text stringlengths 8 5.77M |
|---|
<?php if (!$this->fatalError): ?>
<div class="layout fancy-layout">
<?= Form::open([
'class' => 'layout',
'data-change-monitor' => 'true',
'data-window-close-confirm' => e(trans('rainlab.blog::lang.post.close_confirm')),
'id' => 'post-form'
]) ?>
<?= $this->formRender() ?>
<?= Form::close() ?>
</div>
<?php else: ?>
<div class="control-breadcrumb">
<?= Block::placeholder('breadcrumb') ?>
</div>
<div class="padded-container">
<p class="flash-message static error"><?= e(trans($this->fatalError)) ?></p>
<p><a href="<?= Backend::url('rainlab/blog/posts') ?>" class="btn btn-default"><?= e(trans('rainlab.blog::lang.post.return_to_posts')) ?></a></p>
</div>
<?php endif ?>
|
From New York to San Francisco: The Best Cities for Entrepreneurs to Expand to in the US
Expanding to America makes a lot of sense – it’s still broadly accepted to have the largest economy in the world and is by many indicators the biggest importer of British goods.
To successfully establish a business in the United States, it’s important to be aware America is just that – 50 united states, which each have their own rules and regulations governing how businesses must be structured and taxes that must be paid. It’s not like the UK, where the bulk of laws are governed centrally and don’t deviate from city to city.
In fact, a US Chamber of Commerce Federation Small Business Regulation Study stated there were an estimated 90,106 state and local governments in the United States, each with their own varied authority to promulgate rules and regulations.
Boston ranked best for entrepreneurial growth two years in a row
The 2017 report ranked Boston as the best city in the US for fostering entrepreneurial growth for the second year in a row, edging out the San Francisco Bay area.
Boston earned the top ranking based on startup density and capital access and got high marks for talent access and connectivity. The presence of top universities was said to produce a steady stream of new tech talent, whilst the city government offered strong levels of support.
Ranked second was the Bay Area (San Francisco) followed by Philadelphia, San Diego and Austin.
Best Cities to Own Real Estate in 2017
The study examined the health of the startup communities in 25 American cities and assessed their readiness to capitalize on the shift to an increasingly digital economy, with a unique focus on what were referred to as “next-wave startups.”
Foothold America, which specialises in helping firms set up in the US, took that a step further and created a map of the best places to do business in the States by industry.
It took the 25 cities highlighted in the Innovation That Matters report and used data to pinpoint the specialist professions and industries to be found in each of those locations to identify where those products and services were already strong.
Boston’s specialist industries were identified to be finance, life sciences, academia, tech and business services. Whilst New York’s were said to be publishing, finance, legal services, fashion and tourism.
Wyoming could be a winner for entrepreneurs starting up in America
These Are the 50 Best Places in America for Starting a BusinessAmerica’s Up And Coming Tech Boom Cities
The search for an American base for your business should not, however, be narrowed to the more ‘obvious’ cities and states.
Ultimately in choosing where best to establish your business there are many factors to consider relating to the regulations of each state, where your customers are likely to be and the sector you are in.
Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design/Development community and a Serial Blogger. follow me on Twitter @AndySowards |
Looking For a Local Plumber
Looking for a local plumber in Chandler, Phoenix or elsewhere in Arizona can be a complicated task. After all, you may have many different options for irql plumbers and you may just not be sure where to start or what to look for in order to find someone who will do quality work at an affordable price. Fortunately, there are ways to make sure that you get a plumbing contractor who treats you fairly, respects your home and meets all of your plumbing needs. You Ideas to Decorate Christmas With Crystal Balls just need to know what qualifications to look for and choose your driver Irql Not Less Or Equal Windows 7 Tcpip Sys Arizona plumber carefully.
Tips on Looking for a Local Plumbe
When you are looking for a local plumber, here are a few factors to consider and things to pay attention to in order to make sure you pick a plumber or plumbing company you can trust:
• Consider how long the plumbing company has been in Take A Look At The Very Best Used Cars For Sale In South Africa On The Internet business. You do not want a plumber that is just starting out. Not only will a brand new plumber potentially lack the experience you need to do the job right, but you may also find yourself with a fly-by-night company that won't stand behind its work or that won't be around in a few months if you run into problems.
• Make sure the plumber is licensed. The plumber or plumbing company should be willing to provide you with an Arizona Female G spot license number. You may even wish to consider checking that the number and license are legitimate in order to get the maximum in protection. A license ensures that the plumber has followed all requirements and has the requisite minimum experience necessary. Hiring an unlicensed plumber is a driver Irql Less Or Equal Windows 8 recipe for a disaster, not least of which because unlicensed contractors are not supposed to be hiring out their services for work in your home. If your plumber is breaking licensing laws, what other shortcuts is he taking or rules if he is breaking?
• Find out what the warranty is. You want a plumber who stands behind the work performed and who guarantees the service provided. This protects you if something goes wrong and ensures you only hire someone who has confidence in his ability to do the job. |
[Comparison of standard-dose epinephrine and high-dose epinephrine in cardiopulmonary arrest outside the hospital].
We compared high-dose epinephrine (HDE) with standard-dose epinephrine (SDE) in improving the outcome of resuscitation after out-of-hospital cardiopulmonary arrest. The SDE group received epinephrine 1mg, and the HDE group received epinephrine 5mg respectively every 5 minutes until the return of spontaneous circulation. There were no significant differences between the SDE group and the HDE group in the rate of return of spontaneous circulation, rate of successful resuscitation and neurologic outcome. However, the rate of successful resuscitation tended to be higher in the SDE group. The ineffectiveness of HDE was considered to be due to the existence coronary artery diseases in the majority of patients, or increase in myocardial oxygen demand by the beta 1-adrenergic effects of epinephrine. |
RECOMMENDED FOR FULL-TEXT PUBLICATION
Pursuant to Sixth Circuit Rule 206 2 Mattis v. Massman, et al. No. 02-1301
ELECTRONIC CITATION: 2004 FED App. 0003P (6th Cir.)
File Name: 04a0003p.06 L. Alexopoulos, HARDY, LEWIS & PAGE, Birmingham,
Michigan, for Appellants. George F. Killeen, II, Flint,
Michigan, for Appellee.
UNITED STATES COURT OF APPEALS
_________________
FOR THE SIXTH CIRCUIT
_________________ OPINION
_________________
JAMES MATTIS , X
BOGGS, Chief Judge. Defendants David Massman and
Plaintiff-Appellee, - General Motors Corporation (“GM”) appeal from the district
-
- No. 02-1301 court’s order granting Plaintiff James Mattis’s motion to
v. - remand and amend his complaint. Mattis had initially raised
> four separate state-law claims in his complaint filed in the
, Michigan state court. GM subsequently removed the case to
DAVID MASSMAN and -
GENERAL MOTORS federal court on the grounds that all Mattis’s claims were
- preempted by § 301 of the Labor Management Relations Act,
CORPORATION , - 29 U.S.C. § 185. In the district court, Mattis moved to amend
Defendants-Appellants. - his complaint and eliminate two of his four claims. He
- argued that the remaining two tort claims were not preempted
N because they did not implicate the collective bargaining
Appeal from the United States District Court agreement governing Mattis’s employment. The district court
for the Eastern District of Michigan at Ann Arbor. agreed and granted the motion to remand. Because we find
No. 01-60177—Marianne O. Battani, District Judge. that Mattis’s remaining claims were preempted by § 301, we
now reverse.
Argued: May 21, 2003
I
Decided and Filed: January 6, 2004
GM employed James Mattis as an hourly production
Before: BOGGS, Chief Judge; and NELSON and COLE, worker in a metal fabricating plant in Flint, Michigan.
Circuit Judges. Because Mattis was a member of a bargaining unit
represented by the United Automobile, Aerospace, and
_________________ Agricultural Implement Workers (“UAW”), his employment
was governed by the collective bargaining agreement
COUNSEL (“CBA”) entered into by UAW and GM. He worked at the
plant up through October 11, 2000, when he was terminated
ARGUED: Timothy K. McConaghy, HARDY, LEWIS & after allegedly striking his supervisor, David Massman.
PAGE, Birmingham, Michigan, for Appellants. George F. Mattis disputed this allegation and subsequently filed a
Killeen, II, Flint, Michigan, for Appellee. ON BRIEF: Alex
1
No. 02-1301 Mattis v. Massman, et al. 3 4 Mattis v. Massman, et al. No. 02-1301
complaint against both Massman and GM in the Michigan In reaching its decision, the district court reasoned that the
state court. tort claims were not preempted because they were premised
on the alleged harassment, rather than the wrongful
In his complaint, Mattis raised four separate state-law termination. The district court granted the motion on
claims against GM: (1) “Interference with an Existing December 17, 2001, and GM filed a Motion for
Contract”; (2) “Tortious Interference with an Advantageous Reconsideration on January 2, 2002. The district court denied
Economic Relationship or Expectation”; (3) “Tortious this motion on February 12, 2002. GM now timely appeals
Interference with Contractual Relationship”; and both the granting of Mattis’s motion to remand and amend his
(4) “Intentional Infliction of Emotional Distress.” To support complaint, along with the denial of GM’s motion to
each claim, Mattis alleged that he had been wrongfully reconsider.
terminated and that he had been subjected to repeated
harassment by Massman long before his termination. II
According to Mattis, Massman’s harassment included
assigning workers with less seniority to the more desirable We must decide whether the district court erred in finding
jobs, preventing Mattis from learning how to perform certain that Counts II (“Tortious Interference with an Advantageous
tasks, following Mattis around and recording when he was Economic Relationship or Expectation”) and IV (“Intentional
late, forcing Mattis to perform the more difficult jobs in the Infliction of Emotional Distress”) were not preempted by
plant, causing Mattis to lose vacation days, and refusing to § 301. We review the district court’s decision regarding
grant Mattis an excused absence when he was ill. On the day subject matter jurisdiction de novo. Long v. Bando Mfg. of
Mattis allegedly struck Massman, Mattis claimed that Am., 201 F.3d 754, 759 (6th Cir. 2000).
Massman had insulted his daughters.
Section 301 provides that:
On August 21, 2001, GM removed the case to federal court
on the ground that Mattis’s claims were preempted by § 301 Suits for violations of contracts between an employer and
of the Labor Management Relations Act (“LMRA”). Mattis a labor organization representing employees in an
responded, on September 19, by filing a motion to amend his industry affecting commerce . . . may be brought in any
complaint and remand the case back to state court. Mattis district court of the United States having jurisdiction of
wanted to amend his complaint by eliminating Counts I and the parties. . . .
III (listed above). According to Mattis, because Counts II and
IV (i.e., the remaining claims) were not preempted by § 301, 29 U.S.C. § 185(a). As this court has explained, “[t]he
the case should be remanded back to the Michigan state court. Supreme Court has interpreted this language to require federal
GM disputed this claim, arguing that Counts II and IV were pre-emption of state law-based actions . . . [when those
still preempted by § 301. Although Counts II and IV were actions are] inextricably intertwined with consideration of the
tort claims, GM argued that they were essentially claims for terms of the labor contract.” Jones v. Gen. Motors Corp., 939
breach of contract, which were clearly preempted by § 301. F.2d 380, 382 (6th Cir. 1991) (citing Allis-Chalmers Corp. v.
Lueck, 471 U.S. 202, 213 (1988) and Textile Workers Union
After a hearing on the issue of preemption, the district court v. Lincoln Mills, 353 U.S. 448 (1957)) (internal quotations
found that Counts II and IV were not preempted by § 301 and and citations omitted). The Supreme Court has justified its
granted Mattis’s motion to remand and amend his complaint.
No. 02-1301 Mattis v. Massman, et al. 5 6 Mattis v. Massman, et al. No. 02-1301
interpretation by emphasizing the importance of uniform of the labor contract”); DeCoe v. Gen. Motors Corp., 32 F.3d
federal law in this area. 212, 216 (6th Cir. 1994) (citing Lingle).
[T]he subject matter of Section 301(a) is peculiarly one In Allis-Chalmers Corp., for example, the plaintiff brought
that calls for uniform law. . . . The possibility that a Wisconsin tort claim of bad-faith handling of an insurance
individual contract terms might have different meanings claim against the defendant. The plaintiff’s right to insurance,
under state and federal law would inevitably exert a however, had been established by the collective bargaining
disruptive influence upon both the negotiation and agreement entered into by his union and the defendant. In
administration of collective agreements. . . . The finding the claim to be preempted, the Supreme Court
importance of the area which would be affected by explained, “[b]ecause the right asserted not only derives from
separate systems of substantive law makes the need for the contract, but is defined by the contractual obligation of
a single body of federal law particularly compelling. The good faith, any attempt to assess liability here inevitably will
ordering and adjusting of competing interests through a involve contract interpretation.” 471 U.S. at 218. Yet, in
process of free and voluntary collective bargaining is the Lingle, the Supreme Court found that the plaintiff’s
keystone of the federal scheme to promote industrial retaliatory discharge claim, which alleged retaliation for filing
peace. State law which frustrates the effort of Congress a workers’ compensation claim, was not preempted by § 301.
to stimulate the smooth functioning of that process thus The Supreme Court reasoned, “the state-law remedy in this
strikes at the very core of federal labor policy. case is ‘independent’ of the collective-bargaining agreement
in the sense of ‘independent’ that matters for § 301 pre-
Local 174, Teamsters v. Lucas Flower Co., 369 U.S. 95, 103- emption purposes: resolution of the state-law claim does not
04 (1962). require construing the collective bargaining agreement.” 486
U.S. at 407. Thus, the basic question before this court is
Given the importance of maintaining uniform federal law, whether Mattis’s state-law tort claims are “independent” of
the Supreme Court “has made clear that § 301 of the LMRA the CBA that governed his employment.
preempts any state-law claim arising from a breach of a
collective bargaining agreement.” Smolarek v. Chrysler To determine whether a state-law claim is sufficiently
Corp., 879 F.2d 1326, 1329 (6th Cir. 1989) (en banc). “independent” to survive § 301 preemption, this court has
Preemption under § 301 applies not only to state-law contract adopted a two-step inquiry. DeCoe, 32 F.3d at 216-17. First,
claims, but has been expanded to include state-law tort claims courts must determine whether resolving the state-law claim
as well. Id. at 1329-30 (citing Allis-Chalmers Corp., 471 would require interpretation of the terms of the collective
U.S. at 217). Not every tort claim, however, relating to bargaining agreement. If so, the claim is preempted. Second,
employment will be subject to preemption under § 301. Id. courts must ascertain whether the rights claimed by the
at 1330. To survive preemption under § 301, the tort claims plaintiff were created by the collective bargaining agreement,
must be “independent” of the CBA. Lingle v. Norge Div. of or instead by state law. Id. at 216. If the rights were created
Magic Chef, Inc., 486 U.S. 399, 409-10 (1989); Allis- by the collective bargaining agreement, the claim is
Chalmers Corp., 471 U.S. at 213 (analyzing state-law claim preempted. In short, if a state-law claim fails either of these
to determine if it was “independent of any right established by two requirements, it is preempted by § 301. Using the
contract, or, instead, whether evaluation of the tort claim approach established in DeCoe, we now evaluate each of
[was] inextricably intertwined with consideration of the terms Mattis’s two state-law claims.
No. 02-1301 Mattis v. Massman, et al. 7 8 Mattis v. Massman, et al. No. 02-1301
A because it asserted a right created not by state law, but by the
collective bargaining agreement (thus violating the second
In Count II, Mattis raised a claim of “Tortious Interference requirement). “[R]esolution of the plaintiff’s claim will not
with an Advantageous Economic Relationship or involve the direct interpretation of [the] CBA, but . . . will
Expectation.” In DeCoe, this court construed this particular require a court to address relationships that have been created
claim as constituting a claim of tortious interference with a through the collective bargaining process and to mediate a
business relationship under Michigan law. 32 F.3d at 218. dispute founded upon rights created by a CBA.” Id. at 218
To prevail, a plaintiff must establish: (quoting Jones v. Gen. Motors Corp., 939 F.2d 380, 382-83
(6th Cir. 1991)). In these two previous cases (DeCoe and
(1) the existence of a valid business relation (not Jones), the plaintiffs’ claims sought to vindicate rights created
necessarily evidenced by an enforceable contract) or by the collective bargaining agreements. In DeCoe, the
expectancy; (2) knowledge of the relationship or plaintiff alleged that the defendant “interfered with Plaintiff’s
expectancy on the part of the defendant interferer; (3) an job as a Local 326 committeeman.” 32 F.3d at 218. The
intentional interference inducing or causing a breach or rights and responsibilities of the committeeman, however,
termination of the relationship or expectancy; and were created and defined by the CBA. Ibid. In Jones, the
(4) resulting damage to the party whose relationship or plaintiff alleged that the defendant breached the terms of a
expectancy has been disrupted. settlement agreement, which he claimed required him to be
reinstated. As we noted, however, “the settlement agreement
Wausau Underwriters Ins. Co. v. Vulcan Dev., Inc., 323 F.3d itself [was] a creature wholly begotten by the CBA.” 939
396, 404 (6th Cir. 2002) (citing Mich. Podiatric Med. Ass’n F.2d at 383. Thus, the claim was the “archetype of a state-law
v. Nat’l Foot Care Program, Inc., 438 N.W.2d 349, 354 claim that by its very nature involve[d] an examination of the
(Mich. Ct. App. 1989). employment relationship of parties to a CBA.” Ibid.
The question of whether the elements of this state-law DeCoe requires that Mattis’s claim be preempted.
claim should be considered independent of the CBA was Similarly to the plaintiff in DeCoe, Mattis alleged
clearly answered by this court in DeCoe, in which we held interference with a business relationship that was “created
that § 301 preempted plaintiff’s claim of tortious interference entirely by the CBA.” DeCoe, 32 F.3d at 218. Both Mattis
with economic relations (construed as tortious interference and the district court attempted to distinguish DeCoe by
with a business relationship). In DeCoe, the plaintiff brought emphasizing that “committeemen” were the unique creations
a complaint against several of his co-workers for whom he of the collective bargaining agreement in question, which
had served as a committeeman, or supervisor. 32 F.3d at 214- made preemption more compelling. The relationship in this
15. The workers had previously filed administrative case, however, was also created by the CBA. Even more
proceedings against the plaintiff for alleged sexual importantly, the question of whether Massman “interfered”
harassment, and the plaintiff subsequently sued them for with Mattis’s business relationship would require us to delve
defamation, tortious interference, and intentional infliction of into the rights and responsibilities of plant supervisors under
emotional distress. In finding the tortious interference claim the CBA. Undoubtedly, the supervisor would claim that his
preempted, we assumed that the plaintiff satisfied the first actions were consistent with his duties as a supervisor at the
requirement because no interpretation of the contractual terms factory. Congress intended such questions to be addressed
was necessary. We still found the claim preempted, however, within the realm of federal, not state, law.
No. 02-1301 Mattis v. Massman, et al. 9 10 Mattis v. Massman, et al. No. 02-1301
Finally, we note that Mattis has not established the of course the [c]ourt would have to look to that CBA to
existence of any external regime of state law that would allow decide whether or not that termination was outrageous.” As
him to allege violations of rights independent from the rights GM points out, however, Mattis’s counsel had just been asked
created by the CBA. For example, in Smolarek v. Chrysler (at the hearing) whether Count IV was premised on the
Corp., the plaintiff’s tort claim survived preemption in part termination or the harassment. Counsel responded, “The
because it asserted rights established by Michigan’s law harassment, and the termination. . . . It was a combination of
against handicap discrimination. 879 F.2d 1326, 1331 (6th the two. My answer would have to be both.” While this
Cir. 1989) (en banc). Similarly, in O’Shea v. Detroit News, response alone calls the district court’s decision into question,
the plaintiff’s claim survived preemption in part because it we hold Count IV to be preempted even if it is premised only
asserted claims of retaliatory discharge and age on the alleged harassment.
discrimination. 887 F.2d 683, 686-87 (6th Cir. 1989) (en
banc). Mattis’s complaint, by contrast, alleged violations of Once again, DeCoe governs the outcome. In DeCoe, we
rights established only by the CBA. For instance, he alleged concluded that this exact claim was preempted because it
that Massman denied him vacation days, failed to provide would require us to interpret the collective bargaining
proper training, and failed to excuse his absences for illness. agreement in order to determine whether the alleged conduct
These entitlements belonged to Mattis solely because of the was “outrageous.” We explained, “a defendant has not acted
CBA. Count II is preempted. outrageously where he has done no more than to insist upon
his legal rights in a permissible way.” 32 F.3d at 219
B (quoting Polk v. Yellow Freight Sys., Inc., 801 F.2d 190, 196
(6th Cir. 1986) (internal quotations omitted)).
In Count IV, Mattis raised a claim of “Intentional Infliction
of Emotional Distress.” Although the Michigan Supreme As in DeCoe, determining whether Massman’s alleged
Court has yet to recognize this cause of action, “the Michigan harassment constituted “outrageous conduct” would force us
Court of Appeals has recognized such a tort, and we have to look to the CBA. Without reference to the CBA, we could
assumed that the Michigan Supreme Court would do so too not possibly know whether Massman acted outrageously or
under appropriate circumstances.” Andrews v. Prudential was merely insisting on his legal rights as a supervisor
Secs., Inc., 160 F.3d 304, 309 (6th Cir. 1998). To prevail on charged with ensuring compliance with the rules of the
a claim of intentional infliction of emotional distress, the factory. Even if we give Mattis the benefit of the doubt about
plaintiff must establish: (1) extreme and outrageous conduct; whether we would have to interpret the terms of the CBA, his
(2) intent or recklessness; (3) causation; (4) and severe claim clearly fails to meet the second requirement announced
emotional distress. Ibid. in DeCoe. This is not to say that § 301 has preempted all
claims of intentional infliction of emotional distress that may
Mattis originally claimed that both his termination and be brought by an employee. See O’Shea v. Detroit News, 887
Massman’s harassment prior to termination constituted F.2d 683, 687 (6th Cir. 1989) (en banc) (finding that § 301
“outrageous” conduct under Michigan law. The district court, did not preempt intentional infliction of emotional distress
however, concluded that Mattis’s claim was not preempted claim where allegations were “independent of any alleged
because it was premised only on the harassment and not the violation of the contract”). Mattis’s allegations, however, all
termination. The district court explained, “if plaintiff’s count involve workplace actions taken under the ostensible
four is premised on his termination by General Motors, then authority of the CBA, and seem to be a subtle attempt to
No. 02-1301 Mattis v. Massman, et al. 11
present contract claims in tort clothing. See DeCoe, 32 F.3d
at 216 (requiring courts to look “to the essence of the
plaintiff’s claim, in order to determine whether the plaintiff is
attempting to disguise what is essentially a contract claim as
a tort”). For example, Mattis alleged that Massman ignored
his seniority rights in assigning jobs, failed to train him
properly, assigned him the most strenuous jobs, prevented
him from receiving his pay on time, reduced his vacation
days, and punished Mattis for using the company phone. To
allow such allegations to proceed in state court would
eviscerate the uniform federal regime established by Congress
via § 301.
III
Because we find Mattis’s two remaining state-law claims
to be preempted, we REVERSE the district court’s order to
the extent it remanded the case to state court. Our decision
makes it unnecessary to review GM’s motion to reconsider.
The case will be REMANDED to the district court, which
may consider any motions to amend the complaint in light of
our decision.
|
Rich Man Values Gold, His Son Values Bitcoin - iunternik
https://hackernoon.com/rich-man-values-gold-his-son-values-bitcoin-7t113ezq
======
wonderwonder
Honestly this just seems like Peter was being a good dad and setting his son
up for success. He included his sons twitter handle, the btc hashtag and
everything required for his son to get a ton of follows. Its very smart of the
two of them and very much a move to give his kid a leg up. Peter has
established himself a nice niche market as being pro gold anti btc and its
gotten him a following, now his son can capture the opposite market.
Kid is a college freshman and now has 18.5k followers. Not a bad plan.
|
Q:
Grunt: Watch multiple files, Compile only Changed
I'm new to Grunt, and so far I'm enjoying it very much.
I want Grunt to compile only the changed files when running grunt watch
In my Grunfile.coffee I currently have (relevant parts).
Note: assets/javascript/app.coffee and assets/javascript/app.js are directories
coffee:
default:
expand: true
cwd: "assets/javascript/app.coffee"
src: ["*.coffee"]
dest: "assets/javascript/app.js"
ext: ".js"
uglify:
dev:
options:
beautify: true
compress: false
mangle: false
preserveComments: 'all'
files:
"js/app.js": "assets/javascript/app.js/*.js"
"js/libs.js": "assets/javascript/libs/*.js"
watch:
coffeescript:
files: 'assets/javascript/**/*.coffee'
tasks: ["coffee"]
javascript:
files: "assets/**/*.js"
tasks: ["uglify:dev"]
livereload:
files: ["Gruntfile.coffee", "js/*.js", "*.php", "css/*.css", "images/**/*.{png,jpg,jpeg,gif,webp,svg}", "js/*.js", ]
options:
livereload: true
There is probably a shorter way around, but I'm compiling app.coffee to app.js first, so that after I distribute my work, people who aren't comfortable with Coffeescript can browse the code in somewhat reasonable manner.
The problem with all this is that now that I save a Coffeescript file, I get too many steps ( I think ):
>> File "assets/javascript/app.coffee/browse.coffee" changed.
Running "coffee:default" (coffee) task
File assets/javascript/app.js/browse.js created.
File assets/javascript/app.js/filters.js created.
Done, without errors.
Completed in 0.837s at Tue May 28 2013 12:30:18 GMT+0300 (EEST) - Waiting...
OK
>> File "assets/javascript/app.js/browse.js" changed.
>> File "assets/javascript/app.js/filters.js" changed.
Running "uglify:dev" (uglify) task
File "js/app.js" created.
File "js/libs.js" created.
Done, without errors.
Completed in 0.831s at Tue May 28 2013 12:30:19 GMT+0300 (EEST) - Waiting...
OK
>> File "js/app.js" changed.
>> File "js/libs.js" changed.
Completed in 0.000s at Tue May 28 2013 12:30:19 GMT+0300 (EEST) - Waiting...
Currently I'm just setting up my project, but I will have a lot more Coffeescript files, and I don't want Coffeescript to recompile all of the files, on each file change.
Furthermore, libs.js has no part in all of this at all, but I guess it is still compiled, because it also matches the "assets/*/.js" pattern.
Is there a way to make Grunt compile only the files that have changed ?
A:
I've finally found a real solution! And it's super simple too!
npm install grunt-newer --save-dev
Then in your Gruntfile (after loading the task in grunt):
watch:
coffeescript:
files: 'assets/javascript/**/*.coffee'
tasks: ["newer:coffee"]
And that's it! The Awesome grunt-newer is awesome!
|
---
address:
- |
Irmar\
Université de Rennes 1\
Campus de Beaulieu\
F-35042 Rennes Cedex\
France
- |
Institut de mathématiques de Jussieu\
Université Pierre-et-Marie-Curie\
Case 247\
4 place Jussieu\
75231 Paris Cedex 05
author:
- 'Antoine Chambert-Loir'
- Antoine Ducros
bibliography:
- 'aclab.bib'
- 'acl.bib'
- 'chern.bib'
title: Formes différentielles réelles et courants sur les espaces de Berkovich
---
2
|
//
// Generated by class-dump 3.5 (64 bit).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2013 by Steve Nygard.
//
#import "MMObject.h"
@class NSString;
@interface WCCanvasReportInfo : MMObject
{
unsigned int _entranceType;
unsigned int _exitType;
unsigned int _entranceScene;
unsigned int _entranceCanvasCount;
unsigned int _entranceSameCanvasCount;
unsigned int _enableSwipeRight;
unsigned int _swipeRightCount;
unsigned int _componentCount;
unsigned int _shareSnsCount;
unsigned int _shareFriendCount;
unsigned int _favCount;
NSString *_snsId;
NSString *_uxInfo;
unsigned long long _stayTime;
NSString *_componentsStatStr;
unsigned long long _enterTimeStamp;
NSString *_snsStatExt;
}
@property(retain, nonatomic) NSString *snsStatExt; // @synthesize snsStatExt=_snsStatExt;
@property(nonatomic) unsigned long long enterTimeStamp; // @synthesize enterTimeStamp=_enterTimeStamp;
@property(retain, nonatomic) NSString *componentsStatStr; // @synthesize componentsStatStr=_componentsStatStr;
@property(nonatomic) unsigned int favCount; // @synthesize favCount=_favCount;
@property(nonatomic) unsigned int shareFriendCount; // @synthesize shareFriendCount=_shareFriendCount;
@property(nonatomic) unsigned int shareSnsCount; // @synthesize shareSnsCount=_shareSnsCount;
@property(nonatomic) unsigned long long stayTime; // @synthesize stayTime=_stayTime;
@property(nonatomic) unsigned int componentCount; // @synthesize componentCount=_componentCount;
@property(nonatomic) unsigned int swipeRightCount; // @synthesize swipeRightCount=_swipeRightCount;
@property(nonatomic) unsigned int enableSwipeRight; // @synthesize enableSwipeRight=_enableSwipeRight;
@property(nonatomic) unsigned int entranceSameCanvasCount; // @synthesize entranceSameCanvasCount=_entranceSameCanvasCount;
@property(nonatomic) unsigned int entranceCanvasCount; // @synthesize entranceCanvasCount=_entranceCanvasCount;
@property(nonatomic) unsigned int entranceScene; // @synthesize entranceScene=_entranceScene;
@property(nonatomic) unsigned int exitType; // @synthesize exitType=_exitType;
@property(nonatomic) unsigned int entranceType; // @synthesize entranceType=_entranceType;
@property(retain, nonatomic) NSString *uxInfo; // @synthesize uxInfo=_uxInfo;
@property(nonatomic) NSString *snsId; // @synthesize snsId=_snsId;
- (void).cxx_destruct;
- (id)genStatString;
- (id)init;
@end
|
Diagnosis of the sphingolipidoses with labelled natural substrates.
The genetic heterogeneity of sphingolipidoses is underlined and the desirability of using natural labelled substrates for the diagnoses of each new index case strongly emphasized. Recent studies of our Scandinavian Krabbe families (more than 50) have repeatedly shown that there is no method developed which can be used for the detection of carriers of the mutant gene in leukocytes or lymphocytes. Also described are enzymic studies in two forms of Gaucher disease which further demonstrate the importance of natural substrates for the diagnoses of the disease in leukocytes and cultivated amniotic fluid cells. |
Worldwide, nontyphoidal *Salmonella enterica* is a major cause of foodborne illness, and Enteritidis is one of the most commonly reported serovars ([www.who.int/salmsurv/links/GSSProgressReport2005.pdf](http://www.who.int/salmsurv/links/GSSProgressReport2005.pdf)). In industrialized countries, *S*. *enterica* serovar Enteritidis commonly causes self-limiting gastroenteritis, for which treatment with antimicrobial drugs is usually not needed. However, in developing countries, this serovar, together with serovar Typhimurium, frequently causes invasive infections and substantial illness and death among young children with underlying diseases and among adults with HIV infection ([@R1]). Although antimicrobial drug resistance is not as high in *S. enterica* serovar Enteritidis as in other zoonotic disease serovars, multidrug-resistance (resistance to [\>]{.ul}4 antimicrobial drugs) has been increasingly reported ([@R2]), threatening treatment success for patients with severe infections. In recent years, in association with multidrug resistance, another trend has arisen: the emergence of virulence-resistance (VR) plasmids; these are hybrid plasmids that harbor resistance (R) and virulence (V) determinants. The appearance of these plasmids is of concern because they could lead to the co-selection of virulence (in addition to resistance) through the use of antimicrobial drugs ([@R3]*,*[@R4]). One such plasmid, pUO-SeVR1, has been recently reported in a multidrug-resistant (MDR) clinical isolate of *S. enterica* serovar Enteritidis (CNM4839/03) from Spain ([@R5]). This mobilizable plasmid of ≈100 kb derives from pSEV, the serovar-specific V plasmid of *S. enterica* serovar Enteritidis, and carries most of its V determinants, including the *spvRABCD* locus (*Salmonella* plasmid virulence). This plasmid greatly increases the ability of salmonellae to proliferate intracellularly and has been associated with severe infections in humans ([@R6]). The plasmid also harbors several R genes---*bla*~TEM-1,~ *catA2, strA*-*strB, sul1, sul2, tet*(A)---and a class-1 integron with the 700-bp/*dfrA7* variable region, which confer resistance to ampicillin, chloramphenicol, streptomycin, sulfonamides, tetracycline, and trimethoprim (R-type ACSSuTTm). To investigate their international spread, we studied the presence of *S. enterica* serovar Enteritidis isolates carrying pUO-SeVR1--like plasmids in the United Kingdom.
The Study
=========
We screened 31,615 *S. enterica* serovar Enteritidis isolates that had been collected from clinical specimens during 2005--2010 and deposited in the culture collection of the Health Protection Agency *Salmonella* Reference Unit. We screened the isolates for R-type ACSSuTTm. A total of 14 serovar Enteritidis isolates showing this resistance phenotype were detected and subsequently examined for the presence of integron-located *dfrA7*. Of the 14 isolates, 11 were positive and their plasmid content was analyzed by S1 pulsed-field gel electrophoresis (PFGE) ([@R2]) and by the Kado and Liu methods ([@R7]); we used serovar Enteritidis strains NRL-Salm-PT4 and CNM4839/03 as controls for pSEV-- and pUO-SeVR1--carrying isolates, respectively. The 11 isolates harbored 1 plasmid of variable size (60--95 kb); among these, 9 isolates hybridized with *dfrA7*-specific and *spvC*-specific probes (with plasmids of 85--95 kb) ([Figure](#F1){ref-type="fig"}). These 9 isolates contained a VR-hybrid plasmid similar to pUO-SeVR1 and were selected for further analyses ([Table 1](#T1){ref-type="table"}, [Table 2](#T2){ref-type="table"}). The remaining 2 isolates carried the normal pSEV plasmid (60 kb), in which *spvC* hybridized; *dfrA7* was chromosomally located.
{#F1}
###### Epidemiologic information for multidrug-resistant *Salmonella* *enterica* serovar Enteritidis isolates, 2005--2010, UK\*
Isolate no. Date of isolation Source Recent travel history African patient name Patient age, y
------------- ------------------- -------- ----------------------- ---------------------- ----------------
CNM4839/03† 2003 Feces Unknown No 3
H051860415 2005 Apr 19 Blood Nigeria No 38
H070360201‡ 2007 Jan 14 Blood Unknown Yes 35
H070420137‡ 2007 Jan 15 Feces Unknown Yes 35
H073180204 2007 Jul 31 Blood Unknown Yes 34
H091340084 2009 Mar 15 Feces Uganda No 59
H091800482 2009 Apr 17 Blood Unknown Yes 30
H095100307§ 2009 Dec 7 Blood Unknown Yes 68
H100240198§ 2010 Jan 9 Blood Unknown Yes 68
H101700366§ 2010 Apr 22 Blood Unknown Yes 68
\*All isolates contained a virulence-resistance hybrid plasmid similar to pUO-SeVR1.
†Control isolate from Spain.
‡Recovered from the same patient.
§Recovered from the same patient.
###### Characteristics of *Salmonella* *enterica* serovar Enteritidis isolates harboring pUO-SeVR1-like plasmids, 2005--2010, UK\*
Isolate no. Phage type Resistance phenotype/ genotype Class 1 integron† pSEV genes‡ MLVA MLST VR plasmid, kb
------------- ------------ ------------------------------------------------------------------------------------------- ------------------- -------------------------------------------------------------------------------------- --------------------- -------- ----------------
CNM4839/03 PT 14b AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5,*
*srgB, srgC, pefA, pefB, pefC, pefD* 2-12-9-4-4-3-NA-8-8 ST11 100
H051860415 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, srgB, srgC, pefA, pefB, pefC, pefD* 2-13-9-4-4-3-NA-8-8 ST1479 95
H070360201 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, ΔsrgA, srgB, srgC, pefA, pefB* 2-15-9-4-4-3-NA-8-8 ST1479 88
H070420137 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, ΔsrgA, srgB, srgC, pefA, pefB* 2-15-9-4-4-3-NA-8-8 ND 88
H073180204 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, srgB, srgC, pefA, pefB, pefC, pefD* 2-13-9-4-4-3-NA-8-8 ND 92
H091340084 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, ΔsrgA, srgB, srgC, pefA, pefB, pefC, pefD* 2-9-9-4-4-3-NA-8-8 ST11 90
H091800482 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, srgB, srgC, pefA, pefB, pefC, pefD* 2-13-9-4-4-3-NA-8-8 ND 92
H095100307 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, ΔsrgA, srgB, srgC, pefA, pefB, pefC, pefD* 2-13-9-4-4-3-NA-8-8 ND 95
H100240198 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/d*frA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, ΔsrgA, srgB, srgC, pefA, pefB, pefC, pefD* 2-13-9-4-4-3-NA-8-8 ND 95
H101700366 PT 42 AMP, CHL, STR, SUL, TET, TMP/*bla*~TEM-1,~*catA2, strA-strB, sul1, sul2, tet*(A), *dfrA7* 700 bp/*dfrA7* *spvA, spvB, spvC, spvR, rsk, rck, mig-5, ΔsrgA, srgB, srgC, pefA, pefB, pefC, pefD* 2-13-9-4-4-3-NA-8-8 ND 95
\*pSEV, serovar-specific V plasmid of *S.enterica* serovar Enteritidis; MLVA, multilocus variable number tandem repeat analysis; MLST, multilocus sequence typing; VR, virulence-resistance; PT, phage type; NA, no amplification from this locus; AMP, ampicillin; CHL, chloramphenicol; STR streptomycin; SUL, sulfonamides; TET, tetracycline; TMP, trimethoprim; ST, sequence type; ND, not done.
†Size of the variable region amplified with the 5′CS and 3′CS primers ([@R2]).
‡All plasmids were positive for IncFIIA, IncFIB and the *par* locus. Two new primer pairs were devised for detection of *srgA*: srgAB-Fw1/Rv1 (5′-CGCCTTCCGTGTATGTCC/GCGAGTCACTCACCGACAG-3′) and srgAB-Fw2/Rv2 (5′-GTTGCACAGGAGTGGGAGTC/GTCCGGGTTCCATGTCAG-3′). The forward primers anneal at different positions within *srgA*; the reverse primers anneal at different positions within *srgB*.
In the 9 isolates carrying VR-hybrid plasmids, the R-type ACSSuTTm was encoded by the R-genes *bla*~TEM-1,~ *catA2*, *strA-strB*, *sul1*, *sul2*, *tet*(A), and *dfrA7*, which were located on the pUO-SeVR1--like plasmids as determined by Southern blot hybridization. By PCR amplification, using previously described primers and conditions ([@R5]*,*[@R8]) ([Table 2](#T2){ref-type="table"}), and by Southern blot hybridization ([@R5]), we tested for the presence of IncFII and IncFIB replicons, *parAB* (partition), *spvRABCD*, *rck* (resistance to complement killing), *mig-5* (macrophage-induced gene), *pefABCDI* (Pef fimbriae operon), and *srgA* (SdiA-regulated gene; next to *orf7*), all carried by pSEV. The 9 plasmids were positive for the 2 replicons and for all genes screened except *pefC* and *pefD* (absent in H070360201 and H070420137), *pefI*-*orf7* (absent in all), and *srgA* (either absent \[H051860415, H073180204, and H091800482\] or truncated \[in the remaining isolates\]) ([Table 2](#T2){ref-type="table"}).
Isolate subtyping was conducted by phage typing, multilocus variable number tandem repeat analysis (MLVA), multilocus sequence typing (MLST), and *Xba*I-PFGE ([@R9]*,*[@R10]) (<http://mlst.ucc.ie/mlst/dbs/Senterica>; [www.pulsenetinternational.org](http://www.pulsenetinternational.org)). The 9 *S. enterica* serovar Enteritidis isolates belong to phage type (PT) 42, in contrast with CNM4839/03, which belongs to PT14b ([Table 2](#T2){ref-type="table"}). We identified 4 MLVA profiles, which were all single-locus variants of the highly variable locus SENTR5, indicating that the isolates are closely related ([Table 2](#T2){ref-type="table"}). The isolate from Spain and 3 of the 9 isolates from the United Kingdom, selected as representative of each MLVA profile, were also analyzed by MLST ([Table 2](#T2){ref-type="table"}). CNM4839/03 and H091340084 were assigned to sequence type (ST) 11, the most commonly found ST in serovar Enteritidis (<http://mlst.ucc.ie/mlst/>). The remaining 2 isolates could be ascribed to ST1479, the first examples of this single-locus variant of ST11 in the MLST database ([Table 2](#T2){ref-type="table"}). According to *Xba*I-PFGE, the control strain NRL-Salm-PT4 showed a clearly distinct profile in comparison with CNM4839/03 and the 9 isolates containing pUO-SeVR1--like plasmids, which generated 6 closely related patterns ([Figure](#F1){ref-type="fig"}). Most isolates differed by 1 band of variable size (85--95 kb), which corresponded to the *Xba*I-linearized VR-hybrid plasmids. As an exception, isolate H070420137 showed additional differences in chromosomal bands of ≈150 and ≈300 kb. Because isolates H070420137 and H070360201 came from the same patient ([Table 1](#T1){ref-type="table"}) and shared the same V and R genotypes and other typing markers, 1 isolate could have evolved from the other; however, co-infection of the patient with 2 closely related strains cannot be ruled out. In addition, considering the typing results of H095100307, H100240198, and H101700366, the identical size of their plasmids, and the fact that they were isolated from the same patient ([Table 1](#T1){ref-type="table"}), these 3 isolates can be considered the same strain.
All except 2 of the UK isolates carrying pUO-SeVR1--like plasmids were recovered from the blood of patients who had recently returned from an African country or who had an African name ([Table 1](#T1){ref-type="table"}). Supporting the possible African origin, similar *Xba*I-PFGE profiles and MDR phenotypes (ampicillin, trimethoprim, sulfonamides, and tetracycline) have been identified in clinical *S. enterica* serovar Enteritidis isolates involved in outbreaks and community infections in different African countries. These isolates caused bacteremia, meningitis, diarrhea ([@R11]*--*[@R13]), and high case-fatality rates; they affected mainly children, whereas most clinical isolates analyzed in our study were obtained from adults with bacteremia ([Table 1](#T1){ref-type="table"}). The detection of the 700-bp/*dfrA7* integron in *S. enterica* serovar Enteritidis isolates from Africa ([@R14]) also supports an African origin of the MDR serovar Enteritidis isolates harboring pUO-SeVR1--like plasmids. Of note, resistance derivatives of pSLT, the V-plasmid specific to *S*. Typhimurium, have been found in the epidemic ST313 clone of this serovar, which has been considered a major cause of invasive disease in sub-Saharan Africa ([@R15]).
Conclusions
===========
Closely related MDR *S. enterica* serovar Enteritidis isolates carrying pUO-SeVR1--like plasmids were recovered in the United Kingdom. Most were isolated from the blood of patients linked to Africa, and they showed common features with serovar Enteritidis isolates involved in outbreaks on that continent. The possibility that this potentially invasive clone of *S. enterica* serovar Enteritidis can be spread through human travel, together with the detection of VR-plasmids in the serovar most frequently associated with human infections, is of public health concern and requires surveillance.
*Suggested citation for this article*: Rodríguez I, Rodicio MR, Guerra B, Hopkins KL. Potential international spread of multidrug-resistant invasive *Salmonella enterica* serovar Enteritidis. Emerg Infect Dis \[serial on the Internet\]. 2012 Jul \[*date cited*\]. <http://dx.doi.org/10.3201/eid1807.120063>
We thank B. Malorny and E. Junker for help with MLVA typing; A. Schroeter, J. Ledwolorz, and staff of the Health Protection Agency *Salmonella* Reference Unit for phage typing; and I. Montero for help with MLST. We are grateful to R. Helmuth for his advice and critical reading of the manuscript.
This study was supported by the Health Protection Agency, the Federal Institute for Risk Assessment (BfR-46-001; 45-005), and the "Fondo de Investigación Sanitaria" of the "Instituto de Salud Carlos III" of Spain (project FIS PI11/00808, cofunded by the European Regional Development Fund of the European Union: a Way of Making Europe). I.R. received a postdoctoral grant from Fundación Ramón Areces, Madrid, Spain.
For strain requests, contact the Health Protection Agency Colindale, email: katie.hopkins\@hpa.org.uk.
Dr Rodríguez is a postdoctoral fellow at the Federal Institute for Risk Assessment in Berlin, Germany, in the Unit of Antimicrobial Resistance and Resistance Determinants of the Department of Biological Safety. Her research focuses on the genotypic characterization of antimicrobial drug resistance and the molecular epidemiology of gram-negative drug-resistant bacteria.
|
Q:
How to dynamically set padding and have it show without refreshing?
I'm trying to make a design with a background at 100% height and then a padded area below it (outside view) with some other content on the same background.
Having the padded area fixed in height is easy enough, but I'm using Bootstrap's col-sm-4 divs with text in them, so as you resize the window, their width is decreased and height increased (because of the text having to fit), and then after a point collapsing into a stack of three divs.
Here's the jsfiddle, and the code:
HTML:
<div class="background">
<div class="bottom-div">
<div class="col-sm-4"> ... Some filler text ...</div>
<div class="col-sm-4"> ... Some filler text ...</div>
<div class="col-sm-4"> ... Some filler text ...</div>
</div>
</div>
CSS:
.background {
box-sizing: content-box;
background: url('http://www.mixflavour.com/wp-content/uploads/2014/11/Nature-Wallpaper-03.jpg');
position: relative;
height: 100%;
}
body, html {
height: 100%;
}
.bottom-div {
position: absolute;
bottom: 0;
background:rgba(0,0,0,0.5);
width: 100%;
}
I want to set the padding-bottom of the background div to the same as the size of the bottom-div.
Instead of manipulating the padding via css, I decided to try using jQuery to set the padding dynamically. It works well, except for one thing: it only works after refreshing the page after each resize!
jQuery code:
$(".background").css("padding-bottom", $(".bottom-div").height());
You can try this by squeezing the window together until the padded area is thrown into view erroneously, then refreshing again to see it go back where it should be.
Why does it behave this way and is there a fix, using jQuery or not?
Edit: Updated the fiddle because I forgot closing one of the divs.
A:
$(window).resize(function(){
$(".background").css("padding-bottom", $(".bottom-div").height());
});
You need to trigger the function everytime the window size changes.
|
[Influence of the Benzodiazepine-derivative Ro 06-9098/000 on choreo-athetotic syndromes (author's transl)].
Five patients suffering from choreo-athetotic syndromes of different genesis were treated with the benzodiazepine-derivative Ro 06-9098/000 (7-Nitro-1(methylmethoxy)-1,3-dihydro-5-phenyl-2 H-1,4-benzodiazepin-2-one). The existing hyperkinesias could be well influenced in four cases of male patients, sufficiently in one case of a female patient. The sedative effect, accompanied by a muscle hypotonia appearing simultaneously under the medication, did not represent and essential limiting factors at the chosen dose of 5--20 mg/die. The observed successes in therapy point at the result and effect of benzodiazepine derivatives on extra-pyramidalmotoric hyperkinesias which got little attention until now. |
In the wake of the Grenfell Tower tragedy earlier this week, Prime Minister Theresa May has pledged a £5 million fund to help the victims.
Hundreds of Grenfell residents were forced to flee their homes leaving everything behind when a fire ripped through their building in the early hours of the morning.
Police have confirmed that 58 people are presumed dead in the disaster. That number is likely to rise.
The fund from the government is intended to help survivors purchase the daily essentials - with Theresa May telling Emily Matlis on the BBC that it was for people...
Just to buy the normal things of every day life.
Many Twitter users have decided to compare the £5 million Grenfell fund with the £369-million expected to be spent on a refurbishment of Buckingham Palace, over a 10-year period.
Back in November, it was confirmed that the Palace would be given the expensive facelift, which would come from a 66% increase in the Sovereign Grant - the funding for the monarchy and their official duties.
Members of the public were not impressed with the news and set up a petition at the time stating that the Royal Family should foot the bill themselves.
The Queen and Prince William visited victims of the fire on Friday, fuelling further criticism of PM Theresa May's response to the disaster.
It is true that the amounts of money differ hugely, but it must be pointed out that both are intended for hugely different purposes over different time frames. |
This invention relates to articles having integral chemically-formed surface coatings that provide an improved combination of adherence and corrosion resistant properties to such products and to a process for making same. More particularly, the articles of this invention have on their surfaces an integral, chemically-formed coating that is strongly adherent and resistant to chipping or flaking at elevated temperatures and provides to the product a unique combination of corrosion properties including commercially satisfactory resistance to oxidation during use in gases at elevated temperatures such as encountered in the engine compartments of vehicle engines, resistance to corrosion from humidity, from organic solvents such as ethylene glycol, oils and gasoline, from acidic or alkaline solutions such as salt spray to the extent that is required of a base for paint or other protective organic or water-based protective coating on parts used within the engine compartments of vehicles.
Chemical coatings on aluminum for various purposes including oxides, chromate-phosphates, chromates, and phosphates have long been known and have been commercially employed since the 1930's when the original Bauer-Vogel process of German patent 423,758 for chemically forming oxide coatings on aluminum was improved in 1937 by reducing the time required from hours to minutes but still produced only gray coatings at near boiling temperatures, see Aluminum, 1937, 19, 608-11 (hereby expressly incorporated by reference). Colorless oxide coatings suitable for a wider range of aluminum alloys were later developed but were less desirable as a base for paint than the Bauer-Vogel products and could not be successfully dyed, see Aluminum, 1938, 20, 536-8 (hereby expressly incorporated by reference). Chromate-phosphates were developed in the 1940's as paint base coatings and disclosed in U.S. Pat. No. 2,438,877 and later modified as disclosed in British Patent 1,114,645 and French Patent 1,477,179 (all of which are hereby expressly incorporated by reference). Chromate processes developed during the 1960's and 1970's have been asserted to provide improved paint bases relative to the chromate-phosphate coatings and are disclosed in a number of United States patents, including U.S. Pat. Nos., 3,009,482, 3,391,031, 3,404,043, 3,410,707, 3,447,972, 3,446,717, 3,982,951, 4,036,667, 4,146,410 and British Patent 1,409,413, all of which are hereby expressly incorporated by reference. A number of additional patents discuss various types of chemical coatings, protective layers or processes, and include U.S. Pat. Nos. Re. 28,015, Re. 29,827, 1,811,298, 1,840,562, 1,946,151, 1,995,225, 2,035,380, 2,059,801, 2,060,192, 2,106,227, 2,106,904, 2,134,830, 2,440,969, 2,680,081, 2,694,020, 2,825,697, 3,175,931, 3,214,287, 3,400,021, 3,950,575, 3,967,984, 3,982,951, 4,070,193, 4,141,758, 4,200,475, 4,341,878, 4,569,699, and 4,657,599, all of which are hereby expressly incorporated by reference.
Even though extensive development of chemical coatings for aluminum and its alloys has resulted from worldwide research efforts each heretofore known process and product present some problem or lack a particular set of properties needed for use in specific applications. Thus, there is a continuing need for other efficient, low cost processes for providing corrosion resistant coatings on aluminum and its alloys to satisfy specific commercial needs. For example, there are needs for uses other than bases for paints or other organic finishes, other needs for coating aluminum alloy substrates which contain alloy constituents known to hinder coating formation on alloys such as magnesium, silicon, copper, chromium and manganese. There remains a need for coating aluminum alloy sand castings which contain silicon, copper and magnesium and may contain other heavy metals such as nickel, chromium, titanium or silver to provide coatings that resist thermal and gaseous engine fume degradation and development of localized white corrosion products during long periods of use such as in commercial truck and automobile engine compartments. There also remains a need for improved coatings for zinc-based, cadmium-based, and magnesium-based materials.
The present invention provides articles that are coated with a new integral coating that results in good corrosion resistance and resistance to dislodgment during use in environments, such as vehicle environments. This invention also provides an economic, continuous process for producing the new coated articles of this invention, as will be described hereinafter. |
Wenger's current contract with Arsenal — where he has been for twenty years — is up next season. Even though the club has drawn up a two-year extension, Wenger is apparently waiting to see how things go next year before deciding his future.
So far he has not ruled out managing England.
Accepting the job would mean a significant pay cut for the Frenchman, who makes £8 million ($10.3 million) a year at Arsenal. Hodgson was famously the most well-paid coach at Euro 2016, on £3.5 million a year.
England crashed out of the Euros in humiliating fashion, losing 2-1 to Iceland in a match that some called its worst defeat ever. Hodgson immediately resigned, leaving the FA to begin yet another hunt for a manager.
England has had nine managers in the last 20 years, with the team progressing no further than the quarter-finals in either the Euro or World Cup tournaments in the same period.
"What I love about Arsene is he loves being on the field on a daily basis and if you're a coach of a national team you're not out there on a daily basis. That's why I don't see that happening, but who knows? Arsene loves Arsenal and he's been there for a very long time. We don't see him leaving the club and we know the England role can be seen as the impossible job."
Bookmakers do not seem convinced by Wenger's potential appointment either, with most placing him just seventh in the odds. Sunderland manager Sam Allardyce is the current favourite, with odds of 3/1 from William Hill, while ex-Tottenham legend and current United States manager Jurgen Klinsmann second, with odds of 11/2. |
Sabres, fans happy to have hockey back
'While Golisano provided stability for the Sabres, the new labour agreement is expected to benefit the team further by creating a competitive balance with the introduction of a salary cap of about $40 million. The league also got its wish for cost certainty by reaching an agreement that player salaries will not exceed 54 per cent of league-wide revenues.' |
The present disclosure relates to a transmission control device, a reception control device, and a content transceiving system that are preferably used when transmitting and receiving content including, for example, images, music, or the like.
In the related art, in an electronic apparatus for processing image data, such as a digital still camera or a digital video camera, an operability of a user has been improved using various GUIs (Graphical User Interface). In the electronic apparatus where the GUI is adopted, the user can perform operations using a graphical element such as an icon or a window that is displayed on a screen. Accordingly, by using a GUI, a user who is not familiar with the electronic apparatus can appropriately perform a desired operation. In addition, there is a content transceiving system which transmits and receives content between a plurality of electronic apparatuses.
A technology of improving a usability of the electronic apparatus is disclosed in Japanese Unexamined Patent Application Publication No. 2010-140391. In the technology, it is possible to detect that a specific operation, such as laying down, tilting, moving, or hitting the device itself, has been made, through a motion sensor. In addition, a process is performed, in which one or more items of image data that are specified in advance, are stored in a folder, reproduced, and transmitted to another apparatus. |
Inhibitory synaptogenesis in mouse somatosensory cortex.
It is widely believed that inhibitory synapses are not present or present in only small numbers in the rodent cerebral cortex during the early postnatal period when the cortex is being innervated by thalamocortical fibers. Quantitative electron microscopy was carried out on the posteromedial barrel subfield of mouse somatosensory cortex from postnatal day 4 (P4) when thalamocortical innervation of the barrels is becoming established, through to sexual maturity (>P32), and in adulthood. Both asymmetrical (putatively excitatory) and symmetrical (putatively inhibitory) synapses were present in all layers from P4. The symmetrical synapses were immunoreactive for GABA at all ages. There was a progressive increase in both asymmetrical and symmetrical synapses up to P32, density in all layers increasing 16-fold, with the production of asymmetrical synapses leading and greatly outstripping that of symmetrical. From P32 to P120, the oldest age studied, synaptic numbers declined by 18% to 13 times the P4 level, but this affected predominantly layers II/III, IV and V, and mainly involved asymmetrical synapses. The relative percentage of asymmetrical to symmetrical synapses from P4 to P8 was 57%/43% but at P32 it was 89.5%/10.5% and in adulthood 85.4%/14.6%. These data indicate that inhibitory synaptogenesis in the rodent cortex begins earlier than previously thought, a basis for inhibition being present from the earliest period. Pruning of all synapses occurs well after thalamocortical innervation is established and inhibitory synapses are less affected by the pruning process. |
Q:
file_put_contents(): Filename cannot be empty
I'm trying to add a cache mechanism to my Disqus API function:
<?php
ini_set('display_errors', 'on');
$key="MY_PUBLIC_KEY";
$forum="MY_FORUM";
$limit = '5';
$endpoint = 'http://disqus.com/api/3.0/posts/list.json?api_key='.urlencode($key).'&forum='.$forum.'&limit='.$limit.'&related=thread';
$cache_disqus = '/cache_path/file.json';
$j=0;
listposts($endpoint,$j);
function listposts($endpoint,$j) {
// Standard CURL
$session = curl_init($endpoint);
curl_setopt($session, CURLOPT_RETURNTRANSFER, 1);
$data = curl_exec($session);
curl_close($session);
if(file_exists($cache_disqus) && filemtime($cache_disqus) > time() - 1000){
// If a cache file newer than 1000 seconds exists, use it
$results = json_decode($cache_disqus);
} else {
$results = json_decode($data);
file_put_contents($cache_disqus,json_encode($data));
}
}
?>
Of course /cache_path/ has permissions properly set.
I get Warning: file_put_contents(): Filename cannot be empty in MY_SCRIPT_FILENAME.php.
A:
$cache_disqus is defined outside your function, and is therefore not accessible within the function.
Check out the PHP documentation on variable scope.
|
Q:
front-end for GAE datastore - phpMyAdmin-like for GAE
is there some front end that could allow an admin to insert, update, delete records, and create modify and drop tables from Google Application Engine datastore, just like you do with phpMyAdmin on mysql???
A:
Google App Engine provides out of the box an administration console to manage your records.
As a valid alternative, have a look to the App Engine admin project.
Implemented features
List records for each registered model
Create new records
Update/edit records
Delete records
Paging of items in Appengine Admin list view
Here the complete list of implemented features.
|
NWP-PC07 MONTANA JACKS Plow Lift Cable
MONTANA JACKS Plow Lift Cable
Save Money with this Plow Lift Cable!
BUY at least 2 and keep a SPARE!
Lifting an ATV plow with your winch can destroy a winch cable in a hurry. Now you can install this short cable just for lifting the plow and save your other cable for self-recovery. This cable is to be installed on the winch drum in place of the more expensive 50-foot winch cable. |
A Vision of the future: our 60:60 Vision campaign
A Vision of the future: our 60:60 Vision campaign
Catrin Edwards
Living label free, eye transplants, face recognition software in our homes…. These are just a few of the things Deafblind Cymru’s Neath social group told me they would like to see made possible in 60 years’ time to improve the lives of deafblind people.
Have you ever wondered what the world might be like in 60 years’ time?
This year, Sense is turning 60. As part of our 60th anniversary year, we’re not only looking back to celebrate how far we’ve come but we’re looking forward another 60 years to think about how much better our world could be for deafblind people. Sense is asking deafblind people, their families and supporters: What is your 60:60 Vision?
I want to make sure we hear Welsh voices in these visions so this year I’ll be reaching out to deafblind people in Wales and Sense Cymru activists to help you develop your visions of the future.
We hope that the 60:60 Visions we develop are collaborative, include voices from home and internationally, and work together to find shared solutions.
What difference can it make anyway?
Not only will your vision help to form the basis of Sense’s campaigns for the coming year, we’ll also use your vision to engage decision makers in a positive and constructive way. We want to challenge decision makers, including those in Cardiff Bay, to build policies and find solutions now that take us closer to the enabling future we want.
In Wales, we know that this kind of visioning exercise can have a real impact on government. Earlier this month the Well-being of Future Generations Act was passed by the Welsh Assembly. To inform the 7 sustainable development goals that underpin this Act, the Sustainable Futures Commissioner, Peter Davies, held a National Conversation with the people of Wales about “the Wales we want” for the year 2050. We came out strongly in support of building “a more equal Wales” and from 2016 onwards the Welsh Government and public bodies in Wales will have a legal duty to work towards this goal.
But it’s not all about laws and policies
This is also a chance for you to come together, to get involved and to get creative. Share your 60:60 Vision with a friend. Collaborate – with Mrs Jones down the road in Neath or with a stranger on the other side of the world. Sometimes getting a fresh perspective on an issue helps us to come up with ideas we’d never have thought possible. |
The jobs purge will generate savings of £1.7billion at a time when the scandal-hit banking giant revealed it still plans to pay out £1.85bn in bonuses.
Barclays employ more than 1500 workers in Bothwell Street in Glasgow's International Fin- ancial Services District and is recruiting another 600 with the aid of grants from the Scottish Government to support Barclays Capital and Barclays Wealth, which operate within its investments division.
But there were fears that the city workforce was to be targeted when Barclays today announ- ced that the 3700 job losses were to include 1800 staff in corporate and investment banking.
However, a senior bank source today moved quickly to reassure workers in the city by commenting: "Barclays remain committed to Glasgow. This is not a UK jobs cut story."
The source said hundreds of jobs would be cut in Asia while another 1900 would be shed in the bank's high street branches and business arm in Spain, Italy, Portugal and France.
Workers are to be made redundant after Barclays revealed that nearly £2.5bn of cash was being set aside to cover mis-selling compensation while pre-tax profits had risen 26% to £7.05bn.
Bottom-line profits were heavily hit by mis-selling provisions, with £1.6bn put by to cover claims relating to payment protection insurance and £850million for interest rate swaps sold to small firms. Despite the plunge, the bank is paying out bonuses worth almost £2bn. The bonus pot means each employee gets £13,300 on average, with investment banking staff each being paid around £54,100.
Chief executive Anthony Jenkins, who was appointed in August after Bob Diamond quit in the wake of the bank's £290m Libor rigging settlement, insisted bonuses had been reduced after last year's string of reputational blows.
Union leaders today complained that Mr Jenkins was earning 80 times more than his lowest-paid worker.
Unite national officer Dominic Hook said: "We need to see more progress to address the gap between the highest-paid and the lowest-paid staff.
"It's shocking that the starting salary at Barclays is just £13,500 a year, making some workers at the bank eligible to claim tax credits.
"Unite expects the bank to reward its staff fairly for their contribution to its success."
Commenting & Moderation
We moderate all comments on Evening Times on either a pre-moderated or post-moderated basis. If you're a relatively new user then your comments will be reviewed before publication and if we know you well and trust you then your comments will be subject to moderation only if other users or the moderators believe you've broken the rules |
NFL Owner Bud Adams Dies
Share this:
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated.
NFL Owner Bud Adams Dies
(CNN) — K.S. “Bud” Adams Jr., the founder and owner of the Tennessee Titans/Houston Oilers football franchise and a co-founder of the American Football League, died Monday morning at his home in Houston, the team said.
He was 90.
Adams owned the team for more than 53 years, starting in Houston, where his Oilers began play in 1960 as a charter member of the NFL’s new competitor, the AFL.
Adams, an oil company founder, teamed with other businessmen, including eventual Dallas Texans and Kansas City Chiefs owner Lamar Hunt, to form the eight-team AFL in 1959. The Oilers won two AFL championships before the league merged with the NFL in 1970.
The Oilers franchise moved to Tennessee in 1997, eventually settling in Nashville as the Tennessee Titans.
His franchise reached the Super Bowl once during his stewardship: in January 2000, when the Titans lost 23-16 to the St. Louis Rams.
Adams’ death came three days after “Bum” Phillips, the man Adams employed as Oilers coach and general manager from 1975 to 1980, died at age 90.
St. Louis Rams head coach Jeff Fisher, who was the Oilers’ and Titans’ coach from 1994 to 2010, said Monday that he was “extremely saddened” to hear of Adams’ death.
“My respect for Mr. Adams goes well beyond the owner/coach relationship that we shared for many years. He was a pioneer in the football business. He played a key role in creating and sustaining the American Football League, which helped push the popularity of our game to where it is today,” Fisher said in a statement released by the Rams. |
Seeing Orange
Featured on
July 25, 2011
The Moon will swing past two bright orange dots of light in the dawn sky this week: the star Aldebaran and the planet Mars. This view is about 45 minutes before sunrise. See more details in the StarDate media center. [Tim Jones] |
/* +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Copyright (c) 2012-2020 The plumed team
(see the PEOPLE file at the root of the distribution for a list of names)
See http://www.plumed.org for more information.
This file is part of plumed, version 2.
plumed is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
plumed is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with plumed. If not, see <http://www.gnu.org/licenses/>.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ */
#include "PathMSDBase.h"
#include "core/PlumedMain.h"
using namespace std;
namespace PLMD {
namespace colvar {
//+PLUMEDOC COLVAR PROPERTYMAP
/*
Calculate generic property maps.
This Colvar calculates the property maps according to the work of Spiwok \cite Spiwok:2011ce.
Basically it calculates
\f{eqnarray*}{
X=\frac{\sum_i X_i*\exp(-\lambda D_i(x))}{\sum_i \exp(-\lambda D_i(x))} \\
Y=\frac{\sum_i Y_i*\exp(-\lambda D_i(x))}{\sum_i \exp(-\lambda D_i(x))} \\
\cdots\\
zzz=-\frac{1}{\lambda}\log(\sum_i \exp(-\lambda D_i(x)))
\f}
where the parameters \f$X_i\f$ and \f$Y_i\f$ are provided in the input pdb (allv.pdb in this case) and
\f$D_i(x)\f$ is the mean squared displacement after optimal alignment calculated on the pdb frames you input (see Kearsley).
When running with periodic boundary conditions, the atoms should be
in the proper periodic image. This is done automatically since PLUMED 2.5,
by considering the ordered list of atoms and rebuilding molecules using a procedure
that is equivalent to that done in \ref WHOLEMOLECULES . Notice that
rebuilding is local to this action. This is different from \ref WHOLEMOLECULES
which actually modifies the coordinates stored in PLUMED.
In case you want to recover the old behavior you should use the NOPBC flag.
In that case you need to take care that atoms are in the correct
periodic image.
\par Examples
\plumedfile
p3: PROPERTYMAP REFERENCE=allv.pdb PROPERTY=X,Y LAMBDA=69087 NEIGH_SIZE=8 NEIGH_STRIDE=4
PRINT ARG=p3.X,p3.Y,p3.zzz STRIDE=1 FILE=colvar FMT=%8.4f
\endplumedfile
note that NEIGH_STRIDE=4 NEIGH_SIZE=8 control the neighbor list parameter (optional but
recommended for performance) and states that the neighbor list will be calculated every 4
steps and consider only the closest 8 member to the actual md snapshots.
In this case the input line instructs plumed to look for two properties X and Y with attached values in the REMARK
line of the reference pdb (Note: No spaces from X and = and 1 !!!!).
e.g.
\auxfile{allv.pdb}
REMARK X=1 Y=2
ATOM 1 CL ALA 1 -3.171 0.295 2.045 1.00 1.00
ATOM 5 CLP ALA 1 -1.819 -0.143 1.679 1.00 1.00
END
REMARK X=2 Y=3
ATOM 1 CL ALA 1 -3.175 0.365 2.024 1.00 1.00
ATOM 5 CLP ALA 1 -1.814 -0.106 1.685 1.00 1.00
END
\endauxfile
\note
The implementation of this collective variable and of \ref PATHMSD
is shared, as well as most input options.
*/
//+ENDPLUMEDOC
class PropertyMap : public PathMSDBase {
public:
explicit PropertyMap(const ActionOptions&);
static void registerKeywords(Keywords& keys);
};
PLUMED_REGISTER_ACTION(PropertyMap,"PROPERTYMAP")
void PropertyMap::registerKeywords(Keywords& keys) {
PathMSDBase::registerKeywords(keys);
keys.add("compulsory","PROPERTY","the property to be used in the indexing: this goes in the REMARK field of the reference");
ActionWithValue::useCustomisableComponents(keys);
keys.addOutputComponent("zzz","default","the minimum distance from the reference points");
}
PropertyMap::PropertyMap(const ActionOptions&ao):
Action(ao),
PathMSDBase(ao)
{
// this is the only additional keyword needed
parseVector("PROPERTY",labels);
checkRead();
log<<" Bibliography "
<<plumed.cite("Spiwok V, Kralova B J. Chem. Phys. 135, 224504 (2011)")
<<"\n";
if(labels.size()==0) {
char buf[500];
sprintf(buf,"Need to specify PROPERTY with this action\n");
plumed_merror(buf);
} else {
for(unsigned i=0; i<labels.size(); i++) {
log<<" found custom propety to be found in the REMARK line: "<<labels[i].c_str()<<"\n";
addComponentWithDerivatives(labels[i]); componentIsNotPeriodic(labels[i]);
}
// add distance anyhow
addComponentWithDerivatives("zzz"); componentIsNotPeriodic("zzz");
//reparse the REMARK field and pick the index
for(unsigned i=0; i<pdbv.size(); i++) {
// now look for X=1.34555 Y=5.6677
vector<double> labelvals;
for(unsigned j=0; j<labels.size(); j++) {
double val;
if( pdbv[i].getArgumentValue(labels[j],val) ) {labelvals.push_back(val);}
else {
char buf[500];
sprintf(buf,"PROPERTY LABEL \" %s \" NOT FOUND IN REMARK FOR FRAME %u \n",labels[j].c_str(),i);
plumed_merror(buf);
};
}
indexvec.push_back(labelvals);
}
}
requestAtoms(pdbv[0].getAtomNumbers());
}
}
}
|
Distinct regulation of nNOS and iNOS by CB2 receptor in remote delayed neurodegeneration.
Hemicerebellectomy results in remote delayed degeneration of precerebellar neurons. We have reported that such a lesion induces type 2 cannabinoid receptor (CB(2)) expression in precerebellar neurons and that stimulation of CB(2), but not CB(1), has neuroprotective effects. In this study, we found that in the same model, the CB(2) agonist JWH-015 enhances neuronal nitric oxide synthase (nNOS) expression in axotomized neurons and that CB(2)-mediated neuroprotection is abrogated by pharmacological inhibition of nNOS. JWH-015 prevented the axotomy-induced upregulation of inducible NOS (iNOS) in astrocytes but had no effect on endothelial NOS (eNOS). In addition, we observed that JWH-015 significantly reduces hemicerebellectomy-induced neuroinflammatory responses and oxidative/nitrative stress. With regard to the signaling pathways of CB(2)/nNOS-mediated neuroprotection, we noted nNOS-dependent modulation of the expression of anti-oxidative (Hsp70) and anti-apoptotic (Bcl-2) proteins. These findings shed light on the interactions between the endocannabinoid and nitrergic systems after focal brain injury, implicating distinct functions of nNOS activation and iNOS inhibition in CB(2) signaling, which protect neurons from axotomy-induced cell death. |
Introduction
============
Ovarian cancer is the most lethal gynecological cancer and the fifth leading cause of cancer death among women in the USA.[@b1-dddt-12-605] No effective screening tests are available and more than 70% of patients are diagnosed at advanced stage.[@b2-dddt-12-605] Epithelial ovarian cancer (EOC) accounts for \>90% of all subtypes of ovarian cancer and the most common histological subtype is high-grade serous, representing \~70% of all epithelial ovarian malignancies.[@b3-dddt-12-605] Similar to the majority of cancers, EOC is characterized by the presence of acquired or inherited mutations in different DNA repair pathways.[@b4-dddt-12-605] DNA double strand breaks (DSBs) can be repaired by nonhomologous end-joining (NHEJ) pathway without the need to copy an intact DNA template that is prone to errors,[@b5-dddt-12-605] or by homologous recombination repair system that is an error-free pathway requiring an homologous DNA template to function.[@b6-dddt-12-605] DNA single strands breaks (SSBs) are corrected by base excision repair, nucleotide excision repair or mismatch repair systems, using the other DNA strand as guide.[@b7-dddt-12-605] The repair of DNA damage is necessary to maintain genomic stability, promote cell survival and replication which is regulated by different enzymes. BRCA1, BRCA2 and other homologous recombination proteins are recruited to repair DNA DSBs.[@b8-dddt-12-605],[@b9-dddt-12-605] Tumors with *BRCA1/2* mutations or other defects in homologous recombination repair system genes (eg, *EMSY*, *RAD51*, *ATM*, *ATR*, Fanconi Anemia, *BARD1*, *BRIP1*, *PALB2*) rely on alternative mechanisms to repair DNA damage, like the "error prone" NHEJ recombination. Poly (ADP-ribose) polymerase (PARP) enzymes, particularly PARP-1 and -2, play a critical role in the repair of DNA SSBs through the base excision repair and other SSB pathways.[@b10-dddt-12-605] Inhibition of PARP leads to accumulation of SSBs causing collapse of replication forks and accumulation of DSBs that are commonly repaired by homologous recombination enzymes.[@b11-dddt-12-605] Tumors with *BRCA1/2* mutations or other defects in the homologous recombination repair system are particularly sensitive to PARP inhibitors due to accumulation of SSBs leading to DSBs that cannot be repaired due to homologous recombination deficiency (HRD), and ultimately result in cell death.[@b12-dddt-12-605] This has also been reported as "synthetic lethality" to describe the phenomenon of cell death due to mutation or lack of function of two or more genes, whereas the defect in only one gene does not alter cell survival.[@b12-dddt-12-605] PARP inhibitors also elicit their activity through other different mechanisms such as interfering with NHEJ DNA repair pathway, which is upregulated when homologous recombination pathways are deficient[@b13-dddt-12-605] or causing trapping of PARP-1 and -2 at the level of the DNA break, resulting in obstruction of the replication fork that requires an intact homologous recombination pathway to repair the damage.[@b14-dddt-12-605]
Fifty percent of all high-grade serous ovarian carcinomas (HGSOCs) present HRD with 22% harboring germinal or somatic mutation in *BRCA1* or *BRCA2* (due to genomic or epigenetic events, eg, promoter methylation or activation of inhibitors).[@b15-dddt-12-605],[@b16-dddt-12-605] Germline or somatic mutations in homologous recombination genes are usually associated with increased response to platinum-based chemotherapy, longer disease-free interval and better prognosis;[@b16-dddt-12-605] however, some HGSOCs show similar clinical behavior without identifiable mutations in *BRCA1/2* or other homologous recombination genes.[@b17-dddt-12-605]--[@b19-dddt-12-605]
Several PARP inhibitors (olaparib, niraparib and rucaparib) have been investigated and are now available for the treatment or maintenance therapy of patients with HGSOC.[@b20-dddt-12-605]--[@b26-dddt-12-605] PARP inhibitors have also showed promising results in other solid tumors harboring *BRCA1/2* mutations, such as HER-2 negative breast cancer and metastatic pancreatic and castration-resistant prostate cancers.[@b20-dddt-12-605],[@b27-dddt-12-605],[@b28-dddt-12-605]
The present review will focus on the role of the PARP inhibitor rucaparib in ovarian malignancies. In December 2016, the US Food and Drug Administration (FDA) granted accelerated approval of rucaparib for the treatment of patients with HGSOC carrying deleterious germline (g*BRCA*) or somatic *BRCA* (s*BRCA*) mutation previously treated with two or more lines of chemotherapy.
Clinical trials of rucaparib in ovarian cancer
==============================================
Rucaparib (CO-338, formerly known as AG-014669 and PF-01367338) is a potent small-molecule inhibitor of PARP-1, PARP-2 and PARP-3 that has shown preclinical and clinical activity in ovarian carcinoma as well as other types of solid tumors; it has been extensively investigated in solid tumors harboring *BRCA1/2* mutations or HRD. Two formulations of rucaparib have been initially developed: the phosphate salt (intravenous \[iv\] formulation) and the camphorsulfonic acid salt (oral formulation in the form of tablets), known as rucaparib cammsylate. Different studies[@b24-dddt-12-605],[@b33-dddt-12-605],[@b34-dddt-12-605],[@b36-dddt-12-605],[@b42-dddt-12-605],[@b46-dddt-12-605] have been designed to explore the activity and safety of rucaparib in ovarian cancer, some of which are still active and enrolling patients ([Figure 1](#f1-dddt-12-605){ref-type="fig"}, [Table 1](#t1-dddt-12-605){ref-type="table"}).
Preclinical studies
-------------------
Rucaparib has shown activity in *BRCA*-mutant ovarian and breast cancer cell lines, xenografts and also in cell lines with other homologous recombination genes knocked-down (eg, *RAD51*, *FANCM*, *PALB2*, *ATR* and *BARD1*), confirming the hypothesis of synthetic lethality.[@b29-dddt-12-605] As observed with other PARP inhibitors, another mechanism of action of rucaparib is related to PARP-1 and -2 trapping, which has been confirmed in preclinical models.[@b14-dddt-12-605] In an animal model, dose-related bone marrow and gastrointestinal (diarrhea, vomiting, appetite reduction and weight loss) toxicities have been observed and were self-limiting.[@b30-dddt-12-605] No cardiac or neurological toxicities occurred.[@b30-dddt-12-605]
Preliminary antiproliferative activity of rucaparib has been demonstrated in breast and pancreatic cancer cell lines carrying mutated or epigenetically silenced *BRCA1/2* or other HRD genes. Rucaparib was also able to reduce the growth of xenograft tumors with mutated or silenced *BRCA1/2*.[@b29-dddt-12-605] Subsequently, the activity of rucaparib was investigated in 39 ovarian cancer cell lines characterized by *BRCA1/2* mutation, *BRCA1/2* promoter methylation or other DNA repair gene mutations, to define predictors of response.[@b31-dddt-12-605] This study demonstrated in vitro activity of rucaparib in cancer cells carrying HRD beyond *BRCA1/2* mutations, supporting the role of further evaluation in sporadic ovarian cancer.[@b31-dddt-12-605] In addition, rucaparib showed in vitro synergistic activity with chemotherapy agents, such as topotecan, carboplatin, doxorubicin, paclitaxel and gemcitabine.[@b31-dddt-12-605] Chemotherapy agents, like platinum, induce DNA damages that cannot be repaired when PARP is inactivated, resulting in increasing cytotoxicity.[@b32-dddt-12-605]
Phase 1
-------
### Oral and IV rucaparib in combination with chemoteharpy
To investigate the synergistic role between DNA damaging agents and PARP inhibitors, a Phase I study (NCT01009190) has been designed to investigate incremental doses of iv/oral rucaparib in combination with different chemotherapy regimens (carboplatin, paclitaxel + carboplatin, pemetrexed + cisplatin, epirubicin + cyclophosphamide) in patients with solid tumors irrespective of *BRCA* status.[@b33-dddt-12-605] A total of 85 patients have been enrolled: 25.9% (22/85) with diagnosis of breast cancer, 17.6% (15/85) ovarian/primary peritoneal cancer, 9.4% (8/85) lung cancer, 4.7% (4/85) pancreatic or rectal cancer, 36.5% (31/85) other primary cancers and 1.2% (1/85) unknown primary cancer. The recommended Phase II dose (RP2D) for the combination of carboplatin and oral rucaparib was area under the curve (AUC)5 every 3 weeks and 240 mg once a day, respectively.[@b33-dddt-12-605] Combining chemotherapy with a PARP inhibitor resulted in expected increased toxicity, especially hematological. Across all cohorts, grade (G) ≥3 adverse events (AEs) have been observed in 75% patients (64/85), and the more frequent were neutropenia (27.1%), thrombocytopenia (18.8%), fatigue (12.9%), anemia (11.8%) and nausea (7.1%).[@b33-dddt-12-605] Seventy-seven patients were evaluable for response: one patient (1.2%) had complete response (CR), nine (10.6%) partial response (PR) and 43 (50.6%) stable disease (SD). Pharmacokinetic analysis showed proportional kinetics, half-life of \~12 hours and good bioavailability (36%) of rucaparib, not influenced by administration of iv chemotherapy.[@b33-dddt-12-605]
Phase I/II
----------
### Intermittent versus continuous schedule
A multicenter, two-stage Phase I/II study (NCT00664781) was designed to investigate intermittent versus continuous schedule of single agent iv rucaparib administered for 5 days every 21 days in patients with locally advanced/metastatic breast or ovarian cancer and g*BRCA* mutations.[@b34-dddt-12-605] Given the lack of data on rucaparib for the treatment of g*BRCA* breast and ovarian carcinoma, a dose-escalation phase was incorporated in the trial. Fourteen patients have been enrolled in the dose-escalation phase (stage 1) receiving 4--18 mg/m^2^ of iv rucaparib, and 18 mg/m^2^ was established as RP2D. In stage 2, patients received iv rucaparib at RP2D as established in stage 1 and were stratified in four groups according to the type of *BRCA* mutations (*BRCA 1* or *2*) and the tumor type (breast or ovary). After preliminary analysis of the first 28 patients, the continuous schedule was found to be associated with improved activity. After oral rucaparib became available, the study was amended, and the new patients enrolled received escalating doses of oral rucaparib (from 92 mg once a day \[od\] to 600 mg twice a day \[bid\]) at increased duration (7, 14 or 21 days) according to six different dose levels. A subsequent amendment allowed the enrollment of patients with unknown *gBRCA* status. In total, 78 patients were enrolled (47 receiving iv rucaparib and 31 oral) with the majority harboring *gBRCA1/2* mutation (n=74/78). Twenty-seven patients had breast cancer and 51 ovarian cancer. A total of 73 patients were evaluable for response. The intermittent iv dosing of rucaparib showed minimal activity with objective response rate (ORR) of only 2% and SD ≥12 weeks of 41%. ORR for all six dose levels of oral rucaparib was observed in 12% of patients and SD ≥12 weeks in 63% with increased benefit observed in patients receiving a continuous dose of rucaparib, with diagnosis of ovarian cancer and with the longest platinum-free interval (PFI, time between the last dose of platinum-based chemotherapy and documented disease progression).[@b34-dddt-12-605] Overall, the ORR observed was lower than expected, likely due to reduced activity of rucaparib if administered intermittently, the low dose used in the dose-escalation part (600 mg bid dose was administered only in one patient) and the inclusion of patients with platinum resistant (PFI \<6 months) ovarian cancer, who are less likely to respond to PARP inhibitors.[@b35-dddt-12-605] The maximum administered dose of rucaparib was 600 mg bid for 21 days continuously; this dose was assessed only on one patient and RP2D was not defined.[@b34-dddt-12-605]
### Study 10
Study 10 (NCT01482715) is a three-part Phase I/II study of oral rucaparib designed to define RP2D of rucaparib and preliminary efficacy. Part 1 investigated escalating doses of continuous oral rucaparib (40 to 500 mg od and 240 to 840 mg bid) in patients with advanced solid tumors.[@b36-dddt-12-605] A total of 56 patients were enrolled (64.3% g*BRCA*), 48.2% with breast cancer and 35.7% with ovarian cancer. The treatment was safe and tolerable with the most common (≥20% of patients) AEs being fatigue, nausea, vomiting, diarrhea, anemia, thrombocytopenia, neutropenia, decreased appetite, elevation of aspartate transaminase (AST) and/or alanine transaminase (ALT). The maximum tolerated dose was not reached and 600 mg bid was established as RP2D based on the safety and pharmacokinetic assessment. This study also confirmed that rucaparib can be taken with or without food. The RP2D was then assessed in an expanded cohort (Part 2A) of 42 patients with diagnosis of platinum-sensitive (PFI ≥6 months) high-grade (serous and endometrioid) ovarian cancer (HGOC) carrying *gBRCA* mutation who progressed after two to four previous lines of treatment regimens. Objective responses were observed in 59.5% of patients with a median duration of response of 7.8 months. G3 or 4 AEs occurred in 76.2% of patients (32/42) with the most common being fatigue, nausea, anemia and ALT/AST elevation. Four (9.5%) patients discontinued treatment due to AEs and 29 (69%) required a dose reduction.[@b36-dddt-12-605] Study 10 Part 1 and 2A defined 600 mg bid as the RP2D of rucaparib and showed promising activity in g*BRCA*-mutated platinum-sensitive HGOC with manageable toxicity profile. Part 2B of this trial enrolled patients with platinum-sensitive or -resistant/refractory (PFI \<6 months) HGOC with g*BRCA* or s*BRCA* mutation who had received two to four previous lines of treatment. Part 3 was designed to investigate pharmacokinetics and safety of higher dose tablets (300 mg) of rucaparib in patients with relapsed solid tumor and germline or somatic *BRCA1/2* mutation.[@b36-dddt-12-605] For Part 2B and 3, recruitment is completed and results are pending.
Phase II
--------
### ARIEL 2
ARIEL 2 (NCT01891344) is a multicenter, two-part Phase II open-label study assessing rucaparib in relapsed/progressive high-grade serous or endometrioid ovarian carcinoma. Part 1 enrolled patients with platinum-sensitive (PFI ≥6 months) HGOC having progressed after at least one previous platinum-based chemotherapy. Part 2 enrolled patients who had received at least three but no more than four previous chemotherapy regimens, including patients with platinum-sensitive (PFI ≥6 months), platinum-resistant (PFI \<6 months) and platinum-refractory disease (PFI \<2 months). However, a PFI ≥6 months following the first line of platinum treatment was required for all patients. In addition, all patients had measurable disease according to RECIST 1.1[@b72-dddt-12-605] criteria and underwent baseline tumor biopsy. Rucaparib was administered continuously at 600 mg bid in a 28-day cycle. The aim of Part 1 was to develop a tumor-based molecular signature of HRD capable of predicting rucaparib activity in patients with relapsed high-grade serous or endometrioid ovarian cancer beyond germline or somatic *BRCA* mutations. Indeed, as a consequence of HRD, genomic scars accumulate and may be measured as extension of genomic loss of heterozygosity (LOH).[@b37-dddt-12-605] An LOH score measuring HRD was assessed in previous studies and showed an ability to predict HRD regardless of the underlying causal mechanism.[@b37-dddt-12-605]--[@b39-dddt-12-605] In the ARIEL 2 study, the percent of LOH has been measured on baseline and archival tissue with the Foundation Medicine Next-Generation Sequencing (NGS) assay[@b40-dddt-12-605] using a cutoff of 14%, based on data from the analysis of The Cancer Genome Analysis.[@b15-dddt-12-605] Between October 2013 and December 2014, 206 patients were enrolled in ARIEL 2 Part 1 study and 204 patients received rucaparib.[@b24-dddt-12-605] One-hundred and ninety-two patients were assigned to one of three HRD categories assessed on the most recent collected tumor sample (baseline tumor biopsy if available or most recent archival tissue when biopsy was not performed): 40 deleterious germline or somatic *BRCA*-mutant (*BRCA*^mut^) patients; 82 *BRCA*--wild-type and LOH high (*BRCA*^wt^/LOH^high^); and 70 *BRCA*--wild-type and LOH low (BRCA^wt^/LOH^low^). Median progression-free survival (PFS) was significantly longer in *BRCA*^mut^ subgroup (12.8 months; HR 0.27, 95% CI 0.16--0.44, *p*\<0.0001) and in *BRCA*^wt^/LOH^high^ (5.7 months; HR 0.62, 95% CI 0.42--0.90, *p*=0.011) compared to *BRCA*^wt^/LOH^low^ subgroup (5.2 months). Response rate by RECIST 1.1 criteria was higher in the *BRCA*^mut^ (80%, 95% CI 64%--91%, *p*\<0.0001) and in *BRCA*^wt^/LOH^high^ (29%, 95% CI 20%--40%, *p*=0.0033) than *BRCA*^wt^/LOH^low^ subgroup (10%, 95% CI 4%--20%). Genomic LOH was shown to be a better predictor of response to rucaparib in patients with *BRCA* wild-type tumors with a sensitivity of 78%, compared to mutation in other HRD genes (sensitivity 11%, *p*\<0.0001) or methylation of *BRCA1* or *RAD51C* (sensitivity 48%, *p*\<0.021). However, by combining mutations in HRD genes and methylation of *BRCA1* or *RAD51C*, no statistically different sensitivity was observed (sensitivity 59%, *p*=0.13).[@b24-dddt-12-605] All 204 patients were evaluable for toxicity and the most common G3 AEs were anemia (22% patients) and increase in ALT/AST (12%). Thirty-nine percent of the patients required dose reduction, mainly due to anemia and nausea. Discontinuation occurred in 9% of the patients as a consequence of AEs, with the most common cause being fatigue. LOH has been assessed on archival tissue and baseline biopsy with high concordance (Fisher's exact test, *r*=0.86, *p*\<0.0001). Seventeen of 50 patients (34%) had a change in LOH from low in archival tissue to high in baseline biopsy and five achieved a partial response. No change of LOH from high to low was identified.[@b24-dddt-12-605] ARIEL 2 Part 1 trial confirmed the feasibility of a tumor-based molecular signature of HRD to select patients most likely to benefit from PARP inhibitor treatment, using an algorithm that combines a measure of genomic LOH and *BRCA* mutations assessed with tumor-based next-generation sequencing assay.[@b24-dddt-12-605] A retrospective analysis of these results has established that the cutoff ≥16% to define LOH high is more appropriate to discriminate improvement in PFS and ORR in *BRCA*--wild-type patients.[@b41-dddt-12-605] Other trials have further investigated the potential predictive role of genomic LOH score: ARIEL 2 Part 2 study included patients with platinum-resistant ovarian cancer and the prospective randomized Phase III trial (ARIEL 3, NCT01968213)[@b42-dddt-12-605] was designed to confirm the cutoff and validate the assay in the maintenance setting.
In addition, a preliminary analysis on 18 patients enrolled in ARIEL 2 Part 1 study showed that variations in *TP53* mutant allele fraction detected on circulating tumor DNA (ctDNA) from plasma samples collected before, during treatment and at the end of treatment (total 65 samples) correlated with response to rucaparib.[@b43-dddt-12-605] Wild-type p53 acts as checkpoint molecule and helps in maintaining genomic stability.[@b44-dddt-12-605] Mutation in *TP53* or lack of its expression is the most frequent genomic aberration in all tumor types and in HGOC represents an early and common event, likely seen in precursor lesions.[@b45-dddt-12-605] For 18 patients, ctDNA isolated during screening, at day 1 of each cycle and at the end of treatment with rucaparib, and *TP53* mutations were concordant between tumor tissue and ctDNA. Responses according to RECIST 1.1 and Gynecologic Cancer InterGroup (GCIG) combined RECIST and cancer antigen 125 (CA-125) criteria were evaluable in 14 patients. Nine patients (9/14; 64%) had \>50% reduction in *TP53* mutant allele fraction, among whom seven showed a partial response according to RECIST 1.1 criteria (7/9, 78%). No objective response was observed among patients with \<50% reduction in *TP53* mutant allele fraction. Further analysis of all patients enrolled on this trial is ongoing to confirm the role of ctDNA as a predictive biomarker.[@b43-dddt-12-605]
### Joint analysis of Study 10 and ARIEL 2
An integrated efficacy analysis of Study 10 (Part 2A) and ARIEL 2 (Parts 1 and 2) has been performed to further define the efficacy and safety of rucaparib 600 mg bid as treatment in patients with HGOC and deleterious germline (Study 10) or somatic *BRCA1/2* mutation (Study 10 and ARIEL 2) previously treated with at least two lines of chemotherapy.[@b46-dddt-12-605] For the integrated safety analysis, patients enrolled in Parts 1, 2A and 3 of Study 10 and in Parts 1 and 2 of ARIEL 2 and who had received at least one dose of rucaparib 600 mg were included regardless of the *BRCA1/2* status.[@b46-dddt-12-605] The integrated efficacy analysis included a total of 106 patients: 42 from Study 10 (Part 2A) and 64 from ARIEL 2 (Parts 1 and 2). Deleterious *BRCA1/2* mutations were present in all patients: 83% germline and 17% somatic; among them, 63.2% were in *BRCA1* and 36.8% in *BRCA2*. Sixty-one percent of the patients were treated with ≥3 previous lines of chemotherapy and 74.5% had a PFI ≥6 months from the last platinum-based chemotherapy. Investigator-assessed ORR per RECIST 1.1 criteria was 53.5% (95% CI 43.8--63.5) and 70.8% (95% CI 61.1--79.2) per GCIG combined RECIST and CA-125 response criteria. Median duration of response was 9.2 months (range 1.7--19.8 months, 95% CI 6.6--11.6 months). Higher ORR was observed in less pretreated patients (2 lines vs ≥3: 68.3% vs 44.6%), in subjects with PFI \>12 months (73.9%) compared to PFI 6--12 months (62.5%) or \<6 months (18.5%) and if sensitive (65.8%) to the most recent platinum-based chemotherapy compared to resistant (25%). Investigator-assessed PFS was 10 months (95% CI 7.3--12.5) with 47% of patients still receiving rucaparib at the time of data cutoff.[@b46-dddt-12-605] The integrated safety analysis included 377 patients (62 from Study 10 \[Parts 1, 2A and 3\] and 315 from ARIEL 2 \[Parts 1 and 2\]) and confirmed the manageable toxicity profile of rucaparib. All patients had at least one treatment-related AE and 60.7% of patients had .G3 AEs. The most common AEs (all grades) were nausea, asthenia/fatigue, vomiting and anemia. Increase of AST/ALT and creatinine was commonly observed, usually in the first weeks of treatment followed by stabilization, and in the majority of cases was reversible and asymptomatic.[@b46-dddt-12-605] The most common .G3 AEs were anemia, AST/ALT increase and asthenia. One patient developed myelodysplastic syndrome (MDS) and another one acute myeloid leukemia (AML). Both patients had *BRCA*--wild-type tumors and received 12 cycles of platinum-based chemotherapy prior to the trial. Rucaparib was interrupted in 58.6% of patients and dose reduced in 45.9% due to treatment-related AEs. In 9.8% of patients, AEs lead to rucaparib discontinuation.[@b46-dddt-12-605]
Phase III
---------
### ARIEL 3
ARIEL 3 (NCT01968213) is a multicenter, randomized, double-blind, placebo-controlled Phase III study assessing efficacy and safety of rucaparib as maintenance treatment following response to platinum-based chemotherapy for platinum-sensitive relapse of high-grade serous or endometrioid epithelial ovarian, primary peritoneal or fallopian tube cancer.[@b42-dddt-12-605] Patients must have had achieved a radiological CR or PR as per RECIST1.1 criteria or CA-125 response by GCIG criteria (when disease was not measurable per RECIST1.1) following the last platinum-based chemotherapy, with all the patients required to have CA-125 below the upper limit of normal.[@b47-dddt-12-605] Patients experiencing partial response after platinum-based chemotherapy and with measurable residual disease were suitable for enrollment. Patients were randomized 2:1 to receive rucaparib 600 mg bid or placebo in a 28-day cycle, stratified by HRD status on archival tissue, interval between penultimate platinum-based chemotherapy, radiological previous PFI (6--12 months vs \>12 months) and response to last platinum-based chemotherapy (CR vs PR or CA-125 GCIG response). Randomization had to occur within 8 weeks from the last dose of platinum-based chemotherapy. Primary objective was to assess PFS in three different nested predefined cohorts: 1) *BRCA*-mutated patients (germline or somatic); 2) HRD (*BRCA*-mutant or *BRCA*--wild-type and high LOH) assessed using the Foundation Medicine T5 NGS assay and 16% cutoff as defined following the results of ARIEL 2 Part 1 study; and 3) intention-to-treat (ITT) population. Secondary objectives were overall survival, safety, patient-reported outcomes and response rate in patients with measurable disease at study entry. A total of 564 patients were enrolled (375 in rucaparib arm and 189 in placebo arm). Rucaparib significantly improved investigator-assessed median PFS in all three groups: 1) deleterious *BRCA* mutation: 16.6 months in the rucaparib group (n=130) versus 5.4 months in the placebo (n=66) (HR 0.23, 95% CI 0.16--0.34, *p*\<0.0001); 2) HRD: 13.6 months in the rucaparib group (n=236) versus 5.4 months in placebo (n=118) (HR 0.32, 95% CI 0.2--0.42, *p*\>0.0001); 3) ITT: 10.8 months in the rucaparib arm versus 5.4 months in the placebo (HR 0.36, 95% CI 0.30--0.45, *p*\<0.0001). A preplanned subgroup analysis confirmed the statistically significant improvement of PFS with rucaparib versus placebo in all the subgroups: *BRCA* mutation types (*BRCA 1* vs *2*, germline vs somatic), *BRCA* wild-type and LOH high versus low (LOH high: PFS 9.7 months with rucaparib vs 5.4 months with placebo \[HR 0.44\], LOH low: 6.7 months vs 5.4 months \[HR 0.58\], respectively), measurable disease at baseline (present vs absent and bulky vs non-bulky), number of previous lines of chemotherapy (2 vs ≥3), previous use of bevacizumab (yes vs no), PFI to penultimate platinum-based chemotherapy (6--12 months vs \>12 months), response to last platinum-based chemotherapy (CR vs PR or GCIG CA-125 response). Response rate according to RECIST1.1 criteria was assessed in patients with measurable disease at the time of enrollment (n=207 in the ITT population); 18% of the patients in the rucaparib arm (26/141) achieved a confirmed objective response (7% complete, 10/141) and 8% (5/66) in the placebo group (2% complete, 1/66).[@b42-dddt-12-605] Overall survival (OS) data are not yet mature. A safety analysis was conducted in 372 patients receiving rucaparib and 189 receiving placebo. Three patients in the rucaparib arm withdrew consent before the first dose of study medication. Treatment-emergent AEs were observed in 100% of patients in the rucaparib group and 96% in the placebo group. The majority of side effects were easily managed and the most common were consistent with the ones reported in previous studies,[@b24-dddt-12-605],[@b34-dddt-12-605],[@b36-dddt-12-605] including nausea, fatigue, dysgeusia, anemia, constipation and vomiting.[@b42-dddt-12-605] G ≥3 treatment-emergent AEs occurred in 54% of the patients in the rucaparib arm and 15% in the placebo arm with the most common being anemia and transaminitis. Serious AEs occurred in 21% of patients receiving rucaparib and in 11% of patients receiving placebo. Treatment was discontinued due to AEs in 13% of patients receiving rucaparib and 2% receiving placebo. Four deaths occurred due to AEs, two of them were treatment related and due to AML and MDS. The ARIEL 3 study confirmed the role of PARP inhibitors as maintenance treatment following response to platinum-based chemotherapy in patients with platinum-sensitive relapse of ovarian carcinoma.[@b42-dddt-12-605] Rucaparib has shown to be active not only in patients with *BRCA* deleterious mutation but also in patients with non-*BRCA*-related HRD; however, the overall population enrolled in the present trial, including *BRCA*--wild-type and LOH-low patients, achieved a benefit from rucaparib. Whilst the Foundation Medicine T5 NGS LOH score could be used to select patients who would benefit the most from rucaparib, it cannot be incorporated in routine practice as a predictive biomarker of response given improvement in PFS has also been observed in patients with *BRCA*--wild-type and LOH-low tumors.[@b42-dddt-12-605] Results on patient-reported health outcomes are not available yet and will be the subject of a separate publication.
Ongoing trials in ovarian cancer
================================
Numerous trials are ongoing to further investigate rucaparib activity and safety and to confirm the predictive role of the HRD assay and LOH algorithm developed in the ARIEL 2 trial.
ARIEL 2 Part 2
--------------
ARIEL 2 Part 2 (NCT01891344) has been designed to explore the role of rucaparib regardless of PFI and to further assess the role of LOH genomic score to predict rucaparib activity. Patients with high-grade serous or endometrial carcinoma who have progressed after three or four previous lines of chemotherapy have been enrolled. The study was designed to enroll 300 patients including at least 80 with g*BRCA* or s*BRCA* mutations. The primary objective is to define ORR by molecular subgroup (*BRCA*^mut^, *BRCA*^wt^/LOH^high^, *BRCA*^wt^/LOH^low^). Secondary objectives are PFS, OS and safety. Exploratory objectives include the assessment of efficacy end points according to the three molecular subgroups, the optimization of the LOH algorithm and the assessment of potential changes in HRD over time. Accrual has been completed and data analyses are awaited.
ARIEL 4
-------
Despite increasing evidence of PARP inhibitors' activity in patients with *BRCA* mutations, no direct comparisons with standard chemotherapy agents are available. ARIEL 4 (NCT02855944) is a multicenter, randomized Phase III study designed to compare efficacy and safety of rucaparib versus standard chemotherapy in patients with *BRCA*-mutant HGSOC or G2-3 endometrioid ovarian, primary peritoneal or fallopian tube cancer, and is currently enrolling patients. Patients with a deleterious *BRCA1/2* mutation (germline or somatic) who had received at least two previous lines of chemotherapy can be enrolled and randomized in a 2:1 ratio to receive rucaparib 600 mg bid or weekly paclitaxel (if PFI after last dose of platinum-based chemotherapy was between 1 and 12 months) or platinum-based chemotherapy (if PFI ≥12 months). Patients with platinum-refractory disease are excluded from the study. Other histological subtypes can be considered if the patient harbors *BRCA1/2* mutations. The primary objective is difference in investigator-assessed PFS between rucaparib and chemotherapy. Main secondary objectives are OS, ORR, patient-reported outcome and safety. Exploratory objectives will include assessment of molecular changes over time, cell-free tumor DNA as a marker of response and pharmacokinetic analysis.
Rucaparib + atezolizumab
------------------------
In the last decade, significant advances have been obtained in the field of immunotherapy and anti-program death 1 (PD1)/program death ligand 1 (PD-L1) agents are under investigation in EOC as single agents or in combination. Preclinical data in cancer cell lines and xenografts demonstrated increased PD1-mediated immunosuppression following treatment with PARP inhibitors suggesting the rationale to combine anti-PD1/PDL1 agents with PARP inhibitors.[@b48-dddt-12-605] A Phase Ib study (NCT03101280) is investigating the combination of rucaparib with the anti-PDL1 atezolizumab in patients with advanced gynecological cancer. In Part 1 (dose escalation) study, patients with advanced ovarian or endometrial cancer who had received at least one previous line of chemotherapy will receive an escalating dose of oral rucaparib starting from 400 mg bid up to 600 mg bid in a 21-day cycle and atezolizumab 1,200 mg iv every 3 weeks. In Part 2 (dose expansion) study, rucaparib will be administered at the RP2D as defined in the dose-escalation part in combination with atezolizumab (same dose and schedule as Part 1) in patients with platinum-sensitive relapsed HGSOC or G2--3 endometrioid ovarian carcinoma after at least one but no more than two platinum-based chemotherapy regimens. This study is currently open to accrual and recruiting patients.
Other studies
-------------
Other Phase I studies are ongoing to assess drug-to-drug interactions of rucaparib with caffeine, warfarin, omeprazole, midazolam, digoxin and vitamin K (NCT02740712) and to explore mass balance, absorption, metabolism and elimination of a single oral dose of 600 mg \[14C\] rucaparib in patients with advanced solid tumors (NCT02986100).
Mechanisms of resistance
========================
Despite promising results obtained with the introduction of PARP inhibitors for the treatment of women with ovarian carcinoma, the majority of patients will ultimately develop disease progression, and different mechanisms of resistance have been proposed ([Table 2](#t2-dddt-12-605){ref-type="table"}). Reversion of *BRCA1/2* mutations has been described as one of the possible mechanisms of resistance to chemotherapy and to PARP inhibitors.[@b49-dddt-12-605]--[@b52-dddt-12-605] Given the increased evidence of the role of HRD in defining PARP inhibitor activity, investigations are ongoing to assess the role of somatic reversion mutations in HRD genes as a mechanism of resistance. Kondrashova et al have reported results from 12 patients with platinum-sensitive HGSOC treated with rucaparib as part of the ARIEL 2 Part 1 trial and with paired biopsies (pre-treatment and post-progression) available for analysis.[@b53-dddt-12-605] From the six patients who had a germ-line or somatic mutation (four in *BRCA1*, one in *RAD51C* and one in *RAD51D*), five developed a secondary mutation restoring gene activity on the biopsy at disease progression, including *RAD51C* and *RAD51D*. Following secondary mutations, homologous recombination activity was restored resulting in rucaparib resistance, supporting the relevant role of non-*BRCA1/2* HRD in PARP inhibitors' sensitivity and resistance.[@b53-dddt-12-605] In the absence of *BRCA1/2* reversion, resistance to PARP inhibitors can be caused by hyperactivation of the NHEJ pathway. The TP53 binding 1 protein (53BP1) is responsible for the balance between NHEJ and homologous recombination in repairing DNA DSBs and is regulated by BRCA1. When HRD is present, 53BP1 promotes activity of the NHEJ pathway. When 53BP1 is lost, homologous recombination activity is restored and such resistance to PARP inhibitors is possible.[@b54-dddt-12-605],[@b55-dddt-12-605] Cell cultures with NHEJ deficiency showed resistance to rucaparib, whilst cultures with HRD and competent NHEJ were sensitive to rucaparib.[@b56-dddt-12-605] Another reported mechanism of resistance is correlated with the loss of MLL3/4 complex protein whose role is to stall the replication forks favoring protection from DNA damage, thus causing resistance to PARP inhibitors or other DNA damaging agents.[@b54-dddt-12-605],[@b57-dddt-12-605],[@b58-dddt-12-605] Further investigation is required to assess PARP inhibitors in combination with other agents that are able to overcome mechanisms of PARP resistance ([Table 2](#t2-dddt-12-605){ref-type="table"}).
Toxicity
========
Rucaparib has been shown to be manageable and relatively well tolerated with AEs commonly seen with other PARP inhibitors. At the dose of 600 mg bid, the most common AEs observed across the different trials were fatigue, nausea/vomiting, myelosuppression and ALT/AST elevation ([Table 3](#t3-dddt-12-605){ref-type="table"}). These side effects have been easily managed with supportive care and/or rucaparib dose reduction or delays ([Table 4](#t4-dddt-12-605){ref-type="table"}).
Increase in serum creatinine level has been observed in patients treated with rucaparib, as with other PARP inhibitors. This AE may be due to reduction in creatinine secretion at the level of the proximal tubule as a consequence of inhibition of the tubule transporters MATE1, MATE2-K and OCT-2.[@b71-dddt-12-605] No G3 or G4 creatinine increase has been reported with rucaparib. Increase of transaminase has also been observed, and the cause of this phenomena has not been well established yet. However, this AE is generally transient and managed with dose reduction or treatment delay and for asymptomatic \<G3 transaminitis treatment, rucaparib can be continued.
MDS and AML have been rarely observed in patients treated with rucaparib in Phase II (Study 10 and ARIEL 2) and 3 (ARIEL 3) studies.[@b24-dddt-12-605],[@b36-dddt-12-605],[@b42-dddt-12-605],[@b46-dddt-12-605] In the ARIEL 3 trial, three patients had MDS or AML in the rucaparib arm and none in the placebo arm. Two patients had germline *BRCA*-mutant carcinoma and one *BRCA*--wild-type and LOH-low tumor. One patient died due to progressive MDS and one due to AML.[@b42-dddt-12-605] MDS and AML have been reported with other PARP inhibitors. In the SOLO2 (NCT01874353) trial assessing maintenance olaparib versus placebo in patients with platinum-sensitive recurrence of HGOC and *BRCA*1/2 mutation, two patients developed AML, one chronic myelomonocytic leukemia and one MDS (total 4/195, 2%) in the olaparib arm and three MDS and one AML (total 4/99, 4%) in the placebo arm.[@b22-dddt-12-605] In the NOVA (NCT01847274) trial investigating maintenance niraparib versus placebo in platinum-sensitive relapse of HGSOC regardless of *BRCA* status, five cases of MDS were observed in the niraparib group (5/367, 1.4%) and one MDS and one AML (2/179, 1.1%) in the placebo group.[@b26-dddt-12-605] No definitive data are available on the possible causes of MDS/AML occurrence in patients treated with PARP inhibitors. However, previous exposure to chemotherapy or radiotherapy and the presence of g*BRCA* mutations might concur in increasing the risk of other malignancies.
Conclusion
==========
Rucaparib is a potent inhibitor of PARP-1, PARP-2 and PARP-3 and has been investigated in different Phase II and 3 studies as treatment for patients with progressive EOC after at least two previous lines of chemotherapy and as maintenance treatment following response to platinum-based chemotherapy for platinum-sensitive relapse.[@b24-dddt-12-605],[@b42-dddt-12-605],[@b46-dddt-12-605] The FDA has approved oral rucaparib 600 mg bid as treatment for patients with deleterious *BRCA1/2*-mutated (germline or somatic) EOC who had received ≥2 previous lines of chemotherapy. Along with rucaparib, the FDA also approved the first NGS-based companion diagnostic (FoundationFocus CDxBRCA test) to assess *BRCA1/2* mutation in the tumor tissue to select the patients who could benefit the most from rucaparib.
Subsequently, the ARIEL 3 study has established the role of rucaparib as maintenance treatment following response to platinum-based chemotherapy for platinum-sensitive relapse of HGOC. PFS was significantly better in patients treated with rucaparib in the different cohorts: deleterious *BRCA1/2* mutation, HRD and ITT population.[@b42-dddt-12-605] The Foundation Medicine NGS assay was confirmed to be a useful tool to select patients who will benefit the most from rucaparib; however, it cannot be used as a predictive biomarker as benefit from rucaparib has been observed in patients with *BRCA*--wild-type and LOH-low tumors.[@b42-dddt-12-605]
Whilst different PARP inhibitors have been shown to be active, a direct comparative analysis of agents is not feasible. This is primarily due to the fact that trials assessing olaparib, niraparib, veliparib and rucaparib differ from one another in selection of patients (only *BRCA1/2*-mutated or also *BRCA1/2*--wild-type), HRD definition, study design, inclusion or exclusion of patients with residual bulky disease or abnormal CA-125 level for maintenance studies. Moreover, each PARP inhibitor has its characteristic toxicity profile.
Further research is warranted to define biomarkers that are able to predict PARP inhibitor activity, to overcome mechanisms of PARP inhibitors resistance and investigate the appropriate combination of PARP inhibitors with other agents like immune checkpoint inhibitors, cell cycle inhibitors or other DNA damaging agents such as chemotherapy and radiotherapy.
**Disclosure**
The authors report no conflicts of interest in this work.
{#f1-dddt-12-605}
######
Summary of rucaparib efficacy in ovarian cancer
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Authors Agent Phase Dose Setting Patients *BRCA* status ORR % (RECIST1.1) SD ≥12 weeks mPFS, months
----------------------------------------------------------------------------------- ----------------------------------------------------------------- ----------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------- ------------------------------------ --------------------------- ---------------------------------------------------------- ------------------------- ------------------
Drew et al[@b34-dddt-12-605] (NCT01009190) Intermittent vs continuous iv/oral rucaparib I/II Escalating dose of iv (4--18 mg/m^2^ ×5 days q3w) or oral (92 od--600 bid) rucaparib Treatment 78\ g*BRCA*^mut^: 74\ 7% (5/73)\ 48% (35/73)\ --
(47 iv + 31 oral)\ g*BRCA*^wt^: 3\ Ovary: 10% (5/48) Ovary: 50% (24/48)
(27 breast + 51 ovary) g*BRCA*^uk^: 1
Wilson et al[@b33-dddt-12-605] (NCT00664781) iv/oral rucaparib + chemo (carbo; carbo/pac; cis/pem;epi/cyclo) I Escalating dose iv (12--24 mg/m^2^ ×3 days q3w) or oral (80×360 mg on day 1×14 q3w) rucaparib + different chemo regimens.\ Treatment 85 solid tumors (15 ovary) uk 12% (10/85) 51% (43/85) --
MTD with carbo: 240 mg qd + carbo AUC5
Kristeleit et al[@b36-dddt-12-605] Study 10 (NCT01482715) Oral rucaparib I\ Escalating continuous dose oral rucaparib (40 mg od--840 mg bid) Treatment Part 1: 56 solid tumors (20 ovary) g*BRCA*1/2: 36/56 14% (8/56) 23% (13/56)\ --
Part 1: dose escalation \[≥24 weeks\]
Ovary: 15% (3/20)
II\ RP2D: 600 mg bid continuous Part 2A: 42 ovary, platinum-sensitive g*BRCA1*/2: 42/42 60% (25/42) 29% (12/42) --
Part 2A: treatment at RP2D
Swisher et al[@b24-dddt-12-605] ARIEL 2, Part 1 (NCT01891344) Oral rucaparib II 600 mg bid continuous Treatment 204 ovary, platinum-sensitive *BRCA*^mut^: 40\ 80% (32/40)\ --\ 12.8\
*BRCA*^wt^/LOH^high^: 82\ 29% (24/82)\ --\ 5.7\
*BRCA*^wt^/LOH^low^: 70\ 10% (7/70)\ --\ 5.2\
*BRCA*^wt^/LOH^uk^: 12 33% (4/12) -- 5.2
Oza et al[@b46-dddt-12-605] Joint Analysis Study 10 Part 1A ARIEL 2 Parts 1 and 2 Oral rucaparib II 600 mg bid continuous Treatment 106\ *BRCA*^mut^: 106\ 53.8% (57/106) 34% (36/106)\ 10.0
Study 10: 42\ Germline: 88\ \[SD as best response\]
ARIEL 2: 64 Somatic: 18
Coleman et al[@b42-dddt-12-605] ARIEL 3 (NCT01968213) Oral rucaparib vs placebo III 600 mg bid continuous vs placebo Maintenance post-response to platinum-based chemo 564\ *BRCA*^mut^\ 38% (15/40)[\*](#tfn1-dddt-12-605){ref-type="table-fn"}\ -- 16.6 (HR: 0.23)\
Rucaparib: 375\ Rucaparib: 130\ 9% (2/23)[\*](#tfn1-dddt-12-605){ref-type="table-fn"} 5.4
Placebo: 189 Placebo: 66
Ovary, platinum-sensitive HRD (*BRCA*^mut^ + LOH^high^)\ 27% (23/85)[\*](#tfn1-dddt-12-605){ref-type="table-fn"}\ -- 13.6 (HR: 0.32)\
Rucaparib: 236\ 7% (3/41)[\*](#tfn1-dddt-12-605){ref-type="table-fn"} 5.4
Placebo: 118
ITT\ 18% (26/141)[\*](#tfn1-dddt-12-605){ref-type="table-fn"}\ -- 10.8 (HR: 0.36)\
Rucaparib: 375\ 8% (5/66)[\*](#tfn1-dddt-12-605){ref-type="table-fn"} 5.4
Placebo: 189
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
**Note:**
Only patients with measurable disease at baseline. Dash indicates not reported.
**Abbreviations:** iv, intravenously; RP2D, recommended Phase II dose; SD, stable disease; g, germline; mut, mutant; uk, unknown; wt, wild-type; LOH, loss of heterozygosis; ORR, overall response rate; mPFS, median progression-free survival; carbo, carboplatin; cis, cisplatin; pac, paclitaxel; pem, pemetrexed; epi, epirubicine; cyclo, cyclophosphamide; q3w, every 3 weeks; od, once a day; bid, twice a day; ITT, intention-to-treat population; HRD, homologous recombination deficiency; HR, hazard ratio; qd, every day; MTD, maximum tolerated dose; AUC5, area under the curve 5; chemo, chemotherapy; RECIST, Response Evaluation Criteria in Solid Tumor.
######
Potential mechanisms of resistance to PARP inhibitors
Potential mechanisms of resistance Potential treatment
----------------------------------------------------------------------------------- -----------------------------------------------------
Restoration of HRD
Secondary reversion mutations in HRD genes[@b49-dddt-12-605]--[@b52-dddt-12-605] --
Loss of 53BP1[@b54-dddt-12-605],[@b55-dddt-12-605] HSP90 inhibitor[@b59-dddt-12-605]
Replication fork protection[@b57-dddt-12-605],[@b60-dddt-12-605] Topoisomerases inhibitor[@b61-dddt-12-605]
Alteration in cell cycle regulation
Increased expression of Wee1[@b62-dddt-12-605] Wee1 inhibitor[@b62-dddt-12-605],[@b63-dddt-12-605]
ATM/ATR pathway activation[@b64-dddt-12-605] ATM/ATR inhibitors[@b65-dddt-12-605]
Drug efflux
Upregulation of p-glycoprotein[@b66-dddt-12-605] Next generation PARP inhibitor[@b67-dddt-12-605]
Activation of other pathways
PI3K/AKT[@b68-dddt-12-605] PI3K inhibitors[@b69-dddt-12-605]
MET[@b70-dddt-12-605] MET inhibitors[@b70-dddt-12-605]
**Note:** Dash indicates not reported.
**Abbreviations:** HRD, homologous recombination; 53BP1, p53 binding protein 1; HSP90, heat shock protein 90; PI3K, phospholnositide-3 kinase; PARP, poly (ADP-ribose) polymerase.
######
Most common treatment-emergent AEs in patients treated with rucaparib 600 mg bid
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study 10, Part 2A[@b36-dddt-12-605]\ ARIEL 2, Part 1[@b24-dddt-12-605]\ Joint analysis (Study 10+ ARIEL 2)[@b46-dddt-12-605]\ ARIEL 3[@b42-dddt-12-605]\
N=42 N=204 N=377 N=372
------------------------------------------------- -------------------------------------- ------------------------------------ ------------------------------------------------------- ---------------------------- ----- ----- ----- -----
Any AE 100 76 100 nr 100 61 100 54
Asthenia/fatigue 86 26 78 9 77 11 69 7
Nausea 83 7 79 4 77 5 75 4
Anemia/Hb decrease 71 38 36 22 44 25 37 19
AST/ALT increase 57 14 42 12 41 11 34 10
Vomiting 55 7 44 2 46 4 37 4
Constipation 52 0 46 1 40 2 37 2
Headache 45 2 17 0 nr nr 18 \<1
Abdominal pain 43 7 29 2 32 3 30 2
Dysgeusia 40 0 43 0 39 \<1 39 0
Diarrhea 38 0 33 3 35 2 32 1
Thrombocytopenia 36 2 14 2 21 5 28 3
Creatinine increase 33 0 17 0 21 1 15 \<1
Neutropenia 31 17 12 7 35 10 18 5
Decrease in appetite 29 2 41 2 40 3 23 1
Dyspnea 24 2 23 0 21 1 13 0
Abdominal distention 24 0 21 0 nr nr 11 0
Dizziness 21 2 18 0 nr nr 15 0
Acute myeloid leukemia/myelodysplastic syndrome nr nr 0 0 2 nr 1 nr
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
**Abbreviations:** AE, adverse event; bid, twice a day; AST, aspartate aminotransferase; ALT, alanine aminotransferase; Hb, hemoglobin; nr, not reported; N, number of patients; G, grade.
######
Treatment interruption or discontinuation and dose reduction following administration of oral rucaparib 600 mg bid
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study 10, Part 2A[@b36-dddt-12-605]\ ARIEL 2, Part 1[@b24-dddt-12-605]\ Joint analysis (Study 10 and ARIEL 2)[@b46-dddt-12-605]\ ARIEL 3[@b42-dddt-12-605]\
N=42 N=204 N=377 N=372\
(rucaparib arm)
---------------------------------------------------- -------------------------------------- ------------------------------------ ---------------------------------------------------------- ----------------------------
Discontinuation for AE (%) 10 9 10 13
Dose reduction due to AE (%) 69 39 46 55
At least one dose reduction or treatment delay (%) 90 nr 62 88
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
**Abbreviations:** AE, adverse event; N, number of patients; nr, not reported; bid, twice a day.
|
Estonia: Under the burka – 5.56mm Galil rifle
Estonia’s burqa debate mere diversion tactics
The Estonian Minister of Social Affairs proposed a ban on burqas last week.
But the debate on the full veil is a phantom problem, writes opposition member Heimar Lenk in the liberal daily Eesti Päevaleht:
At last a topic has been found that can keep Estonians from thinking about their day-to-day worries.
Just imagine how dangerous the three women in burqas are as they stroll Estonia’s streets.
… But the outcry reaches to the skies! Opinion pieces are published, stories are researched, these Muslim women have already been compared with the ‘little green men’ in the Ukraine crisis [the Russian units that occupied Crimea].
No doubt these burqas conceal 5.56mm Galil rifles. But why aren’t the fur muffs worn by Estonian women being banned as well?
They can also conceal a pistol. And why do we let Orthodox monks and nuns roam the streets in their long black robes? |
Q:
Converting Little Endian to Big Endian
All,
I have been practicing coding problems online. Currently I am working on a problem statement Problems where we need to convert Big Endian <-> little endian. But I am not able to jot down the steps considering the example given as:
123456789 converts to 365779719
The logic I am considering is :
1 > Get the integer value (Since I am on Windows x86, the input is Little endian)
2 > Generate the hex representation of the same.
3 > Reverse the representation and generate the big endian integer value
But I am obviously missing something here.
Can anyone please guide me. I am coding in Java 1.5
A:
Since a great part of writing software is about reusing existing solutions, the first thing should always be a look into the documentation for your language/library.
reverse = Integer.reverseBytes(x);
I don't know how efficient this function is, but for toggling lots of numbers, a ByteBuffer should offer decent performance.
import java.nio.ByteBuffer;
import java.nio.ByteOrder;
...
int[] myArray = aFountOfIntegers();
ByteBuffer buffer = ByteBuffer.allocate(myArray.length*Integer.BYTES);
buffer.order(ByteOrder.LITTLE_ENDIAN);
for (int x:myArray) buffer.putInt(x);
buffer.order(ByteOrder.BIG_ENDIAN);
buffer.rewind();
int i=0;
for (int x:myArray) myArray[i++] = buffer.getInt(x);
As eversor pointed out in the comments, ByteBuffer.putInt() is an optional method, and may not be available on all Java implementations.
The DIY Approach
Stacker's answer is pretty neat, but it is possible to improve upon it.
reversed = (i&0xff)<<24 | (i&0xff00)<<8 | (i&0xff0000)>>8 | (i>>24)&0xff;
We can get rid of the parentheses by adapting the bitmasks. E. g., (a & 0xFF)<<8 is equivalent to a<<8 & 0xFF00. The rightmost parentheses were not necessary anyway.
reversed = i<<24 & 0xff000000 | i<<8 & 0xff0000 | i>>8 & 0xff00 | i>>24 & 0xff;
Since the left shift shifts in zero bits, the first mask is redundant. We can get rid of the rightmost mask by using the logical shift operator, which shifts in only zero bits.
reversed = i<<24 | i>>8 & 0xff00 | i<<8 & 0xff0000 | i>>>24;
Operator precedence here, the gritty details on shift operators are in the Java Language Specification
A:
Check this out
int little2big(int i) {
return (i&0xff)<<24 | (i&0xff00)<<8 | (i&0xff0000)>>8 | (i>>24)&0xff;
}
A:
The thing you need to realize is that endian swaps deal with the bytes that represent the integer. So the 4 byte number 27 looks like 0x0000001B. To convert that number, it needs to go to 0x1B000000... With your example, the hex representation of 123456789 is 0x075BCD15 which needs to go to 0x15CD5B07 or in decimal form 365779719.
The function Stacker posted is moving those bytes around by bit shifting them; more specifically, the statement i&0xff takes the lowest byte from i, the << 24 then moves it up 24 bits, so from positions 1-8 to 25-32. So on through each part of the expression.
For example code, take a look at this utility.
|
Share this article on LinkedIn Email
Aston Martin will not "muscle in" on Honda's Formula 1 engine supply deal with Red Bull but will "stand ready" to up its involvement should the Japanese manufacturer withdraw.
The British company has had a title sponsorship deal with Red Bull since last year, expanding a pre-existing relationship that included an alliance with Red Bull Advanced Technologies to build the road-going Valkyrie hypercar.
Aston has explored the prospect of building an engine to F1's planned 2021 rules but Red Bull has switched from Renault to Honda engines since that was openly talked about.
Andy Palmer, Aston CEO, told Autosport that the company is very pleased with Red Bull's Honda partnership, but would be willing to revive its own engine interest should Honda opt not to commit to F1 beyond 2020.
"Would I like to be a little bit more involved [in F1] technically? I think that depends," Palmer said following last weekend's first public run for the Valkyrie hypercar at Silverstone.
"The obvious place for Aston to become involved in would have been the engine.
"I think that's a question on whether Honda continues to develop the engine.
"Clearly they have a lot more money and musclepower than we do. I don't think we're going to muscle in on that while the relationship with Honda exists.
"We're very happy with that relationship and we're happy to see it continue. But nobody knows quite what the regulations will be beyond 2021 and who is going to be involved in that.
"We stand ready from that point of view, with the hope that Honda will continue.
"Our focus is now mainly looking at the development of the Valkyrie, Valhalla, Vanquish series and the exploits in Le Mans."
Aston will build a race version of its Valkyrie to compete in the World Endurance Championship's new top-tier Hypercar class from 2020.
Red Bull's tech division is expected to remain "significantly involved" but no firm details have been decided. Palmer considers the Valkyrie project to be a validation of the "authenticity" of Aston's partnership with Red Bull.
He added that its commitment to Red Bull in an F1 sense is only limited to "bits of paper in place to when the contract ends", suggesting a renewal of its current deal is likely.
"I don't think we see a contractual end date," said Palmer.
"We just see it continuing as long as they are racing and we are involved with other things with them, we'll continue." |
Q:
Was chaos the initial state of the earth at creation?
We read in Genesis 1:1-2
In the beginning God created the heaven and the earth.
2 And the earth was without form and void, and darkness was upon the face of the deep. And the Spirit of God moved upon the face of the waters.
Does this mean that God initially created the heaven and the earth in a chaotic state? This is contrary to all creative processes that we find either in nature or that are the results of man's actions. Therefore should we understand Genesis 1:1 and Genesis 1:2 as sequential events that occurs one after the other in time or would that mean there is a time gap between Genesis 1:1 and Genesis 1:2 and that during that time the earth's state degraded and God reshapedit to make it a suitable home for Adam and Eve?
Thank you for any help on this.
A:
Most English-language Bibles begin with "In the beginning, God created the heaven and the earth," although the first three Hebrew words of Genesis are: "בראשית ברא אלהים" (B'reishit bara Elohim). There is no definite article and the grammar is complex, if not confusing, but there is a general consensus among scholars that this can not be translated correctly as "In the beginning, God created the heaven and the earth" - for example, Leon R. Kass, The Beginning of Wisdom, page 27. Some believe the earth was pre-existing, and the beginning of God's creation was the firmament that separates the waters above from the waters below. In the 'Gap theory', others see God as creating the earth and then, for some reason, allowing a time gap before beginning to create other things. Apart from this, the creation story in Genesis 1:1-2:4a seems orderly and unchaotic, although the precise order of creation would be surprising to a scientist.
Digressing for a moment, we find that other cultures in the ancient Near East did believe that chaos accompanied the creation and that chaos monsters had to be conquered, especially Leviathan. Othmar Keel and Christoph Uehlinger, in Gods, Goddesses, and Images of God, page 43, explains that Baal was acclaimed in Canaan as victor over Litanu / Leviathan. In the Book of Job, we find that God was the victor over Leviathan. These creation fragments in Job (and in Psalms 74:14, 104:26) do not invalidate the creation account in Genesis chapter 1.
The creation story in Genesis chapter 1 need not be regarded as a literal story and indeed was not seen this way by some of the early Christian Church Fathers, who regarded it as an allegory. For example, Origen (De Principiis, Book 4.1.16):
... as even these do not contain throughout a pure history of events, which are interwoven indeed according to the letter, but which did not actually occur. Nor even do the law and the commandments wholly convey what is agreeable to reason. For who that has understanding will suppose that the first, and second, and third day, and the evening and the morning, existed without a sun, and moon, and stars? and that the first day was, as it were, also without a sky? And who is so foolish as to suppose that God, after the manner of a husbandman, planted a paradise in Eden, towards the east, and placed in it a tree of life, visible and palpable, so that one tasting of the fruit by the bodily teeth obtained life? and again, that one was a partaker of good and evil by masticating what was taken from the tree? And if God is said to walk in the paradise in the evening, and Adam to hide himself under a tree, I do not suppose that any one doubts that these things figuratively indicate certain mysteries, the history having taken place in appearance, and not literally...
|
Atmel AT89 series
The Atmel AT89 series is an Intel 8051-compatible family of 8 bit microcontrollers (μCs) manufactured by the Atmel Corporation.
Based on the Intel 8051 core, the AT89 series remains very popular as general purpose microcontrollers, due to their industry standard instruction set, their low unit cost, and the availability of these chips in DIL (DIP) packages. This allows a great amount of legacy code to be reused without modification in new applications. While less powerful than the newer AT90 series of AVR RISC microcontrollers, new product development has continued with the AT89 series for the aforementioned advantages.
More recently, the AT89 series has been augmented with 8051-cored special function microcontrollers, specifically in the areas of USB, I²C (two wire interface), SPI and CAN bus controllers, MP3 decoders and hardware PWM.
Atmel has also created an LP (low power) series of these chips with a "Single Cycle Core", making the execution speed of these chips considerably faster.
AT89 Series Microcontrollers
Port Structures and Operation
All four ports in the AT89C51 and AT89C52 are bidirectional. Each consists of a latch (Special Function Registers P0 through P3), an output driver, and an input buffer. The output drivers of Ports 0 and 2, and the input buffers of Port 0, are used in accesses to external memory. In this application, Port 0 outputs the low byte of the external memory address, time-multiplexed with the byte being written or read. Port 2 outputs the high byte of the external memory address when the address is 16 bits wide. Otherwise the Port 2 pins continue to emit the P2 SFR content. All the Port 3 pins, and two Port 1 pins (in the AT89C52)are multifunctional. The alternate functions can only be activated if the corresponding bit latch in the port SFR contains a 1. Otherwise the port pin is stuck at 0. It has less complex feature than other microprocessor.
External links
Atmel's 8051 family product page, updated link 09/23/2012
Atmel's 8051 programmer
Atmel's AT89s Series USB programmer
popular site for 8052 MC
Category:Microcontrollers |
Use of jute processing wastes for treatment of wastewater contaminated with dye and other organics.
A study was conducted to examine the potential of jute processing waste (JPW) for the treatment of wastewater contaminated with dye and other organics generated from various activities associated with jute cultivation and fibre production. Adsorption studies in batch mode have been conducted using dye solution as an adsorbate and JPW as an adsorbent. A comparative adsorption study was made with standard adsorbents such as powdered and granular activated carbon (PAC and GAC, respectively). A maximum removal of 81.7% was obtained with methylene blue dye using JPW as compared to 61% using PAC and 40% using GAC under similar conditions. The adsorption potential of JPW was observed to be dependent on various parameters such as type of dye, initial dye concentration, pH and dosage of adsorbent. The batch sorption data conformed well to the Langmuir and Freundlich isotherms. However, lower BOD (33.3%) and COD (13.8%) removal from retting effluent was observed using JPW as compared to 75.6% BOD removal and 71.1% COD removal obtained with GAC. |
Background {#Sec1}
==========
Surgical treatment of glaucoma is indicated in cases of failure of medical treatment. Trabeculectomy is considered the standard surgical treatment of glaucoma. Non-penetrating glaucoma surgeries, e.g. viscocanalostomy and deep sclerectomy, are becoming good alternatives. Viscocanalostomy has fewer complications than trabeculectomy, e.g. bleb leak, hypotony and bleb-related infections \[[@CR1]--[@CR4]\].
Since the prevalence of both cataract and glaucoma increases with age, phakic patients who are scheduled for glaucoma surgery may also require cataract extraction, or patients scheduled for cataract surgery may be scheduled for combined surgery. Improvement of phacoemulsification techniques and stable anterior chamber depth with non-penetrating glaucoma procedures may favor combined viscocanalostomy and cataract surgery in patients with glaucoma and a coexisting cataract \[[@CR4]\].
A biodegradable porous collagen-glycosaminoglycan copolymer matrix implant (Ologen®) is a simple chemical analog of extracellular matrices and has been used as an adjuvant to increase the long-term success of trabeculectomy. The degradation time of this type of implant is around 180 days; this implant consists of porcine based, lyophilized, crosslinked type I atelocollagen (≥ 90%) and glycosaminoglycans (≤ 10%). During trabeculectomy surgery it is placed subconjunctivally and acts as a spacer to mechanically separate the subconjunctival and episcleral tissues to decrease subconjunctival fibrosis \[[@CR1], [@CR3]\].
The purpose of this study was to evaluate the use of Ologen® implant as an adjuvant in phaco-viscocanalostomy in patients with coexisting cataract and glaucoma. Our hypothesis is that using Ologen® implant as a spacer in the subscleral reservoir in phaco-viscocanalostomy reduces fibrosis and increase the success rate of this operation.
Methods {#Sec2}
=======
This study included 40 eyes from 40 patients that had primary open-angle glaucoma (POAG) with age-related cataract. The patients were recruited from the outpatient clinics of Alpha Vision Center, Zagazig, Egypt between August 2013 and January 2016. The study was approved by the Ethical Committee of Alpha Vision Center. The study adhered to the tenets of the Declaration of Helsinki.
Cases were included if they were ≥ 40 years old at the time of surgery, with POAG and age-related cataract. The diagnosis of open-angle glaucoma was based on history, clinical examination and typical glaucomatous visual field loss by Humphrey field analyzer (HFA; Carl Zeiss Meditec Inc., Oberkochen, Germany).
The indications for surgery were the presence of significant cataract interfering with vision (visual acuity ≤0.5) in the presence POAG. Patients were included if cataract was associated with uncontrolled glaucoma, (IOP \> 21 mmHg despite maximally tolerated medical therapy) or if the IOP was ≤21 mmHg with use of at least two antiglaucoma drugs with medication intolerance, poor patient compliance, patients could not attend medical supervision or had visual field deterioration.
Patients were excluded if they had closed-angle glaucoma, other types of open angle glaucoma (OAG), e.g. pigmentary glaucoma, inflammatory glaucoma or neovascular glaucoma, previous ocular trauma or surgery, lens subluxation or other eye diseases affecting the vision, e.g. anterior uveitis. Patients were also excluded if there was a large perforation of the Descemet's membrane with iris prolapse during surgery (cases with microperforation, which is defined as small perforation with no associated iris prolapse, occurring during surgery were not excluded) or if they had other intraoperative complications that might affect the IOP, e.g. vitreous loss.
A written informed consent was obtained from every patient after explanation of the procedure and the possible consequences of the surgery.
Eligible patients were randomized (using a computer-assisted program) to receive either phaco-viscocanalostomy (Phacovisco group), or phaco-viscocanalostomy with Ologen® implant (OloPhacovisco group).
Patient examinations {#Sec3}
--------------------
Patient histories were taken including age, gender, previous ocular surgery, trauma or any previous ocular inflammation, e.g. keratitis, iridocyclitis, etc. Slit-lamp examination was done for examination of anterior chamber angle, determination of the type of glaucoma and the degree of cataract, measuring IOP (using Goldmann applanation tonometer), assessment of optic nerve head and retinal examination, if possible. Visual acuity (VA) was expressed in decimal fraction.
Surgical technique {#Sec4}
------------------
All operations were carried out by (AAMG) using peribulbar anesthesia.
After phacoemulsification, a traction suture in the cornea was made using 8--0 polyglactin 910 (Vicryl®, Ethicon Inc., Bridgewater, NJ, USA).
A fornix based conjunctival flap was fashioned and no cautery was applied. Hemostasis was only achieved by using a microsponge soaked with 1/100,000 adrenaline. A superficial scleral flap of 5 × 5 mm was made and dissection was done 2 mm into the clear cornea. A smaller deeper flap of 4 × 4 mm was made until deroofing of Schlemm's canal was achieved. Decompression of the eye was done through one of the paracentesis incisions, then blunt dissection with a microsponge was done to create a descematic window that extended over Descemet's membrane until 1 to 2 mm inside the clear cornea. Subsequently, the sides of the deep flap were freed from the adjacent sclera by Vannas scissors and the deep flap was cut by the same scissors (Fig. [1](#Fig1){ref-type="fig"}).Fig. 1Deep flap dissection. **a** Blunt dissection of deep scleral flap with microsponge to make a Descematic window. **b** Removal of deep flap by Vannas scissors
The juxtacanalicular trabeculum was removed and then the two openings of Schlemm's canal were cannulated on both sides using a viscocanalostomy cannula (Eagle labs, Rancho Cucamonga, CA, USA) and high-viscosity sodium hyaluronate (Healon GV; Abbott Medical Optic Inc., Santa Ana, CA, USA) was injected into the canal on both sides.
In the Phacovisco group, the superficial flap was closely sutured using four interrupted 10--0 nylon sutures, and then Healon GV was injected into the subscleral lake.
In the OloPhacovisco group, a 4 × 4 mm piece of Ologen® (Model: 862051 "12mm(D) x 1mm (H)") (Aeon Astron Europe B.V., Leiden, The Netherlands) was fashioned to be nearly of the same size as the cut deep scleral flap to fit inside the subscleral reservoir (Fig. [2](#Fig2){ref-type="fig"}). Then the superficial flap was sutured tightly over it using four interrupted 10--0 nylon sutures (Ethilon®, Ethicon Inc., Bridgewater, NJ, USA). Some air was injected from the paracentesis inside the eye. Then conjunctiva was closed using 8--0 polyglactin 910 sutures (Vicryl®, Ethicon Inc., Bridgewater, NJ, USA).Fig. 2Ologen insertion. Insertion of the biodegradable Ologen® implant at the site of the removed deep scleral flap
Postoperative management included topical administration of 0.5% moxifloxacin drops with a tapered schedule of 1% prednisolone acetate. Antiglaucoma medication was ceased after surgery in all cases.
Postoperatively, follow-up examination was done on days 1, 7, 14 and 30, then every 2 months for 2 years. The follow-up examination included assessment of IOP, VA and slit-lamp examination. Postoperative complications were recorded. Signs of inflammation, such as cell infiltration and flare, were recorded and graded from 0 to 4.
Nd:YAG laser goniopuncture was considered in all cases with elevated postoperative IOP above 21 mmHg after discontinuation of corticosteroid eye drops for at least 14 days. The Nd:YAG goniopuncture was performed using an Ellex Super Q YAG laser machine (Ellex Medical Lasers Ltd., Mawson Lakes, SA, Australia) and the gonioscopy mirror of Goldman three mirror universal laser lens (Ocular, Bellevue, Washington, USA) with a laser power setting of about 3 to 6 mJ and using about 2 to 15 shots aiming at the opening of the trabeculo-Descement window, the number of laser shots needed to open the Descemet's membrane was counted and recorded in each group. Antiglaucoma drugs were prescribed if the IOP was elevated above 21 mmHg after considering Nd:YAG laser goniopuncture.
The main outcome measures were the IOP at the 2-year follow-up and the overall success, which included complete success when IOP was ≤21 mmHg without any antiglaucoma drugs, and qualified success if IOP was ≤21 mmHg with the use of a single antiglaucoma medication. Failure was considered if IOP ≤ 21 mmHg could not be reached even with the use of a single antiglaucoma medication and after performing Nd:YAG laser goniopuncture, at any follow-up visit. The secondary outcome measures were surgical complications, the use and results of Nd:YAG laser goniopuncture and visual acuity results. The last data for failed cases were used for further statistical analysis.
Statistical analysis {#Sec5}
--------------------
The data were analyzed was using the software Statistical Package for Social Science (SPSS) version 16.0 (SPSS Inc., Chicago, Illinois, USA). Continuous variables were expressed as mean ± SD and compared using student t tests; two tailed test was used to detect significance between the two groups and one tailed t test was used to detect the significance before and after intervention in the same group. Mann-Whitney U test was used for nonparametric analysis. Categorical variables were expressed as percentages and were analyzed using the chi square (χ^2^) test. A value \< 0.05 was considered statistically significant.
Results {#Sec6}
=======
Forty-one eyes were allocated to the Phacovisco group and 40 eyes were allocated to the OloPhacovisco group. Two eyes in the Phacovisco group had perforation of Descemet's membrane with iris prolapse during surgery and were excluded. No cases were complicated with vitreous loss. The remaining 39 cases in the Phacovisco group and 40 cases in the OloPhacovisco group completed the follow-up period. There were no significant differences between the two groups regarding patient demographics or preoperative data (Table [1](#Tab1){ref-type="table"}).Table 1Demographic and preoperative data, and follow-up period of the studied groupsParametersPhaco-viscocanalostomy group (*n* = 39)Phaco-viscocanalostomy with Ologen® implant group (*n* = 40)*p* valueAge; yrs Range40--8141--79 Mean ± SD57.95 ± 9.6158.18 ± 9.000.91^†^Sex; n (%) Male16 (41.0)17 (42.5) Female23 (59.0)23 (57.5)0.89^‡^Visual acuity Range0.1--0.70.1--0.6 mean ± SD0.41 ± 0.180.37 ± 0.170.33^†^IOP^a^; mmHg Range15--2515--26 mean ± SD19.46 ± 3.2619.18 ± 3.190.69^†^Antiglaucoma drugs; n Range2--42--4 mean ± SD2.85 ± 0.872.88 ± 0.910.70^§^*IOP* intraocular pressure, *SD* standard deviation^a^measured with treatment^†^Two-tailed student t test^‡^Chi square test^§^Man-Whitney U test
No significant operative complications (other than the two case of anterior chamber perforation) were encountered in either group. The average operative time was 35 min, which was slightly longer in the OloPhacovisco group. No postoperative complications were encountered during the 2-year follow-up.
During the follow-up period, number of cases in both groups had IOP \> 21 mmHg after discontinuation of corticosteroid eye drops, for whom Nd:YAG laser goniopuncture was indicated; they were 21 cases (53.8%) in the Phacovisco group and 22 cases (55.0%) in the OloPhacovisco group. There was no statistically significant difference in their pre-laser goniopuncture IOP (*p* = 0.76). The mean IOP after goniopuncture was statistically significantly lower (*p* = 0.03), and the mean reduction of IOP after goniopuncture was also significantly lower (*p* = 0.03) in the OloPhacovisco group in comparison to the Phacovisco group. The Nd:YAG goniopuncture succeeded to make a statistically significant reduction in IOP to ≤21 mmHg in 5 of 21 cases in the Phacovisco group and 13 of 22 cases in the OloPhacovisco group (*p* \< 0.02 in each group). Comparing the number of laser shots needed to first open the Descemet's membrane in the two groups, we found that in the OloPhacovisco group the mean number of laser shots was statistically significantly lower than in the Phacovisco group (Table [2](#Tab2){ref-type="table"}).Table 2Intraocular pressure (mmHg) results in cases with goniopunctureParametersPhaco-viscocanalostomy group (*n* = 21)Phaco-viscocanalostomy with Ologen® implant group (*n* = 22)*p* value^\*^IOP pre-goniopuncture Range22--4522--44 mean ± SD28.10 ± 6.3928.73 ± 6.290.76Number of shots Range8--162--9 mean ± SD11.47 ± 2.255.23 ± 1.85\< 0.001IOP post-goniopuncture Range15--3012--30 mean ± SD21.95 ± 4.0418.68 ± 5.400.03Changes of IOP, mean ± SD−6.14 ± 6.59−10.05 ± 4.020.03*IOP* intraocular pressure, *SD* standard deviation^\*^Two-tailed student t test
Comparing the preoperative and 2 years postoperative results in each group, improvement regarding visual acuity, decrease in antiglaucoma drug use and decrease in IOP were all statistically significant (Table [3](#Tab3){ref-type="table"}).Table 3Preoperative and 2 years postoperative resultsParametersPhaco-viscocanalostomy group (*n* = 39)Phaco-viscocanalostomy with Ologen® implant group (*n* = 40)PreoperativePostoperative*P* valuePreoperativePostoperative*P* valueVisual acuity Range0.1--0.70.5--1.00.1--0.60.5--1.0 mean ± SD0.41 ± 0.180.75 ± 0.18\< 0.001^†^0.37 ± 0.170.73 ± 0.19\< 0.001^†^IOP^a^; mmHg Range15--2515--2214--2613--21 mean ± SD19.46 ± 3.2616.85 ± 1.58\< 0.001^†^19.18 ± 3.1915.96 ± 1.79\< 0.001^†^Antiglaucoma drugs; n Range2--40--42--40--4 mean ± SD2.85 ± 0.870.64 ± 1.01\< 0.001^‡^2.88 ± 0.910.35 ± 0.86\< 0.001^‡^*IOP* intraocular pressure, *SD* standard deviation^a^measured with treatment^†^One-tailed student t test^‡^Man-Whitney U test
Two years postoperatively, the mean IOP showed a statistically significant decrease in the OloPhacovisco group compared to the Phacovisco group (*p* = 0.02), the use of antiglaucoma drugs was not significantly different between the two groups (*p* = 0.06), there was a statistically significant higher complete success rate in the OloPhacovisco group than the Phacovisco group (*p* = 0.04). Regarding eyes classified as failures, the results were not significantly different between the two groups (*p* = 0.67) and the results of visual acuity were not significantly different between the two groups (*p* = 0.63) (Table [4](#Tab4){ref-type="table"}).Table 4Results 2 years postoperativelyParametersPhaco-viscocanalostomy group (*n* = 39)Phaco-viscocanalostomy with Ologen® implant group (*n* = 40)*p* valueVisual acuity Range0.5--1.00.5--1.0 mean ± SD0.75 ± 0.180.73 ± 0.190.63^†^IOP^a^; mmHg Range15--2213--21 mean ± SD16.85 ± 1.5815.96 ± 1.790.02^†^Antiglaucoma drugs; n Range0--40--4 mean ± SD0.64 ± 1.010.35 ± 0.860.06^‡^Success results complete success, n (%)23 (59.0)32 (80.0)0.04^§^ qualified success, n (%)12 (30.8)5 (12.5)0.048^§^ failure, n (%)4 (10.3)3 (7.5)0.67^§^*IOP* intraocular pressure, *SD* standard deviation^a^measured without treatment^†^Two-tailed student t test^‡^Man-Whitney U test^§^Chi square test
Discussion {#Sec7}
==========
Non-penetrating glaucoma surgeries have a significant IOP reducing effect and offer some advantages over the conventional gold standard trabeculectomy for minimizing postoperative complications, such as excess filtration that may lead to prolonged flat anterior chamber, persistent hypotony and choroidal detachment and bleb-related complications, e.g. encysted bleb that may lead to late failure and bleb-related infections \[[@CR1]--[@CR4]\]. This study showed that there was a significant improvement of visual acuity, a significant reduction in IOP and a significant decrease in the use of antiglaucoma medications between the preoperative and postoperative results in both groups. At 2 years postoperatively the biodegradable Ologen® implant improved the success of phaco-viscocanalostomy, the IOP reduction was statistically significant in the OloPhacovisco group compared to the Phacovisco group. In addition, the number of cases with complete success were significantly higher in the OloPhacovisco group than the Phacovisico group. Since the Ologen® implant is porous, it allows aqueous fluid to percolate through it to reach the two ostia created in Schlemm's canal. The porous structure of Ologen® allows fibroblasts and myofibroblasts to grow into the pores and secrete a loose connective tissue matrix to reduce scar formation and wound contraction, which leads to improvement of surgical results.
The main site of resistance to aqueous outflow has been demonstrated at the site of the juxtacanalicular trabecular meshwork and the inner wall of Schlemm's canal \[[@CR5]\]. In viscocanalostomy, the removal of a part of this tissue during surgery will help to decrease IOP, which also can be achieved by restoring the normal trabecular channels through the Schlemm's canal by viscoelastic dilatation of the canal and creating two ostia of the canal at the site of the removal of the deep scleral flap through which aqueous fluid can flow circumferentially through the canal to the aqueous vein. Another mechanism that helps aqueous drainage, as described by Delarive et al. \[[@CR6]\], occurs in the interscleral space. They showed that new aqueous humor drainage vessels grow in the interscleral space and absorb aqueous fluid flowing through the trabeculo-Descemet window. The presence of Ologen® implant in this bleb can extend its survival and prevent its collapse. Another route for aqueous humor outflow in is into the suprachoroidal space, which can be achieved by removal of 90% of the sclera during the deep scleral dissection \[[@CR7]\].
In the original viscocanalostomy by Stegmann et al \[[@CR8]\], they injected Healon GV into the subscleral lake after the tight closure of the superficial scleral flap to decrease fibrin cross-linking, and early scarring and failure. The biodegradable Ologen® implant may be a better alternative to Healon GV as it lasts 3--6 months before degradation. Many authors have used the biodegradable implants successfully as a spacer in deep sclerectomy to prevent collapse of the superficial flap and decrease postoperative fibrosis \[[@CR9]--[@CR13]\]. The IOP lowering effect of viscocanalostomy in long-term periods has been confirmed by many studies \[[@CR14]--[@CR16]\]. The IOP lowering effect of non-penetrating glaucoma surgeries has been found to comparable to, but not better than, trabeculectomy, but non-penetrating surgeries cause fewer surgical complications \[[@CR2]--[@CR9]\]. The IOP lowering effect of Ologen® implant as an adjuvant to trabeculectomy has been confirmed in many studies \[[@CR1]--[@CR3], [@CR17]\].
Goniopuncture markedly improves the success rate of the surgical results. It makes a direct passage for aqueous fluid from the anterior chamber to the intrascleral lake. The Ologen® implant makes Nd:YAG laser goniopuncture much easier and more effective, and can be performed using a lower number of laser shots. This was attributed to the presence of the Ologen® implant stretching the Descemet's membrane and making its opening with Nd:YAG is much easier as well as facilitating its viewing by enhancing the contrast behind the Descemet's membrane.
Non-penetrating glaucoma surgeries give results comparable to trabeculectomy regarding IOP control, but with fewer complications \[[@CR4], [@CR9], [@CR15], [@CR16], [@CR18]--[@CR20]\]. It requires a longer learning curve, but it is safer than trabeculectomy. Dehan and Drusedau \[[@CR21]\] recommended non-penetrating glaucoma surgeries as a first line of treatment before medical therapy, especially in young patients. To our knowledge, this is the first study to use Ologen® implant in viscocanalostomy, which may broaden the scope for further work in this field.
The main limitations of this study are the relatively small sample size and short follow-up period.
Conclusions {#Sec8}
===========
The use of an adjunctive Ologen® implant with phaco-viscocanalostomy was found to be safe, and it provided more IOP reduction than phaco-viscocanalostomy alone. Although good success rate is achieved with visco-canalostomy especially with Olo group, goniopunture is very commonly required.
Larger randomized trials with longer follow-up periods are needed to confirm the safety and efficacy of this device in viscocanalostomy.
IOP
: Intraocular pressure
Nd:YAG
: Neodymium: yttrium-aluminum-garnet
OAG
: Open angle glaucoma
OloPhacovisco group
: Phaco-viscocanalostomy with Ologen® implant group
Phacovisco group
: Phaco-viscocanalostomy group
POAG
: Primary open-angle glaucoma
SPSS
: Statistical package for social science
VA
: Visual acuity
χ^2^
: Chi square
Not applicable
Funding {#FPar1}
=======
Not applicable
Availability of data and materials {#FPar2}
==================================
The data that support the findings of this study are available from \[Alpha Vision Center\] but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of \[Alpha Vision Center\].
AAMG had made substantial contributions to conception and design, choice of the title, acquisition, analysis and interpretation of data; he was the surgeon who performed all the surgeries, he made preoperative and postoperative evaluation of the cases, he was involved in drafting the manuscript and revising it critically for important intellectual content; read and approved the final version to be published. He have participated sufficiently in the work to take public responsibility for appropriate portions of the content; and agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved. BAEHA had made substantial contributions in revision and analysis of data; he was involved in drafting the manuscript and revising it critically for important intellectual content. He had read and approved the final version to be published. AL had made substantial contributions to conception and design, acquisition, statistical analysis and interpretation of data; he was involved and incorporated in writing of the manuscript; analysis and achievement of reviewers' remarks and changes. He had read and approved the final version to be published. AMA had made substantial contributions to preoperative evaluation, postoperative data collection, analysis and interpretation; read and approved the final version to be published. ASA had made substantial contributions in revision and analysis of data; he was involved in drafting the manuscript and revising it critically for important intellectual content and he had read and approved the final version to be published.
Ethics approval and consent to participate {#FPar3}
==========================================
The study was approved by the Ethical Committee of Alpha Vision Center. The study adhered to the tenets of the Declaration of Helsinki. A written informed consent was obtained from every patient after explanation of the procedure and the possible consequences of the surgery.
Consent for publication {#FPar4}
=======================
Not applicable
Competing interests {#FPar5}
===================
The authors declare that they have no competing interests.
Publisher's Note {#FPar6}
================
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
|
Q:
how to read a file in awk command
I have two files that look like:
**file1.txt**
"a","1","11","111"
"b","2","22","222"
"c","3","33","333"
"d","4","44","444"
"e","5","55","555"
"f","6","66","666"
**file2.txt**
"b"
"d"
"a"
"c"
"e"
"f"
I need to create a script that changes the order of file1 and begin with the order of file2. e.g.:
"b","2","22","222"
"d","4","44","444"
"a","1","11","111"
"c","3","33","333"
"e","5","55","555"
"f","6","66","666"
I created a command that looks like:
nawk '/^("b")/' file1 ; nawk '/^("d")/' file1 ; nawk '/^("a")/' file1 ; nawk '/^("c")/' file1 ; nawk '/^("e")/' file1 ; nawk '/^("f")/' file1
It does the trick, however I would like to further automate it, but don't know how to proceed. How could I create a command or variable that would look at line 1 of file2("b") and put it the above command, then look at line 2 of file2("d"), and put it in the above command, and so on. Basically if possible, I would like the command to look at file 2 and fill in the blanks in the above command. Any other more convenient commands you guys can suggest would be appreciated. Note that I currently have to manually insert the letters from file 2 in the above command.
The actual file may contain well over 100 lines
A:
awk -F, 'NR==FNR { a[$1]=$0; next }
($1 in a) { print a[$1] }' file1 file2
This reads all of file1 into memory, then prints in the order of file2. If file1 is very large, this may not be feasible.
This is a common Awk idiom; search the many near-duplicates if you need a more detailed explanation.
|
List of diplomatic missions in Greece
This page lists embassies and consulates posted in Greece. There are currently 85 embassies in Athens. In addition, there is a diplomatic liaison office of the Palestinian Authority, which does not have the full embassy status. Many other countries have non resident embassies or honorary consulates.
Embassies
Athens
Other posts in Athens
(Diplomatic Delegation)
(Representative Office)
(Taipei Representative Office)
Consulates-General
Athens
Thessaloniki
Ioannina
Komotini
Piraeus
Rhodes
Non-resident embassies
Resident in Rome
Resident in Paris
Resident in London
Resident in Geneva
Resident in elsewhere
(Cairo)
(Sofia)
(Holy See)
(Budapest)
(Brussels)
(Madrid)
(Holy See)
(Sofia)
(Vienna)
(San Marino)
Former embassies
External links
Full list of diplomatic missions in Greece
See also
Visa requirements for Greek citizens
Diplomatic
Greece |
288 F.Supp.2d 247 (2003)
Keith HARRIS, Petitioner,
v.
Christopher ARTUZ, Superintendent of Green Haven Correctional Facility, Respondent.
No. 97-CV-2135 JBW,
No. 03-MISC-0066(JBW).
United States District Court, E.D. New York.
August 26, 2003.
*248 *249 *250 Eleanor Jackson Piel, New York, NY, for Petitioner.
Cynthia Kean, Valerie A. DePalma, The Office of the District Attorney, Brooklyn, NY, for Respondent.
*251 MEMORANDUM, JUDGMENT & ORDER
WEINSTEIN, Senior District Judge.
Petitioner was convicted of murdering a man whom he allegedly attempted to rob of a shearling coat on the streets of Brooklyn. He was also convicted of assault for shooting another man in the hand during the incident. The evidence against him on all counts was primarily the testimony of four eyewitnesses, one of whom was the man who was purportedly shot in the hand. Medical records in possession of the defense indicate that the man who claimed to have been shot in the hand was in fact stabbed and not shot. As discussed below, these records contradict the testimony of all four of the prosecution's eyewitnesses, strongly suggesting the possibility that the witnesses colluded in their testimony in an effort to frame petitioner for a crime that was committed by one of them.
Hearings were held. Petitioner was present by telephone. Petitioner's habeas corpus counsel, appointed by this court, was present in person.
Because petitioner makes a serious allegation that his trial lawyer was ineffective, efforts were made by petitioner's counsel to procure his attendance. See Sparman v. Edwards, 154 F.3d 51, 52 (2d Cir.1998) (per curiam) ("[A] district court facing the question of constitutional ineffectiveness of counsel should, except in highly unusual circumstances, offer the assertedly ineffective attorney an opportunity to be heard and to present evidence, in the form of live testimony, affidavits, or briefs."). These efforts were unsuccessful.
For the reasons stated orally at the hearing on August 26, 2003, the application for a writ of habeas corpus is granted. This memorandum addresses petitioner's claims. The oral statements and findings at the hearing are deemed part of this memorandum.
I. Facts and Procedural History
Petitioner was put on trial primarily for the shooting of Benjamin Acevedo, allegedly because the victim would not give petitioner the shearling coat that he was wearing. The chief evidence against petitioner was the testimony of four eyewitnesses, all of whom knew the victim and were either related, romantically involved, or friends with each other. None of the witnesses knew petitioner.
The first witness, Gregory Deas, was a convicted felon who had previously (1) pled guilty to robbery with a gun; (2) been convicted in a separate incident of attempted first degree robbery with a knife; and (3) been convicted in yet another incident of illegal possession of a gun. Deas testified at petitioner's trial that a man whom he knew, Brian Coleman, approached him on the street wearing an "8-Ball" jacket. He was accompanied by another man, later identified by Deas as petitioner, whom he did not know. This other man was wearing a green army jacket. Coleman asked Deas for some money but Deas refused. Coleman then told Deas to "give me what you got" or else he would have the man in the green jacket shoot Deas. Trial Tr. at 73. When Deas refused, Coleman told the man in the green jacket to shoot him. According to Deas, the man drew a gun and pointed it at Deas, but Deas charged him as the trigger was pulled, with the result that Deas was shot in the hand. The man in the green jacket fell and dropped the gun.
Deas then ran down the street toward Benjamin Acevedo, telling him that "the dudes are shooting at us." Id. at 78. Deas knew Acevedo, who apparently had a relationship with Deas's sister, Kim Kent. According to Deas, the man in the green *252 jacket came up to Acevedo and said something which Deas could not hear. Acevedo took off the headphones of his Walkman radio and then the man shot him.
The second witness to the shooting, Augustus Cora, testified to much the same story. Cora, though unrelated to Gregory Deas and Kim Kent, stated at trial that he called them "Uncle Greg" and "Aunt Kim," respectively. Cora, who did not know either Coleman or the man in the green jacket, testified that he saw the man in the green jacket pull out a gun and point it at Deas. Deas then "went to smack [the gun] out of his hand" and the man in the green jacket "shot him in his hand." Id. at 117-18. Cora then saw the man in the green jacket approach Acevedo and tell him to give him his coat. Acevedo took off his Walkman headphones and said, "What?" The man then shot him. Cora later identified petitioner as the man in the green jacket.
The third witness to the shooting was Susan Mellieon, Cora's ex-girlfriend, who largely testified to the same facts and details as Cora. In particular, she stated that she heard a gunshot and witnessed the man in the army jacket pointing a gun at Deas. Id. at 16-37. She also identified petitioner as the man in the green jacket.
The fourth witness to the shooting was Kim Kent, Deas's sister. Kent testified that she had known the victim, Acevedo, for a long time. Just prior to the shooting they were in her apartment and "had a little argument because I came home late." Id. at 155. The extent of their relationship was not developed further at trial. Kent testified to the same story as Cora and Mellieon, but added that the shearling coat that Acevedo was wearing and that the man in the green jacket had demanded was in fact hers. She stated that she witnessed the man in the green army jacket "pull out the gun, [and] fire" at Deas. Id. at 160, 161. She also later identified petitioner as the man in the green jacket.
Much of the remaining evidence against petitioner was testimony from police officers. Briefly summarized, an officer testified that after speaking with some "civilians" in the parking lot of their precinct house, he and his partner observed two men, wearing an "eight-ball" jacket and a green army jacket, walking along Ralph Avenue about two to three blocks away. The two men split up. The officers followed, turned down Halsey Street, then received a radio call and turned down Howard Avenue, proceeding toward 106 Howard Avenue. When they arrived they went into the building and up onto the roof of the building, which was three or four stories tall. There they found petitioner, wearing a green army jacket, inside an air shaft.
Another officer testified that he and his partner received a radio call, spoke with two males, and proceeded to 106 Howard Street. They went into the building, up the stairs, and onto the roof after hearing a door slam. The officer also saw petitioner wearing a green army jacket in the air shaft.
No weapon was recovered. No forensic evidence was introduced suggesting that petitioner had fired a gun.
Petitioner testified in his own defense. Briefly stated, he claimed that he was walking home from a night at the movies in Manhattan when he heard two gunshots. He ducked down and saw two people running by, then got up and continued walking toward his home. As he was crossing the street, two men in a car pulled up beside him and said he was a "dead mother fucker." Id. at 218. He then ran into an apartment building, up to the roof and into the air shaft, where he was discovered by police.
*253 The jury, which had heard testimony from each of the eyewitnesses that a man in a green army jacket shot Deas in the hand, was never told that medical records showed that Deas was not shot, but was instead stabbed in the hand. Counsel did not seek to impeach Deas with the medical records and he at no time referred to the records during the trial. Defense counsel never suggested to the jury that the medical records might indicate that the four witnessesall close friends who knew the victim wellhad colluded to frame petitioner for a homicide that was in fact committed by one of them. Counsel did not suggest, for instance, that Kim Kent's argument with the victim might have supplied some motive for her brother Gregory Deas, a convicted violent felon, to shoot Acevedo. Counsel did not suggest that the four witnesses colluded to tell a consistent story inculpating petitioner in order to deflect suspicion from Deas.
To the contrary, defense counsel began his summation by stating, "There is no dispute that Gregory Deas was shot. There is no dispute that Benjamin Acevedo was murdered. I also suggest to you that there is no doubt that the guy in the green army jacket shot Gregory Deas and murdered Benjamin Acevedo. The question is, who was the man in the green army jacket." Id. at 249. Having for some reason conceded "facts" that were inaccurate, counsel adopted the dubious strategy of suggesting that all four eyewitnesses had misidentified petitioner as the shootereven though he was found by police blocks from the shooting, hiding in an air shaft and wearing a green army jacket. Counsel in fact told the jury, "I'm not suggesting to you, by any stretch of the imagination, that these people want to get [petitioner] Keith Harris per se. There is no reason for that. They never met with Keith Harris prior to the night this happened.... There is no reason for them to be out to get Keith Harris." Id. at 253.
Petitioner was convicted by the jury of second degree murder, first degree attempted robbery, second degree assault, and second degree criminal possession of a weapon. He was sentenced to consecutive terms of 25 years to life in prison for the murder and 5 to 15 years in prison for the attempted robbery. The other sentences were to run concurrent, yielding a total sentence of 30 years to life in prison.
The convictions were affirmed on appeal by the Appellate Division. Leave to appeal was denied by the New York Court of Appeals. Multiple state collateral proceedings yielded no relief.
In the instant application for a writ of habeas corpus, petitioner claims that (1) he was denied the effective assistance of counsel; (2) the prosecutor's failure to disclose serology reports denied petitioner due process of law; and (3) the prosecutor committed misconduct before the grand jury and at trial.
II. AEDPA
Under the Antiterrorism and Effective Death Penalty Act of 1996 ("AEDPA"), a federal court may grant a writ of habeas corpus to a state prisoner on a claim that was "adjudicated on the merits" in state court only if it concludes that the adjudication of the claim "(1) resulted in a decision that was contrary to, or involved an unreasonable application of, clearly established Federal law, as determined by the Supreme Court of the United States; or (2) resulted in a decision that was based on an unreasonable determination of the facts in light of the evidence presented in the State court proceeding." 28 U.S.C. § 2254(d).
An "adjudication on the merits" is a "substantive, rather than a procedural, *254 resolution of a federal claim." Sellan v. Kuhlman, 261 F.3d 303, 313 (2d Cir.2001) (quoting Aycox v. Lytle, 196 F.3d 1174, 1178 (10th Cir.1999)). Under the "contrary to" clause, "a federal habeas court may grant the writ if the state court arrives at a conclusion opposite to that reached by [the Supreme Court] on a question of law or if the state court decides a case differently than this Court has on a set of materially indistinguishable facts." Williams v. Taylor, 529 U.S. 362, 412-13, 120 S.Ct. 1495, 146 L.Ed.2d 389 (2000) (O'Connor, J., concurring and writing for the majority in this part). Under the "unreasonable application" clause, "a federal habeas court may grant the writ if the state court identifies the correct governing legal principle from this Court's decisions but unreasonably applies that principle to the facts of the prisoner's case." Id. at 413, 120 S.Ct. 1495. Under this standard, "a federal habeas court may not issue the writ simply because that court concludes in its independent judgment that the relevant state-court decision applied clearly established federal law erroneously or incorrectly. Rather, that application must also be unreasonable." Id. at 411, 120 S.Ct. 1495. In order to grant the writ there must be "some increment of incorrectness beyond error," although "the increment need not be great; otherwise, habeas relief would be limited to state court decisions so far off the mark as to suggest judicial incompetence." Francis S. v. Stone, 221 F.3d 100, 111 (2d Cir.2000) (internal quotation marks omitted).
"[F]ederal law, as determined by the Supreme Court, may as much be a generalized standard that must be followed, as a bright-line rule designed to effectuate such a standard in a particular context." Overton v. Newton, 295 F.3d 270, 278 (2d Cir. 2002); see also Yung v. Walker, 341 F.3d 104 (2d Cir.2003) (amended opinion) (district court's habeas decision that relied on precedent from the court of appeals is remanded for reconsideration in light of "the more general teachings" of Supreme Court decisions). The Court of Appeals for the Second Circuit has also indicated that habeas relief may be granted if a state court's decision was contrary to or an unreasonable application of "a reasonable extension" of Supreme Court jurisprudence. Torres v. Berbary, 340 F.3d 63, 72 (2d Cir.2003). Determination of factual issues made by a state court "shall be presumed to be correct," and the applicant "shall have the burden of rebutting the presumption of correctness by clear and convincing evidence." 28 U.S.C. § 2254(e)(1).
III. Exhaustion
In the past, a state prisoner's federal habeas petition had to be dismissed if the prisoner did not exhaust available state remedies as to any of his federal claims. See Rose v. Lundy, 455 U.S. 509, 522, 102 S.Ct. 1198, 71 L.Ed.2d 379 (1982). "This exhaustion requirement is ... grounded in principles of comity; in a federal system, the States should have the first opportunity to address and correct alleged violations of [a] state prisoner's federal rights." Coleman v. Thompson, 501 U.S. 722, 731, 111 S.Ct. 2546, 115 L.Ed.2d 640 (1991). The exhaustion requirement requires the petitioner to have presented to the state court "both the factual and legal premises of the claim he asserts in federal court." Daye v. Attorney General, 696 F.2d 186, 191 (2d Cir.1982) (en banc).
Pursuant to AEDPA, a district court may now, in its discretion, deny on the merits habeas petitions containing unexhausted claimsso-called "mixed petitions." See 28 U.S.C. § 2254(b)(2) ("An application for a writ of habeas corpus may be denied on the merits, notwithstanding *255 the failure of the applicant to exhaust the remedies available in the courts of the state."). In addition, the state may waive the exhaustion requirement, but a "State shall not be deemed to have waived the exhaustion requirement or be estopped from reliance upon the requirement unless the State, through counsel, expressly waives the requirement." Id. § 2254(b)(3); see also Ramos v. Keane, No. 98 CIV. 1604, 2000 WL 12142, *4, 2000 U.S. Dist. LEXIS 101, at *10 (S.D.N.Y.2000) (state's failure to raise exhaustion requirement does not waive the issue).
IV. Procedural Bar
A federal habeas court may not review a state prisoner's federal claims if those claims were defaulted in state court pursuant to an independent and adequate state procedural rule, "unless the prisoner can demonstrate cause for the default and actual prejudice as a result of the alleged violation of federal law, or demonstrate that failure to consider the claims will result in a fundamental miscarriage of justice." Coleman, 501 U.S. at 750, 111 S.Ct. 2546.
If a state court holding contains a plain statement that a claim is procedurally barred then the federal habeas court may not review it, even if the state court also rejected the claim on the merits in the alternative. See Harris v. Reed, 489 U.S. 255, 264 n. 10, 109 S.Ct. 1038, 103 L.Ed.2d 308 (1989) ("a state court need not fear reaching the merits of a federal claim in an alternative holding" so long as it explicitly invokes a state procedural rule as a separate basis for its decision).
When a state court "says that a claim is `not preserved for appellate review' and then ruled `in any event' on the merits, such a claim is not preserved." Glenn v. Bartlett, 98 F.3d 721, 724-25 (2d Cir.1996). When a state court "uses language such as `the defendant's remaining contentions are either unpreserved for appellate review or without merit,' the validity of the claim is preserved and is subject to federal review." Fama v. Comm'r of Corr. Svcs., 235 F.3d 804, 810 (2d Cir.2000). Where "a state court's ruling does not make clear whether a claim was rejected for procedural or substantive reasons and where the record does not otherwise preclude the possibility that the claim was denied on procedural grounds, AEDPA deference is not given, because we cannot say that the state court's decision was on the merits." Su v. Filion, 335 F.3d 119, 126 n. 3 (2d Cir.2003) (citing Miranda v. Bennett, 322 F.3d 171, 178 (2d Cir.2003)). This congeries of holdings leaves it an open question whether there are "situations in which, because of uncertainty as to what the state courts have held, no procedural bar exists and yet no AEDPA deference is required." Id.
V. Ineffective Assistance of Counsel
The Counsel Clause of the Sixth Amendment provides that a criminal defendant "shall enjoy the right ... to have the Assistance of Counsel for his defence." U.S. Const. amend. VI. This right to counsel is "the right to effective assistance of counsel." McMann v. Richardson, 397 U.S. 759, 771 n. 14, 90 S.Ct. 1441, 25 L.Ed.2d 763 (1970) (emphasis added). The Supreme Court has explained that in giving meaning to this requirement we must be guided by its purpose"to ensure a fair trial"and that therefore the "benchmark for judging any claim of ineffectiveness must be whether counsel's conduct so undermined the proper functioning of the adversarial process that the trial cannot be relied on as having produced a just result." Strickland v. Washington, 466 U.S. 668, 686, 104 S.Ct. 2052, 80 L.Ed.2d 674 (1984). In order to prevail on a Sixth Amendment *256 claim, a petitioner must prove both that counsel's representation "fell below an objective standard of reasonableness" measured under "prevailing professional norms," id. at 688, 104 S.Ct. 2052, and that "there is a reasonable probability that, but for counsel's unprofessional errors, the result of the proceeding would have been different," id. at 694, 104 S.Ct. 2052. See also Wiggins v. Smith, 539 U.S. ____, 123 S.Ct. 2527, 2542-43, 156 L.Ed.2d 471 (June 26, 2003); United States v. Eyman, 313 F.3d 741, 743 (2d Cir.2002). A "reasonable probability" is "a probability sufficient to undermine confidence in the outcome." Strickland, 466 U.S. at 694, 104 S.Ct. 2052.
The performance and prejudice prongs of Strickland may be addressed in either order, and "[i]f it is easier to dispose of an ineffectiveness claim on the ground of lack of sufficient prejudice ... that course should be followed." Id. at 697, 104 S.Ct. 2052. In evaluating the prejudice suffered by a petitioner as a result of counsel's deficient performance, the court looks to the "cumulative weight of error" in order to determine whether the prejudice "reache[s] the constitutional threshold." Lindstadt v. Keane, 239 F.3d 191, 202 (2d Cir.2001). The court must also keep in mind that "a verdict or conclusion only weakly supported by the record is more likely to have been affected by errors than one with overwhelming record support." Strickland, 466 U.S. at 696, 104 S.Ct. 2052. "The result of a [criminal] proceeding can be rendered unreliable, and hence the proceeding itself unfair, even if the errors of counsel cannot be shown by a preponderance of the evidence to have determined the outcome." Purdy v. Zeldes, 337 F.3d 253, 260 (2d Cir.2003) (quoting Strickland, 466 U.S. at 694, 104 S.Ct. 2052). Ineffective assistance may be demonstrated where counsel performs competently in some respects but not in others. See Eze v. Senkowski, 321 F.3d 110, 112 (2d Cir.2003).
As a general matter, strategic choices made by counsel after a thorough investigation of the facts and law are "virtually unchallengeable," though strategic choices "made after less than complete investigation are reasonable precisely to the extent that reasonable professional judgments support the limitations on investigation." Strickland, 466 U.S. at 690-91, 104 S.Ct. 2052. Counsel, in other words, "has a duty to make reasonable investigations or to make a reasonable decision that makes particular investigations unnecessary." Id. at 691, 104 S.Ct. 2052. Where counsel fails to make a reasonable investigation that is reasonably necessary to the defense, a court must conclude that the decision not to call an expert cannot have been based on strategic considerations and will thus be subject to review under Strickland's prejudice prong. See Pavel v. Hollins, 261 F.3d 210, 223 (2d Cir.2001) (counsel ineffective in a child sexual abuse case where his failure to call a medical expert was based on an insufficient investigation); Lindstadt, 239 F.3d at 201 (same). The court of appeals for the Second Circuit has recently gone so far as to imply that all of counsel's significant trial decisions must be justified by a sound strategya significant raising of the bar that would appear to require an unrealistic degree of perfection in counsel. See Eze, 321 F.3d at 136 (remanding to district court for factual hearing because it was "unable to assess with confidence whether strategic considerations accounted for ... counsel's decisions").
There is "a strong presumption that counsel's conduct falls within the wide range of reasonable professional assistance." Strickland, 466 U.S. at 689, 104 S.Ct. 2052.
*257 Each factual claim made in support of an allegation of ineffective assistance of counsel must be fairly presented to a state court before a federal habeas court may rule upon it. See Rodriguez v. Hoke, 928 F.2d 534, 538 (2d Cir.1991) (dismissing petition as unexhausted where petitioner's claim of ineffective assistance of counsel alleged more deficiencies before the habeas court than were presented to the state court, because "[t]he state courts should have been given the opportunity to consider all the circumstances and the cumulative effect of all the claims as a whole" (quotation omitted)). Where an additional factual claim in support of the ineffective-assistance allegation merely "supplements" the ineffectiveness claim and does not "fundamentally alter" it, dismissal is not required. Caballero v. Keane, 42 F.3d 738, 741 (2d Cir.1994).
VI. Certificate of Appealability
A certificate of appealability may be granted with respect to any one of petitioner's claims only if petitioner can make a substantial showing of the denial of a constitutional right. Petitioner has a right to seek a certificate of appealability from the Court of Appeals for the Second Circuit. See 28 U.S.C. § 2253; Miller-El v. Cockrell, 537 U.S. 322, 123 S.Ct. 1029, 154 L.Ed.2d 931 (2003). The court has taken into account the rule of section 2253(c)(3) of Title 28 of the United States Code that a certificate of appealability "shall indicate which specific issue or issues satisfy the [substantial showing of the denial of a constitutional right] required by paragraph (2)." See also Shabazz v. Artuz, 336 F.3d 154, 160 (2d Cir.2003).
This opinion complies with Miranda v. Bennett, 322 F.3d 171, 175-77 (2d Cir. 2003), and Rule 52 of the Federal Rules of Civil Procedure. No other issue open to consideration by this court has merit. See Sumner v. Mata, 449 U.S. 539, 548, 101 S.Ct. 764, 66 L.Ed.2d 722 (1981) ("a court need not elaborate or give reasons for rejecting claims which it regards as frivolous or totally without merit").
VII. Analysis of Ineffective Assistance of Counsel Claim
Petitioner claims that he was denied the effective assistance of counsel because trial counsel failed to impeach witness Deas with evidence that he was stabbed, not shot, in his hand. This claim was raised on direct appeal and rejected by the Appellate Division on the merits:
The defendant contends that he was deprived of the effective assistance of counsel because his counsel failed to impeach a witnesses's identification testimony, which was inconsistent and inaccurate. The defendant also finds fault with his counsel's failure to attack the credibility of four eyewitnesses on the ground that they were either friends or relatives of the victims. To prevail on a claim of ineffective assistance of counsel, the defendant must demonstrate that he was deprived of a fair trial because he received less than meaningful representation (see, People v. Flores, 84 N.Y.2d 184, 187, 615 N.Y.S.2d 662, 639 N.E.2d 19). The defendant's contentions are unsupported by the record. Indeed, the record shows that the defendant's counsel focused his cross-examination of the People's witnesses and his summation on the identification issue and explored the possibility of collaboration among the witnesses because of their familiarity with each other and with the victims. Accordingly, the defendant received meaningful representation (see, People v Flores, supra; People v. Badia, 159 A.D.2d 577, 578, 552 N.Y.S.2d 439).
People v. Harris, 211 A.D.2d 685, 622 N.Y.S.2d 61, 61 (App.Div.1995). Leave to *258 appeal to the New York Court of Appeals on this ground was denied. People v. Harris, 85 N.Y.2d 862, 624 N.Y.S.2d 381, 648 N.E.2d 801 (1995).
The Appellate Division, although acknowledging petitioner's claim that counsel was ineffective for failing to impeach Deas, did not in so many words analyze the claim in its decision. Nonetheless, the claim appears to have been reviewed on the merits. Review in the federal court thus proceeds under the deferential standards of AEDPA.
Petitioner must demonstrate that counsel's performance both fell below an objective standard of reasonableness and prejudiced him. The gravamen of the ineffective assistance claim is that if counsel had impeached Deas with the medical reports, not only his testimony but the testimony of all four witnesses concerning the shootings would have been severely undermined.
When this ineffective assistance claim was raised in the state courts, respondent refused to concede that the medical records indicated that Deas had in fact been stabbed rather than shot. That argument appears untenableor at least a jury could have found it so. The relevant medical records are the following:
A "Triage Form" for Gregory Deas from Woodhull Medical and Mental Health Center indicating, under "chief complaint," that Deas was "assaulted 30 min ago hand stab wound of right hand." "Laceration" is circled on the form, with the location indicated as "R hand."
An "Ambulance Call Report" for Gregory Deas in which the "chief complaint" indicates that Deas told personnel, "I was stabbed." The "presumptive diagnosis" is "stab R hand." Under "comments" is the statement that "pt. c/o stab wound to the hand."
An "Emergency Department Nursing Flow Chart" stating that Gregory Deas was in the hospital "to get hand R stitched." Under "assessment intervention" is written "lac to R hand yesterday," and "2" lac. to "R palm." The chart also indicates that Deas had previously had surgery for a gunshot to the groin area.
An Emergency Department form indicating as the "chief complaint" a "laceration to right hand." The treating physician's notes of the physical examination indicate "yesterday cut in Rt. Hand." The diagnosis is "Rt hand laceration." There is also a sketch of a hand with an indication of a V shape on the palm, with the two arms of the V labeled "2 cm" and "3 cm."
Mem. of Law in Support of [Habeas Application], Ex. B.
Attached to petitioner's memorandum of law are an affidavit and curriculum vitae from Howard Liang, M.D., an assistant professor of surgery at New York University School of Medicine. Dr. Liang states that after his review of these records,
I find no evidence that the injury on the patient's palm was the result of a gunshot wound. Bullets either leave entrance exit wounds or produce soft furrows in the soft tissue when passing tangentially. It would be nearly impossible to have a bullet make a sharp right angle turn in the palm, as drawn in the sketch. Moreover, there was no uncertainty at all in the diagnosis or in the description of the appearance of the injury by the health care workers involved with this patient's care.... Accordingly, it is my opinion based on my experience and the records I have examined and made with a reasonable degree of medical certainty that the patient treated in this case did not suffer a gunshot wound. *259 Liang Aff. at 2. Dr. Liang testified to the same effect at an evidentiary hearing before this court.
Dr. Liang's sworn affidavit and testimony are instructive, but his expert opinion is not necessary to resolution of the instant matter. The medical records could have been used to impeach the testimony of the witnesses. As the trial court itself found, "The hospital records are clearly inconsistent with, and would tend to impeach and discredit Mr. Deas' trial testimony." Mar. 24, 1994 Decision [Denying Mot. to Vacate J.] at 6. Respondent does not in this court press its argument that the medical reports are inconclusive on the question of whether Deas suffered a stab wound or a gunshot wound.
Instead, respondent urges that defense counsel's failure to impeach Deas with these reports was motivated by trial strategy. Respondent notes, correctly, that defense counsel's defense to the charges was solely based on a theory of misidentification. Even if a trial counsel's strategy is unwise, tactical decisions will not be second-guessed in a habeas proceeding if they were made after research of the facts of a case and the law; strategic decisions will in general not be questioned when based on an informed review of the record and law. Deference is not owed, however, where counsel's tactical decisions were predicated on an incomplete investigation or where counsel's performance evidences unfamiliarity with the record.
In the instant case, defense counsel's failure to cross examine Deas and the other witnesses concerning the alleged shooting of Deas's hand cannot reasonably be dismissed as strategic. Simply stated, there was no downside to introducing the medical evidence for impeachment purposes. Defense counsel's theory of the casethat petitioner was misidentified by the four witnesseswould have been aided rather than impeded by the introduction of evidence undermining the veracity of the witnesses. At the very least, their observational powers would have been called into serious question. Bringing the medical records to the jury's attention would not introduce any inconsistency into the defense theory of the case, particularly since the defense counsel suggested that petitioner was not on the scene at all.
To the contrary, counsel's failure to impeach the witnesses foreclosed a strong line of defense that could have been presented to the jury in tandem with the misidentification theory or, more likely, could have supplanted the weak claim of misidentification altogether. Defense counsel, because he failed to use the medical records available to him, was unable to argue to the jury that Deas or possibly another of the four eyewitnesses was in fact Acevedo's killer. Deas's violent criminal historyhis convictions for armed robbery, his weapons violations, his prior gunshot woundswould have become relevant as more than a mere aspersion on his credibility. The fact that the victim had just been in an argument with Deas's sister would be probative. Disproving that Deas had been shot in the hand would also suggest that the other three eyewitnesses had colluded to protect Deas by pinning the crime on a passerby in a green army jacket.
Instead, by failing to impeach the witnesses counsel was forced to make concessions that were not only counterfactual but also had the effect of making petitioner's conviction almost inevitable. After defense counsel "conceded" that Deas had been shot and that both Deas and Acevedo were shot by a person in a green army jacket, it is difficult to imagine how any reasonable jury could have failed to convict a man who was found cowering in a rooftop *260 air shaft several blocks from the shooting, wearing a green army jacket, and identified by four eyewitnesses. Defense counsel sealed petitioner's fate by failing to introduce the critical impeachment evidence.
Because no reasonable trial strategy could have been adversely affected by introducing this evidence, it seems exceedingly unlikely that trial counsel was even aware of it. His failure to make use of the medical records is otherwise beyond reasonable explanation. Even if it could be shown that defense counsel was aware of the documents, "the failure to introduce this evidence, without any plausible justification, appears to be a significant dereliction by the defense." Eze, 321 F.3d at 126-27.
Respondent suggests that trial counsel's failure to impeach Deas with his medical records, even if error, was not prejudicial in light of the "overwhelming" evidence of petitioner's guilt, as established by the testimony of the other three eyewitnesses. That argument is unconvincing. If Deas was not shot, then the testimony of all four witnesses would necessarily have been impeached by the medical documents. The jury would have been forced to ponder how it could be that four witnesses all told police and testified in court that Deas had been shot, when solid medical evidence demonstrated that he had in fact been stabbed. Even without further guidance from skillful defense counsel, any reasonable juror would be forced to ponder how four friends managed to testify to the same, physically impossible details.
Petitioner was denied the effective assistance of trial counsel. Trial counsel's performance fell below an objective standard of reasonableness and there is a reasonable probability that, but for counsel's unprofessional errors, the result of the proceeding would have been different. The state courts' resolution of petitioner's ineffective assistance of trial counsel claim was contrary to and an unreasonable application of federal constitutional law set forth by the United States Supreme Court in Strickland. Habeas relief on the claim is warranted.
VIII. Analysis of Remaining Claims
The remainder of petitioner's claims are meritless and would not in themselves warrant habeas corpus relief.
Petitioner claims that the prosecutor's failure to disclose serology reports denied him due process of law. Spots of blood were found on petitioner's jacket and appear to have been analyzed by a police laboratory. Results seem not to have been turned over to the defense. It may be assumed for purposes of evaluating his petition that an analysis was performed and that serology test results demonstrate that none of the blood was that of Acevedo or Deas. Even so assuming, the claim is without merit.
The prosecution in a criminal matter has a constitutional obligation to disclose exculpatory evidence to the defendant. See Brady v. Maryland, 373 U.S. 83, 83 S.Ct. 1194, 10 L.Ed.2d 215 (1963), Giglio v. United States, 405 U.S. 150, 92 S.Ct. 763, 31 L.Ed.2d 104 (1972). "A finding of materiality of the evidence is required under Brady." Giglio v. United States, 405 U.S. 150, 154, 92 S.Ct. 763, 31 L.Ed.2d 104 (1972). Exculpatory evidence is considered material "if there is a reasonable probability that, had the evidence been disclosed to the defense, the result of the proceeding would have been different." Strickler v. Greene, 527 U.S. 263, 280, 119 S.Ct. 1936, 144 L.Ed.2d 286 (1999) (quoting United States v. Bagley, 473 U.S. 667, 682, 105 S.Ct. 3375, 87 L.Ed.2d 481 (1985)). *261 Nondisclosure merits relief only if the prosecution's failure "`undermines confidence in the outcome of the trial.'" Kyles v. Whitley, 514 U.S. 419, 434, 115 S.Ct. 1555, 131 L.Ed.2d 490 (1995) (quoting Bagley, 473 U.S. at 678, 105 S.Ct. 3375).
Even working under the assumption that tests showed the blood not to be that of Acevedo or Deas, the evidence was not exculpatory. No blood evidence was introduced at trial. There is no reasonable probability that petitioner would have been found not guilty by the jury if the serology report had been provided to the defense. Habeas relief on this ground is not warranted.
Petitioner claims that the trial court lacked jurisdiction over the action because of the improper conduct of the prosecutor before the grand jury. The Fifth Amendment right to a grand jury presentation in felony cases is not applicable to the states. Alexander v. Louisiana, 405 U.S. 625, 633, 92 S.Ct. 1221, 31 L.Ed.2d 536 (1972). "Once a state itself creates such a right, however, due process may prevent it from causing the right to be forfeited in an arbitrary or fundamentally unfair manner." Michael v. Dalsheim, No. 90 CV 2959, 1991 WL 99368, *10, 1991 U.S. Dist. LEXIS 7273, at *30 (E.D.N.Y. May 22, 1991). Nonetheless, claims of deficiencies in state grand jury proceedings are generally not cognizable in a habeas corpus proceeding in federal court because any deficiencies have been rendered harmless by conviction at trial by a petit jury assessing petitioner's guilt under a heightened standard of proof. See Lopez v. Riley, 865 F.2d 30, 32 (2d Cir. 1989). That is the case in the instant matter. Habeas relief on this claim is not warranted.
In a memorandum of law in support of the habeas application, petitioner suggests that the prosecutor committed misconduct during the trial by failing to inform the jury that Deas perjured himself by testifying that he had been shot rather than stabbed. A conviction based on perjured testimony is analyzed under the Due Process Clause of the Fourteenth Amendment. Napue v. Illinois, 360 U.S. 264, 269, 79 S.Ct. 1173, 3 L.Ed.2d 1217 (1959). Under this standard, a conviction must be set aside if "the prosecution knew, or should have known, of the perjury," and "there is any reasonable likelihood that the false testimony could have affected the judgment of the jury." United States v. Agurs, 427 U.S. 97, 103, 96 S.Ct. 2392, 49 L.Ed.2d 342 (1976). The Court of Appeals for the Second Circuit has thus far declined to "draw the contours of the phrase `should have known.'" Drake v. Portuondo, 321 F.3d 338, 345 (2d Cir.2003). The federal Court of Appeals has stated that, because the Supreme Court has not clearly established that habeas relief is available in the complete absence of prosecutorial knowledge of perjury, AEDPA prevents granting of the writ on such grounds. Id. at 345 n. 2 (after AEDPA, habeas petitioners can no longer rely on Sanders v. Sullivan, 863 F.2d 218 (2d Cir.1988), in which habeas relief was granted in the absence of prosecutorial knowledge of perjury).
The prosecutor did not withhold evidence from the defense. There has been no showing of venality. It was not the responsibility of the prosecutor to present the case for petitioner, who was represented by counsel. Habeas relief on this claim is not warranted. Cf. Thomas v. Kuhlman, 255 F.Supp.2d 99, 113 (E.D.N.Y.2003) ("Where ... the prosecutor did not knowingly utilize false testimony and did not withhold from the defense the foundational evidence that would demonstrate the falseness of the witness's testimony, the burden lies on defense counsel rather than the prosecutor to call the jury's attention to *262 the relevant exculpatory evidence. To hold otherwise would be to require the prosecution to take on duties that are properly in the domain of defense counsel.").
IX. Conclusion
The petition for a writ of habeas corpus is granted based on petitioner's claim of ineffective assistance of counsel. The prisoner shall be released unless within sixty days the state commences prosecution or takes other action appropriate in light of this decision. This decision is stayed until all appellate proceedings are completed and a final mandate is received by this court.
No certificate of appealability is granted with respect to petitioner's remaining claims, petitioner having made no substantial showing of the denial of a constitutional right. Petitioner is reminded that he may seek a certificate of appealability on these claims from the Court of Appeals for the Second Circuit.
SO ORDERED.
|
Matthew Raymond Lindstrom Bio Info
Matthew Raymond Lindstrom...Graduated from Madison (ID) High School, where he also played basketball and football...Was named All-Conference and was also named Academic Athlete of the Year...Played two seasons at Ricks (ID) JC...Turned down a scholarship to the University of California to sign with the Mets (10th round of the 2002 Draft)...Threw the final pitch at Shea Stadium.
2013
Established career highs with 76 games and 20 holds in his first season with the White Sox … ranked among the American League relief leaders in GIDP per 9.0 IP (1st, 2.23), opponent GIDP (2nd, 15) and appearances (3rd) … the 20 holds led the Sox … the 76 appearances tied for the seventh-highest total in franchise history and were the most since Kelly Wunsch in 2000 (83) … his 60.2 IP and 46 strikeouts were the second most of his career … his 15 GIDP induced were the most by a Sox reliever since Tom McCarthy in 1989 (17) … induced a double play by the first batter he faced six times … posted a 1.45 ERA (5 ER/31.0 IP) on the road and 4.85 mark (16 ER/29.2 IP) at U.S. Cellular Field … worked 11.2 scoreless IP (13 games) during interleague play … surrendered nine earned runs over 15.1 IP in 23 appearances with no rest, compared to 12 earned runs in 45.1 IP with at least one day of rest … first batters faced hit .286 (20-70) … allowed 38.0 percent (50-19) of inherited runners to score … began the season with an eight-game scoreless streak (8.0 IP) from 4/3-20 … matched his career high (second time) with 2.1 scoreless IP on 4/5 vs. Seattle … earned his first win with the White Sox on 4/16 at Toronto … suffered his first loss and blown save on 4/21 vs. Minnesota (3 ER/0.2 IP) … worked 0.1 scoreless IP and earned the victory on 5/16 at Los Angeles-AL … made 14 consecutive scoreless appearances (11.2 IP) from 5/21-6/15 … registered four holds and induced four double plays during the streak … his scoreless streak ended on 6/20 at Minnesota when he allowed two unearned runs … did not allow an earned run over 17 straight outings (15.0 IP) from 5/21-6/28 (two unearned runs) … worked 1.2 scoreless IP and induced an inning-ending double play with the go-ahead runs on base (sixth inning) on 6/22 at Kansas City … made nine straight scoreless appearances from 7/7-25 (7.2 IP) … registered a 12-game scoreless appearance streak (11.0 IP) with 11 strikeouts and six holds from 8/13-9/8 … posted holds in four consecutive appearances from 8/13-21 … struck out a career-high four over 2.0 IP on 8/18 at Minnesota … suffered the loss after surrendering a RBI single to Omar Infante in the eighth inning on 9/11 vs. Detroit (Sox lost, 1-0) … made five straight scoreless appearances (4.0 IP) from 9/16-26 before allowing two runs on 9/28 vs. Kansas City … Chicago exercised a $4-million club option on his contract on 10/31.
2012Went 1-0 with a 2.68 ERA (14 ER/47.0 IP) and 40 strikeouts in a combined 46 games between Baltimore and Arizona ... set career lows in hits allowed (45), runs allowed (17), earned runs (14) and opponents average (.250) ... posted a 0.37 ERA (1 ER/24.1 IP) on the road, compared to a 5.16 mark (13 ER/22.2 IP) at home ... 11 of his first 12 appearances were scoreless (2 ER/13.0 IP) ... was on the disabled list from 5/11-6/27 with a strained ligament in his right middle finger, which included injury rehabilitation assignments with the Gulf Coast League Orioles and Class AA Bowie ... tossed a career-high 2.1 IP on 7/25 vs. Tampa Bay ... made 10 consecutive scoreless outings from 7/27-8/22 (11.2 IP) ... was traded by Baltimore in exchange for pitcher Joe Saunders on 8/26 ... 10 of his last 11 outings with the Diamondbacks were scoreless (1 ER/9.2 IP).2011Joined the Rockies in the offseason via trade from Houston for two Minor League pitchers
... Was on the Rockies Opening Day roster, the fifth straight season he has made an Opening Day roster
... Set a career-high by tallying a 3.00 ERA (54.0IP, 18ER), topping his 3.09 ERA he had in 2007 as a rookie with FLA
... Allowed a career-low 52 hits and 18 earned runs and tied his career best mark of allowing just 21 runs
... In his 63 appearances, (fourth on COL), held hitters to a .256 (52-203) average, the lowest of his career
... Recorded a 1.16 ERA (23.1IP, 3ER), two saves and nine holds in his first 26 appearances
... Snapped his season-long 13.0 scoreless innings pitched streak on May 12 vs. NYM, allowing a two-run home run to Carlos
Beltran
... Streak began April 6 vs. LAD and tied for the team-high scoreless streak in 2011
... With 36 strikeouts to just 14 walks on the season, recorded his best strikeout to walk ration (2.57) since his rookie season in
2007 (2.95)
... 1.22 WHIP was the lowest of his career
... Went 2-2 with a 1.71 ERA (26.1IP, 5ER) in 32 road appearances
... Did not walk more than one batter in any of his 63 outings...Walked just 14 on the season, the fewest of his career
... Was placed on the 15-day disabled list, August 10-21 with a nerve injury in his upper right arm.2010Spent his first full season with the Astros after being traded from Florida 12/9/09...went 2-5, 4.39 (53.1
ip, 26 er) with a career-high 23 saves in 58 appearances...Was 23-for-29 in save situations...recorded 21 of his 23 saves prior to the All-Star Break, during which
he posted a 2.80 ERA (35.1 ip, 11 er) in 35 appearances...after the All-Star Break, went 0-4, 7.50 (18.0
ip, 15 er) in 23 appearances...Teamed up with RHP Brandon Lyon (20 saves) to become just the fifth set of teammates in MLB history,
the first Astros, to reach 20 saves in the same season for the same club...the last team to accomplish
the feat was the 1992 Reds, with Norm Charlton (26) and Rob Dibble (25)...Spent 15 days on the disabled list from 8/17-9/1 with a lower back strain...Converted 22 consecutive save opportunities from 4/28/09-5/21/10 (12 as a Marlin, 10 as an Astro)...Saved all three games in a sweep of the Cardinals from 5/11-13 at STL...became the first Astro to pick
up a save in each game of a three-game sweep since Brad Lidge did so from 9/5-7/05 at PHI...Recorded saves in four straight team games from 4/17-21, becoming the first Astros player to do so since
Jose Valverde from 8/30-9/2/08...earned the team's closers role by posting a 0.84 ERA (10.2 ip, 1 er) in
10 Spring Training appearances.2009Made 54 appearances out of the Florida bullpen,
compiling a 2-1 record and 5.89 ERA with 15 saves...was
15-for-17 in save opportunities, including 12 saves in 12
opportunities to finish the season...held opponents scoreless in 38 of his 54 games...of the 16 contests in which he allowed a run,
eight were multi-run affairs, including a career-high seven runs allowed on April 24 vs. PHI (0.2 IP)...on the season, never tossed
more than 1.0 inning and had 39 1.0-inning appearances...in those 39 games, was 2-0 with a 1.62 ERA (6ER)...in games where he
did not reach 1.0 inning, amassed a 25.92 ERA (24ER/8.1IP)...missed 31 games with a right elbow sprain, appearing from June 24
to July 31 on the 15-Day DL...made four rehab appearances, going 0-1 with a 4.50 ERA (2ER/4IP)...went 2-1 at home with a 8.23
ERA (25ER/27.1IP), while in 23 road appearances he surrendered just six earned runs (2.70 ERA, 20IP)...his best month was in
August, when he allowed only three earned runs over 11.0 innings pitched in 13 appearances (2.45 ERA).2008Tied a career-high with three wins and recorded five saves in 66
games with Marlins...his 66 appearances ranked third on the
club...Earned first win of the season, April 27 at Milwaukee, issuing two
walks while striking out one in 1.0 inning of work...also recorded
wins on August 30 vs. New York and September 1 vs. Atlanta...Notched first career save, September 5 at St. Louis, tossing 1.0
perfect inning...recorded saves in five of his final nine appearances,
going five-of-six in save opportunities on the year...only
blown save came June 3 at Atlanta, allowing two runs on three
hits in 0.1 inning...Tossed 13.2 consecutive scoreless innings, July 5-August 7,
establishing a career-high...had previously thrown 12.2 scoreless
innings, August 7-September 1, 2007...Posted 1-1 record and 4.45 ERA in 34 games prior to the All-Star
break, compared to a 2-2 record and 1.86 ERA with five saves
after the break...Retired 39 of 66 first batters faced and allowed only two of 18
(11.1%) inherited runners to score...Registered his fifth save of the season in the final game ever to
be played at Shea Stadium, September 28.2007Spent entire season with Marlins, going 3-4 with 3.09 ERA in 71 relief outings ... earned first Major League win June 2 at Milwaukee,
picking up the final out in the seventh inning (stranded inherited runner) ... notched second career win August 10 with scoreless
eighth inning at New York-NL ... third win came in 13-8 victory September 11 vs. Washington, after he allowed an earned run in 1.0
inning of work and was charged with second blown save ... Named Marlins' Rookie of the Year by South Florida chapter of the Baseball Writers Association of America ... Recorded 62 strikeouts in 67.0 innings ... allowed 10 of 30 (33.3 %) inherited runners to score ... went 2-1 with 2.35 ERA in 32 games
after the All-Star Break, compared to 1-3 with 3.72 ERA in 39 games during season's first half ... was 2-1 with 1.19 ERA in final 23
appearances ... did not allow a run in seven Interleague games (7.1 IP) ... Allowed just two home runs in 67.0 innings... pitched 34.2 consecutive innings before allowing first home run of season to Andruw
Jones on July 1 vs. Atlanta ... His 62 strikeouts and 67.0 innings were second among NL rookie relievers, both behind Atlanta's Peter Moylan (63 SO, 90.0 IP).2006Spent the majority of the year with Binghamton (AA) of the Eastern League...his first 11 appearances of the season were with St.
Lucie (A) of the Florida State League...promoted to Double-A on May 26 and saw action in 35 games...all 46 of his outings came out of the bullpen...On July 9 at PNC Park in Pittsburgh, he picked up the save at the Futures All-Star Game...worked 1.0 inning with two strikeouts as the United States team turned back the World Team, 8-5...With Binghamton, he allowed five earned runs in his last 18.2 innings for a 2.41 ERA...in those 17 games, he gave up 14 hits, with
five walks and 26 strikeouts...had four saves in those contests...worked 2.0 innings on four occasions for Binghamton...struck out
four in a game twice: June 1 vs. Reading and July 21 vs. Portland...in 20 home games, he was 1-2 with a 2.31 ERA and four saves...in 23.1 innings, he gave up 17 hits with seven runs, six earned, 10 walks and 39 strikeouts...only was scored upon in two of his 11 outings at St. Lucie...Went 3-0 with 2.03 in 17 games with Ponce in the Puerto Rican Winter League.2005Appeared in 25 games out of the bullpen and made 10 starts during the year for Binghamton (AA) of the Eastern League...Of his first 13 appearances, 10 came as a starter...His last start was June 15th vs. New Hampshire...As a reliever, he was 2-1 with a 3.12 ERA...In 40.1 innings, he gave up 49 hits, 22 runs, 14 earned, with 35 walks and 36
strikeouts...As a starter, Matt was 0-4 with an 8.18 ERA...In 33.0 innings, he permitted 41 hits, 39 runs, 30 earned, with 30 walks
and 22 strikeouts...Went 2.0 innings, allowing one hit and no runs to defeat Bowie on May 10th...His other victory came against Portland on August
6th...In 3.0 innings, he allowed no runs on one hit with no walks and three strikeouts...In nine relief outings in July, he compiled a 3.14 ERA (five earned runs/14.1 innings)...Went 5.0 innings twice as a starter, April 15th vs. New Hampshire and June 10th vs. Norwich...His longest outing as a reliever was 3.0 innings {twice, July 9th at New Britain and August 6th (game two) vs. Pawtucket}...Was 0-0 with a 12.00 ERA in five games in relief for Grand Canyon of the Arizona Fall League...In 6.0 innings, he allowed 13 hits,
11 runs, eight earned, with seven walks and four strikeouts.2004In a combined 27 games (26 starts) with Capital City (A) of the South Atlantic League and St. Lucie (A) of the Florida State League, Matt was 8-7 with a 3.52 ERA in 135.2 innings...Allowed 140 hits with 70 runs, 53 earned, 30 walks and 114 strikeouts...Posted the ninth lowest ERA (3.52) in the entire organization...Made one relief outing on September 2nd in the second game of a double-header against Savannah...Hurled 7.0 shutout and hitless innings with no walks and seven strikeouts to turn back Charleston on May 15th...Struck out eight in 5.0 shutout innings vs. Greensboro on April 13th...Tossed 6.0 shutout innings with three hits to defeat Charleston on September 6th...Went 3-0 with a 2.12 ERA (10 earned runs in 29.2 innings) in five starts in June for St. Lucie...Yielded 21 hits, seven walks with 23 strikeouts during that span...Struck out a season-best nine batters with no walks and two earned runs to top Jupiter, 4-2, in a complete-game victory on July 24th...Went 2-1 with a 4.11 ERA in nine games in relief for Peoria in the Arizona Fall League...In 15.1 innings, he allowed 12 hits, seven runs, earned, with 10 walks and nine strikeouts.2003Named to the New York-Penn League All-Star team and Baseball America's short season All-Star team. |
# -*- coding: utf-8 -*-
require 'helper'
class TestRegressionSetColumn07 < Test::Unit::TestCase
def setup
setup_dir_var
end
def teardown
@tempfile.close(true)
end
def test_set_column07
@xlsx = 'set_column07.xlsx'
workbook = WriteXLSX.new(@io)
worksheet = workbook.add_worksheet
bold = workbook.add_format(:bold => 1)
italic = workbook.add_format(:italic => 1)
bold_italic = workbook.add_format(:bold => 1, :italic => 1)
data = [
[1, 2, 3, 4, 5],
[2, 4, 6, 8, 10],
[3, 6, 9, 12, 15]
]
worksheet.write('A1', 'Foo', italic)
worksheet.write('B1', 'Bar', bold)
worksheet.write('A2', data)
worksheet.set_row(12, nil, italic)
worksheet.set_column('F:F', nil, bold)
worksheet.write('F13', nil, bold_italic)
worksheet.insert_image('E12',
File.join(@test_dir, 'regression', 'images/logo.png'))
workbook.close
compare_for_regression
end
end
|
Layoffs At MTV “Purely Creative”
Today, The Hollywood Reporter has more information about Tuesday’s layoffs at MTV Networks.
First, THR said the number of axed employees was only “50-something” and not the 75 of previous reports. And, in an interview with MTV’s president of programming Tony DiSanto, THR learned that a majority of the layoffs were part of a broader reorganization of MTV.
“It was not done for financial reasons, it was purely creative — an overhaul of the organization to better meet the creative needs of MTV,” DiSanto told the industry trade.
DiSanto said that seven executives under him and his number two, Liz Gateley — about half of MTV’s development team — were let go, including senior VPs Maira Suro and Aaron Meyerson, who worked on the scripted and unscripted sides, respectively.
DiSanto is now putting together a new creative structure for the network which will involve a New York-based comedy team led senior VP Brent Haynes and a bicoastal series development team led by Gateley, THR said.
Subscribe to Adweek
Featured Courses
Storytelling for Media ProfessionalsUse smart storytelling to build your brandLearn more >Digital Media Planning and BuyingBuild the foundation for successful media planning in a constantly evolving marketLearn more >Develop a Freelance Writing CareerBuild a thriving career as a freelancerLearn more >Digital Editorial ProductionMaster content management systems and the user experienceLearn more >See more Courses > |
Use built-in error correction for modem plugin?
Newer dialup modems (presumably the majority of those still in use) support error correction via V.42 LAPM and/or MNP. This may be sufficient to carry BTP without an intermediate reliability layer. If so, the reliability code (SLTP) could be removed, reducing the size of the codebase and making BTP connections harder to identify: they would simply be SLIP-framed random data. (SLIP-framed UDP packets full of random data would be another easily implemented option, if that would be less likely to stand out.)
AT commands for enabling error correction (on which modems?):
AT\N2: Require error correction, report NO CARRIER if the other end doesn't support it. |
Michael Mahoney-Johnson
Michael Anthony Mahoney-Johnson (born 6 November 1976) is an English former professional footballer who played in the Football League for Queens Park Rangers, Brighton & Hove Albion and Wycombe Wanderers.
Mahoney-Johnson played no League football after injuring his knee in a friendly match between QPR and the Jamaican national team in March 1998. He scored two League goals, both in a 6–3 defeat away to Peterborough United while on loan to Wycombe Wanderers.
References
Category:1976 births
Category:Living people
Category:Footballers from Paddington
Category:English footballers
Category:Association football forwards
Category:Queens Park Rangers F.C. players
Category:Wycombe Wanderers F.C. players
Category:Brighton & Hove Albion F.C. players
Category:Chesham United F.C. players
Category:English Football League players |
As leaves turned red, and as San Francisco segued into the smoky autumn of 1950, Edward Nevin lay dying in a hospital bed.
A rare bacteria had entered his urinary tract, made its way through his bloodstream, and clung to his heart -- a bacteria that had never been seen in the hospital’s history. Before researchers could hypothesize the bacteria's root cause, ten more patients were admitted with the same infection. Doctors were baffled: how could have this microbe presented itself?
For nearly thirty years, the incident remained a secret -- until Edward Nevin’s grandson set out to bring about justice.
What ensued was a series of terrifying revelations: for two decades, the United States government had intentionally doused 293 populated areas with bacteria. They'd done this with secrecy. They’d done this without informing citizens of potentially dangerous exposure. They’d done this without taking precautions to protect the public’s health and safety, and with no medical follow-up
And it had all started in 1950, with the spraying of San Francisco.
Biological Warfare in the U.S.
Biological warfare, or “germ warfare,” is the “use of biological toxins or infectious agents (bacteria, viruses, and fungi) with the intent to kill or incapacitate humans.” Historically, the United States’ involvement in bacterial weaponry has been driven by competition and paranoia.
In 1918, toward the tail end of World War I, the government briefly experimented with ricin -- a deadly, natural plant protein -- and the Chemical Warfare Service (CWS) was formed to oversee research and development. With the signing of the Geneva Protocol in 1925 (which prohibited the use of biological and chemical weapons in international warfare), the U.S. government’s interest waned: until the 1940s, biological weapons were largely considered impractical.
Shortly after Pearl Harbor, the United States changed its mind.
In 1942, President Roosevelt signed into action the first biological warfare program; backed by the National Academy of Sciences, the initiative sought to develop biological weapons and explore vulnerability of the U.S. to such attacks. A government body -- the War Research Service (WRS) -- was created to oversee these activities, and George W Merck (of the Merck Pharmaceutical Company) was appointed to leadership. At his team’s directive, Fort Detrick, the United States’ biological warfare “headquarters,” was constructed in the small town of of Frederick, Maryland.
The facility then embarked on top secret plan to stage open-air “biological warfare tests” using the unsuspecting American public.
Technicians test a bacteria at Fort Detrick (c.1940s)
By the the end of World War II, the government had amassed a massive arsenal of biological weapons (using anthrax and other various bacteria) -- all under the “strictest secrecy.” Soon, justification for continuing the research shifted to the “need for national defense.”
“Work in this field cannot be ignored in a time of peace,” Merck warned officials. “It must be continued on a sufficient scale to provide an adequate defense.”
The government agreed. Under the command of University of Wisconsin professor and bacteriologist Ira Baldwin, A Committee on Biological Warfare was established in 1948. When a subsequent report determined that the United States was “particularly susceptible” to attacks, a series of “open air tests” were ordered. The purpose of these efforts? To simulate the effects of a realistic biological warfare attack.
With a plan in place, a task force was sent to unleash bacteria on San Francisco.
San Francisco’s Bacteria Fiasco
A confidential government report written in 1951 -- “Special Report No. 142: Biological Warfare Trials at San Francisco, California, 20-27 September 1950” -- maps out the details of the city’s top-secret bacteria bombing. Through the tests, officials sought to accomplish three objectives: to study the “offensive possibilities of attacking a seaport city with a biological warfare aerosol,” to highlight the vulnerability of the country’s defense against such attacks, and to gain data on how bacteria affected a population.
Nowhere in the report was the welfare of San Franciscans mentioned; the tests proceeded without knowledge or consent from the public.
On the 20th, just three days after the 49ers made their NFL debut, the U.S. Army was deployed to San Francisco and began secretly showering the city with bacteria. Over a course of eight days, a ship puttered along the shoreline of the bay, releasing massive clouds of two different pathogens -- both of which were supposedly non-pathogenic, yet “realistic simulants that might be used in an attack.” In total, six “experimental warfare attacks” were carried out: four with Bacillus globigii, and two with Serratia marcescens.
Serratia marcescens, known for its blood-red coloration, is one of two bacterias sprayed over San Francisco in 1950
The Army blasted these chemicals in 30-minute spurts, producing huge clouds up to two miles in length, then proceeded to collect and assess dozens of samples a various collection spots across the city. As noted in the report, various aspects of each of the six tests were scrupulously monitored -- the time, the temperature, the wind speed, the humidity -- but the most important factor seemed to be brushed over: the well-being of the people being sprayed.
The samples collected yielded counts that gave some indication of how much bacteria was being inhaled. According to Leonard J. Cole, author of the biological warfare book Clouds of Secrecy, it was quite a bit:
“Nearly all of San Francisco received 500 particle minutes per liter. In other words, nearly every one of the 800,000 people in San Francisco exposed to the cloud at normal breathing rate (10 liters per minute) inhaled 5000 or more particles per minute during the several hours that they remained airborne.”
“Since the army’s bacteria ‘presented similar dosage patterns,’” he continues, “San Francisco residents were inhaling millions of the bacteria and particles every day during the week of the testing.”
San Francisco residents’ safety was wholly brushed over in the report, which promptly concluded “it’s entirely feasible to attack a seaport city with [biological warfare] aerosol.”
The Death of Edward Nevin
A month prior to the Army’s tests, a 75-year-old man named Edward Nevin checked into a San Francisco hospital to undergo a prostate gland surgery. The procedure went well, and after a month in the facility, he was on his way to recovery. Then, on September 29, two days after the Army’s tests, Nevin fell contracted a urinary tract infection and fell gravely ill.
When the man’s urine culture came back, it contained Serratia marcescens -- a bacteria that had not once been documented in the hospital’s long history.
In mid-October, the bacteria spread to Nevin’s heart, and he died.
Over the next six months, 10 more patients were admitted with infections caused by Serratia marcescens (all of whom later recovered after long, painful hospital stays). Like the rest of San Francisco’s citizens, the hospital’s doctors were unaware that the government had just clandestinely sprayed the city with Serratia marcescens. A panic ensued at the hospital, as researchers frantically struggled to determine how the bacteria infected these people.
The following year, a team of Stanford University researchers dug into the case; led by Dr. Richard Wheat, they published an article in the American Medical Association’s Archives of Internal Medicine exploring the facts: 11 patients infected over 6 months, aged 29-78, all with urinary tract infections caused by Serratia marcescens.
Despite the best efforts of some of the nation’s leading scientists, no source could be identified. Historically, Serratia marcescens had no record in San Francisco -- or California, for that matter.
The medical paper did not go unnoticed: when the government read it and realized that they’d caused a bacterial outbreak, they reeled to cover their tracks.
In August 1952, a secret, four-person investigation was ordered by Fort Detrick commander, General William Creasy to reassess the pathogenic nature of Serratia marcescens. In a two-page report, the investigators admitted that the bacteria was NOT an “ideal simulant,” and mused that the likelihood it had killed Nevin was considerable. Despite this, they proceeded to justify its continued use in biological tests:
“On the basis of our study, we conclude that Serratia marcescens is so rarely a cause of illness, and the illness resulting is predominantly so trivial, that its use as a simulant should be continued, even over populated areas.”
Throughout the report, investigators showed little remorse for the infected civilians. General Creasy was equally unphased: in a follow-up with Army officials, he promised to consult with the U.S. Public Health Service regarding the safety of Serratia marcescens -- but he never did.
And all the while, the public remained completely in the dark about what was going on.
Edward Nevin’s Grandson Fights for Justice
For 25 years, the government’s involvement in biological warfare testing -- and its use of civilians as unwitting guinea pigs -- remained top-secret. It’s a secret that likely would've gone on indefinitely if not for the efforts of a savvy Newsweek reporter named Drew Fetherston.
In November 1976, Fetherston exposed a number of biological tests performed in major cities by the Army and the CIA. Using his research, the San Francisco Chronicle uncovered the bacteria spraying that had occurred in its streets in 1950.
A sketch of Edward Nevin III -- Edward Nevin’s grandson
Edward Nevin III, a young lawyer in San Francisco, was waiting for a train in nearby Berkeley when he read the news. When he skimmed the name of the man who’d died from the bacteria -- Edward Nevin -- he reeled in shock. Good heavens, he muttered, that’s my grandfather!
Growing up, he’d always been told that his father’s father had died from kidney disease; now that he knew the bitter truth, he felt a need to exact revenge in the form of justice.
Nevin wrote the government, demanding access to case’s related documents; his request was denied. Though the Freedom of Information Act had just been enacted, the government maintained that all files were classified -- despite the fact the the media had already exposed the incident. In turn, Nevin sued the government to the tune of $11 million.
“Our motive [is] to obtain information,” he told a group of reporters who’d asked about the high amount, “would you fellows have paid attention if the claim were for only a few thousand?”
The government tried to dismiss the case on the grounds that they were immune from lawsuits involving “basic policy,” but the request was denied. Samuel Conti, a federal judge, was appointed to preside over the trial, and a date was set for mid-1977.
In light of this news, the government decided it was best to relinquish some of its information. In February 1977, an extensive history -- “U.S. Army Activity in the U.S. Biological Warfare Program, 1942-1977” -- was released, chronicling the country’s involvement in open-air testing for the first time in history. (Click the image below to view the document in its entirety):
From March to May of 1977, a series of hearings commenced in the Senate’s subcommittee on Health and Scientific Research. Medical experts, military leaders, and politicians ferociously debated whether or not Serratia marcescens -- the bacteria that killed Nevin -- was harmful. George H. Connell, the assistant to the director of the Centers for Disease Control (CDC), was especially vocal about its dangers:
“There is no such thing as a microorganism that cannot cause trouble. If you get the right concentration at the right place, at the right time, and in the right person, something is going to happen.”
“An increase in the number of Serratia marcescens,” added an unnamed microbiology professor, “can almost certainly cause disease in a healthy person...and serious disease in sick people.”
A copy of the full hearing transcript (all 300 pages) can be accessed by clicking the image below:
Meanwhile, Nevin III’s trial was postponed or rescheduled a half dozen times from 1977-1980. By the time a trial was set in stone for March 16, 1981, he’d already spent some $60,000 on legal fees, and was mentally and emotionally drained.
Nonetheless, he found solace in the case’s stipulatons: to win, all he’d have to do is show that there was a “probability” -- or greater than a 50% chance -- that the Army’s germs were responsible for his grandfather’s demise.
And as a lawyer, he’d have the opportunity to defend his own family in court.
As the trial began, the evidence seemed to be overwhelmingly in Nevin III’s favor: on September 26th and 27th, the government had sprayed the city with Serratia marcescens; on September 29th, Serratia marcescens showed up in his grandfather’s system -- and directly led to his death.
“We’ve been nothing but loyal to this country,” Nevin told the Judge Conti in his opening statement. “and we feel betrayed.”
His argument was threefold: the bacteria sprayed by the government directly caused his grandfather’s death; the Army used Serratia marcescens despite inadequate testing; and, since they’d sprayed it without consent, it had been “an act of negligence.” He questioned the legality of these actions:
“On what basis of law does the U.S. government of the United States justify the dispersion of a large collection of bacteria over the civilian population in an experiment...without informed consent?”
John Kern, the sharp, respected attorney representing the government, denied all of these allegations. The Serratia marcescens that killed Nevin and the Serratia marcescens released by the Army were two entirely different strains, he maintained; it was mere coincidence that the hospital had an outbreak around the same time.
Incredibly, Kern also attested that the Army needed no permission to spray the public without consent or knowledge. The Federal Torts Claims Act, established in 1946, gave the public the right to sue the Federal government -- but it came with limitations. Among them, a vaguely-worded “discretionary function” made the feds immune to suits in which they were “performing appropriately under policy.” The dousing of civilians in bacteria, contended Kern, qualified as such.
Kern then launched into a theatrical denial of Serratia marcescens’ harmful effects. “Every atom in this pen could decide right now to rise up about six inches and turn around 180 degrees,” he emphatically stated, with his pen thrusted in the air. That, he concluded, would be about as likely to happen as the bacteria killing someone. He continued, citing a series of Fort Detrick tests in the 1940s in which “volunteers” were exposed to millions of Serratia marcescens organisms and suffered only “some coughing, redness of the eye, and a fever,” with all symptoms subsiding after a few days.
One of Kern’s witnesses, a doctor for the biological warfare unit at Fort Detrick, agreed. In possibly the most callous statement of the day, he looked Nevin III in the eyes, and delivered his opinion: “The strain [wasn't] pathogenic,” he said, “[and] I would still spray SF again today.”
Dr. Wheat, the Stanford physician who’d investigated Nevin’s death in 1951, testified to a different tune.
“No similar organisms had ever been isolated in the hospital laboratory...then over a relatively short period of time, there were a number of cases,” he told the judge. “It’s very difficult for me to escape the conclusion that there is at least some probability, some causal effect [that the cases are related].”
Debates on the bacteria’s safety and the cause of Nevin’s death continued in this way for several hours, each side presenting a slew of medical “experts.” The government’s legal team maintained that the odds of Nevin’s death being linked to the Army’s bacteria spray were “one in a hundred;” Nevin III’s witnesses held the belief that the events were inseparably connected.
General William Creasy in uniform
When it came time to cross-examine military officials, the case suddenly took a jarring turn.
As General William Creasy, commander of the United States’ biological warfare unit, stepped to the stand, it became clear that presiding judge Conti was leaning toward the defense of the military. “When the government trotted out a witness in uniform,” noted one San Francisco Examiner court reporter, “it was all over.” After telling Nevin III that he was “wasting [his] time,” the General proceeded to defend the ethics of spraying people without their knowledge:
“I would find it completely impossible to conduct such a test trying to obtain informed consent. I could not have hoped to prevent panic in the uninformed world in which we live in telling them that we were going to spread non-pathogenic particles over their community; 99 percent of the people wouldn’t know what pathogenic meant.”
During the cross-examination, Judge Conti continually denied Nevin III’s reasoning, and even berated him for his lack of respect toward military officials. After several interruptions, Judge Conti altogether halted the questioning and called a recess. Out in the hallway, a belligerent General Creasy unsuccessfully challenged Nevin III to a fistfight.
Nevin III’s legal opponents were simply too powerful: he was swimming upstream and flailing.
When Judge Conti’s verdict was handed down on May 20, 1981, it surprised no one: the case was ruled in favor of the government.
The Army had been entitled to spray the population without consent, concluded Conti, under the “discretionary function exception” in the Federal Tort Claims Act. Despite a lack of convincing evidence, Conti also declared that the Army had skillfully chosen its bacteria -- and that it was not, in fact, harmless.
For Nevin III, whose grandfather had died from the organisms, this was not easy to swallow. He appealed, but the U.S. Court of Appeals did not overturn the verdict. He appealed again -- this time to the Supreme Court -- and received a similar response.
For Nevin III, justice was not served.
Aftermath
San Francisco’s incident was just one of 293 bacterial attacks staged by the United States government between 1950 and 1969. It was neither the most heinous, nor the deadliest.
In 1955, as an “experiment,” the CIA sprayed whooping cough bacteria over Tampa Bay, Florida. Whooping cough cases in the area subsequently increased from 339 and one death in 1954, to 1,080 and 12 deaths in 1955 -- but no hard evidence has ever surfaced linking the two incidents. In an infamous 1966 test, federal agents crushed light bulbs containing trillions of bacteria on the New York Subway, exposing thousands of rush hour commuters; the government never followed up to see how many people fell ill.
Before a crowd at Fort Detrick in 1969, Richard Nixon terminated the offensive use of biological weapons in the United States, effectively ending open-air testing.
It wouldn’t be until 1977 that the public learned any of this was even going on -- and even then, the U.S. government never admitted its fault, or seemed to show any indication of remorse for its actions.
***
Serratia marcescens, the bacteria sprayed over San Francisco, has since been declared hazardous. “It can cause serious life-threatening illness,” wrote the FDA in 2005, “especially in patients with compromised immune systems.” Much other medical literature contends the same.
Today, Edward Nevin III is a practicing medical malpractice and personal injury lawyer in Petaluma, California. Though he lost the case in 1981, he succeeded in bringing to light many government actions that had previously been shrouded in secrecy.
“At least we are all aware of what can happen, even in this country,” Nevin Jr. said, shortly after the trial. “I just hope the story won’t be forgotten.”
This post was written by Zachary Crockett. Follow him on Twitter here, or Google Plus here.
To learn more about other biological warfare testing in the U.S., refer to Leonard J. Cole's incredibly well-researched history, Clouds of Secrecy. |
Adolescent Burmese Refugees Perspectives on Determinants of Health.
Over 70,000 Burmese refugees have resettled in the United States in the past decade. While Burmese adolescents quickly acculturate into American society, their perspectives on health are not well-known. The purpose of this study was to identify adolescent Burmese refugee perspectives on determinants of health and health-related experiences after resettlement. In this qualitative study, Burmese adolescents took photographs depicting health-related experiences that were used as elicitation tools during focus groups. These discussions were recorded, transcribed, and analyzed for themes. Participants described positive determinants of health, including family and church. Rampant tobacco use was identified by the participants as a determinant of poor health within the Burmese community. Notably, the participants were proud to serve as liaisons within their community, despite the stressful nature of this role. Our results highlight the need to screen this population for anxiety, secondary to serving as a liaison for their community, as well as tobacco use. |
/*$Id$*/
#include <stdio.h>
#include <string.h>
#include "srtdb.h"
#include "macdecls.h"
#ifdef CRAY
#include <fortran.h>
#endif
#define FORTRAN_TRUE ((Logical) 1)
#define FORTRAN_FALSE ((Logical) 0)
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_open_(_fcd filename, _fcd mode, Integer *handle)
{
int flen = _fcdlen(filename);
int mlen = _fcdlen(mode);
#else
Logical FATR srtdb_open_(const char *filename, const char *mode, Integer *handle,
const Integer flen, const Integer mlen)
{
#endif
char fbuf[256], mbuf[256];
int hbuf;
if (!fortchar_to_string(filename, flen, fbuf, sizeof(fbuf))) {
(void) fprintf(stderr, "srtdb_open: fbuf is too small, need=%d\n",
(int) flen);
return FORTRAN_FALSE;
}
if (!fortchar_to_string(mode, mlen, mbuf, sizeof(mbuf))) {
(void) fprintf(stderr, "srtdb_open: mbuf is too small, need=%d\n",
(int) mlen);
return FORTRAN_FALSE;
}
if (srtdb_open(fbuf, mbuf, &hbuf)) {
*handle = (Integer) hbuf;
return FORTRAN_TRUE;
}
else {
return FORTRAN_FALSE;
}
}
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_close_(const Integer *handle, _fcd mode)
{
int mlen = _fcdlen(mode);
#else
Logical FATR srtdb_close_(const Integer *handle, const char *mode, const int mlen)
{
#endif
char mbuf[256];
int hbuf = (int) *handle;
if (!fortchar_to_string(mode, mlen, mbuf, sizeof(mbuf))) {
(void) fprintf(stderr, "srtdb_close: mbuf is too small, need=%d\n", mlen);
return FORTRAN_FALSE;
}
if (srtdb_close(hbuf, mbuf))
return FORTRAN_TRUE;
else
return FORTRAN_FALSE;
}
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_get_info_(const Integer *handle, _fcd name,
Integer *ma_type, Integer *nelem, _fcd date)
{
int nlen = _fcdlen(name);
int dlen = _fcdlen(date);
#else
Logical FATR srtdb_get_info_(const Integer *handle, const char *name,
Integer *ma_type, Integer *nelem, char *date,
const int nlen, const int dlen)
{
#endif
int hbuf = (int) *handle;
char dbuf[26], nbuf[256];
int nelbuf, typebuf;
if (!fortchar_to_string(name, nlen, nbuf, sizeof(nbuf))) {
(void) fprintf(stderr, "srtdb_get_info: nbuf is too small, need=%d\n",
nlen);
return FORTRAN_FALSE;
}
if (dlen < 24) {
(void) fprintf(stderr, "srtdb_get_info: date must be > character*24\n");
return FORTRAN_FALSE;
}
if (srtdb_get_info(hbuf, nbuf, &typebuf, &nelbuf, dbuf)) {
*ma_type = (Integer) typebuf;
*nelem = (Integer) nelbuf;
if (typebuf == MT_CHAR) /* Fortran is ignorant of trailing null char */
*nelem = *nelem - 1;
if (!string_to_fortchar(date, dlen, dbuf)) {
(void) fprintf(stderr, "srtdb_get_info: nbuf is too small, need=%d\n",
nlen);
return FORTRAN_FALSE;
}
return FORTRAN_TRUE;
}
else {
return FORTRAN_FALSE;
}
}
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_put_(const Integer *handle, _fcd name, const Integer *ma_type,
const Integer *nelem, const void *array)
{
int nlen = _fcdlen(name);
#else
Logical FATR srtdb_put_(const Integer *handle, const char *name, const Integer *ma_type,
const Integer *nelem, const void *array, const int nlen)
{
#endif
int hbuf = (int) *handle;
char nbuf[256];
int nelbuf;
int typebuf;
if (!fortchar_to_string(name, nlen, nbuf, sizeof(nbuf))) {
(void) fprintf(stderr, "srtdb_put: nbuf is too small, need=%d\n",
nlen);
return FORTRAN_FALSE;
}
nelbuf = (int) *nelem;
typebuf= (int) *ma_type;
#ifdef DEBUG
printf("put: rtdb=%d, mat=%d, nel=%d, name=%s\n", hbuf, typebuf, nelbuf, nbuf);
fflush(stdout);
#endif
if (srtdb_put(hbuf, nbuf, typebuf, nelbuf, array))
return FORTRAN_TRUE;
else
return FORTRAN_FALSE;
}
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_get_(const Integer *handle, _fcd name,
const Integer *ma_type, const Integer *nelem,
void *array)
{
int nlen = _fcdlen(name);
#else
Logical FATR srtdb_get_(const Integer *handle, const char *name,
const Integer *ma_type, const Integer *nelem,
void *array, const int nlen)
{
#endif
int hbuf = (int) *handle;
char nbuf[256];
int nelbuf;
int typebuf;
if (!fortchar_to_string(name, nlen, nbuf, sizeof(nbuf))) {
(void) fprintf(stderr, "srtdb_get: nbuf is too small, need=%d\n",
nlen);
return FORTRAN_FALSE;
}
nelbuf = (int) *nelem;
typebuf= (int) *ma_type;
#ifdef DEBUG
printf("get: rtdb=%d, mat=%d, nel=%d, name=%s\n", hbuf, typebuf, nelbuf, nbuf);
fflush(stdout);
#endif
if (srtdb_get(hbuf, nbuf, typebuf, nelbuf, array)) {
return FORTRAN_TRUE;
}
else
return FORTRAN_FALSE;
}
Logical FATR srtdb_print_(const Integer *handle, const Logical *print_values)
{
int hbuf = (int) *handle;
int pbuf = (int) *print_values;
if (srtdb_print(hbuf, pbuf))
return FORTRAN_TRUE;
else
return FORTRAN_FALSE;
}
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_cput_(const Integer *handle, _fcd name,
const Integer *nelem,
_fcd farray)
{
int nlen = _fcdlen(name);
int alen = _fcdlen(farray);
char *array = _fcdtocp(farray);
#else
Logical FATR srtdb_cput_(const Integer *handle, const char *name,
const Integer *nelem,
const char *array, const int nlen, const int alen)
{
#endif
/*
Insert an array of Fortran character variables into the data base.
Each array element is striped of trailing blanks, terminated with CR,
and appended to the list. The entire array must fit into abuf.
*/
int hbuf = (int) *handle;
char nbuf[256];
char abuf[20480]=" ";
int nelbuf;
int typebuf;
int i, left;
char *next;
for (i=0, left=sizeof(abuf), next=abuf;
i<*nelem;
i++, array+=alen) {
#if defined(CRAY) && !defined(__crayx1)
_fcd element = _cptofcd(array, alen);
#elif defined(WIN32)
_fcd element;
element.string = array;
element.len = alen;
#elif defined(USE_FCD)
#error Do something about _fcd
#else
const char *element = array;
#endif
if (!fortchar_to_string(element, alen, next, left)) {
(void) fprintf(stderr, "srtdb_cput: abuf is too small, need=%d\n",
(int) (alen + sizeof(abuf) - left));
return FORTRAN_FALSE;
}
left -= strlen(next) + 1;
next += strlen(next) + 1;
if (i != (*nelem - 1))
*(next-1) = '\n';
}
if (!fortchar_to_string(name, nlen, nbuf, sizeof(nbuf))) {
(void) fprintf(stderr, "srtdb_cput: nbuf is too small, need=%d\n",
nlen);
return FORTRAN_FALSE;
}
nelbuf = strlen(abuf) + 1;
typebuf= (int) MT_CHAR;
#ifdef DEBUG
printf("cput: rtdb=%d, mat=%d, nel=%d, name=%s\n", hbuf, typebuf, nelbuf, nbuf);
fflush(stdout);
#endif
if (srtdb_put(hbuf, nbuf, typebuf, nelbuf, abuf))
return FORTRAN_TRUE;
else
return FORTRAN_FALSE;
}
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_cget_(const Integer *handle, _fcd name,
const Integer *nelem,
_fcd farray)
{
int nlen = _fcdlen(name);
int alen = _fcdlen(farray);
char *array = _fcdtocp(farray);
#else
Logical FATR srtdb_cget_(const Integer *handle, const char *name,
const Integer *nelem,
char *array, const int nlen, const int alen)
{
#endif
/*
Read an array of Fortran character variables from the data base.
Put stored the array as follows:
. Each array element is striped of trailing blanks, terminated with CR,
. and appended to the list. The entire array must fit into abuf.
*/
int hbuf = (int) *handle;
char nbuf[256];
char abuf[20480];
/* char abuf[10240];*/
int nelbuf;
int typebuf;
int i;
char *next;
if (!fortchar_to_string(name, nlen, nbuf, sizeof(nbuf))) {
(void) fprintf(stderr, "srtdb_cget: nbuf is too small, need=%d\n",
nlen);
return FORTRAN_FALSE;
}
nelbuf = sizeof(abuf);
typebuf= (int) MT_CHAR;
#ifdef DEBUG
printf("cget: rtdb=%d, mat=%d, nel=%d, name=%s\n", hbuf, typebuf, nelbuf, nbuf);
fflush(stdout);
#endif
if (!srtdb_get(hbuf, nbuf, typebuf, nelbuf, abuf))
return FORTRAN_FALSE; /* Not there */
for (i=0, next=strtok(abuf, "\n");
next;
i++, array+=alen, next=strtok((char *) 0, "\n")) {
#if defined(CRAY) && !defined(__crayx1)
_fcd element = _cptofcd(array, alen);
#elif defined(WIN32)
_fcd element;
element.string = array;
element.len = alen;
#elif defined(USE_FCD)
#error Do something about _fcd
#else
char *element = array;
#endif
if (i == *nelem) {
(void) fprintf(stderr, "srtdb_cget: array has too few elements\n");
(void) fprintf(stderr, "srtdb_cget: name was <<%s>>\n",name);
return FORTRAN_FALSE;
}
if (!string_to_fortchar(element, alen, next)) {
(void) fprintf(stderr, "srtdb_cget: array element is too small\n");
(void) fprintf(stderr, "srtdb_cget: name was <<%s>>\n",name);
return FORTRAN_FALSE;
}
}
return FORTRAN_TRUE;
}
#if (defined(_CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_first_(const Integer *handle, _fcd name)
#else
Logical FATR srtdb_first_(const Integer *handle, char *name, int nlen)
#endif
{
#if (defined(_CRAY) || defined(USE_FCD)) && !defined(__crayx1)
// dummy arg, value reassigned by string_to_fortchar in this case
int nlen = _fcdlen(name);
#endif
char nbuf[256];
if (srtdb_first((int) *handle, (int) sizeof(nbuf), nbuf) &&
string_to_fortchar(name, nlen, nbuf))
return FORTRAN_TRUE;
else
return FORTRAN_FALSE;
}
#if (defined(_CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_next_(const Integer *handle, _fcd name)
#else
Logical FATR srtdb_next_(const Integer *handle, char *name, int nlen)
#endif
{
#if (defined(_CRAY) || defined(USE_FCD)) && !defined(__crayx1)
// dummy arg, value reassigned by string_to_fortchar in this case
int nlen = _fcdlen(name);
#endif
char nbuf[256];
if (srtdb_next((int) *handle, (int) sizeof(nbuf), nbuf) &&
string_to_fortchar(name, nlen, nbuf))
return FORTRAN_TRUE;
else
return FORTRAN_FALSE;
}
#if (defined(CRAY) || defined(USE_FCD)) && !defined(__crayx1)
Logical FATR srtdb_delete_(const Integer *handle, _fcd name)
{
int nlen = _fcdlen(name);
#else
Logical FATR srtdb_delete_(const Integer *handle, const char *name, const int nlen)
{
#endif
int hbuf = (int) *handle;
char nbuf[256];
if (!fortchar_to_string(name, nlen, nbuf, sizeof(nbuf))) {
(void) fprintf(stderr, "srtdb_delete: nbuf is too small, need=%d\n",
nlen);
return FORTRAN_FALSE;
}
if (srtdb_delete(hbuf, nbuf))
return FORTRAN_TRUE;
else
return FORTRAN_FALSE;
}
extern void srtdb_print_usage(void);
void FATR srtdb_print_usage_()
{
srtdb_print_usage();
}
|
This study is utilizing prolonged, low level carbon monoxide (CO) exposure to produce limited brain damage which has previously been shown to produce hyperactivity in adult and 5-day-old rats. The difference in the two developmental stages is that the exposed infants recover from the hyperactivity while the adults do not. Through this model we hope to achieve the following broad objectives: 1) The first is to define neurochemical alterations, produced by CO exposure, which correlate with the development of hyperactivity at both ages. 2) The second is to define very carefully the behavioral and chemical events associated with the recovery of the young animals as they mature. 3) The third is to study the behavioral and chemical response of both types of hyperactive animal to amphetamine which is known to be therapeutic in minimal brain dysfunction accompanied by "hyperactivity" in children. Out findings to date can be summarized in two statements. 1) Our data show that there is a dose-effect relationship for the duration of CO exposure and the modification of motor behavior and that the relationship is related to age, sex and body weight. 2) The data clearly indicate that periods of CO exposure, in excess of 60 min, produce behavioral alterations and changes in brain norepinephrine, dopamine and 5-hydroxytryptamine which persist for long periods of time. The finding of a dose/duration relationship to the behavioral effect is an exceptionally important observation both in terms of understanding hypoxia and in the practical sense of establishing homogenous population for study. In this coming year we will concentrate our efforts on defining the neurochemical changes in the juvenile group (exposed at 5 days) and upon determining their response to amphetamine both as individuals and in groups. |
---
layout: "docs"
page_title: "Packer Plugins - Extend Packer"
---
# Packer Plugins
Plugins allow new functionality to be added to Packer without
modifying the core source code. Packer plugins are able to add new
commands, builders, provisioners, hooks, and more. In fact, much of Packer
itself is implemented by writing plugins that are simply distributed with
Packer. For example, all the commands, builders, provisioners, and more
that ship with Packer are implemented as Plugins that are simply hardcoded
to load with Packer.
This page will cover how to install and use plugins. If you're interested
in developing plugins, the documentation for that is available the
[developing plugins](/docs/extend/developing-plugins.html) page.
Because Packer is so young, there is no official listing of available
Packer plugins. Plugins are best found via Google. Typically, searching
"packer plugin _x_" will find what you're looking for if it exists. As
Packer gets older, an official plugin directory is planned.
## How Plugins Work
Packer plugins are completely separate, standalone applications that the
core of Packer starts and communicates with.
These plugin applications aren't meant to be run manually. Instead, Packer core executes
these plugin applications in a certain way and communicates with them.
For example, the VMware builder is actually a standalone binary named
`packer-builder-vmware`. The next time you run a Packer build, look at
your process list and you should see a handful of `packer-` prefixed
applications running.
## Installing Plugins
Plugins are installed by modifying the [core Packer configuration](/docs/other/core-configuration.html). Within
the core configuration, each component has a key/value mapping of the
plugin name to the actual plugin binary.
For example, if we're adding a new builder for CustomCloud, the core
Packer configuration may look like this:
<pre class="prettyprint">
{
"builders": {
"custom-cloud": "packer-builder-custom-cloud"
}
}
</pre>
In this case, the "custom-cloud" type is the type that is actually used for the value
of the "type" configuration key for the builder definition.
The value, "packer-builder-custom-cloud", is the path to the plugin binary.
It can be an absolute or relative path. If it is not an absolute path, then
the binary is searched for on the PATH. In the example above, Packer will
search for `packer-builder-custom-cloud` on the PATH.
After adding the plugin to the core Packer configuration, it is immediately
available on the next run of Packer. To uninstall a plugin, just remove it
from the core Packer configuration.
In addition to builders, other types of plugins can be installed. The full
list is below:
* `builders` - A key/value pair of builder type to the builder plugin
application.
* `commands` - A key/value pair of the command name to the command plugin
application. The command name is what is executed on the command line, like
`packer COMMAND`.
* `provisioners` - A key/value pair of the provisioner type to the
provisioner plugin application. The provisioner type is the value of the
"type" configuration used within templates.
|
We wanted to provide some additional details on what this will affect and recommendations on actions you should be taking.
The services that will be affected by this are:-
- URL Categorization- Malware Inspection
Importantly, the Microsoft Reputation Services that supports URL Filtering will be turned off on or shortly after the 31st December 2015.
To avoid service impacting issues due to these services no longer being available, or incorrect rule processing where rules rely on URL Categorization categories, we would strongly advise customers review and amend their TMG configurations as follows:-
- Review and amend any rules based on URL Categorization categories in your TMG policy
Any Allow and Deny rules that currently use URL Categories or URL Category Sets must be changed to remove the usage of URL filtering categories.
Using URL Sets or Domain Name Sets may provide limited replacement functionality or you may also want to consider a 3rd party URL filtering plug-in or upstream proxy service to provide replacement URL filtering functionality.
Note - If you have rules that are using URL filtering to allow traffic – HTTP traffic can be totally blocked after the service shutdown. Equally, if you use URL Filtering to block access to certain categories then these may be allowed after the change. There is also a possibility that performance issues will be seen if URL Filtering is left enabled after the MRS service is taken offline.
- Disable URL Filtering
After amending your TMG policy ensure you then disable URL Filtering. This can be done in the TMG Management Console in the Web Access Policy node by selecting URL Filtering and unchecking the “Enable URL Filtering” check-box. This is essential to avoid TMG trying to contact the MRS services after they go offline.
- Malware Inspection may continue to work but would not receive updated signatures
We would recommend implementing an alternative Anti-Virus solution and to disable Malware Inspection once this is in place.
As noted in the previous blog, Forefront Threat Management Gateway 2010, remains under extended support until April 14, 2020.
For details on moving from TMG to our new web publishing solutions please visit this URL:
Q1. Is it possible to use the MRS Cache to continue to benefit from URL Filtering after 31st December 2015?
A1. No, the MRS cache is a temporary in-memory cache of the latest lookups intended to provide internal efficiency optimizations. It does not provide a full offline cache and cannot be used for this purpose. There is no mechanism to have an offline database. |
Q:
How to extract public key from a .Net DLL in C#?
I want to extract public key, not public key token, in C# from a autenticode signed .Net DLL?
A:
To get a public key from an Autenticode signed .Net library use the following code:
Assembly assembly = Assembly.LoadFrom("dll_file_name");
X509Certificate certificate = assembly.ManifestModule.GetSignerCertificate();
byte[] publicKey = certificate.GetPublicKey();
But this will work only if the certificate was installed into Trusted Root Certification Authorities. Otherwise, GetSignerCertificate() returns null.
The second way allows to get a certificate even if it isn't in Trusted Root Certification Authorities.
X509Certificate executingCert = X509Certificate.CreateFromSignedFile("dll_file_name");
byte[] publicKey = certificate.GetPublicKey();
|
/*
Copyright 2020 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package controller
import (
"sigs.k8s.io/apiserver-builder-alpha/example/non-etcd/pkg/controller/burger"
)
func init() {
// AddToManagerFuncs is a list of functions to create controllers and add them to a manager.
AddToManagerFuncs = append(AddToManagerFuncs, burger.Add)
}
|
from __future__ import absolute_import
from __future__ import print_function
import veriloggen
import thread_ram_copy_pattern
expected_verilog = """
module test;
reg CLK;
reg RST;
blinkled
uut
(
.CLK(CLK),
.RST(RST)
);
initial begin
CLK = 0;
forever begin
#5 CLK = !CLK;
end
end
initial begin
RST = 0;
#100;
RST = 1;
#100;
RST = 0;
#10000;
$finish;
end
endmodule
module blinkled
(
input CLK,
input RST
);
reg [10-1:0] ram0_0_addr;
wire [32-1:0] ram0_0_rdata;
reg [32-1:0] ram0_0_wdata;
reg ram0_0_wenable;
ram0
inst_ram0
(
.CLK(CLK),
.ram0_0_addr(ram0_0_addr),
.ram0_0_rdata(ram0_0_rdata),
.ram0_0_wdata(ram0_0_wdata),
.ram0_0_wenable(ram0_0_wenable)
);
reg [10-1:0] ram1_0_addr;
wire [32-1:0] ram1_0_rdata;
reg [32-1:0] ram1_0_wdata;
reg ram1_0_wenable;
ram1
inst_ram1
(
.CLK(CLK),
.ram1_0_addr(ram1_0_addr),
.ram1_0_rdata(ram1_0_rdata),
.ram1_0_wdata(ram1_0_wdata),
.ram1_0_wenable(ram1_0_wenable)
);
reg [32-1:0] th_blink;
localparam th_blink_init = 0;
reg signed [32-1:0] _th_blink_times_0;
reg signed [32-1:0] _th_blink_i_1;
reg signed [32-1:0] _th_blink_wdata_2;
reg _ram0_cond_0_1;
reg [32-1:0] _copy_ram0_ram1_fsm;
localparam _copy_ram0_ram1_fsm_init = 0;
wire _copy_ram0_ram1_start_flag;
reg _copy_ram0_ram1_start;
reg _copy_ram0_ram1_end_flag;
reg _copy_ram0_ram1_term_sink;
reg _copy_ram0_ram1_source_busy;
reg _copy_ram0_ram1_sink_busy;
reg _copy_ram0_ram1_src_idle;
reg [3-1:0] _copy_ram0_ram1_src_source_mode;
reg [32-1:0] _copy_ram0_ram1_src_source_offset;
reg [33-1:0] _copy_ram0_ram1_src_source_size;
reg [32-1:0] _copy_ram0_ram1_src_source_stride;
reg [33-1:0] _copy_ram0_ram1_src_source_count;
reg [32-1:0] _copy_ram0_ram1_src_source_offset_buf;
reg [32-1:0] _copy_ram0_ram1_src_source_stride_buf;
reg [8-1:0] _copy_ram0_ram1_src_source_ram_sel;
reg [32-1:0] _copy_ram0_ram1_src_source_ram_raddr;
reg _copy_ram0_ram1_src_source_ram_renable;
wire [32-1:0] _copy_ram0_ram1_src_source_ram_rdata;
reg _copy_ram0_ram1_src_source_ram_rvalid;
reg [32-1:0] _copy_ram0_ram1_src_source_empty_data;
reg [3-1:0] _copy_ram0_ram1_dst_sink_mode;
reg [32-1:0] _copy_ram0_ram1_dst_sink_offset;
reg [33-1:0] _copy_ram0_ram1_dst_sink_size;
reg [32-1:0] _copy_ram0_ram1_dst_sink_stride;
reg [33-1:0] _copy_ram0_ram1_dst_sink_count;
reg [32-1:0] _copy_ram0_ram1_dst_sink_offset_buf;
reg [32-1:0] _copy_ram0_ram1_dst_sink_stride_buf;
reg [8-1:0] _copy_ram0_ram1_dst_sink_ram_sel;
reg [32-1:0] _copy_ram0_ram1_dst_sink_waddr;
reg _copy_ram0_ram1_dst_sink_wenable;
reg [32-1:0] _copy_ram0_ram1_dst_sink_wdata;
wire signed [32-1:0] copy_ram0_ram1_src_data;
wire signed [32-1:0] copy_ram0_ram1_dst_data;
assign copy_ram0_ram1_dst_data = copy_ram0_ram1_src_data;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_cur_offset_0;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_cur_offset_1;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_cur_offset_2;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_cur_offset_3;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_0;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_1;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_2;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_3;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_0;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_1;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_2;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_3;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_count_0;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_count_1;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_count_2;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_count_3;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_buf_0;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_buf_1;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_buf_2;
reg [33-1:0] _source_copy_ram0_ram1_src_pat_size_buf_3;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_buf_0;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_buf_1;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_buf_2;
reg [32-1:0] _source_copy_ram0_ram1_src_pat_stride_buf_3;
reg _set_flag_0;
reg _tmp_1;
reg _ram0_cond_1_1;
reg _ram0_cond_2_1;
reg _ram0_cond_2_2;
assign _copy_ram0_ram1_src_source_ram_rdata = (_copy_ram0_ram1_src_source_ram_sel == 1)? ram0_0_rdata : 0;
localparam _tmp_2 = 1;
wire [_tmp_2-1:0] _tmp_3;
assign _tmp_3 = _copy_ram0_ram1_src_source_ram_renable && (_copy_ram0_ram1_src_source_ram_sel == 1);
reg [_tmp_2-1:0] __tmp_3_1;
reg signed [32-1:0] __variable_wdata_0;
assign copy_ram0_ram1_src_data = __variable_wdata_0;
reg [32-1:0] _copy_ram0_ram1_src_source_pat_fsm_0;
localparam _copy_ram0_ram1_src_source_pat_fsm_0_init = 0;
wire [32-1:0] _copy_ram0_ram1_src_source_pat_all_offset;
assign _copy_ram0_ram1_src_source_pat_all_offset = _copy_ram0_ram1_src_source_offset_buf + _source_copy_ram0_ram1_src_pat_cur_offset_0 + _source_copy_ram0_ram1_src_pat_cur_offset_1 + _source_copy_ram0_ram1_src_pat_cur_offset_2 + _source_copy_ram0_ram1_src_pat_cur_offset_3;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_cur_offset_0;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_cur_offset_1;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_cur_offset_2;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_cur_offset_3;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_0;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_1;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_2;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_3;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_0;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_1;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_2;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_3;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_count_0;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_count_1;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_count_2;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_count_3;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_buf_0;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_buf_1;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_buf_2;
reg [33-1:0] _sink_copy_ram0_ram1_dst_pat_size_buf_3;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_buf_0;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_buf_1;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_buf_2;
reg [32-1:0] _sink_copy_ram0_ram1_dst_pat_stride_buf_3;
reg _set_flag_4;
reg [32-1:0] __copy_ram0_ram1_dst_sink_offset_0_1;
reg [32-1:0] __copy_ram0_ram1_dst_sink_offset_0_2;
reg [32-1:0] __copy_ram0_ram1_dst_sink_offset_0_3;
reg __stream_seq_0_cond_1_1;
reg __stream_seq_0_cond_1_2;
reg __stream_seq_0_cond_1_3;
reg [33-1:0] __sink_copy_ram0_ram1_dst_pat_size_0_2_1;
reg [33-1:0] __sink_copy_ram0_ram1_dst_pat_size_0_2_2;
reg [33-1:0] __sink_copy_ram0_ram1_dst_pat_size_0_2_3;
reg __stream_seq_0_cond_3_1;
reg __stream_seq_0_cond_3_2;
reg __stream_seq_0_cond_3_3;
reg __stream_seq_0_cond_4_1;
reg __stream_seq_0_cond_4_2;
reg __stream_seq_0_cond_4_3;
reg __stream_seq_0_cond_5_1;
reg __stream_seq_0_cond_5_2;
reg __stream_seq_0_cond_5_3;
reg __stream_seq_0_cond_6_1;
reg __stream_seq_0_cond_6_2;
reg __stream_seq_0_cond_6_3;
reg __set_flag_4_1;
reg __set_flag_4_2;
reg __set_flag_4_3;
reg _ram1_cond_0_1;
reg __copy_ram0_ram1_start_1;
reg __copy_ram0_ram1_start_2;
reg __copy_ram0_ram1_start_3;
reg __copy_ram0_ram1_start_4;
reg [32-1:0] _copy_ram0_ram1_dst_sink_pat_fsm_1;
localparam _copy_ram0_ram1_dst_sink_pat_fsm_1_init = 0;
wire [32-1:0] _copy_ram0_ram1_dst_sink_pat_all_offset;
assign _copy_ram0_ram1_dst_sink_pat_all_offset = _copy_ram0_ram1_dst_sink_offset_buf + _sink_copy_ram0_ram1_dst_pat_cur_offset_0 + _sink_copy_ram0_ram1_dst_pat_cur_offset_1 + _sink_copy_ram0_ram1_dst_pat_cur_offset_2 + _sink_copy_ram0_ram1_dst_pat_cur_offset_3;
reg _set_flag_5;
assign _copy_ram0_ram1_start_flag = (_set_flag_5)? 1 : 0;
wire _copy_ram0_ram1_done;
assign _copy_ram0_ram1_done = _copy_ram0_ram1_src_idle;
reg [2-1:0] _copy_ram0_ram1_sink_wait_count;
localparam _tmp_6 = 1;
wire [_tmp_6-1:0] _tmp_7;
assign _tmp_7 = _copy_ram0_ram1_fsm == 3;
reg [_tmp_6-1:0] __tmp_7_1;
reg [_tmp_6-1:0] __tmp_7_2;
reg [_tmp_6-1:0] __tmp_7_3;
reg [_tmp_6-1:0] __tmp_7_4;
localparam _tmp_8 = 1;
wire [_tmp_8-1:0] _tmp_9;
assign _tmp_9 = _copy_ram0_ram1_fsm == 3;
reg [_tmp_8-1:0] __tmp_9_1;
reg [_tmp_8-1:0] __tmp_9_2;
reg [_tmp_8-1:0] __tmp_9_3;
reg [_tmp_8-1:0] __tmp_9_4;
localparam _tmp_10 = 1;
wire [_tmp_10-1:0] _tmp_11;
assign _tmp_11 = _copy_ram0_ram1_fsm == 3;
reg [_tmp_10-1:0] __tmp_11_1;
reg [_tmp_10-1:0] __tmp_11_2;
reg [_tmp_10-1:0] __tmp_11_3;
reg [_tmp_10-1:0] __tmp_11_4;
localparam _tmp_12 = 1;
wire [_tmp_12-1:0] _tmp_13;
assign _tmp_13 = _copy_ram0_ram1_fsm == 3;
reg [_tmp_12-1:0] __tmp_13_1;
reg [_tmp_12-1:0] __tmp_13_2;
reg [_tmp_12-1:0] __tmp_13_3;
reg [_tmp_12-1:0] __tmp_13_4;
reg signed [32-1:0] _th_blink_sum_3;
reg _tmp_14;
reg _ram1_cond_1_1;
reg _ram1_cond_2_1;
reg _ram1_cond_2_2;
reg signed [32-1:0] _tmp_15;
reg signed [32-1:0] _th_blink_rdata_4;
always @(posedge CLK) begin
if(RST) begin
ram0_0_addr <= 0;
ram0_0_wdata <= 0;
ram0_0_wenable <= 0;
_ram0_cond_0_1 <= 0;
_ram0_cond_1_1 <= 0;
_tmp_1 <= 0;
_ram0_cond_2_1 <= 0;
_ram0_cond_2_2 <= 0;
end else begin
if(_ram0_cond_2_2) begin
_tmp_1 <= 0;
end
if(_ram0_cond_0_1) begin
ram0_0_wenable <= 0;
end
if(_ram0_cond_1_1) begin
_tmp_1 <= 1;
end
_ram0_cond_2_2 <= _ram0_cond_2_1;
if(th_blink == 4) begin
ram0_0_addr <= _th_blink_i_1;
ram0_0_wdata <= _th_blink_wdata_2;
ram0_0_wenable <= 1;
end
_ram0_cond_0_1 <= th_blink == 4;
if(_copy_ram0_ram1_src_source_ram_renable && (_copy_ram0_ram1_src_source_ram_sel == 1)) begin
ram0_0_addr <= _copy_ram0_ram1_src_source_ram_raddr;
end
_ram0_cond_1_1 <= _copy_ram0_ram1_src_source_ram_renable && (_copy_ram0_ram1_src_source_ram_sel == 1);
_ram0_cond_2_1 <= _copy_ram0_ram1_src_source_ram_renable && (_copy_ram0_ram1_src_source_ram_sel == 1);
end
end
always @(posedge CLK) begin
if(RST) begin
ram1_0_addr <= 0;
ram1_0_wdata <= 0;
ram1_0_wenable <= 0;
_ram1_cond_0_1 <= 0;
_ram1_cond_1_1 <= 0;
_tmp_14 <= 0;
_ram1_cond_2_1 <= 0;
_ram1_cond_2_2 <= 0;
end else begin
if(_ram1_cond_2_2) begin
_tmp_14 <= 0;
end
if(_ram1_cond_0_1) begin
ram1_0_wenable <= 0;
end
if(_ram1_cond_1_1) begin
_tmp_14 <= 1;
end
_ram1_cond_2_2 <= _ram1_cond_2_1;
if(_copy_ram0_ram1_dst_sink_wenable && (_copy_ram0_ram1_dst_sink_ram_sel == 2)) begin
ram1_0_addr <= _copy_ram0_ram1_dst_sink_waddr;
ram1_0_wdata <= _copy_ram0_ram1_dst_sink_wdata;
ram1_0_wenable <= 1;
end
_ram1_cond_0_1 <= _copy_ram0_ram1_dst_sink_wenable && (_copy_ram0_ram1_dst_sink_ram_sel == 2);
if(th_blink == 15) begin
ram1_0_addr <= _th_blink_i_1;
end
_ram1_cond_1_1 <= th_blink == 15;
_ram1_cond_2_1 <= th_blink == 15;
end
end
localparam th_blink_1 = 1;
localparam th_blink_2 = 2;
localparam th_blink_3 = 3;
localparam th_blink_4 = 4;
localparam th_blink_5 = 5;
localparam th_blink_6 = 6;
localparam th_blink_7 = 7;
localparam th_blink_8 = 8;
localparam th_blink_9 = 9;
localparam th_blink_10 = 10;
localparam th_blink_11 = 11;
localparam th_blink_12 = 12;
localparam th_blink_13 = 13;
localparam th_blink_14 = 14;
localparam th_blink_15 = 15;
localparam th_blink_16 = 16;
localparam th_blink_17 = 17;
localparam th_blink_18 = 18;
localparam th_blink_19 = 19;
localparam th_blink_20 = 20;
localparam th_blink_21 = 21;
always @(posedge CLK) begin
if(RST) begin
th_blink <= th_blink_init;
_th_blink_times_0 <= 0;
_th_blink_i_1 <= 0;
_th_blink_wdata_2 <= 0;
_th_blink_sum_3 <= 0;
_tmp_15 <= 0;
_th_blink_rdata_4 <= 0;
end else begin
case(th_blink)
th_blink_init: begin
_th_blink_times_0 <= 10;
th_blink <= th_blink_1;
end
th_blink_1: begin
_th_blink_i_1 <= 0;
th_blink <= th_blink_2;
end
th_blink_2: begin
if(_th_blink_i_1 < _th_blink_times_0) begin
th_blink <= th_blink_3;
end else begin
th_blink <= th_blink_7;
end
end
th_blink_3: begin
_th_blink_wdata_2 <= _th_blink_i_1;
th_blink <= th_blink_4;
end
th_blink_4: begin
th_blink <= th_blink_5;
end
th_blink_5: begin
$display("wdata = %d", _th_blink_wdata_2);
th_blink <= th_blink_6;
end
th_blink_6: begin
_th_blink_i_1 <= _th_blink_i_1 + 1;
th_blink <= th_blink_2;
end
th_blink_7: begin
th_blink <= th_blink_8;
end
th_blink_8: begin
th_blink <= th_blink_9;
end
th_blink_9: begin
th_blink <= th_blink_10;
end
th_blink_10: begin
th_blink <= th_blink_11;
end
th_blink_11: begin
if(!_copy_ram0_ram1_source_busy && !_copy_ram0_ram1_sink_busy) begin
th_blink <= th_blink_12;
end
end
th_blink_12: begin
_th_blink_sum_3 <= 0;
th_blink <= th_blink_13;
end
th_blink_13: begin
_th_blink_i_1 <= 0;
th_blink <= th_blink_14;
end
th_blink_14: begin
if(_th_blink_i_1 < _th_blink_times_0) begin
th_blink <= th_blink_15;
end else begin
th_blink <= th_blink_20;
end
end
th_blink_15: begin
if(_tmp_14) begin
_tmp_15 <= ram1_0_rdata;
end
if(_tmp_14) begin
th_blink <= th_blink_16;
end
end
th_blink_16: begin
_th_blink_rdata_4 <= _tmp_15;
th_blink <= th_blink_17;
end
th_blink_17: begin
_th_blink_sum_3 <= _th_blink_sum_3 + _th_blink_rdata_4;
th_blink <= th_blink_18;
end
th_blink_18: begin
$display("rdata = %d", _th_blink_rdata_4);
th_blink <= th_blink_19;
end
th_blink_19: begin
_th_blink_i_1 <= _th_blink_i_1 + 1;
th_blink <= th_blink_14;
end
th_blink_20: begin
$display("sum = %d", _th_blink_sum_3);
th_blink <= th_blink_21;
end
endcase
end
end
always @(posedge CLK) begin
if(RST) begin
_copy_ram0_ram1_src_idle <= 1;
_copy_ram0_ram1_src_source_ram_rvalid <= 0;
_copy_ram0_ram1_dst_sink_wenable <= 0;
_set_flag_0 <= 0;
_copy_ram0_ram1_src_source_mode <= 3'b0;
_copy_ram0_ram1_src_source_offset <= 0;
_source_copy_ram0_ram1_src_pat_size_0 <= 0;
_source_copy_ram0_ram1_src_pat_stride_0 <= 0;
_source_copy_ram0_ram1_src_pat_size_1 <= 0;
_source_copy_ram0_ram1_src_pat_stride_1 <= 0;
_source_copy_ram0_ram1_src_pat_size_2 <= 0;
_source_copy_ram0_ram1_src_pat_stride_2 <= 0;
_source_copy_ram0_ram1_src_pat_size_3 <= 0;
_source_copy_ram0_ram1_src_pat_stride_3 <= 0;
_copy_ram0_ram1_src_source_ram_sel <= 0;
__tmp_3_1 <= 0;
__variable_wdata_0 <= 0;
_copy_ram0_ram1_src_source_offset_buf <= 0;
_source_copy_ram0_ram1_src_pat_cur_offset_0 <= 0;
_source_copy_ram0_ram1_src_pat_cur_offset_1 <= 0;
_source_copy_ram0_ram1_src_pat_cur_offset_2 <= 0;
_source_copy_ram0_ram1_src_pat_cur_offset_3 <= 0;
_source_copy_ram0_ram1_src_pat_count_0 <= 0;
_source_copy_ram0_ram1_src_pat_count_1 <= 0;
_source_copy_ram0_ram1_src_pat_count_2 <= 0;
_source_copy_ram0_ram1_src_pat_count_3 <= 0;
_source_copy_ram0_ram1_src_pat_size_buf_0 <= 0;
_source_copy_ram0_ram1_src_pat_size_buf_1 <= 0;
_source_copy_ram0_ram1_src_pat_size_buf_2 <= 0;
_source_copy_ram0_ram1_src_pat_size_buf_3 <= 0;
_source_copy_ram0_ram1_src_pat_stride_buf_0 <= 0;
_source_copy_ram0_ram1_src_pat_stride_buf_1 <= 0;
_source_copy_ram0_ram1_src_pat_stride_buf_2 <= 0;
_source_copy_ram0_ram1_src_pat_stride_buf_3 <= 0;
_copy_ram0_ram1_src_source_ram_raddr <= 0;
_copy_ram0_ram1_src_source_ram_renable <= 0;
_set_flag_4 <= 0;
__copy_ram0_ram1_dst_sink_offset_0_1 <= 0;
__copy_ram0_ram1_dst_sink_offset_0_2 <= 0;
__copy_ram0_ram1_dst_sink_offset_0_3 <= 0;
__stream_seq_0_cond_1_1 <= 0;
__stream_seq_0_cond_1_2 <= 0;
__stream_seq_0_cond_1_3 <= 0;
_copy_ram0_ram1_dst_sink_mode <= 3'b0;
_copy_ram0_ram1_dst_sink_offset <= 0;
__sink_copy_ram0_ram1_dst_pat_size_0_2_1 <= 0;
__sink_copy_ram0_ram1_dst_pat_size_0_2_2 <= 0;
__sink_copy_ram0_ram1_dst_pat_size_0_2_3 <= 0;
__stream_seq_0_cond_3_1 <= 0;
__stream_seq_0_cond_3_2 <= 0;
__stream_seq_0_cond_3_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_0 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_0 <= 0;
__stream_seq_0_cond_4_1 <= 0;
__stream_seq_0_cond_4_2 <= 0;
__stream_seq_0_cond_4_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_1 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_1 <= 0;
__stream_seq_0_cond_5_1 <= 0;
__stream_seq_0_cond_5_2 <= 0;
__stream_seq_0_cond_5_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_2 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_2 <= 0;
__stream_seq_0_cond_6_1 <= 0;
__stream_seq_0_cond_6_2 <= 0;
__stream_seq_0_cond_6_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_3 <= 0;
__set_flag_4_1 <= 0;
__set_flag_4_2 <= 0;
__set_flag_4_3 <= 0;
_copy_ram0_ram1_dst_sink_ram_sel <= 0;
__copy_ram0_ram1_start_1 <= 0;
__copy_ram0_ram1_start_2 <= 0;
__copy_ram0_ram1_start_3 <= 0;
__copy_ram0_ram1_start_4 <= 0;
_copy_ram0_ram1_dst_sink_offset_buf <= 0;
_sink_copy_ram0_ram1_dst_pat_cur_offset_0 <= 0;
_sink_copy_ram0_ram1_dst_pat_cur_offset_1 <= 0;
_sink_copy_ram0_ram1_dst_pat_cur_offset_2 <= 0;
_sink_copy_ram0_ram1_dst_pat_cur_offset_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_0 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_1 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_2 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_buf_0 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_buf_1 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_buf_2 <= 0;
_sink_copy_ram0_ram1_dst_pat_size_buf_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_buf_0 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_buf_1 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_buf_2 <= 0;
_sink_copy_ram0_ram1_dst_pat_stride_buf_3 <= 0;
_copy_ram0_ram1_dst_sink_waddr <= 0;
_copy_ram0_ram1_dst_sink_wdata <= 0;
_set_flag_5 <= 0;
__tmp_7_1 <= 0;
__tmp_7_2 <= 0;
__tmp_7_3 <= 0;
__tmp_7_4 <= 0;
__tmp_9_1 <= 0;
__tmp_9_2 <= 0;
__tmp_9_3 <= 0;
__tmp_9_4 <= 0;
__tmp_11_1 <= 0;
__tmp_11_2 <= 0;
__tmp_11_3 <= 0;
__tmp_11_4 <= 0;
__tmp_13_1 <= 0;
__tmp_13_2 <= 0;
__tmp_13_3 <= 0;
__tmp_13_4 <= 0;
end else begin
if(__stream_seq_0_cond_1_3) begin
_copy_ram0_ram1_dst_sink_mode <= 3'b10;
_copy_ram0_ram1_dst_sink_offset <= __copy_ram0_ram1_dst_sink_offset_0_3;
end
if(__stream_seq_0_cond_3_3) begin
_sink_copy_ram0_ram1_dst_pat_size_0 <= __sink_copy_ram0_ram1_dst_pat_size_0_2_3;
_sink_copy_ram0_ram1_dst_pat_stride_0 <= -'sd1;
end
if(__stream_seq_0_cond_4_3) begin
_sink_copy_ram0_ram1_dst_pat_size_1 <= 1;
_sink_copy_ram0_ram1_dst_pat_stride_1 <= 0;
end
if(__stream_seq_0_cond_5_3) begin
_sink_copy_ram0_ram1_dst_pat_size_2 <= 1;
_sink_copy_ram0_ram1_dst_pat_stride_2 <= 0;
end
if(__stream_seq_0_cond_6_3) begin
_sink_copy_ram0_ram1_dst_pat_size_3 <= 1;
_sink_copy_ram0_ram1_dst_pat_stride_3 <= 0;
end
__copy_ram0_ram1_dst_sink_offset_0_3 <= __copy_ram0_ram1_dst_sink_offset_0_2;
__stream_seq_0_cond_1_3 <= __stream_seq_0_cond_1_2;
__sink_copy_ram0_ram1_dst_pat_size_0_2_3 <= __sink_copy_ram0_ram1_dst_pat_size_0_2_2;
__stream_seq_0_cond_3_3 <= __stream_seq_0_cond_3_2;
__stream_seq_0_cond_4_3 <= __stream_seq_0_cond_4_2;
__stream_seq_0_cond_5_3 <= __stream_seq_0_cond_5_2;
__stream_seq_0_cond_6_3 <= __stream_seq_0_cond_6_2;
__copy_ram0_ram1_dst_sink_offset_0_2 <= __copy_ram0_ram1_dst_sink_offset_0_1;
__stream_seq_0_cond_1_2 <= __stream_seq_0_cond_1_1;
__sink_copy_ram0_ram1_dst_pat_size_0_2_2 <= __sink_copy_ram0_ram1_dst_pat_size_0_2_1;
__stream_seq_0_cond_3_2 <= __stream_seq_0_cond_3_1;
__stream_seq_0_cond_4_2 <= __stream_seq_0_cond_4_1;
__stream_seq_0_cond_5_2 <= __stream_seq_0_cond_5_1;
__stream_seq_0_cond_6_2 <= __stream_seq_0_cond_6_1;
_copy_ram0_ram1_src_idle <= _copy_ram0_ram1_src_idle;
_copy_ram0_ram1_src_source_ram_rvalid <= 0;
_copy_ram0_ram1_dst_sink_wenable <= 0;
_set_flag_0 <= 0;
if(th_blink == 7) begin
_set_flag_0 <= 1;
end
if(_set_flag_0) begin
_copy_ram0_ram1_src_source_mode <= 3'b10;
_copy_ram0_ram1_src_source_offset <= 0;
end
if(_set_flag_0) begin
_source_copy_ram0_ram1_src_pat_size_0 <= _th_blink_times_0;
_source_copy_ram0_ram1_src_pat_stride_0 <= 1;
end
if(_set_flag_0) begin
_source_copy_ram0_ram1_src_pat_size_1 <= 1;
_source_copy_ram0_ram1_src_pat_stride_1 <= 0;
end
if(_set_flag_0) begin
_source_copy_ram0_ram1_src_pat_size_2 <= 1;
_source_copy_ram0_ram1_src_pat_stride_2 <= 0;
end
if(_set_flag_0) begin
_source_copy_ram0_ram1_src_pat_size_3 <= 1;
_source_copy_ram0_ram1_src_pat_stride_3 <= 0;
end
if(_set_flag_0) begin
_copy_ram0_ram1_src_source_ram_sel <= 1;
end
__tmp_3_1 <= _tmp_3;
if(__tmp_3_1) begin
_copy_ram0_ram1_src_source_ram_rvalid <= 1;
end
if(_copy_ram0_ram1_src_source_ram_rvalid) begin
__variable_wdata_0 <= _copy_ram0_ram1_src_source_ram_rdata;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_copy_ram0_ram1_src_idle <= 0;
_copy_ram0_ram1_src_source_offset_buf <= _copy_ram0_ram1_src_source_offset;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_cur_offset_0 <= 0;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_cur_offset_1 <= 0;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_cur_offset_2 <= 0;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_cur_offset_3 <= 0;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_count_0 <= _source_copy_ram0_ram1_src_pat_size_0 - 1;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_count_1 <= _source_copy_ram0_ram1_src_pat_size_1 - 1;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_count_2 <= _source_copy_ram0_ram1_src_pat_size_2 - 1;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_count_3 <= _source_copy_ram0_ram1_src_pat_size_3 - 1;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_size_buf_0 <= _source_copy_ram0_ram1_src_pat_size_0;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_size_buf_1 <= _source_copy_ram0_ram1_src_pat_size_1;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_size_buf_2 <= _source_copy_ram0_ram1_src_pat_size_2;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_size_buf_3 <= _source_copy_ram0_ram1_src_pat_size_3;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_stride_buf_0 <= _source_copy_ram0_ram1_src_pat_stride_0;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_stride_buf_1 <= _source_copy_ram0_ram1_src_pat_stride_1;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_stride_buf_2 <= _source_copy_ram0_ram1_src_pat_stride_2;
end
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_source_copy_ram0_ram1_src_pat_stride_buf_3 <= _source_copy_ram0_ram1_src_pat_stride_3;
end
if(_copy_ram0_ram1_src_source_pat_fsm_0 == 1) begin
_copy_ram0_ram1_src_source_ram_raddr <= _copy_ram0_ram1_src_source_pat_all_offset;
_copy_ram0_ram1_src_source_ram_renable <= 1;
end
if(_copy_ram0_ram1_src_source_pat_fsm_0 == 1) begin
_source_copy_ram0_ram1_src_pat_cur_offset_0 <= _source_copy_ram0_ram1_src_pat_cur_offset_0 + _source_copy_ram0_ram1_src_pat_stride_buf_0;
_source_copy_ram0_ram1_src_pat_count_0 <= _source_copy_ram0_ram1_src_pat_count_0 - 1;
end
if((_copy_ram0_ram1_src_source_pat_fsm_0 == 1) && (_source_copy_ram0_ram1_src_pat_count_0 == 0)) begin
_source_copy_ram0_ram1_src_pat_cur_offset_0 <= 0;
_source_copy_ram0_ram1_src_pat_count_0 <= _source_copy_ram0_ram1_src_pat_size_buf_0 - 1;
end
if((_copy_ram0_ram1_src_source_pat_fsm_0 == 1) && (_source_copy_ram0_ram1_src_pat_count_0 == 0)) begin
_source_copy_ram0_ram1_src_pat_cur_offset_1 <= _source_copy_ram0_ram1_src_pat_cur_offset_1 + _source_copy_ram0_ram1_src_pat_stride_buf_1;
_source_copy_ram0_ram1_src_pat_count_1 <= _source_copy_ram0_ram1_src_pat_count_1 - 1;
end
if((_copy_ram0_ram1_src_source_pat_fsm_0 == 1) && (_source_copy_ram0_ram1_src_pat_count_0 == 0) && (_source_copy_ram0_ram1_src_pat_count_1 == 0)) begin
_source_copy_ram0_ram1_src_pat_cur_offset_1 <= 0;
_source_copy_ram0_ram1_src_pat_count_1 <= _source_copy_ram0_ram1_src_pat_size_buf_1 - 1;
end
if((_copy_ram0_ram1_src_source_pat_fsm_0 == 1) && ((_source_copy_ram0_ram1_src_pat_count_0 == 0) && (_source_copy_ram0_ram1_src_pat_count_1 == 0))) begin
_source_copy_ram0_ram1_src_pat_cur_offset_2 <= _source_copy_ram0_ram1_src_pat_cur_offset_2 + _source_copy_ram0_ram1_src_pat_stride_buf_2;
_source_copy_ram0_ram1_src_pat_count_2 <= _source_copy_ram0_ram1_src_pat_count_2 - 1;
end
if((_copy_ram0_ram1_src_source_pat_fsm_0 == 1) && ((_source_copy_ram0_ram1_src_pat_count_0 == 0) && (_source_copy_ram0_ram1_src_pat_count_1 == 0)) && (_source_copy_ram0_ram1_src_pat_count_2 == 0)) begin
_source_copy_ram0_ram1_src_pat_cur_offset_2 <= 0;
_source_copy_ram0_ram1_src_pat_count_2 <= _source_copy_ram0_ram1_src_pat_size_buf_2 - 1;
end
if((_copy_ram0_ram1_src_source_pat_fsm_0 == 1) && ((_source_copy_ram0_ram1_src_pat_count_0 == 0) && (_source_copy_ram0_ram1_src_pat_count_1 == 0) && (_source_copy_ram0_ram1_src_pat_count_2 == 0))) begin
_source_copy_ram0_ram1_src_pat_cur_offset_3 <= _source_copy_ram0_ram1_src_pat_cur_offset_3 + _source_copy_ram0_ram1_src_pat_stride_buf_3;
_source_copy_ram0_ram1_src_pat_count_3 <= _source_copy_ram0_ram1_src_pat_count_3 - 1;
end
if((_copy_ram0_ram1_src_source_pat_fsm_0 == 1) && ((_source_copy_ram0_ram1_src_pat_count_0 == 0) && (_source_copy_ram0_ram1_src_pat_count_1 == 0) && (_source_copy_ram0_ram1_src_pat_count_2 == 0)) && (_source_copy_ram0_ram1_src_pat_count_3 == 0)) begin
_source_copy_ram0_ram1_src_pat_cur_offset_3 <= 0;
_source_copy_ram0_ram1_src_pat_count_3 <= _source_copy_ram0_ram1_src_pat_size_buf_3 - 1;
end
if(_copy_ram0_ram1_src_source_pat_fsm_0 == 2) begin
_copy_ram0_ram1_src_source_ram_renable <= 0;
_copy_ram0_ram1_src_idle <= 1;
end
_set_flag_4 <= 0;
if(th_blink == 8) begin
_set_flag_4 <= 1;
end
__copy_ram0_ram1_dst_sink_offset_0_1 <= _th_blink_times_0 - 1;
__stream_seq_0_cond_1_1 <= _set_flag_4;
__sink_copy_ram0_ram1_dst_pat_size_0_2_1 <= _th_blink_times_0;
__stream_seq_0_cond_3_1 <= _set_flag_4;
__stream_seq_0_cond_4_1 <= _set_flag_4;
__stream_seq_0_cond_5_1 <= _set_flag_4;
__stream_seq_0_cond_6_1 <= _set_flag_4;
__set_flag_4_1 <= _set_flag_4;
__set_flag_4_2 <= __set_flag_4_1;
__set_flag_4_3 <= __set_flag_4_2;
if(__set_flag_4_3) begin
_copy_ram0_ram1_dst_sink_ram_sel <= 2;
end
__copy_ram0_ram1_start_1 <= _copy_ram0_ram1_start;
__copy_ram0_ram1_start_2 <= __copy_ram0_ram1_start_1;
__copy_ram0_ram1_start_3 <= __copy_ram0_ram1_start_2;
__copy_ram0_ram1_start_4 <= __copy_ram0_ram1_start_3;
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_copy_ram0_ram1_dst_sink_offset_buf <= _copy_ram0_ram1_dst_sink_offset;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_0 <= 0;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_1 <= 0;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_2 <= 0;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_3 <= 0;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_count_0 <= _sink_copy_ram0_ram1_dst_pat_size_0 - 1;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_count_1 <= _sink_copy_ram0_ram1_dst_pat_size_1 - 1;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_count_2 <= _sink_copy_ram0_ram1_dst_pat_size_2 - 1;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_count_3 <= _sink_copy_ram0_ram1_dst_pat_size_3 - 1;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_size_buf_0 <= _sink_copy_ram0_ram1_dst_pat_size_0;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_size_buf_1 <= _sink_copy_ram0_ram1_dst_pat_size_1;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_size_buf_2 <= _sink_copy_ram0_ram1_dst_pat_size_2;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_size_buf_3 <= _sink_copy_ram0_ram1_dst_pat_size_3;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_stride_buf_0 <= _sink_copy_ram0_ram1_dst_pat_stride_0;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_stride_buf_1 <= _sink_copy_ram0_ram1_dst_pat_stride_1;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_stride_buf_2 <= _sink_copy_ram0_ram1_dst_pat_stride_2;
end
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_sink_copy_ram0_ram1_dst_pat_stride_buf_3 <= _sink_copy_ram0_ram1_dst_pat_stride_3;
end
if(_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) begin
_copy_ram0_ram1_dst_sink_waddr <= _copy_ram0_ram1_dst_sink_pat_all_offset;
_copy_ram0_ram1_dst_sink_wdata <= copy_ram0_ram1_dst_data;
_copy_ram0_ram1_dst_sink_wenable <= 1;
end
if(_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_0 <= _sink_copy_ram0_ram1_dst_pat_cur_offset_0 + _sink_copy_ram0_ram1_dst_pat_stride_buf_0;
_sink_copy_ram0_ram1_dst_pat_count_0 <= _sink_copy_ram0_ram1_dst_pat_count_0 - 1;
end
if((_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) && (_sink_copy_ram0_ram1_dst_pat_count_0 == 0)) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_0 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_0 <= _sink_copy_ram0_ram1_dst_pat_size_buf_0 - 1;
end
if((_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) && (_sink_copy_ram0_ram1_dst_pat_count_0 == 0)) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_1 <= _sink_copy_ram0_ram1_dst_pat_cur_offset_1 + _sink_copy_ram0_ram1_dst_pat_stride_buf_1;
_sink_copy_ram0_ram1_dst_pat_count_1 <= _sink_copy_ram0_ram1_dst_pat_count_1 - 1;
end
if((_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) && (_sink_copy_ram0_ram1_dst_pat_count_0 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_1 == 0)) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_1 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_1 <= _sink_copy_ram0_ram1_dst_pat_size_buf_1 - 1;
end
if((_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) && ((_sink_copy_ram0_ram1_dst_pat_count_0 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_1 == 0))) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_2 <= _sink_copy_ram0_ram1_dst_pat_cur_offset_2 + _sink_copy_ram0_ram1_dst_pat_stride_buf_2;
_sink_copy_ram0_ram1_dst_pat_count_2 <= _sink_copy_ram0_ram1_dst_pat_count_2 - 1;
end
if((_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) && ((_sink_copy_ram0_ram1_dst_pat_count_0 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_1 == 0)) && (_sink_copy_ram0_ram1_dst_pat_count_2 == 0)) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_2 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_2 <= _sink_copy_ram0_ram1_dst_pat_size_buf_2 - 1;
end
if((_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) && ((_sink_copy_ram0_ram1_dst_pat_count_0 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_1 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_2 == 0))) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_3 <= _sink_copy_ram0_ram1_dst_pat_cur_offset_3 + _sink_copy_ram0_ram1_dst_pat_stride_buf_3;
_sink_copy_ram0_ram1_dst_pat_count_3 <= _sink_copy_ram0_ram1_dst_pat_count_3 - 1;
end
if((_copy_ram0_ram1_dst_sink_pat_fsm_1 == 1) && ((_sink_copy_ram0_ram1_dst_pat_count_0 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_1 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_2 == 0)) && (_sink_copy_ram0_ram1_dst_pat_count_3 == 0)) begin
_sink_copy_ram0_ram1_dst_pat_cur_offset_3 <= 0;
_sink_copy_ram0_ram1_dst_pat_count_3 <= _sink_copy_ram0_ram1_dst_pat_size_buf_3 - 1;
end
_set_flag_5 <= 0;
if(th_blink == 9) begin
_set_flag_5 <= 1;
end
__tmp_7_1 <= _tmp_7;
__tmp_7_2 <= __tmp_7_1;
__tmp_7_3 <= __tmp_7_2;
__tmp_7_4 <= __tmp_7_3;
__tmp_9_1 <= _tmp_9;
__tmp_9_2 <= __tmp_9_1;
__tmp_9_3 <= __tmp_9_2;
__tmp_9_4 <= __tmp_9_3;
__tmp_11_1 <= _tmp_11;
__tmp_11_2 <= __tmp_11_1;
__tmp_11_3 <= __tmp_11_2;
__tmp_11_4 <= __tmp_11_3;
__tmp_13_1 <= _tmp_13;
__tmp_13_2 <= __tmp_13_1;
__tmp_13_3 <= __tmp_13_2;
__tmp_13_4 <= __tmp_13_3;
end
end
localparam _copy_ram0_ram1_fsm_1 = 1;
localparam _copy_ram0_ram1_fsm_2 = 2;
localparam _copy_ram0_ram1_fsm_3 = 3;
always @(posedge CLK) begin
if(RST) begin
_copy_ram0_ram1_fsm <= _copy_ram0_ram1_fsm_init;
_copy_ram0_ram1_start <= 0;
_copy_ram0_ram1_source_busy <= 0;
_copy_ram0_ram1_sink_busy <= 0;
_copy_ram0_ram1_sink_wait_count <= 0;
_copy_ram0_ram1_end_flag <= 0;
_copy_ram0_ram1_term_sink <= 0;
end else begin
_copy_ram0_ram1_start <= 0;
if((_copy_ram0_ram1_sink_wait_count == 1) && !((_copy_ram0_ram1_fsm == 0) && _copy_ram0_ram1_start_flag) && __tmp_7_4) begin
_copy_ram0_ram1_sink_busy <= 0;
end
if((_copy_ram0_ram1_fsm == 0) && _copy_ram0_ram1_start_flag) begin
_copy_ram0_ram1_sink_busy <= 1;
end
if(!((_copy_ram0_ram1_fsm == 0) && _copy_ram0_ram1_start_flag) && __tmp_9_4) begin
_copy_ram0_ram1_sink_wait_count <= _copy_ram0_ram1_sink_wait_count - 1;
end
if((_copy_ram0_ram1_fsm == 0) && _copy_ram0_ram1_start_flag && !__tmp_11_4) begin
_copy_ram0_ram1_sink_wait_count <= _copy_ram0_ram1_sink_wait_count + 1;
end
_copy_ram0_ram1_end_flag <= 0;
if(__tmp_13_4) begin
_copy_ram0_ram1_end_flag <= 1;
end
_copy_ram0_ram1_term_sink <= 0;
if(_copy_ram0_ram1_fsm == 3) begin
_copy_ram0_ram1_term_sink <= 1;
end
case(_copy_ram0_ram1_fsm)
_copy_ram0_ram1_fsm_init: begin
if(_copy_ram0_ram1_start_flag) begin
_copy_ram0_ram1_start <= 1;
_copy_ram0_ram1_source_busy <= 1;
end
if(_copy_ram0_ram1_start_flag) begin
_copy_ram0_ram1_fsm <= _copy_ram0_ram1_fsm_1;
end
end
_copy_ram0_ram1_fsm_1: begin
_copy_ram0_ram1_fsm <= _copy_ram0_ram1_fsm_2;
end
_copy_ram0_ram1_fsm_2: begin
if(_copy_ram0_ram1_done) begin
_copy_ram0_ram1_fsm <= _copy_ram0_ram1_fsm_3;
end
end
_copy_ram0_ram1_fsm_3: begin
_copy_ram0_ram1_source_busy <= 0;
_copy_ram0_ram1_fsm <= _copy_ram0_ram1_fsm_init;
end
endcase
end
end
localparam _copy_ram0_ram1_src_source_pat_fsm_0_1 = 1;
localparam _copy_ram0_ram1_src_source_pat_fsm_0_2 = 2;
always @(posedge CLK) begin
if(RST) begin
_copy_ram0_ram1_src_source_pat_fsm_0 <= _copy_ram0_ram1_src_source_pat_fsm_0_init;
end else begin
case(_copy_ram0_ram1_src_source_pat_fsm_0)
_copy_ram0_ram1_src_source_pat_fsm_0_init: begin
if(_copy_ram0_ram1_start && _copy_ram0_ram1_src_source_mode & 3'b10) begin
_copy_ram0_ram1_src_source_pat_fsm_0 <= _copy_ram0_ram1_src_source_pat_fsm_0_1;
end
end
_copy_ram0_ram1_src_source_pat_fsm_0_1: begin
if((_source_copy_ram0_ram1_src_pat_count_0 == 0) && (_source_copy_ram0_ram1_src_pat_count_1 == 0) && (_source_copy_ram0_ram1_src_pat_count_2 == 0) && (_source_copy_ram0_ram1_src_pat_count_3 == 0)) begin
_copy_ram0_ram1_src_source_pat_fsm_0 <= _copy_ram0_ram1_src_source_pat_fsm_0_2;
end
end
_copy_ram0_ram1_src_source_pat_fsm_0_2: begin
_copy_ram0_ram1_src_source_pat_fsm_0 <= _copy_ram0_ram1_src_source_pat_fsm_0_init;
end
endcase
end
end
localparam _copy_ram0_ram1_dst_sink_pat_fsm_1_1 = 1;
always @(posedge CLK) begin
if(RST) begin
_copy_ram0_ram1_dst_sink_pat_fsm_1 <= _copy_ram0_ram1_dst_sink_pat_fsm_1_init;
end else begin
case(_copy_ram0_ram1_dst_sink_pat_fsm_1)
_copy_ram0_ram1_dst_sink_pat_fsm_1_init: begin
if(__copy_ram0_ram1_start_4 && _copy_ram0_ram1_dst_sink_mode & 3'b10) begin
_copy_ram0_ram1_dst_sink_pat_fsm_1 <= _copy_ram0_ram1_dst_sink_pat_fsm_1_1;
end
end
_copy_ram0_ram1_dst_sink_pat_fsm_1_1: begin
if((_sink_copy_ram0_ram1_dst_pat_count_0 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_1 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_2 == 0) && (_sink_copy_ram0_ram1_dst_pat_count_3 == 0)) begin
_copy_ram0_ram1_dst_sink_pat_fsm_1 <= _copy_ram0_ram1_dst_sink_pat_fsm_1_init;
end
if(_copy_ram0_ram1_term_sink) begin
_copy_ram0_ram1_dst_sink_pat_fsm_1 <= _copy_ram0_ram1_dst_sink_pat_fsm_1_init;
end
end
endcase
end
end
endmodule
module ram0
(
input CLK,
input [10-1:0] ram0_0_addr,
output [32-1:0] ram0_0_rdata,
input [32-1:0] ram0_0_wdata,
input ram0_0_wenable
);
reg [10-1:0] ram0_0_daddr;
reg [32-1:0] mem [0:1024-1];
always @(posedge CLK) begin
if(ram0_0_wenable) begin
mem[ram0_0_addr] <= ram0_0_wdata;
end
ram0_0_daddr <= ram0_0_addr;
end
assign ram0_0_rdata = mem[ram0_0_daddr];
endmodule
module ram1
(
input CLK,
input [10-1:0] ram1_0_addr,
output [32-1:0] ram1_0_rdata,
input [32-1:0] ram1_0_wdata,
input ram1_0_wenable
);
reg [10-1:0] ram1_0_daddr;
reg [32-1:0] mem [0:1024-1];
always @(posedge CLK) begin
if(ram1_0_wenable) begin
mem[ram1_0_addr] <= ram1_0_wdata;
end
ram1_0_daddr <= ram1_0_addr;
end
assign ram1_0_rdata = mem[ram1_0_daddr];
endmodule
"""
def test():
veriloggen.reset()
test_module = thread_ram_copy_pattern.mkTest()
code = test_module.to_verilog()
from pyverilog.vparser.parser import VerilogParser
from pyverilog.ast_code_generator.codegen import ASTCodeGenerator
parser = VerilogParser()
expected_ast = parser.parse(expected_verilog)
codegen = ASTCodeGenerator()
expected_code = codegen.visit(expected_ast)
assert(expected_code == code)
|
Q:
WCF security problems with named pipes
I have a slightly complicated setup that, of course, works fine in XP, but chokes on Windows 7. It may seem like madness, but it made sense at the time!
I have a WPF application that launches and then launches another application that communicates with an external device. After launching it establishes communications with the new process using WCF (hosted by the new process) via a named pipe (net.pipe). This seems to work fine on either OS.
I wanted to make some of the functionality of the WPF application externally available to a command line program, so I set up another WCF service, this time hosted by the WPF application and again exposed it via named pipes. Again, this seems to work.
Next, I wanted to make the functionality of the WPF application available via the web. Now, it's important that the WPF application be runnable from a regular user account, so I thought the best way to make this work on Windows 7 would be to create a windows service that would provide the web service part and have it communicate back to the WPF application via the same named pipe that works fine for the command line. I implemented this and it runs fine on XP, but it chokes on Windows 7. The problem seems to be with trying to establish the named pipe connection between the windows service and the WPF application.
If I run the WPF app as an administrator, it works fine. So it seems to be a problem with the account that the windows service is running in can't communicate with a regular user account that is hosting the WCF service via named pipes. Is there a way to make this work? It seems a WCF service running in a regular user account can communicate using named pipes to another app running in the same account, but it seems it can't do the same thing with a different account.
Oddly, the reverse seems to work. The windows service does, in fact, also expose a service with a named pipe binding (it's used as an activation function since the service is running all the time). I can connect from the WPF app to this service without any problems.
My knowledge of security is somewhat limited. Can anybody shine a light on what's going on?
A:
This question has been asked several times previously on SO. For example, see Connecting via named pipe from windows service to desktop app
The problem is that your user session applications don't possess the SeCreateGlobalPrivilege security privilege necessary to allow them to create objects in the global kernel namespace visible to other sessions, but only in the local namespace which is only visible within the session. Services, on the other hand, which run with this privilege by default, can do so.
It is not the named pipe object itself which is constrained to the local namespace in this way, but another named kernel object, a shared memory section, on which the WCF named pipe binding relies in order to publish to its clients the actual name of the pipe, which is a GUID which changes each time the service is started.
You can get round this constraint by reversing the roles - make the windows service application the WCF Service, to which your user session apps connect. The windows service has no problem publishing its service to your session. And connecting things up this way round makes more sense because the windows service is always running, whereas your session and its apps comes and goes as you log in and out. You'll want to define the service with a duplex contract, so that once the connection is established, the essential flow of communication over the WCF service can still happen in the same direction you originally intended.
|
Jay-Z's Former Protege Sentenced to 10 Years of Prison
February 18, 2011 03:19:54 GMT
Rapper Tru Life made a plea deal for second-degree murder and on Wednesday, February 16 he was handed a 10-year sentence.
A rapper formerly signed to Jay-Z's Roc-A-Fella Records has been sentenced to 10 years in prison in connection to a fatal 2009 stabbing in New York. Tru Life - real name Roberto Rosado, Jr. - was charged with gang assault and second-degree murder in June 2009 after Christopher Guerrero was killed and another man left seriously injured following an attack in a Manhattan apartment building.
He pleaded not guilty to the murder charge and was held by authorities without bail. Police were initially investigating the rapper's brother Marcus in relation to a shooting outside Pacha nightclub, and authorities believed the stabbing was in retaliation for the club incident.
Rosado, Jr. made a plea deal for second-degree murder and on Wednesday, February 16 he was handed a 10-year sentence, according to AllHipHop.com. The website reports that his brother was sentenced to 12 years in prison for his role in the murder and assault. |
Sin Min Secondary School
SMJK Sin Min (新民国民型中学) (Sekolah Menengah Jenis Kebangsaan Sin Min) is a Chinese conforming school which is located in Sungai Petani, Kedah, Malaysia. The school won the Anugerah Sekolah Harapan Negara in the "Secondary Schools (City)" category of the whole Malaysia in 2006 and the Anugerah Sekolah Cemerlang in 2007. In 2009 the school was awarded the status of Sekolah Kluster Kecemerlangan (Cluster School Of Excellence).
Official website
SMJK Sin Min Web Portal (Chinese)
SMJK Sin Min Official Website
Sources
DoctorJob.com.my - Happenings
iSchool >> Customer Success Stories - SMJK Schools
Category:Secondary schools in Malaysia
Category:Schools in Kedah
Category:Educational institutions established in 1957
Category:1957 establishments in Malaya
Category:Chinese-language schools in Malaysia |
The present disclosure relates generally to the field of batteries and battery modules. More specifically, the present disclosure relates to battery modules that may be used in vehicular contexts, as well as other energy storage/expending applications.
This section is intended to introduce the reader to various aspects of art that may be related to various aspects of the present disclosure, which are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
A vehicle that uses one or more battery systems for providing all or a portion of the motive power for the vehicle can be referred to as an xEV, where the term “xEV” is defined herein to include all of the following vehicles, or any variations or combinations thereof, that use electric power for all or a portion of their vehicular motive force. As will be appreciated by those skilled in the art, hybrid electric vehicles (HEVs) combine an internal combustion engine propulsion system and a battery-powered electric propulsion system, such as 48 volt or 130 volt systems. The term HEV may include any variation of a hybrid electric vehicle. For example, full hybrid systems (FHEVs) may provide motive and other electrical power to the vehicle using one or more electric motors, using only an internal combustion engine, or using both. In contrast, mild hybrid systems (MHEVs) disable the internal combustion engine when the vehicle is idling and utilize a battery system to continue powering the air conditioning unit, radio, or other electronics, as well as to restart the engine when propulsion is desired. The mild hybrid system may also apply some level of power assist, during acceleration for example, to supplement the internal combustion engine. Mild hybrids are typically 96V to 130V and recover braking energy through a belt or crank integrated starter generator. Further, a micro-hybrid electric vehicle (mHEV) also uses a “Stop-Start” system similar to the mild hybrids, but the micro-hybrid systems of a mHEV may or may not supply power assist to the internal combustion engine and operates at a voltage below 60V. For the purposes of the present discussion, it should be noted that mHEVs typically do not technically use electric power provided directly to the crankshaft or transmission for any portion of the motive force of the vehicle, but an mHEV may still be considered as an xEV since it does use electric power to supplement a vehicle's power needs when the vehicle is idling with internal combustion engine disabled and recovers braking energy through an integrated starter generator. In addition, a plug-in electric vehicle (PEV) is any vehicle that can be charged from an external source of electricity, such as wall sockets, and the energy stored in the rechargeable battery packs drives or contributes to drive the wheels. PEVs are a subcategory of electric vehicles that include all-electric or battery electric vehicles (BEVs), plug-in hybrid electric vehicles (PHEVs), and electric vehicle conversions of hybrid electric vehicles and conventional internal combustion engine vehicles.
xEVs as described above may provide a number of advantages as compared to more traditional gas-powered vehicles using only internal combustion engines and traditional electrical systems, which are typically 12 volt systems powered by a lead acid battery. For example, xEVs may produce fewer undesirable emission products and may exhibit greater fuel efficiency as compared to traditional internal combustion vehicles and, in some cases, such xEVs may eliminate the use of gasoline entirely, as is the case of certain types of PHEVs.
As xEV technology continues to evolve, there is a need to provide improved power sources (e.g., battery systems or modules) for such vehicles. For example, it is desirable to increase the distance that such vehicles may travel without the need to recharge the batteries. Additionally, it may also be desirable to improve the performance of such batteries and to reduce the cost associated with the battery systems. |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!-- NewPage -->
<html lang="en">
<head>
<!-- Generated by javadoc (1.8.0_212) on Thu Jun 25 20:21:16 PDT 2020 -->
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TranslatableGuacamoleInsufficientCredentialsException (guacamole-ext 1.2.0 API)</title>
<meta name="date" content="2020-06-25">
<link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="Style">
<script type="text/javascript" src="../../../../script.js"></script>
</head>
<body>
<script type="text/javascript"><!--
try {
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="TranslatableGuacamoleInsufficientCredentialsException (guacamole-ext 1.2.0 API)";
}
}
catch(err) {
}
//-->
var methods = {"i0":10};
var tabs = {65535:["t0","All Methods"],2:["t2","Instance Methods"],8:["t4","Concrete Methods"]};
var altColor = "altColor";
var rowColor = "rowColor";
var tableTab = "tableTab";
var activeTableTab = "activeTableTab";
</script>
<noscript>
<div>JavaScript is disabled on your browser.</div>
</noscript>
<!-- ========= START OF TOP NAVBAR ======= -->
<div class="topNav"><a name="navbar.top">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.top.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="class-use/TranslatableGuacamoleInsufficientCredentialsException.html">Use</a></li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-all.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleCredentialsException.html" title="class in org.apache.guacamole.language"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleInvalidCredentialsException.html" title="class in org.apache.guacamole.language"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../../index.html?org/apache/guacamole/language/TranslatableGuacamoleInsufficientCredentialsException.html" target="_top">Frames</a></li>
<li><a href="TranslatableGuacamoleInsufficientCredentialsException.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_top">
<li><a href="../../../../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_top");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.top">
<!-- -->
</a></div>
<!-- ========= END OF TOP NAVBAR ========= -->
<!-- ======== START OF CLASS DATA ======== -->
<div class="header">
<div class="subTitle">org.apache.guacamole.language</div>
<h2 title="Class TranslatableGuacamoleInsufficientCredentialsException" class="title">Class TranslatableGuacamoleInsufficientCredentialsException</h2>
</div>
<div class="contentContainer">
<ul class="inheritance">
<li><a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true" title="class or interface in java.lang">java.lang.Object</a></li>
<li>
<ul class="inheritance">
<li><a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true" title="class or interface in java.lang">java.lang.Throwable</a></li>
<li>
<ul class="inheritance">
<li><a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Exception.html?is-external=true" title="class or interface in java.lang">java.lang.Exception</a></li>
<li>
<ul class="inheritance">
<li>org.apache.guacamole.GuacamoleException</li>
<li>
<ul class="inheritance">
<li>org.apache.guacamole.GuacamoleClientException</li>
<li>
<ul class="inheritance">
<li>org.apache.guacamole.GuacamoleSecurityException</li>
<li>
<ul class="inheritance">
<li>org.apache.guacamole.GuacamoleUnauthorizedException</li>
<li>
<ul class="inheritance">
<li><a href="../../../../org/apache/guacamole/net/auth/credentials/GuacamoleCredentialsException.html" title="class in org.apache.guacamole.net.auth.credentials">org.apache.guacamole.net.auth.credentials.GuacamoleCredentialsException</a></li>
<li>
<ul class="inheritance">
<li><a href="../../../../org/apache/guacamole/net/auth/credentials/GuacamoleInsufficientCredentialsException.html" title="class in org.apache.guacamole.net.auth.credentials">org.apache.guacamole.net.auth.credentials.GuacamoleInsufficientCredentialsException</a></li>
<li>
<ul class="inheritance">
<li>org.apache.guacamole.language.TranslatableGuacamoleInsufficientCredentialsException</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
<div class="description">
<ul class="blockList">
<li class="blockList">
<dl>
<dt>All Implemented Interfaces:</dt>
<dd><a href="http://docs.oracle.com/javase/8/docs/api/java/io/Serializable.html?is-external=true" title="class or interface in java.io">Serializable</a>, <a href="../../../../org/apache/guacamole/language/Translatable.html" title="interface in org.apache.guacamole.language">Translatable</a></dd>
</dl>
<hr>
<br>
<pre>public class <span class="typeNameLabel">TranslatableGuacamoleInsufficientCredentialsException</span>
extends <a href="../../../../org/apache/guacamole/net/auth/credentials/GuacamoleInsufficientCredentialsException.html" title="class in org.apache.guacamole.net.auth.credentials">GuacamoleInsufficientCredentialsException</a>
implements <a href="../../../../org/apache/guacamole/language/Translatable.html" title="interface in org.apache.guacamole.language">Translatable</a></pre>
<div class="block">A <a href="../../../../org/apache/guacamole/net/auth/credentials/GuacamoleInsufficientCredentialsException.html" title="class in org.apache.guacamole.net.auth.credentials"><code>GuacamoleInsufficientCredentialsException</code></a> whose associated message
is translatable and can be passed through an arbitrary translation service,
producing a human-readable message in the user's native language.</div>
<dl>
<dt><span class="seeLabel">See Also:</span></dt>
<dd><a href="../../../../serialized-form.html#org.apache.guacamole.language.TranslatableGuacamoleInsufficientCredentialsException">Serialized Form</a></dd>
</dl>
</li>
</ul>
</div>
<div class="summary">
<ul class="blockList">
<li class="blockList">
<!-- ======== CONSTRUCTOR SUMMARY ======== -->
<ul class="blockList">
<li class="blockList"><a name="constructor.summary">
<!-- -->
</a>
<h3>Constructor Summary</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Constructor Summary table, listing constructors, and an explanation">
<caption><span>Constructors</span><span class="tabEnd"> </span></caption>
<tr>
<th class="colOne" scope="col">Constructor and Description</th>
</tr>
<tr class="altColor">
<td class="colOne"><code><span class="memberNameLink"><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleInsufficientCredentialsException.html#TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-java.lang.String-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">TranslatableGuacamoleInsufficientCredentialsException</a></span>(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> key,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</code>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, and associated credential information.</div>
</td>
</tr>
<tr class="rowColor">
<td class="colOne"><code><span class="memberNameLink"><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleInsufficientCredentialsException.html#TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-java.lang.String-java.lang.Throwable-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">TranslatableGuacamoleInsufficientCredentialsException</a></span>(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> key,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true" title="class or interface in java.lang">Throwable</a> cause,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</code>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, cause, and associated credential information.</div>
</td>
</tr>
<tr class="altColor">
<td class="colOne"><code><span class="memberNameLink"><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleInsufficientCredentialsException.html#TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-org.apache.guacamole.language.TranslatableMessage-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">TranslatableGuacamoleInsufficientCredentialsException</a></span>(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="../../../../org/apache/guacamole/language/TranslatableMessage.html" title="class in org.apache.guacamole.language">TranslatableMessage</a> translatableMessage,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</code>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, and associated credential information.</div>
</td>
</tr>
<tr class="rowColor">
<td class="colOne"><code><span class="memberNameLink"><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleInsufficientCredentialsException.html#TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-org.apache.guacamole.language.TranslatableMessage-java.lang.Throwable-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">TranslatableGuacamoleInsufficientCredentialsException</a></span>(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="../../../../org/apache/guacamole/language/TranslatableMessage.html" title="class in org.apache.guacamole.language">TranslatableMessage</a> translatableMessage,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true" title="class or interface in java.lang">Throwable</a> cause,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</code>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, cause, and associated credential information.</div>
</td>
</tr>
</table>
</li>
</ul>
<!-- ========== METHOD SUMMARY =========== -->
<ul class="blockList">
<li class="blockList"><a name="method.summary">
<!-- -->
</a>
<h3>Method Summary</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Method Summary table, listing methods, and an explanation">
<caption><span id="t0" class="activeTableTab"><span>All Methods</span><span class="tabEnd"> </span></span><span id="t2" class="tableTab"><span><a href="javascript:show(2);">Instance Methods</a></span><span class="tabEnd"> </span></span><span id="t4" class="tableTab"><span><a href="javascript:show(8);">Concrete Methods</a></span><span class="tabEnd"> </span></span></caption>
<tr>
<th class="colFirst" scope="col">Modifier and Type</th>
<th class="colLast" scope="col">Method and Description</th>
</tr>
<tr id="i0" class="altColor">
<td class="colFirst"><code><a href="../../../../org/apache/guacamole/language/TranslatableMessage.html" title="class in org.apache.guacamole.language">TranslatableMessage</a></code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleInsufficientCredentialsException.html#getTranslatableMessage--">getTranslatableMessage</a></span>()</code>
<div class="block">Returns a message which can be translated using a translation service,
consisting of a translation key and optional set of substitution
variables.</div>
</td>
</tr>
</table>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.org.apache.guacamole.net.auth.credentials.GuacamoleCredentialsException">
<!-- -->
</a>
<h3>Methods inherited from class org.apache.guacamole.net.auth.credentials.<a href="../../../../org/apache/guacamole/net/auth/credentials/GuacamoleCredentialsException.html" title="class in org.apache.guacamole.net.auth.credentials">GuacamoleCredentialsException</a></h3>
<code><a href="../../../../org/apache/guacamole/net/auth/credentials/GuacamoleCredentialsException.html#getCredentialsInfo--">getCredentialsInfo</a></code></li>
</ul>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.org.apache.guacamole.GuacamoleUnauthorizedException">
<!-- -->
</a>
<h3>Methods inherited from class org.apache.guacamole.GuacamoleUnauthorizedException</h3>
<code>getStatus</code></li>
</ul>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.org.apache.guacamole.GuacamoleException">
<!-- -->
</a>
<h3>Methods inherited from class org.apache.guacamole.GuacamoleException</h3>
<code>getHttpStatusCode, getWebSocketCode</code></li>
</ul>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.java.lang.Throwable">
<!-- -->
</a>
<h3>Methods inherited from class java.lang.<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true" title="class or interface in java.lang">Throwable</a></h3>
<code><a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#addSuppressed-java.lang.Throwable-" title="class or interface in java.lang">addSuppressed</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#fillInStackTrace--" title="class or interface in java.lang">fillInStackTrace</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#getCause--" title="class or interface in java.lang">getCause</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#getLocalizedMessage--" title="class or interface in java.lang">getLocalizedMessage</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#getMessage--" title="class or interface in java.lang">getMessage</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#getStackTrace--" title="class or interface in java.lang">getStackTrace</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#getSuppressed--" title="class or interface in java.lang">getSuppressed</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#initCause-java.lang.Throwable-" title="class or interface in java.lang">initCause</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#printStackTrace--" title="class or interface in java.lang">printStackTrace</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#printStackTrace-java.io.PrintStream-" title="class or interface in java.lang">printStackTrace</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#printStackTrace-java.io.PrintWriter-" title="class or interface in java.lang">printStackTrace</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#setStackTrace-java.lang.StackTraceElement:A-" title="class or interface in java.lang">setStackTrace</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true#toString--" title="class or interface in java.lang">toString</a></code></li>
</ul>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.java.lang.Object">
<!-- -->
</a>
<h3>Methods inherited from class java.lang.<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a></h3>
<code><a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#clone--" title="class or interface in java.lang">clone</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#equals-java.lang.Object-" title="class or interface in java.lang">equals</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#finalize--" title="class or interface in java.lang">finalize</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#getClass--" title="class or interface in java.lang">getClass</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#hashCode--" title="class or interface in java.lang">hashCode</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#notify--" title="class or interface in java.lang">notify</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#notifyAll--" title="class or interface in java.lang">notifyAll</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#wait--" title="class or interface in java.lang">wait</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#wait-long-" title="class or interface in java.lang">wait</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#wait-long-int-" title="class or interface in java.lang">wait</a></code></li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
<div class="details">
<ul class="blockList">
<li class="blockList">
<!-- ========= CONSTRUCTOR DETAIL ======== -->
<ul class="blockList">
<li class="blockList"><a name="constructor.detail">
<!-- -->
</a>
<h3>Constructor Detail</h3>
<a name="TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-org.apache.guacamole.language.TranslatableMessage-java.lang.Throwable-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>TranslatableGuacamoleInsufficientCredentialsException</h4>
<pre>public TranslatableGuacamoleInsufficientCredentialsException(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="../../../../org/apache/guacamole/language/TranslatableMessage.html" title="class in org.apache.guacamole.language">TranslatableMessage</a> translatableMessage,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true" title="class or interface in java.lang">Throwable</a> cause,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</pre>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, cause, and associated credential information. The
message must be provided in both non-translatable (readable as-written)
and translatable forms.</div>
<dl>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>message</code> - A human-readable description of the exception that occurred. This
message should be readable on its own and as-written, without
requiring a translation service.</dd>
<dd><code>translatableMessage</code> - A translatable, human-readable description of the exception that
occurred.</dd>
<dd><code>cause</code> - The cause of this exception.</dd>
<dd><code>credentialsInfo</code> - Information describing the form of valid credentials.</dd>
</dl>
</li>
</ul>
<a name="TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-org.apache.guacamole.language.TranslatableMessage-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>TranslatableGuacamoleInsufficientCredentialsException</h4>
<pre>public TranslatableGuacamoleInsufficientCredentialsException(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="../../../../org/apache/guacamole/language/TranslatableMessage.html" title="class in org.apache.guacamole.language">TranslatableMessage</a> translatableMessage,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</pre>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, and associated credential information. The message
must be provided in both non-translatable (readable as-written) and
translatable forms.</div>
<dl>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>message</code> - A human-readable description of the exception that occurred. This
message should be readable on its own and as-written, without
requiring a translation service.</dd>
<dd><code>translatableMessage</code> - A translatable, human-readable description of the exception that
occurred.</dd>
<dd><code>credentialsInfo</code> - Information describing the form of valid credentials.</dd>
</dl>
</li>
</ul>
<a name="TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-java.lang.String-java.lang.Throwable-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>TranslatableGuacamoleInsufficientCredentialsException</h4>
<pre>public TranslatableGuacamoleInsufficientCredentialsException(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> key,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Throwable.html?is-external=true" title="class or interface in java.lang">Throwable</a> cause,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</pre>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, cause, and associated credential information. The
message must be provided in both non-translatable (readable as-written)
and translatable forms.</div>
<dl>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>message</code> - A human-readable description of the exception that occurred. This
message should be readable on its own and as-written, without
requiring a translation service.</dd>
<dd><code>key</code> - The arbitrary key which can be used to look up the message to be
displayed in the user's native language.</dd>
<dd><code>cause</code> - The cause of this exception.</dd>
<dd><code>credentialsInfo</code> - Information describing the form of valid credentials.</dd>
</dl>
</li>
</ul>
<a name="TranslatableGuacamoleInsufficientCredentialsException-java.lang.String-java.lang.String-org.apache.guacamole.net.auth.credentials.CredentialsInfo-">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>TranslatableGuacamoleInsufficientCredentialsException</h4>
<pre>public TranslatableGuacamoleInsufficientCredentialsException(<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> message,
<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/String.html?is-external=true" title="class or interface in java.lang">String</a> key,
<a href="../../../../org/apache/guacamole/net/auth/credentials/CredentialsInfo.html" title="class in org.apache.guacamole.net.auth.credentials">CredentialsInfo</a> credentialsInfo)</pre>
<div class="block">Creates a new TranslatableGuacamoleInsufficientCredentialsException with
the given message, and associated credential information. The message
must be provided in both non-translatable (readable as-written) and
translatable forms.</div>
<dl>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>message</code> - A human-readable description of the exception that occurred. This
message should be readable on its own and as-written, without
requiring a translation service.</dd>
<dd><code>key</code> - The arbitrary key which can be used to look up the message to be
displayed in the user's native language.</dd>
<dd><code>credentialsInfo</code> - Information describing the form of valid credentials.</dd>
</dl>
</li>
</ul>
</li>
</ul>
<!-- ============ METHOD DETAIL ========== -->
<ul class="blockList">
<li class="blockList"><a name="method.detail">
<!-- -->
</a>
<h3>Method Detail</h3>
<a name="getTranslatableMessage--">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>getTranslatableMessage</h4>
<pre>public <a href="../../../../org/apache/guacamole/language/TranslatableMessage.html" title="class in org.apache.guacamole.language">TranslatableMessage</a> getTranslatableMessage()</pre>
<div class="block"><span class="descfrmTypeLabel">Description copied from interface: <code><a href="../../../../org/apache/guacamole/language/Translatable.html#getTranslatableMessage--">Translatable</a></code></span></div>
<div class="block">Returns a message which can be translated using a translation service,
consisting of a translation key and optional set of substitution
variables.</div>
<dl>
<dt><span class="overrideSpecifyLabel">Specified by:</span></dt>
<dd><code><a href="../../../../org/apache/guacamole/language/Translatable.html#getTranslatableMessage--">getTranslatableMessage</a></code> in interface <code><a href="../../../../org/apache/guacamole/language/Translatable.html" title="interface in org.apache.guacamole.language">Translatable</a></code></dd>
<dt><span class="returnLabel">Returns:</span></dt>
<dd>A message which can be translated using a translation service.</dd>
</dl>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
</div>
<!-- ========= END OF CLASS DATA ========= -->
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<div class="bottomNav"><a name="navbar.bottom">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.bottom.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="class-use/TranslatableGuacamoleInsufficientCredentialsException.html">Use</a></li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-all.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleCredentialsException.html" title="class in org.apache.guacamole.language"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../../../../org/apache/guacamole/language/TranslatableGuacamoleInvalidCredentialsException.html" title="class in org.apache.guacamole.language"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../../index.html?org/apache/guacamole/language/TranslatableGuacamoleInsufficientCredentialsException.html" target="_top">Frames</a></li>
<li><a href="TranslatableGuacamoleInsufficientCredentialsException.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_bottom">
<li><a href="../../../../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_bottom");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.bottom">
<!-- -->
</a></div>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
<p class="legalCopy"><small>Copyright © 2020. All rights reserved.</small></p>
<!-- Google Analytics -->
<script type="text/javascript">
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-75289145-1', 'auto');
ga('send', 'pageview');
</script>
</body>
</html>
|
set (test_name "ndc_test")
set (test_sources
main.cxx)
project (${test_name} CXX C)
cmake_minimum_required (VERSION 2.6)
set (CMAKE_VERBOSE_MAKEFILE on)
find_package (Threads)
message (STATUS "${test_name} sources: ${test_sources}")
include_directories ("${CMAKE_SOURCE_DIR}/include")
add_executable (${test_name} ${test_sources})
target_link_libraries (${test_name} log4cplus)
|
148 N.J. Super. 286 (1977)
372 A.2d 638
BLACK PRINCE DISTILLERY, INC., A NEW JERSEY CORPORATION, PLAINTIFF-APPELLANT,
v.
HOME LIQUORS, A NEW JERSEY CORPORATION, AND ROYAL TRUCKING CORP., A NEW JERSEY CORPORATION, DEFENDANTS-RESPONDENTS.
Superior Court of New Jersey, Appellate Division.
Argued March 8, 1977.
Decided March 17, 1977.
Before Judges HALPERN, BOTTER and MICHELS.
Mr. Robert M. Rich argued the cause for appellant (Messrs. Kirsten, Solomon, Friedman & Cherin, P.A., attorneys; Mr. Jack B. Kirsten, of counsel).
*287 Mr. Abe W. Wasserman argued the cause for respondent Home Liquors.
The opinion of the court was delivered by HALPERN, P.J.A.D.
Following a nonjury trial a judgment of no cause for action in favor of defendant Home Liquors and against plaintiff Black Prince Distillery was entered. Suit had been brought by plaintiff against defendant to recover $21,301.84 on a book account for whiskey sold by plaintiff to defendant. Summary judgment had previously been entered in favor of defendant Royal Trucking Corp. and it is not involved in this appeal.
The relevant facts involved are that plaintiff distills and bottles whiskey. Defendant operates many retail store outlets, and has been buying whiskey from plaintiff for about 25 years. During all this period the whiskey was transported by way of Royal. On May 10, 1973 defendant called plaintiff and ordered whiskey valued at $21,301.84. As was its custom, plaintiff prepared the order for shipment, called Royal and told it the order was ready to be picked up. Plaintiff prepared the shipping documents which did not designate a destination for the goods. The shipping papers were signed and received by Royal. Again, as was their custom, the telephoned purchase order was confirmed by a writing executed by Home, directed to plaintiff, and entitled "Request for Release." The request was signed by defendant's agent and recited "please release the following to Royal Trucking Company," and set forth the quantity and type of goods being purchased. It is significant that the request contained no instructions as to where the goods were to be delivered. The trucking cost was either totally or partly paid by plaintiff. On May 11, 1973 the goods in question were allegedly hijacked while in the possession of Royal en route to a destination designated by defendant.
Thus, the narrow issue presented to the trial judge was whether plaintiff or defendant should bear the loss. The trial judge, in his letter opinion of April 5, 1976, stated that the *288 responsibility for the loss was "not easily discernible." However, he premised his finding in favor of defendant upon a letter written by plaintiff to defendant after the alleged hijacking, stating:
September 7, 1973
Home Liquors
773 South Orange Avenue
Newark, N.J.
Attention: Mr. Eddy Fisher
Dear Eddy,
Starting today, our prices for your products will be regarded as F.O.B. our plant at Clifton.
This will mean that you decide about the way you want the goods transported to your stores, at your cost and risk.
We will lower your prices with 15 cents per case, being the amount previously paid by us for part of the trucking cost.
Yours truly,
The Black Prince Distillery, Inc.
/s/ Jack C. van Caulil
Jack C. van Caulil
Vice President
This letter led the trial judge "to infer" that such had always been the parties' arrangement, namely, that plaintiff was required to make delivery "to defendant's locations"; hence, plaintiff must bear the loss resulting from the theft. We disagree and reverse.
In arriving at his decision the trial judge disregarded the course of dealings between the parties that had existed for many years. The proofs clearly indicated that we are here dealing with a "shipping" contract as distinguished from a "delivery" contract. In the former case title passes when the goods are turned over to the carrier; in the latter case title passes on delivery to and receipt by the buyer. In the former case risk of loss while the goods are in transit is on the buyer; in the latter case risk of loss while the goods are in transit is on the seller.
In the instant case the parties made no specific agreement as to when title was to pass. Both the order form prepared by plaintiff and the request for release prepared and signed *289 by defendant do not indicate a point of delivery. In fact, the request for release directed plaintiff to turn the goods over to Royal with no further instructions. Under these circumstances the transaction here involved is controlled by the applicable provisions of the Uniform Commercial Code, N.J.S.A. 12A:2-101 et seq. In particular, N.J.S.A. 12A:2-509(1) provides:
12A:2-509 Risk of Loss in the Absence of Breach.
(1) Where the contract requires or authorizes the seller to ship the goods by carrier
(a) if it does not require him to deliver them at a particular destination, the risk of loss passes to the buyer when the goods are duly delivered to the carrier even though the shipment is under reservation (12A:2-505); but
(b) if it does require him to deliver them at a particular destination and the goods are there duly tendered while in the possession of the carrier, the risk of loss passes to the buyer when the goods are there duly so tendered as to enable the buyer to take delivery.
Plaintiff's letter of September 7, 1973 should not have been interpreted by the trial judge so as to make the prior arrangements of the parties a "delivery" rather than a "shipment" agreement. It could just as readily be interpreted to mean that thereafter the letter was to memorialize what had always been their arrangement.
We conclude from the testimony that Royal acted as the receiving agent for defendant on May 11, 1973. It received the bulk shipment from plaintiff for defendant, and thereafter was supposed to deliver the goods to the individual stores owned by defendant, or as otherwise directed by defendant. Hence, title passed when plaintiff turned the goods over to Royal, from which point the risk of loss was on defendant. See Note, "Risk of Loss Under Section 2509 of the California Uniform Commercial Code," 20 U.C.L.A.L. Rev. 1352, 1356 (1973); Dana Debs, Inc. v. Lady Rose Stores, Inc., 65 Misc.2d 697, 319 N.Y.S.2d 111 (Civ. Ct. 1970); Ninth St. East Ltd. v. Harrison, 5 Conn. Cir. 597, 259 A.2d 772 (Cir. Ct. 1968); N.J.S.A. 12A:2-503, comment 5, which *290 supports our view even though the shipping cost was paid by the seller.
Accordingly, the judgment below is reversed and remanded for entry of judgment in favor of plaintiff and against defendant for the sum claimed in the complaint, with interest and costs.
|
Q:
Update UI based on change of a directive attribute in AngularJs
I am struggling with data binding in AngularJs.
I have the following piece of markup in .html file that includes the custom directive:
<my-directive ng-repeat="i in object" attr-1="{{i.some_variable}}"></my-directive>
Note: 'some-variable' is being updated every 10 seconds(based on the associate collection and passed to template through controller).
The directive's code includes:
myApp.directive('myDirective', function () {
scope: {
'attr-1': '=attr1'
which throws this exception because of the brackets in attr-1(see html code above).
It works though if I use read-only access(note at sign below):
myApp.directive('myDirective', function () {
scope: {
'attr-1': '@attr1'
I use scope.attr-1 in directive's HTML to show its value.
The problem is that with read-only access UI is not reflecting the change in attribute change.
I've found solution with $parse or $eval(couldn't make them work tho). Is there a better one there?
A:
You'll need only two-way binding and I think $parse or $eval is not needed.
Please have a look at the demo below or in this fiddle.
It uses $interval to simulate your updating but the update can also come from other sources e.g. web socket or ajax request.
I'm using controllerAs and bindToController syntax (AngularJs version 1.4 or newer required) but the same is also possible with just an isolated scope. See guide in angular docs.
The $watch in the controller of the directive is only to show how the directive can detect that the data have changed.
angular.module('demoApp', [])
.controller('MainController', MainController)
.directive('myDirective', myDirective);
function MainController($interval) {
var self = this,
refreshTime = 1000; //interval time in ms
activate();
function activate() {
this.data = 0;
$interval(updateView, refreshTime);
}
function updateView() {
self.data = Math.round(Math.random()*100, 0);
}
}
function myDirective() {
return {
restrict: 'E',
scope: {
},
bindToController: {
data: '='
},
template: '<div><p>directive data: {{directiveCtrl.data}}</p></div>',
controller: function($scope) {
$scope.$watch('directiveCtrl.data', function(newValue) {
console.log('data changed', newValue);
});
},
controllerAs: 'directiveCtrl'
}
}
<script src="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.4.7/angular.js"></script>
<div ng-app="demoApp" ng-controller="MainController as ctrl">
model value in ctrl. {{ctrl.data}}
<my-directive data="ctrl.data"></my-directive>
</div>
A:
I've come to the following solution(in case somebody runs into the the same problem):
// Directive's code
myApp.directive('myDir', function () { return {
restrict: 'E',
templateUrl: function () {
return 'my-dir.html';
},
scope: {
'id': '@arId',
'x': '@arX',
'y': '@arY',
//....
},
link: function ($scope, element, attrs) {
// *** SOLUTION ***
attrs.$observe('arId', function (id) {
$scope.id = id;
});
//...
}
Update: somebody sent me this answer, they have the same problem and came up with a very similar if not exact same solution:
Using a directive inside an ng-repeat, and a mysterious power of scope '@'
It is useful to read because they explain what's the idea behind it.
|
Grief, Loss, & Trauma
We grieve when we lose something we value – the greater the value of the thing we have lost the more intense our grief. Traumatic reactions are overwhelming and occur when the event is interpreted as creating a world that is now, and in the future, more dangerous and poses a sense of serious threat.
Most people think of the grieving process as something experienced only after the death of a loved one; but we grieve for many reasons—be it the loss of a loved one, the loss of a job, the end of a relationship, or the loss of good health. In fact, even events of a wider scale, such as natural disasters or terrorist attacks, can cause people to grieve at the loss of their sense of safety and security. Anytime something significant is taken away from us, we grieve; and that grieving process can trigger a host of unfamiliar and confusing emotions and behaviours [1].
The experience for many grieving people has been described as “re-learning the world‟. Many people also discover a deepening of their spiritual beliefs and can identify how they have grown as a result of their grief experience.
We do not “move on” from grief. An emotional reaction to a trigger may throw the person into grief; acknowledging the grief and then using a range of old and new coping strategies, moves the person into attending to life and everyday commitments and tasks. It is important not to try to “speed up‟ the grieving process. Coming to terms with a significant loss can take months and sometimes years. It cannot be done in days or weeks. Most people simply need the loving, supportive presence of other people, permission to talk about their loss and encouragement to use their own coping strategies to learn to live with their grief.
Others can only understand the intensity of the loss when theyunderstand the meaning another ascribes to the loss or change.Julianne Whyte
Amaranth Foundation therapists seek to join with their clients in seeking meaning in the midst of grief, a revision of a life story punctuated by loss, and strategies to help identify and cope with a traumatic event. It is important to seek professional support. An an understanding of the range of therapies pertinent to individual stories is essential to help people learn to live with grief, loss and trauma.
If you feel you, or someone you know, might need professional help, please don’t hesitate to contact Amaranth Foundation and arrange support with our qualified Mental Health therapists.
About Amaranth Foundation
Amaranth Foundation offers support to rural and regional community in the areas of the social, emotional, psychological and existential needs of the people their families and caregivers who live with an illness effecting their quality of life. |
So Seidle started looking for shortcuts. First he found that, like many safes, his SentrySafe had some tolerance for error. If the combination includes a 12, for instance, 11 or 13 would work, too. That simple convenience measure meant his bot could try every third number instead of every single number, immediately paring down the total test time to just over four days. Seidle also realized that the bot didn't actually need to return the dial to its original position before trying every combination. By making attempts in a certain careful order, it could keep two of the three rotors in place, while trying new numbers on just the last, vastly cutting the time to try new combinations to a maximum of four seconds per try. That reduced the maximum bruteforcing time to about one day and 16 hours, or under a day on average.
But Seidle found one more clever trick, this time taking advantage of a design quirk in the safe intended to prevent traditional safecracking. Because the safe has a rod that slips into slots in the three rotors when they're aligned to the combination's numbers, a human safecracker can apply light pressure to the safe's handle, turn its dial, and listen or feel for the moment when that rod slips into those slots. To block that technique, the third rotor of Seidle's SentrySafe is indented with twelve notches that catch the rod if someone turns the dial while pulling the handle.
Seidle took apart the safe he and his wife had owned for years, and measured those twelve notches. To his surprise, he discovered the one that contained the slot for the correct combination was about a hundredth of an inch narrower than the other eleven. That's not a difference any human can feel or listen for, but his robot can easily detect it with a few automated measurements that take seconds. That discovery defeated an entire rotor's worth of combinations, dividing the possible solutions by a factor of 33, and reducing the total cracking time to the robot's current hour-and-13 minute max.
Safe Bets
In a statement to WIRED, SentrySafe didn't deny that its safes had vulnerabilities. But the company argued its products could still stand up to a less geeky attacker. "In this case, there was a tremendous effort, uninterrupted time in a controlled environment, the right tools and significant technical knowledge needed to eventually manipulate the safe," the statement from SentrySafe reads. "In this environment, the product accomplished what it was designed to do and would be realistically very difficult, if not impossible, for the average person to replicate in the field.”
Seidle counters that yes, anyone can reproduce his bot---that's the point of building it from cheap, open-source parts. But by demonstrating his safecracking bot and showing people how to make their own, Seidle says he's certainly not trying to aid burglars. Instead, he sees his work as mostly harmless DIY fun, and a warning about the limits of the security of a cheap safe. And more broadly, he sees it as a way to demonstrate the changing nature of physical security in an era of cheap robotics. "Could someone replicate it? Yeah, that’s the point," says Seidle."But there are so many cheaper and better ways to open up a safe than building one of these." (Less delicate methods involve a crowbar or a big hammer, for instance.)
In his talk at Defcon, Seidle plans to demonstrate his robot by cracking a newer, larger, $160 SentrySafe model live on stage. He says he couldn't find the smaller one for sale in Las Vegas, where the conference is held. That larger model requires a key as well as a combination to open. But surprisingly, Seidle found he could defeat that key safeguard with an old trick: shoving the plastic body of a Bic pen into the round keyhole and turning it. "Worked like a champ," Seidle says. "They added a layer of security that is completely useless."
Still, neither of the SentrySafes he's testing is a true high security safe, Seidle admits. Other, more expensive brands may not have its indentation giveaway in the third rotor, for instance, though Seidle notes some other elements of his robotic tricks could still vastly reduce the time to bruteforce their combinations. And as for those higher-end safes, Seidle welcomes other DIYers to pick up his work where he left off. "I don’t know if anyone is going to replicate my robot, but I imagine someone will take part one and part five and apply them to open a different model," he says. "And that would make me feel good." |
Last orders for pint glass as we know it?
Thousands of people are hurt each year in violent attacks where broken beer glasses are used as weapons. Could two new pint glass designs be the answer?
Nearly 87,000 injuries are caused by glass attacks each year in England and Wales, according to the Home Office. Many more are hurt as a result of accidents.
The worrying figures have prompted a redesign of the classic pint glass, with police, facial surgeons, pubs and brewers all voicing concern about the high number of glassings.
Traditional glasses could be replaced
The government hopes introducing safer pint glasses, still made of glass, will help reduce injuries. As well as the human cost, it also hopes it will reduce the financial burden of alcohol-related crime, which currently costs the NHS £2.7bn a year.
Now, two new prototypes for beer glasses have been unveiled, as part of a programme involving the Design Council. Launched by the Home Office's Design and Technology Alliance, the aim is to use design to tackle crime.
Designers say the new glasses will appeal to drinkers and have the potential to really reduce the number of glass-related injuries.
"The British love their pints of beer," says David Kester, of the Design Council. "We wouldn't want to take someone's enjoyment and pleasure away.
"This is not a silver bullet. It is one idea that can make a significant difference. We hope to save lives and reduce suffering."
A clear plastic coating is the secret of the first design, called Glass Plus, says Matt Cotterill, creative director of Design Bridge, which is behind the new glasses.
Burden
The coating or bio-resin is put inside a glass and prevents it from breaking into dangerous shards when smashed. It can be used to treat existing pint glasses and drinkers might not even notice the difference.
The second design, called Twin Wall, is inspired by car windscreens, which have gone from being made of toughened glass to being made from laminated glass. The glass is actually two thin-walled glasses inside each other, which are resin-bonded together. Again this stops the glass from shattering into pieces.
It does look significantly thicker than a traditional pint glass, although the designers say it is an early prototype and they are still working on improving it. An additional benefit of the design is that it makes beer easier to pour.
In a demonstration Glass Plus broke on the first attempt, but didn't shatter. It took four attempts to get a Twin Wall glass to break and when it did there were no shards of glass either.
The first model could be in pubs within 12 months, says Mr Cotterill. Designers are already working with suppliers and manufacturers to refine the coating.
It is unlikely to cost more than an existing glass to produce, as the toughened glass already used to make pint pots has to be heat-treated anyway. If you treated existing glasses there would be an additional cost. But the properties of toughened glass wear off over time, unlike the new coating.
Pubs are suffering and to ask them to cough up for supposedly improved glassware, it is not good timing
Louise AshworthCamra
The second model may take longer to come onto the market, but the designers say it will be durable and hard-wearing. Both glasses still have to be tested further before they are ready to be piloted in pubs and bars.
Mr Kester says the Twin Wall version is likely to be more expensive, but says: "What price corporate responsibility?"
But for pubs and breweries the cost of replacing their beer glasses is a valid concern, says Campaign for Real Ale (Camra). It is reserving judgment on the designs until it knows more, but is worried about putting an extra burden on already struggling pubs.
"Who will pay for these additional glasses?" says spokeswoman Louise Ashworth. "Fifty-two pubs are closing down each week because of administrative burdens, high taxes and the smoking ban. Pubs are suffering and to ask them to cough up for supposedly improved glassware, it is not good timing."
Stimulate
Glass will always be popular among drinkers as they enjoy the look and feel it, so improving safety is to be welcomed, says Neil Williams, of the British Beer and Pub Association. He describes the designs as "interesting ideas that merit further work and development".
"We are certainly supportive of innovations that can improve glass safety."
Home Secretary Alan Johnson believes the glasses are "an important step forward which could also provide retailers and drinkers with a preferable alternative to plastic glasses".
But the drinks industry will not be forced to introduce the new pint glasses, with the Home Office acknowledging the financial strain some pubs are under.
"We are hoping to stimulate action," says a spokesman. "This is our early solution. Discussions are to be had. We are not looking to make this mandatory."
Below is a selection of your comments.
Sounds a great idea. My one concern is that I have heard of people being attacked by broken bottles more than pint glasses - surely bottles should be made the same way as these new glasses? Jo , Leicestershire
This article depresses me in profound ways. I hate the messed up social problems in the UK, which is why I left for Canada, including what would be considered reckless alcoholism here. And it's depressing to me that the best way deemed to fix one of the symptoms of a social problem is to make the glasses not do as much damage. Never mind education. Forget more effective law enforcement and structure such as restrictions on sales of alcohol. No. Let's stop the glasses hurting as much. Ridiculous.David, Toronto, Canada
Something definitely needs to be done but... toughened glass - much heavier and more difficult to break = a very good weapon. Not the best of ideas!Tony Brown, North Wales
Why not just have reusable plastic glasses ?Lee, Carmarthen
I worked in a large psychiatric hospital in Epsom in the mid 1950s, and the glass tumblers in use were designed to fracture into small crystals, just as a car windscreen would. The object was to prevent broken glass being used for self harm by the inmates. As I recall it, the appearance of these special tumblers was much the same as normal domestic/household items - only when smashed could the difference be seen. So I think a technology for this 'new invention' has been around a long time already.Ian T, Hunton, North Yorkshire, UK
Having witnessed somebody being permanently scarred by having a broken glass thrust in their face, I have to say this is an excellent idea. The sooner they are introduced, the better. Of course, fights don't break out in pubs and clubs all the time, but those places where it happens most often should be forced to introduce the new glasses.Phil Rogers, Bournemouth
Fab idea... as long as a pint stays a pint, I'm happy!Nicola, Peterculter, Aberdeen
How about pubs that use the new glasses getting a discount on their Public Liability insurance as accidents are less likely to be as serious. That way they will be able to off-set at least part of the cost of the new glasses.Robin Stirzaker, Watford
This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so. |
Abstract
Background
Data on mental health among injecting drug users in South Asia is scarce yet poor mental health among users has significant implications for the success of HIV prevention and treatment programmes. A cohort of 449 injecting drug users in Delhi was examined on the following issues (1) examine trends in suicidal ideation, suicide plan and suicidal attempts over a 12-month period, (2) examine association between injecting practices (receive and give used syringes) and suicidal ideation over a 12 month study period.
Methods
An observational study was conducted providing phased interventions with follow up interviews every 3 months to 449 injecting drug users (IDUs), from August 2004 to November 2005. The study was conducted in Yamuna Bazaar, a known hub of drug peddling in Delhi. Interventions included nutrition, basic medical services, needle exchange, health education, HIV voluntary counseling and testing, STI diagnosis and treatment, oral buprenorphine substitution, and detoxification, each introduced sequentially.
Results
Suicidal ideation and suicide attempts, did not significantly change over 12 months of observation, while suicide plans actually increased over the time period. Keeping other factors constant, IDUs with suicidal ideation reported more giving and receiving of used syringes in the recent past. Conclusions: Mental health services are warranted within harm reduction programmes. Special attention must be paid to suicidal IDUs given their higher risk behaviours for acquiring HIV and other blood borne infections. IDU intervention programmes should assess and address suicide risk through brief screening and enhanced counseling.
Keywords
IDUsDepressionSuicidal ideationHIV risk behaviorsIndia
Introduction
Psychiatric morbidity among opiate users is well documented. Anxiety and depression are shown to be the most common psychiatric diagnoses among injecting drug users [1–3]. Suicidal behavior has also been found to be associated with opiate use [4, 5], especially among injectors [6, 7] and this along with overdose, are found to be the leading causes of premature mortality among young IDUs [8, 9]. While it is difficult to establish the exact causal pathways, studies have consistently shown that depression [10–12] and lifetime admission to a mental health facility [13] are associated with suicidal behavior. Other factors found to be significantly correlated with suicidal attempts are sexual abuse [13], younger age, less education, poly drug use, recent heroin overdose [12], current suicidal ideation [12, 14], less family support, and treatment seeking behavior [14–16].
In India, data on the prevalence of psychopathology among opiate users are scarce. Among the general Indian population the incidence of suicide was estimated to be 11.2 per 100,000 for the year 2011 (National Crime records Bureau, Ministry of Home Affairs). However, as is noted by Indian researchers, suicide rates estimated through police records are often under reported [17]. In fact, suicide rates have been demonstrated to be much higher than the national average in various studies ranging from 58 per 100,000 among young men [17] to 189 for 100,000 population above the age of 55 years [18]. Broader social and economic stresses are said to contribute to the majority of suicides in India, though mental illness does seem to be a risk factor in some proportion of suicides [19]. Indeed, family problems, illnesses, unemployment accounted for a large proportion of suicides in India in the year 2009 (National Crime records Bureau, Ministry of Home Affairs). Since suicide and depression are documented to be closely associated, it may be that these adverse conditions perhaps cause depression and lead to suicide. So far, the presence of suicidal ideation among drug users has not been a major focus of enquiry.
Historically, very few interventions in India targeting this group, whether drug treatment or HIV prevention, addressed mental health issues, despite evidence that depression among IDUs can compromise treatment outcomes or HIV prevention strategies. Depression can lead to a premature drop out and poorer prognosis after treatment [20] continued drug use [21] and heavier use [22, 23] while in treatment. It has also been shown that depressed IDUs are more likely to engage in risky injecting practices [12, 24–27]. These findings have implications for the success of HIV prevention programmes of a country. The present study, therefore, aims to: (1) examine trends of suicidal ideation and suicidal attempts across a 12 month period among a cohort of IDUs in Delhi (2) examine associations between recent injecting practices (receive and use syringes) and suicidal ideation over a 12 month period.
Methods
An observational study was conducted in Delhi among 449 injecting drug users (IDUs) over a two year period from September 2004 to October 2006 in order to study the effectiveness of sequential interventions on a number of behavioral, biological and clinical outcomes among injecting drug users. The study was designed to provide phased interventions with follow up interviews every 3 months. Study participants were recruited for 15 months after which they were integrated into the ongoing intervention programme of Sharan which continued to offer oral buprenorhine substitution and referrals to general health and detoxification services. During the study period, participants were offered and underwent 6 follow up interviews.
Data collection
The study was conducted in Yamuna Bazaar, a known hub of drug peddling in New Delhi, India. The interventions as well as the interviews took place in a drop in centre, a free standing clinic established for the study. The baseline interviews were preceded by written informed consent. The study was approved by institutional review boards from both The Johns Hopkins University, Bloomberg School of Public Health, and The Society for Service to Urban Poverty (SHARAN). Each survey interview took from 45 minutes to an hour to complete, plus approximately 20 minutes for a brief health screening at each catchment. In accordance with the advice of the IRB, participants who expressed suicidal ideation, plan and attempt were provided with referral slips to the Institute of Human Behavior and Allied Science (IHBAS) in Delhi, a health care institute for promoting mental health. The questionnaires and medical forms did not include names but carried unique ID codes generated at the time of recruitment. Each participant was given a study ID card with their ID number and picture, and this was used to track utilization of services. Henceforth, the study participant was free to avail of the services that were offered at each stage of their participation. Figure 1 presents the phases of interventions provided to the participants:
Figure 1
Phases of interventions and follow up interviews.
Those successfully completing the detoxification program were eligible to participate in an inpatient rehabilitation program providing job training and continued social support. Ancillary services such as referral to shelter homes, bathing and shaving provisions were also offered.
Log books of interview appointments were maintained. Outreach workers attempted to trace participants who failed to turn up by visiting the places where they frequented the most (as most were homeless). Participants, who did not visit the drop in centre for a period of time either due to incarceration or ill health, were continued in the study if they reappeared within 4 months of the last interview. Those who disappeared for longer periods of time (more than 6 months) were allowed to reenroll from baseline, and we maintained a roster linking the ID numbers of these clients from each enrollment.
Measures
The survey instrument assessed socio-demographics, drug use history, injecting and sexual risk behaviors, medical history, mental health status, family relationships, HIV knowledge, attitudes, risk perception, and experiences of discrimination and violence. Most measures were adapted from previous surveys used with the study population. The questionnaire was translated into Hindi, and then back-translated to English to check the accuracy of the translation. Both the translations were done by independent and separate translators. The Hindi questionnaire was then field tested among twenty IDUs. Questions on suicidal ideation, suicidal planning, and suicide attempts in the last 6 months were asked, in keeping with the definition of suicidal attempt, plan and ideation as posited by O’Caroll et al. [28]. To measure suicidal ideation, it was asked “During the last 6 months, have you ever had thoughts of taking your own life, even if you would not actually do it?” The question on suicidal plan asked “During the last 6 months, did you ever make a specific plan about how you would take your own life”, while that pertaining to suicide attempt asked “Have you ever attempted to take your own life in the last 6 months?” Only when the question on suicidal ideation was answered in the affirmative were the following questions on suicide plan and attempts asked.
Data analysis
Trends in suicidal ideation, suicide plan and suicide attempt: Data from the baseline interview, the six-month interview, and the twelve-month interview were used to examine trends in suicidal behavior. In order to test the difference in proportions across follow up catchments, Cochran’s Q test was performed. The 15 month follow up was not considered for analysis as many study participants had graduated the study, or dropped out, and the sample would have been too small for meaningful analysis.
Generalized estimating equations
For our second research question, we utilized generalized estimating equations (GEE) in order to assess the associations between suicidal ideation and recent sharing of used syringes (receiving and giving used syringes in the past 3 months). Because analyses of factors associated potentially with recent sharing included serial measures for each subject, we used GEE for binary outcomes with logit link for the analysis of correlated data. This approach allows for the identification of factors associated independently with the outcome during the entire study period [29]. In this analysis, we included all participants seen for baseline, six-month follow-up and twelve month follow-up interviews.
We considered the following independent variables associated with receiving and giving used syringes in the past three months: suicidal ideation (yes vs. no), formal schooling (yes vs. no), marital status (married/cohabiting vs. others), occupation (scavenging vs. others), income (up to Rupees 100 vs. more than Rupees 100) and age (continuous). All demographic variables referred to status at baseline interview and the suicidal ideation variable was in regard to three months prior to the interview. All p-values are two-sided. As a first step, we conducted univariate GEE analyses to determine factors associated with recent receipt and giving of used syringes. Next we entered all variables of interest into a fixed multivariate logistic GEE model. All statistical procedures were performed using SPSS software version 16.0 (SPSS, Chicago, IL, USA).
Results
All 449 IDU participants were male. This is despite efforts made to attempt to recruit females, and it appears that there are few female IDUs in evidence. Most participants lived in and around the study area, and as indicated by previous ethnographic research, they had originally came to Delhi from nearby towns and villages as migrant workers [30]. Baseline data showed that the majority (89%) were homeless and lived on the street, earning an average daily income of Rs 107 (~$2), mostly from rag picking (91%). The median age was 28 years (IQR: 25–34 years). Less than half (35%) were married: close to 26% lived with their spouses and the rest were separated. The median age at first injection was 22 years (IQR: 19–29 years). All participants at baseline injected a combination of one or more of the following drugs: buprenorphine (91%); antihistamine (96%); diazepam (81%) and promethazine (21%). The mean injection frequency was 2.8 per day with 2 ml of each drug used at each injection episode. Slightly more than half (59%) reported using non injectable drugs along with injectables. Among the 240 participants (54%) who reported using drugs in groups, 66% said they shared drugs (n=160), 39% said they shared needles and syringes (n=95), and 65% shared drug equipment, such as mixing containers and ampoule bottles (n=158). IDUs who reported using drugs in groups also reported sharing food (86%) and sleeping space (74%). Almost equal numbers of IDUs admitted to ever giving and receiving a used syringe (41% said they had given a used syringe, 45% said they had received one). More than half (66%) had heard of HIV/AIDS, and knew of all the possible transmission routes. Sexual contacts in the last six months, mostly with sex workers, were reported by almost one third of the sample of IDUs. At the end of the study, there were 30 deaths (6.7% of cohort) reported among the entire cohort, the causes of death, except for road accidents, were unconfirmed. The prevalence of suicidal ideation, suicide plan, and suicidal attempts at baseline among this cohort are 23% (n=104), 18% (n=83), and 17% (n= 77) respectively. Only close to 3% (n=11) had ever been treated in a mental health institution.
Trends in suicidal ideation, suicide plan and suicide attempt across study period: The proportion of respondents reporting suicidal ideation and suicide attempt during the past six months did not significantly vary over the study period from baseline to 12 months (Table 1). A total of 366 respondents answered question on suicidal ideation at all three time points and about one-fourth of them responded affirmatively to this question. When asked about suicide plan, 6.0% (n=27) respondents answered at all three time points, out of which 74.1% (n=20) at baseline, 85.2% (n=23) at 6 months and 96.3% (n=26) at 12 months reported making a specific plan about taking their own life during the past 6 months. IDUs who reported attempted suicide at all three time points also stood at 6.0% (n=27), of which 70.4% (n=19) at baseline and 85.2% (n=23) at 6 months and 12 months reported having attempted to take their lives during the past six months of the survey. When comparing the groups across three time points for suicide plan we obtained a Cochran’s Q test of 6.7, df 2 with a P value of 0.034 (significant at 0.05 level). The difference in the proportions for suicidal ideation and suicide attempt were found to be non-significant.
Discussion
A major finding of the study is the alarmingly high rate of suicide attempts and precursors to suicide among IDUs in New Delhi. As well, suicidal ideation and suicide attempts did not decrease over the study period; rather these measures remained constant throughout while the number of participants reporting suicide plan increased over the study period despite access to a broad range of health and IDU-risk reduction intervention services. These included nutrition, health education, oral buprenorphine substitution, regular health check ups, medical referrals, and detoxification and rehabilitation facilities. However, since we did not examine uptake of these services, we cannot definitively conclude that they did not improve the mental health of the suicidal participants. Also, the study period may not have been long enough to mark changes in mental health state of the participants. Despite these limitations, we can tentatively suggest that suicidal ideation did not decrease over a period that saw the introduction of several interventions including the provision of nutritious food which is generally found to be associated with high utilization. With regard to suicide plan, we did find a difference in proportion across the study period with an increasing number of respondents responding affirmatively to the question on suicide plan. Thus, what this suggests is that despite the services offered, more and more participants were reporting plans to commit suicide. Studies based in India demonstrate that unemployment, marginalization, financial difficulties, and the inability to buy food is associated with suicide [31–33]. Other studies have found homelessness to be a major factor in depression and other forms of psychopathology among IDUs [13, 34]. Since most of our study participants are homeless, marginalized and suffer from an inability to buy food, using drugs in addition perhaps exacerbate the symptoms, thus necessitating mental health intervention through active referrals in harm reduction programs.
The fact that the majority of those with suicidal ideation reported attempting suicide, and that nineteen of these consistently reported attempts at all 3 time periods suggest, firstly, that suicidal ideation, in this population, can be a precursor of a suicide attempt [15] and secondly, that there is a small pool who consistently attempted suicide. Although a number of deaths occurred in the cohort during the study period (reported as adverse events to the IRB), we do not know whether they included suicides. However, the possibility cannot be ruled out, as there is no proper system of ascertaining the cause of death in India [19]. At least in one case, field workers verified that a study participant did commit suicide based on his earlier actions and statements which were witnessed by many.
We also saw that suicidal ideation and risk behaviors were associated consistently over the study period, albeit the modest effect sizes. Our findings find support with other studies that have shown a correlation between suicidal thoughts and risk behaviours, such as using syringes used by another [24], injecting more frequently [35], and sharing needles and syringes [12, 25–27]. A harm reduction intervention has been operational for many years in Delhi, which is separate from the research study. The gains accrued in HIV prevention behaviours among IDUs subsequent to harm reduction interventions may very well be diluted if attention is not paid to this special section of the IDU population who present with suicidal behavior. In the context of comprehensive harm reduction programming, therefore, this would require an enhanced intervention targeting suicidal IDUs, as they continue with unsafe behaviours that make them and others vulnerable to infectious diseases.
Our study has a number of limitations. Since we could not determine if suicide is the cause of death among 8% of the cohort who died during the course of the study it leads us to propose that there is very real need for examining causes of mortality among this population, with the goal of prevention. We did not examine the uptake of services by suicidal IDUs, thus making it difficult for us to conclude that there is no improvement in mental health despite a broad array of services.
The findings tentatively suggest that HIV prevention efforts alone may not lead to reduction in behavioral risks among a certain group of IDUs. It may be necessary to provide services that ameliorate the conditions that lead to depressive symptoms and suicide which negatively influences HIV risk related behaviours. Linking harm reduction programmes with employment and income generating opportunities can help in mitigating economic hardships of IDUs, as well ensure stability in their lives. Furthermore, as drug use may also be contributing to their poor mental health, it is essential that the quality of detoxification and rehabilitation services be improved in order that IDUs may volunteer for such services. Additionally, it will be beneficial to have proper referral systems in place whereby IDUs exhibiting suicidal ideation and/or depression symptoms can access mental health services. Given the significance of the findings, it may be useful to develop simple mental health assessments that could be used in the context of harm reduction prgrammes to facilitate such referrals.
Declarations
Acknowledgements
This research was funded by the National Institute of Drug Abuse (R01 DA014227), NIH. The publication is supported, in part, by the Fogarty International Centre/USNIH.
Authors' original submitted files for images
Below are the links to the authors’ original submitted files for images.
Competing interests
The authors declare that they have no competing interests.
Authors’ contributions
ES directed the operations of the study, drafted the manuscript and supervised the data analysis. BS managed the data and conducted the data analysis. LS supervised the data collection and gave inputs to the draft. MS advised the content and data analysis of the manuscript. All authors read approved the final manuscript.
Authors’ Affiliations
(1)
Independent consultant
(2)
Department of Psychiatry and Behavioral Sciences, Family Service Research Center, The Medical University of South Carolina
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
Nanyang Jiangying Airport
Nanyang Jiangying Airport () is an airport serving the city of Nanyang in Henan Province, China. It is located near Jiangying, in Wancheng District, east of the city center. The airport was opened in October 1992 and expanded in 1998. It is currently undergoing another phase of expansion.
Facilities
The airport has one runway that is long and wide (class 4D), and an terminal building. Construction is under way to lengthen the runway to and expand the terminal building.
History
The original Nanyang Airport was built in April 1934 and occupied by the Japanese during World War II. After the war it was used as a military airport with some civil flights. In October 1992 the new Jiangying Airport was built at the current location with an investment of 77 million yuan, and the old airport was closed. The new runway was long and wide. In 1998 the airport was expanded at a cost of 22.8 million yuan, lengthening the runway to . Scheduled flights to Guangzhou, Shanghai, and Beijing started in 2004.
Airlines and destinations
See also
List of airports in China
List of the busiest airports in China
References
External links
Official web site
Category:Airports in Henan
Category:Airports established in 1992
Category:1992 establishments in China
Category:Nanyang, Henan
Category:Nanyang
Category:Henan
Category:China |
The Kyoto Protocol is an international agreement linked to the United Nations Framework Convention on Climate Change. The major feature of the Kyoto Protocol is that it sets binding targets for 37 industrialized countries and the European community for reducing greenhouse gas (GHG) emissions .These amount to an average of five per cent against 1990 levels over the five-year period 2008-2012. |
China's 18th Party Congress: Why so secretive?
A paramilitary policeman passes by the portrait of China's President Hu Jintao at a state-sponsored exhibition in Beijing Tuesday.
Story highlights
There are no laws -- or even clear rules -- that govern selection of leaders, Bao writes
Bao: It is unlikely that public will ever know how Xi became Hu's designated successor
Selection of powerful Politburo Standing Committee is another top level state secret
Bao: Public consent is lacking; in media age, leaders respond by making system more opaque
Rumors and speculation are running wild, as the Chinese Communist Party (CCP) prepares for its 18th Party Congress. So far, though, the most tangible thing about the Congress is the massive deployment of extended security measures in China, resulting in the cancelation of academic conferences, art exhibitions, performances and even private meetings.
In a way, the CCP is asking the entire Chinese nation to hold its breath until the Congress ends.
All this effort is expended over the transfer of power to the "next generation" of Chinese leaders. Indeed, these extra security measures indicate that the leaders of the CCP understand well their weakness: that the fragility of an authoritarian system lies in its transfer of power.
That is, despite its domination over the lives of the Chinese people, even the Communist party is not exempt from the general political axiom that a governing régime relies on popular acceptance of its authority.
Bao Pu
The problem is that is no one, not even the Party's own members, voted for the next generation of CCP leaders. There are no laws -- or even any clear rules -- that govern the selection of leaders, leaving the matter of choosing the top leaders of the most populous nation on earth entirely at the mercy of the Party's forever changing internal logic.
Even after a decade as the top leader of China, how exactly President Hu Jintao became Jiang Zemin's designated successor remains a mystery even to expert analysts and historians.
The selection process is and will always remain at the highest level of state secrets, guarded even from the majority of Party members. The most important reason is that any detail, if known, could be used as ammunition for internal party strife and dangerously expose the leadership's vulnerabilities.
Just Watched
Retracing Chen Guangcheng's escape
On April 30, 1976, after Premier Hua Guofeng had accompanied Chairman Mao Zedong to a meeting with New Zealand Prime Minister Robert Muldoon, Hua told Mao that he would summon activists from Sichuan and Guizhou provinces to Beijing for a conference to strengthen the "Criticize Deng Xiaoping Campaign."
Just Watched
China censors NY Times after Wen story
Mao was already suffering from a neural disease that made him unable to speak, so he replied by jotting down a note that read: "With you in charge, I am at ease." Five months later, Mao died, and Hua became his successor as chairman.
Just Watched
Presidential candidates on China
That note became the main vehicle of state propaganda efforts to lend Hua legitimacy. And in order to keep its original limited context a secret, Foreign Minister Qiao Guanhua, an eyewitness to the original exchange, was sacked.
It is unlikely that the public will ever know how Xi Jinping became the designated successor of Hu Jintao. Whether or not he was actually handpicked by Jiang Zemin, as rumored, will remain a secret, and even if Jiang were confirmed to have picked Xi, Jiang does not have the charismatic stature of Mao to lend instant legitimacy to his chosen successor, and the lack of public consent would only be highlighted.
In Hua's case, details surfaced only after he was politically sidelined and excluded from positions of power.
In addition to the selection of president and the party's general secretary, the selection of the powerful Politburo Standing Committee is another top level state secret, because the details of who nominated whom would allow political analysts to figure out factional affiliations and map out the complex web of entrenched interests.
Under certain circumstances, information regarding top leaders is released to the public only with intent. Deciding which details to release or not to release on the fallen Bo Xilai must have been a real headache for the Chinese leadership. When the case against his wife, Gu Kailai, was first announced, there was no mention of Bo himself.
Too many details would only confirm the longstanding public impression that families of high-level Party officials use their connections to rapidly accumulate millions and live their private lives in stark contrast to the Party's claims of altruism. Yet, some details needed to be released, as authorities built their case against him.
Thus, the decision of what and when to release information has seemed painfully slow and cautious, creating the perfect environment for rumors and speculation to feed public curiosity.
In today's global information environment, details on the Chinese leadership can now reach millions of people in a matter of minutes via online media and social networks. More than likely, Chinese leaders do not like the way the public reacts to news that is not carefully crafted by the state's propaganda machinery.
In March 2012, a young man driving a Ferrari 458 Spider with two young women aboard died in a fatal high-speed crash. Information about the incident went viral online before it could be suppressed. The driver was reportedly found to be Ling Gu, the son of Ling Jihua, President Hu Jintao's protégé, who was demoted six months after the Ferrari incident.
Recently, the New York Times report of Premier Wen Jiabao's alleged family business ventures spread throughout the Chinese online network shortly after publication, even after Chinese authorities had blocked access to the newspaper's English and Chinese websites. The same happened after Bloomberg reported on the wealth of Xi's extended family.
That is a far cry from September 13, 1971. When Mao's comrade-in-arms Lin Biao died in a mysterious plane crash in Mongolia, it took months for the news to ripple through widening circles of the population.
Thus, the Chinese leaders' response to the new age of information has been to make their political system ever more opaque and expend enormous resources on media censorship.
Such is the case with Xi, China's designated leader, of which little is known beyond official accounts. His personality too must be kept secret through a web of media censorship, because such information could be used by opponents to figure out his political tendencies and preempt his political actions.
If we have to make an intelligent guess about Xi, we might have to look at the CCP's recent "History of the Chinese Communist Party, Volume 2 (1949-1978)," which covers the Mao years. This grand project was led by none other than Xi Jinping, according to official reports, and reportedly under his sole discretion. The result is another Party effort to cosmetically make over the disastrous events of the Mao era.
When Xi is in power, he will be turning Party history to its next page. |
Republicans choose Dempsey as Missouri Senate president
JEFFERSON CITY — The Missouri Senate will be led by new people when it convenes for the 2013 session.
Majority party Republicans on Thursday nominated Sen. Tom Dempsey, of St. Charles, to serve as president pro tem — the top position in the chamber. Dempsey still must be elected by the full Senate when it convenes in January, but that is expected to be a mere formality.
Republicans picked Sen. Ron Richard, of Joplin, to succeed Dempsey as the Senate majority leader. Richard, a former House speaker, defeated Sen. Mike Parson, of Bolivar, during a closed-door meeting of the Republican caucus. |
Q:
How to deal with almost the same enums?
I need to define enums in several classes. The majority of fields are the same in all of the enums. But one has one or two more fields, another has fewer fields. Now I wonder what is the best way to deal with this?
Create separate enums
public enum Foo {field1, field2, field5 };
public enum Bar {field1, field2, field3, field4 };
or use a general enum for them all
public enum FooBar {field1, field2, field3, field4 , field5};
The enumerations contain the list of actions available for each class.
Update : sorry if the question was not clear enough . I want to use these enums as parameters in classes methods . for example classOne has a method as below :
public void DoSomeThing(Foo action,object moreData)
{
// operation desired
}
here I want action to be limited to Insert , Update and Delete
while in classTwo :
public void DoSomeThingElse(Foo action)
{
// operation desired
}
I want to limit action availabe to Insert and Select
A:
You should use a different approach.
Create an enumeration which contains all available actions (insert, update, delete, etc.).
So you can add a new (static) field to each class _ a list of items of that enumeration _ to represent the list of valid actions.
It makes no sense to have a separate enumeration for each class _ the enumerations semantically represent values of the same kind.
For example, you have an enumeration:
public enum ACTIONS { insert = 1, update = 2, delete = 3 }
In you class you would use it like this:
public class MyClass
{
public static ACTIONS[] Actions = { ACTIONS.insert, ACTIONS.delete };
}
A:
The enumerations contain the list of actions available for each class.
Why are you trying to use enums to solve your problem. I would create interface to cover all common behavior (actions) of my classes instead. You may create one ICommon interface which will contain all your common behaviors for the class to support your design and class behaviors.
There are very good posts on this topic like Designing C# Software With Interfaces or you may also reference Wikipedia for common information - The concept of class interface.
|
Apropos of my post below, I’m getting word that Coleman may be in the process of fielding the lawyers for a replay of President Bush’s 2000 recount smackdown. And this from the Associated Press gives a clue to why he is getting worried …
An Associated Press analysis of the nearly 25,000-vote difference in Minnesota presidential and U.S. Senate race tallies shows that most ballots lacking a recorded Senate vote were cast in counties won by Democrat Barack Obama. |
Saudi Arabia has received around 2.5 million Syrians since the start of the conflict in their country, an official source in the Saudi Ministry of Foreign Affairs (MoFA) has revealed, elaborating that the Kingdom has adopted a policy not to treat these Syrians as refugees, or place them in refugee camps “in order to ensure their dignity and safety.”
READ ALSO: Saudi FM: Assad has no place in Syria’s future
Speaking to the state-run Saudi Press Agency (SPA), the MoFA official explained that Saudi Arabia initially did not “intend to speak about its efforts to support Syrian brothers and sisters, during their distress, as it has, since the beginning of the problem,” adding that “Saudi Arabia dealt with the situation from a religious and humane perspective, and did not wish to boast about its efforts or attempt to gain media coverage.”
READ ALSO: Saudi Crown Prince orders help for Syrian refugee
However, given what he slammed as media reports containing “erroneous and misleading information,” the Saudi official told SPA that the Kingdom now considers it important to discuss its efforts with “appropriate facts and figures,” as he stated the following:
1. The Kingdom has received around 2.5 million Syrians since the beginning of the conflict. In order to ensure their dignity and safety, the Kingdom adopted a policy that does not treat them as refugees or place them in refugee camps. They have been given the freedom to move about the country and those who wish to remain in Saudi Arabia (some hundreds of thousands) have been given legal residency status. Their residency comes with the rights to receive free medical care, to join the labor market and to attend schools and universities. This was contained in a royal decree in 2012 that instructed public schools to accept Syrian students. According to government statistics, the public school system has accepted more than 100,000 Syrian students.
2. The Kingdom’s efforts were not limited to accepting our Syrian brothers and sisters after their crisis; it also extended its efforts to support and care for millions of Syrian refugees in neighboring countries such as Jordan, Lebanon and others. Efforts included providing them with humanitarian assistance, in coordination with the host governments and with international human aid organizations. Aid was provided, in cash and kind.
3. The aid provided by Saudi Arabia to the Syrian people totals around $700 million, according to the statistics of the Third International Humanitarian Pledging Conference for Syria, which took place in Kuwait on March 31, 2015. Government aid and aid provided by the National Campaign, are included in that number.
4. Humanitarian aid provided to Syrians by the Kingdom consisted of food, medical, academic, residential supplies and included the establishment of Saudi specialized clinics in refugee camps, especially at Zaatari Camp in Jordan. The Kingdom was able to provide medical care in the form of immunization, preventive treatment and medical procedures. In addition, Saudi Arabia sponsored a large number of Syrian families living in Lebanon and Syria (specifically, through paying for their rent and living costs).
READ ALSO: Diary of a Syrian retiree in Saudi Arabia
The ministry official concluded his statements to SPA by saying that: It is apparent from the previous facts, that the Kingdom of Saudi Arabia will remain a leader among other countries supporting Syrian people and it is impossible to outbid its efforts in this matter, or to question its position in any way or form, the statement concluded.
Last Update: Wednesday, 20 May 2020 KSA 09:47 - GMT 06:47 |
Maintenance therapy for cytomegalovirus retinitis in patients with acquired immunodeficiency syndrome: foscarnet.
The use of ganciclovir in the treatment of cytomegalovirus (CMV) retinitis in patients with acquired immunodeficiency syndrome (AIDS) is limited by marrow toxicity and by the development of resistance to this agent in CMV strains capable of causing progressive disease. Foscarnet retains activity against ganciclovir-resistant CMV and has an adverse effect profile different from that of ganciclovir. Preliminary data from studies conducted under the AIDS Clinical Trials Group (ACTG) program indicate that intravenous foscarnet maintenance therapy at 60, 90, and 120 mg/kg/day in AIDS patients with CMV retinitis successfully completing foscarnet induction therapy is associated with median times to retinitis progression of 90, 95, and greater than 123 days, respectively. An ACTG trial of foscarnet in patients failing ganciclovir therapy has been initiated, as has a trial jointly sponsored by the National Eye Institute and the National Institute of Allergy and Infectious Diseases comparing the safety and efficacy of foscarnet and ganciclovir. Also underway is a trial evaluating the effects of combination and alternating regimens of these two agents. |
Why Learn About Web Security?
Why Learn Spring Security?
3. Learn Spring Security 4 Intermediate on Udemy
The Spring Security is one of the leading open-source, security framework which allows you to implement security in Java-based web applications. It provides several security features like authentication, authorization, remember me out-of-the-box, which means you can directly use them without adding code or changing your class. Yes, Spring Security implements security at the application level i.e. you can even secure your non-secure resource without modifying them. It is also the leading framework to secure RESTful Web Services . Because of all these, the demand for Java developers with good knowledge of Spring Security is very high.They are also some of the highly paid Java developers. Many Java and Spring developers, particularly those who are involved in enterprise and Java web development are learning Spring Security.One of the frequently asked questions by my readers is about. After answering many of them on Facebook, I decided to write this post to share my thoughts on some of the best Spring Security online courses for Java developers.To be honest, there are not many good courses available to learn Spring Security, especially free resources are hard to find and they are not up-to-mark in most cases.Fortunately, there are some good online training courses to learn Spring Security available like the, which explains not only Spring Security but why Security is important on Java web application and how you can implement them in a transparent manner using Spring Security.There are a couple of more from popular training courses from websites like PluralSight and Udemy, which you will find in this article.Security has been always paramount for web applications. It's one of the must-have non-functional requirements to prevent a business from several kinds of attacks like DOS, SQL injection , Session hijack, etc.But the security has become even more important in the last few years because of REST APIs becoming mainstream, the introduction of OAuth2, single-page apps, two-factor authentication, and a lot of other things.And the security market is huge, which means there’s no shortage of security work to be done when you know your stuff well.In 2020, Not having a solid, deep understanding of the current security landscape is no longer an option. As a Senior Java Developer, you should be familiar with the security basics and know the tools to secure your Java application.The Spring Security has been getting better as well with the launch of Spring Security 4 and the new Java configuration style as a solid alternative to XML. Currently, Spring Security is THE learning framework/library to properly and intelligently do security if you're working in Java.Spring Security offers several out-of-the-box solutions like authentication and authorization, securing views using access control, role-based access control , and LDAP integration , which is very important for any real-world Java application.Good knowledge of Spring Security also gives you an edge on the interview, as for many Java developers security is often considered as a second thought.This is simply the best Spring security training course currently available in the market. Eugen Paraschiv's shares his years of experience in securing Java web application and RESTful Web service in this course.The course will teach you both Security and Spring Security fundamentals and give you the necessary tools to secure your application using Spring Security.If you are in a hurry and want to learn Spring Security from scratch, this is the course you should join. There are three different classes depending upon your need and budgets like the Certification class , the Masterclass, and the Coaching class.The Intermediate Class not only explains the basics of Spring security but also goes deeper to explain how to secure your REST API, password storage, and advanced configuration options. This is an ideal course for someone who knows Spring and just wants to get familiar with Spring Security.On the other hand, the Master Class will teach you more advanced implementations and in-depth knowledge of Spring Security. You will learn things like a complete two-factor authentication solution, a full ACL implementation, Single Sign-On, a ground-up OAuth2 + JWT + proxy security for an API, how to deal with various attack vectors - among other things. This is the course I recommend to senior Java developers.The Coaching Class is master class + support. It gives you the full Master Class material, plus a year of monthly coaching calls with Eugen and access to future webinars and workshops.If you need someone to guide or consult, this is the course for you to join. No doubt, the course is slightly expensive but it's worth all the money spent. The knowledge you will gain by joining this course is worth much more than what you spend.This is another good course to learn Spring Security online. It covers all of the fundamentals of Spring Security like user storage in memory and in a database, client integration with tag libs, password storage, customizing the UI, method level security as well as method-level permissions, basic LDAP configuration , and forcing connections over HTTPS.If you are working on a Spring MVC application and want to secure it using Spring Security, this is the course to join.The course is free only if you have a PluralSight membership, which costs around $29/month to 49$/month. You can also try out their free trial to check the quality of course. Alternatively, you can also take their 10-day-free-pass to watch this course for FREE.Btw, PluralSight membership is worth of money, especially if you have your company pay for it. They contain many Spring online courses as well as many advanced Java technologies like REST, JPA, Hibernate, Spring Security which is worth the money you spend.This is an advanced course to learn Spring Security 4 from Udemy, another popular online training website. This is the series of two courses that cover Spring Security 4 in depth. This is the second course of the series, which built on the basic knowledge of the first course "Learn Spring Security 4 Basics - Hands-On" The best part of the course is that if extensively focus on hands-on training. You can get this course on $10 in Udemy, currently, 89% is off.That's all about some of the. These courses are very good and contain the useful information required to implement security in a real-world Java web or enterprise application. Some of them also teach you how to secure your RESTful Web Services using Spring Security.Btw, if you are someone who likes to learn from the books or looking for a good book to learn Spring Security on their own, I suggest reading Pro Spring Security, one of the best books to learn Spring Security.Thanks for reading this article, If you like these online training courses then please share with your friends and colleagues. If you have any questions or feedback then please drop a comment.- If you are new to Spring framework and looking for a comprehensive course to learn Spring framework then I also suggest you join thecourse by John Thompson on Udemy. It's the most up-to-date course to learn Spring 5 online. |
Javier Chevantón
Ernesto Javier Chevantón Espinosa (born 12 August 1980) is a former Uruguayan footballer, who played as a forward.
He obtained a Spanish passport after playing a few years in Spain. Chevantón has been described as a player who possesses explosiveness, pace and tenacity.
Club career
Lecce
Chevantón was scouted by U.S. Lecce sports director Pantaleo Corvino and signed in the summer of 2001. Despite his 12 goals in 27 games, Lecce were relegated that season into Serie B and Chevantón stayed with them. His presence would prove vital, scoring 18 goals in 30 games to promote Lecce straight back into top flight domestic football. In the 2003–04 Serie A he was the fourth goalscorer of the tournament with 19 goals and became the all-time goalscorer for Lecce, overcoming former Argentina national team and Lecce player Pedro Pablo Pasculli.
Monaco
Following the loss of Fernando Morientes (returning to Real Madrid after his loan period expired) and Dado Pršo (who became free agent after failed to agree a new contract), Didier Deschamps was looking to reinforce his frontguard and so made an offer for Chevantón. In July 2004, he signed a 4-year contract with Monaco for a reported €10M. A few weeks later Mohamed Kallon was signed and the duo was expected to become striking partner.
Unfortunately, he was injured in August 2004 and Javier Saviola was signed as replacement. He was fit again in October but injured again in January. Since returned in February, he finally netted a goal in Ligue 1 on 16 April 2005. That season he scored 10 league goals, 1 goal behind Kallon and but ahead rising star Emmanuel Adebayor, Saviola and out-favoured Shabani Nonda. The 2004 UEFA Champions League finalist also exited in the round 16 of 2004–05 UEFA Champions League as non of the Monegasque strikers able to score against PSV.
In 2005–06 season, Nonda was released and Kallon was sent to Middle East on loan. Chevantón and Adebayor became the starting pair under Deschamps. He missed few matches in August 2005 including the 2005–06 UEFA Champions League 3rd qualifying round return leg. Since Francesco Guidolin succeed as coach in October, Chevantón remained as one of the striker in the league. However, he did not played in the whole UEFA Cup group stage, due to both fitness problem and squad rotation. In January 2006, Christian Vieri and Marco Di Vaio were signed and Adebayor was sold (who suffered with injury too). He did a knee operation in January 2006 and return on 7 February, the Coupe de la Ligue semi-final. On the same month, he played as substitute in UEFA Cup round of 32, which the coach preferred Serge Gakpé partnered with Vieri. In the league he played a successive 11 league matches since round 28 (on 25 February) and almost scored in every match (7 goals in 7 different matches). Chevantón became the team top-scorer in the league with 10 goals by his performance in the second half of season, ahead mid-season signing Di Vaio and winger Olivier Kapo who both scored 5 league goals.
Sevilla
On 1 August 2006, he was signed by 2005–06 UEFA Cup holder Sevilla for a reported €8M and agreed a 5-year contract. The beginning of Chevantón's season at Sevilla started with a back strain which put him out for the first few weeks, but he scored four goals for Sevilla in the UEFA cup against SC Braga, AZ Alkmaar, Shakhtar Donetsk and Grasshopper Club Zürich, and scored his first La Liga goal by way of a stylish bicycle kick at home against Real Madrid on 9 December 2006, which led to the home team's 2–1 victory. The second time Sevilla met Real Madrid that season Chevantón scored another goal with an excellent free kick. He recently netted the equaliser against Arsenal in a pre-season friendly for Sevilla in a 1–1 disappointment at the Emirates but has since found opportunities in the Spanish League limited.
Atalanta
On 26 November 2009, he was given permission to trial with Serie A club Atalanta, who ultimately agreed a loan deal with Sevilla. The player joined the club on 2 January 2010, until the end of the 2009–10 season.
Lecce
On 23 August 2010, Chevantón returned to his former club Lecce. His contract with Sevilla was terminated in earlier days.
Colón de Santa Fe
In July 2011, Lecce didn't renew his contract and he was hired by the Argentinian team Colón de Santa Fe.
Lecce
In the summer of 2012, he joined Lecce, now in the Lega Pro Prima Divisione, for a third time after their relegation from Serie A in 2011–12 and subsequent expulsion from the Serie B for their part in the Calcio Scommesse scandal.
Queens Park Rangers
On 25 September 2013, Chevantón signed a short-term deal, until Christmas Eve, with English Championship club Queens Park Rangers. He made his debut for the club on 5 October 2013, coming on as a late substitute for Niko Kranjčar in a 2–0 win against Barnsley.
Chevantón was released by Queens Park Rangers on 24 December 2013.
Liverpool (Uruguay)
After being released by QPR, Chevantón left England and returned to Uruguay where he signed a contract with Liverpool F.C. (Montevideo).
International career
Run-ins with the Uruguay head coach Jorge Fossati have restricted his playing time for the national team, most strikingly obvious was his omission from the last stage of 2006 World Cup qualification. Uruguay failed to qualify for the 2006 World Cup.
After a long spell out of the national side Chevantón was finally included back in the Uruguay national squad for 2010 FIFA World Cup qualification in September 2008 for the matches against Argentina and Bolivia in October. It was partially due to the injury of Diego Forlán. Chevantón played the match against Argentina as substitute in the 73rd minutes for Sebastián Abreu while Abreu partnered mainly with Luis Suárez and Edinson Cavani during the match. Chevantón was then dropped against Bolivia and was not called up again due to personal fitness and competition among Uruguay's top strikers.
References
External links
Category:1980 births
Category:Living people
Category:People from Juan Lacaze
Category:Uruguayan footballers
Category:Uruguayan expatriate footballers
Category:Uruguay international footballers
Category:Uruguay under-20 international footballers
Category:Danubio F.C. players
Category:U.S. Lecce players
Category:Atalanta B.C. players
Category:AS Monaco FC players
Category:Expatriate footballers in Argentina
Category:Expatriate footballers in Italy
Category:Expatriate footballers in Monaco
Category:Expatriate footballers in France
Category:Expatriate footballers in Spain
Category:Expatriate footballers in England
Category:Sevilla FC players
Category:Club Atlético Colón footballers
Category:Queens Park Rangers F.C. players
Category:Liverpool F.C. (Montevideo) players
Category:La Liga players
Category:Ligue 1 players
Category:Serie A players
Category:Serie B players
Category:Argentine Primera División players
Category:English Football League players
Category:Uruguayan Primera División players
Category:2001 Copa América players
Category:Uruguayan expatriate sportspeople in Argentina
Category:Uruguayan expatriate sportspeople in France
Category:Uruguayan expatriate sportspeople in Italy
Category:Uruguayan expatriate sportspeople in Monaco
Category:Uruguayan expatriate sportspeople in England
Category:Uruguayan people of French descent
Category:Association football forwards |
14-year-old killed when hit from behind by SUV
ERWIN, NC (WTVD) -- The North Carolina Highway Patrol has charged a driver after a 14-year-old was hit and killed along Red Hill Church Road at Tobacco Barn Lane just outside Erwin in Harnett County.
Pictures from Chopper 11 HD showed an SUV that appeared to have left the road after the accident and plowed across a property into an out building.
Troopers said 23-year-old Cameron Pipkin of Coats ran off the side of the road around 4:30 p.m. Tuesday and hit James Michael McLeod of Dunn who was walking along the shoulder of the road from behind. McLeod was a freshman at Triton High School.
Cameron Pipkin
"Our school system is saddened by this tragedy as is the staff of Triton High School," Harnett County Public Relations Director Patricia Harmon-Lewis said. "The counselors at Triton and our crisis counseling team will be at Triton tomorrow to meet with students and staff members as needed."
Meanwhile, Pipkin is charged with misdemeanor death by a motor vehicle and careless and reckless driving. He has since been released on a $1,000 bond.
Troopers said they believe he fell asleep at the wheel before he hit McLeod. They said speed was also a factor. |
1. Field of the Invention
The present invention relates to a process of aldol condensation of an active hydrogen-containing compound by a gas-phase reaction in the presence of a fixed bed solid catalyst.
2. Description of the Related Art
Processes of aldol condensation have been disclosed in Japanese Unexamined Patent Publication Nos. 52-113390 (corresponding to U.S. Pat. No. 4,086,188), 58-219139 and 60-172349 in which aldol condensation of an active hydrogen-containing compound is carried out by a gas-phase reaction in the presence of a fixed bed solid catalyst and wherein vaporization of a liquid of the active hydrogen-containing compound is carried out before the catalyst bed in a reactor. However, these processes have a disadvantage that the design of the reactor becomes complex since the vapor flow of the active hydrogen-containing compound is heated by 3/4 inch-high temperature glass fiber insulated tapes which were controlled by temperature controllers. Thus, these processes are not necessarily satisfactory from the viewpoint of the reaction in a commercial scale. |
Forum for Science, Industry and Business
German Research Foundation funds cardiovascular research at the Mainz University Medical Center
29.01.2013
Focused research on the involvement of inflammatory processes in the development of hypertension and arteriosclerosis
The German Research Foundation has approved funding for the Department of Internal Medicine II of the Mainz University Medical Center to promote the further study of the interrelations between the immune system and cardiovascular system disorders. The main focus of the current research project is on the pathogenesis of high blood pressure and arteriosclerosis.
PD Dr. Philip Wenzel, cardiologist and senior physician at the Department of Internal Medicine II, will use the about EUR 300,000 he has been granted for the next 36 months for staff resources and consumables. "We want to pursue the fascinating question of how the blood pressure hormone angiotensin II and the mediators of inflammation, in particular interferon gamma, interact in the pathogenesis of vascular diseases," said Wenzel.
In recent years, it has become increasingly clear that inflammatory cells, which are normally responsible for defending the body against pathogens, are also involved in the development of such frequently encountered disorders as hypertension, heart attack, stroke, and so-called 'window shopping syndrome' or intermittent claudication.
It is possible that many of the medications used to treat these illnesses, such as statins and ACE inhibitors, are only as effective as they are because they actually moderate these inflammatory processes. "Through our research, we hope to establish the foundations on which targeted anti-inflammatory therapies for arteriosclerosis can be developed and used in the future," Wenzel continued.
The successful acquisition of third-party funds is also attributable to the strategy adopted by the University Medical Center of Johannes Gutenberg University Mainz (JGU), namely that of establishing specialized research units. Within this context, the research team led by PD Dr. Philip Wenzel has managed to form partnerships that are important for the future of translational medicine.
"The work of the Research Unit Vascular Prevention and the establishment of the Center for Thrombosis and Hemostasis (CTH) with the support of the Mainz Heart Foundation have created an environment in which applications to the German Research Foundation have a greater chance of success," said Professor Dr. Thomas Münzel, Founding Director of the CTH and Coordinator of the Research Unit Vascular Prevention at the Mainz University Medical Center.
The IPH presents a solution at HANNOVER MESSE 2015 to make ship traffic more reliable while decreasing the maintenance costs at the same time. In cooperation with project partners, the research institute from Hannover, Germany, has developed a sensor system which continuously monitors the condition of the marine gearbox, thus preventing breakdowns. Special feature: the monitoring system works wirelessly and energy-autonomously. The required electrical power is generated where it is needed – directly at the sensor.
As well as cars need to be certified regularly (in Germany by the TÜV – Technical Inspection Association), ships need to be inspected – if the powertrain stops...
The Atlantic overturning is one of Earth’s most important heat transport systems, pumping warm water northwards and cold water southwards. Also known as the Gulf Stream system, it is responsible for the mild climate in northwestern Europe.
Scientists now found evidence for a slowdown of the overturning – multiple lines of observation suggest that in recent decades, the current system has been...
Because they are regularly subjected to heavy vehicle traffic, emissions, moisture and salt, above- and underground parking garages, as well as bridges, frequently experience large areas of corrosion. Most inspection systems to date have only been capable of inspecting smaller surface areas.
From April 13 to April 17 at the Hannover Messe (hall 2, exhibit booth C16), engineers from the Fraunhofer Institute for Nondestructive Testing IZFP will be... |
1. Field of the Invention
The present invention relates to a turbine wheel and to a Pelton-type turbine equipped with such a wheel.
2. Brief Description of the Related Art
Pelton turbines are conventionally used for transforming the kinetic energy of a fluid, such as the water of a waterfall, into mechanical energy. Such transformation is effected by rotating the turbine wheel under the effect of a tangential effort exerted, on buckets disposed on the periphery of a wheel rim, by a jet of water emerging from one or more injector nozzles distributed around the wheel.
The effort created on each bucket is transmitted to the wheel rim through an area of attachment of the bucket on the wheel rim. This area of attachment, defined by the geometrical intersection of the bucket with the rim, is subjected to considerable mechanical stresses. In effect, each bucket may be mechanically modelized as a beam fixed on one side only, with the result that it undergoes a considerable bending strain due to the effort of the jet. In addition, high vibratory stresses are applied to the bucket and there is a danger of resonance of the bucket or the rim.
In known devices, particularly of EP-A-0 346 681 or of EP-A-0 522 336, attempts have been made to overcome these drawbacks by reinforcing the area of attachment of the buckets on the wheel rim. This leads to structures which are complicated and therefore expensive, and of reduced reliability. In addition, each bucket remains attached to the rim by one side, with the result that the nature of the problems encountered is not fundamentally changed.
FR-A-704 875 teaches making the buckets of a turbine abut on one another by means of rings mounted on their periphery. The distribution of the efforts is not optimum and arms must be interposed between adjacent buckets, being mounted with the greatest care, which results in a non-homogeneous distribution of the efforts.
It is a particular object of the present invention to overcome these problems by proposing a turbine wheel of Pelton type in which the buckets are connected to the wheel rim so that the mechanical stresses are not concentrated in an area of attachment of the bucket to the rim and the dangers of resonance of the wheel are substantially reduced thanks to an optimalized distribution of efforts.
In that spirit, the invention relates to a wheel of the above type, which comprises at least one annular disk fast with the wheel rim and provided with housings for receiving the buckets. This disk is adapted to absorb at least part of the efforts transmitted by the buckets to the rim and forms a peripheral band at the level of the outer radial areas of the housings.
Thanks to the invention, the disk which is on one piece and surrounds the buckets, makes it possible to support them, near the rim, in an intermediate area and in an outer radial area, with the result that each bucket is maintained efficiently in its inner, outer and central radial areas and that the effort to which it is subjected, due to the existence of the jet of fluid driving the turbine, has for its effect to apply it on the disk. This effort is in that case not concentrated solely in one area of attachment of the bucket to the wheel rim, but distributed over the whole of the disk. In other words, the tangential effort created on a bucket is transmitted to the disk. The bucket and that part of the disk supporting the bucket may be mechanically modelized as a beam on two bearings, and even a beam bearing on its length, the first bearing being towards the wheel rim, while the second bearing is constituted by the peripheral band of the disk. Such a distribution of the efforts induces a reduction of the stresses exerted on the mechanical components, which makes it possible to envisage pieces of lesser thickness.
Taking the foregoing into account, a turbine wheel according to the invention may be made of metal, composite material or be a mixed structure. For example, certain pieces, such as the wheel rim or the disk, are made of metal, while other pieces, such as the buckets, are made of composite synthetic material. A wheel rim or a disk made of composite plastics material may also be associated with metal buckets.
In addition, the presence of the outer peripheral band of the disk, which creates a continuity of matter outside the wheel, makes it possible substantially to reduce the vibratory stresses exerted on the buckets. In effect, the peripheral band contributes to distributing these stresses on the different buckets, with the result that the equivalent inherent mode of each bucket is no longer that of a beam fitted at one end only, as in the devices of of the prior art, but that of a beam fitted on one side and bearing on or fitted on the other side.
Finally, it has been surprizingly found that the presence of the disk makes it possible very substantially to improve the aerodynamic performances of the wheel of the invention. In effect, the disk makes it possible to limit the so-called xe2x80x9cventilatorxe2x80x9d effect of the wheel during rotation, i.e. the recirculation of the air between the outside of the wheel and the spaces between two consecutive buckets, due to the movement of rotation. Such reduction of the transverse air movements with respect to the buckets was able to be quantified, by laboratory tests, at about 20% of the braking force due to the ventilation of the wheel in the absence of disk. In this way, the invention also enables the yield of a Pelton turbine wheel to be substantially improved.
According to a first advantageous aspect of the invention, the wheel comprises two disks disposed on either side of one or more injector nozzles of the turbine. This aspect of the invention makes it possible to dispose the disks opposite each bowl or scoop of the buckets when the buckets are double, as is conventionally the case in Pelton turbines. In that case, the disks may be provided to be substantially aligned on the median axes of the scoops of the buckets.
According to another advantageous aspect of the invention, the disk or disks is/are provided with spokes each adapted to substantially fill the space separating two adjacent buckets of the wheel. Thanks to this aspect of the invention, the spokes present a sufficient cross-section to absorb the mechanical stresses transmitted by the buckets. Moreover, the fact that they substantially fill the space separating two buckets makes it possible to optimalize the reduction of the xe2x80x9cventilatorxe2x80x9d effect.
According to a first embodiment of the invention, the disk or disks is/are in the form of a perforated ring, means for removably mounting the or each disk on the wheel rim being provided near an inner edge of the or each disk.
According to a second embodiment of the invention, the disk or disks is/are formed in one piece with at least part of the wheel rim. Thanks to this aspect of the invention, transfer of the efforts of the disk towards the wheel rim is optimalized. In addition, assembly of the turbine wheel may be facilitated. In that case, the wheel rim may be provided to be formed by two half-rims, each half-rim extending radially towards the outside by a disk.
According to another advantageous aspect of the invention, applicable whatever the embodiment, the buckets are removably fixed on the disk or disks and/or the wheel rim. This aspect of the invention guarantees a good dimensional stability of the wheel during use and an efficient transfer of the efforts from the buckets towards the wheel rim. In addition, the operations of maintenance on the buckets or the disks are facilitated.
According to another aspect, the bucket may be permanently fixed on the disk or disks and/or the wheel rim.
The invention also relates to a Pelton-type turbine comprising a wheel as described hereinbefore. Such a turbine may be manufactured more economically than the prior art ones since it is possible to optimalize the dimensioning of the pieces by taking into account the fact that the mechanical stresses are better distributed over the wheel. In addition, the yield of this turbine is improved by reduction of the ventilator effect.
The invention will be more readily understood and other advantages thereof will appear more clearly from the following description of two embodiments of a turbine wheel in accordance with its principle, given solely by way of example and made with reference to the accompanying drawings, in which: |
extras
notes
OSWALD ASKS THE IRISH TO SEND HIM A BISHOP
As the son of Edwin's rival Æthelfrith, Oswald had gone into exile in the Scottish kingdom of Dál Riata after his father's defeat and death in 616. In exile, Oswald received religious instruction from Irish priests. Soon after assuming the throne of a reunited Northumbria in 634, Oswald sent to Dál Riata for an Irish bishop to reconvert Northumbria to Christianity. The bishop they sent was Aidan (ca. 590–651), from the monastery on the island of Iona. In Northumbria, Aidan's episcopal see was on the island of Lindisfarne.
nōn … secundum scientiam: a quotation from Romans 10:2 (Vulgate): testimonium enim perhibeō illīs quod aemūlātiōnem Deī habent sed nōn secundum scientiam ("I bear them witness that they have a zeal for God, but it is not enlightened" RSV). Bede explains the relevance of this quotation in the next sentence: Aidan was mistaken about the calculation of Easter.
Anatoliī:Anatolius of Alexandria was a 3rd c. CE scholar and saint who wrote a book on the computation of the date of Easter; the Irish seem to have based their computation of the date of Easter on a forged work attributed to Anatolius.
secūtam:secūtum esse, the infinitive in the accusative-infinitive construction of indirect discourse after aestimāns; the construction is: aestimans sē secūtam esse scrīpta; the subject of aestimans is nātiō: “the nation of the Picts…, thinking that they followed the writings….”
(6) morābantur: > moror, morārī = “to dwell,” “to live (in)”
apostolicae sēdis antistitis: “of the bishop of the apostolic seat,” i.e., the Pope
canonicō rītū: “in the canonical (or orthodox) manner”
AIDAN AND OTHER IRISH MONKS PREACH TO THE ANGLES
(7) ubi ipse:ipse refers to Aidan
(8) rheumate:rheuma, -matis: the tide, from the Greek ῥεῦμα = “stream” or “current.” Bede gives a similar description of the tides around Lindisfarne in his prose Life of St. Cuthbert. Today, the island (known since the 12th century as The Holy Island) is reached by a causeway that is submerged at high tide.
īnstar īnsulae: “like an island”
maris: with undīs
atque eius … cūrāvit: the subject is rex (Oswald).
auscultāns:auscultāre, “to obey,” can take a dative object (here, admonitiōnibus)
in omnibus:omnibus is a neuter substantive (“in all things”)
multum: “very”
(9) Vbi: picking up on in rēgnō suō: “in his kingdom…, where…”
pulcherrimō … spectāculō contigit:spectāculō is probably a dative of purpose or end (AG 382): “it happened as a beautiful sight” (i.e., it was a beautiful sight). |
714 F.2d 142
32 Fair Empl.Prac.Cas. (BNA) 1768
Retail Store Employees Union, Local 876, UFCW, AFL-CIOv.Montgomery Ward and Co., Inc.
82-1361
UNITED STATES COURT OF APPEALS Sixth Circuit
6/1/83
E.D.Mich., 540 F.Supp. 301
AFFIRMED
|
Managed Services
Managing messaging platforms is Openwave Messaging’s business. With more than 8 years of experience delivering Managed Services, Openwave Messaging helps our customers understand the core elements of their messaging platform and implement a strategy to improve performance, capacity, and reliability.
Carrier Class Service Level Commitment of 99.99% Availability
24x7x365 Dedicated Managed Solution Operations and Management
System status reports and capacity planning
ITIL v3 certified engineers
SAS70 Type 2 Audit Certification Compliance
Simple Hosted Messaging
A professional email hosting for personal or business domain names. The Simple Hosted Messaging platform provides the same level of service that is provided from our Managed Services offering with:
Free setup
Free Webmail
Anti-Spam and Anti-Virus
Web Based Provisioning Tool
Email wherever you are, whenever you need it.
Tru4 Hosted Managed Service
For customers requiring a personalized email experience that includes an integrated provisioning stream the Tru4 Hosted Managed Service offers a higher level of service.
Email Mx, Rich Mail, Edge Gx and AS/AV.
Over 12 years of seamless IMAP Migrations customized to meet business needs.
MMSC
Openwave Messaging’s Multimedia Messaging Service Center (MMSC) is a flexible, complete, carrier-scale multimedia-messaging platform that provides a superior user experience across multiple handsets and devices. The MMSC is architected as a distributed IP-based system whose mechanisms for inter-system and inter-process communications have been carefully designed and tested in many carrier-scale deployments to deliver superior scalability, reliability, high availability and performance. It is compliant to the OMA, 3GPP and 3GPP2 standards |
I am well overdue
for a post, but I am finally mentally ready to re-devote myself to The Crunchy
Radish. For the past 6 months I have been immersed in the clinical rotations of
my dietetic internship. Now that I have finally completed that phase, I am
moving forward and will soon take the RD exam and, fingers crossed, find a job.
In the meantime, I hope to continue to be able to offer some nutritive tips and recipe ideas.
Post internship, I am even more versed on nutrition and overall wellness, and
ideally can serve as a unique and intelligible source of nutrition information and cooking basics. So, thank you to those who continue
to follow my updates despite my recent lapse.
To kick off my
return, I am writing about an elemental summer pasta dish. We all know that a
perfectly juicy, sweet, and succulent tomato can emulate the essence of summer
and, when simply sprinkled with a little sea salt and paired with the simplest
of ingredients, can cause an eruption of happiness in your oral cavity.
Since joining a CSA, those tomatoes of
my fantasies have yet to reach my kitchen due to the drought which has impacted
our farm. Luckily, I was able to find some beauties at our local farmers market
which provided a superb foundation for this summer pasta.
For the fresh tomato sauce with tuna; some garlic and an onion were sautéed in olive oil, skinned,
chopped, fresh tomatoes were added. (To remove tomato skin, X the base of the
tomatoes and plop them into boiling water for 30 seconds. Blanch them in an ice
bath, and the skin should peel right off.) From this point, you can cook your
tomatoes as much or as little as you please. I added the almost-cooked whole-wheat
rigatoni into the sauce, chunks of tonno (originally in olive oil, drained) and
chopped black olives. Once everything is incorporated, top with torn
basil, chili flakes, and serve.
Whether I am
simply making a sandwich or something more complex, the tuna I always opt for
is Italian tonno in olive oil. I always drain the oil to limit the fat and
liquid content. The depth of flavor and quality of the tonno is always far superior
than your run of the mill chunk white in water, but this type of tuna does contain added fat due to the oil. Although tuna serves as a great source of protein, omega-3, and vitamin D,
it is important to not consume too much due to levels of mercury. According to the
Academy of Nutrition and Dietetics and the FDA, it is safe to consume a total
of 12oz of canned light tuna per week, but albacore, big eye, and chunk white tuna
should be limited to only 6oz total per week due to their higher levels of
mercury. (A typical can of tuna is 5oz)
Kale Caesar alongside my Rigatoni
Should you be concerned about mercury? Mercury is mainly a concern for pregnant women since it can build up in the blood and affect the development of an unborn child. In addition, excessive mercury intake for an adult may lead to neurological impairment. It is advisable to avoid consuming tilefish, shark, swordfish, and king mackerel- all of which possess the highest levels of this organic element. But don't let this detract you from eating fish.
For a healthy individual, mercury is not too much of a concern and the benefits of consuming fish typically outweigh the risks. |
Tuesday, September 06, 2005
What can I say?
We're going to Tucson this weekend for TJ's grandmother's 90th birthday, so I hope to recover before that. Being sick on a plane is *not* fun. I'm excited because we'll be staying at the Arizona Inn, which is supposed to be pretty nice, and is also supposed to have a lovely Sunday brunch, which we're eating with the family.
I dragged myself out of bed to go to my UW Bothell advising appointment today, which was surprisingly helpful even though I've been stalking the course listings and planning my schedule online for months now. The advisor, Dina, was great. She even suggested that I should apply for jobs when I get close to finishing the program in order to negotiate a better salary or better role. It's something I hadn't even thought about. We'll see how it goes. Maybe I'll hate programming when I'm forced to do a lot of it. Turns out that even if I only take 1 class per quarter, I can graduate by Winter 2009. That sounds like a long way off, but it's really not bad and the courseload shouldn't be too painful that way. I can also take Summer and another quarter off per year, if I need to, without any problems. She said about 50% of the students in the program are "nontraditional" like me. Woo hoo!
So I've decided to take Technical Writing this quarter, on Saturdays. I ordered my new pink messenger bag from eBags. It was much cheaper than the Timbuk2 and some of the money goes to a good cause (Susan G Komen foundation for breast cancer research). If it's a horrible bag, I'll go back and order the Timbuk2.
I have been stalking my TabletPC via FedEx, and it's now in Seattle. I think it should show up at our mailroom tomorrow, and should be in my grubby little hands on Thursday. Yay!!
I also ordered my books on Barnes and Noble online - they were cheaper there than the University Bookstore, and also less hassle since they'll just be sent to me. Class starts October 1, and runs for 10 weeks. I'm pretty excited. I love the chance to do college over again now that I'm "older and wiser". Or just older anyway! Plus, CS is just cool.
Off to watch Rock Star:INXS and consume more hot tea. Where is everyone lately? I've gotten hardly any comments on the last couple of posts. Makes me feel lonely. (sniff).
4 comments:
So...how is EBM going for you? Thanks for posting on my site. I have been on vacation, but how I would have responded had I seen your post earlier...you must keep in mind that I am a complete wimp. Don't let my whining scare you. So...do you like it? Who is your instructor?
Wel, we haven't had class yet, so it's going fine :). Last Thursday was measurements, and Tuesday was cancelled, so I guess I'll find out tomorrow. Wish me luck! The instructor is Andri, and she mentioned running outside and running up and down stairs, which gives me the willies. But it's good for me, right? |
---
author:
- Benjamin Arras
- Ehsan Azmoodeh
- Guillaume Poly
- Yvik Swan
date:
title: '[**Stein characterizations for linear combinations of gamma random variables**]{}'
---
In this paper we propose a new, simple and explicit mechanism allowing to derive Stein operators for random variables whose characteristic function satisfies a simple ODE. We apply this to study random variables which can be represented as linear combinations of (non necessarily independent) gamma distributed random variables. The connection with Malliavin calculus for random variables in the second Wiener chaos is detailed. An application to McKay Type I random variables is also outlined.
0.3cm [**Keywords**]{}: Stein’s method, Second Wiener chaos, Multivariate Gamma distribution, McKay distribution.
[**MSC 2010**]{}: 60F05, 60G50, 60G15, 60H07
Introduction and overview
=========================
On Stein’s method
-----------------
Stein’s method is a popular and versatile probabilistic toolkit for stochastic approximation. Presented originally in the context of Gaussian CLTs with dependent summands (see [@S72]) it has now been extended to cater for a wide variety of quantitative asymptotic results, see [@Chen-book] for a thorough overview in the context of Gaussian approximation or https://sites.google.com/site/steinsmethod for an up-to-date list of references on non-Gaussian and non-Poisson Stein-type results.
Given two random objects $F, F_{\infty}$, Stein’s method allows to compute fine bounds on quantities of the form $$\sup_{h\in \mathcal{H}} \left|
\E\left[ h(F) \right] - \E \left[ h(F_{\infty}) \right] \right|$$ with $\mathcal{H}$ some meaningful class of functions with respect to which both $F$ and $F_{\infty}$ are integrable (Zolotarev’s integral probability metrics [@Z83], which include e.g. the total variation distance and the Kolmogorov distance, are of the above form). The method rests on three pins:
A. a “Stein pair”, i.e. a linear operator and a class of functions $(\mathcal{A}_\infty, \mathcal{F}(\mathcal{A}_\infty))$ such that $ \E \left[ \mathcal{A}_\infty(f(F_{\infty})) \right] = 0$ for all test functions $f \in \mathcal{F}(\mathcal{A}_\infty)$;
B. a “Stein equation and its magic factors”, i.e. a contractive inverse operator $\mathcal{A}_\infty^{-1}$ acting on the centered functions $\bar{h} = h - \E h(F_{\infty})$ in $\mathcal{H}$ and tight bounds on $\mathcal{A}_\infty^{-1}(\bar{h})$ and its derivatives;
C. handles on the structure of $F$ (such as $F=F_n=T(X_1, \ldots,
X_n)$ a $U$-statistic, $F = F(X)$ a functional of an isonormal Gaussian process, $F$ a statistic on a random graph, etc.).
Given the conjunction of these three elements one can then apply some form of transfer principle: $$\label{eq:6}
\sup_{h\in \mathcal{H}} \left|
\E\left[ h(F) \right] - \E \left[ h(F_{\infty}) \right] \right|
= \sup_{h\in \mathcal{H}} \left|
\E\left[ \mathcal{A}_\infty\left( \mathcal{A}_\infty^{-1}(\bar h(F)) \right) \right]\right|;$$ remarkably the right-hand-side of the above is often much more amenable to computations than the left-hand-side, even in particularly unfavourable circumstances. This has resulted in Stein’s method delivering several striking successes (see [@B-H-J; @Chen-book; @n-pe-1]) which have led the method to becoming the recognised and acclaimed tool it is today.
Given a target $F_{\infty}$, the identification of an appropriate Stein operator $\mathcal{A}_{\infty}$ is the cornerstone of Stein’s method. While historically most practical implementations relied on adhoc arguments, several general tools exist, including Stein’s *density approach* [@S86] and Barbour’s *generator approach* [@B90]. A general theory for Stein operators is available in [@LRS]. It is easy to see that, given any sufficiently regular target $F_{\infty}$, there are infinitely many admissible choices of operator $\mathcal{A}_{\infty}$ and the difficulty is to identify those that shall lead to quantities useful for tackling . In many important cases, particularly Pearson or Ord random variables, these “useful” operators are first order differential operators (see [@dobler]) or difference operators (see [@LS]). Higher order differential operators are sometimes necessary to characterize more complex distributions, see [@g-variance-gamma; @p-r-r] for random variables with densities satisfying second order differential equations and [@g-2normal; @g-2normal2; @g-m-s] for random variables which can be written as the product of independent Pearson variables satisfying certain conditions.\
\
The purpose of this paper is to add to the literature on Stein’s method by proposing a new, simple and explicit mechanism allowing to derive Stein operators for random variables whose characteristic function satisfies a simple ODE. We apply this to study random variables which can be represented as linear combinations of (non necessarily independent) gamma distributed random variables. The connection with Malliavin calculus for random variables in the second Wiener chaos is detailed. An application to the study of McKay Type I random variables is also outlined.
The Malliavin-Stein method and its extensions {#sec:mall-based-appr}
---------------------------------------------
If $F_{\infty}$ is standard Gaussian random variable then the operator is $ \mathcal{A}_{\infty}f(x) = f'(x) - xf(x)$ with $\mathcal{F}(\mathcal{A}_{\infty})$ the class of all differentiable functions such that $\mathbb{E} \left| f'(F_{\infty})
\right|<\infty$. The simple structure of both the operator and the class, as well as the wide variety of possible choices for $F$, entail that all stars align beautifully well for a Gaussian target and that many paths are open for exploration. A particularly fruitful path was opened by Ivan Nourdin and Giovanni Peccati who, in [@n-pe-ptrf], identified the possibility of intertwining Stein’s method with Malliavin calculus. Given a sufficiently regular centered random variable $F$ with finite variance and smooth density, the first step in this direction is to define its Stein kernel $\tau_F(F)$ through the integration by parts formula $$\label{eq:9}
\E[\tau_F(F) f'(F) ] = \E \left[ F f(F)
\right] \mbox{ for all absolutely continuous } f,$$ (see Stein’s monograph [@S86] for the origins of this concept and for a detailed study when $F$ is Pearson distributed). Then, for $f_h$ a solution to $f_h'(x) - xf_h(x) = h(x) -\E[h(F_{\infty})]$ (i.e. $f_h = \mathcal{A}_{\infty}^{-1}(\bar{h})$), we can write $$\begin{aligned}
\E[h(F)] - \E[h(F_{\infty})] & = \E \left[ f_h'(F)
- F f_h(F) \right] = \E
\left[ (1-\tau_F(F)) f_h'(F)
\right]. \end{aligned}$$ By Cauchy-Schwarz inequality we have $$\begin{aligned}
\left| \E[h(F)] - \E[h(F_{\infty})] \right| \le \| f_h'\|
\sqrt{\E \left[ (1-\tau_F(F))^2 \right]}\end{aligned}$$ and at this stage two good things happen: (i) the constant $\sup_{h \in \mathcal{H}}\|f_h'\|$ (which is intrinsically Gaussian and does not depend on the law of $F$) is bounded for wide and relevant classes $\mathcal{H}$; (ii) the quantity $$\label{eq:7}
S(F \, || \, F_{\infty}) = \E \left[ (1-\tau_F(F))^2 \right]$$ (called the *Stein discrepancy*) is tractable, via Malliavin calculus, as soon as $F$ is a sufficiently regular functional of a Gaussian process because, in this case, the Stein kernel is $\tau_F(F) =\langle
DF,-DL^{-1}F\rangle_{\HH}
$, where $D$ and $L^{-1}$ stand for Malliavin derivative and pseudo-inverse Ornstein-Uhlenbeck operators. These two realizations spawned an entire new field of research known as “Malliavin-Stein method” or as “Nourdin-Peccati” method, see [@n-pe-ptrf; @n-pe-1] or the dedicated webpage https://sites.google.com/site/malliavinstein.
Extensions of the Malliavin-Stein method outside of the Gaussian framework have been studied as well. The first natural target to tackle is $F_{\infty} = 2 G - d, d>0$ where $G$ has Gamma law with parameter $d/2$ (i.e. $F_{\infty}$ is centered Gamma) with operator $$\label{eq:13}
\mathcal{A}_{\infty} f(x) = 2(x+d) f'(x) - xf(x),$$ see [@n-pe-2; @a-m-m-p]. Mimicking the Gaussian approach outlined above, one captures the difference in law between $F_{\infty}$ and some arbitrary $F$ by considering solutions to the ODE $ 2(x+d) f_h'(x) - xf_h(x) =
h(x) -\E[h(F_{\infty})]$ and $$\begin{aligned}
\left| \E[h(F)] - \E[h(F_{\infty})] \right| & = \mathbb{E} \left[
2(F+d) f_h'(F) - Ff_h(F) \right] \le \| f_h'\| \mathbb{E}\left| 2(F+d) - \tau_F(F) \right|.\end{aligned}$$ Again it is necessary, for the last bound to be of interest, that $f_h'$ be bounded and that $\tau_F(F)$ have good properties; see [@n-pe-ptrf Section 3.3] for an illustration as well as [@kusuoka; @viquez] for further explorations for targets $F_{\infty}$ belonging to the Pearson family.
Important progress in this direction is due to Robert Gaunt [@g-2normal; @g-variance-gamma]. In [@g-2normal] he shows that if $F_\infty {=} N_1 \times N_2$ where $N_1$ and $N_2$ are two independent $\mathscr{N} (0,1)$ random variables then its law is characterized by a *second order* Stein equation $$\label{eq:14}
x f''(x) + f'(x) - x f(x) = h(x) - \E [h (F_\infty)]$$ and in [@g-variance-gamma] he studies the entire family of Variance Gamma distributions (see Example \[ex:vraga\] below), obtains Stein operators $\mathcal{A}_{\infty}$ and also bounds on the solutions on the resulting Stein equations $\mathcal{A}_{\infty}f = h$ under smoothness assumptions on $h$. These results are used in [@thale], where Gaunt’s estimates are combined with higher order Stein kernels firstly introduced in [@NP10] (see below, Definition \[Def : Gamma\]) in order to extend the scope of the Nourdin-Peccati approach to targets of the form $$\label{eq:target-2wiener}
F_\infty = \sum_{i=1}^{d} \alpha_{\infty,i} (N^2_i -1)$$ where the coefficients $\{ \alpha_{\infty,i} \, : \, i=1,\cdots,d\}$ are non-zero and distinct and the $N_i$ are i.i.d. standard Gaussian (actually $d=2$ in [@thale], but we shall consider the general case from here onwards).
As we shall see (e.g. in ), random variables of the form are characterized by Stein operators $\mathcal{A}_{\infty}$ which are differential operators of order $d$. In order for Nourdin and Peccati’s approach to function for such operators one needs to introduce higher order versions of the Stein kernel , one for each degree of the operator. This is exactly the purpose of Section \[sec:stein-oper-second\].
\[Def : Gamma\] Let $F\in
\mathbb{D}^{\infty}$ the class of infinitely many times Malliavin differentiable random variables (see [@n-pe-1 Chapter 2] for a detailed discussion). The sequence of random variables $\{\Gamma_i(F)\}_{i\geq 0}\subset \mathbb{D}^\infty$ is recursively defined as follows. Set $\Gamma_0(F) = F$ and, for every $i\geq
1$, $$\Gamma_{i}(F) = \langle DF,-DL^{-1}\Gamma_{i-1}(F)\rangle_{\HH}.$$
Iterated Gammas from Definition \[Def : Gamma\] are higher order versions of the Stein kernel ; by definition we have $\Gamma_1(F) = \tau_F(F)$. Also note how $\mathbb{E} \left[ \tau_F(F) \right] = \mbox{Var}(F)$ and (see again [@n-pe-1]) the cumulants of the random element $F$ and the iterated Malliavin $\Gamma$- operators are linked by the relation $\kappa_{r+1}(F)=r! \E [\Gamma_r(F)] \mbox{ for } r=0,1,\cdots.$
Targets $F_{\infty}$ of the form admit (see below) operators $\mathcal{A}_{\infty}f = \sum_{j=0}^d a_j(x) f^{(j)}$ with $a_j$ polynomials and $d \ge 1$. Mimicking the Gaussian and Gamma cases, a direct extension of the Nourdin-Peccati approach then consists, in principle, in writing out $$\begin{aligned}
\mathbb{E}[h(F)] - \mathbb{E}[h(F_{\infty})] & = \mathbb{E} \left[
\sum_{j=0}^d a_j(F)
f_h^{(j)}(F) \right]
= \mathbb{E} \left[ \sum_{j=0}^d (\tilde{a}_j(F) - \Gamma_j(F)) f_h^{(j)}(F)
\right].\end{aligned}$$ for $f_h$ a solutions to the ODE $\mathcal{A}_{\infty}f(x) = h(x) - \mathbb{E}[h(F_{\infty})]$. In order for this approach to be useful it is necessary that both $\Gamma_j(F)$ and $f_h^{(j)}$ be tractable. So far the question of finding tight bounds on solutions to such higher order Stein equations is open; this seems to be a difficult problem to tackle in all generality.
Estimates on the derivatives of solutions to Stein equations are, however, not crucial for a version of Stein’s method to apply to variables of the form , see paragraph after Proposition \[p:static\], and in more details [@aaps17].
Stein-type characterization and main results
============================================
Stein operators for the second Wiener chaos {#sec:stein-oper-second}
-------------------------------------------
The aim of this section is to use the recent findings in [@a-p-p] to derive “appropriate” stein equation, i.e. differential operators of finite order with polynomial coefficients, for random elements in the second Wiener chaos. Indeed, following [@n-po-1; @a-p-p], first we define two crucial polynomials $P$ and $Q$ as follows: $$\label{polynomialP}
Q(x)=\big( P(x)\big)^{2}=\Big(x \prod_{i=1}^{d}(x - \alpha_{\infty, i} ) \Big)^{2}.$$ Next, for random element $F$ living in a finite sum of Wiener chaoses, we consider the following quantity (whose first occurrence is in [@a-p-p]) $$\label{eq:Delta}
\Delta(F, F_{\infty}):= \sum_{r=2}^{\text{deg}(Q)} \frac{Q^{(r)}(0)}{r!} \frac{\kappa_{r}(F)}{2^{r-1}(r-1)!}.$$ Then the following result holds:
[@a-p-p Proposition 3.2]\[p:static\] Let $F$ be a centered random variable living in a finite sum of Wiener chaoses. Moreover, assume that
- $\kappa_r (F) = \kappa_r (F_\infty)$, for all $2 \le r \le d+1=\text{deg}(P)$, and
- $$\E \Bigg[ \sum_{r=1}^{d+1} \frac{P^{(r)}(0)}{r! \
2^{r-1}} \Big( \Gamma_{r-1}(F) - \E[\Gamma_{r-1}(F)]
\Big) \Bigg]^2 = 0.$$
Then, $F \stackrel{{\rm law}}{=} F_\infty,$ and $F$ belongs to the second Wiener chaos.
As we shall see in Section \[sec:stein-oper-second\], Proposition \[p:static\] leads to Stein operators for random variables belonging to the Second Wiener chaos. By analogy with the case of a Gaussian target, it appears that the quantity $\Delta(F, F_{\infty})$ is the second-chaos equivalent of the (first-Wiener chaos) Stein discrepancy $S(F || F_{\infty})$ . Moreover we have shown, in a separate publication [@aaps17], that estimating this quantity directly (without requiring any bounds on solutions to Stein equations) leads to bounds on the 2-Wasserstein distance between the law of $F$ and the law of $F_{\infty}$.
We now show how item [**(ii)**]{} of Proposition \[p:static\] can be used to derive a Stein operator for $F_\infty$. To this end, set $$\begin{aligned}
& a_l= \frac{P^{(l)}(0)}{l! 2^{l-1}}, \quad 1 \le l \le d+1,\\
& b_l= \sum_{r=l}^{d+1} a_r \E[\Gamma_{r-l+1}(F_\infty)] =
\sum_{r=l}^{d+1} \frac{a_r}{(r-l+1)!} \kappa_{r-l+2}(F_\infty),
\quad 2 \le l \le d+1. \end{aligned}$$ Now, we introduce the following differential operator of order $d$ (acting on functions $f \in C^d(\R)$) : $$\label{eq:SME}
\mathcal{A}_\infty f (x):= \sum_{l=2}^{d+1} (b_l - a_{l-1} x )
f^{(d+2-l)}(x) - a_{d+1} x f(x).$$ Then, we have the following result (see Section \[sec:steins-method-second\] for a proof).
\[thm:SMC\] Assume that $F$ is a general centered random variable living in a finite sum of Wiener chaoses (and hence smooth in the sense of Malliavin calculus). Then $F {=} F_\infty$ (equality in distribution) if and only if $\E \left[ \mathcal{A}_\infty f (F) \right] =0$ for all polynomials $f:\R \to \R$.
[ Consider the special case of only two non-zero distinct eigenvalues $\lambda_1$ and $\lambda_2$, i.e. $$\label{eq:target}
F_\infty=\lambda_1(N^2_1 -1) + \lambda_2 (N^2_2 -1)$$ where $N_1, N_2 \sim \mathscr N (0,1)$ are independent. In this case, the polynomial $P$ takes the form $P(x)=x (x - \lambda_1)(x - \lambda_2)$. Simple calculations reveal that $P'(0)=\lambda_1 \lambda_2, P''(0)= -2 (\lambda_1 + \lambda_2)$, and $P^{(3)}(0)=3!$. Also, $\kappa_2(F_\infty)=\E [\Gamma_{1}(F_\infty)]=2(\lambda_1^2 + \lambda_2^2)$, and $\kappa_3(F_\infty)= 2 \E [\Gamma_{2}(F_\infty)]= 4 (\lambda_1^3 + \lambda_2^3)$. Then, the Stein equation $(\ref{eq:SME})$ reduces to $$\label{eq:stein-equation-2}
\mathcal{A}_\infty f (x) = -4 (\lambda_1 \lambda_2 x + (\lambda_1 + \lambda_2) \lambda_1 \lambda_2) f''(x) + 2 \left(\lambda_1^2 + \lambda_2^2+ (\lambda_1 + \lambda_2) x \right) f'(x) - x f(x)$$ We also remark that when $\lambda_1=-\lambda_2=\frac12$, and hence $F_\infty \stackrel{\text{law}}{=} N_1 \times N_2$, the Stein’s equation $(\ref{eq:stein-equation-2})$ coincides with that in [@g-2normal equation (1.9)]. One has to note that for general $\lambda_1$ and $\lambda_2$, the random variables of the form $(\ref{eq:target})$ lie outside the [*Variance-Gamma*]{} class, see also Example \[ex:vraga\]. ]{}
A Fourier approach to Stein characterizations {#sec:four-appr-stein}
---------------------------------------------
The characteristic functions $\phi_F(\xi) = \mathbb{E}[e^{{{i\mkern1mu}}\xi F}]$ (we drop the indexation in ${\infty}$ and write $F$ instead of $F_{\infty}$, $\alpha_i$ instead of $\alpha_{\infty, i}$ etc. from now on) of random variables of the form satisfy a simple ODE with polynomial coefficients, namely $$\label{eq:12}
{\prod_{j=1}^d (1-2{{i\mkern1mu}}\xi\alpha_j)} \phi_F'(\xi) = {-2\xi \sum_{j=1}^d
\alpha_j^2 \prod_{k\neq j}(1-2{{i\mkern1mu}}\xi \alpha_k)} \phi_F(\xi).$$ Such are but particular cases of a wide family of variables to which the following simple lemma applies (see Section \[sec:steins-method-second\] for a proof).
\[sec:four-appr-stein-1\] Let $(a_k)_{0\le k \le d}$ and $(b_k)_{0 \le k \le d'}$ be real numbers and consider the polynomials $A_d(\xi) = \sum_{k=0}^d a_k \xi^k$ and $B_{d'}(\xi) = \sum_{k=0}^{d'} b_k \xi^k$ with $d, d'\in \N$. Suppose that the random variable $F$ has differentiable characteristic function $\phi_F$ such that $$\label{eq:1}
A_d({{i\mkern1mu}}\xi) \phi_F'(\xi) = {{i\mkern1mu}}B_{d'}({{i\mkern1mu}}\xi) \phi_F(\xi)$$ for all $\xi\in \R$. Let $Y$ be a real valued random variable such that $\E[|Y|]<+\infty$. Then $Y \stackrel{\mathrm{law}}{=} F$ if and only if $$\label{eq:4}
\mathbb{E} \left[ F \mathcal{A}_df(F) -
\mathcal{B}_{d'}f(F) \right] = 0$$ for all test functions $f \in \mathcal{S}(\R)$ the Schwartz space of smooth functions with rapid decrease, where $$\begin{aligned}
\label{eq:8}
\mathcal{A}_d = \sum_{k=0}^d a_k \frac{d^k}{dx^k} \mbox{ and }
\mathcal{B}_{d'} = \sum_{k=0}^{d'} b_{k} \frac{d^k}{dx^k}. \end{aligned}$$ The differential operator $f \mapsto \mathcal{A}_{\infty}f(x) = x \mathcal{A}_df(x) -
\mathcal{B}_{d'}f(x)$ is a Stein operator for $F$ with Stein class $\mathcal{S}(\R)$.
From here onwards all test functions $f$ are supposed to belong to $\mathcal{S}(\R)$.
\[ex:simpleexamples\][ If $F$ is a normal random variable with mean $\mu$ and variance $\sigma^2$ then $\phi_F(\xi) = e^{{{i\mkern1mu}}\mu \xi -\sigma^2\xi^2/2}$ so that $\phi_F'(\xi) = {{i\mkern1mu}}(\mu+\sigma^2({{i\mkern1mu}}\xi)) \phi_F(\xi)$ and, in the notations of Lemma \[sec:four-appr-stein-1\]: $d=0$, $a_0 = 1$, $d'=1$, $b_0 = \mu$, and $b_1 = \sigma^2$ so that $$\mathbb{E} \left[ F f(F) - \left( \mu f(F) + \sigma^2 f'(F) \right) \right]=0$$ as expected (see [@Chen-book]). ]{}
\[ex:vraga\] [If $F$ is Variance-Gamma distributed, then its cumulant generating function is, in the classical parameterization, $$\log \phi_F(\xi) = \mu {{i\mkern1mu}}\xi +2 \lambda \log \gamma - \lambda \log
\left( \alpha^2 -(\beta+{{i\mkern1mu}}\xi)^2 \right)$$ so that Lemma \[sec:four-appr-stein-1\] applies with $d=2$, $a_0 =
\alpha^2-\beta^2$, $a_1 = -2 \beta$, and $a_2 = -1$, $d'=2$, $b_0 =
\mu (\alpha^2 - \beta^2)+ 2\lambda \beta$, $b_1 = 2(\lambda-\mu \beta)$, and $b_2
= -\mu$ so that $$\begin{aligned}
& \mathbb{E} \left[ F\left((\alpha^2-\beta^2) f(F) -2\beta f'(F) -
f''(F)\right)\right. \\
&\qquad \left. - \left((\mu (\alpha^2 -\beta^2)+ 2\lambda \beta) f(F)
+2(\lambda-\mu \beta)f'(F) - \mu f''(F) \right)\right]=0\end{aligned}$$ or, after simplifications, $$\mathbb{E} \left[(F-\mu) f''(F) + \left( 2\beta(F-\mu) + 2\lambda
\right) f'(F) + \left( (\alpha^2-\beta^2)(F-\mu) + 2\lambda \beta \right) f(F)\right]
=0.$$ This is the result obtained by [@g-variance-gamma Lemma 3.1]. ]{}
\[ex:four-appr-stein-2\][ Take $\alpha_i = 1$ for all $i\ge1$ in , i.e. $F= \sum_{i=1}^{d} (N^2_i -1) \sim \chi^2_{(d)}$ is a centered chi-squared random variable with $d$ degree of freedom. The CF of a chi-squared distributed random variable is $\phi(\xi)= (1-2 {{i\mkern1mu}}\xi)^{-d/2}$, and so $$(1-2 {{i\mkern1mu}}\xi) \phi_F'(\xi) = - 2 d \xi \phi_F(\xi).$$ Hence, in the notations of Lemma \[sec:four-appr-stein-1\]: $d=1$, $a_0 = 1, a_1 = -2$, $d'=1$, $b_0 = 0$, and $b_1=2d$ so that $$\mathbb{E} \left[ F f(F)\right]=2\mathbb{E}\left[ (F+d)f'(F) \right].$$ This is the same as . ]{}
\[ex:maccay\][ Random variable $F$ follows the type I McKay distribution with parameters $a>-(1/2), b>0$ and $c>1$ when its PDF is proportional to the function $$\label{eq:22}
\forall x \in \R_+, f_I(x) = x^ae^{-xc/b} I_{a}(x/b)$$ where $I_a(\cdot)$ denotes the modified Bessel function of the first kind and of order $a$, see [@hoal04] for context and further references. Direct computations lead to $$\label{eq:25}
(\log \phi_F)'(\xi) = -{{i\mkern1mu}}\frac{(1+2a)bc -(1+2a)b^2 ({{i\mkern1mu}}\xi)}{1-c^2+2 cb ({{i\mkern1mu}}\xi) - b^2({{i\mkern1mu}}\xi)^2}.$$ Lemma \[sec:four-appr-stein-1\] applies and we deduce that if $F$ is type I McKay then $$\label{eq:26}
\mathbb{E} \left[ \left( (1-c^2)F +(1+2a)bc \right) f(F) +
\left(2cb F-(1+2a)b^2 \right) f'(F) - b^2F f''(F) \right] = 0$$ for all $f \in \mathcal{S}(\R)$. ]{}
Stein operators for sums of independent gamma {#sec:stein-operators-sums}
---------------------------------------------
Before stating the next theorem, we need to introduce some notations. For any $d$-tuple $(\lambda_1,...,\lambda_d)$ of real numbers, we define the symmetric elementary polynomial of order $k\in\{1,...,d\}$ evaluated at $(\lambda_1,...,\lambda_d)$ by: $$\begin{aligned}
e_{k}(\lambda_1,...,\lambda_d)=\sum_{1\leq i_1<i_2<...<i_k\leq d}\lambda_{i_1}...\lambda_{i_k}.\end{aligned}$$ We set, by convention, $e_{0}(\lambda_1,...,\lambda_d)=1$. Moreover, for any $(c_1,...,c_d)\in\mathbb{R}^*$ and any $k\in\{1,...,d\}$, we denote by $(\lambda c)$ the $d$ tuple $(\lambda_1c_1, \ldots, \lambda_dc_d)$ and by $(\lambda c)_k$ the $d-1$ tuple $(\lambda_1c_1, \ldots, \lambda_{k-1}c_{k-1},\lambda_{k+1}c_{k+1}, \ldots,
\lambda_dc_d)$
The object of interest in this section are the following generalizations of : for $d \ge 1$, $(m_1, \ldots, m_d) \in \mathbb{N}^d$ $(\lambda_1, \ldots, \lambda_d) \in \R^{\star}$ all distinct we consider $$\label{eq:23}
F = \sum_{i=1}^d\lambda_i (
\gamma_i(m_i\alpha_i, c_i) - m_i\alpha_i c_i)$$ where, for any $(\alpha,c)\in\mathbb{R}_+^*$, we denote by $\gamma(\alpha,c)$ a gamma random variable with parameters $(\alpha,c)$ with density $$\begin{aligned}
\forall x\in\mathbb{R}_+^*,\
\gamma_{\alpha,c}(x)=\dfrac{1}{c
\Gamma(\alpha)}\left(\frac{x}{c}\right)^{\alpha-1}e^{-\frac{x}{c}}\end{aligned}$$ and CF $$\phi_{\gamma(\alpha, c)}(\xi) = \left( 1-{{i\mkern1mu}}c \xi \right)^{-\alpha}.$$ The family $\{\gamma_i(m_i\alpha_i, c_i) ,\ i=1,...d\}$ is a collection of independent random variables. Applying Lemma \[sec:four-appr-stein-1\] we obtain the following (proof in Section \[sec:steins-method-second\]).
\[benjarras\] Let $F$ be as in and let $Y$ be a real valued random variable such that $\E[|Y|]<+\infty$. Then $Y \stackrel{\mathrm{law}}{=} F$ if and only if $$\begin{aligned}
&\E \bigg[
\big(Y+\sum_{i=1}^d\lambda_i{m_i\alpha_i}{c_i}\big)(-1)^d\bigg(\prod_{j=1}^d{\lambda_j}{c_j}\bigg)f^{(d)}(Y)+\sum_{l=1}^{d-1}(-1)^l\bigg(Ye_{l}((\lambda
c))\nonumber\\
&\quad \quad +\sum_{k=1}^d\lambda_km_k\alpha_kc_k\left(e_{l}((\lambda
c))-e_{l}((\lambda c)_k)\right)\bigg)f^{(l)}(Y)+Yf(Y)
\bigg]=0\label{eq:2} \end{aligned}$$ for all $f \in \mathcal{S}(\R)$.
Taking $\alpha_k=1/2$ and $c_k=2$ in the previous theorem implies the following straightforward corollary:
\[benjarras2\] Let $d \ge 1$, $q\geq 1$ and $(m_1, \ldots, m_d) \in \mathbb{N}^d$ such that $m_1+...+m_d=q$. Let $(\lambda_1, \ldots, \lambda_d) \in
\R^{\star}$ pairwise distincts and consider: $$F = \sum_{i=1}^{m_1}\lambda_1(N_i^2-1)+\sum_{i=m_1+1}^{m_1+m_2}\lambda_2(N_i^2-1)+...+\sum_{i=m_1+\ldots+m_{d-1}+1}^q\lambda_d(N_i^2-1),$$ Let $Y$ be a real valued random variable such that $\E[|Y|]<+\infty$. Then $Y \stackrel{\text{law}}{=} F$ if and only if $$\begin{aligned}
&\E \bigg[ \big(Y+\sum_{i=1}^d\lambda_im_i\big)(-1)^d2^d\bigg(\prod_{j=1}^d\lambda_j\bigg)f^{(d)}(Y)+\sum_{l=1}^{d-1}2^l(-1)^l\bigg(Ye_{l}(\lambda_1,...,\lambda_d)\nonumber\\ &+\sum_{k=1}^d\lambda_km_k\left(e_{l}(\lambda_1,...,\lambda_d)-e_{l}((\underline{\lambda}_k)\right)\bigg)f^{(l)}(Y)+Yf(Y) \bigg]=0,\label{eq:3}\end{aligned}$$ for all $f\in S(\mathbb{R})$.
\[ex:eicheltha\][ Let $d=1$, $m_1=q\geq 1$ and $\lambda_1=\lambda>0$. The differential operator reduces to (on smooth test function $f$): $$\begin{aligned}
-2\lambda(x+q\lambda)f'(x)+xf(x).\end{aligned}$$ This differential operator is similar to the one characterizing the gamma distribution of parameters $(q/2,1/(2\lambda))$. Indeed, we have, for $F\stackrel{\text{law}}{=}\gamma\big(q/2,1/(2\lambda)\big)$, on smooth test function, $f$: $$\begin{aligned}
\E\bigg[Ff'\big(F\big)+\big(\frac{q}{2}-\frac{F}{2\lambda}\big)f\big(F\big)\bigg]=0\end{aligned}$$ We can move from the first differential operator to the second one by performing a scaling of parameter $-1/(2\lambda)$ and the change of variable $x=y-q\lambda$. ]{}
[ Let $d=2,\ q=2$, $\lambda_1=-\lambda_2=1/2$ and $m_1=m_2=1$. The differential operator reduces to (on smooth test function $f$): $$\begin{aligned}
\mathcal{A}(f)(x)&=4(x+\left\langle m,\lambda \right\rangle)\lambda_1\lambda_2f''(x)-2\big[xe_1(\lambda_1,\lambda_2)+\lambda_1m_1(e_1(\lambda_1,\lambda_2)-e_1(\lambda_2))\\
&+\lambda_2m_2(e_1(\lambda_1,\lambda_2)-e_1(\lambda_1))\big]f'(x)+xf(x),\\
&=-xf''(x)-f'(x)+xf(x),\end{aligned}$$ where we have used the fact that $e_1(\lambda_1,\lambda_2)=\lambda_1+\lambda_2=0,\ e_1(\lambda_2)=\lambda_2=-1/2,\ e_1(\lambda_1)=\lambda_1=1/2$. Therefore, up to a minus sign factor, we retrieve the differential operator associated with the random variable $F=N_1\times N_2.$ ]{}
We conclude this section by comparing the Stein-type operators defined by the Fourier approach with those obtained by the Malliavin calculus tools in (see Section \[sec:steins-method-second\] for a proof).
\[same\] The Stein-type operators defined in Corollary \[benjarras2\] and in (\[eq:SME\]) coincide, up to some normalizing constant.
Stein operators for projections of multivariate gamma
------------------------------------------------------
Independence of the contributions, as required in , is not crucial. Indeed, consider all random variables of the form $$\label{eq:15}
F = \left\langle \Gamma - K, \lambda
\right\rangle = \sum_{i=1}^d \lambda_i (\Gamma_i -k_i)$$ with $K = (k_1, \ldots, k_d)\in \R^d$ and $\Gamma = (\Gamma_1, \ldots, \Gamma_d)$ a $d$-variate gamma distributed random variable defined as follows.
\[def:multgamma\] A random vector $\Gamma = (\Gamma_1, \ldots, \Gamma_d)$ has a $d$-variate gamma distribution in the sense of Krishnamoorthy and Parthasarathy [@KP51] with degree of freedom $\nu = 2\alpha$ and covariance matrix $C$ if its characteristic function is $$\label{eq:16}
\phi_{\Gamma}(t_1, \ldots, t_d) = \left| I_d - {{i\mkern1mu}}C T \right|^{-\alpha}$$ with $t_j \ge 0$ for all $j$, $\left| \cdot \right|$ the determinant operator, $I_d$ the $(d \times d)$-identity, $\alpha>0$, $T = \mathrm{diag}(t_1, \ldots, t_d)$, and $C$ a symmetric positive definite $d \times d$ matrix.
Conditions on $C$ and $\alpha$ under which is a bona fide characteristic function have been thoroughly adressed in the literature, see [@DVJ97; @EK09; @royen16] and references therein. In the sequel we suppose that these conditions are satisfied.
\[lem:sums-dependent-gamma\]Let $\Lambda= \mathrm{diag}(\lambda_{1}, \ldots,
\lambda_d)$ and $C = \left( c_{ij} \right)_{1\le i, j \le
d}$ a symmetric positive definite matrix. For all $\xi \in \R$ we have $$\label{eq:20}
\left| I_d - {{i\mkern1mu}}\xi C \Lambda \right| = \sum_{j=0}^d (-1)^j r_j ({{i\mkern1mu}}\xi)^j$$ with $r_0=1$ and $$\label{eq:21}
r_j =\sum_{\substack{S \subset [d] \\ \#(S) = j}} \left| C
\right|_S \prod_{j \in S} \lambda_j,$$ (the summation in is over all collections $S$ of indices in $[d] = \left\{
1, \ldots, d \right\}$ with cardinality $\#(S)=j$, and $\left|
C \right|_S$ is the determinant of the matrix $\left(
C_{ij}\right)_{i,j\in S}$).
\[ex:stein-oper-d3\] If $d=3$ and $C = \left( c_{i, j} \right)_{1\le i, j \le 3} $ then $$\begin{aligned}
r_0 & = 1 \\
r_1 & = c_{1} \lambda_1 + c_{2} \lambda_2 + c_{3} \lambda_3 \\
r_2 & = (c_{1}c_{2} - c_{12}^2)\lambda_1\lambda_2 + (c_{1} c_{3}
-c_{13}^2)\lambda_1 \lambda_3 + (c_{2}
c_{3}- c_{23}^2)\lambda_2 \lambda_3 \\
r_3 & = |C| \lambda_1 \lambda_2 \lambda_3\end{aligned}$$ (we also write $c_j$ instead of $c_{jj}$ for $j=1, 2, 3$).
From Lemma \[lem:sums-dependent-gamma\] we deduce the CF of linear combinations of marginals of multivariate gamma random vectors: if $\Gamma$ has marginals $\Gamma_j \sim \gamma(\alpha, c_j)$ and $F$ is as in then, letting $\kappa = \sum_{j=1}^d \lambda_j
k_j$: $$\begin{aligned}
\phi_F(\xi) & = \mathbb{E} \left[ e^{{{i\mkern1mu}}\xi F} \right] = e^{-{{i\mkern1mu}}\alpha \xi \sum_{j=1}^d \lambda_j k_j} \mathbb{E} \left[
e^{{{i\mkern1mu}}\sum_{j=1}^d (\xi \lambda_j) \Gamma_j} \right] \\
& = e^{-{{i\mkern1mu}}\alpha \kappa \xi } \phi_{\Gamma}(\xi
\lambda_1, \ldots, \xi \lambda_d) \\
& = e^{-{{i\mkern1mu}}\alpha \kappa \xi} \left( \sum_{j=0}^d (-1)^j r_j ({{i\mkern1mu}}\xi)^j \right)^{-\alpha}\end{aligned}$$ with $(r_j)_{0\le j \le d}$ given in Lemma \[lem:sums-dependent-gamma\]. Taking derivatives we obtain $$\begin{aligned}
\left( \sum_{j=0}^d (-1)^j r_j ({{i\mkern1mu}}\xi)^j\right) \phi_F'(\xi) =
- {{i\mkern1mu}}\alpha
\left( \kappa
\sum_{j=0}^d (-1)^j r_j ({{i\mkern1mu}}\xi)^j +
\sum_{j=1}^{d} (-1)^{j} j r_{j} ({{i\mkern1mu}}\xi)^{j-1}\right) \phi_F(\xi). \end{aligned}$$ Applying Lemma \[sec:four-appr-stein-1\] we deduce, after straightforward simplifications:
\[theo:stein-oper-ga\] Let $F$ be defined in and $(r_j)_{j=1, \ldots, d}$ as in . Set $r_{d+1} = 0$. Let $Y$ be a real valued random variable such that $\E[|Y|]<+\infty$. Then $Y \stackrel{\text{law}}{=} F$ if and only if $$\begin{aligned}
& \mathbb{E} \left[ (F+\alpha(\kappa-r_1)) f(F) + \sum_{j=1}^{d} (-1)^j \left(
r_j(F +\alpha \kappa) - \alpha(j+1)r_{j+1}) \right)f^{(j)}(F)
\right] =0 \label{eq:18}\end{aligned}$$ for all test functions $f \in \mathcal{S}(\R)$.
If $F$ is of the form with all shape coefficients identical then $ F = \sum_{i=1}^d \lambda_i\sum_{j=1}^{m_i}(\gamma_j(\alpha, c_i)-
\alpha c_i)$. Letting $m= \sum_{j=1}^dm_i$, then $F$ is of the form for $\Gamma$ a $m$-variate gamma random variable with $m\times m$ diagonal correlation matrix $C = \mathrm{diag}(((c_1)_{m_1}, \ldots, (c_d)_{m_d}))$ (we write $(x)_q = (x, \ldots, x)$ a vector of length $q$). Applying Theorem \[theo:stein-oper-ga\] will lead, via , to an operator of order $m>d$ which coincides with (and thus ) only when $m_i=1$ for all $i$.
\[ex:dis2\] If $d=2$ then $F = \left\langle \Gamma - K ,
\lambda\right\rangle$ has second-order differential Stein operator $$\begin{aligned}
\nonumber
\mathcal{A}f(x) & = (x+\alpha (\kappa-r_1))f(x) - \left\{ r_1x + \alpha
\left( r_1 \kappa -2
(c_1c_2-c_{12}^2)\lambda_1\lambda_2 \right)\right\} f'(x) \\
\label{eq:24}
& \quad + \lambda_1 \lambda_2\big(c_1c_2-c_{12}^2\big)\bigg(x
+ \alpha \kappa \bigg)f''(x).\end{aligned}$$ (recall that $\kappa = \sum_{j=1}^d \lambda_j k_j$ and $r_1 =
\sum_{j=1}^d \lambda_jc_j$).
Application: McKay Type I and combinations of two gamma variates {#sec:applications}
-----------------------------------------------------------------
We conclude the paper with applications of the identities in the case $d=2$. There is interest, even in this simple situation, in obtaining handles on law of sums and differences of correlated gamma variates as these have applications in performance analysis, see e.g.[@hoal04]. Recall example \[ex:maccay\] and the corresponding operator $$\begin{aligned}
\label{eq:29}
\mathcal{A}_{\mathrm{McKay}}f(x) = \left(x + \frac{(1+2a)bc}{ 1- c^2} \right) f(x) +
\frac{2cb x-(1+2a)b^2}{1-c^2} f'(x) -\frac{b^2}{1-c^2} x f''(x) \end{aligned}$$ for type I McKay random variables with parameters $a, b, c$ (see its pdf defined in ). From (applied to functions of the form $f(x) = x^n$, along with a continuity argument for extending the identity to functions not in $\mathcal{S}(\R)$) we immediately deduce $$\begin{aligned}
& \mathbb{E} \left[ F \right] = \frac{(1+2a)bc}{c^2-1} \\
& \mathbb{E} [F^2] = \frac{(2a+1)b^2(2(a+1)c^2+1)}{(c^2-1)^2}\end{aligned}$$ (see [@hoal04 Equation (6)]), as well as the formula $$\label{eq:27}
(1-c^2) \mathbb{E}[F^{n+1}] + bc(1+2(a+n)) \mathbb{E}[F^n] -
nb^2(1+2a+n-1) \mathbb{E} [F^{n-1}] = 0$$ for all $n\ge 2$.
\[cor:appl-mckay-type\] McKay Type I random variables can be represented as projections of bivariate Gamma random variables with degree of freedom $2\alpha$ and covariance matrix $C =
\begin{pmatrix}
c_1 & c_{12} \\
c_{12}& c_2
\end{pmatrix}$ whenever $$\begin{aligned}
&a = \alpha-1/2 \\
&b = 2\frac{c_1c_2- c_{12}^2}{\sqrt{(c_1+c_2)^2 - 4(c_1c_2- c_{12}^2)}}\\
& c = \frac{c_1+c_2}{\sqrt{(c_1+c_2)^2 - 4(c_1c_2- c_{12}^2)}}.
\end{aligned}$$
Corollary \[cor:appl-mckay-type\] contains Theorems 3, 4 and 5 from [@hoal04]. In that paper they consider also the so-called McKay Type II distribution for which our method also applies; we do not perform the computations here.
Taking $K=0$ and $\lambda_1 = \lambda_2 = 1$ in Example \[ex:dis2\] we obtain that combinations of dependent Gamma random variables $G_1 \sim \mathrm{Gamma}(\alpha, c_1)$ and $G_2 \sim \mathrm{Gamma}(\alpha, c_2)$ with identical shape parameter and covariance $C$ have operator $$\begin{aligned}
\mathcal{A}_{G_1+G_2}f(x) & = (x-\alpha(c_1+c_2))f(x) - \left(
(c_1+c_2)x -2\alpha(c_1c_2 - c_{12}^2)
\right)f'(x)\nonumber \\& \qquad + (c_1c_2 - c_{12}^2)xf''(x). \label{eq:28}\end{aligned}$$ We identify the coefficients in and to get the system of 4 equations: $$\begin{aligned}
& \frac{bc}{1-c^2}(1+2a) = -\alpha(c_1+c_2), \quad 2\frac{bc}{1-c^2} = -(c_1+c_2) \\
& \frac{b^2}{1-c^2}(1+2a) = - 2 \alpha(c_1c_2-c_{12}^2),
\quad
\frac{b^2}{1-c^2} = - (c_1c_2-c_{12}^2).
\end{aligned}$$ Solving for $a, b, c$ in terms of $\alpha, c_1, c_2$ and $c_{12}$ we immediately deduce that $a = \alpha - 1/2$ is necessary, so that the system reduces to $$\begin{aligned}
& b^2 = (c_1c_2-c_{12}^2) (c^2-1), \quad 2 bc = (c_1+c_2)(c^2-1)\end{aligned}$$ and the result follows.
We end this subsection by discussing infinite divisibility of the law of projections of multivariate gamma distribution. Infinite divisibility of multivariate gamma distribution has been addressed thoroughly in the literature (see [@Gr84; @Ba89; @EK06; @EK09]). Thanks to the previous corollary, we are able to explicit the Lévy measure of the sum of two dependent gamma random variables using the parametrization $(a,b,c)$ with $a>-(1/2)$, $b>0$ and $c>1$. We have the following straightforward corollary.
\[ID2\] Let $(G_1,G_2)$ be a 2-dimensional gamma random vector of parameters $2\alpha>0$ and covariance matrix $C$ such that $c_1c_2>c_{12}^2$ and $c_1+c_2>1$. Then, the law of $G_1+G_2$ is infinitely divisible and its Lévy-Khintchine formula is given by: $$\begin{aligned}
\label{eq:ID2}
\forall t\in\mathbb{R},\ \phi_{G_1+G_2}(t)=\exp\bigg(\int_0^{+\infty}\big(e^{itx}-1\big)(\frac{1}{2}+a)\big(e^{-\frac{c-1}{b}x}+e^{-\frac{c+1}{b}x}\big)\frac{dx}{x}\bigg),\end{aligned}$$ with $$\begin{aligned}
&a=\alpha-\frac{1}{2},\\
&b=2\frac{c_1c_2- c_{12}^2}{\sqrt{(c_1+c_2)^2 - 4(c_1c_2- c_{12}^2)}},\\
&c=\frac{c_1+c_2}{\sqrt{(c_1+c_2)^2 - 4(c_1c_2- c_{12}^2)}}.\\\end{aligned}$$ Moreover, we have the following identity in law: $$\begin{aligned}
\label{eq:IL}
G_1+G_2=\gamma_1+\gamma_2\end{aligned}$$ where $\gamma_1$ and $\gamma_2$ are independent gamma random variables with parameters $(a+1/2,(c-1)/b)$ and $(a+1/2,(c+1)/b)$ respectively.
Let $a,b$ and $c$ be as in the statement of the corollary. By Corollary \[cor:appl-mckay-type\], we know that $G_1+G_2$ has the same law as a McKay type I random variable with parameters $(a,b,c)$. Then, by (\[eq:25\]), we have: $$\begin{aligned}
(\log \phi_{G_1+G_2})'(\xi) = -i \frac{(1+2a)bc -(1+2a)b^2 (i
\xi)}{1-c^2+2 cb (i\xi) - b^2(i \xi)^2}. \end{aligned}$$ Performing a partial fraction decomposition, we obtain straightforwardly: $$\begin{aligned}
(\log \phi_{G_1+G_2})'(\xi)=ib(\frac{1}{2}+a)\bigg(\dfrac{1}{c-1-ib\xi}+\dfrac{1}{c+1-ib\xi}\bigg).\end{aligned}$$ Now, we note that: $$\begin{aligned}
\dfrac{1}{c-1-ib\xi}=\int_0^{+\infty}\exp(-(c-1-ib\xi)x)dx\end{aligned}$$ and similarly for the other term. By standard computations, we obtain formula (\[eq:ID2\]). The identity (\[eq:IL\]) follows trivially.
Proofs {#sec:steins-method-second}
======
Repeatedly using the Malliavin integration by parts formulae [@n-pe-1 Theorem 2.9.1], we obtain for any $2 \le l \le d+2$ that $$\begin{aligned}
\E\left[F f^{(d-l+2)}(F) \right]
= \E\left[ f^{(d)}(F)
\Gamma_{l-2}(F) \right] + \sum_{r=d-l+3}^{d-1} \E\left[
f^{(r)}(F) \right] \E\left[ \Gamma_{r+l-d-2}(F) \right].\label{eq:com1}\end{aligned}$$ For indices $l=2,3$, the second term in the right hand side of $(\ref{eq:com1})$ is understood to be $0$. Summing from $l=2$ up to $l=d+2$, we obtain that
$$\label{com2}
\begin{split}
\sum_{l=2}^{d+2} a_{l-1} \, \E\left[F f^{(d-l+2)}(F) \right] & = \sum_{l=2}^{d+2} a_{l-1} \, \E\left[ f^{(d)}(F) \Gamma_{l-2}(F) \right] \\
& \hskip1cm + \sum_{l=4}^{d+2} a_{l-1} \, \sum_{r=d-l+3}^{d-1} \E\left[ f^{(r)}(F) \right] \E\left[ \Gamma_{r+l-d-2}(F) \right]\\
& = \sum_{l=1}^{d+1} a_{l} \, \E\left[ f^{(d)}(F) \Gamma_{l-1}(F) \right] \\
& \hskip1cm + \sum_{l=3}^{d+1} a_{l} \, \sum_{r=d-l+2}^{q-2} \E\left[ f^{(r)}(F) \right] \E\left[ \Gamma_{r+l-d-1}(F) \right]\\
& = \sum_{l=1}^{d+1} a_{l} \, \E\left[ f^{(d)}(F) \Gamma_{l-1}(F) \right] \\
& \hskip1cm + \sum_{l=2}^{d+1} a_{l} \, \sum_{r=1}^{l-2} \E \left[ f^{(d-r)}(F) \right] \E \left[ \Gamma_{l-r-1}(F) \right].
\end{split}$$
On the other hand, $$\label{eq:com4}
\begin{split}
\sum_{l=2}^{d+1} b_l \, \E \left[ f^{(d+2-l)}(F) \right] &=
\sum_{l=0}^{d-1} b_{l+2} \E \left[ f^{(d-l)} (F) \right]\\
&= \sum_{l=0}^{d-1} \left[ \sum_{r=l+2}^{d+1} a_r \E (
\Gamma_{r-l-1}(F_\infty) ) \right] \E \left[ f^{(d-l)}(F) \right]\\
&= \sum_{r=2}^{d+1} a_r \sum_{l=0}^{r-2} \E \left[
\Gamma_{r-l-1}(F_\infty) \right] \times \E \left[ f^{(d-l)}(F)
\right].
\end{split}$$ Wrapping up, we finally arrive at $$\label{eq:com5}
\begin{split}
\E \left[ \mathcal{A}_\infty f (F) \right] & = - \E \Bigg[ f^{(d)}(F) \times \Big( \sum_{r=1}^{d+1} a_r \left[ \Gamma_{r-1}(F) - \E[\Gamma_{r-1}(F)] \right] \Big) \Bigg] \\
& \hskip 1cm + \sum_{r=2}^{d+1} a_r \sum_{l=0}^{r-2} \left\{ \E [
f^{(d-l)}(F) ] \times \Big( \E \left[ \Gamma_{r-l-1}(F_\infty)
\right] - \E \left[ \Gamma_{r-l-1}(F) \right] \Big) \right\}\\
& = - \E \Bigg[ f^{(d)}(F) \times \Big( \sum_{r=1}^{d+1} a_r \left[
\Gamma_{r-1}(F) - \E[\Gamma_{r-1}(F)] \right] \Big) \Bigg] \\
&\hskip 1cm + \sum_{r=2}^{d+1} a_r \sum_{l=0}^{r-2} \frac{ \E [ f^{(d-l)}(F) ]}{(r-l-1)!} \times \Big( \kappa_{r-l}(F_\infty) - \kappa_{r-l}(F) \Big).
\end{split}$$ We are now in a position to prove the claim. First we assume that $F \stackrel{\text{law}}{=} F_\infty$. Then obviously $\kappa_{r}(F)=\kappa_{r}(F_\infty)$ for $r=2,\cdots,2d+2$, and moreover, random variable $F$ belongs to the second Wiener chaos. Hence, according to [@a-p-p Lemma 3], the Cauchy–Schwarz inequality, and the hypercontractivity property of the Wiener chaoses [@n-pe-1 Theorem 2.7.2], we obtain that $$\begin{split}
\Big \vert \E \left[ \mathcal{A}_\infty f (F) \right] \Big \vert & \le \sqrt{\E \left[f^{(d)}(F) \right]^2} \times
\sqrt{ \E \Big[ \sum_{r=1}^{d+1} a_r \left( \Gamma_{r-1}(F) -
\E[\Gamma_{r-1}(F)] \right) \Big]^2} \\
& = \sqrt{\E \left[f^{(d)}(F) \right]^2} \times \sqrt{\Delta(F,F_\infty)}\\
&= \sqrt{\E \left[f^{(d)}(F) \right]^2} \times \sqrt{\Delta(F_\infty,F_\infty)}= 0.
\end{split}$$ Conversely, assume that $\E \left[ \mathcal{A}_\infty f (F) \right] =0$ for all polynomial functions $f$. Then relation $(\ref{eq:com5})$ implies that, by choosing appropriate polynomials $f$, we have $\kappa_r(F)=\kappa_r(F_\infty)$ for $r=2,\cdots,d+1$. Now, combining this observation together with relation $(\ref{eq:com5})$, we infer that $$\E \left[ F^n \sum_{r=1}^{d+1} a_r \Big( \Gamma_{r-1}(F) - \E[\Gamma_{r-1}(F)] \Big) \right]=0, \quad n \ge 2.$$ Using e.g. the Malliavin integrations by parts, and similar argument as in the proof of [@a-p-p Proposition 5], the latter equation can be turned into a linear recurrent relation between the cumulants of $F$ of order up to $d+1$. Combining this with the knowledge of the $d+1$ first cumulants characterise all the cumulants of $F$ and hence the distribution $F$. Indeed, all the distributions in the second Wiener chaos are determined by their moments/cumulants [@n-pe-1 Proposition 2.7.13, item 3].
$(\Rightarrow)$. Let us introduce two differential operators characterized by their symbols in Fourier domain. For smooth enough test functions, $f$, we define: $$\begin{aligned}
&\mathcal{A}_{d}(f)(x)=\frac{1}{2\pi}\int_{\mathbb{R}}\mathcal{F}(f)(\xi)\bigg(
A_d({{i\mkern1mu}}\xi) \bigg)\exp(ix\xi)d\xi,\\
&\mathcal{B}_{d'}(f)(x)=\frac{1}{2\pi}\int_{\mathbb{R}}\mathcal{F}(f)(\xi)\bigg(B_{d'}({{i\mkern1mu}}\xi)\bigg)\exp(ix\xi)d\xi,\end{aligned}$$ with $\mathcal{F}(f)(\xi)=\int_{\mathbb{R}}f(x)\exp(-ix\xi)dx$. Integrating against smooth test functions the differential equation satistifed by the characteristic function $\phi_F$, we have, for the left hand side: $$\begin{aligned}
\int_{\mathbb{R}}\mathcal{F}(\phi)(\xi)A_d({{i\mkern1mu}}\xi)\dfrac{d}{d\xi}\bigg(\phi_F(\xi)\bigg)d\xi&=\int_{\mathbb{R}}\mathcal{F}\big(\mathcal{A}_{d}(f)\big)(\xi)\dfrac{d}{d\xi}\bigg(\phi_F(\xi)\bigg)d\xi,\\
&=-\int_{\mathbb{R}}\dfrac{d}{d\xi}\bigg(\mathcal{F}\big(\mathcal{A}_{d}(f)\big)(\xi)\bigg)\phi_F(\xi)d\xi,\\
&=i\int_{\mathbb{R}}\mathcal{F}\big(x\mathcal{A}_{d}(f)\big)(\xi)\phi_F(\xi)d\xi,\end{aligned}$$ where we have used the standard fact $d/d\xi(\mathcal{F}(f)(\xi))=-i\mathcal{F}(xf)(\xi)$. Similarly, for the right hand side, we obtain: $$\begin{aligned}
\operatorname{RHS}&=\int_{\mathbb{R}}\mathcal{F}(f)(\xi)\bigg(B_{d'}({{i\mkern1mu}}\xi) \bigg)\phi_F(\xi)d\xi
=i\int_{\mathbb{R}}\mathcal{F}\big(\mathcal{B}_{d'}(f)\big)(\xi)\phi_F(\xi)d\xi.\end{aligned}$$ Thus, $$\begin{aligned}
\int_{\mathbb{R}}\mathcal{F}\big(x\mathcal{A}_{d}(f)-\mathcal{B}_{d'}(f)\big)(\xi)\phi_F(\xi)d\xi=0\end{aligned}$$ for all $f \in \mathcal{S}(\R)$. Going back in the space domain, we obtain the claim.
$(\Leftarrow)$. We denote $S'(\mathbb{R})$ the space of tempered distributions. Let $Y$ be a real valued random variable such that $\E[|Y|]<+\infty$ and $$\label{eq:17}
\forall f\in S(\mathbb{R}),\ \E \bigg[ F\mathcal{A}_{d}f(F)-\mathcal{B}_{d'}f(F) \bigg]=0.$$ Since $\E[|Y|]<+\infty$, the characteristic function of $Y$ is differentiable on the whole real line. Working similarly as in the first part of the proof (from space domain to Fourier domain), identity leads to $$\begin{aligned}
A_d({{i\mkern1mu}}\cdot) \frac{d}{d \xi}\left( \phi_Y \right)(\cdot) = {{i\mkern1mu}}B_{d'}({{i\mkern1mu}}\cdot) \phi_F(\cdot)\end{aligned}$$ in $S'(\mathbb{R})$. We also have $\phi_Y(0)=1$ thus, by Cauchy-Lipschitz theorem, we have: $$\begin{aligned}
\forall\xi\in\mathbb{R},\ \phi_Y(\xi)=\phi_F(\xi).\end{aligned}$$ This concludes the proof of the Lemma.
Let $r_1 = \sum_{k=1}^d\lambda_k{m_k\alpha_k}{c_k}$. The CF of random variables as in is $$\phi_F(\xi) = e^{-i \xi r_1}
\prod_{j=1}^d \bigg(1-{{i\mkern1mu}}\xi \lambda_j
c_j\bigg)^{-m_j\alpha_j}.$$ Taking derivatives with respect to $\xi$ one sees that $$\phi_F'(\xi) = - {{i\mkern1mu}}\left(r_1 + \sum_{j=1}^d
\frac{\lambda_km_k\alpha_kc_k}{1- {{i\mkern1mu}}\xi \lambda_kc_k}\right) \phi_F(\xi)$$ which, after straightforward simplifications, becomes (we denote $\nu_j=1/(c_j\lambda_j)$ and $m\alpha = (m_1\alpha_1, \ldots, m_d \alpha_d)$) $$\begin{aligned}
\prod_{k=1}^d(\nu_k-i\xi)\phi_F'(\xi)=-{{i\mkern1mu}}\bigg\{r_1\prod_{k=1}^d(\nu_k-i\xi)-\sum_{k=1}^dm_k\alpha_k\prod_{l=1,l\ne k}^d(\nu_l-i\xi)\bigg\}\phi_F(\xi).\end{aligned}$$ All that remains is to compute explicitely the coefficients of the polynomials on either side of the above, i.e. in Lemma \[sec:four-appr-stein-1\]’s $\mathcal{A}_d$ and $\mathcal{B}_{d}$. First of all, let us consider the following polynomial in $\mathbb{R}[X]$: $$\begin{aligned}
P(x)=\prod_{j=1}^d(\nu_j-x)=(-1)^d\prod_{j=1}^d(x-\nu_j).\end{aligned}$$ We denote by $p_0,...,p_d$ the coefficients of $\prod_{j=1}^d(X-\nu_j)$ in the basis $\{1,X,...,X^d\}$. Vieta formula readily give: $$\begin{aligned}
\forall k\in\{0,...,d\},\ p_k=(-1)^{d+k}e_{d-k}(\nu_1,...,\nu_d),\end{aligned}$$ It follows that the Fourier symbol of $\mathcal{A}_{d}$ is given by: $$\begin{aligned}
\prod_{k=1}^d(\nu_k-i\xi)=P(i\xi)=\sum_{k=0}^d(-1)^ke_{d-k}(\nu_1,...\nu_d)(i\xi)^k.\end{aligned}$$ Thus, we have, for $f$ smooth enough: $$\begin{aligned}
\mathcal{A}_{d}(f)(x)=\sum_{k=0}^d(-1)^{k}e_{d-k}(\nu_1,...,\nu_d)f^{(k)}(x).\end{aligned}$$ Let us proceed similarly for the operator $B_{d,m,\nu}$. We denote by $P_k$ the following polynomial in $\mathbb{R}[X]$ (for any $k\in\{1,...,d\}$): $$\begin{aligned}
P_k(x)=(-1)^{d-1}\prod_{l=1,l\ne k}^d(x-\nu_l).\end{aligned}$$ A similar argument provides the following expression: $$\begin{aligned}
P_k(x)=\sum_{l=0}^{d-1}(-1)^le_{d-1-l}(\underline{\nu}_k)x^l,\end{aligned}$$ where $\underline{\nu}_k=(\nu_1,...,\nu_{k-1},\nu_{k+1},...,\nu_d)$. Thus, the symbol of the differential operator $B_{d}$ is given by: $$\begin{aligned}
\sum_{k=1}^dm_k\alpha_k\prod_{l=1,l\ne k}^d(\nu_l-i\xi)=\sum_{l=0}^{d-1}(-1)^l\bigg(\sum_{k=1}^dm_k\alpha_ke_{d-1-l}(\underline{\nu}_k)\bigg)(i\xi)^l.\end{aligned}$$ Thus, we have: $$\begin{aligned}
B_{d}(f)(x)=\sum_{l=0}^{d-1}(-1)^l\bigg(\sum_{k=1}^dm_k\alpha_ke_{d-1-l}(\underline{\nu}_k)\bigg)f^{(k)}(x).\end{aligned}$$ Consequently, we obtain: $$\begin{aligned}
&\E\bigg[(F+r_1)\sum_{k=0}^d(-1)^{k}e_{d-k}(\nu_1,...,\nu_d)f^{(k)}(F)-\sum_{l=0}^{d-1}(-1)^l\bigg(\sum_{k=1}^dm_k\alpha_ke_{d-1-l}(\underline{\nu}_k)\bigg)f^{(k)}(F)\bigg]=0.\end{aligned}$$ Finally, it is easy to see that $$\begin{aligned}
\forall k\in\{0,...,d\},\
\bigg(\prod_{j=1}^dc_j\lambda_j \bigg)e_{k}(\nu_1,...,\nu_d)=e_{d-k}({\lambda_1}{c_1},...,{\lambda_d}{c_d})\end{aligned}$$ and the conclusion follows.
In order to lighten the notations, we consider the target law represented by $F=\sum_{i=1}^{d}\lambda_i (N_i^2-1),$ with $\lambda_j\ne \lambda_i$ if $i\ne j$ and $\{N_1,...,N_d\}$ is a collection of i.i.d. standard normal random variables. By (\[eq:SME\]), we have, for any smooth functions: $$\begin{aligned}
\mathcal{A}_\infty f (x):= \sum_{l=2}^{d+1} (b_l - a_{l-1} x ) f^{(d+2-l)}(x) - a_{d+1} x f(x).\end{aligned}$$ By a re-indexing argument, we have: $$\begin{aligned}
\mathcal{A}_\infty f (x):= \sum_{k=1}^{d} (b_{d+2-k} - a_{d-k+1} x ) f^{(k)}(x) - a_{d+1} x f(x).\end{aligned}$$ As a warm up, we start by computing $a_{d+1}$ and $a_{d-k+1}$. We have, by definition: $$\begin{aligned}
a_{d+1}&=\dfrac{P^{(d+1)}(0)}{(d+1)! 2^d}=\frac{1}{2^d},\end{aligned}$$ where we have used the definition of the polynomial $P(X)$. Moreover, we have: $$\begin{aligned}
a_{d-k+1}&=\dfrac{P^{(d+1-k)}(0)}{(d+1-k)! 2^{d-k}}=\dfrac{(-1)^k}{2^{d-k}}e_k(\lambda_1,...,\lambda_d),\end{aligned}$$ where we have used the fact that $P^{(d+1-k)}(0)$ is equal to $(d+1-k)!$ times the $(d-k)$-th coefficient of the polynomial $\prod (X-\lambda_j)$. Now, let us compute $b_{d+2-k}$. We have, for $k\in \{1,...,d\}$: $$\begin{aligned}
b_{d+2-k}&=\sum_{r=d+2-k}^{d+1}\dfrac{a_r}{(r+k-d-1)!}\kappa_{r+k-d}(F_\infty)\\
&=2^{k-d}\sum_{r=d+2-k}^{d+1} \frac{P^{(r)}(0)}{r!}\sum_{j=1}^d \lambda_j^{r+k-d}\\
&=2^{k-d}\sum_{r=d+2-k}^{d+1} (-1)^{d+r-1}e_{d-r+1}\big(\lambda_1,...,\lambda_d\big)\sum_{j=1}^d\lambda_j^{r+k-d}\\
&=(-1)^{k+1}e_{k-1}\big(\lambda_1,...,\lambda_d\big)\sum_{j=1}^d\lambda_j^{2}+...+(-1)e_{1}\big(\lambda_1,...,\lambda_d\big)\sum_{j=1}^d\lambda_j^{k}\\
&\qquad +e_{0}\big(\lambda_1,...,\lambda_d\big)\sum_{j=1}^d\lambda_j^{k+1}.\end{aligned}$$ Now the trick is to note that $\lambda_j e_{l-1}\big((\underline{\lambda}_j)\big)=e_{l}\big(\lambda_1,...,\lambda_d\big)-e_{l}\big((\underline{\lambda}_j)\big)$. Thus, we have: $$\begin{aligned}
(-1)e_{1}\big(\lambda_1,...,\lambda_d\big)\sum_{j=1}^d\lambda_j^{k}+e_{0}\big(\lambda_1,...,\lambda_d\big)\sum_{j=1}^d\lambda_j^{k+1}=-\sum_{j=1}^d\lambda_j^{k}e_{1}\big((\underline{\lambda}_j)\big).\end{aligned}$$ Using the previous equality recursively, we obtain: $$\begin{aligned}
b_{d+2-k}&=2^{k-d}\bigg[(-1)^{k+1}e_{k-1}\big(\lambda_1,...,\lambda_d\big)\sum_{j=1}^d\lambda_j^{2}+(-1)^k\sum_{j=1}^d\lambda_j^3 e_{k-2}\big((\underline{\lambda}_j)\big)\bigg],\\
&=2^{k-d}(-1)^{k}\bigg[\sum_{j=1}^d\lambda_j^2\bigg(-e_{k-1}\big(\lambda_1,...,\lambda_d\big)+e_{k-1}\big(\lambda_1,...,\lambda_d\big)-e_{k-1}\big((\underline{\lambda}_j)\big)\bigg)\bigg],\\
&=2^{k-d}(-1)^{k+1}\sum_{j=1}^d\lambda_j^2e_{k-1}\big((\underline{\lambda}_j)\big),\\
&=2^{k-d}(-1)^{k+1}\sum_{j=1}^d\lambda_j\bigg(e_{k}\big(\lambda_1,...,\lambda_d\big)-e_{k}\big((\underline{\lambda}_j)\big)\bigg).\end{aligned}$$ Wrapping everything up together, this ends the proof of the proposition.
Acknowledgments {#acknowledgments .unnumbered}
===============
YS gratefully acknowledges support from FNRS under Grant MIS F.4539.16. We thank Céline Esser and Michel Rigo for fruitful discussions. Also, EA would like to thank the members of the Institute for Mathematical Stochastics at Otto-von-Guericke-Universitat Magdeburg, and in particular, Claudia Kirch for their warm hospitality where most of this research was carried out, and to Finnish Cultural Foundation for financial support.
[99]{}
<span style="font-variant:small-caps;">Arras, B., Azmoodeh, E., Poly, G. and Swan, Y.</span> (2017). A bound on the 2-Wasserstein distance between linear combinations of independent random variables. *arXiv preprint arXiv:1704.01376.*
<span style="font-variant:small-caps;">Azmoodeh, E., Malicet, D., Mijoule, G., Poly, G.</span> (2015) Generalization of the Nualart-Peccati criterion. *The Annals of Probability*, 44(2), 924-954.
<span style="font-variant:small-caps;">Azmoodeh, E., Peccati, G., and Poly, G.</span> (2014) Convergence towards linear combinations of chi-squared random variables: a Malliavin-based approach. *Séminaire de Probabilités* XLVII (Special volume in memory of Marc Yor), 339-367.
<span style="font-variant:small-caps;">R. B. Bapat</span>(1989) Infinite divisibility of multivariate Gamma distributions and M-matrices *Sankhya A* 51(1): 73–78.
<span style="font-variant:small-caps;">Barbour, A.D.</span> (1990) Stein’s method for diffusion approximations. *Probab. Theory Related Fields* 84, 297-322.
<span style="font-variant:small-caps;">Barbour, A.D., Holst, L., and Janson, S.</span> (1992) *Poisson approximation*. Oxford: Clarendon Press.
<span style="font-variant:small-caps;">Chen, L.H.Y, Goldstein, L. and Shao, Q.M.</span> (2010) *Normal approximation by Stein’s method.* Springer Science Business Media.
<span style="font-variant:small-caps;">Döbler, C.</span> (2015) Stein’s method of exchangeable pairs for the Beta distribution and generalizations. *Electron. J. Probab.* 20, No. 109, 1-34.
<span style="font-variant:small-caps;">Eden, R., Viquez, J.</span> (2015) Nourdin-Peccati analysis on Wiener and Wiener-Poisson space for general distributions. *Stoch. Proc. Appl.* 125, No. 1, 182-216.
<span style="font-variant:small-caps;">Eichelsbacher, P., Thäle, C.</span> (2014) Malliavin-Stein method for Variance-Gamma approximation on Wiener space. *Electronic Journal of Probability*, 20(123), 1–28.
<span style="font-variant:small-caps;">Eisenbaum, N. and Kaspi, H.</span> (2006) A characterization of the infinitely divisible squared Gaussian processes. *Ann. Probab.* 34(2):728–742.
<span style="font-variant:small-caps;">Eisenbaum, N. and Kaspi, H.</span> (2009) On permanental processes. *Stoch. Proc. Appl.* 119:1401–1415.
<span style="font-variant:small-caps;">Gaunt, R.E.</span> (2017) Products of normal, beta and gamma random variables: Stein characterisations and distributional theory. To appear in *Brazilian Journal of Probability and Statistics*
<span style="font-variant:small-caps;">Gaunt, R.E.</span> (2017) On Stein’s method for products of normal random variables and zero bias couplings. *Bernoulli*, 23(4B), 3311-3345.
<span style="font-variant:small-caps;">Gaunt, R.E.</span> (2014) Variance-Gamma approximation via Stein’s method. *Electron. J. Probab.* 19(38), 1-33.
<span style="font-variant:small-caps;">Gaunt, R.E., Mijoule, G., and Swan, Y.</span> (2016) Stein operators for product distributions, with applications. Preprint *arXiv:1604.06819*.
<span style="font-variant:small-caps;">R. C. Griffiths</span>(1984) Characterization of Infinitely divisible multivariate gamma distributions *J. Multivariate Anal.* 15:13–20.
<span style="font-variant:small-caps;">Holm, H., and Alouini, M.S.</span> (2004). Sum and difference of two squared correlated Nakagami variates in connection with the McKay distribution. *IEEE Transactions on Communications*, 52(8), 1367-1376.
<span style="font-variant:small-caps;">Krishnamoorthy, A.S., and Parthasarathy, M.</span> (1951). A multivariate gamma-type distribution. *The Annals of Mathematical Statistics*, 22(4), 549-557.
<span style="font-variant:small-caps;">Kusuoka, S., Tudor, C. A.</span> (2012) Stein’s method for invariant measures of diffusions via Malliavin calculus. *Stoch. Proc. Appl.* 122, No. 4, 1627-1651.
<span style="font-variant:small-caps;">Ley, C., Reinert, G., and Swan, Y.</span> (2017) Stein’s method for comparison of univariate distributions. *Probability Surveys*, 14, 1-52.
<span style="font-variant:small-caps;">Ley, C., Swan, Y.</span> (2013) Local Pinsker inequalities via Stein’s discrete density approach. *IEEE Trans. Inf. Theory* 59, No. 9, 5584-5591.
<span style="font-variant:small-caps;">Nourdin, I., Peccati, G.</span> (2012) *Normal Approximations Using Malliavin Calculus: from Stein’s Method to Universality*. Cambridge Tracts in Mathematics. Cambridge University.
<span style="font-variant:small-caps;">Nourdin, I., Peccati, G.</span> (2009) Noncentral convergence of multiple integrals. *Ann. Probab.* 37, No. 4, 1412-1426.
<span style="font-variant:small-caps;">Nourdin, I., Peccati, G.</span> (2009) Stein’s method on Wiener chaos. *Probab. Theory Related Fields*. 145, No. 1-2, 75-118.
<span style="font-variant:small-caps;">Nourdin I., Peccati G,.</span> (2010) Cumulants on the Wiener space. , 258(11): 3775–3791.
<span style="font-variant:small-caps;">Nourdin, I., Poly, G.</span> (2012) Convergence in law in the second Wiener/Wigner chaos. *Electron. Commun. Probab.* 17, No. 36, 1-12.
<span style="font-variant:small-caps;">Peköz, E., Röllin, A. and Ross, N.</span> (2013) Degree asymptotics with rates for preferential attachment random graphs. *Ann. Appl. Prob.* 23, 1188-1218.
<span style="font-variant:small-caps;">Royen, T.</span> (2016) A Note on the Existence of the Multivariate Gamma Distribution. *arXiv preprint arXiv:1606.04747.*
<span style="font-variant:small-caps;">Stein, C.</span> (1972) A bound for the error in the normal approximation to the distribution of a sum of dependent random variables Proceedings of the [S]{}ixth [B]{}erkeley [S]{}ymposium on [M]{}athematical [S]{}tatistics and [P]{}robability, [II]{}, [583–602]{}.
<span style="font-variant:small-caps;">Stein, C.</span> (1986) *Approximate computation of expectations.* IMS, Lecture Notes-Monograph Series 7.
<span style="font-variant:small-caps;">Vere-Jones D.</span> (1997) Alpha-permanents and their applications to multivariate gamma, negative binomial and ordinary binomial distributions. *New Zealand journal of mathematics* 26, 125-149.
<span style="font-variant:small-caps;">Zolotarev, V.M.</span> (1983) Probability metrics. *Teoriya Veroyatnostei i ee Primeneniya* 28(2), 264–287.
*E-mail address*, B. Arras [arrasbenjamin@gmail.com ]{}
*E-mail address*, E. Azmoodeh [ehsan.azmoodeh@rub.de]{}
*E-mail address*, G. Poly [guillaume.poly@univ-rennes1.fr ]{}
*E-mail address*, Y. Swan [yswan@ulg.ac.be ]{}
|
Q:
Rails nested form error, child must exist
I'm following the tutorial: http://www.amooma.de/screencasts/2015-01-22-nested_forms-rails-4.2/
I'm usign Rails 5.0.0.1
But when I register a hotel, it appears that the hotel category must exist.
1 error prohibited this hotel from being saved: Categories hotel must
exist
My Hotel model:
class Hotel < ApplicationRecord
has_many :categories, dependent: :destroy
validates :name, presence: true
accepts_nested_attributes_for :categories, reject_if: proc { |attributes| attributes['name'].blank? }, allow_destroy: true
end
My Category model:
class Category < ApplicationRecord
belongs_to :hotel
validates :name, presence: true
end
My hotel controller:
def new
@hotel = Hotel.new
@hotel.categories.build
end
def hotel_params
params.require(:hotel).permit(:name, categories_attributes: [ :id,:name])
end
End my _form.html.erb
<%= f.fields_for :categories do |category| %>
<div class="room_category_fields">
<div class="field">
<%= category.label :name %><br>
<%= category.text_field :name %>
</div>
</div>
<% end %>
A:
belongs_to behavior has changed in rails >= 5.x. Essentially it is now expected that the belongs_to record exists before assigning it to the other side of the association. You need to pass required :false while declaring belongs_to in your Category model as follows:
class Category < ApplicationRecord
belongs_to :hotel, required: false
validates :name, presence: true
end
|
Careful selection of sample dilution and factor-V-deficient plasma makes the modified activated protein C resistance test highly specific for the factor V Leiden mutation.
The aim of this study was to evaluate critically the recently modified activated-partial-thromboplastin-time (APTT)-based activated protein C (APC)-resistance tests, which are more specific for the factor V Leiden mutation than the first generation APC-resistance tests. The only modification to these tests is the predilution of the plasma sample in factor-V-deficient plasma. The intended effect of this predilution is to bring the concentrations of all clotting factors, except factor V, to the same normal levels. This, in principle, makes the tests also suitable for assaying the plasma of patients treated with oral anticoagulants and heparin, or of patients with a lupus anticoagulant. However, not every factor-V-deficient plasma is suitable for this application. Because the factor V:factor VIII ratio is important in establishing the APC ratio, the factor-V-deficient plasma should contain a sufficiently high factor VIII concentration. We also found that the optimal dilution to obtain the same APC ratios for patients, whether or not treated with coumarins or heparin, is not the same for each test or factor-V-deficient plasma. We compared two modified APTT-based APC-resistance tests (one developed in our laboratory and one commercial) with respect to their ability to discriminate between carriers and non-carriers of the factor V Leiden mutation. Both modified tests gave complete separation of carriers and non-carriers of the factor V Leiden mutation whether or not they are treated with anticoagulants. This makes these tests very suitable for routine screening. |
The present invention relates to a method and apparatus for measuring temperature. The invention is particularly useful for measuring the temperature of a silicon or other semi-conductor materials during the processing thereof, and is therefore described below with respect to this application, although it will be appreciated that the invention could advantageously be used in other applications as well.
Rapid Temperature Processing (RTP) of silicon or other semi-conductor materials requires accurate measurement and control of temperature. In a typical RTP cycle, heating of the wafer to 1,200.degree. C. takes place in seconds, making accurate control of the wafer temperature very crucial. The needed repeatability of temperature control from wafer to wafer is of the order of 1.degree. C. Present temperature measurement techniques use a pyrometric based technology which has many drawbacks, including the following:
1. The roughness of the wafer surface affects its emissivity; therefore a remote pyrometric measurement depends on the accuracy with which this emissivity is known. Cumbersome calibrations with embedded thermocouples in test wafers are needed to know the wafer emissivity with sufficient accuracy.
2. Deposited, uncontrolled layers of oxides, nitrides, polycrystalline, silicon, etc. affect the emissivity of the wafer surface. Because of interference effects which depend strongly on the thickness of these layers, again cumbersome thermocouple calibrations are needed for each single wafer or for a wafer in a batch, to ensure temperature measurement accuracy.
A so-called "Ripple Technique" has been recently described, Schietinger et al., Mat.Res.Soc. Symp.Proc., Spring 1991, which takes advantage, (while using the pyrometric method), of the AC ripple of heating lamps as the signature of the reflected component of the radiation from the wafer surface to monitor the wafer emissivity. The disadvantage of this method is that its accuracy is a function of temperature: it is more accurate for high temperatures than for low temperatures. |
Q:
Use exchange server for sharepoint
We have Exchange Server in our organization for email. Now that I have SharePoint, I want to create a domain user e.g: sharepoint and then create a mailbox in Exchange Server say: sharepoint@mydomain.com. And then use this email for my SharePoint messaging and notifications, etc.
How is this possible and what are the steps? I have tried to set the email settings from Central Administration > System Settings but to no avail, it does not even ask me to enter the credentials to verify the domain account.
A:
If you have exchange server in place then it is very much easy to configure the SharePoint outgoing's email. You dont need to enter the credential to configure the outgoing email.
For sharepoint 2013:
Go to central admin > system settings > outgoing email settings
On the Outgoing E-Mail Settings page, in the Mail Settings section, type the SMTP server name for outgoing email (for example, mail.example.com) in the Outbound SMTP server box.
In the From address box, type the email address as you want it to be
displayed to email recipients.
In the Reply-to address box, type the email address to which you want
email recipients to reply.
In the Character set list, select the character set that is
appropriate for your language.
Click OK
Now, on the exchange side add your servers into exchange relay.https://technet.microsoft.com/en-us/library/cc263462(v=office.15).aspx
For SharePoint 2016, check this article. https://social.technet.microsoft.com/wiki/contents/articles/34167.sharepoint-2016-outgoing-email-configuration-settings.aspx
|
The White Barn Inn Kennebunk, Maine
Imagine a town straight out of a beach romance novel. Make it a tableau of coastal Maine—shingled cottages and cheery shops; placid boats; friendly restaurants; the handsome weathered look of things. Now stop imagining and pack a bag. The storybook town of Kennebunkport, Maine, is perfectly real—and really perfect.
New Englanders who savor regional riches have loved this place forever. Those in-the-know types also know this: when at leisure in Kennebunkport, have the real experience—stay in nearby Kennebunk. It’s got comfort, elegance, and privacy.
More undiscovered than its neighbor—and only four scenic miles away— the little town of Kennebunk is off the beaten path just enough to contain a rare gem like The White Barn Inn. One of three historic hotels in New England belonging to the Grace Hotels portfolio, White Barn Inn is also a member of the Relais & Châteaux hotel alliance, whose standards are the highest in the world. Add in their Forbes Stars and AAA Diamonds, and The White Barn Inn has earned a reputation for excellence.
Guestrooms and Property
Not surprisingly, everything is perfect as you take the country drive past Rachel Carlson National Wildlife Refuge and pull into White Barn Inn’s tempting space. It’s rustic chic at its best, which owes a great deal to innkeeper Daniel Braun.
The White Barn Inn takes guest experience seriously. As you enter the lobby, live piano gives it a magical lilt. You’d never know it here, but that “magic” doesn’t just happen; it takes a lot of committed professionals who believe in what they do. The White Barn Inn has a long-standing reputation for consummate service.
Lobby life is important. Common areas should reflect local culture and be welcoming. The cozy Living Room salon at White Barn Inn has a fireplace at the heart—which never, ever fails—and comfy colonial decor.
The Junior Suite with down king bed has tasteful walls in floral motifs in a room centered around a fireplace and two cozy chairs. The bathroom is immaculate; a heated granite and marble relaxation chamber with a deep Jacuzzi tub and dual-headed glass shower enclosure. The Main House across the way—over 100 years old and lovingly restored—also has elegant rooms. There are two types of cottages available, overlooking either the woods or the river. They are in constant demand.
The Spa is a modest space with a stellar status, and a cute boutique selling superior products like Airelle skincare and the Moroccan Oil line. The pool area is flawless. A fieldstone patio in a forested setting dotted with cabanas is a clever New England take on poolside indulgence that Miami Beach fans will understand.
The White Barn Inn also has a marina, so if you decide to cruise up the Kennebunk River and set off from there, the staff will happily oblige.
Dining
Say the name Derek Bissonnette and whole dinner parties light up. He’s one of the finest young culinary talents in the region, with an assured style that respects tradition. His dining room—two restored barns—is a rustic fantasy. Having recreated the hayloft above and filled it with objet d’farm, guests dine underneath. This cleverness could have been too much, but it’s just right. The tastefully fun décor, astute service, and Bissonnette’s creations combine into virtuosity.
On a recent evening, Bissonnette, and terrific Sous Chef Gabrielle Cote, began a three-course meal with a signature Lobster Spring Roll with Daikon Radish and Snow Pea in a Thai sauce. That was paired with a very nice Wehlener Sonnenuhr Riesling. Next came his transcendent Kennebunk Lobster and Fettucine with Cognac Butter Sauce. With the first taste, I literally forgot my own name for a few seconds. Then I sipped the Mont Redon Chateauneuf-du-Pape paired with the dish, and decided names are overrated. Dessert was a delicate mixed berries soufflé with a refreshing Mareuil-sur-Ay champagne. This was a meal to remember.
Lighter fare is served at the The Bistro, which is clubby and fun. The lobster bisque is frothy and rich. The lobster Mac & Cheese topped with absurdly delicious breadcrumbs is a wonderful crunchy fusion. Ideal before a country walk in Maine.
You Can’t Fake Authenticity
Visually, Kennebunk has much in common with seaside towns like Newport, Mystic, and even Nantucket. There’s pretty much everything you want in a coastal New England Village: architectural charm, funky shops, world-class dining, great antiquing—all without too much of a “scene” to ruin the authenticity.
Maine’s rugged shores are a bit wilder then the rest of the region. Surfers here take on the prodigious waves at Gooch’s Beach right in Kennebunk. This whole section of costal Maine, especially nearby towns like Ogunquit, are a holiday maker’s paradise where leisure is the local industry. But you’re more likely to find an Aroma Joe’s coffee shack then a Starbucks. It’s individualistic. All New Englanders have a piece of that DNA (does “Live Free or Die” ring a bell?). In this corner of coastal Maine, you mostly get the “live free” part. The White Barn Inn has taken that idea, and made art. |
Decreased degradation of collagen and fibronectin following exposure of proximal cells to glucose.
Thickening and reduplication of the tubular basement membrane has been reported as an early event in diabetic nephropathy. The aim of the work outlined here was to examine the effects and mechanisms involved in the modulation of renal proximal tubular type-IV collagen and fibronectin turnover by glucose. The effect of glucose on type-IV collagen and fibronectin generation was studied by exposure of primary cultures of human renal proximal tubular cells (HPTC) to elevated D-glucose concentrations. Subsequently the mechanism of modulation of fibronectin generation was examined in a polarised system utilising the porcine proximal tubular cell line LLC-PK1 grown on porous tissue culture inserts. Incubation of confluent growth-arrested HPTC with 25 mM D-glucose led to the accumulation of both type-IV collagen and fibronectin. This increase was not dependent on new gene transcription for either protein. Exposure of HPTC to 25 mM D-glucose also led to the induction of tissue inhibitor of metalloproteinases (TIMP-1 and TIMP-2) and also gelatinase A. There was, however, a net decrease in overall gelatinolytic activity. Incubation of confluent monolayers of LLC-PK1 cells grown on tissue culture inserts with 25 mM D-glucose on either their apical or basolateral aspect led to fibronectin accumulation seen only in the basolateral compartment. Under these experimental conditions, we can demonstrate polyol pathway activation, and furthermore the increase in fibronectin concentration in response to glucose was inhibited by the aldose reductase inhibitor sorbinil. Fibronectin accumulation was also demonstrated following both apical and basolateral addition of 1 mM sorbitol, but not following the addition of 25 mM galactose to either aspect of the cells. These data demonstrate that the glucose-induced accumulation of type-IV collagen and fibronectin was associated with alterations in the degradative pathway of these matrix components. In addition fibronectin generation in response to glucose was non-polar in terms of application of glucose, but polar in terms of fibronectin accumulation. The mechanisms of glucose-induced modulation of fibronectin were mediated by polyol pathway activation, and more specifically related to the metabolism of sorbitol to fructose. |
Embattled Greece tops the global table of the most risky sovereign credits in the world, as it has been for much of the past year, while Norway continues to head the least risky sovereign issuers, according to a report on liquidity metrics from CMA Datavision Bonds, which provides independent, intraday pricing on some 1,400 single name CDS and CDS indices.
By the end of 2011, Egypt had entered the ‘most risky’ league in eighth position, as spreads widened from 457bp to 621bp after the deposing of President Hosni Mubarak. Pakistan moved into third place as Argentina and Venezuela both improved in Q4, but liquidity remained thin with CDS Bid/Ask spreads around 100bp, and bonds not much better at 3pts for the 2016 and 5pts for 2036 bonds.All spreads referred to are five year mid par spreads.
As the Eurozone debt crisis unfolded in Q4, European spreads widened 9% overall. A bail out of Dexia at the beginning of the last quarter was followed by concerns about Italy’s debt in November, and S&P threatening to downgrade the entire Eurozone in December.
Nearly all global CDS prices widened during November, indicating the significance of Western Europe to the global economy and the importance of finding a permanent resolution to the debt crisis.
In Italy spreads peaked at 595bp on November 15 following the end of the Berlusconi era, but settled back to 486bp, 33bp wider than in Q3. With $2trn of debt and 120% debt-to-GDP ratio, implied FX devaluation from a default in Italy is around 17% according to CMA DatavisionQuantos. Spain and Belgium’s charts were a mirror image of Italy’s, the report said.
Behind Norway at the top of the global least risky table came the US, which dipped below 40bp mid-Q4 but widened out with the rest of the market in November, closing the year below 50bp, and 3bp tighter on the quarter. Australia improved to sixth position and New Zealand entered the top 10 helped by a strong Q4 performance in Asian credit markets. The UK briefly topped the 100bp level but stayed below 100bp at year end, aided by a strong performance in gilts in December. |
<map id="Graphical Class Hierarchy" name="Graphical Class Hierarchy">
<area shape="rect" id="node1" href="$class_a_r_pattern.html" title="Encapsulates information about a sub-component of a marker useful for presentation to a user..." alt="" coords="5,5,88,31"/>
</map>
|
Social capital and self-rated health: A cross-sectional study of the general social survey data comparing rural and urban adults in Ontario.
The concept of social capital shows great promise for its potential to influence individual and population health. Yet challenges persist in defining and measuring social capital, and little is known about the mechanisms that link social capital and health. This paper reports on the quantitative phase of a sequential explanatory mixed methods study using data from Canada's 2013 General Social Survey (data collected 2013-14). An exploratory factor analysis revealed six underlying dimensions of social capital for 7,187 adults living in Ontario, Canada. These factors included trust in people, neighbourhood social capital, trust in institutions, sense of belonging, civic engagement, and social network size. A logistic regression indicated that having high Trust in People and Trust in Institutions were associated with better mental health while high Trust in Institutions, Sense of Belonging, and Civic Engagement were associated with better physical health. When comparing rural and urban residents, there were no differences in their self-reported health, nor did social capital influence their health any differently, despite rural residents having higher social capital scores. The study findings are important for understanding the nature of social capital and how it influences health, and provide direction for targeted health promotion strategies. |
INTRODUCTION {#sec1-1}
============
Myoepithelial carcinoma (MC) and myoepithelioma can be considered as doppelgangers, as they are difficult to distinguish due to diverse morphology and MC have infavorable outcome.\[[@ref1]\] Published reports suggest that MC comprise of \<2% of all salivary gland carcinomas involving parotid gland most commonly. Other sites involved are palate, maxilla, nasopharynx, liver, vulva and vagina.\[[@ref2]\] However, this may be just a tip of the iceberg as due to increased recognition of this tumor, its incidence may be changed and may vary depending on demography. In fact, it is now believed that this tumor is the second-most common salivary gland malignancy arising from the benign adenomas.\[[@ref3]\] It may also arise *de novo*. An accurate diagnosis for MC relies on exclusive myoepithelial differentiation (morphologic and immunohistochemical \[IHC\]) and clear-cut tumor infiltration into adjacent salivary gland or other tissues. We had earlier reported a rare case of clear cell variant of MC in an unusual location of upper lip.\[[@ref4]\] We now report a case of yet again clear cell MC (CCMC) involving buccal vestibule extending up to alveolus.
CASE REPORT {#sec1-2}
===========
A 42-year-male patient reported with the chief complaint of swelling in his right buccal vestibule for 4 months. It involved lower alveolus and vestibule extending anteroposteriorly from the region of first premolar to first molar; and buccolingually, it involved buccal vestibule extending till the lingual vestibule, measuring approximately 3 cm × 2 cm in size. Overlying mucosa was smooth and had indentations of maxillary teeth. Surrounding mucosa appeared normal \[[Figure 1a](#F1){ref-type="fig"}\]. There was no visible pulsation or discharge. On palpation, it was a firm, nontender swelling which was noncompressible and nonreducible. Single ipsilateral submandibular lymph node was palpable, hard, nontender and nonmobile.
{#F1}
His radiograph revealed a radiolucent lesion with ragged border causing displacement of adjacent teeth and thinning of lower border of mandible \[[Figure 1b](#F1){ref-type="fig"}\]. The patient had the habit of tobacco and areca nut consumption since 20 years. Family history was noncontributory and there was no relevant systemic finding. His complete blood picture and random blood sugar investigations revealed no deviation of values from the normal range. A provisional diagnosis of malignancy of salivary gland or odontogenic origin was made.
The tissue was surgically excised. Macroscopic examination revealed a solid nodular mass measuring about 3 cm × 3 cm. Microscopically, plentiful polyhedral (epithelioid) cells with abundant cytoplasm (mostly clear) and round vesicular nuclei with slight pleomorphism were noted \[[Figure 2](#F2){ref-type="fig"}\]. The stroma was scant and appeared hyalinized. Collagenous material was sparsely seen arranged focally into spherules. Necrosis was also noticed. Infiltration was observed in the surrounding bone. There were mitotic figures of more than 7 per 10 high power fields. Immunohistochemically, the tumor cells were positive for calponin \[[Figure 3](#F3){ref-type="fig"}\], CD-10 \[[Figure 4](#F4){ref-type="fig"}\], alpha SMA \[[Figure 5](#F5){ref-type="fig"}\] and HMWCK \[[Figure 6](#F6){ref-type="fig"}\]. We confirmed the diagnosis as CCMC. The patient was recalled after a year and showed no recurrence.
{#F2}
{#F3}
{#F4}
{#F5}
{#F6}
DISCUSSION {#sec1-3}
==========
MC also known as malignant myoepithelioma (MM) affect most commonly major salivary glands and are characterized by differentiation of tumor cells into myoepithelial cells. Morphologic heterogeneity of tumor cells in MC include epithelioid, plasmacytoid, spindle, clear, stellate and mixed type.\[[@ref5]\] Kane *et al*. in a series of 51 cases of MC, observed that minor gland involvement (almost 75%) exceeded major salivary gland involvement (\<25%).\[[@ref6]\] The CCMC affects parotid gland, submandibular gland, palate, retromolar area, maxillary sinus and even the base of the tongue, upper lip (only 1 case reported).\[[@ref4]\]
Myoepithelial cells pose the ability to store glycogen as illustrated by Hamperl.\[[@ref7]\] On the other hand, glycogen-rich, clear cells may be derivatives of different types of precursor cells, not confirming their origin. This implies that to label a myoepithelial tumor having predominant clear cell differentiation, it is necessary to confirm with IHC.\[[@ref8]\]
We searched literature for clear cell variant of MC in the head and neck region. The search revealed the distribution of CCMC as depicted in [Table 1](#T1){ref-type="table"}. According to Losito *et al*. there were 16 cases (including 2 of his own) of CCMC reported till 2008.\[[@ref12]\] The cases reported by Klijanienko *et al*. and Cassidy *et al*. have not been included by us as they are clear cell carcinomas and did not have characteristics of myoepithelial differentiation.\[[@ref12]\] Kane *et al*. in 2010 found that 3 of their 51 cases showed clear cell differentiation.\[[@ref6]\] They have not mentioned their particulars as to the site affected and other demographic details for those three cases. Apart from this, Liao *et al*. in 2005, studied 16 cases of MM and observed clear cell predominance in nine cases.\[[@ref16]\] We found that the largest number of CCMC were studied by Skálová *et al*. (51 which arose de novo and 21 developed from preexisting pleomorphic adenoma).\[[@ref17]\]
######
Clear Cell Myoepithelial Carcinoma of Salivary Glands: Review of Literature

We report a case involving alveolus and vestibule. Our patient presented with a rapidly growing nodular mass. Ingle *et al*. have reported a similar case which clinically manifested as ulceroproliferative lesion of the alveolus. The ulceration proves a more aggressive variant histopathologically that is spindle cell variant.\[[@ref5]\] Histopathologically, predominantly clear cells were present along with epithelioid cells in a hyalinized scant stroma. Benign and MMs may pose a dilemma in diagnosing as the features, and cellular type may be common. Malignancy may be considered by virtue of the tumor cells to show high proliferative index/increased mitotic activity and infiltration.\[[@ref18]\] We observed high mitotic activity of more than 7 per 10 high power fields. Nagao *et al*. described 10 cases of MM and studied their IHC profile. They found epithelioid, spindle and plasmacytoid cell subtypes. Although few epithelioid cells had clear cytoplasm, there is no mention of predominance of clear cells in their 10 cases.\[[@ref19]\] They also found the presence of osteoclast-like giant cells in 1 of their case and is regarded to have a very poor prognosis. We, however, did not observe any giant cell in our case.
Lata *et al*. have stated that MC arising from pleomorphic adenomas show a portion of ductal differentiation, whereas this may not be necessary for MC arising *de novo*.\[[@ref20]\] We did not observe any ductal pattern.
Collagenous spherules (round, eosinophilic bodies) were appreciated and similar structures were confirmed by Michal *et al*. The spherules consists of a mixture of mucin, elastin, basement membrane proteins such as laminin and type IV collagen, admixed with collagen types I and III. This is a characteristic of tumors constituting myoepithelial cells.\[[@ref9]\] Various IHC markers, as depicted in [Table 1](#T1){ref-type="table"}, aid in identification of myoepithelial cells. MCs have been considered to be low-grade malignancy. However, follow-ups have shown that MCs arising de novo tend to have a more unfavorable prognosis.\[[@ref4][@ref15][@ref16]\] The patient was treated surgically and a follow-up of 1 year revealed no recurrence.
CONCLUSION {#sec1-4}
==========
CCMC is a rare entity and may involve major as well as minor salivary glands. We report a case of CCMC in an unusual location involving vestibule and alveolus. The histopathologic findings and IHC profile corroborate a diagnosis of CCMC.
Declaration of patient consent {#sec2-1}
------------------------------
The authors certify that they have obtained all appropriate patient consent forms. In the form the patient(s) has/have given his/her/their consent for his/her/their images and other clinical information to be reported in the journal. The patients understand that their names and initials will not be published and due efforts will be made to conceal their identity, but anonymity cannot be guaranteed.
Financial support and sponsorship {#sec2-2}
---------------------------------
Nil.
Conflicts of interest {#sec2-3}
---------------------
There are no conflicts of interest.
|
# Youtube-dlG localization file.
# FIRST AUTHOR: Sotiris Papadopoulos <ytubedlg@gmail.com>, 2015.
#
msgid ""
msgstr ""
"Project-Id-Version: youtube-dlg 0.4\n"
"POT-Creation-Date: 2018-01-15 16:42+EET\n"
"PO-Revision-Date: 2017-06-15 17:14+EEST\n"
"Last-Translator: Sotiris Papadopoulos <ytubedlg@gmail.com>\n"
"Language-Team: en\n"
"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: pygettext.py 1.5\n"
#: youtube_dl_gui/__init__.py:91
msgid "Error"
msgstr ""
#: youtube_dl_gui/__init__.py:91
msgid "Failed to locate youtube-dl and updates are disabled"
msgstr ""
#: youtube_dl_gui/formats.py:9 youtube_dl_gui/formats.py:109
msgid "ID"
msgstr ""
#: youtube_dl_gui/formats.py:10 youtube_dl_gui/formats.py:110
#: youtube_dl_gui/mainframe.py:140
msgid "Title"
msgstr ""
#: youtube_dl_gui/formats.py:11 youtube_dl_gui/formats.py:111
msgid "Title + ID"
msgstr ""
#: youtube_dl_gui/formats.py:12 youtube_dl_gui/formats.py:112
msgid "Title + Quality"
msgstr ""
#: youtube_dl_gui/formats.py:13 youtube_dl_gui/formats.py:113
msgid "Title + ID + Quality"
msgstr ""
#: youtube_dl_gui/formats.py:14 youtube_dl_gui/formats.py:114
msgid "Custom"
msgstr ""
#: youtube_dl_gui/formats.py:19 youtube_dl_gui/formats.py:119
#: youtube_dl_gui/mainframe.py:503 youtube_dl_gui/mainframe.py:506
msgid "default"
msgstr ""
#: youtube_dl_gui/mainframe.py:97
msgid "Enter URLs below"
msgstr ""
#: youtube_dl_gui/mainframe.py:98
msgid "Update"
msgstr ""
#: youtube_dl_gui/mainframe.py:99 youtube_dl_gui/optionsframe.py:41
msgid "Options"
msgstr ""
#: youtube_dl_gui/mainframe.py:100 youtube_dl_gui/optionsframe.py:584
msgid "Stop"
msgstr ""
#: youtube_dl_gui/mainframe.py:101
msgid "Info"
msgstr ""
#: youtube_dl_gui/mainframe.py:102
msgid "Welcome"
msgstr ""
#: youtube_dl_gui/mainframe.py:103
msgid "Warning"
msgstr ""
#: youtube_dl_gui/mainframe.py:105
msgid "Add"
msgstr ""
#: youtube_dl_gui/mainframe.py:106
msgid "Download list"
msgstr ""
#: youtube_dl_gui/mainframe.py:107 youtube_dl_gui/mainframe.py:516
#: youtube_dl_gui/mainframe.py:534
msgid "Delete"
msgstr ""
#: youtube_dl_gui/mainframe.py:108
msgid "Play"
msgstr ""
#: youtube_dl_gui/mainframe.py:109
msgid "Up"
msgstr ""
#: youtube_dl_gui/mainframe.py:110
msgid "Down"
msgstr ""
#: youtube_dl_gui/mainframe.py:111
msgid "Reload"
msgstr ""
#: youtube_dl_gui/mainframe.py:112 youtube_dl_gui/mainframe.py:448
#: youtube_dl_gui/mainframe.py:649
msgid "Pause"
msgstr ""
#: youtube_dl_gui/mainframe.py:113 youtube_dl_gui/mainframe.py:865
#: youtube_dl_gui/mainframe.py:866 youtube_dl_gui/optionsframe.py:582
msgid "Start"
msgstr ""
#: youtube_dl_gui/mainframe.py:114
msgid "About"
msgstr ""
#: youtube_dl_gui/mainframe.py:115
msgid "View Log"
msgstr ""
#: youtube_dl_gui/mainframe.py:117
msgid "Successfully downloaded {0} URL(s) in {1} day(s) {2} hour(s) {3} minute(s) {4} second(s)"
msgstr ""
#: youtube_dl_gui/mainframe.py:119
msgid "Downloads completed"
msgstr ""
#: youtube_dl_gui/mainframe.py:120
msgid "Total Progress: {0:.1f}% | Queued ({1}) Paused ({2}) Active ({3}) Completed ({4}) Error ({5})"
msgstr ""
#: youtube_dl_gui/mainframe.py:121
msgid "Stopping downloads"
msgstr ""
#: youtube_dl_gui/mainframe.py:122
msgid "Downloads stopped"
msgstr ""
#: youtube_dl_gui/mainframe.py:123
msgid "You need to provide at least one URL"
msgstr ""
#: youtube_dl_gui/mainframe.py:124
msgid "Downloads started"
msgstr ""
#: youtube_dl_gui/mainframe.py:125
msgid "Choose Directory"
msgstr ""
#: youtube_dl_gui/mainframe.py:127
msgid "Download in progress. Please wait for all downloads to complete"
msgstr ""
#: youtube_dl_gui/mainframe.py:128
msgid "Update already in progress"
msgstr ""
#: youtube_dl_gui/mainframe.py:130
msgid "Downloading latest youtube-dl. Please wait..."
msgstr ""
#: youtube_dl_gui/mainframe.py:131
msgid "Youtube-dl download failed [{0}]"
msgstr ""
#: youtube_dl_gui/mainframe.py:132
msgid "Successfully downloaded youtube-dl"
msgstr ""
#: youtube_dl_gui/mainframe.py:134
msgid "Unable to open directory: '{dir}'. The specified path does not exist"
msgstr ""
#: youtube_dl_gui/mainframe.py:136
msgid "Error while shutting down. Make sure you typed the correct password"
msgstr ""
#: youtube_dl_gui/mainframe.py:138
msgid "Shutting down system"
msgstr ""
#: youtube_dl_gui/mainframe.py:141
msgid "Extension"
msgstr ""
#: youtube_dl_gui/mainframe.py:142
msgid "Size"
msgstr ""
#: youtube_dl_gui/mainframe.py:143
msgid "Percent"
msgstr ""
#: youtube_dl_gui/mainframe.py:144
msgid "ETA"
msgstr ""
#: youtube_dl_gui/mainframe.py:145
msgid "Speed"
msgstr ""
#: youtube_dl_gui/mainframe.py:146
msgid "Status"
msgstr ""
#: youtube_dl_gui/mainframe.py:235
msgid "Get URL"
msgstr ""
#: youtube_dl_gui/mainframe.py:236
msgid "Get command"
msgstr ""
#: youtube_dl_gui/mainframe.py:237
msgid "Open destination"
msgstr ""
#: youtube_dl_gui/mainframe.py:238
msgid "Re-enter"
msgstr ""
#: youtube_dl_gui/mainframe.py:458
msgid "Resume"
msgstr ""
#: youtube_dl_gui/mainframe.py:480
msgid "Video"
msgstr ""
#: youtube_dl_gui/mainframe.py:484
msgid "Audio"
msgstr ""
#: youtube_dl_gui/mainframe.py:516
msgid "No items selected. Please pick an action"
msgstr ""
#: youtube_dl_gui/mainframe.py:516
msgid "Remove all"
msgstr ""
#: youtube_dl_gui/mainframe.py:516
msgid "Remove completed"
msgstr ""
#: youtube_dl_gui/mainframe.py:534
msgid "Are you sure you want to remove selected items?"
msgstr ""
#: youtube_dl_gui/mainframe.py:546
msgid "Item is active, cannot remove"
msgstr ""
#: youtube_dl_gui/mainframe.py:579
msgid "Item is not completed"
msgstr ""
#: youtube_dl_gui/mainframe.py:668
msgid "Update in progress. Please wait for the update to complete"
msgstr ""
#: youtube_dl_gui/mainframe.py:716
msgid "Logging is disabled"
msgstr ""
#: youtube_dl_gui/mainframe.py:891
msgid "Shutdown"
msgstr ""
#: youtube_dl_gui/mainframe.py:891
msgid "Shutting down in {0} second(s)"
msgstr ""
#: youtube_dl_gui/mainframe.py:980
msgid "No items to download"
msgstr ""
#: youtube_dl_gui/mainframe.py:1040
msgid "Updates are disabled for your system. Please use the system's package manager to update youtube-dl."
msgstr ""
#: youtube_dl_gui/mainframe.py:1065
msgid "Are you sure you want to exit?"
msgstr ""
#: youtube_dl_gui/mainframe.py:1065
msgid "Exit"
msgstr ""
#: youtube_dl_gui/mainframe.py:1306 youtube_dl_gui/mainframe.py:1456
msgid "Cancel"
msgstr ""
#: youtube_dl_gui/mainframe.py:1455
msgid "OK"
msgstr ""
#: youtube_dl_gui/optionsframe.py:65
msgid "Reset"
msgstr ""
#: youtube_dl_gui/optionsframe.py:66
msgid "Close"
msgstr ""
#: youtube_dl_gui/optionsframe.py:72
msgid "General"
msgstr ""
#: youtube_dl_gui/optionsframe.py:73
msgid "Formats"
msgstr ""
#: youtube_dl_gui/optionsframe.py:74
msgid "Downloads"
msgstr ""
#: youtube_dl_gui/optionsframe.py:75
msgid "Advanced"
msgstr ""
#: youtube_dl_gui/optionsframe.py:76
msgid "Extra"
msgstr ""
#: youtube_dl_gui/optionsframe.py:310
msgid "Language"
msgstr ""
#: youtube_dl_gui/optionsframe.py:313
msgid "Filename format"
msgstr ""
#: youtube_dl_gui/optionsframe.py:318
msgid "Filename options"
msgstr ""
#: youtube_dl_gui/optionsframe.py:319
msgid "Restrict filenames to ASCII"
msgstr ""
#: youtube_dl_gui/optionsframe.py:321
msgid "More options"
msgstr ""
#: youtube_dl_gui/optionsframe.py:322
msgid "Confirm on exit"
msgstr ""
#: youtube_dl_gui/optionsframe.py:323
msgid "Confirm item deletion"
msgstr ""
#: youtube_dl_gui/optionsframe.py:324
msgid "Inform me on download completion"
msgstr ""
#: youtube_dl_gui/optionsframe.py:326
msgid "Shutdown on download completion"
msgstr ""
#: youtube_dl_gui/optionsframe.py:337
msgid "SUDO password"
msgstr ""
#: youtube_dl_gui/optionsframe.py:415 youtube_dl_gui/optionsframe.py:816
msgid "In order for the changes to take effect please restart {0}"
msgstr ""
#: youtube_dl_gui/optionsframe.py:416 youtube_dl_gui/optionsframe.py:817
msgid "Restart"
msgstr ""
#: youtube_dl_gui/optionsframe.py:463
msgid "high"
msgstr ""
#: youtube_dl_gui/optionsframe.py:463
msgid "low"
msgstr ""
#: youtube_dl_gui/optionsframe.py:463
msgid "mid"
msgstr ""
#: youtube_dl_gui/optionsframe.py:468
msgid "Video formats"
msgstr ""
#: youtube_dl_gui/optionsframe.py:471
msgid "Audio formats"
msgstr ""
#: youtube_dl_gui/optionsframe.py:474
msgid "Post-Process options"
msgstr ""
#: youtube_dl_gui/optionsframe.py:475
msgid "Keep original files"
msgstr ""
#: youtube_dl_gui/optionsframe.py:476
msgid "Extract audio from video file"
msgstr ""
#: youtube_dl_gui/optionsframe.py:477
msgid "Embed thumbnail in audio file"
msgstr ""
#: youtube_dl_gui/optionsframe.py:478
msgid "Add metadata to file"
msgstr ""
#: youtube_dl_gui/optionsframe.py:480
msgid "Audio quality"
msgstr ""
#: youtube_dl_gui/optionsframe.py:538
msgid "English"
msgstr ""
#: youtube_dl_gui/optionsframe.py:539
msgid "French"
msgstr ""
#: youtube_dl_gui/optionsframe.py:540
msgid "German"
msgstr ""
#: youtube_dl_gui/optionsframe.py:541
msgid "Greek"
msgstr ""
#: youtube_dl_gui/optionsframe.py:542
msgid "Hebrew"
msgstr ""
#: youtube_dl_gui/optionsframe.py:543
msgid "Italian"
msgstr ""
#: youtube_dl_gui/optionsframe.py:544
msgid "Portuguese"
msgstr ""
#: youtube_dl_gui/optionsframe.py:545
msgid "Russian"
msgstr ""
#: youtube_dl_gui/optionsframe.py:546
msgid "Spanish"
msgstr ""
#: youtube_dl_gui/optionsframe.py:547
msgid "Swedish"
msgstr ""
#: youtube_dl_gui/optionsframe.py:548
msgid "Turkish"
msgstr ""
#: youtube_dl_gui/optionsframe.py:564
msgid "None"
msgstr ""
#: youtube_dl_gui/optionsframe.py:565
msgid "Automatic subtitles (YOUTUBE ONLY)"
msgstr ""
#: youtube_dl_gui/optionsframe.py:566
msgid "All available subtitles"
msgstr ""
#: youtube_dl_gui/optionsframe.py:567
msgid "Subtitles by language"
msgstr ""
#: youtube_dl_gui/optionsframe.py:573
msgid "Subtitles"
msgstr ""
#: youtube_dl_gui/optionsframe.py:577
msgid "Subtitles options"
msgstr ""
#: youtube_dl_gui/optionsframe.py:578
msgid "Embed subtitles into video file (mp4 ONLY)"
msgstr ""
#: youtube_dl_gui/optionsframe.py:580
msgid "Playlist"
msgstr ""
#: youtube_dl_gui/optionsframe.py:586 youtube_dl_gui/optionsframe.py:591
msgid "Max"
msgstr ""
#: youtube_dl_gui/optionsframe.py:589
msgid "Filesize"
msgstr ""
#: youtube_dl_gui/optionsframe.py:594
msgid "Min"
msgstr ""
#: youtube_dl_gui/optionsframe.py:723
msgid "Retries"
msgstr ""
#: youtube_dl_gui/optionsframe.py:726
msgid "Authentication"
msgstr ""
#: youtube_dl_gui/optionsframe.py:728
msgid "Username"
msgstr ""
#: youtube_dl_gui/optionsframe.py:730
msgid "Password"
msgstr ""
#: youtube_dl_gui/optionsframe.py:732
msgid "Video password"
msgstr ""
#: youtube_dl_gui/optionsframe.py:735
msgid "Network"
msgstr ""
#: youtube_dl_gui/optionsframe.py:737
msgid "Proxy"
msgstr ""
#: youtube_dl_gui/optionsframe.py:739
msgid "User agent"
msgstr ""
#: youtube_dl_gui/optionsframe.py:741
msgid "Referer"
msgstr ""
#: youtube_dl_gui/optionsframe.py:744
msgid "Logging"
msgstr ""
#: youtube_dl_gui/optionsframe.py:746
msgid "Enable log"
msgstr ""
#: youtube_dl_gui/optionsframe.py:747
msgid "View"
msgstr ""
#: youtube_dl_gui/optionsframe.py:748
msgid "Clear"
msgstr ""
#: youtube_dl_gui/optionsframe.py:858
msgid "Youtube-dl command line options (e.g. --help)"
msgstr ""
#: youtube_dl_gui/optionsframe.py:861
msgid "Extra options"
msgstr ""
#: youtube_dl_gui/optionsframe.py:863
msgid "Debug youtube-dl"
msgstr ""
#: youtube_dl_gui/optionsframe.py:864
msgid "Ignore errors"
msgstr ""
#: youtube_dl_gui/optionsframe.py:865
msgid "Ignore youtube-dl config"
msgstr ""
#: youtube_dl_gui/optionsframe.py:866
msgid "No mtime"
msgstr ""
#: youtube_dl_gui/optionsframe.py:867
msgid "Prefer native HLS"
msgstr ""
#: youtube_dl_gui/optionsframe.py:928
msgid "Log Viewer"
msgstr ""
|
Q:
Find the Variance of a Normal Random Variable
I'm working on the following problem and could use some help. Unless I'm not making a connection to material covered in my course, we haven't covered this and I'm not sure how to work this problem out.
Suppose that X is a normal RV with mean 5. If $P(X>9)=0.2$, approximately what is $\text{Var}(x)$?
This is what I have so far:
Let $z=\frac{x-\mu}{\sigma}$. Then,
$$ P(X>9)\Rightarrow P(z\ge \frac{9-\mu}{\sigma})=0.2 \, \, \text{and} \, \, P(z\le \frac{9-\mu}{\sigma})=0.8 $$
That's about all I can decern from the problem. I know that the variance is $\sigma$ and the mean is $\mu$. So, it makes me believe that I have to set up the problem somehow to solve for $\sigma$, which would be the approximate value of $\text{Var}(x)$. I'm just not sure where to begin with that, so any help would be appreciated.
Thank you!
A:
$\sigma$ is the standard deviation while $\sigma^2$ is the variance.
We have
$$\begin{align*}
P(X\gt9)=0.2
&\iff 1-P(X<9)=0.2\\\\
&\iff1-\Phi\left(\frac{9-5}{\sigma}\right)=0.2\\\\
&\iff\Phi\left(\frac{9-5}{\sigma}\right)=0.8
\end{align*}$$
By a z-table, $\Phi(z)=0.8$ when $z\approx 0.84$ so
$$\frac{9-5}{\sigma}=0.84\Rightarrow\sigma^2 \approx 22.68$$
More accurately, R statistical software gives $z\approx 0.8416$
> qnorm(.8)
[1] 0.8416212
and $\sigma^2\approx22.59$
> (4/qnorm(.8))^2
[1] 22.58846
|
Wednesday, March 18, 2015
I am pretty disappointed in Israeli voters for decisively re-electing Netanyahu. His promise was very clear, there would never be a Palestinian state. There is no chance of a two state solution. There is only the relentless drive to eliminate Palestinians from Palestine. There will be no "peace process", of course there never was, it was always a pretense. The mask of Israel is off, and the real face is the face of a police state which oppresses Palestinians, occupies more and more of their territory, and makes life as difficult as possible in its relentless efforts to drive them out - this is the "one state solution" that has been obvious for years but America has pretended that a "two state solution" was always possible. It's not.Israeli peace activist, Miko Peled, gave an hour long talk a while back and I was so fascinated that I listened to the entire thing. He tells of the dark side of Zionism - drive out the Palestinians, Israel for Jews only, punish and oppress Palestinians. The rest is all pretense.If you focus on Hamas terrorist acts you naturally conclude that the Netanyahu approach is necessary - a matter of self defense. I have come to the conclusion that focusing on Hamas is the key to Israeli propaganda to justify their oppression of the Palestinians. But if you focus on the lives of the Palestinians the entire picture changes. You finally start to notice that they are living in a totalitarian police state. And what do oppressed people do when they live in police states? they fight back. Terrorism is the language of the oppressed. Terrorism is the language of the hopeless and impotent. Remove the oppression and the fuel for terrorism dries up. It is a shame that American hawks are so committed to Netanyahu and his dedication to oppression and war. One of Netanyahu's lovely goals is to goad America into war with Iran. Let's have you and them fight, is his message. Fortunately, we have a president who won't take the bait. God help us all if a Republican hawk becomes president and dances to the tune of Netanhahu, or more to the point Netanyahu's biggest contributor, American casino magnate Sheldon Adelson. The American Jewish lobby has had too much influence for too long on American policy. The Cold War is over and U.S. interests in Israel have waned. It is time to rethink our relationship with Israel, especially when they have made it so blindingly clear that peace with the Palestinians is not now, never was, and never will be possible.
Wednesday, March 4, 2015
It seems to me that Israel’s Prime Minister, Benjamin Netanyahu, is doing his best to sabotage the negotiations between the U.S. and Iran regarding nuclear weapons, by demanding the results that he insists on in the negotiations, knowing that his demands kill the possibility of a deal. And, perhaps worst of all, he presented his case to one half of the U.S. government, the Republicans. The House of Representatives is controlled by the Reps, and is violently opposed to almost anything the executive branch. or the Democrats in general, stand for. By teaming up with one U.S. party, Israel now has declared war on Obama, and on Democrats. Is he out of his mind?
Why on earth should the United States be doing what Israel commands? I know that Israel has had great influence on U.S. foreign policy in the Middle East in the past, but I think it is about time to put an end to that influence in a very decisive way.
The relationship between the U.S. and Israel has changed pretty dramatically with the end of the Cold War, it seems to me. When the Soviets were dedicated to world domination, Israel was a valuable ally to the U.S. as a way of thwarting Soviet hegemony over the Middle East. But the Soviet Union is gone, and although Israel is a nice ally to have for its intelligence assistance in the Middle East to help us deal with the Muslim civil and religious wars, Israeli interests aren’t any more important to U.S. interests than those of Saudi Arabia, or Turkey, or Iraq, or maybe even Iran. They are all a bunch of Middle Eastern countries that refuse to play well together, and the primary interest of the U.S. seems to me to be to keep all of them from doing stupid things that will harm the U.S.
I think that those who try to equate the Islamist nutcases with the existential threats that was posed by the old Soviet Empire are ridiculously wrong. The fundamentalist nutcases are dangerous, but mostly to themselves, using mayhem against us as a tactic in their religious civil wars.
It is certainly true that the U.S. Jewish lobby has had a death grip on U.S./Israeli relations for decades, but I think that influence is starting to wane a bit. The primary argument for supporting Israel has become humanitarian since the end of the Cold War, but it is pretty hard for the average American, or at least for me, to see Israel as the victim as long as it brutalizes and dominates the Palestinians in its sphere of influence. Israel really seems to feel entitled to subjugate the Palestinians and punish them at will. Hezbollah is certainly terrible, but the Palestinians seem to me to be people who have had almost all of their freedoms taken from them by an Israeli police state.
Maybe it’s time for the U.S. to make some real demands on Israel, like to grant basic freedoms and rule of law to the Palestinians, and to demand that Israel withdraws from the occupied lands. But, time after time Israel expands their Israeli settlements, brutalizes the Palestinians, and seems to be secure in the notion that America will back them. Why are we so passive with the Israelis?
And why on earth should America stand for Israel taking sides in the partisan divides in U.S. government for the purposes of sabotaging American diplomacy with Iran?
Search This Blog
About Me
I am a boomer who has been both a left winger and a right winger and am seeking to add some soothing energy to the inflamed polarizations of today's rhetoric. However, in the age of extremist Republicanism I see the best way to soothe the waters is to oppose the inflammations from the Right, and the Left as needed. |
Coadministration of ornithine and alpha-ketoglutarate is no more effective than ornithine alone as an arginine precursor in piglets enterally fed an arginine-deficient diet.
Simultaneous administration of alpha-ketoglutarate and ornithine, in a 1:2 molar ratio, may improve the effectiveness of ornithine as an arginine precursor in neonatal piglets by shifting ornithine metabolism away from oxidation and toward the synthesis of arginine and other metabolically important compounds. To study this proposed mechanism, enterally fed piglets were allocated to receive 1 of 4 diets for 5 d: an arginine-deficient [1.2 mmol/(kg . d) arginine] diet (basal), or the basal diet supplemented with either alpha-ketoglutarate [4.6 mmol/(kg x d)] (+alpha-KG), ornithine [9.2 mmol/(kg x d)] (+Orn), or both ornithine and alpha-ketoglutarate (+alpha-KG/+Orn, molar ratio 1:2). Primed, constant infusions of [1-(14)C]ornithine given both intragastrically and intraportally were used to measure ornithine kinetics and determine the role of first-pass intestinal metabolism in ornithine metabolism. Whole body arginine and glutamate kinetics were measured using a primed, constant intragastric infusion of [guanido-(14)C]arginine and [3,4-(3)H]glutamate. The diets did not affect plasma arginine or ammonia concentrations, arginine flux, or arginine synthesis from ornithine. Therefore, arginine synthesis was not increased by the simultaneous infusion of ornithine and alpha-ketoglutarate. Piglets that received dietary ornithine had a 2-fold greater rate of proline synthesis from ornithine (P < 0.05) and oxidized a greater (P < 0.05) portion of the infused ornithine than piglets in the basal and +alpha-KG groups. Overall, ornithine addition to an arginine deficient diet had a greater effect on ornithine and arginine metabolism than the addition of alpha-ketoglutarate. First-pass intestinal metabolism was critical for ornithine synthesis and conversion to other metabolites but not for ornithine oxidation. |
Immunohistochemical study of acinic cell carcinoma of minor salivary gland.
Acinic cell carcinoma (ACC) is a rare salivary gland tumour, making up 4% of all minor salivary gland tumors. Typically, it is composed of acinic cells although transitional and duct-like cells are also identified. In the present study, a panel of antibodies was applied to eight minor salivary gland ACCs. Antibodies tested were: cytokeratins 7, 8, 13, 14, 18, 19, vimentin and actin (HHF35). Immunohistochemical staining revealed that cytokeratin 8, among the tested antibodies, was the more specific to neoplastic cells with a pattern of distribution quite variable and peculiar. This staining may be useful in the recognition of neoplastic acinic cells. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.