text
stringlengths
8
5.77M
package io.github.biezhi.java8.nashorn; import javax.script.ScriptEngine; import javax.script.ScriptEngineManager; /** * Working with java types from javascript. * * @author Benjamin Winterberg */ public class Nashorn3 { public static void main(String[] args) throws Exception { ScriptEngine engine = new ScriptEngineManager().getEngineByName("nashorn"); engine.eval("load('java8-nashorn/src/main/resources/nashorn3.js')"); } }
My Favourite Orchid Send a photo and story about your favourite orchid…. Tell us why it is your favourite and share the story with other growers. Email:bundyweb34@gmail.com My favourite orchid is Rth. Mem. Warren Eggins ‘Kymmy’. I purchased 8 of these seedlings back in 2003. The flowers are very small all under 70 mm wide. The clone Kymmy was awarded HCC at the Childers Orchid Show on30/08/2012. I do not grow these plants as well as other growers, so that is why it is my favourite when it flowers.
1. Introduction {#sec1-sensors-18-04113} =============== Condition monitoring is a process of judging the health status of a mechanical system, which uses various types of data (such as temperature, vibration, strain, rotating speed, displacement, pressure, voltage, current, acoustics and operator experience) to achieve change-point detection and thus provide a timely decision for the maintenance works \[[@B1-sensors-18-04113]\]. Machine condition monitoring delivers significant benefits of cost savings, safety and reliability to industries by providing an early indication of potential machine failure in the machine operation cycle. As such, condition monitoring has attracted substantial attention from companies and research institutions for decades \[[@B2-sensors-18-04113],[@B3-sensors-18-04113],[@B4-sensors-18-04113]\]. Traditionally, plenty of wires or cables are required in a condition monitoring system to transfer data from various transducers to data acquisition devices. High costs and difficult installations, along with low operational reliability are often the main drawbacks of using these wired systems. To overcome such drawbacks, latest wireless sensor networks (WSNs) have become an effective and efficient solution. In addition to providing key advantages of low-cost installation and operation, WSN also has the merits of low power consumption, high flexibility and distributed intelligence in implementing remote real-time condition monitoring. Generally, a wireless sensor node in WSN is composed of four key units \[[@B5-sensors-18-04113]\]: a sensing unit, a processing unit, a communication unit and a power unit as shown in [Figure 1](#sensors-18-04113-f001){ref-type="fig"}. The power unit poses a significant problem because conventional batteries have a finite lifespan, limited energy density and capacity. In addition, the performance of batteries has not improved much compared to the significant increase of the power consumption in electronic devices \[[@B6-sensors-18-04113]\]. When the batteries are exhausted, replacing or recharging it can be an expensive and difficult task especially when the nodes are remote or inaccessible. Fortunately, the wasted energy from machines or its surrounding environments, such as thermal energy, magnetic and electric fields and mechanical energy, can be harvested to power the sensor nodes by means of energy harvesting (EH) technologies \[[@B7-sensors-18-04113]\], which is the procedure of converting wasted energy from ambient sources into electrical energy \[[@B8-sensors-18-04113]\]. This approach substantially prolongs the life of sensing nodes; furthermore, it reduces maintenance costs of the monitoring system and avoids the environmental contamination of batteries. As shown in [Figure 1](#sensors-18-04113-f001){ref-type="fig"}, wasted energy sources (such as light, electromagnetic radiation, heat, vibration, motion and magnetic energy) can be harvested using various traditional EH techniques (usually including photovoltaic \[[@B9-sensors-18-04113]\], radio frequency (RF), thermoelectric, pyroelectric \[[@B10-sensors-18-04113]\], piezoelectric, electromagnetic, triboelectric and electrostatic \[[@B11-sensors-18-04113],[@B12-sensors-18-04113]\]). Currently, these EH techniques are primarily targeted at small and ultra-low power devices, like portable electronic devices, wearable devices and WSNs \[[@B13-sensors-18-04113]\]. For mechanical systems, the energy losses are present in power transformation and transmission in the form of friction, heat, deformation and vibration during operation. Therefore, it is recognized that mechanical efficiency is always below 100%. Besides, more efficient, renewable and generally inexhaustible energy sources are likely to exist in the environment around the mechanical systems. These different forms of energy provide the possibility of supplementing or replacing additional batteries for supplying power to WSNs for machine condition monitoring in order to achieve a true wireless and maintenance-free system. In the last decade, innumerable researchers have contributed to the technology of energy extraction from machine systems \[[@B14-sensors-18-04113],[@B15-sensors-18-04113],[@B16-sensors-18-04113],[@B17-sensors-18-04113],[@B18-sensors-18-04113],[@B19-sensors-18-04113]\]. Though significant progress has been made in various aspects, these EH technologies still have challenging deficiency of providing insufficient electricity to power the sensor nodes of WSN for real-time machine condition monitoring. Numerous algorithms relating to the energy-efficient routing of WSNs have been proposed recently, such as effective node-selection schemes \[[@B20-sensors-18-04113]\], distributed routing schemes for energy management \[[@B21-sensors-18-04113]\]. Sherazi et al. \[[@B22-sensors-18-04113]\] makes a comprehensive survey of EH and discussed the challenges and trade-offs of media access control (MAC) protocols in WSNs. Then, devices designed with innovative structures or novel materials have been studied to enhance energy conversion efficiency \[[@B23-sensors-18-04113],[@B24-sensors-18-04113],[@B25-sensors-18-04113]\]. Furthermore, because large-scale EH devices are affected by the area available for installation on target objects, designers must face the challenges of small size and high conversion efficiency on the EH devices acting at microwatt levels. Therefore, nanotechnology has attracted researchers' attention on the design and fabrication of energy harvesting nanoscale devices. Chen et al. \[[@B26-sensors-18-04113]\] summarizes the triboelectric nanogenerators proposed in the past few years. Most of them work for low-frequency actions, such as human activities, rotating machines and bridge structures. The state-of-the-art nanotechnology and fabrication technology create opportunities for a combination of EH technologies. As a result, hybrid nanogenerators have improved the performance of energy harvesters. He et al. \[[@B27-sensors-18-04113]\] has fabricated a hybrid nanogenerator through integrating the triboelectric and piezoelectric effects with electromagnetic induction to supply continuous and reliable power for transmission of temperature and vibration data. With the rapid advancement in new materials and nanotechnologies along with more efficient WSN topologies and constructions, more and more EH devices have been successfully developed and applied in various fields, like human health monitoring, portable electronic devices, wearable devices, as the shown in surveys made by \[[@B6-sensors-18-04113],[@B7-sensors-18-04113],[@B28-sensors-18-04113]\]. These EH based self-powered WSNs have the potential for producing an economical, flexible, efficient, reliable and accurate condition monitoring system due to the development of EH technologies and WSNs. Unfortunately, such EH apparatuses have been found to be infrequently used for the long-term and real-time machine condition monitoring. In order to encourage the extensive and prevalent applications of EH in maintenance-free machine condition monitoring, a comprehensive literature review is essential to prompt the application of energy generators to achieve high performance and maintenance-free wireless sensor nodes for machine condition monitoring. To this end, this paper summarizes the physical principles of various EH technologies, enumerates their applications and discusses their potential prevalent applications in the field of machine condition monitoring. To the authors' knowledge, this is the first review on self-powered WSNs based on energy harvesting applied for machine condition monitoring. In this review paper, conventional wireless communication technologies are first introduced and the power consumption of WSNs are discussed. Then, energy sources from machinery systems are analysed and evaluated for future harvesting usage. Next, the theory of traditional EH technologies and their improvements are introduced. The wide applications of these EH technologies and prototypes are surveyed in a variety of fields, especially in the machinery domain. Simultaneously, the advantages and disadvantages of various technologies and models are summarized. Lastly, the challenges and future developments of EH technologies applied to machine condition monitoring is investigated and recommendations are made. 2. Power Demands and Resources of WSN based Condition Monitoring {#sec2-sensors-18-04113} ================================================================ As shown in [Figure 1](#sensors-18-04113-f001){ref-type="fig"} electric energy in a WSN primarily supplies power the communication unit, processing unit and sensing unit. Moreover, the power consumption of WSNs largely depends upon applications which define the actual transmission rate and distance required to complete the tasks of an application. 2.1. Power Consumption of a WSN based System {#sec2dot1-sensors-18-04113} -------------------------------------------- Wireless communication technology has developed rapidly with domestic and industrial demands from the end of the last century, developing many different WSNs. The standardized wireless transmission technologies mainly comprise Wi-Fi, Bluetooth low energy (BLE), ZigBee and high-frequency RF (such as 433 MHz, 915 MHz, 2.45 GHz and 5.8 GHz) \[[@B29-sensors-18-04113]\]. EnOcean, Z-wave and ANT, as representatives of emerging proprietary communication technologies, have shown potential developments in smart homes, automation control, transportation and logistics, though these systems have not yet dominated the market \[[@B30-sensors-18-04113]\]. Nevertheless, these low power consumption WSNs, as reviewed in [Table 1](#sensors-18-04113-t001){ref-type="table"}, provide the fundamentals to realise a self-power system through effective EH from its surroundings, for example from motion, light or temperature differences. Currently, there are a number of popular modules available for developing WSN applications. As summarized in [Table 2](#sensors-18-04113-t002){ref-type="table"}, these modules are fabricated based on the wireless communication technologies in [Table 1](#sensors-18-04113-t001){ref-type="table"}. However, due to differences in applications and advances in fabrication technologies used, they exhibit different performances of energy usages even if they are from the same communication technology. It shows that the energy consumed is generally at the level of milliwatts or watts. Both Wi-Fi and BLE are the most energy efficient transmission methods by evaluation of data rate and power consumption, which have the potential to be competitors of other wireless communication technologies for the achievement of remote and real-time machine condition monitoring taking into account of their relatively long transmission distance and high transmission rate. The power consumed by processing and sensing units is used for data collection and data processing. [Table 3](#sensors-18-04113-t003){ref-type="table"} enumerates typical microprocessor modules with active consumption at about watt level. In reality, the electricity cost by a microprocessor is dependent up on the instructions processed. In other words, the implementation of massive complex algorithms results in a significant increase in power consumption of a sensor node microprocessor, for example, from dozens of milliwatts or hundreds of milliwatts. In contrast, the sensing unit consumes the least power, generally at the microwatt or milliwatt level, which can be certified from the parameters of sensor modules as shown in [Table 4](#sensors-18-04113-t004){ref-type="table"}. It is also deduced that the transmission unit of a wireless sensor node consumes the most energy causing power consumption of an entire node to be at the milliwatt to watt level, the comparison of various modules are shown in [Table 2](#sensors-18-04113-t002){ref-type="table"}, [Table 3](#sensors-18-04113-t003){ref-type="table"} and [Table 4](#sensors-18-04113-t004){ref-type="table"}. The main physical parameters measured for machine condition monitoring include temperature, humidity, torque, stress, strain, pressure, speed, vibration and acoustic emission. The lower varying signals, such as temperature are suggested for a network with a low transmission rate and power consumption, typically ZigBee, EnOcean, Z-wave and ANT. However, it is difficult to determine the early fault diagnosis and fault location using such limited data. The vibrational characteristics of the mechanical faults are usually found at a much higher frequency band, which requires a high sampling frequency according to the Nyquist-Shannon sampling theorem, resulting in a large number of raw datasets for processing and transmission. Although feature extraction at nodes consumes less power than the direct transmission of raw datasets, some advanced algorithms for extracting fault features with high computational costs, for example, for example Spectral Correlation \[[@B37-sensors-18-04113]\] and Modulation Signal Bispectrum \[[@B38-sensors-18-04113],[@B39-sensors-18-04113]\], cannot be operated at nodes. Therefore, it is still essential to transmit large numbers of raw datasets through a WSN with a high transmission speed to implement the remote and real-time machine condition monitoring. The relationship between power consumption and transmission rate has been researched, unveiling that the long-term data transmission at a low rate can consume more power than a short-term transmission at a high rate when the effect of transmission distance is excluded \[[@B40-sensors-18-04113],[@B41-sensors-18-04113]\]. Therefore, a wireless network with a higher transmission rate (for example BLE, Wi-Fi and ZigBee) is critical in order to achieve remote machine condition monitoring in real time. BLE 4.2 consumes less power, but the actual transmission distance is limited to 10 m. It is attractive that BLE 5.0, a new generation of Bluetooth, has a wider coverage range and a higher speed compared to BLE 4.2 for low-power devices. This provides an opportunity to achieve a large amount of datasets transmission in real time with relatively low power consumption in online machine condition monitoring. The improvement of intelligent networks and big data analytics provides another solution for self-powered machine condition monitoring systems. MCUs, such as the ARM Cortex-M series, have vast processing capacity with the power consumption levels for data processing being substantially less than the power used for data transmission. As a result, a large amount of sampled data can be partially pre-processed in the MCU, and then the signal features are extracted and transmitted instead of transmitting the full raw data which provides significant power saving. In general, a trade-off between the network selection and energy harvesting should be considered before a wireless condition monitoring system is implemented. Moreover, there should be a balance between data processing and data transmission in algorithm design and network optimization. In general, power at the milliwatt level or watt level is required to process and transmit large amounts of rapidly varying signals at a wireless sensor node for remote and real-time machine condition monitoring. 2.2. Potential Energy Harvesting Sources in Machines {#sec2dot2-sensors-18-04113} ---------------------------------------------------- To provide sufficient power for self-powered WSNs, the potential energy harvesting resources in or around mechanical systems can be analyzed as shown in [Figure 2](#sensors-18-04113-f002){ref-type="fig"}. In general, these sources can be split into internal and external energy sources representing the energy coming from mechanical systems or their surroundings. Then, they are further classified into light, electricity, heat and motion based on the forms of energy. Solar energy is a green, renewable and efficient source in the environment where most mechanical systems are located. Solar radiation at a high level can be harvested and stored. However, sunlight is crucially affected by the region, weather and length of day. Artificial light has little correlation with these factors, but its illumination level is several orders of magnitude lower than that of sunlight. Electromagnetic waves, such as RF radiation, are another energy source mainly existing in the surroundings due to the wide usage of radio transmitters. Both light and RF radiation energy can be harvested to use for wireless body area networks \[[@B36-sensors-18-04113],[@B42-sensors-18-04113]\]. The force generated by fluid flows (like wind and tidal current \[[@B43-sensors-18-04113]\]) is an effective source of kinetic energy. For example, marine tidal energy \[[@B44-sensors-18-04113]\] can be harvested for large-scale equipment on the seashore or ships. External energy sources are greatly influenced by the environment, and the corresponding generators may be difficult to adapt to condition monitoring systems. Their common applications are power generation for the power plants \[[@B45-sensors-18-04113],[@B46-sensors-18-04113],[@B47-sensors-18-04113]\]. In contrast, the internal energy of machines is relatively reliable and steady. Efficiency of the power machines (usually IC engines and motors) is less than 50%. The wasted energy gives a chance to be harvested and then used to power the WSN for monitoring the working conditions. For example, the efficiency of a conventional combustion engine can only reach a range of 30% to 40% \[[@B48-sensors-18-04113]\]. The wasted energy can be the source of power for maintenance-free wireless sensor nodes. The available energy for harvesting is thermal and kinetic energy. [Figure 3](#sensors-18-04113-f003){ref-type="fig"}a presents the energy audit of a traditional diesel engine using a pie chart \[[@B49-sensors-18-04113]\]. It is understood that energy loss is inevitable during the operation of an engine resulting with the fuel efficiency being less than 50%. Most of the wasted energy is in the forms of heat and kinetic energy. For typical diesel engines in tested in 2009, the heat lost with the exhaust is approximately a quarter of the fuel energy. Meanwhile, exhaust emission is also a process in which gas flow may be used to generate force. Therefore, both thermal and kinetic energies can be harvested from the machine exhaust. Another form of the wasted energy is heat rejection (heat releasing into the environment with the coolant) with the energy supplied being slightly more than the exhaust. It is mainly a result of a significant increase in the temperature of the environment and components of the mechanical system, this provides an opportunity for powering WSN if there are effective and efficient thermal energy harvesting technologies. Although the development of technologies improved higher fuel efficiency for engines to around 50% in recent years (for example, Wärtsilä engine fuel efficiency increases year-over-year as shown in [Figure 3](#sensors-18-04113-f003){ref-type="fig"}b \[[@B50-sensors-18-04113]\]), a mass of fuel energy still dissipates in the form of heat and kinetic energy. Nevertheless, since the transmission efficiency of machines is always less than 100%, most of the lost energy being used is due to overcoming friction and generated heat. Interestingly, researchers at the University of Huddersfield have analyzed the thermodynamics of an industrial helical gearbox of 10kW by thermography signals to obtain the heat distribution of the gearbox as shown in [Figure 4](#sensors-18-04113-f004){ref-type="fig"}b. It shows the thermal energy at the motor drive end and gearbox housing is relatively high and the temperature near the cooling system (in this case a fan) is much lower than shown in [Figure 4](#sensors-18-04113-f004){ref-type="fig"}a, this can be utilized to assemble a thermoelectric generator to power the gearbox monitor \[[@B51-sensors-18-04113]\]. In addition, the cooling system of a machine can also generate useful kinetic energy while cooling the mechanical system. These examples illustrate that these different forms of wasted energy can be effectively harvested to power the wireless condition monitoring systems with little effect on the overall mechanical efficiency. In summary, internal and external energy resources can be employed separately or simultaneously using various energy harvesting technologies or hybrid energy harvesters, such as a hybrid triboelectric-piezoelectric generator \[[@B52-sensors-18-04113]\]. Solar energy can be scavenged to supply power for WSNs applied in the outdoor machine condition monitoring because of its abundance. Moreover, because of a considerable quantity of waste thermal and kinetic energy in mechanical systems, most machines have sufficient power resources for harvesting to achieve a WSN-based maintenance-free condition monitoring system. 3. Energy Harvesting Techniques and Applications {#sec3-sensors-18-04113} ================================================ As discussed in [Section 2](#sec2-sensors-18-04113){ref-type="sec"}, a more generalised real-time machine condition monitoring WSN system needs to deal with large amounts of data. The transmission of lower varying data, such as temperature, pressure and strain, gives valuable information for condition monitoring, which can be at low power levels. However, the main stream condition monitoring technologies still rely on the fast variation data such as vibration, acoustics and acoustic emissions, which need either high bandwidth transmission or high capacity local processing, which is generally achieved with higher power consumption. This means that power levels from milliwatt to watt range need to be made available for different scenarios. To meet these requirements, the operating principles of various EH techniques and typical efficient models or prototypes of generators, especially more applicable to mechanical systems, are revisited in this section. In addition, advantages and disadvantages of these technologies are summarized to provide detailed information for different applications in machine condition monitoring. 3.1. Light Energy Harvesting {#sec3dot1-sensors-18-04113} ---------------------------- Light energy, for example the energy from sunlight or artificial light, is generally renewable and ubiquitous energy source, which can be harvested and accumulated to power sensor nodes through the photovoltaic technique \[[@B53-sensors-18-04113]\]. Photovoltaic cells manufactured with semiconductor materials can directly convert the light waves into electrical energy through the photovoltaic effect as illustrated in [Figure 5](#sensors-18-04113-f005){ref-type="fig"}. Free electrons and holes are produced at PN junctions under the influence of sunlight and then move to the N-type and P-type semiconductors to form a potential difference \[[@B54-sensors-18-04113]\]. A current can be generated when an external conductor is connected to the electrodes of photovoltaic cells. The amount of energy harvested from light is related to the illumination level. For example, artificial light, usually an indoor light source, can only generate illumination at a low level of below 1000 lux. The magnitude of sunlight illumination level (up to 120,000 lux for brightest sunlight) is significantly higher than the artificial one. [Figure 6](#sensors-18-04113-f006){ref-type="fig"} compares the relationship between the electric output and the illuminance level of Panasonic photovoltaic cells for indoor and outdoor illumination \[[@B55-sensors-18-04113],[@B56-sensors-18-04113]\]. To improve the performance of photovoltaic cells, many researchers have contributed to the advancement of the photovoltaic materials. Photovoltaic cells are mainly classified into three types according to three types of materials: silicon (a commonly used semiconductor material), semiconductor compounds and novel materials \[[@B57-sensors-18-04113]\]. Sampaio et al. \[[@B54-sensors-18-04113]\], systematically examined the development of photovoltaic solar cells with different materials, the worldwide markets, as well as their advantages and disadvantages. Although conventional silicon solar cells dominate the commercial markets, a new types solar cells manufactured semiconductor compounds or novel materials, such as the thin film cells and organic photovoltaic cells, are being developed rapidly due to their characteristics of low cost, high conversion efficiency and flexibility, and low environmental pollution. Because of the inconstant availability of solar energy, the direct use of electricity generated by photovoltaic cells or panels leads to low efficiency and inconvenience. Rechargeable batteries can be used to store solar energy for many applications. They are widely used in portable devices (such as watches and calculators) and outdoor applications (like solar street lights and solar heaters). Li et al. \[[@B58-sensors-18-04113]\] have conducted a comprehensive survey on the advancement of solar-powered rechargeable batteries and characteristics of two distinctive connection methods: external combination with photovoltaics and internal integration with photo-electrodes. With the assistance of integrated technology and nanomaterials, small solar energy harvesting systems can be built to provide enough power for tiny sensor systems. Promising nanomaterials and nanotechnology applied for the solar energy harvesting have been discussed in \[[@B59-sensors-18-04113]\]. Escobedo et al. \[[@B60-sensors-18-04113]\] have designed the first printed flexible tag with characteristics of small size, low cost and low power consumption for gas concentration measurement in sealed environments, which can be powered by two miniaturized solar cells with the energy solely harvested from sunlight or bright artificial light. Sunlight is virtually inexhaustible, renewable, clean and can be harvested to power large-scale outdoor machines efficiently and effectively. For example, it is prevailing for solar-powered aircraft systems in the aerospace industry \[[@B61-sensors-18-04113],[@B62-sensors-18-04113],[@B63-sensors-18-04113],[@B64-sensors-18-04113]\]. Some scholars have reviewed its utilization powering water pumping systems instead of diesel power in agriculture \[[@B65-sensors-18-04113]\]. Nevertheless, in solar energy harvesting, there are some major disadvantages such as instability, time-variance and regional restriction. inevitably affect the conversion efficiency, although some researchers have studied solar cells suitable for all weather applications \[[@B66-sensors-18-04113]\]. For machine condition monitoring, micro-scale photovoltaic cells working with storage batteries can power the sensor nodes to monitor the condition variables of outdoor machinery such as vehicles, marine systems, mining machines and offshore equipment. Compared to sunlight, the conversion efficiency of artificial light is much lower due to the low intensity of the excitation source. Indoor light cannot yet supply enough power for WSNs on indoor machine condition monitoring, and only limited references mention the indoor light harvesting application \[[@B60-sensors-18-04113]\]. Until major advances are made in photovoltaic technology it is only useful as a backup for other energy harvesting technologies for indoor machine condition monitoring. For outdoor use, it is undeniable that light energy harvesting is a feasible way to power machine condition monitoring systems with low noise, although solar energy harvesting is restricted by the region, weather, solar panel area, cost and maintainability. A solution is to include rechargeable batteries \[[@B67-sensors-18-04113]\] to store the electricity generated by photovoltaic solar cells, which converts the electrical energy into the chemical energy for further storage and recyclable conversion \[[@B58-sensors-18-04113]\]. Consequently, photovoltaic cells combined with batteries have the potential to implement online machine condition monitoring. More importantly, solar energy harvesting based condition monitoring system can increase reliability and safety and decrease maintenance costs. But the cost of materials and installation for photovoltaic cells and batteries are significantly expensive \[[@B68-sensors-18-04113]\], which is unsuitable for condition monitoring of normal machines. 3.2. Electromagnetic Energy Harvesting {#sec3dot2-sensors-18-04113} -------------------------------------- Electromagnetic energy is usually captured from the ambient RF sources which generate high electromagnetic fields, like TV broadcast stations, radar stations, Wi-Fi routers, Bluetooth, global system for mobile communications (GSM) and other communication networks \[[@B69-sensors-18-04113],[@B70-sensors-18-04113],[@B71-sensors-18-04113]\]. RF energy harvesting devices can convert electromagnetic energy into a useful direct current (DC) voltage to power low-power consumer electronics and WSNs. The radio signals have a wide frequency range from 300 GHz to as low as 3 kHz, which are used as a medium to carry energy in a form of electromagnetic radiation. A basic RF energy harvesting system consists of a receiving antenna, matching circuit, rectifier, and power management as shown in [Figure 7](#sensors-18-04113-f007){ref-type="fig"} \[[@B72-sensors-18-04113]\]. The antenna aims to capture electromagnetic waves, and then the matching circuit is used to achieve maximum power by using coils and capacitors. The rectifier circuit can convert the alternating current (AC) signal to a DC one, and finally the voltage output is adjusted using the voltage elevator \[[@B73-sensors-18-04113]\]. Due to the wide coverage of RF, RF energy harvesting is suitable for powering a larger number of devices distributed in a wide area however the energy carried in the far-field RF waveform is limited \[[@B69-sensors-18-04113],[@B74-sensors-18-04113]\]. According to the reference \[[@B69-sensors-18-04113]\], the harvested power from different RF sources is between 1 μW to 189 μW at a frequency of around 900 MHz and a distance of 5 m to 4.1 km. The energy harvesting rate varies significantly depending on the source power and distance. The relationship between received power and distance in the environment of 900 MHz and 2.4 GHz is described in \[[@B73-sensors-18-04113]\] as shown in [Figure 8](#sensors-18-04113-f008){ref-type="fig"}. Zeng et al. \[[@B75-sensors-18-04113]\] summarizes and concludes the radiative wireless power transfer techniques and the novel methods to tackle the challenges (such as more compact antenna equipment, increasing conversion efficiency, minimizing impact on WSNs) in the period of the development of wireless energy harvesting. Popovic et al. \[[@B76-sensors-18-04113]\] has successfully designed and manufactured a RF energy harvester integrated with all functions to harvested the 1.96 GHz and 2.4 GHz radiation energy. As with the development of WSNs, WSN-based Internet of Things (IoT) has improved dramatically, resulting in extended lifespans and a wider range of applications utilizing RF energy harvesting. Nguyen et al. \[[@B77-sensors-18-04113]\] has designed a self-sustainable RF EH algorithm for IoT applications through adapting the EH period according to stochastic characteristics of the traffic load from IoT applications and the incoming RF energy at sensor nodes. Notably, a new relay policy in RF EH for IoT networks has been proposed by Behdad et al. to maximize the network effective lifetime in \[[@B78-sensors-18-04113]\]. Moreover, RF energy harvesting has attracted the investigations on radio-frequency identification (RFID) which consumes low power to identify and track objects' position with passive tags scavenging energy from nearby radio waves \[[@B79-sensors-18-04113],[@B80-sensors-18-04113]\]. However, such RF signals are rarely used in the mechanical systems. The RF sources around machines are usually undesired and thus the potential energy harvested from these RF signals is limited. It is insufficient as a primary power source, but RF energy harvesters can assist other energy generators. Additionally, the RF energy harvesting technology still has a bright prospect due to its rapid development and wide application in wireless networks. 3.3. Thermal Energy Harvesting {#sec3dot3-sensors-18-04113} ------------------------------ In general, heat energy coming from temperature variation in the environment can be scavenged into electricity via some key thermal conversion techniques based on the Seebeck effect \[[@B81-sensors-18-04113],[@B82-sensors-18-04113],[@B83-sensors-18-04113],[@B84-sensors-18-04113]\]. Thermoelectric energy harvesting and pyroelectric energy harvesting, relying on the temperature changing over distance and time, respectively, are the two most commonly used thermal energy harvesting techniques. ### 3.3.1. Thermoelectric Energy Harvesting {#sec3dot3dot1-sensors-18-04113} Thermoelectric energy harvesting \[[@B85-sensors-18-04113]\] is a conventional technique for converting wasted thermal energy into the electrical power by means of thermoelectric generators exploiting the Seebeck effect. A thermoelectric generator consists of a series of PN junctions connected end to end as shown in [Figure 9](#sensors-18-04113-f009){ref-type="fig"}a. Its aim is to increase the action area to increase the amount of the electricity harvested. [Figure 9](#sensors-18-04113-f009){ref-type="fig"}b gives the working principle of each PN junction. When a temperature gradient is established between the hot and cold ends of the ceramic plates, free electrons and holes will move towards their specific directions and generate a potential difference in proportion to the temperature difference between the N-type and P-type semiconductors. This phenomenon is known as the Seebeck effect. Thermoelectric generators are widely utilized in wearable devices because the human body is a constant heat source with a temperature difference with the ambient temperature most of the time \[[@B86-sensors-18-04113]\]. Wearable thermoelectric generators also contribute to clinical medicine through harvesting energy from the human body to support wearable electronics for health condition monitoring to avoid frequent battery replacement \[[@B87-sensors-18-04113],[@B88-sensors-18-04113],[@B89-sensors-18-04113]\]. Since thermoelectric generator is a heat engine, its conversion efficiency is limited by the Carnot cycle efficiency, which is one minus the ratio of the cold and hot temperatures. The generated power is usually insufficient for the requirements of devices. To increase the power output, new thermoelectric generators modules are designed with compact structures \[[@B84-sensors-18-04113],[@B90-sensors-18-04113]\]. Another approach is exploring new high-performance materials. For instance, some designers \[[@B91-sensors-18-04113]\] have fabricated a flexible thermoelectric generator with special N-type and P-type thermoelectric materials relying on nanotechnology and obtained about 23.9 mW power at a 22.5 ℃ temperature difference. Because of its flexibility, this thermoelectric generator attaches to the heat source surface with an increase in the output power. This shows that the nanostructures of thermoelectric converters not only reduce volume and save materials but also effectively improve the performance of traditional thermoelectric generators. According to the advancement of the nanotechnology and fabrication techniques, numerous new promising nanomaterials and the optimisation of structures and circuits \[[@B92-sensors-18-04113],[@B93-sensors-18-04113],[@B94-sensors-18-04113],[@B95-sensors-18-04113]\] have been investigated to improve the thermoelectric harvesters. Proto et al. \[[@B96-sensors-18-04113]\] have provided a comprehensive review on nanogenerators for human body energy harvesting. The machine in service is another heat source with temperature differences from the surroundings. Because of the features of safety, reliability and durability, as well as the extensive existence of temperature difference, thermoelectric generators have been widely applied in vehicles, aerospace, ships and other industrial operations \[[@B48-sensors-18-04113],[@B97-sensors-18-04113],[@B98-sensors-18-04113]\]. Some of the generators aim to reduce fuel consumption and CO~2~ emissions by converting exhaust heat into an alternative energy as an electric power backup. Others are designed to provide electricity for WSNs using for structural health monitoring (SHM) or system condition monitoring of machines \[[@B28-sensors-18-04113],[@B99-sensors-18-04113]\]. It is confirmed that spatial temperature gradients are available, continuous and stable in mechanical systems. More importantly, thermoelectric harvesters have characteristics of high stability, durability and safety. However, relatively low conversion is one of the disadvantages of thermoelectric energy harvesting. It is determined by temperatures of the cold and hot ends, as well as the figure of merit (ZT, properties of thermoelectric material). The maximum of ZT is about 2.6 leading to the maximum thermoelectric conversion rate of about 20% presently \[[@B100-sensors-18-04113]\]. But the development of innovative structures, promising nanotechnology and emerging nanomaterials can promote the conversion rate to achieve high efficiency, flexibility and conformability in the field of machine condition monitoring. Another disadvantage in applying thermoelectric generators is that the temperature difference found in many machine systems is small, leading to small power gains. Even the usage of the heat sink can increase the temperature fluctuation, but the harvesting device may be too bulky and too difficult to install, which is a challenge in designing the structure of thermoelectric generators used for maintenance-free machine condition monitoring in the future. ### 3.3.2. Pyroelectric Energy Harvesting {#sec3dot3dot2-sensors-18-04113} Compared with thermoelectric energy harvesting, an indispensable prerequisite of pyroelectric energy harvesting is temperature fluctuation over time \[[@B10-sensors-18-04113]\]. The phenomenon utilised is that the polarization intensity of some dielectric materials releases charges with temperature fluctuations; this is called the pyroelectric effect \[[@B101-sensors-18-04113]\]. Normally, free electrons and holes generated by the spontaneous polarization of a crystal are respectively neutralized by the holes and free electrons on the surface of the crystal. In certain materials, for example gallium nitride, the polarisation changes as the temperature changes and a voltage appears across the crystal. The conversion efficiency of pyroelectric energy harvesting is much higher than that of thermoelectric energy harvesting, especially using new temperature cycling techniques (like the Olsen cycle \[[@B102-sensors-18-04113]\]). Hence, finding a source of time-varying temperature becomes one of the challenges of pyroelectric energy harvesting. From the references examined, it is clear that researchers are striving to capture temporal temperature gradients in different fields. It is shown in El Fatnani et al. \[[@B103-sensors-18-04113]\] that energy in the form of temperature fluctuations generated by infrared radiation coming from an infrared lamp can be harvested by the pyroelectric effect. This approach also contributes to the enhancement of the autonomous infrared sensors by means of pyroelectric materials. In addition, Ayesha et al. \[[@B104-sensors-18-04113]\] has investigated a commercial patch transducer that can be a self-sustaining pyroelectric generator by taking advantages of temperature gradients caused by the process of breathing. This may be the potential applications on the non-invasive human healthcare monitoring. Similarly, pyroelectric energy harvesting is also appropriate for water splitting through harvesting temperature fluctuations and generating sufficient power \[[@B105-sensors-18-04113],[@B106-sensors-18-04113]\]. In the field of chemistry, Zhao et al. \[[@B107-sensors-18-04113]\] harvests energy from waste heat with a flexible pyroelectric device and successfully operates a temperature sensor to monitor this process in real time. In order to produce a greater temperature difference, some devices with different architectures are designed to directly capture the time-dependent temperature gradient from spatial temperature fluctuations through the movement of the pyroelectric materials. For instance, [Figure 10](#sensors-18-04113-f010){ref-type="fig"}a describes the schematic of a typical pyroelectric energy generator with a bi-metallic cantilever beam construction consisting of two metal electrodes of a capacitor and the pyroelectric dielectric material \[[@B108-sensors-18-04113]\]. One end of the cantilever structure is connected to the hot surface via an anchor, and the other end is connected to two small masses. When the cantilever is heated and bends towards the cold surface, the structure rapidly loses heat and bends back towards the upper hot side. Then the structure rapidly heats and bends away from the hot side. This process subtly converts the spatial temperature gradients into temporal temperature fluctuations of the cantilever structure. To harvest more energy, millions of the millimetre sized converters can be fabricated in 2D arrays to create a much larger device. [Figure 10](#sensors-18-04113-f010){ref-type="fig"}b gives another pyroelectric harvester schematic designed by Cha et al. \[[@B109-sensors-18-04113]\] with liquid-based switchable thermal interfaces for rapid cycling of the pyroelectric polymer film between hot and cold surfaces. Its power density is about 110 mW/cm^3^ at an operating frequency of 1Hz. Zhang et al. \[[@B110-sensors-18-04113]\] adopts a similar structure to fabricate a thin-film pyroelectric generator with the maximal output power of 2.2 μW when the external load was 0.1 mΩ. After reviewing some papers relating to such structures, it is concluded that the challenge of pyroelectric energy harvesting is mainly focused on high-frequency temperature fluctuations and high efficiency of energy extraction cycles. With the development of nanotechnology, thin films, nanowires and nanofibers have been investigated for pyroelectric EH, which gives the opportunity for pyroelectric techniques to be incorporated with other EH approaches \[[@B111-sensors-18-04113]\]. Yang et al. \[[@B112-sensors-18-04113]\] has fabricated the first pyroelectric nanogenerator with the pyroelectric ZnO nanowire arrays to convert the thermoelectric energy into electricity. The designed pyroelectric nanogenerator can drive a liquid crystal display directly and a light-emitting diode with the assistance of a lithium battery, which demonstrated that pyroelectric nanogenerators are the potential applications in self-powered WSNs \[[@B113-sensors-18-04113],[@B114-sensors-18-04113]\]. Moreover, high-temperature resistant nanomaterials are appropriate for extremely harsh environments. Start-up transients or load changes of rotating machinery can supply the temporal temperature fluctuation for pyroelectric generators, but these changing operating states only last a comparatively short time, and storage devices cannot rely on short-term energy collection for a long period of condition monitoring. Hence, thermoelectric and pyroelectric EH techniques mainly focus on the spatial temperature gradient (available in oscillating heat pipes \[[@B115-sensors-18-04113]\], heat exchangers, marine boilers, engine, motors, pumps and compressors). For indoor machines, they play an important role in achieving self-powered WSNs for condition monitoring because of wasted energy existing in the form of heat and supplying sufficient energy for WSNs. Both thermoelectric generators and pyroelectric generators are maintenance-free and have the advantages of long lifetime, lightweight, durability and compactness. However, their cost is relatively high when compared to their power conversion efficiency. The development of nanomaterials may fill this flaw in the future. 3.4. Mechanical Energy Harvesting {#sec3dot4-sensors-18-04113} --------------------------------- Wasted mechanical energy widely exists in the environment, such as human motion, bridge vibrating, vehicle driving, ocean surging, wind blowing, and mechanical rotating. It is a green and sustainable energy source, which can be efficiently captured to generate useful electric power for self-powered devices. Various forms of kinetic energy induced by the motion of objects, elastic potential energy caused by the deformation of objects and electric potential energy resulting from conservative coulomb forces are the main mechanical energy sources found in industrial applications. The primary techniques of energy scavengers will be detailed, and some related research will be reviewed in this subsection. ### 3.4.1. Piezoelectric Energy Harvesting {#sec3dot4dot1-sensors-18-04113} Piezoelectricity, also known as the piezoelectric effect, is a phenomenon converting mechanical energy into electrical energy due to the inherent polarization characteristics of certain crystals \[[@B116-sensors-18-04113]\]. [Figure 11](#sensors-18-04113-f011){ref-type="fig"} shows its working principle that the positive and negative charges are produced on two opposite surfaces of the dielectric when the dielectric is deformed by an external force. Piezoelectric ceramics and polymers are two common representative piezoelectric materials \[[@B117-sensors-18-04113]\]. Piezoelectric generators can convert vibration energy to electrical energy. Piezoceramics have high conversion efficiency leading to the extensive applications in industry and research fields, but they are rigid with low ductility and toughness. Turkmen et al. \[[@B118-sensors-18-04113]\] designed a cymbal type energy harvester with two different piezoelectric ceramics, PZT-5H and PZT-8, and showed that PZT-5H is most suitable for this design. Additionally, some designers have developed a piezoelectric-based electrical model and a prototype device with a cantilever beam structure to power a self-sustaining wireless sensor in heating, ventilation and air conditioning systems \[[@B119-sensors-18-04113]\]. In \[[@B25-sensors-18-04113]\], the kinetic energy of wind, extracted by a wind turbine, is successively converted into the rotational motion of a shaft and linear vibrations with a Scotch yoke mechanism \[[@B25-sensors-18-04113]\]. Then, the vibrations are converted into electricity by the piezoelectric (PZT4)-lever design. The schematic diagram of this piezoelectric wind turbine is described in [Figure 12](#sensors-18-04113-f012){ref-type="fig"}. Conversely, piezopolymers have been successfully utilized in the field of sensors, especially for biomedical sensors, because they are soft, deformable and lightweight, but their conversion efficiency is relatively poor compared with piezoceramics. Three types of portable piezoelectric devices designed with flexible piezoelectric materials by Mutsuda et al. \[[@B120-sensors-18-04113],[@B121-sensors-18-04113]\] can harvest energy from ambient kinetic energy, such as water, wind and other mechanical vibrations. In order to create energy harvesters with high flexibility and efficiency, piezoelectric composites made of piezoceramics and piezopolymers have had rapid development from the 1970s \[[@B122-sensors-18-04113],[@B123-sensors-18-04113]\]. Presently, generators made by piezoelectric composites have a wide range of applications in medical, sensing, measurement and other fields. For example, some researchers have improved a piezoelectric generator with the linear cantilever beam (made by an innovative type of multilayer composite) instead of the lengthening beam to power WSNs in \[[@B124-sensors-18-04113]\]. The power response of the system is up to 2.66 mW/g at a frequency of about 90 Hz, which has significant advantages (about 2.5 times higher) over the classical piezoelectric energy harvester. Wang et al. \[[@B125-sensors-18-04113]\] designed a generator with composite materials to harvest friction induced vibration energy, which offers a new approach to scavenge the wasted vibration energy. To further increase the overall harvesting efficiency of piezoelectric generators, Todaro et al. \[[@B126-sensors-18-04113]\] makes a survey on the current status of micro piezoelectric energy harvesters and focused on two primary challenges, the frequency bandwidth and the conversion efficiency. These challenges also attract the attention of other engineers. For example, a piezoelectric energy harvester is designed and fabricated with two beam structures to bring the second mode frequency closer to the first one with the assistance of a variable cross-section and a tapered cavity to broaden the resonance bands \[[@B127-sensors-18-04113]\]. Orrego et al. \[[@B128-sensors-18-04113]\] has fixed a flexible piezoelectric membrane with self-oscillations in an innovative inverted flag to scavenge wind energy for supporting self-powered devices. For achieving high efficiency of energy harvesting, nanomaterials have been investigated. Briscoe et al. \[[@B129-sensors-18-04113]\] have made a survey of the development process of nanomaterials and nanostructures. Developers from the Chinese Academy of Sciences have designed a nanogenerator with an extra wide response bandwidth of a single cantilever by adding a limiter at one side of the cantilever, and further widened the bandwidth through combining a series of cantilevers with different response bandwidths \[[@B130-sensors-18-04113]\]. Additionally, an innovative MEMS-based energy harvester is explored and fabricated by the integration of strain sensitive nanocomposite materials and MEMS devices in \[[@B131-sensors-18-04113]\]. A potentially fatal flaw of piezoelectric materials is that the performance of materials will gradually degrade, leading to lower conversion efficiency and lower power output with the time. Wireless condition monitoring systems powered by the converted electricity are prone to failure because of the insufficient power supplied. The few suitable materials and the complicated fabrication process are the key problems that need to be solved before piezoelectric generators become an efficient commercial product. Furthermore, the improvement of piezoelectric generator structures is a tremendous challenge aiming at selecting its resonant frequency in the frequency band with energy concentration or working at a wide resonance bandwidth. In a word, the piezoelectric EH technique has a bright and promising future in machine condition monitoring if the aforementioned challenges can be addressed. ### 3.4.2. Electromagnetic Energy Harvesting {#sec3dot4dot2-sensors-18-04113} Electromagnetic induction refers to a part of the conductor in a closed-circuit which cuts magnetic flux in a non-parallel direction to generate an induced current in the circuit. In other words, the wasted kinetic energy can be converted into electricity based on the conversion mechanisms with the assistance of magnetic fields for small-scale autonomous powered devices. The disadvantages of electromagnetic generators are the mismatching of electromagnetic generators' resonance frequencies with external vibration sources and the narrow response frequency band. As the external vibration source is random and non-stationary, the output power will be dramatically decreased if the matching frequency has a slight offset \[[@B11-sensors-18-04113]\]. A mathematical model is built by Bernal and García \[[@B132-sensors-18-04113]\] to study the interaction between electromagnetic induction and damping, and also the relationship between dimensions and energy output. Meanwhile, Cooley has analysed and verified the mechanisms and dynamics of vibrational electromagnetic energy harvesters by means of matrix operator form representing the eigenvalue problem of harvesters \[[@B133-sensors-18-04113]\]. The results show that eigenvectors with strong electromechanical coupling usually generate large average power output. During the circuit design process, it should be paid attention that the inductance, resistance, and capacitance have effects on the eigenvalues and dynamic response of harvesters. For further understanding of the electromagnetic energy harvesting, Naifar et al. \[[@B134-sensors-18-04113]\] summarizes a substantial amount of literature published during recent years and gives details of the principle behind electromagnetic generators. They present many electromagnetic prototypes and classify them by the different harvester architectures (like the cantilever, magnetic spring and rotary pendulum). [Table 5](#sensors-18-04113-t005){ref-type="table"} lists several electromagnetic generators designed in these years and compares their performance based on power density and features. It is reported that most of the generators work in a narrow and low-frequency band. Moreover, the magnitude of the power density varies greatly, even for those that approximate the response frequencies and accelerations of the energy source. From the references, most of electromagnetic generators can convert kinetic energy into a considerable amount of energy (generally at milliwatt level) at a low-frequency band of vibration with relatively low fabrication cost. However, the increase of the internal resistance caused by the micro-coil leads to inevitable power consumption, which may affect the output power of the electromagnetic generators. In addition, the size of the coils makes the microscale electromagnetic generator fabrication difficult to implement at present. There are also obstacles to integrate them with MEMS, which restricts the widespread applications of electromagnetic generators. ### 3.4.3. Triboelectric Energy Harvesting {#sec3dot4dot3-sensors-18-04113} Two objects manufactured with different materials can generate electron flow in a specific direction when they periodically contact or separate from each other by external forces. This electricity production process is called the triboelectric effect which is illustrated in [Figure 13](#sensors-18-04113-f013){ref-type="fig"} \[[@B144-sensors-18-04113]\]. External mechanical energy can be converted into electricity based on the triboelectric effect. Wang, in his reviewer paper \[[@B145-sensors-18-04113]\], gave a particular table of triboelectric series which shows the order of various materials arranged according to their ability to donate or accept electrons in his review. The triboelectric EH technique was developed later than other technologies. Many engineers have investigated triboelectric generators because of the ubiquitous ambient motions (such as wind or water flow \[[@B146-sensors-18-04113],[@B147-sensors-18-04113],[@B148-sensors-18-04113]\] and human motion \[[@B149-sensors-18-04113],[@B150-sensors-18-04113]\]) and generators' characteristics of scalability, reliability, high efficiency and low cost \[[@B151-sensors-18-04113],[@B152-sensors-18-04113]\]. Ref \[[@B153-sensors-18-04113],[@B154-sensors-18-04113]\] describe two triboelectric harvesters designed and fabricated with similar structures, an integrated Zigzag shape and a stacked X-shape,. The power density can reach up to 27.96 mW/cm^2^ and 542.22 μW/cm^2^, respectively. Additionally, an ultra-soft and cuttable paper-based harvester is made with cheap commercial materials to scavenge the energy associated with the body's motion, sound energy and wind energy in \[[@B155-sensors-18-04113]\]. Another powerful triboelectric generator with the compressible hexagonal structure is designed and installed inside the car tire to power a wireless tire pressure sensor by Guo et al. \[[@B156-sensors-18-04113]\]. Moreover, some researchers have found success in triboelectric harvesters using rotational energy because of less abrasion of materials. For example, Xie et al. \[[@B157-sensors-18-04113]\], Zhu et al. \[[@B158-sensors-18-04113]\] and Ahmed et al. \[[@B159-sensors-18-04113]\] designed three different rotating triboelectric generators respectively and all three prototypes show high performance in harvesting wind energy. A novel linear-grating triboelectric generator is proposed by Zhu et al. \[[@B160-sensors-18-04113]\], which can be manufactured as three different configurations to harvest energy from rotation, rolling and linear piston motion. Yang et al. \[[@B161-sensors-18-04113]\] describes a model designed for rotating machinery. [Figure 14](#sensors-18-04113-f014){ref-type="fig"} shows its architecture consisting of six contact-separation mode triboelectric units shown in [Figure 14](#sensors-18-04113-f014){ref-type="fig"}a, and three electromagnetic and triboelectric hybrid units shown in [Figure 14](#sensors-18-04113-f014){ref-type="fig"}b. The fabricated prototype works with the gear transmission structure to implement EH on the rotating machines. Generally, triboelectric energy harvesting is combined with other technologies to capture enough energy to support the actions of wireless monitoring systems, such as \[[@B162-sensors-18-04113]\]. From the references, it is apparent that triboelectric harvesters are normally designed as nanogenerators with advantages of robustness, easy integration, high conversion efficiency and low cost. However, the friction and the inevitable wear of the two triboelectric layers results in a limited lifetime, also rotating contact can reduce the material losses to some degree. The wear of materials leads to lower conversion efficiency and gradually cannot meet the energy requirement. Furthermore, heat generated by the wear may cause catastrophic accidents in some environments. ### 3.4.4. Electrostatic Energy Harvesting {#sec3dot4dot4-sensors-18-04113} The working principle of the electrostatic EH is based on the variation of the capacitance, which converts mechanical energy into electrical form. The electrostatic EH is mainly achieved by using a parallel plate capacitor with one plate fixed and the other one movable. Consequently, the electrostatic EH can be more specifically named electrostatic kinetic EH, which mainly harvests the vibration energy in the machines. The vibration can provide great opportunities for EH since these are present in all machines to some degree. Generally, the electrostatic EH device consists of a resonator, a variable capacitor and a conditioning circuit, which is shown in [Figure 15](#sensors-18-04113-f015){ref-type="fig"} \[[@B163-sensors-18-04113]\]. To activate the electrostatic generator, the charge is injected into the capacitor at maximum capacitance and pulled off at minimum capacitance. The change of the gap between the electrode of the variable capacitor can generate the electric outputs. The mass of the movable electrode, the spring and the damper form a resonator. The resonator can constrain the motion of the movable electrode of the capacitor and capture the external vibration at a certain range of the frequency band in high efficiency, usually at the natural frequencies of the resonator. The implementation of electrostatic generator usually needs a DC to DC converter for extracting energy and furthermore, the operation of the converter has to be carefully synchronized at certain instants of the vibration cycle. The electrostatic generators can be widely applied in various scale machines. Numerous applications of the electrostatic EH have been developed to harvest the mechanical vibration energy. Most of the electrostatic generators are based on a single variable capacitor. The electrostatic EH working principle shows that the harvesting system requires an external power source to polarise the capacitance or an electret material that induces charges spontaneously \[[@B163-sensors-18-04113]\]. A passive electrostatic device can be applied as an auxiliary to an external power supply, but it is difficult to implement a maintenance-free sensor node \[[@B164-sensors-18-04113]\]. With the electrets, the drawback is that charges cannot exceed a maximum threshold as it will reduce the conversion efficiency and retain the charges for a limited time. With advanced MEMS technology, some designers \[[@B165-sensors-18-04113],[@B166-sensors-18-04113]\] have investigated and manufactured electret-based electrostatic generators, but only achieving microwatt power levels. Miyazaki et al. \[[@B167-sensors-18-04113]\] has proposed an electrostatic generator which delivers 120 nW energy at the conversion efficiency of 21% with the excitation frequency of 45 Hz. Yen and Lang \[[@B168-sensors-18-04113]\] have developed an asynchronous diode-based charge pump-based electrostatic harvester, which can generate 1.8 μW outputs. To overcome the pre-charging problem, the idea of the ''doubler of electricity'' or ''Bennet's doubler'' is adapted to eliminating the need of batteries or other devices for pre-charging \[[@B169-sensors-18-04113],[@B170-sensors-18-04113],[@B171-sensors-18-04113]\]. Although the researchers have designed various circuit structures to exclude the external power supply requirements, the low output power means that electrostatic EH technology cannot be used alone in the process of self-powered WSN-based machine condition monitoring. Through making a survey on various techniques and prototypes for mechanical EH, it is shown clearly that structures of mechanical energy harvesters are complicated and with finite lifespan caused by the deformation and abrasion. In addition, the vibration energy is limited and most of the rotational energy is not wasted energy. Therefore, the mechanical EH harvesters are suitable only as auxiliary for thermal EH devices to supply power for WSNs. 3.5. Hybrid Energy Harvesting {#sec3dot5-sensors-18-04113} ----------------------------- EH technologies are classified based on different energy sources. Their working principles and generator prototypes investigated by researchers have been detailed above. The pros and cons of the aforementioned generators are thoroughly summarized and compared in [Table 6](#sensors-18-04113-t006){ref-type="table"} and [Table 7](#sensors-18-04113-t007){ref-type="table"}. To obtain sufficient power to implement self-powered or maintenance-free devices, multiple types of energy harvested by hybrid technologies have become the recent trend with the advancement of nanotechnology and fabrication technologies. The combination of different technologies can enhance their merits and overcome shortfalls. A common improvement is the combination of two technologies. For instance, Bito et al. \[[@B172-sensors-18-04113]\] packages a hybrid and efficient generator to convert room light irradiation and electromagnetic waves into electricity to power internet of things (IoT) wireless sensors with the assistance of a solar cell and RF energy harvesting techniques. Additionally, Guo et al. \[[@B173-sensors-18-04113]\] designed a waterproof generator based on triboelectric and electromagnetic mechanisms which can be applied in harsh environments. A hybrid triboelectric and electromagnetic generator fabricated by Zhu et al. \[[@B174-sensors-18-04113]\] can generate microlevel power density when it operates within a broad bandwidth (10-45 Hz). Similarly, for harvesting automobile rotational energy from the brake, Han et al. \[[@B175-sensors-18-04113]\] has explored a generator with a six blade structure which uses triboelectric and electrostatic induction under the disc contact during the braking action and non-contact modes, respectively. A triboelectric generator can also be combined with a piezoelectric one. Yang et al. \[[@B52-sensors-18-04113]\] has simulated a hybrid triboelectric-piezoelectric harvester model and analyzed the effect of parameter setting on maximum power output. This study can support the guidance of effective and efficient harvester design in future. Moreover, combining piezoelectric and electromagnetic mechanisms, the authors in \[[@B176-sensors-18-04113]\] have invented and fabricated a hybrid generator by calculating the model parameters in advance. The generator can scavenge adequate power (up to 2.214 mW) from bridge vibrations and the surrounding wind flow to support the operation of WSN for bridge health monitoring. In the literature, there are numerous examples of the integration of more than two EH technologies. For instance, the magnetic, thermal and mechanical energy were scavenged by electromagnetic, thermoelectric, and piezoelectric techniques implemented in a hybrid scheme to supply enough power for power grid condition monitoring using ZigBee sensor nodes \[[@B178-sensors-18-04113]\]. Triboelectrification, piezoelectricity and electromagnetics were incorporated to achieve a hybrid nanogenerator with high sensitivity, efficiency and stable power consumption for transmission of temperature and vibration signals \[[@B27-sensors-18-04113]\]. Hybrid energy harvesters provide reliable and stable power backup support for the self-sustainable WSNs. But the implementation of a hybrid energy harvester, like other individual energy harvesters, requires a power management circuit and should have a multiple-input power converter \[[@B179-sensors-18-04113]\] to obtain a regulated desired voltage level to power WSNs and store excess electricity. Because different sources with EH technologies produce voltages and currents with different characteristics, such as a thermoelectric generator (which produces very low output voltages \[[@B180-sensors-18-04113]\]) or a piezoelectric generator (which provides sinusoidal sources and needs to be rectified \[[@B181-sensors-18-04113]\]). Some researchers have explored various effective integrated circuits of AC/DC or DC/DC converters. For example, a converter is developed for working on the condition and combination of energy generated with photovoltaic and thermoelectric harvesters \[[@B182-sensors-18-04113]\]. Another converter is designed to regulate and combine the energy harvested with piezoelectric EH and thermoelectric EH technologies to successfully support the operation of ECG processor in wearable electronics in \[[@B183-sensors-18-04113]\]. Dini et al. \[[@B180-sensors-18-04113]\] has investigated an autonomous power converter which can be used for single or multiple sources and achieved the conversion efficiency up to 89.6%. In general, most converters implement single-source voltage conversion and energy storage. Converters used for multi-source energy harvesting should be designed according to the requirements because the conversion efficiency of autonomous converters is not high. As a result, the improvement of power management converters is beneficial for the application of EH for self-sustainable WSNs in machine condition monitoring. As mentioned previously, with the drive of the hybrid EH technique integration and the limitation of the device volume, nanogenerators are a promising industry developing at a rapid pace. They are expected to provide effective and efficient solutions for self-powered WSNs due to the characteristics of flexibility, lightweight and integrability \[[@B59-sensors-18-04113],[@B184-sensors-18-04113]\]. The statistics made by Wang et al. \[[@B185-sensors-18-04113]\] reports that nanogenerator technology is rapidly developing as an emerging technology in China. Chen et al. \[[@B186-sensors-18-04113]\] has devised and made a triboelectric-piezoelectric nanogenerator based on flexible fibres to attach to a soft surface to harvest kinetic energy. However, some critical challenges have a significant influence on large-scale industrial production and applications, such as the acquisition and lifespan of nanomaterials, development of nanotechnology, optimization of the nanostructure and conversion ratio of nanogenerators. There are lots of difficulties and barriers waiting for solutions during the development process of nanogenerators. 4. Wireless Sensor Network based Machine Condition Monitoring {#sec4-sensors-18-04113} ============================================================= Failure induced by various factors like improper installation, unsuitable temperature, corrosion, abrasion, fatigue, oil debris and occurred on components (such as motors, generators, engines, pumps, bearings, gears and shafts) of engineering systems can unexpectedly cause machinery to collapse and lead to significant losses for industries \[[@B1-sensors-18-04113]\]. Therefore, the maintenance of machinery plays a vital role in industries and has been studied by researchers for decades. There are three common maintenance strategies arranged in order of progression: breakdown maintenance, preventive maintenance and predictive maintenance \[[@B187-sensors-18-04113]\]. Breakdown maintenance is an unplanned maintenance way to maintain the damaged machines through the component repair or direct replacement, which seriously affects the continuity of industrial production and brings dramatically high maintenance costs. As a planned maintenance form, preventive maintenance is carried out according to the regular and periodic inspection and maintenance to detect and avoid issues before failures or breakdowns happen. Although this approach reduces the frequency of catastrophic failures and increases the reliability of systems, the operation of setting an optimal inspection period is complicated and frequent change of components is costly. In order to improve the stability of mechanical systems and reduce the economic losses and costs induced due to failures and breakdowns, an intelligent and effective maintenance strategy, predictive maintenance, needs to be established to prevent the occurrence of failures by relying on many techniques, such as thermal imaging, lubricant analysis and vibration characteristics \[[@B188-sensors-18-04113]\]. Condition-based maintenance (CBM) is an effective and efficient strategy of predictive maintenance. It relies on the assessment of machine operating condition to determine whether the components require maintenance or not to enhance the stability and reliability of mechanical systems, minimise the labour and material resource costs, as well as improve the operating safety. First, raw data sets representing the condition of machinery (like temperatures, pressure, torques, vibrations, displacements, acoustics and acoustic emission) are collected by a variety of sensors (like thermocouples, pressure gauges, microphones and accelerometers) and saved in the storage devices through data acquisition devices. Then, the data sets are processed to present the machine conditions by various techniques. These signal processing methods in condition monitoring mainly consist of feature extraction, modelling and machine learning as shown in [Table 8](#sensors-18-04113-t008){ref-type="table"}. Finally, decision making can give the recommendation of maintenance actions to prevent deterioration through fault diagnosis which is a process of determining health, faults and even their severity of systems being monitored. CBM has advantages of enhancing machinery reliability, minimizing the maintenance time, saving the labour costs, improving the operating safety and guaranteeing the work continuity through reducing unscheduled downtime caused by catastrophic failures. But, the cost of purchase and installation for monitoring hardware (like acoustic emission transducers, piezoelectric sensors and data acquisition devices) and software is expensive. To solve this problem, WSNs have been focused and considered to utilize in the machine condition monitoring area because the sensors and wireless sensor nodes are economical, easy to operate, programmable, integrated, portable and with small sizes and low consumption. Additionally, the application of WSNs can avoid the cumbersome cable distribution and harsh environment restrictions and play an essential role in the realization of remote real-time condition monitoring of mechanical systems. However, WSNs have a fatal drawback compared with the conventional wired condition monitoring systems that the prevalent application of WSNs in machine condition monitoring is limited by the finite lifespan and capacity of traditional batteries. It is inconvenient to recharge or replace the exhausted batteries in a remote or inaccessible position, and it leads to the machine condition monitoring interruptions and wastes the labour and resources. Therefore, the wasted energy from machines or surrounding environments is attractive for researchers to harvest for powering the sensor nodes with EH technologies introduced previously. This approach substantially prolongs the life of sensing nodes and reduces maintenance costs of the monitoring system and the environmental contamination. The potential recyclable energy sources in or around mechanical systems and corresponding EH technologies have been discussed in detail in [Section 2](#sec2-sensors-18-04113){ref-type="sec"} and [Section 3](#sec3-sensors-18-04113){ref-type="sec"}, respectively. Several examples for various EH technologies are successfully applied in the WSN-based machine condition monitoring and these representative cases are demonstrated as follows to illustrate their prospects in self-powered WSNs in remote online machine condition monitoring. As the external energy sources of mechanical systems, light energy and RF energy are seldom harvested in the period of machine condition monitoring. The photovoltaic EH technology is primarily applied for large-scale power generation and infrequently used for machine condition monitoring at present. Only few references can be reviewed here. Wang et al. \[[@B192-sensors-18-04113]\] designed a multi-source (vibration, heat and light) energy harvester with piezoelectric, thermoelectric and photovoltaic EH technologies to power the WSN based acoustic emission sensing systems to successfully monitor the condition of the fear of a gas compressor. The manufactured prototype can generate 1.56 mW and 3.37 mW from 0.048 g vibration energy and thermoelectric energy of 62 ℃, respectively. Some researchers have investigated a WSN to detect the acceleration of the helicopter with the sensor nodes fed by the electricity harvested from the environment by a commercial RF energy harvester \[[@B193-sensors-18-04113]\]. The distance between the tower antenna and the helicopters is about 76 m and the output DC power is about 70 µW. As a result, the solar energy is suitable to be harvested to power large-scale outdoor machines efficiently and effectively. The indoor light EH and RF EH can be considered as the supplement of other EH technologies. The internal energy sources are available and widely utilized for machine condition monitoring. For example, researchers at the University of Huddersfield designed a thermoelectric generator device, shown in [Figure 16](#sensors-18-04113-f016){ref-type="fig"} and installed on the surface of the gearbox housing in [Figure 4](#sensors-18-04113-f004){ref-type="fig"}b, to harvest energy from the temperature gradient between the housing of the gearbox and the ambient temperature for powering a WSN system \[[@B51-sensors-18-04113]\]. The temperatures of the ambient, gearbox surface and oil were simultaneously captured for the gearbox condition monitoring and fault diagnosis. Wu et al. \[[@B194-sensors-18-04113]\] has established a mathematical model for evaluating the performance of the segmented thermoelectric generator by considering multiple parameters and then analyzed its efficiency and feasibility on a gas turbine operating at high temperature. After that, they designed a prototype with the segmented thermoelectric generators based on theoretical analysis to continuously and steadily power the sensing and monitoring system with the energy harvested from the hot surface of the gas turbine. According to the aforementioned analysis of mechanical kinetic energy sources, several application examples of the piezoelectric generators are cited to validate the effectiveness and availability in machine condition monitoring and fault diagnosis. In 2005, Plessis et al. \[[@B195-sensors-18-04113]\] has evaluated the output power of a packaged piezoelectric generators with the cantilever architecture and monitors machinery health condition with wireless sensor nodes powered by the piezoelectric generator. In the same period, Discenzo et al. \[[@B196-sensors-18-04113]\] has proposed a self-powered WSN to monitor shipboard fluid pump condition in a terrible environment. A piezoelectric harvester is made to charge two lithium batteries to support the acquisition of vibration signals at 1 kHz and subsequent data processing and transmission. In addition, a piezoelectric generator is designed and tested both in the laboratory and on a large-scale turbo generator \[[@B197-sensors-18-04113]\]. However, the result is not satisfactory because the power (microwatts) obtained on the real turbo generator are much lower than the power (milliwatts) collected in the laboratory. This conclusion explains that the resonant frequency of the piezoelectric generator system should be consistent with that of the mechanical system for optimum performance. Then, some electromagnetic generators applied in the field of machinery are focused to be introduced and discussed. In 2013, Waterbury and Wright \[[@B198-sensors-18-04113]\] have investigated an electromagnetic generator, converting electricity from vibrations of large industrial pump motors, to support a self-sustaining wireless condition monitoring system. Another electromagnetic generator was made to scavenge rotating kinetic energy for powering a long-lasting CC2420 with a ZigBee module used for condition monitoring of the metal milling-processes and cutters in \[[@B199-sensors-18-04113]\]. In addition, two types of electromagnetic generators are designed based on resonance and magnetic levitation respectively by Gao et al. \[[@B200-sensors-18-04113]\]. The two electromagnetic generators are compared in [Figure 17](#sensors-18-04113-f017){ref-type="fig"}. They are installed on the railway and harvested energy industrial pump motors, to support a self-sustaining wireless condition monitoring system. Another electromagnetic generator is made to scavenge rotating kinetic energy for powering a long-lasting when the train passed through. Additionally, the designers have further studied how to achieve a maintenance-free wireless monitor system with the assistance of a magnetic levitation harvester \[[@B201-sensors-18-04113]\]. Another successful case for monitoring the condition of induction machine rotor is designed by Fernandes et al. \[[@B202-sensors-18-04113]\], and the fabricated magnetic generator successfully powered the NRF24L01 module for transferring the temperature characteristic of the motor. Compared to the generators operating at extra low frequencies, another electromagnetic generator with the resonance at a fixed frequency of 200 Hz has been explored by Syed et al. \[[@B203-sensors-18-04113]\] and installed on an industrial centrifugal pump to successfully power wireless sensors for condition monitoring. In order to overcome the narrow resonance frequency bands of electromagnetic generators, Wei et al. \[[@B204-sensors-18-04113]\] designed a nonlinear vibration-based EH system model with a first order lever structure relying on an electromagnetic generator. The in-plane schematic representations of two consecutive operation states are shown in [Figure 18](#sensors-18-04113-f018){ref-type="fig"}. The advantage of this design is that it may be tuned to a particular source and it has the ability to collect random noise energy. The main disadvantage of these models is the large and bulky volume. Some investigators are committed to collecting wasted mechanical energy with multiple technology integration. An integrated generator, consisting of six acrylic hexagonal prisms, a cylindrical mass and a magnet (working as six triboelectric harvesters and an electromagnetic one), is designed and installed on an automobile wheel to convert rotational energy of the wheel into electricity in \[[@B205-sensors-18-04113]\]. In addition, some engineers designed a system to harvest vibrational, thermal and light energy for establishing a rotating machine monitoring system based on acoustic emission signals \[[@B184-sensors-18-04113]\]. ZigBee was selected as the transmission technology in this instance. Most of the models reviewed in this section are designed for monitoring the condition of machine systems with self-powered WSNs. However, the application of EH technologies in other fields is much more practical and prevalent. These designs can give some inspiration for applications of the individual or hybrid EH technologies in machine condition monitoring systems. It can be confirmed that ZigBee is utilized as a transmission method at a higher reliability now. But with the development of Wi-Fi and BLE, especially BLE 5, they will dominate in the market of machine condition monitoring in the future because they have advantages of low power consumption, fast transmission speed, long transmission distance, low cost and high stability. 5. Challenges and Future Research {#sec5-sensors-18-04113} ================================= Aimed at developing a generalised or configurable WSN based machine condition monitoring systems, this review has revisited different up-to-date energy harvesting principles and prototypes along with an examination of their advantages and disadvantages in terms of energy capacities, fabrication and efficiency. It was found that their performances including harvesting capacities depends on materials used, structural designs and energy resources available. In order to increase the power capacity harvested by effective generators using different technologies, the challenges are summarized in the following five points.The first challenge is the selection and optimization of the WSN. This is the trade-off between data processing and transmission in a WSN node. The advent of BLE 5.0 brings an opportunity for large data transmission with long transmission distance and low power consumption, as well as Wi-Fi. The design of WSNs is not limited to using ZigBee in the future. The ultra-low-power MEMS components with data acquisition, transmission, processing and other functions, as important components, should be improved further.The discovery and selection of energy sources that can be exploited with energy harvesters in mechanical systems is the second challenge. Although the recoverable energy in mechanical systems has been analysed in this paper, the energy losses, mechanical structures and environment for various types of machines are different. This obstacle increases the difficulty of the energy harvesting estimation. It is necessary to design adaptive energy harvesting devices or systems for a variety of applications of monitoring different machines.The next challenge is the improvement and optimization of EH technologies and devices. The energy loss during mechanical operation is mainly dissipated by thermal energy. Both the spatial and the temporal temperature fluctuations are small, and the conversion efficiency of thermal EH technologies is relatively low. Hence the thermal energy harvesting technologies need to be improved to reduce the limitation of temperature cycling techniques and to obtain more effective and efficient energy conversion. Because of the drawbacks of each EH technology, it is necessary to continuously improve the performance of the EH devices by the structural optimization of the systems. For example, it is challenging to design a harvester with an adjustable and flexible structure that can select the optimal frequency band according to the energy distribution of a mechanical system in the frequency domain.The design and optimization of power management circuits is also an important challenge because improving the conversion efficiency of the circuits can effectively and efficiently increase the DC output power, especially for the multi-source energy harvesters.The last challenge is the application of nanomaterials and nanotechnology on energy harvesting (nanogenerators). The emergence of nanomaterials has contributed to the integration of multiple energy harvesting technologies to increase the amount of electricity collected. With the help of nanomaterials, micro-scale wireless sensor nodes can be located inside the machine to acquire more accurate signals because the sensor is closer to the potential fault source and the effect of noise is reduced. However, nanomaterials also face the abrasion and performance degradation of materials like other conventional materials. Therefore, researchers should continue to make efforts to improve the durability and efficiency of nanomaterials to extend the lifespan of the harvesters and realize real maintenance-free WSNs for machine condition monitoring. 6. Conclusions {#sec6-sensors-18-04113} ============== This paper gives an overview of a comprehensive range of promising energy harvesting technologies and systems for achieving self-powered WSNs in machine condition monitoring. After discussing the characteristics of the traditional wireless transmission technologies and power consumption of some typical modules, it is evident that ZigBee is prevalent in self-powered WSNs presently. But Wi-Fi and BLE are becoming more competitive as their rapid development. The internal and external energy sources for mechanical systems employed separately or simultaneously have the ability to provide enough electricity for self-powered WSNs in machine condition monitoring. Photovoltaic cells can be applied to outdoor machines and RF energy harvesters mainly work with other types of harvesters or for ultra-low power devices. The thermal energy harvesters, specially designed with nanomaterials and nanostructures, are considered to be the main EH devices to feed WSNs for achieving maintenance-free machine condition monitoring because a large amount of energy converted into heat energy existing in mechanical systems. Mechanical energy harvesters are commonly used in WSNs in various fields due to their features of high efficiency and low cost. However, their structures are complicated and have a finite lifespan caused by the deformation and abrasion. Therefore, the mechanical EH harvesters are suitable as the auxiliary for thermal EH devices to supply power for WSNs. The pros and cons of different energy harvesting technologies have been made clear. Lower conversion efficiency is a major limitation of thermal EH technologies. Additionally, the abrasion and performance degradation of materials becomes a crucial challenge to mechanical energy harvesting techniques. As a result, hybrid energy harvesters are widely investigated by researchers and will dominate the market in the future. In addition, the design and optimization of power management circuits should be considered to improve their conversion efficiency to effectively and efficiently increase the DC output power and supply sufficient power for WSNs. In terms of the development of energy harvesting technologies in machine condition monitoring, the future research mainly focuses on the development of adaptive harvesters, as well as the durability and efficiency of nanomaterials or nanogenerators. Fabrication technology and nanotechnology offer an opportunity to integrate the energy harvester with ultra-low power WSNs to monitor accurately the condition of machines online. The authors would like to express appreciation for the support from the China Scholarship Council (CSC) and the Centre for Efficiency and Performance Engineering (CEPE) in the University of Huddersfield. For this review article, the authors' contributions are provided as follows: Conceptualization, X.T., F.G. and X.W.; Formal Analysis, X.T.; Investigation, X.T., F.G. and X.W.; Resources, X.T.; Writing-Original Draft Preparation, X.T.; Proofreading, R.C. and F.G.; Supervision, F.G. and A.D.B. This research was funded by the Natural Science Foundation of Hunan Province, China (Grant No. 2017JJ3327). The authors declare no conflict of interest. ![Wireless sensor nodes powered with energy harvesting techniques.](sensors-18-04113-g001){#sensors-18-04113-f001} ![Potential energy-harvesting sources in mechanical systems.](sensors-18-04113-g002){#sensors-18-04113-f002} ![Energy efficiency of engines: (**a**) a typical diesel engine in 2009; (**b**) Wärtsilä engine fuel efficiency development.](sensors-18-04113-g003){#sensors-18-04113-f003} ![Local thermal imaging of mechanical components: (**a**) Motor; (**b**) Gearbox housing.](sensors-18-04113-g004){#sensors-18-04113-f004} ![Working principle of photovoltaic cells.](sensors-18-04113-g005){#sensors-18-04113-f005} ![Relationship between the solar cell outputs and illuminance: (**a**) Indoor illumination; (**b**) Outdoor illumination.](sensors-18-04113-g006){#sensors-18-04113-f006} ![Structure of RF energy harvesters.](sensors-18-04113-g007){#sensors-18-04113-f007} ![Relationship between received power and distance for RF energy harvesting.](sensors-18-04113-g008){#sensors-18-04113-f008} ![Thermoelectric generators: (**a**) Typical structure; (**b**) Seebeck effect.](sensors-18-04113-g009){#sensors-18-04113-f009} ![Schematics of typical pyroelectric generators: (**a**) Cantilever structure; (**b**) With liquid-based surfaces](sensors-18-04113-g010){#sensors-18-04113-f010} ![Direct piezoelectric effect principle.](sensors-18-04113-g011){#sensors-18-04113-f011} ![Schematic of a piezoelectric wind turbine: an internal structure of the device.](sensors-18-04113-g012){#sensors-18-04113-f012} ![Working principle of the triboelectric effect.](sensors-18-04113-g013){#sensors-18-04113-f013} ![Structure of the designed hybridized generator: (**a**) Triboelectric generator unit; (**b**) Hybrid unit.](sensors-18-04113-g014){#sensors-18-04113-f014} ![Schematic of an electrostatic energy harvester.](sensors-18-04113-g015){#sensors-18-04113-f015} ![Schematic diagram of the designed thermoelectric generator device.](sensors-18-04113-g016){#sensors-18-04113-f016} ![Electromagnetic energy harvesters: resonant Harvester A and magnetic levitation Harvester B.](sensors-18-04113-g017){#sensors-18-04113-f017} ![Schematic diagram of the designed nonlinear energy harvesting system: (**a**) State 1; (**b**) State 2.](sensors-18-04113-g018){#sensors-18-04113-f018} sensors-18-04113-t001_Table 1 ###### Comparison of traditional wireless transmission technologies. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Technology Transmission Rate (bps) Transmission Distance Power Consumption Features ----------------------------------------------------------------------------------------------------------------------------- ------------------------- ------------------------------ ------------------- ---------- ------ --------------------------------------------------------------------------------------------------- Low power Wi-Fi (802.11g) \[[@B31-sensors-18-04113]\] 54 M 1 km 300 350 270 High speed, high power consumption and high reliability. BLE 5.0 2 M Up to 300 m in theory \- \- \- High speed, long distance, wide bandwidth, ultra-low power consumption and high compatibility. BLE 4.2\ 1 M Up to 100 m,\ 8 60 53 Low power consumption, low cost, high security and low latency. \[[@B32-sensors-18-04113],[@B33-sensors-18-04113],[@B34-sensors-18-04113],[@B35-sensors-18-04113]\] Normally operate within 10 m ZigBee\ 250 k 10 to 100 m 4 72 84 Low power consumption, low cost, low complexity and self-organization. \[[@B31-sensors-18-04113],[@B32-sensors-18-04113],[@B33-sensors-18-04113],[@B34-sensors-18-04113],[@B35-sensors-18-04113]\] EnOcean \[[@B36-sensors-18-04113]\] 125 k Up to 30 m 0.60 99.0 72.0 Energy harvesting based and ultra-low power consumption. Z-wave \[[@B33-sensors-18-04113],[@B36-sensors-18-04113]\] 40 k Indoor: 30 m or 40 m\ 3 70 65 RF-based, low cost, low power consumption, low radiation, anti-interference and high reliability. Outdoor: 100 m ANT \[[@B33-sensors-18-04113],[@B34-sensors-18-04113]\] 60 k 30 m at 0 dBm 3 110 75 Utra-low power consumption, high flexibility and proprietary. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- sensors-18-04113-t002_Table 2 ###### Typical wireless communication modules and parameters. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------- Wireless Transmit Module Microcontroller Unit (MCU) Data Rate (bps) Power Consumption ------------------------ ----------------------------------------- ------------------------------------------- ----------------- ------------------- --------- -------- Wi-Fi (802.11g) ESP8266 32-bit Tensilica L106 @ 80 MHz or 160 MHz 72.2 M 45 420 168 CC3200 Wi-Fi Subsystem 32-bit ARM Cortex-M4 @ 80 MHz 54 M 43.92 990 201.6.4 SPWF01SA 32-bit STM32 ARM Cortex-M3 @ 120MHz 54 M 49.5 1115.4 346.5 BLE 5 nRF52840 32-bit ARM Cortex-M4F @ 64MHz 2 M 2.1 × 10^−3^ 40.8 19.2 CC2640R2F 32-bit ARM Cortex-M0 @ 32 MHz 2 M 9 × 10^−3^ 27.3 18.3 CC2650 RF Core 32-bit ARM Cortex-M0 @ 32 MHz 1 M 8.1 × 10^−3^ 27.3 18.3 BLE 4.2 RN4871 8-bit Microchip 8051 @ 16 MHz 10 k \- 39 39 PAN1760A 32-bit ARM Cortex-M0 @ 32 MHz 115.2 k 1.65 × 10^−4^ 10.89 10.89 ZigBee XB24-AUI-001 \- 250 k \- 148.5 165 ATSAMR21B18 32-bit ATSAMR21 ARM Cortex-M0+ @ 48 MHz \- 8.1 × 10^−3^ 41.4 35.4 Z-Wave ZM5304 8-bit Microchip 8051\ 9.6/40/100k 5.61 × 10^−3^ 140.91 107.91 @ 16 MHz ----------------------------------------------------------------------------------------------------------------------------------------------------------------------- Please refer to the datasheets for various modules. sensors-18-04113-t003_Table 3 ###### Typical microprocessor modules and parameters. Microprocessor Data Bus (bit) Flash (KB) RAM (KB) Active Consumption (μW) Sleep Consumption (μW) --------------------- ---------------- ------------ ---------- ------------------------- ------------------------ ATmega2560 8 256 8 900 0.18 (Power down) MSP430F5529 16 128 8 6960 6.3 (Standby) ATSAMD21G18 @ 48MHz 32 256 32 12210 15.18 (Standby) STM32F7xx 32 1024 64 12600 180 Please refer to the datasheets for various modules. sensors-18-04113-t004_Table 4 ###### Typical sensor modules and parameters. Sensor Type Sensor Resolution Dara Rate (Hz) Power Consumption --------------- --------- ------------ ---------------- ------------------- ------ Accelerometer ADXL345 10 bits Max. 3200 100 0.25 MPU-6050 16 bits Max. 1000 1650 16.5 LIS2DS12TR 16 bits Max. 6400 270 1.26 Temperature TMP006 0.03125 °C 1000 792 \- D6T-44L-06 0.14 °C \- 25 \- Pressure BMP280 0.18 Pa 1 9.042 0.33 Humidity HDC1000 14 bits 1 2.46 1 Light OPT3001 0.01 lux 1 4.5 \- Please refer to the datasheets for various modules. sensors-18-04113-t005_Table 5 ###### Comparison of some electromagnetic generators found in the literature. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Year Frequency (Hz) Acceleration (g) Internal Resistance (Ω) Power Density (μW/cm^3^) Device Volume (cm^3^) Features ----------------------------------- ---------------- ------------------ ------------------------- -------------------------- ----------------------- ------------------------------------------------------------------------------------------------ 2010 \[[@B135-sensors-18-04113]\] 30 \- 25 0.008 50.26 Harvest from flow-induced vibration 2013 \[[@B136-sensors-18-04113]\] 840/1070/1490 1.0 626 0.157/0.014/0.117 0.035 With three modes and multiple frequencies;\ Integrated with MEMS. 2015 \[[@B137-sensors-18-04113]\] 10 \- 1.19 2187.5 max. 160 Work at low frequencies;\ Generate much more power than a traditional one. 2016 \[[@B138-sensors-18-04113]\] 2 to 5 0.08 to 0.19 \- 0.123 42.2 A curved electromagnetic generator with lightweight designed for wearable electronics. 2016 \[[@B139-sensors-18-04113]\] 2.65 0.15 106 4.24 max. 29.5 Suit for low resonance-frequency vibrations;\ Provide sufficient energy for WSNs. 2017 \[[@B140-sensors-18-04113]\] 8.5 0.3 800 256 97.0 Work at low frequencies;\ Harvest enough power for measurement and transmission the temperature and humidity every 20 s. 2018 \[[@B141-sensors-18-04113]\] 20 \- 86.9 145.08 max. 13.854 Absorb gas pressure fluctuations;\ With a higher power density. 2018 \[[@B142-sensors-18-04113]\] 10 to 80 3 \- 8.75 215.98 A wide bandwidth of 70 Hz;\ Potential for biomedical use. 2018 \[[@B143-sensors-18-04113]\] 1 \- 240 3.05 max. 20.11 With a sprung eccentric rotor;\ Suit for the low-frequency excitations. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- sensors-18-04113-t006_Table 6 ###### Comparison of various energy harvesting technologies. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Energy Sources Source Characteristic \[[@B177-sensors-18-04113]\] Conversion Efficiency \[[@B177-sensors-18-04113]\] Harvested Power \[[@B177-sensors-18-04113]\] Technologies/Device Advantages Disadvantages ---------------------------------- ---------------------------------------------------- -------------------------------------------------------------------------------------------------- ---------------------------------------------- ------------------------------------ ----------------------------------------------------------- ------------------------------------------------------------------------------------------------- Light energy Indoor: 0.1 mW/cm^2^ 10--24% 10 μW/cm^2^ Photovoltaic EH/generators Green, renewable, inexhaustible energy source;\ Bulky electronics, like solar panels;\ With relatively high conversion efficiency and low noise. Affected by weather, regions, locations (inside or outside buildings);\ With high cost and pollution. Outdoor: 100 mW/cm^2^ 10 mW/cm^2^ RF energy 900 MHz: 0.3 μW/cm^2^ 50% 0.1 μW/cm^2^ RF EH/generators Green and efficient source of energy;\ Ultra-low output power and often varies in time due to the decrease of the circuit performance. Long effective energy transfer distance;\ Prolong the lifetime of electronics and WSNs. 1800MHz: 0.1 μW/cm^2^ Thermal energy Machine: 100 mW/cm^2^ 3% 1--10 mW/cm^2^ Thermoelectric EH/(nano)generators With high durability, precision, small volume;\ Difficult to integrate with MEMS;\ Collecting residual thermal energy;\ With relative low conversion efficiency. Safety and reliability. Pyroelectric EH/(nano)generators With relative higher conversion efficiency;\ Require high-frequency temperature fluctuations and high efficiency of energy extraction cycles. Can be fabricated as micro/nanoscale. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- The source characteristic, conversion efficiency and harvested power are referenced from the introduction to energy harvesting concluded by an applications engineer with the single cell battery charge management group at Texas Instruments in 2015 \[[@B177-sensors-18-04113]\]. sensors-18-04113-t007_Table 7 ###### Comparison of various energy harvesting technologies. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Energy Sources Source Characteristic \[[@B177-sensors-18-04113]\] Conversion Efficiency \[[@B177-sensors-18-04113]\] Harvested Power \[[@B177-sensors-18-04113]\] Technologies/Device Advantages Disadvantages ----------------------------------- --------------------------------------------------------------------- --------------------------------------------------------------------------- ---------------------------------------------- ----------------------------------- ------------------------------------------------------- ----------------------------------------------------------------------------------------- Mechanical energy Machine: 1 m @ 5 Hz\ Source dependant 100 μW/cm^2^ Piezoelectric EH/(nano)generators With higher power density, and high output voltage;\ Energy harvesting devices are easy to fatigue and crack;\ 10/s^2^ @ 1 kHz With compact and simple architectures;\ Work at a low and narrow frequency band;\ Can be fabricated and directly integrated into MEMS;\ Limitation on the types of optional materials and complexity of fabrication techniques. Easy to scale down to nanoscale. Electromagnetic EH/generators With high efficiency and high output current;\ With inevitable coil losses;\ With low cost;\ Difficulty to fabricate microscale devices and integrate with MEMS;\ Easy to scale up;\ May be interfered by the electromagnetic waves. High output for large-scale devices. Triboelectric EH/(nano)generators Simple, low weight, cost-efficient, scalable, robust and reliable;\ With inevitable wear of materials;\ With high efficiency. Heat generated by the wear may cause catastrophic accidents. Electrostatic EH/(nano)generators With high output voltage;\ Most require separate voltage sources or electret materials or doublers;\ With low cost;\ Quite small energy density and low output;\ Easy to fabricate with MEMS and integrate with other devices. Work at a low and narrow frequency range. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- The source characteristic, conversion efficiency and harvested power are referenced from the introduction to energy harvesting concluded by an applications engineer with the single cell battery charge management group at Texas Instruments in 2015 \[[@B177-sensors-18-04113]\]. sensors-18-04113-t008_Table 8 ###### Condition monitoring techniques. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Condition Monitoring Methods Techniques ------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Feature extraction \[[@B189-sensors-18-04113]\] Time domain---mean value, variance, root mean square (RMS), kurtosis, skewness, entropy, time synchronous average (TSA) etc.;\  \ Frequency domain---fast Fourier transform (FFT), envelope, bispectrum, modulation signal bispectrum (MSB), etc.;\  \ Time-Frequency---short-time Fourier transform (STFT), Wigner-Ville distribution (WVD), wavelet, etc.;\  \ Other methods---spectral kurtosis (SK), principal component analysis (PCA), independent component analysis (ICA), empirical mode decomposition (EMD), Local mean decomposition (LMD), etc. Modelling \[[@B190-sensors-18-04113]\] Numerical modelling;\ Data modelling. Machine learning \[[@B191-sensors-18-04113]\] Neural network, deep learning, expert system, fuzzy logic, support vector machine (SVM), etc. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PlayStation cancelled its PAX East presence completely a few days ago, and now other consequences of COVID-19, aka coronavirus, are rippling across the industry. Square Enix has announced that many of their developers are no longer making the journey to PAX, via a post on the Final Fantasy XIV lodestone website. Some of Capcom's developers have pulled out as well, with a tweet mentioning their Monster Hunter event planned for PAX East. An update on MH Festa: Boston 2020: Unfortunately, our guests from the MH dev team will no longer be able to attend the event. We will no longer have an autograph session but are still planning to share #Iceborne news. Borderlands is coming to a movie theater near you, and it has some big names attached to it. The upcoming film, which Lionsgate teased five years ago, will be directed by Eli Roth (Cabin Fever, Hostel). It's based on a script from Craig Mazin, the writer behind The Hangover Part II and HBO's Chernobyl miniseries. Gearbox president Randy Pitchford, who is also an executive producer on the project, revealed Roth's involvement in a tweet, in which he also said more info was coming in a week at PAX. “I’m so excited to dive into the world of Borderlands and I could not be doing it with a better script, producing team, and studio,” Roth said in a statement. “I have a long, successful history with Lionsgate — I feel like we have grown up together and that everything in my directing career has led to a project of this scale and ambition. I look forward to bringing my own energy, ideas, and vision to the wild, fun, and endlessly creative world of the game. Randy Pitchford and everyone at Gearbox have been incredibly supportive of my ideas — it really feels like a perfect storm of creators coming together. We are out to make a new classic, one which the fans of the game will love, but also one which will find new audiences globally." The latest season of Fortnite has started, and the spy-themed Top Secret backdrop for battle royale includes ways to change the island permanently. Players choose sides and complete missions as part of the Ghost or Shadow sides. The Battle Pass contains agents such as Meowscles, skin-changing Maya, Marvel's Deadpool, and others, and you'll complete weekly missions for each character for variant skins. If you're like me, you probably go back and play Shovel Knight all the time. It's pretty fun! But hey, we like new stuff too, so Yacht Club Games is potentially revealing some shiny, fun things next Wednesday at 12 PM EST. The new info is going to be livestreamed on both YouTube and Twitch, so you can watch for new info on Shovel Knight, Cyber Shadow, and "some surprises we promise you've never seen!" PlayStation has announced it is withdrawing from its scheduled appearance at PAX East next week due to concerns surrounding COVID-19 (known as novel coronavirus). The slate of playable games was originally set to include The Last of Us Part II, Final Fantasy VII Remake, Persona 5 Royal, Iron Man VR, and more. The deal could hit a maximum of $375 million, and Saber's past success as an independent studio – World War Z sold more than three million units according to Embracer – was one of the reasons Embracer purchased the New Jersey studio. Embracer founder and CEO Lars Wingefors says that Saber will remain independent, which he notes has been a key ingredient in the developer's story so far. "Their ambitious moves towards self-funding projects in recent years have been particularly impressive," he says. If you're like me, you've been wondering what shape Baldur's Gate 3 is going to take. Will it be a traditional isometric PC-oriented RPG like the classic titles of ages past, much like the games that inspired Divinity: Original Sin 2? Or will it be something else? Third-person action perhaps? Well, we're going to get our first look at actual gameplay quite soon, on February 27. The reveal kicks off at 3:30 PM ET, with Larian creative director Swen Vincke taking the stage at PAX East. Not going to be in Boston? No problem - the reveal will be streamed on YouTube. Check out the announcement trailer below and feel free to wonder what shape this next exciting iteration of one of gaming's most revered franchises will take! Fortnite chapter 2 – season 2 is fast approaching, and Epic Games isn't wasting time giving players a taste of what to expect. The teases began on Fortnite's official Twitter feed today with a series of images that embrace the color gold and a February 20 launch date. Players are now noticing that ordinary items within the game world – be it a couch or filing cabinet – are made entirely of gold, almost like someone is walking around with the Midas touch. The teases will likely continue from now up until the season's official start. Nick van Dyk, the president of Activision Blizzard's film and television division, may have leaked the development of Overwatch and Diablo animated series on his LinkedIn profile, which GameSpot uncovered. According to his profile, the Diablo animated series is "rendered in anime style" and is in pre-production for Netflix. The Overwatch information isn't as detailed, and simply reads, "With my creative partner, developed and sold an animated series based on Blizzzard's Overwatch franchise." The buyer of the rights for this popular competitive shooter is not listed. You can see the profile listing below: Since Overwatch's release in 2015, fans have wanted to learn more about the game's story. Blizzard hopes to deliver on this request in Overwatch 2's new story modes. Hearing a show is on the way too lessens the excitement for the mode a little bit, but this game's universe is overflowing with plot threads and there's likely room for both of them to exist. Here's hoping the show is done by Blizzard's team behind the awesome animated shorts. Pokémon's anniversary is February 27, a day that will likely be filled with news and events for most of the active Pokémon games. For Sword and Shield, Game Freak has stated that it will reveal a new mythical Pokémon that will likely appear in the game at the same time. The official Pokémon Twitter account shared what is believed to be the silhouette of this new critter. Customize Apr 4, 2019Domain autorenew failed. Sorry about the downtime :( Announcement Apr 4, 2019Domain autorenew failed. Sorry about the downtime :( Options Hiding images will make the site load faster if you are on a slow connection. Hiding videos will make the site load faster and appear more responsive on older and slower devices. Hide videos Hide images Customize Feed By default TGP shows you news articles from a selected subset of the available sources. You can also pick and choose from the available sources to customize your feed. Simply check all the sources you want to see from the list below and click save. Click on the name of a source below to view news articles from them, without adding it to your personal list
Q: Why do Embedded Image Sizes Evaluate to 0 in Outlook VSTO Add-In? We are building a VSTO Outlook Add-In that scans an outgoing mail message for attachments to alert users and noticed some unexpected behavior. Considering the following ways of adding a file to an Outlook mail message: A file attachment Screen Shot Screen Clipping Mail Signature file All four are recognized as attachments when the Item Send event fires: Private Sub Application_ItemSend(ByVal Item As Object, ByRef Cancel As Boolean) Handles Application.ItemSend In the following code example: For Each attachment As Outlook.Attachment In Item.Attachments 'do some stuff like check attachment size Next We are checking for small embedded images in a signature file that don't want to notify the user of. In the following cases: Screen Shot Screen Clipping Mail Signature file We've noticed that when the added files are embedded images (not attachments), we don't see a correct size property for the image using: attachment.Size IE: Say we are sending an Outlook email that has: One Attachment. One Screen Shot. One Signature File with one image in it. Our code seems to recognize the correct number of attachments, however if we check the attachment size for a screen shot or a signature file image, the attachment size property always evaluates to 0, which we're think is due to the fact that the file doesn't exist on disk and the attached file does. For Each attachment As Outlook.Attachment In Item.Attachments if attachment.size > 755 then 'ignore the image end if Next Is there a way to check the image size in VB.Net or do we need to save the file off to a temp directory in order to do this? EDIT Outlook Spy Troubleshooting steps: New Mail Message Inserted screen shot and signature file: OutlookSpy->IMessage IMessage window blank (below) Close IMessage window. Re-Open IMessage Window Inserted (attached) files appear (below) 8. Double Clicked on attachment Selected Inspector Button Current Item: Browse: Attachments: Browse: IEnumVariant: I suspect that the differences between steps 4 and 7 may be due to the fact that Outlook may have saved a draft of the email message? ADDITIONAL EDIT Code added to save mail message before checking signature/embedded image size: 'convert generic object to Outlook.MailItem object. Dim objMailItem As Outlook.MailItem = CType(Item, Outlook.MailItem) 'Save message objMailItem.Save() 'quick check to see if message is saved (it is) Dim saved As Boolean = objMailItem.Saved() For Each attachment As Outlook.Attachment In objMailItem.Attachments 'all items still evaluate to 0. If attachment.Size >= 20 Then 'do some stuff End If Next Thanks. A: We ended up using Outlook Spy (awesome tool..) to find the PR_ATTACH_SIZE property: Then set up using MS schema as follows: 'property access to get attachment sizes Const PR_ATTACH_SIZE As String = "http://schemas.microsoft.com/mapi/proptag/0x0E200003" Also great info from this SO Post. Then iterated through our attachment collection as follows to find our attachment sizes: For Each attachment As Outlook.Attachment In Item.Attachments attSize = CType(attachment.PropertyAccessor.GetProperty(PR_ATTACH_SIZE), Integer) if attSize.size > 755 then 'ignore the image end if Next Thanks..
Football has finally arrived here in the United States. After years of being hidden in the dark European football is a major event here in this country. Every morning supporters wake up and walk downstairs to their couches or drive to their nearest pub (miraculously enough even on the west coast at 4-5-6 o’clock in the morning) to watch the biggest stars of the game. But while they are tuning in to the likes of Arsenal and Real Madrid they are tuning out the likes of D.C. United and the New York Red Bulls. While listening to last week’s edition of BBC’s World Football it was striking to hear the plight of football in Mauritius. What was so startling to hear was that the situation bore a resemblance to issues here in the United States. In Mauritius, much like here in the United States, local football officials struggle to get supporters to domestic matches because supporters would rather watch matches from Europe at home or at a bar. This trend is also not limited to just Mauritius and the United States. All across Africa, Asia, Europe, and in the Americas more and more supporters are opting to stay at home and watch matches as opposed to supporting their local clubs. So what is to blame for the plight of domestic football and can the trend be reversed? As with many things in this modern world, football is impacted heavily by globalization. As author Thomas Friedman pointed out in the book The World Is Flat the uses of modern technology and communications has changed the way modern society operates and functions. Now that people have the ability to communicate directly with people across the world with a simple click of button there aren’t the barriers that existed in the past. How does this affect football? Whereas in the past supporters might have been limited to watching a handful of matches from the likes of FC Barcelona, Bayern Munich, Real Madrid, or Manchester United in a lifetime now every match is available instantaneously. The communication revolution has dramatically expanded the reach of the top clubs and leagues in Europe and given them a much larger audience and by extension allowed them to generate much larger profits. All of this sounds good, right? While as much as everyone looks at the beautiful game with rose-colored glasses this is a business. The major clubs of Europe have to look at for their own selves and at times their own league. These are self-interested parties and in the end they have to pay attention to the bottom dollar. In its most general terms this brand of capitalism is logical. However, there are plenty of negative outliers that could have long-term implications. First, there is the loss of individualism on the pitch. With European sides not just showing their matches on television sets across the world but also setting up camps, playing exhibitions, and establishing bases of operations all across the world. These satellite sides are not necessarily promoting an American style of soccer or a New York City style of soccer but an Arsenal or a Manchester City style of soccer. By pigeonholing people to enjoy only a specific product. If European clubs continue down this path then they run the risk of making the product boring and uninteresting. No one will want to watch Manchester City lite in New York City when they can watch the actual thing on Saturday mornings. There has to be an end goal to these initiatives beyond just the brand. Second, many times these clubs come into a market with a lack of understanding of the regional product and often act with a hostile attitude towards the domestic side. Here in the United States, multiple different clubs have come in either to Major League Soccer (NYCFC, Chivas USA) or at more regional levels (such as Crystal Palace Baltimore) and attempted to develop a product with little to no knowledge of the region. Although they may be able to sell a few jerseys and gain a few supporters in the end they only damage the domestic product. To be fair the European sides are also not responsible for solving all of world football’s problems. That they are able to enter into a foreign market and command such attention and revenue speaks not just to their power but also to the problems of the domestic league. Bayern Munich cannot be blamed for the corruption of football leagues in developing countries. Nor can they be held responsible for the voodoo economics of Major League Soccer in the United States and Canada. So how can major clubs build their global brand but at the same time not destroy the domestic market? It is a tricky issue. European sides aren’t likely to listen to regional organisations unless they are bound by league obligations such as with City Football Group and Major League Soccer. Even then clubs may act in their own self interest given the economic disparities. Perhaps this is an area where FIFA could have more of a say. Given that smaller regional football associations have more power as a bloc than the European FA’s they could leverage FIFA to create stronger guidelines on development in foreign countries. FIFA, however, has always treaded carefully when it comes to the whims and wishes of the European club sides. In the end, much like with any multi national corporation, the European club sides will have to regulate themselves. This perhaps might not be the ideal solution but given the lack of independent actors who could regulate such business it may be perhaps the only way that the game can continue to grow in a responsible manner.
The Taste Lincoln Oriental Buffet Restaurant Review 14:41 Kelly Wheelhouse 0 Comments Yesterday I spent the day in Lincoln with my partner Daniel and my parents, and we decided to eat at The Taste Oriental Buffet for our dinner. Last time we went to Lincoln we had passed this restaurant and it seemed very busy. As we all love oriental food we thought it would be nice to try for the first time. As soon as we walked in we were greeted by a very friendly member of staff who found us a table quickly. We arrived early which meant there weren't many people inside to start with, although by the time we left it was absolutely packed full of people. Certain drinks like coke and lemonade have free refills, which means you can have as many drinks as you like, simply ask a member of staff for another once you are ready and they will bring another to your table. When you head over to help yourself to food, you first need a plate or bowl which are cleverly situated underneath the food counter. When you first arrive you get a knife and fork on your table, but they also have them under the counter (as well as spoons) to help yourself to. They have a large selection of different oriental dishes to choose from. All are kept warm and replaced when needed. There are two sides to walk down and the dishes are labelled so you know what they are. As well as oriental dishes they also have a section which offers pizza, onion rings, hash browns, chips, spring rolls, cocktail sausages, chicken balls, and more. There is also a section near the window where you can help yourself to crackers. This was Daniel's first dish. Onion rings and chicken balls are his favourite. He really enjoyed everything that he tried and even went back for a second dish before having pudding. Here was my first dish. In my first dish I tried the fine chow mein noodles which were fantastic and absolutely delicious, in my second dish I tried the thicker noodles, which I personally didn't like as much as the fine noodles. I also tried the sesame prawn toast, chicken nuggets, chicken balls, chips, hash browns, and more. Everything on my plate was completely delicious and I savoured every bite. After two plates of food (and help from my mum eating some of it as I had put too much on my plate) I decided to have a very small dessert. The only thing I was interested in was the chocolate fountain. I had two marshmallows with chocolate, and a tiny bit of vanilla ice cream. The chocolate is the nicest I have ever had and the marshmallows were lovely and squishy. I was very impressed with it all. They also had a section the other side where they served jelly, swiss roll, fruit, and other desserts- as well as sushi (since it needs to be kept cold) Overall, the food I tried was completely delicious and everyone else with me also enjoyed what they had eaten. We enjoyed it so much that by the end of the meal we were talking about when to make our next visit. I would rate The Taste Lincoln... 5/5 Everything was absolutely perfect, and the members of staff were lovely and kind. I can't wait to visit again.
/* * Copyright (c) 2008-2020, Hazelcast, Inc. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /** * Contains the {@link com.hazelcast.cp.internal.raft.command.RaftGroupCmd} * abstraction and its default impls */ package com.hazelcast.cp.internal.raft.command;
StartChar: aAlf.fina_LamAlfFina Encoding: 65674 -1 139 Width: 446 Flags: HW AnchorPoint: "DigitAbove" 39 562 basechar 0 AnchorPoint: "TashkilBelow" 156 -327 basechar 0 AnchorPoint: "TashkilAbove" 0 801 basechar 0 AnchorPoint: "HamzaBelow" 108 -114 basechar 0 AnchorPoint: "HamzaAbove" 136 732 basechar 0 LayerCount: 3 Back SplineSet 515.625 633.7890625 m 2 544.43359375 679.19921875 l 2 548.014648438 684.733398438 551.920898438 686.767578125 556.15234375 685.302734375 c 128 560.383789062 683.837890625 562.336914062 679.6875 562.01171875 672.8515625 c 0 561.03515625 653.645507812 566.243164062 583.984375 577.63671875 463.8671875 c 128 589.030273438 343.75 600.749023438 257.487304688 612.79296875 205.078125 c 0 625.813476562 148.4375 648.92578125 110.514648438 682.12890625 91.30859375 c 0 687.01171875 88.7041015625 690.4296875 79.7529296875 692.3828125 64.453125 c 128 694.3359375 49.1533203125 694.3359375 34.5048828125 692.3828125 20.5078125 c 128 690.4296875 6.5107421875 687.01171875 -0.3251953125 682.12890625 0 c 0 663.249023438 0.6513671875 642.985351562 10.3349609375 621.337890625 29.052734375 c 128 599.690429688 47.7705078125 584.9609375 72.75390625 577.1484375 104.00390625 c 0 569.987304688 132.975585938 563.313476562 169.270507812 557.12890625 212.890625 c 128 550.944335938 256.510742188 545.817382812 296.467773438 541.748046875 332.763671875 c 128 537.678710938 369.059570312 534.993164062 390.299804688 533.69140625 396.484375 c 0 532.71484375 400.715820312 531.657226562 403.3203125 530.517578125 404.296875 c 128 529.377929688 405.2734375 528.483398438 403.645507812 527.83203125 399.4140625 c 0 527.83203125 398.4375 527.83203125 398.4375 527.83203125 396.97265625 c 0 523.92578125 350.09765625 517.08984375 305.094726562 507.32421875 261.962890625 c 128 497.55859375 218.831054688 484.130859375 176.26953125 467.041015625 134.27734375 c 128 449.951171875 92.28515625 427.165039062 56.5595703125 398.681640625 27.099609375 c 128 370.198242188 -2.3603515625 337.727539062 -21.8095703125 301.26953125 -31.25 c 0 268.06640625 -39.7138671875 234.700195312 -46.5498046875 201.171875 -51.7578125 c 128 167.643554688 -56.9658203125 148.112304688 -58.4306640625 142.578125 -56.15234375 c 0 138.997070312 -54.8505859375 137.125976562 -52.3271484375 136.962890625 -48.583984375 c 128 136.799804688 -44.8408203125 138.671875 -42.1552734375 142.578125 -40.52734375 c 0 186.198242188 -24.2509765625 240.071289062 3.5810546875 304.19921875 42.96875 c 128 368.327148438 82.3564453125 412.109375 119.140625 435.546875 153.3203125 c 0 438.151367188 156.901367188 440.673828125 161.213867188 443.115234375 166.259765625 c 128 445.556640625 171.305664062 448.079101562 177.083007812 450.68359375 183.59375 c 128 453.288085938 190.104492188 455.403320312 194.987304688 457.03125 198.2421875 c 0 472.331054688 229.817382812 485.026367188 286.458007812 495.1171875 368.1640625 c 128 505.208007812 449.870117188 509.440429688 522.4609375 507.8125 585.9375 c 0 507.487304688 609.049804688 510.090820312 625 515.625 633.7890625 c 2 EndSplineSet Fore SplineSet 462 200 m 0 467 159 463 136 453 133 c 0 444 130 436 139 430 160 c 0 400 255 335 333 234 393 c 1 223 369 l 2 212 347 192 346 164 365 c 2 77 425 l 2 60 436 51 450 51 467 c 2 49 574 l 2 49 589 53 600 64 606 c 128 75 612 88 611 103 604 c 0 325 489 444 354 462 200 c 0 EndSplineSet Layer: 2 SplineSet 457.03125 198.2421875 m 0 461.9140625 165.0390625 460.530273438 145.100585938 452.880859375 138.427734375 c 128 445.231445312 131.754882812 439.453125 136.71875 435.546875 153.3203125 c 1 409.831054688 249.348632812 344.075195312 329.915039062 238.28125 395.01953125 c 0 228.190429688 400.87890625 221.842773438 400.87890625 219.23828125 395.01953125 c 2 209.47265625 375 l 2 206.868164062 369.791992188 203.206054688 366.69921875 198.486328125 365.72265625 c 128 193.766601562 364.74609375 185.05859375 368.489257812 172.36328125 376.953125 c 2 84.9609375 437.01171875 l 1 72.265625 446.452148438 65.7548828125 456.706054688 65.4296875 467.7734375 c 2 63.4765625 574.21875 l 2 63.4765625 581.0546875 67.5458984375 586.669921875 75.68359375 591.064453125 c 128 83.8212890625 595.458984375 92.1220703125 595.540039062 100.5859375 591.30859375 c 0 317.708007812 475.749023438 436.5234375 344.7265625 457.03125 198.2421875 c 0 EndSplineSet EndChar
7 - 163.6. Let y = 2.6 + z. Which is smaller: w or y? w Let o = 0.1843 - 0.0943. Which is smaller: o or -0.056? -0.056 Let x = 25/3 - 8. Let y = 76 + -73. Suppose y*d + 4 = -0*b + b, d - 2*b = -3. Which is bigger: x or d? x Suppose -c = -2*b - 3*b + 11, -b = 4*c - 19. Let s = -8683/7 - -1243. Which is smaller: s or c? s Let g = -306 - -236. Which is bigger: g or -69? -69 Suppose 0 = 40*g - 45*g + 345. Which is smaller: 2 or g? 2 Suppose 6 = 3*l - 3*g, -11*l - 16 = -16*l - g. Which is greater: -1/19 or l? l Let l be (2/5)/((-2)/80). Let h = l + 19. Do 3 and h have the same value? True Suppose -20*n = -2*n + 18. Which is bigger: -2/721 or n? -2/721 Let s = -7 + -11. Let f = 16 + s. Let r = -1.9 - f. Is r at most -0.5? False Let z be (((-24)/(-5))/2)/((-129)/6880). Is -126 less than z? False Suppose 3*q + 195*f - 198*f + 24 = 0, -f = -2*q - 10. Suppose 10 = 3*n - 8*n. Let y be (n/5)/(1/3). Which is greater: y or q? y Let o(w) be the third derivative of -w**6/120 + w**5/15 + w**4/4 - 5*w**3/6 - w**2. Let s be o(5). Let f be 72/828 - (-200)/(-1242). Is f equal to s? False Let j = 0.0842 + 3.5158. Suppose -2*r - 14 = 4*g, -2*r + r + 3*g + 13 = 0. Is j less than or equal to r? False Suppose -3*c + 0*c = -9. Suppose 0 = -w - 1 + c. Which is smaller: 3 or w? w Let v be (-1 + (-309)/(-297))*(-3)/(-10). Is v equal to 1? False Let v(f) = f**2 + 32*f + 247. Let n be v(-13). Let l be (-4)/(-296)*(-8)/2. Which is bigger: l or n? n Suppose -6*k - 2*k = -16. Suppose -k = 4*x - 10. Which is greater: 3 or x? 3 Let t = 2/14417 + 28452/2753647. Let z = t + -408/2483. Is z equal to 1? False Let m be 154/(-88) + (-22)/(-8). Is m not equal to 2/881? True Let o(q) = 0*q - q + 4*q + 21 - q. Let l be o(-10). Is 4/57 less than or equal to l? True Let y(t) = -t**3 + 11*t**2 - 19*t + 8. Let b be y(9). Is b < -571? False Let m = 12 - 11. Let n be 5/(-15) + (-91)/69. Let v = n + 1877/1150. Is m equal to v? False Let a = -4 + 6. Suppose 0 = 3*z - 41 - 4. Let l be -3 + z/2 + -4. Which is smaller: a or l? l Let a be (-5 + 2)/(-3)*0. Let n = -133/306 - 1/102. Which is smaller: a or n? n Let c(t) be the third derivative of -t**6/120 + 5*t**4/12 + 2*t**3 + 47*t**2. Let z be c(-4). Which is smaller: z or 35? 35 Let p = 2.7 + -1.7. Which is smaller: p or 0.1? 0.1 Let t = 1.2 + -1.3. Suppose 4*c - 14 = -i, -6*i - 5*c + 25 = -i. Suppose -o = 3 - i. Do o and t have the same value? False Suppose 2*l - 49 = -w - 6, 109 = 5*l + 3*w. Suppose -5*z + z = l. Which is greater: -8 or z? z Suppose -5*w - 3*j = j + 11, w + 4*j = -15. Let p = 1558 - 45177/29. Which is bigger: w or p? w Let o(g) = 2*g - 3 - 5*g - 3*g. Let j(m) = -m - 1. Let r(q) = -5*j(q) + o(q). Let t be r(-2). Is t at least 2? True Let b = 355 + -354. Which is greater: b or -53/5? b Let p = -3851 + 3871. Suppose n - 20 = -4*k, -4*n = -3*k - 8 + 23. Do n and p have the same value? False Let m be (-2)/(-8) - 28/(-24). Let f = 7/4 - m. Which is smaller: f or 10? f Let n = 1488 - 1492. Is -75/7 >= n? False Let s be (-61)/(-366)*(-1 + -2). Is 88 smaller than s? False Let x be 4/10*(-1)/2. Let c be ((-15)/3900)/(6/(-48)). Which is greater: c or x? c Let f = 276.87 - 279. Let z = -1.3 + 1.43. Let g = f + z. Which is bigger: g or -1/11? -1/11 Let n = 1890.91 - 1891. Which is greater: n or -15? n Let y be 1*(6 + -3) - 0. Suppose -6*r + 9*r + y = 0. Is -3/8 at least as big as r? True Let h = -80.4 - -80.1. Which is smaller: -20 or h? -20 Suppose -3*u - 1 - 2 = 0. Let m be 6/12*(-26)/u. Let f = m + -12. Which is smaller: -1/3 or f? -1/3 Suppose -4*j + 74 + 26 = 0. Let s be (-770)/j*(-1)/94. Let c = -6/47 + s. Which is smaller: -1 or c? -1 Let m = 37 - 31. Let c = m + -13. Is c > -2? False Let d = 193 + -264. Which is smaller: -70 or d? d Let l(f) = -f + 4. Let g be l(-5). Suppose g*s = 2*s - 28. Let p be -7 + s/(-2) + 0. Which is bigger: -4 or p? -4 Let m = -2449512/365 - -6711. Is 1 less than or equal to m? False Suppose -7*x + 48 = -64. Is 18 less than or equal to x? False Let g(s) be the second derivative of -s**3/6 - 12*s**2 - 10*s. Let f be g(-11). Let c = f - -14. Is c less than or equal to -2/15? False Let k = 48136/15 - 9431/3. Does k = -0.1? False Suppose -a + 60 = b + 4*a, -4*b + 172 = 3*a. Let x be 2/3 - -12*b/(-855). Let z be (-2 + 3)/(0 - -1). Which is greater: x or z? z Suppose 28*o = 23*o - 5*p - 675, o - 3*p + 143 = 0. Are -139 and o unequal? True Let l = 0.0434 + 47.2566. Let d = 47 - l. Is d less than -8? False Let b be (3/(-102))/(10/460). Which is greater: b or -2? b Let z = -69 + 48. Let q = z - -83/4. Is q less than or equal to 2/39? True Let a be 25/3 + ((-2)/6 - 0). Let m(z) = 2*z**2 - z. Let h be m(-1). Which is smaller: h or a? h Suppose -4*f - 14 = 5*r, -5*f + 0*r + 4*r = 38. Let w be f/14 + (0 - 0). Let d = -120 + 121. Which is greater: d or w? d Suppose -5*b + b + 12 = 0, 5*u + 2*b - 106 = 0. Let t be (-22)/(-10) - u/(-25). Suppose t*r = -19 - 8. Does r = -10? False Suppose -3*o = -1 + 4. Let z = -20194/11 - -1835. Is o < z? True Suppose -88 = -5*r + 47. Let o be -2 + (-8)/(-6)*r/6. Which is smaller: o or 3? 3 Let m = 48 + -155. Do m and -106 have different values? True Let w be 372/(-5) + -14 + 1008/70. Is -79 equal to w? False Suppose 4*m + 4*u = 9*u + 10, u + 2 = 0. Is m <= 1/52? True Let c = -45 - -113. Suppose 3*d = -1 - c. Which is bigger: d or -21? -21 Let i be 192/(-2)*(-64)/(-96). Is -18 at least i? True Let l = 16/5 - -2. Is 6 at most as big as l? False Let m = -6085 - -79059/13. Is -4 less than or equal to m? True Let p = 1 + 1. Let x = p - -4. Let k = -530 - -1612/3. Which is bigger: k or x? k Suppose -5*o - 215 = 2*p, -23 = 2*o - p + 63. Is o less than or equal to -43? True Let f be (-20)/5 - 10 - 6. Which is smaller: -18 or f? f Suppose 243 = 2*d - 11*d. Which is greater: d or -3/2? -3/2 Suppose -3*o - 4*s + 44 = o, -23 = -o + 3*s. Let j = -13 + o. Is j < 3? True Let c(l) = -l**3 + 26*l**2 - 46*l + 21. Let z be c(21). Is z at least as big as -0.1? True Let n(q) = -74*q + 9. Let b be n(2). Is -140 > b? False Let s = -2 + 2. Let r = -3535/52 + 68. Do s and r have different values? True Let s = -1.74 - 0.56. Let t = s - -2.3. Which is greater: 7 or t? 7 Let v = -121 + 120. Is 100 > v? True Let f(x) be the third derivative of -x**6/120 + x**5/10 - 3*x**3/2 - 15*x**2. Let y be f(6). Is y greater than -9? False Suppose 0 = -5*g - 3 + 28. Suppose -2*j + 6*j + p + 2 = 0, -5*p + 15 = -g*j. Is j > -2/61? False Suppose -4*i + 21 = 3*i. Let v be (i/2 - 1)/((-3)/6). Let t = 2257/41 - 55. Which is smaller: v or t? v Suppose -3*v + 16 = -7*v. Let k = v - 13. Does k = -17? True Let c = 62 - 62.5. Let m = 0.5 + c. Which is greater: m or 18? 18 Let p(o) = -o**2 + 13*o + 42. Let w be p(-3). Is -20/3 < w? True Let t(r) = -2*r**3 + 57*r**2 - 25*r + 62. Let i be t(28). Is 146 less than or equal to i? True Let i be (-26841)/(-184) - (-4)/32. Is i smaller than 149? True Let m = -0.144 + -1.056. Let j = -13.8 + 16. Let y = m + j. Is 6 equal to y? False Let r(g) = 21*g - 300. Let f be r(27). Is 266 greater than f? False Suppose -1380 = d + 9*d. Let q = 140 + d. Is -1 smaller than q? True Suppose -2*r + 2*i + 88 + 8 = 0, 3*r + 4*i - 130 = 0. Are r and 33 equal? False Let q = -27 - -11. Suppose 32 = -f - 4*x, 699*f = 701*f + x + 8. Which is greater: q or f? f Let a = -390 + 1172. Let t = a - 4703/6. Which is smaller: -1 or t? t Let n = 43.7 + -0.7. Which is bigger: n or -1? n Let n = -4 + 37. Let q = n + -40. Suppose -2*j = 4*z + 18, -2*j - 2*j + z = -9. Which is bigger: q or j? j Let a(m) = 3*m. Let p be a(3). Let v be (1/(-3))/(3/p). Let s be 58/208 + (304/52 - 6). Is s smaller than v? False Let l(o) = 2*o - 21. Let k be l(10). Let u be k + -1 + 605/308. Is u equal to 1? False Suppose -162 = -5*g + 4*t, g - t - 33 = -0*t. Which is bigger: g or 28? g Let c = 101.9 + -102. Let y = -9.96 + 10. Which is bigger: y or c? y Suppose 3*x - 12 - 30 = 0. Suppose 0*c + x = 2*c. Which is greater: c or 5? c Let y = 60 - 241/4. Let f be 2/8*-11 + 4. Which is greater: y or f? f Let v be (-9)/(4/(16/3)). Let b(t) = t**3 + 12*t**2 + t + 15. Let m be b(v). Which is smaller: 1.2 or m? 1.2 Let z = -0.26 - -0.25. Let n = -0.11 - z. Which is greater: -6 or n? n Let l be (-280)/528*2 + (-4)/(-3). Which is greater: -3/5 or l? l Let x = 2 + -2.
Fox News is reporting on a high-level dispute over which senior government officials pushed the unverified Steele dossier amid efforts to surveil the Trump campaign has broken out into the open again, after it emerged that Attorney General William Barr appointed a U.S. attorney to examine the origins of the Russia investigation and determine if the FBI and DOJ’s actions were “lawful and appropriate.” Sources familiar with the records told Fox News that a late-2016 email chain indicated then-FBI Director James Comey told bureau subordinates that then-CIA Director John Brennan insisted the dossier be included in the intelligence community assessment on Russian interference, known as the ICA. Fox News was told that the email chain – not yet public — referred to the dossier as “crown material,” but it was not clear why this apparent code was used. On Tuesday night, former GOP Rep. Trey Gowdy said on Fox News’ “The Story with Martha MacCallum” that “Comey has a better argument than Brennan, based on what I’ve seen.” Click here to read in full at Fox News.
1. Field of the Invention The present invention relates to an image forming apparatus using electrophotography, such as an electrophotographic copying machine, an electrophotographic printer (e.g., a laser beam printer or an LED printer), a facsimile apparatus, and a word processor. 2. Description of the Related Art As an image forming apparatus using electrophotography, an inline-type image forming apparatus using an intermediate transfer medium is known which forms a full-color image by a plurality of color toner images. In the inline-type image forming apparatus, for example, image forming stations 10Y, 10M, 10C, and 10Bk corresponding to a plurality of colors are respectively constituted by developing means, electrophotographic photosensitive drums 1Y, 1M, 1C, and 1Bk serving as first image bearing members, and process means that act on the drums, as shown in FIG. 9. The image forming stations 10Y, 10M, 10C, and 10Bk are arranged in a line so as to oppose an intermediate transfer medium 7 serving as a second image bearing member. Toner images of different colors are transferred one on another onto the intermediate transfer medium 7, and are transferred together onto a transfer material 13 by a secondary transfer means 8. This method is widely used because good output can be obtained, regardless of the type of the transfer material, and speedy formation of color images is possible. When a monocolor image is formed in this image forming apparatus, the photosensitive drums 1Y, 1M, and 1C in the color-image forming stations 10Y, 10M, and 10C can be separated from the intermediate transfer medium 7 without rotation of the drums, as shown in FIG. 10. In this case, the use of the photosensitive drums 1Y, 1M, and 1C is avoided during formation of a monocolor image. Japanese Patent Laid-Open No. 2004-4398 proposes a separation means that separates photosensitive drums Y, M, C, and Bk from an intermediate transfer belt in order to reduce the use of the photosensitive drums. Separation is performed after primary transfer of all toner images to be transferred onto the last sheet in one print job is completed, before the toner images are subjected to secondary transfer, and after secondary transfer onto the last second sheet is completed. In the related art, however, a toner image must not lie at the second transfer position during separation, and therefore, there is a need to prohibit formation of a toner image for a period longer than the time for which the separating operation is completed. It is common to connect a printer or a copying machine having a printer function to a network, and as a result, a plurality of users sometimes simultaneously make various print requests. For this reason, it is necessary to print a full-color image during a monocolor print mode, or conversely, to print a monocolor image during the full-color print mode. In this case, switching between the modes must be performed so that image defects, such as color misregistration, are not caused by the influence of the operation of moving the intermediate transfer medium and the color-image forming stations into contact with or apart from each other. That is, when the full-color mode is switched to a monocolor mode, the intermediate transfer medium and the color-image forming stations must be separated while a full-color image formed on the intermediate transfer medium does not lie at a primary transfer position in the black-image forming station and at a secondary transfer position. Similarly, when a monocolor mode is switched to the full-color mode, the intermediate transfer medium and the color-image forming stations must be brought into contact with each other while a monocolor image does not lie at the primary transfer position in the black-image forming station and at the secondary transfer position. However, in normal continuous image formation, the non-image forming region on which a toner image is not formed (a region between image forming regions on which toner images are formed) is normally made small in order to maximize the number of prints to be continuously made. In most cases, the period in which image formation is prohibited is shorter than the contact or separation time of the intermediate transfer medium. For this reason, it is impossible that an image does not lie at both the primary transfer position in the black-image forming station and the secondary transfer position during the contact or separation time. Accordingly, as shown in FIGS. 11 and 12, when the full-color mode is switched to a monocolor mode, the intermediate transfer medium 7 is separated from (taken out of contact with) the color-image forming stations 10Y, 10M, and 10C after a full-color image formed on the intermediate transfer medium 7 (a monocolor image when a monocolor mode is switched to the full-color mode) passes through the secondary transfer position, and image formation in a monocolor mode is then started. Therefore, when the mode is frequently changed, the number of output images produced per unit time is reduced, and output performance is seriously reduced.
export * as windowsManagerSagas from './windowsManager';
This screencast examines some of the more advanced features in Angular, specifically Directives. We’ll see how we can leverage the power of custom elements and attributes to map Domain Specific concepts through HTML and translate those into Value Objects in our Domain, resulting in cleaner HTML output. Also discussed: complexity, creating a DSL with directives, debugging techniques, and other tips and tricks. If you’re interested in some more context prior to watching, check out my other angular screencasts and an earlier post on the power of web components as abstractions. This screencast covers: https://github.com/davemo/advanced-directives-with-angular-js Some things in the screencast aren’t complete and some things could definitely done better. This section is a challenge to you, the reader/watcher to improve the code and level up your knowledge in the process! Try and tackle some of these challenges if you want:
Q: Anonymous vs Non Anonymous functions Lua I am learning Lua and have come across the concept of anonymous functions. It's interesting but I was wondering what additional advantage it provides over non anonymous functions. So If I have something like function(a,b) return (a+b) end The function is anonymous and if I have function add(a,b) return (a+b) end The function is non anonymous. The second is better because I can call it wherever I want and I also know what my function is doing. So what's the advantage of anonymous functions? Am I missing something here? A: To be honest, there is no such thing as a named function in Lua. All functions are actually anonymous, but can be stored in variables (which have a name). The named function syntax function add(a,b) return a+b end is actually a syntactic sugar for add = function(a,b) return a+b end. Functions are often used as event handlers and for decisions which a library does not/cannot know, the most famous example being table.sort() - using your function, you can specify the sorting order: people = {{name="John", age=20}, {name="Ann", age=25}} table.sort(people, function (a,b) return a.name < b.name end) The point is that most probably you won't need the function later. Of course, you can also save the function to a (possibly local) variable and use that: local nameComparator = function (a,b) return a.name < b.name end table.sort(people, nameComparator) For more information, read this section on functions in PiL. A: The second example is equivalent to add = function(a,b) return a+b end So really you're using anonymous functions all the time, in a trivial sense. But anonymous functions can get much more useful in other contexts. For example, using functions to mutate other functions (the soul of functional programming.) function make_version_with_n_args (func, n) if n == 1 then return function (x) return x end else return function (x, ...) return func (x, make_version_with_n_args (func, n-1)(...)) end end end add_four = make_version_with_n_args (function (a, b) return a+b end, 4) print (add_four(3, 3, 3, 3)) add_sizes = {} for i = 1, 5 do add_sizes[i] = make_version_with_n_args(function (a, b) return a+b end, i) end func_args = {} for i = 1, 5 do func_args[#func_args+1] = 2 print (add_sizes[i](unpack(func_args))) end function make_general_version (func) return function (...) local args = {...} local result = args[#args] for i = #args-1,1,-1 do result = func(args[i], result) end return result end end general_add = make_general_version (function (a, b) return a+b end) print (general_add(4, 4, 4, 4)) Basically, you can create a name for every single function if you want to, but in situations where you are throwing around so many one-off functions, it is more convenient not to do so.
Ninja Cheerleaders Ninja Cheerleaders is a 2008 comedy film written and directed by Patrick Hanbury. Plot A ninja sensei Hiroshi (George Takei) must be rescued by his three cheerleader/stripper students April (Ginny Weirick), Courtney (Trishelle Cannatella) and Monica (Maitland McConnell) from a mafia boss Victor Lazzaro (Michael Paré) and his evil ninja girlfriend Kinji (Natasha Chang). Cast The film also features Jason Ellis, Eric Stonestreet, Max Perlich, Lateef Crowder, Steve Olson, Louise Stratten, Kirsten Holly Smith, Heather Vandeven, Melanie Daniels (deleted scenes), Reuben Langdon (uncredited), Izabella St. James and Hayley Holmes (uncredited), in secondary and third-tier roles. Richard Davalos appears in his last film role as Don Lazzaro. Reception In 2011, UGO Networks featured the film on their list of 25 Hot Ninja Girls, calling it "just an excuse for hot women to do martial arts". References External links Ninja Cheerleaders - TarsTarkas.NET Category:2008 films Category:American films Category:2000s comedy films Category:Cheerleading films Category:English-language films Category:Ninja films Category:Ninja parody Category:American martial arts comedy films Category:American comedy films Category:American film remakes Category:2008 martial arts films
A procedural check list for pleural decompression and intercostal catheter insertion for adult major trauma. Intercostal catheter (ICC) insertion is the standard pleural decompression and drainage technique for blunt and penetrating traumatic injury. Potentially high complication rates are associated with the procedure, with the literature quoting over 20% in some cases (1-4). Empyema in particular is a serious complication. Risk adverse industries such as the airline industry and military services regularly employ checklists to standardise performance and decrease human errors. The use of checklists in medical practice is exemplified by introduction of the WHO Surgical Safety checklist. The Alfred Hospital in Melbourne, Australia is an Adult Level 1 Trauma Centre. In August 2009 The Alfred Trauma Service introduced an evidence-based checklist system for the insertion of ICCs, combined with standardised formal training for resident medical staff, in an attempt to minimise the incidence of ICC related empyema. Between January 2003 and July 2009 the incidence of empyema was 1.44% (29 in 2009 insertions). This decreased to 0.57% between August 2009 and December 2011 (6 in 1060 insertions) when the measures described above were introduced [p=0.038 Fisher's exact test, 2-tailed]. Quality control checklists - such as the ICC checklist described - are a sensible and functional means to standardise practice, to decrease procedural error and to reduce complication rates during trauma resuscitation.
Reality star and business woman Kourtney Kardashian has recovered with grace after an awkward moment during a live cross with TODAY Extra this morning. The star was speaking with co-hosts David Campbell and Sonia Kruger to promote the Manuka Doctor skin care line when the conversation steered toward her sister Kim Kardashian’s recent experience in Paris . “You should know that the people of Australia, and of our show, were very empathetic about what happened,” Campbell told Kardashian. He went on to ask how Kim is doing, when suddenly it became clear her representative had entered the interview room and was attempting to speak with her. “Stop,” the voice off camera can be heard saying. “We’re stopping.” Campbell tried to regain her attention but the connection to the star was lost. It seemed the interview was over, but Kardashian surprised the audience by graciously agreeing to keep chatting to the hosts, wanting to answer Campbell's question and to clear up confusion about the situation. “I’m sorry,” she said sincerely. “Everyone was just talking to me, it got a little crazy and the connection went out.” Campbell accepted the apology, telling the star he was grateful she continued the interview. “You guys are the Kardashians,” he said. “There will be people protecting you. We understand that and for you to come on, to come back to us, is a testament to you.” The reality star confirmed to the show that her sister Kim has been struggling in the weeks since she was robbed in Paris. “She’s not doing great,” she admitted. “We are all really still shaken up.
8 N.J. Super. 404 (1950) 72 A.2d 914 RKO THEATRES, INC., A CORPORATION OF THE STATE OF NEW YORK, ET AL., PLAINTIFFS, v. TRENTON-NEW BRUNSWICK THEATRES COMPANY, A CORPORATION OF NEW JERSEY, ET AL., DEFENDANTS. Superior Court of New Jersey, Chancery Division. Decided April 24, 1950. *406 Mr. Joel Gross, for the plaintiffs. Messrs. Carpenter, Gilmour & Dwyer (Mr. Samuel M. Coombs, Jr., on the brief), for the defendants. JAYNE, J.S.C. While the motion of immediate attention is addressed to the counterclaim of the defendants Long Park, Inc., and Trenton Theatre Building Company, it will be illuminating to disclose in a precursory fashion the nature of this action as originated by the complaint. The defendant Trenton-New Brunswick Theatres Company, organized in 1922, herein designated as "Theatres Co." is an exhibitor engaged in the operation of twelve moving picture theatres in the Trenton and New Brunswick area of this state. The outstanding capital stock of the company consists of 1,000 shares, divided into four equal classifications, that is, 250 shares of each class denominated as Class A1, A2, B and C stock. Of the 250 shares of Class A1 stock, 249 shares are held by the plaintiff RKO, and one share by the plaintiff Malcom Kingsberg. The plaintiff RKO also holds 249 shares of the Class A2 stock; the remaining share of that class is held by the plaintiff Sol A. Schwartz. *407 The stock of classes B and C has the following distribution of ownership: 249 shares of class B is held by the defendant Long Park, Inc., and one share by Walter Reade, Jr.; 249 shares of class C stock is held by the defendant Trenton Theatre Building Company and the remaining share by the defendant Richard M. Huber. It is unnecessary for present purposes to disclose specifically the voting and other rights of the holders of each class of stock and the terms of the so-called Management Agreement, concerning the validity of which there has been previous litigation. Long Park, Inc., v. Trenton-New Brunswick Theatres Co., 297 N.Y. 174, 77 N.E.2d 633 (Ct. of A. 1948). It is apparent that the assets and business of the Theatres Co. are substantial. Concisely stated, it is alleged in the present action that the voting shares of the Theatres Co. are equally divided into two independent ownerships and interests and unable to unite in the management of the company. The plaintiffs, the holders of one-half of the shares, seek the dissolution of the corporation pursuant to R.S. 14:13-15. An answer has been filed on behalf of all the defendants and a counterclaim was filed by leave of court at the request of the defendants Long Park, Inc., and Trenton Theatre Building Company. Conceiving that the counterclaim lacks the legal or equitable substantiality upon which relief can be granted, counsel for the plaintiff moves to strike it. Rule 3:12-2(5). In the consideration of a motion of this nature, the court must assume the ability of the counterclaimant to prove all of the facts alleged in the counterclaim or incorporated therein by reference. Gann Law Books v. Ferber, 3 N.J. Super. 236, 238 (App. Div. 1949). It will be expedient and probably sufficient here to summarize the allegations of the counterclaim thus impugned. It is therein alleged that no stockholder of Theatres Co. may sell, assign, transfer, or otherwise dispose of any of the stock of the corporation except in conformity with the terms and *408 provisions of Section 3 of Article IV of the amended certificate of incorporation. The section of the certificate is consequently regarded as incorporated in the counterclaim. It is reproduced in the Appendix submitted for attention. It reads in part: "Section 3. Restrictions on the transfer or pledge of stock. A. Without the prior written consent of all other stockholders, no stockholder of the Corporation shall sell, assign, transfer or otherwise dispose of any stock of the Corporation except as herein provided. If all other stockholders shall waive these restrictions with respect to any sale, assignment, transfer or other disposition of any stock by their written consent, such waiver shall not be a continuing waiver and these restrictions shall continue to apply to each and every purchaser, assignee, transferee or other person acquiring any stock of the Corporation. "1. If any stockholder (herein sometimes called `the Offeror') shall desire to sell all or any part of his stock in the Corporation, he shall first offer to sell the same to the other stockholders of the Corporation and to the Corporation itself (herein sometimes called `the Offerees') at its Book Value (as hereinafter defined) for a period of thirty (30) days from the date of mailing of an offer to all other stockholders and to the Corporation. The Offeror shall have the right to specify that he is offering such stock on an `all or none' basis. The Offerees shall have the right (upon the conditions in this Section hereinafter set forth) to purchase the stock offered in the following order of priority, it being understood that the Offeree or Offerees, as the case may be, having the first right to purchase the stock offered may purchase such stock to the exclusion of all other Offerees and that, in the event the Offeree or Offerees having a prior right to purchase the stock offered shall not accept such offer, the Offeree or Offerees having the next prior right to purchase shall be entitled to purchase the stock not purchased by the Offeree or Offerees having a prior right to purchase the same: CLASS OF STOCK Priorities in the Right to Purchase Stock Offered A-1 1. Any other holder of Class A-1 stock 2. Any holders of Class A-2 stock 3. Any holders of Class B or Class C stock 4. The Corporation A-2 1. Any other holders of Class A-2 stock 2. Any holders of Class A-1 stock 3. Any holders of Class B or Class C stock 4. The Corporation B 1. Any other holders of Class B stock 2. Any holders of Class C stock *409 3. Any holders of Class A-1 or Class A-2 stock 4. The Corporation C 1. Any other holders of Class C stock 2. Any holders of Class B stock 3. Any holders of Class A-1 or Class A-2 stock 4. The Corporation "All offers to sell stock shall be in writing, shall state the price, which shall be the `Book Value' (as hereinafter defined), shall state whether or not the offer is made on an `all or none' basis and shall be sent by registered mail to all stockholders and to the Corporation at their last known addresses appearing on the books of the Corporation. "No offer to sell stock shall be valid unless the Offeror shall send a copy of the same by registered mail to the Treasurer of the Corporation, as agent for the Offeror, together with a stock certificate or certificates representing the shares offered endorsed in blank (or with a stock power or powers endorsed in blank) and accompanied by the required amount of transfer tax stamps or funds to provide for the payment of the same. "The conditions upon which any Offeree shall have the right to purchase stock offered are as follows: "The acceptances of each Offeree shall be in writing, shall state the number of shares for which the acceptance is made, shall be addressed to the Treasurer of the Corporation, as agent of the Offeror, and shall not be valid or effective unless accompanied by a certified check payable to the Treasurer of the Corporation, as agent for the Offeror, in an amount equal to twenty-five per cent (25%) of the aggregate Book Value of the shares for which the acceptance is made and unless the same shall be delivered to the Treasurer of the Corporation on or before the expiration of said thirty (30) day period. "The acceptances, if any, of all Offerees shall be conditional upon the acceptance of the offer, as to all or any part of the stock so offered, by the Offeree or Offerees having priority in the right to purchase such stock. If an offer is made on an `all or none' basis and the acceptances of the Offerees do not equal or exceed in the aggregate the number of shares offered, the acceptances shall have no legal effect and the Offerer shall not be obligated to sell any of the stock offered. If the acceptances of the Offeree or Offerees having equal priority in the right to purchase the stock offered shall be for an aggregate number of shares which is greater than the number of shares offered, each such Offeree shall be entitled to purchase a pro rata number of the shares offered in the proportion that the number of shares specified in his acceptance bears to the aggregate number of shares which all such Offerees having equal priority specify in their acceptances. Fractions of shares will be disregarded in determining such proportion except that the Treasurer will determine by lot the name of the Offeree or Offerees entitled to purchase one or more full shares constituting the aggregate of such fractions of shares. If less than all of the shares offered are accepted by Offerees having *410 equal priority, the number of shares offered to the Offeree or Offerees, as the case may be, having the next priority, shall be deemed to be the balance of such shares. The Treasurer of the Corporation will notify all Offerees promptly at the end of said thirty (30) day period as to the number of shares which each such Offeree is entitled to purchase pursuant to the provisions of this Section 3 and the balance of the purchase price for such shares, which must be paid to the Treasurer of the Corporation on or before five (5) days after the sending of such notice. The Treasurer will cause proper certificates to be issued to each Offeree upon the receipt of the balance of the purchase price and will deliver to the Offeror the purchase price of all shares which have been sold and return to the Offeror a certificate of all shares which have not been sold. The Treasurer shall perform the duties set forth in this Section as agent for the Offeror and shall incur no personal liability in connection therewith. "`Book Value' is hereby defined as the sum of the capital stock values and surplus as shown by the consolidated balance sheet of the Corporation, certified as herein provided, at the end of the monthly accounting period (consisting of four or five weeks in accordance with the usual practice of the Corporation) not more than thirty (30) days immediately preceding the date of the notice of the offer, after eliminating goodwill, if any, and dividends, if any, paid or to be paid between the date of the end of such monthly accounting period and the end of the thirty (30) day period to be specified in the offer. The Book Value of each share of capital stock of the Corporation shall be the amount of Book Value determined in accordance with this paragraph divided by the total number of shares of all classes of stock of the Corporation then outstanding. In determining Book Value there shall not be included, and no effect shall be given, to any revaluation of capital assets, nor to the creation of any unusual reserves, made after the date of this certificate unless the same shall be approved by the Board of Directors of the Corporation. Adequate reserves shall be set up for all tax accruals. At the request of any stockholder, the Book Value shall be certified by the Treasurer of the Corporation, or, at the option and at the expense of the stockholder offering his stock, by any of the following independent auditing firms: Price Waterhouse & Co., Lybrand, Ross Bros. & Montgomery, Peat, Marwick & Mitchell, Haskins & Sells, Arthur Young & Company, Touche, Niven & Co., and Barrow, Wade, Guthrie & Co. or any other independent auditing firm which shall be approved in writing by the Corporation and the stockholders of the Corporation. "2. The holder of stock of any class, who desires to sell all or any part of his stock, may enter into an agreement for the sale thereof, and may sell the same, to any other stockholder or to the Corporation at such price and on such terms as may be agreed to between them, provided, however, the written consent of all other stockholders, if any, having a superior or an equal priority in the right to purchase such stock, is obtained and filed with the Corporation prior to the *411 consummation of such sale, and in such event, it shall be unnecessary for the holder of such stock to offer the same to the other stockholders and to the Corporation as above provided but notice in writing of such sale shall be given to the other stockholders and to the Corporation promptly upon the consummation thereof. "3. If the holder of stock of any class shall offer to sell all or part of such stock to the other stockholders and to the Corporation at its Book Value as above provided, and all or any part of the stock offered shall not be sold as a result of such offer, the holder of such stock may sell all or any part of the same to any person, firm or corporation whomsoever (including any other stockholder or the Corporation) at such price and on such terms as he shall deem advisable; provided, however, (a) he first offers it in writing to the other stockholders and to the Corporation (with the right on their part to purchase the same in the order of priority and for the period of time above set forth) at the same price and on the same terms offered by any such person, firm or corporation, and (b) any such offer shall not be accepted by any other stockholder or the Corporation. Upon the request of any other stockholder or of the Corporation, he will furnish information and evidence of the bona fide nature of any offer by any other person, firm or corporation. If any stock shall be sold as a result thereof, these restrictions on the transfer of stock shall be binding upon the purchaser." Also incorporated in the allegations of the counterclaim is a consent decree in an anti-trust action in the United States District Court for the Southern District of New York, entitled "United States of America against Paramount Pictures, et al.," in which the present plaintiff is enjoined from continuing to own any beneficial interest in the theatres operated by the Theatres Co. The core of the present counterclaim is that the plaintiff, having consented to the decree in the anti-trust suit and having instituted the instant action for a dissolution and "by other acts," has evinced the intention to dispose of its stock in the Theatres Co., and that the counterclaimants have the right under the provisions of the certificate of incorporation to purchase the plaintiff's stock at the book value which, they allege, they stand ready, able, and willing to do. The further allegation is that in the circumstances the formalities mentioned in the section of the certificate are inefficacious and inapplicable. The counterclaimants pray judgment: *412 "1. That the terms and provisions of Section 3 of Article IV of the Certificate of Incorporation, as amended, of defendant Theatres Company are in all respects valid and in full force and effect and are binding on the plaintiffs and defendants; "2. That plaintiffs be required and directed to sell all of the stock held by them in defendant Theatres Company to defendants Long Park, Inc., and Trenton Theatre Building Company at the book value thereof as defined in Section 3, Article IV of the Certificate of Incorporation, as amended, of defendant Theatres Company; and "3. That said defendants may have such other and further relief under this, their counterclaim, as may be equitable and just." There is reason to surmise that most, if not all, of the material factual elements implicated by the cause of action sought to be presented by the counterclaim are undeniable, yet in my consideration of the motion I am confined to the facts apparent on the face of the pleading so challenged. For example, with respect to the sale of Class A-1 and Class A-2 stock, priority to purchase is initially conferred upon "any other holder" of that class. It is declared in the complaint that one share of Class A-1 is held by the plaintiff Kingsberg and one share of Class A-2 by the plaintiff Schwartz, and admitted in the answer, but it is not negatived in the counterclaim or therein averred that Kingsberg and Schwartz are not the beneficial owners of the stock and its incidental priority rights. Then, too, it is not alleged that they were parties to the action or consented to the decree in the federal court. Likewise it would appear from the complaint that Reade and Huber are stockholders. They are not parties to the counterclaim. The explanation can be readily conjectured but it is not divulged by the counterclaim, and so it is not to be merely assumed that they are not interested in acquiring the plaintiff's stock. Rule 3:21, of course, relates to that situation. Moreover there is the allegation that the plaintiff by consenting to the entry of the anti-trust decree, by the institution of the present action, and "by other acts" has manifested its intention to dispose of its stock. What are the "other *413 acts?" An allegation so vague is subject to criticism by a motion pursuant to Rule 3:12-5. It is possible under our new practice to submit "matters outside the pleadings" and thereby with the acquiescence of the court convert the motion into one akin to an application for summary judgment. Rule 3:12-2(5); Rule 3:56-1, et seq. It would seem that such a course of procedure would be opportune in the circumstances. The counterclaim as it is at present constituted appears to me to be infirm basically, if I am to consider the information imparted by the Appendix which has been submitted by the plaintiff without objection by the counterclaimants. Since the court is unenlightened by any counteracting allegation in the counterclaim, the rights of the plaintiffs Kingsberg and Schwartz to purchase the stock appears to be superior to those of the counterclaimants. That infirmity of itself warrants the granting of the motion to strike subject to the privilege to supply the deficiency by amendment. Perhaps in the emergent situation of the management of Theatres Co., I should not refrain from expressing my views in other aspects of the defendants' counteraction. The alleged catena of events by which the counterclaim is sought to be supported is neither legally nor logically tenable. Assuming, without deciding, that Section 3 of Article IV of the amended Certificate of Incorporation is a valid and enforceable agreement between the stockholders, manifestly it was never intended or contemplated that it would embrace a situation such as now exists. The consent to the decree in the anti-trust suit, analogous in such cases to a plea of non vult, did not in my judgment constitute a "desire," much less an "offer," by the plaintiff to sell its stock to the other stockholders of the Theatres Co. within the intendment of the section of the certificate. I note that the anti-trust decree was entered November 8, 1948. Under the provisions of the pertinent section in the certificate, the offer to sell is only available "for a period of thirty (30) days from the date of mailing of an offer to all other stockholders and to the Corporation." The counterclaim said to *414 evidence the acceptance of the offer was not filed until March 13, 1950. The agreement embodied in the certificate of incorporation required the offer to sell to be in writing and sent by registered mail to all stockholders and to the treasurer of the company to whom, as agent of the offeror, the offeror should also deliver the stock certificate or certificates, endorsed in blank, representing the stock offered for sale. The acceptance of the offer "shall not be valid or effective unless accompanied by a certified check payable to the Treasurer of the Corporation, as agent for the offeror, in an amount equal to twenty-five per cent (25%) of the aggregate Book Value of the shares for which the acceptance is made and unless the same shall be delivered to the Treasurer of the Corporation on or before the expiration of said thirty (30) day period." The offeree must have priority in the right to purchase. The past occurrences do not seem to establish either the submission of an offer to sell or an acceptance thereof within the terms of the alleged charter agreement. I observe that the counterclaim makes express reference to the institution of the present suit by the plaintiffs. I would suppose that the statutory provision for dissolution (R.S. 14:13-15) enters also into the corporate charter, and every stockholder takes and holds his stock subject to the statutory rights thereby conferred. In re Collins-Doan Co., 3 N.J. 382 (Sup. Ct. 1949). I have no doubt that one may ordinarily waive the benefits of a statutory remedy provided one does not thereby contravene the public policy exhibited by the enactment. But did the plaintiff's consent to the anti-trust decree also have the potency to procreate an implied waiver of the statutory rights? I realize that in these concluding comments I have looked beyond the tilting ground of the counterclaim and envisioned the entire battlefield as revealed by all of the present pleadings. Although judicially unfashionable, some liberal expression of my momentary conceptions may be serviceable. Adhuc sub judice lis est. The motion to strike the counterclaim is granted.
Necessary Assumptions1 GILBERT PLUMER Law School Admission Council Abstract: In Evaluating Critical Thinking Stephen Norris and Robert Ennis say: "Although it is tempting to think that certain [unstated] assumptions are logically necessary for an argument or position, they are not. So do not ask: for them." Numerous introductory logic text authors and various highly visible standardized tests (e.g., the LSAT and ORE) presume that Norris and Ennis are wrong; the presumption is that many arguments have (unstated) necessary assumptions and readers and test takers can reasonably be expected to identify them. This paper proposes and defends criteria for determining necessary assumptions of arguments. Both theoretical and empirical considerations are brought to bear. Resume: Dans leur livre, Evaluating Critical Thinking, Stephen Norris et Robert Ennis disent: "Bien qu'on soit tente de croire que certaines suppositions [non-prononcees1 sont necessaires logiquement a un argument ou une position, elles n'en sont pas. Done, n'en demandez pas." Plusieurs auteurs des manuels introductoires de la logique et divers epreuves eta/onnees tres connues (e.g., Ie LSAT at Ie ORE) presument que Norris et Eimis ont tort; la presomption est que plusieurs arguments ont des suppositions necessaires [nonprononceesJet que c'est raisonnable d'attender aux liseurs et ceux qui se presentent aux epreuves de les cons tater. Dans cette communication je propose et defends des criteres pour cons tater les suppositions necessaires des arguments. On met en oeuvre les considerations et theoriques et empiriques. Keywords: Enthymeme, implicit assumption, missing premise, gap-filler, testing, principle of charity. In their book Evaluating Critical Thinking Stephen Norris and Robert Ennis say: "Although it is tempting to think that certain [unstated] assumptions are logically necessary for an argument or position, they are not. So do not ask for them . . . no significant assumptions are logically necessarily made."2 Numerous writers of introductory logic texts,) as well as various highly visible standardized tests, presume without giving much (or any) justification that the Norris-Ennis view is wrong; the presumption is that many arguments have (unstated) significant necessary assumptions and that readers and test takers can reasonably be expected to identify such assumptions. One such standardized test is the Law School Admission Test (LSA T) (another is the Graduate Record Examinations (GRE». This paper will propose criteria for determining necessary assumptions of arguments, criteria that I think are correct in themselves in addition to being appropriate for writers and reviewers of the kind of test that the LSA T represents: a measure of advanced yet nontechnical reasoning and reading abilities using the format of multiple-choice questions. The account will be defended against the kind of objections Norris and ©In/ormaLLogic Vol. 19, No.1 (1999): pp.41-61. 42 Gilbert Plumer Ennis raise, among other objections. Both theoretical and empirical considerations will be brought to bear in the course of my argument. I. Principal Necessary Assumption Criteria On the LSA T a typical necessary assumption question consists of a short argumentative passage, a question stem on the order of "The argument depends on assuming which one of the following?", and five answer choices. Notice that the focus is on the argument, rather than the arguer. Not only is the former more appropriate for logic (as opposed to psychology), but with no context other than the brief passage it would be unreasonable to ask the examinee to peer into the mind of the arguer to determine what the arguer is assuming. This focus on the argument helps to rule out certain necessary assumption pretenders. One kind of pretender is that of a presupposition or implication of a propositional element of the argument, be it a premise or conclusion. The truth of some proposition p may be a necessary condition for the truth of a statement s in an argument or a necessary condition for a term in s to have a referent, etc., but this does not make p a necessary assumption of the argument. One reason is that p is not presupposed by the argument as a whole; a proposition must be integral to the reasoning or inferential structure of an argument, not just to a claim made within the argument, in order for the proposition to be a necessary assumption of the argument (specific examples will be discussed as we proceed). Another, sometimes related, kind of necessary assumption pretender is that of a general presupposition of rationality. For instance, that it is possible to do X is not a necessary assumption of an argument to the effect that X ought to be done, even given that ought implies can. At best, that it is possible to do X would be a presupposition of a propositional element of the argument, viz., the conclusion, and the putative conceptual truth that ought implies can would be a presupposition of something that is so to speak larger than any particular argument, namely, rationality itself (unless, of course, such is the subject matter of the argument). Similarly, neither should we hold that a perfectly general rule of inference such as Modus Ponens is a necessary assumption of an argument that instantiates Modus Ponens. If we do, we embark on an infinite regress akin to Lewis Carroll's (discussed below in §IV). These sorts of considerations function as some antidote to the view that no proposed set of necessary assumptions of an argument, if the set is finite, is big enough.4 A criterion that is at least alluded to by virtually every writer on the subject is the idea that a necessary assumption must somehow fill a 'gap' in the stated argument's reasoning, thereby making the inference stronger than it otherwise would be. Michael Burke provides a more precise way of stating the criterion: a necessary assumption is "any proposition which needs to be Necessary Assumptions 43 true, if the inference is to be justified." However, Burke himself rejects this as unhelpful on the grounds that there are "infinitely many" such propositions. "Examples: that there is at least one inference; that there is at least one justified inference; that there is at least one thing that is either an inference or a polar bear."5 What this fact indicates is not that the gap-filling criterion is useless; instead, it indicates that the gap-filling criterion needs to be supplemented by other criteria. Because all of Burke's examples are presuppositions of rationality, or at least of the existence of rationality, none are necessary assumptions of any particular argument (unless, of course, such is the subject matter of the argument). As far as I can see, the most precise and perspicacious way that the subject matter will bear of stating the gap-filling criterion is as follows. GFC: It could not be the case both that the argument aside from the proposed necessary assumption is fully cogent and the proposed necessary assumption is false. In the GFC the central meaning of the clause that 'the argument aside from the proposed necessary assumption is fully cogent' is that given the truth of what I will call the received premises (i.e., all of the implicit and explicit premises, considered apart from the proposed necessary assumption), the conclusion can be inferred to be true. The standard of an allowable inference here is to be taken as varying in stringency according to whether the argument is deductive (in which case validity is the standard) or nondeductive. Of course a nondeductive argument may have a conclusion that is in fact false, yet it still be reasonable to infer that it is true from the truth of the premises. Cogency is perhaps a loose evaluative concept, but I take it to pertain only to an argument's reasoning or logic, not also to the truth value of its propositional elements (unlike the technical concept of soundness). And in no case is cogency purely a matter of formal validity. For example, adding the stated conclusion or the contradictory of a stated premise to the stated premises would make any argument formally valid. But the argument would lack cogency insofar as it grossly begs the question or engages in self-contradiction. In order to be fully cogent, it seems an argument must not commit any informal fallacy (that pertains to its reasoning). I would hope that the rationale behind the GFC is fairly clear. Suppose the GFC is violated. That is, suppose that the proposed necessary assumption is false, and given the truth of the argument's received premises-premises that might, but need not, include an alternative to the proposed necessary assumption-the conclusion can still be inferred to be true in a fully cogent way. Then surely, the proposed assumption does not figure in the argument's reasoning; for the proposed assumption does not have to be presumed to be true in order to so-infer that the argument's conclusion is true. Hence, it is not in fact a necessary assumption of the argument. 44 Gilbert Plumer Notice that the GFC does not deny the logical truth that it could be the case both that an argument as a whole is fully cogent and an assumption of it is false. Unlike the GFC, this logical truth involves the notion that if all of the argument's premises, including the assumption, were true, the conclusion could be inferred to be true. Similarly, the question stem in Example I (next section) says, in effect, 'if the argument as a whole is fully cogent, then it must be assuming which one of the following?, (and Example 3's question stem is just shorthand for 1 's); it does not say 'ifthe argument as a whole is fully cogent, then which one of the following must be true?'. However, the point of the GFC is that the most critical and heuristically useful part of what the question stem means here is 'if the explicitly given argument is fully cogent, then which one of the following must be true?'. The GFC thereby treats a necessary assumption as an 'inference license'. The general idea is that the same proposition may be treated both as an implicit element of an argument that as a whole is fully cogent and as a fact that helps to justify the inference in a stated argument that itself is fully cogent.6 There is apparently no better way of determining necessary assumptions. Consider the following criterion: NAC: A proposition is a necessary assumption of an argument if and only if it could not be the case both that the argument is fully cogent and the proposition is not included as a member of the argument's premise set. While this criterion would not overtly need to be taken in conjunction with other criteria, unlike the GFC, in fact it does not get us substantially beyond the question stem in Example 1. The NAC does clearly indicate that cogency is what assuming the proposition is necessary for. But circularity is a problem since the members of an argument's premise set are its explicitly stated premises and its implicit premises (if any), and a premise that is determined to be implicit by logical means just is a necessary assumption. The reader is warned that there will be little further theoretical treatment of the concept of cogency itself. A cogent argument is an argument that exhibits good reasoning, as determined by informal and, in the case of deduction, formal standards. It is not the point of this paper to elaborate in general terms on what makes an argument a good one, in this familiar sense. Indeed, it is hard to see how any mere paper could have this as a topic, since it is the defining subject matter ofthe discipline of logic. 7 Of course in elaborating and defending my criteria for determining necessary assumptions I will have to wield a concept of a good (cogent) argument. Yet I do not think that my concept contains anything particularly controversial or unusual. Of course if your concept differs from mine in some reasonable respect, you may make different reasonable judgments in the application of the criteria to individual Necessary Assumptions 45 cases. That is to be expected. But what is more important is the structure, not the details of how it is applied. Besides, logic is hardly distinguished among the various fields of philosophy and other humanities by its lack of inter subjective agreement. The very opposite is true. II. Application to LSAT Examples Example 1(6191 LSAT)** Train service suffers when a railroad combines commuter and freight service. By dividing attention between its freight and commuter customers, a railroad serves neither particularly well. Therefore, if a railroad is going to be a successful business, then it must concentrate exclusively on one of these two markets. For the argument to be logically correct, it must make which one of the following assumptions? (A) Commuter and freight service have little in common with each other. (B) The first priority of a railroad is to be a successful business. *(C) Unless a railroad serves its customers well, it will not be a successful business. (D) If a railroad concentrates on commuter service, it will be a successful business. (E) Railroad commuters rarely want freight service as well. P-H Example II (6191 LSAT)** It is even more important that we criticize democracies that have committed human rights violations than that we criticize dictatorships that have committed more violent human rights offenses. Human rights violations are always inexcusable, but those committed by governments that represent the will of the people are even more reprehensible than those committed by dictators. Further, our criticism is more likely to have an effect on the former than on the latter. Which of the following is the proper inference from the passage? 46 Gilbert Plumer (A) All governments commit some inexcusable and reprehensible acts. *(B) Some human rights violations are more reprehensible than other, more violent human rights violations. (C) Criticisms of human rights violations is certain to have no effect on a dictatorship. (D) Human rights violations are more likely to occur in democracies than in dictatorships. (E) Those who do represent the will of the people are less likely to be moved by criticism than are those who merely claim to represent the will of the people. Example III (2/92) LSAT)** The brains of identical twins are genetically identical. When only one of a pair of identical twins is a schizophrenic, certain areas of the affected twin's brain are smaller than corresponding areas in the brain of the unaffected twin. No such differences are found when neither twin is schizophrenic. Therefore, this discovery provides definitive evidence that schizophrenia is caused by damage to the physical structure of the brain. Which of the following is an assumption required by the argument? (A) The brain of a person suffering from schizophrenia is smaller than the brain of anyone not suffering from schizophrenia. * (B) The relative smallness of certain parts of the brains of schizophrenics is not the result of schizophrenia or of medications used in its treatment. (C) The brain of a person with an identical twin is no smaller, on average, than the brain of a person who is not a twin. (D) When a pair of identical twins both suffer from schizophrenia, their brains are the same size. (E) People who have an identical twin are no more likely to suffer from schizophrenia than those who do not. **Copyright © 1991, 1992 by Law School Admission Council Let us consider the examples from actual LSA Ts in more detail. Optiori (C) in Example I is (I claim) the necessary assumption in a fairly straightforward case of Hypothetical Syllogism, a deductive pattern. (C) pretty clearly satisfies all the criteria discussed thusfar. And specifically with respect to the GFC, consider that the conclusioin in the argument claims that if a railroad Necessary Assumptions 47 combines commuter and freight service (-r), it will not be a successful business (-:-p). Why? The stated grounds are that combining commuter and freight service leads to a railroad's not serving its customers well (-q). Ifnot serving its customers well did not in turn mean that a railroad will not be a successful business, i.e., if(C) were false, then even given the truth of the stated premise, the conclusion could not be inferred to be true-it could be either true or false. This is not a matter of claiming that q~r .'. ~r is invalid or that -~q), q~r .'. p~r is invalid, although these claims are true. Nor is it a matter of claiming that -(p~q) logically or strictly implies -((q~r)~(p~r)), which is a false claim. Rather, the claim is that if (C) were false, there would be no logically acceptable conclusion-warranting link between a problem that the argument describes as arising from a railroad's combining commuter and freight service, viz., not serving its customers well, and the question of whether a railroad will be a successful business: In addition to being (I claim) necessary, (C) in Example I is of course also a sufficient assumption. It wholly fills the gap in the argument's reasoning. Certain other statements would be sufficient but not necessary, e.g., the broader statement formed by substituting 'a business' for "a railroad" in (C); such a statement would go beyond providing everything implicit that the given argument depends on for full cogency. However, nothing in the context provided by the passage would justify attributing this greater generality to the argument; the passage is about railroads, not businesses in general. Indeed, nothing in the context would justify attributing any assumption other than (C) to the argument. To take another sort of case, suppose (C) said 'unless a railroad serves its customers well and stays in business for at least twenty years (s), it will not be a successful business' ~(q & s). To attribute this proposition to the argument as an assumption would be either to make the given argument lack cogency (which is contrary to the point of determining assumptions) or to construct a different (albeit cogent) argument, since a requirement for a railroad's being a successful business, viz., s, would be imported 'out of the blue' into the context. Perhaps the clearest way of seeing why (C) alone satisfies the GFC is to consider the fact that every other sufficient assumption of the argument (with the exception of degenerate cases such as the conclusion or the associated conditional ofthe explicit argument-these will be discussed later) implies (C), but none are implied by (C).8 Intuitively, it seems that option (B) in Example 2 is clearly not a necessary assumption of the passage's argument. This is hardly because (B) is a presupposition of rationality generally or of a single propositional element of the argument. Giving an account that at once both supports the sort of intuition we have in a case like (B) here and supports holding that the credited responses in cases like Examples I and 3 are necessary assumptions is perhaps the most interesting and vexing problem to be encountered in dealing with argument assumptions. (B) in Example 2 follows from the conjunction of the 48 Gilbert Plumer first and second sentences in the passage, which are the argument's conclusion and (first) premise, respectively (the passage's third sentence is a premise that is independent of the first premise). (B) follows from these two sentences considered as independent statements, that is, in abstraction from the fact that they are related as premise and conclusion. This means that (B) has nothing to do with the argument's reasoning, i.e., its inferring the first sentence from the rest. (B) rectifies no lacuna in the argument's reasoning; it makes no contribution to the argument's cogency. (It may be worth remarking that the overt existential commitment of (B) derives from the argument in the passage through the fact that it could not be important to criticize democracies for certain actions unless those actions existed.) A principal virtue of the GFC is that in general it rules out contingent (i.e., neither necessarily true nor necessarily false) implications or presuppositions of any propositional element of an argument or conjunction ofthese elements; Example 2 (B) is a case in point. (In considering this it is to be understood that these elements are taken as independent propositions; they are taken in abstraction from any associated implicit or explicit argument-indicator terms such as 'thus' and 'since'. Otherwise, an implication could very well be a necessary assumption: the GFC gives a relatively clear meaning to the notion of being implied by an argument qua argument, i.e., without the abstraction performed.9) Since by definition such implications are already part of the content of the argument, the argument could quite well be fully cogent without reintroducing them into the argument individually as further members of its premise set. Such implications violate the GFC in the following way: Although if such a proposed necessary assumption is false the conjunction of the argument's conclusion and received premises is also false, this does not rule out the possibility that if the received premises were true the conclusion could be inferred to be true in a fully cogent way. Just as it is a logical truth that it could be the case both that an argument as a whole is fully cogent and the conjunction ofits propositional elements is false, it is a logical truth that it could be the case both that an argument, considered apart from such an implication, is fully cogent and the implication is false. (Of course an exception arises from the curiosity that every proposition logically implies itself. If it is already established of something that it is a necessary assumption of an argument and is hence a propositional element of the argument, this curiosity does not mean that the proposition is not a necessary assumption of the argument.) However, the GFC is not so powerful as to preclude any arbitrarily selected necessary truth from being counted as a necessary assumption; the same applies, for example, to the proposition that there is at least one fully cogent argument. So we still need, respectively, the criteria that a necessary assumption not be an implication of a propositional element of the argument or a general presupposition of rationality (assuming that not all general presuppositions of rationality are necessary truths). This points to a limitation of the Necessary Assumptions 49 account: it cannot be used to determine any necessarily true necessary assumptions, as of an argument that has other necessarily true propositional elements, e.g., a mathematical argument. This is just a c;onsequence of a socalled 'paradox' of logical implication-a necessary truth is implied by any proposition whatsoever. As far as I can see, the only alternative for determining such assumptions is the NAC (above). As for arguments that have necessarily false propositional elements, insofar as they would lack cogency in virtue of having such elements, it is not clear that these arguments could even have necessary assumptions (where cogency is what assuming the proposition would be necessary for). In Example 3, a clear case of nondeduction, I interpret the causal relationships propounded by the argument to be that damage to the physical structure of the brain is the common cause of both schizophrenia and the relative smallness of certain parts of the brains of schizophrenics. This is how the argument explains the "discovery," i. e., the apparently perfect correlation of schizophrenia and the relative smallness, after in effect ruling out a genetic explanation. Option (B) contributes to the argument's cogency in an essential way by ruling out two further salient alternative explanations of this correlation. Ifthe negation of (B) were the case, then (at least) one of these alternative explanations would be true, and it would fully explain the discovery or evidence without any need to appeal to a damaging mechanism, contrary to the claim made through the argument-indicator term "Therefore, this discovery provides definitive evidence that." So the GFC is satisfied. Note that (B) is not merely an implication of the statements in the passage since these statements, considered in abstraction from the fact that they constitute an argument (excise "Therefore, this discovery provides definitive evidence that"), are entirely compatible with the negation of (B): the damage causes schizophrenia, and schizophrenia or the medications used in its treatment in tum cause the smallness. All of this presumes that the damage and the smallness are not the same phenomenon; if they were the same phenomenon, then (B) would not be a necessary assumption ofthe argument. (B) would simply be a presupposition or implication of the statement in the argument that "schizophrenia is caused by damage to the physical structure of the brain," i.e., the argument's conclusion. (B) in Example 3 has the logical form -(t v u). Does the GFC or the criterion that a necessary assumption not be a presupposition or implication of a propositional element of the argument mean that -t and -u each are not necessary assumptions? If -(t v u) is taken to be a necessary assumption, then of course neither -t nor -u is also a necessary assumption-the argument could quite well be fully cogent without either being included as a further member of its premise set. Conversely, if -t and -u are each taken to be necessary assumptions, then of course -(t V u) is not an additional necessary assumption. We can take either sort of approach in determining necessary 50 Gilbert Plumer assumptions, but we cannot take both. Detennining necessary assumptions should not be confused with proving validity, which by definition involves the application of theorems and rules of inference such as those that fonn the backdrop of the present discussion, i.e., De Morgan's, Simplification, and Conjunction. Nor, it seems, is it a necessary assumption of the argument (e.g.) that the relative smallness is not the result of visitors from outer space picking out schizophrenics and shrinking parts of their brains with some ray gun. Allowing such propositions as necessary assumptions-propositions that are insufficiently relevant to the evident concerns of the argument (which have to do with science rather than science fiction)-would to some significant extent make the argument lack cogency. So they could hardly be necessary for the argument's cogency. If indeed the scenario envisioned is one of science fiction, then the proposed necessary assumption violates the GFC in that it could very well be the case both that the argument aside from this proposition is fully cogent in a scientifically respectable way and yet this proposition is 'false' , i.e., the alternative explanation is true only in science fiction. Moreover, the set of propositions that individually rule out questionably salient alternative explanations would be open-ended or infinite, and the set would be fonned by applying a rule of Universal Instantiation to a supposed assumption in the argument to the effect that no other explanation is true. But this would amount to treating an argument that is manifestly nondeductive as deductive. ITI. Narrowness Objection It might be thought that no putatively necessary assumption (n) of an argument is actually necessary because there is always an alternative candidate (c)-a narrower version of n, or the explicit argument's associated conditional or even its conclusion-that logically would serve just as well as an assumption. It might appear that the existence of c makes it the case that n violates the GFC as follows: n could be false, yet if the received premisestaken as including c-were true, the conclusion could be inferred to be true. Let us first examine the question of narrowness. Ennis says: The basic idea is that any incomplete argument can be completed in a number of different ways. Consider the simple argument, "Since Mike is a dog, Mike is an animal." To suggest the range of possible gap-fillers, I shall note two, the one that first occurs to most people [note this admission] and another one: 1. All dogs are animals. 2. All dogs whose name begins with "M" are animals. A person is not logically prohibited from offering the argument, denying 1, and using 2 as a gap-filler. This shows that 1 is not logically necessary for the offering of the argument. So long as the offered gap-filler is more general than a statement establishing connection between the offered Necessary Assumptions 51 premise and conclusion, one can deny the offered gap-filler and derive the conclusion from the offered premise by using a narrower gap-filler. The limiting case is the simple statement that the offered premise was assumed in the circumstances to be sufficient to establish the conclusion. 1O Though this view has its appeal, I think that it is highly misleading. It is a principle of rationality that similar cases are to be treated similarly. There is nothing in the context to indicate that Mike is in any way special with respect to being a dog. Qua dog, Mike is an arbitrarily selected individual. In logic the injunction to treat similar cases similarly is the rule of Universal Generalization (UG). The necessary (and sufficient) assumption here, 1 (x)(Dx-+Ax) , is determined by the fact that UG applies to the stated argument's inference (Dm-+Am). Therefore, it does not seem too strong to hold in this case that both "offering the argument" and "denying 1" would be self-contradictory. This means that 1 satisfies the GFC: it could not be the case both that the argument aside from 1 is fully cogent and 1 is false. 1 satisfies the other criteria proposed above for determining necessary assumptions of arguments if we presume, as Ennis apparently does (p. 75), that 1 is not a necessary truth. If I were taken to be a necessary or conceptual truth such that the concept of animal is involved in the concept of dog, then it would not be at all clear that the stated argument has any gap that needs filling. II Notice that the argument "Since Mike is a dog, Mike is an animal" with 2 as the supposedly sufficient assumption (Ennis supposes it 'completes' the argument) is invalid. It would be valid if it had the more specific or narrower claim 'Mike is a dog whose name begins with "M'" as the explicit premise (such dogs constitute a proper subset of all dogs). Indeed, if this were the explicit premise, 2 would be the (unstated) necessary and sufficient assumption. The general principle operating here is that specificity that restricts the inferences licensed by the assumption is introduced by the narrower explicit premise, and the case becomes similar to that of Example 1, as contrasted to a more general argument that has as a necessary assumption (C) with its "a railroad" replaced by 'a business'. Yet in the original argument ("Since Mike is a dog, Mike is an animal") and context the only evidentiary claim made about Mike is that he is a dog. So what follows from this about Mike (that he is an animal) follows for any dog. Similarly, as Irving Copi puts it, "In the geometer's proof the only assumption made about ABC is that it is a triangle, hence what is proved true of ABC is proved true of any triangle."12 Again, this is just UG at work. Govier writes: "Consider: Abortion is wrong because it's killing. What does this sentence, which encapsulates an extremely simple-minded argument, entail? Does it entail that all killing is wrong? ... that most killing is wrong? ... that killing something unborn is wrong? I don't know what the 52 Gilbert Plumer answer is, and if somebody else does, I wish he'd tell me how he worked it OUt."13 In the absence of any further context other than that provided by the argument itself, and being faithful to the 'extreme simple-mindedness' of the argument, the answer is that through UG the argument 'entails' or has as a necessary assumption that all killing is wrong. If this were not the case, it would be irrelevant to object to the argument by pointing out that just because an action involves killing, that does not make the action wrong-after all, for example, killing a murderous home invader in self-defense does not appear to be wrong. A cost of adopting an Ennis-like view on necessary assumptions is a severe restriction on the legitimate use of counterexample and refutation by logical analogy. Ennis appears to hold that aside from what he calls "The limiting case," there is always a logically viable narrower alternative to any putatively necessary assumption that renders it unnecessary. I have just argued that this view is false, mainly by arguing that the specificity of the context and explicitly given argument determines the specificity of the necessary assumption; so if the former is in certain respects general, the necessary assumption is accordingly general. Let us now consider "The limiting case." IV. Associated Conditional Objection Presumably, "The limiting case" is the explicit argument's associated or corresponding conditional; in Ennis' example Dm :.Am it is Dm-?>Am. Ennis indicates that "an arguer is committed to at least this minimal claim" (p. 83), although such a claim is apparently only an 'insignificant' necessary assumption (as I quoted Norris and Ennis at the beginning of this paper). So the view I wish to consider, one that is suggested by Ennis' remarks, is that no putatively necessary assumption of an argument is actually necessary, unless it is already the explicit argument's associated conditional, since that conditional itself would make the argument fully cogent. This view has the consequence that every natural language argument that is enthymematic with respect to its explicit premises is construable as an instance of pure Modus Ponens, which I think is absurd. Although in formal logic there are systems that incorporate only one rule of inference such as Modus Ponens,14 this hardly means that this sort of system could be an adequate representation of fundamental argument structure in ordinary discourse. In Example I it is difficult to conceive of the whole argument in natural language where the assumption is taken to be the associated conditional of the argument stated in the passage. It is not at all clear that the whole argument would be fully cogent; it seems quite trivialized. From my point of view this is no surprise: the whole argument is a paradigm case of an everyday Hypothetical Syllogism. The same kind of remarks are perhaps even more convincing with respect to Example 3, where there is the added specter of treating an obviously nondeductive argument (to the best explanation) as deductive. Logic Necessary Assumptions 53 is in part a study of arguments as they actually appear in ordinary discourse. Numerous distinct patterns of reasoning or regularities in argument structure have been identified. To allow this, yet hold that all ordinary arguments that are enthymematic with respect to their explicit premises could exhibit the single pattern, Modus Ponens, seems inconsistent. Why should recognizing the. pattern of reasoning in such an enthymematic argument be so radically different from pattern recognition in other endeavors where the explicit or presented pattern is only partial (e.g., continuing a numerical sequence or recognizing a friend in a photographic profile)? The patterns identified are hardly all the same in any of these latter endeavors. In such a way as this at least, the credited responses in cases like Examples 1 and 3 are assumptions that are 'logically necessarily made'. Let P stand for the conjunction of an argument's explicit premises; C stand for the argument's conclusion (taken to be explicit); and I stand for the conjunction of the argument's implicit premises or necessary assumptions, if any. That an argument has the form P, I :. C rather than simply P:. C by itself provides no particular reason for identifying I with P~C, i.e., the explicit argument's associated conditional. The only thing that could warrant this identification would be some aspect of the argument's context, such as that Mike is somehow a special, nonarbitrarily selected dog in the case of Dm :.Am. In that case the whole argument would be the pure Modus Ponens Dm~Am, Dm:. Am, rather than as I am construing it, viz., (ix)(Dx~Ax), Dm:. AmY But instances of pure Modus Ponens wherein the m~or premise is implicit (P:. C, with P~C implicit) must constitute the exception and not the rule, especially if we take, as many do (see below), the implicit premise here to simply replicate or be "reiterative" of the implication relationship of the explicit argument. This reiteration would make the argument self-referential, and the self-referential case's being exceptional is to be expected in light of the numerous paradoxes of self-reference (e.g., the liar paradox concerning the claim 'this statement is false', and Russell's paradox, which concerns the set property of being self-membered). I!> The rule, on the other hand, would have to be that it is in fact incoherent to identify I with P~C: That an argument is enthymematic with respect to its explicit premises means that the conclusion is not implied by these premises alone; more premise material is needed in order to properly infer the conclusion-that is precisely how the argument is enthymematic or "incomplete." This is to say P~C only if SI v ... S,,-where S, v ... S" is the disjunction of the possible sufficient assumptions of the enthymematic argument, none of which is identical to P~C. So if none of Sr"S" were acceptable, neither would P~C be acceptable. (The criteria proposed in this paper are meant to be usable to determine which of SrS" is necessary, i.e., is identical to I.) It is therefore at least very misleading to affirm the widespread view that "we may add the reiterative candidate [i.e., add P~C to an argument that has 54 Gilbert Plumer the form P, I:. C]. This is always unobjectionable, since the acceptability of the reiterative candidate is a necessary condition of the acceptability of the argument." (The view does correctly go on to say that this adding is "never useful, in regard to facilitating evaluation, since it is never easier to evaluate the reiterative candidate than to evaluate the corresponding inference.")17 We have just seen the problem with identifying I with P 4C. Yet if these are not identified, then adding P4C would at least make I superfluous with respect to drawing the conclusion, so in what sense could I be a set of implicit premises or necessary assumptions? I think the view is confused about why the enthymematic argument or arguer is, as Ennis puts it, "committed" to P4C. It is not because P:. C is stated and P4C just 'reiterates' the implication relationship of this statement. Instead, as a rule it is because the argument's being enthymematic means that it has an implicit premise set I(:t:P4C), and that P, when conjoined with I, implies C «P & 1)4C). By Commutation and Exportation this is equivalent to 14(P4C), and of course there is commitment to I; as in Example I, p4Q implies (Q4r)4(p4r). (It seems that these points apply to nondeductive arguments where '4' is read as, e.g., 'probabilifies'.) However, even though there is commitment to P4C, P4C is not a further necessary assumption of the argument precisely because it is implied by what is already, by supposition, a propositional element or conjunction of such elements of the argument, viz., I. Some may even think that one can freely add the associated conditional (P4C) to nonenthymematic arguments. If this is done with the justification that "all arguments depend upon the 'assumption' that you can get from their specific premises to their specific conclusions,"18 then one has embarked on Lewis Carroll's infinite regress, which in the example Carroll presents l9 has the form: A; (\ix)(\iy)(\iz)«(x = z) & (v = Z»4(X = y» B: (a = c) & (b = c) C: (A & B)4Z D: (A & B & C)4Z Z: a = b The vertical margin dots represent an infinite series of recursive iterations in the manner of premises C and D. V. Charity Let us briefly consider how charity enters the picture. To attribute Ennis' "gap-filler" 2, "All dogs whose name begins with 'M' are animals," to the argument "Since Mike is a dog, Mike is an animal" would violate any reasonNecessary Assumptions 55 able principle of charity. This is not merely because this "gap-filler" would make the argument invalid; it is more generally because the attribution would come totally' out of the blue'. There is simply nothing in the barren context presented to justify such an attribution. The attribution of 2 would make the argument as a whole very strange-how could the character of a dog's given proper name have anything to do with the dog's being an animal? It was noted in §II that necessary truths trivially satisfy the GFC. The other half of the story is that any proposed necessary assumption of an argument that is wholly or irredeemably fallacious will trivially satisfy the GFC, simply because the argument could not be fully cogent and remain the same argument. The avoidance ofthis trivial satisfaction constitutes one reason it is crucial to see that in the very act of attributing a proposition to an argument as a necessary assumption (in the sense explained above) one presumes that the argument is cogent, and thereby interprets it charitably, to at least some extent. Cogency is what assuming the proposition is necessary for; the proposition fills a gap in the explicit argument's reasoning, thereby making the reasoning stronger than it otherwise would be (although it could still be weak or fallacious in other respects). A necessary assumption contributes to an argument's cogency, and a necessary and sufficient assumption completes the argument so that it is fully cogent. This means that it would be incoherent to treat as necessary and/or sufficient assumptions of arguments such propositions as the argument's stated conclusion or the contradictory of a stated premise. For this would be to uncharitably treat the argument as irredeemably fallacious in grossly begging the question or engaged in self-contradiction, even though such candidates would make the argument formally valid. Moreover, therefore, one cannot maintain that any putatively necessary assumption is rendered unnecessary by the fact that such an alternative candidate logically would serve just as well as an assumption. It seems that for arguments that are enthymematic with respect to their explicit premises, the question of which are cogent enough to have necessary assumptions and which are wholly fallacious is a matter that is determined by the application of a reasonable principle of charity. It is true that attempts have been made to determine this matter solely by examining features of the explicit arguments themselves and not invoking a principle of charity.20 A starting point is the proposition that a gross nonsequitur does not have any content expression or nonlogical constant in common between the conclusion and the stated premises (and such an expression could not be produced by making definitionally equivalent substitutions). However, the attempts have been limited to deduction, and even there they seem unsatisfactory.2! Govier presents what I regard as an adequate and insightful theory of argumentative charity. After reviewing the literature, Govier proposes and defends in detail a moderate principle of charity (that takes its cue from H.P. Grice's "Logic and Conversation"): 56 Gilbert Plumer We presume, other things being equal, that others are participating in the social practise of rational argumentation. . .. They are operating within the purpose of the exchange: that is, it is their purpose to communicate information, acceptable opinions and reasonable beliefs, and to provide good reasons for some of these opinions and beliefs by offering good arguments. '" The basis for charity is to be found not in ethics, prudence, or epistemology, but in the nature and purpose of the activity in which participants are engaging: argumentative discourse. That people are doing this when they appear to be is a rebuttable presumption . . . , Iffor one reason or another, the presumption would not be appropriate-the people lacking all credibility, or the context being one where people seek persuasion at any cost-then there is no reason for approaching the discourse charitably-not even moderately charitably.22 In ordinary situations this principle can be effectively applied because the context of the enthymematic argument is rich enough to determine whether the arguer is engaged in the social practice of rational argumentation. However, with respect to short passages that appear on an examination like the LSAT (and other comparably attenuated situations), the matter is often indeterminate. Then it is up to the test writer to somewhat arbitrarily decide whether to develop the rest of the test item as a necessary assumption question or as a question that asks the examinee to identify a way in which the argument is fallacious; Example 3 is a case of this. From the point of view of examinees the charity issue is already decided for them by which of these two sorts of questions they confront. VI. Theory Summary To summarize, in determining necessary assumptions of arguments one first applies the principle of charity; only ifthis yields the result that the argument is not wholly fallacious does one apply the other criteria, viz., that a necessary assumption must not be a presupposition of rationality generally or of a propositional element of the argument, and that it must satisfy the GFC. I think these criteria are appropriately used by writers and reviewers of a test like the LSA T to determine or check the credited response in a question that asks for a necessary assumption of an argument. This is not to say, however, that kinds of cases like what have been identified above as 'necessary assumption pretenders' could legitimately be used as noncredited responses in such test questions. The ordinary concept of an assumption seems too vague or amorphous to reasonably permit, for instance, a presupposition or implication of an argument's stated conclusion as a noncredited response. VII. Empirical Considerations So much for the theory. How have the principles articulated fared in practice? It is fairly rare that a philosophical theory can be (even indirectly) tested against Necessary Assumptions 57 systematic empirical data, but with some qualification this is the case here. Consider Table 1 :23 Percent Rejected Percent Item Number For Statistical For Content Identified as Subtype Pretested Reasons Reasons Marginal Assumption 288 6 18 16 Inference 350 8 24 13 Flaw 271 7 18 13 Evidence 388 5 18 9 Table ]. The column farthest left includes names of the three test item subtypes that are most akin to the Assumption subtype. All four subtypes appear within the "Logical Reasoning" (informal logic ) sections of the LSA T. One qualification is that the Assumption category includes a minority of sufficient assumption test items; they ask of a given enthymematic argument, e.g., "The conclusion above follows logically if which one of the following is assumed?" Test questions of the Inference subtype ask the examinee to identify allowable inferences from given passage material; Example 2 is an item of this subtype. Flaw questions typically ask the examinee to identify a way in which an argument is fallacious. In Evidence questions the task is to determine the logical effect of additional or independent evidence--whether it supports or undermines-a given argument, conclusion, or hypothesis, etc.24 The Number Pretested column gives the number of test items of the subtype that were pretested from 6/91 to 2/96. Before any test item is used in a scored section of an LSA T exam, it appears in an unscored section of a previous LSA T; this is known as "pretesting." The purpose is to determine the item's psychometric statistical characteristics so that if these are acceptable, the item can later be incorporated according to specification into a section that will be scored. The next column gives the percentage of the test items of the subtype that were pretested and thereby found to be statistically unusable on the basis of a threeparameter Item Response Theory modeL The three parameters are measures, roughly speaking, of (a) how well the item discriminates among examinees of differing ability , (b) how difficult the item is, and (c) the probability of examinees of very low ability answering the item correctly, perhaps by guessing.2S The next column gives the percentage of the test items of the subtype that 58 Gilbert Plumer were rejected in a content review conducted subsequent to pretesting (most content reviews are performed prior to pretesting). Usually, the reason for rejection is that the item was found to have more than one correct answer on a certain interpretation or to have no correct answer that is clearly defensible. The column farthest right gives the percentage of the test items of the subtype that were pretested and thereby found to be statistically marginal, primarily by using the various measures of Item Response Theory, as well as Classical theory26 (e.g., how well performance on the item correlates with performance on the test section as a whole). There is some overlap between the test items that were rejected for statistical reasons and those that were rejected for content reasons, and between those identified as marginal and those that were rejected for content reasons. The point is, if a view about necessary assumptions like Norris and Ennis' were correct, one might very well expect that the performance of the Assumption SUbtype would be significantly worse than that of the other subtypeskinds of questions to which they raise no comparable objections. Indeed, Norris and Ennis say, "the word 'necessarily' [or an equivalent] in the direction would at least slow down some good critical thinkers and force them to waste time. It might also force them to omit the item or guess wildly" (p. 123). But I have seen no evidence of this in the nine years that I have participated in developing and applying the kind of criteria advocated in this paper to the LSA T; as Table I indicates, content and psychometric statistical analyses of necessary assumption test questions yield results that are as good as those for other comparable kinds of questions designed to assess reasoning abilities.27 Another consideration is that aside from the case of a special administration of the LSA T, every examinee receives a copy of the LSA T test questions along with her or his scored answer sheet. This convenience leads to careful scrutiny of the test questions, if for no other reason than that law schools assign a great deal of weight to the candidate's test score in the admission process. There is an established procedure under which examinees can challenge test questions and written defenses of test questions, including asking for a review by a panel of outside experts.28 If this panel rules against the test, then an expensive process of re-scoring and issuing new score reports is initiated (a relatively rare circumstance in which philosophical theory is concretely and publicly accountable). And developing any standardized test item is an expensive process anyway. So if necessary assumption test items were challenged, let alone successfully challenged, proportionately more often than other kinds of questions designed to assess reasoning abilities, or if they performed significantly worse in content or statistical review, there would be a strong incentive to simply not use them. But we do. This context of developing a standardized reasoning and reading test 'has provided an organized setting in which actually to engage in the Goodmanian-Rawlsian project of Necessary Assumptions S9 endeavoring to achieve a "reflective equilibrium,"29 where theoretical criteria or principles on the one hand, and particular judgments (about arguments) on the other, are brought into coherence with one another, and thereby each is afforded justification. Notes I Earlier versions of this paper were presented at Law School Admission Council, and at the Third International Conference on Argumentation at the University of Amsterdam, The paper has benefited from discussion on these occasions and from written comments by Rod Bertolet, Anton Bures, Robert Ennis, David Kary, Deborah Kerman, and Brian MacPherson, 2(Pacific Grove, CA: Midwest Publications, 1989), pp. 122-23. Cf. Ennis' "Identifying Implicit Assumptions," Synthese 51 (April 1982), pp, 82-83. Ennis is also the principal author of the Cornell Critical Thinking Tests and is very influential in the field of critical thinking education, 3For example: Michael Scriven, Reasoning (New York: McGraw-Hili, 1976), e.g., pp. 43, 83, 166; Irving Copi, Introduction to LogiC, 5th Edn. (New York: Macmillan, 1978), p. 242; Robert Fogelin, Understanding Arguments, 3rd Edn. (New York: Harcourt Brace Jovanovich, 1987), pp. 120-21; David Kelly, The Art of Reasoning (New York: W.W. Norton & Co., 1988), p. 100. 4This view is apparently held by (e.g.) Trudy Govier, Problems in Argument Analysis and Evaluation (Dordrecht: Foris, 1987), pp. 92-94; Wayne Grennan, "Are 'Gap-Fillers' Missing Premises?," Informal Logic 16 (Fall 1994), p. 190. Interestingly, after the criteria for determining necessary assumptions discussed in this paragraph were developed, an LSAT examinee challenged a question on the grounds that the statement "the credited response refers to is not an assumption but something that is true by definition ... [It is] a given that is inherently true." (The statement in question was not actually a definitional truth.) S"Unstated Premises," Informal Logic 7 (Spring & Fall 1985), p. 114. 6Compare A. Sloman's conclusion that "any analysis of a particular argument in terms of a suppressed premiss may be replaced by an equally general analysis in terms of a rule of inference and vice versa." "Rules ofInference, or Suppressed Premisses?," Mind 73 (Jan. 1964), p. 88. (Cf. Scriven, op. cit., pp. 83, 178; David Hitchcock, "Enthymematic Arguments," Informal Logic 7 (Spring & Fall 1985), esp. pp. 94-95; Timothy Smiley, "A Tale of Two Tortoises," Mind 104 (Oct. 1995), esp. pp. 730-32.) However, because such a proposition must contain at least one content expression (given the criterion that a necessary assumption not be a general presupposition of rationality), insofar as it is a rule of inference at all, it is a nonformal or specific rule of inference. Contrast, e.g., Modus Ponens, which as topic-neutral is a formal or general rule of inference. 7But see, e.g., John Slaney, "A General Logic," Australasian Journal of Philosophy 68 (March 1990), pp. 74-88; Trudy Govier, "What is a Good Argument?," Metaphilosophy 23 (Oct. 1992), pp. 393-409. Note that in this paper I shall also not be directly concerned with the matter of how one, in the first place,jintiY necessary assumption candidates (that can then be subjected to my criteria). For a procedure that is designed to help with this and that embodies a version, albeit a narrower one, of the GFC, see Mike Donn, "Help in Finding Missing Premises," Teaching Philosophy 13 (June 1990), pp. 159-64. 60 Gilbert Plumer 8Another degenerate case is r. The assumption of r would make the stated argument formaJly valid. It has actually been objected to this paper that only through an ad hoc judgment about the cogency of arguments can r be ruled out as a rival to (C). However, the argument r, q~r :. p~r read with the passage's verbal substitutions is incoherent. This is probably because the assumption of r renders the stated premise (q~r) entirely superfluous in deductively drawing the conclusion (p~r follows formally simply from r), making the argument commit a gross fallacy of irrelevance. I should like to insist that making such cogency judgments is an everyday occurrence that is well-grounded in the defining subject matter ofthe discipline oflogic, and hence is hardly ad hoc. '1C! the view of David Hitchcock. According to Trudy Govier, Hitchcock's view is that in order to be a necessary assumption a proposition "must follow 'deductively and reasonably immediately' from the combination ofthe stated premises, the stated conclusion, and the 'drawing ofthe conclusion from the premises'." "What is a Good Argument?," op. cit., p. 401, which summarizes Hitchcock's "Methodological Deductivism," presented at the Eastern Division meetings of the American Philosophical Association in Dec. 1986. lO"Identifying Implicit Assumptions," op. cit., p. 82. \lC! Govier, Problems in Argument Analysis and Evaluation, op. cit., pp. 96-97: We need to distinguish "formal deductive inference" from "substantive deductive inference. (Substantive deductive inference depends on meaning rather than on form.) ... Nor should a necessary truth which relates the meanings of terms used in an argument already deductively valid without the addition of such a truth ... be regarded as a missing premise." Also see, e.g., Hitchcock, "Enthymematic Arguments," op. cit., pp. 85-86. 120p. cit., p. 357. 13"What is a Good Argument?," op. cit., p. 404. 14E.g., system R.S. in Irving Copi, Symbolic Logic, 5th Edn. (New York: Macmillan, 1979), p.228ff. lsIn my construal, Dm~Am is not also a necessary assumption of the argument since it is an implication of a propositional element of the argument, viz., (Vx)(Dx~Ax). Recall the point in §II that determining necessary assumptions should not be confused with proving validity. 16For discussion, see, e.g., Graham Priest, "The Structure of the Paradoxes ofSeif-Reference," Mind 103 (Jan. 1994), pp. 25-34. 17Burke, op. cit., pp. 108, 116. See also Scriven, op. cit., pp. 84, 163-64; Hitchcock, "Enthymematic Arguments," op. cit., pp. 86, 89; Michael A. Gilbert, "The Enthymeme Buster: A Heuristic Procedure for Position Exploration in Dialogic Dispute," Informal Logic 13 (Fall 1991), p. 160; Dale Jacquette, "Charity and the Reiteration Problem for Enthymernes," Informal Logic 18 (Winter \996), pp. 3, 8. The idea that in a pure Modus Ponens an implicit major premise simply 'reiterates' the implication relationship of the explicit argument is subject to the following kind of objection: The implication relationship between the premises and conclusion of the argument is strict or tautological implication, whereas the implication between the antecedent and consequent of the major premise may be something less, such as causal implication or truth-functional (material) implication. This point raises hoary issues that cannot be addressed here, such as how adequate a representation of natural language is the purely truth-functional account of conditionality. 18Scriven, op. cit., p. 84. 19"What the Tortoise Said to Achilles," Mind 4 (April 1895), pp. 278-79. 2°Rolf George, "Enthymematic Consequence," American Philosophical Quarterly 9 (Jan. 1972), pp. 113-16 and "Bolzano' s Consequence, Relevance, and Enthymemes," Journal of Philosophical Logic 12 (Aug. 1983), pp. 298-318; Hitchcock, "Enthymematic Arguments," op. cit. Necessary Assumptions 61 21Tomis Kapitan, "A Definition of Enthymematic Consequence," International Logic Review 9 (1980), pp. 56-59; Hitchcock, ibid.; Govier, "What is aGood Argument?," op. cit., p.402n9. 22 Problems in Argument Analysis and Evaluation, op. cit., p. 150. 23Source: Law School Admission Council statistical databases. 24For more discussion of the kinds of questions that appear on the LSAT, see the LSATI LSDAS Registration and Information Book, which is updated yearly and is available from Law School Admission Council, P.O. Box 40, Newtown, PA 18940. 23 A standard reference work is F. M. Lord, Applications of Item Response Theory to Practical Testing Problems (Hillsdale, NJ: Lawrence Erlbaum, 1980). 26A standard reference work is F. M. Lord and M. R. Novick, Statistical Theories of Mental Test Scores (Reading, MA: Addison-Wesley, 1968). 27The Norris-Ennis alternative to asking for the identification of necessary assumptions, since they think that no significant assumptions are actually necessary, is to ask of several options "which is probably taken for granted or assumed" (p. 124). Such a question would be seriously unclear: the assumption is probable relative to what? Certainly, the given argument. But why not also psychological facts about arguers and facts about relevant aspects of the world in general? Such questions would appear to take a large step in the direction of achievement (knowledge) testing, as opposed to the intended aptitude testing for a particular reasoning skill (assumption recognition). 28In a review of a recent challenge and defense of a necessary assumption test question, a panel member (a philosopher of language and logic) wrote: '''depends on' is hardly a technical term requiring training in logic ... The Law Services response that (A) is the only assumption on which the argument depends is correct. (A), and only (A), is such that if we presume it to be false the argument is undercut." Note the language of the GFC. 29NeJson Goodman, Fact, Fiction, and Forecast, 4th Edn. (Harvard University Press, 1983), part m.2; John Rawls, A Theory of Justice (Harvard University Press, 1971), p. 20ff. Gilbert Plumer, Senior Test Specialist-Logical Reasoning Law School Admission Council 661 Penn Street, Box 40, Newtown, PA 18940-0040 U.S.A.
NINJACATS | JBALL Fixiefamous’s Vice President JBall just got himself on Ninja Cat. Whats a Ninja Cat? It’s the last cat you will ever see. While your gargling and choking on your own blood one thought will be running through your mind, “was that a ninja cat?” Yep. This edit is incredible, and JBall has got to be shutting up all of his haters with this one. Enough said.
The present plant is a new and distinct tomato plant which was a selection taken from plants found in a cultivated area and then asexually reproduced. The cultivated area was my garden of about 40 feet by 80 feet where tomatoes, peppers, onions, squash, beans, peas, beets, kohlrabi, turnips and other vegetables as desired are grown. The new hybrid was found in one of the rows of vegetables where it was not tiled under. Seeds were grown out and division of the plant done where the plant part (e.g. the stem) was directly planted into the soil without any pretreatment or root growth hormone added. The plant stem formed roots and produced fruit. Selection was based on the shape of the fruit and the hardy skin. Selected seed was again grown out and planted near Amish tomato plants. Selection was again made using the same criteria. This was repeated three times. Selection from the last named generation was based on shape, hearty skin, and ability to remain on the vine after ripened. 2. Description of Parent Amish tomato, the seed parent, can be both indeterminate and determinate, and is a member of the Roma family. They are disease resistant to fusarium wilt and verticillum. The Amish tomato is a medium size fruit and a usual shape for the Roma family with a rounded or pointed end. The usual Amish tomato is shown in some of the photographs provided with this application. Big Bertha Pepper, the pollen parent, is a green pepper and has no use as a tomato. As with most peppers, this tomato has characteristics of definite lobes, internal ridges, and retention on the plant after ripened.
Endothelial Cell-Selective Adhesion Molecule Contributes to the Development of Definitive Hematopoiesis in the Fetal Liver. Endothelial cell-selective adhesion molecule (ESAM) is a lifelong marker of hematopoietic stem cells (HSCs). Although we previously elucidated the functional importance of ESAM in HSCs in stress-induced hematopoiesis in adults, it is unclear how ESAM affects hematopoietic development during fetal life. To address this issue, we analyzed fetuses from conventional or conditional ESAM-knockout mice. Approximately half of ESAM-null fetuses died after mid-gestation due to anemia. RNA sequencing analyses revealed downregulation of adult-type globins and Alas2, a heme biosynthesis enzyme, in ESAM-null fetal livers. These abnormalities were attributed to malfunction of ESAM-null HSCs, which was demonstrated in culture and transplantation experiments. Although crosslinking ESAM directly influenced gene transcription in HSCs, observations in conditional ESAM-knockout fetuses revealed the critical involvement of ESAM expressed in endothelial cells in fetal lethality. Thus, we showed that ESAM had important roles in developing definitive hematopoiesis. Furthermore, we unveiled the importance of endothelial ESAM in this process.
/* * QEMU ESCC (Z8030/Z8530/Z85C30/SCC/ESCC) serial port emulation * * Copyright (c) 2003-2005 Fabrice Bellard * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. */ #include "hw.h" #include "sysbus.h" #include "escc.h" #include "qemu-char.h" #include "console.h" #include "trace.h" /* * Chipset docs: * "Z80C30/Z85C30/Z80230/Z85230/Z85233 SCC/ESCC User Manual", * http://www.zilog.com/docs/serial/scc_escc_um.pdf * * On Sparc32 this is the serial port, mouse and keyboard part of chip STP2001 * (Slave I/O), also produced as NCR89C105. See * http://www.ibiblio.org/pub/historic-linux/early-ports/Sparc/NCR/NCR89C105.txt * * The serial ports implement full AMD AM8530 or Zilog Z8530 chips, * mouse and keyboard ports don't implement all functions and they are * only asynchronous. There is no DMA. * * Z85C30 is also used on PowerMacs. There are some small differences * between Sparc version (sunzilog) and PowerMac (pmac): * Offset between control and data registers * There is some kind of lockup bug, but we can ignore it * CTS is inverted * DMA on pmac using DBDMA chip * pmac can do IRDA and faster rates, sunzilog can only do 38400 * pmac baud rate generator clock is 3.6864 MHz, sunzilog 4.9152 MHz */ /* * Modifications: * 2006-Aug-10 Igor Kovalenko : Renamed KBDQueue to SERIOQueue, implemented * serial mouse queue. * Implemented serial mouse protocol. * * 2010-May-23 Artyom Tarasenko: Reworked IUS logic */ typedef enum { chn_a, chn_b, } ChnID; #define CHN_C(s) ((s)->chn == chn_b? 'b' : 'a') typedef enum { ser, kbd, mouse, } ChnType; #define SERIO_QUEUE_SIZE 256 typedef struct { uint8_t data[SERIO_QUEUE_SIZE]; int rptr, wptr, count; } SERIOQueue; #define SERIAL_REGS 16 typedef struct ChannelState { qemu_irq irq; uint32_t rxint, txint, rxint_under_svc, txint_under_svc; struct ChannelState *otherchn; uint32_t reg; uint8_t wregs[SERIAL_REGS], rregs[SERIAL_REGS]; SERIOQueue queue; CharDriverState *chr; int e0_mode, led_mode, caps_lock_mode, num_lock_mode; int disabled; int clock; uint32_t vmstate_dummy; ChnID chn; // this channel, A (base+4) or B (base+0) ChnType type; uint8_t rx, tx; } ChannelState; struct SerialState { SysBusDevice busdev; struct ChannelState chn[2]; uint32_t it_shift; MemoryRegion mmio; uint32_t disabled; uint32_t frequency; }; #define SERIAL_CTRL 0 #define SERIAL_DATA 1 #define W_CMD 0 #define CMD_PTR_MASK 0x07 #define CMD_CMD_MASK 0x38 #define CMD_HI 0x08 #define CMD_CLR_TXINT 0x28 #define CMD_CLR_IUS 0x38 #define W_INTR 1 #define INTR_INTALL 0x01 #define INTR_TXINT 0x02 #define INTR_RXMODEMSK 0x18 #define INTR_RXINT1ST 0x08 #define INTR_RXINTALL 0x10 #define W_IVEC 2 #define W_RXCTRL 3 #define RXCTRL_RXEN 0x01 #define W_TXCTRL1 4 #define TXCTRL1_PAREN 0x01 #define TXCTRL1_PAREV 0x02 #define TXCTRL1_1STOP 0x04 #define TXCTRL1_1HSTOP 0x08 #define TXCTRL1_2STOP 0x0c #define TXCTRL1_STPMSK 0x0c #define TXCTRL1_CLK1X 0x00 #define TXCTRL1_CLK16X 0x40 #define TXCTRL1_CLK32X 0x80 #define TXCTRL1_CLK64X 0xc0 #define TXCTRL1_CLKMSK 0xc0 #define W_TXCTRL2 5 #define TXCTRL2_TXEN 0x08 #define TXCTRL2_BITMSK 0x60 #define TXCTRL2_5BITS 0x00 #define TXCTRL2_7BITS 0x20 #define TXCTRL2_6BITS 0x40 #define TXCTRL2_8BITS 0x60 #define W_SYNC1 6 #define W_SYNC2 7 #define W_TXBUF 8 #define W_MINTR 9 #define MINTR_STATUSHI 0x10 #define MINTR_RST_MASK 0xc0 #define MINTR_RST_B 0x40 #define MINTR_RST_A 0x80 #define MINTR_RST_ALL 0xc0 #define W_MISC1 10 #define W_CLOCK 11 #define CLOCK_TRXC 0x08 #define W_BRGLO 12 #define W_BRGHI 13 #define W_MISC2 14 #define MISC2_PLLDIS 0x30 #define W_EXTINT 15 #define EXTINT_DCD 0x08 #define EXTINT_SYNCINT 0x10 #define EXTINT_CTSINT 0x20 #define EXTINT_TXUNDRN 0x40 #define EXTINT_BRKINT 0x80 #define R_STATUS 0 #define STATUS_RXAV 0x01 #define STATUS_ZERO 0x02 #define STATUS_TXEMPTY 0x04 #define STATUS_DCD 0x08 #define STATUS_SYNC 0x10 #define STATUS_CTS 0x20 #define STATUS_TXUNDRN 0x40 #define STATUS_BRK 0x80 #define R_SPEC 1 #define SPEC_ALLSENT 0x01 #define SPEC_BITS8 0x06 #define R_IVEC 2 #define IVEC_TXINTB 0x00 #define IVEC_LONOINT 0x06 #define IVEC_LORXINTA 0x0c #define IVEC_LORXINTB 0x04 #define IVEC_LOTXINTA 0x08 #define IVEC_HINOINT 0x60 #define IVEC_HIRXINTA 0x30 #define IVEC_HIRXINTB 0x20 #define IVEC_HITXINTA 0x10 #define R_INTR 3 #define INTR_EXTINTB 0x01 #define INTR_TXINTB 0x02 #define INTR_RXINTB 0x04 #define INTR_EXTINTA 0x08 #define INTR_TXINTA 0x10 #define INTR_RXINTA 0x20 #define R_IPEN 4 #define R_TXCTRL1 5 #define R_TXCTRL2 6 #define R_BC 7 #define R_RXBUF 8 #define R_RXCTRL 9 #define R_MISC 10 #define R_MISC1 11 #define R_BRGLO 12 #define R_BRGHI 13 #define R_MISC1I 14 #define R_EXTINT 15 static void handle_kbd_command(ChannelState *s, int val); static int serial_can_receive(void *opaque); static void serial_receive_byte(ChannelState *s, int ch); static void clear_queue(void *opaque) { ChannelState *s = opaque; SERIOQueue *q = &s->queue; q->rptr = q->wptr = q->count = 0; } static void put_queue(void *opaque, int b) { ChannelState *s = opaque; SERIOQueue *q = &s->queue; trace_escc_put_queue(CHN_C(s), b); if (q->count >= SERIO_QUEUE_SIZE) return; q->data[q->wptr] = b; if (++q->wptr == SERIO_QUEUE_SIZE) q->wptr = 0; q->count++; serial_receive_byte(s, 0); } static uint32_t get_queue(void *opaque) { ChannelState *s = opaque; SERIOQueue *q = &s->queue; int val; if (q->count == 0) { return 0; } else { val = q->data[q->rptr]; if (++q->rptr == SERIO_QUEUE_SIZE) q->rptr = 0; q->count--; } trace_escc_get_queue(CHN_C(s), val); if (q->count > 0) serial_receive_byte(s, 0); return val; } static int escc_update_irq_chn(ChannelState *s) { if ((((s->wregs[W_INTR] & INTR_TXINT) && (s->txint == 1)) || // tx ints enabled, pending ((((s->wregs[W_INTR] & INTR_RXMODEMSK) == INTR_RXINT1ST) || ((s->wregs[W_INTR] & INTR_RXMODEMSK) == INTR_RXINTALL)) && s->rxint == 1) || // rx ints enabled, pending ((s->wregs[W_EXTINT] & EXTINT_BRKINT) && (s->rregs[R_STATUS] & STATUS_BRK)))) { // break int e&p return 1; } return 0; } static void escc_update_irq(ChannelState *s) { int irq; irq = escc_update_irq_chn(s); irq |= escc_update_irq_chn(s->otherchn); trace_escc_update_irq(irq); qemu_set_irq(s->irq, irq); } static void escc_reset_chn(ChannelState *s) { int i; s->reg = 0; for (i = 0; i < SERIAL_REGS; i++) { s->rregs[i] = 0; s->wregs[i] = 0; } s->wregs[W_TXCTRL1] = TXCTRL1_1STOP; // 1X divisor, 1 stop bit, no parity s->wregs[W_MINTR] = MINTR_RST_ALL; s->wregs[W_CLOCK] = CLOCK_TRXC; // Synch mode tx clock = TRxC s->wregs[W_MISC2] = MISC2_PLLDIS; // PLL disabled s->wregs[W_EXTINT] = EXTINT_DCD | EXTINT_SYNCINT | EXTINT_CTSINT | EXTINT_TXUNDRN | EXTINT_BRKINT; // Enable most interrupts if (s->disabled) s->rregs[R_STATUS] = STATUS_TXEMPTY | STATUS_DCD | STATUS_SYNC | STATUS_CTS | STATUS_TXUNDRN; else s->rregs[R_STATUS] = STATUS_TXEMPTY | STATUS_TXUNDRN; s->rregs[R_SPEC] = SPEC_BITS8 | SPEC_ALLSENT; s->rx = s->tx = 0; s->rxint = s->txint = 0; s->rxint_under_svc = s->txint_under_svc = 0; s->e0_mode = s->led_mode = s->caps_lock_mode = s->num_lock_mode = 0; clear_queue(s); } static void escc_reset(DeviceState *d) { SerialState *s = container_of(d, SerialState, busdev.qdev); escc_reset_chn(&s->chn[0]); escc_reset_chn(&s->chn[1]); } static inline void set_rxint(ChannelState *s) { s->rxint = 1; /* XXX: missing daisy chainnig: chn_b rx should have a lower priority than chn_a rx/tx/special_condition service*/ s->rxint_under_svc = 1; if (s->chn == chn_a) { s->rregs[R_INTR] |= INTR_RXINTA; if (s->wregs[W_MINTR] & MINTR_STATUSHI) s->otherchn->rregs[R_IVEC] = IVEC_HIRXINTA; else s->otherchn->rregs[R_IVEC] = IVEC_LORXINTA; } else { s->otherchn->rregs[R_INTR] |= INTR_RXINTB; if (s->wregs[W_MINTR] & MINTR_STATUSHI) s->rregs[R_IVEC] = IVEC_HIRXINTB; else s->rregs[R_IVEC] = IVEC_LORXINTB; } escc_update_irq(s); } static inline void set_txint(ChannelState *s) { s->txint = 1; if (!s->rxint_under_svc) { s->txint_under_svc = 1; if (s->chn == chn_a) { if (s->wregs[W_INTR] & INTR_TXINT) { s->rregs[R_INTR] |= INTR_TXINTA; } if (s->wregs[W_MINTR] & MINTR_STATUSHI) s->otherchn->rregs[R_IVEC] = IVEC_HITXINTA; else s->otherchn->rregs[R_IVEC] = IVEC_LOTXINTA; } else { s->rregs[R_IVEC] = IVEC_TXINTB; if (s->wregs[W_INTR] & INTR_TXINT) { s->otherchn->rregs[R_INTR] |= INTR_TXINTB; } } escc_update_irq(s); } } static inline void clr_rxint(ChannelState *s) { s->rxint = 0; s->rxint_under_svc = 0; if (s->chn == chn_a) { if (s->wregs[W_MINTR] & MINTR_STATUSHI) s->otherchn->rregs[R_IVEC] = IVEC_HINOINT; else s->otherchn->rregs[R_IVEC] = IVEC_LONOINT; s->rregs[R_INTR] &= ~INTR_RXINTA; } else { if (s->wregs[W_MINTR] & MINTR_STATUSHI) s->rregs[R_IVEC] = IVEC_HINOINT; else s->rregs[R_IVEC] = IVEC_LONOINT; s->otherchn->rregs[R_INTR] &= ~INTR_RXINTB; } if (s->txint) set_txint(s); escc_update_irq(s); } static inline void clr_txint(ChannelState *s) { s->txint = 0; s->txint_under_svc = 0; if (s->chn == chn_a) { if (s->wregs[W_MINTR] & MINTR_STATUSHI) s->otherchn->rregs[R_IVEC] = IVEC_HINOINT; else s->otherchn->rregs[R_IVEC] = IVEC_LONOINT; s->rregs[R_INTR] &= ~INTR_TXINTA; } else { s->otherchn->rregs[R_INTR] &= ~INTR_TXINTB; if (s->wregs[W_MINTR] & MINTR_STATUSHI) s->rregs[R_IVEC] = IVEC_HINOINT; else s->rregs[R_IVEC] = IVEC_LONOINT; s->otherchn->rregs[R_INTR] &= ~INTR_TXINTB; } if (s->rxint) set_rxint(s); escc_update_irq(s); } static void escc_update_parameters(ChannelState *s) { int speed, parity, data_bits, stop_bits; QEMUSerialSetParams ssp; if (!s->chr || s->type != ser) return; if (s->wregs[W_TXCTRL1] & TXCTRL1_PAREN) { if (s->wregs[W_TXCTRL1] & TXCTRL1_PAREV) parity = 'E'; else parity = 'O'; } else { parity = 'N'; } if ((s->wregs[W_TXCTRL1] & TXCTRL1_STPMSK) == TXCTRL1_2STOP) stop_bits = 2; else stop_bits = 1; switch (s->wregs[W_TXCTRL2] & TXCTRL2_BITMSK) { case TXCTRL2_5BITS: data_bits = 5; break; case TXCTRL2_7BITS: data_bits = 7; break; case TXCTRL2_6BITS: data_bits = 6; break; default: case TXCTRL2_8BITS: data_bits = 8; break; } speed = s->clock / ((s->wregs[W_BRGLO] | (s->wregs[W_BRGHI] << 8)) + 2); switch (s->wregs[W_TXCTRL1] & TXCTRL1_CLKMSK) { case TXCTRL1_CLK1X: break; case TXCTRL1_CLK16X: speed /= 16; break; case TXCTRL1_CLK32X: speed /= 32; break; default: case TXCTRL1_CLK64X: speed /= 64; break; } ssp.speed = speed; ssp.parity = parity; ssp.data_bits = data_bits; ssp.stop_bits = stop_bits; trace_escc_update_parameters(CHN_C(s), speed, parity, data_bits, stop_bits); qemu_chr_fe_ioctl(s->chr, CHR_IOCTL_SERIAL_SET_PARAMS, &ssp); } static void escc_mem_write(void *opaque, target_phys_addr_t addr, uint64_t val, unsigned size) { SerialState *serial = opaque; ChannelState *s; uint32_t saddr; int newreg, channel; val &= 0xff; saddr = (addr >> serial->it_shift) & 1; channel = (addr >> (serial->it_shift + 1)) & 1; s = &serial->chn[channel]; switch (saddr) { case SERIAL_CTRL: trace_escc_mem_writeb_ctrl(CHN_C(s), s->reg, val & 0xff); newreg = 0; switch (s->reg) { case W_CMD: newreg = val & CMD_PTR_MASK; val &= CMD_CMD_MASK; switch (val) { case CMD_HI: newreg |= CMD_HI; break; case CMD_CLR_TXINT: clr_txint(s); break; case CMD_CLR_IUS: if (s->rxint_under_svc) { s->rxint_under_svc = 0; if (s->txint) { set_txint(s); } } else if (s->txint_under_svc) { s->txint_under_svc = 0; } escc_update_irq(s); break; default: break; } break; case W_INTR ... W_RXCTRL: case W_SYNC1 ... W_TXBUF: case W_MISC1 ... W_CLOCK: case W_MISC2 ... W_EXTINT: s->wregs[s->reg] = val; break; case W_TXCTRL1: case W_TXCTRL2: s->wregs[s->reg] = val; escc_update_parameters(s); break; case W_BRGLO: case W_BRGHI: s->wregs[s->reg] = val; s->rregs[s->reg] = val; escc_update_parameters(s); break; case W_MINTR: switch (val & MINTR_RST_MASK) { case 0: default: break; case MINTR_RST_B: escc_reset_chn(&serial->chn[0]); return; case MINTR_RST_A: escc_reset_chn(&serial->chn[1]); return; case MINTR_RST_ALL: escc_reset(&serial->busdev.qdev); return; } break; default: break; } if (s->reg == 0) s->reg = newreg; else s->reg = 0; break; case SERIAL_DATA: trace_escc_mem_writeb_data(CHN_C(s), val); s->tx = val; if (s->wregs[W_TXCTRL2] & TXCTRL2_TXEN) { // tx enabled if (s->chr) qemu_chr_fe_write(s->chr, &s->tx, 1); else if (s->type == kbd && !s->disabled) { handle_kbd_command(s, val); } } s->rregs[R_STATUS] |= STATUS_TXEMPTY; // Tx buffer empty s->rregs[R_SPEC] |= SPEC_ALLSENT; // All sent set_txint(s); break; default: break; } } static uint64_t escc_mem_read(void *opaque, target_phys_addr_t addr, unsigned size) { SerialState *serial = opaque; ChannelState *s; uint32_t saddr; uint32_t ret; int channel; saddr = (addr >> serial->it_shift) & 1; channel = (addr >> (serial->it_shift + 1)) & 1; s = &serial->chn[channel]; switch (saddr) { case SERIAL_CTRL: trace_escc_mem_readb_ctrl(CHN_C(s), s->reg, s->rregs[s->reg]); ret = s->rregs[s->reg]; s->reg = 0; return ret; case SERIAL_DATA: s->rregs[R_STATUS] &= ~STATUS_RXAV; clr_rxint(s); if (s->type == kbd || s->type == mouse) ret = get_queue(s); else ret = s->rx; trace_escc_mem_readb_data(CHN_C(s), ret); if (s->chr) qemu_chr_accept_input(s->chr); return ret; default: break; } return 0; } static const MemoryRegionOps escc_mem_ops = { .read = escc_mem_read, .write = escc_mem_write, .endianness = DEVICE_NATIVE_ENDIAN, .valid = { .min_access_size = 1, .max_access_size = 1, }, }; static int serial_can_receive(void *opaque) { ChannelState *s = opaque; int ret; if (((s->wregs[W_RXCTRL] & RXCTRL_RXEN) == 0) // Rx not enabled || ((s->rregs[R_STATUS] & STATUS_RXAV) == STATUS_RXAV)) // char already available ret = 0; else ret = 1; return ret; } static void serial_receive_byte(ChannelState *s, int ch) { trace_escc_serial_receive_byte(CHN_C(s), ch); s->rregs[R_STATUS] |= STATUS_RXAV; s->rx = ch; set_rxint(s); } static void serial_receive_break(ChannelState *s) { s->rregs[R_STATUS] |= STATUS_BRK; escc_update_irq(s); } static void serial_receive1(void *opaque, const uint8_t *buf, int size) { ChannelState *s = opaque; serial_receive_byte(s, buf[0]); } static void serial_event(void *opaque, int event) { ChannelState *s = opaque; if (event == CHR_EVENT_BREAK) serial_receive_break(s); } static const VMStateDescription vmstate_escc_chn = { .name ="escc_chn", .version_id = 2, .minimum_version_id = 1, .minimum_version_id_old = 1, .fields = (VMStateField []) { VMSTATE_UINT32(vmstate_dummy, ChannelState), VMSTATE_UINT32(reg, ChannelState), VMSTATE_UINT32(rxint, ChannelState), VMSTATE_UINT32(txint, ChannelState), VMSTATE_UINT32(rxint_under_svc, ChannelState), VMSTATE_UINT32(txint_under_svc, ChannelState), VMSTATE_UINT8(rx, ChannelState), VMSTATE_UINT8(tx, ChannelState), VMSTATE_BUFFER(wregs, ChannelState), VMSTATE_BUFFER(rregs, ChannelState), VMSTATE_END_OF_LIST() } }; static const VMStateDescription vmstate_escc = { .name ="escc", .version_id = 2, .minimum_version_id = 1, .minimum_version_id_old = 1, .fields = (VMStateField []) { VMSTATE_STRUCT_ARRAY(chn, SerialState, 2, 2, vmstate_escc_chn, ChannelState), VMSTATE_END_OF_LIST() } }; MemoryRegion *escc_init(target_phys_addr_t base, qemu_irq irqA, qemu_irq irqB, CharDriverState *chrA, CharDriverState *chrB, int clock, int it_shift) { DeviceState *dev; SysBusDevice *s; SerialState *d; dev = qdev_create(NULL, "escc"); qdev_prop_set_uint32(dev, "disabled", 0); qdev_prop_set_uint32(dev, "frequency", clock); qdev_prop_set_uint32(dev, "it_shift", it_shift); qdev_prop_set_chr(dev, "chrB", chrB); qdev_prop_set_chr(dev, "chrA", chrA); qdev_prop_set_uint32(dev, "chnBtype", ser); qdev_prop_set_uint32(dev, "chnAtype", ser); qdev_init_nofail(dev); s = sysbus_from_qdev(dev); sysbus_connect_irq(s, 0, irqB); sysbus_connect_irq(s, 1, irqA); if (base) { sysbus_mmio_map(s, 0, base); } d = FROM_SYSBUS(SerialState, s); return &d->mmio; } static const uint8_t keycodes[128] = { 127, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 43, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 89, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 42, 99, 88, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 47, 19, 121, 119, 5, 6, 8, 10, 12, 14, 16, 17, 18, 7, 98, 23, 68, 69, 70, 71, 91, 92, 93, 125, 112, 113, 114, 94, 50, 0, 0, 124, 9, 11, 0, 0, 0, 0, 0, 0, 0, 90, 0, 46, 22, 13, 111, 52, 20, 96, 24, 28, 74, 27, 123, 44, 66, 0, 45, 2, 4, 48, 0, 0, 21, 0, 0, 0, 0, 0, 120, 122, 67, }; static const uint8_t e0_keycodes[128] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 90, 76, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 109, 0, 0, 13, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 68, 69, 70, 0, 91, 0, 93, 0, 112, 113, 114, 94, 50, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 3, 25, 26, 49, 52, 72, 73, 97, 99, 111, 118, 120, 122, 67, 0, }; static void sunkbd_event(void *opaque, int ch) { ChannelState *s = opaque; int release = ch & 0x80; trace_escc_sunkbd_event_in(ch); switch (ch) { case 58: // Caps lock press s->caps_lock_mode ^= 1; if (s->caps_lock_mode == 2) return; // Drop second press break; case 69: // Num lock press s->num_lock_mode ^= 1; if (s->num_lock_mode == 2) return; // Drop second press break; case 186: // Caps lock release s->caps_lock_mode ^= 2; if (s->caps_lock_mode == 3) return; // Drop first release break; case 197: // Num lock release s->num_lock_mode ^= 2; if (s->num_lock_mode == 3) return; // Drop first release break; case 0xe0: s->e0_mode = 1; return; default: break; } if (s->e0_mode) { s->e0_mode = 0; ch = e0_keycodes[ch & 0x7f]; } else { ch = keycodes[ch & 0x7f]; } trace_escc_sunkbd_event_out(ch); put_queue(s, ch | release); } static void handle_kbd_command(ChannelState *s, int val) { trace_escc_kbd_command(val); if (s->led_mode) { // Ignore led byte s->led_mode = 0; return; } switch (val) { case 1: // Reset, return type code clear_queue(s); put_queue(s, 0xff); put_queue(s, 4); // Type 4 put_queue(s, 0x7f); break; case 0xe: // Set leds s->led_mode = 1; break; case 7: // Query layout case 0xf: clear_queue(s); put_queue(s, 0xfe); put_queue(s, 0); // XXX, layout? break; default: break; } } static void sunmouse_event(void *opaque, int dx, int dy, int dz, int buttons_state) { ChannelState *s = opaque; int ch; trace_escc_sunmouse_event(dx, dy, buttons_state); ch = 0x80 | 0x7; /* protocol start byte, no buttons pressed */ if (buttons_state & MOUSE_EVENT_LBUTTON) ch ^= 0x4; if (buttons_state & MOUSE_EVENT_MBUTTON) ch ^= 0x2; if (buttons_state & MOUSE_EVENT_RBUTTON) ch ^= 0x1; put_queue(s, ch); ch = dx; if (ch > 127) ch = 127; else if (ch < -127) ch = -127; put_queue(s, ch & 0xff); ch = -dy; if (ch > 127) ch = 127; else if (ch < -127) ch = -127; put_queue(s, ch & 0xff); // MSC protocol specify two extra motion bytes put_queue(s, 0); put_queue(s, 0); } void slavio_serial_ms_kbd_init(target_phys_addr_t base, qemu_irq irq, int disabled, int clock, int it_shift) { DeviceState *dev; SysBusDevice *s; dev = qdev_create(NULL, "escc"); qdev_prop_set_uint32(dev, "disabled", disabled); qdev_prop_set_uint32(dev, "frequency", clock); qdev_prop_set_uint32(dev, "it_shift", it_shift); qdev_prop_set_chr(dev, "chrB", NULL); qdev_prop_set_chr(dev, "chrA", NULL); qdev_prop_set_uint32(dev, "chnBtype", mouse); qdev_prop_set_uint32(dev, "chnAtype", kbd); qdev_init_nofail(dev); s = sysbus_from_qdev(dev); sysbus_connect_irq(s, 0, irq); sysbus_connect_irq(s, 1, irq); sysbus_mmio_map(s, 0, base); } static int escc_init1(SysBusDevice *dev) { SerialState *s = FROM_SYSBUS(SerialState, dev); unsigned int i; s->chn[0].disabled = s->disabled; s->chn[1].disabled = s->disabled; for (i = 0; i < 2; i++) { sysbus_init_irq(dev, &s->chn[i].irq); s->chn[i].chn = 1 - i; s->chn[i].clock = s->frequency / 2; if (s->chn[i].chr) { qemu_chr_add_handlers(s->chn[i].chr, serial_can_receive, serial_receive1, serial_event, &s->chn[i]); } } s->chn[0].otherchn = &s->chn[1]; s->chn[1].otherchn = &s->chn[0]; memory_region_init_io(&s->mmio, &escc_mem_ops, s, "escc", ESCC_SIZE << s->it_shift); sysbus_init_mmio_region(dev, &s->mmio); if (s->chn[0].type == mouse) { qemu_add_mouse_event_handler(sunmouse_event, &s->chn[0], 0, "QEMU Sun Mouse"); } if (s->chn[1].type == kbd) { qemu_add_kbd_event_handler(sunkbd_event, &s->chn[1]); } return 0; } static SysBusDeviceInfo escc_info = { .init = escc_init1, .qdev.name = "escc", .qdev.size = sizeof(SerialState), .qdev.vmsd = &vmstate_escc, .qdev.reset = escc_reset, .qdev.props = (Property[]) { DEFINE_PROP_UINT32("frequency", SerialState, frequency, 0), DEFINE_PROP_UINT32("it_shift", SerialState, it_shift, 0), DEFINE_PROP_UINT32("disabled", SerialState, disabled, 0), DEFINE_PROP_UINT32("disabled", SerialState, disabled, 0), DEFINE_PROP_UINT32("chnBtype", SerialState, chn[0].type, 0), DEFINE_PROP_UINT32("chnAtype", SerialState, chn[1].type, 0), DEFINE_PROP_CHR("chrB", SerialState, chn[0].chr), DEFINE_PROP_CHR("chrA", SerialState, chn[1].chr), DEFINE_PROP_END_OF_LIST(), } }; static void escc_register_devices(void) { sysbus_register_withprop(&escc_info); } device_init(escc_register_devices)
This article has a correction. Please see: Abstract “Fierce” mice, homozygous for the deletion of nuclear receptor 2E1 (NR2E1), show abnormal brain-eye development and pathological aggression. To evaluate functional equivalency between mouse and human NR2E1, we generated mice transgenic for a genomic clone spanning the human NR2E1 locus and bred these animals to fierce mice deleted for the corresponding mouse gene. In fierce mutants carrying human NR2E1, structural brain defects were eliminated and eye abnormalities ameliorated. Excitingly, behavior in these “rescue” mice was indistinguishable from controls. Because no artificial promoter was used to drive transgene expression, promoter and regulatory elements within the human NR2E1 clone are functional in mouse. Normal behavior in rescue animals suggests that mechanisms underlying the behavioral abnormalities in fierce mice may also be conserved in humans. Our data support the hypothesis that variation at NR2E1 may contribute to human behavioral disorders. Use of this rescue paradigm with other genes will permit the direct evaluation of human genes hypothesized to play a causal role in psychiatric disease but for which evidence is lacking or equivocal. Introduction The study of mental illnesses is exceedingly difficult. Despite strong evidence for genetic modulation of disease risk (Tandon and McGuffin, 2002), positional cloning has shown only limited success in the identification of psychiatric disease genes. Genetic studies in humans are hampered by the incomplete penetrance of disease features and extensive phenotypic variability among affect individuals, resulting in part from polygenic inheritance (Owen et al., 2004) and gene-environment interactions (Caspi et al., 2002). Moreover, genetic heterogeneity between individuals undermines both population-based strategies and the replication of results by independent groups. Mouse genetics can address these concerns, ensuring near-identical environments and genetic make-up between subjects. Determining the subset of observations from mice that generalize to humans, however, remains challenging because of differences between the species. From this perspective, we reasoned that establishing a paradigm in which one could functionally evaluate the ability of a human gene to shape behavior and simultaneously retain the advantages associated with a model system would be powerful. Toward this end, we generated transgenic mice expressing the human form [Tg(Hum)] of orphan nuclear receptor 2E1 (NR2E1; previously Mtll, Tailless, Tll, and Tlx) and evaluated the ability of this human gene to modulate the behavior of mutant mice, which in its absence would have demonstrated pathological violence. Our results show that the presence of a transgene spanning human NR2E1 is sufficient to eliminate structural brain defects, ameliorate eye abnormalities, and restore normal behavior to fierce mice. Because no artificial promoter was used to drive transgene expression, promoter and regulatory elements within human NR2E1 are functional in mouse. Along with amelioration of developmental abnormalities, demonstration of human NR2E1 in the brains of transgenic animals supports appropriate transcription by the human transgene. The correction of fierce brain-behavior abnormalities by human NR2E1 supports conserved underlying mechanisms for behavior modulation. Moreover, use of this same approach with other genes may prove useful in the genetic dissection of discrete features or behaviors that contribute to psychiatric disease (endophenotypes) as well as the systematic evaluation of candidate genes for which involvement in disease is controversial. Materials and Methods Transgenesis. Pronuclear injection of a 141 kb PAC clone spanning human NR2E1 (pacEMS1; clone identification number, dJ429G5; GenBank accession number AL078596.7) was performed as described previously (Abrahams et al., 2003) to produce eight transgenic founders from which five independent strains were established successfully. Two strains were used here [C57BL/6J.Cg-Tg(NR2E1pacEMS1B)10Ems and C57BL/6J.Cg-Tg(NR2E1pacEMS1D)11Ems] with mice at backcross generation 6 (N6) (98.4% C57BL/6J) to N10 (99.9% C57BL/6J) before use. These strains will be represented by C57BL/6J [+/+, Tg(Hum)/+], or Tg(Hum). No differences between the two characterized lines, either before or after having been bred to fierce (see below), were observed for animals of any genotype. Moreover, similar results were obtained when the two strains were analyzed either separately or together. For simplicity, data reported here have been pooled across the two strains. Breeding. Two strains bearing the fierce mutation were used in the breeding strategy (described below) with the transgenics (described above), C57BL/6J.Cg-Nr2e1frc (C57BL/6J; fierce/+, +/+) and 129S1/SvImJ.Cg-Nr2e1frc (129S1/SvImJ; fierce/+, +/+). Both strains had been backcrossed >10 times (to C57BL/6J and 129S1/SvImJ, respectively) and thus were >99.9% inbred before use. Because males homozygous for Nr2e1frc (referred to as fierce) kill their intended mates and homozygous fierce females are poor mothers (Young et al., 2002), experimental mice were obtained by a two-generation mating scheme involving the pairing of Nr2e1frc heterozygotes. C57BL/6J (fierce/+, +/+) mice were crossed to C57BL/6J [+/+, Tg(Hum)/+] mice to obtain C57BL/6J [frc/+, Tg(Hum)/+] females. These females were then crossed to 129S1/SvImJ (fierce/+, +/+) males to produce experimental animals. Thus, experimental mice were first generation C57BL/6J × 129S1/SvImJ (B6129F1) offspring. Production of F1s ensured (1) large litters (Banks et al., 2003), increasing yield per mating and as a consequence improving ability to control for gene-environment effects, (2) hybrid vigor, although hydrocephalus is frequent among B6 fierce homozygotes, for example, the same is not true of F1s (Young et al., 2002), and (3) genetically matched experimental animals, inheriting one B6 and one 129 chromosome, thereby differing only at the loci under investigation (Silva et al., 1997). Adult mice (12-24 weeks of age) were used for all analyses. Genotyping. Three separate PCR assays were used to genotype each individual. oEMS650 (5′-GGCGGAGGGAGCTTAAATAG-3′) and oEMS1368 (5′-GATTCATCCTATTCCACAAAGTCA-3′) span the fierce deletion region and give a product only in its absence. oEMS1859 (5′-CTGGGCCCTGCAGATACTC-3′) and oEMS1860 (5′-GGTGGCATGATGGGTAACTC-3′) detect mouse but not human NR2E1. oEMS800 (5′-CCCAGCAGCTGCGGTTTTGC-3′) and oEMS801 (5′-GCAGCGCTCCAGGCAGGAC-3′) detect human but not mouse NR2E1. Reactions were put through 30 cycles of the PCR as described previously (Banks et al., 2003) but with the addition of 10% DMSO for oEMS1859/60 and 800/801. Histology. Entire brains were dissected after intracardial perfusion of Avertin-anesthetized mice with formalin. Sectioned brains were prepared from a separate set of animals, killed by cervical dislocation. Brains were rapidly removed, embedded in OCT (VWR Scientific, Delta, British Columbia, Canada), and frozen on dry ice. Cryosections were prepared at 15 μm, then stained with cresyl violet and luxol fast blue. Funduscopy. Direct funduscopy was performed between 18 and 24 weeks with a Kowa Genesis small animal fundus camera (Pacific Medical, Delta, British Columbia, Canada) in conjunction with a Volk 90D lens (Topcon Canada, Calgary, Alberta, Canada) as described previously (Hawes et al., 1999). Eyes were dilated with 25% atropine 30 min before examination, at which time mice were lightly sedated with Avertin. Behavior testing. Mice were housed under a reverse light/dark cycle and tested in the dark (Hossain et al., 2004). Because of the aggressive nature of the fierce animals, approved procedures require they be housed singly. Thus, to control for the possible confound of environmental effects (Van Loo et al., 2001) and gene-environment interactions (Ouagazzal et al., 2003) on behavior, all experimental mice [wild type (Wt), fierce, Tg(Hum), and rescue] were housed individually from weaning at 18 d until they were killed for histological analyses in adulthood. Struggle was measured in males and females at 13 weeks for 3 min using a PHM-300TSS mouse tail suspension system (Med Associates, St. Albans, VT). The apparatus was calibrated to offset animal weight before testing, and system settings for struggle and gain were 15 and 4, respectively. Percentage of time struggling was calculated by expressing the number of milliseconds during which force exceeded the struggle threshold (set to 15) as a proportion of test time. Force-exerted struggling was calculated by summing the force applied to the system across the testing period. Significant correlations (ranging from 0.96 to 0.97) between experienced human raters and the device we used have been reported recently (Crowley et al., 2004). Spontaneous activity was measured in mice of both sexes at 12 weeks using a 3 min open-field paradigm. The apparatus we used (Med Associates) was Digiscan photocell-equipped to permit automated data capture. Ambulatory counts equaled the number of beam breaks recorded during the test period. Ambulatory time represented the amount of time (in seconds) spent in motion during the test period. Number of ambulatory episodes was calculated by summing the number of individual episodes (defined as a series of sequential ambulatory counts separated in time by no more than 500 ms). A 4-10 min resident-intruder paradigm (Young et al., 2002) was used to assess aggression in 16- to 18-week-old experimental males. Wild-type mice matched to experimental animals for genetic background, sex, and weight served as intruders. Video analysis software (Observer Video Pro; Noldus Information Technology, Leesburg, VA) was used to score frequency and duration of tail rattling (rapid quivering or thrashing of the tail), wrestling (close contact that escalates to rolls and tumbling), attack (biting of the opponent mouse), sniffing (sniffing the head or snout of the partner), and anogenital investigation (exploration of the intruder's hindquarters). Tail rattling, wrestling, and attack behaviors were combined to give an index of aggression. Aggression per minute and percentage of time aggressive were calculated by expressing the number of aggressive behaviors and time engaged in aggressive behaviors over minutes of testing and as a proportion of total test time, respectively. Sniffing and anogenital investigation were combined to give an index of social behavior. Percentage of time social was calculated by expressing the amount of time engaged in social behaviors as a proportion of total test time. Statistical analyses. All analyses were performed using JMP 4.0 (SAS Institute, Cary, NC). Continuous data were analyzed by group for normality and equal variances, then compared by parametric (ANOVA for genotype followed by Tukey-Kramer test for pair-wise comparisons when p < 0.05) or nonparametric statistics (Wilcoxon/Kruskal-Wallis test) as necessary. Significant Wilcoxon/Kruskal-Wallis results (p < 0.05) were attributed to a single group when results became nonsignificant (p > 0.05), after the removal of that group from the original data set. Nominal data (radial asymmetry and mottling) were analyzed using the Pearson χ2 test, with p < 0.05 taken as the cutoff for significance. Reverse transcriptase-PCR. Total RNA was isolated from adult mouse brain using TriZol (Invitrogen, Burlington, Ontario, Canada) or in the case of fetal human brain, purchased from Origene (Rockville, MD). Five micrograms of DNaseI-treated RNA were subsequently concentrated using MicronYM-100 columns (Millipore, Nepean, Ontario, Canada) and used to generate oligo-dT primed cDNA with Superscript II according to the manufacturer's instructions (Invitrogen). A reverse transcriptase-negative (RT-) control was generated in parallel to each cDNA produced. Intron-spanning PCR assays specific for NR2E1 in human or mouse were developed. oEMS1633 (5′-GCATGAATACTGACAACACAGAC-3′) and oEMS1637 (5′-GCTAATTGACCGTAAAGCTGGT-3′) gave a 324 bp product only when mouse Nr2e1 was present. oEMS749 (5′-TTCCTGAAGGCTACACATTCC-3′) and oEMS825 (5′-AGAGGTGGTGGCTCGATTTA-3′) gave a 475 bp product positive only in the presence of human NR2E1. Each primer set was carried through two rounds of PCR, whereby 2 μl from a 25-cycle first reaction was used as template for a 30-cycle second reaction. An additional primer set against human β-actin was used to confirm the presence and absence of cDNA in all RT+ and RT- samples, respectively, across 30 cycles of PCR. oEMS1646 (5′-ATTGGCAATGAGCGGTTCCGC-3′) and oEMS1647 (5′-CTCCTGCTTGCTGATCCACATC-3′) give a 336 bp product against either mouse or human cDNA. Parameters for denaturation (94°C for 30 s), annealing (55°C for 60 s), and extension (72°C for 60 s) were kept constant across all assays. Each assay was repeated in a minimum of four animals from each genotype. Results To test the functionality of human NR2E1 in mice, we established transgenic mice harboring a genomic DNA clone spanning the human NR2E1 locus. We then crossed transcription-positive strains (data not shown) to fierce mice shown previously to carry a deletion that spans Nr2e1 but leaves neighboring genes intact and transcriptionally active (Kumar et al., 2004). Previously identified abnormalities that make up core features of Nr2e1 mutants were then used to make blinded comparisons between mice from each of the following four groups: wild-type (+/+, +/+), fierce (fierce/fierce, +/+), transgenic [+/+, Tg(Hum)/+], and rescue [fierce/fierce, Tg(Hum)/+]. We observed characteristic abnormalities in sectioned brains from every fierce mouse examined but no abnormalities in any transgenic or rescue animals (Fig. 2). Sections through the fierce forebrain showed an overall reduction in size relative to wild-type controls (Fig. 2a). An unusually shaped cingulum, poorly defined piriform cortex, and smaller anterior commissure were also evident in fierce. At higher magnification, abnormal cortical lamination was noted (Fig. 2b), consistent with the previous observation (Land and Monaghan, 2003) that Nr2e1 is required for proper formation of layers II and III. A reduction in striatal volume was also observed in fierce (Fig. 2c) as a result of misspecification of the ventral lateral ganglionic eminence from which it develops (Stenman et al., 2003b). Fierce mice showed an enlargement of corticostriatal fibers that pass through the striatum (Fig. 2c, arrows), with clustering toward its medial border. In addition, the external capsule of the corpus callosum was thin in fierce relative to wild type (Fig. 2c). Human NR2E1 ameliorates multiple aspects of the fierce eye Abnormalities observed in the fierce eye by funduscopy were each corrected or ameliorated in transgenic and rescue animals (Fig. 3a). Asymmetry of the radial vasculature, mottling of the retinal pigment epithelium (Fig. 3a, arrow), and a reduction in retinal vessel number were characteristic features of the fierce eye. All fierce mice showed abnormal radial symmetry, and thus radial symmetry was significantly reduced relative to wild-type, transgenic, and rescue mice (Fig. 3b). Similarly, only fierce showed mottling of the retinal pigment epithelium (Fig. 3c). Vessel number was lowest in fierce and significantly reduced relative to rescue mice, which showed the next lowest vessel number (Fig. 3d, dagger). However, for vessel number only, rescue animals were reduced significantly relative to wild-type and transgenic mice (Fig. 3d, double dagger). Nevertheless, because rescue eyes were essentially normal both by qualitative and quantitative analyses, we conclude that the presence of human NR2E1 had a corrective influence on the structural development of the fierce eye. The slight reduction in vessel number may reflect the observation by others that development of the mouse eye is exquisitely sensitive to changes in gene dosage (Schedl et al., 1996; Brown et al., 1998; Chang et al., 2001). Human NR2E1 corrects behavior abnormalities in the fierce mouse Multiple behavior tests identified fierce mice as distinct from the three other groups, whereas no differences were found between wild-type, transgenic, and rescue animals. We used a tail-suspension test to quantify the hard-to-handle phenotype observed previously in fierce mice (Monaghan et al., 1997; Young et al., 2002). In fierce mice, percentage of time struggling and force exerted struggling were significantly increased relative to mice of other genotypes (Fig. 4a,b). Similarly, fierce showed significant increases in spontaneous activity relative to the other groups as measured by ambulatory counts (Fig. 4c), ambulatory time (Fig. 4d), and ambulatory episodes (Fig. 4e). Additional measures obtained during this test also showed significant differences between fierce and all other genotypes (increased ambulatory distance and decreased resting time; data not shown). Fierce mice showed significantly heightened aggression in the resident-intruder test relative to the other genotypes (Fig. 4f,g). The proportion of time fierce mice engaged in social behavior was reduced relative to mice from each of the other genotypes (Fig. 4h). Most strikingly, unlike fierce males who attack, wound, and kill female mates (Young et al., 2002), male rescue animals were not aggressive toward female partners and mated successfully. Together, these results indicate that the presence of human NR2E1 renders the behavior of fierce mice indistinguishable from that of wild-type controls. Human NR2E1 corrects fierce behavior. In a tail suspension test, fierce was significantly different from other groups for percentage of time struggling (a) [H(3,47) = 12.7877; *p = 0.0051; n = 16, 6, 15, 10 for Wt, fierce, Tg(Hum), rescue] and force exerted struggling (b) (H(3,47) = 12.9260; *p = 0.0048). In an open-field test, number of ambulatory counts (c) [H(3,57) = 23.2696; *p < 0.0001; n = 17, 12, 17, 11 for Wt, fierce, Tg(Hum), and rescue, respectively], total ambulatory time (d)(H(3,57) = 25.4062; *p < 0.0001), and number of ambulatory episodes (e) (H(3,57) = 14.2440; *p < 0.0001) were all significantly elevated in fierce. Aggression in a resident-intruder paradigm was also elevated; instances of aggression per minute (f) [H(3,49) = 9.3130; *p < 0.0254; n = 14, 7, 12, 16 for Wt, fierce, Tg(Hum), and rescue, respectively] and the percentage of time engaged in aggressive behaviors (g) (H(3,49) = 11.6736; *p < 0.0086) were increased significantly in fierce relative to other genotypes. In addition, the percentage of time engaged in social behaviors (h) was reduced in fierce relative to all other genotypes (H(3,49) = 9.8362; *p < 0.0200). No significant differences were observed between the other three groups in any of the measures assessed in any of the three paradigms. AU, Arbitrary units. Error bars represent SEM. Human NR2E1 message is present in the brains of adult transgenic and rescue mice NR2E1 is normally expressed during embryogenesis and in the adult brain of mice and humans. Thus, although embryonic expression would be essential, the question arose whether rescue of the fierce phenotype had occurred in the absence or presence of adult expression of the human transgene. cDNA prepared from human brain and the brains of adult mice corresponding to each of the genotypes under investigation were assayed for the presence of mouse Nr2e1 (Fig. 5a), human NR2E1 (Fig. 5b), and β-actin (Fig. 5c). RT+ and RT- aliquots of individual samples were run in adjacent lanes to demonstrate that signal was RT dependant. Human brain (Fig. 5, RT+, lane 2) gave no signal for mouse Nr2e1 (top) but was positive for each of human NR2E1 (middle) and β-actin (bottom). cDNA from wild-type (Fig. 5, RT+, lane 4) was positive for mouse Nr2e1 (top), negative for human NR2E1 (middle), and positive for β-actin (bottom). cDNA corresponding to the fierce mutant (Fig. 5, RT+, lane 6) was negative for each of mouse Nr2e1 (top) and human NR2E1 (middle) but positive for β-actin (bottom). Transgenic samples (Fig. 5, RT+, lane 8) were positive for each of mouse Nr2e1 (top), human NR2E1 (middle), and β-actin (bottom). Rescue mice (Fig. 5, RT+, lane 10) were negative for mouse Nr2e1 (top) but positive for each of human NR2E1 (middle) and β-actin (bottom). None of the RT- samples (lanes 3, 5, 7, 9, or 11) gave rise to any product for any of the three assays. Thus, there was adult expression of the human transgene in the rescue mice, further strengthening the conclusion of functional homology of the coding and regulatory sequences of human and mouse NR2E1 but not allowing for temporal dissection of NR2E1 function. Discussion We show here that the presence of human NR2E1 was sufficient to eliminate structural brain abnormalities while ameliorating eye abnormalities in fierce mice deleted for mouse Nr2e1. We further demonstrate that the presence of human NR2E1 was able to correct the pathological aggression and other behavioral abnormalities normally present in fierce. Our data demonstrating the presence of transgene-derived human NR2E1 in the brains of adult transgenic and rescue mice provides additional support for shared function between the mouse and human gene homologs. Together, these data suggest that NR2E1 protein and regulatory sequences are comparable between mice and humans. Our data also demonstrate that conservation is sufficient to maintain the function of both upstream and downstream signaling pathways, at least in mice. Finally, we describe an experimental system in which to test the functional consequences of specific human NR2E1 alleles on behavior. Such a system may also be useful in understanding the specific role of NR2E1 in risk for psychiatric illness and the manner by which this risk interacts with changes in the environment. Mechanisms underlying NR2E1 behavior modulation conserved to human Transgenic rescue experiments in which a human gene is studied in a mouse background have proven useful previously in the analysis of gene function in vivo (Schedl et al., 1996; Chen et al., 2002; Cheung et al., 2004). Although increasingly common in disciplines outside of psychiatry, only a handful of experiments within the discipline have used the approach. Those that do have shown correction of embryonic lethality by a human gene (Hodgson et al., 1996; Pook et al., 2001) but not abnormal behavior (Peier et al., 2000). Thus, before the studies described here, it was unclear whether a human gene could correct abnormal behavior in mutant mice. By extension, the conservation of genetic mechanisms underlying the modulation of behavior was similarly unknown. From mouse behavior to human disease The function of NR2E1 itself is also complex and the subject of active investigation (Stenman et al., 2003a,b; Miyawaki et al., 2004; Roy et al., 2004; Shi et al., 2004). However, an emerging hypothesis suggests that the primary function of this nuclear receptor is to suppress the differentiation of neuronal stem cells (Younossi-Hartenstein et al., 1997; Nguyen et al., 1999; Shi et al., 2004). Consistent with this hypothesis, Nr2e1 is transcribed in the embryonic and adult mouse within regions important for neurogenesis (Monaghan et al., 1995; Shi et al., 2004). Moreover, although mice deleted for Nr2e1 show a complex series of phenotypic abnormalities (Monaghan et al., 1997; Yu et al., 2000; Young et al., 2002), the developmental hypoplasia observed within the forebrain, eye, and olfactory bulbs may be secondary to a reduced proliferative capacity. Thus, at the cellular level, NR2E1 may normally act to suppress differentiation, thereby enabling an expansion of the neuronal stem cell pool ultimately available for neurogenesis. Our data support this hypothesis but do not speak to whether the abnormal behavior observed in fierce mice is the result of abnormal development or the absence of NR2E1 signaling in adulthood. Because the human transgene, like mouse Nr2e1, appears to be expressed during development and adulthood, it is not possible, with the strains we have established, to examine the extent to which signaling at each stage may be required for normal behavior. Conditional ablation of the endogenous gene in adulthood or conditional rescue of expression through development alone would be informative in this regard. Furthermore, although our data also support the conservation of mechanisms underlying behavior abnormalities between mouse and human, the clinical presentation of a common cellular defect may be phenotypically distinct between species. Thus, the data we present here do not demonstrate that a human homozygous for a deletion at NR2E1 would be phenotypically similar to the fierce mouse, although they are consistent with this hypothesis. Although speculative, it is also possible that more subtle variation in human NR2E1 may predispose toward abnormal behavioral phenotypes. This hypothesis is bolstered by evidence for linkage with bipolar disorder at human 6q21-22 (Dick et al., 2003; Middleton et al., 2004); however, NR2E1 is only one among many good candidates within this interval. Of additional interest is that NR2E1-interacting genes (Kobayashi et al., 2000; Yu et al., 2000; Stenman et al., 2003a; Shi et al., 2004) are themselves implicated in mental illness (Goodman, 1998; Krezel et al., 1998; Heyman et al., 1999; Stober et al., 1999; Buervenich et al., 2000; Chen et al., 2001; Davis et al., 2002; Iwayama-Shigeno et al., 2003; Rothermundt et al., 2004). If and when association studies implicate specific human NR2E1 alleles in psychiatric disease, the functional evaluation of these candidates in our system would be of particular interest. Rescue of fierce mouse behavior unexpected We were surprised at obtaining complete correction of brain and behavior abnormalities in the fierce mouse despite only four amino acid differences between the mouse and human NR2E1 proteins. First, it is well established that subtle structural differences within gene orthologs from closely related species can give rise to striking phenotypic variation (Enard et al., 2002). Second, Nr2e1 transcript distribution in mouse is both spatially complex and temporally dynamic. It is first seen at approximately embryonic day 8 (E8) in a few adjacent neuroepithelial cells at the anterior limit of the prosensencephalon, but by E8.5, the transcript has spread to the presumptive diencephalon and is also present in the newly formed optic and olfactory evaginations (Monaghan et al., 1995). Transcription peaks at E13.5 in ventricular and subventricular zones and although almost undetectable in the perinatal brain (Monaghan et al., 1995), is seen later in the adult brain at high levels in the dentate gyri and subventricular zones and at lower levels scattered throughout the cortex (Shi et al., 2004). Because data from human are limited (Jackson et al., 1998), it was unclear whether the expression of the molecule is entirely conserved either in place or across development. Third, NR2E1 acts in more than one cell type (Shi et al., 2004), and at least one of its functions appears to be cell-type specific (Kobayashi et al., 2000). Given the ability of the human transgene to ameliorate developmental anomalies in brain and eye structure, however, we would suggest that the embryonic distribution of transgene-derived human NR2E1 must at least approximate that of the wild-type allele. Moreover, the presence of human NR2E1 in the brains of adult transgenic and rescue mice provides additional support for functional equivalency between the mouse and human gene homologs. Human rescue paradigm: a useful tool for psychiatric research Our data represent the first example of a human gene correcting mouse behavior. Whereas cell-based endpoints are suitable for some kinds of disease, others, particularly psychiatric disorders, require in vivo assay systems. Moreover, as the number of coding variants, and most importantly, noncoding variants implicated in disease increases, so will the need for systems in which to assess their function. We have established an experimental paradigm in which to functionally evaluate the role of human NR2E1 alleles in the modulation of whole-animal behavior. Experiments similar to those we have described will be useful to clarify the role of other genes and alleles in human behavior and psychiatric disease. Footnotes B.S.A. was supported by Doctoral Research Awards from both the Canadian Institutes of Health Research and the Scottish Rite Charitable Foundation of Canada. S.M.H. was supported by a Jack and Doris Brown Foundation Award. E.M.S. holds a Canada Research Chair in Genetics and Behavior and was supported by the Canada Foundation for Innovation New Opportunities Fund/British Columbia Knowledge Development Fund, the Canadian Institutes of Health Research, and the National Institute of Health Mental Health. We are grateful to Dr. Bruce P. Connop, Dr. Wim E. Crusio, Dr. Liisa A. Galea, Dr. Candace E. Hofmann, Ravinesh A. Kumar, Simon Warby, Bibiana K. Y. Wong, and Dr. Yuanyun Xie for helpful discussion, to Slavita Bohacec for technical assistance to Brent Gowen for histological work, to Boris Kuzeljevic and Tracey D. Weir for assistance with statistical analyses, to Wendy Wen for initial help with funduscopy, and to Veronica Yakoleff for aid in manuscript preparation. Correspondence should be addressed to Elizabeth M. Simpson at the above address. E-mail: simpson{at}cmmt.ubc.ca.
>Probabilistically, the participants of this list are unlikely to>effect measurable impacts upon these future developments. Even>worse, I still think careful mentation, idea gestation and>long-winded, good-humoured mutual bickering on diverse mailing>lists and (goodheavensforbid) usenet newsgroups are essentially>incompatible with accomplishing any of these things we so like>to talk about. (We the cheerleaders, not the sweating crew out>in the field. I'd be delighted to be proven wrong, though.>Anyway, even spectator status has got its intrinsic benefits). I view participating in this list as a hobby. My first priority is raising my kids. My second priority is being nice to my wife. My third priority is using artificial intelligence to (voluntarily) separate people from their money, which then flows to my corporate masters. Making the world more transhuman is somewhere around twelfth priority, just below keeping the yard nice. I suspect my job, though not directly aimed at making people more godlike, has a greater positive effect on the future of humanity than all my posting to this list. At least I'm making machines a little smarter and the economy a little more efficient.
File: noErrorCheckForPackageLevelVal.foo.kt - 23f82b3632ebe69b6117ec5a15d7d302 packageHeader PACKAGE("package") identifier simpleIdentifier Identifier("foo") semi NL("\n") NL("\n") importList topLevelObject declaration propertyDeclaration VAL("val") variableDeclaration simpleIdentifier Identifier("i") COLON(":") type nullableType typeReference userType simpleUserType simpleIdentifier Identifier("Int") quest QUEST_WS("? ") ASSIGNMENT("=") expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression literalConstant IntegerLiteral("1") NL("\n") NL("\n") topLevelObject declaration classDeclaration CLASS("class") simpleIdentifier Identifier("A") primaryConstructor classParameters LPAREN("(") classParameter VAL("val") simpleIdentifier Identifier("i") COLON(":") type nullableType typeReference userType simpleUserType simpleIdentifier Identifier("Int") quest QUEST_NO_WS("?") RPAREN(")") classBody LCURL("{") NL("\n") classMemberDeclarations classMemberDeclaration declaration functionDeclaration FUN("fun") simpleIdentifier Identifier("testUseFromClass") functionValueParameters LPAREN("(") RPAREN(")") functionBody block LCURL("{") NL("\n") statements statement expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression ifExpression IF("if") LPAREN("(") expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression simpleIdentifier Identifier("foo") postfixUnarySuffix navigationSuffix memberAccessOperator DOT(".") simpleIdentifier Identifier("i") equalityOperator EXCL_EQ("!=") comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression literalConstant NullLiteral("null") RPAREN(")") controlStructureBody block LCURL("{") NL("\n") statements statement expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression simpleIdentifier Identifier("useInt") callSuffix valueArguments LPAREN("(") valueArgument expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression simpleIdentifier Identifier("i") RPAREN(")") semis NL("\n") RCURL("}") semis NL("\n") RCURL("}") semis NL("\n") RCURL("}") semis NL("\n") NL("\n") topLevelObject declaration functionDeclaration FUN("fun") simpleIdentifier Identifier("testUseFromOtherPackage") functionValueParameters LPAREN("(") RPAREN(")") functionBody block LCURL("{") NL("\n") statements statement expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression ifExpression IF("if") LPAREN("(") expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression simpleIdentifier Identifier("bar") postfixUnarySuffix navigationSuffix memberAccessOperator DOT(".") simpleIdentifier Identifier("i") equalityOperator EXCL_EQ("!=") comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression literalConstant NullLiteral("null") RPAREN(")") controlStructureBody block LCURL("{") NL("\n") statements statement expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression simpleIdentifier Identifier("useInt") callSuffix valueArguments LPAREN("(") valueArgument expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression simpleIdentifier Identifier("i") RPAREN(")") semis NL("\n") RCURL("}") semis NL("\n") RCURL("}") semis NL("\n") NL("\n") topLevelObject declaration functionDeclaration FUN("fun") simpleIdentifier Identifier("useInt") functionValueParameters LPAREN("(") functionValueParameter parameter simpleIdentifier Identifier("i") COLON(":") type typeReference userType simpleUserType simpleIdentifier Identifier("Int") RPAREN(")") functionBody ASSIGNMENT("=") expression disjunction conjunction equality comparison genericCallLikeComparison infixOperation elvisExpression infixFunctionCall rangeExpression additiveExpression multiplicativeExpression asExpression prefixUnaryExpression postfixUnaryExpression primaryExpression simpleIdentifier Identifier("i") semis EOF("<EOF>") EOF("<EOF>")
Q: Where can I find the x / y coordinates for a layer in PS CS? I need to find the x / y coordinates for each layer in my psd. I've searched through the help file and online, but I can't find the answer. A: Hit Cmd + T to get the transform controls. The control bar up at the top will have the x and y values. A: I don't think there's a way to do this in CC. Not exactly what you are looking for, but you can show the coordinates for your cursor: Go to Edit > Preferences Select Units & Rulers and set Units > Rulers to 'Pixels'. Click 'OK'. Go to the Window menu and click Info. You will be able to see your mouse position in the Info panel. You can also see the coordinates for a selected area: Create a new selection with the marquee tool - don't release the mouse button yet! Now hold spacebar, and the small popup now shows the top left coordinates of the selection. This does not work for existing selections, but at least it works for new selections. tip: holding the spacebar while creating a selection allows you to move it. Source: Super User
Paperbag Waists Though it's not exactly the easiest trend to wear in real life, that didn't stop 3.1 Phillip Lim, Public School, Tome, or Tibi from sending skirts and pants with the roomy silhouette down their runways. Our suggestion? Pair yours with a piece that's tighter on top.
The present invention relates to the use of a nonionic alkylhydroxyalkyl cellulose to improve gloss and printability of a surface, for instance paper or cardboard, which is coated with a coating composition containing calcium carbonate and a latex. Advantageously, the non-ionic alkylhydroxyalkyl cellulose can be combined with a carboxymethyl cellulose. When coating, such as smearing or surface sizing of cellulose-based surface-shaped products, for instance paper or cardboard, with a composition the primary aim is to change the properties of the paper product, such as improved strength, improved appearance, improved properties of printability, improved impermeability or improved properties of adhesion. Thus, it is common to surface size paper or cardboard with an aqueous binder-containing composition in order to improve, inter alia, wet strength or to coat paper or cardboard with a composition that contains pigment pastes in order to improve the printing properties and the appearance of the surface. The coating compositions may, apart from binders and pigment, also contain secondary binders (co-binders), protective colloids, thickening agents and dispersing agents. It is common to add water-soluble or water-swellable polymers as thickening agent, protective colloid or secondary binders, on the basis of polyvinyl alcohol, modified celluloses, starch, casein, alginate or high molecular carboxyl-group-containing polymerizate. EP 15 517 discloses the use of cellulose ethers in coating mixtures, where carboxymethyl cellulose is added as a secondary binder. It is already known from EP 307 795 to use, inter alia, methyl cellulose as a protective colloid. EP 425 997 discloses that hydrophobically modified alkyl cellulose, alkylhydroxyalkyl cellulose or hydroxyalkyl cellulose can be used as a thickening agent in aqueous paper coating compositions. The hydrophobic groups are preferably C12-16 alkyl groups or alkyl aryl groups. When used in coating compositions these cellulose ethers, when compared with carboxymethyl cellulose ethers, give an improved viscosity at high shear rates. From EP 496 269 it is also known to prepare a polysaccharide-containing suspension for paper coating, the suspension containing a low-molecular polysaccharide which is dissolved in aqueous phases and may be a carboxymethyl cellulose or a hydroxyethyl cellulose. Moreover, the coating composition contains one or more dispersed, i.e. not dissolved, cellulose polymers, such as hydroxypropyl cellulose, methyl cellulose, methylhydroxypropyl cellulose and hydrophobically modified hydroxyethyl cellulose. WO 97/46757 discloses the use of a water-soluble non-ionic alkylhydroxyalkyl cellulose which contains alkyl groups having 1-3 carbon atoms and hydroxyalkyl groups having 2-3 carbon atoms but which is free from hydrophobically modified hydrocarbon groups having at least 4 carbon atoms, the cellulose ether having a turbidity point in the range 35-80xc2x0 C., as a thickening agent in aqueous compositions for coating cellulose-based surface-shaped products. By using the cellulose ethers as a thickening agent, process engineering advantages are obtained when applying the coating compositions to surface-shaped cellulose products. The present invention generally relates to the use of a non-ionic alkylhydroxyalkyl cellulose, which has alkyl groups having 1-3 carbon atoms and hydroxyalkyl groups having 2-3 carbon atoms, is free from hydrophobically modifying hydrocarbon groups having at least 4 carbon atoms and has a turbidity point of 50-95xc2x0 C., or a combination of the alkylhydroxyalkyl cellulose with a carboxymethyl cellulose, where the amount of the carboxymethyl cellulose is 1200 percent by weight at the most of the amount of the alkylhydroxyalkyl cellulose in an aqueous coating composition containing a calcium carbonate and a latex in order to improve the gloss and the printability of the surface which is obtained when paper or cardboard is coated with the coating composition. According to the present invention, it has now been found that the use of a non-ionic alkylhydroxyalkyl cellulose, which has alkyl groups having 1-3 carbon atoms and hydroxyalkyl groups having 2-3 carbon atoms, is free from hydrophobically modifying hydrocarbon groups having at least 4 carbon atoms and has a turbidity point of 50-95xc2x0 C., or a combination of the alkylhydroxyalkyl cellulose with a carboxymethyl cellulose, where the amount of the carboxymethyl cellulose is 1200 percent by weight at the most of the amount of the alkylhydroxyalkyl cellulose, in an aqueous coating composition containing a calcium carbonate, and a latex considerably improves the gloss and the printability of the surface that is obtained when paper or cardboard are coated with the coating composition. Extensive studies have shown that the use of the alkylhydroxyalkyl cellulose in a latex coating composition which is pigmented with calcium carbonate gives an improved gloss and changes in the surface of the coating layer, such as higher hydrophilicity, higher surface energies and a higher relative polarity. These changes of the surface lead to improved printing properties. For example, the gloss, set-off and smoothness of the surface are improved. It has also been found that the carboxymethyl cellulose in combination with the alkylhydroxyalkyl cellulose gives a surprisingly good result, although the use of the carboxymethyl cellulose only gives a considerably lower hydrophilicity, surface energies, relative polarity, gloss and printability than the alkylhydroxyalkyl cellulose. Since the carboxymethyl cellulose in relation to the alkylhydroxyalkyl cellulose is easier to prepare and, moreover, is produced on a large scale, using a combination of carboxymethyl cellulose and alkylhydroxymethyl cellulose means a commercially attractive embodiment of the invention. It has also turned out that the coating composition which contains both an alkylhydroxyalkyl cellulose and a carboxymethyl cellulose according to the invention exhibit excellent rheology properties compared to a coating composition which contains carboxymethyl cellulose only. For instance, the viscosity of a coating composition containing the combination is less dependent on the shear rate than may be expected. If a combination of alkylhydroxyalkyl cellulose and carboxymethyl cellulose is used, the amount of carboxymethyl cellulose usually constitutes 20-1200 percent by weight, preferably 50-600 percent by weight, of the amount of the alkylhydroxyalkyl cellulose. The viscosity of the alkylhydroxyalkyl cellulose may vary considerably and should in a conventional manner be adapted to the composition of the coating mixture. Usually it is in the range 5-100,000 mPaxc2x7s, preferably in the range 10-10,000 mPaxc2x7s, measured in a Brookfield viscosimeter of the type LV in a 2% solution at 20xc2x0 C. Examples of suitable alkylhydroxyalkyl celluloses are ethylhydroxyethyl cellulose, methylethylhydroxyethyl cellulose, methylethylhydroxy-ethylhydroxypropyl cellulose, methylhydroxyethyl cellulose and methylhydroxypropyl cellulose. Usually the hydroxyethyl groups constitute at least 30% of the total number of hydroxyalkyl groups and the number of ethyl substituents usually constitute at least 10% of the total number of alkyl substituents. Examples of such cellulose ethers are ethylhydroxyethyl cellulose with DSethyl=0.8-1.3 and MShydroxyethyl=1.9-2.9 and methylethylhydroxyethyl cellulose with DSmethyl=1.0-2.5; DSethyl=0.1-0.6 and MShydroxyethyl=0.1-0.8. The amount of alkylhydroxyalkyl cellulose is usually from 0.05 to 3, preferably from 0.2 to 1.5 percent by weight of the composition. The carboxymethyl cellulose usually has a degree of substitution of carboxymethyl of 0.6xe2x88x921.5. It can exist in acid form, but preferably the salt form with a preferably monovalent cation, such as sodium, is used. The carboxymethyl cellulose usually has a somewhat lower viscosity than the alkylhydroxyalkyl cellulose and it is normally in the range 2-15,000 mPaxc2x7s, preferably in the range 5-5000 mPaxc2x7s, the viscosity being measured in the same manner as for the alkylhydroxyalkyl cellulose. Apart from carboxymethyl groups, the carboxymethyl cellulose can also contain other substituents, such as hydroxyethyl groups and methyl groups. As already mentioned, the coating composition according to the invention is pigmented with calcium carbonate but can, advantageously, also contain other pigments. Examples thereof are kaolin, talc, titanium oxide, satin white, hydrated aluminium, sodium silicoaluminate, gypsum and plastic pigment and a large number of special pigments, such as barium sulphate and zinc oxide. The total amount of pigment in the coating composition is usually 5-65 percent by weight and may constitute 4 to 20 times the amount of weight of latex. Of the total amount of pigment, the amount of calcium carbonate normally constitutes 5-100 percent by weight. The composition according to the invention also contains a latex binder, which can be any conventional latex binder, conveniently in an amount of 2xe2x88x9270, preferably 5xe2x88x9230, percent by weight based on the weight of the coating mixture. The latex may consist of copolymers which are made of monomers from the group ethylenically unsaturated carboxylic acids, esters of acrylic acid and methacrylic acid, acrylonitrile, methacrylonitrile, acrylamide, methacrylamide, C3-C5 ethylenically unsaturated monocarboxylic acids, ethylenically unsaturated dicarboxylic acids and their halfesters, vinyl chloride, ethylenically unsaturated hydrocarbons, vinyl ester, vinyl sulphonic acid and esters of unsaturated carboxylic acids which are derived from polyvalent alcohols. Examples of suitable copolymers are polymers of vinyl acetate and acrylate, copolymers of vinyl acetate, ethylene and vinyl chloride, copolymers of styrene and acrylates, copolymers of styrene and butadiene and copolymers of styrene, butadiene and acrylonitrile and mixtures thereof. Said copolymers can also contain further monomers, such as esters of unsaturated carboxylic acids and unsaturated carboxylic acids can be copolymerised. It is also possible to use homopolymers, for example of acrylic acid and vinyl esters. As supplementary binders to the latex binders, sometimes called secondary binders, also polyvinyl alcohol, modified cellulose starch, casein, alginate, cellulose esters and high molecular carboxylic containing polymers can be added. A typical aqueous coating composition for use according to the invention has the following composition based on its dry content: 0.07-5, preferably 0.3-2 percent by weight of the alkylhydroxyalkyl cellulose or the alkylhydroxyalkyl cellulose and the carboxymethyl cellulose at the weight ratios defined above. 4-15, preferably 7-13 percent by weight of latex, 60-94, preferably 70-90 percent by weight of pigment, of which 5-100 percent by weight is calcium carbonate, 0-10, preferably 0-7 percent by weight of secondary binder, 0-3, preferably 0.1-2 percent by weight of dispersant, 0-5, preferably 0-2 percent by weight of protective colloid, 0-4, preferably 0-2 percent by weight of other additives, such as optical whitener, bactericides, pH-regulating agents, antifoam agent and lubricant, the dry content being 20-72 percent by weight. The Brookfield viscosity of the coating composition is usually 100-2500 mPaxc2x7s at 100 revolutions/minute and at 20xc2x0 C. The viscosity of coating compositions with the dry content of 55-72 percent by weight is 600-2500 mPaxc2x7s. An aqueous coating composition for use according to the invention can be made by the pigment part being dispersed in water, possibly by means of a dispersant. To the obtained pigment wash, one may then add secondary binders, alkylhydroxyalkyl cellulose, carboxymethyl cellulose and other additives included in the composition and, finally, latex, preferably in the form of a dispersion. A cellulose-based product coated with the above-mentioned composition can be prepared by a) applying the composition on the cellulose-based product at a temperature below the turbidity point of the alkylhydroxyalkyl cellulose, b) drying the surface-shaped cellulose product by heating, the cellulose product being coated with the composition, and c) calendering the cellulose product, if desired. The application of the composition takes place in a manner known per se, for instance, by air knife coating, roller coating or blade coating. Owing to season and geographical location, the temperature of the composition is usually in the range 5-55, preferably 20-40xc2x0 C. The invention is further illustrated by the following examples.
Ban Tamil Tigers, Sri Lanka urges OFFICIALS in Sri Lanka are urging Australia to ban the militant group the Tamil Tigers and strike a clear distinction between genuine refugees and economic opportunists. As Foreign Minister Stephen Smith flew to Singapore following talks with Sri Lankan President Mahinda Rajapaksa and his Foreign Minister, Rohitha Bogollagama, aimed at stopping the flow of boats, officials in Colombo told The Australian Sri Lankan people fleeing their country did not need protection. Yesterday, Mr Smith announced Australia would provide $11 million in funding to Sri Lanka. Most of the money, $6m, will fund de-mining and rehabilitation in the nation’s north after decades of violent conflict, while the rest will go towards housing, food and resettlement services. The two countries also signed a memorandum of understanding aimed at increasing joint anti-people-smuggling efforts and intelligence-sharing. The talks follow a surge this year in the number of asylum-seeker boats leaving Sri Lanka for Australia. Senior Australian envoy Brian McCarthy and people-smuggling ambassador Peter Woolcott will stay on in Colombo for a series of meetings aimed at hammering out the details of the agreements. Yesterday, Sri Lankan Foreign Ministry secretary Romesh Jayasinghe said there was a need for a clear distinction between genuine refugees and those not in need of protection. “The fact is that the (1951 Refugee Convention) provides for refuge in instances when there is a well-founded fear,” Mr Jayasinghe said. “I would submit to you that there is no such situation in Sri Lanka.” Mr Jayasinghe said the legal status of the separatist Tamil Tigers, or LTTE – whose defeat in May by the Sri Lankan government triggered the massive internal displacement Labor says is behind the surge in boats – was also a significant issue for Colombo. “The LTTE in the form it was known is no more,” Mr Jayasinghe said. “But there are sinister elements that are endeavouring to try to re-stoke the cinders of secessionism. It is necessary to be vigilant and prevent such attempts. “That’s the position that was presented quite clearly by our side to our Australian guests.” At a press conference on Monday, Sri Lankan Foreign Minister Rohitha Bogollagama explicitly linked the Tamil Tigers with people-smuggling: “Sri Lanka’s stand has always remained, that people-smuggling has been part of terrorist activities – it has previously been associated with LTTE activities.” The Tamil Tigers are a banned terrorist organisation in the US and Europe but have never been proscribed in Australia. Yesterday, the 78 Sri Lankans on board the Customs ship Oceanic Viking managed to communicate by hand signals that they remained unwilling to come ashore to a detention centre at Tanjung Pinang, on Indonesia’s Bintan island. As another delegation of Australian officials boarded the vessel in a bid to break the deadlock, some of the Sri Lankans made crossed forearm gestures to demonstrate there was still no deal. The major sticking point remains the issue of where the asylum-seekers would be held if they agreed to go ashore, with many having already spent several years in Indonesian detention centres. Australian claims that the Indonesian side is considering a request to house the Sri Lankans in community facilities has been met with bewilderment by senior officials, on and off the record. Like this: Related One Response to “Ban Tamil Tigers, Sri Lanka urges” He plagiarizes Stephen Jay Gould without giving him credit except such vague words as “more here.” Actually, Gould’s article dismissed the myth that Marx was a social Darwinist, Marx being disappointed with Darwin after discovering Malthus’ influence on the latter, and that Marx approached Lankester for medical advice in the treatment of his ailing wife Jenny. Mr. John Jay Ray even contradicted himself. Once he asserted that “that both Marx and Engels were Lamarckians” but he also accused Marx of social Darwinism: Marx To Ferdinand Lassalle, 16 January 1861: “Darwin’s work is most significant and suits me as a natural science underpinning for historic class struggle. One does, of course, have to put up with the clumsy English style of argument. Despite all shortcomings, it is here that, for the first time, ‘teleology’ in natural science is not only dealt a mortal blow but its rational meaning is empirically explained.” The venerable Mr. Ray is also ignorant of Engels’ view of Tremaux book. Engels praised Tremaux for his hypothesis on the influence of geology on evolution, yet Engels saw through Tremaux’s mistakes and one-sidedness. Thus Engels advised his best friend not to take Tremaux seriously. “To err is human,” to forgive not an option. If Engels was in fact a Lamarckian, how could he advise Marx against such Lamarckian geological theory of Tremaux? It is not to mention that Gould shared the same opinion as Engels’ on Tremaux’s ignorance of geology. Mr. John Jay Ray just sets up strawmen which he later strikes down himself. If Mr. John Jay Ray erase this comment, he is a coward and a hypocrite. He railed against lack of freedom of speech and Political Correctness on his blogspot “Tongue-tied” and “PC Watch,” but he will not allow “Leftists” to expose his intellectual dishonesty. I wonder if Mr. John Jay Ray has forgot Dixie Chicks and Freedom Fries?
Characterization of doxorubicin binding site and drug induced alteration in the functionally important structural state of oxyhemoglobin. Doxorubicin (DOX) binding to hemoglobin (Hb) was studied to investigate the drug induced protein dysfunction. The features of anti-tumor drug doxorubicin infused structural perturbation of human Hb were studied by circular dichroism (CD). The mechanism of DOX-Hb binding was elucidated by steady-state and synchronous fluorescence spectroscopy. The Stern-Volmer analysis indicated that the binding of Hb to DOX is characterized by more than one high affinity binding site with the association constants of the order of 10(5). Hydrophobic probe ANS was employed to elucidate the drug binding site. Binding mode expounded by thermodynamic parameters implied the role of hydrogen bonding, electrostatic and hydrophobic interaction in stabilizing the complex. The molecular distance between donor (Hb) and acceptor (DOX) was calculated according to Förster's theory of energy transfer. Fourier transform infrared (FT-IR) spectroscopy provides an insight to the changes occurring in protein on DOX binding. Treatment of Hb with DOX resulted in a dose dependent fragmentation of protein. The quantitative analysis revealed the release of acid soluble amino groups from the photoexcited Hb-DOX mixture. The free radical mediated degradation was suggested by its rescue on mannitol and superoxide dismutase (SOD) appliance. The loss of protein band further corroborates the concentration dependent Hb fragmentation. The molecular modeling complies with the thermodynamic data of forces involved in DOX binding and depicts its interaction in the proximity of oxygen binding pocket of Hb. Thus, this study enriches our understanding of the interaction dynamics of anticancer drugs to the physiologically important protein Hb.
Have you ever noticed that during extreme economic cycles, when trends are roaring on the upside, or conversely crashing back down to earth, there often appears an air of extremism in news headlines? Take America's most recent shale oil boom, and bust, for example. On the way up, you may have seen Why OPEC Could Be Dead in 10 Years. Conversely, now you may have read, Why It Might Be 'Game Over For The Fracking Boom.' In the end, the answer lies somewhere in-between. OPEC, although often plagued with internal discord, will still remain the global de facto 900-pound gorilla of crude, and US producers will continue to find ways to crack shale rock cheaper and more efficiently, immunizing themselves to nail-biting commodity roller coaster dips like what was just experienced. And in 2008 (-55%). And in 2001 (-32%). And in 1998 (-38%). BP (BP), in its recently released "Energy Outlook 2035," predicts OPEC's market share will return to approximately 40% of global demand within 15 years, up from 33% today, which is what all this fuss is about anyway. Here are three reasons why America's shale will continue to produce going forward: 1. Oil companies, both large and small, have seen what is possible. In 2004, Texas oilman George Mitchell made hydraulic fracture stimulation commercially viable by unlocking the right combination of water pressure and lubricants to allow oil and gas to predictably flow from dense shale to the wellbore. A decade ago, producers believed shale held vast oil and gas resources, but to what extent they could be developed had not been determined. Until now. Last year for example, the Energy Information Administration (EIA) announced there could be up to 75 billion additional barrels of oil in the Permian Basin, a field believed to be mostly dried up. The EIA also forecast over 100 years of natural gas supply from shale resources, mostly flowing from the vast Marcellus and Utica formations in the Northeast. One of the biggest reasons America's shale revolution will continue is producers have seen the potential. As with any industry, technology should drive cost down, and drillers and producers are both mutually highly incentivized to find cheaper, faster, better ways of extraction. 2. Eventually, politicians might "Get It." The shale oil revolution that peaked in 2014 occurred mostly in spite of Washington, D.C., not because of it. With Capitol Hill and the White House mired in political gridlock for most of the last 6 years, oil and gas producers were thus free to explore, develop, and prove the concept that shale development was indeed commercially viable. In a perfect scenario, the next phase would involve political leadership who comprehends the benefit of an alliance between Canada, Mexico and the U.S., creating a formidable energy superpower, ultimately likely leading to North American energy independence from any imported oil. 3. In spite of the current dip, global demand points up. BP and Exxon Mobil (XOM), in their long-range forecasts, both allude to the same conclusion -- the macro trend for oil consumption worldwide is up. BP predicts a 41% increase in demand over the next 20 years, with China and India accounting for half the growth. Exxon Mobil concurs. Basing their forecast on a continued population explosion to 9 billion people by 2040, Exxon theorizes GDP will grow parabolically, and in spite of energy efficiencies that will certainly be realized along the way, demand for all forms of energy will continue to increase. In their "Outlook for Energy: A View to 2040," Exxon confirms the "all of the above" theory to meet global demand. Thomas Hood, English poet, author and humorist was quoted to say, "Extremes meet, as the whiting said, with its tail in its mouth." Oil producers have work to do. They must reduce costs, continue to solve environmental concerns over extraction techniques, and scale efficiencies. This bust has offered plenty of incentive to accelerate that. But there is still an abundance of oil and gas to be extracted, with ample incentive to figure out the most efficient ways to develop it. By Thomas Miller for Oilprice.com
1.Vladimir #Malakhov is a #Russian-born retired professional hockey player. He was active in the NHL 1992 to 2006, playing for the New York Islanders, the Montreal Canadiens, and the New Jersey Devils. 2. In January of 1999, #Malakhov wrote a check for $350,000 to #Cohen The check was deposited — and then the money disappeared. 3.What happened to the money and how this check came to be written to Michael #Cohen was the subject of years of litigation in Circuit Court in #Miami, #Florida. (See Fomina v. Netscheret, 2006-001330-CA-01.) 6.The acquaintance was a woman named Julia Fomina. According to an affidavit filed by #Malakhov’s agent, the money was intended not for Fomina but rather her boyfriend in #Russia, Vitaly #Buslaev. 6a)#Malakhov loaned $350,000 to Fomina and, on the advice of his attorney, secured the loan by having Fomina sign over a mortgage for her apartment on the 24th floor of #Miami Beach condo tower. 7.For reasons that aren’t clear, Fomina instructed #Malakhov’s wife to send the $350,000 loan to Michael #Cohen. The check was issued in January 1999 to #Cohen personally, not his law firm or many businesses, and deposited in #Cohen’s #Citibank trust account. 8.Sometime later, #Fomina defaulted on her loan. When #Malakhov moved to foreclose on the condominium, #Fomina swore under oath that she never received the $350,000 that had been sent to #Cohen. 9. It took years before #Cohen was finally deposed .#Cohen’s response: “I don’t recall.” He insisted he didn’t know #Malakhov, had no idea why the hockey player would write him such a huge check, had no records relating to the check, and had no clue what happened to the money. 9a)This is letters of what was required from #Cohen at the deposition. 10 .In deposition, #Cohen speculated that one of the reasons why #Malakhov might have sent him the check were his ties to #Russians, including his business partner, the Ukrainian-born “Taxi King” Simon #Garber who #Cohen worked with 1.Ten days ago, President Reagan admitted that although some people in this country seemed to be doing well nowadays, others were unhappy, even worried, about themselves, their families, and their futures. 2. The President said that he didn't understand that fear. He said, "Why, this country is a shining city on a hill." And the President is right. In many ways we are a shining city on a hill. 1.After three years in jail, a racketeer convicted of running an international gambling and #MoneyLaundering ring in partnership with a #Moscow crimelord was released and lived on the 63rd floor of #TrumpTower 🔥Cohen pleaded GUILTY for LYING to @HouseIntelComm and Senate Intel to "minimize the links between the Moscow Project (Trump Tower Moscow) and Individual 1 (@realDonaldTrump)" and give the FALSE impression that the project ended before the "Iowa caucus and...the first primary." Cohen now admits that the #MoscowProject was discussed MULTIPLE times w/in @Trump Org – including with Trump and "family members" (Don Jr, Kremlin🇷🇺Barbie, Eric) – **as late as June 2016** when Trump was the presumptive @GOP nominee for president. This thread focuses on advanced threat perception from this group. Although this is a vast network covering many areas we concentrate here on key players driving it forward. This guy is Max Theon original name Louis-Maximilian Bimstein. He founded the Cosmic Movement. As we will see each and every member of this network prefers to hide their original name, identity and history. Many prominent people were involved with this Cosmic Movement as we will see. One of them was Tomáš Masaryk (who became the first President of Czechoslovakia) also the Princess of Rohan in Vienna and many others. However this group was actually a spin-off of the OTO. Cohen’s in-laws from Ukraine, purchased 3 Trump apartments from 2003-2005, for nearly $8 million. His personal wealth has taken a drop in recent years, due to millions in taxi medallions, which have lost value. The medallions have been refinanced, and loan due to bank in 2019.
UNPUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT UNITED STATES OF AMERICA,  Plaintiff-Appellee, v.  No. 03-4928 GARRY L. TOLER, Defendant-Appellant.  Appeal from the United States District Court for the Southern District of West Virginia, at Beckley. Charles H. Haden II, District Judge. (CR-03-122) Submitted: August 27, 2004 Decided: October 4, 2004 Before MOTZ and KING, Circuit Judges, and HAMILTON, Senior Circuit Judge. Affirmed in part; dismissed in part by unpublished per curiam opin- ion. COUNSEL Timothy P. Lupardus, Pineville, West Virginia, for Appellant. Kasey Warner, United States Attorney, Ronald G. Morgan, Assistant United States Attorney, Charleston, West Virginia, for Appellee. 2 UNITED STATES v. TOLER Unpublished opinions are not binding precedent in this circuit. See Local Rule 36(c). OPINION PER CURIAM: Garry L. Toler pled guilty to bank robbery, 18 U.S.C. § 2113(a) (2000), and was sentenced as a career offender to a term of 210 months imprisonment. Toler appeals his sentence, contending that the district court clearly erred in denying him an adjustment for accep- tance of responsibility, U.S. Sentencing Guidelines Manual § 3E1.1 (2003), and failed to recognize its authority to depart below the career offender guideline range pursuant to USSG § 4A1.3, p.s. We affirm in part and dismiss in part. Although the government did not oppose an adjustment for accep- tance of responsibility, the district court agreed with the probation officer’s estimation that Toler had not been fully truthful in his pre- sentence interview. In particular, the court found that Toler had tried to minimize his culpability by portraying the bank robbery as an impulsive, unplanned act driven by his drug addiction and immediate need for money to buy drugs. The probation officer noted that Toler admitted that he watched the bank for fifteen to twenty minutes before he entered it, talked to the head teller about opening an account for the same length of time, left the bank and returned a short time later to talk to her again. The head teller reported that, during the sec- ond conversation, Toler seemed to be watching the customers and waiting for them to leave. In addition, in a prior interview with agents from the Federal Bureau of Investigation, Toler had described in detail, under a grant of immunity, a number of robberies and fraudu- lent acts he had committed during the several years preceding the instant bank robbery. Yet he was reluctant to discuss these offenses with the probation officer and claimed that he could not remember the details. Toler’s statement to the probation officer also conflicted with information from his wife, who reported that, when the police appeared at the motel where they were staying after the bank robbery and Toler disappeared, she called Toler at his parents’ house and he UNITED STATES v. TOLER 3 instructed her to go to another motel. Toler’s daughter drove Mrs. Toler to the second motel, in Justice, West Virginia. She took the rob- bery proceeds with her, and registered at the motel under an assumed name. Toler said he had left the first motel to clear his head and later had searched frantically for his wife. He did not explain how he found her, but he was arrested at the same motel in Justice, where he had also registered under a false name. The district court’s factual determination that a defendant has not accepted responsibility is reviewed for clear error. United States v. Pauley, 289 F.3d 254, 261 (4th Cir. 2002), cert. denied, 537 U.S. 1178 (2003). To qualify for the adjustment under the 2002 Guidelines Manual, a defendant must truthfully admit the conduct comprising the offense of conviction and admit, or not falsely deny, any relevant con- duct for which he is accountable under USSG § 1B1.3. See USSG § 3E1.1, comment. (n.1(a)). The defendant need not admit relevant conduct or other criminal conduct beyond the offense of conviction. Id. However, a guilty plea alone does not entitle a defendant to the adjustment, and the adjustment may be denied if the defendant exhib- its conduct that is inconsistent with acceptance of responsibility. USSG § 3E1.1, comment. (n.3); United States v. Harris, 882 F.2d 902, 906 (4th Cir. 1989). Toler was not required to admit any criminal conduct beyond the offense of conviction to earn an adjustment for acceptance of respon- sibility. USSG § 3E1.1, comment. (n.1(a)). However, to the extent that Toler’s statement to the probation officer conflicted with his prior admission to the FBI about other robberies and fraud offenses he had committed and with Mrs. Toler’s statement, in an effort to portray the instant offense as an isolated, impulsive act, his lack of candor about these prior crimes was significant. Therefore, the district court did not clearly err in finding that Toler’s conduct in the presentence interview was inconsistent with acceptance of responsibility. A defendant qualifies for sentencing as a career offender if he is at least eighteen years old at the time of the instant offense, and has two prior felony convictions for either a crime of violence or a con- trolled substance offense. Toler was in his 40’s when he committed the instant bank robbery and had prior felony convictions for armed robbery and cocaine distribution. 4 UNITED STATES v. TOLER Toler does not offer any argument concerning the propriety of the district court’s decision to sentence him as a career offender. He has thus abandoned on appeal the issue of his career offender status. Edwards v. City of Goldsboro, 178 F.3d 231, 241 n.6 (4th Cir. 1999) (noting that issues not briefed or argued on appeal are deemed aban- doned). Instead, Toler maintains that he was entitled to a departure below the career offender guideline range because both predicate offenses were committed more than fifteen years before he committed the instant offense,* the sentences were partially concurrent, and he did not have another felony conviction for a crime of violence or drug offense until his conviction for the instant offense. Toler suggests that the district court may not have understood its legal authority to depart downward because the court did not specifically address his request for a downward departure. The sentencing court’s decision not to depart downward is not reviewable on appeal unless its decision results from a mistaken belief that it lacks the authority to depart. United States v. Carr, 271 F.3d 172, 176 (4th Cir. 2001). To determine whether the district court erro- neously failed to recognize its authority to depart, the appeals court should consider relevant statements made by the district court. United States v. Aramony, 166 F.3d 655, 665 (4th Cir. 1999). Here, the dis- trict court gave no indication that it was unaware of its authority to depart. Because § 4A1.3 explicitly gives the sentencing court the authority to depart downward and this Court has held that the court may depart downward from a career offender sentence, see United States v. Brown, 23 F.3d 839, 841 (4th Cir. 1994), the record provides no basis from which to conclude that the court did not recognize its authority to depart. Therefore, its decision is not reviewable. We therefore affirm the sentence imposed by the district court, but dismiss that portion of the appeal that challenges the district court’s decision not to depart. We dispense with oral argument because the facts and legal contentions are adequately presented in the materials *The sentence for each predicate offense extended into the fifteen-year period preceding the instant offense, and was thus countable in Toler’s criminal history. USSG § 4A1.2(e)(1). UNITED STATES v. TOLER 5 before the court and argument would not aid the decisional process. AFFIRMED IN PART; DISMISSED IN PART
Yes, the public schools do need fixing If you want to work for the betterment of public education, you get used to a certain amount of smack talk. But when the sniping goes so far as to deny that we do have profound problems and inequities in our schools, then it goes too far. Let’s go into this step by step, using one example: third grade reading. Here are some sample questions from Washington’s third-grade Measure of Student Progress. It is not a difficult test. I think it’s safe to assert that most parents would be pretty perturbed if their 8-year-olds couldn’t pass it. But if you look at the state data from last year, you find that one in five Seattle Public School third graders- at least 820 children – did not meet standard on the test in 2013. That’s disturbing in itself and there are piles of depressing, peer-reviewed research that show that kids who aren’t proficient in third grade reading face huge obstacles to ever catching up to their peers. They are estimated to be four times as likely to drop out of high school. Take a closer look at the data and you’ll find the kids in this predicament are disproportionately African-American, poor, and/or are getting special education services for something. (The vast majority of kids in special education have typical intellects.) These are real kids whom the system has failed. Fantasizing that the need for school reform is a lie concocted by those who want to privatize education does not help them.
Q: What is the difference between putIfAbsent and computeIfAbsent in Java 8 Map ? Reading an interesting articles the guys claims that the difference between the two function are: Both functions aspire to add an element if the specified Key is not already present in Map. putIfAbsent adds an element with the specified Value whereas computeIfAbsent adds an element with the value computed using the Key. http://www.buggybread.com/2014/10/java-8-difference-between-map.html And We’ve seen that putIfAbsent removes the imperative way of having to define the if-statement, but what if fetching the Java articles is really hurting our performance? To optimise this, we don’t want to fetch the articles until we’re really sure we need them — meaning we need to know if the key is absent before fetching the articles. http://www.deadcoderising.com/2017-02-14-java-8-declarative-ways-of-modifying-a-map-using-compute-merge-and-replace/ I didn't ready understand what are the differences can you please elaborate more on these two functions ? A: Difference #1 computeIfAbsent takes a mapping function, that is called to obtain the value if the key is missing. putIfAbsent takes the value directly. If the value is expensive to obtain, then putIfAbsent wastes that if the key already exists. A common "expensive" value is e.g. new ArrayList<>() for when you're creating a Map<K, List<V>>, where creating a new list when the key already exists (which then discards the new list) generates unnecessary garbage. Difference #2 computeIfAbsent returns "the current (existing or computed) value associated with the specified key, or null if the computed value is null". putIfAbsent returns "the previous value associated with the specified key, or null if there was no mapping for the key". So, if the key already exists, they return the same thing, but if the key is missing, computeIfAbsent returns the computed value, while putIfAbsent return null. Difference #3 Both method define "absent" as key missing or existing value is null, but: computeIfAbsent will not put a null value if the key is absent. putIfAbsent will put the value if the key is absent, even if the value is null. It makes no difference for future calls to computeIfAbsent, putIfAbsent, and get calls, but it does make a difference to calls like getOrDefault and containsKey. A: Suppose you have a Map<String,ValueClass>. map.putIfAbsent("key", new ValueClass()); will create a ValueClass instance anyway, even if the "key" key is already in the Map. This would just create an unnecessary instance. On the other hand map.computeIfAbsent("key", k -> new ValueClass()); will only create a ValueClass instance if the "key" key is not already in the Map (or is mapped to a null value). Therefore computeIfAbsent is more efficient. putIfAbsent is equivalent to: ValueClass value = new ValueClass(); if (map.get("key") == null) { map.put("key",value); } while computeIfAbsent is equivalent to: if (map.get("key") == null) { map.put("key",new ValueClass()); } Another small difference between the two methods is that computeIfAbsent will not put a null value for an absent key. putIfAbsent will. A: You can understand the difference by carefully looking at the method signatures: putIfAbsent takes a key and value, and puts the value in the map if there is no value for that key in the map. computeIfAbsent takes a key and a Function. If there is no value for that key in the map, the function is called to create the value, which is then put in the map. If you already have the value, use putIfAbsent. If you don't have the value yet and creating the value is an expensive operation (for example, the value has to be looked up in a database), then use computeIfAbsent, so that the expensive operation doesn't need to be performed in case the map already contains a value for the specified key.
Busting the hookah myths A tribesman smokes traditional hookah in Jampuijala, a remote village in Tripura's Sepahijala district on March 23, 2015.(Image Source: IANS) New Delhi, June 2 : The hookah has been associated with leisurely activities for centuries. A really famous old tradition has become a huge rage nowadays and youngsters flock to hookah joints like hibernating birds without understanding the repercussions of this habit. Snehal Singh , Senior Lifestyle and Wellness Management Consultant at Healthians, an online diagnostic centre that offers at home service, and Sargam Dhawan, Director, Planet Herbs Lifesciences Pvt Ltd list the major myths around the hookah Myth 1: Hookah and vaping is same Hookah is used to smoke tobacco in an intricate setup, where the heated tobacco smokes passes through cool water to reach the smoker via a water pipe structure. It is usually shared in groups and is a trend in social gatherings, more common among youngsters these days. Whereas, vaping is smoking e-cigarettes that are for individual use that burns substances and nicotine, at high temperatures to produce vapours Myth 2 - Hookah is a great option and has no harmful effects Hookah smokers can be at risk of the same health problems as cigarette smokers. The toxic substances, chemicals and poisonous gases, increase the risk of several health problems. These include cough, respiratory problems, reduced lung function and decreased fertility. It is also noted that babies born to women who smoked hookah every day can weigh less than those of non-smokers and such babies can also be at a greater risk of respiratory problems. Myth 3 - Hookah smoke is cleaned and cooled after passing over water and is not as dangerous as cigarette smoking Although hookah smoke is cooled when smoking, the toxic chemicals in it are still dangerous. The charcoal used for heating the substances and tobacco, pose great health risks. It produces toxic substances and gases like carbon monoxide, metals and other carcinogenic chemicals which can increase the risk of cancers and heart problems just as much as cigarette smoking. It is believed that flavoured hookah offers many benefits as natural and herbal substances are used. However, when these are burnt, the final result is carbon monoxide and toxic gases, which are harmful for the lungs and overall health. Myth 5 - Smoking hookah does not affect others Hookah smoking also releases second hand smoke, which greatly affects others, just like cigarette smoking. It releases very fine particles in air, which are harmful for those sitting around. Even in case of non-tobacco hookah, the toxic content in the released smoke is the same as tobacco products. Myth 6 - Hookah is not addictive as a cigarette Hookah smoking can lead to inhalation of tobacco, which contains nicotine. Nicotine is an addictive substance and smoking hookah too can be as addictive as smoking cigarettes. Depending on the substances used and the level of tolerance of nicotine, some people may feel addicted or even get high on hookah. Myth 7 - Hookah smoke is water cooled and filtered People, especially kids, think that because hookah smoke is water-cooled and filtered, it is safe, but that's not true. In comparable studies with cigarettes, hookah smoke contains significant quantities of the same chemicals that make cigarette smoke harmful. In addition, hookah smoke contains the same cancer-causing particulates found in second hand smoke and 100 times the amount of lead as in regular cigarettes. Myth 8 - Hookah used with milk One of the biggest myths is that by adding milk to your base instead of water, you will get bigger smoke clouds. This is something that no one should ever experiment with. Milk froths up a lot when air runs through it. Unless you are sterilizing your hookah rig between each session, this milk could cause bacterial growth and if inhaled, could cause nasty respiratory or lung infections.
I’ve been spending too much time on BuzzFeed. All of those quizzes, illuminating so many aspects of my personality that, until now, I just wasn’t aware of. Like which breakfast meat speaks most about my life? (Canadian bacon.) What’s your real favorite color? (Periwinkle.) Which Golden Girl are you? (Dorothy.) The amount of information I’ve learned about myself, it’s too much. All of those multiple-choice questions, I feel like I don’t know who I am anymore. Is this the real me, Buzzfeed? It started out innocently enough. I took this quiz called, “What City Should You Actually Live In?” Right away, I started getting really anxious. I worried that it would tell me, “You should live in: Long Island!” because, and it’s nothing personal Long Island, that’s where I grew up, I love Long Island, but now that I’m living in the city, I’m very conscious of the army of “born and raised” New Yorkers lurking in the shadows, waiting for me to get involved in some sort of conversation about New York, and just as it sounds like I might know what I’m talking about, these people get right in my face, “I’m born and raised in Brooklyn Heights. What part of New York are you from?” So yeah, I don’t even say I’m from New York anymore, I just say I’m from Long Island, to everybody I meet, chances are they haven’t even asked, because the minute I let my guard down and let a New York slip out, somebody shows up to out-New York me, “Sorry, Long Island doesn’t count as New York. You’re not from New York. I’m from New York. I just had Gray’s Papaya for breakfast.” Anyway, I got to work on this city quiz, started answering multiple choice questions, asking me about my favorite snacks, what color socks I’d prefer to wear on a rainy Tuesday, I thought, I wonder where they’ll place me, Boston? Hawaii? New York? Nope, it was Albuquerque, New Mexico. Really? “Yes, really,” it read in the little description afterward, “While you’ve definitely got a pretty serious mean streak, it’s not near-sociopathic enough to warrant a move to, say, an isolated homestead somewhere in the middle of Nebraska. You’ve never tried crystal meth, but you haven’t ruled it out completely. And you just love enchiladas, which is great, because Albuquerque has some of the best Tex-Mex food in the country!” I don’t know exactly how they got the Tex-Mex answer. If I remember correctly, the question was something like, “If you had to eat one meal for the rest of your life, what would it be?” And I looked at the selection of answers, nothing really spoke to me, it just seemed like nine food items placed on the screen at random, gummy bears, ramen instant noodles, steak. I don’t remember anything about enchiladas. But I guess it must have been a really complicated quiz, all sorts of advanced algorithms and sophisticated programming, because who am I to doubt the power of the Internet? Some girl I went to college with posted that she should really be living in Barcelona. It was hard to judge her total reaction, but based on the, “OMG I knew it!” that she wrote on top of the results, it seems like these quizzes are working for other people. I took another popular quiz, “What Age Are You, Really?” which, by piecing together character traits and behavioral patterns as deduced through yet another series of ultra-specific multiple choice questions, tells you what your real age is. Like, not your real, real age, but the age which you are really. Does that make sense? It didn’t to me at first either, but I saw on Facebook that all of my friends were really twenty-four, very adventurous, super carefree and full of life, even though everyone I know is either almost thirty or already thirty. “You’re real age is …” I couldn’t wait to have the Internet confirm for me what I already knew, that I’m still as cool as I was in my early twenties, that even though I’m still young, I’m actually a lot younger, “three.” Three? I mean, I knew that I was youthful for my age, but this is pretty youthful. Do I really act like a three year old? “You’re not afraid to take a knife and stick it right into a wall outlet, even though your fingers and hands are covered in electric burns, this time it’s going to be different, this time you’re going to find out exactly what’s on the other side of that socket. You’ve never outgrown your love of finger painting, and … what’s that smell? Is mom heating up some chicken nuggets for lunch? Mom’s making chicken nuggets for lunch! Yes! Extra ketchup please! No, I don’t want to wear a bib! Come on mom, I’m three years old, I can do whatever I want!” This one was hit me a little hard, was BuzzFeed trying to tell me about some developmental disorder? Am I really this much of a handful to my friends and family? To my wife? I mean, doesn’t everybody miss the toilet seat once in a while? Those things are hard, man, and I’m so tall, it’s so far away. Why does that automatically make me a three year old? But if BuzzFeed says so, then I guess I’ve got a lot of growing up to do. Which is nice, if you think about it, everybody else my age is busy worrying about unfinished dreams and graying temples, I can get back to basics, finally tackle those motor skills and basic social pleasantries. Because, yeah, I suppose it wasn’t really that nice when I grabbed that sandwich out of my coworker’s hand as he was about to take a bite. Even though I wanted it. That was his sandwich, and that was a really immature thing for me to do, to lick the whole thing so he wouldn’t try to get it back, and then to not even eat all of it, just the turkey really, I guess that wasn’t really grown-up of me. And there are so many more quizzes, so much left to learn about myself. Thanks BuzzFeed, keep making quizzes, I’ll keep taking them, and I’ll continue to post the results on Facebook.
Q: link from HTML href to native app right now I'm creating a custom tweet button for user to click it and automatically call twitter web intent to share/tweet some link. the method I'm using now is creating an anchor with href to https://twitter.com/share?url=[some url to share] because I will use this on mobile site, is it possible to create similar href or similar link that will instead open the native app to tweet rather than opening a new tab from the browser that will open twitter website? (My goal is to make the native feeling of the tweet button from my mobile site) any help appreciated, thanks! A: Look into iOS URL Schemes for twitter. The twitter scheme, for example, can be invoked with twitter://user?screen_name=lorenb. See this page for example, for more info. This site attempts a more comprehensive list of iOS URL Schemes: http://wiki.akosma.com/IPhone_URL_Schemes#Twitter
Research published in the October Molecular and Cellular Biology moves us closer to developing drugs that could mitigate diabetes. Diabetes afflicts an estimated 26 million Americans, while 79 million have prediabetes. In other words, one in three Americans confronts this disease. Diabetes raises the risk of heart disease and stroke by as much as fourfold, and it is the leading cause of blindness among adults 20-74. It is also the leading cause of kidney failure. In earlier research, four years ago another team of researchers showed that they could boost insulin sensitivity in experimental rodents by giving the animals a drug called myriocin. People with diabetes have a condition called insulin resistance, which renders them poorly able to process sugar. That results in high blood sugar, which damages the blood vessels, leading to many of diabetes’ ills. In their study, that team, led by Johannes M. Aerts of the University of Amsterdam, observed a decrease in a compound called ceramide, which sits on cell membranes in the circulatory system, which they postulated was responsible for the rise in insulin sensitivity. In the new study, Xian-Cheng Jiang of Downstate Medical Center, Brooklyn, NY, and his collaborators set out to confirm this earlier work, using a genetic approach. The new research provides strong evidence that ceramide was not causing insulin sensitivity, but that another membrane-bound compound, sphingomyelin, might be doing so. Ceramide is the substrate for the last step in a five step cascade that produces sphingomyelin. In that step an enzyme called sphingomyline synthase 2 (SMS2) cleaves ceramide to produce sphingomyelin. The first enzyme in this pathway is called serine palmitoyltransferase (SPT). To test the hypothesis that ceramide is involved in modulating insulin resistance the researchers used knockout mice for each of these enzymes. They postulated that (partially) knocking out the first enzyme in the cascade would decrease ceramide levels while knocking out the last enzyme in the sphingomyelin pathway would boost ceramide levels, since that enzyme uses ceramide to produce sphingomyelin. Thus, SPT knockout mice would have greater insulin sensitivity, while SMS knockout mice would have reduced insulin sensitivity. Surprisingly, while ceramide levels changed as predicted, that change did not influence insulin sensitivity, which was higher in both groups. The research has important implications for drug development for mitigating diabetes. Myriocin proved highly toxic and major efforts to modify the drug to reduce that toxicity have been fruitless. Myriocin’s toxicity probably stems from the fact that it inhibits the first step of the sphingomyelin biosynthetic pathway, affecting all the downstream biology, says Jiang. The discovery that knocking out the last step in the biosynthetic pathway improves insulin sensitivity means that drug treatments could target that last enzyme, SMS, leaving the rest of that biosynthetic pathway to function normally.
Q: Control yum update packages sequence Couldn't find an answer anywhere so I will try here. Is there a way to tell yum, while running yum update, to update a specific package as the last one? I am not talking about requires / dependencies, It just needs to be updated after all other packages on the system. In a nutshell, I manage local repositories in my environment and this particular rpm holds the version for each repository, so by updating it as last I can label the client with that particular version. A: You can run two yum commands. First one excluding the .rpm that you don't want to be updated and second, running your usual update. $ yum --exclude="foo*.rpm" update If foo*.rpm comes from a particular repository, then during the update, you can disable it using its name. Name of a repository can be found by looking into /etc/yum.repos.d/*.repo file or using the command $ yum repolist Then disable the repo and update. Note, this will disable update of all packages coming from this repo. $ yum --disablerepo="nameOfRepo" update Finally, run your usual update $ yum update
Dog Training in Columbia, Maryland This is our most popular program. This program is designed to teach owners and train dogs; we offer dog training solutions for nearly any dog training goal. Types of training include: basic dog obedience and manners, dogs with severe behavioral or aggressive issues… The possibilities for you and your dog are limitless. Private lesson dog training can be conducted in your home, at our facility, or at various public locations based on your needs. Each dog training session gives you one-on-one attention with an expert trainer, who will craft each lesson to meet your individual goals. Our Puppy Training Lessons can be conducted in your home, or at our dog training facility. We offer the option to schedule your first lesson before you bring your puppy home to ensure that you are prepared and your home is safe for your new puppy. Installation, training, and repair for wired in-ground type dog fences. Our experience training dogs with remote collars enabled us to think outside of the box. Together we’ll quickly create a safe environment around your home that gives you peace of mind, and gives your dog the freedom to run and live happy. We love seeing the dogs that we train return to our Board and Train program! For years our clients have been scheduling return visits when they go on vacation. Our clients say they know their dogs will be loved and cared for properly, and they get to brush up and even advance their training. Q: What is the best thing that you can do for your dog? A: Learn how to communicate with them, and see the world with their eyes.
[ { "cmd": [ "echo", "hello world" ], "env": { "GOCACHE": "[START_DIR]/cache/go_cache", "GOPATH": "[START_DIR]/cache/gopath", "GOROOT": "[START_DIR]/go/go", "PATH": "[START_DIR]/go/go/bin:[START_DIR]/cache/gopath/bin:<PATH>" }, "name": "hello" }, { "name": "$result" } ]
Synthesis of polyribonucleotide chains from the 3'-hydroxyl terminus of oligodeoxynucleotides by Escherichia coli primase. Escherichia coli primase synthesizes RNA primers on DNA templates for the initiation of DNA replication. The sole known activity of primase is to catalyze synthesis of short RNA chains de novo. We now report a novel activity of primase, namely that it can synthesize RNA from the 3'-hydroxyl terminus of a pre-existing oligodeoxynucleotide. The oligonucleotide-primed synthesis of RNA by primase occurs in both of the G4oric-specific priming system and the dnaB protein associated general priming system. This priming reaction of primase is verified by a number of biochemical methods, including inhibition by modified 3'-phosphate of oligonucleotides and deoxyribonuclease I and ribonuclease H cleavages. We also show that the primed RNA is an effective primer for the synthesis of DNA chain by E. coli DNA polymerase III holoenzyme. The significance of this finding to primases generating multimeric length RNA is discussed.
Lung transplantation in children. Specific aspects. Lung transplantation has become in recent years a therapeutic option for infantswith terminal lung disease with similar results to transplantation in adults.In Spain, since 1996 114 children lung transplants have been performed; this corresponds to3.9% of the total transplant number.The most common indication in children is cystic fibrosis, which represents between 70-80% of the transplants performed in adolescents. In infants common indications areinterstitial lung disease and pulmonary hypertension.In most children a sequential double lung transplant is performed, generally with the help ofextracorporeal circulation. Lung transplantation in children presents special challenges in monitoring and follow-up, especially in infants, given the difficulty in assessing lung function and performing transbronchial biopsies.There are some more specific complications in children like postransplant lymphoproliferative syndrome or a greater severity of respiratory virus infections .After lung transplantation children usually experiment a very important improvement in their quality of life. Eighty eight per cent of children have no limitations in their activity after 3 years of transplantation.According to the registry of the International Society for Heart & Lung Transplantation (ISHLT) survival at 5 years of transplantation is 54% and at 10 years is around 35%.
--- abstract: 'We calculate the spatial correlation of electrons and positrons emitted by internal pair conversion of Coulomb excited nuclei in heavy ion collisions. The alignment or polarization of the nucleus results in an anisotropic emission of the electron-positron pairs which is closely related to the anisotropic emission of $\gamma$-rays. However, the angular correlation in the case of internal pair conversion exhibits diverse patterns. This might be relevant when investigating atomic processes in heavy-ion collisions performed at the Coulomb barrier.' author: - | C. R. Hofmann[^1], G. Soff\ [*Institut für Theoretische Physik, TU Dresden*]{}\ [*D-01062 Dresden*]{}\ J. Reinhardt[^2],  W. Greiner\ [*Institut für Theoretische Physik, J. W. Goethe Universität*]{}\ [*D-60054 Frankfurt am Main*]{} title: Angular Correlations in Internal Pair Conversion of Aligned Heavy Nuclei --- Introduction ============ Heavy-ion collisions at energies in the vicinity of the nuclear Coulomb barrier lead to an alignment of the colliding nuclei. This implies that the magnetic substates are no longer equally populated. To describe deexcitation processes following heavy-ion collisions such as $\gamma$-ray emission or internal conversion, we have to account for this specific population by weighting the transition matrix elements with the occupation probability of, rather than just averaging over the decaying substates. The population of the various nuclear substates is incorporated in the formalism by introducing the density matrix of the excited quantum system or, in the case of rotational symmetry of the problem, by a set of statistical tensors which obey the same transformation law as the spherical harmonics. This concept enables us to treat the polarization or alignment of excited nuclei appropriately. First calculations of the angular correlation of electrons and positrons emitted in internal pair conversion taking into account the alignment of nuclei were accomplished by Goldring, Rose and Warburton [@goldring; @rose:63; @warburton]. These calculations were performed within Born approximation, neglecting the influence of the nuclear charge on the outgoing electron and positron. But for internal pair conversion (IPC) of highly charged nuclei the Born approximation is not justified as can be verified by the corresponding positron spectra [@schlueter:78; @schlueter:81; @soff:81]. Therefore we reconsider in the following the internal pair conversion of heavy nuclei which are aligned, e.g., by Coulomb excitation or transfer reactions. We determine the angular correlation of the emitted electron and positron with respect to a reference axis in space. As already known for the angular correlation of $\gamma$ rays, the problem will be simplified if we choose a coordinate system in which the density matrix is diagonal. The statistical tensors depend as well on the choice of the coordinate system. If the entries of the statistical tensors are given in a specific coordinate system, we are able to calculate the angular correlation with respect to the $z$ axis of this system. The occupation probabilities of the magnetic substates caused by Coulomb excitation can be calculated with, e.g., the COULEX code of K. Alder and A. Winther [@alder:winther:1]. However, one should take into account the change of population by electromagnetic transitions from higher lying states. Special attention should be paid to a proper choice of the coordinate system when dealing with the COULEX code [@alder:winther:1; @alder:winther:2]. For pure Coulomb excitation we will assume the $z$ axis to point along the asymptotic target recoil axis. With respect to this axis the excited nuclei may exhibit prolate or oblate alignment. Density matrix and statistical tensors ====================================== The density matrix – and for spherical symmetry the set of statistical tensors – is the appropriate tool for including statistical properties such as occupation probabilities of quantum mechanical states into the calculations. Here we briefly summarize the essential properties of the density matrix and subsequently turn to the concept of the statistical tensors, which obey the same transformation law as irreducible tensors. For the density matrix $\rho_{M_i M'_i}(J_i)$ of dimension $(2J_i+1)\times(2J_i+1)$ we note: 1. The density matrix is hermitian: $$\rho^{*}_{M'_i M_i}( J_i ) = \rho_{M_i M'_i}( J_i ) \quad ,$$ 2. The trace of the density matrix equals one: $${{\rm Tr} \{ \rho \} } = 1 \Leftrightarrow \sum\limits_{M_i} \rho_{M_i M_i}( J_i ) = 1 \quad ,$$ 3. ${\rm Tr} \{ \rho^2 \} \leq 1 \quad,\quad \mbox{and} \quad {\rm Tr} \{ \rho^2 \} = 1 \Leftrightarrow \mbox{the system is in a pure state.}$ We define the statistical tensors $\hat\rho^{[n]}_{\nu}$ as irreducible tensors of rank $n$ with $\nu=-n,\ldots,n$: $$\hat\rho^{[n]}_{\nu}(J_i) = \sum_{M_i,M'_i} (-1)^{J_i-M_i'} \sqrt{2n+1} \left( \begin{array}{ccc} J_i & J_i & n \\ M_i & M'_i & -\nu \end{array}\right) \rho_{M_i M'_i}( J_i ) \quad . \label{dichtetensor-hin}$$ The argument $J_i$ reminds us that $n$ is related to the angular momentum of the magnetic substates by $0 \leq n \leq 2J_i$. From the normalization of the density matrix it follows $\hat\rho^{[0]}_{0}(J_i) = 1/\sqrt{2J_i+1}$. The density matrix has $(2J_i+1)^2$ independent components. To describe a system by statistical tensors instead of the density matrix, we need $2J_i+1$ density tensors of rank $n=0$ up to rank $n=2J_i$. Since the density tensor of rank $n$ has $2n+1$ components we get again $\sum_{n=0}^{2J_i}\left(\sum_{\nu=-n}^{n} 1 \right) = (2J_i+1)^2$ independent components. The statistical tensors transform under rotations according to $$\hat\rho^{[n]}_{\nu}(J_i) = \sum\limits_{\nu'} {\cal D}^{[n]*}_{\nu' \nu}( \vec\alpha ) \, \hat\rho^{[n]}_{\nu'}(J_i)$$ where the Wigner rotation matrix of rank $n$ is denoted by ${\cal D}^{[n]}$ and the set of Euler angles by $\vec\alpha$. In defining the Euler angles we follow Rose [@rose:57] and Eisenberg&Greiner [@eisenberg:greiner:1]. For systems with rotational symmetry it is thus more advantageous to employ the concept of the statistical tensors when incorporating statistical statements concerning the system. The components of the statistical tensors are changed under rotations and so are the occupation numbers of the magnetic substates. From the set of $2J_i+1$ statistical tensors we obtain the density matrix by utilizing the relation: $$\rho_{M_i M_i'}( J_i ) = (-1)^{J_i-M'_i} \sum\limits_{n,\nu} \sqrt{2n+1} \left(\begin{array}{ccc} J_i & J_i & n \\ M_i' & -M_i & -\nu \end{array}\right) \hat\rho^{[n]}_{\nu}(J_i) \label{dichtetensor-rueck} \quad .$$ For certain symmetries of the system we can reduce the independent components of the statistical tensors. Here we list the consequences for the statistical tensors in three special cases which will become relevant for us: 1. In the case of [*axial symmetry*]{} the density matrix is diagonal, its diagonal components are just the probabilities for the occupation of the corresponding magnetic substates $\rho_{M_i M_i} = p_{M_i}$: $$\hat\rho^{[n]}_{\nu}(J_i) = \delta_{0\nu}\sum\limits_{M_i} (-1)^{J_i-M_i} p_{M_i} \left(\begin{array}{ccc} J_i & J_i & n \\ M_i & -M_i & 0 \end{array}\right) \quad .$$ One can always choose a basis such that the density matrix is diagonal, but in general this will not be a basis of wave functions with good angular momentum. 2. In the case of [*spherical symmetry*]{}, there is no direction singled out in space. The density matrix is proportional to the identity matrix. The diagonal elements are given by $\rho_{M_i M_i} = 1/(2J_i+1)$. All statistical tensors vanish with exception of the tensor of rank $0$, i.e., $$\hat\rho^{[n]}_{\nu}(J_i) = \delta_{0n}\,\delta_{0\nu} \frac{1}{\sqrt{2J_i+1}} \quad.$$ 3. From Eq. (\[dichtetensor-hin\]) it can be shown that for alignment of the nuclear states, defined by $ p_{M_i} = p_{-M_i} $, the statistical tensors of odd rank vanish. Angular correlation of $\gamma$-rays ==================================== Before we enter into the calculations concerning the angular correlation in internal pair conversion we summarize some results already known for in-beam $\gamma$-ray spectroscopy. This will help us to interpret the angular correlation pattern in the case of internal pair conversion. The angular correlation of photons emitted after Coulomb excitation is essentially determined by the statistical tensors, i.e., by the occupation numbers of the magnetic substates of the decaying nucleus. In choosing a reference axis for which the density matrix is diagonal, just the 0th components of all statistical tensors survive and we obtain for the transition probability the well-known relations: $$\frac{{\rm d}P_\gamma}{{\rm d}\Omega} = \frac{2\alpha\omega}{\sqrt{2J_i+1}} \left| V_\gamma^{(\tau)}(L) \right|^2 \sum\limits_{I\ {\rm even}} F_I( L \, L \, J_f \, J_i ) \; \hat\rho^{[I]}_{0}(J_i) \, P_I(\cos\vartheta) \quad ,$$ for a transition of parity $\tau={\rm E/M}$ and multipolarity $L$. $V_\gamma^{(\tau)}(L)$ denotes the corresponding reduced matrix element for the nuclear transition. Here we employed the correlation coefficients [@biedenharn; @schwalm; @wollersheim] $$\begin{aligned} F_I( L \, L \, J_f \, J_i ) & = & (-)^{J_f+J_i -1} \, \sqrt{2I+1} \, \sqrt{ 2J_i+1} \nonumber \\ & \times & (2L+1) \left(\begin{array}{ccc} L & L & I \\ 1 & -1 & 0 \end{array}\right) \left\{\begin{array}{ccc} L & L & I \\ J_i & J_i & J_f \end{array}\right\} \label{ph-emission-20} \; .\end{aligned}$$ This results in an anisotropic emission of photons with respect to the alignment axis. The number of minima of the angular distribution corresponds to the multipolarity of the nuclear transition. In the case of spherical symmetry, the photon emission is isotropic $$\frac{{\rm d}P_\gamma}{{\rm d}\Omega} = \frac{2\alpha\omega}{2J_i+1} \, \left| V_\gamma^{(\tau)}(L)\right|^2$$ or integrated over the solid angle $\Omega$: $$P_\gamma = \frac{8\pi\alpha\omega}{2J_i+1} \, \left| V_\gamma^{(\tau)}(L)\right|^2 \quad . \label{photon}$$ Transition probabilities for internal pair conversion ===================================================== We turn now to the formulation of the triple correlation of the electron and positron direction with reference to a symmetry axis, which is taken as quantization axis. For a statistical ensemble of nuclei we write the transition probability for internal pair conversion, $$\begin{aligned} P_{e^{+}e^{-}} & = & 2\pi \sum\limits_{M_i , M_i' , M_f , \lambda , \lambda'} \int {\rm d}^{3}p \int {\rm d}^{3}p' \, \delta(\omega - W' - W) \nonumber \\ & & \times U_{\rm pl}\; \rho_{M_i M_i'} \; U^{*}_{\rm pl} \quad . \label{p}\end{aligned}$$ where the density matrix $\rho_{M_i M'_i}$ represents the occupation of the magnetic substates $|J_i M_i\rangle$. Here we assumed a nuclear transition from a initial state $|J_i M_i\rangle$ to the final state $|J_f M_f\rangle$ where the initial state is populated according to the density matrix $\rho_{M_i M'_i}$. Since we do not require the density matrix to be diagonal the summation extends over both, $M_i$ and $M'_i$. The $\delta$ function ensures energy conservation: The transition energy $\omega$ is transfered to the electron (total energy $W'$) and to the positron (total energy $W$). The summation is taken over the spins and the momenta of the outgoing leptons. The matrix element for internal pair conversion is written in lowest order of $\alpha$ in the retarded form: $$U_{{\rm pl}} = -\alpha\int {\rm d} V_{\rm n} \int {\rm d} V_{\rm e} \left( \rho_{\rm n}(\vec r_{\rm n}) \, \rho_{\rm e}(\vec r_{\rm e}) -\vec j_{\rm n}(\vec r_{\rm n}) \cdot \vec j_{\rm e}(\vec r_{\rm e}) \right) \, \frac{e^{{{\rm i}}\omega| \vec r_{\rm n} - \vec r_{\rm e} |}} {\left| \vec r_{\rm n} - \vec r_{\rm e}\right|} \quad, \label{u}$$ $\vec r_{\rm e}$ being the electronic coordinate, $\vec r_{\rm n}$ the nuclear coordinate. Since we neglect in our work the penetration of the electron wave functions we do not have to specify the nuclear transition charge and current densities $\rho_{\rm n}$ and $\vec j_{\rm n}$. The electronic transition charge and current densities read $$\rho_{\rm e} = \psi_{\rm f}^\dagger \, \psi_{\rm i} \quad , \qquad \vec j_{\rm e} = \psi_{\rm f}^\dagger \,\vec\alpha\, \psi_{\rm i}$$ ($\vec\alpha$ is the 3-vector of the spatial Dirac matrices in the standard representation). These expressions are evaluated utilizing the scattering solutions, see Eqs. (\[eswelle\],\[pswelle\]) in the appendix, for the electron and positron wave function in order to define the emission direction and thus an opening angle. Inserting the spherical wave expansion of these wave functions results in a decomposition of the matrix element, Eq. (\[u\]), $$\begin{aligned} U_{\rm pl} = \sum\limits_{\kappa' , \mu'} \sum\limits_{\kappa , \mu} a^{(-) *}_{\kappa' \mu'} \; b^{(+)}_{\kappa \mu} \; U_{\kappa'\mu' \kappa\mu} \quad .\end{aligned}$$ $U_{ \kappa'\mu' \kappa\mu }$ denotes the transition matrix element which has the same structure as $U_{\rm pl}$, but is evaluated using the spherical spinor solutions of the Dirac equation, Eqs. (\[ewelle\]). This matrix element was calculated in [@schlueter:81]. Here we cite the result: $$\begin{aligned} U_{ \kappa'\mu' \kappa\mu } & = & 4\pi{{\rm i}}\alpha\omega \, (-1)^{J_f-M_f} \left(\begin{array}{ccc} J_f & L & J_i \\ -M_f & M & M_i \end{array}\right) V_{\gamma}^{(\tau)}(L) \nonumber \\ & & \times (-1)^{j'-\mu'} \left(\begin{array}{ccc} j' & L & j \\ -\mu' & M & \mu \end{array}\right) M_{\kappa' \kappa}^{(\tau)}(L) \quad . \label{usph}\end{aligned}$$ $V_{\gamma}^{(\tau)}(L)$ is just the reduced nuclear matrix element of Eq. (\[photon\]) and $$\begin{aligned} M^{(\tau)}_{\kappa' \kappa}(L) & = & -{{\rm i}}\, (-1)^{j'+\frac{1}{2}} \, \frac{\sqrt{2j+1}\,\sqrt{2j'+1}\,\sqrt{2L+1}}{4\pi\sqrt{L(L+1)}} \nonumber\\ & & \times \left(\begin{array}{ccc} j & j' & L \\ -1/2 & 1/2 & 0 \end{array}\right) R^{(\tau)}_{\kappa' \kappa} \label{ematrix}\end{aligned}$$ with the parity selection rule $$l + l' + L + \lambda(\tau) = 0 \ \mbox{mod}\ 2 \quad, \quad \left\{ \begin{array}{ccl} \lambda=0 & \mbox{for} & \tau = {\rm el} \\ \lambda=1 & \mbox{for} & \tau = {\rm magn} \end{array}\right.$$ $R^{(\tau)}_{\kappa' \kappa}$ contains the integration over the radial electron wave functions and will be defined later. Inserting this matrix element into the pair conversion probability, Eq. ([\[p\]]{}), yields $$\begin{aligned} P_{e^{+}e^{-}} & = & 2\pi \sum\limits_{M_i , M_i' , M_f} \rho^{[J_i]}_{M_i M_i'} \sum\limits_{\lambda , \lambda'} \int{\rm d} W\,{\rm d}\Omega \, \int{\rm d} W'\,{\rm d}\Omega \, \delta(\omega - W' - W) \nonumber \\ & & \times \sum\limits_{\kappa' , \mu'} \sum\limits_{\kappa , \mu} \sum\limits_{\bar\kappa' , \bar\mu'} \sum\limits_{\bar\kappa , \bar\mu} A_{\kappa' \mu' ; \bar\kappa' \bar\mu'} \, B_{\kappa \mu ; \bar\kappa \bar\mu } \, U_{\kappa' \mu' \kappa \mu } \, U^{*}_{\bar\kappa' \bar\mu' \bar\kappa \bar\mu } \quad . \label{Pep}\end{aligned}$$ where we abbreviated $$A_{\kappa' \mu' ; \bar\kappa' \bar\mu'} = W'\,p'\sum\limits_{\lambda'} a^{(-) *}_{\kappa' \mu'} \, a^{(-)}_{\bar\kappa' \bar\mu'} \label{A}$$ and $$B_{ \kappa \mu ; \bar\kappa \bar\mu } = W\,p\sum\limits_{\lambda} b^{(+)}_{\kappa \mu} \, b^{(+) *}_{\bar\kappa \bar\mu} \quad . \label{B}$$ From Eq. (\[Pep\]) we obtain the differential pair conversion probability with respect to the [*kinetic positron energy*]{} $E = W - m$ and the solid angles of both electron, $\Omega'$, and positron, $\Omega$, $$P_{e^+e^-} = \int\limits_0^{\omega-2m} {\rm d}E \int{\rm d}\Omega \int{\rm d}\Omega' \, \frac{{\rm d}^3 P_{e^+ e^-}}{{\rm d}E \, {\rm d}\Omega \, {\rm d}\Omega'} \quad . \label{int}$$ The integration over the electron energy $W'$ is trivially performed because of the $\delta$ function. From this relation it is obvious that we may proceed from the solid angles $\Omega$ to $\tilde\Omega$ by choosing another reference axis in space. The integrand in Eq. (\[int\]) is invariant under rotations since the Jacobian of this transformation equals 1. The integrand should thus be represented by a series of triple correlation functions which are defined in Eq. (\[tripelkorrelationsfunktion\]). Inserting the explicit expressions of the coefficients $A$ and $B$, Eqs. (\[koeff-a\],\[koeff-b\]) leads to the following expression for the differential pair conversion probability $$\begin{aligned} \lefteqn{ \frac{{\rm d}^3 P_{e^+ e^-}}{{\rm d}E\,{\rm d}\Omega\,{\rm d}\Omega'} = 8(\pi\alpha\omega)^2 \, |V_\gamma^{(\tau)}(L)|^2 \sum\limits_{M , \bar M} \sum\limits_{M_i , M_i'} \sum\limits_{M_f} \rho^{[J_i]}_{M_i M_i'} } \nonumber \\ & & \times \left(\begin{array}{ccc} J_f & L & J_i \\ -M_f & M & M_i \end{array}\right) \left(\begin{array}{ccc} J_f & L & J_i \\ -M_f & \bar M & M_i' \end{array}\right) \nonumber \\ & & \times \sum\limits_{\kappa , \kappa' , \bar\kappa , \bar\kappa'} (-1)^{j'+\bar j'} \, M^{(\tau)}_{\kappa' \kappa}(L) \, M^{(\tau) *}_{\bar\kappa' \bar\kappa}(L) \sqrt{2\bar j'+1} \, \sqrt{2j'+1} \nonumber \\ & & \times \sqrt{2j+1} \, \sqrt{2\bar j+1} \, \nonumber \\ & & \times \exp({{\rm i}}[(\delta'(W',\kappa')-\bar\delta'(W',\bar\kappa') +\delta(-W,\kappa)-\bar\delta(-W,\bar\kappa)]) \nonumber \\ & & \times \sum\limits_{I' , I , \alpha , \alpha'} \sqrt{2I'+1} \, \sqrt{2I+1} \, Y_{I'\alpha'}(\Omega_{p'}) \, Y_{I\alpha}(\Omega_{p}) \nonumber \\ & & \times \left(\begin{array}{ccc} j' & \bar j' & I' \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} j & \bar j & I \\ 1/2 & -1/2 & 0 \end{array}\right) \nonumber \\ & & \times \sum\limits_{\mu , \mu' , \bar\mu , \bar\mu'} (-1)^{\bar\mu-\bar\mu'+1} \left(\begin{array}{ccc} \bar j' & L & \bar j \\ -\bar\mu' & \bar M & \bar\mu \end{array}\right) \nonumber \\ & & \times \left(\begin{array}{ccc} j' & L & j \\ -\mu' & M & \mu \end{array}\right) \left(\begin{array}{ccc} \bar j' & j' & I' \\ -\bar\mu' & \mu' & -\alpha' \end{array}\right) \left(\begin{array}{ccc} \bar j & j & I \\ -\bar\mu & \mu & \alpha \end{array}\right) \quad .\end{aligned}$$ Here we inserted Eq. (\[usph\]). Introducing the statistical tensors we are left with $$\begin{aligned} \frac{{\rm d}^3 P_{e^+ e^-}}{{\rm d}E\,{\rm d}\Omega\,{\rm d}\Omega'} & = & 2(4\pi\alpha\omega)^2 \, |V_\gamma^{(\tau)}(L)|^2 \, (-1)^{J_f-J_i+L+1} \nonumber \\ & & \times \sum\limits_{n , \nu} \sqrt{2n+1} (-1)^{\nu} \hat\rho^{[n]}_{\nu}(J_i) \left\{\begin{array}{ccc} L & L & n \\ J_i & J_i & J_f \end{array}\right\} \nonumber \\ & & \times \sum\limits_{I , I'} \sqrt{2I+1} \, \sqrt{2I'+1} \, (-1)^{I'} \, \nonumber \\ & & \times \sum\limits_{\alpha , \alpha'} Y_{I'\alpha'}(\Omega_{p'}) \, Y_{I\alpha}(\Omega_{p}) \left(\begin{array}{ccc} I & I' & n \\ \alpha & \alpha' & -\nu \end{array}\right) \nonumber \\ & & \times \sum\limits_{\kappa , \kappa' , \bar\kappa , \bar\kappa'} (-1)^{\bar j+\bar j'} \, \sqrt{|\kappa \, \kappa' \, \bar\kappa \, \bar\kappa'|} \left\{\begin{array}{ccc} \bar j & \bar j' & L \\ j & j' & L \\ I & I' & n \end{array}\right\} M^{(\tau)}_{\kappa' \kappa}(L) \, M^{(\tau) *}_{\bar\kappa' \bar\kappa}(L) \nonumber \\ & & \times \exp({{\rm i}}[\delta'(E',\kappa')-\bar\delta'(E',\bar\kappa')+ \delta(-E,\kappa)-\bar\delta(-E,\bar\kappa)]) \nonumber \\ & & \times \left(\begin{array}{ccc} j' & \bar j' & I' \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} j & \bar j & I \\ 1/2 & -1/2 & 0 \end{array}\right) \quad.\end{aligned}$$ This is the most general form for the pair conversion probability. Now we assume that we are dealing with internal pair conversion of aligned nuclei ($\nu=0$). We may choose an appropriate coordinate system by transformation of the spherical harmonics: $$\begin{aligned} Y_{I\alpha}(\Omega_{p}) & = & \sum\limits_{\beta} \exp({{\rm i}}\alpha\phi) \, d^{[I]}_{\alpha\beta}(\vartheta) \, \exp({{\rm i}}\beta\delta) \, Y_{I\beta}( 0, 0 ) \nonumber\\ & = & \sqrt{\frac{2I+1}{4\pi}} \, \exp({{\rm i}}\alpha\phi) \, d^{[I]}_{\alpha 0}(\vartheta) \nonumber \\ Y_{I'\,-\alpha}(\Omega_{p'}) & = & \sum\limits_{\beta'} \exp(-{{\rm i}}\alpha\phi) \, d^{[I']}_{-\alpha\beta'}(\vartheta) \, \exp({{\rm i}}\beta'\delta) \, Y_{I'\beta'}(\Theta, 0)\end{aligned}$$ Here $\Theta$ denotes the opening angle of the electron-positron pair, $\vartheta$ is the polar angle of the positron with respect to the symmetry axis, and the dihedral angle $\delta$ indicates the rotation of the electron-positron plane around the positron axis (Fig. 2b). Please note, that the convention of [@goldring; @rose:63; @warburton] differs in the definition of the angles from the one employed here. This enables us to define the triple correlation function by $$\begin{aligned} \lefteqn{P_{II'n}(\vartheta,\Theta,\delta) = \sum\limits_{\alpha} \left(\begin{array}{ccc} I & I' & n \\ \alpha & -\alpha & 0 \end{array}\right) Y_{I\alpha}(\Omega_{p}) \, Y_{I'\,-\alpha'}(\Omega_{p'}) } \nonumber \\ & = & \frac{\sqrt{2I+1} \, \sqrt{2I'+1}}{4\pi} \sum\limits_{\beta'} (-1)^{\beta'} \left(\begin{array}{ccc} I & I' & n \\ 0 & \beta & \beta' \end{array}\right) d^{[n]}_{\beta' 0}(\vartheta) \, d^{[I']}_{\beta' 0}(\Theta) \, \exp({{\rm i}}\beta'\delta) \quad . \nonumber \\ & & \label{tripelkorrelationsfunktion}\end{aligned}$$ Our triple correlation function is related to the one introduced by Biedenharn [@biedenharn] by a factor $4\pi{{\rm i}}^{-I-I'-n}/((2I+1)(2I'+1))^{1/2}$. The pair conversion probability is normalized by the probability for $\gamma$ emission, Eq. (\[photon\]), which yields the pair conversion coefficient: $$\begin{aligned} \lefteqn{ \frac{{\rm d}^4 \beta}{{\rm d}E\,{\rm d}\cos\Theta\,{\rm d}\cos\vartheta \,{\rm d}\delta} = \frac{2\alpha\omega (2L+1)}{L(L+1)} \, (2J_i+1) \, (-1)^{J_f-J_i+L+1} } \nonumber \\ & & \times \sum\limits_{n} \sqrt{2n+1} \, \hat\rho^{[n]}_{0}(J_i) \, \left\{\begin{array}{ccc} L & L & n \\ J_i & J_i & J_f \end{array}\right\} \nonumber \\ & & \times \sum\limits_{I , I'} (2I+1) (2I'+1) (-1)^{I'} \nonumber \\ & & \times \sum\limits_{\beta'} (-1)^{\beta'} \left(\begin{array}{ccc} I & I' & n \\ 0 & \beta' & -\beta' \end{array}\right) d^{[n]}_{\beta' 0}(\vartheta) \, d^{[I']}{\beta' 0}(\Theta) \, \exp({{\rm i}}\beta'\delta) \nonumber \\ & & \times \sum\limits_{\kappa , \kappa' , \bar\kappa , \bar\kappa'} (-1)^{j+\bar j'} |\kappa \, \kappa' \, \bar\kappa \, \bar\kappa'| \left\{\begin{array}{ccc} \bar j & \bar j' & L \\ j & j' & L \\ I & I' & n \end{array}\right\} R^{(\tau)}_{\kappa' \kappa}(L) \, R^{(\tau) *}_{\bar\kappa'\bar\kappa}(L) \nonumber \\ & & \times \exp({{\rm i}}[\delta'(W',\kappa')-\bar\delta'(W',\bar\kappa')+ \delta(-W,\kappa)-\bar\delta(-W,\bar\kappa)]) \, \nonumber \\ & & \times \left(\begin{array}{ccc} j' & \bar j' & I' \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} j & \bar j & I \\ 1/2 & -1/2 & 0 \end{array}\right) \nonumber \\ & & \times \left(\begin{array}{ccc} j & j' & L \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} \bar j & \bar j' & L \\ 1/2 & -1/2 & 0 \end{array}\right) \quad . \label{ergebnis}\end{aligned}$$ Here we inserted the explicit expressions for the electronic matrix elements, Eq. (\[ematrix\]). Integration over the azimuthal angle is trivially performed resulting in an additional factor of $2\pi$. The radial matrix elements read for electric pair conversion (parity $(-)^{L}$) $$R^{({\rm e})}_{\kappa' \kappa} = L ( R_1 + R_2 + R_3 - R_4 ) + ( \kappa - \kappa' ) ( R_3 + R_4 ) \label{erade}$$ and for magnetic pair conversion (parity $(-)^{L+1}$) $$R^{({\rm m})}_{\kappa' \kappa} = (\kappa + \kappa') ( R_5 + R_6 ) \quad . \label{eradm}$$ The radial integrals introduced in these equations are taken over products of the radial electron wave functions (\[radiale\]) and the Hankel functions of first kind, $h^{(1)}_L(\omega r)$: $$\begin{aligned} R_1 & = & \int\limits_0^\infty {\rm d} r \, r^2 \, g_{W',\kappa'}(r) \, g_{-W,\kappa}(r) \, h^{(1)}_L(\omega r) \quad , \nonumber\\ R_2 & = & \int\limits_0^\infty {\rm d} r \, r^2 \, f_{W',\kappa'}(r) \, f_{-W,\kappa}(r) \, h^{(1)}_L(\omega r) \quad , \nonumber\\ R_3 & = & \int\limits_0^\infty {\rm d} r \, r^2 \, g_{W',\kappa'}(r) \, f_{-W,\kappa}(r) \, h^{(1)}_{L-1}(\omega r) \quad , \nonumber\\ R_4 & = & \int\limits_0^\infty {\rm d} r \, r^2 \, f_{W',\kappa'}(r) \, g_{-W,\kappa}(r) \, h^{(1)}_{L-1}(\omega r) \quad , \nonumber\\ R_5 & = & \int\limits_0^\infty {\rm d} r \, r^2 \, g_{W',\kappa'}(r) \, f_{-W,\kappa}(r) \, h^{(1)}_L(\omega r) \quad , \nonumber\\ R_6 & = & \int\limits_0^\infty {\rm d} r \, r^2 \, f_{W',\kappa'}(r) \, g_{-W,\kappa}(r) \, h^{(1)}_L(\omega r) \label{radialintegrale} \quad.\end{aligned}$$ In the case of a point-like nucleus these integrals can be rewritten in terms of $F_2$ functions [@schlueter:78] which can be evaluated numerically. For the representation of the nucleus as a homogeneously charged sphere the radial integrals are computed using a Gauss-Chebyshev quadrature [@chebyshev]. The Whittaker functions which occur in the expressions for the electron wave functions are computed with the COULCC code of [@barnett]. Since the integrands are oscillating functions it is advantageous to deform the integration contour in the complex plane in such a way that it runs along the imaginary axis [@schlueter:81]. Since the electron wave functions have the asymptotic behaviour $\exp({{\rm i}}p r)$ while the Hankel functions behave like $\exp({{\rm i}}\omega r)$, where $\omega=W+W'$, the integrand for large $r$ assumes the form: $$\exp({{\rm i}}[-p-p'+W+W']r) \quad .$$ For $r$ complex with the imaginary part going to infinity, our procedure thus guarantees that the integrand falls off quite fast. In most cases at $r=20000$ fm the integrand is smaller than $10^{-5}$ of its maximum value. We want to consider the angular correlation for two special cases: I. If we integrate Eq. (\[ergebnis\]) over the positron polar angle $\vartheta$ and the dihedral angle $\delta$ the remaining function depends only on the opening angle $\Theta$ of the electron-positron pair. In this case only the $n=0$ contribution survives. We get the opening angle distribution as a series of Legendre polynomials which was already calculated in [@hofmann:90]: $$\frac{{\rm d}^2\beta}{{\rm d}E\,{\rm d}\cos\Theta} = \sum\limits_{I} a_I \, P_I(\cos\Theta)$$ The expansion coefficients are given by $$\begin{aligned} a_I & = & \frac{8\pi\alpha\omega}{L(L+1)} \, (-)^{L+I+1} (2I+1) \sum\limits_{\kappa,\kappa',\bar\kappa,\bar\kappa'} \left| \kappa\,\kappa'\,\bar\kappa\,\bar\kappa'\right| R^{(\tau)}_{\kappa'\kappa}(L) \, R^{(\tau)*}_{\bar\kappa'\bar\kappa} \nonumber\\ & \times & \exp({{\rm i}}[\delta'(W',\kappa') - \bar\delta'(W',\bar\kappa') +\delta(-W,\kappa) - \bar\delta(-W,\bar\kappa)]) \nonumber\\ & \times & \left(\begin{array}{ccc} j' & \bar j' & I \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} j & \bar j & I \\ 1/2 & -1/2 & 0 \end{array}\right) \nonumber\\ & \times & \left(\begin{array}{ccc} j & j' & L \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} \bar j & \bar j' & L \\ 1/2 & -1/2 & 0 \end{array}\right) \left\{\begin{array}{ccc} \bar j & \bar j' & L \\ j' & j & L \end{array} \right\} \quad .\end{aligned}$$ They have to be evaluated numerically. The same result is achieved if one assumes that the initial nuclear substates are equally populated. At this point we apologize for giving an incorrect expression for the opening angle distribution in [@hofmann:90] which was caused by employing the wrong set of scattering solutions. This error resulted in the wrong sign of the scattering phase shifts of the positron. The opening angle distribution showed the right qualitative behaviour but wrong conversion probabilities. The statement, that the maximum of the distribution shifts from $0^\circ$ to $180^\circ$, if one considers overcritical nuclear charges ($Z\geq 173$), remains unchanged. This error appeared also in the expression for the electric monopole (E0) conversion. One should reverse the sign of the scattering phase shifts of the positron. The pair conversion coefficient for the electric monopole conversion reads: $$\frac{{\rm d}\eta}{{\rm d}E \, {\rm d}\cos\Theta} = \frac{1}{2} \, \frac{{\rm d}\eta}{{\rm d}E} ( 1 + \varepsilon \, \cos\Theta ) \label{maximum}$$ where ${\rm d}\eta / {\rm d}E$ is the differential pair conversion coefficient [@soff:81] —which remains unchanged— and $\varepsilon$ is the corrected anisotropy coefficient: $$\varepsilon = 2 \, \frac{C_{-1}\,C_{+1}}{C_{-1}^2 + C_{+1}^2} \, \cos(\Delta_{+1 \, -1})$$ with $$\Delta_{\kappa\kappa'} = \delta'(W',\kappa)-\delta'(W',\kappa')+ \delta(-W,\kappa)-\delta(-W,\kappa') \quad.$$ $C_{+1}$, $C_{-1}$ are defined by $$C_\kappa = \left\{ \begin{array}{ccc} \displaystyle\lim_{r\to 0} \frac{f_{-W,\kappa}(r) \, f'_{W',\kappa}(r)} {r^{2j-1}} & \mbox{for} & \kappa>0 \\[3mm] \displaystyle\lim_{r\to 0} \frac{g_{-W,\kappa}(r) \, f'_{W',\kappa}(r)} {r^{2j-1}} & \mbox{for} & \kappa<0 \end{array}\right .$$ where $f$ ($f'$) and $g$ ($g'$) are the radial wave functions of the Dirac spinor of the positron (electron). In numerical calculations these constants are evaluated at the nuclear radius. $\delta$ and $\delta'$ are the corresponding Coulomb phase shifts for an extended nucleus [@mueller:rafelski:greiner:3]. II\. If we integrate Eq. (\[ergebnis\]) over the opening angle $\Theta$ of the electron-positron pair and the dihedral angle $\delta$ we end up with $$\frac{{\rm d}^2\beta}{{\rm d}E\,{\rm d}\cos\vartheta} = \sum\limits_n b_n \, P_n(\cos\vartheta)$$ where the coefficients read $$\begin{aligned} b_n & = & 4\pi\alpha\omega \, \frac{(2L+1)(2J_i+1)}{L(L+1)} \, (-)^{J_f - J_i + 1} \sqrt{2n+1} \, \hat\rho^{[n]}_0(J_i) \left\{\begin{array}{ccc} L & L & n \\ J_i & J_i & J_f \end{array}\right\} \nonumber\\ & \times & \sum\limits_{\kappa,\kappa',\bar\kappa} (-)^{j+\bar j + j'+1/2} \left|\kappa\,\kappa'\,\bar\kappa\right| \left\{\begin{array}{ccc} L & L & n \\ j & \bar j & j' \end{array}\right\} R^{(\tau)}_{\kappa'\kappa}(L) \, R^{\tau *}_{\kappa'\bar\kappa}(L) \nonumber\\ & \times & \exp({{\rm i}}[\delta(-W,\kappa) - \bar\delta(-W,\bar\kappa)]) \nonumber\\ & \times & \left(\begin{array}{ccc} j & \bar j & n \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} j & j' & L \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} \bar j & j' & L \\ 1/2 & -1/2 & 0 \end{array}\right) \quad .\end{aligned}$$ This corresponds to the experimental setup where one is just interested in the angular distribution of the positron emitted in internal pair conversion of an aligned or polarized nucleus. Results ======= In the following we will discuss the characteristic properties of IPC angular distributions using a few representative results. Since we are interested in Coulomb effects they all refer to a uranium-like nucleus ($Z=92$). The chosen energies and multipolarities are generic and are not intended to represent particular nuclear transitions known from experiment. The opening angle distribution of electron and positron emitted by IPC depicts for electric transitions the typical pattern: it has its maximum at $\Theta=0^\circ$ and its minimum for $\Theta=180^\circ$. For magnetic transitions in heavy nuclei, however, the situation might be different. Fig. 1a and 1b depict the opening angle distribution for an E1 and a M1 transition of a uranium-like nucleus as a result of our distorted wave Born approximation (DWBA) in comparison with the Born approximation (BA). This demonstrates how the angular correlation of the electron-positron pairs is influenced by the strong Coulomb field of the nucleus. In Fig. 1b we plotted also the opening-angle distribution for the M1 transition taking into account the finite extension of the nucleus under consideration. This verifies that the magnetic transitions —and especially the M1 transition— are very sensitive to the charge distribution of the nucleus [@schlueter:81]. For the E1 transition in Fig. 1a, on the other hand, the effect of the finite nuclear size amounts to less than 0.1%. In the following we discuss the triple angular correlation of electron and positron for IPC of aligned nuclei. We take the symmetry axis as quantization axis as in Eq. (\[ergebnis\]). The opening angle $\Theta$ of electron and positron, the polar angle $\vartheta$ of the positron and the dihedral angle $\delta$ form a complete set of angles to fix the emission directions of electron and positron with respect to the symmetry axis. The angles which describe the directions of the emitted leptons are displayed in Fig. 2b. Note that our choice of the coordinate system is different from that introduced in the Born approximation calculations of [@goldring; @rose:63; @warburton] in which $\vartheta$ denotes the polar angle of the intermediate photon. However, since the Coulomb field disturbs the momentum balance we cannot determine the momentum of the intermediate photon from the momenta of the outgoing leptons, which would be necessary to calculate the photon polar angle. Depending on the experimental setup and reactions various coordinate systems may be established in which the statistical tensors are determined. Here we concentrate on the Coulomb excitation of heavy ions in collisions with beam energies at or below the Coulomb barrier. In this case one usually chooses a coordinate system, where the $z$ axis is pointing along the apex line of the scattering hyperbola towards the projectile and the $x$ axis is perpendicular to the scattering plane (Fig. 2a). The $y$ axis is then chosen such that the $y$ component of the projectile velocity is positive [@alder:winther:1; @alder:winther:2; @broglia]. In the sudden approximation it can be shown that the nuclear states are excited with a population of the magnetic substates reaching a maximum around $M_i=0$, i.e., the nucleus is aligned in the plane perpendicular to the $z$ axis (asymptotic recoil direction of the target) [@wollersheim]. This is called oblate alignment. Taking into account the de-excitation of the nucleus by $\gamma$ cascades starting from high-spin the oblate alignment changes into a prolate alignment with respect to the $z$ axis for the low-spin states. If the collision energy is increased the nuclear alignment changes to a polarization with respect to a reference axis perpendicular to the scattering plane [@alder:winther:2; @broglia]. Classically this corresponds to the situation where the drag caused by surface friction puts the nuclei into a spinning motion. After having chosen a coordinate system and having determined the degree of alignment or polarization for the Coulomb excited nuclei —the corresponding statistical tensors can be calculated with, e.g., the COULEX code of [@alder:winther:1]— one can employ Eq. (\[ergebnis\]) to determine the angular distribution of the electron-positron pairs emitted by internal pair conversion of these nuclei. We plot in Fig. 3 the spatial correlation of the electron-positron pairs with respect to the reference axis assuming oblate alignment of a uranium-like nucleus. From the spectrum of the emitted pairs [@schlueter:81; @schlueter:79] we know that for large-$Z$ nuclei the pair emission probability increases towards the maximum positron energy. Thus the angular correlations are plotted for a case where nearly the full transition energy (minus the electron rest mass) is transferred to the positron. One recognizes a strong dependence of the pair conversion probability on the polar angle of the positron with respect to the reference axis. This behaviour resembles the anisotropic emission of the intermediary photon [@wollersheim]. The angular distribution depends weakly on the dihedral angle $\delta$ of the electron-positron pair (Fig. 4). For transitions between nuclear states of high angular momentum the opening angle distribution does not change drastically when the positron polar angle is varied. In order to elucidate the influence of the statistical tensors, i.e., the occupation of the initial nuclear state on the angular correlation of the emitted electron-positron pairs, we present the angular distribution with respect to the polar angle of the emitted positron. Fig. 5 shows the polar angle distribution assuming E1, E2 and E3 transitions to the $0^+$ ground state of nuclei which exhibit oblate alignment. Fig. 6 displays the polar angle distribution for a E1 transition to the $0^+$ ground state of a nucleus for oblate and prolate alignment and for polarization. Conclusion ========== Angular correlations are very sensitive to the underlying process. They may reveal a plethora of signatures for nuclear transition which allow for an identification of the transition as well as for the study of the properties of excited nuclei. Especially for large-$Z$ nuclei one cannot rely on the validity of the Born approximation which becomes exact in the limit $Z\rightarrow 0$. One rather has to perform the calculations with the relativistic scattering wave functions for both electron and positron. These wave functions take the Coulomb distortion caused by the nuclear charge into account. For magnetic transitions of large-$Z$ nuclei one has also to account for the finite-size effects. Especially M1 transitions are very sensitive on the extension of the nucleus. In order to study magnetic IPC we approximated the nucleus undergoing the transition by a homogeneously charged sphere. The angular correlation of electron-positron pairs with respect to a given axis in space depend on the statistical tensors which reflect the population of the nuclear magnetic substates. The conversion probability changes drastically when either the opening angle of the pair or the polar angle of the positron is varied while the dependence on the dihedral angle is rather weak. Our calculations allow to make quantitative predictions of this behaviour which qualitatively might have been anticipated from the $\gamma$-ray spectroscopy performed in heavy-ion collisions. Furthermore, the measurement of the spatial correlation of electron-positron pairs can be employed to obtain additional information about the nuclear transition. E.g., not only the multipolarity but also the parity of the nuclear transition can be measured in this way.\ [**Acknowledgement:**]{} This work has been supported by the BMBF, by the Deutsche Forschungsgemeinschaft (DFG), by GSI (Darmstadt), and by the REHE programme of the European Science Foundation (ESF). Electron wave functions for point-like and extended nuclei ========================================================== In our calculations we employed the following form of the spherical continuum wave functions of the electron moving in the Coulomb field of a point-like nucleus [@rose:61]: $$\chi_{W, \kappa, \mu}(\vec r\,)=\left(\begin{array}{c} g_{W,\kappa}(r)\,\chi_{\kappa\mu}(\hat r) \\ {{\rm i}}f_{W,\kappa}(r)\,\chi_{-\kappa\mu}(\hat r) \end{array}\right) \quad. \label{ewelle}$$ The spinor spherical harmonics are defined as $$\chi_{\kappa\mu}(\Omega) = \sum\limits_{\kappa , \mu} \left( \begin{array}{cc|c} l & {\frac{1}{2}}& j \\ m & \lambda & \mu \end{array}\right) Y_{\lambda m}(\Omega) \, \chi_{\lambda}$$ where the basis spinors are given as usual by $$\chi_{{\frac{1}{2}}} = \left( \begin{array}{c} 1 \\ 0 \end{array} \right) \quad , \qquad \chi_{-{\frac{1}{2}}} = \left( \begin{array}{c} 0 \\ 1 \end{array} \right) \quad.$$ Defining the relativistic Sommerfeld parameter as $y=-Z\alpha W/p$ where $p=\sqrt{W^2-m^2}$, the radial wave functions read for a point nucleus $$\begin{aligned} g_{W,\kappa}(r) & = & \sqrt{\frac{W+m}{\pi p}} \frac{1}{r} \frac{|\Gamma(\gamma-{{\rm i}}y)|} {2\Gamma(2\gamma+1)}\,e^{-\pi y/2}\,(2pr)^\gamma\nonumber \\ & & \times\left\{(\gamma-{{\rm i}}y)\,e^{-{{\rm i}}(pr-\eta)}\, _1F_1(\gamma+1-{{\rm i}}y, 2\gamma+1; 2{{\rm i}}pr) + {\rm c.c.}\right\} \quad, \nonumber\\ f_{W,\kappa}(r) & = & \sqrt{\frac{W-m}{\pi p}} \frac{{{\rm i}}}{r} \frac{|\Gamma(\gamma-{{\rm i}}y)|} {2\Gamma(2\gamma+1)}\,e^{-\pi y/2}\,(2pr)^\gamma \nonumber\\ & & \times\left\{(\gamma-{{\rm i}}y)\,e^{-{{\rm i}}(pr-\eta)}\, _1F_1(\gamma+1-{{\rm i}}y, 2\gamma+1; 2{{\rm i}}pr) - {\rm c.c.}\right\} \quad. \label{radiale}\end{aligned}$$ with $$\eta = {\frac{1}{2}}\arg\left(-\frac{\kappa+{{\rm i}}ym/W}{\gamma-{{\rm i}}y}\right) \quad,\qquad \gamma=\sqrt{\kappa^2 - (Z\alpha)^2} \quad.$$ For an extended nucleus we construct the continuum solutions as in [@mueller:rafelski:greiner:3] by employing a power series ansatz for the electron wave function inside the nucleus which is matched to the linear combination of wave functions to the Coulomb potential at the nuclear radius. From the matching condition the normalization factor and the phase shift can be deduced. The continuum solutions of the Dirac equation can be written as wave functions which asymptotically represent plane waves of momentum $\vec p$ and spin $\lambda$. These wave functions are obtained as a series expansion into spherical harmonics [@rose:61; @hofmann:93]: For positive energies this expansion reads: $$\label{e30} \psi_{W,\vec p,\lambda}^{(\pm)}=\sum\limits_{\kappa,\mu} a^{(\pm)}_{\kappa\mu}\,\chi_{W,\kappa,\mu} \quad. \label{eswelle}$$ with the coefficients $$a^{(\pm)}_{\kappa\mu} = \frac{1}{\sqrt{Wp}}\,{{\rm i}}^l e^{\pm{{\rm i}}[\delta(W,\kappa) + \pi(l+1)/2]} \sum\limits_m Y^*_{lm}(\hat p) \left(\begin{array}{cc} l & {\frac{1}{2}}\\ m & \lambda \end{array} \left| \begin{array}{c} j \\ \mu \end{array} \right.\right) \label{esa}$$ and the Coulomb phase shift $$\delta(W,\kappa) = \eta - \arg\Gamma(\gamma - {{\rm i}}y) - \frac{\pi}{2} \, \gamma$$ and for negative energies ($-W<0$) [@hofmann:93] $$\psi^{(\pm)}_{-W,\vec p, \lambda} = \sum\limits_{\kappa,\mu} b^{(\pm)}_{\kappa\mu}\,\chi_{-W,\kappa,\mu} \label{pswelle}$$ with the coefficients $$b^{(\pm)}_{\kappa, \mu} = \frac{1}{\sqrt{Wp}}\,{{\rm i}}^{(l(-\kappa) +1)} e^{\pm{{\rm i}}[\delta(-W,\kappa) +\pi l(-\kappa)]} \sum_{m} Y_{l(-\kappa) m}^* (\hat p) \left(\begin{array}{cc} l(-\kappa) & {\frac{1}{2}}\\ m & \lambda \end{array} \left| \begin{array}{c} j \\ \mu \end{array} \right.\right) \label{psb}$$ and the Coulomb phase shift $$\delta(-W,\kappa) = \eta - \arg\Gamma(\gamma - {{\rm i}}y) - \frac{\pi}{2} \, \gamma \quad .$$ These wave functions obey the normalization condition $$\int {\rm d}^3r\,\left(\psi^{(\pm)}_{W,\vec p, \lambda}(\vec r\,) \right)^{\dag}\,\psi^{(\pm)}_{W',\vec p\,', \lambda'}(\vec r\,) =\delta^3(\vec p-\vec p\,') \, \delta_{\lambda\,\lambda'} \quad .$$ In the case of an extended nucleus the phase shifts have to be determined numerically. Evaluation of the coefficients $A$ and $B$ ========================================== We start with the coefficients $A$ which contain the electron scattering wave function and its complex conjugate. Inserting the explicit form of these coefficients, Eq. (\[esa\]), we get $$\begin{aligned} A_{ \kappa'\mu' ; \bar\kappa'\bar\mu' } & = & \sum\limits_{\lambda' , m' , \bar m'} \exp({{\rm i}}[\delta'(W',\kappa')-\bar\delta'(W',\bar\kappa')]) \nonumber \\ & \times & \sqrt{2j'+1} \, \sqrt{2\bar j'+1} (-1)^{l'(\kappa')-1/2 +\mu'} \nonumber \\ & \times & Y_{l'(\kappa')m'}(\Omega_{p'}) \, Y_{\bar l'(\bar\kappa')\bar m'}^* (\Omega_{p'}) \, (-1)^{\bar l'(\bar\kappa')-1/2+\bar\mu'} \nonumber \\ & \times & \left(\begin{array}{ccc} l'(\kappa') & 1/2 & j' \\ m' & \lambda' & -\mu' \end{array}\right) \left(\begin{array}{ccc} \bar l'(\bar\kappa') & 1/2 & \bar j' \\ \bar m' & \lambda' & -\bar\mu' \end{array}\right) \quad , \label{winkel-9}\end{aligned}$$ which can be transformed into $$\begin{aligned} \lefteqn{ A_{ \kappa'\mu' ; \bar\kappa'\bar\mu' } = \frac{1}{\sqrt{4\pi}} \exp({{\rm i}}[\delta'(W',\kappa')-\bar\delta'(W',\bar\kappa')]) } \nonumber \\ & \times & (-1)^{\mu'+1/2} \, \sqrt{2j'+1} \, \sqrt{2\bar j'+1} \nonumber \\ & \times & \sum\limits_{I' , \alpha'} \sqrt{2I'+1} \; Y_{I'\alpha'}(\Omega_{p'}) \left(\begin{array}{ccc} j' & \bar j' & I' \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} \bar j' & j' & I' \\ -\bar\mu' & \mu' & -\alpha' \end{array}\right) \quad . \label{koeff-a}\end{aligned}$$ Additionally we get the parity selection rule $$l'(\kappa') + \bar l'(\bar\kappa') + I' = 0 \mbox{ mod } 2 \quad,$$ and the angular momentum selection rule: $$|l'(\kappa') - \bar l'(\bar\kappa')| \leq I' \leq l'(\kappa') + \bar l'(\bar\kappa') \quad.$$ Next we proceed to evaluate the coefficients $B$, which are composed from the positron scattering wave functions, Eq. (\[psb\]): $$\begin{aligned} B_{ \kappa\mu ; \bar\kappa\bar\mu } & = & \sum\limits_{m , \bar m , \lambda} (-1)^{1+\mu+\bar\mu} \, \exp({{\rm i}}[\delta(-W,\kappa)-\delta(-W,\bar\kappa)]) \nonumber \\ & \times & \sqrt{2j+1} \, \sqrt{2\bar j+1} Y_{l(-\kappa)m}^*(-\Omega_{p}) \, Y_{\bar l(-\bar\kappa)\bar m}(-\Omega_{p}) \nonumber \\ & \times & \left(\begin{array}{ccc} l(-\kappa) & 1/2 & j \\ m & -\lambda & -\mu \end{array}\right) \left(\begin{array}{ccc} \bar l(-\bar\kappa) & 1/2 & \bar j \\ \bar m & -\lambda & -\bar\mu \end{array}\right) \; . \label{winkel-13}\end{aligned}$$ This can be rewritten as $$\begin{aligned} \lefteqn{ B_{ \kappa\mu ; \bar\kappa\bar\mu } = (-1)^{\bar\mu+1/2} \frac{1}{\sqrt{4\pi}} \, \exp({{\rm i}}[\delta(-W,\kappa)-\bar\delta(-W,\bar\kappa)]) } \nonumber \\ & \times & \sqrt{2j+1} \, \sqrt{2\bar j+1} \nonumber \\ & \times & \sum\limits_{I , \alpha} \sqrt{2I+1} \, Y_{I\alpha}(\Omega_{p}) \left(\begin{array}{ccc} j & \bar j & I \\ 1/2 & -1/2 & 0 \end{array}\right) \left(\begin{array}{ccc} \bar j & j & I \\ -\bar\mu & \mu & \alpha \end{array}\right) \quad. \label{koeff-b}\end{aligned}$$ Furthermore we obtain the parity and angular momentum selection rules: $$l(-\kappa)+\bar l(-\bar\kappa) +I = 0 \mbox{ mod } 2\quad,$$ $$|l(-\kappa) - \bar l(-\bar\kappa)| \leq I \leq l(-\kappa) + \bar l(-\bar\kappa) \quad.$$ [10]{} G. Goldring, Proc. Phys. Soc. [**A66**]{}, 341 (1953). M. E. Rose, Phys. Rev. [**131**]{}, 1260 (1963). E. K. Warburton, Phys. Rev. [**133**]{}, B1368 (1964). P. Schlüter, G. Soff, and W. Greiner, Z. Phys. A [**286**]{}, 149 (1978). P. Schlüter, G. Soff, and W. Greiner, Phys. Rep. [**75**]{}, 327 (1981). G. Soff, P. Schlüter, and W. Greiner, Z. Phys. A [**303**]{}, 189 (1981). , edited by K. Alder and A. Winther (Academic Press, New York, 1966). K. Alder and A. Winther, [*Electromagnetic Excitation*]{} (North-Holland, Amsterdam, 1975). M. E. Rose, [*Angular Momentum Theory*]{} (Wiley, New York, 1957). J. M. Eisenberg and W. Greiner, [*Nuclear Theory 1: Nuclear Models*]{} (North-Holland, Amsterdam, 1987). L. C. Biedenharn, in [*Nuclear Spectroscopy B*]{}, edited by F. Ajzenberg-Selove (Academic Press, New York, 1960). D. Pelte and D. Schwalm, in [*Heavy Ion Collisions*]{}, edited by R. Bock (North-Holland, Amsterdam, 1991), Vol. 3, p. 1. H.-J. Wollersheim, GSI-Report [**GSI-93-22**]{}, (1993). J. M. Perez-Jorda, E. San-Fabian, and F. Moscardo, Comp. Phys. Comm. [**70**]{}, 271 (1992). A. R. Barnett and I. J. Thompson, Comp. Phys. Comm. [**36**]{}, 363 (1985). C. Hofmann, J. Reinhardt, W. Greiner, P. Schlüter, and G. Soff, Phys. Rev. C [**42**]{}, 2632 (1990). B. Müller, J. Rafelski, and W. Greiner, Nuov. Cim. [**18A**]{}, 551 (1973). R. A. Broglia and A. Winther, [*Heavy Ion Reactions*]{} (Addison Wesley, Redwood City, CA, 1991). P. Schlüter and G. Soff, Atomic Data and Nuclear Data Tables [**24**]{}, 509 (1979). M. E. Rose, [*Relativistic Electron Theory*]{} (Wiley, New York, 1961). C. Hofmann, J. Augustin, J. Reinhardt, A. Schäfer, W. Greiner, and G. Soff, Physica Scripta [**48**]{}, 257 (1993). Figure captions: {#figure-captions .unnumbered} ================ [**Figure 1:**]{} Opening-angle distribution of electron-positron pairs emitted by IPC of randomly oriented uranium-like nuclei a) for an E1 transition, b) for a M1 transition. The transition energy amounts in both cases to 2 MeV, the kinetic positron energy was taken to be 800 keV. The full lines correspond to the DWBA calculations, dotted lines display the outcome of the Born approximation. The effect of the finite nuclear extension in the case of M1 transitions can be deduced from the dashed line. [**Figure 2:**]{} a) The coordinate system which is chosen to describe the alignment of the Coulomb excited nuclei in heavy-ion collisions. $\vartheta$ denotes here the scattering angle of the projectile in the lab system. b) Definition of the angles which are used to describe the directions of electron and positron in space. $\Theta$ is the opening angle of the electron-positron pair, $\vartheta$ denotes the polar angle of the positron with respect to the quantization axis, and the dihedral angle $\delta$ indicates the angle about which the electron-positron emission plane is rotated around the positron axis. [**Figure 3:**]{} Angular correlation of electron-positron pairs in E1-IPC for a transition from a $1^{-}$ to a $0^{+}$ state, assuming oblate alignment of uranium-like nuclei in the initial state. The conversion probability is plotted versus the opening angle of the emitted lepton pair for various polar angles of the positron with respect to the $z$ axis. The transition energy amounts to $\omega = 1800$ keV, the kinetic positron energy to $E = 700$ keV. The dihedral angle $\delta$ was fixed to $0^\circ$. [**Figure 4:**]{} Angular correlation of electron-positron pairs in E1-IPC for the same transition and energies as in Fig. 3. The pair conversion probability is plotted for fixed polar angle $\vartheta=90^\circ$ and several values of the dihedral angle $\delta$. [**Figure 5:**]{} Polar angle distribution assuming E1, E2, and E3 transitions to the $0^+$ ground state of a nucleus showing oblate alignment. The transition energy amounts to $1800$ keV, the kinetic positron energy was fixed to $700$ keV. [**Figure 6:**]{} Polar angle distribution assuming an E1 transition to the $0^+$ ground state of a nucleus with oblate alignment, prolate alignment, and polarization. The transition energy amounts to $1800$ keV, the kinetic positron energy to $700$ keV. [c]{}\ [**Figure 1a**]{}\ \ [**Figure 1b**]{} [c]{}\ [**Figure 2a**]{}\ \ [**Figure 2b**]{} [**Figure 3**]{} [**Figure 4**]{} [**Figure 5**]{} [**Figure 6**]{} [^1]: E-Mail: hofmann@ptprs8.phy.tu-dresden.de [^2]: E-Mail: jr@th.physik.uni-frankfurt.de
/********************************************************************** *These solidity codes have been obtained from Etherscan for extracting *the smartcontract related info. *The data will be used by MATRIX AI team as the reference basis for *MATRIX model analysis,extraction of contract semantics, *as well as AI based data analysis, etc. **********************************************************************/ pragma solidity ^0.4.21; /** * @title SafeMath * @dev Math operations with safety checks that throw on error */ library SafeMath { function mul(uint256 a, uint256 b) internal pure returns (uint256) { if (a == 0) { return 0; } uint256 c = a * b; assert(c / a == b); return c; } function div(uint256 a, uint256 b) internal pure returns (uint256) { // assert(b > 0); // Solidity automatically throws when dividing by 0 uint256 c = a / b; // assert(a == b * c + a % b); // There is no case in which this doesn't hold return c; } function sub(uint256 a, uint256 b) internal pure returns (uint256) { assert(b <= a); return a - b; } function add(uint256 a, uint256 b) internal pure returns (uint256) { uint256 c = a + b; assert(c >= a); return c; } } /** * @title Ownable * @dev The Ownable contract has an owner address, and provides basic authorization * control functions, this simplifies the implementation of "user permissions". */ contract Ownable { address public owner; event OwnershipTransferred(address indexed previousOwner, address indexed newOwner); /** * @dev The Ownable constructor sets the original `owner` of the contract to the * sender account. */ function Ownable() public { owner = msg.sender; } /** * @dev Throws if called by any account other than the owner. */ modifier onlyOwner() { require(msg.sender == owner); _; } /** * @dev Allows the current owner to transfer control of the contract to a newOwner. * @param newOwner The address to transfer ownership to. */ function transferOwnership(address newOwner) onlyOwner public { require(newOwner != address(0)); OwnershipTransferred(owner, newOwner); owner = newOwner; } } /** * * @title ERC223 * @dev ERC223 contract interface with ERC20 functions and events * Fully backward compatible with ERC20 * Recommended implementation used at https://github.com/Dexaran/ERC223-token-standard/tree/Recommended */ contract ERC223 { uint public totalSupply; // ERC223 and ERC20 functions and events function balanceOf(address who) public view returns (uint); function totalSupply() public view returns (uint256 _supply); function transfer(address to, uint value) public returns (bool ok); function transfer(address to, uint value, bytes data) public returns (bool ok); function transfer(address to, uint value, bytes data, string customFallback) public returns (bool ok); event Transfer(address indexed from, address indexed to, uint value, bytes indexed data); // ERC223 functions function name() public view returns (string _name); function symbol() public view returns (string _symbol); function decimals() public view returns (uint8 _decimals); // ERC20 functions and events function transferFrom(address _from, address _to, uint256 _value) public returns (bool success); function approve(address _spender, uint256 _value) public returns (bool success); function allowance(address _owner, address _spender) public view returns (uint256 remaining); event Transfer(address indexed _from, address indexed _to, uint256 _value); event Approval(address indexed _owner, address indexed _spender, uint _value); } /** * @title ContractReceiver * @dev Contract that is working with ERC223 tokens */ contract ContractReceiver { struct TKN { address sender; uint value; bytes data; bytes4 sig; } function tokenFallback(address _from, uint _value, bytes _data) public pure { TKN memory tkn; tkn.sender = _from; tkn.value = _value; tkn.data = _data; uint32 u = uint32(_data[3]) + (uint32(_data[2]) << 8) + (uint32(_data[1]) << 16) + (uint32(_data[0]) << 24); tkn.sig = bytes4(u); /* * tkn variable is analogue of msg variable of Ether transaction * tkn.sender is person who initiated this token transaction (analogue of msg.sender) * tkn.value the number of tokens that were sent (analogue of msg.value) * tkn.data is data of token transaction (analogue of msg.data) * tkn.sig is 4 bytes signature of function if data of token transaction is a function execution */ } } contract Zeinun is ERC223, Ownable { using SafeMath for uint256; string public name = "Zeinun"; string public symbol = "ZNN"; string public constant AAcontributors = "Zeinun Token"; uint8 public decimals = 8; uint256 public totalSupply = 97e5 * 1e7; uint256 public distributeAmount = 0; bool public mintingFinished = false; address public founder = 0x97F0AbcC844C21f39582768c345D8d139415d11f; address public preSeasonGame = 0x97F0AbcC844C21f39582768c345D8d139415d11f; address public activityFunds = 0x97F0AbcC844C21f39582768c345D8d139415d11f; address public lockedFundsForthefuture = 0x97F0AbcC844C21f39582768c345D8d139415d11f; mapping(address => uint256) public balanceOf; mapping(address => mapping (address => uint256)) public allowance; mapping (address => bool) public frozenAccount; mapping (address => uint256) public unlockUnixTime; event FrozenFunds(address indexed target, bool frozen); event LockedFunds(address indexed target, uint256 locked); event Burn(address indexed from, uint256 amount); event Mint(address indexed to, uint256 amount); event MintFinished(); /** * @dev Constructor is called only once and can not be called again */ function Zeinun() public { owner = activityFunds; balanceOf[founder] = totalSupply.mul(25).div(100); balanceOf[preSeasonGame] = totalSupply.mul(55).div(100); balanceOf[activityFunds] = totalSupply.mul(10).div(100); balanceOf[lockedFundsForthefuture] = totalSupply.mul(10).div(100); } function name() public view returns (string _name) { return name; } function symbol() public view returns (string _symbol) { return symbol; } function decimals() public view returns (uint8 _decimals) { return decimals; } function totalSupply() public view returns (uint256 _totalSupply) { return totalSupply; } function balanceOf(address _owner) public view returns (uint256 balance) { return balanceOf[_owner]; } /** * @dev Prevent targets from sending or receiving tokens * @param targets Addresses to be frozen * @param isFrozen either to freeze it or not */ function freezeAccounts(address[] targets, bool isFrozen) onlyOwner public { require(targets.length > 0); for (uint j = 0; j < targets.length; j++) { require(targets[j] != 0x0); frozenAccount[targets[j]] = isFrozen; FrozenFunds(targets[j], isFrozen); } } /** * @dev Prevent targets from sending or receiving tokens by setting Unix times * @param targets Addresses to be locked funds * @param unixTimes Unix times when locking up will be finished */ function lockupAccounts(address[] targets, uint[] unixTimes) onlyOwner public { require(targets.length > 0 && targets.length == unixTimes.length); for(uint j = 0; j < targets.length; j++){ require(unlockUnixTime[targets[j]] < unixTimes[j]); unlockUnixTime[targets[j]] = unixTimes[j]; LockedFunds(targets[j], unixTimes[j]); } } /** * @dev Function that is called when a user or another contract wants to transfer funds */ function transfer(address _to, uint _value, bytes _data, string _custom_fallback) public returns (bool success) { require(_value > 0 && frozenAccount[msg.sender] == false && frozenAccount[_to] == false && now > unlockUnixTime[msg.sender] && now > unlockUnixTime[_to]); if (isContract(_to)) { require(balanceOf[msg.sender] >= _value); balanceOf[msg.sender] = balanceOf[msg.sender].sub(_value); balanceOf[_to] = balanceOf[_to].add(_value); assert(_to.call.value(0)(bytes4(keccak256(_custom_fallback)), msg.sender, _value, _data)); Transfer(msg.sender, _to, _value, _data); Transfer(msg.sender, _to, _value); return true; } else { return transferToAddress(_to, _value, _data); } } function transfer(address _to, uint _value, bytes _data) public returns (bool success) { require(_value > 0 && frozenAccount[msg.sender] == false && frozenAccount[_to] == false && now > unlockUnixTime[msg.sender] && now > unlockUnixTime[_to]); if (isContract(_to)) { return transferToContract(_to, _value, _data); } else { return transferToAddress(_to, _value, _data); } } /** * @dev Standard function transfer similar to ERC20 transfer with no _data * Added due to backwards compatibility reasons */ function transfer(address _to, uint _value) public returns (bool success) { require(_value > 0 && frozenAccount[msg.sender] == false && frozenAccount[_to] == false && now > unlockUnixTime[msg.sender] && now > unlockUnixTime[_to]); bytes memory empty; if (isContract(_to)) { return transferToContract(_to, _value, empty); } else { return transferToAddress(_to, _value, empty); } } // assemble the given address bytecode. If bytecode exists then the _addr is a contract. function isContract(address _addr) private view returns (bool is_contract) { uint length; assembly { //retrieve the size of the code on target address, this needs assembly length := extcodesize(_addr) } return (length > 0); } // function that is called when transaction target is an address function transferToAddress(address _to, uint _value, bytes _data) private returns (bool success) { require(balanceOf[msg.sender] >= _value); balanceOf[msg.sender] = balanceOf[msg.sender].sub(_value); balanceOf[_to] = balanceOf[_to].add(_value); Transfer(msg.sender, _to, _value, _data); Transfer(msg.sender, _to, _value); return true; } // function that is called when transaction target is a contract function transferToContract(address _to, uint _value, bytes _data) private returns (bool success) { require(balanceOf[msg.sender] >= _value); balanceOf[msg.sender] = balanceOf[msg.sender].sub(_value); balanceOf[_to] = balanceOf[_to].add(_value); ContractReceiver receiver = ContractReceiver(_to); receiver.tokenFallback(msg.sender, _value, _data); Transfer(msg.sender, _to, _value, _data); Transfer(msg.sender, _to, _value); return true; } /** * @dev Transfer tokens from one address to another * Added due to backwards compatibility with ERC20 * @param _from address The address which you want to send tokens from * @param _to address The address which you want to transfer to * @param _value uint256 the amount of tokens to be transferred */ function transferFrom(address _from, address _to, uint256 _value) public returns (bool success) { require(_to != address(0) && _value > 0 && balanceOf[_from] >= _value && allowance[_from][msg.sender] >= _value && frozenAccount[_from] == false && frozenAccount[_to] == false && now > unlockUnixTime[_from] && now > unlockUnixTime[_to]); balanceOf[_from] = balanceOf[_from].sub(_value); balanceOf[_to] = balanceOf[_to].add(_value); allowance[_from][msg.sender] = allowance[_from][msg.sender].sub(_value); Transfer(_from, _to, _value); return true; } /** * @dev Allows _spender to spend no more than _value tokens in your behalf * Added due to backwards compatibility with ERC20 * @param _spender The address authorized to spend * @param _value the max amount they can spend */ function approve(address _spender, uint256 _value) public returns (bool success) { allowance[msg.sender][_spender] = _value; Approval(msg.sender, _spender, _value); return true; } /** * @dev Function to check the amount of tokens that an owner allowed to a spender * Added due to backwards compatibility with ERC20 * @param _owner address The address which owns the funds * @param _spender address The address which will spend the funds */ function allowance(address _owner, address _spender) public view returns (uint256 remaining) { return allowance[_owner][_spender]; } /** * @dev Burns a specific amount of tokens. * @param _from The address that will burn the tokens. * @param _unitAmount The amount of token to be burned. */ function burn(address _from, uint256 _unitAmount) onlyOwner public { require(_unitAmount > 0 && balanceOf[_from] >= _unitAmount); balanceOf[_from] = balanceOf[_from].sub(_unitAmount); totalSupply = totalSupply.sub(_unitAmount); Burn(_from, _unitAmount); } modifier canMint() { require(!mintingFinished); _; } /** * @dev Function to mint tokens * @param _to The address that will receive the minted tokens. * @param _unitAmount The amount of tokens to mint. */ function mint(address _to, uint256 _unitAmount) onlyOwner canMint public returns (bool) { require(_unitAmount > 0); totalSupply = totalSupply.add(_unitAmount); balanceOf[_to] = balanceOf[_to].add(_unitAmount); Mint(_to, _unitAmount); Transfer(address(0), _to, _unitAmount); return true; } /** * @dev Function to stop minting new tokens. */ function finishMinting() onlyOwner canMint public returns (bool) { mintingFinished = true; MintFinished(); return true; } /** * @dev Function to distribute tokens to the list of addresses by the provided amount */ function distributeAirdrop(address[] addresses, uint256 amount) public returns (bool) { require(amount > 0 && addresses.length > 0 && frozenAccount[msg.sender] == false && now > unlockUnixTime[msg.sender]); amount = amount.mul(1e8); uint256 totalAmount = amount.mul(addresses.length); require(balanceOf[msg.sender] >= totalAmount); for (uint j = 0; j < addresses.length; j++) { require(addresses[j] != 0x0 && frozenAccount[addresses[j]] == false && now > unlockUnixTime[addresses[j]]); balanceOf[addresses[j]] = balanceOf[addresses[j]].add(amount); Transfer(msg.sender, addresses[j], amount); } balanceOf[msg.sender] = balanceOf[msg.sender].sub(totalAmount); return true; } function distributeAirdrop(address[] addresses, uint[] amounts) public returns (bool) { require(addresses.length > 0 && addresses.length == amounts.length && frozenAccount[msg.sender] == false && now > unlockUnixTime[msg.sender]); uint256 totalAmount = 0; for(uint j = 0; j < addresses.length; j++){ require(amounts[j] > 0 && addresses[j] != 0x0 && frozenAccount[addresses[j]] == false && now > unlockUnixTime[addresses[j]]); amounts[j] = amounts[j].mul(1e8); totalAmount = totalAmount.add(amounts[j]); } require(balanceOf[msg.sender] >= totalAmount); for (j = 0; j < addresses.length; j++) { balanceOf[addresses[j]] = balanceOf[addresses[j]].add(amounts[j]); Transfer(msg.sender, addresses[j], amounts[j]); } balanceOf[msg.sender] = balanceOf[msg.sender].sub(totalAmount); return true; } /** * @dev Function to collect tokens from the list of addresses */ function collectTokens(address[] addresses, uint[] amounts) onlyOwner public returns (bool) { require(addresses.length > 0 && addresses.length == amounts.length); uint256 totalAmount = 0; for (uint j = 0; j < addresses.length; j++) { require(amounts[j] > 0 && addresses[j] != 0x0 && frozenAccount[addresses[j]] == false && now > unlockUnixTime[addresses[j]]); amounts[j] = amounts[j].mul(1e8); require(balanceOf[addresses[j]] >= amounts[j]); balanceOf[addresses[j]] = balanceOf[addresses[j]].sub(amounts[j]); totalAmount = totalAmount.add(amounts[j]); Transfer(addresses[j], msg.sender, amounts[j]); } balanceOf[msg.sender] = balanceOf[msg.sender].add(totalAmount); return true; } function setDistributeAmount(uint256 _unitAmount) onlyOwner public { distributeAmount = _unitAmount; } /** * @dev Function to distribute tokens to the msg.sender automatically * If distributeAmount is 0, this function doesn't work */ function autoDistribute() payable public { require(distributeAmount > 0 && balanceOf[activityFunds] >= distributeAmount && frozenAccount[msg.sender] == false && now > unlockUnixTime[msg.sender]); if(msg.value > 0) activityFunds.transfer(msg.value); balanceOf[activityFunds] = balanceOf[activityFunds].sub(distributeAmount); balanceOf[msg.sender] = balanceOf[msg.sender].add(distributeAmount); Transfer(activityFunds, msg.sender, distributeAmount); } /** * @dev fallback function */ function() payable public { autoDistribute(); } }
Q: CSS img align: how to set a img middle-right align in a DIV I am looking for a simple way to middle-right align a img in a DIV, i.e., vertical-middle and horizontal-right align, like this: I tried using vertical-align:middle and float:right in IMG styles, but seems not work together.. <div style='height: 300px; width: 300px'> <img src= 'http://www.w3schools.com/tags/smiley.gif' style='vertical-align: middle; float: right;'/> </div> A: There are many ways to do this. It is very easy if image and its container height is known, tricky otherwise. Choose the solution that suit your needs: Method 1: line height, text-align and vertical align #div1 { width: 300px; height: 300px; background-color: blue; line-height: 300px; text-align: right; } #div1 img { vertical-align: middle; } <div id="div1"> <img src="http://dummyimage.com/100x50/fc0/000000.png">&#8203; </div> Method 2: absolute/relative positioning, image height known #div1 { width: 300px; height: 300px; background-color: blue; position: relative; } #div1 img { position: absolute; right: 0; top: 50%; margin-top: -25px; /* -(image_height/2) */ } <div id="div1"> <img src="http://dummyimage.com/100x50/fc0/000000.png"> </div> Method 3: absolute/relative positioning, image and container height known #div1 { width: 300px; height: 300px; background-color: blue; } #div1 img { float: right; position: relative; top: 125px; /* (div_height-image_height)/2 */ } <div id="div1"> <img src="http://dummyimage.com/100x50/fc0/000000.png"> </div> jsFiddle A: <DIV style='height: 300px; width: 300px;border:1px solid #ff0000;display:table-cell;vertical-align: middle'> <img src= 'http://www.w3schools.com/tags/smiley.gif' style='float:right;'/> </DIV> BTW, you are using "styles=" in your image tag. This is invalid.
//------------------------------------------------------------------------------ // <auto-generated> // This code was generated by a tool. // Runtime Version:4.0.30319.34014 // // Changes to this file may cause incorrect behavior and will be lost if // the code is regenerated. // </auto-generated> //------------------------------------------------------------------------------ namespace Urasandesu.Prig.VSPackage { /// <summary> /// A strongly-typed resource class, for looking up localized strings, etc. /// </summary> // This class was auto-generated by the StronglyTypedResourceBuilder // class via a tool like ResGen or Visual Studio. // To add or remove a member, edit your .ResX file then rerun ResGen // with the /str option, or rebuild your VS project. [global::System.CodeDom.Compiler.GeneratedCodeAttribute("System.Resources.Tools.StronglyTypedResourceBuilder", "4.0.0.0")] [global::System.Diagnostics.DebuggerNonUserCodeAttribute()] [global::System.Runtime.CompilerServices.CompilerGeneratedAttribute()] internal class Resources { private static global::System.Resources.ResourceManager resourceMan; private static global::System.Globalization.CultureInfo resourceCulture; [global::System.Diagnostics.CodeAnalysis.SuppressMessageAttribute("Microsoft.Performance", "CA1811:AvoidUncalledPrivateCode")] internal Resources() { } /// <summary> /// Returns the cached ResourceManager instance used by this class. /// </summary> [global::System.ComponentModel.EditorBrowsableAttribute(global::System.ComponentModel.EditorBrowsableState.Advanced)] internal static global::System.Resources.ResourceManager ResourceManager { get { if (object.ReferenceEquals(resourceMan, null)) { global::System.Resources.ResourceManager temp = new global::System.Resources.ResourceManager("Urasandesu.Prig.VSPackage.Resources", typeof(Resources).Assembly); resourceMan = temp; } return resourceMan; } } /// <summary> /// Overrides the current thread's CurrentUICulture property for all /// resource lookups using this strongly typed resource class. /// </summary> [global::System.ComponentModel.EditorBrowsableAttribute(global::System.ComponentModel.EditorBrowsableState.Advanced)] internal static global::System.Globalization.CultureInfo Culture { get { return resourceCulture; } set { resourceCulture = value; } } /// <summary> /// Looks up a localized string similar to This value will be replaced at build time. For details, see Build.ps1.. /// </summary> internal static string NuGetRootPackageId { get { return ResourceManager.GetString("NuGetRootPackageId", resourceCulture); } } /// <summary> /// Looks up a localized string similar to This value will be replaced at build time. For details, see Build.ps1.. /// </summary> internal static string NuGetRootPackageVersion { get { return ResourceManager.GetString("NuGetRootPackageVersion", resourceCulture); } } } }
# Copyright (C) 2012 the WordPress team # This file is distributed under the GNU General Public License v2 or later. msgid "" msgstr "" "Project-Id-Version: Twenty Twelve 1.1\n" "Report-Msgid-Bugs-To: http://wordpress.org/tags/twentytwelve\n" "POT-Creation-Date: 2012-12-07 21:19:18+00:00\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "PO-Revision-Date: 2012-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: LANGUAGE <LL@li.org>\n" #: 404.php:17 msgid "This is somewhat embarrassing, isn&rsquo;t it?" msgstr "" #: 404.php:21 msgid "" "It seems we can&rsquo;t find what you&rsquo;re looking for. Perhaps " "searching can help." msgstr "" #: archive.php:29 msgid "Daily Archives: %s" msgstr "" #: archive.php:31 msgid "Monthly Archives: %s" msgstr "" #: archive.php:31 msgctxt "monthly archives date format" msgid "F Y" msgstr "" #: archive.php:33 msgid "Yearly Archives: %s" msgstr "" #: archive.php:33 msgctxt "yearly archives date format" msgid "Y" msgstr "" #: archive.php:35 msgid "Archives" msgstr "" #: author.php:32 msgid "Author Archives: %s" msgstr "" #: author.php:53 content.php:53 msgid "About %s" msgstr "" #: category.php:21 msgid "Category Archives: %s" msgstr "" #: comments.php:31 msgid "One thought on &ldquo;%2$s&rdquo;" msgid_plural "%1$s thoughts on &ldquo;%2$s&rdquo;" msgstr[0] "" msgstr[1] "" #: comments.php:42 msgid "Comment navigation" msgstr "" #: comments.php:43 msgid "&larr; Older Comments" msgstr "" #: comments.php:44 msgid "Newer Comments &rarr;" msgstr "" #: comments.php:53 msgid "Comments are closed." msgstr "" #: content-aside.php:13 content-aside.php:20 content-image.php:17 #: content-link.php:18 content-quote.php:17 content-status.php:15 #: content.php:23 msgid "Permalink to %s" msgstr "" #: content-aside.php:15 content-image.php:13 content-link.php:14 #: content-quote.php:13 content-status.php:21 content.php:39 msgid "Continue reading <span class=\"meta-nav\">&rarr;</span>" msgstr "" #: content-aside.php:23 content-image.php:23 content-link.php:21 #: content-quote.php:20 content-status.php:27 content.php:28 msgid "Leave a reply" msgstr "" #: content-aside.php:23 content-image.php:23 content-link.php:21 #: content-quote.php:20 content-status.php:27 content.php:28 msgid "1 Reply" msgstr "" #: content-aside.php:23 content-image.php:23 content-link.php:21 #: content-quote.php:20 content-status.php:27 content.php:28 msgid "% Replies" msgstr "" #: content-aside.php:26 content-image.php:26 content-link.php:24 #: content-page.php:21 content-quote.php:23 content-status.php:30 #: content.php:46 functions.php:309 image.php:37 msgid "Edit" msgstr "" #: content-link.php:12 msgid "Link" msgstr "" #: content-none.php:13 index.php:49 search.php:34 msgid "Nothing Found" msgstr "" #: content-none.php:17 index.php:53 msgid "" "Apologies, but no results were found. Perhaps searching will help find a " "related post." msgstr "" #: content-page.php:18 content.php:40 image.php:92 msgid "Pages:" msgstr "" #: content.php:14 msgid "Featured post" msgstr "" #: content.php:57 msgid "View all posts by %s <span class=\"meta-nav\">&rarr;</span>" msgstr "" #. #-#-#-#-# twentytwelve.pot (Twenty Twelve 1.1) #-#-#-#-# #. Author URI of the plugin/theme #: footer.php:17 msgid "http://wordpress.org/" msgstr "" #: footer.php:17 msgid "Semantic Personal Publishing Platform" msgstr "" #: footer.php:17 msgid "Proudly powered by %s" msgstr "" #: functions.php:64 msgid "Primary Menu" msgstr "" #. translators: If there are characters in your language that are not supported #. by Open Sans, translate this to 'off'. Do not translate into your own #. language. #: functions.php:120 msgctxt "Open Sans font: on or off" msgid "on" msgstr "" #. translators: To add an additional Open Sans character subset specific to #. your language, translate #. this to 'greek', 'cyrillic' or 'vietnamese'. Do not translate into your #. own language. #: functions.php:125 msgctxt "Open Sans font: add new subset (greek, cyrillic, vietnamese)" msgid "no-subset" msgstr "" #: functions.php:181 msgid "Page %s" msgstr "" #: functions.php:206 msgid "Main Sidebar" msgstr "" #: functions.php:208 msgid "" "Appears on posts and pages except the optional Front Page template, which " "has its own widgets" msgstr "" #: functions.php:216 msgid "First Front Page Widget Area" msgstr "" #: functions.php:218 functions.php:228 msgid "" "Appears when using the optional Front Page template with a page set as " "Static Front Page" msgstr "" #: functions.php:226 msgid "Second Front Page Widget Area" msgstr "" #: functions.php:250 single.php:20 msgid "Post navigation" msgstr "" #: functions.php:251 msgid "<span class=\"meta-nav\">&larr;</span> Older posts" msgstr "" #: functions.php:252 msgid "Newer posts <span class=\"meta-nav\">&rarr;</span>" msgstr "" #: functions.php:277 msgid "Pingback:" msgstr "" #: functions.php:277 msgid "(Edit)" msgstr "" #: functions.php:292 msgid "Post author" msgstr "" #. translators: 1: date, 2: time #: functions.php:298 msgid "%1$s at %2$s" msgstr "" #: functions.php:304 msgid "Your comment is awaiting moderation." msgstr "" #: functions.php:313 msgid "Reply" msgstr "" #: functions.php:332 functions.php:335 msgid ", " msgstr "" #: functions.php:346 msgid "View all posts by %s" msgstr "" #: functions.php:352 msgid "" "This entry was posted in %1$s and tagged %2$s on %3$s<span class=\"by-author" "\"> by %4$s</span>." msgstr "" #: functions.php:354 msgid "" "This entry was posted in %1$s on %3$s<span class=\"by-author\"> by %4$s</" "span>." msgstr "" #: functions.php:356 msgid "This entry was posted on %3$s<span class=\"by-author\"> by %4$s</span>." msgstr "" #: header.php:43 msgid "Menu" msgstr "" #: header.php:44 msgid "Skip to content" msgstr "" #: image.php:26 msgid "" "<span class=\"meta-prep meta-prep-entry-date\">Published </span> <span class=" "\"entry-date\"><time class=\"entry-date\" datetime=\"%1$s\">%2$s</time></" "span> at <a href=\"%3$s\" title=\"Link to full-size image\">%4$s &times; %5" "$s</a> in <a href=\"%6$s\" title=\"Return to %7$s\" rel=\"gallery\">%8$s</a>." msgstr "" #: image.php:41 msgid "&larr; Previous" msgstr "" #: image.php:42 msgid "Next &rarr;" msgstr "" #: index.php:38 msgid "No posts to display" msgstr "" #: index.php:42 msgid "Ready to publish your first post? <a href=\"%s\">Get started here</a>." msgstr "" #: search.php:18 msgid "Search Results for: %s" msgstr "" #: search.php:38 msgid "" "Sorry, but nothing matched your search criteria. Please try again with some " "different keywords." msgstr "" #: single.php:21 msgctxt "Previous post link" msgid "&larr;" msgstr "" #: single.php:22 msgctxt "Next post link" msgid "&rarr;" msgstr "" #: tag.php:21 msgid "Tag Archives: %s" msgstr "" #. Theme Name of the plugin/theme msgid "Twenty Twelve" msgstr "" #. Theme URI of the plugin/theme msgid "http://wordpress.org/extend/themes/twentytwelve" msgstr "" #. Description of the plugin/theme msgid "" "The 2012 theme for WordPress is a fully responsive theme that looks great on " "any device. Features include a front page template with its own widgets, an " "optional display font, styling for post formats on both index and single " "views, and an optional no-sidebar page template. Make it yours with a custom " "menu, header image, and background." msgstr "" #. Author of the plugin/theme msgid "the WordPress team" msgstr "" #. Template Name of the plugin/theme msgid "Front Page Template" msgstr "" #. Template Name of the plugin/theme msgid "Full-width Page Template, No Sidebar" msgstr ""
[A study in immunofluorescence of the plasma cells in allergic conjunctivitis, in particular of the cells forming immunoglobulin E (IgE) (author's transl)]. The relatively simple and precise technique of direct immunofluorescence on a tissue section enables the study and enumeration of all types of plasma cells including mastocytes (stained with acridine orange) in normal conjunctiva (5 cases), chronic non-allergic conjunctivitis (5 cases), allergic conjunctivitis of the educt (11 cases) and vernal conjunctivitis (11 cases). There is evidence of elevation of IgE plasma cells in type I allergic conjunctivitis where they are twice as raised as in non-allergic cases in adult forms, and three times more elevated in vernal conjunctivitis. There was no correlation between the number of IgE plasma cells in the tissues and IgE level in sera. Thus in air-borne conjunctival allergies local hypersensitivity seems to be the predominant, even exclusive, feature.
describe :file_stat, :shared => true do before :each do @file = tmp('i_exist') touch(@file) { |f| f.write 'rubinius' } end after :each do rm_r @file end # TODO: Fix it "returns a File::Stat object if the given file exists" do st = File.send(@method, @file) st.file?.should == true st.zero?.should == false st.size.should == 8 st.size?.should == 8 st.blksize.should > 0 st.atime.should be_kind_of(Time) st.ctime.should be_kind_of(Time) st.mtime.should be_kind_of(Time) end # TODO: Fix it "returns a File::Stat object when called on an instance of File" do File.open(@file) do |f| st = f.send(@method) st.file?.should == true st.zero?.should == false st.size.should == 8 st.size?.should == 8 st.blksize.should > 0 st.atime.should be_kind_of(Time) st.ctime.should be_kind_of(Time) st.mtime.should be_kind_of(Time) end end ruby_version_is "1.9" do it "accepts an object that has a #to_path method" do File.send(@method, mock_to_path(@file)) end end it "raises an Errno::ENOENT if the file does not exist" do lambda { File.send(@method, "fake_file") }.should raise_error(Errno::ENOENT) end end
TOULOUSE, France (Reuters) - The head of the world’s largest maker of turboprop planes, Franco-Italian ATR, raised concerns on Monday that state cash injections Canada’s Bombardier has received for its jet production could distort competition in the turboprop market. A Porter Airlines Bombardier Q400 turboprop aircraft is seen in Toronto February 23, 2009. REUTERS/Mark Blinch “Since 2015 they have got a billion (dollars)...and are working on another billion from Ottawa. I don’t find that amusing and fair competition at all. I am looking at what it means for us, to what extent it threatens us,” Chief Executive Christian Scherer told Reuters in an interview. Scherer's comments come weeks after Brazil, which is home to Bombardier's main rival in the jetliner market, Embraer EMBR3.SA, said it would challenge Canada at the World Trade Organization over a total of $2.5 billion in Quebec funding for Bombardier, including $1.5 billion from a public pension fund. Bombardier BBDb.TO is now negotiating a $1 billion injection from Canada's federal government, after ballooning costs from two aircraft developments forced it to consider bankruptcy in 2015. The lifeline for Bombardier’s CSeries jet could indirectly lead to unfair pricing in the battle for smaller turboprops, where ATR mainly competes with Bombardier’s Q400, Scherer said. Bombardier denied it was involved in any unfair pricing. ATR, which is half-owned by European planemaker Airbus AIR.PA and half by Italy's Leonardo LDOF.MI, earlier said its orders dropped by more than half in 2016, while deliveries fell 9 percent. ATR continues to outsell the Q400, but analysts say competition is fierce, highlighted by Bombardier recently ousting ATR as sole supplier to Hawaii’s Island Air. “What is true is that we have improved our sales and marketing team and have been more actively communicating the superior value of the Q400 to potential customers,” a Bombardier spokesman said. Trade analysts consider a formal European Union complaint about support for Bombardier unlikely, since Canada's system of equity infusions is not unlike some of the measures it has defended in a bitter dispute with the United States involving Airbus and Boeing BA.N.
CamshaftA shaft in the engine on which are the lobes (cams) that operate the valves. The camshaft is driven by the crankshaft, via a belt, chain or gears, at one half the crankshaft speed. One or more camshafts regulate the opening and closing of the valves in all piston engines. Boosted engines may benefit from a different camshaft to the stock camshaft, especially if the original engine was naturally aspirated. Typically boosted engines have lower lift and less duration than their n/a versions. 0 Topics 0 Posts No posts Charge coolerAn intercooler cools the intaken air by transferring the heat to the air. A chargecooler cools the intaken air by transferring the heat to water and uses a radiator to then transfer this to the air. Water can absorb heat quicker and more efficiently, so it cools the air quicker and cooler, and since colder air is denser, more air is going into the engine, thus being able to burn more fuel, increasing power. It is smaller than a regular (front mounted) intercooler and quite efficient. 0 Topics 0 Posts No posts Cold Air Intake (CAI)Cold Air Intake system is a device used to bring cold air into the car combustion engine to increase power and efficiency Downpipe (DP)The downpipe is a pipe that bolts to the back of the turbine housing of a turbocharger and begins the exit of the exhaust gas out of the car. When you look for down pipes you will typically run into 4 kinds. 1. Blank plate: Identical to stock construction with the wastegate portion completely covered. 2. Bellmouth: Completely open design. 3. Split bellmouth: Similar to bellmouth only with a divider inserted to separate the wastegate. 4. Divorced or Twin Dump: Separate exhaust and wastegate piping that connect further downstream. DynosheetsA dynosheet is the graphical representation of the relation between engine speed and power or torque. Sometimes it shows speed on the horizontal axle rather than engine speed. The power (in BHP ,PS or wheel HP) or torque (LbsFt or Nm) is usually measured at the powered wheel or powered wheel axle(s), and usually in the gear that is closest to a 1:1 gear ratio. Some dynosheet do not show the actual measured data, but use a conversion to plot the graph, either to correct for atmospheric changes (DIN or SAE smoothing are typically used) and/or to correct to show crankshaft power (BHP) rather than (measured) wheel horse power. It depends on many variables how to determine the power loss from crank to wheel; but many tuners use 15% and many will disagree with this figure. We consider it best to show actually measured data with DIN or SAE smoothing. 0 Topics 0 Posts No posts Engine Control Unit (After market ECU), EFI and piggyback systemsThe brain (ECU) of the car is responsible for pretty much everything electronic in the car, so also for making the engine run. In some cases, tuners choose to use an aftermarket kit to control parts of the engine and drive system, in order to better manage the extra power gained from a tune. Sometimes the aftermarket ECU completely replaces engine management, and sometimes it only corrects signals going to various parts of the engine , such as the MAF sensor signals, fuel pump or ignition (piggy back system). Piggy-back fuel controllers are popular because they allow users to modify stock fuel injection without replacing the entire ECU. They operate in various ways. Some of them modify the injector duty cycle control signals as they travel from the ECU to the injectors. Others modify input data to the ECU (like MAF for example), effectively “tricking” the ECU into delivering more or less fuel at a given RPM. Using flex fuel in many cases also demands aftermarket ECUs. (Flex) Fuel, LPG and E85E85 fuel is fuel consisting of roughly 85% ethanol and 15% petrol. The petrol is used to prevent cold start issues. Using E85 may require extra modifications to the fuel system: the fuel pump must be able to handle it, ethanol clean out the system of dirt and rust, clodding up the fuel filter. E85 also needs a very different fuel/air mix to ignite, so the injection system must be altered accordingly. Due to the limited availability of E85, it makes sense to equiped the engine with a fuel management system that copes with both E85 and petrol, so called flex fuel systems. Typically this requires after market EFI systems. 0 Topics 0 Posts No posts Fuel InjectorsFuel injectors spray fuel under pressure into the port (port injection) or into the cylinder (direct injection). Intercooler (IC, FMIC)An intercooler is just another name for a heat exchanger that is used to cool air that has been compressed by either a supercharger or a turbocharger. ITis placed somewhere in the path of air that flows from the turbo or supercharger to the engine. An intercooler is needed because of the physics of air described in the Ideal Gas Law, that is PV=nRT. When the intercooler sits in front of the car, to benefit from wind from driving the car to vent the absorbed heat, we call it an FMIC: front mounted intercooler. Explaining the ideal gas law as basic as we can, we can say that because pressure and temperature are directly proportional, as you create more pressure with your turbo or supercharger, you produce more heat as well. Hot air is less dense and therefore contains less molecules of oxygen per unit volume. This means less air for the motor in a given stroke and therefore less power produced. Hot air also causes a higher cylinder temperature and therefore can aid in pre-detonation of the combustion cycle causing detonation. Internals (ported heads, pistons, rods, gaskets, crankshafts, etc)More oxygen in a car, combined with extra heat from burning more oxygen may trigger pre-ignition or uncontrolled explosions in the cylinder. One of the counter measures is the reduce the Compression Ratio (CR). Where some naturally aspirated engines may have a CR of up to 12.5 : 1, boosted engines tend to lower the CR to 8.5:1 . To lower compressions various things can be done, e.g. using shorter piston rods, thinkers pistons, thicker head gaskets. The head of an engine, where the valves and camshafts are located in many engines, may also be altered to gain flow compared to the stock engine. This will improve the volumetric efficiency of a car and reduce backpressure, basically make the engine a better airpump. 0 Topics 0 Posts No posts Nitrous Oxide (NoS)Nitrous Oxide (N20, aka laughing gas) is a gas that can be added to the air via the intake manifold or in the intake piping. Even though the gas itself is not flammable, it delivers more oxygen than atmospheric air by breaking down at elevated temperatures, thus allowing the engine to burn more fuel and air. Additionally, since nitrous oxide is stored as a liquid, the evaporation of liquid nitrous oxide in the intake manifold causes a large drop in intake charge temperature. This results in a smaller, denser charge, and can reduce detonation, as well as increase power available to the engine. 0 Topics 0 Posts No posts Oil catch tankAn oil catch tank is a great way to keep oil blow-by from lowering the octane rating of your fuel. The crank case pressure on boosted and even non-boosted motors will often exceed ambient air pressure outside the engine. This causes the oil vapors to leave the engine and enter the combustion chamber. These oil vapors can lower octane ratings by as much as 2 points. 0 Topics 0 Posts No posts Oil coolers, pumps and turbo timerA turbo timer prevents heat soaking of the turbo charger by keeping the engine oil flowing even after shutting down the car and removing the key. Oil gets very hot from a turbochargers, because it needs to keep the turbocharger as cool as possible, while the turbocharger is heated up from 950 C exhaust gas. Some tuners also choose to install an additional oil cooler to vent this stored heat of the oil when the oil is flowing. To make sure that oil is pumped into upgraded turbochargers an additional oil pump may be fitted to reduce the risk of a failure of the oil system, potentially destroying the engine and turbocharger. An additional oil pump can be required if the turbocharger is below the oil pan and gravity wouldn't help getting the hot oil out of the turbocharger. 0 Topics 0 Posts No posts SuperchargerA supercharger (also known as a blower) is an air compressor used to compress air into the cylinders of an internal combustion engine. The additional mass of oxygen-containing air that is forced into the cylinders improves the volumetric efficiency of the engine which allows the engine to burn more fuel and makes it more powerful. A supercharger can be powered mechanically by belt-, gear- or chain-drive from the engine's crankshaft. Positive displacement pumps (e.g. Eaton, Lysholm, G-lader) deliver a fixed volume of air per revolution at all speeds. Internally, there are two (sometimes three) lobes that rotate, sucking in the air and force-feeding it to the engine. A centrigual supercharger (e.g. Rotrex) looks more like the compressor house of a turbocharger. The first type does not suffer from lag at all, but at high speed they take a lot of engine power to keep delivering the needed boost. 0 Topics 0 Posts No posts Theory, formulas and measurementsIf you have an article or question about the theory behind engines or forced induction in particular, this is the section to ask them. Most of us recognize the parts when we look at them, but why are the built the way they are ? The engineering behind each part is more complex than meets the eye. 0 Topics 0 Posts No posts TurbochargerTurbo refers to the word Turbine; which is the wheel that is spinned by the exhaust. The exhaust rotates an axle that connects the turbine housing with the compressor housing. In the compressor house, cold air is sucked in and compressed. Typically an intercooler is placed between the compressed (charged) air and the actual intake manifold, because a turbocharger gets very hot from the exhaust. The system is more efficient and suffers less from lag if the turbine housing is close to the exhaust manifold. Sometimes more than one turbo is installed (twin turbo or quad turbo), sometimes the turbo is more efficiently using the energy from the exhaust by carefully splitting the exhaust from each cylinder to rule out backpressure (twin scroll ). 0 Topics 0 Posts No posts Wastegates (External)A wastegate enables exhaust to bypass the turbine housing. This is necessary to control the boost limit; an engine is usually tuned for a specific power demand; to overrun boost, meaning giving the engine too much oxygen may reduce efficiency (air fuel ratio may become lean) and cause damage to parts. Some wastegates are part of a turbocharger, sometimes external wastegates are fitted onto an engine to have more boost control from the cockpit. 0 Topics 0 Posts No posts Water/Methanol InjectionOn a simple level, it's intercooling and race gas combined. When you inject water and methanol into the intake stream, you cool the air as the liquids evaporate. When you get into the combustion chamber, it slows the flame, acting just like octane. Colder air is denser, and thus contains more oxygen per volume. This will add power to your car. The fact that some of the volume is taken by water particles is neglectable. You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum
Intense imaginal "relationships" longings moodswings violent turbulences creativeelations out of nowhere lifting the undisclosed soul into the clouds in the suburban back yard "temoignages" moments of witness to a conditionof sudden grace marked in diaries by a star as "special signs" the gold threads in the weave the inexpressibility of life's fleeting moments its transitoryepiphanies a brief shading of light on the sideof a building the abrupt rising of a flock of birds into the aira piece of classical music heard on the radioa face on the bus a brother's smile the odd buoyantbeing-alive quality everywhere a rare harmony and calm as if a dark sky opened suddenlyto reveal with wondrous clarity the constellations he so loved Dec. 9, 1948 (Wednesday) the "all over" feeling that makes of the incidental a never ceasing wonder and spectacle of the spiritual 11 comments: Tom, don't you think Cornell's quirky (but touching) habit of shadowing innocent-looking youths has cinematic possibilities? Imagine a bony, oh, Billy Bob Thornton tailing an angelic shopgirl around a Hopperesque Manhatten--like James Stewart and Kim Novak in San Francisco. And then, in Travis Bickle fashion, he writes about her in his diary. Well, I am trying to imagine JC, in the basement of his mother's cramped little house at 37-08 Utopia Parkway in Flushing, Queens, staring into the mirror of one of his boxes and saying, "Yah talkin to ME?" This is toooooooooooooooooooooo long for me Thomas, way too long and you expect me to read such! Oh my!*teasing*I do not know this Mister Cornell. I am going to have to go research.The loss of all those 'Caps' has me confused now. I am so use to them with you. Just wait until I start using them, I will confuse you! There is also no punctuation! Why? Ok leaving that aside, the images within are striking and I am especially liking the 'marbles toy birds seen though the magic prisma child's vision the mind assembling a cosmologya bricolage of bits of this and bits of thatmaps pieces of cloth illustrations in encyclopedias'Thought provoking words, you. There's magic in those boxes,of pasts and imagination. Cornell makes us focus on the rose-tinted maps of our own lives. And i also really like how you've written this piece - filling your own boxes. I don't know if JC ever wrote poetry, but if he had, they would have been in this style. My little lowercase dust-bit lines were meant as a sort of helpful filler, not so much captions as microcosmic asides, floating between and giving breathing space to the discrete worlds of Cornell's magical bricolage. (It is true that this time a flock of the usual Caps were left out to graze in the back pasture overnight; I think maybe a little airing every now and again does them a world of good.) Just to let you know I did go 'research'. I am now knowing a little bit more about this 'self taught' artist and am seeing how your words connect.See, I should do that first before commenting *sigh*But thank you Thomas, for educating me. It may be the world of a child's wonder -- or of the wonder of the sensitive soul who remains a grownup child -- is a sea of treasures, dreams and mysteries in which all minds are forever drifting boats (barcas a la deriva). These images, your words are the guiding principles I think of when I write -- that accumulation of detail, the tidbits of life, woven into some fabric. I'm working on that in mixed media, as well, but will never reach Cornell's level. I will definitely benefit from re-reading your work in light of this comment. Yes, the intrication and implication of the particulars of the memoria, the places and the persons and the fragments of epiphanic retrieved landscapes, are very Cornellian -- if we were to be able to posit a Cornell transported out of his cramped little basement in Flushing to do his collecting of images and objects in the probably equally mysterious expanses of the plains.
Delaware County Fair exhibits Railroad History Come to the Delaware County Fair 2018 and visit the Delaware County Historical Society’s exhibit “History of Rail Transportation in Delaware County” As you drive through Delaware County, you notice it is criss-crossed by railroad tracks. Those railroad tracks powered the growth of Ohio and Delaware County for many decades. The railroads brought people, goods, and raw materials for our towns, cities, and industries. Those same railroads took our many manufactured goods to markets everywhere: Sunray Stoves,Delaware Chairs, and Ciro Cameras. This year’s Fair Booth Exhibit pays tribute to those railroads. The exhibit offers rare photographs of trains, CD&M interurban rail cars, disaster photos, maps of routes and the people of the railroad. You will also find original railroad artifacts available for viewing including the real bell used on a locomotive. Flood Damaged Railroad Bridge Last Day at Big 4 Visit our booth in the Coliseum* and step into Delaware County’s Railroad History. *Our location in the Coliseum building has changed, we are now to the left of the main doors. Free Prize Drawing Stop by our booth and make a free entry for a drawing to win a prize package worth $70 including: History of Delaware County book Delaware History DVD Historical Society mug & coasters Full One-year membership to the Delaware County Historical Society. The Barn at Stratford Our fair booth will have a Historic Barn display featuring The Barn at Stratford, our Historic Barn Event Venue. Learn about this beautiful event space in nearby Stratford that has won Delaware Gazette “Readers’ Choice” awards. See photos of weddings, anniversary celebrations, retirement party, business meetings, and corporate events that The Barn at Stratford has hosted. Talk with Connie Hoffman, Venue Manager, or one of our volunteers about holding your event at our historic 1840’s barn. About the Delaware County Fair The Delaware County Fair , since 1834, has a long tradition of not only providing an enjoyable place for people to exchange ideas, demonstrate skills and exhibit products, but is also a great source for recreation, entertainment, visiting and learning. The Delaware County Fair hosts many outstanding events including 5 days of the best in harness racing capped off by the prestigious Little Brown Jug on Thursday as well as displays from 100’s of exhibitors and a full schedule of motor sports events in the motor sports complex ranging from demolition derbies to school bus racing. About The Society The Delaware County Historical Society is a non-profit organization funded by donations and fueled by a marvelous corps of dedicated volunteers. We collect, conserve, research, and catalogue artifacts of historical import. We obtain, maintain, and make available to the community historic places including The Barn at Stratford. We support county school history teachers and students. We prepare and present programs and exhibits year-round to educate and promote Delaware County History.
Q: Display target data from firebase I display a list of my targets in fragmentA, when I click on one of them, I pass the guid of this target to the fragmentB After that, I try in the fragmentB display the data of this target for this guid: private fun fetchTarget(guid: String) { val uid = firebaseUser!!.uid // Attach a listener to read the data at the target id databaseReference?.child("targets")?.child("users") ?.child(uid)?.child("targets")?.child(guid)?.addValueEventListener(object : ValueEventListener { override fun onDataChange(dataSnapshot: DataSnapshot) { val data = dataSnapshot.value as? HashMap<String, String>? val name = data?.get("name") ?: "" val description = data?.get("description") ?: "" if (name.isEmpty()) Log.d("some", "nameIsEmpty") else updateViewsContent(name = name, description = description) } override fun onCancelled(databaseError: DatabaseError) { Log.d("some", databaseError.message) } }) } Here I get the guid: -LmfEVnwgqCUqt7beHDg And in my console i have next structure: Unfortunately I can't display data of target, though like all the chains I installed Q: How i can download -LmfEVnx-y7c3oh8_U9F ? A: To display the data that belongs to a single guid, you should use a query and then iterate through the DataSnapshot object like in the following lines of code: val uid = FirebaseAuth.getInstance().currentUser!!.uid val rootRef = FirebaseDatabase.getInstance().reference val targetsRef = rootRef!!.child("targets").child("users").child(uid).child("targets") val query = targetsRef.orderByChild("guid").equalTo("-LmfEVnwgqCUqt7beHDg") val valueEventListener = object : ValueEventListener { override fun onDataChange(dataSnapshot: DataSnapshot) { for (ds in dataSnapshot.children) { val target = ds.getValue(Target::class.java) Log.d(TAG, target.name) } } override fun onCancelled(databaseError: DatabaseError) { Log.d(TAG, databaseError.getMessage()) //Don't ignore errors! } } query.addListenerForSingleValueEvent(valueEventListener) The result in the logcat will be: fgg
Q: Replacing Restlet Error page Restlet error pages looks like this: Is there a way to replace Restlet Error pages with custom template and/or redirect to another page (error html pages)? A: There are two ways to that: Create a custom status service From Restlet 2.3, use annotation exceptions You can return either custom HTML, text or structured content like JSON leveraging Restlet converters. This link could give you hints about the way to implement this: https://templth.wordpress.com/2015/02/27/exception-handling-with-restlet/. Hope this help you. Thierry
Apparently this happened Sunday night at Clive Davis' pre-Grammy party in Los Angeles, and the target was Jonah Hill's manager-brother, Jordan Feldstein, according to E! News. Reportedly Feldstein — who also manages Maroon 5 — has been having a spat with Sharon's daughter Kelly. Apparently Kelly and Feldstein revisited their feud before Kelly walked away and her mom decided to get involved. Photos from the event show Sharon hurling a stream of water at Feldstein (and over Sara Bareilles, who got caught in the crossfire). “They were going back and forth and then all of sudden, food was flipped onto Jordan,” a witness told E!. “He got up to walk away and then Sharon threw a glass of water at him.” E! reported the cause of the friction between Feldstein and Kelly Osbourne is a mystery, but has been happening for some time. Feldstein made news in November when he married Clint Eastwood's daughter Francesca Eastwood in Las Vegas, and it was annulled a week later.
North Korea's state-run Korean Central News Agency reported on Monday morning in Pyongyang that leader Kim Jong-un is in Singapore for Tuesday’s historic summit with President Trump — breaking its silence to citizens who have long been kept in the dark about the timing of the momentous occasion, the AP reports. The details: A report by the outlet, the AP notes, said both leaders will exchange “wide-ranging and profound views” on establishing a new relationship, building a “permanent and durable peace mechanism” and the denuclearization of the Korean Peninsula. The backdrop: Until today, the nation's official state-run media had previously only reported that both leaders would meet, but it hadn’t informed citizens about the time and place of the meeting — let alone that Kim had arrived in Singapore earlier today. Previously, the current top story in North Korea centered on Kim's visit to a seafood restaurant in Pyongyang.
Of all the Warn winch mounting systems, the Trans4mer winch mounting system offers you the most versatility. It can be configured dosens of different ways to match how you work or play with your truck. The Warn Grille Guard is the foundation of the Trans4mer sytem. The grille guard comes with two uprights and two crossbars, and bolts directly to the frame of your vehicle. It is a required component because it provides the base for all other options.
Ambient air pollution impairs regulatory T-cell function in asthma. Asthma is the most frequent chronic disease in children, and children are at high risk for adverse health consequences associated with ambient air pollution (AAP) exposure. Regulatory T (Treg) cells are suppressors of immune responses involved in asthma pathogenesis. Treg-cell impairment is associated with increased DNA methylation of Forkhead box transcription factor 3 (Foxp3), a key transcription factor in Treg-cell activity. Because AAP exposure can induce epigenetic changes, we hypothesized that Treg-cell function would be impaired by AAP, allowing amplification of an inflammatory response. To assess whether exposure to AAP led to hypermethylation of the Foxp3 gene, causing impaired Treg-cell suppression and worsened asthma symptom scores. Children with and without asthma from Fresno, Calif (high pollution, Fresno Asthma Group [FA], n = 71, and Fresno Non Asthmatic Group, n = 30, respectively), and from Stanford, Calif (low pollution, Stanford Asthma Group, n = 40, and Stanford Non Asthmatic Group, n = 40), were enrolled in a cross-sectional study. Peripheral blood Treg cells were used in functional and epigenetic studies. Asthma outcomes were assessed by Global Initiative in Asthma score. Fresno Asthma Group Treg-cell suppression was impaired and FA Treg-cell chemotaxis were reduced compared with other groups (P ≤ .05). Treg-cell dysfunction was associated with more pronounced decreases in asthma Global Initiative in Asthma score in FA versus the Stanford Asthma Group. Foxp3 was decreased in FA compared with the Fresno Non Asthmatic Group (P ≤ .05). FA also contained significantly higher levels of methylation at the Foxp3 locus (P ≤ .05). Increased exposure to AAP is associated with hypermethylation of the Foxp3 locus, impairing Treg-cell function and increasing asthma morbidity. AAP could play a role in mediating epigenetic changes in Treg cells, which may worsen asthma by an immune mechanism.
Q: How do you extract the value of a regex backreference/match in Powershell I have a text file containing lines of data. I can use the following powershell script to extract the lines I'm interested in: select-string -path *.txt -pattern "subject=([A-Z\.]+)," Some example data would be: blah blah subject=THIS.IS.TEST.DATA, blah blah blah What I want is to be able to extract just the actual contents of the subject (i.e. the "THIS.IS.TEST.DATA" string). I tried this: select-string -path *.txt -pattern "subject=([A-Z\.]+)," | %{ $_.Matches[0] } But the "Matches" property is always null. What am I doing wrong? A: I don't know why your version doesn't work. It should work. Here is an uglier version that works. $p = "subject=([A-Z\.]+)," select-string -path *.txt -pattern $p | % {$_ -match $p > $null; $matches[1]} Explanation: -match is a regular expression matching operator: >"foobar" -match "oo.ar" True The > $null just suppresses the True being written to the output. (Try removing it.) There is a cmdlet that does the same thing whose name I don't recall at the moment. $matches is a magic variable that holds the result of the last -match operation. A: In PowerShell V2 CTP3, the Matches property is implemented. So the following will work: select-string -path *.txt -pattern "subject=([A-Z\.]+)," | %{ $_.Matches[0].Groups[1].Value } A: Yet another option gci *.txt | foreach { [regex]::match($_,'(?<=subject=)([^,]+)').value }
The Romanoffs: Amazon Releases Trailer for Matthew Weiner Series by Jessica Pena, August 14, 2018 Meet The Romanoffs. Amazon has just released a new trailer for their upcoming TV show from Mad Men creator Matthew Weiner. The drama follows “eight separate stories about people who believe themselves to be descendants of the Russian royal family.” The cast includes Isabelle Huppert, John Slattery, Amanda Peet, Diane Lane, Christina Hendricks, Marthe Keller, Jack Huston, and Corey Stoll. The highly anticipated original contemporary anthology series, The Romanoffs, is set to premiere on Amazon Prime Video Friday, October 12 with new episodes released weekly, on Fridays. This is the first anthology series for Amazon Prime Video that will roll out on a weekly basis. The Romanoffs will be available initially in the original version in over 200 countries and territories, with dubbed foreign language versions coming in early 2019. “The Romanoffs is an ambitious event series that will be the first-ever anthology released weekly on Prime Video,” said Jennifer Salke, Head of Amazon Studios, “Filmed around the globe and featuring an incredible, star studded cast, each episode will be a surprise gift to the audience. We are grateful to Matthew Weiner for bringing this groundbreaking series to life for our Prime audience.” The Romanoffs is created, written, directed and executive produced by nine-time Emmy award winner Matthew Weiner (Mad Men), featuring eight separate stories about people who believe themselves to be descendants of the Russian royal family. Set in seven countries around the globe, The Romanoffs was shot on location in three continents collaborating with local productions and creative talent across Europe, the Americas, and the Far East. Each story takes place in a new location with a new cast. The first episode, “The Violet Hour’ stars Marthe Keller, Aaron Eckhart, Ines Melab and Louise Bourgoin and the second story, “The Royal We,” starring Corey Stoll, Kerry Bishe, Janet Montgomery and Noah Wyle.
package crazypants.enderio.base.invpanel.database; import net.minecraft.item.Item; import net.minecraft.nbt.NBTTagCompound; public interface IItemEntry { Item getItem(); int getDbID(); int getHash(); int getItemID(); int getMeta(); NBTTagCompound getNbt(); boolean equals(int itemID, int meta, NBTTagCompound nbt); }
Treatment of late recurrent vaginal malignancy after initial radiotherapy for carcinoma of the cervix: an analysis of 73 cases. To evaluate the reirradiation therapy in late recurrent vaginal malignancy after initial radiotherapy for carcinoma of the cervix. From July 1972 to July 1992, 73 cases of late recurrent (over 5 years) vaginal malignancy after initial radiotherapy for cervical cancer were treated in our hospital. Both the original and recurrent cancers were biopsy-proven squamous cell carcinoma. All of these patients received reirradiation therapy; chemotherapy or operation was combined when necessary. The reirradiation was planned according to the site and volume of the recurrent tumor, previous radiation dose, and radiation side effects. Brachytherapy was mainly used. Before 1981, radium therapy was delivered at 30-40 Gy in 3-5 fractions to tumor base within 3-4 weeks. High-dose-rate (100 cGy/min) cobalt-60 afterloading therapy (Ralstron therapy) has been used instead of radium since 1981; the dose to the tumor base was 20-35 Gy/3-5 fractions/3-4 weeks. Then, vaginal mold was supplemented with a dose to a point 0.5 cm below the surface of the vaginal mucosa at 20-30 Gy/4-6 fractions/2-3 weeks. When the vulva or groin was involved, cobalt-60 or high-energy electron beam radiation was added with a dose at 30-40 Gy. Among these, 61 patients received irradiation therapy alone. Eleven patients received irradiation combined with chemotherapy. One patient received hysterectomy after reirradiation. The 2-, 3-, and 5-year survival rates in this series were 54.7% (40/73), 46. 6% (28/60), and 40.3% (21/52), respectively. The 5-year survival rates for upper, upper-middle, and upper-lower vaginal tumor were 81. 8% (9/11), 33.3% (5/15), and 25.0% (3/12), respectively. The effect for upper vaginal recurrent malignancy was remarkably better than that for the upper-lower rate (P < 0.05). The local control rates for tumor >4 and <4 cm were 26.6% (4/15) and 86.5% (32/37), respectively (P < 0.01). The side effects of reirradiation in this series were serious: both moderate and severe radiation reactions were rectum 13.6% (10/73), hematuria 12.3% (9/73), vesicovaginal fistula 1.4% (1/73), and rectum-vaginal fistula 11.0% (8/73). We conclude that reirradiation for late recurrence in the vagina after previous radiotherapy for cervical cancer is valuable. Early detection and treatment could achieve better results. The smaller the recurrent tumor volume, the better the treatment effects. Reirradiation therapy should be carefully managed in order to reduce the complications as much as possible.
Pages Monday, 27 June 2016 Banh Banh, Peckham Rye When I was travelling around the South of Vietnam, I was besotted by the food there. Giant bowls of steaming hot broth came with tangles of noodles, and baskets of fresh glistening herbs to tear into, to season each mouthful. Each street corner was cluttered with ladies hunched over charcoal barbecues, wafting smoke lazily as skewers of meat sizzled away. Every scent was mouth-watering, and I found it almost impossible to go by several hours without a snack. Banh Banh has opened recently in Peckham Rye. Great! Near my house. Owned by Peckham-born Vietnamese siblings, the restaurant inside is light and airy, a small number of wooden tables, nearly all booked. The menu is short, concise and keenly priced, ranging across the ubiquitous summer rolls, through to noodle salads and pho. Banh khot pancakes (£9) pictured above are their speciality; small, crisp savoury pancakes, their predominant flavour is coconut. A large prawn nestles in the middle, and the idea is to wrap the pancake in lettuce and herbs, dip in a nuoc cham-based dipping sauce, and eat. It's a messy business, and unfortunately I didn't really get on with them. They were just incredibly bland. Flock and Herd fish sauce wings (£6) were impressive for the meat's good provenance, but were not even comparable to ones better, such as Salvation in Noodles' version, or those of Smoking Goat. They were apologetic in flavour, lacking in a crisp exterior. We lost interest quickly. It was a very warm evening, so instead of the pho, we opted for the cold bun noodle salad (£9). This came with barbecued pork patties, a spring roll, julienned lettuce and cucumber, all to be mixed in with fried shallots, noodles and a fish sauce dressing. Once again, I found the flavours to be muted; it was all very mild and felt a bit generic. Better was the papaya salad, which had proper acidity and zing. The black sesame cracker was a nice touch, to pile the salad on to. Likewise too, the beef in betel leaves drew no complaints with us, and we happily munched away on these, drenching the vermicelli noodles underneath with more nuoc cham sauce. All in all, it was all a bit meh for me. I had expected fun and exciting things from a place that billed itself as 'Vietnamese street food', but actually everything felt a little tame. I really wanted to like Banh Banh, but there was just no magic. Banh Banh46 Peckham RyeLondon SE15 4JR I really wanted to love Banh Banh but have to agree with you. I found the food I tried a bit bland and underwhelming. Banh Khot were one of my favourite discoveries in Vietnam earlier this year. Sad to find the ones at Banh Banh weren't all that.
Disable Right Click on Web Page using jQuery - sourabhmca14 http://dotnetaid.com/2011/09/22/disable-right-click-on-web-page-using-jquery/ ====== viraptor Good $DEITY, why? It's not 90s anymore? I hope this was submitted for making fun of the author rather than actual interesting bit of code.
--- abstract: 'Dusty starbursts were more numerous around $z\sim$ 1 than today and appear to be responsible for the majority of cosmic star formation over the Hubble time. We suggest that they represent a common phase within galaxies in general which is triggered by the growth of cosmic structure.' author: - 'D. Elbaz, E. Moy' --- Deep surveys - infrared - galaxy formation Introduction ============ Dusty starbursts producing stars at a rate of about 50 M$_{\odot}$ yr$^{-1}$ were very efficiently detected by ISOCAM onboard the Infrared Space Observatory (ISO) at 15$\mu$m below $z\sim$ 1.3 where the broad bump due to aromatic features in the mid-IR (PAHs, polycyclic aromatic features) remains within the ISOCAM filter. These luminous infrared (LIR) galaxies with infrared luminosities greater than $L_{\rm IR}(8-1000\,\mu {\rm m})=\,10^{11}$ L$_{\odot}$ were producing more than thirty times their present-day comoving infrared luminosity density at $z\sim$ 1 than today, when it is only a few percent of the bolometric luminosity radiated by galaxies in the optical to near-infrared (Elbaz [*et al.*]{} 2002, Chary & Elbaz 2001). More distant LIR galaxies were detected in the sub-millimeter with SCUBA (Chapman et al. 2003 and references therein), with IR luminosities of several 10$^{12}$ L$_{\odot}$ due to sensitivity limits, but their large number density confirms the same trend as observed with ISO, i.e. that the bulk of the cosmic history of star formation was dominated by dusty star formation and can only be derived when carefully accounting for this dusty starbursting phase taking place in most if not all galaxies. This is also suggested by the fact that these galaxies contribute to about two thirds of the cosmic infrared background (CIRB, Elbaz et al. 2002), which contains about half or more of the total energy radiated by galaxies through the Hubble time, and dominate the cosmic history of star formation (Chary & Elbaz 2001). Are these galaxies dominated by star formation or nuclear activity ? What is triggering their strong activity ? Is it triggered by external interactions or did it happen naturally within isolated galaxies ? ![[**a)**]{} 15$\mu$m versus radio continuum (1.4 GHz) rest-frame luminosities. Small filled dots: sample of 109 local galaxies from ISOCAM and NVSS. Filled dots with error bars: 17 HDFN galaxies ($z\sim$0.7, radio from VLA or WSRT). Open dots with error bars: 7 CFRS-14 galaxies ($z\sim$0.7, Flores et al. 1999, radio from VLA). Open diamonds: 137 ELAIS galaxies ($z\sim$ 0-0.4). [**a)**]{} histogram of the redshift distribution of field (white) and ISOCAM (dark) galaxies which belong to redshift peaks as defined by Cohen et al. (2000).[]{data-label="FIG:radio"}](elbaz_mykonos_fig1.eps){width="12cm"} Origin of the luminosity of luminous infrared galaxies at z=1 ============================================================= Among the fields surveyed in the mid-IR with ISOCAM, the Hubble Deep Field North (HDFN) and its Flanking Fields (total area of 27 $arcmin^2$), is the best one to study the contribution of active galactic nuclei (AGN) to the IR luminosity of these LIR galaxies. Thanks to the deepest soft to hard X-ray survey ever performed with Chandra in the HDFN, it is possible to pinpoint AGNs including those affected by dust extinction. Among a total number of 95 sources detected at 15$\mu$m in this field (Aussel et al. 1999, 2003 in prep.; with 47 above a completeness limit of 0.1 mJy), only 5 sources were classified as AGN dominated on the basis of their X-ray properties (Fadda et al. 2002). Hence, unless a large number of AGNs are so dust obscured that they were even missed with the 2 Megaseconds Chandra survey, the vast majority of ISOCAM LIR galaxies are powered by star formation. We are then left with the following question: how can one derive a total IR luminosity on the sole basis of a mid-IR measurement ? We showed in Elbaz et al. (2002) that in the local universe, there exists a very strong correlation between the mid-IR and total IR luminosity of galaxies over three decades in luminosity. In order to test whether these correlations remain valid up to $z\sim$ 1, it is possible to use another correlation existing between the radio and total IR luminosity in the local universe and check whether both the mid-IR and radio give a consistent prediction for the total IR luminosity. In the Fig. \[FIG:radio\]a, we have reproduced the plot from Elbaz et al. (2002) complemented with galaxies detected within the ELAIS survey (Rowan-Robinson et al. 2003). Except at low luminosities were the contribution of cirrus to the IR luminosity becomes non negligible, the 1.4 GHz and 15$\mu$m rest-frame luminosities are correlated up to $z\sim$ 1 and therefore predict very consistent total IR luminosities from which star formation rates as well as the contribution of these objects to the CIRB can be computed, leading to the results mentioned in the introduction. ![HST-ACS images of LIR galaxies with 11 $\leq$ log(L$_{\rm IR}/L_{\odot}$) $\leq$ 12 (LIRGs) and $z\sim$ 0.7. The double-headed arrow indicates the physical size of 50 kpc. The IR luminosity increases from left to right and from top to bottom.[]{data-label="FIG:camgal"}](elbaz_mykonos_fig2.eps){width="12cm"} The next question concerns the physical origin of this dusty starburst phase in galaxies (see Elbaz & Cesarsky 2003). In order to address it we have plotted in the Fig \[FIG:radio\]b the histogram of the redshift distribution of the ISOCAM galaxies with a spectroscopic redshift and above the completeness limit of 0.1 mJy in the HDFN. For comparison, only the redshifts where Cohen et al. (2000) found a redshift peak is plotted for field galaxies. One can clearly see that except for 3 ISOCAM galaxies, all are located within these redshift peaks. We have performed Monte-Carlo simulations to compute the probability that a random sample of optical galaxies of the same size than that of ISOCAM galaxies would fall in as many redshift peaks and we found that it is of the order of one percent, and even less if we restrict ourselves to the biggest redshift peaks (Moy et al., in prep). Is this result in agreement with expectations ? As showed by Franceschini et al. (2001), ISOCAM galaxies are relatively massive, hence more subject to belong to denser regions. Moreover LIR galaxies are mostly triggered by interactions in the local universe and one would naturally expect the same to take place in the more distant universe, hence in connection with cosmic structure formation. Thanks to the deepest existing survey with the ACS camera onboard the HST (GOODS survey, Giavalisco et al. 2003), we were able to study the morphology of ISOCAM galaxies in this field centered on the HDFN. A first result follows our expectations: most of these galaxies present a disturbed morphology and this is truer as a function of increasing IR luminosity (see Fig. \[FIG:camgal\]). A second result was less expected: several LIR galaxies appear to be relatively big disk galaxies, which could be affected by a neighboring dwarf galaxy or a passing-by galaxy but they are not major mergers in the main phase of interacting. This is a very important result that should be carefully considered by authors of galaxy formation simulations. A large fraction of present-day stars may originate from a phase of violent star formation triggered by passing-by galaxies even within disk galaxies which could remain as such in the present-day universe. Another important consequence of this type of physical origin for the dusty starburst phase is that there are not enough major mergers in simulations to explain the large excess of LIR galaxies in the distant universe and the fact that they dominate the cosmic star formation history. Indeed each individual galaxy could have experienced several encounters with other galaxies at the time of structure formation which would induce a series of bursts of star formation, each of them responsible for only a few percent of the final stellar mass of the galaxy. [1]{} Aussel, H., Cesarsky, C.J., Elbaz, D., Starck, J.L. 1999, A&A 342, 313 Chapman, S.C., Blain, A.W., Ivison, R.J., Smail, I. 2003, Nature 422, 695 Chary, R.R., Elbaz, D. 2001, ApJ 556, 562 Cohen, J.G., Hogg, D.W., Blandford, R., et al. 2000, ApJ 538, 29 Elbaz, D., Cesarsky, C.J., Fadda, D., et al. 1999, A&A 351, L37 Elbaz, D., Cesarsky, C.J., Chanial, P., et al. 2002, A&A, 384, 848 Elbaz, D., Cesarsky, C.J. 2003, Science 300, 270 Fadda, D., Flores, H., Hasinger, G., et al. 2002, A&A 383, 838 Flores, H., Hammer, F., Thuan, T.X., et al. 1999, ApJ 517, 148 Franceschini, A., Aussel, H., Cesarsky, C.J., Elbaz, D., Fadda, D. 2001, A&A 378, 1 Giavalisco, M., et al. 2003, ApJ (in press, astro-ph$/$0309105) Rowan-Robinson, M., et al. 2003, MNRAS (submitted, astro-ph$/$0308283)
Namling County Namling County (; ) is a county of Shigatse in the Tibet Autonomous Region. Geography Namling is the current administrative name given to the valleys of Oyuk, Tobgyet, and Shang ... [associated]... with both Buddhism and Bon. Through these valleys respectively flow the 'Nang-gung-chu'mang ra chu Tobpu-chu, and Shang-chu rivers, with their various tributaries, which rise amid the southern slopes of the Nyenchen Tanglha range to the north, and flow southwards to converge with the Brahmaputra [called the Yarlung Tsangpo River in Tibet]. The lower reaches of the Yarlung Tsangpo River make "a sharp U-turn around Namjagbarwa Peak in Pai, Namling County." This is regarded as the starting point of the Yarlung Tsangpo Grand Canyon in Nyingchi Prefecture, which stretches and averages over in depth. The county has three geysers. Town and townships Namling Town (, ) Car Township (, ) Dagna Township (, ) Doqoi Township (, ) Êma Township (, ) Gyamco Township (, ) Karzê Township (, ) Lhabupu Township (, ) Mangra Township (, ) Numa Township (, ) Putang Township (, ) Dakce Township (, ) Qum Township (, ) Ratang Township (, ) Rindü Township (, ) Sogqên Township (, ) Tobgyai Township (, ) Development efforts The Namling County Schools Project was founded by Tashi Tsering in 1991, and has been sponsored by the Boulder-Lhasa Sister City Project (BLSCP) since 1994. As of 2013, it supports 53 rural elementary schools. As of 2006, 15 out of the county's 17 towns had cell phone service. As of 2001, potatoes have been introduced in Aimagang (Emagang) as a crop for herdsmen in the county. Potatoes and vegetables were shipped to markets in Xigazê, and production of peas and wheat decreased. The 2009 HIV/AIDS outreach efforts in rural areas of the county appear to have had a positive impact in comparison to a similar non-intervention area of Tingri County, according to Medicus Mundi Switzerland. In 2010, protests of environmental damage by gold mining resulted in arrests and at least one fatality. In 2011, Qin Weiqiang, secretary of the Namling County Party Committee, said that after the "Lhasa–Xigazê Railway is put into operation", the number of tourists in Namling County was expected to increase. Culture "The famous local specialities are silver utensils, Tibetan sword and so on. Namling Town is the office place of Namling with a population 5,000, where are many monasteries." Traditional Tibetan opera is popular in Namling County, and government funding efforts to preserve the tradition were started in 2005. "Xiangba Tibetan play in Namling County of Tibet has a history of more than 700 years. It is one of the four major schools of the blue-mask Tibetan play, and was born in the late 18th century." Local residents preserve "some traditional Tibetan operas such as "Princess Wencheng", "Chimei Gongdan", "Langsa Wenbo" and so on." "Tongdong Gyaibo (1365-1455), the founder of Tibet Opera, was born in Ngamring County. Legend has it that the iron chain bridge over the Xiongqoi River in Namling County was built with funds collected by Tongdong Gyaibo through performances." Namling County and the Xiangqu River Basin were a cultural center of the Supi tribe, known as "The Kingdom of Women", and "one of the earliest tribes in Tibet." After "the end of the sixth century, the Supi tribe moved its political center to the Lhasa River Basin." As of 1999, the county was home to the critically endangered Golden-headed box turtle (Cuora aurocapitata). Monasteries Yungdrungling Monastery "is located at the foot of the Yulha Jiesam mountain in the Numa village in Namling County about 90 km. from Xigazê. The monastery is surrounded by dense wood ... it is one of the four major monasteries of Bon religion in Tibet." Danag Monastery, over 800 years old, is located in Danag Village. The remains of the Dingma Monastery, an 11th-century Kadampa monastery, are located on a hill in the Oyuk Valley. It was founded by Ram Dingma Deshek Jungne, a student of Geshe Potowa. The Gongon Lhakhang temple, in Oyuk Township, was said to be built by Songtsen Gampo, and frequented by Padmasambhava and his students Namkhai Nyingpo and King Trisong Detsen in the 8th century. Oyuk Chigong or Oyuk Jara Gon is a hermitage located at Jarasa in lower Oyuk. It is "the abode or castle of the protector deity Dorje Lekpa: guardian of the Dzogchen teachings." The Gelukpa monasteries of Drungzhi and Sogchen are located in the Tobgyel Valley. Gadan Chiokorling Monastery, located from the county center, originally called Gegon Songrapling Monastery, became part of the Gelgupa Sect during the reign of the 5th Dalai Lama. Notable people Mokchokpa Rinchen Tsondrü (1110-1170?) of the Shangpa Kagyu was born in the Lhabu grasslands of the county's Shang Valley. Lobsang Yeshe, Fifth Panchen Lama (1663–1737) was born in Namling County. Tenpai Wangchuk, 8th Panchen Lama (1855–1882) was born in Namling County. Guisang Sang (b. appx. 1958), who joined the Tibet Mountaineering Team in 1982, was the first woman in Asia to reach the top of Mount Everest twice. Tashi Tsering (educator) (1929-2014) References External links Map of locations in Namling County Category:Counties of Tibet Category:Shigatse Category:Gold mining in China
LATEST BLOG L’Eroica That perfectly pitch-black nothingness that you only find right before dawn, still draped over the Italian countryside, is being pulled back slowly by the coming day. An old, thick chain elicits a rich, rhythmic rattle from the yellowed steel of a Regina. A lot’s changed since it was new. You can almost count the teeth while it spins. You’re over-geared, and perhaps a little over-excited. Don’t worry. There’s only 200km to go. That opening stretch comes and goes in a fog of anticipation and trepidation. With sparse light and sparser company, friends call to one another out in the empty, inky darkness and except for scattered replies and whirling freewheels, the roads are silent. It’s all a blur, like the tarmac racing past under wheel. On any other day the weathered and crumbling stonework and the grand old gates of the Castello di Brolio would be a welcome site. It’s a fine property that makes finer wine and past the walls and the woods that surround it, the vineyard gives way to the Tuscan countryside in all it’s glory – rolling swathes of ochre and olive and green as far as the eye can see. On any other day, you might stop for a picture. Not now. Tiny flames flicker and light the route through the still-black Brolio, up the cypress-lined ascent away from the familiar comfort of tarmac and up towards the dusty, uneven, ragged hell of the gravel. The Strade Bianche. What you came for. What you thought you were ready for. Loose dirt and the scars cut deep through the grit by heavy rains mean that the strade are never easy. Even when they’re flat, they’re testing, coaxing you to go faster than you should. Inviting a puncture. Begging you to put a wheel wrong. And when they go up? Chianti’s hills are far from the malicious extremes of the north, but farther still from benign. Climb up a 15% stretch of uneven gravel on an antique with no compact and you’ll know all about it. It ain’t all bad though. The highs are sweeter than the lows are sour and just when you’re almost broken, the road relents. A stretch of tarmac, perhaps, or a rest stop. Wine. Cakes. Coffee. Ribollita. There’s some grappa under the counter if you’ve really had a hard time. Those moments spent on the grass, or stretched out on a low stone wall beneath the gentle warmth of October’s afternoon sun, will last a lifetime. The rose tint of hindsight will take care of the rest. After the finish line, the struggle will seem heroic. After a day or two, it will even seem … fun. This sport’s hilarious like that, in a peculiar, twisted way. Not everyone’s idea of amusement, perhaps, but if you’re into it there’s nothing better. Samuel Beckett called it dianoetic. It was the laugh of laughs to him, saluting what he thought was the highest joke: Suffering. He’d have made a good cyclist. Colin O’Brien is a freelance cycling journalist based in Rome, Italy. He was invited to come on an inGamba trip once, and never left. He can be found staring at blank pages in Borgolecchi.
449 So.2d 1195 (1984) Lassiter A. MASON, Jr., et ux., Plaintiffs-Appellees, v. David Arthur COEN, Defendant-Appellant. No. 16235-CA. Court of Appeal of Louisiana, Second Circuit. April 30, 1984. *1197 Donald R. Miller, Shreveport, for defendant-appellant. Love, Rigby, Dehan, Love & McDaniel by J. Philip Goode, Jr., Shreveport, for plaintiffs-appellees. Before PRICE and HALL, JJ., and McCLENDON, Judge Pro Tem. HALL, Judge. This suit arises out of an agreement between the parties whereby the Masons agreed to sell a residence to Coen and to lease the residence to Coen for one year pending closing of the sale. When Coen failed to pay the monthly rent due under the lease, the Masons filed suit for eviction, past due rent and attorney fees. By supplemental petition the Masons prayed for judgment terminating Coen's rights under the contract. Coen reconvened, alleging breach of contract and seeking recision of the agreement, return of a $4,500 part payment made by him, and damages. After trial, the district court found that the contract to sell and lease was breached by Coen's failure to pay the stipulated rent and his failure to close the sale as provided in the agreement, and that under the terms of the agreement Coen was not entitled to return of the $4,500 paid. The court further held that the Masons were entitled to recover $2,226.68 for past due rent, $1,808.25 for lost profits occasioned by Coen's failure to consummate the purchase of the property, and $2,000 attorney fees. Coen's demands were rejected. From a judgment rendered in accordance with the court's findings, Coen appealed. On appeal, Coen contends the trial court erred in not ordering return of the $4,500 deposit, in not awarding damages for expenses incurred by Coen in improving the property, in not awarding attorney fees to Coen, and in awarding the Masons damages and attorney fees. Coen argues that the agreement was first breached by the Masons in filing a previous eviction suit when Coen deducted one-half of the cost of a plumbing bill from a rent check, that the $4,500 deposit should have been placed in escrow by Mrs. Mason, a licensed real estate agent, that the Masons refused to close the sale, that the $4,500 deposit more than covered the rent due under the lease, and that, in any event, the Masons are not entitled to recover rent and damages in addition to the $4,500 paid and forfeited. *1198 Finding merit in the contention that the Masons are not entitled to recover rent and damages in addition to the amount paid to them, we amend the judgment to delete the awards for rent and lost profits, and otherwise affirm. On January 6, 1982, the Masons and Coen entered into a purchase agreement whereby the Masons agreed to sell and Coen agreed to buy a residence located at 4015 Akard Street in Shreveport. The purchase price of the property was $67,000. The terms of sale set forth in the purchase agreement were a $10,000 cash payment and the assumption of an existing VA mortgage. In connection with the execution of the purchase agreement, Coen deposited $500 as a prepayment of real estate commission to be deducted from the sale price at the time of closing. The purchase agreement provided that the balance of the $10,000 cash was to be paid in two installments, $4,000 on February 19, 1982, and the remainder, $5,500, at the end of the one-year lease executed in connection with the purchase agreement. The sale was to be closed on or before March 1, 1983. A lease was also entered into which provided for a one-year term commencing on February 1, 1982, and a monthly rental of $631.67. The purchase agreement provides that "(i)n the event of non performance by either party, the other shall have the right to specific performance and/or damages and reasonable attorney fees." The lease provides that "(a)ny rent payment over five days late shall void entire lease/purchase agreement and all funds collected from buyer will be non-refundable and contract will be null and void." Although the purchase agreement and the lease are two separate documents, they contain several cross-references to each other and it is obvious the parties intended these documents to be considered as one agreement or contract. Coen took possession of the premises in accordance with the lease and made the $4,000 installment on the purchase price on March 1, 1982. The Masons paid $2,000 to the two real estate firms as part payment of their commission and retained $2,000. Thereafter, Coen's possession of the premises was uneventful until November 1982 when a dispute between the parties arose as a result of a plumbing bill incurred by Coen. The defendant attempted to deduct one-half of the plumbing bill from his November rent payment. This action was not acceptable to the plaintiffs and an eviction suit was filed. However, the matter was resolved when Coen paid the full amount of the November rent and he continued in possession of the premises. The next month the defendant failed to pay his rent on time, although a $300 partial payment was made in the latter part of the month. The balance of the December 1982 rent, as well as the rent for January 1983, was not paid. On January 14, 1983, the present suit for eviction and past due rent was filed by the Masons against Coen. On March 1, 1983, in accordance with the purchase agreement, the Masons scheduled a meeting to close the sale of the residence but Coen did not attend. On March 9, a judgment of eviction was rendered and Coen vacated the premises. The factual issues were correctly resolved by the trial court. There was no breach of the contract by the Masons. The matter of the plumbing bill was resolved. The Masons never refused to consummate the sale. Coen failed to pay the rent due and refused to complete the sale. There was no obligation on the part of the Masons to escrow the $4,500 part payment. The contract did not provide for the money to be escrowed. The contract called for the money to be paid to the Masons as sellers. Although the real estate broker for whom Mrs. Mason worked cooperated with another realtor on the sale, there was no obligation on the part of her or her firm to hold the money in escrow. LSA-R.S. 37:1455, subd. A(3) and (4), cited by Coen, is not applicable. The contract between the parties is inartistically drawn but is subject to reasonable construction and interpretation. It *1199 is a conjunctive contract to sell immovable property and of lease. LSA-C.C. Arts. 2062, 2063. It contains two primary obligations on the part of the buyer-lessee, the payment of rent and the purchase of the property. The $4,500 part payment is not earnest money because the contract provides for a right of specific performance in the event of default, and with respect to the $500 initially paid the contract expressly provides that it is not to be considered as earnest money. LSA-C.C. Art. 2463; Ducuy v. Falgoust, 228 La. 533, 83 So.2d 118 (1955); Crow v. Monsell, 200 So.2d 700 (La.App. 2d Cir.1967). The contract does, however, provide that in the event of a default in the payment of rent the entire lease/purchase agreement is to be null and void and all sums paid, which would include rent and the $4,500 part payment, are nonrefundable, that is, shall be forfeited. This provision is a penal clause, governed by LSA-C.C. Arts. 2117, et seq. See Richmond v. Krushevski, 243 La. 777, 147 So.2d 212 (1962). A penal clause is a secondary obligation, entered into for the purpose of enforcing the performance of a primary obligation. LSA-C.C. Art. 2117. A penal obligation necessarily supposes two distinct contracts, one to do or to give that which is the principal object of the contract, the other to give or do something, if the principal object of the agreement be not carried into effect. LSA-C.C. Art. 2118. The creditor, instead of exacting the penalty stipulated from the debtor who is in default, may sue for the execution of the principal obligation. LSA-C.C. Art. 2124. The penal clause is the compensation for the damages which the creditor sustains by the non-execution of the principal obligation. He can not demand the principal and the penalty together, unless the latter be stipulated for the mere delay. LSA-C.C. Art. 2125. A penal clause is designed to both fix the damages caused by nonperformance of the principal obligation and act as a constraint to encourage performance of that obligation. However, in no way may the penal clause serve as a vehicle to recover punitive, as opposed to compensatory, damages. Heeb v. Codifer & Bonnabel, Inc., 162 La. 139, 110 So. 178 (1926); Thompson v. Bullock, 236 So.2d 892 (La. App. 3d Cir.1970); Rainey v. McCrocklin, 185 So. 705 (La.App.Orl.1939); Chauvin v. Theriot, 180 So. 847 (La.App. 1st Cir.1938); 43 La.L.Rev. 1315 at 1416. A penal clause is regarded as a stipulation of liquidated damages. Pennington v. Drews, 218 La. 258, 49 So.2d 5 (1950); Burris v. Gay, 324 So.2d 11 (La. App. 2d Cir.1975). Where the parties, by their contract, have determined the sum that shall be paid as damages for its breach, the creditor must recover that sum, but is not entitled to more. LSA-C.C. Art. 1934(5). The penal clause in this contract was designed and intended by the parties to secure performance of both principal contractual obligations, payment of rent and purchase of the property. It was reasonable in amount as relates to contemplated damages and to proven actual damages, and should be enforced. The buyer-lessee is not entitled to return of the payments made. The seller-lessor cannot, however, recover the principal obligations secured by the penal clause in addition to the stipulated penalty. Recovery of the $2,226.68 awarded by the trial court for accrued rent in addition to the penalty amount would allow the creditor to enforce one of the principal obligations of the contract together with the secondary penal clause, contrary to the provisions of LSA-C.C. Art. 2125. Concerning the award for profits in the amount of $1,808.25 lost when the sale failed to materialize, we note first that the Masons' pleadings do not allege or pray for recovery of that item of special damages. When items of special damage are *1200 claimed, they shall be specifically alleged. LSA-C.C.P. Art. 861. Even if the claim for lost profits was properly before the court for consideration, it should have been disallowed because profit from the sale was also one of the objects of the buyer's principal obligation to purchase, and is not recoverable in addition to the stipulated penalty. The contract specifically provides for attorney fees in the event of nonperformance of the contract and in the event it should become necessary to retain an attorney to enforce performance of any obligation thereunder, and the $2,000 awarded to the Masons by the trial court is proper and reasonable. The Masons are not entitled to additional attorney fees for services rendered on appeal, as claimed in the brief filed on their behalf, because they neither appealed nor answered the appeal. For the reasons assigned, the judgment of the district court is amended to delete the awards to the Masons of the accrued rent and lost profits. The judgment in favor of the Masons against Coen is reduced from the sum of $6,034.93 to the sum of $2,000. As so reduced and amended, the judgment is in all other respects affirmed. Costs of the appeal are assessed to Coen. Amended and affirmed.
Our innate immune system, made up mainly of phagocytes, protects our body by exterminating bacteria. To do this, it uses two mechanisms. The first kills foreign bodies within the phagocyte itself. The second kills them outside the cell. These two strategies were already known to researchers, but only in humans and other higher animals. Microbiologists from the University of Geneva (UNIGE), Switzerland, have just discovered that a social amoeba, a unicellular microorganism living in the soils of temperate forests, also uses both these mechanisms, and has done so for over a billion years. Since this amoeba possesses an innate defense system similar to that of humans, while being genetically modifiable, the researchers can therefore carry out experiments on it in order to understand and fight genetic diseases of the immune system. This discovery can be read in the journal Nature Communications. To defend themselves, our immune cells have two mechanisms. The first, called phagocytosis, kills bacteria within the phagocytic cell itself. The cell envelops the foreign body and exterminates it specifically by using reactive oxygen species (ozone, hydrogen peroxide, bleach), generated thanks to the enzyme NOX2. However, when the invader is too large to be taken up, cells use a second defense mechanism which consists of expelling their genetic material, that is to say their DNA. This DNA transforms into sticky and poisoned nets called «neutrophil extracellular traps» (NETs). These DNA nets then capture bacteria outside of the cell and kill them. The ancestor of our innate immune system In collaboration with researchers from Baylor College of Medicine in Huston (USA), Professor Thierry Soldati's team from the Department of Biochemistry of the Faculty of Science at UNIGE studies the social amoeba Dictyostelium discoideum. These microorganisms are bacteria predators. But when food is short, they come together and form a «mini animal» of more than 100,000 cells, called a slug. This will then turn into a «fruiting body» made up of a mass of spores on top of a stalk. Dormant spores will survive without food until the wind or other elements disperse them to new areas where they can germinate and find something to eat. To make up the slug, approximately 20% of cells sacrifice themselves to create the stalk and 80% will become spores. However, there is a small remaining 1% that keeps its phagocytic functions. «This last percentage is made up of cells called «sentinel» cells. They make up the primitive innate immune system of the slug and play the same role as immune cells in animals. Indeed, they also use phagocytosis and DNA nets to exterminate bacteria that would jeopardize the survival of the slug. We have thus discovered that what we believed to be an invention of higher animals is actually a strategy that was already active in unicellular organisms one billion years ago,» explains Thierry Soldati, last author of the study. From social amoeba to humans This discovery plays a primordial role in understanding immune system diseases in humans. Patients with chronic granulomatous disease (CGD) are for example incapable of expressing the functional NOX2 enzyme. Therefore, they suffer recurrent infections, since their immune system lacks the reactive oxygene species that kill bacteria inside the phagosome or via DNA nets. By genetically modifying the social amoeba Dictyostelium discoideum, the microbiologists from UNIGE are able to conduct all sorts of experiments on the mechanisms of the innate immune system. This microorganism can therefore serve as a scientific model for the research on defects in these defense processes, opening the way to possible treatments. ###
/* * Copyright (C) 2009 - present by OpenGamma Inc. and the OpenGamma group of companies * * Please see distribution for license. */ package com.opengamma.strata.math.impl.rootfinding; import com.opengamma.strata.collect.ArgChecker; import com.opengamma.strata.math.MathException; import com.opengamma.strata.math.impl.function.RealPolynomialFunction1D; /** * Class that calculates the real roots of a quadratic function. * <p> * The roots can be found analytically. For a quadratic $ax^2 + bx + c = 0$, the roots are given by: * $$ * \begin{align*} * x_{1, 2} = \frac{-b \pm \sqrt{b^2 - 4ac}}{2a} * \end{align*} * $$ * If no real roots exist (i.e. $b^2 - 4ac < 0$) then an exception is thrown. */ public class QuadraticRealRootFinder implements Polynomial1DRootFinder<Double> { /** * {@inheritDoc} * @throws IllegalArgumentException If the function is not a quadratic * @throws MathException If the roots are not real */ @Override public Double[] getRoots(RealPolynomialFunction1D function) { ArgChecker.notNull(function, "function"); double[] coefficients = function.getCoefficients(); ArgChecker.isTrue(coefficients.length == 3, "Function is not a quadratic"); double c = coefficients[0]; double b = coefficients[1]; double a = coefficients[2]; double discriminant = b * b - 4 * a * c; if (discriminant < 0) { throw new MathException("No real roots for quadratic"); } double q = -0.5 * (b + Math.signum(b) * discriminant); return new Double[] {q / a, c / q}; } }
In recent years, there are growing trends of high-speed processing and save of a large data with the rise of the digital technology. Consequently, a higher integration density and a higher performance are demanded in the semiconductor device equipped in the electronic equipment. As to a semiconductor memory device, for example, in order to realize a higher integration density of DRAM (Dynamic Random Access Memory), the technology to employ a ferroelectric material or high-dielectric material as a capacitor insulating film of a capacitor element constituting DRAM, instead of the conventional silicon oxide or silicon nitride, is widely researched and developed. Also, in order to realize a nonvolatile RAM that can execute a writing operation and a reading operation quickly at a lower voltage, the technology to employ a ferroelectric film having the spontaneous polarization characteristic as a capacitor insulating film is eagerly researched and developed. The semiconductor memory device having such ferroelectric capacitor insulating film is called a ferroelectric memory (FeRAM). The ferroelectric capacitor stores the information by utilizing the hysteresis characteristic of the ferroelectric substance. The ferroelectric capacitor is provided to the ferroelectric memory, and the ferroelectric capacitor is constructed by putting the ferroelectric film between a pair of electrodes as the capacitor ferroelectric film. The ferroelectric film produces a polarization in response to an applied voltage between the electrodes, and keeps a spontaneous polarization even after the applied voltage is removed. Also, the polarity of the spontaneous polarization is inverted when the polarity of the applied voltage is inverted. Accordingly, information can be read by sensing this spontaneous polarization. The ferroelectric memory operates at a low voltage rather than a flash memory, and can execute a speedup writing while achieving a power saving. The ferroelectric film constituting the capacitor of FeRAM is formed of lead zirconate titanate (PZT), PLZT formed by doping La in PZT, PLZT-based material in which Ca, Sr, or Si is micro-doped, a Bi-layer structure compound such as SrBi2Ta2O9(SBT,YI), SrBi2(Ta,Nb)2O9(SBTN,YZ), or the like. Such ferroelectric film is formed by the sol-gel method, the sputter method, the MOCVD (Metal Organic Chemical Vapor Deposition) method, or the like. Normally, an amorphous or microcrystalline ferroelectric film is formed on the lower electrode by the above film forming method, and then the crystal structure is changed into the perovskite structure or the bismuth layer structure by the subsequent heat treatment. As the electrode material of the capacitor, the material that is hard to oxidize or the material that can maintain conductivity even after oxidized must be employed. Commonly, either a platinum based metal such as Pt (platinum), Ir (iridium), IrOx (iridium oxide), or the like or its oxide is widely employed. Also, it is common that, as the interconnection material, Al (aluminum) is employed like the normal semiconductor device. Like other semiconductor devices, a higher integration density and a higher performance are also required of FeRAM. In the future, a reduction of a cell area is needed. It has already been known that it is effective that the stacked structure should be employed in place of the conventional planar structure in reducing the cell area. Here, the “stacked structure” denotes such a structure that a capacitor is formed directly over a plug (contact plug) formed on a drain of a transistor constituting a memory cell. In the FeRAM having the stacked structure in the prior art, the capacitor has a stacked structure, in which a barrier metal, a lower electrode, a ferroelectric film, and an upper electrode are stacked in this order, directly over the plug formed of W (tungsten). The barrier metal has a role to prevent oxidation of the W plug, and the material that fulfills both a function of the barrier metal and a function of the lower electrode is often employed. Therefore, it is impossible to separate clearly the barrier metal and the lower electrode material. Normally, the barrier metal and the lower electrode are formed by a combination of two films or more that are selected from titanium nitride (TiN) film, titanium aluminum nitride (TiAlN) film, iridium (Ir) film, iridium oxide (IrO2) film, platinum (Pt) film, and strontium ruthenium oxygen (SRO: SrRuO3) film. The ferroelectric film constituting the ferroelectric capacitor is formed of an oxide. An oxygen defect is easily caused by the process in a nonoxidative atmosphere, and accordingly the characteristics of the ferroelectric film such as a quantity of inverted charges, a leakage current value, etc. are deteriorated. In order to recover the damage caused in the ferroelectric film, the heat treatment in an oxygen atmosphere must be applied plural times in manufacturing the ferroelectric capacitor. Therefore, a metal that is hard to oxidize in an oxygen atmosphere such as platinum, or the like, or a conductive oxide such as iridium oxide, ruthenium oxide, or the like is employed as the material of the upper electrode. Meanwhile, the severe requests for miniaturization are imposed on the FeRAM recently, and accordingly miniaturization of the ferroelectric capacitor and employment of the multilayer interconnection structure are requested. Also, a lower voltage operation is requested in connection with the application to a mobile information processing device. In order to make it possible for the FeRAM to operate at a low voltage, such a condition is requested that the ferroelectric film constituting the ferroelectric capacitor should have a large amount of inverted charges QSW. However, in step of forming the multilayer interconnection structure over the ferroelectric capacitor, the characteristics of the ferroelectric capacitor are deteriorated by the process applied in a reducing atmosphere or the process applied in a nonoxidative atmosphere. More concretely explaining, when the upper electrode ob the ferroelectric capacitor is formed of the Pt film, the Ir film, or the like, a hydrogen in the reducing atmosphere used in forming the multilayer interconnection structure thereon enters into the Pt film, the Ir film, or the like, and then is activated by a catalytic action of the metal. Thus, such a problem arises that the oxide ferroelectric film in the ferroelectric capacitor is reduced by the activated hydrogen. When the ferroelectric film is reduced, the operation characteristics of the ferroelectric capacitor are largely degraded. Such problem of the characteristic degradation of the ferroelectric film arises particularly conspicuously as the ferroelectric capacitor is miniaturized much more and thus the capacitor insulating film is miniaturized much more. In JP 2004-273787-A, in order to solve a reduction of a crystallinity caused due to an oxygen defect in the crystal and an excessive oxygen during a crystal growth simultaneously, such a method is set forth that an oxidizing gas of 40 vol % to 97 vol % should be employed in forming the IrO2 lower electrode. In Japanese Patent No. 3661850, it is set forth that the upper electrode formed on the ferroelectric film should be constructed by a first conductive oxide film and a second conductive oxide film, and also the second conductive oxide film should be formed to have a composition that is closer to a stoichiometric composition than the first conductive oxide film, so that the ferroelectric capacitor can be miniaturized not to cause the degradation of the electric characteristics in the multilayer interconnection constructing steps. In JP 2006-128274-A, it is proposed that three layers of the upper electrode of the ferroelectric capacitor should be formed of platinum, iridium oxide, and iridium. In JP 2000-91270-A, such a method is disclosed that the lower electrode or the upper electrode should be formed successively of the Ir film and the IrO2 film. Also, such a method is disclosed that, in order to reduce the voids in the ferroelectric film, RTA (Rapid Thermal Annealing) should be applied after the IrO2 film is formed and then the Ir film should be formed. In Japanese Patent No. 3299909, such an electrode constructed by the stacked structure is set forth that the IrO2 film of 36 nm to 83 nm thick is used as the upper layer and the Ir film of 22 nm to 66 nm thick is used as the lower layer. In JP 2001-127262-A, such a two-step sputter method is disclosed that the IrO2 film is formed at a low power and then the IrO2 film is formed at a high power. In JP 2002-246564-A, JP 2005-183842-A, etc., steps of (i) forming the film of the conductive lower electrode made of a noble metal, (ii) covering the lower electrode with the ferroelectric material layer, (iii) applying Rapid Thermal Annealing (RTA) to the ferroelectric layer for the first time, (iv) forming the film of the upper electrode layer made of a noble metal oxide, and then (v) applying the annealing to the ferroelectric layer and the upper electrode layer for the second time are set forth. It is set forth that a larger quantity of switching charges can be obtained according to such steps and also the good fatigue characteristic can be obtained preferably. In JP 2005-183842-A, such a method is also disclosed that RTA is applied to the conductive oxide film formed on the ferroelectric film and then the furnace annealing is applied in the oxygen atmosphere. In JP 2006-73648-A, upon forming the upper electrode film on the ferroelectric film, steps of forming the IrOx film containing the crystallized microcrystals and then forming the IrOx film containing the columnar crystals are disclosed. Accordingly, it is set forth that, even when the ferroelectric film is formed as a thin film, the characteristic of the ferroelectric film can be extracted sufficiently. In JP 2003-204043-A, such a method is proposed that the ferroelectric film is formed, and then the Irx film of 150 to 250 nm thick is formed thereon as the second conductive film by the sputtering method. In JP 2006-245457-A, it is proposed that formation of the conductive film on the side wall of the capacitor in etching the stacked film is prevented by setting a film thickness of the stacked film of Ir and IrO2 constituting the capacitor lower electrode below 100 nm, and thus a leakage current between the capacitor upper electrode and the capacitor lower electrode is reduced.
People stream themselves doing anything and everything these days, a cultural shift services like Twitch have openly embraced, as they’ve moved past their roots in gaming. It’s no surprise, then, that people would want to stream themselves watching and responding to the ongoing Demoratic debates, as the party chooses its nominee to go up against President Trump later this year. What they didn’t expect was to have their streams killed and accounts banned by Twitch right in the middle of the debate happening last night in South Carolina. About an hour into last night’s debate, the Twitter bot @StreamerBans started reporting a series of high-profile accounts that’d been dispatched by Twitch, including speedrunner Trihex and the popular leftwing podcast Chapo Trap House. The bot doesn’t include the reason why the accounts have been banned, but Trihex quickly issued a response to it: Twitch banned Trihex, but not because Twitch took issue with their political commentary. Instead, it was complying with a DMCA (Digital Millennium Copyright Act) notice that apparently came from someone representing CBS, the news organization hosting the debate. A Twitch investigation later determined these claims were actually a hoax. None of the streamers would be held liable, and all of their bans would be reversed by Twitch. Here’s Twitch’s full statement released to VICE Games: “Twitch’s investigation has determined that the alleged copyright infringement notices directed to channels from Praxis Political are false. Twitch is reinstating access to each account and removing any strike attributed to a channel in connection with the notice, effective immediately. We regret that a false notice from a 3rd party disrupted any of our streamers and appreciate all who alerted us to the concerns about Praxis Political. The safety of our community is a top priority and it is unacceptable to target folks with false claims. The investigation continues as to the actor that submitted the notices.” The DMCA notice received by Twitch streamers was not from CBS, but a third-party company calling itself Praxis Political Legal. It is not uncommon for major companies to rely on outside companies to handle copyright issues for them on places like Twitch and YouTube, but it is uncommon for the companies in question to delete its internet presence. Not long after Praxis Political issued its DMCA takedown notices, its website—still accessible through a Google cache here—vanished. The website, a sparse white page without much information, did include an email address. When VICE Games sent an email, however, it immediately bounced back because the email address had been disabled. Praxis Political claimed to be representing CBS. CBS did not respond to my request for comment as of this writing, but Twitch’s determination the claims were false answers that question. The notion of a fake DMCA claim isn’t new, though. It’s a regular occurrence on places like YouTube and Twitch, and YouTube even sued someone who was using them to extort creators. In that instance, a fake DMCA claim was used to extract $150 from someone. Another time, it was $300. Aggressive game developers have, in the past, used DMCA claims as a way to hit back at critics, knowing Twitch and YouTube usually side with them. The debate aired last night on CBS, and was easily accessible on free streams on a variety of platforms, including YouTube. Other debates have been on cable networks like CNN and MSNBC, requiring a paid subscription. A number of banned accounts featured the CBS stream alongside their commentary, but Trihex was not among them. Instead, Trihex only included a portion of the stream to show subtitles, so people knew what was happening. Trihex had even taken the additional step of muting the audio. Nonetheless, he was banned. Trihex might not have included the full stream, but many others, including Justin Young, did. “I was commenting throughout,” said Young, “although I try to play it safe [because] I felt it was transformative enough to be fair use AND CBS was broadcasting it on all of their outlets for free.” At the time they were banned, Young was “10 minutes into a rant about how funny it was Joe Biden said the phrase ‘home boners.’” Young was hoping to avoid a DMCA notice, in which CBS might argue Young was stealing its content. In commenting about the debate, however, Young and others believed they were transforming it. It’s a similar argument for why people can stream themselves talking over hours of video games without paying a royalty to game companies. One reason Young felt in the clear was because they’d done the same thing in the past. McCrae was among the several folks banned last night while streaming the debate, and like Young, had streamed previous debates, events that were not hosted by CBS, without issue. “I was pretty much just commenting on it and playing stupid sounds over it and scrolling twitter on my stream,” said McCrae. “I don't think it's considered transformative lol but maybe.” The legality of streaming video games and talking over them—and by extension, talking over debates—has not really been legally tested. Instead, it’s become such a cultural sensation over the past decade that, instead, most companies decided to look the other way, believing the exposure is ultimately good for their brands. It’s become a form of free advertising. Earlier Wednesday, a Twitch spokesperson told VICE Games it was “actively investigating the authenticity of DMCA notices the led to the bans, and is speaking with the streamers involved.” Twitch does not usually explicitly comment on bans, and doing so raises the possibility these bans may have been in error. Later Wednesday, it determined the DMCA requests were forgeries. This raises the question, then, about why Twitch complied with them in the first place. Big platforms like Twitch, YouTube, and Twitter often take an overly expansive view of copyright law, often siding with copyright holders or proactively taking down potentially fair-use content at the first sign of a DMCA. The fact that companies are so quick to remove content when faced with a copyright claim (or to do so proactively using content identification techniques) is often used as ammunition by people who say platforms should be better at, say, banning Nazis. Just last week, Activision subpoenaed reddit to try and unearth the personal information of someone who’d leaked information about the new Call of Duty game. The problem for creators remains the same: they are the ones with less power to wield. If a DMCA claims is false, accounts get unbanned. During the time they are banned, however, they’re deprived of streaming, which is a source of livelihood for many. “We have no recourse to argue fair use,” said Young. Even when the bans are inevitably lifted, that dynamic will remain the same.
<h1 align="center"><img src="https://cdn.rawgit.com/kumarharsh/graphql-for-vscode/master/images/logo.png" alt="Logo" height="128" /></h1> <h2 align="center">Graphql For VSCode</h2> <div align="center"> [![Latest Release](https://vsmarketplacebadge.apphb.com/version-short/kumar-harsh.graphql-for-vscode.svg)](https://marketplace.visualstudio.com/items?itemName=kumar-harsh.graphql-for-vscode) [![Installs](https://vsmarketplacebadge.apphb.com/installs-short/kumar-harsh.graphql-for-vscode.svg)](https://marketplace.visualstudio.com/items?itemName=kumar-harsh.graphql-for-vscode) [![Rating](https://vsmarketplacebadge.apphb.com/rating-short/kumar-harsh.graphql-for-vscode.svg)](https://marketplace.visualstudio.com/items?itemName=kumar-harsh.graphql-for-vscode) </div> <hr> VSCode extension for GraphQL schema authoring & consumption. ![A preview of the extension](https://cdn.rawgit.com/kumarharsh/graphql-for-vscode/master/images/preview.png) ## What's in the Box? * **Go to Definition**: Just <kbd>F12</kbd> or <kbd>Ctrl</kbd>+Click on any graphql type, and you'll jump right to it's definition. ![Go to Definition](https://cdn.rawgit.com/kumarharsh/graphql-for-vscode/master/images/goto-definition.gif) * **Autocomplete**: Uses the [@playlyfe/gql](https://npmjs.org/package/@playlyfe/gql) library to read your whole graphql schema definitions and provide you with autocomplete support while writing & editing your `.gql` files. ![Autocomplete](https://cdn.rawgit.com/kumarharsh/graphql-for-vscode/master/images/autocomplete.gif) * **Schema Validation**: The extension also validates your schema, so that you catch errors early. * **Linting**: This extension uses a similar method as used by the [Codemirror graphql](https://github.com/graphql/codemirror-graphql) project for linting. * **Great Syntax Highlighting**: Now, your graphql queries, mutations and gql files will look as beautiful as the rest of your code with an awesome syntax highlighter. It works not just with your .gql/.graphql schema files, but also within your code - supports syntax highlighting within: + Javascript + Typescript + Vue + Ruby + Cucumber + ReasonML/OCaml + Markdown fenced code-blocks + (Submit a PR to support your language!) * **Snippets**: Some commonly used snippets are provided which help while writing mutations and queries, such as defining types, interfaces and input types. ## Setting it Up 1. Ensure that you have the [@playlyfe/gql](https://npmjs.org/package/@playlyfe/gql) library (v2.x) installed and available to this extension. If you've installed the library in a folder other than the workspace root, then add the path to the node_modules directory as a setting: ```json { "graphqlForVSCode.nodePath": "ui/node_modules" } ``` 2. Ensure you have [watchman](https://facebook.github.io/watchman/docs/install.html) installed and available in your path. Watchman watches your gql files and provides up-to-date suggestions. For users on Windows, get the latest build mentioned in [this issue](https://github.com/facebook/watchman/issues/19) and add the location of `watchman.exe` to your environment path. 3. Create a .gqlconfig file (required by the `@playlyfe/gql` package). ### A minimal example: The .gqlconfig is a JSON file with only one required key: schema.files which is the path to your *.gql files relative to your workspace root. ```js /* .gqlconfig */ { schema: { files: 'schemas/**/*.gql' } } ``` You can use the string `files: "**/*.gql"` instead if you want to find any `.gql` file recursively in the workspace dir. To see the full configuration, check out the [GQL](https://github.com/Mayank1791989/gql) project's docs. 4. To enable autocomplete support within your code, add these lines to your `.gqlconfig` file. The `query` section of the config contains an array of `file` config with matchers. You can add more files by directing the `EmbeddedQueryParser` to run when your code within the `startTag` and `endTag` matches: ```js /* .gqlconfig */ { schema: { files: "schemas/**/*.gql" }, query: { files: [ /* define file paths which you'd like the gql parser to watch and give autocomplete suggestions for */ { match: ['src/**/*.ts', 'src/**/*.tsx'], // match multiple extensions parser: ['EmbeddedQueryParser', { startTag: 'gql`', endTag: '`' }], // parse any query inside gql template literal }, { match: 'ui/src/**/*.js', // for js parser: ['EmbeddedQueryParser', { startTag: 'Relay\\.QL`', endTag: '`' }], // parse Relay syntax isRelay: true, }, { match: 'features/**/*.feature', // for gherkin parser: ['EmbeddedQueryParser', { startTag: 'graphql request\\s+"""', endTag: '"""' }], }, { "match": "lib/**/*.rb", // sample config you might use for Ruby-aware highlighting (inside `<<-GRAPHQL` heredocs) "parser": ["EmbeddedQueryParser", { "startTag": "<<-GRAPHQL", "endTag": "GRAPHQL" }] }, { match: 'fixtures/**/*.gql', parser: 'QueryParser', }, ], }, } ``` Again, refer to [GQL](https://github.com/Mayank1791989/gql) docs for details about configuring your `.gqlconfig` file. ### Using remote schemas If you are using a schema that is not in your client's project, you'll need to download it so it's available for `@playlyfe/gql`. After downloading, you need to reference these schemas in your `.gqlconfig`. _One way_ to do this is to use [graphql-cli](https://github.com/graphql-cli/graphql-cli): ```json { "scripts": { "gql:fetch-schema": "graphql get-schema --project prod" } } ``` You will also need a `.graphqlconfig.yml` configuration file so that `graphql-cli` knows where to download the schema from (specified by the `--project prod` argument to the command): ```yaml # .graphqlconfig.yml projects: prod: schemaPath: schema/schema.graphql extensions: endpoints: default: https://prod.my-graphql-api.com/graphql ``` Thereafter, you can fetch changes to the graphql schema by running the command: ```bash # download schema yarn gql:fetch-schema ``` ## Future Plans * Tests: Figure out tests. ## Contributing * If you have a suggestion or a problem, please open an issue. * If you'd like to improve the extension: + If you've made any improvements to the extension, send a Pull Request! + The instructions to run and debug the extension are [here](#hacking) ## Hacking If you're making changes to the extension, then run `yarn dev` inside this directory, then just press <kbd>F5</kbd> to launch the *Extension Development Host* instance of vscode. Whenever you make a change, press *Reload* to reload the EDH instance. ## Major Contributors * [Mayank Agarwal](https://github.com/Mayank1791989) - added autocomplete, goto definition, schema validation support ## Changelog * Latest changes are available on the [releases](https://github.com/kumarharsh/graphql-for-vscode/releases) page. * Older changelogs can be found [here](/CHANGELOG.md). --- *Happy Querying!*
Q: Выравнивание блока по вертикали HTML/CSS Опять эта проблема с выравниванием по высоте. *{ margin: 0; padding: 0; text-decoration: none; font-family: 'Roboto', sans-serif; } body{ background: #fbfcfc; } #header{ height: 350px; width: 100%; background: #525ea7; } #header_photo{ height: 250px; width: 250px; background-image: url('http://aviasovet.ru/blog/wp-content/uploads/2014/05/%D0%A4%D0%BE%D1%82%D0%BE-%E2%84%96-1.jpg'); background-size: 170%; background-position: 50% 0; background-repeat: no-repeat; border-radius: 100%; } <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Notes</title> <link rel="stylesheet" href="css/main.css" type="text/css"> <link href="https://fonts.googleapis.com/css?family=Roboto:300,400,700" rel="stylesheet"> </head> <body> <div id="header"> <div id="header_photo"> </div> </div> </body> </html> A: * { margin: 0; padding: 0; text-decoration: none; font-family: 'Roboto', sans-serif; } body { background: #fbfcfc; } #header { height: 350px; width: 100%; background: #525ea7; } #header:after { content: ''; display: inline-block; vertical-align: middle; height: 100%; } #header_photo { display: inline-block; vertical-align: middle; height: 250px; width: 250px; background-image: url('http://aviasovet.ru/blog/wp-content/uploads/2014/05/%D0%A4%D0%BE%D1%82%D0%BE-%E2%84%96-1.jpg'); background-size: 170%; background-position: 50% 0; background-repeat: no-repeat; border-radius: 100%; } <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Notes</title> <link rel="stylesheet" href="css/main.css" type="text/css"> <link href="https://fonts.googleapis.com/css?family=Roboto:300,400,700" rel="stylesheet"> </head> <body> <div id="header"> <div id="header_photo"> </div> </div> </body> </html>
Q: Uncaught Error: spawn .\node.exe ENOENT I have a nodejs app being run through electron https://github.com/frankhale/electron-with-express After packaging the app as an executable using npm run dist:win32, I ran into the following issue in console: events.js:160 Uncaught Error: spawn .\node.exe ENOENT Below is how my devDependencies looks like "devDependencies": { "electron-builder": "^5.26.0", "electron-prebuilt": "^1.3.3", "electron-rebuild": "^1.2.0" } When i run the app using npm start it works fine, and no error is run. Its when the app is run as an executable i see the error on console. A: I had the same problem, after many try/search, I found a solution. Use 'fix-path'. https://www.npmjs.com/package/fix-path npm install --save fix-path Then, use it like this before your spawn : // Use to access 'spawn' when the app is packaged const fixPath = require('fix-path')(); // or const fixPath = require('fix-path'); fixPath();
The Canadian Soccer Association has announced yet another opponent the men's national team will face on its long, winding road back to relevance. Canada will face Moldova in a friendly on May 27, the CSA confirmed late Thursday night. The game will be the team's second international friendly of 2014, coming four days after a closed-door friendly against Bulgaria. Both games are part of a 10-day training camp being held in Austria, from May 18 to 28. The Bulgaria game will be in Ritzing, while the location of the Moldova game is yet to be announced. The CSA did confirm to MLSsoccer.com last week that the Bulgaria game will not be televised. Details of the Moldova game are yet to be confirmed. Canada head into the games winless in their last 14 international matches, having scored just two goals in that span. In the most recent FIFA rankings, Canada sit at No. 110 in the world, and 11th in CONCACAF.
It also has a second feed — two to three hours a day of original content plus archived programming — that's carried on Facebook and will air on the broadcast stations. Cheddar airs branded content on that feed, like segments sponsored by HP Inc. in which anchors talk about innovation with HP computers on a desk and an HP logo on screen.
Q: Guzzle 6 send multipart data I'd like to add some data to a Guzzle Http Request. There are file name, file content and header with authorization key. $this->request = $this->client->request('POST', 'url', [ 'multipart' => [ 'name' => 'image_file', 'contents' => fopen('http://localhost:8000/vendor/l5-swagger/images/logo_small.png', 'r'), 'headers' => ['Authorization' => 'Bearer uCMvsgyuYm0idmedWFVUx8DXsN8QzYQj82XDkUTw'] ]]); but I get error Catchable Fatal Error: Argument 2 passed to GuzzleHttp\Psr7\MultipartStream::addElement() must be of the type array, string given, called in vendor\guzzlehttp\psr7\src\MultipartStream.php on line 70 and defined in vendor\guzzlehttp\psr7\src\MultipartStream.php line 79 In Guzzle 6 documentation is something like this: http://docs.guzzlephp.org/en/latest/request-options.html#multipart Who knows where I made a mistake? A: Here is the solution. Header with access token should be outside multipart section. $this->request = $this->client->request('POST', 'request_url', [ 'headers' => [ 'Authorization' => 'Bearer access_token' ], 'multipart' => [ [ 'Content-type' => 'multipart/form-data', 'name' => 'image_file', 'contents' => fopen('image_file_url', 'r') ] ] ]); A: As per the docs, "The value of multipart is an array of associative arrays", so you need to nest one level deeper: $this->request = $this->client->request('POST', 'url', [ 'multipart' => [ [ 'name' => 'image_file', 'contents' => fopen('http://localhost:8000/vendor/l5-swagger/images/logo_small.png', 'r'), 'headers' => ['Authorization' => 'Bearer uCMvsgyuYm0idmedWFVUx8DXsN8QzYQj82XDkUTw'] ] ] ]);
Higher Order Ambisonics (HOA) offers one possibility to represent three-dimensional sound among other techniques like wave field synthesis (WFS) or channel based approaches like the 22.2 multichannel audio format. In contrast to channel based methods, the HOA representation offers the advantage of being independent of a specific loudspeaker set-up. This flexibility, however, is at the expense of a decoding process which is required for the playback of the HOA representation on a particular loudspeaker set-up. Compared to the WFS approach, where the number of required loudspeakers is usually very large, HOA signals may also be rendered to set-ups consisting of only few loudspeakers. A further advantage of HOA is that the same representation can also be employed without any modification for binaural rendering to head-phones. HOA is based on the representation of the spatial density of complex harmonic plane wave amplitudes by a truncated Spherical Harmonics (SH) expansion. Each expansion coefficient is a function of angular frequency, which can be equivalently represented by a time domain function. Hence, without loss of generality, the complete HOA sound field representation actually can be assumed to consist of O time domain functions, where O denotes the number of expansion coefficients. These time domain functions will be equivalently referred to as HOA coefficient sequences or as HOA channels in the following. The spatial resolution of the HOA representation improves with a growing maximum order N of the expansion. Unfortunately, the number of expansion coefficients O grows quadratically with the order N, in particular O=(N+1)2. For example, typical HOA representations using order N=4 require O=25 HOA (expansion) coefficients. According to the previously made considerations, the total bit rate for the transmission of HOA representation, given a desired single-channel sampling rate fs and the number of bits Nb per sample, is determined by O·fs·Nb. Consequently, transmitting an HOA representation of order N=4 with a sampling rate of fs=48 kHz employing Nb=16 bits per sample results in a bit rate of 19.2 MBits/s, which is very high for many practical applications like e.g. streaming. Thus, compression of HOA representations is highly desirable. The compression of HOA sound field representations is proposed in WO 2013/171083 A1, EP 13305558.2 and PCT/EP2013/075559. These processings have in common that they perform a sound field analysis and decompose the given HOA representation into a directional component and a residual ambient component. On one hand the final compressed representation is assumed to consist of a number of quantised signals, resulting from the perceptual coding of the directional signals and relevant coefficient sequences of the ambient HOA component. On the other hand it is assumed to comprise additional side information related to the quantised signals, which side information is necessary for the reconstruction of the HOA representation from its compressed version. An important part of that side information is a description of a prediction of portions of the original HOA representation from the directional signals. Since for this prediction the original HOA representation is assumed to be equivalently represented by a number of spatially dispersed general plane waves impinging from spatially uniformly distributed directions, the prediction is referred to as spatial prediction in the following. The coding of such side information related to spatial prediction is described in ISO/IEC JTC1/SC29/WG11, N14061, “Working Draft Text of MPEG-H 3D Audio HOA RM0”, November 2013, Geneva, Switzerland. However, this state-of-the-art coding of the side information is rather inefficient.
Welcome Welcome to Brocklebank Labradors, whatever your needs we are sure that we can help you. From a fully trained peg dog or a dog for competition we have them all, or maybe it is private tuition that you are interested in so that you can train your dog yourself, we have all the facilities here. Set in 25 acres in the heart of North Yorkshire we have rabbit pens, water, crops and even a purpose built game fair course to put both yourself and your dog through its paces. There are training days throughout the summer for both novice and experienced handlers where in a group of up to 5 people all aspects of dog training are covered. We are also great believers in training up and coming judges, all parts of judging are openly discussed from basic routines to unusual, situations that can and do occur in field trials. We are often asked about puppies that are not required for work put purely as pets, we do supply puppies to pet homes as well as working homes and do take pet dogs in for obedience training, and as well as training the pets and also train the owner how to handle them. Whatever your requirements. whether home or abroad please contact us. See our videos We have a small collection of videos on youtube channel and intend to add more on a regular basis
Josh is back in the studio for this one, as the boys discuss Gamertag Radio: A Podcast Story, a new documentary available on Twitch and YouTube about the podcast, Gamertag Radio. The podcast is celebrating 13 years of production from Danny, Pete and Parris. Find the show at http://www.gamertagradio.com and watch the new documentary right here: https://youtu.be/pCFZvp9rX5E Season Three starts with something different. Joel is on his own talking about community connections and the weird places you end up learning something new from. Roberto Blake is the host of the Create Something Awesome Today Podcast, helping podcasters, bloggers and video creators up their game, while inspiring career professionals to create awesome in their own jobs. Josh is back in the studio with Joel to record this special Patreon-requested review of The Blood Drawn Chronicles. The boys cover this narrative audio drama podcast with a spoiler-free discussion before breaking a few parts of the first season's narrative down in a spoiler-light discussion (clearly noted in audio so as to not spoil you!) Find more about the show at https://www.blooddrawn.com Jay Soderbergh, aka Pod Vader, joins Joel to discuss and review Timesuck with Dan Cummins. You can find the show and more about Dan at http://timesuckpodcast.com Pod Vader is the award-winning producer behind the beginnings of ESPN's Podcenter and is currently the Head of Content for Blog Talk Radio. He's also the host of The Next Fan Up Podcast featuring super-fans from every NFL team. Join Always Listening on Facebook at https://www.facebook.com/groups/AlwaysListeningPod/ and support the show on Patreon at https://www.patreon.com/Alwayspod 'Tis the Season, for Josh and Joel to outsource their podcast. Every year we invite some other podcaster friends to share a podcast or episode they'd "give" to someone this holiday season. This year we're joined by Jennifer Briney from Congressional Dish, Aaron Mahnke from Lore and Jonathan, Carmela and Chris from Trivial Warfare. With a special appearance by the gang from Podcaster's Group Therapy. Podcasts mentioned in this episode: Congressional Dish - Jennifer Briney - Ronna and Beverlyhttp://www.earwolf.com/show/ronna-beverly/ Josh and Joel are BACK! And in this episode they meet Heben and Tracy from Another Round, Buzzfeed's first podcast. These girls made a splash a couple of years ago and have only gotten bigger and better since then. Hear Joel tell you why this is one of his favorite podcasts. If you love podcasts, you should join our Facebook group. Find us at http://alwayslisteningpod.com/facebook/Dig Twitter? Find us there at http://alwayslisteningpod.com/twitter/And you can always help support our show at http://alwayslisteningpod.com/support/ Josh and Joel come to terms (and almost to blows) over the split between Starlee Kine and Gimlet media in this episode. If you love podcasts, you should join our Facebook group. Find us at http://alwayslisteningpod.com/facebook/Dig Twitter? Find us there at http://alwayslisteningpod.com/twitter/And you can always help support our show at http://alwayslisteningpod.com/support/ Josh introduces Joel to Joey Coco Diaz in this episode of Always Listening. Joey hosts The Church of What's Happening Now, and it AND this episode are both a little explicit. Joey spins his homegrown wisdom for the boys and captures all our hearts. Josh and Joel discuss Alice Isn't Dead from the creators of Welcome to Nightvale. A fictional narrative podcast, Alice Isn't Dead isn't for everyone, and after this episode you'll know whether it was for Josh and Joel. Check out the show at http://NightvalePresents.com Join us on Facebook at http://AlwaysListeningPod.com/facebook/on Twitter at http://AlwaysListeningPod.com/twitter/and become a Patron at http://AlwaysListeningPod.com/support/ Josh and Joel meet Eric Molinsky (who Joel actually met at Podcast Movement 2016) and his show, Imaginary Worlds, where he discusses the worlds we create and how we create them. You can find the show at http://www.imaginaryworldspodcast.org Support our goal to review every great podcast by joining our Patreon drive. Just a $1/month gives you access to exclusives. http://AlwaysListeningPod.com/support/ Josh leads this discussion of Your Mom's House from comedians Tom Segura and Christina Pazsitzky. It's an EXPLICIT Show and we decided to leave out the bleeps this week, so listen (or don't) accordingly. Josh and Joel are FINALLY BACK! With a slightly new format and a new review. This episode, we cover Presidential, from Lillian Cunningham and the Washington Post. Each week, Lillian covers a single US President, starting with Washington and ending with our next President after the election in November. Perfect episode for the 4th of July holiday. Find more about the show at their website. And let us know what you think of the new format. We'll be back in two weeks with a review of the Caustic Soda Podcast! Email us at alwayslisteningpod@gmail.com or join our Facebook group
We recognise that it is everybody's role to demonstrate respect and empowerment for people with disabilities by their actions and attitudes. Central to our role is providing practical assistance to enable people with disabilities, regardless of their circumstances, to live as independently and autonomously as possible. We take a person-centred approach yet assisting the person with a disability within the context of their family or community environment. Continuity of care is paramount; we aim to provide regular staffing arrangements so that clients can expect to have the same familiar staff where possible, rather than transitional care workers. Advocating for our clients and liaising with other service providers when necessary, providing detailed handovers and reports to facilitate a smooth transition from home to respite when required, or from home to hospital if needed. Ongoing feedback from our clients and their families so that we can adapt and individualise our policy, procedures, and service for each individual client.
Gioacchino Cocchi Gioacchino Cocchi (circa 1712 – 11 September 1796) was a Neapolitan composer, principally of opera. Cocchi was probably born in Naples in about 1712, although his place of birth has also been given as Padova. His first works were performed in Naples and in Rome; the most successful was La maestra, written in Naples in 1747. It was performed at the Teatro Nuovo sopra Toledo of that city in the spring of 1747, and at the Teatro Formagliari of Bologna in October of the same year; on 11 March 1749 it was given at the King's Theatre, and in 1752 at the Teatro de' Fiorentini of Naples, with the title La scaltra governante. As La scaltra governatrice it was given at the Académie de Musique in Paris on 25 January 1753, and as Die Schulmeisterin was performed in 1954 at the Schlosstheater in Berlin. The work established a solid international reputation for Cocchi. From 1749 to 1757 Cocchi was in Venice, where he became maestro di cappella of the Ospedale degli Incurabili, standing in for Vincenzo Legrenzio Ciampi, who had been given permission to visit London for an extended period. Cocchi also taught composition to Andrea Luchesi (1756/57). In 1757 he travelled to London, where he stayed until about 1772, when he returned to Venice. He died there on 11 September 1796. Works Sinfonia for 2 Mandolins & Continuo, in 3 parts, 1) Allegro assai, 2) Largo, 3) Allegro. (Gimo 76) Siface, re di Numidia (1748) Siroe (1749) Alessandro nell'Indie (1761) References External links Category:1720s births Category:1804 deaths Category:Italian classical composers Category:Italian male classical composers Category:Italian opera composers Category:Male opera composers Category:Year of birth uncertain Category:Year of birth unknown
Gamma-hydroxybutyrate, acting through an anti-apoptotic mechanism, protects native and amyloid-precursor-protein-transfected neuroblastoma cells against oxidative stress-induced death. Clinical observations suggested that gamma-hydroxybutyrate (GHB) protects nerve cells against death but the direct proofs are missing. Here, we combined several approaches to investigate GHB capacity to protect human neuroblastoma SH-SY5Y cells against hydrogen peroxide (H2O2)-induced death. To increase the patho-physiological relevancy of our study, we used native SH-SY5Y cells and SH-SY5Y cells stably transfected with the wild-type amyloid-precursor-protein (APPwt) or control-vector-pCEP4. Trypan Blue exclusion and MTT (3-[4,5-dimethylthiazol-2-yl]-2,5-diphenyl-tetrazolium-bromide) assays combined with pharmacological analyses showed that H2O2 reduced native and genetically modified cell viability and APPwt-transfected cells were the most vulnerable. Terminal deoxynucleotidyl transferase-mediated dUTP nick end labeling (TUNEL) and activated caspase-3 staining assessed by flow cytometry revealed a basally elevated apoptotic signal in APPwt-transfected cells. Reverse-transcription, real-time quantitative polymerase chain reaction (qPCR) and Western blotting showed that mRNA and protein basal ratios of apoptotic modulators Bax/Bcl-2 were also high in APPwt-transfected cells. GHB efficiently and dose-dependently rescued native and genetically modified cells from H2O2-induced death. Interestingly, GHB, which strongly decreased elevated basal levels of TUNEL-staining, activated caspase 3-labeling and Bax/Bcl-2 in APPwt-transfected cells, also counteracted H2O2-evoked increased apoptotic markers in native and genetically modified SH-SY5Y cells. Since GHB did not promote cell proliferation, anti-apoptotic action through the down-regulation of Bax/Bcl-2 ratios and/or caspase 3 activity appears as a critical mechanism involved in GHB-induced protection of SH-SY5Y cells against APPwt-overexpression- or H2O2-evoked death. Altogether, these results, providing multi-parametric evidence for the existence of neuroprotective action of GHB, also open interesting perspectives for the development of GHB analog-based strategies against neurodegeneration or nerve cell death.
Former Oklahoma City Thunder player Enes Kanter intends to open a charter school in the metro area. Kanter, who now plays for the Boston Celtics, has informed Oklahoma City Public Schools of his plan to open the Enes Kanter School for Exceptional Learning. Kanter notified the school district in a letter, first obtained by The Frontier. Kanter and a team of “civic-minded individuals” from Oklahoma City will submit an official charter school application to the school district on Tuesday. The application would come before the Oklahoma City School Board for a vote. Kanter and his partners haven’t chosen a location for the charter school, but their goal is to choose a site where “the need is high,” according to the letter.
The long-term oral administration of a product derived from a probiotic, Clostridium butyricum induced no pathological effects in rats. Recent studies have suggested that short chain fatty acids (SCFAs) exert a therapeutic effect on some human and experimental animal diseases. In our previous study, we showed that Clostridium butyricum produces high levels of SCFAs in the culture system used. In addition, an additive based on yogurt was effective in eliminating and masking the odor derived from these SCFAs in the product. Recently, we reported that the oral administration of a high concentration (50% w/w) of this product derived from Clostridium butyricum for 17 days caused no pathological abnormalities in rats. The aim of the present study was to investigate the effects of the prolonged oral administration of this product in rats. Male and female Wistar Hannover GALAS rats, 5 weeks old, were given a mixture of a standard diet plus the product derived from Clostridium butyricum (5% w/w) with 0.1% additive for 16 months (n=6). The control rats were allowed the same standard diet plus tap water (5% w/w) with 0.1% additive (n=6). After 16 months, a laparotomy was performed. A hemocyte count, and biochemical and electrolyte analyses were subsequently carried out. The esophagus, stomach, small intestine, large intestine and pancreas were investigated macroscopically and microscopically. The results showed that the rats grew normally for the duration of the experimental period. The body weights of the product-fed rats were comparable with those of the control-fed rats. There were no significant differences in the organ weight between the product- and control-fed rats, except for a significantly increased weight of the large intestine in the product-fed male rats. No pathological abnormalities were found in the hemocyte count, the biochemical and electrolyte analyses, or the macroscopic and microscopic findings.
package com.stevenschoen.putionew.files import android.view.LayoutInflater import android.view.View import android.view.ViewGroup import android.widget.Checkable import android.widget.ImageView import android.widget.TextView import androidx.collection.ArraySet import androidx.recyclerview.widget.RecyclerView import com.squareup.picasso.Picasso import com.stevenschoen.putionew.PutioUtils import com.stevenschoen.putionew.R import com.stevenschoen.putionew.model.files.PutioFile class FileListAdapter( private val data: List<PutioFile>, val onFileClicked: (file: PutioFile, holder: FileHolder) -> Unit, val onFileLongClicked: (file: PutioFile, holder: FileHolder) -> Unit ) : RecyclerView.Adapter<FileListAdapter.FileHolder>() { private var itemsCheckedChangedListener: OnItemsCheckedChangedListener? = null val checkedIds = ArraySet<Long>() init { setHasStableIds(true) registerAdapterDataObserver(object : RecyclerView.AdapterDataObserver() { override fun onChanged() { super.onChanged() if (isInCheckMode()) { val idsToRemove = ArraySet<Long>() for (checkedId in checkedIds) { val stillHas = data.any { it.id == checkedId } if (!stillHas) { idsToRemove.add(checkedId) } } for (id in idsToRemove) { checkedIds.remove(id) notifyItemChanged(getItemPosition(id)) } if (!idsToRemove.isEmpty() && itemsCheckedChangedListener != null) { itemsCheckedChangedListener!!.onItemsCheckedChanged() } } } }) } override fun onCreateViewHolder(parent: ViewGroup, viewType: Int): FileHolder { val view = LayoutInflater.from(parent.context).inflate(R.layout.file_putio, parent, false) return FileHolder(view) } override fun onBindViewHolder(holder: FileHolder, position: Int) { if (holder.itemView is Checkable) { holder.itemView.isChecked = isPositionChecked(position) } val file = data[position] holder.textName.text = file.name holder.textDescription.text = PutioUtils.humanReadableByteCount(file.size!!, false) if (file.isFolder) { Picasso.get().cancelRequest(holder.iconImg) holder.iconImg.setImageResource(R.drawable.ic_putio_folder_accent) } else { if (!file.icon.isNullOrEmpty()) { Picasso.get().load(file.icon).into(holder.iconImg) } } if (file.isAccessed) { holder.iconAccessed.visibility = View.VISIBLE } else { holder.iconAccessed.visibility = View.GONE } } override fun getItemId(position: Int): Long { if (position != -1 && !data.isEmpty()) { return data[position].id } return 0 } fun getItemPosition(fileId: Long): Int { for (i in data.indices) { val file = data[i] if (file.id == fileId) { return i } } return -1 } override fun getItemCount() = data.size fun isInCheckMode() = checkedIds.isNotEmpty() fun checkedCount() = checkedIds.size fun isPositionChecked(position: Int): Boolean { val itemId = getItemId(position) return (itemId != -1L) && (checkedIds.contains(itemId)) } fun getCheckedPositions() = checkedIds.map { getItemPosition(it) } fun setPositionChecked(position: Int, checked: Boolean) { val itemId = getItemId(position) if (checked) { checkedIds.add(itemId) } else { checkedIds.remove(itemId) } notifyItemChanged(position) if (itemsCheckedChangedListener != null) { itemsCheckedChangedListener!!.onItemsCheckedChanged() } } fun togglePositionChecked(position: Int) { setPositionChecked(position, !isPositionChecked(position)) } fun addCheckedIds(vararg ids: Long) { ids .filter { checkedIds.add(it) } .forEach { notifyItemChanged(getItemPosition(it)) } if (itemsCheckedChangedListener != null) { itemsCheckedChangedListener!!.onItemsCheckedChanged() } } fun clearChecked() { if (checkedIds.isNotEmpty()) { val previouslyCheckedIds = ArraySet<Long>(checkedIds) checkedIds.clear() for (id in previouslyCheckedIds) { notifyItemChanged(getItemPosition(id)) } if (itemsCheckedChangedListener != null) { itemsCheckedChangedListener!!.onItemsCheckedChanged() } } } fun setItemsCheckedChangedListener(itemsCheckedChangedListener: OnItemsCheckedChangedListener) { this.itemsCheckedChangedListener = itemsCheckedChangedListener } interface OnItemsCheckedChangedListener { fun onItemsCheckedChanged() } inner class FileHolder(itemView: View) : RecyclerView.ViewHolder(itemView) { val textName: TextView = itemView.findViewById(R.id.text_file_name) val textDescription: TextView = itemView.findViewById(R.id.text_file_description) val iconImg: ImageView = itemView.findViewById(R.id.icon_file_img) val iconAccessed: ImageView = itemView.findViewById(R.id.icon_file_accessed) init { itemView.setOnClickListener { onFileClicked.invoke(data[adapterPosition], this) } itemView.setOnLongClickListener { onFileLongClicked.invoke(data[adapterPosition], this) true } } } }
In this paper we present a critical analysis of industrial location policy of the state of Bahia, in the period covered in between 1960s and 2000s, from the perspective of spatial economy. The paper reviews the formulation of the theory of location, through the contributions of its principal... This dissertation builds on the economic research about M&A and the effects on the merging plants' performance. In particular, the objective of this thesis is to shed some light on questions about causal effects of M&A on plants' performance, taking firm heterogeneity into account. Since there... This paper provides an evaluation of the impact of the ASEAN-China Free Trade Agreement (ACFTA) on industries in the Lao People's Democratic Republic (Lao PDR). In general, the paper finds that price competitiveness in the three industries under review falls substantially if tariffs are... This paper studies the evolution of trade freeness and of the agglomeration of production, as well as their relationship, at the sectoral level in a group of EU countries. Our main objective is to test at the sectoral level the conclusions of previous aggregate analyses which find that an... In New Trade Theory models, the larger region hosts an overproportionate share of producers. This Home Market Effect (HME) exacerbates regional income discrepancies caused by trade frictions or technology differences. With homogeneous firms, it requires inter-industry reallocations to emerge. We... Previous research has recognized that weak institutions can hamper investments and alter patterns of trade. However, little is known about the impact of institutional quality on offshoring. This is surprising, given that offshoring has become an important part of many firms' internationalization... Using a Melitz-style model of heterogeneous firms, Baldwin and Okubo (2006) recently presented a theoretical model in which self-sorting occurs and more productive factories choose to locate in more productive areas. The model suggests that firm-specific factors and regional factors affect each...
Vikings wrap with Ben Leber: Keys to win over Detroit The Minnesota Vikings are celebrating another win this week. This time over Detroit. The final 20-13, bringing the Vikings to 3-1 on the season. http://www.kare11.com/video/1870082375001/1/Vikings-wrap-with-Ben-Leber-Keys-to-win-over-Detroithttp://bcdownload.gannett.edgesuite.net/kare/35140830001/35140830001_1870393124001_th-506999d36628b0e4ddeef34e-782203299001.jpg?pubId=35140830001Vikings wrap with Ben Leber: Keys to win over DetroitThe Minnesota Vikings are celebrating another win this week. This time over Detroit. The final 20-13, bringing the Vikings to 3-1 on the season.KAREvikingssportssunriselocalNews03:11
Q: Error in upsampling layer of Sequential model I am trying to understand how the Upsampling2D layer works in keras so I made a single layer Sequential model. trial = Sequential() trial.add(UpSampling2D(size=(2, 2) , input_shape = (100,100,1))) The input is a random array : x = random.normal(0 , 1 , size = (100,100,1)) The interpreter reports the following error : ValueError: Error when checking : expected up_sampling2d_7_input to have 4 dimensions, but got array with shape (100, 100, 1) I am just trying to upsample an image using the upsampling layer. How do I fix the error ? Or is there some other way to achieve the same thing ? Using keras with TensorFlow backend A: Keras processes data by batches. By default, the first dimension is the batch size. In this case, batch is the number of images you want to upsample. If you only want to upsample a single image, define your input as such: x = random.normal(0 , 1 , size = (1, 100,100,1)) and it should work. Here is a working example: from keras.models import Sequential from keras.layers import UpSampling2D import numpy as np from matplotlib import pyplot trial = Sequential() trial.add(UpSampling2D(size=(2,2), input_shape=(100,100,1)) x = np.random.normal(0, 1, size=(1,100,100,1)) x_up = trial.predict(x) fig, ax = pyplot.subplots(1, 2) ax[0].imshow(x[0 , : , : , 0]) ax[1].imshow(x_up[0 , : , : , 0]) pyplot.show()
The government has caved in to calls from anti-abortionists to overhaul existing protocols and strip charities and medics of their exclusive responsibility for counselling women seeking to terminate a pregnancy. The Department of Health confirmed that it would change the rules to ensure that women are also offered counselling "independently" of existing abortion services. Its announcement was made in advance of an attempt next week led by the Tory backbencher Nadine Dorries to amend the health and social care bill to force such a requirement. Dorries says that the charity-run abortion services – including the British Pregnancy Advisory Service (BPAS) and Marie Stopes – have a financial conflict of interest in advising women seeking terminations. She says that by offering independent counselling, 60,000 of the 200,000 abortions each year could be prevented. The charities say that another layer of counselling could cause distress by delaying access to abortions. They also say that the counselling they offer is continuous throughout the process of seeking a termination and that there is no evidence they are biased in the care they provide. Yvette Cooper, the shadow home secretary, said the government's decision was based on prejudice rather than evidence. The DH confirmed that it wanted to change the rules to offer women independent counselling in addition to that currently offered by abortion services and said it was consulting on the precise method to use, with sources acknowledging that it was a direct response to lobbying from backbenchers. An aide to the health secretary, Andrew Lansley, said: "We remain of the view that we can do this without legislation but we aren't shying away from a parliamentary debate. We want women to have the offer of independent counselling, independent of the abortion provider. "We believe that it would be an improvement on the current system. Equally, the timing of it has been determined by cross-party push by backbenchers on all sides of the house to ask the government to look into this issue." Dorries launched her campaign for the change alongside the Labour MP Frank Field. They are backed by the campaign group Right to Know, which has set up a website and Facebook page to promote the idea. Dorries, a former nurse who says she is campaigning on the issue after witnessing botched terminations, says she does not oppose abortion. However, she has previously campaigned to reduce the abortion time limit and said that her explicit aim was to reduce the number of terminations, claiming that 60,000 could be prevented each year if women were given independent advice. "The important thing is that the government have highlighted themselves and agreed that counselling by organisations that are paid to conduct the procedures is not independent. That's the most important. That's very reassuring. It validates the amendment and what we're doing," she told the Guardian. "The abortion process is so fast – seven to 14 days. Women who do have doubts or niggles are on the other side before they have a chance to think it through. The majority may feel it's fine but there are a growing number thinking it wasn't what I wanted to do. As it gets faster and faster more women are falling off the edge. This is a women's rights issue." Dorries said she did not know how the Right to Know campaign was being funded, claiming that it represented "hundreds" of people and was run by a lobbyist. She would not reveal the lobbyist's name, or the other organisations the lobbyist represents but did say that she was receiving advice from Dr Peter Saunders, the head of the Christian Medical Fellowship. Saunders led the Alive and Kicking campaign, a group of anti-abortion groups including the ProLife Alliance, which campaigned for an immediate cut in the abortion time limit, prohibition of abortion for "social convenience" and a cooling-off period. Right to Know refused to reveal how it is funded, saying only that it relies mostly on individuals. A spokeswoman said: "This is a campaign that has attracted support from people of very different backgrounds and beliefs (including atheists) who simply share the common view that the support and information that women receive ahead of an abortion should be improved." Pro-choice supporters and charities such as the Family Planning Association, who are mounting a lobbying campaign of MPs, warn that the proposed amendment to the health bill would restrict women's access to impartial and non-directive information . They also predict that the counselling role could be taken up by organisations ideologically opposed to abortion. Ann Furedi, the chief executive of BPAS, said: "The thing I find most frustrating about this discussion is the assumption behind it that we want to encourage women towards the abortion option, rather than the option of continuing the pregnancy. "Nothing could be further from the truth. I can say with hands on heart that the last thing that anyone involved in abortion wants is for a woman to be having treatment that they are not sure about. Everybody wants people to walk away feeling that the right thing has been done." The health and social care bill is due to be debated in the Commons when parliament returns next week, and a decision on whether to select the amendment – one of the first submitted – will be taken on 6 September. Dorries claimed that private polling has suggested that up to 80% of MPs could back the amendment. All three parties confirmed that, as is traditional with matters of conscience, there would be a free vote on the issue. Lib Dem sources said that they had not opposed the decision to introduce independent counselling within the DH but that the coalition agreed the legislation was unnecessary. Cooper said: "These plans are based on prejudice rather than evidence. This could make it harder for women to get proper health advice and counselling when they need it most. Health ministers need to urgently think again. David Cameron should not put politics before the interests of women's health and women's lives." John Healey, the shadow health secretary, said the Labour health team would vote against Dorries' amendment: "The Tory backbenchers are hijacking the health bill to make arguments that are entirely irrelevant to the huge and fundamental changes being made to the NHS. MPs will only get two days to debate the bill, and that limited time would be spent on more important matters than this amendment." A DH spokesperson said the department "wants women who are thinking about having an abortion to be able to have access to independent counselling. Work is under way currently to develop proposals … on which the department will consult externally".
This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers, click the "Reprints" link at the bottom of any article. Disaster Recovery Plans and Succession Planning RIAs owe a fiduciary duty to clients to prepare for disasters and other contingencies. If an RIA does not have a disaster recovery plan, clients’ financial well-being may be jeopardized. RIAs should also engage in succession planning, ensuring a smooth transaction if an owner or principal leaves. The Financial Industry Regulatory Authority warned broker-dealers Friday that they were failing to properly communicate to investors all there is to know—including the potential pitfalls—of investing in nontraded real estate investment trusts. “Recent reviews by FINRA of communications with the public regarding real estate programs have revealed deficiencies,” FINRA told BDs in its Regulatory Notice 13-18. Those deficiencies include making “inaccurate or misleading statements” on the potential benefits of investing in real estate programs. Other BD communications have emphasized the distributions paid by a real estate program while failing to adequately explain that some of the distribution is return of principal. In addition, FINRA said that some communications “have not provided sufficient discussions of the risks associated with investing in the products in order to balance the presentation of benefits.” In February, LPL Financial was ordered by Massachusetts regulators to pay up to $2 million to investors who had bought shares of nontraded REITs and pay a $500,000 administrative fine. The case, announced in in December, concerns close to 600 transactions of nontraded REITs that took place from 2006 to 2009, valued at about $28 million. The Massachusetts Securities Division’s enforcement unit noted that 36 trades worth about $2.1 million were made in violation of prospectus rules and asset-concentration limitations. FINRA offered guidance to BDs on how to communicate with investors in the following eight areas: Disclosure In describing real estate programs, firms must ensure that their communications accurately and fairly explain how the products operate. Descriptions of real estate programs in communications need to be consistent with the representations in the program’s current prospectus. For example, communications that include discussion of a program’s objectives that are inconsistent with the objectives included in the program’s prospectus or that do not explain that there is no assurance that the objectives will be met would not meet Rule 2210’s requirements. Since an investor’s participation in a real estate program is an investment in the program and not a direct investment in real estate or any other assets owned by the program, communications that imply that they are direct investments also would be inconsistent with Rule 2210’s requirements. Similarly, if a real estate program has not yet qualified under the U.S. tax code as a REIT, but is being marketed as a REIT, firms should ensure that the marketing communication discloses this fact and the possibility that the real estate program may not qualify as a REIT in the future. Distribution Rates Firm communications concerning real estate programs often include distribution rates. Some real estate programs fund a portion of their distributions through return of principal or loan proceeds. For example, a portion of a newer program’s distributions might include a return of principal until its real estate assets are generating significant cash flows from operations. Rule 2210(d)(1)(B) prohibits firm communications from making any false, exaggerated, unwarranted, promissory or misleading claim. Accordingly, the rule prohibits firms from misrepresenting the amount or composition of a real estate program’s distributions. Nor may firms state or imply that a distribution rate is a “yield” or “current yield” or that investment in the program is comparable to a fixed income investment such as a bond or note. Stability/Volatility Claims Rule 2210(d)(1)(A) requires firm communications to provide a sound basis for evaluating the facts in regard to any particular security or type of security, industry or service. In addition, Rule 2210(d)(1)(D) requires communications to be consistent with the risks of fluctuating prices and the uncertainty of dividends, rates of return and yield inherent to investments. Accordingly, a firm may not assert or imply in communications that the value of a real estate program is stable or that its volatility is limited without providing a sound basis to evaluate this claim. The fact that a program offers its securities at par value, or at another relatively stable price, does not evidence stability in the value of the underlying assets. Redemption Features and Liquidity Events Rule 2210(d)(1)(A) prohibits firms from omitting any material fact or qualification if the omission, in light of the context of the material presented, would cause the communications to be misleading. Any discussion about potential liquidity events or the timing of such events must be factual and balanced. A communication may not be balanced if it fails to disclose that the date of any liquidity event is not guaranteed or, if applicable, that it may be changed at the program management’s discretion. Performance of Prior Related Real Estate Programs If a communication includes prior performance or other historical information about related or affiliated entities, this information may not be “cherry-picked” from other programs; information about all related or affiliated programs should be included with equal prominence. Moreover, firms should ensure that this information is presented to easily differentiate it from information about the current program. Of course, the information must be consistent with information in the program’s prospectus. Use of Indices and Comparisons Communications concerning real estate programs often use a real estate index’s performance to demonstrate the sector’s risk or return characteristics. As discussed above, Rule 2210(d)(1)(B) prohibits firms from making false or misleading statements or claims. In addition, Rule 2210(d)(2) requires that any comparison in retail communications between investments or services disclose all material differences between them, including (as applicable), investment objectives, costs and expenses, liquidity, safety, guarantees or insurance, fluctuation of principal or return, and tax features. The use of any given index performance may be misleading if its underlying components do not correspond with those of the program’s portfolio. For example, it would be misleading to cite the performance of an index of traded REITs to indicate how an unlisted REIT may perform. Pictures of Specific Properties Communications for a new program often include photographs or other images of properties owned by investments managed by the program’s sponsor that are similar to properties the program expects to purchase. In order to be clear that investors will not acquire an interest in the pictured property, prominent text must accompany each depiction explaining that the property is owned by an investment managed by the sponsor and not the program. Once the real estate program has acquired a portfolio, the communication may include depictions of properties that are limited to investments owned by the program. A communication concerning a real estate program that holds real estate mortgages may include photographs or other images of properties in which the program has a security interest as long as the communication discloses that the program does not own the property and that the property is collateral for a loan owned by the program. Capitalization Rates A communication may include a capitalization rate for an individual property within a real estate program if the rate is based on current information contained in the prospectus, and the communication explains how the rate was calculated, that the rate applies to the individual property, and that it does not reflect a return or distribution from the REIT or DPP itself. As a general matter, however, it is misleading for a communication to include a rate that reflects a blending of multiple individual properties’ capitalization rates. Individual properties within a program’s portfolio typically will have different acquisition dates and their respective capitalization rates, which are generally based on the acquisition price of the property, may not reflect their current values. In addition, the individual properties’ capitalization rates may reflect different calculation methodologies.
Introduction ============ Rheumatoid arthritis (RA) is a common systemic autoimmune disease ([@b1-etm-0-0-8950]). The primary pathological manifestations of RA are chronic synovium inflammation and pannus formation, which can lead to swelling and deformities in the joints of patients ([@b2-etm-0-0-8950]). These symptoms can later lead to disability, which may cause a loss of work time, which can create a burden on society and the families of patients ([@b3-etm-0-0-8950]). The pathogenesis of RA is complex, involving many types of cells, including macrophages, T and B cells, fibroblasts, chondrocytes and dendritic cells ([@b4-etm-0-0-8950]). Despite study into the role of many genes and mechanisms underlying the development of RA, there is still no clear predisposing factor ([@b5-etm-0-0-8950]). Chemokines are small protein cytokines, and their main function is to induce leukocytes aggregation to form inflammatory lesions, via directional migration, for participation in the inflammatory response ([@b8-etm-0-0-8950]). Previous studies have demonstrated that many chemokines are highly expressed in the joint synovial fluid or peripheral blood of patients with RA, which suggests that chemokines may be associated with RA pathogenesis ([@b9-etm-0-0-8950],[@b10-etm-0-0-8950]). C-X-C motif chemokine ligand 12 (CXCL12) is mainly produced by stromal cells and is a key factor for the activation and migration of inflammatory cells to synovial tissues ([@b11-etm-0-0-8950]). CXC receptor 4 (CXCR4) is a natural receptor of CXCL12([@b12-etm-0-0-8950]). The chemokine CXCL12 can participate in the immune response to RA by mediating the migration and activation of T and B cells in immune cells ([@b13-etm-0-0-8950]). CXCL12 can also be secreted and produced by joint synovial cells, while CXCR4 can be expressed on the surface of articular chondrocytes ([@b14-etm-0-0-8950],[@b15-etm-0-0-8950]). The activation of CXCR4 and CXCL12 can induce the secretion of a variety of inflammatory factors from articular chondrocytes, leading to apoptosis and destruction of chondrocytes ([@b16-etm-0-0-8950],[@b17-etm-0-0-8950]). Previous studies have demonstrated that CXCR4 and CXCL12 together can serve an important role in lupus erythematosus ([@b18-etm-0-0-8950]). These aforementioned studies indicated that CXCR4 and CXCL12 are closely associated with autoimmune diseases. Although previous studies have indicated that the expression of CXCL12 in the joint synovial membranes was significantly higher in the patients with RA compared with healthy controls ([@b21-etm-0-0-8950]), there are relatively few studies on the relationship between CXCR4 and CXCL12, and disease activity in patients with RA. Therefore, the present study investigated the expression levels of CXCR4 and CXCL12 in the serum and joint synovial fluid of patients with RA, and correlation analyses was performed to examine this data with clinical indicators. In addition, the present study investigated the roles of CXCR4 and CXCL12 in the occurrence and development of RA, and the relationship between CXCR4, CXCL12 and disease activity, to identify accurate evaluation indicators for use in patients with RA. Materials and methods ===================== ### Patient data Using a random number table method, 60 patients (male patients, 34; female patients, 26) with RA were recruited and randomly selected as the study group from the Rheumatology and Immunology Department of First People\'s Hospital of Jingzhou from January 1 to December 31, 2018. The age distribution was 32-60 years old. The average age of all patients was 54.31±5.89 years. Another 60 patients (male patients, 32; female patients, 28) with osteoarthritis, recruited from The First People\'s Hospital of Jingzhou hospital were selected as the control group. Patients were selected based on inclusion and exclusion criteria. Patients who met the RA diagnostic criteria revised by The American College of Rheumatology in 1987([@b22-etm-0-0-8950]) were included in the study group, and patients who met the guidelines on management of osteoarthritis of the hand, hip and knee by the American College of Rheumatology ([@b23-etm-0-0-8950]) were included in the control group. Patients were excluded if they had any joint infection, severe liver or kidney dysfunction, cognitive or communication disorders, other autoimmune diseases or malignant tumors, or those who declined to participle. All patients agreed to participate in the experiment and signed an informed consent agreement. This experiment has been approved by the Hospital Ethics Committee of First People\'s Hospital of Jingzhou. ### Specimen extraction A total of 5 ml fasting venous blood was obtained from all patients and centrifuged at 1,500 x g for 10 min at 4˚C. The serum was collected following centrifugation (1,500 x g for 10 min at 4˚C) and stored at -80˚C. A total of 500 µl joint fluid specimens were collected by outpatient joint punctures or knee joint surgery, and stored at -80˚C for subsequent analysis. Western blotting (WB) and ELISA were used to detect the expression levels of CXCR4 and CXCL12, respectively, in serum and joint fluid. ### Detection of CXCR4 expression level using WB 200 µl Radioimmunoprecipitation assay buffer (Cell Signaling Technology, Inc.) was added to the serum and joint fluid specimens collected from patients. The cells were lysed and the total protein of each group was collected. BCA assays were used to determine the protein concentration. After collection, the protein was boiled in water for 8 min at 100˚C. A total of 20 µg protein was loaded into the 10% SDS-PAGE gel and run at 140 V for 2 h. Subsequently, the protein was transferred to a PVDF membrane at 300 mA for 2 h, and PVDF membrane was blocked with 5% skimmed milk powder for 2 h at room temperature. The membranes were probed with the primary antibody targeting CXCR4 (1:1,000; Abcam; cat. no. ab227767) incubated overnight at 4˚C. The antibody GAPDH (1:500; Wuhan Fine Biotech Co., Ltd.; cat. no. FNab03342) was added and incubated overnight at 4˚C, then the membrane was probed with horseradish peroxidase (HRP)-labeled goat anti-rabbit secondary antibodies (1:5,000; Abcam; cat. no. ab97080) at room temperature for 2 h. Subsequently, an enhanced chemiluminescence (ECL) developer (Invitrogen; Thermo Fisher Scientific, Inc.) was used to develop the protein bands. Filter paper was used to absorb excess liquid from the film and protein bands were developed for film-imaged using ECL. The protein bands were scanned and analyzed using Quantity One software (v4.6.6; Bio-Rad Laboratories, Inc.), where the relative expression level of the protein = the gray value of the target protein band/the grey value of the GAPDH protein band. ### Detection of CXCL12 expression in serum and joint fluid of patients using ELISA The ELISA kit was purchased from Quanzhou Ruixin Biotechnology Co., Ltd. (cat. no. 13236). A total of 50 µl of the diluted standard and samples were added into each reaction well, followed by 50 µl biotin-labeled antibodies (all provided as part of the aforementioned kit). These samples were incubated at 37˚C for 1 h and then washed using the wash buffer, 4 times for 5 min each time. Streptomycin-HRP conjugate from the aforementioned kit was added and incubated for 30 min at room temperature. Subsequently, a total of 50 µl substrates provided by the aforementioned kit were added and incubated for 10 min at 37˚C. Subsequently, 50 µl terminating solution, provided by the aforementioned kit, was added to each well and the OD values were measured at 450 nm. ### Detection of routine detection indexes in patients with RA The erythrocyte sedimentation rate (ESR) from the patients with RA was detected using the Westergren\'s method ([@b24-etm-0-0-8950]) using an automatic erythrocyte sedimentation rate tester (Plyson cat. no. LBY-XC40B). C-reactive protein (CRP) and the rheumatoid factor (RF) were detected using rate scatter nephelometry ([@b25-etm-0-0-8950]) using an IMMAGE rate scattering turbidity analyzer (UniCel DxC800; Beckman Coulter, Inc.). ### Outcome measures The outcome measures were as follows: i) The levels of CXCR4 and CXCL12 in serum and joint fluid were compared between the study and control groups; ii) patients with RA were divided based on their disease activity score 28 (DAS28) scores ([@b13-etm-0-0-8950]) into the remission group (28 cases; ≤2.6 points) and the active group (32 cases; \>2.6 points), which were evaluated from four aspects, including the number of tender joints, the number of swollen joints and the erythrocyte sedimentation rate. DAS28 values range from 2.0-10.0([@b13-etm-0-0-8950]). A DAS28 \<2.6 is interpreted as \'remission\'; and iii) CXCR4 and CXCL12 expression levels in the serum and joint fluid of patients were compared. Correlations were analyzed between CXCR4 and CXCL12 expression levels, and ESR, CRP, DAS28 scores and RF in patients with RA. ### Statistical analysis SPSS 18.0 statistical software (SPSS Inc.) was used to analyze the experimental data. Data are presented as the mean ± standard deviation. A χ^2^ test was used to analyze categorical data. An independent t-test was used for comparison between two groups. One-way ANOVA with a post-hoc LSD test was used for comparison among three groups. Spearman\'s correlation was used to analyze the correlation between CXCR4 and CXCL12 expression levels. The figures in this study were drawn using Graph Pad Prism 6 software (GraphPad Software, Inc.). P\<0.05 was considered to indicate a statistically significant difference. Results ======= ### Patient data There were no significant differences between sex, age or body mass index in the two groups ([Table I](#tI-etm-0-0-8950){ref-type="table"}). ### CXCR4 and CXCL12 expression levels among the study and control groups The serum CXCR4 expression levels of the study group were 5.12±1.04 and 3.62±0.54, and the serum CXCL12 expression levels were 8.28±1.23 and 7.31±1.69. The joint fluid CXCR4 expression levels of the control group were 3.05±1.11 and 2.13±0.63, and the joint fluid CXCL12 expression levels were 5.14±1.12 and 4.54±1.25. The present results suggested that CXCR4 and CXCL12 expression levels in the serum and articular fluid of the study group were significantly higher compared with the control group (P\<0.05; [Tables II](#tII-etm-0-0-8950){ref-type="table"} and [III](#tIII-etm-0-0-8950){ref-type="table"}; [Figs. 1](#f1-etm-0-0-8950){ref-type="fig"} and [2](#f2-etm-0-0-8950){ref-type="fig"}). ### CXCR4 and CXCL12 expression levels among the RA, remission and control groups The serum CXCR4 expression levels of the RA-active group were 7.85±1.21 and 6.71±0.69, and the serum CXCL12 expression levels were 10.82±1.33 and 9.46±1.59. CXCR4 expression levels of the RA-remission group were 3.33±1.05 and 2.41±0.57, and CXCL12 expression levels were 5.18±1.15 and 4.74±1.39. The joint fluid CXCR4 expression levels of the control group were 3.05±1.11 and 2.13±0.63, and the joint fluid CXCL12 expression levels were 5.14±1.12 and 4.54±1.25. Therefore, the present results suggested that the expression levels of CXCR4 and CXCL12 in the RA-active group were significantly higher compared with the RA-remission (P\<0.05) and control groups (P\<0.05; [Tables IV](#tIV-etm-0-0-8950){ref-type="table"} and [V](#tV-etm-0-0-8950){ref-type="table"}; [Figs. 3](#f3-etm-0-0-8950){ref-type="fig"} and [4](#f4-etm-0-0-8950){ref-type="fig"}). ### Correlations between CXCR4 and CXCL12 expression levels and ESR, CRP, RF and DAS28 scores The expression levels of CXCR4 and CXCL12 had a positive correlation with the ESR, CRP, RF and DAS28 scores (data not shown) of patients with RA (P\<0.05; [Tables VI](#tVI-etm-0-0-8950){ref-type="table"} and [VII](#tVII-etm-0-0-8950){ref-type="table"}; [Figs. 5-8](#f5-etm-0-0-8950 f6-etm-0-0-8950 f6-etm-0-0-8950 f8-etm-0-0-8950){ref-type="fig"}). ### Correlation between the expression of CXCR4 and CXCL12 with disease activity Compared with the RA-active group, the expression of CXCR4 and CXCL12 in the serum of the RA remission group was significantly lower. Therefore, the present results suggested that the expression levels of CXCR4 and CXCL12 were positively correlated with the changes in RA disease activity (CXCR4, r=0.858, P\<0.001; CXCL12, r=0.864, P\<0.001; [Fig. 9](#f9-etm-0-0-8950){ref-type="fig"}). Discussion ========== RA is a chronic systemic immune disease and its pathogenesis has yet to be elucidated, but abnormal immunity is considered to contribute to its development ([@b26-etm-0-0-8950]). Previous studies have demonstrated that over the course of RA, inflammatory cells migrate from peripheral blood to synovial tissues and secrete a variety of inflammatory factors, resulting in the destruction of the synovial membrane ([@b27-etm-0-0-8950],[@b28-etm-0-0-8950]). Chemokines serve an important role in the infiltration and migration of inflammatory cells ([@b29-etm-0-0-8950]). CXCL12 is the only chemokine that binds to the receptor CXCR4([@b30-etm-0-0-8950]). CXCL12 and CXCR4 promote the migration of monocytes and T lymphocytes, and serve an important role in the process of inflammation ([@b31-etm-0-0-8950]). Previous studies have indicated that the expression levels of CXCL12 in the synovial tissue and joint fluid of patients with RA was increased, and that CXCR4 expression was also significantly increased in T lymphocytes ([@b32-etm-0-0-8950]). CXCL12 can promote the secretion of matrix metalloproteins (MMPs) via chondrocytes, including MMP-1 and MMP-13([@b35-etm-0-0-8950]). CXCR4 receptor antagonists have been used to reduce the expression levels of MMP-1 and MMP-13 in synovial fluid in patients with RA ([@b36-etm-0-0-8950]). In addition, CXCL12 and CXCR4 can further induce injury of the articular cartilage by promoting MMP secretion ([@b37-etm-0-0-8950]). Previous studies have demonstrated that CXCL12 and CXCR4 are closely associated with synovial cell inflammation in patients with RA ([@b17-etm-0-0-8950],[@b38-etm-0-0-8950]), but to the best of our knowledge, no previous reports have discussed the correlation between CXCL12 and CXCR4, or disease activity in patients with RA. The present results suggested that the expression levels of CXCR4 and CXCL12 in the RA-active group were significantly higher compared with the RA-remission and control groups (P\<0.05), but there was no significant difference between the latter two groups. Therefore, the present results indicated that the expression levels of CXCR4 and CXCL12 may be closely associated with RA pathogenesis. The correlations between CXCR4 and CXCL12 expression levels, and ESR, CRP, RF and DAS28 scores in patients with RA were also investigated. The present results suggested that CXCR4 and CXCL12 expression levels were strongly positively correlated with ESR, CRP, RF and DAS28 scores (P\<0.05). Therefore, these results indicated that CXCR4 and CXCL12 expression levels exhibited an effect on the disease activity of patients with RA and may be used as an index to evaluate this activity. Previous studies have revealed that when CXCR4 and CXCL12 expression levels were increased, chemotaxis and activating effects were induced in immune cells, which leads to overactivation of immune cells and the subsequent secretion of additional inflammatory factors and their corresponding antibodies ([@b39-etm-0-0-8950]). This effect may explain the results of the present study, in which the CXCR4 and CXCL12 expression levels of patients with RA were significantly increased. Previous studies have indicated that synovial fibroblasts in patients with RA may produce high levels of CXCL12 compared with patients with osteoarthritis ([@b21-etm-0-0-8950],[@b42-etm-0-0-8950]). This is primarily due to the hypomethylation of DNA in synovial fibroblasts in patients with RA compared with patients with osteoarthritis, which may affect CXCL12 expression ([@b43-etm-0-0-8950]). The results from these previous studies are in line with the results of the present study. In addition, previous studies have indicated that high expression levels of CXCL12 in patients with RA are associated with a variety of pathogenic events, and that the expression of CXCL12 was positively correlated with the expression of CRP, which is consistent with results from the present study ([@b44-etm-0-0-8950],[@b45-etm-0-0-8950]). Moreover, other studies have used immunohistochemistry scoring to study synovial tissues of patients with RA and revealed that CXCL12 expression level was significantly correlated with DAS28 scores, and that the expression levels of CXCL12 and CXCR4 were closely associated with disease activity and joint destruction ([@b46-etm-0-0-8950],[@b47-etm-0-0-8950]). Previous studies indicated that CXCL12/CXCR4 expression were positively correlated with RF expression ([@b48-etm-0-0-8950]), which was consistent with the results of the present study. In conclusion, the results of the present study suggested that CXCL12 and CXCR4 are highly expressed in patients with RA, and that these levels are positively correlated with the ESR, CRP, RF and DAS28 scores. Collectively, the results of the current study suggested that these factors may be used as indexes to evaluate disease activity in patients with RA. However, there are some limitations to the present study. Firstly, the present results indicated that CXCL12 and CXCR4 expression levels were increased in patients with RA, but it is unknown whether the continuous increase of CXCL12 and CXCR4 expression levels were related to disease severity. Correlational analyses were conducted between the expression levels of CXCL12 and CXCR4, and the related indexes of disease activity, but further analysis was not performed. Secondly, a close relationship was revealed between CXCL12 and CXCR4 and inflammation in patients with RA, but the correlation between CXCL12 and CXCR4, and the expression of related inflammatory factors was not analyzed. Inflammatory factors serve an important role in the pathogenesis of RA and are important for the clinical evaluation of the prognosis of patients with RA ([@b51-etm-0-0-8950]). In addition, due to the random array method for sample selection and the limited sample size, there may be a certain deviation between the research group and the control group. The present study recruited patients with osteoarthritis as the control group, rather than healthy individuals, as it is possible to extract bone and joint fluid during the examination of patients with osteoarthritis but not healthy individuals. However, the patients with osteoarthritis did not have rheumatic diseases, thus the selection may result in some bias. Future studies will further increase the sample size and recruit a more suitable selection of individuals as controls. Not applicable. Funding ======= This work was supported by Scientific Research Project of Health Department of Hubei Province (grant no. JX6C-29). Availability of data and materials ================================== The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request. Authors\' contributions ======================= LP and BW conceived the study and designed the experiments. NZ, JM and LH contributed to the data collection and performed the experiments. YY, ZZ and LW performed the data analysis and interpreted the results. LP and NZ wrote the manuscript. BW contributed to the critical revision of article. All authors read and approved the final manuscript. Ethics approval and consent to participate ========================================== All patients and their families agreed to participate in the experiment and signed an informed consent agreement. This experiment was approved by the Hospital Ethics Committee of First People\'s Hospital of Jingzhou. Patient consent for publication =============================== Not applicable. Competing interests =================== The authors declare that they have no competing interests. ![Western blotting results of CXCR4 expression levels in the study and control groups. Protein expression levels of CXCR4 in cells isolated from the serum of the study group were compared with the control group. CXCR4, C-X-C motif chemokine receptor 4.](etm-20-03-1925-g00){#f1-etm-0-0-8950} ![Western blotting results of CXCR4 expression levels in the study and control groups. Protein expression levels of CXCR4 in the cells isolated from the joint fluid of the study group compared with the control group. CXCR4, C-X-C motif chemokine receptor 4.](etm-20-03-1925-g01){#f2-etm-0-0-8950} ![CXCR4 expression levels in the serum and joint fluid of the three patient groups. The expression level of CXCR4 in the RA-active group was higher compared with both the remission and control groups. There was no significant difference in the expression level of CXCR4 between the RA-remission and control groups. ^\*^P\<0.05. CXCR4, C-X-C motif chemokine receptor 4; RA, rheumatoid arthritis.](etm-20-03-1925-g02){#f3-etm-0-0-8950} ![CXCL12 expression levels in the serum and joint fluid of the three patient groups. The expression level of CXCL12 in the RA-active group was higher compared with both the remission and control groups. There was no significant difference in the expression level of CXCL12 between the RA-remission and control groups. ^\*^P\<0.05. CXCL12, C-X-C motif chemokine ligand 12; RA, rheumatoid arthritis.](etm-20-03-1925-g03){#f4-etm-0-0-8950} ![Correlations between serum CXCR4 expression and the ESR, CRP, RF and DAS28 scores of patients with RA. CXCR4 expression in the serum of patients with RA had a strong positive correlation with (A) ESR, (B) CRP, (C) RF and (D) DAS28 scores. CXCR4, C-X-C motif chemokine receptor 4; RA, rheumatoid arthritis; ESR, sedimentation rate; CRP, C-reactive protein; RF, rheumatoid factor; DAS28, disease activity score.](etm-20-03-1925-g04){#f5-etm-0-0-8950} ![Correlations between joint fluid CXCR4 expression and the ESR, CRP, RF and DAS28 scores of patients with RA. CXCR4 expression in the joint fluid of patients with RA was had a strong positive correlation with (A) ESR, (B) CRP, (C) RF and (D) DAS28 scores. CXCR4, C-X-C motif chemokine receptor 4; RA, rheumatoid arthritis; ESR, sedimentation rate; CRP, C-reactive protein; RF, rheumatoid factor; DAS28, disease activity score.](etm-20-03-1925-g05){#f6-etm-0-0-8950} ![Correlations between serum CXCL12 expression and the ESR, CRP, RF, and DAS28 scores of patients with RA. CXCL12 expression in the serum of patients with RA was had a strong positive correlation with (A) ESR, (B) CRP, (C) RF and (D) DAS28 scores. CXCL12, C-X-C motif chemokine ligand 12; RA, rheumatoid arthritis; ESR, sedimentation rate; CRP, C-reactive protein; RF, rheumatoid factor; DAS28, disease activity score.](etm-20-03-1925-g06){#f7-etm-0-0-8950} ![Correlations between joint fluid CXCL12 expression and the ESR, CRP, RF and DAS28 scores of patients with RA. CXCL12 expression in the joint fluid of patients with RA was had a strong positive correlation with (A) ESR, (B) CRP, (C) RF and (D) DAS28 scores. CXCL12, C-X-C motif chemokine ligand 12; RA, rheumatoid arthritis; ESR, sedimentation rate; CRP, C-reactive protein; RF, rheumatoid factor; DAS28, disease activity score.](etm-20-03-1925-g07){#f8-etm-0-0-8950} ![Correlations between the expression of CXCR4 and CXCL12 with the patient disease activity. (A) CXCR4 expression was positively correlated with the changes in RA; (B) CXCL12 expression was positively correlated with the changes in RA. CXCL12, C-X-C motif chemokine ligand 12; CXCR4; C-X-C motif chemokine receptor 4; RA, rheumatoid arthritis. ^\*^P\<0.05 vs. control group.](etm-20-03-1925-g08){#f9-etm-0-0-8950} ###### Patient characteristics. Characteristic Study group N=60 (%) Control group N=60 (%) χ^2^/t P-value ------------------------------- ---------------------- ------------------------ -------- --------- Sex     0.090 0.764      Male 34 (56.67) 32 (53.33)          Female 26 (43.33) 28 (46.67)     Age     0.022 0.882      ≥54 31 (51.67) 30 (50.00)          \<54 29 (48.33) 30 (50.00)     BMI, kg/m^2^     0.023 0.881      ≤22 27 (45.00) 26 (43.33)          \>22 33 (55.00) 34 (56.67)     Smoking     1.808 0.179      No 39 (65.00) 38 (63.33)          Yes 21 (35.00) 22 (36.67)     Drinking volume, ml     0.023 0.879      \<70 37 (61.67) 36 (60.00)          ≥70 23 (38.33) 14 (40.00)     Coagulation function              APTT, sec 28.23±1.35 28.19±1.41 0.131 0.896      PT, sec 11.31±1.15 11.29±1.14 0.078 0.938      FIB, g/l 3.16±0.21 3.19±0.19 0.659 0.512 Renal function index (µmol/l)              Creatinine 57.63±4.45 58.01±4.52 0.280 0.705      Urea 5.29±0.45 5.31±0.57 0.182 0.856      Uric acid 291.34±11.35 293.14±11.45 0.707 0.481 APTT, activated partial thromboplastin time; BMI, body mass index; FIB, fibrinogen; PT, prothrombin time. ###### CXCR4 expression levels in the serum and joint fluid of the study and control groups. Factor Study group N=60 Control group N=60 t P-value ------------- ------------------ -------------------- ------- --------- Serum 3.12±1.04 3.05±1.11 8.704 \<0.001 Joint fluid 3.62±0.54 2.13±0.63 11.67 \<0.001 CXCR4, C-X-C motif chemokine receptor 4. ###### CXCL12 expression levels in the serum and joint fluid of the study and control groups. Factor Study group N=60 Control group N=60 t P-value ------------- ------------------ -------------------- ------- --------- Serum 8.28±1.23 5.14±1.12 11.75 \<0.001 Joint fluid 7.31±1.69 4.54±1.25 7.947 \<0.001 CXCL12, C-X-C motif chemokine ligand 12. ###### CXCR4 expression levels in the serum and joint fluid of the active, remission, and control groups. Factor Active group N=32 Remission group N=28 Control group N=60 F P-value ------------- ------------------- --------------------------------------------------------- --------------------------------------------------------- ------- --------- Serum 7.85±1.21 3.33±1.05^[a](#tfn1-etm-0-0-8950){ref-type="table-fn"}^ 3.05±1.1^[a](#tfn1-etm-0-0-8950){ref-type="table-fn"}^ 156.7 \<0.001 Joint fluid 6.71±0.69 2.41±0.57^[a](#tfn1-etm-0-0-8950){ref-type="table-fn"}^ 2.13±0.63^[a](#tfn1-etm-0-0-8950){ref-type="table-fn"}^ 507.2 \<0.001 ^a^P\<0.05 vs. active group. CXCR4, C-X-C motif chemokine receptor 4. F, F-test value. ###### CXCL12 expression levels in the serum and joint fluid of the active, remission and control groups. Factor Active group N=32 Remission group N=28 Control group N=60 F P-value ------------- ------------------- --------------------------------------------------------- --------------------------------------------------------- ------- --------- Serum 10.82±1.33 5.18±1.15^[a](#tfn2-etm-0-0-8950){ref-type="table-fn"}^ 5.14±1.12^[a](#tfn2-etm-0-0-8950){ref-type="table-fn"}^ 226.5 \<0.001 Joint fluid 9.46±1.59 4.74±1.39^[a](#tfn2-etm-0-0-8950){ref-type="table-fn"}^ 4.54±1.25^[a](#tfn2-etm-0-0-8950){ref-type="table-fn"}^ 118.8 \<0.001 ^a^P\<0.05 vs. active group. CXCL12, C-X-C motif chemokine ligand 12. F, F-test value. ###### Correlation between CXCR4 and CXCL12 expression in serum from the patients with RA and ESR, CRP, RF and DAS28 scores.   CXCR4 CXCL12 ------- ------- -------- ------- -------- ESR 0.766 \<0.05 0.798 \<0.05 CRP 0.836 \<0.05 0.879 \<0.05 RF 0.76 \<0.05 0.781 \<0.05 DAS28 0.751 \<0.05 0.799 \<0.05 CXCR4, C-X-C motif chemokine receptor 4; CXCL12; C-X-C motif chemokine ligand; RA, rheumatoid arthritis; ESR, sedimentation rate; CRP, C-reactive protein; RF, rheumatoid factor; DAS28, disease activity score. ###### Correlation between CXCR4 and CXCL12 expression in joint fluid from the patients with RA and ESR, CRP, RF and DAS28 scores.   CXCR4 CXCL12 ------- ------- -------- ------- -------- ESR 0.703 \<0.05 0.743 \<0.05 CRP 0.85 \<0.05 0.858 \<0.05 RF 0.788 \<0.05 0.727 \<0.05 DAS28 0.731 \<0.05 0.809 \<0.05 CXCR4, C-X-C motif chemokine receptor 4; CXCL12; C-X-C motif chemokine ligand; RA, rheumatoid arthritis; ESR, sedimentation rate; CRP, C-reactive protein; RF, rheumatoid factor; DAS28, disease activity score. [^1]: ^\*^Contributed equally
/** * Copyright (C) 2001-2020 by RapidMiner and the contributors * * Complete list of developers available at our web site: * * http://rapidminer.com * * This program is free software: you can redistribute it and/or modify it under the terms of the * GNU Affero General Public License as published by the Free Software Foundation, either version 3 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without * even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License along with this program. * If not, see http://www.gnu.org/licenses/. */ package com.rapidminer.operator.preprocessing.filter; import com.rapidminer.example.Attribute; import com.rapidminer.example.ExampleSet; import com.rapidminer.example.table.AttributeFactory; import com.rapidminer.operator.OperatorDescription; import com.rapidminer.operator.OperatorException; import com.rapidminer.operator.annotation.ResourceConsumptionEstimator; import com.rapidminer.operator.ports.metadata.AttributeMetaData; import com.rapidminer.operator.ports.metadata.ExampleSetMetaData; import com.rapidminer.tools.Ontology; import com.rapidminer.tools.OperatorResourceConsumptionHandler; /** * Converts all string attributes to nominal attributes. Each string value is simply used as nominal * value of the new attribute. If the value is missing, the new value will be missing. * * @author Ingo Mierswa */ public class String2Nominal extends AbstractFilteredDataProcessing { public String2Nominal(OperatorDescription description) { super(description); } @Override public ExampleSet applyOnFiltered(ExampleSet exampleSet) throws OperatorException { for (Attribute attribute : exampleSet.getAttributes()) { if (attribute.isNominal()) { Attribute newAttribute = AttributeFactory.changeValueType(attribute, Ontology.NOMINAL); exampleSet.getAttributes().replace(attribute, newAttribute); } } return exampleSet; } @Override public ExampleSetMetaData applyOnFilteredMetaData(ExampleSetMetaData emd) { for (AttributeMetaData amd : emd.getAllAttributes()) { if (amd.isNominal()) { amd.setType(Ontology.NOMINAL); } } return emd; } @Override protected int[] getFilterValueTypes() { return new int[] { Ontology.STRING }; } @Override public boolean writesIntoExistingData() { return false; } @Override public ResourceConsumptionEstimator getResourceConsumptionEstimator() { return OperatorResourceConsumptionHandler .getResourceConsumptionEstimator(getInputPort(), String2Nominal.class, null); } }
John Wirth was one of the main writers for Terminator: The Sarah Connor Chronicles, and now he's showrunner of NBC's The Cape, launching Sunday. We caught up with him to ask about moving from killer robots to supervillains. Spoilers ahead... We caught up with John Wirth at San Diego Comic Con last summer and he gave us an exclusive interview about his work on The Cape, which we decided to save until the show was about to air. So here it is! We were huge fans of The Sarah Connor Chronicles, so we were excited when we heard you were going to be showrunner over at The Cape. Do the two shows have anything else in common, besides Summer Glau? [Laughs] I don't know if there really need to be any commonalities, besides Summer Glau. She is a joy. She's such a talented creative unique being, and you know, the funny thing — I was sort of getting a Summer Glau vibe, like I hadn't talked to her for a while, and I sort of thought, "I need to check in with her and see what she's doing." It's the daddy mode in me. So I put a call in to her. And three days later, [The Cape creator] Tom Wheeler called me, and he said, "What are you doing?" I said, "Nothing." He said, "Well, I'm doing this pilot, why don't you come down on the set and see what's going on?" And lo and behold, there's Summer. So I thought it was very serendipitous that I should have gotten that calling and Wheeler calls me, and the whole thing comes together. How was it coming and taking over after the pilot was already shot? Well, I didn't come in and take in, I came in in a very similar way that I did on Sarah Connor Chronicles. Tom certainly has more television experience now than Josh [Friedman] had when we started on the Sarah Connor Chronicles. But he's never been in a position where he's had his own show or been expected to run his own show. And just by virtue of having been around a few more years than either of those two guys, I had a bit more experience and had things I could share with them. So on this show, I'm sort of working with Tom and creating a structure that the show can work [with]. So this is a superhero show that's hyper-aware of superhero conventions, because the Cape is an existing comic-book character before the show's protagonist decides to dress up as him. Right? That's a little bit TBD I would say... we're not quite sure how that comic book is going to play out as the series goes forward. It's certainly an aspect of the world. And it's interesting that this guy has chosen a character from a comic book to sort of embody as a superhero. So I think it's going to be very interesting. When you have a guy who's sort of living out the exploits of a comic book character... there may be a certain rivalry, like who's better? Him or the real guy? And his son, in the pilot, is very into the comic books. There will be a certain amount of expectations on the son's part as to what the Cape should be doing. So I think he'll be critiquing the Cape's performance a little bit. It's going to be a pretty light show in general, right? Right. I would say the show will be grounded. Here's the trick — creating a reality for the world of the show, communicating that reality to the audience, and then telling your stories within the boundaries of that reality, so you don't violate it. And that's what we're going to try to do. But in our world, the stakes are real, the consequences are real, the stories have danger elements that are real. And yet there's a kind of a fanciful element to it that's fun. So we won't be doing ha-ha comedy, but there will be funny situations. So there are going to be villains of the week? Yeah. I think the idea is there'll be an over-arching story. It won't be as serialized as we started out with Sarah Connor. But there will be serialized aspects to the show. But each week, it'll either be someone in James Frain's world — his character is Peter Fleming, he's sort of the big baddie — it'll be someone dispatched by him, or him, or some other villain. What do you say to people who feel like they've been burned by superhero shows in the past? I say, "Sooner or later, one of them's going to work, and be just right." It'll be this one, hopefully. Do you think this one has the right balance of respect for the mythology without getting too deep? Yeah, definitely. Tom is a comic book geek, bigtime. All of us have had our own experiences with comic books and superheroes. On the panel I showed a picture of me in my own superhero outfit at age five — and I had my own collection of superhero comics at that time, which I can still remember my father throwing out.