text stringlengths 8 5.77M |
|---|
<?php
/**
* @file
* Provide Views data and handlers for mediafield.
*/
/**
* Implements hook_field_views_data().
*/
function mediafield_field_views_data($field) {
$data = field_views_field_default_views_data($field);
foreach ($data as $table_name => $table_data) {
// Add the relationship only on the fid field.
$data[$table_name][$field['field_name'] . '_fid']['relationship'] = array(
'handler' => 'views_handler_relationship',
'base' => 'file_managed',
'entity type' => 'file',
'base field' => 'fid',
'label' => t('file from !field_name', array('!field_name' => $field['field_name'])),
);
}
return $data;
}
|
# @rollup/plugin-typescript ChangeLog
## v6.0.0
_2020-09-09_
### Breaking Changes
- fix!: Change `noEmitOnError` default to false (#544)
### Updates
- test: add generating declarations with non-default rootDir (#553)
- chore: update dependencies (9e52818)
## v5.0.2
_2020-07-12_
### Bugfixes
- fix: utilize 'this.meta.watchMode' (#449)
### Updates
- chore: linting update (410ceb8)
## v5.0.1
_2020-06-28_
### Bugfixes
- fix: load empty emitted files (#476)
## v5.0.0
_2020-06-22_
### Breaking Changes
- fix!: sync rollup and typescript file watch (#425)
### Bugfixes
- fix: Fix peer dep version (#461)
## v4.1.2
_2020-05-20_
### Bugfixes
- fix: memory leak. fixes #322 (#352)
### Updates
- docs: update readme examples (#391)
- docs: update link to @rollup/plugin-babel in README.md (#372)
## v4.1.1
_2020-04-12_
### Bugfixes
- fix: sourcemap generated as null (#276)
- fix: use parsedOptions.fileNames for emit declaration files (#270) (#271)
## v4.1.0
_2020-04-12_
### Features
- feat: Refine options interface (#284)
## v4.0.0
### Bugfixes
- fix: Use builtin extends resolution (#199)
### Features
- feat: Move to BuilderProgram API (#217)
### Breaking Changes
Please see https://github.com/rollup/plugins/pull/217 for more information.
## v3.1.0
_2020-03-05_
_Note: This was a bad release due to breaking changes. v3.1.1 has been published to revert the latest 3.x.x version to a non-breaking state. For the changes in this erroneous version, please use v4.0.0._
### Updates
- test: Add preserveModules test (#234)
- chore: refactor compiler host (#214)
- test: Add test for optional chaining (#207)
- chore: Use typechecking (4bb8753)
## v3.0.0
_2020-01-27_
### Breaking Changes
- feat: Add typechecking! (#177)
### Bugfixes
- fix: extended config file path (#157)
### Updates
- core: Add note about old behaviour (#181)
- chore: Always use ParsedCommandLine (#162)
- chore: update devDeps (96c45ff)
- chore: Remove resolveHost (#148)
## v2.1.0
_2020-01-07_
### Features
- feat: Warning objects for type errors (#144)
- feat: Find tslib asynchronously (#131)
### Updates
- chore: Use ts.findConfigFile helper (#145)
## v2.0.2
_2020-01-04_
### Bugfixes
- fix: Use this.warn for ts errors (#129)
### Updates
- refactor: use typescript in typescript plugin (#122)
- chore: update changelog (b723f92)
- chore: misc linting updates (4de10f0)
## 2.0.1
_2019-12-04_
- fix(typescript): import from scoped utils (#78)
## 2.0.0
_2019-11-25_
- **Breaking:** Minimum compatible Rollup version is 1.20.0
- **Breaking:** Minimum supported Node version is 8.0.0
- Published as @rollup/plugin-typescript
## 1.0.1
_2019-03-24_
- Update dependencies ([#136](https://github.com/rollup/rollup-plugin-typescript/issues/136))
## 1.0.0
_2018-09-16_
- Major update for TypeScript 2/3, Rollup 1 compatibility, lots of fixes ([#124](https://github.com/rollup/rollup-plugin-typescript/issues/124))
- Require TypeScript as peer dependency ([#121](https://github.com/rollup/rollup-plugin-typescript/issues/121))
- Also test on Node 10 ([#119](https://github.com/rollup/rollup-plugin-typescript/issues/119))
- Fix example in readme ([#98](https://github.com/rollup/rollup-plugin-typescript/issues/98))
## 0.8.1
- Ignore typescript-helpers in source maps ([#61](https://github.com/rollup/rollup-plugin-typescript/issues/61))
## 0.8.0
- Fix the rollup breaking change with paths ([#52](https://github.com/rollup/rollup-plugin-typescript/issues/52))
- Don't fail without source maps ([#57](https://github.com/rollup/rollup-plugin-typescript/pull/57))
## 0.7.7
- Add missing `__assign` helper ([#49](https://github.com/rollup/rollup-plugin-typescript/issues/49))
## 0.7.6
- Ignore the `declaration` option ([#45](https://github.com/rollup/rollup-plugin-typescript/issues/45))
- Disable `strictNullChecks` with a warning for TypeScript versions that don't support it ([#46](https://github.com/rollup/rollup-plugin-typescript/issues/46))
## 0.7.5
- Ensure NPM doesn't ignore typescript-helpers
## 0.7.4
- Resolve typescript-helpers to a file in the filesystem.
## 0.7.3
- Update Tippex to ^2.1.1
## 0.7.2
- Don't error if both `sourceMap` and `inlineSourceMap` are specified
## 0.7.1
- No plugin specific options should be forwarded to TypeScript
## 0.7.0
- Use `compilerOptions` from `tsconfig.json` if found ([#39](https://github.com/rollup/rollup-plugin-typescript/pull/32))
## 0.6.1
- Upgrade Tippex to ^2.1.0
- Upgrade TypeScript to ^1.8.9
## 0.6.0
- Upgrade to TypeScript ^1.8.7
- Update `__awaiter` helper to support TypeScript 1.8.x ([#32](https://github.com/rollup/rollup-plugin-typescript/pull/32))
- Update `ts.nodeModuleNameResolver` to support both 1.7.x and 1.8.x ([#31](https://github.com/rollup/rollup-plugin-typescript/issues/31))
## 0.5.0
- Do not duplicate TypeScript's helpers ([#24](https://github.com/rollup/rollup-plugin-typescript/issues/24))
- Handle `export abstract class` ([#23](https://github.com/rollup/rollup-plugin-typescript/issues/23))
## 0.4.1
- Does not attempt resolve or transform `.d.ts` files ([#22](https://github.com/rollup/rollup-plugin-typescript/pull/22))
## 0.4.0
- Work around TypeScript 1.7.5's transpilation issues ([#9](https://github.com/rollup/rollup-plugin-typescript/issues/9))
- Overridable TypeScript version when transpiling ([#4](https://github.com/rollup/rollup-plugin-typescript/issues/4))
- Add `jsx` support ([#11](https://github.com/rollup/rollup-plugin-typescript/issues/11))
## 0.3.0
- Author plugin in TypeScript
- Report diagnostics
- Resolve identifiers using `ts.nodeModuleNameResolver`
## 0.2.1
- Upgrade to TypeScript ^1.7.5
- Enable source maps per default
## 0.2.0
- Use (_prerelease version of_) TypeScript 1.7.0 to generate ES5 while preserving ES2015 imports for efficient bundling.
## 0.1.0
- Initial release
|
QImage dfcalculate(QImage &img, bool transparent = false);
QImage dfcalculate_bruteforce(QImage &img, bool transparent = false); |
This is Peter Hitchens's Mail On Sunday Column
There aren’t enough public sector houses to go round. Would it then make sense to demolish all those houses and make everyone except the rich live in tower blocks?
Of course not. Yet this mad principle – that if everyone cannot have something, nobody can have it – governs our education policy, and no major party disagrees with it.
Half a century ago, everyone agreed that secondary modern schools were not working. Everybody knew that the technical schools, promised in 1944, had not been built.
The one good part of the system was the grammar schools. They were enabling a wonderful revolution in which the very best education was flung open to anyone who could pass an exam, and our obsolete class system was finally being overthrown by unfettered talent.
Alongside them, and based on the same kind of selection by ability, was a brilliant scheme known as the direct grant, by which scores of the finest private day schools in the world took in large numbers of state school pupils free of charge.
Girls and boys from grammar and direct grant schools were storming Oxford and Cambridge by the end of the 1960s, elbowing aside public school products without any special concessions or quotas.
The sane response to this would have been to build the technical schools (which we still badly need), improve the secondary moderns and encourage and expand the grammar schools and the direct grant schools.
The actual response of Tory and Labour governments was to destroy hundreds of superb grammar schools, some of them centuries old, and abolish the direct grant system. You could fill several books with these follies, and I have.
One of the many crazy results was the revival of the dying private schools, which held open their ornate gateways to paying refugees from the comprehensive madness. The comprehensives were so bad and so disorderly that basic competence and order could be sold as top quality for fees of £25,000 a year.
It was a typical example of our governing class’s habit of finding the things that are healthy, good and beneficial, and destroying them.
As it happens, this particular mistake is reversible, and has been corrected in recent times. When communism collapsed in East Germany, thousands of parents petitioned their new free state governments to restore the grammar schools which their Stalinist rulers had ruthlessly replaced with comprehensives.
Comprehensive schools, as too few understand, have never been designed to improve education. On the contrary, their inventor, Graham Savage, actually admitted that his plan would hold back bright children.
They are a revolutionary scheme designed to enforce equality of outcome. That is why it is against the law to open any new grammar schools, and why this week’s odd legal fiddle in Sevenoaks is causing so much fuss.
But a tiny rump of grammar schools continues to exist. They are so much better than the comprehensives which replaced them that even Labour politicians, such as Harriet Harman, have readily endured derision and career damage to send their children to them.
This is why the remaining few grammars are so besieged. Their enemies repeatedly lie about this. Because a tiny few oversubscribed schools are dominated by the middle class, they claim that a national system, available to all, would have the same problem. This obviously isn’t true, yet they keep on repeating the falsehood.
Why can’t we restore the lost grammar schools when huge numbers of parents want them and they are proven to work?
It is time for these lies to end. As things are, state schools are rigidly and cruelly selective, but their pupils are picked on the basis of their parents’ wealth and ability to live in the right catchment area, or their public piety – or both.
The rich and powerful (including many Tory and Labour politicians and some of the keenest campaigners against grammars) play a constant Game Of Homes to lever and wangle their offspring into the best postcodes and the best ‘comprehensives’. Many of these are so socially selective that they have hardly any poor pupils receiving free school meals, though you never hear this fact mentioned.
Why do we put up with it? Why can’t we restore the lost grammar schools when huge numbers of parents want them and they are proven to work?
How dare we laugh at the Germans for being subservient and obedient, when we tolerate this stupid, dishonest policy, which wrecks the hopes of thousands each year and madly wastes the talents of this country?
What's so saintly about destroying a happy family?
It was absurd to deny votes to women for so long. But the fashionable new film Suffragette is deeply misleading about how this came about, and rather nasty. Did Meryl Streep know what she was doing when she lent her stardom to this production?
It makes a saint out of a (fictional) working-class woman, played by Carey Mulligan, who ruthlessly destroys her small, happy family for the sake of an abstraction, ignoring the pleas and kindly advice of good men.
And it makes a heroine out of another fanatic, played by Helena Bonham Carter, who is in fact a terrorist, and helps to blow up a Cabinet Minister’s home.
I hope the makers are not prosecuted under the absurd and unBritish 2006 Terrorism Act, which created the offence of ‘Glorifying Terrorism’, though some may think that is what their film does.
There is quite a lot of evidence that the militant suffragettes actually damaged the cause they so noisily pursued. The film doesn’t even mention the First World War, which did far more to bring about votes for women than hunger strikes, broken windows or arson.
David Cameron’s twin bungles in Libya and Syria, where his ignorant interference helped cause the huge migrant wave, have transformed the EU referendum campaign.
Cameron's pro-EU argument has been so weakened by the migrant crisis that a vote to leave Europe may now acually be possible
He has been doubly unlucky. First, he unexpectedly won the Election with a majority, so he has to keep his promise of a vote. Second, a largely indifferent public has spotted the connection between EU membership and our undefended borders.
This means that a vote to leave is actually possible, which I must admit I hadn’t thought it was. The pro-EU argument has always been feeble and dishonest, as the comically useless launch of the ‘Stay-in’ campaign last week showed. And the Prime Minister’s ‘renegotiations’ were always hopeless. But now this is becoming painfully obvious to those who would normally not have cared.
I just hope that, if we do decide to leave, we have enough strength and wealth to act as a nation once again. Our national muscles have shrivelled and wasted in the 43 years since Westminster was turned into a glorified county council.
And we still have no major political party that supports national independence. So will we know what to do with it when we get it? |
News
Victorian pair Liz Watson and Jo Weston have been chosen to lead the Australian 21/U side in its upcoming series of matches against international sides Australia, New Zealand and England.
Watson, pictured left, has been named captain and Weston vice-captain of the 21/U side that will face the Diamonds, Silver Ferns and England in Newcastle and Sydney in the first week of August as part of those countries’ preparations for the Netball World Cup SYDNEY 2015.
The duo play with the Melbourne Vixens in the ANZ Championship and were part of their 2014 title-winning squad.
Watson, who was part of the 2014 Australian Diamonds squad, said she was thrilled when told the news of her selection as captain.
“It’s an honor and privilege to represent Australia at any level,” Watson said. “But to captain these amazing athletes is something I’m extremely proud of. Every single player in the team is not only an amazing netballer, but they are also all great people.
“I’ve been lucky enough to be involved with most of the girls in underage programs at both state and national level so it’s going to make my job very easy.”
Watson boasts previous leadership experience as co-captain of the Victorian 17/U team in 2011 and was also co-captain of the Victorian Flames in its inaugural Australian Netball League season in 2013.
Weston was vice-captain of the Australian 21/U team that toured New Zealand last year and is excited to be chosen in the same role in 2015.
“I enjoyed working with Maddy (Proud) and the coaching staff last year so it’s another great opportunity to extend myself in that role and work on building those relationships off court,” Weston said.
“Liz and I have played together for Victorian teams since we were 14 so to be playing for Australia is pretty special.”
The duo say they’ve been fortunate to play under a great leader for the past couple of seasons at the Vixens in retired great Bianca Chatfield.
Watson has also undertaken some leadership courses at the Victorian Institute of Sport, learning from athletes in other sports.
“I’ve learnt so much from Bianca and she’s influenced my motivation to be a better leader and also a better person off the court in my life,” Watson said.
Weston, pictured right, described Chatfield as a “real inspiration” to her teammates.
“She embodies what sporting leadership looks like,” Weston said. “She’s got an amazing ability to build a team work ethic but also encourages those around her to become better in all aspects of their lives.”
The 21/U team members will gather in Sydney on Friday ahead of their first match against the New Zealand `A’ side on Saturday.
Watson said the opportunity to play against the Diamonds, Silver Ferns and England over the week was an “amazing opportunity” for every player in the team.
“It’s a great step up for all of us. Everyone is going to take a lot out of it,” she said. “It’s going to be about coming together as quickly as we can and making sure when we get out there we thrive off the excitement of this opportunity and put in our best performance.”
Australian 21/U coach Tania Obst said both Watson and Weston are highly respected by their peers.
“Liz has shown genuine leadership qualities on court with the Vixens and I have no doubt that she will bring those attributes to the national 21/U team,” Obst said.
“Both leaders will work closely with me to deliver the ‘team first’ philosophy within the national 21/U program. This is a fantastic opportunity for both athletes to take on these roles amongst their peers.” |
Q:
How to check if a gerund relationship is exist and valid in database
I have a scenario in which I have a table that is combination of many-to-many relationship, I want to make sure that relationship of association exists only once , no repeating records do exists in it.
I am pasting data over here, I need to make sure that there is not repeating , that violates "gerund" property.
ItemID ProductID ProductAssociationGroupID
3064 10084 11
3065 10705 11
3066 11766 68
3067 11766 75
3068 11772 106
3069 11778 11
3070 11779 98
3071 11779 93
3072 11793 93
3073 12073 20
3074 12178 12
3075 12561 12
3076 12561 17
3077 12561 82
3078 12561 81
3079 12561 77
3080 12561 76
3081 12573 37
How may I query to find out the exact relationship exists only once in the above data?
A:
I am still awaiting some clarification on the columns, but I believe using the HAVING clause will give you the results you want.
Select ProductID, ProductAssociationGroupID
from [Database]
Group by ProductAssociationGroupID, ProductID
Having (Count(ProductAssociationGroupID) = 1)
If you want to find duplicates, then I would just change the HAVING clause to greater than.
|
//
// CubeView class definitions for the Fast Light Tool Kit (FLTK).
//
// Copyright 1998-2010 by Bill Spitzak and others.
//
// This library is free software. Distribution and use rights are outlined in
// the file "COPYING" which should have been included with this file. If this
// file is missing or damaged, see the license at:
//
// https://www.fltk.org/COPYING.php
//
// Please see the following page on how to report bugs and issues:
//
// https://www.fltk.org/bugs.php
//
#ifndef CUBEVIEW_H
#define CUBEVIEW_H 1
#include <config.h>
#include <FL/Fl.H>
#if HAVE_GL
# include <FL/Fl_Gl_Window.H>
# include <FL/gl.h>
#else
# include <FL/Fl_Box.H>
#endif /* HAVE_GL */
#include <stdlib.h>
#if HAVE_GL
class CubeView : public Fl_Gl_Window {
#else
class CubeView : public Fl_Box {
#endif /* HAVE_GL */
public:
// this value determines the scaling factor used to draw the cube.
double size;
CubeView(int x,int y,int w,int h,const char *l=0);
/* Set the rotation about the vertical (y ) axis.
*
* This function is called by the horizontal roller in CubeViewUI and the
* initialize button in CubeViewUI.
*/
void v_angle(double angle){vAng=angle;}
// Return the rotation about the vertical (y ) axis.
double v_angle() const {return vAng;}
/* Set the rotation about the horizontal (x ) axis.
*
* This function is called by the vertical roller in CubeViewUI and the
* initialize button in CubeViewUI.
*/
void h_angle(double angle){hAng=angle;}
// the rotation about the horizontal (x ) axis.
double h_angle() const {return hAng;}
/* Sets the x shift of the cube view camera.
*
* This function is called by the slider in CubeViewUI and the
* initialize button in CubeViewUI.
*/
void panx(double x){xshift=x;}
/* Sets the y shift of the cube view camera.
*
* This function is called by the slider in CubeViewUI and the
* initialize button in CubeViewUI.
*/
void pany(double y){yshift=y;}
#if HAVE_GL
/*The widget class draw() override.
*
*The draw() function initialize Gl for another round o f drawing
* then calls specialized functions for drawing each of the
* entities displayed in the cube view.
*
*/
void draw();
#endif /* HAVE_GL */
private:
/* Draw the cube boundaries
*
*Draw the faces of the cube using the boxv[] vertices, using
* GL_LINE_LOOP for the faces. The color is \#defined by CUBECOLOR.
*/
#if HAVE_GL
void drawCube();
#else
void drawCube() { }
#endif /* HAVE_GL */
double vAng,hAng;
double xshift,yshift;
float boxv0[3];float boxv1[3];
float boxv2[3];float boxv3[3];
float boxv4[3];float boxv5[3];
float boxv6[3];float boxv7[3];
};
#endif
|
Q:
Table cell text overflow when using \multirow
I have made a table and in it, I have to use the multirow package for the headers. Works fine when there are two lines but it y-overflows when there are three. I tried increasing the space in each row with \setlength\extrarowheight but that just increased the cell and the overflow remained.
Here are a few pictures:
How do I solve this?
Here is the source for the table:
\documentclass[11pt,a4paper]{article}
\usepackage{multirow}
\begin{document}
\begin{table}[h!]
\centering
\caption{OVERFLOW}
\bgroup
\def\arraystretch{1.5}%
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
\multirow{2}{*}{
\begin{tabular}[c]{@{}c@{}}Extension\\
$x/\mathrm{cm}$\end{tabular}} &
\multicolumn{5}{c|}{
\begin{tabular}[c]{@{}c@{}}Distance travelled \\
$s_{i}/\mathrm{cm}$\end{tabular}} &
\multirow{2}{*}{
\begin{tabular}[c]{@{}c@{}}Avg. distance\\
$s/\mathrm{cm}$\end{tabular}} &
\multirow{2}{*}{
\begin{tabular}[c]{@{}c@{}}Uncertainty in\\
avg. distance\\ $\Delta s/\pm \mathrm{cm}$\end{tabular}} \\
\cline{2-6} &
Trial 1 & Trial 2 & Trial 3 & Trial 4 & Trial 5 & & \\
\hline
\end{tabular}
\egroup
\end{table}
\end{document}
A:
Edit:
With using makecell package for define multi-line multi-row cell, I obtain:
In table instead to increase \arraystretch I use gaped cells from makecell package:
\documentclass[11pt,a4paper]{article}
\usepackage{makecell, multirow}
\usepackage{siunitx}
\begin{document}
\begin{table}[h!]
\centering
\caption{OVERFLOW}
\setcellgapes{5pt}
\makegapedcells
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
\multirowcell{3}{Extension\\ \si{x/cm}}
& \multicolumn{5}{c|}{\makecell{Distance travelled \\ \si{s_{i}/cm}}}
& \multirowcell{3}{Avg. distance\\ \si{cm} }
& \multirowcell{3}[1ex]{Uncertainty in\\
avg. distance\\
\si{\Delta s/\pm cm}}} \\
\cline{2-6} &
Trial 1 & Trial 2 & Trial 3 & Trial 4 & Trial 5 & & \\
\hline
\end{tabular}
\end{table}
\end{document}
|
Q:
Easier way to show $(\mathbb{Z}/(n))[x]$ and $\mathbb{Z}[x] / (n)$ are isomorphic
$$(\mathbb{Z}/(n))[x] \simeq \mathbb{Z}[x] / (n)$$
I've shown this by showing that the map that sends $\overline{1} \mapsto [1+(n)]$ (where the bar denotes the congruence class mod $n$) and $x \mapsto [x+(n)]$ is a homomorphism that is injective and bijective, which is a bit cumbersome. Is there an easier way to show this? I can't tell if this is trivial or not.
A:
The homomorphism in the other direction is maybe easieer to see.
From the $\mathbb Z\to \mathbb Z/(n)\hookrightarrow \mathbb Z/(n)[x]$ (canonical projection and canonical inclusion) and $x\mapsto x$ we obtain a ring homomorphism $\mathbb Z[x]\to \mathbb Z/(n)[x]$ (universal property of polynomial ring). The kernel is quite clearly the set of polynomials with coefficients multiples of $n$, i.e. $n\mathbb Z[x]$ or $(n)$. Hence we obtain a homomorphism $\mathbb Z[x]/(n)\to\mathbb Z/(n)[x]$.
The homomorphism is clearly onto as it is easy to find an inverse image in $\mathbb Z[x]$ for any element of $\mathbb Z/(n)[x]$.
|
Piloting the development of a cost-effective evidence-informed clinical pathway: managing hypertension in Jordanian primary care
Piloting the development of a cost-effective evidence-informed clinical pathway: managing hypertension in Jordanian primary care
Piloting the development of a cost-effective evidence-informed clinical pathway: managing hypertension in Jordanian primary care
Objectives: the UK's National Institute for Health and Clinical Excellence (NICE) and the Jordan office of the Medicines Transparency Alliance embarked on a pilot project to design an evidence-based guideline for cost-effective pharmacological treatment of essential hypertension in Jordan. The project's objectives were to directly address a major health problem for Jordan by producing a guideline; and to delineate the strengths and weaknesses of Jordan's healthcare process to allow similar future efforts to be planned more efficiently.
Methods: the pilot spanned a period of approximately 8 months. Activities were overseen by local technical and guideline development teams, as well as experts from NICE. NICE's hypertension guidelines and economic model were used as a starting point. Parameters in the economic model were adjusted according to input and feedback from local experts with regards to Jordanian physician and patient practices, resource costs, and quality of life estimates. The results of the economic model were integrated with the updated available clinical trial literature.
Results: the outputs of the economic model were used to inform recommendations, in the form of a clinical algorithm. A report of the process and the strengths and weaknesses observed was developed, and recommendations for improvements were made.
Conclusions: the pilot represented the start of what is intended to be a healthcare process change for the country of Jordan. Issues emerged which can inform strategies to ensure a more cohesive and comprehensive approach to the cost-effective use of appropriate drugs in managing chronic disease in Jordan and countries operating in a similarly resource-constrained environment. Furthermore, our pilot highlights how richer countries with relevant experience in evidence-informed healthcare policy making can assist others in strengthening their decision-making methods and processes.
Abstract
Objectives: the UK's National Institute for Health and Clinical Excellence (NICE) and the Jordan office of the Medicines Transparency Alliance embarked on a pilot project to design an evidence-based guideline for cost-effective pharmacological treatment of essential hypertension in Jordan. The project's objectives were to directly address a major health problem for Jordan by producing a guideline; and to delineate the strengths and weaknesses of Jordan's healthcare process to allow similar future efforts to be planned more efficiently.
Methods: the pilot spanned a period of approximately 8 months. Activities were overseen by local technical and guideline development teams, as well as experts from NICE. NICE's hypertension guidelines and economic model were used as a starting point. Parameters in the economic model were adjusted according to input and feedback from local experts with regards to Jordanian physician and patient practices, resource costs, and quality of life estimates. The results of the economic model were integrated with the updated available clinical trial literature.
Results: the outputs of the economic model were used to inform recommendations, in the form of a clinical algorithm. A report of the process and the strengths and weaknesses observed was developed, and recommendations for improvements were made.
Conclusions: the pilot represented the start of what is intended to be a healthcare process change for the country of Jordan. Issues emerged which can inform strategies to ensure a more cohesive and comprehensive approach to the cost-effective use of appropriate drugs in managing chronic disease in Jordan and countries operating in a similarly resource-constrained environment. Furthermore, our pilot highlights how richer countries with relevant experience in evidence-informed healthcare policy making can assist others in strengthening their decision-making methods and processes. |
Q:
DataGridView Auto Risizing Cell Font Size
Hi;
I have a datagridview on my project as you see in the sample picture. (Im using Visual Studio 2010). It automaticly resizes the font to fit the text in the cell. For example in the cell 2C, it reduces the font size and fit the "Faik Sozer" in the cell. But in the cell 5B, the text "Zeynep Celeplioğlu" is too long to fit, it doesnt reduce the font size and it writes "Zeynep C..."
I do not want my datagridview to reduce the font size to fit the text in the cell. But i dont know how to cancel that autosize property.
(I mean in the cell 2C, i want it to write "Faik Soz...", instead of resizing)
A:
you can create method to call it whenever you adding data to datagridview or when you load your data like this
private void changefont()//call this method
{
foreach (DataGridViewColumn c in dataGridView1.Columns)
{
c.DefaultCellStyle.Font = new Font("Arial", 22.5F, GraphicsUnit.Pixel);
}
}
|
Project Veggie (a.k.a. Crazy Things I Do For My Kids)
Tag Archives: homemade pizza
One of the best things about overflowing summer produce is the yummy surprises I find in my freezer in the fall. A couple of months ago I had tomatoes coming out my ears and decided to make some mock sun-dried tomatoes in the oven. They were so easy to do, and so delicious. Best of all, they take up a fraction of the space of whole or canned tomatoes, since you can stack them all in a freezer bag and stash them away for later.
Now, you’re probably saying, “fat lot of good this does me in the middle of fall with no garden tomatoes to be found!” Well, on one hand you are right. But on the other hand, this is a great trick to make store-bought tomatoes taste better in the fall and winter. By doing this slow bake, you get rid of the watery, mealy texture of winter tomatoes and bring out all the natural sweetness instead. For extra sweet ones, use the little grape tomatoes! Then use in your favorite pasta, omelet, salad, pizza or whatever!
As with any pizza, feel free to build your own with the ingredients and flavors you like. For this particular pie, instead of sauce I used a simple olive oil and garlic mixture, covered with sun-dried tomatoes. Then top with a scatter of your favorite toppings, some melty mozzarella, and you have a pizza to die for. For a more crispy crust, I recommend using a pizza stone, but if you don’t have one, a parchment lined cookie sheet will do the trick just fine.
Remove your ball of dough from the bag, coat in a bit of olive oil and place in a bowl with a towel over it. Let it come to room temperature and rise a bit (usually about an hour is fine). Preheat oven to 450˚ with pizza stone or pan in the oven. While the oven is preheating, prep all your toppings so you can assemble your pizza quickly.
When oven is preheated, remove the stone. Sprinkle stone with cornmeal and press out your dough into whatever shape you want your pizza to be. Since my stone is round I usually go for some sort of roundish, oblong sort of shape. Drizzle with olive oil and scatter garlic and half the herbs over the dough. Rub all around so it’s got a thin coating all over.
Layer on your toppings. I started with tomatoes to mimic “sauce”, then layered spinach, olives, shallots and then cheese on top. Sprinkle with the other half of the herbs.
Bake at 450 for 15 minutes, or until crust is crunchy on the bottom and cheese is melted and starting to brown just a bit on top. Remove from oven and let sit for 5 minutes. Slice into wedges and serve.
I can’t remember the last time I went out for pizza. There are a few places I like in town, but none are very close to my house, and it usually just seems like too much trouble. I’ve found it’s much easier to make my own, especially if I want a healthy-ish, gourmet-ish sort of pizza.
I threw this together with a few ingredients I had on hand, and the result was a tasty, Mediterranean style pizza that disappeared in the blink of an eye! I read an article recently about ingredients you should never put on pizza, and I think spinach was on the list, but what do they know? I actually really like it on pizza, especially if you cook it at a high enough temp that it gets a little crispy on the edges instead of just wilting. Because nobody likes a soggy pizza. This is a great way to get some extra veggies into the little ones (and the big ones!) without it seeming like rabbit food.
If you have a Trader Joe’s in the vicinity, they make a great fresh pizza dough that you can find in their refrigerated section. It comes in plain or garlic-herb varieties. If you don’t have a TJ’s close to you, you can use any pizza dough that suits you.
Preheat your oven to 450 degrees. If you have a pizza stone, go ahead and preheat that too, otherwise you can use any baking pan. Flatten your dough out with your hands into whatever shape suits you (I usually just make it whatever shape of pan I’m using). Make it as thin or thick as you like.
Spread pesto evenly over crust.
It doesn’t have to be perfect, just try to get a little bit all over it.
Layer pepperoni and spinach.
Pepperoni and spinach. For a vegetarian version simply leave out the pepperoni.
Pile on the other toppings, sprinkling evenly over crust. Finish with a few grinds of black pepper, or if you like it spicy, scatter a bit of crushed red pepper over the top.
My baby brother (one of them) was born when I was 14. Now while that was all very exciting, the part leading up to that was pretty cool too. That was the part where my mom was craving Godfather’s taco pizza and raspberry ripple ice cream. We ate a lot of taco pizza that summer. Ever since that time, I have loved it. These days, I hardly ever see it offered at pizza places, and when I do, it’s just not the same. So, as I am wont to do, when I was having a craving recently I just made up my own. I saw a recipe somewhere where the dressing was drizzled on top and I thought that was a pretty great idea so I copied that idea on mine. Added a nice spicy zip!
If you are lucky enough to have a Trader Joe’s in the vicinity, check out their fresh pizza dough, which you can find in the produce section. Otherwise, use the brand you like best (or make your own).
Preheat oven to 425˚. Line a baking sheet with foil or parchment. Press out pizza dough with your fingers until it’s the thickness you like.
Heat a large skillet over medium heat. Add ground beef and onion and cook until beef is no longer pink. Add beans, garlic, cumin, chili powder and green chiles. Stir and sort of mash the beans into the mixture. Cook until heated through. Set aside.
Mix crushed tomato and minced jalapeno. Spread over pizza crust.
Spread meat mixture over tomato sauce.
Sprinkle shredded cheese over the top of the meat mixture. Bake for 10-15 minutes until crust is browned on the bottom, and crispy around the edges.
Remove from oven and spread lettuce, tomatoes and olives over the top. Whisk together sour cream, lime juice and hot sauce. Drizzle over the top of pizza (you can do this with a spoon or put in a ziplock bag and snip off a corner). Cut into squares and eat up!
I almost forgot to go to Farmer’s Market this weekend. At the last minute, I remembered I had no veggies in my fridge, and if it wasn’t the market, it was a trip to the grocery store instead. I chose the market. I arrived with only a few minutes to spare, in fact some of the vendors were already breaking down their booths. So I embarked on what surely was the quickest, most efficient farmers marketing I have ever done, rushing through and grabbing a few goodies here and there without giving it too much thought. It was actually a lot of fun, and I ended up with an armful of random items that somehow go really well together. Plus I scored a gorgeous flower bouquet, greatly discounted. I’d like to think it was because I was looking especially fetching that day, but truth is, he probably just wanted to go home. Maybe both. 🙂
So for dinner, obviously I couldn’t wait to dip into my treasure trove of goodies. I had a couple things left from my last trip to the market that needed to get used up – some pita bread and Italian salami. Combined with some of fresh goat cheese and freaking amazing tomatoes from this trip, plus some basil from my garden, I had myself a pizza to die for.
Drizzle the pita with a tiny bit of olive oil. Arrange tomatoes over the top to cover the surface. Sprinkle with salt & pepper. Scatter salami and basil over the top and dot with blobs of goat cheese. Add another little drizzle of olive oil.
Building the perfect pizza. You really don’t even need to cook it if you don’t want to.
Broil for 5 minutes or so until the cheese is melty and the crust is browned around the edges. Cut into wedges and eat!
Polenta is one of those ingredients I forget about. That is, until I have some and then I think, “oh yeah, I love this stuff!”. There are two ways I really like it: one is cooked creamy, like rice or grits (although oddly, I don’t like grits), preferably loaded with some sort of creamy cheese. The other way I love it is when it is set up solid, and then fried so it’s a little crispy on the outside.
To fry polenta, you can make it yourself and then cook it in a pan to set up solid, then cut it into pieces and pan-fry it. Or, if you are rather lazy like me, you can buy it pre-made in a tube! Now, usually food in a tube grosses me out, but this stuff is pretty good, without much in the way of added ingredients. Simply remove it from the tube and slice it up into disks. Fry or bake to your heart’s content or use it in whatever recipe strikes your fancy.
In this case, I was in the mood for pizza. But I’m trying to eat more healthy, and also trying to cut down on gluten-heavy foods since they seem to love my hips (and why wouldn’t they?). So the idea for using polenta disks instead of crust was born. Since I had just broken in my new food processor by making the first batch of pesto out of my garden, I decided on pesto instead of red sauce and with a couple of fresh veggies and stretchy cheese…voila! Pizza in a quickie, fairly healthy, bite-size form. Can I just say, I’m somewhat of a genius?
Preheat oven to 400˚. Slice polenta into disks, about 1/2 inch thick. Lay on a baking sheet and drizzle with a bit of olive oil. Sprinkle with salt & pepper. Bake for 10 minutes. Take out of the oven and smear tops with pesto.
Pop back into the oven and bake for 10-15 minutes, until cheese is melted and starting to brown in spots. Remove from oven and let it sit for just a few minutes. If you eat them when they are really hot, you’ll need a fork. If you wait a little bit you can pick them up. Up to you! One tube of polenta yields about 10 mini pizzas.
Right out of the oven. And those crunchy cheese bits on the pan all got eaten too! |
North Korea has successfully developed a miniaturized nuclear warhead that can fit inside one of its intercontinental ballistic missiles, a key step in the rogue regime’s ambition to become a nuclear power, a report on Tuesday said.
The findings were contained in a study by the Defense Intelligence Agency, the Washington Post reported.
“The IC [intelligence community] assesses North Korea has produced nuclear weapons for ballistic missile delivery, to include delivery by ICBM-class missiles,” the newspaper reported, citing an assessment from the DIA completed last month.
That report follows another government study that calculates that North Korean President Kim Jong Un’s regime now controls as many as 60 nuclear weapons.
The findings show that Pyongyang’s efforts to develop a long-range missile capable of carrying a nuclear weapon with enough range to strike the US mainland is progressing more rapidly than experts had predicted, the newspaper said.
In January, President Trump said he wouldn’t allow North Korea to cross the nuclear threshold.
“North Korea just stated that it is in the final stages of developing a nuclear weapon capable of reaching parts of the U.S. It won’t happen!,” he wrote on Twitter on Jan. 2.
\
Since then the White House has flexed its military muscle by dispatching warships to the waters off the Korean peninsula in April and sent two B-1 bombers to fly over South Korea after North Korea’s most recent ICBM launch on July 28 in a show of force.
He has also pressured China, North Korea’s main trading partner, to pressure Kim to corral his weapons programs, but has been frustrated by what he considers their lack of effort.
US Ambassador to the United Nations Nikki Haley in an interview called newly imposed UN sanctions against North Korea a “gut punch” and warned the regime of possible military action if it continues developing weapons.
“What I will tell you from the United States’ perspective, we’re prepared to do whatever it takes to defend ourselves and defend our allies,” Haley told CNN on Sunday.
National Security Adviser H.R. McMaster also said the US could launch a “preventative war” against North Korea.
“If they had nuclear weapons that can threaten the United States, it’s intolerable from the President’s perspective. Of course, we have to provide all options to do that, and that includes a military option,” he said in an interview Saturday on MSNBC.
But military experts say any preemptive strike against Kim could unleash a counter attack that could result in hundreds of thousands of casualties in South Korea, where the US has 30,000 troops stationed.
Secretary of State Rex Tillerson has left the door open for a diplomatic solution, but only if North Korea ceases test firing its missiles.
The United Nations Security Council voted unanimously on Saturday to impose severe economic sanctions on North Korea for launching two intercontinental ballistic missiles in July.
The ban on exports of coal, iron and seafood products was expected to cost Kim’s government about $1 billion a year and is intended to starve the country’s weapon development program.
But North Korea, which has tested 14 rockets this year, appeared unbowed in light of the mounting global pressure.
The regime said it would unleash “thousands-fold” revenge against the US for the sanctions.
“There is no bigger mistake than the United States believing that its land is safe across the ocean,” Kim government warned, according to state-run media.
With wires |
Get the latest NUFC transfer and takeover news straight to your inbox for FREE by signing up to our newsletter Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
DeAndre Yedlin is expected to miss five weeks of action for Newcastle United after a further assessment on a thigh injury.
The right-back has not appeared for Newcastle since the 3-1 win over Huddersfield Town, when he came on as substitute at the John Smith’s Stadium.
United’s backroom team was not too concerned with the problem to begin with - but the muscle tear is worse than first feared.
He was instantly pulled out of the squad for the draw with Reading and he missed the 3-1 defeat at home to Fulham.
Since then Yedlin has returned to the United States for a further assessment. He was left out of the US national team’s squad for games with Panama and Honduras later this month.
However, he is expected to play again for Newcastle this season and also be available for the USA’s Gold Cup campaign this summer.
USA head coach Bruce Arena said today: “DeAndre has been in LA this past week and examined by our team doctors.
“We realise he is not going to be able to go to these next two matches against Honduras and Panama.
“It is likely he will be out for about five weeks.
“I would expect he will be back on the field for Newcastle right at the end of this season in April.”
Video Loading Video Unavailable Click to play Tap to play The video will start in 8 Cancel Play now
It leaves Newcastle with Vurnon Anita and Jesus Gamez challenging for the right-back slot.
Rafa Benitez said earlier this week: “We have Anita and Jesus fighting for that position. That is always positive for the team.
“It is good for us because Anita has been doing well.
“Jesus also played well the other day. His match fitness is something he needs to improve. The only way to do that is by playing games.
“We will see but I will say the competition for places is really good.” |
Yankee Stores
Yankee Stores was an American discount department store chain begun in Flint, Michigan. Partners Joseph Megdell and Wilbert Roberts
opened their first store in 1948 to sell military surplus under the name U.S. Surplus. By 1964, it had become a discount chain with 21 stores throughout southeastern Michigan, primarily around Flint. Many of its locations were paired with local supermarket chain Hamady Brothers. Some larger stores, including those in Lansing and Bay City, were called Yankee Stadium.
Megdell and Roberts sold the chain to Borman Foods, then-parent of Farmer Jack supermarkets, in 1965. Borman unsuccessfully expanded the chain into Metro Detroit, closing those stores by 1971. Many of the Detroit stores were sold to Shoppers Fair. In 1972, Borman sold the Yankee chain to California-based Zody's. Zody's closed its Michigan operations in 1974 as part of the chain's bankruptcy proceedings.
References
Category:Defunct discount stores of the United States
Category:Defunct companies based in Michigan
Category:Companies based in Genesee County, Michigan
Category:Retail companies established in 1948
Category:Companies disestablished in 1972
Category:1948 establishments in Michigan
Category:1972 disestablishments in Michigan |
How to Install DIY Radiant Floor Heating
Description
Use a specialized foam panel called Bekotec to lock the PEX tubing in place, cover it with a sand-and-cement mix, and tile away. (See below for a shopping list, tools, and steps.)
Click here to SUBSCRIBE to the official This Old House YouTube channel: http://www.youtube.com/subscription_center?add_user=thisoldhouse
Radiant floor heating is probably the best way to heat up any space. It's comfortable, quiet, and energy efficient. Although electric radiant heat is a popular choice for small projects, retiling a bathroom, say, hydronic, or water-based, radiant provides the ultimate in efficiency for bigger projects or an extensive remodel.
If you want to DIY hydronic radiant, you can use a specially engineered foam panel from Schluter Systems called Bekotec. You lay the panels directly on the floor, press-fit PEX tubing into them, and add a thin layer of specially mixed concrete, five parts sand to one part portland cement.
The panels provide a modest thermal break (R3), so you don't have to install an extra layer of insulation. Using this system adds less than 1 3/4 inches, including concrete, versus about 4 inches for the old-school method of tying tubing to wire mesh. That leaves you more headroom in basement applications. And the thin slab will heat up and cool down more quickly, allowing you to use lower water temperatures and save on your heating bill. Overall, it makes for a more responsive radiant slab.
Steps for How to Install DIY Radiant Floor Heating:
1. Prep floor with leveling compound, if necessary.
2. Clean floor and install foam edging.
3. Lay first row of click-together panels.
4. Measure and trim the row's last panel to fit.
5. Cover the remaining area with panels.
6. Determine PEX spacing: 6-, 9-, or 12-inch rows.
7. Press-fit PEX between "studs" in panels.
8. Cover area with one continuous loop of PEX.
9. Leave extra tubing at boiler-room end for plumber to make connections.
10. Mix up a batch of "dry pack" concrete with a 5:1 ratio of sand to portland cement.
11. Spread and level over PEX, leaving a minimum of 5/16 inch of material above foam "studs."
12. Allow concrete to cure for a few days, then install your flooring of choice. |
Tag Archives: geekdad
The gaming industry, like the voiceover industry or the genre fiction industry is not very big, when you really get down to it. In fact, among creators, the overlap between "industry" and "community" makes almost a perfect circle. Everyone pretty much knows everyone else, and good news travels as quickly as bad.
Yesterday, one of the truly great people in the gaming industry, who I think we all believed had reached maximum character level, surprised us all and leveled up a little bit more:
If you know of Dork Tower, then you’re already squee-ing in excitement right alongside us. If you don’t know what Dork Tower is, then either you’re about to add a new layer of happiness to the Photoshop composite of your life, or you’re slowly beginning to realize you didn’t click through to the Monkey Bites blog.
Dork Tower has, in its decade of life, existed as a standalone comic book, a featured comic in Dragon, Scrye and Games magazines, and one of the earliest regular webcomics online. Its creator, John Kovalic, is also the illustrator and co-creator of world-renown games Munchkin and Apples to Apples. But perhaps his greatest creation is his new daughter, whose existence has transformed him from a simple, Bruce Banner–like comics and game illustrator, into a hulking green(bay) GeekDad. Which is where we come in.
This is kind of like my favorite indie television show getting picked up by a major network. It's such a perfect match, I can't believe nobody ever thought of it before. You know those people who are so delighted to be a parent, they sort of jingle and glow and levitate off the ground with joy when they talk about their kids? That's John. You know those guys who you know you can speak to in the most obscure geek dialect, secure in the knowledge that they'll grok you? That's John.
Congratulations to John and GeekDad, and to all their individual readers who are about to discover an awesome new level of the dungeon to explore. |
<?php
/*
* Copyright 2007-2017 Charles du Jeu - Abstrium SAS <team (at) pyd.io>
* This file is part of Pydio.
*
* Pydio is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Pydio is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with Pydio. If not, see <http://www.gnu.org/licenses/>.
*
* The latest code can be found at <https://pydio.com>.
*/
$mess=array(
"Flash uploader" => "Flash",
"Legacy flash uploader, used when the browser does not support HTML5. If you want to force the usage of this uploader, deactivate the uploader.html, and remove the activeCondition tag from the uploader.flex manifest file." => "Legacy flash uploader, se usa cuando el navegador no soporta HTML5. Si quieres forzar el uso de este uploader, desactiva el uploader.html y elimina el tag activeCondition del archivo uploader.flex.",
"Miscalleneous" => "Miscelánea",
"HTTPS Policy" => "HTTPS Policy",
"An Https Policy file maybe used to solve Flash upload problems when in Https. Use path relative to the web root." => "Un archivo HTTPS Policy puede ser usado para solventar problemas con Flash Uploader cuando se usa HTTPS. Usa la ruta relativa al directorio raiz de la web.",
);
|
The present disclosure is directed generally to micromachined devices, and in a particular embodiment, to a micromachined rotary actuator capable of being used to precisely position a transducer head within a disk drive.
Various micro-actuation techniques such as electrostatic, thermal, piezoelectric, or magnetic have been demonstrated. Some of the early electrothermal actuator designs are based on the bimorph effect, which relies on the difference of thermal expansion coefficients between two adjacent layers on the device. By heating these layers, a bending moment is created. However such actuators typically produce deflection in the direction normal to the substrate.
U.S. Patent Publication No. 2007/0103029 entitled Self-Assembling MEMS Devices Having Thermal Actuation is directed to a method for designing MEMS micro-movers, particularly suited for, but not limited to, CMOS fabrication techniques, that are capable of large lateral displacement for tuning capacitors, fabricating capacitors, self-assembly of small gaps in CMOS processes, fabricating latching structures, and other applications where lateral micro-positioning on the order of up to 10 μm, or greater, is desired. In self-assembly, motion is induced in specific beams by designing a lateral effective residual stress gradient within the beams. The lateral residual stress gradient arises from purposefully offsetting certain layers of one material versus another material. For example, lower metal layers may be side by side with dielectric layers, both of which are positioned beneath a top metal layer of a CMOS-MEMS beam. In electro-thermal actuation, motion is induced in specific beams by designing a lateral gradient of temperature coefficient of expansion (TCE) within the beams. The lateral TCE gradient is achieved in the same manner as with self-assembly, by purposefully offsetting the lower metal layers with layers of dielectric with respect to the top metal layer of a CMOS-MEMS beam. A heater resistor, usually made from a CMOS polysilicon layer, is embedded into the beam or into an adjacent assembly to heat the beam. When heated, the TCE gradient will cause a stress gradient in the beam, resulting in the electro-thermal actuation.
Turning now to a specific application, the servo system of a disk drive has two primary operations, namely track seek and track follow. Track seek is the operation of moving the head (containing the read transducer and the write transducer) from one data track to another, during which the voice coil motor (VCM) actuator may rotate through its full stroke of 20 to 30 degrees, if one track is at the inner diameter and the other track is at the outer diameter of the disk. After the completion of a track seek, the track follow operation maintains the read or write transducer close to the center of the data track. Challenges to keeping the transducer at the data track center include repeatable and non-repeatable runout of the data track, shock and vibration disturbances, windage disturbances (aerodynamic drag forces arising from laminar and turbulent air flow), and noise in the feedback measurements and electronics.
Head skew is the phenomenon where the longitudinal axis of a read/write head on a disk drive and the tangent of the data track, which the head is reading or writing, are not parallel. That is, the angle between the data track and the head axis is not zero. Head skew degrades the performance of recording in disk drives and is particularly troublesome for disk drives employing perpendicular recording technology, where long narrow poles are desired but cannot be used because they write tracks that are too wide when skewed. Due to curvature of the track the magnitude of the skew is generally less than one-half of the full stroke of the VCM, but can be on the order of 10 degrees.
FIG. 1 illustrates how head skew can be undesirable, particularly in perpendicular recording where head skew results in a wider track width than if the skew were always zero. Shown in FIG. 1A is the position of the head as it would occur at the inner diameter (ID) of the track. Shown in FIG. 1B is the position of the head as it would occur at the middle diameter (MD) of the track and in FIG. 1C as it would occur in the outer diameter (OD) of the track. The need exists for a method and apparatus for eliminating or reducing head skew in disk drives. |
At NextPakk, we’re transforming last-mile logistics through a scalable sharing economy built on blockchain. Blockchain and sharing economy, each disruptive on their own, were combined to create a decentralized platform for consumer-scheduled evening delivery, 7 days/ week. Creating a marketplace of online shoppers, local businesses for package delivery points (PDPs), and local last-mile delivery drivers that gives consumers convenience, control, and choice over their delivery. Pakka blockchain will be the backbone of the DApps built to conduct logistics business and last-mile services, using the Pakka tokens as payment and or collateral for packages, while changing hands from pick up until delivery. |
Trade News
Each day TFO Canada publishes a sample of trade news on the Canadian import market along with any new, updated or changed regulations and legislations regarding international trade; countries in which TFO Canada offers services and on the export sectors which it promotes.
ADB: Indonesia抯 Economic Growth Slows in 2014; Accelerates in 2015
A new Asian Development Bank (ADB) report says that the Indonesian economy is expected to slow on weak export performance in 2014 before picking up in 2015 as external demand improves and the new government’s reform agenda takes hold. In an update of its Asian Development Outlook 2014, the ADB trimmed its forecast for 2014 growth in Indonesian gross domestic product (GDP) to 5.3 percent from 5.7 percent expected in April. The ADB expects a growth pace of 5.8 percent in 2015, down from 6.0 percent in April.
“Growth has been constrained this year by tighter monetary conditions and the ban on unprocessed mineral ores that dented exports,” said ADB’s Deputy Country Director for Indonesia, Edimon Ginting, in launching the report. “But major planned reforms to further improve the investment climate, boost the efficiency of the bureaucracy and accelerate infrastructure development, could improve growth prospects going forward.”
Indonesia’s GDP growth slowed to 5.2 percent in the first half of 2014, the slowest pace since 2009, after the central bank (Bank Indonesia) raised interest rates last year to restrain domestic demand and rein in inflation and the current account deficit. The slowdown has been sharper than anticipated, due to weak exports as several major export markets grew less quickly than expected.
Merchandise exports fell 2.3 percent in US dollar terms in the first half, weighed down by subdued demand and soft prices for export commodities including coal and rubber. Merchandise imports fell 4.4 percent, led by raw materials and capital goods. The trade surplus nearly tripled in the first half from a year earlier to USD $2.9 billion. Deficits in services trade and in the income account produced a current account deficit of USD $13.3 billion, equal to 3.1 percent of GDP.
Private consumption, which accounts for almost 60 percent of GDP, grew a robust 5.6 percent in the first half of 2014 and made the biggest contribution to GDP growth from the demand side. Consumption received a boost from election-related spending. Decelerating inflation and good harvests supported consumer confidence and farmers’ incomes, but tighter credit hurt sales of consumer durables such as automobiles.
Foreign direct investment was relatively buoyant at USD $10.5 billion, and portfolio investment inflows rose sharply to USD $16.8 billion in the first half. Foreign investors increased their holdings of government bonds by USD $7.3 billion in the January to August period. These large inflows more than offset the current account deficit to keep the balance of payments in surplus. The Indonesian rupiah appreciated by 4.1 percent against the US dollar in the first eight months of 2014, after depreciating 19.5 percent in 2013.
The growth outlook for 2014 and 2015 assumes the new government, which takes office in October 2014, will implement the major policies outlined during the elections: improving the investment climate, reforming the bureaucracy, and accelerating infrastructure development. The 0.5 percent uptick expected in 2015 will be driven by a stronger outlook for the major industrial economies, which should spur exports and investment.
Growth in private consumption is projected to remain robust. Lower inflation is supporting consumption this year, and the government is expected to use cash transfers to compensate low-income groups for higher fuel prices in 2015.
Private investment is seen improving over the forecast period, benefiting from the successful national elections and expectations that the new government will implement reforms. Growth in investment loans remains high at 30 percent despite tighter monetary policy.
Inflation is seen averaging 4.2 percent in the second half of this year and will likely average 5.8 percent for the full year, slightly higher than expected due to additional increases in electricity tariffs and likely upward pressure on food prices from the anticipated dry weather late in 2014. Inflation is projected to increase temporarily to average 6.9 percent in 2015, assuming the government increases fuel prices by 30 to 50 percent.
Meanwhile, the ADB trimmed its economic growth forecast for Southeast Asia in 2014 on political turmoil in Thailand (earlier in the year) and weaker commodity export prices in Indonesia. The institution expects Southeast Asia to grow 4.6 percent this year, down slightly from its previous forecasts in in July (4.7 percent), and April (5.0 percent). Economic growth forecasts for Thailand, the Philippines, Vietnam and Singapore have been trimmed, while growth forecast for Malaysia has been raised. |
Primary acute renal failure ("acute tubular necrosis") in the transplanted kidney: morphology and pathogenesis.
"Acute tubular necrosis" (ATN) in the transplanted kidney, when properly differentiated from other causes of acute renal failure, appears to be a relatively benign condition. It has been widely assumed to be pathologically identical to ATN in the native kidney, but its histopathologic features have not been studied in detail. Because immunosuppressive therapy with cyclosporine adds an additional layer of complexity to the morphologic changes observed, in the present study we have confined our observations to patients immunosuppressed with steroids and azathioprine. Thirteen renal allograft biopsies from patients with ATN and 5 biopsies from patients with normal allograft function were compared with the previously obtained series of 57 native kidney ATN biopsies and 20 control biopsies. Both qualitative and quantitative differences between transplant and native kidney ATN were found. Compared with native kidney ATN, transplant ATN showed significantly less thinning and absence of proximal tubular brush border and less variation in size and shape of cells in individual tubular cross-sections. There were also significantly fewer casts and less dilatation of Bowman's space and a significantly greater number of polarizable crystals presumed to be oxalate in transplant ATN. In native kidney ATN the tubular injury sites were mostly characterized by desquamation of individual epithelial cells leaving areas of bare basement membrane (the "non-replacement" phenomenon). In transplant ATN, sites of tubular injury, although rare and affecting only short tubular segments, were characterized by the actual presence of identifiable necrotic tubular cells, a finding seldom seen in native kidney ATN. There also was a greater interstitial infiltrate of mononuclear inflammatory cells in transplant ATN compared to native kidney ATN. Electron microscopic studies of 9 transplant ATN biopsies showed a mild reduction in proximal tubular brush border compared with controls but this alteration was significantly less than that observed in native kidney ATN. There was no significant alteration in proximal or distal basolateral infoldings and this contrasted sharply with the marked reduction in basolateral infoldings of the plasma membrane observed in native kidney ATN. Disintegrated necrotic cells were found by electron microscopy in transplant ATN whereas these were not observed in native kidney ATN. There were significantly more cells with apoptosis (shrinkage necrosis) in transplant ATN than in native kidney ATN. There were significantly more cells with apoptosis (shrinkage necrosis) in transplant ATN than in native kidney ATN. On the other hand, there were significantly greater numbers of "non-replacement" sites in the distal tubules in native kidney ATN compared to transplant ATN.(ABSTRACT TRUNCATED AT 400 WORDS) |
Q:
Need help understanding the logical structure behind solving an equation?
Suppose I have an equation $f(x) = 0$, and I know the solution exists. The solution is $x = a$ (I don't know the actual solution to begin with, I just know it exists). I perform a series of $irreversible$ operations and arrive at the answer:
$f(x) = 0 \implies \cdots = \cdots \implies \cdots = \cdots \implies x = a$
which is just a big $f(x) = 0 \implies x = a$.
Since the operations are irreversible, we cannot go in the other direction and claim $ x = a \implies f(x) = 0$
Nevertheless, we know that the solution is $a$, so if we plug in $a$ into $f$ we get zero. But hold on a minute, the statement "if we plug in $a$ into $f$ we get zero" really means $x = a \implies f(x) = 0$; we just went in the other direction, which is something we said we couldn't do!
What is wrong here? Does the fact that $f(x) = a$ has a solution imply that there must be a reversible series of steps between $f(x) = a$ and $x = a$?
Edit: A condensed version
1) We know $f(x) = 0$ has a solution.
2) We can prove $f(x) = 0 \implies x = a$ using irreversible steps.
3) Now that we computed what $a$ actually is, by 1) we know that $x = a \implies f(x) = 0$ is true. Does it follow now that there exists another method to solve the equation using purely reversible steps?
A:
This is impossible to answer in any rigorous way without having a precise definition of the sort of "steps" you want to consider. But basically, the answer is no.
It happens all the time in math that we can separately prove $P\Rightarrow Q$ and $Q\Rightarrow P$, but there is no direct way to prove $P\Leftrightarrow Q$ in both directions at once. So there is no reason to expect that just because you can prove both $f(x)=0\Rightarrow x=a$ and $x=a\Rightarrow f(x)=0$, you can prove $f(x)=0\Leftrightarrow x=a$ by a series of reversible steps. After all, any mathematical statement at all can be encoded in equations like this by defining your function $f$ appropriately.
|
ALQOSH, Iraq,— A large demonstration was held on Thursday in the Assyrian town of Alqosh, situated in Iraq’s Nineveh Plains, to protest the ouster of the Assyrian mayor, Fayez Abed Jawahreh, who was voted into office in 2014.
Mayor Jawahreh has faced several Kurdish-led attempts to unseat him. The decision to depose him was taken on July 16 by Bashar Al Kekee, the head of the Nineveh Province Council and a member of the Kurdish KDP party, led by Massoud Barzani. Alqosh will now be administered by a Kurd, Adel Amin Omar, who is a member of the Kurdistan Democratic Party.
Al Kekee accused Jawahreh of corruption and misusing the public office but did not present any evidence to support his claim. Furthermore, he took the decision without consulting the rest of the provincial council, according to sources on the ground. The decision has been appealed to a federal Iraqi judge on the basis of violation of council procedures.
Many see the move as part of a Kurdish plan to include areas outside of Iraq’s Kurdistan Regional Government (KRG) in the independence referendum announced by Kurdish political parties, scheduled for September 25.
The district of Alqosh borders the Kurdish region but is under the jurisdiction of the central government of Iraq. Most of its inhabitants are Assyrians, with a smaller percentage of Yazidis.
The district forms the northern part of the wider Nineveh Plains region, which Kurdish leaders openly seek to annex to the the Kurdish region.
After the news of the removal of the Assyrian mayor spread on social media Assyrians held simultaneous protests in Alqosh and outside the KRG office in Stockholm.
The Kurdistan Region’s political parties, not including the second biggest party of Change (Gorran) Movement and the Kurdistan Islamic Group (KIG), came to an agreement on June 7 to hold a referendum on the region’s independence on September 25, 2017.
The decision was slammed by Iraq, US, UK, EU, Russia, Germany, Turkey and Iran.
Read more about Independent Kurdistan state
Copyright ©, respective author or news agency, aina.org | Ekurd.net
Comments
Comments |
Chopped Liver – Night Nurse
Day One of my freedom following yesterday’s Great Escape. Y’know, it seems to be harder than I thought to convey intonation and variances of pitch in the one-dimensional world of written script.
I was very proud of my post yesterday – with all the “doo doo, doo doo doo doo doo” – and in my endeavours to point the reader in the direction I was facing, I even called the Post The Great Escape. But so far, everyone I have spoken to has words to the effect of – great you’re home but what was all that doo doo doo nonsense in your blog?
They just didn’t get my attempt at playing The Great Escape theme tune under the text – and that makes me so mad. Y’know it makes me wanna climb back over that wall and stay where I am more appreciated!
Not really.
But what did freak me out today was around mid-morning when I noticed that my wound dressing had come completely away. This is not good. In fact it’s bad.
I phone the hospital, they said to contact my GP to get a District Nurse sent out. This I did, and they faxed at around midday.
I spent all afternoon worrying about this open gaping wound preparing itself for some juicy infection to seriously impact my progress.
You gotta understand, for most people, well, all people, having an open wound is open to infection – but for me, as I am taking heavy doses of immuno-suppressant drugs, I actually dont have the power to fight off any infection at all – I need to be very careful. Lying around in one’s front room with an exposed gaping is not the textbook way to do this.
I got a phone call at 6pm from the District Nurse saying someone will be out in the morning. I said I cant wait. She said well, we are on weekend now is it urgent? I said you bet it is. Ok, I’ll come now.
The very nice woman came at 7:15 and took one look at me wound and practically shrieked – Oh thank goodness I came – this has to be attended to immediately.
I think I may have got away with it, you know – but I’ll never know how lucky I may have been.
5 Comments on “Chopped Liver – Night Nurse”
I’m glad you got that one sorted, it is alarming when it happens. When mine needed changing I eventually got the Districy Nurse to do it and likewise when she eventually saw it she was glad I called. I was a bit more prepared as the hospital gave me some dressings before i was free’d. So I was able to change my own but my drain wounds were leaking quite a lot.
Anyway I am in my bed on my laptop just about to get up and celebrate my freedom.
hi david:
i really appreciate what you have gone through,but i dont think it is appropriate to attack who,s really looking aftar you.
the mean concern for the doctors and nurses is your health.they dont want you to go out in this wild community with bad tests and in general bad condition.
you should be ashamed of your self to mention other patients in your blog,i am sure you were in the same situation.
so get agrip of your self and stop it man.
i hope you feeling better now.
hi turab ( apologies if that’s not your first name), firstly let me say thank you for reading my blog and taking the time to comment. However I cannot accept the criticism you level against me nor feel ashamed at any of my words or actions and am somewhat at a loss to see how you could have arrived at such a conclusion.
Let me state categorically and uneqivably that I have nothing but the highest admiration and gratitude for the doctors, the nursing staff, the transplant coordinators and the vast number of people who have given me the best care possible.
Let me also state that many of the docs and nursing staff regularly read my blog and I would never write anything to compromise their position.
And finally I have not mentioned any other patient by name but in the interests of keeping my writings both informative and entertaining I have recounted some events from the ward and how they affected me.
Oh, and I have now had the pleasure of two home visits from District Nurses and they have been most helpful and caring. I have been and still am in great hands.
I totally agree with David’s reply, he has not mentioned any other patients by name, and like me although we have our little quips about certain aspects of hospital life they are not there to cause offense or to undermine the great service we all receive. We all know that without these very talented people we would now be dead or at least very sick. |
Munchak taking more active OL role
Saying Munch is way in over his head is ridiculous. Sure there is a learning curve but Munch is no dummy. He inherited a crappy team (with personnel that didn't match what they were trying to do) which now has a nice blend of vets and young guys with some talent finally that better fit the scheme. Belichick wasn't any beter in his first few years.
He inherited a crappy team (with personnel that didn't match what they were trying to do)
They didn't know what they wanted to do, especially on defense.
Year one: "We want big guys who can stop the run." Well that didn't work since we ranked 24th in the league.
Year two: "We want smaller guys who can rush the passer." Not so much, as the pass rush was nonexistent unless they were playing the Jags. Hell, they wasted a season and a half of Akeem Ayers' career by not turning him loose to get the QB.
This year's new thing is playing press. Hopefully it works out better than the last two.
You can be in over your head with an assignment/job, and not be a dummy. We've chagned schemes offensively, from a pass happy, down the field, air it out with a questionably accurate rookie QB with a terrible o-line. To now, not doing that, because it was a disaster. The offensive scheme is whatever the OC says it is, Munch has no scheme, has no idea what he wants to run, and only has a clue as to how to use these players when someone tells him how to use these players. And now defensively, we're trying something totally different.....significantly changing your schemes on both sides of the ball with the same HC (in his third year) is not a credit to Munchak's coaching abilities...it's because he got it wrong, that we are now overhauling everything.
He left it up to Chris Palmer and Jerry Gray over the past two years, it didn't work. To his credit, he realizes he's in over his head, and brought in Greg Williams. Ruston knows this as well and has gone on a spending spree, the only thing they can do to cover up Munch.
As far as the two Belichick references in this thread go, the guy is terribly overrated. I look forward to Tom Brady retiring in a couple of years and The Cheater being exposed for the fraud that he is.
Bringing in 5 new OL guys shows what this staff thought of last year's OL (rightfully so).
I don't think Munchak is in over his head. I think this is a rebuilding process in year three that should see vast improvements. Don't forget 9-7 with a bad staff/old QB. Last year was bad at 6-10 but it was also a learning curve.
Why advertise on goTitans.com?
With 4,000+ members and over 1 million posts, goTitans.com is the place for Tennessee Titans fans to talk Titans. Have those diehard fans see your logo scroll across the bottom of every page of the site linked to your website by becoming a sponsor. Click here for details.
The Tip Jar
For those of you interested in helping the cause, we offer The Tip Jar. For $2 a month, you can become a subscriber and enjoy goTitans.com without ads. |
---
author:
- 'SimonP.Goodwin$^1$, D.Nutter$^2$, P.Kroupa$^3$, D.Ward-Thompson$^2$'
- 'A.P.Whitworth$^2$'
title: The relationship between the prestellar core mass function and the stellar initial mass function
---
Introduction
============
The origin of the stellar initial mass function (IMF) is one of the outstanding unsolved problems in astrophysics. As stars form in dense molecular cores (see e.g. Ward-Thompson et al. 1994; Kirk et al. 2005; Ward-Thompson et al. 2007), it might well be expected that the IMF is related to the mass function of those cores (the CMF). This idea is supported by observations of prestellar cores, which show that their mass functions are often similar to the IMF of Galactic field stars (Motte et al. 1998; Testi & Sargent 1998; Johnstone et al. 2000; Johnstone et al. 2001; Motte et al. 2001; Johnstone & Bally 2006; Alves et al. 2007; Young et al. 2006; Nutter & Ward-Thompson 2007; Simpson et al. 2007). Further support is given by the observation that Taurus may have both an unusual CMF (Onishi et al. 2002) and an unusual IMF (Luhman 2004; see also Goodwin et al. 2004c), although Kroupa et al. (2003) show that the IMF in Taurus may be compatible with the field IMF.
However, the relationship between the CMF and the IMF cannot be simple, as many, if not the vast majority, of stars form in binaries or higher-order multiple systems (see Goodwin & Kroupa 2005; Duchêne et al. 2007 and Goodwin et al. 2007 and references therein; see also Clark et al. 2007). Observations suggest that the binary frequency amongst young stars is higher than in the field (see Goodwin et al. 2007 and references therein) implying that binaries are destroyed by dynamical interactions in clusters (see Kroupa 1995a,b). However, Lada (2006) has argued that most M-dwarfs form as single stars, since the [*field*]{} M-dwarf binary fraction is relatively low and there is no need to invoke dynamical destruction of low-mass binaries to form these (single) stars. The opposing view is argued by Goodwin & Kroupa (2005) and Goodwin & Whitworth (2007).
If stars (or at least relatively high-mass stars) usually form in small-$N$ multiples then there cannot be a trivial one-to-one relationship between the IMF to the CMF. Firstly, the mass of a core is distributed between a number of stars. Secondly, some stars are expected to be ejected at an early age from small-$N$ multiples (e.g. Reipurth & Clarke 2001; Goodwin et al. 2007 and references therein; see also Section 3). Thirdly, many binary systems are expected to be destroyed in clusters (Kroupa 1995a,b; Kroupa et al. 2003; Goodwin & Whitworth 2007; also see Goodwin et al. 2007 and references therein). Thus the CMF should relate most closely to the initial [*system*]{} mass function which, in turn, is modified by dynamical effects to produce a mixture of single and multiple systems.
In this paper we examine the relationship between the IMF and the CMF, in particular we use the new results for the CMF in Orion from Nutter & Ward-Thompson (2007). In Section 2 we review observations of the CMF, in Section 3 we present our general method, and in Section 4 we compare the IMFs we produce with the observations.
Observations of the CMF
=======================
The first observational link between the IMF and the CMF was made by Motte et al. (1998) in a millimetre study of the $\rho$-Ophiuchi molecular cloud. They found that the high-mass slope of the CMF matched that of the IMF. This result has been confirmed for Ophiuchus (Johnstone et al. 2000; Young et al. 2006; Simpson et al. 2007) and a number of other nearby clouds, including Orion (Motte et al. 2001; Johnstone et al. 2001; Johnstone & Bally 2006; Nutter & Ward-Thompson 2007), the Pipe Nebula (Alves et al. 2007), and Taurus (Onishi et al. 2002; however see Goodwin et al. 2004c), as well as for more distant massive star-forming regions such as NGC 7538 and M17 (Reid & Wilson 2006a,b).
While the slope of the CMF seems to be consistent from region to region, the position of the peak of the CMF appears to shift from $\sim\! 0.1~M_\odot$ in nearby low-mass regions such as $\rho$-Ophiuchus (e.g. Motte et al. 1998), to a higher mass of $\sim\! 1~M_\odot$ in more distant and massive star-forming regions such as Orion (e.g. Nutter & Ward-Thompson 2007). Very massive star-forming regions such as M17 show a flattening of the CMF at an even higher mass of $\sim\!
8~M_\odot$ (Reid & Wilson 2006a,b), though the data are incomplete before a turn-over is seen. Whether this is an intrinsic effect where the mass of the peak in the CMF is related to the mass of the stars being formed, or an observational effect caused by the blending of multiple sources at larger distances, is not yet known.
The relationship between core and stellar mass functions
========================================================
We assume that the star formation properties of a core may be described by three basic parameters: the mass of the core $M_C$, the efficiency with which the core turns gas into star(s) $\epsilon$ (so that the total mass of stars is $\epsilon M_C$), and the number of stars formed within a core $N_*$ (the choices of $N_*$ are discussed in section 4). We note that $\epsilon$ and $N_*$ may well be functions of $M_C$.
There are then two basic distribution functions of the stars. The multiple system mass function (MSMF) is the mass distribution of the multiple systems produced by cores. The single star mass function (SSMF) is the mass distribution of all of the [*individual*]{} stars formed in all of the single and multiple systems in all of the cores. It is the SSMF that will correspond to the (binary corrected) initial mass function (IMF; see below).
Note that the MSMF will evolve due to several effects. Firstly, unstable high-order multiple systems may decay, preferentially ejecting single, low-mass stars (e.g. Reipurth & Clarke 2001; Bate et al. 2002, 2003; Sterzik & Durisen 2003; Goodwin et al. 2004a,b; Delgado Donate et al. 2004a,b; Hubber & Whitworth 2005; Umbriet et al. 2005). Secondly, binaries may be ‘destroyed’ by rather violent close binary-binary/binary-single interactions (Kroupa 1995a,b), and thirdly, wide, low-mass binaries may be ‘disrupted’ by more gentle impulses from passing stars (Goodwin & Whitworth 2007).
From a CMF to an IMF
--------------------
The procedure for generating an IMF (via a MSMF and SSMF) from a CMF is very simple. We randomly sample a core mass from a CMF (see Section 3.3 for our choice of CMF). This core then produces $N_*$ stars of [*total*]{} mass $\epsilon M_C$ (this is similar to the approach of Sterzik et al. 2001, however we do not constrain the IMF of the stars in any way except through the CMF of the cores).
The masses of the $N_*$ components in a multiple system are chosen randomly. In a binary system ($N_*=2$), the masses of the primary and secondary are selected from a flat mass ratio distribution (ie. one random number U$[0,1]$). In a higher-order multiple the masses are distributed randomly, ie. $N_*$ random numbers U$[0,1]$ are chosen and then the sum is normalised to unity to provide the mass distribution.
The SFE, $\epsilon$, is chosen to provide the best fit to the canonical IMF (see below) and is assumed to be constant for all cores. It might be thought that SFE should depend on the mass of stars formed, as feedback energy increases with increasing stellar mass. However, the potential well from which gas must be removed by feedback also increases with increasing stellar and gas mass and so possibly the SFE is constant, or even increasing with mass. Given the uncertainties involved we make the simplest assumption possible that the SFE is constant. As will be seen, a good fit to the IMF can be obtained while making this assumption and there appears no need to appeal to a variation of SFE between cores of different masses.
The canonical observed IMF
--------------------------
We assume that the actual underlying IMF of stars has the canonical form (Kroupa 2002; see also Kroupa 2007)
$$N(M) \propto \left\{
\begin{array}{ll}
M^{-\alpha_1} & \,\,\,\, M_0 \leq M \leq M_1 \\
\left( \frac{M_1^{-\alpha_1}}{M_1^{-\alpha_2}} \right) M^{-\alpha_2} & \,\,\,\, M_1 \leq M \leq M_2 \\
\left( \frac{M_1^{-\alpha_1}}{M_1^{-\alpha_2}} \right) \left(
\frac{M_2^{-\alpha_2}}{M_2^{-\alpha_3}} \right) M^{-\alpha_3} & \,\,\,\, M_2 \leq M \leq M_3 \\
\end{array} \right.
\label{eqn:imf}$$
with $\alpha_1 = 0.3$, $\alpha_2 = 1.3$ and $\alpha_3 = 2.3$ as the slopes, and $M_0 = 0.02 M_\odot$, $M_1 = 0.08 M_\odot$, $M_2 = 0.5 M_\odot$ and $M_3 = 10 M_\odot$ as the masses of the limits and turning points of the IMF. This form of the IMF matches well other recent determinations of the IMF (e.g. Chabrier 2003).
The canonical IMF is corrected for the presence of unresolved binary systems and therefore the IMF should follow the SSMF.
Forms of the CMF
----------------
Our standard CMF is that determined for Orion by Nutter & Ward-Thompson (2007). We model this as a log-normal with dispersion $\sigma_{{\rm log}_{10} M} = 0.55$ and a mean of $\mu_{{\rm log}_{10}
M} = 0.05$ as illustrated in Fig. \[fig:cmffit\]. This CMF is not too dissimilar to an IMF-like distribution with the slopes $\alpha$ remaining the same, but turn-over masses of $\sim\! 8$ times those in the canonical IMF (eqn. \[eqn:imf\]). We also note that this is very similar to the CMF of the Pipe dark cloud (Alves et al. 2007).
Our fit to the Nutter & Ward-Thompson (2007) CMF is above the final two points which are below the completeness limit. We assume that the [*entire*]{} core mass distribution is modelled by a log-normal which would be expected on theoretical grounds (Padoan & Nordlund 2002,2004; Klessen & Burkert 2000; Klessen 2001; Li et al. 2003; Jappsen et al. 2005) even in a wide variety of physical conditions (see esp. Padoan & Nordlund 2002; Jappsen et al. 2005). We also note that Padoan & Nordlund (2002,2004) tend to find a very steep decline in the CMF below the peak which would be compatible with these observations.
Clark et al. (2007) recently noted that the free-fall times of clumps of different masses are different and that low-mass cores collapse significantly faster than higher-mass cores. Thus an observed CMF must be constantly replenished with low-mass cores in order to retain a constant form. We assume that our CMF represents a ‘snapshot’ of the CMF. If star formation occurs rapidly in clusters (in $<1$ Myr, e.g. Elmegreen 2000) then the observed CMF should represent the total CMF for masses above the peak of the CMF as the free-fall time for cores $> 1 M_\odot$ is a significant fraction of the cluster formation timescale (Clark et al. 2007, see their fig. 1).
Results
=======
The fully multiple model
------------------------
Goodwin & Kroupa (2005) suggested that the observed properties of multiple systems could be reproduced if each core produces 2 or 3 stars. Single field stars are then produced by the dynamical decay and destruction of multiple systems in young clusters (Kroupa 1995a,b; Goodwin & Kroupa 2005; Goodwin & Whitworth 2007; Goodwin et al. 2007 and references therein).
To model the fully multiple scenario we assume that cores of mass $\epsilon M_C < 0.75 M_\odot$ form entirely binary systems, and cores with $\epsilon M_C \ge 0.75 M_\odot$ form multiple systems with a ratio of $3\!:\!1$ binaries-to-triples. The SFE is chosen to give a good fit to the canonical IMF with $\epsilon = 0.27$.
In this scenario the [*initial*]{} multiplicity fraction is unity. Single stars and brown dwarfs are produced by the destruction of many (especially low-mass) initially multiple systems (see Section 3).
The result of the fully multiple model are illustrated in Fig. \[fig:gk\]. This model produces a good fit to the canonical IMF for all masses except the very highest. The mass functions dip below the canonical slope of $-1.3$ at high masses due to the steep decline of the log-normal CMF at high masses[^1]
The fully multiple model requires the dynamical destruction (see e.g. Kroupa 1995b; Kroupa et al. 2003; Goodwin & Kroupa 2005; Goodwin et al. 2007) of significant numbers of low-mass binary systems in young clusters in order to change the initial binary fraction of unity to the field value.
We note that in this model brown dwarfs are not primarily produced as single objects in cores (‘star-like’ formation, e.g. Padoan & Nordlund 2004), nor as ejected embryos from high-mass cores (the ejection hypothesis, e.g. Reipurth & Clarke 2001). Instead they mainly form as the distant companions to M-dwarfs which are then disrupted. This is the scenario proposed by Goodwin & Whitworth (2007) as a major mode of brown dwarf formation. We note that this might be consistent with the idea that brown dwarfs form as a separate population of objects, possibly with a discontinuous IMF (Kroupa et al. 2003; Thies & Kroupa 2007; Kumar & Schmeja 2007).
The Low-mass single star model
------------------------------
Lada (2006) suggests that M-dwarfs tend to form as single stars, since most M-dwarfs in the field (roughly 55% by total number) are single stars. In this picture, destructive dynamical processes are unimportant for low-mass stars. However, Solar-type stars (and higher-masses) must still usually form in multiple systems to fit the observed high multiplicity fraction of T Tauri stars (e.g. Mathieu 1994; Patience et al. 2002; Duchêne et al. 2007 and Goodwin et al. 2007 and references therein).
We model the situation where most low-mass stars form as singles (the low-mass single star model) by making $N_*$ a strong function of the core mass. Cores with $\epsilon M_C < 0.5
M_\odot$ form stars in a $2\!:\!1$ single-to-binary ratio. Cores with masses $0.5 < \epsilon M_C/M_\odot < 1 M_\odot$ have a $1\!:\!1$ ratio of singles-to-binaries. And cores with $\epsilon M_C \ge 1 M_\odot$ have a $3\!:\!1$ binary-to-triple ratio (as in the fully multiple model). These probabilities roughly reflect a combination of the low-mass field (M-dwarf, see Fischer & Marcey 1992, also Lada 2006) and intermediate-mass PMS binary fractions (see Duchêne et al. 2007 and Goodwin et al. 2007 and references therein).
The results from this model are shown in Fig. \[fig:lada\] with a SFE of $\epsilon = 0.15$ which provides the best (but still not a good) fit to the canonical IMF. This model cannot be made to fit the canonical IMF well with any choice of $\epsilon$.
The main problem with the low-mass single star model is that it provides no mechanism for forming brown dwarfs other than as single brown dwarfs in very low mass cores. As the CMF peaks at $\sim\! 1 M_\odot$ there are very few cores below $0.1 M_\odot$ and so the SFE must be made very low in order to shift the peak of the CMF to the peak of the IMF. This is avoided in the fully multiple model by producing brown dwarfs as companions to low-mass stars. Increasing the SFE to greater than 15% results in far too few VLMOs and also shifts the peak of the IMF to too-high a mass. We also note that a SFE of $15$% suggests that a significant number of cores produce planetary-mass objects (which are not shown in Fig. \[fig:lada\]).
There are two ways we might possibly escape from the problem of too-few brown dwarfs. Firstly, we may postulate a very large population of low-mass cores from which brown dwarfs can form (e.g. Padoan & Nordlund 2004). In this situation the vast majority of cores would be below the peak of the CMF. However, the simulations of Padoan & Nordlund (2002,2004) suggest that the CMF should drop sharply below the peak, far faster than a log-normal distribution. Thus, there appears to be no good reason for expecting a large population of low-mass cores (see Goodwin & Whitworth 2007 for a number of other reasons why significant numbers of low-mass brown dwarf-forming cores would not be expected).
Secondly, we may form brown dwarfs by ejecting low-mass embryos from massive cores, thus creating brown dwarfs (e.g. Reipurth & Clark 2001). However, large numbers of ejections per high-mass core would be required to create almost all of the brown dwarf population in this way, and large numbers of such ejections have consequences that are difficult to reconcile with observations (see e.g. Goodwin & Kroupa 2005; Goodwin et al. 2007 and Whitworth et al. 2007 and references therein; Goodwin & Whitworth 2007).
The slope of the high-mass end of the IMF is also far too steep ($\sim\! 1.6$ rather than the observed $\sim\! 1.3$). This is due to the change in the modes of fragmentation at $\epsilon M_C = 0.5 M_\odot$ and $1
M_\odot$[^2]. This is because at high masses the mass of stars is divided between 2 or 3 stars, while at lower masses it is divided only between 1 or 2. Thus altering the modes of fragmentation changes the slope from the IMF-like slope of the CMF to a steeper slope. The upper-mass slope only matches the slope of the CMF if fragmentation is independent of mass for cores above the knee in the IMF at $0.5 M_\odot$.
The problem with the upper-mass slope can be alleviated somewhat by assuming that all stars form with the field binary fraction (rising from 33% for M-dwarfs to 60% for G-dwarfs). However, this solution conflicts with observations that the initial binary fraction for stars $>1 M_\odot$ is consistent with unity (Goodwin & Kroupa 2005; Duchêne et al. 2007; Goodwin et al. 2007). These observations suggest that there must be a fairly rapid transition between $0.5$ and $1 M_\odot$ from a low to a high primordial binary fraction which will result in too-steep an upper-mass slope of the IMF.
We have assumed that the mass ratio of binaries is a flat distribution. Biasing the mass ratio distribution to low-$q$ (ie. highly unequal mass systems) improves the problems at the high-mass end of the IMF slightly. If most high-mass cores produce one large star and one or two very low-mass stars, then the IMF at the high-mass end becomes more similar to the MSMF (as this is dominated by one of the stars). However, the mass ratio distribution needs to be very biased for this to have a significant effect.
The too-steep slope of the upper-end of the IMF can also be solved by assuming that the SFE increases with increasing core mass (in just the right way). However, we feel this solution is unlikely as the SFE would have to be fine-tuned to give the correct slope and it would seem peculiar to postulate that low-mass cores produce stars at very low efficiencies ($\sim 10$%), whilst higher-mass cores are able to convert more of their gas ($\sim 30$%) into stars (the opposite of what might be expected from arguments based on feedback).
Discussion
==========
We have shown that the observed mass functions of cores in Orion B (Nutter & Ward-Thompson 2007) can give rise to the IMF of stars. In particular we have shown that, to produce the stellar [*and sub-stellar*]{} IMF, the majority of these cores must fragment into multiple systems. However, there are a number of issues about cores and the CMF that are worth discussing in this context.
It should be noted that it may not be fragmentation into ‘cores’ in clusters that sets the IMF of stars. If competitive accretion (see Bonnell et al. 2007 and references therein) is the dominant process, then the CMF at best acts to set the initial masses upon which competitive accretion begins to work. In such a scenario there would be little or no relationship between the CMF and the IMF.
However, we would argue that the form of the CMF in diffuse star forming regions [*does*]{} have a direct relevance to the origin and form of the IMF. Given the apparent universality of the IMF across a wide range of star forming environments (e.g. Kroupa 2002) we are presented with two options. Firstly, that the mechanism(s) that produce the IMF are fundamentally different in different environments, but they always produce the same outcome. Or, secondly, that there is a single, underlying, mechanism that produces the IMF in all environments. The latter possibility appeals due to its simplicity, and would suggest that the form of the CMF is the driving factor in establishing the form of the IMF, and that the form of the CMF is roughly the same in diffuse and clustered regions (even if the cores themselves are different in spacial size). Indeed, simulations of turbulence always seem to produce roughly log-normal CMFs whatever the environment.
Conclusions
===========
We have examined the relationship between the core mass function (CMF) and the stellar initial mass function (IMF). We use the Orion CMF from Nutter & Ward-Thompson (2007) as a ‘standard’ which we fit using a log-normal distribution. We note that this CMF is not dissimilar to the stellar (Kroupa 2002) IMF shifted upwards in mass by a factor of $8$ (see also Alves 2007). We randomly sample cores from the CMF and assumed that each core produces a certain number of stars with a random distribution of masses between the components.
The canonical IMF is reproduced very well by a scenario in which every low-mass cores fragment into binaries, and high-mass cores fragment into a multiple system with a ratio of binaries-to-triples of $3\!:\!1$ (see e.g. Goodwin & Kroupa 2005) and a star formation efficiency (SFE) of $\sim\! 30$%. Dynamical disruption (Kroupa 1995a,b; Goodwin & Whitworth 2007) of systems then evolves the initial binary fraction of unity into the field population.
We find that a scenario in which low-mass stars preferentially form single systems (e.g. Lada 2006) cannot reproduce the observed IMF from a log-normal CMF. Firstly, the slope of the high-mass IMF is too steep. Secondly, and most seriously, this model cannot reproduce the correct numbers of brown dwarfs to high-mass stars. The best-fit to the canonical IMF is found when the SFE is only $\sim\! 15$%. Such a low SFE is required, as the only way in which brown dwarfs may be produced in significant numbers is through the formation of a single brown dwarf from a core. Higher SFEs are required to produce sufficient high-mass stars, however such SFEs significantly under-produce brown dwarfs and low-mass stars.
A lingering question is the value of the star formation efficiency that must be applied to fit the IMF. The best-fit value of $\epsilon$ in the fully multiple model suggest that only $\sim\! 30$% of the mass in a core ends-up in the stars which that core forms (a similar value for the SFE is found by Alves et al. 2007). This seems a very low value and may suggest that the determinations of the absolute core masses are wrong. Another possibility is that feedback from jets is far more efficient than previously thought and manages to disperse most of the gas initially in the core. A final possibility is that we are not observing ‘typical’ cores which produce the IMF and that the observed CMFs will produce somewhat top-heavy IMFs (cf. Taurus, Goodwin et al. 2004c).
We conclude that a model in which [*all*]{} stars and brown dwarfs form in multiple systems from a log-normal core mass distribution provides a very good fit the observed IMF.
SPG was supported during some of this work by a UKAFF Fellowship. SPG also acknowledges the support and hospitality of the International Space Science Institute in Bern, Switzerland where part of this work was done as part of a International Team Programme. SPG and PK also acknowledge support from a Royal Society International Joint Project grant. PK also thanks the Leverhulme Trust for the award of a Leverhulme Trust Visiting Professorship at Sheffield University.
Alves, J., Lombardi, M. & Lada, C. J. 2007, A&A, 462, 17
Bate, M. R., Bonnell, I. A. & Bromm, V. 2002, MNRAS, 332, L65
Bate, M. R., Bonnell, I. A. & Bromm, V. 2003, MNRAS, 339, 577
Bonnell, I. A., Larson, R. B. & Zinnecker. H. 2007, in ‘Protostars and Planets V’ eds. eds. B. Reipurth, D. Jewitt & K. Keil (University of Arizona Press: Tuscon), p 149
Briceño, C., Luhman, K. L., Hartmann, L., Stauffer, J. R. & Kirkpatrick, J. D. 2002, ApJ, 580, 317
Chabrier, G. 2003, PASP, 115, 763
Clark, P. C., Klessen, R. S. & Bonnell, I. A. 2007, MNRAS, 379, 57
Delgado Donate, E. J., Clarke, C. J., Bate, M. R. & Hodgkin, S. T. 2004a, MNRAS, 351, 617
Delgado Donate, E. J., Clarke, C. J. & Bate, M. R. 2004b, MNRAS, 347, 759
Duchêne, G., Delgado Donate, E., Haisch, K. E. Jr, Loinard, L. & Rodriguez, L. F. 2007, in ‘Protostars and Planets V’, eds. B. Reipurth, D. Jewitt & K. Keil (University of Arizona Press: Tuscon), p 379
Elmegreen, B. G. 2000, ApJ, 530, 277
Fischer, D. A. & Marcy, G. W. 1992, ApJ, 396, 178
Goodwin, S. P., Whitworth, A. P. & Ward-Thompson, D. 2004a, A&A, 414, 633
Goodwin, S. P., Whitworth, A. P. & Ward-Thompson, D. 2004b, A&A, 423, 169
Goodwin, S. P., Whitworth, A. P. & Ward-Thompson, D. 2004c, A&A, 419, 543
Goodwin, S. P. & Kroupa, P. 2005, A&A, 439, 565
Goodwin, S. P., Whitworth, A. P. & Ward-Thompson, D. 2006, A&A, 452, 487
Goodwin, S. P., Kroupa, P., Goodman, A. & Burkert, A. 2007, in ‘Protostars and Planets V’ eds. eds. B. Reipurth, D. Jewitt & K. Keil (University of Arizona Press: Tuscon), p 133
Goodwin S. P. & Whitworth, A. P., 2007, A&A, in press
Hubber, D. A. & Whitworth, A. P. 2005, A&A, 437, 113
Jappsen, A.-K., Klessen, R. S., Larson, R. B., Li, Y. & Mac Low M.-M. 2005, A&A, 435, 611
Johnstone, D. Wilson, C. D., Moriarty-Schieven, G., Joncas, G., Smith, G., Gregersen, E. & Fich, M. 2000, ApJ, 545, 327
Johnstone, D. , Fich, M., Mitchell, G. F. & Moriarty-Schieven, G. 2001, ApJ, 559, 307
Johnstone, D. & Bally, J. 2006, ApJ, 653, 383
Kirk, J. M., Ward-Thompson, D. & André, P. 2005, MNRAS, 360, 1506
Klessen, R. S. & Burkert, A. 2000, ApJS, 128, 287
Klessen, R. S. 2001, ApJ, 556, 837
Kroupa, P. 1995a, MNRAS, 277, 1491
Kroupa, P. 1995b, MNRAS, 277, 1507
Kroupa, P. 2002, Science, 295, 82
Kroupa, P., Bouvier, J., Duchêne, G. & Moraux, E. 2003, MNRAS, 346, 354
Kroupa, P. 2007, astro-ph/0703124
Kumar, M. S. N. & Schmeja, S. 2007, arXiv:0706.3328
Lada, C. J. & Lada E. A. 2003, ARAA, 41, 57
Lada, C. J. 2006, ApJ, 640, L63
Li, Y., Klessen, R. S. & Mac Low, M.-M. 2003, ApJ, 592, 975
Luhman, K. L. 2004, ApJ, 617, 121
Mathieu, R. D. 1994, ARAA, 32, 465
Maxted, P. F. L. & Jeffries, R. D. 2005, MNRAS, 362, L45
Motte, F., André, P. & Neri, R. 1998, A&A, 336, 150
Motte, F., André, P., Ward-Thompson, D. & Bontemps, S. 2001, A&A, 372, L41
Muench, A. A., Lada, E. A., Lada, C. J. & Alves, J. 2002, ApJ, 573, 366
Nutter, D. & Ward-Thompson, D. 2007, MNRAS, 374, 1413
Onishi, T., Mizuno, A., Kawamura, A., Tachihara, K & Fukui, Y. 2002, ApJ, 575, 950
Padoan, P. & Nordlund, Å2002, ApJ, 576, 870
Padoan, P. & Nordlund, Å2004, ApJ, 617, 559
Patience, J., Ghez, A. M., Reid, I. N. & Matthews K. 2002, AJ, 123, 1570
Pinfield, D. J., Dobbie, P. D., Jameson, R. F., Steele, I. A., Jones, H. R. A. & Katsiyannis, A. C. 2003, MNRAS, 342, 1241
Reid, M. A. & Wilson, C. D. 2006a, ApJ, 644, 990
Reid, M. A. & Wilson, C. D. 2006b, ApJ, 650, 970
Reipurth, B. & Clarke, C. J. 2001, AJ, 122, 432
Simpson, R., Nutter, D. & Ward-Thompson, D. 2007, in prep.
Sterzik, M. F., Durisen, R. H. & Pickett, B. K. 2001, A&A, 371, 952
Sterzik, M. F. & Durisen, R. H. 2003, A&A, 400, 1031
Testi, L. & Sargent, A. 1998, ApJ, 508, L91
Thies, I. & Kroupa, P. 2007, ApJ, submitted
Umbreit, S., Burkert, A., Henning, T., Mikkola, S. & Spurzem, R. 2005, ApJ, 623, 940
Ward-Thompson, D., Scott, P. F., Hills, R. E. & André, P. 1994, MNRAS, 268, 276
Ward-Thompson, D., Andre, P., Crutcher, R., Johnstone, D., Onishi, T. & Wilson, C. 2007, in ‘Protostars and Planets V’, eds. B. Reipurth, D. Jewitt & K. Keil (University of Arizona Press: Tuscon), p 33
Whitworth, A. P., Bate, M. R., Nordlund, Å., Reipurth, B. & Zinnecker, H. 2006, in ‘Protostars and Planets V’ eds. eds. B. Reipurth, D. Jewitt & K. Keil (University of Arizona Press: Tuscon), p.
Young, K. E., Enoch, M. L., Evans, N. J. II et al. 2006, ApJ, 644, 326
[^1]: It might be expected that the actual CMF continues as a power-law decline rather than being fitted by a log-normal at high masses (see e.g. Padoan & Nordlund 2002,2004).
[^2]: Small jumps may be seen at $0.5 M_\odot$ and $1
M_\odot$ as the function steps suddenly between different modes rather than being smooth, however a smooth function merely evens-out these jumps but does not change the overall appearance of the IMF.
|
"NARRATOR:" "Previously on Third Watch:" "MAN 1:" "Get out of the car!" "MAN 2:" "Come on, open this damn door." " No!" "MAN 2:" "Let's go, move!" "By all means, let's beat every black guy in New York until there's no more crime." " You, of all people" " Don't lecture me." "Hold it." "Listen." "Now, listen." "I'm just" "MORALES:" "My God, you are so arrogant." "DOC:" "Arrogant?" " You are a damn paramedic, Doc." "That's it." "You're not a doctor, not a cop and not these people's savior." "And you don't know these people." "And you don't know this neighborhood." "[YELLS]" "CARLOS:" "Watch this guy." "Watch this guy." "DOC:" "I see him." "Oh, damn." "Ow, ow, ow." "Slow down, would you?" "We're on a code-three run." "And that's all of my fruit-fly data." "This is half my Genetics grade." "They grade you on fruit flies?" "Get one with an unknown genetic marker and you gotta figure out What it is by breeding them." "Watching bugs fornicate somehow makes you a better doctor?" "I know." "It's absolute crap." "But I need an A for med school." "Looks like the bucket boys beat us to the punch." "Yup." "Pinching our calls again to beef up their activity reports." "WOMAN [OVER RADIO]:" "Five-four-nine...." "Hey, what are you guys doing here?" "We had a false alarm down the street, so we thought we'd stop by." "Uh-huh." "Well, thanks." "But we got it from here." "We'll hang out just in case you need anything." "Yeah, hang out." "Have a party." "Fire shows up, puts themselves down as first on the scene." "That way they can protect their budget so they can buy more big toys." "[KNOCKING]" "[PEOPLE ARGUING INDISTINCTLY]" "EMS." "Somebody call 911?" "You know we make three times more runs than they do and they get five times more capital expenditures." "[SNIFFS]" "Great." "Bunch of drunks." "My building's on fire, I want them there with the biggest bad-ass, shiny new toys my tax dollars can buy." "EMS." "Open the door." "[SPEAKS IN SPANISH]" "[GLASS SHATTERS]" "Uh, Doc, Carlos, some guy just jumped out the window." "[YELLING IN SPANISH]" "CARLOS:" "How was I supposed to know the guy was gonna jump?" "I'll meet you at the bus." "Gotta drop this off." "Grab me a handful of Christmas cookies from the nurses' stash." "Nieto been eating my Christmas cookies again?" " No, no." "He knows better." " Yeah." "I hope so." "All due respect, Peter, no way was your guy worth two Number 1 draft picks." "Bosco, you know what?" "Enough already." "Am I gonna get my phone call anytime soon?" "Patrick Ewing in that green uniform, there ought to be a law." "Nicely dressed criminal." "Yeah, he was a traffic stop that turned up a warrant." "Now I need a medical release so he can take his insulin." " Guy give Bosco trouble?" " No, he's a sports agent." "Bosco's pissed at him because the Knicks suck." "Now I'm gonna be here all day." "You tell Nieto I catch him in my cookies again I'm gonna cut off his hand and feed it to my fish." "Yes, ma'am." "I'm gonna tell him right now." "Monte?" "Monte Parker?" "Hi, Beverly." "What are you doing here?" "My father's in ICU with colon cancer." "Sorry to hear that." "I'm up in Detroit now." "Came back to help my mom out." "So you a paramedic?" "Fifteen years." "I've been meaning to call." "I need to talk to you." "I gotta go." "Can I call you?" "I'll call you, okay?" "We gotta run." "It was great seeing you." "Nice." "DOC:" "Let's go." " Who's she?" " Girl I knew in high school." "Get yourself some of that back in the day?" "[YELLS]" "[YELLS]" "So you went to school with that Woman in the ambulance bay?" "High school?" "Yeah." "You two have a thing?" "Is there a Doc Junior nobody knows about?" "I haven't seen Beverly since we graduated." "Yeah." "It's always weird running into old girlfriends." "I'm always thinking about What they looked like naked." "And we're in the middle of an AP or something." "And if there's a new boyfriend or a husband, then it gets really freaky." "Because the guy knows I know." "And I know the guy knows I know." "What are you talking about?" "Carla Vasquez." "Eleventh grade." "Now, that was a girl that looked good naked." "Oh." "The meatloaf wasn't cooking and I looked, and the fire was out." " And I lit it, and boom." " Okay." "Here's some burn dressing." "Okay." "Darla, this is gonna make your hand feel better." "All right?" " Can you breathe okay?" "DARLA:" "Mm-hm." "I'm hungry." "What about Charlie's lunch?" "Who else lives here with you?" " Charlie." " Mm-hm." "No one comes to help you out?" "We're married." " Yeah?" " Yeah." "Yeah, six months." "We'll take you to the hospital, get you checked out." "I hate hospitals." "You need to have a doctor look at these burns." "I hate doctors." "Okay." "Well, Charlie needs to be looked at too." "Well, I feel fine." "Listen, Darla." "Listen." "You need to get some medicine on your hand so that it'll feel better, okay?" "Now, you and Charlie, you can ride in the ambulance together." "Charlie's hungry." "I gotta fix him something to eat." "No, listen." "Listen." "We can get Charlie something to eat at the hospital." "CHARLIE:" "Merry Christmas." "DOLL:" "Ho, ho, ho." "Merry Christmas." "Nice." " No." "I don't want to go." "DOC:" "No." " Darla, Darla." "DARLA:" "No." " Darla, it's okay." "Calm down." "All right?" " Doc, they're minor burns." "She nearly blew up their kitchen cooking meatloaf." "Maybe she should stick to takeout." "[CHUCKLES]" "This isn't funny." "These two people can't take care of themselves." "She's functional." "They're minor burns." "They're doing fine." "Don't you have a fire to put out or something?" "Taylor's right." "If the woman doesn't Want to go, we shouldn't take her." "She's going to the hospital." "What's his problem?" "Oh, that's Monte Parker saving the world one patient at a time." "Mm." "These are college students?" "They look 12 years old." "Come on, Gramps." "It's in here." "Your Genetics grade's huge With med schools." "You ace it, you're in." "Some of your bugs are dead." "Well, first of all, they're not bugs, they're drosophilae." "And they're not dead, they're etherized." "[DOOR OPENS]" "They're my F1 generation crosses between my unknown males and wild females." "Hi, Carlos." " How's it going?" " I can't talk right now." "Oh." "Okay." "Well, good luck." "Put my virgins down." "Hey, it's the bus driver." "Listen, Ross I had some trouble With my F1 crosses." " The wing bang counts didn't add up." " You need another day." "Actually, I was hoping for three." "That way I could re-cross the mutant markers." "Deadline's a deadline." "MAN [OVER RADIO]:" "Lexington, 127...." "Adam 553...." "Come on, Ross." "Please." "You know, I'm Working double shifts for the city." "I'm not some punk undergrad out getting high." "Two days." "And make them count." " Your test grades suck." " Thanks." " I thought you were doing great." " I'm great on the curve." "BOBBY:" "Damn." "Feels like snow." "KIM:" "Ooh." "I hope it sticks." " Maybe we'll have a white Christmas." "BOBBY:" "I hope it doesn't." "I gotta take my mom shopping all the way to Secaucus." " Traffic's gonna be crazy." " The outlet mall?" "If there were coupons, my mom Would clip them." "I got these shoes out there." "They got good stuff." "Irregulars." "Good prices." "If you've got one arm that's 3 inches shorter than the other." "Uh-oh." "Check it out." "High-school-reunion time again." "Talk to you tomorrow." "Don't do anything I wouldn't do." "I asked at the hospital." "They said you worked over here." "You didn't take my number earlier." "I figured you weren't planning to call." "No, I...." "I have it written down somewhere." " I mean, unless your folks changed it." " No." "It's still the same." "I'll look for it." "You like being a paramedic?" "Yeah." "So the record-producer thing didn't work out, huh?" "Look, I'm...." "I'm sorry if I was rude earlier." "It's just...." "It was a shock seeing you again, you know?" "You ever think about him?" " No." "Not really." " I do." "Every day." "I was thinking maybe I should go over there and see his mother." "Why?" "I was thinking maybe I should tell her the truth." " It's been over 20 years." " I got a boy the same age as K.C." "If it was my son, I'd want to know." "I've been divorced twice, Monte." "I drink too much." "I can't keep a job." "He's in my head, you know?" " His face." " Is that what you wanted to tell me?" "I was hoping maybe you would come with me." "No." "No." "MORALES:" "Doc?" "What are you doing?" "DOC:" "Couldn't sleep." "MORALES:" "It's 3 in the morning, babe." "When did it start to snow?" "A few minutes ago." "I don't think it'll stick." "You okay?" "A lot of stuff going on at work." "Holidays." "You wanna talk or anything?" "No." "No, I'm fine." "[CLATTERS]" "Can I help you?" "Sorry." "Wrong place." " Where's Carlos?" " Called in sick." "Hey, do you like this sweater?" "I think I'm gonna get it for my mom." " Isn't it a little late to be ordering?" "KIM:" "No." "Guaranteed delivery if you order before December 23rd." "ALEX:" "It's you and me tomorrow too." " We're on for Saturday night, right?" " Yeah, sounds like fun." "MAN [OVER RADIO]:" "Adam 553, abdominal pain." "Turkey's Nest Bar, 934 East 117." "Adams and Lex." "Drunk bellyache." "You don't wanna work EMS, then don't." "This ought to be fun." "MAN:" "Go away." "I'm all right." "DOC:" "Sir, you're having stomach pain?" "Your chest?" "What's it feel like?" "Like Ginny sat her fat ass on me." "It's gone now." "Hey, get that off of me." "Just 10 minutes ago he was bitching about how much pain he was in." "DOC:" "You could be having a heart attack." " It's gas." "He was holding his stomach, said his arm was numb." "You should get a cardiogram and some blood tests." " I'm fine." " You really need to let us check you out." "What I need to do is take a dump." "Nice guy." "He's got enough brain cells left to sign a refusal, leave him be." "He could have been having an Ml." "He doesn't want attention, it's his problem." "I doubt he understood the choice he was making." "MAN [OVER RADIO]:" "Adam 553, auto versus pedestrian, 127 between Second and Third." "He chose to pound down 10 beers before 4 in the afternoon." " Why should we take responsibility?" " Because it's our job." "Adam 5531 ...." "Oh, no, no, no." "Damn it." "ROSS:" "Man, Mendel must be spinning in his grave." " How many flies you got there?" " I don't know." "A lot." "Separate them out or they're gonna screw their way into you flunking this course." "That might've been one of my virgins." "One more or less isn't gonna matter." "You're boned." "I need this grade to get into med school, Ross." "You're not getting into med school." "Haven't you heard?" "Affirmative action's dead." "Hey, Janet." " Jane." " Jane." "Right." "Doherty says he and Brooke had a great time in the Virgin Islands." "Ironic place for them to honeymoon, don't you think?" "The Virgin Islands?" "I get it." "[MAN GROANING]" "ALEX:" "What's going on?" "These two were holding onto the bus..." " ..." "While on their skateboards." " They call it skitching." "I call it unbelievably stupid." "DOC:" "Your neck hurt?" "MAN:" "Oh, my leg." "I was making the turn." "He came flying out of nowhere." "Let's start lifting." "We were coming around the corner and the bus just stopped." " Don't move your head." "SULLY:" "Oh, like it was the bus's fault." "MAN:" "Thanks." "DOC:" "Does your neck hurt?" "MAN:" "No, man." "My leg." "All right, got it." "Check those wedges up front." "DOC:" "Okay, let's move him." "ALEX:" "Keep breathing." "DOC:" "Come on, pull." "MAN:" "Ow, my leg." "JIMMY:" "You can let it down, John." "MAN:" "Is it broken?" "ALEX:" "Compound tib-fib fracture." "Skitching?" " What the hell were you thinking?" " He wasn't thinking." "He's 15." "BOSCO:" "So me and Mike Roghetti Would go out on the trestle by Little Neck Bay." "And the idea was to be the last guy to actually bail before the train came." "I remember the squealing brakes and the horn blowing." "I never lost." "Congratulations, Bosco." "You overcame your instinct for survival..." " ...by the force of your own stupidity." " What are we talking about?" "BOBBY:" "Stupid teenage tricks." "KIM:" "Stupid teenage-boy tricks." "I know it by heart." "How'd that kid do?" "Took him to surgery, tried to put his leg back together." "I climbed the suspension cables of the Brooklyn Bridge once." "It was nuts, bro." "I've never been so scared in my whole life." "TY:" "All right." "Elevator surfing." "You open up the hatch, climb up on top with all the cables." "Thirty-six stories, man." "Other elevators passing you by." "SULLY:" "I can see you doing that." "FAITH:" "I don't wanna hear any more." "I lose enough sleep thinking about Charlie." "BOSCO:" "Charlie's 8." " That's the point." " I can't stop him from growing up." " Joey's 7." "But he tried to jump from the top of the refrigerator to the table." "Missed." "Four stitches right across his chin." "Stuff We've pulled, it's a miracle we survived." "FAITH:" "So do you have any testosterone-laden tales you want to share with us, Sully?" "Not that I want to share." "FAITH:" "What about you, Doc?" "Doc was too busy helping Mother Teresa with the bandages." "BOBBY:" "Come on." "You must've done some crazy stuff, man." "Give it up." "Between the Peace Corps and the soup kitchen I barely had enough time to train all those Seeing Eye dogs." "Order me a tuna sandwich, will you?" "[MOUTHS] Damn." "[YELLING]" "Hey." "You're up early." "You have trouble sleeping again?" "I got a few hours." "What time did you get in?" "A little after midnight." "I didn't wanna wake you." "You want me to write you a scrip for something to help you sleep?" "No, thanks." "I made some coffee." "Hey, babe." "Who's Beverly Saunders?" "She called last night and wanted you to call her back." "An old friend." "An old friend?" "Or an old friend?" "High school." "Her dad has cancer." "I ran into her at the hospital." "So Beverly." "I thought I knew about the entire rogues' gallery." "So is she cute?" "She was." "Yeah." "But not anymore." "No." "It was a long time ago." " So, what does she want?" " She asked about a friend of ours." "I didn't have the number on me." "So I told her to call." "I gotta get in the shower or I'm gonna be late." "Okay." "How's your dad doing?" "Not very well." "I'm sorry." "You working?" "Yeah, I just brought a woman in." "Why did you call my apartment?" "I called K.C.'s mom." "I'm going over there tomorrow." "I thought maybe you'd change your mind." "Why are you doing this to me?" "I'm not doing anything to you." "MAN [OVER RADIO]:" "Squad 55, Ladder 100, Adam 553 and Boy 553." "Residential fire." "Six-four-three Grand." "That's my ambulance." "What possible difference can it make now?" "It'll make a difference to me." "You can't just come back after 20 years and ruin my life." "Keep your damn voice down." "I gotta go." "Tomorrow at 3." "She still lives in the same place on 121st." "WOMAN [OVER RADIO]:" "Five-five." "MAN:" "Good access there." "Look familiar?" "Day before yesterday?" "Darla and Charlie?" "Crap." "Hey, Jimmy. what happened?" "Gas explosion, second floor, set two other apartments on fire." "Yeah." "I guess Darla forgot to order takeout." "Doc, fire's out." "You got victims in here." "DOC:" "Bobby." "BOBBY:" "Yeah?" "DOC:" "Let's go." "ALEX:" "Paramedics. where do you need us?" "JIMMY:" "In the kitchen." "Oh, God." "Charlie." "Was there a woman?" "Didn't see one." " Anybody see a woman?" "BOBBY:" "There's somebody alive in here." "ALEX:" "Watch the curb." "Faint pulse." "She's barely breathing." "She needs intubation." "BOBBY:" "I'm gonna have to cube it on the left for an IV." "Bobby, hand me the laryngoscope." " I got it." " Alex." "Okay." "ALEX:" "I need suction." "Yup." "Here." "ALEX:" "Turn it up." " It is up." "Pulse is falling." "Okay, I gotta bag her." "I'll apply cricoid pressure." " Doc, why don't you get in here?" " No." "Alex has got it." "Come on." "She's bradycardic." " What's the rate?" " Sixty." "Doc, come on." " Alex, let somebody else in there." " I'll take over when it falls to 50." "This is ridiculous." " She's in fib." " Damn!" "Let me in." "Get off." "Give me those." "I said, get off!" "Get off now!" "All right, 200." "Go." "Clear." " Still in fib." " Three hundred." " Clear." "BOBBY:" "Nothing." "Three-sixty and an amp of epi." "Clear." "[EKG BEEPING]" "KIM: what happened?" " Doc was playing God again." "Oh, you got promoted from saint to the big guy?" " Why don't you just shut up?" " Doc, what's your problem?" "Hey, you were out of line." "ALEX:" "You happy?" "You made me cry." "That was the point, right?" "Were you just gonna stand there and let me kill her?" "You don't want to help the patients that need it." "You're in it for the adrenaline rush." "You know why I took the fire exam?" "I had a little boy once beaten by his father." "He was bleeding out, his spleen Was ruptured and he was crying." "And he looked up at me and asked me What he had done that was so bad begged me to ask his father to forgive him." "This little boy." "That's what he was thinking about When he died." " And what's your point?" " Well, what kind of person Would let someone die to prove that they were right?" "[YELLING]" "[CLAPPING]" "Nice." "Very nice." "DOC:" "You're late." "I'm sorry." "I missed the A, had to catch the C." " You already warmed up?" " Yeah." "Let's go then." "How about we spar?" "Sure, man." "I'll kick your butt for you." "Hey, I came home after work yesterday." "You know who was sitting on my stoop?" "Beverly Saunders, man, asking about you." "Gave her the update, man." "Hope that's cool with you." "She came by the hospital." "That must've been a trip, man." "You guys were tight." "Let's go." "Yeah?" "Let's do it." "[YELLING AND GRUNTING]" "You all right?" "Damn." "Seeing Beverly made me think of K.C., man." " Haven't thought about that in years." " We sparring or what?" "All right." "Easy, man." "Come on." "Keep it focused." "Man!" "You're being too aggressive, man." " You're leaving yourself open." " Let's just go!" "MAN:" "All right, man." "That's it." "Let's stop." "You're fighting angry." "You need to check yourself, man." "Professor Mclntyre?" "Carlos Nieto." "You wanted to see me?" "I'm in your Genetics 281." "Where's your raw data?" "Oh." "I'm sorry." "I didn't know I had to hand that in." "I thought I lost it on the female parent backcross, you know?" "Chi-square analysis totally supports my conclusions." "I was amazed at how well the numbers fit together." "So am I because they're wrong." "What?" "Um, no." "If you look at my coefficient of coincidence" "The only coincidence is how this mess adds up to anything." "A D?" "I can't get a D." "I can give you an F. And you can repeat the course." "I won't get into med school With a D in Genetics." "Maybe med school isn't for you." "What the hell do you know about it, huh?" "I'm gonna be a doctor!" "That's the best I can do." "Look, if I repeat the course I lose a year." "It's already gonna take me another four semesters to finish pre-med." "This is very important to me." "Okay?" "I...." "I have it all planned out." "Please?" "Please?" "Are you off today?" "DOC:" "You wanted to see me?" "Yeah." "Thanks for coming by." "Sit." "Waste of perfectly good trees." "Why do you think Taylor doesn't want any more paramedic shifts with you?" "How should I know?" " She capable?" " She's fine." "Nothing personal between you?" "This is why you called me in on my day off?" "Anything else going on with you I should know about?" " No." " My door's always open." "Hey, Doc." "You're my best paramedic." "I'd hate to lose you." "I didn't think you were gonna come." "Well, I'm here." "You ready?" "[KNOCKING]" "Beverly?" " Hi, Mrs. Parsons." " Look at you all grown up." "Oh, my God." "Monte?" "Hi, Mrs. P." "Oh, my lord." "You two must have kids now." "I hope you brought pictures." "After you called, I dug out all the old photo albums." "There are so many pictures of you two in there." "How many children do you have?" "Well, Monte and I didn't end up together, Mrs. Parsons." "Oh, really?" "The way you two stuck together back then." "I have nine grandchildren." "Can you believe it?" "David has three, Denny has two, and little Michael has four." "Are you still teaching?" "Oh, I retired in '98." "Thirty-six years with seventh graders." "I should have had my head examined." "Please, sit down." "It's so good to see you both again." "That's you and K.C. at Coney Island the day the three of you hooked school." "You didn't know I knew it, did you?" "So you said your mother's in the hospital, Beverly?" "BEVERLY:" "My father." "PARSONS:" "Oh, I'm sorry." "I hope he gets better soon." "Can I get you both something?" "I mean, some tea or a soft drink?" "Uh, no." "No." "No, thank you." "PARSONS:" "On the phone yesterday it sounded like there was something you wanted to talk about, Beverly." "Was there?" "No." "Not really." "Beverly was" "Was coming by." "So I thought I'd come by and say hi." "It was great seeing you again, Mrs. P but I gotta go." "So soon?" "BEVERLY:" "Monte." " I can't do it." "I can't." "Stop." "Please." "I thought you were gonna tell her." " Me?" " This was your idea." " She deserves to know what happened." " Oh, she's fine." "She's fine." "She accepted it years ago." "We're the ones still living with it." "Now you want me to punish her?" "You want me to rob her of her peace her memories after everything I've already stolen from her?" " It wasn't your fault." " I could have stopped him." "I was trying to make you jealous." "I liked seeing two boys fighting over me." "I never should have come here." "You never should've made me come." "I didn't make you." "You came because you wanted to." "You came because you had to." "Just like me." "I can't tell her." "I was a coward then." "And I'm a coward now." "I'm gonna go back inside." "And I'm gonna have some tea." "And I'm gonna look at her old photos." "Maybe that's my penance." "You're right." "I'm an idiot." "I got a D in Genetics." "I never said you were an idiot." "Who was I to think I could be a doctor, huh?" "I never finished a whole year of high school Without moving to another foster home." "Look, I gotta get inside." "It doesn't matter whether I passed the course or not." "The truth is I'm just not smart enough." "I even slept with this dumpy girl to steal her lab notes." "I thought about you and I couldn't go through with it." " Me?" " You always do the right thing." "Not always." "More than most." "What do you want, Carlos?" "I felt bad about that girl." "And I wanted to tell somebody, I guess." "I'll see you tomorrow." "[DOOR OPENS]" "MORALES:" "Hey, babe." "Carlos was looking for you." "I found my Christmas decorations." "They were down in the storage unit." "Wanna help?" "You ever had a moment that you'd give anything to get back?" "The day I chose emergency medicine comes to mind." "I need to tell you something." "What?" "I killed a boy when I was 15." "His name was K.C. He was my best friend." "We got in a fight over Beverly, that woman that called." "He came at me with a brick." "And I hit him." "And he fell backwards and hit his head." "He died." "And when the ambulance came We lied and said he was running and he tripped." "I'd give" "I'd give anything to get that moment back." "I go to the dojang and I try to control my temper, but it's still there." "I try to make a difference, but no matter how many lives I save K.C., he's still there staring up at me from the wet concrete dying bleeding." |
Effects of hyaluronidase, trypsin, and EDTA on surface composition and topography during detachment of cells in culture.
Cultured human embryo fibroblasts (HLM18) were labeled with [3H]glucosamine and Na35SO4, and then treated with testicular hyaluronidase, trypsin, or EDTA. Macromolecular material from the surface of these cells was characterized by DEAE-cellulose chromatography and cetylpyridinium chloride precipitation while the associated morphology of cell detachment was studied by phase contrast and scanning electron microscopy. Release of surface glycosaminoglycans by testicular hyaluronidase did not cause cell rounding or detachment. EDTA did not release cell-surface components, but caused cell contraction and detachment morphologically similar to that caused by trypsin. Large amounts of cell-surface glycoproteins and glycosaminoglycans were released by trypsin. From these observations it is concluded that hyaluronic acid is not a principal adhesive agent in the attachment of cells to a substrate. It is suggested that both EDTA and trypsin may have their primary effect upon the cytoskeleton. |
391 Mass. 377 (1984)
461 N.E.2d 1210
COMMONWEALTH
vs.
EVERETT W. SIELICKI.
Supreme Judicial Court of Massachusetts, Essex.
November 10, 1983.
March 12, 1984.
Present: HENNESSEY, C.J., WILKINS, LIACOS, ABRAMS, & O'CONNOR, JJ.
Patricia A. O'Neill for the defendant.
Lila Heideman, Assistant District Attorney, for the Commonwealth.
HENNESSEY, C.J.
The defendant appeals from his conviction of two counts of murder in the first degree, claiming that he was deprived of the effective assistance of counsel and that the trial judge abused his discretion by admitting in evidence repetitious gruesome photographs of the bodies of the victims. We affirm.
The jury could have found the following facts. During the morning of Sunday, April 20, 1980, the defendant, along with *378 Danny Keene, Paul Bowman, and Frank Cerasi, drove from Salisbury to Hampton, New Hampshire, in order for Keene to look at an automobile that his brother was interested in purchasing. In the presence of the others, the owner of the automobile told Keene that he had been arrested during a drug deal the previous week and that he suspected that Joey Salvatore had set him up. Keene stated that he would "take care of" Salvatore.
Later that morning, the defendant, Keene, and Bowman drove to the motel where Salvatore was staying. Keene was armed with a pistol. After some conversation in the motel room, Salvatore and his girl friend, Claire Goossens, left with the others, ostensibly to make a drug deal. The group drove to Rowley and walked to a hilltop in a wooded area. Bowman walked some distance from the others in order to relieve himself. He heard screams and, upon returning to the hilltop, saw Keene holding Salvatore and the defendant stabbing him. Keene then grabbed Goossens, and the defendant stabbed her. The defendant, Keene, and Bowman then left and took steps to dispose of the defendant's bloody clothes. After all three were arrested, Bowman agreed to testify against the defendant and became the Commonwealth's major witness.
The defendant claims that he was deprived of effective assistance of counsel by his attorney's failure to seek inquiry into the effect of pretrial publicity on potential jurors, by his elicitation, during cross-examination of the State police lieutenant in charge of the investigation, of the statement that the defendant had chosen to remain silent after his arrest, and by his statement during closing argument, that the defendant "actually knows what happened." We conclude that, in the specific circumstances of this case, the shortcomings of counsel's performance, considered individually and cumulatively, do not amount to the "serious incompetency" which must be shown in order to prevail on a deprivation of effective assistance claim. Commonwealth v. Saferian, 366 Mass. 89, 96 (1974).
In order to prevail, the defendant must show that his attorney's conduct fell "measurably below that which might be expected from an ordinary fallible lawyer," Commonwealth v. Saferian, supra, and that "better work might have accomplished something material for the defense," Commonwealth v. Satterfield, 373 *379 Mass. 109, 115 (1977). Trial tactics which, from the vantage point of hindsight, can be seen to have failed do not amount to ineffective assistance unless "manifestly unreasonable" when undertaken. Commonwealth v. Levia, 385 Mass. 345, 353-354 (1982). Commonwealth v. Adams, 374 Mass. 722, 728-729 (1978).
The defendant argues that defense counsel's failure to seek inquiry into the effect of pretrial publicity on potential jurors was a denial of effective assistance of counsel. We note first that the defendant has not established that newspaper accounts of his crime were read and remembered by any juror. See Commonwealth v. Paszko, ante 164, 194 (1984); Commonwealth v. Nolin, 373 Mass. 45, 49 (1977); Delle Chiaie v. Commonwealth, 367 Mass. 527, 532 (1975). However, even if we assume that the jurors read the articles, see Commonwealth v. Crehan, 345 Mass. 609, 613 (1963), no prejudice is shown.
Pretrial publicity is not per se prejudicial. Delle Chiaie v. Commonwealth, supra. Jurors need not be totally ignorant of the case they are to decide. Commonwealth v. Jackson, 388 Mass. 98, 108 (1983). Commonwealth v. Richard, 377 Mass. 64, 66 (1979). Commonwealth v. Blackburn, 354 Mass. 200, 204 (1968). Commonwealth v. Subilosky, 352 Mass. 153, 159-160 (1967). Virtually everything reported in the newspapers was later introduced in evidence at trial. See Commonwealth v. Cameron, 385 Mass. 660, 668 (1982); Commonwealth v. Balakin, 356 Mass. 547, 554 (1969). See also Commonwealth v. Jackson, supra at 109. Many of the articles did mention that the defendant had a prior criminal record, but this fact was not highlighted in the newspapers. Compare Commonwealth v. Crehan, supra at 612-613. The only misconduct specifically mentioned was assault and battery, digging clams in a contaminated area, and defaulting on court appearances. These are minor offenses as compared to the crime of which the defendant was convicted. Compare Commonwealth v. Jackson, 376 Mass. 790, 797-798 (1978). Juror knowledge of the defendant's prior criminal behavior is not necessarily prejudicial. See Commonwealth v. Nolin, supra at 48-49; Commonwealth v. Eagan, 357 Mass. 585, 588-589 (1970). Moreover, the publicity occurred in April and May; the *380 trial took place in October. "This lapse of time was sufficient for an inflamed public opinion, if such there was, to have subsided." Commonwealth v. McLaughlin, 352 Mass. 218, 225, cert. denied, 389 U.S. 916 (1967). Cf. Delle Chiaie v. Commonwealth, supra at 532 (publicity nine weeks before trial); Commonwealth v. Scott, 360 Mass. 695, 696-697 (1971) (publicity five months before trial); Commonwealth v. Geagan, 339 Mass. 487, 501 (publicity five months before trial), cert. denied, 361 U.S. 895 (1959).
The possible exposure to potentially prejudicial material was not such as to present a substantial risk that the case would be decided on extraneous grounds; even if pressed by counsel, the judge would not have been required to make inquiry under G.L.c. 234, § 28, second par. Commonwealth v. Campbell, 378 Mass. 680, 696 & n. 12 (1979). See Commonwealth v. Jackson, 376 Mass. at 800 & n. 5. Questioning of the venire beyond the requirements of § 28, first par., was a matter for the judge's discretion. Commonwealth v. Ricard, 355 Mass. 509, 510-511 (1969). Commonwealth v. Nassar, 354 Mass. 249, 253 (1968), cert. denied, 393 U.S. 1039 (1969); Commonwealth v. Subilosky, supra at 158. Even if the circumstances had been such that the judge would have been required, upon the request of counsel, to question the prospective jurors under § 28, second par., failure to make such a request would not be ineffective assistance unless it were a "manifestly unreasonable" strategy. See Commonwealth v. Levia, supra at 351-355. Of course, if counsel had requested inquiry as to exposure to pretrial publicity and its effect on prospective jurors, the wise exercise of the judge's discretion would have been to make such inquiry. See, e.g., Commonwealth v. Bianco, 388 Mass. 358, 368 (1983); Commonwealth v. Jackson, 388 Mass. at 109; Commonwealth v. Estremera, 383 Mass. 382, 391 (1981); Commonwealth v. Richard, supra at 66; Commonwealth v. Gilday, 367 Mass. 474, 491-492 (1975). Defense counsel did not seek such inquiry, perhaps because he preferred not to bring to the attention of the unsequestered jury possible sources of outside information. See Commonwealth v. Beneficial Fin. Co., 360 Mass. 188, 296 (1971), cert. denied sub nom. Farrell v. Massachusetts, 407 U.S. 910, and sub nom. *381 Beneficial Fin. Co. v. Massachusetts, 407 U.S. 914 (1972). We cannot say that counsel's decision was manifestly unreasonable. Delle Chiaie v. Commonwealth, 367 Mass. 527, 538-539 (1975). We find no indication in the totality of the circumstances that pretrial publicity rendered the defendant's trial fundamentally unfair. Commonwealth v. Jackson, 388 Mass. at 108-110.
The defendant next argues that defense counsel's cross-examination of the State police lieutenant in charge of the investigation, by which it was revealed that the defendant chose to remain silent after his arrest, was manifestly unreasonable. In making this argument, appellate counsel asks us to engage in speculation as to whether trial counsel reasonably should have known what the police lieutenant's response would be. This we decline to do. The form of the question posed by trial counsel strongly suggests that he anticipated the opposite response.[1] The defendant may have told trial counsel that he had denied his guilt. Appellate counsel argues that, because trial counsel was entitled under a discovery agreement to written or recorded statements of the defendant and any facts of an exculpatory nature known to the prosecutor, he could not have been unaware that the defendant had declined to make a statement. But a denial of guilt would not necessarily fall within either of these categories. On the record before us, we cannot conclude that trial counsel had reason to know that the defendant had made no statement. Thus, we do not reach the question whether counsel's conduct amounted to ineffective assistance if he knew or should have known. Nor do we determine whether, if counsel's conduct was error, it was, on the strength of the evidence against the defendant, harmless beyond a reasonable doubt. Compare Commonwealth v. Cobb, 374 Mass. 514, 516-522 (1978).
*382 The defendant's final claim as to denial of effective assistance of counsel is based on trial counsel's statement, in closing argument, that "the defendant ... actually knows what happened."[2] Counsel's remark was indisputably inept, but, considered in context, it does not rise to the level of ineffective assistance. The defense was not predicated upon mistaken identity or alibi; there was overwhelming evidence that the defendant was at the scene. Rather, the defense effort was directed at creating a reasonable doubt as to the veracity of Bowman's testimony by probing for inconsistencies and by suggesting that Bowman had reason to dislike Salvatore and to want to protect Keene. Counsel's statement had no tendency to undermine this defense. The defendant was not left "denuded of a defense." Commonwealth v. Street, 388 Mass. 281, 287 (1983). If emphasized, counsel's statement might have reinforced "the jurors' natural tendency to infer guilt from a failure to deny guilt." Commonwealth v. Cobb, supra at 520. We are satisfied, however, that "the brief, indeed fleeting, nature" of the comment prevented it from having prejudicial impact. Commonwealth v. Storey, 378 Mass. 312, 324 (1979), cert. denied, 446 U.S. 955 (1980).
The defendant's final argument is that the admission in evidence of multiple preautopsy photographs of the bodies of the victims was an abuse of discretion. The judge conducted a voir dire and excluded certain photographs as cumulative and possibly prejudicial. He found the admitted photographs relevant to extreme atrocity or cruelty and to premeditation, both of which were in issue. We have examined the photographs and we agree that their probative value outweighed their prejudicial effect. There was no abuse of discretion. See, e.g., Commonwealth v. Westmoreland, 388 Mass. 269, 279 (1983).
*383 We have reviewed the whole case on the law and the evidence and find no occasion to exercise our power under G.L.c. 278, § 33E, to order a new trial or to reduce the degree of guilt.
Judgments affirmed.
NOTES
[1] The relevant portion of the colloquy between trial counsel and the police lieutenant was as follows:
DEFENSE COUNSEL: "Did you inquire of the defendant as to what happened?"
THE WITNESS: "Yes, sir."
DEFENSE COUNSEL: "And the defendant told you he didn't do it, didn't he?"
THE WITNESS: "He chose to remain silent."
DEFENSE COUNSEL: "Is that all he said `I choose to remain silent?'"
THE WITNESS: "No. He just said he didn't want to talk to us."
DEFENSE COUNSEL: "Didn't want to talk to you?"
THE WITNESS: "Yes."
[2] Counsel's statement was made in the context of the following paragraph: "Now, at the outset, on Monday night, [the prosecutor] was there and interviewed the people that were present. And at some time [he] chose to believe what Mr. Bowman said. And so Mr. Bowman was here as a witness, not sitting right over here today, will not be present today; and is the only one, outside of Mr. Keene, who is not sitting here today, and the defendant who actually knows what happened. And at this point I would like to talk about Mr. Bowman's testimony; and, at the same time, the things that he told to Mr. Cerasi, what he told the police, and what he told others." (Emphasis supplied.)
|
/*
* Copyright 2006-2007 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.springframework.batch.sample.domain.trade;
import java.math.BigDecimal;
/**
* Immutable Value Object representing an update to the customer as stored in the database.
* This object has the customer name, credit amount, and the operation to be performed
* on them. In the case of an add, a new customer will be entered with the appropriate
* credit. In the case of an update, the customer's credit is considered an absolute update.
* Deletes are currently not supported, but can still be read in from a file.
*
* @author Lucas Ward
* @since 2.0
*/
public class CustomerUpdate {
private final CustomerOperation operation;
private final String customerName;
private final BigDecimal credit;
public CustomerUpdate(CustomerOperation operation, String customerName, BigDecimal credit) {
this.operation = operation;
this.customerName = customerName;
this.credit = credit;
}
public CustomerOperation getOperation() {
return operation;
}
public String getCustomerName() {
return customerName;
}
public BigDecimal getCredit() {
return credit;
}
@Override
public String toString() {
return "Customer Update, name: [" + customerName + "], operation: [" + operation + "], credit: [" + credit + "]";
}
} |
Extranodal lymphoma of the head and neck: a review of 49 consecutive cases.
One thousand and two consecutive patients with lymphoma were referred to the Regional Radiotherapy and Oncology Centre at Weston Park Hospital, Sheffield from 1970 to 1982 inclusive. Four hundred and seventy (47%) of the lymphomas occurred in the head and neck and 49 (10.4%) of these were extranodal. These 49 patients with primary extranodal lymphoma of the head and neck were reviewed with regard to clinical presentation, histological grade, treatment and survival. The specialists involved in the initial diagnosis were, in order of frequency, ear, nose and throat surgeons, general surgeons, ophthalmic surgeons and oral surgeons. Tonsillar and thyroid lymphomas occurred most frequently and constituted 71.0% of this series. All extranodal lymphomas were non-Hodgkin's lymphomas and two-thirds were graded as histologically unfavourable. Clinical staging showed that 65% of tonsillar lymphomas had local lymph node involvement at the time of diagnosis (Stage II); only 25% of lymphomas from other sites were Stage II. Radiotherapy was the primary treatment and was associated with a cumulative survival rate of 46.5%. Most recurrences were within 1 year and at distant sites. Recurrent disease had a poor prognosis with only 10% achieving lasting remission. Further analysis of cumulative survival after 6 years showed 65.7% for clinical Stage I, 40.9% for Stage II and 67.6% for histological Grade I, 29.9% for Grade II. |
PUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v. No. 04-4108
ANTHONY SINGLETON,
Defendant-Appellant.
Appeal from the United States District Court
for the District of Maryland, at Baltimore.
Richard D. Bennett, District Judge.
(CR-02-170-RDB)
Argued: February 3, 2006
Decided: March 23, 2006
Before NIEMEYER, MOTZ, and KING, Circuit Judges.
Affirmed in part, vacated in part, and remanded by published opinion.
Judge Motz wrote the opinion, in which Judge Niemeyer and Judge
King joined.
COUNSEL
ARGUED: John Hanjin Chun, Assistant Federal Public Defender,
OFFICE OF THE FEDERAL PUBLIC DEFENDER, Baltimore,
Maryland, for Appellant. Craig Michael Wolff, Assistant United
States Attorney, OFFICE OF THE UNITED STATES ATTORNEY,
Baltimore, Maryland, for Appellee. ON BRIEF: James Wyda, Fed-
eral Public Defender, Denise C. Barrett, Assistant Federal Public
2 UNITED STATES v. SINGLETON
Defender, Baltimore, Maryland, for Appellant. Allen F. Loucks,
United States Attorney, Baltimore, Maryland, for Appellee.
OPINION
DIANA GRIBBON MOTZ, Circuit Judge:
A jury convicted Anthony Singleton of drug trafficking, possession
of a firearm in relation to drug trafficking, and possession of a firearm
while a felon, all on the basis of contraband found in his apartment
after a no-knock search. On appeal, he challenges the district court’s
denial of his suppression motion, its admission into evidence of sev-
eral documents, and its imposition of a sentence based upon judge-
found facts. For the reasons that follow, we affirm Singleton’s convic-
tions but vacate his sentence and remand the case for resentencing.
I.
In 2001, a confidential informant told the Harford County police
that two individuals known as "Eva" and "BK" were selling cocaine
inside an apartment in Edgewood, Maryland. In August of that year,
the informant made a controlled purchase of cocaine from "Eva"
inside the Edgewood apartment. Later, police received a separate tip
that two individuals known as "Eva Hall" and "BK" were selling
cocaine in the area. Upon further investigation, the police discovered
that one of the cars near the apartment was registered to a woman
named Eva Mae Hall. The police also learned that "BK" was a pseud-
onym for a man named Anthony Singleton. An examination of court
records revealed that Singleton had a fairly extensive arrest record,
including arrests in the mid-1980s for second-degree murder and
criminal possession of a weapon. In September 2001, the confidential
informant made a second controlled purchase of cocaine inside the
Edgewood apartment, this time from Singleton.
On September 26, 2001, the police applied for a search warrant in
the Circuit Court of Harford County, alleging probable cause to
believe that the inhabitants of the Edgewood apartment were selling
drugs. The application also sought authorization for a no-knock entry,
UNITED STATES v. SINGLETON 3
averring that "any advance notice given to the occupants of the above
residence would greatly diminish the chance of a safe and secure
entry by law enforcement officers executing the issued search war-
rant." The court granted the search warrant and authorized a no-knock
entry.1
On October 3, 2001, the confidential informant made (or attempted
to make — the record is unclear) his third and final controlled pur-
chase of cocaine in the Edgewood apartment, again from Singleton.
The express purpose of this controlled purchase was to verify that
Singleton still resided there.
Under Maryland law, the police had fifteen days to execute the
issued warrant. On the morning of October 9, 2001, within the time
permitted, law enforcement officers entered the Edgewood apartment
by forcibly breaking down the door without first knocking and
announcing their presence. Inside, they found Singleton, Hall, and
Hall’s five-year-old son, whom the police had expected to be at
school. The police also found a locked safe in the apartment’s bed-
room that contained 42 grams of crack cocaine in the form of a crack
"cookie" and over 50 plastic bags of crack; $1,400 cash separated into
14 separate $100 bundles; three plastic bags with marijuana; and a
loaded Smith & Wesson 9 mm semi-automatic handgun. The police
also recovered a Sprint telephone bill addressed to Singleton at the
Edgewood apartment. After being read his Miranda rights, Singleton
made several incriminating admissions to the police acknowledging
his ownership and possession of the contraband.
1
Not all states authorize no-knock warrants. Indeed, Maryland’s sup-
port for such warrants has waxed and waned over the course of this liti-
gation. At the time that the police obtained the warrant for the Edgewood
apartment, Maryland permitted no-knock warrants. See, e.g., State v.
Riley, 147 Md. App. 113, 120-21, 807 A.2d 797, 802 (2002). In 2004,
however, Maryland’s highest court determined that "a judicial officer in
Maryland . . . may not issue a ‘no-knock’ warrant." Davis v. State, 383
Md. 394, 427, 859 A.2d 1112, 1132 (2004). But the next year, the Mary-
land General Assembly stepped in and reauthorized these warrants. See
Md. Code Ann., Crim. Proc. § 1-203 (a)(2)(ii) (West Supp. 2005)). For
the purposes of this appeal, the only relevant part of this back and forth
is that no-knock warrants were legal when the police requested the one
at issue here.
4 UNITED STATES v. SINGLETON
A grand jury charged Singleton with one count of possession with
intent to distribute five grams or more of crack, in violation of 21
U.S.C. § 841(a) (2000) (Count 1); one count of possession of a fire-
arm in furtherance of a drug-trafficking crime, in violation of 18
U.S.C. § 924(c) (2000) (Count 2); and one count of possession of a
firearm by a convicted felon, in violation of 18 U.S.C. § 922(g)(1)
(2000) (Count 3).
Before trial, Singleton moved to suppress the evidence seized from
the Edgewood apartment, asserting that exigent circumstances did not
justify the police’s no-knock entry. The district court denied the
motion. During trial, Singleton objected to the admission of several
pieces of evidence introduced by the Government to prove that he
resided in the Edgewood apartment. The district court overruled those
objections. The jury convicted Singleton of all charges.
During sentencing, which occurred prior to United States v.
Booker, 125 S. Ct. 738 (2005), the district court found that Singleton
was responsible for 50 to 150 grams of crack cocaine even though the
jury had only convicted Singleton of intent to distribute five grams or
more of crack cocaine. The court based its calculation on the contents
of the safe: namely, 42 grams of crack cocaine and $1,400 cash that
the court converted into a drug quantity of at least 8 grams. The court
sentenced Singleton to 188 months on Counts 1 and 3, to run concur-
rently, and 60 consecutive months on Count 2.2
II.
Singleton initially argues that the district court improperly denied
his motion to suppress the drugs and gun found in his apartment dur-
ing the no-knock search. He contends that exigent circumstances did
not justify the search and that the good-faith exception articulated in
United States v. Leon, 468 U.S. 897 (1984), cannot excuse this defect.
Although Singleton may be correct with respect to his first conten-
tion, his second fails.
2
The government concedes that the district court erred in imposing a
sentence of 188 months for Count 3. Under 18 U.S.C. § 924(a)(2)
(2000), a violation of § 922(g)(1) carries a maximum penalty of 120
months.
UNITED STATES v. SINGLETON 5
The Fourth Amendment generally requires police officers entering
a dwelling to "knock on the door and announce their identity and pur-
pose before attempting forcible entry." Richards v. Wisconsin, 520
U.S. 385, 387 (1997). However, exigent circumstances — like "a
threat of physical violence" to officers — may allow officers to con-
duct a no-knock entry. Wilson v. Arkansas, 514 U.S. 927, 936 (1995).
We review de novo whether exigent circumstances excused the
police’s failure to follow the knock-and-announce requirement.
United States v. Mattison, 153 F.3d 406, 410 (7th Cir. 1998).
In the application for a no-knock warrant, the police listed three
reasons to suspect that knocking and announcing their presence at the
Edgewood apartment would imperil them. First, they cited Single-
ton’s criminal history, which included several arrests in the 1980s for
firearms offenses, an arrest for second-degree murder in 1987, and
then nothing until 2000, when Singleton was arrested for marijuana
possession and importation and for driving with a revoked license.3
Second, the application explained that the apartment was in "a known
open air drug market, having a history of shootings and weapons
related violence." Third, the application stated that the only way into
the apartment was an open area in which the approaching police
would be visible to the inhabitants of the Edgewood apartment. (The
application also relied on several generalizations about the inherent
violence of drug dealers, such as their tendency to own weapons and
to protect their property by force.)
It is not clear that these facts sufficiently establish "a particularized
basis to reasonably suspect that knocking and announcing would be
met with violent resistance." United States v. Grogins, 163 F.3d 795,
798 (4th Cir. 1998) (emphasis added). Of the three specific factors
cited by the police, only the first — Singleton’s criminal history —
distinguishes this particular search from many others that police con-
duct on a daily basis. The other factors alone would be insufficient to
justify a no-knock search: the Fourth Amendment countenances nei-
3
The warrant application did not designate which arrests led to crimi-
nal convictions. In fact, Singleton was convicted of only some of the
charges: attempted robbery in 1980, attempted second-degree murder
and criminal possession of a weapon in 1987, and driving with a revoked
license in 2000.
6 UNITED STATES v. SINGLETON
ther a blanket rule allowing no-knock searches for drug investiga-
tions, see Richards, 520 U.S. at 394, nor a marginally narrower rule
allowing no-knock searches for drug investigations in dangerous
neighborhoods.
The addition of Singleton’s criminal history does not decisively tip
the balance toward forgoing the knock-and-announce requirement.
Singleton may have had a rough past, but his history of violence
ended (as far as the police knew) in 1987, with his conviction for
second-degree murder. He then managed to avoid violating the law
for fourteen years, until he again ran into trouble in 2000 — but even
then he was only convicted of driving with a revoked license. Further-
more, the police had no contemporary evidence that Singleton owned
a firearm — even though the confidential informant had been in the
Edgewood apartment several times. Cf. United States v. Smith, 386
F.3d 753, 759-60 (6th Cir. 2004) (insufficient exigent circumstances
even when confidential informant tells police that firearms are pres-
ent). Given the lack of any contemporary evidence that Singleton
might prove violent to police, it is unclear whether the police reason-
ably believed that knocking and announcing their presence would be
dangerous.
However, we need not resolve this question because the police rea-
sonably relied in good faith upon a properly obtained search warrant
that specifically authorized a no-knock search. More than twenty
years ago, the Supreme Court held that "reliable physical evidence
seized by officers reasonably relying on a warrant issued by a
detached and neutral magistrate . . . should be admissible in the prose-
cution’s case in chief," even if the warrant is ultimately found to be
defective. Leon, 468 U.S. at 913. "The good-faith exception is per-
fectly suited for cases like this, when the judge’s decision was border-
line." United States v. Scroggins, 361 F.3d 1075, 1084 (8th Cir.
2004).
Although neither the Supreme Court nor this Court has previously
held that the Leon good-faith exception applies to a no-knock warrant,
we see no persuasive reason not to apply Leon to the warrant at issue
here. Given that the Constitution allows no-knock warrants, see
United States v. Banks, 540 U.S. 31, 36 (2003), we believe that apply-
ing the good-faith exception here is most consistent with the "strong
UNITED STATES v. SINGLETON 7
preference for warrants." Leon, 468 U.S. at 914. As the Supreme
Court has explained, "the detached scrutiny of a neutral magistrate . . .
is a more reliable safeguard against improper searches than the hur-
ried judgment of a law enforcement officer engaged in the often com-
petitive enterprise of ferreting out crime." United States v. Chadwick,
433 U.S. 1, 9 (1977) (internal quotation marks omitted). When offi-
cers suspect ahead of time that knocking and announcing their pres-
ence would imperil them or risk the destruction of evidence, they
minimize the risk of violating the Fourth Amendment if they obtain
prior judicial approval for a no-knock entry.
In addition, applying the exclusionary rule here despite reasonable
reliance on a no-knock warrant would not help deter future police
misconduct. When an officer in good faith seeks prior judicial
approval for a no-knock warrant, he is already doing the most that he
can — at least prior to the search — to ensure that the no-knock entry
will comply with the Fourth Amendment. There is "nothing to deter"
in such situations. Leon, 468 U.S. at 921. Even if the no-knock war-
rant turns out to be unjustified, "[p]enalizing the officer for the magis-
trate’s error, rather than his own, cannot logically contribute to the
deterrence of Fourth Amendment violations." Id. Thus, the evidence
produced by the no-knock search of the Edgewood apartment is
admissible under Leon’s good-faith exception.
We note that, in reaching this conclusion, we join every other cir-
cuit to consider the question — all have held that the Leon good-faith
exception applies to no-knock warrants in situations like the one at
hand. See, e.g., Scroggins, 361 F.3d at 1083; United States v. Dumes,
313 F.3d 372, 381 (7th Cir. 2002); United States v. Tisdale, 195 F.3d
70, 73 (2d Cir. 1999); United States v. Hawkins, 139 F.3d 29, 32 (1st
Cir. 1998); United States v. Moore, 956 F.2d 843, 851 (8th Cir. 1992);
cf. United States v. Nielson, 415 F.3d 1195, 1203 (10th Cir. 2005)
(applying Leon but finding that warrant affidavit was too deficient).
The only contrary argument that Singleton offers is that applying
Leon to no-knock warrants would be inconsistent with the principle
that police "are obligated to assess exigent circumstances at the time
they execute the warrant." Reply Brief of Appellant at 5 (citing Rich-
ards, 520 U.S. at 387 (holding that courts must look to whether exi-
gent circumstances existed at the time of the entry)). Singleton may
8 UNITED STATES v. SINGLETON
be right that exigent circumstances must exist at the time of the search
to justify a no-knock entry. Cf. Ker v. California, 374 U.S. 23, 40
n.12 (1963) ("It goes without saying that in determining the lawful-
ness of entry and the existence of probable cause we may concern
ourselves only with what the officers had reason to believe at the time
of their entry." (emphasis in original)). But police often can (and per-
haps should) investigate and assess these exigent circumstances
before the time of the search. As the Supreme Court has recognized,
while planning for a search, police often have "reasonable grounds
. . . to suspect that one or another such exigency already exists or will
arise instantly upon knocking." Banks, 540 U.S. at 36. Particularly
with preexisting exigencies (like a violent criminal history) that are
unlikely to change between the issuance of a warrant and its execu-
tion, no purpose is served by requiring officers to wait until just
before a search to determine whether such exigencies support a no-
knock entry.4
III.
Singleton next contends that two pieces of evidence admitted by
the district court are hearsay: Sprint phone records (namely, bills and
internal company files) on which his address was printed, and a
docket from the Circuit Court of Harford County that also listed his
address. The Government used this evidence to show that Singleton
resided in the Edgewood apartment and therefore had constructive
possession of the drugs and firearm found inside. Even assuming that
both the phone and docket records were hearsay, we find their admis-
sion harmless. See United States v. Iskander, 407 F.3d 232, 240 (4th
Cir. 2005).
4
In this case, Singleton concedes that the facts cited in the affidavit
were accurate both when the police applied for the warrant and when
they conducted the actual search. Thus, we need not resolve the question
of whether police may rely on a no-knock warrant under Leon if the exi-
gent circumstances cited in the warrant affidavit have changed between
the issuance of the warrant and the actual search. Cf. Commonwealth v.
Scalise, 439 N.E.2d 818, 823 (Mass. 1982) ("[C]hanged circumstances
would render ineffective the magistrate’s decision that a no knock entry
was justified.").
UNITED STATES v. SINGLETON 9
"A person has constructive possession over contraband when he
has ownership, dominion, or control over the contraband itself or over
the premises or vehicle in which it was concealed." United States v.
Armstrong, 187 F.3d 392, 396 (4th Cir. 1999). Here, substantial evi-
dence other than the challenged records established that Singleton had
"ownership, dominion, or control" over the Edgewood apartment and
the drugs and gun that were found inside. Most damningly, Singleton
made a series of incriminating admissions to the police after they
burst into his apartment: he admitted to the search party that he lived
there and that he owned the drugs and the gun in the safe; he told the
searching officers that the only contraband in the apartment was in the
locked safe — a fact that the officers quickly verified; he told Eva
Hall, in the presence of several officers, that he would take the blame
for everything; and finally, while in jail, he told an officer that "he
[couldn’t] believe he did something this stupid."
These incriminating statements provided the basis for the Govern-
ment’s case against Singleton. Of course, as Singleton notes, during
closing argument the Government also discussed the phone and
docket records to establish his residence in the apartment. But the
Government spent at least as much, if not more, time emphasizing
Singleton’s various admissions about living in the apartment and
owning the drugs and gun in the safe. See J.A. 238F (Singleton told
Hall that he would take the blame), 238G (Singleton admitted that the
drugs and the gun were his; Singleton said, "I can’t believe I did
something this stupid"), 238L-M (Singleton said he would take all the
blame), 238N (Singleton correctly told officers that everything was in
the safe; Singleton said he did something stupid), 238O (summarizing
the evidence with a heavy focus on Singleton’s admissions). Indeed,
the Government ended its closing argument by telling the jury, "[Sin-
gleton’s] own statements . . . by themselves are enough to demon-
strate his guilt beyond a reasonable doubt." In light of the
Government’s heavy reliance on Singleton’s admissions, even if the
phone and docket records were inadmissible hearsay, their admission
provides no basis for reversal.
IV.
Finally, Singleton argues that his pre-Booker sentence was uncon-
stitutionally based on judicial findings of drug quantity. The Govern-
10 UNITED STATES v. SINGLETON
ment concedes that there was plain Sixth Amendment error. We
agree. Because the district court found that Singleton intended to dis-
tribute between 50 and 150 grams of crack, it assigned Singleton an
offense level of 32, which, combined with Singleton’s criminal his-
tory category of V, corresponded to a sentencing range of 188 to 235
months. U.S. Sentencing Guidelines Manual § 2D1.1 (2002). How-
ever, based solely on the drug quantity alleged in the indictment and
proven to the jury beyond a reasonable doubt — namely, five grams
of crack — Singleton would be assigned an offense level of only 26,
leading to a sentencing range of 110 to 137 months. Because Single-
ton’s sentence of 188 months for his drug-trafficking conviction
exceeds the maximum sentence authorized without judge-found facts,
we vacate and remand his sentence. United States v. Hughes, 401
F.3d 540, 547 (4th Cir. 2005). We affirm his conviction for the rea-
sons given above.
AFFIRMED IN PART, VACATED IN PART,
AND REMANDED
|
Q:
Drop down menu flickering except in firefox
I'm having a problem similar to this one Drop Down Box Keeps flickering - JQuery and CSS with a drop down menu flickering when I move the mouse over it, except that it doesn't seem to happen in firefox. I put an alert in the mouseout event I have on it and found out that every time I moved from one <li> to another inside the menu the alert was triggered. Here is the important parts of the html code behind it.
<!--// HEADER BAR //-->
<div id="header">
<!--// NAVIGATION LINKS //-->
<div id="navigation">
<!--// AUTHENTICATED //-->
<div id="options" class="authenticated">
<ul>
<li><a href="javascript: toggleAccount()" class="account" title="Account">/</a></li>
</ul>
</div>
<!--// ACCOUNT MENU //-->
<div id="account_container" style="display: none;" onmouseout="hideAccount();">
<div id="account">
<ul>
<li>Options...</li>
</ul>
</div>
</div>
</div>
</div>
As you can see, the "account_container" div is the drop down menu. It first appears when the user clicks on the account li under authenticated and disappears either when the user clicks on the li again or mouses out. The navigation div has it's height set to 40px in the css, so I thought it might be a positioning problem like in the linked question, but setting the height to auto didn't fix it, and I can't take the account container out of the navigation bar because that will mess up it's positioning. Why is the browser detecting the shift from one menu item to another as a mouseout event and how can I prevent it?
EDIT:
Could I do something like Andy E's answer to this question? Could I change onmouseout="hideAccount()" to onmouseout="hideAccount.call(this)" and detect if the mouse is over a child element of the dropdown inside the hideAccount function? If so, how would I go about that? For reference, here's the hideAccount function:
function hideAccount(){
//alert("mouse out!");
$(".account_container").hide();
}
A:
Solved it by changing the hideAccount function to this:
function hideAccount(event){
var to = event.relatedTarget || event.toElement;
if(this.contains(to)){
return;
}
else{
$(this).hide();
}
}
The problem was that every browser except Firefox was detecting the move from the account_container to any of it's children as a mouseout. Technically, when the mouse is over one of the list elements inside the container, it is no longer over the container itself for some reason. I guess firefox was the only browser to check if the mouse had moved into a child element before hiding. What fixed it was putting in javascript to check to see if I was moving to a child element before trying to hide.
|
Introduction
============
There is growing consensus that psychosocial support should be integrated into the routine care of patients with cancer [@b1]--[@b4]. A more recent concept is to extend this support to the patients\' physicians, nurses, and caregivers (husbands, wives, or relatives) [@b5],[@b6].
Patients tend to focus on their illness and their body. However, their emotional burden often causes the adoption of strong dysfunctional defense mechanisms that can bring them to deny the idea of being ill and consequently to refuse or not seek the help of medical staff [@b7],[@b8]. Denial and negation defenses can delay the diagnosis and reduce adherence to treatment and follow-up [@b9]--[@b12]. Caregivers can be the link between patients and physicians, supporting and creating a good alliance between the two that is considered essential for patients to overcome dysfunctional defense mechanisms. Psychosocial intervention for caregivers can be of paramount importance in improving the quality of life of patients and their families [@b13],[@b14], especially in terms of better global functioning.
Patients and caregivers are not, however, the only protagonists of the battle against cancer. Oncologists and nurses deal with existential questions of life and death daily, which are always difficult issues to face and manage. It has been demonstrated that medical oncologists are more prone to experience symptoms of depression than other internal medicine physicians and this phenomenon can be observed even during their training [@b15]--[@b17]. If these difficulties are not recognized promptly they can lead to burnout, a syndrome characterized by a loss of enthusiasm for work, a feeling of cynicism, and a low sense of personal accomplishment, which can cause medical errors and malpractice [@b18],[@b19]. Other factors can contribute to the development of a burnout: excessive workload, a sense of impotence, frustration, limited autonomy, and a perception that one\'s own work is meaningless. These factors might further reduce autonomy and efficiency, increase workload, and reduce the willingness to interact with patients, thereby worsening the relationship between patients and medical staff [@b20],[@b21]. This is an important point as one of the causes of depression in patients is a poor relationship with physicians, or in general with all the oncological staff [@b22]. Emotional distress is also a strong predictor of poor self-management and high health care costs.
Given the prevalence of distress among oncologists and its implications for patients and their care, it could be important to make physicians undergo periodic screening or monitoring for burnout particularly because they often do not look for help. There is now considerable evidence that any intervention in oncological staff and caregivers increases their capacity to bear emotional burdens and consequently improves the patients\' quality of life [@b23].
Starting from these observations, we decided to focus on the "constellation" of people (nurses, physicians, and caregivers) around patients affected by multiple myeloma and designed a pilot study. The project, conducted in the three groups, was focused on the identification of personal responses to stressful situations (defense mechanisms) evaluated through several assessment tools administered to the participants at baseline and after completion of the psychological intervention. The identification of defense mechanisms against illness is of the utmost importance: on the one hand, these mechanisms represent a way of coping with anxiety triggered by threat, on the other hand, they allow people to establish new ways of relating with the world and with themselves. The aim of this explorative study was to evaluate the effect of a group intervention in improving caregivers\' knowledge and quality of life, and in promoting among physicians and nurses a different way of facing the difficulties of their job.
Methods
=======
Participants and interventions
------------------------------
An explorative study was carried out between caregivers, physicians and nurses of Policlinico San Matteo of Pavia, Italy. Hematologists and nurses participated voluntarily; the caregivers invited to participate were sampled stratifying for phases of disease (onset, relapse, advanced phase). The number of participants from each group who dropped out during the study was recorded (early and late dropouts). The study was approved by the Ethics Committee of Policlinico San Matteo of Pavia, and all participants signed a written informed consent.
The research was divided into three phases: the preintervention phase (T0), the intervention period, and the follow-up (T1).
In the preintervention phase, individual interviews, of 50 min each, were conducted by a clinical psychologist to introduce the topic and the objective of the research, to administer the questionnaires response evaluation measure (REM-71), Satisfaction profile (SAT-P), and to investigate the present level of personal satisfaction and stress. The questionnaires, anonymous and self-compiled, were the same for all participants.
In the second phase of the study, the intervention period, each group (caregivers, physicians, nurses) was planned to have 30 sessions, each of 60 min, using a "Balint Group" method [@b24],[@b25], modified according to a mindfulness technique [@b26],[@b27]. This method promotes a group process of exploration and training based on reflection about relational experiences with patients, focusing on development of attentive awareness of sensations, thoughts, and perceptions of reality at the time of the session. The group leader presented the topic of each discussion. At the end of each session, an anonymous questionnaire group climate questionnaire (GCQ) was administered to all participants.
In the final phase (T1), at the end of all sessions (after 1 year), the same procedure as in the preintervention phase was used.
Assessment tools
----------------
The research was focused on the identification of personal responses to stressful situations and then on the development of more adaptive ways of managing these situations. The assessment tools (REM-71, SAT-P, and GCQ) were not specific for the populations in the study.
### Response evaluation measures-71
The REM-71 [@b28] is a self-report questionnaire to assess defense mechanisms in adults through the use of 71 items, measured on a Likert scale from 1 (complete disagreement) to 9 (complete agreement). The scale defines defenses as self-regulatory processes that could be considered metrics of positive psychological health. The theoretical approach of the instrument implies a developmental model of defenses placed along a continuum of maturity--immaturity. The scale\'s validity is supported by several studies involving adults, adolescents, and school-aged children. Defenses were grouped into two factors: Factor 1 (*immature defenses*) and Factor 2 (*mature defenses*) [@b29] ([Table 1](#tbl1){ref-type="table"}). Factor 1 comprises 14 defenses that distort reality in accordance with expected outcomes, leading to less adaptive functioning. Factor 2, by contrast, comprises seven defenses that attenuate unwelcome reality, allowing more adaptive functioning. We considered estimated values ≥4.4 [@b30] as indicating a potentially dysfunctional way of using defense mechanisms. Mean values of defense mechanisms obtained through questionnaires were compared with those of the standard population [@b30].
######
Description of defense mechanisms.
Description Sample item
--------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------------------
*Factor 1*
"Immature defenses" The individual deals with emotional conflicts or internal or external stressors...
Acting out ... by actions rather than reflections or feelings When I am upset I do things without thinking
Splitting ... by viewing himself or herself or others as all good or all bad, failing to integrate the positive and negative qualities of the self and others into a cohesive images When someone I like lets me down, I usually trust them again
Displacement ... by generalizing or redirectioning a feeling about one object onto another, usually less-threatening object I won\'t let people in authority know I\'m angry at them, but everyone else better watch out!
Dissociation ... by a temporary alteration in the integrative functions of consciousness, memory, perception of self or the environment, or sensory/motor behavior. I often get the feeling that whatever is going on is not really happening to me
Fantasy (Autistic) ... by excessive daydreaming as a substitute for human relationship, more direct and effective action, or problem solving I like to imagine that my life is very different.
Passive aggression ... by indirectly, unassertively, and often self-detrimentally expressing aggression toward others. There is a facade of overt compliance masking covert resistance, resentment, or hostility If someone is unfair to me I probably won\'t do what I told them I\'d do.
Projection ... by falsely attributing to another his or her own unacceptable feelings, impulses, or though I am usually treated unfairly.
Repression ... by being unable to remember or unable to be cognitively aware of disturbing wishes, thoughts, or experiences When I should have strong feelings, I don\'t\' feel anything
Omnipotence ... by feeling or acting as if he or she possesses special powers or abilities and is superior to others I don\'t want to brag, but usually I\'m the one who knows how to get things done
Undoing ... by words or behavior designed to negate or to make amends symbolically for unacceptable thoughts, feelings, or actions I repeat special thoughts or words over and over to myself when I am uptight or frightened
Conversion ... by convert mental conflict to a physical symptom Sometimes I have lost all the feeling in one part of my body and nobody could explain why
Somatization ... by the expression of psychological conflict via bodily symptoms without symbolic content When I get stressed I get ill really easily
Withdrawal ... by the retreat from reality, and removal of self from usual social discourse When things upset me I\'d rather be by myself
Suppression ... by intentionally avoid thinking about disturbing problems, desires, feelings or experiences When I need to, I can put my problems on hold until later when I can think about them.
*Factor 2*
"Mature defenses" The individual deals with emotional conflicts or internal or external stressors...
Denial ... by refusing to acknowledge some painful aspect of external reality or subjective experience that would be apparent to others When I am upset I remind myself that everything is really okay
Humor ... by emphasizing the amusing or ironic aspects of the conflict or stressor When things go wrong, I can still see the funny side
Intellectualization ... by the excessive use of abstract thinking or the making of generalizations to control or minimize disturbing feelings I use reason and logic, not feelings, to understand people
Reaction formation ... by substituting behavior, thoughts, or feelings that are diametrically opposed to his or her own unacceptable thoughts or feelings Often I act really nice when actually I am pretty upset
Idealization ... by attributing exaggerated positive qualities to self or other I know this great person whose advice I can usually trust
Altruism ... by caring of others needs in order to satisfy his own I go out of my way to help people
Sublimation ... by channeling potentially maladaptive feelings or impulses into socially acceptable behavior I like to write stories or poems when I\'ve just been through a really rough situation
### Satisfaction profile
The SAT-P [@b31] is a self-report scale widely used in the health care context. The scale defines satisfaction as the result of a cognitive process that compares real with ideal expectations. Level of satisfaction is linked to the gap between real and ideal expectations. The SAT-P assesses subjective satisfaction in the preceding month using five macro-categories: psychological and physical functioning, work, sleep/diet/free time, and social functioning. The questionnaire consists of 32 items, measured on a visual analog scale: the level of agreement with a statement is indicated by marking a position along a continuous line (10 cm) between two end-points (totally satisfied/totally dissatisfied). It assesses a satisfaction profile that should be integrated with clinical data.
### Group climate questionnaire---short version
The GCQ [@b32],[@b33] is a self-report questionnaire consisting of 12 items rated on a 6-point scale, from 1 = not at all to 6 = extremely. It measures how members consider their group experience through three scales: engagement, conflict, avoidance. Engagement is the degree of cohesion and work orientation of the group. Avoidance is the degree to which individuals rely on group members and leaders. Conflict consists of the subscales friction, distrust, and mutual withdrawal. The GCQ was administered after every group session.
Statistical analysis
--------------------
Data were described as means and standard deviations (SD), if continuous, and as counts and percentages, if categorical. Within-subject comparisons of scores were performed by means of a general linear regression model for repeated measures, with calculation of robust standard errors to account for within-subject correlation. Mean changes and 95% confidence intervals (95% CI) were computed. The association between GCQ scores and number of sessions was assessed with Spearman\'s rho coefficient. For this analysis, data were anonymous and were pooled across groups.
Stata 12 [@b34] was used for statistical computations. A two-sided *P*-value \<0.05 was considered statistically significant.
Results
=======
Thirty-four subjects were enrolled in the study (10 caregivers, 11 physicians, and 13 nurses). Four participants (two caregivers, one physician, and one nurse) dropped out the study, three within the first 3 months (early dropout) and one after 3 months (late dropout). The three early dropouts, one caregiver, one physician, and one nurse, stopped participating for employment reasons; the other caregiver (the late dropout) withdrew from the study because of the worsening clinical condition and unbearable increased care of the relative.
Caregivers
----------
At baseline, the frequency of immature defenses was higher than that of mature ones. As shown in [Figure 1](#fig01){ref-type="fig"}B, the most frequent (≥50%) immature mechanisms were: fantasy (100%), withdrawal (90%), repression (90%), projection (70%), dissociation (70%), passive aggression (50%), conversion (50%), and undoing (50%). The only two mature mechanisms were altruism (80%) and intellectualization (70%) (Fig. [1](#fig01){ref-type="fig"}A).
{#fig01}
The comparison of the mean values of defense mechanisms in caregivers at baseline with those of the standard population ([Table 2](#tbl2){ref-type="table"}) showed higher values for four immature defenses: fantasy, conversion, projection, and repression.
######
Mean scores of the standard population and participants of all three groups at baseline, prior to the intervention.
Defenses Adult population (*n* = 543) Caregivers T0 (*n* = 10) Hematologists T0 (*n* = 11) Nurses T0 (*n* = 13)
---------------------- ------------------------------ -------------------------- ----------------------------- ----------------------
Immature defenses
Acting out 3.63 ± 1.63 1.00 ± 0.00 1.97 ± 1.57 1.97 ± 1.57
Splitting 5.24 ± 1.69 3.85 ± 2.10 4.77 ± 1.88 4.77 ± 1.88
Displacement 3.06 ± 1.61 5.85 ± 1.75 5.72 ± 1.61 5.72 ± 1.61
Dissociation 3.14 ± 1.68 4.27 ± 2.72 5.67 ± 2.08 5.67 ± 2.08
Fantasy 3.44 ± 1.84 7.73 ± 0.76 8.00 ± 0.68 8.00 ± 0.68
Passive aggression 3.99 ± 1.45 4.18 ± 2.21 5.31 ± 1.55 5.31 ± 1.55
Projection 2.20 ± 1.22 5.68 ± 2.09 5.75 ± 1.15 5.75 ± 1.15
Repression 3.52 ± 1.75 6.18 ± 2.40 4.77 ± 1.87 4.77 ± 1.87
Omnipotence 4.45 ± 1.44 4.58 ± 1.99 5.33 ± 1.58 5.33 ± 1.58
Undoing 3.60 ± 1.81 4.98 ± 1.62 5.10 ± 1.03 5.10 ± 1.03
Conversion 1.26 ± 0.78 5.33 ± 2.14 5.51 ± 1.38 5.51 ± 1.38
Somatization 4.16 ± 1.98 5.18 ± 3.06 4.92 ± 1.67 4.92 ± 1.67
Withdrawal 5.58 ± 2.05 5.85 ± 1.21 6.58 ± 0.91 6.58 ± 0.91
Suppression 3.98 ± 2.13 3.15 ± 1.82 3.79 ± 1.27 3.79 ± 1.27
Mature defenses
Denial 4.19 ± 1.70 3.38 ± 1.07 3.86 ± 0.96 3.86 ± 0.96
Humor 5.15 ± 1.69 2.64 ± 1.21 2.36 ± 0.83 2.36 ± 0.83
Intellectualization 4.63 ± 1.37 5.03 ± 2.71 5.25 ± 1.93 5.25 ± 1.93
Reaction formation 4.00 ± 1.56 2.85 ± 0.75 3.77 ± 1.46 3.77 ± 1.46
Idealization 6.00 ± 1.82 3.15 ± 1.43 3.15 ± 1.36 3.15 ± 1.36
Altruism 7.35 ± 1.18 5.00 ± 2.76 6.38 ± 1.66 6.90 ± 2.73
Sublimation 5.19 ± 1.62 3.64 ± 1.15 4.75 ± 1.25 3.90 ± 2.10
The follow-up analysis performed after the intervention showed a general tendency to normalization with a significant increase in mature defense mechanisms (such as humor, idealization, and denial) and a decrease in many immature defense mechanisms, in particular, those that had been found to be significantly higher with respect to the standard population (fantasy, repression, projection, and conversion). We also observed an increase in one immature defense: suppression. Changes between before and after the group intervention and the 95% CI are illustrated in [Figure 2](#fig02){ref-type="fig"}A.
{#fig02}
At baseline, SAT-P results were all within the range of the standard population. This finding conflicted with the information that emerged from the individual interviews which revealed remarkable difficulties in managing everyday life. After the intervention, all scores for quality of life perception increased by 10%--20%, although this improvement just fell short of being statistically significant ([Table 3](#tbl3){ref-type="table"}).
######
Satisfaction profile scores of the three groups before (T0) and after (T1) treatment, with associated 95% confidence intervals and statistical significance.
Caregivers Hematologists Nurses
------------------------- --------------- --------------- ------------------------ ------ --------------- --------------- ------------------------- ------ --------------- --------------- ------------------------- ------
Psychological function 66.99 ± 10.31 76.63 ± 10.30 9.64 (−0.97 to 20.24) 0.07 66.68 ± 13.36 62.59 ± 11.80 −4.09 (−16.62 to −8.44) 0.50 70.60 ± 14.94 64.06 ± 15.93 −6.54(−11.55 to 10.93) 0.33
Physical function 53.07 ± 15.13 64.84 ± 17.28 11.77 (−6.31 to 29.85) 0.18 57.93 ± 10.55 51.59 ± 10.82 −6.34 (−16.64 to 3.97) 0.21 57.36 ± 14.12 51.28 ± 17.80 −6.08 (−20.35 to 8.19) 0.38
Job 63.02 ± 23.67 68.69 ± 23.79 5.66 (−19.78 to 31.10) 0.64 66.38 ± 21.87 63.18 ± 17.21 −3.20 (−21.04 to 14.64) 0.71 66.22 ± 18.17 61.67 ± 10.91 −0.54 (−12.62 to 11.54) 0.93
Sleep/eating/spare time 62.24 ± 15.03 73.31 ± 10.51 11.07 (−2.06 to 24.21) 0.09 47.78 ± 11.87 50.24 ± 15.70 2.46 (−10.29 to 15.21) 0.69 55.31 ± 15.95 49.67 ± 17.84 −5.64 (−19.70 to 8.42) 0.41
Social function 71.93 ± 22.76 79.62 ± 12.29 7.69 (−11.33 to 26.71) 0.40 76.39 ± 13.82 76.23 ± 14.01 −0.16 (−12.85 to 12.52) 0.98 63.46 ± 20.46 62.45 ± 16.27 −1.02 (−16.28 to 14.25) 0.89
As regards the GCQ (assessed at each session), the number of followed sessions showed a direct correlation with the "Engagement" factor and an inverse correlation with the "Conflict" factor ([Table 4](#tbl4){ref-type="table"}).
######
Climate group significance level and Spearman\'s correlation coefficient. *n* values represent the total number of intervention sessions for each group.
Caregivers (*n* = 24) Hematologists (*n* = 33) Nurses (*n* = 33)
------------ ----------------------- -------------------------- ------------------- -------- --------- --------
Engagement **0.2340** **0.0322** 0.0548 0.5361 0.0533 0.5244
Conflict **−0.3060** **0.0044** −0.1006 0.2546 −0.0709 0.3921
Avoidance 0.0937 0.3997 −0.1619 0.0658 −0.1139 0.1867
Values in bold are statistically significant.
Hematologists
-------------
The baseline, preintervention data revealed a predominance of immature strategies (Fig. [1](#fig01){ref-type="fig"}B): fantasy (100%), withdrawal (90%), projection (73%), displacement (73%), somatization (64%), conversion (64%), repression (64%), dissociation (54%), and undoing (54%). The only two mature defenses were altruism (64%) and intellectualization (54%) (Fig. [1](#fig01){ref-type="fig"}A).
The comparison with the standard population ([Table 2](#tbl2){ref-type="table"}) showed that hematologists, like the caregivers, prevalently used immature defense mechanisms, in particular: fantasy, conversion, and projection.
The analysis after the intervention highlighted a significant increase in mature defenses (such as humor, altruism, idealization, and denial), and a decline of many immature defenses, in particular, those identified as being significantly more frequent with respect to the standard population: fantasy, conversion, and projection. There was clear evidence of a general tendency to normalization for all defenses. Changes between before and after the group intervention and the 95% CI are illustrated in [Figure 2](#fig02){ref-type="fig"}B.
The preintervention evaluation of perceived quality of life showed the same discrepancy as in the group of caregivers between what was picked up by the SAT-P results, which were all in the standard population average, and what emerged from the interviews. In this group, the change from baseline was very close to zero, and far from being statistically significant ([Table 3](#tbl3){ref-type="table"}).
Climate group evaluation showed a direct correlation between the number of followed sessions and the "Engagement" factor, and an inverse correlation between the number of followed sessions and "Conflict" and "Avoidance" factors ([Table 4](#tbl4){ref-type="table"}). However, these relations were not statistically significant.
Nurses
------
A high frequency of immature defenses was observed also in this group (Fig. [1](#fig01){ref-type="fig"}B): fantasy (100%), withdrawal (100%), dissociation (85%), projection (85%), passive aggression (77%), displacement (77%), somatization (69%), conversion (69%), undoing (69%), omnipotence (61%), repression (54%), and splitting (54%). Only two mature defenses were present: altruism (85%) and intellectualization (54%) (Fig. [1](#fig01){ref-type="fig"}A). The mean values for some of the defenses (fantasy, projection, and conversion) were higher than those in the standard population ([Table 2](#tbl2){ref-type="table"}).
In line with the results of the other groups (caregivers and hematologists), at follow-up, mature defenses (humor, altruism, idealization, and denial) increased significantly, while immature defenses tended to decrease. Only one immature defense increased: suppression. Changes between before and after the intervention and their 95% CI are reported in [Figure 2](#fig02){ref-type="fig"}C.
Before the intervention, the SAT-P results were all similar to those in the standard population. As for the hematologists, there were virtually no changes in the SAT-P score in nurses after the intervention ([Table 3](#tbl3){ref-type="table"}). Once again, there was an evident discrepancy between the results of the questionnaire and the interviews.
As for the hematologists, the number of followed sessions showed a direct correlation with the "Engagement" factor and inverse correlations with "Conflict" and "Avoidance" factors, but these relationships were not statistically significant ([Table 4](#tbl4){ref-type="table"}).
Discussion
==========
The emotional burden of caregivers has usually been characterized in previous studies as creating anxiety and depression with a low quality of life (both physical and psychological). For nurses and physicians who deal with oncological diseases, most studies have focused on burnout and its personal (anxiety, depression) and professional (malpractice) consequences. In both cases, well-being and personal growth were measured in terms of specific symptoms and consequently any therapeutic approaches were addressed at eliminating these symptoms.
In contrast, the new approach adopted in this explorative study arose from the belief that a reintegration of personal satisfaction cannot be obtained only from reducing symptoms or improving quality of life, but requires the development of more functional and mature ways of facing reality and its stressful situations, such as severe illness.
The analysis performed at baseline, prior to the intervention, showed a high frequency of immature defenses in all three groups: this implies less functional and adaptive ways of facing everyday situations and a low acceptance of reality. This was confirmed by the comparison of our sample with the standard population; all three groups showed, as a common finding, three immature defenses: fantasy, conversion, and projection. The use of these mechanisms of defense is consistent with evoking a death fantasy as a consequence of a confrontation with a severe illness. Conversion is a defensive response to death and contamination anxiety evoked by illness. It could be considered as an unconscious identification with the sick role, reproducing somatic symptoms observed in patients to reduce stress. Projection is a way of transferring unacceptable feelings, such as anger, to other people, that is turning the inner danger into an outer one. For example, the hospital environment could be perceived as constantly hostile and dangerous. Fantasy is a way of coping with problems and situations that evoke great impotence through an excessive use of daydreaming as a substitute for human relationships, more direct and effective action, or problem solving. The frequent use of fantasy as a defense in this context could also embellish the interpretation of somatic symptoms, leading to the idea of being affected by a serious illness. Contrariwise, the use of repression as a defense mechanism, which was more common in caregivers than in the standard population, could lead to an inability to remember diseases, shifting attention to specific symptoms of illness or to drug-related side effects.
The effect of the psychological intervention was evident in all groups. We observed a decrease of immature defenses, including those that were more present in our study groups at baseline than in the standard population and an increase in mature defenses *(*humor, idealization, and denial) after the intervention. Altruism increased among physicians and nurses especially in solidarity and cooperation with the colleagues. By contrast, altruism remained stable in caregivers, due to its high value at baseline. An increase in mature defenses implies a greater ability to accept and mitigate the unpleasant aspects of reality, with consequent better self-management.
This trend to normalization in the use of defense mechanisms, in common to all the groups, is a clear indication of the effect of the intervention. Of note, in caregivers and nurses, suppression, which was within the normal range for standard adults at baseline, increased after the intervention. This could be due to the short duration of the intervention and so it might indicate a transitional stage, as already well described in psychotherapy literature. This phenomenon is explained by the fact that defense mechanisms are structures that change slowly, requiring time to develop and become stabilized [@b35].
During the intervention, cohesion increased in all three groups and the avoidance of personal responsibility of work group decreased. Cohesion is comparable to therapeutic alliance in individual psychotherapy [@b36]. Our approach was also effective in creating a good group climate focused on more productive cooperation and support. However, although significant, the correlation was weak.
Quality of life perception did not change significantly after the invention, except for a relevant, but not statistically significant, increase in scores in the caregiver\'s cohort only. This could be due to the caregivers\' greater attendance at sessions, which implied reinforcement of the group treatment, in line with the GCQ results.
In conclusion, this study suggests that a work group, promoting sharing and collaboration, leads to the induction of mature defenses enabling reality to be faced in a more adaptive and effective way. As defense mechanisms are unconscious functions, once established, people keep on using them in their everyday life. The development of more adaptive strategies can help caregivers to accept their new stressful condition, and consequently provide better assistance for the people they are caring for, and can help hematologists and nurses foster better ways to face frustration and impotence, in order to prevent burnout and facilitate their relationships with patients. Therefore, results of this study offer a useful starting point for the planning and the development of future studies with the aim to evaluate the efficacy of the "Balint Group" modified method on caregivers\' quality of life and on the ability of physicians and nurses to deal with stressful situations.
Conflict of Interest
====================
None declared.
Funding Information
===================
No funding information provided.
|
Q:
how can I replace the center of power in Christendom from Rome to Constantinople?
I, Emperor Lucifer the 1st, am the undisputed ruler of the Byzantine Empire, better known as the True Roman Empire. To secure my dominance, I plan to cement myself as the ruler of all Christendom in Europe. This will be done by establishing a pentarchy made up of the 5 most powerful and influential holy sees: Rome, Antioch, Alexandria, Jerusalem, and Constantinople. This pentarchy will be led by a council made up of the five heads (patriarchs) of these areas. This council will rule all of Christendom, with Constantinople at its main center of power.
My plan has a few obstacles. Every eastern church father accepted the role of Pope as primary authority of the Church on Earth. Emperors accepted the primacy of the Pope, and it was to St. Peter that Jesus said "Upon this rock I shall build my church". For my plan to work, I must force other religious leaders to disregard the Pope's authority and look to my capital city for guidance. Moving the capital from Rome to Constantinople was instrumental, but it was not enough, as the Pope is still considered first among equals.
The first step in my plan is to assassinate Pope Leo and sack Rome, replacing him with a more cooperative Pope. This would end Rome's power base and make its rival Constantinople the undisputed center of christianity. However, I still need the other patriarchs and their flock to accept the new power structure, either willingly or through force.
How can I make this church model official and keep it under Byzantine control?
A:
No.
You have quite a few misconceptions about how the Church works.
Assassinating the Pope is an excellent way to turn every patriarch, bishop and faithful Christian in the East against you. Every eastern church father accepted the role of Pope as primary authority of the Church on Earth. Cyril of Jerusalem (Peter, the chief and foremost leader of the Apostles...); John Chrysostom (In those days Peter rose up in the midst of the disciples (Acts 15), both as being ardent, and as intrusted by Christ with the flock ...he first acts with authority in the matter, as having all put into his hands ; for to him Christ said, 'And thou, being converted, confirm thy brethren.); Proclus of Constatninople (Peter, the coryphaeus of the disciples, and the one set over (or chief of) the Apostles. Art not thou he that didst say, 'Thou art the Christ, the Son of the living God'?).
Emperors accepted the primacy of the Pope: Justinian (Yielding honor to the Apostolic See and to Your Holiness, and honoring your Holiness, as one ought to honor a father, we have hastened to subject all the priests of the whole Eastern district, and to unite them to the See of your Holiness, for we do not allow of any point, however manifest and indisputable it be, which relates to the state of the Churches, not being brought to the cognizance of your Holiness, since you are the Head of all the holy Churches.); Justinian to a different Pope (Let your Apostleship show that you have worthily succeeded to the Apostle Peter, since the Lord will work through you, as Surpreme Pastor, the salvation of all.)
Ultimately, very many Popes have been martyred (almost all the early ones were) or murdered. The fact remains quite simple: Jesus chose Peter; Peter is the Bishop of Rome; all the Church looked to Rome for pastoral guidance. If you assassinate one, another one is going to be chosen. You may be able to keep one in your imperial pocket, but sooner or later, you'll just be excommunicated and probably deposed if not outright assassinated yourself.
|
The invention relates generally to an apparatus for producing photoreceptors and, more particularly, to an apparatus for producing the hollow drum selenium photoreceptors used in reproduction machines.
The photoreceptors used in reproduction equipment generally are composed of three components: (1) the conductive substrate, usually aluminum, (2) an insulating layer of aluminum oxide, usually several hundred angstroms thick, and (3) the photosensitive thin film, usually selenium or selenium alloy approximately fifty microns thick. The primary manufacturing process steps for producing the photoreceptors include: etching and cleaning the substrate, growing the aluminum oxide layer, usually in an oven, cleaning again, and finally the deposition of the photosensitive film. The etching and cleaning process is typically quite involved and requires several cleaning and rinsing tanks, including de-ionized water final rinses. The thermal conditioning of the photoreceptor substrate during the process is important as it defines the solidification and crystalization characteristics of the selenium or selenium alloy photosensitive material being deposited on the substrate. These characteristics in turn determine the photosensitivity of the receptor as well as such optical properties as spectral (color) response, and color peaking.
The above noted selenium and selenium alloy coating process conventionally employed to produce photoreceptors is quite well known and the design and manufacture of apparatus to perform the process, although complex, is generally within the state-of-the-art. However, one nagging problem has been an inability to consistently heat the aluminum substrates to the proper temperature and uniformity prior to the deposition of the selenium coating. The failure to achieve coating temperature objectives, can render production equipment virtually useless.
Many coating systems in the past were designed with fluid systems to heat a drum supporting mandrel and relied on conduction heat transfer to heat drum substrates. Such systems function reasonably well in air as the variations in the contacting surfaces are filled by a gaseous interface that assists the transfer of heat. In a vacuum, however, the actual contact area (and thus the heat transfer area) is a series of points, the total area of which is so small that the heating time is very long, and when coupled with any losses, markedly limits or prohibits uniform heating.
In attempts to improve the heating portion of the process, early workers in the field investigated the then evolving gaseous plasma technology as an energy source. Producing discharge to a substrate functioning as a cathode produced very uniform heating, but the plasma energy was too low to produce reasonable heating rates. After investigating the potential of confining the plasma to increase its energy in the immediate area of the substrate, the concept was abandoned due to the difficulty and potential cost of developing a machine of this nature.
The result of this early plasma research suggested that a viable solution existed if the energy could be increased. This fact moved the research toward an older and more thoroughly understood technology, electron bombardment. By controlling the voltage and current of a tungsten filament in a vacuum, it is possible to control the emission of electrons. It is further possible to direct the path of these electrons by means of proper grounding, magnetic fields and/or properly charged shields. Electrons can be emitted in sufficient quantity to achieve heating rates considerably greater than the ion bombardment of normal plasmas. By properly designing the emitting filament relative to the substrate geometry and rotating the substrate past the filament it was found that the required uniformity could be achieved. Unfortunately, the laboratory experiments did not scale up to a production machine very easily. Great difficulty was encountered in controlling the tremendous power supplies required to power the filaments. The systems were prone to generating high voltage arcs as they become more contaminated by each production cycle. The arcs very typically would backtrack through the system wiring buring out electrical components and controls. The production time of electron bombardment equipment is often less than the system down time.
The tungsten filaments required electron bombardment systems also are a source of considerable problems. The filaments are typically 1/32" to 3/32" in diameter and from 30" to 90" long. They tend to become brittle after only a few heating cycles. Failure usually results in the destruction of some substrates and unacceptable coatings of all the substrates associated with the filament. The thermal expansion mechanism supporting the filament tends to further complicate the filament failure.
The object of this invention, therefore, is to provide an improved system for producing the selenium coated photoreceptors used in reproduction equipment. |
Q:
PHP session IDs -- how are they generated?
When I call session_start() or session_regenerate_id(), PHP generates what appears to be a random string for the session ID. What I want to know is, is it just a random sequence of characters, or is it like the uniqid() function?
Because if it's just random characters, couldn't you theoretically run into a conflict? If User A logged in and then User B logged in and, though highly unlikely, User B generated the same session ID, then User B would end up accessing User A's account.
Even if PHP checks to see if a session with the same ID already exists and, if so, regenerates an ID again... I don't think I want a system that EVER produces the same ID twice, even after garbage collection -- maybe I want to store a table of them and check against them for possible hijacking or whatever.
If it isn't unique, how should I go about enforcing uniqueness? I'd rather implement it using PHP configuration than in every script I make. Nice thing about PHP sessions is not worrying about the technical details behind the scenes.
A:
If you want to know how PHP generates a session ID by default check out the source code on Github. It is certainly not random and is based on a hash (default: md5) of these ingredients (see line 310 of code snippet):
IP address of the client
Current time
PHP Linear Congruence Generator - a pseudo random number generator (PRNG)
OS-specific random source - if the OS has a random source available (e.g. /dev/urandom)
If the OS has a random source available then strength of the generated ID for the purpose of being a session ID is high (/dev/urandom and other OS random sources are (usually) cryptographically secure PRNGs). If however it does not then it is satisfactory.
The goal with session identification generation is to:
minimise the probability of generating two session IDs with the same value
make it very challenging computationally to generate random keys and hit an in use one.
This is achieved by PHP's approach to session generation.
You cannot absolutely guarantee uniqueness, but the probabilities are so low of hitting the same hash twice that it is, generally speaking, not worth worrying about.
A:
Here is the code that generates the id:
Session.c
Specifically the php_session_create_id function:
PHPAPI char *php_session_create_id(PS_CREATE_SID_ARGS) /* {{{ */
{
PHP_MD5_CTX md5_context;
PHP_SHA1_CTX sha1_context;
#if defined(HAVE_HASH_EXT) && !defined(COMPILE_DL_HASH)
void *hash_context = NULL;
#endif
unsigned char *digest;
int digest_len;
int j;
char *buf, *outid;
struct timeval tv;
zval **array;
zval **token;
char *remote_addr = NULL;
gettimeofday(&tv, NULL);
if (zend_hash_find(&EG(symbol_table), "_SERVER", sizeof("_SERVER"), (void **) &array) == SUCCESS &&
Z_TYPE_PP(array) == IS_ARRAY &&
zend_hash_find(Z_ARRVAL_PP(array), "REMOTE_ADDR", sizeof("REMOTE_ADDR"), (void **) &token) == SUCCESS
) {
remote_addr = Z_STRVAL_PP(token);
}
/* maximum 15+19+19+10 bytes */
spprintf(&buf, 0, "%.15s%ld%ld%0.8F", remote_addr ? remote_addr : "", tv.tv_sec, (long int)tv.tv_usec, php_combined_lcg(TSRMLS_C) * 10);
switch (PS(hash_func)) {
case PS_HASH_FUNC_MD5:
PHP_MD5Init(&md5_context);
PHP_MD5Update(&md5_context, (unsigned char *) buf, strlen(buf));
digest_len = 16;
break;
case PS_HASH_FUNC_SHA1:
PHP_SHA1Init(&sha1_context);
PHP_SHA1Update(&sha1_context, (unsigned char *) buf, strlen(buf));
digest_len = 20;
break;
#if defined(HAVE_HASH_EXT) && !defined(COMPILE_DL_HASH)
case PS_HASH_FUNC_OTHER:
if (!PS(hash_ops)) {
php_error_docref(NULL TSRMLS_CC, E_ERROR, "Invalid session hash function");
efree(buf);
return NULL;
}
hash_context = emalloc(PS(hash_ops)->context_size);
PS(hash_ops)->hash_init(hash_context);
PS(hash_ops)->hash_update(hash_context, (unsigned char *) buf, strlen(buf));
digest_len = PS(hash_ops)->digest_size;
break;
#endif /* HAVE_HASH_EXT */
default:
php_error_docref(NULL TSRMLS_CC, E_ERROR, "Invalid session hash function");
efree(buf);
return NULL;
}
efree(buf);
if (PS(entropy_length) > 0) {
#ifdef PHP_WIN32
unsigned char rbuf[2048];
size_t toread = PS(entropy_length);
if (php_win32_get_random_bytes(rbuf, MIN(toread, sizeof(rbuf))) == SUCCESS){
switch (PS(hash_func)) {
case PS_HASH_FUNC_MD5:
PHP_MD5Update(&md5_context, rbuf, toread);
break;
case PS_HASH_FUNC_SHA1:
PHP_SHA1Update(&sha1_context, rbuf, toread);
break;
# if defined(HAVE_HASH_EXT) && !defined(COMPILE_DL_HASH)
case PS_HASH_FUNC_OTHER:
PS(hash_ops)->hash_update(hash_context, rbuf, toread);
break;
# endif /* HAVE_HASH_EXT */
}
}
#else
int fd;
fd = VCWD_OPEN(PS(entropy_file), O_RDONLY);
if (fd >= 0) {
unsigned char rbuf[2048];
int n;
int to_read = PS(entropy_length);
while (to_read > 0) {
n = read(fd, rbuf, MIN(to_read, sizeof(rbuf)));
if (n <= 0) break;
switch (PS(hash_func)) {
case PS_HASH_FUNC_MD5:
PHP_MD5Update(&md5_context, rbuf, n);
break;
case PS_HASH_FUNC_SHA1:
PHP_SHA1Update(&sha1_context, rbuf, n);
break;
#if defined(HAVE_HASH_EXT) && !defined(COMPILE_DL_HASH)
case PS_HASH_FUNC_OTHER:
PS(hash_ops)->hash_update(hash_context, rbuf, n);
break;
#endif /* HAVE_HASH_EXT */
}
to_read -= n;
}
close(fd);
}
#endif
}
digest = emalloc(digest_len + 1);
switch (PS(hash_func)) {
case PS_HASH_FUNC_MD5:
PHP_MD5Final(digest, &md5_context);
break;
case PS_HASH_FUNC_SHA1:
PHP_SHA1Final(digest, &sha1_context);
break;
#if defined(HAVE_HASH_EXT) && !defined(COMPILE_DL_HASH)
case PS_HASH_FUNC_OTHER:
PS(hash_ops)->hash_final(digest, hash_context);
efree(hash_context);
break;
#endif /* HAVE_HASH_EXT */
}
if (PS(hash_bits_per_character) < 4
|| PS(hash_bits_per_character) > 6) {
PS(hash_bits_per_character) = 4;
php_error_docref(NULL TSRMLS_CC, E_WARNING, "The ini setting hash_bits_per_character is out of range (should be 4, 5, or 6) - using 4 for now");
}
outid = emalloc((size_t)((digest_len + 2) * ((8.0f / PS(hash_bits_per_character)) + 0.5)));
j = (int) (bin_to_readable((char *)digest, digest_len, outid, (char)PS(hash_bits_per_character)) - outid);
efree(digest);
if (newlen) {
*newlen = j;
}
return outid;
}
As you can see the actual id is a hash of a mixture of things, like the time of day. So there is a possibility of running into a conflict, however, it has a very low possibility. So much so, it is not worth worrying about unless you have lots of concurrent users.
However, if you really are worried you can increase the entropy by setting a different hash algorithm session.hash_function
As far as monitoring active sessions, this question covers it well Is it possible to see active sessions using php?
If you are using a single instance of php on a single machine, then it actually has a built in session manager that checks whether an id already exists before assigning it. However, if you are running multiple instances or multiple machines it has no way of knowing what ids have been assigned by other machines.
|
Symmetrical lateralization of function in the auditory system of the cat: effects of unilateral ablation of cortex.
We have presented behavioral evidence suggesting that one function of auditory cortex is to attend to stimuli at the contralateral ear. Further, behavioral and anatomic evidence shows that the neural mechanisms for this function probably depend on a pathway that crosses at the level of the medulla, bypasses the superior olive, and ascends to the contralateral inferior colliculus. At higher centers there are several auditory pathways from thalamus to cortex, as well as descending pathways from cortex, and some of these pathways may play a role in selective listening with one ear. |
Instagram
Follow Us on
Media
Events
The Editorial
SEA BREEZE
One of the first posts from my time in Phuket recently. This was our second day at our Airbnb and I grabbed Dad to come do my shoot in the morning on the beach because Naina wanted to sleep in since she flew in late the night before. So we did the shoot right on Mai Khao beach on which the property is located – Baan Mai Khao Condominiums. I had found this super cute dress on SBUYS and knew immediately that I would be taking it with me to Phuket. True to the location, I wore a bikini under it. It’s a super light, perfect-for-summer material and the embroidery gives it a slight boho or folk feeling. Hope you like it!
BLACK IS THE NEW BLACK
Orange maybe the new black for America and yes I love the series but black is still my favorite color when it comes to my sartorial choices and even the American elections (not that the latter really matters). This look is from the ‘Barcelona’ Collection by SBUYS and very different from the look I went for previously. Almost an opposite in many ways. The first one was light, breezy, even nautical and this one is dark, sexy and demure. The addition of the knee socks make such a huge difference to the entire look I feel.
SBUYS BARCELONA
Get a refreshing taste of tropical style with the new ‘Barcelona’ collection by SBUYS now available online. I have never been to Barcelona so this is probably the closest I’ve come to it yet. SBUYS has some classic styles paired with a few eclectic prints that spell chic-fun and make you want to hop on a speed-boat somewhere with your fanciest pair of sunglasses. I went for printed co-ordinates: shorts and a kimono style tie-up top, wore a solid white top underneath and a bright pair of flats that seem to energize the print even further. A chic, light and peppy outfit..
SBUYS - Dark Horse
While I know ‘Dark Horse’ is supposed to invoke a sense of poetry or romance, I’ve been feeling quite like a horse lately – with the amount of work that I can sense is going to be piling up in the coming month. I recently got back from a day in Agra to be a part of the launch of a new watch by Ferragamo and am already feeling a bit under the weather.
SBUYS - TIE & DYE DRESS
Something about the monsoons that brings out a little bit of boho in you, or in this case – me. I especially get drawn to tie & dye. Found a lovely blush tie-dye dress with an uneven hemline on SBUYS and for a casual day out with friends or shopping, I paired it with a glistening beauty of a pre-loved Louis Vuitton Handbag from ThatWardrobe. Check out that glossy patent leather! ThatWardrobe has so many pre-loved luxury items and brands available, all 100% authentic and you can even list your own products if you’d like to sell them.
PLAYSUITS
Something about ‘playsuits’ the name that naturally makes you think of them as a playful outfit – sporty, fun, hangin with the friends, etc. But it doesn’t always have to be. Playsuits can just as easily be turned into a more serious look, a bit chic/polished and yes even be worn to meetings perhaps. It’s all about how you accessorize your outfit. I stumbled upon this light-weight, solid blue playsuit on SBUYS and knew instantly that it would make for a very versatile piece in my wardrobe
SBUYS MAJESTIC WHITE CLOTHING
Summer brings new energy that could wipe the old slate clean and brings new ideas be it your home, fashion, kid’s fun time or business. New budgets, new goals, clean ups and renovations can give one a complete make over ready to reach the next level of accomplishment. And when it comes to fashion, with the rising heat around, it should be all simple, neat, light and loose to keep you cool and comfortable. White is the color of summer, bright and clean looking always. For that matter you would agree that white and black are both for all season wear them, as they are simply majestic colors.
TIE DYE OFF-SHOULDER LOOK
The off-shoulder look is something one still have to get accustomed to. Something about it being ‘eeesh too girly’ that kept them away till now. But, like all things clothes and fashion. It’s actually quite nice – the off shoulder style. Yes, it has a certain feminine energy to it and that’s not always a bad thing (You have to keep reminding yourself the tomboy inside from time to time). One thing that an off-shoulder spells out most clearly is ‘S.U.M.M.E.R’ and that can only mean fun! Tie-Dye has come back with a bang and has a growing demand in women irrespective of their age.
SUMMER DRESSES WITH A BANG !!
Akanksha Redhu wearing a printed dress from SBUYS . White really is the best option to go for in Summers and pretty much any kind of weather except rains perhaps so this cute dress with the print beginning from the hemline and reducing further up was one of my favorite pieces from the SBUYS Summer collection. The cuts in the back add for an interesting element making the dress perfect for a fun day of shopping with your girlfriends or even a day-time movie date. To balance the uber feminine energy of the dress she paired it with a black wide lace choker.
STRIPES FOREVER
Stripes, stripes, stripes! Basic stripes are absolute wardrobe essentials – just like a white shirt or a camel trench. Classic, elegant and you can’t really go wrong with an all-striped dress. There are so many ways you can wear this fun dress – with a denim jacket on top for a casual date/ with a black blazer on top for a work thing/ with thigh high boots for a sexy evening out or simply by itself like I have for a regular day out. Combine it with comfy boots, intense lips and a choker and you’re sort of hanging out in the 90’s again! Love it. Hope you like the outfit!
SbuyS Showcases Spring Summer Collection
It was a fashion night at The Frat House, Hauz Khas Village, in association with SbuyS. "It was a night of glamour". The event was aimed to facilitate the display of the Spring Summer Collection. The event was a success and we aim to host more such events for our patrons. Just because it's Valentine Day fever all around, it doesn't really mean you have to doll yourself up like a shining Christmas tree and be covered in red or sequins from head to toe. You can just as easily dress casually with just a hint of chic and have an amazing time
SBUYS - CITY BLACK
Explore yourself. Trust your uniqueness. Be a trendsetter!! Dress like Akanksha Redhu in SbuyS black Floral embroidered top with smocking at neck and sleeve in poly slub. I’ve been craving to do an all-black outfit for quite some time now. Not exactly sure when I did it last but it certainly feels like its been a long time. Black is love. And I’m not referring to its ‘it makes all body shapes look better’ quality. I’m just referring to its edgy-ness, its slick-ness. Like a pool of hot black tar, looks inviting but you better not mess with it. A bit dramatic I know but feels right.
SBUYS - PALE BLUSHES
The off-shoulder look is something one still have to get accustomed to. Something about it being ‘eeesh too girly’ that kept them away till now. But, like all things clothes and fashion. It’s actually quite nice – the off shoulder style. Yes, it has a certain feminine energy to it and that’s not always a bad thing (You have to keep reminding yourself the tomboy inside from time to time). One thing that an off-shoulder spells out most clearly is ‘S.U.M.M.E.R’ and that can only mean fun! What adds to the loveliness of this dress is the pastel pink shade and the slight touch of lace.
Customer Care
Information
My Account
Sbuys.in is an exciting new web portal designed for online shoppers, which provides a platform for retail and purchase of the trendiest, latest in fashion women's and kid's wear. Sbuys.in is an initiative of Pearl Global Industries Ltd., One of India's leading apparel-export companies and a trusted supplier to global retailers. A contemporary clothes brand, Sbuys caters to the ever-evolving fashion sensibilities of women who choose innovative and quality dressing for themselves and their kids. In-sync with the latest international cuts and textures, the brand brings to the table some of the finest tailoring and designs. |
Clinical and radiological outcomes of unilateral biportal endoscopic lumbar interbody fusion (ULIF) compared with conventional posterior lumbar interbody fusion (PLIF): 1-year follow-up.
This study retrospectively compared clinical and radiological outcomes of unilateral biportal endoscopic lumbar interbody fusion (ULIF) to those of conventional posterior lumbar interbody fusion (PLIF). Seventy-one ULIF (age, 68 ± 8 years) and 70 PLIF (66 ± 9 years) patients for one lumbosacral segment followed more than 1 year were selected. Parameters for surgical techniques (operation time, whether transfused), clinical results [visual analogue scale (VAS) for back and leg pain, Oswestry disability index (ODI)], surgical complications (dural tear, nerve root injury, infection), and radiological results (cage subsidence, screw loosening, fusion) between the two groups were compared. The PLIF group demonstrated a significantly shorter operation time and more transfusions done than the ULIF group. The VAS for leg pain in both groups and for back pain in the ULIF group significantly improved at 1 week, while the VAS for back pain in the PLIF group significantly improved at 1 year. ODI scores improved at 1 year in both groups. Complication rates were not significantly different between groups. Fusion rates with definite and probable grades were not significantly different between groups. However, the ULIF group had significantly (P = 0.013) fewer cases of definite fusion and more cases of probable fusion [43 (74.1%) and 15 (25.9%) cases, respectively] than the PLIF group [58 (92.1%) and 5 (7.9%) cases, respectively]. ULIF is less invasive while just as effective as conventional PLIF in improving clinical outcomes and obtaining fusion. However, ULIF has a longer operation time than PLIF and requires further development to improve the fusion grade. |
1. Field of the Invention
The present invention relates to mutants of streptokinase and their covalently modified forms. The present invention utilizes the homogenous, site-specific and defined PEG modification of streptokinase and its related variants with substitutions, additions, deletions or domain fusion constructs to allow their usage in the form of improved protein therapeutics.
2. Background of the Invention
Thrombus (blood clot) development in the circulatory system can cause vascular blockage leading to fatal conditions. Development of clot and its dissolution is a highly controlled process for the hemostasis. Any deviation from a normal hemostasis leads to various clinical conditions such as stroke, pulmonary embolism, deep vein thrombosis and acute myocardial infarction. Patho-physiological conditions emerging out of failed hemostasis needs immediate clinical attention. The most practiced medical intervention for such cases is intravenous administration of thrombolytic agents (Collen et al., 1988; Collen, 1990; Francis and Marder, 1991). The most commonly used thrombolytic agents include Streptokinase (SK), Urokinase (UK) and the tissue type plasminogen activator (tPA). Numerous pharmacoeconomic appraisal of use of different thrombolytics in the management of acute myocardial infarction have been carried out in the past (Mucklow, 1995; Gillis and Goa, 1996). Banerjee et. al., 2004, have reviewed the clinical usefulness of streptokinase and its applicability as a drug of choice. As far as clinical efficacy is concerned both streptokinase and tPA fare equally well but due to several fold low cost and a slightly better in vivo half life, streptokinase is the most preferred thrombolytic worldwide (Sherry and Marder, 1991, Wu et al., 1998). Also, the use of tPA is slightly more likely to cause strokes, the major side effect for both the drugs. However streptokinase, being a bacterial protein is antigenic in nature and may give rise to clinical complications such as allergic response or hemorrhage. Also, the circulating half-life (15-30 min) of streptokinase is not sufficient for effective thrombolysis (Wu et al., 1998).
Despite all these, in recent years, thrombolytic therapy with fibrinolytic agents, such as Streptokinase (SK), tissue plasminogen activator (TPA) or urokinase (UK) has revolutionized the clinical management of diverse circulatory diseases e.g., deep-vein thrombosis, pulmonary embolism and myocardial infarction. These agents exert their fibrinolytic effects through activation of plasminogen (PG) in the circulation by cleavage of the scissile peptide bond between residues 561 and 562 in PG. As a result, inactive zymogen is transformed to its active form, the serine protease, plasmin (PN), which then circulates in the system and acts on fibrin to degrade the later into soluble degradation products. It may be mentioned here that PN, by itself, is incapable of activating PG to PN; this reaction is catalyzed by highly specific proteases like TPA, the SK-plasminogen complex, and UK, all of which possess an unusually narrow protein substrate preference, namely a propensity to cleave the scissile peptide bond in PG in a highly site-specific manner. However, unlike UK and TPA, SK has no proteolytic activity of its own, and it activates PG to PN “indirectly” i.e. by first forming a high-affinity equimolar complex with PG, known as the activator complex (reviewed by Castellino, F. J., 1981). The activator complex then acts as a protease that cleaves other, substrate molecules of PG to PN.
Regardless of tremendous advances in therapeutic use of streptokinase and other bacterial thrombolytics, there are several shortcomings that limit the usefulness of these polypeptide drugs. These disadvantages include their susceptibility to degradation by proteolytic enzymes, short circulating half-life, short shelf-life, rapid kidney clearance and their propensity to generate neutralizing antibodies. These shortcomings are also sometimes inherent to many other polypeptide drugs that are non human in origin. This aspect in general is reviewed by Roberts et. al; 2002. Various attempts were made to overcome these short comings in polypeptide drugs, such as altering the amino-acid sequences to reduce proteolysis or antigenicity, fusing the polypeptides to globulin or albumin domains to improve half-life etc. (Osborn et. al., 2002). These methods provided little help to the problem and came along with associated burden. The major breakthrough in this area was method of protein PEGylation that provided single solution to multiple problems. PEG (Poly Ethylene Glycol) is formed by polymerizing number of repeating subunits of ethylene glycol to give rise to linear or branched PEG polymers of tailored molecular masses. Once covalently conjugated with PEG the protein or polypeptide shows improved pharmacokinetic and pharmacodynamic properties such as increased water solubility, decreased renal clearance and often substantially limited immune reactivity (Moreadith et. al., 2003, Doherty et al., 2005, Basu et. al., 2006). The PEG conjugation also makes the molecule proteolytically less susceptible. The decreased receptor interaction or interaction with cell surface proteins that follows the PEG addition also helps to reduce adverse immunological effects. PEGylated drugs are also more stable over a wide range of pH and temperature changes (Monfardini et al. 1995). Use of PEG is FDA approved for therapeutics and it shows virtually no toxicity and eliminated from the body intact by either kidneys or in faeces. The beneficial features of PEG conjugation can be potentially imparted to SK to make it a more effective and safer thrombolytic. Attempt of SK PEGylation is reported in literature (Rajagopalan et. al., 1985) using a relatively non-specific chemical modification reaction. The therapeutic uses of such modifications were severely limited by highly compromised plasminogen activation ability. Also the nature of modification was poorly defined and heterogeneous in nature. The reason for this heterogeneity was the chemistry used for PEG modification that does not target modification of a specific site. This could be the reason why such modification strategy was not utilized for the development of improved SK based thrombolytics.
The term streptokinases used anywhere in the text collectively refers to: variants of streptokinase, any of its functional fragments, functional muteins, isolates from different species and fusion products obtained through attachment of oligo or polypeptides of natural or artificial origin.
It is known that different functional groups present in a protein can be utilized for PEG introduction. The most commonly employed techniques are derivatization of lysine residues or cysteine residues in the protein. Alpha-amino group at the N-terminus can also be exploited for single homogenous conjugation of PEG in proteins (Baker et. al., 2006). However, the use of cysteine residues to bear the incorporated PEG groups is particularly advantageous since, potentially, the —SH groups can be targeted in a site-specific mode particularly if the protein bears or made to bear a very limited number of cysteine residues. It is not an exaggeration to state that PEG conjugation becomes an art form when the protein is devoid of any cysteine since it leaves a virtual blank canvass for cysteine addition, insertion or substitution for site-specific PEG “painting”, or decoration, of proteins. Since potentially addition of cysteines into the cysteine free background can have adverse effects on the protein function. Therefore, the selection of sites for preparation of cysteine variants requires careful planning and execution. In contrast to, say, Lysine based modifications for PEGylation, although the chemistry is well defined, heterogeneity in reaction is a big disadvantage. In the case of SK, a large number of lysine residues are evenly spread all along the polypeptide and hence limit the possibility of homogenous site-specific PEG conjugation. More interestingly, there is no natural Cysteine present in the Streptokinase molecule (Malke et. al., 1985), thus making it possible to generate various Cysteine variants of streptokinase. Also there are no free cysteines in the natively folded covalent variants of SK derived by fusion with fibrin binding domains (ref. U.S. Pat. No. 7,163,817). This renders the possibility of making various free cysteine containing variants of Clot-specific streptokinase without actually interfering with the normal refolding of the cysteine-rich protein (all the cysteine residues being engaged in disulfide bond formation). The free Cysteine(s) introduced can be reacted with various thiol-reactive reagents including PEG to generate Cysteine adduct/s of these proteins.
Streptokinase (SK) is a generic name for a secretory protein produced by a variety of hemolytic streptococci that has the ability to induce lysis of plasma clots (Tillet and Garner, 1933). Because it can be easily and economically produced from its parent source, or through rDNA technology from suitable heterologous hosts, SK is very cost effective and thus is a major thrombolytic drug particularly for the cost-conscious markets world-wide. SK has been found very effective in the clinical treatment of acute myocardial infarction following coronary thrombosis (ISIS-3, 1992) and has served as a thrombolytic agent for more than three decades. However, it suffers from a number of drawbacks. It is known that the plasmin produced through the streptokinase mediated activation of plasminogen breaks down streptokinase soon after its injection (Rajagopalan et. al., 1985, Wu et. al., 1998). This limits the in vivo half-life of streptokinase to about 15 min (Wu et. al., 1998). Although streptokinase survives in circulation significantly longer than does another thrombolytic drug of choice, TPA (with a half-life less than 5 min; Ross, 1999; Ouriel, 2002), this is still short for efficient therapy (Wu et al., 1998). Because of the recognized shortcomings related to rapid in vivo clearance of the available plasminogen activators, attempts are underway to develop improved recombinant variants of these compounds (Nicolini et al., 1992, Adams et al., 1991, Lijnen et al., 1991; Marder, 1993, and Wu et al., 1998). Despite its inherent problems, streptokinase remains the drug of choice particularly in the developing countries because of its low relative cost (e.g., approximately US$ 50 or less per treatment compared to nearly US $ 1500 for TPA).
Streptokinase was first reported to cause lysis of blood clots by Tillet and Garner (1933). However, later it was established that the fibrinolytic activity of SK originates from its ability to activate human plasminogen (HPG, reviewed by Castellino, 1979). Streptokinase is mainly secreted by -hemolytic group A, C and G streptococci. SK is an activator of human PG though itself it is not a protease, rather it binds to human PG/PN and recruits other HPG molecules as substrate and converts these into product, PN. The latter circulates in the blood stream. Plasmin, being a non-specific protease, the generalized and immediate PN generation subsequent to SK injection results in large scale destruction of various blood factors leading to risk of hemorrhage, as also the dissolution of ECM and basement membrane (BM) and enhances bacterial invasiveness into secondary infection sites within the host body (Esmon and Mather, 1998; Lahteenmaki et al., 2001). Thus, there is an acute need to minimize the side-effects by designing improved SK analogs.
SK is currently being extensively used as a thrombolytic drug world wide since it is an efficient fibrin clot dissolver, yet it has its own limitations. SK being a protein produced from β hemolytic streptococci, its use in humans induces immunogenicity (McGrath and Patterson, 1984; McGrath et al., 1985; Schweitzer et al., 1991). The high titres of anti-SK immunoglobulins (Ig) generated after the first SK administration are known to persist in patients for several months to a few years (Lee et al., 1993). Thus, the anti-SK antibodies severely limit its use as future repeat therapy by either neutralizing SK upon administration (Spottal and Kaiser, 1974; Jalihal and Morris, 1990) or by causing a range of allergic reactions (McGrath and Patterson, 1984; McGrath et al., 1985).
As mentioned before, the use of streptokinase in thrombolytic therapy is hampered by the relatively short half-life (a few minutes) of this protein in vivo (which indeed is the case with all presently employed thrombolytic drugs), apart from its immunogenicity. It is observed that foreign proteins when introduced into the vertebrate circulation are often cleared rapidly by the kidneys. This situation becomes even more acute in case of streptokinase where progressively higher doses of the protein (to overcome antibody based rapid neutralization) can severely increase probability of allergic response/s, making the repeated administration essentially ineffective and dangerous. Attempts to solve these problems in general, are well documented in the literature where various physical and chemical alterations have been shown to be useful for generation of improved therapeutics, e.g. see: Mateo, C. et al 2000, Lyczak, J. B. & Morrison, S. L. 1994, Syed, S. et. al; 1997, Allen, T. M. 1997. The most promising of these to-date is the approach of modification of therapeutic proteins by covalent attachment of polyalkylene oxide polymers, particularly polyethylene glycols (PEG). PEG is a non-antigenic, inert polymer and is known to increase the circulating half-life of the proteins in the body (Abuchowski et al., 1984; Hershfield, 1987; Meyers et al., 1991). This allows the extended action of the drug in use. It is believed that PEG conjugation to proteins increases their overall size and hence reduces their rapid renal clearance. PEG attachment also makes the protein or polypeptide more water soluble and increases its stability under in vivo conditions along with markedly reducing immunogenicity and increasing in vivo stability (Katre et al., 1987; Katre, 1990). U.S. Pat. No. 4,179,337 discloses the use of PEG or polypropylene glycol coupled to proteins to provide a physiologically active non-immunogenic water soluble polypeptide composition.
Although the chemistry of PEG conjugation is mostly generic but strategic placement of PEG polymers in a therapeutic protein is of paramount importance to achieve successful outcomes. Availability of three dimensional structural information with functional hot spots earmarked through various solution studies, helps in designing mutational plan to keep the functionality intact.
The complete amino acid sequence of SK was determined by sequential Edman degradation analysis of SK fragments generated by cyanogen bromide and enzymatic methods (Jackson and Tang, 1982). The results established that the molecule of Mr 47,408 Da, contains 415 amino acids in a single polypeptide chain amino acid sequence.
The nucleotide sequence from S. equisimilis H46A (the prototype strain for SK production that is most often used therapeutically in humans) was sequenced by Malke and co-workers, in 1985. The transcriptional control of this gene has also been studied and the functional analysis of its complex promoter has been reported (Grafe et al., 1996). Considerable information exists, therefore, for effectively using this gene in producing streptokinase safely in relatively non-pathogenic microbes. |
###
# #%L
# ReservationService Client STS
# %%
# Copyright (C) 2011-2019 Talend Inc.
# %%
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# #L%
###
org.apache.wss4j.crypto.merlin.keystore.type=jks
org.apache.wss4j.crypto.merlin.keystore.password=cspass
org.apache.wss4j.crypto.merlin.keystore.alias=myclientkey
org.apache.wss4j.crypto.merlin.file=clientstore.jks
|
How to Fix 503 Service Unavailable Error in WordPress
In this tutorial we will show you how to fix 503 service unavailable error in WordPress, on a Linux based virtual private server. If you encountered 503 service unavailable error in WordPress follow the steps below to investigate it and fix the problem. The 503 service unavailable error has a lot of potential causes. To be able to fix the 503 service unavailable error in WordPress, you will have to identify the root cause of the problem. First, make sure that you have SSH or FTP access to the server, and you are able to modify the WordPress files. Connect to your Linux server and follow the instructions below.
Enable debugging in WordPress
The first thing you need to do is to enable debugging in WordPress. It is a really simple procedure which will help you to quickly identify if there is a specific reason why you are seeing this 503 service unavailable error. To enable debug in WordPress, navigate to the document root where you have WordPress installed and open the wp-config.php file. If you are using SSH, you can use the following commands to navigate to the WordPress document root and open the file:
cd /var/www/html/wordpress
nano wp-config.php
Make sure you are using the correct location to your WordPress installation instead of /var/www/html/wordpress in the previous command. Once you open the file for editing, locate the following line:
Save and close the file. Now, you can watch the /wp-content/debug.log log file for errors and see what causes the problem with your WordPress website.
Disable the Plugins in WordPress
If enabling debug in WordPress doesn’t help you to identify the root cause of the problem, the next step is to disable the WordPress plugins. This will help you to understand whether the problem is caused by some specific WordPress plugin. You can disable all WordPress plugins at once, or disable them one by one. In most of the times when you encounter 503 service unavailable error in WordPress you will not have access to the dashboard, so you will have to disable the plugins via SSH or FTP.
Basically, to disable a specific plugin you have to rename the plugin directory. Navigate to the WordPress document root and use the mv command to rename a specific plugin. The following example shows you how to disable the WordFence security plugin:
mv wp-content/plugins/wordfence wp-content/plugins/wordfence.disabled
Alternatively, to disable all your WordPress plugins at once you can just rename the plugins directory:
mv wp-content/plugins wp-content/plugins.disabled
Now refresh the site and see if the 503 service unavailable error is gone. If you find that the problem is caused by specific plugin, you can deactivate and reinstall the plugin. Make sure that you have the latest version of that plugin installed.
Disable the Activated Theme in WordPress
Sometimes, the 503 service unavailable error in WordPress can be caused by a problem with the theme you are using. To investigate whether the theme is the one causing the problem you can simply disable it via SSH or FTP. Log in to your WordPress VPS and rename the theme directory. Once you rename the theme directory, WordPress will automatically activate the default twentyseventeen theme, of course if it is installed for your WordPress website.
mv wp-content/themes/theme-name wp-content/themes/theme-name.disabled
Replace theme-name with the name of the theme you are using in the previous command.
If the problem is caused by the theme, you can check if there is a new version of the theme and proceed with an upgrade. If that doesn’t fix the problem, you can contact the theme developer for further instructions or you can use a different theme.
If none of the solutions above doesn’t help, you may contact your Linux VPS hosting provider to help you investigate this further.
Of course, you don’t have to fix 503 service unavailable error in WordPress, if you use one of our Linux based WordPress VPS Hosting services, in which case you can simply ask our expert Linux admins to fix 503 service unavailable error in WordPress for you. They are available 24×7 and will take care of your request immediately.
PS. If you liked this post on How to Fix 503 Service Unavailable Error in WordPress, please share it with your friends on the social networks using the buttons on the left or simply leave a reply below. Thanks. |
Q:
How to clear all non-array intervals
I have multiple timers on a single page which are being started by ajax updates. Every interval has its own name assigned to the username of players. I want to top all timers when the game ends:
This is how intervals are being created: findNewPlayer() is being called on some events in the game:
function findNewPlayer(){
$.ajax({
url:"check.php",
success:function(data){newTimer(data)}
})
}
function newTimer(username){
var username=setInterval(function() {startTimer()}, 1000);
}
function startTimer(){
//blah blah
}
Now I want to stop all timers and restart the game with current players. How can I use clearInterval on a series of usernames which are not generated in an array? I know if they were array I could do the following but I want to find a way to get collection of all timers with different names in a window.
for (i = 0; i < interValArray.length; i++) {
clearInterval(interValArray[i]);
}
A:
You can maintain an array to hold the ID returned by the setTimeout call, then loop over the array on reset:
const timerIds = [];
function newTimer(username){
timerIds.push(setInterval(function() {startTimer()}, 1000));
}
When you reset and start with new players, you need to clear the timers:
timerIds.forEach(clearInterval);
|
Nick Leyva
Nicholas Tomas Leyva (born August 16, 1953) is an American former professional baseball player, coach, and manager. After his retirement as a Minor League Baseball (MiLB) player, most of Leyva’s baseball career was spent as a coach. His Major League Baseball (MLB) coaching stops included the St. Louis Cardinals, Toronto Blue Jays (on two separate occasions), Milwaukee Brewers, and Pittsburgh Pirates. Leyva was the manager of the Philadelphia Phillies from though early .
Playing career
Born in Ontario, California, Leyva, who is of Mexican-American descent, attended the University of LaVerne, and was selected by the St. Louis Cardinals in the 24th round of the 1975 Major League Baseball Draft. He was an infielder who threw and batted right-handed, stood tall and weighed . In three seasons (1975–77) in the Cardinals' farm system, he appeared in 253 games played and batted .267 with 208 hits, eight home runs and 109 runs batted in.
Uniform numbers
As a major league manager & coach, Leyva has worn #16 with every team he's been with, except for his 1st year in Toronto in 1993 where he wore #45 before switching back to his familiar #16 in 1994.
Managing career
Leyva began his managing career at age 24 with the Rookie-level Johnson City Cardinals of the Appalachian League in 1978. By 1983, he was manager of the parent Cardinals' Double-A farm team, the Arkansas Travelers of the Texas League.
Leyva then served on the big-league coaching staff of Whitey Herzog's Cardinals for five seasons, 1984–1988. He was the first base coach for the National League champion 1985 Cardinals and third base coach for the NL champion 1987 Cardinals.
In 1989, Leyva was hired as manager of the Phillies by his former farm director in St. Louis, Lee Thomas. Leyva's inaugural Philadelphia team won only 67 of 162 games, and finished last in the National League East Division. In 1990, his team won ten more games and finished fourth, but still played eight games below the .500 mark. When the 1991 Phils dropped nine of their first 13 games, Leyva was ousted on April 23. His career totals as a Major League manager were 148 victories and 189 defeats (.439).
Coach with Blue Jays, Brewers and Pirates
After managing the Toronto Blue Jays' Triple-A farm team, the Syracuse Chiefs, Leyva spent 4½ seasons (July 1993 through 1997) as the third-base coach of the Blue Jays—his first term in the job. He then worked at multiple levels of the Chicago White Sox farm system before spending one season as third-base coach of the Milwaukee Brewers in 2007.
Leyva was listed as the 2008 manager of the Kingsport Mets of the Appalachian League, a rookie-level affiliate of the New York Mets, before the Blue Jays rehired him as their third base coach on June 20, 2008, when Cito Gaston replaced John Gibbons as the club's manager. On October 30, 2009, Leyva was reassigned as the Blue Jays' bench coach, with Brian Butterfield taking over as third base coach for the team. On November 8, 2010, former Seattle Mariners manager Don Wakamatsu was named Toronto's bench coach, ending Leyva's tenure at that post.
On November 24, 2011, Leyva was named the Pittsburgh Pirates' third base coach, under new manager Clint Hurdle. On November 5, 2014, the Pirates announced that Leyva would be moved to first base coach and Rick Sofield would move from first base to third base. On October 22, 2016, the Pirates announced that Leyva was reassigned within the organization to an advisory position and would no longer coach.
Coach in Venezuela
Nick Leyva he had experience as manager in the Venezuelan Professional Baseball League with the Cardenales de Lara team, in the 1995-1996 season, and who took the final of that season against the Navegantes del Magallanes, losing that final 4 games for 3 , for the 2000-2001 season, he redirected the Larenses, leading them to obtain his fourth championship in the professional ball of Venezuela, defeating the team that defeated him 4 years before in 6 games and taking revenge for that defeat.
Seven years later, he returned to Venezuela to direct the Navegantes del Magallanes in the 2008-2009 season, but was dismissed because of the negative record he had for that moment
Leyva's younger brother, Al, is an assistant coach with the Willmar Stingers of the Northwoods League.
See also
List of St. Louis Cardinals coaches
References
Bucek, Jeanine, ed. dir., The Baseball Encyclopedia. New York: Macmillan Books, 1996.
External links
Nick Leyva at Baseball Gauge
Category:1953 births
Category:Living people
Category:American baseball players of Mexican descent
Category:Arkansas Travelers players
Category:Baseball players from California
Category:Caribbean Series managers
Category:Gulf Coast Cardinals players
Category:La Verne Leopards baseball players
Category:Major League Baseball bench coaches
Category:Major League Baseball third base coaches
Category:Milwaukee Brewers coaches
Category:Minor league baseball managers
Category:People from Ontario, California
Category:Philadelphia Phillies managers
Category:Pittsburgh Pirates coaches
Category:St. Louis Cardinals coaches
Category:St. Petersburg Cardinals players
Category:Syracuse Chiefs managers
Category:Toronto Blue Jays coaches |
Q:
Should interlocked implementations based on CompareExchange use SpinWait?
Below is an implementation of an interlocked method based on Interlocked.CompareExchange.
Is it advisable for this code to use a SpinWait spin before reiterating?
public static bool AddIfLessThan(ref int location, int value, int comparison)
{
int currentValue;
do
{
currentValue = location; // Read the current value
if (currentValue >= comparison) return false; // If "less than comparison" is NOT satisfied, return false
}
// Set to currentValue+value, iff still on currentValue; reiterate if not assigned
while (Interlocked.CompareExchange(ref location, currentValue + value, currentValue) != currentValue);
return true; // Assigned, so return true
}
I have seen SpinWait used in this scenario, but my theory is that it should be unnecessary. After all, the loop only contains a handful of instructions, and there is always one thread making progress.
Say that two threads are racing to perform this method, and the first thread succeeds right away, whereas the second thread initially makes no change and has to reiterate. With no other contenders, is it at all possible for the second thread to fail on its second attempt?
If the example's second thread cannot fail on the second attempt, then what might we gain with a SpinWait? Shaving off a few cycles in the unlikely event that a hundred threads are racing to perform the method?
A:
My non-expert opinion is that in this particular case, where two threads occasionally call AddIfLessThan, a SpinWait is unneeded. It could be beneficial in case the two threads were both calling AddIfLessThan in a tight loop, so that each thread could make progress uninterrupted for some μsec.
Actually I made an experiment and measured the performance of one thread calling AddIfLessThan in a tight loop versus two threads. The two threads need almost four times more to make the same number of loops (cumulatively). Adding a SpinWait to the mix makes the two threads only slightly slower than the single thread.
|
Kan't Fail Kale......by Joyce Oroz
Don’t bite the hand that feeds you greenery, better known as vegetables. Your Mama pushed them on you, your doctor pushes them and your grocer peddles them. I recently met a new vegetable friend … rather stand-offish, deep green and curly. Turns out—lots of people have run into my friend, kale. In fact, these people have convinced me that I should eat kale for good health. Great. How does one eat Kale? After a bit of experimentation, I came up with a delicious way to prepare this new mineral-packed vegetable. Here is my recipe for Kan’t Fail Kale………makes two servings—double it if you want more.
Combine all ingredients in sauce pan, cover and simmer until kale is limp—five to ten minutes.
Kale BasicsIn Season: Kale turns sweeter in cold weather, so it's at its best from mid-fall through early spring.What to Look For: Choose kale with firm, deep-green leaves, avoiding any that are wilted or have yellow spots.How to Store: Keep kale in the coldest part of your refrigerator, loosely wrapped in a plastic bag. Though it seems like a sturdy vegetable, kale will quickly wilt and turn bitter |
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/time.h>
#include <fcntl.h>
#include <string.h>
void fatal(const char *s) { perror(s); exit(1); }
void usage(const char *name, FILE *f, int c) {
fprintf(f, "Usage: %s [options]\n", name);
fprintf(f,
"Forward from stdin to stdout at constant rate.\n"
"\nOptions:\n"
" --block Pause when stdout is busy (default: '#' on stderr)\n"
" --nonblock Silently ignore when stdout is busy\n"
" --cbr R Set rate in bits per second\n"
" --cbr8 R Set rate in bytes per second\n"
" --cbr16 R Set rate in 16-bit words per second\n"
" --cbr32 R Set rate in 32-bit words per second\n"
" --cbr64 R Set rate in 64-bit words per second\n"
" -h Display this help message and exit\n"
);
exit(c);
}
int main(int argc, const char *argv[]) {
bool block=false, nonblock=false;
int bytespersec = 2400000 * 2;
for ( int i=1; i<argc; ++i ) {
if ( ! strcmp(argv[i], "-h") )
usage(argv[0], stdout, 0);
else if ( ! strcmp(argv[i], "--block") )
block = true;
else if ( ! strcmp(argv[i], "--nonblock") )
nonblock = true;
else if ( ! strcmp(argv[i], "--cbr") && i+1<argc )
bytespersec = atoll(argv[++i]) / 8;
else if ( ! strcmp(argv[i], "--cbr8") && i+1<argc )
bytespersec = atoll(argv[++i]);
else if ( ! strcmp(argv[i], "--cbr16") && i+1<argc )
bytespersec = atoll(argv[++i]) * 2;
else if ( ! strcmp(argv[i], "--cbr32") && i+1<argc )
bytespersec = atoll(argv[++i]) * 4;
else if ( ! strcmp(argv[i], "--cbr64") && i+1<argc )
bytespersec = atoll(argv[++i]) * 8;
else
usage(argv[0], stderr, 1);
}
size_t blocksize = 4096;
if ( bytespersec < blocksize )
blocksize = bytespersec;
if ( ! block ) {
long flags = fcntl(1, F_GETFL);
flags |= O_NONBLOCK;
if ( fcntl(1, F_SETFL, flags) ) fatal("fcntl(F_SETFL)");
}
struct timeval tv0;
if ( gettimeofday(&tv0, NULL) ) fatal("gettimeofday");
unsigned long long current = 0;
while ( 1 ) {
struct timeval tv;
if ( gettimeofday(&tv, NULL) ) fatal("gettimeofday");
unsigned long long reltime =
(tv.tv_sec -tv0.tv_sec )*1000000LL +
(tv.tv_usec-tv0.tv_usec);
unsigned long long target = reltime * bytespersec / 1000000;
unsigned long long want = target - current;
if ( want < blocksize ) {
long long us = blocksize * 1000000LL / bytespersec;
if ( us > 1000000 ) us = 1000000;
usleep(us);
} else {
want = blocksize;
unsigned char buf[want];
ssize_t nr = read(0, buf, want);
if ( nr < 0 ) fatal("read");
if ( ! nr ) return 0;
current += nr;
for ( unsigned char *p=buf; nr; ) {
ssize_t nw = write(1, p, nr);
if ( nw < 0 ) {
if ( errno == EWOULDBLOCK ) {
if ( ! nonblock ) fprintf(stderr, "#");
nr = 0;
} else
fatal("write");
} else if ( ! nw ) fatal("write: EOF");
else {
// Try again. If stdout is really busy we will get
// EWOULDBLOCK eventually, unless --block was set.
p += nw;
nr -= nw;
}
}
}
}
}
|
Do we have an adequate system for sorting through the ten thousand plus different educational technology materials and programs available for integration into our public school systems?
No. In fact, we do not have a system at all.
We trust our overworked teachers and their inexpert administrators to find their way (on behalf of our students) through a dazzling forest of finely-tuned product pitches. Or we leave these crucial decisions in the hands of private sector consultants. So far, even a marriage of our most celebrated tablets (iPads) and our most dominant publisher of educational materials (Pearson) spiraled down into an expensive, embarrassing and litigious failure in Los Angeles’ public schools.
If the US cannot succeed with a one-device-per-child model pinned on our flagship hardware and the largest content behemoth in the backyard of our own tech industry—what’s happening out of the spotlight?
If you want to get a keen sense of what’s happening inside the public schools of the United States, you could find no one better to speak with than an experienced school evaluator.
The rest of us have to rely on test data or what we hear from students; but professional school evaluators spend their years immersed in classrooms, in conversation with administrators and in assessment of learning materials and methods. While (for better or for worse) normal public schools in the US are generally not obligated to undergo external evaluations, public charter schools are an exception. Publicly funded charter schools need to satisfy external evaluators every five years in order to have their charters renewed.
Adam Aberman has been conducting such evaluations for 12 years, in which time he’s evaluated more than 100 schools and more than 1,000 classroom sessions across 6 states. His evaluations have been divided between primary schools and middle and high schools and approximately one fifth of these evaluations have been of blended learning institutions or blended classrooms (in this context “blended” means “blended with a large dose of technology”).
Aberman is also a proponent of educational technologies and a thought leader in the space, having founded and directed icouldbe.org (an online mentoring website) and The Learning Collective, a consulting company that specializes in online and digital learning (and a company at which I am also a Principal).
What follows are the highlights of a full interview covering Aberman’s insights into the strengths and weaknesses of blended learning as it currently appears in US public charter schools and the particular challenge of using technology to confer critical thinking skills.
Poor Preparation
Aberman notes that a common trend for blended learning schools involves committing to digital learning tools without sufficient research or consideration. On the one hand, schools frequently underestimate the amount of IT hours required to support their use of a given product and the number of reserve devices that may be needed; and on the other hand, schools often discover at the end of their first year using a new digital tool that it doesn’t suit their needs.
They are then back at the beginning of the cycle: selecting digital learning tools in a rush for the next academic year and doing so without having comprehensive or objective research to consult.
As long as school administrators make big decisions based on the inexpert opinions of one or two colleagues, and as long as they decline to undertake serious needs assessments, publicly-funded classrooms are likely to continue being mismatched with tech solutions.
This is a policy level failure to realize that all blended classrooms are effectively piloting new approaches to learning; they are learning laboratories that warrant closer observation and better support—especially in terms of evaluating and assessing the merits of their options.
It makes sense that this step is frequently neglected: it takes time and costs money.
Indeed the costs of undertaking a needs assessment and properly vetting a wide variety of edtech tools could completely eliminate any financial savings that a school hopes to gain through deploying technology.
Kentaro Toyama has carefully researched the deployment of educational technologies in a variety of contexts; one of his most relevant findings is that broken educational systems cannot be fixed by technology alone, in fact, just as technology can amplify the strengths of a healthy system, it can amplify system dysfunction. Toyama and others draw our attention to the ongoing failure of US public schools even in the face of widely available technology and internet access.
Low Hanging Fruit
Where Aberman sees classroom technology at its most successful is in the realm of literacy and numeracy games and applications designed for younger students.
Programs of this variety—sharpened over several decades—are often well received and this may be an indication of good things to come.
Unfortunately, efforts to use technology for more complex learning goals, according to Aberman, are usually less successful. While young children often report that literacy and numeracy programs are “fun,” older students using programs in other subjects at a middle or high school level are more likely to report that the tools are “too easy” or “boring”—not surprising, given that many popular programs depend on repetitive question types, varying only their content.
There is a worrying possibility that our early experiments with blended and digital learning are actually under-serving students. A recent study showed that in Ohio 75% of brick-and-mortar schools perform well, but only 13% of virtual schools are meeting standards (Tucker et al., 2011, OH Department of Education, 2011)—a quantitative finding to complement Aberman’s qualitative perspective.
Critical Thinking Skills
Three of Aberman’s observations on critical thinking skills merit direct quotation:
“Elementary and middle schools I’ve been in that leverage a lot of technology tend to do an even worse job at promoting students’ higher order thinking abilities. At 100% of the approximately twenty blended schools I have evaluated, there is an acknowledged lack of students’ higher-order and critical thinking skills.”
“Extended academic discourse and debate in classrooms are also hard to find in many blended schools (they’re hard to find in most schools but especially in blended schools). Students may make short comments in online forums but in-person discussions are often stunted.”
“Most blended classrooms I walk into I’m struck by the silence in the room. Oftentimes, kids are on headphones and, though in the lower grades students are sometimes listening to the correct reading or annunciation of sounds and words, there is little to no discussion between students. In some schools, students are on headphones for the majority of the day. This means that students, rather than comparing and exploring thoughts in real-time (and fully forming and defending ideas with the depth that at times can only be achieved in person) are often relegated to learning and ideas limited by the digital boundaries created by a software developer.”
Sure, teaching critical thinking is challenging in the best of circumstances, but considering that critical thinking is the most foundational skill in the world, we must optimize for it at every possible stage of learning.
Proponents of technology are usually fans of problem-solving, believers in engineering and champions of learning. But are they being overconfident about their products?
Is there an unscientific bravado behind the assumption that uni-variable learning tools will work well across many classrooms without creating atrophy in other skill areas?
Are our educational technologists overlooking social innovations and perhaps weakening our culture of learning?
If incorporating tech into our charter schools is further depressing our learning outcomes for older students, how can we change course?
By designing tech for core standards that overemphasize narrow learning goals, are we missing an opportunity to design more transformative technologies?
Obviously, we cannot judge the future of technology on the performance of what we have currently deployed. We know that technology has the potential to carry ever more weight within a school environment.
But, the way we are approaching the integration of technology into our school systems is raising red flags. If we don’t figure out exactly what these early warning signals mean and incorporate their lessons into our design and our educational philosophy, we risk generating backlash and squandering valuable momentum. We also risk producing a generation of graduates who are unprepared for the future ahead of us.
Nathaniel Calhoun focuses on the intersection of last mile development work challenges, mobile education for poverty alleviation and ecological design. Follow Nathaniel on Twitter @codeinnovation.
Image Credit: Shutterstock.com |
Q:
communicating with SAS datasets from R
I have a bunch of datasets that are in SAS format. I would like to avoid using SAS since I think R provides more than enough functionality for me. Therefore, is there a package that would allow me to interact with the SAS datasets from R? I have the SAS software installed but I would like to avoid coding things in multiple languages.
A:
Since you have SAS, you can use Frank Harrell's 'Hmisc' package which has sas.get and sasxport.get functions. It also has a bunch of utility functions: label,sas.get, contents,describe. For those without a SAS license, package 'foreign' has read.ssd, lookup.xport, and read.xport.
EDIT1: I will also mention that Anthony Joseph Damico recently announced a package to parse SAS INPUT code into read.fwf code. From its description file: " Using importation code designed for SAS users to read ASCII files into sas7bdat files, the SAScii package parses through the INPUT block of a (.sas) syntax file to design the parameters needed for a read.fwf() function call."
EDIT2: There is also a package by Matt Shotwell called 'sas7bdat' with read.sas7bdat(file) that describes its function as " Read SAS files in the sas7bdat data format."
|
Visual function depends on the remarkable integration of a number of interrelated subprocesses such as anticipation, stimulus recognition, and stimulus discrimination. The brain is able to orchestrate these elementary processes by coordinating the activities of diverse neural structures in the face of continuously varying processing demands. The question of how this coordination operates is central to understanding the neural basis of visual function. This proposal aims to investigate the coordinated activity of distributed neuronal ensembles in the cerebral cortex of non-human primates performing a visual pattern discrimination task. It is motivated by theoretical considerations suggesting that the large-scale functional coordination of interacting neuronal ensembles is an essential component of visual function (Bressler 1995, 1996; Bressler & Kelso 2001). A combined approach of experimental work and methods development is proposed to investigate the operations of large-scale cortical networks underlying visual function. Specific hypotheses concerning the dynamics of large-scale cortical coordination will be tested by analysis of local field potentials recorded from indwelling electrodes in the cerebral cortex. Access to the rapidly changing dynamics of field potential interdependency will be possible through the use of the adaptive multivariate autoregressive methodology developed under our previous R03 project. This methodology consists of a number of interrelated techniques that can characterize the multiple, complex interactions of large-scale distributed cortical networks in a very short time frame (Ding et al. 2000). Included are methods to derive multi-site interaction patterns, analyze the dependencies of functional relations on particular group of neurons, and measure causal influences between cortical areas. Our methodological development will continue by constructing a comprehensive framework for the optimal utilization of existing techniques, and by developing more powerful measures of network function that deal with problems of nonlinearity and nonstationarity. This work is expected to: (1) produce new insights into the coordination dynamics of large-scale cortical networks in vision; and (2) make available new digital signal processing tools for the investigation of large-scale neural systems underlying other cognitive functions. |
Discover
I'm using a water base paint for a sign. The last one I made ended up running when it rained. Now I'm doing one this time with a protective coating. So I need to have an idea of what I need to do in order to get the best protection.
The last experiment was with a coating of varnish and that didn't seem...
show more
I'm using a water base paint for a sign. The last one I made ended up running when it rained. Now I'm doing one this time with a protective coating. So I need to have an idea of what I need to do in order to get the best protection.
The last experiment was with a coating of varnish and that didn't seem to work out to well. I now am trying a water soluble sealer. I just painted the board and let it dry to the touch. When I put it on the colors seems to bleed together. So am I using the wrong stuff or is it a matter of letting it dry some more?
A couple of years ago I dropped my ring into the shower drain. This drain had no grate and it was just a giant hole. It's been a couple of years now and I wonder if I am able to to hire a plumber to check if I have a chance that my ring could still be down in the S-pipe. I ask because my ring was made of gold...
show more
A couple of years ago I dropped my ring into the shower drain. This drain had no grate and it was just a giant hole. It's been a couple of years now and I wonder if I am able to to hire a plumber to check if I have a chance that my ring could still be down in the S-pipe. I ask because my ring was made of gold and over 100 diamonds so I believe it might be heavy enough to withstand the water. However, I have no idea how much plumbing costs nor the estimates.I also wonder how am I able to find out if my house even has a p-trap or s pipe. It's a fairly old house. Thanks for all the input.
my dorm has pretty weird walls and I tried hanging a poster with regular tape but it falls off. I even tried hanging my white board with some double sided foam tape it came with but that fell off too. I would try duct tape for the poster but it would ruin the look. My dorm walls are white and I believe theyre made...
show more
my dorm has pretty weird walls and I tried hanging a poster with regular tape but it falls off. I even tried hanging my white board with some double sided foam tape it came with but that fell off too. I would try duct tape for the poster but it would ruin the look. My dorm walls are white and I believe theyre made out of concrete with some type of gloss over it. Any tips?
I was thinking of buying this
https://www.amazon.com/dp/B00OXVG9FW/ref...
I want to site the summerhouse close up to a rear fence and there won't be room to get to the back of the summerhouse. Anyone done anything like that? I would need to fix screws etc from within the summerhouse.
I want to site the summerhouse close up to a rear fence and there won't be room to get to the back of the summerhouse. Anyone done anything like that? I would need to fix screws etc from within the summerhouse.
I used one brand, and it didn't work. So I bought some heavier duty stuff, but I hear that you should NOT mix two different types, as that can be toxic to inhale. How long should I wait? Will running water through be good enough?
I used one brand, and it didn't work. So I bought some heavier duty stuff, but I hear that you should NOT mix two different types, as that can be toxic to inhale. How long should I wait? Will running water through be good enough?
I bought a used end table that is has 2 L-shaped metal legs, and the top is a piece of glass that sits on the legs. There are supposed to be 6 little button-size rubber pieces on the frame so that the glass does not rest on the metal directly. Hard to describe but you've probably seen it before.
Since my...
show more
I bought a used end table that is has 2 L-shaped metal legs, and the top is a piece of glass that sits on the legs. There are supposed to be 6 little button-size rubber pieces on the frame so that the glass does not rest on the metal directly. Hard to describe but you've probably seen it before.
Since my table was used when I bought it, most of them were missing, so I had to take them all off. Can the glass sit right on the metal frame? Or can I buy generic replacements somewhere?
I need something that will either kill crickets or at least get and keep them out of my house. If no one has a "recipe" for some homemade perhaps you can give me the name of a product that is sold? PLEASE AND THANK YOU in advance -
I need something that will either kill crickets or at least get and keep them out of my house. If no one has a "recipe" for some homemade perhaps you can give me the name of a product that is sold? PLEASE AND THANK YOU in advance -
Best answer:
The toaster apparently is responsible but, you are still going to need to visually inspect that outlet(receptacle) for damage. I'm taking kill the power and pull it to see if it is burned or melted on the sides or back, as well as the wiring.
Best answer: The toaster apparently is responsible but, you are still going to need to visually inspect that outlet(receptacle) for damage. I'm taking kill the power and pull it to see if it is burned or melted on the sides or back, as well as the wiring. |
Connecting thermodynamics and economics: well-lit roads and burned bridges.
Almost 40 years have passed since Georgescu-Roegen's seminal work, The Entropy Law and the Economic Process. During this time there has been much debate on the relevance of thermodynamics to economics, and many attempts to build bridges between the two. There has also been much confusion as to what the laws of thermodynamics actually say. This article clearly explains heat, work, and the thermodynamic laws, the meaning of entropy, and the importance of kinetics as a barrier to thermodynamically favorable processes. The two most important misunderstandings in the literature, namely entropy as disorder, and entropy as a measure of information, are highlighted. Reviewing the literature shows that thermodynamics is most relevant for building a descriptive model, or preanalytic vision of economics, because it implies physical constraints on production and consumption. Similarly, it suggests that there may be serious flaws with neoclassical economic models, and in particular the primacy of sustained growth. However, thermodynamics does not seem to aid mathematical modeling in economics, nor does it provide normative insights. As an aid to energy policy, thermodynamics is useful for assessing the feasibility of technology options--those that have the potential to meet our goals, and should be counted as options, and those that should not. But it does not provide a prescription outside of this technical realm. Factors, such as environmental impact, cost, and social acceptability, will ultimately determine which technically feasible options are most desirable. |
Q:
Lobster, steamed Saturday afternoon, eaten Monday night?
Pretty much what it sounds like. 1.25 pound whole Maine lobster cooked mid-day on Saturday and refrigerated until Monday evening. Still in the shell, claws, tail, and all. Still good?
I normally assume proteins will hold for 3-4 days, but I'm not as trusting with fish as meats, and I'm even more suspicious of shellfish. Is that hunch justified?
A:
According to stilltasty.com two days is the max, so you'll be fine as long as you refrigerated it within two hours of cooking.
Other sources claim durations of 4-5 days. As sarge suggests, use your nose.
Other sources:
http://www.lobsterhelp.com/lobster-facts.html
http://www.fao.org/wairdocs/tan/x5887e/x5887e01.htm
A:
When in doubt, use your nose. If your shellfish develops a different smell after cooking you should be leery of eating it. That actually applies to all proteins that are cooked by themselves. Also any changes to texture and any visible changes to the surface should also be cause for alarm. Fridged food has very different spoilage rates depending on how constant the temp in your fridge remains, so you should always use those internet guidelines as maximums in stead of guarantees. (The website writer isn't going to be the one hugging the toilet if their wrong after all)
|
The Iranians are the central pillar of the united and cohesive Shia-dominated bloc, which includes the Assad regime in Syria, Hizballah in Lebanon, and its allies — the government of Iraq and the Shia militias in that country. The Saudis are now the …Read more on Breaking Israel News |
---
abstract: 'Recent work has shown how to embed *differentiable optimization problems* (that is, problems whose solutions can be backpropagated through) as layers within deep learning architectures. This method provides a useful inductive bias for certain problems, but existing software for differentiable optimization layers is rigid and difficult to apply to new settings. In this paper, we propose an approach to differentiating through disciplined convex programs, a subclass of convex optimization problems used by domain-specific languages (DSLs) for convex optimization. We introduce *disciplined parametrized programming*, a subset of disciplined convex programming, and we show that every disciplined parametrized program can be represented as the composition of an affine map from parameters to problem data, a solver, and an affine map from the solver’s solution to a solution of the original problem (a new form we refer to as *affine-solver-affine* form). We then demonstrate how to efficiently differentiate through each of these components, allowing for end-to-end analytical differentiation through the entire convex program. We implement our methodology in version 1.1 of CVXPY, a popular Python-embedded DSL for convex optimization, and additionally implement differentiable layers for disciplined convex programs in PyTorch and TensorFlow 2.0. Our implementation significantly lowers the barrier to using convex optimization problems in differentiable programs. We present applications in linear machine learning models and in stochastic control, and we show that our layer is competitive (in execution time) compared to specialized differentiable solvers from past work.'
author:
- |
Akshay Agrawal\
Stanford University\
`akshayka@cs.stanford.edu`\
Brandon Amos\
Facebook AI\
`bda@fb.com`\
Shane Barratt\
Stanford University\
`sbarratt@stanford.edu`\
Stephen Boyd\
Stanford University\
`boyd@stanford.edu`\
Steven Diamond\
Stanford University\
`diamond@cs.stanford.edu`\
J. Zico Kolter[^1]\
Carnegie Mellon University\
Bosch Center for AI\
`zkolter@cs.cmu.edu`
bibliography:
- 'refs.bib'
title: Differentiable Convex Optimization Layers
---
Introduction {#sec:intro}
============
Recent work has shown how to differentiate through specific subclasses of convex optimization problems, which can be viewed as functions mapping problem data to solutions [@amos2017optnet; @djolonga2017differentiable; @barratt2018differentiability; @agrawal2019derivative; @amos2019differentiable]. These layers have found several applications [@geng2019coercing; @amos2017optnet; @donti2017task; @de2018end; @amos2018differentiable; @ling2018game; @wilder2018melding; @lee2019meta; @barratt2019least; @barratt2019fitting], but many applications remain relatively unexplored (see, , [@amos2019differentiable §8]).
While convex optimization layers can provide useful inductive bias in end-to-end models, their adoption has been slowed by how difficult they are to use. Existing layers (, [@amos2017optnet; @agrawal2019derivative]) require users to transform their problems into rigid canonical forms by hand. This process is tedious, error-prone, and time-consuming, and often requires familiarity with convex analysis. Domain-specific languages (DSLs) for convex optimization abstract away the process of converting problems to canonical forms, letting users specify problems in a natural syntax; programs are then lowered to canonical forms and supplied to numerical solvers behind-the-scenes [@agrawal2018rewriting]. DSLs enable rapid prototyping and make convex optimization accessible to scientists and engineers who are not necessarily experts in optimization.
The point of this paper is to do what DSLs have done for convex optimization, but for differentiable convex optimization layers. In this work, we show how to efficiently differentiate through disciplined convex programs [@grant2006disciplined]. This is a large class of convex optimization problems that can be parsed and solved by most DSLs for convex optimization, including CVX [@grant2014cvx], CVXPY [@diamond2016cvxpy; @agrawal2018rewriting], Convex.jl [@udell2014cvxjl], and CVXR [@fu2017cvxr]. Concretely, we introduce *disciplined parametrized programming* (DPP), a grammar for producing parametrized disciplined convex programs. Given a program produced by DPP, we show how to obtain an affine map from parameters to problem data, and an affine map from a solution of the canonicalized problem to a solution of the original problem. We refer to this representation of a problem — , the composition of an affine map from parameters to problem data, a solver, and an affine map to retrieve a solution — as *affine-solver-affine* (ASA) form.
Our contributions are three-fold:
**1.** We introduce DPP, a new grammar for parametrized convex optimization problems, and ASA form, which ensures that the mapping from problem parameters to problem data is affine. DPP and ASA-form make it possible to differentiate through DSLs for convex optimization, *without explicitly backpropagating through the operations of the canonicalizer*. We present DPP and ASA form in §\[sec:derivative\].
**2.** We implement the DPP grammar and a reduction from parametrized programs to ASA form in CVXPY 1.1. We also implement differentiable convex optimization layers in PyTorch [@paszke2017automatic] and TensorFlow 2.0 [@agrawal2019tensorflow]. Our software substantially lowers the barrier to using convex optimization layers in differentiable programs and neural networks (§\[sec:impl\]).
**3.** We present applications to sensitivity analysis for linear machine learning models, and to learning control-Lyapunov policies for stochastic control (§\[sec:ex\]). We also show that for quadratic programs (QPs), our layer’s runtime is competitive with OptNet’s specialized solver `qpth` [@amos2017optnet] (§\[sec:eval\]).
Related work
============
#### DSLs for convex optimization.
DSLs for convex optimization allow users to specify convex optimization problems in a natural way that follows the math. At the foundation of these languages is a ruleset from convex analysis known as disciplined convex programming (DCP) [@grant2006disciplined]. A mathematical program written using DCP is called a disciplined convex program, and all such programs are convex. Disciplined convex programs can be *canonicalized* to cone programs by expanding each nonlinear function into its graph implementation [@grant2008graph]. DPP can be seen as a subset of DCP that mildly restricts the way parameters (symbolic constants) can be used; a similar grammar is described in [@chu2013code]. The techniques used in this paper to canonicalize parametrized programs are similar to the methods used by code generators for optimization problems, such as CVXGEN [@mattingley2012cvxgen], which targets QPs, and QCML, which targets second-order cone programs (SOCPs) [@chu2013code; @chu2017qcml].
#### Differentiation of optimization problems.
Convex optimization problems do not in general admit closed-form solutions. It is nonetheless possible to differentiate through convex optimization problems by implicitly differentiating their optimality conditions (when certain regularity conditions are satisfied) [@fiacco1968; @robinson1980; @amos2017optnet]. Recently, methods were developed to differentiate through convex cone programs in [@busseti2018solution; @agrawal2019derivative] and [@amos2019differentiable §7.3]. Because every convex program can be cast as a cone program, these methods are general. The software released alongside [@agrawal2019derivative], however, requires users to express their problems in conic form. Expressing a convex optimization problem in conic form requires a working knowledge of convex analysis. Our work abstracts away conic form, letting the user differentiate through high-level descriptions of convex optimization problems; we canonicalize these descriptions to cone programs on the user’s behalf. This makes it possible to rapidly experiment with new families of differentiable programs, induced by different kinds of convex optimization problems.
Because we differentiate through a cone program by implicitly differentiating its solution map, our method can be paired with any algorithm for solving convex cone programs. In contrast, methods that differentiate through every step of an optimization procedure must be customized for each algorithm (, [@domke2012generic; @diamond2017unrolled; @mardani2018neural]). Moreover, such methods only approximate the derivative, whereas we compute it analytically (when it exists).
Background {#sec:bg}
==========
#### Convex optimization problems.
A parametrized convex optimization problem can be represented as $$\label{eqn-cvx}
\begin{array}{ll}
\mbox{minimize} & f_0(x; \theta) \\
\mbox{subject to} & f_i(x; \theta) \leq 0, \quad i=1, \ldots, m_1,\\
& g_i(x; \theta) = 0, \quad i=1, \ldots, m_2,
\end{array}$$ where $x \in \reals^n$ is the optimization variable and $\theta \in \reals^p$ is the parameter vector [@boyd2004convex §4.2]. The functions $f_i : \reals^n \to \reals$ are convex, and the functions $g_i : \reals^n \to \reals$ are affine. A *solution* to is any vector $x^\star \in \reals^n$ that minimizes the objective function, among all choices that satisfy the constraints. The problem can be viewed as a (possibly multi-valued) function that maps a parameter to solutions. In this paper, we consider the case when this solution map is single-valued, and we denote it by $\mathcal S : \reals^p \to \reals^n$. The function $S$ maps a parameter $\theta$ to a solution $x^\star$. From the perspective of end-to-end learning, $\theta$ (or parameters it depends on) is learned in order to minimize some scalar function of $x^\star$. In this paper, we show how to obtain the derivative of $\mathcal S$ with respect to $\theta$, when is a DPP-compliant program (and when the derivative exists).
We focus on convex optimization because it is a powerful modeling tool, with applications in control [@boyd1994linear; @bertsekas2005dynamic; @todorov2012mujoco], finance [@markowitz1952portfolio; @boyd2017multi], energy management [@moehle2018dynamicnot], supply chain [@bertsimas2004robust; @ben2005retailer], physics [@kanno2011nonsmooth; @angeris2019], computational geometry [@van2000computational], aeronautics [@hoburg2014geometric], and circuit design [@hershenson2001opamp; @boyd2005digital], among other fields.
#### Disciplined convex programming.
DCP is a grammar for constructing convex optimization problems [@grant2006disciplined; @grant2008graph]. It consists of functions, or *atoms*, and a single rule for composing them. An atom is a function with known curvature (affine, convex, or concave) and per-argument monotonicities. The composition rule is based on the following theorem from convex analysis. Suppose $h : \reals^k \to \reals$ is convex, nondecreasing in arguments indexed by a set $I_1 \subseteq \{1, 2, \ldots, k\}$, and nonincreasing in arguments indexed by $I_2$. Suppose also that $g_i : \reals^n \to
\reals$ are convex for $i \in I_1$, concave for $i \in I_2$, and affine for $i \in
(I_1 \cap I_2)^c$. Then the composition $f(x) = h(g_1(x), g_2(x), \ldots,
g_k(x))$ is convex. DCP allows atoms to be composed so long as the composition satisfies this composition theorem. Every disciplined convex program is a convex optimization problem, but the converse is not true. This is not a limitation in practice, because atom libraries are extensible (, the class corresponding to DCP is parametrized by which atoms are implemented). In this paper, we consider problems of the form in which the functions $f_i$ and $g_i$ are constructed using DPP, a version of DCP that performs parameter-dependent curvature analysis (see §\[sec:dpp\]).
#### Cone programs.
A (convex) cone program is an optimization problem of the form $$\begin{array}{ll}
\text{minimize} & c^T x\\
\text{subject to} & b-Ax \in \mathcal K,\\
\end{array}
\label{eq:cp}$$ where $x\in \reals^n$ is the variable (there are several other equivalent forms for cone programs). The set $\mathcal{K}\subseteq \reals^m$ is a nonempty, closed, convex cone, and the *problem data* are $A \in \reals^{m \times n}$, $b\in \reals^m $, and $c\in \reals^n$. In this paper we assume that has a unique solution.
Our method for differentiating through disciplined convex programs requires calling a solver (an algorithm for solving an optimization problem) in the forward pass. We focus on the special case in which the solver is a *conic solver*. A conic solver targets convex cone programs, implementing a function $s: \reals^{m \times n} \times \reals^m
\times \reals^n \to \reals^n$ mapping the problem data $(A,b,c)$ to a solution $x^\star$.
DCP-based DSLs for convex optimization can canonicalize disciplined convex programs to equivalent cone programs, producing the problem data $A, b$, $c$, and $\mathcal K$ [@agrawal2018rewriting]; $(A, b, c)$ depend on the parameter $\theta$ and the canonicalization procedure. These data are supplied to a conic solver to obtain a solution; there are many high-quality implementations of conic solvers (, [@odonoghue2017scs; @mosek; @domahidi2013ecos]).
Differentiating through disciplined convex programs {#sec:derivative}
===================================================
We consider a disciplined convex program with variable $x \in
\reals^n$, parametrized by $\theta \in \reals^p$; its solution map can be viewed as a function $\mathcal S : \reals^p \to \reals^n$ that maps parameters to the solution (see §\[sec:bg\]). In this section we describe the form of $\mathcal S$ and how to evaluate $\mathsf{D}^T \mathcal S$, allowing us to backpropagate through parametrized disciplined convex programs. (We use the notation ${\mathsf{D}}f(x)$ to denote the derivative of a function $f$ evaluated at $x$, and ${\mathsf{D}}^T f(x)$ to denote the adjoint of the derivative at $x$.) We consider the special case of canonicalizing a disciplined convex program to a cone program. With little extra effort, our method can be extended to other targets.
We express $\mathcal S$ as the composition $R \circ s \circ C$; the canonicalizer $C$ maps parameters to cone problem data $(A,b,c)$, the cone solver $s$ solves the cone problem, furnishing a solution $\tilde x^\star$, and the retriever $R$ maps $\tilde x^\star$ to a solution $x^\star$ of the original problem. A problem is in ASA form if $C$ and $R$ are affine.
By the chain rule, the adjoint of the derivative of a disciplined convex program is $$\mathsf{D}^T\mathcal{S}(\theta) =
\mathsf{D}^TC(\theta)
\mathsf{D}^Ts(A,b,c)
\mathsf{D}^TR(\tilde x^\star).$$ The remainder of this section proceeds as follows. In §\[sec:dpp\], we present DPP, a ruleset for constructing disciplined convex programs reducible to ASA form. In §\[sec:canon\], we describe the canonicalization procedure and show how to represent $C$ as a sparse matrix. In §\[sec:solver\], we review how to differentiate through cone programs, and in §\[sec:retrieval\], we describe the form of $R$.
Disciplined parametrized programming {#sec:dpp}
------------------------------------
DPP is a grammar for producing parametrized disciplined convex programs from a set of functions, or atoms, with known curvature (constant, affine, convex, or concave) and per-argument monotonicities. A program produced using DPP is called a disciplined parametrized program. Like DCP, DPP is based on the well-known composition theorem for convex functions, and it guarantees that every function appearing in a disciplined parametrized program is affine, convex, or concave. Unlike DCP, DPP also guarantees that the produced program can be reduced to ASA form.
A disciplined parametrized program is an optimization problem of the form $$\label{eqn:dpp}
\begin{array}{ll}
\mbox{minimize} & f_0(x, \theta) \\
\mbox{subject to} & f_i(x, \theta) \leq \tilde{f}_i(x, \theta), \quad i = 1, \ldots, m_1, \\
& g_i(x, \theta) = \tilde{g}_i(x, \theta), \quad i = 1, \ldots, m_2,
\end{array}$$ where $x \in \reals^n$ is a variable, $\theta \in \reals^p$ is a parameter, the $f_i$ are convex, $\tilde{f}_i$ are concave, $g_i$ and $\tilde{g}_i$ are affine, and the expressions are constructed using DPP. An expression can be thought of as a tree, where the nodes are atoms and the leaves are variables, constants, or parameters. A parameter is a symbolic constant with known properties such as sign but unknown numeric value. An expression is said to be parameter-affine if it does not have variables among its leaves and is affine in its parameters; an expression is parameter-free if it is not parametrized, and variable-free if it does not have variables.
Every DPP program is also DCP, but the converse is not true. DPP generates programs reducible to ASA form by introducing two restrictions on expressions involving parameters:
1. In DCP, we classify the curvature of each subexpression appearing in the problem description as convex, concave, affine, or constant. All parameters are classified as constant. In DPP, parameters are classified as affine, just like variables.
2. In DCP, the product atom $\phi_\mathrm{prod}(x, y) = xy$ is affine if $x$ or $y$ is a constant (, variable-free). Under DPP, the product is affine when at least one of the following is true:
- $x$ or $y$ is constant (, both parameter-free and variable-free);
- one of the expressions is parameter-affine and the other is parameter-free.
The DPP specification can (and may in the future) be extended to handle several other combinations of expressions and parameters.
#### Example.
Consider the program $$\label{eqn:asa}
\begin{array}{ll}
\mbox{minimize} & {\|{Fx - g}\|}_2 + \lambda {\|{x}\|}_2 \\
\mbox{subject to} & x \geq 0,
\end{array}$$ with variable $x \in \reals^n$ and parameters $F \in \reals^{m \times n}$, $g \in \reals^m$, and $\lambda > 0$. If ${\|{\cdot}\|}_2$, the product, negation, and the sum are atoms, then this problem is DPP-compliant:
- $\phi_\mathrm{prod}(F, x) = Fx$ is affine because the atom is affine ($F$ is parameter-affine and $x$ is parameter-free) and $F$ and $x$ are affine;
- $Fx - g$ is affine because $Fx$ and $-g$ are affine and the sum of affine expressions is affine;
- ${\|{Fx- g}\|}_2$ is convex because ${\|{\cdot}\|}_2$ is convex and convex composed with affine is convex;
- $\phi_{\mathrm{prod}}(\lambda, {\|{x}\|}_2)$ is convex because the product is affine ($\lambda$ is parameter-affine, ${\|{x}\|}_2$ is parameter-free), it is increasing in ${\|{x}\|}_2$ (because $\lambda$ is nonnegative), and ${\|{x}\|}_2$ is convex;
- the objective is convex because the sum of convex expressions is convex.
#### Non-DPP transformations of parameters.
It is often possible to re-express non-DPP expressions in DPP-compliant ways. Consider the following examples, in which the $p_i$ are parameters:
- The expression $\phi_{\mathrm{prod}}(p_1, p_2)$ is not DPP because both of its arguments are parametrized. It can be rewritten in a DPP-compliant way by introducing a variable $s$, replacing $p_1p_2$ with the expression $p_1 s$, and adding the constraint $s = p_2$.
- Let $e$ be an expression. The quotient $e/p_1$ is not DPP, but it can be rewritten as $ep_2$, where $p_2$ is a new parameter representing $1/p_1$.
- The expression $\log |p_1|$ is not DPP because $\log$ is concave and increasing but $|\cdot|$ is convex. It can be rewritten as $\log p_2$ where $p_2$ is a new parameter representing $|p_1|$.
- If $P_1 \in \reals^{n \times n}$ is a parameter representing a (symmetric) positive semidefinite matrix and $x \in \reals^n$ is a variable, the expression $\phi_{\mathrm{quadform}}(x, P_1) = x^T P_1 x$ is not DPP. It can be rewritten as ${\|{P_2 x}\|}_2^2$, where $P_2$ is a new parameter representing $P_1^{1/2}$.
Canonicalization {#sec:canon}
----------------
The canonicalization of a disciplined parametrized program to ASA form is similar to the canonicalization of a disciplined convex program to a cone program. All nonlinear atoms are expanded into their graph implementations [@grant2008graph], generating affine expressions of variables. The resulting expressions are also affine in the problem parameters due to the DPP rules. Because these expressions represent the problem data for the cone program, the function $C$ from parameters to problem data is affine.
As an example, the DPP program can be canonicalized to the cone program $$\label{eq:graph}
\begin{array}{ll}
\mbox{minimize} & t_1 + \lambda t_2 \\
\mbox{subject to} & (t_1, Fx - g) \in \mathcal{Q}_{m+1}, \\
& (t_2, x) \in \mathcal{Q}_{n+1}, \\
& x \in \reals^{n}_{+},
\end{array}$$ where $(t_1, t_2, x)$ is the variable, $\mathcal{Q}_n$ is the $n$-dimensional second-order cone, and $\reals^n_+$ is the nonnegative orthant. When rewritten in the standard form , this problem has data $$\begin{aligned}
A = \begin{bmatrix}
-1 & & \\
& & -F \\
\cmidrule(lr){1-3}
& -1 & \\
& & -I \\
\cmidrule(lr){1-3}
& & -I
\end{bmatrix}, \quad
b = \begin{bmatrix} 0 \\ -g \\ 0 \\ 0 \\ 0\end{bmatrix},\quad
c = \begin{bmatrix} 1 \\ \lambda \\ 0 \end{bmatrix}, \quad
\mathcal{K} = \mathcal{Q}_{m+1} \times \mathcal{Q}_{n+1} \times \reals^n_+,\end{aligned}$$ with blank spaces representing zeros and the horizontal line denoting the cone boundary. In this case, the parameters $F$, $g$ and $\lambda$ are just negated and copied into the problem data.
#### The canonicalization map.
The full canonicalization procedure (which includes expanding graph implementations) only runs *the first time the problem is canonicalized*. When the same problem is canonicalized in the future (, with new parameter values), the problem data $(A, b, c)$ can be obtained by multiplying a sparse matrix representing $C$ by the parameter vector (and reshaping); the adjoint of the derivative can be computed by just transposing the matrix. The naïve alternative — expanding graph implementations and extracting new problem data every time parameters are updated (and differentiating through this algorithm in the backward pass) — is much slower (see §\[sec:eval\]). The following lemma tells us that $C$ can be represented as a sparse matrix.
\[lem:asa\] The canonicalizer map $C$ for a disciplined parametrized program can be represented with a sparse matrix $Q \in \reals^{n \times p+1}$ and sparse tensor $R
\in \reals^{m \times n + 1 \times p+1}$, where $m$ is the dimension of the constraints. Letting $\tilde \theta \in \reals^{p+1}$ denote the concatenation of $\theta$ and the scalar offset $1$, the problem data can be obtained as $c = Q \tilde \theta$ and $\begin{bmatrix}A &
b\end{bmatrix} = \sum_{i=1}^{p+1} R_{[:,:,i]}{\tilde \theta}_i$.
The proof is given in Appendix \[apdx:canon\].
Derivative of a conic solver {#sec:solver}
----------------------------
By applying the implicit function theorem [@fiacco1968; @dontchev2009implicit] to the optimality conditions of a cone program, it is possible to compute its derivative ${\mathsf{D}}s(A, b, c)$. To compute ${\mathsf{D}}^T s(A, b, c)$, we follow the methods presented in [@agrawal2019derivative] and [@amos2019differentiable §7.3]. Our calculations are given in Appendix \[apdx:derivative\].
If the cone program is not differentiable at a solution, we compute a heuristic quantity, as is common practice in automatic differentiation [@griewank2008evaluating §14]. In particular, at non-differentiable points, a linear system that arises in the computation of the derivative might fail to be invertible. When this happens, we compute a least-squares solution to the system instead. See Appendix \[apdx:derivative\] for details.
Solution retrieval {#sec:retrieval}
------------------
The cone program obtained by canonicalizing a DPP-compliant problem uses the variable $\tilde{x} = (x, s) \in \reals^{n} \times \reals^{k}$, where $s \in \reals^k$ is a slack variable. If $\tilde{x}^\star = (x^\star, s^\star)$ is optimal for the cone program, then $x^\star$ is optimal for the original problem (up to reshaping and scaling by a constant). As such, a solution to the original problem can be obtained by slicing, , $R(\tilde x^\star) = x^\star$. This map is evidently linear.
Implementation {#sec:impl}
==============
We have implemented DPP and the reduction to ASA form in version 1.1 of CVXPY, a Python-embedded DSL for convex optimization [@diamond2016cvxpy; @agrawal2018rewriting]; our implementation extends CVXCanon, an open-source library that reduces affine expression trees to matrices [@miller2015]. We have also implemented differentiable convex optimization layers in PyTorch and TensorFlow 2.0. These layers implement the forward and backward maps described in §\[sec:derivative\]; they also efficiently support batched inputs (see §\[sec:eval\]).
We use the the `diffcp` package [@agrawal2019derivative] to obtain derivatives of cone programs. We modified this package for performance: we ported much of it from Python to C++, added an option to compute the derivative using a dense direct solve, and made the forward and backward passes amenable to parallelization.
Our implementation of DPP and ASA form, coupled with our PyTorch and TensorFlow layers, makes our software the first DSL for differentiable convex optimization layers. Our software is open-source. CVXPY and our layers are available at
<https://www.cvxpy.org>, <https://www.github.com/cvxgrp/cvxpylayers>.
#### Example.
Below is an example of how to specify the problem (\[eqn:asa\]) using CVXPY 1.1.
import cvxpy as cp
m, n = 20, 10
x = cp.Variable((n, 1))
F = cp.Parameter((m, n))
g = cp.Parameter((m, 1))
lambd = cp.Parameter((1, 1), nonneg=True)
objective_fn = cp.norm(F @ x - g) + lambd * cp.norm(x)
constraints = [x >= 0]
problem = cp.Problem(cp.Minimize(objective_fn), constraints)
assert problem.is_dpp()
The below code shows how to use our PyTorch layer to solve and backpropagate through `problem` (the code for our TensorFlow layer is almost identical; see Appendix \[apdx:tf\]).
import torch
from cvxpylayers.torch import CvxpyLayer
F_t = torch.randn(m, n, requires_grad=True)
g_t = torch.randn(m, 1, requires_grad=True)
lambd_t = torch.rand(1, 1, requires_grad=True)
layer = CvxpyLayer(
problem, parameters=[F, g, lambd], variables=[x])
x_star, = layer(F_t, g_t, lambd_t)
x_star.sum().backward()
Constructing `layer` in line `7-8` canonicalizes `problem` to extract $C$ and $R$, as described in §\[sec:canon\]. Calling `layer` in line `9` applies the map $R \circ s \circ C$ from §\[sec:derivative\], returning a solution to the problem. Line `10` computes the gradients of summing `x_star`, with respect to `F_t`, `g_t`, and `lambd_t`.
Examples {#sec:ex}
========
In this section, we present two applications of differentiable convex optimization, meant to be suggestive of possible use cases for our layer. We give more examples in Appendix \[apdx:more-ex\].
Data poisoning attack
---------------------
We are given training data $(x_i, y_i)_{i=1}^{N}$, where $x_i\in\reals^n$ are feature vectors and $y_i\in\{0,1\}$ are the labels. Suppose we fit a model for this classification problem by solving $$\begin{array}{ll}
\mbox{minimize} & \frac{1}{N}\sum_{i=1}^N \ell(\theta; x_i, y_i) + r(\theta),
\end{array}
\label{eq:trainlinear}$$ where the loss function $\ell(\theta; x_i, y_i)$ is convex in $\theta \in \reals^n$ and $r(\theta)$ is a convex regularizer. We hope that the test loss $\mathcal{L}^{\mathrm{test}}(\theta) =
\frac{1}{M}\sum_{i=1}^M \ell(\theta; \tilde x_i, \tilde y_i)$ is small, where $(\tilde x_i, \tilde y_i)_{i=1}^{M}$ is our test set.
Assume that our training data is subject to a data poisoning attack [@biggio2018wild; @jagielski2018manipulating], before it is supplied to us. The adversary has full knowledge of our modeling choice, meaning that they know the form of , and seeks to perturb the data to maximally increase our loss on the test set, to which they also have access. The adversary is permitted to apply an additive perturbation $\delta_i \in \reals^n$ to each of the training points $x_i$, with the perturbations satisfying ${\|{\delta_i}\|}_\infty \leq 0.01$.
Let $\theta^\star$ be optimal for . The gradient of the test loss with respect to a training data point, $\nabla_{x_i} \mathcal{L}^{\mathrm{test}}(\theta^\star))$.gives the direction in which the point should be moved to achieve the greatest increase in test loss. Hence, one reasonable adversarial policy is to set $x_i
\coloneqq x_i +
(.01)\mathbf{sign}(\nabla_{x_i}\mathcal{L}^{\mathrm{test}}(\theta^\star))$. The quantity $(0.01)\sum_{i=1}^N {\|{\nabla_{x_i}
\mathcal{L}^{\mathrm{test}}(\theta^\star)}\|}_1$ is the predicted increase in our test loss due to the poisoning.
#### Numerical example.
We consider 30 training points and 30 test points in $\reals^2$, and we fit a logistic model with elastic-net regularization. This problem can be written using DPP, with $x_i$ as parameters (see Appendix \[apdx:logreg\] for the code). We used our convex optimization layer to fit this model and obtain the gradient of the test loss with respect to the training data. Figure \[fig:logreg\] visualizes the results. The orange ($\star$) and blue (+) points are training data, belonging to different classes. The red line (dashed) is the hyperplane learned by fitting the the model, while the blue line (solid) is the hyperplane that minimizes the test loss. The gradients are visualized as black lines, attached to the data points. Moving the points in the gradient directions torques the learned hyperplane away from the optimal hyperplane for the test set.
Convex approximate dynamic programming
--------------------------------------
We consider a stochastic control problem of the form $$\begin{array}{ll}
\mbox{minimize} & \underset{T \to \infty}\lim {\mathbb E} \left[\frac{1}{T} \sum_{t=0}^{T-1} {\|{x_t}\|}_2^2 + {\|{\phi(x_t)}\|}_2^2\right]\\[.2cm]
\mbox{subject to} & x_{t+1} = Ax_t + B\phi(x_t) + \omega_t, \quad t=0,1,\ldots,
\end{array}
\label{eq:adp}$$ where $x_t\in\reals^n$ is the state, $\phi:\reals^n \to \mathcal U \subseteq \reals^m$ is the policy, $\mathcal U$ is a convex set representing the allowed set of controls, and $\omega_t\in\Omega$ is a (random, i.i.d.) disturbance. Here the variable is the policy $\phi$, and the expectation is taken over disturbances and the initial state $x_0$. If $\mathcal U$ is not an affine set, then this problem is in general very difficult to solve [@kalman1964linear; @barratt2018stochastic].
#### ADP policy.
A common heuristic for solving is approximate dynamic programming (ADP), which parametrizes $\phi$ and replaces the minimization over functions $\phi$ with a minimization over parameters. In this example, we take $\mathcal U$ to be the unit ball and we represent $\phi$ as a quadratic *control-Lyapunov* policy [@wang2010fast]. Evaluating $\phi$ corresponds to solving the SOCP $$\begin{array}{ll}
\mbox{minimize} & u^T P u + x_t^T Q u + q^T u \\
\mbox{subject to} & {\|{u}\|}_2 \leq 1,
\end{array}
\label{eq:policy}$$ with variable $u$ and parameters $P$, $Q$, $q$, and $x_t$. We can run stochastic gradient descent (SGD) on $P$, $Q$, and $q$ to approximately solve , which requires differentiating through . Note that if $u$ were unconstrained, could be solved exactly, via linear quadratic regulator (LQR) theory [@kalman1964linear]. The policy can be written using DPP (see Appendix \[apdx:logreg\] for the code).
#### Numerical example.
Figure \[fig:control\] plots the estimated average cost for each iteration of gradient descent for a numerical example, with $x \in
\reals^2$ and $u \in \reals^3$, a time horizon of $T=25$, and a batch size of $8$. We initialize our policy’s parameters with the LQR solution, ignoring the constraint on $u$. This method decreased the average cost by roughly 40%.
Evaluation {#sec:eval}
==========
Our implementation substantially lowers the barrier to using convex optimization layers. Here, we show that our implementation substantially reduces canonicalization time. Additionally, for dense problems, our implementation is competitive (in execution time) with a specialized solver for QPs; for sparse problems, our implementation is much faster.
#### Canonicalization.
Logistic regression Stochastic control
-------------- --------------------- --------------------
CVXPY 1.0.23 18.9 $\pm$ 1.75 12.5 $\pm$ 0.72
CVXPY 1.1 1.49 $\pm$ 0.02 1.39 $\pm$ 0.02
: Time (ms) to canonicalize examples, across 10 runs.[]{data-label="tab:canon"}
Table \[tab:canon\] reports the time it takes to canonicalize the logistic regression and stochastic control problems from §\[sec:ex\], comparing CVXPY version 1.0.23 with CVXPY 1.1. Each canonicalization was performed on a single core of an unloaded Intel i7-8700K processor. We report the average time and standard deviation across 10 runs, excluding a warm-up run. Our extension achieves on average an order-of-magnitude speed-up since computing $C$ via a sparse matrix multiply is much more efficient than going through the DSL.
#### Comparison to specialized layers.
[.49]{} ![Comparison of our PyTorch `CvxpyLayer` to [`qpth`]{}, over 10 trials. For `cvxpylayers`, we separate out the canonicalization and solution retrieval times, to allow for a fair comparison.[]{data-label="fig:comparison"}](images/dense_results.pdf "fig:"){height="40mm"}
[.49]{} ![Comparison of our PyTorch `CvxpyLayer` to [`qpth`]{}, over 10 trials. For `cvxpylayers`, we separate out the canonicalization and solution retrieval times, to allow for a fair comparison.[]{data-label="fig:comparison"}](images/sparse_results.pdf "fig:"){height="40mm"}
We have implemented a batched solver and backward pass for our differentiable CVXPY layer that makes it competitive with the batched QP layer [`qpth`]{}from [@amos2017optnet]. \[fig:comparison\] compares the runtimes of our PyTorch `CvxpyLayer` and [`qpth`]{}on a dense and sparse QP. The sparse problem is too large for [`qpth`]{}to run in GPU mode. The QPs have the form $$\begin{array}{ll}
\mbox{minimize} & \frac{1}{2} x^T Q x + p^T x \\ [.1cm]
\mbox{subject to} & Ax=b,\\
& Gx \leq h,
\end{array}
\label{eq:qp}$$ with variable $x\in\reals^n$, and problem data $Q\in\reals^{n \times n}$, $p\in\reals^n$, $A\in\reals^{m\times n}$, $b\in\reals^m$, $G\in\reals^{p \times n}$, and $h\in\reals^p$. The dense QP has $n=128$, $m=0$, and $p=128$. The sparse QP has $n=1024$, $m=1024$, and $p=1024$ and $Q$, $A$, and $G$ each have 1% nonzeros (See Appendix \[apdx:more-ex\] for the code). We ran this experiment on a machine with a 6-core Intel i7-8700K CPU, 32 GB of memory, and an Nvidia GeForce 1080 TI GPU with 11 GB of memory.
Our implementation is competitive with [`qpth`]{}for the dense QP, even on the GPU, and roughly 5 times faster for the sparse QP. Our backward pass for the dense QP uses our extension to `diffcp`; we explicitly materialize the derivatives of the cone projections and use a direct solve. Our backward pass for the sparse QP uses sparse operations and LSQR [@paige1982lsqr], significantly outperforming [`qpth`]{}(which cannot exploit sparsity). Our layer runs on the CPU, and implements batching via Python multi-threading, with a parallel for loop over the examples in the batch for both the forward and backward passes. We used 12 threads for our experiments.
Discussion
==========
#### Other solvers.
Solvers that are specialized to subclasses of convex programs are often faster than more general conic solvers. For example, one might use OSQP [@stellato2017osqp] to solve QPs, or gradient-based methods like L-BFGS [@liu1989limited] or SAGA [@defazio2014saga] for empirical risk minimization. Because CVXPY lets developers add specialized solvers as additional back-ends, our implementation of DPP and ASA form can be easily extended to other problem classes. We plan to interface QP solvers in future work.
#### Nonconvex problems.
It is possible to differentiate through nonconvex problems, either analytically [@fiacco1983nlp; @pirnay2012optimal; @amos2018differentiable] or by unrolling SGD [@domke2012generic; @belanger2017end; @metz2016unrolled; @goodfellow2013multi; @stoyanov2011empirical; @brakel2013training; @finn2017model], Because convex programs can typically be solved efficiently and to high accuracy, it is preferable to use convex optimization layers over nonconvex optimization layers when possible. This is especially true in the setting of low-latency inference. The use of differentiable nonconvex programs in end-to-end learning pipelines, discussed in [@gould2019deep], is an interesting direction for future research.
Acknowledgments {#acknowledgments .unnumbered}
===============
We gratefully acknowledge discussions with Eric Chu, who designed and implemented a code generator for SOCPs [@chu2013code; @chu2017qcml], Nicholas Moehle, who designed and implemented a basic version of a code generator for convex optimization in unpublished work, and Brendan O’Donoghue. We also would like to thank the anonymous reviewers, who provided us with useful suggestions that improved the paper. S. Barratt is supported by the National Science Foundation Graduate Research Fellowship under Grant No. DGE-1656518.
The canonicalization map {#apdx:canon}
========================
In this appendix, we provide a proof of Lemma \[lem:asa\]. We compute $Q$ and $R$ via a reduction on the affine expression trees that represent the canonicalized problem. Let $f$ be the root node with arguments (descendants) $g_1,
\ldots, g_n$. Then we obtain tensors $T_1,\ldots,T_n$ representing the (linear) action of $f$ on each argument. We recurse on each subtree $g_i$ and obtain tensors $S_1,\ldots,S_n$. Due to the DPP rules, for $i=1,\ldots,n$, we either have $(T_i)_{j,k,\ell} = 0$ for $\ell \neq p+1$ or $(S_i)_{j,k,\ell} = 0$ for $\ell \neq p+1$. We define an operation $\psi(T_i,S_i)$ such that in the first case, $\psi(T_i, S_i) =
\sum_{\ell=1}^{p+1}(T_{i})_{[:,:,p+1]}(S_{i})_{[:,:,\ell]}$, and in the second case $\psi(T_i, S_i) = \sum_{\ell=1}^{p+1}(T_{i})_{[:,:,\ell]}(S_{i})_{[:,:,p+1]}$. The tree rooted at $f$ then evaluates to $S_0 = \psi(T_1,S_1) + \cdots + \psi(T_n,S_n)$.
The base case of the recursion corresponds to the tensors produced when a variable, parameter, or constant node is evaluated. (These are the leaf nodes of an affine expression tree.)
- A variable leaf $x \in \reals^d$ produces a tensor $T \in
\reals^{d \times n+1 \times 1}$, where $T_{i,j,1}=1$ if $i$ maps to $j$ in the vector containing all variables, 0 otherwise.
- A parameter leaf $p \in \reals^d$ produces a tensor $T \in
\reals^{d \times 1 \times p+1}$, where $T_{i,1,j}=1$ if $i$ maps to $j$ in the vector containing all parameters, 0 otherwise.
- A constant leaf $c \in \reals^d$ produces a tensor $T \in
\reals^{d \times 1 \times 1}$, where $T_{i,1,1}=c_i$ for $i=1,\ldots,d$.
Derivative of a cone program {#apdx:derivative}
============================
In this appendix, we show how to differentiate through a cone program. We first present some preliminaries.
#### Primal-dual form of a cone program.
A (convex) cone program is given by
---------------------------------------- ---------------------------------------------
[$$ \begin{array}{lll} [ $$\label{eq:pdcp}
\text{(P)} \begin{array}{lll}
&\text{minimize} &c^T x\\ \text{(D)}&\text{minimize}& b^T y\\
&\text{subject to} & Ax+s=b\\ &\text{subject to}& A^T y+c=0\\
& &s\in \mathcal{K}, &&y\in \mathcal{K}^*.
\end{array}$$]{} \end{array}$$]{}
---------------------------------------- ---------------------------------------------
Here $x\in \reals^n$ is the *primal* variable, $y\in \reals^m$ is the *dual* variable, and $s\in \reals^m$ is the primal *slack* variable. The set $\mathcal{K}\subseteq \reals^m$ is a nonempty, closed, convex cone with *dual cone* $\mathcal{K}^*\subseteq \reals^m$. We call $(x,y,s)$ a solution of the primal-dual cone program if it satisfies the KKT conditions: $$Ax +s =b, \quad
A^T y + c = 0, \quad
s \in \mathcal{K}, \quad
y \in \mathcal{K}^*, \quad
s^T y = 0.$$
Every convex optimization problem can be reformulated as a convex cone program.
#### Homogeneous self-dual embedding.
The homogeneous self-dual embedding reduces the process of solving to finding a zero of a certain residual map [@ye1994nl]. Letting $N=n+m+1$, the embedding uses the variable $z\in \reals^N$, which we partition as $(u,v,w) \in \reals^n \times \reals^m \times \reals$. The *normalized residual map* introduced in [@busseti2018solution] is the function $ \mathcal{N}: \reals^N
\times \reals^{N \times N}
\to \reals^N$, defined by $$\mathcal{N}(z,Q)
=\big((Q-I)\Pi+I\big)(z/|w|),$$ where $\Pi$ denotes projection onto $\reals^n \times \mathcal {K}^* \times \reals_+$, and $Q$ is the skew-symmetric matrix Q =
0 & A\^T & c\
-A & 0 & b\
-c\^T & -b\^T & 0
. \[eq:skew\] If $\mathcal{N}(z,Q)=0$ and $w>0$, we can use $z$ to construct a solution of the primal-dual pair as (x,y,s) = (u, \_(v), \_[\^\*]{}(v)-v)/w, \[eq:sol\] where $\Pi_{\mathcal K^*}(v)$ denotes the projection of $v$ onto $\mathcal K^*$. From here onward, we assume that $w=1$. (If this is not the case, we can scale $z$ such that it is the case.)
#### Differentiation.
A conic solver is a numerical algorithm for solving . We can view a conic solver as a function $\psi:
\reals^{m\times n} \times
\reals^m\times \reals^n \to \reals^{n+2m}$ mapping the problem data $(A,b,c)$ to a solution $(x,y,s)$. (We assume that the cone $\mathcal K$ is fixed.) In this section we derive expressions for the derivative of $\psi$, assuming that $\mathcal S$ is in fact differentiable. Interlaced with our derivations, we describe how to numerically evaluate the adjoint of the derivative map, which is necessary for backpropagation.
Following [@agrawal2019derivative] and [@amos2019differentiable Section 7], we can express $\psi$ as the composition $\phi \circ s \circ Q$, where
- $Q: \reals^{m \times n} \times \reals^m \times \reals^n \to \mathcal \reals^{N \times N}$ maps the problem data to $Q$, given by ,
- $s: \reals^{N \times N} \to \reals^N$ solves the homogeneous self-dual embedding, which we can implicitly differentiate, and
- $\phi: \reals^N \to \reals^n \times \reals^m \times \reals^m$ maps $z$ to the primal-dual pair, given by .
To backpropagate through $\psi$, we need to compute the adjoint of the derivative of $\psi$ at $(A,b,c)$ applied to the vector $(\mathsf{d}x, \mathsf{d}y, \mathsf{d}s)$, or $$(\mathsf{d}A, \mathsf{d}b, \mathsf{d}c) = {\mathsf{D}}^T\psi(A,b,c)(\mathsf{d}x, \mathsf{d}y, \mathsf{d}s) = {\mathsf{D}}^TQ(A, b, c) {\mathsf{D}}^Ts(Q) {\mathsf{D}}^T \phi(z) (\mathsf{d}x, \mathsf{d}y, \mathsf{d}s).$$ Since our layer only outputs the primal solution $x$, we can simplify the calculation by taking $\mathsf{d}y = \mathsf{d}s = 0$. By , $$\mathsf{d}z = {\mathsf{D}}^T \phi(z) (\mathsf{d}x, 0, 0) =
\begin{bmatrix}
\mathsf{d}x \\
0 \\
-x^T\mathsf{d}x
\end{bmatrix}.$$ We can compute $\mathsf{D}s(Q)$ by implicitly differentiating the normalized residual map: \[eq:implicit\] s(Q) = -(\_z (s(Q), Q))\^[-1]{} \_Q (s(Q), Q). This gives $$\mathsf{d}Q = \mathsf{D}^Ts(Q)\mathsf{d}z = -(M^{-T}\mathsf{d}z) \Pi(z)^T,$$ where $M = (Q - I){\mathsf{D}}\Pi(z) + I$. Computing $g = M^{-T}\mathsf{d}z$ via a direct method (, materializing $M$, factorizing it, and back-solving) can be impractical when $M$ is large. Instead, one might use a Krylov method like LSQR [@paige1982lsqr] to solve $$\begin{array}{ll}
\underset{g}{\mbox{minimize}} & \|M^Tg - \mathsf{d}z\|_2^2,
\end{array}\label{eq:M}$$ which only requires multiplication by $M$ and $M^T$. Instead of computing $\mathsf{d}Q$ as an outer product, we only obtain its nonzero entries. Finally, partitioning $\mathsf{d}Q$ as $$\mathsf{d}Q = \begin{bmatrix}
\mathsf{d}Q_{11} & \mathsf{d}Q_{12} & \mathsf{d}Q_{13} \\
\mathsf{d}Q_{21} & \mathsf{d}Q_{22} & \mathsf{d}Q_{23} \\
\mathsf{d}Q_{31} & \mathsf{d}Q_{32} & \mathsf{d}Q_{33} \\
\end{bmatrix},$$ we obtain A &=& -Q\_[12]{}\^T + Q\_[21]{}\
b &=& -Q\_[23]{} + Q\_[32]{}\^T\
c &=& -Q\_[13]{} + Q\_[31]{}\^T.
#### Non-differentiability.
To implicitly differentiate the solution map in $\eqref{eq:implicit}$, we assumed that the $M$ was invertible. When $M$ is not invertible, we approximate $\mathsf{d}Q$ as $-g^\mathrm{ls} \Pi(z)^T$, where $g^\mathrm{ls}$ is a least-squares solution to $\eqref{eq:M}$.
Examples {#apdx:ex}
========
This appendix includes code for the examples presented in §\[sec:ex\].
#### Logistic regression. {#apdx:logreg}
The code for the logistic regression problem is below:
import cvxpy as cp
from cvxpylayers.torch import CvxpyLayer
beta = cp.Variable((n, 1))
b = cp.Variable((1, 1))
X = cp.Parameter((N, n))
log_likelihood = (1. / N) * cp.sum(
cp.multiply(Y, X @ beta + b) - cp.logistic(X @ beta + b)
)
regularization = -0.1 * cp.norm(beta, 1) -0.1 * cp.sum_squares(beta)
prob = cp.Problem(cp.Maximize(log_likelihood + regularization))
fit_logreg = CvxpyLayer(prob, parameters=[X], variables=[beta, b])
#### Stochastic control. {#apdx:stoch}
The code for the stochastic control problem is below:
import cvxpy as cp
from cvxpylayers.torch import CvxpyLayer
x_cvxpy = cp.Parameter((n, 1))
P_sqrt_cvxpy = cp.Parameter((m, m))
P_21_cvxpy = cp.Parameter((n, m))
q_cvxpy = cp.Parameter((m, 1))
u_cvxpy = cp.Variable((m, 1))
y_cvxpy = cp.Variable((n, 1))
objective = .5 * cp.sum_squares(P_sqrt_cvxpy @ u_cvxpy) + x_cvxpy.T @ y_cvxpy + q_cvxpy.T @ u_cvxpy
prob = cp.Problem(cp.Minimize(objective),
[cp.norm(u_cvxpy) <= .5, y_cvxpy == P_21_cvxpy @ u_cvxpy])
policy = CvxpyLayer(prob,
parameters=[x_cvxpy, P_sqrt_cvxpy, P_21_cvxpy, q_cvxpy],
variables=[u_cvxpy])
TensorFlow layer {#apdx:tf}
================
In §\[sec:impl\], we showed how to implement the problem using our PyTorch layer. The below code shows how to implement the same problem using our TensorFlow 2.0 layer.
import tensorflow as tf
from cvxpylayers.tensorflow import CvxpyLayer
F_t = tf.Variable(tf.random.normal(F.shape))
g_t = tf.Variable(tf.random.normal(g.shape))
lambd_t = tf.Variable(tf.random.normal(lambd.shape))
layer = CvxpyLayer(problem, parameters=[F, g, lambd], variables=[x])
with tf.GradientTape() as tape:
x_star, = layer(F_t, g_t, lambd_t)
dF, dg, dlambd = tape.gradient(x_star, [F_t, g_t, lambd_t])
Additional examples {#apdx:more-ex}
===================
In this appendix we provide additional examples of constructing differentiable convex optimization layers using our implementation. We present the implementation of common neural networks layers, even though analytic solutions exist for some of these operations. These layers can be modified in simple ways such that they do *not* have analytical solutions. In the below problems, the optimization variable is $y$ (unless stated otherwise). We also show how prior work on differentiable convex optimization layers such as OptNet [@amos2017optnet] is captured by our framework.
The **ReLU**, defined by $f(x) = \max\{0, x\}$, can be interpreted as projecting a point $x\in\reals^n$ onto the non-negative orthant as $$\begin{array}{ll}
\mbox{minimize} & \frac{1}{2}||x-y||_2^2 \\
\mbox{subject to} & y \geq 0.
\end{array}$$ We can implement this layer with:
x = cp.Parameter(n)
y = cp.Variable(n)
obj = cp.Minimize(cp.sum_squares(x-y))
cons = [y >= 0]
prob = cp.Problem(obj, cons)
layer = CvxpyLayer(prob, parameters=[x], variables=[y])
The **sigmoid** or **logistic** function, defined by $f(x) =
(1+e^{-x})^{-1}$, can be interpreted as projecting a point $x\in\reals^n$ onto the interior of the unit hypercube as $$\begin{array}{ll}
\mbox{minimize} & -x^\top y -H_b(y) \\
\mbox{subject to} & 0 < y < 1,
\end{array}$$ where $H_b(y) = - \left(\sum_i y_i\log y_i + (1-y_i)\log (1-y_i)\right)$ is the binary entropy function. This is proved, , in [@amos2019differentiable Section 2.4]. We can implement this layer with:
x = cp.Parameter(n)
y = cp.Variable(n)
obj = cp.Minimize(-x.T*y - cp.sum(cp.entr(y) + cp.entr(1.-y)))
prob = cp.Problem(obj)
layer = CvxpyLayer(prob, parameters=[x], variables=[y])
The **softmax**, defined by $f(x)_j = e^{x_j} / \sum_i e^{x_i}$, can be interpreted as projecting a point $x\in\reals^n$ onto the interior of the $(n-1)$-simplex $\Delta_{n-1}=\{p\in\reals^n\; \vert\; 1^\top p = 1 \; \; {\rm and} \;\; p \geq 0 \}$ as $$\begin{array}{ll}
\mbox{minimize} & -x^\top y - H(y) \\
\mbox{subject to} & 0 < y < 1, \\
& 1^\top y = 1,
\end{array}$$ where $H(y) = -\sum_i y_i \log y_i$ is the entropy function. This is proved, , in [@amos2019differentiable Section 2.4]. We can implement this layer with:
x = cp.Parameter(d)
y = cp.Variable(d)
obj = cp.Minimize(-x.T*y - cp.sum(cp.entr(y)))
cons = [sum(y) == 1.]
prob = cp.Problem(obj, cons)
layer = CvxpyLayer(prob, parameters=[x], variables=[y])
The **sparsemax** [@martins2016softmax] does a Euclidean projection onto the simplex as $$\begin{array}{ll}
\mbox{minimize} & ||x-y||_2^2 \\
\mbox{subject to} & 1^\top y = 1, \\
& 0 \leq y \leq 1.
\end{array}$$ We can implement this layer with:
x = cp.Parameter(n)
y = cp.Variable(n)
obj = cp.sum_squares(x-y)
cons = [cp.sum(y) == 1, 0. <= y, y <= 1.]
prob = cp.Problem(cp.Minimize(obj), cons)
layer = CvxpyLayer(prob, [x], [y])
The **constrained softmax** [@martins2017learning] solves the optimization problem $$\begin{array}{ll}
\mbox{minimize} & -x^\top y - H(y) \\
\mbox{subject to} & 1^\top y = 1, \\
& y \leq u, \\
& 0 < y < 1.
\end{array}$$ We can implement this layer with:
x = cp.Parameter(n)
y = cp.Variable(n)
obj = -x*y-cp.sum(cp.entr(y))
cons = [cp.sum(y) == 1., y <= u]
prob = cp.Problem(cp.Minimize(obj), cons)
layer = CvxpyLayer(prob, [x], [y])
The **constrained sparsemax** [@malaviya2018sparse] solves the optimization problem $$\begin{array}{ll}
\mbox{minimize} & ||x-y||_2^2, \\
\mbox{subject to} & 1^\top y = 1, \\
& 0 \leq y \leq u.
\end{array}$$ We can implement this layer with:
x = cp.Parameter(n)
y = cp.Variable(n)
obj = cp.sum_squares(x-y)
cons = [cp.sum(y) == 1., 0. <= y, y <= u]
prob = cp.Problem(cp.Minimize(obj), cons)
layer = CvxpyLayer(prob, [x], [y])
The **Limited Multi-Label (LML)** layer [@amos2019lml] solves the optimization problem $$\begin{array}{ll}
\mbox{minimize} & -x^\top y - H_b(y) \\
\mbox{subject to} & 1^\top y = k, \\
& 0 < y < 1.
\end{array}$$ We can implement this layer with:
x = cp.Parameter(n)
y = cp.Variable(n)
obj = -x*y-cp.sum(cp.entr(y))-cp.sum(cp.entr(1.-y))
cons = [cp.sum(y) == k]
prob = cp.Problem(cp.Minimize(obj), cons)
layer = CvxpyLayer(prob, [x], [y])
#### The OptNet QP.
We can re-implement the OptNet QP layer [@amos2017optnet] in a few lines of code. The OptNet layer is a solution to a convex quadratic program of the form $$\begin{array}{ll}
\mbox{minimize} & \frac{1} {2}x^\top Qx + q^\top x \\
\mbox{subject to} & Ax = b, \\
& Gx \leq h,
\end{array}$$ where $x \in \reals^n$ is the optimization variable, and the problem data are $Q \in \reals^{n \times n}$ (which is positive semidefinite), $q \in \reals^n$, $A\in \reals^{m \times n}$, $b \in \reals^m$, $G \in \reals^ {p \times n}$, and $h \in \reals^{p}$. We can implement this with:
Q_sqrt = cp.Parameter((n, n))
q = cp.Parameter(n)
A = cp.Parameter((m, n))
b = cp.Parameter(m)
G = cp.Parameter((p, n))
h = cp.Parameter(p)
x = cp.Variable(n)
obj = cp.Minimize(0.5*cp.sum_squares(Q_sqrt*x) + q.T @ x)
cons = [A @ x == b, G @ x <= h]
prob = cp.Problem(obj, cons)
layer = CvxpyLayer(prob, parameters=[Q_sqrt, q, A, b, G, h], variables=[x])
Note that we take the matrix square-root of $Q$ in PyTorch, outside the CVXPY layer, to get the derivative with respect to $Q$. DPP does not allow the quadratic form atom to be parametrized, as discussed in §\[sec:dpp\].
[^1]: Authors listed in alphabetical order.
|
Q:
What does でござんしょうな mean in 馬車はいつ出るのでござんしょうな
馬車はいつ出るのでござんしょうな
Does this sentence mean "When will the horse cart come out?"
But what does でござんしょうな mean here? Should this be broken down into three parts as で + ござんしょう + な?
I know ございます means have. But ござんしょう becomes let's have?
A:
ござんしょう is ございましょう said with an accent. でございましょう is a politer version of でしょう. な is a sentence-end particle (the same な as in ~かな).
馬車はいつ出るのでござんしょうな。
≒ 馬車はいつ出るのでございましょうな。
≒ 馬車はいつ出るのでしょうな。
In accented speech, ございます can change to ござんす, ございやす, ごぜえやす, etc.
|
Overturned convictions in the United States
This is a list of notable overturned convictions in the United States.
Alabama
Blount County
Bill Wilson was convicted of the 1912 murder of his wife and child and sentenced to life in prison. He was exonerated in 1918 when they were both found living in Indiana.
Jackson County
The Scottsboro Boys were nine black juveniles convicted of an alleged 1931 rape of a white girl, eight of whom were initially sentenced to die by the electric chair. All were later either pardoned or had their convictions overturned.
Jefferson County
Anthony Ray Hinton was wrongfully convicted in 1985 of the murder of two men in Birmingham and sentenced to death. The Supreme Court ruled in 2014 that his defence was inadequate and he was exonerated in 2015 by a Jefferson Court judge after spending nearly 30 years in prison.
Arizona
Maricopa County
Ray Krone was sentenced to death for the 1991 murder of a bar manager. Bite marks found on the victim were said to match Krone's teeth. DNA tests exonerated Krone in 2001 and identified the real killer Kenneth Phillips.
Debra Milke was convicted of ordering her son's murder in 1990. She was sentenced to death. Her conviction was vacated in 2013.
Arkansas
Marion County
Charles Hudspeth was convicted of the 1887 murder of his lover's missing husband. Hudspeth was hanged in 1892, but the husband was found alive, living in Kansas in 1893.
California
Alameda County
Huey Newton was convicted of the 1967 manslaughter of John Frey, an Oakland Patrolman. His conviction was overturned in 1970.
Los Angeles County
Francisco "Franky" Carrillo was convicted of the 1991 murder of Donald Sarpy and sentenced to life in prison. His conviction was reversed by the Los Angeles County Superior Court on March 14, 2011, after he had served twenty years in prison.
Geronimo Pratt, a Black Panther leader, was convicted in 1972 of the 1968 murder of a white school teacher and sentenced to life in prison. He was exonerated in 1997.
Craig Coley, a Vietnam War veteran, was convicted in 1978 for the murder of his ex-girlfriend and her 4-year-old son. The conviction was overturned on the basis of genetic evidence in 2019.
Florida
Miami-Dade County
Joseph Shea was convicted of the 1959 murder of an airline clerk and sentenced to life in prison. He was retried and acquitted in 1966.
DeSoto County
James Joseph Richardson was convicted of the 1967 poisoning murder of seven of his children and sentenced to death. He was exonerated in 1989.
Gulf County
Wilbert Lee & Freddie Pitts were sentenced to death for the 1963 robbery and murder of two Port St. Joe gas station attendants. They were released and pardoned in 1975.
Leon County
Five black men were accused of murdering an off-duty sheriff's deputy in 1970. Two were convicted (David Keaton was given the death sentence) before evidence emerged that exonerated all five.
Georgia
Chatham County
Samuel Scott and Douglas Echols. were convicted of a 1986 kidnapping, rape, and robbery. Scott was sentenced to life in prison plus 20 years and Echols was sentenced to five years. DNA tests exonerated them both in 2002.
Cobb County
The Marietta Seven were convicted of the 1971 murder of two physicians in Marietta. The seven were exonerated in 1975.
DeKalb County
Clarence Harrison was convicted of the 1986 kidnapping, robbery, and rape of a 25-year-old woman in Decatur and sentenced to life in prison. DNA tests exonerated him in 2004.
Floyd County
Marcus Dixon was convicted in 2003 of the rape of Kristie Brown, a 15-year-old schoolgirl. These charges were later overturned by the Georgia Supreme Court and dropped to statutory rape.
Fulton County
Leo Frank was convicted of the 1913 murder of a 13-year-old female employee in Atlanta. He was lynched in 1915, and posthumously pardoned in 1986.
Illinois
Cook County
Majczek and Marcinkiewicz were convicted of the 1932 murder of a Chicago police officer and were each sentenced to 99 years in prison. They were exonerated in 1945 and 1950.
Gary Dotson was convicted of a 1977 rape after he was identified by the victim and sentenced to 25 to 50 years in prison. The victim recanted in 1985 and DNA tests cleared him in 1989.
The Ford Heights Four (two of which were sentenced to death) were convicted of the 1978 murder of an engaged couple. DNA tests exonerated them in 1996 and identified the true killers who confessed and were convicted.
Anthony Porter was sentenced to death for the 1982 murder of an engaged couple. He was exonerated in 1989.
David Dowaliby was convicted of the 1988 murder of his stepdaughter and sentenced to 45 years in prison. His conviction was reversed in 1991 on the grounds of insufficient evidence.
Mark Maxson was sentenced to life plus 50 years in 1993 for the murder of six year old Lindsay Murdoch. After 23 years in jail he was exonerated when DNA evidence proved his innocence in 2015 and identified the true killer Osborne Wade who confessed and was convicted.
Lawrence County
Julie Rea Harper was convicted of the 1997 murder of her 10-year-old son and sentenced to 65 years in prison. She was acquitted on retrial in 2006.
DeKalb County
John Tessier (AKA Jack McCullough) was convicted of the 1957 kidnapping and murder of 7-year-old Maria Ridulph in 2012. He received a life sentence and 20 years without parole. His murder conviction was overturned and he was released from prison in April 2016. He was declared innocent of the crime by the DeKalb County Circuit Court on April 12, 2017.
Indiana
Floyd County
David Camm was tried twice and sentenced to life in prison for the murder of his wife and two children. He was acquitted upon retrial in 2013. DNA found at the scene linked Charles Boney to the murders. Boney is serving 225 years in prison for the murders.
St. Joseph County
Richard Alexander was convicted of committing two 1996 rapes. He was exonerated of the crimes in 2001.
Louisiana
Orleans Parish
Shareef Cousin was sentenced to death for a 1995 murder. He was released in 1998.
Mychal Bell was sentenced to 22 years for assault. Overturned September 14, 2007
Gregory Bright was sentenced to life for a 1973 murder. He was released in 2003.
Curtis Kyles was sentenced to death in 1994 for the murder of a woman. He was released in 1998.
Robert Jones was sentenced to life for a 1992 murder. Overturned November 21, 2015.
Maryland
Baltimore County
Michael Austin was convicted of the 1974 murder of a grocery store security guard and sentenced to life in prison. After 27 years in prison, he was exonerated in 2001.
Kirk Bloodsworth was convicted of the 1985 rape and murder of a 9-year-old girl and sentenced to death. DNA tests exonerated him in 1993 and identified the real killer Kimberly Shay Ruffner who pleaded guilty when charged.
Massachusetts
Norfolk County
Sacco and Vanzetti were convicted of a 1920 double homicide and robbery. They were executed in 1927. Massachusetts Governor Dukakis in 1977 issued a proclamation that "...that any stigma and disgrace should be forever removed from the names of Nicola Sacco and Bartolomeo Vanzetti..." and declared August 23, 1977 as Nicola Sacco and Bartolomeo Vanzetti memorial day.
Suffolk County
Lawyer Johnson was sentenced to death for a 1971 Roxbury murder. He was exonerated in 1982.
Michigan
Macomb County
Ken Wyniemko was convicted of a 1984 rape and robbery of a 28-year-old woman and sentenced to 40–60 years in prison. DNA tests exonerated him in 2003 and identified the real perpetrator Craig Gonser who could not be charged because the Statute of Limitations time had expired. In an unrelated incident, Gonser was found guilty of an indecent exposure charge and sentenced to 10–25 years (Michigan.gov/otis)
Thomas and Raymond Highers were convicted in 1988 of first-degree murder in the 1987 slaying of Robert Karey, a known Detroit drug dealer and were both sentenced to life in prison without the possibility of parole. After serving over 25 years in prison, Wayne County Circuit Court Judge Lawrence Talon vacated the brothers' convictions based on new eye-witness testimony and released the pair on bond. The Wayne County Prosecutor's office said they intended to re-try the brothers, beginning in October 2013. In September 2013, despite maintaining that her office still thought the pair committed the crime, Wayne County Prosecutor Kym Worthy announced that her office was dismissing all charges against the pair.
Missouri
Boone County
Ryan Ferguson was convicted of the 2001 murder of sports editor Kent Heitholt and sentenced to 40 years in prison. His conviction was overturned in 2013 and he was released after key witnesses recanted their testimony.
St. Louis County
Johnny Briscoe was convicted of a 1982 rape and robbery and sentenced to 45 years in prison. DNA tests exonerated him in 2006 and identified the real guilty criminal Larry Smith.
Lincoln County
Russ Faria was convicted of the 2011 murder of his wife, Betsy Faria, and sentenced to life in prison, with no chance of parole. His wrongful conviction was challenged and a new trial was ordered in June 2015. He was acquitted on November 6, 2015.
New Jersey
Essex County
Bill MacFarland was convicted of the 1911 arsenic murder of his wife and sentenced to death in the electric chair. He was acquitted on retrial.
Mercer County
The Trenton Six were convicted of the 1948 murder of a Trenton shopkeeper and sentenced to death. All six were exonerated by 1952.
Passaic County
Rubin Carter, a middleweight boxer was convicted twice of a 1966 triple murder and sentenced to a double life sentence. His conviction was overturned in 1985 and the indictments withdrawn in 1987.
New York
New York County
The Central Park Five were five Harlem teens convicted of the 1989 assault and rape of a jogger in New York's Central Park. They served their sentences but afterwards their convictions were set aside in 2002 when DNA evidence cleared them and another man confessed to the crime.
Westchester County
In 1998 Kian Daniel Khatibi was convicted of a double stabbing after detectives from the Village of Pleasantville falsely claimed that the victims had identified Kian as their attacker and then forwarded this false information to the Westchester County District Attorney. In 2008, Kian was released from prison as the truth unraveled and the conviction was overturned.
Jeffrey Mark Deskovic was convicted of the 1989 of rape and murder of a high school classmate and sentenced to 15 years-life in prison. He was exonerated in 2006 when the DNA from the crime was matched to another person.
North Carolina
Forsyth County
Darryl Hunt was convicted of the 1984 rape and murder of a newspaper reporter and sentenced to life imprisonment. He was exonerated in 2004 after DNA evidence and the confession of the true killer.
Ohio
Cuyahoga County
Dr. Sam Sheppard was convicted of the 1955 murder of his wife and sentenced to life in prison. He was acquitted on retrial in 1966.
Oklahoma
Cleveland County
Thomas Webb III, sentenced to 60+ years, served 13 years before being exonerated by DNA evidence.
Oklahoma County
David Johns Bryson, sentenced to 85 years in prison, served 16 years before being exonerated by DNA evidence.
Curtis Edward McCarty, sentenced to death, served 11 years before being exonerated by DNA evidence.
Robert Miller, sentenced to death, served 10 years before being exonerated by DNA evidence.
Jeffery Pierce, sentenced to 65 years, served 14.5 years before being exonerated by DNA evidence.
Pontotoc County
Dennis Fritz, sentenced to life, served 11 years before being exonerated by DNA evidence.
Calvin Lee Scott, sentenced to 25 years, served 20 years before being exonerated by DNA evidence.
Ron Williamson, sentenced to death, served 11 years before being exonerated by DNA evidence.
Tulsa County
Timothy Durham, sentenced to 3,220 years, served 3.5 years before being exonerated by DNA evidence.
Arvin McGee, sentenced to 298 years, served 11 years before being exonerated by DNA evidence.
Oregon
Clackamas County
Santiago Ventura Morales was convicted in 1986 of murdering a farm worker and sentenced to 10 years-life. He was exonerated in 1990.
Pennsylvania
Dauphin County
Jay C. Smith was convicted of the 1979 murder of a schoolteacher and her two children and sentenced to death. Smith's conviction was overturned in 1992.
Delaware County
Nicholas Yarris was sentenced to death for a 1981 rape and murder. DNA tests exonerated him in 2004. See The Fear of 13
Philadelphia County
Fred Thomas was convicted of the 1993 murder of a Federal Express truck driver and sentenced to death. The conviction was overturned in 2002.
South Carolina
Chester County
Two black brothers Thomas Griffin and Meeks Griffin were convicted of the 1913 murder of John Q. Lewis, a Confederate veteran, and executed in the electric chair. They were pardoned in 2009.
Clarendon County
Fourteen-year-old black George Stinney was convicted of the 1944 murder of two white girls and executed in the electric chair within three months of his conviction. He was exonerated in 2014.
Texas
Burleson County
Anthony Charles Graves was convicted of the August 18, 1992 mass murder of six people in Somerville, after being implicated in the crime by Robert Carter - the father of one of the victims. Carter was executed in May 2000 for his part in the crime - and in his final statement took sole responsibility for the crime: "To the Davis family, I am sorry for all of the pain that I caused your family. It was me and me alone. Anthony Graves had nothing to do with it. I lied on him in court. ... Anthony Graves don't even know anything about it". Anthony Graves is also known as Death Row Exoneree 138.
After spending 12 years on Death Row, Graves' conviction was overturned on March 3, 2006 by the Fifth Circuit Court of Appeals when, in a unanimous opinion, a three judge panel held that the state's case had hinged on Carter's perjured testimony, and concluded that the Prosecutor, Charles Sebesta, had intentionally withheld evidence that could have helped Graves; most notably that Carter had recanted right before he testified at Grave's August 1992 trial.
Graves was held for an additional four years in solitary confinement in the Burleson County jail awaiting retrial until October 27, 2010, when he was released after all charges were dismissed by Burleson County Special Prosecutor Kelly Siegler, who concluded, "He's an innocent man. There is nothing that connects Anthony Graves to this crime."
Graves was awarded $1.4 million by the State of Texas in June 2011 for his wrongful conviction.
Dallas County
Randall Dale Adams was sentenced to death for of the 1976 murder of a police officer. He was exonerated in 1989.
Cornelius Dupree was convicted of aggravated robbery, which was alleged to have been committed during a rape in 1979. He was sentenced to 75 years in prison and paroled during the summer of 2010. After DNA evidence cleared him of the crime, he was declared innocent in January 2011. His 30 years of imprisonment is the longest of any exonerated inmate in Texas.
Jefferson County
Joe Elizondo was convicted in 1984, by a jury, of the 1983 aggravated sexual assault of his 10 yr-old step-son Robert Bienvenue. He was sentenced to life in prison and fined $10,000. In the fall of 1983, Robert and his 8 yr-old brother, Richard, told the Port Athur police, that they had been sexually abused by their mother, Mary Ann, 27, and their step-father, Joe, 49. At the time, the boys' father, Richard Bienvenue, Sr. had legal custody and the boys spent weekends with their mother and step-father. On September 23, 1983, the Elizondos were charged with sexually assaulting the boys. After they were arrested, the couple's one-year-old daughter was removed from their custody and was later adopted by another family. In August 1984, Joe Elizondo went on trial in Jefferson County Criminal District Court, on a single count of assaulting Robert Bienvenue. Robert told the jury that both he and his brother were forced to watch sexually explicit videos and to engage in oral sex with Joe, have oral contact with Mary Ann's breast and to have anal sex with both Joe and Mary. At times, Robert testified, another man and two women joined them. The jury was also shown a sexually explicit picture of a kangaroo that Robert had drawn at school, as well as a sexually suggestive note written to him by a female classmate. Robert's teacher confiscated these items, prompting interrogation by Robert's father and the police. During that questioning Robert detailed the alleged abuse. Robert's step-mother—the wife of Richard Bienvenue, Sr.—testified that the boys had told her of the abuse.
Mary Ann Elizondo was found guilty of sexually assaulting Robert during a separate trial from Joe's in 1984, and she was sentenced to 20 yrs in prison. She pleaded no contest to a second charge and was sentenced to 35 years in prison, to be served concurrently with the 20-year term. After Joe and Mary Ann were convicted, Robert and Richard had no further contact with them. It wasn't until 1988, on Robert's 17th birthday, that he found a letter written by his mother, Mary Ann, and learned for the first time that Joe and Mary Ann were in prison. He then began writing to authorities, letting them know that he had lied when he accused his mother and step-father of sexual abuse. Mary Ann was released on parole in 1991. She then divorced Elizondo, and married someone else. While on parole, she was ordered into group therapy and told she had to admit to sexually abusing her two sons. When she refused, she was jailed for 6 months, before being released again on parole. A Petition for a Writ of Habeas Corpus was filed, and in August 1995, a hearing was finally held, concerning the recantations of both boys. Robert Bienvenue testified that his father threatened to spank him and his brother every day for the rest of their lives if they refused to testify against Elizondo and their mother. He said their father wanted to retaliate against his ex-wife for marrying Elizondo. Richard Bienvenue also testified. Though he denied that their father forced them to lie, he said the abuse never occurred.
In 1995, the trial court found the recantations credible, set aside Joe Elizondo's conviction and ordered a new trial. In December 1996, the Texas Court of Criminal Appeals upheld the trial court ruling. "Robert's recantation not only voids his trial testimony which implicated (Joe Elizondo), but constitutes affirmative evidence of (Joe Elizondo's) innocence," the appeals court ruled. "We are convinced by clear and convincing evidence that no rational jury would convict him in light of the new evidence." On June 23, 1997, Jefferson County District Attorney Paul McWilliams dismissed the charges against Joe Elizondo and he was released from prison that day. Mary Ann then sought to vacate her conviction. In November 2005, the Texas Court of Criminal Appeals, following the decision made in Joe Elizondo's case, vacated her conviction and the charges were dismissed. Sadly, Joe Elizondo, whose health was poor in prison, died in 2003. In October 2008, Mary Ann (Barbosa), who had filed a state compensation claim, received her compensation of $370,833. It is unknown as to whether charges were ever filed against Richard Bienvenue, Sr., for causing his sons to falsely accuse sexual abuse against Joe and Mary Ann Elizondo.
Montgomery County
Clarence Brandley was sentenced to death for the 1980 rape and murder of a 16-year-old girl. He was exonerated in 1990.
Nueces County
Hannah Overton was sentenced to life without parole for murdering her child when in fact he accidentally ingested a lethal amount of salt in September 2007. On September 17, 2014, the Texas Court of Criminal Appeals reversed the conviction and remanded it back to the trial court who dropped the charges.
Smith County
Kerry Max Cook was sentenced to death for the 1977 murder of a 21-year-old secretary. He was freed in 1997.
Travis County
Richard Danziger and Chris Ochoa were convicted of a 1988 rape and murder of a woman and sentenced to life in prison. DNA tests and the confession of the true murderer exonerated the pair in 2001.
Williamson County
Michael Morton was convicted of the 1986 murder of his wife, sentenced to life and spent 25 years in prison. Morton was exonerated in 2011 after DNA evidence proved another man had committed the murder. Also, other evidence turned up after the DNA tests showed that the prosecutor, Ken Anderson had withheld other evidence from the defense that would have excluded Morton from the crime. Morton's lawyers accused Anderson of failing to provide defense lawyers with this exculpatory evidence indicating that another man might have killed Morton's wife, including information that his 3-year-old son witnessed the murder and said his dad was not home at the time. In 2013 former prosecutor Ken Anderson who was now a judge was ordered to be arrested by a "court of inquiry" for failing to deliver all evidence to the defense attorneys as required by law. Anderson was forced to resign as judge and give up his Texas law license. On November 8, 2013, Anderson pleaded no contest to the charges as part of a plea bargain. He was sentenced to 10 days in jail.
Virginia
Culpeper County
Earl Washington, Jr. was sentenced to death for a 1982 rape and murder. He was pardoned in 2000.
Wisconsin
Sherman Booth was convicted in January 1855 of violating the Fugitive Slave Act. The Wisconsin Supreme Court declared the Federal law unconstitutional and ordered Booth freed. In 1859, the U.S. Supreme Court overruled the Wisconsin court's decision, Ableman v. Booth, ordering Booth arrested and confined.
Milwaukee County
Lawrencia Bembenek was convicted of the 1981 murder of her husband's ex-wife. She won the right to a new trial in 1992. She pleaded no contest and her sentence was commuted to time served. She was trying to get her original conviction overturned and be exonerated. On November 20, 2010
she died at a hospice facility in Portland, Oregon from liver and kidney failure. Friends, family and supporters have been trying to get her a posthumous pardon.
See also
List of exonerated death row inmates
List of wrongful convictions in the United States
References
Category:Lists of American people
Category:Lists of suspected criminals
Category:United States crime-related lists |
"Anne was the missing piece and link to our birthing experience and journey as our doula! I know without a doubt that I would not have been able to have the positive birthing experience I had without the support of Anne and her support, presence and calming energy! After our experience, my husband and I both commented to each other that we have no idea how any woman can birth without the support of a doula! We intend to have the same support with future births and will continue to encourage everyone we know to seek out the same, and highly recommend Anne!"
"Anne was an invaluable resource and encouragement for us as we waded through the pregnancy and birth - two things I knew nothing about and had always feared greatly. She was very empowering and reassuring, always available and very professional. I knew when she drove through a severe hail storm to meet with us the first time she was dedicated! She helped me to be confident about scary and difficult decisions we needed to make during the birth when it ended up going very differently than we had planned. I was determined to go all natural but it ended in emergency C-section after 50+ hours of labor that simply was not progressing. She took beautiful photos of our first "moments" in the O.R. that we discovered days later; they mean more to me than anything because I felt so deprived those moments having been so drugged and exhausted, but Anne redeemed them for us and now I have them "on film" to cherish forever!"
"Anne was an integral part of my homebirth team. From my first prenatal with her, I felt as though she really cared about helping me get the birth I desired. She listened to my fears and helped me confront them with research and reassurance. The day of my daughter’s birth, she was prepared with massage, aromatherapy, and even music, but it turned out what I needed the most was the pressure of her hand at the small of my back and her encouraging words. Afterwards, she gave me her notes of the birth. It included details I may not have otherwise remembered. What a precious keepsake!"
"My husband and I felt that Anne played an important role in our birth experience. As first time parents, Anne gave us the confidence and support we needed during delivery. We also enjoyed the prenatal visits and assistance in creating a birth plan."
More Kind Words
"My husband and I were so excited to sign up for Hypnobabies. We originally were set up to take our class with an instructor who is a friend of mine. However, her schedule got switched around and we were unable to take the class with her. With that, we set up our class with Anne. This turned out to be a blessing in disguise! Anne is a gentle-spirited, birth-loving, compassionate person and her class was overwhelming evident of this. She lives and breathes all things birthing and this gave me the ability to make me feel so comfortable and confident with the birth process. I enjoyed going to her class and look forward to having another baby so we can take her class again! Not only is she an awesome instructor, but also Anne encapsulated my placenta for me. She came to the hospital to pick it up and also to drop it back off. She is such a genuine person. I am glad to have her as an “everything birth related” resource." |
1.. Introduction {#S1}
================
Endothelial cells possess the cytoskeletal apparatus that is capable of generating and transmitting contractile forces \[[@R1]--[@R3]\]. Across an endothelial monolayer, such forces propagate from each cell to its substrate and neighbors \[[@R4]\]. Such force propagation induces tractions across the cell-substrate and cell-cell interfaces. From a mechanical viewpoint, the distribution of tractions across the cell-substrate and cell-cell interfaces will have a strong influence on immediate neighbors, whereas resultant magnitude and moment of the tractions will have a strong influence on distant neighbors. A comprehensive assessment of tractions involves measurement of their magnitude and the direction of their action. Currently, however, such comprehensive assessment is only possible for the substrate tractions and not for the intercellular tractions and the moments of these tractions \[[@R5]\]. The inability to quantify such basic mechanical properties has significantly narrowed the scope of the studies focused on mechanical signaling processes in cellular monolayers.
The substrate and intercellular tractions induce mechanical stresses across the monolayer. Monolayer Stress Microscopy (MSM) enabled a comprehensive assessment of thickness averaged monolayer stresses across such a monolayer \[[@R6],[@R7]\]. At any subcellular region within the monolayer, MSM can identify maximum principal orientation along which normal stress (tensile or compressive stress) is highest and shear stress is zero \[[@R7]\]. Such orientation is central to the mechanical regulation of cellular motion, reorientation, and intercellular gap formation \[[@R6],[@R8],[@R9]\]. For example, in an advancing cellular monolayer, local cellular motion tends to be aligned with the local maximum principal orientation \[[@R6]\]. However, this phenomenon, described as plithotaxis, was identified by comparing motion and stresses defined over subcellular regions. The validity of plithotaxis has not been tested for maximum principal orientation and motion defined over an entire cell. Moreover, the physical significance of intercellular tractions in plithotactic guidance remains unexplored.
To address these knowledge gaps, we focused on an advancing sheet of pulmonary microvascular endothelial cells. We then described the approach that enables quantitative assessment of intercellular tractions and cellular moments \[[@R10]\]. To identify the physical significance of the intercellular tractions and cellular moments, we examined their distribution across the cellular monolayer and their relationship with cellular shape, speed, and plithotaxis. Surprisingly, compared to the normal components of intercellular forces and cellular moments, their shear counterparts were more strongly related to cellular shape, speed, and plithotaxis. Collectively, these findings open promising avenues for future research focused on the significance of fluid-like and solid-like behavior in the mechanics of cell monolayer.
2.. Materials and methods {#S2}
=========================
2.1.. Cell culture and image acquisition {#S3}
----------------------------------------
The cell culture procedure is the same as described in an earlier publication \[[@R11]\]. Briefly, rat pulmonary microvascular endothelial cells (rat 1, passage 11) were acquired from the cell culture core of the Center for Lung Biology at the University of South Alabama and cultured in 10% fetal bovine serum in a standard tissue culture environment. The data was acquired from cellular passages 12 through 16. Images were acquired using an inverted wide-field fluorescence microscope (Leica, DMI 600B) and confocal microscope (Nikon A1R). The data sets include three long (more than 940 min) and five short (more than 30 min) time-lapse sequences, each acquired at a 5 min interval.
2.2.. Polyacrylamide hydrogel {#S4}
-----------------------------
The hydrogel preparation procedure was also the same as described in an earlier publication \[[@R11]\]. Briefly, all experiments were conducted in 35 mm glass-bottom dishes containing collagen-coated polyacrylamide hydrogels (1250 Pa shear modulus, approximately 100 μm thickness, 0.5 μm diameter embedded fluorescent beads).
2.3.. Assessment of subcellular forces and motion {#S5}
-------------------------------------------------
The subcellular forces and motion were also assessed as described in an earlier publication \[[@R11]\]. Briefly, components of substrate traction (T~*i*~) were quantified using Fourier Transform Traction Microscopy (FTTM), monolayer stresses (*σ*~*ij*~) were quantified using Monolayer Stress Microscopy (MSM) and the cellular motion was quantified using Particle Image Velocimetry (PIV) \[[@R5]--[@R7]\]. Since the substrate tractions and monolayer stresses are two-dimensional, the suffix *i* and *j* can be either *x* or *y*. The cross-correlation window size and spacing between adjacent windows were respectively 15.8 μm and 7.9 μm for PIV data analysis, and respectively 7.9 μm and 2.6 μm for both FTTM and MSM data analysis.
2.4.. Assessment of intercellular tractions and cellular moments {#S6}
----------------------------------------------------------------
The location of intercellular boundaries was detected from a phase-contrast image of the cellular monolayer using a custom image segmentation software ([Fig. 1a](#F1){ref-type="fig"}) \[[@R11]\]. Through the pixels that defined intercellular boundary, we fitted a Fourier series with eight harmonics. This curve fitting enabled straightforward computation of unit normal (*n*~*i*~) and tangent (*t*~*i*~) vectors along the intercellular boundary ([Fig. 1a](#F1){ref-type="fig"}). Normal (F~n~) and shear (F~s~) components of intercellular traction were computed using equations, F~n~ = *σ*~*ij*~*n*~*j*~*n*~*i*~ and F~s~ = *σ*~*ij*~*n*~*j*~*t*~*i*~ ([Fig. 1b](#F1){ref-type="fig"}). Although these traction components were defined on a plane that is perpendicular to the monolayer, this approach can be applied to any angle between the plane that separates adjoining cells.
Components of the cellular moment were computed using $\text{M}_{ij} = \frac{1}{2}\left( {- {\int_{\mathbf{A}}\left( {\text{T}_{i}r_{j} + \text{T}_{j}r_{i}} \right)}d\mathbf{A} + {\int_{\mathbf{B}}\left( {\text{F}_{i}r_{j} + \text{F}_{j}r_{i}} \right)}d\mathbf{B}} \right)$, where *r*~*i*~ was the *x* or *y* coordinate where tractions were quantified and ***A*** is the area and ***B*** is the boundary of the cell as observed in the phase-contrast image. This definition of moment provides a positive number when moments are contractile representing tension in the cell, and a negative number when moments are dilatational representing compression of the cell. To compute principal moments M^max^ and M^min^, we diagonalized the moment tensor using $\begin{bmatrix}
\text{M}_{xx} & \text{M}_{xy} \\
\text{M}_{yx} & \text{M}_{yy} \\
\end{bmatrix} = \begin{bmatrix}
p_{x} & q_{x} \\
p_{y} & q_{y} \\
\end{bmatrix}\begin{bmatrix}
\text{M}^{\text{max}} & 0 \\
0 & \text{M}^{\text{min}} \\
\end{bmatrix}\begin{bmatrix}
p_{x} & p_{y} \\
q_{x} & q_{y} \\
\end{bmatrix}$, where *p*~*i*~ and *q*~*i*~ are the eigenvectors.
The orientation of maximum principal moment, M^max^, was computed using *θ*~M~ = arctan(*p*~*y*~/*p*~*x*~). The contractile or dilatational component of the cellular moment was computed using M~c~ = (M^max^ + M^min^)/2. Maximum shear or anisotropy of the cellular moment was computed using M~s~ = (M^max^ − M^min^)/2. It is important to note that for the lowest quintile of M~c~, the median value was dilatational; but for the top four quintiles, the median values were contractile.
2.5.. Physical properties considered in the data analysis {#S7}
---------------------------------------------------------
The circularity of the cell was computed using the formula, Circularity = 4*π*Area/Perimeter^2^. To examine the significance of intercellular traction, we defined a ratio between its two components, R = \|F~s~\|/F~n~. This ratio assesses how other physical properties of individual cells are associated with (1) the relative magnitude of F~n~ and F~s~, and (2) the orientation of intercellular traction. For each of the examined physical properties, we generated cumulative probability distribution from 300 randomly chosen frames each containing close to 300 cells.
3.. Results {#S8}
===========
3.1.. Distribution of tractions, moments, and other properties across the cellular monolayer {#S9}
--------------------------------------------------------------------------------------------
Compared to cells far from the migration front, cells near the migration front had several distinctive properties. Their morphological distinction included larger spread area and slightly larger circularity ([Fig. 1d](#F1){ref-type="fig"},[e](#F1){ref-type="fig"}). Their distinctive mechanical state included larger T^RMS^, $\text{F}_{S}^{\text{RMS}}$, M~s~, and v^RMS^ ([Fig. 1f](#F1){ref-type="fig"},[h](#F1){ref-type="fig"},[k](#F1){ref-type="fig"},[l](#F1){ref-type="fig"} and [Table 1](#T1){ref-type="table"}). However, these cells did not have a distinctive ${\widetilde{\text{F}}}_{\text{n}}$, $\widetilde{\text{R}}$, R^SD^, or M~c~ ([Figs. 1g](#F1){ref-type="fig"},[i](#F1){ref-type="fig"},[j](#F1){ref-type="fig"} and [S1](#SD1){ref-type="supplementary-material"}, and [Table 1](#T1){ref-type="table"}). Finally, the influence of cellular position with respect to the migration front was least striking for cellular circularity but most striking for v^RMS^ ([Fig. 1d](#F1){ref-type="fig"},[e](#F1){ref-type="fig"}).
3.2.. Relationships of intercellular tractions and cellular moments with cellular shape and speed {#S10}
-------------------------------------------------------------------------------------------------
~${\widetilde{\text{F}}}_{\text{n}}$~ and $\text{F}_{S}^{\text{RMS}}$ were weakly related to cellular circularity and speed ([Fig. 2a](#F2){ref-type="fig"}--[d](#F2){ref-type="fig"}). Both ${\widetilde{\text{F}}}_{\text{n}}$ and $\text{F}_{S}^{\text{RMS}}$ were larger in the cells that had lower circularity and faster speed. ${\widetilde{\text{F}}}_{\text{n}}$ and $\text{F}_{S}^{\text{RMS}}$ were independent of cellular spread area, but M~c~ and M~s~ were larger for the cells with bigger spread area ([Fig. S2](#SD1){ref-type="supplementary-material"}).
Cellular circularity and speed were not as strongly related to M~c~ as they were with the density of moment defined as M~c~/Area ([Figs. 2e](#F2){ref-type="fig"},[f](#F2){ref-type="fig"} and [S3a](#SD1){ref-type="supplementary-material"},[b](#SD1){ref-type="supplementary-material"}, and [Table 1](#T1){ref-type="table"}). Similar enhancement of relationship was observed in M~s~/Area versus cellular circularity but was not observed in M~s~/Area versus cellular speed ([Figs. 2g](#F2){ref-type="fig"},[h](#F2){ref-type="fig"} and [S3c](#SD1){ref-type="supplementary-material"},[d](#SD1){ref-type="supplementary-material"}). M~c~/Area and M~s~/Area were larger in the cells with lower circularity ([Fig. 2e](#F2){ref-type="fig"},[g](#F2){ref-type="fig"}). Relationship between M~c~/Area and v^RMS^ was opposite to that between M~s~/Area and v^RMS^ ([Fig. 2f](#F2){ref-type="fig"},[h](#F2){ref-type="fig"}). In that, faster cells had smaller M~c~/Area but larger M~s~/Area.
3.3.. Relationships of intercellular traction orientation with cellular speed and moments {#S11}
-----------------------------------------------------------------------------------------
The distribution of $\widetilde{\text{R}}$ was almost independent of v^RMS^ and top four quintiles of M~c~, but $\widetilde{\text{R}}$ systematically larger for higher quintiles of M~s~ ([Fig. 3a](#F3){ref-type="fig"}--[c](#F3){ref-type="fig"}). The lowest quintile of M~c~ which had a dilatational median value and large contributions from compressive F~n~ showed a distinct relationship ([Fig. 3b](#F3){ref-type="fig"}, blue curve). Unlike the relationship with $\widetilde{\text{R}}$, v^RMS^ and M~c~ had a stronger relationship with R^SD^ ([Fig. 3d](#F3){ref-type="fig"},[e](#F3){ref-type="fig"}). By contrast, M~s~ was more strongly related with $\widetilde{\text{R}}$ than with R^SD^ ([Fig. 3c](#F3){ref-type="fig"},[f](#F3){ref-type="fig"}). Interestingly, M~c~ and M~s~ had an opposite relationship with R^SD^ ([Fig. 3e](#F3){ref-type="fig"},[f](#F3){ref-type="fig"}).
3.4.. Role of tractions, cellular moments, cellular speed, and cellular orientation in cellular plithotaxis {#S12}
-----------------------------------------------------------------------------------------------------------
Smaller *θ*~Mv~ was associated with larger ${\widetilde{\text{F}}}_{\text{n}}$, $\text{F}_{s}^{\text{RMS}}$, $\widetilde{\text{R}}$, M~c~, and M~s~ ([Fig. 4a](#F4){ref-type="fig"}--[c](#F4){ref-type="fig"},[e](#F4){ref-type="fig"},[f](#F4){ref-type="fig"}, and [Table 1](#T1){ref-type="table"}). The relationship was strongest for $\text{F}_{s}^{\text{RMS}}$ ([Fig. 4b](#F4){ref-type="fig"}). In contrast, the relationship was absent in the cells with compressive ${\widetilde{\text{F}}}_{\text{n}}$ or dilatational M~c~ ([Fig. 4a](#F4){ref-type="fig"},[e](#F4){ref-type="fig"}, blue curve).
Unlike the intercellular tractions, the substrate tractions did not have a systematic relationship with plithotaxis ([Fig. 4a](#F4){ref-type="fig"}--[d](#F4){ref-type="fig"}). Faster cells were associated with stronger plithotaxis, but stronger plithotaxis was not associated with smaller *θ*~Cv~ ([Fig. 4g](#F4){ref-type="fig"},[h](#F4){ref-type="fig"}). However, cellular alignment with the axis of the principal moment and the axis of cellular motion appeared to be strongly proportional ([Fig. S4](#SD1){ref-type="supplementary-material"}).
4.. Discussion {#S13}
==============
4.1.. Visualizing fundamental intrinsic mechanical signals within individual cells of a monolayers {#S14}
--------------------------------------------------------------------------------------------------
Both intrinsic and extrinsic mechanical signals induce structural and biochemical changes in individual cells of an adherent endothelial monolayer \[[@R12]\]. Early quantitative assessments of intrinsic mechanical signals involved measurement of isometric tension across the cellular monolayer \[[@R13]\]. Application of FTTM to cellular monolayer enabled quantitative assessment of the local adhesive forces transmitted to the extracellular matrix \[[@R5]\]. MSM enabled quantitative assessment of local mechanical stresses across the monolayer \[[@R6]\]. Scalar changes in tension across specific adhesion molecules, and net moments within an isolated individual cell, a doublet, and a small island have been measured \[[@R14]--[@R19]\]. However, for individual cells within a monolayer, two fundamental intrinsic signals remained hidden. First, individual components of the adhesive forces across the intercellular junction (F~n~ and F~s~), and second, individual components of the moments across the cell (M~c~ and M~s~). The approach described here quantifies these fundamental mechanical signals and enables the application of the principles of elasticity to better understand the mechanical interactions between immediate and distant neighbors.
4.2.. The intercellular shear traction is a dominant mechanical signal {#S15}
----------------------------------------------------------------------
Substrate tractions were higher near the migration front than those far from it ([Fig. 1f](#F1){ref-type="fig"}). Such traction distribution is observed in a variety of cell types \[[@R6]\]. A widely appreciated interpretation comes from a comparison of these tractions with force-balance in a tug-of-war \[[@R5]\]. But such comparison is made by adding tractions along a particular coordinate axis. The interpretation suggests that the monolayer is in a state of a "global" tug-of-war where the tension increases continuously from the advancing front to the center of the monolayer \[[@R5]\]. Importantly, in this interpretation, monolayer shear stresses along the same coordinate axis are assumed to be negligible.
While such interpretation is useful to appreciate the existence of intercellular force transmission, the inference that monolayer tension increases with the distance from the migration front can be misleading. In contrast with such inference, a rigorous force balance across the cellular monolayer revealed rather occasional regions -- each spanning tens of cells -- engaged in a "local" tug-of-war \[[@R6]\]. A striking contrast with the "global" tug-of-war model can be observed by comparing distributions of T^RMS^, ${\widetilde{\text{F}}}_{\text{n}}$, and M~c~ as a function of distance from the migration front ([Fig. 1f](#F1){ref-type="fig"},[g](#F1){ref-type="fig"},[j](#F1){ref-type="fig"}). While T^RMS^ was systematically larger closer to the migration front, both ${\widetilde{\text{F}}}_{\text{n}}$ and M~c~ had no systematic gradients. Moreover, compared to F~n~, F~s~ was often smaller but far from negligible ([Fig. 1i](#F1){ref-type="fig"}). Remarkably, $\text{F}_{s}^{\text{RMS}}$ was larger for the cells located closer to the migration front ([Fig. 1h](#F1){ref-type="fig"}). Such distribution revels the key source of the misleading inference form the "global" tug-of-war model -- large portion of the interpreted tension is balanced closer to the migration front.
4.3.. The cellular shear moment is also a dominant mechanical signal {#S16}
--------------------------------------------------------------------
M~s~ was of a similar order of magnitude as M~c~ ([Fig. 1j](#F1){ref-type="fig"},[k](#F1){ref-type="fig"}). Although both M~c~ and M~s~ have contributions from all traction components, the relationship between $F_{\text{s}}^{\text{RMS}}$ and M~s~ was strongest ([Fig. S5](#SD1){ref-type="supplementary-material"}). In that the cells within the lowest quintile of $F_{\text{s}}^{\text{RMS}}$ had negligible M~s~ and the cells within the highest quintile of $F_{\text{s}}^{\text{RMS}}$ had a much larger M~s~ ([Fig. S5e](#SD1){ref-type="supplementary-material"}).
4.4.. The mechanical state of highly circular cells includes signatures of a solid-like behavior {#S17}
------------------------------------------------------------------------------------------------
The mechanical state of the cells with higher circularity included lower ${\widetilde{\text{F}}}_{\text{n}}$, $F_{\text{s}}^{\text{RMS}}$, M~c~/Area, and M~s~/Area ([Fig. 2a](#F2){ref-type="fig"},[c](#F2){ref-type="fig"},[e](#F2){ref-type="fig"},[g](#F2){ref-type="fig"}). Interestingly, the cellular circularity was independent of R^SD^, *θ*~CM~, and v^RMS^, and higher circularity was associated with weaker plithotaxis ([Fig. S6](#SD1){ref-type="supplementary-material"}). Coincidentally, cellular circularity increasing and approaching the value of 0.866 is a structural signature that the monolayer approaching a jamming transition, where individual cells are able to fluctuate but unable to change places with immediate neighbors \[[@R20]\]. Increased cellular density makes cellular motion structurally correlated over a wider area, an indicator of an approach to jamming transition \[[@R6]\]. Collectively, these properties are reminiscent of the particles of a jammed matter that withstands small shear stress \[[@R21]\]. Overall, the mechanical state of the cells with higher circularity indicates the need to use the approach described here combined with assessment of the cooperativity of cellular motion, and shear modulus of the cells to critically examine their solid-like behavior \[[@R6],[@R22]\].
4.5.. The mechanical state of fast-moving cells includes signatures of a fluid-like behavior {#S18}
--------------------------------------------------------------------------------------------
The mechanical state of the fast-moving cells included higher $\text{F}_{s}^{\text{RMS}}$, and M~s~/Area ([Fig. 2d](#F2){ref-type="fig"},[h](#F2){ref-type="fig"}). These properties are reminiscent of an external shear stress-driven motion of a viscous fluid. In addition, fast-moving cells are located closer to the migration front where cellular density is low ([Fig. 1d](#F1){ref-type="fig"},[l](#F1){ref-type="fig"}). Collectively, these properties are reminiscent of the particles of a jammed matter gaining the ability to change places with immediate neighbors when exposed to high shear stress \[[@R6],[@R21]\]. In addition, the association of faster motion with lower M~c~/Area is reminiscent of the cells that generate lower contractile forces due to cytoskeletal fluidization ([Fig. 2f](#F2){ref-type="fig"}) \[[@R23]\]. Overall, the mechanical state of fast-moving cells indicates the need to use the approach described here combined with visualization of subcellular motion and cellular contractile apparatus including cytoskeletal architecture to critically examine their fluid-like behavior \[[@R24],[@R25]\].
4.6.. The potential use of intercellular traction orientation to develop predictive models for monolayers {#S19}
---------------------------------------------------------------------------------------------------------
R^SD^ distinguished v^RMS^ and M~c~ more strongly than $\widetilde{\text{R}}$ ([Fig. 3a](#F3){ref-type="fig"},[b](#F3){ref-type="fig"},[d](#F3){ref-type="fig"},[e](#F3){ref-type="fig"}). By contrast, $\widetilde{\text{R}}$ distinguished M~s~ more strongly than R^SD^ ([Fig. 3c](#F3){ref-type="fig"},[f](#F3){ref-type="fig"}). As such, a mechanical or biochemical intervention that increases R^SD^ will tend to increase v^RMS^, reduce M~c~, and increase M~s~. But an intervention that does not increase R^SD^ but instead increase $\widetilde{\text{R}}$ will tend to have little effect on v^RMS^ and M~c~, but it will tend to increase M~s~. These findings and expectations can guide the development of theoretical models that can predict the mechanical state of the cell in response to mechanical and biochemical interventions or predict the behavior of a cell that is in a homogeneous versus heterogeneous microenvironment \[[@R11]\].
4.7.. Cellular plithotaxis {#S20}
--------------------------
The key observation of plithotaxis is that in a crowded environment of a monolayer, each constituent cell tends to migrate along the local axis of maximum principal stress. Plithotactic tendency is strongest at the locations where the anisotropy of the monolayer stress, or equivalently, the local maximum shear stress is highest \[[@R6]\]. However, along the axis of maximum principal stress, shear stress is necessarily zero. Hence, in plithotaxis, the collective significance of the role of zero shear stress along the preferred axis of motion and large maximum shear stress at the mechanically-steered locations remain unclear. One key question is whether the intercellular interfaces coincide with local axis of zero shear stress. The source of such knowledge gaps is that the picture of plithotaxis is identified using local subcellular analysis \[[@R6]\]. But access to cellular moments enabled us to reframe plithotaxis as a property of individual cells. In this process, we replaced the axis of maximum principal stress with the axis of M^max^, and also replaced the orientation of local velocity vector with the orientation of v~*i*~. This cellular plithotaxis is an *innately collective tendency of individual cells in a monolayer to migrate along the axis of maximum contractile moment*. Mapping F~s~ showed that the intercellular interfaces rarely coincided with the local axis of zero shear stress. On the contrary, larger $\widetilde{\text{R}}$ was associated with stronger plithotaxis ([Fig. 4c](#F4){ref-type="fig"}).
Cellular plithotaxis revealed additional useful insights. While cellular plithotaxis was associated with intercellular tractions, it was not associated with substrate tractions ([Fig. 4a](#F4){ref-type="fig"}--[d](#F4){ref-type="fig"}). Cells exhibiting stronger plithotaxis moved faster and had lower circularity ([Figs.4g](#F4){ref-type="fig"} and [S6d](#SD1){ref-type="supplementary-material"}). However, the faster motion was not related to cellular alignment with either the axis of motion or the axis of the maximum principal moment ([Fig. S7](#SD1){ref-type="supplementary-material"}). Finally, plithotaxis was not associated with cells moving along their long axis, but cellular alignment along the maximum principal moment and cellular alignment with velocity went hand-in-hand ([Figs. 4h](#F4){ref-type="fig"} and [S4](#SD1){ref-type="supplementary-material"}).
4.8.. Unleashing shear {#S21}
----------------------
Cells in an advancing monolayer tended to generate high intrinsic "shear forces" (F~s~ and M~s~). These shear forces were strongly associated with cellular plithotaxis and tended to increase cellular speed. In a way, individual cells within a monolayer are unleashed, i.e., *they move faster*, when neighbors unleash, i.e., *impose*, shear forces on them. In addition to such unleashing of and by shear forces, the data suggest the need to unleash the term "shear forces", i.e., *expand its scope*. In the field of endothelial biology, the term "shear forces" has long been used exclusively for the forces exerted by viscous fluid flowing over the cells. However, the current study suggests making that term inclusive of intercellular shear and apply it to guide our understanding of intercellular interactions.
The framework presented here can be used to examine how the relationships described here hold in other cellular systems or in quiescent monolayers, and how the three shear stresses -- fluid shear stress, cell-substrate tractions, and intercellular shear traction -- compete in disrupting or restoring endothelial homeostasis.
Supplementary Material {#SM1}
======================
D.T.T. thank Dr. James P. Butler for numerous insightful discussions on the topic of monolayer mechanics.
T.S. and D.T.T. designed research; N.X. and D.F.A. contributed to the experiments, D.T.T. performed all MSM measurements; N.G.P., A.N., S.A., and D.T.T. analyzed data; N.G.P., D.A.F., T.S., and D.T.T. discussed and interpreted results; N.G.P., and D.T.T. prepared figures; D.T.T. drafted the manuscript; all authors commented on the manuscript and approved the final version of the manuscript.
Funding sources
This research was funded in parts by several research grants from University of South Alabama including Summer Undergraduate Research Fund, and Honors College Scholarship (Nguyen), and Faculty Development Council Grant, Research and Scholarly Development Grant, and Abraham A. Mitchell Cancer Research Fund (Tambe); grants from National Institute of Health including F32-HL144040-01 (Xu), R01-HL118334 (Alvarez), and P01-HL66299 and R37 HL60024 (Stevens).
Declaration of competing interest
The authors declare no conflict of interest.
Appendix A. Supplementary data
Supplementary data to this article can be found online at <https://doi.org/10.1016/j.bbrc.2019.11.048>.
{ref-type="table"}). The cumulative probability distribution of **d**. cellular spread area, **e**. cellular circularity, **f**. T^RMS^, **g**. ${\widetilde{\text{F}}}_{\text{n}}$, **h**. $F_{\text{s}}^{\text{RMS}}$, **i**. $\widetilde{\text{R}}$, **j**. M~c~, **k**. M~s~, **l**. v^RMS^. All cumulative distributions are plotted for quintiles of the distance of the centroid of the cell from the migration front. The lowest quintile is shown in blue and progressively higher quintiles are shown in progressively warmer colors. Arrow in panel **d** indicates progression from a lower quintile to a higher quintile.](nihms-1547450-f0001){#F1}
{#F2}
{#F3}
{#F4}
######
List of commonly used cellular properties and mathematical operators.
Property Description (units)
------------------------------------- -----------------------------------------------------------------------------------------------
P Cumulative probability distribution (%)
v~*i*~ Components of the average velocity of a cell (μm/min)
T~*i*~ Components of the tractions exerted by the cell on the substrate (Pa)
*σ*~*ij*~ Components of monolayer stresses (Pa)
F~s~ Intercellular traction component oriented parallel to the intercellular interface (Pa)
F~n~ Intercellular traction component oriented perpendicular to the intercellular interface (Pa)
R Ratio of intercellular traction components, \|F~s~\|/F~n~
M~s~ Shear moment or moment anisotropy of the cell (pN-m)
M~c~ Contractile or dilatational moment of the cell (pN-m)
M^max^ Maximum principal moment of the cell (pN-m)
*θ*~Mv~ Angle between the orientation of M^max^ of the cell and the axis of net cellular velocity (°)
*θ*~Cv~ Angle between the orientation of the cell and the axis of net cellular velocity (°)
*θ*~CM~ Angle between the orientation of the cell and the orientation of M^max^ of the cell (°)
(...)^RMS^ Root mean square value across the cell
\|...\| Absolute value of the local property
(...)^SD^ Standard deviation across the cell
$\left( \widetilde{\ldots} \right)$ Median value across the cell
|
### YamlMime:ManagedReference
items:
- uid: Paillave.Etl.Extensions.LeftJoinEx
commentId: T:Paillave.Etl.Extensions.LeftJoinEx
id: LeftJoinEx
parent: Paillave.Etl.Extensions
children:
- Paillave.Etl.Extensions.LeftJoinEx.LeftJoin``4(ISortedStream{``0,``3},System.String,IKeyedStream{``1,``3},System.Func{``0,``1,``2})
langs:
- csharp
- vb
name: LeftJoinEx
nameWithType: LeftJoinEx
fullName: Paillave.Etl.Extensions.LeftJoinEx
type: Class
source:
id: LeftJoinEx
path: ''
startLine: 637
assemblies:
- cs.temp.dll
namespace: Paillave.Etl.Extensions
syntax:
content: public static class LeftJoinEx
content.vb: Public Module LeftJoinEx
inheritance:
- System.Object
inheritedMembers:
- System.Object.ToString
- System.Object.Equals(System.Object)
- System.Object.Equals(System.Object,System.Object)
- System.Object.ReferenceEquals(System.Object,System.Object)
- System.Object.GetHashCode
- System.Object.GetType
- System.Object.MemberwiseClone
modifiers.csharp:
- public
- static
- class
modifiers.vb:
- Public
- Module
- uid: Paillave.Etl.Extensions.LeftJoinEx.LeftJoin``4(ISortedStream{``0,``3},System.String,IKeyedStream{``1,``3},System.Func{``0,``1,``2})
commentId: M:Paillave.Etl.Extensions.LeftJoinEx.LeftJoin``4(ISortedStream{``0,``3},System.String,IKeyedStream{``1,``3},System.Func{``0,``1,``2})
id: LeftJoin``4(ISortedStream{``0,``3},System.String,IKeyedStream{``1,``3},System.Func{``0,``1,``2})
isExtensionMethod: true
parent: Paillave.Etl.Extensions.LeftJoinEx
langs:
- csharp
- vb
name: LeftJoin<TInLeft, TInRight, TOut, TKey>(ISortedStream<TInLeft, TKey>, String, IKeyedStream<TInRight, TKey>, Func<TInLeft, TInRight, TOut>)
nameWithType: LeftJoinEx.LeftJoin<TInLeft, TInRight, TOut, TKey>(ISortedStream<TInLeft, TKey>, String, IKeyedStream<TInRight, TKey>, Func<TInLeft, TInRight, TOut>)
fullName: Paillave.Etl.Extensions.LeftJoinEx.LeftJoin<TInLeft, TInRight, TOut, TKey>(ISortedStream<TInLeft, TKey>, System.String, IKeyedStream<TInRight, TKey>, System.Func<TInLeft, TInRight, TOut>)
type: Method
source:
id: LeftJoin
path: ''
startLine: 639
assemblies:
- cs.temp.dll
namespace: Paillave.Etl.Extensions
syntax:
content: public static IStream<TOut> LeftJoin<TInLeft, TInRight, TOut, TKey>(this ISortedStream<TInLeft, TKey> leftStream, string name, IKeyedStream<TInRight, TKey> rightStream, Func<TInLeft, TInRight, TOut> resultSelector)
parameters:
- id: leftStream
type: ISortedStream{{TInLeft},{TKey}}
- id: name
type: System.String
- id: rightStream
type: IKeyedStream{{TInRight},{TKey}}
- id: resultSelector
type: System.Func{{TInLeft},{TInRight},{TOut}}
typeParameters:
- id: TInLeft
- id: TInRight
- id: TOut
- id: TKey
return:
type: IStream{{TOut}}
content.vb: >-
<ExtensionAttribute>
Public Shared Function LeftJoin(Of TInLeft, TInRight, TOut, TKey)(leftStream As ISortedStream(Of TInLeft, TKey), name As String, rightStream As IKeyedStream(Of TInRight, TKey), resultSelector As Func(Of TInLeft, TInRight, TOut)) As IStream(Of TOut)
overload: Paillave.Etl.Extensions.LeftJoinEx.LeftJoin*
nameWithType.vb: LeftJoinEx.LeftJoin(Of TInLeft, TInRight, TOut, TKey)(ISortedStream(Of TInLeft, TKey), String, IKeyedStream(Of TInRight, TKey), Func(Of TInLeft, TInRight, TOut))
modifiers.csharp:
- public
- static
modifiers.vb:
- Public
- Shared
fullName.vb: Paillave.Etl.Extensions.LeftJoinEx.LeftJoin(Of TInLeft, TInRight, TOut, TKey)(ISortedStream(Of TInLeft, TKey), System.String, IKeyedStream(Of TInRight, TKey), System.Func(Of TInLeft, TInRight, TOut))
name.vb: LeftJoin(Of TInLeft, TInRight, TOut, TKey)(ISortedStream(Of TInLeft, TKey), String, IKeyedStream(Of TInRight, TKey), Func(Of TInLeft, TInRight, TOut))
references:
- uid: Paillave.Etl.Extensions
commentId: N:Paillave.Etl.Extensions
name: Paillave.Etl.Extensions
nameWithType: Paillave.Etl.Extensions
fullName: Paillave.Etl.Extensions
- uid: System.Object
commentId: T:System.Object
parent: System
isExternal: true
name: Object
nameWithType: Object
fullName: System.Object
- uid: System.Object.ToString
commentId: M:System.Object.ToString
parent: System.Object
isExternal: true
name: ToString()
nameWithType: Object.ToString()
fullName: System.Object.ToString()
spec.csharp:
- uid: System.Object.ToString
name: ToString
nameWithType: Object.ToString
fullName: System.Object.ToString
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
spec.vb:
- uid: System.Object.ToString
name: ToString
nameWithType: Object.ToString
fullName: System.Object.ToString
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
- uid: System.Object.Equals(System.Object)
commentId: M:System.Object.Equals(System.Object)
parent: System.Object
isExternal: true
name: Equals(Object)
nameWithType: Object.Equals(Object)
fullName: System.Object.Equals(System.Object)
spec.csharp:
- uid: System.Object.Equals(System.Object)
name: Equals
nameWithType: Object.Equals
fullName: System.Object.Equals
isExternal: true
- name: (
nameWithType: (
fullName: (
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: )
nameWithType: )
fullName: )
spec.vb:
- uid: System.Object.Equals(System.Object)
name: Equals
nameWithType: Object.Equals
fullName: System.Object.Equals
isExternal: true
- name: (
nameWithType: (
fullName: (
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: )
nameWithType: )
fullName: )
- uid: System.Object.Equals(System.Object,System.Object)
commentId: M:System.Object.Equals(System.Object,System.Object)
parent: System.Object
isExternal: true
name: Equals(Object, Object)
nameWithType: Object.Equals(Object, Object)
fullName: System.Object.Equals(System.Object, System.Object)
spec.csharp:
- uid: System.Object.Equals(System.Object,System.Object)
name: Equals
nameWithType: Object.Equals
fullName: System.Object.Equals
isExternal: true
- name: (
nameWithType: (
fullName: (
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: ', '
nameWithType: ', '
fullName: ', '
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: )
nameWithType: )
fullName: )
spec.vb:
- uid: System.Object.Equals(System.Object,System.Object)
name: Equals
nameWithType: Object.Equals
fullName: System.Object.Equals
isExternal: true
- name: (
nameWithType: (
fullName: (
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: ', '
nameWithType: ', '
fullName: ', '
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: )
nameWithType: )
fullName: )
- uid: System.Object.ReferenceEquals(System.Object,System.Object)
commentId: M:System.Object.ReferenceEquals(System.Object,System.Object)
parent: System.Object
isExternal: true
name: ReferenceEquals(Object, Object)
nameWithType: Object.ReferenceEquals(Object, Object)
fullName: System.Object.ReferenceEquals(System.Object, System.Object)
spec.csharp:
- uid: System.Object.ReferenceEquals(System.Object,System.Object)
name: ReferenceEquals
nameWithType: Object.ReferenceEquals
fullName: System.Object.ReferenceEquals
isExternal: true
- name: (
nameWithType: (
fullName: (
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: ', '
nameWithType: ', '
fullName: ', '
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: )
nameWithType: )
fullName: )
spec.vb:
- uid: System.Object.ReferenceEquals(System.Object,System.Object)
name: ReferenceEquals
nameWithType: Object.ReferenceEquals
fullName: System.Object.ReferenceEquals
isExternal: true
- name: (
nameWithType: (
fullName: (
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: ', '
nameWithType: ', '
fullName: ', '
- uid: System.Object
name: Object
nameWithType: Object
fullName: System.Object
isExternal: true
- name: )
nameWithType: )
fullName: )
- uid: System.Object.GetHashCode
commentId: M:System.Object.GetHashCode
parent: System.Object
isExternal: true
name: GetHashCode()
nameWithType: Object.GetHashCode()
fullName: System.Object.GetHashCode()
spec.csharp:
- uid: System.Object.GetHashCode
name: GetHashCode
nameWithType: Object.GetHashCode
fullName: System.Object.GetHashCode
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
spec.vb:
- uid: System.Object.GetHashCode
name: GetHashCode
nameWithType: Object.GetHashCode
fullName: System.Object.GetHashCode
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
- uid: System.Object.GetType
commentId: M:System.Object.GetType
parent: System.Object
isExternal: true
name: GetType()
nameWithType: Object.GetType()
fullName: System.Object.GetType()
spec.csharp:
- uid: System.Object.GetType
name: GetType
nameWithType: Object.GetType
fullName: System.Object.GetType
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
spec.vb:
- uid: System.Object.GetType
name: GetType
nameWithType: Object.GetType
fullName: System.Object.GetType
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
- uid: System.Object.MemberwiseClone
commentId: M:System.Object.MemberwiseClone
parent: System.Object
isExternal: true
name: MemberwiseClone()
nameWithType: Object.MemberwiseClone()
fullName: System.Object.MemberwiseClone()
spec.csharp:
- uid: System.Object.MemberwiseClone
name: MemberwiseClone
nameWithType: Object.MemberwiseClone
fullName: System.Object.MemberwiseClone
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
spec.vb:
- uid: System.Object.MemberwiseClone
name: MemberwiseClone
nameWithType: Object.MemberwiseClone
fullName: System.Object.MemberwiseClone
isExternal: true
- name: (
nameWithType: (
fullName: (
- name: )
nameWithType: )
fullName: )
- uid: System
commentId: N:System
isExternal: true
name: System
nameWithType: System
fullName: System
- uid: Paillave.Etl.Extensions.LeftJoinEx.LeftJoin*
commentId: Overload:Paillave.Etl.Extensions.LeftJoinEx.LeftJoin
name: LeftJoin
nameWithType: LeftJoinEx.LeftJoin
fullName: Paillave.Etl.Extensions.LeftJoinEx.LeftJoin
- uid: ISortedStream{{TInLeft},{TKey}}
commentId: '!:ISortedStream{``0,``3}'
definition: ISortedStream`2
name: ISortedStream<TInLeft, TKey>
nameWithType: ISortedStream<TInLeft, TKey>
fullName: ISortedStream<TInLeft, TKey>
nameWithType.vb: ISortedStream(Of TInLeft, TKey)
fullName.vb: ISortedStream(Of TInLeft, TKey)
name.vb: ISortedStream(Of TInLeft, TKey)
spec.csharp:
- uid: ISortedStream`2
name: ISortedStream
nameWithType: ISortedStream
fullName: ISortedStream
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: TInLeft
nameWithType: TInLeft
fullName: TInLeft
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TKey
nameWithType: TKey
fullName: TKey
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: ISortedStream`2
name: ISortedStream
nameWithType: ISortedStream
fullName: ISortedStream
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: TInLeft
nameWithType: TInLeft
fullName: TInLeft
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TKey
nameWithType: TKey
fullName: TKey
- name: )
nameWithType: )
fullName: )
- uid: System.String
commentId: T:System.String
parent: System
isExternal: true
name: String
nameWithType: String
fullName: System.String
- uid: IKeyedStream{{TInRight},{TKey}}
commentId: '!:IKeyedStream{``1,``3}'
definition: IKeyedStream`2
name: IKeyedStream<TInRight, TKey>
nameWithType: IKeyedStream<TInRight, TKey>
fullName: IKeyedStream<TInRight, TKey>
nameWithType.vb: IKeyedStream(Of TInRight, TKey)
fullName.vb: IKeyedStream(Of TInRight, TKey)
name.vb: IKeyedStream(Of TInRight, TKey)
spec.csharp:
- uid: IKeyedStream`2
name: IKeyedStream
nameWithType: IKeyedStream
fullName: IKeyedStream
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: TInRight
nameWithType: TInRight
fullName: TInRight
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TKey
nameWithType: TKey
fullName: TKey
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: IKeyedStream`2
name: IKeyedStream
nameWithType: IKeyedStream
fullName: IKeyedStream
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: TInRight
nameWithType: TInRight
fullName: TInRight
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TKey
nameWithType: TKey
fullName: TKey
- name: )
nameWithType: )
fullName: )
- uid: System.Func{{TInLeft},{TInRight},{TOut}}
commentId: T:System.Func{``0,``1,``2}
parent: System
definition: System.Func`3
name: Func<TInLeft, TInRight, TOut>
nameWithType: Func<TInLeft, TInRight, TOut>
fullName: System.Func<TInLeft, TInRight, TOut>
nameWithType.vb: Func(Of TInLeft, TInRight, TOut)
fullName.vb: System.Func(Of TInLeft, TInRight, TOut)
name.vb: Func(Of TInLeft, TInRight, TOut)
spec.csharp:
- uid: System.Func`3
name: Func
nameWithType: Func
fullName: System.Func
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: TInLeft
nameWithType: TInLeft
fullName: TInLeft
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TInRight
nameWithType: TInRight
fullName: TInRight
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TOut
nameWithType: TOut
fullName: TOut
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: System.Func`3
name: Func
nameWithType: Func
fullName: System.Func
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: TInLeft
nameWithType: TInLeft
fullName: TInLeft
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TInRight
nameWithType: TInRight
fullName: TInRight
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TOut
nameWithType: TOut
fullName: TOut
- name: )
nameWithType: )
fullName: )
- uid: IStream{{TOut}}
commentId: '!:IStream{``3}'
definition: IStream`1
name: IStream<TOut>
nameWithType: IStream<TOut>
fullName: IStream<TOut>
nameWithType.vb: IStream(Of TOut)
fullName.vb: IStream(Of TOut)
name.vb: IStream(Of TOut)
spec.csharp:
- uid: IStream`1
name: IStream
nameWithType: IStream
fullName: IStream
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: TOut
nameWithType: TOut
fullName: TOut
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: IStream`1
name: IStream
nameWithType: IStream
fullName: IStream
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: TOut
nameWithType: TOut
fullName: TOut
- name: )
nameWithType: )
fullName: )
- uid: ISortedStream`2
isExternal: true
name: ISortedStream<, >
nameWithType: ISortedStream<, >
fullName: ISortedStream<, >
nameWithType.vb: ISortedStream(Of , )
fullName.vb: ISortedStream(Of , )
name.vb: ISortedStream(Of , )
spec.csharp:
- uid: ISortedStream`2
name: ISortedStream
nameWithType: ISortedStream
fullName: ISortedStream
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: ''
nameWithType: ''
fullName: ''
- name: ', '
nameWithType: ', '
fullName: ', '
- name: ''
nameWithType: ''
fullName: ''
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: ISortedStream`2
name: ISortedStream
nameWithType: ISortedStream
fullName: ISortedStream
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: ''
nameWithType: ''
fullName: ''
- name: ', '
nameWithType: ', '
fullName: ', '
- name: ''
nameWithType: ''
fullName: ''
- name: )
nameWithType: )
fullName: )
- uid: IKeyedStream`2
isExternal: true
name: IKeyedStream<, >
nameWithType: IKeyedStream<, >
fullName: IKeyedStream<, >
nameWithType.vb: IKeyedStream(Of , )
fullName.vb: IKeyedStream(Of , )
name.vb: IKeyedStream(Of , )
spec.csharp:
- uid: IKeyedStream`2
name: IKeyedStream
nameWithType: IKeyedStream
fullName: IKeyedStream
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: ''
nameWithType: ''
fullName: ''
- name: ', '
nameWithType: ', '
fullName: ', '
- name: ''
nameWithType: ''
fullName: ''
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: IKeyedStream`2
name: IKeyedStream
nameWithType: IKeyedStream
fullName: IKeyedStream
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: ''
nameWithType: ''
fullName: ''
- name: ', '
nameWithType: ', '
fullName: ', '
- name: ''
nameWithType: ''
fullName: ''
- name: )
nameWithType: )
fullName: )
- uid: System.Func`3
commentId: T:System.Func`3
isExternal: true
name: Func<T1, T2, TResult>
nameWithType: Func<T1, T2, TResult>
fullName: System.Func<T1, T2, TResult>
nameWithType.vb: Func(Of T1, T2, TResult)
fullName.vb: System.Func(Of T1, T2, TResult)
name.vb: Func(Of T1, T2, TResult)
spec.csharp:
- uid: System.Func`3
name: Func
nameWithType: Func
fullName: System.Func
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: T1
nameWithType: T1
fullName: T1
- name: ', '
nameWithType: ', '
fullName: ', '
- name: T2
nameWithType: T2
fullName: T2
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TResult
nameWithType: TResult
fullName: TResult
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: System.Func`3
name: Func
nameWithType: Func
fullName: System.Func
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: T1
nameWithType: T1
fullName: T1
- name: ', '
nameWithType: ', '
fullName: ', '
- name: T2
nameWithType: T2
fullName: T2
- name: ', '
nameWithType: ', '
fullName: ', '
- name: TResult
nameWithType: TResult
fullName: TResult
- name: )
nameWithType: )
fullName: )
- uid: IStream`1
isExternal: true
name: IStream<>
nameWithType: IStream<>
fullName: IStream<>
nameWithType.vb: IStream(Of )
fullName.vb: IStream(Of )
name.vb: IStream(Of )
spec.csharp:
- uid: IStream`1
name: IStream
nameWithType: IStream
fullName: IStream
isExternal: true
- name: <
nameWithType: <
fullName: <
- name: ''
nameWithType: ''
fullName: ''
- name: '>'
nameWithType: '>'
fullName: '>'
spec.vb:
- uid: IStream`1
name: IStream
nameWithType: IStream
fullName: IStream
isExternal: true
- name: '(Of '
nameWithType: '(Of '
fullName: '(Of '
- name: ''
nameWithType: ''
fullName: ''
- name: )
nameWithType: )
fullName: )
|
Why does this happen over and over again? Because of these very common estimating issues.
Sorry to break it to you, but you're going to spend at least 24 hours working on that project you just squeezed into 16. You're also going to lose money on that project, unless if you bill an astronomical hourly rate.
Time passes. Your boss and/or the account manager review the estimate and think that it isn't cost-competitive. They want you to find places to cut your hours.
As I am able to read the thoughts of design professionals, I can provide a transcript for what goes through each and every one of your minds while you're estimating a design project:
1. When you cut corners, they always grow back.
If a client, project/account manager, or pretty much anyone on the street asks you to revise an estimate to lower your overall project cost and you don't cut your deliverables, you will still end up working the amount of time originally estimated. That's just the way it is. Perhaps it's subconscious in the designer's mind as they're fulfilling the project, or maybe it's the truism that you can't rush great work. Either way, this is the primary reason that designers blow budgets.
2. Estimating processes don't force breathing room.
On any estimate, you should be adding a creative pad of at least 20%. Some designers, when self-estimating, can be off by as much as 50% to 100% on a new task. With the pace that technology moves, and your client's ever-evolving business needs, you can never assume that everything will go your way on every single project that you fulfill. I see it as a point of maturity when a designer—no matter how optimistic that they are—is entirely pragmatic when constructing and delivering an estimate.
3. The client's budget wasn't gauged until you were too far into the estimating process.
Does the client have $5 or $1,000,000 to spend? The client must answer this basic question before you even begin estimating, or you're never going to be able to accurately understand both the amount of "play" you've got from a time perspective. This is a time-equals-money business, so if you say that logo's going to take 200 hours, you'd better know the budget is going to support that level of exploration, as well as schedule. Unless you have 100 designers working 2 hours each, which is its own sort of existential (and probably unprofessional) problem.
4. You didn't add a project markup on top of the entire estimate.
Your clients don't need to know about how you added breathing room. But they need to know, as part of how you scoped your project, that you've added as a line expense before the total cost of your work a 10% to 20% markup. This markup covers possible increases in scope, shifts in schedule (any delay costs you money!), and negotiations over price to secure a contract without cutting into your project margin. This markup is included not as something that you will definitely bill 100% in full—as it can sometimes push your estimate above fair market value—but as an area that can cover variance over the life of the project.
5. Actuals from previous projects were never referenced in your new estimate.
If you don't use your historical numbers, project over project, you will make estimating mistakes. You'll also never learn from previous estimating mistakes.
6. Vendors weren't marked up properly.
If you're billing to a client any service or tangible product from a third party, you must mark it up. Otherwise, you're just being a bank without earning any interest on the credit you're extending. However...
7. You marked up freelancers so much that your estimate is lopsided.
If you're a single person agency, it's hard to pad an outsourced position's rate, as it can inflate your estimate beyond its market value. Large agencies get away with this by billing hundreds an hour, then hiring freelancers at $65 to $80 an hour and marking them up two to three times. This doesn't work so well when you're a solo-flight designer.
8. You didn't factor in time for managing third parties.
If clients want to use their own vendors, or they aren't willing to pay for markup on vendors that you're suggesting, you must bill the time necessary for management of their output. Otherwise, you're just giving your time away, which equals even more money. You can't expect that money can be recouped by cutting corners in other areas. (Remember Pitfall #1?)
*
One parting thought: There is nothing wrong with "revisiting" an estimate if a client asks for you to see if you can deliver less for less. However, the rule of thumb is to do it only once. Constant re-estimating is a sure sign of a client that will apply the same focused attention and behavior to the creative work through the life of your project. |
AllEarth Renewables moved into a new and unexpected market when it announced it’s role in a new high-profile solar project at a community center in New Orleans’ Ninth Ward, hard-hit by Hurricane Katrina.
Brad Pitt’s Make It Right Foundation funded a new skate park at the Ward’s community center. Ensuring that the park’s operations were as green as possible was key in a community that has seen, first-hand, the dramatic effects of global climate change, according to a release about the project.
AllEarth Renewables manufactures the AllSun Tracker in Vermont and has been steadily growing its network of installers in the Northeast United States, particularly New England.
“This is certainly a different project for us and a different region,” said AllEarth Renewables spokesman Andrew Savage.
The company wasn’t looking to expand to Louisianna.
“Our installer – our new installer, Joule Solar, was looking for a tracking system that would produce the most solar the most efficiently and they called us up,” Savage said. “We started a relationship.”
It just happened that Joule was working on the Make It Right project at the same time and the AllSun Tracker turned out to be a good fit.
“They were eager for something that was ground-mounted and that made a statement visually as well as producing the most energy,” Savage said.
The Ninth Ward celebrated its new community center and skate park on Sept. 26 when the 6-kilowatt AllSun solar tracker was commissioned. It will produce 10,000 kilowatt hours of electricity per year and will power the skate park lighting, fans and computers along with some energy for the community center.
Representatives from Pitt’s foundation were at the celebration along with Grammy-winning rapper Lil Wayne, who is also a skater.
In addition to being part of a significant New Orleans community project, the skate park marks the beginning of a new relationship and market opportunities for the AllSun solar tracker in a new state and geographical area. |
Domino promised an aggressive campaign, insisting Murphy “can run but he can't hide.”
With almost 99 percent of the vote in, Domino took 38.4 percent followed by former Connecticut state Rep. Alan Schlesinger, best known as the Republican nominee who challenged U.S. Sen. Joe Lieberman, I-Conn., in 2006, with 24.1 percent. Nurse and conservative activist Beverly Hires took third with 14 percent followed by businessman Brian Lara with 13 percent. Former Tequesta Councilman Calvin Turnquest garnered 6.7 percent followed by businessman Nick Wukoson with 3.9 percent.
Despite Murphy beating then-U.S. Rep. Allen West, R-Fla., by a narrow margin in 2012, the Democrat starts off the general election as the favorite over Domino, something the Democratic Congressional Campaign Committee (DCCC) crowed about on Tuesday night.
“Rep. Patrick Murphy has distinguished himself for his independence, results-oriented approach to cutting Washington’s wasteful spending, and relentless focus on the local issues that matter most to his constituents,” the DCCC wrote in a memo sent out on Tuesday night. “The appeal of his agenda – coupled with his fundraising dominance – has led to one of the Republican’s greatest recruitment failures of the cycle.
“After suffering through a divisive intra-party fight, Republicans are now left with Carl Domino, a Tallahassee politician with a record of prioritizing himself and his special-interest backers over Florida’s families,” the DCCC continued. “Domino’s flaws are already coming to light: he was exposed for plagiarizing his ‘plan’ to fix Congress, claimed he didn’t know if he was pro-choice or pro-life (while running TV ads attacking women’s health care choices) and has only posted weak fundraising numbers. Coupled with his failure to garner even 50 percent of the primary vote after dramatically outspending his opponents, signs are clear that even Republicans aren’t excited about Domino’s campaign.
“The Cook and Rothenberg Political Reports recently moved this race to favor Murphy, although we fully expect the same kind of shadowy special interests that Domino looked out for in Tallahassee will do all they can to prop him up in the fall,” the DCCC concluded.
Noting that former Gov. Mitt Romney, R-Mass., beat President Barack Obama by 4 percent in the district back in the 2012 presidential race, the National Republican Congressional Committee (NRCC) fired back, insisting Domino had a strong chance of beating Murphy.
“Congressman Patrick Murphy has been a top target of both local and national Republicans since being elected in 2012,” the NRCC insisted in a memo sent out on Tuesday night. “While Murphy has been forced to walk the line with his voting record, Florida families won’t be able to overlook his vote for Nancy Pelosi as speaker of the House and his vote to keep Obamacare the law of the land.
“With the primary election of Carl Domino, Republicans go into the final months of the campaign with a strong competitor who will force Murphy to spend his millions and will ultimately flip the seat back into the GOP’s hands,” the NRCC added.
Comments (3)
Arlene Monti
2:18PM NOV 5TH 2014
Carl Domino has done more for Floridians than any politician in this day and age. In addition to all the hard work, much goes unnoticed because Carl doesn't boast and look for every opportunity to be photographed for the media. His dedication to charities and families is not only appreciated, but has rewarded him with this election victory. Congratulations to a fine citizen, person and HONEST politician.
Way to go Carl! I've known Carl since college and I've never met a more brilliant person in my life. He was a student government leader, despite not having any fraternity backing, who accomplished a lot to even the playing field for all students, regardless of monetary or "club" connections. He is a person who cares about all people. He will be an excellent representative for his district. I live in SC so I cannot
From what I can figure out Domino is aiming for the "I don't know anything about this, and can't figure it out so I'm going to oppose it" crowd. There are a lot of them on the Treasure Coast, but I'm not convinced they're the majority.
Murphy's pretty awful, but Domino doesn't strike me as an ideal opponent. Murphy will adopt the opposition's position on any controversial issue anyway, making it hard to vote for anyone on the issues. |
Tag: Buy CBD Lotion In Laval
CBD Skin Care Canada
Learning More About CBD Topicals And Lotions
With more research underway surrounding the endocannabinoid system and cannabinoids such as CBD and THC, many new methods for infusing products with cannabinoids are being developed. One of the most intriguing is in using them within skin care products.
Cannabis topicals come in the form of lotion, salves, balms, and oils, all of which have been infused with cannabinoids. They absorb into the skin directly upon application. Topicals have only grown in popularity over the years. In fact, THC and CBD has even been utilized in general cosmetic products and even personal lubricants.
CBD Skin Care Lotion
Applying cannabinoids topically will allow them to absorb into the body quite quickly. The relief is also more focused, generally only affecting the specific area where the product was used. On the other hand, smoking or ingesting marijuana affects the entire body, and it can take up to two hours for any effects to be felt.
CBD Skin Care Topicals are only mildly invasive, and they make a strong entryway for those that are curious to dip their toes into the world of medical cannabis. The prospect of smoking or ingestion is quite scary to the uninitiated. External options make a fantastic compromise.
CBD Skin Care Canada
It’s also worth noting that topicals are not psychoactive. The endocannabinoid system is activated, and any mind altering properties are blocked from entering the bloodstream. It’s worth noting that topical dosages must be quite large. Since the skin of humans absorbs cannabinoids at a low rate, a liberal application is suggested as a workaround.
CBD Creams in Laval
That said, CBD and CBN can work their way into the skin much easier than THC. They’re also more likely to engage the receptors of the CB2 cannabinoids. As such, they have become quite popular for cannabis topical manufacturers. CBD Skin Care Lotions contents have much more hemp than your run of the mill variety of marijuana. Hemp has numerous benefits, included significantly lower toxicity.
CBD oil lotion is also quite popular since there are dual purposes at play. They’ll smooth out and even soften the skin of the applied area. Of course, they also allow highly specific use of CBD. It’s not uncommon for people to become very adamant that CBD oil Skin Care in Laval become a regular part of their lives after trying it for the first time. The FDA isn’t keen on any particular health claims being made of course, but it’s hard to deny the satisfaction rate of those that have been using CBD topicals thus far.
THC is quite well known, having been included in the conversation about marijuana for quite some time now. CBD has become more prominent as of late thanks to plenty of research and trials however. It has been shown to help prevent pain, anxiety, and even nausea. It also happens to be legal when extracted from industrial hemp. There is still much work to be done towards achieving widespread understanding and use of topical products such as CBD Lotions in Laval , but it’s clear that we’re many steps closer than ever before.
CBD Skin Care Products in Laval
CBD Oil Skin Care in Laval Quebec
Full-Spectrum CBD Skin Care
As everyone is waking up to the wide world of marijuana and its products, everyone is finding out just how complicated cannabis is. As it turns out, there are at least 80 different types of cannabinoids alone, and 100 in cannabis and CBD hemp put together. CBD to THC ratios is from 20 to 1 up to 30 to 1; meaning the plant can contain CBD 20 percent and 0.6 percent THC.
Now, what the percentages and ratios mean will differ based upon individual states. In Colorado, those types of ratios are what make up industrial hemp, while other states define 1 percent as industrial hemp. Industrial hemp is not to be confused with the plant material that makes up rope and other manufactured products. High-CBD hemp, as it is known, is different than the fiber hemp used in production. Here's where the confusion is set in motion. Fiber hemp has 1 percent to 2 percent CBD.
Full-spectrum CBD is a powerhouse because it contains terpenes and cannabinoids together. CBD itself is only one small part of the cannabinoid family. Each is able to interact well with the endocannabinoid system. As research is performed, it is coming to light that the CBD has this interaction with the body. It's important that the natural structure and power of the cannabinoids are extracted without breaking down their ability to interact in the endocannabinoid system.
Full spectrum CBD is not inexpensive. If you are searching for it, and come across a great deal, its quality is probably not great. It may mean that there is a problem with the methods used to grow it or how the full-spectrum CBD oil was pulled out of the plant.
The full spectrum CBD, which includes terpenes and cannabinoids, is best extracted using organic alcohol, specifically grape solvents because it is oil soluble. It's never good to use chemical-grade solvents, butane, or propane to extract the oil, such as denatured alcohol.
The issue is when molecular extraction is performed as well. This is too far away from the natural process, which can pull out the extremely beneficial synergies of the plant. If you see a pure crystal CBD, avoid it.
It is also possible to extract high-CBD hemp using carbon dioxide. This is part of the plant's oil soluble part that is taken out of the leaves to leave behind terpenes. This is how a pure extract is derived in order to achieve the full synergy the plant can provide. |
Q:
In Codeigniter how to decode UTF-8 hex string into proper English
I have search feature with codeigniter framework, today i've noticed some peoples are passing character strings like Á, ú, ç, é
When input passed by codeigniter core input, it converts into %C3%81, %C3%BA, %C3%A7, %C3%A9 , i used following codeigniter helper.
$this->load->helper('text');
convert_accented_characters('è'); // output: e
it convert è into e, but how i can convert UTF-8 - HEX '%C3%A9' or 'c3a9' into proper English character like A, u, c, e
A:
If your PHP version is greater than or equal to 5.4, you can try Transliterator class.
$transliterator = Transliterator::createFromRules(':: NFD; :: [:Nonspacing Mark:] Remove; :: NFC;', Transliterator::FORWARD);
$test = ['Á', 'ú', 'ç', 'é','Áúçé'];
foreach($test as $e) {
$normalized = $transliterator->transliterate($e);
echo $e. ' --> '.$normalized."\r\n";
}
Output:
Á --> A ú --> u ç --> c é --> e Áúçé --> Auce
*By default it will be disabled. It should be enabled in php.ini file to use this feature.
Update:
Seems like your data is URL encoded. So you have to use urlencode function
urldecode("%C3%81, %C3%BA, %C3%A7, %C3%A9"); // Á, ú, ç, é
Then you can use CI feature to convert è into e, already you are using it
convert_accented_characters('è'); // output: e
|
[Neurological involvement in rheumatic disorders and vasculitis in childhood].
The rheumatic disorders and vasculites are inflammatory processes affecting connective tissue in different organs. The inflamed cells liberate destructive enzymes which harm tissues, producing IgE, IgM, IgG antibodies and autoimmune complexes. To review the current classification of these conditions and describe the commonest neurological complications in children. Infantile systemic lupus erythematosus is the commonest; it affects the dermis, joints, blood vessels, heart, kidney and brain. Neurological features: vertigo, ataxia, convulsions, chorea and headache are seen in 25% of the patients. Juvenile idiopathic arthritis is another inflammatory disorder of unknown origin which affects joints, connective tissue and visceras. Neurological involvement is seen in 5%, in the form of cerebral vasculitis, cervical myelopathy, trapping and compression of peripheral nerves and neuropathy due to arteritis. Sydenham s rheumatic chorea, caused by b haemolytic streptococcal A infection, causing a pathological auto immune response is the best known and has increased in frequency again in recent years. Vasculitis is caused by inflammatory changes in the walls of large, medium and small blood vessels. They lead to deposits of auto immune antigen antibody complexes in the blood vessel walls. In the commonest infantile vasculites neurological complications are uncommon, but not rare, as occurs with Kawasaki disease, infantile Wegener s granulomatosis, Schönlein-Henoch purpura and Behçet's disease. The usual treatment for this group of disorders is corticosteroids and immunosuppressive drugs. |
Q:
What does object : stands for in Kotlin?
I'm a newbie to Kotlin. I'm trying to convert my old java code into Kotlin. When I try to create a new Handler and override handleMessage() method I got an answer at: How to use Handler and handleMessage in Kotlin?
private val mHandler = object : Handler() {
override fun handleMessage(msg: Message?) {
// Your logic code here.
}
}
I don't understand what "object : " stands for and why do we need this here ? When I try val mHandler = Hander() {} this got an error and I cannot override handleMessage()
A:
That's just Kotlin's way of subclassing/implementing an anonymous class and creating a new instead of it in-place.
Java:
//Define an interface (or a class):
public interface Runnable {
void run();
}
//Create an anonymous class and instantiate it:
Runnable runnable = new Runnable() {
@Override
void run() {
//Do something here
}
}
Kotlin:
//Define an interface (or a class):
interface Runnable {
fun run()
}
//Create an anonymous class and instantiate it:
val runnable = object: Runnable() {
override fun run() {
//Do something here
}
}
If you don't write the object: part, then it means that you are instantiating the interface/superclass itself. Which is impossible for interfaces and abstract classes. Also, it's a syntax error to have {} after () without object:.
|
Russia will form three new military divisions to counter what it believes is the growing strength of The North Atlantic Treaty Organisation (NATO), Russian Defence Minister Sergei Shoigu announced on Wednesday.
Two of the new divisions will be deployed along Russia's western border and one along its southern border, Shoigu said in televised remarks. The new divisions will be formed by the end of the year. Russian media, citing unnamed military sources, said the new divisions would most likely be motorised rifle ones and number around 10,000 soldiers each.
"The Ministry of Defence has adopted a series of measures to counter the growing capacity of NATO forces in close proximity to the Russian borders," Shoigu said. Russia's Western Military District borders Ukraine, Belarus, the Baltic states and Finland. The Southern Military District borders Ukraine, Georgia and Azerbaijan.
Russia has reacted angrily to NATO's increased military presence in countries that were once part of the Soviet Union and to military exercises close to its borders. But its own actions, notably its annexation of Ukraine's Crimea in 2014, have sparked anxiety in the region and Estonia, Latvia and Lithuania asked the alliance to expand its presence on their soil as a deterrent.
US Defence Secretary Ashton Carter said on Monday NATO was weighing rotating four battalions of troops through Eastern member states. Tensions in the Baltic have risen in recent weeks with Russia scrambling jets to intercept US reconnaissance planes and making simulated attack passes near a US warship.
The Kremlin strongly denies having any intention to attack the Baltic countries, but has often said it feels they have become an aggressive "russophobic kernel" pushing NATO towards a consistently anti-Russian course. |
Would You Let Your S.O. Give You A Tattoo?
Lake Bell Finally Let Her Husband Give Her A Tattoo
There's a lot of thought that goes into getting a tattoo. Where should you go? What do you get? How much will it cost? And who the hell can you trust enough to permanently ink your body?
Finding the right tattoo artist is one of the most important parts of the research process. So when it comes to actress and producer Lake Bell, who has been married to pro tattooist Scott Campbell for more than four years, you'd think that fact would make everything easier. After all, Campbell is famous in both L.A. and NYC for inking some of the biggest names in Hollywood, like his BFF Justin Theroux and Jennifer Aniston. But even still, Bell had never once requested her own piece of body art — until now. Yesterday, she officially took the plunge.
The design looks eerily similar to her husband's own personal collection, which makes a lot of sense. Back in September, she told Rachael Ray that Campbell lets her ink his body, turning it into something like a vision board. She said, "So the thing is, we have this way of praying, in a way, which is to send positive energy or juju out there, when we really, really want something — and we only use it when it’s really important — he’s like, ‘Tattoo it on me.’" |
Carb Options Peanut Spread vs Natural Peanut Butter
There’s an Albertson's nearby our office at work and and I occasionally stop by if I’m going out for lunch anyway. And, I recently needed some peanut butter which I figured would be an easy purchase — I’ve only had natural peanut butter for the past couple years but it’s readily available in stores these days. Or so I thought.
I walked over to the peanut butter aisle and looked for the big glass jars of natural peanut butter (for some reason, natural peanut butters always seem to be in glass jars). But, I didn’t see any. I was about to give up when I saw a jar of Carb Options Creamy Peanut Spread. It had a small “Skippy” banner in one corner so it appeared to have a reasonable pedigree. And, while my previous gripe with regular peanut butters had been their sugar content, this one was sweetened with Splenda :).
The other issue I originally had with non-natural peanut butters was their trans fat from partially hydrogenated oils. Now, as it turns out, I later learned that even regular peanut butter may have negligible trans fat content; but, by then, I had become quite accustomed to the full-peanut flavor of natural peanut butter.
Getting back to the Carb Options Peanut Spread, I checked its label and, even though partially hydrogenated oils were listed among the ingredients, the Nutrition Facts portion confirmed that it had no trans fat. I figured that it would probably resemble the taste of regular peanut butter but without all the normal disadvantages; so, I added a jar to my basket.
Upon returning home, I decided to put it to the test. I still had a jar of natural peanut butter in the fridge and so I could compare them directly. It took me a moment to come up with a meaningful procedure, but then I recalled that a peanut butter & jelly sandwich — in addition to being tasty — would work well as a testing platform. So, I pulled out a slice of low-carb bread along with sugar-free jam. Then, I spread some natural peanut butter on half the slice and Carb Options Peanut Spread on the other half. Finally, I spread jam across both sides.
This dual-testing configuration allowed me to directly compare peanutiness bite-for-bite. I also had a glass of water on hand to cleanse my palette in between tastings. I started on the Carb Options side of the sandwich and took a bite. At first, it seemed fine: I could taste both the sweetness of the blackberry jam along with the peanut flavor of the spread. From there, I moved on to the natural peanut butter side — and I couldn’t help but notice a more intense peanut flavor.
I soon finished the sandwich and, while neither side was bad, the natural peanut butter side was more organically peanutty. As I looked more closely on the Carb Options label, I soon realized why it was called merely a “peanut spread” — it only had “65% peanuts”. And, considering that the natural peanut butter (Ingredients: Roasted Peanuts, Salt) was probably 99% peanuts, it was a little disconcerting to ponder what the other 35% was within the peanut spread.
The second stage of my testing battery was the sliced-apple test. I had some apple in the fridge that I had sliced earlier and I had hunch that it could be more nourishing with a little peanut butter on top ;). Once again, I made use of both peanut spreads — some slices had one and some slices had the other. And, even though the natural peanut butter was more intrinsically tasty, the Carb Options spread did have a slight edge in one sense. As it contained partially hydrogenated oils, it was a semi-solid product. So, while the natural peanut butter tended to flop over the sides of the apple slices (and even ooze off), the Carb Options spread obediently remained affixed to the slices as if it was some kind of peanut Jell-o.
Finally, I had to taste the spreads alone, without the influence of other food items. Spoon in hand, I dove in. At this point, there was no contest. The natural peanut butter was creamy (yet grainy) with a pleasant saltiness. And, the Carb Options spread, while resembling peanuts, just didn’t compare. In fact, it was as if I was eating some other food — it seemed like a familiar flavor. Finally, I figured it out: the Carb Options spread tasted just like peanut-flavored butter. Really. |
1. Technical Field
The present invention relates to an ultrasonic sensor, and more specifically to an ultrasonic sensor for sending and receiving ultrasonic waves in the human body.
2. Related Art
As is well known, ultrasonic sensors determine the position and condition of a test object using ultrasonic transducers that send and receive ultrasonic waves (e.g., see Japanese Laid-open Patent Publication No. 2009-25179).
A liquid detecting unit (ultrasonic sensor) disclosed in Japanese Laid-open Patent Publication No. 2009-25179 includes an ultrasonic output unit having an ultrasonic transducer, and an acoustic impedance matching layer disposed on the ultrasonic output unit. In the liquid detecting unit, an ultrasonic transceiving face is formed on one side of the ultrasonic output unit. Also, the acoustic impedance matching layer is formed on one side of the ultrasonic output unit. An output face for outputting ultrasonic waves is formed in the side opposite the side in contact with the ultrasonic output unit. A fluid binder holding recess is formed in the output face. When the output face of the liquid detecting unit is brought into contact with a container, the fluid binder holding recess is filled with a fluid binder as the output face is brought into contact with the container.
A tube-shaped recess-forming member is disposed on one side of the ultrasonic output unit, and the interior of the recess-forming member is filled with an acoustic impedance layer to form a fluid binder holding recess. When the output face is brought into contact with a container, the fluid binder holding recess is filled with fluid binder. |
October 20, 2015
One
of the toughest tricks to master when it comes to makeup is learning
how to properly contour your face. Learning how to do that is life
changing and will forever shape the way that you make your purchasing
decisions, allowing you to select the right makeup. To
learn more about how to contour your face, all you need to do is follow
these simple steps and make the correct purchases. This guide may be
minimal, but it focuses on the truly important aspects that will have
your face looking its absolute best.
Draw a W
Draw
a W on your face? Surely this is some sort of misprint, right? Wrong.
Troy Surratt is a celebrity makeup artist and he recommends the W
drawing technique as a subtle alternative to some of the more overt
facial contouring techniques that are typically recommended by the
majority of beauty and fashion experts.
The most important part of this tip? The W is not drawn on the face until
after the foundation has been applied. The shape should be drawn on the
woman's face with a bronzing powder. To start, sweep it down one of the
cheekbones in a diagonal motion, all the way up to the bottom of the
nose, then head back down and up to the opposing cheekbone. For the
finishing touch, apply a stroke to your hairline.
How To Achieve The Best Results
While
this technique may seem exceedingly simple, the way to achieve the best
possible results is to go for the most natural look. To obtain this,
select a bronzing powder that is not too much darker than your skin
tone.
Steer
clear of shimmery textures and aim for creating matte shadows. The
center of the face should also be kept as luminous and light as
possible, to maximize the skin's glow.
A
great finishing flourish? Use a pearly highlighter to dab the tops of
the cheekbones, as well as the bridge of the nose for guaranteed
gorgeousness.
Products To Use
If
you are ready to give contouring your face a try, remember that it's
important to only use high quality products. They don't have to be
expensive if you are a savvy shopper and look for special deals and
promotions at such shops as Sears. Below are Some of the items that you may want
to check out and will help you look your best include:Charlotte
Tilbury Wonderglow - this amazing product is powered by light diffusers. When you are trying to bring out your skin's most luminous qualities, using the translucent elixir provides a spotlight effect.Surratt
Beauty Artistique Sculpting Brush - Thanks to this brush, facial contouring is made easy, as it's tapered to hug the face's natural contours and add a light bronze dusting.Guerlain
Terracotta Bronzing Powder- This bronzing powder is considered to be a
cult classic. Providing a variety of matte shades, the formula is
forgiving, while remaining lightweight.
October 18, 2015
May some of us were not be born or aware yet since “Back to the Future” was released on July 3, 1985 and I’m less than ten years old when I first watch it to our Neighbor’s through VHS tape back in 90’s, who that time my youth is full of Culture Obsession from tom sawyer, peter pan, Robinson family and many more inspiring cartoons Brought to us by World Masterpiece Theater, but what 'back to the future' film different from all of that was the culture, merchandising and future image.
the actual date used in the movie October 21, 2015. It’s a date that the Back to the Future movie trilogy. Marty McFly and Doc Brown travel to the future to help change the fate of Marty’s future family, and 21 October 2015 is almost upon us, Did they predict right? we made the list of future dream things Predicted from back to the future film who turns out to have a Similar things after 30 years.Hover boardin the film, we see Marty ride on the floating skate board for the first time, they called it “Hover board”. after 30 years There is a hands free scooter who have been referred too by many as hover board the “Hendo hover Board”. in the film, Bob Gale is a man who knows and invented the hover board, And Bob Gale has noticed and said, that the Hendo hover board are not hover board yet.Augmented deviceDoctor Brown uses the device in the film that overlays the information about anyone when they walk along, in Reality today, we see some stuff on our everyday smartphones, And also there are products like Google Glass and Hololens.FoodHydrator and Order MethodMarty's parents bring tiny Pizza for dinner and then her mother put it in the Hydrator and second later suddenly the big pizza appear. (Photo credit scrippsmedia.com)Flying CarAlthough flying car isn't anywhere yet, but in Slovakia there is Aero mobil - a flying car that Transforms in seconds from an automobile to an airplane. Gives you freedom to move up and down. About Aero Mobil ➠ As a car it fits into any standard parking space, uses regular gasoline, and can be used in road traffic just like any other car. As a plane it can use any airport in the world, but can also take off and land using any grass strip or paved surface just a few hundred meters long.(source: www.aeromobil.com)
Robotic gasoline stationin the film, when the car stop it on, there is the Texaco petrol station with robotic attendant. in Netherlands last 2008 has been providing petrol to the people.
Auto-fit SneakersNike boots that auto-fit Marty, or the jacket that dries itself still seem like flights of fancy, However, it’s sneaker collectors that are especially concerned with this date right now, as it’s the speculated release day of the 2015 Nike Mag. As we get closer and closer to the date October 21st, Nike’s lips are still sealed at this time.(Photo credit shoesgame.com) |
Main Menu
20 Creative Uses Of Lego You Need To See
The world will probably never get tired of the wonders of Lego, even if it definitely hurts when you step on one. Painful feet massage aside, the popular brick toy continues to astound us with the many things we can create with it, from mega structures to constructing movie scenes.
The sky is the limit to what you can create with Lego, unless of course, you don’t have an unlimited supply of Lego bricks. But that doesn’t mean you can’t bring out your childhood Lego collection to create practical everyday things or as a simple lifehack. To that end, here is a list of 20 creative uses of Lego ranging from simple to mind-blowing.
Gift Box
Could this be the answer to less trees being chopped down for wrapping paper? It would definitely be an interesting way to house a present for a geeky friend. Best of all, it’s Lego, so you can always reuse it for something else instead of adding to your pile of boxes in the attic. (Image source: PopClip)
Game Controller Organizer
Do you have multiple gaming consoles and the many remote controllers that come with them? Are they always jumbled up in a drawer? If you create a few of these, that mess in your drawer will be a thing of the past. Kudos to Lifehacker reader David Stoeckl for the idea. (Image source: Lifehacker)
Cable Holder
This lifehack is so simple that you’d wonder why you didn’t think of this before. Lego Minifigures (minifigs) have hands that are just the right size to hold your cords. You can now say goodbye to tangled wires as you organize your various wires with the help of this little people. (Image source: Lifehacker)
Bus Stop
There is a legit bus stop in London made entirely of Lego. It may be temporary but the details on it are astounding like the lettering on the various parts of the stand (It’s quite witty too!). There are even smooth pieces on the seats, so that sitting is not a painful wait. (Image Source: gizmodo)
Accessories
Wearing normal pieces of jewellery is so mainstream. Be a hispter instead by making and wearing Lego accessories like earrings, necklaces and rings. Even a couple of Lego cufflinks can help you stand out in your everyday normal work wear. (Image source: Whimsy Love)
Clock
Telling time shouldn’t be a chore. Nor should it only be limited to telling you when lunch time is. Opt for this cool clock instead that’s also pretty easy to DIY for your home or office. Counting down the minutes to lunch time will never be the same again. (Image source: Our Nerd Home)
Desk Organizer
The best thing about Lego is that you can build things however you want. Which means if you don’t like the desk orgnizers in the market you can always create your own with as many sections as you need. And they don’t get knocked down as easily as the plastic ones either. (Image source: Cthuliz)
Prosthetic Leg
When occupational therapist and clinical researcher Christina Stephens lost her leg after an injury, she decided to create a Lego prosthetic leg. Well, the idea was suggested by a colleague but she did it anyway. Take note: Do not try this at home.
Phone Docking Station
You’ve probably come across a few of these. Some are simple with only a few bricks to hold up the phone. Some decide to take it to the next level with a specific theme or by adding wheels. It’s Lego, so it’s up to you to customize it however you want. (Image source: Technabob)
Coin Sorter
Ironically enough, coin sorters are expensive even though what they’re sorting is money. If you have enough Lego pieces, you can cut costs by making one instead. The mechanism behind this coin sorter is really simple, as the sorter relies on a slope and the weight of the coin.
Computer Keyboard
Why isn’t this selling at my local computer shop? I don’t know about you but this is the ultimate geek dream. The brainchild of Jason Alleman, this Lego keyboard came into being after Alleman found a discarded keyboard in the streets and pick its insides. Thanks to his tinkering, it actually works.
Keychains
Create a unique keychain by threading it through a Lego piece that has holes. Or you can opt to drill a hole into a Lego brick. Whatever strikes your fancy really. Pair it up with a Lego board on your wall to act as a keyholder and you’ll never lose your keys again. (Image source: Minieco)
Air-Powered Car
Again, why isn’t this a thing in the first place? This crowdfunded car was built by Steve Sammartino and Raul Oaida. Who wouldn’t want to drive round town with a cool girl by your side? The car is made up of 500,000+ Lego pieces which includes the engine and it runs on air. (Image source: Super Awesome Micro Project)
Mouse Trap
Trapping mice is now a fun thing when you can build a mouse trap out of Lego like how Peter and his son did for Lifehacker’s MacGyver Challenge. If you think pesky little mousies don’t deserve to reside in beautiful Lego traps you can always… Well, we’ll let you figure that one out. (Image source: Lifehacker)
Pet House
Create a house for your pet just as designer Alex Jones did for his dog Kisha. He even made a Lego fire hydrant and some steaks to go with it. Awww! This sure beats buying or building a dog house out of boring ol’ wood. (Image source: Dogs)
Fill Cracks In Buildings
Reclaim your city and its buildings by filling all the nooks and crannies with colourful Lego bricks. German artist Jan Vormann started Dispatchwork to add a little colour to drab and grey cities. It’s an ongoing project that has different people from various countries participating. (Image Source: Greenthorne)
Gattling Rubber Band Gun
This is not just a few bricks slapped together to create a gun shape. Yes, you’ve read this right. This is a gun made of Lego that shoots rubber bands. This dangerous but fascinating project was constructed and designed by Sebastian Dick. Watch it in action here. (Image Source: MOC Pages)
Furniture
If there can be an entire house made of Lego, why not pieces of furniture? Sure, some things like chairs may be uncomfortable but you’ve got to admit a Lego lamp would look very chic. Plus Lego bricks are perfect for building walls and tables. Speaking of which… (Image source: inthralld)
Miniature Roller Coaster
Move over, motorized train sets and car circuits. This working miniature roller coaster was built by Lego enthusiast Adam Tucker. The ride goes on forever as the carts are set to play in an infinite loop. We think it lacks some Lego minifigs. Watch it move in this video. (Image source: MOC Pages)
Train Map
London must really love the Danish brick building toy as they celebrated their underground train’s 150th anniversary with Lego. These train maps are displayed at 5 stations, namely South Kensington, Piccadilly Circus, Green Park, Stratford and King’s Cross. (Image source: Metro)
Have you come across other uses for Lego? Let us know in the comments below! |
David Brownlee writes:
> Have you tried asking the original authors if they would be
> willing to re-release all or part of the code under a more
> open licence?
I have now asked Myricom about the possiblity of rereleasing their
drivers under a new license. Their response is that a specific
request should be submitted to them. I am glad to draft a request,
but I would like some guidance to make sure that everything is covered
correctly.
From the NetBSD perspective, I see the following issues.
- The licensing terms need to be reasonable. Below I have reproduced
the licensing terms and added two slight changes to seek agreement
from Myricom. Are they sufficient for NetBSD?
- There is access to some level of programming information. I believe
that everything needed is available either in the source code or in
one of the following documents:
http://www.myri.com/open-specs/http://www.myri.com/myrinet/PCI64/programming.html
I suspect that no engineering time would be required on the part of
Myricom, but perhaps someone could peruse this and see if that is
the case. Alternatively, can one expect them to agree to provide
any level of technical support from their engineering team?
- Obtain specific written permission from Myricom to use their name in
promoting the native NetBSD drivers. This should satisfy the
licensing clauses requiring acknowledgment and requiring permission
for use of derived code. Other derivative code (e.g., products that
modify the NetBSD drivers) would need to be covered by their own
permission negotiated with Myricom.
From the Myricom perspective, I see the following issues:
- Avoiding commitment of engineering resources to yet another task.
If their documentation is complete enough, a commitment might not be
required at all.
- Avoiding commitment to support software they have no direct control
over. If this is integrated into the NetBSD kernel, doesn't that
obviate the need for their support (so long as they provide
reasonable technical documentation)? Doesn't the NetBSD team
provide the support for all the drivers in the kernel? Two subcases
exist here, I think.
o One concerns the native NetBSD drivers. Presumably, these could
be fed back to Myricom so they could at least be aware of them and
perhaps integrate them into future versions. (Is it the role of
NetBSD to assist in the integration of their various drivers?)
Any commercial products using NetBSD but not changing the Myrinet
portion could advertise the Myrinet capability, Myricom would be
aware of the drivers, and things would be fine (hopefully).
o The second concerns products that have modified the Myrinet
drivers. I suspect they wish to prevent anyone from advertising
such a product as Myrinet and I'm sure they do not wish to support
it.
Do the licensing clauses below help support this distinction?
Should there be additions to clarify the second case above?
- Interest in enhanced revenue streams. It seems inherently
impossible to suggest a large new revenue stream coming from this
(unless there is a large community unknown to me who would be
inclinded to purchase more hardware if NetBSD supported Myrinet).
How can this point be addressed? Or is it only the case that they
are not really providing anything new, so there is no marginal cost
to this, so there doesn't need to be an identified new revenue
stream? Is that convincing to a commercial enterprise? Another
angle is to remind them of the range of hardware supported by
NetBSD; with NetBSD drivers, they could build Myrinet clusters with
anything containing a PCI bus.
What other issues have I missed?
Anyone with experience composing requests such as this, please let me
know how to make an effective request.
Thanks for your help.
Cheers,
Brook
===========================================================================
Below is the existing license. I've added a few changes (in caps) to
make it seemingly more in line with the NetBSD license. Are those
changes sufficient to make it acceptable into the kernel? Should the
license be rewritten instead?
**************************************************************************
* *
* Myricom GM networking software and documentation *
* *
* Copyright (c) 1994-2001 by Myricom, Inc. *
* All rights reserved. *
* *
* Permission to use, copy, modify and distribute this software and its *
* documentation in source and binary forms for non-commercial purposes *
REMOVE "for non-commercial purposes" ABOVE
* and without fee is hereby granted, provided that the modified software *
* is returned to Myricom, Inc. for redistribution. The above copyright *
REMOVE ", provided that ... for redistribution" ABOVE
* notice must appear in all copies. Both the copyright notice and this *
* permission notice must appear in supporting documentation, and any *
* documentation, advertising materials and other materials related to *
* such distribution and use must acknowledge that the software was *
* developed by Myricom, Inc. The name of Myricom, Inc. may not be used *
* to endorse or promote products derived from this software without *
* specific prior written permission. *
* *
* Myricom, Inc. makes no representations about the suitability of this *
* software for any purpose. *
* *
* THIS FILE IS PROVIDED "AS-IS" WITHOUT WARRANTY OF ANY KIND, WHETHER *
* EXPRESSED OR IMPLIED, INCLUDING THE WARRANTY OF MERCHANTABILITY OR *
* FITNESS FOR A PARTICULAR PURPOSE. MYRICOM, INC. SHALL HAVE NO *
* LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE *
* SECRETS OR ANY PATENTS BY THIS FILE OR ANY PART THEREOF. *
* *
* In no event will Myricom, Inc. be liable for any lost revenue or *
* profits or other special, indirect and consequential damages, even if *
* Myricom has been advised of the possibility of such damages. *
* *
* Other copyrights might apply to parts of this software and are so *
* noted when applicable. *
* *
* Myricom, Inc. *
* 325 N. Santa Anita Ave. *
* Arcadia, CA 91006 *
* *
**************************************************************************
The "zlib" source is copyright (C) 1995-1996 Jean-loup Gailly and Mark
Adler. See the file "zlib/README" for the copyright notice.
The GM configure scripts were produced by the Gnu Autoconf package and
are redistributed as permitted by that software's documentation,
which states,
There are no restrictions on how the configuration scripts that
Autoconf produces may be distributed or used. [...]
Of the other files that might be used with `configure',
`config.h.in' is under whatever copyright you use for your
`configure.in', since it is derived from that file and from the public
domain file `acconfig.h'. `config.sub' and `config.guess' have an
exception to the GPL when they are used with an Autoconf-generated
`configure' script, which permits you to distribute them under the same
terms as the rest of your package. `install-sh' is from the X
Consortium and is not copyrighted. |
Octreotide improved the quality of life in a child with malignant bowel obstruction caused by peritoneal dissemination of colon cancer.
This is a first pediatric case about the efficacy of octreotide for improving symptoms of malignant bowel obstruction. A 12-year-old boy was referred to our hospital for treatment of transverse colon cancer with peritoneal dissemination. A transverse colectomy was undertaken with postoperative adjuvant chemotherapy. Seven months later, severe abdominal symptoms occurred caused by incomplete bowel obstruction owing to tumor progression. The patient's quality of life decreased with a resultant disturbed mental condition. His parents sought to stop chemotherapy and for him to receive palliative care at home. We suggested nasogastric tube placement, but this was rejected. After obtaining informed consent, octreotide was administered intravenously. After 1 week, abdominal symptoms improved and the boy's complaints stopped. He had a good appetite and was able to eat small amounts of food. He was able to spend his final 2 months at home without nausea and in his family surroundings. |
Correlates and moderators of child pornography consumption in a community sample.
This study compares pornography users who report child pornography (CP) consumption with those who do not on demographic characteristics (age, ethnicity, and education level), psychological characteristics (e.g., loneliness, attachment style, anxiety, and sensation seeking), frequency of pornography use, and intentions to engage in contact sexual abuse. Participants were recruited on the Internet to complete an online anonymous survey about "problematic pornography use." Approximately, one fifth of the recruited male pornography users (21%, n = 37) reported consuming CP. The two groups were similar on all demographic and psychological characteristics. However, the probability of CP consumption was the greatest among men scoring high on a measure of sensation seeking who reported frequent pornography use (i.e., statistical moderation). CP consumers also reported a greater interest in engaging in sexual contact with a minor than non-CP consumers. |
# Copyright 2015 The TensorFlow Authors. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ==============================================================================
"""Tests for tensorflow.ops.math_ops.matrix_inverse."""
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import numpy as np
from tensorflow.python.client import session
from tensorflow.python.framework import constant_op
from tensorflow.python.framework import ops
from tensorflow.python.ops import control_flow_ops
from tensorflow.python.ops import linalg_ops
from tensorflow.python.ops import math_ops
from tensorflow.python.ops import random_ops
from tensorflow.python.ops import variables
from tensorflow.python.platform import test
class InverseOpTest(test.TestCase):
def _verifyInverse(self, x, np_type):
for adjoint in False, True:
y = x.astype(np_type)
with self.test_session(use_gpu=True):
# Verify that x^{-1} * x == Identity matrix.
inv = linalg_ops.matrix_inverse(y, adjoint=adjoint)
tf_ans = math_ops.matmul(inv, y, adjoint_b=adjoint)
np_ans = np.identity(y.shape[-1])
if x.ndim > 2:
tiling = list(y.shape)
tiling[-2:] = [1, 1]
np_ans = np.tile(np_ans, tiling)
out = tf_ans.eval()
self.assertAllClose(np_ans, out, rtol=1e-4, atol=1e-3)
self.assertShapeEqual(y, tf_ans)
def _verifyInverseReal(self, x):
for np_type in [np.float32, np.float64]:
self._verifyInverse(x, np_type)
def _verifyInverseComplex(self, x):
for np_type in [np.complex64, np.complex128]:
self._verifyInverse(x, np_type)
def _makeBatch(self, matrix1, matrix2):
matrix_batch = np.concatenate(
[np.expand_dims(matrix1, 0),
np.expand_dims(matrix2, 0)])
matrix_batch = np.tile(matrix_batch, [2, 3, 1, 1])
return matrix_batch
def testNonsymmetric(self):
# 2x2 matrices
matrix1 = np.array([[1., 2.], [3., 4.]])
matrix2 = np.array([[1., 3.], [3., 5.]])
self._verifyInverseReal(matrix1)
self._verifyInverseReal(matrix2)
# A multidimensional batch of 2x2 matrices
self._verifyInverseReal(self._makeBatch(matrix1, matrix2))
# Complex
matrix1 = matrix1.astype(np.complex64)
matrix1 += 1j * matrix1
matrix2 = matrix2.astype(np.complex64)
matrix2 += 1j * matrix2
self._verifyInverseComplex(matrix1)
self._verifyInverseComplex(matrix2)
# Complex batch
self._verifyInverseComplex(self._makeBatch(matrix1, matrix2))
def testSymmetricPositiveDefinite(self):
# 2x2 matrices
matrix1 = np.array([[2., 1.], [1., 2.]])
matrix2 = np.array([[3., -1.], [-1., 3.]])
self._verifyInverseReal(matrix1)
self._verifyInverseReal(matrix2)
# A multidimensional batch of 2x2 matrices
self._verifyInverseReal(self._makeBatch(matrix1, matrix2))
# Complex
matrix1 = matrix1.astype(np.complex64)
matrix1 += 1j * matrix1
matrix2 = matrix2.astype(np.complex64)
matrix2 += 1j * matrix2
self._verifyInverseComplex(matrix1)
self._verifyInverseComplex(matrix2)
# Complex batch
self._verifyInverseComplex(self._makeBatch(matrix1, matrix2))
def testNonSquareMatrix(self):
# When the inverse of a non-square matrix is attempted we should return
# an error
with self.assertRaises(ValueError):
linalg_ops.matrix_inverse(np.array([[1., 2., 3.], [3., 4., 5.]]))
def testWrongDimensions(self):
# The input to the inverse should be at least a 2-dimensional tensor.
tensor3 = constant_op.constant([1., 2.])
with self.assertRaises(ValueError):
linalg_ops.matrix_inverse(tensor3)
def testNotInvertible(self):
# The input should be invertible.
with self.test_session():
with self.assertRaisesOpError("Input is not invertible."):
# All rows of the matrix below add to zero.
tensor3 = constant_op.constant([[1., 0., -1.], [-1., 1., 0.],
[0., -1., 1.]])
linalg_ops.matrix_inverse(tensor3).eval()
def testEmpty(self):
self._verifyInverseReal(np.empty([0, 2, 2]))
self._verifyInverseReal(np.empty([2, 0, 0]))
def testRandomSmallAndLarge(self):
np.random.seed(42)
for dtype in np.float32, np.float64, np.complex64, np.complex128:
for batch_dims in [(), (1,), (3,), (2, 2)]:
for size in 8, 31, 32:
shape = batch_dims + (size, size)
matrix = np.random.uniform(
low=-1.0, high=1.0,
size=np.prod(shape)).reshape(shape).astype(dtype)
self._verifyInverseReal(matrix)
def testConcurrentExecutesWithoutError(self):
with self.test_session(use_gpu=True) as sess:
all_ops = []
for adjoint_ in True, False:
matrix1 = random_ops.random_normal([5, 5], seed=42)
matrix2 = random_ops.random_normal([5, 5], seed=42)
inv1 = linalg_ops.matrix_inverse(matrix1, adjoint=adjoint_)
inv2 = linalg_ops.matrix_inverse(matrix2, adjoint=adjoint_)
all_ops += [inv1, inv2]
inv = sess.run(all_ops)
self.assertAllEqual(inv[0], inv[1])
self.assertAllEqual(inv[2], inv[3])
class MatrixInverseBenchmark(test.Benchmark):
shapes = [
(4, 4),
(10, 10),
(16, 16),
(101, 101),
(256, 256),
(1000, 1000),
(1024, 1024),
(2048, 2048),
(513, 4, 4),
(513, 16, 16),
(513, 256, 256),
]
def _GenerateMatrix(self, shape):
batch_shape = shape[:-2]
shape = shape[-2:]
assert shape[0] == shape[1]
n = shape[0]
matrix = np.ones(shape).astype(np.float32) / (
2.0 * n) + np.diag(np.ones(n).astype(np.float32))
return variables.Variable(np.tile(matrix, batch_shape + (1, 1)))
def benchmarkMatrixInverseOp(self):
for adjoint in False, True:
for shape in self.shapes:
with ops.Graph().as_default(), \
session.Session() as sess, \
ops.device("/cpu:0"):
matrix = self._GenerateMatrix(shape)
inv = linalg_ops.matrix_inverse(matrix, adjoint=adjoint)
variables.global_variables_initializer().run()
self.run_op_benchmark(
sess,
control_flow_ops.group(inv),
min_iters=25,
name="matrix_inverse_cpu_{shape}_adjoint_{adjoint}".format(
shape=shape, adjoint=adjoint))
if test.is_gpu_available(True):
with ops.Graph().as_default(), \
session.Session() as sess, \
ops.device("/gpu:0"):
matrix = self._GenerateMatrix(shape)
inv = linalg_ops.matrix_inverse(matrix, adjoint=adjoint)
variables.global_variables_initializer().run()
self.run_op_benchmark(
sess,
control_flow_ops.group(inv),
min_iters=25,
name="matrix_inverse_gpu_{shape}_adjoint_{adjoint}".format(
shape=shape, adjoint=adjoint))
if __name__ == "__main__":
test.main()
|
Technical Field
Embodiments described herein are related to the field of semiconductor integrated circuits, and more particularly to electrostatic discharge protection circuits employed to reduce damage to circuits caused by electrical overstress.
Description of the Related Art
In general terms, electrical overstress (EOS) refers to an electronic component or semiconductor integrated circuit (IC) being exposed to a voltage and/or current with a value greater than the component is designed to handle. EOS may cause an IC to operate incorrectly (e.g., “glitch”) or, in more extreme cases, can cause physical damage to circuits in the IC. EOS can have various causes, such as, for example, improper power source, incorrect power-on sequencing, electro-magnetic interference (EMI), or electrostatic discharge (ESD).
ESD is a sudden electrical current flow between two differently charged surfaces. As implied in the name, ESD is caused by an accumulation of static charge on a given surface. The accumulated charge may result in a significant difference in voltage potential between the charged surface and another surface. When the two surfaces are electrically shorted together, come into contact, or a dielectric breakdown occurs, the charged surface may discharge onto the surface with a lower voltage potential until the difference in voltage between the surfaces is low enough to prevent further discharging. Since the voltage difference prior to discharge may be large, the corresponding currents during discharge may also be large.
Semiconductor ICs may be particularly vulnerable to the adverse effects of ESD. The large currents that can be produced by ESD can damage or destroy circuitry. Accordingly, during manufacturing and installation of electronic systems utilizing ICs, special handling procedures may be followed to prevent damage resulting from an ESD event. Furthermore, many ICs may have ESD protection circuitry built in. Such circuitry may include a sensor and a clamp circuit. The sensor may sense the occurrence of an ESD event, and in response to sensing the ESD event, the sensor may cause activation of the clamp circuit to provide an electrical path through which the current may be safely discharged. |
Many surgical devices rely on positive displacement pumps to deliver or remove irrigating fluid during an operation. These devices are well known in the art and take many forms.
Typically, these "peristaltic" pumps employ a fixed position pump head, a rotating mandrel with one or more rollers spaced around its periphery, and a cavity or shoe which compresses the tubing sufficiently to allow a pumping action of the fluid. Peristaltic pumps have been used as surgical aspirators to provide suction of irrigating fluid and tissue from surgical sites; and to deliver irrigation fluid to provide lubrication for evacuated material, cooling for surgical probes, and to provide a safety barrier between the probe and surrounding tissue.
The known devices used for such purposes have recognized limitations and deficiencies. For example, volumetric fluid delivery is often inconsistent from operation to operation when using pumps having a fixed gap between the aforementioned mandrel and shoe. The fixed gap yields variations in tubing occlusion and thus variations in pump efficiency and rate of fluid delivery. As indicated hereinabove, this can be particularly significant when pumping small volumes of fluid in medical applications.
The known pumps are also sensitive to manufacturing tolerances of the tubing (outer diameter, inner diameter, wall thickness and/or durometer), as well as to variations in machined part or assembly tolerances. These factors all have the potential for producing undesirable variations in pump performance making it difficult to maintain the calibration of these devices.
Problems also arise in working with the tubing used in the known pumps. In particular, it is often awkward and confusing to insert the tubing into the pump head of known devices. In many pump arrangements no mechanical advantage exists when closing the pump shoe to compress the tubing making for a difficult operation that could result in a crimped tube condition or require the use of two hands to pull and stretch the pump tubing before latching the shoe closed.
The potential also exists for inserting the tube in such a way as to cause fluid flow in the wrong direction, and furthermore, tubing has the propensity to "walk" which in many known pumps has the potential for causing a tubing jam, or even a separation or rip in the fluid line.
Further yet, the fixed occlusion rate of known peristaltic pumps requires that the wall thickness of the compressible tube inserted into the pump be precise and consistent. Manufacturing tolerances for the tubes and pump components (like the aforementioned shoe), are not well tolerated without having an effect on pump performance.
Tube life is also affected by pump performance and can be adversely affected by devices which do not compensate for manufacturing tolerances in the tubing, pump shoe and other components which cooperate to produce the desired pumping action.
Many attempts have been made to address the aforementioned limitations and deficiencies of peristaltic pumps that utilize a fixed position pump head.
Peristaltic pumps have been devised that utilize an adjustable shoe as part of self adjusting pump head; rather then a fixed position pump head; actuating means have been developed that are coupled to an adjustable shoe for positioning/forward biasing the shoe to compress a tube; and means for compensating for the manufacturing tolerances of a tube introduced a peristaltic pump have been developed, including means for applying a continuous reaction force on the shoe.
Peristaltic pumps have also been devised that utilize snap-on manifold cartridges having a fixed length U-shaped tube attached, where the cartridge can only be installed one way onto the pump. Such cartridges have also been developed to enable the operator to install the cartridge using a single hand, with the cartridge being a tie bar structure having an attached U-shaped tube.
In fact, the art is extremely crowded with many attempts being made to address the aforementioned limitations and deficiencies of peristaltic pumps that utilize a fixed position pump head and those that feature the use of variable position pump heads as well.
The following issued U.S. Patents are set forth as examples of teachings which illustrate the present state of the art.
U.S. Pat. No. 3,829,249 to Pursley describes a portable siphonic pump for transferring gasoline that includes a motor driven wheel with rollers that squeeze a tube The rollers are retractable along wheel spokes against springs; however there is no showing of a compressive reactive force being used against a shoe.
U.S. Pat. No. 4,728,265 to Cannon describes a peristaltic pump that utilizes a cam action compensator as means to normally urge a peristaltic mechanism toward a platen (compression shoe). The compensator yields as necessary to limit the force the peristaltic mechanism can exert against a tube.
The Cannon patent describes the use of a hinged cam action compensator which provides a yielding or complaint movement between the platen and drive mechanism; however the platen appears to be fixed in all embodiments. It should also be noted that the cam action compensator used by Cannon, and other types of cam action compensators and controls mechanisms, used in the past to provide a yielding or complaint movement between a shoe and drive mechanism against which a tube is compressed, are undesirable from both mechanical complexity and packaging requirements points of view when compared with the invention to be described hereinafter.
U.S. Pat. No. 4,482,347 to Borsanyi describes a low volume peristaltic pump (an application where the present invention finds significant utility), having a resilient surface set into the face of a platen.
U.S. Pat. No. 4,519,754 to Minick describes a peristaltic pump having variable occlusion rates. The pump includes a reaction member further including a "reaction surface adapted to at least partially encircle the circular path traversed" by a set of compression rollers. The reaction member has cam control means associated therewith which enables adjustment of the reaction member so as to select a variable occlusion rate of the tube.
The Minick patent requires a reaction surface to cover about 270 degrees of path travelled by rollers and requires cam control means which, as indicated hereinabove, is undesirable in many applications form mechanical and packaging points of view.
U.S. Pat. No. 3,876,340 to Thomas describes a peristaltic pump having a pivotal reaction means. Each of a plurality of tubes has a support against which it is pressed by the rollers. The support is resiliently yieldable in order to avoid placing excess flattening pressures on the tube.
In a preferred case each support is a spring loaded block which may be of a resilient material. Alternatively, a belt which is spring urged towards the tubes being compressed is also described.
FIG. 3 of the Thomas patent illustrates a peristaltic pump including a floating shoe, single spring and slider crank arrangement (slide pins 42, spring 44 & shoe 36). Each block (shoe) 36 presents a surface 38 which engages the tube and which is yieldable away from the rollers. An adjustment plug 44 is used to adjust the tension on spring 42 and hence the depicted device is not self-adjusting.
U.S. Pat. No. 3,990,444 to Vial describes, with reference to FIG. 3, a blood transfusion apparatus that uses a pair of springs in a slidable member to compress a tube. The pair of springs allows the slidable member to float. A hook device 21 is used to keep the device closed.
U.S. Pat. No. 5,049,047 to Polaschegg et al., describes an infusion pump with means for measuring the internal diameter of a pump supply tube where the means for measuring can be a counterpressure device.
U.S. Pat. No. 4,725,205 to Cannon et al., describes a linear peristaltic pump for pumping medical solutions which uses a complaint means for urging the peristaltic mechanism towards the platen; but which yields to limit force against the tube. The peristaltic means is urged toward the base using cam action compensation means. It should be noted that the Cannon et al. reference describes in great detail one of the significant problems existing in prior art peristaltic pump arrangements, namely that once a particular tube is selected, specific predetermined dimensional limitations are introduced into the combination.
Cannon et al. recognized that the tube itself cannot be expected to provide the necessary resilience to obviate the problem and that rather then absorbing the excess forces with tube resiliency, the effort is more properly focused on ways to limit the force exerted on the tube.
Cannon et al. indicates that one way in which excess forces in a peristaltic can be alleviated is to allow the platen to yield and uses U.S. Pat. No. 4,373,525, to Koboyashi to illustrate a peristaltic pump which makes use of a spring loaded platen (The Koboyashi patent is directed to methods and apparatus for detecting occlusions in tubing).
U.S. Pat. No. 4,705,464 to Arimond describes a medicine pump that includes a pump head having spring loaded plungers for accommodating variances in tubing thickness; but each plunger supports a roller bearing. There is no teaching of spring biasing the compression shoe.
U.S. Pat. No. 4,210,138 to Jess et al., describes fluid metering apparatus that includes a pressure plate slidably mounted to a housing; however the plate is not spring biased.
U.S. Pat. No. 4,648,812 to Kobayashi et al., describes methods and apparatus for preventing pulsations in a peristaltic pump by using a platen mounted on a single support spring.
U.S. Pat. No. 1,998,337 to Spiess, describes a folding machine which includes a roller, a cam mounted on a shaft compressed against the roller.
U.S. Pat. No. 3,737,251 to Berman et al., describes, with reference to FIG. 2, a peristaltic pump having a pair of pump shoes 16, leaf springs 17 and adjusting screws 18 used to compensate for variations in a pump rotor, support bracket, rollers, tubing diameters (inside and outside), concentricity, fluid viscosity and temperature. Berman et al., requires a manual screw to perform the desired compensation function.
U.S. Pat. No. 2,434,802 to Jacobs describes a pump block, for a peristaltic pump, mounted on a pair of springs, with the springs being designed to yield if non-compressible matter traverses the tube. The pump block can be manually adjusted to sit in a predetermined position.
U.S. Pat. No. 3,353,491 to Bastien describes a back-up member 32 for a pumping device, which is in relatively free slidable engagement with a support 12 and is connected thereto only be tension means, such as stretch spring 46a, to allow play in the back-up member when an occlusion passes in the tube.
U.S. Pat. No. 4,218,197 to Meyer et al., describes a peristaltic pump and valve flow controller. FIG. 1 depicts a type of tie bar 56, referred to as a frame member, with U-shaped tubing attached thereto. A compression spring 68 is used to compress rollers 66 and the tubing; but the spring is located between tie bar and roller assembly.
U.S. Pat. No. 4,544,336 to Faeser et al., describes a peristaltic pump having a support part 2 acted upon by springs 26 to produce a desired nipping force on a pipe placed between the support and rollers mounted on a wheel.
U.S. Pat. No. 4,585,399 to Baier describes a hose pump, for drawing fluids from a body cavity, with different inlet and outlet connectors to prevent improper installation.
U.S. Pat. No. 4,599,055 to Dykstra describes a fluid flow chamber cassette carrying a U-shaped flexible tube on one side that is loaded into a peristaltic pump. In particular, FIG. 1 of the Dykstra patent depicts a peristaltic pump including a snap on cassette 28 and U-shaped tube 30, having a fixed length. It is possible to install Dykstra's cassette using one hand.
U.S. Pat. No. 4,708,604 to Kindera describes a pressure plate, for a peristaltic pump utilizing flexible tubing, having an arcuate surface and a pivot mount. The arcuate surface is retained in operative association with the flexible tubing by a spring bias.
U.S. Pat. No. 4,861,242 to Finsterwald describes a self loading peristaltic pump.
U.S. Pat. No. 5,082,429 to Soderquist et al., describes a peristaltic pump that uses a camming mechanism for opening and closing the pump.
U.S. Pat. No. 4,824,339 to Bainbridge et al., describes a cartridge for use with the self loading peristaltic pump described in the 4,861,242 patent to Finsterwald.
U.S. Pat. No. 5,024,586 to Meiri describes a peristaltic pump that corrects for tube walking (also referred to as "tube creep") using spring biased rollers to apply a constant force to the tube. The spring biased rollers apply a force that is substantially independent of minor tube wall thickness variations.
U.S. Pat. No. 5,110,270 to Morrick describes a peristaltic pump that uses a spring and slider combination; but on the pump rotor, using spring biased clamps to hold a tube in place.
U.S. Pat. No. 5,173,038 to Hopfensperger et al., describes a rotatable compression member for a peristaltic pump including a leaf spring.
U.S. Pat. Nos. 3,137,241 and 3,227,091 to Isreeli and Isreeli et al., respectively, describe a spring biased platen for a pumping device.
U.S. Pat. No. 3,167,397 to Skeggs et al., describes a spring biased (or possibly supported) platen for an analysis system including a pump.
U.S. Pat. No. 4,473,342 to lies describes, with reference to FIG. 7, a peristaltic pump that includes a plurality of pivotably mounted track members provided with an associated leaf spring (36) which is fixed at one end to the underside of track carrier for biasing a track member toward the rollers 3 and can act to compensate for variations in tube wall thickness. The lies patent requires pivotably mounted track members.
U.S. Pat. No. 4,673,334 to Allington et al. describes a cassette for a peristaltic pump having spring means for engaging the drive means of the pump with a bias force to permit self adjustment. The cassette acts as a compression shoe.
U.S. Design Pat. No. 264,134 to Xanthopoulos depicts a disposable cassette for a peristaltic pump.
U.S. Pat. No. 4,025,241 to Clemens describes a peristaltic pump having pump tubing compressed against a spring loaded (pair of springs) movable base member improved by the addition of at least one actuating member capable of movement to or away from an actuating position with respect to the base member.
U.S. Pat. No. 3,778,195 to Bamberg describes a pump for parenteral injections and the like including pivotally mounted spring loaded plate like members positioned for engagement with a cam lobe.
U.S. Pat. No. 5,125,891 to Hossain et al., U.S. Pat. No. 4,798,580 to DeMeo et al., and U.S. Pat. No. 4,537,561 to Xanthopoulos, teach disposable peristaltic pump cassette systems.
U.S. Pat. No. 4,604,038 to Belew describes a remotely operable peristaltic pump requiring the use of two compression shoes.
U.S. Pat. No. 4,500,266 to Cummins describes a peristaltic pump that uses a series of gear driven compensating shoes that linearly move in and out of contact with a tube.
U.S. Pat. No. 3,918,854 to Catarious describes the use of a spring biased shoe to compensate for a variety of problems in a peristaltic pump; however only a manual compensation mechanism is described.
U.S. Pat. No. 4,813,855 to Leveen et al., describes the use of an adjustable shoe in a peristaltic pump, that is positioned using a cam shaft.
U.S. Pat. No. 4,189,286 to Murry et al., describes a peristaltic pump that uses a compressive reactive force for tube sizing. A cam mounting is required and a pivot shaft is called for. Additionally, the shoe used in Murry et al. rotates.
U.S. Pat. No. 4,256,442 to Lamadrid et al., describes use of a mechanically advantaged pressure plate for a peristaltic pump; however, the pressure plate, which is pivot mounted, is retained in one of two positions and does not "float".
U.S. Pat. No. 4,288,205 to Henk describes a variable volume peristaltic pump that uses a manual adjustment screw to adjust the effective length of a flexible band located between the tube and pump rollers.
U.S. Pat. No. 4,886,431 to Soderquist et al. describes a peristaltic pump that cooperates with independently adjustable cartridges.
U.S. Pat. No. 4,925,376 to Kahler describes a peristaltic pump with a tube holding mechanism that requires the use of a cam shaft to effect shoe movement and the use of a locking surface to prevent tube walking.
None of the aforementioned patents, or indeed any known peristaltic pump, satisfactorily address the problem of assuring a consistent pumping action, which affects fluid delivery rate (particularly for those applications involving the pumping of small volumes of fluid); while at the same time addressing (1) the mechanical complexity, cost and space limitations imposed by cam action compensation means used in conjunction with variable position pump shoes; (2) the safety issues associated with insuring that a tube introduced into a pump is properly installed, that the tube does not walk or be subject to forces that increase the risk of tube spilling, etc.; (3) the concern that the manual operation required to introduce a tube is a user friendly, preferably one handed, operation; and (4) the need to automatically compensate for manufacturing tolerances in tube wall and shoe construction without requiring manual intervention, such as by having to turn manual adjustment screws or the like to perform the compensation function.
In view of the above, it would be desirable to provide methods and apparatus which, when integrated into a peristaltic pump, simultaneously solve all of the aforementioned problems, and which provide the capability to solve individual problems such as simplifying the mechanical aspects of the aforementioned automatic compensation function, relaxing the packaging constraints for such means, offering a control mechanism that is simple and easy to use from a manual operations point of view, etc. |
United Way Thanks State Workers with Lunch
The United Way Association of South Carolina thanked state employees for their support with a special twist for lunch.
http://www.wltx.com/video/2516222383001/1/United-Way-Thanks-State-Workers-with-Lunchhttp://bcdownload.gannett.edgesuite.net/wltx/34310454001/34310454001_2516231468001_th-51ce0ddde4b0d2d2b253e7e0-1206954757001.jpg?pubId=34310454001United Way Thanks State Workers with LunchThe United Way Association of South Carolina thanked state employees for their support with a special twist for lunch. WLTXcommunityNews00:38 |
A monoclonal antigen-binding T cell immunoprotein: antigenic relatedness to T cell receptor beta chain FR1 V and J peptide segments: physicochemical distinctiveness from classical immunoglobulins and T cell receptor heterodimers.
The monoclonal murine T cell hybridoma, 51H7D, was previously shown to bind the arsazobenzene hapten and to produce a soluble antigen-binding molecule. In this paper we characterize this antigen-binding immunoprotein for its relationship to known T cell receptors serologically, using antibodies specific for variable region framework, or joining region peptides predicted from gene sequence and by biochemical means. The 51H7D cell expresses a protein with subunit size of approximately 31,000, that reacts antigenically with affinity-purified antibodies directed against synthetic first framework and joining segment peptides, corresponding to the gene sequence of the T cell receptor beta chain, YT35. This molecule does not react with affinity-purified antibodies directed against murine immunoglobulin, framework 1 sequences of alpha and gamma T cell receptors, or with antibodies against synthetic heavy chain joining segments. The subunit of mol. wt. 31,000 can form higher aggregates, notably in the mol. wt range of 60,000-70,000, depending upon extraction conditions. The soluble form of the antigen-binding molecule bears the J beta cross-reactive determinant and occurs predominantly as a charge restricted molecular species of approximate mol. wt 60,000-70,000. The purified molecule has a blocked N-terminus, but quantitative statistical analysis of its amino acid composition indicates a closer relatedness to T cell receptor beta chains and other antigen-binding T cell products, than it has to alpha, gamma or delta TCR chains. No evidence for more than one type of polypeptide chain was found and the polymerization is not dependent upon the formation of disulfide bonds. These studies raise the possibility that antigen-binding soluble T cell molecules might belong to a new family of immunoproteins, that is related to, but distinct from, classical immunoglobulins and alpha beta or gamma delta heterodimers. |
Q:
How to check if current thread is not main thread
I need to check if the thread running a certain piece of code is the main (UI) thread or not. How can I achieve this?
A:
Looper.myLooper() == Looper.getMainLooper()
if this returns true, then you're on the UI thread!
A:
you can use below code to know if current thread is UI/Main thread or not
if(Looper.myLooper() == Looper.getMainLooper()) {
// Current Thread is Main Thread.
}
or you can also use this
if(Looper.getMainLooper().getThread() == Thread.currentThread()) {
// Current Thread is Main Thread.
}
Here is similar question
A:
The best way is the clearest, most robust way: *
Thread.currentThread().equals( Looper.getMainLooper().getThread() )
Or, if the runtime platform is API level 23 (Marshmallow 6.0) or higher:
Looper.getMainLooper().isCurrentThread()
See the Looper API. Note that calling Looper.getMainLooper() involves synchronization (see the source). You might want to avoid the overhead by storing the return value and reusing it.
* credit greg7gkb and 2cupsOfTech
|
Differential pair distribution function study of the structure of arsenate adsorbed on nanocrystalline γ-alumina.
Structural information is important for understanding surface adsorption mechanisms of contaminants on metal (hydr)oxides. In this work, a novel technique was employed to study the interfacial structure of arsenate oxyanions adsorbed on γ-alumina nanoparticles, namely, differential pair distribution function (d-PDF) analysis of synchrotron X-ray total scattering. The d-PDF is the difference of properly normalized PDFs obtained for samples with and without arsenate adsorbed, otherwise identically prepared. The real space pattern contains information on atomic pair correlations between adsorbed arsenate and the atoms on γ-alumina surface (Al, O, etc.). PDF results on the arsenate adsorption sample on γ-alumina prepared at 1 mM As concentration and pH 5 revealed two peaks at 1.66 Å and 3.09 Å, corresponding to As-O and As-Al atomic pair correlations. This observation is consistent with those measured by extended X-ray absorption fine structure (EXAFS) spectroscopy, which suggests a first shell of As-O at 1.69 ± 0.01 Å with a coordination number of ~4 and a second shell of As-Al at ~3.13 ± 0.04 Å with a coordination number of ~2. These results are in agreement with a bidentate binuclear coordination environment to the octahedral Al of γ-alumina as predicted by density functional theory (DFT) calculation. |
1. Field of the Invention
The present invention relates to a semiconductor process, and more particularly, to a semiconductor process, which forms a cap layer with a material different from a hard mask layer, covers two gates with a material layer, and back etches the material and the gates to make the two gates have the same height.
2. Description of the Prior Art
For decades, chip manufacturers have developed more and more small metal-oxide-semiconductor (MOS) transistors to make them faster. As the semiconductor processes advance to very deep sub micron era, such as 65-nm node or beyond, increasing the driving current for MOS transistors has become a critical issue. In order to improve device performance, crystal strain technology has been developed. Crystal strain technology has become more and more attractive as a mean for obtaining better performances in the field of CMOS transistor fabrication. Putting a strain on a semiconductor crystal alters the speed at which charges move through that crystal. Strain makes CMOS transistors work better by enabling electrical charges, such as electrons, to pass more easily through the silicon lattice of the gate channel.
An epitaxial layer is often formed in a substrate beside a gate for putting a strain on a semiconductor crystal. In a first step for forming the epitaxial layer, a first spacer is formed to define the position of the epitaxial layer, then the substrate is etched to form a recess, and the epitaxial layer is formed in the recess. After the epitaxial layer is formed, the first spacer needs to be removed to form a second spacer, which defines the position of a source/drain in the substrate beside the gate.
For a complementary metal-oxide semiconductor (CMOS) or a static random access memory (SRAM), an NMOS transistor and a PMOS transistor are located on both sides, and the materials and the forming methods of the epitaxial layers of the NMOS transistor and the PMOS transistor are different. For example, a silicon germanium is suited for forming in the substrate beside a gate of the PMOS transistor but the silicon germanium is not suited for forming in the substrate beside a gate of the NMOS transistor. Furthermore, a silicon carbide is suited for forming in the substrate beside a gate of the NMOS transistor. As the silicon germanium is formed in the substrate beside the gate of the PMOS transistor, a lithography process is performed on the PMOS transistor to form a first spacer and a recess, and the first spacer is removed after the epitaxial layer is formed. The cap layer of the PMOS transistor is etched during the step of forming the silicon germanium epitaxial layer, without the cap layer of the NMOS transistor being etched. Therefore, thicknesses of the gates of the NMOS transistor and the PMOS transistor are different. Moreover, if the cap layer of the PMOS transistor is over-etched, the gate layer below the cap layer may be exposed, or the first spacer may not be removed completely.
The modern methods of solving the problem of the thickness difference between the gate of the NMOS transistor and the gate of the PMOS transistor in a static random access memory (SRAM) may be described as following. A lithography process is additionally performed to thin the cap layer of the NMOS transistor, but the thinning process is complex and the photoresists formed during the two lithography processes (respectively performed on the PMOS transistor and the NMOS transistor) would induce misalignment at the boundary between the NMOS transistor and the PMOS transistor, resulting in the cap layer at the boundary being over-etched or not enough etched, hence degrading the performance of the static random access memory (SRAM).
Therefore, a semiconductor process is especially needed in modern industries to solve problems such as thickness difference between gates of two transistors, spacer residues, and exposed gate layers. |
Nakshatra Van
Nakshatra Van is a park created by the Jharkhand Forest Department in front of the residence of the governor of Jharkhand in Ranchi, the capital of the Indian state of Jharkhand.
A Nakshatra or lunar mansion is one of the 27 or 28 divisions of the sky that the Moon passes through during its monthly cycle, as used in Hindu astronomy and Hindu astrology. Each Nakshatra is identified by its prominent star(s) and is associated with a Zodiac. Hindu astrologers believe that each constellation of the zodiac is associated with a tree. Those trees are of medicinal, social, aesthetic or economic value.
History
The foundation stone for the park was laid by Sri L. K. Advani, Deputy Prime Minister of India in 2002. He planted a Vikankat on that day. The responsibility for planning and developing the park was given to Social Forestry Division. Department officials visited a Zodiac Park in Bangalore to study the concept. Scientists from the Indian Institute of Astro-Physics were consulted in the planning process. It took around two years to complete the construction of the park. The park was opened after a colourful programme on the occasion of Van Mahotsav in 2004. The park was inaugurated by Governor M. Rama Jois and many other dignitaries. The administration and management of the park was transferred to Jharkhand State Forest Development Corporation in 2004.
References
Category:Parks in India
Category:Trees in mythology
Category:Urban public parks
Category:Ranchi
Category:Protected areas of Jharkhand
Category:2004 establishments in India |
Battling unhealthy food requires tobacco-style response
The international community must develop a global convention similar to the legal framework for tobacco control to fight diet-related ill health, warn Consumers International and the World Obesity Federation.
The two international membership bodies will call on governments to make a binding commitment to introduce a raft of policy measures designed to help consumers make healthier choices and improve nutrition security for everyone, as part of new recommendations.
“If obesity was an infectious disease we would have seen billions of dollars being invested in bringing it under control,” said Dr Tim Lobstein, director of policy at the World Obesity Federation. “But because obesity is largely caused by the overconsumption of fatty and sugary foods, we have seen policy-makers unwilling to take on the corporate interests who promote these foods.
Speaking to Food Navigator, Lobstein said the recommendations encourage governments to 'act collectively to tackle obesity and chronic disease.'
"We know that the multinational food industry can pick smaller countries off one at a time, undermining government policies by using their economic muscle. A global Convention helps strengthen government resolve to implement their public health duties, as we have seen with the Tobacco Convention."
“Governments need to take collective action and a framework convention offers them the chance to do this,” he warned.
Olivier De Schutter, the UN special rapporteur on the right to food, echoed calls for a new global agreement to regulate unhealthy diets: "Just as the world came together to regulate the risks of tobacco, a bold framework convention on adequate diets must now be agreed."
'Comparable to cigarettes'
The recommendations - found here, and due to be presented at the World Health Assembly in Geneva this week – call for measures including stricter controls on food marketing, improving the provision of nutrition information, requiring reformulation of unhealthy food products, raising standards for food provided in public institutions and using economic tools to influence consumption patterns.
“The scale of the impact of unhealthy food on consumer health is comparable to the impact of cigarettes,” commented Consumers International director general Amanda Long. “The food and beverage industry has dragged its feet on meaningful change and governments have felt unable or unwilling to act.”“The only answer remaining for the global community is a framework convention and we urge governments to seriously consider our recommendations for achieving that,” she commented.
“If they do not, we risk decades of obstruction from industry and a repeat of the catastrophic global health crisis caused by smoking.”
De Schutter added that the world must 'come together just as it did to regulate the risks of tobacco - warning that "a bold framework convention on adequate diets must now be agreed.”
"Unhealthy diets are now a greater threat to global health than tobacco."
Fixing the food system?
“Attempts to promote healthy diets will only work if the food systems underpinning them are put right,” explained De Schutter. “Governments have been focusing on increasing calorie availability, but they have often been indifferent to what kind of calories are on offer, at what price, to whom they are accessible, and how they are marketed.”
De Schutter also drew attention to the role of breastmilk in infant nutrition, welcoming the recent moves towards regulating the advertising of milk formula in Hong Kong, the Philippines and other countries.
“Governments should move forward with these measures, which are essential to ensure that people are protected from aggressive misinformation campaigns,” he said. “They are also crucial to implement the WHO International Code of Marketing of Breast-milk Substitutes and subsequent World Health Assembly recommendations, and are fully compatible with WTO rules.”
Obesity epidemic
Lobstein noted that the global prevalence of obesity - defined as a BMI greater or equal to 30 - doubled between 1980 and 2008, to 10% of all men worldwide, and 14% of all women.
“That’s 205 million men and 297 million women - more than half a billion obese people,” he said. “These figures show the scale of the problem to be addressed.”
Publication of the recommendations comes a decade after the publication of the WHO global strategy on diet and physical activity and health, which recognised the impact of unhealthy diet and lifestyle. Since then, however, global deaths attributable to obesity and overweight have risen from 2.6 million in 2005 to 3.4 million in 2010. |
Mortality after emergency treatment of colorectal cancer and associated risk factors-a nationwide cohort study.
The aim of this study was to investigate if postoperative mortality after acute surgical treatment of colorectal cancer has decreased in Denmark during this period and to investigate risk factors associated with early death. This is a nationwide and population-based cohort study. From the Danish Colorectal Cancer Group database and National Patient Registry, we collected data on all patients operated with bowel resection, diverting stoma only, or placement of an endoscopic stent from 2005 to 2015. Year of surgery was the main exposure variable and 90-day postoperative mortality the primary outcome. We included 6147 patients. The incidence of patients per year was stable during 2005-2015. The 90-day mortality decreased from 31% in 2005 to 24% in 2015 with a significant time trend (p < 0.0001). Other factors associated with postoperative mortality were increasing age, presence of comorbidity (measured as Charlson comorbidity index score ≥ 1), and stage IV disease. Insertion of self-expanding metallic stent was protective for 90-day postoperative mortality compared with other surgical procedures. Ninety-day postoperative mortality from acute colorectal surgery has improved in Denmark from 2005 to 2015. Nevertheless, almost one out of four patients undergoing acute surgery for colorectal cancer dies within 90 days. |
Q:
How to implement Efficient Test for a Point to Be in a Convex Polygon algorithm in C#?
Simple problem - find if a point is inside a convex Polygon. There is algorithm described yet due to be beeng an in Wolfram language and I ve got something wrong. This is what I have:
private static bool PointInside2D(Vector2 point, Vector2 lineStart, Vector2 lineEnd) {
var v1 = lineStart - point;
var edge = lineStart - lineEnd;
return !(edge.x * v1.y - edge.y * v1.x < 0);
}
private static bool PointInsideRect2D(Vector2 point, IList<Vector2> rect) {
var lastPoint = rect.Count - 1;
bool? lastResult = null;
for (var i = 0; i < lastPoint; ++i) {
if (lastResult == null) {
lastResult = PointInside2D(point, rect[i], rect[i + 1]);
}
else {
if (lastResult != PointInside2D(point, rect[i], rect[i + 1])) {
return false;
}
}
}
return lastResult == PointInside2D( point, rect[lastPoint], rect[0] );
}
and it does not work sadly... I looked at some refrence implementations here tried them seems also not to work..
test data I use is for convex:
[(262.8, 669.1); (1623.9, 718.2); (200.4, 895.4); (1817.8, 1540.8)]
and (288, 815) and (1078, 890) as test points.
Can any one explain what I've got wrong in that algorithm/its implementations?
A:
I believe your algorithm works correctly. It tests, if tested point lies on the same side (left or right) of all edges of polygon. But it requires, that all points in polygon declaration are sorted in clockwise or anti-clockwise order, that is not true for [(262.8, 669.1); (1623.9, 718.2); (200.4, 895.4); (1817.8, 1540.8)].
When I changed order of points in polygon, following program seem to return correct results:
public static void Main()
{
Vector2 p1 = new Vector2(288, 815);
Vector2 p2 = new Vector2(1078, 890);
//Please notice order of points is changed to clockwise
IList<Vector2> Polygon = new List<Vector2>(new Vector2[] { new Vector2(262.8f, 669.1f), new Vector2(200.4f, 895.4f), new Vector2(1817.8f, 1540.8f), new Vector2(1623.9f, 718.2f) });
bool p1Result = PointInsideRect2D(p1, Polygon);
bool p2Result = PointInsideRect2D(p2, Polygon);
}
private static bool PointInside2D(Vector2 point, Vector2 lineStart, Vector2 lineEnd)
{
var v1 = lineStart - point;
var edge = lineStart - lineEnd;
return !(edge.X * v1.Y - edge.Y * v1.X < 0);
}
private static bool PointInsideRect2D(Vector2 point, IList<Vector2> rect)
{
var lastPoint = rect.Count - 1;
bool? lastResult = null;
for (var i = 0; i < lastPoint; ++i)
{
if (lastResult == null)
{
lastResult = PointInside2D(point, rect[i], rect[i + 1]);
}
else
{
if (lastResult != PointInside2D(point, rect[i], rect[i + 1]))
{
return false;
}
}
}
return lastResult == PointInside2D(point, rect[lastPoint], rect[0]);
}
|
One has hatched !!!!!!!!
He is so beutiful and he got out so fast its so cute I've never seen such a cute chick ever I never thought he would be so cute But no one else is haching I want to pet him so badley But I have to wait tommorow
Well, Day 22 and out of 23 eggs, some were from 12/28, 12/29 and even one that hung out in the refrig for a day before we set them in our homemade bator on Jan 1st we had one unfertilized, one blood ring, 2 that stopped forming after a couple of days and now we have 18 hatched babies and one egg that is quite heavy, but not pipping.
We transferred our peeps after a few would get dry and fluffy, sometimes after 6 hours to give the rest of the eggs a chance to hatch and the babies to relax in the bator without getting stepped on.
Our humidity fluctuated from 80% to 10 % during our incubation period. We tried to keep it close to 45-60%, but sometimes it dried out really quick. On day 18 we taped the bator shut and jacked up the humidity to 65-70%.
We made our bator out of a very old plastic cooler. We cut a big hole in the top and duct taped plexiglass over the opening so we could watch. hooked up a PC fan on one wall, a light bulb on a perpendicular wall with a single pole thermostat to regulate the heat. Our heat got up to 117 degrees at one point with the eggs in the bator, so we opened it up and cut a metal roasting pan in half and made a heat shield that kept the eggs cooler and the thermostat shut off the light sooner. Our heat fluctuated between 95 and 103 registered on a dry thermometer. We also put a false wire bottom in the cooler so we could flood it with water for humidity (just enough water to cover the bottom). We drilled 6 little holes on two sides for ventillation and also left the cooler drain opening open.
Prayers of thanksgiving for God allowing us to partake in this miracle and whala...18 babies.
Just wanted to say thank you to everyone who writes such wonderful information on this site. It was very reassuring and helpful. This was my daughters 4th grade science project. She is actually "littlepeep"! |
"It is a feeding frenzy up there when it comes to land." "Think you might mean Dawson City, here, boss." "It nothing personal." "To having nothing in our pockets." "But a head full of hope." "Ep?" "Ep?" "!" "Mortician pulled this out of him." ".45-70 sharps." "A gun made for killing." "I can't have infectious disease on my property." "Well, then I'll take them to my church." "I might not have to kill him myself." "God might do it for me." "You're different, Haskell." "He's making offers, talking about putting up saloons." "Find out who he's talking to." "Tell them I'll pay more than the Count." "I'm going to let you buy my out." "All I care about is the Fairview Hotel." "I suggest you sign that." "Otherwise, I might change my mind." " ____ - ____" "____" "I will kill." "Have you killed before?" "Yes." "What if, for a hundred generations, you lived with something, knew it like your brother, loved it as if it were your only child, then someone came and decided they'd take it from you?" "What if that someone was a plague that had come to your lands and had raped her hills and streams?" "Would you let them do this?" "I got a feeling this little bag here more than suffice." "Would you let them turn this eternal thing that is the earth into things that cannot last?" "This here champagne's all the way from France!" "The land dies because of this." "And they will die, too, if the land dies." "We will all die." "Would you let someone do this... kill not only the land and themselves but you, as well?" "Or would you fight?" "Oh, hell." "Again?" "Insides is in rebellion." "You didn't eat nothing." "The story I heard, a hungry man craps out his heart." " Hey, Bill?" " Yeah?" "What you gonna do with all your riches you get out of here?" "Buy a 100 acres of prime, arable farmland in Vermont." "You ought to come give it a visit." "Ugh." "You concentrating in there?" "I'm gonna by me an orange." "An orange?" "Work camp in Dakota." "A fella give me one." "It was like eating a color in juice form." "A fruit right out of Eden itself." "Inside, it's already sectioned up." "A fruit divided into bites for you... it's like it grew for man to eat it." "Almost makes you think of the creator." "Feeling better?" "Not really." "I'm just hungry, is all." "Not a speck of food in all of Dawson... that's edible, anyway." "The meat in town will kill you." "All this goddamn gold and we can't get a good meal." "You watch over claim 152." "I'll lessen the world of an elk." "Claim 152 shall be watched over." "You're gonna need some help bringing back the carcass." "I know a spot where the elk drink not 10 miles from here." "We're burning daylight." "Let's get to it." "The elk... they break up the ice with their hooves, look around for wolves, but they don't expect a bullet from afar." "Oh, we know it's coming our whole lives but it's always a surprise." "Bullet from afar." "You seen a lot of death, huh?" "That's what soldiering will do for you." "Amazes me you can still shoot without a thumb." "You just learn anew, is all." "Where were you when it happened?" "Oh, a skirmish in Buenos Aires." "Me being a man and the enemy being men, too, in the midst of battle, it's kind of like telling one elk from another." "Army calls men in my situation an accidental hostile." "Shot by your own, huh?" "Yeah." "Well, I was trained as a sharpshooter." "I was stationed on a hill about a 100 yards from the battle." "I got hit in the back, shoulder." "Lost way more blood on those two, but the damn thumb..." "You know, the prehensile thumb is what allowed early men to use tools." "It's what distinguishes man from ape." "Army turned me into an ape." "Would you mind cocking this for me?" "I can load and shoot, but..." "I have difficulty with the barrel." "Your speciality, isn't it?" "Taking down a target from afar." "Kind of like how your friend went down, is what you're saying." "You know, the one that took down your friend... it would have had a louder report." "It meant it came from a bigger-bore gun than this peashooter." "And you know that how?" "It was in the mine next to yours, don't forget." "I may not be worth much, but I do know rifles, friend." "How loud it was, must have a .45, .50 caliber." "You do know rifles." "It was a .45." "Not a .30 caliber like this one." "See them peaks there?" "Well, that valley between there is protected from the wind." "There's a shelter there." "It's made of logs and bark." "Abandoned by the tlingit." "Place like that, a man could survive for years." "Just living and hunting." "No need for gold." "Just the essentials." "For your hands are defiled in blood, your fingers with iniquity." "Your lips have spoken lies." "Your tongue hath muttered perverseness." " No defiler has eternal life." " Father." "I'm thinking prayer is not gonna help much right now." "Not like a good nap will." "I think you'd better come back later, Bill." "He's not well." "Sabine, uh... maybe a bit of whiskey hasten that nap you were talking about." "Think I might need some myself." "Pretty sure I know who killed my friend." "It was Goodman." "Wasn't it?" "A murderer walks amongst us." "That's not God's plan." "What makes you think he's got a plan?" "Hmm?" "You don't have to say it." "You don't have to break the bond." "Just nod." "God ain't watching you." "I promise he's not." "We're all one thing, you know." "You kill another, you kill yourself... become a ghost." "No small talk?" "I'd rather just carry your bag to wherever it needs to go." "I liked it better when you used to smile." "The air smells nice." "Beautiful." "I heard you visited me while I was sick." "I have a memory of our... hands touching." "Did I do the touching or did you?" "Me?" "I just can't help but play my cards around you, for some reason." "Listen..." "There's some things I got to do." "Don't you give me the "soldier going off to war" speech." "I seen that look as soon as you walked in... the killer look." "The Yukon got you." "Didn't it, Haskell?" "Ah, God damn it." "God damn it." "There ain't nothing noble in a fight." "Only in survival." "You go." "You get out while you can." "I don't want to see you again, Bill." "Not with that look on your face." "No need." "I just came to pay my respects." "You're dying, right?" "I fail to see what that has to do with anything." "Oh." "Typhus is a bitch, isn't it?" "You know, this is just a wooden box." "You shouldn't have let me kill you over it." "You are genuinely insane, aren't you?" "Probably." "You remember over by the cemetery, and you told me that I was a dead man and not just in life?" "And that you, you said... you were saved?" "You know, you genuinely believed that your God was gonna protect you from the typhus." "So I figured I was gonna win both ways." "Either you would somehow impossibly survive and then I'd have proof that your God exists or..." "You'd end up just as you are now." "I killed you." "I didn't even have to fire a shot." "So you're convinced that you've brought this down on me." "Oh, yeah." "Oh, yeah." "So, your God should just strike me down right here." "Right?" "A bolt of lightning from the heavens." "No?" "Nothing." "This is all there is, Father." "There's only this life." "Your hands are shaking, dentist." "Is it fear or distaste?" "Might I ask where you practiced?" "I don't practice." "I just do." "My Father was a practitioner." "I learned from watching him." "I hope you took notes." "I'm an important man, you know." "I own 12 mines, all being worked by their former owners." "You've had good fortune." "Fortune's got nothing to do with it." "Fortune's a bitch." "Trick is to look for present-day 'tunities and grab those 'tunities when they come." "And I just grabbed one." "We're cleaning up Dawson, Soapy." "That means we're cleaning you up." "How's that, now?" "I'm just a law-abiding citizen, a businessman just looking for 'tunities." "'Tunities like buying up real claims and selling non-existent claims." ""Lawson City."" "Could kill that printer." "I'm trying to find out where those claims are going." "The good news is, you're gonna tell me." "Get up." "Add armed resistance to the list." "I'm a bigger man than you, Superintendent." "You're gonna see that." "The world works in mysterious ways." "I am a bigger man than you." " Howdy." " New blankets?" "Too much smoke!" "Why haven't the men been working?" "We've got money to pay them." "It's not about the money." "It's about fear." "Laborers can't work on the hotel because the Count's men are leaning on them." "God damn it." "It's bad enough for a woman to be alone at night." "Even worse if she's carrying money." "You could kill me right now." "But the way I look at it, you don't need a one-off, living hand-to-mouth, shivering in the night for another man's agenda." "Which is exactly what you're doing for the Count." "I can offer you a steady cash flow." "Regular employment." "That right there will cover you for three weeks, which is about three weeks more than the Count's offering." "There will be more to come." "You don't just switch jobs with a man like the Count." "You're the one with the gun." "You can do whatever you want." "With him, he'll just get more men." "I get the feeling there's an idea percolating somewhere in there." "We terminate the man... terminate the relationship." "I want you to work for me." "I do not want you to kill him." "Well... that's what it's gonna take." "I won't pay for murder." "I won't do that." "Yukon gets to all of us sooner or later, lady." "What do you say?" "Your prisoners have been sitting in their cells, leading the life of Riley, eating, drinking at our expense." "Why haven't they been hanged?" "We're waiting on the weather." "The cold snap such as this, the ropes have been known to burst." "You have two days to hang them, cold snap or no." "Oh, and incidentally, you're to release Soapy Smith, as well." "Soapy Smith is a documented con man." "These mining camps you see around you?" "They're just scraping at the gold." "In a few months, real companies will be here to mine the area hydraulically." "And that has what to do with Mr. Smith?" "Nothing." "It has to do with you," "Your role here." "You and Mr. Smith are both gnats." "But necessary gnats." "In some ways, Mr. Smith is more necessary than you." "He's the middle man, isn't he?" "Gathering up claims on the cheap before the big companies come." "You've done your Bible studies, haven't you?" "The good book has a great word that perfectly describes your position." ""Abide."" "Superintendent?" "Abide." "Mm." "I brought some food for your prisoners." "I thought they might be hungry." "They're not really going to be hanged, are they?" "I have an order." "The problem with whores is we just want bedrock... something certain, something good, to get us out of the mess that we've made." "I thought you, on that day, riding in with that spotless red jacket..." "Anyway, I know you'll do the right thing." "Wait." "The smells in the church caught my attention." "I..." "I thought a lady... a woman..." "It's rosewater." "Ahh!" "Good on you." "Butter knife." "They gave me a butter knife." "Eating like that in front of your men might come across as callous." "Is that you talking or them, Sundown?" "We're waiting on our wages, sir." "Told there are others who will pay if you don't." "Lend us your knife, friend." "That won't do the trick." "Dumb as a doorknob, mate." "Tell him, Sundown." "Tell him we ain't playing." "Tell him we're cold." "We're hungry." "Yeah, tell him, Sundown, tell him." "Um..." "If you don't, I will." "You put some money in our hands right now or we're gonna have a problem." "We're all hungry." "We're all cold." "This is something that only money can fix, but we're surrounded by it." "The mines." "Millions of years ago, the good lord saw fit to put all that gold down there." "And now, men are just yanking it up, randomly, out of the ground." "Men like Bill Haskell." "If you'll indulge me," "I say we just go and pay him and his mine a little visit." "After that, I can assure you, we'll all be eating sirloin." "Here." "Here, Sundown." "If anything ever happens to me, my half of the claim is yours." "That's a right strange thing to say." "And whatever gold I pulled out goes to my mother." "Address is in there in some of the letters I wrote." "Something you want to talk about?" "You see, the older a man gets, the more knowledge he accumulates that dirties his view of the world... a bunch of stuff you don't need in your head that takes away the innocence." "No, Meek." "There's nothing I want to talk to you about." "You're good just as you are." "Move away from the entrance." "I'm unarmed." "So was Epstein." "You were after my claim from the beginning." "Was it worth it?" "Huh?" "Was it worth it?" "!" "You don't understand." "What?" "Suffering." "Goodman!" "Goodman!" "Where the hell is he?" "!" "Where the hell is he?" "!" "He's got nowhere to run." "Winter will eat him up alive." "I need your dogs, Gorna!" "You can't be stupid enough to think you're actually going out in this weather." "Only way I'm gonna find him." "Is it difficult..." "To get blood out?" "You can get the blood out of most things." "Except silk..." "I don't think..." "A man come at me." "They do that, don't they?" "Men." "They come at you." "Haskell's gone off to the wilderness." "What, in the dark?" "By himself, too." "Carrot." "Carrot." "You're catching on." "Bar-chine." "Them "bars."" "Feed-o." ""Freedom."" "I..." "Give." "Nem." "Name." "Feed-o." "You'll name your child "freedom."" "I hope you have many sons." "What the hell do you think you're doing?" "The tlingit... we have to release them." "You must be drunk." "They're to be hanged tomorrow." "Strip me of my uniform if you want." "I will not a party to murder." "Son of a... hey!" "Hey!" "The ones that are strong among them, the ones that are wise, are rendered weak by power." "They think they can make change with words." "♪ Hanging from the gallows po-o-o-le ♪" "But words, for them, are only meant to manipulate, beguile, entertain." "♪ from the gallows po-o-o-le ♪" "They distract themselves from their sins, but we see them." "We see what they've done." "Like wolves, we'll pick away at them around the edges... take the weak, reduce their number." "Tonight, there will be no words, only blood." "♪ hanging from the gallows po-o-o-o-o-o-le ♪" "♪ hanging from the gallows po-o-o-o-o-o-le ♪" "You made the right decision, sir." "Get some food in your belly for you and your beloved." "And, you can't eat gold, now, can you?" "Especially if you don't got none." "Yep." "Hey!" "Get a whiskey for me and my friend here." "I'm buying." "♪ Fare thee well to loved ones ♪" "♪ farewell to... ♪" "Ahh!" "Well, I best be moving along." "I got other business to attend to." "I hope you fare better than me." "I had nothing but bad fortune with that claim." "Fortune's got nothing to do with it." "Fortune's a bitch." "Well, better luck next time." "Watch out your piss doesn't freeze in midair." "It can climb back inside you before you know it." " Shut up." " It'll kill you." "Yeah." "What the hell?" "!" "We got shot!" "Hand me my rifle!" "Wait up, God damn it!" "They're coming for the bracers!" "Hike!" "Hike!" "Hike!" "Hike!" "Keep on!" "Go ahead!" "Go ahead!" "Good dogs!" "Whoa-a-a-a-a!" "Whoa!" "Goodman!" "Goodman!" "Come out and meet me man-to-man!" "Where's the law?" "Went out... all of them." "Hunt tlingit." "Count and his men, too." "Raced right out of here." "Is Meredith suddenly helping out the law?" "No, they ain't." "What are you talking about?" "Count and his men... they weren't going after natives." "They was going after Bill Haskell." "Are you gonna shoot your way out?" "Take his dogs." "Get his gun." "I could shoot you." "Kill him." "Shoot him yourself." "If only you had a gun, huh?" " I feel bad for you, mate." " Yeah, I wouldn't." "Let's go!" "Get the guns on it!" "Let's go!" "Come on!" "Well, this is a bit of a predicament." "You come near me, I'll kill you." "Hike!" "Hike!" "A thousand to one, we make it to Dawson." "I say we work together." "Ow!" "Or we could do that." "We do that, if you want..." "we can turn this into a fight." "Killing you'd take too much energy." "Oh." "You got any matches?" "No?" "You got gloves, though, don't you?" "Eh?" " You gonna kill me for those?" " Maybe." "Maybe not." "You want to give me one?" "Correct me if I'm wrong... all right, I might be mistaken... but..." "Dawson's that way, right?" "Forest will cover us from the wind." "Yeah, but it will add 10 more miles." "I don't want to be out in this cold any longer than I have to." "You know what I mean?" "You stay out here in this wind when you shortcut it, you'll freeze fast." "There's cold, and then there's cold." "Really suggest you come with me." "You're just trying to keep me close, aren't you?" "So I don't get to that claim before you." "You go that way, I don't got to worry about you." "Well, then, you should be encouraging me, shouldn't you?" "I don't like seeing men die." "Doesn't matter who they are." "You know, a few extra right turns and I might have been you." "Kiss Belinda for me." "There he is!" "Hyah!" "Don't freeze to death if you can help it." "The worst part is how time slows." "Pain stretches out like the body's being crushed." "You pray for oblivion, for the numbness of death." "But mostly, it's the thoughts, the wrong turns taken." "What is it to be rich but without hope?" "To lose a friend and never know justice?" "Have we all come here for the wrong reasons?" "Is there a way out?" "If he doesn't stop, bring him down." "Hey!" "Hyah!" "Hyah!" "Hyah!" "Bring him down!" "Get him!" "Hyah!" "Ah!" "Whoa!" "Hey!" "He-e-y!" "Stay down!" "Where is he?" "You won't get any medical help unless you talk." "You understand?" "He was headed for him." "Had to be." "There's a valley that way." "Out of the wind with trees for shelter and a creek for water." "Be the sort of place a man of the land would hide." "Let's go!" "Hey!" "He-e-e-e-y!" "He-e-e-e-y!" "Hike!" "Hike!" "Hike!" "Hike!" "Hike!" "Hike!" "Hey, there!" "Whoa!" "Go!" "Hike!" "Go!" "Go!" "Hike!" "Hike!" "Hike!" "Go!" "Hike!" "Mm." "Oh, hell." "Better than confession, shitting." "No offense, lord." "Purges a man of all that's ungodly and untoward." "It's that one right there." "Yeah." "There it is." "Come on, get in there." "There's gold here." "If you call a couple of ounces "gold."" "152's supposed to be a whale Yielding pounds, not ounces what the hell are you guys doing in here?" "Where's the rest?" "It ain't yours to take." "That's where you're wrong, friend." "Whoa!" "Take him upstairs." "Mary, hot water..." "I want every goddamn drop in Dawson." "Yes, ma'am." "Sir!" "Keep on!" "Mary, that's nowhere near enough." "I know." "It takes time to heat." "There is no time!" "Coffee service from the kitchen, tea... anything, Mary, just go!" "Go." "Go!" "Now you stay with me." "Grab everything." "Haskell." "Don't just stand there!" "Open your eyes!" "Open your eyes." "More, goddamn it!" "He's dying." "More!" "Haskell." "Haskell!" "Go!" "Whoa!" "Forget the rest!" "Only him!" "Hyah!" "Giddap!" "Come on!" "Giddap!" "Hyah!" "Sure... thing." "Sure thing what?" "To be in the business," "I'll probably need to shove his ass out of the fire." "Thank you." "You don't value your life enough, throwing it away for revenge." "You got too much good in you." "Wonder." "Things in me now aren't the things I came up with." "They're sharp-edged..." "Burning... like they're trying to eat the meat off my bones from the inside." "I want to keep you here in this very room till spring." "Buy you the first ticket out... so you don't become like the rest of them." "Let's do this one last time." "Everyone knows this claim's yielded, and I know that that gold hasn't gone into town." "I got people in places who knows who's weighing what where, who's selling what where." "And your gold ain't sold." "Where is it?" "I'm gonna tell you again, there ain't no gold in that bench." "There ain't no gold in this camp." "The only thing you're gonna pull out of this camp is shit, and you're welcome to that." "We ain't gaming no more, friend." "Where... is... it?" "You may be stupid, but you're smart enough to know gold ain't worth dying for." "Well, by that logic, it ain't worth killing for, either, now, is it?" "Enter." "Thank you." "The hell's going on?" "Something you got no part of." "Go on." "You got that killing look." "Maybe I do, maybe I don't." "Maybe I'm just trying to scare someone so something doesn't happen that don't need to." "Goodman." " You go on, Bill." " Son of a bitch came back." "Couldn't hack the wilderness." "I'm the one who's gonna handle this, you understand?" "This is my fi..." "Well, go ahead, shoot." "I shot your son-of-a-bitch friend, all right?" "Why?" "Why do you think?" "I got there first." "I was on 152 before it was 152." "I stood right on that ground." "But you didn't stake it." "That's 'cause I didn't see what you saw." "There's no reason in the world it should have been you." "So, a man just... gets tired of being dealt crappy cards by the universe, you know?" "So, come on, son." "You get on with it." "I ain't gonna do any killing today." "Yeah, you are." "Somebody's gonna." "You can sure bet somebody's gonna." "Don't." "He's bullshitting." "He's not." "Shut up, Haskell." "You don't say nothing." "It was my fight." "And you thought it would bring your friend back." "Did it?" "The day's gonna come where you're gonna get out of here, carrying your gold and all the rest." "What I just did is make sure that you don't leave with the weight of killing a man, as well." "And yet, you're willing to carry it." "I ain't getting into heaven, Haskell." "I burned those bridges long ago." "Forgive me for my sins, Father." "You're forgiven." "Don't you want to hear them first?" "From you, swift water, no." "I suffer from... from greed and avarice and, uh..." "They're the same thing." "You're forgiven." "I spend it on booze and on women." "You're forgiven." "You're dying, ain't you?" "Near to it." "Hey, you want in on something?" "Dawson City, it... it's done." "Go home." "Now, see, that's what I'm getting at, see." "Now, what if I was to tell you that I was privy to a new rush?" "An even hotter one... nome." "Well, just try saying a few hail marys on the way up." "Well, thank you, Father." "I actually feel better." "Well, then, maybe my trip up here wasn't a complete waste of time." "What?" "Nothing." "Father, I hope you didn't just say what I think you just said." "'Cause if you ain't got no hope, no one does." "Thank you, Father." "Let's go!" "Crap." "Could've used you not two minutes ago." "Whatcha talking about, Step?" "Claim 152, right?" "Gave me a take it or leave it at 50 cents on the dollar." "I didn't know, Haskell!" "Hm." "Meeker!" "Meeker?" "!" "I'm done with the klondike." "I want to go a place where there's oranges." "Oranges all year round." "Men don't kill each other for oranges." "And they're a hell of a lot more beautiful than gold." "Sundown did this." "He turned over the whole claim." "And they got the gold." "All of it." "Almost the whole claim." "Stroke of luck." "I wouldn't have thought of it if I hadn't been purging my gut at the time." "God bless you, Joe Meeker." "Oh!" "Are you gonna get it or am I?" "I'd say that qualifies us as being rich men, wouldn't you?" "Only if you get out with it." "Ain't no boat coming till the river thaws." "Don't know if I can wait four months to get out of this hole." "Four months of fighting off sons of bitches like Sundown." "Fighting for wood." "Fighting off mother nature." "I'm tired of fighting, Bill." "I just want to go." "Then let's do it." "What, now?" "Now." " Overland?" " Overland." "Huh." "That's suicide." "Only if it kills you." "I knew I liked you, Bill." "There just ain't no "no" in you." "Might be the finest compliment anyone's ever paid me." "I'm headed out, brother." "I wish I was taking you with me." "I guess I am, in a way." "We were richer, then, weren't we?" "When we had nothing in our pockets, just a head full of hope." "That's what I'll carry... what we were in that moment in time." "Worth more than anything any man could ever pull out of the ground." "You watch over me." "I'm going home." "Bring him." "If they're hanging him for the death of my friend, they got the wrong guy." "Oh, they got the right guy." "He murdered a mountie." "Justice will be served." "Tlingit might disagree." "You're a worldly man, Father, but sometimes justice doesn't just need to be justice." "Sometimes justice needs to be seen." "Pity you, killing for another man's agenda." "No." "You put two of my men in the ground." "And I lost men, as well." "Who wins?" "Perhaps they've killed us both." "I'm headed out." "I heard." "I heard you bought up everything at the dry-goods store in preparation." "It turns out gold has some uses, after all." "Come with me." "Is that some sort of proposal, Mr. Haskell?" "It's halfway to it." "Younger version of me jumped into your arms... but I come too far, Bill." "My whole life, trying to get a piece of something." "Well, I got it." "I got it here." "Everything I got invested in the Fairview Hotel..." "Sell it." "Hell, I'll buy it from you." "That makes exactly no sense, Haskell." "Who gives a God damn about sense?" "Sense never got anyone anywhere." "There's sense in the world." "If I go back to the states, I'm a..." "I'm a midwife... or a laundry girl." "I can't even vote." "There's no place in the world for a woman down there." "There's a place with me." "No, there's not, Bill." "Not for me." "You'll make it out." "You know how I know?" "'Cause you're too damn good for the Yukon, Bill Haskell." "You gonna be all right?" "Well, physically, no." "But I still have high hopes for the spirit." "Thank you." "Take care of him." "You ready?" "No." "But yep." "Hike!" "Hike!" "Hike!" "Hike!" "Hike!" "Hike!" "Father." "I apologize, but I don't have the energy for a sermon." "Well, that's okay." "What's going on?" "We're fitting you for a coffin." "I'm not completely dead yet, in case you haven't noticed." "You just sit back, relax." "Understand?" "Stay, GQ!" "Good dog!" "Hike!" "Good dogs." "The pessimist in me's thinking, "we're gonna die out here."" "What's the optimist say?" ""At least there ain't traffic."" "Ground's too cold to dig." "Bodies won't go in till spring." "But the ice will keep them cold till then." "Mr. Capson." "Not to be too crass, but that picture just made you a lot of money." "You'll no longer be" "Head Superintendent of last chance outpost... you'll be commissioner of a far larger department." "Development's coming now." "Bigger population, more tax revenue to pay dutiful men like you." "Not me." "What?" "The state can't pay a man if he's no longer in their employ." "You're... what?" "You're not..." "Tendering my resignation." "You've done the hard stuff, Superintendent." "You're quitting at exactly the wrong time." "I can't just find another lawman." "You and I, we have a shorthand." "Well, that's the problem... that I could have a shorthand with a man like you at all." "Don't worry, it's not worth anything." "It's just tin." "Easy!" "Easy!" "Whoa!" "Let's see what we've got." "River, I think." "Go easy with it." "What?" "Just thinking." "Thinking what?" "That you hid the gold in shit." "I did, indeed hide gold in shit." "How many times in the history of this great human race do you reckon that's happened?" "Precisely never." "Whoa!" "Ah!" "Every time I start hating mother nature, she goes and gives me something like this." "I know nothing, Haskell!" "I know nothing!" "Meek!" "Aah!" "Aaah!" "Whoever it is that puts us through this struggle... whether it's God, the land ...Why do you do it to us?" "What good comes from such pain?" "From such loss and death?" "Coffin's ready, Father." "Father, come on now." "Come on, Father." "One, two, and..." "Here we go." "Good man." "Bit premature, don't you think?" "See, now, that's problem with funerals, Father... always happen way too late." "Funeral's the biggest moment of a man's life!" "Everybody weeping, hollering, saying what a good soul he was, only he's never around to see it." "You think this is necessary?" "Just lay down, will you?" "Let him give something back to you, okay?" "♪ Joshua fit the battle of Jericho, Jericho, Jericho ♪" "♪ Joshua fit the battle of Jericho ♪" "♪ the walls came tumblin' down ♪" "Maybe it's dying's just another thing." "Another season passing through while the world goes on." "Winter tries its best to kill us, and even if you somehow make it through and spring comes, the struggle just starts new." "____" "You got any citrus?" "There gold?" "Everywhere." "You just got to know where to look for it." "The question is, does the struggle and the hardship make us better?" "Give us strength?" "The right priorities?" "Or does it leave us scarred?" "Is it true, Mr. London, you lived all this?" "They're saying you're the new voice of American exceptionalism." "How much of this is drawn from what actually happened?" "And from those scars, from those dead landscapes within, can good things once again grow?" "We're busted." "They're all going to Nome, now." "Bypassing Dawson completely." "Never know." "Tomorrow might have something in it today don't." "In the end, the answer's "yes,"" "from dead lands, new things can grow... things like wisdom and the simplicity of the world, from a man's needs." "Because the truth is, you don't need anything... except maybe hope." "____" "____" "____" "____" "____" "____" "____" "____" "____" "____" "____" |
Q:
cmake working for root not for other user
I have a dummy compilation running in a buildbot slave.
When running with buildbot user I get:
-- The C compiler identification is unknown
-- The CXX compiler identification is unknown
-- Check for working C compiler: /usr/bin/gcc
-- Check for working C compiler: /usr/bin/gcc -- broken
CMake Error at /usr/share/cmake-2.8/Modules/CMakeTestCCompiler.cmake:52 (MESSAGE):
The C compiler "/usr/bin/gcc" is not able to compile a simple test program.
...
cc1: error: /usr/local/include/x86_64-linux-gnu: Permission denied
/usr/local/include/x86_64-linux-gnu does not exist but If I manually run it as su I get:
-- The C compiler identification is GNU
-- The CXX compiler identification is GNU
-- Check for working C compiler: /usr/bin/gcc
-- Check for working C compiler: /usr/bin/gcc -- works
-- Detecting C compiler ABI info
-- Detecting C compiler ABI info - done
-- Check for working CXX compiler: /usr/bin/c++
-- Check for working CXX compiler: /usr/bin/c++ -- works
-- Detecting CXX compiler ABI info
-- Detecting CXX compiler ABI info - done
and so on, I can later make and run generated executable
I'm assuming is not related to project file permissions because all files belong to buildbot user
Command running is just cmake .
OS is ubuntu 12.04.1 LTS server edition
Thanks
A:
When CMake checks if gcc works, it creates a temporary file and tries to compile it. In my experience this was always done in the local CMakeFiles files directory. It looks like for some reason it is trying to do this in /usr/local/include (It at least is trying to do something in that folder, hence the cc1: error: /usr/local/include/x86_64-linux-gnu: Permission denied).
The issue is that as you indicated only root has access to read or write in that folder. This seems a bit odd to me, because other should at least be allowed to read there. Anyway, your buildbot does not have access there, and so the configuration fails.
You have three options.
Dig into what CMake is doing when it tries to access this file, and change it to do what it is doing in a location you own.
Change the permissions of /usr/local/include to so that everyone can write to /usr/local/include
Create a new group that buildbot belongs to, and change the group ownership of /usr/local/include to that. Make sure you change permissions to 770.
Personally, I would try to do the first, because I would prefer CMake do do things local, not in the bowels of my system. There are some log files in the CMakeFiles directory you can poke around in.
|
Hepatic heme and drug metabolism in rats with chronic mountain sickness.
Rats chronically exposed to hypobaric conditions develop pulmonary hypertension, right heart failure, hemoglobinemia, and in preliminary studies were recently found to have increased hepatic cytochrome P-450 content and activity of heme oxygenase, the rate-limiting enzyme for heme breakdown. To further delineate effects of chronic hypoxic, hypobaric exposure, on hepatic physiology and biochemistry, we have studied heme and drug metabolism in male Sprague-Dawley rats exposed to hypoxic conditions for 4-5 wk. Hypoxia, produced by exposure of rats to room air under hypobaric conditions (approximately 380 Torr), caused marked polycythemia [hematocrit (Hct) 70% vs. control Hct 43%], plasma hemoglobinemia, depletion of plasma haptoglobin, and decreased hemopexin concentrations. It also led to significant (20-30%) increases in concentrations of total hepatic heme and microsomal cytochrome P-450 and increased activities of heme oxygenase. In contrast, activity of 5-aminolevulinate synthase, the rate-limiting enzyme of hepatic heme synthesis, was significantly decreased in hypoxic rats and was not as inducible as in control normoxic rats. Hypoxia did not alter the rest of the heme synthetic pathway, as shown by a normal rate of conversion of 5-aminolevulinate to heme. Hypoxic exposure had no effect on the concentration of hepatic cytochrome-b5 but decreased activity of NADPH-cytochrome c reductase. Rates of metabolism of aminopyrine, benzphetamine, ethoxyresorufin, and warfarin were similar in hepatic microsomes obtained from hypoxic and normoxic rats. Thus the oxygen-requiring processes of hepatic heme and drug metabolism were well maintained despite chronic profound hypoxia sufficient to cause cardiopulmonary complications. |
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package aria.apache.commons.net.util;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method;
import javax.net.ssl.SSLSocket;
/**
* General utilities for SSLSocket.
*
* @since 3.4
*/
public class SSLSocketUtils {
private SSLSocketUtils() {
// Not instantiable
}
/**
* Enable the HTTPS endpoint identification algorithm on an SSLSocket.
*
* @param socket the SSL socket
* @return {@code true} on success (this is only supported on Java 1.7+)
*/
public static boolean enableEndpointNameVerification(SSLSocket socket) {
try {
Class<?> cls = Class.forName("javax.net.ssl.SSLParameters");
Method setEndpointIdentificationAlgorithm =
cls.getDeclaredMethod("setEndpointIdentificationAlgorithm", String.class);
Method getSSLParameters = SSLSocket.class.getDeclaredMethod("getSSLParameters");
Method setSSLParameters = SSLSocket.class.getDeclaredMethod("setSSLParameters", cls);
if (setEndpointIdentificationAlgorithm != null
&& getSSLParameters != null
&& setSSLParameters != null) {
Object sslParams = getSSLParameters.invoke(socket);
if (sslParams != null) {
setEndpointIdentificationAlgorithm.invoke(sslParams, "HTTPS");
setSSLParameters.invoke(socket, sslParams);
return true;
}
}
} catch (SecurityException e) { // Ignored
} catch (ClassNotFoundException e) { // Ignored
} catch (NoSuchMethodException e) { // Ignored
} catch (IllegalArgumentException e) { // Ignored
} catch (IllegalAccessException e) { // Ignored
} catch (InvocationTargetException e) { // Ignored
}
return false;
}
}
|
Welcome to the Brain Injury Law Center
We are the premiere law firm in the United States dedicated to representing brain injury victims and their families.
I consider myself more than just an attorney to my clients. I truly sympathize with the trauma they have gone through, and want them to have the best outcome possible.
- Stephen M. Smith, Esq.
Congratulations to our founder of the Brain Injury Law Center and the managing partner of the 70-year-old Smith Law Center for your induction into the Virginia Lawyers Hall of Fame. Thank you for pioneering the art of proving the “invisible injury” and mastering demonstrative evidence.
The Silent Injury
Brain injuries are devastating, life-changing and often not obvious to the casual observer. That is why traumatic brain injuries are sometimes described as “invisible injuries” and a “silent epidemic.”
If you or a loved one has suffered a brain injury, you understand the devastating emotional and financial impact it can have on a family. In some cases, a recovery takes a lifetime not only for the person injured, but for those who love them.
We founded the Brain Injury Law Center to help people like you. We are brain injury lawyers dedicated to representing victims, survivors and their families. We build strong cases seeking compensation for brain injury sufferers when a person, company or any other entity can be held liable for what has happened. We can’t undo an injury, but time and time again we have been successful in obtaining large settlements and verdicts to ease the financial burden our clients face.
Our founder and director, Stephen M. Smith, is an internationally recognized expert in traumatic brain injury litigation, with nearly four decades of experience with brain injury cases. He handles lawsuits across the U.S. and the world and is often sought out by other attorneys for assistance.
Contact us today by calling (877) 537-4340 or filling out the form on this page to speak with an attorney about how to seek compensation for a brain injury. All consultations are free and without obligation.
Silent No More
A cloud of silence has hung above the subject of brain injuries for far too long.
For generations, they were suffered on the battlefield, the gridiron or the Little League diamond. They didn’t always look like much. They happened on the playground, in the backyard or at the workplace. And we said nothing.
The athlete returned to the field. The employee got back to work. And the soldier, bearing wounds that no one could see, returned home from the battlefield with an injury that went untreated.
We now know that seemingly minor brain trauma can have major implications in the long run. And people have begun to talk.
In our first eBook, Breaking the Silence, we speak with brain injury survivors about the often astonishing paths their lives have taken since their injury. They aren’t keeping quiet about their recovery. And they shouldn’t.
It’s time for us to listen to what they have to say. It’s time to break the silence. Thanks to brave survivors like these, the struggles of brain injury victims remain in the shadows no longer.
And neither do their triumphs.
Trauma May Seem Minor
The brain is just as delicate as it is vital. Even something that initially seems like a minor injury can prove life-changing if certain portions of the brain are damaged.
This can happen in an automobile accident, while playing sports, after slipping and falling or in any number of other scenarios. Certain medical ailments may cause a critical loss of bloodflow to the brain, resulting in permanent damage.
Symptoms of a traumatic brain injury may include:
Headache
Nausea
Confusion or other cognitive problems
Change in personality
Depression
Irritability
Severe vision problems
Other emotional and behavioral problems
Reach Out
If you or a loved one has suffered a serious brain injury, we understand that you never wanted to be in this situation. However, just as you need medical experts to get the right care, you may need an attorney who understands the laws surrounding brain injuries to aid in your recovery as well. We lecture on this subject nationwide.
If there is potential compensation available that could ease your financial burden and aid in your recovery, you need to seek it. Contact the Brain Injury Law Center today at (877) 537-4340 or by using the form on this page for a free, no-obligation consultation to discuss your case.
News from our Blog
Brain Injury Awareness Month Did you know that March is Brain Injury Awareness Month? The Brain Injury Association of America (BIAA) has been promoting public awareness of this issue for over 30 years. The goals of their yearly campaign are to empower brain injury survivors and their caregivers, provide outreach within the brain injury community […]
Attorneys Stephen M. Smith and David B. Holt of The Brain Injury Law Center partnered with The Mottley Law Firm to settle a case for a woman who suffered a traumatic brain injury in a head-on collision. The case was especially challenging due to the woman’s complicated psychiatric medical history.
In any contact sport, head injury is an inevitable risk. Rugby is no exception, and concussions are a serious concern when it comes to player welfare. Rugby players sometimes wear protective headgear believing it protects against head injuries. However, such protective gear in rugby has serious limitations, and research has found that it might do […]
This month, our Teach Believe Inspire award goes to Nicole Wight, a Traumatic Brain Injury (TBI) caregiver. She is a mother to two children, MacKenzie and Michael, who have special needs due to TBIs. Wight inspires our team with her selfless endurance and advocacy on behalf of her children. Since a tragic car accident altered […] |
Mandaeism
Mandaeism or Mandaeanism (, ), also known as Sabaeanism (, ), is a monotheistic and gnostic religion with a strongly dualistic cosmology. Its adherents, the Mandaeans, revere Adam, Abel, Seth, Enos, Noah, Shem, Aram, and especially John the Baptist. The Mandaeans are Semites and speak a dialect of Eastern Aramaic known as Mandaic. The name 'Mandaean' is said to come from the Aramaic manda meaning "knowledge", as does Greek gnosis. Within the Middle East, but outside of their community, the Mandaeans are more commonly known as the (singular: ) or Sabians. The term is derived from the Aramaic root related to baptism, the neo-Mandaic is . In Islam, the "Sabians" (, ) are described several times in the Quran as People of the Book, alongside Jews and Christians. Occasionally, Mandaeans are called "Christians of Saint John".
According to most scholars, Mandaeaism originated sometime in the first three centuries AD, in either southwestern Mesopotamia or the Syro-Palestinian area. However, some scholars take the view that Mandaeanism is older and dates from pre-Christian times.
The religion has been practised primarily around the lower Karun, Euphrates and Tigris and the rivers that surround the Shatt-al-Arab waterway, part of southern Iraq and Khuzestan Province in Iran. There are thought to be between 60,000 and 70,000 Mandaeans worldwide. Until the Iraq War, almost all of them lived in Iraq. Many Mandaean Iraqis have since fled their country because of the turmoil created by the 2003 invasion of Iraq and subsequent occupation by U.S. armed forces, and the related rise in sectarian violence by Muslim extremists. By 2007, the population of Mandaeans in Iraq had fallen to approximately 5,000.
The Mandaeans have remained separate and intensely private. Reports of them and of their religion have come primarily from outsiders: particularly from Julius Heinrich Petermann, an Orientalist as well as from Nicolas Siouffi, a Syrian Christian who was the French vice-consul in Mosul in 1887, and British cultural anthropologist Lady E. S. Drower. There is an early if highly prejudiced account by the French traveller Jean-Baptiste Tavernier from the 1650s.
Etymology
The term Mandaeism comes from Classical Mandaic Mandaiia and appears in Neo-Mandaic as Mandeyānā. On the basis of cognates in other Aramaic dialects, Semiticists such as Mark Lidzbarski and Rudolf Macuch have translated the term manda, from which Mandaiia derives, as "knowledge" (cf. mandaʻ in Dan. 2:21, 4:31, 33, 5:12; cf. maddaʻ, with characteristic assimilation of /n/ to the following consonant, medial -nd- hence becoming -dd-). This etymology suggests that the Mandaeans may well be the only sect surviving from Late Antiquity to identify themselves explicitly as Gnostics.
Other scholars derive the term mandaiia from Mandā d-Heyyi (Mandaic Manda ḏ'Hayyi "Knowledge of Life," in reference to the chief divinity Hayyi Rabbi "the Great Life" or "Great Living God") or from the word Beth Manda, which is the cultic hut in which many Mandaean ceremonies are performed (such as the baptism, which is the central sacrament of Mandaean religious life).
History
According to the Mandaean text the Haran Gawaita, the recorded history of the Mandaeans began when a group called the Nasoreans (the Mandaean priestly caste as opposed to the laity), left Judea/Palestine and migrated to Mesopotamia in the 1st century AD. The reason given for this was their persecution in Jerusalem. The emigrants went first to Haran (probably Harran in modern day Turkey), or Hauran and then the Median hills in Iran, before finally settling in the southern provinces of Mesopotamia (modern day Iraq).
At the beginning of the Muslim conquest of Mesopotamia, the leader of the Mandaeans, Anush son of Danqa appeared before Muslim authorities showing them a copy of the Ginza Rabba, the Mandaean holy book, and proclaiming the chief Mandaean prophet to be John the Baptist, who is also mentioned in the Quran as Yahya Bin Zakariya. This identified Mandaeans with the Sabians who are mentioned in the Quran as being counted among the Ahl al-Kitāb (People of the Book). This provided Mandaeans a status as a legal minority religion within the Muslim Empire. The Mandaeans were henceforth associated with the Sabians and the Jewish Christian group the Elcesaites, on account of the location of all three in Mesopotamia in the early centuries AD, and the similarities in their beliefs. The importance of baptism in the rituals of all three is particularly marked. Like the Mandaeans, the Sabians were also said to be gnostics and descended from Noah. Mandaeans continue to be identified with Sabians up to the present day, but the exact relationship between the three groups remains unclear.
Around 1290, a learned Dominican Catholic from Tuscany, Ricoldo da Montecroce, or Ricoldo Pennini, was in Mesopotamia where he met the Mandaeans. He described them as follows:
Mandaeans were called "Christians of Saint John" by members of the Discalced Carmelite mission in Basra during the 16th century, based upon their preliminary reports. Some Portuguese Jesuits had also met some "Saint John Christians" around the Strait of Hormuz in 1559, when the Portuguese fleet fought with the Ottoman Turkish army in Bahrain. These Mandaean seemed to be willing to obey the Catholic Church. They learned and used the seven Catholic sacraments and the related ceremonies in their lives.
Beliefs
Mandaeism, as the religion of the Mandaean people, is based more on a common heritage than on any set of religious creeds and doctrines. The corpus of Mandaean literature, though quite large, covers topics such as eschatology, the knowledge of God and the afterlife—in an unsystematic manner. Moreover, it is known only to the priesthood and a few laypeople.
Fundamental tenets
According to E. S. Drower, the Mandaean Gnosis is characterized by nine features, which appear in various forms in other gnostic sects:
A supreme formless Entity, the expression of which in time and space is creation of spiritual, etheric, and material worlds and beings. Production of these is delegated by It to a creator or creators who originated It. The cosmos is created by Archetypal Man, who produces it in similitude to his own shape.
Dualism: a cosmic Father and Mother, Light and Darkness, Right and Left, syzygy in cosmic and microcosmic form.
As a feature of this dualism, counter-types, a world of ideas.
The soul is portrayed as an exile, a captive; her home and origin being the supreme Entity to which she eventually returns.
Planets and stars influence fate and human beings, and are also places of detention after death.
A savior spirit or savior spirits which assist the soul on her journey through life and after it to ‘worlds of light’.'
A cult-language of symbol and metaphor. Ideas and qualities are personified.
‘Mysteries’, i.e. sacraments to aid and purify the soul, to ensure her rebirth into a spiritual body, and her ascent from the world of matter. These are often adaptations of existing seasonal and traditional rites to which an esoteric interpretation is attached. In the case of the Naṣoraeans this interpretation is based on the Creation story (see 1 and 2), especially on the Divine Man, Adam, as crowned and anointed King-priest.
Great secrecy is enjoined upon initiates; full explanation of 1, 2, and 8 being reserved for those considered able to understand and preserve the gnosis.
Cosmology
As noted above Mandaean theology is not systematic. There is no one single authoritative account of the creation of the cosmos, but rather a series of several accounts. Some scholars, such as Edmondo Lupieri, maintain that comparison of these different accounts may reveal the diverse religious influences upon which the Mandaeans have drawn and the ways in which the Mandaean religion has evolved over time.
In contrast with the religious texts of the western Gnostic sects formerly found in Syria and Egypt, the earliest Mandaean religious texts suggest a more strictly dualistic theology, typical of other Iranian religions such as Zoroastrianism, Zurvanism, Manichaeism, and the teachings of Mazdak. In these texts, instead of a large pleroma, there is a discrete division between light and darkness. The Mandaean God is known as Hayyi Rabbi (The Great Living God). Other names used are Mare d'Rabuta (Lord of Greatness) and Melka d'Nhura (King of Light).
Ptahil, the third emanation, alone does not constitute the demiurge but only fills that role insofar as he is the creator of the material world. Rather, Ptahil is the lowest of a group of three emanations, the other two being Yushamin (first emanation a.k.a. Joshamin) and Abathur, the second emanation. Abathur's demiurgic role consists of his sitting in judgment upon the souls of mortals. The role of Yushamin, the first emanation, is more obscure; wanting to create a world of his own, he was severely punished for opposing the King of Light. The name may derive from Iao haš-šammayim (in Hebrew: Yahweh "of the heavens").
While Mandaeans agree with other gnostic sects that the world is a prison governed by the planetary archons, they do not view it as a cruel and inhospitable one.
Chief prophets
Mandaeans recognize several prophets. Yahia-Yohanna, known in Christianity as John the Baptist, is accorded a special status, higher than his role in Christianity and Islam. Mandaeans do not consider John to be the founder of their religion but revere him as one of their greatest teachers, tracing their beliefs back to Adam.
Mandaeans do not believe in Abraham, Moses or Jesus, but recognize other prophetic figures from the Abrahamic religions, such as Adam, his son Seth and his grandson Anush (Enos), as well as Nuh (Noah), his descendants Sam, (Shem) in Bible and Ram (Aram) in Bible. The latter three they consider to be their direct ancestors.
Mandaeans also do not recognize the Holy Spirit in the Talmud and Bible, who is known in Mandaic as Ruha, Ruha d-Qudsha, or Ruha Masțanita, in the same way. Instead of being viewed positively as a holy spirit, she is viewed negatively as the personification of the lower, emotional, and feminine elements of the human psyche.
Scriptures
The Mandaeans have a large corpus of religious scriptures, the most important of which is the Ginza Rba or Ginza, a collection of history, theology, and prayers. The Ginza Rba is divided into two halves—the Genzā Smālā or "Left Ginza", and the Genzā Yeminā or "Right Ginza". By consulting the colophons in the Left Ginza, Jorunn J. Buckley has identified an uninterrupted chain of copyists to the late second or early third century. The colophons attest to the existence of the Mandaeans or their predecessors during the late Parthian Empire at the very latest.
The oldest texts are lead amulets from about the third century AD, followed by magic bowls from about AD 600. The important religious manuscripts are not older than the sixteenth century, with most coming from the eighteenth and nineteenth centuries.
Although the Ginza continued to evolve under the rule of the Sasanian Empire and the Islamic caliphates, few textual traditions can lay claim to such extensive continuity.
Another important text is the Haran Gawaita which tells the history of the Mandaeans. According to this text, a group of Nasoraeans (Mandean priests) left Judea before the destruction of Jerusalem in the first century CE, and settled within the Parthian Empire.
Other important books include the Qolusta, the canonical prayerbook of the Mandaeans, which was translated by E. S. Drower. One of the chief works of Mandaean scripture, accessible to laymen and initiates alike, is the Mandaean Book of John (), which includes a dialogue between John and Jesus. In addition to the Ginza, Qolusta, and Draša, there is the Dīvān, which contains a description of the 'regions' the soul ascends through, and the Asfar Malwāshē, the "Book of the Zodiacal Constellations". Finally, there are some pre-Muslim artifacts that contain Mandaean writings and inscriptions, such as some Aramaic incantation bowls.
The language in which the Mandaean religious literature was originally composed is known as Mandaic, and is a member of the Aramaic family of dialects. It is written in a cursive variant of the Parthian chancellory script. Many Mandaean lay people do not speak this language, though some members of the Mandaean community resident in Iran and Iraq continue to speak Neo-Mandaic, a modern version of this language.
Worship
The two most important ceremonies in Mandaean worship are baptism (masbuta), and a mass for the dead or 'ascent of the soul ceremony' (masiqta). Unlike other religions, baptism is not a one-off event but is performed every Sunday, the Mandaean holy day. Baptism usually involves full immersion in flowing water, and all rivers considered fit for baptism are called Yardena (after the River Jordan). After emerging from the water, the worshipper is anointed with holy oil and partakes of a communion of bread and water. The ascent of the soul ceremony can take various forms, but usually involves a ritual meal in memory of the dead. The ceremony is believed to help the souls of the departed on their journey through purgatory to the World of Light.
A () (Beth Manda) or Mashkhanna is a place of worship for followers of Mandaeism. A must be built beside a river in order to perform maṣbuta (or baptism) because water is an essential element in the Mandaean faith. Modern s sometimes have a bath inside a building instead. Each mandi is adorned with a darfash, which is a cross of olive wood half covered with a piece of white pure silk cloth and seven branches of myrtle. The cross bears no relation to the Christian cross. Instead the four arms of the cross symbolise the four corners of the universe, while the pure silk cloth represents the Light of God.The seven branches of myrtle represent the seven days of creation.
Mandaeans believe in marriage and procreation, and in the importance of leading an ethical and moral lifestyle in this world. They are pacifist and egalitarian, with the earliest attested Mandaean scribe being a woman, Shlama Beth Qidra, who copied the Left Ginza sometime in the 2nd century CE.. They also place a high priority upon family life. Mandaeans do not practice asceticism and detest circumcision. Mandaeans will, however, abstain from strong drink and red meat.
Organisation
There is a strict division between Mandaean laity and the priests. According to E.S. Drower (The Secret Adam, p. ix):
There are three grades of priesthood in Mandaeism: the tarmidia "disciples" (Neo-Mandaic tarmidānā), the ganzibria "treasurers" (from Old Persian ganza-bara "id.," Neo-Mandaic ganzeḇrānā) and the rišamma "leader of the people". This last office, the highest level of the Mandaean priesthood, has lain vacant for many years. At the moment, the highest office currently occupied is that of the ganzeḇrā, a title which appears first in a religious context in the Aramaic ritual texts from Persepolis (c. 3rd century BCE) and which may be related to the kamnaskires (Elamite <qa-ap-nu-iš-ki-ra> kapnuskir "treasurer"), title of the rulers of Elymais (modern Khuzestan) during the Hellenistic age. Traditionally, any ganzeḇrā who baptizes seven or more ganzeḇrānā may qualify for the office of rišamma, though the Mandaean community has yet to rally as a whole behind any single candidate.
The contemporary priesthood can trace its immediate origins to the first half of the 19th century. In 1831, an outbreak of cholera devastated the region and eliminated most if not all of the Mandaean religious authorities. Two of the surviving acolytes (šgandia), Yahia Bihram and Ram Zihrun, reestablished the priesthood on the basis of their own training and the texts that were available to them.
In 2009, there were two dozen Mandaean priests in the world, according to the Associated Press. However, according to the Mandaean Society in America the number of priests has been growing in recent years.
Relations with other groups
The Mandaeans have been identified with several groups, in particular the Sabians and the Elkasaites. Other groups such as the Nazerences and the Dositheans have also been identified with the Mandaeans. The exact relation of all these groups to one another is a difficult question. But they do share many common beliefs, in accordance with other ancient Middle Eastern religions such as Yazdaism and Judaism, such as belief in a formless deity, reincarnation and rejection of meat or red meat either completely or during religious times.
While it seems certain that a number of distinct groups are intended by these names, the nature of these sects and the connections between them are less than clear. At least according to the Fihrist (see below), these groups seem all to have emerged from or developed in parallel with the "Sabian" followers of El-Hasaih; "Elkasaites" in particular may simply have been a blanket term for Mughtasila, Mandaeans, the original Sabians and even Manichaeans.
Sabians
The Quran makes several references to the Sabians, who are frequently thought to be Mandaeans. Sabians are counted among the Ahl al-Kitāb (People of the Book), and several hadith feature them. Arab sources of early Quranic times (7th century) also make some references to Sabians. Some scholars hold that the etymology of the root word 'Sabi'un' points to origins either in the Syriac or Mandaic word 'Sabian', and suggest that the Mandaean religion originated with Sabeans who came under the influence of early Hellenic Sabian missionaries, but preferred their own priesthood. The Sabians believed they "belong to the prophet Noah"; Similarly, the Mandaeans claim direct descent from Noah.
Early in the 9th century, a group of Hermeticists in the northern Mesopotamian city of Harran declared themselves Sabians when facing persecution; an Assyrian Christian writer said that the true 'Sabians' or Sabba lived in the marshes of lower Iraq. The Assyrian writer Theodore Bar Konai (in the Scholion, 792) described a "sect" of "Sabians", who were located in southern Mesopotamia.
Al-Biruni (writing at the beginning of the 11th century) said that the 'real Sabians' were "the remnants of the Jewish tribes who remained in Babylonia when the other tribes left it for Jerusalem in the days of Cyrus and Artaxerxes. These remaining tribes ... adopted a system mixed-up of Magism and Judaism."
Nasaraean
The Haran Gawaita uses the name Nasoraeans for the Mandaeans arriving from Jerusalem. Consequently, the Mandaeans have been connected with the Nasaraeans described by Epiphanius, a group within the Essenes. Epiphanius says (29:6) that they existed before Christ. That is questioned by some, but others accept the pre-Christian origin of this group.
Elkesaites
The Elkesaites were a Judeo-Christian baptismal sect which seem to have been related, and possibly ancestral, to the Mandaeans (see Sabians). The members of this sect, like the Mandaeans, wore white and performed baptisms. They dwelt in east Judea and Assyria, whence the Mandaeans claim to have migrated to southern Mesopotamia, according to the Harran Gawaiṯā. In the Fihrist ("Book of Nations") of Arabic scholar Al-Nadim (c. 987), the Mogtasilah (Mughtasila, "self-ablutionists") are counted among the followers of El-Hasaih or Elkesaites. Mogtasilah may thus have been Al-Nadim's term for the Mandaeans, as the few details on rituals and habit are similar to Mandaeans ones. The Elkesaites seem to have prospered for a while, but ultimately splintered. They may have originated in a schism where they renounced the Torah, while the mainstream Sampsaeans held on to it (as Elchasai's followers did)—if so, this must have happened around the mid-late 1st millennium CE. However, it is not clear exactly which group he referred to, for by then the Elkesaite sects may have been at their most diverse. Some disappeared subsequently; for example, the Sampsaeans are not well attested in later sources. The Ginza Rba, one of the chief holy scriptures of the Mandaeans, appears to originate around the time of Elchasai or somewhat thereafter.
Manichaeans
According to the Fihrist of ibn al-Nadim, the Mesopotamian prophet Mani, the founder of Manichaeism, was brought up within the Elkesaite (Elcesaite or Elchasaite) sect, this being confirmed more recently by the Cologne Mani Codex. None of the Manichaean scriptures has survived in its entirety, and it seems that the remaining fragments have not been compared to the Ginza Rba. Mani later left the Elkasaites to found his own religion. In a comparative analysis, Mandaean scholar Säve-Söderberg indicated that Mani's Psalms of Thomas were closely related to Mandaean texts. This would imply that Mani had access to Mandaean religious literature, or that both derived from the same source.
Dositheans
They are connected with the Samaritan group the Dositheans by Theodore Bar Kōnī in his Scholion.
Number of adherents
Official numbers estimate that the current population of Mandaeans numbers between 60,000 and 70,000 people. Their proportion in their native lands has collapsed because of the Iraq War, with most of the community relocating to nearby Iran, Syria, and Jordan.
In 2011, Al Arabiya put the number of hidden and unaccounted for Iranian Mandaeans in Iran as high as 60,000. According to a 2009 article in The Holland Sentinel, the Mandaean community in Iran has also been dwindling, numbering between 5,000 and at most 10,000 people.
Of the Mandaeans tallied in official numbers, many have formed diaspora communities outside the Middle East, especially Australia, where some 10,000 now reside, mainly around Sydney, representing 15% of the total world Mandaean population.
Approximately 1,000 Iranian Mandaeans have emigrated to the United States since the US State Department in 2002 granted them protective refugee status, which was also later accorded to Iraqi Mandaeans in 2007. A community estimated at 2,500 members live in Worcester, Massachusetts, where they began settling in 2008. Most emigrated from Iraq.
Mandaeism does not allow conversion, and the religious status of Mandaeans who marry outside the faith and their children is disputed.
See also
Abatur
Aramaic language
Christianity
Gnosticism
Iraqi people
Marsh Arabs
References
Bibliography
Buckley, Jorunn Jacobsen. 2002. The Mandaeans: Ancient Texts and Modern People. Oxford: Oxford University Press.
Buckley. J.J. "Mandaeans" in Encyclopædia Iranica
Drower, Ethel Stefana. 2002. The Mandaeans of Iraq and Iran: Their Cults, Customs, Magic Legends, and Folklore (reprint). Piscataway, NJ: Gorgias Press.
Lupieri, Edmondo. (Charles Hindley, trans.) 2002. The Mandaeans: The Last Gnostics. Grand Rapids, MI: Wm. B. Eerdmans Publishing Company.
"A Brief Note on the Mandaeans: Their History, Religion and Mythology," Mandaean Society in America.
Newmarker, Chris, Associated Press article, "Faith under fire: Iraq war threatens extinction for ancient religious group" (headline in The Advocate of Stamford, Connecticut, page A12, 10 February 2007)
Petermann, J. Heinrich. 2007 The Great Treasure of the Mandaeans (reprint of Thesaurus s. Liber Magni). Piscataway, NJ: Gorgias Press.
Segelberg, Eric, 1958, Maşbūtā. Studies in the Ritual of the Mandæan Baptism. Uppsala
Segelberg, Eric, 1970, "The Ordination of the Mandæan tarmida and its Relation to Jewish and Early Christian Ordination Rites," in Studia patristica 10.
Eric Segelberg, Trāşa d-Tāga d-Śiślām Rabba. Studies in the rite called the Coronation of Śiślām Rabba. i: Zur Sprache und Literatur der Mandäer (Studia Mandaica 1.) Berlin & New York 1976.
Segelberg, Eric, 1977, "Zidqa Brika and the Mandæan Problem. In Proceedings of the International Colloquium on Gnosticism. Ed. Geo Widengren and David Hellholm. Stockholm.
Segelberg, Eric, 1978, "The pihta and mambuha Prayers. To the Question of the Liturgical Development amnong the Mandæans" in Gnosis. Festschrift für Hans Jonas. Göttingen.
Segelberg, Eric, 1990, "Mandæan – Jewish – Christian. How does the Mandæan tradition relate to Jewish and Christian tradition? in: Segelberg, Gnostica Madaica Liturgica. (Acta Universitatis Upsaliensis. Historia Religionum 11.) Uppsala 1990.
Yamauchi, Edwin. 2004. Gnostic Ethics and Mandaean Origins (reprint). Piscataway, NJ: Gorgias Press.
External links
Mandaean Association Union – The Mandaean Association Union is an international federation which strives for unification of Mandaeans around the globe. Information in English and Arabic.
BBC: Iraq chaos threatens ancient faith
BBC: Mandaeans – a threatened religion
Shahāb Mirzā'i, Ablution of Mandaeans (Ghosl-e Sābe'in – غسل صابئين), in Persian, Jadid Online, 18 December 2008
Audio slideshow (showing Iranian Mandaeans performing ablution on the banks of the Karun river in Ahvaz): (4 min 25 sec)
Mandaean scriptures
Mandaean scriptures: Qolastā and Haran Gawaitha texts and fragments (note that the book titled Ginza Rba is not the Ginza Rba but is instead Qolastā, "The Canonical Prayerbook of the Mandaeans" as translated by E.S Drower).
Gnostic John the Baptist: Selections from the Mandæan John-Book: This is the complete 1924 edition of G.R.S. Mead's classic study of the Mandæan John-Book, containing excerpts from the scripture itself (in The Gnosis Archive collection – www.gnosis.org).
The Ginza Rba (1925 German translation by Mark Lidzbarski) at the Internet Archive
The John-Book (Draša D-Iahia) – complete text in Mandaic and German translation (1905) by Mark Lidzbarski at the Internet Archive
Mandaic liturgies – Mandaic text (in Hebrew transliteration) and German translation (1925) by Mark Lidzbarski at the Internet Archive
Books about Mandaeism available online
Fragments of a Faith Forgotten by G. R. S. Mead a complete version (with old and new errors), contains information on Mani, Manichaeism, Elkasaites, Nasoraeans, Sabians and other "gnostic" groups. Published in 1901.
Extracts from E. S. Drower, Mandaeans of Iraq and Iran, Leiden, 1962
The Mandaeans of Iraq and Iran by Lady Drower, 1937 – the entire book
Category:Elcesaites
Category:Esotericism
Category:Gnosticism
Category:John the Baptist
Category:Monotheistic religions
Category:Religion in Iran
Category:Religion in Iraq |
Structural approach to primary rhinoplasty.
The choice of primary rhinoplasty technique is based on preoperative diagnosis, external nasal contour, nasal anatomy, and expected changes in nasal contour. The author matches technique to nasal anatomy, describing procedures that have resulted in a high success rate. (Aesthetic Surg J 2002;22:72-84.). |
See our 4-minute California Matters segment on oysters and ocean acidification here.
At 3:30 in the morning, a long pink building at the dead end of 22nd Street on the San Pedro waterfront is abuzz with activity while the rest of the city is asleep. Cars start pulling up to the docks, people haul coolers up the ladders and fishmongers weigh, scale, gut, and fillet a variety of tuna, salmon, snapper, halibut, albacore, and more.
But this isn't just business as usual on a Saturday morning. From around 3:30 to 7:30, on this one day only, the wholesale fish markets along Signal Place open their doors to the public. If you're one of the early risers, you can find whole tuna and salmon for as little as $3 per pound, or sardines and mackerel for as little as $1 per pound. You'll see water tanks full of live crab and bins of ice filled with shrimp of all sizes. Squid, scallops, clams, oysters, lobsters, even baby octopi -- they're all here. Don't wear your nice shoes or your nice clothes; the floors are constantly wet and while the markets do provide disposable gloves, this is the type of place where you really have to dig your hands in.
There are four or five bays that operate every Saturday, and their seafood is the freshest you'll find in L.A. -- after all, they're coming straight from the docks. It's worth it to walk through all the bays before you buy and do some comparison shopping. Get there early, as your choices start dwindling by the time the sun comes up and the markets close to the public by 8. If you're not one of the veteran shoppers that brought their own coolers for the haul home, you can buy a foam cooler from any of the markets; crushed ice is complimentary.
And don't forget to hit up an ATM on your way to the fish markets; they are cash only.
San Pedro Wholesale Fish Markets, located along the docks on Signal Place and 22nd Street
Open to the public every Saturday, 3:30 to 7:30 am |
/*
* Copyright 2002-2020 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.springframework.orm.hibernate5.support;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.hibernate.FlushMode;
import org.hibernate.HibernateException;
import org.hibernate.Session;
import org.hibernate.SessionFactory;
import org.springframework.dao.DataAccessException;
import org.springframework.dao.DataAccessResourceFailureException;
import org.springframework.lang.Nullable;
import org.springframework.orm.hibernate5.SessionFactoryUtils;
import org.springframework.orm.hibernate5.SessionHolder;
import org.springframework.transaction.support.TransactionSynchronizationManager;
import org.springframework.ui.ModelMap;
import org.springframework.util.Assert;
import org.springframework.web.context.request.AsyncWebRequestInterceptor;
import org.springframework.web.context.request.WebRequest;
import org.springframework.web.context.request.async.CallableProcessingInterceptor;
import org.springframework.web.context.request.async.WebAsyncManager;
import org.springframework.web.context.request.async.WebAsyncUtils;
/**
* Spring web request interceptor that binds a Hibernate {@code Session} to the
* thread for the entire processing of the request.
*
* <p>This class is a concrete expression of the "Open Session in View" pattern, which
* is a pattern that allows for the lazy loading of associations in web views despite
* the original transactions already being completed.
*
* <p>This interceptor makes Hibernate Sessions available via the current thread,
* which will be autodetected by transaction managers. It is suitable for service layer
* transactions via {@link org.springframework.orm.hibernate5.HibernateTransactionManager}
* as well as for non-transactional execution (if configured appropriately).
*
* <p>In contrast to {@link OpenSessionInViewFilter}, this interceptor is configured
* in a Spring application context and can thus take advantage of bean wiring.
*
* <p><b>WARNING:</b> Applying this interceptor to existing logic can cause issues
* that have not appeared before, through the use of a single Hibernate
* {@code Session} for the processing of an entire request. In particular, the
* reassociation of persistent objects with a Hibernate {@code Session} has to
* occur at the very beginning of request processing, to avoid clashes with already
* loaded instances of the same objects.
*
* @author Juergen Hoeller
* @since 4.2
* @see OpenSessionInViewFilter
* @see OpenSessionInterceptor
* @see org.springframework.orm.hibernate5.HibernateTransactionManager
* @see TransactionSynchronizationManager
* @see SessionFactory#getCurrentSession()
*/
public class OpenSessionInViewInterceptor implements AsyncWebRequestInterceptor {
/**
* Suffix that gets appended to the {@code SessionFactory}
* {@code toString()} representation for the "participate in existing
* session handling" request attribute.
* @see #getParticipateAttributeName
*/
public static final String PARTICIPATE_SUFFIX = ".PARTICIPATE";
protected final Log logger = LogFactory.getLog(getClass());
@Nullable
private SessionFactory sessionFactory;
/**
* Set the Hibernate SessionFactory that should be used to create Hibernate Sessions.
*/
public void setSessionFactory(@Nullable SessionFactory sessionFactory) {
this.sessionFactory = sessionFactory;
}
/**
* Return the Hibernate SessionFactory that should be used to create Hibernate Sessions.
*/
@Nullable
public SessionFactory getSessionFactory() {
return this.sessionFactory;
}
private SessionFactory obtainSessionFactory() {
SessionFactory sf = getSessionFactory();
Assert.state(sf != null, "No SessionFactory set");
return sf;
}
/**
* Open a new Hibernate {@code Session} according and bind it to the thread via the
* {@link TransactionSynchronizationManager}.
*/
@Override
public void preHandle(WebRequest request) throws DataAccessException {
String key = getParticipateAttributeName();
WebAsyncManager asyncManager = WebAsyncUtils.getAsyncManager(request);
if (asyncManager.hasConcurrentResult() && applySessionBindingInterceptor(asyncManager, key)) {
return;
}
if (TransactionSynchronizationManager.hasResource(obtainSessionFactory())) {
// Do not modify the Session: just mark the request accordingly.
Integer count = (Integer) request.getAttribute(key, WebRequest.SCOPE_REQUEST);
int newCount = (count != null ? count + 1 : 1);
request.setAttribute(getParticipateAttributeName(), newCount, WebRequest.SCOPE_REQUEST);
}
else {
logger.debug("Opening Hibernate Session in OpenSessionInViewInterceptor");
Session session = openSession();
SessionHolder sessionHolder = new SessionHolder(session);
TransactionSynchronizationManager.bindResource(obtainSessionFactory(), sessionHolder);
AsyncRequestInterceptor asyncRequestInterceptor =
new AsyncRequestInterceptor(obtainSessionFactory(), sessionHolder);
asyncManager.registerCallableInterceptor(key, asyncRequestInterceptor);
asyncManager.registerDeferredResultInterceptor(key, asyncRequestInterceptor);
}
}
@Override
public void postHandle(WebRequest request, @Nullable ModelMap model) {
}
/**
* Unbind the Hibernate {@code Session} from the thread and close it).
* @see TransactionSynchronizationManager
*/
@Override
public void afterCompletion(WebRequest request, @Nullable Exception ex) throws DataAccessException {
if (!decrementParticipateCount(request)) {
SessionHolder sessionHolder =
(SessionHolder) TransactionSynchronizationManager.unbindResource(obtainSessionFactory());
logger.debug("Closing Hibernate Session in OpenSessionInViewInterceptor");
SessionFactoryUtils.closeSession(sessionHolder.getSession());
}
}
private boolean decrementParticipateCount(WebRequest request) {
String participateAttributeName = getParticipateAttributeName();
Integer count = (Integer) request.getAttribute(participateAttributeName, WebRequest.SCOPE_REQUEST);
if (count == null) {
return false;
}
// Do not modify the Session: just clear the marker.
if (count > 1) {
request.setAttribute(participateAttributeName, count - 1, WebRequest.SCOPE_REQUEST);
}
else {
request.removeAttribute(participateAttributeName, WebRequest.SCOPE_REQUEST);
}
return true;
}
@Override
public void afterConcurrentHandlingStarted(WebRequest request) {
if (!decrementParticipateCount(request)) {
TransactionSynchronizationManager.unbindResource(obtainSessionFactory());
}
}
/**
* Open a Session for the SessionFactory that this interceptor uses.
* <p>The default implementation delegates to the {@link SessionFactory#openSession}
* method and sets the {@link Session}'s flush mode to "MANUAL".
* @return the Session to use
* @throws DataAccessResourceFailureException if the Session could not be created
* @see FlushMode#MANUAL
*/
protected Session openSession() throws DataAccessResourceFailureException {
try {
Session session = obtainSessionFactory().openSession();
session.setHibernateFlushMode(FlushMode.MANUAL);
return session;
}
catch (HibernateException ex) {
throw new DataAccessResourceFailureException("Could not open Hibernate Session", ex);
}
}
/**
* Return the name of the request attribute that identifies that a request is
* already intercepted.
* <p>The default implementation takes the {@code toString()} representation
* of the {@code SessionFactory} instance and appends {@link #PARTICIPATE_SUFFIX}.
*/
protected String getParticipateAttributeName() {
return obtainSessionFactory().toString() + PARTICIPATE_SUFFIX;
}
private boolean applySessionBindingInterceptor(WebAsyncManager asyncManager, String key) {
CallableProcessingInterceptor cpi = asyncManager.getCallableInterceptor(key);
if (cpi == null) {
return false;
}
((AsyncRequestInterceptor) cpi).bindSession();
return true;
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.