text
stringlengths
8
5.77M
Migrants are fleeing the US for Canada, making the journey through snow and ice to seek refugee status in the country. Reuters photographer Christinne Muschi documented some of them as they crossed the border from the US into Hemmingford in Quebec
The present invention relates to the field of computer graphics. Many computer graphic images are created by mathematically modeling the interaction of light with a three dimensional scene from a given viewpoint. This process, called rendering, generates a two-dimensional image of the scene from the given viewpoint, and is analogous to taking a photograph of a real-world scene. As the demand for computer graphics, and in particular for real-time computer graphics, has increased, computer systems with graphics processing subsystems adapted to accelerate the rendering process have become widespread. In these computer systems, the rendering process is divided between a computer's general purpose central processing unit (CPU) and the graphics processing subsystem. Typically, the CPU performs high level operations, such as determining the position, motion, and collision of objects in a given scene. From these high level operations, the CPU generates a set of rendering commands and data defining the desired rendered image or images. For example, rendering commands and data can define scene geometry, lighting, shading, texturing, motion, and/or camera parameters for a scene. The graphics processing subsystem creates one or more rendered images from the set of rendering commands and data. Graphics processing subsystems typically use a stream-processing model, in which input elements are read and operated on by successively by a chain of stream processing units. The output of one stream processing unit is the input to the next stream processing unit in the chain. Typically, data flows only one way, “downstream,” through the chain of stream processing units. Examples of stream processing units include vertex processors, which process two- or three-dimensional vertices, rasterizer processors, which process geometric primitives defined by sets of two- or three-dimensional vertices into sets of pixels or sub-pixels, referred to as fragments, and fragment processors, which process fragments to determine their color and other attributes. Typically, the rendering commands and data sent to the graphics processing subsystem define a set of geometric primitives that are potentially visible in the final rendered image. The set of potentially visible geometric primitives is typically much larger than the set of geometric primitives actually visible in the final rendered image. To improve performance, the graphics processing subsystem can perform one or more visibility tests to determine the potential visibility of geometric primitives. Using the results of these tests, the graphics processing subsystem can remove, or cull, geometric primitives that are not visible from the set of potentially visible geometric primitives, thereby reducing the number of geometric primitives to be rendered. Previously, visibility testing and culling of geometric primitives, referred to as culling operations, were performed in the setup and rasterization units of the graphics processing subsystem. As rendered scenes become more complex, they typically include a large number of small geometric primitives. The increasing number of geometric primitives tends to create processing bottlenecks in the setup unit. Additionally, the vertices associated with each geometric primitive can include a set of attributes used for rendering. The bandwidth required to communicate vertices and their associated attributes to the setup unit creates further processing bottlenecks. This problem is exacerbated by the increasing number of attributes associated with vertices to perform complex rendering operations. It is therefore desirable to perform culling operations as soon as possible in the graphics processing subsystem to decrease wasteful rendering operations, to reduce the bandwidth requirements for communicating vertices and associated attributes, and to improve rendering performance. It is further desirable to reduce processing bottlenecks in the setup unit without substantially increasing the complexity of other portions of the graphics processing subsystem.
Evaluation of a nonisotopic DNA assay kit for diagnosing Plasmodium falciparum malaria in Madagascar. This study evaluated a nonisotopic DNA assay kit for diagnosing Plasmodium falciparum malaria in an area of Madagascar where all Plasmodium species of human malaria are present and where malaria is endemic. Blood samples from 440 healthy children and 20 healthy adults were processed and assayed in a single day in a blind protocol. The parasitemia levels of the four Plasmodium species were determined by microscopic examinations and by counts of numbers of malaria parasites per 1,000 white blood cells. Relative to P. falciparum infections, the DNA assay results agreed with those of microscopy for 207 positive and 239 negative samples; two samples were scored as positive by the DNA probe that were not detected by microscopy, and 12 samples were scored as positive by microscopy but were not detected by the assay. Relative to microscopy, the sensitivity of the assay was 95%, the specificity was 99%, and the effective sensitivity threshold of the DNA probe assay was approximately 30 parasites/mm3 of blood. The assay did not detect infections with either P. vivax, P. malariae, or P. ovale alone, but detected mixed infections of P. falciparum with either P. vivax or P. ovale. With this nonisotopic DNA probe assay, we were able to process large numbers of samples efficiently and to detect P. falciparum malaria infections with high sensitivity and specificity in a population that did not display overt disease symptoms.
177 Wis.2d 719 (1993) 503 N.W.2d 323 David OLLHOFF and Kathy Ollhoff, Plaintiffs-Appellants,[†] v. Jim PECK d/b/a/ Jim Peck's Wildwood, Peck's Wildwood, Inc., and Essex Insurance Company, Defendants-Respondents, EMPLOYERS INSURANCE OF WAUSAU, a Mutual Company, Defendant. No. 92-2900. Court of Appeals of Wisconsin. Submitted on briefs May 17, 1993. Decided June 15, 1993. *721 On behalf of the plaintiffs-appellants, the cause was submitted on the briefs of Randy L. Frokjer of Ament, Wulf & Frokjer of Merrill. On behalf of the defendants-respondents, the cause was submitted on the brief of Matthew E. Yde of Ruder, Ware & Michler, S.C. of Wausau. *722 Before Cane, P.J., LaRocque and Myse, JJ. CANE, P.J. David and Kathy Ollhoff appeal a judgment and orders denying them summary judgment, refusing to allow evidence of remedial measures and refusing to set aside the jury verdict. They argue that (1) strict liability should have applied against the defendants because they housed "wild" animals, (2) the trial court erred by refusing to allow the Ollhoffs to present evidence of remedial measures and (3) the trial court should have set aside the verdict as perverse. We reject these arguments and affirm. David Ollhoff and his family visited Jim Peck's Wildwood, Inc., a nature park that includes a petting zoo and a musky pond. During this trip, Ollhoff was bitten while reaching into the musky pond to pet a musky. Ollhoff sued Wildwood under negligence, safe place and strict liability theories. Before trial, the court denied summary judgment to both sides and dismissed Ollhoff's strict liability claim with prejudice. The case proceeded to trial, during which the court granted Wildwood's motion in limine excluding evidence that Wildwood placed warning signs near the musky pond after the accident. The jury returned a verdict finding Wildwood 10% causally negligent and Ollhoff 90% causally negligent. Ollhoff's postverdict motions were heard and denied and he appealed. STRICT LIABILITY [1] When we review a decision to grant or deny summary judgment, we apply the same methodology as the trial court. Green Spring Farms v. Kersten, 136 Wis. 2d 304, 315, 401 N.W.2d 816, 820 (1987). Thus, summary judgment should be granted if there are no disputed *723 issues of material fact and the moving party is entitled to judgment as a matter of law. Section 802.08(2), Stats. Ollhoff argues that Wildwood should be held to a standard of strict liability, and thus Ollhoff is entitled to judgment as a matter of law. He cites treatises and foreign state case law that indicates the possessors of wild animals are strictly liable for physical harm caused by the animals. W. PAGE, KEETON, ET AL., PROSSER AND KEATON ON THE LAW OF TORTS, § 77, at 542 (5th ed. 1984); Briley v. Mitchell, 115 So.2d 851 (La. 1959), on remand, 119 So.2d 668 (La. App. 1960). The Wisconsin legislature has not adopted a strict liability rule for all "wild animals." Rather, it has established strict liability causes of action only for particular types of animals. See sec. 172.01, Stats. (stallions, bulls, boars, rams and billy goats allowed to run at large); sec. 174.02, Stats. (dogs). It has not established strict liability for damages caused by other animals, such as a musky. [2] Wildwood argues that the liability of the owner or keeper of an animal is controlled by Wis Jury Instruction—Civil 1391, which states: An owner (keeper) of a(n) (insert name of animal) is deemed to be aware of the natural traits and habits which are usual to a(n) (animal), and must use ordinary care to restrain and control the animal so that it will not in the exercise of its natural traits and habits cause injury or damage to the person or property of another. In addition, if an owner (keeper) is aware or in the exercise of ordinary care should be aware that the animal possesses any unusual traits or habits that would be likely to result in injury or damage, then the owner (keeper) must use ordinary care to *724 restrain the animal as necessary to prevent the injury or damage. Wildwood asserts that this instruction appropriately establishes a duty of care that expands or contracts depending on the specific traits of the particular animal involved and the general characteristics of the class to which the animal belongs. We agree. Although we are not bound by the jury instructions, we view them as persuasive. State v. O'Neil, 141 Wis. 2d 535, 541 n.1, 416 N.W.2d 77, 80 n.1 (Ct. App. 1987). In the absence of statutorily created strict liability, the liability of owners or keepers of all animals should be governed by the law as stated in Wis Jury Instruction—Civil 1391. The instruction correctly does not distinguish between domesticated and wild animals, but rather instructs the jury to hold owners of animals to the appropriate standard of care given the nature of the animal involved. [3] Whether Wildwood violated that standard of care was a jury issue. Therefore, the trial court correctly denied Ollhoff's motion for summary judgment. SUBSEQUENT REMEDIAL ACT [4] At the time of the accident, there were no warning signs at the musky pond. After the accident, Wildwood placed warning signs at the pond. The trial court granted Wildwood's motion in limine and prohibited Ollhoff from mentioning at trial the subsequent placement of the signs. Our review of an evidentiary ruling is limited to determining whether the trial court properly exercised its discretion. Chomicki v. Wittekind, 128 Wis. 2d 188, 195, 381 N.W.2d 561, 564 (Ct. App. 1985). We will affirm the trial court if it (1) examined *725 the relevant facts, (2) applied a proper standard of law and (3) using a demonstrative rational process, reached a conclusion that a reasonable judge could reach. Loy v. Bunderson, 107 Wis. 2d 400, 414-15, 320 N.W.2d 175, 184 (1982). [5, 6] Ollhoff argues that this subsequent remedial act could have been admitted under sec. 904.07, Stats. This section states: When, after an event, measures are taken which, if taken previously, would have made the event less likely to occur, evidence of the subsequent measures is not admissible to prove negligence or culpable conduct in connection with the event. This section does not require the exclusion of evidence of subsequent measures when offered for another purpose, such as ... impeachment or proving a violation of s. 101.11 [the safe-place statute]. (Emphasis added). Ollhoff correctly asserts that the trial could have allowed this evidence under sec. 904.07 because this case sought to prove a safe place violation and because Ollhoff could have used it to impeach testimony offered by a Wildwood witness. However, the trial court did not exclude the evidence under sec. 904.07, but rather under sec. 904.03. During trial, the court reiterated its ruling: I had been advised by counsel that the day after the event which is the subject of this lawsuit Jim Peck's put up some rather conspicuous signs. I had already ruled that although I could allow that information into evidence in a safe-place case as an exception to the prohibition against subsequent remedial measures, I chose not to, because I thought that it wasn't necessary to put the current existence of *726 signs into evidence to prove that signing was feasible.... I thought the fact that the signs were there was not probative enough ... and that, therefore, the prejudicial effect would outweigh any probative value. That ruling was under 904.03 and not under the subsequent remedial measures statute [sec. 904.07]. Under sec. 904.03, the trial court is given broad discretion to exclude evidence where its probative value is substantially outweighed by the danger of unfair prejudice and other factors. See State v. Pharr, 115 Wis. 2d 334, 342, 340 N.W.2d 498, 501 (1983) (we defer to the discretion of the trial court on evidentiary issues). The trial court's explanation shows that it examined the relevant facts, applied the proper standards and, using a demonstrative rational process, reached a conclusion that a reasonable judge could reach. We conclude therefore that this was a reasonable exercise of discretion. PERVERSE VERDICT Last, Ollhoff argues that the verdict should be set aside as perverse. Bergmann v. Insurance Co. of North America, 49 Wis. 2d 85, 87-88, 181 N.W.2d 348, 350 (1970), provides the applicable standard to a challenged jury finding: [I]f there is any credible evidence which under any reasonable view fairly admits of inferences which support the jury's verdict, the verdict must be sustained, and neither the trial court nor [an appellate] court may tamper with it. The evidence must be considered in the light most favorable to the jury verdict.... The evidence supporting the verdict must be accepted by the court unless it appears that *727 the evidence is patently incredible. (Citations omitted.) The basis of Ollhoff's contention that the verdict was perverse was that (a) the 10%/90% split went against the credible evidence supplied to the jury, and (b) ajury finding of no future medical expenses for David Ollhoff and no damages to Kathy Ollhoff was not in any way supported by the evidence. We are not persuaded because there is credible evidence to support the jury's apportionment of negligence. [7, 8] David Ollhoff is an adult who reached into a musky pond to pet a musky. He testified that he attempted to pet the musky near the tail area to avoid being bitten. The jury could infer that he was aware of the danger of "petting" a musky. There is credible evidence to support a finding that David Ollhoff was 90% causally negligent. Thus, it is apparent that Wildwood is not liable. Where it is apparent that there is no liability in any event, the failure of the jury to find damages does not render the verdict perverse. Jahnke v. Smith, 56 Wis. 2d 642, 652, 203 N.W.2d 67, 72 (1973). Therefore, the jury's failure to find any future medical expenses for David or any loss of consortium for his wife does not make the verdict's answer on negligence perverse. By the Court.—Judgment and orders affirmed. NOTES [†] Petition to review denied.
package com.fishercoder; import com.fishercoder.common.utils.CommonUtils; import com.fishercoder.solutions._417; import org.junit.BeforeClass; import org.junit.Test; public class _417Test { private static _417.Solution1 solution1; private static int[][] matrix; @BeforeClass public static void setup() { solution1 = new _417.Solution1(); } @Test public void test1() { matrix = new int[][]{ {2, 3, 5}, {3, 4, 4}, {5, 3, 1}, }; for (int[] arr : solution1.pacificAtlantic(matrix)) { CommonUtils.printArray(arr); } } @Test public void test2() { matrix = new int[][]{ {3, 5}, {4, 4}, }; for (int[] arr : solution1.pacificAtlantic(matrix)) { CommonUtils.printArray(arr); } } @Test public void test3() { matrix = new int[][]{ {1, 2, 2, 3, 5}, {3, 2, 3, 4, 4}, {2, 4, 5, 3, 1}, {6, 7, 1, 4, 5}, {5, 1, 1, 2, 4}, }; for (int[] arr : solution1.pacificAtlantic(matrix)) { CommonUtils.printArray(arr); } } @Test public void test4() { matrix = new int[][]{ {2, 3, 5}, {3, 4, 4}, }; for (int[] arr : solution1.pacificAtlantic(matrix)) { CommonUtils.printArray(arr); } } }
{ "info" : "可通过此漏洞读取服务器上的文件 resource", "name" : "Resin任意文件读取_1", "level" : "高危", "type" : "文件读取", "author" : "wolf@YSRC", "url": "", "keyword" : "tag:resin", "source" : 1, "plugin" : { "url" : "/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/etc/passwd", "tag" : "存在任意文件读取漏洞 /resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/etc/passwd", "analyzing" : "keyword", "analyzingdata" : "root:", "data" : "", "method" : "GET" } }
Maria: The notice information: Wade Stubblefield (for EES and EEMC) 713-345-7464 (phone) 713-646-8011 (fax) wade.stubblefield@enron.com Leslie Reeves (for EPMI) phone 713-853-7962 fax 713-646-2443 cell 713-907-6554; leslie.reeves@enron.com Marcus Nettelton phone 713-345-8161 fax 713-646-3393 marcus.nettelton@enron.com
Pennsylvania trooper acquitted of assault charge PHILADELPHIA (AP) — A federal jury returned a not guilty verdict Monday in the trial of a state trooper accused of assaulting a suspect by stomping on his head as the man lay face-down and handcuffed on his kitchen floor.Kelly Cruz, 44, of Oxford, a longtime narcotics investigator, was charged with violating the civil rights of Zachary Bare, 22, during a 2009 arrest in Chester County.The jury deliberated for several hours after closing arguments Monday before deciding Cruz's use of force in the case was not excessive and acquitting him of the charges. The verdict prompted an outburst of cheers from his supporters in the courtroom, KYW-AM reported.Bare's nose was broken and some teeth were knocked out, according to court documents.Cruz testified Friday that the suspect was cursing and threatening him, rolling back and forth with his shoulders and tried to rise, The Daily Local News of West Chester reported. Cruz said he feared for his safety, so pushed down on the suspect's shoulder with his foot to get the man under control.Under cross-examination, Cruz said the encounter took place in an instant and he didn't have the opportunity to check for other options and didn't know the man was handcuffed."I reacted to his actions," Cruz said. "At that moment I did not know he was handcuffed. I responded the way I was trained to respond. I reacted to what I saw. If I fail, I don't come home to my family."West Whiteland Officer Glenn Cockerham testified that he didn't see anything that would warrant such use of force. He told state police investigators that Cruz's response "was totally unnecessary" and Cruz appeared angry about having curses hurled at him."There was no reason for it," he said, according to an investigators' report. "I really couldn't believe he did it. It didn't have to happen."Defense attorney Christian Hoey argued that his client's actions were necessary to prevent the suspect from becoming violent, even though they caused a broken nose and other injuries.
Q: ARIMA modelling in R: Help please I'm in need of some help in using R (bit of a newbie). If I use the following code in R arima(adj.close,order=c(2,2,3)) it will fit an ARIMA(2,2,3) model to adj.close. My question is, do I difference the data before fitting the model or after? I used function ndiffs to get the number of first differences I should take, and the return was 2. A: You difference the data before fitting an ARMA model. Equivalently, you do not explicitly difference the data at all if you are fitting an ARIMA model with integration order I equal to the integration order of the series (in your case, order I=2); the model has the differencing as an implicit first step. When you write order=c(2,2,3) as the argument in the function arima, you ask the function to difference the data twice before estimating an ARMA(2,3) model.
Only a few days left to Double your gift Forget offshore oil drilling. NASA’s working on a project that would generate clean, renewable offshore energy, by growing algae in floating plastic bags. These floating algae farms would take in wastewater from treatment plants. For algae, wastewater is like the nectar of the gods: The ammonia and phosphates act as a fertilizer. So the algae would float happily contained in the baggies, getting fat with lipid oil, and cleaning up the wastewater in the process. Eventually, the algae farmers would harvest the oil, recycle the plastic and start all over again. There are a few benefits to this fuel system. It takes less land then algae farms, it recycles wastewater, and it avoids the energy-intensive cooling and the problems with evaporation that open algae ponds have to deal with. And if these offshore energy sources spilled, the algae shouldn’t cause too much harm. The plastic bags might be expensive to replace, but the algae would die quickly in the saltwater. But the system does require a lot of plastic — about two square miles to create 2.4 million gallons of algae oil per year. According to Technology Review, the NASA researchers who came up with the idea aren’t totally sure what they’d do with all that algae-covered plastic after they were done using. Imagine miles and miles of mildewy shower curtains and you get some idea of the issue. Still, there’s nothing new about having too many plastic bags and no perfect way to dispose of them. But right now they mainly hang around in trees bothering Liz Lemon, when they could be generating renewable fuel. See: NASA Wants to Launch Floating Algae Farms, Technology Review
Q: Carbon laravel adding to file name I have file upload in my controller and need to add carbon to end of my file so I can insert it into database as unique. I'm doing it like this $upload->title = Auth::User()->id; $current = Carbon::now(); $file = $request->file('file'); $file->move(storage_path(). '/', $file->getClientOriginalName()); $upload->name = $file->getClientOriginalName().$current; } My question is this, when showing it to user how can I remove it so that the user sees only file original name(with php I can do it but I would like to use "laravel way") A: You can't add Carbon::now() to a filename since it has : in some filesystems, so do something like this: $current = time(); // Will output something like 1478529571 Or if filenames are different and you just want to add date: $current = date('Ymd'); // Will output something like 20161107. Or, if you want to use Carbon: $current = Carbon::now()->format('YmdHs'); // WIll output something like 201611071419
The invention relates to a wet developing process for electrophotography and an apparatus therefor. While both dry and wet developing means are known for electrophotography, i.e., electrostatic photography and electrostatic recording, the invention is particularly concerned with a wet developing process and apparatus therefor in which a developing solution is used as a developer. The conventional wet developing process using a developing solution comprises maintaining a supply of the developing solution in a dish-shaped vessel into which an exposed photosensitive or recorded recording sheet is fed for passage through the developing solution to effect the developing process, or comprises flushing a developing solution across an exposed photosensitive or recorded recording sheet which is fixed. However, in such developing techniques, the developing solution is supplied to both surfaces of the sheet to be developed, namely, the photosensitive surface (the surface of a photoconductive layer) or the recording surface (the surface of an induction layer) which has been exposed or recorded as well as the rear surface, which results in the disadvantage of marring the rear surface of the sheet due to the attachment thereto of the developer. In a wet developing process, the developing solution must be well stirred before it is supplied to the sheet. This is because the developing solution is used as the carrier for a toner powder mixed therein as is known, so that unless it is well stirred upon developing, there cannot be achieved a uniform supply of toner powder to the surface to be developed, which results in the non-uniformity of development. For these reasons, it is established that the higher the speed of relative movement between the developing solution and the surface to be developed, the better the result obtained. On the other hand, it is apparent that only one surface of the sheet need be developed. Consequently, the supply of the developing solution to both surfaces is wasteful.
Regex pattern for constructors I was just checking out this discussion: https://confuser.codeplex.com/discussions/436579 It answered most of my questions, other than one. What kind of RegEx should I use in order to have a certain set of confusions applied (or not applied) to the constructor? In other words, what are constructors matched against in rule application?
#include "tensorflow/core/framework/op.h" #include "tensorflow/core/framework/op_kernel.h" #include "tensorflow/core/framework/shape_inference.h" #include <iostream> #include "ComputeDescriptor.h" #include "NeighborList.h" typedef double boxtensor_t ; typedef double compute_t; using namespace tensorflow; using namespace std; #ifdef HIGH_PREC typedef double VALUETYPE ; #else typedef float VALUETYPE ; #endif #ifdef HIGH_PREC REGISTER_OP("Descrpt") .Input("coord: double") .Input("type: int32") .Input("natoms: int32") .Input("box: double") .Input("mesh: int32") .Input("davg: double") .Input("dstd: double") .Attr("rcut_a: float") .Attr("rcut_r: float") .Attr("sel_a: list(int)") .Attr("sel_r: list(int)") .Attr("axis_rule: list(int)") .Output("descrpt: double") .Output("descrpt_deriv: double") .Output("rij: double") .Output("nlist: int32") .Output("axis: int32") .Output("rot_mat: double"); #else REGISTER_OP("Descrpt") .Input("coord: float") .Input("type: int32") .Input("natoms: int32") .Input("box: float") .Input("mesh: int32") .Input("davg: float") .Input("dstd: float") .Attr("rcut_a: float") .Attr("rcut_r: float") .Attr("sel_a: list(int)") .Attr("sel_r: list(int)") .Attr("axis_rule: list(int)") .Output("descrpt: float") .Output("descrpt_deriv: float") .Output("rij: float") .Output("nlist: int32") .Output("axis: int32") .Output("rot_mat: float"); #endif class DescrptOp : public OpKernel { public: explicit DescrptOp(OpKernelConstruction* context) : OpKernel(context) { OP_REQUIRES_OK(context, context->GetAttr("rcut_a", &rcut_a)); OP_REQUIRES_OK(context, context->GetAttr("rcut_r", &rcut_r)); OP_REQUIRES_OK(context, context->GetAttr("sel_a", &sel_a)); OP_REQUIRES_OK(context, context->GetAttr("sel_r", &sel_r)); OP_REQUIRES_OK(context, context->GetAttr("axis_rule", &axis_rule)); cum_sum (sec_a, sel_a); cum_sum (sec_r, sel_r); ndescrpt_a = sec_a.back() * 4; ndescrpt_r = sec_r.back() * 1; ndescrpt = ndescrpt_a + ndescrpt_r; nnei_a = sec_a.back(); nnei_r = sec_r.back(); nnei = nnei_a + nnei_r; fill_nei_a = (rcut_a < 0); count_nei_idx_overflow = 0; } void Compute(OpKernelContext* context) override { // Grab the input tensor const Tensor& coord_tensor = context->input(0); const Tensor& type_tensor = context->input(1); const Tensor& natoms_tensor = context->input(2); const Tensor& box_tensor = context->input(3); const Tensor& mesh_tensor = context->input(4); const Tensor& avg_tensor = context->input(5); const Tensor& std_tensor = context->input(6); // set size of the sample OP_REQUIRES (context, (coord_tensor.shape().dims() == 2), errors::InvalidArgument ("Dim of coord should be 2")); OP_REQUIRES (context, (type_tensor.shape().dims() == 2), errors::InvalidArgument ("Dim of type should be 2")); OP_REQUIRES (context, (natoms_tensor.shape().dims() == 1), errors::InvalidArgument ("Dim of natoms should be 1")); OP_REQUIRES (context, (box_tensor.shape().dims() == 2), errors::InvalidArgument ("Dim of box should be 2")); OP_REQUIRES (context, (mesh_tensor.shape().dims() == 1), errors::InvalidArgument ("Dim of mesh should be 1")); OP_REQUIRES (context, (avg_tensor.shape().dims() == 2), errors::InvalidArgument ("Dim of avg should be 2")); OP_REQUIRES (context, (std_tensor.shape().dims() == 2), errors::InvalidArgument ("Dim of std should be 2")); OP_REQUIRES (context, (natoms_tensor.shape().dim_size(0) >= 3), errors::InvalidArgument ("number of atoms should be larger than (or equal to) 3")); auto natoms = natoms_tensor .flat<int>(); int nloc = natoms(0); int nall = natoms(1); int ntypes = natoms_tensor.shape().dim_size(0) - 2; int nsamples = coord_tensor.shape().dim_size(0); // check the sizes OP_REQUIRES (context, (nsamples == type_tensor.shape().dim_size(0)), errors::InvalidArgument ("number of samples should match")); OP_REQUIRES (context, (nsamples == box_tensor.shape().dim_size(0)), errors::InvalidArgument ("number of samples should match")); OP_REQUIRES (context, (ntypes == avg_tensor.shape().dim_size(0)), errors::InvalidArgument ("number of avg should be ntype")); OP_REQUIRES (context, (ntypes == std_tensor.shape().dim_size(0)), errors::InvalidArgument ("number of std should be ntype")); OP_REQUIRES (context, (nall * 3 == coord_tensor.shape().dim_size(1)), errors::InvalidArgument ("number of atoms should match")); OP_REQUIRES (context, (nall == type_tensor.shape().dim_size(1)), errors::InvalidArgument ("number of atoms should match")); OP_REQUIRES (context, (9 == box_tensor.shape().dim_size(1)), errors::InvalidArgument ("number of box should be 9")); OP_REQUIRES (context, (ndescrpt == avg_tensor.shape().dim_size(1)), errors::InvalidArgument ("number of avg should be ndescrpt")); OP_REQUIRES (context, (ndescrpt == std_tensor.shape().dim_size(1)), errors::InvalidArgument ("number of std should be ndescrpt")); int nei_mode = 0; if (mesh_tensor.shape().dim_size(0) == 16) { // lammps neighbor list nei_mode = 3; } else if (mesh_tensor.shape().dim_size(0) == 12) { // user provided extended mesh nei_mode = 2; } else if (mesh_tensor.shape().dim_size(0) == 6) { // manual copied pbc assert (nloc == nall); nei_mode = 1; } else if (mesh_tensor.shape().dim_size(0) == 0) { // no pbc nei_mode = -1; } else { throw runtime_error("invalid mesh tensor"); } bool b_pbc = true; // if region is given extended, do not use pbc if (nei_mode >= 1 || nei_mode == -1) { b_pbc = false; } bool b_norm_atom = false; if (nei_mode == 1){ b_norm_atom = true; } // Create an output tensor TensorShape descrpt_shape ; descrpt_shape.AddDim (nsamples); descrpt_shape.AddDim (nloc * ndescrpt); TensorShape descrpt_deriv_shape ; descrpt_deriv_shape.AddDim (nsamples); descrpt_deriv_shape.AddDim (nloc * ndescrpt * 12); TensorShape rij_shape ; rij_shape.AddDim (nsamples); rij_shape.AddDim (nloc * nnei * 3); TensorShape nlist_shape ; nlist_shape.AddDim (nsamples); nlist_shape.AddDim (nloc * nnei); TensorShape axis_shape ; axis_shape.AddDim (nsamples); axis_shape.AddDim (nloc * 4); TensorShape rot_mat_shape ; rot_mat_shape.AddDim (nsamples); rot_mat_shape.AddDim (nloc * 9); Tensor* descrpt_tensor = NULL; OP_REQUIRES_OK(context, context->allocate_output(0, descrpt_shape, &descrpt_tensor)); Tensor* descrpt_deriv_tensor = NULL; OP_REQUIRES_OK(context, context->allocate_output(1, descrpt_deriv_shape, &descrpt_deriv_tensor)); Tensor* rij_tensor = NULL; OP_REQUIRES_OK(context, context->allocate_output(2, rij_shape, &rij_tensor)); Tensor* nlist_tensor = NULL; OP_REQUIRES_OK(context, context->allocate_output(3, nlist_shape, &nlist_tensor)); Tensor* axis_tensor = NULL; OP_REQUIRES_OK(context, context->allocate_output(4, axis_shape, &axis_tensor)); Tensor* rot_mat_tensor = NULL; OP_REQUIRES_OK(context, context->allocate_output(5, rot_mat_shape, &rot_mat_tensor)); auto coord = coord_tensor .matrix<VALUETYPE>(); auto type = type_tensor .matrix<int>(); auto box = box_tensor .matrix<VALUETYPE>(); auto mesh = mesh_tensor .flat<int>(); auto avg = avg_tensor .matrix<VALUETYPE>(); auto std = std_tensor .matrix<VALUETYPE>(); auto descrpt = descrpt_tensor ->matrix<VALUETYPE>(); auto descrpt_deriv = descrpt_deriv_tensor ->matrix<VALUETYPE>(); auto rij = rij_tensor ->matrix<VALUETYPE>(); auto nlist = nlist_tensor ->matrix<int>(); auto axis = axis_tensor ->matrix<int>(); auto rot_mat = rot_mat_tensor ->matrix<VALUETYPE>(); // // check the types // int max_type_v = 0; // for (int ii = 0; ii < natoms; ++ii){ // if (type(0, ii) > max_type_v) max_type_v = type(0, ii); // } // int ntypes = max_type_v + 1; OP_REQUIRES (context, (ntypes == int(sel_a.size())), errors::InvalidArgument ("number of types should match the length of sel array")); OP_REQUIRES (context, (ntypes == int(sel_r.size())), errors::InvalidArgument ("number of types should match the length of sel array")); for (int kk = 0; kk < nsamples; ++kk){ // set region boxtensor_t boxt [9] = {0}; for (int dd = 0; dd < 9; ++dd) { boxt[dd] = box(kk, dd); } SimulationRegion<compute_t > region; region.reinitBox (boxt); // set & normalize coord vector<compute_t > d_coord3 (nall*3); for (int ii = 0; ii < nall; ++ii){ for (int dd = 0; dd < 3; ++dd){ d_coord3[ii*3+dd] = coord(kk, ii*3+dd); } if (b_norm_atom){ compute_t inter[3]; region.phys2Inter (inter, &d_coord3[3*ii]); for (int dd = 0; dd < 3; ++dd){ if (inter[dd] < 0 ) inter[dd] += 1.; else if (inter[dd] >= 1) inter[dd] -= 1.; } region.inter2Phys (&d_coord3[3*ii], inter); } } // set type vector<int > d_type (nall); for (int ii = 0; ii < nall; ++ii) d_type[ii] = type(kk, ii); // build nlist vector<vector<int > > d_nlist_a; vector<vector<int > > d_nlist_r; vector<int> nlist_map; bool b_nlist_map = false; if (nei_mode == 3) { int * pilist, *pjrange, *pjlist; memcpy (&pilist, &mesh(4), sizeof(int *)); memcpy (&pjrange, &mesh(8), sizeof(int *)); memcpy (&pjlist, &mesh(12), sizeof(int *)); int inum = mesh(1); assert (inum == nloc); d_nlist_a.resize (inum); d_nlist_r.resize (inum); for (unsigned ii = 0; ii < inum; ++ii){ d_nlist_r.reserve (pjrange[inum] / inum + 10); } for (unsigned ii = 0; ii < inum; ++ii){ int i_idx = pilist[ii]; for (unsigned jj = pjrange[ii]; jj < pjrange[ii+1]; ++jj){ int j_idx = pjlist[jj]; d_nlist_r[i_idx].push_back (j_idx); } } } else if (nei_mode == 2) { vector<int > nat_stt = {mesh(1-1), mesh(2-1), mesh(3-1)}; vector<int > nat_end = {mesh(4-1), mesh(5-1), mesh(6-1)}; vector<int > ext_stt = {mesh(7-1), mesh(8-1), mesh(9-1)}; vector<int > ext_end = {mesh(10-1), mesh(11-1), mesh(12-1)}; vector<int > global_grid (3); for (int dd = 0; dd < 3; ++dd) global_grid[dd] = nat_end[dd] - nat_stt[dd]; ::build_nlist (d_nlist_a, d_nlist_r, d_coord3, nloc, rcut_a, rcut_r, nat_stt, nat_end, ext_stt, ext_end, region, global_grid); } else if (nei_mode == 1) { vector<double > bk_d_coord3 = d_coord3; vector<int > bk_d_type = d_type; vector<int > ncell, ngcell; copy_coord(d_coord3, d_type, nlist_map, ncell, ngcell, bk_d_coord3, bk_d_type, rcut_r, region); b_nlist_map = true; vector<int> nat_stt(3, 0); vector<int> ext_stt(3), ext_end(3); for (int dd = 0; dd < 3; ++dd){ ext_stt[dd] = -ngcell[dd]; ext_end[dd] = ncell[dd] + ngcell[dd]; } ::build_nlist (d_nlist_a, d_nlist_r, d_coord3, nloc, rcut_a, rcut_r, nat_stt, ncell, ext_stt, ext_end, region, ncell); } else if (nei_mode == -1){ ::build_nlist (d_nlist_a, d_nlist_r, d_coord3, rcut_a, rcut_r, NULL); } else { throw runtime_error("unknow neighbor mode"); } // loop over atoms, compute descriptors for each atom #pragma omp parallel for for (int ii = 0; ii < nloc; ++ii){ vector<int> fmt_nlist_a; vector<int> fmt_nlist_r; int ret = -1; if (fill_nei_a){ if ((ret = format_nlist_fill_a (fmt_nlist_a, fmt_nlist_r, d_coord3, ntypes, d_type, region, b_pbc, ii, d_nlist_a[ii], d_nlist_r[ii], rcut_r, sec_a, sec_r)) != -1){ if (count_nei_idx_overflow == 0) { cout << "WARNING: Radial neighbor list length of type " << ret << " is not enough" << endl; flush(cout); count_nei_idx_overflow ++; } } } // set axis vector<int> d_axis_type (2); vector<int> d_axis_idx (2); make_axis (d_axis_type, d_axis_idx, d_type[ii], axis_rule, ii, fmt_nlist_a, fmt_nlist_r, d_coord3, region, b_pbc); // cout << ii << " type " << d_type[ii] // << " axis 0: " << d_axis_type[0] << " " << d_axis_idx[0] // << " axis 1: " << d_axis_type[1] << " " << d_axis_idx[1] << endl; vector<compute_t > d_descrpt_a; vector<compute_t > d_descrpt_a_deriv; vector<compute_t > d_descrpt_r; vector<compute_t > d_descrpt_r_deriv; vector<compute_t > d_rij_a; vector<compute_t > d_rij_r; vector<compute_t > rot; compute_descriptor (d_descrpt_a, d_descrpt_a_deriv, d_descrpt_r, d_descrpt_r_deriv, d_rij_a, d_rij_r, rot, d_coord3, ntypes, d_type, region, b_pbc, ii, fmt_nlist_a, fmt_nlist_r, sec_a, sec_r, d_axis_type[0], d_axis_idx [0], d_axis_type[1], d_axis_idx [1]); // check sizes assert (d_descrpt_a.size() == ndescrpt_a); assert (d_descrpt_r.size() == ndescrpt_r); assert (d_descrpt_a_deriv.size() == ndescrpt_a * 12); assert (d_descrpt_r_deriv.size() == ndescrpt_r * 12); assert (d_rij_a.size() == nnei_a * 3); assert (d_rij_r.size() == nnei_r * 3); assert (int(fmt_nlist_a.size()) == nnei_a); assert (int(fmt_nlist_r.size()) == nnei_r); // record outputs for (int jj = 0; jj < ndescrpt_a; ++jj) { descrpt(kk, ii * ndescrpt + jj) = (d_descrpt_a[jj] - avg(d_type[ii], jj)) / std(d_type[ii], jj); } for (int jj = 0; jj < ndescrpt_r; ++jj) { descrpt(kk, ii * ndescrpt + ndescrpt_a + jj) = (d_descrpt_r[jj] - avg(d_type[ii], ndescrpt_a + jj)) / std(d_type[ii], ndescrpt_a + jj); } for (int jj = 0; jj < ndescrpt_a * 12; ++jj) { descrpt_deriv(kk, ii * ndescrpt * 12 + jj) = d_descrpt_a_deriv[jj] / std(d_type[ii], jj/12); } for (int jj = 0; jj < ndescrpt_r * 12; ++jj) { descrpt_deriv(kk, ii * ndescrpt * 12 + ndescrpt_a * 12 + jj) = d_descrpt_r_deriv[jj] / std(d_type[ii], jj/12 + ndescrpt_a); } for (int jj = 0; jj < 9; ++jj){ rot_mat(kk, ii * 9 + jj) = rot[jj]; } for (int jj = 0; jj < nnei_a * 3; ++jj){ rij (kk, ii * nnei * 3 + jj) = d_rij_a[jj]; } for (int jj = 0; jj < nnei_r * 3; ++jj){ rij (kk, ii * nnei * 3 + nnei_a * 3 + jj) = d_rij_r[jj]; } for (int jj = 0; jj < nnei_a; ++jj){ int record = fmt_nlist_a[jj]; if (b_nlist_map && record >= 0) { record = nlist_map[record]; } nlist (kk, ii * nnei + jj) = record; } for (int jj = 0; jj < nnei_r; ++jj){ int record = fmt_nlist_r[jj]; if (b_nlist_map && record >= 0) { record = nlist_map[record]; } nlist (kk, ii * nnei + nnei_a + jj) = record; } for (int jj = 0; jj < 2; ++jj){ axis (kk, ii * 4 + jj * 2 + 0) = d_axis_type[jj]; axis (kk, ii * 4 + jj * 2 + 1) = d_axis_idx [jj]; } } } } private: float rcut_a; float rcut_r; vector<int32> sel_r; vector<int32> sel_a; vector<int32> axis_rule; vector<int> sec_a; vector<int> sec_r; int ndescrpt, ndescrpt_a, ndescrpt_r; int nnei, nnei_a, nnei_r; bool fill_nei_a; int count_nei_idx_overflow; void cum_sum (vector<int> & sec, const vector<int32> & n_sel) const { sec.resize (n_sel.size() + 1); sec[0] = 0; for (int ii = 1; ii < sec.size(); ++ii){ sec[ii] = sec[ii-1] + n_sel[ii-1]; } } void make_axis (vector<int > & axis_type, vector<int > & axis_idx, const int & type, const vector<int > & rule, const int ii, const vector<int> & nlist_a, const vector<int> & nlist_r, const vector<compute_t> & coord3, const SimulationRegion<compute_t > & region, const bool b_pbc) const { int backup_axis = -1; if (rule.size() == 0){ make_axis_default (axis_type, axis_idx); } else{ int ntypes = sel_a.size(); // two axis, for each axis (a_or_r, type, id) assert(rule.size() == ntypes * 2 * 3); axis_type.resize(2); axis_idx .resize(2); vector<int>::const_iterator iter; iter = rule.begin() + type * 6; if (*(iter+1) >= 0) { make_one_axis (axis_type[0], axis_idx[0], iter); } else { make_one_axis (axis_type[0], axis_idx[0], iter, ii, nlist_a, nlist_r, coord3, region, b_pbc); } iter = rule.begin() + type * 6 + 3; if (*(iter+1) >= 0) { make_one_axis (axis_type[1], axis_idx[1], iter); } else { make_one_axis (axis_type[1], axis_idx[1], iter, ii, nlist_a, nlist_r, coord3, region, b_pbc); } vector<int > backup_rule (3); copy (iter, iter+3, backup_rule.begin()); backup_rule[2] ++; if (*(iter+1) >= 0) { make_one_axis (axis_type[1], backup_axis, backup_rule.begin()); } else { make_one_axis (axis_type[1], backup_axis, backup_rule.begin(), ii, nlist_a, nlist_r, coord3, region, b_pbc); } } if (! check_axis (axis_type, axis_idx, ii, nlist_a, nlist_r, coord3, region, b_pbc)){ if (backup_axis >= 0){ axis_idx[1] = backup_axis; } else { axis_idx[1] ++; // cerr << "wrong backup axis, exit" << endl; // exit (1); } } for (int dd = 0; dd < 2; ++dd){ if (axis_type[dd] == 0) { assert (nlist_a[axis_idx[dd]] >= 0); } else { assert (nlist_r[axis_idx[dd]] >= 0); } } } void make_one_axis (int & axis_type, int & axis_idx, vector<int>::const_iterator info_i) const { axis_type = *info_i; if (axis_type == 0){ axis_idx = sec_a[*(info_i+1)] + *(info_i+2); } else { axis_idx = sec_r[*(info_i+1)] + *(info_i+2); } } void make_one_axis (int & axis_type, int & axis_idx, vector<int>::const_iterator info_i, const int id, const vector<int> & nlist_a, const vector<int> & nlist_r, const vector<compute_t> & coord3, const SimulationRegion<compute_t > & region, const bool b_pbc) const { axis_type = *info_i; if (axis_type == 0){ vector<pair<compute_t, int> > sort_info; int excl_type = - (*(info_i+1) + 1); int ntypes = sel_a.size(); for (unsigned ii = 0; ii < ntypes; ++ii){ if (ii == excl_type) continue; compute_t diff[3]; int list_idx, jd; // push axis candidates into sort_info for (int count = 0; count < 3; ++count){ list_idx = sec_a[ii] + count; if (list_idx >= sec_a[ii+1]) continue; jd = nlist_a[list_idx]; if (jd < 0) continue; if (b_pbc){ region.diffNearestNeighbor (coord3[3*id+0], coord3[3*id+1], coord3[3*id+2], coord3[3*jd+0], coord3[3*jd+1], coord3[3*jd+2], diff[0], diff[1], diff[2]); } else { for (int dd = 0; dd < 3; ++dd){ diff[dd] = coord3[3*id+dd] - coord3[3*jd+dd]; } } sort_info.push_back (pair<compute_t, int> (MathUtilities::dot<compute_t> (diff, diff), list_idx) ); } } sort (sort_info.begin(), sort_info.end()); assert (*(info_i+2) < sort_info.size()); axis_idx = sort_info[*(info_i+2)].second; } else { vector<pair<compute_t, int> > sort_info; int excl_type = - *(info_i+1); int ntypes = sel_r.size(); for (unsigned ii = 0; ii < ntypes; ++ii){ if (ii == excl_type) continue; compute_t diff[3]; int list_idx, jd; // push axis candidates for sort_info for (int count = 0; count < 3; ++count){ list_idx = sec_r[ii] + count; if (list_idx >= sec_r[ii+1]) continue; jd = nlist_r[list_idx]; if (jd < 0) continue; if (b_pbc) { region.diffNearestNeighbor (coord3[3*id+0], coord3[3*id+1], coord3[3*id+2], coord3[3*jd+0], coord3[3*jd+1], coord3[3*jd+2], diff[0], diff[1], diff[2]); } else { for (int dd = 0; dd < 3; ++dd){ diff[dd] = coord3[3*id+dd] - coord3[3*jd+dd]; } } sort_info.push_back (pair<compute_t, int> (MathUtilities::dot<compute_t> (diff, diff), list_idx) ); } } sort (sort_info.begin(), sort_info.end()); assert (*(info_i+2) < sort_info.size()); axis_idx = sort_info[*(info_i+2)].second; } } void make_axis_default (vector<int > & axis_type, vector<int > & axis_idx) const { axis_type.resize(2); axis_idx .resize(2); if (nnei_a > 1) { // use angular neighbors axis_type[0] = 0; axis_type[1] = 0; } else { // use radial neighbors axis_type[0] = 1; axis_type[1] = 1; } axis_idx[0] = 0; axis_idx[1] = 1; } bool check_axis (const vector<int > & axis_type, const vector<int > & axis_idx, const int id, const vector<int> & nlist_a, const vector<int> & nlist_r, const vector<compute_t> & coord3, const SimulationRegion<compute_t > & region, const bool b_pbc) const { compute_t diff[2][3]; for (int ii = 0; ii < 2; ++ii){ int jd = 0; if (axis_type[ii] == 0) { jd = nlist_a[axis_idx[ii]]; } else { jd = nlist_r[axis_idx[ii]]; } if (b_pbc){ region.diffNearestNeighbor (&coord3[3*id], &coord3[3*jd], diff[ii]); } else { for (int dd = 0; dd < 3; ++dd){ diff[ii][dd] = coord3[3*id+dd] - coord3[3*jd+dd]; } } } compute_t rij = MathUtilities::dot (diff[0], diff[1]); compute_t rii = MathUtilities::dot (diff[0], diff[0]); compute_t rjj = MathUtilities::dot (diff[1], diff[1]); if ( fabs (rij / sqrt(rii * rjj) + 1) < 1e-4 ) { return false; } else { return true; } } }; REGISTER_KERNEL_BUILDER(Name("Descrpt").Device(DEVICE_CPU), DescrptOp);
Q: Difference between 2>&-, 2>/dev/null, |&, &>/dev/null and >/dev/null 2>&1 Just looking for the difference between 2>&- 2>/dev/null |& &>/dev/null >/dev/null 2>&1 and their portability with non-Bourne shells like tcsh, mksh, etc. A: For background: a number 1 = standard out (i.e. STDOUT) a number 2 = standard error (i.e. STDERR) if a number isn't explicitly given, then number 1 is assumed by the shell (bash) First let's tackle the function of these. For reference see the Advanced Bash-Scripting Guide. Functions 2>&- The general form of this one is M>&-, where "M" is a file descriptor number. This will close output for whichever file descriptor is referenced, i.e. "M". 2>/dev/null The general form of this one is M>/dev/null, where "M" is a file descriptor number. This will redirect the file descriptor, "M", to /dev/null. 2>&1 The general form of this one is M>&N, where "M" & "N" are file descriptor numbers. It combines the output of file descriptors "M" and "N" into a single stream. |& This is just an abbreviation for 2>&1 |. It was added in Bash 4. &>/dev/null This is just an abbreviation for >/dev/null 2>&1. It redirects file descriptor 2 (STDERR) and descriptor 1 (STDOUT) to /dev/null. >/dev/null This is just an abbreviation for 1>/dev/null. It redirects file descriptor 1 (STDOUT) to /dev/null. Portability to non-bash, tcsh, mksh, etc. I've not dealt much with other shells outside of csh and tcsh. My experience with those 2 compared to bash's redirection operators, is that bash is superior in that regard. See the tcsh man page for more details. Of the commands you asked about none are directly supported by csh/tcsh. You'd have to use different syntaxes to construct similar functions. A: This is for redirecting the STDERR & STDOUT: 2>/dev/null Redirect STDERR to /dev/null (prevent from showing up on console) |& Redirect STDERR and STDOUT to STDIN of piped command (cmd1 |& cmd2) &>/dev/null Redirect both STDERR & STDOUT to /dev/null (nothing shows up on console) >/dev/null Redirect STDOUT to /dev/null (only STDERR shows on console) 2>&- Is for closing a file descriptor used with redirection These are all standard redirection methods for the Bourne shells. A: Consider this an addendum to the selected answer. You may want to know which forms are POSIX and which are not. Two POSIX forms are involved: 2.7.2 Redirecting Output 2.7.6 Duplicating an Output File Descriptor 2.7.2 Redirecting Output The two general formats for redirecting output are: [n]>word [n]>|word where the optional n represents the file descriptor number. If the number is omitted, the redirection shall refer to standard output (file descriptor 1). Output redirection using the '>' format shall fail if the noclobber option is set (see the description of set -C) and the file named by the expansion of word exists and is a regular file. Otherwise, redirection using the '>' or ">|" formats shall cause the file whose name results from the expansion of word to be created and opened for output on the designated file descriptor, or standard output if none is specified. If the file does not exist, it shall be created; otherwise, it shall be truncated to be an empty file after being opened. - 2.7.6 Duplicating an Output File Descriptor The redirection operator: [n]>&word shall duplicate one output file descriptor from another, or shall close one. If word evaluates to one or more digits, the file descriptor denoted by n, or standard output if n is not specified, shall be made to be a copy of the file descriptor denoted by word; if the digits in word do not represent a file descriptor already open for output, a redirection error shall result; see Consequences of Shell Errors. If word evaluates to '-', file descriptor n, or standard output if n is not specified, is closed. Attempts to close a file descriptor that is not open shall not constitute an error. If word evaluates to something else, the behavior is unspecified. Therefore: Function POSIX-compat POSIX 2>&- Yes close 2>/dev/null Yes redir 2>&1 Yes dup |& No &>/dev/null No >/dev/null Yes redir >&/dev/null ? ?dup The last line is not in the original question, but it works without complaint in bash. (Also works with /dev/tty substituted for /dev/null).
Reproducible builds on NetBSD Christos Zoulas @ 18:45 - LMHQ, 150 Broadway, 20th Floor, Manhattan Abstract I will talk about my recent work getting reproducible builds on NetBSD. The talk will be based on information that I first posted at: https://blog.netbsd.org/tnf/entry/netbsd_fully_reproducible_builds and it will have more detailed examples of the toolchain, build, and application changes that every OS needs to make to achieve reprodicibility. I will also discuss the meaning of timestamps and other "build-specific" information that needs to become predictable for fully reproducible builds, and if it is worth faking in the first place to achieve identical built artifacts at the media level.
at is the remainder when 143 is divided by 4/(-6*(-1)/72)? 47 Let w(s) = -19*s - 33. Let m(t) = t. Let n(z) = 5*m(z) + w(z). Calculate the remainder when n(-4) is divided by 12. 11 Suppose 3*h - 20 = -2*z, -4*h - 1 = -3*z - 5. Suppose -8*p + 3*p = -5, z*m = 4*p + 4. What is the remainder when 30*(1 - m/4) is divided by 8? 7 Let b(x) = -x**2 + 24*x + 109. Suppose r + r - 22 = -5*o, -4*o + 28 = -r. Calculate the remainder when b(27) is divided by o. 4 Let o(k) = 77*k**3 + 2*k**2 - k. Let v = 150 + -64. Let a = v + -66. Calculate the remainder when o(1) is divided by a. 18 Let i be 29/(0 + (-1 - -2)). Let v = i + -22. What is the remainder when 26 is divided by v? 5 Suppose 32*v = 173 + 595. Calculate the remainder when 320 is divided by v. 8 Suppose c - 28 = 3. Let i = 57 - c. Suppose d - 7*z - 83 = -2*z, d = 2*z + 95. What is the remainder when d is divided by i? 25 Calculate the remainder when 135 is divided by ((-3 + 59)/(-8))/((-2)/4). 9 Let n = 1718 - 1266. Calculate the remainder when n is divided by 154. 144 Let f(l) = 33*l**2 + l. Suppose 0 = 2*v - 5*v. Suppose v = -5*i + 3*c + 17, 0*i - 2*i + 6 = -c. What is the remainder when f(i) is divided by 9? 7 Let c(i) = -i**3 + 6*i**2 + 1. Suppose 4*x + w - 69 = -24, -5 = -3*x + 5*w. What is the remainder when c(3) is divided by x? 8 Suppose -o + 14 = 4*m, m + 3*o - 6 + 8 = 0. What is the remainder when 92 is divided by m? 0 Suppose 9*l + 185 - 725 = 0. Suppose 2*y = -2*a + 366 - l, a + 2*y - 153 = 0. What is the remainder when a is divided by 39? 36 Let q = -145 - -149. Suppose 2 = y - 0*y - 4*n, 3*y - 3*n - 15 = 0. What is the remainder when y is divided by q? 2 Let w(f) = -3*f - 18. Suppose -4*u + 641 = 5*t, 5*t - 322 = -2*u + t. What is the remainder when u is divided by w(-15)? 24 Let k = 31 + -23. Suppose 2*r = -4*h + 26, -2*r = 2*h - 7*h + 10. Suppose 38 = r*p - 27. Calculate the remainder when p is divided by k. 5 Let z = 94 + -60. Let b(m) = m**3 - m**2 + 2*m + 12. Suppose 0*v = -2*v + 8, 2*v = 2*t + 8. What is the remainder when z is divided by b(t)? 10 Suppose 2*j + 0*n - 18 = -2*n, 5*j + 4*n = 46. Let l = -9 - -22. Suppose -l*b + 54 = -j*b. What is the remainder when b is divided by 10? 8 Let q be 1/1 + 3 + -7. Let b be (8/q)/(23/(-69)). Let z = b + 12. Calculate the remainder when 36 is divided by z. 16 Let c(t) = 2*t**3 - 28*t - 21. What is the remainder when c(9) is divided by 9? 6 Suppose -2*b + 3*h = -11 - 42, -2*b = 2*h - 48. Suppose 0 = 4*r + b - 61. Suppose -13*k + r*k + 56 = 0. What is the remainder when 27 is divided by k? 13 Let u(w) = 2*w**2 - w - 17. Let p be u(-5). Suppose 5*h - p = 142. Calculate the remainder when h is divided by 19. 17 Let a = -27 - -34. Suppose k = 8 + a. Calculate the remainder when 59 is divided by k. 14 Let w(i) be the third derivative of -2*i**2 - 1/12*i**4 - 1/6*i**3 + 2/5*i**5 + 0*i + 0. What is the remainder when w(-1) is divided by 7? 4 Suppose -12*c = -0*c - 96. Calculate the remainder when 49 is divided by c. 1 What is the remainder when ((-216)/(-6))/4 + -3 + 99 is divided by 36? 33 Calculate the remainder when 128 is divided by (14/(-8) - 1)/((-121)/968). 18 What is the remainder when 1163 is divided by (-32)/56 - (2196/(-21) + -2)? 103 Suppose 60 = -3*p + 171. Suppose 3*b - 2*f = f + 15, 5*b = 3*f + 21. Suppose 2*t = -2*t - b*w + 46, 0 = -4*w - 8. What is the remainder when p is divided by t? 11 Let r = -4 + 9. What is the remainder when ((-20)/30)/(2/(-48)) is divided by r? 1 What is the remainder when 1767 is divided by (1428/(-119))/(3/(-2))? 7 Let n(j) = 3*j - 11. Let q be n(19). Calculate the remainder when (-140)/105 + 3/(9/q) is divided by 4. 2 Suppose -12*s + 414 = -15*s. Let k = 149 + s. Calculate the remainder when k is divided by 4. 3 Let a = 25 - -28. Suppose a = b + 8. Calculate the remainder when 179 is divided by b. 44 Let x(j) = -j**2 + 1. Let z(f) = 4*f**2 - 7*f - 27. Let k(v) = -5*x(v) - z(v). Calculate the remainder when k(-7) is divided by 12. 10 Let m(b) = -b**3 + 6*b**2 - 2*b + 3. Let q be m(6). Let v = q + 15. Let t(c) = -c**3 + 6*c**2 + 3. What is the remainder when t(5) is divided by v? 4 Suppose 14 = -9*t + 491. What is the remainder when 183 is divided by t? 24 Suppose -t - 40 = -9*t. Let w(o) be the second derivative of o**4/2 + o**3/2 + o**2/2 - o. Calculate the remainder when w(-2) is divided by t. 4 Suppose -2*j + 34 = 4*v, -5*j - 5*v = 14 - 124. Suppose 2*h + 5*t = 136, -2*h + 144 = 2*t + t. Calculate the remainder when h is divided by j. 24 Let j(y) = -y**3 + 14*y**2 - 19. Let d be j(13). Suppose 33*z = 38*z - d. What is the remainder when 178 is divided by z? 28 Let r(b) = -b**3 + 4*b**2 + b - 4. Let y(z) = 2*z + 17. Let s be y(6). Suppose s = -0*g + g. Calculate the remainder when g is divided by r(3). 5 Let b = -1429 - -1588. What is the remainder when b is divided by 6? 3 Let c(z) = 7*z**3 + 2*z**2 - 1. Let g be c(1). Suppose -g*x + 152 = -4*x. What is the remainder when 151 is divided by x? 37 Suppose 15*a - 50 = 11*a - 2*y, 3*a = 5*y + 70. Calculate the remainder when a is divided by 5. 0 Suppose -5*m + 858 = m. Suppose m = 2*l - 117. Calculate the remainder when l is divided by 19. 16 Suppose 5*f - 4*l + 295 = l, -3*l + 291 = -5*f. What is the remainder when f/(-95) - 472/(-5) is divided by 24? 23 Calculate the remainder when 41 is divided by (45 + -5)*99/264. 11 Let a = -74 - -81. What is the remainder when a is divided by 1? 0 Suppose -3*g + 313 - 43 = 0. Let n = 3 + 2. Suppose -n*w = 2*v - 119, -w - 2*v - 9 = -36. What is the remainder when g is divided by w? 21 Let l(h) be the first derivative of -h**3/3 + 3*h**2/2 + 2*h + 2. Let f be l(5). Let o = f + 25. What is the remainder when o is divided by 5? 2 Let q(s) = 22*s - 76. What is the remainder when 893 is divided by q(6)? 53 Suppose 5*f - 4*t - 1970 = -7*t, -4*f + 1544 = -4*t. What is the remainder when f is divided by 28? 27 Suppose -553 = 6*w - 841. Calculate the remainder when 237 is divided by w. 45 Suppose -2 = -u - 5*t + 5, 0 = -5*u + 4*t + 64. Let v = u + -9. Suppose 2*r - v*z = -4, 7*r + 5*z = 3*r + 36. What is the remainder when 14 is divided by r? 2 Let j = -447 - -503. What is the remainder when j is divided by 15? 11 Suppose -8*w + 4*z = -11*w + 114, 2*w - 5*z - 53 = 0. Calculate the remainder when 102 is divided by w. 0 Let z(r) be the second derivative of r**4/4 - 5*r**3/3 - 11*r**2/2 + 35*r. What is the remainder when z(5) is divided by 4? 2 Suppose -52 = -5*n + 98. Calculate the remainder when n is divided by 10/((-30)/9) - -14. 8 Let z(f) = 4 - f - 14*f + 3*f. What is the remainder when z(-9) is divided by 38? 36 Let f = -784 + 1017. What is the remainder when f is divided by 14? 9 Let q = -1924 - -1971. Calculate the remainder when 135 is divided by q. 41 Suppose 0 = -4*o - 11 + 31. Calculate the remainder when 4/10 - 93/(-5) is divided by (-25)/10*(1 - o). 9 Let q be (2 - 35/15)*-57. Let r = 74 + q. Calculate the remainder when r is divided by 19. 17 Let l = -66 - -106. Let i = 46 - l. Let k = -41 + 82. What is the remainder when k is divided by i? 5 Let k = 96 + -201. Let u = -48 - k. Calculate the remainder when u is divided by 20. 17 Let b(h) = -h**3 + 15*h**2. Let f be b(15). Suppose 0 = 6*q - f*q - 24. What is the remainder when 10 + 3 + (-16)/q is divided by 4? 1 Calculate the remainder when 32 is divided by 6 - (-8 + 2)/3. 0 Let z be 396/9*2/8. Let r = z + -3. Suppose f - r = -0*f + g, -g = -4*f + 23. Calculate the remainder when 14 is divided by f. 4 Let b be (-8)/28*(-1 + -6). Suppose q - 97 = -4*n, 135 = -b*n + 7*n + 4*q. What is the remainder when 62 is divided by n? 16 Suppose 5*f + 1 = 4*u - 1, 2*f - 13 = -3*u. Suppose t + 3*t - 9 = -v, -2*t = -f*v - 12. Calculate the remainder when 31 is divided by (-32)/(-3) + v/(-9). 9 Let n(j) be the second derivative of -j**4/12 + 8*j**3/3 + 5*j**2 + 28*j. Calculate the remainder when n(8) is divided by 19. 17 Suppose 0 = 3*b + 2*a - 104, -b - 5*a = -4*a - 34. What is the remainder when b is divided by 14? 8 Suppose 0 = -4*y - 5*o + 76, -2*o = 2*o + 16. Let k be (8/y)/(2/138). Let t = 51 - k. Calculate the remainder when t is divided by 15. 13 Let b be 3 + 13/(104/384). Let h = -1 + 1. Suppose h = z - 0*z - b. What is the remainder when z is divided by 13? 12 Suppos
Ultrastructural immunocytochemical localization of luteinizing hormone-releasing hormone (LH-RH) in the median eminence of the guinea pig. LH-RH was localized at the ultrastructural level in axons and nerve terminals of the median eminence of the male guinea pig. LH-RH positive neuronal profiles were most concentrated in the medial-dorsal aspect of the infundibular stalk and in the post-infundibular median eminence at the level immediately following separation of the stalk from the base of the brain. LH-RH containing axon profiles were most abundant in the palisade zone; nerve terminals in contact with the hypophysial portal vasculature were relatively rare. The hormone was present within granules that measured 900-1,200 A in axons of the palisade zone and 400-800 A in nerve terminals abutting on the portal plexus. The differently sized granules represent heterogeneous populations.
What is really going on in politics? Get our daily email briefing straight to your inbox Sign up Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email Labour faced a fresh anti-Semitism row last night after a speaker at a party conference fringe event called for free speech to extend to holocaust denial. At the same meeting, activists cheered as a speaker called for Jewish and pro-Israel groups to be expelled from the party. Israeli-American author Miko Peled told a conference fringe meeting Labour members should support the freedom to “discuss every issue, whether it’s the holocaust, yes or no, whether it’s Palestine liberation - the entire spectrum. “There should be no limits on the discussion.” Labour MP Wes Streeting said: “This is not a question to which there is any other answer than ‘the holocaust is one of the greatest crimes in human history and this should never happen again. There are plenty of far-right websites where you can peddle hatred. The fringe of the Labour Party isn’t the place to have that discussion.” (Image: REUTERS) A Labour Party spokesperson said: “Labour condemns antisemitism in the strongest possible terms and our NEC unanimously passed tough new rule changes last week. “All groupings in the party should treat one another with respect. We will not tolerate antisemitism or holocaust denial.” Fringe meetings are not run by the party, and Labour say they are not responsible for their content. The meeting was one of hundreds of fringe events held alongside the conference, taking place this week in Brighton, and advertised in the official Labour conference guide. Video Loading Video Unavailable Click to play Tap to play The video will start in 8 Cancel Play now Supporters were ordered not to tweet or take photographs at the Free Speech on Israel (FSOI) event, held on the fringe of Labour Party Conference today, in a bid to avoid “hostile” coverage. Leaflets handed out at the event branded claims of growing anti-Semitism in the UK “hysterical” and a “manufactured moral panic”. During the discussion, Michael Kalmanovitz, a member of the International Jewish Anti-Zionist Network, said the claims were part of a right-wing effort to undermine Jeremy Corbyn and the left. He went on to call for two pro-Israeli groups to be expelled from the party. He said: “The thing is, if you support Israel, you support apartheid. So what is the JLM (Jewish Labour Movement) and Labour Friends of Israel doing in our party? Kick them out.” Loud cheers, applause and calls of “throw them out” erupted in the room of around a hundred activists in response. Jennifer Gerber, director of Labour Friends of Israel, said the event was “beyond disgraceful”. She said: “Supporting the world’s only Jewish state is a mainstream and long-standing Labour position. We hope the Labour Party leadership acts swiftly to condemn those who seek to bully pro-Israel and Jewish members out of the party.” And Jeremy Newmark, Chair of Jewish Labour Movement, said it was “a thinly veiled call to purge Jews from the Labour Party.” He added: “The group whose meeting provided an arena for this hate speech was allowed to advertise it official Party literature. That is far from the zero tolerance on antisemtism that the leadership have promised.”
As integrated circuit devices (e.g., semiconductor devices) become more highly integrated, an associated design rule may be reduced. As a result, the area occupied by the integrated circuit device may also be reduced, which may make it more difficult to form transistors therein. For example, NMOS transistors in a cell region of a memory device and PMOS and NMOS transistors in a peripheral circuit region are fabricated to have predetermined lengths so as to provide the electrical characteristics of these transistors. However, short channel effects associated with the reduced size of the transistors may result in the malfunction of a transistor device. It is known to increase channel length by forming a raised source/drain using selective epitaxial growth. An epitaxy layer can be formed to a predetermined thickness on a portion of substrate where source/drain junctions are formed so that the resultant structure is higher than the substrate (i.e., a raised source/drain structure). The raised source/drain structure can effectively increase the channel length, thereby reducing short channel effects. However, the thickness of the raised source/drain structure can also influence the efficacy of the transistor in other ways. For example, if the raised source/drain structure is too thick, the raised source/drain structure may cause an electrical short between the structure and a gate electrode. On the other hand, if the raised source/drain structure is too thin, the raised source/drain structure may not be effective enough in reducing the short channel effects.
Deterrent behaviour is normal, necessary and acceptable as long as the dog stops when the animal or person backs off. You’ll commonly see adult dogs use deterrent behaviour to warn off or discipline unruly pups or dogs with poor social skills. Although deterrent behaviour is widely accepted in humans, we often don’t afford dogs the same right to communicate their discomfort. Aggression is simply communication. The burning question is where acceptable communication crosses the line into unwanted aggression. For perspective let’s take a look at the ACTT K9 Communications Continuum. Think of canine communication and aggression on the same continuum. In Zone-A, you’ll see normal, healthy communication. Zone-B is where the intensity starts to escalate. Social and confident dogs exist in Zone-A. Under-socialized and fearful dogs live in Zone-B. On a best day scenario when anxiety is low, B dogs live in the center of the continuum and start communicating their discomfort with deterrent behaviour. That’s why they’re perceived as reactive or dogs with a low threshold. A dog can change its communication according to the situation by sliding up and down on the continuum with the intent to prevent conflict. The dog may communicate its discomfort with calming signals in Zone-A, but if those signals aren’t respected the dog’s behaviour will move toward Zone-B into deterrent behaviour. The line between A and B is where the dog flips from mild to more severe deterrent behaviour leading to fear and aggression. Reprimands cripple communication causing the dog to quickly jump to severe behaviour in order to avoid the admonishment. Punishing or allowing severe deterrent behaviour can create an aggressive bully that picks fights. When communication is repeatedly punished it creates a learned helplessness and can trigger a primordial survival instinct manifesting in self-defense behaviours. To prevent or mitigate aggression and shape a confident dog that’s a master communicator: Learn to interpret canine body language Encourage natural communication Teach acceptable deterrent limits The secret to solid communication is socialization and because it’s a skill, the “use it or lose it” rule applies. Dogs should be carefully and thoroughly socialized before four months of age and socialization should continue throughout their lives to keep their skills fine-tuned and prevent aggression.
"So, is this what is meant by 'having a monkey on your back'? I gotta tell ya, from the 'monkey' point of view - this is great fun! Maybe we should fit you for a saddle and get me a little parasol so I can ride in real style." Jayse can almost feel the gnome wince at the thought of trying to carry the man nearly twice his size. "I'll hire some ogres to carry both of us. How does that sound? Either that or I better invest in spells to make me far larger and far stronger." One more chuckle escapes before Jayse's attention focuses back on the dark footing of the run. After a few more minutes, he speaks midstride, "Would you mind holding on tighter? I know you'll get tired, but I need you to bounce around less. It'll conserve my energy better for the long run." Jayse isn't gonna be real talkative after a while. The strain of running through the night with a small person on your back has gotta add up, right? Gotta keep his focus and all that. While not trained in survival, he'll obviously bevlooking for immediate signs of goblin passage, as he'll want to slow down and get quiet if they come up on the goblin pack. If he can, I planned on getting as close to them as possible while stealthed, having Straehan make some kind of distraction, and bolt for the thinnest part of their group (or going around if that looks more promising). My plan is to avoid any kind of fight but to burst past them using Jayse's speed and the gnomes spells. I'm open to Straehan's suggestions as well. Straehan hunkers down and holds on, trying to minimize bouncing. He only lets out a single, well-intentioned "Hya, Mule!" The light is all but gone as the reach the road and Jayse can sprint in earnest. Unfortunately, in the dark night, Jayse's eyesight does him few favors. Only the relative smoothness of the path and some well-timed comments from Straehan as his extra eyes, keep the monk moving at anything approaching his normal speed. As they get used to the rhythms of the night, strange things are clearly afoot. All manner of birds pass them by repeatedly. Birds that should be nesting. Strange, thick fogs billow along either side of the path at times while leaving the path ahead clear. At one point, they hear growly but hushed angry voices off to one side of the road and sounds of splashing. After they pass safely by, Straehan comments that it looked like someone ran afoul of a massive bog that neither of the compatriots recall passing the day before. It is an odd, long, and weary run. Jayse is encouraged when the path widens and he passes the small farms and clear-cut areas on the outskirts of town. They all appear empty, even the livestock is gone. Jayse and Straehan clear the trees, catch a glimpse of the water in the not-too-far distance, and head across the clear patch of sward before the shingle itself. They stop short - greeted by a series of impromptu barricades made from overturned wagons, sandbags, felled logs, and just about anything else from the town heavy enough to pose an impediment. Clearly, Isolde got a message out. It is 2AM. The barricades are manned by Thrane (in full armor), Buli, seven fully equipped and armed guardsmen, and about 15 of the townsfolk, all armed and about a third with light armor. Further back, near the top of the shingle, and along several rooftops, are a band of perhaps 20 townsfolk armed with bows. Still busy so I probably won't be kicking off the battle today - just wanted to set the scene for ya. Jayse, hands on knees and lungs burning with each rushed breath, takes a minute to take in the scene. "So…. looks like Isolde…… got the message through… good deal." He takes a few more long breaths before a nervous itch runs between his shoulder blades. With one last wary look back from where he thinks the goblins will come, he mutters to Straehan, "Well, we might as well get into the defensive perimeter." He moves forward slowly, arms raised up, trying to present as un-aggressive a front as possible while he calls out, "THRANE! BULI! IT'S JAYSE AND STRAEHAN! CAN WE COME INTO TOWN? WE'VE GOT NEWS OF THE WOMAN ISOLDE AND THE GOBLINS!" Thrane waves you over and has water brought, "Son, we heard you were coming. Isolde may not be so friendly but she pegged your arrival to the minute. Your friends are hurrying along too but it looks like the gobbos will get here before them. How much sooner, we don't know. It looks to be an interesting dawn." Jayse speaks between long draws on the water, "Well, it's good the message got through. I guess the run wasn't necessary after all. Did she relay about the friendly goblins?" If Thrane indicates that he doesn't know about them, jayse continues, "Well, some strange things came to light while we were in the field, and it appears that some of the goblins were instigating the attacks and some of them weren't. We have a group of them who have promised to help defend the town against the rogue goblins. The friendly ones will be wearing strips of white or off-white cloth on their temples or arms. They want to help. Please have your people avoid attacking them." he looks back the way he came, "Did her message indicate how long we have before the attack comes?" Thrane leads you both away from the line on the pretext of showing you their preparations. He says quietly, "Son, I'm glad you came." He nods to indicate his lightly armed and armored 'army', "These are good lads. They'll do their best... but they are farmers not fighters. I need all the help I can get. I can use your skills here particularly if your friends arrive late." "Isolde said your people are traveling with goblins. I think maybe she thought they were prisoners. I'll pass the word to leave them be. As for the attack, the H... Isolde couldn't be specific. She's been misleading them for hours now, I guess. She's got a way with nature magic. All she said was that when they come, it'll be straight down the road and we should prepare for that and she'll try to delay them as long as possible." Fin and Ushari finish their healing, headbands, and preparations and then rush off with their ersatz allies through the bush towards the road. The goblins lead the way, familiar with every shortcut between their cave and the path. They move with military precision - sending flankers out to snoop and protect the main group, rotating through the four warriors to prevent exhaustion. You reach the road in a bit less than 2 hours and it is a good thing, because it is full dark and Ushari was beginning to have problems navigating through the dense undergrowth in virtual blackness despite her inordinate dexterity. Once on the road, your run truly begins. The goblins pace you, eyes always on the underbrush, flankers rotating in and out of the formation. Rashgari periodically pulling Ushari back on the right course when nightblindness threatens to lead her astray. Seeing the unnatural fog, bogs, and other inexplicable signs, the goblins mutter to themselves and the flankers stay closer to the main group. Clearly, they are discomfited but they press on relentlessly trying to speed to your destination. Jayse moves to where Thrane indicates he's most likely to be fighting and sits down, back against a barricade. Meditation comes easily after the long, tiring run, and he spends however much time he has preparing his mind and body for the rigors to come, prepping the warm power he can now feel suffusing his limbs. Thrane gets Jayse's attention after he's rested a bit. "I'll tell you what I'm thinking and leave it to you to tell me where you think you can help most or if we should change the barricading a bit to help you fight better." He lays out their plans which are based on assuming a defensive posture and drawing the enemy into narrowing choke-points while covering their flanks as best as possible. strategy and explanations: All the barricades are heavily oiled to prevent easy climbing. If they lose control of the walls, they plan to fire the barricades and fall back. The central barricade is the highest (about 10') and should be immune to scaling. The side barricades are only about 5' high and can be scaled. The obstacles in the field are to slow the goblins down and hopefully funnel them to the two obvious entrances in the barricade. They also serve as the range markers for the archers who have all practiced dropping arrows just beyond the barricade. If the goblins can be bottlenecked and held at the barricade entrances, the archers will keep raining arrows until they are out. If the barricade is lost and fired, the soldiers will retreat to the town limits while the archers fire on the goblins coming through the barricade. If the goblins make it halfway to the shingle, the archers retreat and take up fall back positions near the water. After that, the plan is for the soldiers to hold at the town limits then retreat slowly while the archers cover as best they can. If the goblins keep coming, the soldiers hold and the archers retreat to the waiting boats.... where most of the town's 'non-combatants already wait. If worse comes to worse, the soldiers hold the beach while the remaining boats evacuate or are fired to prevent the goblins from pursuing. Thrane shrugs, "Its not a great plan but its the best we could do on short notice with no additional support. My boys will fight hard. If we can contain the goblins, the regular townsfolk soldiers should be OK. But if we lose a flank or get overrun, I'm not sure if they will be able to remain strong. I'd rather have an orderly retreat than a rout. That's why I've had them build up the side barricades." "I was thinking of having Buli right next to the upper barricade entrance with that pigsticker of his and I was planning on holding the lower entrance M-12 ... but I'm open to suggestions about the fortifications, troop positions, or anything else." Jayse looks over the defenses as the dwarf describes the plan, then shrugs, "It looks like a solid plan, especially given the timetable you've had to construct it. Keep in mind we should try to hold here until Findelgwing, Ushari, and the friendly goblins arrive. That should be enough to break the goblins.. hopefully." He looks over the townspeople preparing for the fight, sensing their unease and fear, then shakes his head. Are these people ready for this? What am I thinking? Am I ready for this? He indicates the northern 'gate' (the opening at J-12/13), "You and Buli should try to hold that entrance. The two of you should be able to choke them there pretty effectively, especially if Buli can make good use of that tree he calls a weapon." He looks at the southern entrance, with its wider stance which might be more exploitable by the smaller and mobile aggressors, "Me and Straehan will try to hold here. I'd say give both entrances a few relief fighters in case myself, Straehan, Buli, or yourself falls. It's a good idea to have some men on these barricades, repelling any climbers, but the rest should be back a few paces, ready to rush whatever section of the barricades," he gestures back to the flanks where the barricades lighten up, "or the gaps that come under heavy attack." He looks at the dwarf, "But I'm not exactly trained for open warfare like this. I can fight, and I'll hold my ground as best I can. But my ideas are uneducated at best." He watches Thrane, obviously expecting him - as the leader of the town - to make the final decision. I'm only suggesting Jayse take the bigger opening because he has a hell-of-a-CMD and Combat Reflexes, which means they either have to 5' step by him or try an acrobatics check vs. 23 to get by. This should slow them down enough for Jayse and Straehan to deal with the numbers. Thrane nods. "I don't want to leave you to hold the wider gap without a bit more assistance than my boys can give you. I'll take a position behind the central barricade, guarding the upper opening. But if you get in trouble, call out and I can be over there quick to help you out, hopefully." "I'm leaving some men in the middle to assist where-ever the fighting gets hottest and to guard our flanks. As for your friends... I hope they get here before the gobbos. I'd rather have them on our side of the barricade. But we've fought gobbos before. We'll hold this barricade until they are swarming us like fleas. I'll give your friends all the time I can." FWIW, Jayse, all the guards along the barricade have swords ready but are currently armed with long-spears to skewer opponents near or on the barricades. Their posts decided, Straehan has certain small areas of the barricade cleared of oil lest he set them on fire with an ill-aimed blast. He then roams among the troops trying to raise spirits and allay fears. Jayse catches snatches of his light commentary: "...Jayse ran all night to get us here - we didn't want you boys having all the fun!" "...we fought a rotting undead beast and skeletons in the goblin's own cave... this troop won't be half so dangerous, don't you worry. We'll kill them all and be drinking ale by lunch. I'm buying." "...scary? We battled a demon once with a pecker bigger than Etta Thrane is tall! Now THAT was scary!" "...don't worry, men. You've a strong barricade, great help - if I say so myself - and our allies will jump them from behind. They don't stand a chance!" After an hour of morale boosting, Straehan sits down heavily by Jayse and gives him a weary grin. He says quietly, "When it starts, give me a moment to armor you with mystic energy." Jayse nods to Straehan's suggestion. "Make sure you keep enough power to keep yourself protected as well." With that, he goes back to his quiet meditation, letting his mind and body reserve energy for the trial to come. Jayse, Straehan, and the fighting men of Forestal sit behind the barricades to rest, conserving their strength. Hours pass before they hear dull clattering in the woods and hushed growls. The temperature drops suddenly and wisps of fog are seen swirling through the trees. blocking all sight save on the road. The men stand up, stretch quietly to loosen up tight muscles, and ready themselves. Buli and Thrane pass among the men issuing whispered instructions. One man waves a flag to the archers at the edge of town who knock bolts and arrows. After a few short minutes, you see a vast group of goblins stagger out of the forest and onto the road,perhaps 30' or 40' from the end of the treeline. They are coated in mud and look as if they have been slogging through a swamp. Despite their haggard appearance, they bear a startling ferocity to their looks. They have come for blood. More goblins pour from the forest onto the road along with a single hobgoblin. He sees the barricade and immediately barks orders, but he really didn't need to. Without thought, the goblins form neat ranks, facing their adversaries. No words are spoken. It is peculiar behavior for skirmish and surprise fighters like goblins. A whisper of concern goes through Forestal's ranks. Thrane just growls, "Steady, boys. Remember who we are defending. Spears ready." As soon as the goblins first appear and starting forming ranks, Straehan casts his spell on Jayse and then himself. Jayse AC: 21"Well, I guess it is about time to pick a fight." He steps out from behind the barricade, a small gnome in front of a great gap in the defensive line. He yells something short and concise in Goblin, similar to what he said in the caves that goaded the goblins there to attack. Thrane guffaws, clearly understanding the language. He says to Jayse and his men, "He's got pluck, I'll give him that. He just said that all their mothers like to read and he taught them to read while they were turning tricks for him in his brothel." The goblins seem all but oblivious to the taunt. Straehan shifts nervously and tries another tack. Accompanying a clearly sexual hip-thrust motion, he bellows, "Igh baszhkak umma 'Dweller in Darkness' saktujg useterek HAI!" A cry of pure rage boils from all the goblins simultaneously and they surge forward, still staying in their precise units. It is like watching chess pieces moved across a board by an unseen hand. Straehan scampers back behind cover, his fear not entirely a sham. He prepares his next spell, saying to Jayse. "Well, we now know the Dweller has an ego." As the goblins pour across the killing field, Jayse reaches for the Calm. As his emotions go silent, Jayse senses the new power in the core of him like a brilliant white-blue pinpoint of light hanging in the center of the Calm. Knowing what he'll find, he reaches his mind towards it, and as he makes contact, a power is unleashed from the light. Like a rush of frozen fire it races from his mind, across the skin of his body towards his right hand… towards the strange stone. Straehan sees the subtlest of smiles appear on his lips just before a brilliant blue light flashes from his hand, igniting into the shape of a long, slightly curved, single-bladed sword with glyphs like those on his hands running from hilt to tip. The sizzling sound of water poured on a hot fire signal the manifesting of the strange pale blue blade, and the dim light of the blade flares slightly… echoed by a quick flare of the same blue in the young man's eyes. As it finishes forming, and the light in the blade and Jayse's eyes dims, Jayse looks over at Straehan for a moment, that small smile still prevalent and speaks in one of hsi strange tongues. The ground thrums with the goblins' charge. Thrane watches the approaching mob and raises a hand to the flagman, holding it steady. At the last moment, when it seems the deafening footfall of the goblins can't get any louder, his hand chops down, the flagman waves, and a second later an impressive number of arrows and crossbow bolts arc over the defenders. Only a few stray shots hit the barricade itself but they are quickly forgotten when compared to the wet sound of arrows striking goblin flesh and the grunts of the wounded. Undaunted, the goblins keep coming - smashing against the barricades and sluicing through the deliberate openings. Some barely reach the barricades before Forestal spears taste their blood. One goblin dies, punctured by an arrow and finished by a guardsman's spear. Thrane sweeps his massive waraxe horizontally across the opening attempting to remove more than one goblin head but the uncanny goblins duck beneath his blow even as one is almost gored on Buli's boar spear. Seeing the loss of nearly a third of the force attacking the southern entrance, the hobgoblin and his group move north, avoiding the arrow-ridden kill zone. The hobgoblin and his frontline draw their bows and fire as the wave of goblins attack the defenders. Goblin arrows plunge into Buli and the townsmen holding the northern barricade. Goblin steel wounds two guardsmen. Jayse receives a glancing blow across his bicep. Looking across the scene, all the defenders are holding but the force directly guarding the northern barricade is weakened and there are many goblins pressing them. Hearing the distant clash of battle, Fin, Ushari, and their new compatriots sprint forward through an unnatural mist and come upon the scene of battle, their presence undetected by the enemy in front of them. Justin: Would Ushari's and my group have had time to cast any spells prior to arriving at our current position? Ideally, I'd like for Fin to have cast expeditious retreat at the first sign of fighting, followed by shield. The double-movement rate of expeditious retreat would easily allow for her to cast those spells and catch-up to where you have her now. EDIT: Apparently Eric wants me to hold-up so Ushari can cast bless. Sheesh! Anyway, since we're all acting at the same initiative order, Fin will go after the bless. :P Seeing and hearing the sound of pitched battle ahead of them, Findelgwing draws her sword in one hand and seems to almost growl something alien under her breath. As she flourishes the blade, the wind seems to swirl around her accelerating the tall girl's movements and deflecting stones and debris kicked-up by those running past her. Casts expeditious retreat and shield. AC 16 + 4 = 20 shield With a burst of speed, she catches up to Ushari and the shaman, quickly surveying the field. At once, her keen elven eyes spot the largest enemy. Charging at the goblin formation like a madwoman, Fin jumps high into the air (8-ft high × 30-ft -long with the below results) vaulting over the goblins in a leaping charge, swinging her sword with all her might as she comes down at him! OK, then Ushari would cast Expeditious Retreat, and Shield of Faith on herself. Ushari slows and sees the main goblin formation ahead. Correctly divining Fin's intention to charge, she lays a hand on her shoulder and takes out her Music Box. Concentrating on the divine symbols flowing in an intricate pattern on the surface, she cries out a phrase of glory, and a holy radiance bursts forth engulfing Fin, Ushari, the Shaman, and their goblin allies with the blessing of divine power. Cast Bless, +1 to all attack rolls, and +1 to saves vs. fear effects. Once done, she draws her bow, nocking an arrow for greeting the goblin invaders. Fin all but hurdles the entire band of goblins, striking at the larger hobgoblin as she rotates a full 180 degrees in the air above him. Her feet slap heavily onto the ground at just about the same instant the hobgob's left ear, cut free by her blow, strikes the earth. Ushari puts the metal box down and takes a small step away. The box rocks energetically. Ushari, recalling that the legs were triggered when Isolde pressed the top button, quickly stoops near the rocking little cube and clicks the top button. The results are immediate: The box springs in the air from the legs popping out from underneath it. The legs are golden, tapered to points and look extremely sharp. It looks like nothing so much as a four-legged, square crab. It quickly spins on its legs as if surveying its surroundings. It turns a side to Ushari where the fine metal filigree seems to have sprung loose from the box's surface. She sees two small red gemstones that look like eyes and the loose filigree appear to be antennae or possibly... eyebrows. They curve into a solid 'V' when facing her. >: The box chitters at her and minces on its claws. It raises a claw and makes a violent slashing motion then points at the various goblins on the field. When Ushari doesn't say anything, unsure what to make of the strange little crustacean, it bounces up and down then stands on its hind legs and moves its front two claws to vaguely gesture towards the entire group of goblins near Fin. It then emits a climbing scale of music. It stops and looks at Ushari. Ushari realizes the crustacean is trying to say something. Something she recalls during her reverie indicates the construct would be useful in assisting in combat distracting its opponents. She no longer hesitates, and points at the group of the goblins currently swarming Fin. Jayse leaps onto a wagon forming the back of the central barricade to assist Thrane and shore up a hole in the defense. Jayse - take the high ground advantage if you strike from here. Thrane is emboldened by how well the battle at the southern barricade has gone and tries to match the feats of destruction being wrought there. "Drive them back lads! Kill them all!" Unfortunately, his deeds do not match his spirit and the men at the north barricade do little more than hold their own against the goblins massed there. The guards at the south barricade bring down yet another goblin with their long spears. Unimpressed by his own and his people's performance, he growls at the flagman, "DAMMIT! Signal the archers - concentrate fire on the north barricade! Arrows rain down but only about half find their mark and one strikes a guardsman in the shoulder. He cries out but holds his position. At the northern barricade, a pair of goblins swing around the flank, slashing up the farmer acting as rear-guard. He cries for help while slowly retreating. The main line of goblins scramble along the barricade, leaping at the defenders, injuring several. Fin's attack is so sudden and timed so well with Rashgari's team's assault that the goblins are thrown into a state of confusion. They surround Fin but their attacks are clumsy and fail to put the tall elf down. Two low blows manage to penetrate her defenses, however, opening gashes along one leg. Vargr, from his hiding spot in the southern wood, sees the small Elf woman get surrounded. He charges immediately moving past the tiny girl and her goblin friends. Fin sees a massive furred creature charge towards her bearing an absolutely huge greatsword. It and his clothing - an armored kilt and a whipping armored leather jacket - are the only things that convince her he isn't a were-lion. She is relieved when his blow crashes down on one of the goblins flanking her. The blow crushes the goblin, driving it into the ground. Ushari notes the strange ccreature who has moved to assist Fin, but can do little to help her for now. She concentrates on helping her goblin escorts stay alive. She waves at Rashgari to hold her ground, and moves away from her escort move to I10 while drawing her bow, and sights carefully on the closest enemy goblin currently engaged with Rashgari's guards. Once she is satisfied with her distance, she once again summons her divine energy to flow out and heal her allies, while leaving the enemy goblins out of the wash of radiant energy. The box hesitates, opting between targets. It scuttles back towards its mistress while playing the incessant tune. The sound build until it crescendos on 'Pop' - emitting a wall of nearly visible sonic force which sweeps over the three attacking goblins. The goblins wince, rocked by ear-bleeding damage. The little box rubs its sharp front claws together and moves towards the goblins... Straehan tumbles through the enemy line and then rakes his claws against the back of the goblin he just passed. His tumbling pass was a little too energetic and his off-balance claw strikes catch only air. Jayse's attention becomes split as he watches one of the farmers look to be in danger on the northern edge at the same time as Fin is pressed by the new furry beast from the forest. Deal with the immediate... Then move to affect what else you can, he thinks as he begins a series of speedy attacks on the goblins just to his north, trying to dance into them to break their push on the wall. I think inserting a 5' step in the middle of a full round action (FOB) is prohibited. If I'm wrong on that, let me know. The closest option would be to 5' step to J-12 then FOB any two of the three targets J-11/I-11/I-12. Without a flanking or some other bonus, your second shot will miss but your first is golden. I'm not against entertaining a rule change here - just saying what I think is RAW. I'm fairly certain I read that it's kosher in Pathfinder. I'll look for an example. The easiest argument I can find, however is in the definition of a free action, which says it takes so little effort that it can be done at any time. Found it. Pg 187. Under Full-round actions, Full-Attacks. I think second paragraph.
INTRODUCTION ============ Uterine cervical cancer is one of the most common malignancies in women worldwide. In the United States, an estimated 12,900 new cases are expected to be diagnosed and 4,100 women are expected to die of cervical cancer in 2015 \[[@B1]\]. Bone metastases are a frequent complication of cancer, occurring in up to 70% of patients with advanced breast or prostate cancer \[[@B2]\]. In contrast, being generally uncommon in cervical cancer and thus, there has been limited information of bone metastasis as a prognostic factor \[[@B3][@B4][@B5][@B6][@B7]\]. Some reports showed that \>60% of cervical cancer patients died within 6 months of being diagnosed with a bone metastasis \[[@B3][@B4]\]. Other reports showed median survival time of 7 to 12 months for cervical cancer patients after diagnosis of a bone metastasis \[[@B5][@B6][@B7]\]. For patients with bone metastasis, prediction of their remaining weeks or months might be important with regard to treatment decisions and quality of life. Katagiri et al. \[[@B8]\] conducted a prospective study based on data of their cohort of 350 cases comprising various primary tumors and proposed a scoring system to estimate the prognosis of patients with bone metastasis. They identified five significant prognostic factors: (1) site of the primary lesion; (2) presence of visceral or cerebral metastases; (3) performance status (Eastern Cooperative Oncology Group \[ECOG\] status 3 or 4); (4) any previous chemotherapy; and (5) multiple bone metastases. Moreover, they proposed a new scoring system incorporating another factor, abnormal laboratory data, based on data of their cohort of 808 cases \[[@B9]\]. Every case was scored from 0 to 10, calculated by adding all individual factors. Survival rates were 98.1%, 74.0%, and 26.9% at 6 months, and 91.4%, 49.3%, and 6.0% at 1 year in patients with scores of 0 to 3, 4 to 6, and 7 to 10, respectively. However, it is unclear whether these results are applicable because there were only nine cases (1.1%) of cervical cancer in their study population. In their scoring system, cervical cancer was classified in the rapid growth group, which included hepatocellular, gastric, and lung carcinomas. We evaluated biological aggressiveness of bone metastasis peculiar to cervical cancer and verified each prognostic factor selected in the Katagiri et al. \[[@B8][@B9]\] study. A prognostic scoring system particular to bone metastasis from cervical cancer was proposed in this study. MATERIALS AND METHODS ===================== 1. Patients {#sec1} ----------- In total, 925 patients were treated for cervical cancer at the National Hospital Organization, Hokkaido Cancer Center from January 1995 to December 2014. Fifty-four patients (5.8%) with skeletal metastasis from cervical cancer were included in the study. The medical records were reviewed, and data at the time of initial presentation, which included age, International Federation of Gynecology and Obstetrics (FIGO) stage, histological subtype, and treatment, were collected. Data at the time of initial progression, namely the progression-free interval, were also investigated. In addition, data at the time of bone metastasis diagnosis, which included spread pattern, presence of extraskeletal metastasis, performance status (evaluated according to the ECOG performance status group \[[@B10]\]), history of any previous radiation or chemotherapy, number of bone metastases, onset time and treatment, were collected. Finally, data regarding clinical outcome were obtained. The local Institutional Review Board and the hospital\'s Ethics Committee approved the study protocol. 2. Diagnosis of bone or extraskeletal metastases {#sec2} ------------------------------------------------ The presence of bone or extraskeletal metastases was determined by biopsy or imaging including bone scans, fluorodeoxyglucose-positron emission tomography, computed tomography, and magnetic resonance imaging. Radiologically abnormal lesions without pathological confirmation found in patients diagnosed with other types of invasive cancer within the previous 5 years were not considered as metastatic tumors. The metastatic status of bone lesions that appeared to be in a gray zone was determined by specialists in orthopedic oncology. 3. Survival analysis {#sec3} -------------------- The primary outcome measure was the survival period after diagnosis of bone metastasis. Eight variables were used for survival analysis and every variable had a binary classification. (1) Histological variant (squamous cell carcinoma vs. non-squamous cell carcinoma); (2) spread pattern (direct invasion from primary tumor or metastatic tumor vs. hematogenous spread); (3) extraskeletal metastasis (no vs. yes); (4) performance status (0 to 2 vs. 3 to 4); (5) history of any previous radiation or chemotherapy (no vs. yes); (6) multiple bone metastases (no vs. yes); (7) progression-free interval (≥12 months vs. \<12 months); and (8) bone metastasis-free interval (≥12 months vs. \<12 months). Skeletal lesions without abnormal imaging findings in the adjacent soft tissues were classified as hematogenous metastases. Previous radiation included all types of radiation therapy including definitive or palliative radiation for primary or metastatic tumors. Progression-free interval was defined as the time from initial presentation to initial progression or death from any cause, which did not depend on the presence or absence of bone metastasis. The bone metastasis-free interval was defined as the time from initial presentation to diagnosis of bone metastasis from cervical cancer. Survival rates were estimated using the Kaplan-Meier method and compared between groups using the log-rank test. Hazard ratios (HRs) and 95% CIs were estimated using the Cox proportional hazards model. A p\<0.05 was considered statistically significant. All analyses were performed using StatView-J ver. 5.0 (SAS Institute, Cary, NC, USA). RESULTS ======= Clinicopathological characteristics of the 54 patients are shown in [Table 1](#T1){ref-type="table"}. A total of nine patients (16.7%) had FIGO (2008) stage I disease, 12 (22.2%) had stage II disease, 12 (22.2%) had stage III disease, and 21 (38.9%) had stage IV disease. Forty-two patients (77.8%) had squamous cell carcinomas. Treatment of primary cervical tumors involved radical surgery followed by radiation or chemotherapy in 10 patients (18.5%). Concurrent chemoradiotherapy was given to eight (14.8%), and eight (14.8%) were given chemotherapy followed by radiotherapy. ###### Profile of patients at the time of initial treatment (n=54) ![](jgo-27-e55-i001) Clinical characteristic No. (%) -------------------------------------------------------------- ---------------------------------- ----------- Age at the time of initial presentation (yr), median (range) 55 (29--91) FIGO stage I 9 (16.7) II 12 (22.2) III 12 (22.2) IV 21 (38.9) Histological cell types Squamous cell carcinoma 42 (77.8) Adenocarcinoma 9 (16.7) Neuroendocrine carcinoma 3 (5.5) Initial treatment to the primary cervical tumor CT alone 4 (7.4) CT followed by RT 8 (14.8) CCRT 8 (14.8) RT alone 7 (13.0) RT followed by CT 1 (1.9) Palliative RT 7 (13.0) Surgery alone 7 (13.0) Surgery followed by RT and/or CT 10 (18.5) CT followed by surgery 2 (3.7) CCRT, concurrent chemoradiotherapy; CT, chemotherapy; FIGO, International Federation of Gynecology and Obstetrics; RT, radiation. Clinical characteristics of the bone metastases are shown in [Table 2](#T2){ref-type="table"}. Bone metastasis occurred by hematogenous spread in \>80% of cases. Fifty patients (92.6%) had extraskeletal metastasis at the time of diagnosis of bone metastasis. Twenty-eight patients (51.9%) had a performance status ≥3. Thirty-nine patients (72.2%) had a history of receiving previous radiation or chemotherapy. Thirty-three patients (61.1%) had multiple bone metastases. Approximately a quarter of bone metastases occurred at the time of initial presentation, another 25% occurred at the time of initial progression, and the remaining half occurred at the subsequent progression. ###### Clinical characteristics of bone metastasis (n=54) ![](jgo-27-e55-i002) Clinical characteristic No. (%) --------------------------------------------------------- -------------------------------------------------------------------- ----------------- ---- Age at the time of bone metastasis (yr), median (range) 55.5 (30--91) Diagnostic tools of bone metastasis Pathological examination 3 Imaging study^\*^ only (the number of imaging study actually used) More than three 10 Two 28 Single 13 Spread pattern Hematogenous spread 44 (81.5) Direct invasion from primary or metastatic tumor 10 (18.5) Extraskeletal metastasis 50 (92.6) Performance status (ECOG)^\*^ 3 or 4 28 (51.9) Previous radiation or chemotherapy 39 (72.2) Multiple bone metastases 33 (61.1) Onset of bone metastasis Initial presentation 13 (24.1) Initial progression 13 (24.1) Second progression 28 (51.9) Progression-free interval (mo), median (range) 8.5 (0--67) Bone metastasis-free interval (mo), median (range) 11.5 (0--107) Treatment to the metastatic bone tumor CT alone 6 (11.1) RT alone 29 (53.8) RT plus CT 4 (7.4) RT plus surgery (spinal fixation) 3 (5.6) Supportive care 10 (18.5) Incomplete RT followed by supportive care 2 (3.7) CT, chemotherapy; ECOG, Eastern Cooperative Oncology Group; RT, radiation. \*Bone scans, fluorodeoxyglucose-positron emission tomography, computed tomography, and magnetic resonance imaging. As for treatment of the metastatic bone tumor, radiotherapy alone was done in 53.8% of cases. Best supportive care was performed in 18.5% of patients. Spinal fixation was performed in three (5.6%) of the patients. As shown in [Fig. 1](#F1){ref-type="fig"}, bone metastasis to the vertebral column was usual. The most common site of bone metastasis was the lumbar spine (51.9%), followed by pelvis (29.6%), thoracic spine (27.8%), cervical spine (16.7%), and sacrum (14.8%). ![Distribution of sites of bone metastasis.](jgo-27-e55-g001){#F1} The Kaplan-Meier curve for the entire cohort is shown in [Fig. 2A](#F2){ref-type="fig"}. The median survival period after diagnosis of bone metastasis was 22 weeks (range, 2 to 207 weeks). The overall rate of survival after diagnosis of bone metastasis of the entire cohort was 64.2% at 13 weeks, 37.2% at 26 weeks, and 15.7% at 52 weeks. ![Kaplan-Meier survival curves after diagnosis of bone metastasis in all 54 patients included in this study (A) and in patients with prognostic scores of 0 to 1, 2, 3, and 4 to 5 (B). The rates of survival for these four groups were significantly different (p\<0.001).](jgo-27-e55-g002){#F2} [Table 3](#T3){ref-type="table"} shows the results of Cox regression analysis of prognostic factors in cervical cancer patients with bone metastasis. The following five factors were confirmed as independent prognostic factors in a multivariate analysis: (1) extraskeletal metastasis (HR, 6.1; 95% CI, 2.2 to 16.6); (2) performance status of 3 to 4 (HR, 7.8; 95% CI, 3.3 to 18.2); (3) previous radiation or chemotherapy (HR, 3.3; 95% CI, 1.4 to 7.8); (4) multiple bone metastases (HR, 1.9; 95% CI, 1.0 to 3.5); (5) bone metastasis-free interval of \<12 months (HR, 2.5; 95% CI, 1.2 to 5.3). A prognostic score was calculated by adding up the number of significant factors and therefore, every case was scored from 0 to 5. ###### Prognostic factors for the survival period after diagnosis of bone metastasis selected using Cox proportional hazards model analysis ![](jgo-27-e55-i003) Characteristic Univariate analysis Multivariate analysis ------------------------------------ --------------------- ----------------------- ----------- --------- ------ ------------ --------- Histology SCC 1.0 NSCC 1.00 0.52-1.92 0.99 Spread pattern Direct invasion 1.0 Hematogenous 0.88 0.44-1.77 0.71 Extraskeletal metastasis No 1.0 1.0 Yes 3.39 1.30-8.86 0.01 6.09 2.24-16.57 0.001 Performance status 0 to 2 1.0 1.0 3 to 4 4.24 2.23-8.06 \<0.001 7.75 3.30-18.18 \<0.001 Previous radiaion or chemotherapy No 1.0 1.0 Yes 0.71 0.38-1.34 0.29 3.27 1.36-7.81 0.08 Multiple bone metastases No 1.0 1.0 Yes 1.45 0.82-2.57 0.21 1.88 1.03-3.45 0.04 Progression-free interval (mo) ≥12 1.0 \<12 1.45 0.82-2.54 0.20 Bone metastasis-free interval (mo) ≥12 1.0 1.0 \<12 2.21 1.22-4.03 0.01 2.48 1.15-5.32 0.02 HR, hazard ratio; NSCC, non-squamous cell carcinoma; SCC, squamous cell carcinoma. [Table 4](#T4){ref-type="table"} shows survival rates according to this scoring system. None had a score of 0 and only three (5.6%) had a score of 1. Each of these survived 17, 20, and 27 months after diagnosis of bone metastasis, respectively. The median survival periods after diagnosis of bone metastasis was 84 weeks for those with a score ≤1, 33 weeks for those with a score of 2, 25 weeks for those with a score of 3, and 13 weeks for those with a score ≥4. The rates of survival for these four subgroups were significantly different (log-rank test, p\<0.001) ([Fig. 2B](#F2){ref-type="fig"}). The 13-week survival rates after diagnosis of bone metastasis were 90.9% for those with a score of 2, 81.3% for those with a score of 3, and 37.5% for those with a score ≥4. The 26-week survival rates were 61.4% for those with a score of 2, 43.8% for those with a score of 3, and 12.5% for those with a score ≥4. The 52-week survival rates were 40.9% for those with a score of 2, 6.3% for those with a score of 3, and 0% for those with a score of ≥4. ###### Prognostic score and survival rate at 13, 26, and 52 weeks after detection of bone metastasis ![](jgo-27-e55-i004) Prognostic score No. of patients Survival rate (%) ------------------ ----------------- ------------------- ------ ------ 0 0 \- \- \- 1 3 100 100 100 2 11 90.9 61.4 40.9 3 16 81.3 43.8 6.3 4 21 38.1 9.5 0 5 3 33.3 33.3 0 DISCUSSION ========== The present study showed a median survival time of 5 months for patients with bone metastasis from cervical cancer, which is consistent with results of some earlier studies \[[@B3][@B4]\], despite others showing median survival times of ≥7 months \[[@B5][@B6][@B7]\]. Indeed, only two patients (3.7%) in our cohort survived more than 2 years. In the scoring system proposed by Katagiri et al. \[[@B8][@B9]\], cervical cancer was classified in the rapid growth group, which included hepatocellular, gastric, and lung carcinomas. Our result concurred with their classification regarding biological aggressiveness of bone metastasis from cervical cancer. For such patients, prediction of their remaining lifespan would allow them to better plan how to live out their final days. There are some options including surgery for the treatment of bone metastasis. Life expectancy of at least two months is usually required before surgery is considered for metastases to the limbs \[[@B11]\], and of three to six months for metastases to the spine \[[@B12][@B13]\]. According to our results, patients with a prognostic score of ≤1 were very good candidates for spinal surgery. However, this group accounted for only 5.6% of the entire cohort. Patients with a prognostic score of 2 might also be good candidates for spinal surgery. Of 11 patients with a prognostic score of 2, seven had any one of cervical, thoracic, or lumbar spine metastases, which accounted for only 13.0% of the entire cohort. Cases of metastases to the spine, for which surgery was the preferred treatment, amounted to only 20% or less of patients with bone metastasis from cervical cancer. Katagiri et al. \[[@B8][@B9]\] identified five significant prognostic factors: (1) site of primary lesion; (2) presence of visceral or cerebral metastases; (3) performance status; (4) any previous chemotherapy; and (5) multiple bone metastases. On the other hand, Kanayama et al. \[[@B7]\] showed that the bone metastasis-free interval was a significant predictor of survival period. All above-mentioned factors independently functioned as significant predictors of survival in the present study; thereby, confirming the reproducibility of results in previous ones. A history of previous radiation or chemotherapy and time to onset (i.e., initial presentation vs. initial or subsequent progression) might have had a combined effect that confounded the analysis. When we included the onset time along with the five significant prognostic factors in the multivariate analysis, five variables were confirmed as independent prognostic factors. These were (1) extraskeletal metastasis (HR, 6.8; 95% CI, 2.4 to 18.7); (2) performance status 3 to 4 (HR, 9.2; 95% CI, 3.8 to 22.2); (3) multiple bone metastases (HR, 2.0; 95% CI, 1.1 to 3.6); (4) bone metastasis-free interval of \<12 months (HR, 3.0; 95% CI, 1.4 to 6.3); and (5) onset time at initial presentation (HR, 0.2; 95% CI, 0.09 to 0.5). A history of previous radiation or chemotherapy was not found to be an independent prognostic factor. We found a significant association between previous chemotherapy and a poorer prognosis (adjusted HR, 2.7; 95% CI, 1.2 to 6.3) after adjusting for extraskeletal metastasis, performance status, multiple bone metastases, and bone metastasis-free interval. Treatment-related factors for bone metastasis were not included in our survival analysis. However, treatment-related factors were unlikely to have influenced our results because there have been no effective drugs that have achieved long-term survival in recurrent cervical cancer patients. The objective of treatment for patients with bone metastasis from cervical cancer is usually symptom palliation. Our study has some limitations. First, the number of patients included in the study was too small to power statistically conclusive results. Second, there was no consistent follow-up policy for diagnosing metastatic bone tumors, and no consistent treatment policy for patients with metastatic bone tumors in our institution. These issues were caused by the fact that ours was a retrospective, observational study conducted at a single institution. Third, impact of each factor on prognosis might differ according to its characteristics. Each five prognostic factor was given equally one point as a score in our scoring system; thus, there is still room for improvement in our scoring system. However, ours was a validation study to confirm the results of a larger, prospective study \[[@B8][@B9]\]. Our finding, in which all previously reported factors were confirmed as prognostic factors in a small-sized cohort, should be considered significant. In addition, our institution is a tertiary cancer center with a division of orthopedic oncology, radiation oncology, and palliative care. Insufficiency fractures or compression fractures were appropriately excluded from our study by physicians who were in charge of orthopedic oncology. Many patients with metastatic bone tumors are referred to our institution in a state in which the primary tumor is unknown. Many patients already treated with standard therapy are referred to our institution for the purpose of palliative treatment including radiation therapy in the latter half of their clinical course. These additional factors also lend support to the validity of our study. In conclusion, classifying cases of bone metastasis from cervical cancer as a rapid growth group is appropriate. Extraskeletal metastasis, performance status, previous radiation or chemotherapy, multiple bone metastases and bone metastasis-free interval might be independent prognostic factors for patients with bone metastasis from cervical cancer. Our scoring system based on these five factors can be used to determine the optimal treatment for patients with bone metastasis from cervical cancer. **Conflict of Interest:** No potential conflict of interest relevant to this article was reported.
A short four minute walk will bring you to premium shopping, restaurants, cinemas, cafes, and the famous Limegrove Center with his collection of fine retailers. Second street bars and the beach are equally as close. Find your perfect holiday condo rental, house rental or apartment rental available today in Ixora at Holetown. Owner Direct has been matching holiday guests with privately-owned condos, apartments and villas since 1994. If you require assistance, please feel free to email us or call anytime between 7am and 9pm (PST), every day of the year.
Q: Cannot fire the DeleteCommand in a Datalist I want to fire the Delete Command in Datalist Control .. but it is not firing .. Help please .. this is my code : protected void DeleteCommand(object source, DataListCommandEventArgs e) { Label2.Text = "hello"; } and This is my html code : <asp:DataList ID="DLImages" runat="server" BorderStyle="None" DataKeyField="fId" RepeatColumns="4" RepeatDirection="Horizontal" ShowFooter="False" ShowHeader="False" OnDeleteCommand="DeleteCommand" onitemdatabound="DLImages_ItemDataBound"> <ItemTemplate> <asp:ImageButton ID="IBDelete" runat="server" BorderStyle="None" CommandName="Delete" ImageUrl="~/Dashboard/Images/dldelete.png" /> </ItemTemplate> </asp:DataList> .. A: Your code looks like OK to me. It should fire the DeleteCommand. But the problem is that I am sure you are binding the Datalist in your page_load event, but not under If(!IsPostBack) condition. What happens when you hit Delete button is your page_load event fires before your DeleteCommand and it rebinds the DataList and your event is lost Your page_load event code should look like... If(!IsPostBack) { DataList binding code goes here...... ........................... } protected void DropDownList2_SelectedIndexChanged(object sender, EventArgs e) { // Bind the DataList here.... }
Hyperbaric oxygen therapy decreases QTc dispersion that increased in CO poisoning. Myocardial injury is a frequent consequence of moderate to severe CO (carbon monoxide) poisoning and a significant predictor of mortality in CO injury. Electrocardiography (ECG) is an easily accessible diagnostic tool for evaluating myocardial damage. Increased QT interval and QT dispersion are related to heterogeneity of regional ventricular repolarization and can develop into arrhythmias. It has been reported that QT interval and QT dispersion increase in patients with CO poisoning. Hyperbaric oxygen (HBO2) therapy has been used successfully in treating patients with CO poisoning. The aim of this study was to investigate change of corrected QT (QTc) interval and QTc dispersion after HBO2 therapy. This study included 31 patients with CO poisoning. QTc dispersion increased in patients with CO poisoning. The mean QTc dispersion was 54.94 milliseconds (ms) on admission. The mean QTc dispersion decreased to 35.74 ms after HBO2 therapy (P=0.003). There was also a correlation between carboxyhemoglobin level and QTc dispersion (P=0.029). HBO2 therapy, which decreases QTc dispersion, may improve the myocardial electrical homogeneity and reduce the risk of ventricular arrhythmia and cardiac death. Physicians should be aware of the effect of HBO2 therapy on myocardial damage when treating patients with CO poisoning. The ECGs should be examined carefully before referring or excluding HBO2 therapy.
// Copyright 2014 The Flutter Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. // @dart = 2.8 import 'package:flutter_test/flutter_test.dart'; import 'package:flutter/widgets.dart'; import 'semantics_tester.dart'; void main() { group('Available semantic scroll actions', () { // Regression tests for https://github.com/flutter/flutter/issues/52032. const int itemCount = 10; const double itemHeight = 150.0; testWidgets('forward vertical', (WidgetTester tester) async { final SemanticsTester semantics = SemanticsTester(tester); final ScrollController controller = ScrollController(); await tester.pumpWidget( Directionality( textDirection: TextDirection.ltr, child: ListView.builder( controller: controller, itemCount: itemCount, itemBuilder: (BuildContext context, int index) { return SizedBox( height: itemHeight, child: Text('Tile $index'), ); }, ), ), ); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollUp])); // Jump to the end. controller.jumpTo(itemCount * itemHeight); await tester.pumpAndSettle(); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollDown])); semantics.dispose(); }); testWidgets('reverse vertical', (WidgetTester tester) async { final SemanticsTester semantics = SemanticsTester(tester); final ScrollController controller = ScrollController(); await tester.pumpWidget( Directionality( textDirection: TextDirection.ltr, child: ListView.builder( reverse: true, controller: controller, itemCount: itemCount, itemBuilder: (BuildContext context, int index) { return SizedBox( height: itemHeight, child: Text('Tile $index'), ); }, ), ), ); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollDown])); // Jump to the end. controller.jumpTo(itemCount * itemHeight); await tester.pumpAndSettle(); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollUp])); semantics.dispose(); }); testWidgets('forward horizontal', (WidgetTester tester) async { final SemanticsTester semantics = SemanticsTester(tester); final ScrollController controller = ScrollController(); await tester.pumpWidget( Directionality( textDirection: TextDirection.ltr, child: ListView.builder( scrollDirection: Axis.horizontal, controller: controller, itemCount: itemCount, itemBuilder: (BuildContext context, int index) { return SizedBox( height: itemHeight, child: Text('Tile $index'), ); }, ), ), ); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollLeft])); // Jump to the end. controller.jumpTo(itemCount * itemHeight); await tester.pumpAndSettle(); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollRight])); semantics.dispose(); }); testWidgets('reverse horizontal', (WidgetTester tester) async { final SemanticsTester semantics = SemanticsTester(tester); final ScrollController controller = ScrollController(); await tester.pumpWidget( Directionality( textDirection: TextDirection.ltr, child: ListView.builder( scrollDirection: Axis.horizontal, reverse: true, controller: controller, itemCount: itemCount, itemBuilder: (BuildContext context, int index) { return SizedBox( height: itemHeight, child: Text('Tile $index'), ); }, ), ), ); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollRight])); // Jump to the end. controller.jumpTo(itemCount * itemHeight); await tester.pumpAndSettle(); expect(semantics, includesNodeWith(actions: <SemanticsAction>[SemanticsAction.scrollLeft])); semantics.dispose(); }); }); }
Q: Using foreach on multidimensinal arrays I tried to use a foreach loop on a multi-dimensional array, and found out that it didn't exactly worked out the way that I expected. Is there a foreach loop for multi-dimensional arrays, or another way to do this? $array[0][0] = "a"; $array[0][1] = "b"; $array[0][2] = "c"; foreach($array as $a) { echo $a."<br>"; } Result: Nothing Needed Result: a b c A: You could also try this: foreach($array[0] as $key => $value){ echo $value . "<br>": } $array in this code you're accessing the key of 0,0,0 so it will not print it. $array[0] in this code you're both accessing key 0,1,2 and the values a,b and c
Superior Industries Shutting Down Plant By Business Journal Staff Wednesday, July 30, 2014 Aluminum wheel manufacturer Superior Industries International Inc. announced Wednesday it would close its Arkansas plant by the end of the year as it prepares to open a fourth plant in Mexico next year. The closure of the plant in Rogers will result in the loss of 500 jobs and leaves the Van Nuys company with just a single U.S. manufacturing plant, in Fayetteville, Ark., and three other plants in Chihuahua, Mexico. Superior is building a $135 million state of the art plant in Chihuahua, the capital of Chihuahua, a northern state that borders Texas and New Mexico. The company has been there for more than 20 years and expects the plant to open next year. Superior Chief Executive Don Stebbins said the decision to shutter the Rogers plant came after a review of the company’s cost position in what continues to be a competitive environment. “Our board and management team remain focused on building an efficient, operationally stronger organization that can compete effectively with manufacturers around the globe,” Stebbins said in a prepared statement. The company expects to save $15 million in labor costs through the closure. It also values the manufacturing equipment and assets at $22 million. The company did not state whether it plans to sell the assets or transfer some or all to its other plants. The moves come as the company finds itself in a proxy battle over the makeup of its board of directors. Gamco Asset Management Inc. of Rye, N.Y. wants to put three members on the seven-member board at the Aug. 15 annual meeting. Shares closed down 16 cents, or a fraction of a percent, to $20.15 on the New York Stock Exchange.
To see an alternative policy for the Middle East–presented four years ago and still timely, see: It is likely that the efforts of the Obama Administration during its second term will fail, not only because of its lack of understanding of the region and its ideology but also due to the specific agenda. NO MIDDLE EASTERN COUNTRY OR MOVEMENT–ONLY HOSTILE ONES–CAN DEPEND ON THE UNITED STATES. And to clarify this further: NO COUNTRY–INCLUDING ISRAEL–CAN DEPEND ON THE OBAMA ADMINISTRATION. But as I noted above, this U.S. policy of Obama’s second term will fail. For example, the main goals of the second term are four big issues: –Israel-Palestinian peace –Egypt government coalition with Muslim Brotherhood –Syrian civil war resolution with rebel victory –U.S.-Iran rapprochement resolving nuclear issue. Yet because of irreconcilable differences, these may well be unresolvable. Due to such failures and hardline radical positions (Palestinians, Muslim Brotherhood, Syrian Islamists and regime, Iranian regime), the next administration would probably be forced back on recognition of extremism, support of allies, and U.S. interests. Thus, regarding the “peace process,” we may well see the typical pattern in which the Palestinians wreck the peace process by rejecting or demanding even more concessions. Once again, it will only be necessary to wait until American negotiators learn better why their goals are impossible. Radicals will just raise their demands and demonstrate their anti-Americanism, and necessary priorities will shift. The difference this time would be that the policymakers would not learn until the next president. Yet there are other reasons for hope, too, and these must be integrated into the strategies of would-be allies of the United States. These include several points: –Since U .S. policies do not take into proper account the legitimate interests of allies, a greater element of defiance will be necessary. With the Saudis, for example, they had to rescue the client regime in Bahrain, because the Obama Administration refused, step in and subsidize the coup regime in Egypt and subsidize the Lebanese opposition. Countries must be ready for a higher level of potential friction with the Obama Administration, which will not damage future foreign policy when the time comes that the current president will be replaced by a different Democratic or Republican one. –When required to make a tactical retreat due to lack of U.S. support, it should be stretched out, because the clock is ticking on January 2017. –Of course the clock is ticking too on wasted time. Iran will be closer to having nuclear weapons, for instance, but that just indicates the actual harm done by the Obama Administration policies. Islamists will also be stronger than would have been true otherwise. This was, however, not true in Egypt, where there was local resistance backed by Saudi Arabia and other Gulf countries. –The creation of parallel alliances and what might be called objective alliances, which can include countries that are nominal enemies. These include building bonds with Asia, including China and India, as powers. In other words, if America will not play a leading or supportive role, others must be found to do so. But the most important single factor is the genie offer. In this scenario, a genie appears and offers the beneficiary three wishes, but with each one, the genie gives his enemy twice that amount. Okay, says the clever man, I want to go half bankrupt. (This would make his rival fully bankrupt.) This is not a joke. The instability, bad economic policies, adventurous actions, and other temptations that American weakness and error lured one into are counterproductive and self-damaging. The best examples are the Muslim Brotherhood’s management of politics and the Palestinians’ overplaying of their hand to lose a real chance to get an independent state. And Syria wrecking itself with Islamists and radical nationalists killing each other. You could call this the “Home Alone strategy,” which is going to be needed by would-be U.S. allies–at least until responsible adults show up to direct U.S. foreign policy. And that will take at least another 3 years and 4 months. About the Author:Professor Barry Rubin is director of the Global Research in International Affairs (GLORIA) Center and editor of the Middle East Review of International Affairs (MERIA) Journal. See the GLORIA/MERIA site at www.gloria-center.org. If you don't see your comment after publishing it, refresh the page. Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost. If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked. 6 Responses to “The Solution: How to Deal with Obama Middle East Policy” america will not flourish during these next few years. we’d be lucky if we survived. obama has no policies because he’s vacant. no interior resolve informs him. he just goes with whatever is popular and since that is jew hating that’s where he goes. he is mendacious but he’s also dumber than he is evil. somehow that makes matters even worse. Rubin is right on target, mostly, but the real 400-point gorilla in the room – there are actually two of them – are these: 1. Obviously, the Iran nuke weapons program. This is Obama primary coercive tool in forcing Israel to capitulate on the Pali issue. He won't give it up easily. But this is an existential issue for Israel. She is going to have to act decisively before it is too late…if it isn't already too late. And this will provoke maximum friction with Obama…but Netanyahu has to 'gut it up" anyway. 2. If Israel does not "cry uncle" on a bogus peace [surrender] deal with the PA, then Obama's "plan B" is not only to let Iran go nuclear and put maximum pressure on Israel not to do anything decisive about this, but also, he'll abandon Israel to the wolves in the UN (i.e., the Arab/Islamist Petrodollar Brothel, New York City Branch). So, Israel not only has to be prepared to hit Iran, but also to fiercely put down Intifada Three, with all the attendant consequences. Israel, more than anyone else, is going to have to risk "increased friction" – the understatement of the century – from the U.S. under Obama in the pursuit of her vital and legitimate interests. Thanks a great big heap, my fellow Jewish Americans who voted for Obama in droves both times, who gave him big bucks, etc., etc. I don't know if you all bear central responsibility for putting Obama in office – I tend to doubt that, as I see him as more the crowning achievement of the Arab/Islamist Petrodllar Pimp Empire – but IF you are, then it would not surprise me if our G-d got fed up and decided to let Israel fall. Far be it for me to interpret His will and design, but it seems to me like anything is possible now. I'm so used to things getting worse and worse where Israeli relations with the U.S. are concerned, that it is hard now for me to imagine them getting better before it is too late. Israel should not give up, the iranian issues are to late, this was Obama's work, he didn't wanted a strike to Iran, (the same now in Syria), also he wants that Iran has nukes, so the stupid is Netanyahu, should now that, he should remouved now with his leckayers before is to late. Israel should not give up, the iranian issues are to late, this was Obama's work, he didn't wanted a strike to Iran, (the same now in Syria), also he wants that Iran has nukes, so the stupid is Netanyahu, should now that, he should remouved now with his leckayers before is to late. {Originally posted to author’s website, FirstOne Through} TRUST Trust is the bedrock of a functional relationship. It enables one party to rely on the other. A trust that includes both intention and capability permits a sharing of responsibility and workload. The relationship between US President Obama and Israeli Prime Minister Netanyahu started off badly and further […] Erica Pelman is a spiritually-driven woman. She is founder and director of “In Shifra’s Arms” (ISA), an organization that offers aid to pregnant Jewish women of all religious backgrounds practically, financially and emotionally. Its arms are open to any pregnant woman in need whether single, divorced, separated, or from a financially-strapped family. “Presently, we are […]
Free download college textbooks PDFs Menu Future of Business The Essentials. This book has been written by the author (s): Gitman, Lawrence J., McDani. The corresponding ISBN code of this free to download book is 9780324542790. If this is not the free college textbook you are looking for, we invite you to try searching for it through the search input of our site, either by typing in the ISBN code for the book, the names of the authors or just the title. To download scroll down to the end of the page and click the download button. Future of Business The Essentials is part of the Business & Economics category. This website aims to help you find thousands of the best college textbooks from every college/university subjet you might have. These categories include Business & Economics Textbooks, Computers, Design, Art and History, Law, Self Help and thousands more. We try to post new content daily so we invite you to come check us out from time to time.
{ "name": "Laowa 24mm f/14 2X Macro Probe", "description": "A macro lens.", "url": "https://www.venuslens.net/product/laowa-24mm-f-14-2x-macro-probe/" }
Despite challenges, Canndescent has become the first cannabis-related company to put forward a commercial scale solar project. Intending to begin a wave of sustainable, environmentally responsible, and sustainable business practices in the cannabis industry, Canndescent is bringing a deeper shade of green to this green industry. However, Canndescent is no stranger to firsts. In fact, the company has set out to be an industry leader, breaking boundaries and stereotypes. The company became the first California-based cannabis company to achieve fully compliant banking. They were also the first company to begin marketing cannabis products by effects, breaking away from the popular strain marketing techniques. Now, in 2019, Canndescent is placed as one of the top flower brands in California. CannabisTech spoke to Canndescent’s Chief Financial Officer, Tom Digiovanni, about their green initiatives, the challenges they faced and the benefits reaped by utilizing renewable energy. Why the Transition to Solar Power? Canndescent has been molded on a foundation of transparent business practices and noble ideals. The commercial grow facilities are energy intensive, and the company sought out a solution to reduce this environmental impact. “We know that because we grow indoors. These facilities are fairly power intensive. And we wanted to offset how much power we use from the grid,” DiGiovanni stated. “And so, from the outset, the time that we put the facility together and opened it we were looking for an alternative energy solution. And it took a while to get it done. But, you know, we wanted to be the first one in the country actually to do site-specific solar,” he continued. It is estimated that 1% of America’s power goes towards producing hemp and cannabis. To reduce their portion of this, Canndescent began seeking out funding for their unique solar project to adopt a source of renewable energy. The Challenges Unique to the Cannabis Industry DiGiovanni explained, “One of the challenges to get solar done in this industry, unlike any other industry is that it's really difficult to get somebody to fund these projects for you, and any other industry project financing for solar projects is relatively easy to come by. In cannabis that's not the case, it's been extremely frustrating because we want to do the right thing by the environment, we care about the environment that we all live in. We care about our carbon footprint, and we want to do things to reduce it. And so, you know, that's been the big challenge for this system.” In most other industries, securing funding for solar projects is relatively easy. In the cannabis industry, DiGiovanni points out that this is not the case. PACE funding, Property Assessed Clean Energy, is a reasonably common avenue to secure this funding. However, after the coal memo was pulled in 2017/2018, investors began to be unsure about the security of investing in the industry, DiGiovanni said, “Now that Jeff Sessions is gone, and the perceived risk in the industry might be a little bit lower than it was at the beginning of last year, right so if paste funding comes back for the industry then that will be an avenue that a lot of people. I know from my time in the summer and PACE projects, particularly in California, the loss rate for lenders using page is about point 3% so I mean these things are really, really secured loans that people don't walk away from. So, I hope that comes back because I'd like to see a lot of other cannabis companies go solar.” The Benefits of Going Solar Aside from lessening the carbon footprint, there are other benefits with the switch to solar: Drop in peak energy use. Canndescent’s peak energy use has dropped by as much as 54%. Drop in operating costs due to lower energy usage Canndescent has used the solar panels to shade the buildings, lessening the load on the HC AV systems Looking Ahead: What’s in Canndescent’s Future? At present, the system is offsetting approximately 50% of its peak load, and due to site size limitations, using solar panels to offset 100% of the load was not an option. Since Canndescent grows hydroponically, not much water is used either. However, there are other sustainable options the team at Canndescent is looking at for future projects. To reduce the power usage inside the facility, LED lighting and other projects are beginning to materialize. There are two more sites located nearby Palm Springs, one of which is beginning transformed into using 100% sustainable energy by using sustainable lighting and all four walls for solar. Addressing another Sustainable Hurdle LED lighting is a tantalizing option to reduce a company’s carbon footprint. However; there is one major problem; the risk of lower crop yields, which means a threat to profits. This risk has prevented many companies from moving towards this more environmentally responsible lighting system. However, with Canndescent’s partnership with Southern California Edison, they could unearth some new developments. “We're also working with Southern California Edison right now. They've asked us to do some research and development on LED lights. And there's a potential funding process that they're going to provide us some funds to take a couple of our grow rooms, convert them to LED and see what kind of yields, from a harvest perspective, they get out of the LED lights.” The transition to a fully environmentally responsible facility is not smooth for most, and as we’ve seen so far, in the cannabis industry, it is even more challenging. However, it is not impossible. Canndescent is an example to the industry, showing that with determination, it can be done. “It’s been on the one hand a labor of love, and on the other hand, it's been kind of an effort through sheer force of will we made this happen. And it's, it's, it's one of those things that it's been relatively frustrating because it should have been a lot easier to get this project done. And I really hope that Congress passes to save Banking Act, or opens a path to banking because that will also open a pass the project finance, and you'll see a lot of other cannabis companies start to do this because I know we're not the only company having a conversation. And, of course, it helps when you're lowering your operating expenses. But we also, obviously we live in the environment too, and we're super mindful of that. And we want to be a good steward of the environment. “ For any questions regarding financing for solar initiatives or attaining renewable energy goals, Canndescent encourages people to reach out and ask for help or further information.
from __future__ import absolute_import from __future__ import division from __future__ import print_function
7 Effective tips how to leave healthy life Eating is the most basic and fundamental way of obtaining nutrients from the outside world into the body. These nutrients are used by the body for growth and development including the development of your immune system. However, to get the best nutrients, you must know the right food and amount you need to take for growth and development to take place effectively. That is exactly what this article is all about. If you have been looking for healthy eating tips, here are seven of them, read on! 1. Base your meals on carbohydrates Carbohydrates, also known as energy giving foods should always be included in your meals. Such meals that provide enough starch include bread, rice, pasta, and noodles to mention a few. Whole grains that contain fibre is also good for the digestion of food. It is advisable to obtain half the calories you get from carbohydrates rather than from fats. 2. Consume a variety of Foods Different nutrients have different importance in the growth and development of the body. You, therefore, need a variety of such nutrients to ensure that growth in your body takes place effectively. Apparently, your body needs more than 40 different nutrients to ensure good health full functionality. You need vitamins for improved immunity, proteins to build your body and carbohydrates to give you energy. 3. Include fruits and vegetables in your meals Fruits are a great source of vitamins. As stated earlier, your body needs vitamins to improve its immunity from disease-causing germs. Consumption of fruit when having a meal is a good way of implementing a culture of eating fruits. Most people overlook the importance of eating fruits without knowing the actual benefits of doing so. Vegetables are also a great source of plant vitamins and minerals that aid the process of naturally immunizing the body. 4. Cut the consumption of fats and sugar While we should consume some fats for the various importance like provision of fatty acids, we should limit our consumption to prevent gaining weight. Weight is easily gained from the consumption of fats since they provide more than twice the amount of calories we get from carbohydrates. The good news is, we still can get the necessary fatty acids from substitute fats like vegetable oil, nuts, avocados, and oily fish rather than from cream, cheese, and butter. A lot of sugar is known as the major cause of tooth decay and increased calories. Manage the consumption at a low level. 5. Eat regularly but moderately Having every meal at the right time is good for the development of the body. Skipping meals or consuming them at delayed times is discouraged since the increased hunger pangs will lead to rapid eating without concentration of what you are consuming. Learn to keep your portions moderate. In cases of plenty of food, share with someone. 6. Drink plenty of water Water forms a large percentage of our bodies. During the day, when in our everyday businesses, we lose a lot of water through dehydration. As such, it is mandatory that we replace the lost water by drinking at least 1.5 litres per day. Other drinks like soft drinks, milk coffee, and tea can also add water levels in our bodies. 7. Do a lot of Exercises A lot of junk calories in our bodies can lead to increased weights and increase the risk of heart-related problems. To ensure that you burn any extra calories, engage in physical activities on the field or indoors that will get you sweating. Include an average of 75 minutes into your daily schedule for physical exercises. It is also good for blood circulation.
WGA and Hollywood studios reach deal on new contract wga Richard Verrier The Writers Guild of America and Hollywood's major studios have reached agreement on a new three-year contract for film and TV writers. After a final two-day session of negotiations that ended late Tuesday night, the guild and the Alliance of Motion Picture and Television Producers agreed on a tentative deal to replace one that expires May 1, a source close to the negotiations said. The proposed contract is subject to approval by the guild's members on the east and west coasts. Representatives of the WGA and the producers alliance declined to comment. The guild was expected to issue a statement later Wednesday to members outlining details of the agreement. Talks, which began Feb. 3, were suspended twice last month and resumed Monday after the sides reached agreement on all but one sticking point. The guild had objected to a growing industry practice of requiring writers to be "exclusive" to a program during a show's hiatus at a time when many shows have shorter seasons. Negotiations got off to a tense start in early February when WGA representatives accused the producers alliance of seeking $60 million in "rollbacks" from writers, including cuts in the union's health and pension plans as well as reductions in pay rates for screenplays and TV residuals. Although neither side has publicly commented on the negotiations, the WGA has told members it is seeking to improve pay levels for writers who work on basic cable shows and preserve health and pension benefits, among other goals. The new agreement is expected to be patterned after a contract recently negotiated by the Directors Guild of America. That contract, ratified in November, included modest increases in wages, residuals and significant new pay terms for work in new media. That agreement was negotiated seven months before the contract was set to expire. In an email to members issued Wednesday night, union negotiators hailed the agreement: "The three-year deal features increases to our minimum compensation rates, increased contributions to our Pension Plan, minimums for subscription video-on-demand programs, increased residuals for ad-supported streaming, outsized increases in script minimums for one-hour basic cable writers, and a doubling of the theatrical script publication fee,'' said the statement from Chip Johannessen and Billy RayCo-Chairs of the 2014 WGA Negotiating Committee. "Importantly, we have now placed limits on the options and exclusivity requirements often imposed on episodic television writers," the statement continued. "Our negotiations on these issues were complicated and protracted, but the companies worked with us to find solutions. As a result, the endless unpaid holds that have become more and more commonplace in television have now been addressed in the MBA (minimum basic agreement) for the first time ever." As expected, the pact includes 3% annual wages increase, 5% annual increases in script minimums for hour-long dramatic basic cable rates, and a 0.5% increase in the contribution to the pension fund. The agreement also includes higher payments for ad-supported online streaming and reduces the free streaming window -- the period when no residuals are paid -- from 17 days to seven days for most programs in the first seven episodes of a series, the union leaders said.
Main menu Tag Archives: Tired Post navigation I’m struggling today. I need to write how I feel because it helps me and maybe in helping myself I can help you too? The anxiety isn’t as severe as it has been. It’s a manageable 6/10 but my numerous annoying ailments have decided to come out and play at the same time. My neck is sore. My tinnitus is driving me INSANE and I have the beginnings of yet another migraine. I try to look at the positives. As in, I’m still alive. I wasn’t one of the 151,600 people in the world that died yesterday. I’m still here. Yet it’s like trying to drive on a flat tyre. Only in my case, a new tyre isn’t an option. The tyre represents my brain and I can’t just go out and buy a new brain. Unless Ebay have started selling brains? A lot of the things I am experiencing today are not actually anxiety symptoms. I’m 47, therefore it’s natural for there to be wear and tear, especially as most of my jobs were heavy manual work. I’m only five foot one with a small frame so I’ve put a lot of strain on my body over the years. What can I say? You do what you have to do to put food on the table. Due to my autism, these little annoyances become amplified and it has to be said that anxiety, while it doesn’t cause them, DOES make them feel worse. Stress hormones affect the bones and joints and I’ve always noticed that when I go through a phase of increased anxiety – my aliments are worse. Obviously, the answer is to address my anxiety and all these other things should start to improve. This doesn’t mean that I don’t feel pissed off though. I’ve forgotten what it is to feel ‘well’ because it’s been that long since I felt that way. Another thing that pisses me off is that I never appreciated good health when I had it. I used to hear older people say, ‘You don’t appreciate good health until it’s gone’. Too farking true, me dears. I get it. I’m middle-aged, post-menopausal and slightly mad. How can I expect to feel like I did in my twenties or thirties? I’m lacking the necessary hormones for a start. My body is crumbling like Cheshire cheese. I’m getting older and let me tell you that it comes around TOO DAMN FAST. It seems like yesterday that I was snogging Nick Rhodes on my bedroom wall. Now I can see 50 waving at me (hopefully) and with that comes the realisation that I am well over half way through my life, if the three score years and ten is to be believed? Sobering thought, eh? Enough to make one want to pissed, only I can’t drink because I have ANXIETY. Another way of looking at it and probably THE best way is not to mourn my youth but to thank my stars that I have a decent amount of life to look back on. Health wise, that is. I lost my friend to cancer last year. She was one year older than me with so much more to give, especially to her eight year old son. When I think of what she went through it makes me guilty about whinging on about stuff. She’d have given anything for my problems to be hers instead of the cancer which was invading her body at an alarming rate. However, if you are reading this and thinking that her death should have been enough to make me ‘get a grip’, then my friend, you have NEVER experienced anxiety disorder because it is an illness. I’m not talking about the normal anxiety that every human being experiences, like the nervousness before a job interview or those few seconds after you hear a loud bang. I’m talking about the kind of anxiety that’s debilitating and destructive. It’s a very real illness. Just not one that can be seen. It’s effects, however, are visible to all. If you look close enough, you will see the fear in their eyes. You will see the tremor in their hands. You will notice their inability to be still. If you are sensitive enough, you may even smell their fear. These are the outer signs of a body that’s fucked up due to stress. Thankfully, I know that recovery from mental illness is achievable for most of us and if it can’t be cured, it can definitely be managed to give quality of life. That thought acts as a light when my skies are dark. Another light comes in the form of my children. A funny text or a phone call from my eldest boys. Or today when I woke up to a dark inner sky. A sleepy voice said, “Cuddle me mama?” and some of those dark clouds lifted. Not enough to make all of this sodding crap go away but enough for me to have the energy and will to keep fighting it. If you are struggling with anxiety, know this. You will win some battles and you will lose some but you CAN win the war. It really isn’t about how many times you fall down but about how many times you get up again. I know you are tired. I know your soul is weary but KEEP GETTING UP. Even when your legs feel so heavy you don’t think they can support you. THEY WILL. They are STRONGER than you think. YOU are stronger than you think. Rest if you need to but then you must get back up. Life is a show and we must get on with it as best we can because this isn’t the rehearsal. There never was one in this show called ‘Life’. So, do that pile of ironing, even if it you do it sitting down and it takes you ALL DAY. Walk the dog. Hoover up. ON WITH THE SHOW! The show must go onI’ll face it with a grinI’m never giving inOn with the show.
Enjoy this elegant porcelain Basenji Dog Tea Cup with a fine art design. The beautiful Basenji Dog Tea Cup is a must for the serious dog fancier and Basenji Dog owner. Each Basenji Dog Figurine is made of fiberglass resin, is hand painted, and is a wonderful representation of your favorite dog breed. If you have more than one dog, we carry over 130 different dog figurines or other dog gifts. BASENJI DOG TEA CUP (BTC70) #BTC70 2.5"L x 3"H x 2.5"W $12.99 Qty to Buy: WARNING: Choking Hazard - Contains small parts. Not for children under 3 yrs. of age.
April 19, 2012: Last month, when the sun unleashed the most intense radiation storm since 2003, peppering satellites with charged particles and igniting strong auroras around both poles, a group of high school students in Bishop, California, knew just what to do. They launched a rubber chicken. The students inflated a helium balloon and used it to send the fowl, named "Camilla," to an altitude of 120,000 ft where she was exposed to high-energy solar protons at point blank range. Many space enthusiasts are already familiar with Camilla. She's the mascot of NASA's Solar Dynamics Observatory. With help from her keeper, Romeo Durscher of Stanford University, Camilla corresponds with more than 20,000 followers on Twitter, Facebook, and Google+, filling them in on the latest results from NASA's heliophysics missions.
ROM2F/2007/10\ MIFP-07-16\ hep-th/yymmddd\ [Real Forms of Complex Higher Spin\ Field Equations and New Exact Solutions]{} Carlo Iazeolla${}^{1,2}$, Ergin Sezgin${}^{3}$ and Per Sundell${}^{2}$\ [${}^{1}$[*[Dipartimento di Fisica, Università di Roma “Tor Vergata"]{}*]{}\ [*[INFN, Sezione di Roma “Tor Vergata" ]{}*]{}\ [*[Via della Ricerca Scientifica 1, 00133 Roma, Italy ]{}*]{}\ ${}^{2}$[*Scuola Normale Superiore and INFN\ Piazza dei Cavalieri 7, 56100 Pisa, Italy*]{}\ ${}^3$[*George P. and Cynthia W. Mitchell Institute for Fundamental Physics\ Texas A&M University\ College Station, TX 77843-4242, USA*]{}]{} We formulate four dimensional higher spin gauge theories in spacetimes with signature $(4-p,p)$ and nonvanishing cosmological constant. Among them are chiral models in Euclidean $(4,0)$ and Kleinian $(2,2)$ signature involving half-flat gauge fields. Apart from the maximally symmetric solutions, including de Sitter spacetime, we find: (a) $SO(4-p,p)$ invariant deformations, depending on a continuous and infinitely many discrete parameters, including a degenerate metric of rank one; (b) non-maximally symmetric solutions with vanishing Weyl tensors and higher spin gauge fields, that differ from the maximally symmetric solutions in the auxiliary field sector; and (c) solutions of the chiral models furnishing higher spin generalizations of Type D gravitational instantons, with an infinite tower of Weyl tensors proportional to totally symmetric products of two principal spinors. These are apparently the first exact 4D solutions with non-vanishing massless higher spin fields. \[sec:in\] Given the impact Yang-Mills theory and Gravity have had on the development towards our present understanding of fundamental interactions, as formulated within Quantum Field Theory (QFT) and to some extent String Field Theory (SFT), it is natural to explore higher spin (HS) extensions of gauge symmetries (*i.e.* non-abelian gauge groups containing generators in representations of the Lorentz group with spins higher than one). Presently, the only known full models of interacting higher-spin gauge fields are those based on the Vasiliev equations [@vasiliev]. These equations are naturally formulated in terms of $SL(2;\Comp)$ spinor oscillators in Lorentzian signature $(3,1)$. In this paper, we shall formulate them using spinor oscillators in Euclidean signature $(4,0)$ and Kleinian signature $(2,2)$ as well, and present nontrivial exact solutions with novel properties such as the excitation of all higher spin fields. Before we state our motivations for this work, let us first highlight some key elements of the HS theory. To begin with, the Vasiliev equations that describe the HS theory involve two features that are relatively novel from the point-of-view of lower-spin QFT as well as the standard formulation of SFT. Firstly, they are written in a frame-like language, closely related to the constraint formulation of supergravity, known as free differential algebra (FDA), or unfolded dynamics. Here, *all* fields are differential forms, which live on an *a priori* unspecified base manifold. Moreover, for *each* differential form there is a, in general non-linear, differential constraint, written using the exterior derivative (and no contractions of curved indices using the metric). Thus, diffeomorphism invariance is manifest without the need to single out a metric or other component field. Secondly, in order to accommodate an infinite number of physical as well as auxiliary fields, one works with master fields that, in addition to being differential forms, are functions of oscillator variables. The functions belong to, or, depending on taste, define a fiber over the base manifold consisting of representations of an underlying non-abelian higher-spin algebra. In particular, the master zero-form is directly related to the (massless) spectrum via the theorem of Flato and Fronsdal [@Flato:1978qz]. One may go further and associate the oscillators to a particle or other extended objects, perhaps related to discretization of tensionless strings and membranes in AdS [@Engquist:2007vj], though these considerations are of course not crucial for setting up Vasiliev’s formalism. The simplest higher spin gauge theories of Vasiliev type, and indeed the first ones to appear in the literature [@vasiliev], are based on higher-spin extensions of $SO(3,2)$ realized using oscillators that are $SL(2,\Comp)$ doublets (coordinatizing the phase space of Dirac’s $Sp(4)$ singleton). Here, the [*master fields*]{} are an adjoint [*one-form*]{} and a twisted-adjoint [*zero-form*]{}, sometimes referred to as the Weyl zero-form. The master field equations, which we again stress are manifestly background independent and diffeomorphism invariant, can then be written on a remarkably simple closed form. These equations can be treated in two almost opposite ways, namely by projecting to the fiber or by projecting to the base. In the latter case one can make contact with lower-spin field theory by taking the base manifold to be an ordinary spacetime and eliminate the auxiliary fields, treating *only* the Lorentz connection and the vierbein exactly. This well-defined, albeit tedious, approach yields manifestly reparametrization and locally Lorentz invariant physical field equations in a perturbative expansion in curvatures as well as higher-spin gauge fields. The projection to the fiber, on the other hand, is a more tractable operation, since the Vasiliev equations can be solved locally on the base manifold using gauge functions [@Prokushkin:1998bq]. This leaves equations on the non-commutative fiber, which are thus purely algebraic from the point-of-view of the base manifold. The simplest exact solution to these equations is the four-dimensional anti-de Sitter spacetime. In a recent paper, [@Sezgin:2005pv], we have given an exact $SO(3,1)$-invariant solution to these equations. The solution describes a locally time-dependent solution with a local space-like singularity that can be resolved by the method of patches. The solution is asymptotically AdS and periodic in time, so that one may think of it as an “instanton universe” inside AdS [@Sezgin:2005hf]. More recently, the gauge function method has been used to describe the BTZ black hole metric as a solution to full three dimensional HS gauge theory [@Didenko:2006zd]. This raises the question how to Wick rotate solutions of the Lorentzian theory into solutions of a Euclidean theory. The main difficulty is to impose proper reality conditions given the doubling of the spinor oscillators due to the Euclidean signature. We resolve this by taking the master fields to be holomorphic functions of the left-handed and the right-handed spinor oscillators subject to pseudo-reality conditions. In addition to the Euclidean signature, we shall consider the Kleinian signature as well. While in all signatures there is the possibility of a chiral asymmetry, in Euclidean and Kleinian signatures, the extreme case of parity violation involving half-flat gauge fields can also arise. We refer to the latter ones as *chiral models*. In HS gauge theory, the HS algebra valued gauge-field curvatures can be made, say, self-dual, but the model nonetheless contains the anti-self-dual gauge fields through the master zero-form which contains the corresponding Weyl tensor obeying the appropriate field equation. Although this is contrary to what happens in ordinary Euclidean gravity, where the field equations can contain only self-dual fields, it is not a surprise in higher spin theory since the underlying higher spin algebra, which is an extension of $SO(5)$, does not admit a chiral massless multiplet [^1]. There are several reasons that make the investigation of HS theory in Euclidean and Kleinian signatures worthwhile. To begin with, just as the Euclidean version of gravity plays a significant role in the path integral formulation of quantum gravity, it is reasonable to expect that this may also be the case in the quantum formulation of HS theory, despite the fact that an action formulation is yet to be spelled out (see, [@Engquist:2007kz] for recent progress). For reviews of Euclidean quantum gravity, see, for example, [@GH] and [@Gibbons]. Another well known aspect of self-dual field theories is their capability to unify a wide class of integrable systems in two and three dimensions. It would be interesting to extend these mathematical structures to self-dual HS gauge theories to find new integrable systems. The chiral HS theories in Kleinian signatures may also be of considerable interest in closed $N=2$ string theory in which the self-dual gravity in $(2,2)$ dimensions arises as the effective target space theory [@Ooguri:1990ww]. However, there are some subtleties in treating the picture-changing operators in the BRST quantization which have raised the question of whether there are more physical states [@Junemann:1997rx], and in the case of open $N=2$ theory an interpretation in terms of an infinite tower of massless higher spin states has been proposed [@Devchand:1997dq]. It would be very interesting to establish whether these theories or their possible variants admit self-dual HS theory in the target space. While the $N=2$ string theories may seem to be highly unrealistic, it should not be ruled out that they may be connected in subtle ways to all the other string theories which themselves are connected by a web of dualities in M theory. In this paper, we shall take the necessary first steps to start the exploration of the Euclidean and Kleinian HS theories. We shall start by determining the real forms of the higher spin algebra based on infinite dimensional extension of $SO(5;\Comp)$ and formulate the corresponding higher spin gauge theories in four-dimensional spacetime with signature $(4-p,p)$. Maximally symmetric four- dimensional constant curvature spacetimes, including de Sitter spacetime, defined by the embedding into five-plane with signature $(5-q,q)$ are readily exact solutions. Fluctuations about these spaces arrange themselves into all the irreducible representations of $SO(5-q,q)$ contained in the symmetric two-fold product of the fundamental singleton representation of this group, each occurring once. The details of this phenomenon will be provided in a separate paper [@wip]. We then devote the rest of the paper to finding a class of nontrivial exact solutions of these models, including the Euclidean and chiral cases. The key information about these solutions is encoded in the master zero-form which contains a real ordinary scalar field, and the [*Weyl tensors*]{} $\phi_{\a_1\cdots \a_{2s}}$ and $\phi_{\ad_1,\cdots \ad_{2s}}$ for spin $s=2,4,6,...$ in the minimal bosonic model and $s=1,2,3,4,...$ in a non-minimal bosonic model [@Vasiliev:1995dn; @Engquist:2002vr]. Vasiliev’s full higher spin field equations assume a form reminiscent of that of open string field theory, with master fields that are functions of spacetime as well as an internal noncommutative space of oscillators. Our new exact solutions are constructed by using the oscillators to build suitable projectors, with slightly different properties in the minimal and non-minimal models. Our exact solutions fall into the following four classes: : These are [*maximally symmetric solutions*]{} (see Table 1) with (x) &=& 0 ,\_[\_1\_[2s]{}]{}=0 , \_[\_1\_[2s]{}]{}=0 , 2 e\_\^a &=& [4\_\^a(1-\^2x\^2)\^2]{}  , W\_\^[a\_1a\_[s-1]{}]{}=0 , \[type0\]describing the symmetric spaces $S^4, H_4, AdS_4, dS_4, H_{3,2}=SO(3,2)/SO(2,2)$, where $|\lambda|$ is the inverse radius of the symmetric space, $x^2=x^a x^b\eta_{ab}$, and $\eta_{ab}$ is the tangent space metric. In the above the zero-forms have spin $s=2,4,6,...$ in the minimal model and $s=1,2,3,4,...$ in the non-minimal model, while for $W_\mu{}^{a_1\cdots a_{s-1}}$, $s=4,6,...$ in the minimal model, and $s=1,3,4,5,6,...$ in the non-minimal model. : These solutions, which arise in the minimal models (and therefore are evidently solutions also to the non-minimal models with vanishing odd spins), are [*$SO(p,4-p)$ invariant deformations*]{} of the maximally symmetric solutions with (x) &=& (1-\^2 x\^2) ,\_[\_1\_[2s]{}]{}=0 , \_[\_1\_[2s]{}]{}=0 ,   (s=2,4,...) 2 e\_\^a &=& f\_1 \_\^a + \^2 f\_2 x\_x\^a , W\_\^[a\_1a\_[s-1]{}]{}=0   (s=4,6,...) , where $\nu$ is a continuous parameter and $f_1,f_2$ (see [(\[f12\])]{}) are highly complicated functions of $x^2$, $\nu$, and a set of *discrete* parameters corresponding to whether certain projectors are switched on or off. The metric is Weyl-flat conformal to the maximally symmetric solution with a complicated conformal factor, and note that all the higher spin gauge fields vanish. Interestingly, a particular choice of the discrete parameters yield, in the $\nu \rightarrow 0$ limit, the [*degenerate metric*]{}: g\_= [1(1-\^2 x\^2)]{}[x\_x\_\^2 x\^2]{} . Degenerate metrics are known to play a role topology change in spacetime (see, for example, [@Horowitz:1990qb], and references therein). Interestingly, here they arise in a natural way by simply taking a certain limit in the parameter space of our solution. : These are solutions of the non-minimal model that are *not* solutions to the minimal model. The spacetime component fields are identical to those of the maximally symmetric Type 0 solutions, but, unlike in the Type 0 solution, the spinorial master one-form is non-vanishing (see [(\[spinorform\])]{}). Even though all odd spin fields are vanishing, the solution exists only for the non-minimal model because the spinorial master field violates the kinematic conditions of the minimal model. In particular, this means that this type of solution cannot be a $\nu\rightarrow 0$ limit of the Type 1 solutions. Furthermore, the spinorial master field is parametrized by [*discrete*]{} parameters, again associated with projectors. : These are solutions of the [*non-minimal chiral models*]{} in Euclidean and Kleinian signatures, in which [*all gauge fields are non-vanishing*]{}. These solutions also depend on an infinite set of [*discrete parameters*]{} and for simple choices of these parameters we obtain two such solutions in both of which (x)  =  -1 , \_[\_1\_[2s]{}]{} = 0 ,W\_\^[a\_1a\_[s-1]{}]{}  0 . In one of the solutions the Weyl tensors and the vierbein take the form && \_[\_1\_[2s]{}]{} =  -2\^[2s+1]{}(2s-1)!!( [h\^2-1 h\^2]{})\^s U\_[(\_1]{}U\_[\_s]{} V\_[\_[s+1]{}]{}V\_[\_[2s]{})]{} ,2 && e\_\^a = [-2h\^2(1+2g)]{} , where $h,g,g_3,g_4,g_5$ are functions of $x^2$ defined in [(\[aad\])]{}, [(\[g345\])]{}, and the almost complex structure $J_{ab}$ and spinors $(U,V)$ are defined in [(\[jj\])]{} and [(\[UV\])]{}, and $\e=\pm 1$ as explained in Section 3.5. For the other solution we have && \_[\_1\_[2s]{}]{} =  -2\^[2s+1]{}(2s-1)!!( [1h\^2]{})\^s |ł\_[(\_1]{}|ł\_[\_s]{} |\_[\_[s+1]{}]{}|\_[\_[2s]{})]{} ,2 && e\_\^a = [-2h\^2(1+2[g]{})]{} , where the functions ${\tilde g}, {\tilde g}_4, {\tilde g}_5$ are defined in [(\[tildeg345\])]{}, and the almost complex structure ${\tilde J}_{ab}$ is defined in [(\[jtilde\])]{}. These are remarkable solutions in that they are, to our best knowledge, the first exact solution of higher spin gauge theory in which higher spin fields are non-vanishing. We also note that the Weyl tensors in these solutions corresponds to higher spin generalization of the Type D Weyl tensor that takes the form $\phi_{\ad\bd\cd\dd} \sim \lambda_{(\ad}\lambda_{\bd} \mu_{\cd} \mu_{\dd)}$ up to a scale factor [@flaherty]. Type D instanton solutions of Einstein’s equation in Euclidean signature with and without cosmological constant have been discussed in [@Lapedes:1980qw]. Our solution provides their higher spin generalization. After we describe the HS field equations in diverse signatures in Section 2, we shall present the detailed construction of our solutions in Section 3. We shall comment further on these solutions and open problems in the Conclusions. We shall first describe the field equations without imposing reality conditions on the master fields. These conditions will then be discussed separately leading to five different models in four-dimensional spacetimes with various signatures (see Table \[Table1\]). To formulate the complex field equations we use independent $SL(2;\Comp)_L$ doublet spinors $(y_\a,z_\a)$ and $SL(2;\Comp)_R$ doublet spinors $(\yb_{\ad},\zb_{\ad})$ generating an oscillator algebra with non-commutative and associative product $\star$ defined by y\_y\_&=&y\_y\_+i\_ ,y\_z\_ = y\_z\_-i\_ ,\[osc1\]\ z\_y\_&=& z\_y\_+i\_ , z\_z\_ =z\_z\_-i\_  ,\[osc2\] and |y\_|y\_ = |y\_ |y\_+i\_ ,|z\_|y\_ = |z\_ |y\_- i\_ ,\[oscbar1\]\ |y\_|z\_= |y\_ |z\_+i\_ ,|z\_|z\_ = |z\_ |z\_-i\_ ,\[oscbar2\]where the juxtaposition denotes the symmetrized, or Weyl-ordered, products. For example, $y_\a y_\b=\ft12(y_\a\star y_\b+y_\b\star y_\a)$. Equivalently, Weyl-ordered functions obey[^2] &&f(y,|y,z,|z)   g(y,|y,z,|z)\[star\]\ &=&   e\^[i\^\_+ i|\^|\_]{}  f(y+,|y+|,z+,|z-|) g(y+,|y+|,z-,|z+|) , where the hats are used to denote functions of all oscillators, while functions of only $y_\a$ and $\yb_{\ad}$ will be unhatted. The complex master fields are the *adjoint* one-form $\widehat A$ and the *twisted-adjoint* zero-form $\widehat \Phi$ defined by A&=&dx\^A\_(x;y,|y,z,|z)+dz\^A\_(x;y,|y,z,|z)+d|z\^A\_[ ]{}(x;y,|y,z,|z) ,\ &=&(x;y,|y,z,|z) ,where $x^\mu$ are coordinates on a commutative base manifold (which can, but need not, be fixed to be four-dimensional spacetime). One also defines the total exterior derivative d = dx\^\_+ dz\^+ d|z\^ [|z\^]{} ,with the property $d(\widehat f\wedge\star~\widehat g)=(d\widehat f)\wedge \star~\widehat g+(-1)^{{\rm deg}\widehat f}\widehat f\wedge\star ~d\widehat g$ for general differential forms. In what follows we shall suppress the $\wedge$. The master fields can be made subject to the following discrete symmetry conditions[^3] [@Vasiliev:1995dn; @Engquist:2002vr] &:& (A) =-A,() = |() ,\[minmod\]\ &:& |(A) = A ,|() = ,\[nonminmod\]where $\tau$ is the $\star$-product algebra anti-automorphism defined by (f(y,|y;z,|z)) = f(iy,i|y;-iz,-i|z) ,\[tau\]and $\pi$ and $\bar\pi$ are two involutive $\star$-product automorphisms defined by (f(y,|y;z,|z))&=&f(-y,|y;-z,|z) ,|(f(y,|y;z,|z)) =f(y,-|y;z,-|z) .We note that (fg)&=&(-1)\^[[deg]{}(f)[deg]{}(g)]{}(g)(f) ,\ (fg)&=& (f)(g) ,\ |(fg)&=& |(f)|(g) ,and that $\tau^2=\pi\bar\pi$. The automorphisms are inner and can be generated by conjugation with the functions $\kappa$ and ${\bar\kappa}$ given by  = (iy\^z\_) ,| = (-i|y\^|z\_) , such that f(y,z) = f(z,y) ,f(y,z) = f(-z,-y) ,f = (f) , \[kappa\]|f(|y,|z) =|f(-|z,-|y) ,f(|y,|z)| = |f(|z,|y),|f| =|(f) . \[kappabar\]The full complex field equations are F&=& 4  ,\[m1\]\ D&=&0,\[m2\]where $c_1$ and $c_2$ are complex constants and the curvatures and gauge transformations are given by &=& d+, \_A = D\ &=&d+\[A,\]\_ ,\_ =-\[,\]\_ ,with \_&=&fg-(-1)\^[[deg]{}(f)[deg]{}(g)]{}g(f) .Since $\widehat \Phi$ is defined up to rescalings by complex numbers, the model only depends on one complex parameter, that we can take to be c&=& [c\_2c\_1]{} .In components, the constraints read F\_&=&0 ,D\_ \_+\[A\_,\]\_ = 0 , \[f1\]F\_&=&0 ,F\_ = 0,\[f2\]F\_&=&-2\_ ,F\_ =-2\_| ,\[f3\]F\_&=&0 ,\[f4\]D\_ \_+A\_+(A\_)&=&0,\[s1\]D\_ \_+A\_+|(A\_)&=&0 ,\[s2\]where [(\[s2\])]{} can be derived using $\pi\bar\pi(\widehat A_{\ad})=-\widehat A_{\ad}$. Introducing [@vasiliev] S\_&=& z\_-2iA\_ ,S\_ = |z\_-2iA\_ ,\[S\]the component form of the equations carrying at least one spinor index now take the form \_S\_+\[A\_,S\_\]\_&=&0 ,\_S\_+\[A\_,S\_\]\_ = 0,\[S1\]\_&=& -2i\_(1-c\_1) ,\_ =  -2i\_(1-c\_2|) ,\[S2\]\_&=&0 ,\[S3\]S\_+(S\_)&=&0,\[S4\]S\_+|(S\_)= 0 .\[S5\]This form of the equations makes the following $\integ_2\times \integ_2$ symmetry manifest: S\_&S\_ ,S\_  S\_ ,\[Z2\](where the two transformations can be performed independently) keeping $\widehat A_\m$ and $\widehat \Phi$ fixed. We note that $\widehat S_\a\rightarrow -\widehat S_\a$ is equivalent to $\widehat A_\a\rightarrow-\widehat A_\a-i z_\a$, *idem* $\widehat S_{\ad}$ and $\widehat A_{\ad}$. All component fields are of course complex at this level. Next we shall discuss various reality conditions on the (hatted) master fields that will lead to models with real physical fields living in spacetimes with different signatures. In order to define the real forms of the field equations one has to impose reality conditions on both adjoint one-form and twisted-adjoint zero-form, corresponding to suitable real forms of the higher-spin algebra and signatures of spacetime. There are three distinct real forms of the complex higher-spin algebra itself. In two of these cases there are two distinct reality conditions that can be imposed on the zero-form, leading to five distinct models in total, as shown in Table \[Table1\]. The reality conditions are A\^ = -(A) ,\^ = (()),\[dagger\]where the possible actions of the dagger [^4] on the spinor oscillators and consequential selections of real forms of $SO(4;\Comp)\simeq SL(2;\Comp)\times SL(2;\Comp)$ are given by SU(2)\_LSU(2)\_R&:&(y\^)\^ =y\^\_ ,(z\^)\^ = z\^\_,\[su2\]\ &&(|y\^)\^ = |y\^\_ ,(|z\^)\^ = |z\^\_ ,\ SL(2;)\_[diag]{}&:&(y\^)\^ = |y\^,(z\^)\^ = |z\^ ,\[sl2\]\ Sp(2;)\_LSp(2;)\_R&:&(y\^)\^ = y\^,(z\^)\^ = -z\^ ,\[sp2\]\ &&(|y\^)\^ = |y\^ ,(|z\^)\^ =-|z\^  ,and the map $\sigma$ is given in Table \[Table1\], with the isomorphism $\rho$ given by (f(y\^\_,|y\^\_,z\^\_,|z\^\_)) = f(y\_,|y\_,-z\_,-|z\_) \[iso\]in the case of $(4,0)$ signature. Note that $\sigma$ is an oscillator-algebra automorphism in signatures $(3,1)$ and $(2,2)$, while it is an isomorphism in signature $(4,0)$. Here, the $SU(2)$ doublets are pseudo real in the sense that from $(y_\a)^\dagger=-y^{\dagger\a}$ *idem* $(z_\a)^\dagger$, $(\bar y_{\ad})^\dagger$ and $(\bar z_{\ad})^\dagger$ it follows that $(y_\a,\yb_{\ad};z_\a,\zb_{\ad})$ and $(y^\dagger_\a,\yb^\dagger_\a;z^\dagger_\a,\zb^\dagger_{\ad})$ generate equivalent oscillator algebras with isomorphism $\rho$. The reality property of the exterior derivative takes the following form in different signatures: &:& d\^ = d,\ &:& d\^ = d .We note that the Euclidean case is consistent in the sense that (dz\^)\^&=&d\^(z\^)\^ = d(z\^\_) = -dz\_is compatible with representing $d\widehat f$ using $\partial\widehat f/\partial z^\a=\frac i2 [z_\a,\widehat f]_\star$, which yields ( i2 dz\^\_)\^&=& i2 dz\_(\[f\^,-z\^\]\_) = i2 dz\_\_ = i2 dz\^\_ .Demanding compatibility between the reality conditions [(\[dagger\])]{} and the master field equations [(\[m1\])]{} and [(\[m2\])]{}, and using (()\^)&=& ,((idz\^dz\_)\^) = -idz\^dz\_ ,one finds the following reality conditions on the parameters &:& c\_1\^ = c\_2 ,\ &:& c\_1\^ = c\_1 ,c\_2\^ = c\_2 .As a result, the parameter $c$ is a phase factor in Lorentzian signature and a real number in Euclidean and Kleinian signatures. The parameters can be restricted further by requiring invariance under the parity transformation P(y\_)&=& \_ ,Pd = dP ,P\^2 = [Id]{} .Taking $\widehat A$ to be invariant and assigning intrinsic parity $\e=\pm 1$ to $\widehat\Phi$, P(A)&=&A ,P() =  ,one finds that the master equations are parity invariant provided that [@Sezgin:2003pt] c&=& = In Lorentzian signature, there is no loss of generality in choosing $c_1=c_2=1$ in the Type A model and $c_1=-c_2=i$ in the Type B model, while in Euclidean and Kleinian signatures, one may always take $c_1=c_2=1$ in the Type A model and $c_1=-c_2=1$ in the Type B model. More generally, the parity transformation maps different models into each other as follows, P(c\_1)&=&c\_2 ,P(c\_2) = c\_1 ,P(c) = ,leaving invariant the Type A and B models. The *maximally parity violating* cases are &:& c = (i/4) ,\ &:& c = 0 .The case with $c=0$ shall be referred to as the *chiral model*, that we shall discuss in more detail below. The HS equations in Lorentzian signature have the $\integ_2$ symmetry acting as $({\widehat S}_\a, {\widehat S}_{\ad}) \rightarrow (\epsilon {\widehat S}_\a, \epsilon {\widehat S}_{\ad})$, and $\integ_2\times \integ_2$ symmetry in $(4,0)$ and $(2,2)$ signatures acting as $({\widehat S}_\a, {\widehat S}_{\ad}) \rightarrow (\epsilon {\widehat S}_\a, \epsilon' {\widehat S}_{\ad})$, where $\epsilon=\pm 1$ and $\e'=\pm 1$. Finally, let us give the reality conditions at the level of the $SO(5;\Comp)$ algebra and its minimal bosonic higher-spin extension. The adjoint representation of the complex minimal bosonic higher-spin Lie algebra is defined by [^5] (5;) &=& {Q(y,|y) :(Q) =-Q}  ,\[chsa\]and the corresponding minimal twisted-adjoint representation by T\[(5;)\] &=& {S(y,) :(S) =(S)} .\[ctwadj\]The real forms are defined by (5-q,q) &=& {Q(y,|y)(5;) :Q\^ = -(Q)}  ,\[chsareal\]\ T\[(5-q,q)\] &=& {S(y,)T\[(5-q,q) :S\^ = ((S))} .\[ctwadj\]The finite-dimensional $SO(5;\Comp)$ subalgebra is generated by $M_{AB}$, that we split into Lorentz rotations and translations $(M_{ab},P_a)$ defined by (M\_[ab]{})&=&M\_[ab]{} ,(P\_a) = -P\_a .For these generators, which by convention arise in the expansion of the master fields together with a factor of $i$, the reality condition [(\[dagger\])]{} implies (M\_[AB]{})\^&=&(M\_[AB]{}) .This condition is solved by M\_[ab]{} = -18((\_[ab]{})\^y\_y\_+(|\_[ab]{})\^\_\_),P\_a= 4(\_a)\^y\_\_ ,where the van der Waerden symbols are defined in Appendix \[App1\] and $\l^2$ is proportional to the cosmological constant, as shown in Table \[Table1\]. The van der Waerden symbols encode the spacetime signature $\eta_{ab}$, and the commutation relations among the $M_{AB}$ then fix the signature of the ambient space to be \_[AB]{}&=&(\_[ab]{};-\^2) . In the chiral model with $c=0$, the master field $\widehat\Phi$ can be eliminated using [(\[f3\])]{}, and expressed as &=&(1+2 S\^S\_) ,where we have chosen $c_1=1$ and $\widehat S_\a$ is given by [(\[S\])]{}. The remaining independent master-field equations now read F\_&=&0 ,D\_S\_ =0 ,D\_S\_ = 0 ,\_&=&0 ,\_ = -2i\_ ,S\_S\^S\_+S\^S\_S\_&=&4i S\_ .\[SplusScube\]We note that [(\[S5\])]{} holds identically in virtue of $\widehat S_{\ad}\star\widehat\Phi+\widehat\Phi\star\bar\pi(\widehat S_{\ad}))=[\widehat S_{\ad},1+\frac i2 \widehat S^\a\star\widehat S_\a]_\star\star\kappa=0$, where we used $\kappa\bar\kappa\star \widehat S_{\ad}\star\kappa\bar\kappa=-\widehat S_{\ad}$ and $[\widehat S_\a,\widehat S_{\ad}]_\star=0$. The chiral model can be truncated further by imposing A\_&=&0 ,A\_ = 0 ,A\_ = 0 .In general, the chiral model also has interesting solutions with non-vanishing $\widehat A_{\ad}$, since flat connections in non-commutative geometry can be non-trivial. The procedure, described in great detail in [@Sezgin:2002ru], for obtaining the manifestly diffeomorphism and locally Lorentz invariant weak-field expansion of the physical field equations can be extended straightforwardly to arbitrary signature. The expansion is in terms of spin-$s$ physical fields with $s\neq 2$ as well as higher derivatives of all fields, while the vierbein and Lorentz connection are treated exactly. In this approach one first solves [(\[f2\])]{}–[(\[s2\])]{} subject to the initial condition &=& |\_[Z=0]{} ,\ A\_&=& .A\_|\_[Z=0]{} =e\_+\_+W\_+K\_ ,\[Amu\]where e\_&=&[12i]{}e\_\^a P\_a ,ø\_ = 1[4i]{} ø\_\^[ab]{}M\_[ab]{} ;\[em\]$W_\m$ contains the higher-spin gauge fields (and also the spin $s=1$ gauge field in the non-minimal model); and the field redefinition K\_&=& [14i]{}ø\_\^.S\_S\_|\_[Z=0]{}+[14i]{} |\_\^.S\_S\_|\_[Z=0]{}\ &=& iø\_\^ .(A\_A\_-[y\^]{} A\_)|\_[Z=0]{}+ i|ø\_\^ .(A\_A\_-[\^]{} A\_)|\_[Z=0]{} .\[Kmu\]One also imposes the gauge condition A\^[(0)]{}\_&=&0 ,A\^[(0)]{}\_ =0 ,\[gauge\]where we have defined the internal flat connection A\^[(0)]{}\_&=&A\_|\_[=0]{} ,A\^[(0)]{}\_ = A\_|\_[=0]{} .One then substitutes the resulting $\widehat\Phi$ and $\widehat A_\mu$, which can be obtained explicitly in a perturbative expansion in $\Phi$, into [(\[f1\])]{} and sets $Z=0$, which yields a manifestly spin-2 covariant complex HS gauge theory on the base manifold. Up to this point the local structure of the base-manifold, nor the detailed structure of the gauge fields, have played any role. To proceed, one may refer to an ordinary spacetime, take $e_\mu{}^a$ to be an (invertible) vierbein, and treat $W_\mu$ as a weak field. This allows one to eliminate a large number of auxiliary fields in $\Phi$ and $W_\mu$, leaving a model consisting of a physical scalar $\phi=\Phi|_{y=\bar y=0}$, the vierbein $e_\mu{}^a$, and an infinite tower of (doubly traceless) HS gauge fields $\phi_{a(s)}$ residing in $W_\mu$. The gauge choice [(\[gauge\])]{} is convenient since it implies ${\partial\over\partial y^\a} \widehat A_\b|_{Z=0}=0$ that simplifies the expansion [@Sezgin:2002ru]. However, there are also other gauges where $\widehat A_\a|_{\Phi=0}$ is a flat but non-trivial internal connection, and indeed this will be the case for the Type 1 and Type 2 solutions that we shall present in Section 3. In the leading order in the weak fields, the two-form and one-form constraints for the minimal model read &:& { \_[,c]{} =c\_2\_[c]{} ,&[R]{}\_[,c]{} = 0 ,2 [R]{}\_[,c]{} = 0 ,&[R]{}\_[,c]{} = 0 ,2 [R]{}\_[,]{} = 0 ,&[R]{}\_[,]{} =c\_1\_ ,. \[s2b\] 4 &:& { F\^[(1)]{}\_[,\_1…\_[2s-2]{}]{} = c\_2\_[\_1…\_[2s-2]{}]{},&F\^[(1)]{}\_[,\_1…\_k\_[k+1]{}…\_[2s-2]{}]{} =  0,3 F\^[(1)]{}\_[,\_1…\_k\_[k+1]{}…\_[2s-2]{}]{}= 0 ,&F\^[(1)]{}\_[,\_1…\_[2s-2]{}]{} =c\_1\_[\_1…\_[2s-2]{}]{} ,. \[hs\] 4 &:& \_\^\_[\_1…\_m]{}\^[ \_1…\_n]{} =i(\_[\_1…\_m]{}\^[\_1…\_n]{}- mn\_[(\_1]{}\^[(\_1]{}\_[\_2…\_m)]{}\^[\_2…\_n)]{}) , where for higher spins $s=4,6,\dots$ and $k=0,\dots,2s-3$, and for $0$-forms $|m-n|=0$ mod $4$. In all cases, the zero-form system contains a physical scalar with field equation (\^2+2\^2)&=&0 .In the Lorentzian case, where both $c_1$ and $c_2=c_1^\ast$ are non-zero, the spin-2 sector consists of gravity with cosmological constant $-3\lambda^2$, and the spin-$s$ sectors with $s=4,6,\dots$ consist of higher-spin tensor gauge fields with critical masses proportional to $\lambda^2$. The criticality in the masses, that implies composite masslessness[^6] in the case of AdS, holds in the dS case as well, where thus the physical spectrum is given by the symmetric tensor product of two (non-unitary) $SO(4,1)$ singletons [@wip]. In the Euclidean and Kleinian cases, the parameters $c_1$ and $c_2$ are real and independent. In case $c_1c_2\neq 0$, the Lorentzian analysis carries over, leading to a composite massless spectrum given by symmetric tensor products of suitable singletons [@wip]. However, unlike the Lorentzian case, the spin-$s$ sector of the twisted adjoint representation can be decomposed into left-handed and right-handed sub-sectors of real states, corresponding to $\{\Phi_{\a_1\dots\a_m,\ad_1\dots\ad_n}\}$ with $m-n=\pm 2s$ [@wip]. These sub-sectors mix under HS transformations. In case either $c_1$ or $c_2$, but not both, vanishes, that we shall refer to as the chiral models, the metric and the higher-spin gauge fields become half-flat. For definiteness, let us consider the case $c_2=0$. The components of the zero-form that drop out in the two-form constraint, *i.e.* $\Phi_{\a_1\dots\a_{2s}}$, now become *independent* physical fields, obeying field equations following from [(\[linscalareq\])]{}. ----- ----------- --------- -------------------------- ----------- ----------- ------------ HSA Signature Spinors Reality Symmetric Hermitian $\mbox{\phantom{aaaaa}}$ space isometries $\lambda^2$ $\sigma$ $-1$ $\rho$ $+1$ $\rho\pi$ $-1$ $\pi$ $+1$ id $-1$ id ----- ----------- --------- -------------------------- ----------- ----------- ------------ : [The minimal bosonic higher-spin algebras $\mhso(p',5-p')\supset \mso(5-p',p')$ in signature $(p,4-p)$ can be realized with spinor oscillators transforming as doublets under the groups listed in the third column. These realizations obey reality conditions $(M_{AB})^\dagger=\sigma(M_{AB})$, with hermitian subalgebras listed above [@wip]. The symmetric spaces with unit radius have cosmological constant $\Lambda=-3\lambda^2$.]{}[]{data-label="Table1"} In this section we shall give four types of exact solutions to the 4D HS models given in the previous section. The salient features of these are summarized in the Introduction. Here we stress that (a) the Type 0 solutions are maximally symmetric spaces; (b) the Type 1 solutions are $SO(4-p,p)$ invariant deformations of Type 0; (c) the Type 2 solutions, which exist necessarily in the non-minimal model, have vanishing spacetime component fields but non-vanishing spinorial master one-form; (d) the Type 3 solutions, which exist in the non-minimal chiral model only, have the remarkable feature that all higher spin gauge fields are non-vanishing in such a way that the Weyl zero-forms are covariantly constant, in a certain sense that will be explained below. Before we give these four types of solutions we shall describe briefly the method for solving the master field equations using gauge functions. In order to construct an interesting class of solutions we shall use the $Z$-space approach [@Bolotin:1999fa; @Sezgin:2005pv] in which the constraints carrying at least one curved spacetime index, *viz.* F\_&=&0 ,D\_ = 0 ,\ F\_&=&0 , F\_ = 0  ,\[xsp2\] are integrated in simply connected spacetime regions given the spacetime zero-forms at a point $p$, ’ = |\_[p]{} ,S’\_ =  S\_|\_[p]{} ,S’\_ = S\_|\_[p]{} , \[phiprime\] and expressed explicitly as A\_&=&L\^[-1]{}\_L, = [L]{}\^[-1]{}’(L) ,\ S\_&=&L\^[-1]{}S’\_L ,S\_ =L\^[-1]{}S’\_L , \[Leq\] where $\widehat L=\widehat L(x,z,\bar z;y,\yb)$ is a gauge function, and L|\_[p]{} = 1 ,\_’ = 0 ,\_’\_ =0 ,\_’\_ = 0 .The internal connections $\widehat A_\a$ and $\widehat A_{\ad}$ can be reconstructed from $\widehat S_\a$ and $\widehat S_{\ad}$ using [(\[S\])]{}. In particular note the relation \_= [L]{}\_ +[L]{}\^[-1]{}’\_,\[Aalpha\] and it follows that \_’= z\_-2i [A]{}’\_ .\[sprime\] The remaining constraints in $Z$-space, *viz.* \_&=& -2i\_(1-c\_1’) ,\_ =  -2i\_(1-c\_2’|) ,\[z1\]\_&=&0 ,\[z2\]S’\_’+’(S’\_)&=&0,\[z3\]S’\_’+’|(S’\_) = 0 ,\[z4\]are then to be solved with an initial condition C’(y,|y) = ’|\_[Z=0]{} ,\[C\] and some assumption about the topology of the internal flat connections S\^[(0)]{}\_&=&S’\_|\_[C’=0]{} , S\^[(0)]{}\_ = S’\_|\_[C’=0]{} . \[physgauge\] In what follows, we shall restrict the class of solutions further by assuming that L = L(x;y,) .The gauge fields can then be obtained from [(\[Amu\])]{}, [(\[Kmu\])]{} and [(\[Leq\])]{}, *viz.* e\_+ø\_+W\_ = L\^[-1]{}\_L-K\_ ,\[gf\]where K\_&=&[14i]{}.L\^[-1]{}(ø\_\^ S’\_S’\_+|ø\_\^ S’\_S’\_)L|\_[Z=0]{}.\[Kmu2\]Hence, the gauge fields, including the metric, can be obtained algebraically without having to solve any differential equations in spacetime. \[Sec:symm\] The complex master-field equations are solved by  = 0 ,S\_ = z\_ ,S\_ = |z\_ ,A\_ =L\^[-1]{}\_L  ,where the gauge function [@Bolotin:1999fa] L(x;y,)&=& [2h1+h]{}  ,\[wL\] gives ds\^2\_[(0)]{} = [4 dx\^2(1-\^2x\^2)\^2]{},\[vacmetric\]which we identify as the metric of the symmetric spaces listed in Table \[Table1\] for the different real forms of the model, in stereographic coordinates with inverse radius $|\lambda|$. This metric is invariant under the inversion x\^a-x\^a/(ł\^2 x\^2) ,and $H_4$ is covered by a single coordinate chart, while the remaining symmetric spaces require two charts, related by the inversion. If we let $\tilde x^a= -x^a/(\l^2 x^2)$, the atlases are given by S\^4 (ł\^2=-1)&:& {x\^:0-\^2 x\^21}{x\^:0-\^2 x\^21} ,\[atl1\]\ H\^4(ł\^2=1)&:& {x\^:0\^2 x\^2&lt;1} ,\[atl2\]\ dS\_4(ł\^2=-1)&:& {x\^:-1&lt; -\^2 x\^21}{x\^:-1&lt; -\^2 x\^21} ,\[atl3\]\ AdS\_4 (ł\^2=1)&:& {x\^:-1 \^2 x\^2&lt;1}{x\^:-1\^2 x\^2&lt;1} ,\[atl4\]\ H\_[3,2]{}(ł\^2=-1)&:& {x\^:-1&lt; -\^2 x\^21}{x\^:-1&lt; -\^2 x\^21} ,\[atl5\]where the overlap between the charts is given by $\{x^\mu:\lambda^2 x^2=-1\}$ in the cases of $S^4$, $dS_4$, $AdS_4$ and $H_{3,2}$, and the boundary is $\{x^\mu:\lambda^2 x^2=1\}$ in the case of $H_4$ and $\{x^\mu:\lambda^2 x^2=1\}\cup \{\tilde x^\mu:\lambda^2\tilde x^2=1\}$ in the cases of $dS_4$, $AdS_4$ and $H_{3,2}$. The $H_{3,2}$ space can be described as the coset $SO(3,2)/SO(2,2)$. A particular class of $SO(4;\Comp)$-invariant solutions is given by the ansatz ’ =  ,S’\_ =z\_ S(u) ,S’\_ = |z\_ |S(|u)where u = y\^z\_ ,|u = |y\^ |z\_ .The above ansatz solves [(\[z2\])]{}-[(\[z4\])]{}. There remains to solve [(\[z1\])]{}, which now takes the form \_ = 4i(1- c\_1e\^[iu]{}) ,\_ = 4i(1- c\_2e\^[-i|u]{})\[SSnu\]Following [@Prokushkin:1998bq], we use the integral representation S(u)&=&\_[-1]{}\^1 ds  n(s)  e\^[2(1+s)u]{} ,\[SSnu2\]\ |S(|u)&=& \_[-1]{}\^1 ds  |n(s)  e\^[-2(1+s)|u]{} .\[Su\]which reduces [(\[SSnu\])]{} to (n n)(t)&=& (t-1)-2 (1-t) ,\ (|n |n)(t)&=& (t-1)-2 (1-t) .with $\circ$ defined by [@Prokushkin:1998bq] (fg)(t)=\_[-1]{}\^1 ds \_[-1]{}\^1 ds’ (t-s s’) f(s) g(s’) . Even and odd functions, denoted by $f^\pm(t)$, are orthogonal with respect to the $\circ$ product. Thus, one finds (n\^[+]{}n\^[+]{})(t)&=&\^[+]{}\_0(t)-2 ,(n\^[-]{}n\^[-]{})(t) = \^[-]{}\_0(t)+2 t,\[mplus\]\ (|n\^[+]{}|n\^[+]{})(t)&=&\^[+]{}\_0(t)-2 ,(|n\^[-]{}|n\^[-]{})(t) = \^[-]{}\_0(t)+2 t,\[mminus\]where \^\_0(t) =12 .One proceeds [@Prokushkin:1998bq], by writing n\^(t)&=& m\^(t)+\_[k=0]{}\^ł\_k p\^\_k,\[mexp\]where $m^\pm$ are expanded in terms of $\iota^{(\pm)}_0(t)$ and the functions ($k\geq 1$) \^\_k(t)&=&\^[12(1- )]{} \_[-1]{}\^1 ds\_1 \_[-1]{}\^1 ds\_k (t-s\_1 s\_k)\ &=&\^[12(1-)]{}[( 1[t\^2]{})\^[k-1]{}(k-1)!]{} , obeying the algebra ($k,l\geq 0$) \^\_k\^\_l = \^\_[k+l]{} , \[ring\] and $p^\s_k(t)$ ($k\geq 0$) are the $\circ$-product projectors p\^\_k(t)&=& [(-1)\^kk!]{} \^[(k)]{}(t) , =(-1)\^k ,\[pk\]obeying p\^\_kf&=& L\_k\[f\] p\^\_k ,L\_k\[f\] = \_[-1]{}\^1 dt  t\^k f(t) .\[proj1\]In particular, p\^\_kp\^\_l&=& \_[kl]{}p\^\_l.\[proj2\]Substituting the expansion [(\[mexp\])]{} into [(\[mplus\])]{} and [(\[mminus\])]{}, one finds, in view of [(\[ring\])]{}, [(\[proj1\])]{} and [(\[proj2\])]{}, manageable algebraic equations. Transforming back one finds, after some algebra [@Sezgin:2005pv], m(t)&=& (1+t)+q(t) ,\ q(t) &=&-[c\_14]{}(\_1 F\_1+t\_1 F\_1),\[mt\]and ł\_k&=&- 2\_kL\_k\[m\] ,\_k{0,1},\[lambdak\]where L\_k\[m\]&=&(-1)\^k+L\_k\[q\] ,\[Lkm\]\ L\_k\[q\]&=& -[1+(-1)\^k2]{}(1-)- [1-(-1)\^k2]{}(1-) .The overall signs in $m^\pm$ have been fixed in [(\[mt\])]{} by requiring that S(u)=1  [for]{}   =0   [and]{}   \_k=0  . Treating $\bar n$ the same way, one finds |m(t)&=& (1+t)+|q(t) ,\ |q(t) &=&-[c\_24]{}(\_1 F\_1+t\_1 F\_1),\[mt2\]\ |ł\_k&=&- 2|\_kL\_k\[|m\] ,|\_k{0,1} ,\ L\_k\[|m\]&=&(-1)\^k+L\_k\[|q\] ,\ L\_k\[|q\]&=& -[1+(-1)\^k2]{}(1-)- [1-(-1)\^k2]{}(1-) .Thus, the internal solution is given by ’&=& ,\[intsol1\] together with ${\widehat S}'_\a$ and ${\widehat S}'_{\dot\a}$ as given in [(\[sprime\])]{} with A’\_&=& A\^[(reg)]{}\_+A\^[(proj)]{}\_ , A’\_ = A\^[(reg)]{}\_+A\^[(proj)]{}\_ ,\[intconn\]\ A\^[(reg)]{}\_&=&2 z\_\_[-1]{}\^1 dt  q(t) e\^[2(1+t)u]{} ,A\^[(reg)]{}\_  = 2 |z\_ \_[-1]{}\^1 dt  |q(t) e\^[-2(1+t)|u]{} ,\[part\]\ A\^[(proj)]{}\_&=& -iz\_\_[k=0]{}\^\_k (-1)\^k L\_k\[m\] P\_k(u) , A\^[(proj)]{}\_ = -i|z\_\_[k=0]{}\^|\_k (-1)\^k L\_k\[|m\] |P\_k(|u) ,\[hom\]where P\_k(u)&=&\_[-1]{}\^1 ds  e\^[2 (1-s)u]{} p\_k(s) = [1k!]{}([-iu2]{})\^ke\^[2]{} ,\[Pk1\]\ |P\_k(|u)&=&\_[-1]{}\^1 ds  e\^[-2 (1-s)|u]{} p\_k(s)= [1k!]{}([i|u2]{})\^k e\^[-2]{}\[Pk2\]are projectors in the $\star$-product algebra given by functions of $u$ and $\bar u$, *viz.* P\_kF&=& L\_k\[f\]P\_k ,P\_kP\_l =\_[kl]{}P\_k ,\ |P\_k|F&=& L\_k\[|f\]|P\_k , |P\_k|P\_l =\_[kl]{}|P\_k ,for $F(u)=\int_{-1}^1 ds e^{\ft{i}2(1-s)u}f(s)$ and $\bar F(\bar u)=\int_{-1}^1 ds e^{-\ft{i}2(1-s)\bar u}\bar f(s)$ with $L_k[f]$ and $L_k[\bar f]$ given in [(\[proj1\])]{}. The projectors also obey $(u-2ik)\star P_k=0$ and $y^\a\star P_k\star z_\a=i(k+1)(P_{k-1}+P_{k+1})$ with $P_{-1}\equiv 0$. We note the opposite signs in front of $s$ in the exponents of [(\[SSnu2\])]{}, [(\[Su\])]{} and [(\[Pk1\])]{}, [(\[Pk2\])]{}, resulting in the $(-1)^k$ in the projector part [(\[hom\])]{} of the internal connection, which we can thus write as A\^[(proj)]{}\_&=&-iz\_\_[k=0]{}\^,\ A\^[(proj)]{}\_&=&-i|z\_\_[k=0]{}\^,which are analytic functions of $\nu$ in a finite region around the origin. For example, for $c_1=c_2=1$, they are real analytic for $-3<{\rm Re}\nu<1$, where also the particular solution can be shown to be real analytic [@Sezgin:2005pv]. The reality conditions on the $\th_k$ and $\bar\th_k$ parameters are as follows: &:& \_k ,|\_k ,\ &:& \_k = |\_k . Taking $\nu=0$ there remains only the projector part, leading to the following “vacuum” solutions ’&=&0 ,A’\_&=&-iz\_\_[k=0]{}\^\_k [1k!]{}([-iu2]{})\^ke\^[2]{} ,A’\_ = -i|z\_\_[k=0]{}\^|\_k [1k!]{}([i|u2]{})\^k e\^[-2]{} .The $\integ_2\times \integ_2$ symmetry [(\[Z2\])]{} acts by \_k&& 1-\_k ,|\_k 1-|\_k .The maximally symmetric spaces discussed in Section 3.2 are recovered by setting $\th_k=\th$ and $\bar \th_k=\bar\th$ for all $k$. In Euclidean and Kleinian signatures, $\th$ and $\bar\th$ are independent, leading to four solutions related by $\integ_2\times \integ_2$ transformation. In Lorentzian signature, $\th=\bar\th$ leading to two solutions related by $\integ_2$ symmetry. The calculation of the component fields follow the same steps as in [@Sezgin:2005pv]. The spin $s\geq 1$ Weyl tensors vanish, while the scalar field is given by (x)&=& h\^2(x\^2) = (1-\^2 x\^2) .In order to compute the gauge fields, we first need to compute the quantity $K_\m$ given in [(\[Kmu2\])]{}. This calculation is formally the same as the one spelled out in the case of $\th_k=\bar\th_k=0$ in [@Sezgin:2005pv], and result is K\_&=&[Q4i]{}\_\^v\_v\_+[|Q4i]{}|\_\^|v\_|v\_ ,where Q&=& -[(1-a\^2)\^24]{}\_[-1]{}\^1ds \_[-1]{}\^1 ds’[(1+s)(1+s’)n(s) n(s’)(1-ss’a\^2)\^4]{} ,\[Q\]\ |Q&=& -[(1-a\^2)\^24]{}\_[-1]{}\^1ds \_[-1]{}\^1 ds’[(1+s)(1+s’)|n(s) |n(s’)(1-ss’a\^2)\^4]{}.\[barQ\]and v\_&=&(1+a\^2)y\_+2(a|y)\_ ,|v\_ =(1+a\^2)|y\_+2(|a y)\_ ,with ${\bar a}_{\ad \a}= a_{\a\ad}$ defined in [(\[aad\])]{}. We can simplify $Q$ using $n(t)=\delta(1+t)+q(t)+\sum_k\lambda_k p_k(t)$, with $p_k(t)$ given by [(\[pk\])]{} and $\lambda_k$ by [(\[lambdak\])]{} and [(\[Lkm\])]{}. After some algebra we find Q(;{\_k})&=&Q\^[(reg)]{}()+Q\^[(proj)]{}(;{\_k}) ,\ Q\^[(reg)]{}&=& -[(1-a\^2)\^24]{}\_[-1]{}\^1ds \_[-1]{}\^1 ds’[(1+s)(1+s’)q(s) q(s’)(1-ss’a\^2)\^4]{} ,\ Q\^[(proj)]{} &=& (1-a\^2)\^2\_[k=0]{}\^(\_k-\_[k+1]{})\^2((-1)\^k+L\_k(q))((-1)\^[k+1]{}+L\_[k+1]{}(q)),where we note that $Q$ depends on $\th_k$ only via $\th_k-\th_{k+1}$. The same expression with $q\rightarrow\bar q$ and $\th_k\rightarrow \bar\th_k$ holds for $\bar Q$. The regular part, which was computed in [@Sezgin:2005pv], is given by Q\^[(reg)]{}&=& Q\^[(reg)]{}\_++Q\^[(reg)]{}\_- ,\ Q\^[(reg)]{}\_+&=&-[(1-a\^2)\^24]{}\_[p=0]{}\^a\^[4p]{}(-)\^2\[Qpl\]\ Q\^[(reg)]{}\_-&=&[(1-a\^2)\^24]{}\_[p=0]{}\^a\^[4p+2]{}(-)\^2 ,\[Omi\]while a similar expression, obtained by replacing $c_1\rightarrow c_2$, holds for $\bar Q$. Since $K_\mu$ is bilinear in the $y_\a$ and $\yb_{\ad}$ oscillators, it immediately follows that all higher spin fields vanish. Moreover, after some algebra, we find that the vierbein and $\mso(4;\Comp)$ connection are given by e\^a&=& f\_1(x\^2) dx\^a+f\_2(x\^2) x\^a dx\^b x\_b ,\ \_&=& f(x\^2)\^[(0)]{}\_ ,|\_ = |f(x\^2) |\^[(0)]{}\_ ,where f&=& [1+(1-a\^2)\^2|Q-16a\^4 Q|Q]{} ,\ |f&=& [1+(1-a\^2)\^2 Q-16a\^4 Q|Q]{} ,and f\_1+\^2 x\^2 f\_2&=& [2h\^2]{} ,f\_2 =(fQ+|f|Q) .\[f12\]By a change of coordinates, the metric can be written locally, in a given coordinate chart, as a foliation ds\^2&=& d\^2+R\^2 dØ\_3\^2 ,R\^2() = \^2 |\^2()| ,where $x^2=\e \tan^2\ft{\tau}2$ with $\e=\pm 1$, and $d\Omega_3^2$ is a three-dimensional metric of constant curvature with suitable signature, and [@Sezgin:2005hf] &=&[f\_1 h\^22]{} .\[etafactor\]One has the following simplifications in specific models: && Q = |Q , = ,\ && |Q = 0 , = .The metric may have conical singularities, namely zeroes $R(\tau_0)=0$ for which $\partial_\tau R|_{\tau_0}\neq 1$ (we note that $\eta|_{\tau=0}=1$, so that $\tau=0$ is not a conical singularity). The scale factor depend heavily on $\nu$ as well as the choice of the infinitely many discrete parameters $\th_k$ and $\bar\th_k$. This makes the analysis unyielding, and we shall therefore limit ourselves to the case of vanishing discrete parameters and $\nu\ll 1$. In Lorentzian signature, the resulting analysis was performed in [@Sezgin:2005hf], and it generalizes straightforwardly to Euclidean and Kleinian signatures. To this end, one expands $Q^{(reg)}$ in $\nu$ around $\nu=0$, and finds Q\^[(reg)]{}&=&[c\_16]{}(1+a\^2)+[O]{}(\^2) .Focusing on a single chart, as listed in [(\[atl1\])]{}-[(\[atl5\])]{}, since $a^2$ is then bounded from below by $(1-\sqrt{2})(1+\sqrt{2})^{-1}$, we see that, if $|\nu|\ll 1$, then $|Q|\ll 1$, and consequently the factor $\eta$ defined in [(\[etafactor\])]{} remains finite. Thus, for small enough $\nu$, there are no conical singularities within the coordinate charts. However, they may appear for some finite critical $\nu$. While the $Q$ functions are highly complicated for $\nu\neq 0$, they simplify drastically at $\nu=0$, where we find Q&=&-(1-a\^2)\^2\_[k=0]{}\^(\_k-\_[k+1]{})\^2 .An analogous expression can be found for $\bar Q$. Setting $(\th_k-\th_{k+1})^2=1$, yields Q&=&-[1(1-a\^2)\^2]{} .If $Q=\bar Q=-(1-a^2)^{-2}$, which is necessarily the case in the Lorentzian models, then the equation system for $\o_{\a\b}$ and $\bar\o_{\ad\bd}$ becomes degenerate, and one finds ø\_&=& -[(1-a\^2)\^28a\^2]{} \^[(0)]{}\_ = ,\ |ø\_&=& -[(1-a\^2)\^28a\^2]{} |\^[(0)]{}\_= [(|\^[ab]{})\_dx\_a x\_b2 x\^2]{} ,leading to the degenerate vierbein e\_&=&-[łx\_ x\^a dx\_ax\^2h\^2]{} ,and metric ds\^2&=&[4(x\^a dx\_a)\^2ł\^2 x\^2 h\^2]{} . \[sec:van0form\] The non-minimal model admits the following solutions ’&=&0 ,S’\_ = z\_(y,|y) ,S’\_ = |z\_|(y,|y) ,\[type2\]provided that &=&|| = 1 ,\_ = 0 ,|() =  ,|(|) = | .\[gprop\]The elements $\C$ and $\bar\C$ can be written as &=&1-2P ,| = 1-2|P ,where $P(y,\bar y)$ and $\bar P(y,\bar y)$ are projectors obeying PP&=&P ,|P|P = |P ,\_ = 0 ,|(P) = P ,|(|P) = |P .A set of such projectors is described in Appendix \[AppProj\], where we also explain why the projectors can be subject to the $\tau$-conditions of the non-minimal model, given in [(\[nonminmod\])]{}, but not those of the minimal model, given in [(\[minmod\])]{}, unless one develops some further formalism for handling certain divergent $\star$-products. Turning to the computation of the space components of the master fields, since $z_\a$ star-commutes with $L$, it immediately follows from [(\[gf\])]{}, [(\[Kmu\])]{} and [(\[type2\])]{} that K\_&=&0 .From [(\[gf\])]{} this in turn implies that all HS gauge fields and the spin-1 gauge field vanish, while the metric is that of maximally symmetric spacetime. To that extent, the Type 1 solution looks like the Type 0 solution, but it does differ in an important way, namely, here the internal connection, *i.e.* the spinor component ${\widehat A}_\a$ of the master $1$-form, is non-vanishing. Indeed, [(\[type2\])]{}, [(\[gprop\])]{} and [(\[sprime\])]{} give the result \_&=& -iz\_V(x;y,) ,A\_ = -i|z\_ |V(x;y,),\[spinorform\]where the quantities $V$ and $\bar V$, which shall be frequently encountered in what follows, are defined by V&=& L\^[-1]{}PL ,|V =  L\^[-1]{}|PL  .Their explicit evaluation is given in Appendix \[App2\], with the result [(\[generalV\])]{}. Whilst the internal connection does not turn on any spacetime component fields, it does, however, affect the interactions as it does not obey the physical gauge condition normally used in the weak-field expansion [@Sezgin:2002ru], namely that the internal connection should vanish when the zero-form vanishes. In this sense, the internal connection may be viewed as a non-trivial flat connection in the non-commutative space. In the case of the non-minimal chiral model, defined in Section 2.3, it is possible to use projectors $P(y,\bar y)$ to build solutions with non-vanishing Weyl zero-form and higher spin fields. They are ’&=& (1-P) ,S’\_ =z\_P ,S’\_ = |z\_|,where PP&=&P ,|| = 1 ,\_ = 0 ,|(P) = P ,|(|) = | .These elements of the $\star$-product algebra can be constructed as in Section \[sec:van0form\] and Appendix \[AppProj\]. For the purpose of exhibiting explicitly the spacetime component fields, we shall choose to work with the simplest possible projectors, namely P\_+(y)&=& 2e\^[-2uv]{} = 2e\^[yby]{} ,\[Pplus\]\ P\_-()&=& 2e\^[-2|u|v]{} = 2e\^[|y|b |y]{},\[Pminus\]where $\e=\pm 1$, and $u$, $v$, $\bar u$, $\bar v$, $b_{\a\b}$ and $\bar b_{\ad\bd}$ are defined in Appendices \[AppDef\] and \[AppProj\]. The master gauge field and zero-form is given by e\_+\_+W\_&=& e\^[(0)]{}\_+\^[(0)]{}\_+[ø\_\^4i]{} [\^2 V y\^y\^]{} ,\[Type3\]and &=&|\_[Z=0]{} = 1-V|\_[y\_=0]{} ,where $K_\mu$ is defined by [(\[Kmu\])]{}; we have used [(\[kappa\])]{}; and $V$ is given by [(\[generalV\])]{}. Remarkably, since there is no $y$-dependence in the Weyl zero-form $\Phi$, it is covariantly constant in the sense that $\Phi_{\a(m)\ad(n)}$ vanishes unless $m=0$. Moreover, using [(\[generalV\])]{}, it is straightforward to compute the constant value of the physical scalar field, with the result (x)&=& 1-4\_[n\_1,n\_2+12]{}(-1)\^[n\_1+n\_2-2]{}\_[n\_1,n\_2]{}.\[VEV\]Summing over all $n_2$, and using [(\[generating\])]{} with $x=0$, *i.e.* $\sum_{k=0}^\infty (-1)^k=\ft12$, one finds that for the reduced projector [(\[reduced\])]{}, the scalar field is given by (x)&=& 1-2\_[n+12]{}(-1)\^[n-2]{}\_[n]{}.Finally setting all $\theta$-parameters equal to $1$, one ends up with $P=1$, *i.e.* in the Type 0 case, where indeed $\phi(x)=0$. In the special cases of [(\[Pplus\])]{} and [(\[Pminus\])]{}, one finds V\_+ &=& L\^[-1]{}P\_+L = 2 (-) ,\[vnonmin\]\ V\_-&=&L\^[-1]{}P\_-L = 2 (-) \[vminus\]where $a_{\a\ad}$ and $b_{\a\b}$ are defined in Appendix \[AppDef\]. The physical scalar is now given in both cases by (x)&=&-1 ,and the self-dual Weyl tensors in both cases by ($s=1,2,3,....$) \_[(2s)]{}&=& 0 ,while the anti-self-dual Weyl tensors take the form \^+\_[\_1\_[2s]{}]{}&=& -2\^[2s+1]{}(2s-1)!!( [h\^2-1 h\^2]{})\^s U\_[(\_1]{}U\_[\_s]{} V\_[\_[s+1]{}]{}V\_[\_[2s]{})]{} ,\[phi+\]\ \^-\_[\_1\_[2s]{}]{}&=&-2\^[2s+1]{}(2s-1)!!( [1h\^2]{})\^s |ł\_[(\_1]{}|ł\_[\_s]{} |\_[\_[s+1]{}]{}|\_[\_[2s]{})]{} ,\[phi-\]with spinors $(U, V)$ defined in [(\[UV\])]{}. In the case of $\l^2=1$ in Euclidean signature, we only need to use one coordinate chart, in which $0\leq h^2\leq 1$. The Weyl tensors blow up in the limit $h^2\rightarrow 0$, preventing the solution from approaching $H_4$ in this limit. In this sense the above solution is a non-perturbative solution without weak-field limit in any region of spacetime. Indeed, in the perturbative weak-field expansion around the $H_4$ solution, the scalar field has non-vanishing mass, preventing the linearized scalar field from being a non-vanishing constant. In the case of $\l^2=-1$ in Euclidean signature, the base manifold consists of two charts, covered by the coordinates in [(\[atl1\])]{}. Thus, in each chart we have $1\leq h^2<2$, and so the local representatives [(\[phi+\])]{} and [(\[phi-\])]{} of the Weyl tensors are well-defined throughout the base manifold. Finally, in the case of $\l^2=-1$ in Kleinian signature, one also needs two charts (since we are working with stereographic coordinates), with $0\leq h^2\leq 2$, and hence the Weyl tensors blow up in the limit $h^2\rightarrow 0$ preventing the solution from approaching $H_{3,2}$ in this limit. From the Weyl tensors, which are not in themselves HS gauge invariant quantities, one can construct an infinite set of invariant (and thus closed) zero-forms [@Sezgin:2005pv], namely \^-\_[2p]{}&=& \[(()\]\^[p]{}| .Remarkably, on our solution they all assume the same value, given by the constant value of the scalar field, *viz.* \^-\_[2p]{}&=&(1-V)\^[2p]{}|\_[y=|y=0]{} =1-4\_[n\_1,n\_2+12]{}(-1)\^[n\_1+n\_2-2]{}\_[n\_1,n\_2]{} . The calculation of the metric in the two models proceeds in a parallel fashion as follows: [**The $P_+$ Solution:**]{} From [(\[Type3\])]{} and [(\[vnonmin\])]{} a straightforward computation yields the result e\_ &=& e\_\^[(0)]{} +12(1+h)h\^[-4]{} b\_[(]{}(ba)\_[)]{}\_\^,\[nm1\]2 \_ &=& \_\^[(0)]{} +12 h\^[-4]{}b\_[(]{}b\_[)]{}\_\^,\[nm2\]2 [|]{}\_&=& [|]{}\_\^[(0)]{} +4(1+h)\^2h\^[-4]{}\_\^ .\[nm3\] First we solve for the spin connection from [(\[nm2\])]{} by inverting the hyper-matrix that multiplies $\omega^{(0)}$, obtaining the result \_= g\_1+ g\_2 b\_ b\^ \_\^[(0)]{} , \[nm4\]where g\_1=[11-4g\^2]{} ,g\_2=[4g(1-2g)(1-4g)]{} ,g=h\^[-4]{} . Substituting this result in [(\[nm1\])]{} then gives the vierbein e\_\^a= [-2h\^2(1+2g)]{} , where g\_3=1+2h\^[-2]{} , g\_4 = 2g g\_5= [6g1-4g]{} , \[g345\]and the spin connections are given in [(\[nm4\])]{} and [(\[nm3\])]{}. Thus, the metric $g_{\mu\nu}=e_\mu^a e_\nu^b\,\eta_{ab}$ takes the form g\_= [4h\^4(1+2g)\^2]{} .The vierbein thus has potential singularities at $h^2=0$ and $h^2=2$. The limit $h^2\rightarrow 0$ is a boundary in the case of $\l^2=1$ in Euclidean signature and $\l^2=-1$ in Kleinian signature. At these boundaries $e_\mu{}^a\sim h^{-2}x_\mu x^a$, *i.e.* a scale factor times a degenerate vierbein. In the limit $h^2\rightarrow 2$ one approaches the boundary of a coordinate chart in the case of $\l^2=1$ in Euclidean signature and $\l^2=-1$ in Kleinian signature. Also in this limit, the vierbein becomes degenerate, *viz.* $e_\mu{}^a\sim h^{-2}(Jx)_\mu (Jx)^a$. [**The $P_-$ Solution:**]{} A parallel computation that uses [(\[Type3\])]{} and [(\[vminus\])]{} yields the result e\_ &=& e\_\^[(0)]{} +12\^2 x\^2 (1+h) h\^[-4]{} [b]{}\_[(]{}([ba]{})\_[)]{}\_\^ ,\[nnm1\]2 \_ &=& \_\^[(0)]{} +12(\^2x\^2)\^2 h\^[-4]{}[b]{}\_[(]{}[b]{}\_[)]{}\_\^ ,\[nnm2\]2 [|]{}\_&=& [|]{}\_\^[(0)]{} +4(1+h)\^2h\^[-4]{}\_\^ ,\[nnm3\] where ${\tilde b}_{\a\b}$ is defined in [(\[btilde\])]{}. As before, solving for the spin connection from [(\[nnm2\])]{} by inverting the hyper-matrix that multiplies $\omega^{(0)}$, we obtain \_= [g]{}\_1+ [g]{}\_2 [b]{}\_ [b]{}\^ \_\^[(0)]{} , \[nnm4\]where \_1=[11-4[g]{}]{} ,\_2=[4[g]{}(1-2[g]{})(1-4[g]{})]{} ,= (\^2x\^2)\^2 h\^[-4]{} . Substituting this result in [(\[nnm1\])]{} then gives the vierbein e\_\^a= [-2h\^2(1+2[g]{} )]{} , where ${\tilde J}_{ab}$ is defined in [(\[jtilde\])]{} \_4 = 2\^2 x\^2h\^[-4]{} \_5= [6\^2 x\^2h\^[-4]{}1-4[g]{}]{} , \[tildeg345\]and the spin connections are given in [(\[nnm4\])]{} and [(\[nnm3\])]{}. Thus, the metric $g_{\mu\nu}=e_\mu^a e_\nu^b\,\eta_{ab}$ takes the form g\_= [4h\^4\^2]{} .The vierbein has potential singularities at $h^2=0$, $h^2=2$ and $h^2=\ft23$. The singularities at $h^2=0$ and $h^2=2$ are related to degenerate vierbeins exactly as for the $P^+$ solution. The singularity at $h^2=\ft23$, which arises in the case of $\l^2=1$ in Euclidean and Kleinian signature, also gives a degenerate vierbein. This is an intriguing situation since the degeneration occurs inside the coordinate charts. Starting from HS gauge theories in four dimensions based on infinite dimensional extensions of $SO(5;\Comp)$, we have determined their real forms in spacetimes with Euclidean $(4,0)$ and Kleinian $(2,2)$ signature, in addition to the usual Lorentzian $(3,1)$ signature. We have then found three new types of solutions in addition to the maximally symmetric ones. Type 1 solutions, which are invariant under an infinite dimensional extension of $SO(4-p,p)$, give us a nontrivial deformation of the maximally symmetric solutions, and depend on a continuous real parameter as well as infinite set of discrete parameters. Interestingly, a particular choice of the discrete parameters, in the limit of vanishing continuous parameter, gives rise to a degenerate, indeed rank one, metric. Given that degenerate metrics are known to play an important role in topology change in quantum gravity [@Horowitz:1990qb], it is remarkable that such metrics emerge naturally in HS gauge theory. Type 2 solutions, which provide another kind of deformation of the maximally symmetric solutions, have a non-vanishing spinorial master one-form. Type 3 solutions are particularly remarkable because all the higher spin fields are non-vanishing, and the corresponding Weyl tensors furnish a higher spin generalization of Type D gravitational instantons. It would be interesting to apply the framework we have used in this paper to finding pp-wave, black hole and domain wall solutions with non-vanishing HS fields. We stress that our models in Euclidean and Kleinian signatures are formulated using the 4D spinor-oscillator formulation. It would be interesting to compare these models to the vector-oscillator formulation [@Vasiliev:2003ev]. The latter exists in any dimension and signature, and relies on the gauging of an internal $Sp(2)$ gauge symmetry. At the full level, the vector-oscillator master field equations, in any dimension and signature, are formulated using a single $Sp(2)$-doublet $Z$-oscillator, leaving, apparently, no room for parity violating interactions. The precise relation between the spinor and vector-oscillator formulations in D=4 therefore deserve further study. In the context of supersymmetric field theories, including supergravity, the non-Lorentzian signature typically presents obstacle since the spinor properties are sensitive to the spacetime signature. Here, however, we have considered bosonic HS gauge theories in which the spinor oscillators play an auxiliary role, and we have formulated the non-Lorentzian signature theories with suitable definition of the spinors without having to face such obstacles. Remarkably, non-supersymmetric 4D theories in Kleinian signature describing self-dual gravity arise in worldsheet $N=2$ supersymmetric string theories, known as $N=2$ strings. For reasons mentioned in the introduction, it is an interesting open problem to find a niche for Kleinian HS gauge theory in a variant of an $N=2$ string. There are several other open problems that deserve investigation. To begin with, we have not determined the symmetries of Type 2 and Type 3 solutions. While it may be useful in its own right to determine whether our Type 3 solutions support a complex, possibly Kähler, structure up to a conformal scaling, such results may be limited in shedding light to the geometry associated with infinitely many gauge fields present in HS gauge theory. The correct interpretation of the singularities or degeneracies in the metrics we have found also require sufficient knowledge of the HS geometry. Furthermore, a proper formulation of the HS geometry would also provide a framework for constructing invariants that could distinguish the gauge inequivalent classes of exact solutions. It would also be interesting to study the fluctuations about our exact solutions, and explore their potential application in quantum gravity and cosmology. Similarities between the frameworks for studying instanton and soliton solutions of the noncommutative field theories (see, for example, [@Schaposnik:2003vr]), and in particular open string field theory, are also worth investigating. [**Acknowledgements**]{} We are grateful to J. Engquist and A. Sagnotti for discussions. P.S. thanks the Physics Department at Texas A& M University, and E.S. thanks the Scuola Normale Superiore, where part of this work was done, for hospitality. The research of C.I. was supported in part by INFN; by the MIUR-PRIN contract 2003-023852; by the EU contracts MRTN-CT-2004-503369 and MRTN-CT-2004-512194; by the INTAS contract 03-51-6346; and by the NATO grant PST.CLG.978785. The research of E.S. was supported in part by NSF Grant PHY-0555575. The research of P.S. was supported in part by a visiting professorship issued by Scuola Normale Superiore; by INFN; by the MIUR-PRIN contract 2003-023852; by the EU contracts MRTN-CT-2004-503369 and MRTN-CT-2004-512194; by the INTAS contract 03-51-6346; and by the NATO grant PST.CLG.978785. \[App1\] We use the conventions of [@Sezgin:1998gg] in which the real form of the $SO(5;\Comp)$ generators obey  = i\_[BC]{}M\_[AD]{}+ ,(M\_[AB]{})\^ = (M\_[AB]{}) ,\[sogena\]where $\eta_{AB}=(\eta_{ab};-\lambda^2)$. The commutation relations above decompose as \_ = 4i\_[\[c|\[b]{}M\_[a\]|d\]]{} ,\_ = 2i\_[c\[b]{}P\_[a\]]{} ,\_ =i\^2 M\_[ab]{} .\[sogenb\]The corresponding oscillator realization is taken to be M\_[ab]{} = -18  ,P\_[a]{} = 4 (\_a)\^y\_\_ .\[mab\] Our spinor conventions are \^\_[c]{}  =  2 \^\_[c]{}  , \^\_[c]{}  =  \^\_ ,and (\_)\^ =  { [ll]{} \^&\ \_&\ \_ & . Oscillator indices are raised and lowered according to the following conventions, $A^\a=\epsilon^{\a\b}A_\b$, $A_\a=A^\b\epsilon_{\b\a}$. The reality conditions on oscillators have been summarized in (\[su2\]), (\[sl2\]) and (\[sp2\]). The van der Waerden symbols obey (\^[a]{})\_\^(\^[b]{})\_\^&=& \^[ab]{}\_\^ + (\^[ab]{})\_\^  , (\^[a]{})\_\^(\^[b]{})\_\^ = \^[ab]{}\^\_ + (\^[ab]{})\_\^  ,\[so4a\]2 12 \_[abcd]{}(\^[cd]{})\_&=& (\_[ab]{})\_ ,12 \_[abcd]{}(\^[cd]{})\_ =  -(\_[ab]{})\_ ,\[so4b\] where $\e=\sqrt{\det \eta_{ab}}$, and the following reality conditions ((\^a)\_)\^ = { [ll]{} -(\^a)\^  =  -(\^a)\^&\ (\^a)\_  =  (\^a)\_ &\ (\^a)\_  =  (\^a)\_ & .and ((\^[ab]{})\_)\^ = { [ll]{} (\^[ab]{})\^ &\ (\^[ab]{})\_ &\ (\^[ab]{})\_ & .  .Convenient representations are: SU(2)&: & \^a=(i,\^i)  ,\^a=(-i,\^i) ,=i\^2  ;\ SL(2,)&: & \^a=(-i\^2,-i\^i\^2)  ,\^a=(-i\^2,i\^2\^i)  , =i\^2  ;\ Sp(2)& : & \^a=(1,\^i)  , \^a=(-1,\^i) ,=i\^2  ,where in the last case $\ts^i = (\s^1,i\s^2,\s^3)$. Combining (\[em\]) with (\[mab\]), the real form of the $\mso(5;\Comp)$-valued connection $\O$ can be expressed as Ø = 1[4i]{} dx\^ ,\[Omega\] where ø\^ = -14(\_[ab]{})\^ ø\^[ab]{} , \^ = -14(\_[ab]{})\^ ø\^[ab]{} , e\^ = 2(\_[a]{})\^ e\^[a]{} . \[convert\] Likewise, for the curvature ${\cal R}=d\O+\O\wedge\star \O$ one finds \_&=& dø\_ +ø\_[c]{}ø\_\^[c]{}+ e\_e\_\^ , \[rab\]2 |[R]{}\_&=& d|[ø]{}\_ +|[ø]{}\_|[ø]{}\_\^ +e\_e\^\_ , \[radbd\]2 [R]{}\_&=& de\_+ ø\_[c]{} e\^[c]{}\_+|[ø]{}\_e\_\^ ,\[rabd\] and \^[ab]{} = dø\^[ab]{}+ø\^a\_cø\^[cb]{} +\^2 e\^ae\^b ,\^a = d e\^a+ø\^a\_be\^b . \[curvcomp\] \[AppDef\] The gauge function $L(x;y,\yb)$ defined in [(\[wL\])]{} can be written as L &=& [2h1+h]{} (-iy a ) , \[L\]where a\_&=&[x\_1+h]{} ,x\_=(\^a)\_ x\_a ,\[aaad\]2 x\^2 &=& \_[ab]{} x\^a x\^b ,h = .\[aad\] Useful relations that follow from these definitions are a\^2=[1-h1+h]{} ,h=[1-a\^21+a\^2]{} .The Maurer-Cartan form based on $L$ defined in [(\[wL\])]{} yields the the vierbein and Lorentz connection e\_[(0)]{}\^ = -[ł(\^a)\^dx\_ah\^2]{} ,ø\_[(0)]{}\^ = - [ł\^2(\^[ab]{})\^ dx\_a x\_bh\^2]{},\[adseo\]with Riemann tensor given by R\_[(0),]{} = -\^2 ( g\_[(0)]{} g\_[(0)]{}- g\_[(0)]{} g\_[(0)]{} ) . A further useful definition is b\_&=&2ł\_[(]{}\_[)]{} ,ł\^\_ = 2. \[bab\]It obeys the relation $(b^2)_\a{}^\b\ =\ -\ft 14 \d_\a^\b$ and it defines an almost complex structure via the relations (see, for example, [@Pope:1982ad]) b\_= (\^[ab]{})\_J\_[ab]{} ,J\_[ab]{}=(\_[ab]{})\^b\_ ,J\_a\^c J\_c\^b= -\_a\^b . \[jj\]Similarly, using the definition \_= a\^[-2]{} (a[|b]{} |a)\_,\[btilde\]we have the relations \_= (\^[ab]{})\_[J]{}\_[ab]{} ,\_[ab]{}=(\_[ab]{})\^ [b]{}\_ ,\_a\^c [J]{}\_c\^b= -\_a\^b.\[jtilde\] Finally, we have the following definition for spinors used in describing a Type 3 solution: U\_=[x\^a]{} ([|]{}\_a)\_ , V\_= [x\^a]{} ([|]{}\_a )\_ . \[UV\] \[AppProj\] Weyl-ordered projectors $P(y,\bar y)$ can be constructed by recombining $(y,\bar y)$ into a pair of Heisenberg oscillators $(a_i,b^j)$ ($i,j=1,2)$ obeying \_&=& \_i\^j .For example, one can take a\_1&=&u = ł\^y\_ ,b\^1 = v = \^y\_,\ a\_2&=&|u = |ł\^|y\_ ,b\^2 = |v= |\^|y\_ ,where the constant spinors are normalized as ł\^\_&=&2 ,|ł\^|\_ =2 .The projectors, obeying the appropriate reality conditions, take the form P&=&\_[n\_1,n\_2 +12]{}\_[n\_1,n\_2]{} P\_[n\_1,n\_2]{},|P = \_[n\_1,n\_2 +12]{}|\_[n\_1,n\_2]{} P\_[n\_1,n\_2]{} ,\[generalP\]where $\theta_{n_1,n_2}\in\{0,1\}$ and $\bar\th_{n_1,n_2}\in\{0,1\}$, with &:& \_[n\_1,n\_2]{} =|\_[n\_1,n\_2]{} ,\ &:& \_[n\_1,n\_2]{},|\_[n\_1,n\_2]{} ,and P\_[n\_1,n\_2]{}&=& 4(-1)\^[n\_1+n\_2-2]{}e\^[-2\_i \_i w\_i]{}L\_[n\_1-2]{}(4\_1 w\_1)L\_[n\_2-2]{}(4\_2 w\_2) ,\ w\_i&=&b\^i a\_i = b\^ia\_i+12 = a\_ib\^i-12 ,with $\e_i=n_i/|n_i|$ and $L_n(x)={1\over n!}e^x{d^n\over dx^n}(e^{-x}x^n)$ are the Laguerre polynomials. The projector property follows from P\_[m\_1,m\_2]{}P\_[n\_1,n\_2]{}&=& \_[m\_1 n\_1]{}\_[m\_2 n\_2]{}P\_[n\_1,n\_2]{},\ (w\_i-n\_i)P\_[n\_1,n\_2]{}&=& 0 ,\ (P\_[n\_1,n\_2]{})&=& P\_[-n\_1,-n\_2]{} .\[tauP\]Here, $w_i-\ft12$ is the Weyl-ordered form of the number operator, and 2(-1)\^[n\_i-2]{} e\^[-2\_i w\_i]{}L\_[n\_i-2]{}(4\_i w\_i)&=&where $|n_i\rangle=\ft{(b^i)^{n_i-\ft12}}{\sqrt{(n_i-\ft12)!}}|0\rangle$ with $n_i>0$ belongs to the standard Fock space, built by acting with $b^i$ on the ground state $|0\rangle$ obeying $a_i|0\rangle=0$, while $|n_i\rangle=\ft{(a_i)^{-n_i-\ft12}}{\sqrt{(-n_i-\ft12)!}}|\tilde 0\rangle$ for $n_i<0$ are anti-Fock space states, built by acting with $a_i$ on the anti-ground state $|\tilde 0\rangle=0$ obeying $b^i|\tilde 0\rangle=0$. Formally, the inner product between a Fock space state and an anti-Fock space state vanishes. However, the corresponding Weyl-ordered projectors have divergent $\star$-products, as can be seen from the lemma e\^[suv]{}e\^[tuv]{}&=& [11+4]{}([uv]{}) .Thus, lacking, at present, a suitable regularization scheme that does not violate associativity and other basic properties of the $\star$-product algebra, we shall restrict our attention to projectors that are constructed in either the Fock space or the anti-Fock space, *i.e.* \_[n\_1,n\_2]{}&=&1  ,where $Q$ is anyone of the four quadrants in the $(n_1,n_2)$ plane. From [(\[tauP\])]{}, it follows that these projectors are not invariant under the $\tau$ map, and therefore the master fields Type 2 and Type 3 solutions will be those of the non-minimal model, where the $\tau$ conditions are relaxed to $\pi\bar\pi$ conditions, which are certainly satisfied. We also note that in order to solve the higher-spin equations it is essential that \_&=&\_[n\_1,n\_2]{} (\_[n\_1,n\_2]{}|\_[n\_1,n\_2]{}-|\_[n\_1,n\_2]{}\_[n\_1,n\_2]{})P\_[n\_1,n\_2]{}= 0 ,which holds for independent $\th_{n_1,n_2}$ and $\bar{\th}_{n_1,n_2}$ parameters (in the Euclidean and Kleinian signatures). Moreover, one can work with a reduced set of oscillators, say $a_1=u$ and $b^1=v$, by summing over all values of $n_2$ using \_[k=0]{}\^t\^k L\_k(x)&=&(1-t)\^[-1]{}(-xt(1-t)\^[-1]{}).\[generating\]Setting $n=n_1$ and $\e=\e_1$, this leads to P&=& \_[n +12]{}\_n P\_n ,|P = \_[n +12]{}|\_n P\_n\ P\_n&=& 2(-1)\^[n-2]{} e\^[-2uv]{} L\_n(4uv),\[reduced\]with suitable reality conditions on the $\th_n$ parameters. Finally, using [(\[generating\])]{} once more, one finds that setting all $\th$-parameters equal to $1$ gives $P=1$. \[App2\] In this Appendix we compute $V=L^{-1}\star P\star L$ where $L$ is the gauge function given in [(\[L\])]{} and $P$ is a projector of the form given in [(\[generalP\])]{}. Let us begin by considering the case of $P=P_{\ft12}=2e^{-2uv}$, *i.e.* V &=&[8h\^2(1+h)\^2]{} e\^[iy a |y]{}e\^[yby]{}e\^[-iy a|y]{} ,where $y a\bar y= y^\a a_{\a}{}^{\ad}\bar y_{\ad}$ and $yby=y^\a b_\a{}^\b y_\b$, with $a_{\a\ad}$ and $b_{\a\b}$ given by [(\[aaad\])]{} and [(\[bab\])]{}. The first $\star$-product can be performed treating the integration variables $(\xi_\a,\eta_\a)$ and $(\bar\xi_{\ad},\bar\eta_{\ad})$ as separate real variables. Using the formulae (B.1) provided in [@Sezgin:2005pv], we find V &=&[8h\^2(1+h)\^2]{} e\^[i ya|y+ (y-|y a)b(y+a|y)]{}e\^[-i y a|y]{} .The remaining $\star$-product leads to the Gaussian integral V&=&[8h\^2(1+h)\^2]{} e\^[12 \^I M\_I\^J \_J+\^I N\_I +(y-a)b(y+a)]{},\[b4\] where $\Xi^I=(\x^\a,\bar \x^{\ad};\eta^{\a},\bar\eta^{\ad})$ and $\Xi_I=(\x_\a,\bar \x_{\ad};\eta_{\a},\bar\eta_{\ad})=\Xi^J\Omega_{JI}$, with block-diagonal symplectic metric $\Omega=\e\oplus\bar \e\oplus\e\oplus\bar \e$, and M&=& ,\ A&=&  ,B =  ,\ N&=&  .The Gaussian integration gives V &=&[8h\^2(1+h)\^2]{} e\^[12 N\^I(M\^[-1]{})\_I\^J N\_J + (y-|y a)b(y+a|y)]{} .From $\det M= \det (1+AB)$, and noting that the matrices defined as C&& [BA-a\^22i]{} =  ,C  [AB-a\^22i]{}=  ,are nilpotent, i.e. $C^2 = \tilde C^2\ =\ 0$, one finds M&=& (1-a\^2)\^4 ,and, using $1-a^2=2h/(1+h)$, the pre-factor in $V$ is thus given by &=&2 .Next, using geometric series expansions, one finds M\^[-1]{}&=& [i(1-a\^2)]{} ,and 12 N\^I(M\^[-1]{})\_I\^J N\_J&=& [4a\^2 yby +2(1+4a\^2-a\^4) yba-(3-a\^2)(1+a\^2) |y |aba|y(1-a\^2)\^2]{} .Adding the classical term in the exponent in [(\[b4\])]{} yields the final result V &=& 2 (-[ \[2|a -(1+a\^2)y\]b\[2a+(1+a\^2)y\](1-a\^2)\^2]{}) .\[Vrho0\]The projector property $V\star V=V$ follows manifestly from V&=& 2(-2uv) ,\_ = 1 ,where u&=&ł\^\_ ,v = \^\_,with \_&=& [\[(1+a\^2)y+2a\]\_1-a\^2]{} ,\_ = 2i\_ .Thus, the net effect of rotating the projector $P_{\ft12}(u,v)$ given in [(\[reduced\])]{} is to replace the oscillators $u$ and $v$ by their rotated dittos $\tilde u$ and $\tilde v$. We claim, without proof, that this generalizes to any $n$, *viz.* L\^[-1]{}P\_n(u,v)L&=& P\_n(u,v) .Similarly, for $P_n(\bar u,\bar v)$ we have L\^[-1]{}P\_n(|u,|v)L&=& P\_n(,) ,where &=&|ł\^|\_ , = |\^|\_ ,with |\_&=& [\[(1+a\^2)+2|a y\]\_1-a\^2]{},\_ = 2i\_.Finally, using $[\eta_{\a},\bar\eta_{\ad}]_\star=0$, we deduce that V&=&L\^[-1]{}PL = \_[n\_1,n\_2]{}\_[n\_1,n\_2]{} P\_[n\_1,n\_2]{}(u,v;,).\[generalV\] [99]{} M.A. Vasiliev, [*Consistent equations for interacting gauge fields of all spins in $3+1$ dimensions*]{}, Phys. Lett. [**B243**]{} (1990) 378. M. Flato and C. Fronsdal, “One Massless Particle Equals Two Dirac Singletons: Elementary Particles In A Curved Space. 6,” Lett. Math. Phys.  [**2**]{} (1978) 421. J. Engquist, P. Sundell and L. Tamassia, “Singleton strings,” arXiv:hep-th/0701081. S. F. Prokushkin and M. A. Vasiliev, “Higher-spin gauge interactions for massive matter fields in 3D AdS space-time,” Nucl. Phys.  B [**545**]{} (1999) 385 \[arXiv:hep-th/9806236\]. E. Sezgin and P. Sundell, “An exact solution of 4D higher-spin gauge theory,” Nucl. Phys.  B [**762**]{}, 1 (2007) \[arXiv:hep-th/0508158\]. E. Sezgin and P. Sundell, “On an exact cosmological solution of higher spin gauge theory,” arXiv:hep-th/0511296. V. E. Didenko, A. S. Matveev and M. A. Vasiliev, “BTZ black hole as solution of 3d higher spin gauge theory,” arXiv:hep-th/0612161. C. Iazeolla and P. Sundell, in preparation. J. Engquist and O. Hohm, “Higher-spin Chern-Simons theories in odd dimensions,” arXiv:0705.3714 \[hep-th\]. G. W. Gibbons and S.W. Hawking, (eds.), [*Euclidean Quantum Gravity*]{}, (World Scientific, 993). G. W. Gibbons, [*Euclidean quantum gravity: The view from 2002*]{}, in [*The future of Theoretical Physics and Cosmology*]{}, p.351 (Cambridge University Press, 2002). H. Ooguri and C. Vafa, “Selfduality and N=2 string magic,” Mod. Phys. Lett.  A [**5**]{} (1990) 1389. K. Junemann and O. Lechtenfeld, “Chiral BRST cohomology of N = 2 strings at arbitrary ghost and picture number,” Commun. Math. Phys.  [**203**]{} (1999) 53 \[arXiv:hep-th/9712182\]. C. Devchand and O. Lechtenfeld, “Extended self-dual Yang-Mills from the N = 2 string,” Nucl. Phys.  B [**516**]{} (1998) 255 \[arXiv:hep-th/9712043\]. M. A. Vasiliev, “Higher-spin gauge theories in four, three and two dimensions,” Int. J. Mod. Phys.  D [**5**]{} (1996) 763 \[arXiv:hep-th/9611024\]. J. Engquist, E. Sezgin and P. Sundell, “On N = 1,2,4 higher spin gauge theories in four dimensions,” Class. Quant. Grav.  [**19**]{} (2002) 6175 \[arXiv:hep-th/0207101\]. G. T. Horowitz, “Topology change in classical and quantum gravity,” Class. Quant. Grav.  [**8**]{} (1991) 587. E. J. Flaherty, “Hermitian and Kahlerian Geometry in Relativity”, p. 175 (Springer-Verlag, 1976). A. S. Lapedes and M. J. Perry, “Type D Gravitational Instantons,” Phys. Rev.  D [**24**]{} (1981) 1478. E. Sezgin and P. Sundell, “Holography in 4D (super) higher spin theories and a test via cubic scalar couplings,” JHEP [**0507**]{} (2005) 044 \[arXiv:hep-th/0305040\]. E. Sezgin and P. Sundell, “Analysis of higher spin field equations in four dimensions,” JHEP [**0207**]{} (2002) 055 \[arXiv:hep-th/0205132\]. K. I. Bolotin and M. A. Vasiliev, “Star-product and massless free field dynamics in AdS(4)”, Phys. Lett. B [**479**]{} (2000) 421 \[arXiv:hep-th/0001031\]. M. A. Vasiliev, “Nonlinear equations for symmetric massless higher spin fields in (A)dS(d),” Phys. Lett.  B [**567**]{} (2003) 139 \[arXiv:hep-th/0304049\]. F. A. Schaposnik, “Noncommutative solitons and instantons,” Braz. J. Phys.  [**34**]{} (2004) 1349 \[arXiv:hep-th/0310202\]. E. Sezgin and P. Sundell, “Higher spin N = 8 supergravity,” JHEP [**9811**]{} (1998) 016 \[arXiv:hep-th/9805125\]. C. N. Pope, “Kahler Manifolds And Quantum Gravity,” J. Phys. A [**15**]{} (1982) 2455. [^1]: We shall leave the group-theoretical analysis to [@wip], where we also give the spinor-oscillator formulations of the four-dimensional minimal bosonic models with $H_4$, $dS_4$ and $H_{3,2}$ vacua. [^2]: The integration measure is defined by $d^4\xi=d^2\x^1 d^2\x^2$, where $d^2 z=idz\wedge d\bar z=2dx\wedge dy$ for $z=x+iy$. With this normalization, $\id\star \widehat f=\widehat f$. [^3]: The exterior derivative obeys $\tau d=d\tau$ and $\pi d=d\pi$, and the $\tau$ and $\pi$ maps do not act on the commutative coordinates. [^4]: The dagger acts as usual complex conjugation on component fields; in this paper we shall denote the conjugate of a complex number $x$ by $x^\ast$, while reserving the bar for denoting quantities associated with the $R$-handed oscillators. [^5]: A more detailed description of the complex higher-spin algebra and its representations is given in [@wip]. [^6]: By definition masslessness refers to reduction in the infinite-dimensional weight space of the various real forms of $SO(5;\Comp)$. This is well-known for $SO(3,2)$ and similar situations arise for other signatures as well. By compositeness we mean that the massless states are composites of singletons [@Flato:1978qz].
Kitchen Island Pendant Lighting Photos Island kitchen pendant lighting ideas height a look at the top 12 kitchen island lights to illuminate your lighting for over mini pendant lights for kitchen island uk best 2017 a look at the top 12 kitchen island lights to illuminate your lighting for over
Q: Failed to instantiate [org.springframework.web.context.support.XmlWebApplicationContext] I'm a J2EE noob (.Net stack) and am at my wits end trying to get a basic tutorial off the ground. I'm using Eclipse with Tomcat 8.5 set up. I keep seeing this error in the console when trying to launch my application... INFO: Initializing Spring root WebApplicationContext 09:39:42,442 ERROR ContextLoader:351 - Context initialization failed org.springframework.beans.BeanInstantiationException: Failed to instantiate [org.springframework.web.context.support.XmlWebApplicationContext]: Constructor threw exception; nested exception is java.lang.NoClassDefFoundError: org/apache/commons/logging/LogFactory at org.springframework.beans.BeanUtils.instantiateClass(BeanUtils.java:159) at org.springframework.beans.BeanUtils.instantiateClass(BeanUtils.java:104) at org.springframework.web.context.ContextLoader.createWebApplicationContext(ContextLoader.java:380) at org.springframework.web.context.ContextLoader.initWebApplicationContext(ContextLoader.java:313) at org.springframework.web.context.ContextLoaderListener.contextInitialized(ContextLoaderListener.java:107) at org.apache.catalina.core.StandardContext.listenerStart(StandardContext.java:4727) at org.apache.catalina.core.StandardContext.startInternal(StandardContext.java:5189) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:150) at org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1403) at org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1393) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) at java.lang.Thread.run(Thread.java:745) Caused by: java.lang.NoClassDefFoundError: org/apache/commons/logging/LogFactory at org.springframework.core.io.support.PathMatchingResourcePatternResolver.<clinit>(PathMatchingResourcePatternResolver.java:169) at org.springframework.web.context.support.AbstractRefreshableWebApplicationContext.getResourcePatternResolver(AbstractRefreshableWebApplicationContext.java:183) at org.springframework.context.support.AbstractApplicationContext.<init>(AbstractApplicationContext.java:216) at org.springframework.context.support.AbstractRefreshableApplicationContext.<init>(AbstractRefreshableApplicationContext.java:80) at org.springframework.context.support.AbstractRefreshableConfigApplicationContext.<init>(AbstractRefreshableConfigApplicationContext.java:50) at org.springframework.web.context.support.AbstractRefreshableWebApplicationContext.<init>(AbstractRefreshableWebApplicationContext.java:95) at org.springframework.web.context.support.XmlWebApplicationContext.<init>(XmlWebApplicationContext.java:62) at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) at java.lang.reflect.Constructor.newInstance(Constructor.java:423) at org.springframework.beans.BeanUtils.instantiateClass(BeanUtils.java:147) ... 13 more Sep 09, 2016 9:39:42 AM org.apache.catalina.core.StandardContext listenerStart SEVERE: Exception sending context initialized event to listener instance of class org.springframework.web.context.ContextLoaderListener org.springframework.beans.BeanInstantiationException: Failed to instantiate [org.springframework.web.context.support.XmlWebApplicationContext]: Constructor threw exception; nested exception is java.lang.NoClassDefFoundError: org/apache/commons/logging/LogFactory at org.springframework.beans.BeanUtils.instantiateClass(BeanUtils.java:159) at org.springframework.beans.BeanUtils.instantiateClass(BeanUtils.java:104) at org.springframework.web.context.ContextLoader.createWebApplicationContext(ContextLoader.java:380) at org.springframework.web.context.ContextLoader.initWebApplicationContext(ContextLoader.java:313) at org.springframework.web.context.ContextLoaderListener.contextInitialized(ContextLoaderListener.java:107) at org.apache.catalina.core.StandardContext.listenerStart(StandardContext.java:4727) at org.apache.catalina.core.StandardContext.startInternal(StandardContext.java:5189) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:150) at org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1403) at org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1393) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) at java.lang.Thread.run(Thread.java:745) Caused by: java.lang.NoClassDefFoundError: org/apache/commons/logging/LogFactory at org.springframework.core.io.support.PathMatchingResourcePatternResolver.<clinit>(PathMatchingResourcePatternResolver.java:169) at org.springframework.web.context.support.AbstractRefreshableWebApplicationContext.getResourcePatternResolver(AbstractRefreshableWebApplicationContext.java:183) at org.springframework.context.support.AbstractApplicationContext.<init>(AbstractApplicationContext.java:216) at org.springframework.context.support.AbstractRefreshableApplicationContext.<init>(AbstractRefreshableApplicationContext.java:80) at org.springframework.context.support.AbstractRefreshableConfigApplicationContext.<init>(AbstractRefreshableConfigApplicationContext.java:50) at org.springframework.web.context.support.AbstractRefreshableWebApplicationContext.<init>(AbstractRefreshableWebApplicationContext.java:95) at org.springframework.web.context.support.XmlWebApplicationContext.<init>(XmlWebApplicationContext.java:62) at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) at java.lang.reflect.Constructor.newInstance(Constructor.java:423) at org.springframework.beans.BeanUtils.instantiateClass(BeanUtils.java:147) ... 13 more My config files look like this... applicationContext.xml... <?xml version="1.0" encoding="UTF-8"?> <beans xmlns="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd"> <import resource="datasource-config.xml" /> <import resource="webflow-config.xml" /> </beans> datasource-config.xml... <?xml version="1.0" encoding="UTF-8"?> <beans xmlns="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:tx="http://www.springframework.org/schema/tx" xmlns:context="http://www.springframework.org/schema/context" xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd http://www.springframework.org/schema/tx http://www.springframework.org/schema/tx/spring-tx.xsd http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context-3.1.xsd"> <context:property-placeholder location="classpath:datasource.properties" /> <bean id="dataSource" class="oracle.jdbc.pool.OracleDataSource" destroy-method="close"> <property name="connectionCachingEnabled" value="true" /> <property name="URL" value="jdbc:oracle:thin:@localhost:1521:XE" /> <property name="user" value="user" /> <property name="password" value="pass" /> </bean> <bean id="entityManagerFactory" class="org.springframework.orm.jpa.LocalContainerEntityManagerFactoryBean"> <property name="jpaVendorAdapter"> <bean class="org.springframework.orm.jpa.vendor.HibernateJpaVendorAdapter"> <property name="showSql" value="true" /> <property name="generateDdl" value="true" /> <property name="databasePlatform" value="org.hibernate.dialect.Oracle10gDialect" /> </bean> </property> <property name="dataSource" ref="dataSource" /> </bean> <bean id="transactionManager" class="org.springframework.orm.jpa.JpaTransactionManager"> <property name="dataSource" ref="dataSource" /> <property name="entityManagerFactory" ref="entityManagerFactory" /> </bean> <tx:annotation-driven transaction-manager="transactionManager" /> <bean class="org.springframework.orm.jpa.support.PersistenceAnnotationBeanPostProcessor" /> </beans> webflow-config.xml... <?xml version="1.0" encoding="UTF-8"?> <beans xmlns="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:webflow="http://www.springframework.org/schema/webflow-config" xmlns:faces="http://www.springframework.org/schema/faces" xsi:schemaLocation=" http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd http://www.springframework.org/schema/webflow-config http://www.springframework.org/schema/webflow-config/spring-webflow-config.xsd http://www.springframework.org/schema/faces http://www.springframework.org/schema/faces/spring-faces.xsd"> <bean id="jpaFlowExecutionListener" class="org.springframework.webflow.persistence.JpaFlowExecutionListener"> <constructor-arg ref="entityManagerFactory" /> <constructor-arg ref="transactionManager" /> </bean> <bean id="facesContextListener" class="org.springframework.faces.webflow.FlowFacesContextLifecycleListener" /> <webflow:flow-executor id="flowExecutor"> <webflow:flow-execution-listeners> <webflow:listener ref="jpaFlowExecutionListener" /> <webflow:listener ref="facesContextListener"/> </webflow:flow-execution-listeners> </webflow:flow-executor> <webflow:flow-registry id="flowRegistry" flow-builder-services="facesFlowBuilderServices" base-path="/WEB-INF/flows"> <webflow:flow-location-pattern value="/**/*-flow.xml" /> </webflow:flow-registry> <faces:flow-builder-services id="facesFlowBuilderServices" development="true" /> <faces:resources /> <bean class="org.springframework.webflow.mvc.servlet.FlowHandlerMapping"> <property name="order" value="1"/> <property name="flowRegistry" ref="flowRegistry" /> <property name="defaultHandler"> <bean class="org.springframework.web.servlet.mvc.UrlFilenameViewController" /> </property> </bean> <bean class="org.springframework.faces.webflow.JsfFlowHandlerAdapter"> <property name="flowExecutor" ref="flowExecutor" /> </bean> <bean id="faceletsViewResolver" class="org.springframework.web.servlet.view.UrlBasedViewResolver"> <property name="viewClass" value="org.springframework.faces.mvc.JsfView"/> <property name="prefix" value="/WEB-INF/" /> <property name="suffix" value=".xhtml" /> </bean> <bean class="org.springframework.web.servlet.mvc.SimpleControllerHandlerAdapter" /> </beans> Stuff like this reminds me why I despise declarative programming so much. My pom XMLlooks like this... <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd"> <modelVersion>4.0.0</modelVersion> <groupId>com.example.j2eeapp</groupId> <artifactId>j2eeapplication</artifactId> <version>0.0.1-SNAPSHOT</version> <packaging>war</packaging> <name>J2EE Application</name> <repositories> <repository> <id>prime-repo</id> <name>PrimeFaces Maven Repository</name> <url>http://repository.primefaces.org</url> </repository> </repositories> <dependencies> <dependency> <groupId>com.oracle</groupId> <artifactId>ojdbc14</artifactId> <version>10.2.0.1.0</version> </dependency> <dependency> <groupId>org.hibernate</groupId> <artifactId>hibernate-core</artifactId> <version>5.2.2.Final</version> </dependency> <dependency> <groupId>org.hibernate</groupId> <artifactId>hibernate-validator</artifactId> <version>5.2.2.Final</version> </dependency> <dependency> <groupId>junit</groupId> <artifactId>junit</artifactId> <version>4.8.2</version> <scope>test</scope> </dependency> <dependency> <groupId>org.springframework.webflow</groupId> <artifactId>spring-webflow</artifactId> <version>2.4.4.RELEASE</version> </dependency> <dependency> <groupId>org.springframework.webflow</groupId> <artifactId>spring-faces</artifactId> <version>2.4.4.RELEASE</version> </dependency> <dependency> <groupId>org.springframework</groupId> <artifactId>spring-orm</artifactId> <version>4.3.2.RELEASE</version> </dependency> <dependency> <groupId>com.sun.faces</groupId> <artifactId>jsf-impl</artifactId> <version>2.2.13</version> </dependency> <dependency> <groupId>com.sun.facelets</groupId> <artifactId>jsf-facelets</artifactId> <version>1.1.14</version> </dependency> <dependency> <groupId>com.sun.faces</groupId> <artifactId>jsf-api</artifactId> <version>2.2.13</version> </dependency> <dependency> <groupId>commons-dbcp</groupId> <artifactId>commons-dbcp</artifactId> <version>20030825.184428</version> </dependency> <dependency> <groupId>org.slf4j</groupId> <artifactId>slf4j-log4j12</artifactId> <version>1.7.21</version> </dependency> <dependency> <groupId>javax.servlet</groupId> <artifactId>javax.servlet-api</artifactId> <version>3.1.0</version> <scope>provided</scope> </dependency> <dependency> <groupId>org.springframework</groupId> <artifactId>spring-tx</artifactId> <version>4.3.2.RELEASE</version> </dependency> <dependency> <groupId>xml-apis</groupId> <artifactId>xml-apis</artifactId> <version>2.0.2</version> </dependency> <dependency> <groupId>org.springframework.security</groupId> <artifactId>spring-security-web</artifactId> <version>4.1.3.RELEASE</version> </dependency> <dependency> <groupId>org.springframework.security</groupId> <artifactId>spring-security-config</artifactId> <version>4.1.3.RELEASE</version> </dependency> <dependency> <groupId>org.primefaces</groupId> <artifactId>primefaces</artifactId> <version>6.0</version> </dependency> <dependency> <groupId>cglib</groupId> <artifactId>cglib</artifactId> <version>3.2.4</version> </dependency> <dependency> <groupId>org.hibernate</groupId> <artifactId>hibernate-entitymanager</artifactId> <version>5.2.2.Final</version> </dependency> <dependency> <groupId>log4j</groupId> <artifactId>log4j</artifactId> <version>1.2.16</version> </dependency> </dependencies> </project> A: You are missing logger dependencies in your project build path. If you are using common logger then add below dependency in your pom.xml <dependency> <groupId>commons-logging</groupId> <artifactId>commons-logging</artifactId> <version>1.2</version> </dependency> if you are using logback, slf4j then exclude common loggings and use below dependencies: <exclusions> <exclusion> <artifactId>commons-logging</artifactId> <groupId>commons-logging</groupId> </exclusion> </exclusions> </dependency> <groupId>org.slf4j</groupId> <artifactId>slf4j-api</artifactId> <version>${org.slf4j-version}</version> </dependency> <dependency> <groupId>ch.qos.logback</groupId> <artifactId>logback-classic</artifactId> <version>1.0.13</version> </dependency> <dependency> <groupId>ch.qos.logback</groupId> <artifactId>logback-core</artifactId> <version>1.0.13</version> </dependency> <dependency> <groupId>ch.qos.logback</groupId> <artifactId>logback-access</artifactId> <version>1.0.13</version> </dependency> <dependency> <groupId>org.slf4j</groupId> <artifactId>jcl-over-slf4j</artifactId> <version>1.7.5</version> </dependency>
Q: Increase stack size with XCode I developed a command line application on Linux which needs its stack to be increased. On Linux I just used the workaround: ulimit -s unlimited before running the program. On Mac OS X, command line with G++, I add to the compilation options: -Wl,-stack_size,0x10000000 and it works. Now I am developing this program with XCODE, where should I add this option? A: From the project window: Targets > [Your target] > info > Build > Other Linker Flags > [your flags]
Paris is always a good idea; especially when contemplating where in the world to hold your destination wedding. Romance is woven into the very fiber of the city and Mademoiselle Fiona has captured that je t'aime fervor in the most beautiful way.Read More On SMP
Jordan Roughead Jordan Roughead (born 3 November 1990) is an Australian rules footballer who plays for the Collingwood Football Club in the Australian Football League (AFL). He previously played for the Western Bulldogs Football Club. He is the cousin of Hawthorn's Jarryd Roughead. AFL Career Western Bulldogs (2010–2018) Selected with the 31st selection in the 2008 AFL Draft, after playing for the North Ballarat Rebels in the TAC Cup, Roughead plays as a ruckman but is capable of filling a key position up forward and in defence. In Round 5 of 2010, Roughead made his AFL debut against the Adelaide Crows at Etihad Stadium. He performed well, gathering 9 disposals (3 kicks and 6 handballs), taking 4 marks, making 3 tackles and kicking a goal. During the 2012 season, Bulldogs coach Brendan McCartney moved Roughead into defence. He remained in this position until mid 2015 when McCartney's successor as coach, Luke Beveridge, moved him back into the ruck. Roughead was announced as the vice captain for 2015. However, he relinquished at the end of the season, choosing instead to focus on his sole performance as footballer. In 2016, Roughead played in the Bulldogs' drought-breaking 22-point Grand Final win against the Sydney Swans, amassing 13 disposals and 17 hit-outs from 75% game time. Collingwood (2019–Present) At the end of the 2018 season, Roughead was traded to Collingwood within the last half an hour of the AFL trade period. Statistics Statistics are correct to the end of the 2018 season |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 2010 | | 23 || 8 || 3 || 7 || 37 || 53 || 90 || 32 || 19 || 74 || 0.4 || 0.9 || 4.6 || 6.6 || 11.3 || 4.0 || 2.4 || 9.3 |- ! scope="row" style="text-align:center" | 2011 | | 23 || 9 || 3 || 5 || 43 || 58 || 101 || 28 || 28 || 76 || 0.3 || 0.6 || 4.8 || 6.4 || 11.2 || 3.1 || 3.1 || 8.4 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 2012 | | 23 || 18 || 4 || 8 || 98 || 97 || 195 || 76 || 48 || 105 || 0.2 || 0.4 || 5.4 || 5.4 || 10.8 || 4.2 || 2.7 || 5.8 |- ! scope="row" style="text-align:center" | 2013 | | 23 || 22 || 2 || 1 || 117 || 117 || 234 || 105 || 65 || 12 || 0.1 || 0.0 || 5.3 || 5.3 || 10.6 || 4.8 || 3.0 || 0.5 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 2014 | | 23 || 15 || 0 || 1 || 92 || 79 || 171 || 66 || 32 || 7 || 0.0 || 0.1 || 6.1 || 5.3 || 11.4 || 4.4 || 2.1 || 0.5 |- ! scope="row" style="text-align:center" | 2015 | | 23 || 16 || 4 || 2 || 82 || 78 || 160 || 66 || 54 || 170 || 0.3 || 0.1 || 5.1 || 4.9 || 10.0 || 4.1 || 3.4 || 10.6 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 2016 | | 23 || 25 || 8 || 10 || 148 || 126 || 274 || 86 || 87 || 382 || 0.3 || 0.4 || 5.9 || 5.0 || 11.0 || 3.4 || 3.5 || 15.3 |- ! scope="row" style="text-align:center" | 2017 | | 23 || 13 || 4 || 2 || 77 || 75 || 152 || 30 || 47 || 246 || 0.3 || 0.2 || 5.9 || 5.8 || 11.7 || 2.3 || 3.6 || 18.9 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 2018 | | 23 || 12 || 6 || 6 || 78 || 63 || 141 || 50 || 35 || 146 || 0.5 || 0.5 || 6.5 || 5.3 || 11.8 || 4.2 || 2.9 || 12.2 |- class="sortbottom" ! colspan=3| Career ! 138 ! 34 ! 42 ! 772 ! 746 ! 1518 ! 539 ! 415 ! 1218 ! 0.2 ! 0.3 ! 5.6 ! 5.4 ! 11.0 ! 3.9 ! 3.0 ! 8.8 |} Honours and achievements AFL 1x AFL Premiership Player: 2016 Western Bulldogs 1x Tony Liberatore Award (Most Improved Player): 2016 Chris Grant Award (Best First Year Player): 2010 Personal life Roughead grew up a Bulldogs supporter. His cousin is four-time premiership player and former Hawthorn captain Jarryd Roughead. References External links Category:1990 births Category:Living people Category:Western Bulldogs players Category:Williamstown Football Club players Category:Australian rules footballers from Victoria (Australia) Category:Greater Western Victoria Rebels players Category:Collingwood Football Club players
OPM sued over data breach by federal workers' union The largest union of federal workers filed a class-action lawsuit Monday against the Office of Personnel Management for failing to provide information to current and former federal workers about how they might be affected by the theft of data 4.2 million workers, and maybe more.
Evidence gathered so far suggests separatists launched the SA-11 surface-to-air missile that blew up the Malaysian airliner, but it remains unclear "who pulled the trigger" and why, said a senior intelligence official who spoke to reporters on condition of anonymity. "The most plausible explanation ... was that it was a mistake," and that the missile was fired by "an ill-trained crew" using a system that requires some skill and training, the official said. Dutch team will need to return to crash site Speaking after the train arrived in the city of Kharkiv, Mr Tuinder said his team would need to go back to the crash site to carry out another search for more bodies. International monitors say the crash site is still being compromised by separatists near Donetsk, a stronghold of pro-Russian rebels, where fighting with Ukrainian troops flared again on Tuesday. "There were human remains that had not been picked up," said Michael Bociurkiw, a spokesman for the Organisation for Security and Cooperation in Europe (OSCE) observer mission after visiting the scene, amid reports of the wreckage being rearranged. "What struck us is that we did not monitor any recovery activity in place," he said, pointing out that OSCE observers saw human remains in at least two areas at the sprawling crash site in rebel-held territory. Pro-Russian insurgents said Monday they had released the bodies of 282 victims after they were sent by refrigerated train to the government-controlled town of Kharkiv, some 300 kilometres to the northwest. ABC reporter Phil Williams is in Ukraine and says the discrepancy is "significant". "I thought [282] was an odd figure when I heard it, because it sounded too high because of the area that had to be searched," he said. "I saw the method of searching, I thought there is no possible way they can find as many [bodies] as that. "Now, it appears ... there's still many, many bodies to be recovered." The train with five refrigerated carriages arrived yesterday and an Interpol forensics team has begun the task of identifying victims. Russian president Vladimir Putin has said he would urge the separatists to allow a full investigation. Western governments have threatened Russia with broader sanctions for what they say is its backing of the militia. However, they are struggling to agree a response, and European Union ministers meeting in Brussels on Tuesday delayed action for a few days. The Netherlands is leading the investigation, while Malaysia says it will look after the plane's black boxes until a team is set up. Almost 300 people, predominantly Dutch but also including 37 Australian citizens and permanent residents, were killed when the Malaysia Airlines plane was shot down on Thursday. Operation Bring Them Home to transfer bodies The Prime Minister's special envoy, Air Chief Marshal Angus Houston, is in Kharkiv and says Australian officials have not yet made it to the crash site. "I think we are moving pretty quickly. Things appear to have settled down a little bit ... but I would emphasise that there is still extensive fighting in eastern Ukraine and the environment is very fluid," he said. An RAAF C17 plane carrying the remains of victims so far recovered from the wreckage is expected to depart Kharkiv this evening and travel to the Netherlands. In a statement, the Prime Minister's Office says the plane, as well as a Dutch aircraft, will continue the sombre journey until all remains are transferred. Governor-General Sir Peter Cosgrove will be present for the arrival of both the Dutch and the Australian aircraft. "Once the Australian victims of MH17 have been identified, the Government will transport their families to the Netherlands, should they wish, so they can accompany their loved ones home," the statement read. Operation Bring Them Home involves 100 Australian officials, including consular staff, victim identification and forensic experts and air safety investigators in Ukraine and the Netherlands. Mr Abbott said when the bodies had been removed, experts would begin the painstaking process of identifying the Australian victims. "I need to caution that this is necessarily a painstaking and methodical process that will take some weeks," he told reporters in Canberra yesterday. "As frustrating as this is, we do have to get it right. It would be terrible to compound the families' grief by risking the misidentification of their loved ones." Warnings identification of victims could take months Malaysian prime minister Najib Razak spent several days negotiating with rebels to transport the bodies of the MH17 plane victims out of Donetsk. A small group of Malaysian air crash experts became the first international accident investigators to reach the site on Tuesday, escorted by a convoy of international monitors and heavily armed separatist fighters. Dutch prime minister Mark Rutte cautioned identification of the bodies could take months. "As soon as a victim is identified, first and foremost the family will be informed and no-one else. That can take weeks or months," he said. He confirmed the Netherlands would lead the crash investigation, which normally would have fallen to Kiev, although it does not control the area around the crash site.
This summer GeekTech told you about a cool felt tip printer, which was made out of Lego bricks. Now another hacker has come up with an even more advanced Lego printer, using a three Mindstorm NXT bricks and nine NXT motors. A 3D Lego printer! The printer, dubbed the MakerLegoBot, is made from a giant 2400 Lego bricks and uses a Java application. You submit a MLCAD file (that's Mike's Lego Computer-Aided Design) of what you want to “print” to the Java application, and it will convert the file into something the printer can build (out of Lego, of course). The instructions are sent via USB. The printer base rotates in order to build the file layer by layer and make objects up to 12 bricks tall. The big grey wall on the back is for storing all its bricks, ready for building. It works with 1x2, 2x2, 3x2, 4x2, and 8x2 Lego bricks so far. The BattleBricks creator also points out that it took so many bricks to complete this project that he ran out at one point (the good people of Lego sent him a “ton” of additional bricks so he could finish it off). Check out the above video, and if you want to give it a go, the instructions are also available on the MakerLegoBot website. Even though you can’t do any of your serious work with the printer, at least making things like houses or spaceships with your Lego blocks is less time consuming. [BattleBricks via Hack A Day] Like this? You might also enjoy... Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read our affiliate link policy for more details. Follow GeekTech on Twitter or Facebook , or subscribe to our RSS feed
Development and in vitro evaluation of alginate gel-encapsulated, chitosan-coated ceramic nanocores for oral delivery of enzyme. The successful administration of protein and peptide drugs by oral route maintaining their active conformation remains a key challenge in the field of pharmaceutical technology. In the present study, we propose the use of a nanosize ceramic core-based system for effective oral delivery of acid-labile model enzyme, serratiopeptidase (STP). Ceramic core was prepared by colloidal precipitation and sonication of disodium hydrogen phosphate solution and calcium chloride solution at room temperature. The core was coated with chitosan under constant stirring and Fourier-Transform Infra Red Spectroscopy (FTIR) confirmed phosphoric groups of calcium phosphate linked with ammonium groups of chitosan in the nanoparticles; then the enzyme was adsorbed over the preformed nanocore. Protein-loaded nanocore was further encapsulated into alginate gel for enzyme protection. Prepared system was characterized for size, shape, loading efficiency, and in vitro release profile (pH 1.2 and pH 7.4). The effect of processing variables on the size of the core was evaluated to form small, uniform, and discrete nanocores. Stability and integrity of enzyme during processing steps was assessed by in vitro proteolytic activity. The prepared system was examined to be spherical in shape with diameter 925 +/- 6.81 nm using TEM. The in vitro release data followed the Higuchi model, showing a low amount (26% +/- 2.4%) of diffusion-controlled drug release (R(2) = 0.9429) in acidic buffer up to a period of 2 to 6 hours, signifying the integrity of alginate gel in acid. In the alkaline medium sustained and nearly complete first order release of protein was observed up to a 6 hours. It is inferred that the protein-loaded ceramic core acts as a reservoir of the adsorbed enzyme and alginate gel provides protection to STP for controlled release in intestinal pH when compared to the enzyme solution.
My point is that if viniteri misses these FG's is he this highly regarded? no and im not playing the IF game, but its not like he went our and threw for 300+ yards and threw a game winning td either You essentially did play the IF game, but he still deserves props for taking his team all the way down to FG range. Now, I do agree that Super Bowl it was more of the defense than what he did. For their 2nd Super Bowl, he had over 300+ yards and 3 TDs. You have to give him full props for that performance and again leading his team all the way down to FG range. By the way, what was the point of saying the 150 yards in the game? You do realize we won our first Super Bowl with Montana throwing for about the same amount of yards right? So does that not count either? correct Montana did have small stat yardage in his first SB. However what i am saying is that Montana was 4-0 and had two blow out sb wins, and two game winning td drive games. thats waaaayyy out of bradys league. Put him in elways league where he was 2-3 and brady is 3-2_________________ Well, I certainly rank Montana ahead, but regular season+postseason success, Brady is in his level. Better? No, but how is he not in his league? Losing in the Super Bowl is still much better than losing in the WC or Divisional round. Brady has made five SB appearances which is remarkable. Had he won one of the Giants games, than he'd have a better case for being better._________________ Brady and Montana are both great qb's, no question. Arguably the two greatest ever. Comparing the two, for me, ends with Super Bowls (as has been mentioned already). Brady, has always lead the offense to a game winning field goal, where as if joe didn't destroy the other team (niners 55, broncos 10), he is throwing a game winning td to seal the victory (John Taylor SB 23). Greatness, to me, is defined by what you do in the biggest, most important moments. While brady gave his team a CHANCE to win (as mentioned by someone), Montana actually WON the game, more often than not. Not to mention 4-0 vs 3-5.
Menu wooden benches The Corinthia is a luxury 5 star spa hotel set in the centre of London, just a short walk from Trafalgar Square. When we were invited to visit from Magdi Abdelaty, the Spa Operations Manager, we jumped at the chance to experience the renowned Espa facilities first hand. The spa spreads out over 4 floors, including15 treatment rooms, a gym, hair salon and a Thermal Floor with heat experience rooms and pools. The décor is luxurious and relaxing mood lighting sets the ambience to an almost decadent level. Our evening began with a leisurely swim in the shimmering silver stainless steel pool followed by a cool shower. We then took a ball of ice from the fountain and headed to the Amphitheatre sauna, set down into the floor with a spectacular suspended ceiling. When the heat became slightly too much, we headed outside for more ice, bringing it back with us to the sauna and letting it melt over our bodies as we sat there! The frameless glass sauna walls allowed us to watch the mesmerising flames of the nearby fire set within the wall. david de vleeschauwer Next on our thermal journey was a visit to the Vitality Pool with its built-in loungers and powerful swan neck fountains. This provided full relaxation for mind and body whilst relieving tired and aching muscles. After the warmth of the pool, it was time to cool down again in the Dornbracht ‘Big Rain’ shower before moving on to the glamorous black mosaic tiled steam room to relax in clouds of fragranced steam. david de vleeschauwer We repeated the above journey before settling onto the heated marble relaxation loungers by another fireplace, luxuriating in the warmth of the beds and the glow of the fire. Eventually it was time to get changed and take part in the real world again. But our journey of relaxation and luxury wasn’t over yet. The changing rooms had a sauna in the Ladies Area and a Tepidarium in the Men’s. And both rooms had sleeping pods, small booths with cushions and blankets where you could take a revitalising nap or even meditate in private. A totally private oasis with no distractions in the middle of a bustling, busy city! We all agreed it was a wonderfully relaxing experience. Favourite part? The sauna got a lot of votes due to its innovative design and the sleep pods were a definite hit! As well as offering bespoke solutions to your wellbeing requirements, Dröm UK can also provide you with a stunning, prefabricated room option. These can still be personalised to your tastes at a fraction of the cost of a full bespoke room. Encompassing wellbeing into your daily routine is becoming increasingly popular as everyday stress levels rise. Instead of heading to your local gym or spa, why not create a personal spa area in your own home? It is much easier than you think. One of the main benefits of having your own sauna or steam room, is that you can bathe in a temperature that suits you, not everyone else in your gym or spa! You can personalise the experience even further with the addition of essential oils, choosing whichever matches the level of relaxation or rejuvenation you wish to achieve. Sound systems can be incorporated within the rooms and you can even watch television! Add some chromotherapy lighting to further relax and reinvigorate you. Another benefit is that it is a perfect way to introduce children to the concept of wellbeing. Children can use the lower benches of saunas where the temperature is lower and the whole family can use the time to relax together. A ‘soft’ sauna, which is a sauna with more moisture in the air, therefore making the heat less intense, is more popular with women and children. Evolve Sauna Room As long as there is room for one person to sit down, there are no minimum or maximum space requirements needed to install a sauna or steam room, with some prefabricated saunas as small as 1.3 sq m. Tylö Evolve sauna rooms are delivered in prefabricated modules and are the easiest, quickest way to realise your sauna dream. The benches and backrests are made of Aspen with a choice of Aspen or Spruce wall panelling. The Evolve comes in 17 different sizes and shapes which can be supplemented with glass sections, lighting systems and accessories. Glass fronted variations are also available, again in several different sizes. Choose a combination heater to enjoy a steam sauna experience. Alternatively choose an Impression sauna room. Impression sauna room (corner) This comes complete with two benches at different levels. The lacquered aluminium profiles of the frame simply clip together so no screws are needed for assembly. The sleek lines of the design and the detachable jalousie make this simplicity itself to clean. These sauna rooms can be installed onto an existing hard base/floor. Another way to experience the benefits of both steam and sauna in your home, is to have a combined unit. The Tylö Impression Twin combines a sauna and steam shower giving you the best of both worlds. This is available in various sizes, the smallest being 1.4 x 1.9m. Impression Twin Sauna & Steam Room Tylö also have a range of prefabricated steam rooms supplied in ready to assemble wall and ceiling sections, again available in various sizes, one of the smallest being 1330 x 930 mm. The Elysee and Excellent steam rooms are made from high tech, vacuum formed, special grade white plastic. The more modern Panacea range incorporates chromotherapy lighting and has benches and accessories styled from Corian. All steam rooms are very easy to clean with no grout lines, which helps keep them hygienic. Elysee and Panacea steam rooms There are no special water requirements needed for a home spa. Steam rooms just need a basic water supply and drainage. If you are thinking of incorporating an experience shower then the water pressure will need to be appropriate for the fitting. A water supply is not required for saunas. Installing an Infra Red sauna cabin is even easier as most can just be plugged in to a normal electrical socket. The Tylö range of Infra Cabins start at just 914mm x 914mm. For more information on any of the above options please contact Dröm UK on 01932 355655 or visit http://www.dromuk.com. After 18 years of working closely with our Swedish suppliers Tylö, the Directors of Dröm UK have been talking for a while about taking the whole company to visit their offices and showroom in Halmstad, Sweden, which is also where our CEO, Kicki Carlsson, grew up. So while the trip was mainly work related, it also gave the employees a chance to kick back and relax after a really busy few months, socialise with each other out of the office, make new friends and enjoy the delights of this beautiful Swedish town. So 8.00 a.m. Thursday found us all at Gatwick airport eagerly waiting to board the plane to Copenhagen. From Copenhagen we took the train across the Øresund Bridge, then along the stunning coastline to Halmstad. After hastily dropping our bags off at the Hotel, we drifted out in various groups to investigate our surroundings. The weather was gorgeous, hot and sunny, and it wasn’t long before we all found deckchairs by the river and sat down to watch some unexpected live music taking place alongside the pop up bars and cafes. Eventually the more curious amongst us headed over the river into the town itself and found a bustling marketplace and fun fair in the central square! After a bout of shopping (had to be done), we settled in an outside bar and watched an alfresco salsa class taking place nearby! Dinner that night, with a couple of our Tylö friends, was in a sports themed restaurant, with a bowling alley. So of course, after dinner we all headed over and had a mini competition between two teams. Obviously we let Barry, one of the Dröm co-founders, win overall 🙂 Friday was an early start as we had a full day of product and technical training to fit in. This included information about new products and packages, with most of the saunas, steam rooms and showers available to view in the Tylö showroom. The morning session culminated in a factory tour. Here we learned about, and watched, how heater elements are made, saw where steam generators were put together and tested, watched profiles being cut into the sauna timbers, learnt about the quality control process, and came away with a massive dose of warehouse envy…… After lunch we continued with some more product information then spent some time learning about the latest control panels (concept, programming, design). Then it was time to test the rooms ourselves! It was pure bliss after a hard days training to relax in the various saunas and steam rooms that we had been learning about, cooling off in between with quick dips (and dives) into the inviting plunge pool! Cheeky mojitos were served in ice tumblers, which we then used to rub over our skin in the saunas to help us cool down! Dinner was served in the Tylö restaurant, followed by awards for us all! Good students deserve diplomas 🙂 Then we went into town with Torbjorn and Anki from Tylo to sample the local nightlife! We found a nightclub which had a welcome outside bar space, and also a couple of black jack tables therefore catering for all tastes. As you may have seen in our ‘Happy’ video (https://www.youtube.com/watch?v=gj5t5g1Wxus) we have a couple of staff (well, mainly Kevin really) who can really throw some shapes and that night was no exception! So we couldn’t help but take some more videos of his dancing, where he was partnered by Jake ….. On Saturday we moved across to the Tylösand Hotel situated on the coast, which is part owned by Per Gessle, vocalist and guitarist with Swedish rock band Roxette. (http://www.tylosand.se). Tylö have been involved with the spa environment here for many years and it was our opportunity to see and experience it for ourselves. The boys headed straight for the gym while some of us relaxed on the loungers overlooking the sea. We roused ourselves long enough to sample the saunas, steam room, kneipp walk and experience showers before cooling off in the pools. There was a fantastic foot-golf course close to the hotel, so a group went across to play. Each hole had obstacles to contend with, so it wasn’t as easy as they had first thought. Their accuracy needs some work too …. The sun wasn’t shining when we first arrived at Tylösand, but it didn’t stop us taking some pictures of the stunning, windswept scenery. Luckily the sun came out again around lunchtime, so we could take some even better pictures – what a contrast! The remaining group headed out for some lunch in a little restaurant on the dunes which started to fill up rapidly during the time we were there, due to visitors arriving for the ‘After-beach’ party that Tylösand host each year. It started as a concert for those heading back to the hotel after a day at the beach, to prolong the enjoyment of their day, and has developed into a major Summer annual event! So we headed out with a bottle of Prosecco to reserve a spot on the sand dunes and enjoy the music! We all had a bit of a surprise as we returned to our rooms to change – the car park looked a bit different than it had earlier……. All too soon it was dinner time on the last evening 😦 And it was very, very, chilly as we took our places at our outdoor table! Once again, the food was absolutely delicious – we couldn’t fault the menus all weekend. Blankets were handed round to protect us from the breeze and maybe we were a bit disappointed that it was so cold as we had been really looking forward to the last outdoor concert of the summer that evening….. But the moment the music started, the blankets came off (what cold temperatures??!) and the whole restaurant and hotel came to life with dancing, singing and the odd drink here and there! The group – Duo Jag – were brilliant! They sang covers of all types of songs from Eminem to Beyoncé and we quickly learnt the words to ‘The Sun is shining’ – a song none of us had heard before, but now play regularly in the Showroom! https://www.youtube.com/watch?v=h30CEnMdVH4 It was a very tired, but happy, group that headed homewards the following day! We are still talking about what a great time we had, and laughing at the photos, a week later! Thank you to Kicki, Barry and Tylö for their generosity and hospitality. When are we doing it again??! Creating the perfect thermal wellbeing room usually involves months of detailed planning, design, ordering and construction. When we were asked to build a new dry sauna experience in a local Hotel and Spa, the brief was slightly different as we had to change some of our methods to fit in with the requested timeframe. Here we take you behind the scenes, as we build Pennyhill Park’s new sauna room. Pennyhill Park is a 5* Exclusive Hotel and Spa, set in the beautiful Surrey countryside. Already home to an extensive range of bathing experiences in their renowned Spa, they decided to add a dry sauna room to complement their existing thermal rooms, as one of the first steps in their spa rejuvenation project. The brief was to design and construct a sauna with a strong visual impact, both internally and externally, with minimum guest disturbance in a working spa. To begin with, CAD drawings were produced to show the Client the initial design concept and once these were agreed a build programme was arranged. The Client requested we were on site during a specific two week period so that the project could be finished by a certain date, ahead of the England rugby team taking up residence for their World Cup 2015 training. Beautiful cedar wood tongue and grooved panels, chosen to give a more natural feel to the room, were used on the walls and ceiling with the two tier benching created from complementary Thermo Aspen timber. Frameless glass was used for the walls and door so that guests look out across a view of the outdoor swimming pool. The frameless glass door and frontage was decorated with etched flowers (in keeping with the Spa’s existing theme) which gives a greater visual impact both internally and externally, allowing a spectacular view across the outdoor pool and grounds. Due to the size and layout of the room, we used a unique combination of hidden and visible heaters. The EOS Corona S60 heater, with stones and slate detail, can be used for traditional sauna bathing, where water is ladled over the stones manually to increase the heat. The traditional heater will also be utilised by if a Sauna Master is employed to give guests a more intense sauna experience. Our installers then had to overcome the challenge of constructing the sauna with minimum guest disturbance in a working spa! The majority of work was undertaken behind the existing walls before they were removed and the sauna benches were built off-site to cut down on noise, disruption and dirt. A lot of the noisy work was undertaken early in the day before guests arrived. There was a lot of stopping and starting as we had to wait for some of the extremely disruptive work to be completed overnight, such as the eventual removal of the walls and floor tiles. One of the major tasks was co-ordinating several different trades in the timescale we were given, e.g. tilers, glass installation, plumbing and electricians, not all of whom were under our supervision. The electrical supply was found to be inadequate for the sauna requirements and we had to bring in our own electrical experts to run new cables and provide a new, more suitable, supply. Materials had to be procured in a different sequence to normal. The glass had to be ordered before the sauna was even built due to a long lead in time and only a two week time scale on site. This meant that the sauna had to be millimetre perfect to ensure the glass fitted perfectly when it arrived. An S-guard safety system was installed which detects any abnormalities with the sauna heater and automatically shuts it off. Not everything goes to plan however and it is not unusual to have a few teething issues when commissioning large commercial rooms. For example, the engineers were unaware the S-guard system needed to be calibrated when the temperature is below 25 degrees Celsius (due to this not being encountered when dealing with new builds or residential installations). However, due to the spa being in operation we could not get the temperatures below this level during normal working hours. We therefore had to turn off all the heating and add in additional ventilation overnight to be able to calibrate the S-guard system early in the morning, prior to the spa opening. The finished room looks beautiful and spa guests have been tweeting their delight with the new dry sauna experience. Let’s hope the England Rugby Team enjoy it too! ‘Wear the Rose’ and follow England Rugby in the Rugby World Cup 2015 starting September 18th. There is nothing worse than entering a sauna or steam room in a beautiful spa or leisure facility and being assailed by the smell of sweaty, stagnant air! Hygiene is possibly one of THE most important aspects of any commercial venture, both in terms of how the rooms are built and also how they are used. Whether you are currently refurbishing your spa or residential wellbeing space, or even building new rooms to complement your existing set up, it is important to take the following points into account. The correct air flow in a sauna prevents air stagnating or hot spots being created. A correctly located passive air ventilation system will ensure fresh air is replenished and the heat is distributed evenly throughout the room. Fragrances can also be added to further enhance the bathing experience bringing in refreshing, pleasant aromas. Kicki Carlsson Essential Oils are a great way to add that perfect fragrance to revitalise or relax! Ensure consideration is given to the type of products used for the construction of the rooms. The wooden benches in a sauna help prevent the spread of bacteria but the floors can harbour the growth of dermaphytic pathogens which can contribute to fungal foot disease. It is advised to choose large format, easy to clean tiles for the floor. Clean the sauna floor with an ordinary cleaning detergent daily. It is important to never keep water in a sauna bucket for longer than 24 hours, so ensure you change the water and clean the bucket daily to prevent bacteria growing. Always encourage guests to sit on a towel while bathing Advise, and encourage, guests to always shower before and after sauna bathing. This helps remove perfume and after-shave, the smell of which can become stronger in the heat of a sauna. It can also leave unsightly marks on the timber. The water also removes any chlorine on the body or swimwear which can become volatile in the high temperatures and cause irritation to eyes and lungs. Bathers should also be reminded to sit on a towel when using a sauna to avoid having to sit or lie in other peoples sweat. Shower before sauna bathing to remove perfumes and after shaves which can leave residue marks Corian is a brilliant low maintenance, hygienic material to use for steam room benches as there is no grouting to clean. Always have benches sloping away from the walls to avoid having to sit in stale pools of water which have collected on the seats! Corian is grout free and easy to clean. Perfect for steam room benches. It is also a good idea to install Kneipp hoses in steam rooms so that guests can cool themselves down and also wash down the benches after use.
Inhibitory casting decreases a vibratory inhibition index of the H-reflex in the spastic upper limb. To test the hypothesis that application of an inhibitory cast to the spastic upper limb will decrease a vibratory inhibition index (VII) of the H-reflex in the spastic upper limb. Prospective, nonrandomized, open-label trial. University tertiary care center. Eight adults with upper limb spasticity. Fiberglass cast application spanning the wrist to the upper arm. The amplitude of the H-reflex with and without continuous 60Hz vibration to the tendon of the flexor carpi radialis was measured, and the VII was calculated using the formula: [H-reflex amplitude (vibrated)/H-reflex amplitude (control)] x 100%. Mean VII decreased from baseline (70.7) on day 1 (67.6, p = .699), day 2 (55.9, p =.066), and day 3 (43.5, p = .033) of casting, and increased on day 4 (89.9, p = .146) after removal of the cast. Findings lend support to the idea that during application of an inhibitory cast motor neuron excitability is decreased in the spastic upper limb.
Notes:please use the first argument of the template to provide more detailed indications. (Discuss in Talk:Local Mirror (简体中文)#) 注意: 95%的用户不需要这么做。同步core和extra上的所有软件包会带来许多你所不需要的东西。Only follow these instructions if you are running a very large site of Arch machines or want to create an official mirror. Perhaps using a Network Shared Pacman Cache would serve you better. NOTE: Due to traffic issues rsyncing from rsync.archlinux.org is allowed only for official mirrors. If you want to create an official mirror - write to the mailing list about this and entries in /etc/pacman.d/* will be added and your IP address will be allowed. If you want to get a full mirror for personal use only, you may rsync from rsync://distro.ibiblio.org/distros/archlinux/ This document describes how to create a mirror on your local machine of all the packages and iso files on the Arch mirrors, how to update it using cron, how to serve the mirror with vsftpd, and how to set up pacman to use the local mirror. This setup will offer a very secure FTP server, tailored specifically for our needs. Note that this setup does not require a password, and should not be used in a publicly accessible network (unless that's what you want). Password protecting the FTP and still allowing it to work with pacman is beyond the scope of this document. If you are going to connect to this machine from the outside, you will need to add the following line to /etc/hosts.allow: vsftpd : ALL : ALL Note that this will allow anyone to download from the mirror. If you want to control downloads more tightly, and don't know how to do so, see linux.about.com on the subject. Let's make sure vsftpd starts: sudo /etc/rc.d/vsftpd start If vsftpd does not start, check that the options are set correctly in your /etc/vsftpd.conf file. Enabling the mirror for pacman Now let's edit /etc/pacman.d/* files to use our shiny new mirror. Add the following line to the top of /etc/pacman.d/core, at the top of the Servers list: Repeat this same process for the other repositories you are mirroring. Non-local machines will need to use an IP address to access the repository. Also make sure that the machine serving the mirror has a static IP address. Synchronizing for the first time Here comes the pain! Run the following command to start the sync: sudo -u mirror ./scripts/mirrorsync.sh This won't give you any kind of output, but you probably want some. You can use something like this (correct for the name of log file) to monitor the sync progress: tail -f logs/pkgsync_20070203-9.log This process will usually take a few hours, depending on the speed of your internet connection and how many repositories you are mirroring. After the first sync, only new packages will be sync'ed, so it will be m
The identification and characterization of the C19O3 steroid metabolites of 5 alpha-androstane-3 beta,17 beta-diol produced by the canine prostate: 5 alpha-androstane-3 beta,6 alpha,17 beta-triol and 5 alpha-androstane-3 beta,7 alpha,17 beta-triol. This study has identified the polar metabolites of 5 alpha-androstane-3 beta-17 beta-diol(3 beta-diol) produced by the canine prostate. The major metabolite is 5 alpha-androstane-3 beta,7 alpha,17 beta-triol(7 alpha-triol) accounting for approximately 80% of the total polar metabolites of 3 beta-diol. The remaining 20% is accounted for exclusively by another triol, 5 alpha-androstane-3 beta,6 alpha,17 beta-triol(6 alpha-triol). This study has also characterized two enzymatic hydroxylase responsible for respective triol formation: 5 alpha-androstane-3 beta,17 beta-diol 6 alpha-hydroxylase(6 alpha-hydroxylase) and 5 alpha-androstane-3 beta,17 beta-diol 7 alpha-hydroxylase(7 alpha-hydroxylase). Both of these irreversible hydroxylases are located in the particulate fraction of the prostate and can utilize either NADH or NADPH as cofactor. Several in vitro steroid inhibitors of these hydroxylases were identified including cholesterol, estradiol and diethylstilbestrol. Neither of the hydroxylases were found to be decreased by castration (3 months) when expressed as activity/DNA. Using a variety of C19 androstane substrates, 6 alpha- and 7 alpha-triol were found to be major components of the total 3 beta-hydroxy-5 alpha-androstane metabolites produced by the canine prostate.
Ex-Utah State official arrested in scholarship scam This is an archived article that was published on sltrib.com in 2012, and information in the article may be outdated. It is provided only for personal research purposes and may not be reprinted. Logan • A former Utah State University official has been arrested after authorities say she improperly awarded $190,000 in scholarships to family members. The Herald Journal reports 34-year-old Jennifer Putnam Twiss, of North Logan, was booked Friday on suspicion of theft, forgery and unlawful dealing of property by a fiduciary. School officials say Twiss was fired from her job as executive director of enrollment services in March after an internal audit revealed irregularities. Police say family members were aware the funds had been wrongfully appropriated between 2004 and 2012. Charging documents say Twiss also took $36,000 in cash between January 2009 and October 2010. Twiss was arrested Friday and remained in the Cache County Jail on Saturday. Bail is set at $5,000. It was not immediately known if she had an attorney. Share This Article USER COMMENTS Reader comments on sltrib.com are the opinions of the writer, not The Salt Lake Tribune. We will delete comments containing obscenities, personal attacks and inappropriate or offensive remarks. Flagrant or repeat violators will be banned. If you see an objectionable comment, please alert us by clicking the arrow on the upper right side of the comment and selecting "Flag comment as inappropriate". If you've recently registered with Disqus or aren't seeing your comments immediately, you may need to verify your email address. To do so, visit disqus.com/account. See more about comments here.
All Politics is now Global Tag Archives: Asia-Pacific Lowe and behold, look who is the first to cast a stone in calling the U.S. Navy a hazard in the region. The aim is clearly to portray the military as incompetent in order to increase the likelihood of other nations pushing back, thus elevating regional resistance to an American presence with the end game being pushing America out of the Asia-Pacific. USS McCain China calls Navy ‘hazard’ in Asian waters The Navy has not ruled out an intentional action behind the latest deadly collision between a Navy destroyer and a merchant ship, the chief of naval operations told reporters Monday. “That’s is certainly something we are giving full consideration to but we have no indication that that’s the case—yet,” Adm. John Richardson, the CNO, said at the Pentagon. “But we’re looking at every possibility, so we’re not leaving anything to chance,” he said. Continue reading → Chinese sailors march in a massive military parade in Beijing. (GETTY IMAGES) China’s dominance of this strategic sea gate is effectively complete. As recently as July 2016, it looked as if conflict could erupt between the United States, China, and possibly some smaller Asian nations over Beijing’s belligerent drive to transform the South China Sea into a “Chinese lake.” That month, the already fraught situation became far more volatile when the Permanent Court of Arbitration at The Hague ruled against some of China’s territorial claims in the area, after which China vowed to use “all necessary measures” to safeguard its control of the region. But now, despite the Trump administration’s decision on May 24 to conduct a naval action in the region, it is clear that China has emerged from this dispute victorious. The South China Sea—the vast, resource-rich region through which a third of global maritime commerce flows—is now the de facto territory of Beijing. “It is, unfortunately, now game over,” said Mira Rapp-Hooper, a senior fellow at the Washington D.C.-based Center for a New American Security. This “unfortunate” turn of the tides reveals America’s fading influence, China’s rising power (and increasing shrewdness about how to effectively use that power), and that the smaller Asian states are pragmatic and circumspect about these shifts. This morning, Beijing declared its new “invisible sub” primed and ready for its first official post-trial phase “research” mission. The sub is called the Jiaolong – named for a mythical sea creature – and its alleged purpose is to collect deep-sea samples of sediment, rock, and water for scientific research. But the difficult-to-see, deep-water probe is now headed from the South China Sea to the East China Sea – a route that has raised some eyebrows among defense analysts and maritime law experts. Here’s why they’re so skeptical about the Jiaolong’s deep-sea movements, with some even wondering if China’s true intent has less to do with scientific research and more to do with spying on its competition in nearby Pacific waters… The Chinese dream of hegemony in Asia has been a long time coming. The map following is from a Nationalist primary school textbook from 1938. There are currently three communiques that have guided U.S.-China relations for the last 45 years. These joint statements by the U.S. and Chinese governments were signed in 1972, 1979, and 1982. Among other things, the second communique states that, “Neither should seek hegemony in the Asia-Pacific region or in any other region of the world”. China has recently been attempting to have the U.S. sign onto a Fourth Communique under which the U.S. would no longer consider Taiwan as an ally or deal with it in any military or diplomatic terms. In effect, the U.S. would peacefully decline and leave the Western Pacific to China. The White House rejected it prior to the meeting of the U.S. and Chinese presidents on April 6-7 at Mar-a-Lago. It was raised again by Henry Kissinger, now in the pay of the Chinese government, at his meeting with President Trump on May 10. Continue reading → China is using non-military “coercion” in an effort to gain control of strategic waters in the Asian Pacific, the Pentagon said in its annual report to Congress released on June 6. “China continues to exercise low-intensity coercion to advance its claims in the East and South China Seas,” the report said, adding that Beijing’s tactic involves the use of “timed progression of incremental but intensifying steps to attempt to increase effective control over disputed areas and avoid escalation to military conflict.” Continue reading → The Arleigh Burke-class guided-missile destroyer USS Dewey prepares for a replenishment-at-sea in the South China Sea May 19, 2017. Picture taken May 19, 2017. Kryzentia Weiermann/Courtesy U.S. Navy/Handout via REUTERS A U.S. Navy warship sailed within 12 nautical miles of an artificial island built up by China in the South China Sea, U.S. officials said on Wednesday, the first such challenge to Beijing in the strategic waterway since U.S. President Donald Trump took office. The officials, speaking on condition of anonymity, said the USS Dewey traveled close to the Mischief Reef in the Spratly Islands, among a string of islets, reefs and shoals over which China has territorial disputes with its neighbors. The so-called freedom of navigation operation, which is sure to anger China, comes as Trump is seeking Beijing’s cooperation to rein in ally North Korea’s nuclear and missile programs. Continue reading → OKINAWA-While the world watches mounting military tensions in the South China Sea, another, more ominous situation is brewing in the East China Sea that could be the trigger point for a major war between the superpowers. At the heart of tensions are eight uninhabited islands controlled by Japan that are close to important shipping lanes, rich fishing grounds and potential oil and gas reserves. China contests Japan’s claims and is escalating its military activity in Japan airspace. In response, Japan has been doubling its F-15 jet intercepts. The situation increases the risk of an accidental confrontation — and could draw other countries, like the United States, into a conflict. It’s a topic President Trump will likely bring up with Chinese President Xi Jinping at his Mar-a-Lago estate this week. Continue reading → King Salman Bin Abdul-Aziz of Saudi Arabia is leading an entourage, including 25 senior princes and 10 ministers, to China later this month, part of a month-long tour of the Asia-Pacific, as the kingdom is seeking to hedge against an unpredictable and divided White House. While it yearns for a renewed American role in the Middle East and reassurances from President Trump that Riyadh remains an ally, Saudi Arabia now faces a period of uncertainty due to the unpredictability of Trump’s foreign policy stance. That reason alone could explain why a trip to Beijing was planned before a trip to Washington. Despite its efforts at economic diversification, Saudi Arabia will remain dependent on oil exports for a long time, and China provides the kingdom with a stable market for its energy exports for decades to come. Continue reading → Eight-plus years of deterioration through the Obama years and previous administrations and the turning of a blind eye to China have allowed it to rise and put America in jeopardy. The Chinese military has been on par with American capability for at least half of Obama’s term and is now cemented. America is now having to play catch-up, which will buy the PLA at least another four to eight years of time to get ahead and become even more entrenched. Let one thing be clear: China isn’t pushing America out of the Asia-Pacific… it already has. It won’t be regained without a bloodbath. China’s military power should not be underestimated according to experts [Getty] US COMMANDERS are in fear of conflict with China because of the likelihood the Asian powerhouse would win, it has been claimed. Donald Trump’s heavy handed approach to the South China sea – a billion dollar trade route – has angered his counterpart in beijing. While the White House insists it must have a say over the resource-rich stretch of sea, experts are warning he has bitten off more than he can chew with China. A missile-packed military fortress surrounds China which has cleverly constructed islands which work as stationary aircraft carriers under the leadership of Xi Jinping. Continue reading → “The DF-5’s strengths are obvious. This is a powerful liquid-fuel missile which weighs 183 tons. Its energy potential is so great that it [led to China] creating a family of space launch vehicles based [upon this missile]. It is capable of delivering a powerful front section with ten warheads and the means of overcoming ballistic missile defenses to the US,” Vasily Kashin said. China is likely to change the rules of the game in the Asian-Pacific region: in the coming years Beijing may narrow the gap with the US in terms of strategic nuclear capabilities, Russian military expert Vasily Kashin told Sputnik, referring to Beijing’s flight test of advanced DF-5C intercontinental ballistic missiles (ICBMs). There appear to be more and more reasons to expect China to make a spectacular breakthrough in the field of nuclear weapons development, Russian military expert Vasily Kashin told Sputnik, adding that this could lead to radical changes in the ongoing geopolitical game over Asia-Pacific. On January 31 Bill Gertz, a senior editor of the Washington Free Beacon, reported that Beijing had flight tested “a new variant of a long-range missile with 10 warheads,” dubbing it a “dramatic shift in Beijing’s strategic nuclear posture.” Continue reading → A lot of naysayers would immediately dismiss the threat, however, 172,000 vessels loaded with anti-ship missiles, cruise missiles, ICBMs, or God forbid a nuclear weapon, would be a problem for the U.S. Navy. Shipping containers can easily disguise mobile nukes loaded on freighters. Even half or a quarter of the amount of ships loaded with weapons would keep anyone out that doesn’t want to lose an entire fleet… or more. Donald Trump’s comments over the South China Sea have sparked powerful response from China [Getty] HUNDREDS of warships, including aircraft carriers, nuclear submarines and a destroyer force, could soon be patrolling the Asia–Pacific as tensions between Beijing and Washington reach boiling point. China is refusing to back down over President Donald Trump’s apparent interest in interfering with the ongoing turf war in the South China Sea. With Xi Jinping’s nation being economically strong, it has the money and capability to massively expand its armed forces. Continue reading → In the harshest warning yet that China is actively contemplating a worst case scenario for its diplomatic relations with the US, a senior Chinese military official said that “a war within the president’s term’ or ‘war breaking out tonight’ are not just slogans, they are becoming a practical reality.” The remarks, first reported by the SCMP, were published on the People’s Liberation Army website in response to the escalating rhetoric towards China from America’s new administration, and as Beijing braces itself for a possible deterioration in Sino-US ties, with a particular emphasis on maritime security. The commentary written by an official at the national defence mobilisation department in the Central Military Commission – which has overall authority of China’s armed forces – also called for a US rebalancing of its strategy in Asia, military deployments in the East and South China Seas and the instillation of a missile defence system in South Korea were hot spots getting closer to ignition. Continue reading → BEIJING – There’s a Chinese saying that stems from the philosophy in Sun Tzu’s ancient text “The Art of War”: You can kill 1,000 enemies, but you would also lose 800 soldiers. Centuries later, the proverb is suddenly apt again, being mentioned frequently in discussions around Beijing. Now, it highlights the potential damage U.S. President-elect Donald Trump could inflict if he makes good on his threat to start a trade war with China, the world’s second-biggest economy. Having backed off some other campaign pledges, it’s unclear if Trump will end up slapping punitive tariffs on China — and Beijing has signaled some optimism he will be more pragmatic in office. Still, the message from China is that any move to tax Chinese imports would bring retaliation: The U.S. economy would take a hit and America would damage its long-standing ties with Asia. Continue reading →
<Project DefaultTargets="Build" xmlns="http://schemas.microsoft.com/developer/msbuild/2003" ToolsVersion="4.0"> <PropertyGroup> <Configuration Condition=" '$(Configuration)' == '' ">Debug</Configuration> <Platform Condition=" '$(Platform)' == '' ">AnyCPU</Platform> <ProductVersion>9.0.30729</ProductVersion> <SchemaVersion>2.0</SchemaVersion> <ProjectGuid>{29E1DFE9-D0A9-4AAB-B876-10BBF747C293}</ProjectGuid> <OutputType>Library</OutputType> <AppDesignerFolder>Properties</AppDesignerFolder> <RootNamespace>Contracts</RootNamespace> <AssemblyName>Microsoft.Contracts</AssemblyName> <SccProjectName> </SccProjectName> <SccLocalPath> </SccLocalPath> <SccAuxPath> </SccAuxPath> <SccProvider> </SccProvider> <SignAssembly>true</SignAssembly> <AssemblyOriginatorKeyFile>..\..\Common\InterimKey.snk</AssemblyOriginatorKeyFile> <FileUpgradeFlags> </FileUpgradeFlags> <OldToolsVersion>2.0</OldToolsVersion> <UpgradeBackupLocation> </UpgradeBackupLocation> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Debug|AnyCPU' "> <DebugSymbols>true</DebugSymbols> <DebugType>full</DebugType> <Optimize>false</Optimize> <OutputPath>..\..\Microsoft.Research\Contracts\bin\Debug\</OutputPath> <DefineConstants>TRACE;DEBUG;FEATURE_UNSAFE_CONTRACTS</DefineConstants> <ErrorReport>prompt</ErrorReport> <WarningLevel>4</WarningLevel> <AllowUnsafeBlocks>true</AllowUnsafeBlocks> <CodeContractsEnableRuntimeChecking>False</CodeContractsEnableRuntimeChecking> <CodeContractsRuntimeOnlyPublicSurface>False</CodeContractsRuntimeOnlyPublicSurface> <CodeContractsRuntimeThrowOnFailure>False</CodeContractsRuntimeThrowOnFailure> <CodeContractsRuntimeCallSiteRequires>False</CodeContractsRuntimeCallSiteRequires> <CodeContractsRunCodeAnalysis>False</CodeContractsRunCodeAnalysis> <CodeContractsNonNullObligations>False</CodeContractsNonNullObligations> <CodeContractsBoundsObligations>False</CodeContractsBoundsObligations> <CodeContractsArithmeticObligations>False</CodeContractsArithmeticObligations> <CodeContractsRedundantAssumptions>False</CodeContractsRedundantAssumptions> <CodeContractsRunInBackground>True</CodeContractsRunInBackground> <CodeContractsShowSquigglies>False</CodeContractsShowSquigglies> <CodeContractsUseBaseLine>False</CodeContractsUseBaseLine> <CodeContractsEmitXMLDocs>False</CodeContractsEmitXMLDocs> <CodeContractsCustomRewriterAssembly> </CodeContractsCustomRewriterAssembly> <CodeContractsCustomRewriterClass> </CodeContractsCustomRewriterClass> <CodeContractsLibPaths> </CodeContractsLibPaths> <CodeContractsPlatformPath> </CodeContractsPlatformPath> <CodeContractsExtraAnalysisOptions> </CodeContractsExtraAnalysisOptions> <CodeContractsBaseLineFile> </CodeContractsBaseLineFile> <CodeContractsRuntimeCheckingLevel>Full</CodeContractsRuntimeCheckingLevel> <CodeContractsReferenceAssembly>DoNotBuild</CodeContractsReferenceAssembly> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Release|AnyCPU' "> <DebugType>pdbonly</DebugType> <Optimize>true</Optimize> <OutputPath>..\..\Microsoft.Research\Contracts\bin\Release\</OutputPath> <DefineConstants>TRACE</DefineConstants> <ErrorReport>prompt</ErrorReport> <WarningLevel>4</WarningLevel> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'FullDebug|AnyCPU' "> <DebugSymbols>true</DebugSymbols> <OutputPath>..\..\Microsoft.Research\Contracts\bin\FullDebug\</OutputPath> <DefineConstants>DEBUG;TRACE</DefineConstants> <AllowUnsafeBlocks>true</AllowUnsafeBlocks> <DebugType>full</DebugType> <PlatformTarget>AnyCPU</PlatformTarget> <ErrorReport>prompt</ErrorReport> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Devlab9|AnyCPU' "> <OutputPath>..\..\Microsoft.Research\Contracts\bin\Devlab9\</OutputPath> <DefineConstants>TRACE;DEBUG</DefineConstants> <Optimize>false</Optimize> <DebugType>pdbonly</DebugType> <PlatformTarget>AnyCPU</PlatformTarget> <CodeAnalysisUseTypeNameInSuppression>true</CodeAnalysisUseTypeNameInSuppression> <CodeAnalysisModuleSuppressionsFile>GlobalSuppressions.cs</CodeAnalysisModuleSuppressionsFile> <ErrorReport>prompt</ErrorReport> <CodeContractsRuntimeThrowOnFailure>True</CodeContractsRuntimeThrowOnFailure> <CodeContractsRuntimeCheckingLevel>Full</CodeContractsRuntimeCheckingLevel> <CodeContractsReferenceAssembly>DoNotBuild</CodeContractsReferenceAssembly> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Academic9|AnyCPU' "> <OutputPath>..\..\Microsoft.Research\Contracts\bin\Academic9\</OutputPath> <DefineConstants>TRACE;DEBUG</DefineConstants> <DebugType>pdbonly</DebugType> <PlatformTarget>AnyCPU</PlatformTarget> <CodeAnalysisUseTypeNameInSuppression>true</CodeAnalysisUseTypeNameInSuppression> <CodeAnalysisModuleSuppressionsFile>GlobalSuppressions.cs</CodeAnalysisModuleSuppressionsFile> <ErrorReport>prompt</ErrorReport> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Internal9|AnyCPU' "> <DebugSymbols>true</DebugSymbols> <OutputPath>..\..\Microsoft.Research\Contracts\bin\Internal9\</OutputPath> <DefineConstants>TRACE;DEBUG;FEATURE_UNSAFE_CONTRACTS</DefineConstants> <AllowUnsafeBlocks>true</AllowUnsafeBlocks> <DebugType>full</DebugType> <PlatformTarget>AnyCPU</PlatformTarget> <CodeAnalysisUseTypeNameInSuppression>true</CodeAnalysisUseTypeNameInSuppression> <CodeAnalysisModuleSuppressionsFile>GlobalSuppressions.cs</CodeAnalysisModuleSuppressionsFile> <ErrorReport>prompt</ErrorReport> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Devlab9ro|AnyCPU' "> <OutputPath>..\..\Microsoft.Research\Contracts\bin\Devlab9ro\</OutputPath> <DefineConstants>TRACE;DEBUG</DefineConstants> <DebugType>pdbonly</DebugType> <PlatformTarget>AnyCPU</PlatformTarget> <CodeAnalysisUseTypeNameInSuppression>true</CodeAnalysisUseTypeNameInSuppression> <CodeAnalysisModuleSuppressionsFile>GlobalSuppressions.cs</CodeAnalysisModuleSuppressionsFile> <ErrorReport>prompt</ErrorReport> </PropertyGroup> <ItemGroup> <Reference Include="System" /> </ItemGroup> <ItemGroup> <None Include="ContractDeclarativeAssemblyAttribute.cs" /> <Compile Include="Contracts.cs" /> <Compile Include="ContractsMSR.cs" /> <Compile Include="Properties\AssemblyInfo.cs" /> </ItemGroup> <ItemGroup> <None Include="..\..\Common\InterimKey.snk" /> </ItemGroup> <ItemGroup> <None Include="ContractDeclarativeAssemblyAttribute.vb" /> </ItemGroup> <Import Project="$(MSBuildBinPath)\Microsoft.CSharp.targets" /> <ItemGroup> <BuildSilverlightVersions Include="v3.0" /> <BuildNetFrameworkVersions Include="v3.5" /> <MultiTargetReferencePaths Include="..\..\Microsoft.Research\Imported\ReferenceAssemblies\" /> </ItemGroup> <Import Project="..\..\Microsoft.Research\Contracts\Multitarget.targets" /> <!-- To modify your build process, add your task inside one of the targets below and uncomment it. Other similar extension points exist, see Microsoft.Common.targets. <Target Name="BeforeBuild"> </Target> <Target Name="AfterBuild"> </Target> --> </Project>
And this is why finding that someone special online is sooo darned hard. Here's what happened. The 18-year-old woman invited the man over last Sunday, so he accepted, only to show up with another man. The woman got distracted by one of the fellas, leaving one of them alone in the house. Eventually, the duo left, at which point the woman realized the dog who lived in the house -- a Maltese named Maggie -- was nowhere to be found. A laptop and a package from Amazon also went MIA. Police continue to investigate the matter and even posted about the unfortunate matter on Facebook. No one has been arrested. And while the case is ongoing, we're pretty sure this wraps up any future housesitting gigs for the woman.
Saturday, 23 April 2016 Caesarean Awareness Month - Feeling Out Of Control In a Familiar Environment "We're taking you to theatre!". I can still hear those 5 words now as if I was right back in the delivery room. 5 words that shouldn't be unfamiliar to me or make me feel uncomfortable. I remember feeling so many mixed emotions. In fact I cried. I'm still not sure if that was from relief, fear or feeling like a failure. "We're taking you to theatre!" Why was this making me so upset? I should feel completely safe and at home there, after all I work in one. In fact I have 'scrubbed in' for caesareans and I knew exactly what was coming. Why was I feeling like this? "We're taking you to theatre!" All those hours pushing and for what, to lose it all at the last minute. They were taking me to the one place I really didn't want to go. I remember my husband telling me it was going to be ok. I remember the consultant telling me it was going to be ok. I remember the midwife telling me it was going to be ok. So why did I not feel ok? "We're taking you to theatre!". The doors were pushed open. Various midwifes were waving at me from the desk. "Good luck", "won't be long until you meet your daughter". I smiled and nodded but I was fighting back the tears. The corridor seemed so long, it was all a blur. My husband was taken away from me to get changed into scrubs and I was wheeled into theatre without him. "We're taking you to theatre!". The bright lights felt almost heavenly. It was so bright. The brightness scared me and i'm not sure why. I lay on the operating table feeling overwhelmed. The noise was overpowering. In hindsight it wasn't at all but I remember every single sound. I remember the beeping from the anaesthetic machine, the clatter of the surgical instruments, the scrub nurse performing her checks (normally my role), the water running in the sink where the surgeon was washing his hands and the background music (the bond theme song that I hated). I heard every single sound. "We're taking you to theatre!" I lay there, alone, frightened, nervous. I felt so heavy on the cold table. I felt insignificant on the table. I felt out of control and I hated it. I spoke really fast. I talked as much as I could and to anybody that would listen. I spoke so much rubbish in the space of 10 minutes. "We're taking you to theatre!" My husband finally joined me. The operation started. So many familiar sounds. Too much knowledge running through my head. I couldn't relax, I couldn't switch off. So many thoughts running through my head. This was not what I wanted. This is not how I imagined I would deliver my baby. I knew I was safe. I knew what to expect yet I felt like the whole room was spinning. I have never felt so out of control in my life. "We're taking you to theatre!" Oh my goodness she's here. The tears are flowing. My face is wet from crying. I just want to hold her and not let go. I just wish I could sit up and hold her properly. I want to cradle her, kiss her, cuddle her. I can attempt these things but the amount of movement I can make is out of my control. I'm so angry and frustrated. Please just give her to me. "We're taking you to theatre!" I'm still here. I'm still on this table. I just want my baby. I want to leave this room. I want to be a mum. I don't want to be lying here. Please just hurry up. My emotions are running wild. I'm happy, sad, relieved, excited, nervous, frustrated, tired, uncomfortable, uneasy, powerless,". "We're taking you to theatre!" Those 5 simple words, those 5 life changing words. 5 simple words I did not want to hear. 5 simple words that made me experience child birth from a different perspective. Those 5 words that sometimes make people think you haven't experienced child birth properly. Those 5 words that make you out of control. Those 5 words that still bring me so many mixed emotions. "We're taking you to theatre!" Does this make me less of a mother? Does this mean I am not as strong as others? No! The answer is always no. I have experienced a natural birth and a caesarean and there is no way that the caesarean is the easy option. Each are beautiful and traumatic in their own special way. I've never had surgery but being a scrub nurse I know exactly how you feel. I try to spend a moment to talk directly to a patient, sometimes just a smile and a "you will be ok, we'll look after you" a squeeze of a hand, because I understand how scary it all is. It petrifies me! They say staff make the worst patient. Of course you are a real and wonderful mother, you had such a beautiful daughter. Well done. I also had caesarean, but mine was an emergency caesarean, so they had to put me to sleep to get little man out, otherwise he would die. It's such a shame that I didn't get to see him being born and hubby couldn't be there either. They didn't allow him to stay in the operation room as I was sleeping when it all happened.http://lilinhaangel.com/ Oh I'm so sorry this happened to you, I think people forget how harrowing it can be as its quite accepted these days. It sounds awful and must have been so frustrating. Well done for getting through it mama xxx This is such a powerful post Kerry, brought tears to my eyes. I detest the very notion that a section is an easy way out. I didn't have one with Toby but I know it's far from easy and being a mother is so much more than the way in which you gave birth xx Gosh I was right there with you I can imagine every emotion possible flooding your body and feeling overwhelmed by it. Even if you work in that environment it's completely different when you're on the other end of the knife. Well done for being so strong a friend of mine had a c sec and she describe your thoughts and took quite a while to recover. It always sounds like a small thing when someone says c sec but it is major surgery, it's a big deal I was lucky enough to have 3 natural births, though not without their difficulties but I have friends who had to have emergency C-sections and they have talked about their fears and that feeling of losing control. Being someone who likes to be in control at all times I'm not sure I would have coped. Hugs xx After 5 natural births I never expected to need a c-section but number 6 decided that the sunroof was the way forward. I have to admit feeling similar feeling to you and I hated every second of the procedure but my son was born alive and healthy and that is all that matters What a fantastic post. My daughter was induced as an emergency as she was failing to thrive, and at one point when she was in distress there was talk of a section. In the event it didn't happen, but the nature of her delivery was traumatic nonetheless. I don't believe cesarean is the 'easy' option, but I also think every birth had the potential to be beautiful and calm, or the complete opposite. It depends on so many factors, but I think feeling out of control is a big part of what makes a situation traumatic. It certainly was for me. You have a lovely family, congratulations. I'm sorry your experience was so awful, but isn't it so worth it? �� xx Kerry, this was such a powerful post and so well written. It must have been so surreal being the one on the operating table. I shared many of your feelings when I went through my c-section, although I was lucky to be naive. I can't imagine you knowing every single thing that was happening. Ophelia is absolutely adorable and I bet you feel it was worth every excruciating second ❤️❤️❤️ When I was having my first, all I wanted to hear were those 5 words - after a 6 day induction, undiagnosed symphsis pubis dysfunction and failed epidurals. Theatre was full and they weren't prepared to open another one as it was me that was distressed, not my daughter. I delivered her naturally - 11 years ago yesterday. This is the first year I haven't had flashbacks. My son was delivered by elective c-section and I had to have a general anaesthetic (although my husband was allowed to stay. It was a very different experience and the best decision ever I was just 19 and had no idea what a c section was when they announced I was being taken to theatre. I was instantly relieved though when they gave me the spinal as I had been in labour for 48 hours and was exhausted. I've had all three of mine by section now and all totally different experiences. My last was the only elective and it was the worst one xc I am sorry that was such a traumatic experience for you. I haven't had one but I have heard the same thing from so many women who had had, that caesareans are not the easiest way to give birth and your body takes so much longer to recover.xx Such a beautiful post. I nearly had a C Section on my first but just about avoided it. I can imagine it totally feels like a loss of control and also imagine the trauma can stay with you a long time. So much for people saying its the easy option! Awww, I am so sorry this happened :( You sound very frustrated having to have a C section. I would have been scared, too. I can't imagine what it must be like but you know what? You did AMAZING! And your baby is beautiful xx This is such a beautifully-written and emotional post, Kerry. Having seen close friends after having a c-section, and their recoveries, it is definitely not an easy option, like some people make it out to be. C-sections get such bad press, when at the end of the day the most important thing is that your baby and you are both safe. x Struggled to read this. I always do with c-sections as it brings back vivid memories of my own emergency section and I still feel a twinge in my tummy every time I think it or read it. I felt like a complete failure after I'd had my section, after wanting a home birth and ending up with an induction. It was just not what I wanted at all but now it doesn't really bother me, I'm just as much a mum as anyone else! It just happened a bit different!
Arabic Bread or Khebz Pillows of Arabic Bread Arabic Bread/Khubz is commonly known as pita in the west where it is usually thicker and in an oval shape. Traditional Arabic bread is flat, leavened, circular and usually about 10in/25cm in diameter although it can vary. It is baked at high temperatures causing the dough to puff and create pockets. Once cooled, the bread deflates and can then be opened around the seams and the layers used to form sandwiches/wraps, or pieces are torn off randomly to create bite-size scoopers for dips and other foods. It can also be toasted, then gently crumbled and used as a garnish on salads and stews. It is essential that Arabic bread be baked using high temperatures. It is easy to bake the bread in a conventional oven at home and this will yield successful results as long as the aforementioned factor is practiced. Photography by Sarka Babicka The traditional way of cooking Arabic bread is on the Saj, or a convex metal disc. It is what is called Markouk and was the bread of choice until the later 50’s although people are now going back to making it for it’s health benefits. It is something really sensational to witness; the dough is tossed across from one hand to the other, as the dough continuously stretches yielding a large, circular, and paper-thin dough that is then placed onto the Saj using a big cushion. It will then bake for a couple of minutes before being peeled off. This wonderfully precious, paper-thin bread is called khubz markouk. In the west it can be found in Middle Eastern specialty stores labeled as village bread. Photography by Sarka Babicka Another traditional but sadly uncommon way of baking Arabic bread is using the clay oven or tannur (also known as tandoor). The clay oven is built into the ground and the dough is slapped onto the sides of the oven, again, with the help of a cushion. Once cooked, it is then removed with a long wired hook. In the past women would make the bread at home and the villagers would gather at each others houses to help in the baking in a rotation. However these days, fresh Arabic bread abounds in bakeries around Lebanon, thanks to sophisticated machinery and so few people still make their own bread. Thus the beautiful process of artisan bread making is really reserved to Lebanon’s villages. Below are images of my distant aunt Saidy, in Baskinta, showing us how it’s done. Normally, she’d have used a cushion to lay the bread on the saj but this setup was rather impromptu and she’d left hers at home. She’s one of the sweetest souls I’ve ever known. Arabic bread is a pivotal part of the Middle Eastern eating experience, where it is used interchangeably with utensils to create delicate bites, wraps or sandwiches and to help mop up prized stew juices. It’s in quite a separate league to the thick, heavy pitta breads sold in the West. Making Arabic bread at home is rewarding, and watching the air pockets develop is quite exciting. Sure, it’s not the exact texture of commercial-grade Arabic bread, but that’s precisely the point. Baking this beautiful bread is, in fact, not as hard as one may imagine: just be sure to have a well-heated oven ready before popping the dough in. Arabic bread has many uses. As well as being served alongside stews and other dishes with sauces, it can also be used in different ways. For example, you can also spread Za'atar or Wild Thyme Mixture and olive oil over the dough before popping it into the oven for a pizza-style snack or see also Spiced Lamb Flatbread Pizzas, page 107 of The Jewelled Kitchen. Triangles of Arabic bread can be toasted and then used to dip into hummus, or added to Fattoush salad. Alternatively, the toasted bread can be crushed into large breadcrumbs and then used in a dish such as Aubergine, Veal & Yogurt Crumble (see The Jewelled Kitchen page 119) Author: Bethany from The Jewelled Kitchen Serves: 4 Ingredients 300g/10½ oz/2½ cups strong white bread flour, plus extra for dusting ½ tsp sea salt 1 tsp caster sugar 4 tbsp olive oil 2 tsp dried active yeast Instructions Sift the flour into a mixing bowl, add the salt and sugar and pour in the oil, then mix well with your hands. Add the yeast to 150ml/5fl oz/scant ⅔ cup lukewarm water and stir until dissolved. Pour the water and yeast mixture into the flour and oil mixture, little by little, combining it with your hands as you go, until a ball is formed. Depending on the age and brand of flour, you may find that you need more or less water. Transfer the dough to a well-floured work surface and continue kneading it until it is smooth and elastic. Return the dough ball to the mixing bowl, then score the top with a knife to loosen the surface tension. Cover with a damp, clean kitchen towel and place it in a warm, draught-free place for about 1 hour or until it doubles in size. Once the dough has doubled in size, turn it out on to a lightly floured work surface and knock it back, then knead gently before rolling it into a log. Divide the log into four balls of equal size, each weighing about 125g/41?2oz. Lightly flour the work surface once more and use a rolling pin to roll out each ball, re-flouring the surface as necessary. For small loaves, roll out each ball of dough into a circle about 20cm/8in in diameter. For large loaves, roll out each ball of dough into a circle about 30cm/12in in diameter. Cover the loaves with a kitchen towel and leave to rest for a further 10 minutes. Meanwhile, preheat the oven to 230 ?C/450 ?F/Gas 8 and place a baking sheet in the oven to warm up. Baking one loaf at a time, spray a loaf lightly with water and bake for 2 minutes until the top and edges are lightly golden (the cooking time depends on the heat of the oven and the thickness of the bread) and a pocket of air has formed. Do not cook them for longer than 1 minute after the air pocket has formed, or they will turn out more brittle than pliable. Repeat with the remaining loaves. Leaving the breads to cool uncovered will also make them brittle, so if you are not serving them immediately, cover with a damp tea towel and store in a sealed plastic bag. The breads can be kept, wrapped, in a fridge for up to 2–3 days or in a freezer for up to 1–2 months. Allow 20–30 minutes’ defrosting time. Alternatively, microwave briefly or bake in a hot oven for a couple of minutes. Hi Bethany, I’ve been looking for an authentic Khubz Markouk recipe for ages and I know that this is definitely not leavened with yeast like the pita recipe you have shared here (amd which I’m eager to try as I love pita bread…!). In South Africa I have tried numerous Lebanese flatbreads from various supermarkets and I know that the paperthin bread that is cooked on the saj would have a slightly different dough. There are Lebanese women who bake these breads privately and supply to the supermarkets in unmarked plastic bags and there are no ingredients listed. I did however come across one that sid have an ingredients label and as I had suspected, there was no yeast used. Would it be possible for you to share your aunts flatbread recipe with us? My gut feeling is that it would be almost identical except without yeast. This would be greatly appreciated…! Your email address will not be published. Required fields are marked * Comment Name * Email * Website My aim is to try to demystify Middle Eastern food and make it more accessible. I want to change perceptions that Middle Eastern food is complicated and laborious (sometimes it can be) and get more people grappling their fear of the unknown with the cuisine. I like to cook both classical and Middle Eastern inspired dishes and try to always present them in an un-intimidating manner with easy to follow instructions.
Q: How to extends/subcontents a dialog box using the GWT UiBinder? I want to build "from scratch" a DialogBox hierarchy. First of all, I've got a BaseDialog.java class : A simple dialog that extends DialogBox (gwt widget) public class BaseDialog extends DialogBox { protected static BaseDialog2UiBinder uiBinder = GWT .create(BaseDialog2UiBinder.class); interface BaseDialog2UiBinder extends UiBinder<Widget, BaseDialog2> { } @UiField protected FlowPanel contentPanel; public BaseDialog() { setWidget(uiBinder.createAndBindUi(this)); } } a BaseDialog.ui.xml <!DOCTYPE ui:UiBinder SYSTEM "http://dl.google.com/gwt/DTD/xhtml.ent"> <ui:UiBinder xmlns:ui="urn:ui:com.google.gwt.uibinder" xmlns:g="urn:import:com.google.gwt.user.client.ui"> <g:VerticalPanel width="200px" height="200px"> <g:Label>Label principal</g:Label> <g:FlowPanel ui:field="contentPanel" /> </g:VerticalPanel> </ui:UiBinder> As you can see, the BaseDialog contains a simple Label and a contentPanel (FlowPanel). I would like to extends the BaseDialog (e.g. ConfirmationDialog). The ConfirmationDialog fills the content of the BaseDialog's contentPanel. How can I do that ? Thanks. A: Ok, I have found the solution : public class ConfirmationBox extends BaseDialog2 { protected static ConfirmationBoxUiBinder uiBinder = GWT.create(ConfirmationBoxUiBinder.class); interface ConfirmationBoxUiBinder extends UiBinder<Widget, ConfirmationBox> { } @UiField Label helloLabel; public ConfirmationBox() { contentPanel.add(uiBinder.createAndBindUi(this)); } } And <!DOCTYPE ui:UiBinder SYSTEM "http://dl.google.com/gwt/DTD/xhtml.ent"> <ui:UiBinder xmlns:ui="urn:ui:com.google.gwt.uibinder" xmlns:g="urn:import:com.google.gwt.user.client.ui" xmlns:my="urn:import:com.guardis.cortex.web.client.dialog"> <g:FlowPanel> <my:BaseDialog2> <g:FlowPanel ui:field="contentPanel"> <g:Label>test contentPanel from confirmationBox</g:Label> </g:FlowPanel> </my:BaseDialog2> <g:Label ui:field="helloLabel">Hello world from confirmation box (outside of BaseDialog)</g:Label> </g:FlowPanel> </ui:UiBinder>
Hot Topics: AP posts profit in 2013 even as revenue falls The Associated Press Associated Press Posted: 04/30/2014 11:03:15 AM MDT NEW YORK (AP) — The Associated Press posted a profit of $3.3 million in 2013, as it cut costs across the organization. The results compared with a loss of $25.5 million a year ago, according to the news cooperative's annual financial report, released Wednesday. Revenue fell 4 percent to $596 million as income from newspaper clients continued to fall and Google stopped licensing news content. The revenue decline was offset by a sharper drop in operating expenses, which fell nearly 7 percent, to $604 million. The AP eliminated its long-term debt and said it expects a small amount of revenue growth this year, which would mark the first gain since 2008.
by Mikael Rudolph of ImpeachforPeace.org The unfortunate death of a respected Congresswoman from California has opened up a seat in the House of Representatives in a strongly Democratic District which will be filled by special election on June 26th. Impeach for Peace does not endorse candidates, but we do strongly support H Res. 333, as introduced by Dennis Kucinich (D-OH) and only one candidate running for this vacant seat in Long Beach publicly agrees with us – Peter Mathews. On his campaign website, Mathews for Congress, it states: “Mathews will investigate and move on Impeachment and supports HR 333.” (Actually H Res. 333) Here is a local article about the race: Gazettes.com Lesser Knowns Trying To Break Out Of Pack By Kurt Helin – Editor The conventional wisdom is that the Democratic candidate who gets the most votes in the June 26 special election will eventually represent the 37th District in the House of Representatives. That’s because this is a heavily Democrat district in terms of registered voters. It also explains why 11 Democrats jumped into the race for the seat. The 37th District covers about 80% of Long Beach (although not the eastern part of the city such as Belmont Shore). The seat became open when Congresswoman Juanita Millender-McDonald died in April. (Original Article)
Two great Latin singing stars team up in this musical melodrama directed by the innovative Spanish filmmaker Luis Bunuel. Gerardo (Jorge Negrete) and his friend Demetrio (Julio Villarreal) are a pair of footloose cowboys in… MoreTwo great Latin singing stars team up in this musical melodrama directed by the innovative Spanish filmmaker Luis Bunuel. Gerardo (Jorge Negrete) and his friend Demetrio (Julio Villarreal) are a pair of footloose cowboys in turn-of-the-century Mexico who are looking for work after escaping from prison on dubious charges. Gerardo persuades Jose (Francisco Jambrina), an tycoon from Argentina who is looking for oil in Mexico, to give work to himself and his friends, but just as their fortunes are on the rise, the oilman disappears and is feared murdered. Jose's sister Mercedes (Libertad Lamarque) travels to Mexico to find out what's become of him, and when she learns that Gerardo has taken over as manager in Jose's absence, she's convinced that Gerardo and his pals are to blame. Wanting to know more about Gerardo and his cronies, she takes a job as a singer as "Gran Casino," a rowdy nightclub near the oil fields; in time, she strikes up a romance with the good-hearted roughneck and learns just who her brother's enemies really are. Gran Casino was Luis Bunuel's first project after settling in Mexico in the wake of the Spanish Civil War and an unsuccessful attempt to seek asylum in the United States; an uncharacteristically conventional story which was not well suited to Bunuel's talents (and a musical to boot), Gran Casino fared poorly at the box office, and it was two years before he'd get to make his next film, El Gran Calavera. ~ Mark Deming, Rovi
The father of one of the men accused of attacking a gay couple at a Pride event has claimed his son is innocent – because he was raised by two men. Juan Carlos Lopez and three other men were recently charged following an attack at Miami Pride on two gay men. Rene Chalarca and Dmitry Logunov were knocked to the ground and then repeatedly punched and kicked in the attack on April 8, which the pair claim was prompted because they were holding hands. The four suspects – Juan Carlos Lopez, Adonis Diaz, Pablo Reinaldo Romo and Luis M. Alonso, – were arrested and charged after they handed themselves into the police. On Tuesday Juan Lopez, the father of Juan Carlos Lopez, told NBC that he had raised his son along with his partner of 15 years, which meant he could not have committed the crime. Lopez said that he was certain his son would not attack anyone for being gay, stating: “I’m sure 100 percent of that.” He added that his son “loves LGBT.” Shortly after the incident, Miami authorities released CCTV of the attack as part of a public appeal for help. The four suspects were originally charged with aggravated battery which carries a maximum prison sentence of 15 years. These charges were later upgraded to hate crime charges as prosecutors successfully argued the alleged attack was motivated by homophobia. In the state of Florida, these enhanced hate crime charges mean that the alleged perpetrators could face as much as 30 years in prison. Dennis Gonzales, the lawyer for Carlos Lopez, has denied that the crime was motivated by homophobia, stating: “Clearly, that’s not the case. “These kids grew up with their friend Juan – their father has been in a gay relationship the last 15 years. “These kids have participated in that – that’s at issue.” Following the attack, the couple were treated by paramedics at the scene for cuts and bruises on their faces, while the man who attempted to stop the attack, Helmut Muller Estrada, was taken to Mount Sinai Medical Center where his head wound required four stitches. Chalarca said the pair are sure they were targeted because they are gay and were holding hands, stating that they did believe it was a hate crime. Speaking to local outlets WTVJ and WSVN, he said: “The way we were dressed and everything. We were together. For me, it was like, yes, it was a hate crime.”
This invention was made with government support under Grant Number CHE-9713388 awarded by the National Science Foundation. The government has certain rights in the invention. The invention relates to systems and methods for making spectroscopy and metrology measurements using electromagnetic radiation, particularly, electromagnetic radiation in the terahertz frequency range. Measurements with electromagnetic radiation are now conducted in essentially every range of the electromagnetic spectrum, ranging at least from x-rays through radio waves. Different regions of the spectrum are well suited for measurements of different materials and different material properties. Not all regions of the electromagnetic spectrum are equally accessible for measurements. In some cases, generation of the electromagnetic radiation with the desired frequencies/wavelengths, tunability, intensity, pulse duration or other waveform characteristics may be difficult or costly. In other cases detection of the radiation with the desired sensitivity, time or frequency resolution, or other features may pose challenges. Finally the convenient use of the radiation for practical measurements may present additional difficulties, depending on the geometry of radiation generation and detection and of sample placement and on other factors. The terahertz frequency range (e.g., 0.1-20 THz) or correspondingly the far-infrared (xe2x80x9cfar IRxe2x80x9d) wavelength range, is emerging as an important component in the spectroscopic study and optical imaging of a very wide range of samples extending from simple and complex liquids to biological materials to integrated circuits. For example, in liquids and partially ordered solids, the terahertz frequency regime probes properties on length and time scales intermediate between those characteristic of bulk low-frequency dielectric responses and of local intermolecular or interionic motions. Conventional dielectric spectroscopy rarely reaches frequencies over 100 GHz, and therefore components of the dynamics of complex materials such as supercooled liquids and mixed ferroelectric crystals remain elusive. Unfortunately, there can be experimental challenges to generating and detecting terahertz radiation. Microwaves, which border terahertz-rays on the low frequency side, are typically generated using high frequency electronics while infrared waves, on the high frequency border, are generated by light sources, usually via blackbody radiation or lasers. Recently, femtosecond lasers producing optical pulses on the order of 100 fs or less have been used to illuminate photoconducting dipole antennas, which respond by generating broad bandwidth, coherent bursts of far-IR output with substantial spectral density from 100 GHz to 5 THz or higher. Such terahertz radiation, which propagates through free space, is focussed and/or collimated with far-IR optics, and can be detected using another, similar photoconductive dipole antenna, which is gated by a variably delayed femtosecond pulse. The invention features a system and method for generating terahertz radiation by time-domain excitation of polaritons in a nonlinear optical crystal. One or more pulses of coherent optical radiation illuminate a non-centrosymmetric material to excite a polariton having a frequency less than or equal to the bandwidth of the excitation pulses. Spatial and temporal shaping of the optical excitation pulses can control the frequency, bandwidth, and propagation properties of the polariton. When the polariton propagates to the edge of the non-centrosymmetric material, its electromagnetic component can couple into an adjacent sample as terahertz radiation. The interaction between the sample and the terahertz radiation can be measured a number of ways. For example, after its interaction with the sample, the terahertz radiation can couple into a second non-centrosymmetric material as a polariton, whose properties can be detected by a second set of one or more optical pulses. Alternatively, for example, the terahertz radiation can reflect back to the original non-centrosymmetric material for the optical detection measurement. In either case, the attenuation and delay of the detected terahertz radiation reveals the real and imaginary components of the dielectric properties of the sample in the terahertz regime. Moreover, the sample can be probed directly with, e.g., an optical beam, following its interaction with the terahertz radiation. Measurements can be repeated at additional polariton frequencies in an automated fashion to spectrally resolve the dielectric response of the sample. In general, in one aspect, the invention features a spectroscopic method for characterizing a sample. The method includes: positioning the sample adjacent to a non-centrosymmetric material; directing at least one temporal pulse of coherent EM radiation into the non-centrosymmetric material to generate a polariton therein and cause EM radiation from the polariton to propagate into the sample, wherein the polariton has a frequency less than or equal to the bandwidth of the pulse; and measuring a response of the sample to the EM radiation from the polariton. Embodiments of the method can include any of the following features. The measuring step can include: positioning a second non-centrosymmetric material to receive EM radiation from the sample in response to the EM radiation from the polariton in the first-mentioned non-centrosymmetric material, wherein the EM radiation from the sample propagates into the second non-centrosymmetric material to form another polariton; and directing additional EM radiation to interact with the polariton in the second non-centrosymmetlic material; and measuring a response of the second non-centrosymmetric material to the interaction of the additional EM radiation and the polariton in the second non-centrosymmetric material. Furthermore, the response of the second non-centrosymmetric material can be measured by measuring at least one of transmission, reflection, polarization rotation, and diffraction of the additional EM radiation by the polariton in the second non-centrosymmetric material. Moreover, the at least one of the transmission, reflection, polarization rotation, and diffraction of the additional EM radiation can be spectrally resolved. The response of the second non-centrosymmetric material can also be one of sum-frequency generation and difference-frequency generation caused by the interaction of the additional EM radiation and the polariton in the second non-centrosymmetric material. Furthermore, the response of the second non-centrosymmetric material can also be measured by using the additional EM radiation to image the polariton in the second non-centrosymmetric material. The measured response of the second non-centrosymmetric material can be indicative of the amplitude and phase of the polariton in the second non-centrosymmetric material. The measuring step can also include: directing additional EM radiation to interact with the EM radiation in the sample from the polariton; and measuring a response of the sample to the interaction of the additional EM radiation and the EM radiation in the sample from the polariton. The measuring step can include measuring at least one of diffraction, reflection, a change in absorption, and a change in polarization of the additional EM radiation by the sample caused by the presence of the EM radiation in the sample from the polariton. Moreover, the measured at least one of diffraction, reflection, the change in absorption, and the change in polarization can be spectrally resolved. Also, the response can be one of sum-frequency generation and difference-frequency generation caused by the interaction of the additional EM radiation and the EM radiation in the sample from the polariton. The EM radiation from the polariton can also reflect from a reflecting surface and back into the non-centrosymmetric material to form a second polariton, in which case, the measuring step can include: directing additional EM radiation to interact with the second polariton; and measuring a response of the non-centrosymmetric material to the interaction of the additional EM radiation and the second polariton. The measured response can be indicative of absorption by the sample, refractive index of the sample, and/or complex refractive index of the sample, at the frequency of the EM radiation from the polariton. The method can further include repeating the positioning, directing, and measuring for a reference sample, and comparing the measurements of the first-mentioned sample and the reference sample. The method can further include temporally shaping EM radiation to form the at least one temporal pulse. The directing step can include directing a spatially periodic pattern of the at least one temporal pulse of EM radiation onto the non-centrosymmetric material. The method can further include selecting the period of the spatially periodic pattern to produce a selected frequency for the polariton. The directing step can further include crossing at least two beams of the at least one temporal pulse of EM radiation to form the spatially periodic pattern. Alternatively, the directing step can further include passing EM radiation through a mask to produce the spatially periodic pattern on the non-centrosymmetric material. The method can further include repeating the selecting, directing, and measuring steps for multiple frequencies of the polariton. The method can further include focusing the EM radiation from the polariton prior to it reaching the sample. The sample can be one of a liquid, solid, and gas. It can separated from the non-centrosymmetric material. The frequency of the polariton can be the range of about 0.1 to 20 THz, e.g., in the range of about 1 to 10 THz. In general, in another aspect, the invention features an apparatus for characterizing a sample including: a non-centrosymmetric material; a sample assembly configured to support the sample adjacent to the non-centrosymmetric material; a light source which during operation directs at least one temporal pulse of coherent EM radiation into the non-centrosymmetric material, the at least one temporal pulse having an intensity and bandwidth sufficient to generate a polariton in the non-centrosymmetric material and cause EM radiation from the polariton to propagate into the sample, wherein the polariton has a frequency less than or equal to the bandwidth of the pulse. Embodiments of the apparatus can include any of the following features. The apparatus can further include: a second non-centrosymmetric material positioned to receive EM radiation from the sample in response to the EM radiation from the polariton in the first-mentioned non-centrosymmetric material, wherein during operation the EM radiation from the sample propagates into the second non-centrosymmetric material to form another polariton, wherein during operation the light source directs a probe beam of EM radiation to interact with the polariton in the second non-centrosymmetric material; and a detector positioned to measure a response of the second non-centrosymmetric material to the interaction of the probe beam and the polariton in the second non-centrosymmetric material. The apparatus can further include a computer coupled to the light source and the detector, wherein during operation the computer analyzes the measured response to characterize the sample. During operation of the apparatus, the light source can direct a probe beam of additional EM radiation to interact with the EM radiation in the sample from the polariton, and the apparatus can further include a detector positioned to measure a response of the second non-centrosymmetric material to the interaction of the probe beam and the polariton in the second non-centrosymmetric material. The apparatus can further include a computer coupled to the light source and the detector, wherein during operation the computer analyzes the measured response to characterize the sample. The sample assembly can includes a reflecting surface configured to reflect the EM radiation from the polariton back into the non-centrosymmetric material to form a second polariton. During operation the light source can direct a probe beam of additional EM radiation to interact with the second polariton, and the apparatus can further include a detector positioned to measure a response of the non-centrosymmetric material to the interaction of the additional EM radiation and the second polariton. During operation the light source can cause the at least one temporal pulse to form a periodic spatial pattern in the non-centrosymmetric material. The apparatus can further include a computer coupled to the light source to control the period of the periodic spatial pattern. To form the periodic spatial pattern, the light source can direct a pair of excitation beams to interfere in the non-centrosymmetric material, the pair of excitation beams including the at least one temporal pulse. Alternatively, the light source can include a laser source, a phase mask, and one or more imaging lenses, wherein during operation the laser source directs a beam to the phase mask, the phase mask diffracts the beam into multiple orders, and the one or more imaging lenses recombines the multiple orders in the non-centrosymmetric material to form the periodic spatial pattern. Embodiments of the invention have many advantages. For example, systems and methods described herein can be used to generate and/or detect terahertz frequency radiation without the use of a photoconductive dipole antenna. Such systems may be used as terahertz frequency spectrometers that involve only optical beams. Moreover, spatial shaping of the optical excitation pulses used to generate the polaritons can control the frequency of the polariton and the electromagnetic radiation derived there from. Thus, the systems can be automated to scan the sample with multiple, narrow-band pulses of terahertz radiation. Other features and advantages of the invention will be apparent from the following detailed description, and from the claims.
For the past seven years, the Tax Authority used to accept the income declaration made by businesses in order to determine tax payments, without any additional assessments of its own. This has changed for good, says the Authority, which has dispatched its own taskforce to survey the assets of small businesses, which will then be used for determining tax payments, writes EDEN SAHLE, FORTUNE STAFF WRITER Small Businesses Threaten Shutdown, Over New Tax Pressures Zelalem Banteyewalu, a graduate of Addis Abeba University’s School of Fine Arts and Design, opened an advertising shop in 2010 on the second floor of the Kirkos Trade Centre. He started his businesses last year by providing advertising services on banners, T-shirts and billboards, and he even hired one employee to manage his shop during his absence. Zelalem has become one of the 8,094 registered Turnover Tax (ToT) payers in Kirkos District, many of whom were lining up to pay their annual taxes for the fiscal year of 2011/12 in the Wereda 10 Office, this week. Kirkos District, where Zelalem’s business is located, has made a revision on the tax estimation three times in 2010/11, blaming the galloping inflation rate, which stood at 38.1pc in June 2011. This has resulted in Zelalem paying more in taxes. Zelalem was held up by surprise, along with his fellow tax payers at the Wereda 10 office, which is delegated by the Ethiopian Revenues and Customs Authority (ERCA) to collect tax payments from category “C.” His tax payments used to be based on his income declaration, according to the voluntary system enforced seven years ago, which averaged 356 Br a year. Zelalem’s tax duty, however, has escalated to 16, 373 Br, representing a 217pc increase, after being classified as a category “C” taxpayer. Among the 84,805 taxpayers registered in the capital city, 48,831 are like Zelalem, who are under category “C” taxpayers, covering 57.6pc of all taxpayers, according to data from the ERCA. In the past seven years, ERCA used to accept taxpayers income declarations for determining tax payments, without any additional assessments of its own. A new tax evaluation directive, however, has increased Zelalem’s tax payments, along with the tax payments of 8,094 taxpayers in the Kirkos District, who are forced to be registered as category “C” taxpayers, who are required to make ToT payments. ERCA, which introduced the new directive three months ago, has conducted a campaign to register taxpayers from November until March 2011, after only 5,052 taxpayers in Kirkos took the opportunity to register as taxpayers, avoiding penalties from the tax authority. The move was part of an effort to increase the country’s tax base, and an effort to reach the forecasted 12.1pc tax contribution of the Gross Domestic Product (GDP), which is estimated to be 471.8 billion Br by the 2011/12 fiscal year, according to sources in ERCA, who are not authorised to officially comment. Tax contributions of the GDP were 11.3pc of GDP in the 2009/10 fiscal year, and 11.7 of GDP in the 2010/11 fiscal year, bringing in 383.4 billion Br and 425.6 billion Br, respectively. Under the GTP, ERCA aims to increase tax contributions to 17pc of the nominal GDP by the fiscal year of 2014/15, placing pressure on the tax authority. With the aim of registering more taxpayers and broadening the tax base to reach its house goal collecting 70 billion Br during the fiscal year of 2011/12, the authority recruited 1,200 fresh university graduates from Addis Abeba University (AAU), the oldest and largest higher education institution. The fresh graduates, whom ERCA trained in the basics of marketing survey for three months, surveyed 95,000 business establishments around the city over a three-month period. Besides the market survey, members of the taskforce assessed the purchase bills of new taxpayers, their observable assets, including furniture and equipments, and their declarations of income and expenses. The taskforce made taxpayers who do not keep accounting books sign a single copy of the new assessment of their tax duty, which would be deposited with the ERCA after the estimation of tax. ERCA’s fresh graduates in the taskforce reported that 9,000 people were not paying their tax duties, 11,000 taxpayers were not paying value added tax (VAT), and 36,000 businesses were still required to use cash registers. The members of the taskforce, which were instructed to review the outdated, seven-year-old tax valuation system, and replace it with an all new valuation system in all of the 10 districts of the capital, claimed that 11,000 businesses, including Zelalem’s, were making less tax payments than was expected of them. They reported that business owners, like Zelalem, had been under paying tax duties, by claiming that they earn less than 100,000 Br, annually. The authority and the City Administration, which collected 4.5 billion Br in tax revenues during 2010/11, and planned to collect 5.6 billion Br tax during 2011/12, were suprised with the revealing findings. ERCA agreed, however, that the new assessment system should not apply retroactively, to save businesses from being closed down by being over burdened by the tax payments, and the imposition of a three-month penalty on the businesses that were alleged to be hiding their actual income attribution. The minimum of a three-month tax penalty imposed on businesses which were allegedly underpaying taxes amounts to 20,000 Br, and can be increased by the authority depending on the size and years of operation of the businesses. “Taxpayers could have been requested to pay millions in penalties, if it was not for an agreement between ERCA and the City Administration on behalf of the businesses,” Mamo Abdi, tax and customs affairs adviser to the Director General of ERCA, told Fortune. The business owners in the city, however, who were forced to shift to category “C” and instructed to pay higher taxes, do not feel that they were granted favours by the authority. “The amount that I am required to pay does not take my income and expenses into consideration,” said Zelalem in frustration, because he says that he does not have the money to pay the required amount. His frustrations are echoed by many in the city, and other major towns across the country, who are responding in different ways, from breaking down into tears, to getting physical with tax collection officials at the weredas once they were notified of the amount they are required to pay. One such frustrated taxpayer is Abel Sheferaw. He has joined the ToT scheme in the Bole District, which had 7,046 registered taxpayers in 2007. Abel opened his four-year old business, which sells mobile phone accessories and earns an average daily income of 60 Br he is located, around Gerji, a few minutes’ drive from the Bob Marley Square. After the tax force surveyed his business, he was notified to pay 3,000 Br, a significant increment from his previous tax duty of 700Br, roughly a 328 pc increase. Some taxpayers, like Abel, are claiming that they cannot afford to pay the amount they are required, and the nightmare has just begun. Some have decided to shutdown their businesses, an eventuality that neither ERCA nor the city wish, according to ERCA and city officials. Zelalem, who is supporting his mother through his business, has already made up his mind to close his shop, although Abel still has some capital saved to carry on. The complaints from businesses and the calls for the revision of the new valuation system have flared over the past few weeks. Tewodros Teshome, 32, and a resident of Adama (or Nazareth), 100Km east of Addis Abeba, owns a share in a car garage. He established the garage with two of his friends with a capital of 4,000 Br eight years ago, paying 1,700 Br for rent, and employing 18 permanent and part-time employees. The Adama Special Zone Administration of Customs made a survey, and included him and his peers in the category “C” taxpayer list. In the past, they claimed to pay about 2,500 Br, annually. However, they are now required to pay 82,000 Br, an earth shattering 3,180pc increase with the newly enforced tax valuation system. Tewodros, and his friends, who were engaged in the business for the last 22 years as employees, before opening their own garage, claimed to have an income from about 100 Br up to 500 Br. The car garage owners, who would service a minimum of five vehicles on a daily basis, have also collectively decided to shutdown their business because of their new tax reality. “I never even counted that amount of money in my entire life, let alone pay that amount of money to the tax authority annually,” he told Fortune, clearly angry. Despite the frustrations, and the resistance to pay, tax authorities do not plan to revise their projections for a minimum of three years. “The sharp increase of taxes businesses owed in such a short period of time only signifies the instability of the tax system,” a tax expert at the Addis Abeba University told Fortune under condition of anonymity. Experts in the industry also question the legitimacy of the survey in the absence of a standardised tax assessment system in the country. “The estimation based on the survey may not be 100pc accurate, if taxpayers have legitimate claims supported by evidence they can submit their appeal,” Mamo told Fortune. A macroeconomist, who believes that taxpayers are disadvantaged, says the taxpayers, who are required to pay more than they are used to, would either shift the burden to their customers by increasing prices, or close their businesses, but in both cases the customers will suffer the most, since commodity prices will escalate. Otherwise, it will be difficult to get commodities in the market due to the shortage of players who can afford to pay the taxes. He also argued that the tax valuation, which was revised considering the inflation rate, does not represent the real income of the businesses, as in the cases of Zelalem, Abel and Tewodros. In reality, their income has actually declined since they now spend more money to buy fewer items. “As a result, tax duties of the businesses should have been decreased, instead of increasing tax rates,” the macroeconomist argued. Mamo, however, is persistent in his belief that the income of businesses is on the rise, along with the growth of the economy.” Although official documents of the GDP show that the country’s economy has grown by 11pc in the past five years, which supports Mamo’s claim, no disaggregated data is available to show that real income has increased as much for businesses. Taxpayers, who are aggrieved by the new tax system, could appeal to the tax review committee of ERCA within 10 days, and its tax appeal committee within 30 days. If they remain dissatisfied they can take ERCA all the way to court, according to the income tax proclamation issued in 2002. These options, however, do not seem to be solutions for most of taxpayers, including Zelalem and Tewodros, who have already given up hope and opted to shut down their businesses. The new tax demands go too far, they argue, and now they are left with no plans for the future. They claim that they do not have the money to pay ERCA, or proceed with tax appeal procedures, which is 50pc upfront deposit of the tax amount they are told they owe the state.
Inhibition of barnacle cyprid settlement using low frequency and intensity ultrasound. Low frequency, low intensity ultrasound was demonstrated as an effective inhibitor of barnacle cyprid settlement. When the same substratum vibration amplitude (10.05 nm) and acoustic pressure (5 kPa) were applied, ultrasound at a frequency of 23 kHz significantly reduced cyprid settlement. The mechanism appeared to differ from the ultrasonic cavitation induced inhibition previously reported as no increased mortality was observed, and no change in the exploratory behaviour of cyprids was observed when they were exposed to this continuous ultrasonic irradiation regime. The application of ultrasound treatment in an intermittent mode of '5 min on and 20 min off' at 20-25 kHz and at the low intensity of 5 kPa produced the same effect as the continuous application of 23 kHz. This energy efficient approach to the use of low frequency, low intensity ultrasound may present a promising and efficient strategy regarding irradiation treatment for antifouling applications.
It’s hard to believe that 2019 is behind us—that went by fast! Last year we got our first look at a black hole, an egg became the most popular social media icon, and humans stormed a government facility to discover if the truth is out there. Though the passage of time may one day result in our bodies withering into leathery husks—dissolving into grit and dust, with no surviving record of what value our lives once held—the last few years haven’t been so bad! We spent them on a project we’re excited to launch, and we’re almost to the finish line. Since 2020 is here, it’s about high time we offer another update as we barrel towards the release of Wasteland 3 on May 19 (pre-order now!). Before we do, let’s look back fondly at what’s gotten us to this point. Maestro, please dim the lights and roll tape… A Brief and Flawed History of the End “Over a hundred years ago Humanity was brought to the brink of extinction when a cascade of nuclear destruction rained from the sky. I’m not sure if anyone knows what really happened—or even cares anymore. All that matters to those of us who remain is how we'll survive. “It’s now early into the 22nd Century. The inhabitants of the wastes are the fifth-generation descendants of those who were cursed to remain after the end of the world, yet too many people can't look forward. They continue to look to the old world’s culture, gods, and fears, and learn all the wrong lessons. But despite the desolation, the radiation, and the reborn prejudices of the afraid, there are those who remain sustained by the hope that order can yet be salvaged from the chaos. Unfortunately, chaos is rampant, and order is in short supply. “The only law that exists here in Arizona is dispensed by a group of peacekeepers who call themselves the ‘Desert Rangers.’ For years these Rangers have been all that’s stood between the depraved scavengers, machines, and cults that plague the land, and those of us unable to defend ourselves against them. But now, after a conflict that destroyed their base and decimated their numbers, the Rangers are on the brink of dissolution, and have sent their best and bravest over the Rockies to Colorado in a last ditch gambit to trade their combat expertise for desperately needed supplies. "All of us here can only wait and pray they succeed. Without the Desert Rangers we will not survive." By Unknown Written on a series of 17 cocktail napkins Wasteland Imagined In 1988 (of our real-life timeline), a passion project was released that put players into the role of the Desert Rangers, a group formed to bring order to post-apocalyptic America. Wasteland released for the Apple II, Commodore 64, and IBM computers, as a top-down RPG where morally gray choices made the player’s path to success less than clear. The combination of cutting-edge graphics (for the time); along with rich story provided through an out-of-game Paragraphs book; allowed Wasteland to deliver twists, turns, and reactive storytelling like gamers had never encountered before. Players hungered for more, but as fate would have it, it would take more than 20 years for the Desert Rangers to make their triumphant return. This is a good place to pause and mention that we’re working on a remastered version of the original Wasteland—appropriately called Wasteland Remastered—that we’ll be releasing early this year on PC and Xbox One. Here's an in-progress shot of the same area shown above, demonstrating how we’re completely overhauling it while still honoring the original gameplay. Pre-alpha screenshot from Wasteland Remastered. In case you missed it when we shared it on the @Wasteland Twitter, we also Remastered the original game's box art, and here's what will be adorning digital store shelves in the not too distant future. Back to the Wasteland The Rangers’ long walk in the proverbial desert would eventually come to an end in 2012, when we announced a Kickstarter initiative to develop the long-awaited sequel. Wasteland 2’s Kickstarter campaign was beyond successful, with our backers having pledged more than 300% of the project’s initial goal and setting new crowdfunding records. Development charged ahead, and Wasteland 2 released two years later to accolades (holding an 87 Metacritic) and the thrill of fans new and old. In addition to being praised for its engaging tactical gameplay, Wasteland 2 honored the original with rich role-playing elements, a haunting soundtrack from Mark Morgan (Fallout, Fallout 2), and the high re-playability of difficult choices and devastating consequences. Energized by the Community’s reception—and eager not to let our Rangers wander for too long again—we soon set out to work on continuing the saga. In 2016, the Wasteland 3 crowdfunding campaign began on Fig, and once again we reached our goal and development went into full swing. Since then, our teams have been hard at work forging another game worthy of the Wasteland name, filled with the complex roleplaying choices, satisfying tactical combat, and a host of new features and systems that will make this the greatest Wasteland chapter yet. With a Little Help from Our Friends Going up against a gang of scavengers is best done with some help from the squad, so it was with no small excitement that our squad got some heavy artillery to back it up. In late 2018, Microsoft acquired our studio with the intention of empowering us to do more of what we do, how we want to do it. Wasteland 3 was already an ambitious project. We’re bringing back the things everyone loved: a deeply customizable RPG, brutal ethical choices with meaningful reactions and consequences, and deep tactical combat. On top of that we have big, new features like the customizable (and formidable) Kodiak vehicle, and cinematic conversations—to name a few. With Microsoft’s support comes the gift of time, and it’s time we’re joyously putting into making Wasteland 3 a more feature-rich and higher quality experience than we ever would have been able to before. One obvious benefit is all the dialogue in the game is fully voiced (over a half a million words), in a first for inXile’s games. We’re also putting time into often unseen (but critically important) background work with the additional resources we’ll have in QA, accessibility testing, and optimization. On the Road Again In 2019 we were armed with the will and the means to sing the praises of the irradiated Wasteland, so we packed up and set out on the trail. Most recently we joined our Microsoft friends for X019 in London. There, we got a chance to speak in more detail about the game, and drop our newest trailer. We also took the roadshow across the pond to gamescom in Cologne, Germany. While our highest-tier backers were sinking their claws into the Alpha, we had the pleasure of showing the game off to gamescom attendees and press, as well as debuting a new trailer in an episode of Inside Xbox. No trip to gamescom would be complete without taking home the event’s award for ‘Best Role Playing Game.’ So we did. But our first big stop of the year was the Xbox briefing at E3, where a dangerously inebriated Scotchmo gave his blatantly incorrect take on how things in Colorado have been going before you arrived. Fun background story on this one: we call it the E3 2019 trailer because it was a trailer first shown at E3 in 2019. Sometimes creative lightning just strikes, y’know? The Final Few Miles Wasteland 3 is releasing May 19 (pre-order now!), and we’re charging fearlessly toward the oncoming horde of players looking to dive into the world we’ve created. We have some big plans in-store as we near the release, including content previews, events, and more. Not the least of which though will be our Backer Beta, an extended look at the game’s content that will give those who backed the game on Fig the ability to experience an expanded-preview. We’re targeting March for the Backer Beta, and we’ll of course keep you updated on keys and the testing process as we get closer. This is a good time to remind all our backers to check your pledge on CrowdOx, ensure your email address and details are up to date, and finalize any orders. We’ll be sending out surveys in the near future where you’ll be able to finalize your platform choice, and will be distributing Steam and GOG keys shortly after that. Foresight is 2020 We are extremely excited to venture into the Wasteland with you once again, and we know that you’re itching to get back to the desolate horrors of the post-apocalypse. 2020 is shaping up to be a fantastic year, and we are honored to have your support and excitement for a project we’re putting so much of our lives into. We truly could not have done this without you, and it gives us immense pleasure to take your energy and turn it into the experience you’ve been waiting for. Well, that about does it for this broadcast, stay tuned for updates and previews as we march along this final stretch toward Wasteland 3’s release on May 19, 2020 (pre-order now!). Be sure to follow @Wasteland on Twitter for news and updates! - inXile entertainment
Thailand’s First Ico Portal Approved By The Thai Sec Thailand’s First ICO Portal Approved by The Thai SEC5 (100%) 5 votes According to a recent report the Securities and Exchange Commission of Thailand has approved the country’s first platform for initial coin offerings (ICO). The main goal of this ICO portal will be to perform due diligence on new cryptotokens ensure that a … Continue reading Thailand’s First ICO Portal Approved by The Thai SEC Mercadolibre Bans Crypto Listings After Big Paypal Investment Mercadolibre Green Lights Crypto Ban Following Paypal Investment Latin American e-commerce venture MercadoLibre has announced a cryptocurrency-related listings ban on its platform. In an email sent to vendors it says that it is also cracking down on pre-paid cards used for games. This will come into effect on 19th March. It hasn’t revealed why it is going down Mercadolibre Dumps Crypto Days After Paypal’s $750 Million Investment MercadoLibre a Latin American e-commerce giant with a presence in nearly 20 countries recently started warning users that cryptocurrency-related listings will be banned from its platform. The company made the announcement just days after receiving a $750 million investment from PayPal. $22 Billion High Powerful Cryptocurrency Miners Released LUXEMBOURG / ACCESSWIRE / March 15 2019 / OnMiners S.A (www.OnMiners.com) is pleased to announce the official launch of their powerful endothermic cryptocurrency mining rigs with features to take the globalcrypto mining space by storm. The company informs that their just launched multi-algorithm miners offer the biggest hash rates available in the market while minimizing power consumption noise and heat generation. Passbase Is Building A Full Stack Identity Engine With Privacy Baked In Digital identity startup Passbase has bagged $600000 in pre-seed funding led by a group of business angel investors from Alphabet Stanford Kleiner Perkins and EY as well as seed fundinvestment from Chicago-based Upheaval Investments and Seedcamp. The 2018-founded Silicon Valley-based startup &… Crypto.com Chain Price Gains Another 50% As $0.1 Target Is Within Reach Even though one would be inclined to say the bearish pressure is gone from crypto again there is still a lot of uneasy momentum. A fair few markets are still in the red whereas most others do not note any spectacular gains. One notable exception in this regard is the Crypto.comChain price which simply … Kenya’s CapAGRI Africa a last-mile mobile financing platform for Smallholder farmers across African Agricultural Markets has been selected among the most-promising seed stage blockchain startups from around the world to take part in æternity Venture’s ‘Starfleet’ Accelerator Programme. Kenya’s Ridesafe and Utu... Develop crypto regulations within the next four weeks or the court will make its own judgement. According to a published notice the U.S. Securities and Exchange Commission (SEC) has begun reviewing a ... One of the most significant pain points of buying cryptocurrency is conducting transactions which seem to be not that simple for most of the users and can be complicated for even the most tech-savvy of us. Xena Launches Leveraged Contract For Yet To Be Released Telegram Token The Telegram token (gram) has started trading as a perpetual contract on London-based Xena Exchange. On Mar. 12 the cryptoexchange launched a derivative contract for grams with up to 100x leverage. The Xena-listed perpetual contracts are publicly tradable and are intended to provide liquidity for the gram token ahead of its release later this … Crypto.com Enters Indonesia Lists Cro On Indodax Xena Exchange Launches Telegram Crypto Derivatives Because Xena’s perpetuals are settled in crypto they don’t have to be regulated by the ... Japan’s LINE launched its own LINKchain which can be used for payments within the ecosystem. Facebook is al... The Malta Financial Services Authority (MFSA) has appointed U.S. cybersecurity company Ciphertrace to help with compliance monitoring of crypto assets. Ciphertrace will be expected to keep track of transactions that pass through local crypto exchanges and digital wallets including ICOs screening for potential money laundering and terrorism financing violations. Also read: Fidelity’s Cryptocurrency Arm Starts … Game Changing In Cryptocurrency Mining LUXEMBOURG / ACCESSWIRE / March 8 2019 / OnMiners S.A (ww.OnMiners.com) is pleased to announce the official launch of their powerful endothermic cryptocurrencymining rigs with features to take the globalcryptominingspace by storm. The company informs that their just launched multi-algorithm miners offer the biggest hash rates available in the market while minimizing power consumption noise and heat generation. Aaron System In Thailand Enters Into Mongolian Cryptocurrency Exchange Market With Ubwave In Mongolia Launching the world’s first Exchange that deposit and withdrawal of all countries’ FIAT currencies are possible! On March 7 2019 Aaron System announced that it has signed an investmentcontract in Ho Chi Minh City Vietnam to establish and operate the AKHAN Exchange in Mongolia the world’s first Exchange making all FIAT currencies’ deposit and … Donate XRP Ripple Your are viewing our 1st page from 6 pages of Presearch news, Presearch rumours and Presearch developments. Our Presearch News service is updated every hour with all the latest news/information/gossip on the Presearch Crypto that we can find for you.
Review on Factors Influencing Physician Guideline Adherence in Cardiology. Cardiovascular disease is the most common cause of death in Western countries. Physician adherence to guidelines is often suboptimal, resulting in impaired patient outcome and prognosis. Multiple studies have been conducted to evaluate patterns and the influencing factors of patient adherence, but little is known about factors influencing physician guideline adherence. This review aims to identify factors influencing physician guideline adherence relevant to cardiology and to provide insights and suggestions for future improvement. Physician adherence was measured as adherence to standard local medical practice and applicable guidelines. Female gender and older age had a negative effect on physician guideline adherence. In addition, independent of the type of heart disease, physicians without cardiologic specialization were linked to physician noncompliance. Also, guideline adherence in primary care centers was at a lower level compared with secondary or tertiary care centers. The importance of guideline adherence increases as patients age, and complex diseases and comorbidity arise. Appropriate resources and interventions, taking important factors for nonadherence in account, are necessary to improve guideline adoption and adherence in every level of the chain. This in turn should improve patient outcome.
Multislice CT enteroclysis in the diagnosis of bowel endometriosis. This prospective study aims to evaluate the efficacy of multislice computed tomography combined with colon distension by water enteroclysis (MSCTe) in determining the presence and depth of bowel endometriotic lesions. Ninety-eight women with symptoms suggestive of colorectal endometriosis underwent MSCTe; locations, number of nodule/s, size of the nodule/s and depth of bowel wall infiltration were determined. Independently from the findings of MSCTe, all women underwent laparoscopy. MSCTe findings were compared with surgical and histological results. Abnormal findings suggestive of bowel endometriotic nodules were detected by MSCTe in 75 of the 76 patients with bowel endometriosis. MSCTe identified 110 (94.8%) of the 116 bowel endometriotic nodules removed at surgery; 6 nodules missed at MSCTe were located on the rectum. MSCTe correctly determined the degree of infiltration of the bowel wall in all of the 34 serosal bowel nodules identified at MSCTe. In six nodules reaching the submucosa, the depth of infiltration was underestimated by MSCTe. MSCTe had a sensitivity of 98.7%, a specificity of 100%, a positive predictive value of 100% and a negative predictive value of 95.7% in identifying women with bowel endometriosis. MSCTe is effective in determining the presence and depth of bowel endometriotic lesions.
Laterna magica Laterna magica may refer to: Laterna Magika, a theater in Prague Laterna Magica (book), by Ingmar Bergman Laterna Magica (composition), a composition by Kaija Saariaho See also Magic Lantern (disambiguation)
. So, towards the end of wavelet us, we have to understand uh the following that there is a resolution that is happening at different scales right and there is a resolution in time. And what about in the frequency is a resolution the same in frequency right, I mean imagine I have have a short burst of a pulse right. And I can measure the the burst or I can measure some event in the a of the signal in and the variance of the signal in in in in time and some statistical properties of the signal in time, and can I have the same sort of resolution that I can get in the frequency domain. So, this is one of the questions that one would naturally think about. So, fortunately for us somebody did investigation on this time frequency uncertainty principle. This follows a kin to the the position momentum uncertainty Heisenberg's uncertainty principle that we are aware in quantum mechanics right. And the same sort of idea is exists actually in in in when we look at time frequency uncertainty in signal processing. And there is a more deeper theory using operators in mathematics and will not get there ok. So, let us begin consider a finite energy signal right. If it is a finite energy signal which means integral minus infinity to plus infinity, I mean you can put any range for this, I mean this is very general, I mean you really will not ideally reach minus infinity and plus infinity, but this is just for pedagogical purposes and if you see some range or you just have to put the appropriate range here in your definite integral. So, this energy is strictly less than infinity . Now, let us assume that the signal is centered around 0 I would say precisely at 0 both in time and frequency, that is it is 0 mean if it is not 0 mean you can always subtract the bias and get it to 0 mean ok. Now, when we think about signals we discussed in the very beginning of module 1, when we looked into signal geometry, that we can think about different kinds of averaging statistics 1 is just a normal time average youre given the samples you compute all these statistics, whether it is mean or the variance or second moment third moment so on and so forth right. You can compute all the moments across the signal or you could do the statistical average right statistical average. So, let us look at the time average time average ok. Now, let us compute the variance in time and frequency by usual time averaging ok. Now since we said we are dealing with 0 mean we can compute the variance in time sigma t square, as integral minus infinity to plus infinity t square mod s of t square dt and there is a normalization factor here, which is the square of the l 2 norm of the signal right. And why should we do this is a question that you might want to ask why should I normalize? And, if we treat the signal as a random signal there should be some distribution over which we have to weigh it right. So, if you take if you fold this norm inside right. So, if you can you can you can basically rewrite this as essentially integral minus infinity to plus infinity t square mod of s of t square dt divided by the l 2 norm . Now can you appreciate that this is like like your density right this is like your like your PDF probability density function, because when you integrate this this this is basically this integrates to 1 right. So, therefore, you can compute a moment a second moment like this ok. Now, we will do this in frequency computing the variance in the frequency domain, we get sigma omega square is integral minus infinity to plus infinity omega square modulus of s of omega square d omega divided by the norm l 2 norm over the spectrum right. Again you can interpret this as a density like what we did earlier right there is no big deal. So, this is also like you can interpret this as ok. So, now, I think we are sort of set with our with our with our problem. Now, you can also think about in the notion of quantum mechanics, you can think about this as position this is momentum and you can think about these operate or these quantities and you are also looking at the variance here right or some other 2 set of quantities. Now, by Parseval's theorem from your undergraduate norm s of t squared l 2 norm of s of t is the same as s of omega square right. Because, if you apply the Fourier transform you are not going to alter the energy in the signal, otherwise it would be the transformation is useless if if you lose the energy right, because of energy conservation property . So, notation wise this is easy for me I can just write it like this, some norm of s square I will get rid of t and omega I am saying norm of s square because it is the same whether it is time or frequency ok. Now, let us consider the following product, which is the variance in time and the variance in frequency I consider this product . This is essentially integral minus infinity plus infinity t square mod s of t square dt times. Now, we can interpret the omega times modulus of s of omega as this quantity, because from duality if you take d by dt of s of t in the frequency domain, it is you are multiplying by g omega right and the modulus will pull the magnitude of j to be one right and you have omega square s of omega square modulus of s of omega square right. So, this is an important step divided by power 4, because you have a norm s square for this term and another norm s square for this term. So, you have a power 4 in the denominator and in this quantity it is basically due to Fourier transform property right take the Fourier, it is j omega right. So, you have this additional jmo this j omega quantity which justifies what we have. So, now, consider integral minus infinity plus infinity modulus of I will say t square times s of t square dt consider this this can be written I can fold the t inside the modulus there is no problem with it. So, I can write this in this form modulus t times s of t square dt. And you can interpret this quantity as the l 2 norm square of t time's s of t ok. See how we are kind of building the the logic right from starting from the variance to interpreting this into the norm. And, similarly integral minus infinity to plus infinity modulus of d by dt s of t square dt can be interpreted as the l 2 norm of the derivative of the signal right, l 2 norm square of the derivative of the signal . Now, we have a product of 2 norms. So, your intuition should tell that there is Cauchy Schwartz somewhere kicking in ok. So, let us apply Cauchy Schwartz inequality . So, the reason states that if you look at the norm of 2 functions, that are possibly complex then the modulus of the in the product square is basically less than or equal to the norm square of the product of the individuals ok. Now, using this we can say and say this is relationship a using A, we can write sigma t square times sigma omega square as a quantity, which is greater than or equal to because now it is existing in product form exactly. So, therefore, the inequality is this way right one over norm of s l 2 norm of s power 4 times I bring the modulus integral minus infinity to plus infinity t times s of t times there is one careful observation, that you have to make where I am bringing in the conjugate of this signal under the hermitian inner product form . Now, this quantity that we have modulus of some integral square so, this is this can be a complex quantity. So, we can simplify this little carefully. So, this is one over the norm of s power 4 times I can write the absolute value of the real part of integral t times s of t times d by dt of s of t bar dt square why? Because, you know for complex numbers modulus of real of z is certainly less than or equal 2 modulus of z right. This is a straight forward result. So, you take just for a cross check 3 plus 4 j is that vector the length is 5, then the real is 3 and when the complex part is 0 then it coincides with equality. So, you you have this relationship . Now, real part of some complex quantity z can be written as one half z plus z conjugate, this is a straight forward result . Now consider the real part of this integral minus infinity to plus infinity t times s of t times derivative of the signal conjugate dt right . I can write this as 1 half I will pull the t factor outside because it is just a scalar it is time variable it is a scalar right . So, we can write it as s of t times derivative of s bar of t plus s bar of t derivative of s of t right using this this room using this step one half of of z plus z conjugate I just did that yeah right. So, I just take this as my z here I just conjugate it I will know I will come to the point I am just yeah I need the integration there yes a real part . So, I just have t times I just I am looking at this term here I am just rewriting this thing here and I just have to put if you are ok with I am just focusing on this term just the argument of the of the integral ok . Now, let us focus on the term within the integral let us focus on the term within the integral . So, this is basically I would say term within the integral is basically half t times d by dt of modulus of s of t square why? Because, you can write modulus of s of t is s of t is power of t now you take the derivative using chain rule and it automatically comes ok. So, therefore, sigma t square times sigma omega square is greater than or equal to now I have to square this quantity right if it is one-fourth, I have a norm s power 4 and then have an absolute value here then this integral minus infinity to plus infinity t times d by dt of modulus of s of t square dt . Now, still it looks complicated let us consider integral minus infinity to plus infinity t times derivative of modulus of s of t square dt and perform integration by parts right. We have the familiar this is what I recall from my high school I late this is a inverse function logarithmic. So, on and. So, forth right you you use that last is exponential. So, you apply this rule integration by parts . So, what we get is t times s of t square minus infinity to plus infinity minus integral, because I take the derivative I integrate that I get this and then I take a differentiate time, then I get one there right first function integral or second function minus integral of second function derivative of the first function ok. Now, this quantity goes to 0 and this is basically interpretable as negative norm of s square . Therefore, sigma t square times sigma omega square is greater than or equal to 1 upon 4 times minus norm s square and if you square this quantity because I have that modulus of that integral square is what I have. So, this is basically just 1 by 4, because norm s power 4 and norm s power 4 cancel in the numerator and denominator right. It is a very interesting result, I mean it is a very interesting result that you look at the variance in time and the variance in frequency and and that is lower bounded by 1 upon 4 take any signal take any signal any s of t. It is at least this much that you will live with your uncertainty in your measurement in time and your measurement in in frequency, it is a very very profound ah profound result and this result was proved by no less than the Nobel prize winner Dennis Gabor who is the father of holography. So, let us say the roots this this is originally proved by Dennis Gabor in 1946 and of course, Dennis Gabor was great in many areas including in signal processing the signal processing result, but of course, he is a Father of Holography . So, now we have a very important principle uncertainty inequality or uncertainty principle in signal processing, that we cannot simultaneously localize in time and frequency no matter what? So, a follow up question arises when does this equation when when is the inequality is satisfied with equality or when is the equality satisfied, when can we get this actual limit of 1 by 4. So, for this we asked the next question when can we achieve equality that is sigma t square, sigma w square, sigma omega square, equals one-fourth we need to I need to get to this lower bound . Now fortunately we have a solution from Cauchy Schwartz again that we are comfortable, we can say it happens when t times s of t is some constant k times derivative of s of t and I assume at the moment I just will remove the conjugation here and I will just assume s of t assuming real signals. Now the k is this factor right I mean when this k times the derivative of s of t, then this is equal the inequality becomes a equality right. Now, we have a differential equation here. So, let us group the terms and integrate both sides . So, how we do this we say derivative of s of t by s of t is t upon k times dt and then I need to do an integration on both the sides ok So, if I integrate I get log s of t is t square upon 2 times k plus some constant of integration . Now, s of t is of the form e power t square upon 2 k plus some constant, which is if you write it carefully it is e power times c times e power t square upon 2 k let me call this as some constant a times e power t square upon 2 k well we have done the integration, but let us see if things are making physical sense for us right. So, if you recall in the very beginning I said let us consider finite energy signals. Now I have a solution s of t is of this one a times e power t square by 2 k and if you if you let k to be a positive constant the energy in s of t would be infinite potentially it could be infinite right. So, therefore, if s of t is to be a finite energy signal, then k must be a negative real number ok. So, therefore, let b equals minus k right let b is some negative k. So, if I did that then s of t is some a times e power minus t square by 2 b . Now, this is easy for us to think about because this is like has the form of a Gaussian pulse, you are not making it a distribution I mean if you if you want if you can choose a to be one upon root of 2 pi b, then it becomes like a distribution t degrades to one otherwise this is just a Gaussian pulse . Now, this basically led to Gabor transformations. So, this is form this form led to Gabor transforms I mean I am not going to deal with Gabor Gabor transforms, I am not going to deal with Gabor's Gabor's transforms, if we were to go people to go into into more details of time frequency analysis we would start possibly with this as our first step and then go into the details ok. So, but and you can also appreciate ah why you think about the Fourier transform of a Gaussian pulse why this has the same, shape? And Gaussian has very interesting consequences one of this is this uncertainty relationship, the Gaussian PDF has the maximum uncertainty. If you if you look at the differential entropy right and evaluate this for the Gaussian PDF it gives you the maximum uncertainty right. And that is the reasons why you look people look into Gaussian PDFs you know when they are in their study of signals with noise and particularly noise having Gaussian PDF. And Gaussian PDF again comes from your central limit theorem results. So, somehow whether it is consequential or it just nature is providing you that way it is just there there are a lot of very interesting properties with Gaussian, whether it is distribution or a pulse or a transform or whatever it is and you see this again and again in signal processing and information theory ok. So, we will so, we will we will stop at this stage I think this is something which you have to really understand. And, before we conclude I would sort of give you a homework problem to ponder ponder on how the time frequency uncertainty principle applies, in the context of wavelet decomposition at different scales . So, we have studied the wavelet decomposition and reconstruction. So, at every stage of wavelet decomposition we have a certain resolution right, it is a time resolution. Now think about if this transformation can meet this this bound or how close or how far away is it from the uncertainty principle, if you were to do localization through wavelet us ok this is something to think about this may or may not appear on the exam, but this is a hint for you to think through this homework exercise. So, we will stop here and we can go to questions ok.
Lee In (volleyball) Lee In (born 22 August 1952) is a South Korean former volleyball player who competed in the 1976 Summer Olympics. References Category:1952 births Category:Living people Category:South Korean men's volleyball players Category:Olympic volleyball players of South Korea Category:Volleyball players at the 1976 Summer Olympics Category:Asian Games medalists in volleyball Category:Volleyball players at the 1974 Asian Games Category:Volleyball players at the 1978 Asian Games Category:Medalists at the 1974 Asian Games Category:Medalists at the 1978 Asian Games Category:Asian Games gold medalists for South Korea Category:Asian Games silver medalists for South Korea
Q: The Bar Is Rising What does "the bar is rising" mean in this sentence? "The Bar Is Rising on Sustainability Leadership." (https://corpgov.law.harvard.edu/2013/02/06/the-bar-is-rising-on-sustainability-leadership/) Thanks in advance for your help. A: TFD idiom set the bar (high/low) To establish an expected, required, or desired standard of quality. (Often said of a standard that is constrictive in being either too low or too high). As in: "The Bar Is Rising on Sustainability Leadership." aka: ... sustainable leadership is becoming harder to achieve
Q: R: Export CSV with dates from getSymbols(), "quantmod" package I feel that I am possibly not understanding a table type. I'm pulling data using the package "quantmod" and function getSymbols("AAPL", src = "yahoo"). The data shows up in my grid and is usable within R. I'm trying to export via write.csv(), but the dates are turned into ascending numbers (1,2,3,...). Is there a way to export the date as well when it is a record name? This is what I'm using: write.csv(AAPL, "C:/Users/Desktop/AAPL.csv", row.names = TRUE) R shows: Date - Price CSV in excel shows: 1 - Price Any help is much appreciated! A: So when you import the data for AAPL it has dates in rownames thats why when you try to export it, it doesnt include the date. USE THIS getSymbols("AAPL", src = "yahoo") After importing use the code below and then export x: x<-data.frame(AAPL) x$date<-rownames(x) rownames(x)<-NULL
Author Topic: Adobe XD Repeat Grid Feature (Read 1530 times) today I found a really cool feature in Adobe XD, they call it "repeat grid". It is really easy to create grid based layouts, and I want have it in Scribus too. Check out the demo video: https://www.youtube.com/watch?v=42VCB42TKp4 I'm not sure how useful it would be in Scribus - I can't think of many use cases off the top of my head: catalogues; yearbooks; that's about it - but anything that makes tables easier to use would be a bonus. I don't use tables as they aren't very well implemented (as of 1.4.6) but if they worked better I might start to do so. On a related note, dragging the margins to resize them looks like a nice feature and could be something that might be useful in multi-column text frames to resize the gap between columns. Not very high-priority though. Maybe this will start a good little discussion on what people want from tables in Scribus. Maybe someone has some ideas that are too good to ignore. Maybe I'm out of place here, and I don't wish to discourage creative thought, but I don't want development resources spread thinner chasing after this or that cool but optional feature. Had Scribus more developers and resources, maybe I'd feel different, but in the current reality I'd rather some peripheral capabilities be cut off completely - current but poorly implemented ones. Tables would be my poster child. Better a table be created elsewhere, in a program that does tables really well, and imported, as an image if necessary. As far as I can tell, tables currently are almost unusable in Scribus - and that's OK - I can get a table elsewhere. I like the idea of sticking to a central mission and doing it well. Why can't I create original content externally - in Gimp, Darktable, Inkscape, Krita, and so on, and use Scribus to do what it does really well, to create final printable assemblage? I'd rather Scribus narrow the focus. I agree with pretty much everything you've said CGood, and have said very similar things on this forum. My views in this area are liberally scattered around this forum so I won't repeat them here. Suffice to say that I'm all for adding new features into Scribus as long as they add real value, while at the same time I'd like to see some features removed until they work properly. It would be great if "superfluous" features could be dropped so that the core functionality could be made rock solid. However, there are some practicalities that need to be taken into consideration: 1. The Developers Work For Free As I'm sure most people know, the time and effort that the developers put into Scribus is expended without recompense. Also, the developers work only when they want to and in their own time. This means that there is no leverage that can be applied to the developers so you can't force anything to happen. There's no "boss" that gets to tell them what to do. Try to force a developer to work on something they don't want to and they'll just walk away, to the detriment of the project. This leads on to... 2. People Do What They Like People like to work on things that they enjoy or are interested in. For instance, more people are likely to want to be working on making a game explosion looking cool than making sure that exception trapping and error reporting is bulletproof. It's just human nature; who wants to check that all zero-division possibilities have been covered when you can work on adding a new cool feature? This leads on to... 3. Work Done Has Weight When someone has put time and effort into something, they have given part of themselves to that thing. The thing becomes "infused" with part of their life. Because of this, some developers can get emotionally attached to their creations. Some even refer to the software as their "baby". They can no more remove something from the software than they could take something from their child. This is coupled with... 4. There Are No Usage Statistics There is no way of knowing which parts of Scribus are actually being used and therefore no way of knowing which parts can be "safely" removed. To put it another way, for every person saying "I want this removed" there will be another saying "Hey, I was using that". Removing features that people are using will more likely drive people away from Scribus even if - in the long run - it is the "right" thing to do (whatever "right" means). This is also coupled with... 5. Most Users Like Simplicity I think it would be safe to say that most Scribus users are not technically proficient with all aspects of computers. Most people just want to put a quick document together, and they don't have the time/patience/experience to learn another application. For instance, Inkscape can create vector art that is far superior to what can be created in Scribus but if someone can't learn how to properly use Inkscape (for whatever reason) then they're going to stick with what Scribus can do. The same goes for GIMP and others. This leads on to... 6. Experts Can Do Their Own Thing If someone knows how to, for instance, use GIMP to create/manipulate an image and then import it into Scribus then they are free to do so. They can bypass the Scribus image tools and use whatever software they're comfortable with. No-one is forcing them to use anything. The same goes for tables, vectors, etc. etc. If an expert doesn't like the way that Scribus does, for example, tables then they can ignore the tools that Scribus gives them and use something else. Non-experts, on the other hand, may not be comfortable using external tools and just want to "get something done" even if it's simplistic. If someone wants more, then they will have to put the effort in to learn more. Summary(?) (Is anyone still reading this?) Anyway, in the past I've suggested adding new features and also suggested that some features should be removed. To take two specific instances, personally I think Scribus could do with a better way of zooming and have given a suggestion of how to do this, while on the other hand I can't think of a reason why Scribus has a "Fish Eye Lens" tool and have suggested removing it. This was all from my own personal point of view and I'm sure that other people have their own. What's best for one person may not be best for another. If the Scribus developers were organised in such a way that they could be assigned roles and goals by some controlling force then I'm sure it would be possible for the core Scribus code to become rock solid while, at the same time, certain peripheral functions could be "side-tracked". However, as it is, the developers do what they want to do and there's nothing anyone can do about it. And there's nothing that should be done about it either. Trying to force volunteers to do something they don't want to do just makes the volunteers walk away and everyone is worse off. (CGood: I'm not suggesting that you'd like to force anything, this is for the general readership.) The developers do - and have done - a fantastic job in getting Scribus where it is today. It's a very important piece of software that's woefully under-supported considering how many people use it. It all comes down to what could be an open source mantra: "If you want to improve something, learn to code and then improve it". As an example, take Martin's excellent work on the Indigo Dock http://forums.scribus.net/index.php/topic,1617.0.html I don't think anyone asked him to do it but he took up the challenge for himself and it's been coming along very nicely indeed. I have my fingers crossed that enough work is done on it that it becomes the new interface for Scribus. That would be a lovely success story. One final note: While I've said that getting developers to work on specifics is pretty much impossible - especially with such a small team as Scribus has - I'm still sure that discussions about how things should work are important. Even if nothing comes of them in the short term, there's a chance that someone looking for a little coding project might find them and have a go at improving things. And if these improvements get into the Scribus code then we all benefit. Hi GarryP, It's clear you've used and thought about Scribus far more than I have. You are right of course that the most scarce resource is the time and attention of the developers. And I don't want to denigrate some developer's creation when I say that this or that feature should get grayed out or commented out... I feel Scribus is very important, a project I want to keep getting better, and a poster child of how open projects can offer things of wide value. It has become the most natural way I put words on paper. I feel like I'm shackled and straightjacketed when I have to try to use "word processors" to work with formatting text and images to go on paper. I don't want to discourage the devs. I don't wanted open the box of pandora about new features. But I agree with you, Scribus has to focus on core features of a DPT instead of become overloaded with a lot of "bonus" features. Scribus has a lot of places which need an improvement. In my eyes UI is the biggest one. But outside of Scribus there are places too. Take a look to the webpage, there is no link to this forum here. However, in my opinion it is necessary to polish Scribus (webpage, user interface, documentation/wiki) to get a bigger community and much more developer or contributors. Garry P, I agree with you when you say: "If you want to improve something, learn to code and then improve it". That was my intention as I started the IndigoDock project. BTW: the dock itself is stable enough for usage. But a general UI polish is still missing. I've already said my piece about features so I won't repeat myself, but... It's all just a matter of getting more good people involved but Desktop Publishing simply isn't "sexy". If someone has some time to spare and they can either use that time to, for example, (a) add a new feature to Blender that will help people model hairs that move independently or (b) make sure that the Scribus spell checker works with the Belgian language, then what are they going to choose to do? As you know, people will spend their own time doing stuff they they enjoy doing, and there's nothing that can - or should - be done about that. As mentioned in another post, if the Scribus website was more eye-catching then maybe there might be more people that would "sign up". If it looks like an enjoyable thing to do then people might want to get more involved. Either that or start dragging people in off the streets! The developers are doing an amazing job but there simply aren't enough of them. It's fantastic that people like yourself are involved and getting stuff done but there's so much work to do. The bug tracker has issues going back a decade or more (and they're not just feature requests, they're actual bugs that stop the software running properly). Anyway, not sure where I was going with this but I agree with what you've said. The project needs more people getting involved. How that's done however, I couldn't really say.
S.L. Benfica (table tennis) Sport Lisboa e Benfica is a semi-professional table tennis team based in Lisbon, Portugal. Benfica play in both the men's and women's national leagues. They play home games at the Estádio da Luz in a 190 m² room equipped with modern table tennis tables. Men's honours Domestic competitions Portuguese Men's Table Tennis League Winners (24): 1945, 1948, 1949, 1950, 1951, 1953, 1954, 1958, 1959, 1960, 1962, 1963, 1964, 1965, 1968, 1969, 1971, 1972, 1973, 1974, 1975, 1982, 1983, 1984 Portuguese Men's Table Tennis Cup Winners (16): 1951, 1953, 1954, 1955, 1959, 1961, 1962, 1963, 1964, 1965, 1970, 1971, 1972, 1973, 1974, 1983 Women's honours Domestic competitions Portuguese Women's Table Tennis League Winners (11): 1951, 1952, 1953, 1954, 1956, 1961, 1962, 1964, 1965, 1966, 1974 Portuguese Women's Table Tennis Cup Winners (2): 1970, 1973 Technical staff and management Current roster Notable internacional athletes Oliveira Ramos (1935–61) Francisco Campas (1936–1960) Júlio Costa (1941–1970) Carlos Galiano (1945–1971) Manuela Jesus (1950–1955) José Louro (1951–1981) Manuel Carvalho (1951–1969) Ana Maria Batista (1951–1965) Teresa Montoya (1953–1962) Alberto Ló (1958–1963) Delfim Soares (1959–1966) João Rui (1961–1981) José Kong (1963–1966) José Alvoeiro (1965–2004) Óscar Lameira (1966–1969) Ana Maria Cruz (1970–1971) José Janeiro (1974–1982) José Rocha (1974–1978) Rogério Alfar (1987–1992) References External links Table tennis Category:Table tennis clubs Category:Sport in Lisbon Category:1935 establishments in Portugal Category:Table tennis in Portugal
Alcohol advertising bans and alcohol abuse. Henry Saffer [Saffer (1991) Journal of Health Economics 10, 65-79] concludes that bans on broadcast advertising for alcoholic beverages reduce total alcohol consumption, motor vehicle fatalities, and cirrhosis deaths. A reexamination of his data and procedures reveals a number of flaws. First, there is evidence of reverse causation: countries with low consumption/death rates tend to adopt advertising bans, creating a (spurious) negative correlation between bans and consumption/death rates. Second, even this correlation largely disappears when the estimates are corrected for serial correlation. Third, estimates based on the components of consumption--spirits, beer and wine--mostly indicate that bans are associated with increased consumption.
The boy quickly scrambled back to his feet & brushed himself off (for what it was worth.) He looked from one face to another jittery. "I..I..I'm sorry sir..ma'am...I..I..I..was just...just..." he stopped.'stealing some food' wouldn't have been a wise choice of words. He chewed his lip & stared at the floor for a few mintues before looking back up. "...If I had asked you would've said 'No'. & I'd have never gotten away..." He grew quiet again."I thought that if I kept quiet you wouldn't even have known I'm here."He stared at the two of them fearfull, awaiting what his sentance would turn out to be. Logged "Every question has a proper answer, every soul has a proper place" "you're a soldier nowfighting in a battle To be free once moreand that's worth fighting for" - Spirit: stallion of the Cimarron The penguin awkwardly rose from the floor. He stood for several minutes as if in a trance, staring into the stowaway's face. He then slowly turned and walked zombie-like up the stairs to the deck of the ship. Then, startlingly, he called out: "BOYS! WE GOT A STOWAWAY! PREPARE THE PLANK!" He grinned and winked in Jenna's direction, then sidled up to her, whispering "Don't worry, lass. We'll be gentle on th' boy." Siren heard the Captain's yell for the men to prepare the plank. She took off at a run, nearly colliding into Jenna. She took a look at the boy, who'd obviously been enjoying the left over food. Siren quirked an eyebrow. "Oh dear. You're going to walk the plank. This will be fun! Oops.. I mean horrible. This is horrible!" Siren frowned, looking mighty concerned. "Don't worry, little one. It'll be okay." Logged Tell me, Lucifer Morningstar.. Ask yourselves, all of you... What power would Hell have if those here imprisoned were not able to dream of Heaven? - Morpheus The boy was obviously horrified by his current predicament. He shook his head vigorously."No sir! Please! I'm sorry! I'm sorry! I didn't mean to stowaway!! Please!! I'll...I'll...I'll try to make it up!! Just please sir!"He was shaking like a leaf Logged "Every question has a proper answer, every soul has a proper place" "you're a soldier nowfighting in a battle To be free once moreand that's worth fighting for" - Spirit: stallion of the Cimarron Jenna glanced at the captain and winked back. "Well, maybe we're being a little too hasty, Cap. Surely there's something on board he can do to make up for it." She looked at how skinny the boy was. She turned her back to the boy and whispered to the Captain, "D'you think he could help Siren in the galley? She could probably use the help, and he could d**n sure use the food."
x) + 14*o(x). 2*x**2 - 4*x Let v(q) = q**3 + 8*q**2 - 1. Let z(l) = -1266*l**3 - 32*l**2 + 4. Determine -4*v(f) - z(f). 1262*f**3 Let c(n) = -7 - 14 - n**2 + 3 + 2*n + 19*n. Let k be c(20). Let u(z) = 16*z - 5*z**3 + k*z**3 - 8*z - 10*z. Let h(x) = -3*x**3 - 3*x. Give -2*h(p) + 3*u(p). -3*p**3 Let h(s) = 12848*s. Let n(y) = 2*y. Calculate -h(m) + 1584*n(m). -9680*m Let y(l) = 70*l**3 - 49*l. Let k be (-2376)/242 + 10 + (-1074)/(-22). Let p(j) = 5*j - 7*j**3 - j**3 + 2*j**3 - j**3. Calculate k*p(c) + 5*y(c). 7*c**3 Let g(l) = 3*l - 8*l + 0*l. Suppose 32*a - 14*a = a - 136. Let k(p) be the first derivative of 3*p**2/2 - 1. What is a*k(t) - 5*g(t)? t Let w(c) = 2*c**2 + 30*c - 635. Let f(h) = 2*h**2 + 37*h - 634. Determine -4*f(r) + 5*w(r). 2*r**2 + 2*r - 639 Let n(c) = -199*c**3 + 12*c**2 - 19*c - 6. Let q(z) = 198*z**3 - 10*z**2 + 16*z + 5. Give -5*n(b) - 6*q(b). -193*b**3 - b Let f(v) = 5*v**3 - 20*v**2 - 5*v - 50. Let q(u) = u**3 - 4*u**2 - u - 10. What is -2*f(c) + 11*q(c)? c**3 - 4*c**2 - c - 10 Let a(y) = -4*y**2 - y**2 - 1 + 3*y**2 + 0*y**2. Suppose 0 = -3*n + 9 - 3. Let c(f) = 80*f**2 - 26*f**2 - 25*f**2 - 30*f**n. Calculate 2*a(j) - 3*c(j). -j**2 - 2 Let w(p) be the second derivative of -7*p**4/12 + p**3/3 - 116*p + 4. Let q(b) = -22*b**2 + 6*b. Determine -2*q(z) + 7*w(z). -5*z**2 + 2*z Suppose -f = 31*m - 26*m - 8, 0 = -f + 2*m - 6. Let d(z) = z**3 - z**2. Let b(p) = -p**3 - 2*p**2 + 11. Determine f*d(u) + b(u). -3*u**3 + 11 Let i(f) = f**2 - 8*f. Let g(p) = -122438*p**2 - 5*p - 10*p - 1 + 122439*p**2. Give -6*g(b) + 11*i(b). 5*b**2 + 2*b + 6 Let p(q) = -7*q + 2. Let t(h) = 19*h + 5. Let a(z) = -4*p(z) - t(z). Let d(w) = 2 + 5 - 4*w - 4 + 3. Determine -6*a(c) - 13*d(c). -2*c Let q(o) = 6*o - 8. Let x(p) = p - 1. Let n(g) = 3*q(g) - 21*x(g). Let l(f) = -f - 1. Let w(j) = -j**2 + 57*j + 178. Let z be w(-3). What is z*n(c) + 5*l(c)? c + 1 Let k(w) = -1. Let d(b) = -37*b**3 - 128*b**2 + 11*b - 1. Let h(m) = 13*m**3 + 45*m**2 - 4*m. Let x(y) = 6*d(y) + 17*h(y). Calculate 6*k(l) - x(l). l**3 + 3*l**2 + 2*l Let c(h) = 50*h**3 + 42*h**2 + 19*h + 5. Let m(t) = 49*t**3 + 41*t**2 + 23*t + 6. Calculate 6*c(o) - 5*m(o). 55*o**3 + 47*o**2 - o Let o(r) = -5 - 2 + 1 + 7 - 23*r**2 - r + 16*r**2 - 2. Suppose -4*t = -1 - 7. Let c(k) = -6*k**2 - 1 + 2*k - 3*k + 2*k**t. What is -5*c(a) + 3*o(a)? -a**2 + 2*a + 2 Let m(t) be the first derivative of -8*t**4 - 5*t**3/3 + t**2 + 2587. Let g(c) = 11*c**3 + 2*c**2 - c. What is -8*g(j) - 3*m(j)? 8*j**3 - j**2 + 2*j Let s(x) = 2*x + 19. Let c(j) = 3095*j - 6185*j - 38 + 3087*j. Give -4*c(m) - 7*s(m). -2*m + 19 Let w(s) = 32*s - 43. Let y(g) = 67*g - 93. Give -9*w(x) + 4*y(x). -20*x + 15 Let n = 245 - 107. Let o = n - 127. Let d(m) = 10*m**3 + 11*m**2 + 11*m - 30. Let l(r) = 2*r**3 + 2*r**2 + 2*r - 6. What is o*l(t) - 2*d(t)? 2*t**3 - 6 Let f(b) = -371*b**2 + 168*b + 21. Let v(z) = -185*z**2 + 101*z + 12. Calculate -3*f(j) + 5*v(j). 188*j**2 + j - 3 Let o(r) = 525*r**3 + 3*r - 8. Let g(f) = -526*f**3 - 5*f + 12. Calculate -2*g(l) - 3*o(l). -523*l**3 + l Let x(r) be the second derivative of 1/6*r**4 - 5/6*r**3 + 3*r + 0 - 2*r**2. Let g = 2052 - 2041. Let y(n) = -5*n**2 + 14*n + 11. Give g*x(a) + 4*y(a). 2*a**2 + a Let a(b) = 26*b**2 - 3360*b + 18. Let c(h) = -10*h**2 + 1119*h - 7. What is 3*a(r) + 8*c(r)? -2*r**2 - 1128*r - 2 Let i be 312/(-195)*(-10)/(-8). Let f = -2 + 5. Let a(r) = 6 + r + r - f - 2. Let v(b) = -b. What is i*a(q) - 5*v(q)? q - 2 Suppose 2*g + 678 = -g + 702. Let u(k) = -11*k**3 + 15*k**2 - 8*k - 1. Let y(j) = 7*j**3 - 10*j**2 + 5*j + 1. What is g*y(v) + 5*u(v)? v**3 - 5*v**2 + 3 Let s(b) = 3*b + b + 0*b - 2*b - 2*b**2. Let u(w) be the second derivative of w**5/20 - 3*w**4/4 + 3*w**3/2 + 11*w - 5. Give 9*s(i) - 2*u(i). -2*i**3 Let d(m) = 23*m + 811. Let p(l) = 10*l + 410. What is -4*d(b) + 9*p(b)? -2*b + 446 Let z(b) = 535*b + 73 - 1063*b + 531*b - 74. Let r(k) = k - 1. Let u be r(2). Let q(x) = 1. Give u*q(w) - z(w). -3*w + 2 Let t = 381 - 385. Let l(z) = 2*z**3 - 5*z**2. Let f(a) = a**2. Calculate t*f(v) - l(v). -2*v**3 + v**2 Let h = 29 + -10. Let t = 25 - h. Let w(f) = -5*f**2 + t*f**2 - 8 + f + 8. Let j(o) = 4*o**2 + 2*o + 1. Calculate j(n) - 2*w(n). 2*n**2 + 1 Let q(h) = -4*h**3 + h - 28. Let a(l) = 5*l**3 - l + 23. Let f(u) = -5*a(u) - 4*q(u). Let b(m) = -9*m**3 + m - 2. What is 3*b(r) - 2*f(r)? -9*r**3 + r Let r = -8028 + 8023. Let j(z) = 1. Let d(a) = -2*a**2 + 2*a - 6. What is r*j(o) - d(o)? 2*o**2 - 2*o + 1 Let c(m) = -m**3 + m**2 - 4. Let w(n) = n**3 - 3*n**2 - n + 2. Let k(h) = -6*h**3 + 15*h**2 + 5*h - 11. Let t(v) = k(v) + 5*w(v). Give c(y) - 4*t(y). 3*y**3 + y**2 Let v(s) = 3*s**3 - 6*s**2 - 7*s - 13. Suppose 0*p - 8 = -4*p. Let b(n) = -313 - 2*n + 2*n**3 + 156 - p*n**2 - n**3 + 153. What is -7*b(z) + 2*v(z)? -z**3 + 2*z**2 + 2 Let p(j) = 6*j**2 + 212*j + 6. Let k(m) = -4*m**2 - 213*m - 8. Determine 3*k(w) + 4*p(w). 12*w**2 + 209*w Let k(q) be the second derivative of q**5/4 + q**4/6 - 7*q**3/6 - 5*q**2/2 + 577*q + 2. Let b(n) = -3*n**3 - n**2 + 4*n + 2. What is 7*b(w) + 4*k(w)? -w**3 + w**2 - 6 Let v(j) = 1295225263*j**2 - 571564*j + 285782. Let g(i) = -40790*i**2 + 18*i - 9. Give 285782*g(u) + 9*v(u). -20413*u**2 Let g(f) = 6*f**2 - f + 5. Let t(r) = 12*r**2 - 2*r + 9. Let k(a) = -5*g(a) + 3*t(a). Let v(m) = -m**2 + m + 1. What is k(h) - 2*v(h)? 8*h**2 - 3*h Let l(h) = -4*h + 2. Let c = 13106 - 13110. Let a(d) = 4*d - 2. Determine c*a(n) - 5*l(n). 4*n - 2 Let z(j) = -726*j**2 + 88*j - 88. Let v(f) = 25*f**2 - 3*f + 3. Let l = -1545 + 1542. What is l*z(i) - 88*v(i)? -22*i**2 Let n(v) = -9*v**2 - 5. Let f(d) = -10*d**2 - 6. Suppose l - 2*x - 411 = 0, 0 = 9*l - 4*l + 4*x - 2111. Suppose 426*p = l*p + 35. Determine p*f(m) - 6*n(m). 4*m**2 Suppose 91*s - 1976 = 502*s + 83*s. Let b(m) = m**2 - 5*m + 8. Let q(n) = -4*n + 7. Give s*q(u) + 3*b(u). 3*u**2 + u - 4 Let v(j) be the first derivative of -7*j**4/4 - 2*j**3/3 + 5*j**2/2 + 3*j + 62. Let c(n) = -10*n**3 - 3*n**2 + 7*n + 5. What is -5*c(l) + 7*v(l)? l**3 + l**2 - 4 Let g be (-11)/(110/(-20)) - 4 - -3. Let o(v) = -1. Let x(c) = -18*c + 15. What is g*x(l) + 15*o(l)? -18*l Let x(s) = 7*s - 5872. Let q(t) = -2*t + 1472. Determine 22*q(o) + 6*x(o). -2*o - 2848 Let f(c) = c. Let g(q) = -5*q + 1. Let o(p) = p**3 + 15*p**2 + 54*p + 215. Let r be o(-12). Give r*g(b) + 6*f(b). 11*b - 1 Let d be (-5)/((-5)/(-4))*-5. Suppose -d = 15*i + 10. Let l(v) = 15*v**2 - 4. Let o(a) = -4*a**2 + 1. Determine i*l(p) - 9*o(p). 6*p**2 - 1 Let b(a) = -4326*a**3 - 4*a - 9. Let i(r) = -4338*r**3 - 3*r - 6. Give 2*b(w) - 3*i(w). 4362*w**3 + w Let i(z) = -z**3 + 4*z**2 - z + 1. Let n(m) = 6*m**3 - 20*m**2 + 5*m + 2507. What is -5*i(r) - n(r)? -r**3 - 2512 Let t(o) = o**2. Suppose -3757 = -16*z - 3741. Let q(i) = -4*i**2 + 2*i. What is z*q(u) + 6*t(u)? 2*u**2 + 2*u Let n(w) = -7 + 25*w - 3 + 19 + 40*w**2 + 16. Let b be 2 + -3 + 8/2. Let h(l) = -5*l**2 - 3*l - 3. Determine b*n(g) + 25*h(g). -5*g**2 Let c(u) = -8*u**3 + 12*u**2 + 21*u + 4. Let n(w) = -25*w**3 + 39*w**2 + 62*w + 13. Determine -13*c(q) + 4*n(q). 4*q**3 - 25*q Let k(f) = -6*f**3 + 4*f**2 + 30*f + 1205. Let u(v) = 2*v**3 - v**2 - 9*v - 402. Determine -3*k(a) - 10*u(a). -2*a**3 - 2*a**2 + 405 Let q(o) = -7*o + 3. Suppose -5*n + 48 = -3*n. Suppose -20*d + n*d = -20. Let c(u) = 6*u - 3. Determine d*q(g) - 6*c(g). -g + 3 Let p(v) be the third derivative of -v**4/24 - v**3/6 + 9*v**2. Let r be 63/(-14)*(1 + 3). Let s = 17 + r. Let d(a) = -7*a - 4. Calculate s*d(q) + 5*p(q). 2*q - 1 Let o(k) = -70*k - 136. Let f(g) = -24*g - 47. Determine 17*f(p) - 6*o(p). 12*p + 17 Let l(g) = -13*g + 1315. Let r be l(102). Let i(k) = 3*k + 1. Let s(o) = -o. Let m(c) = 10*c + 5. Let w(v) = -m(v) + 5*s(v). Give r*i(j) - 2*w(j). -3*j - 1 Let d(p) = -17*p**3 + 26*p**2 - 6*p + 16. Let v(u) = -8*u**3 + 13*u**2 - 2*u + 7. Determine 2*d(b) - 5*v(b). 6*b**3 - 13*b**2 - 2*b - 3 Let d(z) = z**3 + 2*z**2 + 10. Let j(i) = 3*i**2 + 80*i + 476. Let c be j(-9). Let x(p) = -p**2. Determine c*d(v) + x(v). -v**3 - 3*v**2 - 10 Let b(t) = 9*t + 4. Let c = -2 - -6. Suppose -3*f = -0*f - 5*w - 124, -3*f = -w - 104. Let x(l) = 10 - 25 - f*l - l - l. What is c*x(i) + 15*b(i)? -5*i Let h(l) = -l**2 - l - 1. Let d(n) = 2853 + 7*n**2 + 6*n**2 - 2844
Q: Smoothing binary mask with Hamming/Hanning filter I have used MATLAB's built-in "imfreehand" to define a binary mask. Every pixel inside the boundary is set to one and otherwise to zero: h = imfreehand(handles.fig); wait(h); mask = h.creatMask(); Then, I want to dilate the mask with 4 pixels, and finally add a piece of code that makes edges smoother, i.e. the edges of the mask smoothly go from 1 to 0; something like Hamming or Hanning window. How can I do that? A: so if I understand your question correctly, you have a binary mask, output from h.createMask();, and you want to expand the boundary and then, essentially, 'feather' the mask boundary. One way I would accomplish this is, more or less like you suggest, to use imdilate() to dilate the mask by a disk with some appropriate radius (say 4). Though I'm not sure it produce exactly 4 pixels dilation. Then I would perform a conv2() with a small kernel. Which could be constructed from a Hann window as you mention. In code: First, let's produce the mask you are asking about: % test image I = imread('cameraman.tif'); % Read a sample grayscale image % From the OP's Question (suggested edit anyway) fig = figure; hAx = axes(fig); hImg = imshow(I, 'Parent', hAx); h = imfreehand(hAx); wait(h); mask = h.createMask(); Then, we can dilate the mask with imdilate() by creating a larger disk with strel() %dilate radius of mask by 4 maskExpanded = imdilate(mask, strel('disk', 4)); Finally, we can make a 2D kernel from the hann() window and convolve our dilated mask. The number of points you use for the hann() window controls the amount of feathering. That is, you can increase the feathering by using 20 instead of 10. %hann kernal hannWindow = hann(10); %10px % Convert window into 2 dimensions by outer product. hannKernel = hannWindow * hannWindow'; % Make the kernel sum to 1 hannKernel = hannKernel ./ sum(hannKernel(:)); % Now Apply Smoothing to the enlarged mask maskSmoothed = conv2(maskExpanded,hannKernel,'same'); For the sake of completeness, you can view the effects with the following: %View f2 = figure; f2.Position(3) = 2*f2.Position(3); %twice as wide f2.Position(1) = f2.Position(1) - f2.Position(3)/2; f2.Position(4) = 2.1*f2.Position(4); %twice as wide f2.Position(2) = f2.Position(2) - f2.Position(4)/2; %axes ax1 = subplot(2,2,1); ax2 = subplot(2,2,2); ax3 = subplot(2,2,3); ax4 = subplot(2,2,4); %plots surf(hannKernel, 'parent', ax1); imshow(maskExpanded,'parent', ax2); imshow(maskSmoothed,'parent', ax3); imshow(maskSmoothed-mask,'parent', ax4); %titles title(ax1,'Hann kernel 3d representation'); title(ax2,'Expanded Mask'); title(ax3,'Expanded Mask with convolution'); title(ax4,{'Effect of expansion & convolution';'(difference from original)'}); For me, this creates the following figures: I would guess there are many ways to do this, but I hope my solution helps.
Q: Why is -(int) int being any int value ,an r-value? #include<stdio.h> int main() { int i = 10; printf("%d", ++(-i)); return 0; } This is obviously an Compilation Error as post(pre)increment/decrement take l-values. So in this case -i is r-value BUT how and why? A: The preincrement operator ++ (and other similar operators) requires an lvalue, which is an expression that not only has a type/value but also refers to an object. Roughly speaking, lvalues are things you could put on the left hand side of the = operator (but there are some exceptions) or put after the & (address-of) operator (but there are some exceptions here too). The term rvalue is slang (not defined by the language standard) for expressions which are not lvalues. In the case of -i, i is an object, but there is no object -i; -i is just the resulting value from negating the value of i. Assigning something to -i is not possible because there is no object/storage it refers to.
Small bowel bypass prevents the trophic action of cholecystokinin on the rat pancreas. The effect of a chronic administration of cholecystokinin (CCK) on the rat pancreas has been studied in rats subjected to a 90% jejunoileal bypass or an intestinal transection (controls). Jejunoileal bypass, when compared to transection, did not modify the size of the pancreas but decreased its enzyme content, especially for amylase, and reduced the number of zymogen granules. These structural and biochemical changes were maintained when bypassed animals were treated three times daily and for six days with cholecystokinin (20 Ivy Dog Units (IDU)/kg). In contrast, CCK treatment in transected animals induced growth of the pancreas due to cellular hypertrophy and hyperplasia; pancreatic enzyme content, especially for chymotrypsin, and the population of zymogen granules in acinar cells were also enhanced. It is concluded that jejunoileal bypass prevents the trophic action of chronic CCK on the pancreas.
Design and in vitro evaluation of doxycycline hyclate niosomes as a potential ocular delivery system. Niosomes have been considered as promising nanoscale carriers for ocular drug delivery, since they have been shown to increase the bioavailability of various drugs and to improve their efficacy. The main objective of this study was to prepare and characterize niosomes for ocular delivery of doxycycline hyclate. Niosomes were prepared using various surfactants (namely Span 20, Span 60, Span 80, Tween 60) and cholesterol in different molar ratios, using the thin film hydration method followed by multiple membrane extrusion or the reverse-phase evaporation method. In our hands highest entrapment efficiency was encountered with the formulation composed of Span 60 and cholesterol, prepared by the reverse phase evaporation method. Transmission electron microscopy and dynamic light scattering were used to assess the morphology, size and size distribution paterns of prepared niosomes. In vitro release studies showed sustained release of doxycycline from niosomes. After 2 months of storage at 4 °C the doxycycline-loaded niosomes remained physically stable in terms of encapsulation efficiency and particle size. The performed Draize test revealed that the prepared niosomes were well tolerated by the eye. Taken together our findings indicate that niosomes could be considered as a plausible drug delivery platform for for ophthalmic application of doxycycline.
Biomechanical analysis of supracondylar femoral fractures fixed with modern retrograde intramedullary nails. Several new retrograde supracondylar intramedullary nails have been developed to specifically address fractures of the distal femur. The nails appear clinically effective, but there are few biomechanical data documenting the stability of the fixation or the mechanical stiffness of the different designs. The goal of this study was to assess the torsional and bending stiffness of four designs of intramedullary nails developed for this application. Four nail designs were tested in torsion and bending to determine system stiffness: Ace supracondylar, Richards "five hole" and "multi-hole" supracondylar, and Biomet retrograde. The nails were inserted into cadaveric femurs in which a one-centimeter distraction osteotomy had been created seven centimeters proximal to the condyles. The constructs were then tested on an Instron biaxial testing system. There were no statistically significant differences in bending stiffness among the groups of nails (range 0.79 to 1.18 newtons/meter; p > 0.1). However, the Ace nails (1.10 newtonmeters/degree) did exhibit a statistically lower torsional stiffness compared with the other nails (2.20 to 2.21 newton-meters/ degree; p < 0. 1). No differences were noted as a function of the number of locking holes. The bending stiffness of four currently available designs of retrograde intramedullary nails does not appear to be dependent on design variations. The torsional stiffness did vary among the four designs, but this was not determined by the number of fixation holes provided. It appears that a well-placed retrograde supracondylar nail of modern design should have sufficient stiffness to support the femur and provide stability during fracture healing.
On December 14 during a road game versus the Minnesota Timberwolves, Kobe Bryant made a pair of free throws to give him 32,293 career points, moving past Michael Jordan to place him 3rd on the NBA All-time scoring list trailing only Karl Malone ( 2nd ) 36,928 and Kareem Abdul-Jabbar ( No.1) with 38,387 points. In a brief ceremonious event, Kobe was congratulated by players from both the Lakers and Timberwolves. He was awarded the game ball and appeared to be very humble and thankful for the recognition. The attention leading up to this moment has been covered extensively by major sports media outlets, and while Kobe is considered one of the greatest players in the current era, the Lakers have been on a downslope for the past few seasons and are among the worst teams in the Western Conference, however, an overtime win versus the Spurs has helped raised the confidence of the team. Ironically, Kobe has surpassed the one player he patterned most of his game, style, and competitive nature after– (Michael Jordan), a player whose name continues to resonate with NBA stars and aspiring basketball players around the world. The only question left for Kobe is whether he can stay healthy long enough to chase the No.2 spot on the NBA All-time scoring list. Laker fans, let’s tip our hats to the Timberwolves fans for giving Kobe a great standing ovation! — Earvin Magic Johnson (@MagicJohnson) December 15, 2014 If healthy, Kobe is capable of scoring close to, if not more than 2,000 points per season, and he should be en route to finishing the season with well over 33,000 points. Meaning he would have to play at least 2-3 more seasons to even come close to surpassing Karl Malone, but were talking about a player with more than enough competitive juice to reach such a goal, therefore, its totally not out of the question. A sixth NBA title has also eluded Kobe as he joins Tim Duncan on the chase to win another ring — tieing Jordan. It takes a special type of player to surpass Michael Jordan on the All-time scoring list, and who better than Kobe Bryant. We’re speaking of a player who has worked hard his entire career to win at the highest level possible. There may not be a ton a positive talk about the Lakers as a whole, but when its all said and done, Kobe Bryant will be among the top-5 NBA greatest players of All-time. Will Kobe Bryant reach No.2 on the NBA All-time scoring list? Not a chance! Yes, if healthy View Results
Article content WASAGA BEACH, Ont. — Three suspects are now facing murder charges in the stabbing death of a teenager in Wasaga Beach. Eighteen-year-old Francesco Molinaro died of wounds he suffered during an altercation outside a Pizza Pizza restaurant in the town on May 21. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or Three teen suspects facing murder charges after 18-year-old stabbed to death in Wasaga Beach Back to video Provincial police say 18-year-old Johnathan Landsberg of Whitby, 19-year-old Eric Talbot of Pickering and 18-year-old Austin Zambrano-Peterson of North York have all been charged with second degree murder. The three were scheduled to appear in a Newmarket court on Saturday.
Q: What settings should I set for the Sprint in the Input Manager? This script is attached to Player object: using UnityEngine; using System.Collections; [RequireComponent (typeof (Rigidbody))] [RequireComponent (typeof (BoxCollider))] public class PlayerController : MonoBehaviour { public float walkSpeed = 6; public float runSpeed = 10; public float strafeSpeed = 5; public float gravity = 20; public float jumpHeight = 2; public bool canJump = true; private bool isRunning = false; private bool isGrounded = false; public bool IsRunning { get { return isRunning; } } void Awake () { GetComponent<Rigidbody>().freezeRotation = true; GetComponent<Rigidbody>().useGravity = false; } void FixedUpdate () { // get correct speed float forwardAndBackSpeed = walkSpeed; // if running, set run speed if (isRunning) { forwardAndBackSpeed = runSpeed; } // calculate how fast it should be moving Vector3 targetVelocity = new Vector3(Input.GetAxis("Horizontal") * strafeSpeed, 0, Input.GetAxis("Vertical") * forwardAndBackSpeed); targetVelocity = transform.TransformDirection(targetVelocity); // apply a force that attempts to reach our target velocity Vector3 velocity = GetComponent<Rigidbody>().velocity; Vector3 velocityChange = (targetVelocity - velocity); velocityChange.y = 0; GetComponent<Rigidbody>().AddForce(velocityChange, ForceMode.VelocityChange); // jump if (canJump && isGrounded && Input.GetButton("Jump")) { GetComponent<Rigidbody>().velocity = new Vector3(velocity.x, Mathf.Sqrt(2 * jumpHeight * gravity), velocity.z); isGrounded = false; } // apply gravity GetComponent<Rigidbody>().AddForce(new Vector3 (0, -gravity * GetComponent<Rigidbody>().mass, 0)); } void Update() { // check if the player is touching a surface below them checkGrounded(); // check if the player is running if (isGrounded && Input.GetButtonDown("Sprint")) { isRunning = true; } // check if the player stops running if (Input.GetButtonUp("Sprint")) { isRunning = false; } } void checkGrounded() { /* ============== * REMEMBER * ============== * If you change the size of the prefab, you may have * to change the length of the ray to ensure it hits * the ground. * * All obstacles/walls/floors must have rigidbodies * attached to them. If not, Unity physics may get * confused and the player can jump really high * when in a corner between 2 walls for example. */ float rayLength = 0.7f; RaycastHit hit; Ray ray = new Ray(transform.position, -transform.up); //Debug.DrawRay(ray.origin, ray.direction * rayLength); // if there is something directly below the player if (Physics.Raycast(ray, out hit, rayLength)) { isGrounded = true; } } } There are some parts in the script it's using "Sprint" For example: // check if the player is running if (isGrounded && Input.GetButtonDown("Sprint")) { isRunning = true; } // check if the player stops running if (Input.GetButtonUp("Sprint")) { isRunning = false; } But "Sprint" is not defined in the editor input: Edit > Project Settings > Input: I can change the size in the Input Manager to 19 and it will duplicate the Cancel so I changed the name to Sprint. But what should be the config for the Sprint ? It's now the Cancel config. Config I mean the settings for each property. When running the game before added the Sprint I'm getting this exception: ArgumentException: Input Button Sprint is not setup. To change the input settings use: Edit -> Project Settings -> Input PlayerController.Update () (at Assets/My Scripts/Character1/PlayerController.cs:62) My question is what settings should I set for the Sprint in the Input Manager ? A: I'm not sure you can use key combinations as input, so you may need to set up two buttons and then check for a GetButton on the shift during a GetButtonDown on the W. Input manager configuration: Sprint Positive Button: w Shift Positive Button: left shift Alt Positive Button: right shift That will allow either shift to be used. If you don't want that, leave the Alt Positive Button blank. Negative buttons and other alt buttons can be left blank. All the other settings should be fine. Then your code would look something like this: if (isGrounded && Input.GetButton("Shift") && Input.GetButtonDown("Sprint")) { isRunning = true; } if (Input.GetButtonUp("Shift") || Input.GetButtonUp("Sprint")) { isRunning = false; } Or, as @DMGregory pointed out, the code can be simplified to one line: isRunning = isGrounded && Input.GetButton("Shift"); This has slightly different behavior, since it triggers when holding w first and then beginning to hold shift, whereas the first code example only triggers when you hold shift first. I don't know exactly what controls you want, but the second code example is probably better. Edit It turns out I was overthinking this. You already have W assigned to your Vertical axis, which you are using. Just have isRunning equal the state of the shift key. //Sprint // Positive Button: left shift // Alt Positive Button: right shift isRunning = GetButton("Sprint");
The long-term objectives of our research program are to clarify the central mechanisms underlying acute and chronic craniofacial pain and its control. Our recent NIH-supported research has resulted in major new insights into the neuroplasticity of the trigeminal (V) brainstem complex, and into brainstem mechanisms underlying deep (e.g. muscle; and temporomandibular joint, TMJ) as well as cutaneous (facial) pain. These latter studies, carried out in subnucleus caudalis since it has been particularly implicated in orofacial pain mechanisms, have suggested mechanisms that may be involved in signaling pain and in its spread and referral and that may be manifested in pathophysiological situations such as temporomandibular/myofascial pain dysfunction and inflammation. To clarify these mechanisms further, we will first address hypotheses that A: Caudalis neurons receiving deep as well as cutaneous nociceptive afferent inputs project directly to the posterior thalamus and/or parabrachial area, PBA; B: Application of an inflammatory irritant to masticatory muscle( masseter and tongue muscles) or temporomandibular (TM) region enhances the peripherally evoked responses to cutaneous or deep stimuli of caudalis nociceptive neurons; block of C-fiber afferents markedly diminishes this enhancement; and C: Descending modulatory influences from the periaqueductal gray (PAG) and rostroventral medulla (RVM) can depress the peripherally evoked responses to deep as well as cutaneous stimuli of caudalis nociceptive neurons; local anesthesia or lesioning of RVM can diminish the depressive effects of PAG stimulation. Electrophysiological recordings will be made from functionally identified brainstem nociceptive and nonnociceptive neurons in subnucleus caudalis of rats to determine if neurons receiving deep nociceptive afferent inputs project to regions implicated in more central processing of pain and if these neurons' activity can be modulated by TM and muscle afferents excited by irritant substances and by central modulatory influences implicated in the control of pain. Since neural alterations associated with injury and inflammation may be involved in several craniofacial pain conditions including temporomandibular/ myofascial pain dysfunction, the information gained from this research will provide a better understanding of acute and chronic craniofacial pains and their control.
Slideshow ( 3 images ) LONDON (Reuters) - Sony Music said two of its catering staff had been involved in a violent altercation at its UK head office in central London on Friday after police reported two people had been stabbed. Armed officers rushed to the Sony office after police were alerted to the incident in Derry Street, Kensington, where they found two men suffering from stab injuries. London’s Metropolitan Police said the incident was not being treated as terrorism and Sony later confirmed that it had followed an argument among staff. “Two members of the catering team were involved in a violent altercation,” Sony Music said in a statement. “The incident is now in the hands of the Metropolitan Police.” Police, who evacuated the offices as a precaution, said the two men had been arrested on suspicion of causing grievous bodily harm. They were both been taken to hospital with non-life threatening injuries. The London Evening Standard newspaper said witnesses reported that it appeared a fight had broken out between two men in the staff canteen. “There was a lot of shouting and commotion,” an unnamed witness told the paper. “One had fallen over and was on his back and the other was standing over him. I thought he was raining punches down, but then I saw the knife.”
PSALM FIFTY FIVE THE WAY OF ESCAPE. (THE EKBASIS.) 1 Corinthians 10:13. "There hath no temptation taken you but such as is common to man, but God is faithful, who will not suffer you to be tempted above that ye are able, but will with the temptation also make a WAY OF ESCAPE, that ye may be able to bear it." Here is the God given way of escape. God does not test us to break us, but to make us. He wants us to come out of the experience stronger than we went into it. This principle is very helpful to us when we consider this psalm. David was very upset and he commences the song without revealing what is behind it. In the middle, however, he exclaims, "It was not an enemy that reproached me, then I could have borne it; neither was it he that hated me that magnified himself against me - then I would have hid myself from him; but it was thou, a man, mine equal, my guide, mine acquaintance; we counselled together, and walked into God's House in company. It was mine own familiar friend." THAT was something that rankled. The two sacred things in which men pretend are Friendship and Religion, and in both these their pretence is devastating. If a person is a pretender in the one, that person will be also suspect in the other. There cannot be true religion in the heart of a man or woman who is a betrayer of friendships. If you cannot maintain your friendship with humans, you will not keep it with God. The New Testament states that if we say we love God and love not our brother, we are liars. How can a man love God whom he has not seen, if he love not his brother whom he has seen? Flatterers are a particularly dangerous class of people. There are many who flatter their friends in deceit, and they try to flatter God in their so-called worship. Temptation and trial are common to man. In effect, David says, "There are some things I can put up with" - my enemy reproaching me - those that hate me - but when it was the person who came with me to the House of God in company - going to worship together - it was devastating. Such things have happened all through the history of mankind. There have been Judases in every generation. BUT there is that small word in 1 Corinthians 10 which is very comforting - THE EKBASIS - the way of escape. There is a safety valve in every situation. This Psalm was probably written about the time of Absalom's death. In the song there is a threefold description of the enemy, and a threefold way of escape. When God puts us to the test, there is always a safety valve. It is noteworthy that David uses four names for God in the psalm: El-God; Adonai-Lord; Jehovah-Lord; Elohim-God. It is as though he is reinforcing his faith by calling upon every concept within him of ALMIGHTY GOD. He appeals to God, "Hide not Thyself from me O Lord!" This is rather a wonderful phrase. The expression he uses was used in the Law. It was forbidden by the Law to wilfully withhold aid from one who needed it. If your brother was in need, you had to supply it. If you did not help your blood brother - you were HIDING YOURSELF FROM HIM. Behind the word HIDE which David uses in his appeal to the Almighty is that expression: "Lord! When I am in need, please supply it." Just when you need Him, God reveals Himself. CONSIDER THE ENEMY AND THE EKBASIS. THE FRIEND WHO WAS AN ENEMY. In verse 3 David uses the phrases, "The voice of the enemy" and "The oppression of the wicked." But it is a friend he is referring to in the middle of the psalm. How can the voice of a friend be the voice of an enemy? Any voice of a friend that leads us away from the counsel of God is the voice of an enemy. Remember, Satan himself can come as an angel of light. He can deceive us with ease. In another place the psalmist David says, "Some trust in princes, some trust in horses, but I will trust in the Name of the Lord." There is ONE whom you can trust under all circumstances. In verse 5 David says, "Fearfulness and trembling have come upon me and horror hath overwhelmed me." David was by no means 'chicken-hearted.' Think about it! He had faced, bare handed,the lion, the bear, and the giant Goliath. He fought the lion, he faced the bear, for the sake of his sheep, and he faced the giant Philistine on behalf of his nation. But what he could not face was a WICKED FRIEND. Treachery had cut him to the quick. The voice of the enemy was the voice of his friend. Most opinions lean to the fact that he probably refers to AHITHOPHEL - "A man like me!" he says, "A teacher who taught me and made me know wisdom." He was the one who gave him advice. A man of whom he thought, "I must be able to trust him!" The problem is, that when people let us down, we distrust everything they have told us. Yet some of those things were true. David had been badly let down by "One who sweetly communicated with me!" It made everything a mockery, he must have felt that he did not want to see the Temple anymore. He describes this friend-enemy in a threefold way - he says, "The wicked-the Traitors-and those of our own house who deny God!" We can recognise the wicked. We are able to distinguish the traitors - they leave the faith and cause confusion among the faithful. But what difficulties we have with those of our own house, of our own friends, of our own acquaintances who deny God. Suddenly they are the enemies within. They can so occupy and fill our live! s, that they lead us away from God. There lies the subtilty of it. What a predicament! There is however a WAY OUT - an EKBASIS. David says, "O for the wings of a Dove!" The underlying desire is to fly away. We all know that feeling. "If only I could get away from it all. I could remain in the wilderness. However, we can be sure of this, that God has no intention of keeping us in constant isolation. He brings us out and brings us through. To wander off and remain isolated in the wilderness is no real answer to the problem. There is another answer, "As for me, I will call upon God and the Lord shall save me," David sings in verse 16. How many times must this happen before we can believe it? Again and again we declare, "If this goes on much longer I'll break!" We have all been guilty of saying, "I can't stand it any more!" Every time we say that we have forgotten God's EKBASIS. God has promised that with every trial He will provide a way of escape. If we call upon God - He will answer. Don't Break! PRAY! It is essential to develop this dependence upon God. "Cast thy burden upon the Lord and He shall sustain thee." In the very nature of man's experience, every one of us will carry a burden at one time or another. There is the classic story of a man trudging down a country lane with a heavy sack on his shoulders. A friend driving a horse drawn cart overtakes him and offers him a lift. "Jump up behind, I'll give you a lift." He jumps in the cart, but after a while the friend hears him grunting and groaning. Looking around he sees the poor man sitting there with the sack still on his shoulders. If you accept a lift from God, drop your load. "He shall sustain thee". Always accept God's way of escape - the EKBASIS. Copyright (c) 1996, Hedley Palmer. All rights reserved. ---------------------------------------------------- file: /pub/resources/text/hpalmer/psalms: ps-055.txt .
1.. Introduction ================ Virions (infectious virus particles) are nano-sized carriers of information whose objective is to infect a host cell and generate progeny that can, in turn, repeat the infection cycle. When traveling outside of the host cell, virions may encounter harsh environmental conditions. Knowledge of the deformability (stiffness, *k*), the energy required for mechanical failure (toughness, *T*), and the limits to fatigue for virions has been acquired through studies using atomic force microscopy (AFM), but mainly for viruses that do not have an internal membrane.[@cit1]--[@cit4] The mechanical properties of these virions ultimately recapitulate the molecular interactions across the viral icosahedral shell.[@cit5],[@cit6] There is no comparable information available for icosahedral virions in which an internal membrane vesicle surrounds the densely packaged DNA and, to our knowledge, such viruses with RNA genome are yet to be identified. Defining how a membrane and capsid provide protection to the genome within will provide new insights into the function and properties of biological materials, thereby inspiring the design of novel nanostructures. PRD1, the prototype for icosahedral dsDNA viruses with an internal membrane, is a large and complex enterobacterial virus (family *Tectiviridae*; ∼65 nm mean diameter and triangulation number pseudo-*T* = 25, [Fig. 1a](#fig1){ref-type="fig"}). Its crystal structure revealed the molecular interactions across the major capsid proteins (MCPs) P3 (395 residues) and with the membrane.[@cit7],[@cit8] P3 trimers (capsomers) are arranged in the group of nine (GON) layout in the virion facets (Fig. S1a[†](#fn1){ref-type="fn"}). The minor capsid protein P30 cements the edges of the icosahedron. Eleven of the twelve vertices are capped by peripentonal P3 trimers and by spike complexes[@cit7]--[@cit11] ([Fig. 1a](#fig1){ref-type="fig"} and S1a[†](#fn1){ref-type="fn"}). The internal membrane enclosing the densely packaged dsDNA is composed of a roughly equal mass of lipids and membrane proteins.[@cit8] The twelfth vertex is the unique, membrane-embedded portal used for DNA packaging into the procapsid and later for DNA ejection *via* the formation of a proteo-lipidic tube.[@cit12],[@cit13] ![(a) Schematic of PRD1 highlighting the main structural features of the virus particle. (b) Protein composition of wt PRD1 and subviral particles analysed by SDS-PAGE and Coomassie staining. Left: Molecular masses (M; kDa). Right: Positions of the most abundant proteins; the vertical black line refers collectively to membrane proteins (MPs, including P14, P16, P18, P20, P22, P31 and P32). Cementing protein P30 identified in the P3-shell by mass spectrometry is indicated by a black arrowhead. (c--f) Atomic force micrographs of wt PRD1 and subviral particles with scale bar (100 nm) and *z* range (75 nm) indicated in (f). (c) Wt PRD1 featuring different particle orientations. Inset: Crystal structure of wt PRD1.[@cit7] Yellow, green, cyan and blue denote the P3 pseudo-hexameric capsomers composing the icosahedral asymmetric unit; white lines delineate a virus facet; white pentagons, triangles, and ovals indicate icosahedral 5-, 3- and 2-fold symmetry axes, respectively; (d) Sus1 procapsids (no DNA within). Arrowheads indicate the visible depression due to the missing packaging portal in the unique vertex. Inset: Schematic of Sus1 procapsid; (e) P3-shell. Arrowheads highlight the depressions visible at all vertices due to the absence of the peripentonal capsomers and vertex complexes. Right inset: The star-shaped vertex depression at higher resolution (*z* range: 15 nm). Left inset: Schematic of P3-shell. Arrowheads indicate some of the de-capped vertices. (f) DNA-filled vesicle. Inset: Schematic of vesicle represented as an icosahedron for clarity and consistency with the wt PRD1 schematic representation -- this shape, however, might not be retained in the purified membrane-vesicle.](c8nr00196k-f1){#fig1} Guided by the available genetic, biochemical, and structural information, we chose to utilize (i) wild type PRD1 (wt PRD1), (ii) a PRD1 mutant that forms procapsids devoid of DNA (Sus1 procapsid), (iii) the icosahedral P3-shell composed of MCP P3 and the minor capsid protein P30 ([Fig. 1b](#fig1){ref-type="fig"} and Table S1[†](#fn1){ref-type="fn"}), but lacking the pentons and peripentonal capsomers (P3-shell), and (iv) proteo-lipidic membrane vesicles enclosing a complete genome (vesicle; [Fig. 1b](#fig1){ref-type="fig"}). We used AFM to examine the mechanical responses of these particles in an aqueous environment by assessing their stiffness and yield behaviour under an applied force and used finite element modelling, where possible, to aid the analysis. 2.. Experimental ================ 2.1. PRD1 specimen production ----------------------------- Wt PRD1 and mutant PRD1 and mutant *sus1* \[amber mutation in gene *IX*\] were propagated on *Salmonella enterica* serovar Typhimurium strain DS88 or on suppressor strains PSA(pLM2) or DB7156(pLM2).[@cit14]--[@cit18] Cells were grown in Luria--Bertani (LB) medium at 37 °C. For the production of wt and mutant phage particles, DS88 cells were infected using a multiplicity of infection of 8--10. For mutant particle production, infected cells were collected 15 min after infection (Sorvall rotor F12, 5000 rpm, 10 min, 22 °C) and transferred to a fresh pre-warmed medium. Virus particles were purified by polyethylene glycol--NaCl precipitation and rate zonal ultracentrifugation in sucrose (Sorvall rotor AH629), as previously described.[@cit19] For AFM, wt PRD1 and Sus1 procapsids were further purified by equilibrium ultracentrifugation in sucrose (Sorvall rotor AH629). The particles were concentrated by differential centrifugation (Sorvall rotor T647.5, 32 000 rpm, 2 h, 5 °C). A buffer containing 20 mM potassium phosphate pH 7.2 and 1 mM MgCl~2~ was used for purification and resuspension. For P3-shell preparation, the rate zonal purified Sus1 mutant particles (2 mg ml^--1^ in 20 mM Tris-HCl, pH 7.2, 1 mM MgCl~2~) were treated with 1% (w/v) sodium dodecyl sulfate (SDS) for 15 min at 25 °C.[@cit20] P3 shells were isolated by rate zonal centrifugation in a linear 5--20% (w/v) sucrose gradient using the Tris buffer (Sorvall rotor AH629, 24 000 rpm, 1 h 45 min, 20 °C). The particles were concentrated by centrifugation (Sorvall rotor T865, 34 000 rpm, 4 h, 5 °C) and resuspended in Tris buffer. For membrane vesicle preparation, the rate zonal purified Sus607 particles devoid of the major membrane protein P11 (1 mg ml^--1^ in 20 mM Tris-HCl, pH 7.2) were treated with 2.5 M GuHCl[@cit21] and membrane vesicles were purified by equilibrium centrifugation in a linear 20--70% (w/v) sucrose gradient (Sorvall rotor TH641, 22 000 rpm, 16--18 h, 20 °C). Protein concentrations were determined by Bradford assay.[@cit22] Particles were analyzed using sodium dodecyl sulfate polyacrylamide gel electrophoresis[@cit23] (SDS-PAGE; 16% acrylamide; [Fig. 1b](#fig1){ref-type="fig"}). Virus particles were stored at 4 °C for no more than 4 weeks. During this time, more than 95% of the wt PRD1 particles remained intact and without the loss of their genome as visualized by cryo-electron microscopy (cryo-EM) 2D imaging \[a JEM-2200FS (JEOL) transmission electron microscope equipped with an UltraScan 4000 SP 4k × 4k camera (GATAN)\] (Fig. S2[†](#fn1){ref-type="fn"}). Sus1 procapsid, P3-shell particles and vesicles were similarly stored and also used within this time frame (Fig. S2[†](#fn1){ref-type="fn"}). 2.2. Protein identification by mass spectrometry ------------------------------------------------ Silver stained[@cit24] protein bands were cut out of the polyacrylamide gel and "in-gel" digested. Cysteine bonds were reduced with 0.045 M dithiothreitol (Sigma-Aldrich, USA) for 20 min at 37 °C and alkylated with 0.1 M iodoacetamide (Fluka, Sigma-Aldrich, USA) at room temperature. Samples were digested by adding 0.75 μg trypsin (Sequencing Grade Modified Trypsin, V5111, Promega) overnight at 37 °C. After digestion, peptides were purified with C18 microspin columns (Harvard Apparatus) according to the manufacturer\'s protocol. The dried peptides were reconstituted in 30 μl of buffer A \[0.1% trifluoroacetic acid (TFA) in 1% acetonitrile (ACN)\]. Liquid chromatography coupled to tandem mass spectrometry (LC-MS/MS) analysis was carried out on an EASY-nLC1000 (Thermo Fisher Scientific, Germany) connected to a Velos Pro-Orbitrap Elite hybrid mass spectrometer (Thermo Fisher Scientific) with a nano-electrospray ion source (Thermo Fisher Scientific). The LC-MS/MS samples were separated using a two-column setup consisting of a 2-cm C18-Pepmap trap column (Thermo Fisher Scientific), followed by a 15-cm C18-Pepmap analytical column (Thermo Fisher Scientific). The linear separation gradient consisted of 5% buffer B in 5 min, 35% buffer B in 60 min, 80% buffer B in 5 min and 100% buffer B in 10 min at a flow rate of 0.3 μl min^--1^ (buffer B: 0.1% TFA acid in 98% acetonitrile). Six microliters of sample were injected per LC-MS/MS run and analyzed. Full MS scan was acquired with a resolution of 60 000 in the normal mass range in an orbitrap analyzer and followed with CID-MS2 top 20 most intense precursor ions within the ion trap (energy 35). Data were acquired using LTQ Tune software. The acquired MS2 scans were searched against the enterobacteria phage PRD1 (NCBI) protein database using the Sequest search algorithms in Thermo Proteome Discoverer. The allowed mass error for the precursor ions was 15 ppm and for the fragment 0.8 Da. A static residue modification parameter was set for carbamidomethyl +57 021 Da (C) of the cysteine residue. Methionine oxidation was set as dynamic modification +15 995 Da (M). Only full-tryptic peptides were allowed for the maximum of one missed cleavage. 2.3. Surface preparation and immobilization of PRD1 particles ------------------------------------------------------------- Freshly cleaved surfaces (∼1 cm^2^) of mica (Ted-Pella Inc., CA, USA) were functionalized with 3-(2,2-aminoethylamino)-ethylaminopropyltrimethoxysilane (APTES; Sigma-Aldrich) by adapting a previously described procedure.[@cit25] Briefly, mica was left to incubate with 30 μL of APTES in a 4 l gas incubator for 2 h. A small amount of water (10 μl) was deliberately added to generate a root-mean-square surface roughness of 1.7 to 2 nm, which proved beneficial to particle attachment. Following the APTES functionalization, surfaces were covered with 100 μl Hepes buffer (10 mM HEPES, pH 7.4, 150 mM NaCl, 2 mM MgCl~2~) containing ∼10 μg virus particles (wt PRD1, Sus1 procapsid, or P3-shell). PRD1 vesicles were attached to freshly cleaved mica instead of APTES-coated mica. Virus particles were allowed to adhere for 30 min, and excess particles were removed by washing with buffer. 2.4. AFM imaging and nanoindentation ------------------------------------ All PRD1 particles were found to attach as a monolayer to the prepared mica surfaces that could be readily visualized by AFM. Imaging and nanoindentation measurements were carried out using a MultiMode 8 AFM with a Nanoscope V controller (Bruker, CA, USA) at room temperature in Hepes buffer. Wt PRD1, Sus1 procapsids, and P3-shells were analysed with sharpened triangular Si~3~N~4~ cantilevers with a nominal spring constant of 0.7 N m^--1^ (ScanAsyst-Liquid; Bruker). For PRD1 vesicles, Si~3~N~4~ cantilevers with a nominal spring constant of 0.1 N m^--1^ (AC40; Bruker) were used. The real spring constants of the cantilevers were measured using the thermal noise method[@cit26] as implemented in the NanoScope software and were found to be close to the nominal values. Imaging was performed in Peak Force Tapping mode, with a typical tapping amplitude of 40 nm and a driving frequency of 2 kHz. For wt PRD1, Sus1 procapsids, and vesicles, the peak force was usually 100 pN; for P3-shells, it was 80 pN. Under these conditions, the image quality was sufficient to reliably identify the virus particles (and in some cases, their orientation and surface sub-features), and in general, intact PRD1 particles did not degrade or break upon repeated imaging. On already degraded particles, gradual further deterioration was observed, and particles were also found to detach from the surface. Images were plane fitted when required, using Gwyddion software (; <http://gwyddion.net/>) without the application of noise filtering or sharpening. Nano-indentation measurements were performed at individually selected particles using the 'point-and-shoot' function within the NanoScope software. Briefly, the area of interest was first imaged to localize the virus particle; the 'point-and-shoot' function was then activated and force curves were taken at the particle centre. subsequently, the area was imaged once more to verify successful nano-indentation. The accuracy of localization of the particle centre was found to be limited by piezo drifts and estimated to be within 5 nm. Force *vs.* distance (*F*/*z*) curves were acquired at a constant approach velocity of 200 nm s^--1^. The approach and retract distances were 100 nm, corresponding to a total time of 1 s per complete approach and retract cycle. The maximal load was 4 nN, except for P3-shells, where the maximal load was lowered to 2 nN. *F*/*z* curves were analysed using the NanoScope software. 2.5. Force curve analysis ------------------------- ### 2.5.1. Selection of force curves At maximal loads of 2 to 4 nN, the AFM tip typically reached the underlying support following the indentation and/or fracture of all PRD1-derived particles. We used the *z* distance travelled between the onset of a repulsive force and the closest approach as an indicator for successful indentation at a central particle position. The closest approach typically corresponded to hard-wall contact, though in some cases it was short of hard-wall contact by a few nm as estimated from force curves with hard-wall contact acquired shortly before/after on a nearby mica area and taking advantage of the AFM\'s closed loop *z* scanner. Force curves showing distances of 60 ± 10 nm were retained for further analysis of wt PRD1, Sus1 procapsids, and P3-shells; and distances of 28 ± 5 nm were considered acceptable for DNA-filled vesicles. When imaging vesicles, we found a second class of objects with a height of 12 ± 7 nm and lateral dimensions comparable to the DNA-filled vesicles. Since negative stain EM showed also deformed vesicles in some cases (Fig. S2[†](#fn1){ref-type="fn"}), most likely this second class represents vesicles that lost their DNA and had flattened on the surface. These flattened objects were not further analyzed. To avoid including particles that might have been displaced or changed orientation upon indentation, force curves where force levels dropped and remained below 500 pN over distances of 20 nm and more before hard-wall contact were also discarded from analysis. A representative force curve for each PRD1 particle type with AFM micrographs before and after indentation is shown in Fig. S3,[†](#fn1){ref-type="fn"} and additional force curves illustrating sample to sample variations are shown in Fig. S4.[†](#fn1){ref-type="fn"} ### 2.5.2. Determination of yield point and stiffness After the first contact between the AFM probe and a PRD1 particle at the contact point *z*~c~, the initial monotonous force (compression) was followed by an extended and steep drop (fracture), with subsequent, typically minor, compression and fracture phases (Fig. S4[†](#fn1){ref-type="fn"}). The onset of the first drop, defined as the yield point *z*~y~, is determined by the yield force *F*~y~ = *F*(*z*~y~) and the yield strain *ε*~y~ = (*z*~c~ -- *z*~y~)/*h*, where *h* is the mean particle height. Neglecting the lowest forces (*F* \< 200 pN), which would correspond to a non-linear Hertzian regime of capsid compression,[@cit27] the major part of the first compression phase for wt PRD1, the Sus1 procapsid, and the P3-shell could, in general, be approximated well by a straight line -- with the exception of short stochastic slips that we interpret as micro-fractures (Fig. S5[†](#fn1){ref-type="fn"}). Whilst for hollow-shell particles (Sus1 procapsid and P3-shell), the linear regime can be attributed to elastic shell bending,[@cit27] we focused analysis on this regime also for the full particles (wt PRD1 and vesicle). The particle stiffness *k* was determined from the slope in the initial compression phase, *i.e.*, the slope up to the force at which the first slip or the fracture occurred. In any case, linear fits were not extended beyond 1500 pN (or strains above 10%) to avoid bias by non-linearity at larger compressions. Likewise, the stiffness was not quantified if the first slip occurred below 500 pN to avoid the large uncertainties associated with fitting a line to a small dataset. Stiffness values for vesicles were extracted from linear fits to the compression curves that did not extend beyond 600 pN, but typically up to a maximum of 50% strain, as strains below 15--20% fell within the noise limit of the measurements. ### 2.5.3. Estimation of particle toughness Toughness *T* was defined as the amount of energy *E*~y~ per volume *V* that the PRD1 particles can withstand before breaking. Approximating the virus as a sphere of radius *R*, and with *T* = *E*~y~/*V*, *E*~y~ ≈ *F*~y~(*z*~c~ -- *z*~y~) = *F*~y~*ε*~y~*h* and *V* = 4π/3 *R*^3^ ≈ π/6 *h*^3^, we obtain *T* ≈ 6/π *F*~y~*ε*~y~/*h*^2^. ### 2.5.4. Statistical analysis Origin data analysis and graphing software was used for statistical analysis of results (OriginLab, Northampton, MA). Gaussians were fitted to the histograms in [Fig. 2](#fig2){ref-type="fig"} to extract the means and standard deviations (s.d.). One-way ANOVA tests were performed to determine the statistical significance of the differences of yield force and stiffness across the PRD1-derived particle populations. The stiffness of wt PRD1 against Sus1 procapsid yielded a *P*-value ≤ 0.001 (\*\*), while the stiffness, yield force and yield strain of both PRD1 and Sus1 procapsid against P3-shell showed a *P*-value ≤ 0.0001 (\*\*\*). ![Histograms of various properties of the four viral particle types, reporting mean values and standard deviations for each. *y*-Axis: number of unique particles (75 for wt PRD1 and Sus1 procapsid, 103 for P3-shell and 21 for vesicles). *x*-Axis: property denoted below each column. Specimen heights closely match the particle dimensions previously obtained by averaging techniques, except for the vesicle, which is slightly flattened upon immobilization. Yield force and strain are not shown for vesicles, as these do not have a defined yield point.](c8nr00196k-f2){#fig2} 2.6. Finite-element analyses ---------------------------- To test how the membrane vesicle affects the stiffness and stability in a composite system of a proteinaceous capsid shell with an underneath membrane vesicle, modelling of the mechanical response of PRD1 was performed using a continuum-mechanics finite-element analysis (FEA) with the software ABAQUS 6.14 (ABAQUS, Fremont, CA) (Fig. S6 and S7[†](#fn1){ref-type="fn"}). In this approach, the proteinaceous capsid and the proteo-lipidic vesicle were represented as mechanically isotropic spherical shells, *i.e.*, neglecting the structural details of each shell (see section 3.3). This method can effectively deal with the architectural complexity introduced by the presence of the vesicle whilst the number of adjustable parameters is kept small. 3.. Results and discussion ========================== 3.1. Imaging PRD1 assemblies at the single particle level --------------------------------------------------------- When immobilized, the wt particles oriented with a 3-fold, 2-fold or 5-fold symmetry axis normal to the supporting surface ([Fig. 1c](#fig1){ref-type="fig"}). The preferred orientation (\>67% of the particles) was with a facet down (*i.e.*, a 3-fold axis normal to the surface). The average height was 67.8 ± 2.5 nm (mean ± s.d.) for wt PRD1, 66.9 ± 2.7 nm for the Sus1 procapsid (*n* = 75 each; [Fig. 2a and b](#fig2){ref-type="fig"}, and 62.8 ± 3.5 nm for the P3-shell (*n* = 103; [Fig. 2c](#fig2){ref-type="fig"}), in good agreement with electron-microscopy and X-ray data[@cit7],[@cit28],[@cit29] (Fig. S1b[†](#fn1){ref-type="fn"}). Strikingly, we observed on the Sus1 procapsid a mild circular depression, ∼13 nm in diameter at ∼8% of the visualized vertices (*n* = 103) ([Fig. 1d](#fig1){ref-type="fig"} and S8[†](#fn1){ref-type="fn"}). This percentage, combined with the estimated dimensions, defines at the single-molecule level that this feature is the unique vertex that lacks the external part of the packaging portal.[@cit12] This, however, was not detected on wt PRD1. Indeed, the structural difference in the capsid context between the 'wild type' unique vertex and the remaining 11 vertices is much smaller than that between the unique vertex and the other 11 vertices in the procapsid,[@cit12] and apparently, it is too small to be resolved with our AFM set-up. P3-shells showed holes, ∼25 nm wide, at each vertex ([Fig. 1e](#fig1){ref-type="fig"}) consistent with the missing peripentonal P3 capsomers, spike complexes, and internal vesicles[@cit28],[@cit29] (Fig. S1b[†](#fn1){ref-type="fn"}). The forces needed to be lowered from ∼100 to ∼80 pN to enable imaging of P3-shells indicating that these particles are more sensitive to breakage compared to wt PRD1. By contrast, vesicles displayed a featureless surface and a height of 28.2 ± 4.1 nm ([Fig. 1f](#fig1){ref-type="fig"} and [2d](#fig2){ref-type="fig"}). This height is less than the diameter of DNA-containing vesicles (∼35 nm),[@cit8] indicating that vesicles readily deform when immobilized. 3.2. Stiffness of PRD1 particles -------------------------------- The AFM force *vs.* distance (*F*/*z*) curves (Fig. S3 and S4[†](#fn1){ref-type="fn"}) generated by the nanoindentation testing of individual particles quantified the resistance to small elastic deformation (stiffness, *k*), as well as the force and strain at the point of mechanical failure (yield force, *F*~y~; yield strain, *ε*~y~) ([Fig. 2](#fig2){ref-type="fig"} and [3a--c](#fig3){ref-type="fig"}). ![Comparison of the average mechanical properties across the different PRD1-derived particles. In all panels: black bar, PRD1 wt; pink bar, Sus1 procapsid; blue bar, P3-shell; orange bar, vesicle. (a) Stiffness (*k*); (b) yield force (*F*~y~); (c) yield strain (*ε*~y~); (d) toughness (*T*). All panels report the mean values and standard errors of the mean that were derived from the data shown in [Fig. 2](#fig2){ref-type="fig"} (for the vesicle, calculation of toughness is not possible because there is no defined yield point).](c8nr00196k-f3){#fig3} The *F*/*z* curves typically exhibited a relatively small non-linear regime at the smallest indentation forces (*F* \< 200 pN), which is likely to represent the Hertzian deformation of the capsid shell.[@cit27] This was followed by an extended linear regime, justifying the quantification of elastic properties in terms of the stiffness *k*. For quantitative stiffness analysis, we considered this linear regime for strains up to 10%, which was well below the yield point. For quasi-spherical shells such as the Sus1 procapsid and the P3-shell, this linear regime can be associated with shell bending.[@cit27] Wt PRD1 possessed the greatest stiffness (0.57 ± 0.03 N m^--1^, mean ± s.e.m.), followed by the Sus1 procapsid (0.39 ± 0.02 N m^--1^) and the P3-shell (0.22 ± 0.01 N m^--1^; [Fig. 3a](#fig3){ref-type="fig"}). Most likely, the enhanced resistance of wt PRD1 to elastic deformation arises from the pressure exerted by the DNA.[@cit8],[@cit30] PRD1 genome packaging produces a radial expansion of the internal membrane (*e.g.*, the radius of the outer leaflet increases by ∼6%), which presses the vesicle closer to the capsid.[@cit12],[@cit28],[@cit30] The DNA-filled vesicle displayed the least stiffness (0.022 ± 0.002 N m^--1^; [Fig. 3a](#fig3){ref-type="fig"}), indicating that its direct effect on virion stiffness is marginal but that it contributes to virion stiffness by transmitting pressure from the DNA to the capsid. The volume inside the rigid capsid is reduced upon indentation accentuating the effect of DNA pressure on the stiffness of wt PRD1. In contrast, the soft membrane can stretch upon indentation, thus reducing any effect of DNA pressure on the vesicle stiffness. 3.3. Modelling of PRD1\'s shell elasticities -------------------------------------------- To confirm the above findings on PRD1\'s elastic properties, we confronted the experimental data with continuum-mechanics finite-element computational modelling (see Experimental and Fig. S6[†](#fn1){ref-type="fn"}). In this simulation, the particle was placed between a rigid plane and a rigid indenter ([Fig. 4a](#fig4){ref-type="fig"}). The displacement of the rigid plane was constrained, and the indenter apex was modelled as a sphere of 10-nm radius positioned coaxially with the virus-derived particle in the direction normal to the plane. For indentation, the indenter applied a force in the direction normal to the plane. The contact between all bodies was assumed to be hard in the direction normal to the contact (*i.e.*, interpenetration was not allowed) and frictionless in the tangential direction (*i.e.*, relative displacement and rotation were allowed with no constraint). ![(a) Schematic of the spherical two-shell model (outer protein shell in blue, inner vesicle shell in yellow) for the finite-element modelling; three-quarters of the spheres are shown with the indenter apex represented as a grey sphere with the direction of the applied force as indicated by the black arrow; in the bottom right corner, the Cartesian coordinate system; (b) predicted curves of force *vs.* indentation for a protein shell (with *E* = 0.13 GPa, representing the P3-shell; black dots), a vesicle shell (with *E* = 0.021 GPa, representing the proteo-lipidic vesicle; red dots) and a composite of these protein and vesicle shells (blue dots). In matching colours: lines are linear fits through the origin, and texts the stiffness values corresponding to the slopes. The stiffness values of protein and vesicle shells match the experimental data for P3-shell and vesicle ([Fig. 3a](#fig3){ref-type="fig"}), respectively, confirming the correct choice of Young\'s modulus values; the stiffness of the composite is well approximated by the sum of the stiffness values of the constituent shells and thus only marginally larger than the stiffness of the protein shell alone.](c8nr00196k-f4){#fig4} To extract material properties from the experimental data, we first considered the proteinaceous capsid individually. For the capsid, we estimated an outer radius *R* = 33.2 nm and a thickness *d* = 8 nm from the rotationally averaged electron density maps of the PRD1 virion.[@cit28],[@cit30] By treating the capsid as isotropic and linearly elastic, its properties can be described by two independent parameters: Young\'s modulus *E* and the Poisson ratio *ν*. By neglecting a non-linear regime at very small strains (*ε* \< 3%), the predicted relationship between force and particle indentation *δ* was approximately linear and scaled with the Young\'s modulus *E* for indentations up to 2*d* (*ε* up to 24%; Fig. S6a[†](#fn1){ref-type="fn"}). Our results were rather insensitive to the Poisson ratio (Fig. S7a--c[†](#fn1){ref-type="fn"}), and we thus fixed *ν* = 0.4. These features are consistent with previous computations by others and with the predictions of thin-shell theory,[@cit4],[@cit31],[@cit32] and thus validate the numerical model. The linear relationship between force and indentation is also consistent with our experimental data (Fig. S3b, e, h, and S4a--d[†](#fn1){ref-type="fn"}), where we note that the strain regime of *ε* \< 10% used for the analysis of experimental data lies well within the range over which theory predicts a linear response. This implies that stiffness analysis is far away from any buckling transition.[@cit33] It justifies the use of linear elasticity in our simple theoretical model, and also the use of stiffness *k* = *F*/*δ* to characterize the shell\'s elastic properties. With *F*/*E* ∼ *δ* and *k* = *F*/*δ*, it is also clear that *k* ∼ *E*, and a linear fit to the data in Fig. S6a[†](#fn1){ref-type="fn"} gives *k* ≈ 1.65 nm × *E*. With this equation, we estimate *E* = 0.13 GPa for the P3-shell from the experimentally determined mean stiffness value for this particle (*k* = 0.22 N m^--1^; [Fig. 3a](#fig3){ref-type="fig"}). A recent computational modelling study on a smaller non-membrane-containing virus has shown that capsid proteins can dynamically re-structure upon capsid indentation with appreciable effects on capsid elasticity compared to an idealized homogeneous shell.[@cit34] Our experimental data do not allow deconvoluting these effects. However, the extended linear regime in the *F*/*z* curves observed experimentally for the P3-shell and the Sus1 procapsid (Fig. S4c and d[†](#fn1){ref-type="fn"}) indicates that the bending elasticity of the PRD1 capsid shell remains appropriately described by a Young\'s modulus (where this would effectively include the possible re-structuration effects). The elasticity of the proteolipidic membrane was estimated analogous to that of the proteinaceous capsid, assuming an outer radius identical to the inner radius of the capsid (*R* = 25.2 nm) for direct contact of the two shells, and a membrane thickness *d* = 5.5 nm from a rotationally averaged electron density map.[@cit30] Fig. S6b[†](#fn1){ref-type="fn"} shows the dependence of *F*/*E* on vesicle deformation for these geometrical parameters, from which *k* ≈ 1.07 nm × *E* can be derived. Assuming to a first approximation that the stiffness of the membrane shell is similar to the experimentally accessible value for the genome-containing vesicle (*k* = 0.022 N m^--1^; [Fig. 3a](#fig3){ref-type="fig"}), we can estimate *E* = 0.021 GPa. To predict the elastic behaviour of the composite capsid-membrane system, we modelled a system of two concentric shells with the inner shell adopting the geometry and Young\'s modulus of the membrane and the outer shell adopting the geometry and Young\'s modulus of the P3-shell ([Fig. 4a](#fig4){ref-type="fig"}). The stiffness of this composite system was *k* = 0.24 N m^--1^, that is the presence of the vesicle enhanced the stiffness only marginally, by about 10%, compared to the P3-shell alone. More generally, the stiffness values shown in [Fig. 4b](#fig4){ref-type="fig"} exemplify that the stiffness of the composite (0.24 N m^--1^) is well approximated by the sum of the stiffness values of the constituent shells (0.22 N m^--1^ + 0.02 N m^--1^). The small enhancement in stiffness was virtually independent of the Poisson ratios of both the capsid and membrane (Fig. S7d[†](#fn1){ref-type="fn"}). The above modelling exercise provides reasonable predictions about the trends that can be expected based on the experimental AFM-derived shell elastic mechanical properties. Here, we have operated with the P3-shell as a reference system because experimental data for this single-shell system were readily available. Using the above-identified stiffness relationship, we can now also estimate the Young\'s modulus of the complete capsid shell from the experimentally determined stiffness values of the Sus1 procapsid and the membrane. The closure of 11 of 12 vertices by additional proteins enhances the elasticity of the Sus1 procapsid shell compared to the P3-shell, whilst a further enhancement of the capsid elasticity by the unique vertex -- missing in the Sus1 procapsid -- is likely to be marginal. *k*~capsid~ ≈ *k*~capsid+membrane~ -- *k*~membrane~ ≈ 0.39 N m^--1^ -- 0.02 N m^--1^ = 0.37 N m^--1^ ([Fig. 3a](#fig3){ref-type="fig"}) and *E* ≈ *k*/1.65 nm (Fig. S5a[†](#fn1){ref-type="fn"}) give *E* ≈ 0.22 GPa, a value comparable to that for some non-enveloped and enveloped viral capsids.[@cit35] Indeed, the two-shell modelling confirmed that the stiffness is only marginally affected, by less than 10%, by an internal soft membrane contacting the capsid ([Fig. 4b](#fig4){ref-type="fig"}). The reduced stiffness of the P3-shell (*E* = 0.13 GPa) is likely due to the absence of the stabilizing pentons and peripentonal capsomers. 3.4. Mechanical stability of PRD1 particles ------------------------------------------- The presence of the genome and the ensuing particle stiffening had no appreciable effect on the mechanical stability of the virion: the yield force and yield strain of wt PRD1 (*F*~y~ = 3.0 ± 0.1 nN, *ε*~y~ = 17.5 ± 0.8%; mean ± s.e.m.) and the Sus1 procapsid (*F*~y~ = 2.7 ± 0.1 nN, *ε*~y~ = 18.1 ± 1.4%) were similar ([Fig. 3b and c](#fig3){ref-type="fig"}). This is in contrast to other phages, such as phage *λ*, where the DNA augments both stiffness and mechanical stability.[@cit36] As for the P3-shell, it was much more sensitive to breakage than wt PRD1 or the Sus1 procapsid (*F*~y~ = 0.9 ± 0.1 nN, *ε*~y~ = 12.3 ± 0.7%; [Fig. 3b and c](#fig3){ref-type="fig"}). The mechanical failure of the PRD1 particles upon indentation was frequently accompanied by the loss of capsomers from the capsid shell (Fig. S3a--c,[†](#fn1){ref-type="fn"} insets). In addition, *F*/*z* curves of wt PRD1, the Sus1 procapsid, and the P3-shell revealed slip events coincident with the occurrence of micro-fractures during force loading likely reflecting the local displacements of MCPs (Fig. S5[†](#fn1){ref-type="fn"}). While all three particle populations presented a similar density of micro-fractures (average 1.3 per nN of applied compressive force), wt PRD1 and the procapsid withstood more of these fractures before yielding. Previous studies on binary component viral systems -- genome encapsulated by a protein shell -- have highlighted the role of DNA or RNA in contributing to the capsid stiffness where the mechanical reinforcement is achieved by the genome anchoring the protein shell from the interior.[@cit35] In other cases, such as the herpes simplex virus type 1 (HSV-1) nucleocapsid, the stiffness and yield force remain practically the same whether the particle is fully packaged or devoid of the genome, and stabilizing viral proteins appear to be responsible for this assembly type.[@cit37],[@cit38] In PRD1, the Sus1 procapsid and the mature particle display similar yield forces whereas the relative increase in the stiffness of the wt PRD1 can be attributed to the presence of DNA. The packaging of the genome leads to an expansion of the membrane-vesicle increasing the membrane\'s interactions with the capsid proteins.[@cit12],[@cit28]--[@cit30] 3.5. Toughness analysis of PRD1 and other icosahedral dsDNA viruses ------------------------------------------------------------------- The resistance to material fracture is typically expressed as toughness *T*, here defined as the amount of energy per unit volume that can be absorbed before mechanical failure. The toughness of PRD1, 2.2 × 10^5^ J m^--3^, is relatively high compared to that reported for other icosahedral dsDNA viruses (see [Fig. 3d and 5](#fig3){ref-type="fig"}, and Table S2[†](#fn1){ref-type="fn"}). Thus, PRD1 together with human adenovirus is one of the toughest among all icosahedral dsDNA viruses.[@cit7],[@cit39]--[@cit41] Adenovirus shares a common MCP fold and assembly mechanism with PRD1; however, whilst it lacks a membrane, it possesses a complex set of cementing proteins stabilizing the structure -- about 300 in total (composed of sixty copies of each of the proteins IIIa, V, VI, VIII and IX) instead of the mere 60 copies of the single protein species P30 guiding the assembly in PRD1.[@cit7],[@cit42] Altogether, these comparisons highlight that the layered complex of the capsid and membrane vesicle relieves the genome from a stabilizing role and endows PRD1 with remarkably high mechanical stability. To explore how the PRD1 vesicle and capsid together influence toughness, we compared the toughness of the PRD1-derived particles: the Sus1 procapsid, the P3-shell, and the vesicle. The P3-shell (*T* = 0.54 × 10^5^ J m^--3^) was more susceptible to mechanical failure than the Sus1 procapsid (*T* = 2.1 × 10^5^ J m^--3^; [Fig. 3d](#fig3){ref-type="fig"}). The fact that the P3-shell\'s toughness was ∼4-fold less but its stiffness was only 2-fold less revealed its rather stiff, brittle nature ([Fig. 3a](#fig3){ref-type="fig"}). The P3-shell lattice is held together by the (C-I type and C-II type) interactions established by the GON within each facet and along the facets *via* the MCPs C-termini and by the P30 proteins[@cit7] (Fig. S1a[†](#fn1){ref-type="fn"}). The relative ease of breakage of this lattice might facilitate morphological corrections as the capsomers assemble on the vesicle mould during the procapsid formation. Closing the icosahedral vertices with the peripentonal capsomers and penton proteins (Fig. S1a[†](#fn1){ref-type="fn"}) and plugging the unique vertex with the portal complex produce a stable procapsid that can withstand dsDNA translocation powered by the packaging ATPase P9.[@cit12] More generally, the brittle nature of the capsid is not only manifested in the small yield force of the P3-shell but also in the above-mentioned microfractures. The DNA-filled vesicles, on the other hand, did not show a clear yield point and typically recovered their original shape even after strains exceeding 60%, which indicated that they were ductile and very soft ([Fig. 3a](#fig3){ref-type="fig"}). Thus, comparative analysis with other dsDNA viruses indicates that the toughness of PRD1 is superior to most other dsDNA viruses with comparable capsid organization but lacking the membrane, and is only rivalled by adenovirus -- a non-membrane-containing virus -- which is exceptionally rich in cementing proteins stabilizing the capsid ([Fig. 5](#fig5){ref-type="fig"}). ![PRD1\'s mechanical properties compared to other dsDNA viruses. Key for the viruses and particle types shown in the other panels (in the case of HSV-1 virion, we refer to its nucleocapsid). Comparison across viruses *via* Ashby plots of toughness (*y*-axis in log scale) *vs.* stiffness, yield force and yield strain (*x*-axis), respectively (see the Table S2[†](#fn1){ref-type="fn"} for references).](c8nr00196k-f5){#fig5} 3.6. Composite material model of PRD1 ------------------------------------- Our findings indicate that the capsid is stiff and brittle, whereas the membrane vesicle is ductile and soft. Might the hierarchical combination of these contrasting material properties be responsible for the high toughness of PRD1 particles? Quantifying accurately the contribution of the membrane vesicle to the overall toughness displayed by the PRD1 particle remains a challenge. To our knowledge, no PRD1 intact capsid particles can be biochemically or genetically produced that would allow the AFM probing, and yet the resulting information might be still limited for an exhaustive modelling of the yield behaviour of the full capsid as a brittle material. However, in nature, other macroscopic systems use similar arrangements to create tough materials. One such illustrative example is the coat protecting bird egg, in which a stiff, yet brittle, calcified shell is bonded to a soft and compliant proteinaceous inner skin[@cit43] ([Fig. 6a](#fig6){ref-type="fig"}). ![(a) Multilayered structure of an avian eggshell; (b) cryo-electron density of wt PRD1 with an octant removed displayed in Chimera[@cit45] to show (inset) the layered/composite structure of the virion with the proteinaceous shell in blue, the membrane-vesicle in yellow-lime (OL: outer leaflet; IL: inner leaflet) and with the horizontal black lines marking the distinct layers and the interacting matrix region between the capsid and the membrane. As cartoon representation in red fitted in density the P3 MCPs with N-terminal α-helices interacting with the OL and the P16 transmembrane protein crossing the membrane vesicle. The dsDNA has been removed from within the membrane vesicle for clarity; (c) schematic of a composite sandwich material to which (a) and (b) recapitulate.](c8nr00196k-f6){#fig6} Altogether, these layers constitute a tough composite material that protects the progeny against mechanical stress while carrying out other essential functions. Analogously, the PRD1 capsid and vesicle are bonded to protect the integrity of the virion and its genome ([Fig. 6b](#fig6){ref-type="fig"}). Specifically, the connection between the capsid and membrane vesicle is made of polypeptide stretches: the capsid shell -- composed of 240 copies of interacting trimers of the MCP P3 and glued at the icosahedral edges by the cementing protein P30 -- anchors the membrane through several N-termini of MCPs P3; this connectivity is further augmented by the anchoring N-terminal transmembrane helix of protein P16 located at the base of the peripentonal MCPs P3 [@cit7] (inset in [Fig. 6b](#fig6){ref-type="fig"}). Moreover, it is conceivable that during force loading onto the capsid, these connectors will act as nano-staples increasing the capability of the system of absorbing energy before mechanical failure (an additional energetic cost would be necessary to disrupt protein--membrane interactions[@cit44]). 4.. Conclusions =============== Composites have evolved in nature driven by selection for the efficient use of materials, adaptability, and multi-functionality. Viruses can be seen as composite biological entities where nucleic acids, proteins and lipids assemble to produce functional particles for infection. We propose that, as in a composite sandwich material ([Fig. 6c](#fig6){ref-type="fig"}), an interfacial protein/polypeptide matrix in PRD1 generates a tight connection that mechanically couples the capsid and the membrane ([Fig. 6b](#fig6){ref-type="fig"}). The flexibility of this matrix and possibly also the fluidity of the membrane facilitate the displacement of the two shells relative to each other, and thus assist in maintaining the capsomers in place whilst allowing for the correction of small scale defects in the (re-)assembly process. In summary, we here presented the nanomechanical characterization of a virus that features a membrane inside its capsid. The combination of a stiff, yet brittle, proteinaceous capsid with a soft proteolipidic vesicle in PRD1 facilitates multiple stages of the virus life cycle, including virus assembly, mechanical protection for the extracellular virion, and the vesicle-to-tube transformation during DNA ejection.[@cit13] From a broader perspective, it appears that the evolution of membrane-containing viruses has yielded, at the nanometer scale, composite properties comparable to those known for macroscopic natural materials, where the capsid and vesicle are bonded into a tough composite that protects the integrity of the virus and its genome. Our findings provide both foundational quantitative information and inspiration that can encourage the engineering of tough nanoscale devices and particles capable of protecting fragile cargos. Conflicts of interest ===================== There are no conflicts to declare. Supplementary Material ====================== Supplementary information ###### Click here for additional data file. We thank Sari Korhonen and Helin Veskiväli at the Instruct Centre for Virus and Macromolecular Complex Production (ICVIR; 2009--2017), University of Helsinki, for skilled technical assistance in virus production and purification (the current Biocomplex). We are grateful to the Abrescia Lab\'s members Eva S. Cunha, Diego Charro and Hani Y. Boshra for discussions throughout the study and Isaac Sántos-Pérez for help in virus production and electron microscopy imaging. David I. Stuart at the University of Oxford is also acknowledged for the permission to adapt original images for use in Fig. S1a.[†](#fn1){ref-type="fn"} We also thank MINECO for the Severo Ochoa Excellence Accreditation to the CIC bioGUNE (SEV-2016-0644) and the University of Helsinki and Academy of Finland (grant 1306833) for the support to Biomolecular Complex Purification (Biocomplex), part of Instruct-FI, used in this study. This research was supported by Bruker -- Spain (to S. A. and N. G. A. A.), by the Academy of Finland (Academy Professor funding grants 283072 and 255342 to D. H. B.), by the European Research Council (starting grant FP7-ERC-2012-StG-306435 to R. P. R.), and by the Spanish Ministry of Economy and Competitiveness (MINECO/FEDER; MAT2014-54867-R to R. P. R.; MAT2015-63704-P to G. A. S.; BFU2015-64541-R to N. G. A. A.). [^1]: †Electronic supplementary information (ESI) available. See DOI: [10.1039/c8nr00196k](10.1039/c8nr00196k)
SpaceX’s first astronaut mission could take off in May - ajaviaad https://techcrunch.com/2020/02/10/spacexs-first-astronaut-mission-could-take-off-in-may/ ====== dang This is an announcement of the possibility of an announcement, which is one level of indirection beyond an announcement of an announcement, which is already off topic. On HN there's no harm in waiting for a thing to actually be announced, or rather to actually happen, at which point there will be something new to discuss. [https://hn.algolia.com/?dateRange=all&page=0&prefix=false&qu...](https://hn.algolia.com/?dateRange=all&page=0&prefix=false&query=%22announcement%20of%20an%20announcement%22&sort=byDate&type=comment) [https://hn.algolia.com/?dateRange=all&page=0&prefix=false&qu...](https://hn.algolia.com/?dateRange=all&page=0&prefix=false&query=%22no%20harm%20in%20waiting%22&sort=byDate&type=comment) ------ rtkwe That's exciting. It'll be nice for NASA I'm sure to finally gain independence from the Soyuz launch schedule and the 1 Russian member that always comes with that, letting them rotate crews more easily. Maybe with more craft we could see an inflatable expansion to the station for more crew berths. ~~~ TaylorAlexander Perhaps, but it won’t be Bigelow Aerospace: [https://spacenews.com/bigelow- aerospace-sets-sights-on-free-...](https://spacenews.com/bigelow-aerospace- sets-sights-on-free-flying-station-after-passing-on-iss-commercial-module/) Looks like this company may do it though: [https://spaceflightnow.com/2020/01/28/axiom-wins-nasa- approv...](https://spaceflightnow.com/2020/01/28/axiom-wins-nasa-approval-to- attach-commercial-habitat-to-space-station/) ~~~ rtkwe Bigelow has always seemed like it was on the edge of collapsing. It'd be interesting to see them actually get their large station launched, I'd love for their to be a commercial alternative if only for there to be less pressure to commercialize the ISS. (An endeavor I think is doomed, there's not enough actual use for it yet that isn't satisfied by the national lab model) ------ jp42 Success of this will changes a lot of things. USA regaining capability to put humans in orbit. Space proving private companies can safely take humans to space. And overall government's & public's confidence in Spacex for building Starship & possibly providing meaningful transportation infrastructure for Mars colonization. ------ tectonic It's very likely to slip further before it actually happens. My money's on June or July.
Q: How To Compare Integer to Objective-C enum - (void)updateCheckBoxes { NSArray *availableFuncUnits = _scanner.availableFunctionalUnitTypes; for(int i = 0; i < [availableFuncUnits count]; i++) { } } If I put a breakpoint inside the for loop, the elements of the NSArray * 'availableFuncUnits' are (__NSCFNumber *)(int)0 and (__NSCFNumber *)(long)3. The array is supposed to contain elements of the following : enum { ICScannerFunctionalUnitTypeFlatbed = 0, ICScannerFunctionalUnitTypePositiveTransparency = 1, ICScannerFunctionalUnitTypeNegativeTransparency = 2, ICScannerFunctionalUnitTypeDocumentFeeder = 3 }; typedef NSUInteger ICScannerFunctionalUnitType; Shouldn't I be able to do the following? if([availableFuncUnits objectAtIndex:i] == ICScannerFunctionalUnitType.ICScannerFunctionalUnitTypeDocumentFeeder) {} But it always gives me an error saying 'Expected identifier or '('. How can I perform this comparison correctly? Thanks a lot for the help! A: There are two problems that I see: 1) The array availableFuncUnits contains NSNumber objects. You cant directly compare them with primitive types (NSUInteger). So your if should be like this: ICScannerFunctionalUnitType type = [availableFuncUnits[i] integerValue] if(type == ICScannerFunctionalUnitTypeDocumentFeeder){} In your snippet you were comparing the pointer, not the object. 2) The error you were seeing is because the proper way to use enums is: i = ICScannerFunctionalUnitTypeDocumentFeeder
.bmenu1 a { color: transparent; text-shadow: 0px 0px 5px black; } .bmenu1 a:hover { text-shadow: 0px 0px 1px $menuCeBGColor; } .bmenu2 a{ color: transparent; text-shadow: 0px 0px 6px black; } .bmenu2 a:hover{ text-shadow: 0px 0px 1px $menuCeBGColor; } .bmenu3 a{ text-shadow: 0px 0px 4px black; } .bmenu3 a:hover{ color: $menuCeHoverFontColor; text-shadow: 0px 0px 1px black; } .bmenu4 a{ color: transparent; text-shadow: 0px 0px 3px black; } .bmenu4 a:hover{ color: $menuCeHoverFontColor; background: $menuCeHoverBGColor; } .bmenu4 a:hover{ text-shadow: none; }
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!--NewPage--> <HTML> <HEAD> <!-- Generated by javadoc (build 1.6.0_10) on Thu Jan 14 19:24:41 PST 2010 --> <TITLE> ExactMap.SizedOrder (INFLIB v3.0 Public API at 2010-01-14 19:23:22) </TITLE> <META NAME="date" CONTENT="2010-01-14"> <LINK REL ="stylesheet" TYPE="text/css" HREF="../../../../../stylesheet.css" TITLE="Style"> <SCRIPT type="text/javascript"> function windowTitle() { if (location.href.indexOf('is-external=true') == -1) { parent.document.title="ExactMap.SizedOrder (INFLIB v3.0 Public API at 2010-01-14 19:23:22)"; } } </SCRIPT> <NOSCRIPT> </NOSCRIPT> </HEAD> <BODY BGCOLOR="white" onload="windowTitle();"> <HR> <!-- ========= START OF TOP NAVBAR ======= --> <A NAME="navbar_top"><!-- --></A> <A HREF="#skip-navbar_top" title="Skip navigation links"></A> <TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY=""> <TR> <TD COLSPAN=2 BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A NAME="navbar_top_firstrow"><!-- --></A> <TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY=""> <TR ALIGN="center" VALIGN="top"> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> &nbsp;<FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A>&nbsp;</TD> </TR> </TABLE> </TD> <TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM> </EM> </TD> </TR> <TR> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> &nbsp;<A HREF="../../../../../edu/ucla/belief/inference/map/ExactMap.html" title="class in edu.ucla.belief.inference.map"><B>PREV CLASS</B></A>&nbsp; &nbsp;<A HREF="../../../../../edu/ucla/belief/inference/map/InitializationMethod.html" title="class in edu.ucla.belief.inference.map"><B>NEXT CLASS</B></A></FONT></TD> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> <A HREF="../../../../../index.html?edu/ucla/belief/inference/map/ExactMap.SizedOrder.html" target="_top"><B>FRAMES</B></A> &nbsp; &nbsp;<A HREF="ExactMap.SizedOrder.html" target="_top"><B>NO FRAMES</B></A> &nbsp; &nbsp;<SCRIPT type="text/javascript"> <!-- if(window==top) { document.writeln('<A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A>'); } //--> </SCRIPT> <NOSCRIPT> <A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A> </NOSCRIPT> </FONT></TD> </TR> <TR> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> SUMMARY:&nbsp;NESTED&nbsp;|&nbsp;<A HREF="#field_summary">FIELD</A>&nbsp;|&nbsp;<A HREF="#constructor_summary">CONSTR</A>&nbsp;|&nbsp;<A HREF="#methods_inherited_from_class_Object">METHOD</A></FONT></TD> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> DETAIL:&nbsp;<A HREF="#field_detail">FIELD</A>&nbsp;|&nbsp;<A HREF="#constructor_detail">CONSTR</A>&nbsp;|&nbsp;METHOD</FONT></TD> </TR> </TABLE> <A NAME="skip-navbar_top"></A> <!-- ========= END OF TOP NAVBAR ========= --> <HR> <!-- ======== START OF CLASS DATA ======== --> <H2> <FONT SIZE="-1"> edu.ucla.belief.inference.map</FONT> <BR> Class ExactMap.SizedOrder</H2> <PRE> <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</A> <IMG SRC="../../../../../resources/inherit.gif" ALT="extended by "><B>ExactMap.SizedOrder</B> </PRE> <DL> <DT><B>Enclosing class:</B><DD><A HREF="../../../../../edu/ucla/belief/inference/map/ExactMap.html" title="class in edu.ucla.belief.inference.map">ExactMap</A></DD> </DL> <HR> <DL> <DT><PRE>public static class <B>ExactMap.SizedOrder</B><DT>extends <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</A></DL> </PRE> <P> <DL> <DT><B>Since:</B></DT> <DD>062104</DD> <DT><B>Author:</B></DT> <DD>Keith Cascio</DD> </DL> <HR> <P> <!-- =========== FIELD SUMMARY =========== --> <A NAME="field_summary"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TH ALIGN="left" COLSPAN="2"><FONT SIZE="+2"> <B>Field Summary</B></FONT></TH> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1"> <CODE>&nbsp;<A HREF="../../../../../il2/util/IntList.html" title="class in il2.util">IntList</A></CODE></FONT></TD> <TD><CODE><B><A HREF="../../../../../edu/ucla/belief/inference/map/ExactMap.SizedOrder.html#order">order</A></B></CODE> <BR> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1"> <CODE>&nbsp;double</CODE></FONT></TD> <TD><CODE><B><A HREF="../../../../../edu/ucla/belief/inference/map/ExactMap.SizedOrder.html#size">size</A></B></CODE> <BR> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</TD> </TR> </TABLE> &nbsp; <!-- ======== CONSTRUCTOR SUMMARY ======== --> <A NAME="constructor_summary"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TH ALIGN="left" COLSPAN="2"><FONT SIZE="+2"> <B>Constructor Summary</B></FONT></TH> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD><CODE><B><A HREF="../../../../../edu/ucla/belief/inference/map/ExactMap.SizedOrder.html#ExactMap.SizedOrder(il2.util.IntList, double)">ExactMap.SizedOrder</A></B>(<A HREF="../../../../../il2/util/IntList.html" title="class in il2.util">IntList</A>&nbsp;order, double&nbsp;size)</CODE> <BR> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</TD> </TR> </TABLE> &nbsp; <!-- ========== METHOD SUMMARY =========== --> <A NAME="method_summary"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TH ALIGN="left" COLSPAN="2"><FONT SIZE="+2"> <B>Method Summary</B></FONT></TH> </TR> </TABLE> &nbsp;<A NAME="methods_inherited_from_class_Object"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor"> <TH ALIGN="left"><B>Methods inherited from class <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</A></B></TH> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD><CODE><A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#equals(java.lang.Object)" title="class or interface in java.lang">equals</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#getClass()" title="class or interface in java.lang">getClass</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#hashCode()" title="class or interface in java.lang">hashCode</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#notify()" title="class or interface in java.lang">notify</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#notifyAll()" title="class or interface in java.lang">notifyAll</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#toString()" title="class or interface in java.lang">toString</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#wait()" title="class or interface in java.lang">wait</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#wait(long)" title="class or interface in java.lang">wait</A>, <A HREF="http://java.sun.com/javase/6/docs/api/java/lang/Object.html?is-external=true#wait(long, int)" title="class or interface in java.lang">wait</A></CODE></TD> </TR> </TABLE> &nbsp; <P> <!-- ============ FIELD DETAIL =========== --> <A NAME="field_detail"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TH ALIGN="left" COLSPAN="1"><FONT SIZE="+2"> <B>Field Detail</B></FONT></TH> </TR> </TABLE> <A NAME="order"><!-- --></A><H3> order</H3> <PRE> public final <A HREF="../../../../../il2/util/IntList.html" title="class in il2.util">IntList</A> <B>order</B></PRE> <DL> <DL> </DL> </DL> <HR> <A NAME="size"><!-- --></A><H3> size</H3> <PRE> public final double <B>size</B></PRE> <DL> <DL> </DL> </DL> <!-- ========= CONSTRUCTOR DETAIL ======== --> <A NAME="constructor_detail"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TH ALIGN="left" COLSPAN="1"><FONT SIZE="+2"> <B>Constructor Detail</B></FONT></TH> </TR> </TABLE> <A NAME="ExactMap.SizedOrder(il2.util.IntList, double)"><!-- --></A><H3> ExactMap.SizedOrder</H3> <PRE> public <B>ExactMap.SizedOrder</B>(<A HREF="../../../../../il2/util/IntList.html" title="class in il2.util">IntList</A>&nbsp;order, double&nbsp;size)</PRE> <DL> </DL> <!-- ========= END OF CLASS DATA ========= --> <HR> <!-- ======= START OF BOTTOM NAVBAR ====== --> <A NAME="navbar_bottom"><!-- --></A> <A HREF="#skip-navbar_bottom" title="Skip navigation links"></A> <TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY=""> <TR> <TD COLSPAN=2 BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A NAME="navbar_bottom_firstrow"><!-- --></A> <TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY=""> <TR ALIGN="center" VALIGN="top"> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> &nbsp;<FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A>&nbsp;</TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A>&nbsp;</TD> </TR> </TABLE> </TD> <TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM> </EM> </TD> </TR> <TR> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> &nbsp;<A HREF="../../../../../edu/ucla/belief/inference/map/ExactMap.html" title="class in edu.ucla.belief.inference.map"><B>PREV CLASS</B></A>&nbsp; &nbsp;<A HREF="../../../../../edu/ucla/belief/inference/map/InitializationMethod.html" title="class in edu.ucla.belief.inference.map"><B>NEXT CLASS</B></A></FONT></TD> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> <A HREF="../../../../../index.html?edu/ucla/belief/inference/map/ExactMap.SizedOrder.html" target="_top"><B>FRAMES</B></A> &nbsp; &nbsp;<A HREF="ExactMap.SizedOrder.html" target="_top"><B>NO FRAMES</B></A> &nbsp; &nbsp;<SCRIPT type="text/javascript"> <!-- if(window==top) { document.writeln('<A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A>'); } //--> </SCRIPT> <NOSCRIPT> <A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A> </NOSCRIPT> </FONT></TD> </TR> <TR> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> SUMMARY:&nbsp;NESTED&nbsp;|&nbsp;<A HREF="#field_summary">FIELD</A>&nbsp;|&nbsp;<A HREF="#constructor_summary">CONSTR</A>&nbsp;|&nbsp;<A HREF="#methods_inherited_from_class_Object">METHOD</A></FONT></TD> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> DETAIL:&nbsp;<A HREF="#field_detail">FIELD</A>&nbsp;|&nbsp;<A HREF="#constructor_detail">CONSTR</A>&nbsp;|&nbsp;METHOD</FONT></TD> </TR> </TABLE> <A NAME="skip-navbar_bottom"></A> <!-- ======== END OF BOTTOM NAVBAR ======= --> <HR> Copyright 2010 <a href=http://reasoning.cs.ucla.edu>UCLA Automated Reasoning Group</a> </BODY> </HTML>
<?php namespace Elastica\Exception; trigger_error('Elastica\Exception\ElasticsearchException is deprecated. Use Elastica\Exception\ResponseException::getResponse::getFullError instead.', E_USER_DEPRECATED); /** * Elasticsearch exception. * * @author Ian Babrou <ibobrik@gmail.com> */ class ElasticsearchException extends \Exception implements ExceptionInterface { const REMOTE_TRANSPORT_EXCEPTION = 'RemoteTransportException'; /** * @var string|null Elasticsearch exception name */ private $_exception; /** * @var bool Whether exception was local to server node or remote */ private $_isRemote = false; /** * @var array Error array */ protected $_error = []; /** * Constructs elasticsearch exception. * * @param int $code Error code * @param string $error Error message from elasticsearch */ public function __construct($code, $error) { $this->_parseError($error); parent::__construct($error, $code); } /** * Parse error message from elasticsearch. * * @param string $error Error message */ protected function _parseError($error) { $errors = explode(']; nested: ', $error); if (count($errors) == 1) { $this->_exception = $this->_extractException($errors[0]); } else { if ($this->_extractException($errors[0]) == self::REMOTE_TRANSPORT_EXCEPTION) { $this->_isRemote = true; $this->_exception = $this->_extractException($errors[1]); } else { $this->_exception = $this->_extractException($errors[0]); } } } /** * Extract exception name from error response. * * @param string $error * * @return null|string */ protected function _extractException($error) { if (preg_match('/^(\w+)\[.*\]/', $error, $matches)) { return $matches[1]; } else { return; } } /** * Returns elasticsearch exception name. * * @return string|null */ public function getExceptionName() { return $this->_exception; } /** * Returns whether exception was local to server node or remote. * * @return bool */ public function isRemoteTransportException() { return $this->_isRemote; } /** * @return array Error array */ public function getError() { return $this->_error; } }
<?php /** * Copyright 2017 Google Inc. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ namespace Google\Cloud\PubSub\Connection; use Google\Cloud\Core\Iam\IamConnectionInterface; /** * Proxy IAM service calls to the Pub/Sub Subscription IAM resources */ class IamSubscription implements IamConnectionInterface { /** * @var ConnectionInterface */ private $connection; /** * @param ConnectionInterface $connection */ public function __construct(ConnectionInterface $connection) { $this->connection = $connection; } /** * @param array $args */ public function getPolicy(array $args) { return $this->connection->getSubscriptionIamPolicy($args); } /** * @param array $args */ public function setPolicy(array $args) { return $this->connection->setSubscriptionIamPolicy($args); } /** * @param array $args */ public function testPermissions(array $args) { return $this->connection->testSubscriptionIamPermissions($args); } }