote.
Clinton, who has often said her use of the private email server was a
mistake, has demanded that Comey spell out details of what is in the emails
that were found on the computer of one of her key aides, Huma Abedin, shared
with her estranged husband, Anthony Weiner. Authorities discovered the emails
while investigating allegations that Weiner, a disgraced former congressman
from New York, was "sexting" with a 15-year-old girl.
At a campaign stop in the key southern state of Florida, Clinton alluded
to the "ups and downs" of the campaign, but otherwise did not mention
the email controversy. She delivered a broadside against Trump, calling on him
to "stop disgracing our democracy" by disparaging women, and
contending that he is "temperamentally unfit and totally unqualified to be
president." "Friends don't let friends vote for Trump, right?"
she asked cheering supporters.
Boon for Trump
Trump, with new life on the campaign trail in the aftermath of Comey's
announcement, said on his Twitter account, "Hillary and the Dems loved and
praised FBI Director Comey just a few days ago. Original evidence was
overwhelming, should not have delayed!"Most polls, many of them conducted
before the Comey announcement, show Clinton ahead by about four or five
percentage points across the country, with often narrower edges in key election
states. The state-by-state outcomes will determine the winner in the country's
Electoral College, not the national popular vote.
But Trump claimed in another tweet, "We are now leading in many
polls, and many of these were taken before the criminal investigation
announcement Friday - great in states!"
Trump started his Sunday campaigning with a stop at a nondenominational
church in Las Vegas, Nevada, a closely contested western state, where he swayed
and clapped to the music. He planned a later rally in the city and then stops
in two other nearby states, Colorado and New Mexico.
‘Deeply troubling’
On Saturday, Clinton called the timing of the FBI announcement that it
is assessing new evidence in her case "unprecedented" and
"deeply troubling." At a campaign appearance in Daytona Beach,
Florida, Clinton said, "It's pretty strange to put something like that out
with such little information, right before an election."
Clinton later added, "We can't let this election, in the last 10
days, be about the noise and the distractions. It's got to be about what kind
of country we want for ourselves, our children and our grandchildren." Trump,
at a campaign event in Colorado, contended that "a vote for Hillary is a
vote to surrender our government to public corruption, graft and cronyism that
threatens the very foundations of our constitutional system.” |
Behind the tactics and the war of words, the differences between Republicans and Democrats all tend to hinge on one thing: The Red guys don’t like Big Government. For progressives like me, that doesn’t make a lot of sense. Big Government often means more taxation, yes, but it also means more services, more oversight and the opportunity for a fairer distribution of wealth.
We’ve come to the conclusion that Big Government is a good idea … with a branding problem. Would “fuller figure” or “plus-sized” suit her better? Let’s see what we can learn from the body shaming fight.
A Brief History of the Fat Acceptance Movement
In the late 1960s, thinkers started to speak out against the cultural obsession with thinness, holding impromptu sit-ins and “fat pride” marches to challenge their communities’ perceptions of health and body shape. Casting agents and other decision-makers in the arts were pressured to think outside the classic hourglass figure of “28-36” (inches, representing waist and hips) and eventually, more diverse body shapes started to be seen in our media.
For women like me, who have been overweight or obese their whole lives, the movement has helped us in two ways: Creating opportunities for women who look like us in media means we are able to find role models who proved that success doesn’t necessarily come in a size 8 only; and the movement also taught us to reject the body shaming rhetoric that is rife in our schools, social media feeds and our own heads.
The fat acceptance movement has healed the way many of us feel about our bodies. We need to bring this thinking to the political sphere. Image: Creative Commons, Stage3 Team.
Starving for Change
One of the most insidious things about body shaming is the idea that fat means unhealthy. And while no one is arguing that obesity isn’t harmful to our people, healthcare system and cities, the movement has successfully decoupled the idea of thinness with health.
This is also true of our politics: We need to accept that a lean government isn’t necessarily a healthy one.
When conservatives bring up the specter of Big Government, a common response from progressives is similar to what you might say if Janice in Accounting told you you’d put on a few pounds over the holidays:
To hide it: “Oh, no! I knew I shouldn’t have worn these pants.”
Or to apologize for it: “Yeah, too much pumpkin pie. But detox starts tomorrow and Monday, it’s back to the gym!”
Hiding and apologizing are dangerous because they both assume, as body shaming does, that what governments are doing is wrong and harmful. A lack of transparency about where and how money is being spent not only breeds contempt and challenge, but also creates opportunities for the kind of funds mismanagement that conservatives are implying.
But you know what? Doing good work costs money. Infrastructure investment is not free, and neither is quality education or health care. Looking after our most vulnerable people can be costly but not as much as patching them up in hospital, or locking them up under archaic minor drug and three-strikes laws.
Well, we say it’s time for proponents of big government to own it. Shed your layers of excuses and don’t be ashamed to show your true self when you walk to the voting booth and march for the things you believe in. It takes a large government to come up with grand ideas – and goodness knows, we need them now.
Big is beautiful. Be proud.
Featured image: Documentary filmmaker Kira Nerusskaya, who has been a leader in the fat acceptance movement. Picture: Creative Commons, David Shankbone |
From 3707f467f9a26a7df3d41385023b43c3d08911d2 Mon Sep 17 00:00:00 2001
From: Manjukumar Matha <manjukumar.harthikote-matha@xilinx.com>
Date: Tue, 12 Feb 2019 17:46:52 -0800
Subject: [PATCH][v3] CMakeLists.txt: Use SWIG_SUPPORT_FILES to find the list
of generated files for cmake version 3.12 or higher
Use SWIG_SUPPORT_FILES to find the list of python files generated by
CMake Swig module and install those files. This should be applicable to
cmake version 3.12 or higher
Signed-off-by: Manjukumar Matha <manjukumar.harthikote-matha@xilinx.com>
---
src/CMakeLists.txt | 8 +++++++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt
index e19cda2..b565814 100644
--- a/src/CMakeLists.txt
+++ b/src/CMakeLists.txt
@@ -337,8 +337,14 @@ macro(_upm_swig_python)
OUTPUT_NAME _pyupm_${libname}
LIBRARY_OUTPUT_DIRECTORY ${CMAKE_CURRENT_PYTHON_BINARY_DIR})
+ if (CMAKE_VERSION VERSION_LESS "3.12")
+ set(support_files ${swig_extra_generated_files})
+ else()
+ get_property(support_files TARGET _${python_wrapper_name} PROPERTY SWIG_SUPPORT_FILES)
+ endif()
+
# Install .py's to python packages directory/upm
- install (FILES ${swig_extra_generated_files}
+ install (FILES ${support_files}
DESTINATION ${PYTHON_PACKAGES_PATH}/upm
COMPONENT ${CMAKE_PROJECT_NAME}-python${PYTHON_VERSION_MAJOR})
--
2.7.4
|
New perspectives on the management of septic shock in the cancer patient.
Septic shock is a common life-threatening problem, usually presenting with fever, tachycardia, tachypnea, and often a source of infection. The cardiac index is increased, with a decreased systemic vascular resistance, and a reversibly decreased ejection fraction with an increased end diastolic volume. The myocardial depression is most likely caused by a circulating humoral substance that depresses myocardial contractility. The initial treatment of septic shock is aggressive fluid resuscitation and antibiotic therapy, with vasopressors and inotropes being indicated in those patients who do not respond adequately to fluids. Therapy directed against the mediators of septic shock is theoretically promising, but to date has not been successful. |
Q:
Servicestack include _Layout.cshtml in Razor Content Page
How can I include _Layout.cshtml in Razor Content Page ?
For example I created two cshtml files in root of my project.
First file is _Layout.cshtml
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8" />
<title></title>
</head>
<body>
<h1>Main Layout</h1>
<br>
<br>
@RenderBody();
</body>
</html>
Second File is Product.cshtml
@inherits ServiceStack.Razor.ViewPage
@{
Layout = "~/_Layout.cshtml";
}
<h1>Product Page</h1>
When I call http://localhost:6000/product
The result is in browser is
Product Page
but it should be
Main Layout
Product Page
Why ?
What's the problem ?
A:
Layout names should be the name of the file not a path and you should never need to reference _Layout as it's the default.
Also if you want your Views and Content Pages to share the same _Layout.cshtml pages add them once to /Views/_Layout.cshtml or /Views/Shared/_Layout.cshtml instead.
If this is Self hosting HttpListener project you need to ensure all *.cshtml are set to Copy to Output Directory or the WebHostPhysicalPath references your project path.
|
42nd Street Line
42nd Street Line may refer to:
IRT 42nd Street Shuttle, Manhattan, New York City, United States
The IRT Flushing Line runs partially under 42nd Street in Manhattan
42nd Street Crosstown Line (Manhattan surface), now the M42 bus route |
var firstConfig = {
"webPreferences": {
}
};
var secondConfig = {
"webPreferences": {
"preload.js": something
}
};
function start() {
mainWindow = new BrowserWindow(firstConfig);
mainWindow = new BrowserWindow(secondConfig);
}
start(); |
#include "Platform.h"
#include "cocos2d/MainScene.h"
//#undef WIN32
#include <windows.h>
#include <mmsystem.h>
#include <Psapi.h>
#include <codecvt>
#include "StorageImpl.h"
#include "SysInitIntf.h"
#include "platform/CCFileUtils.h"
#include <sys/stat.h>
#include "Application.h"
#include "EventIntf.h"
#include "cocos/base/CCDirector.h"
#include <shellapi.h>
#include "XP3ArchiveRepack.h"
#include "RenderManager.h"
#include <sys/utime.h>
#pragma comment(lib,"psapi.lib")
tjs_int TVPGetSystemFreeMemory()
{
MEMORYSTATUS info;
GlobalMemoryStatus(&info);
return info.dwAvailPhys / (1024 * 1024);
}
tjs_int TVPGetSelfUsedMemory()
{
PROCESS_MEMORY_COUNTERS info;
GetProcessMemoryInfo(GetCurrentProcess(), &info, sizeof(info));
return info.WorkingSetSize / (1024 * 1024);
}
void TVPGetMemoryInfo(TVPMemoryInfo &m)
{
MEMORYSTATUS status;
status.dwLength = sizeof(status);
GlobalMemoryStatus(&status);
m.MemTotal = status.dwTotalPhys / 1024;
m.MemFree = status.dwAvailPhys / 1024;
m.SwapTotal = status.dwTotalPageFile / 1024;
m.SwapFree = status.dwAvailPageFile / 1024;
m.VirtualTotal = status.dwTotalVirtual / 1024;
m.VirtualUsed = (status.dwTotalVirtual - status.dwAvailVirtual) / 1024;
}
// int gettimeofday(struct timeval * val, struct timezone *)
// {
// if (val)
// {
// LARGE_INTEGER liTime, liFreq;
// QueryPerformanceFrequency(&liFreq);
// QueryPerformanceCounter(&liTime);
// val->tv_sec = (long)(liTime.QuadPart / liFreq.QuadPart);
// val->tv_usec = (long)(liTime.QuadPart * 1000000.0 / liFreq.QuadPart - val->tv_sec * 1000000.0);
// }
// return 0;
// }
void *dlopen(const char *filename, int flag) {
return (void*)LoadLibraryA(filename);
}
void *dlsym(void* handle, const char *funcname) {
return (void *)GetProcAddress((HMODULE)handle, funcname);
}
extern "C" int usleep(unsigned long us) {
Sleep(us / 1000);
return 0;
}
//extern "C" __declspec(dllimport) int __cdecl __wgetmainargs(int * _Argc, wchar_t *** _Argv, wchar_t *** _Env, int _DoWildCard, void * _StartInfo);
std::wstring_convert<std::codecvt_utf8_utf16<wchar_t>> converter;
std::string TVPGetDefaultFileDir() {
wchar_t buf[MAX_PATH];
_wgetcwd(buf, sizeof(buf) / sizeof(buf[0]));
wchar_t *p = buf;
while (*p) {
if (*p == '\\') *p = '/';
++p;
}
return converter.to_bytes(buf);
}
int TVPCheckArchive(const ttstr &localname);
void TVPCheckAndSendDumps(const std::string &dumpdir, const std::string &packageName, const std::string &versionStr);
bool TVPCheckStartupArg() {
int argc;
wchar_t **argv = CommandLineToArgvW(GetCommandLineW(), &argc);
// __wgetmainargs(&argc, &argv, &env, 0, &info);
TVPCheckAndSendDumps(TVPGetDefaultFileDir() + "/dumps", "win32-test", "test");
if (argc > 1) {
if (TVPCheckExistentLocalFile(argv[1])) {
if (TVPCheckArchive(argv[1]) == 1) {
TVPMainScene::GetInstance()->startupFrom(converter.to_bytes(argv[1]));
return true;
}
return false;
}
bool bootable = false;
TVPListDir(converter.to_bytes(argv[1]), [&](const std::string &_name, int mask) {
if (mask & (S_IFREG)) {
std::string name(_name);
std::transform(name.begin(), name.end(), name.begin(), [](int c)->int {
if (c <= 'Z' && c >= 'A')
return c - ('A' - 'a');
return c;
});
if (name == "startup.tjs") {
bootable = true;
}
}
});
for (int i = 2; i < argc; ++i) {
std::wstring str = argv[i];
size_t pos = str.find(L'=');
if (pos == str.npos) {
TVPSetCommandLine(argv[i], "yes");
} else {
ttstr val = str.c_str() + pos + 1;
TVPSetCommandLine(str.substr(0, pos).c_str(), val);
}
}
if (bootable) {
TVPMainScene::GetInstance()->startupFrom(converter.to_bytes(argv[1]));
return true;
}
}
return false;
}
int TVPShowSimpleMessageBox(const ttstr & text, const ttstr & caption, const std::vector<ttstr> &vecButtons)
{
// there has no implement under android
switch (vecButtons.size()) {
case 1:
MessageBoxW(0, text.c_str(), caption.c_str(), /*MB_OK*/0);
return 0;
break;
case 2:
switch (MessageBoxW(0, text.c_str(), caption.c_str(), /*MB_YESNO*/4)) {
case 6:
return 0;
default:
return 1;
}
break;
}
return -1;
}
extern "C" int TVPShowSimpleMessageBox(const char *pszText, const char *pszTitle, unsigned int nButton, const char **btnText) {
std::vector<ttstr> vecButtons;
for (unsigned int i = 0; i < nButton; ++i) {
vecButtons.emplace_back(btnText[i]);
}
return TVPShowSimpleMessageBox(pszText, pszTitle, vecButtons);
}
std::vector<std::string> TVPGetDriverPath() {
std::vector<std::string> ret;
char drv[4] = { 'C', ':', '/', 0 };
for (char c = 'C'; c <= 'Z'; ++c) {
drv[0] = c;
switch (GetDriveTypeA(drv)) {
case DRIVE_REMOVABLE:
case DRIVE_FIXED:
case DRIVE_REMOTE:
ret.emplace_back(drv);
break;
}
}
return ret;
}
std::vector<std::string> TVPGetAppStoragePath() {
std::vector<std::string> ret;
ret.emplace_back(TVPGetDefaultFileDir());
return ret;
}
bool TVPCheckStartupPath(const std::string &path) { return true; }
std::string TVPGetPackageVersionString() {
return "win32";
}
void TVPControlAdDialog(int adType, int arg1, int arg2) {}
void TVPForceSwapBuffer() {}
//---------------------------------------------------------------------------
// TVPCreateFolders
//---------------------------------------------------------------------------
static bool _TVPCreateFolders(const ttstr &folder)
{
// create directories along with "folder"
if (folder.IsEmpty()) return true;
if (TVPCheckExistentLocalFolder(folder))
return true; // already created
const tjs_char *p = folder.c_str();
tjs_int i = folder.GetLen() - 1;
if (p[i] == TJS_W(':')) return true;
while (i >= 0 && (p[i] == TJS_W('/') || p[i] == TJS_W('\\'))) i--;
if (i >= 0 && p[i] == TJS_W(':')) return true;
for (; i >= 0; i--)
{
if (p[i] == TJS_W(':') || p[i] == TJS_W('/') ||
p[i] == TJS_W('\\'))
break;
}
ttstr parent(p, i + 1);
if (!TVPCreateFolders(parent)) return false;
return !_wmkdir(folder.c_str());
}
//---------------------------------------------------------------------------
bool TVPCreateFolders(const ttstr &folder)
{
if (folder.IsEmpty()) return true;
const tjs_char *p = folder.c_str();
tjs_int i = folder.GetLen() - 1;
if (p[i] == TJS_W(':')) return true;
if (p[i] == TJS_W('/') || p[i] == TJS_W('\\')) i--;
return _TVPCreateFolders(ttstr(p, i + 1));
}
bool TVPWriteDataToFile(const ttstr &filepath, const void *data, unsigned int len) {
FILE* handle = _wfopen(filepath.c_str(), L"wb");
if (handle) {
bool ret = fwrite(data, 1, len, handle) == len;
fclose(handle);
return ret;
}
return false;
}
std::string TVPGetCurrentLanguage() {
LANGID lid = GetUserDefaultUILanguage();
const LCID locale_id = MAKELCID(lid, SORT_DEFAULT);
char code[10] = { 0 };
char country[10] = { 0 };
GetLocaleInfoA(locale_id, LOCALE_SISO639LANGNAME, code, sizeof(code));
GetLocaleInfoA(locale_id, LOCALE_SISO3166CTRYNAME, country, sizeof(country));
std::string ret = code;
if (country[0]) {
for (int i = 0; i < sizeof(country) && country[i]; ++i) {
char c = country[i];
if (c <= 'Z' && c >= 'A') {
country[i] += 'a' - 'A';
}
}
ret += "_";
ret += country;
}
return ret;
}
extern tTJS *TVPScriptEngine;
void TVPReleaseFontLibrary();
void TVPExitApplication(int code) {
// clear some static data for memory leak detect
TVPDeliverCompactEvent(TVP_COMPACT_LEVEL_MAX);
if (!TVPIsSoftwareRenderManager())
iTVPTexture2D::RecycleProcess();
// if (TVPScriptEngine) TVPScriptEngine->Cleanup();
// TVPReleaseFontLibrary();
// delete ::Application;
// TVPMainScene::GetInstance()->removeFromParent();
exit(code);
}
// const std::string &TVPGetInternalPreferencePath() {
// static std::string ret(cocos2d::FileUtils::getInstance()->getWritablePath());
// return ret;
// }
bool TVPDeleteFile(const std::string &filename)
{
return _wunlink(ttstr(filename).c_str()) == 0;
}
bool TVPRenameFile(const std::string &from, const std::string &to)
{
#ifdef WIN32
tjs_int ret = _wrename(ttstr(from).c_str(), ttstr(to).c_str());
#else
tjs_int ret = rename(from.c_str(), to.c_str());
#endif
return !ret;
}
void TVPProcessInputEvents() {}
void TVPShowIME(int x, int y, int w, int h) {}
void TVPHideIME() {}
void TVPRelinquishCPU(){ Sleep(0); }
tjs_uint32 TVPGetRoughTickCount32()
{
return timeGetTime();
}
void TVPPrintLog(const char *str) {
printf("%s", str);
}
bool TVP_stat(const tjs_char *name, tTVP_stat &s) {
struct _stat64 t;
bool ret = !_wstat64(name, &t);
s.st_mode = t.st_mode;
s.st_size = t.st_size;
s.st_atime = t.st_atime;
s.st_mtime = t.st_mtime;
s.st_ctime = t.st_ctime;
return ret;
}
bool TVP_stat(const char *name, tTVP_stat &s) {
ttstr filename(name);
return TVP_stat(filename.c_str(), s);
}
void TVP_utime(const char *name, time_t modtime) {
_utimbuf utb;
utb.modtime = modtime;
utb.actime = modtime;
ttstr filename(name);
_wutime(filename.c_str(), &utb);
}
|
Taiwan’s Hsieh, Lu seal US Open wins
PERFECT START::Despite enjoying different fortunes of late, Hsieh and Lu both started in style, and said that seeing Taiwanese fans in New York gave them a lift
Staff writer, with CNA
Thu, Aug 29, 2013 - Page 20
Taiwan’s Lu Yen-hsun and Hsieh Su-wei arrived at the US Open going in different directions, but they both played nearly flawlessly in their first-round singles matches on Tuesday at the year’s final Grand Slam event.
Lu had his best result of the year last week in reaching the quarter-finals of the Winston-Salem Open and sustained the momentum with a 6-4, 7-6 (7/5), 6-3 win over Daniel Gimeno-Traver of Spain to reach the second round of the US Open for only the second time in seven attempts.
Hsieh, on the other hand, came to Flushing Meadows having lost five consecutive singles matches dating back to Wimbledon and admitted to feeling apprehensive before play on Tuesday.
However, she upset 31st seed Klara Zakopalova of the Czech Republic 6-3, 6-3 to advance in the women’s singles.
Lu, currently 60th in the men’s world singles rankings, and Hsieh, ranked 40th among the women, are the only two Taiwanese players who made the main singles draws at this year’s US Open.
“The key to victory today was that I played a little more aggressively after discussing strategy with my coach before the match,” said Lu, who faced only two break points the entire match, while converting three of nine break points on the Spaniard’s serve.
After a first set in which Lu controlled play before finally breaking Gimeno-Traver in the ninth game, he was nearly derailed by racket problems.
Strings on two of his rackets broke early in the second set, and the stringing on his third racket felt a little loose and took some time getting used to.
Lu also had to counter a change in strategy by the Spaniard, who resorted to his slice backhand to mix up the tempo.
“I was pretty happy that even though he made some adjustments, I was able to deal with them and continue executing my strategy,” Lu said.
The victory represented a milestone of sorts for the Taiwanese veteran, who turned 30 on Aug. 14.
It gave him a first-round win in each of the four Grand Slams in a single year for the first time in his career, after never having reached the second round of more than one Grand Slam in any calendar year.
However, for him to set another milestone — advancing to the third round of the US Open for the first time — Lu will have to beat 13th seed Tommy Haas of Germany.
“He’s a high-ranked player and tough to beat, but I still have to come up with a strategy to take him on,” Lu said. “Anything can happen. As long as I do my best, and get myself ready physically and mentally, there’s always a chance of winning.”
Winning in singles was not something Hsieh had been doing much of lately, but she came up big against Zakopalova, dismantling her higher-ranked opponent in 66 minutes and facing only two break points — unusually low for her — the entire match.
Hsieh, who teamed up with China’s Peng Shuai to win the women’s doubles at Wimbledon, becoming the first senior Taiwanese tennis player to win a Grand Slam title of any kind, said her focus on doubles had thrown off her singles game in recent months.
“I was having a hard time finding a balance between singles and doubles, but I worked with my coach to reach a balance between the two,” Hsieh said. “I had to keep reminding myself playing singles not to hit the ball in the doubles court in trying to get my feel back.”
Hsieh’s next opponent is 21-year-old Camila Giorgi of Italy, who also won her first-round match in straight sets.
Giorgi, ranked 136th in the world, had to qualify for the main draw, but the 27-year-old Taiwanese was taking nothing for granted.
“The young kids today are tough to play. They hit the ball really hard, and once they catch on to what you’re doing, they counter very quickly,” she said.
Both Lu and Hsieh said they got a boost from the many Taiwanese fans who turned out at the USTA Billie Jean King National Tennis Center in Flushing Meadows, New York, to support them.
“Knowing that people are in your corner helps you pick yourself up at key moments or when things get tough. When you’re playing well, it helps you play even better,” Lu said. |
Q:
Browser displaying PHP code
I am running XAMPP in order to use PHP on my local computer. I put all of my scripts inside of the htdocs folder (the default location). Everything used to work great until recently. For example, if I click on an HTML file in htdocs, the file opens up in a browser(like it should). But, if I click submit on a form with an action set to "some-script.php" It goes to the php page and displays the php code. Now, if I type into my browser "localhost/some-html.html" then it works? Why is that? What could I be doing wrong??
A:
When you access it by typing "localhost/some-html.html" into the address bar you use XAMPP's server and PHP engine to access the page, when you simply double click the file in the folder you are just opening the file with the default program (which happens to be your browser)
|
Q:
Не могу воспроизвести аудио
Пытаюсь воспроизвести песню, но играет только первые 3 секунды... В
чем может быть проблема ? В Java нет опыт. Пытаюсь сделать музыкальный плеер как первый проект (Может кто, какой совет дополнительно даст)
package sample;
import java.io.File;
import java.lang.reflect.InvocationTargetException;
import javafx.application.Application;
import javafx.scene.Group;
import javafx.scene.media.Media;
import javafx.scene.media.MediaPlayer;
import javafx.scene.media.MediaView;
import javafx.stage.Stage;
public class Main extends Application
{
@Override
public void start (Stage primaryStage) throws Exception {
String path = "C://Users/m4med/Desktop/linkin_park_-_numb.mp3";
Media media = new Media(new File(path).toURI().toString());
MediaPlayer mediaPlayer = new MediaPlayer(media);
mediaPlayer.setAutoPlay(true);
primaryStage.setTitle("Playing Audio");
primaryStage.show();
}
public static void main(String[] args) {
launch(args);
}
}
A:
После завершения метода start ссылка на MediaPlayer больше никому не нужна и, видимо, сборщик мусора уничтожает объект. Вынесите объявление за пределы метода:
private MediaPlayer mediaPlayer;
@Override
public void start (Stage primaryStage) throws Exception {
...
mediaPlayer = new MediaPlayer(media);
...
}
А так для mp3 наверное больше подходит AudioClip.
|
---
abstract: |
Petawatt class femtosecond lasers and x-ray free electron lasers (XFEL) open up a new page in research fields related to space and vacuum physics. One of fundamental principles can be explored by these new instruments is the equivalence principle, saying that gravitation and acceleration should be treated equivalently. If it is true this must lead to the appearance of the Unruh effect analogous to Hawking’s black hole radiation. It says that a detector moving with a constant acceleration $w$ sees a boson’s thermal bath with its temperature $T_w=\hbar w/2\pi k_B c$. Practical detection of the Unruh effect requires extremely strong acceleration and fast probing sources. Here we demonstrate that x-rays scattering from highly accelerated electrons can be used for such detection. We present two, feasible for the Unruh effect, designs for highly accelerated systems produced in underdense plasma irradiated by high intensity lasers pulses. The first is Thomson scattering of a XFEL pulse from plasma wave excited by an intense laser pulse. Properly chosen observation angles enable us to distinguish the Unruh effect from the normal Doppler shift with a reasonable photon number. The second is a system consisting of electron bunches accelerated by a laser wake-field, as sources and as detectors, which move in a constantly accelerating reference frame (Rindler space) and are probed by x-ray free electron laser pulses. The numbers of photons is shown to be enough to observe [reproducible]{} results.\
Keywords: Plasma accelerator, Laser wake field acceleration, Thomson scattering, Space-time distortion, Unruh effect
author:
- 'M. Yano[^1]'
- 'A. Zhidkov'
- 'R. Kodama'
title: 'Probing Space-time Distortion with Laser Wake Field Acceleration and X-ray Free Electron Lasers '
---
Introduction
============
The existence of the Unruh radiation remains a fundamental question in quantum electrodynamics[@Unruh1]. Whether kinematic acceleration, in some sense, is equivalent to the gravitational field with the consequences of this principle and feasibility of Rindler space[@Rindler] have yet to be verified experimentally. According to Unruh[@Unruh1] in a reference frame moving with a constant acceleration $w$, a detector should experience surrounding vacuum as a boson’s heat bath with its temperature $T_w=\hbar w/2\pi k_B c$[@Unruh1]. At the first sight the Unruh effect has no practical meaning: to get a boson gas with the temperature, for example, of the Relic radiation $T_R=2.7 \ \ K$[@Sunyaev] the acceleration must exceed $w \approx 10^{20} g$, where $g$ is the Earth’s gravitational acceleration. However, studying the highly accelerated system in the reality may allow us to understand better hidden properties of vacuum such as meaning of vacuum states, radiation transition times, and so on. Exploring the Unruh hypotheses is one of the important ways to probe the vacuum.
Since the Unruh theory has yet to be verified there are several standpoints on it: positive[@Bell] and negative[@Narozhnii]. The positive standpoints state that the Unruh effect should exist because the temperature predicted by the theory coincides with that from the Hawking’s theory of radiation of black holes[@Hawking]. The negative standpoints say that the Rindler space is not congruent physically with Minkowski space and the Unruh effect should not exist[@Narozhnii]. Indeed, a non-inertial reference system should be carefully checked on its feasibility to physical processes. For example a reference frame rotating with frequency $\Omega$ is not feasible for distance $R>c/\Omega$[@Landau1]. A reference frame moving with constant acceleration $w$ has also some paradoxes rising the question about its feasibility: (i) an electron moving with constant acceleration radiates while its radiation friction force is zero, the energy conservation requires existence of beginning and an end of the acceleration process[@Ginzburg], (ii) apparently there is no conservative system for several particles in a reference frame moves with constant acceleration $w$; (iii) it feels as if there is no fixed photon mode $({\bf k}, \omega)$ in this reference frame due to Doppler upshift or downshift. Nevertheless the answers on the feasibility can be found only experimentally.
Radiation in a highly accelerated system has another fundamental question which appears recently in the quantum approach for the radiation damping force during interaction of energetic electrons with high power laser pulses[@Ritus]. For example, Compton scattering in strong laser fields runs mainly as $n\omega_L+e^- > \omega_{x-ray}+e^-$ where n is the number of a harmonic, $\omega_L$ is the laser frequency and $\omega_{x-ray}$ is the frequency of a scattered photon. This scattering has been considered in the classical approach[@Ritus] and in the relativistic quantum approaches[@Esarey1] with one of results as $n \approx a_0$ if $a_0 \gg 1$[, where $a_0$ is normalized vector potential.]{} Unfortunately, so far the QED approach is not available for the problem: the laser field is always considered as the classical field. Therefore, the time of Compton scattering is not known. The duration of scattering cannot be found in the frame of present approaches. This question is critical in numerical investigations of plasma interaction with high power laser pulses. Exploring of Compton scattering in a reference frame moving with constant acceleration could provide us with the answer if the detector velocities in absorption time and emission time were essentially different.
Here we propose original designs for systems consisting of highly accelerated electrons which move in wake field of PW-class laser pulses and can be considered as objects in a constantly accelerating reference frame (Rindler space). Femtosecond XFEL pulses are proposed to probe such accelerated systems at extremely high acceleration $w \approx 2 \pi c^2 a_0/\lambda$ at a high temporal resolution.
Rindler space[@Rindler] is a natural reference frame to investigate a system moving with constant acceleration $w$ for example in $x$ direction. Coordinates in this reference frame link to those in Minkowski space as $ ct=(c^2/w+x^\prime ) \sinh(wt^\prime/c)$, $ x =(c^2/w+x^\prime ) \cosh(wt^\prime/c)$ with the interval $ds^2=(1+wx^\prime/c^2 )^2 d(ct^\prime)^2-({dx^\prime}^2+dy^2+dz^2) = \rho^2 d\eta^2 - (d\rho^2 + dy^2 + dz^2)$ \[$g^{00} = \rho^{-2}, g^{ii} = -1, \sqrt{-g} = \rho$\]. Unruh used a different form for the metric in [@Unruh1]: $ds^2 = \rho d\eta^2 - (d\rho^2/\rho + dy^2 + dz^2)$, $g^{00} = 1/\rho$, $g^{11} = -\rho$, $\sqrt{-g} = 1$. Klein-Gordon equation in a curved space has a following form: $\sqrt{-1/g} \ \ \partial/{\partial x^\mu} \left[g^{\mu\nu} \sqrt{-g} \ \ \partial / \partial x^\nu\right]\psi=(m^2 c^2/\hbar^2) \psi$. \[For massless particles, this equation does not contain the Plank constant.\] For example, in Rindler coordinates Klein-Gordon equation for a massless particle coincides with an equation for potentials of electro-magnetic field and has a following form: $[\partial^2 /\partial\eta^2 - \rho (\partial / \partial \rho) \rho (\partial / \partial \rho) - \partial^2 / \partial y^2 - \partial^2 / \partial z^2 ] \psi = 0 $. One can easily check that a plane wave solution of Klein-Gordon equation in Minkowski space $\psi \sim e^{i\omega (t - x/c)} = e^{i \rho[\cosh(\eta)-\sinh(\eta)]}$ obeys Klein-Gordon equation in Rindler space. However, in Rindler space there are other solutions of KG equation in the form of Fulling modes: $\psi_{FR} \sim g(\rho)e^{i(\varpi \eta - k_y y-k_z z)}$ where $g(\rho)$ obeys following equation[@Belinskii] $$\left[\rho \frac{\partial}{\partial \rho} \rho \frac{\partial}{\partial \rho} + \varpi^2 -{k_y}^2 - {k_z}^2 - \tilde{m}^2 \right] g = 0 ,
%\label{eq:}$$
These modes can be used for the second quantization in Rindler space similar to that with the plane waves in Minkowski space. It is the reasonable assumption that a detector moving with a constant acceleration should see vacuum as a set of Fulling modes. This is the basis of the Unruh effect. The same results occur while considering Maxwell’s equations and Dirac equations.
According to Unruh for [an observer with constant acceleration]{}, the vacuum state is changed and the detector observes the boson distribution of Rindler particles $\hat{\rho} = \rho_0 e^{-2\pi \hat{K}} \equiv \rho_0 e^{- \hat{K}_w/k_B T_w } $in the vacuum. Where $\rho_0 = \prod_j[(1-e^{-2 \pi \varpi_j } )]$, $\hat{K}_w = \hbar w \hat{K} ̂$, $ \varpi_j$ is frequency of particle and $\hat{K}$ is the energy of massless scalar particles. The temperature is called the Unruh temperature given by $T_w=\hbar w/2\pi k_B c$. There are papers exploring the effect[@Crispino]. Unruh and Wald have shown that the particle bathed in boson’s thermal bath is excited absorbing Rindler particles and [really emits photons]{}[@Unruh2]. This is called the Unruh radiation. Letaw and Pfautsch considered the excitation of the particle moving circularly with constant velocity[@Letaw]. Chen and Tajima have shown that the Unruh radiation from electron accelerated with extremely high gradient by the static wave produced by intense laser could be observed[@Chen]. Chen and Mourou have recently proposed an interesting application for relativistic plasma mirror stopped abruptly by impinging intense x-ray pulses[@Chen2]. Also, B. J. B. Crowley [ et al.]{} showed that the spectral broadening due to acceleration of X-ray Thomson scattering from electrons in plasma accelerated by intense laser could detect the Unruh radiation[@Crowley]. According to Zel’dovich[@Zel'dovich] an electron moving with acceleration $w$ crosses a photon bath with its energy density $W \sim T^4 \sim w^4$. This electron should scatter such photons with the known Thomson cross section $\sigma = 10 \alpha^2/m^2$ \[$\alpha$ is the fine-structure constant\] with total power $I \sim 10 \alpha^2 w^4/m^2$ which may exceed the classical radiation of the electron $I \sim 2 \alpha w^2/3$ [when acceleration $w$ exceeds $\sqrt{m^2/15 \alpha}$]{}. Besides, the electron may annihilate with a positron from the electron-positron bath emitting a characteristic radiation. Ginzburg and Frolov[@Ginzburg] have found an analogy between the Unruh effect and the anomalous Doppler effect.
Besides, there are problems related to the Unruh radiation. First of all, the Unruh effect of all particles except photons is purely quantum effect. However, there is no definition of acceleration $w$ in quantum mechanics as discussed by Narozhnii [ et al.]{}[@Narozhnii] According to Narozhnii [ et al.]{}, there is no conformity of Rindler space-time to Minkowski space-time[@Narozhnii; @Belinskii]. In a certain boundary condition, the Unruh effect therefore cannot exist[@Narozhnii]. Nikishov and Ritus have shown that the excitation of the elementary particle in a constant electric field might be due to pair creation by electric field[@Nikishov]. Another problem is the time of formation of the thermal bath. If an electron appears in the electric field, as acceleration field, instantly what it will see? According to Ginzburg and Frolov[@Ginzburg] the electron will see the thermal bath only after a time far longer than $\tau= c/w$. What kind of process results in such thermalization has yet to be explained. Moreover, for photons the Unruh effect contains no Plank constant. According to ’conformity principle’ for radiation, saying that any quantum radiation equals to classical one when $\hbar \rightarrow 0$, there should be a classical analog of such radiation. Mechanism of classical analog of Unruh radiation is difficult to determine.
Nevertheless, there is a positive point that makes the study of the Unruh radiation interesting. The Unruh radiation has a strong analogy with Hawking radiation[@Hawking]. Whether the acceleration field is equivalent to the gravitational field is not verified, but the Unruh radiation might give us the answer to that is true or not.
An unique complex SACLA consisting of 10 keV/30 fs XFEL systems [@SACLA] and coming $\approx$1 PW/25 fs Ti-Sph femtosecond laser with maximum intensity $I =10^{22}$ W/cm$^2$ [($a_0\approx 100$)]{} [, which exceeds the similar parameter of J-KAREN with peak intensity of $I =10^{22}$ W/cm$^2$ [@J-KAREN] which already exists,]{} allows developing a new, more adequate approach to explore the Unruh effect.
One of the problems in detecting the Unruh effect is the necessity of emitters and detectors in the same Rindler reference frame. For this purpose, it is better to explore the photon scattering rather than photon emission.
Thomson scattering from accelerated electrons
=============================================
According to Unruh the emission probability of an electron in Rindler space is given by following equation[@Unruh1]: $$P_j = {\displaystyle \sum_{p}}{ \left| \int_0^T\epsilon d \left ( \frac{\tau}{T} \right) \int_V \sqrt{-g} d^3 x {\psi_j}^{\ast} \bra{p} A \ket{0}_M \psi_0 \right|}^2,
%\label{eq:}$$ where $\psi$ is an electron wave function in Rindler space, $A$ is the field operator, $\bra{p}$ is the field wave function, $\epsilon$ is a coupling constant, $M$ means the vacuum in Minkowski space. This equation results in Rindler radiation. In the case of photon scattering one can extend the Unruh logic to a photon matrix element: $\bra{0}a_2 A_{\mu} (x)A_{\beta} (x^{\prime}) {a_1}^{\dagger} \ket{0}_M$ (see Ref.[@Landau2], $a, a^{\dagger}$ are the known operators). It is clear that the result of Fulling-Rindler mode may occur only as a broadening of scattering massless photon similar to the Doppler broadening with the temperature $T_w=\hbar w/2\pi k_B c$.
There was a proposal of using Thomson scattering as a detector for the Unruh effect[@Crowley] exploiting acceleration of electron quiver motion in a laser pulse, $ w = c \omega_L a_0$ with zero $v \times B$ force. To make the story, 3 different laser pulses were considered. 1st optical laser pulse should excite a gas-jet to make plasma. 2nd optical laser pulse makes acceleration for electrons in the plasma, and 3rd an XFEL pulse coaxial with the 2nd pulse probes accelerated electrons. It was stated that there is the possibility to detect the Unruh effect by obtained spectral broadening.
Expected spectrum is given by[@Crowley] $$S({\bf k}, \omega) = \sqrt{ \frac{1}{\pi (1 - \cos \theta) \Omega^2}} \exp \left[ - \frac{1}{\pi (1 - cos \theta) \Omega^2} \omega^2 \right],
%\label{eq:}$$ where $\Omega = \omega_i v_{th} / c$, $\omega_i$ is the photon energy of probing laser, $\theta$ is scattering angle, $v_{th} = \sqrt{2k_B T_w / m}$ is thermal velocity, $k_B$ is Boltzmann constant, $T_w = T + \lambda m {w^2} / { 2k_B} q^2 c^2$ is the temperature of electrons in thermal equilibrium, which differs from the Unruh temperature, $T$ is temperature of the plasma, $m$ is electron mass, $c$ is speed of light, $\omega$ is the change of photon energy of probing laser after scattering, $q$ is a change of wavenumber after scattering and $\lambda$ is metric parameter[, which determines the properties of space time geometry (metric) [@Crowley]]{}. About 40 photons are expected in a shot of XFEL. However, in this scheme, it is difficult to distinguish whether the expected spectrum broadening occurs due to the Unruh effect or due to the extra Doppler effect. [Because of]{} a finite length of probing pulses, electrons are further accelerated and evacuated by the ponederomotive force to vicinity of lower laser field as well as a strong, complicated longitudinal field make this scheme difficult in realization. We consider two schemes that can eliminate extra Doppler shifts and extract the Unruh effect using plasma and intense laser.
Thomson scattering from a laser pulse wake wave
===============================================
Electrons in plasma wave exited by a laser pulse in underdense plasma are good candidates for probing the Unruh effect via Thomson scattering. It is well known that a laser pulse propagating in underdense plasma creates a trail of plasma wave in its wake [@Bulanov1]. This wave has no group velocity that means plasma electrons in the wave oscillate with plasma frequency, $\omega_p = \sqrt{4 \pi Z N_p e^2 / m}$, where $N_p$ is the plasma density, $Z$ is the ion charge, and with a limited displacement. Such plasma perturbation propagates with phase velocity $v_p=c\sqrt{1-4 \pi ZN_p/a_0N_{cr}}$ where $N_{cr}$ is the critical density for laser pulse with frequency $\omega_L$ and $a_0$ is its normalized intensity. In contrast to the electric field of a laser pulse, maximal electric field in a wake, and corresponding acceleration, is weaker by factor $\omega_p / \omega_0$ [@Esarey2]: $w = eE_p/m = c \omega_p a_0 $ \[cm/s$^2$\]. Moreover, for large $a_0$ this field strength can be achieved only in the first bucket of plasma wave trail due to the relativistic wave-breaking [@Bulanov2]. The maximal acceleration in regular wave buckets therefore is even smaller and is determined by the wave breaking limit field [@Esarey2]: $w = eE_{WB}/m = c \omega_p \sqrt{ 2 a_0} $ \[cm/s$^2$\]. However, the number of electrons with identical velocity and moving at identical acceleration in these waves is much larger than that in the case of quiver motion [@Crowley]. This allows essential increasing of efficiency of Thomson scattering for detection of the Unruh effect. The problem of ponderomotive acceleration also vanishes. In the reference frame moving with the constant group velocity of wave this scheme provide an electron layer with $v=0$ undergoing constant acceleration $w$.
There are two parameters resulting in value of electron acceleration, the laser field strength, $a_0$, and the plasma density, $N_e$. However, one can consider three different cases of plasma wave for the Unruh effect detection: (i) a regular wake with minimal possible acceleration, $w = eE_{WB}/m$, and a large number of identical accelerated structures; (ii) wave breaking limit with far higher acceleration $w = c \omega_p a_0 $, but with a single regular accelerated electron group existing for a short time, (iii) relativistically transparent overdense plasma with immense number of accelerated electrons and maximal acceleration.
Being based on this, we propose the concept for observation of the Unruh effect by the electron layer of the plasma wave [with $k$ vector diagram [@Glenzer]]{} in Fig.\[fig:fig1\]. The layer is produced in the plasma and accelerated by wake field. Probing laser is incident from its back and scattered light is detected also backwardly. [We use plasma wave similar to flying mirror [@Bulanov2] exploiting incident light from opposite direction to decrease intensity of laser light.]{} Akhiezer and Polovin[@Akhiezer] showed that electrons in plasma wave have acceleration $w(v)$ depending on its velocity. Upon choosing reasonable incident and detection angles, the Doppler shift of electron motion is suppressed and only spectral broadening due to the Unruh effect could be extracted. The Doppler shift would be occurred when we observe the spectrum in the laboratory reference frame. That is shown as [@Bulanov2] $$\varepsilon^{\prime} = \varepsilon_0 \frac{1 + 2 \beta \cos \theta_D + \beta^2}{1 - \beta^2} ,
%\label{eq:}$$ where $\varepsilon_0$ and $\varepsilon^{\prime}$ are the photon energy of light before and after scattering respectively. $\beta$ is denoted as $\beta = v^2 / c^2$ where $v$ and $c$ are speed of electron layer and light respectively. $\theta_D$ is the angle between velocity of electron layer and incident light. And the reflection angle $\theta_R$ is related to the incident angle [shown in $k$ vector diagram of Fig.\[fig:fig1\]]{} as $$\sin \theta_R = \frac{\varepsilon_0}{\varepsilon^{\prime}} \sin\theta_D =\frac{(1 - \beta^2)\sin\theta_D}{1 + 2 \beta \cos \theta_D + \beta^2},
%\label{eq:}$$
We can find the angles that the scattering frequency should not be changed due to the Doppler shift from the above equations. This gives $\theta_D = 174^{\circ}$ and scattering angle $\theta_R = 5.4^{\circ}$. These angles we use for estimation of spectra of scattered x-rays. When photon energy of probing laser is set to be 1 keV, expected spectral broadening is expected to be $\Delta\omega/\omega_i \approx 1.4 \%$ at $a_0 \approx 100 $, $N_e \approx 10^{20}$ cm$^{-3} $ for regular wake, $\Delta\omega/\omega_i \approx 3 \% $ at $a_0 \approx 100 $, $N_e \approx 10^{20}$ cm$^{-3} $ for first bucket. $\omega_p$ raises up to $\omega_L$ with increase of density.
To estimate efficiency of scattering we present the electron density in the form[@Akhiezer] $$N_e \approx \eta(a_0)N_p,
%\label{eq:}$$ where $\eta(a_0)$ is the compression coefficient depending on the laser intensity. We also define a parameter $\delta = w_{x-ray}/w_{L}$ as the uniformity parameter, which represents the flatness of the electron layer, where $w_{x-ray}$ and $w_{L}$ are the waists of x-rays and driving laser pulse respectively. [We solved the conventional transport equation $dN_{sc}/dx=N_e (d\sigma / d\Omega)N_{in}\delta$ assuming $x=L$ is too small, where $N_{in}$ is the number of incident photons. ]{} Finally one can get $N_{sc}$ per 1 shot as $$N_{sc}=N_e \frac{d\sigma}{d\Omega}N_{in}L\delta,
\label{eq:numbe-sc}$$ where $ d\sigma / d\Omega= {r_e}^2 (1 + \cos^2 \theta) / 2$ is the Thomson scattering cross section with $r_e$ is the classical electron radius and $\theta$ is a scattering angles[, and $L$ is thickness of the layer. We use electrons in the plasma wave with high density. The wave moves with high speed as well as the x-rays. Therefore, the efficient length $L'$ becomes longer. For example in the case of incidence with zero angle the length will be $L'=Lc/(c-v)$ where $v$ is the phase velocity of the plasma wave. During this propagation there will be scattering. If we assume that the wave does not change much in this distance the number of photon drastically increases, at least 10-100 times. In the normal case the angle is not zero and efficient length is shorter. However, the number of photon increases.]{}
Results of calculations for spectra and total number of scattered photons and its efficiency are presented in Fig.\[fig:fig2\] for the maximal and minimal accelerations. The number of incident x-rays is $N_{in} = 10^{12}$, waists of x-rays $w_{x-ray}=7.5$ $\mu$ m and laser pulse waist $w_{L}=15$ $\mu$m[, and thickness $L\approx 1$ $\mu$m]{}. Efficiency is the number of resolvable photons in the total number of photons, meaning that how many photons can be detectable for the Unruh radiation. It is determined by the integral of spectra from resolvable point (1 %, 5 % in the case) to infinity.
This number of photons is enough to get reasonable results by 1 shot probing. The case of relativistically under-dense plasma has been included in this calculation. The compression efficiency was calculated using 3D PIC FPLASER3D code[@Zhidkov]. One can see that the efficiency of scattering is high enough for verifiable detection of the Unruh effect in both cases. The number of scattering photons exceeds $10^{3}$ even for $a_0 = 100$ and the plasma density $N_p = 10^{20}$ cm$^{-3}$. [We show in Fig.\[fig:pic\] that shows the results of 3D PIC simulation when intense laser pulse with $a_0 = 100$ and wavelength of 1 $\mu$m irradiated to underdenseplasma (hydrogen gas in this case) with initial electron density of $10^{19}$ cm$^{-3}$. The critical density is approximately $1.7\times 10^{21}$ cm$^{-3}$. We see the electron density of the layer exceeds $10^{20}$ cm$^{-3}$ because of the compression.]{} Expectedly the broadening of the scattered x-rays owing to the Unruh effect is larger for the maximal acceleration. Nevertheless even for $a_0 = 100$ and the plasma density $N_p = 10^{20}$ cm$^{-3}$ it is about $1\%$ that could be enough for detection depending on the broadening of XFEL pulses.
We note that this scheme is free from recoil problem. For co-propagating x-rays and laser pulse recoil effect is small $\hbar \omega / 2 \gamma m c^2 \approx 10^{-4}$ for $\gamma = 10$ and 1 keV x-ray. The use of the first bucket of wake field would provide us with the maximal acceleration and give parameters of scattered x-rays good enough for detection of the Unruh effect. However, due to relativistic wave breaking a regular electron layer exists only though for a short time but quite detectable even in the case of high density plasma[@Kulagan]. This requires a tight synchronization of laser pulse and XFEL pulse. Full optical XFEL system[@ImPACT]can provide such synchronization down to a few fs level.
Thomson scattering from electron bunches accelerated by laser wake field
========================================================================
The use of Thomson scattering from a laser wake wave demonstrates its serious prospect for detection for the Unruh effect. One contradiction, however, is based on the fact that measurements should include not only source of radiation but also detector in the same reference frame. Here, we propose such a system consisting of a source and detector also with laser wake field acceleration (LWFA) and XFELs. Proposed experimental setup is shown in Fig.\[fig:fig3\]. Pumping optical laser irradiates a helium gas-jet to create laser wake field. Due to multiple electron self-injection several beams, for example, electron beam 1 and electron beam 2 shown in Fig.\[fig:fig3\], are created in an accelerating field $E_P$ and can be used as a source and a detector respectively. Probing XFEL (attosecond harmonics with 1 eV spectrum width) is incident to an accelerated source from its back. Scattered light from the detector is probed and the spectrum is to be obtained.
Recently, electron acceleration technology has been developing. LWFA can accelerate electrons with an acceleration gradient of $\approx 100$ GV/cm. A laser pulse leaves its wake field blowing electrons away in plasma[@Zhidkov]. Acceleration field is generated by sparse and dense electrons. Some of blown electrons come back to acceleration field by Coulomb force and built groups of electrons, which is called bunch, are uniformly accelerated with the same high gradient acceleration and velocity. [Uniform acceleration means that all electrons are under the same acceleration force in electric field with its gradient equaling to zero and in ideal case lower gamma is better for such purpose because of relativistic effects with higher gamma. What we need is large acceleration not energy.]{} Thus, LWFA is adequate to verify the Unruh effect. Fig.\[fig:fig4\] shows the typical result of 2D PIC simulation for laser wake field acceleration. Due to multiple electron self-injection[@Zhidkov] or an external injection, the number of bunches may be varied.
Accelerating electrical field is the wake field with its strength given by $$w = \frac{e}{m} E_p = c \omega_p a_0 \ \ [\text{cm/s}^2],
%\label{eq:}$$
Again, we consider Thomson scattering from bunches to observe the Unruh effect. Figure.\[fig:fig5\] shows the experimental process [with $k$ vector diagram [@Glenzer]]{}. When we consider Thomson scattering from 1 bunch, scattered spectrum broadens due to velocity of bunches. To eliminate this effect, we take a pair of 2 bunches as source and detector and consider the 2 times Thomson scattering. We use a forward bunch as a source and backward bunch as a detector. Electron beams 1 and 2 are accelerated by different acceleration $w_1$ and $w_2$ that have almost the same value. We could put the source and detector in almost the same accelerating frame. Probing laser is shot from the back side of the source. The source scatters photons to the detector. We observe the spectrum of scattered photons by the detector. Frequency of scattered light by source becomes downshifted due to Doppler effect. And frequency of scattered light by detector becomes upshifted due to Doppler effect. So, observed spectrum of detector should be the same as initial probing pulse ordinary. However, if the Unruh effect exists, accelerated bunches feel the Unruh temperature and the spectrum of scattered light becomes broader. We could extract the Unruh effect felt by each electron beams.
Scattering occurs twice by the source and the detector. The frequency of the probing laser becomes shifted in the first scattering by the source. The detector scatters the shifted laser light from the source returning its initial frequency. So, the expected spectrum from the detector, observed in the laboratory frame, should be obtained by convolution of $S({\bf k},\nu)$ $$\begin{split}
S({\bf k},\omega) & \approx \int_{-\infty}^{\infty} S({\bf k},\nu) S({\bf k},\omega - \nu) d\nu \\
&= \sqrt{\frac{1}{\pi F(\theta)}} \exp [- G(\theta) \omega^2],
%\label{eq:}
\end{split}$$ $$F(\theta) = (1-\cos \theta_2) {\Omega_2}^2+(1-\cos \theta_1) {\Omega_1}^2,
%\label{eq:}$$ $$% \begin{split}
G(\theta) = \frac{1}{(1-\cos \theta_1) {\Omega_1}^2}- \cfrac{1}{{(1-\cos\theta_1)}^2 {\Omega_1}^4 \left[ \cfrac{1}{(1-\cos \theta_1) {\Omega_1}^2} + \cfrac{1}{(1-\cos \theta_2) {\Omega_2}^2} \right]},
% \end{split}
%\label{eq:}$$ $$\Omega_1 = \frac{\omega_i v_{th1}}{c}, \ \ \Omega_2 = \frac{\omega_i v_{th2}}{c},
%\label{eq:}$$ where $\theta_1$ and $\theta_2$ is scattering angle of source and detector, $v_{th1}=\sqrt{2k_B T_{w1} / m}$ and $v_{th2}=\sqrt{2k_B T_{w2} / {m}}$, $T_{w1} = \hbar {w_1} / 2\pi k_B c$ and $T_{w2} = \hbar {w_2} / 2\pi k_B c$ are the Unruh temperature of beam 1 and 2, respectively.
We have to set adequate scattering angles to eliminate the normal Doppler effect of scattered light. That means the scattering angles that we observed spectrum becomes monochromatic. Such scattering angles satisfy the equation shown below. $$\cos(\pi - \theta_2) = \frac{1}{\beta} \left[ 1 - \frac{1-\beta^2}{1 - \cos\theta_1} \right],
%\label{eq:}$$ where $\beta = v^2 / c^2$ and $v$ is the velocity of bunches. When $v=0.9c$, a set of angles satisfying the equation is $\theta_1=165^\circ$, $\theta_2=172.4^\circ$. [The angles are described in $k$ vector diagram in Fig.\[fig:fig3\]]{}
The spectral width of the expected spectrum is a critical parameter. Broadening due to the Unruh effect must exceed both a bandwidth of XFEL pulses and a thermal-like Doppler shift owing the energy spread of electrons in the beams. Broadening of XFEL can be solved upon use of harmonics from laser plasma[@Pirozhkov] while the problem of low beam energy spread is far from solution.
The number of scattered photon per 1 shot from a single pair of source and detector can be estimated only by use of results of 3D PIC simulation shown in Fig.\[fig:fig4\]. Density of photons from probing XFEL can be evaluated from a simple equation as $N_{in} = I_p \pi {(w_U/ 2)}^2 \tau / E_{ph}$ , where $I_p$, $w_U$, $\tau$ and $E_{ph}$ are laser intensity, beam waist, pulse duration, and photon energy respectively. We denote the number of scattered photons from the source as $N_{sc1}$, the number of scattered photons by the detector as $N_{sc2}$, and the electron density of bunch as $N_e$. Since the interaction length $L$ is equal to the size of the bunch, $N_{sc1}$ is given by $N_{sc1} = N_e (d\sigma / d\Omega)_1 N_{in} L$. Then, $N_{sc2}$ becomes $$\begin{split}
N_{sc2} &= N_e \left( \frac{d\sigma}{d\Omega} \right)_2 N_{sc1} L \\
&= {N_e}^2 \left( \frac{d\sigma}{d\Omega} \right)_2 \left( \frac{d\sigma}{d\Omega} \right)_1 L^2 N_{in}, \\
\label{eq:beams}
\end{split}$$ [in ideal case]{} where $ (d\sigma / d\Omega)_i = {r_e}^2 (1 + \cos^2 \theta_i) / 2$ is the Thomson scattering cross section of each scattering, with $r_e$ is the classical electron radius and $\theta_i$ is a scattering angles. [In this case the efficient length as discussed in the previous section could be considered. Electron beams move with high speed as well as the x-rays. The efficient length $L'$ becomes longer. As we showed, in the case of incidence with zero angle the length will be $L'=Lc/(c-v)$ where $v$ is the phase velocity of the electron beams.]{} Upon setting $N_{in} = 10^{12}$ from the equation, $N_e = 10^{20}$ cm$^{-3}$ and $L = 10$ $\mu$m from the results of 3D PIC simulation, one can get $N_{sc2} \approx 5 \times 10^{-5}$ in 1 shot. This number means that we can get $10^{-5}$ photons of the spectrum per 1 shot. Since several pairs of bunches can be generated, the number of photons can be increased proportionally.
Let us estimate the number of pairs we can use when using SACLA’s XFEL that has 10 keV and $\approx$ 80 $\mu$m beam size. Size of the bunch is $\approx$ 2 $\mu$m, 2 bunches are used as a pair. A wavelength of light scattered by a source becomes $\approx$ 0.8 $\mu$m. So, a pair needs $\approx$ 4.8 $\mu$m. The beam size of XFEL is $\approx$ 80 $\mu$m. Therefore, $\approx$ 30 pairs of bunches can be used in 1 shot probing. When we have 30 pairs of bunches, we could get $N_{sc2} \approx 1.5\times 10^{-3}$. We can obtain sufficient spectrum by probing many times. For example, if we use the laser in 10 Hz repetition rate mode, the expected number of photons is $\approx 5$ per hour. It seems to be a sufficient number of photons to resolve the scattered spectrum.
[In this case, the charge of electron beams is smaller and of order nC-pC. Because of low charge of the beams, this experiment would be sensitive to scattering compared to using electrons in plasma wave proposed in previous section. In previous section, the number of electrons in plasma wave is large enough to obtain spectrum and charge is not so important. In using electron beams case, electron charge is important. Small charge electron beams would not scatter the enough number of photons to obtain spectrum while eq.(\[eq:beams\]) is assumed that second scattering scatters all photons from first scattering.]{}
To verify the existence of the Unruh radiation, scattered spectrum should have certain width that relates to the acceleration. Fig.\[fig:fig6\] shows $a_0$ dependency of spectrum width. As seen from this graph, higher acceleration is necessary to observe broader spectrum.
Conclusions
===========
We have proposed designs for experimental observation effects by spectral shift of Thomson scattering from two systems consisting of highly accelerated electrons. First system is consisted of electrons in the plasma wave excited by an intense laser. Reasonable photon number of Thomson scattering allows us to obtain the spectrum. Choosing certain incident and detection angles enables us to distinguish the Unruh effect from the normal Doppler shift. Second system is consisted of source-detector moving with a constant acceleration. In this case, the laser wake field with the multiple electron self-injection has been considered. Probing the existence of the Unruh effect explores whether acceleration and gravitation are equivalent. Although there are several problems in the existence of the Unruh effect, it should be proved in the experiment. Two proposals enable us to distinguish spectral shift of the Unruh effect from that of the normal Doppler shift. Second proposed experiment has a source and a detector in the reference frame with constant acceleration and is suitable for detecting the effect occurring in the reference frame. The proposed experiment can prove whether the Unruh effect exists or not.
New proposals can be realized at SACLA [@SACLA] in near future. [Lasers with $a_0\approx100$ is coming to SACLA exceeding already achieved laser parameter of J-KAREN [@J-KAREN].]{} For now, the maximum intensity of optical laser reached $a_0\approx100$ experimentally [in the world]{} and is developing to reach higher intensity. In the case of plasma wave the firm detection of the Unruh effect can be performed soon with $a_0 \approx 100-200$. Therefore, this proposal could be executed by a combination of XFEL and LWFA with intense optical laser theoretically. The technologies of LWFA and X-ray harmonics are under development but are not yet practical.
The systems we proposed are considered to leave only practical problems, such as attosecond harmonics, Laser Wake Field Acceleration, synchronization between PW laser and XFEL and the facility consisting of all these technologies. IMPACT project is running to construct the facility that makes it possible in SACLA. Fundamental problems seem to be solved to verify the Unruh effect. We can expect to execute the proposed experiment at SACLA facility with the PW class laser system and the existing XFEL.
Acknowledgement
===============
This work was partially supported by IMPACT project.
[99]{} W. G. Unruh, Notes on black-hole evaporation, Phys. Rev. D[**14**]{} (1976) 870-892. W. Rindler, Kruskal space and the uniformly accelerated frame, [Am. J. Phys.]{} [**34**]{} (1966) 1174-1178. R. A. Sunyaev, Ya. B. Zel’dovich, Small-scale fluctuations of Relic Radiation, Astrophys. [Space Sci.]{} [**7**]{} (1970) 3-19. J. S. Bell, J. M.Leinaas, Electron as accelerated Thermometers, [Nucl. Phys.]{} B[**212**]{} (1983) 131-150. N. B. Narozhny, A. M. Fedotov, B. M. Karnakov, V. D. Mur, and V. A. Belinskii, Boundary conditions in the Unruh problem, [Phys. Rev.]{} D[**65**]{} (2002) 025004. S. W. Hawking, Black hole evaporation?, [Nature.]{} [**B**]{} (1974) 30-31. L. Landau, E. Lifshitz, The Classical Theory of Fields, Pergamon Press (1980). V. L. Ginzburg, V. P. Frolov, Vacuum in a homogeneous gravitational field and excitation of a uniformly accelerated detector, [Phys. Usp.]{} [**30**]{} (1988) 1073-1095. V. I. Ritus, Quantum effects of the interaction of elementary particles. [Nauk SSSR.]{} [**111**]{} (1979) 5-151. E. Esarey, S. K. Ride, P. Sprangle, Nonlinear Thomson scattering of intense laser pulses from beams and plasmas. [Phys. Rev.]{} E[**48**]{} (1993) 3003-3021. V. A. Belinskii, B. M. Karnakov, V. D. Mur, N. B. Narozhny, Does the Unruh effect exist?, [J. Exp. Theor. Phys. Letts.]{} [**65**]{} (1997) 902-908. L. C. B. Crispino, A. Higuchi, G. E. A. Matsas. . The Unruh effect and its applications, [Rev. Mod. Phys.]{} [**80**]{} (2008) 787-838. W. G. Unruh, R. M. Wald, What happens when an accelerating observer detects a Rindler particle, [Phys. Rev.]{} D[**29**]{} (1984) 1047-1056. J. R. Letaw, J. D. Pfautsch, Quantized scalar field in rotating coordinates, [ Phys. Rev.]{} D[**22**]{} (1980) 1345-1351. P. Chen, T. Tajima, Testing Unruh Radiation with Ultraintense Lasers. [Phys. Rev. Lett.]{} [**83**]{} (1999) 256-259. P. Chen, G. Mourou, Accelerating Plasma Mirrors to Investigate Black Hole Information Loss Paradox, arXiv:1512.04064v4 (2016). B. J. B. Crowley, R. Bingham, R. G. Evans, D. O. Gericke, O. L. Landen, C. D. Murphy, P. A. Norreys, S. J. Rose, Th Tschentscher, C. H.-T Wang, J. S. Wark, G. Gregori, Testing quantum mechanics in non-Minkowski space-time with high power lasers and 4th generation light sources, [Sci. Rep.]{} [**2**]{}, (2012) 491. Ya. B. Zel’dovich, L. V. Rozhanskii, A. A. Starobinskii, Emission by accelerated electron, [J. Exp. Theor. Phys. Letts.]{} [**43**]{} (1986) 523-526. A. I. Nikishov, V. I. Ritus, Processes induced by a charged particle in an electric field, and the Unruh heatbath, [J. Exp. Theor. Phys. Letts.]{} [**67**]{} (1988) 1313-1321. M. Yabashi, H. Tanaka, T. Ishikawa, Overview of the SACLA facility. [J. Synchrotron Rad.]{} [**22**]{} (2015) 477. H. Kiriyama, M. Kando, A. S. Pirozhkov, M. Kishimoto, A. Kon, M. Nishiuchi, H. Sakaki, K. Ogura, M. Kanasaki, H. Tanaka, Y. Fukuda, M. Mori, Y. Mashiba, M. R. Asakawa, A. Sagisaka, J. Koga, T. Zh. Esirekepov, Y. Hayashi, H. Kotaki, Y. Miyasaka, K. Sekiguchi, S. V. Bulanov, and K. Kondo, The Current Status of the J-KAREN Laser Upgrade, 2016 Conference on Lasers and Electro-Optics (CLEO) (2016). L. Landau, E. Lifshitz, Quantum Electrodynamics, Pergamon Press (1980). S. V. Bulanov, T. Zh. Esirkepov, M. Kando, A. S. Pirozhkov, N. N. Rosanov, Relativistic mirrors in plasmas. Novel results and perspectives. [Phys. Usp.]{} [**56**]{} (2013) 429-464. E. Esarey, P. Sprangle, Overview of Plasma-Based Accelerator Concepts, [IEEE Trans. Plasma Sci.]{} [**24**]{} (1996) 252-288. S. V. Bulanov, T. Zh. Esirkepov, Y. Hayashi, H. Kiriyama, On Some Theoretical Problems of Laser Wake-Field Accelerators, [J. Plasma Phys.]{} in press. S. H. Glenzer, H. J. Lee, P.Davis, T. Döppner, R. W. Falcone, C. Fortmann, B. A. Hammel, A. L. Kritcher, O. L. Landen, R. W. Lee, D. H. Munro, R. Redmer, and S. Weber, Dense plasma X-ray scattering: Methods and applications, High Energy Density Phys. [**6**]{} (2010) 1-8. A. I. Akhiezer, R. V. Plovin, Theory of Wave Motion of an Electron Plasma, [J. Exp. Theor. Phys. Letts.]{} [**3**]{} (1956) 696. A. S. Pirozhkov, M. Kando, T. Zh. Esirkepov, P. Gallegos, H. Ahmed, E. N. Ragozin, A. Ya. Faenov, T. A. Pikuz, T. Kawachi, A. Sagisaka, J. K. Koga, M. Coury, J. Green, P. Foster, C. Brenner, B. Dromey, D. R. Symes, M. Mori, K. Kawase, T. Kameshima, Y. Fukuda, L. Chen, I. Daito, K. Ogura, Y. Hayashi, H. Kotaki, H. Kiriyama, H. Okada, N. Nishimori, T. Imazono, K. Kondo, T. Kimura, T. Tajima, H. Daido, P. Rajeev, P. McKenna, M. Borghesi, D. Neely, Y. Kato, S. V. Bulanov, Soft-X-Ray Harmonic Comb from Relativistic Electron Spikes, [Phys. Rev. Lett.]{} [**108**]{} (2012) 135004. A. Zhidkov, T. Fujii, K. Nemoto, Electron self-injection during interaction of tightly focused few-cycle laser pulses, [Phys. Rev.]{} E[**78**]{} (2008) 036406. V. V. Kulagin, V. A. Cherepenin, M. S. Hur, H. Suk, Flying mirror model for interaction of a super-intense laser pulse with a thin plasma layer: Transparency and shaping of linearly polarized laser pulses, [Phys. Plasmas]{} [**14**]{} (2007) 113102. Impulsing Paradigm Change through Disruptive Technologies Program ImPACT. \[online\] Available at: http://www.jst.go.jp/impact/en/index.html \[Accessed 6 July 2016\]
\
\
Fig. 1. Proposed experimental setup using accelerated electrons of plasma wave [with $k$ vector diagram. $k_i$ and $k_r$ is wave vector of incident and scattered light, respectively and $q$ is change of wave vector.]{} The layer is produced in the plasma and accelerated by wake field. Probing laser is incident from its back and scattered light is detected also backwardly.Upon choosing reasonable incident and detection angles, the Doppler shift of electron motion is suppressed and only spectral broadening due to the Unruh effect could be extracted.\
\
Fig. 2. Dependency of spectrum width and the total number of photons on the laser pulse field for (a) scattering from the first bucket at maximal acceleration and (b) for the wave breaking limit. Solid lines show $\Delta \omega / \omega_i$ for $N_e =$ (1)$10^{22}$, (2)$10^{21}$ (3)$10^{20}$ cm$^{-3}$. Dashed lines show the total number of photons for $N_e =$ (4)$10^{22}$, (5)$10^{21}$ (6)$10^{20}$ cm$^{-3}$. The number of resolvable photons for (c)the first bucket and (d)the wave breaking limit; the photon energy of probing laser is $\omega_i=1$ keV. Solid lines show the number of resolvable photons with 1 % resolution for $N_e =$ (1)$10^{22}$, (2)$10^{21}$ (3)$10^{20}$ cm$^{-3}$. Dashed lines show the number of resolvable photons with 5 % resolution for $N_e =$ (4)$10^{22}$, (5)$10^{21}$ (6)$10^{20}$ cm$^{-3}$.\
\
Fig. 3. [Results of 3D PIC simulation when intense laser pulse with $a_0 = 100$ and wavelength of 1 $\mu$m irradiated to underdense plasma (hydrogen gas in this case) with electron density of $N_p = 10^{20}$ cm$^{-3}$. The critical density is approximately $1.7\times 10^{21}$ cm$^{-3}$. We see the electron density of the layer exceeds $10^{20}$ cm$^{-3}$ around $x+ct=55$ \[$\mu$m\] which is focal position of the laser pulse because of the compression.]{}\
\
Fig. 4. Proposed experimental setup with a source and a detector. [$k$ vector diagram is shown. $k_i$ and $k_i$ is wave vector of incident and scattered light, respectively and $q$ is change of wave vector of first scattering and with prime is of second scattering.]{} $E_L$ is electric field of optical laser pulse. $E_P$ is accelerating field of wake field. Beams 1 and 2 are group of electrons used as a source and a detector respectively. Pumping optical laser ( $\geq10^{22}$ W/cm$^{-2}$) is shot in Helium gas-jet to create Laser Wake Field. Probing XFEL is incident to an accelerated source from its back. Scattered light from the detector is probed and the spectrum is to be obtained.\
\
Fig. 5. 3D simulation for Laser Wake Field Acceleration. Electron density from 3D PIC simulation for LWFA done for the conditions stated below. The plasma channel has the maximum density of $N_{e max} = 4\times10^{18}$ cm$^{-3}$ and the minimal density of $N_{e max} = 1.2\times10^{18} $ cm$^{-3}$. The laser intensity is $I = 4 \times 10^{19}$ W/cm$^{-2}$, the focus diameter is $D = 18$ $ \mu$m and laser pulse duration is 30 fs. One can see multiple self-injection of bunches in the first bucket behind the laser pulse. Some bunches appear in the bucket repeatedly.\
\
Fig. 6. Proposed experimental process. Forward bunch could be used as source and backward bunch as a detector. Probing laser is irradiated from the back side of the source. Source scatters photons to the detector. We observe the spectrum from the detector. Electron bunches moving with the same acceleration.\
\
Fig. 7. Dependency of spectrum width and efficiency of number of photons on the laser pulse field. The graph shows the dependency of spectrum width and efficiency on the laser pulse field strength $a_0$ . $\omega_i$ is the photon energy of probing laser set to be 1 keV. Solid line (1) shows $\Delta \omega / \omega_i$. Dashed lines show the number of resolvable photons with (2)1 % (3)5 % resolution. The spectral width means the strength of the the Unruh effect. To obtain broader spectral shift, the larger $a_0$ is required.\
\
![[]{data-label="fig:fig1"}](fig1.pdf){width="\hsize"}
![[]{data-label="fig:fig2"}](fig2.pdf){width="\hsize"}
![[]{data-label="fig:pic"}](pic2.pdf){width="\hsize"}
![[]{data-label="fig:fig3"}](fig3.pdf){width="\hsize"}
![[]{data-label="fig:fig4"}](fig4.pdf){width="\hsize"}
![[]{data-label="fig:fig5"}](fig5.pdf){width="\hsize"}
![[]{data-label="fig:fig6"}](fig6.pdf){width="\hsize"}
[^1]: Corresponding author. Email address: myano@ef.eie.eng.osaka-u.ac.jp(M. Yano)
|
This past year has been so much more busy than
This past year has been so much more busy than ever before on so many fronts, so this year, I am still going to update my Top 50 list and do some of my other predraft blogs, they will just have to be a bit condensed. With that, today I will be posting my updated Top 50 Twins prospect list. I would love to hear your thoughts or comments on any of the rankings. You don't have to agree with me. So ask questions and present your Top 10, 20, 50 list for discussion too.
1 Kyle Gibson RHP New Britain Rockcats Prospect lists are a combination of potential with likelihood to reach potential. Gibson can be a top of the order, 2 type of pitcher, and there is a very good chance that it will happen.
2 Aaron Hicks OF Beloit Snappers Hicks has all of the tools, including the 6th tool (plate discipline). The Midwest League is not an easy place to play, but 2010 has been a very streaky season. His strong streak told us just how good he can be.
3 Miguel Sano SS DSL Twins All of the potential in the world, but still a long way to go. He wants to be up in the big leagues by 19. The Twins will be wise to note let that happen.
4 Wilson Ramos C Rochester Red Wings Strong spring training. Horrible start at Rochester. Seven hits in his first two big league games. Reality set in. Ramos is immensely talented, both offensively and potentially defensively when he puts in the effort. Will be interesting to see if he's still with the organization in August.
5 Adrian Salcedo RHP Ft. Myers Miracle 19 years old. Throws hard. Working on the breaking pitches, but he has been impressive in his short stint at Ft. Myers so far, even though he should probably be waiting for the Elizabethton season. Very high ceiling.
6 Angel Morales OF Beloit Snappers It's been a disappointing 2010 so far for Morales. He hasn't hit for as much power, but the tools are all there. It would be nice for him to have a strong second half. He is one of the better base stealers in the organization.
7 Joe Benson OF Ft. Myers Miracle Speaking of all the tools, Benson's ability to hit for power and get on base very well have him high on this list. The ability to put the ball in play seems www.nflofficialsaints.com/Black+Garrett+Hartley+Jersey to be the one thing that he needs to improve most, which is likely why he is back in Ft. Myers.
8 Davis Bromberg RHP New Britain Rockcats It's been an up and down season for Bromberg, but he has four or five pitches, and he's quite young. He also has great confidence and will work through any struggles. I expect that he will have a strong second half.
9 Ben Revere OF New Britain Rockcats Comparing Revere to Hicks, Morales and Benson isn't really fair. The other three are all much better and have much higher potential in terms of power and defense and arm. But Revere is a great singles hitter with tremendous speed and his base stealing has continued to improve. His likelihood to be a solid big league player is higher than the other three OF prospects.
10 Danny Valencia 3B Minnesota Twins Valencia is currently with the Twins with Michael Cuddyer out. Everywhere he has played, he has hit for average. He has never hit below .282. He doesn't like to walk too much, but an IsoD of over .050 is at least adequate. He is yet to homer this year, but his minor league track record indicates that he can hit for some power. And his defense has continued to improve.
11 Deolis Guerra RHP Rochester Red Wings Is he ready for AAA? Probably not. But he's holding his own and continues to learn. Best changeup in the organization, and his incredible improved control is very impressive.
12 Alex Burnett RHP Minnesota Twins Burnett was a surprise when he made the team out of spring training, but he has proven that he is ready and has pitched very well for the Twins. He always had good control, even as a starter. He throws hard and has three very good pitches. He's still young, but he is a guy who could be a future Nike Garrett Hartley Jersey closer.
13 Trevor Plouffe SS Rochester Red Wings Plouffe has seemingly put things together in 2010, and it's hard to believe that he is still just 23 years old. He has the ability to be an everyday Major League shortstop, which alone should probably move him even higher up this list.
14 Liam Hendriks RHP Ft. Myers Miracle I don't know if Hendriks' terrific start this season is a surprise, but it certainly has been noticed. He was the organization's pitcher of the month in April which earned him an early promotion to Ft. Myers where he has continued to be very good. His stuff is very good, and he understands how to get hitters out.
15 BJ Hermsen RHP Beloit Snappers Hermsen Garrett Hartley Jersey started the year at EST, but when needed, he was promoted to Beloit. He has been good at times, and at other times shown that he might be best served by pitching at Etown. But he has good stuff, good size and very good control, and the Twins love that.
16 Carlos Gutierrez RHP New Britain Rockcats I still believe that Gutierrez will be a big league relief pitcher, and a very good one. It's important to remember that he is working www.nflofficialsaints.com on adding pitches while in AA. He gets a ton of ground balls. He throws 95 with sink. Just has to trust his stuff and he can dominate.
17 Rene Tosoni OF New Britain Rockcats How much has the shoulder injury hurt Tosoni in 2010? He is still hitting around .280, but to this point, the power hasn't shown up the way it did last year. Tosoni is very good, so this ranking doesn't feel right. I think he should be higher, but right now, today, I just can't do it.
18 Bruce Pugh RHP Ft. Myers Miracle Although he was called a sleeper this offseason, Pugh was also a very pleasant surprise this year until an elbow injury which has sidelined him for a few weeks already. Hopefully he will be alright because he throws hard and has a couple of improving secondary pitches that make him potentially dominant.
19 Jeff Manship RHP Rochester Red Wings Again, a guy who is the big league club's sixth start, and gave up two runs in six innings for the Twins shouldn't be ranked this low. Manship can pitch Garrett Hartley Black Jersey in the big leagues, although his time in AAA this year will be valuable as well. He can help the Twins already when needed, but he can still continue to get better.
20 Chris Parmelee 1B Ft. Myers Miracle Parmelee has a ton of potential as well, but he was overmatched in AA. Getting sent back to Ft. Myers was the best thing that could happen. He can now work on his game without being overwhelmed. The contact rate is always the question with Parmelee, but hopefully with the Miracle, he can regain his ability to take walks and to hit for power.
21 Max Kepler OF Extended Spring Training All the talent in the world, but it will be very interesting to see how Max Kepler is able to put it together. Very good speed. Solid already defensively. Needs work on the offensive part of the game. But he's just 17, and the Twins will be very patient with him. I'd expect him to spend two years with the GCL Twins before advancing.
22 Tom Stuifbergen RHP Beloit Snappers Hopefully his elbow issues and his upcoming MRI reveal nothing and that Stuifbergen can rest and come back strong soon. He is another guy who just knows how to get hitters out. He has very good stuff, but he knows how to pitch, and that's important too.
23 Blayne Weller RHP Extended Spring Training I'm surprised and curious as to why Weller has not been promoted from EST to a fullseason team, and yet, it is in his best interest to pitch for the Garrett Hartley Jersey Ebay ETwins this year. He's got good stuff and great control. Just a notch behind Hermsen.
24 Luke Hughes 2B Rochester Red Wings How cool was it to see Hughes hit a home run in his first at bat with the Twins? Again, this feels like a low ranking, and yet, as good as Hughes has shown he can be, he just keeps getting hurt and isn't able to sustain the success very long. If he could stay healthy, he can help the Twins, maybe as a pinch hitter. I also think he could compete for the starting 2B job next year.
25 Chris Herrmann C/OF Ft. Myers Miracle Herrmann has done a very good job adjusting to the catcher position. He's quick and has a strong arm. But he is also an excellent defensive left fielder. He is also a solid hitter. The Twins typically do not have players skip levels, but Herrmann was pushed from Elizabethton last year to Ft. Myers this year and hasn't been completely over his head. He's got a chance to be a solid allaround player.
26 Bobby Lanigan RHP Ft. Myers Miracle Gibson got all the notice, but Lanigan was even better in April. Unfortunately, he has only pitched once since then. He has a good fastball and a very good slider, so hopefully he can get back soon.
27 Steve Singleton 2B New Britain Rockcats Another guy who should be much higher on this list probably. |
Q:
Is it possible to group Model fields in Django?
Working on a Calendar app, and would like each Event model instance to have one of the {allday|start,end} fields filled out. That is, either the allday field entered, or the start+end fields, but not both.
How can I model this and have it work correctly in the admin app? I'd like one of the group to be required.
A:
Create your model with all 3 fields, and override the clean method (called when validating the model) to check on your conditions:
def clean(self):
if not self.allday: # allday not present
if not self.start or not self.end: # start and/or end not present
raise ValidationError('error message...')
else:
if self.start or self.end: # allday present but also start and/or end
raise ValidationError('error message...')
More information on clean: Model.clean()
|
The U.N.-Arab League special envoy to Syria, Kofi Annan, has announced his resignation after failing to bring an end to more than a year of violence. Both sides of the conflict have faced new accusations of committing atrocities this week amidst escalating clashes. We discuss the situation in Syria and the likely impact of Annan’s resignation with Charles Glass, former ABC News chief Middle East correspondent and author of the soon to be reissued book on Syria, "Tribes With Flags." Glass spent 10 days in Syria this summer. "Kofi Annan’s resignation is a serious setback for anyone who had hoped that there could be a diplomatic resolution of this conflict," Glass says. "This is clearly an indication that diplomacy is failing, and ... warfare seems to be the only way out." [includes rush transcript]
If Julian Assange is granted asylum in Ecuador, he will become a resident of Latin America, where the trove of classified U.S. State Department cables he strategically disseminated through WikiLeaks has generated hundreds of headlines, from Mexico to Chile. A year after thousands of cables on Latin America were first released, the revelations have had different results — in two countries it led to the forced departure of the U.S. ambassador; in another it helped change the course of a presidential election. We’re joined by Peter Kornbluh, guest editor of "WikiLeaks: Latin America," a recent edition of The Nation magazine devoted to exploring the impact of WikiLeaks across the region. Kornbluh is a senior analyst on Latin America at the National Security Archive. [includes rush transcript]
Gore Vidal died on Tuesday at the age of 86 from complications of pneumonia. Vidal was a national icon who authored some 25 novels, several plays, two memoirs and multiple volumes of essays. He was one of the best-known and most prolific chroniclers of American history and politics, dedicating his work to critiquing the injustices of U.S. society. We air an excerpt of a Democracy Now! interview with Vidal from 2003 in the early stages of the U.S. invasion of Iraq. [includes rush transcript]
DN! In Depth
By Amy Goodman with Denis Moynihan — The corporate television newscasts spend more and more time covering the increasingly disruptive, costly and at times deadly weather. But they consistently fail to make the link between extreme weather and climate change. |
Introduction
============
Cytokinesis is a critical process for cell integrity and is very well conserved from animal to fungal cells. All require coordinated contractile actomyosin ring (CAR) closure and plasma membrane (PM) extension. Fungal cytokinesis requires the additional synthesis of a special division wall termed septum, strictly coupled to CAR contraction and PM extension ([@bib46]; [@bib4]). The septum is a three-layered structure of a middle primary septum (PS) flanked by a secondary septum (SS) on each side. The *Schizosaccharomyces pombe* septum grows by simultaneous synthesis of both PS and SS. The last step of cytokinesis is cell separation by controlled cell wall and PS degradation. Correct septum formation and especially cell separation are critical processes for cell integrity and survival ([@bib6]; [@bib53]; [@bib13]).
The fission yeast cell wall contains different essential glucans, but no chitin has been detected ([@bib44]). Branched β(1,6)glucan is located in the cell wall and SS; minor linear β(1,3)glucan (L-BG) is located mainly in the PS and some in the cell wall; and major branched β(1,3)glucan (B-BG) and α(1,3)glucan are located in the cell wall and both PS and SS ([@bib18]; [@bib12]; [@bib13]). L-BG is a special glucan necessary, but not sufficient, for PS formation that interacts with high affinity with the fluorochrome Calcofluor white (CW) in *S. pombe* ([@bib12]). B-BG and α(1,3)glucan are essential for cell shape and integrity ([@bib48]; [@bib16]; [@bib25]; [@bib11], [@bib13]). α(1,3)glucan is essential for the PS adhesion strength needed to support the internal pressure during cell separation ([@bib13]). However, the B-BG functions for cell wall and septum structure and integrity remain unknown.
*S. pombe* contains four essential integral PM glucan synthases (GS) that localize to the CAR, septum, and growing poles. Bgs1 and Ags1 appear simultaneously at the division site before septum synthesis, whereas Bgs4 localizes after septum initiation. Bgs1 is responsible for the L-BG and PS synthesis; and Ags1 is responsible for the α(1,3)glucan and SS synthesis and the PS adhesion strength. The function of Bgs3 remains unknown ([@bib10], [@bib11], [@bib12], [@bib13]; [@bib28]; [@bib32]).
Bgs4 and Ags1 are essential for cell integrity during polarized growth and mainly cytokinesis ([@bib11], [@bib13]). Bgs4 is responsible for the cell wall B-BG synthesis and the major β(1,3)GS activity. Bgs4 is also responsible for the resistance to specific β(1,3)GS inhibitors ([@bib48]; [@bib8]; [@bib11]; [@bib33]).
In this work, in addition to our findings concerning the essential Bgs4 B-BG functions for the cell wall and septum structure and integrity, we show for the first time that extracellular B-BG is important for CAR positioning in the cell middle. Furthermore, B-BG plays a role in coupling septum synthesis to CAR contraction and PM extension. Our findings reveal important similarities between the function of B-BG in connecting cell wall to CAR and determining intracellular functions of cytokinesis and an analogous role suggested for the ECM (functional equivalent of the cell wall) in animal cells ([@bib58]).
Results
=======
Bgs4 is essential for cell integrity mainly during cytokinesis
--------------------------------------------------------------
To study the essential functions of β(1,3)GS Bgs4, a *bgs4*Δ strain containing integrated *bgs4^+^* regulated by the 81X version (highest repression level) of the thiamine-repressible *nmt1^+^* promoter, was made (see Materials and methods). The 81X-*bgs4^+^* strain showed a uniform repression phenotype of cell lysis. Cell growth arrested after 8 h of *bgs4^+^* repression and sorbitol delayed growth arrest to 12 h ([Fig. S1 A](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp1}, arrow). Thus, sorbitol was selected to study stronger *bgs4^+^* repression defects in cells that would otherwise be dead. Cell lysis in the presence of sorbitol started at 8 h (Fig. S1, B and D \[arrows\]), earlier than cell growth arrest was detected, and reached 50% at 12 h. Cell lysis without sorbitol also started earlier than cell growth arrest, at 5--6 h (unpublished data). Coincident with the cell lysis, the increase in cell number also arrested at 8 h (Fig. S1 C, arrow). This discrepancy between absorbance arrest and start of cell lysis was also detected with α(1,3)GS *ags1^+^* repression ([@bib13]). This could be because of additional absorbance of lysed cells, released cytoplasmic material, or changes in cell shape, density, cell wall thickness, or cell wall composition. Most of the lysis occurred at the septum and very little at the poles (Fig. S1 D). In agreement with previous data from *bgs4^+^* point mutants ([@bib48]), the Bgs4-depleted cells showed a considerable decrease in total cell wall β-glucan (56%) and the corresponding compensatory increase in α-glucan ([Table 1](#tbl1){ref-type="table"} and Fig. S1 E).
######
Incorporation of \[^14^C\]glucose into cell wall polysaccharides during Bgs4 depletion
Strain Thiamine[a](#tblfn1){ref-type="table-fn"} Incorporation of \[^14^C\]glucose[b](#tblfn2){ref-type="table-fn"}
--------------- ------------------------------------------- -------------------------------------------------------------------- ------------ ------------ ------------
*h* *%* *%* *%* *%*
Control 0 (on) 25.0 ± 2.3 22.2 ± 1.9 62.7 ± 1.4 15.1 ± 0.7
81X-*bgs4^+^* 6 (off) 23.1 ± 0.7 33.8 ± 4.0 52.4 ± 3.2 13.8 ± 0.8
81X-*bgs4^+^* 8 (off) 24.0 ± 1.2 40.1 ± 5.1 43.2 ± 6.7 15.8 ± 1.7
81X-*bgs4^+^* 10 (off) 29.9 ± 0.2 49.2 ± 1.0 35.6 ± 1.5 15.1 ± 0.5
Early log-phase *bgs4*^+^-repressed cell cultures were grown in MM + 1.2 M sorbitol for 0, 6, 8, and 10 h in the presence of thiamine (*bgs4^+^*-repressed conditions). \[^14^C\]glucose was added 4 h before harvesting.
Percentage of incorporation of \[^14^C\]glucose = cpm incorporated per fraction × 100/total cpm incorporated. Values are the means and SDs calculated from three independent experiments.
Values are percentages of the corresponding polysaccharide in the cell wall.
The Bgs4 amount was analyzed during Bgs4 depletion. Compared with other essential GS, the native expression of Bgs4 is by far the most abundant: 44-fold Bgs1, 9-fold Bgs3, and 6-fold Ags1 (Fig. S1 F). During *bgs4^+^* repression, Bgs4 decreased rapidly to 20% at 8 h, when lysis started, and at 12 h it was just 5% of the native level (Fig. S1 G). Therefore, a fivefold Bgs4 reduction is critical for cell wall and septum formation and cell integrity. Also, GFP-Bgs4 localization during repression decreased quickly; at 8 h it was not detected at the poles and at 10 h it was not detected at the septum (Fig. S1 H).
Bgs4 is required for correct PS completion
------------------------------------------
To know the Bgs4 function in septum formation precisely, the septation defects caused by Bgs4 absence were analyzed. The septation percentage increased after 8 h of *bgs4^+^* repression, when cell lysis started, reaching twice the amount of septa at 12 h. This increase was detected only considering live cells. When lysed cells were included (total cells), the septation index was unaffected ([Fig. 1 A](#fig1){ref-type="fig"}, left). CW specifically stains the PS ([@bib12]). CW staining showed a considerable increase in open septa and concomitant decrease in complete septa, generated during the period of lysis induction ([Fig. 1 A](#fig1){ref-type="fig"}, right).
{#fig1}
To confirm the Bgs4 importance in septum completion, the septa were observed simultaneously by CW staining and GFP-Bgs1 localization. Surprisingly, many CW-stained incomplete septa appeared complete by GFP-Bgs1 ([Fig. 1 B](#fig1){ref-type="fig"}, arrowheads). The imbalance between open and complete CW-stained septa was not observed with GFP-Bgs1; instead, the amounts of open and complete septa were unaltered ([Fig. 1 C](#fig1){ref-type="fig"}, left). This uncoupling of CW-stained open septa occurred in both growing and complete GFP-Bgs1 septa ([Fig. 1 C](#fig1){ref-type="fig"}, right). Thus, Bgs4 absence causes a specific delay in CW-stained PS closure rather than in general cytokinesis completion.
To check if the GFP-Bgs1 advance and closure observed in CW open septa was a process common to all septum components, CW staining and localization of septum membrane Bgs1 and Bgs3 or the CAR components myosin II regulatory chain Rlc1 and F-Bar protein Cdc15 ([@bib39]; [@bib7]; [@bib57]), indicative of the growing edge or complete septa, were analyzed simultaneously during *bgs4^+^* repression ([Fig. 1 D](#fig1){ref-type="fig"} and [Fig. S2](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp2}, A and B). The wild-type (WT) septum showed a coupled progression of CW-stained PS, Bgs1, Bgs3, Rlc1, and Cdc15 ([Fig. 1 D](#fig1){ref-type="fig"} and Fig. S2, brackets). In the absence of Bgs4, the CW-stained PS was coincident with CAR and septum membrane proteins only in the early stages of septum formation. In advanced growing and complete septa, the CW-stained PS delayed and uncoupled from Bgs1, Bgs3, Rlc1, or Cdc15 progression ([Fig. 1 D](#fig1){ref-type="fig"} and Fig. S2, brackets). A similar CW-stained PS delay was observed with CAR Myo2 and Myo3 and septum Ags1, Rho2-5, Cdc42, Rgf1, and Rgf3 (unpublished data). Simultaneous analysis of CW-stained PS, Rlc1, and the PM syntaxin 1 homologue Psy1 ([@bib31]) confirmed that the CAR stays attached to the PM when the CW-stained PS is uncoupled ([Fig. 1 E](#fig1){ref-type="fig"}, brackets). A similar PS defect was observed in the Bgs4-defective *cwg1-1* and *cwg1-2* mutants ([Fig. S5 A](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp3}, see last section of Results). This defect was not permanent; at longer times the CW-stained PS was completed (see [Fig. 4](#fig4){ref-type="fig"} below). This shows that Bgs4 is specifically required in the last stages of PS formation.
Bgs4 β(1,3)glucan is needed for correct and stable CAR positioning in the cell middle
-------------------------------------------------------------------------------------
To investigate other possible Bgs4 functions, the different cytokinesis steps were analyzed after 8 h of *bgs4^+^* repression, when cell lysis started, ensuring the presence of mild Bgs4 absence phenotypes and the absence of compensatory mechanisms, which were induced at longer times (unpublished data). The absence of Bgs4 generated oblique positioned nodes, CAR, and septa in the cell middle ([Fig. 2, A--C](#fig2){ref-type="fig"}, dotted lines). Transmission electron microscopy (TEM) confirmed the formation of oblique septa ([Fig. 2 D](#fig2){ref-type="fig"}, arrows). Oblique CAR and septa (Rlc1, Cdc15, Bgs1, Bgs3, and Ags1) were quantified during Bgs4 depletion ([Fig. 2 E](#fig2){ref-type="fig"}). Maximal amount of oblique CAR (25%) was higher than that of septa (20%), suggesting that some oblique CAR could slide along the PM and correct their position to perpendicular in the cell middle, before septum synthesis initiation and anchorage of the septum to the cell wall. The oblique septa (71 oblique septa; *n* = 6) showed a displacement of the septum base with respect to the perpendicular division plane by 0.28 ± 0.2 µm (0.04 ± 0.01 µm in 42 WT cells; *n* = 2) and of the septum center with respect to the cell middle by 0.23 ± 0.1 µm (0.04 ± 0.01 µm in WT). Therefore, the oblique CAR and septa can be positioned in a 0.56-µm middle region, always located in the cell cortex surrounding the nucleus (Rlc1-GFP Hht1-RFP; unpublished data).
{ref-type="fig"} (F and G) or in YES medium at 25°C and shifted to 37°C for 5--6 h (H) and visualized by time-lapse. Bars: (cells) 5 µm; (septum details) 1 µm.](JCB_201304132_Fig2){#fig2}
To examine the CAR formation and dynamics in the absence of Bgs4 before septum initiation, when CAR position is fixed by the septum anchorage to the cell wall, time-lapses of CAR (Rlc1) and septum (CW staining) formation were performed. Many cells (31%, 11/35) formed a stable oblique CAR and the ensuing oblique septum ([Fig. 2 F](#fig2){ref-type="fig"}, dotted lines; and [Video 1](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp4}). In some cases the nodes also condensed in an oblique fashion ([Fig. 2](#fig2){ref-type="fig"}, F \[right\] and G \[left\]). Interestingly, many oblique CAR (23%, 8/35) slid along the PM to perpendicular position in the cell middle before septation start and some perpendicular CAR also slid along the PM until septum initiation ([Fig. 2 G](#fig2){ref-type="fig"}, arrows and dotted lines; and [Video 2](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp5}). The same defect in oblique CAR and septum positioning was observed in the *cwg1-1* and *cwg1-2* mutants ([Fig. 2 H](#fig2){ref-type="fig"}, [Fig. S3 A](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp6}, [Video 3](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp7}, and Fig. S5 B, see last section of Results). This shows that Bgs4 is required for proper and stable CAR positioning in the cell middle before septum initiation and anchorage to the cell wall. However, Bgs4 appears in the cell middle after septum initiation ([@bib11]), indicating that the CAR defects are not caused directly by Bgs4 absence, but by the lack of cell wall B-BG, owing to the Bgs4 defect in previous cycles.
Bgs4 and its β(1,3)glucan are required for correct straight CAR constriction
----------------------------------------------------------------------------
Absence of Bgs4 led to 20--25% misdirected CAR and septa ([Fig. 3, A--D](#fig3){ref-type="fig"}, arrows). A similar defect of misdirected CAR and septa was observed in *cwg1-1* and *cwg1-2* mutants (Fig. S5 C, see last section of Results), being more abundant in *cwg1-1*; therefore, it was selected for time-lapse study ([Fig. 3 E](#fig3){ref-type="fig"}, Fig. S3 B, and [Video 4](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp8}). The analysis showed that misdirected ingression could appear and be corrected throughout septum progression, indicating that this defect is independent of the septation stage. In addition, some misdirected edges showed the opposite direction, whereas in others both edges pointed in the same wrong direction ([Fig. 3 E](#fig3){ref-type="fig"} and Fig. S3 B, arrows). Detailed CW staining showed wavy PS ([Fig. 3 E](#fig3){ref-type="fig"}, bottom right), indicative of multiple minor changes in septum synthesis direction that could not be detected by CAR and PM ingression analysis. TEM confirmed the formation of misdirected septa ([Fig. 3 F](#fig3){ref-type="fig"}, arrows). These data suggest the formation of a relaxed CAR unable to provide the tensile force needed for a straight growing septum and a weak flexible septum lacking the rigidity needed for a straight septum structure. In addition, some septa showed simultaneous misdirected progression and defective CW-stained PS, suggesting that ingression can progress with defective PS and CAR forces ([Fig. 3 E](#fig3){ref-type="fig"}, Fig. S3 B, and Video 4). However, all misdirected septa were progressively corrected until septum completion, indicating some CAR force.
{ref-type="fig"}. (D) Percentage of misdirected CAR and septa. Error bars indicate SD. (E) The defect in Bgs4 function (shown in the *cwg1-1* mutant) produces similar misdirected CAR contraction and septum progression (arrows). During misdirected ingression, the CAR (Rlc1) stays attached to the PM (Psy1). CW staining shows the details of wavy PS (bottom right, wavy arrow), indicative of relaxed CAR with multiple changes in septum synthesis direction. Cells were grown as in [Fig. 2 H](#fig2){ref-type="fig"} and observed by time-lapse. (F) TEM details of rigid and straight WT septum formation with simultaneous PS and SS synthesis from the start (left). Formation in Bgs4 absence of weak twisted and misdirected (arrows) septa with no SS and defects in the last stages of PS synthesis (right). Cells were grown as in A. (G and H) Bgs4 is essential for coupling PS growth to CAR contraction and PM extension. (G) Magnification of septum formation as in F. (H) Model of advanced CAR and PM ingression uncoupled from delayed PS synthesis. A relaxed CAR devoid of tensile force causes misdirected septa. Arrows, CAR and PM edge; arrowheads, PS edge. AR, annular rudiment; Cw, cell wall. Bars: (cells) 5 µm; (septum details) 1 µm.](JCB_201304132_Fig3){#fig3}
Bgs4 is required for coupling septum growth to CAR contraction and PM extension
-------------------------------------------------------------------------------
Septation in the absence of Bgs4 was analyzed by TEM. In WT it started with the annular rudiment, a tiny PM invagination of PS, followed by a small septum that already had the three-layered structure of PS flanked by a SS. The septum grew perpendicular to the cell wall, forming a straight rigid structure, and simultaneously the PS drilled into the wall flanked by *matériel triangulaire dense* (MTD; triangular dense material; [Fig. 3 F](#fig3){ref-type="fig"}, left). In contrast, Bgs4 absence caused oblique, twisted, and misdirected septa, suggesting weak CAR and PS structures ([Fig. 3 F](#fig3){ref-type="fig"}, right, arrows). The SS was absent and the PS only connected to the wall by a thin PS covered by diffuse *matériel dense* (MD; dense material). Interestingly, as the PS progressed, it formed a very thin PS end structure indicative of defective PS synthesis in the last stages of septum formation ([Fig. 3 F](#fig3){ref-type="fig"}, right).
Detailed TEM analysis of WT septum showed that PS and PM edges always stayed in close contact ([Fig. 3 G](#fig3){ref-type="fig"}, left), indicating that septum growth stays coupled to PM extension and hence to CAR contraction ([Fig. 3 H](#fig3){ref-type="fig"}, left). Surprisingly, in the absence of Bgs4, the thinner PS edge ([Fig. 3 G](#fig3){ref-type="fig"}, right, arrowheads) appeared clearly detached and delayed from the PM edge, which formed a sharp tip extension with no PS material inside ([Fig. 3 G](#fig3){ref-type="fig"}, right, arrows). Similarly, a more advanced septum closure showed a growing PS but complete PM extension ([Fig. 4 F](#fig4){ref-type="fig"}), indicating that septum growth was uncoupled and delayed regarding PM extension and CAR contraction ([Fig. 3 H](#fig3){ref-type="fig"}, right). This shows that Bgs4 and/or its B-BG play a role in coupling septum synthesis to PM and CAR progression.
{ref-type="fig"} and imaged by time-lapse. Arrowhead shows first PS signal detected (t = 2), locating in the previous image (t = 0) the simultaneous start of PS synthesis and coupled CAR contraction. (B) The time of CAR assembly, maturation, and contraction and of PS formation was quantified. (C--G) WT CAR contraction and septation are uniform and coincident. In Bgs4 absence, initial CAR contraction and PS formation are strongly impaired (red bracket), but ensuing CAR contraction proceeds faster than in WT and uncoupled from a slower PS formation. (C) Kymographs of the time-lapses of A. (D) Scheme of CAR and PS progression in the kymographs. White arrows show asymmetric septum synthesis start. Arrowhead shows end of CAR contraction (green) and PS formation (blue). Rectangle marks interval (t = 22--26) of growing PS but complete CAR contraction. (E) The slow CAR contraction is coincident with a defective PS synthesis start (arrows). Cells were grown as in A. (F) Detail of defective growing PS uncoupled from complete PM extension. (G) Rates of CAR contraction and PS synthesis (2--6, 6--12, and 12--18 min). Error bars indicate SD. Bars, 1 µm.](JCB_201304132_Fig4){#fig4}
The uncoupling of CAR contraction from septum synthesis was analyzed by time-lapse. The start of CAR contraction and septum synthesis (t = 0) was located precisely to the time before the first image when a CW-stained PS signal was detected ([Fig. 4 A](#fig4){ref-type="fig"}, blue arrowheads; t = 2). In WT cells, the CAR coincided with the edge of the growing PS throughout the contraction process, indicating that CAR contraction and septum synthesis are coordinated ([Fig. 4 A](#fig4){ref-type="fig"} and [Video 5](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp9}). In the absence of Bgs4, CAR contraction progressed more slowly than in WT, and septum synthesis advanced much more slowly, delayed and uncoupled from CAR contraction ([Fig. 4 A](#fig4){ref-type="fig"}, [Fig. S4 A](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp10}, and [Video 6](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp11}). The analysis of 26 WT and 34 Bgs4-depleted time-lapses showed no significant differences in CAR assembly and maturation. However, Bgs4 absence promoted a 4-min increase (121% of WT) in CAR constriction and an 8.5-min increase (144%) in uncoupled septum synthesis ([Fig. 4 B](#fig4){ref-type="fig"}).
Kymographs showed that Bgs4 and its B-BG are critical for the early steps of CAR contraction and septum formation. WT kymograph showed uniform and coincident CAR contraction and PS formation ([Fig. 4, C and D](#fig4){ref-type="fig"}). The kymographs of Bgs4 absence showed strong defects in initial CAR contraction and PS formation and a clear delay in PS formation during and after CAR contraction ([Fig. 4, C and D](#fig4){ref-type="fig"}; and [Fig. S4](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp12}, B and C). The start of CAR contraction was severely compromised during a 6--8-min period, after which contraction proceeded even faster than in WT. The initial slow CAR contraction was coupled to a defective slow and asymmetric PS synthesis start, as observed by the reduced CW staining on one side ([Fig. 4, C and E](#fig4){ref-type="fig"}; and Fig. S4 B, white arrows). TEM showed that the asymmetry was coincident with bent or twisted starting septa ([Fig. 4 E](#fig4){ref-type="fig"}, black arrows), suggesting that Bgs4 B-BG strengthens the starting septum and that the CAR force is not sufficient to maintain it straight. After this, PS synthesis uncoupled from CAR contraction, starting a delay that increased along septation. The 6-min delay in septum completion (t = 22--28) coincided with TEM observations of growing PS but complete PM extension ([Fig. 4 F](#fig4){ref-type="fig"}).
The analysis of WT CAR contraction and PS synthesis rates showed a coincident and constant rate (95 nm/min) throughout the process ([Fig. 4 G](#fig4){ref-type="fig"}). However, Bgs4 absence caused an initial slow CAR contraction and septation rate, sevenfold slower than in WT (15 nm/min in both cases). Interestingly, after this defect the CAR contraction rate increased to 127% faster than WT (120 nm/min). The PS synthesis rate also increased, but only to 76% of WT (72 nm/min), confirming the defective and delayed PS synthesis ([Fig. 4 G](#fig4){ref-type="fig"}). This suggests that in WT, CAR and PM ingression rates are restricted by the synthesis rate of the attached septum.
Bgs4 β(1,3)glucan confers the rigidity needed for a straight septum
-------------------------------------------------------------------
In the absence of Bgs4, the septa presented important morphological and structural defects. Many septa had a curved shape ([Fig. 5 A](#fig5){ref-type="fig"}) and defects in PS maturation of CW-stained PS retracted from the cell wall ([Fig. 5 B](#fig5){ref-type="fig"}, left, arrowheads and arrows). TEM confirmed the retraction of mature PS, leaving a space filled by new MD ([Fig. 5 B](#fig5){ref-type="fig"}, right, arrows). Similar defects were observed in the *cwg1-1* and *cwg1-2* mutants (Fig. S5 D, see last section of Results).
{ref-type="fig"}. Arrows, cell wall; arrowheads, CW-stained PS base. Error bars indicate SD. (C and D) Bgs4 absence generates flexible curved septa, oscillating according to the changes in internal pressure between sister cells. Cells were grown in MM+S+T for 9 h and visualized by time-lapse. (C) WT rigid straight septum formation and progressive cell separation (top). Flexible curved septa with two oscillating cycles (arrow), ending with cell lysis in one (middle) or both cells (bottom). (D) Kymograph of a flexible curved septum with four waving cycles (arrow). Bars: (cells) 5 µm; (septum details) 1 µm.](JCB_201304132_Fig5){#fig5}
To study the formation mechanism of curved septa, time-lapses of septum formation were performed. WT cells formed a rigid straight septum that, after maturation (11 min), was slowly and symmetrically degraded by its PS to permit sister cell separation ([Fig. 5 C](#fig5){ref-type="fig"}, top; and [Video 7](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp13}). In the absence of Bgs4, maturation of some septa extended for a long period (60 min), during which the septa displayed an oscillating curved shape, probably because of changes in internal pressure between sister cells. The lower pressure cell reacted by increasing its internal pressure, pushing the flexible septum and changing its curvature to the opposite cell ([Fig. 5 C](#fig5){ref-type="fig"}, middle and bottom, arrow; Fig. S4 D, arrow; and [Video 8](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp14}). In some cases the pressure transmitted by the pushing septum caused pole lysis in the opposite cell ([Fig. 5 C](#fig5){ref-type="fig"}, middle; and Fig. S4 D), or the cells equilibrated their internal pressure, returning to a straight septum and causing lysis at the septum region in both cells ([Fig. 5 C](#fig5){ref-type="fig"}, bottom). When no lysis occurred, both cells alternated the septum curvature for at least four waving cycles ([Fig. 5 D](#fig5){ref-type="fig"}, arrows; and [Video 9](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp15}). This shows that Bgs4 B-BG is necessary to confer the rigidity needed for a straight septum to support the changes in internal pressure between sister cells.
Bgs4 is responsible for the SS formation
----------------------------------------
Because of the importance of Bgs4 in septum maturation and structure, complete septa were analyzed in detail by TEM. WT complete septa showed a clear transition to thicker septa in a maturation process of a second round of SS synthesis. In addition, the PS appeared well anchored into the cell wall ([Fig. 6 A](#fig6){ref-type="fig"}, left). However, in the absence of Bgs4 the septa showed a total absence of SS during septum formation (see [Fig. 3 F](#fig3){ref-type="fig"}) and the whole maturation process ([Fig. 6 A](#fig6){ref-type="fig"}, right). Although the SS contains different polysaccharides, this shows that Bgs4 B-BG is responsible for the SS formation. Bgs4 is also required for PS completion (see above for [Figs. 1](#fig1){ref-type="fig"} and [4](#fig4){ref-type="fig"}). As a result, the initial complete septa showed a large middle region of defective very thin PS, which during septum maturation was gradually disappearing by addition of new PS material ([Fig. 6 A](#fig6){ref-type="fig"}, right).
{ref-type="fig"}. (B) Details of PS anchorage or retraction during septum maturation. WT PS starts in the cell wall (Cw) surface. During septum growth and maturation the PS is progressively anchored into the cell wall (top). In Bgs4 absence, the defective PS progressively retracts from the cell wall, leaving a space filled by MD (bottom). Bars: (A) 1 µm; (B) 0.5 µm.](JCB_201304132_Fig6){#fig6}
Detailed TEM study of the PS showed the WT annular rudiments containing a PS formed at the wall surface. During septum growth and maturation, the PS drilled progressively to reach the middle of the cell wall ([Fig. 6 B](#fig6){ref-type="fig"}, top, arrows). However, in the absence of Bgs4 the PS was formed with only a very thin and twisted PS base reaching the wall surface. Then, during septum maturation the PS never drilled into the wall but gradually retracted from it, leaving a spaced filled by amorphous MD ([Fig. 6 B](#fig6){ref-type="fig"}, bottom, arrows). This shows that Bgs4 is not only required for PS completion but also for the integrity of the PS base and its anchorage into the wall.
Bgs4 is essential for cell integrity at the start of cell separation
--------------------------------------------------------------------
The main defect of Bgs4 absence is the lysis and cytoplasm release after septum completion. Lysis occurred in either one or both sister cells, appearing in one single cell earlier than in both cells ([Fig. 7, A \[arrows\] and B](#fig7){ref-type="fig"}). After lysis in one cell, the surviving sister cell initiated a new cell growth cycle, the wall carcass of the dead cell sometimes remaining attached. At later times, the lysis appeared in both cells, probably because of an increase in cell wall weakness ([Fig. 7 A](#fig7){ref-type="fig"}). Cell growth is mainly monopolar and therefore most of the new defective wall is located at one pole. After septum synthesis, lysis occurs only on the side of defective cell wall. In the next cell cycle, the defective wall increases, generating after septation the lysis in both cells ([Fig. 7 C](#fig7){ref-type="fig"}). Similar cell lysis defects were observed in the *cwg1-1* and *cwg1-2* mutants (Fig. S5 E, see last section of Results).
{ref-type="fig"}. (B) Percentage of each cell lysis. Error bars indicate SD. (C) Model of differential cell lysis in one or both sister cells. The extension of asymmetric cell wall weakness caused by asymmetric cell growth (red arrows) and the septum position determine lysis (arrowheads) in one or both cells. (D) Cell lysis and cytoplasm release (arrow) from either one (left) or both (right) cells. Cells were grown as in [Fig. 1 B](#fig1){ref-type="fig"} and imaged by time-lapse. (E and F) TEM details of cell separation. (E) Controlled WT cell wall DR degradation and gradual PS degradation (left). Bgs4 absence causes an excess of cell wall degradation, leaving the PM exposed to the medium (right). (F) Cell lysis and cytoplasm release (arrow) at the start of cell separation, before PS degradation is detected. Cells were grown as in D. F, fuscannel; FS, fission scar. Bars: (cells) 5 µm; (septum details) 1 µm.](JCB_201304132_Fig7){#fig7}
To know the precise timing of cell lysis, the process was analyzed by time-lapse. After septum completion and maturation, an abrupt cell wall and PM rupture released the cytoplasmic material from either one or both cells ([Fig. 7 D, arrow](#fig7){ref-type="fig"}; Fig. S4 E, arrow; and [Video 10](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp16}). No cell separation was detected, indicating that lysis occurred just after septum maturation and before or at the start of cell separation.
To know the structure and/or process that fails, leading to lysis, septum maturation and cell lysis were studied by TEM ([Fig. 7, E and F](#fig7){ref-type="fig"}). In the WT after SS thickening, a new ring structure of dense material spanning from the PS and MTD to the wall surface appeared. We termed this structure dense ring (DR; [Fig. 7 E](#fig7){ref-type="fig"}, left). Cell separation started by controlled DR degradation, followed by gradual PS degradation, leaving a residual MTD called fuscannel ([@bib22]). The turgor pressure led the released SS to adopt the most stable spherical conformation ([Fig. 7 E](#fig7){ref-type="fig"}, left). In the absence of Bgs4, cell separation started with an uncontrolled cell wall degradation, probably because of a thick diffuse DR, leaving the PM exposed to the medium ([Fig. 7 E](#fig7){ref-type="fig"}, right). The exposed PM could not counteract the high internal pressure, causing the PM rupture and release of cytoplasm ([Fig. 7 F](#fig7){ref-type="fig"}, arrows). In no case was PS degradation detected, indicating that lysis occurs during cell wall degradation and before or at the start of PS degradation. These results show that Bgs4 is required for a correct septum--cell wall structure and to protect the cell from an excess of wall degradation at the start of cell separation.
Bgs4 is required to maintain the cell wall thickness and integrity during polarized growth
------------------------------------------------------------------------------------------
The pole lysis generated by Bgs4 absence occurred in both interphase and septated cells ([Fig. 8 A](#fig8){ref-type="fig"}, arrows), indicating a weakness of the pole wall that persists during cytokinesis. Interphase pole lysis was examined by CW staining and GFP-Bgs1 localization, which permitted discrimination of the growing poles. The lysis occurred at the old end (OE) during both monopolar and bipolar growth ([Fig. 8](#fig8){ref-type="fig"}, B \[arrows\] and C). The OE was located as the pole distant from the fission scar ([Fig. 8 B](#fig8){ref-type="fig"}). The OE supports most of the cell elongation, and hence the cell wall defect at this pole is stronger. The OE weakness also results in lysis after septation, probably because of the increase in the turgor pressure of the healthiest cell, transmitting the pressure to the sister cell, which will eventually lyse ([Fig. 8 D](#fig8){ref-type="fig"}, red arrowheads).
{ref-type="fig"}. (C) Percentage lysis at each pole. Error bars indicate SD. (D) Model of lysis at the OE. Cell growth (red arrow) is mainly at the OE. The new defective cell wall cannot stand the internal pressure (arrowhead), resulting in pole lysis. After septum formation, the increase in internal pressure in a cell generates pole lysis of the sister cell. (E and F) Absence of Bgs4 causes a large pole cell wall thinning and lysis at the pole tip. (E) WT cell morphology and cell wall structure. (F) Bgs4 absence generates a thin cell wall (red arrow) in both new end (close to FS) and OE. A thinner tip wall results in cell lysis and cytoplasm release (right, red arrow). Cells were grown as in A. FS, fission scar; NE, new end. Bars: (A and B) 5 µm; (E and F) 1 µm.](JCB_201304132_Fig8){#fig8}
WT cells examined by TEM showed a uniform wall at both poles ([Fig. 8 E](#fig8){ref-type="fig"}). The absence of Bgs4 generated a very thin cell wall at the pole region ([Fig. 8 F](#fig8){ref-type="fig"}, red arrows). The thinness of the tip wall was restricted by its capacity to maintain the cell integrity. As a result, a thinner tip wall could not support the cell internal pressure, resulting in the cell wall and PM rupture and cytoplasm release ([Fig. 8 F](#fig8){ref-type="fig"}, right, red arrows).
The aforementioned cytokinesis and cell integrity defects were examined in the Bgs4-defective *cwg1-1* and *cwg1-2* point mutants. As expected, loss of Bgs4 function led to phenotypes similar to those of Bgs4 absence (Fig. S5, A--E). Because other GS collaborate in SS, PS, and cell wall synthesis, the possible suppression of defects by overproduction of other GS was analyzed in both Bgs4-depleted and -defective strains. In no case did the overproduction of any other GS suppress the phenotypes promoted by the Bgs4 B-BG absence, and it even increased the lethality of *cwg1-1* and *cwg1-2* mutants (Fig. S5 F). This suggests that no other glucan can compensate the defect because of B-BG absence. However, the fact that compensatory mechanisms were able to form remedial SS and stable survivors (unpublished data) suggests that a specific induction and/or repression level of combined GS could compensate the lethal Bgs4 B-BG absence.
Discussion
==========
CAR contraction is a well conserved process in fungi and animal cells ([@bib5]; [@bib27]). How fungal CAR constriction is coordinated with the late cytokinesis steps of septum synthesis and how the synthases cooperate to assemble the septum have just started to be understood ([@bib53]; [@bib13]). Fission yeast contains different essential GS with specific roles in cytokinesis. However, the role of Bgs4 in the cell wall and septum remains unknown ([@bib11]). We have studied the septation process of *S. pombe* in depth and found interesting remedial septation mechanisms for cell survival ([Fig. 9 A](#fig9){ref-type="fig"}). Cell separation is critical and hence the result will differ, depending on the septation mechanism ([Fig. 9 B](#fig9){ref-type="fig"}).
![**Models of the septation process and alternative septations of fission yeast.** (A) WT septation (top). Simultaneous coordinated synthesis (arrow) of PS (perpendicular to cell wall) and SS (parallel to PS) form a three-layered septum. Septum maturation proceeds by PS anchorage into the cell wall (yellow arrow) and a second round of SS synthesis. (middle) Septation in Bgs1 absence. The SS is synthesized parallel to the cell wall. The septum grows by successive parallel SS depositions (orange arrow). The MTD changes to a septum medial position, forming a dotted line of MD in the SS layers ([@bib12]). (bottom) Septation in Bgs4 absence. CAR and septum are oblique positioned in the cell middle. The septum grows as a weak twisted and misdirected PS (wavy arrows) that is delayed and uncoupled from CAR and PM ingression (red arrows). After septum completion, the defective middle region is repaired with new PS (orange arrows) and the PS is retracted from the cell wall. (B) WT cell separation (top). Controlled cell wall DR and PS degradation (arrow) and the osmotic pressure that curves the SS to the stable conformation ensure a safe separation. In Bgs1 absence, there is no cell separation (middle). Cell separation and lysis in Bgs4 absence (bottom). Uncontrolled cell wall DR degradation (arrow) leaves the PM exposed to the medium. Then the turgor pressure generates the PM rupture and cytoplasm release. F, fuscannel; FS, fission scar; Pr, turgor pressure. Bars, 1 µm.](JCB_201304132_Fig9){#fig9}
Bgs4 β(1,3)glucan is necessary for correct CAR positioning in the cell middle and for coupling septum synthesis to PM extension and CAR contraction
---------------------------------------------------------------------------------------------------------------------------------------------------
Our data show for the first time that extracellular B-BG has a role in the CAR function. In the absence of B-BG the CAR is often oblique assembled, sliding in the cell middle until septum synthesis initiation fixes CAR and septum position to the cell wall. We discarded a Bgs4 defect because it is not present during CAR positioning and sliding, appearing after septum initiation ([@bib11]). However, the cell wall B-BG absence generated in previous cycles is a defect present during CAR formation and sliding. CAR sliding has been described in the combined absence of microtubules or anillin-like Mid1 function with the absence of septum synthesis start ([@bib42]; [@bib17]). In these cases the defect was caused in the CAR, whereas in our case the defect is caused by cell wall B-BG absence. Supporting our finding of the important role of cell wall B-BG in CAR function, spherical protoplasts devoid of cell wall show unstable CAR sliding toward the poles ([@bib34]), whereas spherical mutants with cell wall form stable CAR and septa ([@bib9]; [@bib55]; [@bib54]).
Despite our knowledge of cytokinesis, little is known about how extracellular signals communicate with intracellular events. The extracellular cell wall must be connected to the PM and CAR, and here we show that B-BG is crucial for this interaction. As B-BG is external, the CAR must interact with B-BG through PM proteins connecting both sides. Bgs and Ags1 proteins cannot be candidates for such an interaction because all appear in the middle much later than the time of CAR defects. Candidates could be the scaffold protein anillin, G protein--coupled receptors, or ECM proteins, as suggested in animal cells ([@bib3]; [@bib20]; [@bib29]; [@bib30]; [@bib49]; [@bib59]). In fact, proteins and polysaccharides of the animal ECM (functional equivalent of fungal cell wall) have been shown to be critical for cytokinesis ([@bib19]; [@bib35]; [@bib40]; [@bib21]; [@bib24]; [@bib58]). However, how the ECM is coupled to the CAR and how it affects the CAR function remain largely unknown.
Our results show a surprising separation between slower PS synthesis and faster CAR and PM ingression, indicating that the pushing force of PS synthesis is not necessary for CAR and PM progression ([@bib23]). More surprisingly, the contraction rate of uncoupled CAR and PM is faster than normal, suggesting that in normal coupled cytokinesis the synthesis rate of attached PS restricts CAR and PM ingression rates. Moreover, our data show that septation can progress with a defective CAR pulling force. In the absence of B-BG, the initial septa are twisted and bent and larger septa appear misdirected, indicating a relaxed CAR without the tensile pulling force necessary to maintain the growing septum straight. These results suggest that cytokinesis can progress and be completed without or with a defective pushing force of septum synthesis and/or pulling force of CAR contraction, with the help of PM extension by the addition of membrane vesicles. In fact, it has been described that cytokinesis can be completed with defective CAR, but to date this has not been reported with delayed PS deposition ([@bib46]; [@bib4]; [@bib47]).
It has been suggested that septum synthesis provides the primary force for the last cytokinesis steps based on the fact that in LatA-treated cells, septum synthesis can continue and be completed without the CAR ([@bib47]). However, only septa above 50% in length progress and complete septation, and the progression rate decreases to 30%, thus suggesting an important role for the CAR in the overall septum ingression process. In addition, it is possible that in these LatA-treated cells other CAR components more stable than actin could maintain a residual CAR that might help in the final septum progression ([@bib38]; [@bib57]). In Bgs4-depleted cells, the CAR structure is not altered but Bgs4 B-BG and septum are, indicating that when the CAR is intact the septum pushing force is not so critical. However, the misdirected CAR and PM progression suggests that not only the PS pushing force but also the CAR contraction force is defective, unable to maintain a straight septum progression. In these conditions, the PM and CAR ingression rate increased to 127% of WT, suggesting that when detached from the PS, the PM advance proceeds faster, whereas the attached CAR cannot constrict at similar rate, resulting in a larger and relaxed misdirected CAR structure, in agreement with the proposed low contractile force of the CAR ([@bib47]). That the septa are always completed indicates that the CAR constriction force is still able to finally correct the misdirected progression. In the absence of B-BG, the septa present a very sharp PM tip, suggesting that if some material is deposited between PM and PS the septum pushing force would be limited. In addition, the observation of septa with advancing PS but complete PM with no space for deposited material ([Fig. 4 F](#fig4){ref-type="fig"}) suggests that the PM can progress without pushing septum material. Collectively, these results suggest that both CAR and septum synthesis collaborate in a normal septum formation. Septum progression is necessary to complete a septum wall structure, and the CAR is essential for septation start and at least first-half progression and as a safety closing belt mechanism for a straight progression.
Previously, we have found interesting the convergent similarities between the structure and function of fission yeast PS and plant cell plate during cytokinesis ([@bib12], [@bib13]). Our current observations reveal important convergent similarities between fungal and animal cytokinesis, with a fungal cell wall B-BG required for connecting cell wall and CAR during cytokinesis and ECM polysaccharides required for animal cytokinesis ([@bib56]; [@bib35]; [@bib40]; [@bib21]), suggesting that the extracellular cell wall is an evolutionarily highly conserved component of eukaryotic cytokinesis.
Bgs4 is essential for SS formation and PS completion
----------------------------------------------------
We found that Bgs4 B-BG is responsible for SS assembly ([Fig. 9 A](#fig9){ref-type="fig"}). A similar function has been described for Ags1 ([@bib13]), indicating that both B-BG and α-glucan are necessary but not sufficient for SS formation. Analysis of reverting protoplasts suggests that the primary wall formation step is the assembly of β-glucan microfibrils, whereas α-glucan might be involved in glucan bundle formation ([@bib41]; [@bib26]). In fact, α-glucan is required for adhesion ([@bib13]). Also, Bgs4 or Ags1 absence causes the induction of remedial SS and cell survival ([@bib13]; unpublished data). However, remedial SS appear later in the absence of Bgs4, suggesting different compensatory mechanisms. In fact, Rho1 GTPase regulates both α- and β-glucan synthesis, whereas Rho2 mainly regulates α-glucan synthesis ([@bib43]; [@bib45]). Evaluation of the compensatory mechanisms will require further analysis of Ags1 and Bgs subunits.
We show that although the L-BG is responsible for the PS structure, it needs the participation of B-BG. Absence of Bgs4 causes PS thinning in the last stages of PS synthesis, indicating that B-BG is needed to reinforce the growing PS edge. In this sense, Bgs4 absence generates flexible oscillating septa. This flexibility is not caused by the absence of SS because it is not observed in the absence of Ags1 ([@bib13]), indicating that B-BG specifically confers the septum rigidity. Similarly to *Saccharomyces cerevisiae* chitin, *S. pombe* B-BG could provide the septum rigidity by binding to L-BG or α-glucan ([@bib15]). Indeed, it has been suggested that L-BG association with B-BG or α-glucan is critical for PS assembly ([@bib12]).
Bgs4 is essential for cell integrity at the start of cell separation
--------------------------------------------------------------------
*S. pombe* is an excellent model for cell integrity studies because of its critical cell separation process ([@bib50]; [@bib13]). Cell separation starts by controlled cell wall degradation and the DR could be important for this process ([Fig. 9 B](#fig9){ref-type="fig"}). L-BG has been shown to be essential for cell separation ([@bib12]). Thus, the DR could be a structure rich in L-BG, directing the degradation to this structure, whereas B-BG could accumulate around the DR to protect the cell wall. Ags1-depleted cells also display cell lysis during cell separation ([@bib13]). It will be interesting to evaluate whether Bgs4 and Ags1 cooperate in safe cell separation.
Materials and methods
=====================
Strains and culture conditions
------------------------------
The *S. pombe* strains used in this study are listed in [Table S1](http://www.jcb.org/cgi/content/full/jcb.201304132/DC1){#supp17}. *bgs4*Δ*::ura4^+^* p81XH-*bgs4*^+^ strain 498 (*his3*^+^ selection) has been described previously ([@bib11]). This strain contains *bgs4*^+^ expressed under the control of the 81X version (low expression) of the thiamine-repressible *nmt1*^+^ promoter ([@bib37]).
81X-*bgs4*^+^ strain 1288 (Leu^−^, Ura^+^, and His^+^) contains the *bgs4*Δ*::ura4^+^* deletion and a single p81XH-*bgs4*^+^ copy integrated adjacent to the *his3*-Δ*1* locus. This strain was generated from strain *bgs4*Δ*::ura4^+^* p81XH-*bgs4*^+^ by continuous growth in minimal medium (MM) with histidine, colony isolation, and selection of clones that maintain the His^+^ phenotype. Next, the selected clones were analyzed by genetic cross with strain 285 (WT, Leu^−^, Ura^−^, and His^−^) and tetrads analysis. Clones that segregated 2His^+^:2His^−^, indicative of 81XH-*bgs4*^+^ integration, were selected. Finally, these clones were analyzed by genetic cross with strain 420 (WT, Leu^−^, Ura^−^, and His^+^) and tetrad analysis. The clones that showed a 4His^+^:0His^−^ segregation, indicative of a correct 81XH-*bgs4*^+^ integration adjacent to the *his3*-Δ*1* locus, were selected. All the 81X-*bgs4*^+^ clones exhibited a strong lytic phenotype in the presence of thiamine (repressed conditions) and a WT phenotype in its absence (induced conditions). Other 81X-*bgs4*^+^ strains were made from strain 1288 either by tetrad dissection or by random spore analysis by selecting against the corresponding parental auxotrophies. 81X-*GFP-bgs4*^+^ strain 1493 (Leu^−^, Ura^+^, His^+^, and Ade^−^) contains the *bgs4*Δ*::ura4^+^* deletion and a single p81XH-*GFP-bgs4*^+^ copy integrated adjacent to the *his3*-Δ*1* locus. This strain was made following a protocol similar to that described for strain 81X-*bgs4*^+^.
*GFP-bgs1^+^*, *GFP-bgs3^+^*, *GFP-bgs4^+^*, and *ags1^+^-GFP* strains 520, 1217, 561, and 3166, respectively, have already been described ([@bib10], [@bib11], [@bib12], [@bib13]). These strains contain the *bgs1*Δ*::ura4^+^*, *bgs3*Δ*::ura4^+^*, *bgs4*Δ*::ura4^+^*, and *ags1*Δ 3′UTR*~ags1~*~+~::*ags1~3704-7233~:ura4^+^* deletions and an integrated copy of SmaI-cut pJK-*GFP-bgs1^+^*, PacI-cut pJK-*GFP-bgs3^+^*, StuI-cut pJK-*GFP-bgs4^+^*, and AgeI-cut pJK-*ags1~1-6267~-GFP* (*leu1^+^* selection), which direct their integrations at the SmaI site of the *bgs1^+^* promoter sequence (nt −748) adjacent to *bgs1*Δ*::ura4^+^*, the PacI site of the *bgs3^+^* promoter sequence (nt −1857) adjacent to *bgs3*Δ*::ura4^+^*, the StuI site of the *bgs4^+^* promoter sequence (nt −1320) adjacent to *bgs4*Δ*::ura4^+^*, and the AgeI site of the *ags1^+^* coding sequence (nt 6025) in *ags1*Δ 3′UTR*~ags1~*~+~::*ags1~3704-7233~:ura4^+^*, respectively. *2xGFP-bgs1*^+^ strain 1731 was made as described for the *GFP-bgs1^+^* strain ([@bib10]) and contains an integrated copy of SmaI-cut pJK-*2xGFP-bgs1*^+^ (*leu1^+^* selection), which directs its integration at the SmaI site adjacent to *bgs1*Δ*::ura4^+^*, at position −748 of the *bgs1^+^* promoter sequence. Likewise, *2xRFP-bgs1*^+^ strain 1780 contains an integrated copy of SmaI-cut pJK-*2xRFP-bgs1*^+^ (tdTomato variant \[[@bib52]\]) at position −748 of the *bgs1^+^* promoter sequence. *2xRFP-bgs1*^+^ *GFP-bgs3^+^* strain 3332 was made by a genetic cross between strains 1780 (*2xRFP-bgs1*^+^, Leu^+^, Ura^+^, and His^−^) and 1217 (*GFP-bgs3^+^*, Leu^+^, Ura^+^, and His^−^), tetrad dissection, and analysis of RFP-Bgs1 and GFP-Bgs3 localizations.
*2xGFP-bgs1*^+^ 81X-*bgs4*^+^ strain 2300 was made by a genetic cross between strains 1731 (*2xGFP-bgs1*^+^, Leu^+^, Ura^+^, His^−^, and Ade^+^) and 1366 (81X-*bgs4*^+^, Leu^−^, Ura^+^, His^+^, and Ade^−^) and random spore selection of Leu^+^ (*2xGFP-bgs1*^+^), Ura^+^ (*bgs1*Δ*::ura4^+^* and *bgs4*Δ*::ura4^+^*), and His^+^ (81X-*bgs4*^+^) clones, followed by analysis of GFP-Bgs1 localization and lysis promoted by *bgs4^+^* repression in the presence of thiamine. Similarly, other 81X-*bgs4*^+^ strains were made by genetic cross between the corresponding parental strains, random spore selection of Leu^+^ (GFP- or RFP-tagged proteins), Ura^+^ (*bgs4*Δ*::ura4^+^* and other *ura4^+^* deletions), and His^+^ (81X-*bgs4*^+^) clones, and analysis of the corresponding GFP or RFP localization and lysis induced by *bgs4^+^* repression.
Standard complete yeast growth (YES), selective (MM) with the appropriate supplements, and sporulation media ([@bib14]; [@bib1]) have been described. Cell growth was monitored by measuring the A~600~ of early log-phase cell cultures in a Junior II spectrophotometer (A~600~ 0.15 = 1 × 10^7^ cells/ml; Coleman). The determinations were performed in two different clones of the same strain in three independent experiments. For serial dilution drop tests of growth, early log-phase cells growing at 25 or 30°C were adjusted to 10^7^ cells/ml and then serially diluted 1:10. The different dilutions were spotted onto MM, YES, and MM + thiamine plates, incubated for 2--4 d at the indicated temperatures, and photographed. The test was repeated in two independent experiments. General procedures for yeast and bacterial culture and genetic manipulations (genetic crosses, tetrad dissection and analysis, random spore selection and analysis, yeast and bacterial transformations, plasmid manipulations, etc.) were performed as described previously ([@bib36]; [@bib51]).
Plasmids and DNA techniques
---------------------------
p81XH*-bgs4^+^* has been described previously ([@bib11]). This plasmid contains the *bgs4^+^* ORF with XhoI and PstI sites inserted by site-directed mutagenesis just before the start codon and just after the TAG stop codon of *bgs4^+^*, respectively, cloned into XhoI-PstI of pJR2-81XH (*his3^+^* selection and 81X version of the thiamine-repressible *nmt1*^+^ promoter; [@bib37]). The resulting *S. pombe* strain *bgs4*Δ p81XH*-bgs4^+^* displayed a lethal lytic phenotype under repressed conditions (presence of thiamine) and the WT phenotype in induced conditions (absence of thiamine). The *bgs4^+^* shut-off phenotype of strains containing multicopy p81XH-*bgs4^+^* was heterogeneous and the appearance of revertant or attenuated clones was detected. To obtain a strain with a more uniform, more stable, and faster *bgs4^+^* shut-off phenotype, which could be useful to study the Bgs4 absence effect, a *bgs4*Δ strain with an integrated 81X-*bgs4*^+^ single copy was made (see previous section). As expected, lysis and cell growth arrest appeared earlier in the 81X-*bgs4*^+^ strain because of its reduced *bgs4*^+^ expression and still maintained the WT phenotype in induced conditions.
p81XH*-GFP-bgs4^+^* is pJR2-81XH containing the XhoI-PstI *GFP-bgs4^+^* ORF with the *GFP* inserted in-frame at base 970 (amino acid 324), as described previously to obtain a functional GFP-Bgs4 fusion ([@bib11]). Likewise, a *bgs4*Δ strain with an integrated 81X-*GFP-bgs4*^+^ single copy was made (see previous section). The lysis and cell growth arrest of 81X-*GFP-bgs4*^+^ strain was similar to that of 81X*-bgs4*^+^.
Plasmids pJK-*GFP-bgs1^+^*, pJK-*GFP-bgs3^+^*, pJK-*GFP-bgs4^+^*, and pJK-*ags1~1-6267~-GFP* have been described elsewhere ([@bib10], [@bib11], [@bib12], [@bib13]). These plasmids are the integrative plasmid pJK148 (*leu1*^+^ selection) with a 9.6-kb ApaI-SpeI *GFP-bgs1^+^*, 10.4-kb SpeI-SpeI *GFP-bgs3^+^*, 9.6-kb PstI-NheI *GFP-bgs4^+^*, and 9.9-kb EcoRI-NheI *ags1~1-6267~-GFP* fragment, respectively. pJK-*2xGFP-bgs1^+^* contains a 10.3-kb *2xGFP-bgs1^+^* fragment with a 1.5-kb tandem of two *GFP* sequences cloned in-frame and separated by a 12-alanine linker to make a more flexible 2xGFP epitope. pJK-*2xRFP-bgs1^+^* contains a 10.2-kb *2xRFP-bgs1^+^* fragment with the 1.4-kb tandem dimer tdTomato variant of the monomeric mRFP1 protein ([@bib52]; provided by R.Y. Tsien, University of California, San Diego, La Jolla, CA).
Plasmids pAL-*bgs1^+^* and pAL-*bgs4^+^* have been described previously ([@bib10], [@bib11]). These plasmids are the multicopy plasmid pAL-KS+ (*S. cerevisiae LEU2* selection) with a 7.2-kb HindIII--SpeI *bgs1^+^* and an 8.8-kb PstI--NheI *bgs4^+^* fragment, respectively. Similarly, pAL-*bgs3^+^* and pAL-*ags1^+^* contain a 9.7-kb SpeI--SpeI *bgs3^+^* and an 11.2-kb EcoRI--NruI fragment, respectively ([@bib12], [@bib13]). These multicopy plasmids contain the corresponding ORF and its native promoter sequence, and were used for overexpression studies.
Plasmids p41X-*bgs1^+^*, p41X-*bgs3^+^*, p41X-*bgs4^+^*, and p41X-*ags1^+^* are the multicopy thiamine-repressible plasmid pJR-41XL ([@bib37]) with the 5.2-kb *bgs1^+^* ORF, 5.5-kb *bgs3^+^* ORF, 5.9-kb *bgs4^+^* ORF, and 7.2-kb *ags1^+^* ORF sequence, respectively. Induced and repressed expression levels of the 41X plasmid are 10--50-fold higher than those of the 81X version and 5--20-fold lower than those of the 3X version. Higher overexpression of these ORFs with the 3X version is toxic for the cell. Therefore, the 41X plasmid was selected for overexpression studies at both induced and repressed expression levels.
Immunoblot analysis
-------------------
Early log-phase cells (10^9^ cells) expressing the different tagged proteins were harvested (1,500 *g*, 5 min, 4°C), washed twice with cold buffer (1 mM EDTA and 1.2 M sorbitol, 4°C), suspended in 100 µl of lysis buffer (50 mM Tris-HCl, pH 7.5, 1 mM EDTA, 150 mM NaCl, 0.1% Triton X-100 containing 1 mM phenylmethylsulphonylfluoride, and 2 µg/ml aprotinin, leupeptin, and pepstatin), and broken with glass beads (FastPrep FP120, 3 × 15 s, speed of 5.5 \[MP Biomedicals; Thermo Fisher Scientific\]). The total cell extracts were collected by bottom-tube perforation and centrifugation (5,000 *g*, 20 s, 4°C). The cell extracts were resuspended, centrifuged (21,000 *g*, 5 min, 4°C), and homogenized again in the same supernatant. This step improved the disaggregation and immunodetection of membrane proteins from total cell extracts. Finally, samples were diluted with 2× loading buffer (2× is 100 mM Tris-HCl, pH 6.8, 2% SDS, 2% 2-mercaptoethanol, 25 mM EDTA, 20% glycerol, and 0.05% bromophenol blue) and stored at −80°C. The protein concentration of the loading samples was quantified by the Bradford assay (Bio-Rad Laboratories). Samples (80 µg of total protein) were heated at 65°C for 5 min and centrifuged (20,000 *g*, 20 s) to precipitate the insoluble material. Proteins were subjected to 3--8% Tris-Acetate SDS-PAGE (NuPAGE; Invitrogen), blotted onto Immobilon-P membranes (EMD Millipore), and probed with monoclonal JL-8 anti-GFP (1:2,000; Living colors; Takara Bio Inc.) or monoclonal B-5-1-2 anti--α-tubulin (1:10,000; Sigma-Aldrich) antibodies. Immunodetection was performed with anti--mouse horseradish-conjugated antibody (1:10,000) and the ECL detection kit (GE Healthcare). Protein amounts were quantified by chemiluminescence with a ChemiDoc XRS System (Bio-Rad Laboratories) and Quantity One software (Bio-Rad Laboratories). Total cell extracts and Western blots were repeated from three to five times for each experiment. The data from the Western blots were quantified and the mean values of the relative amount of each protein were calculated from three to five independent total cell extracts.
Labeling and fractionation of cell wall polysaccharides
-------------------------------------------------------
\[^14^C\]Glucose labeling and fractionation of cell wall polysaccharides were performed essentially as described previously ([@bib13]). Early log-phase cells incubated in MM + 1.2 M sorbitol were diluted with the same medium (with 20 µg/ml thiamine for cells repressing *bgs4*^+^) and supplemented with D-\[U-^14^C\]glucose (6 µCi/ml; Hartmann Analytic) 4 h before harvesting. The cells (early log-phase) were collected at the indicated times. Total glucose incorporation was monitored by measuring radioactivity in trichloroacetic acid--insoluble material. Cells were harvested, supplemented with unlabeled cells as the carrier, washed twice with 1 mM EDTA, and broken with glass beads (FastPrep FP120, 3 × 20 s and speed of 6.0). Cell walls were purified by repeated washing and differential centrifugation (once with 1 mM EDTA, twice with 5 M NaCl, and twice with 1 mM EDTA) at 1,500 *g* for 5 min. Purified cell walls were heated at 96°C for 20 min and \[^14^C\]glucose incorporation into the cell wall was monitored.
Cell wall samples were extracted with 6% NaOH for 60 min at 80°C and neutralized with acetic acid. Precipitation of the galactomannan fraction from the neutralized supernatant was performed with Fehling´s reagent by adding 5 mg of unlabeled yeast mannan as the carrier (stock of 50 mg/ml in water \[Sigma-Aldrich\], as described previously ([@bib2]). Fehling´s reagent was freshly prepared for each experiment by adding one volume of reagent B (3.5% CuSO~4~) to one volume of reagent A (17.3% potassium sodium tartrate dissolved in 12.5% KOH). In brief, four volumes of Fehling´s reagent were added to the samples, mixed, and left overnight at 4°C to precipitate the galactomannan. After centrifugation at 1,500 *g* for 10 min, the pellets were washed with Fehling´s reagent and solubilized in 20--40 µl of 6N HCl. Then, 100 µl of 50 mM Tris-HCl, pH 7.5, was added and the radioactivity of the solutions was measured in a scintillation counter (Beckman Coulter) and considered the galactomannan fraction.
Other samples of cell wall suspension were incubated with Zymolyase 100T (25 µg of enzyme and 1/20 volume of cell wall suspension; AMS Biotechnology) in 50 mM citrate-phosphate buffer, pH 5.6, for 24 h at 37°C. Samples without enzyme were included as a control. After incubation, samples were centrifuged and washed with the same buffer. One ml of 10% trichloroacetic acid was added to the pellets, filtered in Whatman GF/C glass fiber filters (2 × 2 ml of 10% trichloroacetic acid and 2 ml of ethanol), and their radioactivity levels were measured in a scintillation counter. The Zymolyase 100T pellets were considered the α-glucan fraction, and the supernatants were the β-glucan-plus-galactomannan fraction. β-Glucan was calculated as radioactivity remaining after subtraction of galactomannan and α-glucan from total cell wall incorporation. All determinations were performed in duplicate, and data for each strain were calculated from three independent cultures.
Microscopy techniques
---------------------
For cell wall staining, early log-phase cells grown in MM + 1.2 M sorbitol (MM+S; with 20 µg/ml thiamine for cells repressing *bgs4*^+^) at 30°C or in YES at 25°C and shifted to 37°C for 5--7 h (thermosensitive mutant cells) were concentrated (1,000 *g*, 1 min) and visualized directly by adding a solution of CW (50 µg/ml final concentration \[Blankophor; Blankophor GmbH & Co.\]; Fluorescent Brightener 28 \[Sigma-Aldrich\]) to the sample and using the appropriate filter. GFP and RFP were directly visualized from early log-phase cells by using the appropriate filters. Images were obtained with a fluorescence microscope (DM RXA; Leica), a PL APO 63×/1.32 oil PH3 objective, a digital camera (DFC350FX; Leica), and CW4000 cytoFISH software (Leica). Images were processed with Photoshop CS2 software (Adobe). All the analyses were repeated in three to four independent experiments and representative images of the analyzed phenotype were indistinctly selected from the experiments. Graphical data were calculated from four independent experiments. The number of experiments and of total CAR, septa, or cells analyzed is shown in each case.
For time-lapse imaging, 0.3--0.6 ml of log-phase cells grown in MM+S (with 20 µg/ml thiamine for cells repressing *bgs4*^+^) at 30°C or in YES at 25°C and shifted to 37°C for 5--6 h were collected by low-speed centrifugation (1,000 *g*, 1 min), resuspended in 300 µl of the same media containing CW (5 µg/ml final concentration), and placed in a well from a μ-Slide 8 well (80821-Uncoated; Ibidi) previously coated with 10 µl of 1 mg/ml soybean lectin (L1395; Sigma-Aldrich). Time-lapse experiments were made at 30°C (MM+S) or 37°C (YES) by acquiring epifluorescence and/or phase-contrast cell images in single planes and 1 × 1 binning on an inverted microscope (IX71; Olympus) equipped with a PlanApo 100×/1.40 IX70 objective and a Personal DeltaVision system (Applied Precision). Images were captured using CoolSnap HQ2 monochrome camera (Photometrics) and SoftWoRx 5.5.0 imaging software (Applied Precision). In some cases, time-lapse images were restored and corrected by 3D Deconvolution (conservative ratio; 10 iterations and medium noise filtering) through SoftWoRx imaging software. Subsequently, images were processed (color, brightness, contrast, and/or sharpness) with ImageJ (National Institutes of Health) and Photoshop CS2 software. All the time-lapses were repeated in two to three independent experiments. The data were calculated from two to three independent experiments. The number of experiments and of total cells analyzed is shown in each case.
TEM
---
Early log-phase cells were fixed with 2% glutaraldehyde EM (GA; Electron Microscopy Science) in 50 mM phosphate buffer, pH 7.2, and 150 mM NaCl (PBS) for 2 h at 4°C, post-fixed with 2% potassium permanganate for 1 h at room temperature, dehydrated in acetone, and embedded in epoxy resin. Ultrathin sections were examined with a Jam-1010 electron microscope (Jeol).
Online supplemental material
----------------------------
Fig. S1 shows that absence of Bgs4 promotes cell lysis and cytoplasm release during both cytokinesis and polarized growth. Fig. S2 shows that Bgs4 is required for CW-stained PS completion but not for CAR contraction and septum PM closure. Fig. S3 shows that Bgs4 and its β(1,3)glucan are required for correct and stable CAR positioning in the cell middle and for correct straight CAR constriction and septum ingression. Fig. S4 shows that Bgs4 is essential for coupling septum formation to CAR contraction, to confer the septum rigidity, and to protect the cell integrity at the start of cell separation. Fig. S5 shows that the Bgs4-defective *cwg1-1* and *cwg1-2* mutants show defects as those in the absence of Bgs4. The defects cannot be compensated by any other GS. Video 1 shows the formation of an oblique CAR and septum of two dividing Bgs4-depleted cells. Video 2 shows the formation of an altered CAR but normal septum of two dividing Bgs4-depleted cells. Video 3 shows the formation of an oblique CAR and septum of four cells expressing the *cwg1-2* mutation of *bgs4^+^*. Video 4 shows the formation of a misdirected CAR and septum of five cells expressing the *cwg1-1* mutation of *bgs4^+^*. Video 5 shows the coordinated CAR contraction and septum formation of a WT cell. Video 6 shows the uncoupling between CAR contraction and the slower septum formation of three Bgs4-depleted cells. Video 7 shows the formation of a rigid and straight septum and the progressive cell separation of two WT cells. Videos 8 and 9 show the formation of a flexible and oscillating curved septum with two and four waving cycles, respectively, of four Bgs4-depleted cells. Video 10 shows the cell lysis and release of cytoplasm from either one or both sister cells at the start of cell separation of three dividing Bgs4-depleted cells. Table S1 lists the fission yeast strains used in this study. Online supplemental material is available at <http://www.jcb.org/cgi/content/full/jcb.201304132/DC1>.
Supplementary Material
======================
###### Supplemental Material
This paper is dedicated to Angel Durán, who taught us much about yeast, on the occasion of his retirement and his contributions in the field of yeast cell wall morphogenesis. We thank E. Cabib for comments on the manuscript; C. Sacristán for technical help with the drop tests; R. Tsien for RFP-containing plasmids; and P. Munz, T. Pollard, V. Simanis, M. Balasubramanian, Y. Sánchez, C. Shimoda, and R. Martín-García for strains.
We thank the Ramón Areces Foundation for Instituto de Biología Funcional y Genómica financial support. J. Muñoz, M. Ramos, and J.A. Clemente-Ramos acknowledge support by fellowships from Junta de Castilla y León, Consejo Superior de Investigaciones Científicas, and Ministerio de Ciencia e Innovación (MICINN; Spain), respectively; J.C.G. Cortés by a "Juan de la Cierva" contract from MICINN; and I.M. Martins by a fellowship from Fundação para a Ciência e a Tecnologia (Portugal). This work was supported by grants BIO2009-10597, BFU2010-15641, and BIO2012-35372 (MICINN), CSI376A12-2 (Junta de Castilla y León), and OTKA 101323 (Hungarian Scientific Research Fund).
Abbreviations used in this paper:B-BGbranched β(1,3)glucanCARcontractile actomyosin ringCWCalcofluor whiteDRdense ringGSglucan synthaseL-BGlinear β(1,3)glucanMDmatériel denseMMminimal mediumMTDmatériel triangulaire denseOEold endPMplasma membranePSprimary septumSSsecondary septumTEMTransmission electron microscopyWTwild type
|
490 So.2d 1061 (1986)
Willie B. RHODES, Jr., Appellant,
v.
Lawson L. LAMAR, Etc., Appellee.
No. 85-1294.
District Court of Appeal of Florida, Fifth District.
July 3, 1986.
Darrell F. Carpenter, of Wells, Gattis, Hallowes and Carpenter, P.A., Orlando, for appellant.
G. Yates Rumbley, of Pitts, Eubanks, Hannah, Hilyard and Marsee, P.A., Orlando, for appellee.
ORFINGER, Judge.
Appellant appeals from a summary judgment in favor of Orange County and Lawson Lamar, as Sheriff of Orange County. The appellant was injured when the automobile he was operating was struck by a motor vehicle operated by John Robert Grosse, who at the time was being pursued by a marked patrol unit of the Orange County Sheriff's department after he apparently deliberately attempted to hit a deputy with his car. Except for pursuit conducted with blue lights and siren on, the sheriff's vehicle was not otherwise involved in the collision and was a considerable distance from the crash site when the collision occurred. The trial court granted summary judgment in favor of defendants on the theory of sovereign immunity. We affirm.
The appellant concedes the record does not disclose any negligent operation by the deputies of their patrol car, but *1062 asserts that they were negligent in continuing the high speed chase through a heavily traveled area. Appellant does not question the right of the deputies to apprehend Grosse; only that they were negligent in attempting to apprehend him through high speed pursuit on busy streets. The supreme court considered and rejected a similar argument in City of Miami v. Horne, 198 So.2d 10 (Fla. 1967), holding:
The rule governing the conduct of police in pursuit of an escaping offender is that he must operate his car with due care and, in doing so, he is not responsible for the acts of the offender. Although pursuit may contribute to the reckless driving of the pursued, the officer is not obligated to allow him to escape. [Footnote omitted].
Id. at 13. We see no reason for a different holding here.
Appellant argues that section 768.28, Florida Statutes (1985), the waiver of sovereign immunity act, makes Horne inapplicable to the facts of this case, but we do not agree. The decision to institute pursuit of a lawbreaker is a discretionary, planning level decision for which the Sheriff enjoyed sovereign immunity. This has been made clear by the recent decisions of the supreme court. In Trianon Park Condominium Ass'n, Inc. v. City of Hialeah, 468 So.2d 912 (Fla. 1985), the court held:
How a governmental entity, through its officials and employees, exercises its discretionary power to enforce compliance with the laws duly enacted by a governmental body is a matter of governance, for which there never has been a common law duty of care. This discretionary power to enforce compliance with the law, as well as the authority to protect the public safety, is most notably reflected in the discretionary power given to judges, prosecutors, arresting officers, and other law enforcement officials ...
* * * * * *
The lack of a common law duty for exercising a discretionary police power function must, however, be distinguished from existing common law duties of care applicable to the same officials or employees in the operation of motor vehicles or the handling of firearms during the course of their employment to enforce compliance with the law. In these latter circumstances there always has been a common law duty of care and the waiver of sovereign immunity now allows actions against all governmental entities for violations of those duties of care. [Citation omitted].
Id. at 919, 920. See also Everton v. Willard, 468 So.2d 936, 938 (Fla. 1985) ["There has never been a common law duty of care owed to an individual with respect to the discretionary judgmental power granted a police officer to make an arrest and to enforce the law."].
There is no allegation nor showing here that the injury to appellant was proximately caused or contributed to by the negligent acts of the deputies in the operation of their motor vehicles. Appellant's cause of action rests solely and completely on the fact of pursuit, which is a discretionary, judgmental decision by the officer protected by the doctrine of sovereign immunity.
AFFIRMED.
COBB, C.J., and DAUKSCH, J., concur.
|
Of the approximately 10 million people in the US living with paralysis, 15,000 are the result of spinal cord injury each year. The first year of car can range from $322,000-$986,000, with lifetime costs of $1.4-4M for someone injured at 25 years of age. In addition to potentially devastating sensorimotor disturbances, there is a huge financial cost, estimated to be $13.55B in medical care, therapy, and lost productivity nationwide. Until very recently, the recovery from spinal cord injury (SCI) was bleak, with little hope of restoring motor function. To address this we have demonstrated that the physiological state of the spinal circuitry of rats and cats can be modulated with epidural stimulation to generate voluntary limb motor function over a range of speeds, loads, and directions, a finding we have extended to humans. Three years post-injury, a motor complete spinal cord injured human subject was implanted with an epidural electrode array over the lumbosacral spinal cord. In less than one month after implantation, the subject could stand independently, and after 7 months of daily epidural stimulation and motor training, voluntary control of both legs was evident in the presence of epidural stimulation, whereas complete paralysis remained in absence of epidural stimulation. We will advance these discoveries with the use of non-invasive stimulation of the cervical cord to improve arm and hand function following SCI. Central to this proposal is our discovery of a painless electrical single-channel (stimulation of one part of the spinal cord) and dual-channel (stimulation of two different parts of the cord) paradigm that can be applied to the surface of the skin, termed transcutaneous electrical stimulation (TES), bypassing the need for a surgically-implanted electrode array. In the first phase of this proposal we will demonstrate proof-of-principle that stimulation of the cervical spinal cord can improve motor function by: 1) Testing responses to transcutaneous electrical stimulation in subjects with spinal cord injury; and 2) defining the operational parameters of electrical stimulation that that are most effective using a machine-learning protocol, and 3) produce a dual-channel commercial prototype. This commercial product will undergo testing similar to the proof- of-principle device. This device will then be tested in subjects with cervical spinal cord injury and evaluated with a machine-learning protocol. This Phase I proposal will deliver a device that can painlessly and non-invasively aid in the recovery of SCI by delivering a specific electrical stimulation paradigm to the cervical cord that improves use of the arms and hands. |
Will NFL Add a Second Overseas Game in 2012?
The NFL will schedule a second regular season game outside North America in 2012, Daniel Kaplan of SportsBusiness Journal reported Tuesday.
According to Kaplan, the NFL, which already schedules one game per year in London, will add a second overseas game in 2012. Kaplan indicated his source was NFL Commissioner Roger Goodell, noting on Twitter, “…Roger Goodell told me after the NY SB press conference he expects there to be 2 overseas regular season games next year.”
Kaplan followed with a later Tweet that hinted London would get the additional game, rather than another site being selected. He wrote, “My understanding is league would double down on London, focusing efforts there.”
Chicago is set to play Tampa Bay at Wembley Stadium in London on Oct. 23. The annual London game began in 2007 when Miami played the New York Giants. |
# frozen_string_literal: true
require 'spec_helper'
feature 'Promotion with user rule', js: true do
stub_authorization!
given(:promotion) { create :promotion }
background do
visit spree.edit_admin_promotion_path(promotion)
end
context "multiple users" do
let!(:user) { create(:user, email: 'foo@example.com') }
let!(:other_user) { create(:user, email: 'bar@example.com') }
scenario "searching a user" do
select "User", from: "Discount Rules"
within("#rules_container") { click_button "Add" }
select2_search "foo", from: "Choose users", select: false
expect(page).to have_content('foo@example.com')
expect(page).not_to have_content('bar@example.com')
end
end
context "with an attempted XSS" do
let(:xss_string) { %(<script>throw("XSS")</script>) }
given!(:user) { create(:user, email: xss_string) }
scenario "adding an option value rule" do
select "User", from: "Discount Rules"
within("#rules_container") { click_button "Add" }
select2_search "<script>", from: "Choose users"
expect(page).to have_content(xss_string)
end
end
end
|
Wednesday, 4 September 2013
love on a sunny day
My brother Colm married his gorgeous wife Dinali back in June, so here finally are a few more pictures from the day, which was the first of two weddings. The second will be next August and in SRI LANKA!!!! Could I BE any more excited?
This wedding was a civil ceremony in Portrush town hall on the North Coast of Ireland and then we went to the famous Barry's Amusements, followed by the beach and the Giant's Causeway (a UNESCO World Heritage site) for some photos.
Di wore a delicate blue scarf round her wrist, the same one that us all O'Hara women have worn as our something old, borrowed and blue on our wedding days. |
Dragon Quest Walk has been downloaded more than five million times since its launch on September 12, Square Enix announced.
The location services-based RPG launched for iOS via the App Store and Android via Google Play on September 12 in Japan. It is free-to-play with item-based micro-transactions.
Read more about the game here. |
1. Introduction {#sec1-animals-08-00065}
===============
Owned dog (*Canis familiaris*) populations in remote Aboriginal communities (RACs) in Australia have been estimated at 50--62 dogs per 100 people, much greater than the overall Australian average of 16 dogs per 100 people \[[@B1-animals-08-00065]\]. Furthermore, dogs in RACs are generally free-roaming (FRD). Consequently, dogs in RACs have received increasing attention in the scientific literature. By comparison, the estimated population of domestic cats (*Felis catus*) in RACs is 7--9 cats per 100 people, which is lower than the overall Australian average of 11 cats per 100 people, and there has been little research published on this issue. However, as cats are becoming more popular pets in RACs, research is needed to determine their potential environmental impacts and inform animal management practices.
The risk of zoonotic transmission increases when dogs and cats are kept at high population densities in association with humans \[[@B2-animals-08-00065]\], such as in RACs. Sarcoptic mange (*Sarcoptes scabiei*), hookworm (*Ancylostoma caninum*), fleas, ticks (*Rhipicephalus sanguineus*), and giardia (*Giardia duodenalis*) have all been documented in dogs in RACs \[[@B3-animals-08-00065],[@B4-animals-08-00065],[@B5-animals-08-00065],[@B6-animals-08-00065]\]. Limited research conducted on cats in Aboriginal communities has identified tapeworm (*Spirometra erinacei*), *Oncicola* spp., hookworm (*Ancylostoma caninum*), and *Toxoplasma gondii* in cats in Northern Australia \[[@B4-animals-08-00065]\]. In communities with a high prevalence of giardia in dogs, and hookworm and toxoplasma in cats, these parasites were also found in the children and adults living there. This is of concern for public health, particularly for children under 5 years of age \[[@B3-animals-08-00065]\]. Domestic animals can also impact native wildlife. Globally, FRDs threaten wildlife conservation through predation \[[@B7-animals-08-00065],[@B8-animals-08-00065],[@B9-animals-08-00065]\], disturbance \[[@B10-animals-08-00065],[@B11-animals-08-00065],[@B12-animals-08-00065]\], competition \[[@B13-animals-08-00065],[@B14-animals-08-00065]\], and disease transmission \[[@B3-animals-08-00065],[@B4-animals-08-00065],[@B6-animals-08-00065],[@B15-animals-08-00065],[@B16-animals-08-00065]\]. Cats primarily impact wildlife through direct predation, but also competition and disease transmission \[[@B17-animals-08-00065]\]. The mainland small and medium mammal decline in Australia is suggested to be largely due to environmental change associated with the loss of Aboriginal fire management practices, or an interaction between that and exotic predators (i.e., red fox, (*Vulpes vulpes*) and cats) \[[@B18-animals-08-00065]\]. Many native island species have reduced defences against mammalian predators; feral cats on islands alone are responsible for at least 14% of global animal extinctions and the main threat to almost 8% of critically endangered birds, mammals, and reptiles \[[@B19-animals-08-00065]\]. Recent studies on the Tiwi Islands have shown a decline in the populations of the threatened brush-tailed rabbit rat (*Conilurus penicillatus*), and revealed that they are restricted to areas where feral cat detection is low and shrub density is high \[[@B20-animals-08-00065]\].
Dogs are also known to have made contributions, whether known or potential, to the extinctions of 11 vertebrate species and the threatened status of 188 others: 96 mammals, 78 birds, 22 reptiles, and 3 amphibians \[[@B21-animals-08-00065]\]. Dogs can also severely impact small populations, for example, they are known to have killed 500 out of 900 North Island Brown Kiwis (*Apteryx mantelli*) from their biggest population \[[@B8-animals-08-00065]\], have been the main agent of local extinction of the Conga huita (*Capromys pilorides*) in Cuba \[[@B9-animals-08-00065]\], and caused a decrease in the population of Marine Iguanas (*Amblyrhynchus cristatus*) on several Galapagos Islands \[[@B7-animals-08-00065]\]. Studies focusing on Australia's decline in mammal fauna tend not to include dogs (domestic dogs owned or wild (*Canis familiaris*), dingoes (*C. dingo*), and their hybrids), as the studies rely on pre-European data for comparisons, however, dingoes are not post-European introductions. Therefore, comparisons must be made post-intervention. The Tiwi Islands are one of only two of the 85 Australian Bioregions with all original mammal species judged to persist in \>50% of its former range within the bioregion \[[@B17-animals-08-00065]\], and with the known and potential impacts on wildlife by cats and dogs, an intervention is crucial.
Dog health programs that include sterilization and parasite control have been introduced to many RACs in an attempt to mitigate poor dog health and overpopulation \[[@B5-animals-08-00065],[@B22-animals-08-00065]\], and are also likely to reduce the risks associated with disease spread and impacts on wildlife. With cats becoming popular pets, cats should be included in future animal health programs. It is anticipated that a reduction in the dog and cat populations will limit the impacts they have on native wildlife. This study focused on an island RAC where FRDs are well established and where a dog health program providing sterilization and parasite control has been in place for several years \[[@B22-animals-08-00065]\]. The recent emergence of pet cats in the community raised concerns about their potential impact on the local wildlife and current animal management practices. In response to these concerns, the present study was undertaken to provide baseline population demographics on community-owned dogs and cats and to investigate their respective roaming behaviours. Multiple methods were tested to investigate dog and cat interactions in RACs and their potential relationships with wildlife.
2. Materials and Methods {#sec2-animals-08-00065}
========================
2.1. Study Site {#sec2dot1-animals-08-00065}
---------------
The Tiwi Islands are approximately 60 km north of Darwin and are comprised of 11 islands. The larger two islands, Melville and Bathurst, are the only inhabited islands of the 11 and are 5788 km^2^ and 1693 km^2^ in size, respectively (any further mention of the Tiwi Islands in this paper is in reference to only these two main islands). Open eucalyptus forest (mainly *Eucalyptus miniata*, *E. tetrodonta*, and *Corymbia nesophilia*) covers 76% of the Tiwi Islands. The remaining is made up of mangroves, swamps, open shrub lands, monsoon rainforest, and cleared land where the settlements are located \[[@B23-animals-08-00065]\]. Wurrumiyanga, the capital and largest community on the Tiwi Islands, is located in the southeast corner of Bathurst Island (11°45′42.99″ S, 130°37′54.48″ E) and is where this study took place. There are two main seasons: the dry season from May to October and the wet season from November to April \[[@B23-animals-08-00065]\]. Mean minimum and maximum temperatures range from 18.3 to 30.1 °C in July and from 25.0 to 33.2 °C in November \[[@B24-animals-08-00065]\]. According to the 2016 census \[[@B25-animals-08-00065]\], the Wurrumiyanga community is home to 1563 people, with 1411 (90.2%) being Aboriginal \[[@B25-animals-08-00065]\].
2.2. Dog and Cat Census {#sec2dot2-animals-08-00065}
-----------------------
In February 2017, at least one member of the research team and one Tiwi Land Council (TLC) Ranger undertook a door-to-door census. Each household, where someone was home, was asked if they had any pets; if yes, quantity, species, gender, and reproductive status for each pet was recorded. Local knowledge and observations were used to target households that owned cats and data was collected from all these houses. The cat population data were updated at three subsequent time points (April, June, and August 2017). This was completed by the same teams and data were collected from all known cat-owning households.
2.3. Roaming Behaviours {#sec2dot3-animals-08-00065}
-----------------------
### 2.3.1. Direct Observation---Transect Drives {#sec2dot3dot1-animals-08-00065}
Cat roaming behaviour was monitored directly by driving along a predetermined transect ([Figure 1](#animals-08-00065-f001){ref-type="fig"}) through the community every 4 h (6 p.m., 10 p.m., 2 a.m., 6 a.m., 10 a.m., 2 p.m.) over 3 days (18--21 April 2017). The transect was 8.24 km in length and covered 75.5% of the community's roads. Hand-held LED torches were used during the 10 p.m. and 2 a.m. drives in addition to the vehicle's headlights to aid visibility. Start and finish times were recorded for each drive and a tally sheet was used to record the number of cats observed roaming and nonroaming. A cat was identified as 'roaming' if it was observed outside the perimeter of the yard surrounding a house, and 'nonroaming' if it was inside a house yard. A second study was conducted over 3 days in June (5--8 June) along the same transect and at the same time points.
### 2.3.2. Indirect Observation---Remote-Sensing Cameras {#sec2dot3dot2-animals-08-00065}
In conjunction with the second observation period in June, 29 heat-in-motion camera traps (Scoutguard SG550, Boly Media Communications, China) were installed along four tracks ([Figure 1](#animals-08-00065-f001){ref-type="fig"}) running in different directions from the community. Single cameras were systematically placed on the right side of the track, when heading out of town, every 200 m starting from the 200 m point ([Figure 1](#animals-08-00065-f001){ref-type="fig"}). Cameras were placed \~1 m from the road's edge, on trees, if possible; if no suitable trees were available, star-pickets were placed in the ground. Cameras were vertically positioned 90 cm above track height, with an angle of incidence of 22° to the track and \~5--6 m from the centre of the road. The cameras were set as follows: Passive Infrared (PIR) sensitivity: high, photo captures per trigger: 3, interval between triggers: 0 s and image size: 5 megapixels. Cameras were deployed for seven consecutive nights from 5 June 2017. The dirt tracks were all accessible by foot and vehicle and surrounded by open eucalypt forest. Minimum temperatures ranged from 16.7--21.7 °C and maximum temperatures ranged from 28.3--32.0 °C with no rainfall over the study period \[[@B26-animals-08-00065]\]. All dogs and cats were able to be individually identified and all events were used. If wildlife were able to be individually identified, all events were also used. However, for wildlife that could not be easily identified (smaller mammals and birds, particularly those not close to the camera), the presence of animals at a camera trap within 30 min of one another were conservatively considered to be nonindependent and part of the same event. The number of events were then standardized across cameras as number of events per night.
### 2.3.3. Tracking---GPS Loggers {#sec2dot3dot3-animals-08-00065}
The movements of 15 cats and six dogs were tracked with a Mobile Action (New Taipei City, Taiwan) i-gotU low-cost GPS logger device \[[@B27-animals-08-00065],[@B28-animals-08-00065]\] during the second study in June (5--11). Devices were preset to a tracking interval of 15 min (900 s waypoint logging interval and 120 h best battery power). These low-cost GPS loggers do not provide information on the number of satellites or dilution of position (DOP). We therefore filtered the downloaded location records for unrealistic large distances in conjunction with turning angles close to 180° as well as implausible locations (i.e., ocean records). Morris and Conner \[[@B27-animals-08-00065]\] report that for stationary loggers situated outside with different levels of cover, these loggers are sufficient for studies requiring accuracies of approximately 10 m. Cats and dogs were recruited opportunistically by asking community members during the house-to-house census if they would be willing to participate in the study. Animals were selected that were owned and unrestrained (i.e., free to roam) and participated with the permission of their owners. Each of the cats were fitted with an off-the-shelf small dog harness ([Figure 2](#animals-08-00065-f002){ref-type="fig"}a) and the dogs with an off-the-shelf dog collar with reflective strip ([Figure 2](#animals-08-00065-f002){ref-type="fig"}b). Once the harness/collar was fitted, the device was turned on and attached to the collar/harness with electrical tape. A cover (lid of a Hammond Manufacturing~®~ Handheld Enclosure, made of GP ABS material and 50 × 35 × 2 mm in size) was used on top of the device to prevent it from being switched off or damaged. The devices were retrieved at the end of the observation period and data were downloaded.
2.4. Data and Statistical Analyses {#sec2dot4-animals-08-00065}
----------------------------------
A one-way ANOVA was used to analyse the effect of roaming during the direct observations (transect drives). Both studies were pooled and a Rayleigh test was used to determine whether the time of the day influenced the roaming behaviour of cats and dogs. A Rayleigh test is a test for randomness in circular data such as time of day \[[@B29-animals-08-00065]\]. If data distribution is deemed nonrandom, a mean vector is calculated. The direction of the vector indicates the mean time of activity (roaming or nonroaming), while the length of this vector "r" is a measure of dispersion ranging from random (0) to highly clustered (1), as used by Körtner et al. \[[@B30-animals-08-00065]\].
During the indirect observations (remote sensing cameras), one camera (\#38, North track, 200 m) was destroyed by a vehicle and another (\#9, Enrail track, 800 m) was moved off the track resulting in lost data at these locations. Camera distances were therefore recorded as distances from the nearest household rather than distance from town along the track. Observation counts verses distance to the nearest house were analysed using a general linear model with a quasi-Poisson error distribution to account for the overdispersion in our dataset \[[@B31-animals-08-00065]\]. Again, Rayleigh tests were employed to determine the influence of time of day on camera captures.
GPS data were analysed using the methods of Sparkes et al. \[[@B28-animals-08-00065]\]. After removing unreliable data points (see above), activity ranges (AR) were calculated for each animal as a Minimum Convex Polygon (MCP) and potential differences between cats and dogs were assessed using a one-way ANOVA. Dog 3 made two trips in a vehicle with its owners to another settlement on the island, but although these waypoints were "correct data", they were deleted from the data set as the dog didn't have a choice of free movement as he was restrained by the vehicle. In addition to AR, we calculated the distance moved per 24 h (sum of all distances between consecutive waypoints from midnight to midnight), per night (sunset to sunrise), and per day (sunrise to sunset) provided more than 5 data points were available for a particular period. In this case, species differences were assessed using linear mixed-effect models (package nlme for R) with the individual as a random factor to account for the multiple measures for individuals. Furthermore, we separated activity and rest based on the speed the animal moved between subsequent location records. By applying a speed threshold of 2 m/min (dogs) and 1 m/min (cats), we removed more than 50% of the data and the vector direction calculated from the Rayleigh tests had stabilized (i.e., removing more data did not change the direction of the vector nor did it improve vector length). In this context it has to be noted that the calculated speed is not the actual speed of an animal moving, but an integration of all turning angles and speeds over 15 min. Vector averaging was performed according to Zar \[[@B29-animals-08-00065]\]. We further analysed the proximity of the collared individuals to each other and, taking the accuracy of the GPS loggers into account, used a 20 m threshold as a measure of a potential contact between them \[[@B28-animals-08-00065]\].
3. Results {#sec3-animals-08-00065}
==========
3.1. Dog and Cat Census {#sec3dot1-animals-08-00065}
-----------------------
All houses in the community were visited at least once, and return visits were made to houses where no occupants were home at the initial visit. Due to time constraints and occupants being away from their homes, a total of 225 houses (out of 344) were surveyed representing 65.4% of the households in Wurrumiyanga. All known households with pet cats were recorded (17/344 in February and 27/344 in August).
The February 2017 census recorded 198 dogs from 105 households (46.7%) and 120 households (53.3%) with no dogs. The male:female ratio was 0.79:1. Just over half the dog population was desexed (55.6%), with 31.8% being entire and 12.6% unknown (owners couldn't remember, and the dog was free-roaming so we could not confirm). According to the ABS 2016 Census, there is an average of 4 people per household in Wurrumiyanga. This equates to approximately 22 dogs per 100 people. The 2016 census also reported the total population of Wurrumiyanga to be 1563 people which leads to an estimated population of 343 dogs (by extrapolation).
The February 2017 census recorded 41 cats from 17 households (4.9%) and 327 households (95.1%) with no cats. The male:female ratio of cats was 0.66:1. Only 17.1% of the cat population was desexed, 7.3% had an unknown reproductive status leaving 75.6% entire. By the August 2017 census, the cat population had doubled to 83 cats ([Table 1](#animals-08-00065-t001){ref-type="table"}). However, as a result of a targeted education and free cat desexing program (8--9 June), 68.7% (n = 57) of the cats were desexed ([Table 1](#animals-08-00065-t001){ref-type="table"}).
3.2. Roaming Behaviours {#sec3dot2-animals-08-00065}
-----------------------
### 3.2.1. Direct Observation---Transect Drives {#sec3dot2dot1-animals-08-00065}
Study 1 (April 2017) yielded a total of 92 cats recorded during 12.15 h of observation over 3 days (mean time per transect = 40.5 ± 9.4 min). Per transect there were significantly fewer (*p* \< 0.001, [Table 2](#animals-08-00065-t002){ref-type="table"}) cats (9) roaming than cats (84) nonroaming. Study 2 (June 2017) recorded a total of 55 cats during 12.75 h of observation (mean time per transect = 42.5 ± 7.4 min). Again, there was a significant difference (*p* \< 0.001, [Table 2](#animals-08-00065-t002){ref-type="table"}) for behaviour type, with fewer cats (9) roaming than cats (46) not roaming. A *t* test revealed that the cats seen per day did not statistically differ between the two studies, although it came close to significance (*t*~3.3~ = 2.89, *p* = 0.056). Perhaps because of the small number of cats observed roaming (n = 18 for the pooled studies), a Rayleigh test could not determine a time preference for this behaviour (*p* = 0.32, [Table 3](#animals-08-00065-t003){ref-type="table"}). In contrast, time of day had a significant effect on the number of cats seen not roaming with a mean vector at 12:31 a.m. (*p* \< 0.001, [Table 3](#animals-08-00065-t003){ref-type="table"}) with most cats having been observed during the 10 p.m. (n = 28) and 2 a.m. (n = 36) surveys.
### 3.2.2. Indirect Observation---Remote-Sensing Cameras {#sec3dot2dot2-animals-08-00065}
There were 203 independent captures of animals on camera traps across 110 camera days. A total of 242 animals were captured from 11 categories: dog, dog with owner, cat, agile wallaby (*Macropus agilis*), northern brown bandicoot (*Isoodon macrourus*), brushtail possum (*Trichosurus vulpecula*), bush stone-curlew (*Burhinus grallarius*), red-tailed black cockatoo (*Calyptorhynchus banksii*), Australian magpie (*Gymnorhina tibicen*), crested pigeon (*Ocyphaps lophotes*), magpie-lark (*Grallina cyanoleuca*), and unknown ([Table A1](#animals-08-00065-t0A1){ref-type="table"} in [Appendix A](#app1-animals-08-00065){ref-type="app"}). Dogs with owners were defined as captures that contained both dogs and people whether the dogs were leashed or not. Dogs were captured on 58.6% (n = 17) of the cameras across all four tracks and dogs with owners on 17.2% (n = 5) on all but the West track. Cats were captured on 10.3% (n = 3) of the cameras only on the Enrail track and were observed ≤150 m from the nearest house ([Table A1](#animals-08-00065-t0A1){ref-type="table"}). Dogs were captured at ≤1358 m, ≤ 1800 m, ≤792 m, and ≤149 m distance from the nearest house along the north, west, northwest and Enrail tracks, respectively ([Table A1](#animals-08-00065-t0A1){ref-type="table"}). We could not establish a significant relationship between the number of observations and distance to the nearest house (domestic animals; *t* = 1.65, *p* = 0.11; wildlife: *t* = 1.18, *p* = 0.25) ([Figure 3](#animals-08-00065-f003){ref-type="fig"}).
The timing of camera captures for dogs appeared to show a diametrically bimodal distribution rendering the standard Rayleigh test ineffective. Therefore, an angle doubling procedure was evoked \[[@B29-animals-08-00065]\]. The Rayleigh test on the transformed data revealed that the dogs roamed along an 8:06 a.m. and 8:06 p.m. axis ([Table 2](#animals-08-00065-t002){ref-type="table"}). All cats were captured at night, however, statistical analysis was impossible with only three events. Wildlife tended to be captured at 11:50 p.m. and this changed only slightly to 12:06 a.m. when flying birds, the only daytime wildlife records, were excluded ([Table 2](#animals-08-00065-t002){ref-type="table"}).
### 3.2.3. Tracking---GPS Loggers {#sec3dot2dot3-animals-08-00065}
Due to faulty devices (n = 5) and five cats removing their harnesses (harnesses were initially too loose), data were collected from four dogs and six cats ([Table A2](#animals-08-00065-t0A2){ref-type="table"}). Dog ARs ranged from 1.23 to 45.72 ha and cat ARs ranged from 0.1 to 2.47 ha with a one-way ANOVA of species effect nearing significance (*p* = 0.057, [Table 2](#animals-08-00065-t002){ref-type="table"}). Similarly, over 24 h dogs appeared to travel further than cats, but again the test failed to reach significance (*p* = 0.054, [Table 2](#animals-08-00065-t002){ref-type="table"}). However, when analysed separately for day- and nighttime, dogs travelled significantly further than cats (*p* \< 0.05, [Table 2](#animals-08-00065-t002){ref-type="table"}). Individual data are presented in [Table A2](#animals-08-00065-t0A2){ref-type="table"}.
Activity records for dogs clustered around 6:02 a.m., whereas cat activity was most prominent at 11:24 a.m. ([Table 3](#animals-08-00065-t003){ref-type="table"}). Individual activity vectors are presented in [Figure 4](#animals-08-00065-f004){ref-type="fig"} and [Table A2](#animals-08-00065-t0A2){ref-type="table"}. From a total of 1410 GPS fixes (dogs, n = 647 and cats, n = 763), only one contact was recorded between Dog 3 and Cat 4 having been 8.3 m apart from each other within 1.1 min. However, this was despite living directly across the road from each other (15 m between fences, 45 m between front doors).
4. Discussion {#sec4-animals-08-00065}
=============
This is the first study to simultaneously examine the roaming behaviors, interspecific interactions, and demographics of both dogs and cats in a remote Aboriginal community using a variety of methods. There are pros and cons to all the methods used in this study. The direct observations (transect drives) in this study were a quick and low-cost but labour-expensive way to count the number of cats roaming and nonroaming in a population at any one time. However, the disproportionally small number of cats seen roaming could imply that these cats, like their feral cousins, are secretive and difficult to observe when they prowl away from their home yard. Low visibility and the time constraints of the survey design might compromise the effectiveness of the direct observation approach for cats. In comparison, camera transects were more costly even though only 29 cameras were deployed. Nevertheless, they were less labour-intensive, and had the advantage of continuous observations. However, there are many factors that affect capture rates, such as the positioning of the cameras, which can be manipulated to maximize the potential to capture a species of interest \[[@B32-animals-08-00065],[@B33-animals-08-00065]\]. In this study, cameras were placed along tracks and positioned to increase the chances of capturing dogs, therefore probably limiting the ability to capture cats and wildlife as indicated by the only three cat records. Future studies may need to consider different camera placements, but it might be near impossible to optimize capture rate for all species of interest at the same time. Nevertheless, for investigating wildlife--cat interaction, this method appears most promising. GPS loggers made for sports activity or pets are a low-cost alternative to GPS collars with or without radio-telemetry. They record continuously all outside locations rather than just where a camera trap is placed. Therefore, habitat use is arguably best studied using this method. However, to extrapolate results to a population level and to study interactions between individuals, a substantially larger sample size is needed. Furthermore, longer-term studies require improvements made to the logger design (e.g., battery capacity), further adding to the complexity and cost for the method. In this study, it was advantageous to use multiple methods, enabling data to be corroborated and the ability to answer different research questions.
Our results revealed temporal differences between the activity patterns of dogs, cats, and wildlife. Based on trail cameras and individual GPS loggers, dogs in this study showed crepuscular or early morning activity, which is consistent with research findings for other FRDs \[[@B13-animals-08-00065]\] and wild dingoes \[[@B34-animals-08-00065]\]. As far as cats are concerned, more cats were seen at night, but then mostly in the yards of houses. Trail cameras were less effective, but these suggested, if anything, nighttime roaming behavior, but sample size was too small for statistical analysis. While nighttime records are consistent with the usual hunting behavior of cats, individual GPS records actually showed more daytime activity. However, the locomotion recorded by the GPS loggers is not equivalent to the roaming behavior assessed by the other two methods. Unless hunting away from houses is a very regular occurrence and both cameras as well as direct observations suggest otherwise, other types of locomotion perhaps instigated by the cats' owners and or community dogs could easily shift the time vector for activity towards the day. The small activity ranges seen and short distances moved confirm that at least the collared cats were basically domestic pets and not feral animals.
The majority of cats roamed between dawn (6:30 a.m.) and dusk (7:30 p.m.) and travelled shorter distances with a trend towards smaller ARs than dogs. However, some cats also roamed between dusk and dawn, and were likely to be hunting since all records of flightless wildlife were captured during this time (6:21 p.m. to 7:07 a.m.), consistent with general knowledge that cats are nocturnal hunters. It is interesting that the majority of the cats in this study were not observed roaming and were not active at night. The small number of interspecific contacts recorded also suggests that cats may have been avoiding dogs, and were therefore most active during the day or night. FRDs are known to prey upon cats \[[@B16-animals-08-00065]\] (Butler et al. this issue), and therefore it is not surprising that cats avoid dogs, at least temporally. However, the short length of GPS collar attachments on cats (mean 4.5 days) and the few individuals collared limits our confidence in this conclusion. Further longer-term research on a larger number of animals is clearly needed \[[@B28-animals-08-00065]\].
The total number of cats observed in Study 1 (n = 92) was somewhat higher than that in Study 2 (n = 55), but on a daily basis the two studies did in fact not differ. However, it is obvious that the increase in cat numbers in the community did not result in more cat observations. Seasonal differences in vegetation structure, sightability, and cat behavior between wet and dry season could easily account for the inconsistency between cat numbers and observation, while other explanations such as rate of desexing might also have contributed \[[@B20-animals-08-00065],[@B35-animals-08-00065],[@B36-animals-08-00065],[@B37-animals-08-00065]\]. The extrapolated dog population of Wurrumiyanga estimate of 22 dogs per 100 people (343 dogs) is almost identical to the 21 dogs per 100 people (326 ± 52 dogs) estimated by Sparkes et al. \[[@B28-animals-08-00065]\] in 2014. This suggests that the dog population has remained stable over the last three years. Although the population is stable, a new management plan to decrease the overall population may decrease the potential impact on native wildlife. During the dog census undertaken by Brown et al. \[[@B22-animals-08-00065]\] in 2014, the cat population of Wurrumiyanga was six desexed cats that were house-confined (unpublished data). The population is now 13.5 times higher, and had increased by 2-fold in 6 months. Cats roaming during the wildlife activity period are likely to have detrimental impacts on the local wildlife populations. Direct predation is the major impact feral cats have on Australia's native fauna \[[@B17-animals-08-00065]\]. With an estimated 6.3 million cats covering \>99.8% of Australia's land area \[[@B38-animals-08-00065]\], it is particularly important that cat-free Australian islands are maintained as such. With the Tiwi Islands being one of Australia's only bioregions to have retained all of its historical mammal species \[[@B39-animals-08-00065]\], it is critical that they are established as a conservation refuge \[[@B40-animals-08-00065]\]. To achieve this, management of cats on Northern Australian islands must be developed collaboratively by the Aboriginal owners and other stakeholders \[[@B40-animals-08-00065]\]. The methods trialed by this study will assist in supporting and monitoring these efforts.
5. Conclusions {#sec5-animals-08-00065}
==============
Our results revealed temporal differences between the roaming behaviors of dogs and cats. Dogs showed crepuscular behavior whilst most cats roamed between dawn and dusk and travelled shorter distances than dogs. This behavior may be to avoid dogs, at least temporally. However, some cats roamed between dusk and dawn as did all flightless wildlife, indicating that the cats may have been hunting. The stable dog population and growing cat population in this remote Aboriginal island community have the potential to impact native wildlife. Our study provides baseline population demographics on the community-owned dogs and cats and their roaming behaviours upon which to base future management plans in consultation with the Traditional Owners and stakeholders.
This project was supported, in part, by funding from the Threatened Species Commissioner's Office. Brooke Kennedy is also the recipient of the Vice Chancellor's Indigenous Research Fellowship. The authors acknowledge the assistance of the Tiwi Islands Land Council, Kate Hadden, Manager Land & Resources, for her assistance with the research proposal and her team Willie Rioli and Colin Kerinaiua, Local Land Rangers, for their local knowledge and assistance with the on the ground research. We also acknowledge Caitlin Maher for her assistance with the field research. We acknowledge Stephen Cutter (The Ark) for his veterinary services, Animal Management in Rural and Remote Indigenous Communities (AMRRIC) staff for their contribution and we would also like to thank the community of Wurrumiyanga for their participation.
B.K. and W.Y.B. conceived, designed and performed the experiments; B.K. and G.K. analysed the data; K.V. and G.K. contributed reagents/materials/analysis tools; B.K. wrote the paper with all authors contributed to writing and editing the paper.
The authors declare no conflict of interest. The funding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.
animals-08-00065-t0A1_Table A1
######
This table shows the location, distance from the nearest household, camera number and the number of camera nights per camera and the number of species captured on each camera.
Track Dist. (m) ^1^ Camera Night Dog Owner Cat Wallaby Bandicoot Possum Curlew Peewee Cockatoo Pigeon Magpie Unknown
------------ --------------- -------- ------- ----- ------- ----- --------- ----------- -------- -------- -------- ---------- -------- -------- ---------
Enrail 21 34 4 0 0 1 0 5 0 0 0 0 0 0 0
Enrail 46 29 0 0 0 0 0 0 0 0 0 0 0 0 0
Enrail 74 12 4 8 4 1 1 0 0 0 0 2 0 0 1
Enrail 149 28 4 4 10 1 0 0 0 1 0 0 0 0 0
North West 247 14 2 5 2 0 3 0 0 0 0 0 7 0 0
West 419 4 6 8 0 0 1 0 0 0 0 0 0 0 0
North West 432 22 2 4 0 0 1 0 0 0 0 0 0 0 0
North 502 38 0 0 0 0 0 0 0 0 0 0 0 0 0
West 543 35 2 0 0 0 0 0 0 0 0 0 0 0 0
North West 602 24 2 4 0 0 0 2 0 0 0 0 0 0 0
North 678 1 2 6 3 0 0 0 0 3 0 0 0 0 0
West 776 11 2 0 0 0 1 0 0 0 0 0 0 0 0
North West 792 26 2 2 0 0 1 0 0 0 0 0 0 0 0
North West 911 9 1 0 0 0 1 0 0 0 2 0 0 0 0
North 914 19 5 11 1 0 1 0 0 0 0 0 0 0 3
West 1005 18 6 4 0 0 0 0 0 0 0 0 0 0 0
North 1133 15 2 3 0 0 1 0 1 0 0 0 0 0 0
West 1166 30 6 3 0 0 1 0 0 0 0 0 0 0 0
West 1273 7 6 4 0 0 0 0 0 0 0 0 0 0 0
North 1358 31 2 4 0 0 0 0 0 0 0 0 0 0 0
West 1411 40 6 6 0 0 2 1 0 0 0 0 0 0 0
North 1507 21 4 0 0 0 4 0 0 0 0 2 0 0 0
West 1575 13 6 2 0 0 3 0 0 0 0 0 0 0 0
North 1659 3 6 0 0 0 2 2 1 4 0 0 0 0 1
North 1804 25 5 0 0 0 7 0 2 14 0 0 0 0 5
West 1830 36 6 5 0 0 0 0 0 1 0 0 0 0 1
North 2034 27 5 0 0 0 6 0 0 20 0 0 0 0 0
West 2116 16 6 0 0 0 0 0 0 0 0 0 0 17 0
North 2248 8 6 0 0 0 0 0 0 2 0 0 0 0 0
^1^ Distance (in metres) between the camera and the nearest household.
animals-08-00065-t0A2_Table A2
######
This Table shows the ID, demographics, device deployment length, accumulated distance travelled and vector angle and length for each animal with an igot-U GPS logger attached to their collar.
Device ID Sex ^1^ Deployed ^2^ Activity Range (Ha) Distance/24 h (m) ^3^ Distance/Day(m) ^4^ Distance/Night(m) ^5^ Vector Angle Vector Length
-------- ------------ --------- -------------- --------------------- ----------------------- --------------------- ----------------------- -------------- ---------------
G--4 Cat 4 FE 6 2.47 9684.03 5324.36 4850.99 141.14 0.21
G--7 Cat 7 FE 5 0.15 541.19 144.46 541.19 187.96 0.22 \*
G--8 Cat 8 FE 6 0.53 1547.51 274.44 1024.63 269.25 0.32 \*
G--9 Cat 9 MN 5 3.61 1740.87 0 1335.44 235.28 0.81
B--5 Cat 12 FS 5 1.31 2862.07 1847.43 1271.96 112.35 0.19 \*
K--1 Cat 15 FE 4 0.10 635.32 753.42 249.08 144.22 0.31
K--5 Dog 2 FS 5 1.23 4479.17 4479.17 444.93 124.30 0.57
K--11 Dog 3 ME 6 8.41 8425.57 5285.96 4602.13 0.19 0.22
Dog 3 ^\#^ 32,272.64
B--14 Dog 5 ME 3 9.35 2455.74 2205.27 1646.5 75.34 0.14 ^\#^
B--20 Dog 6 FS 4 29.61 14,568 9146.9 7394.83 44.71 0.50
^1^ FE: Female Entire, FS: Female Spayed, ME: Male Entire, MN: Male Neutered. ^2^ Number of days device was deployed. ^3^ Accumulated distance travelled per 24 h (midnight to midnight). ^4^ Accumulated distance travelled per day (sunrise to sunset). ^5^ Accumulated distance travelled per night (sunset to sunrise), ^\#^ Value incorporates vehicle trip of Dog 3 to another settlement and his activity range whilst there, \* Nonsignificant.
{#animals-08-00065-f001}
{#animals-08-00065-f002}
{#animals-08-00065-f003}
{#animals-08-00065-f004}
animals-08-00065-t001_Table 1
######
This table shows the population demographics of owned domestic cats and dogs in Wurrumiyanga, Tiwi Islands, NT, Australia collected during a door-to-door census conducted at different time points in 2017.
Sex Desexed Entire Unknown Total
------------ ------------- ------------ ------------ -------
Dog Census
February
Female 74 (71.2%) 23 (22.1%) 7 (6.7%) 104
Male 36 (47.3%) 29 (38.2%) 11 (14.5%) 76
Unknown 0 4 (36.4%) 7 (63.6%) 11
Total 110 (57.6%) 56 (29.3%) 25 (13.1%) 191
Cat Census
February
Female 4 (22.2%) 12 (66.7%) 2 (11.1%) 18
Male 3 (25%) 8 (66.7%) 1 (8.3%) 12
Unknown 0 11 (100%) 0 11
Total 7 (17.1%) 31 (75.6%) 3 (7.3%) 41
April
Female 14 (36.8%) 21 (55.3%) 3 (7.9%) 38
Male 6 (28.6%) 14 (66.7%) 1 (4.8%) 21
Unknown 0 12 (92.3%) 1(7.7%) 13
Total 20 (27.8%) 47 (65.3%) 5 (6.9%) 72
June
Female 29 (60.4%) 19 (39.6%) 0 48
Male 13 (43.3%) 17 (56.7%) 0 30
Unknown 0 2 (100%) 0 2
Total 42 (52.5%) 38 (47.5%) 0 80
August
Female 37 (72.5%) 14 (27.5%) 0 51
Male 19 (61.3%) 12 (38.7%) 0 31
Unknown 1 (100%) 0 0 1
Total 57 (68.7%) 26 (31.3%) 0 83
animals-08-00065-t002_Table 2
######
Summary statistics for transect observations and GPS tracking. Transect observations are presented as the mean number of cats observed where n = number of transects and one-way ANOVAs on the effect of behaviour on the number of cats observed per transect. Activity Ranges (ARs) are presented as the average AR for dogs and cats where n = number of dogs and cats respectively and a one-way ANOVA on the effect of species on AR. Distance travelled is presented as the mean distance (metres) travelled per 24 h, per day and per night, where n = number of observations (number of collared animals) and mixed-effect models (M-EM) on the effect of species on the distance travelled.
Parameter/Statistical Test Mean ± SD n DF F *p*
-------------------------------- ---------------------- -------- ------ ------- ----------
Transect
April
Roaming 0.5 ± 0.61 18
Nonroaming 4.66 ± 3.16 18
ANOVA (behaviour v survey) 1 30.1 \<0.001
June
Roaming 0.5 ± 0.85 18
Nonroaming 2.9 ± 1.73 18
ANOVA (behaviour v survey) 1 28.82 \<0.001
Activity range (AR)
Dog 12.15 ha ± 12.19 ha 4
Cat 1.36 ha ± 1.42 ha 6
ANOVA (AR v Species) 1 4.901 0.057 \*
Distance Travelled per 24 h
Dog 1233.06 m ± 545.43 m 20 (4)
Cat 703.14 m ± 348.12 m 29 (6)
M-EM ^\#^ (Distance v Species) 1, 8 5.11 0.054 \*
Distance Travelled per day
Dog 949.68 m ± 342.82 m 20 (4)
Cat 455.42 m ± 238.11 m 29 (6)
M-EM ^\#^ (Distance v Species) 1, 7 7.67 0.028
Distance Travelled per night
Dog 790.5 m ± 255.86 m 20 (4)
Cat 585.1 m ± 161.24 m 29 (6)
M-EM ^\#^ (Distance v Species) 1, 8 9.55 0.015
\* Non-significant, ^\#^ Mixed-effect Model.
animals-08-00065-t003_Table 3
######
Timing of activity. Data is presented as the vector time in which: cats were observed roaming and nonroaming, where n = number of observation; dogs, cats and wildlife were observed roaming on remote-sensing cameras, where n = number of observations and dogs and cats were recorded roaming by GPS loggers, where n = the number of collared animals.
Parameter Vector Time ± SD n r R z *p*
----------------------- -------------------------------------- ----- ------ ------- ------- ---------
Transects (pooled)
Roaming \- 18 0.25 4.58 1.17 0.32 \*
Non-roaming 12:31 a.m. ± 4 h 34 min 130 0.28 36.72 10.37 \<0.001
Camera
Dogs ^a^ 8:06 a.m. and 8:06 p.m. ± 3 h 52 min 50 0.62 31.46 19.80 \<0.001
Cats ^b^ 3
Wildlife 11:50 p.m. ± 3 h 52 min 0.48 49.14 23.67 \<0.001
Wildlife (flightless) 12:06 a.m. ± 3 h 9 min 0.65 59.21 38.96 \<0.001
GPS Loggers
Dogs 6:02 a.m. ± 5 h 6 min 4 0.10 68.71 6.99 \<0.001
Cats 11:24 a.m. ± 5 h 10 min 6 0.08 58.29 4.80 0.008
\* Nonsignificant, ^a^ diametrically bimodal distribution; ^b^ statistical analysis could not be performed.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.