text stringlengths 8 5.77M |
|---|
Titus Gebel
Titus Gebel (born 1967 in Würzburg) is a German entrepreneur, lawyer, political activist and publicist. He is the former CEO of Deutsche Rohstoff AG and Managing Director of Rhein Petroleum GmbH.
Life
Gebel earned his doctorate at the University of Heidelberg at the Max Planck Institute for Comparative Public Law and International Law. He then worked as a manager for various companies in the biotechnology, venture capital and commodities industry.
In 2006 he founded Deutsche Rohstoff AG with Thomas Gutschlag and served as CEO until 2014. The company initially participated in exploration and development projects and later built its own production, primarily in Australia and the US (gold, silver, tungsten, molybdenum, petroleum, natural gas). The company has been listed on the Frankfurt Stock Exchange since 2010 and generated an annual turnover of 108 million euros in 2018. Rhein Petroleum GmbH was founded in 2007 to put oilfields in southern Germany back into operation and began production in 2018.
Today, Titus Gebel works as an entrepreneur and advocate for new special economic zones, especially in developing countries. He is the founder and president of the company Free Private Cities Inc., board member of the Seasteading Institute with Peter Thiel and Patri Friedman, as well as a partner at NeWAY Capital.
Free private cities
In his 2018 book Free Private Cities, Gebel modified the Paul Romer's Charter City concept, which has so far found no implementation. This leads Gebel back to the unwillingness of states to allow administrative officials of a third state to fulfill sovereign tasks in their own territory.
Instead, in a so-called free private city, a private company offers residents protection of life, liberty, and property in a demarcated area as "government service providers". This service includes security and rescue services, a legal and regulatory framework and independent dispute resolution. The residents pay a contractually fixed amount for these services per year. The public service provider as operator of the community can not unilaterally change the contract later. The so-called contract citizens have a legal claim that is respected and a claim for damages in case of poor performance by the private city. Disputes between them and the government service provider are brought before independent arbitration tribunals, as is customary in international commercial law. If the operator ignores the arbitration award or misuses its power in another way, its customers leave and the operator goes bankrupt.
Gebel expressly refers to his concept as a means of coping with migration crises.
Gebel is currently working with partners to realize the world's first Free Private Cities, including Honduras among others. The concept has been discussed in a positive way in the media landscape, but also criticized as neocolonialist.
Publications
Der Treuhandgedanke und die Bewahrung der biologischen Vielfalt. Pro Universitate, Berlin 1998, .
Free Private Cities: Making Governments Compete For You. Aquila Urbis, Walldorf 2018, .
Literature
Christoph Seidler: Deutschlands verborgene Rohstoffe: Kupfer, Gold und Seltene Erden Auszug in: Spiegel Online vom 27. August 2012. Carl Hanser Verlag, München 2012. .
Thomas Fuster: Leben ohne staatliche Gängelung. In: Neue Zürcher Zeitung. 25. Juni 2017.
Malte Fischer und Jan Guldner: Wenn das Leben ohne Staat möglich wird In: Wirtschaftswoche. 17. Dezember 2017.
René Scheu: Unsere Smartphones verbessern wir ständig In: Neue Zürcher Zeitung. 6. November 2018.
External links
Free Private Cities website
References
Category:1967 births
Category:Opinion journalists
Category:Activists
Category:German activists
Category:German lawyers
Category:German libertarians
Category:German chief executives
Category:Heidelberg University alumni
Category:Living people |
const path = require('path');
const merge = require('webpack-merge')
const HtmlWebpackPlugin = require('html-webpack-plugin')
const CompressionPlugin = require("compression-webpack-plugin")
const MiniCssExtractPlugin = require("mini-css-extract-plugin")
const CopyWebpackPlugin = require('copy-webpack-plugin')
const baseConfig = require('./webpack.config.base');
const NODE_ENV = process.env.NODE_ENV;
const setPath = function(folderName) {
return path.join(__dirname, folderName);
}
const isDev = () => {
return (NODE_ENV === 'development');
};
const setPublicPath = () => {
return isDev() ? '/' : '/vue2-simplert/';
};
const extractHTML = new HtmlWebpackPlugin({
title: 'History Search',
filename: 'index.html',
inject: true,
template: setPath('/src/index.ejs'),
minify: {
removeAttributeQuotes: true,
collapseWhitespace: true,
html5: true,
minifyCSS: true,
removeComments: true,
removeEmptyAttributes: true
},
environment: process.env.NODE_ENV
});
module.exports = merge(baseConfig, {
entry: {
app: './src/main.js'
},
output: {
path: isDev() ? path.resolve(__dirname) : setPath('dist'),
publicPath: setPublicPath(),
filename: isDev() ? '[name].js' : '[name].[hash].js'
},
plugins: [
extractHTML,
new MiniCssExtractPlugin({
filename: "[name].[hash].css"
}),
new CompressionPlugin({
algorithm: 'gzip'
}),
new CopyWebpackPlugin([
'images/*'
])
]
}); |
This subproject concerns middle T (MT), the major transfOrming protein of murine polyomavirus. MT causes cell transformation and sends both pro- and anti-apoptotic signals. Since MT targets host regulatory pathways, the information obtained here will be broadly relevant to understanding cell growth regulation. The common N-termini of the polyoma T antigens represent a DnaJ domain. The MT J plays a critical role in transformation by participating in recruitment of protein phosphatase 2A (PP2A). DnaI proteins are involved in protein foldingi/unfolding, translocation and regulation of protein complexes through interactions with DnaK molecular chaperones. For MT, the J domain functions in a novel manner, with recruitment of PP2A being independent of DnaK. Genetic analysis will identify specific J domain residues important for this MT function. Biochemical investigation of the J domain in middle T-PP2A interaction will determine if J interacts directly with PP2A or whether J performs an intramolecular chaperone function. Contributions of the J domain binding of DnaK to MT transformation will be tested in different cellular backgrounds. Cellular mRNAs whose expression are regulated by interactions of DnaKs with middle T will also be identified. MT sends an apoptotic signal. Genetics connect this MT signal to its PP2A binding and to activation of JNK kinases. Experiments will determine the cellular target of MT that causes apoptosis and the mechanisms by which MT activates members of the stress-activated MAPK family. A proline-rich stretch near the Cterminus from residues 332 to 347 is important for both transformation and the apoptotic signal. We will define critical residues in this region. We will also carry out two hybrid analysis to identify the host protein(s) interacting with this region. The major forms of phosphatidylinositol 3-kinase (PI3-K) interact with MT and other signal generators via SH2 domains of the regulatory 85 kDa subunit. 5112 domains, found in more than 100 proteins, represent major connectors of tyrosine phosphorylation signaling. NMR structural analysis will be performed to probe the basis of SH2 specificity and to examine interactions with two novel ligands, doubly tyrosine phosphorylated peptides and phosphatidylinositol 3,4,5 triphosphate (PIP3). NMR will provide leads to be used for genetic experiments to test the importance of SH2 interactions with these novel ligands in signaling via PI3-K. |
Q:
Script to Extract data from web page
I am looking to extract some parts of data rendered on a web page.
I am able to pull the entire data from the page and save it in a text file (RAW) using the code below.
curl http://webpage -o "raw.txt"
Just wondering if there were other alternatives and advantages whatsoever.
A:
I would use a combination of requests, and BeautifulSoup.
import requests
import BeautifulSoup
session = requests.session()
req = session.get('http://stackoverflow.com/questions/10807081/script-to-extract-data-from-wbpage')
doc = BeautifulSoup.BeautifulSoup(req.content)
print doc.findAll('a', { "class" : "gp-share" })
|
Q:
Odoo 10 XMLRPC - Retrieve Image
I am trying to retrieve image from XMLRPC.
I do:
record = api.execute_kw(db, uid, pwd, 'product.template', 'read', [[id]], {'fields': ['id', 'name', 'image']})
sub_record = dict((k, record[0][k]) for k in ('id', 'name', 'image'))
print sub_record['image']
If I print the image using print sub_record['image'] then I get:
[...]
eSYH+sOdc3UW9XB1SzWvVCtcI0PfKdoYe9Suf/3116+mMGyhLTg/yedEprt6nOI3eNOxT9t6SzMN
Cj8tT5Lp9eqmsvmu1reytnROwdFvdWvkwsLihqqJ0+49ZW8nu9tzDb+RkT2f5tWpjpf8yZaJzyYW
SPN8f22Vnp9pr+mA7KzqwltQk8QGT02ViY6bpvBdTZqJH5uafxJcHFzPp8nB6KTYUlMq4jS3mAkm
[...]
So basically several carriage returns are inserted in the middle of the image base64 string.
How can I use that string to display it in an <img> html tag?
Do I have to remove these carriage returns first?
A:
Basically you get the base64 string from the odoo. You don't need to modify it just add the data:image/jpeg;base64, content before the base64 string. Now you have to add whole updated string in image tag as below.
<img src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAAUA
AAAFCAYAAACNbyblAAAAHElEQVQI12P4//8/w38GIAXDIBKE0DHxgljNBAAO
9TXL0Y4OHwAAAABJRU5ErkJggg==" alt="Red dot" />
Also Check this https://jsfiddle.net/Xadvz/7883/ example in which I have created image from the base64 string of demo product "Ink Cartridge" for further reference.
I hope this will help you!
|
Job Description
This is a fantastic opportunity to work for a company who is passionate about assisting vulnerable individuals with learning disabilities all over the UK. Currently seeking Support Workers.
You'll be developing person centred working relationships with individuals, utilising Autism specific approaches and interventions such as the SPELL framework and TEACCH to ensure that meets the individuals needs. You'll also have good understanding of the importance of the individuals daily plan and will use the effectively on a daily basis in order to manage their needs and track their progress against goals set. Supporting individuals to develop and maintain a high standard of personal hygiene and appearance including physical care e.g. bathing and toileting, dressing and feeding. You'll be encouraging meaningful activities both inside and outside the service in accordance to the individuals interests, choices and needs.
The ideal candidate will possess the following skills, experience and or qualifications: - Previous experience supporting/ caring for people with learning disabilities - in a voluntary or paid capacity - Experience of supporting people within a residential or outreach setting - Level 3 or above minimum qualification relevant to Social Care - Experience working with people with Autism Spectrum disorders - Full drivers license
If you feel you meet the requirements or just have a general enquiry then please send your CV over to me at or contact me on 0208 680 8183.
BS Social Care work with a range of services on both a temporary and permanent basis, if this role is not for you but you have experience within Social Care then please don't hesitate to get in touch to see what else we may have available for you. |
Q:
How to filter one filed using multiple values in ListAPIView?
How to filter one filed using multiple values in ListAPIView?
URL: /api/items/?status=active&status=pending
I need to get results that have both active and pending status. What filter_backends will be good for my case?
A:
Yes, you can use DjangoDefaultFilterBackend like that:
from django_filters import DjangoFilterBackend
class profile_view(generics.ListAPIView):
queryset = ModelName.objects.all()
serializer_class = SerializerName
filter_backends = [DjangoFilterBackend]
filter_fields = {
'status': ["in", "exact"] # icontains ,exact, gte, lte, in
# if you want to add more field you can add
}
then you can filter data by ?status__in=active, pending or status=active.
|
That’s where all the data and statistical analytics could come into play, if players decide to utilize it. Anthopoulos has made requests of Braves CEO Terry McGuirk to spend money to hook up the Braves with data services and fill positions that didn’t exist in the organization before now. He said McGuirk has been entirely supportive and granted every request thus far.
“The philosophy is, all 25 guys on this roster, can we make them better?” Anthopoulos said. “Even star players, guys like (Cody) Bellinger or (Corey) Seager (of the Dodgers), they’re great players; can they get better? At the end of the day it’s up to the player, and we’re not doing our job if we’re not doing everything we can to improve their performance, if they want.”
He saw it happen with those two and with Taylor, Justin Turner and other Dodgers.
“You sit back and you wait, sometimes the player may want to come (to you) in a few instances,” Anthopoulos said. “A player may have scuffled, he may say, ‘Hey, what do you guys have for me?’ And at that point, you’re ready. ... It’s a player’s career; the manager there’s to manage him, do his job, coaches as well. We don’t want them necessarily sitting in front of the computer trying to run through reams and reams of data and spending hours doing that when they can spend actual time doing work in the bullpen, work on the field, connecting with guys, spending time with them. We can help take some of the load off.”
Anthopoulos stressed that he and his front-office staff won’t in any way interfere with field instruction or determine in-game moves. He said they are there only to provide information. They’ll give it to manager Brian Snitker, who will decide with his coaches what to use and how to pass along the knowledge and info to players.
“Snit is the manager of the team,” Anthopoulos said. “We don’t pull players aside on our own. Things go through the coaching staff. I’m not (hitting coach) Kevin Seitzer. I’m not going to go down to the cages, nor is anybody on our staff going to do that. We give the information to the staff. They’ll have their input and shape it. Maybe we have two or three items that after discussing, they say, ‘You know what, this one item is something we should try to talk about.’ And it’s up to them to deliver it to the player.
“The coaches are there to coach, we’re just there to help take off the load and maybe provide some information for them. And again, we’re not re-inventing the wheel, this happens at all levels. Thirty clubs are doing this – to varying degrees – but things go through the staff.”
Anthopoulos has met several times with Snitker and said he talked Tuesday again in his hotel suite at the Winter Meetings with Snitker, pitching coach Chuck Hernandez and new bench coach Walt Weiss.
“At the end of the day I think some of that stuff is overblown,” Anthopoulos said of all the discussion and stories such as this one about using analytics. “I think it’s providing information. But the manager is the one (to apply it). There’s information there, we can talk about things, debate things, but at the end of the day it’s their decision. We just felt looking at this that there’s some really good people that are here, my view of it is, from my experiences being in it in L.A. and Toronto as well, we can add to that.
“Talking to Snit, Walt and Chuck, I mean, we’ll provide information as a front office. But look, at the end of the day, Snit’s going to manage the game, and it’s up to him what he wants to apply and doesn’t want to apply. And the same way with players. You can produce all kinds of stuff internally; there’s only so much that may get down there. You do it as a team, so we may have some ideas and information that, hey, someone should throw four-seamers in, and Chuck may tell us, ‘Hey, he has a tough time getting glove-side’ or whatever it might be, it just doesn’t work.
“So you need to have that dialogue and that communication, so the information and data may tell you ‘X,’ but maybe it doesn’t work because the guy has a hard time doing certain things, maybe he can’t get ahead (in the count), that kind of thing. So it’s collaboration, it’s a team thing, but at the end of the day, we’re going to provide information to them, they’re going to use what they feel is appropriate, we’re going to do it as a team. Players as well. You give input, at the end of the day it’s up to players whether they want to apply it.” |
Janet Craig's'' glowing, glossy green is otherwise found only in the foliage of a few plants that are used outdoors as landscape ornamentals, including natal plum (Cariss), bear's breech (Acanthus), Victorian box (Pittosporum undulatu) and gardenia.
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. |
NOTE: This disposition is nonprecedential.
United States Court of Appeals
for the Federal Circuit
______________________
PENTAIR WATER POOL AND SPA, INC.,
Plaintiff-Appellee
v.
HAYWARD INDUSTRIES, INC., HAYWARD POOL
PRODUCTS, INC.,
Defendants-Appellants
______________________
2015-1488
______________________
Appeal from the United States District Court for the
Central District of California in No. 2:11-cv-10280-GW-
MRW, Judge George H. Wu.
______________________
JUDGMENT
______________________
MARK BOLAND, Sughrue Mion, PLLC, Washington,
DC, argued for plaintiff-appellee. Also represented by
KENNETH J. BURCHFIEL, RAJA N. SALIBA, GRANT SIMON
SHACKELFORD.
LEE CARL BROMBERG, McCarter & English, LLP,
Boston, MA, argued for defendants-appellants. Also
represented by LORI JAYNE SHYAVITZ, AMY JOY TINDELL,
KEITH E. TOMS; SCOTT S. CHRISTIE, MATTHEW ADAM
SKLAR, Newark, NJ.
______________________
THIS CAUSE having been heard and considered, it is
ORDERED and ADJUDGED:
PER CURIAM (MOORE, O’MALLEY, and HUGHES, Circuit
Judges).
AFFIRMED. See Fed. Cir. R. 36.
ENTERED BY ORDER OF THE COURT
February 8, 2016 /s/ Daniel E. O’Toole
Date Daniel E. O’Toole
Clerk of Court
|
Transition to chaos in continuous-time random dynamical systems.
We consider situations where, in a continuous-time dynamical system, a nonchaotic attractor coexists with a nonattracting chaotic saddle, as in a periodic window. Under the influence of noise, chaos can arise. We investigate the fundamental dynamical mechanism responsible for the transition and obtain a general scaling law for the largest Lyapunov exponent. A striking finding is that the topology of the flow is fundamentally disturbed after the onset of noisy chaos, and we point out that such a disturbance is due to changes in the number of unstable eigendirections along a continuous trajectory under the influence of noise. |
rk out 44 + 0.04.
44.04
What is -12575 - 12?
-12587
What is the distance between 961 and -64?
1025
What is 0.4 - 21.91?
-21.51
Put together 3498 and 0.5.
3498.5
-1.7+-64845
-64846.7
What is 676 plus 0.5062?
676.5062
Calculate 3.254 - -0.4.
3.654
What is 0.3 + -15216.16?
-15215.86
What is -441 - 1?
-442
Subtract -0.2 from -87895.
-87894.8
-153 + -249.23
-402.23
Put together 0.1 and 18.24875.
18.34875
Work out -56619.8 + -0.4.
-56620.2
Work out -183.79 - -1.41.
-182.38
Subtract 0.1 from -5246.
-5246.1
What is 26166 take away -3?
26169
What is 12939.1 plus 0?
12939.1
What is -0.5 plus -7.57?
-8.07
Total of -115.9 and -3794.
-3909.9
Add together -325 and -1.05.
-326.05
-2179 + 3
-2176
What is 185107 minus -11?
185118
Calculate 5 - -26.
31
-4855 + -0.1
-4855.1
What is -1627 - -3860?
2233
0.1 - -3.4
3.5
Add -56.8 and -3.
-59.8
Put together 5.38 and -0.029.
5.351
What is the difference between 239 and 0?
239
Calculate 0.087 + -3.
-2.913
What is 2375 minus -13.62?
2388.62
What is 0.2 + 70501?
70501.2
Sum -0.148 and -3.6.
-3.748
-16.2 - 1.5
-17.7
-4.96 + -0.31
-5.27
What is -202.8 minus -6?
-196.8
What is -32569 take away 0.5?
-32569.5
Put together -0.64593 and 3.
2.35407
Sum 0.4 and -0.6089.
-0.2089
Work out -1349.24 - -3.
-1346.24
What is -2338 minus -3?
-2335
99+838.3
937.3
Calculate 0.2 + 9.24.
9.44
What is 4 minus 1118395?
-1118391
Work out -5.5 - -3.7644.
-1.7356
0.2 - 8587
-8586.8
Add together -4 and -3.168.
-7.168
Total of 0 and 767.569.
767.569
3426 + 2
3428
Total of 8.05931 and -2.
6.05931
Calculate -8.4 - 0.12.
-8.52
Work out 0.002855 + -0.222.
-0.219145
What is -17.7 take away -2037?
2019.3
What is -1210 take away -6?
-1204
What is -64.72 plus 0?
-64.72
Add -221148 and 2.
-221146
Add -1.33922 and -5.
-6.33922
What is -258 less than 12858?
13116
What is 7544.5 minus 0?
7544.5
Add together -16 and 3363.
3347
What is 4331267 + 0.1?
4331267.1
What is 0.46 minus 10?
-9.54
Add -1469.327 and 6.
-1463.327
What is -0.032 - -0.28?
0.248
39064 + -0.03
39063.97
5+53
58
What is -0.3 less than -2.961?
-2.661
What is the difference between 42414 and 0.4?
42413.6
What is -9.4 + -9210?
-9219.4
-0.677081 + -6
-6.677081
-3157414 - -1
-3157413
Total of 0.08698 and 0.
0.08698
Subtract 4 from 601.
597
Total of 33094 and 0.2.
33094.2
What is the distance between 4 and -31785?
31789
Add -0.3 and -72.1.
-72.4
Calculate -48 - -21.
-27
What is 63 plus -47?
16
What is -0.4 less than -32.1?
-31.7
What is the difference between 0.2 and -8820?
8820.2
-8147 - -0.2
-8146.8
What is -0.7 - 0.8666?
-1.5666
Work out -0.187 + -120.
-120.187
Add together 0.4 and 1284.
1284.4
What is the distance between -0.4 and 15091.59?
15091.99
What is the difference between -4.1 and 13817?
13821.1
30 + 0.043734
30.043734
Work out -3078 + 204.
-2874
332 + 0.1991
332.1991
18 - 71
-53
Calculate 0.5 + 140715.
140715.5
-5377 - -4
-5373
What is 25547 less than -0.5?
-25547.5
What is -14 - 195?
-209
-37 + -501
-538
What is -0.095 plus 1.339?
1.244
What is the difference between -0.6 and 44?
44.6
Add together 0.2 and 0.119.
0.319
Sum -9.2 and -39.
-48.2
Add together 201 and 0.27.
201.27
Calculate 9 - -192906.
192915
What is -132 take away 5.22?
-137.22
What is -82.5 - -0.3?
-82.2
Sum 0.4 and 7371.
7371.4
Put together -8.39 and 0.04.
-8.35
What is 38 plus -1843?
-1805
Add 0.116 and -41.
-40.884
Subtract 0.059 from -2040.
-2040.059
Put together 0.1 and -4977.
-4976.9
What is the distance between 9568 and 0.3?
9567.7
What is -0.5 less than -2.29772?
-1.79772
0.055 - -2.8645
2.9195
What is 1 less than 1.5452?
0.5452
What is -32 minus -133201?
133169
Work out -22019 + 0.5.
-22018.5
Put together -0.121 and 2.4.
2.279
What is -632436 - -0.04?
-632435.96
Add together -2858 and -227.
-3085
What is 18.03 less than 0.2?
-17.83
0.0164 - 0.03
-0.0136
Total of -179 and 0.
-179
Put together 323 and 1854.
2177
What is the distance between 5648 and -11?
5659
Subtract -0.2 from -11502.
-11501.8
Work out -2.0022 + -0.035.
-2.0372
Total of 4 and -10373.
-10369
Calculate 0.03 + -1972.1.
-1972.07
What is 80.6 less than -0.5?
-81.1
What is 10095302 plus 0.2?
10095302.2
Total of 1.925 and -5.
-3.075
Add together 79.28 and 1.
80.28
Work out 13 + 1.423.
14.423
Add together -16836 and -3.
-16839
What is -39 - 17370?
-17409
Sum -0.68115 and 1.
0.31885
Work out 372 - 0.3601.
371.6399
Calculate 4 + -755.
-751
Put together -645 and 101.22.
-543.78
Calculate -47.32 + -7.
-54.32
Subtract 1264 from 0.6.
-1263.4
0.02+-5.3
-5.28
What is -198.5 plus 41?
-157.5
Calculate -120.7 - 2.
-122.7
Add -1.5 and -29.6.
-31.1
What is -1483.04 + 0.3?
-1482.74
Subtract 0.01 from 11146.
11145.99
Subtract 178706 from -0.1.
-178706.1
Calculate -109955 - 5.
-109960
Work out 0.1 - -1.42.
1.52
What is 2.29 less than -28?
-30.29
Sum 19536 and -0.3.
19535.7
What is -3238 minus -5?
-3233
Total of 0.13 and -0.42.
-0.29
What is 8043 + 0.078?
8043.078
What is 0.015637 minus 5?
-4.984363
What is 123.6 less than -4?
-127.6
What is -17 + 0.1428?
-16.8572
Add 153072 and -5.
153067
Calculate -128655.5 + -0.2.
-128655.7
Work out 0 + -0.2526.
-0.2526
-0.1 + -6.27619
-6.37619
What is 55 less than 0.07?
-54.93
What is the distance between -35462 and -25?
35437
What is 23 + -230?
-207
Calculate 0.4 + -3200.
-3199.6
What is 1.05 minus 1264?
-1262.95
Calculate 36 - 2.2.
33.8
1173 + 4
1177
Sum -5 and -247.
-252
Work out 0.267 + 2.
2.267
What is 0.4 take away 3665?
-3664.6
1 - 0.0464
0.9536
Subtract 18923 from 1.7.
-18921.3
What is 77814.6 - 0.1?
77814.5
Subtract 28820 from -0.047.
-28820.047
What is the difference between 2157 and -251?
2408
What is the distance between 0.1 and 31566?
31565.9
What is 0.2 less than -0.2429068?
-0.4429068
Work out -4 + 156128.
156124
What is the distance between -21307 and 51?
21358
What is 4 minus -17.34?
21.34
Subtract -0.4 from -43.335.
-42.935
Calculate -9 - -1111.
1102
What is -165549 take away 0?
-165549
What is 0.06 minus -42022?
42022.06
What is the distance between 5 and -3.71?
8.71
Calculate 0.1 + -138.81.
-138.71
0+11659
11659
What is -4 take away -1.273913?
-2.726087
Sum -53 and -26.
-79
What is the difference between -304 and -0.9236?
303.0764
What is 18 + 212?
230
Total of 0.20005 and 0.5.
0.70005
Add together 0.17 and 10.09.
10.26
What is -0.0899 less than -4?
-3.9101
What is the distance between -9.8 and 55?
64.8
Add together -1404 and 1.3.
-1402.7
What is -1440468 plus -3?
-1440471
Put together 1 and 69.954.
70.954
What is 98 less than -936?
-1034
-737 - 0.5
-737.5
What is -24.8 plus 2?
-22.8
Total of -138 and -0.41.
-138.41
Add -4 and 81164.
81160
Work out 116 + 0.01.
116.01
What is 50.7 minus 926?
-875.3
Calculate -54 - -0.292.
-53.708
Calculate -0.25 - 49.
-49.25
Work out -0.1 - 123.
-123.1
26+1335
1361
Subtract 1 from 4833.
4832
Total of 136768 and 1.
136769
Subtract 0.1 from 0.0014.
-0.0986
What is 0.02 take away -0.1426?
0.1626
Add 4 and -94.615.
-90.615
Calculate -4 - 0.080459.
-4.080459
What is 1.50361 take away 0.8?
0.70361
-20.35+-0.4345
-20.7845
What is 174 plus 11.029?
185.029
2+59.9541
61.9541
What is -0.45 minus -3.2?
2.75
What is 7.559 plus 2?
9.559
Calculate 0.74773 + -0.4.
0.34773
Add together -0.13 and -2.35.
-2.48
What is the distance between -0.03308 and 0.5?
0.53308
Put together 0.09 and 3.04.
3.13
-3 - 13.615
-16.615
Total of 0.3113 and 0.4.
0.7113
1.5 + -0.26
1.24
Add together -13 and 377.
364
Add together -33996 and 0.08.
-33995.92
What is 138.313 take away 5?
133.313
Work out -9000 - 0.3.
-9000.3
Add -54 and -624.
-678
0.159+3
3.159
Work out 0.4 - -0.38496.
0.78496
Sum -0.13 and -9230.
-9230.13
What is -0.10187 plus 0?
-0.10187
What is -19 take away 238?
-257
Add together 14247 and 16.
14263
Work out -3.17 + -6.
-9.17
What is -0.3 minus 235?
-235.3
What is 3 - -18006?
18009
What is 50697 take away -0.3?
50697.3
What is -19.9 less than 161.6?
181.5
What is the difference between -3 and -15.553?
12.553
Work out 19 - 300.
-281
Calculate -541 - 67.4.
-608.4
Calculate 0.8901373 + 3.
3.8901373
496+-153.7
342.3
Add together -1.7 and -1111.
-1112.7
-4 + 207669
207665
0 - 2274.1
-2274.1
Calculate 3 - 17.667.
-14.667
0.15602 - -0.5
0.65602
What is the difference between 1 and -1.250207?
2.250207
What is 216.6228 - -5?
221.6228
Work out 0.34 + 0.09204.
0.43204
What is -15.79741 - -0.9?
-14.89741
Total of -0 |
DNA fragmentation and cell death is selectively triggered in activated human lymphocytes by Fas antigen engagement.
Fas is a mouse monoclonal antibody-defined cell surface antigen of an unknown physiologic function. Previous studies demonstrated that the anti-Fas antibody mediated apoptosis in those cells sensitive to tumor necrosis factor (TNF) and, further, triggered the co-downregulation of tumor necrosis factor receptors (TNF-Rs). These findings led to speculation that Fas may be associated with TNF-Rs. The present studies were undertaken as an extension of our previous work on the obligate requirement for TNF in development and maintenance of cytotoxic lymphocytes and were designed to analyze the expression and consequences of Fas engagement in these cells. Herein, we demonstrate that, in contrast to TNF-R expression, both resting and IL-2-activated lymphocytes express Fas. In accordance with previous studies using tumor cell lines, lymphocytes rapidly downregulate TNF-Rs after treatment with anti-Fas. The ability of anti-Fas to mediate apoptotic cell death in lymphocytes, however, was dependent upon the status of cellular activation. For example, lymphocytes activated in IL-2 for longer than 4 days underwent rapid DNA fragmentation and cell death after anti-Fas treatment. Despite their expression of Fas, nonactivated lymphocytes and those activated for periods less than 4 days were refractory to antibody-mediated cell killing. Because anti-Fas-mediated lethality is selective for chronically activated lymphocytes, Fas may prove to be an appropriate target for immunosuppressive intervention. |
Second Phase of CSME Youth Exchange see Jamaican Students coming to SVG
As part of the Caribbean Single Market and Economy (CSME) initiative to get youngsters more knowledgeable about the Caribbean, the CSME secretariat conducted its second phase of youth exchange with Jamaican students coming to this country.
The students will assess documents and functioning sectors and conduct reports on their findings.
Some 19 students from this country were sent as exchange students to St. Kitts where they spent two weeks conducting similar activities.
CSME representative Joel Richards called on the students to learn as much as they can, as the lessons learnt, will be applied to real life situations.
The focal point person for Jamaica, Alicia Morris, says her team of close to 20 students is looking forward to the learning experience under the exchange programme. |
Films & Schedules
- Family Fare
3 MILLION
DIRECTOR: Jaime Roos, Yamandu Roos - URUGUAY
3 Million is a documentary for soccer lovers, but also for anyone who likes to root for the underdog. Like many countries, Uruguay’s heart stops and starts with the fate of its beloved soccer team. In this joyous documentary about the passion of soccer, the iconic Uruguayan musician Jaime Roos and his (Dutch) photographer son Yamandu follow the national team’s 2010 World Cup run to the electric semi-finals in South Africa. From Kimberley to Johannesburg to Cape Town to Pretoria, Jaime and Yamandu uncover truths about the players and the excitement of memorable games with the world’s top teams, as...
3 Million is a documentary for soccer lovers, but also for anyone who likes to root for the underdog. Like many countries, Uruguay’s heart stops and starts with the fate of its beloved soccer team. In this joyous documentary about the passion of soccer, the iconic Uruguayan musician Jaime Roos and his (Dutch) photographer son Yamandu follow the national team’s 2010 World Cup run to the electric semi-finals in South Africa. From Kimberley to Johannesburg to Cape Town to Pretoria, Jaime and Yamandu uncover truths about the players and the excitement of memorable games with the world’s top teams, as well as reveal their own relationship, which has its own suspense and surprise. A music-infused, father-son road trip in celebration of the powerful uniting force of sport. (135 mins.)
BARFI!
DIRECTOR: Anurag Basu - INDIA
In this timeless, enchanting fable, rising Bollywood star Ranbir Kapoor gives a winning performance as a deaf-mute man whose life is a series of comic and tragic misadventures. Dedicated to Charlie Chaplin and Buster Keaton, the nearly wordless Barfi! follows the resourceful title character as he falls in and out of love with the beautiful Shruti, whose parents pressure her into a respectable arranged marriage. Later, he finds love again with the autistic Jhilmil—whose father plots to defraud her of a sizable trust fund—only for Shruti to unexpectedly reenter his life. In between, Barfi finds himself caught up in a...
In this timeless, enchanting fable, rising Bollywood star Ranbir Kapoor gives a winning performance as a deaf-mute man whose life is a series of comic and tragic misadventures. Dedicated to Charlie Chaplin and Buster Keaton, the nearly wordless Barfi! follows the resourceful title character as he falls in and out of love with the beautiful Shruti, whose parents pressure her into a respectable arranged marriage. Later, he finds love again with the autistic Jhilmil—whose father plots to defraud her of a sizable trust fund—only for Shruti to unexpectedly reenter his life. In between, Barfi finds himself caught up in a bank robbery, two botched kidnappings, and all other manner of slapstick mayhem. This broadly entertaining treat for film lovers of all ages is this year’s Indian submission for the Best Foreign Language Film Oscar. (151 mins.)
ENGLISH VINGLISH
DIRECTOR: Gauri Shinde - INDIA
Shashi (Sridevi) is a beautiful, dedicated Pune homemaker, devoted wife, and mother. Yet because of her poor English, she is made to feel insecure by her husband and teenage daughter and by society at large. When she is called to New York to help prepare her niece’s wedding, Shashi overcomes her fears of traveling alone but is nevertheless overwhelmed. Humiliated for not being able to order a cup of coffee properly, she secretly enrolls in an accelerated English class and quickly becomes a dedicated student. With the other multi-ethnic students acting as a support system and boosted by the admiration...
Shashi (Sridevi) is a beautiful, dedicated Pune homemaker, devoted wife, and mother. Yet because of her poor English, she is made to feel insecure by her husband and teenage daughter and by society at large. When she is called to New York to help prepare her niece’s wedding, Shashi overcomes her fears of traveling alone but is nevertheless overwhelmed. Humiliated for not being able to order a cup of coffee properly, she secretly enrolls in an accelerated English class and quickly becomes a dedicated student. With the other multi-ethnic students acting as a support system and boosted by the admiration of French classmate Laurent in particular, she rediscovers her own worth. “Breezy and charming but with much to say about the delicate balance between tradition and modernity, English Vinglish marks the return to the big screen—after a 15-year hiatus—of beloved Indian mega-star Sridevi.”—Toronto International Film Festival (133 mins.)
KAUWBOY
DIRECTOR: Boudewijn Koole - NETHERLANDS
The European Film Academy’s Best European Youth Film and the Dutch submission for the Best Foreign Language Film Oscar, Kauwboy tells the story of 10-year-old Jojo who lives alone with his security guard father, a sometimes volatile man of few words. Missing his absent mother, a country singer said to be away touring, worried Jojo finds solace in an unexpected friendship with a baby jackdaw that has fallen from its nest. A tender portrait of a young boy trying to come to terms with a family that’s not what it once was and struggling to find a balance between reality...
The European Film Academy’s Best European Youth Film and the Dutch submission for the Best Foreign Language Film Oscar, Kauwboy tells the story of 10-year-old Jojo who lives alone with his security guard father, a sometimes volatile man of few words. Missing his absent mother, a country singer said to be away touring, worried Jojo finds solace in an unexpected friendship with a baby jackdaw that has fallen from its nest. A tender portrait of a young boy trying to come to terms with a family that’s not what it once was and struggling to find a balance between reality and desire, this cinematic, emotionally astute film sensitively explores issues of loss and sorrow while painting a joyfully upbeat picture of acceptance and love. (81 mins.)
LA PIROGUE
DIRECTOR: Moussa Touré - SENEGAL
It is estimated that between 2005 and 2010 more than 30,000 Africans set off for Europe in small boats, with more than 5,000 dying on the journey. La Pirogue is the moving story of a group of Senegalese taking the chance in hopes of a better life. Baye Laye is the captain of a fishing pirogue—an open-top, wooden boat—who dreams of earning a better living for his family. When he is offered to lead one of the many pirogues that head from Dakar to Spain via the Canary Islands, he reluctantly accepts the job, knowing the dangers that lie ahead....
It is estimated that between 2005 and 2010 more than 30,000 Africans set off for Europe in small boats, with more than 5,000 dying on the journey. La Pirogue is the moving story of a group of Senegalese taking the chance in hopes of a better life. Baye Laye is the captain of a fishing pirogue—an open-top, wooden boat—who dreams of earning a better living for his family. When he is offered to lead one of the many pirogues that head from Dakar to Spain via the Canary Islands, he reluctantly accepts the job, knowing the dangers that lie ahead. Adroitly capturing the dilemmas and dangers facing these desperate men, La Pirogue is a powerful depiction of a story that is universally human. (87 mins.)
THE LAST SHEPHERD
DIRECTOR: Marco Bonfanti - ITALY
Renato Zucchelli lives in the beautiful mountain farmlands just outside Milan. He is the last traveling shepherd in the region, the last man tending sheep in Lombardy, an area ever consumed by urbanization. Renato has a dream: to lead his flock into the heart of Milan to meet children who have never seen someone like him, showing them that dreams and freedom will always exist as long as there is still room to believe in a last shepherd. At once funny, touching, and serious, The Last Shepherd is ultimately a warm and endearing portrait of a man, his dog, his...
Renato Zucchelli lives in the beautiful mountain farmlands just outside Milan. He is the last traveling shepherd in the region, the last man tending sheep in Lombardy, an area ever consumed by urbanization. Renato has a dream: to lead his flock into the heart of Milan to meet children who have never seen someone like him, showing them that dreams and freedom will always exist as long as there is still room to believe in a last shepherd. At once funny, touching, and serious, The Last Shepherd is ultimately a warm and endearing portrait of a man, his dog, his family, and his sheep, who conquer a city with nothing more than the power of imagination. (76 mins.)
First Feature.
Sponsored by the Italian Cultural Institute, San Francisco and the Italian Film Commission, Los Angeles.
A LETTER TO MOMO
DIRECTOR: Hiroyuki Okiura - JAPAN
From anime master Hiroyuki Okiura comes this touching, fantastical tale of a young girl’s grief and the three mischievous spirits sent to look after her. After the death of her father, 13-year-old Momo and her mother move from Tokyo to the remote island of Shio. Here, Momo is haunted by the discovery of an unfinished letter her father was writing to her—and plagued by the presence of three heaven-sent goblins whose bumbling efforts to protect her tend to cause more chaos than good. “As gorgeous as Momo is to behold, the film’s sensitive portrayal of a teenager dealing with grief...
From anime master Hiroyuki Okiura comes this touching, fantastical tale of a young girl’s grief and the three mischievous spirits sent to look after her. After the death of her father, 13-year-old Momo and her mother move from Tokyo to the remote island of Shio. Here, Momo is haunted by the discovery of an unfinished letter her father was writing to her—and plagued by the presence of three heaven-sent goblins whose bumbling efforts to protect her tend to cause more chaos than good. “As gorgeous as Momo is to behold, the film’s sensitive portrayal of a teenager dealing with grief proves its most compelling element. ... With its complex characterizations and multiple storylines, [Momo] rivals mature live-action drama.”—Variety(120 mins.)
OLD DOG
DIRECTOR: Pema Tseden - CHINA
Filled with breathtaking shots of the Himalayan countryside, Tibetan filmmaker Tseden offers an emotional allegory about urbanization and generational conflict. On a visit to a frontier town, middle-aged Gonpo decides to sell his faithful Tibetan mastiff to a Chinese trader who specializes in procuring dogs for wealthy landowners as status symbols. Gonpo’s father, Akhu, disturbed by his son’s lack of regard for their dog, purchases the animal back, initiating the simple storyline revolving around the dog’s destiny and the ensuing familial dynamics. Rich with commentary on the evolving conflict within Tibetan culture and a way of life that is quickly...
Filled with breathtaking shots of the Himalayan countryside, Tibetan filmmaker Tseden offers an emotional allegory about urbanization and generational conflict. On a visit to a frontier town, middle-aged Gonpo decides to sell his faithful Tibetan mastiff to a Chinese trader who specializes in procuring dogs for wealthy landowners as status symbols. Gonpo’s father, Akhu, disturbed by his son’s lack of regard for their dog, purchases the animal back, initiating the simple storyline revolving around the dog’s destiny and the ensuing familial dynamics. Rich with commentary on the evolving conflict within Tibetan culture and a way of life that is quickly giving way to outside forces, Old Dog poetically surfaces the conflicted views of a culture’s future. (88 mins.)
THE PAINTING
DIRECTOR: Jean-François Laguionie - FRANCE
Inside the magical world of a painting, figures divide themselves into three castes: the realistically rendered, highly polished Alldunns, who hold court in a castle; the Halfies, who for want of a brushstroke are denied the privileges of the Alldunns; and the Sketchies, rough and ragged outlines treated as untouchables by the others. A forbidden romance between the Halfie Claire and the Alldunn Ramo leads the two, along with Claire’s friend Lola, to run away—all the way to the edge of their painting, where they hop out of the frame and into the studio of the man who created them....
Inside the magical world of a painting, figures divide themselves into three castes: the realistically rendered, highly polished Alldunns, who hold court in a castle; the Halfies, who for want of a brushstroke are denied the privileges of the Alldunns; and the Sketchies, rough and ragged outlines treated as untouchables by the others. A forbidden romance between the Halfie Claire and the Alldunn Ramo leads the two, along with Claire’s friend Lola, to run away—all the way to the edge of their painting, where they hop out of the frame and into the studio of the man who created them. An inventive, animated fable about art and life, appearance and perception. “Enchanting! ... This consistently enjoyable, inventive, and beautifully crafted tale is a color riot suitable for all ages. ... A constant feast for the eyes.”—Variety(76 mins.) |
using System.Collections.Generic;
using System.Text.Json.Serialization;
using Essensoft.AspNetCore.Payment.Alipay.Domain;
namespace Essensoft.AspNetCore.Payment.Alipay.Response
{
/// <summary>
/// AlipayDataAiserviceCloudbusTimeodGetResponse.
/// </summary>
public class AlipayDataAiserviceCloudbusTimeodGetResponse : AlipayResponse
{
/// <summary>
/// od分时结果列表
/// </summary>
[JsonPropertyName("result")]
public List<CloudbusTimeOdItem> Result { get; set; }
}
}
|
Watch a Football Focus interview from 2013 with then Chelsea goalkeeper Petr Cech and Queen drummer Roger Taylor as they discuss the Blues while having a session on the drums.
Cech, who now plays for Arsenal, has announced that he will release a charity single with Taylor to mark his upcoming retirement and raise money for charity.
READ MORE: Cech to release charity single |
For a second consecutive week, Texas AM coach Jimbo Fisher will be looking across to the other sideline and see a familiar face when his 22nd-ranked Aggies (4-2, 2-1 Southeastern Conference) visit South Carolina Saturday.
Kickoff at Williams-Brice Stadium in Columbia is 3:30 p.m. on the SEC Network.
Fisher and the Gamecocks' Will Muschamp have links that go back several years. Most notably, both were coordinators at LSU, Fisher on offense, Muschamp on defense, under Nick Saban at LSU for the Tigers' 2003 national championship team.
"Will was one of the brightest guys I've ever been around," Fisher said. "We won a national championship together as coordinators, and we're friends.
"People know we used to own a house, a beach house, together. It was a lot of things. He's always been a great friend, a great guy."
Muschamp also was a graduate assistant at Auburn when Fisher was on the staff there.
"He's a great friend," Muschamp said of Fisher. "We worked together back at Auburn in the '90s, then obviously we were together at LSU. He's a really good football coach, and he's got a good football team."
Muschamp's Gamecocks (3-2, 2-2 SEC) are coming off an emotional, 37-35 victory over Missouri in their last outing. Fisher's Aggies went to overtime for a 20-14 win over a Kentucky team that is coached by Mark Stoops, who was Fisher's offensive coordinator at Florida State before taking the Wildcats job.
"You know all those guys and you hate playing all your friends," Fisher said. "You really do."
Fisher called the win over Kentucky "another step for us in the right direction." The Aggies more than dominated the then-13th-ranked Wildcats, holding what was then the SEC's leading rushing team to just 70 yards on the ground and 178 in total offense.
But they failed to make the plays earlier that could have made for a more comfortable evening, failing to convert a fourth-and-1 at Kentucky's 27-yard line in the second quarter and missing a field goal and turning the ball over twice in the second half.
With 390 yards, the Aggies more than doubled Kentucky's output. For the season, they have averaged over 490 yards a game rushing and passing and have the league's leading rusher in running back Trayveon Williams. Williams has averaged 120 yards a game and 6.0 per carry with seven rushing touchdowns.
"The big thing is on offense the consistency to finish drives," Fisher said. "The way we're moving the ball, we've got to finish drives and put points on the board."
That will be the key against the Gamecocks, he emphasized.
"We're going to have to start fast and finish fast in this one," Fisher said. "We'll have to make our adjustments, too.
"Anytime you're on the road it gives you confidence to get out of the blocks to play well like we did in the Arkansas game. Got a jump and got out front. But this game we're going to have to get out in front and maintain.
"They can score points."
The Gamecocks' offense will present just a bit of a mystery, however. Junior Jake Bentley is expected to be back as the starter at quarterback after missing last week with a knee injury, but it isn't certain.
Senior Mike Scarnecchia, who led the comeback win over Missouri, could start again.
"I've told both Jake and Mike that they need to be ready to go play," Muschamp said. "We've got two guys we can win with, and that's good to have."
Scarnechia had seen little time before last week, when he passed for 249 yards. Bentley has started since his freshman year and is an accurate passer with a 64 percent completion rate this season.
"I'm making the decision that I think helps us win," Muschamp said. "At the end of the day, that's what we are going to do, but we have two guys I have confidence that we can win with. I feel comfortable with both guys." |
Ionizing radiation-induced instant pairing of heterochromatin of homologous chromosomes in human cells.
Using fluorescence in situ hybridization with human band-specific DNA probes we examined the effect of ionizing radiation on the intra-nuclear localization of the heterochromatic region 9q12-->q13 and the euchromatic region 8p11.2 of similar sized chromosomes 9 and 8 respectively in confluent (G1) primary human fibroblasts. Microscopic analysis of the interphase nuclei revealed colocalization of the homologous heterochromatic regions from chromosome 9 in a proportion of cells directly after exposure to 4 Gy X-rays. The percentage of cells with paired chromosomes 9 gradually decreased to control levels during a period of one hour. No significant changes in localization were observed for chromosome 8. Using 2-D image analysis, radial and inter-homologue distances were measured for both chromosome bands. In unexposed cells, a random distribution of the chromosomes over the interphase nucleus was found. Directly after irradiation, the average inter-homologue distance decreased for chromosome 9 without alterations in radial distribution. The percentage of cells with inter-homologue distance <3 micro m increased from 11% in control cells to 25% in irradiated cells. In contrast, irradiation did not result in significant changes in the inter-homologue distance for chromosome 8. Colocalization of the heterochromatic regions of homologous chromosomes 9 was not observed in cells irradiated on ice. This observation, together with the time dependency of the colocalization, suggests an underlying active cellular process. The biological relevance of the observed homologous pairing remains unclear. It might be related to a homology dependent repair process of ionizing radiation induced DNA damage that is specific for heterochromatin. However, also other more general cellular responses to radiation-induced stress or change in chromatin organization might be responsible for the observed pairing of heterochromatic regions. |
Neural origins of psychosocial functioning impairments in major depression.
Major depressive disorder, a complex neuropsychiatric condition, is associated with psychosocial functioning impairments that could become chronic even after symptoms remit. Social functioning impairments in patients could also pose coping difficulties to individuals around them. In this Personal View, we trace the potential neurobiological origins of these impairments down to three candidate domains-namely, social perception and emotion processing, motivation and reward value processing, and social decision making. We argue that the neural basis of abnormalities in these domains could be detectable at different temporal stages during social interactions (eg, before and after decision stages), particularly within frontomesolimbic networks (ie, frontostriatal and amygdala-striatal circuitries). We review some of the experimental designs used to probe these circuits and suggest novel, integrative approaches. We propose that an understanding of the interactions between these domains could provide valuable insights for the clinical stratification of major depressive disorder subtypes and might inform future developments of novel treatment options in return. |
Consolidation of the Binational (Panama-Costa Rica) Commission of the Sixaola River Basin Moves Forward
28 September 2012 | News story
Members of the Sixaola Binational Commission met May 14-17 in Bocas del Toro, Panama, to strengthen their capacities in governance of shared waters and determine the next steps as commission.
Panama, May 2012 (IUCN). The objective of the Binational Commission of the Sixaola River Basin is to conserve biodiversity, foster sustainable production and strengthen binational institutional framework under the Costa Rica-Panama Convention for Transboundary Development. As part of the 2012 road map, thirty people met for four days in Bocas del Toro, Panama, to dialogue about the commission’s structure and regulations and take an active part in an IUCN training session on Governance of Shared Waters
As part of the training, presentations were given on themes of interest to the commission, such as current water-related risk in Costa Rica due to climate change, offered by Roberto Villalobos of Costa Rica’s Meteorological Institute. Relating the experience of the Binational Manager Group of the Goascorán River Basin between Honduras and El Salvador, Luis Maier of Fundación Vida urged the commission to set up joint projects and share lessons with other countries of the region.
Motivated by these experiences, the Sixaola River Basin Commission called for studying the possibility of a project to analyze risk to the water sector from climate change in the basin. This could be the Commission’s first joint project in a common work plan, which also includes gradually incorporating joint actions in the binational watershed of the Sixaola River.
Commission members also heard from IUCN staff on aspects of international law, governance of shared waters and building consensus. This was complemented by a practical exercise and tools, also prepared by IUCN, enabling participants to put into practice their new knowledge and skills in negotiation and consensus-building as applied to management of shared watersheds.
This meeting is one of the activities programmed for strengthening and consolidating the Sixaola River Basin Commission. Says civil society representative Mildred Ramírez, “The Commission is a very important body because we have to be in both Panama and Costa Rica, working united. We have from great natural riches to environmental problems…these meetings are important in order to see the expectations of both countries and be able to reach agreement.”
This process has been characterized by the synergy and coordination generated among the Executive Secretariats of the Costa Rica-Panama Convention for Border Development, the project on integrated management of ecosystems in the binational Sixaola river basin (“Sixaola Binational Project”), the International Union for the Conservation of Nature (IUCN) and the Sixaola River Binational Commission, under the common objective of conserving biodiversity, fostering sustainable development and strengthening the binational institutional framework of the Sixaola river basin.
IUCN currently executes two projects in the watershed: Building River Dialogue and Governance (“BRIDGE”), supported by the Swiss Agency for Development and Cooperation (SDC), and Water Management for Adaptation, supported by the German Government through ICI-BMU, as part of a strategic crosscutting theme promoting transboundary cooperation and comprehensive water resource management. |
Appeal by US bishops on climate change
In a letter to members of the US Congress, Bishop Frank J. Dewane and Bishop Oscar Cantú urge the United States to support international climate assistance during the year-end appropriations process.
Caring for the common good
"The duty to care for the common good overflows our borders, especially when it comes to the air and climate shared with all people and creatures living on the planet.” This is the message addressed to members of Congress by the US Bishops’ Conference. It includes several references to Pope Francis’ Encyclical, Laudato Sì, reaffirming how “climate is a common good, belonging to all and meant for meant”.
The letter is signed by Bishop Frank J. Dewane, President of the Commission for Justice and Human Development, and Bishop Oscar Cantu, President of the Justice and Peace Commission, and includes an invitation to provide financial support to the work carried out by the United Nations Framework Convention on Climate Change (UNFCCC), the international body conducting climate policy.
Supporting credible climate research
The letter is timed to coincide with the UN Climate Change Conference (Cop23), presently underway in Germany, and relates to positions taken by President Donald Trump on the issue. Specifically, the letter calls for the responsibility to care for the common good, recalling that the task of the UNFCCC is to promote and facilitate international co-operation on climate change through initiatives like the annual conference currently taking place in Bonn. "Restricting funding to the UNFCCC will only weaken the ability of the United States to dialogue in the international arena using a common language based on the best science available.” By supporting the UNFCCC, say the Bishops, “the United States can direct attention and resources towards measures that help all people, especially the poor, adapt to the effects of climate change globally.” In this way, they conclude, “our nation can better pursue the national interest, support credible climate research and promote the common good within and beyond our borders.”
Below please find the full text of the message:
November 10, 2017
The Honorable Hal Rogers Chairman Committee on Appropriations Subcommittee on State, Foreign Operations, and Related Programs U.S. House of Representatives Washington, DC 20515
The Honorable Nita Lowey Ranking Member Committee on Appropriations Subcommittee on State, Foreign Operations, and Related Programs U.S. House of Representatives Washington, DC 20515
Dear Chairman Rogers and Ranking Member Lowey:
Earlier this year, the United States Conference of Catholic Bishops (USCCB) affirmed "that the federal budget is a moral document with profound implications for the common good of our nation and world." The belief that the environment is a God-given gift for the good of all has been present from the very beginnings of our nation. As you work through the end of the year appropriations process, we urge you to dedicate $10 million to the United Nations Framework Convention on Climate Change (UNFCCC).
Americans are greatly blessed with bountiful natural resources, gifts from God that we are called to steward. Yet the blessings of God's creation and the duty to care for the common good overflow beyond our borders, especially when it comes to the air and climate shared with all peoples and creatures living on the planet. As Pope Francis reminds us in Laudato Si', "The climate is a common good, belonging to all and meant for all."
Recently, the U.S. Senate honored this responsibility to protect the common good by including $10 million in the state and foreign operations appropriations bill for the UNFCCC, the international body that guides climate policy. Both the State Department and the EPA Administrator, even after U.S. withdrawal from the Paris agreement, insisted on the importance for our nation to remain engaged as a member of the UNFCCC in order to negotiate climate agreements that are beneficial to our nation.
Among the many programs supported by the UNFCCC is the Intergovernmental Panel on Climate Change (IPCC). This scientific body incorporates a wide range of views and expertise from thousands of scientists worldwide, providing decision-makers with rigorous and balanced scientific information on climate change. Since climate science can be misused in public discourse to further different economic, social, political and ideological agendas, it is in the national interest to support credible scientific research. Restricting funding to the UNFCCC will only weaken the ability of the United States to dialogue in the international arena using a common language based on the best science available. Catholic teaching affirms the importance of placing science at the service of the human person.
It is a healthy sign that the IPCC consciously and carefully defines climate change as caused by both natural variability and human activity. As we stated in our letter to the Secretary of State earlier this year, this nuanced understanding of climate change is consistent with the one offered by Pope Francis in Laudato Si' and "creates space for reasonable people to recognize, without controversy, that the climate is changing."
The UNFCCC also performs several other important functions for addressing global climate changes. It is encouraging to see a growing emphasis on adaptation policies to complement its longstanding mitigation efforts. While the Church's support for international mitigation is well established, "from the perspective of Catholic social teaching adaptation ranks among the most important actions we can take" since it assists the poor and vulnerable who disproportionately suffer from hurricanes, floods, droughts, famines and water scarcities. By supporting the UNFCCC, the United States can direct attention and resources towards adaptation measures that help all people, especially the poor, adapt to the effects of climate change globally.
For all these reasons, and to honor America's longstanding commitment to international climate collaboration and diplomacy, we urge Congress to dedicate $10 million to the UNFCCC during the appropriations process. By doing so, our nation can better pursue the national interest, support credible climate research and promote the common good within and beyond our borders.
Sincerely yours,
Most Reverend Oscar Cantú Bishop of Las Cruces Chair, Committee on International Justice and Peace United States Conference of Catholic Bishops
Most Reverend Frank J. Dewane Bishop of Venice Chair, Committee on Domestic Justice and Human Development United States Conference of Catholic Bishops |
---
abstract: |
The volume operator plays a pivotal role for the quantum dynamics of Loop Quantum Gravity (LQG). It is essential in order to construct Triad operators that enter the Hamiltonian constraint and which become densely defined operators on the full Hilbert space even though in the classical theory the triad becomes singular when classical GR breaks down.
The expression for the volume and triad operators derives from the quantisation of the fundamental electric flux operator of LQG by a complicated regularisation procedure. In fact, there are two inequivalent volume operators available in the literature and, moreover, both operators are unique only up to a finite, multiplicative constant which should be viewed as a regularisation ambiguity.
Now on the one hand, classical volumes and triads can be expressed directly in terms of fluxes and this fact was used to construct the corresponding volume and triad operators. On the other hand, fluxes can be expressed in terms of triads and therefore one can also view the volume operator as fundamental and consider the flux operator as a derived operator.
In this paper we mathematically implement this second point of view and thus can examine whether the volume, triad and flux quantisations are consistent with each other. The results of this consistency analysis are rather surprising. Among other findings we show: 1. The regularisation constant can be uniquely fixed. 2. One of the volume operators can be ruled out as inconsistent. 3. Factor ordering ambiguities in the definition of triad operators are immaterial for the classical limit of the derived flux operator.
The results of this paper show that within full LQG triad operators are consistently quantized.In this paper we merely present ideas and results of the consistency check. In a companion paper we supply detailed proofs.
author:
- |
K. Giesel[^1] and T. Thiemann[^2]\
\
MPI f. Gravitationsphysik, Albert-Einstein-Institut,\
Am Mühlenberg 1, 14476 Potsdam, Germany\
\
and\
\
Perimeter Institute for Theoretical Physics,\
31 Caroline Street N, Waterloo, ON N2L 2Y5, Canada
date: '[Preprint AEI-2005-100]{}'
title: |
Consistency Check on Volume and Triad Operator Quantisation\
in\
Loop Quantum Gravity I
---
Introduction {#s1}
============
The major unresolved problem in Loop Quantum Gravity (LQG) (see [@1] for books and [@1a] for reviews) is the satisfactory implementation of the quantum dynamics which in turn is governed by the Wheeler – DeWitt quantum constraint [@2; @2a], also called the Hamiltonian constraint. The volume operator [@3; @4] plays a pivotal role for the very definition of the Hamiltonian constraint because with its help one can quantize triad functions which enter the classical expression for the Hamiltonian constraint. In particular, one takes advantage of a Poisson bracket identity between the triads and the Poisson bracket among the Ashtekar connection and the classical scalar volume function. Namely, one uses the methods of canonical quantisation, that is, the axioms of quantum mechanics, according to which Poisson brackets between classical functions are turned into commutators between the corresponding operators divided by $i\hbar$, at least to lowest order in $\hbar$. Quite surprisingly, the Hamiltonian constraint operator and similarly also length operators [@5] are then densely defined on the full kinematical Hilbert space of LQG although the classical triad becomes singular in physically relevant situations such as black holes or the big bang.
While playing such a distinguished role for the most important open problem of LQG, the volume operator and thus the derived triad operators have never been critically examined concerning their physical correctness and mathematical consistency. By the first we mean that it has never been shown within full LQG that the volume operator has the correct classical limit with respect to suitably chosen kinematical semiclassical states, for example those constructed in [@6][^3].
By the second we mean the following: The fundamental kinematical algebra $\mathfrak{A}$ on which LQG is based is the Holonomy – Flux algebra [@8] and its representation theory together with background independence leads to a unique kinematical Hilbert space [@9]. Now classically the volume and triad can be written as limits of functions of the flux. To implement them at the quantum level, one has to go through a complicated regularisation procedure and to take the limit. It is surprising that the resulting operators are densely defined at all and in fact have a discrete spectrum because they are highly non – polynomial expressions as functions of fluxes. This is the payoff for background independence, since in background dependent formulations, such as the standard Fock representations these operators are too singular. On the other hand, since there is little experience with non Fock representations, it is not at all clear whether the corresponding operators have anything to do with their classical counterpart. In fact, there are at least two ambiguities already at the level of the volume operator: First of all, there are in fact two unitarily inequivalent volume operators [@3; @4] which come from two, a priori equally justified background independent regularisation techniques. We will denote them by Rovelli – Smolin (RS) and Ashtekar – Lewandowski (AL) volume respectively for the rest of this paper. Secondly, both volume operators are anyway only determined up to a multiplicative regularisation constant $C_{reg}$ [@10] which remains undetermined when taking the limit, quite similar to finite regularisation constants that appear in counterterms of standard renormaisation of ordinary QFT. The ambiguity is further enhanced by factor ordering ambiguities once we consider triad operators. These ambiguities are parameterized by a spin quantum number $\ell=1/2,1,3/2,..$.
In this paper we will be able to remove all those ambiguities by the following consistency check: As we mentioned above, the volume and triad can be considered as functions of the fluxes. But the converse is also true: The fluxes can be written in terms of triads and thus the volume. Is it then true that there exists a regularisation constant for the volume operator and a factor ordering of the flux operator considered as a function of the triad operator or volume operator such that the corresponding alternative flux operator agrees (at least in the correspondence limit of large eigenvalues of the volume operator) with the fundamental flux operator, independent of the choice of $\ell$? This better be possible as otherwise the inescapable conclusion would be that the volume operator is inconsistently quantised[^4].
We will be able to precisely answer this question affirmatively. In more detail we will show:
- The RS volume operator is inconsistent with the flux operator, the AL volume operator is consistent.
- $C_{reg}=1/48$ can be uniquely fixed, there is no other choice which is semiclassically acceptable. Remarkably, this is precisely the value that was obtained in [@4] by a completely different argument.
- The choice of $\ell$ plays no role semiclassically, in fact it drops out of the final expression for the alternative operator altogether. Therefore the afore mentioned factor ordering ambiguity is absent as far as the flux operator is concerned.
- There is yet one more ambiguity in LQG which is already present classically: Classically it is possible to consider the electric field either as a two form or as a pseudo two form. The corresponding sign of the determinant of the triad is then either encoded in the electric field or in the conjugate connection. One can take either point of view without affecting the symplectic structure of the theory. We will be able to show that one [*must*]{} consider the electric field as a pseudo two form, otherwise the alternative flux operator becomes the zero operator!
- As expected, the alternative and fundamental flux operator agree for all values of the Immirzi parameter [@12], hence it cannot be fixed by our analysis which is good because it has been fixed already by arguments coming from quantum black hole physics [@13].
- The calculations in this paper make extensive use of certain advances in technology concerning the matrix elements of the volume operator [@14]. Thus, our calculations provide an independent check of [@14] as well.
- The factor ordering of the alternative flux operator is unique if one insists on the principle of minimality[^5].
These results show that instead of taking holonomies and fluxes as fundamental operators one could instead use holonomies and volumes as fundamental operators. It also confirms that the method to quantise the triad developed in [@2] is mathematically consistent.\
\
This paper is organised as follows:\
\
In section two we review the regularisation and definition of the fundamental flux operator for the benefit of the reader and in order to make the comparison with the alternative quantisation easier.\
In section three we eplain the idea on which the construction of the usual flux operator is based on.\
In section four we derive the classical expression for the alternative flux operator.\
In section five and six we discuss our results for the alternative flux operator and compare them with the corresponding results of the usual flux operator.\
Finally in section seven we summarise and conclude. All the technical details and tools that are needed to perform this consistency check are providid in our companion paper [@GT].
Review of the usual Flux Operator
=================================
In LQG the classical electric flux $E_k(S)$ through a surface $S$ is the integral of the densitised triad $E^a_k$ over a two surface $S$ E\_k(S)=\_[S]{}E\^a\_kn\^[S]{}\_a, where $n^{{\scriptstyle}S}_a$ is the conormal vector with respect to the surface $S$. In order to define a coresponding flux operator in the quantum theory, we have to regularise the classical flux and then define the action of the operator on an arbitary spin network funtion (SNF) $T_{\gamma,\vec{j},\vec{m},\vec{n}}:G^{|E(\gamma)|}\to\Co$,where $G$ is the corresponding gauge group, namely $SU(2)$ in our case, as the action of the regularised expression, denoted by $E^{\epsilon}_k(S)$ in the limit where the regularisation parameter $\epsilon$ is removed \[PB\] \_k(S)T\_[,,]{}:=i\_{E\^\_k(S),T\_[,,]{}}. Here the limit is to be understood in the following way: The Poisson bracket on the right hand side of eqn (\[PB\]) is calculated by viewing $T_{\gamma,\vec{j},\vec{m},\vec{n}}$ as functions of smooth connections. After taking $\epsilon\to 0$ one extends the result to functions of distributional connections and thus ends up with an operator defined on the Hilbert space of LQG.\
Classically, we have \[PB2\] {E\^\_k(S),T\_[,,,]{}({h\_e(A)}\_[eE()]{})}=\_[eE()]{}{E\^[a,]{}\_k,(h\_e)\_[AB]{}}. Here $(h_e)_{{\scriptscriptstyle}AB}$ denotes the $SU(2)$-holonomy. The regularisation can be implemented by smearing the two surface $S$ into the third dimension, shown in figure \[Bild1\], so that we get an array of surfaces $S_t$. The surface associated with $t=0$ is our original surface $S$ \[regflux\] E\^\_k(S):=\_[-]{}\^[+]{}dtE\_k(S\_t).
![\[Bild1\]Smearing of the surface $S$ into the third dimension. We obtain an array of surfaces $S_t$ labelled by the parameter $t$ with $t\in\{-\epsilon,+\epsilon\}$. The original surface $S$ is associated with $t=0$.](bild1.eps){height="6cm"}
In order to derive the action of the flux operator on an arbitrary SNF, we would have to analyse the Poisson bracket among the flux and every possible SNF. Fortunately, it turnes out that each edge belonging to the associated graph $\gamma$ of $T_{\gamma,\vec{j},\vec{m},\vec{n}}$ can be classified as (i) up, (ii) down, (iii) in and (iv) out with respect to the surface $S$.(See figure \[Bild2\] for a graphical illustration.)
![\[Bild2\]Edges of type up, down, in and out with respect to the surface $S$.](bild4.eps){height="4cm"}
An arbitrary $T_{\gamma,\vec{j},\vec{m},\vec{n}}$ contains then a particular amount of edeges of each type. Accordingly, if we have the knowledge of the Poisson bracket among the flux and any of these types of edges, we will be able to derive the Poisson bracket among $E^{\epsilon}_k$ and any arbitrary $T_{\gamma,\vec{j},\vec{m},\vec{n}}$. The calculation of the regularised Poisson bracket can be found e.g. in the second reference of [@1]. After having removed the regulator we end up with the following action of the flux operator on a SNF $T_{\gamma,\vec{j},\vec{m},\vec{n}}$ \[DerivOP\] \_k(S)T\_[,,]{}=[\_p]{}\^2\_[eE()]{}(e,S)\_[AB]{}, where $\tau_k$ is related to the Pauli matrices by $\tau_k:=-i\sigma_k$. The sum is taken over all edges of the graph $\gamma$ associated with $T_{\gamma,\vec{j},\vec{m},\vec{n}}$. The function $\epsilon(e,S)$ can take the values $\{-1,0,+1\}$ depending on the type of edge that is considered. It is +1 for edges of type up, -1 one for down and 0 for edges of type in or out. By introducing right invariant vector fields $X^e_k$, defined by $(X^e_k f)(h):=\frac{d}{dt}f(e^{t\tau_k}h)\Big|_{t=0}$, we can rewrite the action of the flux operator as \_k(S)T\_[,,,]{}=[\_p]{}\^2\_[eE()]{}(e,S)X\^e\_kT\_[,,,]{}. Note, the right invariant vector fields fulfill the following commutator relations $[X^r_e,X^s_e]=-2\epsilon_{rst}X^t_e$. By means of introducing the self-adjoint right invariant vector field $Y^k_e:=-\frac{i}{2}X^k_e$, we achieve commutator relations for $Y^k_e$ that are similar to the one of the angular momentum operators in quantum mechanics $[Y^r_e,Y^s_e]=i\epsilon_{rst}Y^t_e$. Therefore, we also can describe the action of ${\widehat{E}}_k(S)$ by the action of the self-adjoint right invariant vector field $Y^k_e$ on $T_{\gamma,\vec{j},\vec{m},\vec{n}}$ \[flY\] \_k(S)T\_[,,,]{}=-[\_p]{}\^2\_[eE()]{}(e,S)Y\^k\_eT\_[,,,]{}.
Idea of the Alternative Flux Operator {#Idea}
=====================================
Our starting point will be the Poisson bracket of the Ashtekar-connection $A^j_a$ and the densitised triad $E^b_k$ given by {A\^j\_a(x),E\^b\_k(y)}=\^3(x,y)\^a\_b\^k\_j which we take as fundamental. In order to go from the ADM-formalism to the formulation in terms of Ashtekar varibales, one uses a canonical transformation. There exist two possibilities of choosing such a canonical transformation that both lead to the Poisson bracket above. These two possiblities are
[llcl]{} & A\^j\_a=\^j\_a +((e))K\^j\_a &, &E\^a\_j=\_[krs]{}\^[abc]{}e\^r\_be\^s\_c\
& A\^j\_a=\^j\_a + K\^j\_a &, & E\^a\_j=\_[krs]{}\^[abc]{}e\^r\_be\^s\_c((e))
Here, $\Gamma^j_a$ is the SU(2)-spin connection, $K_{ab}=K^j_ae^j_b$ the extrinsic curvature (when the Gauss constraint holds) and $\gamma$ the Imirzi-parameter. Recall again the definition of the regularised classical flux $E^{\epsilon}_k(S)$ in eqn (\[regflux\]). Now the idea of defining an alternative regularised flux \[altdtriad\] \^\_k(S):=\_[-]{}\^[+]{}dt\_k(S\_t) ;\_k(S\_t)=\_[S\_t]{}E\^a\_kn\^[S\_t]{}\_a is to express the densitised triad $E^a_k$ in terms of the triads as above. Due to the two possibile canonical transformations, we have also two possibilities in defining an alternative densitised triad \[Eakdef\] E\^a\_k={
[lcl]{} (e)e\^a\_k &=& \_[krs]{}\^[abc]{}e\^r\_be\^s\_c\
e\^a\_k &=& \_[krs]{}\^[abc]{}\_[=:[S]{}]{}e\^r\_be\^s\_c
}=:{
[c]{} E\^[a,[I]{}]{}\_k\
E\^[a,[II]{}]{}\_k
}, where $e^j_a$ is the cotriad related to the intrinsic metric as $q_{ab}=e^j_ae^j_b$. From now on we will use $E^{a,{{\scriptscriptstyle}I}}_k$ and $E^{a,{{\scriptscriptstyle}II}}_k$, respectively for the two cases.\
So, instead of quantising the densitised triad directly, we could use the above classical identities, quantize them via the Poisson bracket identity in eqn (\[Pid\]) and check whether both quantisation procedures are consistent. The main difference between these two definitions is basically a signum factor which we will denote by ${\cal S}$. From the mathematical point of view both definitions in eqn (\[altdtriad\]) are equally viable, thus we will keep both possibilities and emphasise the differences that occur when we choose one or the other definition. Notice however that $\det(E^{{\scriptscriptstyle}I})=\det(e)^2\ge 0$ gives an anholonomic constraint which appears to be inconsistent with the definition of ${\widehat{E}}_k(S)$ as a derivative operator as in eqn (\[DerivOP\]), as for instance pointed out in [@11]. We will see that this is indeed the case.Inserting the alternative expression for $E^a_k$ into eqn (\[regflux\]), we obtain \[altEk\] \_k(S\_t)={
[lcrl]{}\_[S\_t]{}\_[krs]{}\^[abc]{}e\^r\_be\^s\_c n\^[S\_t]{}\_a &,E\^[a,[I]{}]{}\_k=(e)e\^a\_k\
\_[S\_t]{}\_[krs]{}\^[abc]{}e\^r\_b[S]{}e\^s\_c n\^[S\_t]{}\_a &,E\^[a,[II]{}]{}\_k=e\^a\_k
}.
Construction of the Alternative Flux Operator
=============================================
The strategy for quantising the alternative Flux Operator will be as follows. As a first step we will apply the Poisson bracket identity in order to replace the triads $e^r_b$ by its associated Poisson bracket among the connection $A^r_b$ and the scalar volume funtion $V(R)=\int_R d^3x\sqrt{\det(q)}=\int_R d^3x\sqrt{|\det(E^{{\scriptscriptstyle}I})|}=\int_R d^3x\sqrt{|\det(E^{{\scriptscriptstyle}II})|}$. The Poisson bracket identity for the two cases is shown below \[Pid\] {A\^s\_b,V(R)}={
[lcl]{}-e\^s\_b&,& E\^[a,[I]{}]{}\_k=\_[kst]{}\^[abc]{}e\^s\_be\^t\_c\
-e\^s\_b&,& E\^[a,II]{}\_k=\_[kst]{}\^[abc]{}[S]{}e\^s\_be\^t\_c
}. This relation is different for the two cases, because in deriving this relation we have to use the definition of the densitised triad $E^a_k$ in terms of the triads $e^s_b$ which is different for case I and case II. The difference between $E^{a,{{\scriptscriptstyle}I}}_k$ and $E^{a,{{\scriptscriptstyle}II}}_k$ is again a signum factor ${\cal S}$. Going back to eqn (\[altEk\]) we note that there is no ${\cal S}$ in $E^{a,{{\scriptscriptstyle}I}}_k$. Since we have to replace two triads $e^r_b,e^s_c$ by Poisson brackets, we get two factors of ${\cal S}$ in the case of $E^{a,{{\scriptscriptstyle}I}}_k$. As ${\cal S}^2$ is always one classically (since $q_{ab}$ is non-degenerate), it drops out in this case. In contrast, for $E^{a,{{\scriptscriptstyle}II}}_k$ we have a signum factor ${\cal S}$ occuring in the alternative flux in eqn (\[altEk\]), but no ${\cal S}$ in the Poisson bracket identity. Accordingly, we get only one ${\cal S}$ here, that does not dissapear classically, because it can take the (constant) values $\pm 1$. Thus \^[I]{}\_k(S\_t)&=&\_[S\_t]{}\_[krs]{}\^[abc]{}{A\^r\_b,V(R)}{A\^s\_c,V(R)} n\^[S\_t]{}\_a\
\^[II]{}\_k(S\_t)&=&\_[S\_t]{}\_[krs]{}\^[abc]{}{A\^r\_b,V(R)}[S]{}{A\^s\_c,V(R)} n\^[S\_t]{}\_a When later on we replace the classical expression by their corresponding operators, the main difference between ${\widetilde{E}}^{{\scriptscriptstyle}I}_k(S_t)$ and ${\widetilde{E}}^{{\scriptscriptstyle}II}_k(S_t)$ will be a so called signum operator ${\widehat{\cal S}}$. Before, we have to replace the connections $A^r_b$ by holonomies since $A^r_b$ cannot be promoted to well defined operators in the Ashtekar-Lewandowski Hilbert space ${\cal H}_{{\scriptscriptstyle}AL}$. Hence, we choose a partition ${\cal P}_t$ of each surface $S_t$ into small squares of area $\epsilon'^2$. In the limit where $\epsilon'$ is small enough we are allowed to replace the connection $A^r_b$ along the edge $e_{{\scriptscriptstyle}I}$ by its associated holonomy $h(e_{{\scriptscriptstyle}I})$. The partition is shown in figure (\[Bild3\]).
![\[Bild3\]Partition ${\cal P}_t$ of the surface $S_t$ into small squares with an parameter edge length $\epsilon'$.](bild2.eps){height="7cm"}
Usually this is done for holonomies in the fundamental representation of $1/2$. But, as we want to keep our construction of the alternative flux operator as general as possible and to study the effect of factor ordering ambiguities we will consider holonomies with arbitrary representation weights $\ell$. The corresponding relation between the connection integrated along the edge $e_{{\scriptscriptstyle}I}$, denoted by $A^r_{{\scriptscriptstyle}I}$ from now on, and the associated holonomy is given by \[Ah\] {A\^r\_[I]{}(),V(R\_[v()]{})}\_(\_r)+o(’\^2)=+\_(h\_[e\_[I]{}]{}){\_(h\^[-1]{}\_[e\_[I]{}]{}),V(R\_[v()]{})}, whereby we indicate a representation with weight $\ell$ by $\pi_{\ell}$. Considering eqn (\[Ah\]), we end up with the following classical identity for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}I}_k(S_t)$ \[clidI\] [\^[()]{}]{}\^[I]{}\_k(S\_t)&=&\_[[P]{}\_tS\_t]{}\_[\_t]{}\_[krs]{}{A\^r\_[3]{}(),V(R\_[v()]{})}{A\^s\_[4]{}(),V(R\_[v()]{})}\
&=&\_[[P]{}\_tS\_t]{}\_[\_t]{}\
&&(\_(h\_[e\_[3]{}()]{}){\_(h\^[-1]{}\_[e\_[3]{}()]{}),V(R\_[v()]{})}\_(\_k)\_(h\_[e\_[4]{}()]{}){\_(h\^[-1]{}\_[e\_[4]{}()]{}),V(R\_[v()]{})}) and in the case of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}II}_k(S_t)$ with \[clidII\] [\^[()]{}]{}\^[II]{}\_k(S\_t)&=&\_[[P]{}\_tS\_t]{}\_[\_t]{}\_[krs]{}{A\^r\_[3]{}(),V(R\_[v()]{})}[S]{}{A\^s\_[4]{}(),V(R\_[v()]{})}\
&=&\_[[P]{}\_tS\_t]{}\_[\_t]{}\
&&(\_(h\_[e\_[3]{}()]{}){\_(h\^[-1]{}\_[e\_[3]{}()]{}),V(R\_[v()]{})}\_(\_k)[S]{}\_(h\_[e\_[4]{}()]{}){\_(h\^[-1]{}\_[e\_[4]{}()]{}),V(R\_[v()]{})}). Here we used $\operatorname{Tr}\left(\pi_{\ell}(\tau_r\pi_{\ell}(\tau_k))\pi_{\ell}(\tau_s)\right)=-\frac{4}{3}\ell(\ell+1)(2\ell+1)$ that is derived in appendix A of [@GT]. Now, in LQG there exist two volume operators, one introduced by Rovelli and Smolin in 1994 (${\widehat{V}}_{{\scriptscriptstyle}RS}$) [@3] and another one published in 1995 by Ashtekar and Lewandowski (${\widehat{V}}_{{\scriptscriptstyle}AL})$ [@4]. Hence, we have actually in each case two different possibilities for the Poisson bracket, because we could either use ${\widehat{V}}_{{\scriptscriptstyle}RS}$ or ${\widehat{V}}_{{\scriptscriptstyle}AL}$. Thus, case I as well as case II splits into two different versions of alternative fluxes [\^[()]{}]{}\^[I]{}\_k(S\_t)&&[\^[()]{}]{}\^[I,AL]{}\_k(S\_t),[\^[()]{}]{}\^[I,RS]{}\_k(S\_t)\
[\^[()]{}]{}\^[II]{}\_k(S\_t)&&[\^[()]{}]{}\^[II,AL]{}\_k(S\_t),[\^[()]{}]{}\^[II,RS]{}\_k(S\_t) From now on we will use the notation above for the four different cases. Before we apply canonical quantisation, we want to discuss the two volume operators and their differences a bit more in detail.
The two Volume Operators in LQG
-------------------------------
### The Volume Operator ${\widehat{V}}_{{\scriptscriptstyle}RS}$ of Rovelli and Smolin
The idea that the volume operator acts only on vertices of a given graph was first mentioned in [@15]. The first version of a volume operator can be found in [@3] and is given by \[Voldef\] (R)\_&=&\_[R]{}d\^3p(p)\_\
(p)\_&=&[\_p]{}\^3\_[vV()]{}\^[(3)]{}(p,v)\_[v,]{}\
\^[RS]{}\_[v,]{}&=&\_[I,J,K]{}. Here we sum over all triples of edges at the vertex $v\in V(\gamma)$ of a given graph $\gamma$. ${\widehat{V}}_{{\scriptscriptstyle}RS}$ is not sensitive to the orientation of the edges, thus also linearly dependent triples have to be considered in the sum. Moreover, we introduced a constant $C_{reg}\in\Rl^+$ that we will keep arbitrary for the moment and that is basically fixed by the particular regularisation scheme one chooses. When working with the volume operator we want to select physically relevant gauge invariant states properly. Hence, it is convenient to express our abstract angular momentum states in terms of the recoupling basis. The following identity [@10] holds \[qijkDef\] \_[ijk]{}X\^i\_[e\_[I]{}]{}X\^j\_[e\_[J]{}]{}X\^k\_[e\_[K]{}]{}=\[Y\^2\_[IJ]{},Y\^2\_[JK]{}\]=:q\_[IJK]{}\^[Y]{}, where $Y_{{\scriptscriptstyle}IJ}:=Y^k_{e_{{\scriptscriptstyle}I}}+Y^k_{e_{{\scriptscriptstyle}J}}$ and $Y^k_{e_{{\scriptscriptstyle}I}}$ denotes the self-adjoint vector field $Y^k_{e_{{\scriptscriptstyle}I}}:=-\frac{i}{2}X^k_{e_{{\scriptscriptstyle}I}}$. Consequently, we get \[RSVqijk\] (R)\_\^[Y,[RS]{}]{}|JM;M’[>]{}&=&[\_p]{}\^3\_[v V()R]{}\_[I<J<K]{} \_[\^[RS]{}\_[v,]{}]{}|JM;M’[>]{}. The additional factor of $3!$ is due to the fact that we sum only over ordered triples $I<J<K$ now. The way to calculate eigenstates and eigenvalues of ${\widehat{V}}$ is as follows. Let us introduce the operator ${\widehat{Q}}^{{\scriptscriptstyle}Y,RS}_{v,{{\scriptscriptstyle}IJK}}$ as \[RSQ\] \^[Y,RS]{}\_[v,[IJK]{}]{}:=[\_p]{}\^6C\_[reg]{}\_[IJK]{}\^[Y]{} As a first step we have to calculate the eigenvalues and corresponding eigenstates for ${\widehat{Q}}^{{\scriptscriptstyle}Y,RS}_{v,{{\scriptscriptstyle}IJK}}$. If for example $|\phi{\!\!>}$ is an eigenstate of ${\widehat{Q}}^{{\scriptscriptstyle}Y,RS}_{v,{{\scriptscriptstyle}IJK}}$ with corresponding eigenvalue $\lambda$, then we obtain ${\widehat{V}}|\phi{\!\!>}=\sqrt{|\lambda|}|\phi>$. Consequently, we see that while ${\widehat{Q}}^{{\scriptscriptstyle}Y,RS}_{v,{{\scriptscriptstyle}IJK}}$ can have positive and negative eigenvalues, ${\widehat{V}}$ has only positive ones. Furthermore, if we consider the eigenvalues $\pm\lambda$ of ${\widehat{Q}}^{{\scriptscriptstyle}Y,RS}_{v,{{\scriptscriptstyle}IJK}}$ and the corresponding eigenstate $|\phi_{+\lambda}{\!\!>},|\phi_{-\lambda}{\!\!>}$, we notice that these eigenvalues will be degenerate in the case of the operator ${\widehat{V}}$, as $\sqrt{|+\lambda|}=\sqrt{|-\lambda|}$.
### The Volume Operator ${\widehat{V}}_{{\scriptscriptstyle}AL}$ of Ashtekar and Lewandowski
Another version of the volume operator which differs by the chosen regularisation scheme was defined in [@4] \[Vqijk\] (R)\_\^[Y,[AL]{}]{}|JM;M’[>]{}&=&[\_p]{}\^3\_[v V()R]{} \_[\^[AL]{}\_[v,]{}]{}|JM;M’[>]{}. The major difference between ${\widehat{V}}_{{\scriptscriptstyle}AL}$ and ${\widehat{V}}_{{\scriptscriptstyle}RS}$ is the factor $\epsilon(e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K})$ that is sensitive to the orientation of the tangent vectors of the edges $\{e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K}\}$. $\epsilon(e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K})$ is $+1$ for right handed, $-1$ for left handed and $0$ for linearly dependent triples of edges. In the case of ${\widehat{V}}_{{\scriptscriptstyle}AL}$ it is convinient to introduce an operator ${\widehat{Q}}^{{\scriptscriptstyle}Y,AL}_v$ that is defined as the expression that appears inside the absolute value under the square root in ${\widehat{V}}^{{\scriptscriptstyle}AL}_{v,\gamma}$ \[Qdef\] \^[Y,AL]{}\_v:=[\_p]{}\^6C\_[reg]{}\_[I<J<K]{}(e\_[I]{},e\_[J]{},e\_[K]{})\_[IJK]{}\^[Y]{} By comparing eqn (\[RSVqijk\]) with (\[Vqijk\]) we notice that another difference between ${\widehat{V}}_{{\scriptscriptstyle}RS}$ and ${\widehat{V}}_{{\scriptscriptstyle}AL}$ is the fact that for the first one, we have to sum over the triples of edges outside the square root, while for the latter one, we sum inside the absolute value under the square root. Apart from the difference of the sign factor, the difference in the summation will play an important role later on.
Factor Ordering Ambiguities
---------------------------
The discussion in this section is valid for all four different version of the alternative flux, hence we will neglect the labels I,II,RS,AL here. The meaning of the limit when the regularisation parameter tends to zero, i.e. $\epsilon\to 0$ in combination with the limit of the partition ${\cal P}_t$ when the edge length parameter $\epsilon'\to 0$ is explaind in detail in [@GT] in section 4.3. It is the same limit as taken for the usual flux operator sketched between eqn (\[PB\]) and eqn (\[PB2\]). We have e.g. for those $S$ which intersects $\gamma$ only in an edge of type up schematically \[Limit\] \_k(S)T&=&\_[0]{}\_[-]{}\^dt\_I<T\_\^[I]{}|\_k(S\_t)|T>T\_t\^[I]{}\
&=&\_[0]{}\_I<T\^[I]{}\_|\_k(S\_)|T>T\^[I]{}\_, where $T^{{\scriptscriptstyle}I}_t$ are the SNW states that contribute to ${\widetilde{E}}_k(S_T)T$. $<T^{{\scriptscriptstyle}I}_{\epsilon}\,|\,{\widetilde{E}}_k(S_t)\,|\,T>$ is actually independent of $\epsilon$ and $T^{{\scriptscriptstyle}I}_{\epsilon}\to T^{{\scriptscriptstyle}I}_{0}$ as a function of smooth connections which can then be extended to distributional ones.
It turns out that the alternative flux operator can be regularised to such an extent that each plaquette of the partition ${\cal P}_t$ of a surface $S_t$ has an intersection with only one single edge of a graph $\gamma$ associated with an arbitrary given SNF $T_{\gamma,\vec{m},\vec{n}}$. If the considered edge lies completely inside the plaquette of $S_t$ or completely outside (up to sets of dt measure zero if inside) it will lead to a trivial action of the alternative flux operator. This is in full agreement with the usual flux operator. The alternative flux operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_k(S_t)$ attaches two additional edges, namely $e_{{\scriptscriptstyle}3},e_{{\scriptscriptstyle}4}$ to the edge $e$. The discussion in [@GT] showed that these additional edges have to lie inside the surface $S_t$ since otherwise the ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_k(S_t)$ would have only again a trivial action, see also figure \[Bild4\].
\[Bild4\] {height="5cm"}
Furthermore, by attaching the additional edges $e_{{\scriptscriptstyle}3}$, $e_{{\scriptscriptstyle}4}$, ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_k(S_t)$ creates a new vertex at a certain point of $e$ and thus divides $e$ into an edge $e_{{\scriptscriptstyle}1}$ of type up and an edge $e_{{\scriptscriptstyle}2}$ of type down with respect to $S_t$[^6]. Accordinly, as for the usual flux operator, the action of the alternative flux operator is totally determined by the action on edges of type up and down with respect to the surface $S_t$. Since we are familiar now with the action of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}\widehat{{\widetilde{E}}}_k(S_t)$, we are able to consider the impact of different factor orderings. Going back to the classical identity in eqn (\[clidI\]) and eqn (\[clidII\]) respectively and considering the results of the discussion above, we know that ${{}^{\scriptscriptstyle (\ell)}\!\!\:}\widehat{{\widetilde{E}}}_k(S_t)$ adds two additional edges $e_{{\scriptscriptstyle}3},e_{{\scriptscriptstyle}4}$ to a given edge $e$ and devides this edge into an up edge $e_{{\scriptscriptstyle}1}$ and an edge of type down $e_{{\scriptscriptstyle}2}$ This is illustrated in figure \[Bild6\]. Let us call these SNF that involves the edges $e_{{\scriptscriptstyle}1},e_{{\scriptscriptstyle}2}$ only ${|\beta^{j_{{\scriptscriptstyle}12}}\,{{\scriptstyle}n_{{\scriptscriptstyle}12}} {\!\!>}}$. Here we use the so called recoupling basis to express the SNF and $j_{{\scriptscriptstyle}12}$ denotes the total angular momentum to which the two edges $e_{{\scriptscriptstyle}1}$ and $e_{{\scriptscriptstyle}2}$ couple at their single vertex $v$, whereas $n_{{\scriptscriptstyle}12}$ is the associated magnetic quantum number.
![\[Bild6\]The SNF ${|\beta^{j_{{\scriptscriptstyle}12}}\,{{\scriptstyle}n_{{\scriptscriptstyle}12}} {\!\!>}}$ is transformed into an new SNF ${|\alpha^{{\scriptstyle}J}_{i}\,{{\scriptstyle}{\scriptstyle}M}{\!\!>}}$ by the action of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}_{k,{{\scriptscriptstyle}tot}}(S_t)$.](bild6.eps){height="6cm"}
The SNF that results from ${|\beta^{j_{{\scriptscriptstyle}12}}\,{{\scriptstyle}n_{{\scriptscriptstyle}12}} {\!\!>}}$ by the action of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}_{k,{{\scriptscriptstyle}tot}}(S_t)$ and that contains four edges $\{e_{{\scriptscriptstyle}1},e_{{\scriptscriptstyle}2},e_{{\scriptscriptstyle}3},e_ {{\scriptscriptstyle}4}\}$ will be denoted by ${|\alpha^{{\scriptstyle}J}_{i}\,{{\scriptstyle}M}{\!\!>}}$. In this case $J$ is the total angular momentum, $M$ the associated magentic quantum number and $i$ as an index is needed, because with four edges more than one state exists with the same total angular momentum, but different intermediate couplings. For more details see section 5.2 and 6 in [@GT]. Now, dealing still with the classical expression in eqn (\[clidI\]) and eqn (\[clidII\]) respectively, we can apply the trace and rearrange the terms in a certain manner, because classically holonomies commute in order to obtain a sensible operator ordering in the quantum theory. If we consider ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}I,AL}_k(S_t)$ and ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}II,AL}_k(S_t)$ that contain ${\widehat{V}}_{{\scriptscriptstyle}AL}$ we know that due to the sign factor $\epsilon(e_{{\scriptscriptstyle}I},e_ {{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K})$ in ${\widehat{V}}_{{\scriptscriptstyle}AL}$ the action of ${\widehat{V}}_{{\scriptscriptstyle}AL}$ on linearly dependent triples vanishes. Therefore, it has to be ensured that the two holonomies ${\widehat{\pi}}_{\ell}(h_{e_{{\scriptscriptstyle}3}})_{{\scriptscriptstyle}EA}$ and ${\widehat{\pi}}_{\ell}(h_{e_{{\scriptscriptstyle}4}})_{{\scriptscriptstyle}IG}$ act before ${\widehat{V}}_ {{\scriptscriptstyle}AL}$ does. This restriction reduces the number of possible factor orderings down to a single one. The situation is different for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}I,RS}_k(S_t)$ and ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}II,RS}_k(S_t)$, because here ${\widehat{V}}_{{\scriptscriptstyle}RS}$ is involved, that has an non trivial action on linearly dependent triples. Consequently, more than one possible factor ordering exists. Let us discuss the number and differences of these orderings later on and restrict ourselves for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}I,RS}_k(S_t)$ as well as ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widetilde{E}}^{{\scriptscriptstyle}II,RS}_k(S_t)$ to the single ordering that is possible for ${\widehat{V}}_{AL}$, first. It turnes out that for all operators with $dt$ measure 1, the dependence of ${\widetilde{E}}_k(S_t)$ on $t$ drops out and taking the average $\frac{1}{2\epsilon}\int\limits_{-\epsilon}^{+\epsilon}dt$ becomes trivial resulting in eqn (\[Limit\]). We will thus keep the label $S_t$ in what follows, but keep in mind that the $t$-dependence is trivial.
Canonical Quantisation
----------------------
Usually the densitised triads, appearing in the classical flux $E_k(S)$ are quantised as differential operators, while holonomies are quantised as multiplication operators. If we choose the alternative expression ${\widetilde{E}}_k(S)$ we will instead get the scalar volume ${\widehat{V}}$ and the so called signum ${\widehat{\cal S}}$ operator into our quantised expression. The properties of this ${\widehat{\cal S}}$ will be explained in more detail below. Moreover, we have to replace Poisson brackets by commutators, following the replacement rule $\{.\,,\,.\}\rightarrow (1/i\hbar)[.\,,\,.]$. The detailed derivation of the final operator can be found in section 4 of cite[GT]{}.\
Clearly, we want the total operator to be self-adjoint, so we will calculate the adjoint of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}_k(S_t)$ and define the total and final operator to be ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}_{k,{{\scriptscriptstyle}tot}}(S_t)=\frac{1}{2}({\widehat{{\widetilde{E}}}}_k(S_t)+\hat{\tilde{E^{\dagger}}}_k(S_t))$ that is self-adjoint by construction. Hence, the final operator for ${\widehat{V}}_{{\scriptscriptstyle}RS}$ which we will use through the calculation of this paper is given by \[RSEktot\] [\^[()]{}]{}\^[I/II,RS]{}\_[k,[tot]{}]{}(S\_t)&=&\_[[P]{}\_tS\_t]{} \_[\_t]{} \_(\_k)\_[CB]{}\_()\_[EI]{}\
&&{+\_()\_[FC]{}\^\_(h\_[e\_[3]{}]{})\_[EA]{}\
&& -\_()\_[FB]{}\^\_(h\_[e\_[4]{}]{})\_[CA]{}}, whereby we used the identity ${\widehat{\pi}}_{\ell}(h^{-1}_{e_{{\scriptscriptstyle}I}})_{{\scriptscriptstyle}AB}=\left[{\widehat{\pi}}_{\ell}(h_{e_{{\scriptscriptstyle}I}})_{{\scriptscriptstyle}BA}\right]^{\dagger}$, $\pi_{\ell}(\epsilon)_{{\scriptscriptstyle}AB}=(-1)^{\ell-A}\delta_{{\scriptscriptstyle}A+B=0}$ and the definition of the Planck length ${\ell_p}^{-4}:=(\hbar\kappa)^{-2}$. The box surounding the signum operator ${\widehat{\cal S}}$ should indicate that it is contained in the operator in case II, while it is not in case I. Considering the operator ${\widehat{V}}_{{\scriptscriptstyle}AL}$, we know that for each commutator only one term will contribute, because otherwise we cannot construct linearly independet triples of edges since $\{e_{{\scriptscriptstyle}1},e_{{\scriptscriptstyle}2},e_{{\scriptscriptstyle}3/4}\}$ are linearly dependent. Therefore in the case of ${\widehat{V}}_{{\scriptscriptstyle}AL}$ we obtain the following final expression \[Ektot\] [\^[()]{}]{}\^[I/II,AL]{}\_[k,[tot]{}]{}(S\_t)&=&\_[[P]{}\_tS\_t]{} \_[\_t]{} \_(\_k)\_[CB]{}\_()\_[EI]{}\
&&{+\_()\_[FC]{}\^\^\_[AL]{}\_[AL]{}\_(h\_[e\_[4]{}]{})\_[IG]{}\_(h\_[e\_[3]{}]{})\_[EA]{}\
&& -\_()\_[FB]{}\^\^\_[AL]{}\_[AL]{}\_(h\_[e\_[4]{}]{})\_[FG]{}\_(h\_[e\_[3]{}]{})\_[CA]{}}. Here again for case II the signum operator is inlcuded, whereas in case I it is not. Next, we want to calculate the matrix elements ${\;<}\beta^{j_{{\scriptscriptstyle}12}}\,{\widetilde{m}}_{{\scriptscriptstyle}12}\,|{{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}_{k,{{\scriptscriptstyle}tot}}(S_t)|\,\beta^{j_{{\scriptscriptstyle}12}}\,m_{{\scriptscriptstyle}12}{\!\!>}$ of all four versions ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$, ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$, ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ and ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ of the new flux operator. The action of the holonomy operators ${\widehat{\pi}}_{\ell}(h_{e_{{\scriptscriptstyle}I}})_{{\scriptscriptstyle}AB}$ on $|\beta^{j_{{\scriptscriptstyle}12}}\,m_{{\scriptscriptstyle}12}{\!\!>}$ can be described in the framework of angular momentum recoupling theory with the powerful tool of Clebsch-Gordan-Coefficients (CGC). The correspondence between the Ashtekar-Lewandowski Hilbert space ${\cal H}_{{\scriptscriptstyle}AL}$ and the abstract angular momentum Hilbert space is discussed in section 5.1 in [@GT]. Hence, the matrix element will roughly speaking have the following structure\
&&C(j\_[12]{},;\_3m\_[\_ [3]{}]{})C\^\*(\_[12]{},;a\_[3]{}m\_[a\_[3]{}]{})C\^\*(\_[3]{},;)C(a\_[3]{},;JM) [<]{}\^\_[i]{}||\^[J]{}\_j[M]{}[>]{}Here $C(j_1,j_2;J\,M)$ denotes the CGC that we get if we couple the angular momenta $j_1$ and $j_2$ to a resulting angular momentum $J$ with corresponding magnetic quantum number $M$ and ${\widehat{O}}$ is an operator including the operator ${\widehat{V}}_{{\scriptscriptstyle}RS}$ and ${\widehat{V}}_{{\scriptscriptstyle}AL}$ respectively and ${\widehat{\cal S}}$. The details can be found in section 5.1 of [@GT]. Due to the symmetry properties of the alternative flux operator that are analysed in section 5.2 of [@GT], the only total angular momenta that will contribute to the final matrix element are $J=0,1$. (See section 5.2 of [@GT] for more explanations concerning this point.) Since the physically relevant states are gauge-invariant we choose $j_{{\scriptscriptstyle}12}=0$. The behaviour of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}_{k,{{\scriptscriptstyle}tot}}(S_t)$ under gauge transformations, that is discussed in section 5.3 of [@GT] leads to the restriction $\tilde{j}_{{\scriptscriptstyle}12}=1$. Consequently, at the end of the day we get the following form of the matrix element of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}_{k,{{\scriptscriptstyle}tot}}(S_t)$ \[act7Ek\]\
&=&-\_[[P]{}\_tS\_t]{}\_[\_t]{} \_[B,C,F=-]{}\^[+]{}{\_(\_k)\_[CB]{}\
&&\[+(-1)\^[-F]{}\_[F+C,0]{}\_[\_[12]{}[+B+F,0]{}]{}\
&& [<]{}1 \_[12]{} [;]{} [B]{}| \_[12]{}[+B]{}[>]{} [<]{} \_[12]{}[+B]{} [;]{} [F]{}|00[>]{}\
&& [<]{}\^[0]{}\_[2]{}[M]{}=\_[12]{}[+B+F]{} [;]{} ’\_[1]{}’\_[2]{}|\_[1]{}|\^[0]{}\_1[M]{}=0 [;]{} m’\_[1]{}m’\_[2]{}[>]{}\
&& -(-1)\^[-F]{}\_[F+B,0]{} \_[[C+F]{},\_[12]{}]{}\
&&[<]{}0 0 [;]{} [C]{}| [C]{}[>]{} [<]{} [C]{} [;]{} [F]{}|1 [C+F]{}[>]{}\
&& }, whereby the four different cases are encoded in the operators ${\widehat{O}}_1$ and ${\widehat{O}}_2$. Explicitly, we have \[O1O2\] \^[I,AL]{}\_1&=&\^2\_[AL]{}\
\^[I,RS]{}\_1&=&\_[q\_[134]{}]{}\^2+\_[q\_[234]{}]{}\^2+\_[q\_[134]{}]{}\_[q\_[234]{}]{}+\_[q\_[234]{}]{}\_[q\_[134]{}]{}+\_[q\_[134]{}]{}\_[q\_[123]{}]{}+\_[q\_[124]{}]{}\_[q\_[134]{}]{}+\_[q\_[234]{}]{}\_[q\_[123]{}]{}+\_[q\_[124]{}]{}\_[q\_[234]{}]{}+\_[q\_[124]{}]{}\_[q\_[123]{}]{}\
\^[I,AL]{}\_2&=&\^2\_[AL]{}\
\^[I,RS]{}\_2&=&\_[q\_[134]{}]{}\^2+\_[q\_[234]{}]{}\^2+\_[q\_[234]{}]{}\_[q\_[134]{}]{}+\_[q\_[134]{}]{}\_[q\_[234]{}]{}+\_[q\_[123]{}]{}\_[q\_[134]{}]{}+\_[q\_[134]{}]{}\_[q\_[124]{}]{}+\_[q\_[123]{}]{}\_[q\_[234]{}]{}+\_[q\_[234]{}]{}\_[q\_[124]{}]{}+\_[q\_[123]{}]{}\_[q\_[124]{}]{}\
\^[II,AL]{}\_1&=&\_[AL]{}\_[AL]{}\
\^[II,RS]{}\_1&=&+\_[q\_[134]{}]{}\_[q\_[134]{}]{}+\_[q\_[234]{}]{}\_[q\_[234]{}]{}+\_[q\_[134]{}]{}\_[q\_[234]{}]{}+\_[q\_[234]{}]{}\_[q\_[134]{}]{}+\_[q\_[134]{}]{}\_[q\_[123]{}]{}+\_[q\_[124]{}]{}\_[q\_[134]{}]{}+\_[q\_[234]{}]{}\_[q\_[123]{}]{}\
&&+\_[q\_[124]{}]{}\_[q\_[234]{}]{}+\_[q\_[124]{}]{}\_[q\_[123]{}]{}\
\^[II,AL]{}\_2&=&\_[AL]{}\_[AL]{}\
\^[II,RS]{}\_1&=&+\_[q\_[134]{}]{}\_[q\_[134]{}]{}+\_[q\_[234]{}]{}\_[q\_[234]{}]{}+\_[q\_[234]{}]{}\_[q\_[134]{}]{}+\_[q\_[134]{}]{}\_[q\_[234]{}]{}+\_[q\_[123]{}]{}\_[q\_[134]{}]{}+\_[q\_[134]{}]{}\_[q\_[124]{}]{}+\_[q\_[123]{}]{}\_[q\_[234]{}]{}\
&&+\_[q\_[234]{}]{}\_[q\_[124]{}]{}+\_[q\_[123]{}]{}\_[q\_[124]{}]{}, whereby we used the notation ${\widehat{V}}_{q_{{\scriptscriptstyle}IJK}}$ for ${\widehat{V}}_{{\scriptscriptstyle}RS}={\widehat{V}}_{q_{{\scriptscriptstyle}134}}+{\widehat{V}}_{q_{{\scriptscriptstyle}234}}+{\widehat{V}}_{q_{{\scriptscriptstyle}124}}+{\widehat{V}}_{q_{{\scriptscriptstyle}123}}$ when only the triple $\{e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K}\}$ contributes to ${\widehat{V}}_{{\scriptscriptstyle}RS}$. The derivation of the various versions of ${\widehat{O}}_1,{\widehat{O}}_2$ can be found in [@GT]. These 8 versions result from taking into account a) the two volume operators, b) the signum operator ${\cal S}$ or not and c) the adjoint or not in eqn (\[act7Ek\]). Before we will discuss our results in the next sections, we want to explain a bit more in detail what we mean by say the consistency check is affirmative or not. We managed to implement an alternative flux operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_{k,{{\scriptscriptstyle}tot}}(S_t)$ in four different versions ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$, ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$, ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ and ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$. The usual flux operator is quantised as a differential operator in the standard way. The alternative flux operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_{k,{{\scriptscriptstyle}tot}}(S_t)$ is quantised via the Poisson bracket identity in eqn (\[Pid\]) analogous to the quantisation of the Hamiltonian Constraint. If these two methods of quantisation are mathematically consistent with each other, the action of ${\widehat{E}}_k(S)$ and the one of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_{k,{{\scriptscriptstyle}tot}}(S_t)$ should only differ by a constant, namely \_k(S)[|\^[0]{}[0]{} [>]{}]{}=C(j,)C\_[reg]{}[\^[()]{}]{}\^[0]{}\_[k,[tot]{}]{}(S)[|\^[0]{}[0]{} [>]{}]{}=C(j,)C\_[reg]{}\_[\_[12]{}]{} [[<]{}\^[1]{}[\_[12]{}]{}|]{}[\^[()]{}]{}\^[0]{}\_[k,[tot]{}]{}(S)[|\^[0]{}[0]{} [>]{}]{}[|\^[1]{}[\_[12]{}]{} [>]{}]{}, whereby ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptstyle}0}_{k,{{\scriptscriptstyle}tot}}(S)$ denotes the alternative flux operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_{k,{{\scriptscriptstyle}tot}}(S)$ where $C_{reg}$ has been replaced by 1. The constant $C(j,\ell)$ might depend on the spin labels $j,\ell$ of the edges, but at least semiclassically the dependence on the spin label $j$ and $\ell$ must disappear since otherwise the behaviour of ${\widehat{E}}_k(S)$ and ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}_{k,{{\scriptscriptstyle}tot}}(S)$ in the correspondence limit of large $j$ would disagree. Notice that also a dependence of $\lim\limits_{j\to\infty}C(j,\ell)=:C(\ell)$ on $\ell$ is inacceptable, because classically the flux is independent of the factor ordering ambiguity $\ell$. Moreover this constant will fix the ambiguity in the volume operator $C_{reg}$ that is due to regularisation as we will see later. Hence, $\lim\limits_{j\to\infty}C(j,\ell)=1/C_{reg}=\mbox{const}$ as will be discussed more in detail in section \[C2AL\].
Case I: Results for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ and ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$
===============================================================================================================================================================================================================================================================================
Calculations for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$
--------------------------------------------------------------------------------------------------------------------------------------------
For technical reasons, we consider only a spin label $\ell=0.5,1$, because higher spin labels cannot computed analytically anymore. Fortunately, the main properties of this case already occurs when considering small $\ell$. The detailed calculation in section 6.2 in [@GT] show [<]{}\^[0]{}\_[2]{}[M]{}=\_[12]{} [;]{} ’\_[1]{}’\_[2]{}|\^[I,AL]{}\_[1]{}|\^[0]{}\_1[M]{}=[C+F]{} [;]{} m’\_[1]{}m’\_[2]{}[>]{}&=&0\
[<]{}\^[1]{}\_[i]{}[M]{}=\_[12]{} [;]{} ’\_[1]{}’\_[2]{}|\^[I,AL]{}\_[2]{}|\^[1]{}\_1[M]{}=[C+F]{} [;]{} m’\_[1]{}m’\_[2]{}[>]{}&=&0, where $i=2,3,4$. Going back to eqn (\[act7Ek\]), we note that the vanishing of the matrix elements above has the consequence that the whole matrix element ${\;<}\beta^{j_{{\scriptscriptstyle}12}}\,{\widetilde{m}}_{{\scriptscriptstyle}12}\,|{{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)|\,\beta^{j_{{\scriptscriptstyle}12}}\,m_{{\scriptscriptstyle}12}{\!\!>}$ is zero. Since the action of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ on an arbitrary SNF can be derived from exactly this matrix element, we can conlcude that ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ is the zero operator. Accordingly, ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ is not consistent with the usual flux operator.
Calculations for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$
--------------------------------------------------------------------------------------------------------------------------------------------
Also for the operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ the analogous calculations discussed in section 6.3 of [@GT] yields only trivial matrix elements [<]{}\^[0]{}\_[2]{}[M]{}=\_[12]{} [;]{} ’\_[1]{}’\_[2]{}|\^[I,RS]{}\_[1]{}|\^[0]{}\_1[M]{}=[C+F]{} [;]{} m’\_[1]{}m’\_[2]{}[>]{}&=&0\
[<]{}\^[1]{}\_[i]{}[M]{}=\_[12]{} [;]{} ’\_[1]{}’\_[2]{}|\^[I,RS]{}\_[2]{}|\^[1]{}\_1[M]{}=[C+F]{} [;]{} m’\_[1]{}m’\_[2]{}[>]{}&=&0, Consequently, we can draw the same conlcusion as for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ and state that ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ is the zero operator and therefore inconsistent with the usual flux operator. Futhermore as either ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ nor ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{{\widetilde{E}}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ survive the consitency check, we can rule out, at least for the cases of $\ell=0.5,1$, the choice of $E^a_k=\det(e)e^a_k$ on which these operators are based on. To rule out the choice $E^a_k(S_t)=\det(e)e^a_k$ completely, we need to investigate the matrix element for arbitrary representation weights $\ell$. For higher values of $\ell$ the calculation cannot be done analytically any more. However, the results for $\ell=0.5,1$ indicate that there is an abstract reason which leads to the vanishing of the matrix elements for [*any*]{} $\ell$. We were not able to find such an abstract argument yet. However, even if that was not the case and there would be a range of values for $\ell$ for which not all of the matrix elements would vanish, it is inacceptable that the classical theory is independent of $\ell$ while the quantum theory strongly depends on $\ell$ in the correspondence limit of large $j$.
Case II: Results for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ and ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$
==================================================================================================================================================================================================================================================================================
Calculations for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ {#C2AL}
---------------------------------------------------------------------------------------------------------------------------------------------
Considering the case of the operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$, we can read of from eqn ($\ref{O1O2}$) the expressions ${\widehat{O}}_{{\scriptscriptstyle}1}={\widehat{V}}_{{\scriptscriptstyle}AL}{\widehat{{\cal S}}}{\widehat{V}}_{{\scriptscriptstyle}AL}={\widehat{O}}_{{\scriptscriptstyle}2}$. Since the signum operator ${\widehat{{\cal S}}}$ that corresponds to the classical expression ${\cal S}:=\operatorname{sgn}(\det(e))$ does not exist in the literature so far, we will in detail explain how the operator ${\widehat{{\cal S}}}$ has to be understood.
The Signum Operator ${\widehat{\cal S}}$
----------------------------------------
We are dealing now with case II meaning that the densitised triad is given by $E^{a,{{\scriptscriptstyle}II}}_k={\cal S}\det(e)e^a_k$, where ${\cal S}:=\det(e)$. Applying the determinant onto $E^{a,{{\scriptscriptstyle}II}}_k$, we get \[DefdetE\] (E)=((e))(q)(q)=\[(e)\]\^20. Therefore, we obtain ((E))=((e))=[S]{}. In the following we want to show that ${\cal S}=\operatorname{sgn}(\det(E))$ can be identified with the signum of the expression inside the absolute value under the square roots in the definition of the AL-volume. For this purpose let us first discuss this issue on the classical level and afterwards go back into the quantum theory and see how the corresponding operator ${\widehat{{\cal S}}}$ is connected with the operator ${\widehat{Q}}^{{\scriptscriptstyle}AL}_v$ in eqn (
\[Qdef\]). In order to do this let us consider eqn (\[clidII\]). This equation contains the classical volume $V(R_{v({{\scriptscriptstyle}\Box})})$ where $R_{v({{\scriptscriptstyle}\Box})}$ denotes a region centred around the vertex $v({{\scriptscriptstyle}\Box})$. The volume of such a cube is given by \[VBox\] V(R\_[v()]{})=\_[R\_[v()]{}]{}d\^3x= \_[R\_[v()]{}]{}d\^3x, where we used $\det(q)=|\det(E)|$ from eqn (\[DefdetE\]). Introducing a parametrisation of the cube now, we end up with V(R\_[v()]{})=\_[\[-,+\]\^3]{}||d\^3u =\_[\[-,+\]\^3]{}|(X)|d\^3u. In order to be able to carry out the integral we choose the cube $R_{v({{\scriptscriptstyle}\Box})}$ small enough and thus, the volume can be approximated by \[ResVBox\] V(R\_[v()]{})’\^3|()(v)|. Using the definition of $\det(E)=\frac{1}{3!}\epsilon_{abc}\epsilon^{jkl}E^a_jE^b_kE^c_l$, we can rewrite eqn (\[VBox\]) as V(R\_[v()]{})=\_d\^3x If we again choose $R_{v({{\scriptscriptstyle}\Box})}$ small enough and define the square surfaces of the cube as $S^{{\scriptscriptstyle}I}$, we can re-express the volume integral over the densitised triads in terms of their corresponding electric fluxes through the surfaces $S^{{\scriptscriptstyle}I}$ \[Vflux\] V(R\_[v()]{})&&. The flux through a particular surfaces $S^{{\scriptscriptstyle}I}$ is defined as \[VFlux\] E\_j(S\^[I]{})=\_[S\^[I]{}]{}E\^a\_j n\^[S\^[I]{}]{}\_a n\^[S\^[I]{}]{}\_a=\^[IJK]{}\_[abc]{}X\^b\_[,u\_[J]{}]{}X\^c\_[,u\_[K]{}]{}|\_[n\^[I]{}=0]{}. Here $n^{S^{{\scriptscriptstyle}I}}_a$ denotes the conormal vector associated with the surface $S^{{\scriptscriptstyle}I}$. Regarding eqn (\[Vflux\]) we realise that inside the absolute value in eqn (\[Vflux\]) appears exactly the definition of $\det(E_j(S^{{\scriptscriptstyle}I}))$. Therefore we get \[VdetES\] V(R\_[v()]{}). On the other hand, by taking advantage of the fact that the surfaces $S^{{\scriptscriptstyle}I}$ are small enough so that the integral can be approximated by the value at the vertex times the size of the surface itself, we obtain for $\det(E_j(S^{{\scriptscriptstyle}I}))$ \[detES\] (E\_j(S\^[I]{}))&&(E\^a\_j(v)n\^[S\^[I]{}]{}\_a(v)’\^2)\
&=&(E\^a\_j(v))(n\^[S\^[I]{}]{}\_a(v))’\^6\
&=&(E(v))(n\^[S\^[I]{}]{}\_a(v))’\^6. If we consider the definition of the normal vector in eqn (\[VFlux\]),we can show the following identity \[detn\] (n\^[S\^[I]{}]{}\_a)&=&(X)\^3(X\^[-1]{})==(X)\^2. Inserting eqn (\[detn\]) back into eqn (\[detES\]) we have \[detES2\] (E\_j(S\^[I]{}))(E(v))\[(X(v))\]\^2’\^6 and can conclude that eqn (\[VdetES\]) is consistent with the usual definition of the volume in eqn (\[ResVBox\]). Since we want to identify ${\cal S}:=\operatorname{sgn}(\det(E))$ with the signum that appears inside the absolute value under the square root in the definition of the volume, we can read off from eqn (\[VdetES\]), that we still have to show $\operatorname{sgn}(\det(E))=\operatorname{sgn}(\det(E_j(S^{{\scriptscriptstyle}I})))$. However, this can be done by means of eqn (\[detES2\]) ((E\_j(S\^[I]{})))&&((E(v))\[(X(v))\]\^2’\^6)\
&=&((E(v)))(\[(X(v))\]\^2)(’\^6)\
&=&((E(v))). Consequently, we must identify ${\cal S}$ with the signum that appears inside the absolute value under the square root in the definition of the volume $V$ in the classical theory, because it was precisely the expression $\det(E_j(S_{{\scriptstyle}I}))$ that was used in the construction of the volume operator, defined as the square root of absolute value of $\det(E)$. In the quantum theory, we introduced the operator ${\widehat{Q}}^{{\scriptscriptstyle}AL}_v$ in eqn (\[Qdef\]), which is basically the expression inside the absolute value in the definition of the volume operator. Hence, it can be seen as the squared version of the volume operator that additionally contains information about the signum of the expression inside the absolute values. Consequently, we have the operator identitity ${\widehat{Q}}^{{\scriptscriptstyle}AL}_v={\widehat{V}}_{{\scriptscriptstyle}AL}{\widehat{\cal S}}{\widehat{V}}_{{\scriptscriptstyle}AL}$. Now we will be left with the task to calculate particular matrix elements for ${\widehat{Q}}^{{\scriptscriptstyle}AL}_v$ which can be done by means of the formula derived in [@14].
Calculations for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ {#calculations-for-scriptscriptstyle-ellwidehattildeescriptscriptstyleiial_kscriptscriptstyletots_t}
---------------------------------------------------------------------------------------------------------------------------------------------
One big advantage that comes along with the operator identity ${\widehat{Q}}^{{\scriptscriptstyle}AL}_v={\widehat{V}}_{{\scriptscriptstyle}AL}{\widehat{\cal S}}{\widehat{V}}_{{\scriptscriptstyle}AL}$ is that diagonalisation of the operator ${\widehat{Q}}^{{\scriptscriptstyle}AL}_v$ is no longer necessary as it was in case I for ${\widehat{V}}^2_{{\scriptscriptstyle}AL}$, because the operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ contains only particular matrix elements of ${\widehat{Q}}^{{\scriptscriptstyle}AL}_v$ that can be exactly calculated, even for arbitrary $\ell$, by means of the tools developed in [@14]. The details of this calculation can be found in [@GT] as well as the corresponding matrix elements of the usual flux operator ${\widehat{E}}_k(S)$. If we compare the results of the usual flux operator with the one of ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ we can judge whether ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ leads to a result consistent with the usual flux operator. It transpires \[CompAL\] [\^[()]{}]{}\^[II,AL]{}\_[k,[tot]{}]{}(S)[|\^[0]{}[0]{} [>]{}]{}=3!8C\_[reg]{}\_k(S)[|\^[0]{}[0]{} [>]{}]{} Therefore the two operators differ only by a positive integer constant. As there is still the regularisation constant $C_{reg}$ in the above equation we can now fix it by requiring that both operators do exactly agree with each other. In fact there is no other choice than exact agreement because the difference would be a global constant which does not decrease as we take the corresponding limit of large quantum numbers $j$. Thus, we can remove the regularisation ambiguity of the volume operator in this way and choose $C_{reg}$ to be $C_{reg}:=\frac{1}{3!8}=\frac{1}{48}$. This is exactly the value of $C_{reg}$ that was obtained in [@4] by a completely different argument. Thus the geometrical interpretation of the value we have to choose for $C_{reg}$ is perfectly provided[^7]. Note that the consistency check holds in the full theory and not only in the semiclassical sector. Consequently, the operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,AL}_{k,{{\scriptscriptstyle}tot}}(S_t)$ is consistent with the usual flux operator.
Calculations for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$
---------------------------------------------------------------------------------------------------------------------------------------------
Now, considering the operator ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ things look differently. Here, a quantisation that is consistent with ${\widehat{V}}_{{\scriptscriptstyle}RS}$ of the signum operator ${\widehat{\cal S}}$ cannot be found due to the simple reason that ${\widehat{V}}_{{\scriptscriptstyle}RS}$ in contrast to ${\widehat{V}}_{{\scriptscriptstyle}AL}$ is a sum of single square roots. Hence, there is no origin for a global sign as it was in the case of ${\widehat{V}}_{{\scriptscriptstyle}AL}$. (See also section 6.6.1 in [@GT].) In retrospect there is a simple argument why the only possibility ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}I,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ (since ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ does not exist) is ruled out without further calculation: Namely, the lack of a factor of orientation in ${\widehat{V}}_{{\scriptscriptstyle}RS}$, like $\epsilon(e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K})$ in ${\widehat{V}}_{{\scriptscriptstyle}AL}$, leads to the following basic disagreement with the usual flux operator: Suppose we had chosen the orientation of the surface $S$ in the opposite way. Then the type of the edge $e$ switches between up and down and similarly for $e_{{\scriptscriptstyle}1},e_{{\scriptscriptstyle}2}$. Then, the result of the usual flux operator would differ by a minus sign. In the case of ${\widehat{V}}_{{\scriptscriptstyle}AL}$ we would get this minus sign as well due to $\epsilon(e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K})$ contained in $Q^{{\scriptscriptstyle}Al}_v={\widehat{V}}_{{\scriptscriptstyle}AL}{\widehat{\cal S}}{\widehat{V}}_{{\scriptscriptstyle}AL}$, whereas a change of the orientation of $e_{{\scriptscriptstyle}1},e_{{\scriptscriptstyle}2}$ would not modify the result of the alternative flux operator if we used ${\widehat{V}}_{{\scriptscriptstyle}RS}$ instead, because it is not sensitive to the orientation of the edges. Accordingly, we should stop here and draw the conclusion that ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$ is not consistent with ${\widehat{E}}_k(S)$. One might propose to artificially use ${\widehat{V}}_{{\scriptscriptstyle}RS}{\widehat{\cal S}}_{{\scriptscriptstyle}AL}{\widehat{V}}_{{\scriptscriptstyle}RS}$ for ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$. Note, that we attached the label $AL$ to ${\widehat{\cal S}}$ to emphasize that its quantisation is in agreement with ${\widehat{V}}_{{\scriptscriptstyle}AL}$. This is artificial for the following reason. Suppose we have a classical quantity $A:=\det(E)$ and two different functions $f_1:=\sqrt{|A|}$ and $f_2:=\operatorname{sgn}(A)$. If we want to quantise the functions $f_1$ and $f_2$, we do this with the help of the corresponding selfadjoint operator ${\widehat{A}}$ and obtain due to the spectral theorem ${\widehat{f}}_1=\sqrt{|{\widehat{A}}|}$ and ${\widehat{f}}_2=\operatorname{sgn}({\widehat{A}})$. The product of operators ${\widehat{V}}_{{\scriptscriptstyle}RS }{\widehat{\cal S}}_{{\scriptscriptstyle}AL}{\widehat{V}}_{{\scriptscriptstyle}RS}$ rather corresponds to ${\widehat{g}}_1={\widehat{A}}^{\prime}$ and ${\widehat{g}}_2=\operatorname{sgn}({\widehat{A}})$, because ${\widehat{V}}_{{\scriptscriptstyle}RS}$ is quantised with a different regularisation scheme than ${\widehat{S}}$ is. This would only be justified if $\sqrt{|{\widehat{A}}|}$ and ${\widehat{A}}^{\prime}$ would agree semiclassically. However they do not: If we compare the expressions for $V_{{\scriptscriptstyle}AL}$ and $V_{{\scriptscriptstyle}RS}$ then, schematically, they are related in the following way when restricted to a vertex: ${\widehat{V}}_{v,{\scriptscriptstyle}AL}=|\frac{3!i}{4}C_{reg}\sum\limits_{{\scriptscriptstyle}I<J<K}\epsilon(e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K}){\widehat{q}}_{{\scriptscriptstyle}IJK}|^{1/2}$ while ${\widehat{V}}_{v,{\scriptscriptstyle}RS}=\sum\limits_{{\scriptscriptstyle}I<J<K} |\frac{3!i}{4}C_{reg}{\widehat{q}}_{{\scriptscriptstyle}IJK}|^{1/2}$. It is clear that apart from the sign $\epsilon(e_{{\scriptscriptstyle}I},e_{{\scriptscriptstyle}J},e_{{\scriptscriptstyle}K})$ the two operators can agree at most on states where only one of the ${\widehat{q}}_{{\scriptscriptstyle}IJK}$ is non vanishing (three or four valent graphs) simply because $\sqrt{|a+b|}\not=\sqrt{|a|}+\sqrt{|b|}$ for generic real numbers $a,b$. Nevertheless by analysing ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$
when the artifical operator ${\widehat{V}}_{{\scriptscriptstyle}RS}{\widehat{\cal S}}_{{\scriptscriptstyle}AL}{\widehat{V}}_{{\scriptscriptstyle}RS}$ is involved, we obtain \[CompRS\] [\^[()]{}]{}\^[II,RS]{}\_[k,[tot]{}]{}(S)[|\^[0]{}[0]{} [>]{}]{}=C(j,)C\_[reg]{}\_k(S)[|\^[0]{}[0]{} [>]{}]{}, whereby $C(j,\ell)\in\Rl$ is a constant depending non-trivially on the spin labels $j,\ell$ in general. One can show that $C(j,\ell)\to C(\ell)$ semiclassically, i.e. in the limit of large $j$, which is shown in appendix E and discussed in section 6.6.2 of of [@GT]. Hence ${{}^{\scriptscriptstyle (\ell)}\!\!\:}{\widehat{\tilde{E}}}^{{\scriptscriptstyle}II,RS}_{k,{{\scriptscriptstyle}tot}}(S_t)$, including the artificial operator ${\widehat{V}}_{{\scriptscriptstyle}RS}{\widehat{\cal S}}_{{\scriptscriptstyle}AL}{\widehat{V}}_{{\scriptscriptstyle}RS}$, would be consistent with ${\widehat{E}}_k(S)$ within the semiclassical regime of the theory if we chose $C_{reg}=1/C(\ell)$ and if $C(\ell)$ would be a universal constant. Unfortunately, $C(\ell)$ has a non-trivial $\ell$ -dependence which is inacceptable because it is absent in the classical theory. Moreover, we do not see any geometrical interpretation available for the chosen value of $C_{reg}$ for any value of $\ell$ in this case. One could possibly get rid of the $\ell$-dependence by simply cancelling the linearly dependent triples by hand from the definition of ${\widehat{V}}_{{\scriptscriptstyle}RS}$. But then the so modified ${\widehat{V}}^{\prime}_{{\scriptscriptstyle}RS}$ and ${\widehat{V}}_{{\scriptscriptstyle}AL}$ would practically become identical on $3-$ and $4-$valent vertices and moreover ${\widehat{V}}^{\prime}_{{\scriptscriptstyle}RS}$ now depends on the differentiable structure of $\Sigma$. See more about this in the conclusion section.
Conclusion
==========
We hope to have demonstrated in this paper that at least certain aspects of LQG are remarkably tightly defined : Certain factor ordering ambiguities turn out to be immaterial, some regularisation schemes can be ruled out as unphysical once and for all. The fact that we can exclude the RS volume from now on as far as the quantum dynamics is concerned should not be viewed as a criticism of [@3] at all: The regularisation performed in [@3] is manifestly background independent, natural and intuitively very reasonable. It was the first pioneering paper on quantisation of kinematical geometrical operators in LQG and had a deep impact on all papers that followed it. Most of the beautiful ideas spelled out in [@3] also entered the regularisation performed in [@4] and continue to be valid. One could never have guessed that the regularisation performed in [@3] leads to an inconsistent result. It took a decade to develop the necessary technology in order to perform the consistency check provided in this paper. Hence, the fact that we can define the theory more uniquely now should be taken as a strength of the theory and not as a weakness of [@3]. Interestingly, the very first paper on the volume operator [@15] that we are aware of does look more like ${\widehat{V}}_{{\scriptscriptstyle}AL}$ rather than ${\widehat{V}}_{{\scriptscriptstyle}RS}$. We speculate that if one had completed the ideas of [@15] one would have ended up with ${\widehat{V}}_{{\scriptscriptstyle}AL}$ rather than ${\widehat{V}}_{{\scriptscriptstyle}RS}$. Of course, one could take the viewpoint that the consistency check performed here is unnecessary, that one can just take some definition of the volume operator and not worry about triads. However, as triads prominently enter the dynamics of LQG such a point of view would render the quantum dynamics obsolete. In other words, the dynamics and all other operators which depend on triads such as the length operator [@5] or spatially difeomorphism invariant operators forces us to use ${\widehat{V}}_{{\scriptscriptstyle}AL}$ rather than ${\widehat{V}}_{{\scriptscriptstyle}RS}$. Finally notice that one of the motivations for choosing ${\widehat{V}}_{{\scriptscriptstyle}RS}$ rather than ${\widehat{V}}_{{\scriptscriptstyle}AL}$ is that ${\widehat{V}}_{{\scriptscriptstyle}RS}$ does not depend on the differentiable structure of $\Sigma$. Hence one could use homeomorphism rather than diffeomorphism in order to define “diffeomorphism invariant” states as advertised in [@GrotRov],[@FairRov]. This makes the Hilbert space of such states separable. However, notice that homeomorphisms are not a symmetry of the classical theory. Furthermore, there are other possibilities to arrive at a separable Hilbert space: One can decompose the Hilbert space ${\cal H}_{Diff}$ corresponding to the strict diffeomorphisms into an uncountably infinite direct sum of separable Hilbert spaces. In the current proposals for the quantum dynamics all of these mutually isomorphic Hilbert spaces are left invariant. If the theory are left invariant by the Dirac observables, then they would be superselected and any one of them would capture the full physics of LQG. The technical details of the check, mainly displayed in our companion paper [@GT], required a substantial computational effort. There are an order of ten crucial stages in the calculation where things could have gone badly wrong. Following the details of our analysis, one sees that all the subtle issues mentioned must be properly taken care of in order to get an even qualitatively correct result. These subtleties involve, among other things:
- The meaning of the limit as we remove the regulator and to define the alternative flux operator has to be understood in the same way as for the fundamental flux operator, otherwise the alternative flux opertor is identical to zero. This issue is discussed in full detail in section 4.3 of [@GT]
- Switching from the spin network basis to the abstract angular momentum basis, discussed elaborately in section 5.1 of [@GT], has to take care of the precise unitary map between these two representations of the angular momentum algebra, otherwise the two operators differ drastically from each other. This unitary map is not mentioned in the literature because for gauge invariant operators it drops out of the equations. However, for the non – gauge invariant flux it has a large impact.
- Very unexpectedly, the sign of the determinant of the triad enters the calculation in a crucial way: Classically one would expect it to be neglegible, especially in an orientable manifold. However, had we dropped it from the quantum computation then the alternative flux operator would again vanish identically. It is very pleasing to see that quantisation based on a pseudo vector density is ruled out. This is for the same reason that one cannot implement the momentum operator $i\hbar\frac{d}{dx}$ on $L_2(\Rl^+,dx)$.
- A different ordering than the one we chose would have resulted again in the zero operator even in case II.
- As for the fundamental flux operator one has to first smear the alternative flux operator into the direction transversal to the surface under consideration. For the fundamental flux this implies that edges of type “in” are not acted on. Without this additional smearing the fundamental flux would be ill defined. For the alternative flux this implies furthermore that the classification of edges into the types up, down, in and out is meaningfull at all. Indeed, one actually can define the alternative flux without the additional smearing. The result is well defined. However, it would differ drastically from the fundamental flux as soon as there is a vertex of valence higher than two of the graph of the spin network state in question within the surface. The additional smearing has the effect that with $dt$ measure one all the vertices within the sufaces $S_t$ are bivalent.
- Furthermore, the analyses in section 4.3 of [@GT] shows that without the additional smearing we would be missing the crucial factor $1/2$ in eqn (\[Limit\]) and our $C_{reg}$ would be off the value found in [@4].
- Just following the tedious calculations step by step as explicitly shown in [@GT] and evaluating all the CGC’s involved one sees that all the subtle signs have to be there, everything fits only when doing the calculation with 100% accuracy. The calculation is therefore a highly sensitive consistency check.
- All the $\ell$ dependence disappears even at small values of j. This is especially surprising because the classical approximation of a connection by a holonomy along a given path becomes worse as we let $\ell$ grow. Of course in the limit we take paths of infinitesimal length, however, this is done [*after*]{} quantization and it could have happened that the quantization is affected by a non trivial $\ell$ dependence which however should disappear in the limit of large $j$.
It transpires that the reason for getting a zero operator without the signum operator unveils a so far not appreciated symmetry of the volume operator. It would be desirable to understand the symmetry from a more abstract perspective. This paper along with our companion paper [@GT] is one of the first papers that tightens the mathematical structure of full LQG by using the kind of consistency argument that we used here. Many more such checks should be performed in the future to remove ambiguities of LQG and to make the theory more rigid, in particular those connected with the quantum dynamics.\
\
\
[Acknowledgements]{}\
\
It is our pleasure to thank Johannes Brunnemann for countless discussions about the volume operator. We also would like to thank Carlo Rovelli and, especially, Lee Smolin for illuminating discussions.K.G. thanks the Heinrich-Böll-Stiftung for financial support. This research project was supported in part by a grant from NSERC of Canada to the Perimeter Institute for Theoretical Physics.
[99]{} -6pt C. Rovelli, “Quantum Gravity”, Cambridge University Press, Cambridge, 2004\
T. Thiemann, “Modern Canonical Quantum General Relativity”, Cambridge University Press, 2005; gr-qc/0110034 C. Rovelli, “Loop Quantum Gravity", Living Rev. Rel. [**1**]{} (1998) 1, gr-qc/9710008\
T. Thiemann,“Lectures on Loop Quantum Gravity”, Lecture Notes in Physics, [**631**]{} (2003) 41 – 135, gr-qc/0210094\
A. Ashtekar, J. Lewandowski, “Background Independent Quantum Gravity: A Status Report”, Class. Quant. Grav. [**21**]{} (2004) R53; \[gr-qc/0404018\]\
L. Smolin, “An Invitation to Loop Quantum Gravity”, hep-th/0408048 T. Thiemann, “Anomaly-free Formulation of non-perturbative, four-dimensional Lorentzian Quantum Gravity", Physics Letters [**B380**]{} (1996) 257-264, \[gr-qc/9606088\]\
T. Thiemann, “Quantum Spin Dynamics (QSD)", Class. Quantum Grav. [**15**]{} (1998) 839-73, \[gr-qc/9606089\]; “II. The Kernel of the Wheeler-DeWitt Constraint Operator", Class. Quantum Grav. [**15**]{} (1998) 875-905, \[gr-qc/9606090\]; “III. Quantum Constraint Algebra and Physical Scalar Product in Quantum General Relativity", Class. Quantum Grav. [**15**]{} (1998) 1207-1247, \[gr-qc/9705017\]; “IV. 2+1 Euclidean Quantum Gravity as a model to test 3+1 Lorentzian Quantum Gravity", Class. Quantum Grav. [**15**]{} (1998) 1249-1280, \[gr-qc/9705018\]; “V. Quantum Gravity as the Natural Regulator of the Hamiltonian Constraint of Matter Quantum Field Theories", Class. Quantum Grav. [**15**]{} (1998) 1281-1314, \[gr-qc/9705019\] T. Thiemann, “The Phoenix Project: Master Constraint Programme for Loop Quantum Gravity”, gr-qc/0305080\
B. Dittrich, T. Thiemann, “Testing the Master Constraint Programme for Loop Quantum Gravity I. General Framework”, gr-qc/0411138; “II. Finite Dimensional Systems”, gr-qc/0411139; “III. SL(2,R) Models”, gr-qc/0411140; “IV. Free Field Theories”, gr-qc/0411141; “V. Interacting Field Theories”, gr-qc/0411142 C. Rovelli, L. Smolin, “Discreteness of volume and area in quantum gravity", Nucl. Phys. [**B442**]{} (1995) 593, Erratum : Nucl. Phys. [**B456**]{} (1995) 734 A. Ashtekar, J. Lewandowski, “Quantum Theory of Geometry II : Volume Operators", Adv. Theo. Math. Phys. [**1**]{} (1997) 388-429 T. Thiemann, “A Length Operator for Canonical Quantum Gravity”, J. Math. Phys. [**39**]{} (1998) 3372-3392; \[gr-qc/9606092\] T. Thiemann, “Quantum Spin Dynamics (QSD): VII. Symplectic Structures and Continuum Lattice Formulations of Gauge Field Theories", Class.Quant.Grav.18:3293-3338,2001, \[hep-th/0005232\]; “Gauge Field Theory Coherent States (GCS): I. General Properties", Class.Quant.Grav.18:2025-2064,2001, \[hep-th/0005233\]\
T. Thiemann, O. Winkler, “Gauge Field Theory Coherent States (GCS): II. Peakedness Properties", Class.Quant.Grav.18:2561-2636,2001, \[hep-th/0005237\]; “III. Ehrenfest Theorems", Class. Quantum Grav. [**18**]{} (2001) 4629-4681, \[hep-th/0005234\]; “IV. Infinite Tensor Product and Thermodynamic Limit", Class. Quantum Grav. [**18**]{} (2001) 4997-5033, \[hep-th/0005235\]\
H. Sahlmann, T. Thiemann, O. Winkler, “Coherent States for Canonical Quantum General Relativity and the Infinite Tensor Product Extension", Nucl.Phys.B606:401-440,2001; \[gr-qc/0102038\]\
T. Thiemann, “Complexifier Coherent States for Canonical Quantum General Relativity", gr-qc/0206037 H. Sahlmann, T. Thiemann, “Towards the QFT on Curved Spacetime Limit of QGR. 1. A General Scheme”, \[gr-qc/0207030\]; “2. A Concrete Implementation", \[gr-qc/0207031\] H. Sahlmann, “When do Measures on the Space of Connections Support the Triad Operators of Loop Quantum Gravity?”, gr-qc/0207112; “Some Comments on the Representation Theory of the Algebra Underlying Loop Quantum Gravity”, gr-qc/0207111\
H. Sahlmann, T. Thiemann, “On the Superselection Theory of the Weyl Algebra for Diffeomorphism Invariant Quantum Gauge Theories”, gr-qc/0302090; “Irreducibility of the Ashtekar-Isham-Lewandowski Representation”, gr-qc/0303074\
A. Okolow, J. Lewandowski, “Diffeomorphism Covariant Representations of the Holonomy Flux Algebra”, gr-qc/0302059\
C. Fleischhack, “Representations of the Weyl Algebra in Quantum Geometry”, math-ph/0407006\
J. Lewandowski, A. Okolow, H. Sahlmann, T. Thiemann, “Uniqueness of Diffeomorphism Invariant States on Holonomy – Flux Algebras”, to appear A. Ashtekar, C.J. Isham, “Representations of the Holonomy Algebras of Gravity and Non-Abelean Gauge Theories", Class. Quantum Grav. [**9**]{} (1992) 1433, \[hep-th/9202053\]\
A. Ashtekar, J. Lewandowski, “Representation theory of analytic Holonomy $C^\star$ algebras", in “Knots and Quantum Gravity", J. Baez (ed.), Oxford University Press, Oxford 1994
T. Thiemann, “Closed Formula for the Matrix Elements of the Volume Operator in Canonical Quantum Gravity”, J. Math. Phys. [**39**]{} (1998) 3347-3371; gr-qc/9606091 R. Loll, “Imposing det E > 0 in discrete quantum gravity,” Phys. Lett. B [**399**]{} (1997) 227 \[arXiv:gr-qc/9703033\]. G. Immirzi, “Quantum Gravity and Regge Calculus", Nucl. Phys. Proc. Suppl. [**57**]{} (1997) 65; \[gr-qc/9701052\]\
C. Rovelli, T. Thiemann, “The Immirzi Parameter in Quantum General Relativity”, Phys. Rev. [**D57**]{} (1998) 1009-14; \[gr-qc/9705059\]
A. Ashtekar, J. C. Baez, K. Krasnov, “Quantum Geometry of Isolated Horizons and Black Hole Entropy", Adv.Theor.Math.Phys.4:1-94,2001, \[gr-qc/0005126\]\
K. Meissner , “Black Hole Entropy in Loop Quantum Gravity”, Class. Quant. Grav. [**21**]{} (2004) 5245-5252; \[gr-qc/0407052\]\
M. Domagala, J. Lewandowski, “Black Hole Entropy from Quantum Geometry”, Class.Quant.Grav. [**21**]{} (2004) 5233-5244, 2004; \[gr-qc/0407051\] J. Brunnemann, T. Thiemann, “Simplification of the Spectral Analysis of the Volume Operator in Loop Quantum Gravity”, gr-qc/0405060 L. Smolin, “Recent Developments in Non-Perturbative Quantum Gravity“, hep-th/9202022 J. Brunnemann, private communication K. Giesel, T. Thiemann, “Consistency Check on Volume and Triad Operator Quantisation in Loop Quantum Gravity II", gr-qc/0507037 W. Fairbairn and C. Rovelli, J. Math. Phys. [**45**]{} (2004) 2802 \[arXiv:gr-qc/0403047\]. N. Grot and C. Rovelli, J. Math. Phys. [**37**]{}, 3014 (1996) \[arXiv:gr-qc/9604010\].
[^1]: Kristina.Giesel@aei.mpg.de, kgiesel@perimeterinstitute.ca
[^2]: Thomas.Thiemann@aei.mpg.de, tthiemann@perimeterinstitute.ca
[^3]: This has been achieved, so far, only within a certain approximation [@7] which essentially consists in replacing $SU(2)$ by $U(1)^3$. The necessary calculations in the Non Abelean case are much more complictaed due to two reasons: 1. The spectrum of the volume operator is not available in analytical form and 2. the semiclassical analysis is calculationally more difficult. However, work is now in progress in order to fill this gap.
[^4]: In contrast, the triad operator follows from the volume operator by the axioms of quantum mechanics namely that Poisson brackets be replaced by commutators divided by $i\hbar$ and therefore it is not possible that the source of a possible problem is in the quantisation of the triad operator.
[^5]: By this we mean that given a function $f$ with self adjoint quantisation $\hat{f}$ and a multiplication operator $g$ for which $g^{-1}$ is defined everywhere on the Hilbert space, we may always consider instead $\hat{f}'=(g \hat{f} g^{-1}+\overline{g^{-1}} \hat{f} \overline{g})/2$ as the operator corresponding to $f$ if it has selfadjoint extensions as well. By minimalistic we mean the choice $g=1$. This issue is always present even in ordinary quantum mechanics however it is usually not mentioned because one usually deals with polynomials and $g\not=1$ would destroy polynomiality. In GR the expressions are generically non – polynomial from the outset and thus polynomiality is not available as a simplistic criterion. However, we may still insist on a minimal number of such kind of factor ordering ambiguities.
[^6]: The opposite case is also possible of course, but we will restrict our discussion to the first case and emphasize in the following disscussion where exactly the choice of $e_{{\scriptscriptstyle}1}$ as a down edge and $e_{{\scriptscriptstyle}2}$ of type up will make a difference.
[^7]: The factor $8=2^3$ comes from the fact that during the regularisation one integrates a product of 3 $\delta-$distributions on $\Rl$ over $\Rl^+$ only. The factor $6=3!$ is due to the fact that one should sum over ordered triples of edges only.
|
Brad Friedman Byon 10/18/2011, 5:26pm PT
This is just shameful. As a Jew (if not a particularly practicing one), watching how the American-Israel lobby gives a horrible name to Israel (and Jews for that matter) becomes more embarrassing every day. And since Republicans have decided to make believe that Obama is "vulnerable on Israel" --- they will say anything for perceived political gain, no matter whether it's actually true or not --- I suspect this sort of thing is only going to get shamefully worse as the 2012 election nears.
Two recent examples, both detailed below, demonstrate the desperation and willingness of these folks to use the State of Israel as little more than a propaganda bludgeon for Republican political causes.
The first example includes blatantly misleading --- and easily debunked --- lies to claim "anti-Semitism" at the heart of the Occupy Wall Street protests. Who is behind the video ad smear? Top Republican neo-cons, naturally.
The second is revealing in that it actually puts the lie to the claim that the American-Israel Lobby gives a damn about the supposed Iranian Menace, since new documents reveal they have blatantly decided to give two particular businessmen a Get Out of Jail Free Card, despite recent revelations that the two have spent years profiting by illegally trading with Iran, Israeli's supposedly mortal enemy. Those two businessmen and traitor traders? Charles and David Koch, naturally...
Lying About Occupy Wall Street
Last week, the so-called "Emergency Committee for Israel" (see who they really are below), released a new 60-second ad purporting to show "Hate at Occupy Wall Street Protests!"
The ad claims to reveal the truth about the "anti-Semitism" driving the OWS movement, as supported, according to the ad, by both President Obama and Nancy Pelosi, among other Democrats. Quotes are used from both Obama and Pelosi, by the way, which happen to be almost identical to supportive quotes also offered by folks like Mitt Romney and Eric Cantor. For some reason, however, only the Democratic politicians are quoted as supporting the "hate" at the OWS protest in the deceptive ad.
The ad then goes on to show a number of anti-Semitic protest signs and comments from a supposed OWS protester in downtown Manhattan. Trouble is, neither of the protesters are actually part of the Occupy Wall Street movement, and the real Occupiers themselves both decried the anti-Semitism, and even held a huge Yom Kippur service in Zuccotti Park last week. Somehow, the "Emergency Committee for Israel" forgot to mention that in their smear video.
Watch The Young Turks' Cenk Uygur dismantle the con being put forth in this shameless and deceptively edited ad that only GOP con-men like James O'Keefe and Andrew Breitbart could be proud of. First Uygur plays the actual ad in full, then he details what the ad didn't bother to show you or tell you in their desperation to use Israel as a propaganda tool in an attempt to hurt Democratic politicians...
According to the "Emergency Committee for Israel" website, the organization is "committed to mounting an active defense of the US-Israel relationship by educating the public about the positions of political candidates on this important issue, and by keeping the public informed of the latest developments in both countries."
Apparently "educating the public" and "keeping the public informed" are now GOP code words for "lying to the public for attempted political gain." And the "positions of political candidates on this important issue" applies only to Democratic political candidates.
In truth, the "Emergency Committee for Israel" is little more than a Rightwing front group for the neo-con movement and the Republican Party. That fact is easily found on their website for the few who bother to actually drill down to find out who these liars are.
The website lists just three names associated with the group, comprising the entirety of their board, supposedly. And, surprise! All three are very well known Republican activists and propagandists!...
William Kristol (Fox "News" contributor, founder and editor of The Weekly Standard , perhaps most infamous for his advocacy of Sarah Palin as John McCain's 2008 running mate);
(Fox "News" contributor, founder and editor of , perhaps most infamous for his advocacy of Sarah Palin as John McCain's 2008 running mate); Gary Bauer (former Reagan administration official, one-time GOP Presidential candidate, and Christian political activist);
(former Reagan administration official, one-time GOP Presidential candidate, and Christian political activist); Rachel Abrams (Republican political writer and activist who writes for Kristol's Weekly Standard and Rupert Murdoch's New York Post and Wall Street Journal. She is also the wife of Ronald Reagan and George W. Bush administration official Elliot Abrams)
"Emergency Committee for Israel"? More like "Emergency Committee for Republican Candidates."
Giving the Kochs a Pass for Palling Around With Iran
Elsewhere on they "Emergency Committee for Israel" website, on its About page, they detail some of the "increasing threat[s] from terrorism supported by hostile regimes that refuse to accept the Jewish State."
One of those hostile regimes, naturally, is Iran which, we're informed, "continues its pursuit of a nuclear weapon and its support of terrorist groups."
Now those points may (or may not) be true. But let's presume they are. If so, why would the American Israel Public Affairs Committee (AIPAC), the largest Israel Lobby in the U.S., be willing to give a pass to Americans who have shown tremendous support for the Iranian regime over the last decade, through millions of dollars in secret profiteering, despite a trade ban with the nation identified by the U.S. as a terrorist state since 1995?
Why? Because those Iranian-loving Americans are David and Charles Koch, co-owners of the oil and chemical conglomerate Koch Industries, the second largest private corporation in the nation, and two of the top funders of the Republican Party.
That leftist, anti-Semitic, anti-free trade news outlet, Bloomberg News revealed the Kochs' long-term and highly lucrative trading with Iran in an article earlier this month headlined "Koch Brothers Flout Law Getting Richer With Secret Iran Sales."
And yet, despite Bloomberg's remarkable 7200-word exposé (in which it is also revealed that Koch allegedly made improper payoffs --- otherwise known as bribes --- to at least six different foreign countries), AIPAC appears to have no problem at all with the Kochs palling around with Iran.
In a memo obtained and published by Politico's Ben Smith last Friday, AIPAC sent a series of "suggested questions" to Congressional legislators who were grilling top State and Treasury officials on Iran and Syria in House and Senate hearings on Friday.
Here's the "suggested question" on "subsidiaries of American companies," in which the Koch brothers are given a pass by AIPAC, despite years of secret trading with the Islamic Republic and enemy of Israel...
Last week, the Bloomberg Markets Magazine ran a story titled, “Koch Brothers Flout Law Getting Richer With Secret Iran Sales.” The article alleges that a foreign subsidiary of the U.S.company, Koch Industries Inc., sold petrochemical equipment to Iran. My concern today is not with the Koch Brothers. That company did the right thing in 2007 and voluntarily ended all of its subsidiary’s business in Iran. However, I am concerned that other American companies continue to use foreign subsidiaries to profit from sales to Iran, and it is completely legal....
...
Do you know which American companies have foreign subsidiaries conducting business with Iran that would be illegal for their parent companies to do? Do you do anything to discourage this practice?
As Alex Seitz-Wald of ThinkProgress noted in his report on the hypocritical AIPAC memo, "the powerful pro-Israel lobby group AIPAC — which has for years been one of the most vocal proponents of tougher sanctions on Iran — has given the conservative mega-corporation a pass for dealing with" Iran.
Of course they have. AIPAC is interested in supporting Republicans, not Israel --- unless supporting Israel is a boon for Republicans.
Seitz-Wald goes on to quote from Bloomberg's report...
Every single chance they had to do business with Iran, or anyone else, they did,” said George Bentu, a former employee of Koch-Glitsch, a German Koch subsidiary which did much of the company’s business with Iran. The company “took elaborate steps” to sidestep the sanctions, Bloomberg reported. But apparently to AIPAC, Koch is off the hook because they stopped trading with terror-sponsor Iran in 2007. This seems a little disingenuous, since U.S. companies have been banned from trading with Iran since 1995. One would think AIPAC would condemn any company that did business with Iran, especially after elements of the country’s government have been tied to a potential assassination plot against Israeli and Saudi officials, instead of going out of their way to defend them.
Right. The Kochs are off the AIPAC hook because they both share the top goal of the Republicans: Removing Barack Obama from office. That is the bottom, and only, line for these folks. Democrats who throw in with any part of this crew --- there are many Dems also foolishly associated with AIPAC --- are doing little more than both hurting the Democratic Party as well as hurting Israel to boot.
|
Reduced intravascular catheter-related infection by routine use of antibiotic-bonded catheters in a surgical intensive care unit.
We report a comparative analysis of intravascular catheter-related infection before and after routine use of antibiotic-bonded catheters in an intensive care unit. Cefazolin-bonded catheters were placed in patients requiring catheterization for at least 3 days, or with remote infection, standard catheters at other times. One thousand forty-five catheters (259 patients) over 6 months were compared with 801 (236 antibiotic-bonded, 565 standard) catheters (239 patients) the next 6 months. After use of antibiotic-bonded catheters, we found: 1.7% catheters infected versus 3.7% (p = 0.01); catheter-associated bacteremia 0.1% versus 1.3% (p < 0.005); catheter-related infection rate 4.39 versus 10.73 per 1000 patient days (p < 0.005), and 5.06 versus 11.47 per 1000 catheter days (p < 0.01); and cumulative risk of infection decreased (p < 0.005). Antibiotic-bonded catheters were used with more remote infections (52% versus 27%, p < 0.001), had longer indwelling time (4.4 versus 3.1 days, p = 0.0001), and more were inserted over a guide wire (66% vs. 28%, p < 0.001). In conclusion routine use of antibiotic-bonded catheters was associated with a significant reduction in infectious complications. |
Q:
How can I make a keyboard configuration become default when I hook it up?
At work, I have a MacBook Pro and a RHEL workstation that share a HP keyboard and mouse via a KVM switch. I do most of my work on the Mac so I prefer to change the modifier keys so they command and alt are in the same positions as an Apple keyboard. Here is a screencast to demonstrate the exact options I change:
http://screencast.com/t/5mYQwMEVzwP0
The problem is, whenever I switch the KVM or disconnect the Mac, I have to usually have to go back into System Preferences to make the change. Is there some way I could automate this?
A:
I'm not sure if it'll support the switching case you describe 100%, but KeyRemap4Macbook will probably get you most of the way there. You can set different options for the internal and external keyboards, for example.
|
Flood is one of the most devastating natural disasters. Despite the enormous costs and efforts needed to eliminate the flood consequences, most residential and commercial buildings, as well as infrastructure (roads, public parks, railroads, etc.), remain unprotected. A traditional way to completely protect a construction from flood is to build a dam around it. However, this solution is impractical for at least two reasons. First, it is very expensive. Second, a dam, once built around a building, will completely eliminate access to/from the building. Temporal water barriers, such as sand bags or a specially designed means, do not solve the problem, either. First, such temporal barriers should be installed right prior or during flood occurrence, that is, when water is raising. Almost always, people do not have time for it under such circumstances, especially, if flood occurs at night. Second, the temporal water barriers are not as reliable and safe as a permanently built dam. Third, it is unknown what height a barrier should be. Thus, there is a need in a permanent flood protection system of buildings and infrastructure that would: 1) not prevent access to a building or even not be visible at all (concealed), 2) be safe and reliable as a concrete dam, 3) not require any human actions to enable the protection (would work autonomously, at day or night, even if nobody is in the building) 4) adjust its height to match the advancing water level (adaptive), and, preferably, 5) not use electricity or any other power source for its operation (for the case when electricity is unavailable during flood). The present invention satisfies all these demands. |
After visiting many doctors and trying many therapies, this patient decided to come to our hospital-Shijiazhuang Kidney Disease Hospital for a try. He is a purpura nephritis patient. After 10 days of treatment in our hospital, his condition gets a great improvement and can be released from our hospital.
Before treatment
There are many red spots in his legs and also you can see wound in his legs.
Occult blood 3+
Urine protein 2+
Illness analysis
Henoch-schonlein purpura nephritis is allergy leads to increased blood antibiotics, which will pollute your blood. When your immune system is abnormal, it can remove excess antibiotics, lots of antibiotics will deposit in kidneys and subcutaneous tissue. If polluted blood can not be purified, your condition will relapse again and again. From this aspect, the key in kidney disease treatment is to purify blood. After many years of clinical experiment, our hospital creates Toxin-Removing Treatment to purify blood.
One month later, occult blood becomes negative and urine protein is + -. Red spots and wound in his legs are alleviated greatly. He can leave our hospital.
Toxin-Removing Treatment can not only relieve symptoms, but also repair kidney damage and improve renal function. It is the radical treatment for kidney disease. Patients on dialysis with Toxin-Removing Treatment are possible to reduce dialysis times or even avoid dialysis. But this therapy is only applied in China so foreign patients need to come to China for treatment. If you have interest, you can come over and have a try. |
Q:
RadWindow.Close All() function
I saw there is a Radwindow.CloseAll() function in the RadWindow control for ASP.NET AJAX. Is there a similar function in the RadWindow control for Silverlight?
I am building a Silverlight 4 application with 1 page and multiple childwindows that I converted to RadWindows in code C#. The app works like a wizard type app, on the page the user chooses what he wants to do and then the 1st window would ask for more information then the user clicks next and go to the 2nd window and so on and so on, until the last window that only shows and prints the information the user have just entered/selected in the previous windows. Everything works well. But how do I close all these windows, to go back to the first page, only by clicking on the close button on the last window?
I have disabled the close and rezise buttons on all the windows exept the last window. Al these windows are reliant on each other because of data (form a sql database) purposes.
Please any help.
A:
You have the RadWindowManager : RadWindowManager.Current.CloseAllWindows
|
Erik Mobärg
Erik Mobärg, born 23 June 1997 in Undersåker, Jämtland, is a Swedish Skier who competes in ski cross. He is competing for Edsåsdalens SLK as of 2016. Erik started competing in ski cross at the age of 13.
Also called X ski or ski cross, ski cross was born in the late 1990s in the United States, which was created for the first Winter X Games. Ski cross is a fairly new sport which became an olympic sport at the winter olympic games 2010 in Vancouver.
Early life
Erik was born in Undersåker at the foot of the mountain. With easy access to Åre and the big mountains it was obvious that skiing would become a big part of his life. With a lot of snow each winter and ten pair of skis/snowborads the choice was easy. Before ski cross became a great part of Erik’s life he devoted himself to football, gymnastics, cross country skiing and alpine skiing.
He grew up with his mom, dad, a younger brother and sister. The whole family ski and enjoy the outdoor way of life. Erik's younger brother, David Mobärg, is also a ski cross athlete on the same level. Erik explains that they can push each other as they both train and compete with each other. Their little sister, Linnea Mobärg, is also getting her mind into ski cross and is already showing good results. Erik's parents have always been supportive of him.
Professional career
Erik has been skiing his whole life, but did not specify in any special event until the age of 16 when he attended a Swedish ski high school (Åre Skidgymnasium). Starting off with different sports created the physical foundation he is standing on now. Football, gymnastics, cross country, free skiing and jibbing. Together with skateboarding and biking in the summer.
Erik is competing for Edsåsdalens SLK as of 2016 and the national European team. Erik attends to Åre High School, which is one of the most prestigious skiing high school in Sweden.
The main motivator of Erik is to keep on growing in everything he does. He strives to be the best that he can possible become. Skiing is something that he loves to do and the training gives him the opportunity to become better and better at skiing.
Training
In Summer season, Erik use to train 5 to 6 days a week. He usually does fitness in the morning with leg workouts and upper body workouts. He also works on his balance, agility and coordination to improve his skiing skills. Moreover, in the afternoon he rides mountain bikes, rows and runs.
In the Winter season, the schedule is different. In the morning, Erik skis with his teammates before going to school in the afternoon. After school, he improves his physical conditions with strength and coordination training. He used to ski 4 to 6 days a week.
To stay in shape, Erik tries to eat as little gluten and dairy as possible. He eats a lot of vegetables to stay healthy and give his body all the essential nutrients. For him it is important to eat enough, for which he tries to eat at least six meals a day.
Leg muscles are important to take advantage of everything in the path of the pumping speed, to complete the whole way down. The torso and upper body are also important in the beginning, when it is important to be fast. If you are the fastest in the beginning you have a good chance to win because it can be difficult to overtake one or two riders later.
Injuries
Erik is aware of injuries associated with this industry. He says that he is not scared to get injured but he conducts a lot of training to minimize the risk of injuries. He has been lucky in the sense that he has never had a long break from skiing due to serious injuries. The latest injury that he had was a big concussion in spring 2016. This caused memory lapses. He couldn't tell which day, month or year it was. However, he managed to recover quickly and was back on skis after three weeks without any remaining problems.
In ski cross there are four main injury situations, most of them connected to the jumping situation. Contact with the other skier in the jump, bank turning and roller situations are important.
Endoresment
Erik has his own sponsor that is Elan Skiis. Through the national Swedish team he is also sponsored by GoodYear, Bliz, Bra, Sätila, Tenzon, Idrefjäll and Sportringen.
He uses a lot of different brands for competition and training. He usually trains and competes with Elan skis, Head boots, Tenzon clothing, Hestra gloves, Bliz goggles and Helmet and Swix poles.
Competitions
Erik mostly trains in Åre and Edsåsdalen. At camp he trains a lot in Idre and Hemavan. His favorite park is Bräcke in Åre and his favorite ski cross course is in Val Thorens, France.
He won the Swedish Cup in 2015 with a brilliant score (700 points) above Alexander Lindquist (465 points). With those results he had the opportunity to represent Sweden in his first World Cup at home in Åre in February 2015.
Erik has many greats memories in his skiing career. Few of them are when he came 4th in a European Cup and when he raced his first World Cup. The first gold at a FIS competition is something he will always remember.
Competition statistics
Junior Swedish Championship 2016: 1st place
Junior World Championship, Val Thorens 2016: 8th place.
European Cup, Idre 2016: 4th place.
Swedish cup 2015: 1st place
World Cup Åre 2015: 36th place.
References
Category:1997 births
Category:Living people
Category:Swedish male freestyle skiers
Category:Freestyle skiers at the 2018 Winter Olympics
Category:Olympic freestyle skiers of Sweden |
Cost-effectiveness of microscopy of urethral smears for asymptomatic Mycoplasma genitalium urethritis in men in England.
The objective was to determine whether or not the limited use of urethral microscopy to diagnose asymptomatic and symptomatic non-chlamydial, non-gonococcal urethritis (NCNGU) in men is a cost-effective strategy to avert pelvic inflammatory disease (PID), ectopic pregnancy or infertility in female partners. Outputs from a transmission dynamic model of NCNGU in a population of 16-30 year olds in England simulating the number of consultations, PID cases and patients treated over time amongst others, were used along with secondary data to undertake a cost-effectiveness analysis carried out from a health care provider perspective. The main outcome measure was cost per case of PID averted. A secondary outcome measure was cost per major outcome averted, where a major outcome is a case of symptomatic PID, ectopic pregnancy, or infertility. Offering a limited number of asymptomatic men urethral microscopy was more effective than the current practice of no microscopy in terms of reducing the number of cases of PID with an incremental cost-effectiveness ratio of £15,700, meaning that an investment of £15,800 is required to avert one case of PID. For major outcomes averted, offering some asymptomatic men urethral microscopy was again found to be more effective than no microscopy, but here an investment of £49,900 is required to avert one major outcome. Testing asymptomatic men for NCNGU in a small number of genitourinary medicine settings in England is not cost-effective, and thus by maintaining the current practice of not offering this patient group microscopy, this continues to make savings for the health care provider. |
LS8 cell apoptosis induced by NaF through p-ERK and p-JNK - a mechanism study of dental fluorosis.
To investigate the possible biological mechanism of dental fluorosis at a molecular level. Cultured LS8 were incubated with serum-free medium containing selected concentrations of NaF (0 ∼ 2 mM) for either 24 or 48 h. Subcellular microanatomy was characterized using TEM; meanwhile, selected biomolecules were analysed using various biochemistry techniques. Transient transfection was used to modulate a molecular pathway for apoptosis. Apoptosis of LS8 was induced by NaF treatment that showed both time and concentration dependency. The activity of caspase-3, -8, -9 was found to be increased with NaF in a dose-dependent manner. Western blot revealed that the protein expression of p-ERK and p-JNK were decreased, while the expression of p-P38 was increased. Inhibition of the p-ERK and p-JNK pathways resulted in a similar decrease for caspase-3. During NaF-induced apoptosis of LS8, p-ERK and p-JNK were closely associated with induction of apoptosis, which might be a mechanism of dental fluorosis. |
Q:
¿Cómo puedo modificar mi html desde mi javascript?
Lo que pasa es que estoy intentando acceder a mi input en mi formulario y asignarle los valores que recibo de mi json de php, lo he intentado de diversas formas pero no he podido:
este es el json que estoy recibiendo en r:
{id_producto: "247", nombre_producto: "probando", descripcion_producto: "123", tipo_producto: "10"}
Aquí hago la petición con ajax:
$(".editarProducto").click(function () {
$("#formulario_productos").hide();
var id_producto = $(this).next(".id_producto").val();
var datosproducto = [];
$.ajax({
method: "POST",
url: "index.php",
data: { id_producto: id_producto, funcion: "editarProducto" },
dataType: 'json',
success: function (r) {
$.each(r, function (index, value) {
datosproducto.push(value);
//alert(index + ": " + value);
});
$('#nombre_editar_producto').val(datosproducto[1]);
var valor = $('#nombre_editar_producto').val();
console.log(valor);
},
error: function (r) {
alert("no se han podido obtener los parametros");
}
});
/*var inputNombre = document.getElementById("nombre_editar_producto");
inputNombre.value = "probando";*/
$("#formulario_editar_productos").load();
$("#formulario_editar_productos").show();
});
Y este es el formulario que estoy intentando modificar:
<form action="" id="formulario_productos" method="post" class="text-center" autocomplete="off">
<div class="form-group row">
<label class="col-sm-4 col-form-label">Nombre Producto:</label>
<div class="col-sm-8">
<input required type="text" class="form-control nombre_producto" id="nombre_producto" autocomplete="off" id="nombre_producto" name="nombre_producto" placeholder="Nombre Producto">
</div>
</div>
<div class="form-group row">
<label class="col-sm-4 col-form-label">Reseña Producto:</label>
<div class="col-sm-8">
<input required type="text" class="form-control descripcion_producto" autocomplete="off" id= "descripcion_producto" name="descripcion_producto" placeholder="Descripcion Producto">
</div>
</div>
<div class="form-group row">
<label class="col-sm-4">Tipo de Producto:</label>
<div class="col-sm-8">
<select class="form-control tipo_producto" id="tipo_producto" name="tipo_producto">
{foreach item=tipoProducto from=$arrayTipoProducto}
<option value="{$tipoProducto.id_tipo_producto}">{$tipoProducto.nombre_tipo_producto}</option>
{/foreach}
</select>
</div>
</div>
<div class="col-sm-3 text-center"></div>
<div class="col-sm-6 text-center">
<input type="submit" class="btn btn-success btn-block guardarProductos" onclick="name()" name="guardadoProductos" value="GUARDAR">
</div>
</form>
El input nombre producto y reseña producto son los que estoy intentando reemplazar con los valores del json, agradezco de antemano su ayuda.
A:
Puedes solo acceder con r.nombre_producto para obtener el valor
Ejemplo:
success: function (r) {
$('#nombre_producto').val(r.nombre_producto);
var valor = $('#nombre_producto').val();
console.log(valor);
},
También tienes definido dos id="nombre_producto" en tu input
|
ABC News 7 in Los Angeles is reporting that a passenger aboard Atlantis’ gay cruise through the Caribbean fell overboard earlier this morning.
An ABC7 photographer aboard the Royal Caribbean cruise charter said passengers were awakened Friday morning by an emergency announcement, saying a man was believed to have fallen overboard.
The captain of the Royal Caribbean Allure of the Seas (believed to be the largest luxury cruise ship in the world) said all rescue attempts are being made, but the passenger’s identity or current state and location are unknown. An emergency assembly was called so passengers could be counted.
The incident happened after the ship made a stop in as the ship was approaching Cozumel, Mexico. GayCities/Queerty editorial director Chris Bull is on the cruise with Swish Edition podcaster Scott Wallis, who has provided the following report:
As of 3:30pm, no additional information has been shared with the passengers about the missing person. It was confirmed by the captain that the man did indeed go overboard, based on reviewing security-camera footage. From the information we have, we believe it happened at about 6:45am.
The ship was on it’s way to Cozumel, but docking was delayed while the search continued. At about 11:00am, the captain informed passengers that the search was handed over to the Mexican officials, although Allure of the Seas personal were still a part of the effort.
We docked at about 11am EST and we are scheduled to sail at 8:00pm EST. We are at sea all day tomorrow and arrive to Ft. Lauderdale early Sunday morning.
We hope the passenger is found safe and sound, and will revisit the story as more information becomes available.
I am on the ship. The article is incorrect as to the timing. We were APPROACHING Cozumel this morning from
Coasta Maya yesterday. The announcements started happening around 6:45 AM Eastern Standard Time Friday, February 3rd. We were scheduled to dock in Cozumel at 8 AM EST.
We are still in Cozumel and do not leave until 7:30 EST.
Feb 3, 2012 at 3:46 pm · @Reply ·
CJ
No explanation as to how or why he fell off? At 6:45am he was either up very late… or got up early.
Feb 3, 2012 at 4:27 pm · @Reply ·
Oh, ok.
You can’t just fall overboard on a cruise, you either have to climb/jump over the railing, or be thrown/pushed over.
So either a drunk person sent himself over, or some drunk “friends” did. There’s no way I’d buy anything else.
Feb 3, 2012 at 4:42 pm · @Reply ·
DavyJones
@Satirical Biddy: That’s in pretty bad taste, considering the likely fate of the guy who fell…
Or perhaps it was just a token sacrifice to Poseidon for good weather, don’t all cruise ships do that?
Maybe it was Jesus and he decided to walk home.
Feb 3, 2012 at 6:00 pm · @Reply ·
Hyhybt
I don’t think there’s even such a thing as a gay ship.
(Then again, if they have an orientation at all then they must be lesbians, as they’re traditionally called “she.”)
Feb 3, 2012 at 6:05 pm · @Reply ·
averageguy40
No where does it say it’s a “gay ship”. It’s a gay cruise. Some people should not try to be snarky.
Feb 3, 2012 at 7:25 pm · @Reply ·
Red Meat
So now everything is happening on cruises, the media is so pathetic.
Feb 3, 2012 at 7:46 pm · @Reply ·
CBRad
Maybe one of the drag queens got jealous of another one (because he wanted to be the only big star on the ship) and ran at him intending to push him off (like Barbara Stanwyck would do) and the inended victim stepped out of the way just in time…etc….
Feb 3, 2012 at 10:17 pm · @Reply ·
not another party ship
Well(D)at least(R)he died(U)doing what(G)he likes(S)to do.
Feb 3, 2012 at 10:51 pm · @Reply ·
kendoll
…and now, more news on the hunky gay doctor in arizona…..
Feb 4, 2012 at 12:04 am · @Reply ·
Chris
First Atlantis cruise = last Atlantis cruise.
Disappointing and pretty obnoxious passengers did it in for me. I was shocked to hear that the Caribbean cruise I went on was considered to be “tame” compared to previous Atlantis cruises. Lotsa older men prancing around wearing speedos/age inappropriate Abercrombie graphic tees…trying to recapture their youth (who SHOULD be old enough to know better)….not a good sign when, the first night you are there, you witness a 70 year old + man stumbling towards you when you get out of the elevator and he has crapped himself because he took some type of drug…and it was all over the floor…Feel bad for the poor staff who had to subjected to “crap” such as this… Stereotypes everywhere. To be fair, I am not sure that I am a “cruise person”, let alone a “gay cruise person”, but I found the parties in the evening to be depressingly/numbingly too circuit partyish. And just little things that IRKED me…such as, converting the sports bar into a video lounge that played only “GLEE” episodes round the clock…REALLY????? Lots of the guys seemed to never leave the ship (how pathetic is that?). They just hole themselves up for the week and party. Just not what I was hopng for but unfortunately, got in the end.
Feb 4, 2012 at 12:30 am · @Reply ·
Daez
@Chris: As a veteran cruiser on Royal Caribbean. I can honestly say that the cruise line itself is awesome. I’ve never done, nor wanted to do a gay cruise simply for the reasons that you have stated. Also, the fact that an Atlantis cruise is three times what the cruise normally costs was just a complete turn off. Royal Caribbean is gay friendly enough on their regular cruises that there is no reason to surround yourself with a bunch of people that represent the worst of what the community has to offer.
Feb 4, 2012 at 4:35 am · @Reply ·
Mike UK
the guy who “fell, jumped, pushed” or whatever was British, they’re reporting it on the BBC.
Feb 4, 2012 at 6:56 am · @Reply ·
Richard L
She probably fumbled her geritol or Viagra bottle and was trying to catch it wearing her sailor suit and slipped…
Feb 4, 2012 at 9:01 am · @Reply ·
John
I just got off of The Allure with Atlantis. It is interesting to see how much different rumor has spread about this incident. I have done a fair bit of journalism over the years and I will add what I know, but be sure that I have NOT substantiated any of this. It just seems much more right anything I have read anywhere. Of what I heard on the ship this seems most true: The day of the incident I had lunch next to the man who reported the fall. I understand that only one person reported the fall and I know this was the name of guy because he was called to guest services shortly after the incident. He did not SEE the man fall overboard. He was smoking on his balcony early morning and he heard a splash. The smoking fellow was, I believe, on 14 and the man jumped from 11. He heard the splash and looked down and saw a man floating face up in the water. He then reported the incident immediately. The entire ship was then mustered to confirm that someone was missing and this took about 75 minutes. I then later heard from a person I know on staff that ship cameras show the man taking a “dive” off of his balcony. This fellow may have been distraught from something that happened on board or he may have had a grand suicide plan that began when he booked the cruise. We will never know unless the rumor about a suicide note are true. It is very sad, but the allure of The Allure may attract people with such delusions. Again, I cannot completely substantiate any of this, but it is what I learned on board. It was an especially sad day for the ships crew. The Captain’s voice seemed to be shaking during his announcements about the incident, and a crew person who assisted in our muster area teared up when he heard confirmation of the man overboard.
Feb 5, 2012 at 11:52 am · @Reply ·
John
6th Atlantis Cruise = 7th, 8th, 9th, 10th…
I just posted a comment with information about the death on Allure, but after re-reading some of the previous entries I have a bit more to write. My husband and I are in our early 50’s and have been together going on 20 years. This is our 6th Atlantis cruise, and past ones have been in Asia, from New Zealand to Australia, and to Western Mexico as well as the Caribbean. We travel often and have stayed in everything from $10 huts in Southeast Asia to the best hotels in the world’s great cities. We have also taken other cruises on the “high end” lines like Silver Seas. But as gay men, after all these travel experiences the best we have had are the weeks we have spent on Atlantis. The environment is so positive and we have met many good friends on these cruises. We have also observed the old men wearing tight speedos, but also actually had the pleasure of meeting and talking with some. It might occur to others that some of these gentleman had worn these “outfits” years ago and were simply reveling in bygone fun in a huge and safe environment – the decades of their youth were not very safe for them. We spoke to one who laughed that he could still get the swimsuit on. Others seeing this display might bring in their own considerable prejudices and see something sad and inappropriate. They might be irked that seeing such behavior spoils their view. Also, as one writer puts it, does this ship and its passengers represent the worst of our community? Really? Most the people we have met on Atlantis cruises have been well established in career and overachievers. We met one older man this week, and after a lunch conversation exchanged cards only to realize he was a renowned international artist. Another was a legendary figure from decades in television producing. This is our typical experience with the younger and older people that we meet on Atlantis. Many are having a week of fun away from successful positions. And, yes, Royal Caribbean is gay-friendly on all its cruises, but their normal cruise compared to an Atlantis (or RSVP) is complete apples and oranges. I know because the ships crew always tell me this. They tell us that their week with a gay cruise is like vacation, with by far the most courteous and, of course, their best tipping guests. Sure I see the crazy parties, especially on the Caribbean cruises, and some of the mess that comes with it. But this is a small part of the Atlantis cruise environment on its many sailings around the world. A person’s travel experience is going to be shaped by their own internal view of others, as well as themselves. I actually find people on gay cruises to be having a blast while those on regular cruises seem strangely grumpy. But then again, that might be a prejudice I bring to bear…
Feb 5, 2012 at 1:53 pm · @Reply ·
dave
We were on the ship and I would add that the diversity of the passengers by age, race, nationality, profession, physical condition, handicaps andonand on was one of the best things about it. If you think this is the worst of gay life all I can say is you Ned to get, out more – it was exceptional.
Feb 6, 2012 at 8:33 pm · @Reply ·
Brad
@Chris: OH did poor Chris have to see someone dressed inappropriately? I am sure you are a total fashion maven . You sound like you have caught the intolerance bug. You are better off at your snooty cocktail parties where your kind can’t think of anything else to talk about but what they do. Stay home where you are always perfect.
Feb 7, 2012 at 10:03 am · @Reply ·
Brad
@Daez: How can you say that when you have never been on one? I have been on dozens of Atlantis cruises. I have also been on a few higher end straight cruises. On one there were a few of us gathered in one end of the pool and the mothers actually called there children out of the pool! If that is the kind of treatment you enjoy have at it. The rest of us “worse the community have to offer” are better off without you. |
When I try to flash a rom in first memory bank of Evermind Megacart from MegaCD2 I get an error meseage ERASE ERROR E10100010. I have been using megacart for 2 years without problems, now I can't load 16 or 24Mb games because of that, that's a disgusting mess. Please anyone can help me? Do you know how to fix it? or who knows to do that? please somebody reply me, if the item is definitively broken I want to know it, thanks. Best regards.
You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot vote in polls in this forumYou can attach files in this forumYou can download files in this forum |
1. Field of the Invention
This invention relates to a catalytic converter for purifying exhaust gas discharged from an internal combustion engine for an automotive vehicle, and more particularly to improvements in the catalytic converter having a honeycomb monolithic catalytic element whose catalyst carrier is formed of metallic sheets.
2. Description of the Prior Art
A variety of catalytic converters for purifying exhaust gas from automotive engines have been proposed and put into practical use. One of them is disclosed in Japanese Patent Provisional Publication No. 54-13462 and will be discussed with reference to FIGS. 7A and 7B. A catalytic converter shown in FIGS. 7A and 7B includes a casing 54 disposed in an exhaust pipe of an engine and houses therein a honeycomb monolithic catalyst 51 whose carrier is formed of metallic sheets. The carrier is formed by spirally winding a flat metallic sheet 52 and a corrugated Metallic sheet 53 upon putting one upon another. The thus formed carrier of the honeycomb type carries or supports catalyst on the surface of the metallic sheets 52, 53, thereby forming a plurality of gas passages 51a. The honeycomb monolithic catalyst 51 is tightly disposed in the casing 54 in such a manner that the outer peripheral surface of the catalyst 51 is in contact with the Inner peripheral surface of the casing 54. Exhaust gas from the engine is introduced into the honeycomb monolithic catalyst 51 to pass through the gas passages 51a, so that hydrocarbon, carbon monoxide and the like are oxidized to purify exhaust gas from the engine.
However, difficulties have been encountered in the thus configurated catalytic converter in which the outer peripheral surface 51b of the honeycomb monolithic catalyst 51 is in sliding contact with the inner peripheral surface 54c of the casing 54 during assembly of the catalytic converter and under vibration due to vehicle operation, so that catalyst on the outer peripheral surface of the catalyst is peeled off and scattered to ambient air. Additionally, transmission of reaction heat generated in the catalyst 51 to the casing 54 is suppressed under existence of the layer of the catalyst in contact with the inner peripheral surface of the casing. Accordingly, the honeycomb monolithic catalyst tends to rise in temperature, thereby deteriorating the durability of the catalyst. |
Amid spat with ICC, Habre trial raises hope for African justice
DAKAR/THE HAGUE (Reuters) - With many Africans denouncing the International Criminal Court as 'white man's justice', the trial of Chad's former dictator in Senegal on charges of crimes against humanity offers the continent a chance to show it can hold its leaders to account.
The start of the trial of Hissene Habre on Monday concludes a 15-year battle by victims and rights campaigners to bring the former strongman to justice in Senegal, where he fled after being toppled in a 1990 coup.
Habre, backed by Washington as a bulwark against Libya's Muammar Gaddafi in the 1980s, is blamed by rights groups for widespread torture and the killing of up to 40,000 people during the eight years he ruled his impoverished central African nation.
Though African presidents have been tried in their own countries for crimes committed in office, Habre's trial marks the first time that a court in one country has prosecuted the former ruler of another on rights charges, according to Human Rights Watch.
It comes a month after Sudanese President Omar al-Bashir's escape from an international arrest warrant in South Africa marked a new low in relations between Africa and the International Criminal Court (ICC) in The Hague.
The ICC was embraced by many African governments when it was set up in 2002, but attitudes toward the largely European-funded court have cooled after it has indicted only Africans, prompting many to label it a Western-controlled, neo-colonial institution.
"This is a chance to show that an African court can deliver justice for African victims for crimes committed in Africa," said Reed Brody of Human Rights Watch (HRW), who has pursued the Habre case since 1999.
"It's one thing to complain about having abusive African presidents sent to The Hague. It's another thing to show that they can be prosecuted and get a fair trial here in Africa."
The proceedings, due to last around 3 months, will be heard by a Special African Chamber (CAE) created in 2013 by Senegal and the African Union.
'I MADE A VOW TO GOD'
The case turns on whether Habre, feted at the White House in 1987 by President Ronald Reagan after expelling Libyan forces from Chad, ordered the large-scale assassination and torture of political opponents and ethnic rivals.
A 1992 Chadian Truth Commission accused Habré's government of up to 40,000 political murders and systematic torture, mostly by his feared intelligence police, the Documentation and Security Directorate (DDS).
Habre and his lawyers intend to boycott the trial, saying there has been no due process. They say the 72-year-old has a heart condition, though the court could still oblige him to attend.
"In this affair from the outset it has been Hissene Habre is guilty and let's find evidence that justifies this," said his lawyer Ibrahima Diawara. "None of the victims, if we are calling them that, ever saw Hissene Habre. They never met him."
HRW says its investigation in 2001 unearthed thousands of documents in the abandoned DDS headquarters updating Habre on the status of detainees. A court handwriting expert confirmed margin notes on one document to be Habre's.
Whereas the Bashir case was presented to the ICC by the U.N. Security Council, Habre's prosecution is built on campaigning by thousands of victims and Chadian lawyer Jaqueline Moudeina, who faced repeated threats.
Souleymane Guengueng, a former accountant who spent two years in Habre's prisons, secretly compiled evidence of crimes after his fall. The 66-year-old is among some 100 victims due to testify at the trial and wants to look Habre in the eye.
"In prison when I saw my colleagues dying and the enormous suffering they inflicted on us ... I made a vow to God that if he kept me alive, I would not let these things pass in silence," he said.
HIGH STANDARDS
A successful trial of Habre, conducted to high standards and leading to a credible verdict, would strengthen African countries' case that they are best placed to try their own.
Yet the establishment of the court in Senegal was due partly to prodding from the ICC's European backers. The ICC itself can only try crimes committed after it was established.
After Habre was detained in 2000, Senegal's courts ruled they were not competent to try a case from another country.
Habre wielded considerable influence within then-President Abdoulaye Wade's government. Two of his lawyers were ministers.
Finally, an investigation by a Belgian judge forced the issue back onto the agenda. An African Union summit in 2007 rejected an extradition request from Belgium and mandated Senegal to try Habre.
Even after Senegal approved 'universal jurisdiction' enabling it to prosecute rights crimes committed elsewhere, Wade's government dragged its heels until Belgium secured a 2012 ruling from the U.N.'s highest court ordering Senegal to put Habre on trial or extradite him. The new government of President Macky Sall in Senegal made the prosecution a priority. |
A Republican strategist who advised Sen. John McCain John Sidney McCainKelly's lead widens to 10 points in Arizona Senate race: poll COVID response shows a way forward on private gun sale checks Trump pulls into must-win Arizona trailing in polls MORE (R-Ariz.) during his 2008 presidential bid said late Wednesday that President Trump’s firing of FBI Director James Comey constitutes “an enormous abuse of power.”
During an appearance on MSNBC’s “The 11th Hour,” Steve Schmidt said Comey's firing is both “unprecedented” and “shocking.”
“Any Republican member of Congress who takes the president's, his spokespeople’s assertions, that this action occurred because Director Comey was unfair to [Democratic presidential nominee] Hillary Clinton Hillary Diane Rodham ClintonBarr criticizes DOJ in speech declaring all agency power 'is invested in the attorney general' Virginia Democrat blasts Trump's 'appalling' remark about COVID-19 deaths in 'blue states' The Hill's Campaign Report: Biden asks if public can trust vaccine from Trump ahead of Election Day | Oklahoma health officials raised red flags before Trump rally MORE is either a fool, or they have so lost sight in this era of tribal politics their responsibilities to the country that they’ve become faithless to their oaths,” Schmidt said.
Schmidt said he agreed with a former colleague who suggested the country may need a Democratic Congress to “protect the national security of the United States in 2018.”
ADVERTISEMENT
Schmidt also listed several Republican senators whom he said “give you hope that the country comes first,” referencing the lawmakers’ “real dismay” over Russia’s attempted to meddle in the United States presidential election last year. The list included Sens. Lindsey Graham Lindsey Olin GrahamSenate Republicans signal openness to working with Biden Loeffler calls for hearing in wake of Netflix's 'Cuties' Quinnipiac poll shows Graham, Harrison tied in South Carolina Senate race MORE (R-S.C.), Richard Burr Richard Mauze BurrRep. Mark Walker says he's been contacted about Liberty University vacancy Overnight Defense: Trump rejects major cut to military health care | Senate report says Trump campaign's Russia contacts posed 'grave' threat Senate report describes closer ties between 2016 Trump campaign, Russia MORE (R-N.C.), Ben Sasse (R-Neb.) and McCain.
“This is an extraordinary moment in the history of the modern presidency and a very serious one,” said Schmidt. |
topic Samsung Beam in Note8https://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1119636#M16532
<P>Is it just me or any one else can't use the Beam function?</P>Sun, 23 Feb 2020 21:29:03 GMTuserehgpxPQVVy2020-02-23T21:29:03ZSamsung Beamhttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1119636#M16532
<P>Is it just me or any one else can't use the Beam function?</P>Sun, 23 Feb 2020 21:29:03 GMThttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1119636#M16532userehgpxPQVVy2020-02-23T21:29:03ZRe: Samsung Beamhttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1119645#M16533
<P>Me too</P>Sun, 23 Feb 2020 21:42:08 GMThttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1119645#M16533Samsung_odKKuLB2020-02-23T21:42:08ZRe: Samsung Beamhttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1119720#M16534
<P>Do you have it on?</P><OL><LI>Settings -> Connections</LI><LI>NFC and payment</LI><LI>Ensure tht NFC is on</LI><LI>Ensure that "Android Beam" is on</LI></OL>Sun, 23 Feb 2020 22:57:37 GMThttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1119720#M16534LongHiker2020-02-23T22:57:37ZRe: Samsung Beamhttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1169370#M16853
<P>I have no idea as to how or even what benefits that it would bring me at all after using the feature. Any n all information would be nice to receive on it as well as NFC </P>Thu, 26 Mar 2020 19:42:14 GMThttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1169370#M16853Samsung_Zx6wThC2020-03-26T19:42:14ZRe: Samsung Beamhttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1169401#M16854
<P>Samsung beam is a feature that allows you to just immediately transfer files and photos quickly, NFC (Near field communication) has now become for payment methods with your phone. However, large data transfer between samsung and Samsung will use wifi direct and it is very quick. </P>Thu, 26 Mar 2020 19:48:03 GMThttps://us.community.samsung.com/t5/Note8/Samsung-Beam/m-p/1169401#M16854Samsung5172020-03-26T19:48:03Z |
State’s sod farms manage cold, wet and then hot, dry
Written by Tunica Times
Thursday, 02 September 2010 14:59
The lingering recession continues to impact Mississippi’s turfgrass industry with total sod acreage down as a portion has been switched to row crop production until the economy improves.Wayne Wells, Mississippi State University Extension Service turf specialist, said the state has about 4,500 acres of turf and about 50 sod producers. The largest producers each have about 300 to 500 acres of turf production.“Sod production hinges on construction, so with new home sales at their slowest since 1963, our sales are down some, too,” Wells said. “Many of our larger sod producers have some diversity in their farming operations, and when they saw home construction slowing, they put some of their acreage into soybeans and corn.” |
1. Introduction {#sec1-molecules-23-03169}
===============
*Salvia* genus (*Salvia* spp.), belonging to the Lamiaceae family, comprises more than 900 species that are used for distinct purposes, including the culinary and cosmetic industries or in traditional medicines due to their claimed health benefits \[[@B1-molecules-23-03169],[@B2-molecules-23-03169]\]. Among them, *Salvia officinalis* L., i.e., "common sage" or "Dalmatian sage", is widely cultivated. These plants usually grow 30--70 cm tall, with a woody stem, whitish beneath and grayish-green above, and with purple-blue flowers up to 3 cm long appearing from early summer to early autumn \[[@B1-molecules-23-03169]\]. Due to its worldwide spread, *S. officinalis* has been the most monitored species in relation to the biological potential of the whole plant as well as of its essential oils and polar extracts. For example, promising results were obtained in clinical studies with aqueous or ethanolic extracts of this *Salvia* species when focused on memory and cognitive functions, pain, and the biochemical profile of glucose and lipids \[[@B3-molecules-23-03169]\]. In addition, in vivo assays in an ear edema induced by croton oil model pointed out the good anti-inflammatory activity of hydroethanolic extracts \[[@B4-molecules-23-03169]\]. Indeed, in vitro experiments demonstrated that its ability to inhibit 5-lipoxygenase activity \[[@B5-molecules-23-03169]\] and to reduce the levels of interleukin 8 (IL-8) \[[@B6-molecules-23-03169]\] might be based on these anti-inflammatory properties. Moreover, several authors also reported the benefits of *S. officinalis* polar extracts towards cell protection in distinct cell-based studies such as in HepG2, HeLa and Caco-2 cell lines, evidencing their possible usage as DNA-protective agents \[[@B7-molecules-23-03169],[@B8-molecules-23-03169]\]. Notably, polar extracts from *S. officinalis* (aqueous, methanolic, ethanolic, and hydroalcoholic) have also been proven to have protective effects against oxidative events \[[@B9-molecules-23-03169],[@B10-molecules-23-03169]\] or oxidative stress-related processes \[[@B11-molecules-23-03169],[@B12-molecules-23-03169]\], as demonstrated in *in chemico*, cell-based or in vivo models \[[@B5-molecules-23-03169],[@B10-molecules-23-03169],[@B11-molecules-23-03169],[@B12-molecules-23-03169],[@B13-molecules-23-03169],[@B14-molecules-23-03169],[@B15-molecules-23-03169],[@B16-molecules-23-03169],[@B17-molecules-23-03169]\].
In addition to *S. officinalis*, other widely distributed sage species such as *Salvia miltiorrhiza* Bge. and *Salvia hispanica* L. were highlighted by their richness in bioactive compounds and their potential health-promoting properties \[[@B1-molecules-23-03169],[@B2-molecules-23-03169],[@B18-molecules-23-03169],[@B19-molecules-23-03169],[@B20-molecules-23-03169]\]. Still, many less-distributed species, including *Salvia greggii* A. Gray and *Salvia elegans* Vahl., remain poorly studied regardless of their broad use for culinary and medicinal purposes. *S. greggii*, also known as "autumn sage", is originated from Mexico and Texas, although it is currently spread in southwestern United States and Arizona and cultivated in some parts of the world. It grows as a soft, evergreen shrub taller than about 1.2 m, and, similarly to *S. officinalis*, its leaves are green and smooth \[[@B21-molecules-23-03169]\]. Its flowers, which appear between spring to autumn, can be of different colors (red, pink, purple, white or orange) and are characterized by an intense aroma and abundant nectar. In turn, *Salvia elegans* is a species native of Mexico and is currently grown in the United States, Canada, and other regions of the world \[[@B22-molecules-23-03169]\]. It grows as a sub-bush of 1--1.5 m high with a pineapple aroma and flavor, opposite leaves and oval, hairy, elliptic, pale green, and ruby red flowers \[[@B23-molecules-23-03169]\].
*S. greggii* and *S. elegans* are widely used in traditional medicine, particularly in the form of infusions or decoctions, to treat digestive and oral problems (*S. greggii*) \[[@B1-molecules-23-03169]\] or to lower blood pressure and combat central nervous system disorders for anxiety and insomnia (*S. elegans*) \[[@B23-molecules-23-03169],[@B24-molecules-23-03169],[@B25-molecules-23-03169]\]. However, as far as we know, the phytochemical composition and beneficial effects of polar extracts, in particular those related to traditional usage (aqueous), remain unexplored. Regardless of this, *S. greggii* has been screened for terpenic compounds \[[@B26-molecules-23-03169],[@B27-molecules-23-03169]\], and the antigerminative activity of its essential oils \[[@B28-molecules-23-03169]\], while aspects related to polar extracts have not yet been studied. In turn, polar extracts from *S. elegans* have been the focus of some attention, and, in particular, hydroalcoholic extracts have been shown to exhibit antihypertensive, antidepressant, and anxiolytic effects \[[@B23-molecules-23-03169],[@B24-molecules-23-03169],[@B25-molecules-23-03169]\] in in vitro models. Yet, to our knowledge, bioactive constituents of *S. elegans* polar extracts and their ability to counteract oxidative-stress-related events have not been previously elucidated.
Hence, the present study aimed to elucidate the phenolic composition and biological effects of *S. elegans* and *S. greggii* decoctions (mainly focusing on their potential antioxidant activity and inhibitory capacities towards key metabolic enzymes with impact in diabetes and obesity), while comparing the findings to those of the well-known *S. officinalis* species.
2. Results and Discussion {#sec2-molecules-23-03169}
=========================
2.1. Phytochemical Composition {#sec2dot1-molecules-23-03169}
------------------------------
The decoction yields of the three *Salvia* species were approximately 20%, with slightly higher levels observed for *S. elegans* and *S. greggii* in comparison to *S. officinalis* (22.1 ± 2.2% and 22.2 ± 1.5% vs. 19.3 ± 2.3%, respectively). Consistent with their prevalence in *Salvia* plants \[[@B1-molecules-23-03169],[@B2-molecules-23-03169],[@B29-molecules-23-03169]\], caffeic acid derivatives (particularly rosmarinic acid) were dominant compounds in *S. officinalis*, *S. elegans*, and *S. greggii* decoctions, accounting for about one third of the global identified phenolic species ([Table 1](#molecules-23-03169-t001){ref-type="table"}, [Figure 1](#molecules-23-03169-f001){ref-type="fig"}, [Figure S1](#app1-molecules-23-03169){ref-type="app"}). Nevertheless, significant differences could be found between extracts. *S. elegans* was distinguished by its richness in caffeic acid derivatives, namely rosmarinic acid (peak 36, \[M − H\]^−^ at *m*/*z* 359→161, 179), caffeoylrosmarinic acid (peak 39, \[M − H\]^−^ at *m*/*z* 537→493, 359) and salvianolic acid B (peak 27, \[M − H\]^−^ at *m/z* 717→519), which overall represented approximately 70% of the total quantified phenolics, while the aqueous extract of *S. greggii* was characterized by high percentages of glycosidic flavones, mostly consisting of luteolin-*O*-hexoside and apigenin-*C*-hexoside (peaks 24 and 20, \[M − H\]^−^ at *m*/*z* 447 and 431, respectively), representing 33% and 20%, respectively, of total quantified phenolic compounds. Moderate amounts of luteolin-*C*-hexoside (peak 15, \[M − H\]^−^ at *m*/*z* 447→327, 357), quercetin-*O*-hexoside (peak 22, \[M − H\]^−^ at *m*/*z* 463→ 301) and two coumaric acid derivatives (peaks 6 and 8, \[M − H\]^−^ at *m*/*z* 295 and 265, respectively) have also been detected in this extract. Interestingly, none of these compounds were detected in the decoctions of the two other species. Hence, globally, the extracts obtained from *S. elegans* and *S. greggii* species were clearly distinguishable from that of the *S. officinalis,* which was dominated by the *O*-hexuronic form of apigenin (\[M − H\]^−^ at *m*/*z* 445→269, 48.4 ± 1.3 mg/g extract) and scutellarein (\[M − H\]^−^ at *m*/*z* 461→285, 13.4 ± 0.6 mg/g extract), in addition to rosmarinic acid (28.3 ± 0.6 mg/g extract). Note that the predominance of apigenin-*O*-glucuronide and rosmarinic acid in this decoction is coherent with the abundance of these two constituents previously reported for polar extracts of this species (e.g., ethanol, methanol, aqueous, hydroalcoholic) \[[@B2-molecules-23-03169],[@B30-molecules-23-03169]\]; however, it is worth noting that this is the first time that scutellarein-*O*-glucuronide was detected in *S. officinalis* extracts, while the previous studies only described its aglycone form.
2.2. Biological Activities {#sec2dot2-molecules-23-03169}
--------------------------
### 2.2.1. Antioxidant Activity {#sec2dot2dot1-molecules-23-03169}
The antioxidant ability of the aqueous extracts obtained from the *Salvia* plants were evaluated in regard to their ability to scavenge free radicals, namely DPPH^•^ (2,2-diphenyl-1-picrylhydrazyl), superoxide (O~2~^•--^), nitric oxide (NO^•^), and peroxyl (RO~2~^•^), and their capacity to reduce Fe^3+^ to Fe^2+^. Furthermore, all the extracts were screened for their potency in inhibiting xanthine oxidase.
Globally, the *S. elegans* decoction was more promising than *S. greggii* in regard to its ability to scavenge free radicals and to reduce Fe^3+^ ([Table 2](#molecules-23-03169-t002){ref-type="table"}). It presented EC~50~ values about 1.8--2.5 lower than the latter in DPPH^•^, NO^•^, O~2~^•--^, and reducing power tests, and a tendentially higher ability to capture RO~2~^•^. Notably, the *S. elegans* extract also presented tendentially better antioxidant potential than *S. officinalis*, with tendentially reduced EC~50~ values being registered for NO^•^, O~2~^•--^, and reducing power tests, and even three times lower for the DPPH^•^ assay. In addition, one must highlight that the potency of *S. elegans* decoction to counteract DPPH^•^ and NO^•^ was 0.6- and 2.3-fold that of the ascorbic acid, respectively. The only exception was observed for the oxygen radical absorbance capacity (ORAC) assay for which the result observed for *S. officinalis* was better than that for *S. elegans*, although it was not statistically significant.
[Table 3](#molecules-23-03169-t003){ref-type="table"} summarizes the correlation coefficients between the amounts of classes of phenolic components found in the *Salvia* decoctions (caffeic acid and derivatives, coumaric acid derivatives, flavones and flavonols) and the data from the distinct biological experiments. According to these results, it is possible to suggest that the superior antioxidant activity of the *S. elegans* decoction is strongly associated with its richness in caffeic acid and derivatives, since correlation factors in DPPH^•^, reducing power, NO^•^, and O~2~^•--^ assays were 0.801, 0.948, 0.986, and 0.844, respectively.
The comparison of the herein gathered data with that previously reported for other solvent-extracts or other *Salvia* species is not an easy task, since methodologic adaptations (e.g., radical precursor concentrations and their producing conditions) cause inevitable changes in EC~50~ values. This difficulty can be partly overcome by the comparison of the extract's potencies with that of reference compounds. Unfortunately, this approach is often not addressed by the authors. Moreover, there is no universal reference compound for a specific antioxidant assay, and variations in the selected standards are frequent within literature. Regardless of that, one must note that *S. officinalis* polar extracts have been commonly used as a reference for the assessment of antioxidant properties of other less-investigated plants \[[@B14-molecules-23-03169],[@B15-molecules-23-03169]\], showing EC~50~ values in the range of 2.0 to 233.0 μg/mL for the DPPH^•^ assay \[[@B5-molecules-23-03169],[@B7-molecules-23-03169],[@B13-molecules-23-03169],[@B14-molecules-23-03169],[@B15-molecules-23-03169],[@B31-molecules-23-03169]\]. Other ethanolic, methanolic, or aqueous extracts of *Salvia* origin, including those obtained from *Salvia amplexicaulis* \[[@B32-molecules-23-03169]\], *Salvia ringens* \[[@B33-molecules-23-03169]\], *Salvia verbenaca*, *S. sclarea* \[[@B34-molecules-23-03169]\], *Salvia argentea* \[[@B15-molecules-23-03169]\], and *Salvia nemorosa* \[[@B35-molecules-23-03169]\], have been claimed to be good DPPH^•^ scavengers as well, with antioxidant potentials that, in some cases, equal those of the standard compounds (ascorbic acid, butylated hydroxytoluene---BHT, or butylated hydroxyanisole---BHA). Hence, one might conclude that, in agreement with other studies reported for polar extracts of several *Salvia* species, *S. officinalis, S. elegans*, and *S. greggii* decoctions have a high ability to scavenge DPPH^•^, with *S. elegans* showing the most promising activity, followed by *S. greggii* and *S. officinalis.*
Polar extracts obtained from *Salvia* plants have also been previously screened for antioxidant abilities through other assays, although not as frequent as for DPPH^•^. In this context, Hamrouni-Sellami et al. \[[@B36-molecules-23-03169]\] reported that the Fe^3+^ reducing ability of *S. officinalis* methanolic extracts was 6.5-fold less that of ascorbic acid, being in agreement with our results which also pointed to good effectiveness for decoctions of the same species. In general, our results also indicate that the three sage species herein studied possess promising NO^•^ scavenging capacities, as all the extracts had a lower EC~50~ compared to ascorbic acid. Moreover, their activity seems to be superior to that described by Chen and Kang \[[@B37-molecules-23-03169]\] for the methanolic extracts of *Salvia plebeia* (EC~50~ = 216 ± 2.9 μg/mL), albeit that the absence of a reference compound in that study hampered solid conclusions. Furthermore, in our study, *S. elegans* and *S. officinalis* decoctions showed good O~2~^•--^ scavenging capacity, also suggesting that these extracts might be more active than the methanolic extracts of *Salvia splendens* (EC~50~ = 527 μg/mL) \[[@B38-molecules-23-03169]\]. Likewise, decoctions of *S. officinalis*, *S. elegans*, and *S. greggii* showed high capacity to scavenge RO~2~^•^ (336--404 μM TE/mg), which was significantly superior to those previously reported for the aqueous and ethanolic extracts of *S. officinalis* (1143 and 2535 μM TE/g) and that other *Salvia* species (279--4735 μM TE/g).
Phenolic compounds have been previously reported to counteract the activity of xanthine oxidase (XO) \[[@B39-molecules-23-03169],[@B40-molecules-23-03169]\], i.e., the enzyme that catalyzes the oxidation of hypoxanthine to xanthine, and further catalyzes xanthine to uric acid with a concomitant production of O~2~^•--^, thus contributing to increment of oxidative stress events in cells. As can be observed in [Table 2](#molecules-23-03169-t002){ref-type="table"}, the decoctions of the three *Salvia* species could effectively inhibit the activity of XO, albeit being less potent than the commercial drug allopurinol (EC~50~ = 55.1--71.8 µg/mL for *Salvia* extracts vs. 0.09 ± 0.01 µg/mL for allopurinol, respectively). Among the extracts, the most powerful was that from *S. officinalis*, a fact that could be related to its richness in apigenin glucuronide or in other flavones (i.e., scutellarein and luteolin glycosides), since these compounds have been described as strong inhibitors of this enzyme \[[@B41-molecules-23-03169],[@B42-molecules-23-03169],[@B43-molecules-23-03169],[@B44-molecules-23-03169]\]. Although the individual effect of the compounds has not been tested by us, the correlation coefficients between the antioxidant assays and the main compounds of each aqueous extract are in good agreement ([Table 3](#molecules-23-03169-t003){ref-type="table"}). In XO inhibitory assay, the flavones content of the *S. officinalis* decoction was highly correlated (0.901) with its XO inhibition capacity.
### 2.2.2. Metabolic Enzyme Activity {#sec2dot2dot2-molecules-23-03169}
α-Glucosidase, α-amylase and pancreatic lipase are key digestive enzymes involved in the metabolism of carbohydrates and lipids, which make them important targets for therapeutic control of diabetes and obesity. α-Amylase and α-glucosidase catalyze the hydrolysis of carbohydrates into simple sugars, thus their inhibition retards the digestion of starch and oligosaccharides contributing to the reduction of postprandial increase in plasma glucose levels. In turn, lipase inhibition decreases the digestion of dietary triglycerides, hence reducing the levels of free fatty acids and monoacylglycerols in the intestinal lumen \[[@B40-molecules-23-03169],[@B45-molecules-23-03169],[@B46-molecules-23-03169]\]. In this study, the ability of *S. officinalis, S. elegans*, and *S. greggii* decoctions to inhibit the activity of these three digestive enzymes were assessed through *in chemico* models.
Notably, the inhibitory activities of the three *Salvia* extracts against α-glucosidase were very promising, especially for *S. elegans* and *S. officinalis* (EC~50~ = 36.0 ± 2.7 µg/mL and 71.2 ± 5.0 µg/mL, respectively), demonstrating activities of 9- and 4-times that of the antidiabetic pharmaceutical drug, acarbose, respectively ([Table 4](#molecules-23-03169-t004){ref-type="table"}). Moreover, despite being less effective than *S. elegans* and *S. officinalis*, *S. greggii* decoction was as effective as acarbose. Hence, our results suggest that the decoctions of *S. elegans*, *S. officinalis*, and *S. greggii* could serve as natural antidiabetic and anti-obesity agents to help in the control of glucose levels through the control of α-glucosidase activity. This hypothesis is also consistent with previous studies that reported identical results for polar extracts of *Salvia* against this enzyme, e.g., hydroethanolic extracts of S. *officinalis* (EC~50~ value of 69.7 µg/mL) \[[@B47-molecules-23-03169]\] and methanolic extracts of *Salvia acetabulosa, S. nemorosa*, and *Salvia chloroleuca* (EC~50~ = 76.9 µg/mL, EC~50~ = 19 µg/mL and EC~50~ = 13.3 µg/mL, respectively) \[[@B35-molecules-23-03169],[@B48-molecules-23-03169],[@B49-molecules-23-03169]\]. In vivo experiments have even demonstrated that the administration of a daily dose of *S. officinalis* methanolic extracts (500 mg/kg body weight) to alloxan-induced diabetic rats caused the inhibition of α-glucosidase activity comparable to that of the administration of acarbose (20 mg/kg bw) \[[@B45-molecules-23-03169]\].
The inhibitory capacity of polar extracts of *Salvia* species towards α-glucosidase have been mostly correlated with their phenolic constituents. In fact, Chen and Kang \[[@B37-molecules-23-03169]\] reported that the inhibition of this enzyme by *S. plebeia* methanolic extracts increased proportionally to their total phenolic content. Moreover, Kocak et al. \[[@B50-molecules-23-03169]\] reported that aqueous and methanolic extracts of *S. cadmica*, both rich in rosmarinic acid, luteolin, and apigenin, had high inhibitory effects towards α-glucosidase and α-amylase. Moreover, several phenolic compounds isolated from *S. miltiorrhiza*, namely, tanshinone IIA, rosmarinic acid, rosmarinic acid methyl ester and salvianolic acid C methyl ester, were reported to be stronger inhibitors of α-glucosidase than acarbose (EC~50~ = 0.042--0.23 μM and EC~50~ = 5.8 μM, respectively) \[[@B51-molecules-23-03169]\]. The flavonoid compounds luteolin-7-*O*-glucoside, luteolin-7-*O*-glucuronide, and diosmetin-7-*O*-glucuronide, isolated from the aerial parts of *S. chloroleuca*, also showed potent α-glucosidase inhibitory effects with EC~50~ values of 18.3, 14.7, and 17.1 μM, respectively, exhibiting an inhibitory effect close to that of acarbose (EC~50~ = 16.1 μM) \[[@B49-molecules-23-03169]\]. Note that rosmarinic acid and caffeoyl rosmarinic acid are two major phenolic components in *S. elegans* decoctions and, based on the mentioned bibliographic data, it is feasible to hypothesize that they might be important contributors for the higher inhibitory ability of this extract compared to the other two. In fact, correlation coefficients determined for the different assays have shown a strong correlation between the results obtained for inhibitory activities on α-glucosidase and the content in caffeic acid and derivatives of the extracts (0.995). Interestingly, high correlation coefficients were also observed between the α-glucosidase and the antioxidant assays (0.976, 0.998, and 0.996 for reducing power, nitric oxide scavenging, and superoxide anion scavenging, respectively; [Table 3](#molecules-23-03169-t003){ref-type="table"}), suggesting that metabolic and antioxidant effects might possibly be related.
However, regardless the great α-glucosidase inhibitory capacity and the fact that some authors have previously found potential inhibitory capacities in polar extracts of *Salvia*, namely for aqueous and methanolic extracts of *S. cadmica*, as well as for some individual phenolic compounds from *Salvia* origin \[[@B49-molecules-23-03169]\], our results showed no substantial inhibition towards α-amylase up to the concentration of 0.5 mg/mL. Moreover, at 0.2 mg/mL, only *S. greggii* showed an anti-lipase activity higher than 10%. This could possibly be owed to its main phenolic component, i.e., luteolin-7-*O*-glucoside, since its aglycone has been reported to be a good lipase inhibitor \[[@B52-molecules-23-03169],[@B53-molecules-23-03169]\], a hypothesis also supported by the high correlation found between the content of this flavone and the anti-lipase activity (0.930, data not shown). Interestingly, the anti-lipase activity of polar extracts of *Salvia* species has been previously described, namely for the methanolic extract of the leaves of *S. officinalis* (EC~50~ = 94 μg/mL) \[[@B54-molecules-23-03169]\], the methanol extract of *Salvia spinosa* (EC~50~ = 156.2 μg/mL) \[[@B55-molecules-23-03169]\], and methanol extracts of *Salvia triloba* (EC~50~ = 100.8 μg/mL) \[[@B56-molecules-23-03169]\]. Hence, despite data from literature that seems to suggest that at least some polar extracts from *Salvia* species might be promising with respect to their abilities to control the activity of α-amylase and pancreatic lipase, this was not the observed for *S. officinalis, S. elegans* and *S. greggii* decoctions herein studied.
3. Materials and Methods {#sec3-molecules-23-03169}
========================
3.1. Chemicals {#sec3dot1-molecules-23-03169}
--------------
Ethanol, potassium di-hydrogen phosphate, and gallic acid were purchased from Panreac. Dimethylsulfoxide (DMSO), sodium chloride, potato starch, sodium and potassium tartrate, sodium hydroxide, and tris-HCl were purchased from Fisher (Pittsburgh, PA, USA). Fluorescein, 2,2′-azobis(2-amidinopropane)di- hydrochloride (AAPH), sodium nitroprusside, sulfanilamide, and 3,5-dinitrosalicylic acid (DNS) were purchased from Acros Organics (Hampton, NH, USA). Trolox, xanthine oxidase from bovine milk, allopurinol, α-glucosidase from *Saccharomyces cerevisiae*, 4-nitrophenyl α-D-glucopyranoside (pNPG), lipase from porcine pancreas and 4-nitrophenyl butyrate, α-amylase from porcine pancreas, β-nicotinamide adenine dinucleotide (β-NADH), phenazine methosulphate (PMS), nitrotetrazolium blue chloride (NBT), BHA (butylated hydroxyanisole), DPPH radical (2,2-diphenyl-2-picrylhydrazyl), ascorbic acid, and BHT (2,6-di-*tert*-butyl-4-methylphenol) were obtained from Sigma (St. Louis, MO, USA). Calcium chloride and sodium di-hydrogen phosphate were purchased from ChemLab (Eernegem, Belgium). Orlistat was purchased from TCI (Tokyo, Japan), acarbose from Fluka (Bucharest, Romania), xanthine from AlfaAesar (Ward Hill, MA, USA), and *N*-(1-naphthyl)ethylenediamine dihydrochloride from VWR (Radnor, PA, USA). Standard phenolics used for quantitative analysis were obtained from Extrasynthese. Folin-Ciocalteu reagent, Na~2~CO~3~, formic acid, and ethanol were purchased from Panreac (Barcelona, Spain). *n*-Hexane, methanol, and acetonitrile with high performance chromatography (HPLC) purity were purchased from Lab-Scan (Lisbon, Portugal). Water was treated in a Direct-Q^®^ water purification system (Merck Life Science, Darmstadt, Germany). All reagents were of analytical grade or of the highest available purity.
3.2. Plant Sampling and Preparation of Extracts {#sec3dot2-molecules-23-03169}
-----------------------------------------------
*S. officinallis*, *S. elegans*¸and *S. greggii* were purchased from Ervital (Viseu, Portugal) as a mixture of flowers and leaves, and stems where were cultivated under an organic regime. After collection, the aerial parts were dried in a ventilated incubator at 20 to 35 °C for 3 to 5 days.
Phenolic compounds were extracted by decoction according the method described by Ferreira et al. \[[@B57-molecules-23-03169]\], with adaptations. A volume of 100 mL of distilled water was added to 5 g of plant material (0.5 mm mesh powder) and the mixture was heated and then boiled for 15 min and filtered under reduced pressure through a G3 sintered plate filters. The resulting filtrated solution was concentrated in a rotary evaporator at 37 °C, followed by defatting with *n*-hexane (1:1 *v/v*). The resulting fraction was frozen, freeze-dried, and kept under vacuum in a desiccator in the dark for subsequent use \[[@B58-molecules-23-03169]\].
3.3. Identification and Quantification of Phenolic Compounds {#sec3dot3-molecules-23-03169}
------------------------------------------------------------
UHPLC-DAD-ESI/MS^n^ analyses of phenolic profiles from *S. officinalis*, *S. elegans*, and *S. greggii* decoctions (5 mg/mL) were carried out on an Ultimate 3000 (Dionex Co., San Jose, CA, USA) apparatus equipped with an ultimate 3000 Diode Array Detector (Dionex Co., San Jose, CA,, USA) and coupled to a Thermo LTQ XL mass spectrometer (Thermo Scientific, San Jose, CA, USA), an ion trap MS equipped with an electrospray ionization (ESI) source, following a method previous described \[[@B58-molecules-23-03169]\]. Control and data acquisition were carried out with the Thermo Xcalibur Qual Browser data system (Thermo Scientific, San Jose, CA, USA). Nitrogen above 99% purity was used, and the gas pressure was 520 kPa (75 psi). The instrument was operated in negative-ion mode with the ESI needle voltage set at 5.00 kV and an ESI capillary temperature of 275 °C. The full scan covered the mass range from *m/z* 100 to 2000. CID--MS/MS and MS^n^ experiments were simultaneously acquired for precursor ions using helium as the collision gas with a collision energy of 25--35 arbitrary units.
Gradient elution was carried out with a mixture of two solvents. Solvent A consisted of 0.1% (*v/v*) of formic acid in water, and solvent B consisted of acetonitrile, which was degassed and filtrated, using a 0.2 μm Nylon filter (Whatman International, Ltd., Maidstone, England) before use. The solvent gradient used consisted of a series of linear gradients starting from 5% of solvent B and increasing to 23% at 14.8 min, to 35% at 18 min, and to 100% at 21 min over three minutes, followed by a return to the initial conditions.
For quantitative determinations, the parameters of calibration curves, obtained by injection of known concentrations of the exact or structurally-related standard compounds, allowed the calculation of the limits of detection (LOD) and quantification (LOQ) \[[@B58-molecules-23-03169]\].
3.4. Antioxidant Activities {#sec3dot4-molecules-23-03169}
---------------------------
### 3.4.1. DPPH^•^ Scavenging Assay {#sec3dot4dot1-molecules-23-03169}
Extracts capacity for scavenging DPPH^•^ were evaluated following the procedure previously described by Catarino et al. \[[@B59-molecules-23-03169]\]. Ascorbic acid was used as positive control. The concentration of the extract/standard able to scavenge 50% of DPPH^•^ (EC~50~) was determined using linear regression by plotting the percentage of inhibition against the concentration of the extracts.
### 3.4.2. Ferric Reducing Antioxidant Power (FRAP) Assay {#sec3dot4dot2-molecules-23-03169}
For the reducing power assay, five different concentrations of each extract were prepared (0.05--0.25 mg/mL), and the assay was carried out according to a procedure described previously \[[@B59-molecules-23-03169]\]. BHA was used as the positive control. A linear regression analysis was carried out by plotting the mean absorbance against the concentrations, and the EC~50~ value was determined considering the extract/standard concentration that provided 0.5 of absorbance.
### 3.4.3. Oxygen Radical Absorbance Capacity (ORAC) Assay {#sec3dot4dot3-molecules-23-03169}
The ORAC assay was performed according to the method previously described by Catarino et al. \[[@B60-molecules-23-03169]\]. In a 96-well plate, 150 μL of fluorescein (10 nM), diluted from the stock solution of 250 μM, with 75 mM phosphate buffer (pH 7.4) were placed together with 25 μL of different trolox concentrations (3.13--25 μM). The same process was repeated for the extracts with final concentrations ranging between 0.4--6.3 μg/mL. For blanks, 25 μL of phosphate buffer was added instead of antioxidant solutions. After 10 min incubation at 37 °C, 25 μL of 2,2′-azobisisobutyramidinium chloride (AAPH) (153 mM) solution was added to each well to reach a final reaction volume of 200 μL. The plate was immediately placed in the plate reader (Biotek, Austria), and fluorescence was monitored every minute over 60 min. The measurement was carried out at 37 °C with automatic agitation for 5 s prior to each reading. Excitation was conducted at 485 nm with a 20 nm bandpass, and emission was measured at 528 nm with a 20 nm bandpass. Six concentration-dependent kinetic curves were obtained for each sample and for trolox as well. The area under the curve (AUC) of the fluorescence decay and Net AUC were calculated according to the following equations (1--3):$${AUC} = ~1 + \sum_{t_{0~} = ~60{~\min}}^{t_{i}~ = ~60{~\min}}\frac{R_{i}}{R_{0}},$$ $${{Net}~{AUC}~} = {{AUC}~}_{sample} - {{AUC}~}_{blank},$$ where R~0~ is the fluorescence reading at the initiation of the reaction and R~i~ is the fluorescence reading at the time i. Antioxidant activities (ORAC values) of the extracts were calculated by using the following ratio:$${{ORAC}~{value}} = ~\frac{m_{e}}{m_{T}},$$ where *m*~e~ is the slope of the curve of Net AUC vs. extract concentrations, and *m*~T~ is the slope of the curve of Net AUC vs. trolox concentrations. The final results were expressed in μM of trolox equivalents (μM TE) per μg of sample extract.
### 3.4.4. NO^•^ Scavenging Assay {#sec3dot4dot4-molecules-23-03169}
The NO^•^ scavenging method was adapted from Catarino et al. \[[@B60-molecules-23-03169]\]. Briefly, 100 µL of six different extract concentrations (0--1 mg/mL) were mixed with 100 µL of sodium nitroprusside (3.33 mM in 100 mM sodium phosphate buffer pH 7.4) and incubated for 15 min under a fluorescent lamp (Tryun 26 W). Afterwards, 100 µL of Griess reagent (0.5% sulphanilamide and 0.05% naphthyletylenediamine dihydrochloride in 2.5% H~3~PO~4~) were added to the mixture, which was allowed to react for another 10 min in the dark. The absorbance was then measured at 562 nm, and the percentage of NO^•^ scavenging was calculated using the equation described by Yen and Der Duh \[[@B61-molecules-23-03169]\] as follows: $$\%~{NO}^{\bullet}{~{scavenging}} = ~\frac{A_{c} - {~A}_{e}}{A_{c}} \times 100,$$ where A~c~ is the absorbance of the control (without extract addition) and A~e~ is the absorbance of the extract. Ascorbic acid was used as the reference compound. The concentration of the extract/standard able to scavenge 50% of NO^•^ (EC~50~) was then calculated by plotting the percentage of inhibition against the extract concentrations.
### 3.4.5. Superoxide Anion (O~2~^•--^) Scavenging Assay {#sec3dot4dot5-molecules-23-03169}
The O~2~^•--^ scavenging method was carried out according to the method described by Catarino et al. \[[@B60-molecules-23-03169]\]. Briefly, in a 96-well plate, 75 µL of six different sample concentrations (0.0--250 µg/mL) were mixed with 100 μL of β-NADH (300 μM), 75 μL of NBT (200 μM), and 50 μL of PMS (15 μM). After 5 min, the absorbances at 560 nm were recorded and the scavenging activity of superoxide radicals was calculated according to Equation (4). Gallic acid was used as the reference compound. The concentration of the extract/standard able to scavenge 50% of O~2~^•--^ (EC~50~) was determined using linear regression by plotting the percentage of inhibition against the concentration of the extracts.
### 3.4.6. Inhibition of Xanthine Oxidase Activity {#sec3dot4dot6-molecules-23-03169}
Inhibition of xanthine oxidase activity was carried out following the method described by Filha et al. \[[@B62-molecules-23-03169]\], with slight modifications. Briefly, in a 96-well plate, 40 µL of extract concentrations (0--2 mg/mL) were mixed with 45 µL of sodium dihydrogen phosphate buffer (100 mM, pH 7.5) and 40 µL of enzyme (5 mU/mL). After 5 min incubation at 25 °C, the reaction was started with the addition of 125 µL of xanthine (0.1 mM dissolved in buffer) and the absorbance at 295 nm was measured every 45 s over 10 min at 25 °C. The inhibitory effects towards xanthine oxidase activity was calculated as follows:$${\%~{inhibiton}} = ~\frac{m_{c} - ~m_{e}}{m_{c}} \times 100,$$ where *m*~c~ is the slope of the straight-line portion of the curve generated by the control (no inhibitor) and *m*~e~ is the slope of the straight-line portion of the curve generated by each extract. Allopurinol was used as a positive control of inhibition. The concentration of the extract/standard able to inhibit 50% (EC~50~) of the activity of the enzyme was determined using linear regression by plotting the percentage of inhibition against the concentration of the extracts.
3.5. Inhibition of Enzymatic Activities {#sec3dot5-molecules-23-03169}
---------------------------------------
### 3.5.1. Inhibition of α-Glucosidase Activity {#sec3dot5dot1-molecules-23-03169}
Inhibition of α-glucosidase activity was measured following the method described by Neto et al. \[[@B63-molecules-23-03169]\], with slight modifications. In short, 50 µL of different extract concentrations (0--2 mg/mL, in 50 mM phosphate buffer pH 6.8) were mixed with 50 µL of 6 mM 4-nitrophenyl α-[d]{.smallcaps}-glucopyranoside (pNPG), dissolved in deionized water. The reaction was started with the addition of 100 µL of α-glucosidase solution, and the absorbance was monitored at 405 nm every 60 s for 20 min at 37 °C. The inhibitory effects towards α-glucosidase activity was calculated as in Equation (5). Acarbose was used as a positive control of inhibition. The concentration of the extract/standard able to inhibit 50% (EC~50~) of the activity of the enzyme was determined using linear regression by plotting the percentage of inhibition against the concentration of the extracts.
### 3.5.2. Inhibition of α-Amylase Activity {#sec3dot5dot2-molecules-23-03169}
Inhibition of α-amylase activity was measured according to Wickramaratne et al. \[[@B64-molecules-23-03169]\], with slight modifications. Briefly, 200 µL of extract six different extract concentrations (0--2 mg/mL) dissolved in 20 mM phosphate buffer (pH 6.9, containing 6 mM of NaCl) were added to 400 µL of a 0.8% (w/v) starch solution in the same phosphate buffer, and the mixture was incubated for 5 min at 37 °C. The reaction was then started with the addition of 200 µL of α-amylase solution, and after 5 min of incubation, 200 µL of the reaction mixture was collected and immediately mixed with 600 µL of DNS reagent (10 g/L of 3,5-dinitrosalicylic acid, 300 g/L of potassium and sodium tartrate tetrahydrate, and 0.4 M NaOH) to stop the reaction. A second aliquot of 200 µL was further collected 15 min later and mixed with DNS reagent as well. Samples were then boiled for 10 min, and, once they had cooled, 250 µL were transferred to each well in a 96-well microplate for absorbance reading at 450 nm. Blank readings (no enzyme) were then subtracted from each well and the inhibitory effects towards α-amylase activity was calculated as follows:$$\%~inhibiton = ~\frac{\Delta Abs_{c} - ~\Delta Abs_{e}}{\Delta Abs_{c}} \times 100,$$ where ΔAbs~c~ is the variation in the absorbance of the negative control and ΔAbs~e~ is the variation in the absorbance of the extract. Acarbose was used as a positive control of inhibition.
### 3.5.3. Inhibition of Pancreatic Lipase Activity {#sec3dot5dot3-molecules-23-03169}
The lipase activity was measured according to the procedure described by Neto et al. \[[@B63-molecules-23-03169]\], with slight modifications. The reaction mixture was prepared in a microtube by mixing 55 µL of five different concentrations of extract (0--2 mg/mL) dissolved in tris buffer 100 mM (pH 7.0) with 467.5 µL of tris-HCl (100 mM, pH 7.0, containing 5 mM of CaCl~2~) and 16.5 µL of enzyme. The reaction was started by adding 11 µL of 20 mM 4-nitrophenyl butyrate diluted in DMSO. Final DMSO concentration in the reaction mixture did not exceed 2%. The reaction mixture was then quickly transferred to a 96-well plate and incubated for 35 min at 37 °C while the absorbance was being measured every 60 s at 410 nm. The inhibitory effects towards pancreatic lipase activity was calculated as in Equation (5). Orlistat was used as a positive control of inhibition.
3.6. Statistical Analysis {#sec3dot6-molecules-23-03169}
-------------------------
All data are presented as mean ± standard deviations from three independent assays performed at least in duplicate. One-way analysis of variance (ANOVA) followed by Tukey´s test was used to detect any significant differences among different means. Correlation analyses were performed using a two-tailed Pearson's correlation test. A *p*-value less than 0.05 was assumed as significant. The results were analyzed using GraphPad Prism 6 (GraphPad Software, La Jolla, CA, USA) and SPSS v 23.0 (Statistical Package for the Social Sciences).
4. Conclusions {#sec4-molecules-23-03169}
==============
This work clarifies the antioxidant properties of *S. elegans, S. greggii*, and *S. officinalis* decoctions as well as their inhibition towards the activity of carbohydrate and lipid metabolic enzymes, highlighting possible correlations with their phenolic components. It was shown that among the three plants, *S. elegans* decoctions were the most promising regarding antioxidant activity and inhibitory potential against α-glucosidase, a fact that might be related to its richness in caffeic acid and its derivatives. In turn, despite all the three decoctions of *Salvia* species could effectively inhibit the activity of xanthine oxidase, one should highlight the superior inhibitory capacity of *S. officinalis*, which is possibly associated with the presence of flavones. In conclusion, similarly to the well-known *S. officinalis* species, *S. elegans* and *S. greggii* are a valuable source of natural metabolites and could be used for commercial applications in novel functional foods or pharmaceutical ingredients targeting diabetes and obesity prevention.
**Sample Availability**: Samples of extracts/compounds are available from the authors.
Supplementary Materials can be found in a separate file: Figure S1: UV spectra of the main peaks identified in *S. elegans, S. greggii*, and *S. officinalis* decoctions.
######
Click here for additional data file.
M.D.C. performed the experimental work and co-wrote the manuscript; O.R.P. and A.F.A. performed the analysis and interpretation of data and wrote the manuscript; A.M.S.S. co-wrote the manuscript; S.M.C. coordinated the work and co-wrote the manuscript.
The Science and Technology Foundation/Ministry of Education and Science (FCT/MEC) funded the Organic Chemistry, Natural Products and Food Stuffs Research Unit (QOPNA) research unit (FCT UID/QUI/00062/2013) through national funds and, where applicable, was co-financed by the European Regional Development Fund (FEDER), within the Portugal 2020. Project AgroForWealth (CENTRO-01-0145-FEDER-000001), funded by Centro2020, through FEDER and PT2020, financed the research contract of Susana M. Cardoso. The Science and Technology Foundation financed Marcelo D. Catarino (fellowship PD/BD/114577/2016).
The authors declare no conflict of interest.
{ref-type="table"}.](molecules-23-03169-g001){#molecules-23-03169-f001}
molecules-23-03169-t001_Table 1
######
Phytochemical composition of *S. officinalis*, *S. elegans*, and *S. greggii* decoctions determined by UHPLC-DAD-ESI-MS^n^.
NP RT (min) λmax \[M − H\]^−^ ESI-MS^2^ Main Fragments Compound *S. off \** *S. ele \** *S. gre \**
--------------- -------------------- -------------------- ---------------- -------------------------------- ------------------------- ------------- ------------- -------------
1 1.5 275 149 103, 87, 131, 59 2,4-DimethylBA 4.1 ± 0.2 5.1 ± 0.1 7.3 ± 0.2
2 1.7 205 191 111, 173 Quinic acid 0.6 ± 0.1 0.6 ± 0.1 0.5 ± 0.01
3 3.6 280 197 179, 73, 153 Danshensu D D D
4 5.0 290, 324 353 191, 179, 135, 173 *cis* 3-*O*-CQA \- \- 3.1 ± 0.03
5 5.7 220, 278 137 109, 93, 119 HydroxyBA D 2.0 ± 0.1 \-
6 8.3 313 295 163 *p*-Coum Ac Pent \- \- 0.3 ± 0.02
7 8.8 290, 325 353 191, 179 *trans*-5-*O*-CQA \- \- 1.9 ± 0.1
8 9.4 313 265 177, 149, 119 Coumaric Ac Der \- \- 2.9 ± 0.05
ND 325 163, 119 Caff Hex D \- \-
9 9.7 290, 323 179 135 CaffAc 1.8 ± 0.04 1.5 ± 0.02 \-
10 9.8 314 325 265, 235, 163 Coum Hex D \- \-
11 9.9 255, 265, 350 625 463, 301 Querc diHex \- \- D
12 12.1 271, 336 593 473, 503, 353 Api-6-*C*-Glc-7-*O*-Glc 4.3 ± 0.1 \- \-
13 13.1 291, 311 637 351, 285, 193 Ferulic Ac Der \- D \-
14 13.5 274 571 527, 483, 439, 373 YA E (isom1) \- 1.9 ± 0.1 \-
15 13.9 256, 267, 345 447 327, 357 Lut-*C*-Hex \- \- 4.6 ± 0.09
16 13.9 281, 345 477 301, 373, 343, 397 Hydroxy-Lut-GlcA D 1.9 ± 0.2 \-
17 14.1 276 571 527, 439, 553, 483 YA E (isom2) D \- \-
18 14.4 269, 304 473 311, 293, 179, 135 Cichoric acid \- 1.6 ± 0.07 \-
19 14.8 267, 345 621 351, 269 Api-diGlcA 4.6 ± 0.3 \- \-
20 15.2 268, 336 431 311, 341, 269 Api-*C*-Hex \- \- 15.7 ± 0.3
21 15.4 274 555 313, 357 SA K 1.6 ± 0.2 \- \-
571 527, 553, 509, 329 YA E (isom3) D \- \-
22 15.8 255, 350 463 301 Querc-*O*-Hex \- \- 2.7 ± 0.2
23 15.9 280, 333 461 285 Scut-*O*-GlcA 13.4 ± 0.6 3.9 ± 0.1 \-
24 16.0 255, 265, 348 447 285 Lut-7-*O*-Glc \- \- 26.1 ± 0.9
25 16.1 255, 266, 345 461 285 Lut-7-*O*-GlcA (isom1) 8.4 ± 0.3 5.1 ± 0.3 \-
26 16.9 271, 306 521 359, 197, 179, 135 Salviaflaside \- D \-
27 17.2 278 717 519, 475, 537, 339 SA B (isom1) \- 7.8 ± 0.4 \-
28 17.3 279 571 527, 553, 329 YA E (isom4) 0.9 ± 0.1 \- \-
29 17.7 279 717 537, 519, 339, 295 SA B (isom2) \- 1.7 ± 0.6 \-
30 17.9 268, 334 577 269 Api-rut 4.5 ± 0.1 D \-
283 719 359, 539, 521, 341 Sagerinic acid 6.0 ± 0.3 D \-
31 18.1 271, 304 717 519, 607, 339, 537 SA B (isom3) \- 1.7 ± 0.1 \-
32 18.1 269, 329 431 269 Api-Hex D \- 3.4 ± 0.2
33 18.4 267, 337 445 269, 175 Api-GlcA 48.4 ± 1.3 3.2 ± 0.5 \-
34 18.6 254, 266, 345 533 489, 447, 433 Lut malonyl Hex \- \- D
35 18.6 270, 291, 326 717 555, 519, 475, 357 SA B (isom4) D \- \-
36 19.0 218, 290, 328 359 161, 179, 197, 223 RA 28.3 ± 0.6 35.5 ± 0.8 10.9 ± 0.2
37 19.2 269, 307, 343 461 285 Lut-*O*-GlcA (isom2) \- 1.8 ± 0.1
38 20.8 293, 328 373 343, 329, 311, 179 Methyl rosmarinate \- \- D
39 21.2 290, 333 537 493, 359, 375 CaffRA/SA I (isom1) 1.2 ± 0.1 17.9 ± 0.1 \-
40 21.4 293, 328 329 285, 314, 311, 161 CaffAc derivative \- \- 5.0 ± 0.03
239, 285, 330 537 456, 493, 375, 359 CaffRA (isom2) \- 1.3 ± 0.04 \-
41 22.1 295, 325 713 493, 359, 375 CaffAc der \- D \-
42 22.3 280 537 456, 493, 359, 161 CaffRA (isom3) \- 0.7 ± 0.04 \-
43 23.0 289, 327 717 519, 357, 555 SA B isomer D 2.4 ± 0.04 \-
*Caffeic acid and derivatives* 39.8 ± 0.9 74.1 ± 0.5 20.8 ± 0.3
*Coumaric acid derivatives* \- \- 3.2 ± 0.06
*Flavones* 83.5 ± 2.3 15.9 ± 0.9 49.7 ± 1.3
*Flavonols* \- \- 2.7 ± 0.2
NP---Number of peak represented in [Figure 1](#molecules-23-03169-f001){ref-type="fig"}; D---Detected; Ac---acid; Api- Apigenin; BA---Benzoic acid; CaffAc---Caffeic acid; Caff---Caffeoyl; CQA---Caffeoylquinic acid; Coum---Coumaroyl; Der---Derivative; Glc---Glucoside; GlcA---Glucuronide; Hex---Hexoside; Lut---Luteolin; Pent---Pentoside; Querc---Quercetin; Rut---Rutinoside; RA---Rosmarinic acid; SA---Salvianolic acid; *S. off*---*S. officinalis*; *S. ele*---*S. elegans*; *S. gre*---*S. greggii*; Scut---Scutellarein; YA---Yunnaneic acid; \* values expressed as mg/g of extract.
molecules-23-03169-t002_Table 2
######
Antioxidant properties of *S. officinalis, S. elegans*, and *S. greggii* decoctions.
*S. officinalis* *S. elegans* *S. greggii* Standard
--------------------------------------- ------------------ ----------------- ----------------- ----------------
DPPH^•^ (EC~50~ μg/mL) ^(1)^ 34.8 ± 3.3^a^ 10.7 ± 2.1^b^ 21.1 ± 2.5^c^ 6.69 ± 0.7^b^
Reducing Power (EC~50~ μg/mL) ^(2)^ 40.0 ± 11.2^a^ 31.3 ± 5.0^a,c^ 77.9 ± 5.6^b^ 16.30 ± 1.5^c^
NO^•^ (EC~50~ μg/mL) ^(1)^ 118.2 ± 16.4^a^ 91.5 ± 14.5^a^ 167.8 ± 23.9^b^ 212.1 ± 9.7^c^
O~2~^•--^ (EC~50~ μg/mL) ^(3)^ 32.8 ± 0.6^a^ 30.6 ± 1.3^a^ 61.7 ± 3.4^b^ 7.8 ± 0.5^c^
ORAC (μM TE/mg ext) ^(4)^ 404.4 ± 1.80^a^ 373.1 ± 28.1^a^ 335.6 ± 69.6^a^ \-
Xanthine oxidase (EC~50~ μg/mL) ^(5)^ 55.1 ± 10.6^a^ 71.8 ± 3.8^b^ 70.1 ± 4.0^a,b^ 0.09 ± 0.01^c^
^(1)^ Ascorbic acid was used as the reference compound. ^(2)^ Amount of extract able to provide 0.5 of absorbance by reducing 3.5 μM Fe^3+^ to Fe^2+^. Butylated hydroxyanisole (BHA) was used as a reference compound. ^(3)^ Gallic acid was used as the reference compound. ^(4)^ TE---Trolox Equivalent. ^(5)^ Allopurinol was used as the reference compound. Mean values ± SD; statistical analysis was performed by one-way ANOVA followed by Tukey's test. In each line, different letters mean significant differences (*p* \< 0.05).
molecules-23-03169-t003_Table 3
######
Correlation coefficients between the amounts of phenolic components found in the *Salvia* decoctions (caffeic acid and derivatives, coumaric acid derivatives, flavones and flavonols) and the data from the distinct biological experiments.
DPPH RP ORAC NO O2 XO AG L
----------- --------- --------- --------- --------- --------- --------- ---------- ---------
Flavones − 0.971 − 0.357 0.454 − 0.498 − 0.123 0.901 − 0.551 − 0.367
Flavonols − 0.239 − 0.934 − 0.891 − 0.868 − 0.992 − 0.434 − 0.835 0.930
CafAcD 0.801 0.948 0.400 0.986 0.844 − 0.237 0.995 − 0.485
CouAcD − 0.239 − 0.934 − 0.891 − 0.868 − 0.992 − 0.434 − 0.835 0.930
DPPH 0.570 − 0.228 0.690 0.356 − 0.771 0.734 0.134
RP 0.670 0.988 0.971 0.084 0.976 − 0.738
ORAC 0.547 0.829 0.796 0.493 − 0.995
NO 0.922 − 0.071 0.998 \* − 0.624
O2 0.321 0.996 − 0.878
XO − 0.134 − 0.735
AG − 0.574
Values expressed as Pearson correlation coefficient *R*; AG---α-glycosidase inhibitory activity; CafAcD---caffeic acid and derivatives; CouAcD---coumaric acid derivatives; DPPH---DPPH radical scavenging activity; L---lipase inhibitory activity; NO---nitric oxide radical scavenging capacity; ORAC---oxygen radical absorbance capacity; O2---superoxide anion scavenging activity; RP---reducing power potential; XO---xanthine oxidase inhibitory activity; \* *p* \< 0.05.
molecules-23-03169-t004_Table 4
######
Enzyme inhibitory properties of *S. officinalis, S. elegans*, and *S. greggii* decoctions.
*S. officinalis* *S. elegans* *S. greggii* Standard
------------------------------------ ------------------ --------------- ---------------- -----------------
α-Glucosidase (EC~50~ μg/mL) ^(1)^ 71.2 ± 5.0^a^ 36.0 ± 2.7^b^ 345.3 ± 6.4^c^ 357.8 ± 12.3^c^
α-Amylase ^(2)^ \- \- 6.5 ± 3.0 0.7 ± 0.2
Pancreatic lipase ^(3)^ 4.6 ± 3.6^a^ 8.2 ± 0.3^a^ 14.4 ± 7.4^a^ 1.8 ± 0.4
^(1)^ Acarbose was used as standard. ^(2)^ Results are expressed as percentage (%) inhibition at the concentration of 0.5 mg/mL (*Salvia* decoctions) or as EC~50~ (μg/mL), for the reference compound acarbose. ^(3)^ Results are expressed as percentage (%) inhibition at the concentration of 0.2 mg/mL (*Salvia* decoctions) or as EC~50~ (ng/mL), for the reference compound orlistat. In each line, different letters mean significant differences (*p* \< 0.05).
|
Member Profile | FocusFeatures.com
Posted June 28, 2011 to photo album "Screen Kisses: From The Kiss to One Day"
The electrifying kiss between Emma (Anne Hathaway) and Dexter (Jim Sturgess) in One Day inspired us to look back at other great screen kisses.
My Beautiful Laundrette (1985)
My Beautiful Laundrette was filmed in London in 1985 for less than $850,000 by a group of relative unknowns. Director Stephen Frears had come from TV; the writer, Hanif Kureishi, had never had a screenplay produced; and one of the leads, Daniel Day-Lewis, had only showed up in a bit part in a small film. But the film’s complicated take on race and sexuality got everyone involved international attention and acclaim. The film’s simmering racial and cultural conflicts came to a boil in the kiss between the working-class white boy (played by Day-Lewis) and Pakistani laundry owner Omar (Gordon Warnecke). Some, like the Pakistan Action Committee who protested the film in New York City, complained that the film was "the product of a vile and perverted mind." Others, like Guardian writer Matthew Hays, found that kiss a revelation: “I first watched the scene where Gordon Warnecke, as Omar, and Daniel Day-Lewis, as Johnny, passionately lock lips in the laundrette when I was a teenager. I can speak for the vast majority of gay men of my generation when I say My Beautiful Laundrette was an incredibly liberating moment.”
Connect with Focus Features
Be the first to know
Sign up for updates on new film releases, casting announcements, special offers, & more. |
45User Rating: 4 out of 5
Review title of Spectre Blast0 Great game hurt by bad business practices.....
Would have been a great game if story was longer and launched complete but thanks to that along with bad business practices with day one dlc, questionable micro transactions, and what looks like cutting content out only to resell it back through dlc is just bad and wrong to consumer period. There are fairer and more reasonable practices to make more money after launch that is fair to both sides and what's been done here is shameful and i hope it's realized by Square Enix because game really focuses on cash grabbing to new levels that clearly effected game negatively. While minor and some are just suggestions I think game could've benefited from having more outfits, weapons, and more boss battles and breach while ok I think some kind of horde mode instead or simply just more campaign DLC would've been better ideas. In the end a good game that could've been great, could've been longer, cleary suffered from having a bad business model, and fortunately still worth your time and money too. |
<?php
/**
* AgileBill - Open Billing Software
*
* This body of work is free software; you can redistribute it and/or
* modify it under the terms of the Open AgileBill License
* License as published at http://www.agileco.com/agilebill/license1-4.txt
*
* For questions, help, comments, discussion, etc., please join the
* Agileco community forums at http://forum.agileco.com/
*
* @link http://www.agileco.com/
* @copyright 2004-2008 Agileco, LLC.
* @license http://www.agileco.com/agilebill/license1-4.txt
* @author Tony Landis <tony@agileco.com> and Thralling Penguin, LLC <http://www.thrallingpenguin.com>
* @package AgileBill
* @version 1.4.93
*/
class voip_rate_prod
{
# Open the constructor for this mod
function voip_rate_prod()
{
# name of this module:
$this->module = "voip_rate_prod";
# location of the construct XML file:
$this->xml_construct = PATH_MODULES . "" . $this->module . "/" . $this->module . "_construct.xml";
# open the construct file for parsing
$C_xml = new CORE_xml;
$construct = $C_xml->xml_to_array($this->xml_construct);
$this->method = $construct["construct"]["method"];
$this->trigger = $construct["construct"]["trigger"];
$this->field = $construct["construct"]["field"];
$this->table = $construct["construct"]["table"];
$this->module = $construct["construct"]["module"];
$this->cache = $construct["construct"]["cache"];
$this->order_by = $construct["construct"]["order_by"];
$this->limit = $construct["construct"]["limit"];
}
##############################
## ADD ##
##############################
function add($VAR)
{
// check this is not a duplicate for the selected product/voip_rate record combo
$product_id = $VAR['voip_rate_prod_product_id'];
$voip_rate_id = $VAR['voip_rate_prod_voip_rate_id'];
$db=&DB();
$rs = $db->Execute( sqlSelect($db,'voip_rate_prod','id',"product_id = ::$product_id:: AND voip_rate_id = ::$voip_rate_id::" ));
if($rs && $rs->RecordCount() > 0) {
echo "<script>alert('Specified product/voip_rate combo already exists, cannot create record'); history.back();</script>";
return false;
}
$type = "add";
$this->method["$type"] = explode(",", $this->method["$type"]);
$db = new CORE_database;
$db->add($VAR, $this, $type);
}
##############################
## VIEW ##
##############################
function view($VAR)
{
$type = "view";
$this->method["$type"] = explode(",", $this->method["$type"]);
$db = new CORE_database;
$db->view($VAR, $this, $type);
}
##############################
## UPDATE ##
##############################
function update($VAR)
{
$type = "update";
$this->method["$type"] = explode(",", $this->method["$type"]);
$db = new CORE_database;
$db->update($VAR, $this, $type);
}
##############################
## DELETE ##
##############################
function delete($VAR)
{
$db = new CORE_database;
$db->mass_delete($VAR, $this, "");
}
##############################
## SEARCH FORM ##
##############################
function search_form($VAR)
{
$type = "search";
$this->method["$type"] = explode(",", $this->method["$type"]);
$db = new CORE_database;
$db->search_form($VAR, $this, $type);
}
##############################
## SEARCH ##
##############################
function search($VAR)
{
$type = "search";
$this->method["$type"] = explode(",", $this->method["$type"]);
$db = new CORE_database;
$db->search($VAR, $this, $type);
}
##############################
## SEARCH SHOW ##
##############################
function search_show($VAR)
{
$type = "search";
$this->method["$type"] = explode(",", $this->method["$type"]);
$db = new CORE_database;
$db->search_show($VAR, $this, $type);
}
}
?> |
Q:
Scala: access static Java method using type-parameter information
I use a Java code-generator (unfortunately I cannot get rid of it) which spits out code like this:
abstract class Abs1 { //... }
abstract class Abs2 { //... }
interface I { //... }
public static final class C1 extends Abs implements I {
public final static Inner newInstance() { return Inner.create(); }
public final class Inner extends Abs2 {
private static Inner create() { return new Inner(); }
}
public final static C1 build() {
// builds the object instantiating some fields with defaults
}
}
final static class C2 extends Abs implements I {
// exactly same as in C1:
public final static Inner newInstance() { return Inner.create(); }
public final class Inner extends Abs2 {
private static Inner create() { return new Inner(); }
}
public final static C1 build() {
// builds the object instantiating some fields with defaults
}
}
I have many other classes like C1 and C2 in the same style.
As you can see, every outer class (C1, C2 ...) has an Inner class, always named as Inner. Also, all InnerClasses extend the same abstract class.
I want to create instances of each of these outer-classes from Strings. I have a utility (Merger) that can merge an instance with it's String.
def createC1(str: String) = {
val ins = C1.newInstance
Merger(ins, str)
ins.build
}
def createC2(str: String) = {
val ins = C2.newInstance
Merger(ins, str)
ins.build
}
... this seemed like obvious code-duplication. So I wanted to take advantage of type-parameterization.
def build[A <: Abs](str: String) = {
val ins = A.newInstance // this obviously won't compile - but this is my intent
Merger(ins, str)
ins.build
}
So I could do: build[Cn](str)
How can I call the static Java method using the type parameter info ? I tried using ClassTag:
def build[A <: Abs : ClassTag](str: String) = {
val ins1 = (new A) // ins1 type is now A with Object, WAT ?
val ins2 = ins.asInstanceOf[A] // I do not want to do asInstanceOf but the compiler won't recognize that ins2 is an instance of A otherwise
// ins2 has access to newInstance method
// Not sure if the below code works, I had to actually try it :)
// Merger(str, ins2)
// ins2.build()
???
}
Why doesn't it infer the type in ins1 ?
EDIT: Make outer classes static.
A:
The Problem
The main problem with the code you are trying to create is that you are trying to access a static method of a generic type. Generic types, both in Java and Scala, do not allow access to the static methods associated with the type. I have read about some fairly complicated reflection that you might be able to employ in order to gain access to the companion object of a generic type, but I would highly recommend avoiding anything like that in this case as such code is extremely brittle and unmaintainable. After all, the goal of any abstraction is to make the code easier to work with, not harder.
A Couple Of Solutions
There are a few things you can do easily to abstract over this situation and make working with this code more tractable. I am making the assumption that you can't modify the generated code at all, because if you can there are some even better ways to deal with this issue that I am going to skip.
Solution 1 Structural Typing
The first, and most simple solution to this issue is to use a structural type. Consider the following code (it is Scala code, but it should function the same conceptually in Java).
scala> :paste
// Entering paste mode (ctrl-D to finish)
trait Foo
trait InnerFoo
trait Bar extends Foo
trait Baz extends Foo
object Bar {
class InnerBar extends InnerFoo
def newInstance: InnerBar = new InnerBar
def build: Bar = new Bar {}
}
object Baz {
class InnerBaz extends InnerFoo
def newInstance: InnerBaz = new InnerBaz
def build: Baz = new Baz {}
}
// Exiting paste mode, now interpreting.
defined trait Foo
defined trait InnerFoo
defined trait Bar
defined trait Baz
defined object Bar
defined object Baz
Now, I want to call newInstance on anything with the following function, which does not compile
def makeInstance[A <: Foo, B <: InnerFoo]: B = {
A.newInstance
// do some stuff
A.build
}
This is because the compiler doesn't know that just because an A is a subtype of Foo that the companion object of A has a newInstance method on it. The companion object of a class/trait has nothing to do with the type hierarchy of the class/trait itself. This is basically the same in Java as well, the static members on a class have nothing to do with the type of a class, they are just a place to define members that are scoped to a class in a particular way.
However, if I define the makeInstance function like so, everything works,
scala> def makeInstance[A <: InnerFoo, B <: Foo](static: { def newInstance: A; def build: B }) = {
| static.newInstance
| // do some stuff
| static.build
| }
warning: there were two feature warnings; re-run with -feature for details
makeInstance: [A <: InnerFoo, B <: Foo](static: AnyRef{def newInstance: A; def build: B})B
scala> makeInstance(Bar)
res16: Bar = Bar$$anon$1@1601e47
scala> makeInstance(Baz)
res17: Baz = Baz$$anon$2@6de54b40
This is only slightly more boiler plate than your ideal solution. Take heed however, the reason that the compiler issued a warning for this is that structural types require reflection and thus have a runtime performance penalty. However, if the code is not in a critical portion of your program, you could probably not worry about it.
Solution 2, just pass the function
Rather than using structural types, we can just pass the functions to do the work directly. This is slightly more verbose than the structural type version, but also slightly faster and safer.
scala> def makeInstance[A <: InnerFoo, B <: Foo](newInstanceProc: => A, buildProc: => B): B = {
| newInstanceProc
| // do some stuff
| buildProc
| }
makeInstance: [A <: InnerFoo, B <: Foo](newInstanceProc: => A, buildProc: => B)B
scala> makeInstance(Bar.newInstance, Bar.build)
res19: Bar = Bar$$anon$1@4d0402b
|
Marty joined Dec 30, 2007
Greetings mortals! Welcome to my profile! I'm a modeler who likes to make some weapons, cars, spaceships, maps, this kind of stuff! ^^
I worked on Grand Theft Auto: San Andreas, for the mod "Stargate : Horizon Of The Universe".
I like the "Back To The Future" trilogy... No, I'm lying, I F*cking LOVE the "Back To The Future" trilogy!!! :D I think you guessed that I also like StarGate, Marvel's Super-Heroes, Star Wars, etc...
You can send me a PM anytime you want if you want me to make a model in particular! I will see if I want to make it X-)
Thanks for visiting my profile!
No files were found matching the criteria specified. We suggest you try the file list with no filter applied, to browse all available. Add file and help us achieve our mission of showcasing the best content from all developers. Join now to share your own content, we welcome creators and consumers alike and look forward to your comments. |
BURY’S Mayor is being hailed for her “towering” achievement after she bravely abseiled 128ft down one of the town’s premier landmarks for charity.
Despite being battered by strong winds, Cllr Sharon Briggs successfully lowered herself down Peel Tower to raise money for her chosen local charities, Making Space and the Bury Cancer Support Centre.
Around 90 other daredevils also took part in the Tower Challenge on Holcombe Hill on Saturday for the same good causes.
Cllr Briggs, a Radcliffe North councillor, was joined by her daughter and mayoress, Natalie Wells, to make it a family double.
The mayor said: “It was frightening. I can’t believe I’ve done it but I’m really glad I have. It was very scary and the wind was really strong and it sort of interfered and kept blowing me off course. But I’m so pleased and proud of myself that I’ve done it.
“I would say it took me about five to 10 minutes, longer because of the wind. At one point, I was blown around the tower.”
Cllr Briggs said the abseil and the location had been chosen for her charity challenge, primarily because of the significance of the landmark.
“The tower is synonymous with Bury and it seemed the obvious choice,” she said.
Cllr Briggs said her daughter had been “very brave”.
“In the end, it was quite testing,” she said. “So far, I have gathered more than £200. And thanks to all the others who took part, the amount of money raised in total will make a good figure once it all comes in.” |
See last week’s announcement, and you get one impression about the Portland Timbers’ center back depth chart. Liam Ridgewell and the club, mutually parting ways. Julio Cascante, Larrys Mabiala and Bill Tuiloma, still on the roster. Modou Jadama also there, ready to move up after a season with Timbers 2. Ridgewell’s was always going to be a major loss, but in the talent that was left, Portland has both present and potential in its center back corps.
The organization’s latest acquisition, though, tells a different story. Claude Dielna isn’t a long-term play – somebody who would slot in near Jadama on the depth chart and grow into the club. He is 31 years old. He not only has spent two seasons in MLS, having joined the New England Revolution in 2017, but contracts with clubs like Lorient, Olympiacos and Sheffield Wednesday highlight his resume. His acquisition requires the team spend some of its Targeted Allocation Money. This isn’t somebody that’s being brought in as a reinforcement. This is a player who’ll be expected to play, now.
As with most things, though, the truth between those two pictures lies in the middle, and thankfully, the reality becomes much clearer when you look back on President of Soccer Gavin Wilkinson’s season-ending words. In the days after MLS Cup, when he, technical director Ned Grabavoy and head coach Giovanni Savarese took the year’s final questions from the media, Wilkinson made clear the Timbers’ intentions regarding their roster.
“We’ll look to add three to four starting-caliber players that add competition for players,” Wilkinson said, when asked to clarify the team’s offseason plans.
Dielna fits perfectly into that plan. Is he guaranteed to slot into the starting XI, next to Mabiala, and pick up where Ridgewell left off? No. That would be too short-sighted about the potential of players like Cascante, Jadama and Tuiloma. Cascante profiles, physically, as a potential top defender in MLS. Tuiloma’s all-around skillset, in addition to how he stepped up in the 2018 playoffs, cast him as a great complement for either a Mabiala or a Cascante. Jadama has shown that the next stage of his growth needs to happen above the USL. All three of those players remain promising options, regardless of who’s added to the Timbers’ roster.
But gone are the days of the Timbers being locked into singular options, a theme Wilkinson talked about last offseason as Portland began using the resources obtained after Darlington Nagbe’s departure. Did the squad need to bring in a player, given Cascante, Mabiala and Tuiloma’s presence on the roster? No. Players like Cristhian Paredes and Samuel Armenteros, last winter, didn’t fill needs any more than the team needs players throughout the depth chart who will compete for time. But after the success Portland had in 2015, when players like Dairon Asprilla, Jack Jewsbury and Maxi Urruti proved so valuable, at the end, beyond the starting XI, a new standard has been pursued.
“[In 2017], we had Darren Mattocks,” Wilkinson explained about the backup strikers’ role last year, after Armenteros’ acquisition, expounding on the teams’ roster philosophies. “The objective, once we traded Darren, was to find a player that is in line with what we wanted and is good enough to play – good enough to start ...”
Insert Dielna into that view. The Revolution went through a transition, last season, with first-year head coach Brad Friedel intent on establishing a new culture. Dielna ended up fighting for time in the middle of a defense that also had Jalil Anibaba, Antonio Delamea and, in time, Michael Mancienne at center back. Ultimately, Dielna ended up splitting time between center and left back, but among New England’s broader defender corps, Dielna ended up leading the team in clearances per 90 minutes (4.5), as well as duels (10.9) and passes (45.6).
Picking out defensive stats and implying they, in isolation, have value can be disingenuous. Nobody should ever say, “Look at this guy’s clearance rate! What a player!” But compared to those asked to do similar things, last season – and do them under similar circumstances – Dielna had some positive indicators. And in those numbers, you see a type of all-around player who, between his physicality, quality on the ball, and versatility, could prove a good fit next to any potential partner on Portland’s roster.
Ultimately, though, this is move is less about what Dielna did in 2018 than what Wilkinson, Grabavoy and Savarese believe he can do in 2019. New England’s 55 goals conceded, last season, ranked 12th in the league, basically right in the middle of the MLS pack. Among teams that post those type of numbers, you usually find both positives and negatives within individual performances. Something about Dielna convinced Portland’s staff he was one of the positives.
That may just be a hunch. Whatever it was, it was something the team’s seen on film. Soon, though, that will change. When Dielna joins his new teammates, the theory of what he brings to Portland will have to become reality.
He’s being brought in to an MLS Cup contender to elevate the competition. The next step is his. |
ORAL TESTIMONY
OF
RICKI HELFER, CHAIRMAN
FEDERAL DEPOSIT INSURANCE CORPORATION
BEFORE THE
SUBCOMMITTEE ON CAPITAL MARKETS, SECURITIES,
AND GOVERNMENT SPONSORED ENTERPRISES
COMMITTEE ON BANKING AND FINANCIAL SERVICES
U.S. HOUSE OF REPRESENTATIVES
JUNE 26, 1996
Chairman Baker and members of the Subcommittee, thank
you for the opportunity to discuss the Federal Deposit Insurance
Corporation's (FDIC) "Survey of Nondeposit Investment Sales at
FDIC-Insured Institutions" (Survey). The Survey is the first
statistically reliable study of the practices of banks and thrift
institutions selling mutual funds, annuities, and other nondeposit
investment products. It provides a comprehensive overview of the
banking industry's compliance with the 1994 Interagency
Statement on Retail Sales of Nondeposit Investment Products,
which I will refer to as the Interagency Statement.
Since the early 1980s, mutual funds have been the fastest
growing segment of the financial services industry. As the federal
deposit insurer, the FDIC has a special interest in making sure that
customers do not confuse FDIC-insured deposits with nondeposit
investment products. There is some evidence that confusion about
deposit insurance coverage exists in the minds of customers
regardless of whether mutual funds are sold by banks and thrift
institutions or by securities firms. The FDIC study, however, was
limited to banks and thrifts.
My written testimony discusses why the FDIC conducted
the Survey, what it found and what steps the FDIC is taking, in
cooperation with other regulators, to address the concerns that it
raised. I submit that written testimony for the record and I will
summarize it here.
The Survey was conducted to measure the extent to which
banks and thrifts selling investment products were informing
customers of basic information.
As bank sales of nondeposit investment products increased
in the early 1990s, so did reports of confusion among bank
customers about whether federal deposit insurance
covers the products and who ultimately is responsible if there is a
loss in the investment. To lessen this confusion, the FDIC and the
other federal bank regulators issued the Interagency Statement.
It provides that three essential disclosures must be made:
(1) that a nondeposit investment product is not insured by the
FDIC; (2) that the product is not a deposit or other obligation of
the bank or thrift or otherwise guaranteed by the bank or thrift; and
(3) that the product is subject to investment risk, including possible
loss of principal.
The Survey showed that -- while most banks were making
most disclosures most of the time -- there is need for improvement.
The Survey consisted of in-person and telephone
"customer" inquiries by trained interviewers. Twenty-eight
percent of the "customer" interviewers who inquired about
investment products in-person were not told that nondeposit
investment products lack FDIC insurance, and 55 percent of
interviewers who inquired by telephone did not receive that
disclosure.
Moreover, 30 percent of the in-person "customers" were
not informed that nondeposit investment products are not backed
by the bank or thrift and 60 percent of telephone "customers" were
not told this information.
Finally, 10 percent of the in-person "customers" at the bank
or thrift were not told about the risks associated with the
investments -- including loss of principal -- and 38 percent of the
telephone callers failed to receive this disclosure.
To address the areas of concern identified in the Survey,
the FDIC is taking immediate steps aimed at improving the
industry's disclosure and other sales practices.
First, the FDIC will provide training for bank and thrift
employees on what the Interagency Statement says and how to
follow the guidance it gives. I am convinced that banks and thrifts
recognize that it is important to make complete and timely
disclosures to customers when they sell uninsured products and
that they will take advantage of this training.
Second, the FDIC and other federal banking agencies are
reviewing the Interagency Statement for possible revisions to
clarify what constitutes a sales presentation, when it begins and at
what point disclosures are required.
Third, the FDIC is working with other regulators to require
that all bank employees selling nondeposit investment products
meet the securities industry's basic qualification, testing, reporting
and continuing education requirements.
Fourth, the FDIC is increasing its response to complaints
from bank and thrift customers about sales practices for these
products -- including referring complaints to appropriate
regulators.
Fifth, the FDIC is revising its examination guidelines and
increasing examiner training in the areas covered by the
Interagency Statement.
Sixth, the FDIC will continue to coordinate with the federal
and state banking and securities regulators, the Securities and
Exchange Commission and the National Association of Securities
Dealers to ensure that the rules and guidance governing sales of
nondeposit investment products at banks and thrifts are applied
consistently.
In conclusion, Mr. Baker and members of the
Subcommittee, the steps that I have outlined will help ensure that
banks and thrifts provide their customers with sufficient, timely
information to make informed investment decisions. I look
forward to answering your questions. |
<?xml version='1.0' encoding='iso-8859-1'?>
<!doctype html public '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'>
<html xmlns='http://www.w3c.org/1999/xhtml' lang='en-us'>
<head>
<title>
ListRemoteDevices2.c
</title>
<meta http-equiv='content-type' content='text/html;iso-8859-1'/>
<meta name='generator' content='motley-tools 1.9.4 13:40:33 Feb 18 2015'/>
<meta name='author' content='cmaier@cmassoc.net'/>
<meta name='robots' content='noindex,nofollow'/>
<link href='toolkit.css' rel='stylesheet' type='text/css'/>
</head>
<body>
<div class='headerlink'>
[<a href='ListRemoteDevices1.c.html' title=' ListRemoteDevices1.c '>PREV</a>]
[<a href='toolkit.html' title=' Index '>HOME</a>]
[<a href='ListRemoteDevices.c.html' title=' ListRemoteDevices.c '>NEXT</a>]
</div>
<pre>
/*====================================================================*
*
* Copyright (c) 2013 Qualcomm Atheros, Inc.
*
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or
* without modification, are permitted (subject to the limitations
* in the disclaimer below) provided that the following conditions
* are met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials
* provided with the distribution.
*
* * Neither the name of Qualcomm Atheros nor the names of
* its contributors may be used to endorse or promote products
* derived from this software without specific prior written
* permission.
*
* NO EXPRESS OR IMPLIED LICENSES TO ANY PARTY'S PATENT RIGHTS ARE
* GRANTED BY THIS LICENSE. THIS SOFTWARE IS PROVIDED BY THE
* COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
* OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*--------------------------------------------------------------------*/
/*====================================================================*
*
* signed ListRemoteDevices2 (struct plc * plc, char const * space, char const * comma);
*
* print neighbor device list on stdout;
*
*
* Contributor(s):
* Charles Maier <cmaier@qca.qualcomm.com>
* Matthieu Poullet <m.poullet@avm.de>
*
*--------------------------------------------------------------------*/
#ifndef LISTREMOTEDEVICES2_SOURCE
#define LISTREMOTEDEVICES2_SOURCE
#include <stdio.h>
#include "../tools/number.h"
#include "../tools/flags.h"
#include "../plc/plc.h"
signed ListRemoteDevices2 (struct plc * plc, char const * space, char const * comma)
{
struct channel * channel = (struct channel *)(plc->channel);
struct message * message = (struct message *)(plc->message);
ssize_t packetsize;
#ifndef __GNUC__
#pragma pack (push,1)
#endif
struct __packed vs_nw_info_request
{
struct ethernet_hdr ethernet;
struct qualcomm_fmi qualcomm;
}
* request = (struct vs_nw_info_request *)(message);
struct __packed vs_nw_info_confirm
{
struct ethernet_hdr ethernet;
struct qualcomm_fmi qualcomm;
uint8_t SUB_VERSION;
uint8_t Reserved;
uint16_t DATA_LEN;
uint8_t DATA [1];
}
* confirm = (struct vs_nw_info_confirm *)(message);
struct __packed station
{
uint8_t MAC [ETHER_ADDR_LEN];
uint8_t TEI;
uint8_t Reserved [3];
uint8_t BDA [ETHER_ADDR_LEN];
uint16_t AVGTX;
uint8_t COUPLING;
uint8_t Reserved3;
uint16_t AVGRX;
uint16_t Reserved4;
}
* station;
struct __packed network
{
uint8_t NID [7];
uint8_t Reserved1 [2];
uint8_t SNID;
uint8_t TEI;
uint8_t Reserved2 [4];
uint8_t ROLE;
uint8_t CCO_MAC [ETHER_ADDR_LEN];
uint8_t CCO_TEI;
uint8_t Reserved3 [3];
uint8_t NUMSTAS;
uint8_t Reserved4 [5];
struct station stations [1];
}
* network;
struct __packed networks
{
uint8_t Reserved;
uint8_t NUMAVLNS;
struct network networks [1];
}
* networks = (struct networks *) (confirm->DATA);
#ifndef __GNUC__
#pragma pack (pop)
#endif
memset (message, 0, sizeof (* message));
EthernetHeader (&request->ethernet, channel->peer, channel->host, channel->type);
QualcommHeader1 (&request->qualcomm, 1, (VS_NW_INFO | MMTYPE_REQ));
if (sendpacket (channel, message, (ETHER_MIN_LEN - ETHER_CRC_LEN)) <= 0)
{
return (-1);
}
while ((packetsize = readpacket (channel, message, sizeof (* message))) > 0)
{
if (UnwantedMessage (message, packetsize, 1, (VS_NW_INFO | MMTYPE_CNF)))
{
continue;
}
if (_anyset (plc->flags, PLC_BRIDGE_LIST))
{
hexout (request->ethernet.OSA, sizeof (request->ethernet.OSA), HEX_EXTENDER, 0, stdout);
if ((space) && (*space))
{
printf ("%s", space);
}
}
network = (struct network *)(&networks->networks);
while (networks->NUMAVLNS--)
{
station = (struct station *)(&network->stations);
while (network->NUMSTAS-- > 0)
{
if (_anyset (plc->flags, PLC_REMOTE_LIST))
{
hexout (station->MAC, sizeof (station->MAC), HEX_EXTENDER, 0, stdout);
if ((space) && (*space))
{
printf ("%s", space);
}
}
station++;
}
network = (struct network *)(station);
}
if ((comma) && (*comma))
{
printf ("%s", comma);
}
}
return (0);
}
#endif
</pre>
<div class='footerlink'>
[<a href='ListRemoteDevices1.c.html' title=' ListRemoteDevices1.c '>PREV</a>]
[<a href='toolkit.html' title=' Index '>HOME</a>]
[<a href='ListRemoteDevices.c.html' title=' ListRemoteDevices.c '>NEXT</a>]
</div>
</body>
</html>
|
I wrote, “The Final Feast”, not to tell believers exactly how to become a Tabernacle Christian but rather to help those interested personally explore this undiscovered country. Learn about the spiritual fulfillment of the Feast of Tabernacles and Divine Love here…
God’s Wife
Behold, I have set before thee an open door, and no man can shut it
There is a heavenly doorway, which Esther and I have ventured through, which leads to a vista we have not seen before (or at least not clearly.) It is a level of intimacy with God we didn’t even know existed. It is, perhaps, the point of all creation. We, the Bride of Christ are to be the wife of God.
In the first century A.D. our Father demonstrated the union of God and man when the Holy Spirit overshadowed Mary. As a young virgin betrothed to Joseph, Mary found herself with child by God. This holy offspring, Jesus, was the result of the creator of the heavens and earth impregnating a human woman. This, our Creator, thought was proper and good in His sight.
The union of God and man
The point, though, of the way in which the second Adam came forth, is that God united with Mary physically. A sperm impregnating an ovum is the very definition of the end product of love-making. Moreover, since God is the creator of that whole process, He is intimately familiar with how it works and why He designed it that way.
If you believe your are the Bride of Christ, isn’t it time to realize that your relationship ends up love-making with our Creator? If that were not the case, then God would not use that motif of a bride and a marriage supper. Those who eschew intimacy, when it comes to God, are acting like a girl who refuses to kiss her husband on their wedding night. In fact, if you are truly God’s intended, the desire to be one with Him should be overwhelming at this point.
The children of God go astray
The way that God brings forth His children is through mating with Spiritual Connections as they become one with each other during sexual intercourse. The resulting offspring of those types of unions are literally the Children of God. Therefore, this is where the Devil tried to mess up God’s plan for mankind. It is written,
“And it came to pass, when men began to multiply on the face of the earth, and daughters were born unto them, that the sons of God saw the daughters of men that they were fair; and they took them wives of all which they chose. And the Lord said, My spirit shall not always strive with man, for that he also is flesh: yet his days shall be an hundred and twenty years.”
Genesis 6:1-3
The sons of God were those of the lineage of Adam. Those who were the daughters of men were of the lineage of Cain. Though Adam and Eve fell through sin, after the birth Seth’s son Enos, men began to call upon the name of the Lord and seek His face once again. God says,
“And to Seth, to him also there was born a son; and he called his name Enos: then began men to call upon the name of the Lord”
Genesis 4:2
Why God destroyed the world through a flood
What actually precipitated the flood was the mixture of those two lines. When the sons of Seth, the sons of God, began to marry the daughters of Cain, God had enough and said,
“…My spirit shall not always strive with man, for that he also is flesh: yet his days shall be an hundred and twenty years.”
Genesis 6:3
When we marry outside the will of our Father that we wreck His plan. When those of the lineage of Seth intermarried with the lineage of Cain, our Father felt His only option was to destroy the Earth and start over with Noah.
I said that to say this, if God destroyed the whole earth over people marrying contrary to His will, how dare we marry those He does not approve of? When we do, we mess up our lives and the future of our children. In short, we mess up God’s will and design for this world. In our day and age, just like in the days of Noah, marrying contrary to YHWH’s, ends in destruction. However, in our case, it is not a destruction of water, but of fire.
The wife of the Almighty
God created mankind to be His wife. We are called the Bride of Christ. Jesus is God incarnate, and we, as his body, are God incarnate too. A wife’s role, as evidenced by Eve, is to be a mother and a helpmate to her husband. We, taken as a whole, are to be the mother of all living in the world to come and a helpmate to God, bringing forth after His kind throughout eternity. God destinis us to literally populate the stars of heaven in that new cosmos. The children of the Most High worship Him spread across a boundless universe He creates anew.
What we are experiencing now is a titanic struggle for the destiny of God’s chosen mate. We are Seraphim of this creation. Satan, in his malevolence, desires to kill us through damning our souls to hell. Therefore, God sent Christ, the first-born of many brethren, to redeem us. God’s mate is who we actually are and this is the destiny the Devil tries to keep us from fulfilling.
Become one with God
We mate with God through mating with each other. As we join in the flesh, God joins with us and we become one in Him as His wife. This is what all love songs, in their basic form, allude to when they sing about love being eternal, or heaven being a place on Earth. Therefore, although the truth is all around us, we lack perspective and anointing to see it. Mating is, in fact, the very “point” of this creation. Literally everything mates, because God wanted to make sure we understand that He wants to mate.
With this is mind, reading through John chapter 15 and 17, we grasp the true depth of what Christ speaks about. No longer separating physical intimacy from worship, we love fully as God intended. Our idea of a pure relationship with God is updated to include the physical also. We learn that God always intended loving Him to be as deeply physical as it is spiritual. In fact, love-making in the Garden of Eden was the highest expression of worship possible.
If God kisses you, the Earth moves
Today, in many churches, manifestations (physical effects) of the Spirit are discouraged (if not outright banned). Ministers fear anything that looks remotely unseemly to the natural man. Thus they fall into the trap of rejecting intimacy among believers even when Spirit lead. This deprives God of the physical expression He created us for in the first place. The aim of Satan is to rob God of the love He wants to receive and give through His people.
The great apostasy is primarily a negative reaction to Divine Love. Many Christians are predisposed to reject all forms of intimacy. Thus when God moves upon His people to love one another in pure ways, which “look like” sin, the majority reject God’s Spirit. This is the tail of the Beast that very few believers see coming. Rebuffing Divine Love is the unexpected thing that causes a third of the stars to fall from heaven.
The apostle Paul says,
“Which things also we speak, not in the words which man’s wisdom teacheth, but which the Holy Ghost teacheth; comparing spiritual things with spiritual.”
1 Corinthians 2:13
In conclusion, understand that God leads and guides us through His Spirit and not through our natural minds. In order to receive the current word, we must learn to hear His voice and trust what He says above what we think is right. None of these truths are all that difficult to embrace and benefit from, but they do require a degree of trust and acceptance of God’s voice that most do not do not possess. Here is a truth,
“We become able to hear only as we are willing to obey”
Submission is the key to everything in God and only those who will put aside their own will and accept His will can truly see.
Finally, Divine Love is a far deeper and more expansive than anything this Earth has to offer. Divine Love is, in fact, as infinite as God Himself. Embrace God as He desires to be loved. As a wife yields to Her husband, we, as the wife of God, yield to the advances of our lover too. As a man touches the secret places of a new wife for the first time, her body reacts. Therefore, do not fear physical manifestations, for they are the natural by-product of our Lord’s spiritual love. Of course we are going to have reactions to the intimate advances of our Creator. It is, in fact, the most natural thing in the whole Universe.
Discussion (4) ¬
People tend to call anything beyond normal Christian doctrine gnostic, mystical, or heretical. People who know salvation but not Holy Spirit baptism reject speaking in other tongues as “out there” or “unbiblical”. Those who speak in tongues do the same to those they feel are beyond their theological comfort zone too. While I view where I am at as perfectly normal in the things of God, many who have not experienced these truths may be tempted to label them as mystical.
However, none of this is mystical. None of what I write is special, secret knowledge that only a slelect few can possess. Neither are these things heretical. In fact, it is those who look askance at these writings who are, many times, unknowing heretics.
While I, on one hand, take the theology of the Lamb’s wife to is logical conclusion, others who oppose this notion are avid polytheists who believe in a triune God. Some, who are aghast at the intimate nature of our relationship with our Creator, think that tongues and miracles have ceased, thus denying the very gift of the Holy Spirit. Still others, who count themselves more doctrinally correct than I, reject the catching away of the saints and think staying around for the tribulation makes them better Christians.
The depth of understanding of God through revelation never ends. If I seem “out there” to you, know that I have barely scratched the surface of who God really is and what His plan for us entails. The Rhema of God is as infinite as He is and there will be no day, now or in eternity, that we will come to the end of our Father.
A man does not bring a wife into his home to live with him, without having an intimate relationship with her. Likewise, God is not bringing us into eternity without having an intimate relationship with us either. We should get over our Victorian concepts of purity equaling chastity. True purity is, in fact, as sensuous as the Eve in the Garden of Eden, because God created it to be so. Purity is being in right relationship with God in whatever way He desires. Mary, the mother of Christ, was pure in that she bore Jesus while married to another man. God did not violate their marriage vows, but fulfilled them in the way He meant them to be from the very beginning.
This fulfillment of Bridal Theology is not radical, it is merely factual. God designed mating to be a union between man and Himself. Mary, in a very literal sense, is the first born among God’s many wives of this creation. She is the restoration of YHWH meant Eve to be. Though she bore the son of God through immaculate conception, the sons of God are born through Spiritual conception that goes hand in hand with physical procreation. This is the full restoration of Edenic love.
The majority are almost always wrong. This is because the majority walk after the flesh and do not walk in the Spirit. Walking in the Spirit is very simple: you listen to what God says to you personally, accepting and obeying His voice. There is nothing more to being Spirit led than that. It is natural minded men who make following God complicated.
The reason some things begin to sound “mystic” is that our ability to describe heavenly things though earthly language fails at some point. We find, after a certain level, that we can only approximate what we see and experience. This is why God is better felt than telt. Only through actual experience with Him can we truly know Him.
The church of Philadelphia is different than the church of Laodicea becuase is in love with God and the other is in love with itself. Therefore, one is caught up to heaven and escapes the tribulation while the other gives their lives as martyrs in it. This is a very real choice that all of us will face in the not too distant future. Those who imagine themselves strong enough to endure the wrath of Satan personified are deceived already. Though many are refined and purified through persecution, giving up their lives rather than bending knee to worship the image of the Beast, is a terrible price to pay.
It is time to shake ourselves and remember who we are in God. Recognize the day of your visitation and become the wife you are meant to be. Let’s open up to our heavenly lover and please Him in whatever way He desires. The door is opening, trim your lamps, and enter into the marriage feast of the Lamb with joy and thanksgiving.
I have been thinking more about Mary and God. It seems I am missing something here that is really important. I don’t know quite what it is though. I mean, other than Jesus himself, is there any more important event in human history? The conception of the Messiah was miraculous in every way possible and it done between an infinite, all knowing, all powerful God and a human woman.
What was the picture God desired to show the world through their union? Of course, it was the issue of their union that is demonstrates the union between God and mankind. However, why was it done in just this way? After all, the first Adam was simply formed out of the dust of the earth. Eve was taken from Adam and made a living soul. Yet, the creation of Jesus warranted the most intimate act possible.
Then we have the Bride of Christ portrayed as a chase virgin who is betrothed to God incarnate in the person of His son Jesus Christ. Mary, is perhaps the greatest picture of God plan for mankind there is in scripture. She was young, a virgin, and chosen by God to bear His son. If she is to represent what God wishes to do with the whole human race, then it is important we understand who and what she is to our Father.
Brides, if successful, become wives. It is the natural order of things. Therefore, if God has chosen to describe us as a bride, then it is logical to assume that we will become a wife. God took marry as a wife and implanted His seed in her womb. She bore the Messiah, Jesus, who was the first born among many brethren. If mankind is a going to be God’s wife, then we will bring forth His children.
How do you bring forth a child of God? You mate according to His Spirit. When you are led by the Holy Ghost and you procreate, the baby is literally the child of God brought forth by His Spirit through you. Likewise, in the New Heavens and New Earth, we will bring forth according to the Spirit throughout all eternity and fill the new creation with the children of God. Our Father will bring forth after His kind.
What is the benefit of deeper revelation? After all, most of us are not living up to a fraction of what we already understand. Therefore, what does knowing more about God help?
For me, the benefit of knowing the deeper things of God is perspective. Right now, many are operating in almost total darkness even though they believe they possess The Light. Dogma has obscured a great deal of the truth and natural minded thinking darkens the rest. We do not even understand something as fundamental as the Bride of Christ, even though we all want to be part of it.
Currently, what most of us believe is man’s thinking and not the actual meaning of the scriptures. We have been separated from the truth of who God is and what He actually wants by centuries of error layered so thickly we can hardly make out the form of what it once was. Theologians, for the most part, are the epitome of natural minded men, tending to rely upon their intellects to parse out the meaning of the scriptures. They have become the blind leaders of the blind of our generation leading many astray.
Instead of trying to dig through all the muck and crust of man’s traditions, we can simply open ourselves up to His revelation for today and get a fresh word. This word, will of course agree with what our Father has already stated through His prophets, but it will likely not agree with our dogma.
This is where the problem for most people arises. Do we accept God as He chooses to come to us or do we hold on to what we have been told? Truth is, we are in virtually the same place the majority of the religious Jews were in first century. today, when Jesus comes in the guise of the Body of Christ, those who are doctors of the law face the same choice.
As I have been ponding why God overshadowed Mary, the point of that was our Father mating with mankind. God and Marry united is a very profound picture of that. Simply put, God wants to mate and bring forth after His kind through us. This was the reason for and is still the point of creation. This is what Satan tried to take away from our Father when he tempted Eve.
This is important to understand because we need to allow God to be Himself in our lives, not just what we want Him to be or what we find acceptable. Truth is, our Creator deliberated chose to impregnate a young woman. YHWH did this for a very specific and profound reason. Though the most obvious reason was to produce Christ, the picture that He painted through that union is also very important to understand and acknowledge.
Due to Christianity’s abhorrence of all things intimate, especial when it comes to God, we tend not to refuse to consider the true meaning of God’s union with Mary. That is what people emphasize the “immaculate” conception. They want to scrub what happened to Mary of all sexual connotations so that she can be acceptable to their idea of holiness.
However, what if Mary had an orgasm? Would that be so bad or inconceivable? What if she enjoyed being impregnated by God? Though it did not happen the usual way, (for she was a virgin at Christ’s birth) it does not mean that there was no physical feeling when it happened. We do not know if there was, but would it be “unholy” being impregnated by God felt good? No, of course not, but most people cannot talk about that because sex = shame.
That type of thinking obscures our ability to see what God is showing us through His union with a human woman. Sex does not equal shame and, in fact, quite the opposite is true. Sexual union is what God created for us in the first place. Our ability to procreate (which is in reality co-creating) is the focal point of our existence. God wants us to mate and He wants to be intimately the integrally part of it. This is the picture that Mary presents to us and signifies.
In conclusion, coming close to God as a bride implies current and future intimacy. We should not be shy about it, but eager to please our Bridegroom in whatever way He desires. If he shares intimate things with us, then we should be honored and spiritually turned on. God made the way of a man with a maid wondrous because it is a picture of how He wants to be with His bride. Most of the time, when a woman is naked and unashamed is when she is with her true mate and is about to give herself to him. Likewise, becoming naked and unashamed with God is a prelude to intimacy also.
Finally, hiding yourself from intimacy virtually garrantees that you will miss out on being part of the Bride of Christ in these last days. Rejection of the advances of our God leaves you only one place to go, into the arms of Satan. Many are so primed to reject godly intimacy as sin, due to false puritanical teaching, that they will persecute the very God they claim to serve when He tries to love them through His body. |
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using Eto.Drawing;
using aa = Android.App;
using ac = Android.Content;
using ao = Android.OS;
using ar = Android.Runtime;
using av = Android.Views;
using aw = Android.Widget;
using ag = Android.Graphics;
namespace Eto.Android.Drawing
{
/// <summary>
/// Handler for <see cref="SolidBrush"/>
/// </summary>
/// <copyright>(c) 2013 by Vivek Jhaveri</copyright>
/// <license type="BSD-3">See LICENSE for full terms</license>
public class SolidBrushHandler : BrushHandler, SolidBrush.IHandler
{
public object Create(Color color)
{
var result = new ag.Paint
{
Color = color.ToAndroid(),
};
result.SetStyle(ag.Paint.Style.Fill);
return result;
}
public Color GetColor(SolidBrush widget)
{
return ((ag.Paint)widget.ControlObject).Color.ToEto();
}
public void SetColor(SolidBrush widget, Color color)
{
throw new NotImplementedException();
}
public override ag.Paint GetPaint(Brush brush)
{
return (ag.Paint)brush.ControlObject;
}
}
} |
tagline
Dear Nikki,
My body’s okay, but I don’t like how it looks. I know I’m not THAT fat, but my best friend is thin, flexible and everybody admires her and I’m just hidden. Nobody cares about me. I’m useless at everything. So basically:
• I’m un Read More
Hey Nikki! Summer is almost ending and I'm so scared about school starting!! WHY!? Because I really want my two BFFs to be in my class!!! We’ve been together since forever!! What do I do? I need help!
BFF Separation Anxiety
Hi BFF Se Read More
Brandon, I feel SUPER guilty about this. This guy in my class likes me, and my BFF has a HOPELESS crush on him!! On the last day of school, we were cleaning up the classroom, and he wanted to be my helper. But, then my friend got SUPER mad and Read More
Hey Brandon! I used to live in Delaware, but then I moved to Texas. I REALLY, REALLY, REALLY miss my BFF. And since we’re so far away, our parents won't take us to visit each other. I know we can FaceTime, but is that really the same? I've made f Read More
Hi Nikki,
I need your help! Sometimes I feel like the whole world is against me. I used to have friends who were the snotty, unsmart sort of girls, and not to brag or anything, but very unlike me. I started leaving them and hanging out in the Read More
Dear Nikki,
I just blabbed to my BFF’s crush that I liked him right before she was about to ask him to the school dance. And now, I feel like such a TRAITOR! What should I do?
Total Traitor
Hi Total Traitor,
Okay, this is not go Read More |
The N64 Hori Mini Pad is considered to be the holy grail of N64 controllers by many enthusiasts, but does it really live up to its reputation?
Designed by esteemed gaming-peripheral maker Hori, the N64 Hori Mini Pad was released exclusively in Japan late in the N64’s life. It has since become a highly sought-after controller for serious N64 collectors as a result of its quality. Given the controller’s exclusively Japanese origins, finding one nowadays is usually difficult and expensive. Nevertheless, players the world over praise the pad for its bespoke design and joystick.
Should you sink your hard-earned cash into one of these exotic pads? The short answer is yes, provided you accept both its relatively high asking price and that it is not the be all and end all of N64 controllers. While it does have a great design and more comfortable joystick, it doesn’t work as well as it should with some games. The official N64 controller may not be as durable, but it’s certainly more reliable in terms of accuracy and usability across the N64’s software library.
The N64 Hori Mini Pad’s design
The N64 Hori Mini Pad was released in 11 different colours, but all these variants are functionally identical.
One of the most noticeable things that sets the N64 Hori Mini Pad apart from the official N64 controller is that it only has two handle prongs as opposed to three. As a result, some of the face buttons are re-located: the joystick nows sits to the left, the D-pad is in the centre, and the Z-button is in fact split into two shoulder buttons on both the left and right side.
These Z-buttons sit underneath the L and R buttons, and you only need to press one of these Z-buttons at a time (we assume there are two to give you a choice). The other buttons are positioned in the same way, albeit closer together due to N64 Hori Mini Pad being smaller.
It’s worth highlighting just how small the pad is both in comparison to the original N64 controller and in general. Gamers with large or long hands may find they have to claw their hands slightly to hold the pad and use all the buttons. Thankfully, the shoulder buttons are quite pronounced, meaning you can easily press them with the lower part of your index fingers if need be.
The D-pad’s central location is a plus for games that use it in addition to the joystick. It’s not ideal, however, for games that depend on it as the primary control, such as many fighting and puzzle games. Moreover, its small size and spongy feel mean it’s not as accurate as the more robust D-pad you’ll find on an official controller.
An expansion port for an N64 Rumble Pak or N64 Controller Pak is located on the underside of the controller and works exactly the same way that it does on all conventional N64 controllers.
The N64 Hori Mini Pad’s joystick
This is where the N64 Hori Mini Pad really stands out from other N64 controllers. The joystick is made from rubber and is similar to the Nintendo GameCube controller’s joystick, albeit larger and taller.
One of the great things about this design is that it’s not subject to the same wear and tear that traditional hard-plastic N64 controller joysticks are. We’ve had our N64 Hori Mini Pad for well over five years, and it’s still working just as well as the day we got it despite considerable usage. It’s much more comfortable against your fingers, and you can even perform the notorious Mario Party palm-spin without fear of getting blisters or grinding the stick into oblivion.
While the stick feels nicer to use, it’s unfortunately not as accurate when it comes to certain games because it’s more sensitive. When using this for player movement, it’s usually fine – 3D platformers, such as Super Mario 64 and Banjo-Kazooie, play really well with the N64 Hori Mini Pad. In some instances, the over-sensitive nature of the joystick actually enables you to move or turn faster than you normally would be able to (such as fast-running in one of Goemon’s Great Adventure town areas).
Problems arise, however, when playing games (or parts of games) that require very precise control. Aiming in GoldenEye 007 or Perfect Dark is incredibly difficult because you turn more rapidly, while manual aiming by pressing the R-button becomes almost useless. We encountered a similar problem in Star Wars: Rogue Squadron and Star Wars Episode 1: Battle for Naboo, although not when it came to Star Fox 64. Therefore, it varies depending on the game, which presents another problem: the only definitive way to determine whether a game is N64 Hori Mini Pad-friendly is to try it out.
Should you buy an N64 Hori Mini Pad?
Whether or not you get an N64 Hori Mini Pad depends on two things:
What types of games do you play? How much are you willing to spend on an N64 controller?
As we’ve already noted further up in our review, if you typically play platforming games or games where intricate precision isn’t required then this controller is a great investment. It’s comfortable, sports a more modern design and the stick is considerably more durable than that of the official N64 controller.
However, you won’t get favourable results with all games, typically first- and third-person shooters, fighting games and 2D-sidescrolling games. This is because of the joystick’s high sensitivity and the D-pad’s size and central placement on the face of the pad.
On top of this, the N64 Hori Mini Pad is not a cheap investment, nor is it easy to get hold of one. At the time of writing (May 2017), you can expect to pay around £75/€85/$100 USD for an unboxed N64 Hori Mini Pad on eBay (Buy It Now listing), and auction listings climb up to similar prices too. Moreover, most of these pads are still found in Japan, meaning you may end up having to pay an import/customs tax on top.
The N64 Hori Mini Pad is an interesting part of N64 history, and an item that’s no doubt very appealing to hardcore collectors and enthusiasts. It looks and feels great, and solves the durability issue of the original N64 controller’s joystick, while introducing a whole new problem: over-sensitivity. It’s still a great controller, but it’s fair to say that it doesn’t live up to its revered status in the N64 community, and you should definitely consider the caveats we’ve raised before purchasing one. |
[Plasma lipoproteins in humans: metabolism and relation to atherosclerosis].
For a better understanding of atherogenesis it is important to consider the results from basic research in pathophysiology, pathobiochemistry and clinical research with special focus on the endothelium, the smooth muscle cells, macrophages, platelets and the plasma lipoproteins. The penetration of low-density lipoproteins through the endothelium, the contact of these particles with the potential foam cells, the effect of various cellular migratory and growth factors, the prostaglandin system and the hormonal status are important factors in the mechanisms leading to the formation of the atherosclerostic plaque. Disturbances in lipid metabolism are rarely recognized by signs such as formation of xanthomata. Even the measurement of plasma lipids does not always allow conclusions to be drawn with regard to the complicated relationship between lipoprotein concentrations and their potential risk. To estimate this risk biochemical and clinical interpretation must be performed individually and under consideration of various factors. This also holds true for the choice of therapeutical management. The therapy of lipid metabolism has to be an approach to the therapy of atherosclerosis with reduction of elevated low-density lipoprotein concentrations as the most important goal. Therapeutic management should be individually assessed, taking all known risk factors into account. |
Stochastic reduction method for biological chemical kinetics using time-scale separation.
Many processes in cell biology encode and process information and enact responses by modulating the concentrations of biological molecules. Such modulations serve functions ranging from encoding and transmitting information about external stimuli to regulating internal metabolic states. To understand how such processes operate requires gaining insights into the basic mechanisms by which biochemical species interact and respond to internal and external perturbations. One approach is to model the biochemical species concentrations through the van Kampen Linear Noise Equations, which account for the change in biochemical concentrations from reactions and account for fluctuations in concentrations. For many systems, the Linear Noise Equations exhibit stiffness as a consequence of the chemical reactions occurring at significantly different rates. This presents challenges in the analysis of the kinetics and in performing efficient numerical simulations. To deal with this source of stiffness and to obtain reduced models more amenable to analysis, we present a systematic procedure for obtaining effective stochastic dynamics for the chemical species having relatively slow characteristic time scales while eliminating representations of the chemical species having relatively fast characteristic time scales. To demonstrate the applicability of this multiscale technique in the context of Linear Noise Equations, the reduction is applied to models of gene regulatory networks. Results are presented which compare numerical results for the full system to the reduced descriptions. The presented stochastic reduction procedure provides a potentially versatile tool for systematically obtaining reduced approximations of Linear Noise Equations. |
1560s in England
Events from the 1560s in England.
Incumbents
Monarch – Elizabeth I
Parliament – 2nd of Queen Elizabeth I (starting 11 January 1563, until 2 January 1567)
Events
1560
27 February – Treaty of Berwick: Terms agreed with the Lords of the Congregation in the Kingdom of Scotland for English forces to enter Scotland to expel French troops defending the Regency of Mary of Guise.
6 July – Treaty of Edinburgh between England, France and Scotland, ending the Siege of Leith. The French withdraw from Scotland, largely ending the Auld Alliance between the two countries, and recognise Elizabeth I of England.
1561
4 June – Old St Paul's Cathedral in London is badly damaged by fire and the spire is destroyed after being struck by lightning.
August – English merchant Anthony Jenkinson arrives in Moscow on his second expedition to the Grand Duchy of Moscow.
Reform of coinage to combat debasement.
First publication (anonymously in London) of William Baldwin's Beware the Cat (written 1553), an early example of extended fiction (and specifically of horror fiction) in English. This edition appears to have been suppressed and no copies survive.
1562
18 January – first performance of Thomas Norton and Thomas Sackville's play Gorboduc before Queen Elizabeth I. It is the first known English tragedy and the first English language play to employ blank verse.
March – Anthony Jenkinson has an audience with Ivan the Terrible in Moscow before continuing his expedition to Qazvin, capital of the Safavid dynasty in Persia.
20 September – Treaty of Hampton Court between Queen Elizabeth and Huguenot leader Louis, Prince of Condé.
October – John Hawkins initiates the trans-Atlantic slave trade, shipping slaves from Sierra Leone to Hispaniola.
4 October – English troops occupy Le Havre in France in aid of the Huguenots.
Church of England approves the Thirty-Nine Articles of Religion, defining its doctrinal stance.
Publication of the metrical psalter The Whole Booke of Psalmes, Collected into English Meter, compiled mostly by Thomas Sternhold and John Hopkins and printed by John Day.
Dudley Grammar School established and Gresham's School granted a royal charter.
1563
March
Poor Relief Act requires wealthier parishes to help their poorer neighbours.
Publication of Foxe's Book of Martyrs, John Foxe's account of Protestant persecution during the reign of Mary I of England, printed by John Day in London.
April – Parliament passes laws requiring Justices of the Peace to arbitrate trade disputes and conditions of apprenticeship.
June to October – outbreak of plague in London kills over 20,000.
28 July – the English surrender Le Havre to the French after a siege.
Publication of John Shute's The First and Chief Groundes of Architecture, the first work in English on architecture.
1564
11 April – Treaty of Troyes: England receives monetary compensation for renouncing its claims to Calais.
30 April – consecration of new St Michael the Archangel parish church at Woodham Walter in Essex, probably the first new post-Reformation Church of England place of worship.
July – Anthony Jenkinson returns to London from his second expedition to the Grand Duchy of Moscow, having gained a considerable extension of trading rights for the English Muscovy Company.
1565
Thomas Gresham founds the Royal Exchange in London.
College of Physicians of London first licensed to carry out human dissection.
John Hawkins brings the first tobacco to England.
Protestant weavers from Flanders, fleeing persecution, settle in Colchester.
Hinchingbrooke School is established as Huntingdon Grammar School.
1566
Henry Sidney leads a punitive expedition to Ulster.
June – German miners find calamine (needed for production of brass) in the Mendip Hills.
Autumn – probable completion of the Exeter Canal, the first in England, and with the first use of a pound lock in England (engineer: John Trew of Glamorgan).
1567
2 January – Parliament dissolved as Queen Elizabeth refuses to name a successor.
John Brayne builds the Red Lion theatre just east of the City of London, a playhouse for touring productions and the first known to be purpose-built in the British Isles since Roman times. However, there is little evidence that the theatre survives beyond this summer's season.
Jean Carré arrives in England from Antwerp and obtains a royal monopoly for the production of window glass on condition that the techniques would be taught to native Englishmen.
Chatham Dockyard is established for the Royal Navy.
Rugby School is established under the will of grocer Lawrence Sheriff.
1568
16 May – Mary, Queen of Scots, flees across the Solway Firth from Scotland to England but is taken prisoner on 19 May and put in Carlisle Castle.
28 May – incorporation of two monopolies in metalliferous mining, the Society of Mines Royal and the Company of Mineral and Battery Works.
23 September – Battle of San Juan de Ulúa (Anglo-Spanish War): In the Gulf of Mexico, a Spanish fleet forces English privateers under John Hawkins to end their campaign.
26 September – Spain seizes English ships off the coast of Mexico, and confiscates their cargo.
October – The Bishops' Bible (The Holie Bible) published, a translation into English under the authority of the Church of England.
December – English seize bullion from Spanish ships at Plymouth.
1569
11 January–6 May – the first known lottery in England is drawn outside St Paul's Cathedral in the City of London. Each share costs ten shillings and proceeds are used to repair harbours and for other public works.
20 January – Mary, Queen of Scots, detained at Tutbury Castle.
After September – publication in London of Thomas Preston's tragedy Cambises.
November–December – Rising of the North: Charles Neville, 6th Earl of Westmorland and Thomas Percy, 7th Earl of Northumberland lead a rebellion against Queen Elizabeth I in an attempt to place the Catholic Mary, Queen of Scots, on the English throne. Walter Devereux, 1st Earl of Essex drives the Earls out of England.
First publication of Henry de Bracton's De legibus & consuetudinibus Angliæ ("On the Laws and Customs of England", left unfinished at Bracton's death c.1268).
Undated
During the decade Thomas Tallis composes his setting of the Lamentations of Jeremiah the Prophet for Maundy Thursday.
Births
1560
3 January – John Bois, Bible translator (died 1643)
19 September – Thomas Cavendish, explorer (died at sea 1592)
1561
22 January – Francis Bacon, philosopher, scientist, and statesman (died 1626)
June – Samuel Harsnett, Archbishop of York (died 1631)
20 June (baptised) – Richard Whitbourne, colonist of Newfoundland (died 1635)
23 June – Stephen Bachiler, non-conformist minister and pioneer settler of New England (died 1656)
4 August – John Harington, courtier, writer and inventor (died 1612)
24 August – Thomas Howard, 1st Earl of Suffolk (died 1626)
11 October (baptised) – Thomas Lake, Secretary of State to King James I (died 1630)
27 October – Mary Sidney, writer, patroness and translator (died 1621)
9 December – Edwin Sandys, founder of the colony of Virginia (died 1629)
1562
January – Edward Blount, printer (died 1632)
19 October – George Abbot, Archbishop of Canterbury (died 1633)
John Bull, composer (died 1628)
Henry Constable, poet (died 1613)
Samuel Daniel, poet and historian (died 1619)
Francis Godwin, writer and prelate (died 1633)
Richard Neile, churchman (died 1640)
Henry Spelman, antiquary (died 1641)
1563
January – Penelope Blount, Countess of Devonshire, née Devereux (died 1607)
5 March – John Coke, politician (died 1644)
1 June – Robert Cecil, 1st Earl of Salisbury, statesman and spymaster (died 1612)
19 November – Robert Sidney, 1st Earl of Leicester, statesman (died 1626)
19 December – Lord William Howard (died 1640)
Charles Blount, 8th Baron Mountjoy (died 1606)
John Dowland, composer (died 1626)
Michael Drayton, poet (died 1631)
Robert Naunton, politician and writer (died 1635)
Josuah Sylvester, poet (died 1618)
1564
26 February (baptised) – Christopher Marlowe, poet and dramatist (died 1593)
20 March – Thomas Morton, bishop (died 1659)
26 April (baptised) – William Shakespeare, poet and dramatist (died 1616)
27 April – Henry Percy, 9th Earl of Northumberland (died 1632)
24 September – William Adams, navigator and samurai (died 1620)
22 November – Henry Brooke, 11th Baron Cobham, peer and traitor (died 1619)
Henry Chettle, dramatist (died 1607)
Thomas Shirley, adventurer and privateer (died 1620)
1565
10 February – Edmund Whitelocke, soldier and courtier (died 1608)
July – Ferdinando Gorges, colonial entrepreneur (died 1647)
10 November – Robert Devereux, 2nd Earl of Essex, politician (died 1601)
George Kirbye, composer (died 1634)
Francis Meres, churchman and author (died 1647)
Francis Tanfield, Governor of the South Falkland colony (year of death unknown)
1566
19 June – King James I of England (died 1625)
1 September – Edward Alleyn, actor (died 1626)
20 December – Edward Wightman, Anabaptist (burned at the stake 1612)
1567
12 February – Thomas Campion, poet and composer (died 1620)
27 February – William Alabaster, poet (died 1640)
17 September – Edward Sutton, 5th Baron Dudley, landowner (died 1643)
November – Thomas Nashe, poet (died 1600)
1568
30 March – Henry Wotton, author and diplomat (died 1639)
Richard Baker, chronicler (died 1645)
Edward Chichester, 1st Viscount Chichester (died 1648)
Gervase Markham, poet and writer (died 1637)
Robert Wintour, conspirator (hanged 1606)
1569
16 April – John Davies, poet and lawyer (died 1626)
September – Arthur Lake, Bishop of Bath and Wells, a translator of the King James Bible (died 1626)
William Monson, admiral (died 1643)
John Suckling, politician (died 1627)
Deaths
1560
8 September – Amy Robsart, noblewoman (born 1532)
December – John Sheppard, composer and organist (born 1515)
1561
1 September – Edward Waldegrave, politician and recusant (born c. 1516)
1562
Nicholas Grimald, poet and theologian (born 1519)
1563
9 June – William Paget, 1st Baron Paget, statesman (born 1506)
17 September – Henry Manners, 2nd Earl of Rutland, soldier (born 1526)
25 September – John Shute, architect
1565
18 July – Kat Ashley, née Katherine Champernowne, governess of Elizabeth I (born c. 1502)
14 October – Thomas Chaloner, statesman and poet (born 1521)
1566
13 July – Sir Thomas Hoby, diplomat and translator (born 1530)
31 October – Richard Edwardes, poet (born 1523)
1567
26 January – Nicholas Wotton, diplomat (born c. 1497)
12 June – Richard Rich, 1st Baron Rich, Lord Chancellor (born 1490)
16 September (buried) – Lawrence Sheriff, gentleman and grocer to Elizabeth I (born 1510)
Thomas Beccon, Protestant reformer (born 1511)
1568
15 January – Catherine Carey, Chief Lady of the Bedchamber to Elizabeth I (born c. 1526)
20 January – Myles Coverdale, Bible translator (born c. 1488)
26 January – Lady Catherine Grey, Countess of Hertford (born 1539)
19 March – Elizabeth Seymour, Lady Cromwell, noblewoman (born c. 1518)
7 July – William Turner, ornithologist and botanist (born 1508)
23 August – Thomas Wharton, 1st Baron Wharton (born 1495)
23 December – Roger Ascham, scholar, tutor of Elizabeth I (born 1515)
Henry Dudley, soldier, sailor, diplomat and conspirator (born 1517)
1569
5 September – Edmund Bonner, Bishop of London (born c. 1500)
References |
1945 Wisconsin Badgers football team
The 1945 Wisconsin Badgers football team was an American football team that represented the University of Wisconsin in the 1945 Big Ten Conference football season. The team compiled a 3–4–2 record (2–3–1 against conference opponents) and finished in sixth place in the Big Ten Conference. Harry Stuhldreher was in his 10th year as Wisconsin's head coach. The team led the Big Ten with an average of 310 yards of total offense per game.
Don Kindt tied for the lead in the Big Ten with 36 points scored, and Rex Johns led the conference with an average of 40.8 yards per punt. Tackle Clarence Esser received the team's most valuable player award. Esser also received first-team honors from the Associated Press on the 1945 All-Big Ten Conference football team. Jack Mead was the team captain.
The team played its home games at Camp Randall Stadium. During the 1945 season, the average attendance at home games was 32,666.
Schedule
References
Wisconsin Badgers
Category:Wisconsin Badgers football seasons
Badgers |
Malaysian Army
The Malaysian Army (; Jawi: تنترا دارت مليسيا) is the land component of the Malaysian Armed Forces. Steeped in British Army traditions, the Malaysian Army does not carry the title ‘royal’ () as do the Royal Malaysian Air Force and the Royal Malaysian Navy. Instead, the title is bestowed on selected army corps and regiments who have been accorded the honour by the Yang di-Pertuan Agong ('The King of Malaysia'), who is the Supreme Commander of the Malaysian Armed Forces.
History
The first military units in Malaysia can be traced back to the Penang Rifle Volunteers raised on 1 March 1861, and the Malay States Volunteer Rifles which existed from 1915 to 1936. The birth of the modern Malaysian Army came about when the Federal Council of the Federated Malay States passed the Malay Regiment Bill on 23 January 1933. This allowed the initial recruitment of 25 males for the First Experimental Malay Company on 1 March 1933. Major G. McI. S. Bruce of the Lincolnshire Regiment was the first Commanding Officer. By 1 January 1935, the Experimental Company became The Malay Regiment with a complement of 150 men. A battalion was formed on 1 January 1938 and eventually a second battalion on 1 December 1941. The 1st Bn Malay Regiment was famous for its defence of Opium Hill or Bukit Chandu in Singapore. The ‘Battle of Opium Hill’ on 14 February 1942 involved 42 soldiers commanded by Lt. Adnan Saidi who defended their position against attack from the 18th Division of the Japanese Imperial Army under Lt. Gen. Renya Mutaguchi. After World War II and during the Malayan Emergency, the number of battalions was increased to seven in the early 1950s.
The Kor Armor Diraja ('Royal Armoured Corps') can trace its roots to the formation on 1 September 1952 of the Federation Reconnaissance Squadron. It was later merged with the Federation Regiment to form the Federation Reconnaissance Corps. The name underwent a few transformations from the Malaysian Reconnaissance Corps (16 September 1967), Royal Malaysian Reconnaissance Corps (May 1979) to Royal Cavalry Corps (December 1979) and finally to Kor Armor Diraja on 8 December 1986. The Royal Ranger Regiment's lineage began in 1863 as the paramilitary Sarawak Rangers. Although the second in the order of precedence, it is the oldest active formation of the Army.
Profile
Flag
The flag of Malaysian Army has been introduced since the inception of Malaysia Army and has been in use till today. The shape of it is the combination of Malaysian Flag and Malaysian Army's crest. This flag is the symbol of pride and courageousness of the Malaysian Army.
The flag dimension is (height) and (wide). The flags are being flown from 6.30 am to 6.30 pm everyday based on certain protocol and honor.
Organisation and Structure
Tactical structure
The Malaysian Army currently has 18 Corps and Regiments. These are grouped into 3 main components — the Combat Element, the Combat Support Element and the Support Elements.
The Corps and Regiments are currently organised into five divisions. Three of which (the 2nd, 3rd and 4th Divisions) are based on the Malaysian Peninsular and placed under Western Field Army Headquarters, while the two (the 1st Division and 5th Division) are based on Malaysian Borneo and placed under Eastern Field Army Headquarters.
The 21st Special Service Group (the Army's special forces), 10th Parachute Brigade and the two Army Aviation Regiment are independent formations.
The Western Field Army Headquarters, Eastern Field Army Headquarters and two support commands (Army Training and Doctrine Headquarters, and Army Logistics Administration Headquarters) are placed under Army Headquarters (Army Command).
Chief of Army
The current Chief of Army () is General Dato’ Seri Panglima Ahmad Hasbullah Mohd Nawawi, who succeeded General Tan Sri Zulkiple Hj Kassim on 3 September 2018.
Rank Structure
The Malaysian Army uses a rank structure inherited from the British Army. The Malaysian Army rank structure has 17 levels from Private (Prebet) to General (Jeneral). These ranks are divided into 2 main groups — Officer (Pegawai) and Other Ranks (Lain-Lain Pangkat) which includes the Non-Commissioned Officer (Pegawai Tidak Tauliah — PTT) ranks.
Officers
LLP
Corps and Regiments
Rejimen Askar Melayu Diraja ('Royal Malay Regiment')
Rejimen Renjer Diraja ('Royal Ranger Regiment')
Rejimen Sempadan ('Border Regiment')
Kor Armor Diraja ('Royal Armoured Corps')
Rejimen Artileri Diraja ('Royal Artillery Regiment')
Rejimen Semboyan Diraja ('Royal Signals Regiment')
Kor Perkhidmatan Am ('General Services Corps')
Kor Polis Tentera Diraja ('Royal Military Police Corps')
Kor Kesihatan Diraja ('Royal Medical Corps')
Kor Risik Diraja ('Royal Intelligence Corps')
Kor Perkhidmatan Diraja ('Royal Logistics Corps')
Kor Ordnans Diraja ('Royal Ordnance Corps')
Rejimen Askar Jurutera Diraja ('Royal Engineer Regiment')
Kor Jurutera Letrik dan Jentera Diraja ('Royal Electrical and Mechanical Engineer Corps')
Kor Agama Angkatan Tentera ('Religious Corps of the Armed Forces of Malaysia')
Rejimen Askar Wataniah ('Territorial Army Regiment')
Grup Gerak Khas ('Special Service Group')
Pasukan Udara Tentera Darat ('Army Air Corps')
Combat Elements
Rejimen Askar Melayu Diraja
Rejimen Askar Melayu Diraja ('Royal Malay Regiment') is the most senior regiment of the Malaysian Army. Its ranks are recruited from amongst the Malay population. The Regiment has 26 battalions. The 1st Battalion, the most senior in the Regiment, currently undertakes ceremonial and Royal Guard duties. The remainder are configured as 19 Standard Infantry Battalions, three Mechanised Infantry Battalions and three Parachute Infantry Battalions. The regiment uses rifle green berets except the three airborne battalions that wear maroon berets.
The 19th Bn Royal Malay Regiment (Mech) was involved in the rescue of U.S. 75th Ranger Regiment and Delta Force operatives in Somalia during the Battle of Mogadishu. The unit of 32 Radpanzer Condor APCs and 113 men from MALBATT 1 went in with the U.S. 10th Mountain Division to rescue the trapped Rangers. Four APCs were immobilised and were destroyed by US helicopter gunships. 19 Royal Malay Regiment suffered 1 soldier killed in action (KIA), PFC Mat Aznan Awang while 8 others were wounded in action (WIA). PFC Mat Aznan Awang was later promoted posthumously to Corporal and was awarded with Pingat Seri Pahlawan Gagah Perkasa, the nation's highest gallantry award. In total, 7 officers and 26 NCOs were awarded various medals for their valour during the operation, the highest number of men recommended for medals in a single unit in a single operation.
Rejimen Renjer Diraja
Rejimen Renjer Diraja ('Royal Ranger Regiment') is a multi-racial unit organised along similar lines to the Rejimen Askar Melayu Diraja. There are currently 10 battalions within this regiment. The Regiment traces its roots to the Sarawak Rangers and the Sarawak Constabulary, famed jungle trackers who had a deadly reputation during the Malayan Emergency and during the Communist Party of Malaya’s insurgency in Malaysia. The 8th Bn Royal Ranger Regiment (8 Renjer) was the first infantry battalion in the Malaysian Army to undergo conversion into an airborne battalion. The unit is currently assigned to the elite 10th Parachute Brigade. The Malaysian Army's most decorated soldier, WOI (Rtd) Kanang anak Langkau was a Regimental Sergeant Major of 8 Ranger.
Rejimen Sempadan
Rejimen Sempadan ('Border Regiment') is a newly created regiment from the 300 series Territorial Army units in charge of the border. The Deputy Prime Minister and Defence Minister, Najib Razak, announced on 1 July 2006 the formation of a new regiment specifically for border patrol. Members of the regiment will be taken from various regiments and corps, most notably from the Rejimen Askar Wataniah. It is believed that the army will form about 2 to 3 brigades of this new regiment. The new regiment was officially raised on 9 February 2008 by Najib Razak at Tanah Merah, Kelantan.
Kor Armor Diraja
Kor Armor Diraja ('Royal Armoured Corps) provides the armour capability for the Malaysian Army. Currently, the Corps consists of 5 battalions (sometimes referred to as Regiments), which are equipped with various armoured personnel carriers (SIBMAS AFSV-90, Rheinmetall Condor, K-200 MIFV) and light combat vehicles. Rejimen ke-11 of the Kor Armor Diraja is the sole user of 48 PT-91M Main Battle Tanks from Poland.
Combat Support ElementsRejimen Artileri DirajaRejimen Artileri Diraja (Royal Artillery Regiment') is the artillery corps of the Malaysian Army and provides artillery support and local air defence for army units. The regiment is equipped with 36 Brazilian-made Astros II multiple launch rocket systems (MLRS) and 28 G5 MkIII towed artillery guns from South Africa. Air defence is provided using a mix of Swiss Oerlikon twin 35 mm and Swedish Bofors 40 mm anti-aircraft artillery and missile systems such as the Jernas and Starburst from the UK, Anza from Pakistan, FN-6 from China and Igla from Russia. Malaysia committed to purchase Starstreak V-Shorads missiles from the UK in 2015.Rejimen Semboyan Diraja
Rejimen Semboyan Diraja ('Royal Signals Regiment') is in charge of strategic communication, tactical communications, electronic warfare and early warning systems such as radar.
Kor Polis Tentera Diraja
Kor Polis Tentera Diraja ('Royal Military Police Corps') deploys as part of the field army, in support of army operations, and enforces proper conduct among army personnel. Aside from being responsible for base security, the military police are also tasked with preventing and investigating criminal activities on army property or by military personnel.
Rejimen Askar Jurutera Diraja
Rejimen Askar Jurutera Diraja ('Royal Engineers Regiment') is tasked with demolitions, bridge-laying and the repair of military infrastructure, such as airbase runways, or clearing obstacles in emergency situations.
Kor Jurutera Letrik dan Jentera Diraja
Kor Jurutera Letrik dan Jentera Diraja ('Royal Electrical and Mechanical Engineers Corps') is responsible for the maintenance of all vehicles and machinery of the Malaysian Army.
Kor Risik Diraja
Kor Risik Diraja ('Royal Intelligence Corps') specialises in psychological warfare (psyops), surveillance, intelligence, reconnaissance and counter-intelligence operations. Aside from handling propaganda and counter-propaganda, the corps is also tasked with conducting background checks on recruits when they first enroll in any training courses. There are two Army combat elements attached to the Kor Risik Diraja.
Services Support Elements
Kor Ordnans Diraja
Kor Ordnans Diraja ('Royal Ordnance Corps') ensures that all military supplies and ordnance are stored, secured and inventoried properly.
Kor Agama Angkatan Tentera
Kor Agama Angkatan Tentera (KAGAT; 'Armed Forces Religious Corps') performs religious (chaplainry) services for Muslim and Christian personnel of the Malaysian Army. It also provides counselling and conducts ritual prayers on the battlefield.
Kor Perkhidmatan Diraja
Kor Perkhidmatan Diraja ('Royal Logistics Corps') is in charge of transporting troops and supplies to the various units of the Malaysian Army.
Kor Kesihatan Diraja
Kor Kesihatan Diraja ('Royal Medical Corps') provides training for Army medics and other specialists. It runs the Armed Forces hospitals and provides the battlefield mobile hospitals. The unit has also provided relief MALMEDTIMs (Malaysian Medical Teams) to Pakistan, Afghanistan, Western Sahara, Indonesia and Palestine.
Kor Perkhidmatan Am
Kor Perkhidmatan Am ('General Services Corps') handles administration and financial management for the entire army.
Elite Forces
21 Grup Gerak Khas
21 Grup Gerak Khas (21 GGK; '21st Special Service Group') is the Malaysian Army's special forces and commando unit. 21 GGK is one of the two Elite forces in the Malaysian Army. 21 GGK is the operational home of various specialists and the Commando battalions, which are capable of conducting unconventional warfare or special operations. One of the known foreign operations involving this regiment was in an attack by Somali militia on a convoy transporting UN Intelligence Chief in UNOSOM II on 18 July 1994. In the action, two members of the regiment were killed in action, while another four were wounded. One of the injured men was taken hostage by the militia and was released nine hours later.
10th Parachute Brigade
10th Parachute Brigade (10 Para) is an elite airborne unit tasked with being rapidly deployed inside or outside the boundaries of Malaysia. 10 Para is the key element of the Malaysian Rapid Deployment Force () and it is Malaysia primary main offensive force in time of war or emergencies.
Air Unit
Corps and Regiments of the Malaysian Army
Pasukan Udara Tentera Darat
Pasukan Udara Tentera Darat ('Army Air Corps') is the Army Aviation branch formed around a core of Royal Malaysian Air Force officers. This new Army formation is tasked with liaison duties, providing limited transport capabilities, close air support and also air reconnaissance using light observation helicopters. The unit currently has two squadron, 881 Army Aviation Regiment and 882 Army Aviation Regiment. The main Army Air Corps base is located in Kluang, Johor. As 2019, the Air Corps is equipped with 10 Agusta A109 light helicopters and 14 Sikorsky S61A-4 medium helicopter.
Reserves Unit
Rejimen Askar Wataniah
Rejimen Askar Wataniah ('Territorial Army Regiment') forms the second line of Malaysia's defence. Formed by college students, professionals and civilians, it provides support for the regular armed forces of Malaysia and is responsible for the security of key installations in times of conflict. Originally tasked with area and local defence, the Rejimen Askar Wataniah units have been reconfigured and will perform front line duties alongside regular units when the need arises. Rejimen Askar Wataniah units, such as armoured squadrons, are integral units of several Kor Armor Diraja regiments.
Rapid Reaction Infantry Battalion
Batalion Siap Sedia Tentera Darat
Batalion Siap Sedia Tentera Darat (BSSTD; 'Army Rapid Battalion ARB') is a combat ready battalion of the Malaysian Army. The ARB can be deployed to overseas conflict areas in short notice under order of the United Nations Department of Peacekeeping Operations (UN DPKO). The battalion consists of multiple capabilities, including special operations, armour, infantry and Chemical, biological, radiological and nuclear defence (CBRN defence). Currently, the 7th Battalion, Royal Ranger Regiment (Mechanised) (7 RRD (Mek)) is assigned as the main combat element for the ARB. The 7 RRD (Mek) is supported by various corps and regiments, including special ops operators from the Malaysian Army counter-terrorism regiment, the 11th Special Service Regiment.
Strength
The personnel strength of the Malaysian Army is approximately 80,000 personnel in the Active Army, 50,000 in the Active Reserve and 26,600 active and 244,700 reservists in the paramilitary.
The Malaysian Army consists of 5 infantry divisions, 10 infantry brigades, 1 special forces brigade, 1 airborne brigade and 1 mechanised brigade, composed of:
36 Light Infantry Battalions
4 Airborne Infantry Battalions
4 Mechanised Infantry Battalions
5 Armoured Battalions (1 Tank Regiment)
1 light tank squadron
14 Artillery Regiments (4 Air Defence)
3 Special Forces Regiments
3 field engineer regiments
1 construction engineer regiment
1 airborne infantry squadron
4 military police regiments
1 signals regiment
1 intelligence unit
2 helicopter squadrons
The territorial army includes:
16 light infantry regiments
4 specialist engineer regiments
Equipment
Present Development
Since the recovery from the 1997 economic crisis, Malaysian Army, along with other branches of the Malaysian Armed Forces, has regained momentum in its modernising programs. The first major procurement was to set a milestone by building its first ever main battle tank regiment. Malaysian Army received delivery of 48 PT-91M main battle tanks and other tank-based equipment, like ARV WZT-4 from Poland, fully completed contract of sale in March 2010. Despite adding some 28 units of South African G5 Mk III 155 mm howitzers, another major procurement was 18 units of Astros MLRS from Brazil, which delivery was completed in 2006. A second batch of 18 MRLS was ordered in 2007. Malaysian Army is also rapidly mechanising its current inventory - 267 Adnan IFVs (Infantry Fighting Vehicle) were acquired by the army in 2004 and 111 K200 KIFV also purchased. Following a more recent procurement of the Pakistani Bakhtar-Shikan Anti-armor missile launcher, these were installed on the Adnans.
Malaysian Army is now shifting its emphasis on enhancing its air wing. In September 2006, Malaysian Army received its 11th and last Agusta-Westland A109H Light Utility Helicopter. These helicopters are to initially complement, and ultimately replace, the ageing SA316B Aérospatiale Alouette III helicopters. Six of them were to be installed with light arms and to be tasked to a scout observation unit; a sample was shown in LIMA 07. The configuration of the remainder is unclear. Furthermore, the army will also receive S61A-4 Nuri multipurpose helicopters after they are retired from RMAF; these will form the backbone of the army’s very first air transport units - 881 and 882 squadrons of the army air wing. In the same year, at the biannual Defence Services Asia (DSA) 2006, Malaysia announced that the US made M4 Carbine service rifle will replace the Austrian-made Steyr AUG service rifle for all three Malaysian Armed Forces services. The army will receive the new weapon soon.
There is also a requirement for an upgrade to the current air defence network. However, a dispute between the army and the air force on whether to introduce a mid-range SAM system had led to the procurement being put on hold. According to a recent interview of the army’s chief of staff, Ismail bin Haji Jamaluddin, the army has no intention of taking over the mid-range air defence role. To boost the security in eastern Sabah from the attacks by militants in the southern Philippines, especially in the Sulu Sea, the Malaysian government has purchased a total of six McDonnell Douglas MD 500 Defender (MH-6 Little Bird) light attack helicopters from the United States for the Malaysian Army. Around 200 AV-4 Lipanbara 4x4 armoured vehicles that was intended to be stationed in east Malaysia were also currently being built after an agreement with a Thai company. The United States were also reportedly will deliver a total of 29 M109 howitzer artillery to the Malaysian Army. Malaysian defence company, the Global Komited has partnered with British air defence company, Thales for the distribution of surface-to-air missile to the Malaysian Army. While another Malaysian company AVP Engineering has teamed up with a South Korean-defence company Doosan DST to offer Black Fox 6x6 wheeled armoured vehicle if it was selected by the Malaysian government. Malaysia also locally produce
AV-8 Gempita 8x8 with technology assistance from Turkey. On October 2019, the contract and delivery of M109A5 to be canceled as the result the army has no interest anymore.
Future soldier system
The Malaysian Army currently has a soldier modernisation programme called the Future Soldier System. Under the FSS, The Malaysian Army plans to equip all soldiers with Personal Protection Equipment (PPE) such as Kevlar helmets, Kevlar vests, Oakley goggles and ear protection equipment. The programme also includes arming all the standard issue M4 carbines with SOPMOD kits, as well as equipping soldiers with a Glock series pistol. Sapura, a Malaysian electronics company, is offering their SAKTI soldier system concept via work in three areas: Head Sub-System (HSS), Body Sub-System (BSS) and Weapon Sub-System (WSS). The HSS consists of a Helmet–Mounted Micro Camera and night vision capability with a data output, helmet-mounted display and earpiece and microphone; the WSS consists of a Rifle Control Unit consisting of a five-button wireless controller for one handed use with key features including push to talk for the radio, switching the HMD on and off, turning the HMD brightness up and down as well as video transmission to friendly forces. The BSS consists of a controller system, energy unit with a power pack for the communication interface, micro-camera and HMD with a single polymer lithium ion battery for up to ten hours of operation; a communications interface for secure IP based radio which from the image is a Thales radio and finally a navigation unit with a display for blue force tracking and situational awareness, colour digital mapping and terrain and urban profile analysis. The system displayed is visually similar to the Kord Defence SmartGrip RIC developed in partnership with Thales Australia.
The FSS in conjunction with the NCO (Network Centric Operation) System, will give the three branches of the Armed Forces a shared situational awareness and a common operating picture via a X-band satellite-based link and a UAV system, with hopes to enable self-synchronisation for all three branches. The programme will go through several phases, with Phasa 1A (the implementation of the Mobile X-band satellite communication linked) and Phase 2 (the demonstration of the capibilities of the NCO with FSS) being successful and operational in 2017.
In 2018, during the annual DSA convention, the Malaysian Army showcased a joint exercise between the NCO systems via Army Operations Room and Soldiers equipped with FSS systems, where the Army Operations Room coordinated the Soldiers doing numerous activities, first being a live firing of a 3-man squad involving the usage of artillery and how precise the accuracy of the artilleries via the NCO and FSS equipment, second being in an Army Training centre, and last being a real simulation operation in East Malaysia.Currently, several combat elements such as the 12th Royal Malay Regiment and the 4th Mechanised Brigate are outfitted with the system.Through the use of this system, the Malaysian Army is able to operate anywhere throughout the world, especially during United Nations Operations.
See also
Malaysian Armed Forces
Royal Malaysian Navy
Royal Malaysian Air Force
Malaysia Coast Guard
Royal Malaysia Police
Royal Johor Military Force
Joint Forces Command
Notes
References
Works cited
External links
Malaysian Army Official Website
Malaysian Armed Forces Official Website
Malaysian Ministry of Defence Official Website
Category:Military of Malaysia
Category:Ministry of Defence (Malaysia)
Category:Military units and formations established in 1933
Category:1933 establishments in British Malaya |
Q:
OnBeforeUnload ajax request not working on IE8 a IE9
Hi I have been searching alot for a solution to be able to be able to send an ajax request when the user closes the browser.So far all I have found is the onBeforeUnload event.This is what I have so far:
$(window).bind('beforeunload', function () {
$.ajax({
type: 'GET',
async: false,
url: '/Home/Get/'
});
});
and I have also tryed using the native javascript:
window.onbeforeunload = function (e) {
$.ajax({
type: 'GET',
async: false,
url: '/Home/Get/'
});
};
Now my interesest is not to recieve back the callback I only want to be able to execute a method on the server side when the browser closes.
This seems to work reliable on chrome , firefox an IE10 , but it does not work on IE9 and IE8 at all.
Does anyone know a solution for this problem?
A:
You can try to use a synchronous request to do that.
Browsers may not wait an asynchronous request complete(or even established.)
here is another similar question here, please refer to it.
but there is one thing you should care about is: when using synchronous ajax call, user's browser will be blocked until the ajax call complete. It's not good for the user experience. And even worse, if your some bug happened in your server and the ajax request can not complete, the browser will be not responding. so be careful to do this!
BTW, for a good design, the server should not rely on the ajax request sent by the client to do some clean-up job. If you have to do such a job, use some other techniques, such as implementing a heartbeat mechanism.
|
Trip reports forum
After thirteen days in Thailand, two of which were spent in Bangkok and another travelling, I've been on Koh Samui for ten days without having gone snorkelling yet. For someone who plans to do my Divemasters on Koh Toa, this just won't do. This morning right after breakfast I decided it was time to get my fins wet, as I'm staying in Lamai with a view of the ocean, right on the edge of the bay. I took a walk down the concrete road, which turns into a gravel track, which turns into an eroded path, and made my way, with the assistance of a rope and a few branches, down to a secluded cove. The beach was less than 50m long and covered with broken coral, with two lines of rock going out to sea.
As I sat on the beach choosing an entry point, I started to get anxious. I'm not familiar with these waters and there was quite a bit of swell, although I've been out in much rougher water. Also, I saw fish jumping about 40m out, often they'll do this to try and escape a predator. I just sat watching the water for a long while, my anxiety rising, I don't often go out alone. After some time of seeing nothing unusual or frightening, I forced myself to stand up and don the mask and fins. There was no way I was chickening out of my first dive!
I chose to hug the rocks on the left as they jutted out of the ocean and I could see them better. Visibility was about eight meters, while not great, is good enough for some close up viewing. I made my way out slowly, following the rock wall. The coral shelf ended about 50m out, running parrallel to the shore, and dropped off from 3m to 6. I turned around and passed back over the corals, diving to get a closer look at the occasional angel or butterfly fish. I followed a clown fish back out along the wall, but lost him under a shelf. This was not the greatest snorkelling spot , but I was starting to enjoy myself out there.
Although I hadn't seen any, I thought there might be crayfish, there were certainly enough holes and overhangs for them to hide in. The thought that I might be able to bring one or two home for lunch was enough incentive for me to venture away from the rocks, and search the end of the reef. I'm not the greatest free diver, so 6m is about my limit on a single breath. I swam out, filled my lungs, and dived down the edge of the reef. The cave at the bottom seemed to run a long way, and I swam the few metres I could, checking under the shelf, no crays. I surfaced, breathing deeply, following the edge of the reef from above. Taking another deep breath, I dived again, finding another cave empty of bugs. Running out of air and heading for the surface, I saw something flash past me. It was grey, and big and close! Without even seeing it, my mind went SHARK, as if it had been waiting to think it! Sure enough, there behind me above the reef, was a 2.5m shark. My mind instantly flashed to a conversation I'd had with a friend two days before, about how I'm not really scared of sharks, especially in Thai waters. Turns out that was a load of rubbish. I was scared now!
I turned to track it, trying to recall everything I know about sharks. Species! Only some are dangerous to humans, what was this one? It had a light stripe running across its body, and black tipped fins. A Blacktipped Reefshark! Is that real shark, or is my mind just making up names? Is it dangerous? Dunno. Next worry is size, only a big shark will try and eat you. This one was as big as me, I had no doubt that he'd win in a fight. Behaviour? He was darting across the reef, turning back on himself sharply, and doing it again. Even I know enough about sharks to know that this was no well fed fish, he was a predator on a hunt.
In Scuba you're told the best place to be when you see a shark is on the bottom. If the shark bothers you, blow bubbles at it, bark at it and maybe punch it on the nose if it aggressive. Taking this advice I slowly descend, slowly because I know that splashing might attract its unwanted attention. At about three metres depth I realise that with no weightbelt, I'm going to have to fin down, and lose some air, I was just too bouyant to drop gently. Blowing out air and gently finning, I kept my eyes on the shark, still between me and the shore. Now with no air in my lungs, as I hadn't taken a big enough breath, I reach the seafloor, and realise what a stupid idea it was for me to try outlast a shark underwater. I started to ascend just as the shark turned and crossed the other side of me, out to deeper water. I lost track of him with the bad visibilty, but now my exit was open. I struck for shore, digging my fins deep so as not to splash, looking down past my body to ry and locate the shark, don't sharks circle their prey before they attack? Could there be more than one? I only saw one, but there might be more, don't some sharks hunt in groups? I was now on the reef the shark was hunting and panic set in. Not looking forward to see if my path was clear of rocks, I lost all sense of Good Shark Behaviour. I was splashing my fins with furious kicking, slapping my arms to the water, in a freestyle that turned into a desperate crawl when my hands touched the ground. Still not stopping, I swam until my chest touched sand, then jumping up, I backed out of the water.
On the beach I watched the sea, hoping to see some sign of the shark that had chased me out of the water, but nothing. Sitting there with an adrenalin headache and cramping calves, I felt a certain amount of shame, I really did think that I would handle my first shark sighting more smoothly than that. People dive with sharks all the time, children and old people do it. I'm an adventurous sort and want to be a diver, but nothing would have got me back in that water today.
While telling this story it was pointed out to me that a shark my size is not 2.5 to 3m long, its closer to 1.9m really, ok, so mine was less than 2m, but in the water it really did seem bigger! Also, online research reveals that while Black Tipped Reefsharks do exist, they only grow to about 1.8m and are not a big danger to divers. Good to know for next time.
The moral of the story to me is when that little voice in the back of your head talks to you (in this case "I just sat watching the water for a long while, my anxiety rising, I don't often go out alone. After some time of seeing nothing unusual or frightening, I forced myself to stand up and don the mask and fins. There was no way I was chickening out of my first dive!"), listen to it. Certain activities I think are best done with a partner - maybe this would be one of them.
Sorry for the late reply Dastott. I'm not sure how to describe where it was, but I'll try and direct you. If heading from Lamai along the main road towards Chaweng, pass The Buddy Hotel and The Spa, its a right turn just before the I.T. Centre, this is a big building of blue glass with a bright green lit pillar. The sign on the road is for the Rennaissance resory. Turn off the tar and on to the concrete road, go all the way past Rennaissance and a construction sight, up the hill and curve right. Follow past Cinnamon resort (right) and Silvadee (left). The road comes to an end, and you follow the track down to the beach.
Is it likely the shark will still be there? If you do make the trip let me know, I might want to join you. My number is 0860146285, although I don't often carry my phone around, but I'll check for messages.
Sorry for the late reply Dastott. I'm not sure how to describe where it was, but I'll try and direct you. If heading from Lamai along the main road towards Chaweng, pass The Buddy Hotel and The Spa, its a right turn just before the I.T. Centre, this is a big building of blue glass with a bright green lit pillar. The sign on the road is for the Rennaissance resory. Turn off the tar and on to the concrete road, go all the way past Rennaissance and a construction sight, up the hill and curve right. Follow past Cinnamon resort (right) and Silvadee (left). The road comes to an end, and you follow the track down to the beach.
Is it likely the shark will still be there? If you do make the trip let me know, I might want to join you. My number is 0860146285, although I don't often carry my phone around, but I'll check for messages.
nicely written! this reminds me of my stay on Phi Phi a month ago... it was the first time I went snorkeling in my life..; a Thai guy told me about Phi Phi's "Shark Point", I guess about 100m in front of Long Beach at the rocky formation there... I didn't believe him that they were so close to the shore (heck, never having snorkeled before, how should I know about reef sharks :) )..;so I went alone and enountered a Blacktip as well...quite scary but apparently there completely harmless
Seba
Sharks can actually swim very close to shore. When I was in Mogadischu, Somalia, we had a soldier get killed by a shark (shark bite sheared his leg off and he bled to death) in less than a 75 centimeters of water.
Please login to add a reply
You need to be a Travelfish member to be able to add a reply to this post. Please use the button below to log in. After logging in you'll be returned to this page automatically to add your post. Not a member? Join up here. |
Ascites in hepatitis C liver transplant recipients frequently occurs in the absence of advanced fibrosis.
Ascites after liver transplantation is uncommon (3-7%) but causes morbidity and mortality. Although hepatitis C (HCV), pretransplant ascites, encephalopathy and cold ischemia time have been identified as predictors, neither posttransplant renal function nor the severity of recurrent HCV (inflammatory grade; fibrosis stage) has been systematically assessed. Among 173 HCV transplants (1 January 1998 to 31 December 2002), 18 patients (10%) developed posttransplant ascites. Cox proportional hazards models identified recipient female gender (hazard ratio [HR]= 12.18; p = 0.0001), cold ischemia time (HR = 1.17 per incremental hour; p = 0.021) and posttransplant creatinine (Cr) (HR = 1.56 per incremental 1.0 mg/dL; p = 0.0052) as independent predictors. Ludwig-Batts inflammation grade (HR = 1.32; p = 0.36) and fibrosis stage (HR = 1.63; p = 0.12) were not significant predictors. The 18 recipients had 19 ascites episodes; 12/19 had fibrosis stage 0, 1 or 2 (10/12 with stage 0 or 1). All 12 lacked diagnostic parenchymal or vascular histopathology. Renal function at ascites diagnosis were similar for transplants with fibrosis stage 0, 1 or 2 versus 3 or 4 (1.8 +/- 1.6 vs. 1.6 +/- 0.6 mg/dL; Cr clearance 39.6 +/- 15.6 vs. 39.3 +/- 13.4 mL/min/1.73 m(2)). In conclusion, recipient female gender, cold ischemia time and poor posttransplant renal function were independent predictors of ascites after HCV liver transplantation. Two thirds of ascites episodes, however, occurred without significant fibrosis or histopathology. |
Q:
How to prevent JSF from initializing automatically?
When I create a web application from scratch and add jsf-api-2.2.11.jar and jsf-impl-2.2.11.jar to pom.xml (add them to apps classpath) and deploy it to Tomcat 7, JSf is initializing automatically:
INFO [j.e.r.w.j.config] - Mojarra 2.2.11 ( 20150505-0732 https://svn.java.net/svn/mojarra~svn/tags/2.2.11@14688) ..... initialized.
In older versions I used to start it declarativly by defining it in web.xml (listener+servlet). So I already commented them out and set "metadata-complete" to "true" (does that even stop classpath scanning?), but it is still loading.
In this case I dont want it to load, while leaving the Jars in classpath and i.e. the faces-config.xml in web-inf.
What is still triggering the initialization?
A:
It's loaded via a Servlet 3.0 ServletContainerInitializer implementation in the JSF implementation JAR file (in case of Mojarra, it's the com.sun.faces.config.FacesInitializer). It will auto-register the FacesServlet on the URL patterns *.jsf, *.faces and /faces/* (JSF 2.3 will add *.xhtml to the list of URL patterns). Latest JSF 2.1 implementations and all JSF 2.2 implementations will do it when deployed to a Servlet 3.0 compatible container. For detail about this new Servlet 3.0 ServletContainerInitializer thing, head to this answer: ServletContainerInitializer vs ServletContextListener.
The right way to stop it is removing the JSF implementation from the dependencies (note that you do not need to remove the JSF API as well). You seem to not be making use of it in any way. After all, a properly designed web application should not have any JSF implementation specific dependencies. I only wonder, why exactly would you leave the JSF API in? Using a 3rd party JSF based library for non-JSF purposes? This might indicate and end up in other (architectural) problems.
Another way of stopping it is downgrading your web application to be Servlet 2.5 targeted by editing the <web-app> root declaration in web.xml accordingly to comply that version. But this has many other side effects which may not be desireable when the intent is to develop a Servlet 3.0 compatible web application.
The "listener" you're referring to is actually not necessary, it's only to workaround buggy containers with timing errors in parsing TLD files, such as early GlassFish v3 and Jetty versions. See also a.o. Configuration of com.sun.faces.config.ConfigureListener.
|
Q:
mysqli - Do I really need to do $result->close(); & $mysqli->close();?
Just started using mysqli. If I'm working with small data sets on small websites (traffic-wise), do I really need to use these all the time?
$result->close();
$mysqli->close();
Also, for someone doing custom PHP and MySQL work without a framework, is mysqli the general preferred way of interacting with MySQL?
A:
PHP will close all open files and DB connections at the end of the script. It's good practice to do it manually when you are done with the connections, but it's no disaster if you don't. If you have a DB connection that will be used throughout the whole script you can as well leave it open.
+1 on PDO
A:
I felt an update to this thread was needed...
According to current documentation, you should always use $mysql->kill() in addition to $mysql->close().
$thread = $mysqli->thread_id;
$mysqli->kill($thread);
$mysqli->close();
(As a side note, I asked Oracle developers about using PDO with MySQL and they discouraged it. They use MySQLi exclusively. PDO hasn't been maintained and it doesn't support many of MySQL's current features.) Edit: obsolete comment.
Edit: switched the statement order, as suggested.
A:
You should get in the habit of doing cleanup right (calling close as soon as you're done), or the resource leaks can gradually accumulate until they impact performance.
As far as what DB layer, learning PDO should be worthwhile because it is well-designed and compatible with all the major databases.
|
Reduction of musculoskeletal injuries in intensive care nurses using ceiling-mounted patient lifts.
The musculoskeletal injury (MSI) rate in the Richmond Hospital Intensive Care Unit (ICU) increased significantly in 2000 and 2001 by 130%. As part of a quality initiative program, the problem was identified, assessed, and a plan was developed that involved the installation of ceiling-mounted patient lifts (CMPL) and the incorporation of a patient positioning sling. The evaluation process included a survey given to the ICU nursing staff prior to the implementation of the CMPL and repeated three, six, and 18 months after implementation. The survey included questions about discomfort, fatigue, and frustration levels before and after a 12-hour shift, as well as any medical interventions such as use of medications, physician visits, physiotherapy, and massage therapy for work-related issues. The use of the lifts contributed to lower scores in fatigue, pain and frustration in addition to a reduction in medical visits. The results also demonstrated a significant reduction in work-related time loss claims while promoting a positive workplace environment. |
Red propolis as an additive for preweaned dairy calves: Effect on growth performance, health, and selected blood parameters.
Propolis is a natural product produced by bees and sold commercially. It is well known for its antioxidant and anti-inflammatory effects and the ability to improve immune system functions in humans and animals. Many of its positive effects can contribute positively to animal productivity. The aim of this study was to evaluate possible beneficial effects of red propolis supplementation on growth performance, metabolism, and health status of dairy calves during the preweaning phase. Thirty-two newborn calves were individually housed, with free access to water and concentrate, and fed 6 L/d of whole milk. Animals were distributed in 2 treatments: (1) control and (2) supplementation with 4 mL/d of red propolis ethanolic extract (30%; EEP) in whole milk. Feed consumption and fecal and health scores were monitored daily from 1 d of age to 56 d. Calves were weighed and measured weekly. Blood samples were collected weekly, 2 h after morning milk feeding, for determination of glucose, total serum protein, urea, lactate, β-hydroxybutyrate, total iron binding capacity, and total leukocytes (white blood cells) and erythrocytes (red blood cells). Starter feed intake, daily weight gain, and body measurements were not affected by the EEP supplementation. Blood parameters were also not affected, with the exception for the red blood cell counts, which were lower in animals supplemented with EEP. Supplementation with EEP significantly decreased fecal score, days with diarrhea, and veterinary treatments of diarrhea. These results indicate that red propolis supplementation has potential to improve calf health and reduce the incidence of diarrhea and, as a consequence, the use of antibiotics in calf rearing systems. |
Aston Villa v Man City - Countdown
Saturday August 16 might seem a million miles away until Manchester City face Aston Villa in the first game of the 2008/09 Barclays Premier League season, however anyone kicking their heels wishing their life away...
...can always stay glued to the Countdown Clock. Failing that, you can always register on Vital Manchester City and enjoy what the site has to offer.
Calendar - The sites calendar will show up and coming City matches. Only those registered on the site and visiting the forums will be able to see it. No more excuses for missing any City game!
Match Previews - Two days prior to every game Vital Man City will preview the match. To get a glimpse of last seasons previews, click here.
Match Stats - They will be published shortly after the final whistle has blown. To get a taste of things to come, click here.
Match Reports - Several visitors have expressed an interest in becoming a Vital Man City match day reporter. Are you interested? If you are, please read a previous article entitled Match Reporters Required.
Breaking Manchester City News - We at Vital try to bring readers the very latest news. Sadly, we all have day jobs and because of that, we cannot always be at our PC's. Anyone who has any free time and supports the Blues with a passion can apply to become a site journalist. Anyone interested can contact the editor via the front page.
Registering couldn't be easier. Just click here and begin posting right away. |
A dating service that pairs wealthy “sugar daddies” with “sugar babies” for “mutually beneficial dating arrangements” has endorsed Texas Democratic gubernatorial candidate Wendy Davis.
SeekingArrangement.com’s Friday announcement followed a recent report in the Dallas Morning News which detailed a number of discrepancies in Davis’ personal narrative, including that she left a man 13 years her senior the day after he made the last payment for her Harvard Law School education.
“Wendy Davis is proof that the sugar lifestyle is empowering,” seeking arrangements founder and CEO Brandon Wade said in his endorsement. “It can take a single mom from squalor to scholar, or in this case from the trailer park to Harvard, and a seat in the Senate. The sugar lifestyle creates an opportunity for women to transcend the single mother stereotypes.”
According to the service, single mothers like Davis, are the site’s second largest demographic — or as the news-savvy site puts it — “561,000 single moms follow in Wendy Davis’ footsteps.”
And while Seeking Arrangements is known for attracting free publicity by tying its service to current events, the 2.7 million-member site is not the first to put Davis in that “sugar baby” category.
Thursday afternoon Todd Kincannon, a former executive director of the South Carolina GOP, tweeted the suggestion that Davis could be the organizations spokeswoman.
“BREAKING: Wendy Davis ending campaign; has agreed to become spokesbabe for SeekingArrangement .com, a college tuition sugar daddy website,” he tweeted.
At this point however the organization has only offered their endorsement, not an official offer to be their spokeswoman.
Follow Caroline on Twitter |
LAKELAND, Florida (AP) - A Lakeland mother has been arrested for child abuse after family members said she bit her son.
Police investigated 26-year-old Ann Marie Kane after Department of Children and Families officials reported three adult-sized bite marks on her son.
According to an arrest report, Kane admitted biting the boy in the past because he was biting his siblings.
DCF has investigated Kane several times in the past. They removed the children from her care during the most recent investigation.
She was being held in the Polk County Jail on Saturday.
You May Also Like...
More mug shot galleries...
Strange: Most notorious or unusual mug shots we've seen
Teachers:Teacher arrest mugshots
Jaw droppers:Open mouth mug shots
Smilers: Happy mug shots
Laughers: What's so funny mug shots
Prostitutes: Prostitute mug shots
Athletes: Professional athlete mug shots
Porn arrests: Child porn arrest mug shots
Local Mugs: Hillsborough County Mug shots
More unusual mug shots and galleries: 10 News slideshows and galleries |
Q:
Apache2 not responding
I am trying to make Comet requests via Prototype/php like here : http://www.zeitoun.net/articles/comet_and_php/start
But!!! While connection is open, other pages from my project is not loading from the same browser.
What can I do to provide normal behaviour?
Very very tnx
A:
Comet works by keeping a connection open between the server and the client. Browsers have a maximum number of connections that they will allow a page to make (something like 2 max for IE), I think it might also group all requests for the same domain together. That is why connections are not going through for you.
I believe it is not the server that is at fault here it is the browsers, using an iframe is the correct solution here as you mentioned, but it's not the servers fault.
[Edit]
Simplest solution for you is to monitor focus. When the page has focus, open a connection, when it is lost(ie. user switches tabs) close the connection and wait for focus again before updating the page. That way you will have the appearance of multiple pages updating while only needing 1 comet connection at any time.
|
# encoding: utf-8
# This file is code to do with vdm revisions, which was removed from CKAN after
# version 2.8. It is only used by a migration and its tests.
import uuid
import six
import datetime
from sqlalchemy.sql import select
from sqlalchemy import (Table, Column, ForeignKey, Boolean, UnicodeText, Text,
String, DateTime, and_, inspect)
import sqlalchemy.orm.properties
from sqlalchemy.orm import class_mapper
from sqlalchemy.orm import relation
import ckan.logic as logic
import ckan.lib.dictization as d
from ckan.lib.dictization.model_dictize import (
_execute, resource_list_dictize, extras_list_dictize, group_list_dictize)
from ckan import model
# This is based on ckan.lib.dictization.model_dictize:package_dictize
# BUT you can ask for a old revision to the package by specifying 'revision_id'
# in the context
def package_dictize_with_revisions(pkg, context):
'''
Given a Package object, returns an equivalent dictionary.
Normally this is the most recent version, but you can provide revision_id
or revision_date in the context and it will filter to an earlier time.
May raise NotFound if:
* the specified revision_id doesn't exist
* the specified revision_date was before the package was created
'''
model = context['model']
try:
model.PackageRevision
# CKAN<=2.8
revision_model = model
except AttributeError:
# CKAN>2.8
revision_model = RevisionTableMappings.instance()
is_latest_revision = not(context.get(u'revision_id') or
context.get(u'revision_date'))
execute = _execute if is_latest_revision else _execute_with_revision
# package
if is_latest_revision:
if isinstance(pkg, revision_model.PackageRevision):
pkg = model.Package.get(pkg.id)
result = pkg
else:
package_rev = revision_model.package_revision_table
q = select([package_rev]).where(package_rev.c.id == pkg.id)
result = execute(q, package_rev, context).first()
if not result:
raise logic.NotFound
result_dict = d.table_dictize(result, context)
# strip whitespace from title
if result_dict.get(u'title'):
result_dict['title'] = result_dict['title'].strip()
# resources
if is_latest_revision:
res = model.resource_table
else:
res = revision_model.resource_revision_table
# metadata_modified was added after the revisioning was removed so
# it does not exist on the resource_revision table.
mm_col = res._columns.get(u'metadata_modified')
if mm_col is not None:
res._columns.remove(mm_col)
q = select([res]).where(res.c.package_id == pkg.id)
result = execute(q, res, context)
result_dict["resources"] = resource_list_dictize(result, context)
result_dict['num_resources'] = len(result_dict.get(u'resources', []))
# tags
tag = model.tag_table
if is_latest_revision:
pkg_tag = model.package_tag_table
else:
pkg_tag = revision_model.package_tag_revision_table
q = select([tag, pkg_tag.c.state],
from_obj=pkg_tag.join(tag, tag.c.id == pkg_tag.c.tag_id)
).where(pkg_tag.c.package_id == pkg.id)
result = execute(q, pkg_tag, context)
result_dict["tags"] = d.obj_list_dictize(result, context,
lambda x: x["name"])
result_dict['num_tags'] = len(result_dict.get(u'tags', []))
# Add display_names to tags. At first a tag's display_name is just the
# same as its name, but the display_name might get changed later (e.g.
# translated into another language by the multilingual extension).
for tag in result_dict['tags']:
assert u'display_name' not in tag
tag['display_name'] = tag['name']
# extras
if is_latest_revision:
extra = model.package_extra_table
else:
extra = revision_model.extra_revision_table
q = select([extra]).where(extra.c.package_id == pkg.id)
result = execute(q, extra, context)
result_dict["extras"] = extras_list_dictize(result, context)
# groups
if is_latest_revision:
member = model.member_table
else:
member = revision_model.member_revision_table
group = model.group_table
q = select([group, member.c.capacity],
from_obj=member.join(group, group.c.id == member.c.group_id)
).where(member.c.table_id == pkg.id)\
.where(member.c.state == u'active') \
.where(group.c.is_organization == False) # noqa
result = execute(q, member, context)
context['with_capacity'] = False
# no package counts as cannot fetch from search index at the same
# time as indexing to it.
# tags, extras and sub-groups are not included for speed
result_dict["groups"] = group_list_dictize(result, context,
with_package_counts=False)
# owning organization
if is_latest_revision:
group = model.group_table
else:
group = revision_model.group_revision_table
q = select([group]
).where(group.c.id == result_dict['owner_org']) \
.where(group.c.state == u'active')
result = execute(q, group, context)
organizations = d.obj_list_dictize(result, context)
if organizations:
result_dict["organization"] = organizations[0]
else:
result_dict["organization"] = None
# relations
if is_latest_revision:
rel = model.package_relationship_table
else:
rel = revision_model \
.package_relationship_revision_table
q = select([rel]).where(rel.c.subject_package_id == pkg.id)
result = execute(q, rel, context)
result_dict["relationships_as_subject"] = \
d.obj_list_dictize(result, context)
q = select([rel]).where(rel.c.object_package_id == pkg.id)
result = execute(q, rel, context)
result_dict["relationships_as_object"] = \
d.obj_list_dictize(result, context)
# Extra properties from the domain object
# We need an actual Package object for this, not a PackageRevision
# if isinstance(pkg, model.PackageRevision):
# pkg = model.Package.get(pkg.id)
# isopen
result_dict['isopen'] = pkg.isopen if isinstance(pkg.isopen, bool) \
else pkg.isopen()
# type
# if null assign the default value to make searching easier
result_dict['type'] = pkg.type or u'dataset'
# license
if pkg.license and pkg.license.url:
result_dict['license_url'] = pkg.license.url
result_dict['license_title'] = pkg.license.title.split(u'::')[-1]
elif pkg.license:
result_dict['license_title'] = pkg.license.title
else:
result_dict['license_title'] = pkg.license_id
# creation and modification date
if is_latest_revision:
result_dict['metadata_modified'] = pkg.metadata_modified.isoformat()
# (If not is_latest_revision, don't use pkg which is the latest version.
# Instead, use the dates already in result_dict that came from the dictized
# PackageRevision)
result_dict['metadata_created'] = pkg.metadata_created.isoformat()
return result_dict
def _execute_with_revision(q, rev_table, context):
'''
Takes an SqlAlchemy query (q) that is (at its base) a Select on an object
revision table (rev_table), and you provide revision_id or revision_date in
the context and it will filter the object revision(s) to an earlier time.
Raises NotFound if context['revision_id'] is provided, but the revision
ID does not exist.
Returns [] if there are no results.
'''
model = context['model']
session = model.Session
revision_id = context.get(u'revision_id')
revision_date = context.get(u'revision_date')
if revision_id:
revision = session.query(revision_model.Revision) \
.filter_by(id=revision_id).first()
if not revision:
raise logic.NotFound
revision_date = revision.timestamp
q = q.where(rev_table.c.revision_timestamp <= revision_date)
q = q.where(rev_table.c.expired_timestamp > revision_date)
return session.execute(q)
# This function is copied from vdm, but:
# * added the 'frozen' param
# * copied in bits from ckan.model.core.make_revisioned_table()
# * it no longer adds revision_id to the base table (e.g. package.revision_id)
def make_revisioned_table(base_table, frozen=False):
'''Modify base_table and create correponding revision table.
A 'frozen' revision table is not written to any more - it's just there
as a record. It doesn't have the continuity foreign key relation.
@return revision table (e.g. package_revision)
'''
revision_table = Table(base_table.name + u'_revision', base_table.metadata)
copy_table(base_table, revision_table)
# we no longer add revision_id to the base table (e.g. package.revision_id)
# because it is redundant - package_revision.current flags the latest.
# However the revision_table needs revision_id still
revision_table.append_column(
Column(u'revision_id', UnicodeText, ForeignKey(u'revision.id'))
)
# create foreign key 'continuity' constraint
# remember base table primary cols have been exactly duplicated onto our
# table
pkcols = []
for col in base_table.c:
if col.primary_key:
pkcols.append(col)
assert len(pkcols) <= 1,\
u'Do not support versioning objects with multiple primary keys'
fk_name = base_table.name + u'.' + pkcols[0].name
revision_table.append_column(
Column(u'continuity_id', pkcols[0].type,
None if frozen else ForeignKey(fk_name))
)
# TODO: why do we iterate all the way through rather than just using dict
# functionality ...? Surely we always have a revision here ...
for col in revision_table.c:
if col.name == u'revision_id':
col.primary_key = True
revision_table.primary_key.columns.add(col)
# Copied from ckan.model.core.make_revisioned_table
revision_table.append_column(Column(u'expired_id',
Text))
revision_table.append_column(Column(u'revision_timestamp', DateTime))
revision_table.append_column(Column(u'expired_timestamp', DateTime,
default=datetime.datetime(9999, 12, 31)))
revision_table.append_column(Column(u'current', Boolean))
return revision_table
# Copied from vdm
def copy_column(name, src_table, dest_table):
col = src_table.c[name]
if col.unique is True:
# don't copy across unique constraints, as different versions
# of an object may have identical column values
col.unique = False
dest_table.append_column(col.copy())
# only get it once we have a parent table
newcol = dest_table.c[name]
if len(col.foreign_keys) > 0:
for fk in col.foreign_keys:
newcol.append_foreign_key(fk.copy())
# Copied from vdm
def copy_table_columns(table):
columns = []
for col in table.c:
newcol = col.copy()
if len(col.foreign_keys) > 0:
for fk in col.foreign_keys:
newcol.foreign_keys.add(fk.copy())
columns.append(newcol)
return columns
# Copied from vdm
def copy_table(table, newtable):
for key in table.c.keys():
copy_column(key, table, newtable)
# Copied from vdm
def make_revision_table(metadata):
revision_table = Table(
u'revision', metadata,
Column(u'id', UnicodeText, primary_key=True,
default=lambda: six.u(uuid.uuid4())),
Column(u'timestamp', DateTime, default=datetime.datetime.utcnow),
Column(u'author', String(200)),
Column(u'message', UnicodeText),
Column(u'state', UnicodeText, default=model.State.ACTIVE)
)
return revision_table
# Copied from vdm
def make_Revision(mapper, revision_table):
mapper(Revision, revision_table, properties={},
order_by=revision_table.c.timestamp.desc())
return Revision
# Copied from vdm
class Revision(object):
'''A Revision to the Database/Domain Model.
All versioned objects have an associated Revision which can be accessed via
the revision attribute.
'''
def __init__(self, **kw):
for k, v in six.iteritems(kw):
setattr(self, k, v)
# @property
# def __id__(self):
# if self.id is None:
# self.id = make_uuid()
# return self.id
# @classmethod
# def youngest(self, session):
# '''Get the youngest (most recent) revision.
# If session is not provided assume there is a contextual session.
# '''
# q = session.query(self)
# return q.first()
# Copied from vdm BUT without '.continuity' mapped to the base object
def create_object_version(mapper_fn, base_object, rev_table):
'''Create the Version Domain Object corresponding to base_object.
E.g. if Package is our original object we should do::
# name of Version Domain Object class
PackageVersion = create_object_version(..., Package, ...)
NB: This must obviously be called after mapping has happened to
base_object.
'''
# TODO: can we always assume all versioned objects are stateful?
# If not need to do an explicit check
class MyClass(object):
def __init__(self, **kw):
for k, v in six.iteritems(kw):
setattr(self, k, v)
name = base_object.__name__ + u'Revision'
MyClass.__name__ = str(name)
MyClass.__continuity_class__ = base_object
# Must add this so base object can retrieve revisions ...
base_object.__revision_class__ = MyClass
ourmapper = mapper_fn(
MyClass, rev_table,
# NB: call it all_revisions_... rather than just revisions_... as it
# will yield all revisions not just those less than the current
# revision
# ---------------------
# Deviate from VDM here
#
# properties={
# 'continuity':relation(base_object,
# backref=backref('all_revisions_unordered',
# cascade='all, delete, delete-orphan'),
# order_by=rev_table.c.revision_id.desc()
# ),
# },
# order_by=[rev_table.c.continuity_id, rev_table.c.revision_id.desc()]
# ---------------------
)
base_mapper = class_mapper(base_object)
# add in 'relationship' stuff from continuity onto revisioned obj
# 3 types of relationship
# 1. scalar (i.e. simple fk)
# 2. list (has many) (simple fk the other way)
# 3. list (m2m) (join table)
#
# Also need to check whether related object is revisioned
#
# If related object is revisioned then can do all of these
# If not revisioned can only support simple relation (first case -- why?)
for prop in base_mapper.iterate_properties:
try:
is_relation = prop.__class__ == \
sqlalchemy.orm.properties.PropertyLoader
except AttributeError:
# SQLAlchemy 0.9
is_relation = prop.__class__ == \
sqlalchemy.orm.properties.RelationshipProperty
if is_relation:
# in sqlachemy 0.4.2
# prop_remote_obj = prop.select_mapper.class_
# in 0.4.5
prop_remote_obj = prop.argument
remote_obj_is_revisioned = \
getattr(prop_remote_obj, u'__revisioned__', False)
# this is crude, probably need something better
is_many = (prop.secondary is not None or prop.uselist)
if remote_obj_is_revisioned:
propname = prop.key
add_fake_relation(MyClass, propname, is_many=is_many)
elif not is_many:
ourmapper.add_property(prop.key, relation(prop_remote_obj))
else:
# TODO: actually deal with this
# raise a warning of some kind
msg = \
u'Skipping adding property %s to revisioned object' % prop
return MyClass
# Copied from vdm
def add_fake_relation(revision_class, name, is_many=False):
'''Add a 'fake' relation on ObjectRevision objects.
These relation are fake in that they just proxy to the continuity object
relation.
'''
def _pget(self):
related_object = getattr(self.continuity, name)
if is_many:
# do not need to do anything to get to right revision since either
# 1. this is implemented inside the is_many relation we proxy to
# (as is the case with StatefulLists and assoc proxy setup as used
# in add_stateful_versioned_m2m)
# 2. it is not because it is not appropriate to apply it
# (e.g. package.package_tags which points to PackageTag objects and
# which is not versioned here ...)
return related_object
else:
return related_object.get_as_of()
x = property(_pget)
setattr(revision_class, name, x)
# Tests use this to manually create revisions, that look just like how
# CKAN<=2.8 used to create automatically.
def make_package_revision(package):
'''Manually create a revision for a package and its related objects
'''
instances = [package]
package_tags = model.Session.query(model.PackageTag) \
.filter_by(package_id=package.id) \
.all()
instances.extend(package_tags)
extras = model.Session.query(model.PackageExtra) \
.filter_by(package_id=package.id) \
.all()
instances.extend(extras)
instances.extend(package.resources)
instances.extend(package.get_groups())
members = model.Session.query(model.Member) \
.filter_by(table_id=package.id) \
.all()
instances.extend(members)
make_revision(instances)
# Tests use this to manually create revisions, that look just like how
# CKAN<=2.8 used to create automatically.
def make_revision(instances):
'''Manually create a revision.
Copies a new/changed row from a table (e.g. Package) into its
corresponding revision table (e.g. PackageRevision) and makes an entry
in the Revision table.
'''
# model.repo.new_revision() was called in the model code, which is:
# vdm.sqlalchemy.tools.Repository.new_revision() which did this:
Revision = RevisionTableMappings.instance().Revision
revision = Revision()
model.Session.add(revision)
# new_revision then calls:
# SQLAlchemySession.set_revision(self.session, rev), which is:
# vdm.sqlalchemy.base.SQLAlchemySession.set_revision() which did this:
revision.id = str(uuid.uuid4())
model.Session.add(revision)
model.Session.flush()
# In CKAN<=2.8 the revisioned tables (e.g. Package) had a mapper
# extension: vdm.sqlalchemy.Revisioner(package_revision_table)
# that triggered on table changes and records a copy in the
# corresponding revision table (e.g. PackageRevision).
# In Revisioner.before_insert() it set instance.revision_id, however we no
# longer have that column on the package (or whatever the instance is)
# In Revision.after_update() or after_insert() it does this:
# self.make_revision(instance, mapper, connection)
# which is vdm.sqlalchemy.base.Revisioner.make_revision()
# which copies the Package to make a new PackageRevision
for instance in instances:
colvalues = {}
mapper = inspect(type(instance))
table = mapper.tables[0]
for key in table.c.keys():
val = getattr(instance, key)
colvalues[key] = val
colvalues['revision_id'] = revision.id
colvalues['continuity_id'] = instance.id
# Allow for multiple SQLAlchemy flushes/commits per VDM revision
revision_table = \
RevisionTableMappings.instance() \
.revision_table_mapping[type(instance)]
ins = revision_table.insert().values(colvalues)
model.Session.execute(ins)
# the related Activity would get the revision_id added to it too.
# Here we simply assume it's the latest activity.
activity = model.Session.query(model.Activity) \
.order_by(model.Activity.timestamp.desc()) \
.first()
activity.revision_id = revision.id
model.Session.flush()
# In CKAN<=2.8 the session extension CkanSessionExtension had some
# extra code in before_commit() which wrote `revision_timestamp` and
# `expired_timestamp` values in the revision tables
# (e.g. package_revision) so that is added here:
for instance in instances:
if not hasattr(instance, u'__revision_class__'):
continue
revision_cls = instance.__revision_class__
revision_table = \
RevisionTableMappings.instance() \
.revision_table_mapping[type(instance)]
# when a normal active transaction happens
# this is an sql statement as we do not want it in object cache
model.Session.execute(
revision_table.update().where(
and_(revision_table.c.id == instance.id,
revision_table.c.current is True)
).values(current=False)
)
q = model.Session.query(revision_cls)
q = q.filter_by(expired_timestamp=datetime.datetime(9999, 12, 31),
id=instance.id)
results = q.all()
for rev_obj in results:
values = {}
if rev_obj.revision_id == revision.id:
values['revision_timestamp'] = revision.timestamp
else:
values['expired_timestamp'] = revision.timestamp
model.Session.execute(
revision_table.update().where(
and_(revision_table.c.id == rev_obj.id,
revision_table.c.revision_id == rev_obj.revision_id)
).values(**values)
)
# Revision tables (singleton)
class RevisionTableMappings(object):
_instance = None
@classmethod
def instance(cls):
if not cls._instance:
cls._instance = cls()
return cls._instance
def __init__(self):
# This uses the strangler pattern to gradually move the revision model
# out of ckan/model and into this file.
# We start with references to revision model in ckan/model/ and then
# gradually move the definitions here
self.revision_table = make_revision_table(model.meta.metadata)
self.revision_table.append_column(
Column(u'approved_timestamp', DateTime))
self.Revision = make_Revision(model.meta.mapper, self.revision_table)
self.package_revision_table = \
make_revisioned_table(model.package_table)
self.PackageRevision = create_object_version(
model.meta.mapper, model.Package, self.package_revision_table)
self.resource_revision_table = \
make_revisioned_table(model.resource_table)
self.ResourceRevision = create_object_version(
model.meta.mapper, model.Resource, self.resource_revision_table)
self.extra_revision_table = \
make_revisioned_table(model.package_extra_table)
self.PackageExtraRevision = create_object_version(
model.meta.mapper, model.PackageExtra,
self.extra_revision_table)
self.package_tag_revision_table = \
make_revisioned_table(model.package_tag_table)
self.PackageTagRevision = create_object_version(
model.meta.mapper, model.PackageTag,
self.package_tag_revision_table)
self.member_revision_table = \
make_revisioned_table(model.member_table)
self.MemberRevision = create_object_version(
model.meta.mapper, model.Member,
self.member_revision_table)
self.group_revision_table = \
make_revisioned_table(model.group_table)
self.GroupRevision = create_object_version(
model.meta.mapper, model.Group,
self.group_revision_table)
self.group_extra_revision_table = \
make_revisioned_table(model.group_extra_table)
self.GroupExtraRevision = create_object_version(
model.meta.mapper, model.GroupExtra,
self.group_extra_revision_table)
self.package_relationship_revision_table = \
make_revisioned_table(model.package_relationship_table)
# Commented because it gives an error, but we probably don't need it
# self.PackageRelationshipRevision = \
# create_object_version(
# model.meta.mapper, model.PackageRelationship,
# self.package_relationship_revision_table)
self.system_info_revision_table = \
make_revisioned_table(model.system_info_table)
self.SystemInfoRevision = create_object_version(
model.meta.mapper, model.SystemInfo,
self.system_info_revision_table)
self.revision_table_mapping = {
model.Package: self.package_revision_table,
model.Resource: self.resource_revision_table,
model.PackageExtra: self.extra_revision_table,
model.PackageTag: self.package_tag_revision_table,
model.Member: self.member_revision_table,
model.Group: self.group_revision_table,
}
# It's easiest if this code works on all versions of CKAN. After CKAN 2.8 the
# revision model is separate from the main model.
try:
model.PackageExtraRevision
# CKAN<=2.8
revision_model = model
except AttributeError:
# CKAN>2.8
revision_model = RevisionTableMappings.instance()
|
The Wisconsin Elections Commission will be posting recount results each day based on reports received from county clerks. The Commission plans to post results by midday, depending upon time required to compile reports provided by the counties.
IMPORTANT NOTE
Numbers for the City of Milwaukee do not include absentee ballots, which have not yet been recounted. Milwaukee counts its absentee ballots centrally (not at the polling place) on Election Night. When those absentee ballots have been counted the numbers will be updated.
We are also noticing that there are some transposed rows in Douglas County. We will correct these in tomorrow's spreadsheet. |
Bog butter
"Bog butter" refers to an ancient waxy substance found buried in peat bogs, particularly in Ireland and Great Britain. Likely an old method of making and preserving butter, some tested lumps of bog butter were made of dairy products while others were meat-based.
History
Bog butter is found buried inside some sort of wooden container, such as buckets, kegs, barrels, dishes and butter churns. It is of animal origin, and is also known as butyrellite. Until 2003 scientists and archaeologists were uncertain of the origin of bog butter. Scientists working at the University of Bristol discovered that some samples of the "butter" were of adipose/tallow origin while others were of dairy origin.
In Ireland, the practice of burying bog butter dates back to the first century AD, with bog butter found in Co Meath. On 28 April 2011, there were press reports of a find of approximately of bog butter in Tullamore, County Offaly. Found in a carved wooden vessel in diameter and in height, it was buried at a depth of , and still bore a faint smell of dairy. In Scotland, the practice of burying bog butter only dates back to the 2nd or 3rd century AD.
Bog butter was produced by interring butter or other fats within a peat bog after encasement within a wooden container, although augmentation of the latter with a deerskin bladder or layers of plant fibres was not unusual. The containers tend to be well-sealed with a convex surface, perhaps to prevent water from pooling and stagnating in direct contact with the packaging and/or contents.
The original motivations behind the creation of bog butter are unclear. One widespread theory is that food products were buried in bogs to hinder spoilage. Peat bogs, being low temperature, low oxygen, highly acidic environments, have excellent preservative properties. Experiments conducted by researcher Daniel C. Fisher demonstrated that pathogen and bacterial counts of meat buried in peat bogs for up to two years were comparable to levels found in control samples stored in a modern freezer, suggesting that this could be an effective preservation method.
An alternative hypothesis is "primitive food processing": it is possible that "chemical reactions in the soil helped to transform the foods to more palatable products than could be made fresh"—especially given the absence of salt in bog butters—or increase available nutrient content. In traditional cuisines, burial is a fairly common step in the preparation of highly perishable foods such as meat and dairy products; examples include century eggs (China), gravad lax (Scandinavia), hákarl (Iceland), the Inuit dishes igunaq and kiviaq, and Moroccan smen. Modern experiments in creating bog butter yield a product that seems to be an acquired taste, with "flavor notes which were described primarily as ‘animal’ or ‘gamey’, ‘moss’, ‘funky’, ‘pungent’, and ‘salami’. These characteristics are certainly a far cry from the creamy acidity of a freshly made cultured butter, but has been found useful in the kitchen especially with strong and pungent dishes, in a similar manner to aged ghee"
The practice of burying butter and other fats could also have arisen as a strategy for protecting vital provisions from thieves and/or invaders. For instance, in early medieval Ireland, there is no doubt that butter was a luxury food, with legal texts carefully delineating the quantity of butter which members of each socio-economic class were entitled to consume. Yet butter also had numerous, widespread non-culinary uses such as the payment of taxes, rents, and fines; facilitation of hospitality; care of the sick and infirm; and strengthening of social bonds. On occasion, butter might also have less prestigious applications, including waterproofing, and making candles or even cement. The frequency with which famines and animal epidemics struck would have necessitated development of storage techniques to protect this important product. It is possible many stashes were never retrieved due to enemy occupation or simple forgetfulness.
Smen
A version of bog butter, Smen is still produced in North Africa – it is butter processed with thyme to start an enzyme process, then wrapped in herbs, encased in wood and stored in bogs. It is considered a gourmet food comparable to fine cheese.
See also
Adipocere
References
Bibliography
External links
Peatlands: Occasional finds from the Department of the Environment (Northern Ireland)
Bog Butter and other items found preserved in bogs from Wired
Bog butter from 3000 BC found in ancient underground store from IrishCentral.com
Category:Archaeological artefact types
Category:Bogs
Category:Butter |
Q:
How to execute a specific sequence of operations in i3 on start-up?
Using exec in the config file would start an application on startup. Any application to be bound to a workspace when it starts using assign. However, how could one do a sequence of operations on start-up?
Specifically, would like to do the following:
Open a terminal window in ws2
Execute cd ~/Code && jupyter-lab
Mod+R, Right, Right (increase browswer width by two steps)
Swap the positions of the browser and terminal
F11 (with browser window active)
The exec command can be useful in executing commands, such as in step 2, by executing a simple bash script. But how to do the above sequence of operations?
A:
I don't use jupyter, and I don't know what terminal you are using, so I can't
give a precise answer, but I believe that something like
i3-msg workspace 2
i3-msg resize grow width 10 px or 10 ppt
would move the focus to workspace 2 (creating it if necessary) and resize the currently active window.
To change directory and launch "jupyter-lab", you could probably use something like
urxvt -cd ~/code -e "jupyter-lab"
depending on your terminal, or use xdotool type .... Likewise, to issue F11, you can
use xdotool key F11, maybe with the --window option to specify the correct window.
EDIT: Code that worked for the OP
i3-msg workspace 2
gnome-terminal
sleep 1
xdotool type "cd ~/Code && jupyter-lab"
xdotool key KP_Enter
sleep 1
i3-msg resize grow width 20 px or 20 ppt
i3-msg move left
xdotool key F11
|
Landing on the moon was one of the great human achievements, a masterwork of ingenuity and discipline that we justly celebrate a half century later. Yet as Walter McDougall argued in his Pulitzer Prize-winning The Heavens and the Earth , the space race also marked a dangerous shift in the political and scientific cultures of America, one that moved technology out of the workshops of private inventors and into the realm of centralized government planning.
John F. Kennedy and his successors laid the foundation for what McDougall called “command innovation”: the idea that technological advancement is a public service for which the state should take primary responsibility.1 This mind-set eventually was applied to “research, education, economic fine-tuning, and social welfare in all its manifestations,” and it set the stage for the Great Society, the War on Poverty, and other massive federal undertakings that often were consciously modeled on the space program.2 In short, it established, in McDougall’s words, “a technocracy of politicians, arrogating to government the right to fix a national agenda and order the fabrication of techniques . . . for its fulfillment.”3
Among those who feared this development was President Dwight Eisenhower, who warned Americans in 1960 of a “military-industrial complex” that was transforming the scientific community—and the nation’s schools—into adjuncts of the state. Universities, writes McDougall, “inevitably compromised their role as detached centers of inquiry and were politicized by military and social involvement alike.”4 This meant subjecting themselves in unprecedented ways “to regulation, investigation, and coercion on matters of academic freedom.”5
The same phenomenon rippled out into countless other areas of civilian life with profound cultural consequences: Many Americans came to regard technical and cultural innovation as primarily the responsibility of government-funded, government-managed entities. The result was not only an immense growth in federal spending and regulation, but also the squeezing out of independent research and unconventional thinking that once had marked the distinctly American approach to invention.
Fortunately, recent years have seen a resurgence of confidence in privately run research, even toward that ultimate prize: space exploration.
Perhaps the first blow to the technocratic mentality came with personal computers, pioneered not by bureaucratic think tanks, but by college kids and hobbyists. Then in 2000, the private firm Celera beat the government-run Human Genome Project in mapping the human genome, despite the government’s almost decade-long head start.
Today, the leaders in space technology are not at NASA but at private firms such as Virgin Galactic and SpaceX. True, these companies benefit from government subsidies—some of them shockingly wasteful—but nonetheless, they are demonstrating once again economic advantages of private industry over government management of technology. According to Ed Hudgins, an expert on space privatization, “as a government bureaucracy, NASA simply can’t be efficient. Every decision must be vetted and procedures followed that have more to do with protecting butts than protecting safety and keeping costs reasonable.”6 Private companies, by contrast, are not only faster at changing plans when necessary, but they have the incentive to do so, because they—unlike government entities—must bear the costs of their mistakes.
Hudgins points out that other frontiers typically have been explored and tamed, not by government entities but by entrepreneurs who, thanks to the profit motive, have found more efficient and sustainable pathways to discovery and innovation. There’s no reason why the final frontier can’t be settled the same way. Doing so would require some important legal changes—particularly to treaties signed in the 1960s that mandate government oversight of activities in space and were not written with private passengers in mind.7 But even here, progress has been made. In 2015, President Barack Obama signed the Commercial Space Launch Competitiveness Act, which protects the rights of companies to the materials they mine on asteroids.
Perhaps more important have been the successes of SpaceX’s Falcon 9 rocket—with its capacity to descend safely after launch and come to rest on a landing pad, even one at sea—and of Virgin Galactic’s passenger ships, SpaceShipOne, and SpaceShipTwo. These innovations have not only made space launches cheaper and faster, but have proven that private industry can take the next step into the final frontier. “The private sector is solving the cost problem and opening opportunities for the future,” Hudgins concludes. “Just as private entrepreneurs led the communications and information revolution, so space entrepreneurs can do the same for generations to come.”8 (For more on the safety record of private industry, see this article on plane safety.)
Writing in the 1980s, McDougall feared that the technocracy ushered in by the space race had irrevocably supplanted the culture of independent pioneering that had once marked the American character and that it would “subsume our individualism” in the service of massive, government-planned undertakings that were “the analog of pyramid or cathedral building.”9 But the rise of space entrepreneurialism has shown that private enterprise is our best hope for exploring the stars. |
Surprise! Rhythm Heaven Megamix Now Available!
Nintendo surprised everyone by releasing Rhythm Heaven Megamix to the 3DS eShop just a few moments ago. It retails for $29.99 and is packed with all sorts of Japanese rhythm zaniness. If you’re on the fence, you can also download a free demo from the eShop right now.
Prior games have been entertaining, with many gamers really liking the GBA version that never made it to North America. I’ve heard several people who have imported this one from Japan say that this is the best version of the game to come out. So, let’s hope that’s the case! |
---
abstract: 'We use unpublished and published VLBI results to investigate the geometry and the statistical properties of the velocity field traced by [H$_2$O]{} masers in five galactic regions of star formation — Sgr B2(M), W49N, W51(MAIN), W51N, and W3(OH). In all sources the angular distribution of the [H$_2$O]{} hot spots demonstrates approximate self-similarity (fractality) over almost four orders of magnitude in scale, with the calculated fractal dimension $d$ between $\approx 0.2$ and 1.0. In all sources, the lower order structure functions for the line-of-sight component of the velocity field are satisfactorily approximated by power laws, with the exponents near their classic Kolmogorov values for the high-Reynolds-number incompressible turbulence. These two facts, as well as the observed significant excess of large deviations of the two-point velocity increments from their mean values, strongly suggest that the [H$_2$O]{} masers in regions of star formation trace turbulence. We propose a new conceptual model of these masers in which maser hot spots originate at the sites of ultimate dissipation of highly supersonic turbulence produced in the ambient gas by the intensive gas outflow from a newly-born star. Due to the high brightness and small angular sizes of masing hot spots and the possibility of measuring their positions and velocities with high precision, they become a unique probe of supersonic turbulence. [*Subject headings:*]{} masers — turbulence — ISM: jets and outflows'
author:
- 'V. Strelnitski'
- 'J. Alexander'
- 'S. Gezari'
- 'B.P. Holder'
- 'J.M. Moran and M.J. Reid'
title: '[H$_2$O]{} MASERS AND SUPERSONIC TURBULENCE'
---
Introduction
============
The idea of an energy cascade through a hierarchy of scales (Richardson 1922; Kolmogorov 1941a; Obukhov 1941), the phenomenological theory of turbulent energy dissipation (Kolmogorov 1941a,b, 1942), and the experimental and theoretical results related to the intermittency of turbulent velocity fields (see Frisch 1995 for references) are the cornerstones of the present understanding of incompressible turbulence. Much less is known about compressible (supersonic) turbulence. Analytical approaches and laboratory experiments are still limited to low Mach numbers, M$\,\approx 1$, and the results of numerical simulations may depend crucially on the adopted boundary and initial conditions.
Von Weizsäcker (1951) was the first to point out that the interstellar medium (ISM) is characterized by very high Reynolds numbers and high Mach numbers, and thus highly supersonic turbulence should be its typical state. Much work using the ISM to study supersonic turbulence has since been attempted (see, for example, Dickman 1985; Scalo 1987; Falgarone & Phillips 1990; Elmegreen 1993; Franco & Carraminana 1999). However, at the relatively large scales considered so far, $10^{21} \to 10^{17}\,$cm, the ISM may not be an adequate laboratory for studying supersonic turbulence in the traditional sense of the term “turbulence.” The initially hypothesized turbulent energy cascade from the largest to the smallest scales of the ISM, initiated by the differential rotation of the Galaxy (von Weizsäcker 1951; Fleck 1981) is an obvious idealization. Even if the differential rotation works as the major energy source for the observed turbulence in the neutral gas at the perifery of galaxies (Sellwood, & Balbus 1999), it should be disrupted by the powerfull injection of energy from supernovae and stellar winds at intermediate scales in the major galactic disk (Spitzer 1978). ISM turbulence at large and intermediate scales is also complicated by the effects of self-gravitation.
It has recently been recognized that the 1.35-cm wavelength [H$_2$O]{} masers \[see reviews on masers in Elitzur (1992); Clegg and Nedoluha (1993); Migenes and Reid (2002)\] may be promising tools for the study of “Kolmogorov-type” supersonic turbulence. VLBI studies of the proper motions of several bright [H$_2$O]{} maser sources associated with newly-born stars have revealed expansion of the clusters of maser spots — participation in gas outflows from these stars (see Anderson and Genzel 1993 for a review). This type of regular motion had been theoretically predicted before its discovery (Strelnitski & Sunyaev 1973). In some cases, including W49N, there are also indications of another regular component in the velocity field revealed by the masers — rotation (Reid [[*etal.*]{}]{} 1988, Gwinn [[*etal.*]{}]{} 1992). However, besides these regular components, VLBI measurements indicated the presence of a residual [*random*]{} component of motion. Typically, approximating the proper motion vectors by a simple model of expanding and rotating gas leaves a residual dispersion of $\approx 15\,$[kms$^{-1}$]{} per axis, which is considerably larger than the errors of these observations (Reid [[*etal.*]{}]{} 1988). This value corresponds to $\approx \sqrt3\times 15\approx
26\,$[kms$^{-1}$]{} for the total velocity vector and can be considered the characteristic turbulent velocity dispersion at the largest spatial scale covered by the maser cluster.
Walker (1984), using the VLBI maps of the [H$_2$O]{} source in W49N obtained by Walker, Matsakis & Garcia-Barreto (1982), demonstrated that both the two-point velocity increments and the two-point spatial correlation function show power-law dependencies on maser spot separation. This behavior is typical of a turbulent flow, although Walker did not favor the turbulence interpretation. Gwinn (1994) carried out a similar statistical analysis using better VLBI results for W49N obtained by Gwinn [[*etal.*]{}]{} (1992). He confirmed the power-law dependency of velocity dispersion and spatial density of masing spots on spatial scale and ascribed this behavior to turbulence.
This paper summarizes a series of our studies of [H$_2$O]{} masers as tracers of supersonic turbulence in regions of star formation. Preliminary results were reported by Strelnintski [[*etal.*]{}]{} (1998), Holder & Strelnitski (1997), Gezari (1997) and Gezari, Reid, & Strelnitski (1998). Section 2 presents our VLBI results for the [H$_2$O]{} maser source in Sgr B2(M). The geometrical properties of supersonic turbulence revealed by [H$_2$O]{} masers in this and four other sources are presented in Section 3, and the statistical properties of the velocity field traced by the masers in Section 4. In Section 5, proceeding from the hypothesis that the [H$_2$O]{} masers adequately probe the velocity field of turbulence, we discuss implications of our statistical results for the theory of supersonic turbulence. In Section 6 we describe a new conceptual model of [H$_2$O]{} masers in regions of star formation based on the surmised connection of maser pumping with the sites of ultimate dissipation of turbulent energy. Conclusions are summarized in Section 7.
VLBI Observations of Sgr B2(M)
==============================
The observations of Sgr B2(M) were conducted in 1986 on 23 January, 26 February, 27 March, and 26 April, as part of a campaign to measure proper motions of these H$_2$O masers. Four telescopes spanning the U.S. were used: the Haystack 37-m telescope in Westford, MA, the NRAO[^1] 43-m telescope in Green Bank, WV, one 25-m telescope of the VLA near Socorro, NM, and the OVRO 40-m telescope in Big Pine, CA. The Mk III recording system was used with four 2-MHz bands covering the LSR velocity ranges of -40 to -14, +18 to +43, +43 to +69, and +68 to +94 km s$^{-1}$, assuming a rest frequency of 22235.08 MHz for the H$_2$O $6_{16} -- 5_{23}$ transition. The recorded data were correlated at the Mk III processor at Haystack Observatory in a mode which yielded 56 (uniformly weighted) spectral channels, each 35.71 kHz or 0.48 km s$^{-1}$ wide.
The data were edited, calibrated, and imaged following the same general procedures as described in Reid [[*etal.*]{}]{} (1988) for the source Sgr B2(N). The synthesized interferometer beam was approximately 2.4 by 0.4 mas FWHM, elongated in the north-south direction, owing to the low declination of Sgr B2. Compact maser spots with flux densities ranging between 135 and 0.4 Jy were detected across a field of approximately 2 by 2 arcseconds. The positions of the maser spots were obtained by fitting a circular Gaussian brightness model for each spectral channel independently using the AIPS task IMFIT.
The Geometry of [H$_2$O]{} Masers
=================================
Figure 1 shows a series of decreasing spatial scales for our VLBI map of Sgr B2(M). The scale changes by almost four orders of magnitude — from ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'076$}}\mathchar"7218$}}}1\,$arcsec down to ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1\,$mas — which, at the assumed distance of 8 kpc (Reid 1993), corresponds to a range of linear scales between, roughly, 10,000 and 1 A.U. As is typical of fractal dust-like structures, the distribution of masers looks qualitatively the same on all scales, with evident clustering.
On all maps of Figure 1, except the last one, dot sizes are larger than the typical observed size of an individual maser spot. Dots on the last map show measured positions of spectral channels. Since a spectral channel ($0.48 \,$[kms$^{-1}$]{}) is narrower than a typical spectral width of a single spot (${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'076$}}\mathchar"7218$}}}0.8\,$[kms$^{-1}$]{}), a dot on the last map typically represents the position and velocity of only a part of an individual spot. We call the smallest groupings of heavily blended individual spots “minimal clusters.” The dots on the map only approximate the extension of and the velocity dispersion in these minimal clusters. Inspection of the available data indicates that a typical size of a minimal cluster is a few A.U. The velocity dispersion within minimal clusters varies from $\approx 1$ to 5 [kms$^{-1}$]{}.
We used two methods to estimate the fractal dimension of the spatial distribution of [H$_2$O]{} masers in SgrB2(M): the “density-radius” and the “box-counting” methods (see e.g. Crownover 1995; Feder 1988). The density-radius measure is based on the generalization of the mass [*versus*]{} radius relation for objects of integer dimension, $$M \propto r^d\;,$$ where $d$ is the dimension of the object. Equation (1) can be used as a general definition of the dimension of an object, including objects whose average density changes in a self-similar way with changing scale (e.g. Mandelbrot 1982). For these objects (fractals) $d$ is non-integer. Average density, $\rho$, within a given volume $V$ is $M/V$. Therefore, $$\rho = M/V \propto{{ r^d}\over {r^{d_0}}} = r^{d-d_0}\;,$$ where $d_0$ is the dimension of the supporting space, e.g. $d_0 = 2$ for a plane. If the dimension of the object equals the dimension of the support, $\rho$ equals a constant. If not, $\rho$ is a function of $r$. The steepness of this function depends on $d$.
A more practical procedure results from differentiating Equation (1), which gives $$\sigma \equiv {{{\rm d}M}\over {{\rm d}V}} \propto r^{d-d_0}\;,$$ or $$d = {{{\rm d(log}\,\sigma)}\over {{\rm d(log}\,r)}} + d_0\;.$$ Determining the dimension is thus reduced to measuring the slope of ${\rm log}\,\sigma$ [*versus*]{} log$\,r$. In the case of a point set like ours, “density” means “number density.”
In our numerical procedure, $\sigma$ is calculated (for a discrete set of $r$ values) as the surface density of companions to a given maser hot spot at angular separation $r$, averaged over all maser spots: $$\sigma(r) = {{<{\rm number\_of\_points}\,(r, r+\delta r)>}\over
{\pi[2r\delta r+(\delta r)^2]}}\;.$$ The same procedure was used by Walker (1984) and Gwinn (1994) for demonstrating self-similar clustering of [H$_2$O]{} masers in W49N. However, these authors did not relate $\sigma (r)$ to the fractal dimension of the source. Larson (1995) uses a similar procedure to obtain a fractal dimension for a young stellar association in Taurus.
We tested our numerical procedure by obtaining the density-radius fractal measure of a simple straight line and of the classical mathematical fractal, a Sierpinski triangle. The measured dimensions of 1.00 and 1.58 were in excellent agreement with their theoretical values $d = 1.000$ and $\approx 1.585$, respectively.
The box-counting measure associates a fractal object’s dimension $d$ with the number $N$ of boxes of side length $l$ needed to cover the object (Crownover 1995): $$N(l) \propto l^{-d}\,.$$ The graph of log$\,N(l)$ [*versus*]{} log$\,l$ is a straight line, having slope $-d$. We used the following computational algorithm. The square plane of minimal side length $L$ containing the whole object is divided into $2^2$ equal squares of side length $L/2$. The number of these squares containing one or more points making up the object is determined and stored. Each non-empty square of side length $L/2$ is subdivided again into 4 squares of equal area; the number of non-empty squares of side length $L/4$ is determined and stored, etc. The procedure is repeated down to some minimal side length of sub-squares; minimal side length is determined by the characteristic length of the smallest features of the object. Logarithm of the number of non-empty squares [*versus*]{} logarithm of their side length is plotted, and the slope of the straight line fitting the data points is measured; this slope is equal to $-d$. This numerical procedure was also tested with a straight line and a Sierpinski triangle. The measured values of dimension were again in agreement with the theoretical values.
We used equation (4) to determine the fractal dimension of the 2D projected ($d_0 = 2$) [H$_2$O]{} masers in the four observations of SgrB2(M). The values of the fractal dimension for the four observations and for their average are indicated in the corresponding panels of Figure 2. The average value is $d_2 \approx 0.44\pm 0.07$. The box-counting result for the average of the four observations is shown in Figure 3. The ensuing fractal dimension, $d_2 \approx 0.21\pm 0.02$, is noticeably lower than that obtained from the density-radius plot.
For both measures, a single linear fit is a satisfactory first approximation; the standard deviation of the residuals to the fit does not surpass $\pm 10\%$ for each epoch of observations and for the combined fit. However, notable deviations from a single power-law approximation can be seen in Figures 2 and 3. For example, a higher fractal dimension for the largest scales is evidenced by the steeping slope of the points in Figure 3. Some deviation from the linear dependence is seen in Figure 2, between log (separation) $\approx -2$ and $-3$. It may indicate some depression of clustering at the scales around 0.003 arcsec ($\sim 10^{14}\,$cm for this source).
The origin of the systematic difference between the two applied fractal measures is unclear. It may be rooted in technical particularities of the methods. Some practical problems in the application of the box-counting method are discussed in Gouyet (1996, Section 1.4.4). This discussion indicates that derived fractal dimensions should be correct within a factor of two. Given this uncertainty and the range of the derived values of slopes in Figures 2 and 3, we estimate the fractal dimension of the observed cluster as $d_2 \approx 0.3 \pm 0.2$.
Gwinn (1994) performed a statistical analysis of the VLBI maps of W49/[H$_2$O]{} obtained by Gwinn [[*etal.*]{}]{} (1992). He demonstrated a power-law dependence of the number density of neighbors on their separation. However, he used the one-dimensional projection of the distance and did not interpret his results in terms of fractals. To make results for W49N comparable to those for SgrB2(M), we applied the density-radius fractal measure to the two-dimensional spatial distribution of the [H$_2$O]{} maser spots in W49N, using the VLBI positions published by Gwinn [[*etal.*]{}]{} (1992). We have applied this measure to three more sources — two with the published VLBI results: W51(MAIN) and W51N (Genzel et al. 1981; Schneps et al. 1981) and one source, W3(OH), for which we used our unpublished VLBI coordinates of the maser spots (the corresponding map of the source was published — Alcolea et al. 1992).
The results for all sources are shown in Figure 4. A power-law dependence is a good approximation for all of them and it gives a low fractal dimension, ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1$, for all the observed sets of maser spots as projected on the sky.
Given the small angular dimensions of maser clusters ($\sim
1\,$arcsec), their projection on the sky is essentially an orthogonal projection. Therefore, the dimension $d_3$ of the real fractal, residing in 3-space, coincides with the dimension, $d_2$, of its 2D projection if $d_3 = d_2<2$ (e.g. Falconer 1990). We have demonstrated above that this condition is fulfilled for [H$_2$O]{} masers. Thus, we conclude that the fractal dimension of [H$_2$O]{} clusters in all five of the sources we have studied is low, $d_3 {\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1$.
This conclusion is new, although Walker (1984) and Gwinn (1994) obtained results that can be converted to estimates of fractal dimension. Walker (1984) obtained a high negative value of the power index ($\approx - 1.1$) in the power-law approximation of the density-radius dependence for W49N/[H$_2$O]{}. This corresponds to a fractal dimension $d_3 = d_2 \approx 0.9$. Gwinn (1994) reduced his two-point correlation analysis of [H$_2$O]{} masers in W49N to the 1D projection of the observed map on the $x$ axis. He obtained a power index, $\gamma_1
\approx - (0.2\to 0.3)$, for a large interval of scales. Although he did not connect this result with a fractal dimension, we note that for a 1D-projected fractal, $d_1 = \gamma_1 + 1$, where $d_1$ is the fractal dimension of the 1D projection of the real fractal residing in 3-space. Thus, Gwinn’s result corresponds to $d_1 \approx 0.7 - 0.8$. Since $d_1 < 1$, the same fractal dimension is ascribed to both the 2D-projection and the real fractal residing in 3-space. Thus, both the Walker’s (1984) and the Gwinn’s (1994) results support our conclusion that the fractal dimension of [H$_2$O]{} clusters is ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1$.
To better appreciate the fractal distribution of [H$_2$O]{} masers, it is instructive to compare it with models of homogeneously distributed random points. In our numerical model we created 90 points randomly and uniformly distributed in a thin spherical shell and then projected this distribution onto a plane. A drastic difference between the model distribution and the observed maser distribution can be seen visually (a lack of clustering in the model distribution) and is confirmed by the measured spatial dimension of the model point sets. As anticipated, both box-counting and density-radius methods gave $d\approx 2$ for the random, homogeneous cluster of model dots, to be compared with $d{\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1$ for the observed clusters of maser spots.
Other types of masers should also be tested for possible fractal structure. At least some of them do not seem to have such structure. For example, the OH masers associated with regions of star formation do not show self-similar spatial distribution, rather they demonstrate strong clustering on one scale, $\sim 10^{15}\,$cm (Reid [[*etal.*]{}]{} 1980). These masers form just outside an expanding ultra compact HII region and would not be expected to have a turbulent structure of the same kind as the [H$_2$O]{} masers that are due to the shear between a stellar wind and surrounding gas (see Section 6).
Statistics of The Velocity Field
================================
We investigated two statistical properties of the velocity field traced by [H$_2$O]{} masers in the same five sources: (1) the low-order two-point velocity structure functions, and (2) the probability distribution for the deviations of the two-point velocity increment from its mean value at different spatial scales.
Two-Point Velocity Structure Functions
--------------------------------------
Most statistical studies of the kinematics and structure of interstellar gas using masers as probes have so far been limited to one velocity component (the line-of-sight) and two coordinates on the celestial sphere. Owing to the smallness of maser sources (a whole source is only $\sim 1\,$arcsec across), the two spherical celestial coordinates are, with high precision, approximated by rectangular Cartesian coordinates. We assume, as all previous authors implicitly did, that if a power-law scaling relation takes place for velocity vectors in 3D space, the same relation, with the same exponent, holds for the dependence of the line-of-sight component of velocity on projected distances. This is a reasonable assumption if the velocity field is isotropic. It is analogous to the well-known use of the longitudinal velocity component in incompressible turbulence studies (see e.g. Frisch 1995).
Statistical analysis of the velocity field probed by [H$_2$O]{} masers has previously been performed for W49N on two independent sets of data (Walker 1984, Gwinn 1994). We discuss here only the low-velocity [H$_2$O]{} maser spots ($\approx \pm 20\,$[kms$^{-1}$]{} from the systemic velocity), which are more likely connected with the “Kolmogorov-type” supersonic turbulence than the high-velocity spots (section 6). Walker (1984) did not see an explicit dependence of two-point velocity increments on point separation for low-velocity features, shown in his Figure 8. One can interpret this graph as a power law with the exponenent $q {\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}0.2$. Gwinn (1994) found $q \approx 0.33\pm 0.01$ for the dependence of the median velocity differences on the 1D projection of the maser pair separation. One can conclude from these two studies that the value of $q$ for the two-point correlation function in W49N/[H$_2$O]{} does not surpass 1/3.
For each of the five [H$_2$O]{} sources (Section 3) we calculated the structure functions $$D_{\alpha}(l) \equiv \langle |v({\bf r}) - v({\bf r} + {\bf
l})|^{\alpha}\rangle\;.$$ for low values of the order of the function, $\alpha = 1\to 3$. In equation (7) the vectors [**r**]{} and [**l**]{} determine the positions of the two points in the plane of the sky, $v$ designates the line-of-sight velocity and $l$ the 2D projection of the linear distance between the points. Our calculation procedure is as follows. The whole range of maser spot angular separations (up to four orders of magnitude, in both sources) is divided into $N$ bins, with logarithmically increasing bin size and thus logarithmically increasing separation between bin-centers. Using the VLBI relative position data, the procedure selects all pairs within a given separation bin and calculates one of the functions (eq.\[7\]). This procedure is repeated for every separation bin and the resultant averages of the powers of velocity differences are plotted as a function of separation in a log-log graph. A least-squares fit of a straight line to the points on the graph is then performed to obtain a power-law exponent, $q$, and its uncertainty (one standard deviation).
Figure 5 gives the results for Sgr B2(M), for $\alpha = 1$. The figure shows the results for the four epochs of observations (Section 2), as well as their average. The data are satisfactorily approximated by a power law. We obtain $q = 0.31\pm 0.03$, when the whole set of data is used. When data for the largest scales (log $|\Delta\theta\,{\rm
(arcsec)}| \ge -0.5$) are excluded (to avoid possible edge effects), the value of $q$ changes insignificantly: $q = 0.34\pm 0.03$. The second and third order structure functions have the exponents of $0.62\pm 0.06$ and $0.93\pm 0.09$, respectively. We note that for all three structure functions the power-law exponents are close to their classic Kolmogorov values, which are 1/3, 2/3 and 1.0 for $\alpha =
1,\;$2 and 3, respectively.
The results for $\alpha = 1$ for other sources are presented in Figure 6. The power-law approximation gives the values of $q$ close to 1/3 for all the sources except for W3(OH), where it is significantly lower ($0.19 \pm 0.03$). In this source, however, the VLBI map reveals a strong regular component of motion (strongly collimated bipolar outflow), which should significantly influence the results when the whole VLBI map is considered for the statistical analysis. To decrease the influence of the regular velocity component, we obtained the first order structure function for only one of the two lobes of the bipolar outflow. In this case, the regular component of the relative velocities should be minimal, and one can anticipate that the bulk of the relative motions of the condensations will be due to turbulence. The result is shown in Figure 7; the value of $q$ (0.30) is now much closer to the Kolmogorov value.
With all sources displaying the low-order structure functions close to Kolmogorov’s, one might wonder how likely it is that this is simply coincidental. Can regular, non turbulent velocity fields, such as expansion and/or rotation, produce the observed power-law dependence of the velocity increments on spatial scales, with the power index close to 1/3?
In order to answer this question we applied the same statistical analysis to the results of numerical modeling that simulated regular motions of the maser spots only. 90 model dots were randomly and uniformly distributed in a thin spherical shell. Three types of regular motion were considered: (1) radial expansion; (2) rotation around an axis perpendicular to the line of sight; and (3) expansion plus rotation. In the last case we varied the ratio of the absolute values of the expansion velocity and the velocity of rotation on the equator.
The results of the (line-of-sight velocity) $\it versus$ (dot separation) correlation analysis are shown in Figure 8. The long straight line on the plots shows the slope 1/3 for reference. The quickly growing dispersion of the data points at smaller scales, seen on all the plots, is due to the uniform, non-fractal distribution of the points — a lack of clustering, and thus a poor statistics, at smaller scales. This large dispersion makes a linear fit beyond about 1.5 orders of magnitude from the largest scale meaningless. The slope of the fitting line, drawn in this limited interval, changes from about zero for the case of pure expansion ($\approx 0.08\pm 0.02$, for the specific realization shown in Figure 8) to approximately unity for the case of pure rotation ($1.01\pm 0.01$ in the example shown). All intermediate values of the slope can be achieved by combining expansion and rotation in a due proportion (the four lower panels). In particular, the “Kolmogorov” value 1/3 is achieved when the ratio of the velocity of rotation on the equator to the velocity of expansion is $\approx 3$.
It is quite improbable, however, that this [*ad hoc*]{} combination of kinematic parameters, plus the same orientation of the axis of rotation is realized in all the sources under study. In all the published models of the observed proper motions and radial velocities of [H$_2$O]{} masers the deduced model ratio of the expansion-to-rotation velocities is less than one. In W49N these velocities are almost equal — 17 and 16 [kms$^{-1}$]{}, respectively (we consider here only the low-velocity componenent of expansion; see Section 6). It is seen from Figure 8 that such a low ratio of expansion-to-rotation should produce a flatter slope than 1/3 at large scales. It is noteworthy that flattening of the slope of the two-point correlation function does indeed appear at larger scales for all the sources in Figure 6. This reveals the contamination of the statistical properties of the turbulent component of motion by the regular component. The role of the regular component(s) of the velocity field relative to the turbulent component drops with the decreasing spatial scale, and it is remarkable how effectively the smaller scales “compensate” for the flattening at the larger scales in Figure 6 and force the average slope to tend to its Kolmogorov value.
Statistics of Deviations from the Mean Velocity Increment
---------------------------------------------------------
An inherent manifestation of terrestrial turbulent flows is [*intermittency*]{} — the spatial and temporal inhomogeneity of the velocity field. Intermittency results in enhanced, higher than Gaussian, probability of large deviations of the two-point velocity increments from their average value at a given spatial scale. Deviations from a Gaussian distribution have been observed in laboratory and atmospheric incompressible turbulent flows \[Dutton and Deaven (1969), van Atta and Park (1972)\]. Falgarone and Phillips (1990) and Falgarone, Phillips, and Walker (1991) attributed the broad (broader than Gaussian) wings of the emission line profiles observed in molecular clouds to an excess of large deviations from the average velocity difference in the cloud.
[H$_2$O]{} masers are more direct probes of the velocity field than thermal molecular lines observed in the cold clouds (see Section 6). Typically, the available VLBI results provide coordinates and line-of-sight velocities for $n \approx 100$ maser spots per observation. Thus, there are $m = n(n-1)/2 \approx 5000$ unique pairings for measuring the velocity-difference distribution. Given this relatively large number, we hoped that the statistics were sufficient to identify possible deviations from a Gaussian distribution at various spatial scales. Figures 9 and 10 show examples of velocity-difference probability distributions obtained for particular spatial ranges in SgrB2(M). The range for a given spatial scale was chosen to be equal to the scale. Unfortunately, some individual distributions were found to be not well-defined, centrally peaked distributions, which is evidently due to insufficient statistics.
In order to produce a more statistically significant result, we attempted to co-add the individual distributions. The summation was done as follows. The velocity difference ($x$ axis) and the number of pairs or counts ($y$ axis) of the individual distributions were independently normalized. The $y$ axis was normalized by dividing all bin counts by the maximum bin count. In order to normalize the $x$ axis, we first considered how the absolute value of the maximum velocity difference of individual distributions scaled as a function of radial separation between maser pairs. We found that this function was well approximated by a power-law. The best fitting straight line gave the exponent $\approx 1/3$. Given the previously established Kolmogorov scaling law for the mean absolute velocity differences between maser points, this result could be anticipated if we assume that the dispersion of velocity differences at a given scale is proportional to the mean absolute velocity difference at that scale. Using the resulting linear fit, the dispersions of velocity differences for individual distributions were normalized by multiplying the $x$-values of a distribution by the ratio $${{\Delta v_{max}^0}\over {\Delta v_{max}^l}}\;,$$ where $\Delta v_{max}^0$ is arbitrarily chosen to equal the maximum observed absolute value of the velocity difference occurring in the central spatial bin, and $\Delta v_{max}^l$ is the maximum absolute velocity difference value of an individual distribution. Once the $x$ and $y$ axes of the individual distributions were normalized, these distributions were co-added, producing a single histogram of the distribution averaged over spatial scales.
The conjoined histogram for SgrB2(M) is shown in Figure 10. It has a well-defined, centrally-symmetric shape. However, fitting it with a single Gaussian results in strong positive residuals in the wings of the distribution (Figure 10$a$). A two-Gaussian fit, both Gaussians being centered at zero, results in much smaller residuals (Figure 10$b$). Due to the method by which this histogram has been obtained, it contains only averaged (over all the spatial scales) information about the probabilities of deviations. Comparing the conjoined histogram with the individual histograms shows that summation significantly improves the statistics. This is indirect evidence that the velocity field at all or at most of the accessible spatial scales, has qualitatively similar statistical properties, including an excess of large deviations from Gaussian distribution. The two-Gaussian fit of the conjoined distribution provides a quantitative measure of the excesses, averaged over the entire scale range. The narrower Gaussian approximately describes the central part of the distribution, and the broader one describes its wings. The ratio “narrow/broad” of areas under these two Gaussians measures the excess of large deviations. >From Figure 9$b$, this ratio is $\approx 0.63$, considerably less than unity. Thus, the super-Gaussian wings are significant indeed.
Figure 11 shows the results of the same analysis for four other [H$_2$O]{} sources. In all of them, the wings of the distribution are much broader than those of the Gaussian that fits the central part of the distribution. This demonstrates that excess of large velocity-difference deviations is a common feature of the turbulent velocity fields probed by [H$_2$O]{} masers.
Implications for Supersonic Turbulence
======================================
In this section we discuss possible implications of our results for the theory of supersonic turbulence. The statistical study of [H$_2$O]{} masers described in the previous sections reveals three important results: (1) self-similarity (fractality) of the spatial distribution of the maser spots, (2) power-law character of the structure functions for the velocity field traced by the masers, with the power indices close to their classic Kolmogorov values for incompressible turbulence, and (3) excess of large fluctuations of the two-point velocity increments. As all these features are typical of the relatively well studied, incompressible turbulence, one can suspect that [H$_2$O]{} masers in regions of star formation arise in a turbulent medium. If this assumption is correct, [H$_2$O]{} masers, due to their record brightness and small angular sizes, may become unique probes of astrophysical turbulence. Since the velocity increments at the largest scales in the [H$_2$O]{} clusters are much greater than the probable speed of sound in neutral molecular gas, we deal here, by definition, with the poorly studied supersonic regime of turbulence. Comparison with the available theoretical knowledge about incompressible turbulence should therefore be done with high caution.
Fractal Dimension and Intermittency of Turbulence
-------------------------------------------------
The major conclusion of our analysis in Section 3 is that the spatial distribution of [H$_2$O]{} masers is fractal and that the measured fractal dimension is low, $d{\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1$. If [H$_2$O]{} masers trace the dissipation of supersonic turbulence, we should conclude that the fractal dimension of supersonic turbulence is considerably lower than that of incompressible turbulence, the latter being $\approx 2.6$ (Mandelbrot 1982). If one accepts the hypothesis that mass fluctuations in star forming clouds are produced by supersonic turbulence (Larson 1995), then the low fractal dimension ($\approx 1.4$) of a cluster of young stars in Taurus measured by Larson can be considered as a corroboration of our conclusion. Another relevant fact may be the observed low fractal dimension of the large-scale distribution of galaxies ($d\approx 1.2$; Mandelbrot 1982), but the role of turbulence in shaping this structure is even less clear.
It is helpful to introduce the “running” filling factor, $\beta$, of “daughter” turbulence elements within “mother” elements (Frisch 1995). The dimension of a fractal is expressed through $\beta$ by $$d = d_0 - \frac{{\rm ln}\,\beta}{{\rm ln}\,s} \,,$$ where $d_0$ is the dimension of the supporting space and $s<1$ is the scaling factor from the mother eddies to the daughter eddies. Constancy of $\beta$ from scale to scale guarantees a well-determined value of $d$ (a linear plot in Figurs 2 – 4). From equation (9) $$\beta = s^{d_0 - d}\,,$$ which shows that the filling factor of active daughter eddies in mother eddies decreases when the fractal dimension of turbulence decreases. The filling factor of active eddies is a direct measure of the degree of intermittency (spottiness) of turbulence. We conclude that highly supersonic turbulence, as revealed by [H$_2$O]{} masers and perhaps by the large-scale galaxy distribution and the distribution of stars in young clusters, is more intermittent than incompressible turbulence.
The very possibility of representing the observed spatial distribution of active turbulence elements by a single power law means that turbulence is intermittent on virtually all scales. The all-scale intermittency is also corroborated by the fact that the strong excess of the large velocity-difference deviations is revealed by the statistics averaged over different spatial scales (Section 4.2). This seems to be an important conclusion, because, in the case of incompressible turbulence, with its relatively high fractal dimension, the existence of intermittency in the inertial subrange of the scales (as opposed to the dissipation subrange) has long been an open question (Frisch 1995).
Does Supersonic Turbulence Have an Inner Scale?
-----------------------------------------------
According to the classical work by Kolmogorov (1941b,c, 1942), incompressible turbulence is characterized by two limiting scales — the outer scale $L$, where energy is supplied to the turbulent flow, and the inner scale $\eta$, where it is dissipated via molecular viscosity. The “inertial” subrange of linear scales $l$, where kinetic energy is neither injected into turbulence nor dissipated, but only transferred from larger to smaller scales, is between: $L \gg l
\gg \eta$. In the inertial subrange, turbulence tends to become homogeneous and isotropic. Kolmogorov demonstrated that the inner scale of incompressible turbulence is of the order of $$\eta_i \sim \biggl ({{\nu^3} \over {\overline \epsilon}} \biggr)^{1/4}\,,$$ where $\nu$ is the kinematic viscosity of the fluid and $\overline
\epsilon$ is the mean rate of energy dissipation per unit mass, given by the equation: $$\overline \epsilon = \frac{U^3}{L}\,,$$ where $U$ is the characteristic velocity difference at the outer scale $L$. Expression (11) for the dissipation scale is readily obtained from dimensional considerations; it is the only combination with the dimensions of length that can be constructed from the two parameters relevant to this mechanism of energy dissipation, $\nu$ and $\overline
\epsilon$.
Our attempt to derive a possible inner scale for highly supersonic turbulence is based on two assumptions. First, proceeding from the common belief that the major mechanism of energy dissipation in supersonic turbulence is via shock waves, we assume that sonic speed, $c_s$, rather than molecular viscosity, is the relevant parameter of the problem. Our second assumption may be more arguable. We assume that the second relevant parameter of the problem is the same as for incompressible turbulence — the mean rate of energy dissipation, $\overline \epsilon$. Thus, we assume that $\overline \epsilon$ is an approximate constant of the energy cascade, equal to the rate, per unit mass, of supply of kinetic energy at the outer scale. In other words, we assume no significant energy dissipation at intermediate scales. Although some theoretical and observational arguments can be provided in favor of this hypothesis (see below), we emphasize that, for the moment, it is only a hypothesis, whose consequences we would like to compare with observations.
With these two assumptions, we can derive the dissipation scale for supersonic turbulence, $\eta_s$ using standard dimensional analysis. It is easy to show that only one combination can be formed by $c_s$ and $\overline \epsilon$ with the dimensions of length, namely: $$\eta_s \sim {{c_s^3} \over {\overline\epsilon}}\,.$$ Substituting $\overline\epsilon$ from Equation (12) into equation (13), we can give $\eta_s$ a more useful form: $$\eta_s \sim {{c_s^3 L}\over {U^3}} = {{L }\over {{\rm M}_L^3}},$$ where M$_L = U/c_s$ is the typical value of the Mach number associated with the outer scale. Equation (14) shows that in highly supersonic turbulence (M$_L\gg 1$), the scale where shock waves begin to dissipate turbulent energy effectively is many orders of magnitude smaller than the outer scale $L$.
An argument in favor of our assumption that highly supersonic turbulence does not dissipate much of its kinetic energy at larger scales is the observed Kolmogorov, 1/3, slope of the two-point velocity correlation function in [H$_2$O]{} masers. The 1/3 slope is a straightforward consequence of the conservation of energy during its cascade along the hierarchy of scales. Any energy dissipation in the inertial subrange would produce a steeper slope. The specific kinetic energy associated with turbulent pulsations on a linear scale $l$ is $\sim v_l^2$, where $v_l$ is the r.m.s. turbulent velocity on the scale $l$. This energy is passed to smaller scales in about one “turn-over” time, $$\tau\sim \frac{l}{v_l}.$$ Therefore, the rate of energy transfer is $$\overline \epsilon \sim{{v_l^2}\over {\tau}}\sim{{v_l^3}\over {l}}\;.$$ If $\overline \epsilon$ is constant, equation (16) gives $v_l\propto
l^{\frac{1}{3}}$.
Suppose now that some amount of energy is dissipated on each scale. Then $\overline \epsilon$ is not a constant — it decreases with decreasing $l$. Approximating this decrease by a power law, $${{v_l^3}\over {l}}\propto l^{\alpha}\,,\;\; \alpha > 0\,,$$ we have $$v_l \propto l^{{{1}\over {3}}(1 + \alpha)}\;,$$ which demonstrates the steeping of the scaling law (since $\alpha > 0$).
Why can energy dissipation in larger-scale shocks be hindered in highly supersonic turbulence? Here is one possible answer. Although the potential component of the velocity field (describing compression and expansion of the gas) should play some part in a supersonic flow, this part may crucially depend on the unknown boundary and initial conditions of the flow (e.g. Falgarone [[*etal.*]{}]{} 1994). An extreme case is a purely vortical initial motion of gas at the larger scales. In this case, although the velocity increments for these scales (the difference in velocities of two opposite peripheral points of an “eddy”) may be highly supersonic, most converging flows within the eddy, which arise from fluctuations, will produce [*oblique*]{} shocks, whose normal velocity component, $v_{sh}$, will not exceed $c_s$ by much, and thus it will be small in comparison with the average vortical velocity increment: $v_l >> v_{sh} \sim c_s$. Thus, even if a shock of large scale is formed, the time it needs to sweep the eddy and dissipate its kinetic energy is much longer than the turn-over time (given in Equation 15), during which the eddy will disintegrate, passing its energy to smaller scales. Only when $v_l$ drops down to $\sim c_s$, which happens at the inner scale, $v_s$ and $v_l$ become comparable, and massive dissipation of kinetic energy in random shocks becomes possible. This gives a possible physical justification to equation (14).
Intermittency and Kolmogorov Spectrum
-------------------------------------
The important conclusion from the results presented in Section 4.1 is that the exponents of the low-order structure functions for the highly supersonic turbulence are close to their classic Kolmogorov values. In particular, the exponents of the second order structure function in all the investigated sources are close to 2/3. This value was predicted by Kolmogorov for homogeneous incompressible turbulence at very high Reynolds numbers (Kolmogorov 1941 a-c). Later, many authors, beginning with Kolmogorov himself (Kolmogorov 1962), attempted to introduce theoretical corrections to this exponent which would account for the experimentally detected intermittency of turbulence (e.g. Mandelbrot 1967; Frisch, Sulem & Nelkin 1978; see also Frisch 1995). For example, in the popular “$\beta$-model” of Frisch, Sulem, and Nelkin, intermittency is assumed to have a fractal geometry, and the corrected exponent is given by $$\zeta_2 = \frac{2}{3} + \frac{3 - d}{3}\,,$$ where $d$ is the fractal dimension of the set on which intermittent turbulence concentrates. In the case of incompressible turbulence $d
\approx 2.6 - 2.8$ and, therefore, the codimension $3-d$ and the whole correction factor \[second term in equation (19)\] are small. In fact, most of these intermittency corrections have historically been introduced as [*small*]{} parameters, to account for the small degree of observed intermittency in incompressible flow. This has made it difficult to discriminate between different theoretical models, as well as to judge, in general, the plausibility of the approach treating intermittency as a “disturbance” to the classic Kolmogorov theory.
Highly supersonic turbulent flow should have specific features different from those of incompressible turbulence. These two regimes of turbulence should, at least, differ in the ways they ultimately dissipate energy — via shock waves and molecular viscosity, respectively. However, the power-law character of the observed spectrum of supersonic turbulence, over several decades in scale, is a strong indication that the energy cascade from larger to smaller scales is as intrinsic a property of supersonic turbulence as it is for incompressible turbulence. Moreover, the prominent fractal structure of the set on which supersonic turbulence dissipates its energy and the non-Gaussian statistics of the two-point velocity increments, as revealed by [H$_2$O]{} masers, are strong evidence for qualitative similarity of both regimes of turbulence also in the sense of an intermittent character of turbulent activity.
Since the energy cascade and intermittency are the only two assumptions in the above mentioned models of incompressible turbulence, these models should likely also work in the case of supersonic turbulence. The only application of incompressibility of turbulence in these models is the assumption that energy is not dissipated at the intermediate (inertial subrange) scales. This assumption is not obvious for compressible, supersonic turbulence. However, the observed slope of the two-point velocity correlation function, close to Kolmogorov’s, suggests that dissipation on intermediate scales is insignificant in the supersonic case too (Section 5.1).
It is important to note, in this connection, that the [H$_2$O]{} masers reveal a very low fractal dimension ($d{\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1$) of the set on which supersonic turbulence ultimately dissipates in shock waves. With such a low $d$, the correction term from the beta-model \[equation (19)\] is large, and we anticipate that, due to intermittency, the slope of the second order structure function will be at least twice as steep as Kolmogorov’s classic value. Any dissipation of energy on intermediate scales — the only possible difference from the incompressible case — would steepen the structure function even more. Yet, the observed structure functions are close to Kolmogorov’s.
The observed pronounced intermittency of turbulence combined with the classic Kolmogorov velocity structure functions can only be understood if we accept that intermittency is inherent in turbulence — not a mere disturbance of its classic Kolmogorov properties. Such an approach to incompressible turbulence is being developed by Barenblatt and Chorin (1997; hereafter B&C)). These authors claim, in particular, that both the tendency of the second order structure function to its classic dependence on $l$ and an increase of the degree of intermittency are natural asymptotic properties of turbulence when the Reynolds number tends to infinity.
As first pointed out by von Weizsäcker (1951), the Reynolds numbers of the interstellar gas are, in general, very high. The Reynolds numbers of the dense nuclei of the star-forming molecular clouds, where [H$_2$O]{} masers reside, are especially high, due to the low viscosity of the dense gas. The turbulent flows probed by [H$_2$O]{} masers, have typical velocities $U \sim 10^6\,$cm/s at a scale of $L \sim 10^{17}\,$cm. With the typical number density $\sim 10^6\,$[cm$^{-3}$]{} and temperature $\sim
10^2\,$K for a molecular cloud core, the kinematic viscosity is $\sim
10^{13}\,{\rm cm^2/s}$, and the typical value of the Reynolds number, ${\rm Re} \equiv LU/\nu$, is $\sim 10^{10}$.
For incompressible turbulence, the Reynolds number is a measure of the width of the inertial subrange. If the inertial subrange of supersonic turbulence probed by [H$_2$O]{} had been limited by viscosity, it would have been very large. However, there is little doubt that, in the highly supersonic regime, the dissipation of energy starts at a much larger scale than the inner scale determined by viscosity. In Section 5.2, we postulated the existence in highly supersonic turbulence of an inner scale determined by energy dissipation in small-scale stochastic shocks and given by equation (14). Although this inner scale is much larger than the Kolmogorov dissipation scale ($\eta_s \sim 10^{13}\,$cm; $\eta_i \sim 10^7\,$cm), there is still a large inertial subrange in the highly supersonic regime – almost four decades in projected linear scale.
One can try to reformulate the B&C theory and obtain an asymptotic law for the supersonic regime using the Mach number rather than the Reynolds number. As is customary in crude phenomenological approaches, we shall ignore distinctions between structure functions involving different components of the velocity vectors. Specifically, we shall assume that the second order structure function $D_{zz}$ involving the line-of-sight ($z$) component of the difference velocity vector for two points reflects typical properties of all other structure functions.
Following the reasoning of B&C, we can assume that in the inertial subrange of supersonic turbulence $$D_{zz} = f(l, L, \overline\epsilon, c_s)\,,$$ where $\overline\epsilon$ is the mean rate of energy dissipation per unit mass. It is assumed that in this inertial subrange the energy flux from larger to smaller scales is nearly constant and equal to $\overline\epsilon$. Applying the standard dimensional analysis, we find the scaling law for $D_{zz}$: $$D_{zz} = (\overline\epsilon l)^{\frac{2}{3}}\,\Phi\biggl
(\frac{l}{\eta_s},\, {\rm M}_L\biggr )\,,$$ where $\Phi$ is a dimensionless function of its two dimensionless arguments. We chose the Mach number at the outer scale, M$_L$, and the running scale $l$ measured in the units of inner scale, $\eta_s$, as the two dimensionless arguments. In the case of incompressible turbulence the Reynolds number, instead of the Mach number, enters the parentheses in equation (20).
The dimensional analysis, by itself, doesn’t tell us anything about the properties of the function $\Phi$ and its two arguments. In order to finalize the scaling law, one must make a [*similarity assumption*]{} about the behavior of $\Phi$ as its two arguments tend to infinity. As B&C point out, two different assumptions about this function mark the historical evolution of incompressible turbulence theory:
1\. Complete similarity in both arguments: $\Phi \approx \Phi(\infty, \infty)
=\,$const, when both dimensionless arguments tend to infinity (Kolmogorov 1941a);
2\. Complete similarity in Re, but incomplete similarity in $l/\eta$, leads to a power-law dependence of $\Phi$ on $l/\eta$ (Kolmogorov 1962).
The first assumption leads to the classic Kolmogorov $D(l)\propto
l^{2/3}$. The second assumption introduces an additive correction to the power index, which has been interpreted as a correction for intermittency. B&C argue that the second assumption is internally contradictory and make the separate assumption of incomplete similarity in $l/\eta$ and [*no*]{} similarity in Re. This again generates an additive correction to the power index, but now the correction depends on the value of Re. In the limit of Re$\,\to\infty$ the correction tends to zero and one is left with the classic $D(l)\propto l^{2/3}$ dependence. The correction is substantial only when Re is not large.
These similarity arguments can be repeated in the case of highly supersonic turbulence, with the formal substitution of M$_L$ for Re. The B&C’s theory makes no quantitative estimates of the magnitude of Re (or M$_L$, in our case) necessary to reach the asymptotic behavior of $D$. We can suppose that in the case of turbulence probed by [H$_2$O]{} masers, M$_L$ is high enough for the correction to Kolmogorov value of the power index to lie within the experimental errors. Thus, B&C’s theory (and its extension to supersonic turbulence) rejects the notion that significant intermittency requires a significant correction to Kolmogorov’s 1941 law and thereby reconciles the observed low fractal dimension (high intermittency) of supersonic turbulence and its classic Kolmogorov velocity structure functions.
The Origin of [H$_2$O]{} Masers
===============================
One can speculate that a jet from a young star produces two basic flow regimes in the ambient gas: (1) a frontal, high-Mach shock and (2) a high-vorticity flow due to the velocity shear at the side interface of the jet and the ambient gas (e.g. Masson & Chernin 1993). We surmise that the low-velocity [H$_2$O]{} masers are associated with the second regime. The high-velocity [H$_2$O]{} masers may be connected with the first regime, but one can anticipate that this connection, and turbulence produced by the frontal shock, would be more complicated than in the second regime. Looking for the simplest cases of supersonic turbulence, we discuss only the second regime and the low-velocity masers in this investigation.
A power-law spatial-distribution correlation function in all of the [H$_2$O]{} sources investigated here signifies self-similar clustering over almost four orders of magnitude in scale — from $\sim 10^4\,$A.U. to $\sim 1\,$A.U. The “minimal clusters” in this hierarchy \[“features” in Gwinn’s (1994) terminology\], are actually spatial and spectral blends of elementary sources — those observed through an element of spectral resolution. By the order of magnitude, both the elementary sources and the minimal clusters have a typical size of $\sim 1\,$A.U., which is intriguingly close to the predicted dissipation scale of supersonic turbulence, given by equation (14). In a typical [H$_2$O]{} maser source, the low-velocity features are spread over a projected area of $L \sim 10^{17}\,$cm and occupy a velocity interval $U \approx
20\,$km/s. Taking $c_s\approx 1\,$ km/s (appropriate for probable kinetic temperatures of several hundred K), we have $M_L \approx 20$ and $\eta_s \sim 10^{17}/(20)^3 \sim 10^{13}\,$cm $\;\sim 1\,$A.U. Unless this is a coincidence, the smallest clusters of [H$_2$O]{} masers may be the sites of the ultimate dissipation of turbulent energy via stochastic shocks on the inner scale of supersonic turbulence.
This new conceptual approach to [H$_2$O]{} masers may have several important consequences for understanding the very mechanism of masing in these sources. It has often been argued that shock waves provide the best conditions for pumping [H$_2$O]{} masers. Strelnitski and Sunyaev (1973) interpreted the observed large dispersion of the [H$_2$O]{} Doppler velocities in W49N as due to supersonic gas outflow from a young host star and conjectured that the interaction of the outflow with the surrounding gas could produce shock waves necessary for pumping. This hypothesis has been further developed by many authors, who have elaborated on details of the shock structure and collisional-radiative (the first word standing for the source and the second — for the sink of the quantum heat engine) or collisional-collisional schemes of maser pumping behind a shock (e.g., Shmeld, Strelnitski & Muzylev 1976; Strelnitski 1984; Kylafis & Norman 1986, 1987; Hollenbach, McKee & Chernoff 1987; Elitzur, Hollenbach & McKee 1989; Kaufman & Neufeld 1996). A common feature of all these models is that the pumping shock is a result of a direct collision of the outflow with a dense blob in the surrounding quiescent gas, or a direct collision of a dense blob in the outflow with the surrounding gas (Tarter & Welch (1986). In the present model, the pumping energy is not imparted to the masing gas blobs directly by the stellar wind. Instead, the energy is channeled to the masers by a cascade from larger scales, which receive energy from the stellar wind or jets.
In previous models, the shocks pumping [H$_2$O]{} masers were assumed to have high velocities. These were either high-speed (${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'076$}}\mathchar"7218$}}}50\,$[kms$^{-1}$]{}) dissociative J-shocks (Elitzur, Hollenbach & McKee 1989), or slower (${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'076$}}\mathchar"7218$}}}10\,$[kms$^{-1}$]{}) C-shocks propagating perpendicular to the magnetic field (Kaufman & Neufeld 1996). Two main goals were pursued in developing those models: (1) the achievement of the maximum possible abundance of [H$_2$O]{} molecules via chemical reactions, and (2) the realization of sufficiently high kinetic temperatures for pumping the $6_{16} - 5_{23}$ and other masing transitions. It has been argued (Melnick [[*etal.*]{}]{} 1993; Kaufman & Neufeld 1996) that to fulfill both these requirements, temperatures ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'076$}}\mathchar"7218$}}}1000\,$K are needed. An important question is whether the slow shocks we advocate in this paper can provide such temperatures. An analysis of the shock structure is beyond the scope of the present paper. However, we note that a J-shock propagating [*along*]{} the magnetic field lines will have a post-shock temperature ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'076$}}\mathchar"7218$}}}1000\,$K, if its velocity is ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'076$}}\mathchar"7218$}}}3\,$[kms$^{-1}$]{}, which is a realistic velocity for an inner scale shock in our model.
Are [H$_2$O]{} Masers an Adequate Probe of Supersonic Turbulence?
=================================================================
If the new conception of [H$_2$O]{} masers proposed here is correct, they may become an ideal tool for studying the properties of supersonic turbulence. In contrast to the large-scale ISM, supersonic turbulence probed by [H$_2$O]{} masers has only one source of energy, supplied at the largest scale — the interaction of the outflow from a young star with the surrounding gas. Furthermore, these flows are highly super-virial, so that gravitational effects are not important. Most probably, these flows are also super-Alfvenic. With the probable magnetic field strength $B\sim 10^{-3}\,$G in the dense cores of molecular clouds, and $B\sim 10^{-1}\,$G in the [H$_2$O]{} maser clumps (Fiebig & Güsten 1989), and with the probable number densities of molecular hydrogen, $n\sim 10^6\,$ and $n\sim 10^{10}\,$[cm$^{-3}$]{} respectively, the Alfvenic velocity is $v_A = B/(4\pi\rho)^{1/2} \approx B/(4\pi m_{H_2}
n)^{1/2} \approx 2\,$[kms$^{-1}$]{} in both cases. This is much less than the outer scale velocity ($v_L\approx 20\,$[kms$^{-1}$]{}). Thus, turbulent velocities at most of the scales should be greater than the Alfvenic velocity, which means that the magnetic field does not constrain turbulent pulsations.
Masers are more effective than traditional ISM probes of turbulence, such as thermal or fluorescent spectral lines, from the observational standpoint. Maser lines are bright and narrow, which allows the spatial and kinematic structure of the associated flow to be measured with high precision. Because masing condensations are so small (${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1\,$ marcsec), every spectral feature detected by the interferometer gives a direct measure of line-of-sight velocity at a given [*point*]{} in the flow, projected onto the sky. Indeed, the requirement of the velocity coherence along the line of sight (to produce lines with the observed widths ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1\,$[kms$^{-1}$]{}), together with the observed line-of-sight velocity gradients in the transverse direction of $\sim
1\,$[kms$^{-1}$]{}AU$^{-1}$, and under the assumption that velocity gradients in the region are more or less isotropic, limits the probable length of a maser hot spot along the line of sight to ${\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}10\,$AU. This is much less than the size of the whole active region ($\sim 10,000\,$AU) and allows us to consider the [H$_2$O]{} masers as point-like probes of the velocity field, virtually as effective as the direct probes used to study terrestrial turbulent flows.
Doubts can arise on whether [H$_2$O]{} masers are an adequate probe of the geometry of the turbulence dissipation. For example, due to possible directivity of their radiation, some masing blobs may be unobserved. Can this distort the statistics we study? Obviously, the non-observability of a fraction of places where turbulence dissipates results in underestimation of the space filling factor of dissipation. However, this will not affect the deduced fractal dimension of the set on which dissipation takes place, if all the “eddies,” down to the smallest ones contain [*some*]{} amount of observable masers. This follows from equation (4): reduction of $\sigma$ by any factor (due to non-observability of a fraction of the masers) will not change the value of the logarithmic derivative, and thus the value of $d$.
If the directivity of the maser radiation is very high, it can affect observability of the smallest eddies, containing relatively small numbers of elementary masers. By an unlucky chance, all the masers within such an eddy could be turned away from the observer. The larger eddies, containing more elementary masers, should still be observable, although their contours will be delineated by reduced numbers of maser spots. A lack of observability of the smaller eddies will result in a decrease of $\beta$ with the decreasing scale \[see equation (10)\] and in a corresponding change of the slope of the plots in Figures 2-4. Using equations (9), (4), and (6), it is easy to convince oneself that this would steepen the slope of the plot toward the smallest scales in Figures 2 and 4 and flatten it toward the smallest scales in Figure 3. These effects are either unseen or quite small in these figures. We believe, therefore, that the majority of the scales, covering almost four orders of magnitude, are well represented by the [H$_2$O]{} masers and that $d$ is determined adequately, regardless of possible omission of a fraction of the maser probes caused by radiation directivity.
Conclusions
===========
1\. VLBI maps of five [H$_2$O]{} maser sources in regions of star formation reveal fractal spatial distribution of the masing hot spots; a power-law dependence of two-point velocity increments on spatial scale; and the non-Gaussian statistics of velocity increments (a strong excess of large deviations from the mean value). All these properties are known as typical of turbulence.
2\. If the [H$_2$O]{} masers trace turbulence indeed, our quantitative analysis shows that this highly supersonic turbulence is characterized by a much lower fractal dimension ($d{\mathbin{\lower 3pt\hbox
{$\rlap{\raise 5pt\hbox{$\char'074$}}\mathchar"7218$}}}1$), and thus much stronger intermittency, than incompressible turbulence. Strong intermittency at virtually all the spatial scales is also confirmed by the excess of large velocity increments at all scales.
3\. Unexpectedly, the power indices of the low-order velocity structure functions for the putative supersonic turbulence are found to be close to the classic Kolmogorov values for high-Reynolds-number incompressible turbulence. This is incompatible with the strong intermittency (low fractal dimension) in traditional approaches to turbulence, but may find its explanation in the framework of the new approch put forward by Barenblatt and Chorin.
4\. Supersonic turbulence with a high Mach number at its greatest scale may possess an inner scale, at which the bulk of its energy is dissipated in low-Mach-number stochastic shocks. The predicted value of the inner scale is close, by the order of magnitude, to the observed sizes of the [H$_2$O]{} hot spots. We hypothesize that the [H$_2$O]{} masers are generated in the random shocks at the inner scale of highly supersonic turbulence produced in the ambient gas by the intensive outflow from a newly-born star.
[*Acknowledgements.*]{} S.G. and B.H. acknowledge with gratitude support of their participation in this study by the NSF (Research Experiences for Undergraduates) grant AST 93-0039 and by the Nantucket Maria Mitchell Association.
Alcolea, J., Menten, K.M, Moran, J.M., & Reid, M.J. 1992, in Astrophysical Masers, ed. A.W. Clegg & G.E. Nedoluha (Heidelberg:Springer), p.225 Anderson, N., & Genzel, R. 1993, in “Astrophysical Masers,” eds. A.W. Clegg & G.E. Nedoluha (Berlin: Springer), p. 97 Barenblatt, G.I. and Chorin, A. 1997, Comm. Pure Appl. Math., 50, 381 Clegg, A. and Nedoluha, G. (editors) 1993, Astrophysical Masers (Berlin: Springer-Verlag) Crownover, R.M. 1995, Introduction to Fractals and Chaos (Boston: Johns and Bartlett Publishers) Dickman, R.L. 1985, in “Protostars and Planets II,” eds. D.C. Black & M.S. Matthews (Tucson: Univ. of Arizona Press), p. 150 Dutton, J.A. & Deaven, D.G. 1969, Radio Sci., 4, 1341 Elitzur, M. 1992. Astronomical Masers (Dordrecht: Kluwer) Elitzur, M., Hollenbach, D., and McKee, C. 1989, ApJ, 346, 983 Elmegreen, B.G. 1993, in “Protostars and Planets III,” ed. E.H. Levy & J.I. Lunine (Tucson: Univ. of Arizona Press) Falconer, K.J. 1990, Fractal Geometry, Mathematical Foundations and Applications (Chichester: John Wiley & Sons) Falgarone, E. and Phillips, T.G. 1990, ApJ, 359, 344 Falgarone, E., Phillips, T.G., and Walker, C.K. 1991, ApJ, 378, 186 Falgarone, E., Lis, D.C., Phillips, T.G., Pouquet, A., Porter, D.H., & Woodward, P.R. 1994, ApJ, 436, 728 Feder, J. 1988, Fractals (New York and London: Plenum Press) Fiebig, D. & Güsten, R. 1989, A&A, 214, 333 Fleck, R.C., Jr. 1981, ApJ (Lett), 246, L151 Franco, J. and Carraminana, A., Eds., 1999, “Interstellar Turbulence,” Cambridge University Press, 1999 Frisch, U. 1995, [*Turbulence*]{} (Cambridge: University Press) Frisch, U., Sulem, P.L., and Nelkin, M. 1978, J. Fluid Mech. 87, 719 Genzel, R., et al. 1981, ApJ, 247, 1039 Gezari, S. 1997, BAAS, 29, \#5, Abstract \# 20.01 Gezari, S., Reid, M.J., & Strelnitski, V. 1998, BAAS, 30, \#4, Abstract \# 71.06 Gouyet, J-F. “Physics and Fractal Structures”, Springer, 1996 Gwinn, C. 1994, ApJ, 429, 241 Gwinn, C.R., Moran, J.M., & Reid, M.J. 1992, ApJ, 393, 149 Holder, B. & Strelnitski, V. 1997, BAAS, 29, \#5, Abstract \# 121.08 Hollenbach, D.J., McKee, C.F., & Chernoff, D. 1987, in “Star Forming Regions,” ed. M. Peimbert & J. Jugaku (Dordrecht: Reidel), p. 334 Kaufman, M.J. and Neufeld, D.A. 1996, ApJ, 456, 250 Kolmogorov, A.N. 1941, Dokl. Akad. Nauk SSSR, 30, 9; 31, 99, 538 Kolmogorov, A.N. 1942, Izv. Akad. Nauk SSSR, Ser. Fiz., 6 (1-2), 56 Kolmogorov, A.N. 1962, J. Fluid Mech., 12, 82 Kylafis, N. & Norman, C. 1986, ApJ (Lett.), 300, L73 Kylafis, N. & Norman, C. 1987, ApJ, 323, 346 Larson, R.B. 1995, M.N.R.A.S., 272, 213 Mandelbrot, B.B. 1967[*Science*]{}, 156,636 Mandelbrot, B.B. 1982, “The Fractal Geometry of Nature,” (New York: Freeman) Masson, C.R. & Chernin, L.M. 1993, ApJ, 414, 230 Melnick, G.J., Menten, K.M., Phillips, T.G., & Hunter, T. 1993, ApJ, 416, L37 Migenes, V, Reid, M. eds. 2002, “Cosmic Masers: from Protostars to blackholes,” ASP Conf. Series, vol. 206 Obukhov, A.M. 1941, Dokl. Akad. Nauk SSSR, 32, 22 Reid, M.J. 1993, Ann. Rev. Astron. Astroph., 31, 345 Reid, M.J., Hashick, A.D., Burke, B.F., Moran, J.M., Johnston, K.J., & Swenson, Jr, G.W. 1980, ApJ, 239, 89 Reid, M. J., Schneps, M. H., Moran, J. M., Gwinn, C. R., Genzel, R., Downes, D. & Rönnäng, B. 1988, ApJ, 330, 809 Richardson, L.F. 1922, Weather Prediction by Numerical Processes (Cambridge: Cambridge University Press) Scalo, J.M. 1987, in “Interstellar Processes,” eds. D.J. Hollenbach and H.A. Thronson, Jr. (Reidel Publishing Co.), p. 349 Schneps, M.H., et al. 1981, ApJ, 249, 124 Sellwood, J.A. & Balbus, S.A. 1999, ApJ, 511, 660 Shmeld, I.K., Strelnitski, V.S., & Muzylev, V.V. 1976, Soviet. Astron., 53, 728 Spitzer, L. 1978, Physical Processes in the Interstellar Medium (New York:Wiley) Strelnitski, V.S. 1984, M.N.R.A.S., 207, 339 Strelnitski, V.S., and Sunyaev, R.A. 1973, Soviet. Astron., 16, 579 Strelnitski, V.S., Alexander, J., Moran, J.M., & Reid, M.J. 1998, IAU Colloquium 164, Radio Emission from Galactic and Extragalactic Compact Sources, ASP Conference Proceedings, ed. J.A. Zensus, G.B. Taylor & J.M. Wrobel, 144, 369. Tarter, J. & Welch, W.J. 1986, ApJ, 305, 467 van Atta, C.W. and Park, J. 1971, in [*Statistical Models and Turbulence*]{}, Lecture Notes in Physics, vol. 12, eds. M. Rosenblatt and C. van Atta (Springer: Berlin), p. 402-426 von Weizsäcker, C.F. 1951, ApJ, 114, 165 Walker, R.C. 1984, ApJ, 280, 618 Walker, R.C., Matsakis, D.N., & Garcia-Barreto. 1982, ApJ, 255, 128
**FIGURE CAPTIONS**
Fig. 1. Multi-scale VLBI maps of [H$_2$O]{} maser source in Sgr B2(M) as observed on January 23, 1986. On all maps except the last one, dot sizes are larger than maser spot sizes. On the last map, dots are smaller than observed maser spot sizes ($\sim 1\;$AU, which is perhaps affected by interstellar scattering). The dots on the last map show measured positions of spectral channels whose radial velocities are indicated near the dots.
Fig. 2. Density-radius fractal measure for [H$_2$O]{} maser source in Sgr B2(M) for the four epochs of observation ($a$ – $d$) and for their average ($e$). The solid straight line shows linear fit to the data points (empty circles).
Fig. 3. Box-counting fractal measure for [H$_2$O]{} maser source in Sgr B2(M) — average for the four epochs of observation.
Fig. 4. Density-radius fractal measure for the [H$_2$O]{} maser sources in W49N, W51(MAIN), W51N, and W3(OH).
Fig. 5. Two-point line-of-sight velocity correlation function for [H$_2$O]{} masers in SgrB2(M). The empty circles represent data, the straight solid line shows linear fit. [*a–d*]{} — the results for the four epochs of observation; [*e*]{} — the average for the four epochs.
Fig. 6. Two-point line-of-sight velocity correlation function for [H$_2$O]{} masers in W49N, W51N, W51MAIN, and W3(OH).
Fig. 7. Two-point line-of-sight velocity correlation function for [H$_2$O]{} masers in one of the two “clusters” (streams of bipolar outflow) in W3(OH).
Fig. 8. Two-point line-of-sight velocity correlation function for a planar projection of a randomly-filled spherical shell, for different ratios of expansion and rotation components. Asterisks represent data. One of the two straight lines in each graph shows a linear fit (possible only for the largest scales); the other line indicates, for reference, a slope of 1/3.
Fig. 9. Histograms of the number of pairs having a given value of the deviation of their relative velocity from its mean value. $a$: separation range $18\to 36\,$mas; $b$: separation range $0.32\to
0.63\,$mas; $c$: separation range $0.18\to 0.36\,$mas.
Fig. 10. The probability of deviation of the two-point velocity difference from its mean value, averaged over scales for the [H$_2$O]{} maser spots in SgrB2(M). Both abscissa and ordinate axes are normalized as described in text. Dots represent data. Solid lines show a one-Gaussian fit ($a$) and a two-Gaussian fit ($b$) to the data points.
Fig. 11. Same as in Fig. 10 for [H$_2$O]{} masers in W49N, W51N, W51MAIN, and W3(OH) (“Cluster”). Solid line — observed data, broken line — one-Gaussian fit to the central part of the observed distribution.
\]
[^1]: NRAO is a facility of the National Science Foundation, operated under cooperative agreement by the Associated Universities, Inc.
|
Q:
Not able to connect agsXmpp client to eJabberd server
I am using Visual Studio 2010, and the OS is Windows 7, 64-bit. The project I am working on needs XMPP functionality in it; for this, I am using the agsXMPP library. The project type is a WPF client which throws up a window that stays there while my xmpp code is running.
I am running eJabberd 2.1.3 server on the same Windows system on which I am doing the development. I also created multiple accounts on the eJabberd server (like "aaa@mydomain", "bbb@mydomain", and so on) and "friended" them to each other.
For testing connectivity with my client, I am using Pandion Jabber client on Windows and a Xabber client on my Android on the same network. The setup is working fine and the Xabber and Pandion clients are able to exchange messages with each other. Just to ensure that there's no interference, I have temporarily disabled the Firewall.
Problem: I am unable to connect my program to the eJabberd server. The presence is just not shown on the other clients when the window is thrown up. I am using the following code:
string uname = "aaa", domain_server = "mydomain", resource = "res1", password = "password";
Jid jid = new Jid (uname, domain_server, resource);
XmppClientConnection _xmppConn = new XmppClientConnection (jid.Server);
// This is my development machine's IP address
_xmppConn.ConnectServer = "192.168.0.101";
_xmppConn.Server = domain_server;
_xmppConn.Open (jid.User, password);
// The event handlers:
_xmppConn.OnLogin += new ObjectHandler (_xmppConn_OnLogin);
_xmppConn.OnMessage += new agsXMPP.protocol.client.MessageHandler (_xmppConn_OnMessage);
void _xmppConn_OnMessage (object sender, agsXMPP.protocol.client.Message msg) {
MessageBox.Show (msg.Body);
}
void _xmppConn_OnLogin (object sender) {
MessageBox.Show ("Logged in");
}
The same code is working fine on Facebook chat, when I message the account from another FB account.
string uname = "<my fb name>", domain_server = "facebook.com", resource = "res1", password = "<my password>";
Jid jid = new Jid (uname, domain_server, resource);
XmppClientConnection _xmppConn = new XmppClientConnection (jid.Server);
_xmppConn.Server = "chat.facebook.com";
_xmppConn.Open (jid.User, password);
// The event handlers:
_xmppConn.OnLogin += new ObjectHandler (_xmppConn_OnLogin);
_xmppConn.OnMessage += new agsXMPP.protocol.client.MessageHandler (_xmppConn_OnMessage);
void _xmppConn_OnMessage (object sender, agsXMPP.protocol.client.Message msg) {
MessageBox.Show (msg.Body);
}
void _xmppConn_OnLogin (object sender) {
MessageBox.Show ("Logged in");
}
I have been racking my brains but am just not able to figure out where I may be going wrong. Can somebody please help? Thank you in advance. :)
A:
I think I figured it out. Since I was on a development system working with a "custom" domain, that is, mydomain, and not a well-known TLD resolved via the public DNS, I had to add an entry to the hosts file located here:
C:\Windows\System32\drivers\etc\hosts
Added the following entry (assuming 192.168.0.101 as your dev system's IP address):
192.168.0.101 mydomain
And comment out or delete this line in the code:
_xmppConn.ConnectServer = "192.168.0.101";
This will enable the library to figure out the address of "mydomain" to the IP address specified in the hosts file above on your local development machine.
Edit: Also make sure that you disable IPV6 on your system. See this thread: http://forum.ag-software.net/thread/682-agsXMPP-SDK-1-0-samples-How-to-call-server-on-loc
Instructions on how to disable IPV6: http://www.techunboxed.com/2014/10/how-to-disable-ipv6-in-windows-10.html
|
"The peaceful transition of power is one of the things that sets us apart," Hillary Clinton said. | AP Photo Clinton accuses Trump of 'threatening our democracy'
CLEVELAND — Hillary Clinton on Friday accused Donald Trump of “threatening our democracy” by refusing to say he would accept the election results, and suggested he was behaving like a third world dictator.
Trump unnerved both Democrats and Republicans on the debate stage Wednesday night when he would not commit to conceding the election, should Clinton triumph on Nov. 8. Instead, the reality TV star said he would keep America "in suspense."
Clinton and her campaign have seized on the remarks as part of a closing argument that seeks to cast Trump as an unacceptable choice for president who flouts core American values.
"Make no mistake, by doing that, he is threatening our democracy," Clinton told a capacity crowd of 1,600 in the gymnasium here at Cuyahoga Community College, in her first public event since the debate. "I have lost an election, you don't feel very good the next day, do you? But we know in our country the difference between leadership and dictatorship, right?"
She added that "the peaceful transition of power is one of the things that sets us apart. It is how we hold our country together no matter who's in charge."
Drawing on her experience as the nation’s top diplomat, Clinton seemed to draw comparison between Trump and repressive dictators who “jail their political opponents or execute them or exile them or invalidate elections that they didn’t win. That can never ever happen here.”
She continued, “Whether or not you support me or you support my opponent, together we must support American democracy.”
Barbie Jackson, a 24-year-old student at the college who attended Friday’s rally, said the argument resonated with her. “Why would he say that? It shows that he's not in it for a good cause,” she said, adding, “I just hope he doesn't do anything stupid” if he loses.
Yousef Saba contributed to this report. |
Intellectual genocide
Rarely do I ever rant or even say too much on Facebook considering it’s essentially only used to feed us endorsements and research our likes to subconsciously exploit our consumer driven nature, however I do feel a strong urge to educate the malignant tumors of the world. Those whose purpose seems only to the spreading of idiotic normalcies.
So I went forward with my rant. On Facebook of all platforms. Maybe the continuation of building a society on illiterate, internet obsessed zombies who are given free reign to speak without a hint of knowledge finally got to me or perhaps I just felt like climbing up on the old soap box. It really is interchangeable in my current mind numbing situation. Anyhow boys and girls back to the rant…
I get it not everyone is vegan. Most likely because it’s far too difficult of a commitment for this simplistic generation. I can respect that you’ve been indoctrinated into believing that killing beautiful creatures and consuming them is far healthier than ummmmmm vegetables 👌 but it’s just not.
I will digress in that thought and simply ask that you educate yourself, not judge, and most certainly do not place your small town, “need” to hunt for population control rhetoric down the throat of those who believe in cruelty free forms of living.
Truth be told we are taking over their land with our incessant breeding and the real need for population control is for those humaniish beings who believe in humane slaughter.
Again I digress.
So going forward… I have no sympathy for the ignorant, the lazy, the “anti” anything not understood. Trust me there is hope out there. With a little time you may grasp the concept of empathy. If you know nothing about veganism or any other “controversial” topic you should read up. I have some literature that you are welcome to borrow. |
In the proposed studies, new 211At-labeled reagents will be developed for application to therapy of metastatic prostate cancer. The new reagents will target the prostate specific membrane antigens (PSMA) or gastrin-releasing peptide receptors (GRP-R) on human prostate cancer cells. The studies will evaluate the in vitro binding and internalization of the new agents in C4-2 and PC-3 human prostate cancer cells. The studies will also evaluate tumor localization, pharmacokinetics and tissue distributions in SCID mice bearing C4-2 human prostate cancer xenografts, and evaluate the efficacy and toxicity of the best candidates in a quasi-metastatic bone metastases model in SCID mice. Targeting of the prostate cancer cells will be achieved by using an anti-PSMA antibody Fab4, the GRP-R-binding peptide bombesin, or a high binding affinity inhibitor of the enzymatic activity of PSMA. Because all three of these agents suffer from localization in kidney, protein-based conjugates will be prepared that have physical sizes and charges that exclude them from that organ. In specific aim 1 (SA 1), the antibody Fab4 fragment will be conjugated with four molecules of differing size and charge that contain the decaborate(2-) and branched-chain discrete-sized polyethyleneglycol (dPEG) moieties. In specific aim 2, bombesin or a PSMA inhibitor will be combined with decaborate(2-) in a trifunctional reagent. Those trifunctional molecules will be conjugated with recombinant streptavidin (rSAv) and that conjugate will be succinylated to demonstrate cancer targeting in that model system. In specific aim 3, the same molecules used in SA1 and SA2 will be conjugated with recombinant human serum albumin (rHSA) to provide 211At-labeled reagents that will be excluded from kidney, but will also have low immunogenicity. In specific aim 4, the three 211At-labeled reagents from SA1-3 that have the most favorable properties will be evaluated for efficacy and toxicity in a SCID mouse model for prostate cancer metastatic to bone. From the research effort one or two new 211At-containing reagents will be identified as having promise for more extensive evaluation in treatment of metastatic prostate cancer. PUBLIC HEALTH RELEVANCE: The goal of the proposed research is to develop reagents to effectively target the highly cytotoxic alpha-emitting radionuclide astatine-211 to metastatic prostate cancer cells in the body to kill those cells. The five-year survival rates of prostate cancer are about 100% if it is localized, but is only ~32% if distant metastases are present. The proposed research will develop new and unique At-211-labeled reagents that have the potential to dramatically improve the five-year survival of prostate cancer patients with metastatic disease. |
Unai Emery has confirmed that Kylian Mbappe and Marquinhos will be ready to return to action when Real Madrid visit Paris Saint-Germain on Tuesday (6 March) while the Spanish manager was also positive about the availability of Javier Pastore.
The news is a much-needed boost for PSG fans after last week they learned that Neymar will miss the second leg of the Champions League last-16 against Los Blancos after the former Barcelona ace fractured his fifth metatarsal during his side's 3-0 win over Marseille in Ligue 1 on 25 February.
Read more Luka Modric and Toni Kroos included in Real Madrid squad for PSG Champions League trip
Marquinhos also suffered a thigh injury in that game with Mbappe setting alarms bells ringing at the Parc des Princes three days later after being forced off with another ankle problem when PSG defeated Marseille in a Coupe de France clash.
Marquinhos and Mbappe missed the 2-0 win over Troyes as a result but Emery confirmed in his press conference than the two regulars starters as well as Javier Pastore are likely to be ready to return for the crucial visit of Real.
"We trained on Sunday, and we have one more training session on Monday afternoon. Marquinhos, Verratti, Mbappe and Cavani have all resumed training with the squad, unlike Pastore. I hope he will train with the team today. If he does, everyone will be available except Neymar," Emery said in the press conference as quoted by PSG official website.
Neymar could therefore be PSG's only major absentee for the second leg with the Ligue 1 side looking to overturn a 3-1 deficit from the reverse fixture played at the Santiago Bernabeu to progress through to the quarter-finals.
The positive news from the treatment room will give Emery a selection headache with former Real star Angel Di Maria tipped to fill the gap left by Neymar in his attack.
"When one player is missing, it opens a door for someone else. Tomorrow, all our players will be important – the starters and those who come on during the game," the former Sevilla and Valencia manager added.
Presnel Kimpembe and Thiago Silva will fight for a place in the heart of the back-line alongside Marquinhos while Emery was coy on whether he will pick Lassana Diarra or Thiago Motta to partner Adrien Rabiot and Marco Verratti in the middle of the park.
"The central defenders? That's a very difficult choice, because all three are playing very well. We will see how Marquinhos is feeling and decide on Tuesday," Emery said when asked about whether Silva will recover his place in the starting line-up after Kimpembe started at the Santiago Bernabeu.
"Both [Lassana Diarra and Thiago Motta] are ready to play. They have very different profiles, but both have the quality to play. They both have a lot of experience, they have both played in matches like this. For me, it's easy. I will make a choice, but it's possible that both will play on Tuesday." |
Talk:Empty set
This page used to say:
"Christian scientists and others hold that it is impossible to create something from nothing, casting doubt on the existence of the empty set. However, it remains an important tool among secular mathematicians."
I have never heard this, but if I am mistaken, please add it back. I am aware that the empty set has been the subject of discussion by philosophers, and perhaps Christian philosophers in particular. On the other hand, a very common way to specify a set is as the subset of elements of some other set which have a certain property. For example:
{ x \in the odd integers : x is prime } is the set of odd primes, i.e., {3,5,7,...}
on the other hand
{ x \in the odd integers : x is a multiple of 2 } is the empty set {}.
This doesn't seem to be creating something from nothing to me, and the empty set arises very naturally. Have such objections really been raised? --MarkGall 17:15, 2 September 2009 (EDT) |
Q:
Numpy string scalar comparison
I'm seeing a strange behavior with Numpy or I'm just bad at it.
I have a structured array with some string field. Now I want to filter the data based on that field. My understanding is that, this would work:
data['somefield'][data['filterfield'] == 'someconstant']
But strangely, it did not. I'm under assumption that
data['filterfield'] == 'someconstant'
Will produce an array of boolean. But it did not, it return a boolean (not an array of it). So instead of that, using
data['filterfield'] == full(data.shape,'someconstant',dtype=data['filterfield'].dtype)
works as expected but its a hassle and error prone. Is this an expected behavior? If so, is there a shorter way to create an array of string?
A:
data['filterfield'] probably is a list of strings. np.char has a set of operations for this type of array. It looks like the ordinary array==scalar test for numeric arrays does not work with this type of array. np.char.equal(c1,c2) compares two char arrays, and doesn't have a provision for one of those being a plain string.
So your approach, generating another string array, is the right one. But it can be simpler (due to broadcasting):
In [326]: x=np.array([(1,'one'),(2,'two'),(3,'three')],dtype='int,S10')
In [327]: x['f1']
Out[327]:
array([b'one', b'two', b'three'],
dtype='|S10')
In [328]: x['f1']==np.array('two',dtype='S')
Out[328]: array([False, True, False], dtype=bool)
np.array('two') might also work if the default char type matches with x. I did this testing in python3, so '
There may be other options using np.char functions, but this is straightforward and simple.
|
/*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
/*
* This code was generated by https://github.com/googleapis/google-api-java-client-services/
* Modify at your own risk.
*/
package com.google.api.services.androiddeviceprovisioning.v1.model;
/**
* A task for each device in the operation. Corresponds to each device change in the request.
*
* <p> This is the Java data model class that specifies how to parse/serialize into the JSON that is
* transmitted over HTTP when working with the Android Device Provisioning Partner API. For a
* detailed explanation see:
* <a href="https://developers.google.com/api-client-library/java/google-http-java-client/json">https://developers.google.com/api-client-library/java/google-http-java-client/json</a>
* </p>
*
* @author Google, Inc.
*/
@SuppressWarnings("javadoc")
public final class OperationPerDevice extends com.google.api.client.json.GenericJson {
/**
* A copy of the original device-claim request received by the server.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private PartnerClaim claim;
/**
* The processing result for each device.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private PerDeviceStatusInBatch result;
/**
* A copy of the original device-unclaim request received by the server.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private PartnerUnclaim unclaim;
/**
* A copy of the original metadata-update request received by the server.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private UpdateMetadataArguments updateMetadata;
/**
* A copy of the original device-claim request received by the server.
* @return value or {@code null} for none
*/
public PartnerClaim getClaim() {
return claim;
}
/**
* A copy of the original device-claim request received by the server.
* @param claim claim or {@code null} for none
*/
public OperationPerDevice setClaim(PartnerClaim claim) {
this.claim = claim;
return this;
}
/**
* The processing result for each device.
* @return value or {@code null} for none
*/
public PerDeviceStatusInBatch getResult() {
return result;
}
/**
* The processing result for each device.
* @param result result or {@code null} for none
*/
public OperationPerDevice setResult(PerDeviceStatusInBatch result) {
this.result = result;
return this;
}
/**
* A copy of the original device-unclaim request received by the server.
* @return value or {@code null} for none
*/
public PartnerUnclaim getUnclaim() {
return unclaim;
}
/**
* A copy of the original device-unclaim request received by the server.
* @param unclaim unclaim or {@code null} for none
*/
public OperationPerDevice setUnclaim(PartnerUnclaim unclaim) {
this.unclaim = unclaim;
return this;
}
/**
* A copy of the original metadata-update request received by the server.
* @return value or {@code null} for none
*/
public UpdateMetadataArguments getUpdateMetadata() {
return updateMetadata;
}
/**
* A copy of the original metadata-update request received by the server.
* @param updateMetadata updateMetadata or {@code null} for none
*/
public OperationPerDevice setUpdateMetadata(UpdateMetadataArguments updateMetadata) {
this.updateMetadata = updateMetadata;
return this;
}
@Override
public OperationPerDevice set(String fieldName, Object value) {
return (OperationPerDevice) super.set(fieldName, value);
}
@Override
public OperationPerDevice clone() {
return (OperationPerDevice) super.clone();
}
}
|
In vitro investigations into the roles of drug transporters and metabolizing enzymes in the disposition and drug interactions of dolutegravir, a HIV integrase inhibitor.
Dolutegravir (DTG; S/GSK1349572) is a potent HIV-1 integrase inhibitor with a distinct resistance profile and a once-daily dose regimen that does not require pharmacokinetic boosting. This work investigated the in vitro drug transport and metabolism of DTG and assessed the potential for clinical drug-drug interactions. DTG is a substrate for the efflux transporters P-glycoprotein (Pgp) and human breast cancer resistance protein (BCRP). Its high intrinsic membrane permeability limits the impact these transporters have on DTG's intestinal absorption. UDP-glucuronosyltransferase (UGT) 1A1 is the main enzyme responsible for the metabolism of DTG in vivo, with cytochrome P450 (P450) 3A4 being a notable pathway and UGT1A3 and UGT1A9 being only minor pathways. DTG demonstrated little or no inhibition (IC(50) values > 30 μM) in vitro of the transporters Pgp, BCRP, multidrug resistance protein 2, organic anion transporting polypeptide 1B1/3, organic cation transporter (OCT) 1, or the drug metabolizing enzymes CYP1A2, 2A6, 2B6, 2C8, 2C9, 2C19, 2D6, 3A4, UGT1A1, or 2B7. Further, DTG did not induce CYP1A2, 2B6, or 3A4 mRNA in vitro using human hepatocytes. DTG does inhibit the renal OCT2 (IC(50) = 1.9 μM) transporter, which provides a mechanistic basis for the mild increases in serum creatinine observed in clinical studies. These in vitro studies demonstrate a low propensity for DTG to be a perpetrator of clinical drug interactions and provide a basis for predicting when other drugs could result in a drug interaction with DTG. |
import { useCallback, useRef } from 'react';
/**
* Returns an array where the first item is the [ref](https://reactjs.org/docs/hooks-reference.html#useref) to a
* callback function and the second one is setter for that function.<br /><br />
*
* Although it function looks quite similar to the [useState](https://reactjs.org/docs/hooks-reference.html#usestate),
* hook, in this case the setter just makes sure the given callback is indeed a new function.<br /><br />
* **Setting a callback ref does not imply your component to re-render.**<br /><br />
*
* `createHandlerSetter` is useful when abstracting other hooks to possibly implement handlers setters.
*/
const createHandlerSetter = (handlerValue) => {
const handlerRef = useRef(handlerValue);
// since useRef accepts an initial-value only, this is needed to make sure
handlerRef.current = handlerValue;
const setHandler = useCallback((nextCallback) => {
if (typeof nextCallback !== 'function') {
throw new Error('the argument supplied to the \'setHandler\' function should be of type function');
}
handlerRef.current = nextCallback;
});
return [handlerRef, setHandler];
};
export default createHandlerSetter;
|
This invention relates to a process for preparing 1,4-dihydropyridine compounds. Compounds having 1,4-dihydropyridine structure are widely used in pharmaceutical industry. The compounds have been used, for example, in treating or preventing diseases such as cardiovascular disease and inflammation diseases.
Nifedipine and amlodipine are well-known 1,4-dihydropyridine compounds as calcium channel blockers.
Recently, it has been discovered that certain 1,4-dihydropyridine compounds possess bradykinin antagonistic activity. For example, PCT international patent publications WO 96/06082 and WO97/30048, and U.S. Pat. No. 5,861,402 disclose 1,4-dihydropyridine compounds possessing bradykinin antagonistic activity which are thus useful in the treatment of diseases or symptoms including an inflammation disease, a cardiovascular disease, and a pain producing trauma. These bradykinin-antagonist compounds are characterized by having, at its 2-position with a substituent comprising such as carbonyl, ester, amide or imide moiety.
Various 1,4-dihydropyridine preparation processes have been disclosed. For example, Hantzsch synthesis has been widely used as a 1,4-dihydro-2,6-dimethyl-pyridine preparation process. The process can be carried out by condensation of two moles of a xcex2-dicarbonate with one mole of an aldehyde in the presence of ammonia. J. B. Sainani reported synthesis of a 1,4-dihydro-2,6-dimethyl-pyridine compound which has asymmetrical substituents at its 3- and 5-positions (Org. Chem. Incl. Med. Chem. (1994), 33b (6),573-575).
The present invention provides a process for preparing 1,4-dihydropyridine compounds which comprises the steps of (a) contacting an enamine compound having structure of
and a compound having a structure of
in the presence of a base; and (b) treating the reaction mixture thus obtained in the presence of an acid or a combination of acids.
The present invention also provides a process for preparing a compound of formula (I):
wherein
R1 is selected from hydrogen and (C1-C4)alkyl;
R2 is selected from nitrile; xe2x80x94SO3H; xe2x80x94SO2xe2x80x94(C1-C6)alkyl; xe2x80x94SOxe2x80x94(C1-C6)alkyl; xe2x80x94PO[O(C1-C6)alkyl]; xe2x80x94C(xe2x95x90O)xe2x80x94R7, wherein R7 is selected from hydroxy or its salt, (C1-C6)alkyl-Oxe2x80x94, amino, (C1-C6)alkyl-NHxe2x80x94 and di[(C1-C6)alkyl]-Nxe2x80x94;
R3 and R5 are independently selected from nitrile and (C1-C5)alkoxy-C(xe2x95x90O)xe2x80x94;
R4 is an unsubstituted or a mono-, di-, tri-, tetra- or penta-substituted phenyl wherein the substituents are independently selected from halo; (C1-C4)alkyl optionally substituted with one to three halo; (C1-C4)alkoxy optionally substituted with one to three halo; nitro; amino; mono(C1-C4)alkylamino and di[(C1-C4)alkyl]amino;
R6 is selected from hydrogen; (C1-C10)alkyl; phenyl optionally substituted with one to two substituents independently selected from halo, (C1-C4)alkyl, tri-halo(C1-C4)alkyl and (C1-C4)alkoxy; and a 4- to 10-membered heterocyclic ring containing 1 to 4 heteroatoms or heteroatom containing moieties independently selected from xe2x80x94Oxe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94NHxe2x80x94 and xe2x80x94N[(C1-C4)alkyl]-, wherein said heterocyclic ring is saturated, partially-saturated or aromatic, and said heterocyclic ring is optionally substituted with one halo or (C1-C4)alkyl; and
Y is selected from a covalent bond, methylene, oxygen and sulfur; the process comprising the steps of
(a) addition reaction of an enamine compound of formula
xe2x80x83to a compound of formula
xe2x80x83wherein R1, R2, R3, R4, R5, R6 and Y are as defined above in the presence of a base under reaction conditions sufficient for coupling the compounds; and
(b) cyclization of the resulting compound in step (a) in the presence of an acid catalyst selected from a protonic acid, and a combination of a protonic acid and a non-protonic Lewis acid.
In the above described processes, compounds of formula (I) or (II) wherein R2 is a salt of carboxyl group (i.e., R2 is xe2x80x94C(xe2x95x90O)xe2x80x94R7 wherein R7 is a salt of hydroxy) are inorganic or organic salts of the carboxylic acid. Those salts are formed with a cation such as alkali or akaline earth metal (e.g., sodium, potassium, calcium, and magnesium), hydroxide or alkoxide in water or an appropriate organic solvent such as ethanol, isopropyl alcohol or mixture thereof.
According to the present invention, in general, desired 1,4-dihydropyridine compounds can be prepared under mild conditions, in a one-pot synthesis and high-yield.
In the above process, preferred substrates of formula (II) and resulting compounds of formula (I) are those compounds of each formula wherein R1 is hydrogen.
The term xe2x80x9c(C1-C4)alkylxe2x80x9d, as used herein, unless otherwise indicated, means a straight or branched saturated monovalent hydrocarbon radical selected from methyl, ethyl, propyl, isopropyl, n-butyl, sec-butyl and tert-butyl.
The term xe2x80x9c(C1-C4)alkoxyxe2x80x9d, as used herein, unless otherwise indicated, means a straight or branched (C1-C4)alkyl-O radical selected from methoxy, ethoxy, propoxy, isopropoxy, n-butoxy, sec-butoxy and tert-butoxy.
The term xe2x80x9cheterocyclic ringxe2x80x9d, as used herein, unless other wise indicated, means a monocyclic or bicyclic hydrocarbon group which has one or more hetero atoms in the ring, preferably has 6 to 9 carbon atoms and 1 to 4 hetero atoms or independently selected from xe2x80x94Oxe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94NHxe2x80x94, xe2x80x94N[(C1-C4)alkyl]-, wherein said heterocyclic is saturated, partially-saturated or aromatic. Examples of those groups include, but not limited to piperidino, morpholino, thiamorphorino, pyrrolidino, pyrazolino, pyrazolidino, pyrazoryl, piperazinyl, furyl, thienyl, oxazolyl, tetrazolyl, thiazolyl, imidazolyl, pyrazolyl, pyridyl, pyrimidinyl, pyrrolyl, pyrrolidinyl, quinolyl and quinuclidinyl.
The term xe2x80x9chaloxe2x80x9d, as used herein, refers to F, Cl, Br or I, preferably F or Cl.
Preferred bases used in reaction step (a) of this invention include bases capable of promoting a Michael-type reaction.
Preferred combination of xe2x80x9cbase in step (a)xe2x80x9d and xe2x80x9cacid catalyst in step (b)xe2x80x9d may be xe2x80x9ca magnesium (II) base in step (a)xe2x80x9d and xe2x80x9ca protonic acid in step (b)xe2x80x9d.
Preferably, an amount of the base is equal or more than 1 equivalent.
Other preferred combination of xe2x80x9cbase in step (a)xe2x80x9d and xe2x80x9cacid catalyst in step (b)xe2x80x9d may be xe2x80x9cbases other than magnesium (II) bases (e.g., alkyl-magnesium-halides, halo-magnesium-alkoxides and magnesium-dialkoxides) which are capable of promoting a Michael-type reaction in step (a)xe2x80x9d and xe2x80x9ca combination of a protonic acid and a non-protonic Lewis acidxe2x80x9d. Any non-protonic Lewis acids known to those skilled in the art such as metal halides, metal triflates (i.e., metal trifluoromethanesulfonate) or the like may be used in step (b). Examples of the Lewis acid include magnesium bromide, magnesium chloride, zinc bromide, zinc chloride, zinc iodide, tin(IV) chloride, titanium(IV) chloride, aluminium trichloride, ethylaluminum dichloride, diethylaluminum chloride, boron trifluoride, copper(II) triflate, scandium(III) triflate, lanthanum triflate, ytterbium triflate, lanthanum chloride, cerium(III) chloride and iron(III) chloride. Preferred individual Lewis acids include magnesium bromide and its ether complex such as magnesium bromide diethyl etherate, magnesium chloride and its ether complex such as magnesium chloride diethyl etharate, zinc chloride, zinc bromide and scandium(III) triflate. Among the Lewis acids, preferred ones include magnesium (II) salts such as magnesium halides, magnesium bromides and their ether complexes such as magnesium bromide diethyl etherate. Another preferred ones include magnesium (II) salts such as a magnesium sulfate, magnesium acetate, halomagnesiumacetate and halomagnesium sulfate.
Non-protonic Lewis acid such as MgCl2 can be added in the step (a) in advance.
When the starting compounds contain Lewis basic atom(s) such as N and O, an amount of the Lewis acid added may be increased for the success of step (b).
Preferably, a process of this invention may be carried out under reaction conditions wherein reaction step (a) is carried out in a reaction inert solvent at a temperature in the range from xe2x88x92150xc2x0 C. to the reflux temperature of the reaction mixture for 3 minutes to 2 days; and reaction step (b) is carried out in a reaction inert solvent at a temperature in the range from xe2x88x92150xc2x0 C. to the reflux temperature of the reaction mixture for 1 second to 5 days.
More preferably, a process of this invention may be carried out under reaction conditions wherein the reaction step (a) is carried out in a reaction inert solvent at a temperature in the range from xe2x88x9240xc2x0 to 80xc2x0 C. for 1 minute to 40 hours; and the reaction step (b) is carried out in a reaction inert solvent at a temperature in the range from xe2x88x9240xc2x0 to 80xc2x0 C. for 1 minute to 5 days.
Preferred bases used in reaction step (a) of this invention include (C1-C4)alkyllithiums, halomagnesium(C1-C4)alkoxide, (C1-C6)alkylmagnesiumhalides, metalhydrides, metal(C1-C3)alkoxides, metal-n-butoxide, metal-sec-butoxide, metal-tert-butoxide, metalcarbonate and metalfluoride.
Preferred acids used in reaction step (b) of this invention include hydrochloric acid, toluene (p-, m- or o-toluene) sulfonic acid, phosphoric acid, sulfuric acid, nitric acid and (C1-C6)alkanoic acid.
Preferred process of this invention include a compound of formula (I):
wherein
R1 is selected from hydrogen, methyl and ethyl;
R2 is selected from xe2x80x94C(xe2x95x90O)xe2x80x94R7, wherein R7 is selected from hydroxy or its salt, (C1-C6)alkyl-Oxe2x80x94, amino, (C1-C6)alkyl-NHxe2x80x94 and di[(C1-C6)alkyl]-Nxe2x80x94;
R3 and R5 are independently (C1-C3)alkoxy-C(xe2x95x90O)xe2x80x94;
R4 is di-substituted phenyl wherein the substituents are independently selected from halo, (C1-C4)alkyl optionally substituted with one to two halo, and nitro;
R6 is selected from hydrogen; (C1-C5-)alkyl; phenyl optionally substituted with one to two substituents independently selected from halo, (C1-C4)alkyl, CF3 and (C1-C4)alkoxy; and a 4- to 10-membered heterocyclic ring selected from piperidino, morpholino, thiamorphorino, pyrrolidino, pyrazolino, pyrazolidino, pyrazoryl, piperazinyl, furyl, thienyl, oxazolyl, tetrazolyl, thiazolyl, imidazolyl, pyrazolyl, pyridyl, pyrimidinyl, pyrrolyl, pyrrolidinyl, quinolyl and quinuclidinyl, and said heterocyclic ring being optionally substituted with one halo or (C1-C4)alkyl; and
Y is selected from a covalent bond, methylene, oxygen and sulfur.
Preferred process of this invention include a compound of formula (I):
wherein
R1 is hydrogen; R2 is COOH, COOCH3 or COOC2H5;
R3 and R5 are independently COOH, COOCH3 or COOC2H5;
R4 is a mono- or di-substituted phenyl wherein substituents are independently selected from fluoro, chloro and nitro;
R6 is selected from hydrogen; (C1-C3)alkyl; phenyl optionally substituted with one to two substituents independently selected from halo, (C1-C3)alkyl, CF3 and (C1-C3)alkoxy; and a 4- to 10-membered heterocyclic ring selected from piperidino, morpholino, thiamorphorino, pyrrolidino, pyrazolino, pyrazolidino, pyrazoryl, piperazinyl, furyl, thienyl, oxazolyl, tetrazolyl, thiazolyl, imidazolyl, pyrazolyl, pyridyl, pyrimidinyl, pyrrolyl, pyrrolidinyl, quinolyl and quinuclidinyl, and said heterocyclic ring being optionally substituted with one halo or (C1-C3)alkyl; and
Y is a covalent bond or methylene.
The following reaction schemes and discussion illustrate the preparation process of the present invention for preparing a compound of formula (I). Unless otherwise indicated, R1 through R8, Y, and p, q and r in the reaction schemes and discussion that follow are defined above. In the each reaction described below, unless otherwise indicated, the reaction pressure is not critical. Generally, the reactions will be conducted at a pressure of about one to about three atmospheres, preferably at ambient pressure (about one atmosphere). Also, unless otherwise indicated, the reactions run at about room temperature (i.e., from about 20xc2x0 to 25xc2x0 C.).
Compounds of formula (I) may be prepared by a process of this invention according to Scheme 1.
Scheme 1 exemplifies a process of this invention for preparing a compound of formula (I) comprising step (a): addition of an enamine compound of formula (II) to an alkylene compound of formula (III) followed by step (b) acid catalyzed cyclization reaction of the resulting compound in step (a).
The former addition step (a) may be carried out under conditions applied to nucleophilic addition reactions using a suitable base in a reaction inert solvent. More preferably, the reaction may be carried out under conditions commonly used in Michael-type addition. Preferred bases for this reaction are those used in Michael-type reactions. Examples of the preferred bases include alkylmagnesium halides known as Grignard reagents and halomagnesium alkoxides. More preferred bases include (C1-C6)alkylmagnesium bromide and tert-butoxy-magnesium bromide. Preferred solvents used in this reaction include (C1-C4)alkanol, tetrahydrofuran (THF), diethyl ether, dioxane, hexane, toluene, 1,2-dimethoxy ethane (DME) and the like. This reaction may be carried out at a temperature from about xe2x88x92150xc2x0 C. to reflux, preferably from about xe2x88x92100xc2x0 to 100xc2x0 C. In view of convenience, this reaction may be carried out at about room temperature using, for example, halomagnesium(C1-C4)alkoxides, (C1-C6)alkylmagnesiumhalides, metalhydrides, metal(C1-C3)alkoxides, magnesium-di[(C1-C3)alkoxides], metal-n-butoxide, metal-sec-butoxide, metal-tert-butoxide, a metalcarbonate such as K2CO3, or metalamide such as R2Nxe2x80x94M wherein R is C1-4 alkyl or xe2x80x94Si(C1-3 alkyl)3; and M is Li, Na, Mg or K (Preferably, halomagnesium(C1-C4)alkoxide or (C1-C6)alkylmagnesiumhalides). In case of the base is K2CO3, the reaction is effectively run in THF. In case of the base is CsF or KF, the reaction is effectively run in THF or methanol (MeOH) at an elevated temperature such as at about 60xc2x0 C. In case of using butyllithium (BuLi), the reaction is effectively run in THF at from about xe2x88x9278xc2x0 C. to about xe2x88x9230xc2x0 C. In case of using halomagnesium(C1-C4)alkoxides or (C1-C6)alkylmagnesiumhalides, a preferred solvent is THF. Suitable reaction time ranges from about 3 minutes to about 2 days, preferably from about 30 minutes to about 40 hours.
The subsequent cyclization process step (b) may be carried out in the presence of a protonic acid. Suitable protonic acids include (C1-C6)alkanoic acid such as acetic acid, hydrochloric acid (HCl) and sulfonic acids such as p-toluenesulfonic acid. It is preferred to add a non-protonic Lewis acid to the reaction mixture in combination with the protonic acid, when the base used in Step (a) is other than magnesium (II) bases. This reaction may be carried out at a temperature from about xe2x88x92150xc2x0 C. to reflux, preferably from about xe2x88x92100xc2x0 to 100xc2x0 C. The reaction time ranges from about 1 second to 5 days, preferably 5 minutes to 20 houres.
Generally, those reactions illustrated in Scheme 1 may be carried out at about xe2x88x9278xc2x0 C. using dry-ice/acetone or dry-ice/methanol, about 0xc2x0 C. using an ice-bath, room temperature or 100xc2x0 C. preferably at about 0xc2x0 C. or about room temperature.
The reaction steps (a) and (b) are performed in the same reaction vessel under mild conditions with high-yield.
An enamine compound of formula (II) may be prepared according to procedures known to those skilled in the art, such as those illustrated in Scheme 2.
Typically, a beta-keto ester compound of formula (IV) may be transformed to a compound of formula (II) wherein R2 and R3 are defined as above. This reduction may be carried out in a reaction inert solvent resolving ammonia gas at a temperature in the range of from about 0xc2x0 to 60xc2x0 C. Suitable reaction inert solvents include lower, alkanols such as methanol and ethanol. Alternatively, an ammonia gas containing solution given above may be added to a solution containing a beta-keto ester (IV). The mixture is reacted at a temperature in the range of from about 0xc2x0 to 60xc2x0 C. to yield the enamine compound (II).
An alkylene compound of formula (III) may be prepared according to procedures known to those skilled in the art. Scheme 3 illustrates one embodiment of the preparation process.
A carbonyl compound of formula (V) may be subjected to a coupling reaction with an aldehyde compound of formula (VI) to give the alkylene compound of formula (III) according to a known procedure. For example, a compound of formula (V) wherein R6xe2x80x94Yxe2x80x94 is an optionally substituted heterocyclic-(CH2)2xe2x80x94 may be reacted with a compound of formula (VI) according to a procedure reported by L. Tietze et al. Liebigs Ann. Chem., pp. 321-329, 1988. This reaction may be carried out in a suitable reaction inert-solvent for example an aromatic hydrocarbon such as benzene, toluene and xylene, an alcohol such as methanol, ethanol, propanol and butanol, an ether such as diethyl ether, dioxane and tetrahydrofuran (THF), a halogenated hydrocarbon such as methylene dichloride, chloroform and dichloroethane, an amide such as N,N-dimethylformamide, and a nitrile such as acetonitrile. This reaction may be carried out at a temperature in the range of from about 0xc2x0 C. to the reflux temperature of the reaction mixture, preferably from about 80xc2x0 to the 120xc2x0 C. for from about 30 minutes to 24 hours, preferably from 30 minutes to 6 hours. This reaction may conveniently be carried in the presence of a base or acid catalyst. Suitable base catalysts are such as piperidine, pyridine and alkoxide, and suitable acid catalysts are such as acetic acid, TiCl4 and p-toluenesulfonic acid.
An intermediate compound of formula (V) may be prepared starting from a known compound according to a procedure known to those skilled in the art. For example, a compound of formula (V) wherein R6 is an optionally substituted heterocyclic (including heteroaryl) defined as above, and R3 is (C1-C1)alkoxy-C(xe2x95x90O)xe2x80x94 may be prepared according to the procedure described in Scheme 4.
An aldehyde compound (VII), wherein R6 is defined as above, is reacted with malonic acid under a basic condition. For example, this reaction may be carried out in the presence of a weak base such as piperidine in a reaction inert solvent such as pyridine to give a carboxylic acid compound of formula (VIII). The compound (VIII) thus obtained may be subjected to an aliphatic nucleophilic substitution reaction in the presence of a coupling agent to give a pentenoate compound of formula (IX). This reaction may conveniently be carried out first by treating the compound of formula (VII) with a coupling agent such as N,Nxe2x80x2-carbonyldiimidazole in a reaction inert solvent such as dimethylformamide, then reacting with a neucleophilic reagent such as CH3O2CCH2K in the presence of a Lewis acid such as magnesium chloride. The former treatment may be carried out at a temperature in the range of from about 0xc2x0 to 60xc2x0 C. preferably at about room temperature for from about 1 minutes to 12 hours. The latter reaction may be carried out at the temperature in the range of from about 0xc2x0 to 100xc2x0 C., preferably from about room temperature to 60xc2x0 C. for from about 1 minutes to 12 hours. The compound of formula (IX) may be reduced over a metal catalyst under hydrogen atmosphere to give the compound of formula (V) according to a known procedure. Suitable catalysts are such as Raney nickel catalyst and a noble metal catalysts including palladium on carbon and palladium hydroxide. This reaction may be carried out in a reaction inert solvent such as methanol, at about room temperature under hydrogen at an appropriate pressure for example using a balloon, for about 1 minutes to 12 hours.
A ketone compound of formula (V) and a substituted benzaldehyde compound of formula (VI) may also be prepared according to known procedures (e.g., (1) D. Scherling, J. Labelled Compds. Radiopharm., Vol. 27, pp. 599-, 1989, (2) C. R. Holmquist et al., J. Org. Chem., Vol. 54, pp. 3528-, 1989, (3) S. N. Huckin et al., J. Am. Chem. Soc., Vol. 96, pp. 1082-, 1974, (4) J. C. S. Perkin I, pp. 529-, 1979, (5) Synthesis pp. 37, 1986, and (6) J. C. S. Chem. Commun., pp. 932-, 1977).
Compounds of formula (I) have a chiral center, and, if required, an enantiomeric mixture of the compounds may be separated by procedures known to those skilled in the art (e.g., using H.P.L.C. or fractional crystallization). Also, an enantiomeric mixture of compounds of formula (III) may be optically separated by the similar methods prior to being subjected to the preparation processes of this invention.
Compounds of formula (I) prepared according to the procedures described as above may be isolated and purified by conventional procedures such as recrystallization or chlomatographic purification.
Compounds of formula (I) thus obtained may further be subjected to desired reactions. For example, the compounds wherein R2 is xe2x80x94COOH, may be subjected to coupling reactions with a desired amine or imine compounds to give such compounds as disclosed in WO 96/06082, WO 97/30048, U.S. Pat. No. 5,861,402 or the like.
With the processes of the present invention, 1,4-dihydropyridine compounds can be effectively prepared under mild conditions. Especially, 1,4-dihydropyridine compunds which are difficult to be synthesized by Hantzsch method (not under mild conditions), can be synthesized because of the mild conditions in the present invention. |
Authentic Player Models
PLAYER BODY SCANNING
Using real life scanning data, perfectly recreate the player models, including short size and shirt fitting
Animation Rework
BASE LAYER REVOLUTION
Player animations have been reworked from the ground up, starting with core movement such as walking, turning and body posture.
HUMAN MOTION
With hundreds of animations coming into the game, the natural flow between them creates a sense of reality never seen before in the series.
FACIAL EMOTION
Face animation has been significantly upgraded, allowing the user to see intricacies in emotion and feeling to match any given situation. Facial expression animation has also been greatly improved, creating the biggest upgrade ever in PES.
GOALKEEPERS
The highly praised Keepers will see a new level of improvement. An abundance of new save animations allows keepers to carry the ball more naturally after a save, and have a variety of intelligent motions when throwing the ball to a player.
PRESENTATION ELEMENTS
In addition to new HUD elements, a variety of stats based on team and player performance will appear with real player images during the game. New cutscenes added such as substitution and foul calling, as well as unique presentation when a player scores a hat-trick.
Real World Visuals
REAL LIGHTING
On site research and material coverage of partner team home stadiums Camp Nou and Signal Induna Park benefits the game in the recreation of authentic lighting for the turf, with the addition of players and tunnels for both day and night matches based on fine detail data all collected in real corresponding times.
LOCKER ROOMS
Locker rooms and mix areas were captured to allow further realistic recreation for in-game. PS4, Xbox One and PC only
CROWD
Off the pitch, crowd visuals and their reaction to the on-pitch action have been improved for a more natural but dramatic effect. |
<depthIntrinsics>
<ppx>320.000000000</ppx>
<ppy>240.000000000</ppy>
<fovx>570.342224121</fovx>
<fovy>570.342224121</fovy>
<width>640.000000000</width>
<height>480.000000000</height>
</depthIntrinsics>
<colorIntrinsics>
<ppx>962.825012207</ppx>
<ppy>529.511596680</ppy>
<fovx>1330.257446289</fovx>
<fovy>1325.362548828</fovy>
<width>1920.000000000</width>
<height>1080.000000000</height>
<dK>
<k0>-0.084211886</k0>
<k1>0.095355682</k1>
<k2>-0.024582785</k2>
</dK>
<dP>
<p0>-0.000999871</p0>
<p1>0.000743725</p1>
</dP>
</colorIntrinsics>
<extrinsics>
<rotation>
<r0>0.999441743</r0>
<r1>0.017255865</r1>
<r2>0.028609075</r2>
<r3>-0.019109884</r3>
<r4>0.997646391</r4>
<r5>0.065851972</r5>
<r6>-0.027405409</r6>
<r7>-0.066361926</r7>
<r8>0.997419178</r8>
</rotation>
<translation>
<t0>-2.074707985</t0>
<t1>60.570320129</t1>
<t2>11.079033852</t2>
</translation>
</extrinsics>
<adjustment>
<translate>
<x>0.000000000</x>
<y>0.000000000</y>
<z>0.000000000</z>
</translate>
<rotate>
<x>0.208333015</x>
<y>-0.104166508</y>
<z>0.000000000</z>
</rotate>
<scale>
<x>1.000000000</x>
<y>1.000000000</y>
</scale>
<depth>
<min>602.000000000</min>
<max>1081.000000000</max>
</depth>
</adjustment>
<skin>
<targetR>0.827451050</targetR>
<targetG>0.580392182</targetG>
<targetB>0.541176498</targetB>
<hueWeight>0.593750000</hueWeight>
<satWeight>0.140625000</satWeight>
<brightWeight>0.203125000</brightWeight>
<lowerThreshold>0.302083343</lowerThreshold>
<upperThreshold>0.375000000</upperThreshold>
</skin>
<face>
<x>-5.002259731</x>
<y>-161.739730835</y>
<z>951.000000000</z>
</face>
|
/* crypto/bio/bss_file.c */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young (eay@cryptsoft.com).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@cryptsoft.com)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
/*
* 03-Dec-1997 rdenny@dc3.com Fix bug preventing use of stdin/stdout
* with binary data (e.g. asn1parse -inform DER < xxx) under
* Windows
*/
#ifndef HEADER_BSS_FILE_C
#define HEADER_BSS_FILE_C
#if defined(__linux) || defined(__sun) || defined(__hpux)
/* Following definition aliases fopen to fopen64 on above mentioned
* platforms. This makes it possible to open and sequentially access
* files larger than 2GB from 32-bit application. It does not allow to
* traverse them beyond 2GB with fseek/ftell, but on the other hand *no*
* 32-bit platform permits that, not with fseek/ftell. Not to mention
* that breaking 2GB limit for seeking would require surgery to *our*
* API. But sequential access suffices for practical cases when you
* can run into large files, such as fingerprinting, so we can let API
* alone. For reference, the list of 32-bit platforms which allow for
* sequential access of large files without extra "magic" comprise *BSD,
* Darwin, IRIX...
*/
#ifndef _FILE_OFFSET_BITS
#define _FILE_OFFSET_BITS 64
#endif
#endif
#include <stdio.h>
#include <errno.h>
#include "cryptlib.h"
#include "bio_lcl.h"
#include <openssl/err.h>
#if defined(OPENSSL_SYS_NETWARE) && defined(NETWARE_CLIB)
#include <nwfileio.h>
#endif
#if !defined(OPENSSL_NO_STDIO)
static int MS_CALLBACK file_write(BIO *h, const char *buf, int num);
static int MS_CALLBACK file_read(BIO *h, char *buf, int size);
static int MS_CALLBACK file_puts(BIO *h, const char *str);
static int MS_CALLBACK file_gets(BIO *h, char *str, int size);
static long MS_CALLBACK file_ctrl(BIO *h, int cmd, long arg1, void *arg2);
static int MS_CALLBACK file_new(BIO *h);
static int MS_CALLBACK file_free(BIO *data);
static BIO_METHOD methods_filep=
{
BIO_TYPE_FILE,
"FILE pointer",
file_write,
file_read,
file_puts,
file_gets,
file_ctrl,
file_new,
file_free,
NULL,
};
BIO *BIO_new_file(const char *filename, const char *mode)
{
BIO *ret;
FILE *file=NULL;
#if defined(_WIN32) && defined(CP_UTF8)
int sz, len_0 = (int)strlen(filename)+1;
DWORD flags;
/*
* Basically there are three cases to cover: a) filename is
* pure ASCII string; b) actual UTF-8 encoded string and
* c) locale-ized string, i.e. one containing 8-bit
* characters that are meaningful in current system locale.
* If filename is pure ASCII or real UTF-8 encoded string,
* MultiByteToWideChar succeeds and _wfopen works. If
* filename is locale-ized string, chances are that
* MultiByteToWideChar fails reporting
* ERROR_NO_UNICODE_TRANSLATION, in which case we fall
* back to fopen...
*/
if ((sz=MultiByteToWideChar(CP_UTF8,(flags=MB_ERR_INVALID_CHARS),
filename,len_0,NULL,0))>0 ||
(GetLastError()==ERROR_INVALID_FLAGS &&
(sz=MultiByteToWideChar(CP_UTF8,(flags=0),
filename,len_0,NULL,0))>0)
)
{
WCHAR wmode[8];
WCHAR *wfilename = _alloca(sz*sizeof(WCHAR));
if (MultiByteToWideChar(CP_UTF8,flags,
filename,len_0,wfilename,sz) &&
MultiByteToWideChar(CP_UTF8,0,mode,strlen(mode)+1,
wmode,sizeof(wmode)/sizeof(wmode[0])) &&
(file=_wfopen(wfilename,wmode))==NULL &&
(errno==ENOENT || errno==EBADF)
) /* UTF-8 decode succeeded, but no file, filename
* could still have been locale-ized... */
file = fopen(filename,mode);
}
else if (GetLastError()==ERROR_NO_UNICODE_TRANSLATION)
{
file = fopen(filename,mode);
}
#else
file=fopen(filename,mode);
#endif
if (file == NULL)
{
SYSerr(SYS_F_FOPEN,get_last_sys_error());
ERR_add_error_data(5,"fopen('",filename,"','",mode,"')");
if (errno == ENOENT)
BIOerr(BIO_F_BIO_NEW_FILE,BIO_R_NO_SUCH_FILE);
else
BIOerr(BIO_F_BIO_NEW_FILE,ERR_R_SYS_LIB);
return(NULL);
}
if ((ret=BIO_new(BIO_s_file())) == NULL)
{
fclose(file);
return(NULL);
}
BIO_clear_flags(ret,BIO_FLAGS_UPLINK); /* we did fopen -> we disengage UPLINK */
BIO_set_fp(ret,file,BIO_CLOSE);
return(ret);
}
BIO *BIO_new_fp(FILE *stream, int close_flag)
{
BIO *ret;
if ((ret=BIO_new(BIO_s_file())) == NULL)
return(NULL);
BIO_set_flags(ret,BIO_FLAGS_UPLINK); /* redundant, left for documentation puposes */
BIO_set_fp(ret,stream,close_flag);
return(ret);
}
BIO_METHOD *BIO_s_file(void)
{
return(&methods_filep);
}
static int MS_CALLBACK file_new(BIO *bi)
{
bi->init=0;
bi->num=0;
bi->ptr=NULL;
bi->flags=BIO_FLAGS_UPLINK; /* default to UPLINK */
return(1);
}
static int MS_CALLBACK file_free(BIO *a)
{
if (a == NULL) return(0);
if (a->shutdown)
{
if ((a->init) && (a->ptr != NULL))
{
if (a->flags&BIO_FLAGS_UPLINK)
UP_fclose (a->ptr);
else
fclose (a->ptr);
a->ptr=NULL;
a->flags=BIO_FLAGS_UPLINK;
}
a->init=0;
}
return(1);
}
static int MS_CALLBACK file_read(BIO *b, char *out, int outl)
{
int ret=0;
if (b->init && (out != NULL))
{
if (b->flags&BIO_FLAGS_UPLINK)
ret=UP_fread(out,1,(int)outl,b->ptr);
else
ret=fread(out,1,(int)outl,(FILE *)b->ptr);
if(ret == 0 && (b->flags&BIO_FLAGS_UPLINK)?UP_ferror((FILE *)b->ptr):ferror((FILE *)b->ptr))
{
SYSerr(SYS_F_FREAD,get_last_sys_error());
BIOerr(BIO_F_FILE_READ,ERR_R_SYS_LIB);
ret=-1;
}
}
return(ret);
}
static int MS_CALLBACK file_write(BIO *b, const char *in, int inl)
{
int ret=0;
if (b->init && (in != NULL))
{
if (b->flags&BIO_FLAGS_UPLINK)
ret=UP_fwrite(in,(int)inl,1,b->ptr);
else
ret=fwrite(in,(int)inl,1,(FILE *)b->ptr);
if (ret)
ret=inl;
/* ret=fwrite(in,1,(int)inl,(FILE *)b->ptr); */
/* according to Tim Hudson <tjh@cryptsoft.com>, the commented
* out version above can cause 'inl' write calls under
* some stupid stdio implementations (VMS) */
}
return(ret);
}
static long MS_CALLBACK file_ctrl(BIO *b, int cmd, long num, void *ptr)
{
long ret=1;
FILE *fp=(FILE *)b->ptr;
FILE **fpp;
char p[4];
switch (cmd)
{
case BIO_C_FILE_SEEK:
case BIO_CTRL_RESET:
if (b->flags&BIO_FLAGS_UPLINK)
ret=(long)UP_fseek(b->ptr,num,0);
else
ret=(long)fseek(fp,num,0);
break;
case BIO_CTRL_EOF:
if (b->flags&BIO_FLAGS_UPLINK)
ret=(long)UP_feof(fp);
else
ret=(long)feof(fp);
break;
case BIO_C_FILE_TELL:
case BIO_CTRL_INFO:
if (b->flags&BIO_FLAGS_UPLINK)
ret=UP_ftell(b->ptr);
else
ret=ftell(fp);
break;
case BIO_C_SET_FILE_PTR:
file_free(b);
b->shutdown=(int)num&BIO_CLOSE;
b->ptr=ptr;
b->init=1;
#if BIO_FLAGS_UPLINK!=0
#if defined(__MINGW32__) && defined(__MSVCRT__) && !defined(_IOB_ENTRIES)
#define _IOB_ENTRIES 20
#endif
#if defined(_IOB_ENTRIES)
/* Safety net to catch purely internal BIO_set_fp calls */
if ((size_t)ptr >= (size_t)stdin &&
(size_t)ptr < (size_t)(stdin+_IOB_ENTRIES))
BIO_clear_flags(b,BIO_FLAGS_UPLINK);
#endif
#endif
#ifdef UP_fsetmod
if (b->flags&BIO_FLAGS_UPLINK)
UP_fsetmod(b->ptr,(char)((num&BIO_FP_TEXT)?'t':'b'));
else
#endif
{
#if defined(OPENSSL_SYS_WINDOWS)
int fd = _fileno((FILE*)ptr);
if (num & BIO_FP_TEXT)
_setmode(fd,_O_TEXT);
else
_setmode(fd,_O_BINARY);
#elif defined(OPENSSL_SYS_NETWARE) && defined(NETWARE_CLIB)
int fd = fileno((FILE*)ptr);
/* Under CLib there are differences in file modes */
if (num & BIO_FP_TEXT)
setmode(fd,O_TEXT);
else
setmode(fd,O_BINARY);
#elif defined(OPENSSL_SYS_MSDOS)
int fd = fileno((FILE*)ptr);
/* Set correct text/binary mode */
if (num & BIO_FP_TEXT)
_setmode(fd,_O_TEXT);
/* Dangerous to set stdin/stdout to raw (unless redirected) */
else
{
if (fd == STDIN_FILENO || fd == STDOUT_FILENO)
{
if (isatty(fd) <= 0)
_setmode(fd,_O_BINARY);
}
else
_setmode(fd,_O_BINARY);
}
#elif defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_WIN32_CYGWIN)
int fd = fileno((FILE*)ptr);
if (num & BIO_FP_TEXT)
setmode(fd, O_TEXT);
else
setmode(fd, O_BINARY);
#endif
}
break;
case BIO_C_SET_FILENAME:
file_free(b);
b->shutdown=(int)num&BIO_CLOSE;
if (num & BIO_FP_APPEND)
{
if (num & BIO_FP_READ)
BUF_strlcpy(p,"a+",sizeof p);
else BUF_strlcpy(p,"a",sizeof p);
}
else if ((num & BIO_FP_READ) && (num & BIO_FP_WRITE))
BUF_strlcpy(p,"r+",sizeof p);
else if (num & BIO_FP_WRITE)
BUF_strlcpy(p,"w",sizeof p);
else if (num & BIO_FP_READ)
BUF_strlcpy(p,"r",sizeof p);
else
{
BIOerr(BIO_F_FILE_CTRL,BIO_R_BAD_FOPEN_MODE);
ret=0;
break;
}
#if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_WIN32_CYGWIN)
if (!(num & BIO_FP_TEXT))
strcat(p,"b");
else
strcat(p,"t");
#endif
#if defined(OPENSSL_SYS_NETWARE)
if (!(num & BIO_FP_TEXT))
strcat(p,"b");
else
strcat(p,"t");
#endif
fp=fopen(ptr,p);
if (fp == NULL)
{
SYSerr(SYS_F_FOPEN,get_last_sys_error());
ERR_add_error_data(5,"fopen('",ptr,"','",p,"')");
BIOerr(BIO_F_FILE_CTRL,ERR_R_SYS_LIB);
ret=0;
break;
}
b->ptr=fp;
b->init=1;
BIO_clear_flags(b,BIO_FLAGS_UPLINK); /* we did fopen -> we disengage UPLINK */
break;
case BIO_C_GET_FILE_PTR:
/* the ptr parameter is actually a FILE ** in this case. */
if (ptr != NULL)
{
fpp=(FILE **)ptr;
*fpp=(FILE *)b->ptr;
}
break;
case BIO_CTRL_GET_CLOSE:
ret=(long)b->shutdown;
break;
case BIO_CTRL_SET_CLOSE:
b->shutdown=(int)num;
break;
case BIO_CTRL_FLUSH:
if (b->flags&BIO_FLAGS_UPLINK)
UP_fflush(b->ptr);
else
fflush((FILE *)b->ptr);
break;
case BIO_CTRL_DUP:
ret=1;
break;
case BIO_CTRL_WPENDING:
case BIO_CTRL_PENDING:
case BIO_CTRL_PUSH:
case BIO_CTRL_POP:
default:
ret=0;
break;
}
return(ret);
}
static int MS_CALLBACK file_gets(BIO *bp, char *buf, int size)
{
int ret=0;
buf[0]='\0';
if (bp->flags&BIO_FLAGS_UPLINK)
{
if (!UP_fgets(buf,size,bp->ptr))
goto err;
}
else
{
if (!fgets(buf,size,(FILE *)bp->ptr))
goto err;
}
if (buf[0] != '\0')
ret=strlen(buf);
err:
return(ret);
}
static int MS_CALLBACK file_puts(BIO *bp, const char *str)
{
int n,ret;
n=strlen(str);
ret=file_write(bp,str,n);
return(ret);
}
#endif /* OPENSSL_NO_STDIO */
#endif /* HEADER_BSS_FILE_C */
|
Where should I bet online and which sportsbook is the best?
Nothing should surprise me any longer, I have been involved in gambling too long, but I am still a little shocked when someone writes to me and asks which company they should bet with, usually going on to add that "I only have an account with Bet365 or Paddy Power" or some similar company. Firstly, to limit yourself to one company is foolish in the extreme, you should always be looking to bet at best available prices and you are never going to get those sticking to just one or even two european style companies. Taking 2.20 or even 2.30 when 2.375 is available is just throwing money away and will make a huge dent in your profits ( or significantly increase losses) at the end of the year, I have tried to explain this to many bettors in the past and the usual response is usually something along the lines of "I am only betting £30 and the difference is just £5.25 ( 2.20-2.375), I will be happy if I just back a winner ". If you bet most days and quite a bit at the weekend, maybe 25 bets per week, the difference is actually HUGE, for a break even player, using the example given, over 3,100 euros per year.... 103 times that flat stake ! Secondly,if you are a winning bettor and surely that is the aim of all of us, sooner or later, all traditional style bookmakers will restrict you, either closing your account, or severely limiting any bet you wish to place.
The ideal punter for a traditional bookmaker .... a loser !
Traditional style bookmakers do not want your business unless you are going to lose, most companies have to report to shareholders and are run by accountants,who are not interested in "bad results" and much prefer FOTB's, casino and poker business, where the profit is "guaranteed". If you are betting sports and winning and still "getting on" with a traditional/european style bookmaker, then you are almost certainly a big earner for them through some other medium, either horse racing, casino, or via your rakeback at poker, there is no other reason. It is a quid pro quo deal, plug your "leak", stop losing your shirt at Cheltenham races, or playing online blackjack every night and see how long your winning football, or tennis bets are welcome.
Asian handicap betting to the rescue - low margins and high odds
If you are a winning football bettor and always look for best odds, you will probably already be betting asian handicaps, sooner or later everyone ends up betting on these markets, either through choice, or necessity. In a nutshell and speaking in general terms, asian handicap lines are set at lower margins, which means best prices, offer higher betting limits, across a wider spread of matches and no winning accounts are closed, infact, they are welcomed. Asian handicap betting is all about low margin, high turnover and restricting any individual is alien to this mindset, especially when it is possible to "earn" from winning clients, it is a completely different mentality.
Quite how much turnover the big "asian" bookmakers handle is open to debate, as they do not give exact figures, but it would not surprise me if each was in the low to mid billions and in excess of what most of the european bookmakers managed between them combined. Companies like SBOBET, IBC, Samvo and Pinnacle Sports might not be as well known to the man in the street, or the occasional gambler, but they have annual turnover equivalent to the GDP of a small(ish) nation.
Where to bet online with asian handicap markets ?
Personally, I bet through an agent, using clubgowi sponsor Sportmarket. Via them I can bet at several of the asian handicap bookmakers lised above, but through one account and with the additional security of them being EU based. That is not a massive concern for me, as I know how big all the asian companies are, but it is a major consideration for some . You can read more about Sportmarket on the our sponsor page of the clubgowi website.
So, your money is safe and no matter what you win, you will not be restricted, beyond the betting limits applied to each match. For most leagues these are very high, for example tonight on Bundesliga 2, I am able to bet over $11,000 on either of the three matches with SBOBET, over $7,000 on the goal line (over/under) market. On major leagues, on the day of the game, 2-3 times that amount, more than most punters will ever need. However, you could bet even more by arrangement, using the betbroking side of Sportmarket you could place up to five times these limits, if there are any "whales" out there !
Traditional bookmaker profit margins v Asian bookmaker profit margins ... the difference is huge !
Basic idea of asian handicap betting is to level the playing field and have the possibility to bet both teams at competitive odds. There is no 1.20 for Manchester United to win, they will be handicapped (and I do not mean forced to play without a holding midfielder, that is through choice) so that you can bet them close to even money. This is the perfect way to bet football and it lends itself best of all in my opinion, to "live" or "in play" betting, if United are 4-0 up with 5 minutes to go, the match and "totals", can still be quoted and traded and this is when they often offer greatest value.
If I look again at those Bundesliga 2 matches tonight, I can see that the asian odds makers are quoting the games to a 1.5%-2.0 % margin, the 1X2 bookmakers to between a 6.75% and (shameful) 12.5% profit margin.
If you toss a coin, it is 50-50 heads or tails, or 2.0 /2.0 in betting terms, if a bookmaker quotes you 1.90/1.90 and you took £10 on each , he would take £20 and payout £19, a £1 or 5% profit margin. You can see what bad value that is and the higher the margin quoted by the bookmaker, the worse the odds.
An asian handicap company betting on this toss would offer 1.97/1.97, that might not be enough to tempt you in this instance, but it should be sufficient for to appreciate that they are betting to very small profit margins. The best of the 1X2 companies would be 1.865/1.865 for the coin flip, the "unnamed " company, who are famous for pushing the advertising boundaries, who offered that scandalous margin, would be 1.75/1.75 on the flip !
They can hide these profit margins a little by betting 1X2, but they are always there, with a coin flip, where we all know the true odds, you can see more easily what is going on.
Between the top 3-4 asian companies, you will get the best odds on any football match probably 99 times out of 100 and on the 100th occasion, by the time you reach the "other" company, the odds will have gone !
Brits who've hit the big time betting on asian handicaps.
If you bet football, you have to bet asian handicap lines. Who knows, by doing so you might end up owning your local football club.
That happened to Tony Bloom and Matthew Benham (pictured), two of the biggest European gamblers for the last decade or more. Hannah Karp of The Wall Street Journal, wrote an article about the pair of "former" friends, since when Benham has taken full control of his and my beloved Brentford. The pair have made fortunes betting on asian markets and if proof was ever needed that winners are welcome, it is this duo, who's march towards riches and taking over the club they supported as boys, would have been stopped dead in it's tracks before their boots were even worn in, if they had to bet in "europe". Obviously it goes without saying that MB has spent his money very wisely and got far and away the best of the two "investments" !
To maximise profits you have to always bet at the best possible odds, that means betting asian lines, if you need any more help, the clubgowi daily newsletter service offers even better value for money.
Good Luck. |
1. Technical Field
The present invention relates, in general, to an improved graphical user interface method and system. In particular, the present invention relates to an improved graphical user interface method and system having a cursor, scroll bar, and slider.
2. Background
A graphical user interface is a type of display format that enables a user to choose commands, start programs, and see lists of files and other options by pointing to pictorial representations and lists of menu items on a computer display screen. Choices can generally be activated by either a keyboard or a pointing device such as a mouse. A mouse is a commonly used pointing device, containing one or more buttons, that allows a user to interact with a product or operating environment such as a graphical user interface.
For application developers, a graphical user interface offers an environment that can handle direct interaction with the computer. Such environments free the developer to concentrate on a given application without becoming entangled in the details of a screen display or mouse and keyboard input. A graphical user interface also enables programmers to create programs to handle frequently performed tasks, such as saving a data file. The interface itself provides standard controlling mechanisms such as windows and dialog boxes.
Some conventional graphical user interfaces provide a cursor and scroll bar for scrolling through pages of a viewable object. A viewable object can contain multiple components such as spreadsheets, text, hotlinks, pictures, sound, and video objects. However, a viewable object is not limited to these components. In many types of graphical user interfaces, a vertical or horizontal bar at the side or bottom of a graphical user interface window can be utilized in conjunction with a pointing device such as a mouse, trackball, or stylus well-known in the art of graphical user interfaces for moving about in a viewable object. Scrolling permits viewing of any desired portion of a viewable object and is so named because it is the electronic equivalent of reading through a rolled (i.e., scrolled) viewable object rather than flipping through pages of a book. A vertical scroll bar is usually utilized to control movement or to scroll through lines and pages of a viewable object, while a horizontal scroll bar controls movement through words in a line.
Such conventional scroll bar systems usually comprise two arrows and a slider. Each arrow controls which direction a user desires to scroll through a viewable object. An arrow conventionally controls movement through a viewable object in small increments or small blocks of information, such as individual lines or a page of a viewable object, for example. Moreover, if an arrow points in the upward direction, the viewable object will be scrolled from its present position in the viewable object toward the first page. If an arrow points in the downward position, the viewable object will be scrolled from its present position in a viewable object toward the last page of the viewable object.
A slider is conventionally used to control movement through a viewable object in larger increments than when the arrows are used. A slider is one form of a graphical user interface icon. Instead of incrementing by small blocks of information, the slider typically controls movement through a viewable object in larger blocks, increments, or groups of information, such as two or more pages, for example. Therefore, when a user desires to go from the first page to the fiftieth page, the slider is usually selected and moved until page fifty is selected. The term "elevator" is also utilized to describe such a slider.
The foregoing noted methods (scroll bars and sliders) work when viewing relatively small viewable objects. However, when such methods are applied to relatively large viewable objects, deficiencies in the scroll bar and slider methods are noticeable.
When a very large viewable object, such as a list of items, is accessed by a user via a graphical user interface, the arrows in scroll mode generally move through the viewable object too slowly to be of significant use to the user. On the other hand, the discontinuous jumps through the viewable object that occur when the scroll bar is used to advance at a rate of, for example, a page at a time do not allow the user to smoothly view and comprehend the information in the viewable object.
When a very large viewable object, such as a list of items, is accessed by a user via a graphical user interface, the scroll bar slider often represents only a very small portion of such a viewable object. When the slider is grabbed and moved by the user utilizing, for example, a mouse cursor pointer, the viewable object will scroll too quickly even for small movements of the slider, making it difficult for the user to find a particular section within the viewable object. Even expert mouse users, for instance, can become frustrated when utilizing such a slider on a large viewable object. The problem increases for less adept users who try to scroll through viewable objects such as encyclopedias, dictionaries, phone books, or other viewable objects.
Thus, when the foregoing noted methods are applied to very large viewable objects, the methods are found to be deficient in that the arrows in scroll mode are too slow to be of satisfactory use, while use of the scroll bar in discontinuous mode presents the information in a jerky, discontinuous fashion which is difficult for a user to follow, and use of the slider is found to be unsatisfactory in that it moves through the viewable object too fast to be comprehended by the user. The foregoing deficiencies become particularly noticeable when the user wants to move through the relatively large viewable object in a fashion such that a user can easily comprehend his or her current position within the viewable object. The foregoing noted deficiencies give rise to several concomitant needs.
With respect to the foregoing identified needs, the inventors are aware of no attempts to date which have been directed toward satisfying the foregoing identified needs. Thus, it is apparent that a need exists for a method and system which will allow scanning through a viewable object which smoothly and predictably transitions from a very slow rate of scrolling through the viewable object to a very rapid rate of scrolling through the viewable object. |
The Greece and Eurozone Crisis Made Simple
Eric Zuesse an investigative-historian analyzes in a powerful analysis crisis on the crisis in Greece. “How Fascist Capitalism Functions: The Case of Greece” lays bare the crude machinations of global capitalism. He exposes the ruthless way in which big capital and international financial agencies intervene in a crisis only to create spaces for the brazen rich to gain and for the poor and working classes to further degenerate.
Zuesse calls events in Greece by their name: He states bluntly that “there is democratic capitalism, and there is fascist capitalism and goes on to assert that what we have today is fascist capitalism”.
Zuesse discusses how naivety has shaped the question of the crisis in Greece. Too many people, he suggests, have pretended that the problem in Greece would just go away; that Greece will be able to get out of debt without defaulting on it.
The people of Greece have had it up tip their necks. They refuse to be drowned by ‘eurozonizm’ – that ideological notion of capitalism and liberalization which asks that when you are in trouble, borrow and pay back an exorbitant interest package by tightening your belt. If that means you bleed to death, face the choice! In an uneven playing field where the euro gets traded, when the going gets rich, the rich get richer and the poor fall into greater debt.
The Greek masses refuse to take more of the nonsense that Europe wants from them. They have bluntly asked Germany to even pay back US$ 279 billion as reparations for the holocaust. In other words, they are asking Angela Merkel to pay up rather than the other way around. The real debtor, they argue is, ‘you, the Germans’. Each time Greece borrowed and signed up to a new package, they fell deeper into a crisis.
Ever since the region’s sovereign-debt crisis first flared in 2010, European nations have been bailing out Greece’s private creditors. These are mainly German and French banks who have lent to Greece the money to pay off the private creditors. So, in fact, it was the private who got bailed-out were private investors, not ‘the Greek people. A reasonable assumption is that a large part of the Greek debt to the Germans was the result of Greek consumption of German goods and services bought with the German provided credit. The media which was hand-in-glove with the lenders sold the story as one in which consumers receive these bailouts from taxpayers. They actually received none of it. They didn’t receive the loans, and they certainly aren’t receiving any of the bailouts.
The Greek Government currently owes 323 billion euros – the debt rose 213 billion euros, during 5 years of IMF-imposed “austerity”- the Greek depression. Economist-writer, Peter Schiff writes: “It’s hard to feel sorry for the [Greek] people standing in lines at the ATMs when they knew this was coming every day for the last four years.” When you look at the meddling between the lenders the people, you know for sure that the system was corrupt to its very base, and affordable to crass capitalists who made hay while the stable was being burned down. They made money and laughed all the way to the bank under the watchful eyes of their benefactors. It is the story of the crony capitalist and her/his partner in Germany, France and the rest of the Euro Zone engaged in a ‘you-scratch-my-back’ and I’ll scratch yours. The accusation that the ordinary citizen is to blame is ludicrous.
Indeed, this is not democratic capitalism. It is not socialism. It is, instead, fascism. It is dictatorial capitalism. It’s coming to India even as our ruling classes frantically shriek out “Make in India” -a gamble designed to fail the Indian economy and leave us dependant and pauperized. The select rich will remain unaffected. Meanwhile the country will drown in misery.
For those who wish to know some of the basics of the Greek crisis and the churnings in Europe caused by the Greek referendum in which the people overwhelmingly turned the externally imposed austerity measures, the article below by Brian Davey is instructive.
One can go into long convoluted explanations but, as I see it, there are two basic problems, one leading into the other. The more superficial problem is that in a single currency zone without the option of devaluation purchasing power will drain to the more competitive countries. To continue buying in the common currency people, companies and governments in less competitive (and poorer) countries have to borrow but this is a temporary solution for the obvious reason that they must pay back with interest so pretty soon borrowing makes this problem worse.
At that point the rationale of the common currency zone is stuck in an unresolvable dilemma. All the twists and turns have merely been “kicking the can down the road” – and each time the problem re-surfaces it is bigger and more threatening. What does “kicking the can down the road” mean? It means borrowing more in order to pay back the last lot of loans.
What makes it a little bit confusing is the way that the debt gets transferred from agency to agency at each can kicking stage. What has basically happened is that the other European states have wanted the Greek state to be turned into a debt collecting agency on behalf of the Eurozone governments and for the IMF. A key problem here is that the Greek elite does not actually pay taxes – they have taken their money and everything moveable to Switzerland or places like the London property market. Like the rest of the global elite they too believe that “only the little people pay taxes” and by now the little people have been ruined. The other option is to sell off the public sector to the creditors. However the Greek people have now elected a government that says that they can’t pay – a government that does not do what it is told by the creditors and whose finance minister did not wear a suit and a tie.
At each stage the debts have mushroomed larger still as Greece has got poorer. Originally these debts were owed to French, Dutch and German banks but now they are mainly owed instead to European agencies. These agencies like the European Financial Stability Facility, run on behalf of 19 governments and based in Luxembourg raised the money to lend to Greece (to kick the can down the road) by borrowing 145billion euros from the bond markets. (Bonds are loans – when you buy them you are handing over money to the bond issuers because they promise to repay eventually and in the meantime pay an interest rate.)
So the solution to the debt – the kicking the can down the road – has been to borrow more – to create more debt and merely transferring whom the debt was owed to. These bonds (loans) were however “guaranteed” by the 19 European governments. To get the bond markets to cough up the money to finance the Greek debt the bond holders were told that if all else fails the governments of the eurozone will get the tax payers of Europe to pay. Many of these governments are in a pretty difficult situation themselves – so that might mean the guarantees being passed back to Germany……and the IMF has admitted that at least one third of the Greek debt are un repayable.
If you kick the can down the road repeatedly you eventually run out of road. What should have happened much earlier in this process was an admission that the French, Dutch and German banks had made a mistake lending to Greece and they should have taken their loss. Perhaps Greek officials and Goldman Sachs, which helped to hide the fact that Greece could not pay, should have been prosecuted. However, as we have seen there is a deeper problem. Eurozone has failed because it has a structural flaw in it. It cannot be mended and it will fall to bits either now, or perhaps later. Meanwhile…at the other side of the world the Chinese stock market just crashed for other reasons. The crisis of 2007/2008 is back….only much bigger this time.
These are thoughts to supplement my explanation above in the light of an interview of Yanis Varoufakis on YouTube at an event in Zagreb where he explains his approach to understanding of the Eurozone problems. If you want to watch it you can find it here: https://www.youtube.com/watch?v=MEUWxNifJJ8The story I described above is one of dealing with debts arising out of trade imbalances. In the words that Varoufakis would use what was lacking in the Eurozone was a surplus recycling system to recycle the surpluses of the powerful countries (Germany) back to the deficit countries (Greece) so that they could keep on exporting to the deficit countries.
Prior to 2008 this was not such a problem because Germany was exporting also to the USA on a substantial scale and then investing the dollars that they earned through the exports back into Wall Street and its financialisation processes. This gave Germany the money that they could afford to spend into the European periphery countries and inflate bubbles there that kept people buying the Mercedes Benzes. (European money spending on the infrastructures of Spain, Ireland, etc which underpinned the property booms that the banks pumped up). After the crash of 2008 the export market to America crashed and that had two effects. Firstly banks in southern Europe were crushed as the property bubbles there popped AND Germany lost export markets to the USA far more than France, Italy and Spain did. Germany’s exports were more than proportionately effected by the Wall Street crash. Among other consequences of the Eurozone crisis is that it suits Germany to have a weak Euro to retain as much as possible of its shrunken US export market.
The Varoufakis explanation is thus one of coping with imbalances, of demand recycling from the surplus countries so that deficit countries could continue to buy import – and then the breakdown of the mechanisms for demand recycling between countries.
I dare say that this IS part of the story – however from an ecological economics perspectives it seems to me that it is easier to handle imbalances when all are growing because energy is cheap. Here we come to the second, deeper problem that I alluded to in the first paragraph. When all are growing then all are confident and imbalances can be covered by borrowing and lending because there is confidence that debts will be eventually be repaid. Also if all are growing state deficits and state borrowing are lower because tax revenues come in and expenditure on social problems are lower.
So one can turn the Varoufakis argument on its head. Growth was not only the RESULT of the existence of demand recycling mechanisms for surplus countries – the existence of recycling mechanisms for surplus countries could also be explained by the existence of growth. Growth made the recycling easier…. And growth was crucially a result of cheap energy (not part of the Varoufakis explanation).
To repeat – the Varoufakis argument that growth could continue when mechanisms were found to recycle purchasing power from surplus countries to deficit countries can be turned upside down. When growth occurs in deficit countries (even if it is not as fast as in surplus countries) then there is a mechanism to send the purchasing power back – capital export. Thus while Greece (and Spain and Italy and Ireland) was growing there were good reasons to send money to Greece – to invest in the building of holiday hotels for example, or in the building and civil engineering companies that built the hotels and the roads to the resorts. This was not buying and importing Greek goods – but it was putting money back into the pockets of Greeks in the form of investment in the business activities of a growing economy. If deficit countries are growing then mechanisms will exist to recycle purchasing power internationally. Once growth stops then there is no reason to send money to deficit countries and they are in trouble – as has happened throughout southern Europe and Ireland. I think that this is the most plausible way of seeing things. And the reason that growth began to fall off was raising energy prices because of depletion, because we are reaching the limits to economic growth. Because energy enters into all economic activities this undermines growth because people and companies struggle to service their debts AND pay the higher energy prices. That’s the ultimate reason that interest rates had to come down through quantitative easing.
Further it is not an accident that the breakdown of the Bretton Woods occurred when the US had, for the first time, to start importing oil, and when the price of oil rocketed. The dollar went from being on a quasi gold standard to being a quasi oil standard. It was part of the deal with Saudi Arabia and other countries – they sold their oil for dollars. If you wanted to buy oil you needed dollars so to keep putting your surplus back into the US and keeping it in American banks made sense. (The City of London was also able to survive largely because sterling became a petro-currency at this time too.)
*Brian Davey trained as an economist but, aside from a brief spell working in eastern Germany showing how to do community development work, has spent most of his life working in the community and voluntary sector in Nottingham particularly in health promotion, mental health and environmental fields. He helped form Ecoworks a community garden and environmental project for people with mental health problems. He is a member of Feasta Climate Working Group and co-ordinates the Cap and Share Campaign. He is editor of the Feasta book Sharing for Survival: Restoring the Climate, the Commons and Society. |
/* gtktreesortable.h
* Copyright (C) 2001 Red Hat, Inc.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Library General Public
* License as published by the Free Software Foundation; either
* version 2 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Library General Public License for more details.
*
* You should have received a copy of the GNU Library General Public
* License along with this library; if not, write to the
* Free Software Foundation, Inc., 59 Temple Place - Suite 330,
* Boston, MA 02111-1307, USA.
*/
#if defined(GTK_DISABLE_SINGLE_INCLUDES) && !defined (__GTK_H_INSIDE__) && !defined (GTK_COMPILATION)
#error "Only <gtk/gtk.h> can be included directly."
#endif
#ifndef __GTK_TREE_SORTABLE_H__
#define __GTK_TREE_SORTABLE_H__
#include <gtk/gtktreemodel.h>
#include <gtk/gtktypeutils.h>
G_BEGIN_DECLS
#define GTK_TYPE_TREE_SORTABLE (gtk_tree_sortable_get_type ())
#define GTK_TREE_SORTABLE(obj) (G_TYPE_CHECK_INSTANCE_CAST ((obj), GTK_TYPE_TREE_SORTABLE, GtkTreeSortable))
#define GTK_TREE_SORTABLE_CLASS(obj) (G_TYPE_CHECK_CLASS_CAST ((obj), GTK_TYPE_TREE_SORTABLE, GtkTreeSortableIface))
#define GTK_IS_TREE_SORTABLE(obj) (G_TYPE_CHECK_INSTANCE_TYPE ((obj), GTK_TYPE_TREE_SORTABLE))
#define GTK_TREE_SORTABLE_GET_IFACE(obj) (G_TYPE_INSTANCE_GET_INTERFACE ((obj), GTK_TYPE_TREE_SORTABLE, GtkTreeSortableIface))
enum {
GTK_TREE_SORTABLE_DEFAULT_SORT_COLUMN_ID = -1,
GTK_TREE_SORTABLE_UNSORTED_SORT_COLUMN_ID = -2
};
typedef struct _GtkTreeSortable GtkTreeSortable; /* Dummy typedef */
typedef struct _GtkTreeSortableIface GtkTreeSortableIface;
typedef gint (* GtkTreeIterCompareFunc) (GtkTreeModel *model,
GtkTreeIter *a,
GtkTreeIter *b,
gpointer user_data);
struct _GtkTreeSortableIface
{
GTypeInterface g_iface;
/* signals */
void (* sort_column_changed) (GtkTreeSortable *sortable);
/* virtual table */
gboolean (* get_sort_column_id) (GtkTreeSortable *sortable,
gint *sort_column_id,
GtkSortType *order);
void (* set_sort_column_id) (GtkTreeSortable *sortable,
gint sort_column_id,
GtkSortType order);
void (* set_sort_func) (GtkTreeSortable *sortable,
gint sort_column_id,
GtkTreeIterCompareFunc func,
gpointer data,
GDestroyNotify destroy);
void (* set_default_sort_func) (GtkTreeSortable *sortable,
GtkTreeIterCompareFunc func,
gpointer data,
GDestroyNotify destroy);
gboolean (* has_default_sort_func) (GtkTreeSortable *sortable);
};
GType gtk_tree_sortable_get_type (void) G_GNUC_CONST;
void gtk_tree_sortable_sort_column_changed (GtkTreeSortable *sortable);
gboolean gtk_tree_sortable_get_sort_column_id (GtkTreeSortable *sortable,
gint *sort_column_id,
GtkSortType *order);
void gtk_tree_sortable_set_sort_column_id (GtkTreeSortable *sortable,
gint sort_column_id,
GtkSortType order);
void gtk_tree_sortable_set_sort_func (GtkTreeSortable *sortable,
gint sort_column_id,
GtkTreeIterCompareFunc sort_func,
gpointer user_data,
GDestroyNotify destroy);
void gtk_tree_sortable_set_default_sort_func (GtkTreeSortable *sortable,
GtkTreeIterCompareFunc sort_func,
gpointer user_data,
GDestroyNotify destroy);
gboolean gtk_tree_sortable_has_default_sort_func (GtkTreeSortable *sortable);
G_END_DECLS
#endif /* __GTK_TREE_SORTABLE_H__ */
|
1. The Field of the Invention
The present invention relates generally to consistency checking. More specifically, the present invention relates to optical transceivers that perform consistency checking on information stored in internal memory.
2. The Relevant Technology
Computing and networking technology have transformed our world. As the amount of information communicated over networks has increased, high speed transmission has become ever more critical. Many high speed data transmission networks rely on optical transceivers and similar devices for facilitating transmission and reception of digital data embodied in the form of optical signals over optical fibers. Optical networks are thus found in a wide variety of high speed applications ranging from as modest as a small Local Area Network (LAN) to as grandiose as the backbone of the Internet.
Typically, data transmission in such networks is implemented by way of an optical transmitter (also referred to as an electro-optic transducer), such as a laser or Light Emitting Diode (LED). The electro-optic transducer emits light when current is passed there through, the intensity of the emitted light being a function of the current magnitude. Data reception is generally implemented by way of an optical receiver (also referred to as an optoelectronic transducer), an example of which is a photodiode. The optoelectronic transducer receives light and generates a current, the magnitude of the generated current being a function of the intensity of the received light.
Various other components are also employed by the optical transceiver to aid in the control of the optical transmit and receive components, as well as the processing of various data and other signals. For example, such optical transceivers typically include a driver (e.g., referred to as a “laser driver” when used to drive a laser signal) configured to control the operation of the optical transmitter in response to various control inputs. The optical transceiver also generally includes an amplifier (e.g., often referred to as a “post-amplifier”) configured to perform various operations with respect to certain parameters of a data signal received by the optical receiver. A controller circuit (hereinafter referred to the “controller”) controls the operation of the laser driver and post amplifier.
What would be advantageous is to improve the reliability of such a controller when operating to control the various features of the optical transceiver. |
[[
"start",
["text","("],
["storage.type.function-type.lisp","defun"],
["text"," "],
["entity.name.function.lisp","prompt-for-cd"],
["text"," ()"]
],[
"start",
["text"," "],
["string","\"Prompts"]
],[
"start",
["text"," "],
["identifier","for"],
["text"," "],
["identifier","CD"],
["text","\""]
],[
"start",
["text"," ("],
["identifier","prompt"],
["text","-"],
["identifier","read"],
["text"," "],
["string","\"Title\""],
["text"," "],
["constant.numeric","1.53"],
["text"," "],
["constant.numeric","1"],
["text"," "],
["constant.numeric","2"],
["text","/"],
["constant.numeric","4"],
["text"," "],
["constant.numeric","1.7"],
["text"," "],
["constant.numeric","1.7e0"],
["text"," "],
["constant.numeric","2.9E-4"],
["text"," "],
["constant.numeric","+42"],
["text"," "],
["constant.numeric","-7"],
["text"," "],
["punctuation.definition.constant.character.lisp","#"],
["constant.character.lisp","b001"],
["text"," "],
["punctuation.definition.constant.character.lisp","#"],
["constant.character.lisp","b001/100"],
["text"," "],
["punctuation.definition.constant.character.lisp","#"],
["constant.character.lisp","o777"],
["text"," "],
["punctuation.definition.constant.character.lisp","#"],
["constant.character.lisp","O777"],
["text"," "],
["punctuation.definition.constant.character.lisp","#"],
["constant.character.lisp","xabc55"],
["text"," "],
["punctuation.definition.constant.character.lisp","#"],
["constant.character.lisp","c"],
["text","("],
["constant.numeric","0"],
["text"," "],
["constant.numeric","-5.6"],
["text","))"]
],[
"start",
["text"," ("],
["identifier","prompt"],
["text","-"],
["identifier","read"],
["text"," "],
["string","\"Artist\""],
["text"," &"],
["identifier","rest"],
["text",")"]
],[
"start",
["text"," ("],
["keyword.operator","or"],
["text"," ("],
["identifier","parse"],
["text","-"],
["identifier","integer"],
["text"," ("],
["identifier","prompt"],
["text","-"],
["identifier","read"],
["text"," "],
["string","\"Rating\""],
["text",") :"],
["identifier","junk"],
["text","-"],
["identifier","allowed"],
["text"," "],
["support.function","t"],
["text",") "],
["constant.numeric","0"],
["text",")"]
],[
"start",
["text"," ("],
["keyword.control","if"],
["text"," "],
["identifier","x"],
["text"," ("],
["support.function","format"],
["text"," "],
["support.function","t"],
["text"," "],
["string","\"yes\""],
["text",") ("],
["support.function","format"],
["text"," "],
["support.function","t"],
["text"," "],
["string","\"no\""],
["text"," "],
["constant.language","nil"],
["text",") "],
["comment",";and here comment"]
],[
"start",
["text"," ) "],
["constant.numeric","0xFFLL"],
["text"," "],
["constant.numeric","-23ull"]
],[
"start",
["text"," "],
["comment",";; second line comment"]
],[
"start",
["text"," '(+ "],
["constant.numeric","1"],
["text"," "],
["constant.numeric","2"],
["text",")"]
],[
"start",
["text"," ("],
["identifier","defvar"],
["text"," "],
["punctuation.definition.variable.lisp","*"],
["variable.other.global.lisp","lines"],
["punctuation.definition.variable.lisp","*"],
["text",") "],
["comment","; list of all lines"]
],[
"start",
["text"," ("],
["identifier","position"],
["text","-"],
["keyword.control","if"],
["text","-"],
["identifier","not"],
["text"," "],
["punctuation.definition.constant.character.lisp","#"],
["constant.character.lisp","'sys::whitespacep"],
["text"," "],
["identifier","line"],
["text"," :"],
["identifier","start"],
["text"," "],
["identifier","beg"],
["text","))"]
],[
"start",
["text"," ("],
["support.function","quote"],
["text"," ("],
["identifier","privet"],
["text"," "],
["constant.numeric","1"],
["text"," "],
["constant.numeric","2"],
["text"," "],
["constant.numeric","3"],
["text","))"]
],[
"start",
["text"," '("],
["identifier","hello"],
["text"," "],
["identifier","world"],
["text",")"]
],[
"start",
["text"," (* "],
["constant.numeric","5"],
["text"," "],
["constant.numeric","7"],
["text",")"]
],[
"start",
["text"," ("],
["constant.numeric","1"],
["text"," "],
["constant.numeric","2"],
["text"," "],
["constant.numeric","34"],
["text"," "],
["constant.numeric","5"],
["text",")"]
],[
"start",
["text"," (:"],
["identifier","use"],
["text"," "],
["string","\"aaaa\""],
["text",")"]
],[
"start",
["text"," ("],
["keyword.control","let"],
["text"," (("],
["identifier","x"],
["text"," "],
["constant.numeric","10"],
["text",") ("],
["identifier","y"],
["text"," "],
["constant.numeric","20"],
["text","))"]
],[
"start",
["text"," ("],
["identifier","print"],
["text"," (+ "],
["identifier","x"],
["text"," "],
["identifier","y"],
["text","))"]
],[
"start",
["text"," ) "],
["support.function","LAmbDa"]
],[
"start"
],[
"start",
["text"," "],
["string","\"asdad"],
["constant.character.escape.lisp","\\0"],
["string","eqweqe\""]
]] |
670 So.2d 704 (1996)
STATE of Louisiana
v.
Patrick J. CLAY.
No. CR95-814.
Court of Appeal of Louisiana, Third Circuit.
March 6, 1996.
*705 Richard Paul Weimer, Michael Harson, Lafayette, for State of Louisiana.
G. Paul Marx, Lafayette, for Patrick James Clay.
Before COOKS, PETERS and GREMILLION, JJ.
PETERS, Judge.
The defendant, Patrick Clay, was charged with possession of cocaine with intent to distribute, a violation of La.R.S. 40:967(A). After trial, a jury returned the responsive verdict of guilty of possession of cocaine, a violation of La.R.S. 40:967(C). The trial court sentenced the defendant to twentyfour months at hard labor, and he has appealed his conviction, asserting four assignments of error. Because we find merit in the defendant's fourth assignment of error, we pretermit addressing his remaining assignments.
FACTS
On March 6, 1993, undercover officers of the Lafayette Police Department were conducting an operation to interdict street-level drug activity on the 300 block of Thirteenth Street within the city. While conducting the operation, two of the officers, Officer Charmaine Breaux Domingue and Officer Nolvey Stelly, Jr., were flagged down by an individual named Dwight Sam. Officer Stelly told Sam that he wanted to purchase crack cocaine. Sam went across the street to a vehicle that was backed up and parked in a yard, leaned into the driver's window of the vehicle, and returned to the officers with a rock of crack cocaine. He then gave Officer Stelly the cocaine and received a marked twenty-dollar bill in exchange. Sam returned to the parked vehicle from which he had obtained the cocaine and again leaned into the driver's window. Officer Domingue *706 advised a police take-down team of the transaction.
Other officers arrived and arrested Sam. The officers then told the driver and other occupant of the vehicle from which Sam obtained the cocaine to exit the vehicle, but they refused. After the occupants repeatedly failed to comply with requests to exit the vehicle, one of the officers broke a rear window and the individuals were removed from the vehicle. The driver was identified as Albert George. The defendant was the other occupant and had been sitting in the front passenger seat. The officers seized a medicine bottle containing thirteen rocks of crack cocaine, which was sitting on the vehicle's console between George and the defendant.
OPINION
By his fourth assignment of error, the defendant contends that the verdict at trial is not supported by the evidence which did not establish defendant's guilt or exclude every reasonable hypothesis of innocence. The defendant contends that his conviction was based solely on his presence and that no testimony was presented to show he had either actual or constructive possession of the seized cocaine.
When the issue of the sufficiency of the evidence is raised on appeal, the critical inquiry of the reviewing court is whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime proven beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 99 S.Ct. 2781, 61 L.Ed.2d 560 (1979); State ex rel. Graffagnino v. King, 436 So.2d 559 (La.1983). It is the fact finder's role to weigh the respective credibilities of the witnesses, and therefore, the appellate court should not second-guess the credibility determinations of the trier of fact beyond the sufficiency evaluations under the Jackson standard of review. State ex rel. Graffagnino, 436 So.2d 559.
In order to convict a defendant for possession of cocaine under La.R.S. 40:967(C), the state must prove beyond a reasonable doubt that the defendant knowingly or intentionally possessed the cocaine. State v. Jones, 94-1261 (La.App. 3 Cir. 5/17/95); 657 So.2d 262. The determination of whether there is sufficient evidence to convict a defendant of possession depends on the peculiar facts of each case. State v. Trahan, 425 So.2d 1222 (La.1983). Guilty knowledge is an essential element of the crime of possession, and guilty knowledge and intent may be inferred from the circumstances of the transaction. State v. Edwards, 354 So.2d 1322 (La.1978). Constructive possession is sufficient to violate the prohibition against possession, and a person may be in constructive possession of a drug, even though not in physical possession, if it is subject to his dominion and control. State v. Sweeney, 443 So.2d 522 (La.1983). Additionally, a person may be deemed to be in joint possession of a drug which is in the physical custody of his companion if he willfully and knowingly shares with his companion the right to control it. State v. Smith, 257 La. 1109, 245 So.2d 327 (1971). However, the mere presence of an individual in an area where the drugs are found or the mere association with a person found to be in possession of the drugs is insufficient to constitute constructive possession. State v. Bell, 566 So.2d 959 (La.1990).
In State v. Reynaga, 93-1520, p. 9 (La. App. 3 Cir. 10/5/94); 643 So.2d 431, 436 [quoting State v. Tasker, 448 So.2d 1311 (La. App. 1 Cir.), writ denied, 450 So.2d 644 (La.1984) citing Bujol v. Cain, 713 F.2d 112 (5th Cir.1983), cert. denied, 464 U.S. 1049, 104 S.Ct. 726, 79 L.Ed.2d 187 (1984)], this court discussed several factors to be considered in determining whether a defendant exercised dominion and control over narcotics sufficient to constitute constructive possession:
"... a defendant's knowledge that illegal drugs are in the area; the defendant's relationship with the person found to be in actual possession; the defendant's access to the area where the drugs were found; the evidence of recent drug use by the defendant; the defendant's physical proximity to the drugs; and any evidence that the area was frequented by drug users."
In the instant case, Sergeant Tom Warren of the Lafayette City Police Department *707 testified that on March 6, 1993, a Metro Narcotics Unit was conducting an undercover operation. Officer Warren was informed by undercover officers that they had just made a drug buy from a subject who received the drugs from two individuals in a vehicle parked at 311 Thirteenth Street and that the subject had taken the money and given it to the individuals in the vehicle. Other officers arrived at the scene and arrested the middleman, Dwight Sam. At least five officers were at the scene.
When Officer Warren arrived at the scene, the two subjects, Albert George and the defendant, were still inside the vehicle and refused to exit the vehicle when ordered to do so. Rather, George and the defendant rolled up the windows and locked the doors. Both George and the defendant told the police officers that they would need a warrant to get inside the vehicle. George, the driver of the vehicle, tried to leave the scene but was blocked by a police unit. A drug dog was brought to the scene and made a positive alert for drugs. Officer Warren called his superior, Captain Bob Johnson, for advice. Captain Johnson happened to be with Police Chief Gary Copes, and the two men went to the scene. Chief Copes advised the individuals to exit the vehicle or the officers would break the window and remove them. Neither George nor the defendant exited the vehicle within the allotted time, and one of the officers broke a rear window of the vehicle. Both individuals were subsequently removed from the vehicle and placed under arrest. A loaded handgun was found under the driver's seat, and a closed medicine bottle containing thirteen rocks of crack cocaine was retrieved from the vehicle's console, which was located between the driver's seat and passenger's seat. The marked police money was found in George's possession. Sam testified that he obtained the cocaine from George and that he gave the money to George.
The vehicle was parked at George's mother's house at 311 Thirteenth Street in Lafayette, Louisiana. George and the defendant are cousins. At the time of the incident, the defendant was living in Port Arthur, Texas, with his wife and two children. On the day of the incident, the defendant, his wife, and his children arrived in Lafayette for a funeral. After leaving the funeral home, the defendant eventually went to his aunt's house and noticed George's vehicle. According to the defendant, he entered George's vehicle and talked with him for a while. The defendant testified that Sam came up to the window of the vehicle and gave George $20.00 that he owed George. He testified that he did not remember Sam coming to the vehicle twice. The defendant denied seeing any drugs in the vehicle. According to the defendant, it was his intention to exit the vehicle when ordered to do so but he became afraid when he was threatened by one of the officers.
In Bell, 566 So.2d at 959, when police officers approached a vehicle to request that the music be turned down, one of the officers saw through the driver's side window "a distinctively wrapped package containing a white powder among cassette tapes on a plastic console placed over the transmission hump of the car." Both the driver and passenger were convicted of attempted possession of cocaine. The Louisiana Supreme Court reversed the conviction and sentence of the passenger because the state had presented no evidence that the passenger exercised any control over the driver's car, that he had any other drugs in his possession on his person, that he appeared under the influence of narcotics, or that he had possession of any drug paraphernalia. The court stated that the jury could have reasonably concluded that the passenger was aware of the package and its contents on the console of the car. However, the court concluded:
From [the passenger's] mere presence in the car close to the sealed package on the console between the two men, a rational factfinder could not have concluded that, even assuming he was aware of the contents, [the passenger] exercised control and dominion over the package, or that he willfully and knowingly shared with [the driver] the right to control it.
Id. at 960.
In the instant case, as in Bell, the state presented no evidence that the defendant had any other drugs on his person, that *708 he appeared under the influence of narcotics, or that he had possession of any drug paraphernalia. Additionally, Officer John Trahan, who observed the bottle containing the cocaine on the middle console, testified that the bottle was closed. We note that in State v. Johnson, 404 So.2d 239 (La.1981), cert. denied, 456 U.S. 925, 102 S.Ct. 1970, 72 L.Ed.2d 440 (1982), the court held that active cooperation in an attempt at drug disposal is adequate evidence, in combination with proximity to a drug or association with the possessor, to establish a prima facie case of drug possession. However, we do not find that the defendant's refusal to exit the vehicle can be construed as active cooperation in an attempt at drug disposal. The state did not present any evidence that the defendant attempted to dispose of the drugs, and after the arrest of the defendant, the drugs were observed on top of the middle console of the vehicle. Additionally, apart from participating in locking the doors and rolling up the windows, the state offered no evidence to show that the defendant exercised any control over the vehicle.
While the jury could have reasonably found that the defendant was aware of the medicine bottle and its contents as well as the drug sale, a rational fact finder could not have concluded that the defendant exercised dominion and control over the crack cocaine. Thus, we reverse the defendant's conviction and sentence for possession of cocaine in violation of La.R.S. 40:967(C) and order that he be discharged from further custody on that charge.
REVERSED.
GREMILLION, J. dissents and would affirm the conviction.
|
Wednesday's local pro roundup: Admirals end skid by beating Checkers
Daily Press
The Norfolk Admirals won for just the second time in 11 games, upending AHL Western Conference-leading Charlotte 3-1 Wednesday night before 2,777 at Scope.
Igor Bobkov made 30 saves for the victory, holding the Checkers scoreless until the Admirals had gained a 3-0 edge. Goals by Luca Caputi, Jay Rosehill and Dan Sexton, all in the second period, provided Norfolk that margin, with Caputi's and Sexton's coming on power plays.
Peter Holland, previously named to the East roster, is unavailable to represent the Admirals because he was called up by the parent Anaheim Ducks.
Soccer
Major League Soccer and USL Pro formed an alliance that establishes USL Pro – the league in which the Richmond Kickers compete – as a feeder system for North America’s preeminent pro soccer league, the Richmond Times-Dispatch reported.
The multiyear agreement calls for interleague play between MLS reserve league teams and USL Pro clubs. Plus, the Kickers are expected to soon announce an exclusive affiliation with D.C. United.
Marianne Stanley, a 2002 inductee into the Women’s Basketball Hall of Famer whose career included four national championships as Old Dominion’s head coach, joined the Washington Mystics’ staff under head coach Mike Thibault. |
# -*- coding: utf-8 -*-
# Copyright 2011 Takeshi KOMIYA
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
from blockdiag.noderenderer import install_renderer
from blockdiag.noderenderer.base import NodeShape
from blockdiag.utils import XY, Box
class MiniDiamond(NodeShape):
def __init__(self, node, metrics=None):
super(MiniDiamond, self).__init__(node, metrics)
r = metrics.cellsize
m = metrics.cell(node)
c = m.center
self.connectors = (XY(c.x, c.y - r),
XY(c.x + r, c.y),
XY(c.x, c.y + r),
XY(c.x - r, c.y),
XY(c.x, c.y - r))
self.textbox = Box(m.top.x, m.top.y, m.right.x, m.right.y)
self.textalign = 'left'
def render_shape(self, drawer, _, **kwargs):
fill = kwargs.get('fill')
# draw outline
if kwargs.get('shadow'):
diamond = self.shift_shadow(self.connectors)
if kwargs.get('style') == 'blur':
drawer.polygon(diamond, fill=fill, outline=fill,
filter='transp-blur')
else:
drawer.polygon(diamond, fill=fill, outline=fill)
else:
drawer.polygon(self.connectors, fill=self.node.color,
outline=self.node.linecolor, style=self.node.style)
def setup(self):
install_renderer('minidiamond', MiniDiamond)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.