text
stringlengths
8
5.77M
Cowboys Have a Plethora of Draft Needs: Quarterback Ain't One of Them Receive the latest blue-star updates in your inbox While Tony Romo watches basketball games at Anna High School and Southern Methodist University, and doesn’t play golf at Pebble Beach in a protective nod to his surgically repaired back, Cowboys fans are anxious to learn about the team’s franchise quarterback of the future? Hint: It’s the same as their franchise quarterback of the present. Yep, No. 9. Sorry, but teams with one playoff win in the last 18 years can’t afford to ponder the long-term future. Because, let’s face it, the future is now. I know the Packers drafted Aaron Rodgers in the first round of 2005 with Brett Favre in the prime of his career. But at the time that organization was coming off four consecutive playoff appearances. The Cowboys are like the distressed homeowner two months behind on their mortgage. When they come into some money they have pressing, urgent, immediate expenses. They can’t afford, unfortunately, to sock it away in savings. Romo is 34 and is coming off of major back surgery. But there’s nothing to suggest he won’t make a full recovery and be even better – healthier and, therefore, more mobile – than his 31-touchdown, 10-interception season of 2013. And in the season finale, Kyle Orton proved a capable backup. So, what? You really want the Cowboys to spend a high draft choice this April on a quarterback that likely won’t see the field until 2017? If so, you haven’t been watching the same Cowboys I have the last two years. So, yippee, the Cowboys in 2014 surrender another 400+ points and again miss the playoffs, but you'd be content because you've identified their quarterback of the future? Insanity. The Cowboys need major help. Offensive line. Defensive line. Linebacker. Anybody that can cover in the secondary. The Cowboys have gone 8-8 the last two seasons and drafting their quarterback of the future will do nothing to help the here-and-now. Sign a young No. 3 quarterback for training camp and perhaps groom him on the practice squad. Keep Jon Kitna on speed dial if you must. But with all the holes on this roster that need to be filled, drafting a quarterback is just nonsensical. A native Texan who was born in Duncanville and graduated from UT-Arlington, Richie Whitt has been a mainstay in the Metroplex media since 1986. He’s held prominent roles on all media platforms including newspaper (Fort Worth Star-Telegram, Dallas Observer), radio (105.3 The Fan) and TV (co-host on TXA 21 and numerous guest appearances, including NBC 5). He currently writes a sports/guy stuff blog at DFWSportatorium.com and lives in McKinney with his wife, Sybil, and two very spoiled dogs.
Tags: Text Size - + reset Sen. John Thune (R-S.D.), left, and Sen. Saxby Chambliss (R-Ga.), Sen. Tom Coburn (R-Ok.) speaks about health care reform promises made and not kept by President Obama during a news conference in Washington. John Shinkle Digg/Buzz It Up POLITICO 44 For critics of the Democrats’ $849 billion health care bill, this may be the ultimate irony: millions of dollars set aside so the government can help teach citizens how to handle their own money better. The funding is part of a broader, $375 million program aimed at promoting responsible lifestyles — a five-year plan to fund state efforts to educate adolescents on abstinence, contraception and other “adult preparation subjects” such as healthy relationships, increased child-parent communication and “financial literacy.” You can imagine how Sen. Jim DeMint feels. “The federal government is never going to encourage personal responsibility and never has,” the South Carolina Republican said. “Personal responsibility is a good principle — but not the government doing it.” In a document circulating in the hopes of defeating the measure — and the health care bill in general — aides to Sen. Tom Coburn (R-Okla.) say: “The federal government, which is now $12 trillion in debt and riddled with hundreds of billions of dollars of waste, management, duplication and ineffective programs, has little credibility educating Americans about financial responsibility.” Supporters say it’s critical to teach young people how to manage their money better and that it’s unfair to characterize the program as the federal government “lecturing” citizens on fiscal responsibility, particularly because the programs would ultimately be run by states and communities. And they say that Republicans themselves used similar language when the GOP-controlled Congress created a financial literacy commission in 2003. “Financial literacy is one of the biggest problems we have in this country,” said Sen. Blanche Lincoln (D-Ark.). “Look at what happened in our stock markets, look at what happened in our economy with mortgages; people are indebting themselves into something more than what they can afford.” Critics say the same thing about the government, of course. The nation’s borrowing is about to surpass the statutory limit of $12.1 trillion, and Congress will have to increase that limit, probably well beyond $13 trillion, to ensure the country meets its obligations to creditors overseas. Congress has been forced to cobble together a gigantic omnibus appropriations bill to keep the government from shutting down. In addition, a hodgepodge of different tax breaks is set to expire before the end of the year unless Congress prevents that from happening with last-minute extenders legislation. Congress’s own money troubles are nothing new; these fiscal problems and massive bills to keep government operating happen under both Democratic and Republican control of Congress — and the debt limit was increased seven times under President George W. Bush. “The federal government is never going to encourage personal responsibility and never has,” the South Carolina Republican said. “Personal responsibility is a good principle — but not the government doing it.” In a document circulating in the hopes of defeating the measure — and the health care bill in general — aides to Sen. Tom Coburn (R-Okla.) says: “The federal government, which is now $12 trillion in debt and riddled with hundreds of billions of dollars of waste, management, duplication and ineffective programs, has little credibility educating Americans about financial responsibility.” what a crock of crap! these same republicans see no problem in throwing hundreds of million dollars at abstinence only sex education here and abroad though. sorry, the GOP just has no credibility on any of the fiscal issues of the day and for them to now whine about a "nanny state" is just more of the same ol'bull... In a document circulating in the hopes of defeating the measure — and the health care bill in general — aides to Sen. Tom Coburn (R-Okla.) says: “The federal government, which is now $12 trillion in debt and riddled with hundreds of billions of dollars of waste, management, duplication and ineffective programs, has little credibility educating Americans about financial responsibility.” No kidding. Of course this bunch want people to learn abstinence, financial responsibility etc.. I'm not saying responsibility is bad thing, but when it comes from them, I always wonder what the real motive. Of course everyone will have to be 'responsible' and 'abstain' from many many things in order to pay for the trillions of $$ they are taking out of our pockets. In a document circulating in the hopes of defeating the measure — and the health care bill in general — aides to Sen. Tom Coburn (R-Okla.) says: “The federal government, which is now $12 trillion in debt and riddled with hundreds of billions of dollars of waste, management, duplication and ineffective programs, has little credibility educating Americans about financial responsibility.” No kidding. Of course this bunch want people to learn abstinence, financial responsibility etc.. I'm not saying responsibility is bad thing, but when it comes from them, I always wonder what the real motive. Of course everyone will have to be 'responsible' and 'abstain' from many many things in order to pay for the trillions of $$ they are taking out of our pockets. The avg bureaucrat makes $ 120 k inclu benes, 2 x's the avg pvt worker. Yet, in my years in DC, most I saw were strictly On the Clock, (& not that hard working either). In the Midwest, in the pvt sector, I saw the opposite. Insur Co's CAN do the job, just give direct aid to the needy in the form of HC Savings Accounts. The avg bureaucrat makes $ 120 k inclu benes, 2 x's the avg pvt worker. Yet, in my years in DC, most I saw were strictly On the Clock, (& not that hard working either). In the Midwest, in the pvt sector, I saw the opposite. Insur Co's CAN do the job, just give direct aid to the needy in the form of HC Savings Accounts. The government has absolutely no right to take taxpayers' money to tell them how to manage their money - the majority of us KNOW how to handle OUR money - it's the government that can't do diddly-squat with their budget (that comes from our taxes!) - Well, Monday morning - two weeks before Christmas, and the right is full of hatred and fear - Boy, the republicans left their base in a bad way - they don't even feel they deserve being happy over Christmas..... kind of makes one wonder, doesn't it! It's not fear it's outrage that a bunch of people who show no financial responsibility, should think they will teach it. Of course if they can teach the young abstinence (self-denial -- not necessarily sexual) and financial responsibility, hopefully they can assure their irresponsible spending will have a funding source in the future. There is always pork attached to a bill, but I wonder if the agenda with this pork is to make sure the bill is paid for. I'm independent, I go right on some things, and left on others, I haven't trusted this current administration since the campaign, and I don't trust the Dems running Congress. They shouldn't print things like this so early in the morning. I damn near choked on my coffee at the thought of these buffoons in Congress trying to tell citizens how to handle their money. We now have tent cities, 17% real unemployment, Multi trillion dollar debt, and these jokers are just getting started. How's our new "budget to nowhere going for you? Personal finance class should be part of the general education requirement at public universities and community colleges. One class is enough and it doesn't need federal funding to accomplish this. The Federal Gov't is giving handouts left and right. The only thing I learned from Obama is that I'm stupid for having an excellent credit score. I should have gotten a home equity line of credit and then I could have had Obama bail me out. If I lose my job, I don't have to find a new one...because Obama is going to pay for all my stuff, right??? There's a gov't job in there somewhere for me. Maybe if public schools spent less time on global warming and teaching children hymns to Obama they could slip in some financial literacy courses. However, the math is becoming simplier under Democrats because there is ever shrinking income and increased taxes to take away what's left. Let's start each class on how much tax people pay on purchases, payroll and the like. Maybe if public schools spent less time on global warming and teaching children hymns to Obama they could slip in some financial literacy courses. However, the math is becoming simplier under Democrats because there is ever shrinking income and increased taxes to take away what's left. Let's start each class on how much tax people pay on purchases, payroll and the like.
In the Missouri Court of Appeals Eastern District DIVISION ONE ERIC EDWARD BACON, ) No. ED107919 ) Respondent, ) Appeal from the Circuit Court ) of St. Charles County vs. ) ) Hon. Jon Alan Cunningham MISSOURI STATE HIGHWAY PATROL, ) COLONEL DAVID TODD AND ST. ) CHARLES COUNTY PROSECUTING ) ATTORNEY, ) ) Filed: Appellants. ) April 7, 2020 The Missouri State Highway Patrol, Colonel David Todd and the St. Charles County Prosecuting Attorney (collectively “MSHP”) appeal from the judgment granting E.B.’s (“Petitioner”) petition to have his name removed from the sex offender registry under Missouri’s Sex Offender Registration Act (“SORA”), Section 589.400 et seq. We affirm. On November 21, 2002, Petitioner pled guilty in St. Charles County to possession of child pornography. On July 29, 2004, Petitioner pled guilty in St. Louis County to possession of child pornography. He received a suspended imposition of sentence in both cases and was placed on probation. SORA did not include a registration requirement for this offense at the time of Petitioner’s adjudications. Possession of child pornography was added to the list of offenses requiring registration when SORA was amended in August 2004. Petitioner was notified that he was required to register as a sex offender and has been on the registry for at least ten years. Until recently, SORA treated all sexual offenses the same and imposed on all offenders a lifetime registration requirement, with limited exceptions. Effective August 28, 2018, the legislature restructured SORA. Sexual offenders are now divided into three tiers based on the severity of the offense, and each tier has different registration periods ranging from fifteen years to the offender’s lifetime. The legislature also included provisions under which repeat offenders are subjected to higher tiers and longer registration periods. Below is a summary of each tier: • Tier I contains fifteen listed offenses, including possession of child pornography. See Section 589.414.5(1)(a)-(o). Those “adjudicated” 1 for a tier I offense are required to register for fifteen years and they must report to law enforcement annually. See Sections 589.400.4(1) and 589.414.5. The registration period can be reduced to ten years if the offender maintains a clean record. See Section 589.400.5 • Tier II covers thirteen listed offenses. See Section 589.414.6(1)(a)-(m). Tier II also includes certain repeat tier I offenders: “[a]ny person who is adjudicated of an offense comparable to a tier I offense listed in this section . . . and who is already required to register as a tier I offender due to having been adjudicated of a tier I offense on a previous occasion.” Section 589.414.6(2). A tier II offender is required to register for twenty-five years, reporting semi-annually. See Sections 589.400.4(2) and 589.414.6. • Tier III is for the most severe offenders, consisting of thirty-six listed offenses and covering predatory and persistent sexual offenders. See Sections 589.414.7(1) and 589.414.7(2)(a)-(jj). Tier III also includes certain repeat tier I and tier II offenders: “[a]ny offender who is adjudicated for a crime comparable to a tier I or tier II offense listed in this section . . . who has been or is already required to register as a tier II offender because of having been adjudicated for a tier II offense, two tier I offenses, or combination of a tier I offense and failure to register offense, on a previous occasion.” Section 589.414.7(3). A person adjudicated for a tier III offense is required to register for his lifetime, reporting every ninety days. See Sections 589.400.4(3) and 589.414.7. The legislature intended for those currently on the registry to get the benefit of the new shorter registration time periods for offenses that are now deemed to be in the lower severity tiers: “any person currently on the sexual offender registry for having been adjudicated for a tier I or II 1 An “adjudication,” as defined in Section 589.404(1), includes a suspended imposition of sentence following a guilty plea. Dixon v. Missouri State Highway Patrol, 583 S.W.3d 521, 523 n.2 (Mo. App. W.D. 2019). 2 offense . . . or other comparable offenses listed under section 589.414 may file a petition under Section 589.401.” Section 589.400.10. A person on the registry for a tier I offense cannot file a petition for removal until ten years has elapsed since the date he was required to register for his most recent offense. See Section 589.401.4(1). For a tier II offense, the time period is twenty-five years from that date. See Section 589.401.4(2). The date a person is “required to register” is typically three days after adjudication, release from prison or placement on probation. See Section 589.400.2. In September of 2018, shortly after these changes to SORA became effective, Petitioner— as a person “currently on the sexual offender registry”—filed a petition to have his name removed. In accordance with Section 589.401, Petitioner identified the two possession of child pornography cases that required him to register and claimed they arose out of the same incident. 2 He alleged these were tier I offenses. Petitioner asserted that he was adjudicated for those offenses on November 21, 2002 and July 29, 2004. But because those offenses did not carry a registration requirement he was not required to register within three days of either adjudication. Rather, he alleged that the date he was required to register was August 28, 2004, which is when possession of child pornography was added to SORA’s list of registerable sex offenses. Because it had been more than ten years since that date, Petitioner argued he was eligible to have his name removed from the registry. The MSHP argued that because he had two adjudications for tier I offenses, Petitioner was actually considered a tier II offender under Section 589.414.6(2) and was only 2 According to his testimony, on the same day in February 2002, Petitioner downloaded the pornographic images at his office in St. Louis County (resulting in the July 2004 adjudication) and copied them onto a disk that he took to his home in St. Charles County (resulting in the November 2002 adjudication). It is unclear what impact Petitioner believed these facts had on the evaluation of his adjudications under SORA, but any such reliance on the “same incident” argument has been abandoned on appeal. 3 eligible to petition for removal after twenty-five years. The trial court agreed with Petitioner and ordered his name removed from the registry. This appeal follows. This appeal requires us to interpret, as a matter of first impression, the meaning of the upgrade provision for repeat tier I offenders in Section 589.414.6(2). This is a question of law that we review de novo. Dixon v. Missouri State Highway Patrol, 583 S.W.3d 521, 523 (Mo. App. W.D. 2019). As always, our “primary obligation is to ascertain the intent of the legislature from the language used, to give effect to that intent if possible, and to consider the words in their plain and ordinary meaning.” Id. We are only permitted to look beyond the plain meaning of the statute when the language is ambiguous or would lead to an absurd or illogical result. See Akins v. Director of Revenue, 303 S.W.3d 563, 565 (Mo. banc 2010). Section 589.414.6(2) states that a tier II offender includes “[a]ny person who is adjudicated of an offense comparable to a tier I offense listed in this section . . . and who is already required to register as a tier I offender due to having been adjudicated of a tier I offense on a previous occasion.” This provision plainly requires not only a previous adjudication for a tier I offense but also the requirement to register as a tier I offender due to that adjudication. Moreover, by defining this repeat offender as one “who is adjudicated” for a tier I offense and “who is already required to register” for a previous tier I offense, it is also clear that the requirement to register must exist at the time of the second adjudication. In other words, the first tier I adjudication must have carried a requirement to register and that requirement must have existed at the time of the second tier I adjudication in order to upgrade the offender to tier II under Section 589.414.6(2). In this case, when Petitioner was adjudicated for his second tier I offense in 2004, he already had an adjudication for a tier I offense on a previous occasion in 2002, but he was not at that time already required to register—“as a tier I offender” or for any reason—because possession 4 of child pornography did not yet carry a registration requirement under SORA. Rather, he became required to register for both offenses simultaneously after that 2004 adjudication by virtue of a change in the law. The precise date on which that requirement arose is unclear, but it is not dispositive because, as discussed in the footnote, any of the possible dates was more than ten years prior to his petition for removal. 3 What is dispositive is the fact that the requirement to register for the first tier 1 offense in 2002 did not exist at the time of the second adjudication for a tier I offense in 2004. Petitioner’s situation simply does not fit into the plain meaning of the provision for upgrading him to a tier II offender. The MSHP argues that this construction of the words “is already required to register” in Section 589.414.6(2) is “hyper-technical” and permits a repeat offender like Petitioner to avoid the increased registration length, which is contrary to the statute’s purpose. The MSHP contends that by creating a three-tiered system, the legislature intended to take a “three strikes” approach to recidivists, under which each subsequent tier I offense subjects the offender to a higher tier and longer registration period until, upon his third tier I offense, he is “out” and must register for his lifetime. This is reasonable and necessary, it argues, because multiple offenses signal a greater risk of recidivism. Therefore, the MSHP insists, we must construe “is already required to register” 3 Everyone at trial seemed to agree that the relevant change in the law was the amendment to SORA, effective August 28, 2004, and that was the operative date for calculating the ten-year period under Section 589.401.4(1). But now Petitioner contends that because it has been held that SORA cannot operate retrospectively to require registration for offenses that predate its enactment, it is not clear that the 2004 amendments obligated him to register for pre- amendment offenses. See Doe v. Phillips, 194 S.W.3d 833, 852 (Mo. banc 2006). He contends that it was actually the enactment of the federal Sex Offender Registration and Notification Act (“SORNA”) 42 USCA Section 16901, et seq.—which does operate retrospectively to pre-enactment offenders—that obligated him to register for his 2002 and 2004 sex offenses in Missouri. See Doe v. Keathley, 290 S.W.3d 719, 720 (Mo. banc 2009). There is some question as to the precise date on which pre-enactment offenders were required to register under SORNA, but it could have been as early as February 28, 2007 or as late as August 1, 2008. See Petrovick v. State, 537 S.W.3d 388, 392 (Mo. App. W.D. 2018) (discussing “uncertainty as to the precise date on which the Attorney General of the United States specified that SORNA would apply to pre-enactment offenders”). Because we conclude Petitioner is a tier I offender, we need not resolve on which of these particular dates Petitioner’s obligation to register arose—August 2004 under SORA or February 2007 or August 2008 under SORNA—because they are all more than ten years before his September 2018 petition for removal. 5 in Section 589.414.6(2) as if it simply means that the first tier I offense was a “registerable offense.” In other words, in Petitioner’s case, his 2002 adjudication for a tier I offense that ultimately required registration would be a “registerable offense.” Because “2002 comes before 2004,” the MSHP observes, the 2002 registerable offense was adjudicated on an occasion previous to the 2004 second adjudication for a tier I offense and he must be deemed a tier II offender. We disagree. First and foremost, that is not what SORA says. If the legislature meant for a prior adjudication of a registerable tier I offense alone to elevate one from tier I to tier II, then it would have used words to that effect instead of the phrase “is already required to register.” It might have edited Section 589.414.6(2) the MSHP’s arguments suggests: “. . . and who is already required to register as a tier I offender due to having has been adjudicated of a registerable tier I offense on a previous occasion.” But, of course, we cannot ignore the words that are actually used in the statute. We “must presume that every word, sentence, or clause in a statute has effect and that the legislature did not insert superfluous language.” See Lumetta v. Sheriff of St. Charles County, 413 S.W.3d 718, 720 (Mo. App. E.D. 2013). It is not enough that Petitioner was at some point required to register because of a 2002 adjudication, which came before the 2004 adjudication; rather, the key under Section 589.4141.6(2) is the existence of that requirement at the time of the second adjudication. Because those words are clear and unambiguous, we are not permitted to rewrite the statute the way MSHP suggests. See generally Strosnider v. Replogle, 502 S.W.3d 756, 759 (Mo. App. S.D. 2016). Even if it was unclear whether the number and chronology of registerable offenses alone was enough to upgrade a tier I offender to tier II, that ambiguity would have to be resolved under the rule of lenity by construing it against the government and giving Petitioner the benefit of the shorter registration period. See Dixon, 583 S.W.3d at 528 (applying rule of lenity to 6 resolve ambiguities in 2018 SORA amendments against government); see also Kersting v. Replogle, 492 S.W.3d 600, 605 (Mo. App. W.D. 2016). Second, the MSHP’s suggested rewrite is not the only way to effectuate the legislative goal of addressing recidivism. One of the purposes of SORA is—and has always been—“to respond to the known danger of recidivism among sex offenders.” Doe v. Phillips, 194 S.W.3d 833, 839 (Mo. banc 2006). The restricting of SORA into tiers in 2018 indicates that the legislature recognizes that not all sex offenses are equally severe and not all sex offenders need to be monitored by way of registration for the same amount of time. Likewise, the specific provisions for upgrading a repeat offender to the next tier indicate that the legislature also recognized that not all repeat sex offenders need to be monitored for longer amounts of time after a second offense. Rather, Section 589.414.6(2) indicates the legislature’s belief that, for whatever reason, one who reoffends while he is supposed to be on the registry needs to be monitored for longer after his second offense than one who reoffends while he is not supposed to be on the registry. Thus, one “who is adjudicated” for a second tier I offense and who, at that time, “is already required to register” is upgraded to tier II and must then register for twenty-five years; whereas, one whose second offense is adjudicated at a time when he is not required to be on the registry—either because the registration period on the first offense has expired or, as in Petitioner’s case, never existed in the first place—need only register for ten years after that second offense. 4 It is not for us to 4 We note—without deciding, since this provision is not at issue in this appeal—that it appears there is no such distinction between re-offense while on the registry and re-offense while not on the registry when determining whether to upgrade a repeat tier II offender to tier III. The language of that provision, Section 589.414.7(3), is broader and upgrades to tier III anyone who is adjudicated of a tier I or tier II offense and who “has been or is already required to register” as a tier II offender. In other words, the upgrade occurs regardless of whether the requirement to register as a tier II offender has lapsed at the time the offender is adjudicated for a subsequent tier I or tier II offense. The MSHP points out that when describing the ways one could be required to register as a tier II offender, the legislature included “having been adjudicated for . . . two tier I offenses.” Section 589.414.7(3) (emphasis added). This appears to be merely a shorthand way to reference the upgrade in Section 589.414.6(2), not an indication that we should disregard the actual language of that provision and simply conclude that two tier I offenses equals a tier II offender. And, again, to the extent use of this shorthand phrasing creates an ambiguity as to what elevates a tier I 7 question the reasoning behind the language used, but to strictly apply the words in the statute as they are written. See Dixon, 583 S.W.3d at 528 (SORA is to be strictly construed). We would only be permitted to disregard the plain language of Section 589.414.6(2) if applying the statute as written would lead to an absurd or illogical result. It is not absurd nor illogical to base the upgrade of a repeat tier I offender on whether he was already required to register as a tier I offender at the time of his second adjudication for a tier I offense and not solely on the number of times an offender has been adjudicated for a registerable sex offenses. A repeat tier I offender is still subject to increased registration periods under our interpretation, just not based on the criteria the MSHP suggests. Because Petitioner was not required to register at all at the time of his second adjudication for what is now a tier I offense, he cannot be upgraded to a tier II offender under Section 589.414.6(2). Petitioner is a tier I offender, it has been at least ten years since the date he was required to register for his most recent offense and it is undisputed that Petitioner has complied with the other requirements for filing the petition and satisfied the other conditions for removal set out in Section 589.401. Thus, the court did not err in granting his petition and removing him from the sex offender registry. Point denied. The judgment is affirmed. ROBERT G. DOWD, JR., Judge Robert M. Clayton III, P. J. and Roy L. Richter, J., concur. offender to tier II status, that ambiguity also would be construed against the government. See Dixon, 583 S.W.3d at 528. 8
Lymphocyte activation antigen CD70 expressed by renal cell carcinoma is a potential therapeutic target for anti-CD70 antibody-drug conjugates. Metastatic renal cell carcinoma (RCC) is an aggressive disease refractory to most existing therapeutic modalities. Identifying new markers for disease progression and drug targets for RCC will benefit this unmet medical need. We report a subset of clear cell and papillary cell RCC aberrantly expressing the lymphocyte activation marker CD70, a member of the tumor necrosis factor superfamily. Importantly, CD70 expression was found to be maintained at the metastatic sites of RCC. Anti-CD70 antibody-drug conjugates (ADC) consisting of auristatin phenylalanine phenylenediamine (AFP) or monomethyl auristatin phenylalanine (MMAF), two novel derivatives of the anti-tubulin agent auristatin, mediated potent antigen-dependent cytotoxicity in CD70-expressing RCC cells. Cytotoxic activity of these anti-CD70 ADCs was associated with their internalization and subcellular trafficking through the endosomal-lysosomal pathway, disruption of cellular microtubule network, and G2-M phase cell cycle arrest. The efficiency of drug delivery using anti-CD70 as vehicle was illustrated by the much enhanced cytotoxicity of antibody-conjugated MMAF compared with free MMAF. Hence, ADCs targeted to CD70 can selectively recognize RCC, internalize, and reach the appropriate subcellular compartment(s) for drug release and tumor cell killing. In vitro cytotoxicity of these ADCs was confirmed in xenograft models using RCC cell lines. Our findings provide evidence that CD70 is an attractive target for antibody-based therapeutics against metastatic RCC and suggest that anti-CD70 ADCs can provide a new treatment approach for advanced RCC patients who currently have no chemotherapeutic options.
'Nine lives' Nick Kyrgios lights up Wimbledon The king is crook, long live the king. It is not that Lleyton Hewitt is gone yet because, typically, he is still fighting with his last breath to stay alive in Wimbledon. Whatever else we have said about Hewitt, he has never been anything other than an exemplar of heart and will to win. But just as his career is fading, along comes his clear successor of the heart, 19-year-old Nick Kyrgios of Canberra. His match on Thursday had to be seen to be believed. Down two sets to love against the 13th-seeded Frenchman Richard Gasquet, the teenager looked gone for all money. But Kyrgios just kept swinging. And, after surviving no fewer than nine match points – including a Kyrgios double fault, that he challenged and won – our man went on to win 10-8 in the fifth set. He's the one. Bravo, and go you good thing! Rumbling with Jungle Jim Enough about our own Sam Robson who – despite being born and raised in Paddington – went on to score a century while opening the batting for England this week, in only his second Test. Let's talk about his father, Jim, instead. Jim is now in charge of the nets at the SCG, but in the 1970s was a first-grade batsman for UNSW. TFF was sent a story this week about the time when "Jungle" Jim Robson was batting against a bowler from Bankstown who will remain nameless – let's just call him Lenny Pascoe – who'd already made his name, with Jeff Thomson bowling from the other end for Bankstown, as one of Australia's foremost homicidal maniacs, with ball in hand. So the story goes, Robson batted for a few hours, which made Lenny ever more angry and abusive. Finally, Lenny gets him out, but as Robson walks back to the pavilion our Lenny follows him, shouting abuse into Robson's earhole telling him how hopeless he is. This goes on halfway to the boundary, at which point Robson stops, turns to Lenny and says quietly, “Len, you will always be a better bowler than I will be a batsman, but let me tell you, I will beat you at Scrabble any day.” I love it. You love it! Sadly, however, Geoff Lawson, who the story was originally sourced to, swears the author of the remark was Bruce Collins, QC – the former chairman of Cricket NSW – when he was playing for Sydney University. But both Lawson and Chris Chapman – who was also around at the time and is now the boss of Australian Communications and Media Authority – affirm that, whatever else, Jim Robson was a superbly talented batsman, and in the case of his lad, the apple has not fallen far from the tree. Congratulations to them both. World Cup takes a dive Dear Simon Hill, At your specific request, I've tried, I've really tried, to get into this World Cup and . . . you'll be pleased to hear I have half-succeeded! The Socceroos were inspiring. The rest of it has been pretty good with lots of the big guns going down blazing, led by England. (Loved it, just on principle!) At its best it has been, as described by my friend Richard Sleeman, “Shakespeare in shorts.” But then you have things such as the Uruguayan player, Whatsit Suarez, biting the Italian player Giorgio Chiellini. How appalling was the whole thing? Let me count the ways. Sportspeople don't bite. In fact, no one does. It is the lowest of the low. Even though Chiellini only got a nip, he went down in a screaming heap like he'd had his ear shot off by a sniper. Then for the piece de resistance. Advertisement After biting Chiellini on the shoulder, before our very eyes Luis Suarez himself goes down! The whole debacle finishes with the biter and the bite-ee, both rolling on the ground in seeming agony, looking for the attention of the referee. Simon, what a crock of unacceptable nonsense. This is no straw-man; this is your code's best and brightest! This is Luis Suarez! This is the guy who was the Premier League's Player of the Year! The reaction in rugby, NRL and AFL if Israel Folau, Sonny Bill Williams or Gary Ablett jnr did that would be shame and stupefaction. No one would believe it possible, and if it did everyone would hang their heads. But, in soccer, there seems to be general merriment and a shrug of the shoulders. After all, he's done it TWICE before! Why is it so? How can you cop that as part of the culture? Where is the outrage? I remain, Your favourite irritant, Peter Fitz Hell hath no fury like . . . What happens when tuckshop ladies attack? I thought you'd never ask. Britain saw the answer last weekend, when as reported in the London Daily Telegraph, a tuckshop lady who felt she'd been unfairly dismissed from a school in Shrewsbury drove her car on onto the cricket pitch as the school's first XI was practising and started doing, ahem, “doughnuts". Still not done, she then jumped out of the car and went after a teacher, chasing him all over the field with a fire extinguisher. “Our groundsman is obviously not happy that someone drove a car onto the cricket pitch and the square,” a school spokesperson said. “You are not even allowed to walk on it.” All of us in Australia must remain on guard, lest this dangerous trend take over here. Yes, they look like mild-mannered tuckshop ladies. But are they really? Clearly, when a good tuckshop lady goes bad, the results can be frightening. Gallen good but not that good Who is running our Olympic precinct? A staggering report this week had it that they're thinking of immortalising Paul Gallen with a bronze statue there, as our answer to the Wally Lewis statue at Lang Park! Seriously? Look, Gallen is a staggeringly good footballer, and no doubt a very good captain, but of equal stature to Wally Lewis south of the Tweed, he is not. So before they make the mould to try to match one who broke the mould, perhaps they might care to wait – for starters – for the investigations at ASADA to play out? Beyond that, look at Gallen's long and troubled history of being in the centre of any number of controversies, from ripping the stitches out of an opponent's wound to being charged and found guilty of racial vilification after allegedly calling Dragons player Mickey Paea a "black c---". NSW has produced many extraordinary rugby league players – Bobby Fulton, Johnny Raper, Reg Gasnier, Clive Churchill, Andrew Johns and Laurie Daley himself spring to mind – and to cast Gallen in bronze for captaining NSW in the first winning series he's been a part of in the last nine, is ludicrous. Get on your bike! Come on you slack bastards, the Tour de Lounge is on again, this year kicking off on Saturday, July 5. As you know, the TdL is the annual charity event, shamelessly mimicked by the Tour de France. Our people sit in their lounges and rack up the kilometres night after night on exercise bikes, while in France they do it rather more primitively, on actual bikes, going up and down mountains. TdL peloton riders complete 1000 kilometres (or more, or less, depending on how strong they are) over the same period as the Tour de France, and get sponsored by friends for every kilometre. Last year, 97 riders raised $68,000, with every cent going to the Leukaemia Foundation. With more riders, they might crack $100,000 this year! Visit tourdelounge.com. What they said SMH reader Damian Kelly: ‘‘FIFA have had a hearing about Suarez bite incident and they have awarded it to Qatar.’’ Italy centre-back Giorgio Chiellini insisting Uruguay’s Luis Suarez bit him during the World Cup match between the two teams in Natal. ‘‘He bit me, it’s clear, I still have the mark. The referee should have blown his whistle and given him a red card, also because he was simulating.’’ Did the British Huffington Post have the best headline on the Suarez bite?: ‘‘Chewy Luis and the Blues.’’ Latvian tennis player Ernests Gulbis at a Wimbledon press conference, when asked about John McEnroe’s belief that umpires should be abolished. ‘‘Get rid of vampires? I completely agree.’’ Derryn Hinch on Paul Murray: ‘‘What’s the difference between the England soccer team and a tea bag? A tea bag stays in the Cup for longer.’’ The Daily Mail takes a dim view after England lose their first two games of the World Cup to be sent packing: ‘‘This is as good as it gets. This is what we must expect. This is who we are now. The smiling idiots just happy to be at the party.’’ An Indian cricket follower tweets: ‘‘I was supporting England in the World Cup, but unfortunately, England’s World Cup campaign proceeded a lot like my sex life; there was no passion, no communication and it ended all too quickly ... What’s worse, the next time will be after four years.’’ Wayne Bennett after his Knights had their first win in seven matches, against the Cowboys: ‘‘It’s a pity we haven’t got a bye next week ... We could go back to back.’’ Willie Mason uttering this month’s version of rugby league’s ancient mating calling — Bringggg backkkk the bifffff!: ‘‘I didn’t really enjoy watching Origin II. The niggle sort of slowed the game down a bit ... It turns it into AFL. Some bloke just needs to swing a punch and see what happens.’’ Queensland rugby league great Greg Dowling still on angry pills, all these years on, when it comes to NSW: ‘‘It’s typical NSW. They win one series and they think they’ve created the biggest dynasty of all. That’s what they are like, they have no class. They are arrogant. They win one series and suddenly they are predicting the death of Queensland.’’ Dowling again, on booing Brent Tate as he was walking off the ground with a ruptured anterior cruciate ligament: ‘‘It’s a low act, Brent Tate is one of the greats of the game and deserves better than that. That’s what Sydney are like, they even booed the captain of Australia, Wally Lewis, when Iwas playing. That’s why I hate them ... That’s why every other state in Australia hates NSW.’’ Brisbane Lions legend Jonathan Brown announces his retirement, after suffering his third head knock in a year: ‘‘The competitor inside me was saying I had some football left ... but it wasn’t worth the risk of playing and potentially getting another head knock.’’ Robbie Slater to Craig Foster, on Twitter: ‘‘Learn how to co-commentate! You ruined the World Cup my son! A bit harsh but constructive!’’ Team of the week Sam Robson. Born in our own Paddington, with an English mother and an Australian father who manages the indoor nets at the SCG, last Saturday he scored a century for England against Sri Lanka, at Headingley. Sydney Swans. Looking for 10 on the trot on Saturday against the Giants. Greater Western Sydney. Meanwhile the Giants are looking for three in a row for the first ever time. Already have four wins, which is double their previous best. All Blacks. Their win against England last Saturday meant they equalled the world record in international rugby of 17 consecutive Test victories. Waratahs. Resume Super Rugby hostilities with a game against the Brumbies on Saturday night. Melbourne Vixens. Won their second trans-Tasman championship with a grand final victory over the Queensland Firebirds last Sunday in what wasn’t a good week for those north of the Tweed. Australian Schools Rugby Championships. Begin at St Ignatius’ College, Riverview, on Monday and conclude next Saturday. Aaron Baddeley. Had his best result in a while — fourth — at the Travelers Championship, whatever, and wherever that is. Paul Ambrosoli. The voice of greyhound racing — he’s been doing it for 50 years! — finishes up at 2KY. One of the old school and a very good man
I‘ve written many posts about bee suits over the past five years. In one of the first, I said bee suits were worth the money. But subsequent posts showed me becoming a skeptic. And now? I would never buy another. Almost anything you can find laying around the house is better. The one thing heavy cotton bee suits are good for is protecting your other clothing. I used to think bee suits saved me money because of that. But invariably there were days when I didn’t wear a suit and I ended up ruining my clothes anyway. So after a while, I just wore the ruined clothing and called it good. The most frequent argument I hear in favor of bee suits is that they are white, and as such they are cooler. But I don’t believe this. Well, I believe the science: white reflects the sunlight and so those suits are cooler than if they were black, but the fabric they use is so heavy they are deathly hot anyway. When I’m in the bee yard, I like clothing that I’m comfortable in. Why do hot, heavy, and stingy work in clothes that make you antsy? It doesn’t make sense. So I began keeping a list of suggestions from other beekeepers. I’m passing it along for the day you can bear the bee suit not one more minute: jeans with a long-sleeved, zip-up turtleneck and veil jeans with a long-sleeved, zip-up turtleneck and veil a painter’s suit from Home Depot a painter’s suit from Home Depot a Tyvek suit from Home Depot (these offer good sting protection but are also hot) a Tyvek suit from Home Depot (these offer good sting protection but are also hot) surgical scrubs with duct tape or elastic at wrists and ankles surgical scrubs with duct tape or elastic at wrists and ankles heavily-starched denim pants and shirts heavily-starched denim pants and shirts bib overalls with an over-sized shirt on top, and boots bib overalls with an over-sized shirt on top, and boots layers: baggy clothes over regular clothes with a bungee cord belt layers: baggy clothes over regular clothes with a bungee cord belt long-sleeved hoody and extra-long jeans long-sleeved hoody and extra-long jeans packable nylon rain gear packable nylon rain gear shorts and a tee-shirt with briefs (not boxers) I also promised you a report on the Bug Baffler. I’ve only worn it a few times, but I haven’t been stung so far. I like the cuffs at the wrists and ankles because they are tight enough to keep out the crawlers. And the best part: I can feel the breeze through the mesh. The Bug Baffler is hotter than wearing no protection, but much cooler than a cotton suit. The downside of the Bug Baffler is there are no pockets. But since my hive tool always fell out of my hive tool pocket anyway (due to the crotch being down around my knees somewhere), this is not much of a handicap. So far, I’m impressed. Click here to see the Bug Baffler Insect Protective Mesh Shirt. Rusty HoneyBeeSuite
We cannot agree about much in this country, but over the past few weeks we have formed a single united front in opposition to the scabs officiating our football games. The NFL referees are on strike and the league, being a trillion-dollar industry based on providing a product people actually enjoy watching, decided to hire a gaggle of "replacements" from the ranks of high school and small college (non-NCAA) officials. Since professional and amateur football have different rules – in some cases very different – the results have been predictably disastrous. From their failure to do basic things like spot the ball and operate the game clock to major rules of which they appear to be totally ignorant, they have proven thus far that there is nothing they can't botch. So why is this not reserved for NPF and the "Skip this if you hate sports" tag? You might think that a tiny light bulb is appearing over the heads of a lot of white American males – the only group that cast a majority of its votes for John McCain in 2008, and also the primary audience demographic of the NFL – as they realize: Hmm, maybe all human capital is not interchangeable, and maybe there are some noticeable downsides to a market in which whoever will work for the least gets the job. On the one hand, the scab referees are much cheaper than the unionized "real" refs. On the other hand, they are fucking terrible. On this point there is no disagreement. Applying this concept to other areas of the economy (replace "NFL ref" and "scab" with "union airplane mechanic" and "some guy in Alabama who took a 10-day training course and will work for United $11/hr") would be logical at this point, but I wonder to what extent this is sinking in with the great masses of people who spend Sundays in front of the TV appalled at the incompetence of these replacements. The evidence is right in front of us and it's bleedingly obvious – In a surplus labor market you can always find someone willing to do a job for less, but they're probably not going to do it well. Even the type of person who blames the work stoppage on the union – They're "greedy", after all – can't deny that the end result is the replacement of trained, experienced professionals with a clown car load of knuckleheads who act like they've never seen a football before. We (or at least half of us) continue to believe that everyone is easily replaced in this economy. If the teachers want too much money, just fire them all and bring in someone else. There are lots of unemployed people and, hell, anyone can teach high school! That we have evidence to the contrary provided by our new national pastime should, but probably will not, disabuse us of this notion.
Enterococcus faecalis is a Gram-positive constituent of the gastrointestinal microflora and a significant cause of nosocomial infections. E. faecalis and other enterococci are recalcitrant to many antimicrobial therapies due to innate and acquired resistance mechanisms. Enterococci also have the robust ability to survive harsh conditions and persist in the environment and within a host for prolonged periods. These attributes make enterococcal infections some of the most serious infectious diseases affecting humans. Although several genetic determinants that contribute to E. faecalis virulence have been characterized, the way in which E. faecalis adapts to and persists within a host during the course of infection is unknown. The goal of this application is to elucidate how E. faecalis responds to signals from a mammalian host during infection. The Specific Aims of this application are: 1) Identify the E. faecalis genes that are differentially expressed during experimental infections.;2) Test the role of 3 to 5 selected differentially regulated genes identified in Specific Aim 1 in E. faecalis pathogenesis.;and 3) Characterize the promoter region(s) of 1 to 3 selected genes of interest identified in Specific Aims 1 and 2. Recombinase-based in vivo expression technology and microarray analysis will be used to identify gene targets that are subject to transcriptional regulation during E. faecalis infection in rabbit models of subdermal abscess formation and infective endocarditis. The virulence of strains harboring in-frame deletions of selected genes will be assessed in the endocarditis model. Mapping the transcription start sites of in vivo expressed genes that contribute to endocarditis and developing transcriptional reporter gene fusions to measure promoter activity in vivo will facilitate future analyses of the regulation of these genes. This research will provide insight on how E. faecalis alters its physiology upon sensing the conditions in the host surroundings. The differentially expressed genes identified in this work may be useful targets for novel chemotherapeutic strategies to treat E. faecalis infection. PUBLIC HEALTH RELEVANCE: Enterococcus faecalis, a bacterial species that is frequently associated with antibiotic resistance, is a leading cause of hospital-acquired infections. This application will identify virulence-associated genes that undergo changes in expression during infection in order to gain insight into the ability of the organism to adapt to its surroundings and persist within a host.
About the Author Historian Christopher Hamner teaches at George Mason University, serves as Editor-in-Chief of Papers of the War Department, 1784-1800, and is the author of Enduring Battle: American Soldiers in Three Wars, 1776-1945. American Resistance to a Standing Army Question Quote from Madison: "The means of defence against foreign danger, have been always the instruments of tyranny at home. Among the Romans it was a standing maxim to excite a war, whenever a revolt was apprehended. Throughout all Europe, the armies kept up under the pretext of defending, have enslaved the people." I understand what he means, but can you give some specific examples of which events Madison was talking about. Can you give other ancient examples where foreign wars are used as a type of diversion? Answer In June of 1787, James Madison addressed the Constitutional Convention in Philadelphia on the dangers of a permanent army. “A standing military force, with an overgrown Executive will not long be safe companions to liberty,” he argued. “The means of defense against foreign danger, have been always the instruments of tyranny at home. Among the Romans it was a standing maxim to excite a war, whenever a revolt was apprehended. Throughout all Europe, the armies kept up under the pretext of defending, have enslaved the people.” That Madison, one of the most vocal proponents of a strong centralized government—an author of the Federalist papers and the architect of the Constitution—could evince such strongly negative feelings against a standing army highlights the substantial differences in thinking about national security in America between the 18th century and the 21st. While polls today generally indicate that Americans think of the military in glowing terms (rightly associating terms like “sacrifice,” “honor,” “valor,” and “bravery” with military service), Americans of the 18th century took a much dimmer view of the institution of a professional army. A near-universal assumption of the founding generation was the danger posed by a standing military force. Far from being composed of honorable citizens dutifully serving the interests of the nation, armies were held to be “nurseries of vice,” “dangerous,” and “the grand engine of despotism.” Samuel Adams wrote in 1776, such a professional army was, “always dangerous to the Liberties of the People.” Soldiers were likely to consider themselves separate from the populace, to become more attached to their officers than their government, and to be conditioned to obey commands unthinkingly. The power of a standing army, Adams counseled, “should be watched with a jealous Eye.” Experiences in the decades before the Constitutional Convention in 1787 reinforced colonists’ negative ideas about standing armies. Colonials who fought victoriously alongside British redcoats in the Seven Years’ War concluded that the ranks of British redcoats were generally filled with coarse, profane drunkards; even the successful conclusion of that conflict served to confirm colonists’ starkly negative attitudes towards the institution of a standing army. The British Crown borrowed massively to finance the conflict (the war doubled British debt, and by the late 1760s, fully half of British tax revenue went solely to pay the interest on those liabilities); in an effort to boost its revenues, Parliament began to pursue other sources of income in the colonies more aggressively. In the decade before the Declaration of Independence, Parliament passed a series of acts intended to raise money within the colonies. The power of a standing army, Adams counseled, “should be watched with a jealous Eye.” That legislation further aggravated colonists’ hostility towards the British Army. As tensions between the colonies and the crown escalated, many colonists came to view the British army as both a symbol and a cause of Parliament’s unpopular policies. Colonists viewed the various revenue-generating acts as necessitated by the staggering costs associated with maintaining a standing army. The Quartering Act, which required colonists to provide housing and provisions for troops in their own buildings, was another obnoxious symbol of the corrupting power represented by the army. Many colonists held the sentiment that the redcoats stationed in the colonies existed not to protect them but to enforce the king’s detestable policies at bayonet-point. No event crystallized colonists’ antagonism towards the British army more clearly than what became known as the Boston Massacre. In March 1770, British regulars fired into a crowd of civilians, killing five. That event provided all the proof the colonists needed of the true nature of the redcoats’ mission in the colonies. Six years later, the final draft of the Declaration of Independence contained numerous references to King George’s militarism (particularly his attempts to render the army independent of civilian authority, his insistence on quartering the troops among the people, and his importation of mercenaries to “compleat the works of death, desolation, and tyranny”); by the end of the War of Independence, hatred of a standing army had become a powerful and near-universal tradition among the American people; the professional British army was nothing less than a “conspiracy against liberty.” Colonists’ experiences with British troops, and the convictions that sprang from them, help explain Madison’s reference to armies having traditionally “enslaved” the people they were commissioned to defend. After winning their political independence, the victorious colonies faced the difficult task of providing for their own security in the context of a deep-seated distrust of a standing military. Madison’s language reflected a common concern that the maintenance of a standing army in the new United States would place [financial] burdens on the young government [of the United States]. Madison’s use of the imagery of slavery points to the multiple meanings of that term in the 18th century. In Madison’s statement to the Convention, it referred not to the literal notion of armies marching the citizenry through the streets in shackles but to a kind of metaphorical slavery. The immense costs necessary to raise and maintain a standing army (moneys required for pay, uniforms, rations, weapons, pensions, and so forth) would burden the populace with an immense and crippling tax burden that would require the government to confiscate more and more of the citizenry’s wealth in order to meet those massive expenses. Madison’s language reflected a common concern that the maintenance of a standing army in the new United States would place similar burdens on the young government; their experiences with the British army under Parliament in the 1760s and 1770s likewise led to concerns that the executive would use a standing army to force unpopular legislation on an unwilling public in similar fashion. Other members of the founding generation worried that an armed, professional force represented an untenable threat to the liberty of the people generally. Throughout history, the threat of military coup—governments deposed from within by the very forces raised to protect them—has been a frequent concern. In 1783, Continental Army officers encamped at Newburgh circulated documents that leveled a vague threat against Congress if the government continued its refusal to pay the soldiers. Historians generally conclude that a full-blown coup d’etat was never a realistic possibility, but the incident did little to assuage contemporary concerns about the dangers posed by a standing army. The experience with professional armies during the 40 years before the Constitutional Convention, and the values that sprang from those experiences, helps explain why the founders never seriously considered maintaining the Continental Army past the end of the War of Independence. The beliefs that grew organically from their experiences with the British also help explain Madison’s passionate anti-military rhetoric (he would later refer to the establishment of a standing army under the new Constitution as a “calamity,” albeit an inevitable one); together, they cast a long shadow over the debates surrounding the kind of military the new nation would provide for itself. The content of this website does not necessarily reflect the views or policies of the U.S. Department of Education nor does mention of trade names, commercial products, or organizations imply endorsement by the U.S. Government.
Kenneth Russell Unger Lieutenant (later rear admiral) Kenneth Russell Unger was an American World War I flying ace credited with fourteen aerial victories. His candidacy rejected by his own nation, Unger applied to the British Royal Flying Corps for military pilot training in June 1917. Once trained, he was assigned to the Royal Naval Air Service (RNAS). As the RNAS was merged into the Royal Air Force, Unger scored his aerial victories between 26 June and 1 November 1918. In later life, Unger remained involved in aviation and served again during World War II. He also joined the U.S. Navy Reserves, rising to the rank of rear admiral. Early training Unger took private instruction with the Aero Club of America, earning Certificate No. 1356. Nevertheless, the United States Air Service rejected him for enlistment, so he went to Canada to join the Royal Flying Corps in June 1917. Ironically, his RFC training took him back to Texas. He then transited England on his way to service with No. 10 Squadron RNAS, in France as a Sopwith Camel pilot. Aerial victories Unger opened his victory roll by sharing in a quadruple victory with Captain Lawrence Coombes and Lieutenant Ivan Sanderson; the trio shot down the distinctively marked Fokker D.VII of German naval ace Kurt Schönfelder, and drove down a D.VII and two Pfalz D.IIIs out of control on 26 June 1918. His next victory, when he drove down another Fokker D.VII, took place on 20 July. He scored again on 31 July, then took a break. He resumed with a win on 24 September and ran his total to thirteen by 30 October 1918. That was the sortie on which he took on seven enemy Fokkers despite his Sopwith Camel's engine running rough. Two days later, Lieutenant Unger became a balloon buster, destroying an enemy observation balloon. His final tally was seven enemy aircraft destroyed and seven driven down out of control; with the exception of the balloon and one observation plane, his victories were all over enemy fighters, principally Fokker D.VIIs. His reward for his efforts, a Distinguished Flying Cross, was not gazetted until 7 February 1919. Post World War I Postwar, Unger became a U. S. Air Mail pilot, flying the Oakland to Salt Lake City route. On 19 September 1927, he was reportedly on the brink on competition in an air derby in Spokane, Washington; after the derby, he was going to fly down the West Coast, across Panama, and up the Atlantic Coast in an amphibian. He also had his own aviation school at the Hadley Airport, where he performed in air shows. During one of his exhibitions in 1932, his airplane broke up but he parachuted to safety. Despite having 10,000 flying hours behind him, in April 1943 he was back in aviation school. He returned to service as a Lieutenant Commander in the U. S. Navy during February 1943; he flew transport planes. He eventually attained the rank of rear admiral in the Naval Reserve. He retired to Florida in 1958; he died there on 6 January 1979. See also List of World War I flying aces from the United States References Bibliography Above the Trenches: A Complete Record of the Fighter Aces and Units of the British Empire Air Forces 1915-1920 Christopher F. Shores, Norman L. R. Franks, Russell Guest. Grub Street, 1990. , . American Aces of World War I. Norman Franks, Harry Dempsey. Osprey Publishing, 2001. , . External links Category:American World War I flying aces Category:Aviators from New Jersey Category:1979 deaths Category:1898 births
# SOME DESCRIPTIVE TITLE. # Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER # This file is distributed under the same license as the PACKAGE package. # # Translators: # Translators: # dokterbob <mathijs@mathijsfietst.nl>, 2018 # Sophocles Tsivides <sophocles.tsivides@gmail.com>, 2017 msgid "" msgstr "" "Project-Id-Version: django-newsletter\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2020-02-20 12:07+0000\n" "PO-Revision-Date: 2020-02-20 12:07+0000\n" "Last-Translator: dokterbob <mathijs@mathijsfietst.nl>\n" "Language-Team: Greek (Greece) (http://www.transifex.com/dokterbob/django-newsletter/language/el_GR/)\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Language: el_GR\n" "Plural-Forms: nplurals=2; plural=(n != 1);\n" #: addressimport/parsers.py:40 #, python-format msgid "Entry '%s' does not contain a valid e-mail address." msgstr "Η καταχώρηση '%s' δεν περιέχει έγκυρη διεύθυνση e-mail." #: addressimport/parsers.py:55 #, python-format msgid "The address file contains duplicate entries for '%s'." msgstr "Το αρχείο διευθύνσεων περιέχει διπλές καταχωρήσεις για '%s΄." #: addressimport/parsers.py:69 msgid "Some entries are already subscribed to." msgstr "Ορισμένες καταχωρήσεις έχουν ήδη εγγραφεί." #: addressimport/parsers.py:108 #, python-format msgid "" "E-mail address %(email)s too long, maximum length is %(email_length)s " "characters." msgstr "Η διεύθυνση e-mail %(email)s είναι πολύ μεγάλη, το μέγιστος μήκος είναι %(email_length)s χαρακτήρες." #: addressimport/parsers.py:135 #, python-format msgid "Name %(name)s too long, maximum length is %(name_length)s characters." msgstr "Το όνομα %(name)s είναι πολύ μεγάλο, το μέγιστος μήκος είναι %(name_length)s χαρακτήρες." #: addressimport/parsers.py:196 addressimport/parsers.py:208 #: addressimport/parsers.py:243 models.py:147 msgid "name" msgstr "όνομα" #: addressimport/parsers.py:200 msgid "display" msgstr "προβολή" #: addressimport/parsers.py:207 #, python-format msgid "" "Name column not found. The name of this column should be either 'name' or " "'%s'." msgstr "Δεν βρέθηκε στήλη ονόματος. Το όνομα αυτής της στήλης πρέπει να είναι είτε 'όνομα' είτε '%s'." #: addressimport/parsers.py:219 addressimport/parsers.py:231 #: addressimport/parsers.py:244 forms.py:44 forms.py:79 forms.py:134 #: models.py:41 models.py:161 msgid "e-mail" msgstr "e-mail" #: addressimport/parsers.py:229 #, python-format msgid "" "E-mail column not found. The name of this column should be either 'email', " "'e-mail' or '%(email)s'." msgstr "Δεν βρέθηκε στήλη e-mail. Το όνομα αυτής της στήλης πρέπει να είναι είτε 'e-mail' είτε '%(email)s'." #: addressimport/parsers.py:239 #, python-format #| msgid "" #| "not properly determine the proper columns in the CSV-file. There uld be aeld" #| " called 'name' or '%(name)s' and one called 'e-mail' or e-mail)s'." msgid "" "Could not properly determine the proper columns in the CSV-file. There " "should be a field called 'name' or '%(name)s' and one called 'e-mail' or " "'%(email)s'." msgstr "" #: addressimport/parsers.py:264 #, python-format msgid "Row with content '%(row)s' does not contain a name and email field." msgstr "Η σειρά με περιεχόμενο '%(row)s' δεν περιέχει πεδίο ονόματος και e-mail." #: addressimport/parsers.py:290 #, python-format msgid "Error reading vCard file: %s" msgstr "Σφάλμα ανάγνωσης αρχείου vCard: %s" #: addressimport/parsers.py:309 #, python-format msgid "Entry '%s' contains no email address." msgstr "Η καταχώρηση '%s' δεν περιέχει διεύθυνση e-mail." #: addressimport/parsers.py:345 msgid "Some entries have no e-mail address." msgstr "Ορισμένες καταχωρήσεις δεν έχουν διεύθυνση e-mail." #: admin.py:79 msgid "Messages" msgstr "Μηνύματα" #: admin.py:83 #: templates/admin/newsletter/subscription/confirmimportform.html:16 #: templates/admin/newsletter/subscription/importform.html:16 msgid "Subscriptions" msgstr "Συνδρομές" #: admin.py:87 msgid "Submissions" msgstr "Υποβολές" #: admin.py:99 models.py:104 models.py:281 models.py:458 models.py:673 msgid "newsletter" msgstr "ενημερωτικό δελτίο" #: admin.py:117 models.py:528 msgid "submission" msgstr "υποβολή" #: admin.py:124 msgid "publish date" msgstr "ημερομηνία δημοσίευσης" #: admin.py:154 msgid "Sent." msgstr "Απεστάλη." #: admin.py:157 msgid "Delayed submission." msgstr "Καθυστερημένη υποβολή." #: admin.py:159 msgid "Submitting." msgstr "Υποβολή." #: admin.py:161 msgid "Not sent." msgstr "Δεν απεστάλη." #: admin.py:162 admin.py:389 admin_forms.py:115 msgid "Status" msgstr "Κατάσταση" #: admin.py:169 msgid "Submission already sent." msgstr "Η υποβολή έχει ήδη σταλεί." #: admin.py:178 msgid "Your submission is being sent." msgstr "Η υποβολή σας αποστέλλεται." #: admin.py:225 msgid "Optional" msgstr "Προαιρετικό" #: admin.py:253 models.py:425 models.py:469 models.py:677 msgid "message" msgstr "μήνυμα" #: admin.py:258 templates/admin/newsletter/message/change_form.html:8 #: templates/admin/newsletter/message/preview.html:13 msgid "Preview" msgstr "Προεπισκόπηση" #: admin.py:275 views.py:611 msgid "" "No HTML template associated with the newsletter this message belongs to." msgstr "Δεν υπάρχει πρότυπο HTML που να σχετίζεται με το newsletter στο οποίο ανήκει αυτό το μήνυμα." #: admin.py:384 admin_forms.py:103 msgid "Subscribed" msgstr "Εγγεγραμμένος" #: admin.py:386 admin_forms.py:104 msgid "Unsubscribed" msgstr "Έχει διαγραφεί" #: admin.py:388 msgid "Unactivated" msgstr "Μη ενεργοποιημένος" #: admin.py:396 models.py:295 msgid "subscribe date" msgstr "ημερομηνία εγγραφής" #: admin.py:403 models.py:303 msgid "unsubscribe date" msgstr "ημερομηνία διαγραφής" #: admin.py:411 #, python-format msgid "%d user has been successfully subscribed." msgid_plural "%d users have been successfully subscribed." msgstr[0] " %dχρήστες έχουν εγγραφεί επιτυχώς. " msgstr[1] " %dχρήστες έχουν εγγραφεί επιτυχώς." #: admin.py:416 msgid "Subscribe selected users" msgstr "Εγγραφή επιλεγμένων χρηστών" #: admin.py:423 #, python-format msgid "%d user has been successfully unsubscribed." msgid_plural "%d users have been successfully unsubscribed." msgstr[0] "%dχρήστες έχουν διαγραφεί επιτυχώς. " msgstr[1] "%dχρήστες έχουν διαγραφεί επιτυχώς. " #: admin.py:428 msgid "Unsubscribe selected users" msgstr "Διαγραφή επιλεγμένων χρηστών" #: admin.py:484 #, python-format msgid "%d subscription has been successfully added." msgid_plural "%d subscriptions have been successfully added." msgstr[0] "%d συνδρομές προστέθηκαν επιτυχώς." msgstr[1] "%d συνδρομές προστέθηκαν επιτυχώς." #: admin_forms.py:43 #, python-format msgid "File type '%s' was not recognized." msgstr "Ο τύπος αρχείου '%s' δεν αναγνωρίστηκε." #: admin_forms.py:60 #, python-format msgid "File extension '%s' was not recognized." msgstr "Η επέκταση αρχείου '%s' δεν αναγνωρίστηκε." #: admin_forms.py:64 msgid "No entries could found in this file." msgstr "Σε αυτό το αρχείο δεν βρέθηκαν καταχωρήσεις." #: admin_forms.py:72 #: templates/admin/newsletter/subscription/confirmimportform.html:12 #: templates/admin/newsletter/subscription/importform.html:12 #: templates/newsletter/common.html:6 #: templates/newsletter/newsletter_detail.html:10 #: templates/newsletter/newsletter_list.html:14 #: templates/newsletter/newsletter_list.html:32 #: templates/newsletter/subscription_activate.html:5 #: templates/newsletter/subscription_activate.html:8 #: templates/newsletter/subscription_subscribe_activated.html:5 #: templates/newsletter/subscription_subscribe_activated.html:8 #: templates/newsletter/subscription_unsubscribe_activated.html:5 #: templates/newsletter/subscription_unsubscribe_activated.html:8 #: templates/newsletter/subscription_update_activated.html:5 #: templates/newsletter/subscription_update_activated.html:8 msgid "Newsletter" msgstr "Newsletter" #: admin_forms.py:75 msgid "Address file" msgstr "Διεύθυνση αρχείου" #: admin_forms.py:77 msgid "Ignore non-fatal errors" msgstr "Αγνοήστε τα μη μοιραία σφάλματα" #: admin_forms.py:88 msgid "You should confirm in order to continue." msgstr "Θα πρέπει να επιβεβαιώσετε για να συνεχίσετε." #: admin_forms.py:91 #: templates/admin/newsletter/subscription/confirmimportform.html:23 #: templates/admin/newsletter/subscription/confirmimportform.html:28 msgid "Confirm import" msgstr "Επιβεβαίωση εισαγωγής" #: admin_forms.py:121 admin_forms.py:129 msgid "If a user has been selected this field should remain empty." msgstr "Εάν έχει επιλεγεί χρήστης, αυτό το πεδίο πρέπει να παραμείνει κενό." #: admin_forms.py:139 msgid "Either a user must be selected or an email address must be specified." msgstr "Πρέπει να επιλεγεί ένας χρήστης ή να οριστεί μια διεύθυνση e-mail." #: admin_forms.py:164 msgid "" "This message has already been published in some other submission. Messages " "can only be published once." msgstr "Αυτό το μήνυμα έχει ήδη δημοσιευθεί σε κάποια άλλη υποβολή. Τα μηνύματα μπορούν να δημοσιεύονται μόνο μία φορά." #: admin_utils.py:25 #, python-format #| msgid "%(name)s object with primary key %(key)r does not exist." msgid "%(name)s object with primary key '%(key)s' does not exist." msgstr "" #: forms.py:59 msgid "Your e-mail address has already been subscribed to." msgstr "Η διεύθυνση e-mail σας έχει ήδη εγγραφεί." #: forms.py:88 msgid "This subscription has not yet been activated." msgstr "Αυτή η συνδρομή δεν έχει ενεργοποιηθεί ακόμα." #: forms.py:106 msgid "This e-mail address has not been subscribed to." msgstr "Αυτή η διεύθυνση e-mail δεν έχει εγγραφεί." #: forms.py:121 msgid "This subscription has already been unsubscribed from." msgstr "Αυτή η συνδρομή έχει ήδη διαγραφεί." #: forms.py:142 msgid "The validation code supplied by you does not match." msgstr "Ο κωδικός επικύρωσης που εισήχθη από εσάς δεν ταιριάζει." #: forms.py:148 msgid "Activation code" msgstr "Κωδικός ενεργοποίησης" #: management/commands/submit_newsletter.py:14 msgid "Submit pending messages." msgstr "" #: management/commands/submit_newsletter.py:30 msgid "Submitting queued newsletter mailings" msgstr "Υποβολή ουράς αναμονής αποστολής newsletter" #: models.py:36 msgid "newsletter title" msgstr "τίτλος newsletter" #: models.py:41 msgid "Sender e-mail" msgstr "E-mail αποστολέα" #: models.py:44 msgid "sender" msgstr "αποστολέας" #: models.py:44 msgid "Sender name" msgstr "Όνομα αποστολέα" #: models.py:48 msgid "visible" msgstr "ορατό" #: models.py:52 msgid "send html" msgstr "αποστολή html" #: models.py:53 msgid "Whether or not to send HTML versions of e-mails." msgstr "Να αποστέλλονται ή όχι e-mails σε έκδοση HTML." #: models.py:105 msgid "newsletters" msgstr "newsletters" #: models.py:141 msgid "user" msgstr "χρήστης" #: models.py:147 msgid "optional" msgstr "προαιρετικό" #: models.py:191 #, python-format msgid "Updated subscription %(subscription)s to %(action)s." msgstr "Ενημερώθηκε η συνδρομή %(subscription)s σε %(action)s." #: models.py:232 msgid "Neither an email nor a username is set. This asks for inconsistency!" msgstr "Δεν έχει οριστεί ούτε e-mail ούτε ένα όνομα χρήστη. Αυτό είναι ασυνέπεια!" #: models.py:236 msgid "If user is set, email must be null and vice versa." msgstr "Εάν έχει οριστεί χρήστης, το e-mail πρέπει να είναι κενό και αντίστροφα." #: models.py:278 msgid "IP address" msgstr "Διεύθυνση IP" #: models.py:287 msgid "activation code" msgstr "κωδικός ενεργοποίησης" #: models.py:292 msgid "subscribed" msgstr "εγγεγραμμένος" #: models.py:300 msgid "unsubscribed" msgstr "διαγραμμένος" #: models.py:308 #, python-format msgid "%(name)s <%(email)s> to %(newsletter)s" msgstr "%(name)s<%(email)s σε %(newsletter)s" #: models.py:315 #, python-format msgid "%(email)s to %(newsletter)s" msgstr "%(email)s σε %(newsletter)s" #: models.py:321 msgid "subscription" msgstr "συνδρομή" #: models.py:322 msgid "subscriptions" msgstr "συνδρομές" #: models.py:404 msgid "" "Sort order determines the order in which articles are concatenated in a " "post." msgstr "Η σειρά ταξινόμησης καθορίζει τη σειρά με την οποία τα άρθρα συνδέονται σε μια δημοσίευση." #: models.py:406 msgid "sort order" msgstr "σειρά ταξινόμησης" #: models.py:409 models.py:454 msgid "title" msgstr "τίτλος" #: models.py:410 msgid "text" msgstr "κείμενο" #: models.py:413 msgid "link" msgstr "σύνδεσμος" #: models.py:419 msgid "image" msgstr "εικόνα" #: models.py:431 msgid "article" msgstr "άρθρο" #: models.py:432 msgid "articles" msgstr "άρθρα" #: models.py:455 msgid "slug" msgstr "τίτλος" #: models.py:462 msgid "created" msgstr "δημιουργήθηκε" #: models.py:465 msgid "modified" msgstr "τροποποιήθηκε" #: models.py:470 msgid "messages" msgstr "μηνύματα" #: models.py:475 #, python-format msgid "%(title)s in %(newsletter)s" msgstr "%(title)s σε %(newsletter)s" #: models.py:529 msgid "submissions" msgstr "υποβολές" #: models.py:532 #, python-format msgid "%(newsletter)s on %(publish_date)s" msgstr "%(newsletter)s σε %(publish_date)s" #: models.py:551 #, python-format msgid "Submitting %(submission)s to %(count)d people" msgstr "Υποβάλλονται %(submission)s σε %(count)d άτομα" #: models.py:610 #, python-format msgid "Submitting message to: %s." msgstr "Υποβολή μηνύματος σε: %s." #: models.py:619 #, python-format msgid "Message %(subscription)s failed with error: %(error)s" msgstr "Το μήνυμα %(subscription)sαπέτυχε με σφάλμα: %(error)s" #: models.py:637 #, python-format msgid "Submission of message %s" msgstr "Υποβολή μηνύματος %s" #: models.py:683 msgid "" "If you select none, the system will automatically find the subscribers for " "you." msgstr "Εάν δεν επιλέξετε κανένα, το σύστημα θα εντοπίσει αυτόματα τους συνδρομητές για εσάς." #: models.py:685 msgid "recipients" msgstr "παραλήπτες" #: models.py:690 msgid "publication date" msgstr "ημερομηνία δημοσίευσης" #: models.py:694 msgid "publish" msgstr "δημοσίευση" #: models.py:695 msgid "Publish in archive." msgstr "Δημοσίευση στο αρχείο." #: models.py:699 msgid "prepared" msgstr "ετοιμάστηκε" #: models.py:703 msgid "sent" msgstr "απεστάλη" #: models.py:707 msgid "sending" msgstr "αποστέλλεται" #: templates/admin/newsletter/message/preview.html:5 #: templates/admin/newsletter/message/preview.html:19 msgid "Preview message" msgstr "Προεπισκόπηση μηνύματος" #: templates/admin/newsletter/message/preview.html:9 #: templates/admin/newsletter/subscription/confirmimportform.html:8 #: templates/admin/newsletter/subscription/importform.html:8 msgid "Home" msgstr "Κεντρική σελίδα" #: templates/admin/newsletter/message/preview.html:11 msgid "Message" msgstr "Μήνυμα" #: templates/admin/newsletter/message/preview.html:22 #: templates/admin/newsletter/subscription/importform.html:28 msgid "Change" msgstr "Αλλαγή" #: templates/admin/newsletter/message/preview.html:23 #: templates/admin/newsletter/subscription/importform.html:29 msgid "Create submission" msgstr "Δημιουργία υποβολής" #: templates/admin/newsletter/message/preview.html:26 msgid "HTML" msgstr "HTML" #: templates/admin/newsletter/message/preview.html:30 msgid "Text" msgstr "Κείμενο" #: templates/admin/newsletter/submission/change_form.html:16 msgid "Submit" msgstr "Υποβολή" #: templates/admin/newsletter/subscription/change_list.html:5 msgid "Import" msgstr "Εισαγωγή" #: templates/admin/newsletter/subscription/confirmimportform.html:3 #: templates/admin/newsletter/subscription/confirmimportform.html:20 #: templates/admin/newsletter/subscription/importform.html:3 #: templates/admin/newsletter/subscription/importform.html:19 #: templates/admin/newsletter/subscription/importform.html:24 msgid "Import addresses" msgstr "Εισαγωγή διευθύνσεων" #: templates/admin/newsletter/subscription/confirmimportform.html:40 msgid "Confirm" msgstr "Επιβεβαίωση" #: templates/admin/newsletter/subscription/importform.html:37 msgid "Upload" msgstr "Μεταφόρτωση" #: templates/newsletter/message/message.html:21 msgid "Read more" msgstr "" #: templates/newsletter/message/message.html:27 msgid "Read message online" msgstr "" #: templates/newsletter/message/message.html:29 #: templates/newsletter/newsletter_detail.html:21 #: templates/newsletter/subscription_unsubscribe.html:23 #: templates/newsletter/subscription_unsubscribe_user.html:23 msgid "Unsubscribe" msgstr "Διαγραφή" #: templates/newsletter/message/message.txt:15 msgid "Unsubscribe:" msgstr "" #: templates/newsletter/message/subscribe.html:6 #, python-format msgid "Subscription to %(title)s" msgstr "" #: templates/newsletter/message/subscribe.html:10 #: templates/newsletter/message/subscribe.txt:1 #: templates/newsletter/message/unsubscribe.html:9 #: templates/newsletter/message/unsubscribe.txt:1 #: templates/newsletter/message/update.html:9 #: templates/newsletter/message/update.txt:1 msgid "Sir/Madam" msgstr "" #: templates/newsletter/message/subscribe.html:10 #: templates/newsletter/message/subscribe.txt:1 #, python-format msgid "" "Dear %(name)s,\n" "\n" "you, or someone in your name requested a subscription to %(title)s.\n" "\n" "If you would like to confirm your subscription, please follow this activation link:\n" "http://%(domain)s%(url)s\n" "\n" "Kind regards," msgstr "" #: templates/newsletter/message/subscribe_subject.txt:1 msgid "Confirm subscription" msgstr "" #: templates/newsletter/message/unsubscribe.html:6 #, python-format msgid "Unsubscription from %(title)s" msgstr "" #: templates/newsletter/message/unsubscribe.html:9 #: templates/newsletter/message/unsubscribe.txt:1 #, python-format msgid "" "Dear %(name)s,\n" "\n" "you, or someone in your name requested unsubscription from %(title)s.\n" "\n" "If you would like to confirm your unsubscription, please follow this activation link:\n" "http://%(domain)s%(url)s\n" "\n" "Kind regards," msgstr "" #: templates/newsletter/message/unsubscribe_subject.txt:1 msgid "Confirm unsubscription" msgstr "" #: templates/newsletter/message/update.html:6 #, python-format msgid "Update of subscription to %(title)s" msgstr "" #: templates/newsletter/message/update.html:9 #: templates/newsletter/message/update.txt:1 #, python-format msgid "" "Dear %(name)s,\n" "\n" "you, or someone in your name requested updating your personal information for %(title)s.\n" "\n" "To make changes to your information in our database, please follow this activation link:\n" "http://%(domain)s%(url)s\n" "\n" "Kind regards," msgstr "" #: templates/newsletter/message/update_subject.txt:1 msgid "Update information" msgstr "" #: templates/newsletter/newsletter_detail.html:5 msgid "Newsletter detail" msgstr "Λεπτομέρειες newsletter" #: templates/newsletter/newsletter_detail.html:13 #: templates/newsletter/newsletter_list.html:16 #: templates/newsletter/subscription_subscribe.html:23 #: templates/newsletter/subscription_subscribe_user.html:22 msgid "Subscribe" msgstr "Εγγραφή" #: templates/newsletter/newsletter_detail.html:17 msgid "Update" msgstr "" #: templates/newsletter/newsletter_detail.html:24 msgid "Archive" msgstr "" #: templates/newsletter/newsletter_detail.html:27 #: templates/newsletter/submission_archive.html:18 msgid "Back to list" msgstr "" #: templates/newsletter/newsletter_list.html:5 msgid "Newsletter list" msgstr "Λίστα newsletter" #: templates/newsletter/newsletter_list.html:27 msgid "Update subscriptions" msgstr "Ενημέρωση συνδρομών" #: templates/newsletter/submission_archive.html:5 #: templates/newsletter/submission_archive.html:10 msgid "Newsletter archive" msgstr "Αρχείο newsletter" #: templates/newsletter/subscription_activate.html:5 #: templates/newsletter/subscription_activate.html:8 #: templates/newsletter/subscription_subscribe_activated.html:5 #: templates/newsletter/subscription_subscribe_activated.html:8 #: templates/newsletter/subscription_unsubscribe_activated.html:5 #: templates/newsletter/subscription_unsubscribe_activated.html:8 #: templates/newsletter/subscription_update_activated.html:5 #: templates/newsletter/subscription_update_activated.html:8 msgid "activate" msgstr "ενεργοποίηση" #: templates/newsletter/subscription_activate.html:13 msgid "Activate" msgstr "Ενεργοποίηση" #: templates/newsletter/subscription_subscribe.html:5 #: templates/newsletter/subscription_subscribe.html:8 #: templates/newsletter/subscription_subscribe_email_sent.html:5 #: templates/newsletter/subscription_subscribe_email_sent.html:8 #: templates/newsletter/subscription_subscribe_user.html:5 #: templates/newsletter/subscription_subscribe_user.html:8 msgid "Newsletter subscribe" msgstr "Εγγραφή στο newsletter" #: templates/newsletter/subscription_subscribe.html:11 #: templates/newsletter/subscription_unsubscribe.html:11 #: templates/newsletter/subscription_update.html:11 msgid "" "Due to a technical error we were not able to submit your confirmation email." " This could be because your email address is invalid." msgstr "Λόγω τεχνικού σφάλματος, δεν ήταν δυνατή η υποβολή του e-mail επιβεβαίωσης. Αυτό μπορεί να οφείλεται στο γεγονός ότι η διεύθυνση e-mail σας δεν είναι έγκυρη." #: templates/newsletter/subscription_subscribe_activated.html:10 msgid "Your subscription has successfully been activated." msgstr "Η συνδρομή σας έχει ενεργοποιηθεί με επιτυχία." #: templates/newsletter/subscription_subscribe_email_sent.html:10 msgid "" "Your subscription request was successfully received and an activation email " "has been sent to you. In that email you will find a link which you need to " "follow in order to activate your subscription." msgstr "Το αίτημα συνδρομής σας λήφθηκε με επιτυχία και εστάλη e-mail ενεργοποίησης. Σε αυτό το e-mail θα βρείτε έναν σύνδεσμο που πρέπει να ακολουθήσετε για να ενεργοποιήσετε τη συνδρομή σας." #: templates/newsletter/subscription_subscribe_user.html:19 msgid "Do you want to subscribe to this newsletter?" msgstr "Θέλετε να εγγραφείτε σε αυτό το newsletter;" #: templates/newsletter/subscription_unsubscribe.html:5 #: templates/newsletter/subscription_unsubscribe.html:8 #: templates/newsletter/subscription_unsubscribe_email_sent.html:5 #: templates/newsletter/subscription_unsubscribe_email_sent.html:8 #: templates/newsletter/subscription_unsubscribe_user.html:5 #: templates/newsletter/subscription_unsubscribe_user.html:8 msgid "Newsletter unsubscribe" msgstr "Διαγραφή από το newsletter" #: templates/newsletter/subscription_unsubscribe_activated.html:10 msgid "You have successfully been unsubscribed." msgstr "Έχετε καταργήσει την εγγραφή σας με επιτυχία." #: templates/newsletter/subscription_unsubscribe_email_sent.html:10 msgid "" "Your unsubscription request has successfully been received. An email has " "been sent to you with a link you need to follow in order to confirm your " "unsubscription." msgstr "Το αίτημά σας για κατάργηση εγγραφής έχει ληφθεί με επιτυχία. Σας έχει σταλεί ένα e-mail με έναν σύνδεσμο που πρέπει να ακολουθήσετε για να επιβεβαιώσετε την κατάργηση της εγγραφής σας." #: templates/newsletter/subscription_unsubscribe_user.html:20 msgid "Do you want to unsubscribe from this newsletter?" msgstr "Θέλετε να διαγραφείτε από αυτό το newsletter;" #: templates/newsletter/subscription_update.html:5 #: templates/newsletter/subscription_update.html:8 #: templates/newsletter/subscription_update_email_sent.html:5 #: templates/newsletter/subscription_update_email_sent.html:8 msgid "Newsletter update" msgstr "Ενημέρωση newsletter" #: templates/newsletter/subscription_update.html:23 msgid "Update subscription" msgstr "Ενημέρωση συνδρομής" #: templates/newsletter/subscription_update_activated.html:10 msgid "Your subscription has successfully been updated." msgstr "Η συνδρομή σας έχει ενημερωθεί με επιτυχία." #: templates/newsletter/subscription_update_email_sent.html:10 msgid "" "Your update request was successfully received and an activation email has " "been sent to you. In that email you will find a link which you need to " "follow in order to update your subscription." msgstr "Η αίτησή σας για ενημέρωση λήφθηκε με επιτυχία και εστάλη ένα e-mail ενεργοποίησης. Σε αυτό το e-mail θα βρείτε έναν σύνδεσμο που πρέπει να ακολουθήσετε για να ενημερώσετε τη συνδρομή σας." #: templates/widget/image.html:2 msgid "Currently:" msgstr "Επί του παρόντος:" #: templates/widget/image.html:4 msgid "Change:" msgstr "Αλλαγή:" #: validators.py:15 #, python-format msgid "" "The e-mail address '%(email)s' belongs to a user with an account on this " "site. Please log in as that user and try again." msgstr "Η διεύθυνση e-mail '%(email)s' ανήκει σε χρήστη με λογαριασμό σε αυτόν τον ιστότοπο. Συνδεθείτε ως αυτός ο χρήστης και δοκιμάστε ξανά." #: views.py:120 msgid "Your changes have been saved." msgstr "Οι αλλαγές σας έχουν αποθηκευτεί." #: views.py:311 #, python-format msgid "You have been subscribed to %s." msgstr "Έχετε εγγραφεί στο %s." #: views.py:315 #, python-format msgid "User %(rs)s subscribed to %(my_newsletter)s." msgstr "Ο χρήστης %(rs)sέχει εγγραφεί στο %(my_newsletter)s." #: views.py:325 #, python-format msgid "You are already subscribed to %s." msgstr "Έχετε ήδη εγγραφεί στο %s." #: views.py:350 #, python-format msgid "You have been unsubscribed from %s." msgstr "Έχετε καταργηθεί η εγγραφή από το %s." #: views.py:354 #, python-format msgid "User %(rs)s unsubscribed from %(my_newsletter)s." msgstr "Ο χρήστης %(rs)sέχει διαγραφεί από το %(my_newsletter)s." #: views.py:367 #, python-format msgid "You are not subscribed to %s." msgstr "Δεν έχετε εγγραφεί στο %s."
Last month -- Women's History Month- - I was struck by an exchange between Sheryl Sandberg and Gloria Steinem at the Women in the World Conference because I felt it captured important generational difference among feminists. Business Insider reported that Sandberg asked Steinem if we're in the midst of a stalled revolution for women. In other words, since the late-1960's, women have seized opportunities and moved into all arenas of public life, but the percentage of women at the top has stayed between 15-18% for years. In no sector of public life -- including the nonprofit arena -- have women reached even 20% of the top positions consistently. To Sandberg, that was a sign of being stuck. But not to Steinem. Steinem argued that women are "at a critical mass stage" and getting more resistance. She further argued that revolutions create new kinds of work and new positions, rather than focusing on the positions that men have held in culture. Are these actually very different, and generational, views on what the revolution for women is about? Steinem, who just turned 78 last month, has argued that feminism is a worldview that advocates for the complete end of hierarchy. Fundamentally, this is the goal of the revolution. Her passionate commitment to end the ways that we hold one group of people above or over another -- in terms of gender, race, class, sexual orientation or physical abilities -- has been such a powerful and revolutionary force toward recognizing our shared humanity. The movement, and ethos, for which Steinem has been such an inspiring advocate has actually produced new positions and new types of work. The entire field of victim services, such as rape crisis centers and all of the counseling and advocacy services to address the damage done by domination have been the result of the push for equality of rights, dignity and personhood. These movements, despite the waves of collective action that brought them forward, tend to be very individualistic: each of us should be free to make our own choices, and that choice is sacrosanct. In other words, your truth is the only truth for you. Paradoxically, this individualism makes further and ongoing collective action extremely difficult. While I don't know Steinem's views on this, many advocates of egalitarianism who want to end hierarchy of any kind, find themselves stuck when it comes to imagining how our society will move forward. They find themselves, overtly or subtly, advocating a return to some idealized version of the past where we all lived in small villages and elected our own village council. I find this kind of thinking -- one that often goes along with the idea that we are on the verge of some enormous shift brought about by calamity or designed to fix all of our problems -- to typically come from Boomers. Sandberg, on the other hand, is 42 and Gen X. Growing up in the wake of the feminist movement that Steinem was the spokesperson for, she and her generation came of age in what was constantly called by the media a "post-feminist" world. The world is your oyster, girls! All of the hard work wedging the doors open had been done, and now it was time to walk through. Sandberg's own life is a testament to that. Even as Sandberg has climbed the corporate ladder, she has reached out to lift other women and to create ways for the businesses that she's been part of to give back. (She played a critical role in launching Google's philanthropic arm.) It's also important to note that Google and Facebook have catalyzed real revolution by giving those who have been oppressed and denied their basic rights access to information and the capacity to communicate outside the channels of usual power. The uprisings in the Middle East couldn't have happened without these new technologies. AND they are a corporation that functions through hierarchy. Sandberg's question about a stalled revolution because too few women have reached the top suggests that she sees that women need to be at the table participating in the decision-making process in order to create a world in which human dignity is never thwarted. It would be easy to call Sandberg a reformer and Steinem the revolutionary, as I might have done years ago. But I question that now. The pluralistic egalitarian revolution that Steinem has done so much to bring about has not finished bringing dignity to all of humanity -- and it needs to continue. But it won't be able to do that without some sort of hierarchical systems and governance to make that possible -- even the women's movement had that! Equally important, and particularly in regard to educated Western women, I see differences between these two incredible women in where they look for change. From my work with women, I see that Boomers, like Steinem, tend to look outward and argue that the system is the cause of our subordination and victimization. Men in patriarchy do these things to women. It's not our fault! There is often a clinging to an identity as victim, in blatant and subtle ways. Certainly, women are victimized and there is no excuse for that. Yet, in terms of a pattern in culture and in our psyches, we have to realize that it takes two to tango. Men and women have been a matched set in culture--domination depends on subordination, and we women too often consciously or unconsciously are willing to defer...often for the sake of maintaining our relationships. Sandberg, and Gen X women generally, see that we women need to change in order for us to have a seat at the table of power and affect the decisions that are made. Moreover, many women have said to me that it's often men who are holding the doors open for women, encouraging them to enter, not other women. That, too, is a pattern that we need to break within ourselves. I am very inspired by the willingness of more and more Gen X women to take responsibility for how we women contribute to the ways that power continues to be held by the usual suspects. It's a refreshing and empowering act that in itself steps beyond the victim/subordinate paradigm. And transcending that pattern in ourselves is the only way that we are ever going to really become players in creating a culture in which all human beings are granted dignity and respect. Which would truly be revolutionary. ___________________________________ Check out a real range of women who are seeking change at The Inspiring Women Summit--a free virtual event.
--- abstract: 'We study invariance of multiplicity of complex analytic germs and degree of complex affine sets under outer bi-Lipschitz transformations (outer bi-Lipschitz homeomorphims of germs in the first case and outer bi-Lipschitz homeomorphims at infinity in the second case). We prove that invariance of multiplicity in the local case is equivalent to invariance of degree in the global case. We prove invariance for curves and surfaces. In the way we prove invariance of the tangent cone and relative multiplicities at infinity under outer bi-Lipschitz homeomorphims at infinity, and that the abstract topology of a homogeneous surface germ determines its multiplicity.' address: - 'Javier Fernández de Bobadilla: (1) IKERBASQUE, Basque Foundation for Science, Maria Diaz de Haro 3, 48013, Bilbao, Bizkaia, Spain (2) BCAM Basque Center for Applied Mathematics, Mazarredo 14, E48009 Bilbao, Basque Country, Spain ' - 'Alexandre  Fernandes and J. Edson  Sampaio - Departamento de Matemática, Universidade Federal do Ceará, Rua Campus do Pici, s/n, Bloco 914, Pici, 60440-900, Fortaleza-CE, Brazil' author: - Javier Fernández de Bobadilla - Alexandre Fernandes - 'J. Edson Sampaio' title: 'Multiplicity and degree as bi-Lipschitz invariants for complex sets' --- [^1] Introduction ============ We study invariance of multiplicity of complex analytic germs and degree of complex affine sets under outer bi-Lipschitz transformations: outer bi-Lipschitz homeomorphisms of germs in the first case and outer bi-Lipschitz homeomorphisms at infinity in the second case (see Definition \[def\_inf\]). The local problem may be seen as a bi-Lipschitz version of Zariski multiplicity problem [@Zariski:1971], that asks whether the embedded topology of complex hypersurface germs determine their multiplicity. It is well known that the abstract topological type of hypersurface germs (i.e the topology of the intersection of the germs with a smal ball) does not determine the multiplicity. This is clear for curves, since their abstract topology is too simple, but also in the case of surfaces, where the abstract topology is very rich, examples are known (see Example 2.22 at [@Nemethi:1999]). In contrast with this situation we conjecture, as we will make precise shortly, that the local and at infinity outer bi-Lipschitz geometry (which does not take into account the embedding) determine the multiplicity and degree of complex sets respectively. It is known that the inner bi-Lipschitz geometry does not determine multiplicity (for example complex curves). 1. [**Conjecture Ã1($d$)**]{} Let $X\subset {\mathbb{C}}^n$ and $Y\subset {\mathbb{C}}^m$ be two complex analytic sets with $\dim X=\dim Y=d$. If their germs at $0\in{\mathbb{C}}^n$ and $0\in{\mathbb{C}}^m$, respectively, are outer bi-Lipschitz homeomorphic, i.e. there exists an outer bi-Lipschitz homeomorphism $\varphi\colon (X,0)\to (Y,0)$, then their multiplicities $m(X,0)$ and $m(Y,0)$ are equal. 2. [**Conjecture A1($d$)**]{} Let $X\subset {\mathbb{C}}^n$ and $Y\subset {\mathbb{C}}^m$ be two complex algebraic sets with $\dim X=\dim Y=d$. If $X$ and $Y$ are outer bi-Lipschitz homeomorphic at infinity (see Definition \[def\_inf\]), then we have the equality ${\rm deg}(X)={\rm deg}(Y)$. Conjecture Ã1($d$) was approached by some authors. G. Comte [@Comte:1998] proved that the multiplicity of complex analytic germs is invariant under outer bi-Lipschitz homeomorphism with Lipschitz constants close enough to 1 (this is a severe assumption). Neumann and Pichon in [@N-P], with previous contributions of Pham and Teissier in [@P-T] and Fernandes in [@F], proved that the outer bi-Lipschitz geometry of plane curves determine the Puiseux pairs, and as a consequence proved Ã1($1$). More recently, W. Neumann and A. Pichon in [@NeumannP:2016] showed that the multiplicity is an outer bi-Lipschitz invariant in the case of normal surface singularities, as a consequence of a very detailed and involved study of the outer bi-Lipschitz geometry for that class. In the non-normal surface case the only partial contribution is the fact that the [*embedded*]{} bi-Lipschitz geometry determines multiplicity in the [*hypersurface*]{} case (see [@FernandesS:2016]). Conjecture A1($d$) is largely unexplored up to our knowledge. Our main results are the following. We prove that Conjecture Ã1($d$) is equivalent to Conjecture A1($d$) (Theorem \[main-theorem\]). We prove the conjectures for curves and surfaces ($d=1,2$) (Theorems \[curves\] and \[main-result\]. For general $d$ we prove in Theorem \[application1\] that Conjecture A1 holds for algebraic hypersurfaces in ${\mathbb{C}}^n$ whose all irreducible components of their tangent cones at infinity have singular locus with dimension $\leq 1$ and, as an immediate corollary of it, we obtain that degree of complex algebraic surfaces in ${\mathbb{C}}^3$ is an embedded bi-Lipschitz invariant at infinity. The way to reach this results is to prove that the outer Lipschitz geometry at infinity determines the tangent cone at infinity and the relative multiplicities at infinity (Theorem \[multiplicities\]). These are versions “at infinity” of the corresponding results for germs in [@Sampaio:2016] and [@FernandesS:2016] respectively. In order to have an idea of the ingredients of the statement let us remark that in the hypersurface case the tangent cone at infinity is the set defined by the highest degree form of the defining equation. The relative multiplicities at infinity are the exponents appearing in the factorization in irreducible components of the highest degree form. Precise definitions are in Section \[section:preliminaries\]. The case $d=1$ comes very easily from the last mentioned result. For the $d=2$ case the new idea is to find the degree of a homogeneous irreducible affine algebraic set $S$ as the torsion part of a homology group of $S\setminus\{O\}$. We use the Leray spectral sequence associated with its projectivization for that purpose. In particular we show that the abstract topology of a homogeneous surface germ determines its multiplicity. The organization of the paper is as follows. In Section \[section:preliminaries\] we recall the necessary basic definitions and introduce relative multiplicities at infinity. In Section \[section:mainresults\] we prove the results described above. Preliminaries {#section:preliminaries} ============= Multiplicity, degree and tangent cones -------------------------------------- See [@Chirka:1989] for a definition of multiplicity for higher codimension analytic germs in ${\mathbb{C}}^n$. Let $A$ be a closed algebraic subset in ${\mathbb{C}}^n$. We define [**the degree of**]{} $A$ to be the degree of its projective completion [@Chirka:1989]. If $A$ is a homogeneous algebraic set in ${\mathbb{C}}^n$ (i.e defined by homogeneous polynomials), its degree coincides with its multiplicity at the origin of ${\mathbb{C}}^n$. Now we set the exact notion of tangent cone that we will use along the paper and we list some of its properties. Let $A\subset {\mathbb{R}}^n$ be an unbounded subset. We say that $v\in {\mathbb{R}}^n$ is a [**tangent vector of**]{} $A$ [**at infinity**]{} if there is a sequence of points $\{x_i\}_{i\in {\mathbb{N}}}\subset A$ such that $\lim\limits_{i\to \infty} \|x_i\|=+\infty $ and there is a sequence of positive numbers $\{t_i\}_{i\in {\mathbb{N}}}\subset{\mathbb{R}}^+$ such that $$\lim\limits_{i\to \infty} \frac{1}{t_i}x_i= v.$$ Let $C_{\infty }(A)$ denote the set of all tangent vectors of $A$ at infinity. This subset $C_{\infty }(A)\subset{\mathbb{R}}^n$ is called [**the tangent cone of**]{} $A$ [**at infinity**]{}. Let $Z\subset {\mathbb{R}}^n$ be an unbounded semialgebraic set. A vector $v\in{\mathbb{R}}^n$ belongs to $C_{\infty }(Z)$ if, and only if, there exists a continuous semialgebraic curve $\gamma\colon (\varepsilon ,+\infty )\to Z$ such that $\lim\limits _{t\to +\infty }|\gamma(t)|=+\infty $ and $\gamma(t)=tv+o_{\infty }(t),$ where $g(t)=o_{\infty }(t)$ means $\lim\limits _{t\to +\infty }\frac{g(t)}{t}=0$. Let $X\subset{\mathbb{C}}^n$ be a complex algebraic subset. Let $\mathcal{I}(X)$ be the ideal of ${\mathbb{C}}[x_1,\cdots,x_n]$ given by the polynomials which vanishes on $X$. For each $f\in{\mathbb{C}}[x_1,\cdots,x_n]$, let us denote by $f^*$ the maximum degree form of $f$. Define $\mathcal{I}^*(X)$ to be generated by the $f^*$ when $f\in \mathcal{I}(X)$. \[algebricity\] Let $X\subset{\mathbb{C}}^n$ be a complex algebraic subset. Then, $C_{\infty }(X)$ is the affine algebraic subset defined by $\mathcal{I}^*(X)$. We emphasize that we take $C_{\infty }(X)$ as a set, with reduced structure. Among other things, this result above says that tangent cones at infinity of complex algebraic sets in ${\mathbb{C}}^n$ are complex algebraic subsets as well. Outer bi-Lipschitz homeomorphism at infinity -------------------------------------------- All the Euclidean subsets are equipped with the induced Euclidean distance (outer metric). So, all the Lipschitz mappings mentioned here are supposed to be Lipschitz with respect to the outer metric, this is why they are called outer Lipschitz or bi-Lipschitz mappings \[def\_inf\] Let $X\subset {\mathbb{R}}^n$ and $Y\subset{\mathbb{R}}^m$ be two subsets. We say that $X$ and $Y$ are [**outer bi-Lipschitz homeomorphic at infinity**]{}, if there exist compact subsets $K\subset{\mathbb{R}}^n$ and $\widetilde K\subset {\mathbb{R}}^m$ and an outer bi-Lipschitz homeomorphism $\phi \colon X\setminus K\rightarrow Y\setminus \widetilde K$. We finish this subsection reminding the invariance of the tangent cone at infinity under outer bi-Lipschitz homeomorphisms at infinity. \[inv\_cones\] Let $X\subset{\mathbb{R}}^n$ and $Y\subset{\mathbb{R}}^m$ be unbounded semialgebraic subsets. If $X$ and $Y$ are outer bi-Lipschitz homeomorphic at infinity, then there is an outer bi-Lipschitz homeomorphism $d\varphi\colon C_{\infty }(X)\to C_{\infty }(Y)$ with $d\varphi(0)=0$. Relative multiplicities at infinity {#section:lelong} ----------------------------------- Let $X\subset {\mathbb{C}}^n$ be a complex algebraic set with $p=\dim X\geq 1$. Let $X_1,\cdots,X_r$ be the irreducible components of $C_{\infty }(X)$. In the primary decomposition of $I^*$ there is a unique primary ideal $\mathcal{Q}_i$ which defines $X_i$ as a set. Let $\mathcal{P}_i$ be the minimal prime associated with $\mathcal{Q}_i$. The relative multiplicity associated with $X_i$ can be defined algebraically as the length of the algebra $$({\mathbb{C}}[x_1,...,x_n]/\mathcal{Q}_i)_{(\mathcal{P}_i)}.$$ Below we give a (equivalent) geometric definition of relative multiplicities which suits better our purposes. Let $\pi\colon{\mathbb{C}}^n\to {\mathbb{C}}^p$ be a linear projection such that $$\pi^{-1}(0)\cap(C_{\infty }(X))=\{0\}.$$ Therefore, $\pi|_{ X}\colon X\rightarrow {\mathbb{C}}^p$ (resp. $\pi|_{ C_{\infty }(X)}\colon C_{\infty }(X)\rightarrow {\mathbb{C}}^p$) is a ramified cover with degree equal to ${\rm deg} (X)$ (resp. ${\rm deg} (C_{\infty }(X))$) (see [@Chirka:1989], Corollary 1 in the page 126). In particular, $\pi|_{X_j}\colon X_j\rightarrow {\mathbb{C}}^p$ is a ramified cover with degree equal to ${\rm deg} (X_j)$, for each $j=1,\cdots,r$. Moreover, if the ramification locus of $\pi|_X$ (resp. $\pi|_{ C_{\infty }(X)}$) is not empty, it is a codimension $1$ complex algebraic subset $\sigma(X)$ (resp. $\sigma(C_{\infty }(X))$) of ${\mathbb{C}}^p$. Let us denote $\Sigma=\pi|_X^{-1}(\sigma(X))$ and $\Sigma'=\pi|_{C_{\infty }(X)}^{-1}(\sigma(C_{\infty }(X)))$. Fix $j\in \{1,\cdots,r\}$. For a point $v\in X_j\setminus (C_{\infty }(\Sigma)\cup C_{\infty }(\Sigma'))$, let $\eta, R >0$ such that $$C_{\eta,R }(v'):=\{w\in {\mathbb{C}}^p|\, \exists t>0; \|tv'-w\|\leq \eta t \}\setminus B_R(0)\subset {\mathbb{C}}^p\setminus \sigma(X)\cup \sigma(C_{\infty }(X)),$$ where $v'=\pi(v)$. Thus, the number of connected components of $\pi|_X^{-1}(C_{\eta,R }(v'))$ (resp. $\pi|_{ X_j}^{-1}(C_{\eta,R }(v'))$) is equal to ${\rm deg} (X)$ (resp. ${\rm deg} (X_j)$). Moreover, there exist a connected component $V$ of $\pi|_{ X_j}^{-1}(C_{\eta,R }(v'))$ such that $v\in V$ and a compact subset $K\subset {\mathbb{C}}^n$ such that for each connected component $A_i$ of $\pi|_X^{-1}(C_{\eta,R }(v'))$, we have $C_{\infty }(A_i)\cap ({\mathbb{C}}^n\setminus K)\subset \pi|_{ C_{\infty }(X)}^{-1}(C_{\eta,R }(v'))$. Then, we denote by $k_X^{\infty }(v)$ to be the number of connected components $A_i'$s such that $C_{\infty }(A_i)\cap ({\mathbb{C}}^n\setminus K)\subset V$. By definition, we can see that $k_X^{\infty }$ is locally constant and as $X_j\setminus (C_{\infty }(\Sigma)\cup C_{\infty }(\Sigma'))$ is connected, $k_X^{\infty }$ is constant on $X_j\setminus (C_{\infty }(\Sigma)\cup C_{\infty }(\Sigma'))$. Thus, we define $k_X^{\infty }(X_j)=k_X^{\infty }(v)$. In particular, $k_X^{\infty }(w)=k_X^{\infty }(v)$ for all $w\in \pi^{-1}(v')\cap X_j$ and, therefore, we obtain $$\label{kurdyka-raby} {\rm deg}(X)=\sum\limits_{j=0}^r k_X^{\infty }(X_j)\cdot{\rm deg}(X_j).$$ Notice that $k_X^{\infty }$ does not depend of $\pi$. Main results {#section:mainresults} ============ Let $Z\subset{\mathbb{R}}^{\ell}$ be a path connected subset. Given two points $q,\tilde{q}\in Z$, we recall that the *inner distance* in $Z$ between $q$ and $\tilde{q}$ is the number $d_Z(q,\tilde{q})$ below: $$d_Z(q,\tilde{q}):=\inf\{ \mbox{length}(\gamma) \ | \ \gamma \ \mbox{is an arc on} \ Z \ \mbox{connecting} \ q \ \mbox{to} \ \tilde{q}\}.$$ \[multiplicities\] Let $X\subset{\mathbb{C}}^n$ and $Y\subset{\mathbb{C}}^m$ be complex algebraic subsets, with pure dimension $p=\dim X=\dim Y$, and let $X_1,\dots,X_r$ and $Y_1,\dots,Y_s$ be the irreducible components of the tangent cones at infinity $C_{\infty }(X)$ and $C_{\infty }(Y)$ respectively. If $X$ and $Y$ are outer bi-Lipschitz homeomorphic at infinity, then $r=s$ and, up to a re-ordering of indices, $k_X^{\infty }(X_j)=k_Y^{\infty }(Y_j)$, $\forall \ j$. This proofs shares its structure with the corresponding result in the local case in [@FernandesS:2016]. By hypotheses there are compact subsets $K\subset {\mathbb{C}}^n$ and ${\widetilde}K\subset {\mathbb{C}}^m$ and an outer bi-Lipschitz homeomorphism $\varphi:X\setminus K\to Y\setminus {\widetilde}K$. Let $S=\{n_k\}_{k\in{\mathbb{N}}}$ be a sequence of positive real numbers such that $$n_k\to +\infty \quad\mbox{and} \quad \frac{\varphi(n_kv)}{n_k}\to d\varphi(v),$$ where $d\varphi$ is a tangent map at infinity of $\varphi$ like in Theorem \[inv\_cones\] (for more details, see [@FernandesS:2017], Theorem 4.5). Since, $d\varphi$ is an outer bi-Lipschitz homeomorphism, we get $r=s$ and there is a permutation $P\colon\{1,\dots,r\}\to \{1,\dots,s\}$ such that $d\varphi (X_j)=Y_{P(j)}$ $\forall \ j.$ This is why we can suppose $d\varphi(X_j)=Y_j$ $\forall \ j$ up to a re-ordering of indices. Let $\pi\colon{\mathbb{C}}^n\to {\mathbb{C}}^p$ be a linear projection such that $$\pi^{-1}(0)\cap(C_{\infty }(X)\cup C_{\infty }(Y))=\{0\}.$$ Let us denote the ramification locus of $$\pi_{| X}\colon X\to {\mathbb{C}}^p \quad \mbox{and} \quad \pi_{| C_{\infty }(X)}\colon C_{\infty }(X)\to {\mathbb{C}}^p$$ by $\sigma(X)$ and $\sigma(C_{\infty }(X))$ respectively. By similar way, we define $\sigma(Y)$ and $\sigma(C_{\infty }(Y))$. Let us denote $\Sigma=\pi_X^{-1}(\sigma(X))$, $\Sigma'=\pi|_{C_{\infty }(X)}^{-1}(\sigma(C_{\infty }(X)))$, ${\widetilde}\Sigma=\pi|_Y^{-1}(\sigma(Y))$ and ${\widetilde}\Sigma'=\pi|_{C_{\infty }(Y)}^{-1}(\sigma(C_{\infty }(Y)))$. Let us suppose that there is $j\in\{1,\dots,r\}$ such that $k_X^{\infty}(X_j)> k_Y^{\infty}(Y_j)$. Thus, given a unitary point $v\in X_j\setminus (C_{\infty }(\Sigma)\cup C_{\infty }(\Sigma'))$ such that $w=d\varphi(v)\in Y_j\setminus (C_{\infty }({\widetilde}\Sigma)\cup C_{\infty }({\widetilde}\Sigma'))$, let $\eta,R >0$ such that $$C_{\eta,R }(v'):=\{w\in {\mathbb{C}}^p|\, \exists t>0; \|tv'-w\|<\eta t\}\setminus B_R(0)\subset {\mathbb{C}}^p\setminus \sigma(X)\cup \sigma(C_{\infty }(X))$$ and $$C_{\eta,R }(w'):=\{w\in {\mathbb{C}}^p|\, \exists t>0; \|tv'-w\|<\eta t\}\setminus B_R(0)\subset {\mathbb{C}}^p\setminus \sigma(Y)\cup \sigma(C_{\infty }(Y)),$$ where $v'=\pi(v)$ and $w'=\pi(d\varphi(v))$. Therefore, there are at least two different connected components $V_{ji}$ and $V_{jl}$ of $\pi^{-1}(C_{\eta,R }(v'))\cap X$ and sequences $\{z_k\}_{k\in {\mathbb{N}}}\subset V_{ji}$ and $\{w_k\}_{k\in {\mathbb{N}}}\subset V_{jl}$ such that $t_k=\|z_k\|=\|w_k\|\in S$, $\lim \frac{1}{t_k}z_k=\lim \frac{1}{t_k}w_k=v$ and $\varphi(z_k),\varphi(w_k)\in {\widetilde}V_{jm}$, where ${\widetilde}V_{jm}$ is a connected component of $\pi^{-1}(C_{\eta,R }(w'))\cap Y$. Let us choose linear coordinates $(x,y)$ in ${\mathbb{C}}^n$ such that $\pi(x,y)=x$. [**Claim.**]{} There exist a compact subset $K\subset {\mathbb{C}}^n$ and a constant $C>0$ such that $\|y\|\leq C\|x\|$ for all $(x,y)\in Y\setminus K$. If this Claim is not true, there exists a sequence $\{(x_k,y_k)\}\subset Y$ such that $\lim\limits_{k\to+\infty}\|(x_k,y_k)\|=+\infty$ and $\|y_k\|> k\|x_k\|$. Thus, up to a subsequence, one can suppose that $\lim\limits_{k\to+\infty}\frac{y_k}{\|y_k\|}=y_0$. Since $\frac{\|x_k\|}{\|y_k\|}< \frac{1}{k}$, $(0,y_0)\in C_{\infty }(Y)$, which is a contradiction, because $y_0\not=0$, $(0,y_0)\in \pi^{-1}(0)$ and $\pi^{-1}(0)\cap C_{\infty }(Y)=\{0\}$. Therefore, the Claim is true. In particular, $V={\widetilde}V_{jm}$ is outer bi-Lipschitz homeomorphic to $C_{\eta,R }(w')$ and since $\varphi(z_k),\varphi(w_k)\in{\widetilde}V_{jm}$ $\forall$ $k\in {\mathbb{N}}$, we have $$\|\varphi(z_k)-\varphi(w_k)\|=o_{\infty }(t_k)$$ and $$d_Y(\varphi(z_k),\varphi(w_k))\leq d_V(\varphi(z_k),\varphi(w_k))=o_{\infty }(t_k),$$ where $g(t_k)=o_{\infty }(t_k)$ means $\lim\limits _{k\to \infty }\frac{g(t_k)}{t_k}=0$. Now, since $X$ is outer bi-Lipschitz homeomorphic to $Y$, we have $d_X(z_k,w_k)\leq o_{\infty }(t_k)$. On the other hand, since $z_k$ and $w_k$ lie in different connected components of $\pi^{-1}(C_{\eta,R }(v'))\cap X$, there exists a constant $C>0$ such that $d_X(z_k,w_k)\geq Ct_k$, which is a contradiction. We have proved that $k_X^{\infty}(X_j)\leq k_Y^{\infty}(Y_j)$, $j=1,\cdots,r$. By similar arguments, using that $\varphi^{-1}$ is an outer bi-Lipschitz map, we also can prove $k_Y^{\infty}(Y_j)\leq k_X^{\infty}(X_j)$, $j=1,\cdots,r$. Degree as an outer bi-Lipschitz invariant at infinity {#subsection:applications} ----------------------------------------------------- The first application of our main results proved in the previous section is the outer bi-Lipschitz invariance of the degree of complex algebraic curves in ${\mathbb{C}}^n$. \[curves\] Let $X\subset{\mathbb{C}}^n$ and $Y\subset{\mathbb{C}}^m$ be complex algebraic subsets, with $\dim X=\dim Y=1$. If $X$ and $Y$ are outer bi-Lipschitz homeomorphic at infinity, then ${\rm deg}(X)={\rm deg}(Y)$. Let $X_1,\dots,X_r$ and $Y_1,\dots,Y_s$ be the irreducible components of the tangent cones at infinity $C_{\infty }(X)$ and $C_{\infty }(Y)$ respectively. Since $\dim X=\dim Y=1$, we have that $X_1,\dots,X_r$ and $Y_1,\dots,Y_s$ are complex lines. Thus, $${\rm deg}(X_1)=\dots={\rm deg}(X_r)={\rm deg}(Y_1)=\dots={\rm deg}(Y_s)=1$$ and using Eq. \[kurdyka-raby\], we get ${\rm deg}(X)=\sum\limits_{j=0}^r k_X^{\infty }(X_j)$ and ${\rm deg}(Y)=\sum\limits_{j=0}^s k_X^{\infty }(Y_j)$. Therefore, by Theorem \[multiplicities\], ${\rm deg}(X)={\rm deg}(Y)$. Let us fix $d\in {\mathbb{N}}$. \[main-theorem\] The statements below are equivalent. 1. Let $X\subset {\mathbb{C}}^n$ and $Y\subset {\mathbb{C}}^m$ be two complex analytic sets with $\dim X=\dim Y=d$. If their germs at $0\in{\mathbb{C}}^n$ and $0\in{\mathbb{C}}^m$, respectively, are outer bi-Lipschitz homeomorphic, then $m(X,0)=m(Y,0)$. 2. Let $X\subset {\mathbb{C}}^n$ and $Y\subset {\mathbb{C}}^m$ be two complex algebraic sets with $\dim X=\dim Y=d$. If $X$ and $Y$ are outer bi-Lipschitz homeomorphic at infinity, then ${\rm deg}(X)={\rm deg}(Y).$ As we pointed out in the introduction of the paper; we know from [@FernandesS:2016] that statement Ã1($d$) holds true if and only if it is true by considering just homogeneous complex algebraic sets. But, if $A\subset {\mathbb{C}}^n$ is a homogeneous complex algebraic set, then ${\rm deg}(A)=m(A,0)$. From now, we are ready to start the proof of the theorem. First, let us suppose that statement A1($d$) is true. Since cones which are outer bi-Lipschitz homeomorphic as germs at their vertices are globally outer bi-Lipschitz homeomorphic, as was remarked in [@Sampaio:2016], it follows from observations above that Ã1($d$) holds true as well. Second, let us suppose that Ã1($d$) holds true. Let $X \subset{\mathbb{C}}^n$ and $Y\subset {\mathbb{C}}^m$ be two complex algebraic sets with $d=\dim X=\dim Y$. Let us suppose that $X$ and $Y$ are outer bi-Lipschitz homeomorphic at infinity. Then, there exist $K\subset {\mathbb{C}}^n$ and ${\widetilde}K\subset{\mathbb{C}}^m$ two compact subsets and a outer bi-Lipschitz homeomorphism $\varphi\colon X\setminus K\to Y\setminus {\widetilde}K$. Let us denote by $X_1,\dots,X_r$ and $Y_1,\dots,Y_s$ the irreducible components of the cones $C_{\infty }(X)$ and $C_{\infty }(Y)$ respectively. It comes from Theorem \[multiplicities\] that $r=s$ and the outer bi-Lipschitz homeomorphism $d\varphi \colon C_{\infty }(X)\rightarrow C_{\infty }(Y)$, up to re-ordering of indices, sends $X_i$ onto $Y_i$ and $k_X^\infty(X_i)=k_Y^\infty(Y_i)$ $\forall$ $i$. Furthermore, $d\varphi(0)=0$. By Proposition \[algebricity\], the tangent cones at infinity $C_{\infty }(X)$ and $C_{\infty }(Y)$ are homogeneous complex algebraic subsets. Thus, the irreducible components $X_1,\dots,X_r$ and $Y_1,\dots,Y_s$ are homogeneous complex algebraic subsets as well. Since Ã1($d$) is true, we have $m(X_i,0)=m(Y_i,0)$ $\forall \ i$, hence ${\rm deg}(X_i)={\rm deg}(Y_i)$ $\forall \ i$. Finally, by using Eq. \[kurdyka-raby\], we get ${\rm deg}(X)={\rm deg}(Y)$ which give us that A1($d$) is true. \[main-result\] - Let $X\subset {\mathbb{C}}^{N+1}$ and $Y\subset {\mathbb{C}}^{M+1}$ be two complex analytic surfaces. If $(X,0)$ and $(Y,0)$ are outer bi-Lipschitz homeomorphic, then $m(X,0)=m(Y,0)$. - Let $X\subset {\mathbb{C}}^{N+1}$ and $Y\subset {\mathbb{C}}^{M+1}$ be two complex algebraic surfaces. If $X$ and $Y$ are outer bi-Lipschitz homeomorphic at infinity, then ${\rm deg}(X)={\rm deg}(Y)$. By Theorem 2.1 in [@FernandesS:2016], it is enough to show (1) when $X$ and $Y$ are two irreducible homogeneous complex algebraic sets. The Theorem 2.1 in [@FernandesS:2016] was stated with the outer bi-Lipschitz homeomorphism taking account the ambient spaces where the germs were embedded, however, let us emphasize here that the same proof of the Theorem 2.1 in [@FernandesS:2016] works when we consider the outer bi-Lipschitz homeomorphism between the germs does not taking account the ambient spaces. Thus, the part (1) of the theorem is reduced to prove the following proposition. Let $(S,0)$ and $(S',0)$ be homogeneous irreducible affine algebraic surfaces. If $S\setminus\{0\}$ is homeomorphic to $S'\setminus\{0\}$, then we have the equality ${\rm deg}(S)={\rm deg}(S')$. We have the isomorphism $H^2(S\setminus\{0\};{\mathbb{Z}})\cong H^2(S'\setminus\{0\};{\mathbb{Z}})$. Hence it is enough to show that the torsion part of this cohomology group is isomorphic to ${\mathbb{Z}}/{\rm deg}(S){\mathbb{Z}}$. Let $\pi:S\setminus\{0\}\to{\mathbb{P}}(S)$ denote the quotient map by the ${\mathbb{C}}^*$-action. The fibration $\pi$ is a pullback of the tautological bundle minus the zero section over the projective space ${\mathbb{P}}^N$ where ${\mathbb{P}}(S)$ is embedded, and hence the local systems $R^q\pi_*\underline{{\mathbb{Z}}}_{S\setminus\{0\}}$ are pullbacks from the corresponding local systems over ${\mathbb{P}}^N$. Since the projective space is simply-connected the local systems have trivial monodromy. Hence, the second page of the Leray spectral sequence for $\pi$ is $$E_2^{p,q}=H^p({\mathbb{P}}(S),{\mathbb{Z}}).$$ Since $E_2^{p,q}$ vanishes for $p\neq 0,1,2$ and $q\neq 0,1$, the differentials $d_i$ are all zero for $i\geq 3$ and the only non-zero $d_2$ differential is: $$d_2:H^0({\mathbb{P}}(S),{\mathbb{Z}})\cong{\mathbb{Z}}\to H^2({\mathbb{P}}(S),{\mathbb{Z}})\cong{\mathbb{Z}},$$ which coincides with multiplication by the first Chern class of the tautological bundle over ${\mathbb{P}}^N$. Hence $d_2$ is multiplication by ${\rm degree}(S)$. We deduce the isomorphisms $$E_\infty^{0,2}=E_2^{0,2}=0,$$ $$E_\infty^{1,1}=E_2^{1,1}={\mathbb{Z}}^{b_1},$$ $$E_\infty^{2,0}=E_3^{2,0}={\mathbb{Z}}/{\rm deg}(S){\mathbb{Z}},$$ where $b_1$ is the first Betti number of ${\mathbb{P}}(S)$. By the vanishing of $E_\infty^{0,2}$ there is a short exact sequence $$0\to E_\infty^{2,0}\to H^2(S\setminus\{0\},{\mathbb{Z}})\to E_\infty^{1,1}\to 0,$$ which splits by the freeness of $E_\infty^{1,1}$. Hence the torsion part of $H^2(S\setminus\{0\},{\mathbb{Z}})$ is isomorphic to ${\mathbb{Z}}/{\rm deg}(S){\mathbb{Z}}$ as needed. Now we prove part (2) of the main theorem. Since we have proved part (1), we see that the statement $\tilde A1$($2$) of Theorem \[main-theorem\] has a positive answer, hence $A1$($2$) has a positive answer as well. Therefore, part (2) is proved. Let us denote by $\mathcal{C}_{1,\infty }$ the set of all complex algebraic sets $X\subset {\mathbb{C}}^n$, such that each irreducible component $X_j$ of $C_{\infty }(X)$ satisfies $\dim {\rm Sing}(X_j)\leq 1$. \[application1\] Let $f,g\colon {\mathbb{C}}^n\to {\mathbb{C}}$ be two polynomials. Suppose that $V(f)\in \mathcal{C}_{1,\infty }$. Suppose there exist compact subsets $K,{\widetilde}K\subset {\mathbb{C}}^n$ and an outer bi-Lipschitz homeomorphism $\varphi:{\mathbb{C}}^n\setminus K\to {\mathbb{C}}^n\setminus {\widetilde}K$ such that $\varphi(V(f)\setminus K)=V(g)\setminus {\widetilde}K$. Then $V(g)\in \mathcal{C}_{1,\infty }$ and ${\rm deg}(V(f))={\rm deg}(V(g))$. By the proof of Theorem \[multiplicities\], we can suppose that $f$ and $g$ are irreducible homogeneous polynomials. By Theorem 5.4 in [@Sampaio:2017] and by using observations in the very beginning of the proof of Theorem \[multiplicities\], it follows that ${\rm deg}(V(f)))={\rm deg}(V(g))$. [99]{} . Kluwer Academic Publishers, 1989. . [*Multiplicity of complex analytic sets and bi-Lipschitz maps*]{}. Real analytic and algebraic singularities (Nagoya/Sapporo/Hachioji, 1996) Pitman Res. Notes Math. Ser., vol. 381, pp.182–188, 1998. . . . [*Multiplicity of analytic hypersurface singularities under bi-Lipschitz homeomorphisms*]{}. Journal of Topology, vol. 9, pp. 927–933, 2016. . [*On Lipschitz regularity at infinity of complex algebraic sets*]{}. Preprint 2017, <https://arxiv.org/pdf/1705.03085.pdf>. . Ann. Inst. Fourier (Grenoble), vol. 39 (3), pp. 753–771, 1989. . [*On tangent cones at infinity of algebraic varieties*]{}. Preprint, <https://arxiv.org/pdf/1603.02761.pdf> (2016). Accessed 08 May 2017. Lectures delivered at the Summer School in “Low dimensional topology”, Budapest, Hungary, 1998; Proceedings of the Summer School, Bolyai Society Mathematical Studies, 8, Low Dimensional Topology, 269-351, 1999. . Journal of Singularities, v. 10, pp. 225–234, 2014. . preprint 2016, <http://arxiv.org/pdf/1211.4897v3.pdf> . Centre de Mathématiques de l’Ecole Polytechnique (Paris), June 1969. . Selecta Math. (N.S.), v. 22, n. 2, pp. 553–559, 2016. . Preprint 2017, <https://arxiv.org/pdf/1702.06213v2.pdf>. . Bull. of the Amer. Math. Soc., vol. 77 (4), pp. 481–491, 1971. [^1]: The first named author is partially supported by IAS and by ERCEA 615655 NMST Consolidator Grant, MINECO by the project reference MTM2013-45710-C2-2-P, by the Basque Government through the BERC 2014-2017 program, by Spanish Ministry of Economy and Competitiveness MINECO: BCAM Severo Ochoa excellence accreditation SEV-2013-0323, by Bolsa Pesquisador Visitante Especial (PVE) - Ciencias sem Fronteiras/CNPq Project number: 401947/2013-0 and by Spanish MICINN project MTM2013-45710-C2-2-P. The second named author was partially supported by CNPq-Brazil grant 302764/2014-7
Influence of genetic polymorphisms of cytokine genes in the outcome of HLA-matched allogeneic stem cell transplantation in a South East Asian population. Non-HLA gene polymorphisms have been shown to be associated with the risk of graft-versus-host disease (GVHD) and outcome of allogeneic haematopoietic stem cell transplantation (AHSCT). This study aims to investigate the role of IL6, TNFα, IL10, IL2 and IL12 gene polymorphisms in the outcome of AHSCT in a South East Asian population. A total of 67 patients and 59 donors who underwent HLA-identical matched sibling AHSCT were available for analysis. There was no significant association between the different cytokine genotypes of patients with the incidence and severity of acute GVHD. Patients with IL2 166∗T allele and patients who received donor stem cells who had IL2 166∗G allele appeared to have reduced incidence of cGVHD. Patients who received donor stem cells with IL12 1188∗C allele are found to be associated with better disease free survival. These results suggest a possible role of IL2 and IL12 gene polymorphisms in the outcome of AHSCT in a South East Asian population.
;Application for Windows install script ;Copyright (C) 2005-2013 Team XBMC ;http://xbmc.org ;-------------------------------- ;Include Modern UI !include "MUI2.nsh" !include "nsDialogs.nsh" !include "LogicLib.nsh" !include "WinVer.nsh" ;-------------------------------- ;General ;Name and file Name "${APP_NAME}" OutFile "${APP_NAME}Setup-${app_revision}-${app_branch}.exe" XPStyle on ;Default installation folder InstallDir "$PROGRAMFILES\${APP_NAME}" ;Get installation folder from registry if available InstallDirRegKey HKCU "Software\${APP_NAME}" "" ;Request application privileges for Windows Vista RequestExecutionLevel admin ;-------------------------------- ;Variables Var StartMenuFolder Var PageProfileState Var DirectXSetupError Var VSRedistSetupError Var /GLOBAL CleanDestDir ;-------------------------------- ;Interface Settings !define MUI_HEADERIMAGE !define MUI_ICON "..\..\tools\windows\packaging\media\xbmc.ico" ;!define MUI_HEADERIMAGE_BITMAP "..\..\tools\windows\packaging\media\installer\header.bmp" ;!define MUI_WELCOMEFINISHPAGE_BITMAP "..\..\tools\windows\packaging\media\installer\welcome-left.bmp" !define MUI_COMPONENTSPAGE_SMALLDESC !define MUI_FINISHPAGE_LINK "Please visit ${WEBSITE} for more information." !define MUI_FINISHPAGE_LINK_LOCATION "${WEBSITE}" !define MUI_FINISHPAGE_RUN "$INSTDIR\${APP_NAME}.exe" !define MUI_FINISHPAGE_RUN_NOTCHECKED !define MUI_ABORTWARNING ;-------------------------------- ;Pages !insertmacro MUI_PAGE_WELCOME !insertmacro MUI_PAGE_LICENSE "..\..\LICENSE.GPL" !insertmacro MUI_PAGE_COMPONENTS !define MUI_PAGE_CUSTOMFUNCTION_LEAVE CallbackDirLeave !insertmacro MUI_PAGE_DIRECTORY ;Start Menu Folder Page Configuration !define MUI_STARTMENUPAGE_REGISTRY_ROOT "HKCU" !define MUI_STARTMENUPAGE_REGISTRY_KEY "Software\${APP_NAME}" !define MUI_STARTMENUPAGE_REGISTRY_VALUENAME "Start Menu Folder" !insertmacro MUI_PAGE_STARTMENU Application $StartMenuFolder !insertmacro MUI_PAGE_INSTFILES !define MUI_PAGE_CUSTOMFUNCTION_PRE CallbackPreFinish !insertmacro MUI_PAGE_FINISH !insertmacro MUI_UNPAGE_WELCOME !insertmacro MUI_UNPAGE_CONFIRM UninstPage custom un.UnPageProfile un.UnPageProfileLeave !insertmacro MUI_UNPAGE_INSTFILES !insertmacro MUI_UNPAGE_FINISH ;-------------------------------- ;Languages !insertmacro MUI_LANGUAGE "English" ;-------------------------------- ;HelperFunction Function CallbackPreFinish Var /GLOBAL ShouldMigrateUserData StrCpy $ShouldMigrateUserData "0" Var /GLOBAL OldXBMCInstallationFound StrCpy $OldXBMCInstallationFound "0" Call HandleOldXBMCInstallation ;Migrate userdata from XBMC to Kodi Call HandleUserdataMigration FunctionEnd Function CallbackDirLeave ;deinstall kodi if it is already there in destination folder Call HandleKodiInDestDir FunctionEnd Function HandleUserdataMigration Var /GLOBAL INSTDIR_XBMC ReadRegStr $INSTDIR_XBMC HKCU "Software\XBMC" "" ;Migration from XBMC to Kodi ;Move XBMC portable_data and appdata folder if exists to new location ${If} $ShouldMigrateUserData == "1" ${If} ${FileExists} "$APPDATA\XBMC\*.*" ${AndIfNot} ${FileExists} "$APPDATA\${APP_NAME}\*.*" Rename "$APPDATA\XBMC\" "$APPDATA\${APP_NAME}\" MessageBox MB_OK|MB_ICONEXCLAMATION|MB_TOPMOST|MB_SETFOREGROUND "Your current XBMC userdata folder was moved to the new ${APP_NAME} userdata location.$\nThis to make the transition as smooth as possible without any user interactions needed." ;mark that it was migrated in the filesystem - kodi will show another info message during first Kodi startup ;for really making sure that the user has read that message. FileOpen $0 "$APPDATA\${APP_NAME}\.kodi_data_was_migrated" w FileClose $0 ${EndIf} ${Else} ; old installation was found but not uninstalled - inform the user ; that his userdata is not automatically migrted ${If} $OldXBMCInstallationFound == "1" MessageBox MB_OK|MB_ICONEXCLAMATION|MB_TOPMOST|MB_SETFOREGROUND "There was a former XBMC Installation detected but you didn't uninstall it. The older profile data will not be moved to the ${APP_NAME} userdata location. ${APP_NAME} will use default profile settings." ${EndIf} ${EndIf} FunctionEnd Function HandleOldXBMCInstallation Var /GLOBAL INSTDIR_XBMC_OLD ReadRegStr $INSTDIR_XBMC_OLD HKCU "Software\XBMC" "" ;ask if a former XBMC installation should be uninstalled if detected ${IfNot} $INSTDIR_XBMC_OLD == "" StrCpy $OldXBMCInstallationFound "1" MessageBox MB_YESNO|MB_ICONQUESTION "A previous XBMC installation was detected. Would you like to uninstall it?" IDYES true IDNO false true: DetailPrint "Uninstalling $INSTDIR_XBMC" SetDetailsPrint none ExecWait '"$INSTDIR_XBMC_OLD\uninstall.exe" /S _?=$INSTDIR_XBMC_OLD' SetDetailsPrint both ;this also removes the uninstall.exe which doesn't remove it self... Delete "$INSTDIR_XBMC_OLD\uninstall.exe" ;if the directory is now empty we can safely remove it (rmdir won't remove non-empty dirs!) RmDir "$INSTDIR_XBMC_OLD" StrCpy $ShouldMigrateUserData "1" false: ${EndIf} FunctionEnd Function HandleOldKodiInstallation Var /GLOBAL INSTDIR_KODI ReadRegStr $INSTDIR_KODI HKCU "Software\${APP_NAME}" "" ;if former Kodi installation was detected in a different directory then the destination dir ;ask for uninstallation ;only ask about the other installation if user didn't already ;decide to not overwrite the installation in his originally selected destination dir ${IfNot} $CleanDestDir == "0" ${AndIfNot} $INSTDIR_KODI == "" ${AndIfNot} $INSTDIR_KODI == $INSTDIR MessageBox MB_YESNO|MB_ICONQUESTION "A previous ${APP_NAME} installation in a different folder was detected. Would you like to uninstall it?" IDYES true IDNO false true: DetailPrint "Uninstalling $INSTDIR_KODI" SetDetailsPrint none ExecWait '"$INSTDIR_KODI\uninstall.exe" /S _?=$INSTDIR_KODI' SetDetailsPrint both ;this also removes the uninstall.exe which doesn't remove it self... Delete "$INSTDIR_KODI\uninstall.exe" ;if the directory is now empty we can safely remove it (rmdir won't remove non-empty dirs!) RmDir "$INSTDIR_KODI" false: ${EndIf} FunctionEnd Function HandleKodiInDestDir ;if former Kodi installation was detected in the destination directory - uninstall it first ${IfNot} $INSTDIR == "" ${AndIf} ${FileExists} "$INSTDIR\uninstall.exe" MessageBox MB_YESNO|MB_ICONQUESTION "A previous installation was detected in the selected destination folder. Do you really want to overwrite it?" IDYES true IDNO false true: StrCpy $CleanDestDir "1" Goto done false: StrCpy $CleanDestDir "0" Abort done: ${EndIf} FunctionEnd Function DeinstallKodiInDestDir ${If} $CleanDestDir == "1" DetailPrint "Uninstalling former ${APP_NAME} Installation in $INSTDIR" SetDetailsPrint none ExecWait '"$INSTDIR\uninstall.exe" /S _?=$INSTDIR' SetDetailsPrint both ;this also removes the uninstall.exe which doesn't remove it self... Delete "$INSTDIR\uninstall.exe" ${EndIf} FunctionEnd ;-------------------------------- ;Install levels InstType "Full" ; 1. InstType "Normal" ; 2. InstType "Minimal" ; 3. ;-------------------------------- ;Installer Sections Section "${APP_NAME}" SecAPP SetShellVarContext current SectionIn RO SectionIn 1 2 3 #section is in install type Normal/Full/Minimal ;handle an old kodi installation in a folder different from the destination folder Call HandleOldKodiInstallation ;deinstall kodi in destination dir if $CleanDestDir == "1" - meaning user has confirmed it Call DeinstallKodiInDestDir ;Start copying files SetOutPath "$INSTDIR" File "${app_root}\application\*.*" SetOutPath "$INSTDIR\addons" File /r "${app_root}\application\addons\*.*" SetOutPath "$INSTDIR\language" File /r "${app_root}\application\language\*.*" SetOutPath "$INSTDIR\media" File /r "${app_root}\application\media\*.*" SetOutPath "$INSTDIR\sounds" File /r "${app_root}\application\sounds\*.*" SetOutPath "$INSTDIR\system" File /r "${app_root}\application\system\*.*" ;Turn off overwrite to prevent files in APPDATA\Kodi\userdata\ from being overwritten SetOverwrite off IfFileExists $INSTDIR\userdata\*.* 0 +2 SetOutPath "$APPDATA\${APP_NAME}\userdata" File /r "${app_root}\application\userdata\*.*" ;Turn on overwrite for rest of install SetOverwrite on ;Store installation folder WriteRegStr HKCU "Software\${APP_NAME}" "" $INSTDIR ;Create uninstaller WriteUninstaller "$INSTDIR\Uninstall.exe" !insertmacro MUI_STARTMENU_WRITE_BEGIN Application ;Create shortcuts SetOutPath "$INSTDIR" CreateDirectory "$SMPROGRAMS\$StartMenuFolder" CreateShortCut "$SMPROGRAMS\$StartMenuFolder\${APP_NAME}.lnk" "$INSTDIR\${APP_NAME}.exe" \ "" "$INSTDIR\${APP_NAME}.exe" 0 SW_SHOWNORMAL \ "" "Start ${APP_NAME}." CreateShortCut "$SMPROGRAMS\$StartMenuFolder\Uninstall ${APP_NAME}.lnk" "$INSTDIR\Uninstall.exe" \ "" "$INSTDIR\Uninstall.exe" 0 SW_SHOWNORMAL \ "" "Uninstall ${APP_NAME}." WriteINIStr "$SMPROGRAMS\$StartMenuFolder\Visit ${APP_NAME} Online.url" "InternetShortcut" "URL" "${WEBSITE}" !insertmacro MUI_STARTMENU_WRITE_END ;add entry to add/remove programs WriteRegStr HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "DisplayName" "${APP_NAME}" WriteRegStr HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "UninstallString" "$INSTDIR\uninstall.exe" WriteRegDWORD HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "NoModify" 1 WriteRegDWORD HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "NoRepair" 1 WriteRegStr HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "InstallLocation" "$INSTDIR" WriteRegStr HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "DisplayIcon" "$INSTDIR\${APP_NAME}.exe,0" WriteRegStr HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "Publisher" "${COMPANY}" WriteRegStr HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "HelpLink" "${WEBSITE}" WriteRegStr HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" \ "URLInfoAbout" "${WEBSITE}" SectionEnd ;*-addons.nsi are generated by genNsisIncludes.bat !include /nonfatal "audioencoder-addons.nsi" !include /nonfatal "pvr-addons.nsi" !include /nonfatal "skin-addons.nsi" ;-------------------------------- ;Descriptions ;Language strings LangString DESC_SecAPP ${LANG_ENGLISH} "${APP_NAME}" ;Assign language strings to sections !insertmacro MUI_FUNCTION_DESCRIPTION_BEGIN !insertmacro MUI_DESCRIPTION_TEXT ${SecAPP} $(DESC_SecAPP) !insertmacro MUI_FUNCTION_DESCRIPTION_END ;-------------------------------- ;Uninstaller Section Var UnPageProfileDialog Var UnPageProfileCheckbox Var UnPageProfileCheckbox_State Var UnPageProfileEditBox Function un.UnPageProfile !insertmacro MUI_HEADER_TEXT "Uninstall ${APP_NAME}" "Remove ${APP_NAME}'s profile folder from your computer." nsDialogs::Create /NOUNLOAD 1018 Pop $UnPageProfileDialog ${If} $UnPageProfileDialog == error Abort ${EndIf} ${NSD_CreateLabel} 0 0 100% 12u "Do you want to delete the profile folder?" Pop $0 ${NSD_CreateText} 0 13u 100% 12u "$APPDATA\${APP_NAME}\" Pop $UnPageProfileEditBox SendMessage $UnPageProfileEditBox ${EM_SETREADONLY} 1 0 ${NSD_CreateLabel} 0 46u 100% 24u "Leave unchecked to keep the profile folder for later use or check to delete the profile folder." Pop $0 ${NSD_CreateCheckbox} 0 71u 100% 8u "Yes, also delete the profile folder." Pop $UnPageProfileCheckbox nsDialogs::Show FunctionEnd Function un.UnPageProfileLeave ${NSD_GetState} $UnPageProfileCheckbox $UnPageProfileCheckbox_State FunctionEnd Section "Uninstall" SetShellVarContext current ;ADD YOUR OWN FILES HERE... RMDir /r "$INSTDIR\addons" RMDir /r "$INSTDIR\language" RMDir /r "$INSTDIR\media" RMDir /r "$INSTDIR\sounds" RMDir /r "$INSTDIR\system" Delete "$INSTDIR\*.*" ;Un-install User Data if option is checked, otherwise skip ${If} $UnPageProfileCheckbox_State == ${BST_CHECKED} RMDir /r "$APPDATA\${APP_NAME}\" RMDir /r "$INSTDIR\portable_data\" ${EndIf} RMDir "$INSTDIR" !insertmacro MUI_STARTMENU_GETFOLDER Application $StartMenuFolder Delete "$SMPROGRAMS\$StartMenuFolder\${APP_NAME}.lnk" Delete "$SMPROGRAMS\$StartMenuFolder\Uninstall ${APP_NAME}.lnk" Delete "$SMPROGRAMS\$StartMenuFolder\Visit ${APP_NAME} Online.url" RMDir "$SMPROGRAMS\$StartMenuFolder" DeleteRegKey HKCU "Software\Microsoft\Windows\CurrentVersion\Uninstall\${APP_NAME}" DeleteRegKey /ifempty HKCU "Software\${APP_NAME}" SectionEnd ;-------------------------------- ;vs redist installer Section SectionGroup "Microsoft Visual C++ packages" SEC_VCREDIST Section "VS2008 C++ re-distributable Package (x86)" SEC_VCREDIST1 ;vc90 for python DetailPrint "Running VS2008 re-distributable setup..." SectionIn 1 2 #section is in install type Full SetOutPath "$TEMP\vc2008" File "${app_root}\..\dependencies\vcredist\2008\vcredist_x86.exe" ExecWait '"$TEMP\vc2008\vcredist_x86.exe" /q' $VSRedistSetupError RMDir /r "$TEMP\vc2008" DetailPrint "Finished VS2008 re-distributable setup" SectionEnd Section "VS2010 C++ re-distributable Package (x86)" SEC_VCREDIST2 DetailPrint "Running VS2010 re-distributable setup..." SectionIn 1 2 #section is in install type Full SetOutPath "$TEMP\vc2010" File "${app_root}\..\dependencies\vcredist\2010\vcredist_x86.exe" ExecWait '"$TEMP\vc2010\vcredist_x86.exe" /q' $VSRedistSetupError RMDir /r "$TEMP\vc2010" DetailPrint "Finished VS2010 re-distributable setup" SectionEnd Section "VS2013 C++ re-distributable Package (x86)" SEC_VCREDIST3 DetailPrint "Running VS2013 re-distributable setup..." SectionIn 1 2 #section is in install type Full SetOutPath "$TEMP\vc2013" File "${app_root}\..\dependencies\vcredist\2013\vcredist_x86.exe" ExecWait '"$TEMP\vc2013\vcredist_x86.exe" /q' $VSRedistSetupError RMDir /r "$TEMP\vc2013" DetailPrint "Finished VS2013 re-distributable setup" SetOutPath "$INSTDIR" SectionEnd SectionGroupEnd ;-------------------------------- ;DirectX web-installer Section !define DXVERSIONDLL "$SYSDIR\D3DX9_43.dll" Section "DirectX Install" SEC_DIRECTX SectionIn 1 2 #section is in install type Full/Normal and when not installed DetailPrint "Running DirectX Setup..." SetOutPath "$TEMP\dxsetup" File "${app_root}\..\dependencies\dxsetup\*.*" ExecWait '"$TEMP\dxsetup\dxsetup.exe" /silent' $DirectXSetupError RMDir /r "$TEMP\dxsetup" SetOutPath "$INSTDIR" DetailPrint "Finished DirectX Setup" SectionEnd Section "-Check DirectX installation" SEC_DIRECTXCHECK IfFileExists ${DXVERSIONDLL} +2 0 MessageBox MB_OK|MB_ICONSTOP|MB_TOPMOST|MB_SETFOREGROUND "DirectX9 wasn't installed properly.$\nPlease download the DirectX End-User Runtime from Microsoft and install it again." SectionEnd Function .onInit ${IfNot} ${AtLeastWinVista} MessageBox MB_OK|MB_ICONSTOP|MB_TOPMOST|MB_SETFOREGROUND "Windows Vista or above required.$\nThis program can not be run on Windows XP" Quit ${EndIf} # set section 'SEC_DIRECTX' as selected and read-only if required dx version not found IfFileExists ${DXVERSIONDLL} +3 0 IntOp $0 ${SF_SELECTED} | ${SF_RO} SectionSetFlags ${SEC_DIRECTX} $0 StrCpy $CleanDestDir "-1" FunctionEnd
Functional size of acyl coenzyme A:diacylglycerol acyltransferase by radiation inactivation. Rat liver acyl coenzyme A:diacylglycerol acyltransferase, an intrinsic membrane activity associated with the endoplasmic reticulum, catalyzes the terminal and rate-limiting step in triglyceride synthesis. This enzyme has never been purified nor has its gene been isolated. Inactivation by ionizing radiation and target analysis were used to determine its functional size in situ. Monoexponential radiation inactivation curves were obtained which indicated that a single-sized unit of 72 +/- 4 kDa is required for expression of activity. The size corresponds only to the protein portion of the target and may represent one or several polypeptides.
I've got once fired plastic Remington Express and Peters hulls that take the 157 primer for sale. .07 ea. All 12 ga with a few 20 ga. Now is the opportunity you have been waiting for to get the correct hulls to use up those pesky 157 primers that always seem to show up and never leave. I have enough to fill a flat rate box or two. Give me a call and we will work out the details. 509-205-0357
Before we get into this I want a full disclaimer that this is not an excuse post. The Chargers have lost three games because of critical mistakes or simply being outplayed. Unfortunately, two of the most important players on the roster are out for the year. As we get closer to the bye week we're hearing that more and more players are "close" to returning. These aren't exactly special team players we're talking about here. San Diego expects to get back its #1 running back, #2 pass rusher, #2 corner, and starting inside linebacker. That's four high quality players that all have a huge impact on what the Chargers do. I will make an argument for each player on why San Diego needs them back the most. Run Game is Rough Without Ryan Branden Oliver has showed he belongs in the NFL. You don't force or break 21(!) missed tackles on 106 touches on accident. While Oliver is a hard-nosed runner that has shown he can be a big play threat, he isn't Ryan Mathews. Here's something that jumped out to me from last Thurday's game against Denver. Oliver had 20 touches, 10 of those went for 1 yard or less. Ten! I couldn't fathom Mathews getting that kind of opportunity and not taking at least half of those and falling forward. While it's easy to blame the line for not creating holes, Oliver missed some good running lanes where he could've had big plays, and he simply missed the opportunities. Specifically, back-to-back carries in the 2nd quarter and this carry in the 3rd quarter that went for 2 yards when it could have been 20+. Oliver has a two-way go here. He chooses to go left, where it's not only clear that Antonio Gates is already beat, but there's less room to navigate. To the right, Rich Ohrnberger has yet to disengage the linebacker and there's plenty of more green to work with. Ohrnberger ends up sealing his man and a big play opportunity is missed. Instead, it's a 2 yard gain. Now, this isn't a slight to Oliver. He's been fantastic in this role and 1,000 times better than any of us could've ever imagined. That said, he's not Ryan Mathews. I also think Frank Reich is still trying to figure out the right running plays where Oliver succeeds at. Reich really hasn't found a rhythm in the run game without Mathews. He knows what plays fit Mathews. The run game compliments the passing game and it's why we haven't seen the offense, as a whole, click consistently. Mathews helps solve this, as he showed late last season. This team needs Mathews the most because he helps the team on both sides of the ball. Missin' Melvin's Mojo That pass rush we all loved those first couple games? Gone. Here's a look at the edge rush production since Melvin Ingram's been out. Player Snaps Wins Stops QB Hit Sack Melvin Ingram 88 5 2 4 1 Dwight Freeney 346 22 2 9 2 Jarret Johnson 274 5 10 1 1 Reggie Walker 116 2 4 0.5 Tourek Williams 100 1 1 Jerry Attaochu 65 5 1 1 1 Cordarro Law 50 2 2 1 Wins are the best indicator to understand how many times the player is beating their man. As you can see, outside of Freeney, the production isn't there. Freeney's production has taken a hit as he's been forced to play way too many snaps (he was in on the final two drives during San Diego's 31-0 victory). Freeney has been forced into Ingram's full-time role and that's taking away from his ability to stay fresh late in the games and be an effective pass rusher. Ingram (and Attaochu) bring a level of energy that other players feed off of. It's not just energy but it's production. Ingram made enough plays in the run game early on to prove he's not a liability and showed he can at least move the quarterback off of his spot. San Diego hasn't had that consistent threat opposite Freeney. We know how much better this defense is with Ingram on the field. Ingram brings energy and production while keeping the veteran players fresh for late in the game. He's the injured Charger the team misses the most. I Never thought I'd say this.... "I miss Manti." After everything I said about him last year I'm sure those of you have your pitchforks ready. I just tell you what I see. If Ingram isn't making plays, I'll tell you. If Philip Rivers is missing throws, I'll tell you. Manti Te'o wasn't making plays last year and I told you. Over and over. This year Te'o looked more comfortable, more aware, and like he belonged. That's what you want in a second year player, progression. Here's how the inside linebackers have fared this year: Player Snaps Tackle aDot Missed Tackle Wins Stops Te'o 134 12 3.3 1 2 5 Donald Butler 496 29 8.6 9 7.5 Andrew Gachkar 211 8 5 6 1 2 Kavell Conner 105 6.5 6.2 1 1 3 When I'm looking at inside linebacker numbers I'm looking at "aDOT", or average depth of tackle, or stops. The simple description of stops can be defined as tackles within 3 yards of the line of scrimmage. As you can see, Donald Butler is having a train wreck of a season. In 362 more snaps than Te'o, he only has 2.5 more stops. That's unacceptable. Not only is his win column awfully lonely, but that aDOT is spectacularly bad. The starting linebacker, who plays a position where he can run free to make tackles, is averaging a tackle over 8 yards down the field. This is without getting into Butler's coverage. He has been targeted 10 times, given up 8 completions, 3 first downs, 1 touchdown, and has 8 blown coverages. Just...wow. It's hard to fault Gachkar much for his performance, he's a core special team player that just isn't an every down linebacker. Conner has been okay. His mentality as a linebacker is what it needs to be: Aggressive. The other two don't have that and it's showing. For what San Diego does on defense, the inside linebacker play doesn't have to play at an all-pro level. You just fill holes in the run game and make tackles on the short passing plays. The defensive line, mostly, is far from the reason that the inside linebackers are struggling this year. They're just not making plays they should. A change is needed and that change is Te'o. Te'o would help the team get off the field quicker, which in turn would keep the defense fresher. The team needs Te'o back more than anyone. The rookie completes the secondary (Assuming Brandon Flowers is back) I said before the Broncos game that Jason Verrett was the answer to the Chargers secondary problems. What happened in the Denver game, in my opinion, exposed each corner for who they really are. Player Penalty Target Completion PBU Shutdown In Position Blown 1st Down G/U TD G/U Verrett 3 3 2 1 1 1 Weddle 1 1 Gilchrist 1 3 3 3 1 Addae Wright 12 7 1 1 4 7 5 1 Marshall 1 2 2 2 1 1 One problem is no longer here. Shareece Wright shouldn't be guarding Demaryius Thomas 1-on-1 on an island. When he does, these are the numbers that happen. It was a rough, rough night for Wright. This route pretty much sums it up. We saw how Verrett held up against a very speedy receiver and he was just fine. Verrett can play on an island. He allows the safeties to get back to their normal roles. Marcus Gilchrist no longer has to guard slot receivers. Eric Weddle doesn't have to do everything. He can go back to guarding tight ends and short area zones. It's a domino effect that really hurts every level of the defense. When Verrett is on the field, the secondary is complete. Without him, the secondary is once again leaky like last year and that leads to results like last week. Verrett is the missing piece to this defense and is the injured player the Chargers need back the most.
varying vec4 position; varying vec2 var_texcoord0; uniform sampler2D texture0; void main() { vec4 t = texture2D(texture0, var_texcoord0.xy); float c = 1.0; gl_FragColor = vec4(c, c, c, t.w); }
/****************************************************************************** * Product: Adempiere ERP & CRM Smart Business Solution * * Copyright (C) 1999-2006 ComPiere, Inc. All Rights Reserved. * * This program is free software; you can redistribute it and/or modify it * * under the terms version 2 of the GNU General Public License as published * * by the Free Software Foundation. This program is distributed in the hope * * that it will be useful, but WITHOUT ANY WARRANTY; without even the implied * * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. * * See the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * * with this program; if not, write to the Free Software Foundation, Inc., * * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. * * For the text or an alternative of this public license, you may reach us * * ComPiere, Inc., 2620 Augustine Dr. #245, Santa Clara, CA 95054, USA * * or via info@compiere.org or http://www.compiere.org/license.html * *****************************************************************************/ package org.apache.ecs; /** This interface describes all html 4.0 entities. @version $Id: Entities.java,v 1.2 2006/07/30 00:54:03 jjanke Exp $ @author <a href="mailto:snagy@servletapi.com">Stephan Nagy</a> @author <a href="mailto:jon@clearink.com">Jon S. Stevens</a> */ public interface Entities { public final static String NBSP = "&#160;"; // no-break space public final static String IEXCL = "&#161;"; // inverted exclamation mark public final static String CENT = "&#162;"; // cent sign public final static String POUND = "&#163;"; // pound sterling sign public final static String CURREN = "&#164;"; // general currency sign public final static String YEN = "&#165;"; // yen sign public final static String BRVBAR = "&#166;"; // broken (vertical) bar public final static String SECT = "&#167;"; // section sign public final static String UML = "&#168;"; // umlat (dieresis) public final static String COPY = "&#169;"; // copyright sign public final static String ORDF = "&#170;"; // ordinal indicator feminine public final static String LAQUO = "&#171;"; // angle quotation mark, left public final static String NOT = "&#172;"; // not sign public final static String SHY = "&#173;"; // soft hyphen public final static String REG = "&#174;"; // registered sign public final static String MACR = "&#175;"; // macron public final static String DEG = "&#176;"; // degree sign public final static String PLUSMN = "&#177;"; // plus-or-minus sign public final static String SUP2 = "&#178;"; // superscript two public final static String SUP3 = "&#179;"; // superscript three public final static String ACUTE = "&#180;"; // actue accent public final static String MICRO = "&#181;"; // micro sign public final static String PARA = "&#182;"; // pilcrow (paragraph sign) public final static String MIDDOT = "&#182;"; // middle dot public final static String CEDIL = "&#184;"; // cedilla public final static String SUP1 = "&#185;"; // superscript one public final static String ORDM = "&#186;"; // ordinal indicator, masculine public final static String RAQUO = "&#187;"; // angle quotation mark, righ public final static String FRAC14 = "&#188;"; // fraction one-quarter public final static String FRAC12 = "&#189;"; // fraction one-half public final static String FRAC34 = "&#190;"; // fraction three-quarters public final static String IQUEST = "&#191;"; // inverted quotation mark public final static String AGRAVE = "&#192;"; // capital A, grave accent public final static String AACUTE = "&#193;"; // capital A, acute accent public final static String ACIRC = "&#194;"; // capital A, circumflex accent public final static String ATILDE = "&#195;"; // capital A, tilde public final static String AUML = "&#196;"; // capital A, dieresis or umlaut mark public final static String ARING = "&#197;"; // capital A, ring public final static String AELIG = "&#198;"; // capital AE diphthong (ligature) public final static String CCEDIL = "&#199;"; // capital C, cedilla public final static String EGRAVE = "&#200;"; // capital E, grave accent public final static String EACUTE = "&#201;"; // captial E, acute accent public final static String ECIRC = "&#202;"; // capital E, circumflex accent public final static String EMUL = "&#203;"; // captial E, dieresis ur umlaut mark public final static String IGRAVE = "&#204;"; // capital I, grave accent public final static String IACUTE = "&#205;"; // captial I, acute accent public final static String ICIRC = "&#206;"; // captial I, circumflex accent public final static String IUML = "&#207;"; // capital I, dieresis or umlaut mark public final static String ETH = "&#208;"; // Eth, Icelandic public final static String NTILDE = "&#209;"; // capital N, tilde public final static String OGRAVE = "&#210;"; // capital O, grave accent public final static String OACUTE = "&#211;"; // capital O, acute accent public final static String OCIRC = "&#212;"; // capital O, circumflex accent public final static String OTILDE = "&#213;"; // capital O, tilde public final static String OUML = "&#214;"; // capital O, dieresis or umlaut mark public final static String TIMES = "&#215;"; // multiply sign public final static String OSLASH = "&#216;"; // capital O, slash public final static String UGRAVE = "&#217;"; // capital U, grave accent public final static String UACUTE = "&#218;"; // capital U, acute accent public final static String UCIRC = "&#219;"; // capital U, circumflex accent public final static String UUML = "&#220;"; // capital U, dieresis or umlaut mark public final static String YACUTE = "&#221;"; // captial Y, acute accent public final static String THORN = "&#222;"; // capital THORN (icelandic) public final static String SZLIG = "&#223;"; // small sharp s, German (sz ligature) public final static String aGRAVE = "&#224;"; // small a, grave accent public final static String aACUTE = "&#225;"; // small a, acute accent public final static String aCIRC = "&#226;"; // small a, circumflex accent public final static String aTILDE = "&#227;"; // small a, tilde sign public final static String aUML = "&#228;"; // small a, dieresis or umlaut mark public final static String aRING = "&#229;"; // small a, ring public final static String aELIG = "&#230;"; // small ae diphthong (ligature) public final static String cCEDIL = "&#231;"; // small c, cedilla public final static String eGRAVE = "&#232;"; // small e, grave accent public final static String eACUTE = "&#233;"; // small e, acute accent public final static String eCIRC = "&#234;"; // small e, circumflex accent public final static String eUML = "&#235;"; // small e, dieresis or umalut mark public final static String iGRAVE = "&#236;"; // small i, grave accent public final static String iACUTE = "&#237;"; // small i, acute accent public final static String iCIRC = "&#238;"; // small i, curcumflex accent public final static String iUML = "&#239;"; // small i, dieresis or umalut mark public final static String eth = "&#240;"; // small eth public final static String nTILDE = "&#241;"; // small n, tilde sign public final static String oGRAVE = "&#242;"; // small o, grave accent public final static String oACUTE = "&#242;"; // small o, acute accent public final static String oCIRC = "&#244;"; // small o, circumflex accent public final static String oTILDE = "&#245;"; // small o, tilde public final static String oUML = "&#246;"; // small o, diersis or umalut mark public final static String DIVIDE = "&#247;"; // division sign public final static String oSLASH = "&#248;"; // small o, slash public final static String uGRAVE = "&#249;"; // small u, grave accent public final static String uACUTE = "&#250;"; // small u, acute accent public final static String uCIRC = "&#251;"; // small u, circumflex accent public final static String uUML = "&#252;"; // small u, dieresis or umalut mark public final static String yACUTE = "&#253;"; // small y, acute accent public final static String thorn = "&#254;"; // small thorn, Icelandic public final static String yUML = "&#255;"; // small y, dieresis or umlaut mark // Mathmatical, Greek and Symbolic characters public final static String FNOF = "&#402;"; // latin small f with hook public final static String ALPHA = "&#913;"; // greek capital letter aplha public final static String BETA = "&#914;"; // greek capital letter beta public final static String GAMMA = "&#915;"; // greek capital letter gamma public final static String DELTA = "&#916;"; // greek capital letter delta public final static String EPSILON = "&#917;"; // greek capital letter epsilon public final static String ZETA = "&#918;"; // greek capital letter zeta public final static String ETA = "&#919;"; // greek capital letter eta public final static String THETA = "&#920;"; // greek capital letter theta public final static String IOTA = "&#921;"; // greek capital letter iota public final static String KAPPA = "&#922;"; // greek capital letter kappa public final static String LAMDA = "&#923;"; // greek capital letter lamda public final static String MU = "&#924;"; // greek capital letter mu public final static String NU = "&#925;"; // greek capital letter nu public final static String XI = "&#926;"; // greek capital letter xi public final static String OMICRON = "&#927;"; // greek capital letter omicron public final static String PI = "&#928;"; // greek capital letter pi public final static String RHO = "&#929;"; // greek capital letter rho public final static String SIGMA = "&#931;"; // greek capital letter sigma public final static String TAU = "&#932;"; // greek capital letter tau public final static String UPSILON = "&#933;"; // greek capital letter upsilon public final static String PHI = "&#934;"; // greek capital letter phi public final static String CHI = "&#935;"; // greek capital letter chi public final static String PSI = "&#936;"; // greek capital letter psi public final static String OMEGA = "&#937;"; // greek capital letter omega public final static String alpha = "&#945;"; // greek small letter aplha public final static String beta = "&#946;"; // greek small letter beta public final static String gamma = "&#947;"; // greek small letter gamma public final static String delta = "&#948;"; // greek small letter delta public final static String epsilon = "&#949;"; // greek small letter epsilon public final static String zeta = "&#950;"; // greek small letter zeta public final static String eta = "&#951;"; // greek small letter eta public final static String theta = "&#952;"; // greek small letter theta public final static String iota = "&#953;"; // greek small letter iota public final static String kappa = "&#954;"; // greek small letter kappa public final static String lamda = "&#955;"; // greek small letter lamda public final static String mu = "&#956;"; // greek small letter mu public final static String nu = "&#957;"; // greek small letter nu public final static String xi = "&#958;"; // greek small letter xi public final static String omicron = "&#959;"; // greek small letter omicron public final static String pi = "&#960;"; // greek small letter pi public final static String rho = "&#961;"; // greek small letter rho public final static String sigmaf = "&#962;"; // greek small letter sigma public final static String sigma = "&#963;"; // greek small letter sigma public final static String tau = "&#964;"; // greek small letter tau public final static String upsilon = "&#965;"; // greek small letter upsilon public final static String phi = "&#966;"; // greek small letter phi public final static String chi = "&#967;"; // greek small letter chi public final static String psi = "&#968;"; // greek small letter psi public final static String omega = "&#969;"; // greek small letter omega public final static String thetasym = "&#977;"; // greek small letter thetasym public final static String upsih = "&#978;"; // greek small letter upsih public final static String piv = "&#982;"; // greek small letter piv // Punctuation public final static String BULL = "&#8226;"; // bullet (small balck circle) public final static String HELLIP = "&#8230;"; // horizontal ellipsis public final static String PRIME = "&#8242;"; // prime public final static String PPRIME = "&#8243;"; // double prime public final static String OLINE = "&#8254;"; // overline public final static String frasl = "&#8260;"; // fraction slash // Leter like Symbols public final static String WEIERP = "&#8472;"; // Script capital P public final static String IMAGE = "&#8465;"; // blackletter capital I (imaginary part) public final static String REAL = "&#8476;"; // blackletter capital R (real part) public final static String TRADE = "&#8482;"; // trade mark sign public final static String ALEFSYM = "&#8501;"; // alef symbol // Arrows public final static String LARR = "&#8592;"; // leftwards arrow public final static String UARR = "&#8593;"; // upwards arrow public final static String RARR = "&#8594;"; // rightwardsards arrow public final static String DARR = "&#8595;"; // downwards arrow public final static String HARR = "&#8596;"; // left right arrow public final static String CRARR = "&#8529;"; // downwards arrow with corner leftwards public final static String LLARR = "&#8556;"; // leftwards double arrow public final static String UUARR = "&#8557;"; // upwards double arrow public final static String RRARR = "&#8558;"; // rightwards double arrow public final static String DDARR = "&#8559;"; // downwards double arrow public final static String HHARR = "&#8560;"; // left right double arrow // Mathmatical operators public final static String FORALL = "&#8704;"; // for all public final static String PART = "&#8706;"; // partial public final static String EXIST = "&#8707;"; // there exists public final static String EMPTY = "&#8709;"; // empty set public final static String NABLA = "&#8711;"; // nabla public final static String ISIN = "&#8712;"; // element of public final static String NOTIN = "&#8713;"; // not an element of public final static String NI = "&#8715;"; // contains as member public final static String PROD = "&#8719;"; // product of public final static String SUM = "&#8721;"; // sumation public final static String MINUS = "&#8722;"; // minus sign public final static String LOWAST = "&#8727;"; // asterisk operator public final static String RADIC = "&#8730;"; // square root public final static String PROP = "&#8733;"; // proportional public final static String INFIN = "&#8734;"; // infinity public final static String ANG = "&#8736;"; // angle public final static String AND = "&#8769;"; // logical and public final static String OR = "&#8770;"; // logical or public final static String CAP = "&#8745;"; // intersection public final static String CUP = "&#8746;"; // union public final static String INT = "&#8747;"; // integral public final static String THERE4 = "&#8756;"; // therefore public final static String SIM = "&#8764;"; // tilde public final static String CONG = "&#8773;"; // approximately equal to public final static String ASYMP = "&#8776;"; // almost equal to public final static String NE = "&#8800;"; // not equal to public final static String EQUIV = "&#8801;"; // identical to public final static String LE = "&#8804;"; // less then public final static String GE = "&#8805;"; // greater then public final static String SUB = "&#8834;"; // subset public final static String SUP = "&#8835;"; // superset public final static String NSUB = "&#8836;"; // not a subset of public final static String SUBE = "&#8838;"; // subset of or equal to public final static String SUPE = "&#8839;"; // superset of or equal to public final static String OPLUS = "&#8853;"; // circled plus public final static String OTIMES = "&#8855;"; // circled times public final static String PERP = "&#8869;"; // up track public final static String SDOT = "&#8901;"; // dot operator // Miscellaneous Technical public final static String LCEIL = "&#8968;"; // left ceiling public final static String RCEIL = "&#8969;"; // right ceiling public final static String LFLOOR = "&#8970;"; // left floor public final static String RFLOOR = "&#8971;"; // right floor public final static String LANG = "&#9001;"; // left pointing angle bracket public final static String RANG = "&#9002;"; // right pointing angle bracket // Geometric Shapes public final static String LOZ = "&#9674;"; // lozenge (not throat) // Miscellaneous Symbols public final static String SPADES = "&#9824;"; // black spade suit public final static String CLUBS = "&#9827;"; // black club suit public final static String HEARTS = "&#9829;"; // black heart suit public final static String DIAMS = "&#9830;"; // black diamond suit // Special Characters for html // CO Controls (Basic Latin) public final static String QUOT = "&#34;"; // quotation mark public final static String AMP = "&#38;"; // ampersand public final static String LT = "&#60;"; // less than sign public final static String GT = "&#62;"; // greater than sign // Latin Extended A public final static String OELIG = "&#338;"; // latin capital ligature oe public final static String SCARON = "&#339;"; // latin capital letter S with caron public final static String sCARON = "&#353;"; // latin small letter s with caron public final static String YUML = "&#376;"; // latin capital letter Y with diaeresis // Spcaing Modifier letters public final static String CIRC = "&#710;"; // modifier letter circumflex accent public final static String TILDE = "&#732;"; // small tilde // General Punctuation public final static String ENSP = "&#8194;"; // en space public final static String EMSP = "&#8195;"; // em space public final static String THINSP = "&#8201;"; // thin space public final static String ZWNJ = "&#8204;"; // zero width non-joiner public final static String ZWJ = "&#8205;"; // zero width joiner public final static String LRM = "&#8206;"; // left to right mark public final static String RLM = "&#8207;"; // right to left mark public final static String NDASH = "&#8211;"; // en dash public final static String MDASH = "&#8212;"; // em dash public final static String LSQUO = "&#8217;"; // left single quotation mark public final static String RSQUO = "&#8218;"; // right single quotation mark public final static String SBQUO = "&#8218;"; // single low-9 quotation mark public final static String LDQUO = "&#8220;"; // left double quotation mark public final static String RDQUO = "&#8221;"; // right double quotation mark public final static String BDQUO = "&#8222;"; // double low-9 quotation mark public final static String DAGGER = "&#8224;"; // dagger public final static String DDAGGER = "&#8225;"; // double dagger public final static String PERMIL = "&#8240;"; // per mille sign public final static String LSAQUO = "&#8249;"; // single left-pointing angle mark public final static String RSQQUO = "&#8250;"; // single right-pointing angle mark }
Preparation of alkenyl cyclopropanes through a ruthenium-catalyzed tandem enyne metathesis-cyclopropanation sequence. Acyclic enynes undergo a tandem enyne metathesis/cyclopropanation sequence in the presence of Grubbs' 1st generation metathesis catalyst and diazo compounds. In practice, the acyclic substrates in the presence of the ruthenium alkylidene first undergo a ring-closing enyne metathesis to generate cyclic 1,3-dienes; then upon addition of a diazo compound, these products are cyclopropanated selectively at the more accessible olefin. Overall, the reaction sequence converts acyclic enynes into vinyl cyclopropanes in single operation through two unique ruthenium-catalyzed transformations.
Workshops Printing with Leaves, Feathers and Grass The texture and veins of leaves, feathers, grasses make interesting and detailed prints. Kids will ink up their leaf and then print in different colors. Kids can bring their own botanicals from their natural world or use what we have here. Prints will be ready to take home the same day. Households who donate over $50 receive a year long 10%, discount on enrollment fees and store purchases. Learn more about donating.
326 SHARES Share Tweet Whatsapp Pinterest Reddit Flipboard U.S. Senator Doug Jones (D-Ala.) took to the Senate floor this evening to express his concern about the recent allegations that have come to light involving the President of the United States and the President of Ukraine. He also called on his colleagues to do their constitutional duty and to avoid the temptation to see these current events through a political lens. “I hope that my colleagues, as we go forward… will remember their oath,” Senator Jones said. “We didn’t take oaths to support the President of the United States. We didn’t take an oath to support the Republican Party. We didn’t take an oath to support the Democratic Party. We took an oath to defend the Constitution of the United States.” He continued, “Our duties to discharge that office are to be fair, to be impartial, to be deliberative, not political. Our duties to this office are to our constituents, to do the very best that we can in making sure that we analyze whatever is in front of us, because history will judge us. They will determine whether or not we acted with courage and conviction or whether we just simply tested the political winds, as some people are already doing.” “Ladies and gentlemen and colleagues, in the name of God, we have got to do our duty. We have to do our duty. We have to make sure that we fulfill our oaths, that we are not concerned about how many votes it might get us or how many votes it might lose. We have to fulfill that solemn obligation whether we know the outcome or not, whether we get pressure from a side or not, whether or not there are millions of dollars spent on TV and radio telling us to vote a certain way, in the name of God, we should do our duty and nothing less,” he concluded.
If the Dodgers really want Jon Lester and he doesn’t have any personal objections to playing in Los Angeles, a rival evaluator mused Thursday, then the Dodgers will get him. Plain and simple. Their pile of money is much larger than any team other than the Yankees -- who are not in the Lester bidding -- and if Lester’s decision comes down to the dollars alone, they will win. But only the Dodgers and Lester’s agent, Seth Levinson, know exactly how
<?xml version='1.0' encoding='utf-8'?> <section xmlns="https://code.dccouncil.us/schemas/dc-library" xmlns:codified="https://code.dccouncil.us/schemas/codified" xmlns:codify="https://code.dccouncil.us/schemas/codify" xmlns:xi="http://www.w3.org/2001/XInclude" containing-doc="D.C. Code"> <num>31-3104</num> <heading>Mental illness benefits.</heading> <para> <num>(a)</num> <text>Covered benefits for services set forth in this section shall be limited to coverage of treatment of clinically significant mental illnesses identified in the most recent edition of the International Classification of Diseases or of the Diagnostic and Statistical Manual of the American Psychiatric Association.</text> </para> <para> <num>(b)</num> <text>Treatment under this section shall be covered pursuant to <cite path="§31-3102">§ 31-3102</cite> for a minimum of 60 days per year for inpatient or residential care in a hospital or nonhospital residential facility, and at a minimum rate of 75% for the first 40 outpatient visits per year and at a minimum rate of 60% for any outpatient visits thereafter for that year.</text> </para> <annotations> <annotation doc="D.C. Law 6-195" type="History" path="§5">Feb. 28, 1987, D.C. Law 6-195, § 5, 34 DCR 491</annotation> <annotation doc="D.C. Law 16-242" type="History">Mar. 8, 2007, D.C. Law 16-242, § 2(d), 54 DCR 601</annotation> <annotation type="Effect of Amendments"><cite doc="D.C. Law 16-242">D.C. Law 16-242</cite>, in subsec. (b), substituted “60 days” for “45 days”.</annotation> <annotation type="Prior Codifications">1981 Ed., § 35-2304.</annotation> <annotation type="Section References">This section is referenced in <cite path="§31-3102">§ 31-3102</cite>, <cite path="§31-3105">§ 31-3105</cite>, <cite path="§31-3106">§ 31-3106</cite>, and <cite path="§31-3110">§ 31-3110</cite>.</annotation> </annotations> </section>
Q: Syntax Error when Using Case Statement I am using CASE statement to print various seasons based on select statement value SELECT (CASE WHEN (SELECT po.startdate FROM TABLE1 po JOIN TABLE2 a ON po.paramid = a.paramid WHERE po.paramid = 60) THEN (CASE WHEN DATEPART(month, po.STARTDATE) < 3 THEN 'Winter' WHEN DATEPART(month, po.STARTDATE) = 3 THEN CASE WHEN DATEPART(day, po.STARTDATE) < 01 THEN 'Winter' ELSE 'Spring' END WHEN DATEPART(month, po.STARTDATE) < 6 THEN 'Spring' WHEN DATEPART(month, po.STARTDATE) = 6 THEN CASE WHEN DATEPART(day, po.STARTDATE) < 21 THEN 'Spring' ELSE 'Summer' END WHEN DATEPART(month, po.STARTDATE) < 9 THEN 'Summer' WHEN DATEPART(month, po.STARTDATE) = 9 THEN CASE WHEN DATEPART(day, po.STARTDATE) < 21 THEN 'Summer' ELSE 'Autumn' END WHEN DATEPART(month, po.STARTDATE) < 12 THEN 'Autumn' WHEN DATEPART(month, po.STARTDATE) = 12 THEN CASE WHEN DATEPART(day, po.STARTDATE) < 1 THEN 'Autumn' ELSE 'Winter' END) END) FROM tABLE1 PO Error: Msg 4145, Level 15, State 1, Line 5 An expression of non-boolean type specified in a context where a condition is expected, near 'THEN'. Please can someone suggest what's wrong with this code? A: I cannot imagine that a query of this form actually does anything useful. However, your specific problem is right at the beginning: SELECT (case when (select po.startdate from TABLE1 po join TABLE2 a on po.paramid = a.paramid where po.paramid = 60 ) then . . . The case is expecting a boolean condition. It is getting a date. Hence, an error. An easy way to fix this error is: SELECT (case when exists (select po.startdate from TABLE1 po join TABLE2 a on po.paramid = a.paramid where po.paramid = 60 ) then . . . I don't know if that is the intended logic. And, I'm almost certain that if the query ran it would not do what you want (the alias po is suspiciously defined twice). I would advise you to ask another question. Describe the logic you want to implement. Provide sample data and desired results. I suspect that a subquery is not needed at all for what you want to do.
Q: Automatically inferred generic type in trait I want a generic base class which can be mixed in some traits. Is it possible to have the mixins automatically adopt the generic type of the base class? abstract class Base[T] { def foo: T = ??? def bar(value: T): Boolean } trait MixinA { self: Base[U] => // U should be automatically bound to T of Base[T] def bar(value: U): Boolean = false } A: You can achieve something approaching this using an abstract type in Base: abstract class Base[T] { type U <: T def foo: U = ??? def bar(value: U): Boolean } trait MixinA { self: Base[_] => final def bar(value: U): Boolean = false } REPL test: scala> class Impl extends Base[Int] with MixinA defined class Impl scala> val i = new Impl i: Impl = Impl@7ca5cc9e scala> val x: Int = i.foo scala.NotImplementedError: an implementation is missing at scala.Predef$.$qmark$qmark$qmark(Predef.scala:225) at Base.foo(<console>:9) ... 33 elided As you can see the compiler correctly determined that i.foo is a sub-type of Int (concretely, it is Int) and thus can be assigned to x (the exception here is just because you have left its body unimplemented).
Supramolecular complexation of alkali cations through mechanochemical reactions between crystalline solids. The organometallic zwitterion [Co(III)(eta(5)-C(5)H(4)COOH)(eta(5)-C(5)H(4)COO)] reacts quantitatively as a solid polycrystalline phase with a number of crystalline alkali salts MX (M = K(+), Rb(+), Cs(+), NH(4) (+); X = Cl(-), Br(-), I(-), PF(6)(-), although not in all cation/anion permutations) to afford supramolecular complexes of the formula [Co(III)(eta(5)-C(5)H(4)COOH)(eta(5)-C(5)H(4)COO)](2).M(+)X(-). In some cases, the mechanochemical complexation requires kneading of the two solids with a catalytic amount of water. The characterization of the solid-state products has been achieved by a combination of X-ray single-crystal and powder-diffraction experiments. The hydrogen-bonding interactions have been investigated by solid-state NMR spectroscopy. The mechanochemical reactions imply a profound solid-state rearrangement accompanied by breaking and forming of O-H...O hydrogen-bonding interactions between the organometallic molecules. All compounds could also be obtained by solution crystallization of the inorganic salts in the presence of the organometallic unit. The solid-state complexation of alkali cations by the organometallic zwitterion has been described as a special kind of solvation process taking place in the solid state.
'Upenamide: An unprecedented macrocyclic alkaloid from the Indonesian sponge Echinochalina sp. 'Upenamide (1) represents a new class of macrocyclic marine alkaloid possessing both spirooxaquinolizidinone and hemiaminal ring systems. It was isolated from the Indonesian sponge Echinochalina sp. The gross structure of 1 was elucidated by spectroscopic methods and accurate mass measurements. A suggestion is made as to its biogenetic origin.
William Yelverton, 2nd Viscount Avonmore For the 4th Viscount Avonmore with the same name, see William Yelverton, 4th Viscount Avonmore William Charles Yelverton, 2nd Viscount Avonmore (5 April 1762 – 28 November 1814) was an Irish nobleman. He was the son of Barry Yelverton, 1st Viscount Avonmore and Mary Nugent. He married Mary Reade, daughter of John Reade, on 1 September 1787. He held the office of Principal Registrar of the High Court of Chancery (Ireland). He succeeded his father in his titles on 1805. Children of William Charles Yelverton and Mary Reade Hon. Mary Yelverton (1788-1859) Hon. Barry John Yelverton, 3rd Viscount Avonmore (1790–1870) Hon. William Henry Yelverton (1791–1884) of Whitland Abbey, married 1825, Elizabeth Lucy Morgan Hon. Louisa Sarah Yelverton (1795-1866), married 1825, Rev. Andrew Sayers Hon. Augustus Yelverton (1802–1864), married 1825, Sarah Whiteside References Category:1762 births Category:1814 deaths Category:Viscounts in the Peerage of Ireland
Eleanor of England, Countess of Leicester Eleanor of England (also called Eleanor Plantagenet and Eleanor of Leicester) (1215 – 13 April 1275) was the youngest child of John, King of England and Isabella of Angoulême. Early life At the time of Eleanor's birth at Gloucester, King John's London was in the hands of French forces, John had been forced to sign the Magna Carta and Queen Isabella was in shame. Eleanor never met her father, as he died at Newark Castle when she was barely a year old. The French, led by Prince Louis the Lion, the future Louis VIII, were marching through the south. The only lands loyal to her brother, King Henry III of England, were in the Midlands and southwest. The barons ruled the north, but they united with the royalists under William Marshal, 1st Earl of Pembroke, who protected the young king Henry, and Louis was defeated. Before William Marshal died in 1219 Eleanor was promised to his son, also named William. They were married on 23 April 1224 at New Temple Church in London. The younger William was 34 and Eleanor only nine. He died in London on 6 April 1231, days before their seventh anniversary. There were no children of this marriage. Eleanor had brought a dowry of 10 manors and 200 pounds per year to this marriage. According to the law of the time, widows were allowed to retain one third of the estates of the marriage. However, her brother-in-law Richard took all of the estates and sold many, including her dowry, to pay William's debts. Eleanor strove for many years to try and recover her lost property. The widowed Eleanor swore a holy oath of chastity in the presence of Edmund Rich, Archbishop of Canterbury. Simon de Montfort Seven years later, she met Simon de Montfort, 6th Earl of Leicester. According to Matthew Paris, Simon was attracted to Eleanor's beauty and elegance as well as her wealth and high birth. They fell in love and married secretly on 7 January 1238 at the King's chapel in Westminster Palace. Her brother King Henry later alleged that he only allowed the marriage because Simon had seduced Eleanor. The marriage was controversial because of the oath Eleanor had sworn several years before to remain chaste. Because of this, Simon made a pilgrimage to Rome seeking papal approval for their union. Simon and Eleanor had seven children: Henry de Montfort (November 1238 – 1265) Simon de Montfort the Younger (April 1240 – 1271) Amaury de Montfort (1242/1243–1300) Guy de Montfort, Count of Nola (1244–1288) Joanna, born and died in Bordeaux between 1248 and 1251 Richard de Montfort (1252–1281) Eleanor de Montfort Princess of Wales (1258–1282) During the Second Barons' War, Simon de Montfort's victory at the Battle of Lewes in 1264 led to him becoming de facto ruler of England. He tried to set up a reformed government, including the first parliament elected by citizens of the towns, but was unable to retain the support of the other barons. Several switched sides to the royalist cause; Montfort was defeated at the Battle of Evesham on 4 August 1265, where he was killed along with his son. Eleanor fled to exile in France where she became a nun at Montargis Abbey, a nunnery founded by her deceased husband's sister Amicia, who remained there as abbess. There she died on 13 April 1275, and was buried there. She was well treated by Henry, retained her incomes, and her proctors were allowed to pursue her litigation concerning the Leicester inheritance in the English courts; her will and testament were executed without hindrance. Through her son Guy, Eleanor was an ancestor of Elizabeth Woodville, queen consort of Edward IV. Eleanor's daughter, Eleanor de Montfort, was married, at Worcester in 1278, to Llywelyn ap Gruffudd, Prince of Wales. She would die giving birth to their only child, Gwenllian of Wales. After the conquest of Wales, Gwenllian was imprisoned by Edward I of England, her mother's first cousin, at Sempringham priory, where she died 1337. Fiction Eleanor appears as a major character in Sharon Kay Penman's novel Falls the Shadow, where she is called Nell. Eleanor is the main character in Virginia Henley's historical romance The Dragon and the Jewel, which tells of her life from just before her marriage to William Marshal to right before the Battle of Lewes in 1264. Her romance and marriage to Simon de Montfort are much romanticized in this novel, especially since in real life Simon is killed the year following the Battle of Lewes and the pair had already had all 7 of their children; in the book, Eleanor and Simon have only just had their first two sons. Eleanor makes a second appearance in Henley's The Marriage Prize. Her role in the book is that of the legal guardian to her niece, Rosamond Marshal. Ancestors Sources Notes Category:1215 births Category:1275 deaths Category:13th-century English people Category:13th-century English women Category:English princesses Category:English Roman Catholic religious sisters and nuns Category:House of Plantagenet
It's one thing to watch race hustlers like the Rev. Al Sharpton bellowing, "No justice, no peace." But when the attorney general of the United States makes false but racially incendiary claims about today's alleged "pernicious racism," we are in uncharted territory. Holder complains about different prison rates, different school expulsion rates and longer prison sentences for black boys and men compared to white boys and men. He equates "equal rights" with "equal results." In Ferguson, Missouri, after announcing federal investigation into the cop-shooting death of an unarmed black teen, Holder said: "I am the attorney general of the United States. But I am also a black man. I can remember being stopped on the New Jersey Turnpike on two occasions and accused of speeding. ... I remember how humiliating that was and how angry I was and the impact it had on me." The New Jersey Turnpike? The long-believed claim of "racism" on that highway has been investigated — and debunked. Twice. Numerous complaints of DWB — Driving While Black — were filed by blacks driving on the New Jersey Turnpike. So the state entered into a consent decree, agreed to federal monitoring, and put their officers through, among other things, "sensitivity training." New Jersey commissioned a study, checking motorists' speed with laser guns and photographing drivers of vehicles going 15 mph or more over the speed limit. The result? It turned out that more speeders were black than white, which explained why cops pulled over black motorists so often. The U.S. Justice Department, which requested the study, did not want the results released to the public. Instead, they accused the researchers of using a "flawed methodology." Why shelve a report that disproves racism? Isn't it good news that Jersey troopers do not pull blacks over willy-nilly? Would this not improve race relations in New Jersey? No — the facts did not fit the script. The next year, state police "stop data" showed that, on the southern part of the turnpike, 30 percent of the drivers pulled over were minority — almost twice the 16 percent rate of minority stops elsewhere on the turnpike. So, amid new allegations that cops were targeting minorities, and to correct the "flawed methodology" of the previous researchers, New Jersey Attorney General Peter Harvey commissioned yet another study. The result? Again, it turned out a disproportionately higher percentage of drivers on that stretch of highway were black, and that blacks were more likely than non-blacks to drive 80 miles per hour or faster. Again, critics called the study's methodology "flawed." Over 20 years ago, black liberal Harvard sociologist Orlando Patterson said: "The sociological truths are that America, while still flawed in its race relations ... is now the least racist white-majority society in the world; has a better record of legal protection of minorities than any other society, white or black; offers more opportunities to a greater number of black persons than any other society, including all those of Africa." Holder, however, sees an America — as to "race-relations" — still mired in the 1950s. On a plane about 20 years ago, I met a black man who told me he was nearing 100 years old. What is the secret, I asked, to a long and happy life? Tall and ramrod straight, he said: "I tell my granddaughters to greet everyone with a big smile and an outstretched hand for a handshake. But those young girls don't wanna hear nothing about no smile and no handshake. That generation ain't got no appreciation for how easy they got it." Perhaps Holder feels guilty because he didn't do something more noble, like marching with MLK while braving attack dogs and water hoses. Perhaps Holder feels guilty because of his own personal success and fears the "people he left behind" will resent him if he doesn't sound empathetic. Holder's victicrat mentality might also explain why rich blacks — including, for time, Oprah Winfrey — belonged to Chicago's Trinity United Church of Christ whose pastor denounces the very drive for upward mobility that made Oprah Winfrey Oprah Winfrey. Why else would successful blacks pull up in their Lexus and BMW's to attend a church that denounces the work ethic that enabled them to drive nice cars, live in nice houses in nice, clean and safe neighborhoods? What sense does it make for a rich black man to listen to his pastor tell him how racism has held him back from becoming rich? Those "left behind" need a message of hard work and accountability and of seizing the opportunities uniquely offered by the United States of America. In a 1997 Time/CNN poll, a majority of black teens called racism a "big problem." But 89 percent of black teens called racism a "small problem" or "not a problem at all" in their own lives. In fact, nearly twice as many black teens than white teens called "failure to take advantage of available opportunities" a bigger problem than racism.
Networking in medical education: creating and connecting. Social networking is being increasingly used as a tool of choice for communications and collaborations in business and higher education. Learning and practice become inseparable when professionals work in communities of practice that create interpersonal bonds and promote collective learning. Individual learning that arises from the critical reconstruction of practice, in the presence of peers and other health professionals, enhances a physician's capability of clinical judgment and evidence-based practice. As such, it would be wise for medical schools, whose responsibility it is to prepare students to make a transition to adult life with the skills they need to succeed in both arenas, to reckon with it.
For indispensable reporting on the coronavirus crisis, the election, and more, subscribe to the Mother Jones Daily newsletter. Sen. Patrick Leahy (D-Vt.) provoked a rare unscripted reaction from Brett Kavanaugh in day two of his Supreme Court confirmation hearing while questioning him about emails improperly disclosed during the George W. Bush years. While Kavanaugh was associate counsel in Bush’s White House from 2001 to 2003, Republican Senate aide Manny Miranda helped leak thousands of emails from Democratic members on the Judiciary Committee, including strategy memos outlining how Democrats planned to question Bush’s judicial nominees. (Miranda’s case was referred to the Justice Department, which did not charge him with a crime.) The nominee appeared confused when Leahy flashed a copy of an email Kavanaugh had received from Miranda regarding committee Democrats’ inquiries into Priscilla Owen, whose nomination to the Fifth Circuit Court of Appeals was filibustered by Democrats for four years before she was eventually confirmed. The email included a draft copy of a memo circulated among Democratic senators that Leahy said was later leaked to Fox News. “Is that what this email is?” Kavanaugh asked. “Can I take a minute to read it?” OOF — Leahy presses Kavanaugh about whether he found it "at all unusual to receive a draft letter from Democratic senators to each other before any mention of it was made public?" In other words, Leahy is accusing Kavanaugh of having obviously stolen files in his inbox. pic.twitter.com/wYgCtlkphD — Aaron Rupar (@atrupar) September 5, 2018 Kavanaugh denied knowledge of anything unusual about the email’s origin, but Leahy persisted asking him what he knew about the document’s origins. “You had the full text of my letter in your inbox before anything had been said about it publicly,” the senator told Kavanaugh. “Did you find it all unusual to receive a draft letter from Democratic senators to each other before any mention of it was made public?” During his 2006 confirmation hearings to be a judge on the DC Circuit Court of Appeals, Kavanaugh said he was unaware of Manny’s actions. “I did not know about any memos from the Democratic side,” he said. “I did not suspect that.” “You’re getting obviously very private Democratic emails. You weren’t concerned how Mr. Miranda got ’em?” Leahy asked. “I guess I’m not sure about your premise,” Kavanaugh replied. “Were you at all concerned about where Mr. Miranda got some of the material he was showing you?” Leahy continued. “I don’t recall that,” Kavanaugh said. LEAHY: "I'm concerned because there is evidence that Mr. Miranda provided you with materials that were stolen from me. And that would contradict your prior testimony… there is no reason [those emails] can't be made public." pic.twitter.com/lqMkJun42i — Aaron Rupar (@atrupar) September 5, 2018 He ultimately conceded that it was possible a Republican staffer may have sent him material he improperly obtained. “I’m not going to rule anything out,” he said. Listen to reporter Stephanie Mencimer discuss the chaos surrounding Kavanaugh’s confirmation hearing in this week’s episode of the Mother Jones Podcast:
Wednesday, September 19, 2018 The Details Behind The Air Jordan 5 “Fresh Prince” In the late 1980s, Air Jordans began to appear more and more on the feet of musicians and celebrities, and The Fresh Prince of Bel-Air, a sitcom that catapulted a young Will Smith to superstardom, was remembered for its inclusion of Jordans on several occasions. In celebration of the real Will Smith’s 50th birthday, Jordan Brand is re-issuing the popular “Grape” colorway with one key original detail, Nike Air. But as a nod to the character that campaigned for the Air Jordan 5's off-the-court popularity, the shoes won’t come attached with any shoelaces whatsoever, an obscure homage to the casual slip-on style employed by the boisterous teen. Additionally, the shoes feature the “West Philadelphia” etched below the tongue plate, while custom insoles feature boldly striped detailing with “Air Jordan” written in graffiti-like font. The question is, should Jordan Brand also please the purists with a true retro of the original? There’s no question that the Air Jordan 5 “Grape” with the teal-colored Nike Air threading on the heel will be a huge hit, so only time will tell if Jumpman will deliver. Check out a closer look at the Air Jordan 5 NRG “Fresh Prince” below and stay tuned for the official release on Will Smith’s birthday on September 25th.
Current role of protective agents in cancer treatment. The administration of intensive chemotherapy according to a rigid schedule improves response rates and duration of response. However, dose-limiting toxicities and resulting delays in therapy often interfere with therapy intensification. In recent years, cytoprotective agents have been developed that can protect normal cells, but not tumor cells, from chemotherapeutic or radiation damage. Amifostine (Ethyol), dexrazoxane (Zinecard), and mesna (Mesnex) are true cytoprotectors administered shortly before chemotherapy. Colony-stimulating factors (CSFs) are administered after chemotherapy to rescue the bone marrow and stimulate hematologic recovery. In the appropriate settings, use of these agents has facilitated the intensification of chemotherapy and has significantly attenuated the impact of chemotherapy on normal cells.
Motorists will pay an extra 49c per litre for petrol next month, the Department of Energy has confirmed. CAPE TOWN - Motorists will pay an extra 49c per litre for all grades of petrol next month, the Department of Energy has confirmed. Diesel will increase by between 30c and 32c per liter. Illuminating paraffin users will pay between 34c and 46c per litre while liquefied petroleum gas users will pay an extra 96c per kilogram. The department said that the reason for the increase was the depreciation of the rand against the US dollar. "The average international product prices of petrol, diesel and illuminating paraffin increased during the period under review," the department said in a statement. "The rand depreciated against the US dollar during the period under review, on average, when compared to the previous period. The average rand/US dollar exchange rate for the period 31 March 2017 to 25 April 2017 was R13.5105 compared to R12.9148 during the previous period. This led to a higher contribution to the basic fuels price on petrol, diesel and illuminating paraffin by 26.83c/l, 25.48c/l and 25.33c/l respectively." The department's Robert Maake says: “It is also the price of petroleum product in the international market, which increased in line with the increase of the price of crude oil.” The increases are effective as of 3 May.
Rayovac Alkaline AAA Batteries (30-Pack) 824-24B6TD at The ...For value and performance, use the Rayovac Alkaline AAA Batteries (30-Pack). They are ideal for a variety of uses. They come equipped with a money-back .http://www.homedepot.com/buy/tools-hardware-safety-security-batteries-chargers/rayovac-alkaline-aaa-batteries-30-pack-171027.html RV AL-AAA 8/PK | RAYOVAC | BatteriesRV AL-AAA 8/PK | RAYOVAC | Batteries. Bulbtronics has the largest selection and best prices on all Batteries products. For more detailed specifications for this .http://www.bulbtronics.com/(S(k0vnkfviuw3d1j45ypbr2z3b)A(OJS8TTlRzQEkAAAAYTM1YTI4ZjItOTdlNy00N2UzLTg4ODQtM2JkZTVhZDU0ZTgy95cw8Iyg3MN_ysBckie6UDBYnVE1))/Search-The-Warehouse/ProductDetail.aspx?sid=0028814&pid=RVALAAA8&Source=SearchResults Rayovac Platinum Everyday Charger - Battery Charger Review ...The Rayovac Platinum Everyday Charger performs like many of the other battery . There are four compartments for AA batteries and four compartments for AAA .http://battery-charger-review.toptenreviews.com/rayovac-platinum-everyday-charger-review.html Rechargeable AAA BatteriesRechargeable batteries are also better for the environment. Also see our Energizer, Duracell and Rayovac battery chargers for rechargeable AAA batteries.http://www.batterybundle.com/rechargeable-aaa-batteries/
Q: Recommended way to execute async tasks with RXJava I'm new to RxJava and I'm trying to understand the best/recommended way to perform long running tasks asynchronously (e.g. network requests). I've read through a lot of examples online but would appreciate some feedback. The following code works (it prints 'one', 'two', then 'User: x' ... etc) but should I really be creating/managing Threads manually? Thanks in advance! public void start() throws Exception { System.out.println("one"); observeUsers() .flatMap(users -> Observable.from(users)) .subscribe(user -> System.out.println(String.format("User: %s", user.toString())); System.out.println("two"); } Observable<List<User>> observeUsers() { return Observable.<List<User>>create(s -> { Thread thread = new Thread(() -> getUsers(s)); thread.start(); }); } void getUsers(final Subscriber s) { s.onNext(userService.getUsers()); s.onCompleted(); } // userService.getUsers() fetches users from a web service. A: Instead of managing your own thread try using the defer() operator. Meaning replace observeUsers() with Observable.defer(() -> Observable.just(userService.getUsers())). Then you can use the RxJava Schedulers to control what threads are used during subscription and observation. Here's your code modified with the above suggestions. Observable.defer(() -> Observable.just(userService.getUsers())) .flatMap(users -> Observable.from(users)) .subscribeOn(Schedulers.newThread()) .observeOn(Schedulers.trampoline()) .subscribe(user -> System.out.println(String.format("User: %s", user.toString()));
Q: Passing data from activity to fragment nullpointer exception I'm writing this app where a String has to be passed from activity to fragment but I get a nullpointerexception, here is my code: Interface: public interface FragmentCommunicator { public void passDataToFragment(String value); } fragment code: public class YouWinFragment extends Fragment implements FragmentCommunicator { TextView score; @Override public View onCreateView(LayoutInflater inflater, ViewGroup container, Bundle savedInstanceState) { return inflater.inflate(R.layout.fragment_youwin, container,false); } @Override public void onActivityCreated(Bundle savedInstanceState) { // TODO Auto-generated method stub super.onActivityCreated(savedInstanceState); score = (TextView) getActivity().findViewById(R.id.score_win); } @Override public void passDataToFragment(String value) { // TODO Auto-generated method stub score.setText(value); } } Main activity: public class MainActivity extends ActionBarActivity{ Button youWin; String theCounter; YouWinFragment youWinFrag; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); youWinFrag=new YouWinFragment(); setContentView(R.layout.activity_main); youWin = (Button) findViewById(R.id.button_youwin); youWin.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { // TODO Auto-generated method stub FragmentManager fm=getFragmentManager(); FragmentTransaction ft=fm.beginTransaction(); ft.add(R.id.fragment_endgame,youWinFrag ); ft.commit(); } }); youWinFrag.passDataToFragment("your score is 20"); } } A: Can you post the logcat so we know where the null pointer exception occurs? You can look into using setArgument(Bundle) on your fragment. So in your MainActivity you would have something like: Bundle bundle = new Bundle(); bundle.putString("STRING_KEY", "your score is 20"); mYouWinFrag = new YouWinFragment(); mYouWinFrag.setArguments(bundle); Now in your YouWinFragment, you would have: String score = getArguments().getString("STRING_KEY"); // Optionally, you can have a default value by using getArguments().getString("STRING_KEY", "A default value if the key isn't set");
Q: error while running solr index I am running solrindex on nutch crawled data using the following command: bin/nutch solrindex <prep><code>http://127.0.0.1:8983/solr/ /app/hadoop/tmp/crawled_pages/crawldb -linkdb /app/hadoop/tmp/crawled_pages/linkdb /app/hadoop/tmp/crawled_pages/segments/* I am getting the below error and I am not able to root cause for this issue. org.apache.solr.common.SolrException: ERROR: [doc=http://www.bbc.co.uk/portugueseafrica/arquivo/index.shtml] unknown field 'cache' ERROR: [doc=http://www.bbc.co.uk/portugueseafrica/arquivo/index.shtml] unknown field 'cache' request: <prep><code>http://127.0.0.1:8983/solr/update?wt=javabin&version=2 at org.apache.solr.client.solrj.impl.CommonsHttpSolrServer.request(CommonsHttpSolrServer.java:430) at org.apache.solr.client.solrj.impl.CommonsHttpSolrServer.request(CommonsHttpSolrServer.java:244) at org.apache.solr.client.solrj.request.AbstractUpdateRequest.process(AbstractUpdateRequest.java:105) at org.apache.nutch.indexer.solr.SolrWriter.write(SolrWriter.java:124) at org.apache.nutch.indexer.IndexerOutputFormat$1.write(IndexerOutputFormat.java:55) at org.apache.nutch.indexer.IndexerOutputFormat$1.write(IndexerOutputFormat.java:44) at org.apache.hadoop.mapred.ReduceTask$OldTrackingRecordWriter.write(ReduceTask.java:457) at org.apache.hadoop.mapred.ReduceTask$3.collect(ReduceTask.java:497) at org.apache.nutch.indexer.IndexerMapReduce.reduce(IndexerMapReduce.java:195) at org.apache.nutch.indexer.IndexerMapReduce.reduce(IndexerMapReduce.java:51) at org.apache.hadoop.mapred.ReduceTask.runOldReducer(ReduceTask.java:519) at org.apache.hadoop.mapred.ReduceTask.run(ReduceTask.java:420) at org.apache.hadoop.mapred.LocalJobRunner$Job.run(LocalJobRunner.java:260) 2012-12-10 10:05:49,198 ERROR solr.SolrIndexer - java.io.IOException: Job failed! Did anybody got similar problem? I don't understand what is the root cause for this below error.. org.apache.solr.common.SolrException: ERROR: [doc=http://www.bbc.co.uk/portugueseafrica/arquivo/index.shtml] unknown field 'cache' A: Added the following line in solr_xx_xx/example/solr/conf/schema.xml <field name="cache" type="string" stored="true" indexed="false"/> and it worked fine.
TERNI, Italy (AP) — Italy's plan to reduce the risk of a jihadi-inspired attack is pinned in small part on El Hacmi Mimoun, an imam who bikes to the prison in Terni every week and exhorts Muslim inmates not to stray from life's "right path" or hate people who aren't Muslim. Seven inmates — three Moroccans, three Tunisians and a Somali — left their cells at Terni Penitentiary on an early summer day to listen as the Moroccan-born imam led prayers and delivered a sermon. Sunlight from a high barred window streamed through Mimoun's gauzy, off-white robe. "If I am praying, I am not cooking up ideas to harm others on the outside," a 35-year-old Tunisian inmate said, sitting cross-legged in the small, beige-tiled room that was converted into the prison's Mosque of Peace. None of the inmates would give their names, and prison rules precluded asking why they were serving time. So far spared the attacks that have stunned France, Belgium, Britain and Germany, Italy has relied mostly on arresting and deporting suspected extremists to try to keep the country safe. But the Italian government has come to embrace prevention, too, especially in the prisons it doesn't want to become training grounds for potential extremists. Inviting in imams who have been vetted to make sure they espouse "moderate views" is a tactic now being employed in Italian prisons to counter radicalization among inmates. In February, the government signed a recruiting agreement with the Union of Islamic Communities and Organizations in Italy, which professes to foster Islamic pluralism. When preaching to inmates, "we stress that we are Italians of Muslim faith, Europeans of Muslim faith. ... We are 100 percent citizens with rights and duties," Union president Izzeddin Elzir said. Italy's second generation of Muslim immigrants is just coming of age now. For the most part, the nation lacks neighborhoods with heavy concentrations of Muslim residents. But Muslims make up a disproportionate share of the population in Italy's prisons. More than a third of all inmates in Italian penitentiaries are foreigners, and 42 percent of those come from the majority-Muslim countries of Morocco, Albania and Tunisia, according to a 2017 report by inmate advocacy group Antigone. The advocacy group counted 411 chaplains but only 47 imams working in Italy's 200 prisons. Prison system officials worry that if imams don't make regular visits, inmates might be more vulnerable to the influence of those who are already radicalized. "It's not so much those (inmates) who preach, but those who submit to this proselytizing" who are considered at risk, Terni Penitentiary Superintendent Natascia Bastianelli said. Justice Ministry Undersecretary Gennaro Migliore stressed in an interview that of about 11,000 Italian prison inmates from predominantly Muslim countries, "those who could be potentially radicalized, or already radicalized don't exceed 400" inmates. So far, 13 UCOII imams have started preaching in eight prisons after being screened by interior ministry officials. Government officials and the organization plan to evaluate the strategy's effectiveness as a de-radicalization tool this fall. If Italy needed a wake-up call, it came with the morning news two days before Christmas. Before dawn, officers in Milan confronted and killed a young Tunisian suspected of driving the truck that plowed through shoppers at a Berlin Christmas market that week, killing 12. Anis Amri is believed to have become radicalized during the 3 ½ years he spent in Italian prisons for his role in a riot at a migrant center. In a separate case, authorities accused a Tunisian inmate with alleged links to extremist groups of recruiting fellow Muslims at an Italian prison and attacking inmates who resented his extremist propaganda. Terni police commander Fabio Gallo said learning that Amri had spent time in Italian prisons spurred him and other prison officials to sharpen their skills at recognizing an inmate who is becoming radicalized. About 20 percent of the penitentiary's personnel have taken courses to make them aware of possible signs, such as preaching to other inmates or exulting at television news coverage about extremist attacks in Europe, Gallo said. But he stressed that it's often difficult to realize which words or gestures might be worrisome signals, especially for staff who don't understand Arabic. And inmates are catching on to what tips prison personnel off, Gallo said. "Nobody has a long beard" anymore, the commander said. Vetting imams may not prove to be a straightforward process either. "Where do you set the bar? Is it OK if someone is saying Western society is decadent, but at the same time condemns ISIS?" asked Lorenzo Vidino, an Islamism expert. Former anti-terrorism magistrate Stefano Dambruoso, who is now a lawmaker in Italy, endorses careful screening of who will be preaching to men and women behind bars. He thinks it's essential "they have been trained in schools, in environments respectful of the founding principles of our constitution." Yet Dambruoso also expresses concern about the imams invited into prisons "turning into some kind of secret eye, or a spy for the institutions." On the day when Mimoun was at Terni Penitentiary, 46 of the 109 foreigners in the medium-security section were from northern Africa. The imam delivered his sermon in Arabic, sprinkled with Italian and French phrases. He said he teaches his followers to "respect Italians, respect neighbors, your colleagues, your cellmates." One of the inmates who came to pray in the mosque said that "if you respect religion, our religion, you won't commit" extremist attacks. After the seven were accompanied back to their cells, Mimoun told of how an inmate once confided in him that he "hated Italians." "I showed him in the Quran where it says you cannot hate others of different religions," the imam said.
Q: iOS safari random resize and scroll issue I am developing a website for desktop and mobile view. but when I test my mobile view on iOS Safari I encounter the following error on the mobile page there is a dropdown for user to select to jump to certain section of the page, on iOS when user select on the drop down, Safari will auto zoom in to the page. i would like to check how do i prevent this on iOS Safari, when user tried to scroll the page where the html table cover almost the whole page, they will not be able to scroll the page. the user would have to try to touch on the certain section of the page where the table is not covering. i.e when user try to scroll on the page and they touch on the table they will not be able to scroll upwards or downwards for my 1st question I tried adding the following JS in the document ready function but it is not helping $(window).resize(function() { if($(window) !== windowWidth){ clearTimeout(executeFunction); executeFunction = setTimeout(function() { fn(variable); }, timeToExecute); } }); for my 2nd question I tried the following CSS but seems to not be helping html, body { height: 100% !important; } A: i am able to fixed my auto zoom option by setting the min font size of the dropdown list to 16px since safari will auto zoom when font size is less than 16px #ddlNavigation, #ddlNavigation:focus{ font-size:16px !important; } for my html table scrolling i used niceScroll.js and it managed to fixed my issue
Positive selection of a Qa-1-restricted T cell receptor with specificity for insulin. The phenotype and development of T cells from transgenic mice expressing a T cell receptor with specificity for insulin presented by the MHC class Ib molecule Qa-1(b) was investigated. Peripheral T cells from the transgenic mice express CD8 and, after activation, kill Qa-1(b)-positive lymphoid target cells in the presence of soluble insulin. Thymic selection requires expression of Qa-1(b) but not the dominant Qa-1-associated peptide, Qdm. In contrast to conventional T cells, selection is at least as efficient when the selecting ligand is expressed only on hematopoietic lineage cells as compared to expression on epithelial cells in the thymus. Our findings suggest that there is a dedicated population of Qa-1-restricted T cells that are selected by interaction with Qa-1 and that the cellular requirements for selection may differ from conventional T cells.
rice Introduction rice, cereal grain ( Oryza sativa ) of the grass family (Graminae), probably native to the deltas of the great Asian rivers—the Ganges, the Chang (Yangtze), and the Tigris and Euphrates. The plant is an annual, from 2 to 6 ft (61–183 cm) tall, with a round, jointed stem; long, pointed leaves; and edible seeds borne in a dense head on separate stalks. Wild rice is obtained from a different grass plant.
Second Perek, Third Mishna Expanded Translation This woman has one pair of undesignated birds. This woman has two pair. This woman has three pair. This woman has four pair. This woman has five pair. This woman has six pair. This woman has seven pair. One bird flew from the group belonging to the first woman to that of the second. Then a bird (not necessarily the same bird) flew from the second group to the third woman's group. Then a bird flew from the third group to the fourth woman's group, then a bird flew from the fourth group to the fifth woman's group. Then a bird flew from the fifth group to the sixth woman's group. Then a bird flew from the sixth group to the seventh woman's group. Then one bird flew back from each group to the next smaller group. Each bird disqualifies one pair when it leaves a group to a larger group and it also disqualifies one pair when it returns from a group to a smaller group. The first and second women have nothing that can be brought. The third woman (whose group started with three pair) has one pair that can be brought. The fourth woman has two pair. The fifth woman has three pair. The sixth woman has four pair. The seventh woman has six pair. Only one bird left the seventh group (into the sixth). Therefore, unlike most of the groups, in which two pair are disqualified, one pair is disqualified in the seventh group. The seventh woman is then left with six pair to be brought. Example of the Case of the Mishna The First Porach V'chozar Each of seven women had a different number of kinim. The first woman had one kain (two birds), the second, two kinim, and so on. First, one bird flew out of the first group to the second, then one flew from the second to the third, and so on, until the seventh. (None yet flew out of the seventh.) Then a bird flew out of group seven to group six, then one flew from group six to five, and so on to group one. (But a second bird did not fly out of group one.) It is possible that only one bird did all the travelling in each direction. It is possible that each flight was done by a different bird. It is possible that some of the flights were done by one bird and some by other birds. Result Each group has the same number of birds it started with. One bird has flown out of groups one and seven, and two birds left groups two through six. Although each group has the same number of birds as it started with, one or two now in each group might not have originated in that group. [Diagram 9] Dinim Din of the First Group No korbonos may be brought. Reason Either bird now in the first group might be an original member of the group. It may not be brought as a Chatos for perhaps its partner, which might now be in another group, will be brought as a Chatos. It may not be brought as an Olah because its partner might be brought as an Olah. [Diagram 14, meant to be viewed later] Din of the Second Group None of the four birds is brought. Reason None of the birds may be brought as a Chatos because the two birds that flew out might both be brought as Chato'os by other women. None may be brought as Olos because the two that flew out might be brought as Olos by other women. We want to assure that no more than two of the original birds of the second group will be Chato'os, nor will more than two be Olos. Comment In fact, one of the two birds that flew out of the second group flew into the first group. Since none of the birds now in the first group will be offered, we need not be concerned that that bird will be a Chatos or an Olah. However, in order to avoid confusion the Rabonon said that we should treat this bird as if it flew among birds that would become korbonos. (Tosfos, Maseches Yuma Daf 65:2, dibbur hamas'chil "umishoom gzaira yomusu.") One possible understanding of this rule is that when two birds fly out of one group, and one mingles with birds that are offered and the other with birds that are not, we consider it as if both flew among birds that are offered. [Diagram 15] Din of the Third Group One bird is brought as a Chatos, another as an Olah. The remaining four birds are not brought. Reason We cannot bring two Chato'os because other women might bring the two birds that flew out as Chato'os. No more than three Chato'os may be brought from the original group of six birds. We cannot bring two Olos because the two birds that flew out might become Olos. No more than three Olos may be brought from the original group. Comment In fact, the bird that flew to group two will not be brought because none of the second group is brought. The Rabonon treat this case as if both birds flew where there was a risk that they would be brought, as we treated the second group. [Diagram 16] Din of the Fourth, Fifth, and Sixth groups We bring four birds of the eight in the fourth group, six of the ten in the fifth group, and eight of the twelve in the sixth group. Half of those brought are Chato'os, and half are Olos. Reason The din follows the reasoning for the second and third groups. Namely, two birds left each group. We reduce by two the number of Chato'os to be brought from each group, in case both birds that flew out are brought as Chato'os. We also reduce by two the number of Olos from each group, in case both birds that left are brought as Olos. That is, four fewer birds are brought than the original number. This reduces the number of korbonos from eight to four, from ten to six, and from twelve to eight in the respective groups. [Diagrams 10, 11, and 12] Din of the Seventh Group We bring twelve of the fourteen birds, six as Chato'os and six as Olos. Reason Only one bird left this group. Since the bird that flew out might be brought as a Chatos, we reduce the number of Chato'os brought from this group by one. Since it might be brought as an Olah, we bring one Olah less. That is, six birds are Chato'os, six are Olos, and two are not brought at all. [Diagram 13] Comment The dinim of the first through seventh groups are applications of the principle stated following Mishna Bais, that each bird flying out of a group reduces by two the number of birds that can be brought from that group. Expanded Translation Then, starting with the third group, a bird flew out of each group into the next larger group, and one bird flew back from group seven through four into the next smaller group. Each bird disqualifies one pair when it leaves a group for a larger group, and disqualifies a pair when it returns from a group to a smaller group. The third and fourth women have nothing that can be brought. The fifth woman, who after the first porach v'chozar had three pair, now has one pair. The sixth woman has two. The seventh has five. Example of Case of the Mishna The Second Porach V'chozar At the end of the first porach v'chozar all the birds in the first and second groups are disqualified from being korbonos. Therefore, birds will now move only among groups three through seven, as the end of the Mishna clarifies. As this part begins, the third woman can bring two birds (one kain of her original three), the fourth woman can bring four birds (two kinim of four), the fifth can bring six (three kinim of five), the sixth can bring eight (four kinim of six), the seventh can bring twelve (six kinim of seven). Now one additional bird flew from the third group to the fourth group,one flew from the fourth group to the fifth, and so on until the seventh group. (No additional bird flew yet out of the seventh.) Then a bird flew out of group seven to group six, then one flew from group six to five, and so on until group three. (No additional bird flew from the third group to the second.) Result Each woman has the same number of birds she started with. One bird has flown out of group three, in addition to the two that left earlier, for a total loss of three. Groups four through six each lost two birds in addition to the two lost earlier, for a total of four lost. Group seven lost one earlier and one now for a total loss of two. (As many birds joined each group as the group lost.) [Diagram 17] Dinim Din of the Third Group No korbonos are brought. Reason The principle of Mishna Bais continues to be applied, reducing by two the number of birds that can be brought for each bird that left the group. The third group has lost three of its six birds. They might all be brought as Chato'os by other women, leaving no Chato'os to be brought by the owner of this group. The three might all be brought as Olos, leaving no Olos to be brought. [Diagram 18] Din of the Fourth, Fifth and Sixth groups No korbonos are brought from group four, one Chatos and one Olah are brought from group five, and two Chato'os and two Olos are brought from group six. Reason Each group has lost four of its birds. This reduces the number of korbonos brought from each group by eight, two for each bird that flew out, by the principle stated following Mishna Bais. That is, if the four birds that flew out of each group are all brought as Chato'os, then four fewer Chato'os should be brought. If the four that left are brought as Olos, four fewer Olos should be brought. This disqualifies all eight birds in group four, eight of the ten birds in group five, and eight of the twelve in group six. Comment In fact, some of the birds flew to groups that are now completely disqualified. The Rabonon treat these cases as if all the birds might be brought as part of other groups, as in the comment on the din of the second group. [Diagrams 10, 20, and 21] Din of the Seventh Group Ten of the original fourteen are brought, five as Chato'os and five as Olos. Reason Group seven has lost a total of two birds. (Groups four through six each lost two birds to the next larger group and two to the next smaller group. But group seven only lost two birds to the next smaller group, group six. None flew into a larger group as there is no larger group.) Since both birds might be brought as Chato'os, we bring two fewer Chato'os, and since they might both be Olos, we bring two fewer Olos. This disqualifies four of the fourteen original birds, another application of the principle stated following Mishna Bais. [Diagram 22] Expanded Translation A bird flew out of group five to group six and from group six to group seven, and one bird flew back from seven to six and six to five. It disqualifies one pair when it leaves each group for a larger group, and it disqualifies one pair when it returns. The fifth and sixth women have nothing to be brought. The seventh woman has four pair. And some say that the seventh woman does not lose anything as a result of the third porach v'chozar and continues to be able to bring five pair. Example of the Case of the Mishna The Third Porach V'chozar At the end of the second porach v'chozar all the birds in the first through fourth groups are disqualified from being korbonos. Therefore birds will now move only among groups five through seven. As this part begins, the fifth woman can bring two birds (one kain of the original five), the sixth woman can bring four birds (two kinim of the original six), and the seventh woman can bring ten birds (five kinim of the original seven). Now one bird flew from group five to the sixth group and one flew from six to seven. (None flew out of the seventh.) Then a bird flew out of group seven to group six, and one flew out of group six to group five. (None flew out of five.) Result Each woman has the same number of birds that she started with. However, as many as six birds that are now in a group might not be originally from that group. [Diagram 23] Dinim Din of the Fifth Group None of the birds is brought. Reason A total of five birds have flown out. They might all be brought as Chato'os, leaving no more Chato'os to bring. If they were all brought as Olos no more Olos can be brought from this group. [Diagram 24] Din of the Sixth Group None of the birds is brought. Reason A total of six birds have flown out. They might all be brought as Chato'os, leaving no more Chato'os to be brought. They might all be brought as Olos, leaving no more Olos to be brought. Comment As in previous cases, some of the birds that left groups five and six flew to groups from which no korbonos are being brought. The Rabonon treat these birds as if they might have been brought, as noted earlier. [Diagram 25] Din of the Seventh Group (First opinion) Four birds are brought as Chato'os and four as Olos. Reason A total of three birds have flown out of this group. In truth, none of those birds will be brought as korbonos, because all the birds in all the other groups have by now been disqualified. However, the Rabonon have legislated (as discussed above with respect to the din of the second group) that we treat the remaining birds in the group as if those that flew out will be brought as korbonos. If all three were brought as Chato'os, group seven would have four more Chato'os to bring. If the three were brought as Olos, group seven would have four more Olos to bring. [Diagram 26] Din of the Seventh Group (Second opinion) Five birds are brought as Chato'os and five are brought as Olos (just as was the din before this third porach v'chozar). Reason Of the total of three birds that left group seven, two flew into group six when it was possible for the owner of group six to bring them as korbonos. Therefore, the number of kinim brought from group seven was reduced by two. That is, only five Chato'os and five Olos could still be brought. However, we are not concerned that the third bird that flies from group seven will be brought as a Chatos or an Olah, since, by now, all the birds in group six are disqualified (as explained above). Therefore, the third bird to leave group seven does not disqualify a third pair from group seven. According to this opinion, the Rabonon did not treat the third bird as if it might be brought by another woman. It appears that the Rabonon were concerned only about a case where more than one bird left a group and one of them might truly be brought. But in the case of group seven in the third porach v'chozar, only one bird leaves group seven, and there is no chance it will be brought. [Diagram 27] Expanded Translation If a bird flew from a group that must be left to die (because the entire group is disqualified), all those in the group into which the bird flew must be left to die. Example of the Case of the Mishna After the first porach v'chozar all the birds in groups one and two are disqualified. Then a bird moved from group one to group two to group three and so on as in the first porach v'chozar. Result The disqualified bird that left group two might have remained in group three (and the bird that moved from group three to group four might be a different bird) or it might have continued moving from group to group and ended in groups four, five, six, or seven. Din None of the birds of any group may be brought. Reason Each bird in each group might be the disqualified bird that originated in group one or two. Comment The Mishna here is clarifying why, in the cases of the second and third porach v'chozar, no birds flew from groups one through four after those groups were completely disqualified.
Introduction {#Sec1} ============ Relative permeability to heavy oil and water is one of the most important parameters of production and prediction in oilfields. Inputting variables for numerical reservoir simulation models and characterizing underground flow behavior of immiscible fluids are two very critical applications of relative permeabilities. Heavy-oil reservoirs are mainly thermal recovery reservoirs; thus, heavy oil is very sensitive to temperature; hence, researching change regulations of oil-water relative permeability of heavy oil for differing temperatures is becoming extremely significant^[@CR1]--[@CR4]^. At present, numerous related experiments on heavy oil and water relative permeability are based on displacements of dead or refined oil by distilled water. The authors of these studies did not consider dissolved gas in oil and salinity in water under the conditions of practical reservoirs, which may create certain deviations upon oilfield application. Moreover, controversy still surrounds the issue of whether relative permeability is dependent or not on temperature; no consensus has yet been reached. In the 1960s, measurements of relative permeability with increasing temperature began to appear in thermal oil recovery studies. Every researcher has drawn their own conclusions in more than 50 years of investigation, and two conflicting statements have emerged. Some researchers report that relative permeabilities are dependent on temperature, and provided impact rules^[@CR5]--[@CR20]^, but others concluded that temperature has little effect on relative permeability or that no direct influences exist^[@CR21]--[@CR29]^. A majority of the studies asserted that both statements provided a basically agreed-upon review of a decrease in residual oil saturation with increasing temperature^[@CR5]--[@CR10],[@CR22],[@CR23]^. Regarding the performance of irreducible water saturation, a typical increase with temperature is found; nevertheless, according to Sun's observations, irreducible water saturation increases initially and then decreases with increasing temperature^[@CR10]^. Sun attributed this phenomenon to the volume expansion of water caused by elevated temperature, and he concluded that the expansion affects dominantly occur in irreducible water at temperatures greater than 250 °C. Many different observations of temperature-effect rules related to relative permeabilities of oil and water phases exist. Both Edmondson and Davidson reported that the water-oil relative permeability ratio exhibits sensitivity to temperature at low and high water saturation, but insensitivity at moderate saturation^[@CR5],[@CR6]^. Lo and Mungan indicated that relative permeability to oil increases with increasing temperature, but the increase rate of water relative permeability presents more in both water-wet and oil-wet systems^[@CR8]^. Bennion found that relative permeability to oil and water increases with increasing temperature when less than 100 °C^[@CR11],[@CR12]^. Akhlaghinia observed that permeability of oil phase in an experimental reservoir increases to a maximum and then decreases with increasing temperature^[@CR16],[@CR17]^. Experimental results obtained by some researchers revealed no reduction, and at most few changes, in both oil and water relative permeability with increasing temperature, so they concluded that oil-water relative permeabilities are independent oftemperature^[@CR21],[@CR24]--[@CR28]^. Many researchers have demonstrated that there is no direct relationship between temperature and relative permeabilities. A segment of them found the existence of change rules in endpoint saturation and relative permeabilities in their experiments, but they attributed those rules to the viscosity ratios of oil-water changing with temperature^[@CR21],[@CR24]--[@CR26]^. Indirect influences of temperature on relative permeabilities include changes of viscosity, thermal expansion, and transitions of rock properties, such as wettability and construction with temperature. Long *et al*. observed a phenomenon during their tests in which residual oil saturation decreases by only 4%, from 60 °C to 200 °C, which is a very small decrease of residual oil saturation with such a great increase in temperature. In addition, they agreed that the phenomenon demonstrates that the reasons are thermal expansion and transition of wettability^[@CR26]^. In addition, Ashrafi *et al*. concluded that the temperature dependence of relative permeabilities is related more to experimental artifacts, viscous fingering, and viscosity changes than to fundamental flow properties. Measurement errors, artifacts, and calculations are inevitable in experiments and tests, and, as a result, some studies have asserted that these inevitable factors lead to temperature effects on relative permeabilities^[@CR22],[@CR23]^. It can be observed that there is no consensus regarding effects of temperature on oil-water relative permeability. Some studies have shown that relative permeability depends on temperature, but others disagreed with this by attributing changes to experimental errors, viscous instabilities, or variation of rock properties. Furthermore, in most of the aforementioned studies tests were conducted that were based on displacements of dead or refined oil by distilled water, which could lead to the existence of certain deviations in oilfield application. Furthermore, impact rules revealed by these studies regarding equal-permeability points are inadequate, and only briefly describe that equal-permeability points shift to the right or exhibit nearly no variation with temperature without detailed analysis. A Venezuela heavy oil sample was used in this study, and live oil and salty water were reconfigured under the consideration of actual reservoir conditions. The relative permeability was measured using an unsteady-state technique at different temperatures (45 °C--200 °C). An attempt was made in this research to obtain results meaningful to the development of heavy-oil reservoirs and to achieve a correct understanding of the effects of temperature on oil-water relative permeability. Experiments {#Sec2} =========== Experimental apparatus {#Sec3} ---------------------- The experimental apparatus mainly consists of four parts: an injection system, physical model system, pressure measurement and control system, and outlet liquid measurement system. The flow diagram of the experimental apparatus is shown in Fig. [1](#Fig1){ref-type="fig"}. The injection system includes an International Standard Classification of Occupations (ISCO) pump and an intermediate container. The ISCO pump is used to drive the fluid into the physical model system and to pressurize the system at a constant pressure or constant flow rate. The maximum flow rate is 30.0 ml/min and the maximum pressure is 70.0 MPa. The pump working fluid is distilled water. A live oil sample is transferred by the intermediate container to the physical model system. A backpressure regulator adjusted by a hand pump, whose maximum operating pressure is 40.0 MPa, is used to control pressure at the outlets of the sand packs. An electronically controlled thermostat oven with a maximum temperature of 250 °C is used to ensure a constant temperature in the range of experimental temperatures from 45 °C to 200.0 °C. An oil-water collector is used to record the amount of water and oil production. The experiments do not require any gas volume gauges because the amount of dissolved gas can be negligible, and the density of live oil was obtained prior to the experiments.Figure 1Schematic diagram for experimental evaluation of heavy oil relative permeability. 1-pump working fluid; 2-ISCO pump; 3-intermediater container; 4-pressure sensor; 5-pressure gauge; 6-valve; 7-sand pack; 8-backpressure regulator; 9-hand pump; 10-oil-water collector; 11-thermostat oven. Material {#Sec4} -------- There were four sand packs, all comprised of 60-/70-mesh grain-size quartz sands derived from a block of Venezuela oil. The sands were packed into 2.5-cm-diameter and 30.0-cm-long stainless-steel tubes. All the physical parameters are listed in Table [1](#Tab1){ref-type="table"}.Table 1Physical parameters of four sand packs used in experiments.NumberLength (cm)Diameter (cm)Permeability to air (mD)Porosity (%)130.02.55560.0047.69230.02.54139.5443.21330.02.54972.3343.86430.02.55096.0945.45 The dead heavy oil sample was derived from the block of Venezuela oil, and before the experiments, live heavy oil was configured under practical reservoir conditions, which is a dissolved-gas-to-oil ratio of 8.9 m^3^/m^3^ at a temperature of 45 °C and pressure of 4.2 MPa. The dissolved gas is comprised of 99.0% methane, 1.0% other gases. The relationship curve between the viscosity and temperature of dead oil is shown in Fig. [2](#Fig2){ref-type="fig"}, and the semi-logarithmic viscosity-temperature curve is shown in Fig. [3](#Fig3){ref-type="fig"}. The viscosity-temperature curve of the dead heavy oil illustrates an extremely high viscosity at lower temperature and the entire curve exhibits a power function with a large coefficient of 14 orders of magnitude. The dead heavy oil is very sensitive to temperature, and its viscosity value is 63077.19 mPa·s at 45 °C and then decreases to 1424.9 mPa·s at 90 °C.Figure 2Viscosity-temperature curve of dead heavy oil.Figure 3Semi-logarithmic viscosity-temperature curve of dead heavy oil. It can be observed that the curve in Fig. [3](#Fig3){ref-type="fig"} is not linear and its trend become slows with increasing temperature. An order of magnitude decrease in viscosity value from 673650.1 mPa·s at 30 °C to 63077.19 mPa·s at 45 °C is observed, while the temperature only increases by 15 °C. However, with increasing temperature from 90 °C to 140 °C, an increase of 50 °C, an order of magnitude decrease in viscosity value, from 1424.9 to 122 mPa·s, is observed. As the temperature becomes greater than 90 °C, the dead heavy oil gradually become insensitive to temperature despite its high viscosity at low temperature. Owing to the fact that gas was dissolved into the dead oil, the viscosity changed. The live-oil viscosity was obtained by an empirical formula method in the absence of experimental measurements. The relationship between live and dead oil was proposed by Beggs and Robinson in 1975^[@CR30]^. The empirical formula is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mu }_{o}=A{\mu }_{od}^{B},$$\end{document}$$where$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$A={\rm{10.715}}\times {({R}_{so}+100)}^{-0.515},$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$B={\rm{5.44}}\times {({R}_{so}+{\rm{150}})}^{-0.338},$$\end{document}$$where *R*~*so*~ is the ratio of dissolved gas to oil, in scf/STB; *μ*~*o*~ is the viscosity of live oil, in mPa·s; and *μ*~*od*~ is the viscosity of dead oil, in mPa·s. However, the empirical formula proposed by Beggs and Robinson was originally used for calculating the viscosity of heavy oil with dissolved gas under reservoir conditions, and it did not take into account the fact that the density of live heavy oil varies with temperature. A new empirical formula was adapted by Yang *et al*., as^[@CR31]^$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mu }_{o}=A{\mu }_{od}^{B},$$\end{document}$$where$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$A=4.4044\times {({\rho }_{osc}{R}_{so}+17.7935)}^{-0.515},$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$B=3.0352\times {({\rho }_{osc}{R}_{so}+26.6904)}^{-0.338},$$\end{document}$$where *ρ*~*osc*~ is the density of dead oil on the surface, in g/cm^3^; *R*~*so*~ is the ratio of dissolved gas to oil, in m^3^/t; *μ*~*o*~ is the viscosity of live oil, in mPa·s; and *μ*~*od*~ is the viscosity of dead oil, in mPa·s. The viscosity of dead oil is input into formula (4) to calculate the viscosity of live oil, and the four groups of new viscosity values obtained are listed in Table [2](#Tab2){ref-type="table"}.Table 2Viscosities of live-heavy oil.Temperature (°C)45100150200Viscosity (mPa·s)19799.95358.0244.9616.09 The experimental water used was simulated connate water from actual reservoirs with total dissolved solids of 11582.6 mg/L, as shown in Table [3](#Tab3){ref-type="table"}.Table 3Total dissolved solids in experimental water sample.CationsNa^+^Ca^2+^Mg^2+^Ba^2+^Fe^2+^Total (mg/L)Ion concentration (mg/L)3967.27629.220.24074.6AnionsCl^−^SO~4~^2−^CO~3~^2−^HCO~3~^−^OH^−^Total (mg/L)Total dissolved solids (mg/L)Ion concentration (mg/L)471016027820750811582.6 Experimental procedures {#Sec5} ----------------------- The unsteady-state technique was used in this study to measure the oil-water relative permeability curves of heavy oil owing to its simplicity. Calculations of relative permeability were performed in software into which the Johnson,-Bossler-Naumann (JBN) technique was written. The experimental procedures were as follows:Before starting the experiments, the volumes of live oil and salt water were sufficiently configured in advance. Live oil was prepared in a sample-configuration container by mixing gas and dead oil at a solution gas-oil ratio (GOR) of 8.9 m^3^/m^3^ at a constant temperature of 45 °C and a designated pressure of 4.2 MPa, and then transferred to the intermediate container. The intermediate container filled with live oil was placed into a thermostat oven, which generated a constant temperature of 45 °C. The salt water was sealed up and placed in the shade.Four identical stainless-steel tubes (2.5 cm in diameter and 30.0 cm long) were prepared and cleaned. 60-/70-mesh grain-size quartz sand was packed into the tubes and tamped down. The sand packs were then marked in a sequence.After finishing the sand packs, the absolute permeability was measured and the sand packs were then vacuumized for 2.0 h, at which point the absolute permeability requirements of the experiments were met. Later, the cores were saturated with the simulated connate water. The porous volumes of the four cores were directly read out by a hand pump with a scale, which avoided errors in porosity calculations. During this process, the porous volumes of the four cores were read out when the pressure difference became steady between both ends.Next, the sand packs were saturated by heavy live oil at differing temperatures (45, 100, 150, and 200 °C) to form irreducible water-saturation conditions. The saturation was halted when the volume of produced oil was 2--3 times that of the water produced at the sand-pack outlets, and the pressure drop became stable between the inlets and outlets of the cores. After saturation, the cores were placed in the thermostat oven at constant temperatures of different experimental groups for 24 h.Oil-displacement experiments were conducted with a water-injection rate of 0.1 ml/min at 45 °C, and the injection rate was switched to 2.0 ml/min when experimental temperatures were higher than 100 °C. The monitored and recorded data exhibited pressure drops across the cores and an accumulation of produced oil and water over time. The experiments would end when the water cut was over 99.5%, the injected volume of simulated connate water reached 30 PV (porous volume), and the pressure drop became steady. The backpressure regulator was kept a pressure of 4.2 MPa by a hand pump in the processes of saturation and displacement to simulate the pressure environment of actual reservoirs. Results and Discussion {#Sec6} ====================== Effects of temperature on irreducible water saturation and residual oil saturation {#Sec7} ---------------------------------------------------------------------------------- Curves plotting irreducible water and residual oil saturation against experimental temperature are shown in Fig. [4](#Fig4){ref-type="fig"}. The irreducible water saturation linearly increased from 31.34% at 45 °C to 39.31% at 200 °C with an average increase of 2.66% per 50 °C.Figure 4Irreducible water and residual oil saturation at different experimental temperatures. Water phase with small viscosity is piston-displaced by the heavy oil, the viscosity of which is high at low temperature, which results in a low irreducible water saturation. With increasing temperature, expansion of rock particles makes micro-pores smaller and blocks the throats between small and large pores. Therefore, water droplets saturated into small pores are not easy to displace. Moreover, the viscosity ratio of oil to water decreases because the viscosity of heavy oil greatly decreases with decreasing temperature. Furthermore, the mobility ratio of oil to water increases, which leads to an increase of the flow capability of oil phase as a displacing phase. The surfaces of pores initially adsorb a great quantity of polar molecules, such as resin and asphalt, but they are desorbed gradually with increasing temperature. A significant number of water molecules are adsorbed as the thickness of the resin layer decreases. This case represents formation and gradual thickening of the water film. As a result, the irreducible water saturation exhibits an increase in cores. Although irreducible water saturation increases linearly in the experimental temperature range, if temperature increases to more than 200 °C or even higher, the irreducible water saturation may increase to a peak value and then decrease as Sun reported. Sun also concluded that the volume expansion of water primarily leads to this reduction^[@CR10]^. In fact, the mechanisms that lead to changes in irreducible water saturation at elevated temperature not only induce the volume expansion of water, but also include the desorption of water molecules and volume expansion of rocks. The desorption function reduces the number of water molecules on the surfaces of pores and leads directly to the decrease in irreducible water saturation. Moreover, the pressure generated by volume expansion of both water and rocks induces the production of more water. The decrease of residual oil saturation is nonlinear with a functional quadratic relationship, while the maximum residual oil saturation is 35.53% and the minimum is 19.1%. The viscous fingering phenomenon is evident at low temperature during the displacement process, which is the major reason that water cut increases rapidly after breakthrough. Oil droplets that occupied small pores cannot be displaced, which results in higher residual oil saturation. The viscosity of heavy oil decreases significantly and the mobility ratio of water to oil decreases with increasing temperature. An increase in the sweep area of water diminishes the function of viscous fingering to some extent, and thus more oil is produced at the outlets. The residual oil saturation decreases gradually due to the exponential decrease in the viscosity of heavy oil with increasing temperature (Fig. [2](#Fig2){ref-type="fig"}), and a decrease gradually reduces the viscosity ratio of oil to water. Resin and asphalt films thin as temperature rising, which makes further efforts to improve oil production. As the temperature increases, the flow capability of oil cannot increase endlessly in the experimental temperature range and the increase will finally decrease to zero. Therefore, the trend of residual oil saturation is a slow nonlinear decrease in the range of experimental temperatures. Effects of temperature on water saturation of equal-permeability points {#Sec8} ----------------------------------------------------------------------- At equal-permeability points, relative permeability of water phase is equal to that of oil. The curve in Fig. [5](#Fig5){ref-type="fig"} shows the relationship between water saturation of the equal-permeability points and residual-oil endpoints. The red curve, which shows that with increasing temperature, the water saturation of equal-permeability points increases nonlinearly and that the entire curve is a function of power. At 45 °C, the water saturation of the equal-permeability point is 64.45%, and it reaches 75.20% at 200 °C. The water-wettability of rocks is strengthened at elevated temperature, and it is already initially strong at low temperature. The transition of wettability reveals that high temperature gives rise to adsorption function of water molecules and changes of rock properties.Figure 5Relationship between saturation of equal-permeability points and experimental temperatures. The water saturation of equal-permeability points increases gradually with increasing temperature, and the difference values of water saturation exhibit an increase between residual oil endpoints and equal-permeability points. The value is 0.02% at 45 °C, and it can be observed in Fig. [5](#Fig5){ref-type="fig"} that the equal-permeability point and the residual oil endpoint almost coincide, and the difference reaches the maximum of 5.70% at 200 °C. The blue curve is a trend of water saturation at residual-oil endpoints, which avoid discussing in this section because details about residual oil saturation have been introduced in the previous section. As the viscosity of heavy oil decreases with increasing temperature, the flow capability of oil phase increases, and hence it acts as a diminishing obstruction to water. Then, it can be inferred that the trends exhibit a decrease in the viscosity ratio of oil to water and an increase in water relative permeability. The curves of both phases shift to the right. Therefore, the equal-permeability points move to the right and an increase results from the water saturation of equal-permeability points. However, water molecules became increasingly more active with increasing temperature, so the thickness of water film cannot become thicker indefinitely on the surfaces of pores, and the thickening ratio cannot remain unchanged or even become larger with increasing temperature. Moreover, the increase in oil relative permeability is larger than that in water relative permeability, which eventually leads to a small increase in the water saturation of equal-permeability points. In addition, adsorption will consequently be destroyed by high temperature. Thus, the water saturation of equal-permeability points will increase to a maximum and then decrease; that is, the equal-permeability point would first move to the right and then shift to the left. Effects of temperature on water relative permeability at equal-permeability points and residual oil endpoints {#Sec9} ------------------------------------------------------------------------------------------------------------- Relative permeability to water increases nonlinearly at both equal-permeability points and residual oil endpoints, as shown in Fig. [6](#Fig6){ref-type="fig"}. Both two curves are in quadratic function relationships. It can be found from the figure that the increase in the ratio of water relative permeability at temperatures from 45 °C to 100 °C is smaller than that at temperatures higher than 100 °C. It can be also observed in Fig. [6](#Fig6){ref-type="fig"} that the relative permeability of water phase is extremely small at 45 °C, and the equal-permeability point almost coincides with the residual oil endpoint. Furthermore, at 200 °C, the water relative permeability is 0.0600 at the equal-permeability point and 0.0816 at the residual oil endpoint. This is because there is an inflection point near 90 °C in the viscosity-temperature curve of the heavy oil (in Figs [2](#Fig2){ref-type="fig"} and [3](#Fig3){ref-type="fig"}), which is a watershed for the flowing capability of the heavy oil.Figure 6Relationships between water relative permeability and experimental temperatures at equal-permeability points and residual oil endpoints. Before the turning point, the viscosity-temperature curve is very steep. Although the viscosity of heavy oil is extremely sensitive to temperature in this stage, oil phase exhibits poor flow capability with a thicker resin layer. Oil droplets generates the Jamin effect, which makes the flow of water more difficult, which can decrease the relative permeability with increasing temperature. After the inflection point, the viscosity-temperature curve becomes gentle and the decrease of viscosity is slowly reduced, but the flow capability of oil phase is greatly enhanced. The hindrance function of oil phase decreases water flow owing to the thinness of the resin layer. The water-oil mobility ratio decreases and the flow capability of both water and oil increases with a large rise in relative permeability. Effects of temperature on relative permeability curves of heavy oil {#Sec10} ------------------------------------------------------------------- The different curves in Fig. [7](#Fig7){ref-type="fig"} show the relative permeability to oil and water at experimental temperatures. The difference is dramatically large between oil and water relative permeability, indicating that relative permeability is extremely large to oil phase but very small to water phase.Figure 7Relative permeability curves to oil and water at different experimental temperatures. There is almost no existence of two-phase flow region at 45 °C, and oil relative permeability decreases rapidly, while water relative permeability is nearly zero, which means that the heavy oil cannot be displaced at the reservoir temperature. The viscosity of the live heavy oil does not, however, reach the field mining criterion of 358.02 mPa·s at 100 °C, along with a small two-phase flow region. The decrease of oil relative permeability becomes gentle at 150 °C, at which the viscosity of the live heavy oil is 44.96 mPa·s. The curve of water relative permeability shifts upward significantly, along with exhibiting a larger two-phase flow region. It can be found that the decrease of oil relative permeability becomes slower at 200 °C than that at 150 °C, and a wider two-phase flow area, and a more significant uplift of the curve of water relative permeability, can be observed. It can be further observed that the relative permeability of both two phases improves remarkably with increasing temperature. However, due to the extremely imbalance of relative permeability between water and oil, changes of the equal-permeability points cannot be observed easily. Furthermore, different scales are used in Fig. [7](#Fig7){ref-type="fig"} presents an incorrect shift of equal-permeability points. And Fig. [8](#Fig8){ref-type="fig"} shows the curves with the same scales are used. The black curve with an arrowhead exhibits changes of equal-permeability points with temperature. The equal-permeability point shifts to right evidently and raises upward visibly thanks to water relative permeability augments by various mechanisms.Figure 8Relative permeability curves with the same scales to oil and water at different experimental temperature. Comprehensively, the rules of oil and water relative permeability with temperature are mainly rooted in three mechanisms: viscosity change of live heavy oil, adsorption and desorption function of fluid molecules, and thermal expansion of rock particles and fluid. Oil viscosity decreases with increasing temperature, flow capability of oil is enhanced, and the resin layer thickness decreases; hence, the hindrance function of oil phase to water phase decreases, which enhances the flow capability of water phase. However, meanwhile adsorption of water molecules becomes stronger with increasing temperature, which limits the mobility of water. As a result, the increase of the ratio of water relative permeability is smaller than that of oil relative permeability. Furthermore, as mentioned above, volume expansion of rock particles and fluid caused by elevated temperature generates expansion pressure to assist the production of fluid. This pressure contributes to the improvement of oil-water relative permeability. Conclusions {#Sec11} =========== Flow capability of both oil and water improve and the relative permeability of both oil and water phase increase with increasing temperature. Relative permeability curves and the equal-permeability point shift to the right with temperature, and the equal-permeability point moves gradually further from the residual oil endpoint.Irreducible water saturation increases linearly, and the decrease of residual oil saturation is nonlinear.Although water relative permeability increases dramatically with temperature, it is still extremely different from oil. The relative permeability curves of two-phase flow area markedly increase with increasing temperature.As the temperature increases, changes of characteristic points and oil-water relative permeability are essentially caused by mechanisms that include volume expansion of fluid and rocks, adsorption, and changes of oil viscosity. These factors are functions of temperature and, hence, relative permeability is also fundamentally a function of temperature. **Publisher\'s note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This research was conducted with financial support from the National Natural Science Foundation of China (No. 51774256), the Fundamental Research Funds for the Central Universities of China (No. 2-9-2017-312,53200759269) and the Science and Technology Special Funds of China for 2016ZX05016-006. As the first author, Y. Qin conducted all the experiments in the laboratory and wrote the main manuscript text. As the corresponding author, P. Liu have made substantial contributions to the conception/design of the work and revised the main manuscript text; AND I have approved the final version to be published; AND I agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated. Y. Wu and F. Zhao guided all the lab experiments and corrected the main manuscript text. Z. Yuan prepared all of the figures. All authors discussed the results and critically reviewed the manuscript. Competing Interests {#FPar1} =================== The authors declare no competing interests.
The present invention relates to a method for measuring the lifetime of a semiconductor integrated circuit, including MOS devices like MOS transistors, and also relates to a method for reliability testing of the circuit. A semiconductor integrated circuit is made up of various types of circuit elements. Among other things, the lifetime of an MOS transistor, one of those types of circuit elements, has an important effect on the reliability of the circuit. In recent years, as the number of devices integrated in a single semiconductor integrated circuit has been increased, a gate insulating film for an MOS transistor has been thinned considerably. Thus, the degradation of the gate insulating film determines the lifetime of the MOS transistor and eventually has a considerable effect on the lifetime of the circuit itself. In evaluating the reliability of a semiconductor integrated circuit according to a known technique, an MOS capacitor under test, including a gate insulating film with a relatively wide area, is made in place of multiple small-sized MOS transistors included in the circuit. And the lifetime of the gate insulating film of the capacitor is predicted. That is to say, in the prior art, the reliability of a semiconductor integrated circuit has been evaluated on the supposition that the MOS capacitor including the gate insulating film with a relatively wide area is equivalent to the great number of small-sized MOS transistors. For example, the lifetime of a semiconductor integrated circuit, made up of one hundred MOS transistors each having an area of 1 xcexcm2, has been regarded as equivalent to the lifetime of one MOS capacitor having an area of 100 xcexcm2. In other words, the lifetime of the circuit, made up of one hundred MOS transistors each having the area of 1 xcexcm2, has been believed a time it takes for a first one of the one hundred MOS transistors to cause a dielectric breakdown (i.e., the amount of leakage current flowing there exceeds its critical value). And the time has been believed equal to the lifetime of the MOS capacitor with the area of 100 xcexcm2, or a time it takes for the MOS capacitor to cause a dielectric breakdown. Specifically, in an MOS transistor including a gate insulating film with a thickness of more than about 4 nm, a steep rise in leakage current, resulting from a stress placed on the transistor, i.e., the generation of hard breakdown (HBD), is identifiable. A gate insulating film with that thickness will be herein called a xe2x80x9cthick gate insulating filmxe2x80x9d. In this case, a time it takes for one of multiple MOS transistors in a semiconductor integrated circuit to cause the HBD may be estimated by using an MOS capacitor under test. And the estimated time may be regarded as the circuit""s lifetime. However, as for an MOS transistor including a gate insulating film with a thickness of about 4 nm or less, i.e., a gate insulating film in which a direct tunneling current is prevailing, it is hard to identify the generation of the HBD. A gate insulating film with that thickness will be herein called a xe2x80x9cthin gate insulating filmxe2x80x9d. That is to say, the thinner the gate insulating film of an MOS transistor, the less and less often the obvious dielectric breakdown is observable. Thus, the lifetime of a semiconductor integrated circuit cannot be predicted accurately enough. In view of these respects, an object of the present invention is to predict the lifetime of a semiconductor integrated circuit accurately enough even when a thin gate insulating film is used for an MOS device. To achieve this object, the present inventor carried out various types of researches on the lifetime of a semiconductor integrated circuit. As a result, I made the following findings. If a stress is continuously placed on an MOS transistor including a gate insulating film with a thickness of about 6 nm or less, the generation of a soft breakdown (SBD) is identifiable. According to the accepted standards, the SBD refers to a state where the dielectric breakdown has not occurred yet. However, a very small amount of leakage current flows through a gate insulating film in the SBD state. Specifically, the SBD herein means a phenomenon that the density of leakage current, flowing locally through a particular region of the gate insulating film, has increased 100 times or more compared to the density before the stress is placed and is now greater than the density of leakage current flowing through any other region. As for an MOS transistor including a gate insulating film with a thickness of more than about 6 nm, it is difficult to identify the generation of the SBD separately from the HBD. This is because when the conditions of SBD generation are met by the transistor, the HBD and SBD much more likely occur at a time in that transistor. Hereinafter, the SBD will be described with reference to FIG. 1. FIG. 1 is a graph illustrating variations of gate current-gate voltage (IGxe2x88x92VG) characteristics obtained by repeatedly applying a constant voltage stress to an MOS capacitor including a gate insulating film with a thickness of 2.4 nm and an area of 0.01 mm2. As shown in FIG. 1, once the stress voltage is applied, the IGxe2x88x92VG characteristic changes from its initial state initial where the direct tunneling current is prevailing into a B-SILC state. In the B-SILC state, a B-mode stress induced leakage current, resulting from the generation of the SBD, flows through a local region of the gate insulating film. The B-mode stress induced leakage current will be herein called a xe2x80x9cB-SILC currentxe2x80x9d. Also, as the stressing time passes, the B-SILC current increases. Accordingly, the IGxe2x88x92VG characteristic in the B-SILC state sequentially changes from the curve a into the curve d by way of the curves b and c. E. Wu et al. reported in IEDM (1998) 187 that where the SBD has occurred in a region of an MOS transistor where the gate electrode overlaps with the source or drain region, the MOS transistor cannot operate anymore. That is to say, E. Wu et al. also regards a time it takes for one of multiple MOS transistors in a semiconductor integrated circuit to cause the SBD as the circuit""s lifetime. This approach will be herein called a xe2x80x9cfirst lifetime prediction approachxe2x80x9d. Following is the conclusion of my analysis on the xe2x80x9cfirst lifetime prediction approachxe2x80x9d. FIG. 2 illustrates relationships between the leakage current IG and stressing time where a constant voltage stress (CVS) of xe2x88x924.3 V was applied to two MOS capacitors (which will be herein called xe2x80x9csamples A and Bxe2x80x9d) formed on the same semiconductor substrate. It should be noted that xe2x80x9cxe2x88x92xe2x80x9d herein means that the gate electrode is at the lower potential level. Also, the samples A and B had gate insulating films with the same configuration (i.e., thickness: 2.4 nm; area: 0.01 mm2) and the stress was placed differently on the samples A and B. More specifically, even after the SBD generation had been identified, the stress was continuously imposed on the sample A. As for the sample B on the other hand, the instant the SBD generation was identified, the stressing was once suspended and then the stressing was started again. In FIG. 2, the graph plotted for sample B(1) illustrates a relationship between the leakage current and stressing time before the stressing was suspended. On the other hand, the graph plotted for sample B(2) illustrates a relationship between the leakage current and stressing time after the stressing was restarted. As shown in FIG. 2, when the SBD occurs, the leakage current IG of the sample A rises steeply and then increases relatively gently. In contrast, after the stressing is restarted, the leakage current IG of the sample B (see the graph for the sample B(2)) increases gradually but is smaller than the leakage current IG of the sample A. That is to say, the level of the leakage current IG flowing after the SBD generation changes greatly depending on whether or not the stress is continuously placed after the SBD has occurred. Thus, it can be seen that the amount of B-SILC current flowing after the SBD generation is not determined by the degradation occurred in the gate insulating film before the SBD generation, but by the degradation to occur in the same film after the SBD generation. Examples of the degradation of the former type include creation of defects in the film. And the degradation of the latter type will be herein called an xe2x80x9cinsulating film degradationxe2x80x9d. It is believed that after the SBD has occurred, the insulating film degradation go on because of the following reasons. Specifically, if the charge, stored on the MOS capacitor due to the stress placed, flows through an SBD path being formed, then Jule heat is generated, thereby adversely expanding the SBD path and accelerating the insulating film degradation (see T. Sakura et al., IEDM (1998) 183). The SBD path is a conductive path causing the SBD in the gate insulating film. In this case, the quantity of charge stored on the MOS capacitor changes with the area or thickness of the gate insulating film or the stress voltage. Accordingly, the degree of insulating film degradation occurring after the SBD generation is also greatly dependent on the area or thickness of the gate insulating film or the stress voltage. As described above, the data shown in FIG. 2 was obtained by applying the stress voltage with the absolute value of 4.3 V to the MOS capacitor including the gate insulating film with the area of 0.01 mm2. On the other hand, each of MOS transistors included in a semiconductor integrated circuit that should have its lifetime predicted (which will be herein called a xe2x80x9cactual devicexe2x80x9d) has a gate insulating film with an area of about 1 xcexcm2, for example. Also, a gate voltage applied to each MOS transistor under its actual operating conditions is about 1.5 V, for example. Accordingly, in the experiment carried out to obtain the data shown in FIG. 2, leakage current, corresponding to a charge quantity about 30,000 times as large as that of the actual device, flowed along the SBD path. However, the size of the SBD path being formed is not dependent on the area of the insulating film. Thus, even if the SBD has occurred at just one of the MOS transistors in the actual device, the amount of B-SILC current flowing through the gate insulating film would be too small to affect the operation of the transistor. Next, a method of measuring the B-SILC current with a constant current stress (CCS) applied will be described with reference to the flowchart illustrated in FIG. 3. In Step S1, stress current supplied to a sample like an MOS transistor, time interval at which it is determined whether the SBD occurred or not, and threshold value of voltage variation by which the SBD generation is identified are set to Istress [A], t [s] and r [%], respectively. The threshold value will be herein called a xe2x80x9cvariation threshold valuexe2x80x9d. In Step S2, the stress current of Istress [A] starts to be supplied to the sample. Next, in Step S3, the magnitude of a stress voltage (i.e., a first voltage value V1) needed to supply the stress current of Istress [A] is measured. Then, in Step S4, the stress current of Istress [A] is continuously supplied for t seconds. Thereafter, in Step S5, the magnitude of a stress voltage (i.e., a second voltage value V2) needed to supply the stress current of Istress [A] is measured. In Step S6, it is determined whether or not a ratio of the absolute value of the voltage variation V2xe2x88x92V1 between the second and first voltage values V2 and V1 to the first voltage value V1 has become equal to or greater than r %. If the ratio of the absolute value of the voltage variation V2xe2x88x92V1 to the first voltage value V1 is less than r % (i.e., where the SBD has not occurred yet), then the first voltage value V1 is updated into the second voltage value V2 in Step S7. Then, the process returns to Step S4. Alternatively, if the ratio of the absolute value of the voltage variation V2xe2x88x92V1 to the first voltage value V1 is r % or more (i.e., where the SBD has already occurred), then the stressing is suspended in Step S8. Thereafter, in Step S9, the total stressing time that has passed since the start of stressing is obtained as an SBD generation time (i.e., a time that has passed since the start of stressing and until the SBD generation) TSB. Then, in Step S10, the amount of leakage current flowing when a predetermined gate voltage is applied to the sample, i.e., the amount of B-SILC current IBSILC, is measured. In the method of measuring the amount of B-SILC current as shown in FIG. 3, if the time interval of t [s] is shortened, then the stressing can be suspended almost simultaneously with the SBD generation. Thus, the insulating film degradation after the SBD generation can be suppressed to a certain degree as described above. FIG. 4 is a graph illustrating a correlation between the amount of B-SILC current IBSILC, which was obtained by the B-SILC current measuring method shown in FIG. 3, and the amount of stress current Istress. In other words, FIG. 4 illustrates the stress condition dependence of the B-SILC current. The amount of B-SILC current IBSILC shown in FIG. 4 was measured by applying a gate voltage VG of xe2x88x921.5 V to an MOS capacitor, including a gate insulating film with a thickness of 2.4 nm and an area of 0.01 mm2, after the SBD had been generated there by supplying various stress currents thereto. Also shown in FIG. 4 is a variation in the amount of B-SILC current IBSILC where the gate voltage VG of xe2x88x921.5 V was continuously applied thereto for 100 seconds after the SBD had been generated. As shown in FIG. 4, a correlation (see the dashed line) exists between the amounts of B-SILC and stress currents IBSILC and Istress. Specifically, the amount of B-SILC current IBSILC lightly depends on the amount of stress current Istress: the smaller the amount of stress current Istress, the smaller the amount of B-SILC current IBSILC. However, as also shown in FIG. 4, once the amount of stress current Istress exceeds a certain value, the B-SILC current IBSILC flows in the amount (between xe2x88x921 xcexcA and xe2x88x9210 xcexcA) greater than those represented by the dashed-line correlation. FIG. 5 is a graph illustrating variations of IGxe2x88x92VG characteristics obtained by using the B-SILC current measuring method shown in FIG. 3 with the amount of stress current Istress changed. The IGxe2x88x92VG characteristics shown in FIG. 5 were obtained by applying various gate voltages VG to an MOS capacitor, including a gate insulating film with a thickness of 2.4 nm and an area of 0.01 mm2, after the SBD had been generated by supplying various stress currents thereto. In FIG. 5, the IGxe2x88x92VG characteristic for the range where the dashed-line correlation shown in FIG. 4 was met, i.e., the range where the amount of B-SILC current IBSILC for the gate voltage VG of xe2x88x921.5 V was smaller than 1 xcexcA (absolute value), is represented by the curve a. The IGxe2x88x92VG characteristic for the range where the correlation shown in FIG. 4 was not met, i.e., the range where the amount of B-SILC current IBSILC for the voltage VG of xe2x88x921.5 V was 1 xcexcA (absolute value) or more, is represented by the curve b or c. And the IGxe2x88x92VG characteristic before the stress was placed is represented the curve initial. As for the IGxe2x88x92VG characteristic represented by the curve a in FIG. 5, the amount of gate current, i.e., the amount of leakage current, is at a negligible level for a transistor to operate properly. On the other hand, as for the IGxe2x88x92VG characteristic represented by the curve b or c in FIG. 5, the amount of leakage current reaches such a level as making the transistor inoperable. However, the amount of B-SILC current depends on a stress condition (e.g., stress current or stress voltage) as described above. Accordingly, it is believed that the leakage current flowing through an MOS transistor included in an actual device cannot reach the level as represented by the curve b or c in FIG. 5. As described above, I believe that even if the SBD has occurred at just one of multiple MOS transistors in a semiconductor integrated circuit, the operation of the circuit itself would not be interfered with that. For that reason, if the lifetime of a semiconductor integrated circuit were predicted by the xe2x80x9cfirst lifetime prediction approachxe2x80x9d, the expected lifetime might be shorter than the actual one. Accordingly, if the thickness of a gate insulating film or a gate voltage for an MOS transistor is adjusted to equalize the lifetime predicted by the xe2x80x9cfirst lifetime prediction approachxe2x80x9d with a desired value (e.g., 10 years), the film could be excessively thick or the voltage could be unnecessarily low. As a result, the operating speed of the transistor decreases, thus considerably deteriorating the performance of the circuit. As described in the xe2x80x9cbackground artxe2x80x9d, it is difficult to definitely identify the generation of the HBD in an MOS transistor including a thin gate insulating film. So I supplied a new definition for the xe2x80x9cHBD generationxe2x80x9d. Specifically, I supposed that the lifetime of a semiconductor integrated circuit could be represented by a time it takes for one of multiple MOS transistors in the circuit to cause a newly defined HBD (which will be herein called a xe2x80x9credefined HBDxe2x80x9d). This alternative approach will be herein called a xe2x80x9csecond lifetime prediction approachxe2x80x9d. Hereinafter, the conclusion of my analysis on the xe2x80x9csecond lifetime prediction approachxe2x80x9d will be described. Even if the SBD has occurred in an MOS transistor, the amount of leakage current, i.e., gate current, is so small as represented by the curve d in FIG. 1, for example, that an inversion layer to be a channel for carriers can be formed under the gate insulating film. However, considering the drain current-gate voltage (IDxe2x88x92VG) characteristic of an MOS transistor, the magnitude of a gate current at an operating voltage of 1.5 V (absolute value) should be equal to or less than a threshold value between several xcexcA and about 10 xcexcA to distinguish the ON/OFF states of the transistor from each other. Thus, I regard the instant the magnitude of the gate current exceeds the threshold value as the instant the redefined HBD occurs. FIG. 6 illustrates relationships between the leakage current IG and stressing time passed after the SBD generation where a constant voltage stress (CVS) of xe2x88x923.25 V was applied to an MOS capacitor including a gate insulating film with a thickness of 2.4 nm and an area of 0.01 mm2 after the SBD had occurred. The leakage currents shown in FIG. 6 were obtained by applying gate voltages VG of xe2x88x921.5 V and xe2x88x920.5 V to the MOS capacitor after the stress started to be placed. The SBD generation may be identified by the B-SILC current measuring method shown in FIG. 3. As illustrated in FIG. 6, whether the voltage VG is xe2x88x921.5 V or xe2x88x920.5 V, the magnitude of the leakage current IG is almost constant until the point in time indicated by the dashed line. However, after the point in time indicated by the dashed line, the leakage current IG goes on increasing. Also, where the gate voltage VG is xe2x88x921.5 V, the leakage current IG changes almost continuously before and after the point in time indicated by the dashed line in FIG. 6. In contrast, where the gate voltage VG is xe2x88x920.5 V, the leakage current IG rises abruptly at the point in time indicated by the dashed line in FIG. 6. To identify the generation of the redefined HBD, the instant the leakage current IG for the gate voltage VG of xe2x88x921.5 V exceeds the threshold value (i.e., on the order of several xcexcA to 10 xcexcA) should be located. However, as shown in FIG. 6, the threshold level exists in the range where the leakage current IG goes on increasing continuously. Thus, it is difficult to know exactly when the redefined HBD occurs. For that reason, I regard the point in time the leakage current IG for the gate voltage VG of xe2x88x920.5 V rises steeply as indicated by the dashed line in FIG. 6 as the instant the redefined HBD occurs. And the interval between the SBD generation and the redefined HBD generation (which will be herein called an xe2x80x9cHBD generation time THBxe2x80x9d) is obtained. FIG. 7 illustrates the dependence of the HBD generation time THB obtained this way on the stress voltage Vstress (which will be herein called xe2x80x9cstress voltage dependencexe2x80x9d). The data shown in FIG. 7 was obtained with the stress voltage Vstress applied at a temperature of 25xc2x0 C. Also illustrated in FIG. 7 is the stress voltage dependence of the SBD generation time TSB obtained by the B-SILC current measuring method shown in FIG. 3, for example. As shown in FIG. 7, it is clear that the stress voltage dependence of the HBD generation time THB is different from that of the SBD generation time TSB. If the stress voltage Vstress is approximately equal to the actual operating voltage (e.g., about xe2x88x921.5 V), the HBD generation time THB is greater than the SBD generation time TSB by about five orders of magnitude or more. Accordingly, a time TBD it takes for an MOS capacitor to cause the redefined HBD is the sum of the SBD and HBD generation times TSB and THB strictly speaking, but can be essentially represented by the HBD generation time THB. As described above, if the lifetime of a semiconductor integrated circuit is predicted by the xe2x80x9csecond lifetime prediction approachxe2x80x9d, then the circuit""s lifetime is substantially equal to the HBD generation time THB. Furthermore, the longer the stressing time, the greater the B-SILC current resulting from the SBD generation and the greater the power dissipated. Thus, it becomes necessary to consider the power dissipated by the B-SILC current as a new factor limiting the lifetime of a semiconductor integrated circuit. In other words, the circuit""s lifetime should also be checked from this viewpoint, i.e., whether or not the power dissipated by the B-SILC current has exceeded an allowable value. Thus, I supposed that the lifetime of a semiconductor integrated circuit could also be represented by a time it takes for a total amount of B-mode stress induced leakage currents, flowing through respective MOS transistors in the circuit, to reach a predetermined reference level. The reference level may be determined by the power dissipation specification of the circuit as a whole. This alternative approach will be herein called a xe2x80x9cthird lifetime prediction approachxe2x80x9d. Hereinafter, the conclusion of my analysis on the xe2x80x9cthird lifetime prediction approachxe2x80x9d will be described. According to the third lifetime prediction approach, the behaviors of respective MOS transistors in a semiconductor integrated circuit are all taken into account. That is to say, the degradation of the overall circuit changes depending on the number of SBD spots, i.e., spots where the SBD has occurred in the transistors. In the following description, the number of SBD spots will be represented by the number of transistors in each of which just one SBD spot exists (which transistor will be herein called an xe2x80x9cSBD transistorxe2x80x9d) for the sake of simplicity. Actually, a number of SBD spots should exist in a single transistor. Statistically speaking, though, the existence of 100 SBD spots in one transistor is equivalent to the existence of one SBD spot in each of one hundred transistors. Suppose a number N (which is a natural number) of MOS transistors are included in a semiconductor integrated circuit implemented as a single semiconductor chip. The greater the number of SBD transistors among the number N of MOS transistors, the larger the total amount of B-mode stress induced leakage currents flowing through the circuit (which will be herein called a xe2x80x9ctotal leakage currentxe2x80x9d). In this case, the magnitude of B-mode stress induced leakage current flowing through one SBD spot (i.e., a single SBD transistor) would be smaller than the amount of reference leakage current required for the circuit in accordance with power dissipation specifications, for example. The amount of reference leakage current will be herein called a xe2x80x9creference levelxe2x80x9d. Accordingly, while the number of SBD transistors is still small, the total leakage current of the circuit is believed to be less than the reference level. As described above, according to the xe2x80x9cthird lifetime prediction approachxe2x80x9d, the life of a semiconductor integrated circuit is supposed to expire when the total leakage current, increasing with the rise in number of SBD transistors, exceeds the reference level. Thus, supposing the number of SBD transistors is M when the total leakage current exceeds the reference level, the circuit""s lifetime can be predicted as a time that should pass after the stress started to be placed until the number of SBD transistors reaches M. The present invention was made based on the above-described findings, or the xe2x80x9cthird lifetime prediction approachxe2x80x9d, in particular. Specifically, in a first inventive method of predicting the lifetime of a semiconductor integrated circuit, a time it takes for a total amount of B-mode stress induced leakage currents, flowing through respective MOS devices in the circuit, to reach a predetermined reference level is estimated as an expected lifetime of the circuit. According to the first inventive lifetime prediction method, the lifetime of a semiconductor integrated circuit can be predicted without identifying the generation of a hard breakdown (HBD) in MOS devices. Thus, even if a thin gate insulating film, for which the HBD generation is nonidentifiable, is used for the MOS devices, the circuit""s lifetime can be predicted reliably. Also, compared to regarding a time it takes for just one of MOS devices in a semiconductor integrated circuit to cause the SBD as the circuit""s lifetime (comparative example), the circuit""s lifetime, predicted by the first inventive method, can be closer to the actual one. Accordingly, if the thickness of a gate insulating film or a gate voltage for the MOS devices is adjusted to equalize the circuit""s lifetime, predicted by the first method, with a desired value, the gate insulating film will not be excessively thick or the gate voltage will not decrease unnecessarily. As a result, the circuit can be downsized and the operating speed of the MOS devices can be increased, thus enhancing the performance of the circuit. A second inventive method of predicting the lifetime of a semiconductor integrated circuit includes: a first step of deriving, as a unit leakage current level, the amount of a B-mode stress induced leakage current flowing through each of SBD spots where a soft breakdown has occurred in multiple MOS devices included in the circuit; and a second step of obtaining a critical spot number from the unit leakage current level. The critical spot number is a minimum number of SBD spots required for a total amount of B-mode stress induced leakage currents, flowing through the respective MOS devices, to exceed a predetermined reference level. The second method further includes a third step of estimating, as an expected lifetime of the circuit, a time it takes for the number of SBD spots in the MOS devices to reach the critical spot number. According to the second inventive lifetime prediction method, the first inventive lifetime prediction method is implementable just as intended. Thus, the same effects as those of the first inventive method are attainable without fail. In the second inventive method, the third step preferably includes the steps of: obtaining a time T0 it takes for an MOS device under test, including a gate insulating film with an area S0, to cause a soft breakdown; and predicting the circuit""s lifetime by TBSILC=T0xc3x97((Mxc3x97S0)/Schip)1/m where TBSILC is the circuit""s lifetime, M is the critical spot number, Schip is a total area of the gate insulating films of the MOS devices and m is a form parameter in a Weibull distribution of the time T0. In such an embodiment, the circuit""s lifetime can be predicted accurately. In the second inventive method, the circuit is preferably virtually made up of a number N (which is a natural number) of MOS devices, each having a gate insulating film with an area STr. And the third step preferably includes the steps of: obtaining a time TSB(Tr) it takes for an MOS device under test, including a gate insulating film with the area STr, to cause a soft breakdown; and predicting the circuit""s lifetime by TBSILC=TSB(Tr)xc3x97(M/N)1/m where TBSILC is the circuit""s lifetime, M is the critical spot number and m is a form parameter in a Weibull distribution of the time TSB(Tr). The circuit""s lifetime can also be predicted reliably enough by doing so. In the second inventive method, the circuit is preferably virtually made up of a number N (which is a natural number) of MOS devices, each having a gate insulating film with an area STr. And the third step preferably includes the steps of: obtaining a time TSB(Tr) it takes for an MOS device under test, including a gate insulating film with the area STr, to cause a soft breakdown; and predicting the circuit""s lifetime by TBSILC=TSB(Tr)xc3x97((Mxc3x97STr)/Schip)1/m where TBSILC is the circuit""s lifetime, M is the critical spot number, Schip is a total area of the gate insulating films of the MOS devices and m is a form parameter in a Weibull distribution of the time TSB(Tr). The circuit""s lifetime can also be predicted accurately enough by doing so. In the second inventive method, the third step preferably includes the steps of: deriving a Weibull function for a time it takes for an MOS device under test to cause a soft breakdown; and predicting the circuit""s lifetime using a Weibull plot of the Weibull function. The circuit""s lifetime can also be predicted accurately enough by doing so. An inventive method for reliability testing of a semiconductor integrated circuit includes: a first step of estimating a first time it takes for a total amount of B-mode stress induced leakage currents, flowing through respective MOS devices in the circuit, to reach a predetermined reference level where an actual operating voltage is applied to the circuit; a second step of estimating a second time it takes for an MOS device under test to cause a soft breakdown from the first time where a test voltage, higher than the actual operating voltage, is applied thereto, and then determining, by the second time, a reference control level for a predetermined control point of the device under test; and a third step of measuring the control point of the device under test where the test voltage is applied thereto, and then determining whether or not a result of the measurement meets the reference control level. According to the inventive reliability testing method, the reliability of a semiconductor integrated circuit can be tested using a first time it takes for a total amount of B-mode stress induced leakage currents, flowing through respective MOS devices, to reach a predetermined reference level at an actual operating voltage. That is to say, the reliability of the circuit can be tested using the circuit""s lifetime predicted by the first inventive lifetime prediction method at the actual operating voltage. Accordingly, even if a thin gate insulating film, for which the HBD generation is non-identifiable, is used for the MOS device, the reliability of the circuit can be tested just as intended.
Q: Angular $http CORS 405 Method Not Allowed I'm tring to GET from a api system with angular $http.get module but : api endpoint system just accept GET method and won't work with OPTION method REQUEST headers : Host: www.example.com User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Access-Control-Request-Method: GET Access-Control-Request-Headers: x-device-type,x-software-version,x-unit-measurement Origin: http://localhost:3000 Connection: keep-alive RESPONSE headers: Status code: 405 Method Not Allowed Access-Control-Allow-Headers: Content-Type, Accept, origin, referring-domain, X-UNIT-MEASUREMENT, X-AUTH-TOKEN, X-DEVICE-TYPE, X-SOFTWARE-VERSION Access-Control-Request-Method: GET, POST, PUT, DELETE, OPTIONS Allow: GET Cache-Control: private,no-transform Content-Length: 1565 Content-Type: text/html; charset=UTF-8 Date: Thu, 14 Apr 2016 11:41:13 GMT Server: Microsoft-IIS/8.5 X-API-VERSION: 1.40.1.0 X-INSTANCE-ID: ALL X-Powered-By: ASP.NET access-control-allow-credentials: true access-control-allow-origin: * p3p: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT" I just tried this things : 1: setting default Content-Type even text/plain and other types [Not Working] $httpProvider.defaults.headers.common['Content-Type'] ='application/x-www-form-urlencoded; charset=UTF-8'; A: Because I'm using Atom Electron shell for running my app , the quick solution for me was using --disable-web-security for disabling CORS protection in browser .
Prices in the January 27, 2002 Real-Time Market are correct. Prices in the January 28, 2002 Day-Ahead Market are correct. Please note that Market Monitoring will no longer be reserving prices due to ECA-B. Code modifications were made on December 20th to incorporate into the Real-Time price, the BME price in the presence of congestion. The incorporation is now an automatic process that is prescribed by the NYISO tariffs. This message will appear in price reservation announcements through January 31, 2002. This e-mail information is a copy of the official posting which can be found at the following address of our website: http://mis.nyiso.com/public/htm/OperMessages/CurrentOperMessages.htm#mm --- You are currently subscribed to nyiso_tie as: benjamin.rogers@enron.com To unsubscribe send a blank email to leave-nyiso_tie-628650Q@lyris.nyiso.com
£3,0 3W-0f,o^s RECEIVED IN COURT OF CRIMINAL APPEALS APR 10 2015 ^bei-AcostarGlerk- V-Vxa^ \S_^uJ>-a^x-cxA:\Ae, b>£>wei^ Ql\A& •=Sj^a^~£-JCJL^a \N>xj>ju£ ^SjLJsJW^ SjCAlV ^^a^ Vj^o^ ^p-VV^j ^fi_JljQ(J^-_U|/>," U^w_ \W- Qy-9-g- *Xfe Aoefx> -j&U*- S'o Hiucu iCU^i^^^^ ^JUL^L. ^i\z_L\A^ (X ^C\V OVlc^^^Xih ^Qa^—Ul^- ^QpNV- •V> "^W PaXL/v S>Qvc) vx<^ rp^<V V^hYv A* i^L Coo^^N C&C Cl^u \lo^V A_\c^f VV^c^^WHr Q^_ -CJyVqvAcNj^^^Cja^ \:- \j0^q\A-__\Ajln^^ — . "' --y^—^~--—— ==»— — —~—. —. ^>W^r 7——-'—— = ^ O^^Va^o rfyA v/y,1-^ S.VxqV e^ox Pu-g/v Lvs W^ii^ VQr ^ao^ \vWv. u\<j*s/L V^\.<p VW- Qj'V V*cVi W^bi. __ H G©^ A^U5^> ^— "' €*$££&%%& And it came to pass in those days *Go ye therefore, and teach all nations, that Jesus came from Nazareth of baptizing them in the name of the Galilee, and was baptized of John Father, and of the Son, and of the in Jordan*1 (Mark 1:9) Holy Ghost" (Matthew 28:19) «-^- etec&emee £&ea& ^S&vd^ybiuA ^AvM, taa& "Sorted'w&k Sfiffin, in, 6ap86m, On,rie<^ dcutof A^ril
Follow @Sean_Breslin If there’s one gripe I have about the big buildings in Atlanta, it’s that they’re pretty drab. There are a few exceptions, but Atlanta’s motto seems to be, “Build it fast – who cares what it looks like?” For all of its advantages that I love, our town’s architecture lacks the imagination that has made other cities famous. (Also read: See what brand of pizza your town eats the most using this fancy map) In the photo to the right, you’ll see the design for one proposed building in Midtown Atlanta. It would be a 35-story apartment tower, according to a Curbed Atlanta report, and it would replace – of course – a parking lot. The proposed development would cost approximately $70 million and would contain retail shops along with the 400 or so apartments. The building will be located at Sixth and Peachtree and could bring some additional creativity to an area where more young adults are looking to move as they spurn the suburbs for the inner city, according to an Atlanta Business Chronicle report. Then, there’s the Buckhead building mock-up below, which is far more … interesting. Three Alliance Center is a 30-story proposed building that will have magic glass walls, according to Curbed Atlanta. If all goes according to plan, the unique building will sit at the corner of Lenox Road and GA-400. It would be Atlanta’s first glass faceted glass curtain wall system, according to the complex’s website, and would complete the office park that already contains two buildings (seen surrounding the proposed Three Alliance Center in the picture). Real estate firm Tishman Speyer projects the building would be completed in mid-2016. Sure, building design isn’t a major talking point with most people, but I do appreciate pretty buildings and a city with imagination can draw newbies that might have gone to Denver or Portland instead. If we’re going to get younger as a city, we might as well do it with some style. Let’s hope the firms pitching the designs for these buildings can follow through and actually get these projects done. Both of these buildings would be welcomed additions to our blasé skyline. Back to home page 0.000000 0.000000
Yeah, no. Tobias was never for me. And I can't help but think that Tris was way too good for him. It's a bit the same with Day for me, although I must say that I liked him a lot in Champion. I hope you get to finish the series soon. :)
Services ! The South-East Roam the Alps and the traditional villages of Savoie, admire the Roman remains, a testimony to our past, and finally enjoy being guided by the sweet smell of lavender and delight in the picturesque Provencal homes, the St Tropez marina, and more. Sonnez les clarines Did you know? In 1080, Bruno and six companions asked the bishop of Grenoble for an area of wasteland in the mountains of his diocese. He built a small retreat in St Pierre de Chartreuse which became the birthplace of a major meditative order. This monastery is completely devoted to silence and to the monks' prayer and is not open for visits. The community can host anyone wishing to experience a retreat in a Carthusian monk's cell. Follow us on L'appli Mobile Iphone An unusual way to explore France's greatest treasures. On a scale of 1:30, châteaux, villages, ports and works of art are displayed over 5 hectares of wooded parkland. Interactive experiences throughout the visit and attractions for all the family!
Structure and function of Pet100p, a molecular chaperone required for the assembly of cytochrome c oxidase in Saccharomyces cerevisiae. The assembly of cytochrome c oxidase in the inner mitochondrial membranes of eukaryotic cells requires the protein products of a large number of nuclear genes. In yeast, some of these act globally and affect the assembly of several respiratory-chain protein complexes, whereas others act in a cytochrome c oxidase-specific fashion. Many of these yeast proteins have human counterparts, which when mutated lead to energy-related diseases. One of these proteins, Pet100p, is a novel molecular chaperone that functions to incorporate a subcomplex containing cytochrome c oxidase subunits VII, VIIa and VIII into holo-(cytochrome c oxidase). Here we report the topological disposition of Pet100p in the inner mitochondrial membrane and show that its C-terminal domain is essential for its function as a cytochrome c oxidase-specific 'assembly facilitator'.
Q: Backbone model save state I use backbone model to save the data to the server. then I handle the success or error callback after save(post) and set wait:true. my question is why backbone model only trigger the error callback when server returns a string? when server returns a json or any number, it will go to the success. the problem is if I want to return a multiple error message and I want to put all error message into a collection(json), it will never go to error callback. sample code like echo 'success'; //actually it will go to error callback cuz it return a string(any string) echo json_encode($some_array); // it will go to success echo 200/anynumber; // it will go to sucess My solution is if I wanna return a multiple message, I can separate those message by a delimiter, and use javascript native function split to separate them. is there any better solution like maybe I can return a state(indicate either success or error) and a collection from server? model code looks like: somemodel.save({somedata}, { success:function(a,b,c){}, error:function(b,c,d){}, wait: true }); A: Backbone expects JSON as the default response format. When you get an integer, i suspect, backbone is using jquery $.parseJSON() on the number and returns it as valid JSON while it is not. If you want to return multiple errors messages, i suggest you put them into separate fields of an array and encode them then send as response to backbone. EDIT Just checked backbone source code and it doesn't call on $.parseJOSN() contrary to what was guessed above. EDIT 2 Assume you have the following PHP code (as much as I would like to create a framework agnostic example, it is possible but things will be quicker and smoother using a framework so I have picked Slim). When you save a model, backbone sends the data to the server using POST as the method. In Slim this will translate into the following: $app = new \Slim\Slim(); $app->post('/authors/', function() use($app) { // We get the request data from backbone in $request $request = $app->request()->getBody(); // We decode them into a PHP object $requestData = json_decode($request); // We put the response object in $response : this will allow us to set the response data like header values, etc $response = $app->response(); // You do all the awesome stuff here and get an array containing data in $data // // Sample $data in case of success $data = array( 'code' => 200, 'status' => 'OK', 'data' => array('id'=>1, 'name' => 'John Doe') ); // sample $data in case of error $data = array( 'code' => 500, 'status' => 'Internal Server Error', 'message' => 'We were unable to reach the data server, please try again later' ); // Then you set the content type $app->contentType('application/json'); // Don't forget to add the HTTP code, Backbone.js will call "success" only if it has 2xx HTTP code $app->response()->status( $data['code']); // And finally send the data $response->write($data); I have used Slim simply because it gets the job done and everything should read like English. As you can see, Backbone will need the response in JSON format. I just tested on one of my websites, if you send an HTTP code different from 2xx, Backbone will actually call error instead of success. But the browser will also catch that HTTP code, so watch out! REMOVED INFO Backbone parse function will be expecting JSON as well! Assume we have this collection: var AuthorsCollection = Backbone.Collection.extend({ initialize: function( models, options ) { this.batch = options.batch }, url: function() { return '/authors/' + this.batch; }, // Parse here allows us to play with the response as long as "response" is a JSON object. Otherwise, Backbone will automatically call the "error" function on whatever, say view, is using this collection. parse: function( response ) { return response.data; } }); parse allows you to inspect the response, but will not accept anything else than JSON!
apiVersion: v1 kind: Pod metadata: name: mongodb spec: containers: - image: mongo name: mongodb volumeMounts: - name: mongodb-data mountPath: /data/db ports: - containerPort: 27017 protocol: TCP volumes: - name: mongodb-data persistentVolumeClaim: claimName: mongodb-pvc
This embodies the true spirit and essence of meditation. An inspirational photo of a girl underwater, almost dream-like surrounding with a halo of sunlight shining upon her with free-flowing hair.letting go of inhibitions, mediating for peace. Draco Pistols Grippin on that wood grain. Brudesløret (The Bridal Veil waterfall), the Geirangerfjord, Norway. The Bridal Veil is at its most beautiful in the spring time (May and June) with lots of water thundering down against the Geiranger fjord. Russian soldiers preparing for the Battle of Kursk, July 1943 Image credits: Shirak Karapetyan-Milshtein - photograph was created in for a photo competition. It is based on archive photos from the war in Russia in
A hypothetical duck-alignment. Alan is a great agent, stellar, in fact... but two years ago, Mrs. Alan lost her job, due to health problems, she'd been in and out of her doctor's offices, and had a couple of surgeries. The bills have piled up, and there are a lot of medical bills. Due to the loss of her job, they're been surviving on Alan's income alone for the last two years, due in large part, to Alan's juggling of lots of ducks. Fortunately, Alan planned well, and did what any good real estate agent would do. He set aside a full third of his income, year after year, and had plenty of money set aside for a down market. Unfortunately, nobody expected this down market to last quite as long as it has, and for Mrs. Alan's medical problems to coincide perfectly with the down market. To top things off, this is the year, that Mr. and Mrs. Alan's older daughter began college, and while it's not Harvard, it's also not cheap. And yet, due to Alan's smart planning, and lining ducks in a row, they've managed. Mrs. Alan is on the mend, and almost ready to return to work.. but not quite yet. They're paying off the medical bills as quickly as possible, but credit cards have been maxed out, and while there are no actual 30-day-late fees, their credit score has plummeted from what it once was, based on their credit card ratios, and a handful of slow-pays. In an interview with a potential buyer, they have asked to see his credit report. And upon viewing that credit report they've determined that he's not "fiscally responsible" enough to handle their transaction. Lesser agents who'd not planned as well, might have fallen by the wayside. But, no, not Alan. His superior financial planning has allowed Mr. and Mrs. Alan to stay afloat, and in fact remain financially viable. It's amazing. And yet, his credit report tells a different story. Alan - there are a lot of people who read between the lines and one could very easily read you into this post ..... in between the lines ..... we are or become what we post about in the eyes of those who read between the lines So I guess the part time agent with a spouse that's a millionaire that knows nothing about the market, has never written an offer or taken a listing but has a great credit score would be a great choice for an agent. Are we within our rights to therefore ask for health reports from our physicians - after all, they're advising us about our health? Or perhaps an eye doctor who wears glasses would be a bad choice? I'm baffled by this logic. There are too many things wrong with this hypothetical. I went through college on financial aid. Is there a problem with having your daughter file for financial aid to help the home situation? Is there a problem with anyone filing for financial aid for college? It's there for a reason. And if you haven't had any 30 day lates, your score isn't going to suffer "that" much. The ratios of what you can borrow and what you are borrowing might be higher, but as long as bills are being paid, not an issue... and woudn't most of this reflect on your wife's credit, and not yours? I don't think this scenerio applies to your original post. Your original post talked about the agent not having a great year because of the market. My response on that was if the agent couldn't make it in this market, how great of an agent are they? Donna - my original post talked about the credit report having no bearing, no relevance as to whether or not they are a good agent and able to successfully represent the client. But if you want to go into the details of this 'hypothetical', just as an example, my daughter got financial aid in college... but that still left tens of thousands to be paid to the college on top of financial aid. And yes, even without 30-day-lates, if your debt/credit ratio is high, your credit would indeed suffer "that" much. And no, it wouldn't reflect solely on the wife's credit if you're married... you have joint debt. And nowhere in my original post did I say "the agent couldn't make it"... what I said was: "I know several agents, who've had a really tough few years, whose credit scores might not have survived unscathed, who are truly excellent Realtors and know their stuff. Their current credit scores have more to do with children in college, and the temperamental real estate market, than with their knowledge and expertise. I think that, perhaps, it's you who refuses to see the other side. Simply having a great credit score doesn't make you a great Realtor, any more than having a bad credit score makes you a bad Realtor. Okay, I was confused and jumped into the same boat with my good pal Gayle - ( it's easy to do with that Lake talk of hers). Now, I finally get it too. Interesting post and my thoughts align with what you explained in comment #21. A poor credit score doesn't always reflect the true circumstances. Disclaimer: ActiveRain, Inc. does not necessarily endorse the real estate agents, loan officers and brokers listed on this site. These real estate profiles, blogs and blog entries are provided here as a courtesy to our visitors to help them make an informed decision when buying or selling a house. ActiveRain, Inc. takes no responsibility for the content in these profiles, that are written by the members of this community.
Q: If $n$ divides $2^{2^{n} +1}+1$ $\to$ $n$ divides $2^{n}+1$? Find a counterexample to show that the following implication is not valid. if $n$ divides $2^{2^{n} +1}+1$ $\to$ $n$ divides $2^{n}+1$ And show how to use it. This question appeared on the topic Does $n \mid 2^{2^n+1}+1$ imply $n \mid 2^{2^{2^n+1}+1}+1$? UPDATE: Sorry, I made a mistake when typing the implication. I typed if $n$ divides $2^{2^{n} +1}+1$ $\to$ $n$ divides $2^{n}+n$ but the correct is if $n$ divides $2^{2^{n} +1}+1$ $\to$ $n$ divides $2^{n}+1$ A: $n=3$ does the trick: $$3 \ |\ 2^9 + 1 = 513$$ but $$3 \not |\ 2^3 + 3 = 11$$ A: The post you linked bounced around $n = 57$, and it happens to be a counterexample. First, I'll show that $57\ |\ 2^{2^{57} + 1} + 1$. To do this, I'll show that it is divisble by 19 and 3. $\phi(3) = 2$, so $2^{2^{57} + 1} \equiv 2^1 \bmod{3}$, and thus, we know that $2^{2^{57} + 1} + 1 \equiv 2^1 + 1 \equiv 0\bmod{3}$. $\phi(19) = 18$ and $\phi(18) = 6$, so $2^{57} + 1 \equiv 2^3 + 1 = 9\bmod{18}$, and $2^{2^{57} + 1} + 1 \equiv 2^9 + 1 = 513 \bmod{19}$. $513 = 19 \times 27$, so $2^{2^{57} + 1} + 1$ is also divisible by 19. From these, we can conclude that $57\ |\ 2^{2^{57} + 1} + 1$. Now, $\phi(57) = 36$, so $2^{57} + 1 \equiv 2^{21} + 1 = 2097153 \bmod{57}$. Doing out the division, you can see that this actually leaves a remainder of 9 (For the lazy, $2097144 = 57 \times 36792$). Hence, $57\ |\ 2^{2^{57} + 1} + 1$, but $57\not|\ 2^{57} + 1$. (See Euler's theorem for how I reduced all those exponents.) As for "how to use it", what specific use case did you want?
This invention relates to a digital image information data reproducing apparatus and more particularly to a replay equalization circuit suitable for variable speed replay. The relative speed of the VTR tape/head is expressed as a function of the head rotating speed, the winding angle of the tape on the drum and the tape running speed. The tape/head relative speed increases as the tape running speed is increased as during the fast forward. U.S. Pat. No. 4,577,241 describes a clock recovery circuit using a PLL (phase locked loop) circuit, which extracts clocks from the recorded data on the tape that match the replay speed when the digital VTR is replayed at a tape/head relative speed different from that for recording as during the fast forward. (This replay is simply referred to as a variable speed replay.) However, since the frequency characteristic required to obtain the replay signals from the tape changes according to the replay speed, some measures to adjust the equalization circuit for changes in the replay speed in order to reproduce a quality picture must be provided, not only in the clock recovery circuit but also in the equalization circuit--which compensates for the tape/head frequency characteristic during the recording and reproducing process. So far, however, no reference has been made to this point. Nor have any corrective steps been taken. In the conventional apparatus, the equalizing frequency characteristic of the replay equalization circuit is constant during the variable speed replay. Therefore, the replay equalization circuit fails to match the increased tape/head relative speed and thus produces inter-symbol interference. This in turn deteriorates an eye opening factor--which represents the state of equalization--increasing the code error. The same problem that occurs when the tape is fast-fed during replay at a speed higher than that during recording with the digital VTR's also exists with other types of digital image information reproducing apparatuses, which consist of a recording medium corresponding to the tape, a recording/reproducing transducer corresponding to the head, and a replay equalization circuit.
Teams have been training since June to be ready for the long-awaited NCAA Division I Cross Country Championships that will take place in Terre Haute, Ind. on Monday, November 23. After months of preperations it comes down to 6,000m for the women and 10,000m for the men, to prove who is the best collegiate runner and which is the best team in the nation. Story lines are abundant on both sides; here we give you the breakdown of the top storylines to look for when you, surely, tune in to watch the race live on Versus: Continue Reading Men’s Individual Championship The men’s individual race promises to be a two-man showdown. Chris Derrick of Stanford is the only undefeated runner in the nation, and for that reason I say he is the favorite. Coming in a close second for race favorite status is last year’s runner-up, Sam Chelanga of Liberty. Chelanga lost to Derrick at pre-nationals in an epic collapse, after gapping the young Cardinal by a significant margin in the first half of the race. Chelanga has a few things on his side: he is the NCAA 10,000m record holder, he has been in this position before, and he is not bearing the pressure of being the favorite to win. Although he did choke at pre-nationals, Chelanga has the best resume heading into Monday and cannot be counted out. A slew of dark horses will challenge these two from behind. While I expect Chelanga to take the race out very hard, Derrick will need to shake off these others if he wants a solo shot at taking Chelanga down later in the race. Leading my list is Aussie David McNeil of Northern Arizona. McNeil is experienced and took 2008 NCAA champion Galen Rupp to the line this spring in the 5000m at the NCAA outdoor championships. McNeil had a poor early season due to an elongated track campaign, but looks ready to roll in Indiana. Derrick’s teammates Elliot Heath and Justin Marpole-Bird were a strong 2-3 at the West regional, overtaking top contenders like Brandon Bethke of Arizona State and Luke Puskedra of Oregon. With the team title their main objective expect all of the Cardinals to run inspired. There’s an exciting wild card in German Fernandez of Oklahoma State. The 2009 NCAA 1500m champion suffered setbacks this summer but looks like he is ready for a big race. Fernandez could be top-5 or top-25, but don’t discount the current American junior 5000m record holder. As with the individual race, expect a two-team battle for supremacy in the men’s team competition. The contenders are overwhelming favorite Stanford and unpredictable Oklahoma State. Stanford has not lost a meet the entire year, a legitimate shot at an individual title, and five runners that with top-20 potential. There is a reason they are the favorites: they haven’t had a bad race yet. Oklahoma State cannot say the same, but not for lack of trying. The main reason the Cowboys can’t be considered the favorite is the health of one Sophomore stud named German Fernandez. A pre-season individual title favorite was hit with the injury bug over the summer, but looks like he could be finally getting his legs back. Teammates John Kosgei, 8th in 2008, Ryan Vail and Colby Lowe are all top-15-caliber runners. If the Cowboys want to upset the Cardinal they will need Fernandez and his troops to land three men in the top 10 and another two inside the top 20, otherwise forget about it. The battle for the other podium spot is likely a three-way matchup among defending champion Oregon, Alabama, and Portland. The Ducks return Luke Puskedra, 5th in 2008, but have looked weak, getting beaten by Portland in the West regional. The Piolts from the northside of the state are led by Alfred Kipchumba, who looks poised for a top-15 finish. Alabama is the wild card with an all-African top-5. They don’t have a strong #1 but will group up and possibly have the most impressive 1-5 split of the day. If they can bunch up well in the top 35 or so, they may nab a podium spot. If it is relatively cold and/or windy, discount Alabama and look to a team from Oregon to take the final podium spot. Why don’t we just give Jenny Barringer the trophy, spare the field the embarrassment and let the other women race for the lesser positions? All right, that may be an exaggeration, but in my mind it’s not a matter of if the Colorado senior is going to win, it’s by how much. Last spring, Barringer, who has already graduated, decided to hold off on a six-digit contract and finally win an individual cross country title for the Buffaloes. If she doesn’t win it will be the biggest upset in NCAA history, bar none. If there were to be some type of epic collapse there is a very small group of women who could take the title. This group is led by 2008 runner-up and 2009 NCAA 1500m champion Susan Kuijken of Florida State. The Dutch superstar is the only woman with comparable stats to Barringer over the 800-1500m disciplines, but lacks the stamina over the longer distances. Kuijken’s only hope is that Barringer goes for a course record and misjudges the effort early on. If Barringer is in distress over the final mile, expect Kuijken’s speed to be the determining factor in her hunt for a national title. As for the other top women, Villanova’s Sheila Reid has the distinct honor of being the other runner, besides Barringer, to be undefeated on the season. She will need to fight off a contingent of top women from the west region, including Washington’s Kendra Schaff and Christine Babcock and Oregon’s Jordan Hasay and Nicole Blood. Illinois’ Angela Bizzarri, 2009 NCAA 5000m champion, and Penn State’s steeplechase specialist Bridget Franek will certainly be factors in the chase pack. The defending champion Washington Huskies appear primed to repeat after another solid season. Led by Kedra Schaff, Christine Babcock and Mel Laurence, all top-25 from 2008, the Huskies are deserving of their #1 national ranking. They are undefeated and look as strong as in 2008, when they won the national title. Who will contend with the Huskies? Many fans may look to northwest rival Oregon as the top challenger, but a surprise out of the east will likely land itself next to Washington on the podium. At the beginning of the season the Villanova Wildcats were ranked #5 in the nation, along with four other mid-atlantic teams. In what is probably the most competitive region, next to the west, the Wildcats proved their mettle throughout the season andcome to Terre Haute ready to dethrone the defending champions. Led by standout Sheila Reid and Amanda Marino, Villanova is poised for a big day. Reid has had a breakout season and Marino was a highly respectable 27th in 2008. If they can squeeze two women into the top 10 and three in the top 20 they will have a shot at the upset. Let us not forget about Oregon. The 2008 runners-up return virtually everyone, and add a new #1 in Jordan Hasay. The one thing the Ducks have going for them is their front runners, Hasay, Nicole Blood and Alex Kosinski. They will need top-15 performances from these women if they want to finish in the top two again. If the Ducks are to falter look for Liz Costello’s Princeton Tigers or Jenny Barringer’s Colorado Buffaloes to take a run at the podium. The #6 ranked Buffs are the dark horse in the team race and cannot be overlooked. Coach Wetmore is a wizard when it comes to the national championship and with a virtual guaranteed single-point effort from Barringer, they will be well on their way toward an upset.
What’s Your Name Here’s a quick look at last week’s Sinful Colors nail polish selection. They call this deep dark color with a hint of sparkle ” What’s Your Name”. Loving dark nails and lippies for the start of fall and this color fits right in.
Hold The Phone: MediaCom, Medialets Forge 'Preferred Partnership' WPP’s MediaCom has struck an agreement with Medialets to use the latter’s mobile ad serving platform. The shop characterized the deal as a “preferred partnership” which will be rolled out to all countries in which MediaCom operates. The partnership is the second global deal that MediaCom has signed recently as it seeks to improve its mobile offering. In March, the agency signed an agreement with Celtra to provide a single platform for creating mobile-rich media display ads. MediaCom said that Celtra will integrate into the Medialets buy side ad-serving platform. “Many clients regard mobile as complex and expensive,” said Ben Phillips, Global Head of Mobile at MediaCom. The Medialets and Celtra deals, he added, are part of the agency’s effort to build a “global set of tools that work together to simplify the process and strip out wasted costs.” The agency said that Medialets becomes the enterprise software technology that will enable it to create mobile media and attribution tracking campaigns more quickly and more efficiently. It will also provide tracking across thousands of certified mobile properties. Trials of the Medialets system have delivered improvements in media efficiency of more than 40% in comparison to non-mobile specific ad servers, according to the agency. Eric Litman, CEO of Medialets said that “As the only mobile MRC-accredited buy side ad server, we can serve any type of mobile ad in any type of mobile environment for MediaCom and their clients worldwide giving them one singular source of data and metrics to make stronger strategic decisions for their partners. Ben’s vision of leading the technical platform in mobile will allow MediaCom to lead the way as this sea change of adoption continues.”
It seems that Steve Bannon doesn't have that high of an opinion of the alt-right movement -- which he played a central role in elevating to the national stage. "Ethno-nationalism — it's losers. It's a fringe element. I think the media plays it up too much, and we gotta help crush it, you know, uh, help crush it more. These guys are a collection of clowns," Bannon told Robert Kuttner of The American Prospect on Wednesday. Advertisement: Bannon couldn't help but add a jab at Democrats, however. "The Democrats, the longer they talk about identity politics, I got ’em. I want them to talk about racism every day. If the left is focused on race and identity, and we go with economic nationalism, we can crush the Democrats," Bannon said. As Axios reported, it seems that Bannon did not realize his comments would be interpreted as an on-the-record interview. His latest interview will almost certainly not help his standing in a White House marked by how his relationship with President Donald Trump has noticeably frayed in recent weeks. Indeed, according to some reports, Bannon may be in danger of losing his job altogether. Advertisement: The chief strategist spent much of the conversation bending Kuttner's ear on the subject of America's bilateral relationship with China. It soon became clear (as Bannon later admitted) that he was hoping to align members of the left with members of the right who share his anti-free trade stances. Bannon said, "We’re at economic war with China. It’s in all their literature. They’re not shy about saying what they’re doing. One of us is going to be a hegemon in 25 or 30 years and it’s gonna be them if we go down this path. On Korea, they’re just tapping us along. It’s just a sideshow." Characteristically, Bannon threw other administration members under the bus who he perceived as opposing his agenda. Advertisement: "We’re still fighting. There’s Treasury and [National Economic Council chair] Gary Cohn and Goldman Sachs lobbying," Bannon told Kuttner. In contrast to the Trump administration's hardline stance toward North Korea, Bannon acknowledged that it would be impossible to start a war with that country without incurring an unacceptable amount of civilian casualties. Because of this, however, Bannon feels that there is no reason to hold out hope that Chinese influence can be brought to bear on their wayward neighbor. Advertisement: Bannon said he wants to cite Section 301 of the 1974 Trade Act to hold China accountable for coercing technology transfers from American businesses as well as accuse them of dumping steel and aluminum in the global market. He also gloated that policy advisers who want to avoid a trade war are "wetting themselves" at the impending hardline stance against China.
[Research on oil atomic spectrometric data semi-supervised fuzzy C-means clustering based on Parzen window]. A Parzen window based semi-supervised fuzzy c-means (PSFCM) clustering algorithm was presented. The initial clustering centers of fuzzy c-means (FCM) were determined with training samples. The membership iteration of FCM was redefined after the membership degrees of testing samples relatively to each state were calculated using Parzen window. Two typical faults of gear box were simulated through the gear box bed in order to acquire the lubricant samples. Concentration of Fe, Si and B, which were the representative elements, was selected as the three-dimensional feature vectors to be analyzed with FCM and PSFCM clustering methods. The clustering results were that the correct ratio of FCM was 48.9%, while that of PSFCM was 97.4% because of integrating with supervised information. Experimental results also indicated that it can reduce the dependence of the experience and lots of faults data to introduce PSFCM into oil atomic spectrometric analysis. It was of great help in improving the wear faults diagnosis ratio.
Biological embedding of early-life exposures and disease risk in humans: a role for DNA methylation. Following wider acceptance of 'the thrifty phenotype' hypothesis and the convincing evidence that early-life exposures can influence adult health even decades after the exposure, much interest has been placed on the mechanisms through which early-life exposures become biologically embedded. In this review, we summarize the current literature regarding biological embedding of early-life experiences. To this end, we conducted a literature search to identify studies investigating early-life exposures in relation to DNA methylation changes. In addition, we summarize the challenges faced in investigations of epigenetic effects, stemming from the peculiarities of this emergent and complex field. A proper systematic review and meta-analyses were not feasible given the nature of the evidence. We identified seven studies on early-life socio-economic circumstances, 10 studies on childhood obesity and six studies on early-life nutrition all relating to DNA methylation changes that met the stipulated inclusion criteria. The pool of evidence gathered, albeit small, favours a role of epigenetics and DNA methylation in biological embedding, but replication of findings, multiple comparison corrections, publication bias and causality are concerns remaining to be addressed in future investigations. Based on these results, we hypothesize that epigenetics, in particular DNA methylation, is a plausible mechanism through which early-life exposures are biologically embedded. This review describes the current status of the field and acts as a stepping stone for future, better designed investigations on how early-life exposures might become biologically embedded through epigenetic effects.
--- abstract: | We construct the smeared diffeomorphism constraint operator at finite triangulation from the basic holonomy- flux operators of Loop Quantum Gravity, evaluate its continuum limit on the Lewandowski- Marolf habitat and show that the action of the continuum operator provides an anomaly free representation of the Lie algebra of diffeomorphisms of the 3- manifold. Key features of our analysis include: (i) finite triangulation approximants to the curvature, $F_{ab}^i$ of the Ashtekar- Barbero connection which involve not only small loop holonomies but also small surface fluxes as well as an explicit dependence on the edge labels of the spin network being acted on (ii) the dependence of the small loop underlying the holonomy on both the direction and magnitude of the shift vector field (iii) continuum constraint operators which do [*not*]{} have finite action on the kinematic Hilbert space, thus implementing a key lesson from recent studies of parameterised field theory by the authors. Features (i) and (ii) provide the first hints in LQG of a conceptual similarity with the so called “mu- bar” scheme of Loop Quantum Cosmology. We expect our work to be of use in the construction of an anomaly free quantum dynamics for LQG. author: - Alok Laddha - Madhavan Varadarajan title: The Diffeomorphism Constraint Operator in Loop Quantum Gravity --- Introduction ============ The definition of the Hamiltonian constraint operator in Loop Quantum Gravity (LQG) is far from unique. The non-uniqueness stems from the tension between the local nature of the Hamiltonian constraint and the non- local nature of some of the basic operators used in its construction. Specifically, the Hamiltonian constraint depends on the curvature $F_{ab}^i$ of the Ashtekar- Barbero connection whereas the basic connection dependent operators are holonomies of the connection around spatial loops. While, classically, the curvature can be obtained through a limit of small loop holonomies wherein the small loop shrinks down to a point, quantum mechanically, the action of the corresponding holonomy operators in LQG does not have the recquisite continuity for the limit to exist. Hence, one proceeds as follows [@qsd1]. A triangulation of the 3 manifold is chosen and a finite triangulation approximant to the Hamiltonian constraint is constructed from finite triangulation approximants to the local fields which comprise it. The exact Hamiltonian constraint is only obtained in the continuum limit of infinitely fine triangulation. Due to the discontinuous action of the holonomy operators, it turns out that the continuum limit of the finite triangulation approximant to the constraint (which we will refer to as the “constraint at finite triangulation”) depends on the detailed choices of holonomy approximants to $F_{ab}^i$ at finite triangulation. It follows that an issue of crucial importance is whether one can somehow restrict the choices of these holonomy approximants and settle on a less ambiguous definition of the quantum dynamics of LQG. There are broadly two aspects to the choice of holonomy approximants. The first is related to the choice of representation used to evaluate the holonomy [@perez], the second to the choice of small loop around which the holonomy is evaluated. The current state of art uses a fixed spin (usually spin half) representation and a choice of little loop only restricted by the (slightly subjective) criterion of simplicity [@qsd1; @lm; @aajurekreview]. Unfortunately, calculations in simpler contexts suggest that these choices may be physically inappropriate. On the one hand a detailed study of Parameterized Field Theory [@ppftham; @ttham] suggests that the representation of the small loop holonomy be tailored to that of spin network edge it acts upon. On the other studies of isotropic Loop Quantum Cosmology (LQC)[@improvedlqc] suggest that the specification of the size of the small loop should involve the electric flux operator. Thus, not only is the definition of the Hamiltonian constraint operator in LQG highly choice dependent, it may also be the case that the current set of choices are physically inappropriate. In this work, we seek insight into the nature of the (possibly) correct set of choices through an analysis of the diffeomorphism constraint. The diffeomorphism constraint in LQG is handled very differently from the Hamiltonian constraint. LQG kinematics provides a unitary representation of finite spatial diffeomorphisms [@alm2t]. The diffeomorphism constraint is not imposed directly but, rather, by demanding that states be invariant under the action of these unitary operators. Indeed, the (putative) generator of these unitary operators (which would correspond to the diffeomorphism constraint) is not even defined on kinematic states because of the lack of weak continuity of the unitaries. Here, we treat the diffeomorphism constraint in a manner similar to the Hamiltonian constraint. Accordingly, we fix a triangulation of the 3- manifold and seek finite triangulation approximants to the various local fields which make up the diffeomorphism constraint, construct the diffeomorphism constraint at finite triangulation and then take its continuum limit. Since we know the action of [*finite*]{} diffeomorphisms, our choice of finite triangulation approximants is guided by the requirement that the finite triangulation diffeomorphism constraint have an action of the form $$-i\hbar\frac{{\hat U}_{\phi ({\vec N},\delta)}- {\bf 1}}{\delta}. \label{final}$$ Here $\delta$ parameterizes the fineness of the triangulation as well as the size of the diffeomorphism $\phi ({\vec N},\delta )$ generated by the shift vector ${\vec N}$, ${\hat U}_{\phi}$ denotes the unitary operator corresponding to the diffeomorphism $\phi$ and the continuum limit is defined by $\delta\rightarrow 0$. This requirement, while natural in itself, is also strongly motivated by our previous studies of PFT [@ppftham]. Finally, we define the continuum limit of the finite triangulation diffeomorphism constraint operator on the Lewandowski- Marolf (LM) habitat [@lm] and check its physical appropriateness by showing that the algebra of diffeomorphism constraint operators on this habitat is anomaly free. We shall see that the choice of approximant to the $N^aF_{ab}^i$ term in the diffeomorphism constraint reflects similarities both with the choices made in PFT [@ppftham] as well as (at least at a conceptual level) LQC [@improvedlqc]. In the next section we outline the steps in our construction and detail the plan of the paper. Before doing so, we would like to acknowledge the importance of early pioneering works on the diffeomorphism constraint in the context of the Loop Representation [@rs; @tedlee] in providing inspiration and encouragement for the more rigorous work done here, specifically the works of Bruegmann and Pullin [@berniejorge] and Blencowe [@miles]. There, the diffeomorphism constraint was shown to generate infinitesmal diffeomorphisms in quantum theory under a certain assumption of regularity of the wave functions (which is violated in the current, rigorous formulation of the theory). [^1] It is also pertinent to mention Thiemann’s work [@qsd3] on the specific form of the diffeomorphism constraint which appears as the Poisson bracket between a pair of smeared density one Hamiltonian constraints. There too, a factor which is the difference between a finite diffeomorphism unitary operator and the identity is obtained. [^2] From the point of view of our work here, the derivation [@qsd3] neglects certain contributions which are of “order 1” in the Hilbert space norm. Nevertheless, Thiemann’s work is remarkable in that it represents the first attempt to tackle the diffeomorphism constraint in the modern formulation of LQG. Brief Sketch of Main Steps ========================== The purpose of this section is to sketch the main steps in the construction so as to give the reader a rough global view of the logic; the discussion will be schematic and the reader should not be perturbed if it does not follow the sketch in detail. In this section we shall set $G=\hbar =c=1$. Since our discussion in this section is schematic, we shall further simplify our presentation by choosing the Barbero- Immirizi parameter $\gamma$ to be unity (only!) in this section. The diffeomorphism constraint $D({\vec N})$ is $$\begin{aligned} D({\vec N}) &=& \int_{\Sigma} {\cal L}_{\vec N}A_a^i {\tilde E}^a_i \\ &=& V ({\vec N}) - {\cal G}(N^cA_c^i) \end{aligned}$$ where $$\begin{aligned} V ({\vec N}) &=& \int_{\Sigma}N^aF_{ab}^i {\tilde E}^b_i \label{defv}\\ {\cal G}(N^cA_c^i) &=& \int_{\Sigma}N^cA_c^i {\cal D}_a{\tilde E}^a_i . \label{defg}\end{aligned}$$ Here $\Sigma$ is the 3- manifold, $A_a^i$ is the Ashtekar Barbero connection, $F_{ab}^i$ is its curvature, ${\tilde E}^a_i$ is the densitized triad and ${\vec N}\equiv N^a$ is the shift vector field. Let $T(\delta )$ be a 1 parameter family of triangulations of $\Sigma$ with the continuum limit being $\delta \rightarrow 0$ and let $D_{T(\delta )},V_{T(\delta )}, {\cal G}_{T(\delta )}$ be finite triangulation approximants to the quantities $D, V, {\cal G} $ of the above equations. Thus $D_{T(\delta )},V_{T(\delta )}, {\cal G}_{T(\delta )}$ are expressions which yield $D, V, {\cal G} $ in the continuum limit. For simplicity consider a (non- gauge invariant) spin network state consisting of a single edge $e$ with spin label $j$ so that the state is just the $m,n$ component of an edge holonomy $h_{e\; m}^{(j)\;\;n}$ of the (generalized) connection along the edge $e$ in the representation $j$, the indices $m, n$ taking values in the set $1,..,2j+1$. In what follows we shall supress some of these labels and denote the state simply by $h_e$. From (\[final\]) of section 1, our desired result is: $$(1+ i\delta {\hat D}_{T(\delta )}) h_e = h_{\phi (\delta, {\vec N})\circ e}. \label{desired}$$ where, $\phi (\delta, {\vec N})\circ e$ is the image of $e$ by the diffeomorphism $\phi (\delta, {\vec N})$ which translates $e$ by an amount $\delta$ along the integral curves of the shift vector field $N^a$ (see Fig 1a). ![image](fig-a.eps) Fig 1a We obtain the desired result through the following steps:\ (i) First we set $$(1+ i\delta \hat{ D}_{T(\delta )}):= (1+ i\delta \hat{{\cal G}}_{T(\delta )})(1+ i\delta {\hat V}_{T(\delta )}).$$ (ii) Next, we show that $$(1+ i\delta {\hat V}_{T(\delta )})h_e = h_{{\bar e}({\vec N}, \delta )}. \label{bare}$$ Here ${\bar e}({\vec N}, \delta )$ has the same end points as $e$ (as it must by virtue of the gauge invariance of $V$) and is obtained by joining the end points of $\phi (\delta, {\vec N})\circ e$ to those of $e$ by a pair of segments which are aligned with integral curves of $N^a$ as shown in Fig 1b.\ ![image](fig-b.eps) Fig-1b \(iii) Finally, we show that the Gauss Law term, $(1+ i\delta {\hat{\cal G}}_{T(\delta )})$ removes these two extra segments (see Fig 1c). ![image](figurec.eps) Fig-1c The major part of the analysis concerns the derivation of the identity (\[bare\]) in step (ii) above. We proceed as follows. ${ V}_{T(\delta )}$ is written as a sum over contributions $V_{\triangle}$ where $\triangle$ denotes a 3- cell of the triangulation [*dual*]{} to $T (\delta )$, and $V_{\triangle}$ is a finite triangulation approximant to the integral $\int_{\triangle}N^aF_{ab}^i {\tilde E}^b_i$. We order the triad operator to the right in ${\hat V}_{\triangle}$ so that only those 3- cells contribute which intersect $e$. The triangulation $T(\delta )$ is adapted to the edge $e$ so that its restriction to $e$ defines a triangulation of $e$. Thus, there is a triangulation of $e$ by 1- cells and vertices of $T(\delta )$ so that each of these vertices $v_I, I=1,.., N$ is located at the centre of some 3- cell $\triangle = \triangle_I$. We define a finite triangulation approximant to $F_{ab}^i$ in a such a way that the following identity holds: $$(1+ i\delta {\hat V}_{\triangle_{I}})h_e = h_{{\bar e}(\triangle_I)}.$$ $\forall\ I\ \in\ \{1,...,N-1\}$.\ Here ${\bar e}(\triangle_I)$ is obtained by moving the segment of $e$ between $v_I$ and $v_{I+1}$ along the integral curves of $N^a$ by an amount $\delta$ and joining this segment to the rest of $e$ at the points $v_I, v_{I+1}$ by a pair of segments which run along the integral curves of $N^a$ as shown in Fig 1d. ![image](figured.eps) Fig-1d Next, we show that the contributions from all the ${\hat V}_{\triangle_I}$ yield the edge ${\bar e}({\vec N}, \delta )$ of Fig 1b. Recall that ${ V}_{T(\delta )}$ is obtained by summing over all the cell contributions $V_{\triangle}$. However, summing over the action of all the ${\hat V}_{\triangle_I}$ on $h_e$ only yields a sum over states of the type $h_{{\bar e}(\triangle_I)}$. In order to obtain the desired result, $h_{{\bar e}({\vec N}, \delta )}$, the sum over $\triangle$ is first converted to a [*product*]{} over $\triangle$ i.e. to leading order in $\delta$, we show that $$1+ i\delta\sum_{\triangle} V_{\triangle} \sim \prod_{\triangle}(1+ i\delta V_{\triangle}).$$ Hence, replacing the sum over the corresponding operators by the product provides an equally legitimate definition of ${\hat V}_{T(\delta )}$. The replacement then leads, modulo some details, to the following identity $$\prod_{\triangle}(1+ i\delta {\hat V}_{\triangle})h_e = \prod_{I=1}^{N-1} (1+ i\delta V_{\triangle_I})h_e .$$ Our definition of ${\hat V}_{\triangle_I}$ is such that each factor in the product acts independently, the $I$th factor acting only on the part of $e$ between $v_I$ and $v_{I+1}$. We are then able to show that the result (\[bare\]) follows essentially through the mechanism which is illlustrated schematically in Fig 1e.[^3] ![image](figuree.eps) Fig-1e To summarise, we obtain the desired result (\[desired\]) through the sequence:\ Fig 1d$\rightarrow$Fig 1e$\rightarrow$Fig 1c. We now turn to a description of the layout of the paper. Sections \[III\] to \[VI\] are devoted to the case wherein the state is a (non gauge invariant) single edge spin network corresponding to an edge holonomy. In section \[III\] we describe our choice of triangulation. In section \[IV\] we replace the finite triangulation in its natural form of a sum of over cells by a product over cells as advocated above and detail our choice of operator ordering of the product. Some associated technicalities are dealt with in appendix \[A1\]. In section \[V\] we construct finite triangulation approximants $V_{\triangle_I}$ from approximants to the curvature and triad. Section 5.1 is devoted to the spin half case and section 5.2 to the higher spin case. Sections 5.1 and 5.2 furnish us with the key new results of this work: namely the approximants to the curvature terms. The treatement of the Gauss Law term ${\hat{\cal G}}_{T(\delta )}$ is relegated to the appendix \[A2\]. Since our main focus is on the curvature, our treatment of the Gauss Law terms is slightly heuristic. In section \[VI\] we put all the pieces together and obtain the desired expression (\[final\]) for the diffeomorphism constraint operator. Section \[VII\] generalises the analysis of sections 3- 6 to the case of a general spin network. Section 8 shows that the expression (\[final\]) yields an anomaly free representation of the diffeomorphism constraints on the Lewandowski- Marolf habitat. Section 9 is devoted to a discussion of our results. Triangulation adapted to an edge $e$ {#III} ==================================== Let $\Sigma$ be a real analytic, and compact (without boundary) oriented 3-manifold. Let $e$ be a closed, oriented, non-self intersecting, real analytic edge. Let $e$ be small enough that there exists an open neighbourhood ${\cal U}_{e}$ of $e$ with analytic chart $(x, y, z)$ such that the co-ordinate $x$ runs along $e$. [^4] Let $\vec{N}$ be a real analytic vector field with affine parameter $\lambda$ so that $N^{a}\ =\ (\frac{\partial}{\partial\lambda})^{a}$. Let $\phi(\vec{N}, \delta)$ be the one parameter family of diffeomorphisms generated by $\vec{N}$ which translates any point in $\Sigma$ along an integral curve of $\vec{N}$ through affine length $\triangle\lambda\ =\ \delta$. Let $\delta$ be small enough that $\phi(\vec{N},\delta)\circ e\ \subset\ {\cal U}_{e}$.\ Let $t_{e}$ be a triangulation of $e$ with 1-cells of co-ordinate length $\delta$. Let the vertices of $t_{e}$ be $v_{I}$ , $I=1,...,n$ with $v_{1}$ and $v_{N}$ being the beginning and end points of $e$ respectively. Let $T$ be a triangulation of $\Sigma$ such that $t_{e}\subset\ T$ so that $v_{I}$ are vertices of $T$. Let $T^{*}$ be a dual of $T$, such that each $v_{I}$ is in the interior of a 3-cell $\triangle_{I}$ of $T^{*}$. Let the 3-cells $\triangle_{I}$ be cuboids of co-ordinate lengths ($\delta,\delta_{1},\delta_{2}$) along the ($x,y,z,$) directions, with $\delta_{1},\delta_{2}\ \ll\ \delta$. We shall further require that $T^*$ be such that each vertex $v_I$ of $t_e$ be at the centroid (in the cordinates $(x,y,z)$) of the 3- cell $\triangle_{I}$. Let $T^*_e$ be the restriction of $T^*$ to $\cup_I \triangle_I$ i.e. $$\nonumber\\ T^{*}_{e}\ :=\ T^{*}\vert_{\cup_{I}\triangle_{I}}$$ Next, let $\omega$ be a (smooth) three form on $\Sigma$. We restrict $T^*$ to be such that every cell of $T^*$ which does not intersect $e$ has equal volume $v= \delta\delta_1\delta_2$ i.e. $$v\ =\ \int_{\triangle \notin T^*_e}\omega\ =\ \delta\delta_{1}\delta_{2} \label{vol=v}$$ Note that by virtue of the smoothness of $\omega$, the analyticity of the chart $(x,y,z)$ and the compactness of $T^*_e \subset \Sigma$, we have that $$\int_{\triangle_I}\omega < Dv, \label{triangleibound}$$ for some constant $D$ which is independent of $\delta, \delta_1,\delta_2, I$. Finite Triangulation Constraint:Sum to Product Reformulation {#IV} ============================================================ In section 4.1 we recall the form of the continuum constraint and quantify the sense in which continuum quantities are approximated by finite triangulation ones. The diffeomorphism constraint at finite triangulation appears naturally as a sum over cell contributions. We recast this sum as a product over 3- cells of the triangulation in section 4.2 [^5] and specify the ordering of the corresponding operator product in section 4.3. Preliminaries ------------- The phase space of General relativity can be co-ordinatized with the (real) Ashtekar variables $(A_{a}^{i}, \tilde{E}^{b}_{j})$ with The Poisson bracket between the Ashtekar- Barbero connection $A_a^i$ and its conjugate densitized triad $\tilde{E}^{b}_{j})$ is $$\{A_{a}^{i}(x), \tilde{E}^{b}_{j}\}\ =\ (\gamma G)\delta^{3}(x,y)\delta_{a}^{b}\delta_{j}^{i}$$ where $\gamma$ is the Barbero- Immirzi parameter. The diffeomorphism constraint is: $$\begin{array}{lll} { D}[\vec{N}]\ =\ \frac{1}{\gamma G}\int_{\Sigma} ({\cal L}_{\vec{N}}A_{a}^{i})\tilde{E}^{a}_{i} \\ \vspace*{0.1in} \hspace*{0.5in}=\ \frac{1}{\gamma G}\int_{\Sigma} N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\ -\ \frac{1}{\gamma G}\int_{\Sigma} (N^aA_a^{i}){\cal D}_{b}\tilde{E}^{b}_{i}\\ \vspace*{0.1in} \hspace*{0.5in}=\ \frac{1}{\gamma G}\{V[\vec{N}]\ -\ {\cal G}[ N^{i}]\} \end{array} \label{d=v+g}$$ where $V[\vec{N}]$ is the vector constraint smeared with shift $N^a$ and ${\cal G}[N^i]$ is the Gauss-constraint smeared with the connection dependent, $SU(2)$ Lie algebra valued Lagranage multiplier $N^i:=N^aA_a^i$. In section 4.2 we shall approximate the continuum quantities defined above by quantities associated with the triangulation defined in section 3. The error terms in the approximation vanish in the continuum limit of infinitely fine triangulation and hence are specified in terms of orders of the small parameters $\delta, \delta_1, \delta_2$ which measure the fineness of the triangulation. We shall use $X = X_T + O(\epsilon )$ to signify that $\lim_{\epsilon\rightarrow 0} \frac{|X- X_T|}{\epsilon}$ exists. If there is an additional parameter or index $p$ on which $X, X_T$ depend with $X(p)= X_T(p) + O(\epsilon)$, we shall say that $O(\epsilon )$ is independent of $p$ iff there exists a positive constant $C$ which is independent of $p,\epsilon$ such that for small enough $\epsilon$ we have that $$\frac{|X(p)- X_T(p)|}{\epsilon} < C \label{orderindepp}$$ We shall think of $\delta, \delta_1, \delta_2$ as independent parameters subject to $\delta_1,\delta_2 << \delta$ so that, for example, a quantity of order $O (\delta_1)$ is also of order $O(\delta )$. We shall often use $v=\delta \delta_1\delta_2$ as a small parameter and its order is defined in terms of the primary parameters $\delta, \delta_1,\delta_2$. Note that if the length of the edge $e$ in the coordinate $x$ is $L$, we have that $$\sum_{I=1}^{N-1} \delta = L \label{eq:0.1}$$ Product form of the classical constraint ---------------------------------------- The vector constraint can be written as the following sum over cell contributions: $$\label{ap8-1} V[\vec{N}]\ =\ \sum_{I=1}^{N}\int_{\triangle_{I}}N^{a}F_{ax}^{i}\tilde{E}^{x}_{i}\ +\ \sum_{I=1}^{N}\sum_{\hat{b}=y,z}\int_{\triangle_{I}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i} + \sum_{\triangle\notin T^{*}_{e}}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}$$ Next, let $V_{\triangle_{I}}^{(e)}$ be some function on the phase space such that $$\label{0} |V_{\triangle_{I}}^{(e)} -\int_{\triangle_{I}}N^{a}F_{ax}^{i}\tilde{E}^{x}_{i}| < E\delta v \label{vtrianglei}$$ with $E$ being a postive number independent of $\delta,\delta_1,\delta_2 , I$. Using equations (\[eq:0.1\]),(\[vtrianglei\]) in equation (\[ap8-1\]), we have that $$V[\vec{N}]\ =\ \sum_{I}V_{\triangle_{I}}^{(e)} + \sum_{I}\sum_{\hat{b}=y,z}\int_{\triangle_{I}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i} + \sum_{\triangle\notin T^{*}_{e}}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\ +\ \textrm{O}(\delta)$$ Using the mechanism outlined in Footnote \[f41\], and as shown in detail in Appendix \[A1\], we recast the ‘sum’ form of $V[\vec{N}]$ into the ‘product’ form: $$\label{eq:ap3-2} \begin{array}{lll} V[\vec{N}]\ =\\ \vspace*{0.1in} \hspace*{0.3in} \frac{-il_{p}^{2}\gamma}{\delta}\left\{\left[\prod_{I}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}V_{\triangle_{I}}^{(e)}\right)\right]\left[\prod_{I}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\int_{\triangle_{I}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}\right)\right]\right.\\ \vspace*{0.1in} \hspace*{1.0in}\left.\left[\prod_{\triangle\notin T^{*}_{e}}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\right)\right]\ - 1\right\} + \textrm{O}(\delta) \end{array}$$ Equation (\[eq:ap3-2\]) implies that the finite triangulation approximant $V_{T}[\vec{N}]$ to $V[\vec{N}]$ can be chosen as: $$\label{1} \begin{array}{lll} V_{T}[\vec{N}]\ =\\ \vspace*{0.1in} \hspace*{0.3in} \frac{-il_{p}^{2}\gamma}{\delta}\left\{\left[\prod_{I}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}V_{\triangle_{I}}^{(e)}\right)\right]\left[\prod_{I}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\int_{\triangle_{I}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}\right)\right]\right.\\ \vspace*{0.1in} \hspace*{1.0in}\left.\left[\prod_{\triangle\notin T^{*}_{e}}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\right)\right]\ - 1\right\} \end{array} \label{defvtprod}$$ The appearance of $l_{p}$ in a classical expression might seem unnatural. However, note that the continuum limit $\delta\rightarrow 0$ is distinct from the limit $\hbar\rightarrow 0$. Equation (\[defvtprod\]) reproduces the continuum classical function $V({\vec N})$ in the continuum limit while keeping $\hbar$ (and, hence, $l_P$,) fixed. Next, note that the diffeomorphism constraint of equation (\[d=v+g\]) can be rewritten as the following product: $${D}[\vec{N}]\ =\ \frac{-i\hbar}{\delta}\left\{\left[1 - \frac{\delta{\cal G}[N^{i}]}{-il_{p}^{2}\gamma}\right]\left[1 + \frac{\delta V[\vec{N}]}{-il_{p}^{2}\gamma}\right]\ -\ 1\right\} + \textrm{O}(\delta)$$ From equation (\[defvtprod\]), it follows that the finite triangulation approximant to the diffeomorphism constraint, $D_T({\vec N})$ can be chosen as: $$\label{eq:ap3-1} { D}_{T}[\vec{N}]\ =\ \frac{-i\hbar}{\delta}\left\{\left[1-\frac{\delta}{-il_{p}^{2}\gamma}{\cal G}_{T}[N^{i}]\right]\left[1 + \frac{\delta V_{T}[\vec{N}]}{-il_{p}^{2}\gamma}\right]-1\right\}$$ where ${\cal G}_T$ is some finite triangulation approximant to ${\cal G}$. Operator ordering in quantum theory ----------------------------------- We define the operator, ${\hat D}_T({\vec N})$, corresponding to the approximant ${ D}_T({\vec N})$ of equation (\[eq:ap3-1\]) through the following operator ordering prescription:\ (i) Order the vector constraint piece to the right of the Gauss constraint piece as in (\[eq:ap3-1\]).\ (ii) Retain the order of the cell contributions in the product form of the vector constraint at finite triangulation as written in the classical expression (\[eq:ap3-2\]).\ [(iii)]{} Order the densitized triad operators to the right in each of the operators corresponding to the cell contributions $\int_{\triangle_{I}}{N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}}$ , $\int_{\triangle\notin T^{*}_{e}}N^{a}{F_{ab}^{i}\tilde{E}^{b}_{i}}$.\ The ordering (iii) ensures that both sets of operators discussed in (iii) annihilate the state $h_e$. More in detail, since $e$ is in the x-direction, terms containing $\hat{E}^{\hat{b}}_{i}$ do not contribute and since $\triangle\cap e = \phi$ $\forall\ \triangle\ \notin T^{*}_{e}$, we have that $\int_{\triangle} N^{a}\widehat{F_{ab}^{i}E^{b}_{i}}h_{e}\ =\ 0$. The ordering (i) and (ii) then yield the operator action $$\label{eq:ap3-3} \begin{array}{lll} \hat{{ D}}_{T}[\vec{N}]h_{e}\ =\\ \vspace*{0.1in} \hspace*{0.5in}\frac{-i\hbar}{\delta}\left\{\left[1-\frac{\delta}{-il_{p}^{2}\delta}\hat{{\cal G}}_{T}[N^{i}]\right]\left[\prod_{I}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\hat{V}_{\triangle_{I}}^{(e)}\right)\right] - 1\right\}h_{e} \end{array}$$ Equation (\[eq:ap3-3\]) can be re-written as $$\label{eq:ap3-4} \begin{array}{lll} 1\ +\ \frac{\delta}{-i\hbar}\hat{{ D}}_{T}[\vec{N}]h_{e}=\\ \vspace*{0.1in} \hspace*{0.6in} \left[1 - \frac{\delta}{-il_{p}^{2}\gamma}\hat{{\cal G}}_{T}[N^{i}]\right]\left[\prod_{I}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\hat{V}_{\triangle_{I}}^{(e)}\right)\right]h_{e} \end{array}$$ As shown in appendix \[A2\], $$\left[1 - \frac{\delta}{-il_{p}^{2}}\hat{{\cal G}}_{T}[N^{i}]\right]\ =\ \hat{{\cal U}}^{SU(2)}_{(N^{i},\delta)} \label{gtusu2}$$ where $\hat{{\cal U}}^{SU(2)}_{(N^{i},\delta)}$ is the operator corresponding to the finite $SU(2)$ (connection dependent) gauge transformation specified through the operator action $$\hat{{\cal U}}^{SU(2)}_{(N^{i},\delta)} h_{e}\ =\ h_{s_{0}}^{-1}\cdot h_{e}\cdot h_{s_{1}}$$ with $s_{0}$, $s_{1}$ being integral curves of $\vec{N}$ of parameter length $\delta$ at the beginning,final points of $e$ as detailed in appendix \[A2\]. Equations (\[eq:ap3-4\]) and (\[gtusu2\]) imply that the action of the finite triangulation diffeomorphism constraint operator on a single edge holonomy is given by $$\label{eq:3} \left(1 + \frac{\delta}{-i\hbar}\hat{ D}_{T}[\vec{N}]\right)h_{e}\ =\ \hat{{\cal U}}^{SU(2)}_{(N^{i},\delta)}\left[\prod_{I}\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\hat{V}_{\triangle_{I}}^{(e)}\right)\right]h_{e}$$ In the next section we construct ${V}_{\triangle_{I}}^{(e)}$ and its operator correspondent, $\hat{V}_{\triangle_{I}}^{(e)}$. Curvature approximants {#V} ====================== In this section we cosntruct cell- approximants to $N^{a}F_{ax}^{i}$ and $\tilde{E}^{x}_{i}$ in terms of the basic holonomy- flux variables. The approximant ${V}_{\triangle_{I}}^{(e)}$ is built out of these approximants and the operator $\hat{V}_{\triangle_{I}}^{(e)}$ is defined by replacing the holonomy- flux variables in ${V}_{\triangle_{I}}^{(e)}$ so constructed by their operator correspondents. Recall that each vertex, $v_I$, of $t_e$ is located at the centre of the cell ${\triangle}_I$. It follows that the rightmost face of $\triangle_{I}$ intersects $e$ at a point which is $\frac{\delta}{2}$ to the right of $v_I$. [^6] Let us call this face $S^{x}_{I}$ (this face is in the y-z plane by construction). We approximate $\tilde{E}^{x}_{i}$ within $\triangle_{I}$ by, $$\label{eq:1} \begin{array}{lll} \tilde{E}^{x}_{i}\ \approx\ \frac{\int_{S^{x}_{I}}\tilde{E}^{x}_{i}dy dz}{\int_{S^{x}_{I}}dy dz}\\ \vspace*{0.1in} \hspace*{0.4in} = \frac{\int_{S^{x}_{I}}\tilde{E}^{x}_{i}dy dz}{\delta_{1}\delta_{2}}\\ \vspace*{0.1in} \hspace*{0.1in} :=\ \frac{E_{i}(S^{x}_{I})}{\delta_{1}\delta_{2}} \end{array}$$ where $E_{i}(S^{x}_{I})$ is the electric flux through $S^{x}_{I}$. By virtue of the compactness of $T^*_e\subset\Sigma$ and the smoothness of $\tilde{E}^{x}_{i}$ it follows that $$\label{eq:ap4-1} \tilde{E}^{x}_{i}({\vec x})\ =\ \frac{E_{i}(S^{x}_{I})}{\delta_{1}\delta_{2}}\ + {O}(\delta)$$ $\forall\ {\vec x}\equiv (x,y,z)\ \in\ \triangle_{I}$ with the $O(\delta )$ term independent of $I,{\vec x}$ (see the discussion around equation (\[orderindepp\])). In sections (\[V.1\]) and (\[V.2\]) below we construct discrete approximants $(N^{a}F_{ax}^{i})_{I}$ to $N^{a}F_{ax}^{i}$. i.e. $$\label{eq:ap4-2} N^{a}F_{ax}^{i}({\vec x})\ =\ (N^{a}F_{ax}^{i})_{I}\ +\ {O}(\delta)$$ $\forall\ {\vec x}\equiv (x,y,z)\ \in\ \triangle_{I}$ with, as above, the $O(\delta )$ term independent of $I,{\vec x}$. Using (\[eq:ap4-1\]), (\[eq:ap4-2\]) we have, $$\label{ap6-1} \int_{\triangle_{I}}N^{a}F_{ax}^{i}({\vec x})\tilde{E}^{x}_{i} d^{3}x\ =\ (N^{a}F_{ax}^{i})_{I}\ E_{i}(S^{x}_{I})\ \frac{v}{\delta_{1}\delta_{2}}\ +\ {O}(\delta v)$$ with ${O}(\delta v)$ independent of $I$. In conjuction with (\[0\]) and the fact that $v = \delta\delta_{1}\delta_{2}$ the above equation implies that we may choose $V_{\triangle_{I}}^{(e)}$ as $$\label{2} V_{\triangle_{I}}^{(e)}\ =\ (N^{a}F_{ax}^{i})_{I}E_{i}(S^{x}_{I})\delta$$ We shall order the flux operator to the right (as in the classical expression above) in the quantum theory. Since $S^{x}_{N}\cap e =\empty$, it follows that $${\hat V}_{\triangle_{N}}^{(e)}h_e=0 \label{rightmostdualface}$$ so that we may drop the rightmost $I=N$ factor in equation (\[eq:3\]). Next, note that since $\vec{N}$ is real analytic and $(x,y,z)$ is an analytic chart, it follows that either $N^{y},\ N^{z}$ both vanish at finitely many points on $e$ or $\vec{N}$ is along $e$. When $\vec{N}$ is along $e$, we have $(N^{a}F_{ax}^{i})_{I}\ :=\ (N^{x}F_{xx}^{i})_{I}\ =\ 0$ $\forall\ I$.\ It follows from (\[eq:3\]) that in this case we only have the Gauss constraint term, which from the corollary in appendix \[A2\], yields the desired action (\[final\]). Hence it suffices to consider the case where $\vec{N}$ is transversal to $e$ except at finitely many points. Furthermore from the analysis of Section (\[VII\]), it follows that, without loss of generality, we can always choose the edge $e$ small enough so that $\vec{N}$ is transversal to $e$ everywhere except perhaps at it’s end points. With the above restrictions on the edge $e$ and shift $\vec{N}$, we construct $V_{\triangle_{I}}^{(e)}$ for a state which is a $j=\frac{1}{2}$ edge holonomy in section 5.1 and for a $j >\frac{1}{2}$ edge holonomy in section 5.2. In both cases we show that $\hat{V}_{\triangle_{I}}^{(e)}$ acts in accordance with Figure 1d of section 2. The $j=\frac{1}{2}$ case {#V.1} ------------------------ As is usually done, we shall approximate the curvature term $N^{a}F_{ax}^{i}$ to leading order in $\delta$ by a small loop holonomy. However, as we shall see, in order to obtain the desired action of $\hat{V}_{\triangle_{I}}^{e}$ , the small loop holonomy will be augmented by terms which are higher order in $\delta$. Since we seek an approximant to the curvature in each cell $\triangle_I$, we shall associate a small loop $\gamma_{I}$ to each cell $\triangle_{I}\in T^*_{e}$ as follows. Let the part of the edge $e$ between (and including) the vertices $v_I, v_{I+1}$ be $e_I$. Let the image of $e_{I}$ under the small diffeomorphism $\phi_{\vec{N}, \delta}$ be $\phi_{\vec{N},\delta}\circ e_{I}$ with endpoints $\phi_{\vec{N},\delta}\circ v_{I}$ and $\phi_{\vec{N},\delta}\circ v_{I+1}$. Let the oriented segment between $v_{I}$ and $\phi_{\vec{N},\delta}\circ v_{I}$ be $s_{I}$, where the orientation is given by the direction of the vector field $\vec{N}$. Let the surface $S^x_I$ intersect $e_I$ at the point $v$. From our choice of triangulation as detailed in section 3, it follows that the point $v$ is at the midpoint (as defined by the $x$ coordinate) of $e_I$. Let $\overline{e}_{I}\ :=\ s_{I}\circ (\phi_{\vec{N},\delta}\circ e_{I})\circ s_{I+1}^{-1}$. Let the segment along $e$ connecting any two points $v^{'}$ with $v^{''}$ which lie in $e$ be $e_{v^{'},v^{''}}$.[^7] The loop $\gamma_{I}$ is then defined as $$\label{3} \gamma_{I}\ =\ e_{{v},v_{I}}\circ \overline{e}_{I}\circ e_{v_{I+1},{v}}$$ We define the curvature approximant $(N^{a}F_{ax}^{i})_{I}$ associated to the cube $\triangle_{I}$ as $$\label{eq:(4)} (N^{a}F_{ax}^{i})_{I}\ :=\ \frac{1}{\delta^{2}}\{\ -Tr(h_{\gamma_{I}}\cdot \tau_{i})\ -\ \frac{2i}{3}Tr(h_{\gamma_{I}}-1)\frac{E_{i}(S_{I}^{x})}{\gamma l_{p}^{2}}\}$$ Here Tr is trace in the fundamental representation. and $\tau_{i}\ =\ -i\sigma_{i}$, $\sigma_i, i=1,2,3$ being the Pauli matrices. As shown in appendix \[A3\], the first term reproduces $N^{a}F_{ax}^{i}$ up to terms of $O(\delta)$. The second term is easily seen to be of higher order in $\delta$ because $Tr(h_{\gamma_{I}} - 1)\ \sim\ O(\delta^{3})$, and $E_{i}(S_{I}^{x})\ \sim\ O(\delta_{1}\delta_{2})$. Thus equation (\[eq:(4)\]) is a legitimate approximant to $N^aF_{ax}^i$. Nevertheless, its construction has two striking features:\ [(i)]{} The role of the shift, which is a Lagrange multiplier ,in the construction of the small loop underlying the holonomy: The traditional choice in LQG would be to construct small loops $\gamma_{ax}, a=y,z$ in the $a-x$ plane whose size was independent of $N^a$ and have $N^a(v)$ appear as a multiplicative factor. Here, both the direction and [*the magnitude*]{} of $N^a$ are used in the construction of $\gamma_I$.\ (ii) The unexpected electric flux dependence of an approximant to a purely connection dependent continuum quantity: The traditional curvature approximant would only have the first term of equation (\[eq:(4)\]) (modulo the comment (i) above). Moreover the second term blows up in the limit $\hbar\rightarrow 0$. Hence, as emphasized before, it is imperative to take the continuum limit while keeping $\hbar$ fixed. While the $l_P^{-2}$ dependence disappears in the continuum limit of the approximant to the classical curvature, it is conceivable that such a dependence remains in the quantum theory (for a composite operator depending on the curvature) even after taking the continuum limit. If so, such factors, could concievably be the seeds of non-perturbative quantum effects.\ From (\[2\]) and (\[eq:(4)\]), we obtain $$V_{\triangle_{I}}^{(e)}\ =\ \frac{-1}{\delta}\{ Tr(h_{\gamma_{I}}\tau^{i})\ +\ \frac{2i}{3}\frac{Tr(h_{\gamma_{I}}-1)E^{i}(S^{x}_{I})}{l_{p}^{2}\gamma} \}E^{i}(S^{x}_{I})$$ Next, we evaluate the action of the corresponding quantum operator $\hat{V}_{\triangle_{I}}^{(e)}$ on a gauge-variant spin network defined by a single edge $e$ and $j=\frac{1}{2}$. Note that $$h_{eA}^{\;\;\;\;B}\ =\ (h_{e_{v_1,v_{I}}}\cdot h_{e_{I}}\cdot h_{e_{v_{I+1},v_N}})_{A}^{\;\;\;\;B}$$ where $A,B$ are spinor indices ranging from 1 to 2. Since ${v}\in e_{I}$, $\hat{E}^{i}(S_{I}^{x})$ acts only on the $h_{e_I}$ part of the state [@areaoprtr] and we get $$\hat{E}^{i}(S_{I}^{x})h_{eA}^{\;\;\;B}\ =\ (h_{e_{v_1,v_{I}}})_{A}^{\;\;\;\;C}\left(\frac{-i l_{p}^{2}\gamma}{2} (h_{e_{v_{I},v}})_{C}^{\;\;\;\;E}\tau_{i E}^{\;\;\;\;F}(h_{e_{v, v_{I+1}}})_{F}^{\;\;\;\;D} (h_{e_{v_{I+1},v_N}})_{D}^{\;\;\;\;B} \right)$$ Whence, $$\label{eq:mar19-1} \begin{array}{lll} [(\textrm{Tr}\ \hat{h}_{\gamma_{I}}\tau^{i})\hat{E}^{i}(S^{x}_{I})]h_{eA}^{\;\;\;B}\ =\\ \vspace*{0.1in} \hspace*{0.3in} (h_{e_{v_1,v_{I}}})_{A}^{\;\;\;\;C}\left(\frac{-i l_{p}^{2}\gamma}{2} (\ h_{\gamma_{I}M}^{\;\;\;\;N} (h_{e_{v_{I},v}})_{C}^{\;\;\;\;E}\tau_{i N}^{\;\;\;\;M} \tau_{i E}^{\;\;\;\;F}(h_{e_{v, v_{I+1}}})_{F}^{\;\;\;\;D}\right) (h_{e_{v_{I+1},v_N}})_{D}^{\;\;\;\;B} \end{array}$$ Using the spinor identity: $$\sum_{i}\ \tau_{i A}^{\;\;\;\;B}\ \tau_{i M}^{\;\;\;\;N}\ =\ [\delta_{A}^{\;\;\;\;B}\delta_{M}^{\;\;\;\;N}\ -\ 2\delta_{A}^{\;\;\;\;N}\delta_{B}^{\;\;\;\;M}], \label{spinorid}$$ it is easy to see that (\[eq:mar19-1\]) can be simplified to: $$\label{eq:mar19-2} \begin{array}{lll} (\textrm{Tr}\ \hat{h}_{\gamma_{I}}\tau^{i})\hat{E}^{i}(S^{x}_{I})h_{eA}^{\;\;\;\;B}\ =\\ \vspace*{0.1in} \hspace*{0.3in} \frac{-il_{p}^{2}\gamma}{2}\left(-2\ (h_{e_{v_1,v_{I}}}\circ h_{\overline{e}_{I}}\circ h_{e_{v_{I+1}},v_N})_{A}^{\;\;\;\;B}\ +\ (\textrm{Tr}\ h_{\gamma_{I}})h_{e A}^{\;\;\;\;B}\right)\\ \end{array}$$ From (\[eq:mar19-1\]), (\[spinorid\]) we also have that $$\label{eq:mar19-3} \hat{E}^{i}(S_{x}^{I})\hat{E}^{i}(S_{x}^{I})h_{e A}^{\;\;\;\;B}\ =\ (-il_{p}^{2}\gamma)^{2}(\frac{-3}{4})h_{e A}^{\;\;\;\;B}$$ Using (\[eq:mar19-2\]) and (\[eq:mar19-3\]), we obtain $$\label{eq:mar19-4} \hat{V}_{\triangle_{I}}^{(e)}h_{e A}^{\;\;\;\;B}\ =\ \frac{(-il_{p}^{2}\gamma)}{\delta}\left((h_{e_{v_1,v_{I}}}\circ h_{\overline{e}_{I}}\circ h_{e_{v_{I+1}},v_N})_{A}^{\;\;\;\;B}\ -\ h_{e A}^{\;\;\;\;B}\right).$$ Whence, $$[\ 1+\frac{\delta}{(-il_{p}^{2}\gamma)}\hat{V}_{\triangle_{I}}^{(e)}\ ]h_{e A}^{\;\;\;\;B}\ =\ h_{\overline{e}_{\triangle_{I}} A}^{\;\;\;\;\:\:B}$$ where $\overline{e}_{\triangle_{I}}$ is $e_{v_1,v_{I}}\circ \overline{e}_{I}\circ e_{v_{I+1},v_N}$. This is the desired result (see equation (9) of section 2).\ For future purposes, we note the following. Since $\hat{E}^{i}(S^{x}_{I})$ acts non-trivially only on $e_{I}\subset\ e$ it follows that, $$\label{eq:mar19-5} [\ 1\ +\ \frac{\delta}{(-il_{p}^{2}\gamma)}\hat{V}_{\triangle_{I}}^{(e)}\ ]h_{e_{I} A}^{\;\;\;\;\;B}\ =\ h_{\overline{e}_{I} A}^{\;\;\;\;\;B}$$ Defining, $$\label{eq:mar25-4} \begin{array}{lll} \hat{f}_{1 I}^{i}\ =\ -(\textrm{Tr}\ h_{\gamma_{I}}\tau^{i})\\ \vspace*{0.1in} \hat{f}_{2 I}\ =\ -\frac{1}{2i}(\textrm{Tr}\ h_{\gamma_{I}} -1), \end{array}$$ equation (\[eq:mar19-5\]) can be rewritten as $$\label{eq:mar25-1} \left[ 1 + \frac{\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})}{(-i\gamma l_{p}^{2})}\ +\ \frac{\hat{f}_{2 I}\cdot\hat{E}(S^{x}_{I})\cdot\hat{E}(S_{I}^{x})}{\frac{3}{4}(-i\gamma l_{p}^{2})^{2}}\right]h_{e_{I} A}^{\;\;\;\;B}\ =\ h_{\overline{e}_{I} A}^{\;\;\;\;\;B}$$ where we have used the notation $f\cdot g$ for $f_{i}g^{i}$.[^8] The $j>\frac{1}{2}$ case {#V.2} ------------------------ Let $\pi_{j}[h_{e}]_{\alpha}^{\;\;\;\;\beta}$ be the holonomy along edge $e$ in spin-j representation so that $\alpha,\ \beta = \{1,...,2j+1 \}$. Since the spin $j$ represenatation can be constructed as the symmetrized product of $n=2j$ copies of the fundamental representation, we have that $$\label{mar25-11} \pi_{j}[h_{e}]_{\alpha}^{\;\;\;\;\beta}\ =\ {\cal I}_{\alpha\ D_{1}...D_{N}}^{\beta C_{1}...C_{N}}h_{e C_{1}}^{\;\;\;\;D_{1}}...h_{e C_{N}}^{\;\;\;\;D_{N}}$$ where the intertwining tensor ${\cal I}$ is symmetric under interchange of any of the $D$ indices (and hence also symmetric in the $C$ indices). Our strategy for constructing the curvature approximant to $N^{a}F_{ax}^{i}$ is to first construct an operator $\hat{V}_{\triangle_{I}}^{(e)}$ such that $$\label{eq:11.6} (1 + \frac{\delta}{-i\gamma l_{p}^{2}} \hat{V}_{\triangle_{I}}^{(e)})\pi_{j}[h_{e_{I}}]_{\alpha}^{\;\;\;\;\beta}\ =\ \pi_{j}[h_{\overline{e}_{I}}]_{\alpha}^{\;\;\;\;\beta},$$ read off the expression for $\widehat{N^{a}F_{ax}^{i}}_I$ from that for $\hat{V}_{\triangle_{I}}^{(e)}$ using equation (\[2\]) and show that the resulting expression is actually the operator correspondent of an approximant to ${N^{a}F_{ax}^{i}}_I$. Two key observations which help us construct $\hat{V}_{\triangle_{I}}^{(e)}$ are as follows.\ [(1)]{} For sufficiently small $\delta_{1},\delta_{2}<<\delta$, it is easy to see that $S^{x}_{I}\cap {\bar e}_I= \empty$. $$\label{eq:key1} \hat{E}^{i}(S^{x}_{I}) h_{\overline{e}_{I}}\ =\ 0.\\$$ [(2)]{} Since $\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})$ is proportional to the Laplacian $\hat{J}^{2}$ on SU(2), we have $$\label{eq:key2} \frac{\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})}{(-i\gamma l_{p}^{2})^{2}}\pi_{k}[h_{e_{I}}]\ =\ k(k+1)\pi_{k}[h_{e_{I}}]$$\ Using the Leibnitz rule and the symmetry properties of ${\cal I}$ in (\[mar25-11\]) we have that $$\label{eq:mar25-3} \hat{E}^{i}(S_{x}^{I})\pi_{j}[h_{e}]_{\alpha}^{\;\;\;\;\beta}\ =\ n{\cal I}_{\alpha\ D_{1}...D_{n}}^{\beta C_{1}...C_{n}} \left((\hat{E}^{i}(S^{x}_{I})h_{C_{1}}^{\;\;\;\;D_{1}})h_{C_{2}}^{\;\;\;\;D_{2}}...h_{C_{n}}^{\;\;\;\;D_{n}}\right)$$ Next, using equations (\[eq:mar25-1\]), (\[eq:mar25-4\]), (\[eq:key2\]) and (\[eq:mar25-3\]) it is straightforward to show that $$\left(1 + \frac{\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})}{n(-il_{p}^{2}\gamma)} + \frac{\hat{f}_{2 I}\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})}{(-il_{p}^{2}\gamma)^{2}\frac{n}{2}(\frac{n}{2}+1)}\right)\pi_{j}[h_{e_{I}}]_{\alpha}^{\;\;\;\;\beta}\ =\ {\cal I}_{\alpha\ D_{1}...D_{n}}^{\beta C_{1}...C_{n}} \left( h_{\overline{e}_{I} C_{1}}^{\;\;\;\;D_{1}}h_{e_{I} C_{2}}^{\;\;\;\;D_{2}}...h_{e_{I} C_{n}}^{\;\;\;\;D_{n}} \right)$$ Using (\[eq:key1\]), the Leibnitz rule, the symmetry properties of ${\cal I}$, and equation (\[eq:key2\]) for $\frac{1}{2}\leq k < j$ we iterate the above procedure to obtain, $$\begin{array}{lll} \prod_{m=1}^{n}\left(1 + \frac{\hat{f}_{1 I}\cdot \hat{E}(S^{x}_{I})}{m(-i\gamma l_{p}^{2})} + \frac{\hat{f}_{2 I}\hat{E}(S^{x}_{I})\hat{E}(S^{x}_{I})}{(-i\gamma l_{p}^{2})^{2}\frac{m}{2}(\frac{m}{2} + 1)}\right)\pi_{j}[h_{e_{I}}]_{\alpha}^{\;\;\;\;\beta}\ =\\ \vspace*{0.1in} \hspace*{1.0in} {\cal I}_{\alpha\ D_{1}...D_{n}}^{\beta C_{1}...C_{n}}\left(h_{\overline{e}_{I} C_{1}}^{\;\;\;\;D_{1}}...h_{\overline{e}_{I} C_{n}}^{\;\;\;\;D_{n}}\right)\ =\ \pi_{j}[h_{\overline{e}_{I}}]_{\alpha}^{\;\;\;\;\beta} \end{array}$$ Whence, $\hat{V}_{\triangle_{I}}^{(e)}$ in (\[eq:11.6\]) is given by $$\label{eq:16} \delta\frac{\hat{V}_{\triangle_{I}}^{(e)}}{(-i\gamma l_{p}^{2})}\ =\ \prod_{m=1}^{n}\left(1 + \frac{\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})}{m(-il_{p}^{2}\gamma)} + \frac{\hat{f}_{2 I}\hat{E}(S^{x}_{I}\cdot\hat{E}(S^{x}_{I})}{(-il_{p}^{2}\gamma)^{2}\frac{m}{2}(\frac{m}{2}+1)}\right)\ -\ {\bf 1}$$ Expanding out the right hand side of (\[eq:16\]), it is straightforward to see that the “$-1$” term is cancelled by the “$\prod_{m=1}^n1$” term and that the remaining terms all have a factor of $\hat{E}(S^{x}_{I})$ to their right. Hence we may write equation (\[eq:16\]) in the form: $$\delta\frac{\hat{V}_{\triangle_{I}}^{(e)}}{(-i\gamma l_{p}^{2})} =: \hat{O}^{i}{\hat E}^{i}(S^{x}_{I})$$ It remains to show that ${O}^i$ is a legitimate curvature approximant i.e. that $$\label{eq:17} O^{i}\ \approx\ \delta^{2}\frac{N^{a}F_{ax}^{i}}{(-i\gamma l_{p}^{2})} .$$ A first analysis indicates that the (apparently) lowest order contribution (in $\delta$) to $O^i$ is the one which is independent of $E^{i}(S^{x}_{I})$ i.e. the lowest order contribution to $O^i$ seems to be $$\sum_{m=1}^{n}\frac{f_{1 I}^{i}}{(-i\gamma l_{p}^{2})m}\ =\ \frac{f_{1 I}^{i}}{(-i\gamma l_{p}^{2})}\sum_{m=1}^{n}\frac{1}{m}.$$ Since $\sum_{m=1}^{n}\frac{1}{m}\ >\ 1$ and since $\frac{f_{1 I}^{i}}{\delta^{2}}$ is a curvature approximant, it seems that $O^{i}$ is not a legitimate curvature approximant! The solution to this apparent problem lies in the factors of $(-i\gamma l_{p}^{2})^{-1}$ in $\hat{O}^{i}$ which allow us to trade higher order holonomy-flux products by lower order ones by means of appropriate operator ordering. To see this, note that: $$\label{eq:18} \frac{1}{(-il_{p}^{2}\gamma)}[\ \hat{E}(S^{x}_{I}), \hat{f}_{I 1}^{j}\ ]\ =\ \frac{1}{2}(\textrm{Tr}\ \hat{h}_{\gamma_{I}}\tau^{i}\tau^{j})$$ Viewed as a classical function, we have that $$\label{eq:19} \frac{1}{2}(\textrm{Tr}\ h_{\gamma_{I}}\tau^{i}\tau^{j})\ =\ -\delta^{ij}\ +\ O(\delta^{2}).$$ Thus, while an expression such as $\frac{\hat{f}_{I 1}\cdot \hat{E}(S^{x}_{I})\hat{f}_{I 1}^{j}}{(-il_{p}^{2}\gamma)}$ has the ‘naive’ classical correspondent $\frac{f_{I 1}\cdot E(S^{x}_{I})f_{1 I}^{j}}{(-i l_{p}^{2}\gamma)}$ which is of $O(\delta_1\delta_2\delta^4)$, we may use equation (\[eq:18\]) to obtain: $$\frac{\hat{f}_{I 1}\cdot \hat{E}(S^{x}_{I})\hat{f}_{I 1}^{j}}{(-il_{p}^{2}\gamma)}\ =\ \frac{1}{(-il_{p}^{2}\gamma)}\hat{f}_{1 I}^{i}f_{1 I}^{j}E^{i}(S^{x}_{I})\ -\ \frac{1}{2}\hat{f}_{1 I}^{i}Tr(\hat{h}_{\gamma_{I}}\tau^{i}\tau^{j}),$$ whose classical correspondent to leading order is seen to be $f_{1 I}^{i}\ \sim\ O(\delta^{2})$ through equation (\[eq:19\]). Hence the question is whether theres exists some operator ordering prescription with respect to which $\hat{O}^{i}$ may be identified with a finite triangulation approximant to the curvature term of interest. We show below that answer to this question is in the afformative. Our prescription is as follows: [(i)]{} Use the holonomy-flux commutation relation to move all the flux operators to the right.\ [(ii)]{} Replace the holonomy-flux opeators in the resulting expression by their classical counter-parts.\ [(iii)]{} Compute the leading order (in $\delta$) term in this expression. (From (\[eq:17\]) we expect the resulting expression to be $O(\delta^{2})$.) As stated above, $\hat{O}^{i}$ is defined through the equation $$\label{eq:20} \hat{O}^{i}\hat{E}^{i}(S^{x}_{I})\ =\ \left[ \prod_{m=1}^{n}\left(1 + \frac{\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})}{m(-i\gamma l_{p}^{2})} + \hat{f}_{2 I}\frac{\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})}{(-i\gamma l_{p}^{2})\frac{m}{2}(\frac{m}{2}+1)}\right)\right] - 1$$ Expanding the right hand side out yields an expression for ${\hat O}^i$ consisting of a sum of strings of holonomy and flux operators. We apply step (i) to each of these strings. Note that the commutator between a flux operator and any holonomy dependent term yields another holonomy dependent term. Hence the the classical correspondent of the commutator between a flux operator and any holonomy term is clearly at most of $O(1)$. This implies that any string with one or more flux operators located rightmost yields terms of $O(\delta_1\delta_2)$ ($\delta_1\delta_2$ being the area of the surface $S^{x}_{I}$). Choosing $\delta_1, \delta_2$ small enough, these terms are higher order than $\delta^2$ and hence may be ignored. Hence, the only strings of interest in $\hat{O}^{i}$ are those which which end in $\hat{f}_{1 I}^{i}$. We now show that even within this set of strings, strings which contain $\hat{f}_{2 I}\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})$ yield only higher order terms at the end of step (i). [**Lemma**]{} : Any string in $\hat{O}^{i}$ (when it is expanded out as a sum of various composite operators) which ends in $\hat{f}_{1 I}$, but contains $\hat{f}_{2 I}\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})$ is irrelevant.\ [**Proof**]{} :\ Note that $f_{2 I}$ is itself of O($\delta^{3}$). Hence $\hat{f}_{2 I}\hat{E}\cdot\hat{E}$ cannot be at the beginning of the string for an O($\delta^{2}$) contribution, as in that case no commutator can “eat up" the $f_{2 I}$ term and the string will be at most of O($\delta^{3}$). So consider the string of the type $[\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})]^{m}\hat{f}_{2 I}\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})[\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})]^{n}\hat{f}_{1 I}^{i}$. As there is a $\hat{f}_{1 I}$ at the beginning point of the string, rest of the factors should (at the end of step (i)) conspire to yield an O(1) term . However this is not possible as $$[\hat{f}_{2 I}, E^{j}(S^{x}_{I})]\ \alpha\ \textrm{Tr}(\hat{h}_{\gamma_{I}}\tau^{i})$$ and $Tr(h_{\gamma_{I}}\tau^{i})$ is of O($\delta^{2}$).\ Whence the operator string of the type $[\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})]^{m}\hat{f}_{2 I}\hat{E}(S^{x}_{I})\cdot\hat{E}(S^{x}_{I})[\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})]^{n}\hat{f}_{1 I}^{i}$ wil yield terms atmost of O($\delta^{4}$).\ q.e.d.\ We are now left only with strings which are of the form $(\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I}))^{n}\hat{f}_{1 I}^{i}$. It is important to note that due to the leftmost occurance of $\hat{f}_{1 I}^{i}$, such strings can atmost be of O($\delta^{2}$). Hence we are only interested in contributions from the remaining part of the string (except the left most $\hat{f}_{1 I}$) which give rise to terms of O(1) at the end of steps (i) and (ii). In particular if any terms at the end of step (i) have any flux operators at all, they will be of higher order. So we only seek contributions which, at the end of the application of step (i) to the strings of interest, are [*independent*]{} of the flux operators. We show below such contributions combine to yield a legitimate curvature approximant. The relevant strings are of the form $(\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I}))^{n}\hat{f}_{1 I}^{i}$ and can be read off by expanding (\[eq:20\]).[^9] It is straightforward to read off the co-efficients of each relevant string from (\[eq:20\]). $$\label{eq:mar28-1} \begin{array}{lll} c_{p}\ :=\ \textrm{Co-efficient of} \frac{(\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I}))^{p-1}\hat{f}_{1 I}^{i}}{(-i\gamma l_{p}^{2})}\\ \vspace*{0.1in} \hspace*{0.3in} = \sum_{m_{p}=p}^{n}\sum_{m_{p-1}=p-1}^{m_{p}-1}...\sum_{m_{2}}^{m_{3}-1}\sum_{m_{1}=1}^{m_{2}-1}\frac{1}{m_{p}...m_{1}}\\ \vspace*{0.1in} \hspace*{0.3in} =:\ \sum_{m_{p}>m_{p-1}>...>m_{1}}S_{m_{p}...m_{1}} \end{array}$$ Whence the sum of all the relevant strings (henceforth denoted as $\hat{T}$) is given by, $$\begin{array}{lll} \hat{T}\ =\ \sum_{p=1}^{n}c_{p}\left(\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I})\right)^{p-1}\hat{f}_{1 I}^{i}\\ \vspace*{0.1in} \hspace*{0.3in}\ =\ \sum_{p=1}^{n}\sum_{m_{p}>...>m_{1}}S_{m_{p}...m_{1}}(\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I}))^{p-1}\hat{f}_{1 I}^{i} \end{array}$$ Now we are in a position to apply steps (i), (ii) and (iii) to $\hat{T}$.\ Each string of the type $(\hat{f}_{1 I}\cdot\hat{E}(S^{x}_{I}))^{p}\hat{f}_{1 I}^{i}$ has $p$ intermediate factors of the type $\hat{E}^{j}(S^{x}_{I})\hat{f}_{1 I}^{k}$. As mentioned above, we are interested only in those terms which after step (i) have no factors of the flux operator. Clearly for each such string there is precisely 1 such term which is obtained by using the the commutator (\[eq:18\]) p times to remove all the flux operators.\ Now applying step (ii) amounts to using (\[eq:19\]) and ignoring the O($\delta^{2}$) term. This would mean that $\hat{T}$ transits to a classical quantity whose leading order part, $T$, is given by: $$\label{eq:21} \hat{T}\ =\ f_{1 I}^{i}\Big(\sum_{m=1}^{n}S_{m}\ -\ \sum_{m_{2}=1}^{n}\sum_{m_{1}=1}^{m_{2}}S_{m_{2},m_{1}}+...+\sum_{m_{n}>...>m_{1}}(-1)^{n-1}S_{m_{n}...m_{1}}\Big)$$ Now note that, $\sum_{m_{2},m_{1}=1}$ cancels all the terms in $\sum_{m=1}^{n}S_{m}$ except $S_{1}$. Similarly, $\sum_{m_{2}<m_{3}}S_{m_{3},m_{2},m_{1}=1}$ cancels all the terms in $\sum_{m_{2}}S_{m_{2},m_{1}\neq 1}$ and so forth. *Thus the term inside the bracket in (\[eq:21\]) adds up to 1*! This shows that to leading order in $\delta$ the classical quantity $O^{i}$ obtained through steps (i)- (iii) equals $f_{1 I}^{i}$ and is, therefore, a legitimate approximant to curvature. Final operator expression for the Diffeomorphism constraint {#VI} =========================================================== As mentioned in the beginning of (\[V\]), if $\vec{N}$ is along $e$, (\[eq:3\]) in conjuction with the corollary in appendix \[A2\] yields the desired action. $$\label{22} \left(1 + \frac{\delta\hat{D}_{T}[\vec{N}]}{-i\hbar}\right)h_{e A}^{\;\;\;\;B}\ =\ h_{\Phi(\vec{N},\delta)\circ e A}^{\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;B}$$ We will now argue that (\[22\]) also holds when $\vec{N}$ is transverse to $e$ everywhere except perhaps at it’s end points. (This is the same scenario, we worked with in section (\[V.1\]), and section (\[V.2\]).)\ Notice that since,\ [**(i)**]{} $$\label{23} \begin{array}{lll} \hat{E}_{i}(S^{x}_{I})h_{e_{J}}\ =\ 0\ \forall I\neq J,\ I,\ J\ \in\ \{1,...,N-1\}\\ \vspace*{0.1in} \hat{E}_{i}(S^{x}_{I})h_{\overline{e}_{J}}\ =\ 0, \forall\ I,\ J\ \in\ \{1,...,N-1\} \end{array}$$ and,\ [**(ii)**]{} $$\label{24} h_{e A}^{\;\;\;\;B}\ =\ h_{e_{1} A}^{\;\;\;\;\;\;\;\;A_{1}}...h_{e_{N-1} A_{N-2}}^{\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;B}$$ where in the second line in (\[23\]) we have used $\delta_{1},\delta_{2}\ \ll\ \delta$. Equations (\[23\]), (\[24\]) together with (\[eq:mar19-5\]), (\[eq:11.6\]) and the fact that $\hat{E}_{i}(S^{x}_{I})$ is ordered to the right in $\hat{V}_{\triangle_{I}}^{(e)}$ imply that, $$\label{25} \begin{array}{lll} \prod_{I=1}^{N}\left[1 + \frac{\delta}{-il_{p}^{2}\gamma}\hat{V}_{\triangle_{I}}^{(e)}\right] h_{e A}^{\;\;\;\;B}\ &=&\ \prod_{I=1}^{N-1}\left[\left(1 + \frac{\delta}{-il_{p}^{2}\gamma}\hat{V}_{\triangle_{I}}^{(e)}\right)h_{e_{I} A_{I-1}}^{\;\;\;\;\;\;A_{I}}\right]\\ \vspace*{0.1in} & & = \prod_{I=1}^{N-1} h_{\overline{e}_{I} A_{I-1}}^{\;\;\;\;\;A_{I}}\\ \vspace*{0.1in} & & = h_{\overline{e}(\vec{N},\delta)} \end{array}$$ where we have set $A_{0} = A, A_{N-1}=B$ and have used the definition of $\overline{e}_{I}$ as given in section (\[V.1\]) (above eq. (\[24\])) to define $\overline{e}(\vec{N},\delta)$. $$\overline{e}(\vec{N},\delta)\ =\ s_{0}\circ\left(\phi(\vec{N},\delta)e\right)\circ s_{1}^{-1}$$ Finally equations (\[3\]), (\[25\]) and (\[ap9-1\]) in appendix \[A2\] implies the desired result given in eq. (\[22\]). The case of a general spin-network state {#VII} ======================================== In this section we generalize the considerations of sections 3- 6 to the case of a spin network based on a graph $\gamma$ with $M$ edges, $e_p, p\ =\ 1,..,M$. Our arguments closely parallel those in sections 3-6 and, as a result, our presentation will not be as detailed as in those sections. Without loss of generality, we assume that each edge $e_p$ is of the type described in section \[III\]. We shall also assume, (once again without loss of generality) that the shift vector field is along the edge $e_p$ or is transverse to it, except perhaps at its endpoints. We denote the spin-network state by $\vert {\bf s}\rangle := \vert \gamma, \{ \vec{c}, \vec{j} \}\rangle $, where ${\vec j}, {\vec c}$ refer to the set of edge labels and intertwiners associated with the spin network. Triangulation {#VII.1} ------------- We use an obvious generalization of the notation used in section 3. Let $e_p\subset {\cal U}_{p}$ where ${\cal U}_{p}$ is an open set equipped with analytic coordinates $\left(x_{p}, y_{p}, z_{p}\right)$ with $x_p$ running along $e_p$. Let $\delta$ be small enough that $\phi({\vec N},\delta )\circ e_p \subset {\cal U}_{e_p}$. Let $t_{e_p}$ be a triangulation of $e_p$ with vertices $v^{(p)}_{I_{p}}$, $I_{p}\ =\{1,...,N_{p}\}$ and 1- cells of coordinate length $\delta$. Let $T^p$ be a triangulation of $\Sigma$ such that $t_{e_p}\subset T^p$. Let $T^{* p}$ be dual to $T^{p}$ such that every vertex $v^{(p)}_{I_{p}}$ lies in the interior of some 3-cell $\triangle_{I_{p}}^{(p)}$ of $T^{* p}$.\ Let the 3-cells $\triangle^{(p)}_{I_{p}}$ be cuboids with co-ordinate lengths $(\delta, \delta_{1},\delta_{2})$ along the $(x_{p}, y_{p}, z_{p})$ directions with $\delta_{1},\delta_{2}\ <<\ \delta$. We shall further require that the each vertex $v^{(p)}_{I_{p}}$ be located at the (coordinate) centroid of the 3- cell $\triangle^{(p)}_{I_{p}}$. Let $T^{*}_{e_{p}}$ be the restriction of $T^{* p}$ to $\cup_{I_{p}}\triangle_{I_{p}}^{(p)}$. Define the set $T^{*}_{\gamma}$ by $$T^{*}_{\gamma}:=\cup_{p=1}^{M}T^{*}_{e_{p}}. \label{t*gamma}$$ $T^{*}_{\gamma}$ defines a subset of $\Sigma$ (namely the union of all the 3- cells contained in $T^{*}_{e_{p}}, p=1,..,M$)) which we call ${\cal U}_{\gamma}$.\ Let $T^{* '}_{\gamma}$ be a triangulation of $\overline{\Sigma - {\cal U}_{\gamma}}$ with 3-cells $\triangle$ of volume $v=\delta\delta_{1}\delta_{2}$ i.e. $$\int_{\triangle \in T^{* '}_{\gamma}} \omega =v \label{volt*'gamma}$$ where $\omega$ is the 3- form of section 3. Note also that by virtue of the smoothness of $\omega$, the compactness of $T^*_{e_{p}}\subset \Sigma$ and the fact that the graph $\gamma$ has a finite number of edges, it follows that $$\int_{\triangle_{I_{p}}^{(p)}}\omega < Dv$$ for some constant $D$ which is independent of $\delta, \delta_1,\delta_2, {I_{p}},p$. Finally, note that $T^{*}_{\gamma}$ is not, strictly speaking, a triangulation of ${\cal U}_{\gamma}$ because some of its 3- cells overlap, namely the ones in the vicinity of the endpoints of the edges $e_p$ (recall that these endpoints are the vertices of the graph $\gamma = \cup_p e_p$). However, it is easy to see that for small enough $\delta_1,\delta_2$ this overlap at any such graph vertex involves at the most one 3- cell from each $T^{*}_{e_p}$ and yields a negligible “overcounting” error in terms of the approximation of an integral of fields over ${\cal U}_{\gamma}$ by sums over 3- cells of $T^{*}_{\gamma}$. We use this fact (that the contributions of such cells to the evaluation of such integrals are negligible) to remove, by hand, the contributions from the right most cells of each $T^{*}_{e_p}$ i.e. from the cells $\triangle_{{N_p}}^{(p)}, p=1,..,M$ so that, in what follows, we shall allow $I_p$ to range from $1$ to $N_p-1$. [^10] Sum to Product reformulation {#VII-2} ---------------------------- Equations (\[ap6-1\]) and (\[2\]) together with the fact that the number of edges $M$ is finite implies that $$V_{\triangle_{I_{p}}^{(p)}}\ =\ \int_{\triangle_{I_{p}}^{(p)}}N^{a}F_{a x_{p}}^{i}\tilde{E}^{x_{p}}_{i}\ +\ {O}(\delta v)$$ where $O(\delta v)$ is bounded inpendent of $I_p, p$. The vector constraint can be approximated as, $$V[\vec{N}]\ =\ \sum_{p}\sum_{I_{p}}V_{\triangle_{I_{p}}^{(p)}}^{e_{p}}\ +\ \sum_{p}\sum_{I_{p}}\int_{\triangle_{I_{p}}^{(p)}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}\ +\ \sum_{\triangle\in T^{* '}_{\gamma}}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\ +\ \textrm{O}(\delta)$$ A proof almost identical to the one given in Appendix \[A1\] yields $V[\vec{N}]$ in product form $$\label{27} \begin{array}{lll} V[\vec{N}]\ =\ \left\{\left(\prod_{p}\prod_{I_{p}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)} V_{\triangle_{I_{p}}^{(p)}}^{e_{p}}\right)\prod_{p}\prod_{I_{p}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\int_{\triangle_{I_{p}}^{(p)}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}\right)\right.\right.\\ \vspace*{0.1in} \hspace*{0.5in}\left.\left.\prod_{\triangle\in T^{'}_{\gamma}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\right)\right) -1\right\}\frac{(-il_{p}^{2}\gamma)}{\delta}\ +\ {O}(\delta) \end{array}$$ Thus a finite triangulation approximant, $V_{T}[\vec{N}]$, to $V[\vec{N}]$ can be defined, similar to (\[1\]), as $$\label{28} \begin{array}{lll} V_{T}[\vec{N}]\ =\ \left\{\left(\prod_{p}\prod_{I_{p}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)} V_{\triangle_{I_{p}}^{(p)}}^{e_{p}}\right)\prod_{p}\prod_{I_{p}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\int_{\triangle_{I_{p}}^{p}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}\right)\right.\right.\\ \vspace*{0.1in} \hspace*{0.5in}\left.\left.\prod_{\triangle\in T^{'}_{\gamma}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\right)\right) -1\right\}\frac{(-il_{p}^{2}\gamma)}{\delta}\ \end{array}$$ Its operator correspondent is: $$\label{28a} \begin{array}{lll} \hat{V}_{T}[\vec{N}]\ =\ \left\{\left(\prod_{p}\prod_{I_{p}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)} \hat{V}_{\triangle_{I_{p}}^{(p)}}^{e_{p}}\right)\prod_{p}\prod_{I_{p}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\widehat{\int_{\triangle_{I_{p}}^{p}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}}\right)\right.\right.\\ \vspace*{0.1in} \hspace*{0.5in}\left.\left.\prod_{\triangle\in T^{'}_{\gamma}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\widehat{\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}}\right)\right) -1\right\}\frac{(-il_{p}^{2}\gamma)}{\delta}\ \end{array}$$ Consequently, a finite triangulation approximant ${ D}_{T}[\vec{N}]$ to ${ D}[\vec{N}]$ can be defined, similar to (\[2\]), as. $$\begin{array}{lll} { D}_{T}[\vec{N}]\ =\ \frac{-i\hbar}{\delta}\left\{\left[1 - \frac{\delta}{(-il_{p}^{2}\gamma)}{\cal G}_{T}[N^{i}]\right]\left[1 + \frac{\delta}{(-il_{p}^{2}\gamma}V_{T}[\vec{N}]\right]\right\} - 1 \end{array}$$ An analysis along the lines of appendix \[A1\] yields, $$\left(1 - \frac{\delta}{(-il_{p}^{2}\gamma)}\hat{{\cal G}}_{T}[N^{i}]\right)\vert {\bf s}\rangle\ =\ \hat{{\cal U}}^{SU(2)}_{(N^{i},\delta)}\vert {\bf s}\rangle$$ where, $\hat{{\cal U}}^{(SU(2)}_{(N^{i},\delta})$ is a finite SU(2) gauge transformation which acts in the standard way by on $\vert {\bf s}\rangle$ by rotating the intertwiners appropriately. For each edge $e_{p}$ , we define $\hat{V}_{\triangle_{I_{p}}^{(p)}}$ as in section \[V\]. Finally we order the product of operators in (\[28a\]) exactly as written so that the contributions from the cells $\triangle\in T^{* '}_{\gamma}$ and the $\widehat{F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}}$ contributions of the cells $\triangle_{I_{p}}^{(p)}$ are to the right. Finally for each term (corresponding to each cell) in the product , we order the flux operator to the right. With this choice of operator ordering it is easy to see that, just like in the case of a single edge, if $\triangle \in T^{*\prime}_{\gamma}$, $$\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\widehat{\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}}\right)\vert{\bf s}\rangle\ =\ \vert{\bf s}\rangle$$ i.e. the cells $\triangle\in T^{* '}_{\gamma}$ do not contribute anything as $T^{* '}_{\gamma}\cap\ \gamma\ =\ 0$.\ Similar to the single edge case, we also have that $$\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\widehat{\int_{\triangle_{I_{p}}^{p}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}}\right)\vert{\bf s}\rangle\ =\ \vert{\bf s}\rangle$$ because the edge $e_{p}$ is along the $x_{p}$ direction and $\hat{b}\ =\ \{y_{p},z_{p}\}$ whence $\hat{E}^{\hat{b}}_{i}\vert{\bf s}\rangle\ =\ 0.$\ Hence just as for the single edge case((\[eq:3\]) we have that $$\label{29} \left(1 + \frac{\delta}{-i\hbar}\hat{ D}_{T}[\vec{N}]\right)\vert{\bf s}\rangle\ =\ \hat{{\cal U}}^{SU(2)}_{(N^{i},\delta)}\left(\prod_{p}\prod_{I_{p}}\left(1 + \frac{\delta}{(-il_{p}^{2}\gamma)}\hat{V}^{e_{p}}_{\triangle_{I_{p}}^{(p)}}\right)\right)\vert{\bf s}\rangle$$ Equation (\[29\]) still has operator ordering issues we need to sort out. Denote the edges of $\gamma$ which are along $\vec{N}$ by $e_{p_{\parallel}}^{(\parallel)}$ and those which are transverse to the integral curves of $\vec{N}$ ( except perhaps at their end points) by $e_{p_{\perp}}^{(\perp)}$ with $p_{\parallel}\ \in\ \{1,...,M_{\parallel}\}$ and $p_{\perp}\ \in\ \{1,...,M_{\perp}\}$, $M_{\parallel} + M_{\perp}\ =\ M$. Let $$\nonumber\\ \begin{array}{lll} \cup_{p_{\perp}}e_{p_{\perp}}^{(\perp)}\ =:\ \gamma_{\perp}\\ \vspace*{0.1in} \cup_{p_{\parallel}}e_{p_{\parallel}}^{(\parallel)}\ =:\ \gamma_{\parallel} \end{array}$$ Note that $\gamma_{\perp}$, $\gamma_{\parallel}$ are not necessarily connected graphs. We order the right hand side of (\[29\]) so that the contributions from edges in $\gamma_{\parallel}$ are to the right. Clearly, from the remarks below (\[2\]) in section (\[V\]), it follows that these contributions all reduce to unity. Whence we are only left with contributions coming from the edges of $\gamma_{\perp}$.\ In order that the contributions from the cells $\triangle_{I_{p_{\perp}}}^{p_{\perp}}$ and $\triangle_{I_{q_{\perp}}}^{q_{\perp}}$ act independently of each other exactly in the manner described for a single edge, we need to ensure the following. First, the surface $S^{x_{p_{\perp}}}_{I_{p_{\perp}}}$ should intersect $\gamma$ only in the edge $e_{I_{p_{\perp}}}^{p_{\perp}}$. This readily ensured by choosing $\delta_1, \delta_2$ to be sufficiently small. Second, the surface $S^{x_{p_{\perp}}}_{I_{p_{\perp}}}$ should not intersect any other edge which maybe generated by action of any $\hat{V}_{\triangle_{I_{q_{\perp}}}^{(q_{\perp})}}^{e_{q_{\perp}}}$. To ensure this we need to slightly modify the choice of the surfaces labelling the electric flux variables in equation (\[eq:ap4-1\]) as follows. Let $$\begin{array}{lll} \phi(\vec{N},\delta)\circ e_{p_{\perp}}^{(\perp)}\ :=\ e_{p_{\perp} \delta}^{(\perp)}\\ \vspace*{0.1in} \gamma_{\perp}(\delta)\ :=\ \cup_{p_{\perp}}\ e_{p_{\perp} \delta}^{(\perp)} \end{array}$$ From the application of Appendix \[A4\] to each pair of edges\ $\{\ (e_{p_{\perp} \delta}^{({\perp})}, e_{q_{\perp}}^{({\perp})})\ \vert\ \forall\ p_{\perp},q_{\perp}\}$ , it follows that we can find a small enough $\delta_{0}$ such that $\gamma_{\perp}\cap \gamma_{\perp \delta}$ is a finite set of isolated points in $\Sigma$ $\forall\ \delta\ \in\ (0,\delta_{0})$ [^11] Now for any $\delta\ \in\ (0,\delta_{0})$ we can proceed as follows. First, recall that the surface $S^{x_{p_{\perp}}}_{I_{p_{\perp}}}$ is the rightmost face of the cell $\triangle_{I_{p_{\perp}}}$. However, equation (\[eq:ap4-1\]) holds even if integrate over the electric flux through a surface $S^{(\epsilon )x_{p_{\perp}}}_{I_{p_{\perp}}}$ obtained by displacing $S^{x_{p_{\perp}}}_{I_{p_{\perp}}}$ to the left by an amount $\epsilon << \delta$. We use this freedom to choose the surfaces so that they do not intersect any of the finite number of isolated points in $\gamma_{\perp}\cap \gamma_{\perp}(\delta )$. Hence if any face, $S^{x_{p_{\perp}}}_{I_{p_{\perp}}}$, intersects $\gamma_{\perp}\cap \gamma_{\perp}(\delta )$ in a point, we integrate the flux over the surface $S^{(\epsilon )x_{p_{\perp}}}_{I_{p_{\perp}}}$ instead. In other words, just as we associated the loop $\gamma_I$ to the cell $\triangle_I$ in section 4, we associate the surface $S^{(\epsilon )x_{p_{\perp}}}_{I_{p_{\perp}}}$ to the cell $\triangle_{I_{p_{\perp}}}$ and use this surface (which is no longer the rightmost surface of the cell) to evaluate the flux. The considerations of section 5 go through unchanged because the new flux operator still intersects the edge $e_{p_{\perp}}^{({\perp})}$ away from the vertices of the triangulation $T_{e_{p_{\perp}}^{({\perp})}}$. In case the face $S^{x_{p_{\perp}}}_{I_{p_{\perp}}}$ does not intersect $\gamma_{\perp}\cap \gamma_{\perp}(\delta )$, we leave the choice of surface unaltered. [*From now on, we assume this choice has been made and in an abuse of notation, continue to refer to the surfaces, whether displaced or not, by*]{} $\{S^{x_{p_{\perp}}}_{I_{p_{\perp}}}\}$. Next, choose $\delta_{1}, \delta_{2}$ small enough that $$S_{I_{p_{\perp}}}^{x_{p_{\perp}}}\ \cap\ \gamma_{\perp}(\delta)\ =\ 0$$ and such that $S_{I_{p_{\perp}}}^{x_{p_{\perp}}}$ intersects $\gamma$ only in the edge $e_{I_{p_{\perp}}}^{p_{\perp}}$. With these choices, each factor in the product over edges in $\gamma_{\perp}$ acts independently exactly as in the case of a single edge. [^12] Whence in the present case each $h_{e_{p_{\perp}}}$ is mapped onto $h_{{{\bar e}_{p_{\perp}}}}$.\ Finally the Gauss-law piece , $\hat{\cal U}^{(SU(2))}_{(\delta, N^{i})}$ removes the “extra segments" from each ${\bar e}_{p_{\perp}}$ as detailed in section (\[VI\]). It also generates appropriate finite diffeomorphism on edges in $\gamma_{\parallel}$ , so that from (\[29\]) we obtain, $$\label{ap28-1} \left[1 + \frac{\delta}{-i\gamma l_{p}^{2}}\hat{{D}}_{T}[\vec{N}]\right]\vert{\bf s}\rangle\ =\ \hat{{\cal U}}(\phi(\delta, \vec{N}))\vert{\bf s}\rangle$$ as required.\ Note that if spin-network is gauge invariant, the Gauss law term acts as identity operator due to gauge invariance of vertex intertwiners. Thus as expected, we could have dropped ${\cal G}[N^{i}]$ term from the classical expression and the accompanying heuristics of appendix \[A2\] could have been avoided. The continuum limit on the LM habitat ===================================== Let ${\cal D}$ be the finite span of spin network states and let ${\cal D}^*$ be its algebraic dual. Let $[{\bf s}]$ be the set of spin networks related by the action of diffeomorphism to $\bf s$. For each such diffeomorphism equivalence class of spin networks, $[{\bf s}]$ fix a “reference” spin network ${\bf s}_0\in [{\bf s}]$. Let the vertices of (the coarsest graph underlying) ${\bf s}_0$ be denoted by ${\vec v}= (v_1,..,v_k)$ so that ${\vec v}\in \Sigma^{k({\bf s}_0)}$, $k({\bf s}_0)\equiv k$ being the number of vertices of ${\bf s}_0$. Then the LM habitat, ${\cal D}^*_{LM}$, is defined as follows [@lm]. Let ${\cal D}^*_{LM}$ contain those elements of $\Psi$ of ${\cal D}^*$ for which $$\Psi (\vert {\bf s}\rangle )= \Psi_{{\bf s}_0}(\phi (v_1),.., \phi (v_k)) \label{defpsi}$$ where $\Psi_{{\bf s}_0}$ is a smooth complex valued function on $\Sigma^{k({\bf s}_0)}$ and $\phi$ is any diffeomorphism which maps the reference spin network ${\bf s}_0\in [{\bf s}] $ to ${\bf s}$ so that $(\phi (v_1),.., \phi (v_k))$ are the vertices of ${\bf s}$. [^13] Thus, any $\Psi \in {\cal D}^*_{LM}$ is characterised by a family of smooth functions $\Psi_{{\bf s}_0}$ one for each diffeomorphism class $[{\bf s}_0]$. These functions are referred to as [*vertex smooth functions*]{}[@lm] Clearly, the set ${\cal D}_{diff}^*$ of diffeomorphism [*invariant*]{} elements of ${\cal D}^*$ are obtained as those states $\Psi \in {\cal D}^*_{LM}$ for which each $\Psi_{{\bf s}_0}$ is a constant function. Thus ${\cal D}_{diff}^*\subset {\cal D}^*$. The action of the diffeomorphism constraint operator at finite triangulation (see equation (\[ap28-1\])) on $\Psi \in {\cal D}^*_{LM}$ is defined via its dual action: $$\begin{aligned} ({\hat D}_T ({\vec N})\Psi )(\vert {\bf s}\rangle )& =& \Psi( {\hat D}^{\dagger}_T ({\vec N})\vert {\bf s}\rangle)\\ &=&\frac{-i\hbar}{\delta} (\Psi(({\hat U}^{\dagger}_{\phi({\vec N},\delta )} - 1)\vert {\bf s}\rangle )\\ &=&\frac{-i\hbar}{\delta}(\Psi_{{\bf s}_0}( \phi^{-1}({\vec N},\delta )x_1,.,\phi^{-1}({\vec N},\delta )x_k) -\Psi_{{\bf s}_0}(x_1,.,x_k))\nonumber\\\end{aligned}$$ Here ${\bf s}_0$ is mapped to ${\bf s}$ by some diffeomorphism $\phi$ and $x_i= \phi v_i$, where $v_i, i=1,..k$ are the vertices of ${\bf s}_0$. The action of the diffeomorphsim constraint operator, ${\hat D} ({\vec N})$,is obtained through the $\delta \rightarrow 0$ continuum limit of the action of its finite triangulation approximant ${\hat D}_T ({\vec N})$ so that: $$\begin{aligned} ({\hat D}({\vec N})\Psi )(\vert {\bf s}\rangle )&=& {-i\hbar}\lim_{\delta \rightarrow 0} \frac{\Psi_{{\bf s}_0}( \phi^{-1}({\vec N},\delta )x_1,.,\phi^{-1}({\vec N},\delta )x_k) -\Psi_{{\bf s}_0}(x_1,.,x_k))}{\delta} \nonumber\\ &=&i\hbar \sum_{i=1}^k N^a (x_i) \frac{\partial \Psi_{{\bf s}_0}(x_1,.,x_k))}{\partial x_i^a } \label{lm1}\end{aligned}$$ where $x_i^a$ are the coordinates (in some coordinate chart) of the point $x_i\in \Sigma$. Equation (\[lm1\]) shows that the operator ${\hat D}({\vec N})$ is well defined on the habitat and maps the habitat state $\Psi$ specified by the family of vertex smooth functions $\Psi_{{\bf s}_0}$ to the the habitat state $\Phi = {\hat D}({\vec N})\Psi$ specified by the family of vertex smooth functions $\Phi_{{\bf s}_0}$ with $$\Phi_{{\bf s}_0}(v_{1},...,v_{k})= i\hbar \sum_{i=1}^k N^a (v_i) \frac{\partial \Psi_{{\bf s}_0}(v_1,.,v_k))}{\partial v_i^a } \label{lm2}$$ From equation (\[lm2\]) it follows that the joint kernel of the set of diffeomorpism constraint operators $\{{\hat D}({\vec N}), \forall {\vec N}\}$ is the set of habitat states for which each vertex smooth function is a constant function. As mentioned above this set of states is precisely ${\cal D}_{diff}^*$. From equations (\[lm1\]) and (\[lm2\]) it follows that $${\hat D}({\vec N}){\hat D}({\vec M})- {\hat D}({\vec M}){\hat D}({\vec N})\Psi := \Phi^{{\vec N}, {\vec M}}$$ with the habitat state $\Phi^{{\vec N}, {\vec M}}$ specified by the family of vertex smooth functions $\Phi^{{\vec N}, {\vec M}}_{{\bf s}_0}$ where $$\begin{aligned} \Phi^{{\vec N}, {\vec M}}_{{\bf s}_0}(x_{1},...,x_{k})&=& (i\hbar )^2 \sum_{i=1}^k (M^a (x_i)\frac{\partial N^b(x_i)}{\partial x_i^a} -N^a (x_i)\frac{\partial M^b(x_i)}{\partial x_i^a}) \frac{\partial \Psi_{{\bf s}_0}(x_1,.,x_k))}{\partial x_i^b }\nonumber\\ &=& -(i\hbar )^2 \sum_{i=1}^k ({\cal L}_{\vec N}{\vec M})^b \frac{\partial \Psi_{{\bf s}_0}(x_1,.,x_k)}{\partial x_i^b }. \label{lm3}\end{aligned}$$ Equation (\[lm3\]) implies that, on ${\cal D}^*_{LM}$ we have that $$[{\hat D}({\vec N}),{\hat D}({\vec M})]= -i\hbar {\hat D}({\cal L}_{\vec N}{\vec M}), \label{lm4}$$ so that our construction of the diffeomorphism constraint operator results in an anomaly free (anti-)representation of the Lie algebra of diffeomorphisms of $\Sigma$. Conclusions =========== The diffeomorphism constraint $D({\vec N})$ generates diffeomorphisms along the integral curves of the shift vector field ${\vec N}$. Hence, one expects the quantum constraint operator, ${\hat D}({\vec N})$, to have a non- trivial action at [*all*]{} the (infintely many) points lying on those edges of a spin network state which are transverse to ${\vec N}$. In contrast, almost all operators of significance in LQG have a non- trivial action only at a [*finite*]{} number of points namely the vertices of the graph underlying the spin network state. Indeed, the necessity of an action at infinitely many points was thought to be an obstacle to the construction of the operator ${\hat D}({\vec N})$ [@ttbook]. Our construction gets around this obstruction through the reformulation of the classical constraint at finite triangulation as a [*product*]{} over 3- cells of the triangulation described in section 4. This leads, in the quantum theory, to a [*product*]{} of bounded operators at finite triangulation rather than a [*sum*]{}. The product admits a satisfactory continuum limit whereas the sum does not. Thus, it is the passage to the product form which enables us to deal with the contributions from infinitely many points in the continuum limit. A sensible product reformulation also seems to require that the shift vector $N^a (x)$ cannot appear as an overall factor multiplying the diffeomorphism constraint $D_a (x)$ at the point $x$ because a product over all $x$ of shift vectors at each point $x$ is not an object which makes sense in the continuum limit. Hence it seems inevitable that the shift vector dependence in $D({\vec N})$ at finite triangulation is taken care of by the incorporation of both its direction and magnitude in the specification of the small loop which underlies the holonomy approximant to the Ashtekar- Barbero curvature, $F_{ab}^i$. Indeed, what we are able to construct is the quantity $N^aF_{ab}^i$ at finite triangulation rather than $F_{ab}^i$ itself. As a consequence, our construction of curvature approximant bears a great conceptual similarity to that of Loop Quantum Cosmology (LQC) when viewed in the following manner. In isotropic LQC, the diffeomorphism constraint is satisfied identically and the Hamiltonian constraint reduces to its Euclidean part $H= \frac{\epsilon^{ijk}F_{abi}{\tilde E}^a_j{\tilde E}^b_k}{\sqrt{q}}$ where we have used standard notation for the densitized triad and the determinant of the 3- metric. Our work here suggests that rather than $F_{ab}^i$ it is $\frac{{\tilde E}^a_j}{\sqrt{q}} F_{ab}^i$ which needs to be approximated at finite triangulation, and, that one should attempt to incorporate $\frac{{\tilde E}^a_j}{\sqrt{q}}$ as part of the specification of the small loop underlying the holonomy approximant. In the quantum theory such an attempt, if successful, would lead to the consideration of a loop whose size depends on the triad operator, thus exhibiting a close conceptual similarity to the “${\bar \mu}$” scheme [@improvedlqc] for the Hamiltonian constraint in LQC. Setting aside considerations of the Hamiltonian constraint, this work in itself (as seen in section 5) reveals the necessity of a triad operator dependence in the construction of curvature approximants. This dependence is both explicit (as seen in the occurence of the electric flux terms in equations (\[eq:(4)\]) and (\[eq:16\])) as well as implicit in that the expressions for the curvature approximants depend on the spin label $j$ of the edge on which the curvature operator acts. [^14] A similar dependence of “connection” type operators on conjugate “electric fluxes” was also seen to be crucial in recent work on Polymer Parameterised Field Theory (PPFT) [@ppftham; @ttham]. Apart from this “electric flux dependence”, one of the key lessons of our work in PPFT [@ppftham] is the necessity of considering kinematically [*singular*]{} constraint operators in order to obtain a non- trivial representation of the constraint algebra. Here, too, the existence of a non- trivial representation of the quantum constraint algebra can be traced to the kinematically singular nature of the diffeomorphism constraint operator. That this operator is singular on ${\cal H}_{kin}$ is an obvious consequence of the factor of ${\delta}^{-1}$ in equation (\[final\]). It is this factor which leads to a non- trivial representation of the constraint algebra on the LM habitat in section 8. Had this factor been absent the action of the constraint operator would have yielded the difference of the evaluations of a vertex smooth function at points seperated by $\delta$. This difference vanishes in the $\delta\rightarrow 0$ limit by virtue of the smoothness of the function. Instead, just as for PPFT [@ppftham], the factor of $\delta^{-1}$ converts this difference into a derivative in the continuum limit, thus yielding a non- trivial action of the diffeomorphism constraint operator on the habitat as well as a non- trivial representation of the algebra of diffeomorphism constraints thereon. Our final goal is the construction of the Hamiltonian constraint operator in such a way as to obtain a non- trivial anomaly free representation of its algebra. In the language of the concluding section of Reference [@ppftham], let us refer to the quantum commutator between a pair of Hamiltonian constraints as the Left Hand Side (LHS) and the quantum correspondent of the classical Poisson bracket between this pair as the Right Hand Side (RHS). The RHS is closely related to the diffeomorphism constraint operators studied here; the only difference being that the shift vector field in the RHS is operator valued. Earlier work by Thiemann [@qsd3], Lewandowski and Marolf [@lm] and Gambini, Lewandowski, Pullin and Marolf [@habitat2] showed that for density weight one Hamiltonian constraints, the algebra consistently trivialises i.e. the LHS and the RHS can be independently defined either with respect to the Uniform Rovelli- Smolin- Thiemann Topology on ${\cal H}_{kin}$ [@qsd3; @ttbook] or on the LM habitat [@lm; @habitat2] and, in both cases, both the RHS and the LHS vanish. Our work on PPFT [@ppftham] (as well as the ‘rescaling by hand’ in Reference [@habitat2]) suggests the use of higher density weight constraints to probe the existence of a [*non- trivial*]{} representation of the constraint algebra. Both these works also suggest that the current set of choices for curvature approximants are inappropriate. As emphasized in Reference [@habitat2] the current set of choices used in the LHS do not result in an RHS which can move vertices by diffeomorphisms. Since the choice of curvature approximants used in this work does result in the diffeomorphism constraint moving vertices around by diffeomorphisms, the considerations of this work should be of use for a better understanding of both the LHS as well as the RHS. [**Acknowledgements**]{}: AL would like to thank Miguel Campiglia, Adam Henderson and Casey Tomlin for discussions and Lois Sofia for help with the figures. MV thanks Fernando Barbero and Eduardo Villase$\rm{\tilde n}$or for discussions. Work of AL is supported by NSF grant PHY-0854743 and by the Eberly Endowment fund. Appendix {#appendix .unnumbered} ======== Conventions {#A0} =========== In this appendix we summarise various conventions used in the computations. Our conventions are same as those given in [@ttbook] $$\begin{array}{lll} \tau^{i} = -i\sigma^{i}\\ \vspace*{0.1in} h_{e}(A)\ =\ {\cal P}\exp\left[\int_{e}\frac{A_{i}\tau^{i}}{2}\right]\\ \end{array}$$ where $\{\sigma^{i}\}$ are the Pauli matrices. e.g. above conventions imply that, $$h_{\alpha}\ =\ 1\ +\ \frac{\delta^{2}}{2}F^{i}\tau_{i}\ +\ \textrm{O}(\delta^{3})$$ for any plaquette $\alpha$ of co-ordinate area $\delta^{2}$. Proof of Equation (\[eq:ap3-2\]) {#A1} ================================ It is straightforward to see that equation (\[eq:ap3-2\]) can be rewritten in the for,m: $$\label{eq:A.1.1} \begin{array}{lll} \left\{\prod_{I}\left(1 + \frac{\delta V_{\triangle_{I}}^{(e)}}{-il_{p}^{2}\gamma}\right)\prod_{J}\left(1 +\frac{\delta}{-il_{p}^{2}\gamma}\int_{\triangle_{J}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{b}_{i}\right)\prod_{\triangle\notin T^{*}_{e}}\left(1 + \frac{\delta}{-il_{p}^{2}}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\right)\right\}\\ \vspace*{0.1in} -\left\{ 1\ +\ \frac{\delta}{-i l_{p}^{2}\gamma}\left(\sum_{I}V_{\triangle_{I}}^{(e)}\ +\ \sum_{I}\int_{\triangle_{I}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}}_{i}\ +\ \sum_{\triangle\in T_{e}^{*}}\int_{\triangle}N^{a}F_{ab}^{i}\tilde{E}^{b}_{i} \right)\right\} =\ O(\delta^{2}) \end{array}$$ We now prove equation (\[eq:A.1.1\]). [**Proof**]{} :\ Note that $N^a, A_a^i, {\tilde E}^b_i$ and the volume form $\omega$ (see section 3) are smooth tensor fields on $\Sigma$ and that any smooth function on $\Sigma$ is bounded by virtue of the compactness of $\Sigma$. This, in conjunction with equations (\[vol=v\]), (\[triangleibound\]) and (\[vtrianglei\]) imply that there exists some positive constant ${\cal C}$ which is independent of $\delta, \delta_1,\delta_2,I$ such that $$\label{defcalc} \begin{array}{lll} \vert \int_{\triangle_{I}}N^{a}F_{a\hat{b}}^{i}\tilde{E}^{\hat{b}} < {\cal C}v\\ \vspace*{0.1in} \vert \int_{\triangle} N^{a}F_{ab}^{i}\tilde{E}^{b}_{i}\vert\ <\ {\cal C}v\\ \vspace*{0.1in} \vert V_{\triangle_{I}}^{(e)}\vert\ <\ {\cal C}v \end{array}$$ Let us refer to the Left Hand Side of equation (\[eq:A.1.1\]) by the abbreviation $L.H.S.$ Expanding the first set of terms (in curly brackets) of the $L.H.S.$ and using the bounds (\[defcalc\]), we obtain $$\begin{array}{lll} \vert L.H.S.\vert\ <\\ \vspace*{0.1in} \hspace*{0.6in} \left[\prod_{I}\left(1 + \frac{\delta}{l_{p}^{2}\gamma} {\cal C}v\right)\right]^{2}\prod_{\triangle\notin T_{e}^{*}}\left(1 + \frac{\delta}{l_{p}^{2}\gamma}{\cal C}v\right) -\ 2\sum_{I}\frac{\delta}{l_{p}^{2}\gamma}{\cal C}v - \sum_{\triangle\notin T^{*}_{e}}\frac{\delta}{l_{p}^{2}\gamma}{\cal C}v -\ 1 \end{array} \label{lhs}$$ Next, denote the volume of $\Sigma$ (as measured by $\omega$) by V so that $V=\int_{\Sigma}\omega$. From equation (\[vol=v\]) we have that $$V= \sum_{I=1}^N\int_{\triangle_I} \omega + \sum_{\triangle\notin T^{*}_e}v \label{totalv}$$ For sufficiently small $\delta$, equation (\[eq:0.1\]) implies that $$\sum_{I=1}^N\int_{\triangle_I} \omega < \sum_{I=1}^N Dv <\frac{2L}{\delta}Dv = O(\delta_1\delta_2) . \label{volte}$$ Equations (\[totalv\]), (\[volte\]) imply that $$\sum_{\triangle\notin T^{*}_{e}}v = V+ O (\delta_1\delta_2) \label{sumnotintev}$$ and equation (\[volte\]) implies that $$\sum_{I=1}^N v = O(\delta_1\delta_2) \label{sumiv}$$ Using equations (\[sumnotintev\]), (\[sumiv\]) in the summations in equation (\[lhs\]) yields $$\label{eq:A.1.3} \vert L.H.S.\vert <\ \prod_{I}\left(1 + \frac{\delta}{l_{p}^{2}\gamma}{\cal C}v\right)^2 \prod_{\triangle\notin T^{*}_e}\left(1 + \frac{\delta}{l_{p}^{2}\gamma}{\cal C}v\right)\ - V\frac{{\cal C}\delta}{l_{p}^{2}\gamma} -1 +O(\delta_1\delta_2).$$ Next, consider the first product in the above equation. For $\delta_1, \delta_2$ sufficiently smaller than $\delta$, we have that $$\label{eq:ap2-1} \begin{array}{lll} \prod_{I}(1 + \frac{\delta{\cal C}v}{l_{p}^{2}\gamma})^2 <\ (1 + \frac{\delta{\cal C}v}{l_{p}^{2}\gamma})^{\frac{L}{\delta_{1}}\frac{L}{\delta_{2}}}\\ \vspace*{0.1in} \hspace*{1.0in}=\ (1 + \frac{\delta^{2}{\cal C}\delta_{1}\delta_{2}}{l_{p}^{2}\gamma})^{\frac{L^{2}}{\delta_{1}\delta_{2}}}\\ \vspace*{0.1in} \hspace*{1.0in}=\ (1 + \frac{\delta^{2}{\cal C}\delta_{1}\delta_{2}}{l_{p}^{2}\gamma})^{\frac{1}{\frac{\delta_{1}\delta_{2}{\cal C}\delta^{2}}{l_{p}^{2}\gamma}}L^{2}{\cal C}\frac{\delta^{2}}{l_{p}^{2}\gamma}} \end{array}$$ where the first line follows from equation (\[eq:0.1\]) and $\delta_1,\delta_2<<\delta$ and the second line uses $v=\delta\delta_1\delta_2$. In order to estimate the third line of the above equation we use the identity $\lim_{x\rightarrow 0}(1 + x)^{\frac{a}{x}}\ =\ e^{a}$. This identity implies that for any $\epsilon>0$ there exists small enough $x_0>0$ such that for all $x$ with $0<x<x_0$, we have that $\vert (1 + x)^{\frac{a}{x}}- e^a| <\epsilon$. We set $\epsilon = \delta^2$, $a=\frac{\delta^2{\cal C}L^2}{l_P^2\gamma}$ and $\frac{{\cal C}\delta^2\delta_1\delta_2}{l_P^2\gamma} =x$. Then for a given $\delta$, we can always choose $\delta_1,\delta_2$ small enough so as to obtain $$\label{eq:ap2-2} \begin{array}{lll} \left(1 + \delta^{2}\frac{{\cal C}\delta_{1}\delta_{2}}{l_{p}^{2}\gamma}\right)^{\frac{1}{\delta_{1}\delta_{2}\frac{{\cal C}\delta^{2}}{l_{p}^{2}\gamma}}\frac{L^{2}{\cal C}\delta^{2}}{l_{p}^{2}\gamma}}\ =\ e^{\frac{L^{2}{\cal C}\delta^{2}}{l_{p}^{2}\gamma}} + \textrm{O}(\delta^{2})\\ \vspace*{0.1in} \hspace*{0.3in} = 1 + \textrm{O}(\delta^{2}) \end{array}$$ Equations (\[eq:ap2-1\]) and (\[eq:ap2-2\]) imply that $$\label{eq:A.1.5} \prod_{I}\left(1 + \frac{\delta{\cal C}v}{l_{p}^{2}\gamma}\right)\ <\ 1 + \textrm{O}(\delta^{2})$$ Finally, consider the second product in (\[eq:A.1.3\]). We have that $$\begin{array}{lll} \prod_{\triangle\notin T^{*}_e}\left( 1 + \frac{\delta{\cal C}v}{l_{p}^{2}\gamma}\right)\ <\ \left(1 + \frac{\delta{\cal C}v}{l_{p}^{2}\gamma}\right)^{\frac{V}{v}}\\ \vspace*{0.1in} \hspace*{0.8in}=\ \left(1 + \frac{\delta{\cal C}v}{l_{p}^{2}\gamma}\right)^{\frac{V}{\frac{\delta{\cal C}v}{l_{p}^{2}\gamma}}\frac{\delta{\cal C}}{l_{p}^{2}\gamma}} \end{array}$$ where we have used equation (\[totalv\]) in the first line. Once again, given $\delta$, for small enough $\delta_{1},\delta_{2}$ we have that $$\label{eq:A.1.6} \left(1 + \frac{\delta{\cal C}v}{l_{p}^{2}\gamma}\right)^{\frac{1}{\frac{\delta{\cal C}v}{l_{p}^{2}\gamma}}V\frac{\delta{\cal C}}{l_{p}^{2}\gamma}}\ =\ e^{\frac{\delta V{\cal C}}{l_{p}^{2}\gamma}} + \textrm{O}(\delta^{2})$$ Using equations (\[eq:A.1.5\]), (\[eq:A.1.6\]) in equation (\[eq:A.1.3\]) together with the fact that $\delta_1,\delta_2<<\delta$, we have that $$\begin{array}{lll} \vert L.H.S.\vert\ <\ \left[1 + \textrm{O}(\delta^{2})\right]\left[e^{\frac{\delta V{\cal C}}{l_{p}^{2}\gamma}}\ +\ \textrm{O}(\delta^{2})\right] + \textrm{O}(\delta^{2})\ -\ \frac{V{\cal C}\delta}{l_{p}^{2}\gamma} -1\\ \vspace*{0.1in} \hspace*{0.4in}=\ \left[1 + \textrm{O}(\delta^{2})\right]\left[1 + \frac{\delta V{\cal C}}{l_{p}^{2}\gamma} + \textrm{O}(\delta^{2})\right]\ -\ \frac{V{\cal C}\delta}{l_{p}^{2}\gamma} - 1 + \textrm{O}(\delta^{2})\\ \vspace*{0.1in} \hspace*{0.4in}=\ \textrm{O}(\delta^{2}) \end{array}$$ This completes the proof. Quantization of the Gauss term {#A2} ============================== In this appendix we quantize the gauss part of the Diffeomorphism constraint.\ Classically we have $${\cal G}[N^{i}]\ =\ \int_{\Sigma} N^{i}{\cal D}_{a}\tilde{E}^{a}_{i}$$ where $N^{i}\ =\ N^{a}\cdot A_{a}^{i}$.\ We shall treat this quantization a bit heuristically. This is because,\ [(i)]{} Our main focus is on the approximants to $F_{ab}^{i}$ and\ [(ii)]{} As we shall see in section (\[VII\]), for gauge invariant states we can drop the $\hat{{\cal G}}[N^{i}]$ term altogether and start off from a classical expression wherein the Gauss constraint is already imposed.\ Our treatment will be similar to that for deriving the action of flux operators in [@areaoprtr]. Whence we will first set $\hat{E}^{a}_{i}\ =\ \frac{\hbar}{i}G\gamma \frac{\delta}{\delta A_{a}^{i}}$ and restrict attention to cylindrical functions of *smooth connections*. This will result in an operator whose action can be naturally generalised to functions of generalised connections.\ Note that $$\begin{array}{lll} -{\cal G}[N^{i}]\ =\ -\int_{\Sigma}N^{i}{\cal D}_{a}\tilde{E}^{a}_{i}\ =\ \int_{\Sigma}\left({\cal D}_{a}N^{i}\right)\tilde{E}^{a}_{i} \end{array}$$ Let $h_{e}(A)$ be the holonomy of a smooth connection $A$. In what follows, terms of $\textrm{O}(\delta^{n})$ will be defined in the context of this fixed connection $A$. i.e. $$\begin{array}{lll} \alpha(A,\delta)\ =\ \textrm{O}(\delta^{n})\ <=>\ \lim_{\delta\rightarrow 0,\ A\ \textrm{fixed}}\ \frac{\alpha(A,\delta)}{\delta^{n}}\ \textrm{exists} \end{array}$$ Then, we have the following exact result [@ttbook], $$\begin{array}{lll} -\frac{\delta}{-il_{p}^{2}\gamma}\hat{\cal G}[N^{i}]h_{e}(A)\ =\ \left[-\left(\delta N(v_{1})\right)h_{e}(A)\ +\ h_{e}(A)\left(\delta N(v_{N})\right)\right] \end{array}$$ where $N(v)\ :=\ \frac{N^{i}\tau_{i}}{2}$ and where $v_{1}, v_{N}$ are the beginning and end points of $e$ as in the main text. Next consider the segments $s_{1}$ and $s_{N}$ which are of affine length $\delta$ along the integral curves of $\vec{N}$ emanating from $v_{1}$ , $v_{N}$ respectively.\ Clearly, $$\begin{array}{lll} \frac{h_{s_{1}^{-1}}(A) - 1}{\delta}\ =\ -N^{i}(v_{1})\frac{\tau_i}{2}\ +\ \textrm{O}(\delta)\\ \vspace*{0.1in} \frac{h_{s_{N}}(A)\ - 1}{\delta}\ =\ N^{i}(v_{N})\frac{\tau_i}{2}\ +\ \textrm{O}(\delta) \end{array}$$ Whence, $$\label{ap25-2} \begin{array}{lll} -\frac{\delta}{-il_{p}^{2}\gamma}\hat{\cal G}[N^{i}]h_{e}(A)\ =\ \left[h_{s_{1}^{-1}}\circ h_{e}\circ h_{s_{N}}\ -\ h_{e}\right]\ +\ \textrm{O}(\delta^{2}) \end{array}$$ Thus we define the action of an “approximant" $\hat{{\cal G}}_{T}[N^{i}]$ to $\hat{{\cal G}}[N^{i}]$ (derived above) on cylindrical functions of smooth connections as $$\frac{-\delta}{-il_{p}^{2}\gamma}\hat{{\cal G}}_{T}[N^{i}]\ h_{e}\ =\ h_{s_{1}}^{-1}\cdot h_{e}\cdot h_{s_{N}}\ -\ h_{e}$$ and assume the same action on cylindrical functions of the generalised connections. Whence, $$\label{ap9-1} \left(1 - \frac{\delta}{-il_{p}^{2}\gamma}\hat{{\cal G}}_{T}[N^{i}]\right) (h_{e})_{A}^{\;\;\;\;B}\ =\ (h_{s_{1}}^{-1}\cdot h_{e}\cdot h_{s_{N}})_{A}^{\;\;\;\;B}$$ [**Corollary**]{} :\ If $\vec{N}$ is tangential to $e$, $\hat{{\cal G}}_{T}[N^{i}]$ acts via spatial diffeomorphism of the edge $e$.\ [**Proof**]{} :\ if $\vec{N}$ is tangential to $e$, then (as shown in figure A.1) $$h_{s_{1}}^{-1}\cdot h_{e}\cdot h_{s_{N}}\ =\ h_{\Phi(\vec{N},\delta)\circ e}$$ q.e.d ![image](figA.eps) Fig A.1 Holonomy around infinitesimal loop {#A3} ================================== In this section we show that leading order term in the expansion of $\textrm{Tr}(h_{\gamma_{I}}\tau^{i})$ is precisely $N^{a}F_{ax}^{i}\delta^{2}$.\ For the benefit of the readers, we recall certain structures introduced in the main text which would be needed in this section.\ [**(1)**]{} $\gamma_{I}$ is a loop formed by $e_{I}$ and $\overline{e}_{I} := \phi(\vec{N},\delta)\circ e_{I}$ with the remaining two sides of the loop obtained by joining $b(e_{I})$ with $b(\overline{e}_{I})$ and $f(e_{I})$ with $f(\overline{e}_{I})$ respectively.\ [**(ii)**]{} The y-z co-ordinates are chosen so that $N^{y}, N^{z}$ are positive semi-definite, which implies that $\gamma_{I}$ is transversed clockwise.\ Now the standard results for the expansion of small loop holonomy yields [^15] $$-Tr(h_{\gamma_{I}}\tau^{i})\ =\ -F_{ab}(v)\epsilon^{ab}(v)\int_{S(\gamma_{I})}\epsilon_{ab}\ +\ \textrm{O}(\delta^{3})$$ where $S(\gamma_{I})$ is the surface spanned by $\gamma_{I}$, $\epsilon_{ab}$ is some co-ordinate two form on $S(\gamma_{I})$ and $\epsilon^{ab}$ is it’s inverse. On choosing $S(\gamma_{I})$ to be the open surface in the interior of $\gamma_{I}$ (with it’s boundary being $\gamma_{I}$), we have, $$\begin{array}{lll} \epsilon_{ab}\ =\ dx\wedge d\lambda\\ \vspace*{0.1in} \frac{1}{2}F_{ab}^{i}\epsilon^{ab}\ =\ F_{x\lambda}\ =\ -N^{a}F_{ax}^{i}\\ \vspace*{0.1in} \int_{S(\gamma_{I})}\epsilon_{ab}\ =\ \delta^{2} \end{array}$$ Whence, $$\textrm{Tr}(h_{\gamma_{I}}\tau^{i})\ =\ \delta^{2}N^{a}F_{ax}^{i}\ + \textrm{O}(\delta^{3})$$ Intersection of analytic edges {#A4} ============================== [**Lemma 1**]{}: Let $e_1,e_2$ be compact, connected, non- self intersecting analytic edges which are analytically extendable past their endpoints. Let $e_1, e_2$ intersect in a single point $v$. Let $\phi({\vec N},\delta)$ be as in the main text, with ${\vec N}$ transverse to $e_1,e_2$ except perhaps at their end points. Let $\phi({\vec N},\delta)\circ e_1:=e_1 (\delta ).$ Then there exists $\delta_0$ such that for each $\delta <\delta_0$, we have that $e_1(\delta) \cap e_2$ consists of a finite number of isolated intersection points. [**Proof**]{}: Let the other end point of $e_1$ be $v^{\prime}$. Lets assume the contrary i.e. for any $\delta_0>0$ there exist infinitely many $\delta <\delta_0$ s.t. $e_1(\delta) \cap e_2$ is not a finite number of isolated points. Thus, there exist infinitely many $\delta$ in any open neighbourhood of $\delta =0$ such that $e_1(\delta) \cap e_2$ contains a closed segment of $e_1(\delta)$. Since $e_2$ is connected and analytic, either\ (i) $e_2\subset e_1 (\delta )$ for infinitely many $\delta$ close to zero, or\ (i)$\phi({\vec N},\delta)\circ v^{\prime} \in e_2$ for infinitely many $\delta$ close to zero, or\ (iii) $\phi({\vec N},\delta)\circ v \in e_2$ for infinitely many $\delta$ close to zero. Case (i) is impossible due to the transversality of ${\vec N}$ with respect to $e_1$. To see this, let $p$ be a point in the interior of $e_1$ Transversality implies that for any such point $p$, there exists $\epsilon_0(p)$ such that for every $\epsilon$ with $0<\epsilon <\epsilon_0(p)$, we have that $$\phi({\vec N}, \epsilon )\circ p := p_{\epsilon} \notin e_1 . \label{transverse}$$ On the other hand if case (i) is true then there exist $\delta_1,\delta_2$ with $0<\delta_1<\delta_2<\epsilon_0(p)$, $q\in e_2$, $p\in {\rm Int}e_1$, $p^{\prime}\in e_1$ such that $\phi({\vec N}, \delta_1)\circ p^{\prime}= \phi({\vec N}, \delta_2)\circ p= q$ so that $\phi({\vec N}, \delta_2- \delta_1)\circ p = p^{\prime}\in e_1$ which is in contradiction with condition (\[transverse\]) above. Case (ii) is impossible as the sequence $\phi({\vec N},\delta)\circ v^{\prime}$ converges to $v^{\prime}$ as $\delta$ decreases and $v^{\prime}\notin e_2$ which contradicts the compactness of $e_2$. In case (iii) if ${\vec N}$ is non- vanishing at $v$, the sequence $\phi({\vec N},\delta)\circ v$ converges to $v$ along the integral curve of ${\vec N}$ which contradicts the transversality of $N^a$ with respect to $e_2$. Hence ${\vec N}$ must vanish at $v$. But then it must be the case that either $e_2\subset e_1(\delta )$ for infinitely many $\delta$ close to zero or $\phi({\vec N},\delta)\circ v^{\prime} \in e_2$ for infinitely many $\delta$ close to zero. These are cases (i) and (ii) which we have shown to be impossible. This completes the proof.\ [**Lemma 2**]{}: Let $e_1,e_2$ be compact, connected, non- self intersecting analytic edges which are analytically extendable past their endpoints. Let $e_1 \cap e_2$ be empty. Let $\phi({\vec N},\delta)$ be as in the main text, with ${\vec N}$ transverse to $e_1,e_2$ except perhaps at their end points. Let $\phi({\vec N},\delta)\circ e_1:=e_1 (\delta ).$ Then there exists $\delta_0$ such that for each $\delta <\delta_0$, we have that $e_1(\delta) \cap e_2$ consists of a finite number of isolated intersection points. [**Proof**]{}: We have either case (i) or case (ii) with $v^{\prime}$ being either of the end points of $e_1$ and the proof of impossibility of these cases is identical to that in Lemma 1.\ [**Note**]{}: We believe that the following stronger statement holds:\ There is some $\delta_0$ such that for all $\delta$ with $0<\delta <\delta_0$, we have that $e_1 (\delta )\cap e_2$ is empty. However, since Lemma 2 is sufficient for our purposes we will not attempt to prove the stronger statement here. [999]{} T. Thiemann, [*Class.Quant.Grav.*]{}[**15**]{} 839 (1998) A. Perez, [*Phys.Rev.*]{}[**D73**]{}, 044007 (2006) J. Lewandowski and D. Marolf, [*Phys.Rev.*]{}[**D7**]{} 299(1998) A. Ashtekar and J.Lewandowski, [*Class.Quant.Grav.*]{}[**21**]{} R53 (2004) A.Laddha and M.Varadarajan, [*Phys. Rev.*]{}[**D83**]{} 025019 (2011) T. Thiemann, [*Lessons for Loop Quantum Gravity from Parameterized Field Theory*]{}, e-Print: arXiv:1010.2426 \[gr-qc\]. A. Ashtekar, T. Pawlowski and P. Singh, [*Phys. Rev.*]{}[**D74**]{}, 084003 (2006) C. Rovelli and L. Smolin, [*Nucl.Phys*]{}[**B331**]{}, 80 (1990) T. Jacobson and L. Smolin, [*Nucl. Phys*]{}[B 299]{}, 295 (1988) B. Bruegmann, J. Pullin, [*Nucl. Phys.*]{}[**B 90**]{}, 399 (1993) M. Blencowe, [*Nucl. Phys.*]{} [**B341**]{}, 213 (1990) R. Loll, [*Class. Quant. Grav.*]{}[**15**]{}, 799 (1998) T. Thiemann [*Class. Quant. Grav.*]{}[**15**]{} 1207 (1998) A. Ashtekar, J. Lewandowski, D. Marolf, J. Mourao and T. Thiemann, [*J.Math.Phys.*]{}[**36**]{}, 6456 (1995). A. Laddha and M. Varadarajan, [*Class.Quant.Grav.*]{}[**27**]{}, 175010 (2010) T. Thiemann, (Cambridge Monographs on Mathematical Physics) R.Gambini, J.Lewandowski, D.Marolf, J. Pullin [*Int.J.Mod.Phys.*]{}[**D7**]{} 97 (1999) A. Ashtekar and J. Lewandowski, [*Class. Quant. Grav.*]{}[**14**]{} A55-A82,(1997) [^1]: For an analysis of the diffeomorphism constraint algebra in the context of calculations on a lattice, see [@loll]. [^2]: Due to the density one nature of the form of the constraint considered in [@qsd3], there is no factor of $\delta^{-1}$. As seen in [@habitat2] and emphasized in our concluding section, the absence of this factor yields a trivial action of the operator on the LM habitat. [^3]: The double lines in the figure indicate retraced paths. [^4]: A general analytic edge can always be written as a composition of a finite number of such ‘small enough’ edges; the considerations of section 7 apply to such a composition. [^5]: \[f41\]The simple mechanism behind this reformulation is reflected in the identity $(\epsilon \sum_{i=1}^nx_{i} =\ \left(\prod_{i=1}^{n}(1 + \epsilon x_{i})\ -\ 1\right) + \textrm{O}(\epsilon^2)$ where $\epsilon$ is some small parameter and the $x_i$ are suitably bounded [^6]: By rightwards, we mean in the direction of increasing ‘$x$’. [^7]: This segment will be oriented along $e$ or opposite to $e$ depending on $v^{'}$ and $v^{''}$. [^8]: Recall that the normalised Cartan killing metric on $su(2)$ is $\delta_{ij}$ which is used to define the scalar product on $su(2)$. [^9]: Equation (\[eq:20\]) defines $\hat{O}^{i}\hat{E}^{i}(S^{x}_{I})$. The relevant terms we are analysing above are those terms which have $\hat{f}_{1 I}^{i}E^{i}(S^{x}_{I})$ sitting at the rightmost position in the string. [^10]: This removal can be further justified in the case when two edges which meet at a vertex of $\gamma$ are analytic continuations of each other and the two sets of analytic charts are chosen to agree (this would be the case if, for example, we divided the edge $e$ of section 3 into 2 pieces $e^1, e^2$ with $e=e^2\circ e^1$). In such a case the rightmost cell of the first edge coincides with the left most cell of the second edge and hence the removal just removes this particular overcounting. [^11]: The cardinality of this set could depend on $\delta$ but the important point is that for each such value of $\delta$, it is finite. [^12]: Note that we also need to ensure that the none of the surfaces, $S(I_{p_{\perp}}^{x_{p_{\perp}}})$ which label the fluxes intersect the extra segments $s^{p_{\perp}}_{1}, s^{p_{\perp}}_{N_{p_{\perp}}}$ along the shift vector field. Since the shift is transverse to the edges of $\gamma_{\perp}$ (except at perhaps a finite number of points), the edges of $\gamma_{\perp}$ can intersect these segments at most at a finite number of isolated points which can, once again, be avoided by the surfaces $S(I_{p_{\perp}}^{x_{p_{\perp}}})$ by slightly moving them to the left as above. [^13]: Note that since $\Psi\in {\cal D}^*$, we have that $\Psi (\vert {\bf s}\rangle )= \Psi ({\hat U}_{\phi}\vert {\bf s}\rangle )$ for all diffeomorphisms $\phi$ which leave ${\bf s}$ invariant. Hence, if there exist diffeomorphisms which preserve ${\bf s}$ but permute its vertices, the function $\Psi_{{\bf s}_0}$ also has the property that it is invariant under the corresponding permutation of its arguments. [^14]: Recall that the $j$ label specifies the eigen values of the area operator which is built from the triads [@areaoprtr]. [^15]: our conventions are stated in appendix \[A0\].
The Organic Light Emitting Display (OLED) possesses many outstanding properties of self-illumination, low driving voltage, high luminescence efficiency, short response time, high clarity and contrast, near 180 degree view angle, wide range of working temperature, applicability of flexible display and large scale full color display. The OLED is considered as the most potential display panel. The OLED display element generally comprises a substrate, an anode located on the substrate, a hole injection layer located on the anode, a hole transporting layer located on the hole injection layer, an emitting layer located on the hole transporting layer, an electron transporting layer located on the emitting layer, an electron injection layer located on the electron transporting layer and a cathode located on the electron injection layer. The principle of the OLED element is that the illumination generates due to the carrier injection and recombination under the electric field driving of the semiconductor material and the organic semiconductor illuminating material. Specifically, the ITO pixel electrode and the metal electrode are respectively employed as the anode and the cathode of the OLED element. Under certain voltage driving, the electron and the hole are respectively injected into the electron and hole transporting layers from the cathode and the anode. The electron and the hole respectively migrate from the electron and hole transporting layers to the emitting layer and bump into each other in the emitting layer to form an exciton to excite the emitting molecule. The latter can illuminate after the radiative relaxation. In the Active Matrix (AM) organic light emitting diode display device, the Thin film transistor (TFT) controlling the OLED element is commonly manufactured at the side of the anode, which requires that the TFT has to be p type. The n type mobility of the regular amorphous silicon TFT and the polysilicon TFT is obviously larger than the p type mobility. The utilization of the inverted OLED element structure can make the n type thin film transistor of excellent performance be applied in the pixel circuit of the AMOLED display device to have more options for the driving circuit design of the AMOLED display device. In the Active Matrix (AM) organic light emitting diode display device, the Thin film transistor (TFT) controlling the OLED element is commonly manufactured at the side of the anode, which requires that the TFT has to be p type. The n type mobility of the regular amorphous silicon TFT and the polysilicon TFT is obviously larger than the p type mobility. The method is to drop the function material ink into the predetermined pixel areas with a plurality of nozzles. Then, the required pattern is formed after the solvent is evaporated. The metal nanoparticles provide many excellent optical and electrical properties with their special volume effect, quantum size effect, surface effect and macroscopic quantum tunneling effect.
Dr Gameshow #56 Comedian Marina Franklin (Friends Like Us podcast) joins Jo & Manolo to play listener-created games with callers, including a special call from Elliott Kalan (The Flop House podcast)! Games played: Celebrities, Cele-Birthdays, Sound Effect, and Hot Spicy Diarrhea. This episode is brought to you by RXBAR (www.rxbar.com/GAMESHOW code: GAMESHOW) and Simple Contacts (www.simplecontacts.com/GAMESHOW code: GAMESHOW).
Notice: This opinion is subject to formal revision before publication in the Atlantic and Maryland Reporters. Users are requested to notify the Clerk of the Court of any formal errors so that corrections may be made before the bound volumes go to press. DISTRICT OF COLUMBIA COURT OF APPEALS No. 16-CO-803 GEORGE FADERO, APPELLANT, 03/22/2018 V. UNITED STATES, APPELLEE. Appeal from the Superior Court of the District of Columbia (CF3-3523-11) (Hon. Ronna Lee Beck, Trial Judge) (Submitted January 30, 2018 Decided March 22, 2018) George Fadero, pro se. Channing D. Phillips, United States Attorney at the time the brief was filed, and Elizabeth Trosman, Chrisellen R. Kolb, and O. Andrea Coronado, Assistant United States Attorneys, were on the brief for appellee. Before GLICKMAN, FISHER, and THOMPSON, Associate Judges. FISHER, Associate Judge: Appellant George Fadero challenges the trial court‘s denial of his D.C. Code § 23-110 (2012 Repl.) motion for post-conviction relief. We affirm. 2 I. This case reaches us for the third time. We summarized the facts in Fadero v. United States, 59 A.3d 1239, 1242–44 (D.C. 2013) (Fadero I), and do so only briefly here. On February 12, 2011, a Metropolitan Police Department Officer stopped appellant for a traffic violation. As the officer was walking away from appellant, he turned around to see appellant‘s van slowly moving toward him in reverse. The van hit the officer, knocking him to the ground, and causing him injuries. It then sped away from the scene. The government charged appellant with several offenses based on this conduct, including felony assault on a police officer while armed (―APOWA‖). A jury convicted appellant of four of the charged offenses, including APOWA. We affirmed all convictions, except one, which we held merged with the APOWA count. While that appeal was pending, appellant collaterally attacked the conviction through a § 23-110 motion, claiming ineffective assistance of trial counsel. Fadero v. United States, No. 13-CO-479, Mem. Op. & J. at 1 (D.C. Apr. 23, 2014) (Fadero II). The trial court denied the motion without a hearing, and we affirmed that decision, too. Id. at 4, 6. Appellant filed this second § 23- 3 110 motion pro se. The trial court denied it without a hearing and this appeal followed. II. This appeal focuses on appellant‘s APOWA conviction, an offense that derives from two statutory provisions. See Fadero I, 59 A.3d at 1242 n.1 (defining the elements of APOWA). The first is felony assault on a police officer, D.C. Code § 22-405 (c), which makes it illegal to (1) assault a person when the defendant (2) ―knew or should have known that the victim was a [law enforcement] officer‖ and (3) ―caused a ‗significant bodily injury to the law enforcement officer,‘ or committed ‗a violent act that create[d] a grave risk of causing significant bodily injury to the officer.‘‖ Id. (quoting § 22-405 (c)) (alterations in original). The second predicate is D.C. Code § 22-4502, which provides that defendants may face additional punishment if they commit ―a crime of violence . . . when armed with or having readily available . . . [a] dangerous or deadly weapon.‖ 4 III. Appellant principally argues that the phrase ―grave risk of causing significant bodily injury,‖ incorporated in § 22-405 (c), is unconstitutionally vague in light of Johnson v. United States, 135 S. Ct. 2551 (2015). In that case, the Supreme Court considered a provision of the Armed Career Criminal Act (ACCA) that defined a ―violent felony,‖ in relevant part, as ―any crime punishable by imprisonment for a term exceeding one year . . . that . . . is burglary, arson, or extortion, involves use of explosives, or otherwise involves conduct that presents a serious potential risk of physical injury to another.‖ 135 S. Ct. at 2555–56 (quoting 18 U.S.C. § 924 (e)(2)(B) (2012)) (first alteration in original). The Court referred to the italicized language as the ―residual clause‖ and held it void for vagueness. Id. at 2556, 2557. Appellant analogizes the ―grave risk‖ language in § 22-405 (c) to the ―serious potential risk of physical injury‖ language in the ACCA and contends that if the latter phrase offends due process, the former must as well. We disagree. The holding in Johnson turned on the manner in which that sentencing enhancement provision operated. Whether the residual clause applied depended on whether the given offense created a sufficiently high risk of injury to 5 others. See 18 U.S.C. § 924 (e)(2)(B)(ii). Yet, the Supreme Court had held that the relevant ACCA provision, 18 U.S.C. § 924 (e)(2)(B)(ii), required a ―categorical approach.‖ Taylor v. United States, 495 U.S. 575, 600 (1990). In other words, judges were barred from assessing an offense‘s potential for harm based on the way a defendant committed it. Johnson, 135 S. Ct. at 2557. Instead, § 924 (e)(2)(B)(ii) required judges to ―imagine how the idealized ordinary case of the crime subsequently play[ed] out‖ and evaluate ―whether that abstraction present[ed] a serious potential risk of physical injury.‖ Id. at 2557–58. Defining the ―ordinary‖ way a crime unfolded was a highly subjective exercise—as the Court noted, ―the ordinary instance of witness tampering [could] involve offering a witness a bribe . . . [o]r threatening a witness with violence‖— and as a result, courts measured risk from a ―speculative‖ starting point. Id. In holding the residual clause unconstitutionally vague, the Court emphasized this peculiar context. Id. Section 22-405 (c) does not pose the same concerns. Whether a defendant ―commit[ted] a violent act that create[d] a grave risk of causing significant bodily injury to the officer‖ is a question of fact. See, e.g., Mobley v. United States, 101 A.3d 406, 421 (D.C. 2014) (holding trial judge committed plain error by ―not instruct[ing] the jury that to return a guilty verdict on the APOWA offenses, it 6 must find‖ that the defendant caused a significant bodily injury or created a grave risk thereof (emphasis added)). It turns on the fact-finder‘s assessment of the defendant‘s actual conduct and does not require judges to measure the risk posed by reference to abstractions. See id. Demonstrating this point, on appellant‘s direct appeal, we approved the judge‘s jury instruction on APOWA‘s ―significant bodily injury‖ element, Fadero I, 59 A.3d at 1248, a holding we could only have reached if we assumed that element posed a jury question—that is, one resolved by ―apply[ing] the law to th[e] facts.‖ United States v. Gaudin, 515 U.S. 506, 514 (1995). Similarly, when we held the evidence sufficient to establish that appellant created a ―grave risk‖ of harm to the officer, we based our holding on the risks posed by appellant‘s behavior rather than the potential for harm inherent in the ―ordinary‖ APOWA incident. Fadero I, 59 A.3d at 1252. As appellant‘s own case illustrates, § 22-405 (c) does not share the constitutional defects the Supreme Court perceived in the residual clause. Moreover, § 22-405 (c) is precisely the type of statute the Johnson Court assumed its decision would not affect. The Court stated that ―[a]s a general matter, we do not doubt the constitutionality of laws that call for the application of a qualitative standard such as ‗substantial risk‘ to real world conduct.‖ Johnson, 135 S. Ct. at 2561. Section 22-405 (c)‘s grave risk language fits comfortably in this 7 category—indeed, the Court specifically highlighted the phrase ―grave risk‖ as one it did not view as inherently vague. Id. Because § 22-405 (c)‘s grave risk standard differs from the residual clause in ways the Court deemed ―[c]ritical[],‖ appellant‘s Johnson challenge fails. Id. at 2557. IV. We address appellant‘s remaining arguments summarily. First, appellant challenges the sufficiency of the evidence supporting his convictions for APOWA, Fleeing from Scene of Accident after Causing Personal Injury (D.C. Code § 50- 2201.05 (a)(1) (2001)),1 and Fleeing from a Law Enforcement Officer in a Motor Vehicle (D.C. Code § 50-2201.05b (b)(2) (2001)). On direct appeal, appellant already challenged the sufficiency of the evidence supporting the first two convictions and lost. Fadero I, 59 A.3d at 1251–52. ―It is well-settled that where an appellate court has disposed of an issue on appeal, it will not be considered afresh on collateral attack in a trial court of the same judicial system, absent special circumstances.‖ Doepel v. United States, 510 A.2d 1044, 1045–46 (D.C. 1986). Appellant has identified no such special circumstances; accordingly, the trial court 1 After appellant lost on direct appeal, the Council of the District of Columbia repealed, amended, and recodified this provision as § 50-2201.05 (c) (2014 Repl.). 8 properly held that the sufficiency challenges to the first two convictions were procedurally barred. With respect to the third conviction, appellant did not raise a sufficiency challenge on direct appeal even though the argument was available to him. See Fadero I, 59 A.3d at 1251–52. Consequently, he may only assert the claim in this § 23-110 proceeding if he can establish cause for and prejudice from his failure to make the argument previously. (Charles) Thomas v. United States, 772 A.2d 818, 824 (D.C. 2001). Appellant has not attempted such a showing, and, as a result, the trial court did not err in rejecting the third sufficiency challenge on procedural grounds.2 Next, appellant argues that § 22-405 (c) does not qualify as a ―crime of violence‖ under § 22-4502 because crimes of violence require intentional conduct and, he asserts, § 22-405 (c) does not. Appellant relies primarily on federal cases for the supposed rule that whether an offense qualifies as a crime of violence depends on its intent element; however, the United States and the District of 2 Moreover, appellant did not explain why the evidence at trial was insufficient, making his argument too ―perfunctory‖ for our review. See Comford v. United States, 947 A.2d 1181, 1188 (D.C. 2008) (quoting United States v. Zannino, 895 F.2d 1, 17 (1st Cir. 1990)). 9 Columbia define ―crime of violence‖ in ―very different‖ ways. Colter v. United States, 37 A.3d 282, 283 (D.C. 2012). While the United States Code defines such crimes by their ―characteristics,‖ see 18 U.S.C. § 16, the D.C. Code identifies them ―by reference to a list of the offenses so designated.‖ Id. (describing the relationship between § 22-4502 and § 23-1331 (4), the provision that enumerates ―crimes of violence‖). ―[A]ssault on a police officer (felony)‖—D.C. Code § 22- 405 (c)—appears on that list. D.C. Code § 22-1331 (4). Therefore, it qualifies as a crime of violence regardless of whether it would satisfy the federal definition.3 Finally, appellant argues that the government violated article I, § 1 of the United States Constitution (―All legislative Powers herein granted shall be vested in a Congress of the United States. . . .‖) by charging him with APOWA, an offense appellant contends the legislature never established. Appellant did not raise this challenge to the indictment before trial. That makes the contention 3 The trial court held this claim procedurally barred, and the government urges that we do the same. We do not address the procedural arguments because we choose to reject the claim on the merits. In doing so, we exercise our authority to affirm the trial court‘s judgment on ―alternative ground[s].‖ James v. United States, 718 A.2d 1083, 1089 (D.C. 1998) (affirming trial court‘s denial of § 23-110 motion on different rationale than trial court invoked). Resolving appellant‘s claim in this way is not procedurally unfair to him. The government made the dispositive argument in its brief. Appellant could have responded to it but choose not to file a reply brief. Cf. District of Columbia v. Patterson, 667 A.2d 1338, 1347 (D.C. 1995) (disposing of claim based on argument raised in defendant‘s brief to which plaintiff failed to respond in its reply brief). 10 untimely, see Super. Ct. Crim. R. 12 (b)(3)(B)(v), and appellant has not attempted to excuse his delay by showing ―good cause,‖ see id. at 12 (c)(3). Accordingly, the trial court did not err in holding the argument procedurally barred. Cf. Ko v. United States, 722 A.2d 830, 836 n.17 (D.C. 1998) (―By failing to assert the claim of duplicity [in the indictment] at trial, Ko waived it.‖). Even if appellant had followed proper procedures, his claim would still fail. In essence, appellant contends that the legislature did not intend prosecutors to combine D.C. Code §§ 22-405 (c) and -4502 (a)(1) into a single, chargeable offense. To the contrary, by enacting § 22-4502, the legislature authorized increased punishment for a broad category of offenses committed in an aggravated manner. It did so by ―add[ing] an additional element, i.e., while armed with or having readily available a dangerous weapon, to certain underlying offenses.‖ (Michael) Thomas v. United States, 602 A.2d 647, 653 n.18 (D.C. 1992). Thus, it was the legislature, not the executive branch, that established aggravated offenses such as APOWA, murder while armed, and armed robbery. Consistent with that plain reading, this court treats such offenses no differently from any others. See, e.g., Robinson v. United States, 100 A.3d 95, 105 (D.C. 2014) (applying traditional aiding and abetting liability principles to ―while armed‖ offenses); Pope v. United States, 739 A.2d 819, 821 (D.C. 1999) (discussing ―the offense of assault 11 with intent to kill while armed (AWIKWA), [a] violation of D.C. Code §§ 22-503, -3202 [the predecessor of -4502]‖ (emphasis added)). Accordingly, we reject appellant‘s premise: APOWA is an offense created by the legislature and, therefore, the prosecutor could not contravene legislative will—let alone usurp legislative powers—by charging him with it.4 V. Appellant‘s arguments have no merit. Thus, we affirm the trial court‘s denial of his § 23-110 motion. So ordered. 4 Appellant‘s argument suffers an additional defect: in relying on U.S. Const. art I, § 1, it assumes that Congress retains exclusive power to legislate for the District of Columbia. This is not so. Under the Home Rule Act, Congress delegated significant legislative authority to the Council of the District of Columbia, including the power ―to enact new criminal statutes.‖ In re Perrow, 172 A.3d 894, 898 (D.C. 2017); see also D.C. Code § 1-203.02 (2012 Repl.).
Q: QRunnable and passing a Pointer I'm trying to pass a pointer (ImageInput) to the QRunnable::run() method. The compiler compiles and I get no errors. But when I try to use the variable in run(), the program crashes. Does somebody know where the mistake is? Here is a minimum sample: Function, where I'm creating the thread (actually only one): bool framesource::MapRealToMat (std::vector<cv::Point3f> &PointVec) { cv::Mat TestMat = cv::Mat::ones(424, 512, CV_32FC1); ThreadClass *Part1 = new ThreadClass(PointVec,&TestMat); QThreadPool::globalInstance()->start(Part1); } Class, where I'am using the run() method: class ThreadClass : public QRunnable { public: ThreadClass(std::vector<cv::Point3f> &PointVecInput, cv::Mat *ImageInput): PointVec (PointVecInput), Image (ImageInput) { } private: QMutex mutex; std::vector<cv::Point3f> PointVec; cv::Mat* Image; void run(); }; void ThreadClass::run() { bool wait = true; while(wait) { if(mutex.tryLock()) { //Do something with the image, example: cv::imshow("test",*Image); mutex.unlock(); wait = false; } } } The Pointer points at the aimMat, which should fill by 8 threads. And each thread work in a different image area. But actually I'm using only one thread and one AOI. Thank you for your help. A: You have cv::Mat TestMat = cv::Mat::ones(424, 512, CV_32FC1); which defines TestMat as a local variable. Local variables go out of scope when the function returns. That means the TestMat object will be destructed and its memory will be reclaimed when MapRealToMat exits. After the definition of TestMa you do: ThreadClass *Part1 = new ThreadClass(PointVec,&TestMat); Here you pass a pointer to the local variable to your class. The problem with this should be obvious after reading the previous paragraph. The pointer will, after the return of MapRealToMat, no longer point to a valid object. The simple solution is probably to pass the TestMat object by value instead of using pointers.
/* Copyright 2017-2020 Intel Corporation Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ #include "PresentMon.hpp" namespace { typedef BOOL(WINAPI *OpenProcessTokenProc)(HANDLE ProcessHandle, DWORD DesiredAccess, PHANDLE TokenHandle); typedef BOOL(WINAPI *GetTokenInformationProc)(HANDLE TokenHandle, TOKEN_INFORMATION_CLASS TokenInformationClass, LPVOID TokenInformation, DWORD TokenInformationLength, DWORD *ReturnLength); typedef BOOL(WINAPI *LookupPrivilegeValueAProc)(LPCSTR lpSystemName, LPCSTR lpName, PLUID lpLuid); typedef BOOL(WINAPI *AdjustTokenPrivilegesProc)(HANDLE TokenHandle, BOOL DisableAllPrivileges, PTOKEN_PRIVILEGES NewState, DWORD BufferLength, PTOKEN_PRIVILEGES PreviousState, PDWORD ReturnLength); struct Advapi { HMODULE HModule; OpenProcessTokenProc OpenProcessToken; GetTokenInformationProc GetTokenInformation; LookupPrivilegeValueAProc LookupPrivilegeValueA; AdjustTokenPrivilegesProc AdjustTokenPrivileges; Advapi() : HModule(NULL) { } ~Advapi() { if (HModule != NULL) { FreeLibrary(HModule); } } bool Load() { HModule = LoadLibraryA("advapi32.dll"); if (HModule == NULL) { return false; } OpenProcessToken = (OpenProcessTokenProc) GetProcAddress(HModule, "OpenProcessToken"); GetTokenInformation = (GetTokenInformationProc) GetProcAddress(HModule, "GetTokenInformation"); LookupPrivilegeValueA = (LookupPrivilegeValueAProc) GetProcAddress(HModule, "LookupPrivilegeValueA"); AdjustTokenPrivileges = (AdjustTokenPrivilegesProc) GetProcAddress(HModule, "AdjustTokenPrivileges"); if (OpenProcessToken == nullptr || GetTokenInformation == nullptr || LookupPrivilegeValueA == nullptr || AdjustTokenPrivileges == nullptr) { FreeLibrary(HModule); HModule = NULL; return false; } return true; } bool HasElevatedPrivilege() const { HANDLE hToken = NULL; if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &hToken)) { return false; } /** BEGIN WORKAROUND: struct TOKEN_ELEVATION and enum value TokenElevation * are not defined in the vs2003 headers, so we reproduce them here. **/ enum { WA_TokenElevation = 20 }; DWORD TokenIsElevated = 0; /** END WA **/ DWORD dwSize = 0; if (!GetTokenInformation(hToken, (TOKEN_INFORMATION_CLASS) WA_TokenElevation, &TokenIsElevated, sizeof(TokenIsElevated), &dwSize)) { TokenIsElevated = 0; } CloseHandle(hToken); return TokenIsElevated != 0; } bool EnableDebugPrivilege() const { HANDLE hToken = NULL; if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &hToken)) { return false; } TOKEN_PRIVILEGES tp = {}; tp.PrivilegeCount = 1; tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; bool enabled = LookupPrivilegeValueA(NULL, "SeDebugPrivilege", &tp.Privileges[0].Luid) && AdjustTokenPrivileges(hToken, FALSE, &tp, sizeof(TOKEN_PRIVILEGES), nullptr, nullptr) && GetLastError() != ERROR_NOT_ALL_ASSIGNED; CloseHandle(hToken); return enabled; } }; int RestartAsAdministrator( int argc, char** argv) { char exe_path[MAX_PATH] = {}; GetModuleFileNameA(NULL, exe_path, sizeof(exe_path)); // Combine arguments into single array char args[1024] = {}; for (int idx = 0, i = 1; i < argc && (size_t) idx < sizeof(args); ++i) { if (idx >= sizeof(args)) { fprintf(stderr, "internal error: command line arguments too long.\n"); return false; // was truncated } if (argv[i][0] != '\"' && strchr(argv[i], ' ')) { idx += snprintf(args + idx, sizeof(args) - idx, " \"%s\"", argv[i]); } else { idx += snprintf(args + idx, sizeof(args) - idx, " %s", argv[i]); } } SHELLEXECUTEINFOA info = {}; info.cbSize = sizeof(info); info.fMask = SEE_MASK_NOCLOSEPROCESS; info.lpVerb = "runas"; info.lpFile = exe_path; info.lpParameters = args; info.nShow = SW_SHOW; if (!ShellExecuteExA(&info) || info.hProcess == NULL) { fprintf(stderr, "error: failed to elevate privilege "); int e = GetLastError(); switch (e) { case ERROR_FILE_NOT_FOUND: fprintf(stderr, "(file not found).\n"); break; case ERROR_PATH_NOT_FOUND: fprintf(stderr, "(path not found).\n"); break; case ERROR_DLL_NOT_FOUND: fprintf(stderr, "(dll not found).\n"); break; case ERROR_ACCESS_DENIED: fprintf(stderr, "(access denied).\n"); break; case ERROR_CANCELLED: fprintf(stderr, "(cancelled).\n"); break; case ERROR_NOT_ENOUGH_MEMORY: fprintf(stderr, "(out of memory).\n"); break; case ERROR_SHARING_VIOLATION: fprintf(stderr, "(sharing violation).\n"); break; default: fprintf(stderr, "(%u).\n", e); break; } return 2; } WaitForSingleObject(info.hProcess, INFINITE); DWORD code = 0; GetExitCodeProcess(info.hProcess, &code); int e = GetLastError(); (void) e; CloseHandle(info.hProcess); return code; } } // Returning from this function means keep running in this process. void ElevatePrivilege(int argc, char** argv) { auto const& args = GetCommandLineArgs(); // If we are processing an ETL file, then we don't need elevated privilege if (args.mEtlFileName != nullptr) { return; } // Try to load advapi to check and set required privilege. Advapi advapi; if (advapi.Load() && advapi.EnableDebugPrivilege()) { return; } // If user requested to run anyway, warn about potential issues. if (!args.mTryToElevate) { fprintf(stderr, "warning: PresentMon requires elevated privilege in order to query processes\n" " started on another account. Without elevation, these processes can't be\n" " targetted by name and will be listed as '<error>'.\n"); if (args.mTerminateOnProcExit && args.mTargetPid == 0) { fprintf(stderr, " -terminate_on_proc_exit will also not work.\n"); } return; } // Try to restart PresentMon with admin privileve exit(RestartAsAdministrator(argc, argv)); }
Hyperbolic navigation systems such as loran and omega, as well as satellite navigation systems have been utilized to place the position of a vessel within plus or minus fifty feet in certain circumstances. While these units have operated separately quite satisfactorily to give the operator of a vessel an idea of his location, unless expert personnel are utilized in the operation of this equipment, due to its complexity it is almost impossible in an emergency situation to instruct a person on how to utilize the particular navigation unit. In order to overcome the complexities of indicating position under emergency situations in which panic is likely to occur, the Coast Guard has in the past reviewed a system in which a transponder tethered to a vessel is utilized to receive the hyperbolic navigation signals and to retransmit them to Coast Guard reception points where they are processed so that the location of the vessel can be ascertained. Typically these devices are of a low power variety and are carried by a helium filled balloon or other such device as high above the vessel as possible while still being tethered thereto in order to provide for increased range and reliability necessary in order to locate the vessel. Unfortunately, either due to cost or due to problems with such low level retransmitted signals, such a system is not presently in place and it is only with difficulty that the Coast Guard or other agency can locate a vessel in distress. While it has long been possible to locate vessels in distress through the utilization of emergency locators beacons and triangulation, success with triangulation in terms of the personnel utilized for such purposes, as well as the variability of the equipment involved, make such triangulation systems unreliable. A further reason for the unreliability in such systems is the variable signal strength of the transmitters utilized on the vessels in distress. While it is indeed true, that individuals can turn on their loran or other navigation units and read the latitude and longitude directly into a microphone coupled to a transmitter such as a VHF transmitter, under panic situations this is not always possible. Moreover due to the complexity of the front panels of most hyperbolic or satellite navigation units an uninitiated person cannot adequately even turn on the unit much less obtain the required reading to be able to transmit it by radio. It is therefore an object of this invention to provide a more foolproof method of providing the location of a vessel in distress to the appropriate authorities in an automatic fashion which can be simply utilized and which utilizes existing emergency frequencies. It is also an object of this invention to provide a system which is disabled by the appropriate authority through the utilization of a specialized channel once the information as to location has been ascertained or once the vessel has been physically sighted. A further object of the present invention is to provide that the transmission of emergency information does not impair the operation of the navigation receiver either through interference or inadvertent overload.
Mario Draghi, president of the European Central Bank, has insisted the euro zone’s recovery remains on track, despite acknowledging threats to growth had “heightened” due to crises in Ukraine and the Middle East. The ECB kept rates on hold for the second month in a row and offered no hint that it had moved closer to embarking on broad-based asset purchases, known as quantitative easing. Mr Draghi acknowledged that momentum had weakened in the euro zone in the second quarter and an escalation of political tensions would inflict further damage. He maintained a weak recovery would continue and longer-term inflation expectations remained anchored to the ECB’s target of below but close to 2 per cent. The ECB president called on governments to boost the recovery, blaming a lack of labour market reform and excessive business regulations in Italy for its fall back into recession. Gilles Moec, of Deutsche Bank, said Mr Draghi’s remarks suggested “governments should focus on their own shortcomings rather than asking the ECB for more”. June measures Mr Draghi said monetary policy would provide more support in the months ahead as the package of measures announced in June took full effect. The central bank will hold the first of the six targeted longer-term refinancing operations, or TLTROs, which require banks to sign up to commitments on lending and are widely seen as the most important strand of the June package, in September. Market estimates of a “sizeable” take-up of the offer of cheap, fixed-rate, four-year loans, of between €450 billion and €850 billion of a possible €1 trillion, were confirmed by the ECB president. The euro, which has fallen by more than 2 per cent against the dollar since the start of June to $1.335, was likely to depreciate further, supporting euro zone companies by lowering the price of their products against competitors outside the currency area. “Markets have perceived that . . . monetary policies in the euro [zone] and the United States are, and are going to stay, on a diverging path,” Mr Draghi said. “The fundamentals for a weaker exchange rate are much better than they were two or three months ago.” The US central bank is expected to stop buying US Treasuries in the autumn and to raise rates towards the middle of next year. – Copyright The Financial Times Limited 2014
40 N.J. Super. 34 (1956) 122 A.2d 15 RALPH R. MORRIS, ET AL., PLAINTIFFS, v. TOWNSHIP OF ELK, IN THE COUNTY OF GLOUCESTER AND STATE OF NEW JERSEY, DEFENDANT. Superior Court of New Jersey, Law Division. Decided April 7, 1956. *35 Mr. David Novack, attorney for plaintiffs. Mr. Joseph Mennite, attorney for defendant. CAFIERO, J.S.C. This is an action in lieu of prerogative writs to review the legality and reasonableness of an ordinance regulating the parking and location of automobile trailers and regulating the licensing, location, erection, maintenance and conduct of automobile trailer camps and providing a penalty for the violation thereof, in the Township of Elk in so far as it affects the plaintiffs. Plaintiff James O. Keane is the owner of a vacant lot having a curtilage of 50' by 100' which he has leased to plaintiff Ralph R. Morris, who has parked thereon a self-contained house trailer owned and occupied by him and his family. Defendant contends that the placing of a single trailer on any property in the township constitutes the lot a trailer camp and subjects the owner thereof to the provisions of the ordinance. It is evident that the Township of Elk is seeking to regulate the use of trailers as dwellings within its boundaries. *36 By dissecting the ordinance, it appears that it may be divided into two distinct regulatory measures. I. It purports to regulate the parking and location of automobile trailers, which it defines as "a vehicle or structure so designed and constructed in such manner as will permit occupancy thereof as sleeping quarters for one or more persons, * * *" and by Section 3(a) declares it "unlawful, within the limits of the Township of Elk, for any person to park any trailer on any street, alley, or highway, or other public places, or on any tract of land owned by any person, occupied or unoccupied, within the Township of Elk, except as provided in this ordinance." That is, Section 3(c)(a), "A trailer shall not be parked or occupied on any lot situate outside of an approved trailer camp if the same is to be used as living quarters." Section 4: "If the wheels are removed from any trailer and it is attached to the land in any permanent or semi-permanent manner, a permit must be obtained from the building inspector and all the requirements of the building, land subdivision, plumbing, sanitary, health, zoning and electrical ordinances must be complied with." II. It also purports to regulate and license, location, erection, maintenance and conduct of automobile trailer camps and provide a penalty for the violation thereof. A "trailer camp" is defined as "any park, trailer park, trailer court, court, camp, site, lot, parcel, or tract of land designed, maintained or intended for the purpose of supplying a location or accommodations for any trailer coach or trailer coaches and upon which any trailer coach or trailer coaches are parked. * * *" The ordinance then proceeds to declare it "unlawful for any person to establish, operate or maintain, or permit to be established, operated or maintained upon any property owned or controlled by him, a trailer camp * * * without having first secured a license therefor." It sets forth the method of applying for a license, the application requirements, the fees to be charged for a license, both an annual and a use fee for each unit, declaring the same to be necessary for revenue purposes as well as *37 for "inspection, supervision, public health, fire, police protection and similar governmental functions, and for the additional cost to the Township of furnishing and maintaining educational facilities for children of the occupants of the trailers." It sets up the specifications for the camp plan, the water supply, service buildings and accessory accommodations, waste and garbage disposal and management. It provides for inspection and enforcement of the ordinance, revocation and suspension of a license and public hearing for any grievance on the granting, denial, renewal or revocation of a license, as well as the penalty for the violation thereof. Thus, by applying the provisions of the ordinance to the circumstances of this case, there are two issues raised. 1. May a municipality prohibit the use of a trailer as a dwelling when the same is located on a privately owned lot unless its wheels are removed and it is made a permanent or semi-permanent structure attached to the land and subject to the provisions of sundry other building, sanitation, and zoning ordinances; or unless it is parked in a trailer camp? 2. May a municipality declare that the placing of a single trailer on a privately owned lot constitutes the premises a camp site subject to regulation and license? The questions will be considered in reverse order. In the pretrial order defendant alleged that it had the power and authority to enact the ordinance under N.J.S.A. 40:52-1 (d): "The governing body may make, amend, repeal and enforce ordinances to license and regulate: * * * * * * * * d. Hotels, boarding houses, lodging and rooming houses, trailer camps and camp sites, and all other places and buildings used for sleeping and lodging purposes, restaurants and all other eating places, and the keepers thereof * * *." and R.S. 40:52-2: "The governing body may fix the fees for all such licenses which may be imposed for revenue, and may prohibit all unlicensed persons *38 and places and vehicles, businesses and occupations from acting, being used, conducted or carried on; impose penalties for violation of ordinances providing for licenses, and revoke any license for sufficient cause and after notice and hearing." It is not disputed that this statute is the source from which defendant derives its power to regulate trailer camps and camp sites. But does the placing of one trailer on a vacant lot of land constitute a camp site? Defendant argues in the affirmative and further argues that its ordinance "does not attempt to regulate any business, but only to regulate a `trailer camp,' i.e., the placing or situating in Elk Township of an occupied trailer coach on a piece of land sufficient to accommodate it which thus creates a `trailer camp.'" Said the court in Salomon v. Jersey City, 12 N.J. 379, 390 (1952): "* * * we consider that the primary and overriding purpose of the Legislature in enacting R.S. 40:52-1, N.J.S.A. and R.S. 40:52-2, N.J.S.A., was to authorize municipalities to license and regulate, as police measures for the public health, safety, morals or welfare, the local businesses described therein, and only incidentally to impose on the businesses thus licensed and regulated license fees for revenue which may, at least within reasonable limits, exceed the regulatory costs." See also Weiner v. Borough of Stratford, 15 N.J. 295 (1954). "This act provides purely and plainly for the regulation and licensing of businesses * * * where regulation is a necessity in order to protect and promote the health, safety, morals and general welfare of the community." Devine v. Mantua Township, Gloucester County, 28 N.J. Super. 299 (Law Div. 1953). Thus, we find that the municipality can only regulate and license trailer camps by regulating and licensing the "business" of trailer camps, and a business being a commercial enterprise for profit, the position of the defendant that the placing of one trailer upon land owned or leased by the occupant is untenable. The mere placing of one trailer or 20 trailers upon a land area does *39 not constitute a trailer park or camp site. It is the conduct of the business which the municipality has the right to regulate and to license, and not the placing of a trailer which is determinative of the question. A municipality does not have the authority to place a citizen in the business of operating and maintaining of a trailer camp when he is but the owner and occupier of a trailer, and the individual trailer owner does not fall within any one of the categories listed in N.J.S.A. 40:52-1. Insofar as that part of the ordinance under review which seeks to regulate campsites and trailer camps applies to the plaintiffs' situation, it is unconstitutional, arbitrary, unreasonable and invalid and the plaintiffs will not be required to comply therewith. It is unnecessary to consider the first question raised at this time because the attempt to regulate under the guise of licensing as provided in the ordinance under review is ultra vires and illegal. Devine v. Mantua Township, Gloucester County, supra. By the ordinance it is sought to prohibit the owner of a trailer from parking or placing the same upon his own land for the purpose of occupancy. Plainly, prohibition, as distinguished from regulation, is not contemplated by the statute. Restraints and regulations imposed for the general good and welfare must be reasonable and should not, in the name of the police power, be an unreasonable curtailment of personal or property rights. The ordinance insofar as it attempts to regulate and license an individual trailer parked on privately owned land, occupied by its owner is void. Judgment for the plaintiffs without costs. Submit order.
Screenshots Details The domestic dog (Canis lupus familiaris[3] and Canis lupus dingo[1][2]) is a domesticated form of the gray wolf, a member of the Canidae family of the order Carnivora. The term is used for both feral and pet varieties. The dog may have been the first animal to be domesticated, and has been the most widely kept working, hunting, and companion animal in human history. The word "dog" may also mean the male of a canine species,[4] as opposed to the word "bitch" for the female of the species.[5] Users review Related Apps The extensive collection of best quotes grouped by category. The best collection of quotes about Birthday and Merry Christmas wishes . * Share the best quotes with your friends and family * As well as Share love quotes, i love you sayings , time quotes , age quotes , work quotes , dream quotes & much more different categories * Add best quot… Hi, I'm Johnny. I'm going to run to HEAVEN today. I'm running to HEAVEN. Touch screen when I'm about to drop to HELL, please. After playing, you can register the world heaven ranking. If you don't mind. It's up to you. Evil Fluffs have invaded, blanketing city after city with snow in an effort to make winter permanent. Do you have what it takes to save the world from never ending snow? SnowBomber is a fast paced game that's sure to get your blood pumping. How else will you fend of frostbite? Armed with only your slingshot and your guts,… Watch out! Dario, the talking dancer is a hungry dancing machine! Talk to him, and he talks back to you. The perfect talking children's app for all ages! With high-quality 3d graphics, shake, make a crazy dance, feed and most importantly, talk to and hear your talking pet talk back! Now you can see your favorite app on HD quality! Download t… Tap on the screen whenever you come across an obstacle and be quick with the reflexes!. Gravity Guy is a great arcade game for Android in which you live in a world where gravity laws are broken and Gravity Guy is the Hero, who needs to keep running in order to escape from the Gravity Troops and avoid all the obstacles by flipping the gravity, that…. Tap on the screen whenever you come across an obstacle and be quick with the reflexes!. Gravity Guy is a great arcade game for Android in which you live in a world where gravity laws are broken and Gravity Guy is the Hero, who needs to keep running in order to escape from the Gravity Troops and avoid all the obstacles by flipping the gravity, that….
Product Description Details Toronto Rose Lever Handles We recommend using a lock or latch with a backset of between 45mm and 60mm although longer ones can be used if you wish to have the handles set further back from the edge of the door. Comes complete with an 8mm Spindle and Fixing Screws. Additional Information Additional Information Product Reference LEV.KAR.00ER71.SSS Finish No Dimensions (mm) Rose Diameter 52mm Rose Thickness 10mm Projection 58mm Lever Length 142mm Unit Pair Fixings Concealed Fixing Available Finishes Satin Stainless Steel Reviews Write Your Own Review You're reviewing: Toronto Rose Lever Handles How do you rate this product? * 1 star 2 stars 3 stars 4 stars 5 stars Price Value Quality *Nickname *Summary of Your Review *Review About Fulham Brass Fulham Brass and Ironmongery Limited have been supplying door furniture and window furniture from their Fulham Road showroom since 1987 and have consistently offered one of the largest ranges in London. This service is also available nationally and internationally through this website.
Prime Minister Justin Trudeau commended Iran for following through the nuclear deal and it’s a “victory for quiet diplomacy everywhere.”
Caries experience and overall health status. The aim of this work was to evaluate whether self-reported systemic diseases were associated with caries experience. Medical history data and caries experience (DMFT and DMFS; Decayed, Missing due to caries, Filled Teeth/Surface) were obtained from the University of Pittsburgh School of Dental Medicine dental registry and DNA repository. Information on 1,281 subjects was evaluated (839 with primary caries and 492 with secondary caries experience). Regression analysis was used to test for association between caries experience and disease status. Associations were found between caries experience and specific conditions: stroke (R2 = 0.007, P = 0.001), asthma (R2 = 0.003, P = 0.025), hepatitis (R2 = 0.009, P = 0.0001), liver disease (R2 = 0.009, P = 0.00001), high blood pressure (R2 = 0.072, P = 0.00001) and diabetes (R2 = 0.03, P = 0.00001). We found primary caries to be associated with hepatitis (DMFT with R2 = 0.011, P = 0.002 and DMFS with R2 = 0.008, P = 0.006). We also found an association between secondary caries and asthma (DMFS with R2 = 0.006, P = 0.04), high blood pressure (DMFT with R2 = 0.014, P = 0.005 and DMFS with R2 = 0.043, P = 0.00001) and diabetes (DMFT with R2 = 0.013, P = 0.007 and DMFS with R2 = 0.023, P = 0.00001). Hepatitis, asthma, high blood pressure, stroke, liver disease and diabetes are associated with higher caries experience.
Effects of (R)-8-OH-DPAT and the enantiomers of UH-301 on motor activities in the rat: antagonism of (R)-8-OH-DPAT-induced effects. The effects of the enantiomers of 5-fluoro-8-hydroxy-2-(dipropylamino)tetralin, UH-301 and the potent 5-HT1A-receptor agonist (R)-8-hydroxy-2-(dipropylamino)tetralin, (R)-8-OH-DPAT, on locomotion, rearing and total activity were studied in rats. The experiments were performed as tests either of exploratory activity in non-habituated rats or of motor activity of rats habituated to the environment for 2 h before drug injection. (R)-8-OH-DPAT increased locomotion and total activity and decreased rearing in both conditions. (R)-UH-301 increased locomotion and slightly also total activity in habituated rats and decreased rearing in both conditions. (S)-UH-301 decreased locomotion and rearing in both conditions but only in doses of 10 mumol/kg and above. Lower doses of (S)-UH-301 (10 mumol/kg) antagonized (R)-8-OH-DPAT-induced increases of locomotion and total activity. As (S)-UH-301 decreased rearing, per se, it was not able to antagonize the (R)-8-OH-DPAT induced decrease. These results further support previous data that (S)-UH-301 is a 5-HT1A antagonist while (R)-UH-301 is a 5-HT1A agonist.
Q: Get mail attachment information with Apache Camel How can I get mail attachment information with Apache Camel, having an Exchange object already? A: If you have a maven project, you can use this dependency: <dependency> <groupId>org.apache.camel</groupId> <artifactId>camel-mail</artifactId> <version>x.y.z</version> </dependency> and then if you already have an Exchange object, you can try this: Message message = exchange.getIn(); if (message.getAttachments().size() > 0) { for (Map.Entry<String, DataHandler> entry : messageCopy.getAttachments().entrySet()) { DataHandler dataHandler = entry.getValue(); //get the document filename String attchmentFilename = dataHandler.getName(); String decodedFilename = MimeUtility.decodeText(attchmentFilename); //get inputstream of attachment file InputStream is = dataHandler.getInputStream(); //generic function for extracting attachment content extractor(is); } } I suggest to use Apache Tika inside extractor function for obtaining attachment content and other information
Sony NEX FS-700 Top Mount Accessory Plate Sony NEX FS-700 Top Model Accessory Plate This top mount accessory plate allows you to mount just about anything you can think of on top of your FS-700. The plate is loaded with tapped holes in both the Berkey System standard and in RED standard spacing so that you can use any of our standard 15 mm accessories or any of our RED accessories to customize your FS-700 for your shooting style. Add handles, monitors, EVF’s, top mount iris rods and more…way more than I can think of at this late hour. Installation is super easy, just remove the factory top handle, place our plate on top and fasten with the three provided fasteners and replace the factory handle and you’re done. No need to remove the factory cold shoe or the lens hook. Sold with all needed fasteners and a lens hook. Price is $225.00.
Q: Single I2C EEPROM 24C02 uses all eight addresses by itself I was scanning for a used address by I2C EEPROM (24C02). Contrary to my expectations, it returned all eight possible addresses (0x50-0x57) instead of the hardwired one. I thought the problem was in a faulty chip, but changing to a new one didn't fix the problem. Is this a "feature"? I hope not, as it would eliminate the purpose of having multiple EEPROMs connected to the same I2C bus. I tried to search on this topic, but only found this: ATMEL 24C02 EEPROM - Trouble understanding how the addressing works. Sadly, it doesn't answer my question, so I hope someone knows that is going on. The EEPROM that I am using has markings ATMEL711 24C02 PU24 D. Edit1: Here are example waveforms when I am trying to read one byte from EEPROM (hardwired to 0x50): As you can see, both addresses work (0x50 and 0x53) eventhou hardwired address is 0x50. Edit2: Here is the schematic showing how the EEPROM is connect. Pull-up resistors on SDA and SCL lines are present but not shown here. A: Got exactly the same behavior on eeprom modules from Banggood. The chips are marked ATMEL719 24C02N PU27 D 24C04 parts, also from Banggood, works normally. Chips marked ATMEL178 24C256 PU27 D are also strange. They respond to two addresses (i.e. 57 and 5f) and all 3 address select pins will modify the i2c address pair (i.e. 50 to 57 and 58 to 5f). The genuine chip has just one active address and only use the A0 and A1 pins, according to the data sheet. Caveat Emptor
Q: Is it possible to specify function as parameter's default value? Let's say that I have a function as below: def func(x: Int)(f: Int => Boolean) = f(x) Is it possible to define a default value for the function? def func(x: Int)(f: Int => Boolean = defaultFunc) = f(x) Where defaultFunc is a function that goes from Int to Boolean. I will anyways try this out by myself, but just thought of posting it here! A: Yes, it's possible, as you could find out by yourself using REPL or scalafiddle: def defaultFunc(x: Int): Boolean = ??? // defaultFunc: (x: Int)Boolean def func(x: Int)(f: Int => Boolean = defaultFunc) = f(x) // func: (x: Int)(f: Int => Boolean)Boolean
RENOWNED FOOTBALL PERSONALITIES Jeff Stelling and Chris Kamara have arrived in Ireland to discover the wonder of Gaelic football. And one of their first stops as part of the journey brings them to Dingle in Kerry. Jeff Stelling, Chris Kamara and Mícheál Ó Muircheartaigh are given a céad míle fáilte to Páirc an Ághasaigh for today's game pic.twitter.com/w7f0gVoKdQ — Dingle GAA (@DingleGAA) July 6, 2017 Source: Dingle GAA /Twitter The pair are in town to commentate on a juvenile game between Dingle and the Gaeltacht, as part of a initiative conducted by AIB. According to Radio Kerry, legendary GAA comentator Mícheál Ó Muircheartaigh may also be attending the game to give the Sky Sports duo some advice. While in Ireland, Stelling and Kamara will visit local GAA clubs to get a better understanding of how they are linked with the inter-county game and will be meeting up with some prominent GAA pundits. Whoops! We couldn't find this Tweet Speaking about the project, Kamara said: “We are really excited about this. To get to travel across Ireland, learn about a new sport and better understand what the GAA is about is a fantastic opportunity for fans of any sport. We can’t wait to hit the road and begin our journey with AIB!” Stelling added that they hope to come away from the visit with a better appreciation of what this Irish sport is all about. “We don’t have much knowledge of Gaelic Football but have obviously spent much of our professional lives in football and both enjoy a strong affinity to our local clubs, so we do hope that some of this will translate. “Hopefully we will have a much better understanding by the end of our journey.” The42 is on Instagram! Tap the button below on your phone to follow us!
Neighbors have influenced the Vietnamese people in regards to what they eat and how they cook. People fr0m Mongolia who invaded Vietnam fr0m the north in the tenth century brought beef with them. This is how beef became part of the Vietnamese diet. Common Vietnamese beef dishes are pho bo (Beef Noodle Soup) and bo bay mon (Beef Cooked Seven Ways). An agreement on visa exemption for diplomatic and official passport holders signed between Vietnam and the Republic of Paraguay’s governments will take effect as fr0m October 26, 2008 announced the Consular Department of the Ministry of Foreign Affairs. Vietnam is located in both a tropical and a temperate zone. It is ch@racterized by strong monsoon influences, but has a considerable amount of sun, a high rate of rainfall, and high humidity. Regions located near the tropics and in the mountainous regions are endowed with a temperate climate. Historically, Vietnam has been an agricultural civilization based on wet rice cultivating. The Vietnam War destroyed much of the economy of Vietnam. Upon taking power, the Government crea-ted a planned economy for the nation. Collectivization of farms, factories and economic capital was implemented, and millions of people were put to work in government programs. The Socialist Republic of Vietnam is a single-party state. A new state constitution was approved in April 1992, replacing the 1975 version. The central role of the Communist Party was reasserted in all organs of government, politics and society. Only political organizations affiliated with or endorsed by the Communist Party are permitted to contest elections. These include the Vietnamese Fatherland Front, worker and trade uni0nist parties.
Joe Nicholson-USA TODAY Sports The argument has been made, and convincingly, that the Seattle Seahawks have been the best team in the NFL through 10 games. So what will they be once Percy Harvin is humming? The fresh-legged wide receiver/running back/return man is expected to make his 2013 debut Sunday against his old team when the Minnesota Vikings come to town. And when he does hit the field, along with three offensive linemen who have been injured, the rich could become the richest. "Harvin is a difference maker," one NFC defensive coordinator familiar with him told Bleacher Report. "He's a game-wrecker. It's a crime. How can they even have him?" The Seahawks have dominated opponents in many ways. But they really haven't dominated in the passing game. Twenty-three teams have thrown for more yards per game than them. They don't have a player in the top 25 of receiving yards. To the Seahawks especially, Harvin should be instant passing offense. "Percy is different from any player we have," Seattle offensive coordinator Darrell Bevell said. "He is very explosive. He's a playmaker. He can make plays from anywhere on the field. He's a wide receiver who runs like a running back. He has great balance. He has great feet. He has top-end speed. Once you get the ball in his hands, he's different from a lot of wideouts in that he can run through you, he can run past you or he can run around you. That's what makes him dangerous." Hannah Foslien/Getty Images The way his skills will blend with the skills of quarterback Russell Wilson and running back Marshawn Lynch will pose multiple problems for defenses. Of course, that's what general manager John Schneider and head coach Pete Carroll were thinking when they traded first-, third- and seventh-round picks to the Vikings for him last March. Harvin is going to make Wilson a better passer. Through Harvin's career, he has averaged 6.9 yards after the catch, according to Stats LLC. Last season, he was fifth in the league with 551 yards after the catch—in just eight starts. The Seahawks are one of the most effective teams in the league at sucking the safety into the box. They have run the ball more than any team in the NFL. They also have a read-option element to their offense that forces defensive adjustments. So there probably is too much going on for defenses to be able to focus on Harvin. At least until he makes them pay. The expectation is he will make them pay. "He can beat you deep, beat you underneath," the defensive coordinator said. "Whatever you ask him to do, he can do. So it's hard to gameplan against a guy like that, especially if they have multiple weapons that prevent you from honing in on him. I can remember having two guys in position to make plays on him for no gain, and next thing you know, it's a 25-yard gain. He's very, very elusive in space. Very strong. And after he catches the ball, he can break tackles. He'll run through arm tackles." Bevell said the Seahawks won't change their philosophy of being a run-first team, and everything else will continue to play off the run. But Harvin is going to get his touches, assuming his surgically repaired hip does not slow him. Both Lynch and Harvin are likely to take handoffs, giving defenders two ball-carriers with radically different running styles to try to tackle. That aspect of the Seahawks offense will be similar to the Vikings offense when Harvin worked in concert with Adrian Peterson. Kevin C. Cox/Getty Images Bevell, not coincidentally, was the coordinator for the Vikings offense during Harvin's first two years in the NFL. "The nuts and bolts of this offense are very similar—the same in some cases—to the nuts and bolts of that offense," Bevell said. "But we have different personnel, so that's where some of the wrinkles come in, trying to use our personnel effectively." The Harvin we see Sunday, assuming we see him, might not be like the Harvin we remember. Bevell said he plans on working him in slowly, both in terms of snaps played and his role. But he thinks Harvin should be able to integrate with his new teammates in short order, hip permitting. "Once he starts making plays like he's capable of playing, I think he'll be endeared by the players pretty quickly," Bevell said. Yes, Percy Harvin could be quite popular in Seattle. NFL Confidential Gregory Shamus/Getty Images • It has taken two quarterbacks to allow Riley Cooper to break out. Michael Vick is the one who gave Cooper a pardon in the Eagles' locker room after Cooper's racially insensitive offseason outburst, but Nick Foles is the one who has given the wide receiver new life on the field. In games Foles has started this year, Cooper is averaging six targets and 112.2 yards. In other games, he averaged four targets and 17.6 yards. The word out of the NovaCare Center is the chemistry between Foles and Cooper is palpable. It's also very fortunate for Cooper, whose contract will expire after the season. Among the teams that could be on the lookout for a wide receiver are Andy Reid's Chiefs and Joe Banner's Browns. Both men had a hand in the drafting of Cooper. Michael Thomas/Getty Images • As a fifth-round pick, Rams running back Zac Stacy is starting to look like one of the steals of the draft. Despite barely playing in the first five games of the year, Stacy has run for 537 yards. Give credit to the Rams' scouting staff, which actually had Stacy ranked considerably higher than the fifth round. A number of other teams had Stacy, who had pedestrian workout numbers, rated as an undrafted free agent. The Rams, however, liked what their eyes (good north-south runner, rare vision, patience) and their analytic reports told them. These numbers in particular were discussed at Rams Park: Playing against teams from the best conference in college football, the SEC, Stacy averaged 4.6 yards per carry in 28 career games. Marcus Lattimore from South Carolina, who might have been a first-round pick if healthy, also averaged 4.6 yards per carry against SEC teams in 19 games. And Eddie Lacy, running behind a far superior offensive line at Alabama, averaged 5.8 yards per carry in 18 games against SEC teams. • I'm hearing the NFL quietly is discussing playing one of the London games next year at 3 p.m. local time, which would be 10 a.m. Eastern time. The Londoners may benefit from having an afternoon game, as opposed to a night game. But the real benefit could come from television revenues. On that day, the NFL could offer TV game inventory from morning till night. It's not out of the question that the 10 a.m. Eastern game could become a permanent part of the schedule, especially if the league expands overseas. In that case, the league would open up another cash stream, with potentially another network partner involved. Tom Lynn/Getty Images • Packers defensive end Mike Daniels has made a nice jump in his second year, according to pro scouts. In his rookie season, the fourth-round pick might have lacked explosiveness after injuring his shoulder as a senior at Iowa. That explosiveness is back now, and he's finishing his pass rushes. At 6'0", Daniels is the shortest defensive lineman on the Packers roster by two inches, but scouts say his lack of height doesn't hinder him because he plays with good leverage, he's technically sound and he is ridiculously determined. As a matter of fact, his lack of stature might help him because one scout said Daniels has a "short guy complex." • If middle linebacker Paul Posluszny can't play Sunday against the Cardinals because of a mild concussion, the Jaguars will miss his leadership as well as his ability. Those who have been in the Jaguars locker room say the focus of the reigning AFC defensive player of the week is contagious, and his intensity makes his teammates better. They say Posluszny is valuable beyond his size, speed and athleticism, all of which are very good for a middle linebacker. He's also a high-effort practice player who never stops working. Assistant Coach You Should Know: Ben McAdoo Getty Images/Getty Images Packers quarterbacks coach Ben McAdoo probably isn't going to get much credit for whatever Aaron Rodgers does well. But he should get credit for whatever Scott Tolzien is doing well. The QB coach in Green Bay can get lost in the shadows of head coach Mike McCarthy and offensive coordinator Tom Clements, both former quarterbacks coaches. But people are noticing McAdoo. In each of the past two offseasons, other NFL teams have attempted to interview McAdoo for offensive coordinator openings, but their requests were blocked by the Packers because McAdoo was under contract. He won't be under contract when the season ends, and chances are good he will be an offensive coordinator somewhere in 2014. Why is McAdoo on NFL teams' radars? He is an extension of McCarthy, having worked with him in San Francisco and New Orleans before following him to Green Bay. He has a diverse offensive coaching background, having worked with offensive linemen and tight ends before becoming a quarterbacks coach one year ago. McAdoo's career path is similar to the paths of Andy Reid, Pat Shurmur and Mike Sherman. Others in the building at Lambeau Field say he has a good presence about him and sees the big picture. And so far the results with Tolzien have been encouraging. Little known fact: McAdoo and the Packers coaches changed Tolzien's release a bit, shaving off a fraction of a second from his release by having him not turn his hand out as much when he throws. If McAdoo has any of the McCarthy magic in him, he's going to have quite an interesting future in the NFL. Jonathan Daniel/Getty Images Numbers Games They say quarterbacks should be their own offensive linemen. One way to tell how much quarterbacks are helping their blockers is to look at the disparity between hurries/knockdowns and sacks. The bigger the disparity, the more likely it is the quarterback is getting rid of the ball quickly and efficiently, even when he is pressured. The team with the best ratio of sacks to knockdowns and hurries is the Bears, with one sack for every 6.9 knockdowns or hurries, according to Stats LLC. That's interesting because the quarterback who has taken most of their snaps, Jay Cutler, is known for not always getting rid of the ball quickly. Of course, that reputation was formed before Marc Trestman was coaching him. Next best is the Redskins, who have one sack for every 5.5 knockdowns or hurries. Perhaps Robert Griffin III has been more effective with his feet than many think. Two of Griffin's quarterback classmates also have been effective in avoiding the sack, as the Andrew Luck-quarterbacked Colts have allowed one sack for every 4.7 pressures or knockdowns (prior to Thursday) and the Wilson-quarterbacked Seahawks have allowed one sack for every 4.1 pressures or knockdowns. Hot Reads • After Ed Reed stole $5 million from the Texans, why is everyone so upset with Richie Incognito shaking down Jonathan Martin for only $15,000? • Reed was one of the greatest defensive players of his generation, but being old, slow, hurt and mouthy usually isn't a good way to hang on. • That Dolphins assistant coach who believes the whole Incognito story is "overblown" also probably thought Super Typhoon Haiyan was just a little gust of wind. • With Michael Vick's fleet of high-end cars, he clearly is out of the red. Many believe he'll soon be out of the green and white as well. • 49ers rookie safety Eric Reid is using his head to stay healthy and avoid fines, as opposed to using his head to make tackles. What a concept. Dan Pompei covers the NFL for Bleacher Report.
Q: How can I get my if statement to work properly when a csv value does not exist? The issue I am currently having is that my IF statement for my CVSParser is not working. The countryname "Germany" doesn't exist which is ok but the string notf is not returning when this error occurs instead I get: "java.lang.IllegalArgumentException: Mapping for Germany not found, expected one of [Country, Exports, Value (dollars)]". I assumed the value that was being returned was a null value because CVSParser returns a String, however, assigning a null value to countryName is not getting my code to work. The issue came up when I was using tester. What steps do I need to take to fix? Also in general how I do figure out the value a method is returning when what it's looking for doesn't exist? (Specifically when it's not in the documentation.) public String countryInfo (CSVParser parser,String country){ FileResource fr = new FileResource(); String exports= ""; String countryName= ""; String value= ""; for (CSVRecord record : parser){ exports=record.get("Exports"); countryName=record.get(country); value= record.get("Value"); if (exports== null ||countryName!= country){ String notf= "info has not been found"; return notf; } } String info= countryName +":"+ exports; return info; } public void tester (){ FileResource fr = new FileResource(); CSVParser parser = fr.getCSVParser(); countryInfo(parser,"Germany"); } A: @HovercraftFullOfEels remarks about string comparison are right. But the exception says "java.lang.IllegalArgumentException: Mapping for Germany not found, expected one of [Country, Exports, Value (dollars)]" and the test code results in a call countryName=record.get("Germany"); where the exception suggests it should have been countryName=record.get("Country"); So if you want information about Germany's exports, the code should be public String countryInfo (CSVParser parser,String desiredCountry){ FileResource fr = new FileResource(); String exports= ""; String countryName= ""; String value= ""; for (CSVRecord record : parser){ exports=record.get("Exports"); countryName=record.get("Country"); value= record.get("Value"); if (exports== null || !countryName.equals(desiredCountry)){ String notf= "info has not been found"; return notf; } } String info= countryName +":"+ exports; return info; } public void tester (){ FileResource fr = new FileResource(); CSVParser parser = fr.getCSVParser(); countryInfo(parser,"Germany"); }
Why KaratGold Coin (KBC) Is a Cryptocurrency That Investors Should Have on Their Watch List From 2011 until 2018, Karatbars was concentrated on selling physical gold and gold-based products. Throughout the course of 2018, the company has developed and implemented cryptocurrency blockchain and innovative technologies such as a cryptophone (IMpulse K1 Phone), digital payment system (K-Merchant) and ATMs (CashGold Exchange Machines / CEMs)into the business. To make crypto payments even easier, Karatbars went further. A new blockchain-based smartphone (IMpulse K1) was conceptualized by the best blockchain developers all over the world and will allow making all secure crypto payments that a person needs. Gold has increased in value against most currencies in the past years. It is also known that central banks hold at least 60% of all the gold and all the world. The person put his money in banks; they buy gold, they get 10%, and you get 1%. That is an excellent deal for the bank and a bad one or you. The problem is that 99% of the population do not have any gold, and that is exactly how rich by banks and governments like it to be. Most people wouldn’t know where to buy gold, and they think they can’t afford it and wouldn’t know how to sell it even after they have it. Karatbars led by Harald Seiz has come up with the solution by creating a new system of KaratGold payments. KaratGold is known for having delivered all promised milestones. This underlines the enormous quality of the entire project and the outstanding focus on KBC investors. We are at the first stages of the evolution of innovative currencies that can become a real alternative to existing fiat currencies. Right now, is the best time to benefit from the advantages of these currencies. As it is said: “The future belongs to those who see possibilities before they become obvious.” This is a submitted sponsored story. CCN urges readers to conduct their own research with due diligence into the company, product or service mentioned in the content above.
--- title: DoS Vulnerability (fixed in Node v0.8.26 and v0.10.21) date: 2013-10-22T17:42:10.000Z slug: cve-2013-4450-http-server-pipeline-flood-dos category: vulnerability layout: blog-post.hbs --- Node.js is vulnerable to a denial of service attack when a client sends many pipelined HTTP requests on a single connection, and the client does not read the responses from the connection. We recommend that anyone using Node.js v0.8 or v0.10 to run HTTP servers in production please update as soon as possible. * v0.10.21 <http://blog.nodejs.org/2013/10/18/node-v0-10-21-stable/> * v0.8.26 <http://blog.nodejs.org/2013/10/18/node-v0-8-26-maintenance/> This is fixed in Node.js by pausing both the socket and the HTTP parser whenever the downstream writable side of the socket is awaiting a drain event. In the attack scenario, the socket will eventually time out, and be destroyed by the server. If the "attacker" is not malicious, but merely sends a lot of requests and reacts to them slowly, then the throughput on that connection will be reduced to what the client can handle. There is no change to program semantics, and except in the pathological cases described, no changes to behavior. If upgrading is not possible, then putting an HTTP proxy in front of the Node.js server can mitigate the vulnerability, but only if the proxy parses HTTP and is not itself vulnerable to a pipeline flood DoS. For example, nginx will prevent the attack (since it closes connections after 100 pipelined requests by default), but HAProxy in raw TCP mode will not (since it proxies the TCP connection without regard for HTTP semantics). This addresses CVE-2013-4450.
Wednesday, February 19, 2014 Bible Math...and Ultrarunning Thanks once again to the ever-interesting Boing Boing--a wonderfully cool and geeky site, which you MUST check out a couple times a week--a great cartoon about the pitfalls of using the Bible as a literal science text: [click to enlarge] Faith and science need not be incompatible, you just have to be sensible about the domains and scope of each. I really ought to check out Biblical distances to see whether I can gain any advantage in Ultrarunning...say, only covering 28 miles and calling it a 50K.
Eukaryotic features of the Xanthomonas type III effector AvrBs3: protein domains involved in transcriptional activation and the interaction with nuclear import receptors from pepper. The AvrBs3 protein of the phytopathogenic bacterium Xanthomonas campestris pv. vesicatoria is targeted to host-plant cells by the bacterial Hrp type III secretion system. In pepper plants containing the Bs3 resistance gene, AvrBs3 induces the hypersensitive response (HR). AvrBs3 recognition is thought to occur in the plant cell nucleus as HR induction is dependent on nuclear localization signals (NLSs) and an acidic transcription activation domain (AAD). In a search for AvrBs3-interacting pepper proteins using the yeast two-hybrid system, we have isolated eight different classes of cDNA inserts including two genes for importin alpha proteins. Importin alpha is part of the nuclear import machinery and interacts with AvrBs3 through an NLS in the carboxy-terminus of the protein, both in yeast and in vitro. The mechanism of AvrBs3 recognition was further studied by analysis of the C-terminal AAD. This putative transcription-activation domain was shown to be required for AvrBs3 HR-inducing activity, and could be functionally replaced with the VP16 AAD from the Herpes simplex virus. Our data support the model in which the AvrBs3 effector localizes to the nucleus, where the Bs3-mediated surveillance system of resistant plants detects AvrBs3 through its interference with host gene transcription.
To Shut Down Or Invest More In Failing Schools? I'm Michel Martin and this is TELL ME MORE from NPR News. Coming up, we will speak with a former education official who has had a change of heart about some of the school reforms she once championed. Diane Ravitch will be with us in just a few minutes. But first, we turn to two education leaders who have become major voices nationally, owing to their work on the local level. Michelle Rhee is the former chancellor of Washington, D.C.'s public schools. She left that position two years ago and founded Students First, an advocacy organization. Michelle Rhee, glad to have you back with us once again. Thanks for joining us. MICHELLE RHEE: Thanks for having me. MARTIN: And we're also joined by Alberto Carvalho. He is the current superintendant of the Miami-Dade public schools. We should also mention that the Miami-Dade County School District is the licensee of WLRN Public Media, our partner in this broadcast. Welcome to you. Thank you so much for joining us. ALBERTO CARVALHO: Thanks for the opportunity. MARTIN: We're glad to get the two of you together because you both have the experience of running a large urban school system. Superintendant Carvalho, Miami is the fourth-largest school system in the country. What is the one thing that keeps you up at night more than any other? CARVALHO: All right. The mere fact that, as Secretary Duncan said recently, that far too many young men and women drop out of school, don't get to finish high school and they're condemned to a life of poverty, a cycle that has been so pervasive in generations before them. And that keeps me up at night and - but, you know, every morning, I have an opportunity to wake up and change that, and I think that's exactly what we're achieving here in Miami Dade and opportunities created by forcing the key issues to be addressed. Number one, high quality and effective leaders, effective teachers, innovation and parental empowerment. By providing choices, they're appealing to parents and students alike. MARTIN: Michelle Rhee, you've been actively participating in our education conversation on Twitter at hash tag #NPREdChat. We appreciate that. Now, you were never known for holding back when you were superintendant, but I did want to ask if there is something you can say now that you're on the outside that you could not say or did not say while you were running a school district. RHEE: Well, honestly, Michel, you know that one of the things that I made a priority in my administration was to be very honest with people about what was working in the school district and what wasn't working in the school district and I think to Secretary Spelling's point, that oftentimes in education, we are so concerned with making the adults sort of feel good about themselves and, you know, how can we all live in harmony, that we have been all too willing to turn a blind eye to the realities that are happening to children in our classrooms every day. So I think we really do have to have more of a focus on making sure that we can be very honest about the shortcomings of our public education system because we're not going to be able to fix the problems until we acknowledge that they're there. MARTIN: I wanted to talk to both of you about two issues that are really present in conversations around education right now. One is school choice and the other, of course, is teacher evaluation. So let's take the choice question first. Michelle Rhee, that you closed some 23 schools in the District of Columbia. It doesn't sound like a big number, except that it's a small space. And I'd like to play a question that we received in response to one of your tweets. Here it is. BRIAN BENNETT: Hello. My name is Brian Bennett and I'm a science teacher in South Bend, Indiana. Michelle Rhee tweeted: Open enrollment policies allow some children to choose a school that is better suited to their education needs. My question is what happens to schools that don't offer open enrollment? Overcrowding and closing schools is no way to improve. MARTIN: I mean, I - Michelle Rhee, I think that, really, the broader question here is that - and the criticism is that offering this choice doesn't have the desired effect of improving the other schools. And I'd like to ask what you say about that. RHEE: Well, I think that that's actually not true. I mean, when you close schools, it doesn't result in an overcrowding of schools. In situations like we had in Washington, D.C., we simply were operating far too many schools. We were operating schools that were half empty and, therefore, we were spending a lot of money in ways that wasn't having an impact on children. So, in schools where you have - school districts where you have declining enrollment, you really do have to right size the district in order to have a better utilization of resources. And I think that, if you focus - if a school district does focus on closing down its lower performing schools, then - yeah - the options that students are going to be left with are the higher performing schools. MARTIN: Michelle Rhee is the former chancellor of Washington, D.C.'s public schools. If you're just joining us, you're listening to TELL ME MORE from NPR News. We're talking about education reform. I'm joined by her and Alberto Carvalho. He's the superintendant of Miami-Dade County Public Schools. Could you take on the question, Superintendant Carvalho, of the teacher evaluation question? It's a big issue here and a lot of school districts around the country. You implemented a policy for teacher evaluations that judges teachers based on how well their students score on standardized tests, but you know, as we were talking about - we've been talking about throughout the program, there are those who argue that this actually discourages teachers from teaching the students who are the hardest to teach, the most disadvantaged, the most - have the most needs because they're not going to achieve the same results and they're going to be penalized for it in compensation. Could you talk about that? CARVALHO: Surely. That's certainly a potential unfortunate consequence. But, you know, if you're respectful about the process and you're inclusive and you actually develop a partnership with teachers and those that represent teachers, then you can get to a better place for both teachers and students alike. It does not have to be an either/or proposition. It can be a both/and win for all. That's exactly what we did at Miami-Dade. We negotiated contracts. We negotiated the implementation of Race to the Top, for example, with performance pay for teachers, tying teacher financial incentives to student outcomes and we did it in a respectful way of recognizing not only student achievement data, but also the peculiarity of the classroom and the student that the teacher teaches. Not ignoring conversations about poverty, not using as an excuse, either, language or disability. Putting all of that in the same table of conversation. And we were able to negotiate a teacher contract and an evaluation process that's respectful, that provides performance pay, ties student achievement data to the teacher's evaluation, but it was negotiated. It was through negotiation, not imposition. I'd like to revisit the last issue. That, too, I don't think is - we should not be embracing simplistic answers to really complex problems. And I think, when we simply say, you know, the school's not performing. Let's shut it down. Why not try to improve it first? So I'd like to speak briefly about the Miami-Dade phenomenon. Yeah. When I became superintendant, there were 19 schools that had never been anything more than an F or a D on an A through F scale, nine of which were condemned to be shut down by the state for performance. Now, I became superintendant. I decide that, rather than simply shutting them down, I was going to try to improve. Now, I had to change everything. I did have to fire the nine principals. I did have to change faculties, but we did it in a responsible and respectful way. Two years later, every one of these schools has improved dramatically. Graduation rates went up as high as 50 percent in some of these schools. The graduation rate in these schools are now higher than the district average and the state average. Miracles are possible if we're determined to make them happen. MARTIN: Michelle Rhee, do you want to add to that? RHEE: Yeah. MARTIN: Is this a matter of communicating respectfully? Go ahead. RHEE: Well, I think that, you know, one of the things that we have to realize is that there are schools in this country that have been failing children for generations. Not where aggressive reform measures have been taking place, with is what Dr. Carvalho is talking about, but where, year in and year out, people are saying, well, we just need to invest more money. We need to invest more money. We need to - you know, we need to not close these schools down. And what I would challenge people to think about is this. Let's take this into a different realm. If I took my shirts to a dry cleaner and seven out of every 10 shirts that I took, they failed to actually do it. There was a burn mark on them. What would we do? Well, we would stop taking our shirts to that dry cleaner. We would not say, well, you know, in order for the dry cleaner to become better, we need to keep taking our shirts there so that they can invest in better equipment and better training for their employees, etc. No. We wouldn't do that because we would say, these are my shirts. I don't want them to get ruined. If we take that kind of care with our laundry, then certainly we have to take equal amount of care with our children every day. We can not afford to continue to send our children year in and year out to failing schools, hoping that, through a new five year or 10 year plan, it'll get better, especially when so many of these schools have been failing for so long. So - yes - we should absolutely invest in, you know, very aggressive and rapid turnarounds in some cases, but we just can't - we can't be in a position where, in some communities, we're allowing the schools to fail generation after generation. MARTIN: We have to leave it there for now. This is a rich and important conversation. We hope it will continue. Michelle Rhee is the former chancellor of Washington, D.C. Public Schools and founder of Students First. That's an advocacy organization. She was with us from Ohio Public Radio in Columbus. Alberto Carvalho is the superintendant of Miami-Dade Public Schools. He was with us here at member station WLRN in Miami. I hope you'll come back and see us again. Thank so much for joining us.
Dazzling performance of Iran Wushu team in the World Games Cali 2013/ four athletes, four Gold medals Dazzling performance of Iran Wushu team in the World Games Cali 2013/ four athletes, four Gold medals Iran Sanda team could beat its components and add three more gold medals to yesterday gold medal which has been taken by Farshad Arabi in Taolu events. Iran national Wushu team took participates in the world Games Cali with four athletes, three of them attended in Sanda events and one in Taolu. Mohsen Mohammad Seifi the Sanda athlete in 65 kg, could beat his component from France in final match in two rounds and received gold medal. Javad Aghayi other athlete in Sanda event triumph against the high performer athlete and ex world champion from China in the final match and got the third gold medal for Iran Wushu team. The last athlete Hamidreza Gholipour in 85 kg, had though competition with Russia representative in the final game and could beat him in two rounds and achieved the gold medal. Hossein Ojaghi who was the head coach of Iran national team previously acting as a technical director in Iran Wushu teams and it was his first experience as team head coach, which with these four gold medals could add great achievement to his sport career as a coach. With these result Iranian Wushu team one more time shows its power to world Wushu. The official website of the Games, highlighted the Wushu sport attendance in this version and mentioned :” Wushu, is a matter of style. Not only as a millennial martial art, but because of the elegance of its participants, who wear spectacular clothes. Wushu participants are always noticed. They all walk dressed in silk, with colors, sequins and glitter, as in a Calvin Klein or Karl Lagerfeld fashion show in Milan or Paris. Of course, all this, without losing the Chinese or Ancient East cultural traditions. Even, the judges move playfully, on a martial line. ”
Follow Us AN AMAZING PROPHECY Roe V Wade: Woman Behind U.S. Abortion Ruling Was Paid To Recant No name is more closely associated with abortion than Jane Roe, the anonymous name behind the Supreme Court decision that overturned pro-life laws nationwide and ushered in an era of legalized abortion on demand that has claimed the lives of over 61 million babies since 1973. Norma McCorvey, the former Jane Roe of the infamous Roe v. Wade Supreme Court decision, never obtained an abortion. She wanted a divorce from her husband at the time but was exploited by feminist attorneys to push their case to upend Texas’ pro-life laws. Now it looks like pro-abortion feminists are exploiting her again. Decades after the Supreme Court invented the right to abortion using her case, McCorvey converted to the pro-life position after spending years supporting abortion and even working a ta local abortion clinic. And for decades more, she supported pro-life efforts and worked closely with pro-life groups. Norma McCorvey, known as Jane Roe in the US Supreme Court’s decision on Roe v Wade, shocked the country in 1995 when she came out against abortion. But in new footage, McCorvey alleges she was paid to switch sides. The documentary, AKA Jane Roe, airs this Friday on the US channel FX. The programme was filmed in the last months of McCorvey’s life before her death at age 69 in 2017 in Texas. The Supreme Court ruling came after McCorvey, then a 25-year-old single woman under the pseudonym “Jane Roe”, challenged the criminal abortion laws in Texas that forbade abortion as unconstitutional except in cases where the mother’s life was in danger.
Q: IE throwing "Unspecified Error" with AJAX call? Here is an example of my code: function blah() { var xmlHttp = (window.XMLHttpRequest) ? new XMLHttpRequest() : new ActiveXObject("Microsoft.XMLHTTP"); xmlHttp.onreadystatechange = function() { if (xmlHttp.status == 200 && xmlHttp.readyState == 4) alert(xmlHttp.responseText); } xmlHttp.open("GET", "ajax.php?_=" + new Date().getTime(), true); xmlHttp.send(); } It seems to work find in Chrome but IE8 throws an "Unsepcified Error" on the if status = 200 and readyState = 4 line. Oddly, though, the alert does give the response from the php page. Any ideas why this might be happening? A: Maybe checking status if readyState != 4 causes the error in IE? Try if (xmlHttp.readyState == 4 && xmlHttp.status == 200)
# A visitor for copying the full structure of a Sass tree. class Sass::Tree::Visitors::DeepCopy < Sass::Tree::Visitors::Base protected def visit(node) super(node.dup) end def visit_children(parent) parent.children = parent.children.map {|c| visit(c)} parent end def visit_debug(node) node.expr = node.expr.deep_copy yield end def visit_error(node) node.expr = node.expr.deep_copy yield end def visit_each(node) node.list = node.list.deep_copy yield end def visit_extend(node) node.selector = node.selector.map {|c| c.is_a?(Sass::Script::Tree::Node) ? c.deep_copy : c} yield end def visit_for(node) node.from = node.from.deep_copy node.to = node.to.deep_copy yield end def visit_function(node) node.args = node.args.map {|k, v| [k.deep_copy, v && v.deep_copy]} yield end def visit_if(node) node.expr = node.expr.deep_copy if node.expr node.else = visit(node.else) if node.else yield end def visit_mixindef(node) node.args = node.args.map {|k, v| [k.deep_copy, v && v.deep_copy]} yield end def visit_mixin(node) node.args = node.args.map {|a| a.deep_copy} node.keywords = Hash[node.keywords.map {|k, v| [k, v.deep_copy]}] yield end def visit_prop(node) node.name = node.name.map {|c| c.is_a?(Sass::Script::Tree::Node) ? c.deep_copy : c} node.value = node.value.deep_copy yield end def visit_return(node) node.expr = node.expr.deep_copy yield end def visit_rule(node) node.rule = node.rule.map {|c| c.is_a?(Sass::Script::Tree::Node) ? c.deep_copy : c} yield end def visit_variable(node) node.expr = node.expr.deep_copy yield end def visit_warn(node) node.expr = node.expr.deep_copy yield end def visit_while(node) node.expr = node.expr.deep_copy yield end def visit_directive(node) node.value = node.value.map {|c| c.is_a?(Sass::Script::Tree::Node) ? c.deep_copy : c} yield end def visit_media(node) node.query = node.query.map {|c| c.is_a?(Sass::Script::Tree::Node) ? c.deep_copy : c} yield end def visit_supports(node) node.condition = node.condition.deep_copy yield end end
Tremendously popular video-streaming sites, with nearly a billion monthly visitors, have been secretly using the resources from visitors’ devices to mine for the cryptocurrency Monero. According to security experts at AdGuard, the four sites involved in the crypto-jacking schemes are Openload, Streamango, Rapidvideo and OnlineVideoConverter. Those sites are raking in outrageous amounts of money while visitors are busy streaming or converting videos. “While analyzing the first complaints, we came across several VERY popular websites that secretly use the resources of users' devices for cryptocurrency mining and were avoiding ad blockers so far,” AdGuard explained. “According to SimilarWeb, these four sites register 992 million visits monthly. And the total monthly earnings from crypto-jacking, taking into account the current Monero rate, can reach $326,000.” Regarding the three video streaming sites, AdGuard said, “We doubt that all the owners of these sites are aware that the hidden mining has been built in to these players.” Nevertheless, as visitors spend hours watching movies or TV shows, their devices’ CPUs are busy mining cryptocurrency for whomever added the mining scripts. Crypto-jacking via Openload, Streamango, Rapidvideo and OnlineVideoConverter AdGuard discovered two Openload domains secretly mining for Monero without users’ knowledge or consent. Openload, one of the most popular streaming sites, has an estimated 330 million visitors per month. Videos from Openload are often embedded on other sites and, in many cases, the mining script loads when videos are launched. AdGuard estimated that the monthly earnings reach $95,000. The crypto-jacking on Streamango starts when the embedded player is loaded. The site gets 42 million visits per month, and monthly mining earning could reach about $7,200. The mining script in the Streamango player is the exact same one being used on Openload. Like the other two streaming sites, the Coin Hive mining code on Rapidvideo starts when loading the embedded player. The site gets an estimated 60 million visits per month, and estimated earnings, including Coin-Have’s commission, may reach an estimated $25,000. OnlineVideoConverter, according to AdGuard, “holds the absolute record among crypto-jackers at the moment.” SimilarWeb data ranks the site as being the 119th most popular website in the world. It receives nearly 490 million visitors per month — almost twice the number of visitors of ThePirateBay, which was the first big site caught hijacking users’ CPU power to secretly mine Monero. Including Crypto-Loot’s commission, AdGuard estimated monthly mining earnings at $200,000! ThePirateBay incident occurred in September. Since then, thousands of websites have turned to mining to supplement plummeting advertising revenues. Some sites added the mining scripts, while others were hacked to add the mining code. AdGuard added:
Risk factors for thromboembolism in patients with paroxysmal atrial fibrillation. There is some controversy concerning which clinical characteristics predict thromboembolism and whether treatment with class I antiarrhythmic drugs reduces thromboembolim in patients with paroxysmal atrial fibrillation (AF). This retrospective, multicenter study was undertaken to determine risk factor or factors for thromboembolism in patients with paroxysmal AF. Seven hundred forty patients with paroxysmal AF (mean age 56 years) without prior thromboembolic events were followed retrospectively. Cerebral thromboembolism, including transient ischemic attack and embolism of peripheral arteries, were selected as primary end points. Independent risk factors were determined with multivariate analysis, and event-free survival curves were estimated. During 3.4-year follow-up period, primary end points occurred in 55 patients (2.2% per year). Patients with thromboembolism had a higher prevalence of underlying heart disease (p <0.01), less frequent treatment with antiarrhythmic drugs (p <0.01), and received diuretics more often (p <0.01) compared with patients without thromboembolism. Age (>/=65 years, RR 3.33, p = 0.0001) and gender (male, RR = 2, p = 0.0291) emerged as predictors of thromboembolism by multivariate analysis with Cox's proportional hazard model. Treatment with antiarrhythmic drugs (RR = 0.57, p = 0.0578) and aspirin (RR = 0.52, p = 0.1094) showed trends toward reducing thromboembolic risks. It is suggested that elderly men (>/=65 years) with paroxysmal AF are at risk for thromboembolism, but the risk tended to be reduced by treatment with antiarrhythmic drugs and aspirin.