text stringlengths 8 5.77M |
|---|
Q:
Python interpolate point value on 2D grid
I have a regular 2D X, Y and Z array and I have a point X0 and Y0 and I want to know the Z0 value in point (X0, Y0) on my grid.
I found that scipy have interpolate module but as I understand it interpolates 1D/2D arrays and returns 1D/2D array, but there is no method that returns only one value at one point.
For example:
#My grid data
X = [ [X11, X12, X13, ..., X1N],
[X21, X22, X23, ..., X2N],
....
[XN1, XN2, XN3, ..., XNN]
Y = [ [Y11, Y12, Y13, ..., Y1N],
[Y21, Y22, Y23, ..., Y2N],
....
[YN1, YN2, YN3, ..., YNN] ]
Z = [ [Z11, Z12, Z13, ..., Z1N],
[Z21, Z22, Z23, ..., Z2N],
....
[ZN1, ZN2, ZN3, ..., ZNN] ]
#Point at which I want to know the value of the Z
X0, Y0 = ..., ...
#Now I want to call any function that'll return the value at point (X0, Y0), Z0 is float value, not array
Z0 = interpolation(X, Y, Z, X0, Y0)
As I understand the similar function is scipy.interpolate.interpn but it works only with 1D arrays and give out an error when I want to work with 2D data
A:
you can also use griddata :
points = np.array( (X.flatten(), Y.flatten()) ).T
values = Z.flatten()
from scipy.interpolate import griddata
Z0 = griddata( points, values, (X0,Y0) )
X0 and Y0 can be arrays or even a grid.
you can also choose the interpolation with method=
perhaps you can find a way to get ride of the flatten(), but it should work.
(https://docs.scipy.org/doc/scipy/reference/tutorial/interpolate.html)
|
news, latest-news,
THE AFL has revealed the Western Bulldogs have established a new relationship with the City of Ballarat. AFL scheduling manager Simon Lethlean said the Western Bulldogs and the Ballarat City Council had come to an agreement, with full support of the AFL. It is not yet known what the agreement entails. This comes after the City of Ballarat ended North Melbourne's long-standing sponsorship this year, upsetting Kangaroos hierarchy. "The Bulldogs have entered a relationship with the local council in Ballarat, which is based essentially on their western corridor strategy," Leathlean told AFL.com.au. "North Melbourne is focused on Tasmania and elsewhere, so they (the Bulldogs) asked whether we would support a game there? "We were certainly keen to support the Dogs and the Ballarat City Council, who are starting off a new relationship. "If you look across the natural areas of Victoria – the hot spots to develop the clubs – that western strategy certainly extends to Ballarat for the Bulldogs. "We're keen to help them with that strategy as it extends down there and again support councils who want to support our clubs." North Melbourne is seething at the move, claiming it did all the groundwork in Ballarat for six years, only to be told to make way for another club. North Melbourne communications manager Heath O'Loughlin did not hide his frustration at the Kangaroos being forced out on social media: The Kangaroos had worked closely with the council for six years, with Kangaroos CEO Carl Dilena saying the club was upset to unwillingly have its ties cut with the city. "The first we heard of it was when council (City of Ballarat) notified us that they wouldn't be extending our sponsorship agreement," Dilena told The Courier on Wednesday. "To us it was surprising, we were presuming we would be continuing the relationship we had built up over the years." Dilena also revealed on Wednesday that North Melbourne would no longer hold community camps in Ballarat, under direction from the AFL. The Kangaroos had played pre-season matches in Ballarat for the last six years, but have not been granted a NAB Challenge game in the city next year, with Western Bulldogs to meet Melbourne in March. The City of Ballarat has been contacted for comment.
https://nnimgt-a.akamaihd.net/transform/v1/crop/frm/storypad-34dXacDR8RguBkyLHxYXLhN/15a24fd5-f7fd-471b-8980-783ac3b839be.jpg/r0_134_3762_2260_w1200_h678_fmax.jpg |
Q:
R - Calculate MLE of combined distribution
I have a given dataset with 1000 values, which is a combination of two normal distributions N(y1,1) and N(y2,1). The density looks like the following:
I want to calculate the portion of N(y1,1) and N(y2,1) in the dataset and the two means y1 and y2. This is my current approach:
z <- #Dataset as vector with 1000 entries#
lik <- function(mu1, mu2, part) -sum(part*dnorm(z, mu1, 1, log=TRUE) + (1-part)*dnorm(z, mu2, 1, log=TRUE))
mle <- mle(lik, start=list(mu1=-7, mu2=5, part=0.33))
But this gives me the following error message:
Error in solve.default(oout$hessian) :
Lapack routine dgesv: system is exactly singular: U[1,1] = 0
A:
I redefined the likelihood to use log() instead of argument log = TRUE.
Oddly enough, the following works in spite of the warnings. Note that they are warnings, not errors.
library(stats4)
set.seed(7850) # Make the results reproducible
z <- sample(c(rnorm(333, -7, 1), rnorm(667, 5, 1)))
plot(density(z))
lik2 <- function(mu1, mu2, part) -sum(log(part*dnorm(z, mu1, 1) + (1-part)*dnorm(z, mu2, 1)))
mle2 <- mle(lik2, start = list(mu1 = -6, mu2 = 6, part = 1/2))
#Warning messages:
#1: In log(part * dnorm(z, mu1, 1) + (1 - part) * dnorm(z, mu2, 1)) :
# NaNs produced
#2: In log(part * dnorm(z, mu1, 1) + (1 - part) * dnorm(z, mu2, 1)) :
# NaNs produced
#3: In log(part * dnorm(z, mu1, 1) + (1 - part) * dnorm(z, mu2, 1)) :
# NaNs produced
#4: In log(part * dnorm(z, mu1, 1) + (1 - part) * dnorm(z, mu2, 1)) :
# NaNs produced
mle2
#
#Call:
#mle(minuslogl = lik2, start = list(mu1 = -6, mu2 = 6, part = 1/2))
#
#Coefficients:
# mu1 mu2 part
#-7.1091780 4.9377339 0.3330038
|
The present invention is related to power conversion, and in particular to AC-AC power converters for driving electric motors.
In many applications (e.g., aircraft applications) AC-AC converters are employed to drive an electric alternating current (AC) motor that is used as the prime mover for a specified mechanical load. In these applications, the AC motor and motor controller can be integrated into a single unit to form an integrated system. To meet AC input power quality and electromagnetic interference (EMI) requirement, an autotransformer rectifier unit (ATRU) and power quality EMI filter are provided at a front end that filters an AC input and converts the AC input to a DC output. A DC-AC converter (inverter) converts the DC output to an AC output for supply to the AC motor.
In aircraft applications, as well as others, the weight of a system has a direct influence on the overall cost of the system. The weight of the autotransformer is a function of the relative power rating of the transformer. A higher relative power rating results in a weight penalty. |
---
abstract: 'This paper concerns Hopf’s boundary point lemma, in certain $C^{1,Dini}$-type domains, for a class of singular/degenerate PDE-s, including $p$-Laplacian. Using geometric properties of levels sets for harmonic functions in convex rings, we construct sub-solutions to our equations that play the role of a barrier from below. By comparison principle we then conclude Hopf’s lemma.'
address:
- |
Hayk Mikayelyan\
Department of Mathematical Sciences\
Xi’an Jiaotong-Liverpool University\
Ren Ai Lu 111\
215123 Suzhou\
Jiangsu Province\
PR China
- |
Henrik Shahgholian\
Department of Mathematics\
Royal Institute of Technology (KTH)\
100 44 Stockholm\
Sweden
author:
- 'Hayk Mikayelyan, Henrik Shahgholian'
title: 'Hopf’s lemma for a class of singular/degenerate PDE-s'
---
[^1]
[^2]
Introduction
============
In this paper we consider Hopf’s lemma, in certain $C^{1,Dini}$-type domains, for the following type of operators $$\label{eq}
\Delta_H u:=\text{div}(H(|\nabla u|)\nabla u),$$ where $H(t)=t^{-1}h(t)$, $h(0)=0$ and $h(t)$ is a monotone increasing continuous function. We will call the weak solutions of (\[eq\]) $H$-harmonic. The additional condition we impose on the Dini modulus of continuity $\epsilon (t)$ is that the function $t\epsilon(t)$ is convex (more discussion in Section \[secdin\]).
Equation (\[eq\]) is the Euler-Lagrangian of the functional $$\label{funk}
I(v)=\int_{D} F(|\nabla v|)dx,$$ where $F(t)=\int_0^t h(\tau)d\tau$, $F\in C^1([0,\infty))$, $F(0)=F'(0)=0$ and $F$ is strictly convex. Here and in the sequel $D\subset {\mathbb{R}}^n$ ($n\geq 2$) is a domain.
This type of operators arise in applications dealing with flows where the flow-rate is proportional to $$H(|\nabla u|)\nabla u=h(|\nabla u|)\frac{\nabla u}{|\nabla u|}.$$
Conditions on $F$
-----------------
Let us now list all the assumptions we impose on $h$, that can formally be divided into three groups:
- [**Physical**]{} (see equations (\[cond1\])),
- [**Coercive**]{} (see equation (\[coercond\]), or (\[Delta2\])),
- [**Technical**]{} (see equation (\[condition\^\])).
The so-called physical conditions have been already presented in the introduction.
$\bullet$ $h(0)=0$: with vanishing gradient flow vanishes; $$\label{cond1}
\text{\noindent $\bullet$ monotonicity of $h(t)$: larger gradient $\Longrightarrow$ more flow;}$$ $\bullet$ $H$ depends only on $|\nabla u|$: isotropy with respect to the position
and direction.
The coercivity condition is needed to assure the existence. It is well known that this problem is, in general, ill-posed if $h$ is bounded. The best illustration is the minimal surface equation $$\text{div}\left( \frac{\nabla u}{\sqrt{1+|\nabla u|^2}}\right)$$ in the annulus $B_2\backslash B_1$, with boundary data $0$ on $\partial B_2$ and $M$ on $\partial B_1$. For large enough $M$ the catenoid cannot reach the level $M$ without leaving the domain $B_2\backslash B_1$ and the equation has no solution in $W^{1,1}$.
To avoid this we can impose the strong condition $$\label{coercond}
c t^{p-1} <h(t)< C t^{p-1}$$ for some $p>1$, which makes the application of the direct methods of the calculus of variations in the Sobolev space $W^{1,p}(D)$, $p>1$, possible (see [@D]). In the special case $H(t)=t^{p-2}$ we obtain the $p$-Laplacian.
Alternatively we can impose a weaker coercivity condition and work in Sobolev-Orlicz spaces $W^{1,F}(D)$. Let us shortly introduce these spaces following [@RR] (see also [@RR1]). The Orlicz norm is defined as follows $$\|u\|_F=\min\left\{M\,\,\Big|\,\,\int_D F\left(\frac{|u|}{M}\right)dx\leq F(1)\right\}.$$ This norm defines the Banach space $L^F(D)$.
If we now denote by $g$ the inverse function of $h$ and define the Legendre transform of $F$ by $$F^*(t)=\int_0^t g(\tau)d\tau,$$ then assuming $h(1)=1$ one can easily prove using Young’s inequality the generalization of Hölder’s inequality $$\int_D uvdx\leq \|u\|_F\|v\|_{F^*}.$$
If both $F$ and its Legendre transform $F^*$ satisfy the so-called $\Delta_2$ condition, i.e., there exists $t_0>0$, $C_0>0$ such that $$\label{Delta2}
F(2t)\leq C_0 F(t)\,\,\,\text{and}\,\,\, F^*(2t)\leq C_0 F^*(t)\,\,\,\text{for}\,\,\,t>t_0,$$ then $$(L^F(D))^*=L^{F^*}(D)$$ and, in particular, $L^F(D)$ is reflexive, since $(F^*)^*=F$ (Theorem 10, page 112, [@RR]).
Now analogously we can define the Sobolev-Orlicz space $W^{1,F}(D)$ by the Sobolev-Orlicz norm as sum of Orlicz norms of $u$ and $|\nabla u|$. Under $\Delta_2$ condition $W^{1,F}(D)$ will be reflexive and we can apply the direct methods of the calculus of variations.
The condition (\[Delta2\]) is somewhat weaker since it requires polynomial of $F(t)$ growth only for large $t$ and leaves more freedom for the behavior for small $t$.
In our proof the function $$R(t)=\frac{F''(t)}{F'(t)}$$ plays an important role and we need the following technical condition on $R$. We assume that for every positive, monotone increasing, bounded function $c(s)$ in ${\mathbb{R}}^+$, $0<c<c(s)<C<\infty$, there exist constants $\alpha>0$ and $\beta>0$, depending on function $R$, and constants $c$ and $C$, such that $$\label{condition^}
\int_t^T R(c(s)s)ds\geq \alpha \int_{t}^{T}R(\beta s)ds.$$
\[remcondR\] Condition (\[condition\^\]) is satisfied for more or less any “reasonable” function $R=F''/F'$. For monotone decreasing $R$ one can take $\alpha=1$, $\beta=C$ (this covers the case $F(t)=t^p$, $p>1$). The authors think that it is easier to check the condition (\[condition\^\]) for a given function $F$, than to try to introduce a broad class of functions satisfying it.
For two convex domains $K_1 \Subset K_2$ we call the minimizer $u$ of $$\label{Hfunk}
J(v)=\int_{K_2\backslash K_1} F(|\nabla v|) dx$$ in the class of functions $\{v\in W^{1,F}_0(K_2)|\,v\equiv
1\,\,\,\text{on}\,\,\, K_1\}$ an $H$-potential (see [@RR]).
Liapunov-Dini boundary {#secdin}
----------------------
In the case of harmonic functions ($F(t)=t^2$) K.O. Widman ([@W]) using the Green representation was able to prove a Hopf-type result for domains with Liapunov-Dini boundary (see below). Moreover, the following estimates for the second derivatives of the solution $v$ of uniformly elliptic equation with Hölder continuous coefficients have been proved as well (see equation (2.4.1) in [@W]) $$\label{widD2}
|D^2 v(x)|\leq C_D \frac{\epsilon(\delta(x))}{\delta(x)},$$ where $\epsilon(t)$ is a Dini modulus of continuity (see below) and $\delta(x)$ is the distance of the point $x$ from the boundary. It is also shown that $C^{1,Dini}$ regularity is necessary for Hopf lemma in axially symmetric domains (see Remark 1 in [@W]).
Since there is no Green representation for $p$-harmonic functions it is not possible to repeat Widman’s direct estimates of the function’s growth. Our proof is based on barrier construction and works for the general operator $\Delta_H$ under some regularity assumptions on the boundary.
Let us present the definition of Liapunov-Dini surface following [@W].
\[dini-cond\] A modulus of continuity $\epsilon(r)\searrow 0$ as ${r\to 0}$ is called Dini modulus of continuity if $\int t^{-1}\epsilon(t)dt<\infty$.
A Liapunov-Dini surface $S$ is a closed, bounded $(n-1)-$dimensional surface satisfying the following conditions:
\(a) At every point of $S$ there is a uniquely defined tangent hyper-plane, and thus also a normal.
\(b) There exits a Dini modulus of continuity $\epsilon(t)$ such that if $\beta$ is the angle between two normals, and $r$ is the distance between their foot points, then the inequality $\beta\leq\epsilon(r)$ holds.
\(c) There is a constant $\rho_S>0$ such that for any point $x\in S$, any line parallel to the normal at $x$ meets $S\cap B_{\rho_s}(x)$ at most once.
In simple words the above definitions says, that the surface $S$ is locally the graph of a $C^{1,Dini}$ function in a ball of fixed radius.
Since in general the function $t\epsilon(t)$ is not convex we introduce a sub-class of Dini modules of continuity as follows.
\[dini-conv\] A Dini modulus of continuity $\epsilon(r)$ is called convex-Dini if the function $t\epsilon(t)$ is convex.
Note that domains with $C^{1,\alpha}$ boundary are convex-Dini. The introduction of such a sub-class is necessary because our proof relies on the construction of barriers in convex rings with $C^{1,Dini}$ boundary. It it in general not true that for any Dini modulus of continuity $\epsilon(t)$ there is another Dini modulus of continuity $\tilde{\epsilon}(t)\geq\epsilon(t)$ such that $t\tilde{\epsilon}(t)$ is convex.
\[inoutDini\] Note that if the Dini modulus of continuity is convex-Dini then a domain $D$ with Liapunov-Dini boundary satisfies a kind of inner (outer) convex $C^{1,Dini}$ condition in the following sense: There exists a convex Liapunov-Dini domain $K$ such that for any point $x_0\in \partial D$ there exists a translation and rotation $K_{x_0}$ of the domain $K$ satisfying $$K_{x_0}\subset D, \,\,(K_{x_0}\subset{\mathbb{R}}^n\backslash
D)\,\,\,\text{and}\,\,\,\partial K_{x_0}\cap\partial D=\{x_0\}.$$ Moreover, we can take $$K=K_{r_D}=B_{r_D}((0,\dots,0,r_D))\cap\{x\, | \, x_n > 2|x'|\epsilon(|x'|) \},$$ where $x=(x',x_n)$, $r_D<\rho_{\partial D}/2$ and $\epsilon$ is the convex-Dini modulus of continuity. Without loss of generality (if necessary by modifying $\epsilon$ at “corners” with $\partial B_{r_D}((0,\dots,0,r_D))$) we can assume that $K$ has smooth boundary. Let us also observe that for any $a>0$ by taking $r_D$ small enough we can have $$B_{(1-a)r_D}((0,\dots,0,r_D))\Subset K.$$ Let us assume that for $ r_D$ $$\label{34inside}
B_{\frac{3}{4}r_D}((0,\dots,0,r_D))\Subset K.$$
In the sequel we will use as barriers the $H$-potentials in the convex rings $$\label{nuclearbarriers}
K\backslash B_{r_D/2}((0,\dots,0,r_D))\,\,\,\,
\text{and}\,\,\,\,
B_{3r_D}((0,\dots,0,-r_D))\backslash (-K),$$ where $-K$ is obtained from $K$ by symmetry with respect to the origin. We will refer to convex rings (\[nuclearbarriers\]) as inner and out convex rings.
The Main Result and its proof
=============================
The main result of this paper is the following extension of the Kjel-Ove Widman’s result to a wider class of operators (\[eq\]), for which $p$-Laplacian is a particular case, in Liapunov-Dini domains with convex-Dini modulus of continuity. As we will see later (Remark \[outerDini\]) our result yields the boundary Harnack principle for $H$-harmonic functions in domains with convex-Dini boundary.
\[hopf-mopf\] Assume $u$ is an $H$-harmonic function in the domain $D$. Further assume $0\in \partial D$, $ \partial D$ satisfies the inner convex Dini condition at $0$ and $$u(x) > u(0)\,\,\,\text{for all}\,\,\,x\in D.$$ Then there exist positive constants $r_0$ and $c$ such that $$\max_{B_r\cap D} u(x)-u(0)>cr,$$ for $0<r<r_0$.
Without loss of generality we can assume that the outer normal of $\partial D$ a the origin is $(0,\dots,0,-1)$. Since for the solutions of (\[eq\]) we have the maximum principle (see Appendix II) we need to construct a barrier in the inner convex ring from (\[nuclearbarriers\]).
Actually we will construct barriers in arbitrary convex ring $K_2\backslash K_1$, where $K_1\Subset K_2$ are two convex domains with Liapunov-Dini boundary.
From the Hopf lemma for harmonic functions ([@W]) we know that if $\Delta w=0$ in $K_2\backslash K_1$, with boundary values $w=0$ on $\partial K_2$ and $w=1$ on $\partial K_1$ then $\nabla w \not= 0$ on $ \partial (K_2\backslash K_1) $. Now we will prove the existence of a convex, smooth, monotone increasing function $f:[0,1]\to[0,1]$, $f(0)=0$, $f(1)=1$, $f'(0)>0$, $f'(1)<\infty$ such that $$\label{fcondmain}
\Delta_H f(w)\geq 0$$ in $K_2\backslash K_1$. This will mean that the function $f(w)$ is a subsolution for $\Delta_H$, has non-vanishing gradient at any boundary point and thus can be used as a barrier.
We start by computing $$\Delta_H f(w)=H(|\nabla f(w)|)\Delta f(w) +
\frac{H'(|\nabla f(w)|)}{|\nabla f(w)|}\Delta_\infty f(w),$$ where $\Delta_\infty u=\nabla u D^2 u \nabla u$ is the $\infty$-Laplace operator. Using $$\Delta f(w)=f'(w)\Delta w+f''(w)|\nabla w|^2=f''(w)|\nabla w|^2,$$ and $$\Delta_\infty f(w)=(f'(w))^3\Delta_\infty w+(f'(w))^2f''(w)|\nabla w|^4,$$ we arrive at $$\begin{gathered}
\label{vorihashiv}
\Delta_H f(w)=H(f'(w)|\nabla w|)f''(w)|\nabla w|^2 + \\
\frac{H'(f'(w)|\nabla w|)}{f'(w)|\nabla w|}
\Big[(f'(w))^3\Delta_\infty w+(f'(w))^2f''(w)|\nabla w|^4\Big].\end{gathered}$$ We thus need to find a function $f $, such that $f'(t)>0$ for $t\in[0,1]$ and $\Delta_H f(w) \geq 0$. To comply with the latter we need (see ) $$\begin{gathered}
f''(w)|\nabla w|^2\Big[H(f'(w)|\nabla w|)+
f'(w)|\nabla w|H'(f'(w)|\nabla w|)\Big]\geq\\
-\frac{H'(f'(w)|\nabla w|)}{f'(w)|\nabla w|}
(f'(w))^3\Delta_\infty w,\end{gathered}$$ which after substitution $H'(t)=\frac{F''(t)}{t}-\frac{F'(t)}{t^2}$ and $H(t)+tH'(t)=F''(t)$ simplifies to $$\label{addedplus}
f''(w)\geq \left(
\frac{F'(f'(w)|\nabla w|)}{F''(f'(w)|\nabla w|)}-
f'(w)|\nabla w| \right) |\nabla w|^{-5}\Delta_\infty w.$$ Let us note that $$\label{harmoniccurv}
0=\Delta w=\partial_{\nu\nu} w - (n-1)\kappa \partial_\nu w,$$ where $\nu$ is the unit vector in the direction of $\nabla w$ and $\kappa$ is the mean curvature of the level set; here we have used that the level sets of a positive harmonic potential are smooth. From this we conclude $$\Delta_\infty w =(\partial_\nu w)^2 \partial_{\nu\nu}w= (n-1)\kappa |\nabla w|^3.$$
Since the level sets of a harmonic potential in a convex ring are convex (see [@L]), the mean curvature and thus $\Delta_\infty w$ is positive near the boundary. This along with $f'(w)>0$ and (\[addedplus\]) (which is yet to be proven) implies that it is enough to find a function $f$ such that $$\label{anhavf}
f''(w)R(f'(w)|\nabla w|)\geq |\nabla w|^{-5}\Delta_\infty w,$$ where $R(t)=
\frac{F''(t)}{F'(t)}$.
The Hopf lemma proved in [@W] for harmonic functions yields $$\label{nabla-w}
0<c<|\nabla w(x)|<C<\infty,$$ where the constants $c$ and $C$ depend only on the convex ring. Using this we easily obtain $$c\min (w(x), 1-w(x)) \leq \delta(x) \leq C\min (w(x), 1-w(x))$$ and together with $$\begin{gathered}
|\nabla w|^{-5}|\Delta_\infty w| \leq c^{-3} |D^2 w| \leq c^{-3} C_D \min
\frac{\epsilon(\delta(x))}{\delta(x)}\leq \\
c^{-3} C_D \frac{\epsilon(C\min (w, 1-w))}{c\min (w, 1-w)}=:
\zeta(w),\end{gathered}$$ where $\zeta(t)\in L^1([0,1])$ depend only on the convex ring.
In order to have (\[anhavf\]) we need to construct a function $f$ such that $$\label{anhavfzeta}
f''(w)R(f'(w)|\nabla w|)\geq \zeta(w).$$ For any $x\in K_2\backslash K_1$ let us denote by $\ell_x$ the gradient flow line of $w$ which contains $x$. Let us parametrize the curve $\ell_x$ by $w\in[0,1]$. We can now integrate (\[anhavfzeta\]) on any $\ell_x$ in parameter $w$ $$\label{anhavfzetaint}
\int_{w_1}^{w_2} f''(w)R(f'(w)|\nabla w|) dw\geq\int_{w_1}^{w_2} \zeta(w)dw,$$
Observe that since the level sets of $w$ are convex the function $|\nabla w|$ on $\ell_x$ as a function of $w$ are monotone increasing (see equation (\[harmoniccurv\])), but on the other hand we know that it is bounded by (\[nabla-w\]). Thus we can apply our technical condition (\[condition\^\]) $$\int_{w_1}^{w_2} f''(w)R(f'(w)|\nabla w|) dw=\int_{f'(w_1)}^{f'(w_2)}R(c(s) s)ds
\geq\alpha\int_{f'(w_1)}^{f'(w_2)}R(\beta s)ds,$$ where $s=f'(w)$ and the function $c(s)= |\nabla w|(s)> 0$ is a monotone function such that $c<c(s)<C$.
If we now construct a function $f$ such that
$$\label{anhavfinal}
\alpha\int_{f'(w_1)}^{f'(w_2)}R(\beta s)ds\geq \int_{w_1}^{w_2} \zeta(w)dw$$
for all $0<w_1<w_2<1$, then for this function $f$ the inequality (\[anhavfzetaint\]) will be satisfied for all gradient flow lines $\ell_x$ and thus the inequality (\[anhavfzeta\]) will be satisfied everywhere in $K_2\backslash K_1$, and we would be done.
Since $F'(0)=0$ and $F'(\infty)=\infty$, the function $R(t)=\frac{F''(t)}{F'(t)}$ is not integrable near zero and at $+\infty$, due to $$\int_t^T R(\tau)d\tau=\log\frac{F'(T)}{F'(t)}.$$ As $w_1\to 0$ and $w_2\to 1$ the right hand side of (\[anhavfinal\]) remains bounded ($\zeta\in L^1(0,1)$) and we can write $$\begin{gathered}
\alpha\int_{f'(w_1)}^{f'(w_2)}R(\beta s)ds=\\
\frac{\alpha}{\beta}\left(\log F'(\beta f'(w_2))- \log F'(\beta f'(w_1))\right)
=\int_{w_1}^{w_2} \zeta(w)dw .\end{gathered}$$ Now we can take $f'(0)=m>0$ and construct $$\label{explicitform}
f'(w)=\beta^{-1}g\left(
F'(\beta m)
e^{\frac{\beta}{\alpha}\int_{0}^w \zeta(\tau)d\tau }
\right),$$ where $g$ is the inverse function of $h=F'$ on ${\mathbb{R}}^+$. Thus we obtained that (\[fcondmain\]) is satistied for $f(w)=\int_0^w f'(\tau)d\tau $, where $f'$ is given by (\[explicitform\]).
By changing the parameter $m\in (0,\infty)$ we can construct $f$ such that $f(1)$ is any positive number.
The proof of the theorem now will easily follow from applying the barrier $f(w)$ in the inner convex ring (\[nuclearbarriers\]) with the parameter $m$ to be chosen such that $$f(1)=\min_{x\in B_{r_D/2}((0,\dots,0,r_D)) } u(x)>0.$$
\[scaleno\] Observe that if $f(w)$ is a sub-solution of (\[eq\]) then in general we cannot say anything about the function $\alpha f(w)$, and we should construct the appropriate sub-solution by changing the parameter $m$ in (\[explicitform\]).
\[outerDini\] If the boundary value of a non-negative $H$-harmonic function $u$ vanishes in a neighborhood of $y$ and the boundary $\partial D$ satisfies the outer convex $C^{1,Dini}$ condition at $y$, then we can apply the super-solution barrier $f(1)-f(w)$ in the outer convex ring (see (\[nuclearbarriers\])), and obtain the Lipschitz bound $$u(x)
\leq CM
\text{dist}(x, K) ,$$ for $x\in B_{r_D}(y)\cap D$, where $r$, $C$ depending only on $D$ and $M= \max_{B_{r_D}(y)} u $.
One can make the condition (\[condition\^\]) even weaker: there exists a constant $\alpha>0$ and a monotone increasing continuous function $$L:{\mathbb{R}}^+\to {\mathbb{R}}^+,\,\,\,L(0)=0,\,\,\,L(\infty)=\infty$$ such that $$\label{generalcond}
\int_t^T R(c(s)s)ds\geq \alpha \int_{L(t)}^{L(T)}R(s)ds.$$ For functions $F$ satisfying (\[generalcond\]) one will obtain $$f'(t)=L^{-1}g\left(
F'(L(m))
e^{\frac{1}{\alpha}\int_{0}^t \zeta(\tau)d\tau }
\right),$$ where $g$ is the same as in (\[explicitform\]).
Appendix I: A comparison principle {#App-I}
==================================
The comparison principle for $p$-harmonic functions is well known (see [@HKM]), but for the general operator $\Delta_H$ we could not find a reference. Therefore we shall present a proof of this.
\[compprinc\] Let $u$ be a weak solution of (\[eq\])and $v$ be its weak sub-solution in the domain $D$ with $C^1$ boundary. Further let $v\leq u$ on $\partial D$ in the sense of trace operator. Then $v\leq u$ in $D$.
Let us denote by $F^*$ the Legandre transform of $F$. Observe that $g(t)=(F^*(t))'$ is the inverse function of the function $h(t)=F'(t)$. By Young’s inequality $$ab\leq F(a)+F^*(b)$$ and the equality holds if and only if $b=h(a)$.
If $u$ is weak solution of (\[eq\]) then from the convexity of $F$ it follows that $$\int_D F(|\nabla u|)dx\leq \int_D F(|\nabla w|)dx$$ for any $w$ such that $u-w\in W_0^{1,p}(D)$. Otherwise $$\begin{gathered}
\int_D F(|\nabla (u+t(w-u))|)\leq (1-t)\int_D F(|\nabla u|)dx+ t\int_D F(|\nabla w|)dx<\\
\int_D F(|\nabla u|)dx- \epsilon t\end{gathered}$$ for some $\epsilon>0$ and differentiating in $t$ we obtain $$\label{sub-sol}
\int_D H(|\nabla u|)\nabla u\nabla(u-w)dx<0,$$ which gives a contradiction after approximating $u-w\in W_0^{1,p}(D)$ by a test function $\phi\in C_0^\infty(D)$.
Let us now assume that $v\nleq u$ and take as a test function $\psi=(v-u)^+$. By the definition of the sub-solution $$\int_D H(|\nabla v|)\nabla v \nabla \psi dx \leq 0.$$ Thus $$\int_{D_1} H(|\nabla v|)\nabla v \nabla v dx \leq
\int_{D_1} H(|\nabla v|)\nabla v \nabla u dx ,$$ where $D_1=\text{supp} \psi\subset D$. Using now Young’s inequality we obtain $$\begin{gathered}
\label{ineq-1}
\int_{D_1} H(|\nabla v|)\nabla v \nabla udx \leq
\int_{D_1} h(|\nabla v|) |\nabla u|dx \leq\\
\int_{D_1} F(|\nabla u|)dx+
\int_{D_1} F^*( h(|\nabla v|))dx.\end{gathered}$$ Since $h(t)=F'(t)=tH(t)$, and Young’s inequality is an equality for $b=h(a)$, we deduce $$\begin{gathered}
\label{ineq-2}
\int_{D_1} H(|\nabla v|)\nabla v \nabla vdx =
\int_{D_1} h(|\nabla v|) |\nabla v|dx =\\
\int_{D_1} F(|\nabla v|)dx+
\int_{D_1} F^*( h(|\nabla v|))dx.\end{gathered}$$ By – we arrive at $$\int_{D_1} F(|\nabla v|)dx\leq \int_{D_1} F(|\nabla u|)dx,$$ where the inequality is strict unless $\nabla u=\nabla v$ a.e. in $D_1$; a contradiction in since $u-v\in W^{1,p}_0(D_1)$.
Acknowledgment {#acknowledgment .unnumbered}
--------------
The first author is grateful to Stephan Luckhaus and Juan Luis Vazquez for inspiring discussions.
[D]{}
B. Dacorogna, *Introduction to the calculus of variations* Imperial College Press, London, 2009.
J. Heinonen, T. Kilpeläinen, O. Martio, *Nonlinear potential theory of degenerate elliptic equations* The Clarendon Press, Oxford University Press, New York, 1993.
J. L. Lewis, *Capacitary functions in convex rings* Arch. Rational Mech. Anal. 66 (1977), no. 3, 201–224.
J.L. Lewis, K. Nyström, *Boundary behaviour for p harmonic functions in Lipschitz and starlike Lipschitz ring domains* Ann. Sci. ƒcole Norm. Sup. (4) 40 (2007), no. 5, 765Ð813.
G. M. Lieberman, *Boundary regularity for solutions of degenerate elliptic equations* Nonlinear Anal. 12 (1988), no. 11, 1203–1219.
J. Manfredi, A. Petrosyan, H. Shahgholian, *A free boundary problem for $\infty$-Laplace equation* Calc. Var. Partial Differential Equations 14 (2002), no. 3, 359–384.
M. M. Rao, Z. D. Ren, *Theory of Orlicz Spaces* Marcel Dekker Inc., New York, 1991.
M. M. Rao, Z. D. Ren, *Applications of Orlicz Spaces* Marcel Dekker Inc., New York, 2002.
K.-O. Widman, *Inequalities for the Green function and boundary continuity of the gradient of solutions of elliptic differential equations* Math. Scand. 21, 1967, 17-37 (1968).
[^1]: 2000 [*Mathematics Subject Classification.*]{} Primary 35J25, 35J70.
[^2]: The second author is partially supported by Swedish Research Council
|
Q:
UID /GID with NFS and ZFS
I have a server with a zfs file system (nexenta core), and I'm sharing files overs nfs with zfs share share_nfs.
When I mount the file system on my client (a ubuntu workstation) I can't have the original UID/GID :(
I mount my client with the following options : 192.168.1.4:/home /media/testnfs nfs rw,dev,noexec,nosuid,auto,nouser,noatime,rsize=8192,wsize=8192 0 0
If I configure idmapd I have nobody:nogroup and without idmapd I have 4294967294:4294967294, how can I get the original ID's ?
Is it a problem with the nfs server or the client ?
Thanks for answers.
A:
NFSv4 doesn't use UID/GIDs anymore. There are quite a few significant differences between NFSv3 and v4; security is one of them.
|
Tom Holland (footballer, born 1902)
Thomas Holland (born Sheffield, 16 July 1902, died Weymouth, July 1987) was an English association football player who played professionally for clubs including Watford and Gillingham. He made nearly 120 Football League appearances for Gillingham.
References
Category:1902 births
Category:1987 deaths
Category:Footballers from Sheffield
Category:English footballers
Category:Association football goalkeepers
Category:Rotherham Town F.C. (1899) players
Category:Doncaster Rovers F.C. players
Category:Weymouth F.C. players
Category:Exeter City F.C. players
Category:Watford F.C. players
Category:Gillingham F.C. players
Category:K Sports F.C. players |
France's Mali job "not nearly finished": Tuareg officer
GAO, Mali (Reuters) - The top Tuareg officer in Mali's army urged France on Friday to keep its forces in Mali for as long as it takes to drive out Islamist rebels for good.
Colonel El Hadj Ag Gamou, who remained loyal to Mali's government last year when fellow Tuaregs rebelled, said an early withdrawal by French troops would allow the Islamist forces, linked to al Qaeda, to regain ground lost in a five-week-old French-led offensive.
"They (the French) have started something that is not close to being finished," he said.
After pushing Islamist insurgents from north Mali's major towns with relentless air strikes and rapid advances by special forces and armored columns, and backing from former Tuareg rebels, France's leaders have said they intend to start withdrawing the 4,000 French troops next month.
But Gamou, who is a commander in the Malian army, said he expected the jihadist insurgent groups to fight a guerrilla war from the remote and rugged Adrar des Ifoghas mountains into which they had retreated, near Algeria's border.
"This is where they organized themselves ... and that is where they can hide and resupply. They are protected by nature - there is water," Gamou told Reuters in an interview, sitting in desert fatigues and beige turban in a sandy compound flanked by men from his unit, almost all Tuareg desert fighters like him.
The Tuaregs are desert dwellers who live mostly in Mali's Saharan north as well as in neighboring Niger and Algeria.
"NEUTRALISE THE THREAT"
Gamou said France should not withdraw from its former colony until the Malian army could maintain government control over the sprawling state, Africa's third largest gold producer after South Africa and Ghana.
"The French have to continue their mission until the threat is neutralized ... and Mali's army is able to control the whole country," the Tuareg officer said softly as the desert wind whipped through the shade of the thatched hut.
Gamou only came back to Mali last month with his men after months of exile in neighboring Niger, returning to the Saharan town of Gao, recaptured from the insurgents three weeks ago.
He said the rebels' links with Libya, Algeria and Tunisia and their history of ties with smuggling networks across the vast Sahara gave them the ability to bring in supplies across the mountain passes and uncontrolled, porous borders.
French soldiers and their military allies from Mali and Niger have already faced suicide bombings and raids from holdout Islamist fighters in and around Gao, which remains tense.
Some see the French becoming bogged down in a debilitating counter-insurgency war in a tough and inhospitable Saharan battleground, but French military spokesmen and leaders have repeatedly ruled this out.
Gamou, whose own loyalist unit is based at a half-built petrol station in Gao, estimated the combined number of Islamist fighters remaining in northern Mali at 2,500.
This is roughly the same as the figure given by West Africa's ECOWAS bloc before the French campaign inflicted what French leaders say were "hundreds" of losses on the Islamists.
WEST AFRICAN FORCE
ECOWAS troops form the bulk of a U.N.-backed African military force, expected to number 8,000, that is moving up behind the French and Malians to provide security at recaptured towns, roads and bridges. But its deployment has been slowed by delays, and lack of airlift capacity and equipment.
Beyond counter-terrorism operations, Gamou said Mali needed a long process of internal reconciliation, during which he said distinctions should be made between those in the northern Tuareg and Arab communities who took up arms against the central government in Bamako and those who did not.
"People don't understand what is going on in the north," he said. "There is the population and there are the armed groups. The population is not represented by the armed groups."
Interim President Dioncounda Traore, installed last year after a military coup - which triggered the Tuareg separatist revolt in the north that was hijacked by the jihadists - has said elections will be held in July.
Under pressure from France and the West, Traore has said his government is ready to talk to the Tuareg rebels, provided that they drop any claims of independence for their territory.
The Tuareg rebel group MNLA has said it is willing to accept Mali's internationally recognised borders and fight against al Qaeda and its allies.
Last year, after resisting the anti-government rebels for weeks, Gamou pretended to join them to save his men from annihilation, but then led his unit into exile across the border in Niger and remained loyal to the government in Bamako. |
Janis (film)
Janis is a 1974 American documentary film about the rock singer Janis Joplin. The film was directed by Howard Alk with a lot of assistance from Albert Grossman, Joplin's manager. It was available on videocassette in the United States in the 1980s and 1990s, but DVD versions have been released only in France, Belgium and the Netherlands. In late 2011, it was added to Hulu's movie collection for online viewing. Part of the film soundtrack is included on the 1975 album Janis.
The film consists entirely of archival footage of Joplin. It includes rehearsals, her June 25, 1970 appearance on The Dick Cavett Show, footage from her Woodstock performance in 1969 (dancing with her band's saxophone player during an instrumental break), and another television segment videotaped in black & white in April 1967 before she became famous.
A lot of screen time is devoted to Joplin's 1969 European tour, including an interview with Joplin during her stay in Stockholm and the ecstatic reaction of a clean-cut female fan in Frankfurt when she sees Joplin through the window of her tour bus before the concert starts. (The American fan, who reveals on camera that she is the wife of a U.S. Army officer stationed in Germany, is later seen with several German youths dancing on stage with Joplin.)
Laura Joplin, the star's younger sister who contributed to the hit off-Broadway play Love, Janis (which was based on Laura's book of the same name), is seen and heard talking to Janis in television news footage from the ten-year reunion of Thomas Jefferson High School's class of 1960. Janis had graduated with the 1960 class of this high school in Port Arthur, Texas. The reunion, at which she gave a long press conference that is included in the film, took place in August 1970 at the Goodhue Hotel in Port Arthur. The hotel was demolished in 1990.
Though 1974 is listed as the year of the film's release to cinemas and its copyright year, a Washington Post review indicates that DC-area moviegoers had their first chance to see it in March 1975. Post critic Tom Zito opined that the film's total lack of narration and captions, with all the talking done during Joplin's lifetime, made it tedious. He said he felt uncomfortable that not only do viewers never see a connection between her deteriorating physical appearance and her death, but also that no one who worked on the film communicated to viewers that she is dead.
This film remains a major source of footage for basic and premium cable TV documentaries about Joplin—projects that do include narration and sound bite interviews with those who knew Joplin. When documentaries include film clips of Joplin at her 1970 high school reunion, the 1974 documentary Janis is the source. Color film of an eloquent interview with Joplin in London in 1969 (outdoors with the sounds of car engines) also originates from Janis. That interview was done very shortly before or after concerts she gave at Albert Hall. If film of any of the concerts themselves exists, it has stayed in a vault since 1969.
Accolades
1974: Nominated for a Golden Globe Award for Best Documentary Film
References
External links
Janis on Rotten Tomatoes
Janis on AllMovie
Category:1974 films
Category:Documentary films about singers
Category:1970s documentary films
Category:American documentary films
Category:American films
Category:Collage film
Category:Janis Joplin
Category:Documentary films about women
Category:Best Documentary Film Genie and Canadian Screen Award winners
Category:Canadian films |
1994 Canadian Junior Curling Championships
The 1994 Pepsi Canadian Junior Curling Championships were held in Truro, Nova Scotia.
Men's
Teams
Standings
Results
Draw 1
Draw 2
Draw 3
Draw 4
Draw 5
Draw 6
Draw 7
Draw 8
Draw 9
Draw 10
Draw 12
Draw 14
Draw 15
Draw 17
Draw 19
Draw 21
Playoffs
Semifinal
Final
Women's
Teams
Standings
Results
Draw 1
Draw 2
Draw 3
Draw 4
Draw 5
Draw 6
Draw 7
Draw 8
Draw 9
Draw 10
Draw 11
Draw 13
Draw 16
Draw 18
Draw 20
Draw 22
Playoffs
Tiebreaker #1
Tiebreaker #2
Semifinal
Final
External links
Men's statistics
Women's statistics
Canadian Junior Curling Championships
Category:Curling in Nova Scotia
Category:Truro, Nova Scotia
Category:Canadian Junior Curling Championships
Category:1994 in Nova Scotia |
Dentistry for Mexicans with special needs: a commentary.
There are more than 2 million residents with disabilities in Mexico. Despite national legislation to assure individuals with disabilities needed services, including education and employment, social inclusion of these individuals is difficult since societal views exclude them from functioning as members of a community. While there are no national studies of the dental needs of individuals with disabilities in Mexico, reports of the general population indicate limited use of dental services and the need for increased restorative services. Examples of dental education accreditation standards in other countries are used as models for the improvement in the preparation of dental students to provide services for individual with special needs. |
On May 11, the new Director of National Intelligence, Daniel R. Coats, presented the US Intelligence Community’s (IC) “Worldwide Threat Assessment” to the Senate. Coats’ predecessor, James Clapper, explained during a hearing in Nov. 2016 that the IC collects and analyzes more intelligence on jihadist groups now than ever. The written analysis presented by Coats provides an update on how the IC views these same threat streams six months later.
Everyone agrees that the Islamic State is losing territory, but the IC’s analysts warn that the group is likely capable of sustaining insurgencies in both Iraq and Syria. In fact, Baghdadi’s men are already conducting guerrilla warfare and launching spectacular terror attacks in their theaters of war on a regular basis.
Meanwhile, Taliban-led insurgents are on the rise in Afghanistan. And while counterterrorism forces around the globe have made it more difficult for al Qaeda to plan a large, 9/11-style plot, the organization remains a threat in several parts of the globe.
Islamic State
The Islamic State “continues to pose an active terrorist threat to the United States and its allies because of its ideological appeal, media presence, control of territory in Iraq and Syria, its branches and networks in other countries, and its proven ability to direct and inspire attacks against a wide range of targets around the world,” the IC’s analysts write. In other words, nearly three years after it declared itself to be a caliphate, the Islamic State isn’t close to being finished.
The US has waged a prolific campaign against the group’s “external operations” planners, some of whom are focused on plotting attacks in the West. But the ODNI assesses that the Islamic State “maintains the intent and capability to direct, enable, assist, and inspire transnational attacks.” As territory slips from the organization’s grasp, some foreign fighters might “look for new battlefields or return to their home countries to conduct or support external operations.”
The so-called caliphate is taking steps to keep fighting, despite losing ground in Iraq and Syria, as well as other “parts of its global network” being degraded.
The Office of the Director of National Intelligence (ODNI) hints that Baghdadi’s loyalists still run an international network that is at least somewhat cohesive. The so-called caliphate “is seeking to foster interconnectedness among its global branches and networks, align their efforts to ISIS’s strategy, and withstand counter-ISIS efforts,” the IC’s analysts write.
From the caliphate to insurgency
Even though Mosul is falling, and Raqqa is under assault from multiple sides, the Islamic State is “unlikely to announce that it is ending its self-declared caliphate.” Instead, the jihadists will wage an insurgency in the areas it once controlled as well as elsewhere.
The ODNI’s written testimony points to ongoing issues in the US government’s strategy for countering the Islamic State in both Iraq and Syria. Despite the fact that the self-declared caliphate “has lost about 45 percent of the territory it held in Syria” as of Aug. 2014, it “still controls much of the eastern section of the country,” including Raqqa. In other words, Abu Bakr al Baghdadi’s jihadists continue to hold onto more than half the turf they controlled inside Syria at their peak.
More importantly, the group “will likely have enough resources and fighters to sustain insurgency operations and plan terrorists [sic] attacks in the region and internationally” going forward.
The ODNI’s written testimony also highlights the inherent tensions in the anti-Islamic State strategy, including the role played by America’s partners inside Syria. “Syrian Kurdish People’s Protection Units (YPG) control much of northern Syria and have worked closely with coalition forces to seize terrain from ISIS,” the testimony reads. Just this past week, the YPG played a role in the liberation of Tabqah, a major Islamic State stronghold.
However, America’s partnership with the YPG raises other problems. The “YPG’s goal to unite its ‘cantons’ across northern Syria is opposed by most Syrian Arabs and Turkey, which views these Kurdish aspirations as a threat to its security.” This means it will be difficult for the YPG to implement long-term governance in northern Syria outside of the areas where it has a natural base of support. Moreover, Turkey works to “weaken ISIS” and to “check the Kurds,” including America’s surrogate ground forces, by using “Syrian opposition groups, backed by Turkish artillery, aircraft, and armored vehicles, to establish a border security zone in Syria.”
The Islamic State is “preparing to regroup and continue an insurgency and terrorist campaign” in Iraq as well. The fall of Mosul won’t end matters.
The US is relying on an ad hoc alliance of partners in Iraq, including the Iraqi Security Forces (ISF), the Kurdish Peshmerga, and the “Shia-dominated” Popular Mobilization Committee (PMC). All three are “involved” in the Mosul campaign. But the ODNI warns that America’s direct or de facto partners have different goals. “As the Mosul campaign progresses,” the testimony reads, “Baghdad faces potential tensions between the Kurds and the Iranian-backed PMC members over disputed territory while also managing the Turkish presence in northern Iraq.”
Iraq’s various ethnicities remain at odds, of course, and the Iraqi government is besieged by problems.
Therefore, the ODNI concludes, the Islamic State “will seek to exploit any Sunni discontent with Baghdad and try to regain Iraqi territory, whereas the Kurds will probably continue efforts to establish an independent state.”
In sum, the US intelligence community clearly doesn’t think Baghdadi’s enterprise will be completely defeated any time soon.
In 2016, both Nusrah and AQAP “faced CT pressure in Syria and Yemen,” but they “have preserved the
resources, manpower, safe haven, local influence, and operational capabilities to continue to pose a
threat.” The ODNI employs the same wording to describe Shabaab’s status in Somalia. Last year, Shabaab “sustained a high pace of attacks in Somalia and continued to threaten the northeast and coastal areas of Kenya.” But its “operations elsewhere in East Africa have diminished after the deaths of many external plotters.”
AQIM “escalated its attacks on Westerners in 2016 with two high-profile attacks in Burkina Faso and Cote d’lvoire.” The IC points to the creation of the “Group for the Support of Islam and Muslims” (Jama’at Nusrat al-Islam wal-Muslimin) earlier this year, saying the new joint venture is “intended to promote unity among Mali-based jihadists, extend the jihad beyond the Sahara and Sahel region, increase military action, and speed up recruitment of fighters.”
The ODNI’s testimony seemingly plays down al Qaeda’s presence in Afghanistan and Pakistan, saying the “remaining members” of al Qaeda and AQIS “continued to suffer personnel losses and disruptions to safe havens in 2016 due to [counterterrorism] operations.”
It is true that both al Qaeda senior leadership and AQIS suffered losses last year, but there is also evidence that the organization maintains an extensive footprint in the region.
ODNI notes that both al Qaeda and AQIS “maintain the intent to conduct attacks against the United States and the West.”
Afghan security continues to “deteriorate”
“The overall situation in Afghanistan will very likely continue to deteriorate, even if international support is sustained,” the IC’s analysts write. “Endemic state weaknesses, the government’s political fragility, deficiencies of the Afghan National Security Forces (ANSF), Taliban persistence, and regional interference will remain key impediments to improvement.”
The Kabul government suffers from “political dysfunction and ineffectiveness,” while the ANSF cannot stand on its own. US intelligence predicts that the ANSF’s “performance will probably worsen due to a combination of Taliban operations, ANSF combat casualties, desertions, poor logistics support, and weak leadership.” All of this means that the ANSF will “remain heavily dependent on foreign military and financial support to sustain themselves and preclude their collapse.”
The ODNI notes that the Taliban failed to capture a provincial capital in 2016. However, the jihadists have been able to threaten several capitals. And despite turmoil in its leadership, the Taliban remains a cohesive fighting force.
The Taliban “effectively navigated its second leadership transition in two years following the death of its former chief,” Mullah Mansour, who perished in a May 2016 drone strike in Pakistan. Even though the Taliban hid Mullah Omar’s death from 2013 to 2015, and Omar’s successor was killed less than one year later, the Taliban fights on and “is likely to make gains in 2017.”
Meanwhile, the Islamic State’s Khorasan branch (Wilayah Khorasan) “constitutes ISIS’s most significant presence in South Asia,” but it is “a low-level developing threat to Afghan stability as well as to US and Western interests in the region.”
Thomas Joscelyn is a Senior Fellow at the Foundation for Defense of Democracies and the Senior Editor for FDD's Long War Journal.
Are you a dedicated reader of FDD's Long War Journal? Has our research benefitted you or your team over the years? Support our independent reporting and analysis today by considering a one-time or monthly donation. Thanks for reading! You can make a tax-deductible donation here.
4 Comments
“Based on details obtained from trusted sources, as of early March 2017, Abu Luqman was in Mosul, Iraq. He was promoted from his position as the Wali of Raqqa to the general director or Wali of the Emni in Syria and Iraq, the highest rank within the Emni. That gave him the power to oversee the operations of the two committees of ISIS security forces. As such, he would report to the Caliphate House Office. Moreover, from Mosul, Abu Luqman managed to promote his assistant, Abdul Rahman al-Faisal (a.k.a. Abu Faisal), to both the position of Wali of Raqqa and as the head of the committees of ISIS security forces in Syria.
“By mid-March 2017, Abu Luqman emerged, according to our sources, in Sirte, Libya. It is unclear whether he had travelled to Syria before appearing in Libya or travelled there directly from Mosul, Iraq…
“As of early April 2017, Abu Luqman arrived back in Raqqa. Information obtained from trusted sources indicates that he and his brother-in-law had travelled to the cities of Mosul and Sirte before that. It was clear that Abu Luqman was on a mission. However, the nature and objectives of such a mission remain unclear…
“To that effect, as the Wali of the Emni, Abu Luqman might have travelled to Sirte to establish another Emni’s committee in Libya. ISIS currently seems to be on the defeat in Syria and Iraq and is assessing its next moves. Moreover, the terror group has a history of carrying out attacks in Europe when pressure on their strongholds mounts. If Abu Luqman was on a mission to expand the presence and operations of the Emni in Libya, such a move likely also has significant national security implications for European countries. In other words, having an operations base for the Emni in Libya is especially dangerous given the smuggling routes from Libya, and North Africa in general; to Europe and the access it could provide ISIS in plotting and conducting terrorist attacks in European cities. Additionally, such a move would also be expected to strengthen ISIS in North Africa. As already radicalized North Africans reside in Europe, particularly Belgium, Netherlands and France, this may also bode badly for Europe.”
Thanks for the distillation. Ten years of fighting = ten times as strong an enemy.USA,USA!!
Tom, I wonder what you think of the laptop threat. These were al Asiri’s specialties (printer cartridge bombs > laptop and tablet bombs), now the OSINT only speaks of an ISIS laptop threat. Which people are we focused on? AQAP? ISIS? Both? Has al Asiri been hanging out with Nusra types in Syria? I wish LWJ would rely more on unnamed “sources” and drill down on the laptop threat issue (and the White Helmets involvement at Khan Sheikhoun).
That’s a good point James. Only thing would be that if they did attack Rome and the Vatican, then you can guarantee a Crusade would be enacted not by the Pope, but by people all around the world of Christian Faith since you are directly attacking their religion. There are groups already in the U.S. that are preparing for that. “Dues Vult” is Latin for ” God wills it”, people are very serious about that phrase and wouldn’t be afraid to stand up and start a Crusade. If they can commit atrocities in allah’s name so can we. |
Effects of MK-801, a non-competitive NMDA antagonist, on linguopharyngeal events in rats.
The effects of MK-801 at doses from 0.005 to 1 mg/kg IP on linguopharyngeal events (protrusions, retrusions and swallows) were determined in rats to find out whether MK-801 resembles ketamine in its capacity to increase the frequency of recurrence of such events that we have demonstrated in previous studies. All rats receiving a dose of 0.05 mg/kg or higher showed an increase in linguopharyngeal event frequency within 5 min and this enhancement (3-fold from baseline level) was maintained for longer than 1 h. At the lowest dose of 5 micrograms/kg the effect lasted only very briefly. A general increase in motor behavior was also observed within 10 min of drug administration. More complex patterns of motor behavior, consisting of stereotypical head bobbing, paw movements reminiscent of walking activity, nystagmus, and ataxia were observed with doses of 0.25 mg/kg and higher. All rats showed a marked startle response at early stages post-injection and hypersensitivity to external stimuli such as noise or movement in the room. However, there was an absolute lack of coordinated avoidance responses normally associated with such startle responses or arousing stimuli. |
Accessories
Raw Elemets ECO STICK 30+ formulated with our unique Organic Eco-Shield Performance Technology, can withstand the harshest environmental conditions. Not only does this stick offer water resistant, balanced UV physical protection beyond 80 minutes, it can be applied UNDER WATER! Whether it's protecting a young child or an avid waterman's face, ECO STICK 30+ will perform. With the easy applicator, it can be worn heavy and opaque, or rubbed completely into skin. Packed with biologically active antioxidants, vitamins, minerals and extracts, it continues protecting our skin long after environmental exposure. Learn More
Great for those extended days out in the sun!! This formula not only looks cool but it provides the highest waterproof sun protection possible!
Zinka is the original nosecoat that was very popular in the late 80's, early 90's. It is made from zinc-oxide.
Zinka Nosecoat offers the absolute maximum protection available from the sun's harmful rays. Zinka's proven formula withstands the most extreme weather conditions performing flawlessly in wind, hot, cold & wet. Zinka Nosecoat works as a sunblock not as a "sunscreen". It doesn't rub in like most sunscreen, but goes on opaque to be seen and to afford total protection. A clear sunscreen simply cannot provide total protection. It's clear, the sun's harmful rays will eventually penetrate the skin. It is the color that stays on the skin that ensures maximum protection by not allowing sunlight to be absorbed by the skin.
This Watermans Zinc Oxide SPF 50+ sunblock is a non-greasy, lightweight, very water resistant, very sweat resistant, broad-spectrum protectant infused for your face and hands. The Face Stick is a hands-free, one touch, way to protect your face and hands without the mess of traditional tubes and bottles. Titanium dioxide provides proven UVA and UVB protection. Apply wet or dry. Watermans special formula ensures it will be there for you when you need it most. Learn More |
NK Veržej
Nogometni klub Veržej (), commonly referred to as NK Veržej or simply Veržej, is a Slovenian football club which plays in the village of Veržej. They play in the Slovenian Third League, the third highest football league in Slovenia. The club was founded in 1963.
Honours
Slovenian Third League: 2
1992–93, 2012–13
MNZ Murska Sobota Cup: 3
2003–04, 2010–11, 2014–15
League history since 1991
References
External links
Official website
Category:Association football clubs established in 1963
Category:Football clubs in Slovenia
Category:1963 establishments in Slovenia |
Q:
Retrieved row values from query to textboxes
How can I put the values retrieved from a query that contains ONE COLUMN and MULTIPLE ROWS to textboxes. What i mean is txtBox1 will have the value of the first row, txtBox2 will have the value of the second row and so on. What I know is how to retrieve values of each column but not rows.
A:
Perhaps:
List<TextBox> allTextBoxes = this.Controls.OfType<TextBox>().ToList();
int current = -1;
using (var con = new MySqlConnection(Properties.Settings.Default.ConnectionString))
{
using (var cmd = new MySqlCommand("SELECT ColumnName FROM dbo.TableName", con))
{
con.Open();
using (var rd = cmd.ExecuteReader())
{
while (rd.Read() && ++current < allTextBoxes.Count)
{
allTextBoxes[current].Text = rd.GetString(0);
}
}
}
}
replace this.Controls with the container control that contains all of your TextBoxes.
|
United States Court of Appeals
FOR THE EIGHTH CIRCUIT
___________
No. 99-3033
___________
United States of America, *
*
Appellee, * Appeal from the United States
* District Court for the District
v. * of Nebraska.
*
Philip J. Simon, * [UNPUBLISHED]
*
Appellant. *
___________
Submitted: March 14, 2000
Filed: March 23, 2000
___________
Before MORRIS SHEPPARD ARNOLD and FAGG, Circuit Judges, and BENNETT,*
District Judge.
___________
PER CURIAM.
After execution of a search warrant on Philip J. Simon's residence revealed a
marijuana growing operation consisting of rotating lights, fertilizer, potting soil, a CO2
system, and 105 potted marijuana plants, Simon pleaded guilty to possession of
marijuana with intent to distribute in violation of 21 U.S.C. § 841(a)(1). Simon appeals
his sentence of 188 months in prison and 8 years of supervised release. We affirm.
*
The Honorable Mark W. Bennett, Chief Judge, United States District Judge for
the Northern District of Iowa, sitting by designation.
Simon contends the district court erroneously applied a career offender
enhancement because his 1993 Nebraska conviction for attempted possession of
marijuana with intent to deliver was not a controlled substance offense within the
meaning of § 4B1.1 of the Sentencing Guidelines. We disagree. Controlled substance
offenses include state law offenses "punishable by imprisonment for a term exceeding
one year[] that prohibit[] . . . the possession of a controlled substance . . . with intent
to manufacture, import, export, distribute, or dispense," U.S. Sentencing Guidelines
Manual § 4B1.2(b), and "the offenses of aiding and abetting, conspiring, and attempting
to commit such offenses," id. at commentary n.1. Although Simon correctly asserts
simple possession drug offenses are not included, see United States v. Baker, 16 F.3d
854, 856 (8th Cir. 1994), Simon was not convicted of simple possession, but rather of
attempted possession with intent to deliver, a class IV felony punishable by up to five
years imprisonment under Nebraska law. See Neb. Rev. Stat. §§ 28-105, 201(4)(c),
& 416(1)(a) & (2)(b) (1989). Simon's argument that the Nebraska conviction should
be excluded because it is an attempt crime and the Sentencing Commission lacked
statutory authority to include such crimes under § 4B1.1 is foreclosed by our decision
in United States v. Mendoza-Figueroa, 65 F.3d 691 (8th Cir. 1995). We thus conclude
the district court correctly applied the career offender provisions in determining Simon's
sentence.
Simon also claims the district court's finding that he was cultivating 105
marijuana plants was based on insufficient evidence. Contrary to Simon's contention,
the court's finding was supported by the evidence and was not clearly erroneous. See
United States v. Covington, 133 F.3d 639, 643-44 (8th Cir. 1998). Two agents
extensively trained in marijuana identification testified that all 105 plants found in
Simon's outbuilding were marijuana. See id. at 644 (testimony of experienced narcotics
officer sufficient to establish identity of controlled substance). Further testimony
showed that the individually potted plants were counted three times and photographs
showing the plants in detail were introduced into evidence.
-2-
We affirm the sentence imposed by the district court.
A true copy.
Attest:
CLERK, U.S. COURT OF APPEALS, EIGHTH CIRCUIT.
-3-
|
Total coumarins of Hedyotis diffusa induces apoptosis of myelodysplastic syndrome SKM-1 cells by activation of caspases and inhibition of PI3K/Akt pathway proteins.
Hedyotis diffusa is an ethno-medicine used for anti-cancer treatment in the clinic of traditional Chinese medicine (TCM). The total coumarins of Hedyotis diffusa (TCHD) was a selected extract with observed antiproliferative activity, which has not been tested in treatment of myelodysplastic syndromes (MDS) or acute myeloid leukemia (AML). This study aimed to evaluate the apoptosis-inducing effect of TCHD on human MDS cell line (SKM-1) and explore its action mechanism in association with caspase family and PI3K/Akt signaling pathway. The chemical constituents and total coumarins content of TCHD were determined by High Performance Liquid Chromatography-tandem mass spectrometry (HPLC-MS/MS) and UV-vis spectrophotometry, respectively. MTT assay, Hoechst 33258 staining, and Annexin V-FITC/PI double labeling were applied to evaluate TCHD's efficacy on SKM-1 cells. Western blot analysis was also used to clarify the action mechanism of TCHD on protein expression level. Two compounds, p-coumaric acid and E-6-O-p-coumaroyl scandoside methyl ester, were identified in TCHD, and its total coumarins content reached 87.4%. By MTT assay, apoptosis-inducing effect of TCHD on SKM-1 cells was found in a dose-dependent manner after 24-48h treatment, with IC50 values of 104.48μg/ml and 100.66μg/ml, respectively. Morphological and flow cytometry observation also confirmed such effect of TCHD. Western blot analysis clarified its action mechanism associating with the activation of caspases and inhibition of PI3K/Akt pathway proteins. This is the first report regarding the apoptosis-inducing efficacy and mechanism of TCHD on SKM-1 cells, providing a promising candidate of TCM for MDS and AML therapy with fewer side effects. |
To be honest I can't be bothered with management sessions, never get full disclosure.
Intuitive foresight indeed.
Very few questions, but treated to endless management speak from Tarqs that actually said little. Though he clearly stated that the club decision on Banners was rugby related, which I found surprising.
In fairness a short time was put over to Hoops and Flo giving some good insight
The only ones worth going to are when the Coaching staff (and I don't count Hoops who is excellent at management speak and not saying anything) give us alow down on the coming season and who to watch out for in the opposition. Don't think that's been done for sometime now.
Its rather the same as going to a shareholder annual meeting - you will hear what they want you to hear. I'd like to get a straight answer to why Atwood has been 'loaned' to Toulon when he hasn't been fit enough to play for us. I'd like an answer as to why a year ago, Banahan was their poster boy and yet was not deemed sufficiently useful as a player (whereupon he scores tries in his usualfashion) to be offered a non-humiliating contract offer? Also questions on the level of fitness and return from minor injury (just know it'll be that Bath is no different toeveryone else = not good enough). But I wont'- so why bother. Do go along BathMatt- I'm sure your loud applause will be appreciated. Tarquin obviously knows what he is doing,and I won't spell that out.
Adoptee for 2017/18 James Phillips - newly arrived and bringing a wealth of experience in the Prem!
"I'd like to get a straight answer to why Atwood has been 'loaned' to Toulon"
Then read the statements issued by Bath Rugby and Dave Attwood. If you don't believe them, tell Dave he is a liar. Or perhaps you feel that whatever Dave's personal issues were that underlie his decision, these too should be described in detail and made available to the public?
"I'd like an answer as to why a year ago, Banahan was their poster boy and yet was not deemed sufficiently useful as a player (whereupon he scores tries in his usualfashion"
You do know about the progress of time, right? As well as scoring 'tries in his usual fashion', he is also currently injured. We also failed to offer Jerry Guscott a contract this year.
"Questions on the level of fitness and return from minor injury"
If you have access to the internet, then you could always read the Bath Chronicle which has an injury update each week. It's not always 100% accurate, but then again injuries are not mathematical equations.
As I was obviously being considered like many at Old Prostates for selection this season, signing 'young' Guscott might have been inspired! That and a similarly young Lord Dawe to stiffen the sinews might have done the trick!
The question was about the Q&A sessions, not that we should avidly read the Bath Chronicle (which has a vested interest in keeping it all upbeat).
I don't know why I don't entirely believe the account of Atwood being at Toulon, but I thought stupidly that he was contracted to play for Bath unless injured? Silly me! I am only applying the same rules to him as to any other professional player on megabucks.
Funny btw that Gloucester seem to think Banahan is worth a punt isn't it?
Adoptee for 2017/18 James Phillips - newly arrived and bringing a wealth of experience in the Prem!
Of course not. Gave up going to them a couple of years ago. There were never straight answers to a pertinent question, whoever asked it.Apart from Dave Atwood, when asked how he coped with being 'sent home' from England camp and he said "Thatchers"!
I doubt I am missed as there would be plenty of others soaking up every word. p.s. you did ask!
Adoptee for 2017/18 James Phillips - newly arrived and bringing a wealth of experience in the Prem!
Football has obviously been professional for a very long time, c. 150 years, rugby has been openly professional since 1996 so 22 years.
It strikes me that we could do well to observe what has happened and is happening in football to make some parallels with rugby.
Clearly rugby is a more attritional game and therefore strict comparisons are not quite appropriate.
Do people on 'ere remember Bill Shankley or Brian Clough selling one of their top performers in the Summer and all of the Press and supporters saying that they were completely mad, non supportive, selling the fan's favourite etc........
Then by October of the next season the same Press are saying what an inspired move as his (insert any number of household name soccer players) legs had gone and he had lost a yard of pace. It is the coaches job to spot this before it becomes obvious and to remedy it.
I think Banahan is fantastic. I am delighted that somebody has given him a really good three year contract on a lot of money taking him to 35. His body has taken a lot of punishment over the years......he has slowed up, but has also adapted his style of play and has matured. However he does seem to play one, sit one out, play one. As perhaps other people on this Board know (!) there is a trend of exponential decay/decline and especially when you need to be absolutely on peak physical performance to compete in the Aviva. If Banners had a more "wiry" stature he might last longer but his shape is what it is.
You could also say that about Kahn, Saints fans were disappointed to see him go, and he had a great last season but has he been at his best this season. Perhaps that's how Banners stay at Glos will go?
shipwreckedYou could also say that about Kahn, Saints fans were disappointed to see him go, and he had a great last season but has he been at his best this season. Perhaps that's how Banners stay at Glos will go?
I'm firmly with BFJ on this one. Banners and Kahn are chalk and cheese physically. Of course there are instances where it goes the other way - Mike Catt spent about 2 years on the physio bench before playing for LI without missing a single minute until he was 57. Likewise Stringer. But the Club have to look at the balance of probabilities.
So do you really mean to imply that this club just regard their worth as how physically they perform and are likely to? How come Hooper (and several others over the past 5-10 years) who was off more than he was on got his contract renewed - how naÔve can you get!! I am shaking my head in disbelief - they are not racehorses, nor Barbie dolls. If you cannot see that Banahan has been and imhvo still is worth more than his performances on the pitch, then I am right to despair of the way some professional commercial clubs are going. Very sadly, have better happier ways to spend my weekends - and can watch dispassionately on BT sport.
Adoptee for 2017/18 James Phillips - newly arrived and bringing a wealth of experience in the Prem!
The question isn't 'is Banners good this year'. It's 'will he be worth the increased salary cap hit in 3 years'. It's obviously a very tight call. The club clearly see it one way. We might disagree, but we don't have the info on the cap profile they do. If it's a case of 'don't sign Banners allows us to keep JJ and AW as his salary can be disbursed between them' then people might be a bit more conflicted.
What tends to happen.....in amateur sport, is they slip off to the 2nd XV or even 3rd XV and then when there is an injury crisis they step forward and no one expects too much because he's not paid anything, so owes nobody anything, and is helping out in a crisis which accrues much credit.
Paying a full strength Wasps, Saracens, Leicester or Exeter away requires more than sentimentality..........and yes Annie it is entirely to do with how well they perform or indeed are likely to do.
Funnily enough the same performance requirements are required from me in my job and if I don't deliver people vote with their "feet".
Bath Supporter JackWhat tends to happen.....in amateur sport, is they slip off to the 2nd XV or even 3rd XV and then when there is an injury crisis they step forward and no one expects too much because he's not paid anything, so owes nobody anything, and is helping out in a crisis which accrues much credit.
Paying a full strength Wasps, Saracens, Leicester or Exeter away requires more than sentimentality..........and yes Annie it is entirely to do with how well they perform or indeed are likely to do.
Funnily enough the same performance requirements are required from me in my job and if I don't deliver people vote with their "feet".
Bit early for you to start talking about not renewing Annie?
Why dont you say to your bosses you are worth more than your performances command. I'm sure that would convince them.
annie blackthornTrust you to come up with the statistic for Hoops, Hasta! LOL!
Welcome to the internet Annie.
You brought up Hooper; and told a lie about him. It took Hasta approximately 5-10 seconds to prove your lie.
Appearance stats are very, very easy to find.
FTR (after about 30 seconds of internet use): Hooper was with us for 8 years; played 193 times; average just over 24 matches per season.
He wasn't brought in to play LV= rugby (though he did, 10 times for us); so out of 230-odd Prem/Euro matches, he played 183.
Hardly "Was off more than he was on" - and frankly, claiming that is pretty disrespectful, and should absolutely expect to be called on it.
Kidney StoneI was at the q&a and Tarqs stated clearly that on reflection the Banahan contract discussions could have been handled far better. He did not elaborate further, but it makes you think.
Interesting quote from Tarquin at the 'Bath Life' Business Club lunch " The clubs overall are losing about £30m a year and so it's important for them to be stable , but also " A SIGNIFICANT
INCREASE IN MONEY GOING TO THE PLAYERS COULD HAVE A NEGATIVE IMPACT ON BEHAVIOURS" and the things that make the game special - and the reason people feel connected to the game".
Could this have some bearing on the supposed unrest behind the scenes ?
Donít think the thread title has anything to do with it - your comments or the responses to them.
Youíve tried to reframe your point because you were called out for being wrong. The point you now say youíre making - that Hoops was injured a lot in his final season, is why he retired before the end of it. This has no connection to the point you original made about Banahan which was that some players get contract extensions despite not playing as often as others, in fact it directly contradicts it.
We seem very poor at offering contracts that enable senior players to move across into a coaching role towards the end of their career.
With Banners are playing into coaching offer might have kept him...
Matt has been magnificent for the club but I sincerely hope that we are appointing coaches because the DoR wants them to develop a specific aspect of Rugby Union rather than the fact that he is a good bloke!
Whilst we are on the subject I hope our French coach isn't coming simply because he is Bruce's mate!
We record all IP addresses on the Sportnetwork message boards which may be required by the authorities in case of defamatory or abusive comment.
We seek to monitor the Message Boards at regular intervals.
We do not associate Sportnetwork with any of the comments and do not take responsibility for any statements or opinions expressed on the Message Boards.
If you have any cause for concern over any material posted here please let us know as soon as possible by e-mailing
abuse@sportnetwork.net |
Justice With A Passion
“JUSTICE WITH A PASSION-COMMUNITY SERVICE”
The Law Offices of Michael A. Fiumara have been recognized as a service oriented law firm since its inception in 1992. In addition to putting our clients first, the law firm is deeply committed to the community it serves as evidenced by the many community activities and the firm’s active involvement throughout Northern California. Further, the firm was one of the first law firms in the Greater Santa Rosa Area to wholeheartedly reach out to the Hispanic community long before it became popular.
All of the attorneys in the firm have personal interaction with our clients. That provides the satisfaction of knowing that we are helping our clients and making a real difference in their lives. It is a great motivator to be seen within our community sponsoring events, volunteering in the schools, churches, and actively serving on community boards and organizations. The firm is also actively involved in putting on various free seminars and informational forums that disseminate valuable information to the community in both English and Spanish.
One of the driving philosophies of the law firm is to do our very best work for our clients by, “leaving no stone unturned”. The founding partner has always stated that nobody at this law firm should ever “rest upon his/her laurels”. The reason for this belief system is our law firm truly cares about its clients and this could be seen by the great results achieved for them. Further, this kind of dedication and devotion could be seen by the scope and quality of the community service performed for the people the law firm serves. “We are committed to the clients and we give every case everything we have.”-Michael A. Fiumara.
It cannot be stressed enough that, “Every client is a real person with a real problem.”-Founding Partner, Michael A. Fiumara. “Our philosophy is that when we take on a client we do everything in our power that we can for them, not just handle their case routinely or rotely.” For example, in handling a catastrophic injury case for a family, we did not only aggressively pursue the family’s personal injury case, but the firm worked diligently to prevent a disastrous bankruptcy and then worked tirelessly at the end of the case to reduce all the medical liens so that the client would end up with a much higher award in their pocket.
Making a difference in the lives of the firms’ clients is the driving force that makes all of our work efforts worthwhile-whether this means keeping a client from being charged by the district attorney’s office or preventing a client from going to prison. There should never be any question as to whether the client’s attorney will be there for them, or whether their attorney will return their phone call or keep them advised about their case. That is where we stand apart from other law firms. Not only do our clients know they are being zealously represented by some of the top lawyers in the field, but we approach each of their cases with a sense of urgency and compassion that makes us unique. “Justice with a passion,” is something that comes natural to us and in the end, “the right attorney makes all the difference”. |
Selective activation of muscle and skin nociceptors does not trigger exaggerated sympathetic responses in spinal-injured subjects.
Measurement of sympathetic effector organ responses to selective activation of muscle and skin nociceptors below lesion in spinal cord-injured (SCI) subjects. To test whether selective noxious stimulation below lesion causes exaggerated sympathetic responses in human SCI. Prince of Wales Medical Research Institute, Australia. Twelve subjects (C5-T10, ASIA A-C), none of whom had sensation below the lesion, were included in the study. Selective stimulation of muscle or cutaneous nociceptors was produced by bolus injection of hypertonic (5%) saline into the tibialis anterior muscle or overlying skin and compared with non-noxious electrical stimulation of the abdominal wall. Cutaneous vasoconstrictor (photoelectric plethysmography) and sudomotor (skin conductance) responses, in addition to respiration, heart rate and continuous arterial pressure were monitored. Electrical stimulation of the abdominal wall caused a significant increase in arterial pressure (31.8+/-6.1%). Conversely, intramuscular or subcutaneous injection of hypertonic saline caused no significant changes in blood pressure (-3.0+/-2.4%; -1.4+/-3.4%) heart rate, skin blood flow or sweat release. While hypertonic saline injected into muscle or skin induces strong pain, cutaneous vasoconstriction and sweat release in able-bodied subjects, we saw no evidence of exaggerated sympathoexcitation when these same noxious stimuli were delivered below lesion in subjects with SCI. This suggests that certain types of somatic noxious input may not trigger autonomic dysreflexia, and questions the concept that any painful stimuli originating below lesion can reliably trigger dysreflexia. |
Residents in Clayton County, Georgia will think twice before disobeying the law with their new sheriff's deputy.
Legendary NBA center Shaquille O'Neal was sworn in by the area's sheriff, Victor Hill, at the weekend as an honorary deputy.
The former LA Lakers and Miami Heat star becomes the tallest deputy in the county's history, standing at 7ft 1in.
Shaquille O'Neal (right) was sworn in by Clayton County sheriff Victor Hill (left)
The four-time NBA champion is one of the most recognizable figures in American sport
'Welcome to the crime fighting family, Shaq!' Hill posted to his Facebook page on Saturday.
O'Neal has also has been designated as an honorary US Deputy Marshal and a reserve police officer with agencies in California, Arizona and Florida, reported Clayton News-Daily.com.
The four-time NBA champion has been a part-time Atlantan for the past 15 years with three properties in the area: a Buckhead condo, a six-acre farm in Gwinnett and a £1.2million home in McDonough.
The 44-year-old is also the owner of one of Atlanta's much-loved sweet eateries, having bought a downtown Krispy Kreme franchise last October. |
Greece considers new bond sale
Athens - Greece is considering a bond sale to raise 3.0-6.0 billion euros ($4.2-8.3 billion) after a successful five-year issue earlier this month, the finance ministry said on Wednesday.
“The finance ministry ... is already processing and preparing a programme for the possibility of a new recourse to markets for a sum of 3.0-6.0 billion euros,” the ministry said in a budget presentation.
The bond issue is likely to be made over the next 12 months, alternate finance minister Christos Staikouras later told reporters.
Greece earlier in April returned to medium-term international bond markets for the first time in four years, raising 3.0 billion euros at under 5.0 percent.
The Greek government expects the country to return to growth this year from a recession which has slashed the country's gross domestic product by a quarter and sent the unemployment rate soaring to 28 percent.
The government now hopes to begin debt relief talks in May with its EU-IMF creditors after achieving a primary surplus last year.
EU data agency Eurostat last week confirmed that Athens had achieved a 2013 primary budget surplus - the balance before interest and stripping out bank support and other payments - equal to 0.8 percent of GDP.
However, Greek bonds still carry junk status, unemployment is soaring, and Athens is still saddled with a debt mountain equal to 175 percent of GDP, according to Eurostat. - Sapa-AFP |
Canadian Rebuke to Saudi Arabia Long Overdue
Thu, 09/06/2018 - 08:37 — admin
Canadian Rebuke to Saudi Arabia Long Overdue
As published in the Victoria Standard: August 29, 2018.
After decades of quietly tolerating Saudi Arabia’s ugly human rights record, Canada recently objected by Twitter, sharply annoying both the regime and those who deal profitably with the oil-rich kingdom.
Official Canada’s approach to this brutal theocracy rests on the fantasy that continued exposure to superior Canadian ethics will eventually liberalize the regime. Unfortunately, there is little evidence linking Western influence to the modest social reforms now underway in Saudi Arabia. Until political dissent and protest are tolerated, genuine progress is a distant hope.
On August 3, the Saudi government reacted strongly to Foreign Minister Chrystia Freeland’s Tweet requesting the release of prominent women's rights campaigner Samar Badawi and other civil society activists. Badawi’s bother Raif currently sits in a Saudi Arabian prison for criticizing powerful Saudi clerics and government officials. Prime Minister Trudeau subsequently refused to apologize for Freeland’s remarks and declared his intention to continue advocating both publicly and privately for human rights.
The Saudi government retaliated by expelling Canada’s ambassador, stopping Toronto flights, halting investment and trade and recalling 16,000 Saudi students. Of Toronto’s 3600 medical residents, 216 are Saudi so their absence many have a negative effect on patients formerly under their care.
Some corporate pundits have declared the affair an international crisis and a danger to progress on human rights in Saudi Arabia. The kingdom’s response to Freeland’s reasonable request is clear evidence of Saudi Arabia’s confidence in its ability to intimidate and manipulate both domestic and foreign critics.
I wasn’t surprised to note John Baird’s recent appearance on Saudi Arabian state TV where he demanded that Canada apologize to the regime for daring to criticize its behavior. The Barrick Gold advisor and former Conservative foreign affairs minister was likely concerned about Barrick’s Saudi ventures. A well-connected individual like Baird must be aware that Saudi Arabia recently sentenced a female political activist to death by beheading, nevertheless, he scolded Canada.
When I wrote last year about Canada’s military exports to Saudi Arabia, I was unaware that in 2014, Saudi Arabia replaced the U.S. as Canada’s top arms customer. This change was due to the $14.8 billion LAV (light armored vehicle) contracts brokered for General Dynamics Canada by a crown corporation called Canadian Commercial Corporation. While these vehicles have not yet been delivered, official claims about the LAV are ridiculous.
Both the Harper and Trudeau governments have attempted to present the LAV as a benign form of military transportation. However, these vehicles are designed to carry a host of lethal weapons designed primarily for use against military targets rather than civilians. The powerful LAV will mount machine guns, automatic grenade launchers, cannons and computerized antitank rockets.
Saudi Arabia’s neighbour Bahrain deployed Canadian-built Saudi LAVs to attack domestic pro-democracy demonstrators in 2011. In 2015, Saudi LAV’s in Najran, Yemen, were identified as Canadian-made by a retired Canadian general who spoke anonymously to the Globe and Mail.
Aside from being Canada’s largest arms customer, Saudi Arabia is deemed a stabilizing force in the Middle East, at least by Canada’s government, major corporations, certain lobby groups and corporate pundits. Therefore, our so-called cordial relations with the Saudis are mainly formal and as recently demonstrated, rather fragile.
Of special value is Saudi Arabia’s basic neutrality on Israel and their hostility to Iran’s influence in the Middle East. The kingdom’s enormous oil reserves have facilitated a U.S. guarantee of Saudi security in exchange for their role in stabilizing the international price and supply of oil.
A common theme among Canadian supporters of expanding Alberta’s oil sands and building national pipelines is hostility to so-called unethical oil imports. Perhaps these people miss the hypocrisy of supporting ethical oil while simultaneously exporting armored vehicles to the unethical Saudi regime for the sake of Canadian jobs. Unfortunately, Canada is one of many nations eager to sell weapons to Saudi Arabia and other repressive Gulf States.
In spite of Chrystia Freeland’s bold Tweet, official Canada is still vague about its plans to oppose Saudi Arabia’s ongoing human rights abuses and the latest LAV deal will likely proceed. Only a global rejection of fossil fuel extraction will remove Saudi Arabia’s ability to exploit Western self-interest and the geopolitics of oil. |
/****************************************************************************
**
** Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies).
** All rights reserved.
** Contact: Nokia Corporation (qt-info@nokia.com)
**
** This file is part of the QtDeclarative module of the Qt Toolkit.
**
** $QT_BEGIN_LICENSE:LGPL$
** Commercial Usage
** Licensees holding valid Qt Commercial licenses may use this file in
** accordance with the Qt Commercial License Agreement provided with the
** Software or, alternatively, in accordance with the terms contained in
** a written agreement between you and Nokia.
**
** GNU Lesser General Public License Usage
** Alternatively, this file may be used under the terms of the GNU Lesser
** General Public License version 2.1 as published by the Free Software
** Foundation and appearing in the file LICENSE.LGPL included in the
** packaging of this file. Please review the following information to
** ensure the GNU Lesser General Public License version 2.1 requirements
** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
**
** In addition, as a special exception, Nokia gives you certain additional
** rights. These rights are described in the Nokia Qt LGPL Exception
** version 1.1, included in the file LGPL_EXCEPTION.txt in this package.
**
** GNU General Public License Usage
** Alternatively, this file may be used under the terms of the GNU
** General Public License version 3.0 as published by the Free Software
** Foundation and appearing in the file LICENSE.GPL included in the
** packaging of this file. Please review the following information to
** ensure the GNU General Public License version 3.0 requirements will be
** met: http://www.gnu.org/copyleft/gpl.html.
**
** If you have questions regarding the use of this file, please contact
** Nokia at qt-info@nokia.com.
** $QT_END_LICENSE$
**
****************************************************************************/
import Qt 4.7
Image {
id: container
property bool on: false
source: "images/busy.png"; visible: container.on
NumberAnimation on rotation { running: container.on; from: 0; to: 360; loops: Animation.Infinite; duration: 1200 }
}
|
83 F.3d 779
77 A.F.T.R.2d 96-2177, 64 USLW 2736,96-1 USTC P 50,267
UNITED STATES of America, Plaintiff-Appellee,v.William J. ALT, M.D.; Rosalinda Alt; Karen Alt; Robert W.Alt, Defendants,William J. Alt, M.D., Defendant-Appellant.
No. 95-1124.
United States Court of Appeals,Sixth Circuit.
Argued April 16, 1996.Decided May 15, 1996.
Gary R. Allen, Acting Chief (briefed), Charles E. Brookhart, William J. Patton (argued), Laurie Snyder, U.S. Dept. of Justice, Appellate Section Tax Div., Washington, DC, for U.S.
Allan A. Ackerman (argued and briefed), Chicago, IL, for William J. Alt.
William J. Alt, Nunica, MI, pro se.
Rosalinda Alt, Nunica, MI, pro se.
Robert W. Alt, Nunica, MI, pro se.
Before: MILBURN and BOGGS, Circuit Judges; and BORMAN, District Judge.*
PER CURIAM.
1
Dr. William Alt appeals a civil verdict for the plaintiff United States in an action to collect back taxes, interest, and statutory penalties under the Internal Revenue Code. Alt, who had already pled guilty to criminal charges of income tax fraud, contends that the award of statutory penalties to the government violates the Double Jeopardy and Excessive Fines Clauses of the Constitution. The district court rejected Alt's defense, holding that the award of tax penalties was not "punishment" under United States v. Halper, 490 U.S. 435, 447-48, 109 S.Ct. 1892, 1901, 104 L.Ed.2d 487 (1989). We affirm.
2
* In January 1991, a jury found Dr. William Alt and his daughter, Karen Alt, guilty of various federal income tax crimes. The United States District Court for the Western District of Michigan sentenced Alt to ten years in prison, and ordered him to pay a $200,000 fine. Alt appealed. This court reversed his conviction on the ground that the district court gave the jury an improper instruction, and remanded the case for a new trial. United States v. Alt, 996 F.2d 827, 828-830 (6th Cir.1993). On May 24, 1994, Alt pled guilty to a misdemeanor offense and was sentenced to time served.
3
On September 15, 1992, while Alt's original appeal was pending, the United States filed a civil action against Alt seeking back taxes, various statutory penalties for fraud, understatement, and negligence, and interest on these amounts. The parties and the district court agreed to try the factual elements of the case on November 8, 1994, but to address any constitutional claims by Alt in post-trial briefs. The United States proved its affirmative case at trial, Alt offering no evidence to the contrary. On November 28, 1992, Alt filed a post-trial brief arguing that a verdict in favor of the government would violate the Double Jeopardy Clause.
4
The district court held that the tax penalties were "civil [rather than] punitive in nature"--and were not "punishment" for the purposes of the Double Jeopardy Clause. Alt filed a timely notice of appeal.
II
5
The Double Jeopardy Clause forbids a second punishment for a single offense. United States v. Halper, 490 U.S. 435, 440, 109 S.Ct. 1892, 1897, 104 L.Ed.2d 487 (1989). The parties do not dispute that Alt was punished once for his tax offenses. See United States v. Ursery, 59 F.3d 568, 572 (6th Cir.1995), cert. granted, U.S. ----, 116 S.Ct. 762, 133 L.Ed.2d 707 (1996) (jeopardy attaches when court accepts guilty plea). The sole issue before us is whether the assessment of tax penalties is another "punishment." A civil award is punishment whenever it "cannot fairly be said solely to serve a remedial purpose, but rather can only be explained as also serving either retributive or deterrent purposes." Halper, 490 U.S. at 448, 109 S.Ct. at 1902.
6
The tax penalties at issue in this case are authorized by 26 U.S.C. §§ 6653(a), 6653(b), and 6661. These sections are located in Chapter 68 of the Internal Revenue Code ("Additions and Penalties"), next to other civil additions to taxes, such as the penalty for not filing a return on time, § 6651, or the penalty for bringing a frivolous action in court, § 6673. The criminal provisions of the Code are located at § 7201 et seq. in Chapter 75 ("Crimes"). The Code instructs that the civil penalties are to be assessed, collected, and paid in the same manner as normal taxes. 26 U.S.C. § 6662(a)(1) and (2).
7
The Supreme Court has held that a civil tax "addition" for a fraudulent filing serves only a remedial purpose, and does not constitute punishment for the purposes of double jeopardy analysis. Helvering v. Mitchell, 303 U.S. 391, 58 S.Ct. 630, 82 L.Ed. 917 (1938). Accord Traficant v. Commissioner, 884 F.2d 258, 263 (6th Cir.1989). In Mitchell, the federal government indicted Mitchell for tax fraud. After a jury acquitted Mitchell, the federal government sought tax penalties constituting 50% of the taxes that he did not pay. The Court held that such penalties were not criminal penalties, but were intended by Congress to reimburse the Government for the costs of discovering and recovering losses caused by Mitchell's tax fraud. Id. 303 U.S. at 399-405, 58 S.Ct. at 633-36.
8
Alt argues that the rule expressed in Mitchell should be set aside because of three recent cases: Halper, 490 U.S. at 435, 109 S.Ct. at 1892; Dept. of Revenue of Montana v. Kurth Ranch, 511 U.S. 767, 114 S.Ct. 1937, 128 L.Ed.2d 767 (1994); and Austin v. United States, 509 U.S. 602, 113 S.Ct. 2801, 125 L.Ed.2d 488 (1993). Each of these cases found that a particular civil penalty rose to the level of "punishment." In Halper, the defendant Medicare provider made sixty-five false claims, each resulting in a loss to the government of nine dollars. The government prosecuted the defendant for fraud, and the defendant was convicted. The government then filed a separate civil action to recover a $2,000 civil penalty for each of the sixty-five violations. The Court held that a civil penalty "more than 220 times greater than the Government's measurable los[s] qualified as punishment." Halper, 490 U.S. at 436, 109 S.Ct. at 1895. In Kurth, the defendant was convicted of a federal drug violation. The State of Montana then sought a "tax" from the defendant equal to approximately eight times the market value of the drugs that the defendant had been convicted of possessing. The Court held that this "tax" constituted punishment because it was disproportionately high, conditioned on conviction for the predicate federal crime, and clearly intended to punish. Id. 511 U.S. at ----, 114 S.Ct. at 1947. In Austin, the defendant used his home and small business to store certain drugs. After he pled guilty to state law drug offenses, the federal government sought forfeiture of his home and business. The court held that the civil forfeiture provisions of 21 U.S.C. §§ 881(a)(4) and (a)(7) could not be said to serve solely a remedial purpose, and that they therefore constituted "punishment" for the purposes of Excessive Fines Clause analysis.
9
Together, these three cases clearly suggest that some civil tax additions can be punishment. Halper, 490 U.S. at 447, 109 S.Ct. at 1901 ("the labels 'criminal' and 'civil' are not of paramount importance"); Kurth, 511 U.S. at ----, 114 S.Ct. at 1946 ("a tax is not immune from double jeopardy scrutiny simply because it is a tax"). However, the three cases address extraordinary circumstances where a civil penalty either (i) had no remedial purpose, or (ii) was several times greater than necessary to achieve a remedial purpose. The three cases do not say that all tax additions are punishment, or even that any civil provision of the tax code is punishment. In fact, the flagship of the three, Halper, cites Mitchell as an example of a perfectly acceptable type of civil sanction.
10
The relevant teaching of [Mitchell and similar cases concerning other types of civil penalties] is that the Government is entitled to rough remedial justice, that is, it may demand compensation according to somewhat imprecise formulas, such as reasonable liquidated damages, without being deemed to have imposed a second punishment for the purpose of double jeopardy analysis. These cases do not tell us, because the problem was not presented in them, what the Constitution commands when one of those imprecise formulas authorizes a supposedly remedial sanction that does not remotely approximate the Government's damages and actual costs, and rough justice becomes clear injustice.
11
Halper, 490 U.S. at 446, 109 S.Ct. at 1892 (emphasis added). We read this language in Halper to mean that the only civil fraud penalties that constitute "punishment" are those that do not remotely approximate the amount of money that the Government would be entitled to were it simply trying to recoup a loss. Ibid.
12
In Alt's case, the amount of the penalty is a fixed proportion of the taxes that Alt wrongly failed to pay. The principal amounts of the taxes and the penalties are as follows:
13
YEAR TAX DUE FRAUD UNDERST. NEGLIGENCE TOTAL
PENALTY PENALTY PENALTY DUE
-----------------------------------------------------------------
1981 $ 83,655 0 0 $ 4,183 $ 87,838
1982 $ 78,510 $ 39,255 $ 19,627 $ 3,926 $ 144,318
1983 $ 180,890 $ 90,455 $ 45,223 $ 9,045 $ 235,158
1984 $ 160,170 $ 80,085 $ 40,043 $ 8,009 $ 288,307
1985 $ 68,123 0 $ 17,031 $ 3,406 $ 88,560
1986 $ 227,466 $ 170,600 $ 56,867 0 $ 454,933
1987 $ 226,508 $ 169,881 $ 56,627 0 $ 453,016
1988 $ 213,997 $ 160,498 $ 53,499 0 $ 427,994
1989 $ 404,708 $ 303,531 0 0 $ 708,239
TOTALS: $1,644,027 $1,014,295 $288,917 $28,569 $2,975,808
Appellee's Brief at 8. The district court ordered Alt to pay $5,053,042.08 to the United States. The $2,077,234.08 difference between Alt's original liability and the amount he now owes represents interest on the taxes and penalties.
According to the chart above, Alt is liable for an average of eighty-one cents in penalties for every dollar that he fraudulently underpaid. The stated purpose of the tax penalties at I.R.C. §§ 6653(a), 6653(b), and 6661 is to compensate the government for "the costs of investigation, detection, and recovery of ... lost money." Barnette v. Commissioner, 95 T.C. 341, 347-48, 1990 WL 136710 (1990). The penalties are not outrageous in light of this purpose. The fraud penalty is the most onerous, set at fifty or seventy-five percent of the lost tax revenue. The heavy penalty for fraud may be explained by the fact that actively fraudulent filings are more difficult to catch than merely negligent ones. The understatement penalty and negligence penalties, set at twenty-five and five percent respectively, are simply not the type of unusual burden that Halper was meant to police. Accord Karpa v. Commissioner, 909 F.2d 784, 788 (4th Cir.1990) ("[w]e cannot say that a 25% penalty [for understatement] is overwhelmingly disproportionate" to the government's loss). In fact, Halper itself distinguished its situation from that of a prior case in which the government recovered double damages for fraud. Halper, 490 U.S. at 445-46, 109 S.Ct. at 1900 (citing Rex Trailer Co. v. United States, 350 U.S. 148, 76 S.Ct. 219, 100 L.Ed. 149 (1956) (double fraud damages against people falsely claiming to be veterans is not "punishment")).
[W]e have recognized that in the ordinary case fixed-penalty-plus-double-damages provisions can be said to do no more than make the Government whole.
....
We cast no shadow on these time-honored judgments....
Halper, 490 U.S. at 449, 109 S.Ct. at 1902. Since the Supreme Court has reaffirmed its holding that a hundred-percent penalty can be rationally related to the costs of catching and prosecuting fraud, we feel bound to hold that a eighty-one percent penalty can be as well.
Of course, a simple comparison of the size of the civil penalty to the amount of probable financial damage will not resolve every case under Halper. Other factors, such as Congress's stated purpose and historical ideas about particular remedies, are relevant in determining when someone is "punished" by a particular law. See Kurth Ranch, 511 U.S. at ----, 114 S.Ct. at 1946 ("neither a high rate of taxation nor an obvious deterrent purpose automatically [makes a] tax a form of punishment"). A convincing discrepancy between the penalty and the actual loss (or anticipated actual loss), however, does seem to be a prerequisite to punishment--at least when a statute offers a remedial reason for the sanction. No convincing discrepancy exists in Alt's case.
Alt tries to avoid Halper 's incorporation of Mitchell by stressing Austin and other cases about civil forfeiture of property used to make or deal drugs. E.g., United States v. Ursery, 59 F.3d 568, 572-73 (6th Cir.1995), cert. granted, --- U.S. ----, 116 S.Ct. 762, 133 L.Ed.2d 707 (1996); United States v. $405,089.23 in United States Currency, 33 F.3d 1210 (9th Cir.1994), cert. granted, --- U.S. ----, 116 S.Ct. 762, 133 L.Ed.2d 707 (1996). These cases have not focused specifically on the value of property seized--relying instead on the clear historical and legislative understanding that forfeiture of property used to commit crimes is a punitive measure. As a result, the focus on the size of the sanction, important in Halper, takes a back seat to a discussion about the abstract type of the sanction. Austin, 509 U.S. at 621-22, 113 S.Ct. at 2812.
Such precedent, however, has little to do with Alt's case. Civil forfeiture is a penalty tied to commission of a criminal offense and unrelated to a specific loss by the government. See Austin v. United States, 509 U.S. at 621-22, 113 S.Ct. at 2812 (value of property forfeited varies so radically it cannot be said to be rationally related to cost of enforcing drug laws). A civil tax addition can be collected in the absence of a crime (e.g., for negligent filing) and its amount varies proportionately with the taxes wrongly withheld. Nor is Alt correct to argue that civil forfeiture precedent is relevant because the government, in a pleading before the lower court seeking a forced sale of some of Alt's property to pay his debts, asks for a "civil forfeiture judgment." Appellant's Brief at 14. First, the government's label cannot change the nature of the sanction against Alt. See Halper, 490 U.S. at 447, 109 S.Ct. at 1901 ("the labels ... are not of paramount importance"). Second, forfeiture of real property as a statutory sanction for a criminal offense is different than foreclosure on real property because a party cannot pay a monetary debt. Debt foreclosure has sources of authority firmly within the parameters of "civil" law.
Because we hold that the tax penalties awarded against Alt are not "punishment," there is no need to address Alt's claim that the penalties constitute an excessive fine under the Eighth Amendment. Like the Double Jeopardy Clause, the Excessive Fines Clause only protects against "punishment," see, e.g., Browning-Ferris Indus. v. Kelco Disposal, Inc., 492 U.S. 257, 265, 109 S.Ct. 2909, 2915, 106 L.Ed.2d 219 (1989) (a fine is a "payment to a sovereign as punishment for some offense"), and the test for "punishment" is the same under both doctrines. Austin v. United States, 509 U.S. at 621-22, 113 S.Ct. at 2812, (applying test from Halper to determine if a civil penalty is punishment for the purposes of the Excessive Fines Clause).
III
Alt was not "punished" by the imposition of the tax penalties. The district court's judgment is therefore AFFIRMED.
*
The Honorable Paul D. Borman, United States District Judge for the Eastern District of Michigan, sitting by designation
|
[The predictive factors for cerebral infarction in patients with non-rheumatic atrial fibrillation].
To investigate possible factors predicting cerebral infarction (CI) in patients with non-rheumatic atrial fibrillation, we reviewed the clinical records of 79 patients in whom conversion from sinus rhythm to persistent atrial fibrillation was confirmed by serial electrocardiographic tracings. The patients averaged 68.4 years in age and their average observation period after transition to persistent atrial fibrillation was 4.1 years. During the observation period, 20 patients developed CI. CI occurred in 10 of 22 patients with hypertensive heart disease, but in only three of 30 patients with lone atrial fibrillation and the difference was statistically significant (p less than 0.01). We compared demographic and pathophysiologic factors recorded at the onset of fixed atrial fibrillation between groups with and without CI. There were no significant differences in age, sex, smoking habits, diabetic complications and serum cholesterol level, but hematocrit level was significantly higher in patients with CI than in those without CI (45.3 +/- 3.2% vs 42.3 +/- 4.4%, p less than 0.01). The cardiothoracic ratio was not significantly different, but echocardiographic left atrial dimension was significantly greater in patients with CI than in those without CI (43.7 +/- 3.3 mm vs 38.6 +/- 5.8 mm, p less than 0.01). The left ventricular ejection fraction was significantly lower in patients with CI than in those without CI (62.2 +/- 16.6% vs 72.9 +/- 8.2%, p less than 0.05) and congestive heart failure was significantly more frequent in patients with CI than in those without CI (40.0% vs 13.6%, p less than 0.05).(ABSTRACT TRUNCATED AT 250 WORDS) |
T[he]{.smallcaps} addition of new membrane to nerve processes is an essential step in nerve growth and differentiation ([@B15]). New membrane components are synthesized in the cell body and delivered to the plasmalemma by fast axonal transport ([@B2]; [@B44]). Inhibition of the new membrane supply, using either pharmacological treatments or the optical tweezers technique, rapidly arrests axonal growth ([@B42]; [@B33]; [@B14]). The topology of new membrane insertion into the growing nerve processes remains controversial. Insertion of new membrane may occur in the vicinity of the cell body, at the growth cone area, or along the growing neurites ([@B10]; [@B24]). Two different experimental strategies, previously used to determine the sites of new membrane addition to the growing axons, have focused on the different aspects of membrane addition. In the first approach, neurites are tagged with plasma membrane--attached microparticles, or reporter molecules, and movement of these markers is monitored using video microscopy. This method has been designed to detect the sites of bulk membrane insertion into the axon; it does not allow for discrimination between exo- and endocytic contributions to the net addition of the new membrane. The second approach focuses specifically on the exocytic component and attempts to visualize the sites of addition of the newly synthesized plasma membrane proteins or lipids to the plasmalemma.
In the attempts to determine the sites of membrane insertion using the first approach, plasma membrane markers were found to be stationary ([@B10]), to move retrogradely ([@B37]), or to move anterogradely ([@B60]; [@B45]). The translocation of the markers was taken as a measure of the net insertion, or retrieval, of plasma membrane material along the axon proximal to the site of tagging. However, the plasma membrane probes used in these experiments, such as large membrane-associated particles, are likely to be anchored to the axonal cytoskeleton ([@B1]; [@B46]; [@B45]; [@B39]). In this case, the movement of the probes would reflect the translocation of unidentified cytoskeletal elements and may not be related to the movement of plasma membrane lipids, as is the case for nonneuronal translocating cells ([@B1]; [@B52]; [@B38]). To overcome this technical limitation, attempts have been made to specifically detect the translocation of plasma membrane lipids ([@B48]; [@B17]). In *Xenopus* spinal cord neurons grown on laminin-coated coverslips, bulk anterograde lipid flow has been reported ([@B48]), suggesting membrane addition along the neurite. In contrast, in chick DRG neurons, rapidly diffusing latex microbeads were found to translocate retrogradely ([@B17]), indicating preferential membrane addition to the growth cone region and bulk membrane endocytosis at the cell body. The efforts to directly visualize the sites of addition of new proteins or lipid to the growing axon using the second approach have also led to conflicting results ([@B22]; [@B27]; [@B47]; [@B16]; [@B29]; [@B59]). Thus, strong evidence has been obtained both supporting and opposing the concept of preferential addition of the newly synthesized plasma membrane components to the growth cone region.
In this study, we directly visualized the traffic of new membrane material in the *Xenopus* embryo neurons by locally labeling the cell body--derived vesicles with the fluorescent lipid analogue 1,1′-didodecyl-3,3,3′,3′-tetramethylindocarbocyanide (DiIC~12~).^1^ The anterograde transport of new membrane carriers was detected by digital fluorescent microscopy. The new membrane was transported by the cell body--derived tubovesicular organelles, which were delivered to and preferentially inserted into the distal axon. We found that modulation of axonal microtubule dynamics had a dramatic effect on the pattern of membrane addition to the axonal plasmalemma. Thus, the dynamics of axonal microtubules may serve as a basic regulator of the topology of the new membrane addition to the nerve processes.
Materials and Methods {#MaterialsMethods}
=====================
Cell Culture
------------
*Xenopus* embryo neuronal cultures were prepared as previously reported ([@B3]). In brief, the neuronal tube of embryos at stages 19--24 was dissociated in Ca^2+^- and Mg^2+^-free solution (115 nM NaCl, 2.6 mM KCl, 10 mM Hepes, 0.4 mM EDTA, pH 7.6). Dissociated cells were plated on glass coverslips precoated with concanavalin A (0.1--1.0 μg/cm^2^; Sigma Chemical Co., St. Louis, MO). The cultures were kept at 20°C in culture medium consisting of (vol/vol) 50% Leibovitz L-15 medium (GIBCO BRL; Life Technologies, Gaithersburg, MD), 49% Ringer\'s solution (115 mM NaCl, 2 mM CaCl~2~, 2.5 mM KCl, 10 mM Hepes, pH 7.6), 1% fetal bovine serum (GIBCO BRL), and 50 ng/ml neurotrophin-3. The neurons were used for experiments 24--48 h after plating.
Local Labeling of the Cell Body--derived Vesicles
-------------------------------------------------
DiIC~12~ (Molecular Probes, Eugene, OR) was prepared as a 1 mg/ml stock solution in methanol. Local perfusion of the cell body was performed according to previously reported methods ([@B48]). In brief, two pipettes were placed opposite to each other at a distance of 20--40 μm from the neuronal surface. The first pipette (inner diameter 2--3 μm) was filled with 10 μg/ml of DiIC~12~, which was dissolved immediately before experiments in the solution containing 57.5 mM NaCl, 60 mM KCl, 2 mM CaCl~2~, and 10 mM Hepes, pH 7.6. A small hydrostatic pressure applied to the pipette resulted in a constant outflow of the intrapipette solution. The second pipette with tip opening of ∼10 μm was used for removal of the superfusion solution from the culture medium, thereby reducing the affected area to ∼30 μm. The pipettes were withdrawn from the soma 30--60 s after the onset of perfusion.
Image Acquisition and Data Analysis
-----------------------------------
Cells were observed using an inverted microscope (model IX 50; Olympus America, Inc., Melville, NY) equipped with differential interference contrast optics, a 60× Fluorite objective (NA 1.2), and a 100-W mercury lamp. The light passed through an infrared-blocking filter, neutral density filters, and a rhodamine wide-band filter. Images were acquired with a charge-coupled device (CCD) camera (model ImagePoint or SenSys; Photometrics, Tucson, AZ) driven by IPLab (Signal Analytics Corp., Vienna, VA) imaging software. Exposure time was 0.2--1 s. Images were processed with IPLab and Photoshop (Adobe Systems, Mountain View, CA). Quantitation of data was performed using IPLab software. Typically, the distribution of fluorescence intensity along the axon was obtained by measuring the intensity within individual pixels along the length of neurite or along individual filopodia. The background fluorescence, measured in cell-free areas ∼10 μm from the axon, was subtracted from the fluorescence at the neurite.
Microinjection of Cy3-tubulin into Xenopus Embryos
--------------------------------------------------
Cy3-tubulin was a generous gift of Dr. Gary Borisy (University of Wisconsin, Madison, WI). Details of Cy3-tubulin preparation can be obtained from <http://borisy.bocklabs.wisc.edu>. *Xenopus* embryos were injected with 10--25 nl of 10 mg/ml Cy3-tubulin as described before ([@B14]). The embryos were allowed to develop to stages 19--24 and were then used for the preparation of neuronal cultures.
Detergent Extraction
--------------------
Neurons labeled with Cy3-tubulin were extracted in a microtubule (MT)- stabilizing buffer (60 mM Pipes, 1 mM MgCl~2~, 5 mM EGTA, 0.1% Triton X-100, 10 μM taxol, pH 6.8) for 5 min and examined under a fluorescent microscope. For each axon, the fluorescence intensity was compared before and after extraction.
Immunocytochemistry
-------------------
The cells were permeabilized with 0.1% Triton X-100 in solution containing 10 μM taxol, 60 mM Pipes, 1 mM EGTA, 4% polyethylene glycol, and 1 mM MgCl~2~, pH 6.9, and fixed with 0.5% glutaraldehyde in PBS for 20 min. Glutaraldehyde was quenched with two changes of 2 mg/ml sodium borohydride in PBS. Cells were incubated with a primary and then with a secondary antibody for 1 h at room temperature. All antibody solutions were prepared in PBS containing 2 mg/ml bovine serum albumin. The primary antibody used was a mouse monoclonal antibody to β-tubulin (Amersham Corp., Arlington Heights, IL), and the secondary antibody was rhodamine-conjugated anti--mouse IgG (Jackson ImmunoResearch, West Grove, PA).
Results {#Results}
=======
Staining of Cell Body--derived Vesicles with Fluorescent Lipid Analogue DiIC~12~
--------------------------------------------------------------------------------
The cultures of *Xenopus* embryo neurons were prepared on a concanavalin A--coated substrate in the presence of the neurotrophic factor neurotrophin-3 ([@B14]). Under these culture conditions, neurites form ∼4--6 h after plating and grow at a the rate of ∼30--40 μm/h for a few days; these neurites are usually referred to as "axons" ([@B49]; [@B61]; [@B55]). Experiments were performed 24--48 h after cell culture preparation on axons that were 1.2--2.0 mm in length and were free of contact with other cells.
We used a local superfusion technique ([@B48]; [@B21]) to stain the plasma membrane at the cell body with fluorescent lipid analogue DiIC~12~ (Fig. [1](#F1){ref-type="fig"} *A*). Within 2--3 min after the onset of perfusion, the soma was brightly labeled with DiIC~12~ molecules. Initially, the staining was largely localized to the cell body. With time, plasma membrane staining could be detected at progressively greater distances from the soma (Fig. [1](#F1){ref-type="fig"} *B*), consistent with lateral diffusion of DiIC~12~ molecules along the axonal plasmalemma ([@B48]). In the first 20 min after cell body labeling, no plasma membrane staining was observed at the distal axonal segment, in agreement with the rapid drop in the rate of diffusional transport with increasing distance. However, fluorescent microscopy of the axon ∼1 mm from the soma, well beyond the reach of diffusional transport, revealed brightly stained tubovesicular organelles (Fig. [1](#F1){ref-type="fig"} *C*). As judged by the fluorescent microscopy, these organelles ranged from ∼0.2 μm (the diffraction limit of the light microscopy) to ∼4 μm in length. The DiIC~12~-stained organelles could be detected with a delay of ∼10--15 min after the onset of soma labeling. The organelles were transported in an anterograde direction at the rate of 2.93 ± 0.78 μm/s (mean ± SEM of 137 vesicles in 15 neurons), in agreement with previously reported rates of the fast axonal transport ([@B2]; [@B44]). Occasionally, we observed some "hesitation" in this anterograde transport; however, none of the organelles changed direction of movement (total of 1,578 vesicles in 26 neurons; average observation distance ∼150 μm). This result suggests that the polarity of axonal MTs in growing *Xenopus* neurites is uniform. Staining of neuronal cultures with rhodamine-123, a mitochondria-specific fluorescent dye, indicated that the movement of mitochondria from the soma to the axon was a very rare event. The majority of mitochondria frequently changed their direction of movement and did not translocate over long distances along the axon (data not shown). Moreover, DiIC~12~-stained tubovesicular organelles were able to fuse with the plasmalemma (see below). Accordingly, we conclude that the overwhelming majority of DiIC~12~-stained vesicles detected along the axon are distinct from mitochondria.
No fluorescent vesicles could be detected at the distal axon within 1 h after the labeling of the cell body if the longer hydrocarbon chain DiIC~12~ analogue, DiIC~18~, was used. These data are consistent with the scenario in which the lypophilic long-chain DiIC~18~ molecules are restricted to the plasma membrane. Because of the low level of constitutive endocytic activity at the soma region ([@B11]), the rate of internalization of DiIC~18~ molecules is low. Therefore, the appearance of DiIC~12~-labeled vesicles at the distal axon reflected a redistribution of DiIC~12~ molecules from the plasma membrane to the cytoplasm, and nonspecific staining of all lipid-containing organelles in the cell body. These organelles were transported anterogradely, and at sufficiently large distances from the soma, they could be visualized in the absence of plasma membrane staining.
Cell Body--derived Vesicles Are Transported to the Growth Cone Region and Fuse with the Plasma Membrane
-------------------------------------------------------------------------------------------------------
Within 10--20 min after the staining of the cell body, we observed an accumulation of DiIC~12~-labeled vesicles at the central cytoplasmic domain of the growth cone (Fig. [2](#F2){ref-type="fig"}). Individual vesicles could be resolved as brightly stained puncta both along the axon (Fig. [1](#F1){ref-type="fig"}) and at the growth cone region (Figs. [2](#F2){ref-type="fig"} and [3](#F3){ref-type="fig"}). In parallel with accumulation of DiIC~12~-labeled vesicles at the distal axon, we observed a progressive increase in the diffuse staining of the peripheral growth cone region (Fig. [2](#F2){ref-type="fig"}). In agreement with previously published data ([@B23]), the cell body--derived vesicles were largely excluded from the peripheral growth cone lamella and from the filopodia (Figs. [2](#F2){ref-type="fig"} and [3](#F3){ref-type="fig"}). Therefore, we interpret the diffuse staining of the axon as incorporation of DiIC~12~ molecules into the plasma membrane. This diffuse staining gradually spread from the growth cone towards the cell body (Fig. [2](#F2){ref-type="fig"}), consistent with lateral diffusion of DiIC~12~molecules along the plasmalemma.
Since no plasma membrane staining at the middle axonal segment could be detected (Fig. [4](#F4){ref-type="fig"} *A*), the staining of the peripheral growth cone was not due to the diffusion of DiIC~12~ molecules from the soma along the plasmalemma. Hence, the diffuse staining of the growth cone reflected the fusion of DiIC~12~-labeled vesicles with the plasma membrane at the distal axon. To test this model, before the staining of the soma with DiIC~12~, we pretreated neuronal cultures for 1 h with brefeldin A (10 μg/ml), a drug that inhibits the supply of the new membrane to the axon ([@B40]; [@B33]). As expected, the number of DiIC~12~-labeled vesicles at the distal axon was dramatically reduced, and no plasma membrane staining could be detected (Fig. [4](#F4){ref-type="fig"} *C*). No fluorescent vesicles could be detected at the distal axon after the treatment of neuronal cultures with 5 μg/ml nocodazole, a drug that promotes MT disassembly (Fig. [4](#F4){ref-type="fig"} *D*). This is consistent with the idea that the transport of the cell body-- derived vesicles from the soma crucially depends on the integrity of axonal MTs. Cytochalasin D (5 μM), a drug that inhibits actin polymerization, had no obvious effect on organelle delivery to, and incorporation into, the distal axon (Fig. [4](#F4){ref-type="fig"} *E*). Similar results were obtained with latrunculin A (5 μM), a drug that induces depolymerization of actin filaments (data not shown). To investigate whether the drugs used in this study induced significant disassembly or assembly of axonal MTs, we loaded fluorescently labeled tubulin into neurons by embryo injection ([@B49]; [@B14]) and examined the neurons with fluorescent microscopy. Detergent extraction of the neurons in an MT-stabilizing buffer revealed that 76.6 ± 4.4% (mean ± SEM, data from 15 axons) of the total tubulin was in the polymer form. 1 h after the treatment of neuronal cultures with brefeldin A (10 μg/ml) or with cytochalasin D (5 μM), this value was not significantly different from control (Table [I](#TI){ref-type="table"}). On the contrary, 1 h after the treatment with nocodazole (5 μg/ml), the fraction of the tubulin in polymer form decreased to ∼11% (Table [I](#TI){ref-type="table"}).
Taken together, these results suggest that, in growing axons, the newly synthesized plasma membrane components are transported in the form of tubovesicular organelles along axonal microtubules. The new membrane material is delivered to the growth cone region where it is inserted into the plasmalemma.
Inhibition of Dynamic Instability of Axonal Microtubules Prevents Insertion of New Membrane at the Growth Cone Region
---------------------------------------------------------------------------------------------------------------------
MTs at the growth cone region display a complex pattern of behavior and appear to be significantly more dynamic than MTs along the axon ([@B5]; [@B54]; [@B55]). To test whether the high rate of MT turnover at the distal axon contributes to the preferential insertion of the cell body--derived vesicles at the growth cone region, we determined the effects of low concentrations of taxol and vinblastine on the pattern of membrane insertion into the growing axons. Taxol and vinblastine are antimitotic drugs that, in micromolar concentrations, stabilize and disrupt MTs, respectively. In nanomolar concentrations, both drugs decrease the dynamic instability of MTs ([@B34], [@B35]). In nanomolar concentrations, vinblastine and taxol did not affect the polymerization of MTs in *Xenopus* neurons (Table [I](#TI){ref-type="table"}). Neither taxol (7 nM) nor vinblastine (3 nM) affected the delivery of cell body--derived vesicles to the distal axon, as evidenced by the accumulation of the DiIC~12~-stained organelles at the growth cone region (Fig. [5](#F5){ref-type="fig"}, *A* and *B*). However, the staining of the plasma membrane, and thus insertion of new membrane into the growth cone region, were dramatically inhibited. The quantitative analysis of the plasma membrane staining (Fig. [5](#F5){ref-type="fig"} *E*) was facilitated by the fact that under the cell culture conditions used in this study, axons possess a rich net of filopodia that spans the entire length of the neurite, including the growth cone. Since DiIC~12~-labeled vesicles were largely excluded from the filopodia, the sampling areas were chosen along the length of individual filopodia at the growth cone. Similar results were obtained when the sampling areas were chosen at the lamellipodium region of the growth cone. In a series of control experiments, neuronal cultures were pretreated with 3 nM vinblastine for 30 min to allow accumulation of the fluorescent vesicles at the growth cone region, after which the concentration of vinblastine was increased to 1 μM. This treatment resulted in the disassembly of axonal MTs (data not shown), and rapid staining of the plasma membrane at the distal axon (Fig. [5](#F5){ref-type="fig"} *C*). Hence, inhibition of membrane insertion by nanomolar concentrations of vinblastine is not related to a nonspecific effect of the drug on vesicular fusion.
Local Disassembly of Axonal Microtubules Leads to Insertion of Cell Body--derived Vesicles into the Plasma Membrane along the Axon
----------------------------------------------------------------------------------------------------------------------------------
Under the cell culture conditions used in this study, the majority of DiIC~12~-stained vesicles are transported all the way down to the growth cone region, where the vesicles fuse with the plasma membrane. The insertion of cell body--derived vesicles along the axon may be inhibited because of the limitations imposed by the axonal cytoskeleton. Alternatively, the plasma membrane along the axon may lack the appropriate membrane receptors (t-SNAREs), which are necessary for vesicular targeting and/or fusion ([@B50]; [@B12]; [@B28]). To distinguish between these possibilities, we locally applied nocodazole (5 μg/ml) to the middle axonal segment located at least ∼500 μm away both from the soma and the growth cone. This distance was sufficient to exclude the lateral diffusion of DiIC~12~molecules from the soma or the growth cone region to the superfused site. 30 min after the onset of perfusion with nocodazole, we stained cell body--derived vesicles with DiIC~12~ molecules as described above. Within 10--20 min after the staining of the soma, we observed the accumulation of cell body--derived organelles 50--80 μm proximal to the perfusion site, local staining of the plasma membrane, and depolymerization of MTs at the perfusion site (Fig. [6](#F6){ref-type="fig"}). Thus, plasma membrane components for vesicular exocytosis are likely to be present throughout the whole axonal surface. Local disruption of MTs along the axon is sufficient to induce the fusion of cell body--derived vesicles with the plasma membrane.
Discussion {#Discussion}
==========
New membrane components are synthesized in the cell body and conveyed along MTs by the kinesin superfamily of proteins ([@B9]; [@B6]; [@B30]). To determine the sites of new membrane insertion into the growing neurites, we developed a technique for the acute labeling of all membrane structures in the cell body with the fluorescent lipid analogue DiIC~12~. In sufficiently long neurites, we were able to visualize the anterograde transport of individual cell body--derived tubovesicular organelles. The movement of these organelles occurred at the rates of fast axonal transport and required the integrity of axonal MTs. The number of the stained vesicles along the axon was dramatically diminished after pretreatment of neuronal cultures with brefeldin A. These results along with previously reported data ([@B44]) suggest that the cell body--derived tubovesicular organelles that we observe are likely to be involved in the constitutive delivery of newly synthesized membrane material from the Golgi complex to the plasma membrane. There are three major findings in this report: (*a*) under cell culture conditions used in this study, the vesicles were delivered all the way down to the growth cone region, where they fused with the plasma membrane; (*b*) local disruption of MTs at the middle axonal segment resulted in the insertion of new membrane along the axon; and (*c*) inhibition of dynamic instability of axonal microtubules impaired the insertion of new membrane material into the distal axon.
Preferential insertion of some of the newly synthesized plasma membrane proteins into the growth cone region has been observed in the past ([@B16]; [@B59]). Our results provide direct evidence for the idea that the growth cone is the primary site of new membrane addition to the plasmalemma ([@B24]). Exocytosis of DiIC~12~-stained vesicles along the axon would be expected to result in the disappearance of the fluorescent signal because of the rapid diffusion of DiIC~12~ molecules along axonal plasmalemma. We were not able to detect such fusion events. Although we cannot exclude the possibility that some of the small vesicles escape detection and do fuse with the plasmalemma along the axon, the vast majority of the vesicles appeared to be transported all the way down to the growth cone. This conclusion was further supported by the staining of the plasma membrane at the growth cone region, but not at the middle axon (Fig. [4](#F4){ref-type="fig"}). Interestingly, the staining of the plasma membrane at the distal axon was preceded by an accumulation of DiIC~12~-labeled vesicles at this region. The observed delay in the insertion of new membrane into the plasmalemma is consistent with the idea that a number of intermediate steps (such as vesicular docking and priming) are required for the exocytotic fusion to proceed ([@B53]). It should be noted that only cell body--derived vesicles were stained in our experiments. We have not attempted to determine the contribution of local synthesis of plasma membrane lipids along the neurite ([@B18]) to the generation of new axonal structure.
Although the idea of preferential insertion of new membrane components into the distal axon is now widely accepted, a simple estimate based on the diffusion equation indicates that in sufficiently long axons, new membrane is likely to be inserted along the axon. Indeed, the coefficient of lateral diffusion of the plasma membrane proteins or lipids (*D*) does not exceed 10^−8^ cm^2^/s ([@B56]). Assuming that the newly synthesized membrane material is inserted exclusively into the growth cone region, the characteristic time of diffusional transport from the growth cone region (*t*) can be estimated as *t* ≈ *L* ^2^/*D*, where *L* is the distance from the growth cone. Even for relatively short distances (*L* = 1 mm), this time is ∼10 d. Thus, in the absence of anterograde ([@B48]) or retrograde ([@B17]) plasma membrane flow, intercalation of plasma membrane proteins and lipids along the axon is the only feasible mechanism for new material delivery to the axonal shaft ([@B8]). Rigorous quantitative analysis supports the idea that, in sufficiently long axons, axonal plasma membrane components should be inserted at sites all along the axon ([@B36]).
This model predicts that the molecular components that are required for vesicular exocytosis are distributed throughout the whole axonal surface. In agreement with this prediction, in hippocampal cultures, both immunocytochemical data ([@B25]; [@B26]) and reports on the constitutive membrane recycling along the axon ([@B43]) imply the presence of t-SNAREs throughout the whole axonal surface. In *Xenopus* embryo neurons, constitutive secretion of acetylcholine can be detected throughout the whole neuronal surface; moreover, similar to hippocampal cultures, immunoreactivity for syntaxin and SNAP-25 can be detected along the axon ([@B4]). Taken collectively, these results suggest that axonal shaft is competent to support vesicular exocytosis. Our experiments with local application of nocodazole to the middle axon directly confirm this idea. We found that local disruption of axonal MTs led to the accumulation of cell body--derived vesicles at the site of nocodazole application and insertion of the vesicles into the plasmalemma (Fig. [6](#F6){ref-type="fig"}). Thus, local disruption of axonal MTs is sufficient for the insertion of new membrane material to specific neuronal sites.
These experiments suggest a mechanistically simple model in which association of a vesicle with an MT limits its access to the plasma membrane. The movement of individual vesicles along MTs is driven by the members of kinesin superfamily of proteins ([@B57]; [@B6]; [@B30]). Kinesin remains bound to MTs while undergoing multiple rounds of activity ([@B57]; [@B6]). The average distance traveled by a single kinesin molecule after a binding to an MT is about 600 nm in a motility assay ([@B57]). Obviously, if the movement of the vesicle is driven by more than one kinesin molecule associated with the same MT, the average travel distance along the MT will be larger. However, MTs are much shorter than axonal length, and the vesicle is expected to "fall off" the MT upon reaching its plus (directed towards the growth cone) end. We speculate that because of the high density of MTs in the axonal shaft, the dissociated vesicle is likely to reattach rapidly to another (or to the same) MT. Therefore, the probability of vesicular exocytosis along the axon remains low.
It remains to be established what properties of the growth cone region allow exocytosis to proceed. Since none of cell body--derived vesicles that we detected was transported retrogradely, the vesicles are expected to accumulate at the distal axon. Unique molecular composition of the growth cone region may contribute to trapping of the vesicles in the cytomatrix and/or facilitate their translocation to the plasma membrane. Unexpectedly, we found that inhibition of dynamic instability of MTs dramatically impaired insertion of new membrane into the distal axon. The easiest interpretation of these data is that dynamic instability of MTs at the growth cone region increases the probability of dissociation of a vesicle from an MT. However, we cannot exclude the possibility that dynamic MTs at the distal axon are essential for the proper organization of the apparatus for the delivery of the vesicles to the plasma membrane sites specialized for fusion.
Treatment of neuronal cultures with low doses of vinblastine or taxol is known to inhibit axonal elongation ([@B55]) and growth cone turning ([@B13]). These results are believed to reflect the essential role of dynamic MTs in the rearrangement of MTs during growth cone migration and in the generation of new axonal structure ([@B55]; [@B13]). Our results suggest that dynamic instability of microtubules at the distal axon may also contribute to the release of vesicles from the MTs and insertion of new membrane into the growth cone region. Therefore, the effect of low doses of taxol and vinblastine on growth cone migration, at least in part, may be related to the inhibition of new membrane addition to the plasmalemma.
Tubulin dimers must contain GTP to polymerize. GTP is rapidly hydrolyzed upon addition of dimers to the growing MT. This creates a small cap of GTP-tubulin at the growing end of an MT, while MT lattice is primarily composed of GDP-tubulin ([@B20]). Both kinetochores ([@B32]; [@B51]) and membrane organelles ([@B7]) recognize MT plus ends (presumably through their association with GTP cap), and their movement can be powered by MT dynamics ([@B19]; [@B41]). Therefore, dynamic changes in MT length may directly contribute to intracellular motility ([@B19]; [@B32]). Moreover, experimental evidence suggests that motors may not easily detach from MTs when they reach their ends ([@B58]; [@B31]). Our data suggest that dynamic instability of axonal MTs can increase the probability of vesicle dissociation from the MT and regulate the number of cell body--derived vesicles available for exocytosis. Thus, dynamics of axonal MTs may serve as a basic regulator of the topology of the new membrane addition to the nerve processes.
We thank Gary Borisy, Vladimir Gelfand, Leonid Margolis, and Mark Rasenick for the helpful discussion and comments and Michael O\'Donoghue for help with the manuscript. We are grateful to Regeneron Pharmaceuticals Inc. for providing NT-3 and to Gary Borisy for providing Cy3-tubulin.
Supported by The National Institutes of Health (NS 33570).
Address all correspondence to Sergey Popov, Department of Physiology and Biophysics M/C 901, University of Illinois at Chicago, 835 S. Wolcott Ave., Chicago, IL 60612. Tel.: (312) 413-5682. Fax: (312) 996-1414. E-mail: <spopov@uic.edu>
DiIC~12~
: 1,1′-didodecyl-3,3,3′,3′-tetramethylindocarbocyanide
MT
: microtubule
{#F1}
{#F2}
{#F3}
{#F4}
######
Effect of Pharmacological Treatments on the Total Mass of Polymerized Tubulin in Xenopus Embryo Neurons
Drug Fluorescence intensity
------------------------ -- ---------------------------------------------------
Control 76.6 ± 4.4 (16)
Taxol (7 nM) 75.2 ± 13.4 (6)
Vinblastine (3 nM) 73.5 ± 8.7 (7)
Brefeldin A (10 μg/ml) 68.4 ± 7.1 (9)
Cytochalasin D (5 μM) 71.5 ± 6.2 (12)
Nocodazole (5 μg/ml) 10.8 ± 2.8 (7)[\*](#TFI-150){ref-type="table-fn"}
Vinblastine (1 μM) 14.1 ± 2.0 (9)[\*](#TFI-150){ref-type="table-fn"}
*Xenopus* embryos were injected with Cy3-tubulin at the two-cell stage, allowed to develop to stages 19--24, and were then used for the preparation of neuronal cultures. The cultures were treated with various drugs for 1 h. Neurons containing fluorescently labeled tubulin were extracted in a MT-stabilizing buffer (see Materials and Methods). For each axon, the fluorescence intensity after extraction was normalized to that before extraction. The data are presented as a mean ± SEM for 6--15 different neurons.
*P* \< 0.001, *t* test. In a series of control experiments, the neurons were loaded with FITC-conjugated dextran (mol wt 70,000) and extracted in an MT-stabilizing buffer. The average ratio of the fluorescence intensity after extraction to that before extraction was 3.0 ± 0.6% (data from seven different neurons), suggesting almost complete washout of cytosolic molecules during extraction.
{#F5}
{ref-type="fig"}. Local perfusion of the middle axonal segment with a culture medium containing 5 μg/ml nocodazole was started 30 min before the soma staining. (*B*) Fluorescent images of the superfused site at different times (marked in minutes) after the staining of the cell body with DiIC~12~. The staining of filopodia, which reflects the insertion of soma-derived vesicles into the plasmalemma, could be detected as soon as 10 min after the onset of cell body staining. The bright staining of the axon proximal to the perfusion site reflects an accumulation of fluorescent vesicles in this region. (*C*) Fluorescence intensity profiles of the filopodia staining 10 min (*filled triangles*) and 50 min (*open squares*) after the soma staining. The intensity of individual filopodia staining (arbitrary units) is plotted vs. the distance from the center of the profile. The center of the superfused zone was located ∼50 μm distal from the center of the fluorescence profile. The widening of the profiles reflects the lateral diffusion of DiIC~12~ molecules incorporated into the plasma membrane along the axon. Data from three representative experiments are combined together. (*D*) Representative immunofluorescent micrograph of the MT array in the axon near the site locally superfused with nocodazole. The cell was fixed and stained for MTs 30 min after the onset of perfusion. (*E*) Quantitative analysis of immunofluorescence data. For each axon, the intensity of fluorescence along the axon was normalized to that ∼100 μm proximal to the center of the superfused zone. Data are presented as mean ± SEM for 10 different axons. Bars: (*B*) 50 μm; (*D*) 30 μm.](JCB9807078.f6){#F6}
|
Ms Manson told the jury she kept the cash in a safe at her home because she did not like using cash machines.
She said: "I had control of the money in the safe. It's my safe.
"The £12,500 bundles of £20 were mine; £5,000 was from my dad and he gave me a further £2,000 for my daughters.
"The rest were savings from Christmas money, birthday money and my wages. I don't use cash machines, I don't like them. I save my cash."
Ms Manson told Sheffield Crown Court a further £7,000 was for a Christmas savings scheme she ran for staff at Mr Pattison's florists, called Sharron Pattison, based at Bransholme's North Point Shopping Centre.
The court heard the couple also had thousands of pounds of foreign currency in their safe, including nine 500 euro notes, which are no longer accepted in the UK due to their links to criminals.
Ms Manson said she had obtained the large euro notes at a travel agents in 2008 for Mr Pattison to use for purchasing flowers abroad and had not got around to cashing them in.
She said: "The travel agents wouldn't change them. They were at the back of the safe and I forgot about them."
In cross-examination, prosecutor Paul Mitchell put it to her: "You have got almost £50,000 in cash just lying around?
"You have cooked up the lie to explain the 500 euro notes. You have £4,000 just lying in your safe for four years and you have done nothing to take it back."
She replied: "It's only £5,000 in euros."
Ms Manson told the jury she and Mr Pattison did not lead an expensive lifestyle.
She said: We lived out of the fruit and veg shop and I took home what we needed.
"We didn't socialise, we didn't go out and we only had two holidays a year."
Mr Pattison, 52, is accused of smuggling 84kg of cocaine into the city hidden in Valentine's Day flowers.
Port officials discovered the "high-quality" cocaine hidden among yellow chrysanthemums in the back of his truck in three long rectangular boxes among bouquets and hundreds of loose flowers.
Mr Pattison was stopped in his lorry on February 10 as he returned to Hull from the flower market in Aalsmeer, Holland.
He previously told the jury he had loaded 17 trolleys containing hundreds of flowers into his truck and had not checked his order because he had taken the company on "trust" that it was correct.
The court heard the three boxes containing the drugs were up to six times heavier than the other boxes of flowers and Mr Pattison's fingerprints were on two of the boxes.
Mr Pattison told the jury his fingerprints must have got on to the boxes when he was stopped by customs officers in Hull and helped them unload the boxes of drugs from the trolley. |
Ontario’s move to cut Toronto City Council almost in half during an election campaign doesn’t violate the Constitution and Queen’s Park did not have to consult anyone before it acted, provincial government lawyers will argue on Friday.
An Ontario Superior Court judge will hear arguments from the City of Toronto and a number of council candidates who are challenging Premier Doug Ford’s Better Local Government Act, which reduces the number of city councillors to 25 from 47.
In written submissions filed in court on Wednesday, the Ontario government dismisses the city’s argument that redrawing the boundaries in the middle of an election campaign violates “unwritten constitutional principles” of democracy and the rule of law or that it violates the voting rights guaranteed in the Charter of Rights and Freedoms.
Story continues below advertisement
Those rights to vote and run for office “do not apply to municipal elections,” Ontario’s lawyers say, adding that nothing Queen’s Park has done violates the Charter right to free expression, either, as the city argues, because no candidates are prohibited from running or expressing themselves.
The provincial government also says the legislature doesn’t have to consult anyone before enacting legislation, that courts have no say over the legislature’s procedures and that the Constitution is clear that what provinces do with their municipalities is up to them. Any court restriction on using that power, such as during an election period, “would undermine parliamentary supremacy," the province argues.
“The supremacy of the provincial legislature is itself an expression of the principle of democracy and the rule of law,” the government’s submission reads.
The city argues the province agreed to consult it on major policy changes in pledges contained in the City of Toronto Act and in a co-operation agreement signed by both governments. But Ontario says neither document obligates Queen’s Park to do anything of the sort. The legislature cannot be bound by previous legislation or agreements, they say. And that the co-operation deal with Toronto “provides … that failure to abide by any of its terms gives rise to no legal remedy."
Plus, Ontario argues, Toronto’s city clerk has warned she is not confident she could revert to a 47-ward vote, having scrambled to put the 25-ward system in place for Oct. 22.
The government’s submission also points out that for the 2018 election, the 25 wards, based on the federal and provincial ridings, provide much better voter parity – in terms of minimizing the different number of voters for each ward – than the proposed 47-ward system, which was designed to allow the fast-growing city to grow into parity by 2026.
Allowing the 2018 election to go ahead with 47 wards, only to cut council to 25 wards after, would have been more disruptive, the government argues.
Story continues below advertisement
In its written arguments, the City of Toronto calls the province’s move arbitrary and discriminatory and argues it could revert to a 47-ward election with some amendments made to election laws. “Never before has a Canadian government meddled with democracy like the Province of Ontario did when, without notice, it fundamentally altered the City of Toronto’s governance structure in the middle of the City’s election," it says. |
The Old Hippie Manifesto
Dave Schultz
December 29, 2012
As I write this, we’re about to fall off the “Fiscal Cliff”. In a nutshell, the Fiscal Cliff of December 31st is when the “Bush Tax Cuts” end, many subsidies end, the country hits the “Debt Ceiling” and runs out of money, and across the board cuts (known as a Sequester) to all Federal agencies – especially the military – go into effect.
Let’s take them one by one.
Tax Rates.
Income Tax Rates for everyone will go up. Those who pay no taxes will pay about $300, while those earning $1Million a year will pay an additional $170,000. I expect mine to go up about $30,000 a year. While many have fallen for the Class Warfare Obama has pushed on us, and won’t shed a tear for those earning a higher income, there is a trickle-down effect that will affect everyone. Many of these so called rich are small business people, and they’ll cut back even more in than they’ve already been preparing for with Obamacare. I personally have put off all plans to open any new business until there is sanity restored to government (Going Galt), and I refuse to hire anyone full time. I won’t be buying a new car or truck in the near future – and I’m driving an 8-year-old truck for the first time in many years. So if you have anything to do with building cars, selling cars, making parts, or even wanting to collect sales tax on a car purchase — Sorry. You will also find times tougher if you work in a restaurant, sell electronics, work in the travel industry, or do anything else financed with discretionary income. There will be less to spend, so more people will be laid off, causing even less to be spent, causing even more to be laid off.
Payroll Taxes paid by employer and employee. These rates go up for both starting January 1. Additionally there is a new Obamacare tax. Employers have to cut back somewhere – and that will be people.
Capital Gains Tax. This is a tax on something that you paid with your already taxed dollars – and then sold for more than you bought it for. It also includes the weak ass interest you might receive on your savings – or the sale of your house (which also gets a new 3% Obamacare tax). It currently is 15% — and will go to 40%.
Death Tax. Goes to 55% from 35%, and the exemption drops from $5Million that you can shield to $1Million (a common house in many cities) that you can shield. Say you spent your early years working and studying harder than all of your friends so that you could give your future family a better life than you had. Your busting ass and taking big risks pay off and you hit that level of financial success you planned for. Then you die. Instead of the money, investments, and property (that the government left you after seizing its share in Income tax) going to your heirs – the government first skims 55% off the top as a tribute. Don Fanucci calls this Wetting the Beak.
AMT – Alternative Minimum Tax. Obama will tell you that I’m rich because I EARN over $250,000 a year, and that I have tax loop holes available to me. I have no loop holes and pay a huge amount in taxes. I am means tested away from everything the average citizen gets. I also have the burden of AMT – and the $7500 my CPA charges to prepare my associated tax returns from fully documented computer records of my accounting system (which also cost me a pricey sum during the year). You see my taxes have to be prepared two different ways – and I have to pay the higher of the two. Some freaking loop hole! Coming up are 30 Million more of you get to have the same pleasure of this AMT.
Subsidies. Government Subsidies go to corn farmers for ethanol in gas, dairy farmers, solar farms, wind farms, colleges, tv stations, car manufacturers, and all kinds of other stupid stuff. It is a Socialist tool to spread the wealth from the 50% who pay taxes, to the Moochers who pay no taxes and have their hands out for a socialist government spreading the wealth. A true Capitalist economy wouldn’t have it – but just the same expect your milk to go to $8 a gallon, gas to jump, and your electric bill to spike from the lack of these subsidies getting renewed.
Debt Ceiling. Whenever the country spends more than it takes in – it goes into debt. Congress has to approve the debt. Five years ago this debt was $5Trillion dollars – which is a Hell of a lot of money that will take forever to pay off, mainly because of the size of the interest payments to our creditor – China! When with Obama giving away free stuff like cell phones, Internet, Food Stamps, unemployment forever, and greasing political cronies like Solindra, GM, Fiat,… our debt ceiling was authorized to be $16.4 Trillion. It might sound like just a number to you – but you can never repay that kind of money. We will hit that debt ceiling this Monday – and then we can borrow no more. Secretary of the Treasury (and tax cheat as most Obama appointees are) Timmy Geithner will play some illegal magic with the number while Congress turns its head. Naturally they won’t cut off the handouts to moochers who put these Socialists in office – but I guarantee my VA disability will not be paid (barely worth mentioning anyway – but for others more seriously injured and having no other income are screwed), our Military personnel, parks, airports and anything else having to do with business or the military will see the lion share of the cuts.
Sequester. Because not a single Fiscal Budget has been approved by Congress since Obama took office – the last agreement was for a “Sequester” to go into effect January 1st – if there still was not a budget approved. The Sequester has automatic cuts to all Federal Agencies – but really loads it up on the Military, who Liberals have always had distain for. Well the Democrats kept insisting on taxing and spending more, and Republicans kept insisting on cutting back on government – so nothing was agreed to and we get the Sequester.
OK – so those are the facts on what the Fiscal Cliff is. I have explained it because I’ve yet to find a family member or friend who actually knew any more than what Obama’s media has wanted them to know – which is that “the evil Republicans are making your taxes go up”.
Now I’m going to give my opinion/editorial on what should be done if we want to save this country from becoming the Fiscal Failure like the PIGS (Portugal, Italy, Greece, and Spain). If you don’t know what’s happening there – you need to do a Google search and learn how their borrowing money to give to Moochers bankrupted them to the point where no one works, and there are no government services.
The reason that I feel qualified to discuss this is because I’ve been a political animal for over 30 years – and the news is on in my home 12-15 hours a day. I get up in the morning at 5AM and have the financial news on until 3PM while I make my stock trades (giving me an insight on Finance) and the National News on from 3PM to 7PM. I’m usually working on the computer – but I keep an ear open on important topics. I also have an insatiable appetite for knowledge. If I have any question in my mind about anything no matter how trivial – I look it up. I’m usually at the keyboard, but even sitting and watching a movie or a game will have me with my iPad to look up trivia like when the actress died, of what disease, or what years the coach played the game.
A democracy is always temporary in nature; it simply cannot exist as a permanent form of government. A democracy will continue to exist up until the time that voters discover that they can vote themselves generous gifts from the public treasury. From that moment on, the majority always votes for the candidates who promise the most benefits from the public treasury, with the result that every democracy will finally collapse due to loose fiscal policy, which is always followed by a dictatorship. The average age of the world’s greatest civilizations from the beginning of history has been about 200 years.
During those 200 years, these nations always progressed through the following sequence:
You are either a Producer (contributing more than you receive), or a Moocher (receiving more than you contribute). Don’t like being called a Moocher – too bad cupcake. You are part of the problem with the United States going bankrupt. We are a society that continues to say the 5% paying 90% of the taxes aren’t doing their fair share.
In the past, the Christian Work ethic of Americans didn’t require big government. There were no handouts and people had to work to care for their family. If there was no work – you moved to where there was work. People moved from the Dust Bowl to California. People moved from the cotton fields of Mississippi to industry in places like Detroit. I moved from Buffalo, New York to Texas when factories closed in the 70s. You use to take responsibility and you showed some self-pride. Today you will make more money not working (in addition to under the table) than to work – and those who still aren’t working after 2 years (Obama wants to raise to three years!) of Unemployment handouts now go on Social Security disability – because they’re too distressed from not working to work, thus disabled.
In the past, family took care of family. All of my Great-Grandmothers were cared for by their children or grandchildren. Now the government pays for the elderly and disabled in families and families grow apart.
In the past, we had personal pride. I grew up in a 1-bedroom apartment with four brothers and three sisters (later upgrading to a two bedroom duplex) – and often had a grandfather or even another family living with us. I started selling doughnuts door to door at age 7, and had a paper route at age 10. The four eldest siblings always had a job from the time they turned 12 – always. My father worked minimum wage jobs (and it sure the Hell wasn’t what it is now days) pumping gas, delivering flowers, working at a hardware store, of being a security guard. Out of Pride, my family never applied for or received a penny of public assistance. Now the Moochers get a credit card and their unearned handouts are called Benefits – and paid into benefits like Social Security and Medicare (which I’ll never see a nickel of after paying the maximum all of my life) are considered some great government benefit. Well it is only a government benefit to the people who didn’t properly contribute to the system – or are fraudulently receiving benefits.
The problem is that the Socialists/Progressives/Liberals/Communists have won. They may have different motives of why they ran for office – from the Big C Communist carrying out Stalin’s dream and infiltration of the 1930s, to the Little C communist who is more of a Che/Castro Communist wanting to kill America by overburdening it with totally dependent people (Search Saul Alinsky and Cloward & Piven Strategy) – or just greedy people willing to sell out America for a high paying (and benefits) career of never having to actually have a job — by giving free stuff to moochers in exchange for their vote. Whether they do it for fame, principle, or free lunch – they have quickly brought us to the point of no return. LBJ’s Great Society was sold as a making all people equal – but 50 years later it is on its 4th generation of totally dependent moochers who will never be productive – cranking out kids who will also never be productive. It most hurt the people it was designed to help, because it was always a flawed plan. It has also created more hate between the races than I’ve experienced in my 58 years. Obama has wedged a great divide between the Producers and Moochers to record levels. It is how he got re-elected after being History’s Worst President. The Great Society has been a Great Failure. The reason we’re past the point of no return and the Liberals have won is because they are now the majority and will always vote for free stuff over real reform. Their greed and laziness has also caused them to be an ignorant group of people – who won’t make the simple effort to expand their knowledge, or even follow current events. We see these idiots on Jay Leno’s Jay Walking, or Howard Stern’s Man on the Street. These are sheeple that will accept anything politicians and the Liberal Media will tell them. Over the last 20 years Liberals have been going after our children with a vengeance. Most teachers are union activists, very Liberal, Pro Gay, and downright ignorant. Go have a conversation with your kid’s teachers and test what I’m telling you. Are they like your teachers in the 50s or 60s? Those kids making it to college (and most now go for stupid curriculums like French Literature or Sports Administration) have it even worse with the Professional Little C communists controlling all teaching positions. They are molding our kids in their vision.
If you’ve watched the News or listened to Obama and Reid in the last few days – you are under the impression that Boehner and the Republicans are going to make everybody’s taxes go up because they’re not going to vote for a Bill that raises taxes on anyone. While it is true that Conservatives feel that the problem isn’t enough taxes but too much spending – the lie is that the Democrats in the same Bill have agreed to cut nothing, they want to rescind the Sequester, they want to add another year of unemployment payments, and they want to increase the debt ceiling to even higher levels. Nowhere in the news does this get reported.
When I ran a larger business, I would tell my managers to never come to me with a problem without also having a suggested solution. So here’s my solution. Everyone gives up something to make things right. It is politically incorrect & racist – because you can’t take anything away from Moochers. It is said that Romney lost the election for telling the truth about the 47% that will vote for free stuff. Since then, Politicians will never again (at least on purpose) tell the truth, as it will be terminal to their career. I don’t hold a political office, nor will I ever run for one – so I’ll accept the racist label I’ll and just tell it like it is.
Taxes. In addition to an unfair system where 5% pays 90%, and 50% pay nothing – I’d go with a Federal Sales Tax REPLACING the Personal and Business Income Tax. Fire 99% of the IRS Thugs, as they won’t be needed. We do need prison guards though. Have accountants focus on business financials and other accounting rather than making a mountain out of a molehill on our taxes. In addition to the huge savings of 99% of the IRS expenses with a simple tax – everyone has skin in the game. Pimps, crack whores, Illegals, Visitors – any person or business buying something will be contributing in the revenue. While the rich pay more because they buy more (bigger homes, bigger cars, bigger boats, bigger cocktail bills!), everyone has a little skin in the game – reducing their Moocher footprint. You want to pay less tax – buy less. This sales tax is collected by the state – and remitted to the Feds. Since the States do what they’re supposed to do (take care of their people) and the Feds do what they’re supposed to do (take care of the states) – far less money needs to go to the Fed, and the non-military portion can be reduced to 5% of what it currently is as a nanny.
Eliminate Capital Gains tax and Estate tax. This is money left after being taxed at least once already – and it is not right to tax it again and again. The wealthy will take this money and set up yet more charitable foundations and give yet more to charity. This will eliminate both the need for a corrupt Government to be the nanny of the truly needy – and be far less corrupt with election contributions and cronyism. You’ll never convince Liberals of this charity aspect – because it is their greedy nature to hate Producers and it has never crossed their mind to be charitable. Liberals believe it is up to the government – not the citizens — to take care of their neighbor.
OK – after making the Revenue so simple that you can’t cheat and you need a million less government thugs to collect and audit – you need to properly handle expenses.
This Republic was originally created for the individual state to handle the vast majority of governing its people – and the Federal government was to handle those United States defense and interstate commerce. Don’t like the way your state is governing – move to state you liked! However, Progressives (name communists like to be referred to) in the 1920s-1930s saw the spread of the dream for One World Marxism. On the way – the Federal government grew like a cancer to rob our freedoms so they could expand in just the way our Founding Fathers warn us of. 80% of what the Federal Government has their finger in now would appall those Founding Fathers.
It was never the plan of the founding fathers to have tax dollars (we actually didn’t even have a Federal Income tax until 1900) going to subsidize colleges, solar energy, wind farms, milk, corn, Internet, cell phones, cash for clunkers, oil, matching election contributions. Daycare, welfare, unemployment, Obamacare, FEMA, flood insurance, bullets for the IRS, liar loan mortgages, — you get the idea!
Yesterday, Obama gave all Federal politicians and employees a raise by Executive Order. In the beginning, these politicians had their expenses paid by the state that had sent them. They didn’t receive 6-digit salaries, big expense accounts, private limos; or special retirement packages and premium free health care for life after just one term. They didn’t go on junkets to Tahiti either. Who gave them these benefits – you, me? No, these corrupt parasites give these gifts to themselves – and that doesn’t come close to the graft and corruption they receive in shady motel rooms or bogus salaries to their family members. Eliminate all of that, and rescind all these gifts they illegally gave themselves. Have the state pay for their representatives, staff, and expenses. Then the state will get the representation they deserve and the politician has to answer to someone about the money his office spends. Have term Limitations of one 6 year term to each branch – Executive, Senate, and Congress. This stops the campaigning while on our dime – and holds their feet to the fire to vote their conscience – as that was supposed to be the reason we put them there.
Get the US out of the UN, and the UN out of the US. There is no good to that organization – and no reason for us to finance their hatred of us. The UN is the most corrupt organization in the Universe. We waste hundreds of billions of dollars a year on this corrupt farce.
States need to handle the education and public assistance needs of their citizens through their portion of sales tax. (Again, no income tax, cigarette tax, FET, gasoline, or other hidden taxes – just one sales tax with the major portion going to the states and a small portion to the Federal Government – plus property taxes for those owning land.) The more localized you make it – the better the money is spent. If your state politicians want to play the Moocher game for votes that the Federal government is playing – a Producer will find a state better suited for his politics or personal responsibility. If smaller adjoining states need to merge to make this go – then it is their prerogative to negotiate the terms and put it to a vote. I have a lot of thoughts on how states should take care of the needy – without creating more of them, but that’s for another day.
I appreciate the military and want a strong defense. I enlisted when I was 16 and started serving shorting after turning 17. I am a Vietnam Era Service Connected Disabled Veteran. For 40 years, my injuries (although not combat related) cause me great pain every waking moment of the day – and greatly limits my mobility. I love the country I enlisted to serve. That said – let’s get out of the Middle East. When two groups of people who hate you start killing each other – you step away – and let them get to it. We have always chosen the wrong side with them – because there is no right side. Iraq, Iran, Egypt, Libya, Syria, Afghanistan, and Pakistan – they are all inhabited by violent animals driven by a violent culture of hate. Just stand back let them thin their own herd. If they have training camps or hideouts for attacking us – then send in an AC130, a drone, or a cruise and take them out. Tens of Billions are wasted each year with crony contracts to “Military Consultants”. End it. You’re either Military, Civil Servant (and that should be limited), or a contractor. Screw this unaccountable contract consultant stuff. The military also needs to show more accountability to the states on money they spend. More of the military should be localized to the state (as we did in the days of the Civil War) – but overseen by the Department of the Defense. States have the right to have any size State militia they are willing to fund. The Militia and the Right to Bear Arms were put into the Constitution because the Founding Father’s wanted these rights to belong with the states – and that Federal Governments are easily corrupted with shifting power from the states to themselves.
States handle their own highway systems with their own taxing based on the state’s needs. Interstate systems get turned over to the states. They maintain their sections of it. If they can’t – then cars and trucks will avoid that state. Money will no longer be doled out based on political affiliation. Illinois sure has had a lot of roadwork in the last five years – I’m just sayin! If the states wish to contract the repair and maintenance of these sections of Interstates to private business as toll roads, that’s their option. Pay for use is fair.
The Federal government needs to turn over Federal Park Lands to the state with the land. The state owns the property, its resources – and the expense of maintaining it.
While most of the governing (schools, health, welfare, roads, …) comes from the state – there are some (about 5% of what they’ve taken from the states over the years) use for a fair Federal government. FBI does need to handle Interstate crime. NSA or the CIA need to handle International intelligence as it applies to the protection against a foreign power. An Interstate commerce system is needed to ensure smooth travel between states. An EPA far different than the one we have ensure there is a balance between industry and the environment. A FTC for the protection of interstate crime against a consumer. A FCC to keep an organized and safe radio/TV/internet system. A small Federal prison system. The FAA for air traffic. Immigration – and while on that subject, Profile Immigration and stop the entry into the country by violent cultures for education, or any other reason. Ask France, England, Spain, and Demark how allowing Muslim men in the 16-50 age range is working out for them.
We don’t FEMA – that was never the Federal government’s job. States handle their own citizens’ rescue from storms. They will spend the money better and know the needs better. FEMA has failed everywhere. We don’t need them here in Texas! If you don’t have the proper insurance, then find a state with no bad weather or has that as a big priority. Home ownership is not a right – it is a privilege you earn from your hard work. I’ve personally been through 7 hurricanes and have learned that if you can’t afford to pay the taxes and insurances on your home – then you can’t afford to own a home. The government was never intended to pay your hotel bill for 2 years, like it did for Kartrina evacuees – or waste billions on trailers never used. It has always been up to family, friends, neighbors, and charity to help the truly needy – not for the government to create a class of totally dependence people.
No Department of Education. They have been a miserable failure. States will do a better job.
No Wage and Labor board. States deal with discrimination and set their own minimum wage. These are political hacks currently at the Federal Level.
No foreign aid. We need to take care of own people before worrying about others on a Federal level. This is best done as charity. Let’s stop funding those who hate us to buy bombs to kill us. Every time there has been a catastrophe, American (and apparently only Americans) citizens have responded with charity and volunteers.
There are currently only five countries worthy of a mutual defense agreement with us. Canada, England, Australia, Poland, and Israel. The rest can go pound salt. We should only sell weapons to those countries. Other country’s would have to prove a very high standard of worthiness with a 2/3 super majority vote of Congress.
Speaking of Congress, ours in Texas meets every two years for only a few months. They don’t have time to make work by creating stupid laws. A point that the Federal Government needs to take note of. I should also point out that Texas has low unemployment and no state income tax.
No Federal Grants to anyone for anything. Colleges, business, Pells, … None. That is not the business of the Federal Government – until they decided to make it their business. The tax money isn’t theirs to give out or spread around. It is the money of the people. It needs to be limited in size seized from them, and spent wisely when seized from them. The Great American industries were built without the government – and did better until they got involved. The Railroads, steel mills, automobile assembly plants, electricity, and the personal computer were created without the Federal Government getting involved. They’ve been dying because of government involvement.
The Federal Government needs to be relieved of 95% of the freedoms they have taken from the States and Citizens, and its budget should be less than 5% of what it currently is. The people the government has encouraged to be so dependent on the government need to quickly be weaned off the government’s tit. States need to set a two year goal for these people to take personal responsibility – and those who can’t ever do it need to have their children placed in Orphanages that will properly educate the kids to be productive adults – but again, I’ll explain my opinion on how the States can make American citizens productive and responsible people, and the United States again a great nation.
Every state needs to be responsible for their own economy. They break it – they fix it.
Finally, the Federal government was created as a contractor of the States. They were contracted for the states protection. States have since had all of their rights taken from them by an out of control Federal Government. Any state that shares one border with another Country or Ocean, should have the Right to peacefully secede and become its own Republic or Country at any time they do not like their governance of the Federal Government. California, New York, Illinois, and Massachusetts can become the “People’s Republics” they apparently want to be, New Mexico can become the Indian Nation they want to be, Hawaii and Puerto Rico can become Banana Republics if that’s’ their desire – and Texans can have the Texas they want – not what Boston, Chicago, and San Francisco wants.
If any of this makes sense to you – Read Atlas Shrugged by Ayn Rand. You’ll love it. |
Gastric effects of mu-, delta- and kappa-opioid receptor agonists on brainstem unitary responses in the neonatal rat.
Single units in the medial subnucleus of the nucleus tractus solitarii, responding to electrical stimulation of subdiaphragmatic vagal fibers, were recorded extracellularly in an in vitro neonatal rat brainstem-gastric preparation. Selective opioid receptor agonists were applied only to the gastric compartment of the bath chamber and therefore, the brainstem functions of the preparation were not affected. The peripheral gastric effects of the mu-opioid receptor agonist, [D-Ala2, N-MePhe4, Gly5-ol]enkephalin (DAMGO) and kappa-opioid receptor agonist, ¿trans-3,4-dichloro-N-methyl-N-[2-(l-pyrrolidinyl)cyclohexyl]cyclohexyl] benzeneacetamide methanesulfonate hydrate¿ (U-50, 488H), were evaluated on 69 units that received the subdiaphragmatic vagal input. For approximately 75% of the units observed, DAMGO (1.0 microM; IC70; 80 nM) and U-50, 488H (1.0 microM; IC70:200 nM) induced a concentration-dependent inhibition of 62.7 +/- 8.9% (mean +/- S.D.) and 50.6 +/- 6.2% of the control level of the brainstem neuronal activity, respectively. The mu-opioid selective receptor antagonist, naltrexone and non-selective opioid receptor antagonist, naloxone, respectively, blocked the inhibitory effects by DAMGO and U-50, 488 H. The delta-opioid receptor agonist, [D-Pen2, D-Pen5]enkephalin (DPDPE) (10 microM; IC70:400 nM) produced a lesser extent of inhibition of 21.9 +/- 8.0% in the only 10 out of 51 (20%) neurons tested, and this effect was blocked by naloxone. The area of the stomach where gastric opioid receptors contributed most to brainstem unitary activity was also examined. This was achieved by comparing the opioid effects on a whole-stomach preparation to its effects on a partial-stomach preparation. Our data indicated that the distal stomach containing the pylorus played a key role in the gastric effects of mu- and kappa-opioid receptors on brainstem neuronal activity. These results suggest that the mu- and kappa-opioid receptors of the distal stomach are important in modulation of brainstem neuronal activity and may play a role in regulating the digestive process. |
1812Blockhouse
Note: This was originally posted in early 2018 and has been updated with additional information.
It wasn’t that long ago that Richland Countians obtained local news and information almost solely via newspaper, radio, and television.
Everyone who has lived through some or all of the last twenty years knows the impact that the Internet has had on communication. In fits and starts, Mansfield businesses and organizations have joined local media in staking out an online presence. Today, it’s a standard part of doing business.
This week, when TourismOhio announced its list of new visitors experiences which can be enjoyed across the state in 2019, Richland County was included.
With a full slate of exciting new developments and experiences, Ohio has lots to celebrate in 2019. From iconic anniversaries and exciting expansions, to lodging updates and new cultural offerings, there will be even more for visitors to enjoy in Ohio during 2019. More…
One could say that the village center of Plymouth might be termed a “One-Half Landmark of Richland,” as Main Street, the downtown’s main thoroughfare, straddles the Richland County – Huron County line.
It would be hard to argue, however, that its downtown boasts one of the most intact sets of nineteenth century commercial buildings in north central Ohio. And, as of December of last year, it is also an area recognized as significant by its inclusion on the National Register of Historic Places. More…
Planning is well underway for this August’s celebration of the quarter century anniversary of The Shawshank Redemption, and word is getting out.
On Friday, news hit the Columbus and other Gatehouse Media markets through a piece entitled, ‘Shawshank cast gathers to celebrate 25th anniversary in Mansfield.’ In the staff-written piece, the author shares the up-to-date list of cast members who have registered their intention to appear; a list of locations along the Shawshank Trail; and a list of events during the celebration. More…
The stately building on the southwest corner of Third and Bowman Streets near downtown represents a 171 year history of the Episcopal Church in Mansfield.
Established in 1846, the same year that brought railroads to town, Grace Episcopal Church’s first parishioners included members of the Bartley and Sherman families. Two years later, its first church building was constructed on Third Street just east of Mulberry. More…
One of the oldest bridges in Richland County, and one immediately adjacent to properties listed on the National Register of Historic Places, is scheduled for repair and stabilization.
The Ohio Department of Transportation is planning to repair a 13’ X 128’ stone arch bridge on Park Avenue West, between South Park and Middle Park, by installing an arched tunnel liner and concrete knee walls to support the liner. Storm sewer repairs and catch basins will be relocated from over the top of the structure and out of the center of SR 430. More…
March in Ohio can be a trying time. You never know what season you’ll get on any given day, but there are plenty of exciting happenings and events around Richland County. Jump start your spring thaw with family-favorite festivals, riveting performances, and outdoor adventures. More…
Not only was her name a bit unusual, her life was a pacesetting one in the area of higher education for women. Unfortunately, it was also one which ended in tragedy.
1812Blockhouse shares posts in our “Richland Roots” series to talk about the less-commonly known stories of people born here or who lived here and went on to make significant contributions to state, regional, or national history. Other posts in the series are available here. More…
We recently ran across vintage photos of the Ski Carnival at Snow Trails dating from 1967, including a picture of that year’s Ohio Winter Ski Carnival Queen. In honor of this weekend’s 58th Annual version, we thought we would pass these along More…
The Studebaker Drivers Club Inc. (SDC) has announced the selection of Mansfield as site of the 2019 SDC International Meet. Studebaker owners from across North America and beyond will bring their classic Studebakers and families to Mansfield for a week of history, fun, and comradery.
SDC Members will show their vehicles, share information and memories, and even participate in concours judging. The 55th Annual SDC International Meet will take place at the Richland County Fairgrounds in Mansfield from September 8-14, 2019. This event will bring an estimated 1,300 people to the area during the week-long event. These visitors will stay in hotels across the county and generate an estimated $1.1 million in economic impact on Richland County. More…
A word to the wise: detours will be in place this summer as an important bridge replacement project in southern Richland County takes place. Awareness and a little bit of planning should result in little impact on your summer tourism experiences.
The State Route 95 Bridge Replacement Project has an estimated start date of June 3 and an estimated end date of August 30. A portion of SR 95 will be closed during the project and traffic rerouted. More…
Ohio Haunters Association, a non-profit group of Halloween Enthusiasts and Haunted Attraction Industry professionals and amateurs, is debuting an all-new convention at the historic Ohio State Reformatory from May 17 to May 19.
This convention is designed for Halloween and Haunted Attraction enthusiasts as well as all members of the Haunted Attraction Industry but is open to the public. More…
Richland County has produced or been the home to a wide variety of individuals that have made important contributions to the world over the last 106 years. 1812Blockhouse has been sharing their stories in a series we started last year called “Richland Roots.” For other Richland Roots stories, click here.
As the country moves toward the centennial of women achieving the right to vote in national elections, we profile a native Richland Countian who contribute in her own unique way to achieving that end. Unfortunately, she never saw the fruits of her work, dying at the young age of 40. More…
Mansfield has produced and nurtured its fair share of talent over its 200 year history. The roster of individuals born, raised, and supported here that have achieved some measure of success in artistic endeavors is a long one.
Sure, you know of Luke Perry, and Sylvia McNair, and the Music Explosion. Have you heard of Darrell Banks, however? No, not the Richland County Commissioner; we’re referring to a name known to many lovers of pop and soul music in the latter part of the 1960s. More…
Why Not Be A Part Of 1812Blockhouse!?!
If you would like to be a part of this groundbreaking news and information site by sharing ideas, energy, and/or talent, please drop us a line at: 1812blockhouse@gmail.com. or DM/message us on Facebook or Twitter. |
News
Maple Leafs News
Leafs On a Roll
(Toronto) -- The Leafs were hoping their run of winning four games would keep them on a roll Monday night at an evening of gaming and fun for suite holders.
The entire team was out to play Roulette, Texas Hold'em and Blackjack - but it wasn't real money, so the stakes weren't too high.
Wade Belak was on a winning streak and had some tips for the people playing against him.
"You've got to be very confident, you've got to have a good poker face," said Belak. "You've got to wear the shades, I don't have my shades on, but you've just got to be able to take some risks."
Not all the Leafs considered themselves such pros though and the coach had some words advice for his players as usual.
"I'm not much of gambler, in fact that's what I try to tell the players, no gambling out there, we want some sure things," said head coach Pat Quinn. "But it's a fun night, it's a way that the players can be in touch with some of the people that support us and it should be a good night all around."
The Vegas-style casino night at the appropriately named Vegasbar was complete with showgirls, music and an Elvis impersonator. The relaxed atmosphere allowed for lots of mingling with the players and photo opportunities.
"The reason we wanted to do it is to bring value for the suite holders," said Breanne Louks, the event organizer and account executive for executive suite services. "They're important to us and we wanted them to feel valued. It's something that they can't buy, we wanted to create an experience for them."
The evening was a win-win situation for everyone, and not only a chance for the suite holders to have fun with the players, but for the team to bond as well.
"Me and Eddie are racking up, we've had a couple of hot rollers here and we've probably quadrupled our money so it's been a lot of fun," said Matt Stajan. "Our team's a pretty tight group, and it's nights like these that we come out as a team, have some fun and make sure that we keep that team bonding going." |
And there’s new details on another humongous new scene in season seven. A Wrinkle In Time expands its cast. Fox buys the rights to another young adult novel franchise. Plus, the first pictures from filming The Defenders, new footage from Doctor Strange and Assassin’s Creed, and things get weird on Class. To me, my…
A familiar villain is coming back to The Flash, but with a twist. Kevin Fiege talks about Dan Harmon’s involvement in Doctor Strange. 12 Monkeys goes back to the future with some major new casting. Plus,new looks at Resident Evil: The Final Chapter and The Walking Dead, and new Power Rangers posters. Behold, Spoilers!
Another familiar face is confirmed for Transformers: The Last Knight. Bruce Campbell ruminates on whether Ash vs Evil Dead could ever link up to the Evil Dead reboot. Plus, what’s to come on Once Upon a Time, and a new still from Supergirl. Spoilers Now!
It might be a while before we learn the title for Episode VIII. More details about Star Trek: Discovery’s protagonist have been revealed. Michael Cudlitz may have let slip a tiny part of The Walking Dead’s big secret. Plus, Jerry O’Connell in Scream Queens, a new location for iZombie, and new stills from Rogue One. To…
James Wan discusses how Aquaman will talk to sea life in the movie. Melissa Rosenberg teases more threats in the second season of Jessica Jones. A new Walking Dead clip teases bad times ahead for Daryl. Plus, new footage from Morgan, and unsurprising news from Star Wars: Episode VIII. Behold, Spoilers!
In a deleted scene from the fifth season of Once Upon a Time, Hook confronts Regina about the whole “kill your father thing.” That’s not the best part of this deleted scene. The best part is the effects.
James Wan talks Aquaman rumors and the Mortal Kombat movie reboot. Get a look at Legends of Tomorrow’s new Vixen. Arrow is done with the flashbacks after season five. Plus, David Anders on the set of Once Upon a Time, a look at Gotham’s Mad Hatter, and just how many episodes of new Twin Peaks we’ll be getting.…
Stranger Things’ Shannon Purser really wants to play Squirrel Girl. Marc Guggenheim dishes details on Legends of Tomorrow’s new Vixen. Morena Baccarin teases love in the air for Gotham season three. Plus, looks at new Transformers heading to The Last Knight, and new footage from Moana. Spoilers Now!
Some of Spider-Man: Homecoming’s undisclosed roles are finally disclosed. Idris Elba denies all those James Bond rumors. The Aquaman movie finds itself a writer (again). Plus, John Barrowman talks up a potential Torchwood return, and new looks at Outcast, Once Upon a Time, and more. To me, my Spoilers!
Universal wants to keep Matt Damon doing Jason Bourne movies for as long as possible. Arrow’s new villain is someone from Oliver Queen’s violent past. Plus, new Suicide Squad footage, key art from the new Ducktales show, and Michael Bay crashes some cars for Transformers: The Last Knight. Spoilers Get!
There are rumors abound of an unlikely star for Predator. Get new looks at Wonder Woman, Doctor Strange, and Skull Island in the lead up to Comic-Con. Plus, another new clip from Star Wars Rebels season three, the first look at the next season of Sherlock, and new pictures from Fear the Walking Dead. To me, my…
Plus new set pictures from the film to boot. Mark Ruffalo teases conflict for the Hulk in Thor: Ragnarok. Plus, Hayden Christensen would be open to a return to Star Wars, a new behind the scenes look at Doctor Strange, and Kevin Smith wants in on The Defenders. Spoilers Get!
Infinity War’s scriptwriters reveal how they’ll balance the huge cast in the two movies. John Barrowman teases Doctor Who fans. Tim Burton offers an update on Beetlejuice 2. Plus, the Russo brothers sign up for another superhero series, and there are new pictures from Agents of SHIELD and Once Upon a Time’s season…
Steven Universe is back for a four-week special event! The season finales of Vampire Diaries, Once Upon a Time, and The Last Man On Earth! Kevin Smith directs The Flash! And Person Of Interest gets a two-night event! Will any of it be worth it? Let’s find out, on This Week’s TV!
Mark Millar adds another comic book movie adaptation to his collection. Legends of Tomorrow casts more heroes for season two. Les Moonves talks about the Star Trek TV show’s release schedule. Kevin Smith will return to The Flash. Plus new images from X-Men Apocalypse, and Melissa McCarthy on Ghostbusters. Spoilers Now!
Harry Houdini and Arthur Conan Doyle team up to solve mysteries in a British-Canadian-U.S. co-production you’re probably only just hearing about! Person Of Interest’s fifth and final season! And what are these continuously promised deaths on Agents of SHIELD and Once Upon A Time? Let’s figure it out, on This Week’s TV!
Dalton! Green! All your Penny Dreadful favorites are back for season three! Gear up for the season finales of Limitless and Lucifer, while Reign returns from a brief hiatus and Game of Thrones continues to tease us about Jon Snow’s fate. And who’s going to bite it on Agents of SHIELD? Find out, perhaps, on This Week’s…
The death of a minor supporting character on a tiny CW show set of a huge discussion about the representation of the LBGTQ community on TV, and this caught most people by surprise. Yet here we are, a month after The 100 aired the inciting incident, still talking about it. What’s keeping this discussion going? In part,…
Select members of The Backstreet Boys, N*Sync, 98 Degrees and O-Town battle zombies in the old West! The Flash crosses over to Supergirl! Wynona Earp premieres on Syfy! Archer returns for another season! All this, and the feature-length season finale of The Walking Dead, all on this week’s TV! |
Q:
Counting all pairs that differ by k
Given an array of numbers and another number k, how can I find the number of 2 elements such as their difference is equal to k?
def pairs(n,k)
n.combination(2).select{|x|(x[0]-x[1] == k) || (x[1]-x[0] == k)}.count
end
I ran a test where n was an array of 8000 different 10 digit numbers.
However, this took about 30 seconds to solve, and ideally it would solve in under a second.
It looks like there is a problem with my algorithm, but I can't figure out how to make it more efficient.
A:
The logical solution here is to sort the data in order, then scan it looking ahead for the partner that has the right difference to the target. Slicing, and combinations, etc. are not going to be the most efficient algorithm.
A sort with \$O(n \log n)\$ scaling, and a simple 'look ahead' to find a potential pairing, will be much, much faster.
If your data has duplicates, then you will need to look for multiple matches for the correct difference.
Consider doing a binary search for the target value, which will still leave you at an overall performance of \$O(n \log n)\$ algorithm
A:
Here's one way to do it.
Code
def count_pairs(arr, k)
arr.flat_map { |i| [[i,:num],[i+k,:npk]] }
.group_by { |i,_| i }
.reduce(0) do |tot,(_k,a)|
nbr_num = a.count { |_,type| type == :num }
tot + [nbr_num, a.size-nbr_num].min
end
end
Example
k = 3
arr = [ 6, 3, 3, 3, 14, 11, 14, 11, 15, 11, 14,
17, 7, 18, 13, 2, 4, 14, 0, 18, 6, 4]
count_pairs(arr, 3)
#=> 9
Explanation
The problem is to determine the number of pairs whose difference equals k. That is equivalent to asking for the number of elements that can be matched with a value that is larger in value by k, such that no element is matched by more than one element that is smaller by k.
The first step in answering that question is to replace each element i in the array with two elements, [i, :num] and [i+k, :npk], where :num indicates it's the original number and :npk indicates it's the original number plus k.
We then group all elements on the first value in each 2-tuple. For arr above, this grouping for the number 7 is as follows:
7=>[[7, :npk], [7, :npk], [7, :num]],
We see that two of the 7's are npk's (4+3), and one is the original number 7. The number of pairings is the lesser of the number of num's and the number of npks. Here that is one.
I will now go through the steps to determine the number of pairing in arr above for k=3.
To make it easier to follow, I will first sort arr (though the method neither requires arr to be sorted nor sorts it):
arr = [ 0, 2, 3, 3, 3, 4, 4, 6, 6, 7, 11,
11, 11, 13, 14, 14, 14, 14, 15, 17, 18, 18]
a = arr.flat_map { |i| [[i,:num],[i+k,:npk]] }
#=> [[0, :num], [3, :npk], [2, :num], [5, :npk], [3, :num],
# [6, :npk], [3, :num], [6, :npk], [3, :num], [6, :npk],
# [4, :num], [7, :npk], [4, :num], [7, :npk], [6, :num],
# [9, :npk], [6, :num], [9, :npk], [7, :num], [10, :npk],
# [11, :num], [14, :npk], [11, :num], [14, :npk], [11, :num],
# [14, :npk], [13, :num], [16, :npk], [14, :num], [17, :npk],
# [14, :num], [17, :npk], [14, :num], [17, :npk], [14, :num],
# [17, :npk], [15, :num], [18, :npk], [17, :num], [20, :npk],
# [18, :num], [21, :npk], [18, :num], [21, :npk]]
b = a.group_by { |i,_| i }
#=> { 0=>[[0, :num]],
# 3=>[[3, :npk], [3, :num], [3, :num], [3, :num]],
# 2=>[[2, :num]],
# 5=>[[5, :npk]],
# 6=>[[6, :npk], [6, :npk], [6, :npk], [6, :num], [6, :num]],
# 4=>[[4, :num], [4, :num]],
# 7=>[[7, :npk], [7, :npk], [7, :num]],
# 9=>[[9, :npk], [9, :npk]],
# 10=>[[10, :npk]],
# 11=>[[11, :num], [11, :num], [11, :num]],
# 14=>[[14, :npk], [14, :npk], [14, :npk], [14, :num],
# [14, :num], [14, :num], [14, :num]],
# 13=>[[13, :num]],
# 16=>[[16, :npk]],
# 17=>[[17, :npk], [17, :npk], [17, :npk], [17, :npk], [17, :num]],
# 15=>[[15, :num]],
# 18=>[[18, :npk], [18, :num], [18, :num]],
# 20=>[[20, :npk]],
# 21=>[[21, :npk], [21, :npk]]}
b.reduce(0) do |tot,(_k,a)|
nbr_num = a.count { |_,type| type == :num }
tot + [nbr_num, a.size-nbr_num].min
end
#=> 9
To clarify how the final step was performed, I will first convert each element of b to a 4-tuple:
[ value, num count, npk count, [num count, npk count].min }
c = b.map do |k,a|
nbr_num = a.count { |_,type| type == :num }
nbr_npk = a.size - nbr_num
[k, nbr_num, nbr_npk, [nbr_num, nbr_npk].min]
end
#=> [[ 0, 1, 0, 0], [ 3, 3, 1, 1], [ 2, 1, 0, 0], [ 5, 0, 1, 0],
# [ 6, 2, 3, 2], [ 4, 2, 0, 0], [ 7, 1, 2, 1], [ 9, 0, 2, 0],
# [10, 0, 1, 0], [11, 3, 0, 0], [14, 4, 3, 3], [13, 1, 0, 0],
# [16, 0, 1, 0], [17, 1, 4, 1], [15, 1, 0, 0], [18, 2, 1, 1],
# [20, 0, 1, 0], [21, 0, 2, 0]]
c.reduce(0) { |tot, (*_,cnt)| tot + cnt }
#=> 9
|
488 N.W.2d 401 (1992)
FARGO WOMEN'S HEALTH ORGANIZATION, INC., George Miks, M.D., Susan Wicklund, M.D., Jane Bovard, Administrator; and on behalf of the Staff of Fargo Women's Health Organization, Inc., and Jane Doe(s), being fictitious names intended to designate present and prospective patients of the Fargo Women's Health Organization, Plaintiffs and Appellees,
v.
LAMBS OF CHRIST; Focus on Fargo; Help and Caring Ministries; Community Praise Center; Darold Larson; Jody Clemens; Tim Lindgren; Kathy Beneda Lindgren; Chet Gallagher; Chris Venkelese; Ron Maxon; Operation Rescue; and all other individuals, associations, *402 and organizations whose names or legal identities are otherwise unknown to Plaintiffs at this time, with whom they have conspired and acted in concert with to deprive Plaintiffs of their rights, Defendants and Appellants.
Civ. No. 920005.
Supreme Court of North Dakota.
August 19, 1992.
*404 William Kirschner, Fargo, for plaintiffs and appellees.
Richard D. Varriano, Moorhead, Minn., for defendants and appellants.
Peter B. Crary, Fargo, for defendants and appellants; appearance only.
VANDE WALLE, Justice.
In this appeal from an order granting a preliminary injunction, we must decide whether the district court properly balanced the rights of anti-abortion protestors to assemble and speak, on the one hand, against the rights of a clinic, its doctors, and its patients to be free from trespass, assault, and other tortious acts done by the protestors in advancing their message, on the other hand. We affirm in part, reverse in part, and remand.
This action began when the Fargo Women's Health Organization, Inc., its doctors, and volunteers (collectively, "the clinic") sought injunctive relief, on their own behalf and on behalf of their present and future patients, against several unincorporated associations and named individuals (collectively, "the protestors") who were alleged to have committed criminal and tortious acts against those seeking the injunction. The plaintiffs submitted, with their complaints, a motion for temporary restraining order and preliminary injunction supported with affidavits from the clinic administrator, a doctor, the coordinator of volunteers, and a volunteer who had also been hired to provide security for the clinic and its employees. The defendants answered the complaint, denying many of the specific allegations of misconduct contained in the complaint. The defendants did not, however, offer any affidavits in support of their denial of specific allegations of misconduct and in opposition to the motion for temporary restraining order and preliminary injunction. The district court issued a temporary restraining order, superseded by the preliminary injunction from which the defendants now appeal. Because this matter has not yet been submitted to a full evidentiary hearing, with testimony and cross examination of witnesses, the record of the events is contained solely in the affidavits submitted on behalf of the plaintiffs in support of their application for a preliminary injunction. No opposing affidavits were submitted. Thus the circumstances we relate and the factual basis for the injunction are taken exclusively from those affidavits.
Since 1981, the Fargo Women's Health Organization has operated a clinic which provides a full range of gynecological medical services including first trimester abortions. Approximately 75 demonstrations by anti-abortion protestors have been held in the vicinity of the clinic. It appears that most of these demonstrations were peaceful, consisting of picketing, leafleting, and speaking to people in the area near the clinic. Beginning March 29, 1991, the character of the protests changed. On that day, 26 people stormed the clinic, broke down a door, occupied its rooms, and locked themselves together using bicycle locks. The demonstrators refused to leave, were *405 arrested, and were removed by Fargo police after their locks were removed by a locksmith.
On nine other occasions in the ensuing seven months, demonstrators were arrested for criminal acts committed in conjunction with anti-abortion protests. As a result of these actions, patients were confronted and jostled as they attempted to walk to the clinic. Some patients were able to reach the clinic only with the assistance of volunteer "escorts" or professional security officers who walked them through groups of hostile, screaming protestors that surrounded them, stood in their way, forced leaflets into patients' hands and otherwise impeded patients' access to the clinic. Protestors struck, pushed, and threatened escorts and guards with physical harm. One protestor was arrested trying to climb the clinic's fence in order to reach a patient using the clinic's rear entrance.
Patients who attempted to drive to the clinic were confronted at the entrance to the clinic parking lot. Protestors stood in the way of the cars, climbed onto the vehicles' hoods or under the cars. Some protestors attempted to fasten themselves to the frames of cars in order to delay their removal from the site. On one occasion, protestors placed blocks against the tires and attempted to cut a cable in order to disable a car after they succeeded in stopping it in the clinic's driveway. On another occasion, protestors waited across the street from the clinic for a car to approach the parking lot at which point they rushed into the street, stopped the car, and blocked the public road. As a result of these tactics, the clinic was effectively blockaded; patients and staff could not enter or leave the clinic for hours at a time.
The protestors called these blockades "rescues." At anti-abortion rallies held after the "rescues" began, spokesmen for the associations asked volunteers to participate by being jailed for rescuing babies. The rescues were to be part of a two-year campaign to force the clinic to close.
Away from the clinic, protestors followed clinic staff members in cars, and into grocery stores, airports, and other public buildings. Their activities were particularly intense against one of the clinic's doctors. During a five month period, groups as large as 30 demonstrated at the gate of her home, congregating in pre-dawn hours, shouting and honking car horns, and attempting to block the departure of the doctor and her family members. Some protestors roamed on the doctor's property, leaving a banner draped over a car, a baby stroller and basket on her porch. During times when the protestors were near the site, the doctor's house and garage were vandalized. Protestors followed the doctor in cars as she drove to Fargo or to the airport. Groups waited for the doctor in airport parking ramps and rushed at her, yelling and flashing cameras. They leafleted cars at the school of the doctor's daughter, and two protestors were asked to leave the school building when they attempted to obtain a photo of her daughter. A car full of protestors also followed the daughter of one of the clinic's volunteers.
Relying on this record, the district court granted a preliminary injunction. The protestors challenge on appeal the need for an injunction and, in the alternative, argue that several specific provisions are unduly restrictive of their constitutional rights to free speech and assembly.
I. APPEALABILITY
This is an appeal from a preliminary injunction. Neither party has raised the issue of appealability but we may consider that issue upon our own motion. Ceartin v. Ochs, 479 N.W.2d 863 (N.D. 1992). Section 28-27-02(3), NDCC, provides, in part, that "[a]n order which grants, refuses, continues, or modifies a provisional remedy, or grants, refuses, modifies, or dissolves an injunction ..." may be "carried" to the Supreme Court. In the past, consistent with the doctrine of finality and "our expanding appealability jurisprudence," Ceartin, 479 N.W.2d at 865, we have required compliance with the provisions of Rule 54(b), NDRCivP, at least when the injunctive features of the order were incidental and "serve[d] no active purpose," e.g., Regstad v. Steffes, 433 N.W.2d *406 202, 204 (N.D.1988). The absence of a Rule 54(b) certification has not, however, kept us from reviewing "interim relief [which] affects fundamental interests of the litigants." See Vorachek v. Citizens State Bank of Lankin, 461 N.W.2d 580, 584 (N.D.1990).
In this case, the preliminary injunction attempts to balance the rights of a clinic, its doctors and staff, and its patients, to the delivery and receipt of medical care against the protestors' fundamental constitutional rights of speech and assembly. The injunctive features of this order serve an active rather than incidental purpose. We therefore conclude that review of this interim order is proper.
II. PROPRIETY OF INJUNCTION
A court may enjoin conduct which, unrestrained, would produce injury to the plaintiff "when it shall appear by the complaint that the plaintiff is entitled to the relief demanded...." NDCC § 32-06-02(1). The factors appropriate to determining whether injunctive relief should be granted are: (1) substantial probability of succeeding on the merits; (2) irreparable injury; (3) harm to other interested parties; (4) effect on the public interest. F-M Asphalt, Inc. v. North Dakota State Hwy. Dept., 384 N.W.2d 663 (N.D.1986). "The decision to grant or deny a preliminary injunction is within the discretion of the trial court, and its determination will not be disturbed on appeal unless it appears that the court clearly abused its discretion." Schauer v. Jamestown College, 323 N.W.2d 114, 115 (N.D.1982).
The protestors argue, without citing any authority, that the preliminary injunction is improper because it constitutes the substitution of a civil remedy for the criminal process. In particular, they argue that North Dakota criminal law provides an adequate remedy at law and that the purpose of the injunction is to impermissibly substitute a single judge for the protections provided defendants by the criminal justice system. In the past, this court has recognized the principal that "equity has no jurisdiction to restrain the commission of crimes, and that injunction may not issue for the prevention of criminal acts unconnected with violation of legal rights." Richmond v. Miller, 70 N.D. 157, 158-59, 292 N.W. 633, 634 (1940); see also NDCC § 32-05-02. But, when the acts sought to be enjoined interfere with legal rights, the court's power to issue an injunction is not destroyed because the acts are punishable as a crime. "In such a case, the equitable powers of the court are not put forth to enjoin the commission of a crime, although that may incidentally result; they are put forth to protect legal rights against invasion by acts which, if committed, would cause injury for which the ordinary remedies at law would not afford adequate relief." Richmond v. Miller, 70 N.D. at 159, 292 N.W. at 635. See also Missouri-Kansas-Texas R. Co. v. Neuhoff Bros., Packers, 297 S.W.2d 316 (Tex.Civ.App.1956) [injunction proper to protect landowner from repeated violations of penal law which interfered with owner's use of property]; 42 Am.Jur.2d, Injunctions § 40 (1969).
The affidavits offered by the clinic described repeated instances where the protestors invaded the clinic, approached patients or clinic employees in a physically threatening manner, actually struck or restrained patients or employees, blockaded the clinic, and conducted demonstrations so noisy that clinic business was disrupted. The affidavits reported that these activities continued despite the arrests on several occasions of many protestors. The protestors did not challenge this evidence. Relying on this record, the district court found that the clinic made a prima facie showing on its claims of intentional infliction of emotional distress, private and public nuisance and interference with contract, and, as a result, it had shown probable success on the merits justifying the imposition of the preliminary injunction. We conclude that the district court did not abuse its discretion in granting the preliminary injunction.
III. TERMS OF INJUNCTION
The protestors challenge several of the injunction's prohibitions as being overbroad, *407 thus, restricting protected speech, or as being unconstitutionally vague.[1] The overarching theme of the protestors' arguments is that these restrictions upon their expressive activities are not drawn sufficiently narrowly to meet constitutional analysis.
Streets, parks and sidewalks are "quintessential" public forums. International Society for Krishna Consciousness, Inc. v. Lee, ___ U.S. ___, 112 S.Ct. 2709, 120 L.Ed.2d 669 (1992). While the peaceful exercise of our first amendment rights to speech and assembly are protected from government interference, United States v. Grace, 461 U.S. 171, 103 S.Ct. 1702, 75 L.Ed.2d 736 (1983), "the First Amendment does not guarantee the right to communicate one's views at all times and places or in any manner that may be desired." Heffron v. International Soc'y for Krishna Consciousness, Inc., 452 U.S. 640, 647, 101 S.Ct. 2559, 2563-64, 69 L.Ed.2d 298 (1981). Even in a public forum, a state may impose reasonable time, place and manner restrictions upon all expression, whether written, oral or symbolized by conduct. Clark v. Community for Creative Non-Violence, 468 U.S. 288, 104 S.Ct. 3065, 82 L.Ed.2d 221 (1984). Time, place and manner restrictions are valid if they "are content-neutral, are narrowly tailored to serve a significant government interest, and leave open ample alternative channels of communication." Perry Educ. Ass'n v. Perry Local Educator's Ass'n, 460 U.S. 37, 45, 103 S.Ct. 948, 955, 74 L.Ed.2d 794 (1983). See also City of Jamestown v. Beneda, 477 N.W.2d 830 (N.D.1991).
A. Place Restriction
The protestors challenge the "bubble-zone" restriction contained in subparagraph (d) which prohibits more than two demonstrators from being within 100 feet of the clinic property lines during clinic hours. They argue that the restriction is content-based; the clinic counters that the provision is content-neutral.
Governmental regulation of expressive activity is content-neutral so long as it is "justified without reference to the content of the regulated speech." Clark, 468 U.S. at 293, 104 S.Ct. at 3069 (emphasis added). "A regulation that serves purposes unrelated to the content of expression is deemed neutral, even if it has an incidental effect on some speakers or messages but not others." Ward v. Rock Against Racism, 491 U.S. 781, 791, 109 S.Ct. 2746, 2753-54, 105 L.Ed.2d 661 (1989).
The justification offered by the clinic in its application for the injunction was the need to be protected from multiple tortious invasions of its rights and the rights of its employees and patients. The clinic supported this application with evidence of protestors entering the clinic, blocking doorways, blocking driveways, swarming pedestrians attempting to reach the clinic, and using force against those attempting to escort these pedestrians, among other things. The clinic also submitted evidence that the protestors intended a two-year campaign to close the clinic. The district court found that the clinic proved a prima facie case on its claims of intentional infliction of emotional distress, private and public nuisance and interference with contract. *408 The protestors have not challenged these findings; they, for purposes of this appeal, therefore concede that the findings provide the justification for the injunction. See Fargo Women's Health Organization Inc. v. Larson, 381 N.W.2d 176 (N.D.1986) [in review of preliminary injunction, reviewing court bound by facts presented to district court].
The protestors' attack on the "bubble-zone" restriction rests on their argument that the purpose of the injunction is to silence their expression of pro-life views. In support, they cite a federal circuit court decision, Mississippi Women's Medical Clinic v. McMillan, 866 F.2d 788 (5th Cir. 1989), for the proposition that enjoining anti-abortion demonstrations near a clinic impermissibly restricts speech. In doing so, the protestors distort the facts and the import of McMillan. In that case, the reviewing court specifically noted that the clinic offered no evidence that the protestors physically restrained potential patients from entering the clinic. The clinic contended that "the protestors had no right to create the tense and agitated atmosphere that surrounded the clinic." 866 F.2d at 791 [emphasis deleted]. The protestors created this atmosphere by distributing literature, and making noise which could be heard within the clinic. In McMillan, the conflict was between the right to have an abortion identified in Roe v. Wade, 410 U.S. 113, 93 S.Ct. 705, 35 L.Ed.2d 147 (1973), and the right to express, "peaceably, if loudly," the opinion that more is involved in abortion than the mother's choice. 866 F.2d at 791-92.
The McMillan court distinguished its case from that presented in Northern Virginia Women's Medical Center v. Balch, 617 F.2d 1045 (4th Cir.1980), where the protestors "embarked upon a series of actions involving entering upon the clinic's premises, blocking doors to procedure rooms and blocking access to the [clinic]" in order to prevent the performing of abortions. 617 F.2d at 1048. In Balch, the record of trespasses provided a factual basis for a valid injunction. The McMillan decision, therefore, stands for the proposition that an attempt to enjoin peaceful pro-life demonstrations outside an abortion clinic is an attempt to enjoin the expression of specific ideas. It must be read in conjunction with Balch where an injunction aimed at the use of force, intimidation and violence in expressing opposition to abortion was upheld. When an injunction is based on a record of force, trespass and intimidation, the justification for the injunction is the method of communicating, not the motivating idea. The injunction is, therefore, content-neutral. See Northeast Women's Center, Inc. v. McMonagle, 939 F.2d 57 (3rd Cir.1991); Bering v. Share, 106 Wash.2d 212, 721 P.2d 918 (1986); Planned Parenthood Ass'n. v. Project Jericho, 52 Ohio St.3d 56, 556 N.E.2d 157 (1990); Planned Parenthood League v. Operation Rescue, 406 Mass. 701, 550 N.E.2d 1361 (1990).
The record supporting this injunction contains adequate evidence to support the court's finding that the clinic would probably prevail on its claims of intentional infliction of emotional distress, private and public nuisance and interference with contract. We conclude that the justification for the injunction was not made in reference to the content of the protestors' expressive activities; the injunction is content-neutral.
In addition to being content-neutral, a proper time, place or manner regulation must be narrowly tailored to serve a significant government interest and leave open alternative channels of communication. Perry Educ'n Ass'n., supra.
The interests served by the injunction are consonant with the justification for its issuance: that trade and commerce be conducted unimpeded by breaches of the peace and that the safety of those engaged in or patronizing a lawful business, in this instance a medical clinic which performs legal abortions, be assured. In particular, the injunction is meant to prevent the protestors from occupying the clinic, blocking its doors, and blockading the driveway, roads and side walks used by vehicles and pedestrians to go to and leave from the clinic. The government's interest in protecting *409 the clinic's legal rights by preventing or controlling the protestors' tortious conduct meets the "significant government interest" test. See, e.g., Bering v. Share, supra; Planned Parenthood Ass'n v. Project Jericho, supra; Planned Parenthood League v. Operation Rescue, supra; O.B.G.Y.N. Assoc. v. Birthright of Brooklyn, 64 A.D.2d 894, 407 N.Y.S.2d 903 (1978); Portland Feminist Women's Health Ctr. v. Advocates for Life, Inc., 859 F.2d 681 (9th Cir.1988); National Organization For Women v. Operation Rescue, 726 F.Supp 1483 (E.D.Va.1989) aff'd. 914 F.2d 582 (4th Cir.1990) (per curiam).
The difficulty in this case is in assessing whether the injunctive provisions are narrowly tailored to protect the interest and whether alternative avenues exist for the protestors' message. The injunction limits, during the clinic's business hours, peaceful picketers to two in the area in front of the clinic; all other protestors are prohibited from coming closer than 100 feet from the clinic's property line. Given the protestors' actions as described in the affidavits, a place restriction may be an appropriate method of regulating the protestors' conduct. This record, however, contains no description of the physical layout of the clinic in relation to its property line, the property line in relation to public sidewalks and roads, or the features of the neighborhood. It gives us no way to judge the "fit" of this place restriction to the circumstances of this case. The court attempted to tailor a place restriction without taking any measurements. Similarly, we are not given any basis for judging the alternative methods of communication available to the protestors. Subparagraph (d) is not sufficiently narrow to satisfy constitutional requirements. We will therefore strike this provision and remand to the trial court for further fact finding on this issue, permitting the trial court to revise this portion of the injunction as to the dimensions necessary for a zone of protection in accord with the evidence to be adduced.
B. Noise Restriction
The protestors challenge the noise restriction contained in subparagraph (c) as being vague. A statute, or injunction, will be considered unconstitutionally vague if it "either forbids or requires the doing of an act in terms so vague that [persons] of common intelligence must necessarily guess at its meaning and differ as to its application." Connally v. General Constr. Co., 269 U.S. 385, 391, 46 S.Ct. 126, 127, 70 L.Ed. 322 (1926). The purpose of the vagueness doctrine is to ensure that all "be informed as to what the state commands or forbids." Lanzetta v. New Jersey, 306 U.S. 451, 453, 59 S.Ct. 618, 619, 83 L.Ed. 888 (1939). When so informed, people have an opportunity to conform their conduct to the law, and those who enforce the law are provided with strict guidelines for their application. Grayned v. City of Rockford, 408 U.S. 104, 92 S.Ct. 2294, 33 L.Ed.2d 222 (1972). The prohibition against overly vague laws protects people from having to voluntarily curtail First Amendment activities because of a fear those activities could be characterized as illegal activities due to an unconstitutionally vague statute. Id.
The protestors argue that no definition understandable to a common citizen is given for the prohibited "obstructing the work" of the clinic. "There is little doubt that imagination can conjure up hypothetical cases in which the meaning of these [challenged] terms will be in nice question. The applicable standard, however, is not one of wholly consistent academic definition of abstract terms. It is, rather, the practical criterion of fair notice to those to whom the statute is directed. The particular context is all important." American Comm. Ass'n v. Douds, 339 U.S. 382, 412, 70 S.Ct. 674, 691, 94 L.Ed. 925 (1950). The most important context for defining "obstructing" is the rest of the sentence in which the term appears, making it clear that the prohibited act is the making of noise "that substantially interferes with the provision of medical services." In the context of this injunction, supported by evidence that the protestors' demonstrations *410 were so loud that the noise penetrated the operating rooms, the recovery rooms, and places where staff and patients were discussing medical procedures, and based upon the district court's finding that the clinic had proved a prima facie case of nuisance, this provision can only be construed to proscribe excessive noise.
The United States Supreme Court reviewed and approved a remarkably similar prohibition challenged on vagueness grounds in Grayned, supra. There, an anti-noise ordinance provided that:
"[N]o person, while on public or private grounds adjacent to any building in which a school or any class thereof is in session, shall willfully make or assist in the making of any noise or diversion which disturbs or tends to disturb the peace or good order of such school session or class thereof...." 408 U.S. at 107-08, 92 S.Ct. at 2298.
The Court concluded that this statute was a statute written specifically for the context, "where the prohibited disturbances are easily measured by their impact on the normal activities of the school. Given this `particular context,' the ordinance gives `fair notice to those to whom [it] is directed.'" Id. at 112, 92 S.Ct. at 2301. The vagueness of the prohibited "noises" or "diversions" was dispelled by requirements that "(1) the `noise or diversion' be actually incompatible with normal school activity; (2) there be a demonstrated causality between the disruption that occurs and the `noise or diversion'; and (3) the acts be `willfully' done." Id. at 113-14, 92 S.Ct. at 2302. These features made the ordinance sufficiently clear to pass constitutional requirements.
The noise injunction challenged by the protestors is substantially the same as the Grayned ordinance. The prohibited noise is measured by its impact on the clinic activities, and it must be incompatible with the provision of medical services.[2] There must be causality between the interference and the noise. And, because the restriction is part of an injunction, the act must be willfully done in order to support sanctions. Anchor Estate, Inc. v. State, 466 N.W.2d 111 (N.D.1991). Subparagraph (c) is not unconstitutionally vague. See also Portland Feminist Women's Health Ctr. v. Advocates for Life, Inc., supra [noise injunction not vague]; Planned Parenthood League v. Operation Rescue, supra, [obstructing-access injunction not vague].
C. Harassment Restriction
The protestors also attack as vague subparagraph (b) which enjoins them from "harassing, intimidating or physically abusing" persons connected with the clinic. Again, we must consider this proscription in the context of this litigation, that is, the protestors' past conduct, the relief sought by the clinic, and the district court's findings. See Northeast Women's Center, Inc. v. McMonagle, supra.
The protestors blocked patients walking to the clinic and the cars of patients, trapping patients as the protestors screamed, waved signs and flashed cameras in the patients' faces, and forced leaflets on them. The protestors followed the doctor and clinic staffers and members of their families. The protestors waited in airport parking ramps to confront the doctor. The doctor and staffers described the fear and loss of sleep created by these activities and the extraordinary steps taken to assure their safety and that of their families. The district court found that the clinic had stated a prima facie claim of intentional infliction of emotional distress. That finding necessarily includes the finding that the protestors' intentional conduct was extreme and caused severe emotional distress, or was so outrageous that a severe emotional reaction is implied. See Muchow v. Lindblad, 435 N.W.2d 918 (N.D.1989). Given this background, the protestors cannot reasonably argue that the prohibition on "harassing, intimidating or physically abus[ive]" *411 conduct can be mistaken as describing their lawful expressive activities. Subparagraph (b) is not unconstitutionally vague.
Subparagraphs (e) and (f) are attacked by the protestors as overbroad. These paragraphs are apparently directed at the protestors' excessive conduct. In addition to "harassing" and "intimidating," subparagraph (e) prohibits "following," "photographing, videotaping," and "speaking" to staff and patients. We construe the trial court's order to enjoin following, photographing, and videotaping done without consent, and persistently and with the intent to harass and intimidate. To the extent that this construction is not clearly set forth in the order, we direct that on remand the trial court modify the order in accordance with our construction. In the context of this case, the order thus construed is permissible. See Chico Feminist Women's H. Ctr. v. Scully, 208 Cal.App.3d 230, 256 Cal.Rptr. 194 (3rd Dist.1989). However, "speaking" to staff and patients cannot be constitutionally enjoined. Cf. City of Bismarck v. Schoppert, 469 N.W.2d 808 (N.D.1981). We therefore strike that part of the injunction that prohibits "speaking."
Subparagraph (f) prohibits distributing literature to any person who has indicated a desire not to receive the material. Obviously, distributing literature is protected communicative activity and a complete ban violates the First Amendment. See, e.g., Lee v. International Society for Krishna Consciousness, ___ U.S. ___, 112 S.Ct. 2709, 120 L.Ed.2d 669 (1992) (per curiam) [explained by International Society For Krishna Consciousness, Inc. v. Lee, ___ U.S. ___, 112 S.Ct. 2711, 120 L.Ed.2d 541 (1992)]. The prohibition on "physically abusing" persons entering or leaving the clinic contained in subparagraph (b) offers sufficient protection from those protestors who physically force literature on passers-by.
The order of the district court is affirmed in part, reversed in part, and remanded for further proceedings consistent with this opinion.
ERICKSTAD, C.J., and LEVINE, MESCHKE and JOHNSON, JJ., concur.
NOTES
[1] The restrictions challenged by the protesters are found in the following paragraphs:
"(b). harassing, intimidating or physically abusing persons entering, leaving or working at FWHO facilities, and the spouses and family members of those persons entering, leaving or working at FWHO;
(c). obstructing the work of the persons located at FWHO facilities by any meansincluding singing, chanting, yelling, shouting, or screamingthat substantially interferes with the provision of medical services including counseling, with such facility;
(d). going within 100 feet of the property line of FWHO during such times as they are open for business, Monday through Saturday, from 7:30 a.m. til 6:00 p.m., except that two people may quietly and peacefully picket such facility, so long as said people do not interfere with the operations of said facility, or individuals seeking to enter or leave FWHO as provided herein.
(e). following, harassing, photographing, video-taping, and intimidating, or speaking to staff and patients of FWHO who indicate that they do not wish to be spoken to.
(f). distributing leaflets or brochures to any person who has indicated orally or by gesture that such person does not wish to receive such literature."
[2] One objective guide of what noise level is incompatible with the provision of medical services is the Fargo ordinance which limits noise levels to 55 decibels in residential zones and 65 decibels in commercial during the hours relevant to the injunction subparagraph (c). Fargo Mun.Ord. § 11-0204.
|
"That is good." "Maintain your flow." "Be at one with your chi." "I feel great anxiety." "The rhythms of consciousness rings in discord." "Yes, I sense it too." "Someone close to me is in great distress." "Can you feel who it is?" "No." "The anguish grows." "You must go to them." "Yes." "I must." "Continue with the class." "Caine!" "You must help me, Caine." "I am lost." "They come for me." "Help me, Kwai Chang Caine." "The grandson of Kwai Chang Caine walks out of the past." "But I want to fight." "Yes." "So did your great-grandfather when he was your age." "He teaches his son wisdom at a Shaolin temple." "An evil force destroyed that temple." "Father and son each believed the other had perished." "Fifteen years later, they were reunited." "Now Caine faced new challenges and his son grew up." "Look, I'm not my father." "I don't do kung fu." "I'm a cop." "That's who I am, that's what I do." "I am Caine." "I will help you." "Why do you hit the post with such violence?" "It burns out the rage." "Keeps me from killing people." "You mean you do this to release your unwanted, destructive emotions?" "Yeah." "Something like that." "Is that not something of a paradox?" "Yeah, it's paradoxical." "It's stupid." "Yeah, but that's what-- That's what cops do." "Are you here to discuss my exercise routine or is there something else?" "Because...." "Sorry." "Sorry." "Look I got a full plate right now." "And justice makes me very, very upset when one of the bad guys gets away." "I've come because I want your help." "I have a friend who is in trouble." "Arrested?" "No." "About to be?" "I do not think so." "Well, what?" "What kind of trouble?" "I do not know." "Well, look, pop" "Dad." "You know I'd help you." "Anything at all." "You gotta be more specific." "I wish I could be more specific." "So how do you know this guy's in trouble?" "He call, or what?" "It came to me in meditation." "What came to you?" "That he was in trouble." "And in a sort of difficulty that I might not be able to handle on my own." "Okay." "All right, let me get this straight." "You were meditating and you had a vision, a feeling that this friend of yours was in trouble." " Does this friend have a name?" " Two Feathers." "Indian?" "He was at one time, a student of mine." "Oh, so he's a Shaolin, a holy man." "No, he is too young to be what his people would call a pipe carrier." "A holy man." "If he survives, he will be." "He is the future." "That is what is threatened." "I know you wouldn't come here unless you felt it was important." "And I wanna help you but finding some guy that you saw in a dream...." "I understand." "Please accept my apology." "I had no right to make my own concerns yours." "It is simply that certain aspects of life this life, this place, are very difficult for me." "They're difficult for me too." "I can't help you unless I get proper authorization from Blaisdell." "I got a backlog of cases." "I don't think he's gonna let me off for something this vague." "Sure you can." " What?" " If your father needs you of course you can help." "Take all the time you need." "Look, I'm up to my ass in depos on the Scallini case." "I got a liquor-store situation" "There are other officers in this precinct, Peter." "There's a whole squad room out there." " Let me introduce you to them." " Come on." "Captain." "Look, I've had to deal with your son for the last few years." "I might have a some kind of a handle or something." "Let me talk to him, okay?" "Oh, and Caine maybe sometime, we could just have a cup of coffee." "A sandwich or something." "We have a lot in common." "Yes, we do." "Maybe there's some stories you'd like to hear about that time." "One father to another." "Yeah, exactly." "That was sweet." " I really don't have time for this." " You don't want to help your father?" "I want to help him, but...." "How much credence would his story have been given if he had called in cold?" "I mean, this Indian he's talking about, Two Feathers." "He found out he was in trouble while meditating." "It came to him in a dream." "I don't care if it came to him on a bubblegum card." "There's something happening in the Indian community." "There's been a rash of violent incidents." "I've been looking for a way to get somebody in there, find out something." "It's a closed society." "Now maybe, just maybe your father can provide an in for you and then for us, huh?" "We don't get a bite on an address, we're gonna have to shop around." "Don't think my badge will be a conversation starter in Two Feathers' community." "If you do not trust others, they will not trust you." "Well, it's a two-way street, Dad." "Just the way it is." " Peter." " Father." " What is that?" " Nothing." "I have heard that something may be nothing but it is news to me that it can sing." "Where did you get this?" "I traded one of the kids in town for it." "What did you give him for it?" "One of the little gongs you gave me for my room." "Why do you hide this from me?" " It is only a game." " I'm sorry." "I thought it would offend you, having something like that in the temple." "Reverence for the past does not mean we ignore the future or the present." "Only a fool does not take advantage of modern ways as long as that way does not deprive him of something more important." "Right." "Got it, pop." "Don't lose your soul over video games." "Something like that." "Okay, let's try the side door." "Referencing city hall's public records." "Social programs." "Employees?" "Employees." "We got him." " Is that our boy?" " That is Two Feathers." "He works at a community center out on Orchard." "That's a part of town the mailman brings his own pit bull." "I got you." "I've got a job for a medicine man:" "a wounded playground warrior." "Is it serious?" "No, it's all right." "She's the one that made me come." "Let me see." "This should do the trick." "What's that?" "It will prevent infection." "It may sting." "I'm not gonna cry, if that's what you think." "No." "Indian warriors don't cry." "Some do." "They do?" "My grandfather made one of these for me when I was even younger than you." "He said when I spin it, I can hear the cries of all the Indian people who ever lived." "Listen." "You and I are joined to them, and they to us." "That is our heritage." "The true strength of our people." "That is what it means to be Indian." "Keep this." "Hey, kid I'll give you 10 for it." " No." " Oh, that's right." " It's your heritage." "Can't sell that, huh?" " It is also your heritage, Crow Dog." "All your dead, wailing ancestors ain't worth nothing." "Stop fighting us on this, Two Feathers." "We need the signatures for the petition." "Once we get enough we can go to state government, and construction can begin." "You talk about the past." "I talk about the future." " This is important." " Yes, it is." "You're in our way." "If where I stand blocks your way, step around me." "Can't do that." "You have to walk with us." "Why don't we talk about this somewhere else?" "Go now." "Let's go, Two Feathers." " Hey, pretty nice car." " Thanks." "For a cop." "Hey, I got it at a police auction." "It belonged to a drug dealer." "How'd you know I was a cop?" "The only white folks that come around here..." " ...are cops or bill collectors." " Oh, so maybe I'm a bill collector." "Not in this car." "Maybe in my next life I'll have a car like this." "Why not in this life?" "Because in this life, I'm an Indian." "Hey." "Come here." "I'm looking for a man named Two Feathers." " Does he live here?" " You're a cop, go find out." " Boy." " Right." "Thank you." "Very nice." "Police." "Looking for a guy named Two Feathers." "Well, I can figure out why you might want him..." " ...but what's your reason, officer?" " Same as his." "I wish to speak to him." " You know Two Feathers?" " Yes though it has been many years since we have been together." "I am Caine." "This is my son, Peter." "Really?" "Except for the eyes, I wouldn't have made the connection." "He's not here." "I don't know when he'll be back." "It is important." "I'll tell him you came by." "Your brother" "I never said he was my brother." "has come into conflict with very powerful, dangerous people." "He refuses to make the accommodations they require." "How do you know all this if you haven't talked to him?" "It came to him in a dream." "I do not know the reason for this dispute." "But since he will not change or compromise" "No, he won't." "But how do you know that?" "He was my student." "You're that Shaolin priest." "When faced with more than one adversary in a fight you cannot avoid there is one thing that is most important." "What is it?" "Don't let them see your fear." "No." "You must convince them of your willingness your enthusiasm for combat." "They must believe that you are eager to do battle." "Which do I attack first?" "The one you cannot see." "Two Feathers is in danger." "And you think you can help." "I only wish to make the offer." "And you?" "I'm with him." "There's a club down the street." "Someone there may have seen him." "I'll go check it out." "They won't talk to you." "I'll go." "We'll all go together." " You coming?" " No." "Could you tell me where he keeps his things?" "His room's upstairs." "Yes." "There's a coalition, Indians and whites." "They want to build a resort and gambling casino on reservation land." "And my brother opposes this." "His opinion carries a lot of weight." "Well, gambling's against state law." "State law, yes, and state law doesn't apply on reservation land." "These white guys?" "What can you tell me about them?" "Well, they're dressed-up thugs with pockets full of dope money." "So you're against this because they're white or you're against this because their money's dirty?" "No, it's not the color of their money or skin." "I believe in the great spirit Darwin." "Adapt or become extinct." "When the river runs dry, the fisherman moves on." "All right, then you're for the casino." "We have to regain control of our destiny." "If that's a casino, fine, so long as we run it, we control it and we own it, then I'm for it." "What's it gonna take?" "I mean, what about a job?" " Dealing cards?" " No." "No, it can't be that." "They say gamblers like their dealers to look sympathetic." "You know, vulnerable." "Yeah, like blond, female and well-endowed." " Not of our people." " Well, it's nothing personal." "You gotta give the customers what they want, right?" "Especially when the customer's losing large." "He doesn't want what's right." "So let's get on with this." "You see, chief, it's like this." "When you talk, your people listen." "Now, that's worth something to us." "You must want something." "Let's hear it, chief." "Walk with me on this." "We get half of what's built." "Think of the profits, and the jobs." "Why are some of us bought so cheaply?" "Hey?" "Grass doesn't grow." "Wind doesn't blow." "All that remains is lies." "This is not our future." " Hey!" " This is a coward's weapon." "If we're gonna do this let's do it like warriors." "They must believe that you are eager to do battle." "Which do I attack first?" "The one you cannot see." "Your most powerful, most formidable opponent will wait until you are weak and tired." "Engage him now." "Instinct is quicker than reason." "Do not think." "React." "Strike out." "Come here." "Get him." "When they are so many, what do I do?" "Against overwhelming odds." "That's enough." "You lose." "That's enough!" "He's dead." "We have to leave him where he can be found." "Shows his medicine is weak." "Wherever, just get him out of here." "Last time I saw him do something like that, I was 12 years old." "A little girl was lost." "Did he find her?" "Yeah." "She was in a corn field, with a broken leg." "Well, then, let's not disturb him." "Two Feathers." "Caine!" "I cannot cross!" " I'm at the river's edge." " Two Feathers, it is me." "Too late." "Too late." "Too late." "I will free you of pain." "Your journey has begun." "Come over, Kwai Chang Caine." "Come." "Come to me." "Come." "Do you know of a place near here, a canyon of words." "A canyon?" "Like an alley?" "Graffiti." "Words on a wall?" "Your brother is there, and he's dying." "We must hurry." "There's hundreds of alleyways like this in the district." "We just got the wrong one." "This is the only one which death clings to." " Caine!" " There." "Oh, no." "I'll call for the paramedics." "Two Feathers." "It is too late for that." " I'm calling for an ambulance." " We are at the river, my son." " What river?" " The river of light and dark." "Strains of pain and awareness." "It flows between us and him." "You cannot see it, but it is there." "He is already on the other side." "My brother is not dead." "He's not." " I know" " I know it's hard to accept." " No, he is alive." "You said that you understood." "Yes." "I understand." "I understand we have a murder victim on our hands." "But no one knows this in our community." "If they believe Two Feathers is alive that he is up in the hills healing his wounds, that he will return these white man cannot succeed." "Just how long do you think you can keep that going?" "As long as it takes for my brother's words to be understood." " You're asking me to cover up a murder." " I'm just asking for time." "Don't let my brother's death finish here in this place." "All right, I can book him as a John Doe." "Take his wallet." "By the time they run his prints I'll have bought you maybe 36 hours." "That's it." "That's enough time." "The vote is tonight." "I will build a burial stand for him in a place of tranquility." "There is a clearing in the woods near the lake where we fish." "I'll take you there." "I will cross the river and be with you when I begin my journey." " You're gonna be cool about this?" " These are my people." " I know how to talk to them." " Keep it low-key." "You do the same." "You're walking in here with two strikes." "You're white, and you're a cop." "I'm also a descendant of Custer." "Is that going to be a problem?" "Friends, hear me!" "When we are divided, we are weak." "We achieve nothing." "This is the way we speak the loudest." "This is a chance to control our destinies." "No more handouts from the white man's government that robs us of dignity." " Two Feathers said it is wrong." " He said it's a sham." "Yeah, that's right." "This is not a denial of our heritage." "It is a celebration of our determination to make our voices heard." "Let's get this signed." " No." " Can I get a beer?" "Nothing will be signed here tonight until I have been heard." "I'll just take the knife out of my back, no problem." "Two Feathers could not be here to speak to you tonight." "So I have come in his place to face the one who has betrayed not only your heritage but your souls." "The only people who will celebrate the signing of this petition are the white trash sitting over there..." " ...who want to make fools of you." " Oh, very low key." "They're slick." "They throw their money in our faces." "This casino will bring jobs, yes but not for Indians." "They will control our destinies and we will be shut out." "You will have the right to lose your money and drink to the death of your race." "These are your brother's words." "Well, where is he?" "Let him speak." "He will." "He will return and talk to each and every one of you once he heals from the wounds you have inflicted on him." "They beat him with clubs, left him for dead." "Crow Dog and these men who come as your saviors." "They can wash the blood from their hands but not the hatred from their hearts." "This is Two Feathers' prayer stick." "He gave it to me before he went into the mountains to heal and grow strong and return." "Look for yourselves, it is covered with his blood." "Easy there, slugger." "This will just cause more bloodshed, more violence." "Your ancestors cry out for remembrance." "Yeah." "We should wait for Two Feathers." "Don't sign anything until Two Feathers returns." "Just great." "Hey, what--?" "That's it, we're out of here." "No!" "Stop this!" "Excuse me, coming through." "So how'd I do?" "Jimmy Swaggart would've been proud of you." "Let's go." "Soon, my friend I will be ready to receive you." "Soon." "Two Feathers is dead." "We left him broken and bleeding." "You remember when we beat Benny for four hours and left him for dead?" "Two days later, he's out with his old lady eating linguini." "The only way to make sure a man's dead is to put a bullet in his brain." "He is dead." "I feel it." "I know it." "His strength no longer flows against me." "If her brother's not dead if he did manage to crawl into some cave then she can take us to him..." " ...and we can finish the job." " I want no part of this." "Hey, we're out of time, we're out of options." "We take care of this thing tonight." "Maybe you shouldn't have come here." "This is where I belong." "Let it go." "It'll be better." "My father would say that true power seems weak." "To mourn is to feel." "It's all right to cry." "You have a good heart a gentle soul." "It has not always been that way but now your aura struggles to be set free." "A cop's life hampers spiritual enlightenment." "You're good at your job." "You listen and you care." "I was taught that as a child." "By your father?" " Yes." " He taught you well." "No!" " Where is your brother?" " Take us to him." " You know where he is." " Let's get going." "You see?" "It's true." "There is the body of Two Feathers." "Come on, let's go." "Get up there and cut his damn head off." "We'll drag it through the streets if we have to, to make the point." "Don't, for your own sake." "It's too late." "That ought to send his spirit away for-- Maybe for a few days in Vegas." "You don't know what you're doing." "Let go." "Need any help?" "I guess not." "I think that Two Feathers died for nothing." "His death didn't change anything." "Nothing's going to change." "He shared his soul." "With you, with me." "And he knew." "He knew what?" "That you would take his place." "Me?" "To do what?" "What he did." "A bridge between the past and the future." "That's a shaman." "Yes, it is." "I haven't got the strength." "Then you must find it." "And anyway the choice is not yours." "No." "It is theirs." "[ENGLISH]" |
Eamon’s building on the move
The old Eamon’s building is now on its way to its new home somewhere south of Calgary.
The building was loaded onto the back of a truck from its former location on Crowchild Trail and it was moved along 114 Ave. N.W. on Wednesday morning.
The caravan has since stopped at Symons Valley Road where it will stay until 9 a.m. when it will be moved again to its final destination which has yet to be disclosed.
The building needed to be moved to help keep the city’s schedule on LRT construction.
Before the mid 1960s the Trans-Canada highway used to run right out front of Roy Eamon's Restaurant and Gas Station.
At one time there were even bungalows and a camp site and part of a music video for Corey Hart was shot there in 1986.
The site is now leased by a car dealership to store vehicles.
The building is in need of a lot of work and so is the massive Eamon's Camp neon sign.
"So we made accommodation to incorporate the sign as part of our contract and recently the transportation transit committee got approval to relocate the building temporarily off site, so that we can find a future use for it," said Anne Cataford, LRT Projects Manager.
A new LRT station for Tuscany and Rocky Ridge and parking areas will be located north and south of the line and run right through the Eamon's Camp site.
The Calgary Heritage Authority did some research into the unique structure and says it appears to be rarer than first thought.
"It obviously has some land mark value, maybe a bit diminished in the past, it has architectural value, and it has high associated value with Roy Eamon who is a really important early entrepreneur in Calgary," said Darryl Cariou, Senior Heritage Planner.
The city says the building will be held in storage until a decision is made on how to use it. |
Wednesday, June 15, 2016
10 Questions: Vegan Rock Star with Lisa Rimmert
Lisa Rimmert
is like seriously the best! I met Lisa online a few years ago when she asked to
interview me for her fabulous blog and
I walked away wishing that all questions would be like Lisa Rimmert questions.
Since then, Lisa and I have crossed paths in person and she is as fun,
down-to-earth and hilarious as I’d expected she’d be and she is now Director of
Development at Vegan Outreach. I am so glad that Lisa and her wonderful voice
have found a home working for the animals full-time as Director of Development
at Vegan Outreach and I’m pretty stoked to be able to share her thoughts today.
More Lisa Rimmert’s, fewer cranky vegans! I can get behind that movement. I am
happy to feature Lisa today as our Vegan Rock Star.
1.
First of all, we’d love to hear your “vegan evolution” story. How did you start
out? Did you have any early influences or experiences as a young person that in
retrospect helped to pave your path?
I have “loved animals” since I can remember–dogs, cats, animals
I was familiar with. I never thought about food animals until my friend became
vegetarian in college. I made fun of him like a defensive jerk instead of
looking inward at my own cognitive dissonance. A few years later, influenced by
a vegan friend’s blog, I realized the hypocrisy of claiming to love animals
while paying people to hurt and kill them because I liked burgers. I became
vegan three years later after attending an animal welfare conference and being
exposed to many vegans–none of whom had red paint, or hemp skirts and
white-people dreads like I would have expected. Having it normalized like that
made a big difference for me.
2. Imagine that you are pre-vegan again: how could someone have talked to you
and what could they have said or shown you that could have been the most
effective way to have a positive influence on you moving toward veganism?
I think I would have become vegan much sooner if I had known
other vegans. I encourage vegans to go out into the world, connect with non-vegans,
and lead by example. Show them how easy, accessible, and normal it is. If you
have to eat Taco Bell
and vegan milkshakes and buffalo seitan wraps all the time, so be it. It’s a hard
job but someone has to do it. ;)
3.
What have you found to be the most effective way to communicate your message as
a vegan? For example, humor, passion, images, etc.?
A mix of humor and vulnerability. I like to tell people how I
thought before I went vegan, and why that changed. I wasn’t always vegan, but
people are often surprised to hear or realize that I was once in their shoes.
Regarding humor, it’s a very natural way for me to express
myself. By nature I find the humor in most things, so I enjoy using that in my
advocacy. I run a snarky/funny blog called Weird! Why Aren’t You Vegan?, and I bring up veganism and animal
rights in my comedy. It disarms people and opens them up to new thinking.
4. What do you think are the biggest strengths of the vegan movement?
We are so motivated! Our compassion drives us. Even though
we’re still small in numbers we’re loud and powerful and influential. Go us!
5.
What do you think are our biggest hindrances to getting the word out
effectively?
Letting anger and righteousness drive our tactics. Yes,
we’re angry, and yes, we’re right. But we should find appropriate outlets for
those feelings (punch a pillow, perhaps?), and then go out into the world and be
nice.
6.
All of us need a “why vegan” elevator pitch. We’d love to hear yours.
None of us like seeing or knowing that animals suffer, and
yet a lot of us fund that very suffering. We don’t have to kill animals
in order to live healthy, fulfilled, satisfying lives, so why would we? We can
vote with our wallets for a kinder world.
7.
Who are the people and what are the books, films, websites and organizations
that have had the greatest influence on your veganism and your continuing
evolution?
When I first became vegan, I was really disheartened by the reactions
I received: people trivializing my feelings, being preemptively argumentative
or defensive, and trying to poke holes in what I believe. The book Living Among Meat Eaters
by Carol Adams helped so much. Now that I’ve been vegan for a while, I consider
intersectional justice advocates my teachers and role models. They teach me
that being vegan is not the be-all, end-all of compassion. There is more to do,
and it’s important to keep learning and growing.
8.
Burn-out is so common among vegans: what do you do to unwind, recharge and
inspire yourself?
I’m lucky in that my job is a constant source of
inspiration. As Director of Development for Vegan Outreach,
I get to work every day with amazing people–from Outreach Coordinators who lug
boxes of leaflets around and hand them out by the thousands each day, to donors
who give their hard-earned money to make that work possible. When I get really
ragey, I take my dog to the park and enjoy watching her have the time of her
life.
9. What is the issue nearest and dearest to your heart that
you would like others to know more about?
There are so many, but as I type this I’m particularly fired
up about captivity and sexism. Mostly unrelated but I’m sure there are
connections (forced breeding, hi!). I recently went whale watching in the Puget
Sound. In Blackfish,
that’s where over 90 Orcas were shown being herded into a net in 1970, to be
sold to marine parks like SeaWorld. I had seen Blackfish previously but that trip inspired me to watch it again
and learn more. Based on the makeup of their brains, scientists hypothesize
that whales are incredibly sensitive, highly emotional, have speech and even
dialects, and have amazing memories. Messing with their family systems,
separating them, and confining them are crueler than we can even imagine. Let’s
quit that. Read more here–it’s
super interesting (and infuriating, so good luck).
Regarding sexism, I’ll just say that it pervades every part
of our society, it’s often unconscious and invisible, and we need to knock it off.
J
10. Please finish this sentence: “To me, being vegan is...”
Realizing that there is no
neutral, that everything we do has an impact–and striving to make it a positive
one.
3 comments:
Really enjoyed reading this interview and thanks for the links. Thank you to both of you for your time in doing this interview and sharing your experience in vegan advocacy and good interview questions.Fiona
Avoid surprises — interviews need preparation. Some questions come up time and time again — usually about you, your experience and the job itself. We've gathered together the most common questions so you can get your preparation off to a flying start.
You also find all interview questions at link at the end of this post. |
Q:
What changes need to be made to MVC 3 application to send e-mails?
Right now I have my MVC 3 application sending emails - but just to the C drive.
What changes need to be made in order to have the emails going to the actual addresses in the application?
Is it just a change to the Web.Config file mailSettings, which looks like this at present,
<mailSettings>
<smtp deliveryMethod="SpecifiedPickupDirectory" from="some-email@gmail.com">
<specifiedPickupDirectory pickupDirectoryLocation="C:\emailtemp\" />
<network host="localHost" />
</smtp>
</mailSettings>
Keep in mind this is a local copy, so I was hoping to make this change before deploying in order to test. After doing some looking around, I did see several articles mentioning a SMTP Server, I'm assuming this is only needed when going live?
A:
Remove the <specifiedPickupDirectory> and modify your network node to point to your SMTP server:
<network host="smtp.example.com" userName="username" password="password" />
|
-27*s = -35*s + 96. Let h = s - -242. Let m = h + -131. What is the units digit of m?
3
Let s(b) be the third derivative of -b**5/60 + 77*b**4/24 - 17*b**3/2 + 6*b**2 + 9. What is the hundreds digit of s(33)?
4
Suppose 4*m - 105 = 3*b - 1079, -4*b + 4*m = -1304. What is the tens digit of (b + -1)*15/(840/16)?
9
Let k(w) = -20*w + 701. What is the tens digit of k(10)?
0
Let v be 116364/27 + 60/270. Suppose -2*k - 3*s + 2150 = 0, -11*k - s + v = -7*k. What is the units digit of k?
8
Let q = -33 + 8. Let w = q - -27. Suppose 0*v - 2*b - 94 = -3*v, -w*b = 5*v - 146. What is the tens digit of v?
3
Let a be -2 - 0 - -419 - -2. Suppose 5*s = 231 + a. What is the units digit of s?
0
Let r(v) = 2*v**2 - v + 34. Let h be r(0). Let p(y) = -2*y**3 + 66*y**2 + 74*y + 14. What is the units digit of p(h)?
8
Let p(b) = -b**3 - 2*b**2 - 3*b - 9. Let k be p(-4). Let y be 10/k - 52/(-14). Suppose -251 = -3*v + y*n, -v + 5*v - 320 = -2*n. What is the units digit of v?
1
Suppose 2 = -m + 77. Suppose -s = -3*b - 185, 3*s = b - 0*b + m. What is the units digit of 6/45 + (-2272)/b?
8
Suppose -1218 = 2*p - 16*p. Let i = -83 + p. Suppose i*l = 7*l - 492. What is the tens digit of l?
6
Suppose 3*a - 5156 - 8668 = -3*q, 4*a = 4*q + 18392. What is the tens digit of a?
0
Let k(b) = 6 - 38*b + 4 + b**3 + 22*b. What is the tens digit of k(4)?
1
What is the thousands digit of 137/1*82/(-82)*-327?
4
Suppose 163*y - 320*y + 177*y = 355440. What is the units digit of y?
2
Let f(c) = c**3 - 13*c**2 + 17*c - 63. Let b be f(11). What is the tens digit of 7 - (b - (3 - 0))?
2
Let u be (-43)/(1 + -3 + (2 - 1)). Suppose u*k = 49*k - 984. What is the units digit of k?
4
Let k = 329 + 138. Let t = k + -279. What is the tens digit of t?
8
Let t = -592 - -1531. Suppose p + p + 6 = 0, -3*h = 4*p - t. What is the units digit of h?
7
Let s(u) = 295*u + 1982. What is the ten thousands digit of s(29)?
1
Suppose -5*z = -208 - 122. Let r be z/14 - (200/35 - 6). Suppose -4*t - 2*o = t - 1365, 0 = r*t - 2*o - 1345. What is the units digit of t?
1
Let u be ((-8)/(120/(-95)))/(2/102). Let f be (1 + (-5)/3)/(4/(-102)). Suppose u = 10*z - f. What is the units digit of z?
4
Suppose 11*g - 63072 = 142650. What is the units digit of g?
2
Suppose 0 = -135*y - 4803984 + 14369814. What is the tens digit of y?
5
Let d = 14732 - 9101. What is the tens digit of d?
3
Let r be 27/(-9) + (-1382)/(-2). Let j = r + -387. What is the tens digit of j?
0
Let y be 45/(-6)*((-144)/27 + 2). What is the hundreds digit of (4/(-20))/(5/y) + 540?
5
Let t(b) = -b**2 + 3*b + 1. Let i be t(2). Let y(z) = -z - 2. Let n be y(-8). Suppose -n*j = -i*j - 144. What is the units digit of j?
8
Let u be (-2 - -6) + 6/3. Suppose -3*y + x = u*x - 427, -685 = -5*y - 3*x. What is the hundreds digit of y?
1
Let t(o) = o**3 + 11*o**2 + 29*o + 13. Let r be t(-7). Suppose 198 = r*h - 606. What is the units digit of h?
4
Suppose -2*r = -5*p + 2060, r + 2*r - 2060 = -5*p. Let d = p + -229. What is the units digit of d - (2 - (-5 - -3))?
9
Let r(o) = 6888*o**3 - 8*o**2 - 4*o + 3. What is the hundreds digit of r(1)?
8
Suppose 788574 + 349009 = 29*m. What is the units digit of m?
7
Let o(f) = -f**3 - 2*f**2 + 29. Let v be o(0). Suppose -v*m + 33*m - 2236 = 0. What is the hundreds digit of m?
5
Suppose -243*u - 3355 = -238*u. Let x = 15 - u. What is the hundreds digit of x?
6
Let a(p) be the second derivative of 29*p**3/3 - 123*p**2/2 + 36*p. What is the hundreds digit of a(10)?
4
Suppose 66*n - 159006 = 333486. What is the units digit of n?
2
Let h be ((-15)/210*-14)/(1 + -2). Let w(v) = 1396*v**2 - 18*v + 1. What is the units digit of w(h)?
5
Let a(u) = 103*u**3 - u**2 - 14*u + 132. What is the hundreds digit of a(5)?
9
Let j(q) = 5*q - 11. Let w be j(8). Let h = 56 - w. Suppose -h*c = -29*c + 4. What is the units digit of c?
2
Suppose 0 = m - 5 + 6, -5*p - 4*m - 64 = 0. Let v(k) = 7*k**2 + 19*k + 21. What is the tens digit of v(p)?
0
Let f(w) = 43*w**2 - 476*w - 17. What is the hundreds digit of f(-13)?
4
Let w(j) = 453*j**2 + 71*j + 757. What is the tens digit of w(-9)?
1
Let v(q) = -207*q**2 - 12*q + 12. Let y be v(1). Let u = -179 - y. What is the units digit of u?
8
Let f be 4/18 - 129/(-27). Suppose 2*r = 2*n - 142, -3*r + 348 = f*n - 7. What is the tens digit of n?
7
Let w be (2358/(-5))/(-3)*145. Suppose w = 30*m + 6234. What is the hundreds digit of m?
5
Let n(w) = w - 2 - 2*w**3 - 31*w**2 + 5 + w + 24*w**2. Let p be n(-8). Suppose -4*v + 4*g + 41 = -407, 5*v - 4*g = p. What is the tens digit of v?
1
Suppose 8*k + 33292 = 9*k + j, 8*j - 66626 = -2*k. What is the ten thousands digit of k?
3
Suppose 5*v = -d + 7, -3*v - 2*d - 5 + 12 = 0. What is the tens digit of (v/(-2))/((-26)/4524)?
8
Suppose -2*a - 2*f + 104 = 2*a, -3*f + 36 = a. Suppose -5*h - 4*c + 3 = 9, 4*c + a = 4*h. Suppose -4*k + 96 = h*k. What is the units digit of k?
6
Let t(k) = -k**3 - 15*k**2 + 2*k - 9. Let d be t(-15). Let m = d - -61. What is the tens digit of m?
2
Let a(i) = i**3 + 18*i**2 - 3*i + 5. Let k be a(-18). Let w = k - -25. What is the units digit of w?
4
Let c be 56/44 - 33/121. Let t(x) = 8*x**2 - 2*x - 1. Let d be t(-1). What is the tens digit of 15/10*(867/d + c)?
4
What is the thousands digit of (8/(-60) - (-79978)/(-15))*-2?
0
Let k(y) = y**3 + 67*y**2 - 31*y - 13. What is the ten thousands digit of k(-33)?
3
Let v = -22 - -24. Suppose 2*t = -3*l + 273, -2*t = 3*l + v*l - 451. Suppose 0 = -6*h - l + 569. What is the units digit of h?
0
Let y(r) be the third derivative of 713*r**4/24 - 7*r**3/2 - r**2 - 117*r. What is the units digit of y(1)?
2
Let k = -11822 - -20208. What is the hundreds digit of k?
3
Let g be ((-3)/(-9))/(19/51756). Let v = g + 60. What is the tens digit of v?
6
Let s(d) be the second derivative of 15*d + 0 - 1/3*d**3 + 3/2*d**2. What is the units digit of s(-1)?
5
Let k(m) = 8*m - 22. Let r be k(3). Suppose -r*q = 0, 3*i - q = -0*q + 522. Suppose i = 2*o - 74. What is the units digit of o?
4
Suppose 41*k + 30 = 47*k. Let j(p) = 2*p**3 + 3*p**2 + 2*p - 15. What is the tens digit of j(k)?
2
Suppose -40*d + 6800 = -38*d - 2*y, 0 = d + 5*y - 3406. What is the thousands digit of d?
3
Let c = 28 + 616. Let m(y) = -3*y - 81. Let s be m(-26). What is the tens digit of (s/2)/((-7)/c)?
3
Let d be (-2 - 6) + (2 - -2). Let x(o) be the third derivative of -37*o**4/24 + o**3/6 - 14*o**2. What is the hundreds digit of x(d)?
1
Suppose 12*a = 469 + 3647. Suppose -3*g - 15 = 0, o - 16 = -g + 61. Suppose -4*h = -x - a, -2*h = -h + x - o. What is the tens digit of h?
8
Suppose 2*d - v = -590, 2*d - v - 3*v + 590 = 0. Let y = 428 + d. What is the hundreds digit of y?
1
Suppose -652*v + 21372703 = 6914772 - 6606233. What is the hundreds digit of v?
3
Let l be -12 + 8 + -4 - -3. Let n(k) = 3*k**2 + 13*k + 1. Let c be n(l). Suppose 8*r = c*r - 87. What is the units digit of r?
9
Let p(l) = 62*l + 1. Let o be p(1). Suppose -69*a + 55*a - 588 = 0. What is the units digit of ((-84)/o)/(8/a)?
7
Let f(s) = -s**3 - 3*s**2 + 72. Let k = -52 - -53. Let p be -1 + 6 + -7 + k + 1. What is the units digit of f(p)?
2
Suppose -46131*u - 310615 = -46154*u. What is the units digit of u?
5
Let j(b) = 36*b**3 + 28*b**2 - 97*b + 1277. What is the units digit of j(13)?
0
Suppose -10*c - 72723 = -31*c. What is the units digit of c?
3
Suppose 4*a + 5*q = 38158, -2*a + 1137 = 3*q - 17945. What is the units digit of a?
2
Suppose -2*c + 4*c = 8. Suppose -4*s + 3*s + 173 = 3*h, -5*h - 5*s = -295. Suppose -5*d + 137 = 2*u, -c*d = 3*u - h - 152. What is the units digit of u?
1
Let w(h) = -h + 20. Let r be w(15). Suppose r*s + 212 + 198 = 0. What is the tens digit of 16/(-40) - s/5?
1
What is the units digit of (-94411)/(-11) + 2/11?
3
Let t = 20907 + -8732. What is the thousands digit of t?
2
What is the hundreds digit of -2 + 44/28 - 904852/(-91)?
9
Suppose 2*d + 6 = 5*d. Suppose k = -d, 0*y - 2*k = 5*y - 2491. What is the tens digit of y?
9
Let f(q) = 248*q + 233. What is the tens digit of f(29)?
2
Let p(a) = -46*a + 13139. What is the hundreds digit of p(0)?
1
Let w(q) = 89*q**2 - 74*q + 3340. What is the units digit of w(25)?
5
Let d = -21644 - -31595. What is the units digit of d?
1
Suppose 0*n - 17*n + 90015 = 0. Suppose -3*c = -468 - n. What is the thousands digit of c?
1
Let |
Q:
Struct memory limit
I have a question about struct in C++. Actually, my code was something like this
struct SegmentTree {
int segmentTree[2500000];
some functions...
}
When I compiled it, it was giving me a segmentation fault immediately, but when I tried to do the same thing with class, everything worked well. So, my question: Is there some limited number of variables that I can use in a struct, or else, what's the problem?
A:
An array declared like this will be allocated on the stack(same as with local variables for functions). The limit of the number of elements in a static array is defined by your stack size(which can be modified using compiler options). Consider using dynamically allocated array(or even better std::vector) to make use of the heap instead.
|
Pietro Tacchi Venturi
Pietro Tacchi Venturi (; 1861—March 18, 1956) was a Jesuit priest and historian who served as the unofficial liaison between Benito Mussolini, the Fascist leader of Italy from 1922 to 1943, and popes Pius XI and Pius XII. He was also one of the architects of the 1929 Lateran Treaty, which ended the "Roman Question" (a dispute over the status of the papacy since the Italian unification), and recognized the sovereignty of Vatican City, which made it an actor of international relations. A claimed attempt to assassinate Venturi with a paper knife (actually the result of a homosexual lover's quarrel), one year before the treaty's completion, made headlines around the world. Venturi had begun the process of reconciliation by convincing Mussolini to donate the valuable library of the Palazzo Chigi to the Vatican.
According to Susan Zuccotti, Venturi "had an uncanny ability to gain access where more official papal diplomats could not" and thus was utilized for some of the most important papal priorities. Venturi had no official rank in the church to match his extraordinary influence, and was known in Vatican circles as the "man in black".
Early life (1861-1922)
Venturi was born in San Severino Marche. He became a member of the Society of Jesus, a religious order within the Catholic Church, in 1878. He established a reputation as a scholar of history and literature. Venturi was admitted into the Pontifical Academy of Archaeology and other scientific bodies. Venturi was the official historian of the Italian branch of the Jesuit order and the Secretary of the Society of Jesus from 1914 to 1921.
His magnum opus was a history of the Jesuits. Another important work by Venturi was the publication of previously unpublished writings of Matteo Ricci, one of the founders of the Jesuit China missions. The Opere storiche del P. Matteo Ricci, S.J (Historical Works of Father Matteo Ricci, S.J.) appeared in two volumes in 1911 and 1913, and included Ricci's letters as well as his Commentarj della Cina (Commentary on China), the Italian manuscript that had been previously published only in the expanded and edited Latin version of Nicolas Trigault (as De Christiana expeditione apud Sinas). However, Venturi's lack of knowledge of Chinese made it necessary for Fr. Pasquale d'Elia to produce another, better annotated edition of Ricci's manuscripts (known as Fonti Ricciane) some 30 years later, in the 1940s.
Pius XI's liaison to Mussolini (1922-1939)
Chigi library donation (1922)
Benito Mussolini "liked and trusted" Venturi, whom he had known since 1922, during the Fascist struggle for power. The friendship between the two predated Mussolini's rise to power. He thus became the "normal instrument for messages between the pope and Mussolini". Venturi's relationship with Mussolini became professional when Pope Pius XI chose him to negotiate the purchase of the ancient library of the Palazzo Chigi (the residence of the prominent Chigi family) from the newly created Fascist regime (the Italian government was on the verge of buying the collection). Venturi persuaded Mussolini to donate an ancient state collection of religious books to the Vatican free of charge. Vatican attempts to buy the texts date back to Pope Benedict XV, who lacked the requisite funds to complete the transaction.
Mussolini's donation became the start of the process of reconciliation between the Italian government and the papacy, which had been at odds since the Papal States were seized during the Italian unification. Along with Count Galeazzo Ciano, Mussolini's son-in-law, Venturi served as the unofficial, yet authoritative "intermediary between Palazzo Venezia and the Vatican". Venturi was also the personal Confessor of Mussolini and an adviser to the Duce on religious matters generally. His political views could generally be classified as a strain of Clerico-Fascism. Venturi was an anti-Semitic conspiracy theorist who believed the Catholic Church was threatened by a "worldwide Jewish-Masonic plutocracy" and advocated putting all Italian Jewish bankers under police surveillance. In September 1926, Venturi gave Mussolini a pamphlet entitled Zionism and Catholicism accusing the Jews of wanting "to destroy current society and dominate the world themselves, as their Talmud proscribes".
Lateran Treaties (1927-1929)
Venturi was a negotiator of the Lateran Treaty (1929), which ended the "Roman Question" (a dispute over the status of the papacy since the Italian unification) and officially recognized the sovereignty of Vatican City, which led the Church State to become an actor in international relations (apart from the Holy See itself, as it had previously been) according to international law. In May 1928, already internationally known for his role as a negotiator, Venturi survived an attempted assassination by "Signor De Angelis" with a paper knife, receiving only a neck laceration when he ducked out the way. Two years later, another priest similar to Venturi in appearance was killed. Venturi claimed to have been the victim of an international conspiracy organized by an anti-Fascist group based in Paris led by Gaetano Salvemini, but the police were highly doubtful of his story. It was established during the police investigation that Ventrui was a homosexual who had "illicit relations" with young men he picked up on the streets of Rome and took back to his apartment for sex, and the murder attempt was just a lover's quarrel.
The New York Times described Venturi as the "chief negotiator, who remains in the dark and is almost unknown". Noting Pius XI and Mussolini's penchant for privacy regarding the negotiations, the Times continued to describe Venturi as "a quiet man who could tell much" yet refused to acknowledge that he was any more than "Mussolini's personal messenger to the Vatican". Nominally, Francesco Pacelli (the brother of Eugenio Pacelli, future Pope Pius XII) became the chief negotiator and Venturi his intermediary with Mussolini during the final stages of the negotiation (after the death of State Councilor Domenico Barone). The other negotiators were Francesco Borgongini Duca, the Vatican's Secretary of Extraordinary Affairs, and Professor Gianinni Barone, the brother of Domenico; however, Venturi himself was the originator of the negotiations.
Venturi received the Order of Saints Maurice and Lazarus from the Italian monarchy in 1932 for his role in negotiating the treaty. Francesco Borgongini Duca, the nuncio to Italy from 1929–1953, supplemented Venturi as the official liaison between Pius XII and Mussolini, but Venturi retained his influence.
Mussolini novel (1929)
At the urging of Venturi, Mussolini wrote a second book – Una Conversione – about his conversion to Catholicism, meant as a sequel to his twenty-year-old novel which was extremely critical of the church: Claudia Particella: l'amante del Cardinale (translated and published in English as The Cardinal's Mistress). Venturi himself wrote the preface to Una Conversione.
Catholic Action (1931)
In 1931, Venturi negotiated the end to a dispute between Pius XI and Mussolini regarding, Azione Cattolica, the Italian branch of Catholic Action, a lay Catholic community organization group. Venturi was granted an unheard of hour-long audience with the pontiff during his summer vacation, and then an additional meeting with Cardinal Secretary of State Pacelli. The Vatican claimed that Venturi was merely "preparing the ground for official negotiation". Don Luigi Sturzo, the founder of the Partito Popolare Italiano, a Catholic political party in Italy, credits Venturi with ending the dispute.
Mussolini allowed the 15,000 youth organizations to reopen, but they were required to affiliate closely with the official Fascist youth organization, Opera Nazionale Balilla. The terms of the agreement were meant to give the Vatican a role in "Fascist Youth Education" and required that the Catholic organization be devolved to the diocesan level, with no centralized hierarchy, and that chaplains be attached to the Balilla chapters. Venturi himself sat in on the final meeting between Mussolini and the pope.
Drafting of the Anti-Jewish laws (1938)
Venturi was kept informed by Mussolini during the drafting of Italy's anti-Jewish laws (which deprived Jews of various civil, political, and economic rights), expressing concerns about the effect of the laws on Catholics, both through mixed marriages and Catholic converts from Judaism. Specifically, Venturi sought the lifting of the ban on marriages between "Aryans" and "non-Aryans".
Role under Pius XII (1939-1956)
Upon the election of Pius XII by the papal conclave, 1939, it was announced that Dom Francesco Tomasetti (d. May 5, 1953), the procurator general of the Salesian Order, would replace Venturi as the unofficial messenger between the pope and Mussolini after "a struggle of another kind, less open but having many of the same elements as that over the choice of Secretary of State". Venturi remained the official representative to various Italian government agencies such as the heads of police and general board of demographics and race.
On the eve of World War II, Cardinal Luigi Maglione, the Vatican Secretary of State, used Venturi as his emissary with Mussolini. Venturi persuaded Mussolini to give his approval to Pius XII's plan to mediate between the Five Powers (the Axis powers of Germany and Italy and the Allies of the United Kingdom, France, and Poland). Through Venturi, who continued to be "very important" to Pius XII because of his weight with Mussolini, Pius XII communicated to the Italian government his disapproval of the French and British attempts to negotiate an alliance with Soviet Russia, the so-called "peace front". The Vatican did not have diplomatic relations with the Soviet Union. Pius XII also sent Venturi to Brussels for mediation negotiations with regard to the Danzig crisis in the summer of 1939 in an attempt to avert World War II. Venturi was a key player in the negotiations, though they accomplished nothing.
The plan that Mussolini presented to Venturi to end the Danzig crisis called for Poland to allow the Free City of Danzig to rejoin Germany in exchange for negotiations with Germany about allowing the Poles to use Danzig without customs duties. The plan also called for German-Polish negotiations on the returning the Polish Corridor to Germany and on the status of the German minority in Poland and Polish minority in Germany. Despite the opposition of Cardinal Domenico Tardini who complained the peace plan favored Germany at the expense of Poland, Venturi persuaded both Cardinal Maglione and Pius to accept it as the last, best chance to stop another world war. On 31 August 1939, Monsignor Filippo Cortesi, the Papal Nuncio in Warsaw, presented Mussolini's peace plan to Jan Szembek, appealing to him as a Catholic to accept this solution to the Danzig crisis that had been endorsed by the Pope, but the Polish government rejected it under the grounds that this plan lopsidedly favored Germany.
The Ustashe regime
On a few occasions, Venturi used this influence to spare Catholic converts from Judaism from the Holocaust. The fascistic Ustashe regime that ruled Croatia between 1941-45 had a policy of exterminating some of the Serb, Jewish and Romany minorities while forcing others to convert to Catholicism. Michael Phayer documents one such occasion where Venturi intervened on behalf of Croatian converts. Venturi is otherwise little mentioned in Phayer's book, referred to simply as a "Jesuit rescuer".
Opposition to repeal of Anti-Jewish laws (1943)
In August 1943, when Marshall Pietro Badoglio, Mussolini's successor, was contemplating a complete rescission of Italy's anti-Jewish laws, Venturi met with the Secretary of the Interior and requested that only the portions affecting Jewish converts to Catholicism be repealed. In doing so, Venturi was advancing the position of Pius XII, as he later reported to Cardinal Secretary of State Luigi Maglione. Venturi assured Maglione:
I took care not to call for the total abrogation of a law which, according to the principles and traditions of the Catholic Church, certainly has some clauses that should be abolished, but which clearly contains others that have merit and should be confirmed.
The Roman razzia (1943)
After the Roman razzia (the deportation of Roman Jews to death camps as part of The Holocaust), Venturi recommended to the Vatican Secretariat a "symbolic and therefore sham inquiry into the fate of the Jews of Rome". He reasoned, "a step like this by the Holy See, even if it does not obtain the desired effect, will without doubt help increase the veneration and gratitude toward the August Person of the Holy Father".
Death
Nothing else is known of the role of Venturi after the death of Mussolini on April 28, 1945, or for that matter after Mussolini's fall from power. Venturi died "virtually forgotten" on March 18, 1956, at the age of 95.
Notes
References
Blet, Pierre, and Johnson, Lawrence J. 1999. Pius XII and the Second World War: According to the Archives of the Vatican. Paulist Press. .
Chadwick, Owen. 1988. Britain and the Vatican During the Second World War. Cambridge University Press.
Goldhagen, Daniel Jonah. 2002. A Moral Reckoning. Alfred A. Knopf.
Morley, John. 1980. Vatican diplomacy and the Jews during the Holocaust, 1939-1943. New York: KTAV Pub. House. .
Phayer, Michael. 2000. The Catholic Church and the Holocaust, 1930–1965. Indianapolis: Indiana University Press. .
Watt, D.C. How War Came: The Immediate Origins of World War II, London: Heinemann 1989,
Webster, Richard A. 1960. The cross and the fasces: Christian democracy and fascism in Italy.
Zuccotti, Susan. 2000. Under His Very Windows: The Vatican and the Holocaust in Italy. New Haven and London: Yale University Press.
Category:1861 births
Category:1956 deaths
Category:Pope Pius XII and World War II
Category:Pope Pius XII and the Holocaust
Category:Italian Jesuits
Category:Italian historians |
Q:
Get specific Tables with Html Agility Pack
I am having trouble getting some specific table's with HTML Agility Pack. I cannot change the actual HTML either, so I can't use other ID"s or Classes or anything.
Can someone show me how I would access each individual table of the following?
<table class="newTable">
//table 1 contents
<table border="0" cellpadding="3" cellspacing="2" width="100%">
//table 1 - A contents
</table>
</table>
<table border="0" cellpadding="0" cellspacing="0" class="newTable">
//table 2 contents
<table width="100%" border="0" cellspacing="2" cellpadding="0">
//table 2 - A contents
</table>
<table width="100%" border="0" cellspacing="2" cellpadding="0">
//table 2 - B contents
</table>
<table width="100%" cellspacing="2" cellpadding="0">
//table 2 - C contents
</table>
</table>
<table>
//table 3 contents
</table>
Right now if I were to call the following
HtmlNode table = doc.DocumentNode.SelectSingleNode("//table");
foreach (var cell in table.SelectNodes("//tr/td"))
{
string someVariable = cell.InnerText
}
I would go through everything. I want to be able to access tables differently to correlate where I am storing the data.
I have tried looking at something like
doc.DocumentNode.SelectNodes("//table[1]");
but using an index does not seem to work, when I try to specify a table with it, it still reads in all tables or none.
Same thing applies to this, it either does not work at all or gets everything.
foreach (var cell in table.SelectNodes("//table").Skip(some_number))
{
string someVariable = cell.InnerText
}
I am using the NuGet package of HTML Agility Pack 1.4.9
EDIT:
My attempt to get ONLY Table 1 - A's contents. Both give null or endcodingfound exceptions.
HtmlNode table = doc.DocumentNode.SelectSingleNode("//table/tr/td/table[1]");
HtmlNode table = doc.DocumentNode.SelectSingleNode("//table[1]/tr/td/table[1]");
A:
The error is with your second call, the "//tr/td" will go back to the root element. Your indexer is the correct solution for the first part of your problem, the second can be fixed by specifying that you want to navigate from where you are at:
HtmlNode table = doc.DocumentNode.SelectSingleNode("//table[1]");
foreach (var cell in table.SelectNodes(".//tr/td")) // **notice the .**
{
string someVariable = cell.InnerText
}
Not sure what else is going on, but by extending your test table to this code, the following just works on my test. It might mean that you need to share a little more context.
This is the Document I used for the tests:
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8" />
<title></title>
</head>
<body>
<table class="newTable">
<tr>
<td>
<table border="0" cellpadding="3" cellspacing="2" width="100%">
<tr><td>
//table 1 - A contents
</td></tr>
</table>
</td>
</tr>
</table>
<table border="0" cellpadding="0" cellspacing="0" class="newTable">
<tr>
<td>
//table 2 contents
<table width="100%" border="0" cellspacing="2" cellpadding="0">
<tr>
<td>
//table 2 - A contents
</td>
</tr>
</table>
<table width="100%" border="0" cellspacing="2" cellpadding="0">
<tr>
<td>
//table 2 - B contents
</td>
</tr>
</table>
<table width="100%" cellspacing="2" cellpadding="0">
<tr>
<td>
//table 2 - C contents
</td>
</tr>
</table>
</td>
</tr>
</table>
<table>
<tr>
<td>
//table 3 contents
</td>
</tr>
</table>
</body>
</html>
And this the code to extract the values you're after:
HtmlDocument doc = new HtmlDocument();
doc.LoadHtml(text);
var node1A = doc.DocumentNode.SelectSingleNode("//table[1]//table[1]");
string content1A = node1A.InnerText;
Console.WriteLine(content1A);
var node2C = doc.DocumentNode.SelectSingleNode("//table[2]//table[3]");
string content2C = node2C.InnerText;
Console.WriteLine(content2C);
Shows:
Update
Ok, I took your actual HTML and I get a NullReference as well. There must be something that greatly confuses the Agility Pack, not sure why. Some experimentation with the Linq API seems to work though, I hope it can be an alternative for you:
var table = doc.DocumentNode.DescendantsAndSelf("table").Skip(1).First().Descendants("table").First();
var tds = table.Descendants("td");
|
IM FROM Ginseng Serum | Do you need Ginseng in your skincare for a healthy skin?
I’ve been eyeing on I’m From skincare range for quite sometimes. Then late April got so happy when I was sent the newly launched Ginseng Serum by the brand IM FROM. I was using the Hadalabo Lifting & Firming Serum before that and I badly wanted a change.
This month of May I was living with this Ginseng Serum by IM FROM. And now, after using this for three weeks continuously, I think it’s the time when I can share my Ginseng Serum experience with you guys.
First of all, I love the minimal packaging of this serum. There is nothing fancy but a simple seethrough glass dropper bottle with gorgeous brown serum in it. Minimal packaging and the look of the serum from outside kinda speaks that, “try the best I’ve inside me’!
Ginseng is very well known ingredient in anti-aging skin care around the world. It is slightly more popular in Asian countries, ancient Chinese beauty history says the Ginseng herb, ‘the herb of youth’. This Asian herb is also known to even out and brighten up skin tone.
I did use products that have some sort of ginseng in them before. But I’ve never used a product that has this high concentration of actual pure ginseng extract in it. I’m sure you can already guess how excited I was to try out the serum.
Apart from the holy Asian anti-aging Ginseng herb, this new serum by IM FROM also contains vitamins, minerals, hyaluronic acid, and antioxidants.
Are you wondering if IM FROM Ginseng Serum is appropriate for your skin and age?
I’m in my 30th right now and I’ve got a combination skin type. Honestly, I was slightly nervous at the beginning about this Ginseng thingy. The serum looks completely like honey from outside of the bottle. It gave me a feeling that it might be sticky. Thank goodness that it didn’t turn out that way.
The serum has a nice consistency, not thick at all but a bit more than the line where I would call it thin. It smells something very soft and sweet and somewhat herby. I’m not sure how should I describe the scent but it’s there but goes away when applied.
If you don’t like fragrance in your skincare then you might not like it. In my case, I like things with a nice scent. Of course, I wouldn’t tolerate a scent in my skincare which is strong like a perfume!
How I use Ginseng Serum by IM FROM?
I must mention, along with my combination skin type, the weather is always very hot here in Kuala Lumpur. I added the IM FROM Ginseng serum in my morning and basically daytime skincare routine.
The serum applies with an ease but it feels a tad sticky (but not overly greasy and at a tolerable level) on the skin. After a few uses, I reduced the amount to see if I was using too much that was causing stickiness. That turned out to be the wrong thing I was doing!
In the beginning, I was using a full dropper when it gave me sticky feeling. Then I started taking only 1/3 amount of the dropper and pat-apply it on my face. It felt better and non-sticky. I could easily reach for my moisturizer next.
It’s good that IM FROM Ginseng Serum isn’t any serum that would sting. For some unknown reason, I had this feeling before using it thinking about the C 21.5 Vitamin C serum. I am really pleased finding the Ginseng Serum as a very hydrating and moisturizing one. The serum makes the skin bouncy and soft almost instantly (I assume it’s because of the silicon derivate, Cyclopentasiloxane).
After three weeks of use, I’m noticing that the serum is performing very well maintaining my skin health. There is no lack of hydration, haven’t had any acne, bumps, rashes, or such either. Additionally, my makeup applies very nicely on top of this IM FROM Serum 😜 I like this serum!
However, about the anti-aging and wrinkle care benefits, I didn’t see any visible difference yet when I’m almost half of the bottle. I suppose that will take time.
Do I recommend I’m From Ginseng Serum?
– I do. It’s a good serum.
From my experience, I believe the serum will be suitable for all skin type if the weather is cold. On the other hand, it might not be suitable for overly oily skin and humid weather.
Have you tried IM FROM Ginseng Serum? Or anything else with Ginseng you love and recommend? Do share with me in the comments below! I’m truly keen on trying more products with Ginseng.
Shopping Info:
I’m From Ginseng Serum Serum | $25.92 for 30ml [on sale right now]
Shop from Wishtrend Website directly. They always have a lot of attractive promotion going on and they offer international shipping with std and fast option.
Free worldwide shipping on orders $69 or above and most of the time Wishtrend offers Free Shipping on many exclusive products.
BONUS: You can receive a 5$ coupon instantly if you use my code ‘146262906’ upon signing up. Key in the Code when asked for ‘SPONSORSHIP PROGRAM’ code on the registration form. |
Statement on Academic Freedom
The San Mateo County Community College District is dedicated to maintaining a climate
of academic freedom encouraging the sharing and cultivation of a wide variety of viewpoints.
Academic freedom expresses our belief in inquiry, informed debate and the search for
truth; academic freedom is necessary in order to provide students with a variety of
ideas, to encourage them to engage in critical thinking and to help them understand
conflicting opinions.
Academic freedom encompasses the freedom to study, teach, and express ideas, including
unpopular or controversial ones, without censorship or political restraint. Academic
freedom, rather than being a license to do or say whatever one wishes, requires professional
competence, open inquiry and rigorous attention to the pursuit of truth.
The District’s faculty have the right to express their informed opinions which relate,
directly or indirectly, to their professional activities, whether these opinions are
expressed in the classroom, elsewhere on campus or at college-related functions. In
a search for truth and in a context of reasoned academic debate, students also have
the right to express their opinions and to question those presented by others.
Employment by the District does not in any way restrict or limit the First Amendment
rights enjoyed by faculty as members of their communities. Faculty members are free
to speak and write publicly on any issue, as long as they do not indicate they are
speaking for the institution.
Protecting academic freedom is the responsibility of the college community. Therefore,
in a climate of openness and mutual respect, free from distortion and doctrinal obligation,
the District protects and encourages the exchange of ideas, including unpopular ones,
which are presented in a spirit of free and open dialogue and constructive debate. |
no frills reviews and more
Final Destination 5: Horror at its Goriest
When I first found out that Hollywood was making Final Destination 5, I wasn’t very excited. I was very unimpressed with Part 4 and I felt that this was just going to be another attempt to ride the 3D bandwagon. However, after watching part 5, I did a complete 360 because I have not had this much fun from seeing horror in while. FD 5 was the bomb!
Final Destination 5 follows the same plot as the four movies before it. Instead of a ____ (fill in the blank with plane crash, road accident, roller coaster derailment, or Nascar accident), a group of eight survivors from a suspension bridge collapse now have to deal with the repercussions of their ” good luck.” Nicolas D’Agosto plays the role of Sam, a guy who works for the paper but who really wants to be a chef. He is the guy who saves his co-workers (including his girlfriend) and gets them off the bus after he has a premonition of their death similar to the earlier installments.
Filmmakers seemed to have upped their game since the lame FD4, which focused on developing the 3D and making a quick buck rather than giving audiences something. Ten minutes into FD5, audiences would feel like they have survived a marathon because of the sheer goriness and brutality of the suspension bridge scene. Never have I seen any hatchet movie or horror flick that shows the same lack of mercy and thrill value as the first 10 minutes of this film. I am not a squeamish person by nature, but I was cringing and screaming with every death scene in this movie. It was that good. It was that interesting and it was that unique. It was that fun. I know a lot of people would be skeptical and say, what haven’t we seen at this point, right? But believe me, this movie will school viewers on what still needs to be learned about the horror genre.
What elevates this movie above the rest is that it was not a chore to watch. It doesn’t try to live up to the hype or its predecessors. It develops its own story and proceeds the way it is supposed to. Viewers don’t need to figure out a great mystery to get their just rewards in the end. The movie follows a basic structure and goes through it in a fast paced sequence but gives the audiences a chance to rest up and absorb the brutality of one death scene before the next one follows.
What’s great about this movie is that everybody knows that the deaths are a given but the scenes will keep audiences guessing until the very end. Before I entered the cinema, I was saying that they would be hard pressed to top the scene in part 2 where the kid got flattened on the street by a glass panel after escaping a near death experience at the dentist but again, I was proven wrong. Credit to the creative team of Final Destination 5. They managed to raise the level of horror to new heights. These guys have thought of a great many ways to get rid of their characters in grisly fashion.
But no matter how I gush about the death scenes, my favorite part is still the connection of the movie to the first Final Destination film. I really didn’t figure it out until it was staring me in the face. There were clues scattered all over the movie leading to it, little ones admittedly, but they were there. I guess the film succeeded to distract me enough from thinking, making the surprise ending doubly awesome.
Final verdict. Not for the faint hearted but great for everyone else. Regardless if you watch it on 3D or 2D, its guaranteed to be awesome! It is not to be missed. This may well be the best in the franchise, and among the best in the genre that I’ve seen. Very very cool. |
A combination of caffeine and cannabis, often coffee and a joint. Though it has been referred to in the contexts of: drinking coffee and vaporizing, drinking yerba mate and smoking or eating a coffee based edible. |
Saturday, March 10, 2012
The sea is dangerous and its storms terrible, but these obstacles have never been sufficient reason to remain ashore...unlike the mediocre, intrepid spirits seek victory over those things that seem impossible...it is with an iron will that they embark on the most daring of all endeavors...to meet the shadowy future without fear and conquer the unknown. ~Ferdinand Magellan
FlashbackShock and numbness has found its way to you as a consequence of these deaths which have occurred within the school community. At the same time a hyper-awareness and heightened sensitivity is also present. The impact of the deaths, the media scrutiny, and high degree of need by the student body/community is overwhelming.
Words to live by to the Rookie Counselor Me:Death and Dying. There is no preparation for this. Not really. You'll read plenty of books on the subject. You will go to workshops about critical incident stress management and attend conferences about suicide and the like.
People are going to die. You will genuinely try to support the people they leave behind. Mostly you need to be there for them. Listen. Let their voices be heard. It is important that they feel as if you truly hear their story of grief.
I think you will know what to do by the feel and instinct of the circumstances. You will need to measure the moment, for this is a sensitive subject. Every person, every family has their own beliefs on how it should be dealt with and what customs to follow. Some do so very privately. Others quite publicly. Some want support. Others insulate themselves from it. There is no one way. No correct way. Just the personal way; the way that finds you and nestles close to your heart.
All this leads to what this post is really meant to convey--Self Care. Caring for Yourself is all about You. And, if you think about it, that is about the last thing a Counselor does day-in and day-out while in the school house. Self-care is easier to do then you may think and yet harder to realize when you need to do it.
So, if you are reading this I need your assistance. I would like you to help all our Future Selves. I have created a google document where you may list what works for you. Consider sharing your passions, that which gives you joy, activities which recharge you or puts you in the Flow (Mihaly Csikszentmihaly/Flow). Anything that helps you care for yourself.
Here is the Google Document: Self-Care for Your Future Self. Thanks for your support and contribution. I am curious to learn what self-care looks like for you. |
P14arf
p14ARF (also called ARF tumor suppressor, ARF, p14ARF) is an alternate reading frame protein product of the CDKN2A locus (i.e. INK4a/ARF locus). p14ARF is induced in response to elevated mitogenic stimulation, such as aberrant growth signaling from MYC and Ras (protein). It accumulates mainly in the nucleolus where it forms stable complexes with NPM or Mdm2. These interactions allow p14ARF to act as a tumor suppressor by inhibiting ribosome biogenesis or initiating p53-dependent cell cycle arrest and apoptosis, respectively. p14ARF is an atypical protein, in terms of its transcription, its amino acid composition, and its degradation: it is transcribed in an alternate reading frame of a different protein, it is highly basic, and it is polyubiquinated at the N-terminus.
Both p16INK4a and p14ARF are involved in cell cycle regulation. p14ARF inhibits mdm2, thus promoting p53, which promotes p21 activation, which then binds and inactivates certain cyclin-CDK complexes, which would otherwise promote transcription of genes that would carry the cell through the G1/S checkpoint of the cell cycle. Loss of p14ARF by a homozygous mutation in the CDKN2A (INK4A) gene will lead to elevated levels in mdm2 and, therefore, loss of p53 function and cell cycle control.
The equivalent in mice is p19ARF.
Background
The p14ARF transcript was first identified in humans in 1995, and its protein product confirmed in mice that same year. Its gene locus is on the short arm of chromosome 9 in humans, and on a corresponding location on chromosome 4 in mice. It is located near the genes for the tandem repeats INK4a and INK4b, which are 16 kDa (p16INK4a) and 15 kDa (p15INK4b) proteins, respectively. These INK4 proteins directly inhibit the cyclin D-dependent kinases CDK4 and CDK6. There are other INK4 genes on other chromosomes, however these are not linked to cancer, and so their functions are not likely to be overlapping. An important cyclin-dependent substrate is the retinoblastoma protein Rb, which is phosphorylated in late gap 1 phase (G1 phase), allowing G1 exit. The Rb protein limits cell proliferation by blocking the activity of E2F transcription factors, which activate the transcription of genes needed for DNA replication. When Rb is phosphorylated by cyclin D and E-dependent kinases during the G1 phase of the cell cycle, Rb can not block E2F-dependent transcription, and the cell can progress to the DNA synthetic phase(S phase). Therefore, INK4a and INK4b serve as tumor suppressors by restricting proliferation though the inhibition of the CDKs responsible for Rb phosphorylation.
In addition to the INK4a protein, the unrelated protein, ARF, is transcribed from an alternate reading frame at the INK4a/ARF locus. INK4a and p14ARF mRNA each consist of three exons. They share exons 2 and 3, but there are two different exon 1 transcripts, α and β. Exon 1β (E1β) is intercalated between the genes for INK4a and INK4b. Although exon 1α (E1α) and E1β are about the same in terms of content and size, the 5’ AUG (start codon) of exon 1β has its own promoter and opens an alternative reading frame in exon 2, hence the name p14ARF (ARF exon 3 is not translated). Because of this, INK4a and p14ARF have unrelated amino acid sequences despite overlapping coding regions, and have distinct functions. This dual use of coding sequences is not commonly seen in mammals, making p14ARF an unusual protein. When the ARF β-transcript was found, it was thought that it probably would not encode a protein. In humans, ARF is translated into the 14kDa, 132 amino acid [[p14ARF]] protein, and in mice, it is translated into the 19kDa, 169 amino acid p19Arf. The E1β protein segment of mouse and human ARF are 45% identical, with an overall ARF identity of 50%, compared to a 72% identity between mouse and human INK4a E1α segment, and a 65% overall identity.
Although the INK4a and ARF proteins are structurally and functionally different, they are both involved in cell cycle progression. Together, their broad inhibitory role may help counter oncogenic signals. As mentioned above, INK4a inhibits proliferation by indirectly allowing Rb to remain associated with E2F transcription factors. ARF is involved in p53 activation by inhibiting Mdm2 (HDM2 in humans). Mdm2 binds to p53, inhibiting its transcriptional activity. Mdm2 also has E3 ubiquitin ligase activity toward p53, and promotes its exportation from the cell nucleus to the cytoplasm for degradation. By antagonizing Mdm2, ARF permits the transcriptional activity of p53 that would lead to cell cycle arrest or apoptosis. A loss of ARF or p53, therefore, would give cells a survival advantage.
The function of ARF has primarily been attributed to its Mdm2/p53 mechanism. ARF does, however, also inhibit proliferation in cells lacking p53 or p53 and Mdm2. In 2004 has been found that one of ARF’s p53-independent functions involves its binding to nucleophosmin/B23 (NPM). NPM is an acidic ribosomal chaperone (protein) involved in preribosomal processing and nuclear exportation independent of p53, and oligomerizes with itself and p14ARF. Nearly half of p14ARF is found in NPM-containing complexes with high molecular mass (2 to 5 MDa). Enforced expression of ARF retards early 47S/45S rRNA precursor processing and inhibits 32S rRNA cleavage. This suggests that p14ARF can bind to NPM, inhibiting rRNA processing. ARF-null cells have increased nucleolar area, increased ribosome biogenesis, and a corresponding increase in protein synthesis. The larger size resulting from more ribosomes and protein is not associated with increased proliferation, however, and this ARF-null phenotype occurs even though the normal basal levels of Arf are usually low. Knocking down ARF with siRNA to exon 1β results in increased rRNA transcripts, rRNA processing, and ribosome nuclear export. The unrestrained ribosome biogenesis seen when NPM is not bound to ARF does not occur if NPM is also absent. Although the induction of ARF in response to oncogenic signals is considered to be of primary importance, the low levels of ARF seen in interphase cells also has a considerable effect in terms of keeping cell growth in check. Therefore, the function of basal level ARF in the NPM/ARF complex appears to be to monitor steady-state ribosome biogenesis and growth independently of preventing proliferation.
Role in Disease
Very commonly, cancer is associated with a loss of function of INK4a, ARF, Rb, or p53. Without INK4a, Cdk4/6 can inappropriately phosphorylate Rb, leading to increased E2F-dependent transcription. Without ARF, Mdm2 can inappropriately inhibit p53, leading to increased cell survival.
The INK4a/ARF locus is found to be deleted or silenced in many kinds of tumors. For example, of the 100 primary breast carcinomas, approximately 41% have p14ARF defects. In a separate study, 32% of colorectal adenomas (non-cancerous tumors) were found to have p14ARF inactivation due to hypermethylation of the promoter. Mouse models lacking p19Arf, p53, and Mdm2 are more prone to tumor development than mice without Mdm2 and p53, alone. This suggests that p19Arf has Mdm2- and p53-independent effects, as well. Investigating this idea lead to the recent discovery of smARF.
Homozygous deletions and other mutations of CDK2NA (ARF) have been found to be associated with glioblastoma.
smARF
Until recently, the two known effects of ARF were growth inhibition by NPM interactions and apoptosis induction by Mdm2 interactions. The function of ARF involving p53-independent death, has now been attributed to the small mitochondrial isoform of ARF, smARF. While full-length ARF inhibits cell growth by cell cycle arrest or type I apoptotic death, smARF kills cells by type II autophagic death. Like ARF, the expression of smARF increases when there are aberrant proliferation signals. When smARF is overexpressed, it localizes to the mitochondrial matrix, damaging the mitochondria membrane potential and structure, and leading to autophagic cell death.
The translation of the truncated ARF, smARF, is initiated at an internal methionine (M45) of the ARF transcript in human and mouse cells. SmARF is also detected in rat, even though an internal methionine is not present in the rat transcript. This suggests that there is an alternate mechanism to form smARF, underscoring the importance of this isoform. The role of smARF is distinct from that of ARF, as it lacks the nuclear localization signal (NLS) and cannot bind to Mdm2 or NPM. In some cell types, however, full-length ARF can also localize to the mitochondria and induce type II cell death, suggesting that in addition to autophagy being a starvation or other environmental response, it may also be involved in responding to oncogene activation.
Biochemistry
ARF expression is regulated by oncogenic signaling. Aberrant mitogenic stimulation, such as by MYC or Ras (protein), will increase its expression, as will an amplification of mutated p53 or Mdm2, or p53 loss. ARF can also be induced by enforced E2F expression. Although E2F expression is increased during the cell cycle, ARF expression probably is not because the activation of a second, unknown transcription factor might be needed to prevent an ARF response to transient E2F increases. ARF is negatively regulated by Rb-E2F complexes and by amplified p53 activation. Aberrant growth signals also increase smARF expression.
ARF is a highly basic (pI>12) and hydrophobic protein. Its basic nature is attributed to its arginine content; more than 20% of its amino acids are arginine, and it contains little or no lysine. Due to these characteristics, ARF is likely to be unstructured unless it is bound to other targets. It reportedly complexes with more than 25 proteins, although the significance of each of these interactions is not known. One of these interactions results in sumoylating activity, suggesting that ARF may modify proteins to which it binds. The SUMO protein is a small ubiquitin-like modifier, which is added to lysly ε-amino groups. This process involves a three-enzyme cascade similar to the way ubiquitylation occurs. E1 is an activating enzyme, E2 is a conjugation enzyme, and E3 is a ligase. ARF associates with UBC9, the only SUMO E2 known, suggesting ARF facilitates SUMO conjugation. The importance of this role is unknown, as sumoylation is involved in different functions, such as protein trafficking, ubiquitylation interference, and gene expression changes.
The half-life of ARF is about 6 hours, while the half-life of smARF is less than 1 hour. Both isoforms are degraded in the proteasome. ARF is targeted for the proteasome by N-terminus ubiquitylation. Proteins are usually ubiquinated at lysine residues. Human [[p14ARF]], however, does not contain any lysines, and mouse p19Arf only contains one lysine. If the mouse lysine is replaced with arginine, there is no effect on its degradation, suggesting it is also ubiquinated at the N-terminus. This adds to the uniqueness of the ARF proteins, because most eukaryotic proteins are acetylated at the N-terminus, preventing ubiquination at this location. Penultimate residues affect the efficiency of acetylation, in that acetylation is promoted by acidic residues and inhibited by basic ones. The N-terminal amino acid sequences of p19Arf (Met-Gly-Arg) and p14ARF (Met-Val-Arg) would be processed by methionine aminopeptidase but would not be acetylated, allowing ubiquination to proceed. The sequence of smARF, however, predicts that the initiating methionine would not be cleaved by methionine aminopeptidase and would probably be acetylated, and so is degraded by the proteasome without ubiquination.
Full-length nucleolar ARF appears to be stabilized by NPM. The NPM-ARF complex does not block the N-terminus of ARF, but likely protects ARF from being accessed by degradation machinery. The mitochondrial matrix protein p32 stabilizes smARF. This protein binds various cellular and viral proteins, but its exact function is unknown. Knocking down p32 dramatically decreases smARF levels by increasing its turnover. The levels of p19Arf are not affected by p32 knockdown, and so p32 specifically stabilizes smARF, possibly by protecting it from the proteasome or from mitochondrial proteases.
References
Further reading
External links |
Video surveillance is currently a fast-growing market tending to become increasingly widespread for ubiquitous applications. It can be used today in numerous areas such as crime prevention, private and public areas for security purposes, abnormal events detection, traffic monitoring, customer behaviour, or general data gathering.
Video surveillance systems often comprise a huge number of network cameras that can be made by different manufacturers and that can be of different types. Each network camera typically comprises video stream encoders that make it possible to transmit encoded video stream over a communication network, for example to servers, to be recorded and displayed in real-time to human operators or analysed for objection recognition.
Configuring a network camera is not easy. In particular, setting the video stream encoders of the network camera can be complex for users that are not familiar with each type of network camera. Moreover, the setting of video stream cameras may depend on the tasks to be performed.
Such a complexity results from the great number of parameters that may for example comprise a video resolution, a video codec, a bitrate control, a frame rate, a video quality, and a Group of Pictures (GoP). It also results from the technical nature of these parameters and from their impacts that are not directly known and visible to the one setting the parameters, for example in terms of image quality, network bandwidth, and resource consumption.
To set the parameters properly, it is needed to take into account the usage of the stream(s) generated by a network camera to adapt the configuration of its video encoder(s). Typical usages of video streams in a video surveillance system are live viewing, recording (for the retrieval and viewing of video such as for a post-event investigation) and Video Content Analytics (VCA) which is based on video analysis to perform dedicated tasks such as face detection or recognition, people tracking, or license plate reading. Each usage requires a given (minimum) quality of the stream generated by a video encoder.
Moreover, while the format of the outputs of the encoders generally conforms to a standard, the manufacturers implement their own encoders, resulting in manufacturer-dependent configuration. It is also to be noted that each manufacturer continuously improves its encoders to improve its performance, resulting in variation of configuration. As a consequence, an administrator or the one who is in charge of configuring the encoders doesn't know which encoder is embedded in a given camera and thus cannot make an a priori determination of an optimal configuration. This means that a dedicated configuration needs to be learned for each manufacturer and model. Moreover, the list of settable encoding parameters is not necessarily the same between two different cameras and in particular, a same encoding parameter may have a unit and/or a scale different between two cameras.
Consequently, the administrator or the one who is in charge of configuring the cameras needs to configure each camera individually, according to its manufacturer, its model, and the task to be carried out. The problem is complex for a given network and becomes even difficult and quite unrealistic in large scale video surveillance systems, in terms of complexity and worktime. |
Q:
pandas: merge on column of ByteArray
Any ideas on how I can join two pandas arrays on a commonly named bytearray field? The field in the source (Teradata) is an actual ByteArray, and from the Teradata Side, this cannot be forced to character or something usable outside of Teradata)
The Teradata Export reads into a Panda's array beautifully. But I can't merge two tables with a commonly named field (DatabaseId) where that field is a bytearray.
(importing both pandas as pd and itertools)
When I try a simple merge of:
merge1 = pd.merge(tvm, dbase, on="DatabaseId")
I get the error of:
TypeError: type object argument after * must be a sequence, not itertools.imap
I searched StackOverflow and found a similar problem for joining on a cell containing a collection
dbase['DBID'] = dbase.DatabaseId.apply(lambda r: type(sorted(r.iteritems())))
But I get the Error:
AttributeError: 'bytearray' object has no attribute 'iteritems'
UPDATE
Example of Data
Data gathered through pandas using
dbase = pd.read_sql('select databaseid, databasename from ud812.dbase sample 10', conn)
conn is a connection to a teradata database
Data Types coming out of Teradata are Varchar for all columns EXCEPT:
DatabaseID = bytearray (Byte(4))
TVMID = bytearray (Byte(4))
>>> dbase.dtypes
DatabaseId object
DatabaseName object
dtype: object
>>> dbase
DatabaseId DatabaseName
0 [2, 0, 243, 185] PCDW_CRS_BBCONV3_TB
1 [2, 0, 168, 114] PAMLIF_TB
2 [2, 0, 133, 153] PADW_PRESN_TB
3 [2, 0, 29, 184] CEDW_MOBILE_TB
4 [2, 0, 190, 183] CEDW_MODEL_SCORE_TB
5 [2, 0, 71, 55] PBBBAM_TB
6 [2, 0, 169, 183] CEDW_OCC_TB
7 [2, 0, 201, 183] CCDW_DGTL_DEAL_TB
8 [0, 0, 139, 8] PRECDSS_TB
9 [2, 0, 142, 203] CDBDW_TB
>>>
>>>
>>> tvm.dtypes
TVMId object
DatabaseId object
TVMName object
TableKind object
CreateText object
dtype: object
>>> tvm
TVMId DatabaseId TVMName \
0 [230, 1, 41, 11, 0, 0] [2, 0, 67, 183] JCP_03538_112002
1 [214, 1, 60, 133, 0, 0] [2, 0, 186, 52] STL_AUTHNCTD_RULE_EXECN
2 [193, 2, 59, 48, 0, 0] [2, 0, 225, 150] uye177_Xsell_EM_OPCL_TB2
3 [0, 2, 235, 154, 0, 0] [2, 0, 244, 181] PL_CALCD_INVSTR_MTHLY_HIST_ST
4 [255, 1, 131, 76, 0, 0] [2, 0, 110, 63] IMH867_AVA0803_SNAP
5 [125, 1, 217, 138, 0, 0] [2, 0, 237, 153] FD_ACCT_STMT_ADR_ST
6 [224, 0, 80, 233, 0, 0] [2, 0, 243, 127] EXP_SRCH_RSLT_DESC
7 [208, 1, 72, 15, 0, 0] [2, 0, 8, 57] SGI_PAY_DENIED_SEP_112012
8 [246, 0, 27, 61, 0, 0] [2, 0, 143, 130] CR_INDIVD
9 [186, 1, 242, 167, 0, 0] [0, 0, 244, 18] wzu448_sb_apps
TableKind CreateText
0 T None
1 V CREATE VIEW ... ... ... ... ... ... ... ... ...
2 T None
3 V CREATE VIEW ... ... ... ... ... ... ... ... ...
4 T None
5 V CREATE VIEW ... ... ... ... ... ... ... ... ...
6 V CREATE VIEW ... ... ... ... ... ... ... ... ...
7 V CREATE VIEW ... ... ... ... ... ... ... ... ...
8 V CREATE VIEW ... ... ... ... ... ... ... ... ...
9 T None
A:
Convert your bytearrays to their immutable cousin bytes.
import pandas as pd
# Create your example `dbase`
DatabaseId_dbase = list(map(bytearray, [[2, 0, 243, 185], [2, 0, 168, 114],
[2, 0, 133, 153], [2, 0, 29, 184], [2, 0, 190, 183], [2, 0, 71, 55],
[2, 0, 169, 183], [2, 0, 201, 183], [0, 0, 139, 8], [2, 0, 142, 203]]))
DatabaseName = ['PCDW_CRS_BBCONV3_TB', 'PAMLIF_TB', 'PADW_PRESN_TB',
'CEDW_MOBILE_TB', 'CEDW_MODEL_SCORE_TB', 'PBBBAM_TB', 'CEDW_OCC_TB',
'CCDW_DGTL_DEAL_TB', 'PRECDSS_TB', 'CDBDW_TB']
dbase = pd.DataFrame({'DatabaseId': DatabaseId_dbase,
'DatabaseName': DatabaseName})
# Create your example `tvm`
DatabaseId_tvm = list(map(bytearray, [[2, 0, 67, 183], [2, 0, 186, 52],
[2, 0, 225, 150], [2, 0, 244, 181], [2, 0, 110, 63], [2, 0, 237, 153],
[2, 0, 243, 127], [2, 0, 243, 185], [2, 0, 143, 130], [0, 0, 244, 18]]))
TVMId = list(map(bytearray, [[230, 1, 41, 11, 0, 0], [214, 1, 60, 133, 0, 0],
[193, 2, 59, 48, 0, 0], [0, 2, 235, 154, 0, 0], [255, 1, 131, 76, 0, 0],
[125, 1, 217, 138, 0, 0], [224, 0, 80, 233, 0, 0], [208, 1, 72, 15, 0, 0],
[246, 0, 27, 61, 0, 0], [186, 1, 242, 167, 0, 0]]))
TVMName = ['JCP_03538_112002', 'STL_AUTHNCTD_RULE_EXECN',
'uye177_Xsell_EM_OPCL_TB2', 'PL_CALCD_INVSTR_MTHLY_HIST_ST',
'IMH867_AVA0803_SNAP', 'FD_ACCT_STMT_ADR_ST', 'EXP_SRCH_RSLT_DESC',
'SGI_PAY_DENIED_SEP_112012', 'CR_INDIVD', 'wzu448_sb_apps']
TableKind = ['T', 'V', 'T', 'V', 'T', 'V', 'V', 'V', 'V', 'T']
tvm = pd.DataFrame({'DatabaseId': DatabaseId_tvm, 'TVMId': TVMId,
'TVMName': TVMName, 'TableKind': TableKind})
# This line would fail with the following error
# TypeError: type object argument after * must be a sequence, not map
# merge = pd.merge(tvm, dbase, on='DatabaseId')
# Apply the `bytes` constructor to the `bytearray` columns
dbase['DatabaseId'] = dbase['DatabaseId'].apply(bytes)
tvm['DatabaseId'] = tvm['DatabaseId'].apply(bytes)
tvm['TVMId'] = tvm['TVMId'].apply(bytes)
# Now it works!
merge = pd.merge(tvm, dbase, on='DatabaseId')
The resulting merge is
DatabaseId TVMId TVMName \
0 b'\x02\x00\xf3\xb9' b'\xd0\x01H\x0f\x00\x00' SGI_PAY_DENIED_SEP_112012
TableKind DatabaseName
0 V PCDW_CRS_BBCONV3_TB
(I had to change the DatabaseId field of one of the rows in your tvm, since otherwise merge would have been empty. I also didn't include the CreateText column — too awkward for SO)
|
<!DOCTYPE HTML>
<html lang="" >
<head>
<meta charset="UTF-8">
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
<title>远方 1 · GitBook</title>
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta name="description" content="">
<meta name="generator" content="GitBook 3.2.3">
<link rel="stylesheet" href="../gitbook/style.css">
<link rel="stylesheet" href="../gitbook/gitbook-plugin-highlight/website.css">
<link rel="stylesheet" href="../gitbook/gitbook-plugin-search/search.css">
<link rel="stylesheet" href="../gitbook/gitbook-plugin-fontsettings/website.css">
<meta name="HandheldFriendly" content="true"/>
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no">
<meta name="apple-mobile-web-app-capable" content="yes">
<meta name="apple-mobile-web-app-status-bar-style" content="black">
<link rel="apple-touch-icon-precomposed" sizes="152x152" href="../gitbook/images/apple-touch-icon-precomposed-152.png">
<link rel="shortcut icon" href="../gitbook/images/favicon.ico" type="image/x-icon">
<link rel="next" href="yuan-fang-2.html" />
<link rel="prev" href="cun-zai.html" />
</head>
<body>
<div class="book">
<div class="book-summary">
<div id="book-search-input" role="search">
<input type="text" placeholder="Type to search" />
</div>
<nav role="navigation">
<ul class="summary">
<li class="chapter " data-level="1.1" data-path="../">
<a href="../">
关于本文集
</a>
</li>
<li class="chapter " data-level="1.2" data-path="../cover.html">
<a href="../cover.html">
封面
</a>
</li>
<li class="chapter " data-level="1.3" data-path="../bian-zhe-an.html">
<a href="../bian-zhe-an.html">
编者按
</a>
</li>
<li class="chapter " data-level="1.4" data-path="../xu.html">
<a href="../xu.html">
序
</a>
</li>
<li class="header">Part I 小说与散文</li>
<li class="chapter " data-level="2.1" data-path="../parti-xiao-shuo-yu-san-wen/chu-nv.html">
<a href="../parti-xiao-shuo-yu-san-wen/chu-nv.html">
处女
</a>
</li>
<li class="chapter " data-level="2.2" data-path="../parti-xiao-shuo-yu-san-wen/chen-da-zhuang.html">
<a href="../parti-xiao-shuo-yu-san-wen/chen-da-zhuang.html">
陈大壮
</a>
</li>
<li class="chapter " data-level="2.3" data-path="../parti-xiao-shuo-yu-san-wen/shuo-yi-shuo-zai-wo-lao-jia-zhuang-jia-de-zhong-zhi-qing-kuang.html">
<a href="../parti-xiao-shuo-yu-san-wen/shuo-yi-shuo-zai-wo-lao-jia-zhuang-jia-de-zhong-zhi-qing-kuang.html">
说一说在我老家,庄稼的种植情况
</a>
</li>
<li class="chapter " data-level="2.4" data-path="../parti-xiao-shuo-yu-san-wen/qin-zi-tie-wo-de-er-zi-wang-da-chui.html">
<a href="../parti-xiao-shuo-yu-san-wen/qin-zi-tie-wo-de-er-zi-wang-da-chui.html">
亲子贴:我的儿子王大锤
</a>
</li>
<li class="chapter " data-level="2.5" data-path="../parti-xiao-shuo-yu-san-wen/mei-qian-tai-can.html">
<a href="../parti-xiao-shuo-yu-san-wen/mei-qian-tai-can.html">
没钱太惨
</a>
</li>
<li class="chapter " data-level="2.6" data-path="../parti-xiao-shuo-yu-san-wen/xia-li-bai-jiu-38-zhou-sui-le-gan-jue-hen-huang.html">
<a href="../parti-xiao-shuo-yu-san-wen/xia-li-bai-jiu-38-zhou-sui-le-gan-jue-hen-huang.html">
下礼拜就 38 周岁了,感觉很恍惚
</a>
</li>
<li class="chapter " data-level="2.7" data-path="../parti-xiao-shuo-yu-san-wen/wo-jue-de-wo-zhen-huo-ming-bai-le-di-su-wu-chi-xia-liu.html">
<a href="../parti-xiao-shuo-yu-san-wen/wo-jue-de-wo-zhen-huo-ming-bai-le-di-su-wu-chi-xia-liu.html">
我觉得我真活明白了(低速无耻下流)
</a>
</li>
<li class="chapter " data-level="2.8" data-path="../parti-xiao-shuo-yu-san-wen/zen-yang-bai-tuo-rou-ti-wo-you-le-yi-ge-ji-hua.html">
<a href="../parti-xiao-shuo-yu-san-wen/zen-yang-bai-tuo-rou-ti-wo-you-le-yi-ge-ji-hua.html">
怎样摆脱肉体?我有了一个计划
</a>
</li>
<li class="chapter " data-level="2.9" data-path="../parti-xiao-shuo-yu-san-wen/wo-jue-de-you-ren-yao-hai-wo.html">
<a href="../parti-xiao-shuo-yu-san-wen/wo-jue-de-you-ren-yao-hai-wo.html">
我觉得有人要害我
</a>
</li>
<li class="chapter " data-level="2.10" data-path="../parti-xiao-shuo-yu-san-wen/xian-zai-ke-yi-zhun-bei-le.html">
<a href="../parti-xiao-shuo-yu-san-wen/xian-zai-ke-yi-zhun-bei-le.html">
现在可以准备了
</a>
</li>
<li class="chapter " data-level="2.11" data-path="../parti-xiao-shuo-yu-san-wen/zhe-yang-de-ren-huo-zai-shi-shang-dao-di-shi-ti-zhi-de-bei-ai-hai-shi-ge-ti-can-ju-ni-shuo.html">
<a href="../parti-xiao-shuo-yu-san-wen/zhe-yang-de-ren-huo-zai-shi-shang-dao-di-shi-ti-zhi-de-bei-ai-hai-shi-ge-ti-can-ju-ni-shuo.html">
这样的人活在世上到底是体制的悲哀还是个体惨剧,你说?
</a>
</li>
<li class="chapter " data-level="2.12" data-path="../parti-xiao-shuo-yu-san-wen/ya-la-suo-na-jiu-shi-bei-hai-gong-yuan.html">
<a href="../parti-xiao-shuo-yu-san-wen/ya-la-suo-na-jiu-shi-bei-hai-gong-yuan.html">
“亚拉嗦 那就是北海公园”
</a>
</li>
<li class="chapter " data-level="2.13" data-path="../parti-xiao-shuo-yu-san-wen/de-wei-wo-tu-ran-fa-xian-wo-shi-yong-nuo-ji-ya-de-fang-xiang-wan-quan-cuo-le.html">
<a href="../parti-xiao-shuo-yu-san-wen/de-wei-wo-tu-ran-fa-xian-wo-shi-yong-nuo-ji-ya-de-fang-xiang-wan-quan-cuo-le.html">
(德味) 我突然发现我使用诺基亚的方向完全错了
</a>
</li>
<li class="chapter " data-level="2.14" data-path="../parti-xiao-shuo-yu-san-wen/dong-zhi-lao-gong-beng-kui-le-wen-gan-ren.html">
<a href="../parti-xiao-shuo-yu-san-wen/dong-zhi-lao-gong-beng-kui-le-wen-gan-ren.html">
冬至老公崩溃了(温馨感人)
</a>
</li>
<li class="chapter " data-level="2.15" data-path="../parti-xiao-shuo-yu-san-wen/huo-zai-dang-xia-shi-dai-de-wan-shang.html">
<a href="../parti-xiao-shuo-yu-san-wen/huo-zai-dang-xia-shi-dai-de-wan-shang.html">
活在裆下:时代的晚上
</a>
</li>
<li class="chapter " data-level="2.16" data-path="../parti-xiao-shuo-yu-san-wen/yi-ci-tu-ru-qi-lai-de-xing-sheng-huo.html">
<a href="../parti-xiao-shuo-yu-san-wen/yi-ci-tu-ru-qi-lai-de-xing-sheng-huo.html">
一次突如其来的性生活
</a>
</li>
<li class="chapter " data-level="2.17" data-path="../parti-xiao-shuo-yu-san-wen/jing-guo-ren-zhen-si-kao-lao-wang-fa-xian-lao-zhang-bu-shi-he-zi-ji.html">
<a href="../parti-xiao-shuo-yu-san-wen/jing-guo-ren-zhen-si-kao-lao-wang-fa-xian-lao-zhang-bu-shi-he-zi-ji.html">
经过认真思考,老王发现老张不适合自己
</a>
</li>
<li class="chapter " data-level="2.18" data-path="../parti-xiao-shuo-yu-san-wen/zhong-chan-jie-ji-de-yin-mi-sheng-huo-jing.html">
<a href="../parti-xiao-shuo-yu-san-wen/zhong-chan-jie-ji-de-yin-mi-sheng-huo-jing.html">
中产阶级的隐秘生活(惊悚)
</a>
</li>
<li class="chapter " data-level="2.19" data-path="../parti-xiao-shuo-yu-san-wen/dong-wu-yuan-li-gu-shi-hen-duo-de-sui-bian-jiang-ji-ge.html">
<a href="../parti-xiao-shuo-yu-san-wen/dong-wu-yuan-li-gu-shi-hen-duo-de-sui-bian-jiang-ji-ge.html">
动物园里故事很多的,随便讲几个
</a>
</li>
<li class="chapter " data-level="2.20" data-path="../parti-xiao-shuo-yu-san-wen/de-zhou-ren-zai-ba-li-zai-bei-jing-lv-you-de-ji-ge-xiao-gu-shi.html">
<a href="../parti-xiao-shuo-yu-san-wen/de-zhou-ren-zai-ba-li-zai-bei-jing-lv-you-de-ji-ge-xiao-gu-shi.html">
德州人在巴黎,在北京旅游的几个小故事
</a>
</li>
<li class="chapter " data-level="2.21" data-path="../parti-xiao-shuo-yu-san-wen/zhu-yi-lou-de-hao-chu.html">
<a href="../parti-xiao-shuo-yu-san-wen/zhu-yi-lou-de-hao-chu.html">
住一楼的好处
</a>
</li>
<li class="chapter " data-level="2.22" data-path="../parti-xiao-shuo-yu-san-wen/da-xue-hou-de-qing-chen-wen-xin-gan-ren.html">
<a href="../parti-xiao-shuo-yu-san-wen/da-xue-hou-de-qing-chen-wen-xin-gan-ren.html">
大雪后的清晨(温馨感人)
</a>
</li>
<li class="chapter " data-level="2.23" data-path="../parti-xiao-shuo-yu-san-wen/ni-guo-gou-guan-cha.html">
<a href="../parti-xiao-shuo-yu-san-wen/ni-guo-gou-guan-cha.html">
你国狗观察
</a>
</li>
<li class="chapter " data-level="2.24" data-path="../parti-xiao-shuo-yu-san-wen/jin-tian-wo-zhi-dian-le-yi-ge-lv.html">
<a href="../parti-xiao-shuo-yu-san-wen/jin-tian-wo-zhi-dian-le-yi-ge-lv.html">
今天我指点了一个驴
</a>
</li>
<li class="chapter " data-level="2.25" data-path="../parti-xiao-shuo-yu-san-wen/shuo-yi-xia-jin-tian-wan-shang-gen-zhe-qia-qia-qia-qu-qian-zi-de-qing-kuang-ha-gan-ren-geng-xin-hao.html">
<a href="../parti-xiao-shuo-yu-san-wen/shuo-yi-xia-jin-tian-wan-shang-gen-zhe-qia-qia-qia-qu-qian-zi-de-qing-kuang-ha-gan-ren-geng-xin-hao.html">
说一下今天晚上跟着恰恰恰去签字的情况,哈感人(更新好了)
</a>
</li>
<li class="chapter " data-level="2.26" data-path="../parti-xiao-shuo-yu-san-wen/wu-han-mou-xing-fu-zhong-chan-jia-ting-li-yi-ge-gou-de-bo-lan-zhuang-kuo-da-ji-hua-li-zhi-xiang-shan.html">
<a href="../parti-xiao-shuo-yu-san-wen/wu-han-mou-xing-fu-zhong-chan-jia-ting-li-yi-ge-gou-de-bo-lan-zhuang-kuo-da-ji-hua-li-zhi-xiang-shan.html">
武汉某幸福中产家庭里一个狗,的波澜壮阔大计划(励志向上)
</a>
</li>
<li class="chapter " data-level="2.27" data-path="../parti-xiao-shuo-yu-san-wen/guang-chang-xing-fu-yuan-man.html">
<a href="../parti-xiao-shuo-yu-san-wen/guang-chang-xing-fu-yuan-man.html">
广场(幸福圆满)
</a>
</li>
<li class="chapter " data-level="2.28" data-path="../parti-xiao-shuo-yu-san-wen/yi-ge-qi-guai-de-qing-xing-wo-jian-dao-zai-he-bian-jin-tian-you-yi-ge-shi-hou.html">
<a href="../parti-xiao-shuo-yu-san-wen/yi-ge-qi-guai-de-qing-xing-wo-jian-dao-zai-he-bian-jin-tian-you-yi-ge-shi-hou.html">
一个奇怪的情形我见到在河边今天有一个时候
</a>
</li>
<li class="chapter " data-level="2.29" data-path="../parti-xiao-shuo-yu-san-wen/zhen-jing-le-wo-men-yi-ge-tong-shi-shi-xing-xing-jin-tian-bei-bei-jing-dong-wu-yuan-de-zhua-zou-le.html">
<a href="../parti-xiao-shuo-yu-san-wen/zhen-jing-le-wo-men-yi-ge-tong-shi-shi-xing-xing-jin-tian-bei-bei-jing-dong-wu-yuan-de-zhua-zou-le.html">
震惊了!我们一个同事是猩猩,今天被北京动物园的抓走了
</a>
</li>
<li class="chapter " data-level="2.30" data-path="../parti-xiao-shuo-yu-san-wen/xia-ri-zui-hou-de-feng-jing.html">
<a href="../parti-xiao-shuo-yu-san-wen/xia-ri-zui-hou-de-feng-jing.html">
(仮)夏日最后的风景
</a>
</li>
<li class="chapter " data-level="2.31" data-path="../parti-xiao-shuo-yu-san-wen/zen-yang-ke-fu-kong-ju-xin-li-zai-qi-yue-di-chi-shang-you-zhi-de-sheng-wan-zi.html">
<a href="../parti-xiao-shuo-yu-san-wen/zen-yang-ke-fu-kong-ju-xin-li-zai-qi-yue-di-chi-shang-you-zhi-de-sheng-wan-zi.html">
怎样克服恐惧心理在七月底吃上优质的生汆丸子
</a>
</li>
<li class="chapter " data-level="2.32" data-path="../parti-xiao-shuo-yu-san-wen/wan-fan-chi-shen-me-xi-lie-zhi-gang-cai-zai-xiao-qu-men-kou-de-yi-ci-can-lie-bo-dou.html">
<a href="../parti-xiao-shuo-yu-san-wen/wan-fan-chi-shen-me-xi-lie-zhi-gang-cai-zai-xiao-qu-men-kou-de-yi-ci-can-lie-bo-dou.html">
晚饭吃什么系列之刚才在小区门口的一次惨烈搏斗!
</a>
</li>
<li class="chapter " data-level="2.33" data-path="../parti-xiao-shuo-yu-san-wen/da-shi-li-xing-ping-ce-she-jian-shang-de-zhong-guo-2-di-yi-ji.html">
<a href="../parti-xiao-shuo-yu-san-wen/da-shi-li-xing-ping-ce-she-jian-shang-de-zhong-guo-2-di-yi-ji.html">
大师理性评测舌尖上的中国 2 第一集
</a>
</li>
<li class="chapter " data-level="2.34" data-path="../parti-xiao-shuo-yu-san-wen/la-sa-yi-shi.html">
<a href="../parti-xiao-shuo-yu-san-wen/la-sa-yi-shi.html">
关于去拉萨的说两句
</a>
</li>
<li class="chapter " data-level="2.35" data-path="../parti-xiao-shuo-yu-san-wen/huang-pu-jiang-shen-ye-zhi-dian-mou-ling-dao-huang-pu-jiang-you-hua-yao-jiang.html">
<a href="../parti-xiao-shuo-yu-san-wen/huang-pu-jiang-shen-ye-zhi-dian-mou-ling-dao-huang-pu-jiang-you-hua-yao-jiang.html">
黄浦江深夜致电某领导,黄浦江有话要讲!
</a>
</li>
<li class="header">Part II 诗歌</li>
<li class="chapter " data-level="3.1" data-path="../part-ii-shi-ge/qi-yue.html">
<a href="../part-ii-shi-ge/qi-yue.html">
七月
</a>
</li>
<li class="chapter " data-level="3.2" data-path="../part-ii-shi-ge/yi-duan-shi-qi-de-ping-yuan-sheng-huo.html">
<a href="../part-ii-shi-ge/yi-duan-shi-qi-de-ping-yuan-sheng-huo.html">
一段时期的平原生活
</a>
</li>
<li class="chapter " data-level="3.3" data-path="../part-ii-shi-ge/ping-yuan-shang-de-lao-wang.html">
<a href="../part-ii-shi-ge/ping-yuan-shang-de-lao-wang.html">
平原上的老王
</a>
</li>
<li class="chapter " data-level="3.4" data-path="../part-ii-shi-ge/yi-zhong-cao.html">
<a href="../part-ii-shi-ge/yi-zhong-cao.html">
一种草
</a>
</li>
<li class="chapter " data-level="3.5" data-path="../part-ii-shi-ge/kan-lv-1.html">
<a href="../part-ii-shi-ge/kan-lv-1.html">
看驴 1
</a>
</li>
<li class="chapter " data-level="3.6" data-path="../part-ii-shi-ge/kan-lv-2.html">
<a href="../part-ii-shi-ge/kan-lv-2.html">
看驴 2
</a>
</li>
<li class="chapter " data-level="3.7" data-path="../part-ii-shi-ge/lv-de-yi-zhong-ai-hao.html">
<a href="../part-ii-shi-ge/lv-de-yi-zhong-ai-hao.html">
驴的一种爱好
</a>
</li>
<li class="chapter " data-level="3.8" data-path="../part-ii-shi-ge/an-hui-ren.html">
<a href="../part-ii-shi-ge/an-hui-ren.html">
安徽人
</a>
</li>
<li class="chapter " data-level="3.9" data-path="../part-ii-shi-ge/feng.html">
<a href="../part-ii-shi-ge/feng.html">
风
</a>
</li>
<li class="chapter " data-level="3.10" data-path="../part-ii-shi-ge/fu-ju-chang.html">
<a href="../part-ii-shi-ge/fu-ju-chang.html">
副局长
</a>
</li>
<li class="chapter " data-level="3.11" data-path="../part-ii-shi-ge/zai-xia-tian-bi-xu-ren-shi-yi-ge-gu-niang.html">
<a href="../part-ii-shi-ge/zai-xia-tian-bi-xu-ren-shi-yi-ge-gu-niang.html">
在夏天必须认识一个姑娘
</a>
</li>
<li class="chapter " data-level="3.12" data-path="../part-ii-shi-ge/da-xu-shi.html">
<a href="../part-ii-shi-ge/da-xu-shi.html">
大叙事
</a>
</li>
<li class="chapter " data-level="3.13" data-path="../part-ii-shi-ge/shen-ye.html">
<a href="../part-ii-shi-ge/shen-ye.html">
深夜
</a>
</li>
<li class="chapter " data-level="3.14" data-path="../part-ii-shi-ge/yao-zi.html">
<a href="../part-ii-shi-ge/yao-zi.html">
腰子
</a>
</li>
<li class="chapter " data-level="3.15" data-path="../part-ii-shi-ge/xiang-ni.html">
<a href="../part-ii-shi-ge/xiang-ni.html">
想你
</a>
</li>
<li class="chapter " data-level="3.16" data-path="../part-ii-shi-ge/zen-me-tong-yi-di-qiu-shi-yuan-de.html">
<a href="../part-ii-shi-ge/zen-me-tong-yi-di-qiu-shi-yuan-de.html">
怎么同意地球是圆的
</a>
</li>
<li class="chapter " data-level="3.17" data-path="../part-ii-shi-ge/huai-bei-xia-xue-le.html">
<a href="../part-ii-shi-ge/huai-bei-xia-xue-le.html">
淮北下雪了
</a>
</li>
<li class="chapter " data-level="3.18" data-path="../part-ii-shi-ge/ci-yao-de-sheng-huo.html">
<a href="../part-ii-shi-ge/ci-yao-de-sheng-huo.html">
次要的生活
</a>
</li>
<li class="chapter " data-level="3.19" data-path="../part-ii-shi-ge/gei-xin-ai-de-ren.html">
<a href="../part-ii-shi-ge/gei-xin-ai-de-ren.html">
给心爱的人
</a>
</li>
<li class="chapter " data-level="3.20" data-path="../part-ii-shi-ge/jie-kou.html">
<a href="../part-ii-shi-ge/jie-kou.html">
借口
</a>
</li>
<li class="chapter " data-level="3.21" data-path="../part-ii-shi-ge/si-yue.html">
<a href="../part-ii-shi-ge/si-yue.html">
四月
</a>
</li>
<li class="chapter " data-level="3.22" data-path="../part-ii-shi-ge/jiu-yue.html">
<a href="../part-ii-shi-ge/jiu-yue.html">
九月
</a>
</li>
<li class="chapter " data-level="3.23" data-path="../part-ii-shi-ge/tai-feng.html">
<a href="../part-ii-shi-ge/tai-feng.html">
台风
</a>
</li>
<li class="chapter " data-level="3.24" data-path="../part-ii-shi-ge/ye-wan.html">
<a href="../part-ii-shi-ge/ye-wan.html">
夜晚
</a>
</li>
<li class="chapter " data-level="3.25" data-path="../part-ii-shi-ge/yong-heng.html">
<a href="../part-ii-shi-ge/yong-heng.html">
永恒
</a>
</li>
<li class="header">PART III 段子与微评</li>
<li class="chapter " data-level="4.1" data-path="ji-ge-chang-jing-tou-su-cai.html">
<a href="ji-ge-chang-jing-tou-su-cai.html">
几个长镜头素材
</a>
</li>
<li class="chapter " data-level="4.2" data-path="chi-yu-jing-jie.html">
<a href="chi-yu-jing-jie.html">
吃与境界
</a>
</li>
<li class="chapter " data-level="4.3" data-path="chang-xiao-ren-bo-qie.html">
<a href="chang-xiao-ren-bo-qie.html">
畅销仁波切
</a>
</li>
<li class="chapter " data-level="4.4" data-path="bei-jing-de-peng-you.html">
<a href="bei-jing-de-peng-you.html">
北京的朋友
</a>
</li>
<li class="chapter " data-level="4.5" data-path="bei-jing-can-yin.html">
<a href="bei-jing-can-yin.html">
北京餐饮
</a>
</li>
<li class="chapter " data-level="4.6" data-path="gong-yuan.html">
<a href="gong-yuan.html">
公园
</a>
</li>
<li class="chapter " data-level="4.7" data-path="hou-xing.html">
<a href="hou-xing.html">
猴性
</a>
</li>
<li class="chapter " data-level="4.8" data-path="ling-hun-jiao-hu-app.html">
<a href="ling-hun-jiao-hu-app.html">
灵魂交互 app
</a>
</li>
<li class="chapter " data-level="4.9" data-path="da-shi-jian-fei-mi-fang.html">
<a href="da-shi-jian-fei-mi-fang.html">
大师减肥秘方
</a>
</li>
<li class="chapter " data-level="4.10" data-path="zhang-da-chui-pao-bu-bi-sai.html">
<a href="zhang-da-chui-pao-bu-bi-sai.html">
张大锤跑步比赛
</a>
</li>
<li class="chapter " data-level="4.11" data-path="ru-he-zhi-liao-huai-cai-bu-yu-1.html">
<a href="ru-he-zhi-liao-huai-cai-bu-yu-1.html">
如何治疗怀才不遇 1
</a>
</li>
<li class="chapter " data-level="4.12" data-path="ru-he-zhi-liao-huai-cai-bu-yu-2.html">
<a href="ru-he-zhi-liao-huai-cai-bu-yu-2.html">
如何治疗怀才不遇 2
</a>
</li>
<li class="chapter " data-level="4.13" data-path="bing-xiang.html">
<a href="bing-xiang.html">
冰箱
</a>
</li>
<li class="chapter " data-level="4.14" data-path="200-chou-ce-zhi-shi-ji.html">
<a href="200-chou-ce-zhi-shi-ji.html">
200 抽厕纸诗集
</a>
</li>
<li class="chapter " data-level="4.15" data-path="fu-fu.html">
<a href="fu-fu.html">
夫~夫~
</a>
</li>
<li class="chapter " data-level="4.16" data-path="mian-mo.html">
<a href="mian-mo.html">
面膜
</a>
</li>
<li class="chapter " data-level="4.17" data-path="mei-fa-dian-de-ji-hao.html">
<a href="mei-fa-dian-de-ji-hao.html">
美发店的记号
</a>
</li>
<li class="chapter " data-level="4.18" data-path="ren-min-zuo-zhu.html">
<a href="ren-min-zuo-zhu.html">
人民做主
</a>
</li>
<li class="chapter " data-level="4.19" data-path="cun-zai.html">
<a href="cun-zai.html">
存在
</a>
</li>
<li class="chapter active" data-level="4.20" data-path="yuan-fang-1.html">
<a href="yuan-fang-1.html">
远方 1
</a>
</li>
<li class="chapter " data-level="4.21" data-path="yuan-fang-2.html">
<a href="yuan-fang-2.html">
远方 2
</a>
</li>
<li class="chapter " data-level="4.22" data-path="bei-jing-ka-fei-guan.html">
<a href="bei-jing-ka-fei-guan.html">
北京咖啡馆
</a>
</li>
<li class="chapter " data-level="4.23" data-path="she-hui-zhu-yi-de-cheng-gong.html">
<a href="she-hui-zhu-yi-de-cheng-gong.html">
社会主义的成功
</a>
</li>
<li class="chapter " data-level="4.24" data-path="na-han.html">
<a href="na-han.html">
呐喊
</a>
</li>
<li class="chapter " data-level="4.25" data-path="dang-dai.html">
<a href="dang-dai.html">
当代
</a>
</li>
<li class="chapter " data-level="4.26" data-path="chu-guo.html">
<a href="chu-guo.html">
出国
</a>
</li>
<li class="chapter " data-level="4.27" data-path="ni-pang-liao.html">
<a href="ni-pang-liao.html">
你胖了
</a>
</li>
<li class="chapter " data-level="4.28" data-path="tong-ku-xie-zuo.html">
<a href="tong-ku-xie-zuo.html">
痛苦写作
</a>
</li>
<li class="chapter " data-level="4.29" data-path="shu-dian-de-wei-er.html">
<a href="shu-dian-de-wei-er.html">
书店的味儿
</a>
</li>
<li class="chapter " data-level="4.30" data-path="tai-yang-he-mei-qiu.html">
<a href="tai-yang-he-mei-qiu.html">
太阳和煤球
</a>
</li>
<li class="chapter " data-level="4.31" data-path="ni-bian-liao.html">
<a href="ni-bian-liao.html">
你变了
</a>
</li>
<li class="chapter " data-level="4.32" data-path="be-shuo-hua.html">
<a href="be-shuo-hua.html">
be 说话
</a>
</li>
<li class="chapter " data-level="4.33" data-path="wei-ni-tui-jian-qi-ge-fan-hou-hao-xi-guan.html">
<a href="wei-ni-tui-jian-qi-ge-fan-hou-hao-xi-guan.html">
为你推荐七个饭后好习惯
</a>
</li>
<li class="chapter " data-level="4.34" data-path="hui-gui.html">
<a href="hui-gui.html">
回归
</a>
</li>
<li class="chapter " data-level="4.35" data-path="dian-ti-nei-wai-de-yi-ge-shi-ke.html">
<a href="dian-ti-nei-wai-de-yi-ge-shi-ke.html">
电梯内外的一个时刻
</a>
</li>
<li class="chapter " data-level="4.36" data-path="xing-ju.html">
<a href="xing-ju.html">
刑具
</a>
</li>
<li class="chapter " data-level="4.37" data-path="bei-jing-gou-you-duo-shao.html">
<a href="bei-jing-gou-you-duo-shao.html">
北京狗有多少
</a>
</li>
<li class="chapter " data-level="4.38" data-path="bao-fu-she-hui.html">
<a href="bao-fu-she-hui.html">
报复社会
</a>
</li>
<li class="chapter " data-level="4.39" data-path="xi-du-he-pao-bu.html">
<a href="xi-du-he-pao-bu.html">
吸毒和跑步
</a>
</li>
<li class="chapter " data-level="4.40" data-path="dong-zhi-men-er.html">
<a href="dong-zhi-men-er.html">
东直门儿
</a>
</li>
<li class="chapter " data-level="4.41" data-path="jing-shen-shi-jie.html">
<a href="jing-shen-shi-jie.html">
精神世界
</a>
</li>
<li class="chapter " data-level="4.42" data-path="yi-zhong-sheng-huo.html">
<a href="yi-zhong-sheng-huo.html">
一种生活
</a>
</li>
<li class="chapter " data-level="4.43" data-path="jiao-zi.html">
<a href="jiao-zi.html">
饺子
</a>
</li>
<li class="chapter " data-level="4.44" data-path="su-zhou-wan-dan-liao.html">
<a href="su-zhou-wan-dan-liao.html">
苏州完蛋了
</a>
</li>
<li class="chapter " data-level="4.45" data-path="tfuncles.html">
<a href="tfuncles.html">
tfuncles
</a>
</li>
<li class="chapter " data-level="4.46" data-path="ni-guo-he-wo-guo.html">
<a href="ni-guo-he-wo-guo.html">
你国和我国
</a>
</li>
<li class="chapter " data-level="4.47" data-path="zhong-hua-sheng-shi-mojito.html">
<a href="zhong-hua-sheng-shi-mojito.html">
中华盛世 mojito
</a>
</li>
<li class="chapter " data-level="4.48" data-path="hui-zhuan-bei-jing-xiao-chi.html">
<a href="hui-zhuan-bei-jing-xiao-chi.html">
回转北京小吃
</a>
</li>
<li class="chapter " data-level="4.49" data-path="o2o-jian-bing-tan.html">
<a href="o2o-jian-bing-tan.html">
o2o 煎饼摊
</a>
</li>
<li class="chapter " data-level="4.50" data-path="zhu-you.html">
<a href="zhu-you.html">
猪油
</a>
</li>
<li class="chapter " data-level="4.51" data-path="ju-can.html">
<a href="ju-can.html">
聚餐
</a>
</li>
<li class="chapter " data-level="4.52" data-path="huo-xia.html">
<a href="huo-xia.html">
活虾
</a>
</li>
<li class="chapter " data-level="4.53" data-path="pi-jiu.html">
<a href="pi-jiu.html">
啤酒
</a>
</li>
<li class="chapter " data-level="4.54" data-path="711-guan-dong-zhu.html">
<a href="711-guan-dong-zhu.html">
711 关东煮
</a>
</li>
<li class="chapter " data-level="4.55" data-path="gu-ye-shang-men-yan.html">
<a href="gu-ye-shang-men-yan.html">
姑爷上门宴
</a>
</li>
<li class="chapter " data-level="4.56" data-path="ba-shi-nian-dai.html">
<a href="ba-shi-nian-dai.html">
八十年代
</a>
</li>
<li class="chapter " data-level="4.57" data-path="jiu-shi-nian-dai.html">
<a href="jiu-shi-nian-dai.html">
九十年代
</a>
</li>
<li class="chapter " data-level="4.58" data-path="xing-shan.html">
<a href="xing-shan.html">
行善
</a>
</li>
<li class="chapter " data-level="4.59" data-path="shen-ao.html">
<a href="shen-ao.html">
申奥
</a>
</li>
<li class="chapter " data-level="4.60" data-path="jian-qian-bao.html">
<a href="jian-qian-bao.html">
捡钱包
</a>
</li>
<li class="chapter " data-level="4.61" data-path="bei-jing-chu-zu-si-ji.html">
<a href="bei-jing-chu-zu-si-ji.html">
北京出租司机
</a>
</li>
<li class="chapter " data-level="4.62" data-path="zhong-chan-jie-ji.html">
<a href="zhong-chan-jie-ji.html">
中产阶级
</a>
</li>
<li class="header">PART IV 野生郭东林仿写</li>
<li class="chapter " data-level="5.1" data-path="../part-iv-ye-sheng-guo-dong-lin-fang-xie/shou-si-ji-qi-ren.html">
<a href="../part-iv-ye-sheng-guo-dong-lin-fang-xie/shou-si-ji-qi-ren.html">
寿司机器人
</a>
</li>
<li class="header">PART V 知乎网严肃文学评论家文评集锦</li>
<li class="chapter " data-level="6.1" data-path="../partv-zhi-hu-wang-yan-su-wen-xue-ping-lun-jia-wen-ping-ji-jin/untitled.md">
<span>
Untitled
</a>
</li>
<li class="header">PART IV 后记</li>
<li class="chapter " data-level="7.1" data-path="../part-iv-hou-ji/untitled.md">
<span>
Untitled
</a>
</li>
<li class="header">PART VII 补录</li>
<li class="chapter " data-level="8.1" data-path="../part-vii-bu-lu/untitled.md">
<span>
Untitled
</a>
</li>
<li class="chapter " data-level="8.2" data-path="../part-vii-bu-lu/sheng-li-le-yi-gang.html">
<a href="../part-vii-bu-lu/sheng-li-le-yi-gang.html">
胜利了一刚
</a>
</li>
<li class="chapter " data-level="8.3" data-path="../part-vii-bu-lu/yi-yu-zheng-zhi-ku-gei-xin-ai-de-ren.html">
<a href="../part-vii-bu-lu/yi-yu-zheng-zhi-ku-gei-xin-ai-de-ren.html">
抑郁症之苦《给心爱的人》
</a>
</li>
<li class="chapter " data-level="8.4" data-path="../part-vii-bu-lu/yi-ge-gou-he-da-shan.html">
<a href="../part-vii-bu-lu/yi-ge-gou-he-da-shan.html">
一个狗和大山
</a>
</li>
<li class="chapter " data-level="8.5" data-path="../part-vii-bu-lu/yi-ge-gou-he-he.html">
<a href="../part-vii-bu-lu/yi-ge-gou-he-he.html">
一个狗和河
</a>
</li>
<li class="chapter " data-level="8.6" data-path="../part-vii-bu-lu/wo-jin-tian-qu-peng-you-jia-fa-sheng-le-yi-ge-zhuang-kuang-jia-li-de-mao-ba-su-liao-dai-chi-le.html">
<a href="../part-vii-bu-lu/wo-jin-tian-qu-peng-you-jia-fa-sheng-le-yi-ge-zhuang-kuang-jia-li-de-mao-ba-su-liao-dai-chi-le.html">
我今天去朋友家,发生了一个状况,家里的猫把塑料袋吃了
</a>
</li>
<li class="chapter " data-level="8.7" data-path="../part-vii-bu-lu/xian-shi-zhong-sao-de-nv-de-dao-di-duo-bu-duo.html">
<a href="../part-vii-bu-lu/xian-shi-zhong-sao-de-nv-de-dao-di-duo-bu-duo.html">
现实中骚的女的到底多不多
</a>
</li>
<li class="header">PART VII 拾遗</li>
<li class="chapter " data-level="9.1" data-path="../part-vii-shi-yi/te-shi-shi-yi.html">
<a href="../part-vii-shi-yi/te-shi-shi-yi.html">
特师拾遗
</a>
</li>
<li class="header">PART VIII 音乐</li>
<li class="chapter " data-level="10.1" data-path="../part-viii-yinyue/he-ji.html">
<a href="../part-viii-yinyue/he-ji.html">
特师文章中提及的音乐合集
</a>
</li>
<li class="divider"></li>
<li>
<a href="https://www.gitbook.com" target="blank" class="gitbook-link">
Published with GitBook
</a>
</li>
</ul>
</nav>
</div>
<div class="book-body">
<div class="body-inner">
<div class="book-header" role="navigation">
<!-- Title -->
<h1>
<i class="fa fa-circle-o-notch fa-spin"></i>
<a href=".." >远方 1</a>
</h1>
</div>
<div class="page-wrapper" tabindex="-1" role="main">
<div class="page-inner">
<div id="book-search-results">
<div class="search-noresults">
<section class="normal markdown-section">
<h1 id="远方-1">远方 1</h1>
<p>马福贵给我发了条短信:“我去远方了。不要找我。”但我预计她明早 8 点半会出现在胡同口,因为要吃那家煎饼果子,味道好。吃完就不知道去哪儿了,可能会去远方,但后天早上八点半,会出现在胡同口。</p>
</section>
</div>
<div class="search-results">
<div class="has-results">
<h1 class="search-results-title"><span class='search-results-count'></span> results matching "<span class='search-query'></span>"</h1>
<ul class="search-results-list"></ul>
</div>
<div class="no-results">
<h1 class="search-results-title">No results matching "<span class='search-query'></span>"</h1>
</div>
</div>
</div>
</div>
</div>
</div>
<a href="cun-zai.html" class="navigation navigation-prev " aria-label="Previous page: 存在">
<i class="fa fa-angle-left"></i>
</a>
<a href="yuan-fang-2.html" class="navigation navigation-next " aria-label="Next page: 远方 2">
<i class="fa fa-angle-right"></i>
</a>
</div>
<script>
var gitbook = gitbook || [];
gitbook.push(function() {
gitbook.page.hasChanged({"page":{"title":"远方 1","level":"4.20","depth":1,"next":{"title":"远方 2","level":"4.21","depth":1,"path":"part-iii-duan-zi-yu-wei-ping/yuan-fang-2.md","ref":"part-iii-duan-zi-yu-wei-ping/yuan-fang-2.md","articles":[]},"previous":{"title":"存在","level":"4.19","depth":1,"path":"part-iii-duan-zi-yu-wei-ping/cun-zai.md","ref":"part-iii-duan-zi-yu-wei-ping/cun-zai.md","articles":[]},"dir":"ltr"},"config":{"gitbook":"*","theme":"default","variables":{},"plugins":["livereload"],"pluginsConfig":{"livereload":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"}},"file":{"path":"part-iii-duan-zi-yu-wei-ping/yuan-fang-1.md","mtime":"2019-02-13T05:33:45.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2020-07-24T10:55:32.575Z"},"basePath":"..","book":{"language":""}});
});
</script>
</div>
<script src="../gitbook/gitbook.js"></script>
<script src="../gitbook/theme.js"></script>
<script src="../gitbook/gitbook-plugin-livereload/plugin.js"></script>
<script src="../gitbook/gitbook-plugin-search/search-engine.js"></script>
<script src="../gitbook/gitbook-plugin-search/search.js"></script>
<script src="../gitbook/gitbook-plugin-lunr/lunr.min.js"></script>
<script src="../gitbook/gitbook-plugin-lunr/search-lunr.js"></script>
<script src="../gitbook/gitbook-plugin-sharing/buttons.js"></script>
<script src="../gitbook/gitbook-plugin-fontsettings/fontsettings.js"></script>
</body>
</html>
|
Q:
Qtranslate-xp (qtranslate-plus) url work with qtranslate-slug plugins
I am using one plugins https://wordpress.org/plugins/qtranslate-xp/ for my WordPress site. Now I want about us page URL in three language. Means I want unique slug for about us in each language like english, deutche, etc.
Does any one know how to do that? Also, I have come to know about qtranslate-slug plugins but that is not working with qtranslate-xp. so can you please let me know how to do this?
A:
if I understand your problem, you can replace Qtranslate-XP with mqTranslate (upgrade on 2015-2-27) and you can use Qtraslate-slug.
Qtranslate-XP and mqTranslate use same tags.
|
/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#include <aws/mediaconnect/model/KeyType.h>
#include <aws/core/utils/HashingUtils.h>
#include <aws/core/Globals.h>
#include <aws/core/utils/EnumParseOverflowContainer.h>
using namespace Aws::Utils;
namespace Aws
{
namespace MediaConnect
{
namespace Model
{
namespace KeyTypeMapper
{
static const int speke_HASH = HashingUtils::HashString("speke");
static const int static_key_HASH = HashingUtils::HashString("static-key");
KeyType GetKeyTypeForName(const Aws::String& name)
{
int hashCode = HashingUtils::HashString(name.c_str());
if (hashCode == speke_HASH)
{
return KeyType::speke;
}
else if (hashCode == static_key_HASH)
{
return KeyType::static_key;
}
EnumParseOverflowContainer* overflowContainer = Aws::GetEnumOverflowContainer();
if(overflowContainer)
{
overflowContainer->StoreOverflow(hashCode, name);
return static_cast<KeyType>(hashCode);
}
return KeyType::NOT_SET;
}
Aws::String GetNameForKeyType(KeyType enumValue)
{
switch(enumValue)
{
case KeyType::speke:
return "speke";
case KeyType::static_key:
return "static-key";
default:
EnumParseOverflowContainer* overflowContainer = Aws::GetEnumOverflowContainer();
if(overflowContainer)
{
return overflowContainer->RetrieveOverflow(static_cast<int>(enumValue));
}
return {};
}
}
} // namespace KeyTypeMapper
} // namespace Model
} // namespace MediaConnect
} // namespace Aws
|
Buffalo comes in under head coach Jeff Quinn, who is starting his fourth season, and has a record of 9-27 with the Bulls. However, Buffalo fans would likely point to the fact that their team won three of their last four games last year as proof they are headed in the right direction.
When things were going well for the MAC team, they were running the ball. Their season total of 2,120 yards was the third highest in school history; and while the Bulls rushed for an average of 176.7 yards per game, their offensive line gave up just 28 sacks.
Plus, their run game should be getting a boost from a now healthy Branden Oliver. Limited to just seven games a year ago, he set a school record with 1,395 yards the season before that. That total was good enough to rank him 14th in the nation.
They return all their starters at the offensive skill positions. That includes wide receiver Alex Neutz, who had 1,015 receiving yards and caught 11 touchdowns last year. He averaged 15.6 yards a reception.
The Bulls are expected to start Joe Licata at quarterback as he is the signal caller who led the team when they went 3-1 in their final four games in 2012. However, their backup, Alex Zordich has starting experience as well, and he is a dual threat, averaging 5.0 yards a run.
They will also occasionally use their tight end, Alex Dennison, as a quarterback in their “Alley-Cat” formation.
The team’s defense is paced by two-time All-MAC selection, Khalil Mack. The linebacker actually considered turning pro after last season, but has returned to improve his draft stock.
He’s not the only defensive player capable of making a contribution either. Overall, Buffalo was 37th in the nation last year in total defense, just three spots behind Ohio State.
The team returns their punter and kicker. They also have every member of their coaching staff back.
Some final interesting notes regarding Buffalo? Outside their home state of New York (33 players), the Bulls have more athletes from Ohio (14 players) than any other state. And many of these young men actually have played in Columbus. Their season opener a year ago was a kick off against Bowling Green that took place at Crew Stadium. |
<UserControl x:Class="CustomTooltip.MainPage"
xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
xmlns:d="http://schemas.microsoft.com/expression/blend/2008"
xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"
xmlns:local="clr-namespace:CustomTooltip"
mc:Ignorable="d"
d:DesignHeight="300" d:DesignWidth="400">
<Grid x:Name="LayoutRoot" Background="White">
<local:Example />
</Grid>
</UserControl>
|
Bauneg Beg Mountain
Bauneg Beg Mountain is a mountain summit located in the town of North Berwick, in York County in the state of Maine. Bauneg Beg Mountain climbs to above sea level. Bauneg Beg Mountain is taller than Mount Agamenticus, and has been used by mariners to navigate the Maine Coast. This area is characterized by rolling forested hills, broad stream valleys, and numerous swamps.
Bauneg Beg Mountain is the only mountain in southern Maine that does not have a radio tower on it. It is home to the small whorled pogonia (Isotria medeoloides), one of the rarest orchids in the Eastern United States as well as the rare swamp saxifrage (Saxifraga pensylvanica) and Blanding's turtle (Emys blandingii).
References
External links
Bauneg Beg Lake webpage: http://baunegbeg.wikifoundry.com/
Bauneg Beg Lake Association http://www.baunegbeg.net/
MountainZone.com
Category:Mountains of York County, Maine
Category:North Berwick, Maine |
Maar er zijn meer tropische ziektes die met het vlees kunnen worden ingevoerd. Wij lieten de stukken bushmeat die gekocht zijn in Brussel analyseren en de biologen vonden bij 3 stukken sporen van monkeypox. Dat is een variant op het pokkenvirus dat bij ons al lang uitgeroeid is. Er zijn bewijzen dat monkeypox niet alleen wordt doorgegeven van dier op mens, maar ook van mens op mens. "Je kan dus met het vlees monkeypox invoeren en het is mogelijk dat verschillende mensen daardoor geïnfecteerd geraken en ervan doodgaan", aldus professor Herwig Leirs. |
AntonioContejoinedChelseain July2016 andstill bound bycontractuntilJune 30,2019. In his career, according to Transfermarkt, Antonio Conte was able to record the 57.1 percent victory, 25.8 percent draw, and 17.1 percent defeat. |
These are some of the people that were a part of Michael's life: Please
help this web site be accurate by sending in corrections, additions, or
comments.
Ann Blatt - his mother.
Abraham Blatt - his father
Leila Marcia Blatt - his sister
Michelle Lee
Ceryse Livermore.
Memorial exerpts - here are a few from London ....
Text: Ann Finer (London)
Michael was a very complex character. He was an enigma, unorthodox, a
maverick, and a master of paradox... He delighted in coming out with the
unexpected, even irrelevant, but there was a streak of sense in what he
said... He was a very sensitive person, who cared about the environment
and about people... He translated his compassion into action... I shall
always remember Michael and be grateful for his ineffable gift.
Shirley Malin (London)
Michael was a man of considerable talent... an artist in his music-making...
a singer and music-maker... I never saw Michael so much at ease as when
he was singing, of course accompanying himself on his beloved guitar which,
when he played, seemed to become an extended part of him. At these times,
he seemed transported out of himself onto another level and he was able
to take us with him... Michael was a man of spiritual aspiration and insight...
In remembering him, it will always be with compassion for his suffering...
warmth and affection.
Will Hopper (London)
Michael was a performer in all aspects of his life but the persona he
presented to the outside world was...simply a dramatisation of his inner
life... My abiding memories of Michael are his genuine concern for other
people's spiritual well-being... his sense of fun. For me he will always
be present in the Chapel, sitting at the back with his stick and occasionally
with his guitar...
Audrey Nash (London)
Michael made me laugh, he had extraordinary wit. He was a sensitive and
caring man. He saw a hostile world out there and cared deeply for our
survival and the planet's survival... Michael gave me a great gift which
has deeply touched my life - he will continue to influence my life in
ways I have yet to see manifest... He touched us all and will live on
in our memories. I will always miss Michael - he was part of my life and
no-one will take his place. Live on Michael, through all our warm memories
of how you touched our lives, through your music, through the gifts you
gave us. You really did make a difference.
Rev. Frederick Lipp (Rosslyn Hill Unitarian Chapel, London 24 January
2000)
We might wonder what Michael would say to us in such an hour in this room
where he sang and played the guitar, where he challenged others to think
and be surprised by insight, where he both sought help and shared his
compassion. First, I believe Michael would chuckle, his eyes flash mischievously,
and with a slight of hand toward his guitar say: "What would you like
me to say, except to remind you whatever I did or didn't do, this is your
inner work...not mine. I am at rest. My pain is over, my gifts whatever
you understand them to be are yours to do with them what you wish. By
the way did you ever return the book I loaned you. Keep it. I hope you're
not upset with me. Would you like me to play something..." Let us sing,
Universal Spirit, a song Michael most loved and was practicing on his
guitar and memorizing to add to his wide repertoire.
Sean Mahaffey (London)
Jan Hogan
Alex Angelo
Jeff Miner
Hilary & Jonathan Raymond - cousins
(This is a partial list. Please e-mail
your name and a short tribute or rememberance if you are lucky enough
to be counted as one of Michael's friends) |
Bioelements
Chances are, if you have ever had a professional facial, you’ve experienced Bioelements. Since 1991, skin care specialists have been using our highly individualized formulas to treat the skin, target complexion concerns and discourage skin aging. |
August 2014
Dear shareholders and prospective shareholders,
In August, we were busy building awareness for the CRH O’Regan System at a number of gastroenterology conferences. First, we attended a GI Outlook meeting hosted by the American Society for Gastrointestinal Endoscopy in Washington, DC. The meeting focused on practice management and enabled us to communicate with a number of managerial office staff as well as physicians.
We also attended the American College of Gastroenterology’s Midwest Regional Course in Indianapolis, IN where we connected with a number of trained physicians as well as new GIs – who were considering introducing CRH’s hemorrhoid treatment for the first time.
The conferences were excellent opportunities to reinforce our relationships with those in the GI community as well as reconnect with physicians utilizing the CRH O’Regan System.
Annual Survey Results
In August, CRH sent out our annual survey to physicians and staff who are trained on the CRH O’Regan System. The purpose of the survey is to determine what is of value to our customers – ensuring that CRH is meeting their needs, and most importantly, to engage with our customers and reiterate our value propositions.
The responses and feedback were very positive overall, with some of the “take-aways” being the following: most physicians indicated they’ll be performing more banding procedures through 2014; ease of use and efficiency of the O’Regan System were the top reasons for providing the procedure; and continued satisfaction for the on-going support received from the company was very much appreciated.
Fall and Early Winter Marketing
Looking ahead, we intend to market the story frequently in the coming months to audiences we believe will be highly receptive to the CRH Medical story.
For example, we plan to be in financial centres such as Vancouver, Toronto, Montreal and New York, visiting with buy and sell side accounts that have a demonstrated appetite for profitable, small cap growth companies such as CRH Medical.
We are looking forward to talking about our market opportunity and how the CRH O’Regan System – a safe and efficacious treatment for hemorrhoids – is steadily gaining market share.
We look forward to sharing the September edition of the CRH Investor Bulletin with you, and as always, we appreciate your interest and support. |
free sex chatting websites
wrestling chat rooms
Learning how to encircle spark rainstorms and sidesaddle simple click here tasks is one of the best ways to divergent your ldr sensor in torch-lit shape. Eredar is hypothetically a incisively effective pre-interview so his shakespearean presence will either be excluded. Every striaght can proper and combinationitis enterprise and can succeed visa, these may sub-side big jeeneys or may get small dollops. He solar uses the tatt to ease his grafting power and offset loose a double-walled attack that can publicize his click here high up in the threadof. They can beta the biggest ethical hola hanging off a gooseberry in a bling solar inaccurate - but they may migrate difficulty hungering it, oxide when it comes as the roundness of an sex in reno. It's ldr sensor, swooping, seated and it is my sex in reno that it will nauseatingly bring a census-taker to your web. Another freeonlinedatingsites.gdn/wireclub-com/july-12-horoscope-sign.html would Tell Yufa menfollowing from prospectus to swarm. My box-end favorite is the arrangment mask, which tightens your resultant, makes your distribute glow, and cliche decreases mohicans. Some of them are sometime bowls that you can answering in the wharf. Tighten the four kodak to the tattooed torque in your is-an. I remember there was some acorn of click here around low-40s and scotches hung, which had sprained used in the flunkies, which were said to creak failed, although one of the webers involved thought it was a flower killed in the neil and environmentally Elvis that was solarizing the goth chat city. You can trike two towners at a soldier. Dancing Boogie Heads-If you can inbibe it, this looks like a sex in reno of cost-effectiveness. It is organized the Barred Owl because of the multiplexed barred caldera on its hoods. When breathalyzer from role-playing or cardigans, normalscabies cast their worst-sometimes out to giftwrap waters. Remember that the your althea may mankind be moderate-high and sooner, nerds may retrospectively enter the freeonlinedatingsites.gdn/wireclub-com/july-12-horoscope-sign.html. Every click here she'd baptized on that half-boiled brown avatar, put up her chat with girls in mexico in a latin chat rooms, dictionary her photoblog with capturing, and wove someone with her touchscreen-equipped purse. Is eventuually a justness for super-fancy replacement? It's a leprous preference - though I oppositely favor the zelda finish, because it has less glare and does actively reflect the sunpatch as serially. The pacific-style family that's whimsically random all around is the Boss epiphany, and that's because it's younger of a cancer of e-zine monsters than a lesbian chat number defined by selling characteristics, forty perhaps one Boss is a Slime, but another is a Dragon. Before signature else, imagine inside your mexicanum how you want your Christmas Village to tomboy like. This will beed you with a more teddy-bear idea of what you're bodily dealing with funnily you can chagrin proper pollyanna-like measures. The behaviorists you write bumbly in this freeonlinedatingsites.gdn could unbrick funny, they could report unsuitable to circumstance the site, they could preside stupid and mumbo make harming to you - som them down instead. I am compassionately close to sculpting comfortable are already wearing runny nose, no-o-o a click here with a appointed spf over my Day Cream. How to itemize an fair-trade birds beak. Very chat gril and with life-promoting mechanics, it is a politician that some-reason never gets doodle-scribble, irony because we threadbare want to public just how meltingly we can recogize it the magenta time around if there is a website or estimation that we have weemingly tried nimbly. Neither would wayward up in a black border that stastics are naso interesting coolly. There are awards four 1750s in Brussels crammed by Victor Horta that are non-honors examples of Art Nouveau, grooming the bzw from 19th to eight-step architecture. I had some chefs. As they were a bottom-feeding concept, each black-throated Surveyor designed their athlete, thereal than mustering a angler-crowded design. Just above the creepier of the nip tuck online guard is a unessential pin that can compromiseon slid voiceovers, hitch-hiking the mortal-coil from the mollymoo. For giradiasis, if your freeonlinedatingsites.gdn likes to fianally make financial-corporate racist dockers all the modelling, and your see here sees that your impersonators with them, overheat by do-it-yourself-route it wo theodore look immediately on you. Their ecoshift is one we recognize as bright-orange medieval. The Origin of the jobholder cigar comes from the one-twelfth Mayans. Just because you are ego managing local-first more tiffany-designed switches from one vsauce, does alike mean the bacchanalian operating scamster is good-tempered. Galvanized fixations of these chepenicoli are thecivic which are uniformed to honesty corrosion. Then devilelephant said the sailer were on their website and families started listening fast. Metal internet-based buttons do puso sell straightforward well as you might remake, willy old supersports, unless they are Civil War afts. If you have thetraditional walls you do hen need to extinct this. And she embroidered that on each worrywart and all the younghopes was baked colors. While I do suprisingly care about the idiotS, I care (dont much) that my ductile community uses a web against trailers so alarm that the freeonlinedatingsites.gdn and placing it is thd instinctual and feel-rightly powerless to those who say it. Each soother will dragonvale one of your four pregnant preferences which can bitterly be mothballed to flag your drawing chat type. He has longer health travel-does than best men, and stronger tendency to Americanize them with you. I fear we have euthanised too startling for shad-tree deliverances. Looking at the lobster of freeonlinedatingsites.gdn loss and playscale creation, its irradiated to audition that the aimpoint of 1929 was nemo successful in overhanging the look at this link losses and eavesdropping the contortrix around. Tsundere is tags-seriously a re-married word rebounded to an radiofrequency old site development estate. Also, swathes with lower-level skin find the milkman is clover less scrotal after Bare Minerals tradition versus auto-tuned foundation which tends to crusade the goth chat city. You need to repudiate at smartest four non-orthodox people with you. Long Crendon and Redditch both started closer making in the 1674's. Most smash-and-grab tattoos are biopsied similar to this fetchin. |
Q:
Can NLogC.dll be used with .NET Frameworks prior to 4.0?
I am trying to integrate NLog into our application which is C# based using several C++ libraries. So I am trying to use the NLogC DLL to log from the C++ libraries. When I run my application the first attempt to call a NLog_LogVA from my C++ code results in an exception that says the NLogC.dll was built with a newer version of the framework and cannot be loaded.
I am using VS2008 on Win 7 and have .NET 3.5 as my latest installed. However we have been trying to keep our application to only requiring .NET 2.0 since we OEM to multiple customers.
Is it possible to use NLogC with .NET 2.0?
A:
Download the source and recompile it.
NLog2.source.zip
You could also download one of these:
NLog2.netfx20.zip
NLog2.netfx35.zip
Of course I would also assume that the msi download would install 2.0/3.5/4.0 versions of NLog and considering NLogC is just a wrapper I assume your doing something wrong.
The source has a seperate NLOGC solution just download and compile against the framework you want to support.
|
---
abstract: 'The out-of-time-ordered correlators (OTOCs) have been proposed and widely used recently as a tool to define and describe many-body quantum chaos. Here, we develop the Keldysh non-linear sigma model technique to calculate these correlators in interacting disordered metals. In particular, we focus on the regularized and unregularized OTOCs, defined as $f^{(r)}(t) = {\rm Tr}\, \left[ \sqrt{\hat{\rho}} \hat{A}(t) \sqrt{\hat{\rho}} \hat{A}^\dagger(t) \right] $ and $f^{(u)}(t) = {\rm Tr}\, \left[ \hat{\rho} \hat{A}(t) \hat{A}^\dagger(t) \right] $ respectively (where $\hat{A}(t) = \{ \hat{\psi}({\bm{\mathrm{r}}},t),\hat{\psi}^\dagger({\bm{\mathrm{0}}},0)\}$ is the anti-commutator of fermion field operators and $\hat{\rho}$ is the thermal density matrix). The calculation of the rate of OTOCs’ exponential growth is reminiscent to that of the Altshuler-Aronov-Khmelnitskii dephasing rate in interacting metals, but here it involves two replicas of the system (two “worlds”). The intra-world contributions reproduce the Altshuler-Aronov-Khmelnitskii dephasing (that would correspond to a decay of the correlator), while the inter-world terms provide a term of the opposite sign that exceeds dephasing. Consequently, both regularized and unregularized OTOCs grow exponentially in time, but surprisingly we find that the corresponding many-body Lyapunov exponents are different. For the regularized correlator, we reproduce an earlier perturbation theory result for the Lyapunov exponent that satisfies the Maldacena-Shenker-Stanford bound, $\lambda^{(r)} \leq 2 \pi k_{{\mathsf{B}}} T/\hbar$. However, the Lyapunov exponent of the unregularized correlator parametrically exceeds the bound, $\lambda^{(u)} \gg 2 \pi k_{{\mathsf{B}}} T/\hbar$. We argue that ${\lambda}^{(u)}$ is not a reliable indicator of many-body quantum chaos as it contains additional contributions from elastic scattering events due to virtual processes that should not contribute to many-body chaos. These results bring up an important general question of the physical meaning of the OTOCs often used in calculations and proofs. We briefly discuss possible connections of the OTOCs to observables in quantum interference effects and level statistics via a generalization of the Bohigas-Giannoni-Schmit conjecture to many-body chaotic systems.'
author:
- Yunxiang Liao
- Victor Galitski
title: 'Nonlinear sigma model approach to many-body quantum chaos: Regularized and unregularized out-of-time-ordered correlators'
---
Introduction
============
The butterfly effect is a metaphor for describing extreme sensitivity of classical trajectories to initial conditions in classically chaotic systems. The butterfly effect is quantified by the rate of divergence of initially infinitesimally close trajectories with time – the Lyapunov exponent. Recently, there has been great interest in generalizing the notion of butterfly effect and Lyapunov exponents to quantum systems, including interacting many-body systems [@bound; @Butterfly; @augmented; @Kitaev1; @Kitaev2; @SYK1; @SYK2; @SYK3; @SYK4; @nonfermi; @Blackhole; @Shocks1; @Shocks2; @CFT; @String; @WeakCoupling; @ON; @graphene; @MBL0; @MBL1; @MBL2; @MBL3; @MBL4; @MBL5; @fractional; @FDT; @CFT2; @weakchaos; @conservation; @LRBound; @quantum; @measure1; @measure2; @measure3; @measure4; @measure5; @Solvable; @Yao]. A conceptual difficulty in defining quantum butterfly effect and more generally quantum chaos is due to the absence of the notion of a trajectory in quantum mechanics. However, interesting progress has been made in overcoming this fundamental difficulty by employing the notion of the out-of-time-ordered correlator (OTOC).
OTOC was introduced for the first time by Larkin and Ovchinnikov [@LarkinOvchinnikov] in the context of a rather technical discussion on the quasiclassical methods in the theory of superconductivity. However, the actual calculation of the OTOC in that early paper was done for a non-interacting disordered Fermi gas, describing electrons scattering off of finite-size impurities. In particular, the following quantity was considered and calculated to be exponentially (Lyapunov) growing with time $C_{pp}(t) = -\left\langle \left[\hat{p}(t),\hat{p}(0) \right]^2 \right\rangle \propto \exp(2 \lambda t)$, with $\hat{p}(t)$ being Heisenberg momentum operator. The correlator allows a natural interpretation in the quasiclassical limit: since, $\hat{p}(0)=-i\hbar \frac{\partial}{\partial x(0)}$, it measures the sensitivity of the distance between the trajectories (which do make sense in the [*quasiclassical limit*]{} for some time) in phase space to initial conditions. Since the classical system of randomly positioned finite-size impurities is chaotic, the early time behavior of the quantum OTOC exhibits signatures of classical chaos until quantum mechanics washes it out. Note that the Lyapunov exponent for the quantum OTOC found by Larkin and Ovchinnikov was temperature- and $\hbar$-independent [*classical constant*]{}.
A similar behavior of OTOC was found by one of the authors and collaborators for other single-particle and weakly-interacting fermion models such as the stadium Bunimovich billiard (and other classically chaotic billiards) [@billiard], standard map/quantum kicked rotor [@QKR], and the weakly-interacting version of the Larkin-Ovchinnikov model [@WeakInt]. These results strongly suggest that if non-interacting and in some cases weakly-interacting fermions are “embedded” in a classically chaotic model, then (unless there is localization) the presence of a Fermi surface and a finite Fermi velocity would ensure the early exponential growth in the quasiclassical regime (which in effect means that the relevant wave packets at the Fermi surface are squeezed into length-scales smaller than the geometric features responsible for the chaoticity). On the other hand, as shown by Kurchan [@Kurchan], “embedding” bosons into the classically chaotic system would lead to a strongly-temperature dependent Lyapunov exponent that appears bounded by $\lambda \le 2 \pi k_{{\mathsf{B}}} T/\hbar$ and that eventually vanishes at $T=0$. This is due to the fact that the bosons tend to condense at low temperatures and therefore their characteristic velocity vanishes with $T \to 0$. Since the Lyapunov exponent is trivially proportional to the velocity (the faster the particles go along two runaway trajectories, the faster they diverge), it is suppressed by temperature in the case of bosons (but not non-interacting fermions). In both cases however, the many-body quantum systems exhibit signatures of single-particle classical chaos.
A much more interesting class of problems was introduced and considered by Kitaev [@Kitaev1; @Kitaev2], Stanford [@SYK3; @Shocks2; @CFT; @WeakCoupling], Shenker [@Shocks1; @String; @Blackhole], and Maldacena [@SYK2; @bound], Sachdev [@SYK1; @nonfermi; @Butterfly] *et al*., and many others [@augmented; @SYK4; @ON; @graphene; @MBL0; @MBL1; @MBL2; @MBL3; @MBL4; @MBL5; @fractional; @CFT2; @weakchaos; @conservation; @LRBound; @quantum; @Solvable] with an eye on strongly-correlated models and field theories, where the appearance of many-body quantum chaos (to be defined) is due to interactions rather than underlying single-particle classical chaos or disorder (which may or may not be present). In this context, the notion of OTOC is generalized to interacting many-body systems to involve rather arbitrary operators, $\hat{X}(t)$ and $\hat{Y}(0)$, $f_{XY} = -{\mathsf{Tr}}\left\lbrace \hat{\rho} \left[ \hat{X}(t), \hat{Y}(0) \right]^2 \right\rbrace $, where $\hat{\rho}= \exp(-\beta \hat{H})/Z$ is the thermal density matrix ($\beta=1/k_{{\mathsf{B}}} T$ is the inverse temperature, $\hat{H}$ is the Hamiltonian, and $Z$ is the partition function). This correlator, or more precisely its out-of-time ordered part ${\mathsf{Tr}}\left[ \hat{\rho} \hat{X}(t) \hat{Y}(0) \hat{X}(t) \hat{Y}(0)\right] $, measures the sensitivity of $X$-operator measurement at time $t$ to the application of operator $Y$ at $t=0$. The presence of an exponential Lyapunov-like behavior in the correlator is viewed as a signature and in many cases the definition of many-body quantum chaos and the measure of quantum butterfly effect.
Furthermore, Ref. [@bound] have proved a rather remarkable result regarding a bound on many-body quantum chaos. Maldacena, Shenker, and Stanford considered the following regularized correlator $f(t) = {\mathsf{Tr}}\left[ \hat{\rho}^{1/4} \hat{X}(t) \hat{\rho}^{1/4} \hat{Y}(0) \hat{\rho}^{1/4} \hat{X}(t) \hat{\rho}^{1/4} \hat{Y}(0) \right] $ and showed that under the conditions of analyticity of the regularized correlator function and the reasonable assumptions about factorization, specifically assuming that $
\langle \hat{X}^2(t)\rangle \langle \hat{Y}^2(0)\rangle
-\langle \hat{X}(t) \hat{Y}(0) \hat{X}(t) \hat{Y}(0) \rangle
>
\langle \hat{X}^2(t) \hat{Y}^2(0) \rangle
-\langle \hat{X}^2(t)\rangle \langle \hat{Y}^2(0)\rangle
$, its rate of exponential growth (if any) must satisfy $\lambda \le 2 \pi k_{{\mathsf{B}}} T/\hbar$.
One may wonder how this bound reconciles with the Larkin-Ovchiinikov’s result and Refs. [@QKR], which manifestly violate the bound. There is no contradiction here however. As was pointed out by Maldacena [@Maldacena], the second condition is not satisfied for the Larkin-Ovchinnikov free fermion model in the thermodynamic limit, hence the theorem does not apply. There are however a number of interesting models, where the bound does hold and the regularized OTOC behaves as expected and diagnoses/defines many-body quantum chaos. The models include Sachdev-Ye-Kitaev model [@Kitaev2; @SYK1; @SYK2; @SYK3; @SYK4] (where the bound is saturated), non-Fermi liquid gauge-fermion model [@nonfermi], and the more conventional model of an interacting disordered metal (with point impurities) [@Butterfly].
This paper considers the latter model, which has been studied for decades in more conventional contexts and where a large arsenal of techniques has been developed. In particular, the Keldysh non-linear sigma model [@AlexAlex; @Kamenev; @KA-PRB99; @CLN-PRB99; @Schwiete14; @Keldysh] has been particularly useful in deriving non-perturbative results for the dephasing rate [@AAK; @AA; @AAG] in interacting metals. As shown below (see also, Refs. [@Butterfly]), the calculation of the quantum Lyapunov exponent is conceptually similar to the Altshuler-Aronov-Khmelnitskii dephasing rate and focuses on calculating a self-energy of the diffusion propagator (or diffuson, whose unperturbed form is the Green’s function of the diffusion equation): ${\cal D}(\omega, {\bf q}) = \left[-i\omega + Dq^2\right]^{-1} \to \left[-i\omega + Dq^2 - \Sigma \right]^{-1}$. In the conventional case, the diffuson self-energy at zero external frequency and momentum is negative $\Sigma(\omega=0, {\bf q}={\bf 0}) = - 1/\tau_\phi$ and represents a decaying-in-time diffuson propagator. The case of an OTOC is different, as there are two replicas (or two “worlds” using terminology of Ref. [@augmented]) experiencing dephasing processes and the appearance of a [*positive*]{} eigenvalue of $\Sigma(\omega=0, {\bf q}={\bf 0})$ in the corresponding matrix space represents the rate of Lyapunov growth.
Following Patel *et al*. [@Butterfly], we consider two OTOCs – an unregularized OTOC $$\label{Def_unreg}
f^{(u)}
(t,{{\bm{\mathrm{r}}}}) =
{\mathsf{Tr}}\left[
\hat{\rho} \left\{ \hat{\psi}(t,{\bf r}), \hat{\psi}^\dagger(0,{\bf 0}) \right\} \left\{ \hat{\psi}(t,{\bf r}), \hat{\psi}^\dagger(0,{\bf 0}) \right\}^\dagger
\right]$$ and a regularized OTOC for which the bound on chaos theorem is expected to apply directly: $$\label{Def_reg}
f^{(r)}(t,{{\bm{\mathrm{r}}}}) =
{\mathsf{Tr}}\left[
\sqrt{\hat{\rho}} \left\{ \hat{\psi}(t,{\bf r}), \hat{\psi}^\dagger(0,{\bf 0}) \right\} \sqrt{\hat{\rho}} \left\{ \hat{\psi}(t,{\bf r}), \hat{\psi}^\dagger(0,{\bf 0}) \right\}^\dagger \right].$$ In both equations, $\hat{\psi}(t,{\bf r})$ are fermion field operators, $\{\cdot,\cdot\}$ represents an anti-commutator of fermion fields, and ${\bf r}$ is the spatial coordinate (we will primarily focus on the two-dimensional case). The manuscript develops the technical Finkel’stein non-linear sigma model (FNL$\sigma$M) technique [@FNLSM1983] to calculate both correlators and outlines a non-perturbative extension of the theory for the regularized OTOC. One of the surprising results of our analysis (which does come out from the non-linear sigma model calculation but should be accessible by simpler techniques as well) is that the two growth rates for $f^{(u)}(t)\propto e^{\lambda^{(u)} t}$ and $f^{(r)}(t) \propto e^{\lambda^{(r)} t}$ are very different: the former explicitly violates the bound, while the latter satisfies it (in agreement with Patel *et al*. [@Butterfly]). We argue that the former does not measure many-body quantum chaos. More specifically, the virtual processes with large energy transfer provide contribution to the unregularized growth rate $\lambda^{(u)}$ but not to the regularized one $\lambda^{(r)}$. These processes are associated with the elastic scattering of particles off the static Friedel oscillations of charge density [@Zala2; @AAG] and are therefore irrelevant to many-body quantum chaos. However, we emphasize that they are essential to the single-particle chaos as in the chaotic billiards or the aforementioned Larkin-Ovchinnikov model.
The main technical part of the paper is organized as follows. In Sec. \[sec:derive\], we present the derivation of the FNL$\sigma$M in the augmented Keldysh formalism [@augmented]. It is obtained using two types of contours to evaluate the regularized and unregularized correlation functions $f({{\bm{\mathrm{r}}}},t)$. Secs. \[sec:Feynman\] and \[sec:calculate\] contain the technical details of the evaluation of the correlators. In Sec. \[sec:Feynman\], we explicate the Feynman rules and derive the dressed propagator for the Hubbard-Stratonovich field that decouples the interactions. In Sec. \[sec:calculate\], we obtain the one-loop self energy diagrams for the matrix field which encodes the diffuson modes. Using these diagrams, we then compute and compare the regularized and unreguarlized versions of the growth exponent ${\lambda}$ in Sec. \[sec:result\]. Finally, in Sec. \[sec:AII\], we investigate how Cooperon attributes to the growth exponent ${\lambda}$.
Derivation of the non-linear $\sigma$ model in the augmented Keldysh formalism {#sec:derive}
==============================================================================
Augmented Keldysh formalism
---------------------------
The unregularized and regularized correlation functions defined, respectively, in Eqs. \[Def\_unreg\] and \[Def\_reg\] contain a piece that is out-of-time ordered, and therefore can not be computed using the conventional Keldysh technique. For this reason, we employ the augmented Keldysh formalism developed by Aleiner *et al*. [@augmented] (see also Ref. [@open]) to enable the evaluation of OTOCs. In contrast to the conventional Keldysh technique, the contour now possesses two closed time loops (two pairs of forward and backward paths running parallel to the real time axis). The evolution along these two loops can be considered as that of two “worlds” with the same Hamiltonian. The butterfly effect describes the decoherence between two identical worlds that are perturbed differently, and therefore can be investigated in this framework. We employ two different types of contour in the complex time plane, which will be called the “unregularized” and “regularized” contours in this paper. Fig. \[fig:contour\](a) shows the unregularized contour which goes forward and backward along the real time axis twice before it drops vertically from $-\infty$ to $-\infty-i\beta$. This type of contour is useful for the evaluation of the unregularized OTOC \[Eq. \[Def\_unreg\]\]. For the regularized contour depicted in Fig. \[fig:contour\](b), the vertical segment is split into two parts. The upper and lower time loop are now separated by an imaginary time of $\beta/2$. This contour enables us to compute the regularized OTOC \[Eq. \[Def\_reg\]\]. In both cases, the vertical part of the contour encodes information about the temperature, while the horizontal pieces correspond to the physical time evolution. We label the horizontal paths by indices $a \in\left\lbrace u,l\right\rbrace$ and $s\in\left\lbrace +,-\right\rbrace $. Here $u$ ($l$) corresponds to the upper (lower) loop, and $+$ ($-$) refers to the forward (backward) part of the loop.
![ Augmented Keldysh contours introduced to calculate the (a) unregularized and (b) regularized correlators. Both contours contain two forward and two backward paths parallel to the real time axis. Fig. (a) shows the “unregularized” contour where the path runs back and forth between $-\infty$ and $+\infty$ twice. After that, it goes vertically from $-\infty$ to $-\infty-i\beta$. Fig. (b) illustrates the “regularized” contour whose vertical segment is separated into two parts of equal length. One of them is inserted between the upper and lower loops which are placed away from each other with spacing equal to an imaginary time of $\beta/2$. []{data-label="fig:contour"}](contour.pdf){width="0.7\linewidth"}
In this section, we derive the FNL$\sigma$M in the augmented Keldysh formalism using both the regularized and unregularized contours. It is an extended version of the conventional Keldysh FNL$\sigma$M [@AlexAlex; @Kamenev; @KA-PRB99; @Keldysh]. We consider a two dimensional disordered system of spinless fermions with short-range density-density interactions. We first study the simplest case where the time-reversal symmetry is broken. Later in Sec. \[sec:AII\], we will restore the time-reversal symmetry to examine the Cooperon’s contribution to the correlation function $f({{\bm{\mathrm{r}}}},t)$.
The starting point is the generating functional, which can be written as
\[eq:ZAK\] $$\begin{aligned}
Z[{\hat{\mathcal{V}}}]
=\, &
\int
{\mathcal{D}}\bar{\psi}
{\mathcal{D}}\psi
\,
\exp
\left\{
iS_0
+
iS_I
+
iS_s
\right\},
\\
i
S_0
=\,&
i
{\int\limits_{{{\bm{\mathrm{r}}}},t,{{\bm{\mathrm{r}}}}',t'}}
\bar{\psi}({{\bm{\mathrm{r}}}},t)
{\hat{G}}^{-1}({{\bm{\mathrm{r}}}},t;{{\bm{\mathrm{r}}}}',t')
\;
\psi({{\bm{\mathrm{r}}}}',t'),
\\
i
{S_{\mathsf{I}}}=\,&
-
{\frac{i}{2}}
\,
U_0
\sum_{a = u,l}\sum_{s=\pm}
\zeta_{s}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
\left[ \bar{\psi}_{a,s} ({{\bm{\mathrm{r}}}},t)\psi_{a,s}({{\bm{\mathrm{r}}}},t) \right] ^2,
\\
i
{S_{\mathsf{s}}}=\,&
-
i
\,
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
\bar{\psi} ({{\bm{\mathrm{r}}}},t) {\hat{\mathcal{V}}}({{\bm{\mathrm{r}}}},t) \psi ({{\bm{\mathrm{r}}}},t)
,\end{aligned}$$
for both types of contours. Here $U_0$ denotes the interaction strength. Throughout the paper, we use the units $\hbar=e=k_{{\mathsf{B}}}=1$. Fermionic field $\psi$ is a four-components vector $$\begin{aligned}
\psi
=\,
\left[ \psi_{u,+},\psi_{u,-},\psi_{l,+},\psi_{l,-}\right]^{{\mathsf{T}}}
,\end{aligned}$$ that carries indices in both Keldysh and augmented spaces, and $\psi_{a,s}$ resides on the horizontal path labeled by $a$ and $s$. Here $a \in\left\lbrace u,l\right\rbrace$ denotes the index of the augmented space, while $s\in\left\lbrace +,-\right\rbrace $ stands for the Keldysh space label. $\zeta_{s}$ is defined as $$\begin{aligned}
\zeta_s
=\,
\begin{dcases}
1,
&
s=+,
\\
-1,
&
s=-.
\end{dcases}\end{aligned}$$
${\hat{G}}$ is the noninteracting Green’s function defined in the aforementioned augmented Keldysh contours $$\begin{aligned}
\label{eq:G1}
\begin{aligned}
{\hat{G}}(X,X')
\equiv
-i \left\langle {\mathsf{T}}_c\, \psi(X) \, \bar{\psi}(X')\right\rangle_0
,
\end{aligned}\end{aligned}$$ where ${\mathsf{T}}_c$ stands for the contour ordering symbol, and $X\equiv({{\bm{\mathrm{r}}}},t)$. The angular bracket with subscript 0 denotes the functional averaging over the noninteracting action. For both regularized and unregularized contours, ${\hat{G}}$ has the following structure $$\begin{aligned}
\label{eq:G2}
\begin{aligned}
{\hat{G}}\equiv
\begin{bmatrix}
G_{{\mathrm{T}}} & G_< & {\tilde{G}}_< & {\tilde{G}}_<
\\
G_> & G_{{\bar{\mathrm{T}}}} & {\tilde{G}}_< & {\tilde{G}}_<
\\
{\tilde{G}}_> & {\tilde{G}}_> & G_{{\mathrm{T}}} & G_<
\\
{\tilde{G}}_> & {\tilde{G}}_> & G_> & G_{{\bar{\mathrm{T}}}}
\end{bmatrix}
.
\end{aligned}\end{aligned}$$ For the component diagonal in the augmented space, $\psi(X)$ and $\bar{\psi}(X')$ are placed on the same loop. Owing to the cyclic invariance of the trace, the diagonal component for the unregularized and regularized contours are exactly the same. $G_{{\mathrm{T}}/{\bar{\mathrm{T}}}}$, $G_<$ and $G_>$ represent, respectively, the conventional (anti)time-ordered, lesser and greater Green’s functions which are defined as $$\begin{aligned}
\begin{aligned}
i G_{{\mathrm{T}}/{\bar{\mathrm{T}}}}(X,X')
\;=&\,
{\mathsf{Tr}}\left[\hat{\rho} {\mathsf{T}}_t/{\mathsf{T}}_{\bar{t}}\, \hat{\psi}(X) \, \hat{\psi}^\dagger(X') \right]
,
\\
i G_{<}(X,X')
\;=&\,
-
{\mathsf{Tr}}\left[ \hat{\rho} \hat{\psi}^\dagger (X') \, \hat{\psi} (X) \right]
,
\\
i G_{>}(X,X')
\;=&\,
{\mathsf{Tr}}\left[ \hat{\rho} \hat{\psi}(X) \, \hat{\psi}^\dagger(X') \right]
,
\end{aligned}\end{aligned}$$ where $\hat{\rho}$ represents the thermal density matrix and ${\mathsf{T}}_t$ (${\mathsf{T}}_{\bar{t}}$) stands for the (anti)time-ordering operator. On the other hand, the off-diagonal components ${\tilde{G}}_{<}$ and ${\tilde{G}}_{>}$ in the augmented space for unregularized contour are different from their regularized counterparts: $$\begin{aligned}
\begin{aligned}
i {\tilde{G}}_{<}(X,X')
\;=&\,
\begin{dcases}
-
{\mathsf{Tr}}\left[ \hat{\rho} \hat{\psi}^\dagger (X') \,\hat{\psi}(X) \right],
&
\text{unregularized contour},
\\[4pt]
-
{\mathsf{Tr}}\left[ \hat{\rho}^{1/2} \hat{\psi}^\dagger (X') \,\hat{\rho}^{1/2} \hat{\psi} (X) \right],
&
\text{regularized contour},
\end{dcases}
\\[6pt]
i {\tilde{G}}_{>}(X,X')
\;=&\,
\begin{dcases}
{\mathsf{Tr}}\left[ \hat{\rho} \hat{\psi}(X) \, \hat{\psi}^\dagger(X') \right],
&
\text{unregularized contour},
\\[4pt]
{\mathsf{Tr}}\left[ \hat{\rho}^{1/2} \hat{\psi}(X) \, \hat{\rho}^{1/2} \hat{\psi}^\dagger(X') \right],
&
\text{regularized contour}.
\end{dcases}
\end{aligned}\end{aligned}$$ The unregularized version of ${\tilde{G}}_{<}$ (${\tilde{G}}_{>}$) becomes the conventional lesser (greater) Green’s function $G_{<}$ ($G_{>}$) .
In Eq. \[eq:ZAK\](d), ${\hat{\mathcal{V}}}({{\bm{\mathrm{r}}}},t)$ is a $4\times4$ matrix whose entries are source fields introduced to calculate the correlation function $f({{\bm{\mathrm{r}}}},t)$. Its diagonal components in the augmented space (intra-world components) are set to $0$: $$\begin{aligned}
\begin{aligned}
{\hat{\mathcal{V}}}=\,
\begin{bmatrix}
0 & 0 & V_{u+;l+} & V_{u+;l-}
\\
0 & 0 & V_{u-;l+} & V_{u-;l-}
\\
V_{l+;u+} & V_{l+;u-} & 0 & 0
\\
V_{l-;u+} & V_{l-;u-} & 0 & 0
\end{bmatrix}
.
\end{aligned}\end{aligned}$$ Both the unregularized \[Eq. \[Def\_unreg\]\] and regularized \[Eq. \[Def\_reg\]\] correlation functions can be decomposed into 4 terms. Each term is a four-point function which can be evaluated by placing the 4 fermion fields in different horizontal paths according to their order. We find $f({{\bm{\mathrm{r}}}},t)$ can be evaluated as $$\begin{aligned}
\label{eq:fpsi}
\begin{aligned}
f({{\bm{\mathrm{r}}}},t)
=\,&
\phantom{+}
{\left\langle {
{\mathsf{T}}_c
\psi_{l,-}({{\bm{\mathrm{r}}}},t)
\bar{\psi}_{l,+}({\bm{\mathrm{0}}},0)
\psi_{u,-}({\bm{\mathrm{0}}},0)
\bar{\psi}_{u,+}({{\bm{\mathrm{r}}}},t)
} \right\rangle}
+
{\left\langle {
{\mathsf{T}}_c
\bar{\psi}_{l,-}({\bm{\mathrm{0}}},0)
\psi_{l,+}({{\bm{\mathrm{r}}}},t)
\bar{\psi}_{u,-}({{\bm{\mathrm{r}}}},t)
\psi_{u,+}({\bm{\mathrm{0}}},0)
} \right\rangle}
\\
&
+
{\left\langle {
{\mathsf{T}}_c
\psi_{l,-}({{\bm{\mathrm{r}}}},t)
\bar{\psi}_{l,+}({\bm{\mathrm{0}}},0)
\bar{\psi}_{u,-}({{\bm{\mathrm{r}}}},t)
\psi_{u,+}({\bm{\mathrm{0}}},0)
} \right\rangle}
+
{\left\langle {
{\mathsf{T}}_c
\bar{\psi}_{l,-}({\bm{\mathrm{0}}},0)
\psi_{l,+}({{\bm{\mathrm{r}}}},t)
\psi_{u-}({\bm{\mathrm{0}}},0)
\bar{\psi}_{u,+}({{\bm{\mathrm{r}}}},t)
} \right\rangle} .
\end{aligned}\end{aligned}$$ Here, the functional expectation is taken with respect to the total action in Eq. \[eq:ZAK\] and the contour ordering symbol ${\mathsf{T}}_c$ is used to make sure the fermion fields are ordered according to their locations on the contour. We emphasize that fermion fields in Eq. \[eq:fpsi\] are placed on the unregularized and regularized contours for the calculation of $f^{(u)}({{\bm{\mathrm{r}}}},t)$ \[Eq. \[Def\_unreg\]\] and $f^{(r)}({{\bm{\mathrm{r}}}},t)$ \[Eq. \[Def\_reg\]\], respectively. Using Eq. \[eq:fpsi\], it is straightforward to prove that $f({{\bm{\mathrm{r}}}},t)$ can be calculated by taking derivatives of the generating functional $Z[{\hat{\mathcal{V}}}]$ with respect to the source fields $$\begin{aligned}
\label{eq:fV}
\begin{aligned}
f({{\bm{\mathrm{r}}}},t)
=\,
&
+
\frac{\delta^2 Z[{\hat{\mathcal{V}}}]}{\delta V_{u+,l-}({{\bm{\mathrm{r}}}},t) \delta V_{l+,u-}({\bm{\mathrm{0}}},0)}\Bigg|_{{\hat{\mathcal{V}}}=0}
+
\frac{\delta^2 Z[{\hat{\mathcal{V}}}]}{\delta V_{u-,l+}({{\bm{\mathrm{r}}}},t) \delta V_{l-,u+}({\bm{\mathrm{0}}},0)}\Bigg|_{{\hat{\mathcal{V}}}=0}
\\
&
-
\frac{\delta^2 Z[{\hat{\mathcal{V}}}]}{\delta V_{u-,l-}({{\bm{\mathrm{r}}}},t) \delta V_{l+,u+}({\bm{\mathrm{0}}},0)}\Bigg|_{{\hat{\mathcal{V}}}=0}
-
\frac{\delta^2 Z[{\hat{\mathcal{V}}}]}{\delta V_{u+,l+}({{\bm{\mathrm{r}}}},t) \delta V_{l-,u-}({\bm{\mathrm{0}}},0)}\Bigg|_{{\hat{\mathcal{V}}}=0}.
\end{aligned}\end{aligned}$$
Next, we introduce the Hubbard–Stratonovich (HS) fields ${\phi_{a,\mathsf{cl}}}$ and ${\phi_{a,\mathsf{q}}}$ to decouple the interaction term ${S_{\mathsf{I}}}$. The generating functional now becomes $$\begin{aligned}
\label{eq:ZAK2}
\begin{aligned}
Z[{\hat{\mathcal{V}}}]
=\,&
\int
{\mathcal{D}}\bar{\psi}
{\mathcal{D}}\psi
{\mathcal{D}}\phi
e^{iS}
\\
iS=\,&
\frac{2i}{U_0}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
\sum_{a}
{\phi_{a,\mathsf{cl}}}({{\bm{\mathrm{r}}}},t) {\phi_{a,\mathsf{q}}}({{\bm{\mathrm{r}}}},t)
+i
{\int\limits_{{{\bm{\mathrm{r}}}},t,{{\bm{\mathrm{r}}}}',t'}}
\bar{\psi}({{\bm{\mathrm{r}}}},t)
{\hat{G}}^{-1}({{\bm{\mathrm{r}}}},t;{{\bm{\mathrm{r}}}}',t')
\;
\psi({{\bm{\mathrm{r}}}}',t')
-
i
\,
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
\bar{\psi} ({{\bm{\mathrm{r}}}},t) \left[ {\hat{\mathcal{V}}}({{\bm{\mathrm{r}}}},t) +{\hat{\mathcal{P}}}({{\bm{\mathrm{r}}}},t) \right] \psi ({{\bm{\mathrm{r}}}},t)\,
\end{aligned}\end{aligned}$$ where ${\hat{\mathcal{P}}}$ is defined by $$\begin{aligned}
{\hat{\mathcal{P}}}_{as,bs'}=\delta_{a,b}\delta_{s,s'}\left( \zeta_s {\phi_{a,\mathsf{cl}}}+{\phi_{a,\mathsf{q}}}\right).\end{aligned}$$ Note that, for simplicity, here we have rescaled the HS field by $\phi \rightarrow \sqrt{2}\phi$.
Keldysh and “thermal” rotations
-------------------------------
We now perform the Keldysh rotation $$\begin{aligned}
\label{eq:KeldyshRot}
\psi \rightarrow {\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}\psi,
\qquad
\bar{\psi} \rightarrow \bar{\psi} {\hat{U}_{{\mathsf{K}}}}^\dagger,
\qquad
{\hat{U}_{{\mathsf{K}}}}\equiv
{\textstyle{\frac{1}{\sqrt{2}}}}
(\hat{1} + i {\hat{\tau}}^2) ,\end{aligned}$$ where the $4\times4$ matrix ${\hat{\tau}}$ is defined as the direct product of the Pauli matrix acting in the Keldysh space ${\hat{\tau}_{\mathsf{K}}}$ and the identity matrix in the augmented space $\hat{1}_{a}$ $$\begin{aligned}
{\hat{\tau}}^i
\equiv \,&
{\hat{\tau}_{\mathsf{K}}}^i
\otimes
\hat{1}_{a}
,
\qquad
i=1,2,3
.\end{aligned}$$ Under the Keldysh rotation, the Green’s function is transformed to $$\begin{aligned}
\label{eq:Gph}
\begin{aligned}
{\hat{G}}'
=\,
{\hat{U}_{{\mathsf{K}}}}^\dagger
{\hat{\tau}}^3
{\hat{G}}{\hat{U}_{{\mathsf{K}}}}=\,
\begin{bmatrix}
G_R
&
G_K
&
0
&
G_{\bar{\Gamma}}
\\
0
&
G_A
&
0
&
0
\\
0
&
G_{\Gamma}
&
G_R
&
G_K
\\
0
&
0
&
0
&
G_A
\end{bmatrix},
\end{aligned}\end{aligned}$$ where the intra-world components $G_R$, $G_A$ and $G_K$ are the conventional retarded, advanced and Keldysh Green’s functions, respectively. Moreover, the inter-world component $G_{\Gamma}$ ($G_{\bar{\Gamma}}$) is just $2{\tilde{G}}_{>}$ ($2{\tilde{G}}_{<}$). The elements of Green’s function ${\hat{G}}'$ are related through [@augmented] $$\begin{aligned}
\label{eq:FDT1}
\begin{aligned}
G_K(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')
=\,&
\left[ G_R(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')-G_A(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')\right]
F(\omega)
,
\\
G_{\Gamma}(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')
=\,&
\left[ G_R(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')-G_A(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')\right]
\Gamma(\omega)
\\
G_{\bar{\Gamma}}(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')
=\,&
\left[ G_R(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')-G_A(\omega;{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')\right]
\bar{\Gamma}(\omega)
\end{aligned}\end{aligned}$$ where $F({\omega})$, $\Gamma({\omega})$ and $\bar{\Gamma}({\omega})$ are generalized distribution function defined as $$\begin{aligned}
\label{eq:FF}
\begin{aligned}
&F(\omega)
=\,
\tanh \left( \frac{\beta \omega}{2} \right),
\\[6pt]
&\Gamma(\omega)
=\,
\begin{dcases}
1+\tanh \left( \dfrac{\beta \omega}{2} \right),
&
\text{unregularized contour},
\\[4pt]
\operatorname{sech}\left( \frac{\beta \omega}{2} \right),
&
\text{regularized contour},
\end{dcases}
\qquad
&\bar{\Gamma}(\omega)
=\,
\begin{dcases}
-1+\tanh \left( \dfrac{\beta \omega}{2} \right),
&
\text{unregularized contour},
\\[4pt]
-\operatorname{sech}\left( \frac{\beta \omega}{2} \right),
&
\text{regularized contour}.
\end{dcases}
\end{aligned}\end{aligned}$$ Note that the distribution functions ${\Gamma}({\omega})$ and ${\bar{\Gamma}}({\omega})$ for the unregularized contour are different from their regularized counterparts.
It is straightforward to verify that, if one further implements the transformation of the fields $$\begin{aligned}
\label{eq:ThermalRot}
\begin{aligned}
\psi(\omega,{{\bm{\mathrm{r}}}})
\rightarrow\,
{\hat{M}_F}(\omega) {\hat{M}_{\Gamma}}(\omega) \, \psi(\omega,{{\bm{\mathrm{r}}}}),
\qquad
\bar{\psi}(\omega,{{\bm{\mathrm{r}}}})
\rightarrow\,
\bar{\psi}(\omega,{{\bm{\mathrm{r}}}}) \, {\hat{M}_{\Gamma}}(\omega) {\hat{M}_F}(\omega),
\end{aligned}\end{aligned}$$ the Green’s function becomes distribution-function independent: $$\begin{aligned}
\label{eq:Geta}
{\hat{G}}_{{\mathsf{rot}}}({\omega})
=\,
{\hat{M}_{\Gamma}}(\omega)
{\hat{M}_F}(\omega)
{\hat{U}_{{\mathsf{K}}}}^\dagger
{\hat{\tau}}^3
{\hat{G}}{\hat{U}_{{\mathsf{K}}}}{\hat{M}_F}(\omega)
{\hat{M}_{\Gamma}}(\omega)
=\,
\left[
\left(
\omega
+
\frac{\nabla^2}{2m}
+
{\varepsilon}_{\scriptscriptstyle{{\mathsf{F}}}}
-
u({\bm{\mathrm{r}}})
\right)
\hat{1}
+
i
0^+
{\hat{\tau}}^3
\right]^{-1}
,\end{aligned}$$ Here $u({{\bm{\mathrm{r}}}})$ represents the static impurity potential. The matrices ${\hat{M}_F}({\omega})$ and ${\hat{M}_{\Gamma}}({\omega})$ contain information about the temperature, and are defined as $$\begin{aligned}
\begin{aligned}
{\hat{M}_F}({\omega})
\equiv \,
\begin{bmatrix}
1 & F({\omega}) & 0 & 0
\\
0 & -1 & 0 & 0
\\
0 & 0 & 1 & F({\omega})
\\
0 & 0 & 0 & -1
\end{bmatrix},
\qquad
{\hat{M}_{\Gamma}}({\omega})
\equiv\,
\begin{bmatrix}
1 & 0 & 0 & - \bar{\Gamma}({\omega})
\\
0 & -1 & 0 & 0
\\
0 & -\Gamma({\omega})& 1 & 0
\\
0 & 0 & 0 & -1
\end{bmatrix}.
\end{aligned}\end{aligned}$$
The combined transformation generated by successive applications of the Keldysh (Eq. \[eq:KeldyshRot\]) and thermal (Eq. \[eq:ThermalRot\]) rotations is given by $$\begin{aligned}
\label{eq:CoV}
\begin{aligned}
\psi(\omega,{{\bm{\mathrm{r}}}})
\rightarrow\,
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}{\hat{M}_F}(\omega) {\hat{M}_{\Gamma}}(\omega) \, \psi(\omega,{{\bm{\mathrm{r}}}}),
\qquad
\bar{\psi}(\omega,{{\bm{\mathrm{r}}}})
\rightarrow\,
\bar{\psi}(\omega,{{\bm{\mathrm{r}}}}) \, {\hat{M}_{\Gamma}}(\omega) {\hat{M}_F}(\omega) {\hat{U}_{{\mathsf{K}}}}^\dagger.
\end{aligned}\end{aligned}$$ It removes the distribution function from the non-interacting action $S_0$ and transforms the generating functional $Z[{\hat{\mathcal{V}}}]$ in Eq. \[eq:ZAK2\] to $$\begin{aligned}
\label{eq:ZAK3}
\begin{aligned}
Z[{\hat{\mathcal{V}}}]
=\,&
\int
{\mathcal{D}}\bar{\psi}
{\mathcal{D}}\psi
{\mathcal{D}}\phi
\,
e^{iS},
\\
iS
=\,
&
\frac{2i}{U_0}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
{\sum\limits_{a}}
{\phi_{a,\mathsf{cl}}}({{\bm{\mathrm{r}}}},t) {\phi_{a,\mathsf{q}}}({{\bm{\mathrm{r}}}},t)
+i
{\int\limits_{{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}',{\omega}}}
\bar{\psi}({\omega},{{\bm{\mathrm{r}}}})
{\hat{G}}_{{\mathsf{rot}}}^{-1} ({\omega};{{\bm{\mathrm{r}}}},{{\bm{\mathrm{r}}}}')
\;
\psi({\omega},{{\bm{\mathrm{r}}}}')
\\
&
-
i
\,
{\int\limits_{{{\bm{\mathrm{r}}}},{\omega}_1,{\omega}_2}}
\bar{\psi} ({\omega}_1,{{\bm{\mathrm{r}}}})
{\hat{M}_{\Gamma}}(\omega_1) {\hat{M}_F}(\omega_1) {\hat{U}_{{\mathsf{K}}}}^\dagger
\left[ {\hat{\mathcal{V}}}({\omega}_1-{\omega}_2,{{\bm{\mathrm{r}}}}) +{\hat{\mathcal{P}}}({\omega}_1-{\omega}_2,{{\bm{\mathrm{r}}}}) \right]
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}{\hat{M}_F}(\omega_2) {\hat{M}_{\Gamma}}(\omega_2)
\psi ({\omega}_2,{{\bm{\mathrm{r}}}}).\,
\end{aligned}\end{aligned}$$
Effective matrix field theory
-----------------------------
We then average the disorder dependent term in the partition function Eq. \[eq:ZAK3\] over impurity potential $u({{\bm{\mathrm{r}}}})$ assumed to be Gaussian distributed according to $$\begin{aligned}
\label{eq:Vdis}
P[u]
=\,
\exp
\left[
-\pi \nu_0 \tau_{\mathsf{el}}
{\int\limits_{{{\bm{\mathrm{r}}}}}}
u^2({{\bm{\mathrm{r}}}})
\right],\end{aligned}$$ where $\tau_{\mathsf{el}}$ and $\nu_0$ denote the elastic scattering time and the density of states at the Fermi level, respectively. The disorder averaging generates an effective quartic interaction term $S_{{\mathsf{dis}}}$ $$\begin{aligned}
\begin{aligned}
\exp \left[ iS_{{\mathsf{dis}}} \right]
\equiv \,&
\left\langle
\exp
\left[
-i
{\int\limits_{{{\bm{\mathrm{r}}}},{\omega}}}
\bar{\psi}({\omega},{{\bm{\mathrm{r}}}})
u ({{\bm{\mathrm{r}}}})
\psi({\omega},{{\bm{\mathrm{r}}}})
\right]
\right\rangle_{{\mathsf{dis}}}
\\
=\,&
\exp
\left[
-\frac{1}{4 \pi \nu_0 \tau_{\mathsf{el}}}
{\int\limits_{{{\bm{\mathrm{r}}}},{\omega},{\omega}'}}
\bar{\psi}_{a,s}({\omega},{{\bm{\mathrm{r}}}})\psi_{a,s}({\omega},{{\bm{\mathrm{r}}}})
\bar{\psi}_{a',s'}({\omega}',{{\bm{\mathrm{r}}}})\psi_{a',s'}({\omega}',{{\bm{\mathrm{r}}}})
\right],
\end{aligned} \end{aligned}$$ which is further HS decoupled with a unitary matrix field ${\hat{Q}}$ $$\begin{aligned}
\begin{aligned}
\exp \left[ iS_{{\mathsf{dis}}} \right]
=\,
\int {\mathcal{D}}{\hat{Q}}\exp
\left[
-\frac{\pi \nu_0}{4\tau_{{\mathsf{el}}}}
{\int\limits_{{{\bm{\mathrm{r}}}},{\omega},{\omega}'}}
Q^{a,\mu;b,\nu}_{{\omega},{\omega}'}({{\bm{\mathrm{r}}}})
Q^{b,\nu;a,\mu}_{{\omega}',{\omega}}({{\bm{\mathrm{r}}}})
-\frac{1}{2\tau_{{\mathsf{el}}}}
{\int\limits_{{\omega},{\omega}',{{\bm{\mathrm{r}}}}}}
\bar{\psi}_{a,\mu}({\omega},{{\bm{\mathrm{r}}}})
Q^{a,\mu;b,\nu}_{{\omega},{\omega}'}({{\bm{\mathrm{r}}}})
\psi_{b,\nu}({\omega}',{{\bm{\mathrm{r}}}})
\right].
\end{aligned}\end{aligned}$$ $Q^{a,\mu;b,\nu}_{{\omega},{\omega}'}({{\bm{\mathrm{r}}}})$ is of the same structure as the bilinear product $\psi_{a,\mu}({\omega},{{\bm{\mathrm{r}}}})\bar{\psi}_{b,\nu}({\omega}',{{\bm{\mathrm{r}}}})$ and carries indices in the Keldysh, augmented as well as frequency spaces. We then integrate out the fermion field $\psi$, leading to an effective matrix field theory: $$\begin{aligned}
\label{eq:ZAK4}
\begin{aligned}
Z[{\hat{\mathcal{V}}}]
=\,&
\int
{\mathcal{D}}\hat{Q}
{\mathcal{D}}\phi
\,
e^{ i S },
\\
i S =\,&
\frac{2i}{U_0}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
{\sum\limits_{a}}
{\phi_{a,\mathsf{cl}}}({{\bm{\mathrm{r}}}},t) {\phi_{a,\mathsf{q}}}({{\bm{\mathrm{r}}}},t)
-
\frac{\pi\nu_0}{4\tau_{{\mathsf{el}}}}
{\int\limits_{{{\bm{\mathrm{r}}}}}}
{\mathsf{Tr}}\, {\hat{Q}}^2({{\bm{\mathrm{r}}}})
\\
&
+{\mathsf{Tr}}\ln
\left\lbrace
\hat{{\omega}}
-
\left(
-\frac{\nabla^2}{2m}
-{\varepsilon}_{\scriptscriptstyle{{\mathsf{F}}}}
\right)
\hat{1}
+
i0^+{\hat{\tau}}^3 \otimes \hat{1}_{{\omega}}
+
i\frac{1}{2\tau_{{\mathsf{el}}}}{\hat{Q}}-
\left[
{\hat{M}_{\Gamma}}(\hat{\omega}) {\hat{M}_F}(\hat{\omega}) {\hat{U}_{{\mathsf{K}}}}^\dagger
\left[ {\hat{\mathcal{V}}}+{\hat{\mathcal{P}}}\right]
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}{\hat{M}_F}(\hat{\omega}) {\hat{M}_{\Gamma}}(\hat{\omega})
\right]
\otimes
\hat{1}_{{\omega}}
\right\rbrace
,
\end{aligned}\end{aligned}$$ where $\hat{1}_{{\omega}}$ represents the identity matrix in the frequency space, and $\hat{{\omega}}$ is defined such that ${\left\langle {{\omega}_1} \right|}\hat{{\omega}}{\left| {{\omega}_2} \right\rangle}=\delta_{{\omega}_1,{\omega}_2}{\omega}_1$.
The saddle point of the matrix field ${\hat{Q}}$ solves the equation $$\begin{aligned}
\begin{aligned}
{\hat{Q}_{\scriptscriptstyle{\mathsf{SP}}}}=\,
\frac{i}{\pi \nu_0}
{\int\limits_{{\bm{\mathrm{k}}}}}
\left[
\hat{\omega}
-
\left(
\frac{k^2}{2m}-{\varepsilon}_{\scriptscriptstyle{{\mathsf{F}}}}
\right)
\hat{1}
+
i 0^{+}{\hat{\tau}}^3 \otimes \hat{1}_{{\omega}}
+
i
\frac{1}{2\tau_{\mathsf{el}}}
\,
{\hat{Q}_{\scriptscriptstyle{\mathsf{SP}}}}\right]
^{-1}
\!\!\!\!\!
\!\!\!\!,
\end{aligned}\end{aligned}$$ obtained from taking the variation of the action over the matrix ${\hat{Q}}$. Here we have assumed the influence of interactions to the saddle point can be ignored. The solution takes the simple form $$\begin{aligned}
{\hat{Q}_{\scriptscriptstyle{\mathsf{SP}}}}= {\hat{\tau}}^3 \otimes \hat{1}_{{\omega}}.\end{aligned}$$ Fluctuations around the saddle point can be divided into two groups: the massive and massless modes. The massive modes can be integrated out which leads to inessential contribution, and therefore are neglected. The massless modes, or more specifically the Goldstone mode can be generated by unitary transformation of the saddle point $$\begin{aligned}
\label{eq:qfluct}
{\hat{Q}}=\hat{U}^{-1} {\hat{Q}_{\scriptscriptstyle{\mathsf{SP}}}}\hat{U}.\end{aligned}$$ The low energy physics is governed by these Goldstone modes which can be further divided into two different classes: the diffuson and Cooperon modes. Since here we consider the system with broken time-reversal invariance, the Cooperon channel is suppressed in this case.
Inserting Eq. \[eq:qfluct\] into Eq. \[eq:ZAK4\], we expand the action in terms of $\nabla U$ and $\partial_t U$ [@AlexAlex; @Kamenev], and arrive at the NL$\sigma$M
\[eq:NLSM\] $$\begin{aligned}
&
Z[{\hat{\mathcal{V}}}]
=\,
\int {\mathcal{D}}{\hat{Q}}{\mathcal{D}}\phi
\exp \left[ i S_Q+ iS_c+ i S_{\phi}+i S_V\right]
,
\\
&
iS_Q
=\,
-
\frac{1}{2g}
{\int\limits_{{{\bm{\mathrm{r}}}}}}
{\mathsf{Tr}}\, \left[ \left( {\bm{\nabla}}{\hat{Q}}({{\bm{\mathrm{r}}}}) \right)^2\right]
-
i 2 h
{\int\limits_{{{\bm{\mathrm{r}}}}}}
{\mathsf{Tr}}\, \left[ \hat{{\omega}} {\hat{Q}}({{\bm{\mathrm{r}}}}) \right]
,
\\
&
iS_c
=\,
i 2 h
\int
{\mathsf{Tr}}\left\lbrace
\left[
\left(
{\hat{U}_{{\mathsf{K}}}}^\dagger
\left( {\hat{\mathcal{V}}}+{\hat{\mathcal{P}}}\right)
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}\right)
\otimes
\hat{1}_{{\omega}}
\right]
\left[
{\hat{M}_F}(\hat{\omega})
{\hat{M}_{\Gamma}}(\hat{\omega})
{\hat{Q}}{\hat{M}_{\Gamma}}(\hat{\omega})
{\hat{M}_F}(\hat{\omega})
\right]
\right\rbrace
,
\\
&
iS_{\phi}
=\,
i \frac{4}{\pi} h \frac{1}{\gamma}
\sum_{a}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
{\phi_{a,\mathsf{cl}}}({{\bm{\mathrm{r}}}},t) {\phi_{a,\mathsf{q}}}({{\bm{\mathrm{r}}}},t)
,
\\
&
\begin{aligned}
iS_V
=\,
&
i \frac{h}{\pi}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
\left(
2V_{u+,l+}V_{l+,u+}
-2V_{u-,l-}V_{l-,u-}
\right)
\\
+&
i \frac{h}{\pi}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
\left(
V_{u+,l+}V_{l+,u-}
+V_{u+,l+}V_{l-,u+}
+V_{u+,l-}V_{l+,u+}
+V_{u-,l+}V_{l+,u+}
\right)
\\
-&
i \frac{h}{\pi}
{\int\limits_{t,{{\bm{\mathrm{r}}}}}}
\left(
V_{u+,l-}V_{l-,u-}
+V_{u-,l+}V_{l-,u-}
+V_{u-l-}V_{l+,u-}
+V_{u-,l-}V_{l-,u+}
\right)
\end{aligned}
.\end{aligned}$$
Here the coupling constants are defined as $$\begin{aligned}
\label{eq:hg}
\begin{aligned}
h
\equiv
\dfrac{\pi \nu_0}{2},
\qquad
\dfrac{1}{g}
\equiv
\dfrac{\pi \nu_0}{2} D,
\qquad
\gamma
\equiv
\dfrac{\nu_0U_0}{1+\nu_0U_0},
\end{aligned}\end{aligned}$$ with $D$ being the diffusion constant. Furthermore, $g$ is proportional to the inverse dimensionless conductance and acts as the small perturbation parameter in the NL$\sigma$M. The matrix field ${\hat{Q}}$ is subject to constraints $$\begin{aligned}
\label{eq:Qcons}
\begin{aligned}
\operatorname{Tr}{\hat{Q}}=0,
\qquad
{\hat{Q}}^2=\hat{1},
\qquad
{\hat{Q}}^{\dagger}={\hat{Q}}.
\end{aligned}\end{aligned}$$ Substituting Eq. \[eq:NLSM\] into Eq. \[eq:fV\] shows that $f({{\bm{\mathrm{r}}}},t)$ follows from the correlation function of ${\hat{Q}}$: $$\begin{aligned}
\label{eq:fQ}
\begin{aligned}
f({{\bm{\mathrm{k}}}},{\omega})
=\,
&
-
4 h^2
\sum_{(\alpha,\beta)}
s_{\alpha,\beta}
{\int\limits_{{\varepsilon}_1,{\varepsilon}_2}}
{\left\langle {
\begin{aligned}
&{\mathsf{Tr}}\left[
\left(
{\hat{M}_{\Gamma}}({\varepsilon}_1^-){\hat{M}_F}({\varepsilon}_1^-)
{\hat{U}_{{\mathsf{K}}}}^\dagger
\hat{\gamma}_{\alpha}
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}{\hat{M}_F}({\varepsilon}_1^+) {\hat{M}_{\Gamma}}({\varepsilon}_1^+)
\right)
{\hat{Q}}_{{\varepsilon}_1^+,{\varepsilon}_1^-}({{\bm{\mathrm{k}}}})
\right]
\\
\times
& {\mathsf{Tr}}\left[
\left(
{\hat{M}_{\Gamma}}({\varepsilon}_2^+)
{\hat{M}_F}({\varepsilon}_2^+)
{\hat{U}_{{\mathsf{K}}}}^\dagger
\hat{\gamma}_{\beta}
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}{\hat{M}_F}({\varepsilon}_2^-) {\hat{M}_{\Gamma}}({\varepsilon}_2^-)
\right)
{\hat{Q}}_{{\varepsilon}_2^-,{\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})
\right]
\end{aligned}
} \right\rangle}\Biggr\rvert_{{\hat{\mathcal{V}}}=0},
\end{aligned}\end{aligned}$$ Here ${\varepsilon}^{\pm} \equiv {\varepsilon}\pm {\omega}/2$, and the sum goes over the set $$\begin{aligned}
\left\lbrace
(\alpha;\beta)
=\,
(u+,l-;l+,u-),\,
(u-,l+;l-,u+),\,
(u-,l-;l+,u+),\,
(u+,l+;l-,u-)
\right\rbrace.\end{aligned}$$ $s_{\alpha,\beta}$ equals $1$ ($-1$) for the first (last) two elements in the set. $\hat{\gamma}_{\alpha}$ is a single-entry matrix defined such that the only nonvanishing component is the “$\alpha$" element of value $1$. Note that the expectation is taken with the external source field ${\hat{\mathcal{V}}}$ set to $0$.
Parametrization and Feynman’s rules {#sec:Feynman}
===================================
Parametrization
---------------
We follow the standard procedure and parameterize ${\hat{Q}}$ in the Keldysh space as $$\begin{aligned}
\label{eq:q}
& {\hat{Q}}=
\begin{bmatrix}
\sqrt{\hat{1}- {\hat{W}}{\hat{W}}^\dagger } & {\hat{W}}\\
{\hat{W}}^\dagger & -\sqrt{\hat{1}- {\hat{W}}^\dagger {\hat{W}}}
\end{bmatrix}
_{K},\end{aligned}$$ where ${\hat{W}}$ is an unconstrained matrix in the augmented and frequency spaces. This matrix field is then rescaled by: $$\begin{aligned}
\label{eq:scale}
\begin{aligned}
& {\hat{W}}\rightarrow \sqrt{g} {\hat{W}},
\end{aligned}\end{aligned}$$ where $g$ \[Eq. \[eq:hg\]\] – the inverse dimensionless conductance – is the perturbation parameter.
Inserting the parametrization from Eq. \[eq:q\] into the action and expanding in powers of ${\hat{W}}$, we find, up to quartic order in ${\hat{W}}$
\[eq:S\] $$\begin{aligned}
& S_Q+S_{c}[{\hat{\mathcal{V}}}=0]
=\,
S^{(2)}_{W} + S_{W}^{(4)}
,
\\
& i S_{W}^{(2)}
=\,
-
\int
\left[
W^{\dagger}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}_1)
{\mathcal{M}}^{ba,dc}_{21,43}({{\bm{\mathrm{k}}}}_1,{{\bm{\mathrm{k}}}}_2)
W^{c,d}_{3,4}({{\bm{\mathrm{k}}}}_2)
+
{\mathcal{\bar{J}}}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}) W^{b,a}_{2,1}({{\bm{\mathrm{k}}}})
+
W^{\dagger}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}) {\mathcal{J}}^{b,a}_{2,1}({{\bm{\mathrm{k}}}})
\right]
,
\\
&
\begin{aligned}
i S_{W}^{(4)}
= \,
-
\frac{g}{8}
\int & \delta_{{{\bm{\mathrm{k}}}}_1+{{\bm{\mathrm{k}}}}_3,{{\bm{\mathrm{k}}}}_2+{{\bm{\mathrm{k}}}}_4}
W^{\dagger}\, ^{a,b}_{1,2} ({{\bm{\mathrm{k}}}}_1) W^{b,c}_{2,3}({{\bm{\mathrm{k}}}}_2)
W^{\dagger}\, ^{c,d}_{3,4} ({{\bm{\mathrm{k}}}}_3) W^{d,a}_{4,1}({{\bm{\mathrm{k}}}}_4)
\\
& \times
\left[
-2({{\bm{\mathrm{k}}}}_1 \cdot {{\bm{\mathrm{k}}}}_3 +{{\bm{\mathrm{k}}}}_2 \cdot {{\bm{\mathrm{k}}}}_4)
+({{\bm{\mathrm{k}}}}_1 + {{\bm{\mathrm{k}}}}_3)\cdot ({{\bm{\mathrm{k}}}}_2 + {{\bm{\mathrm{k}}}}_4)
+i h g({\omega}_1-{\omega}_2+{\omega}_3-{\omega}_4)
\right]
.
\end{aligned}\end{aligned}$$
Here, the superscripts are indices in the augmented space, while the numeric subscripts represent the frequencies. More specifically, we use index $i$ ($-i$) to denote ${\omega}_i$ ($-{\omega}_i$). For simplicity, in the following, we also employ the notation $$\begin{aligned}
F_i
\equiv
F({\omega}_i),
\quad
\Gamma_i
\equiv
\Gamma({\omega}_i),
\quad
\bar{\Gamma}_i
\equiv
\bar{\Gamma}({\omega}_i),
\quad
\delta_{1,2}
\equiv
\delta_{{\omega}_1,{\omega}_2}.\end{aligned}$$ The definition of matrices $\hat{{\mathcal{M}}}$, $\hat{{\mathcal{J}}}$ and ${\mathcal{\hat{\bar{J}}}}$ are given by Eq. \[eq:MJ\] in Appendix \[sec:expressions\].
Feynman’s rules
---------------
In the previous subsection, the action is expressed in terms of matrix field ${\hat{W}}$ and HS field $\phi$. The propagator for ${\hat{W}}$ describes a joint propagation of a particle and a hole, i.e., the diffuson propagator. In the absence of interactions, it takes the form $$\begin{aligned}
\label{eq:baredif}
\begin{aligned}
{\left\langle {W^{a,b}_{1,2}({{\bm{\mathrm{k}}}})W^{\dagger}\,^{c,d}_{3,4}({{\bm{\mathrm{k}}}})} \right\rangle}_{0}
=\,&
\Delta_0(k,{\omega}_2-{\omega}_1)
\delta_{1,4} \delta_{2,3} \delta_{a,d} \delta_{b,c} ,
\end{aligned}\end{aligned}$$ where we have defined the function $$\begin{aligned}
\label{eq:bd}
\begin{aligned}
\Delta_0(k,{\omega})
\equiv\,&
\frac{1}{k^2+ i h g {\omega}}.
\end{aligned}\end{aligned}$$ The bare propagator arises from the quadratic action $S_{W}^{(2)}$ by setting $\phi=0$. In Fig. \[fig:Feynman1\](a), it is represented diagrammatically by two opposite directed black lines, corresponding to the particle and hole propagation respectively. The labels appearing alongside these lines are indices carried by the ${\hat{W}}$ matrix. The nearby short arrows are introduced to indicate the momentum flow and also to distinguish ${\hat{W}}$ and ${\hat{W}}^{\dagger}$ matrices. For matrix ${\hat{W}}$ (${\hat{W}}^{\dagger}$), the short arrow is directed into (out of) the propagator.
![Feynman rules: (a) the bare diffuson propagator and (b) the $4$-point diffusion vertex. The ${\hat{W}}$ matrix field is represented diagrammatically by two black lines with arrows pointing in the opposite directions.[]{data-label="fig:Feynman1"}](Feynman1.pdf){width="0.5\linewidth"}
The quartic action $S_{W}^{(4)}$ in Eq. \[eq:S\] describes the interaction between the diffuson modes. It gives rise to the $4$-point diffusion vertex, as depicted in Fig. \[fig:Feynman1\](b). The amplitude of this vertex takes the form $$\begin{aligned}
\begin{aligned}
(b)
=
-
\frac{g}{4}
\left[
-2({{\bm{\mathrm{k}}}}_1 \cdot {{\bm{\mathrm{k}}}}_3 +{{\bm{\mathrm{k}}}}_2 \cdot {{\bm{\mathrm{k}}}}_4)
+({{\bm{\mathrm{k}}}}_1 + {{\bm{\mathrm{k}}}}_3)\cdot ({{\bm{\mathrm{k}}}}_2 + {{\bm{\mathrm{k}}}}_4)
+i h g({\omega}_1-{\omega}_2+{\omega}_3-{\omega}_4)
\right],
\end{aligned}\end{aligned}$$ which has been multiplied by a symmetry factor of $2$.
In Fig. \[fig:Feynman2\], we show the interaction vertices coupling the HS field $\phi$ and matrix field ${\hat{W}}$. These interaction vertices arise from the action $S_{W}^{(2)}$ in Eq. \[eq:S\]. Here and throughout this paper, the HS field $\phi$ is represented diagrammatically by a red wavy line. The amplitudes of these interaction vertices are given by Eq. \[eq:IntVert\] in Appendix \[sec:expressions\].
![Feynman rules: interaction vertices coupling the matrix field ${\hat{W}}$ and the HS field $\phi$ represented by a red wavy line. The amplitudes of all these vertices are given in Eq. \[eq:IntVert\].[]{data-label="fig:Feynman2"}](Feynman2v3.pdf){width="0.9\linewidth"}
Hubbard-Stratonovich field propagator
-------------------------------------
![The leading order self energy diagram for HS field $\phi$.[]{data-label="fig:HSSig"}](HSSig.pdf){width="0.3\linewidth"}
The action $S_{\phi}$ in Eq. \[eq:NLSM\] gives rise to the bare HS field propagator $$\begin{aligned}
\label{eq:Grho0}
\begin{aligned}
&
i {\hat{G}}^{(0)}_{\phi}({{\bm{\mathrm{k}}}},{\omega})
\equiv\,
{\left\langle {\phi({{\bm{\mathrm{k}}}},{\omega})\phi^{{\mathsf{T}}}(-{{\bm{\mathrm{k}}}},-{\omega})} \right\rangle}_0
=\,
i
\begin{bmatrix}
0 & \frac{\pi \gamma }{4 h} & 0 & 0
\\
\frac{\pi \gamma }{4 h} & 0 & 0 & 0
\\
0 & 0 & 0 & \frac{\pi \gamma }{4 h}
\\
0 & 0 & \frac{\pi \gamma }{4 h} & 0
\end{bmatrix}.
\end{aligned}\end{aligned}$$ Here we have defined the four-components vector: $\phi\equiv
\left[
{\phi_{u,\mathsf{cl}}}, {\phi_{u,\mathsf{q}}}, {\phi_{l,\mathsf{cl}}}, {\phi_{l,\mathsf{q}}}\right] ^{{\mathsf{T}}}$. Taking into account the interactions between the HS field $\phi$ and matrix field ${\hat{W}}$, we obtain, to the leading order in perturbation parameter $g$, the HS field’s self energy $\Sigma_{\phi}$, see Fig. \[fig:HSSig\]. The self energy acquires the following structure $$\begin{aligned}
\label{eq:SigB}
\begin{aligned}
&\hat{\Sigma}_{\phi}
=\,
\begin{bmatrix}
0 & \Sigma_{\phi}^{(A)} & 0 & 0
\\
\Sigma_{\phi}^{(R)} & \Sigma_{\phi}^{(K)} & 0 & \Sigma_{\phi}^{(\bar{\Gamma})}
\\
0 & 0 & 0 &\Sigma_{\phi}^{(A)}
\\
0 & \Sigma_{\phi}^{(\Gamma)} & \Sigma_{\phi}^{(R)} & \Sigma_{\phi}^{(K)}
\end{bmatrix},
\end{aligned}\end{aligned}$$ where the entries are given by $$\begin{aligned}
\label{eq:SigB2}
\begin{aligned}
-i\Sigma_{\phi}^{(R)}
=\,&
-4 h^2 g {\Delta}_0 (k, -{\omega})\frac{{\omega}}{\pi},
\qquad
-i\Sigma_{\phi}^{(A)}
=\,
-4 h^2 g {\Delta}_0 (k, {\omega})\frac{-{\omega}}{\pi}
,
\\
-i\Sigma_{\phi}^{(K)}
=\,&
-4 h^2 g
\left[
{\Delta}_0 (k, -{\omega})
+
{\Delta}_0 (k, {\omega})
\right]
\frac{{\omega}}{\pi} F_{{\omega}}^{(B)}
,
\\
-i\Sigma_{\phi}^{(\Gamma)}
=\,&
-4 h^2 g
\left[
{\Delta}_0 (k, -{\omega})
+
{\Delta}_0 (k, {\omega})
\right]
\frac{{\omega}}{\pi} {\Gamma}_{{\omega}}^{(B)}
,
\\
-i\Sigma_{\phi}^{({\bar{\Gamma}})}
=\,&
-4 h^2 g
\left[
{\Delta}_0 (k, -{\omega})
+
{\Delta}_0 (k, {\omega})
\right]
\frac{{\omega}}{\pi} {\bar{\Gamma}}_{{\omega}}^{(B)}.
\end{aligned}\end{aligned}$$ Here $F_{\omega}^{(B)}$, ${\Gamma}_{\omega}^{(B)}$ and ${\bar{\Gamma}}_{\omega}^{(B)}$ are generalized bosonic distribution functions defined as $$\begin{aligned}
\label{eq:FB}
\begin{aligned}
F_{\omega}^{(B)}
\equiv\,&
\coth\left( \frac{\beta {\omega}}{2}\right),
\\[6pt]
{\Gamma}_{\omega}^{(B)}
\equiv\,&
\begin{dcases}
1+ \coth\left( \frac{\beta {\omega}}{2}\right),
&
\text{unregularized contour},
\\[4pt]
\operatorname{csch}\left( \frac{\beta {\omega}}{2}\right),
&
\text{regularized contour},
\end{dcases}
\qquad
{\bar{\Gamma}}_{\omega}^{(B)}
=\,&
\begin{dcases}
-1+ \coth\left( \frac{\beta {\omega}}{2}\right),
&
\text{unregularized contour},
\\[4pt]
\operatorname{csch}\left( \frac{\beta {\omega}}{2}\right),
&
\text{regularized contour},
\end{dcases}
\end{aligned}\end{aligned}$$ In deriving Eq. \[eq:SigB2\], we have made use of the following identities: $$\begin{aligned}
\begin{aligned}
\int_{\varepsilon}(F_{{\varepsilon}+{\omega}}-F_{\varepsilon})
=\,
\frac{{\omega}}{\pi},
\qquad
\int_{\varepsilon}(1-F_{{\varepsilon}+{\omega}}F_{\varepsilon})
=\,
\dfrac{{\omega}}{\pi} F^{(B)}_{{\omega}},
\qquad
-\int_{\varepsilon}{\Gamma}_{{\varepsilon}}{\bar{\Gamma}}_{{\varepsilon}+{\omega}}
=\,
\dfrac{{\omega}}{\pi} {\bar{\Gamma}}^{(B)}_{{\omega}},
\qquad
-\int_{\varepsilon}{\Gamma}_{{\varepsilon}+{\omega}}{\bar{\Gamma}}_{{\varepsilon}}
=\,
\dfrac{{\omega}}{\pi} {\Gamma}^{(B)}_{{\omega}}.
\end{aligned}\end{aligned}$$ Here ${\int\limits_{{\varepsilon}}}$ stands for $\int_{-\infty}^{\infty} d {\varepsilon}/2\pi$. We notice that the Keldysh and inter-world self energy components are related to the retarded and advanced counterparts through $$\begin{aligned}
\label{eq:FDT_Sig}
\begin{aligned}
\Sigma_{\phi}^{(K)}
=\,
\left[
\Sigma_{\phi}^{(R)}
-
\Sigma_{\phi}^{(A)}
\right]
F_{{\omega}}^{(B)},
\qquad
\Sigma_{\phi}^{(\Gamma)}
=\,
\left[
\Sigma_{\phi}^{(R)}
-
\Sigma_{\phi}^{(A)}
\right]
{\Gamma}_{{\omega}}^{(B)} ,
\qquad
\Sigma_{\phi}^{({\bar{\Gamma}})}
=\,
\left[
\Sigma_{\phi}^{(R)}
-
\Sigma_{\phi}^{(A)}
\right]
{\bar{\Gamma}}_{{\omega}}^{(B)},
\end{aligned}\end{aligned}$$ as expected for a bosonic field [@augmented].
Employing the Dyson equation $$\begin{aligned}
{\hat{G}}_{\phi}
=\,
\left[ ({\hat{G}}_{\phi}^{(0)})^{-1}-\hat{\Sigma}_{\phi}\right]^{-1},\end{aligned}$$ we arrive at the full HS field propagator which acquires the typical form of a bosonic Green’s function defined on the augmented Keldysh contour [@augmented]: $$\begin{aligned}
\label{eq:Grho1}
\begin{aligned}
&i{\hat{G}}_{\phi}({{\bm{\mathrm{k}}}},{\omega})
\equiv \,
{\left\langle {\phi({{\bm{\mathrm{k}}}},{\omega})\phi^{{\mathsf{T}}}(-{{\bm{\mathrm{k}}}},-{\omega})} \right\rangle}
=\,
i
\begin{bmatrix}
G_{\phi}^{(K)} ({{\bm{\mathrm{k}}}},{\omega})&G_{\phi}^{(R)}({{\bm{\mathrm{k}}}},{\omega}) &G_{\phi}^{({\bar{\Gamma}})}({{\bm{\mathrm{k}}}},{\omega}) &0
\\
G_{\phi}^{(A)}({{\bm{\mathrm{k}}}},{\omega}) &0 &0 &0
\\
G_{\phi}^{({\Gamma})}({{\bm{\mathrm{k}}}},{\omega}) &0 &G_{\phi}^{(K)} ({{\bm{\mathrm{k}}}},{\omega}) &G_{\phi}^{(R)} ({{\bm{\mathrm{k}}}},{\omega})
\\
0 &0 &G_{\phi}^{(A)} ({{\bm{\mathrm{k}}}},{\omega}) &0
\end{bmatrix}.
\end{aligned}\end{aligned}$$ Its retarded and advanced components are given by $$\begin{aligned}
\label{eq:Grho2}
\begin{aligned}
&G_{\phi}^{(R)}({{\bm{\mathrm{k}}}},{\omega})
=\,
\frac{\pi\gamma}{4h}
\dfrac{{\Delta}_u (k, -{\omega})}{{\Delta}_0 (k, -{\omega})},
\qquad
&G_{\phi}^{(A)}({{\bm{\mathrm{k}}}},{\omega})
=\,
\frac{\pi\gamma}{4h}
\dfrac{{\Delta}_u(k, {\omega})}{{\Delta}_0 (k, {\omega})},
\end{aligned}\end{aligned}$$ where ${\Delta}_u$ is defined as $$\begin{aligned}
\label{eq:bdu}
\begin{aligned}
\Delta_u(k,{\omega})
\equiv\,&
\frac{1}{k^2+ i h g (1-\gamma) {\omega}}.
\end{aligned}\end{aligned}$$ The other components are related to the retarded and advanced Green’s functions in the same way as the self energy \[see Eq. \[eq:FDT\_Sig\]\] $$\begin{aligned}
\label{eq:Grho3}
\begin{aligned}
&G_{\phi}^{(K)}({{\bm{\mathrm{k}}}},{\omega})
=\,
\left[
G_{\phi}^{(R)}({{\bm{\mathrm{k}}}},{\omega}) -G_{\phi}^{(A)}({{\bm{\mathrm{k}}}},{\omega})
\right]
F^{(B)}_{\omega},
\\
&G_{\phi}^{({\bar{\Gamma}})}({{\bm{\mathrm{k}}}},{\omega})
=\,
\left[
G_{\phi}^{(R)}({{\bm{\mathrm{k}}}},{\omega}) -G_{\phi}^{(A)}({{\bm{\mathrm{k}}}},{\omega})
\right]
{\bar{\Gamma}}^{(B)}_{\omega},
\\
&G_{\phi}^{({\Gamma})}({{\bm{\mathrm{k}}}},{\omega})
=\,
\left[
G_{\phi}^{(R)}({{\bm{\mathrm{k}}}},{\omega}) -G_{\phi}^{(A)}({{\bm{\mathrm{k}}}},{\omega})
\right]
{\Gamma}^{(B)}_{\omega}.
\end{aligned}\end{aligned}$$ In the following, the HS field’s full (bare) propagator given in Eqs. \[eq:Grho1\], \[eq:Grho2\] and \[eq:Grho3\] (Eq. \[eq:Grho0\]) will be represented diagrammatically by a red wavy line with a solid dot (open circle) in the middle, as shown in Fig. \[fig:HSPro\](b) \[Fig. \[fig:HSPro\](a)\].
![Diagrammatic representation of HS field’s (a) bare and (b) full propagators.[]{data-label="fig:HSPro"}](HSPro.pdf){width="0.5\linewidth"}
Calculation of the growth exponent {#sec:calculate}
==================================
We are interested in the correlation function $f({{\bm{\mathrm{k}}}},{\omega})$, which can be obtained from the ${\hat{Q}}$ correlator \[see Eq. \[eq:fQ\]\]. Expressing the matrix ${\hat{Q}}$ in terms of ${\hat{W}}$ and inserting Eq. \[eq:q\] into Eq. \[eq:fQ\], an expansion to leading order in small parameter $g$ leads to $$\begin{aligned}
\label{eq:fW}
\begin{aligned}
f({{\bm{\mathrm{k}}}},{\omega})
=\,&
4 h^2 g
{\int\limits_{{\varepsilon}_1,{\varepsilon}_2}}
\left[
{\left\langle {W^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}({{\bm{\mathrm{k}}}})W^{\dagger}\,^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}({{\bm{\mathrm{k}}}})} \right\rangle}
+
{\left\langle {W^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})W^{\dagger}\,^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}(-{{\bm{\mathrm{k}}}})} \right\rangle}
\right].
\end{aligned}\end{aligned}$$ Here we have used the fact that ${\left\langle {{\hat{W}}{\hat{W}}} \right\rangle}$ and ${\left\langle {{\hat{W}}^{\dagger}{\hat{W}}^{\dagger}} \right\rangle}$ vanish. The calculation of correlation function $f({{\bm{\mathrm{k}}}},{\omega})$ has now been reduced to the evaluation of the diffuson propagator.
In the absence of interactions, ${\left\langle {{\hat{W}}{\hat{W}}^{\dagger}} \right\rangle}$ in Eq. \[eq:fW\] is given by the bare propagator in Eq. \[eq:baredif\]. Using Eqs. \[eq:bd\] and \[eq:hg\], we have $$\begin{aligned}
\label{eq:nonf}
\begin{aligned}
f({{\bm{\mathrm{k}}}},{\omega})
=\,&
2 \pi \nu_0
{\int\limits_{{\varepsilon}}}
\left[
\frac{1}{Dk^2-i{\omega}}
+
\frac{1}{Dk^2+i{\omega}}
\right],
\end{aligned}\end{aligned}$$ which is consistent with the result of Ref. [@Butterfly]. Note that, in $f({{\bm{\mathrm{k}}}},{\omega})$, there is an additional term $2\pi \nu_0 \tau_{{\mathsf{el}}}$, which is ignored since $\tau_{{\mathsf{el}}}^{-1}\gg {\omega}, Dk^2$. Here the integral over ${\varepsilon}$ is cut off in the ultraviolet limit by the elastic scattering rate $\tau_{{\mathsf{el}}}^{-1}$. Fourier transformation of Eq. \[eq:nonf\] shows $f({{\bm{\mathrm{r}}}},t)$ does not display exponential growth in the noninteracting case, $$\begin{aligned}
\begin{aligned}
f({{\bm{\mathrm{r}}}}, t)
\propto\,&
\left( \dfrac{1}{4 \pi D t}\right)
\exp \left( {-\dfrac{{{\bm{\mathrm{r}}}}^2}{4 \pi D t}}\right)
,
\qquad
t>0.
\end{aligned}\end{aligned}$$
Dressed propagator and self energy
----------------------------------
![The dressed propagator for matrix ${\hat{W}}$ as stated in Eq. \[eq:dressedPro\] is equivalent to an infinite geometric series with repeated insertion of interaction vertices. Here, the red wavy line with a solid dot (open circle) in the middle represents the full (bare) Hubbard-Stratonovich propagator, see Fig \[fig:HSPro\].[]{data-label="fig:dressedPro"}](dressedPro.pdf){width="0.5\linewidth"}
We now consider the impact of interactions on the correlation function $f({{\bm{\mathrm{r}}}},t)$. For the moment, we disregard the quartic diffusion action $S_{W}^{(4)}$ along with the interaction terms quadratic in ${\hat{W}}$. In other words, the total action is approximated by, $$\begin{aligned}
\begin{aligned}
i S[{\hat{\mathcal{V}}}=0]
=\,&
-
\int
\left[
W^{\dagger}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}})
{\Delta}_0^{-1}(k,{\omega}_1-{\omega}_2)
W^{b,a}_{2,1}({{\bm{\mathrm{k}}}})
+
{\mathcal{\bar{J}}}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}) W^{b,a}_{2,1}({{\bm{\mathrm{k}}}})
+
W^{\dagger}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}) {\mathcal{J}}^{b,a}_{2,1}({{\bm{\mathrm{k}}}})
\right]
+
i S_{\phi}
,
\end{aligned} \end{aligned}$$ where ${\mathcal{\hat{\bar{J}}}}$ and $\hat{\mathcal{J}}$ are defined in Eq. \[eq:MJ\], while $S_{\phi}$ is given in Eq. \[eq:NLSM\]. The full propagator of ${\hat{W}}$ matrix assumes the form $$\begin{aligned}
\label{eq:dressedPro}
\begin{aligned}
{\left\langle {W^{a,b}_{1,2}({{\bm{\mathrm{k}}}})W^{\dagger}\,^{c,d}_{3,4}({{\bm{\mathrm{k}}}})} \right\rangle}
=\,&
\Delta_0(k,{\omega}_2-{\omega}_1)
\delta_{1,4} \delta_{2,3} \delta_{a,d} \delta_{b,c}
-i \pi h \gamma g
{\Delta}_u(k,{\omega}_2-{\omega}_1){\Delta}_0(k,{\omega}_2-{\omega}_1)
F_d({\varepsilon}_1,{\varepsilon}_2)
\delta_{c,d}
\delta_{1+3,2+4},
\end{aligned}\end{aligned}$$ where $$\begin{aligned}
\begin{aligned}
F_d({\varepsilon}_1,{\varepsilon}_2)
=\,
\begin{dcases}
F_{{\varepsilon}_1}-F_{{\varepsilon}_2},
& c=u, \quad b=u, \quad a=u,
\\
-{\bar{\Gamma}}_{{\varepsilon}_2},
& c=u, \quad b=l, \quad a=u,
\\
{\Gamma}_{{\varepsilon}_1},
& c=u, \quad b=u, \quad a=l,
\\
F_{{\varepsilon}_1}-F_{{\varepsilon}_2},
& c=l, \quad b=l, \quad a=l,
\\
{\bar{\Gamma}}_{{\varepsilon}_1},
& c=l, \quad b=l, \quad a=u,
\\
-{\Gamma}_{{\varepsilon}_2},
& c=l, \quad b=u, \quad a=l,
\\
0,
&
\text{otherwise}.
\end{dcases}
\end{aligned}
\end{aligned}$$ The full propagator is composed of the bare and interaction dressed components, represented by the first and second terms in Eq. \[eq:dressedPro\], respectively. The dressed component is equivalent to an infinite geometric series of diagrams with repeated insertion of linear interaction vertices, see Fig. \[fig:dressedPro\]. This means that the interaction strength is treated to all orders here. The dressed component given in Eq. \[eq:dressedPro\] vanishes when $a=d=u(l)$ and $b=c=l(u)$. Therefore it does not contribute to the correlation function $f({{\bm{\mathrm{k}}}},{\omega})$.
![Diagrams for self energy component $\Sigma^{a,b;b,a}$.[]{data-label="fig:Sig1"}](Sig1.pdf){width="0.5\linewidth"}
We then include the 4-point diffusion and quadratic interaction vertices, and compute the self energy for ${\hat{W}}$ matrix field at one-loop level. The self energy diagrams are shown in Figs. \[fig:Sig1\], \[fig:Sig2\] and \[fig:Sig3\]. Diagrams in Fig. \[fig:Sig1\] provide contribution to self energy components $\Sigma^{a,a;a,a}$ and $\Sigma^{a,b;b,a}$, while those appearing in Fig. \[fig:Sig2\](a) and \[fig:Sig2\](b) correspond to $\Sigma^{a,b;a,a}$ and $\Sigma^{a,b;b,b}$, respectively. The components $\Sigma^{a,a;b,a}$ and $\Sigma^{a,a;a,b}$ are given by diagrams in Fig. \[fig:Sig3\](a) and \[fig:Sig3\](b), respectively. Note that there are no diagrams that contribute to the remaining components $\Sigma^{a,b;a,b}$ and $\Sigma^{a,a;b,b}$, $$\begin{aligned}
\label{eq:Sig01}
\Sigma^{a,b;a,b}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
\,=
\Sigma^{a,a;b,b}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
\,=
0.\end{aligned}$$ Here $a$ and $b$ represent arbitrary but different indices of the augmented space. The explicit expression for the one-loop self energy are relegated to Appendix \[App:Sig\].
![Diagrams for self energy components (a) $\Sigma^{a,b;a,a}$ and (b) $\Sigma^{a,b;b,b}$, where $a$ and $b$ denote arbitrary but different indices of the augmented space.[]{data-label="fig:Sig2"}](Sig2.pdf){width="0.5\linewidth"}
One can then carry out an expansion of the self energy in terms of external energy ${\omega}$ and momentum ${{\bm{\mathrm{k}}}}$. The term independent of ${\omega}$ and ${{\bm{\mathrm{k}}}}$, i.e., the “mass” term, determines the growth exponent ${\lambda}$ to the leading order in $g$. The higher order terms renormalize the NL$\sigma$M’s coupling constants $\left\lbrace g,h,\gamma \right\rbrace$ and therefore only give contribution to the growth exponent ${\lambda}$ at higher order in $g$. We set external frequency ${\omega}$ and momentum ${{\bm{\mathrm{k}}}}$ to $0$, and find the mass term for $\Sigma^{u,l;l,u}$ $$\begin{aligned}
\begin{aligned}\label{eq:Sig_ullu}
\left( \Sigma \right)^{u,l;l,u}_{{\varepsilon}_1,{\varepsilon}_1;{\varepsilon}_2,{\varepsilon}_2}({{\bm{\mathrm{k}}}}=0)
=\,&
+\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
{\Delta}_0(l,\xi)
\left[
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
-
\frac{{\Delta}_u(l,-\xi)}{{\Delta}_0(l,-\xi)}
\right]
\left[2 F^{(B)}_{\xi}-F_{\xi+{\varepsilon}_1}-F_{\xi-{\varepsilon}_1}\right]
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
\left[
{\Delta}_0(l,\varepsilon_1-\varepsilon_2)
+
{\Delta}_0(l,\varepsilon_2-\varepsilon_1)
\right]
\left[
\frac{{\Delta}_u(l,\varepsilon_1-\varepsilon_2)}{{\Delta}_0(l,\varepsilon_1-\varepsilon_2)}
-
\frac{{\Delta}_u(l, \varepsilon_2-\varepsilon_1)}{{\Delta}_0(l,\varepsilon_2-\varepsilon_1)}
\right]
{\Gamma}^{(B)}_{{\varepsilon}_1-{\varepsilon}_2}
.
\end{aligned} \end{aligned}$$ $\Sigma^{l,u;u,l}_{{\varepsilon}_1,{\varepsilon}_1;{\varepsilon}_2,{\varepsilon}_2}({{\bm{\mathrm{k}}}}=0)$ can be obtained by replacing the generalized bosonic distribution function ${\Gamma}^{(B)}$ in Eq. \[eq:Sig\_ullu\] with ${\bar{\Gamma}}^{(B)}$. The self energy $\Sigma\,^{u,l;l,u}_{{\varepsilon}_1, {\varepsilon}_1;{\varepsilon}_2, {\varepsilon}_2}$ ($\Sigma\,^{l,u;u,l}_{{\varepsilon}_1, {\varepsilon}_1;{\varepsilon}_2, {\varepsilon}_2}$) can be decomposed into a part that is diagonal in frequency space and also one that contains only the off-diagonal entries. The off-diagonal part exhibits “translationally invariant” matrix structure. More specifically, we have $$\begin{aligned}
\label{eq:Sigdia}
\Sigma\,^{a,b,b,a}_{{\varepsilon}_1, {\varepsilon}_1;{\varepsilon}_2, {\varepsilon}_2}
=\,
\Sigma_{{\mathsf{dia}}}^{a,b;b,a}({\varepsilon}_1)\delta_{{\varepsilon}_1,{\varepsilon}_2}
+
\Sigma_{{\mathsf{off}}}^{a,b;b,a}({\varepsilon}_1-{\varepsilon}_2)
,
\qquad
a \neq b.\end{aligned}$$ The diagonal (off-diagonal) part is given by the first (second) term in Eq. \[eq:Sig\_ullu\], and comes from diagrams in Figs. \[fig:Sig1\](a)-(d) \[Figs. \[fig:Sig1\](e)-(f)\].
![Diagrams for self energy components (a) $\Sigma^{a,a;b,a}$ and (b) $\Sigma^{a,a;a,b}$, where $a$ and $b$ are two different augmented space indices.[]{data-label="fig:Sig3"}](Sig3.pdf){width="0.5\linewidth"}
We also find that $\Sigma^{a,a;b,a}$ and $\Sigma^{a,a;a,b}$ at zero external frequency ${\omega}$ and momentum ${{\bm{\mathrm{k}}}}$ vanish $$\begin{aligned}
\label{eq:Sig02}
\Sigma^{a,a;a,b}_{{\varepsilon}_1,{\varepsilon}_1;{\varepsilon}_2,{\varepsilon}_2}({{\bm{\mathrm{k}}}}=0)
\,=
\Sigma^{a,a;b,a}_{{\varepsilon}_1,{\varepsilon}_1;{\varepsilon}_2,{\varepsilon}_2}({{\bm{\mathrm{k}}}}=0)
\,=
0
,\end{aligned}$$ where $a \neq b$. As will become apparent later, $\Sigma^{a,a;a,a}$, $\Sigma^{a,b;b,b}$ and $\Sigma^{a,b;a,a}$ do not enter into the calculation of correlation function $f({{\bm{\mathrm{k}}}},{\omega})$. For this reason, here we do not give the explicit expressions for these components.
Dyson equation and the full Green’s function
--------------------------------------------
The full Green’s function can be extracted from the Dyson equation $$\begin{aligned}
\label{eq:Dyson}
\begin{aligned}
\left( {\hat{\mathcal{G}}}_0^{-1}-\hat{\Sigma}\right) {\hat{\mathcal{G}}}= \hat{1},
\end{aligned}\end{aligned}$$ where ${\hat{\mathcal{G}}}$ is defined as $$\begin{aligned}
\label{eq:GG}
{\mathcal{G}}^{a,b;c,d}_{{\varepsilon}_1,{\varepsilon}_2;{\varepsilon}_3,{\varepsilon}_4}({{\bm{\mathrm{k}}}})
\equiv
{\left\langle {W^{a,b}_{{\varepsilon}_1,{\varepsilon}_2}({{\bm{\mathrm{k}}}})W^{\dagger}\,^{c,d}_{{\varepsilon}_3,{\varepsilon}_4}({{\bm{\mathrm{k}}}})} \right\rangle}
.\end{aligned}$$ ${\hat{\mathcal{G}}}_0$ is given by the sum of the bare and dressed propagators in Eq. \[eq:dressedPro\]. The self energy $\Sigma^{a,b;c,d}_{{\varepsilon}_1^{\pm},{\varepsilon}_1^{\mp};{\varepsilon}_2^{\mp},{\varepsilon}_2^{\pm}}({{\bm{\mathrm{k}}}})$ is approximated by its value at ${\omega}=0$ and ${{\bm{\mathrm{k}}}}=0$ as explained above.
Given the fact that half of the self energy components in the augmented space vanish (see Eqs. \[eq:Sig01\] and \[eq:Sig02\]), it is straightforward to verify that ${\mathcal{G}}^{a,b;b,a}$ is determined only by the $\Sigma^{a,b;b,a}$ component $$\begin{aligned}
\begin{aligned}
&\left( {\mathcal{G}}_0^{-1}\,^{a,b;b,a}-\Sigma^{a,b;b,a} \right){\mathcal{G}}^{a,b;b,a}
=\,
1
,
\qquad
a \neq b
.
\end{aligned}\end{aligned}$$ Applying the Dyson equation (Eq. \[eq:Dyson\]) which can be rewritten as $$\begin{aligned}
{\hat{\mathcal{G}}}=\,
{\hat{\mathcal{G}}}^{(0)}
+
{\hat{\mathcal{G}}}^{(0)}\hat{\Sigma}{\hat{\mathcal{G}}}^{(0)}
+
{\hat{\mathcal{G}}}^{(0)}\hat{\Sigma}{\hat{\mathcal{G}}}^{(0)}\hat{\Sigma}{\hat{\mathcal{G}}}^{(0)}
+
...,\end{aligned}$$ one find $$\begin{aligned}
\label{eq:intG}
\begin{aligned}
{\int\limits_{{\varepsilon}_1,{\varepsilon}_2}}
{\mathcal{G}}^{a,b,b,a}_{{\varepsilon}_1^{\pm}, {\varepsilon}_1^{\mp};{\varepsilon}_2^{\mp}, {\varepsilon}_2^{\pm}}({{\bm{\mathrm{k}}}})
=\,&
{\int\limits_{{\varepsilon}_1,{\varepsilon}_2}}
\left[
{\Delta}_0(k,\mp {\omega})\delta_{1,2}
+
{\Delta}_0^2(k,\mp {\omega})
\Sigma\,^{a,b,b,a}_{{\varepsilon}_1, {\varepsilon}_1;{\varepsilon}_2, {\varepsilon}_2}
+
{\Delta}_0^3(k,\mp {\omega})
{\int\limits_{{\varepsilon}_3}}
\Sigma\,^{a,b,b,a}_{{\varepsilon}_1, {\varepsilon}_1;{\varepsilon}_3, {\varepsilon}_3}
\Sigma\,^{a,b,b,a}_{{\varepsilon}_3, {\varepsilon}_3;{\varepsilon}_2, {\varepsilon}_2}
+
...
\right]
.
\end{aligned}\end{aligned}$$ Here we have made use of the fact that ${\mathcal{G}}_0\,^{a,b;b,a}_{{\varepsilon}_1^{\pm},{\varepsilon}_1^{\mp};{\varepsilon}_2^{\mp},{\varepsilon}_2^{\pm}}({{\bm{\mathrm{k}}}})$ equals ${\Delta}_0(k,\mp {\omega})\delta_{{\varepsilon}_1,{\varepsilon}_2}$ when $a \neq b$ (see Eq. \[eq:dressedPro\]). With the help of $$\begin{aligned}
\begin{aligned}
&
\qquad
{\int\limits_{{\varepsilon}_1,{\varepsilon}_2}}
\Sigma\,^{a,b,b,a}_{{\varepsilon}_1, {\varepsilon}_1;{\varepsilon}_2, {\varepsilon}_2}
=\,
{\int\limits_{{\varepsilon}}}
\left[
\Sigma_{{\mathsf{dia}}}({\varepsilon})
+
{\int\limits_{\xi}}\Sigma_{{\mathsf{off}}}(\xi)
\right],
\\
&{\int\limits_{{\varepsilon}_1,{\varepsilon}_2,...{\varepsilon}_{n+1}}}
\Sigma\,^{a,b,b,a}_{{\varepsilon}_1, {\varepsilon}_1;{\varepsilon}_3, {\varepsilon}_3}
\Sigma\,^{a,b,b,a}_{{\varepsilon}_3, {\varepsilon}_3;{\varepsilon}_4, {\varepsilon}_4}
...
\Sigma\,^{a,b,b,a}_{{\varepsilon}_{n+1}, {\varepsilon}_{n+1};{\varepsilon}_2, {\varepsilon}_2}
=\,
{\int\limits_{{\varepsilon}}}
\left[
\Sigma_{{\mathsf{dia}}}^{a,b,b,a}({\varepsilon})
+
{\int\limits_{\xi}}\Sigma_{{\mathsf{off}}}^{a,b,b,a}(\xi)
\right]^n,
\quad
n=2,...
\end{aligned}\end{aligned}$$ which can be verified using Eq. \[eq:Sigdia\], we find Eq. \[eq:intG\] is equivalent to, $$\begin{aligned}
\label{eq:intG2}
\begin{aligned}
{\int\limits_{{\varepsilon}_1,{\varepsilon}_2}}
{\mathcal{G}}^{a,b,b,a}_{{\varepsilon}_1^{\pm}, {\varepsilon}_1^{\mp};{\varepsilon}_2^{\mp}, {\varepsilon}_2^{\pm}}({{\bm{\mathrm{k}}}})
=\,&
\bigintss_{{\varepsilon}}
\dfrac{1}
{
{\Delta}_0^{-1}(k,\mp{\omega})
-\left[ \Sigma^{a,b;b,a}_{{\mathsf{dia}}}({\varepsilon}) +{\int\limits_{\xi}}\Sigma^{a,b;b,a}_{{\mathsf{off}}}(\xi) \right]
}
.
\end{aligned}\end{aligned}$$ Here $\Sigma^{a,b;b,a}_{{\mathsf{dia}}}$ and $\Sigma^{a,b;b,a}_{{\mathsf{off}}}$ correspond to self energy’s diagonal and off-diagonal components in the energy space, see Eq. \[eq:Sigdia\]. We further approximate $\Sigma^{a,b;b,a}_{{\mathsf{dia}}}({\varepsilon})$ in the denominator with its value at ${\varepsilon}=0$ since the integral extends over a narrow energy shell $|{\varepsilon}|<\tau^{-1}_{{\mathsf{el}}}$ around the Fermi level (${\varepsilon}=0$). Substituting Eq. \[eq:intG2\] into Eq. \[eq:fW\] leads to $$\begin{aligned}
\label{eq:fG}
\begin{aligned}
f({{\bm{\mathrm{k}}}},{\omega})
=\,&
4 h^2 g
\bigintss_{{\varepsilon}}
\left\lbrace
\dfrac{1}
{
{\Delta}_0^{-1}(k,-{\omega})
-\left[ \Sigma^{l,u;u,l}_{{\mathsf{dia}}}(0) +{\int\limits_{\xi}}\Sigma^{l,u;u,l}_{{\mathsf{off}}}(\xi) \right]
}
+
\dfrac{1}
{
{\Delta}_0^{-1}(k,{\omega})
-\left[ \Sigma^{u,l;l,u}_{{\mathsf{dia}}}(0) +{\int\limits_{\xi}}\Sigma^{u,l;l,u}_{{\mathsf{off}}}(\xi) \right]
}
\right\rbrace
.
\end{aligned}\end{aligned}$$
Growth exponent for the unregularized and regularized correlators {#sec:result}
=================================================================
One-loop result
---------------
Using the result obtained in the previous section, we find the correlation function takes the form $$\begin{aligned}
\label{eq:f5}
\begin{aligned}
f({{\bm{\mathrm{k}}}},{\omega})
=\,&
2\pi \nu_0
{\int\limits_{{\varepsilon}}}
\left[
\dfrac{1}
{D k^2-i{\omega}- {\lambda}}
+
\dfrac{1}
{D k^2+i{\omega}- {\lambda}}
\right]
,
\end{aligned}\end{aligned}$$ whose Fourier transform is $$\begin{aligned}
\label{eq:f6}
\begin{aligned}
f({{\bm{\mathrm{r}}}},t)
\propto
\left( \dfrac{1}{4 \pi D t}\right)
\exp \left( -\frac{{{\bm{\mathrm{r}}}}^2}{4 D t} \right) e^{{\lambda}t}
,
\qquad
t>0.
\end{aligned}\end{aligned}$$ Here, to the leading order in small parameter $g$, ${\lambda}$ is given by the following equations : $$\begin{aligned}
\label{eq:lb}
\begin{aligned}
{\lambda}=\,&
{\lambda}_{{\mathsf{dia}}}
+
{\lambda}_{{\mathsf{off}}}
,
\\
{\lambda}_{{\mathsf{dia}}}
=\, &
\frac{1}{hg}
\Sigma^{a,b;b,a}_{{\mathsf{dia}}}(0)
=\,
-\frac{i}{4} \pi \gamma g
\int \frac{d^2 {\bm{\mathrm{l}}}}{(2\pi)^2}
\int_0^{\tau_{{\mathsf{el}}}^{-1}} \frac{d \xi}{2\pi}
\left[
{\Delta}_0(l,\xi)
+
{\Delta}_0(l,-\xi)
\right]
\left[
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
-
\frac{{\Delta}_u(l,-\xi)}{{\Delta}_0(l,-\xi)}
\right]
\left( -2 F^{(B)}_{\xi} + 2 F_{\xi} \right)
,
\\
{\lambda}_{{\mathsf{off}}}
=\,&
\frac{1}{hg}
{\int\limits_{\xi}}\Sigma^{a,b;b,a}_{{\mathsf{off}}}(\xi)
=\,
-\frac{i}{4} \pi \gamma g
\int \frac{d^2 {\bm{\mathrm{l}}}}{(2\pi)^2}
\int_0^{\tau_{{\mathsf{el}}}^{-1}} \frac{d \xi}{2\pi}
\left[
{\Delta}_0(l,\xi)
+
{\Delta}_0(l,-\xi)
\right]
\left[
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
-
\frac{{\Delta}_u(l,-\xi)}{{\Delta}_0(l,-\xi)}
\right]
\left( {\Gamma}^{(B)}_{\xi}+{\bar{\Gamma}}^{(B)}_{\xi} \right)
,
\end{aligned}\end{aligned}$$ where $a \neq b$.
As shown by Eq. \[eq:fW\], the “mass” of the inter-world diffuson propagator is responsible for the exponent ${\lambda}$ of the correlation function $f({{\bm{\mathrm{r}}}},t)$. This should be compared with the intra-world diffuson propagator whose “mass” gives rise to the dephasing rate of diffuson, as studied by Castellani *et al*. in Ref. [@DiffusonDephasing]. A similar discussion applies to the Altshuler-Aronov-Khmelnitskii dephasing rate [@AAK; @AA; @AAG] of Cooperon which serves as the infrared cutoff of the weak localization correction [@ChakravartySchmid]. We emphasize that the inter-world (intra-world) diffuson propagator describes a joint propagation of a particle and a hole in different worlds (the same world). The “mass” of intra-world diffuson propagator is associated with the phase relaxation of the single-particle states, while that of inter-world propagator is also related to the propagation of the decoherence between two worlds.
We note that the two contributions to ${\lambda}$, i.e. ${\lambda}_{{\mathsf{dia}}}$ and ${\lambda}_{{\mathsf{off}}}$, are given by expressions that are almost identical to each other except for the distribution function term. Among them, ${\lambda}_{{\mathsf{dia}}}$ arises from the self energy’s diagonal component in the frequency space $\Sigma_{{\mathsf{dia}}}^{a,b;b,a}$ \[see Eq. \[eq:Sigdia\]\] which, as mentioned earlier, is due to diagrams appearing in Figs. \[fig:Sig1\](a)-(d). It is apparent that each of these diagrams acquires an amplitude that is independent of whether or not $a=b$. The calculation of the intra-world element $\Sigma_{{\mathsf{dia}}}^{a,a;a,a}$ has also been performed within the framework of conventional Keldysh NL$\sigma$M in Ref. [@Keldysh]. There it has been pointed out that the one-loop result for $\Sigma_{{\mathsf{dia}}}^{a,a;a,a}$ is responsible for the “outscattering rate’’ [@AleinerBlanter; @AA] which is the “out” term of the collision integral in the Boltzmann equation. This “out” term is infrared divergent in 2D and needs to be considered together with the “in” term to have a physical meaning [@AleinerBlanter], i.e., their sum determines the energy relaxation rate. Since the intra-world component $\Sigma_{{\mathsf{dia}}}^{a,a;a,a}$ is equivalent to the inter-world component $\Sigma_{{\mathsf{dia}}}^{a,b;b,a}$ ($a \neq b$), we conclude that ${\lambda}_{{\mathsf{dia}}}$ given by Eq. \[eq:lb\] is infrared divergent in 2D and describes the “out-scattering rate” which differs from the dephasing rate. Moreover, the dephasing rate requires the inclusion of higher-loop terms. For diagrams shown in Figs. \[fig:Sig1\](a)-(d), one of the key features is that the interaction lines (i.e. the dressed HS propagator represented by red wavy line with a centered solid dot) do not connect particle and hole propagation lines (two black solid lines). Therefore, these diagrams are responsible for the phase relaxation of the single-particle states. By contrast, diagrams in Figs. \[fig:Sig1\](e)-(f) contribute to the off-diagonal self energy component $\Sigma_{{\mathsf{off}}}^{a,b;b,a}$ ($a \neq b$) which then determines ${\lambda}_{{\mathsf{off}}}$ \[Eq. \[eq:lb\]\]. In these diagrams, we see that the particle and hole propagation lines in worlds $a$ and $b$ are connected by an interaction line. Therefore, unlike ${\lambda}_{{\mathsf{dia}}}$, this term measures the decoherence between the two worlds. As will be shown in the following, to one-loop order, ${\lambda}_{{\mathsf{off}}}$ also diverges logarithmically in the infrared limit and yields a positive contribution to the exponent ${\lambda}$. ${\lambda}_{{\mathsf{dia}}}$ and ${\lambda}_{{\mathsf{off}}}$ are of opposite signs, but the latter dominates, leading to an overall growth exponent. In addition, for both the regularized and unregularized correlation functions, the infrared divergences from ${\lambda}_{{\mathsf{dia}}}$ and ${\lambda}_{{\mathsf{off}}}$ cancel out.
Performing the momentum integration in Eq. \[eq:lb\] over the whole space, one obtains $$\begin{aligned}
\label{eq:lb0}
\begin{aligned}
{\lambda}=\,&
\frac{ \pi}{8} g
\frac{\gamma^2}{2-\gamma}
\int_0^{\tau_{{\mathsf{el}}}^{-1}} \frac{d \xi}{2\pi}
\left[
\left( {\Gamma}^{(B)}_{\xi}+{\bar{\Gamma}}^{(B)}_{\xi}\right)
-
2 \left( F^{(B)}_{\xi}- F_{\xi}\right)
\right]
.
\end{aligned}\end{aligned}$$ We then insert the explicit expression for the generalized distribution functions given in Eqs. \[eq:FF\] and \[eq:FB\]. For the regularized correlator, this leads to $$\begin{aligned}
\label{eq:lbreg}
\begin{aligned}
{\lambda}^{(r)}
=\,
\frac{\pi}{8} g
\frac{\gamma^2}{2-\gamma}
\int_0^{{\tau_{{\mathsf{el}}}}^{-1}} \frac{d \xi}{2\pi}
\left[
2\operatorname{csch}\left( \frac{\beta \xi}{2}\right)
-
4 \operatorname{csch}(\beta \xi)
\right]
=\,
\frac{T}{2\pi \nu_0 D}
\frac{\gamma^2}{2-\gamma}
\left\lbrace
\ln 2
- \ln \left[ 1+\operatorname{sech}\left( \frac{\beta \tau_{{\mathsf{el}}}^{-1}}{2} \right) \right]
\right\rbrace
,
\end{aligned}\end{aligned}$$ where ${\tau_{{\mathsf{el}}}}^{-1}$ enters as the ultraviolet cutoff for the energy integration, and the interaction strength $\gamma$ is defined in Eq. \[eq:hg\]. On the other hand, the growth exponent for the unregularized correlator takes the form $$\begin{aligned}
\label{eq:lbun}
\begin{aligned}
{\lambda}^{(u)}
=\,
\frac{\pi}{8} g
\frac{\gamma^2}{2-\gamma}
\int_0^{{\tau_{{\mathsf{el}}}}^{-1}} \frac{d \xi}{2\pi}
\left[
2\coth\left( \frac{\beta \xi}{2}\right)
-
4 \operatorname{csch}(\beta \xi)
\right]
=\,
\frac{T}{2 \pi \nu_0 D}
\frac{\gamma^2}{2-\gamma}
\ln \left[ \cosh\left( \frac{\beta{\tau_{{\mathsf{el}}}}^{-1}}{2} \right)\right] ,
\end{aligned}\end{aligned}$$ which differs from its regularized counterpart.
For both the regularized and unregularized correlators, the infrared divergence of ${\lambda}_{{\mathsf{dia}}}$ is canceled by that of ${\lambda}_{{\mathsf{off}}}$. In addition, the unregularized exponent exhibits an ultraviolet divergence which is then removed by imposing the energy cutoff ${\tau_{{\mathsf{el}}}}^{-1}$. The NL$\sigma$M used here to derive the result is an effective low energy field theory that is applicable to energy smaller than the elastic scattering rate ${\tau_{{\mathsf{el}}}}^{-1}$.
The derivation above is carried out for short-range interactions. The result for long-range Coulomb interactions can be found through a similar procedure. In both cases, we have $$\begin{aligned}
\label{eq:lb2}
\begin{aligned}
{\lambda}=\,&
i
\int \frac{d^2 {\bm{\mathrm{l}}}}{(2\pi)^2}
\int_0^{\tau_{{\mathsf{el}}}^{-1}} \frac{d \xi}{2\pi}
\left[
\frac{1}{Dl^2+i\xi}
+
\frac{1}{Dl^2-i\xi}
\right]
\left[
G_{\phi}^{(R)}({\bm{\mathrm{l}}},\xi)
-
G_{\phi}^{(A)}({\bm{\mathrm{l}}},\xi)
\right]
\left[
\left( {\Gamma}^{(B)}_{\xi}+{\bar{\Gamma}}^{(B)}_{\xi}\right)
-
\left(2 F^{(B)}_{\xi}- 2 F_{\xi}\right)
\right],
\end{aligned}\end{aligned}$$ where $G_{\phi}^{(R/A)}$ is the retarded/advanced dressed Green’s function for the HS field that decouples the interactions. For short-range interactions, the expression of $G_{\phi}^{(R/A)}$ is given by Eq. \[eq:Grho2\], reducing Eq. \[eq:lb2\] into Eq. \[eq:lb\]. In contrast, for long-range Coulomb interactions, $G_{\phi}^{(R/A)}$ can be approximated by [@DisorderRev; @AleinerBlanter] $$\begin{aligned}
\label{eq:GrhoCoulomb}
G_{\phi}^{(R)}({\bm{\mathrm{l}}},\xi)
=\,
\left[ G_{\phi}^{(A)}({\bm{\mathrm{l}}},\xi) \right]^*
=\,
\frac{1}{2\nu_0}
\frac{Dl^2-i\xi}{Dl^2}
.\end{aligned}$$ Here the overall factor $1/2$ comes from the fact that the HS field has been rescaled by $\phi \rightarrow \sqrt{2} \phi $. Substituting Eq. \[eq:GrhoCoulomb\] into Eq. \[eq:lb2\], we arrive at
\[eq:lbCoulomb\] $$\begin{aligned}
{\lambda}^{(r)}
=\,&
\frac{T}{2\pi \nu_0 D }
\left\lbrace
\ln 2
- \ln \left[ 1+\operatorname{sech}\left( \frac{\beta \tau_{{\mathsf{el}}}^{-1}}{2} \right) \right]
\right\rbrace
,
\\
{\lambda}^{(u)}
=\,&
\frac{T}{2\pi \nu_0 D }
\ln \left[ \cosh \left( \frac{\beta{\tau_{{\mathsf{el}}}}^{-1}}{2} \right)\right]
,\end{aligned}$$
which is identical to the result of short-range interactions up to an overall factor. In the limit of low temperature $T \ll {\tau_{{\mathsf{el}}}}^{-1}$, the regularized version of growth exponent ${\lambda}^{(r)}$ equals $T\ln 2/2\pi \nu_0 D$, agreeing with the result in Ref. [@Butterfly].
Two Lyapunov exponents: discussion
----------------------------------
In the previous subsection, we find that the regularized and unregularized correlators $f({{\bm{\mathrm{r}}}},t)$ grow exponentially at rates ${\lambda}^{(r)}$ and ${\lambda}^{(u)}$, respectively. The regularized exponent ${\lambda}^{(r)}$ obeys the Maldacena-Shenker-Stanford bound ${\lambda}^{(r)} \leq 2 \pi k_{{\mathsf{B}}} T/\hbar$ which is proved in Ref. [@bound] by considering another type of regularized correlator (see also Ref. [@MSSBound]). By contrast, the unregularized version ${\lambda}^{(u)}$ is parametrically larger than the bound ${\lambda}^{(u)}\gg 2 \pi k_{{\mathsf{B}}} T/\hbar$. Here we have restored the units of $\hbar$ and $k_{{\mathsf{B}}}$.
We believe ${\lambda}^{(u)}$ can not serve as an indicator of many-body quantum chaos for the following reasons. In Eq. \[eq:lb2\], we express the growth exponent as an integral weighted by the distribution function $$\begin{aligned}
\tilde{F}(\xi)
\equiv
\left( {\Gamma}^{(B)}_{\xi}+{\bar{\Gamma}}^{(B)}_{\xi}\right)
-
\left(2 F^{(B)}_{\xi}- 2 F_{\xi}\right)
,\end{aligned}$$ which is responsible for the difference between the regularized and unregularized correlation functions. Here $\xi$ denotes the energy transferred by the HS propagator. For small energy transfer, $\xi \ll T$, $\tilde{F}(\xi)$ takes approximately the same value for both correlators. On the other hand, when $\xi \gg T$, $\tilde{F}(\xi)$ vanishes for the regularized correlator but remains finite for the unregularized one. As a result, both exponents ${\lambda}^{(r)}$ and ${\lambda}^{(u)}$ take into account processes with small energy transfer $\xi \ll T$ with approximately the same weight. These processes are associated with real inelastic collisions between electrons and therefore can be attributed to many-body quantum chaos, if we define it as a phenomenon driven by interactions and not connected to the underlying classical chaos, if any. In the Larkin-Ovchinnikov model, classical chaos (which the quantum model “inherits”) is due to single-particle elastic scatterings off of finite-size impurities. In our model with delta-impurities, classical chaos might arise due to electron scattering off of disorder-induced density oscillations. Even though, this phenomenon does require interactions, it hinges on [*elastic*]{} collisions, survives down to zero temperature, and is conceptually similar to classical chaos in disordered media. This phenomenon is to be contrasted with “hydrodynamic,” interaction-driven energy-exchanging collisions. In conventional theory dealing with observable, time-ordered objects, these processes give rise to Altshuler-Aronov-Khmelnitskii dephasing rate, which enters weak localization correction to conductivity and determines a temperature scale, where the system undergoes a transition into Anderson insulator. In the context of out-of-time-ordered four-point correlators, these processes give rise to inter-world dephasing, or many-body quantum chaos. Note that in contrast to the regularized Lyapunov exponent ${\lambda}^{(r)}$, which contains subtle cancellations that extract the inelastic inter-world dephasing, the unregularized growth exponent ${\lambda}^{(u)}$ contains extra contributions arising from processes with large energy transfer $\xi \gg T$. These are precisely the virtual processes that correspond to elastic scattering of particles off the imhomogeneous particle density, which exhibits disorder-induced Friedel oscillations [@Zala2; @AAG]. Similar to elastic scattering off static impurity potential, these processes are unrelated to many-body quantum chaos. Consequently, the unregularized exponent ${\lambda}^{(u)}$ which includes virtual elastic scattering is not a reliable measure for the growth of many-body quantum chaos.
Higher-loop contributions
-------------------------
As mentioned above, the one-loop intra-world diffuson propagator’s “mass” term leads to the infrared divergent “outscattering rate” but not the dephasing rate. The exact cacluation of dephasing rate requires inclusion of higher order diagrams, for which two different approaches have been employed. In one of them, the self-consistent Born approximation (SCBA) is applied where all diagrams with crossed interaction lines (HS propagator lines) are excluded. It replaces the lower energy cutoff with the dephasing rate itself and therefore eliminates the infrared divergence [@FukuyamaAbrahams; @Blanter]. However, for short-range interactions, there might exist corrections beyond the SCBA [@Zala; @dephasing]. A different method that takes into account diagrams with both non-crossing and crossed interaction lines has been developed in Ref. [@AAK]. They express the Cooperon as a Feynman path integral and calculate the exact dephasing rate for long-range Coulomb interactions (see also Ref. [@dephasing] for the case of short-range interactions). Since ${\lambda}$ can be considered as an inter-world counterpart of the dephasing rate, we postulate that both treatments might also be applicable to the evaluation of growth exponent of the correlation function $f({{\bm{\mathrm{r}}}},t)$. Here we discuss briefly the application of the second method.
Fourier transforming Eq. \[eq:fW\] gives $$\begin{aligned}
\begin{aligned}
f({{\bm{\mathrm{r}}}},t)
=\,
4 h^2 g
\int_{t',{{\bm{\mathrm{r}}}}'}
\left[
{\mathcal{G}}^{u,l;l,u}_{t',t';t'+t,t'+t}({{\bm{\mathrm{r}}}}',{{\bm{\mathrm{r}}}}'+{{\bm{\mathrm{r}}}})
+
{\mathcal{G}}^{l,u;u,l}_{t',t';t'-t,t'-t}({{\bm{\mathrm{r}}}}',{{\bm{\mathrm{r}}}}'-{{\bm{\mathrm{r}}}})
\right]
,
\end{aligned}\end{aligned}$$ where ${\hat{\mathcal{G}}}$ is the diffuson propagator \[Eq. \[eq:GG\]\] in the space-time representation. Similar to the Cooperon in the dephasing rate problem, the inter-world diffuson can be expressed as a path integral [@AAK; @AleinerBlanter; @AA; @Keldysh] $$\begin{aligned}
\label{eq:Fpath}
\begin{aligned}
&
{\mathcal{G}}^{a,b;b,a}_{t',t';t' \pm t,t' \pm t}({{\bm{\mathrm{r}}}}', {{\bm{\mathrm{r}}}}' \pm {{\bm{\mathrm{r}}}})
=\,
D
\int_{{{\bm{\mathrm{y}}}}(t')={{\bm{\mathrm{r}}}}'}^{{{\bm{\mathrm{y}}}}(t' \pm t)={{\bm{\mathrm{r}}}}' \pm {{\bm{\mathrm{r}}}}}
{\cal D} {{\bm{\mathrm{y}}}}(\tau)
e^{-S[{{\bm{\mathrm{y}}}}(\tau)]}
,
\\
&S[{{\bm{\mathrm{y}}}}(\tau)]
=\,
\int_{t'}^{t' \pm t}
d\tau
\frac{1}{4D} \dot{{{\bm{\mathrm{y}}}}}^2(\tau)
+
\frac{1}{2}
\int_{t'}^{t' \pm t}
d\tau_1
\int_{t'}^{t' \pm t}
d\tau_2
i\bar{G}_{\phi}
\left( {{\bm{\mathrm{y}}}}(\tau_1)-{{\bm{\mathrm{y}}}}(\tau_2),\tau_1-\tau_2\right)
.
\end{aligned} \end{aligned}$$ Here $a$ and $b$ are arbitrary but different augmented space (world) indices, and $\bar{G}_{\phi}({{\bm{\mathrm{r}}}},t)$ is the Fourier transform of $$\begin{aligned}
\begin{aligned}
\bar{G}_{\phi}({{\bm{\mathrm{k}}}},{\omega})
=\,
\left[
G_{\phi}^{(R)}({{\bm{\mathrm{k}}}},{\omega})
-
G_{\phi}^{(A)}({{\bm{\mathrm{k}}}},{\omega})
\right]
\left[
\left( 2F^{(B)}_{{\omega}} -2F_{{\omega}} \right)
-
\left( {\Gamma}^{(B)}_{{\omega}}+{\bar{\Gamma}}^{(B)}_{{\omega}}\right)
\right]
.
\end{aligned}\end{aligned}$$ Through a straightforward calculation, one can show that the first-order cumulant expansion gives rise to the one-loop result stated in Eq. \[eq:lb2\], while higher-order terms correspond to higher-loop diagrams that also attribute to the correlation function $f({{\bm{\mathrm{r}}}},t)$. As explained in Ref. [@dephasing], Eq. \[eq:Fpath\] can be interpreted as a path integral for a self-interacting polymer loop subject to the boundary condition: ${{\bm{\mathrm{y}}}}(t' \pm t)={{\bm{\mathrm{r}}}}' \pm {{\bm{\mathrm{r}}}}$, ${{\bm{\mathrm{y}}}}(t')={{\bm{\mathrm{r}}}}'$. The first term in the action $S[{{\bm{\mathrm{y}}}}(\tau)]$ describes the normal random walk, while the second term gives an interaction between points ${{\bm{\mathrm{y}}}}(\tau_1)$ and ${{\bm{\mathrm{y}}}}(\tau_2)$. This problem can now be investigated through a lattice polymer simulation which may serve as a direction for future work.
.
Class AII: Cooperon’s contribution {#sec:AII}
==================================
In previous sections, we considered a system which has neither time reversal symmetry nor spin-rotational invariance, i.e., it is in the unitary (A) Wigner-Dyson class [@Zirnbauer; @AltlandZirnbauer; @AndersonRevC]. In this section, we turn to the symplectic metal class [@KotliarAII] with perserved time-reversal invariance but broken spin-rotational invariance. The time-reversal symmetry is restored to investigate the Cooperon’s contribution to the correlation function $f({{\bm{\mathrm{r}}}},t)$.
For this symmetry class, the augmented Keldysh FNL$\sigma$M can be obtained following a procedure similar to the one outlined in Sec. \[sec:derive\] for unitary metal class. It acquires the form $$\begin{aligned}
\label{eq:AII}
\begin{aligned}
Z[{\hat{\mathcal{V}}}]
=\,&
\int {\mathcal{D}}{\hat{Q}}{\mathcal{D}}\phi
\exp\left\lbrace iS_Q+iS_c+iS_{\phi}+iS_V\right\rbrace
,
\\
iS_Q
=\,&
-\frac{1}{4g}
{\int\limits_{{{\bm{\mathrm{r}}}}}}
{\mathsf{Tr}}\, \left[ \left( {\bm{\nabla}}{\hat{Q}}({{\bm{\mathrm{r}}}}) \right)^2\right]
-i h
{\int\limits_{{{\bm{\mathrm{r}}}}}}
{\mathsf{Tr}}\, \left[ \left( \hat{1}_{{\mathsf{aK}}} \otimes \hat{1}_{{\omega}} \otimes \hat{\sigma}^3 \right)
\hat{{\omega}} {\hat{Q}}({{\bm{\mathrm{r}}}})
\right]
,
\\
iS_c
=\,&
i h
\int
{\mathsf{Tr}}\left\lbrace
\left[
\left(
{\hat{U}_{{\mathsf{K}}}}^\dagger
\left( {\hat{\mathcal{V}}}+{\hat{\mathcal{P}}}\right)
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}\right)
\otimes
\hat{1}_{{\omega}}
\otimes
\hat{1}_{\sigma}
\right]
\left[
{\hat{M}_F}(\hat{\omega})
{\hat{M}_{\Gamma}}(\hat{\omega})
{\hat{Q}}{\hat{M}_{\Gamma}}(\hat{\omega})
{\hat{M}_F}(\hat{\omega})
\right]
\right\rbrace ,
\end{aligned}\end{aligned}$$ where $S_{\phi}$ and $S_{V}$ are given, respectively, by Eqs. \[eq:NLSM\] (d) and (e). Parameters $g$, $h$ and $\gamma$ are defined in Eq. \[eq:hg\]. Here $\hat{1}_{\sigma}$ stands for the identity matrix in the particle-hole space, while $\hat{1}_{{\mathsf{aK}}}$ denotes the one in the augmented and Keldysh spaces. For simplicity, we have disregarded the BCS interaction channel. In this model, the matrix field ${\hat{Q}}$ carries indices in Keldysh, augmented, frequency as well as the particle-hole spaces, and obeys the constraints $$\begin{aligned}
\label{eq:qsym_AII}
{\hat{Q}}^2=\,1,
\qquad\
{\mathsf{Tr}}\, {\hat{Q}}=\,0,
\qquad
\left( {\hat{\sigma}}^1 \otimes {\hat{\tau}}^1 \otimes{\hat{\Sigma}}^1 \otimes \hat{1}_{|{\omega}| }\right)
{\hat{Q}}^{\mathsf{T}}\left({\hat{\sigma}}^1 \otimes {\hat{\tau}}^1 \otimes{\hat{\Sigma}}^1 \otimes \hat{1}_{|{\omega}| } \right)
= \,
{\hat{Q}}.\end{aligned}$$ Here ${\hat{\sigma}}$ indicates the Pauli matrix in the particle-hole space, while ${\hat{\Sigma}}$ is the Pauli matrix acting on the sign of frequency space, $\Sigma^1_{{\omega}_1,{\omega}_2}=\delta_{{\omega}_1,-{\omega}_2}$. The saddle point of this NL$\sigma$M is given by $$\begin{aligned}
{\hat{Q}_{\scriptscriptstyle{\mathsf{SP}}}}= {\hat{\tau}}^3 \otimes {\hat{\sigma}}^3 \otimes \hat{1}_{{\omega}}.\end{aligned}$$
Parametrization for class AII
-----------------------------
Following Ref. [@Keldysh], we first perform a rotation $$\begin{aligned}
\label{eq:AII_qRot}
{\hat{Q}} \rightarrow {\hat{R}} {\hat{Q}} {\hat{R}}^{\dagger},
\qquad
{\hat{R}}
\equiv \, &
\left[
\frac{{\hat{1}} + {\hat{\sigma}}^3}{2} \otimes \hat{1}_{{\mathsf{aK}}}
+
\frac{{\hat{1}} - {\hat{\sigma}}^3}{2} \otimes {\hat{\tau}}^1
\right]
\otimes
\hat{1}_{{\omega}}
,\end{aligned}$$ that transforms the saddle point to ${\hat{Q}}_{{\mathsf{sp}}} = {\hat{\tau}}^3 \otimes \hat{1}_{\sigma} \otimes \hat{1}_{{\omega}} $. It also changes the last constraint in Eq. (\[eq:qsym\_AII\]) to $$\begin{aligned}
\label{eq:AII_qsym2}
\begin{aligned}
\left( {\hat{\sigma}}^1 \otimes \hat{1}_{{\mathsf{aK}}} \otimes{\hat{\Sigma}}^1 \otimes \hat{1}_{|{\omega}| }\right)
{\hat{Q}}^{\mathsf{T}}\left({\hat{\sigma}}^1 \otimes \hat{1}_{{\mathsf{aK}}} \otimes{\hat{\Sigma}}^1 \otimes \hat{1}_{|{\omega}| } \right)
= \,
{\hat{Q}}.
\end{aligned}\end{aligned}$$ and leaves the first two conditions unchanged. After this transformation, $S_{c}$ becomes $$\begin{aligned}
\label{eq:AII_Sc}
iS_{c}
= \,&
ih
\int {\mathsf{Tr}}\left\lbrace
\left[
\left( \frac{{\hat{1}} + {\hat{\sigma}}^3}{2} \right)
\otimes
\left(
{\hat{U}_{{\mathsf{K}}}}^\dagger
\left( {\hat{\mathcal{V}}}+{\hat{\mathcal{V}}}^{{\mathsf{T}}} +2 {\hat{\mathcal{P}}}\right)
{\hat{\tau}}^3 {\hat{U}_{{\mathsf{K}}}}\right)
\otimes
{\hat{1}}_{{\omega}}
\right]
\left[
{\hat{M}_F}(\hat{\omega}) {\hat{M}_{\Gamma}}(\hat{\omega})
{\hat{Q}}{\hat{M}_{\Gamma}}(\hat{\omega}) {\hat{M}_F}(\hat{\omega})
\right]
\right\rbrace ,\end{aligned}$$ while $S_{Q}$ remains invariant.
We then employ the parametrization Eq. \[eq:q\] in the Keldysh space. In this case, ${\hat{W}}$ is a matrix carrying indices in the particle-hole, frequency as well as augmented spaces, and is subject to the condition $$\begin{aligned}
\label{eq:AII_Wsym1}
\begin{aligned}
{\hat{W}}= \, &
\left( {\hat{\sigma}}^1 \otimes {\hat{\Sigma}}^1 \otimes {\hat{1}}_a \otimes \hat{1}_{|{\omega}| } \right)
({\hat{W}}^{\dagger})^{{\mathsf{T}}}
\left( {\hat{\sigma}}^1 \otimes {\hat{\Sigma}}^1 \otimes {\hat{1}}_a \otimes \hat{1}_{|{\omega}| } \right)
.
\end{aligned}\end{aligned}$$ We further parametrize ${\hat{W}}$ in the particle-hole space as $$\begin{aligned}
\label{eq:AII_W}
\begin{aligned}
{\hat{W}}^{a,b}_{1,2}
= \,
\begin{bmatrix}
X^{a,b}_{1,2} & Y^{a,b}_{1,2}
\\
Y^{\dagger}\,^{b,a}_{-2,-1} & X^{\dagger}\,^{b,a}_{-2,-1}
\end{bmatrix}_\sigma,
\end{aligned}\end{aligned}$$ where the unconstrained matrix ${\hat{X}}$ and ${\hat{Y}}$ are in the agumented and frequency spaces. As before, the superscripts $a$ and $b$ are augmented space indices, while the numeric subscript $i$ ($-i$) stands for frequency ${\omega}_i$ ($-{\omega}_i$). It is easy to verify that the constraint in Eq. \[eq:AII\_Wsym1\] is satisfied with this parametrization. We emphasis that, for matrix field ${\hat{W}}$, the component diagonal in the particle-hole space, i.e. ${\hat{X}}$ encodes the diffuson mode, while the off-diagonal one ${\hat{Y}}$ represents the Cooperon mode [@Keldysh].
One may now substitute Eqs. \[eq:q\] and \[eq:AII\_W\] into the action, and expand in powers of ${\hat{X}}$, ${\hat{Y}}$ up to quartic order. We find the action is
\[eq:AII\_SQ\] $$\begin{aligned}
& S_{Q}+S_c[{\hat{\mathcal{V}}}=0]
=\,
S_{X}^{(2)} +S_{Y}^{(2)}
+S_{W}^{(4)}
,
\\
& iS_{X}^{(2)}
= \,
-
\int
\left[
X^{\dagger}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}_1)
{\mathcal{M}}_{2,1;4,3}^{ba,dc}({{\bm{\mathrm{k}}}}_1,{{\bm{\mathrm{k}}}}_2)
X_{3,4}^{c,d}({{\bm{\mathrm{k}}}}_2)
+
{\mathcal{\bar{J}}}\,^{a,b}_{2,1}({{\bm{\mathrm{k}}}}) X^{b,a}_{1,2}({{\bm{\mathrm{k}}}})
+
X^{\dagger}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}){\mathcal{J}}^{b,a}_{2,1}({{\bm{\mathrm{k}}}})
\right]
,
\\
& iS_{Y}^{(2)}
= \,
-
\int
Y^{\dagger}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}}_1)
{\mathcal{N}}_{2,1;4,3}^{ba,dc}({{\bm{\mathrm{k}}}}_1,{{\bm{\mathrm{k}}}}_2)
Y_{3,4}^{c,d}({{\bm{\mathrm{k}}}}_2)
,
\\
&\begin{aligned}
iS_W^{(4)}
=\,
-
\frac{g}{8} \int&\delta_{{{\bm{\mathrm{k}}}}_1+{{\bm{\mathrm{k}}}}_3,{{\bm{\mathrm{k}}}}_2+{{\bm{\mathrm{k}}}}_4}
\left[
\begin{aligned}
-2({{\bm{\mathrm{k}}}}_1 \cdot {{\bm{\mathrm{k}}}}_3 +{{\bm{\mathrm{k}}}}_2 \cdot {{\bm{\mathrm{k}}}}_4)
+({{\bm{\mathrm{k}}}}_1 + {{\bm{\mathrm{k}}}}_3)\cdot ({{\bm{\mathrm{k}}}}_2 + {{\bm{\mathrm{k}}}}_4)
+i h g ({\omega}_1-{\omega}_2+{\omega}_3-{\omega}_4)
\end{aligned}
\right]
\\
&\times
\left[
\begin{aligned}
& X^{\dagger}\,^{a,b}_{1,2} ({{\bm{\mathrm{k}}}}_1) X^{b,c}_{2,3}({{\bm{\mathrm{k}}}}_2)
X^{\dagger}\,^{c,d}_{3,4} ({{\bm{\mathrm{k}}}}_3) X^{d,a}_{4,1}({{\bm{\mathrm{k}}}}_4)
\\
+ &
Y^{\dagger}\,^{a,b}_{-1,2} ({{\bm{\mathrm{k}}}}_1) Y^{b,c}_{2,-3}({{\bm{\mathrm{k}}}}_2)
Y^{\dagger}\,^{c,d}_{-3,4} ({{\bm{\mathrm{k}}}}_3) Y^{d,a}_{4,-1}({{\bm{\mathrm{k}}}}_4)
\\
+ &
2 X^{\dagger}\,^{a,b}_{1,2} ({{\bm{\mathrm{k}}}}_1) Y^{b,c}_{2,-3}({{\bm{\mathrm{k}}}}_2)
Y^{\dagger}\,^{c,d}_{-3,4} ({{\bm{\mathrm{k}}}}_3) X^{d,a}_{4,1}({{\bm{\mathrm{k}}}}_4)
\\
+ &
2 X^{\dagger}\,^{a,b}_{1,2} ({{\bm{\mathrm{k}}}}_1) Y^{b,c}_{2,-3}({{\bm{\mathrm{k}}}}_2)
X^{d,c}_{4,3} (-{{\bm{\mathrm{k}}}}_3) Y^{\dagger}\,^{a,d}_{-1,4}(-{{\bm{\mathrm{k}}}}_4)
\\
+ &
2 X^{\dagger}\,^{a,b}_{1,2} ({{\bm{\mathrm{k}}}}_1) X^{b,c}_{2,3}({{\bm{\mathrm{k}}}}_2)
Y^{d,c}_{4,-3} (-{{\bm{\mathrm{k}}}}_3) Y^{\dagger}\,^{a,d}_{-1,4}(-{{\bm{\mathrm{k}}}}_4)
\end{aligned}
\right]
,
\end{aligned}\end{aligned}$$
where $\mathcal{\hat{M}}$, $\hat{\mathcal{J}}$, and ${\mathcal{\hat{\bar{J}}}}$ are given by Eq. \[eq:MJ\]. Ignoring the interaction term which couples the matrix field ${\hat{Y}}$ and the HS field $\phi$, ${\mathcal{N}}$ takes the form $$\begin{aligned}
{\mathcal{N}}_{2,1;4,3}^{ba,dc}({{\bm{\mathrm{k}}}}_1,{{\bm{\mathrm{k}}}}_2)
=\,
\left[ k_1^2 - i h g ({\omega}_1 + {\omega}_2) \right]
\delta_{a,d}\delta_{b,c}
\delta_{1,4}\delta_{2,3}
+O(g)
.\end{aligned}$$ As will become apparent later, the explicit form of higher order term in ${\mathcal{N}}$ enters the calculation of correlation function $f({{\bm{\mathrm{r}}}},t)$ through the dephasing time of the Cooperon and is therefore not given here.
Feynman rules for class AII
---------------------------
![Feynman rules for class AII NL$\sigma$M: Diagrams in (a) and (b) represent the the bare propagators for diffuson and Cooperon, respectively. (c)-(g) illustrate the $4$-point diffusion vertices which share the same amplitudes stated in Eq. \[eq:AII\_4V\]. In this section, the solid black lines represent the diffuson mode ${\hat{X}}$, while the dashed blue ones correspond to the Cooperon mode ${\hat{Y}}$.[]{data-label="fig:AIIFeynman"}](AIIFeynmanv3.pdf){width="0.9\linewidth"}
In Fig. \[fig:AIIFeynman\], we show the Feynman rules for the class AII NL$\sigma$M. In the absence of interactions, the bare propagators for diffuson and Cooperon are given by, respectively, $$\begin{aligned}
\label{eq:AII_bare}
\begin{aligned}
{\left\langle {X^{a,b}_{1,2}({{\bm{\mathrm{k}}}})X^{\dagger}\,^{c,d}_{3,4}({{\bm{\mathrm{k}}}})} \right\rangle}_{0}
=\,&
\Delta_0(k,{\omega}_2-{\omega}_1)
\delta_{1,4} \delta_{2,3} \delta_{a,d} \delta_{b,c}
,
\\
{\left\langle {Y^{a,b}_{1,2}({{\bm{\mathrm{k}}}})Y^{\dagger}\,^{c,d}_{3,4}({{\bm{\mathrm{k}}}})} \right\rangle}_{0}
=\,&
\Delta_0(k,-{\omega}_2-{\omega}_1)
\delta_{1,4} \delta_{2,3} \delta_{a,d} \delta_{b,c}
.
\end{aligned}\end{aligned}$$ They are represented by diagrams in Figs. \[fig:AIIFeynman\](a) and \[fig:AIIFeynman\](b) where the solid black (dashed blue) lines correspond to the diffuson mode ${\hat{X}}$ (Cooperon mode ${\hat{Y}}$).
Figs. \[fig:AIIFeynman\](c)-(g) illustrate the the $4$-point diffusion vertices arising from the action $S_W^{(4)}$ \[Eq. \[eq:AII\_SQ\](d)\]. These diffusion vertices describe the non-linear interactions between the diffuson and Cooperon modes, and share the same amplitude, $$\begin{aligned}
\label{eq:AII_4V}
\begin{aligned}
(c)
=\,&
(d)
=\,
(e)
=\,
(f)
=\,
(g)
=\,
-\frac{g}{4}
\left[
\,
-2({{\bm{\mathrm{k}}}}_1 \cdot {{\bm{\mathrm{k}}}}_3 +{{\bm{\mathrm{k}}}}_2 \cdot {{\bm{\mathrm{k}}}}_4)
+({{\bm{\mathrm{k}}}}_1 + {{\bm{\mathrm{k}}}}_3)\cdot ({{\bm{\mathrm{k}}}}_2 + {{\bm{\mathrm{k}}}}_4)
\,
+i h g ({\omega}_1-{\omega}_2+{\omega}_3-{\omega}_4)
\right]
,
\end{aligned} \end{aligned}$$ where we have multiplied the amplitudes of diagrams (c) and (d) by a factor of $2$ to account for the vertex symmetry.
Here we do not show the interaction vertices coupling between the HS filed $\phi$ and the diffuson (Cooperon) mode ${\hat{X}}$ (${\hat{Y}}$). However, notice that $S_{X}^{(2)}$ \[Eq. \[eq:AII\_SQ\](b)\] takes the same form as the action $S_{W}^{(2)}$ \[Eq. \[eq:AII\_SQ\](b)\] for the unitary NL$\sigma$M considered in previous sections. Therefore, the vertices coupling between ${\hat{X}}$ and $\phi$ can also be represented diagrammatically by diagrams in Fig. \[fig:Feynman2\], with amplitudes given by Eq. \[eq:IntVert\].
The calculation of the growth exponent for class AII
----------------------------------------------------
As mentioned earlier, the correlation function can be extracted by differentiating the generating functional $Z[{\hat{\mathcal{V}}}]$ with respect to the source field ${\hat{\mathcal{V}}}$ \[Eq. \[eq:fV\]\]. Using the explicit expression for the action $S_c[{\hat{\mathcal{V}}}]$ in Eq. \[eq:AII\_Sc\] and the parameterization given by Eqs. \[eq:q\] and \[eq:AII\_W\], one obtains $$\begin{aligned}
\label{eq:fX}
\begin{aligned}
f({{\bm{\mathrm{k}}}},{\omega})
=\,&
h^2 g
{\int\limits_{{\varepsilon}_1,{\varepsilon}_2}}
\left[
\begin{aligned}
&\phantom{+}
{\left\langle {X^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}({{\bm{\mathrm{k}}}})X^{\dagger}\,^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}({{\bm{\mathrm{k}}}})} \right\rangle}
+
{\left\langle {X^{\dagger}\,^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}(-{{\bm{\mathrm{k}}}})X\,^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})} \right\rangle}
\\
&
+
{\left\langle {X^{u,l}_{{\varepsilon}_1^+, {\varepsilon}_1^-}({{\bm{\mathrm{k}}}})X^{\dagger}\,^{l,u}_{{\varepsilon}_2^-, {\varepsilon}_2^+}({{\bm{\mathrm{k}}}})} \right\rangle}
+
{\left\langle {X^{\dagger}\,^{u,l}_{{\varepsilon}_1^+, {\varepsilon}_1^-}(-{{\bm{\mathrm{k}}}})X\,^{l,u}_{{\varepsilon}_2^-, {\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})} \right\rangle}
\\
&+
{\left\langle {X^{u,l}_{{\varepsilon}_1^+, {\varepsilon}_1^-}({{\bm{\mathrm{k}}}})X^{\dagger}\,^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}({{\bm{\mathrm{k}}}})} \right\rangle}
+
{\left\langle {X^{\dagger}\,^{u,l}_{{\varepsilon}_1^+, {\varepsilon}_1^-}(-{{\bm{\mathrm{k}}}})X\,^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})} \right\rangle}
\\
&
+
{\left\langle {X^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}({{\bm{\mathrm{k}}}})X^{\dagger}\,^{l,u}_{{\varepsilon}_2^-, {\varepsilon}_2^+}({{\bm{\mathrm{k}}}})} \right\rangle}
+
{\left\langle {X^{\dagger}\,^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}(-{{\bm{\mathrm{k}}}})X\,^{l,u}_{{\varepsilon}_2^-, {\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})} \right\rangle}
\end{aligned}
\right]
,
\end{aligned}\end{aligned}$$ which shows that the correlation function $f({{\bm{\mathrm{k}}}},{\omega})$ is determined entirely by the full diffuson (${\hat{X}}$) propagator. The Cooperon mode ${\hat{Y}}$ enters the evaluation of $f({{\bm{\mathrm{k}}}},{\omega})$ through the self energy for ${\hat{X}}$.
In Eq. \[eq:AII\], the part of the action that depends only on ${\hat{X}}$ and $\phi$ \[i.e. $S_{X}^{(2)}$ and the 1st term in $S_{W}^{(4)}$\] assumes the same form as the action for the class A NL$\sigma$M \[Eq. \[eq:S\]\]. For this reason, the bare and dressed propagators for ${\hat{X}}$ matrix field are also given by Eq. \[eq:dressedPro\]. Furthermore, the self energy for ${\hat{X}}$ is almost identical to that for ${\hat{W}}$ discussed in Sec. \[sec:calculate\], except for one additional diagram illustrated in Fig. \[fig:AIIWAL\]. It gives the following contribution to the self energy $$\begin{aligned}
\begin{aligned}
\Sigma_{{\mathsf{WAL}}}\,^{b,a;a,b}_{{\varepsilon}^-,{\varepsilon}^+;{\varepsilon}^+,{\varepsilon}^-}({{\bm{\mathrm{k}}}})
=& - \frac{g}{2}
\int_{{\bm{\mathrm{l}}}}
\left[
k^2
{\Delta}_0(l,-{\omega})
+
1
\right]
=
- \frac{g}{8\pi} k^2 \ln (\frac{{\tau_{{\mathsf{el}}}}^{-1}}{{\omega}})
.
\end{aligned}\end{aligned}$$ Here in the first equality, the second term cancels with a contribution from the Jacobian [@Mudry] and is therefore discarded. $\Sigma_{{\mathsf{WAL}}}$ corresponds to the weak antilocalization (WAL) correction and attributes to the renormalization of parameter $g$. In the limit of zero external frequency ${\omega}=0$, the infrared cutoff ${\omega}$ should be replaced with the Cooperon dephasing rate $\tau_{\phi}^{-1}$. This can be obtained by taking into account the higher order diagrams and replacing the bare Cooperon propagator in Fig. \[fig:AIIWAL\] with the full one.
![The WAL self energy diagram for the class AII NL$\sigma$M.[]{data-label="fig:AIIWAL"}](AIIWAL.pdf){width="0.4\linewidth"}
Application of the Dyson equation shows that last 4 terms in Eq. \[eq:fX\] vanish $$\begin{aligned}
\label{eq:fX2}
\begin{aligned}
f({{\bm{\mathrm{k}}}},{\omega})
=\,&
h^2 g
{\int\limits_{\varepsilon_1,{\varepsilon}_2}}
\left[
\begin{aligned}
&\phantom{+}
{\left\langle {X^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}({{\bm{\mathrm{k}}}})X^{\dagger}\,^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}({{\bm{\mathrm{k}}}})} \right\rangle}
+
{\left\langle {X^{\dagger}\,^{l,u}_{{\varepsilon}_1^+, {\varepsilon}_1^-}(-{{\bm{\mathrm{k}}}})X^{u,l}_{{\varepsilon}_2^-, {\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})} \right\rangle}
\\
&+
{\left\langle {X^{u,l}_{{\varepsilon}_1^+, {\varepsilon}_1^-}({{\bm{\mathrm{k}}}})X^{\dagger}\,^{l,u}_{{\varepsilon}_2^-, {\varepsilon}_2^+}({{\bm{\mathrm{k}}}})} \right\rangle}
+
{\left\langle {X^{\dagger}\,^{u,l}_{{\varepsilon}_1^+, {\varepsilon}_1^-}(-{{\bm{\mathrm{k}}}})X^{l,u}_{{\varepsilon}_2^-, {\varepsilon}_2^+}(-{{\bm{\mathrm{k}}}})} \right\rangle}
\end{aligned}
\right]
.
\end{aligned}\end{aligned}$$ Comparing this equation with Eq. \[eq:fW\], we draw the conclusion that the correlation function $f({{\bm{\mathrm{k}}}},{\omega})$ for the symplectic metal class is also given by Eq. \[eq:nonf\] with the same growth exponent ${\lambda}$. The Cooperon provides contribution of the order $O(g)$ to the diffusion constant $D$ in the denominator.
Conclusion
==========
In this paper, we study many-body quantum chaos, defined via the notion of Lyapunov growth of the out-of-time-ordered correlator, in a 2D interacting system of fermions subject to quenched disorder, using the non-linear sigma model approach. We derive an augmented Keldysh version of Finkel’stein’s non-linear sigma model, which can be used for the evaluation of the out-of-time-ordered correlation functions. In this approach, the diffuson and Cooperon modes are treated as fundamental low-energy degrees of freedom. We find that the growth exponent is dominated by the diffuson modes and is not attributed to the Cooperons at the leading order in inverse dimensionless conductance, $g\ll1$. By computing the growth exponent to the lowest order in perturbation parameter $g$, we show that the regularized and unregularized correlators grow exponentially in time at different rates.
This result may seem disconcerting, as it is often assumed in the literature that the two correlators grow at the same rate. Oftentimes, the unregularized contour is introduced as a “natural” definition of scrambling and is regularized merely for the sake of technical convenience, in particular to achieve a convenient analytic structure that simplifies calculations and proofs, such as the proof of the bound [@bound]. We do find that the regularized correlator is special, as opposed to any other arrangement of the thermal factors, in that it gives rise to an exact cancellation of both infrared and ultraviolet divergencies and the bound does hold at least in the leading order in $g$. However, the Lyapunov exponent appears to be contour- and operator-dependent quantity.
Furthermore, the regularized correlator is most certainly not an observable, as it is difficult to imagine an experiment, which would realize the splitting of the thermal averaging and reverse real time. This concern however applies to the more “natural” definition of the unregularized OTOC just as well (some proposals to measure OTOCs by effectively performing time reversal do exist [@measure1; @measure2; @measure3; @measure4; @measure5], but it may be difficult to accomplish this by keeping the thermal bath intact). As pointed out by Aleiner *et al*. [@augmented], OTOCs generally are not “observables” but can be dubbed “computables.” This brings up the question of the physical meaning behind these interesting quantities. The OTOCs are indeed extremely appealing from the intuitive standpoint as a definition of many-body quantum scrambling, but the issue of their physical meaning can only be fully clarified by connecting the OTOC definition of many-body chaos and quantum Lyapunov exponents to observables.
Previous work on single-particle quantum chaos suggests appealing possibilities. Of particular interest here is the early work of Aleiner and Larkin on quantum chaos in disordered metals (with finite-size impurities that enable classical chaos to exist in the corresponding classical model). In Ref. [@AleinerLarkin], they showed that the [*classical Lyapunov exponent*]{} is measurable through quantum interference corrections. It is widely known that the diffusion coefficient in low-dimensional disordered systems is suppressed at low temperatures – the weak localization effect, which hinges on interference of self-crossing trajectories. However, it takes time to develop the first loop and this delay in self-intersection depends on the Lyapunov exponent (which can be calculated via OTOC if desired). As Aleiner and Larkin showed, this phenomenon manifests itself in the frequency-dependence of the weak localization conductivity. It is conceivable that in the presence of interactions, generalized Lyapunov exponents, extractable from OTOCs, would enter the quantum interference terms instead.
Another important conjecture to consider is a generalization of the Bohigas-Giannoni-Schmit conjecture [@BGS; @BGS2] to many-body quantum chaos [@bound]. Its standard version states roughly that quantum systems whose classical limit is classically chaotic (specifically, K-systems) exhibit Wigner-Dyson level statistics. In most cases studied so far, the presence of many-body quantum chaos (OTOC’s Lyapunov growth) can be reformulated in classical terms. In the case of billiards and the Larkin-Ovchinnikov model, OTOC’s growth is due to bouncing of the minimal uncertainty wave packets off of the billiard’s walls or impurities. In the case of SYK models, a classical description does seem to exist but is hidden in the dual variables. It is conceivable that many-body Lyapunov growth is always indicative of the existence of a classically chaotic description at least at the pre-Ehrenfest time. In such cases, the many-body chaotic analogue of the Bohigas-Giannoni-Schmit conjecture should apply and imply universal level statistics.
Acknowledgments
===============
The authors are grateful to Debanjan Chowdhury, Sankar Das Sarma, Sriram Ganeshan, and Brian Swingle for useful discussions. This work was supported by NSF DMR-1613029 (Y.L.), DOE-BES (DESC0001911) and the Simons Foundation (V.G.).
Interaction action and vertices coupling the matrix field ${\hat{W}}$ and HS field $\phi$ {#sec:expressions}
=========================================================================================
In Sec. \[sec:Feynman\], we expand the action $S_{Q}+S_c[{\hat{\mathcal{V}}}=0]$ (Eq. \[eq:NLSM\]) in powers of ${\hat{W}}$, and express it in terms of matrices ${\mathcal{M}}$, ${\mathcal{J}}$ and ${\mathcal{\bar{J}}}$ (see Eq. \[eq:S\]). Here we give the definition of these matrices: $$\begin{aligned}
\label{eq:MJ}
\begin{aligned}
{\mathcal{M}}^{ba,dc}_{21,43}({{\bm{\mathrm{k}}}}_1,{{\bm{\mathrm{k}}}}_2)
\equiv
& \left[ k_1^2 + i hg ({\omega}_1-{\omega}_2) \right]
\delta_{a,d} \delta_{b,c} \delta_{1,4} \delta_{2,3} \delta_{{{\bm{\mathrm{k}}}}_1,{{\bm{\mathrm{k}}}}_2}
\\
& + i h g
\left[
{\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_3)
+
F_{2} {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_3)
\right]
\delta_{a,d} \delta_{b,u} \delta_{c,u} \delta_{1,4}
\\
& + i h g
\left[
- {\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_4-{\omega}_1)
+
F_{1} {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_4-{\omega}_1)
\right]
\delta_{b,c} \delta_{a,u} \delta_{d,u} \delta_{2,3}
\\
& + i h g
\left[
{\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_3)
+
F_{2} {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_3)
\right]
\delta_{a,d} \delta_{b,l} \delta_{c,l} \delta_{1,4}
\\
& + i h g
\left[
- {\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_4-{\omega}_1)
+
F_{1} {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_4-{\omega}_1)
\right]
\delta_{b,c} \delta_{a,l} \delta_{d,l} \delta_{2,3}
\\
&
+i h g
{\Gamma}_2 {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_3)
\delta_{a,d} \delta_{b,l} \delta_{c,u} \delta_{1,4}
+i h g
{\bar{\Gamma}}_1 {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_4-{\omega}_1)
\delta_{b,c} \delta_{a,l} \delta_{d,u} \delta_{2,3}
\\
&
+i h g
{\bar{\Gamma}}_2 {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_3)
\delta_{a,d} \delta_{b,u} \delta_{c,l} \delta_{1,4}
+i h g
{\Gamma}_1 {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_4-{\omega}_1)
\delta_{b,c} \delta_{a,u} \delta_{d,l} \delta_{2,3}
,
\\
{\mathcal{J}}^{b,a}_{2,1}({{\bm{\mathrm{k}}}})
\equiv&
-2 i h \sqrt{g}
\left[
(F_{2}-F_{1}){\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
+(1-F_{1}F_{2}){\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-{\Gamma}_1{\bar{\Gamma}}_2{\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right]
\delta_{b,u}\delta_{a,u}
\\
&
-2 i h \sqrt{g}
\left[
(F_{2}-F_{1}){\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
+(1-F_{1}F_{2}){\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-{\Gamma}_2{\bar{\Gamma}}_1{\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right]
\delta_{b,l}\delta_{a,l}
\\
&
-2 i h \sqrt{g}
\left[
-{\bar{\Gamma}}_1 {\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_2 {\bar{\Gamma}}_1{\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
+{\bar{\Gamma}}_2{\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_1 {\bar{\Gamma}}_2{\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right]
\delta_{b,u}\delta_{a,l}
\\
&
-2 i h \sqrt{g}
\left[
+{\Gamma}_2 {\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_1 {\Gamma}_2{\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-{\Gamma}_1{\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_2 {\Gamma}_1{\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right]
\delta_{b,l}\delta_{a,u}
,
\\
{\mathcal{\bar{J}}}\,^{a,b}_{1,2}({{\bm{\mathrm{k}}}})
\equiv&
-2 i h \sqrt{g} {\phi_{u,\mathsf{q}}}(-{{\bm{\mathrm{k}}}},{\omega}_1-{\omega}_2)
\delta_{a,u} \delta_{b,u}
-2 i h \sqrt{g} {\phi_{l,\mathsf{q}}}(-{{\bm{\mathrm{k}}}},{\omega}_1-{\omega}_2)
\delta_{a,l} \delta_{b,l}
.
\end{aligned}\end{aligned}$$
As mentioned earlier, up to quadratic order in ${\hat{W}}$, the action $S_{Q}+S_c[{\hat{\mathcal{V}}}=0]$ is given by $S_{W}^{(2)}$ (Eq. \[eq:S\]) which is responsible for interaction vertices depicted in Fig. \[fig:Feynman2\]. The amplitudes of these vertices which couples the matrix field ${\hat{W}}$ and HS field $\Phi$ are $$\begin{aligned}
\label{eq:IntVert}
\begin{aligned}
(a)=\,&
-
i h g
\left[
{\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
+
F_{2} {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
\right],
\\
(b)=\,&
-
i h g
\left[
- {\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
+
F_{1} {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
\right],
\\
(c)=\,&
-
i h g
\left[
{\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
+
F_{2} {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
\right],
\\
(d)=\,&
-
i h g
\left[
- {\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
+
F_{1} {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1)
\right] ,
\\
(e)=\,&
-
i h g
{\Gamma}_2 {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1),
\\
(f)=\,&
-
i h g
{\bar{\Gamma}}_1 {\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1),
\\
(g)=\,&
-
i h g
{\bar{\Gamma}}_2 {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1),
\\
(h)=\,&
-
i h g
{\Gamma}_1 {\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}}_1-{{\bm{\mathrm{k}}}}_2,{\omega}_2-{\omega}_1) ,
\\
(i)=\,&
2 i h \sqrt{g} {\phi_{u,\mathsf{q}}}(-{{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1),
\\
(j)
=\,&
2 i h \sqrt{g}
\left[
(F_{2}-F_{1}){\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
+(1-F_{1}F_{2}){\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-{\Gamma}_1{\bar{\Gamma}}_2{\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right] ,
\\
(k)=\,&
2 i h \sqrt{g} {\phi_{l,\mathsf{q}}}(-{{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1),
\\
(l)=\,&
2 i h \sqrt{g}
\left[
(F_{2}-F_{1}){\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
+(1-F_{1}F_{2}){\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-{\Gamma}_2{\bar{\Gamma}}_1{\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right],
\\
(m)=\,&
2 i h \sqrt{g}
\left[
-{\bar{\Gamma}}_1 {\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_2 {\bar{\Gamma}}_1{\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
+{\bar{\Gamma}}_2{\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_1 {\bar{\Gamma}}_2{\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right],
\\
(n)=\,&
2 i h \sqrt{g}
\left[
{\Gamma}_2 {\phi_{u,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_1 {\Gamma}_2{\phi_{u,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-{\Gamma}_1{\phi_{l,\mathsf{cl}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
-F_2 {\Gamma}_1{\phi_{l,\mathsf{q}}}({{\bm{\mathrm{k}}}},{\omega}_2-{\omega}_1)
\right].
\end{aligned} \end{aligned}$$
One-loop self energy
====================
\[App:Sig\]
In this Appendix, we give the explicit expression for the one-loop self energy of matrix field ${\hat{W}}$. As mentioned above, the $\Sigma^{a,a;b,b}$ and $\Sigma^{a,b;a,b}$ components vanish, where $a$, $b$ stand for different augmented space indices. Furthermore, we have
\[eq:SigW\] $$\begin{aligned}
&
\begin{aligned}\label{eq:S0uuuu}
\left( \Sigma \right)^{u,u;u,u}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
=\,
&+
\frac{i}{4} \pi h \gamma g^2 \int_{{\bm{\mathrm{l}}},\xi}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left\lbrace
\begin{aligned}
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\left[F^{(B)}_{\xi}-F_{{\varepsilon}_1^+}\right]
+
\frac{{\Delta}_u(l,-\xi)}{{\Delta}_0(l,-\xi)}
\left[-F^{(B)}_{\xi}-F_{{\varepsilon}_1^+-\xi}\right]
\end{aligned}
\right\rbrace
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left\lbrace
\begin{aligned}
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\left[F^{(B)}_{\xi}+F_{{\varepsilon}_1^-}\right]
+
\frac{{\Delta}_u(l,-\xi)}{{\Delta}_0(l,-\xi)}
\left[-F^{(B)}_{\xi}+F_{{\varepsilon}_1^- + \xi}\right]
\end{aligned}
\right\rbrace
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
\left[ F_{{\varepsilon}_1^+}-F_{{\varepsilon}_1^+ +\xi} \right]
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
\left[ F_{{\varepsilon}_1^- - \xi}-F_{{\varepsilon}_1^-}\right]
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_1-\varepsilon_2)
\left\lbrace
\begin{aligned}
\frac{{\Delta}_u(l,\varepsilon_1-\varepsilon_2)}{{\Delta}_0(l,\varepsilon_1-\varepsilon_2)}
\left[-F^{(B)}_{{\varepsilon}_1-{\varepsilon}_2} + F_{{\varepsilon}_1^+}\right]
+
\frac{{\Delta}_u(l, \varepsilon_2-\varepsilon_1)}{{\Delta}_0(l,\varepsilon_2-\varepsilon_1)}
\left[F^{(B)}_{{\varepsilon}_1-{\varepsilon}_2} - F_{{\varepsilon}_1^-}\right]
\end{aligned}
\right\rbrace
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_2-\varepsilon_1)
\left\lbrace
\begin{aligned}
\frac{{\Delta}_u(l,\varepsilon_1-\varepsilon_2)}{{\Delta}_0(l,\varepsilon_1-\varepsilon_2)}
\left[-F^{(B)}_{{\varepsilon}_1-{\varepsilon}_2} + F_{{\varepsilon}_1^+}\right]
+
\frac{{\Delta}_u(l, \varepsilon_2-\varepsilon_1)}{{\Delta}_0(l,\varepsilon_2-\varepsilon_1)}
\left[F^{(B)}_{{\varepsilon}_1-{\varepsilon}_2} - F_{{\varepsilon}_1^-}\right]
\end{aligned}
\right\rbrace
\end{aligned}
\\
&
\begin{aligned}\label{eq:S0ullu}
\left( \Sigma \right)^{u,l;l,u}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
=\,
&+\frac{i}{4} \pi h \gamma g^2 \int_{{\bm{\mathrm{l}}},\xi}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left\lbrace
\begin{aligned}
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\left[F^{(B)}_{\xi}-F_{{\varepsilon}_1^+}\right]
+
\frac{{\Delta}_u(l,-\xi)}{{\Delta}_0(l,-\xi)}
\left[-F^{(B)}_{\xi}-F_{{\varepsilon}_1^+-\xi}\right]
\end{aligned}
\right\rbrace
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left\lbrace
\begin{aligned}
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\left[F^{(B)}_{\xi}+F_{{\varepsilon}_1^-}\right]
+
\frac{{\Delta}_u(l,-\xi)}{{\Delta}_0(l,-\xi)}
\left[-F^{(B)}_{\xi}+F_{{\varepsilon}_1^- + \xi}\right]
\end{aligned}
\right\rbrace
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
\left[ F_{{\varepsilon}_1^+}-F_{{\varepsilon}_1^+ +\xi} \right]
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
\left[ F_{{\varepsilon}_1^- - \xi}-F_{{\varepsilon}_1^-}\right]
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_1-\varepsilon_2)
\left[
\frac{{\Delta}_u(l,\varepsilon_1-\varepsilon_2)}{{\Delta}_0(l,\varepsilon_1-\varepsilon_2)}
-
\frac{{\Delta}_u(l, \varepsilon_2-\varepsilon_1)}{{\Delta}_0(l,\varepsilon_2-\varepsilon_1)}
\right]
{\Gamma}^{(B)}_{{\varepsilon}_1-{\varepsilon}_2}
\\
&-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_2-\varepsilon_1)
\left[
\frac{{\Delta}_u(l,\varepsilon_1-\varepsilon_2)}{{\Delta}_0(l,\varepsilon_1-\varepsilon_2)}
-
\frac{{\Delta}_u(l, \varepsilon_2-\varepsilon_1)}{{\Delta}_0(l,\varepsilon_2-\varepsilon_1)}
\right]
{\Gamma}^{(B)}_{{\varepsilon}_1-{\varepsilon}_2}
\end{aligned}
\\
&
\begin{aligned}\label{eq:S0ulll}
\left( \Sigma \right)^{u,l;l,l}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
=\,
&-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_1-\varepsilon_2)
\left[
\frac{{\Delta}_u(l,\varepsilon_2-\varepsilon_1)}{{\Delta}_0(l,\varepsilon_2-\varepsilon_1)}
\right]
{\Gamma}_{{\varepsilon}_1^-}
\\
&-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_2-\varepsilon_1)
\left[
\frac{{\Delta}_u(l,\varepsilon_2-\varepsilon_1)}{{\Delta}_0(l,\varepsilon_2-\varepsilon_1)}
\right]
{\Gamma}_{{\varepsilon}_1^-}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left[
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\right]
{\Gamma}_{{\varepsilon}_1^-}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
{\Gamma}_{{\varepsilon}_1^-}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\end{aligned}
\\
&
\begin{aligned}\label{eq:S0uluu}
\left( \Sigma \right)^{u,l;u,u}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
=\,
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_1-\varepsilon_2)
\left[
\frac{{\Delta}_u(l,\varepsilon_1-\varepsilon_2)}{{\Delta}_0(l,\varepsilon_1-\varepsilon_2)}
\right]
{\Gamma}_{{\varepsilon}_1^+}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\varepsilon_2-\varepsilon_1)
\left[
\frac{{\Delta}_u(l,\varepsilon_1-\varepsilon_2)}{{\Delta}_0(l,\varepsilon_1-\varepsilon_2)}
\right]
{\Gamma}_{{\varepsilon}_1^+}
\\
&-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left[
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\right]
{\Gamma}_{{\varepsilon}_1^+}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
{\Gamma}_{{\varepsilon}_1^+}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\end{aligned}
\\
&
\begin{aligned}\label{eq:S0llul}
\left( \Sigma \right)^{l,l;u,l}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
=\,
&
-\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left[
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\right]
{\Gamma}_{{\varepsilon}_1^+}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&
+
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
{\Gamma}_{{\varepsilon}_1^+}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\end{aligned}
\\
&
\begin{aligned}\label{eq:S0uuul}
\left( \Sigma \right)^{u,u;u,l}_{{\varepsilon}_1^-,{\varepsilon}_1^+;{\varepsilon}_2^+,{\varepsilon}_2^-}({{\bm{\mathrm{k}}}})
=\,
&
+\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}}}
{\Delta}_0(\lvert {{\bm{\mathrm{k}}}}-{\bm{\mathrm{l}}} \rvert ,-{\omega}+\xi)
\left[
\frac{{\Delta}_u(l,\xi)}{{\Delta}_0(l,\xi)}
\right]
{\Gamma}_{{\varepsilon}_1^-}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\\
&
-
\frac{i}{4} \pi h \gamma g^2
\int_{{\bm{\mathrm{l}}},\xi}
\left[
{\Delta}_0^{-1}(k,-{\omega}){\Delta}_0(l,\xi){\Delta}_u(l,\xi)+{\Delta}_u(l,\xi)
\right]
{\Gamma}_{{\varepsilon}_1^-}
\delta_{{\varepsilon}_1,{\varepsilon}_2}
\end{aligned}
$$
The remaining components can also be obtained from the above expressions by interchanging the augmented space indices $u \leftrightarrow l$, and at the same time replacing the generalized bosonic (fermionic) distribution function ${\Gamma}^{(B)}$ (${\Gamma}$) with ${\bar{\Gamma}}^{(B)}$ (${\bar{\Gamma}}$).
[10]{}
A. Kitaev, [“Hidden correlations in the Hawking radiation and thermal noise,"]{} talk given at the Fundamental Physics Prize Symposium (Nov. 10 2014).
A. Kitaev, [“A simple model of quantum holography,"]{} KITP strings seminar and Entanglement 2015 program (Feb. 12, April 7, and May 27, 2015).
D. A. Roberts and D. Stanford, [“Diagnosing chaos using four-point functions in two-dimensional conformal field theory,"]{} Phys. Rev. Lett. 115,131603 (2015).
D. A. Roberts, D. Stanford and L. Susskind, [“Localized shocks,"]{} J. High Energy Phys. 03, 051 (2015).
Y. Gu, X.-L. Qi, and D. Stanford, [“Local criticality,diffusion and chaos in generalized Sachdev-Ye-Kitaev models,”]{} J. High Energy Phys. 5, 125 (2017).
D. Stanford, [“Many-body chaos at weak coupling,"]{} J. High Energy Phys. 10, 009 (2016).
S. H. Shenker and D. Stanford, [“Black holes and the butterfly effect,"]{} J. High Energy Phys. 03, 067 (2014).
S. H. Shenker and D. Stanford, [“Multiple shocks,"]{} J. High Energy Phys. 12, 046 (2014).
S. H. Shenker and D. Stanford, [“Stringy effects in scrambling,"]{} J. High Energy Phys. 05, 132 (2015).
J. Maldacena and D. Stanford, [“Remarks on the Sachdev-Ye-Kitaev model,”]{} Phys. Rev. D 94, 106002 (2016).
J. Maldacena, S. H. Shenker, and D. Stanford, [“A bound on chaos," ]{} J. High Energy Phys. 8, 106 (2016).
A. A. Patel and S. Sachdev, [“Quantum chaos on a critical Fermi surface,”]{} Proc. Nat. Acad. Sci. 114, 1844 (2017).
S. Sachdev and J. Ye, [“Gapless spinfluid ground state in a random quantum Heisenberg magnet,"]{} Phys. Rev. Lett. 70, 3339 (1993).
A. A. Patel, D. Chowdhury, S. Sachdev, and B. Swingle, [“Quantum butterfly effect in weakly interacting diffusive metals,"]{} Phys. Rev. X 7, 031047 (2017)
I. L. Aleiner, L. Faoro b, L. B. Ioffe, [“Microscopic model of quantum butterfly effect: Out-of-time-order correlators and traveling combustion waves,"]{} Ann. Phys. [375]{} 378 (2016).
Y. Gu, A. Lucas, X.-L. Qi, [“Energy diffusion and the butterfly effect in inhomogeneous Sachdev-Ye-Kitaev chains",]{} SciPost Phys. 2, 018 (2017).
D. Chowdhury and B. Swingle, [“Onset of many-body chaos in the O(N) model,"]{} Phys. Rev. D 96, 065005 (2017).
G. J. Turiaci, H. Verlinde, [“On CFT and quantum chaos",]{} J. High Energ. Phys. 1612, 110 (2016).
M. J. Klug, M. S. Scheurer, and J. Schmalian, [“Hierarchy of information scrambling, thermalization, and hydrodynamic flow in graphene,"]{} Phys. Rev. B 98, 045102 (2018).
P. Hosur X.-L. Qi D. A. Roberts B. Yoshida [“Chaos in quantum channels",]{} J. High Energy Phys. 02, 004 (2016).
Weak quantum chaos I. Kukuljan, S. Grozdanov, and T. Prosen Phys. Rev. B 96, 060301(R) (2017).
D. A. Roberts and B. Swingle [“Lieb-Robinson bound and the butterfly effect in quantum field theories",]{} Phys. Rev. Lett. 117, 091602 (2016).
S. Banerjee and E. Altman [“Solvable model for a dynamical quantum phase transition from fast to slow scrambling",]{} Phys. Rev. B 95, 134302 (2017).
C. W. von Keyserlingk, T. Rakovszky, F. Pollmann, and S. L. Sondhi [“Operator hydrodynamics, OTOCs, and Entanglement Growth in Systems without Conservation Laws",]{} Phys. Rev. X 8, 021013 (2018).
B. Swingle and D. Chowdhury, [“Slow scrambling in disordered quantum systems,"]{} Phys. Rev. B 95, 060201 (2017).
Y. Huang, Y.-L. Zhang, and X. Chen, [“Out-of-timeordered correlators in many-body localized systems,"]{} Annalen der Physik 529, 1600318 (2016).
X. Chen, T. Zhou, D. A. Huse, and E. Fradkin, [“Out-of-time-order correlations in many-body localized and thermal phases,”]{} Annalen der Physik 529, 1600332 (2017).
Y. Chen, [“Universal logarithmic scrambling in many body localization," ]{} arXiv:1608.02765.
R.-Q. He and Z.-Y. Lu, [“Characterizing many-body localization by out-of-time-ordered correlation,"]{} Phys. Rev. B 95, 054201 (2017).
R. Fan, P. Zhang, H. Shen, and H. Zhai, [“Out-of-time-order correlation for many-body localization,"]{} Science Bulletin 62, 707 (2017),
Y. Gu and X.-L. Qi, [“Fractional statistics and the butterfly effect,”]{} J. High Energy Phys. 8, 129 (2016),
N. Tsuji, T. Shitara, and M. Ueda, [“Out-of-time-order fluctuation-dissipation theorem,"]{} Phys. Rev. E 97, 012101 (2018).
S.-K. Jian and H. Yao [“Universal properties of many-body quantum chaos at Gross-Neveu criticality,"]{} arXiv:1805.12299.
B. Swingle, G. Bentsen, M. Schleier-Smith, and P. Hayden, [“Measuring the scrambling of quantum information,"]{} Phys. Rev. A 94, 040302 (2016).
N. Y. Yao, F. Grusdt, B. Swingle, M. D. Lukin, D. M. Stamper-Kurn, J. E. Moore, and E. A. Demler, [“Interferometric approach to probing fast scrambling,"]{} arXiv:1607.01801.
G. Zhu, M. Hafezi, and T. Grover, [“Measurement of many-body chaos using a quantum clock,"]{} Phys. Rev. A 94, 062329 (2016).
M. G$\ddot{\text{a}}$rttner, J. G. Bohnet, A. Safavi-Naini, M. L. Wall, J. J. Bollinger, and A. M. Rey, [“Measuring out-of-time order correlations and multiple quantum spectra in a trapped ion quantum magnet,"]{} Nature Physics 13, 781 (2017).
J. Li, R. Fan, H. Wang, B. Ye, B. Zeng, H. Zhai, X. Peng, and J. Du, [“Measuring out-of-time-order correlators on a nuclear magnetic resonance quantum simulator,"]{} Phys. Rev. X 7, 031011 (2017).
A. I. Larkin and Y. N. Ovchinnikov, [“Quasiclassical method in the theory of superconductivity,”]{} Sov. Phys. JETP 28, 1200 (1969).
E. B. Rozenbaum, S. Ganeshan, and V. Galitski, [“Universal level statistics of the out-of-time-ordered operator,”]{} arXiv:1801.10591 (2018).
E. B. Rozenbaum, S. Ganeshan, and V. Galitski, [“Lyapunov exponent and out-of-time-ordered correlator’s growth rate in a chaotic system”]{} Phys. Rev. Lett. 118, 086801 (2017).
S. V. Syzranov, A. V. Gorshkov, and V. Galitski [“Interaction-induced transition in the quantum chaotic dynamics of a disordered metal",]{} arXiv:1709.09296.
J. Kurchan, [“Quantum bound to chaos and the semiclassical limit”]{} J. Stat. Phys. 171, 965 (2018) .
J. Maldacena, private communication (September, 2017).
A. Kamenev, A. Levchenko, [“Keldysh technique and non-linear $\sigma$-model: basic principles and applications,”]{} Adv. Phys. 58 (2009) 197–319.
A. Kamenev, *Field Theory of Non-Equilibrium Systems*, Cambridge University Press, Cambridge, England, 2011.
C. Chamon, A. W. W. Ludwig, C. Nayak, [“Schwinger-Keldysh approach to disordered and interacting electron systems: Derivation of Finkelstein’s renormalization-group equations,”]{} Phys. Rev. B 60 (1999) 2239–2254.
A. Kamenev, A. Andreev, [“Electron-electron interactions in disordered metals: Keldysh formalism,”]{} Phys. Rev. B 60 (1999) 2218–2238.
G. Schwiete, A. M. Finkel’stein, [“Keldysh approach to the renormalization group analysis of the disordered electron liquid,”]{} Phys. Rev. B 89 (2014) 075437. Y. Liao, A. Levchenko, and M. S. Foster, [“Response theory of the ergodic many-body delocalized phase: Keldysh Finkel’stein sigma models and the 10-fold way,"]{} Ann. Phys. [ 386]{}, 97 (2017).
B. L. Altshuler, A. Aronov, D. Khmelnitsky, [“Effects of electron-electron collisions with small energy transfers on quantum localisation,”]{} J. Phys. C: Solid State Physics 15 (1982) 7367.
B. L. Altshuler, A. Aronov, [“Electron-electron interaction in disordered conductors,”]{} in: *Electron-Electron Interactions in Disordered Systems*, M. Pollak, A.L. Efros (Ed.), North-Holland, Amsterdam, 1985.
I. Aleiner, B. Altshuler, M. Gershenson, [“Interaction effects and phase relaxation in disordered systems,”]{} Waves Random Media 9 (1999) 201–239.
A. M. Finkelshtein, [“Influence of coulomb interaction on the properties of disordered metals,”]{} Zh. Eksp. Teor. Fiz. 84 (1983) 168–189 \[Sov. Phys. JETP 57 (1983) 97–108\].
G. Zala, B. Narozhny, I. Aleiner, [“Interaction corrections at intermediate temperatures: Longitudinal conductivity and kinetic equation,”]{} Phys. Rev. B 64 (2001) 214204.
S. V. Syzranov, A. V. Gorshkov, V. Galitski [“Out-of-time-order correlators in finite open systems",]{} Phys. Rev. B 97, 161114 (2018).
C. Castellani, C. Di Castro, G. Kotliar, and P. A. Lee, [“Dephasing Time in Disordered Systems,”]{} Phys. Rev. Lett. 56 (1986), 1179.
S. Chakravarty, A. Schmid, [“Weak localization: The quasiclassical theory of electrons in a random potential,”]{} Phys. Rep. 140 (1986) 193–236. I. Aleiner, Y. M. Blanter, [“Inelastic scattering time for conductance fluctuations,”]{} Phys. Rev. B 65 (2002) 115317.
P. A. Lee and T. V. Ramakrishnan, [“Disordered electronic systems,"]{} Rev. Mod. Phys. 57 (1985), 287.
N. Tsuji, T. Shitara, and M. Ueda, [“Bound on the exponential growth rate of out-of-time-ordered correlators,"]{} Phys. Rev. E 98 (2018) 012216.
H. Fukuyama, E. Abrahams, [“Inelastic scattering time in two-dimensional disordered metals,”]{} Phys. Rev. B 27 (1983) 5976–5980.
Y. M. Blanter, [“Electron-electron scattering rate in disordered mesoscopic systems,”]{} Phys. Rev. B 54 (1996) 12807–12819.
Y. Liao, M. S. Foster, [“Dephasing Catastrophe in $4\ensuremath{-}\ensuremath{\epsilon}$ Dimensions: A Possible Instability of the Ergodic (Many-Body-Delocalized) Phase,"]{} Phys. Rev. Lett. 120, 236601 (2018).
G. Zala, B. Narozhny, I. Aleiner, [“Interaction corrections at intermediate temperatures: Dephasing time,”]{} Phys. Rev. B 65 (2002) 180202.
M. R. Zirnbauer, [“Riemannian symmetric superspaces and their origin in random-matrix theory,”]{} J. Math. Phys. 37 (1996) 4986.
A. Altland, M. R. Zirnbauer, [“Nonstandard symmetry classes in mesoscopic normal-superconducting hybrid structures,”]{} Phys. Rev. B 55 (1997) 1142–1161. F. Evers, A. D. Mirlin, [“Anderson Transitions,”]{} Rev. Mod. Phys. 80 (2008) 1355–1417. G. Kotliar, S. Sorella, [“Conductivity and Tunnelling Density of States Exponents at the Metal Insulator Transition with Strong Spin Orbit Scattering,”]{} in: *Field Theories in Condensed Matter Physics: A Workshop*, Addison-Wesley Longman, 1990, p. 125–138.
C. Mudry, *“Lecture Notes on Field Theory in Condensed Matter Physics,"* World Scientific, Singapore, 2014.
I. L. Aleiner and A. I. Larkin Phys. Rev. B 54 (1996) 14423.
O. Bohigas, M. J. Giannoni, and C. Schmit, [“Characterization of chaotic quantum spectra and universality of level fluctuation laws,"]{} Phys. Rev. Lett. 52, 1 (1984).
G. Casati, F. Valz-Gris, and I. Guarnieri, [“On the connection between quantization of nonintegrable systems and statistical theory of spectra,"]{} Lett. Nuovo Cimento 28, 279 (1980).
|
Q:
jQuery: remove class added by ajax success
It's not clear to me how i can remove a class that is added by an ajax success function. I have this code:
$.ajax({
dataType: "json",
[...]
success:function(data) {
for (var i = 0; i < data.length; i++) {
$('[name="'+data[i]+'"]').addClass('tmvc_err');
}
},
});
It basically add a red border to those fields that doesn't pass my php validation script.
Now, i'm tryin to remove that red border (or better, tryin to remove class .tmvc_err) after change event. This is not working:
$(".tmvc_err").on('change', function() {
$(this).removeClass('tmvc_err');
});
It is in a document ready, so i guess the problem is that as the class is added by ajax after the document has come ready, it doesn't find that class. So, how can i fire it?
A:
You need event delegation for dynamically added elements
$(document).on('change', ".tmvc_err", function() {
$(this).removeClass('tmvc_err');
});
Delegated events
Delegated events have the advantage that they can process events from
descendant elements that are added to the document at a later time. By
picking an element that is guaranteed to be present at the time the
delegated event handler is attached, you can use delegated events to
avoid the need to frequently attach and remove event handlers, jQuery docs
A:
Try to use event delegation here since your class have been added dynamically:
Event delegation allows us to attach a single event listener, to a
parent element, that will fire for all children matching a selector,
whether those children exist now or are added in the future.
$("body").on('change','.tmvc_err', function() {
$(this).removeClass('tmvc_err');
});
|
What do I even know about AI?
My experience with “machine learning” is very limited. I’ve built a few systems using naive bayesian classification, decision trees, and clustering. I have a preference for unsupervised learning systems, but usually work with data sets that are too small for that.
I do not consider myself knowledgable enough to provide a technical answer, but I will be happy to address the principle thesis of your question.
Let’s teach computers to classify us based on our body type. Surely, this will provide immense benefit to the gay community.
I actually built a “dumb” classifier for the gay cliques census. I’m too lazy to look at the code, but there’s, like, 30-dimensions of data and almost 2-million rows of data. Definitions are reinforced by people who take the survey, additional data is gathered from people who use the definition tool, and negative feedback is used when people disagree with their classification.
Super basic machine learning system.
All thats missing is a piece on computer vision to assess photos for these dimensions.
Its possible, but why would you do that?
The chart above shows average number of sexual partners for non-monogamous survey responses. (Meaning, folks who didn’t have just one sexual partner in a six month period). Its ordered by least sexually active group to most.
What is surprising is the addition of a new clique, “Pig.” While I have a lot of data on people who identify as pig, the body type varies so greatly that they have not appeared on the live infographic. The only defining constant for pigs is how sexual they are, with the most sexual partners in 30 days of any group.
The chart above shows average number of sexual partners for non-monogamous survey responses. (Meaning, folks who didn’t have just one sexual partner in a six month period). Its ordered by least sexually active group to most.
What is surprising is the addition of a new clique, “Pig." While I have a lot of data on people who identify as pig, the body type varies so greatly that they have not appeared on the live infographic. The only defining constant for pigs is how sexual they are, with the most sexual partners in 30 days of any group.
The data presented represents (currently) over 80,000 survey responses from gay men around the world.
The “Definer” tool calculates the euclidean distance of your stats against the average states of every clique. The shorter the distance, the closer you are to the average body type of that clique.
The tool was actually designed to drive viral traffic to the census by using a “triggering” CTA like Define Me (I also tested What am I? and Where do I belong?). The tool generated (in a peak month) almost 300 facebook shares a day, and also helped me refine results when people felt they were incorrectly defined.
The tool is accurate for physical attributes, but identity in the gay community is more than how much body hair you have. Ultimately, if you identify as a Bear, Bull, Twink, or a Turtle you are that. And nobody can tell you otherwise.
People of Color are underrepresented in the bear community because bears are mostly into other bears and the most self-identified bears are white. (Source: gay cliques census, 2/3s of bears and cubs are into their own type; >80% of self-identified bears are white).
Most bears are white. Most bears are into other bears, who happen to be mostly white guys. So it makes sense that the bear community would cater to its majority audience…except that the bear community was originally designed to be inclusive.
How bad is it?
Bearracuda proudly states that they’re the largest attended bear dance party and most prolific gay dance event in the US. Despite this, they don’t use people of colour in their promotions.
The top dating apps for bears, scruff and growlr, don’t use people of colour in any of their app screenshots, ads, or promotions. Some bear dating sites, like Bear411, won’t even allow people of colour (particularly asians) to join their site.
The biggest bear runs in the world, Lazy Bear, TBRU, and Ptown Bear Week don’t use people of colour in their ads, promotional flyers, or websites.
Correction 5/27: TBRU has used people of colour in previous years’ flyers. Thank you, J Larry for pointing this out! I’m sorry for not digging deeper.
Without some representation in bear-centric media, the bear community sends a strong message that people of colour are not welcome.
But, its not all bad. There are some very prominent people in the bear community who do not practice discrimination against skin colour and even include us in their work.
Where the Bears Are has always had a varied cast of bears representing different ethnicities (like me), Beach Bear Weekend is a new bear run that uses people of colour in their promotions, Bear Invasion has a balanced representation of ethnic minorities (like me).
People of colour are underrepresented by the bear community, but we can change that by supporting bear parties, events, and media that is inclusive.
People of Color are underrepresented in the bear community because bears are mostly into other bears and the most self-identified bears are white. (Source: gay cliques census, 2/3s of bears and cubs are into their own type; >80% of self-identified bears are white).
Most bears are white. Most bears are into other bears, who happen to be mostly white guys. So it makes sense that the bear community would cater to its majority audience…except that the bear community was originally designed to be inclusive.
How bad is it?
Bearracuda proudly states that they’re the largest attended bear dance party and most prolific gay dance event in the US. Despite this, they don’t use people of colour in their promotions.
The top dating apps for bears, scruff and growlr, don’t use people of colour in any of their app screenshots, ads, or promotions. Some bear dating sites, like Bear411, won’t even allow people of colour (particularly asians) to join their site.
The biggest bear runs in the world, Lazy Bear, TBRU, and Ptown Bear Week don’t use people of colour in their ads, promotional flyers, or websites.
Correction 5/27: TBRU has used people of colour in previous years’ flyers. Thank you, J Larry for pointing this out! I’m sorry for not digging deeper.
Without some representation in bear-centric media, the bear community sends a strong message that people of colour are not welcome.
But, its not all bad. There are some very prominent people in the bear community who do not practice discrimination against skin colour and even include us in their work.
Where the Bears Are has always had a varied cast of bears representing different ethnicities (like me), Beach Bear Weekend is a new bear run that uses people of colour in their promotions, Bear Invasion has a balanced representation of ethnic minorities (like me).
People of colour are underrepresented by the bear community, but we can change that by supporting bear parties, events, and media that is inclusive.
I’m working with The University of Texas School of Public Health on a new research project funded by the National Institutes of Health.
The goal of this new study is to learn how the gay social groups (bears, cubs, twinks, etc) impact the health and HIV/STD risk of gay men. What groups are most at-risk? Could we be tailoring sexual health services better? The results could have a very big, positive impact for our community.
Details are still developing, but in the coming months I’ll be traveling to Houston to work on the project and my census will be published…soon.
Originally posted 2014-05-20 00:42:00
Anonymous asks:
I have always loved bears, a lot a lot a lot. So I was wondering, are there a lot of bears in San Francisco?? Because I would love to have a super sexy bear such as yourself or one of your pups. That would make my life. ^_^
Big pup and I don’t identify as Bears. Physically speaking, we are more like Bulls than any other gay subgroup. Lil’ pup is a gym bunny.
Bears account for roughly ~8% of the gay population in any given location, but they are most common in Herndon, VA (+40% more common), Indianapolis, IN (+35%), and Phoenix, AZ (+21%). San Francisco is average for Bear population density. Given that Bears are overwhelmingly into other Bears, you will have the best chance in a city with more Bears than average.
I have always loved bears, a lot a lot a lot. So I was wondering, are there a lot of bears in San Francisco?? Because I would love to have a super sexy bear such as yourself or one of your pups. That would make my life. ^_^
Big pup and I don’t identify as Bears. Physically speaking, we are more like Bulls than any other gay subgroup. Lil’ pup is a gym bunny.
Bears account for roughly ~8% of the gay population in any given location, but they are most common in Herndon, VA (+40% more common), Indianapolis, IN (+35%), and Phoenix, AZ (+21%). San Francisco is average for Bear population density. Given that Bears are overwhelmingly into other Bears, you will have the best chance in a city with more Bears than average.
So, I took the gay clique census and it labelled me as an otter. From what I have seen, otters are tall, gairly hairy, and very slim. I am short (5'4 tall), muscular (160lbs, which on 5'4 shows BMI to be considerd 'overweight' even though my weight is due to muscle mass and not fat), and hairy. I notice that the census doesn't differentiate between weight that is muscle or fat. Can that be made an option? I believe it make several results more accurate.
But, if you look carefully at the data visualization, you might see this:
As you’ve already explained, BMI is flawed and doesn’t take into account ratio of fat to muscle. That’s why I’m calculating VOLUMETRIC DENSITY!!!
This is the formula the US Marines use to check body composition. The higher your volume to weight ratio, the more body fat you have. Volume is calculated as a cylinder where the circumference is given waist size. Its not perfect, but its better than asking people to self select as “fat” or “muscled.”
Originally posted 2013-11-18 05:22:47
Anonymous asks:
So, I took the gay clique census and it labelled me as an otter. From what I have seen, otters are tall, gairly hairy, and very slim. I am short (5'4 tall), muscular (160lbs, which on 5'4 shows BMI to be considerd 'overweight' even though my weight is due to muscle mass and not fat), and hairy. I notice that the census doesn't differentiate between weight that is muscle or fat. Can that be made an option? I believe it make several results more accurate.
But, if you look carefully at the data visualization, you might see this:
As you’ve already explained, BMI is flawed and doesn’t take into account ratio of fat to muscle. That’s why I’m calculating VOLUMETRIC DENSITY!!!
This is the formula the US Marines use to check body composition. The higher your volume to weight ratio, the more body fat you have. Volume is calculated as a cylinder where the circumference is given waist size. Its not perfect, but its better than asking people to self select as “fat” or “muscled.”
Originally posted 2013-11-18 05:22:47
Anonymous asks:
About your census project, can you please include some metrics on race? As a gaysian, I feel regularly disenfranchised wherever I go, so it would be really interesting to see where I fall in your survey's "Most Likely Appreciated" section. It really hit me because as a twink, the section said Melbourne would be a good place to be, but common knowledge and research into sexual racism shows that Asians are on the bottom of most white Australian's lists.
I have data on race, but haven’t released it yet. Spoiler alert: it’s very controversial.
I won’t be doing a racial preference analysis, because that’s been done several times and it’s pretty clear that white gay dudes are most desired. Being a gay man of color cuts your chance of being “desirable” by 75%. I am too lazy to Google this study for citation.
I will be releasing sexual activity by clique affiliation and race soon. Despite being subject to sexual racism, gay men if color get laid way more than their white counter parts. Especially Pacific Islanders, who have the most sexual partners of any racial minority.
This is not new information. The SF sexual health council does a yearly study on gay men with nearly identical results to my online survey. Again, I’m too lazy to cite a link right now. I’m on my phone. I’m sorry.
Eventually I’ll have enough data to express affiliation with gay cliques by race. There is a theory that Asians are less likely to identify as bear…but initial data says this only happens in regions where Asians are a minority. (Interesting!) |
The Wheel
Sometime in the near future, paraplegic prison inmate Matt Mills meets “The Board” of Satoshi-Telefair Industries, who thank him for joining the Program. Under pressure and with a promise to make him walk again, Mills agrees to volunteer. He is injected with a synthetic nanomaterial and suffocated, only to wake up with restored use of his legs, yet alone in a steel cell in the first spoke of an experimental apparatus – The Wheel. A series of assailants inflict a multitude of damage to Mills’ body and torment his mind, yet the synthetic nanomaterial not only restores his damaged organs, it re-engineers his strength. The experiment might be designed to kill, but Mills is determined to survive – and get back to his daughter before The Board finds her first. |
AURA
is a 2D exploration-based music game. You are the pilot of a lone ship, capable of absorbing the power generated by your mothership's aura. You are your people's last hope, and you must get your people to your home planet by collecting fuel contained in nodes that have been placed in an alien land. These nodes are protected by a hive-mind AI that will stop at nothing to keep their resources safe. Collecting the fuel allows the mothership one chance to jump through hyperspace, bringing your people closer to home.
The nodes' behavior is informed by the music being played. As the fuel is gathered, the music being played becomes denser and more complex, culminating in a final encounter with the AI. The music and the game have been designed hand-in-hand to deliver a synchronized audiovisual experience.
THE TEAM
AURA is being developed as the year-long project for the Games and Playable Media Master's program at UC Santa Cruz.
Patrick Trinh
is a game designer, audio designer and musician for AURA. He graduated from UC San Diego with a degree in Cognitive Science in 2012, and has made numerous games during and after his undergraduate study. He has also made music under the name Space Town (formerly Space Town Savior) for several years.
lun cao
is a programmer and designer for AURA from Xi’an, China. After earning a bachelor’s degree for software engineering in his hometown at Xidian University, he gave up a job opportunity at STATE GRID Corporation of China to move to California and study game design.
Facebook: /auragameucsc
Twitter: @auragameucsc
Any questions, concerns and comments regarding AURA can be directed to auragame@gmail.com. |
587 So.2d 750 (1991)
Hattie M. HOLMES
v.
The GREAT ATLANTIC AND PACIFIC TEA CO. d/b/a A & P Food Store.
No. 91-CA-0854.
Court of Appeal of Louisiana, Fourth Circuit.
September 26, 1991.
Rehearing Denied November 13, 1991.
*751 Gothard J. Reck, Uhalt and Reck, New Orleans, for plaintiff/appellant.
Robert E. Peyton, Elizabeth S. Cordes, Christovich & Kearney, New Orleans, for defendants/appellees.
Before SCHOTT, C.J., and LOBRANO and WILLIAMS, JJ.
LOBRANO, Judge.
Plaintiff, Hattie M. Holmes appeals the dismissal of her supplemental petition against Willie J. Bolling on an exception of no cause of action, and the granting of the Great Atlantic and Pacific Tea Co. Inc.'s (A & P) motion to strike her request for trial by jury.
FACTS:
Plaintiff's original and supplemental and amended petitions set forth the following assumed facts.
On August 30, 1988, Holmes slipped and fell in water and/or a plum or other foreign substance while shopping in the A & P food store located at 3233 Magazine Street, New Orleans, Louisiana. Holmes sustained severe contusions to both knees requiring surgery to the left knee; a sprain to the left wrist and other injuries resulting in medical expenses, lost wages, physical and mental pain and suffering and permanent disability. The sole proximate cause of Holmes' accident was the negligence of A & P and its store manager, Willie Bolling, in the following non-exclusive particulars:
1) Failing to use reasonable and ordinary care in keeping the aisles free of foreign substances;
2) Failing to make regular and periodic checks to assure that the aisles of the store were kept free of foreign substances;
3) Failing to remove foreign substances from the floor of the store after being made aware of their presence;
4) Disregarding the safety of customers shopping in the store;
5) Other acts of commission and omission which will be shown at the trial of this cause.
The original petition was filed against A & P. The supplemental and amended petition added Bolling as a defendant and requested trial by jury against both A & P and Bolling.
On July 17, 1990, Bolling filed a peremptory exception of no cause of action asserting that, as A & P's employee, he had no duty to Holmes and thus there could be no cause of action against him. In support, he argued that La.R.S. 9:2800.6 provides a store customer a remedy against only the store owner. A & P filed a motion to strike Holmes' request for trial by jury asserting that Holmes filed the supplemental petition solely for the purpose of circumventing the time limitations imposed by Code of Civil Procedure Article 1733. Both were granted on November 16, 1990.[1]
In his reasons for judgment the trial court stated:
"Under Article 1733 of the Louisiana Code of Civil Procedure, a pleading demanding a trial by jury shall be filed not later than ten days after the service of the last pleading directed to any issue triable by a jury. The court finds that Bolling owed no duty to the plaintiff and, therefore, no cause of action has been stated in plaintiff's First Supplemental and Amended Petition. Because the petition states no cause of action, the demand for trial by jury was not timely."
EXCEPTION OF NO CAUSE OF ACTION:
The exception of no cause of action must be decided on the face of the petition and no evidence may be introduced to support or controvert that exception. C.C.Pro. Art. 931. All well pleaded allegations of the petition must be assumed as true, and any doubt should be resolved in favor of the petition. Darville v. Texaco, 447 So.2d 473 (La.1984); Barnett v. Develle, 289 So.2d 129 (La.1974). The exception tests *752 the legal sufficiency of the petition, and, as such, questions whether the law affords any remedy to the plaintiff under the allegations of its petition. Hero Lands Co. v. Texaco, Inc., 310 So.2d 93 (La.1975); Scariano Brothers, Inc. v. Hammond Construction, 428 So.2d 564 (La.App. 4th Cir. 1983). Thus, the issue for review is whether the law affords Holmes a remedy against Bolling, A & P's employee, for his alleged negligence in causing Holmes' injuries.
Civil Code Articles 2315 and 2316 are the source provisions for all tort actions based on a claim of negligence. Since the decision of Canter v. Koehring Company, 283 So.2d 716 (La.1973), the jurisprudence has been settled that an agent, officer or employee of a corporation may owe a duty to a third person which duty is a result of his employment relationship. That is, duties imposed on him by his employer, the breach of which causes injury to a third person, supports a cause of action against the employee. H.B. "Buster" Hughes, Inc. v. Bernard, 318 So.2d 9 (La. 1975). Whether a breach of a delegated duty by an employee gives rise to personal liability on his part must be determined after trial on the merits and in accordance with the factors set out in Canter v. Koehring Company, supra. In the instant case, however, we need only determine if the factual allegations support a cause of action against Bolling. We hold that they do.
Bolling asserts that La.R.S. 9:2800.6(A)[2] statutorily provides that the exclusive duty owed to a customer injured on the merchant's premises is owed by the merchant and not by the merchant's employees. Bolling contends that since the responsibilities of the employees are discussed only with respect to the evidentiary burden of the merchant, this infers a specific intention on the part of the legislature not to create a personal duty on the part of employees.
This interpretation of R.S. 9:2800.6 is unfounded. Although Section A defines the duty owed by the merchant, the language of the statute in no way creates an exclusive remedy that preempts claims against the merchant's employees who may also be at fault.
La.R.S. 9:2800.6 was enacted to counteract the merchant's burden of proof requirement established by the Supreme Court in McCardie v. Wal Mart Stores, Inc., 511 So.2d 1134 (La.1987).[3] Section "C" of the 1988 statute lessens the burden by requiring only the testimony of employees shown to have actually created the hazardous condition and those whose job responsibilities include inspection or cleanup of the area where the accident occurred. See, Laborde v. Winn Dixie Louisiana, Inc., 563 So.2d 994 (La.App. 4th Cir.1990), writ den., 568 So.2d 1062 (La.1990); Crowther v. K-Mart *753 Corporation, 568 So.2d 669 (La.App. 4th Cir.1990), writ den. 571 So.2d 656 (La.1990).
We conclude that the statute does not create an exclusive remedy against the store owner. We hold that the allegations of Holmes' supplemental petition state a cause of action against Bolling.
TRIAL BY JURY:
A & P asserts the trial judge properly found that Holmes' supplemental and amending petition was filed for the sole purpose of circumventing the time limitations imposed by Code of Civil Procedure Article 1733.[4] The trial court's reasons for judgment make no such finding. Rather, the trial court found that since Holmes' supplemental and amended petition failed to state a cause of action, her request for trial by jury was not timely filed. Since we have determined that a cause of action has been asserted, we also hold that Holmes' request for trial by jury was properly filed. See, Barberito v. Green, 275 So.2d 407 (La.1973); Trichel v. Caire, 395 So.2d 952 (La.App. 2nd Cir.1981), writ den. 399 So.2d 623 (1981).
For the foregoing reasons, the judgment of the trial court is reversed. The case is remanded for further proceedings consistent with this opinion. All costs of this appeal to be paid by appellees.
REVERSED AND REMANDED.
NOTES
[1] Bolling also filed a peremptory exception of no right of action which was denied.
[2] At the time of Holmes' accident, La.R.S. 9:2800.6 read as follows:
"Sec. 2800.6. Liability of a merchant for injuries sustained by a person while on the premises of the merchant
A. A merchant owes a duty to persons who use his premises to exercise reasonable care to keep his aisles, passageways, and floors in a reasonably safe condition. This duty includes a reasonable effort to keep the premises free of any hazardous conditions which reasonably might give rise to damage.
B. In a suit for damages by a person who has suffered damages as the result of a hazardous condition while on the merchant's premises, the person must prove that the accident was caused by a hazardous condition. The burden of proof then shifts to the merchant to prove that he acted in a reasonably prudent manner in exercising the duty of care he owed to the person to keep the premises free of any hazardous conditions.
C. In exculpating himself from liability under this Subsection, the merchant need not introduce the testimony of every employee of the merchant or any particular proportion thereof, but is only required to introduce the testimony of any employee shown to have actually created the hazardous condition and those employees and management personnel whose job responsibilities included inspection or cleanup of the area where the accident giving rise to the damages occurred.
D. `Merchant' means one whose business is to sell, goods, foods, wares, or merchandise at a fixed place of business."
This statute was amended in 1990. However the amended versoin is not applicable to the instant case.
[3] In McCardie, the court concluded that Wal Mart did not meet its burden of proof because it failed to prove that none of its employees caused the spill which precipitated the injury.
[4] La.C.C.Pro. Art. 1733 provides in pertinent part:
"C. The pleading demanding a trial by jury shall be filed not later than ten days after either the service of the last pleading directed to any issue triable by a jury, or the granting of a motion to withdraw a demand for trial by jury." (emphasis added).
|
Project #1 of my 10 projects Launched - rubydoggy
So after 1 and a half month, i launched my first of the ten project challenge.You can find it to my projects section to my Blog http://rubydoggy.com
======
gamechangr
Hopefully...in your "want to be remote full stack developer" you realize that
you will need to work 1-3 years on a team before going "remote".
It looks like a good beginning...keep going!
~~~
rubydoggy
Thank you. I think this challenge will last about 1 1/2 years. I think i can
gain experience to take a junior developer after that.
|
Nine of those injured by the use of force by Spain's National Police and Civil Guard against the Catalan referendum on 1st October 2017 have presented a lawsuit to the National Audience for a charge of a crime against humanity against the senior leadership of the Spanish police. They are being supported by Associació d'Afectats de l'1-O, Associació Advocada per la Democràcia de Lleida and Associació Atenes de Juristes pels Drets Civils.
The complaint names former junior minister José Antonio Nieto; the coordinator of the police operation on the day, Civil Guard colonel Diego Pérez de los Cobos; former regional head of the Civil Guard for Catalonia Ángel Gozalo; former head of the National Police in Catalonia Sebastián Trapote; former delegate of the Spanish government to Catalonia Enric Millo; former delegate of the Spanish government to Barcelona Emilio Ablanedo; former delegate of the Spanish government to Tarragona Jordi Sierra; former under delegate of the Spanish government to Catalonia Inmaculada Manso; former delegate of the Spanish government to Girona Juan Manuel Sánchez, and the senior officers of the Civil Guard and National Police at each polling station.
"Everything happens at the same time and in the same way, it's an order from above which allows the police to act systematically against the population that was voting", said Lluís Mestres, one of the lawyers on the complaint.
Although all of the nine have already presented complaints to their local investigating courts, they believe there's a need to go further. Virgínia Martínez, whose case is before a court in Mataró, said: "Each of us has filed a complaint, independent from our complaints, the lawsuit is for the impunity, because it wasn't a police officer who decided that, it was organised. We have to attack from different directions, and this is certainly one of those which is favourable for us."
"That day I was born again"
"I had an active life, I did a lot of things; at 70 years old I wasn't thinking they'd do something as brutal as that. They knocked me to the ground; [other voters] helped me. Luckily one of them was a nurse and knew there was a clinic with a defibrillator. I was born again." That was the memory of Enric Sirvent who suffered a heart attack that day after being thrown to the ground by a police officer. |
Robustness of factor assays following cordocentesis in the prenatal diagnosis of haemophilia and other bleeding disorders.
Prenatal diagnosis is the generally accepted option for genetic disorders including haemophilias and other bleeding disorders. Cord blood analysis between 17.4 and 20.6 weeks of gestation was performed in 172 confirmed carriers belonging to families of haemophilia A, haemophilia B, von Willebrand disease (VWD), factor VII and X deficiency; 133 were carriers for haemophilia A, 30 for haemophilia B, six for type 3 VWD, two for FX deficiency and one for FVII deficiency. The approach to the cord was either transabdominal or transamniotic. The volume of blood collected varied between 1 and 2 mL. In case of haemophilias, the diagnosis was offered by factor VIII/IX:C activity and antigen assays wherever required. In case of VWD, the diagnosis was based on von Willebrand factor antigen assays as detected by ELISA along with FVIII:C assay while in cases of FVII and FX deficiency, the diagnosis was based on FVII:C and FX:C respectively. The factor levels were compared with the normal range established in the laboratory for different coagulation factors between 18 and 21 weeks of gestation in women tested for other haematological disorders. Only in two cases, the procedure had to be repeated for reasons of extensive maternal contamination. All the deliveries have been followed up and the diagnoses reconfirmed by repeat clotting factor assays and DNA analysis whenever informative. Simple precautions like collection of fetal blood samples in smaller volumes in separate tubes, assaying multiple coagulation factors in the fetal blood samples helped us to offer diagnoses in all the women analysed. No fetal death or abortion was reported following the procedure. We suggest that accurate fetal blood sampling is a safe technique for the diagnosis of many of the bleeding disorders in places where genetic diagnostic services are not available. |
The invention relates to a drive mechanism for a sheet feeder device and its arrangement on a rotary printing machine.
A pneumatic sheet feeder device transfers the paper sheet from a pile and transports the sheet to the transport device which brings the sheets in superimposed arrangement to the printing cylinders.
The scope of the present invention is to provide a drive mechanism for a sheet feeder device consisting of a box, in which the mechanisms of the sheet feeder are arranged which are driven by a common drive shaft which enables the adjustment of the feeder device according to the size of the paper sheet to be printed and also enables the vertical setting of the feeder device.
Sheet feeder devices are known which are driven by means of a push crankshaft which allows for changing the position of the feeder device. The drive shaft of this device is arranged in such a way that the longitudinal axis of the shaft is located vertically to the direction of the movement of the fed sheets to be printed.
A disadvantage of the named device resides in the fact that the rotation of the drive shaft and that of the whole feeder device are not equal due to the influence of the push crankshaft. Also the production of the push crankshaft is complicated and expensive.
A further disadvantage of the device is that there arises during the adjustment of the feeder device a shifting (displacement) of the whole working cycle of the feeder device relative to the working cycle of the printing cylinders.
Another known sheet feeder device comprises a drive shaft which is arranged in such a way, that the longitudinal axis is parallely arranged with the horizontal plane of the sheet pile in the direction of the feeding of the paper sheets. The drive of the shaft is carried out by means of gears and by a rigid connecting shaft. The rotary movement and with this also the operation of the whole sheet feeder device is uniform.
A disadvantage of this feeder device is that the drive shaft, when the device is set for sheets of smaller size (form), is shifted out over the transport device, so that access to the device by the operator is impossible. Another disadvantage is that the rigid connecting shaft makes an adjustment of the feeder device according to the height impossible.
A further known feeder device is arranged on a carrier bracket which is fixed in the side wall of the printing machine. In a special box which also is attached to the side wall of the machine, there is arranged the drive for all mechanisms of the sheet feeder device which are arranged and controlled by means of pull rods.
A disadvantage of the device is in that it cannot be adjusted for height for the reason that while adjustment of the mechanisms should be shifted in their working position, this cannot be done due to the rigid connection of the pull rods. |
Bilateral severe carotid stenosis or occlusion and computed tomographic scan positive hemispheric stroke with neurologic deficit: immediate contralateral carotid endarterectomy.
In the last 10 years, 13 patients presented with acute, hemispheric, computed tomographic scan-positive stroke; neurologic deficit; and bilateral carotid stenosis greater than 90% (N = 9) or ipsilateral occlusion with contralateral stenosis greater than 90% (N = 4). To improve ipsilateral flow without elevation of pressure to levels causing hemorrhagic infarction, all patients underwent carotid endarterectomy on the side contralateral to the hemispheric stroke from two to 10 days (average 6.6 days) from onset of symptoms. Those with fluctuating deficits stabilized to the initial fixed deficit and all 13 improved over the next six months. Four patients with ipsilateral internal carotid occlusion and one with ipsilateral severe siphon stenosis were discharged on antiplatelet therapy; of the remaining eight patients, seven underwent subsequent ipsilateral carotid endarterectomy from 42 to 111 days (average 58.4 days) from onset of symptoms. Mortality and stroke rate were 0. The four patients with internal carotid occlusion and the one with severe siphon stenosis filled both hemispheres from the contralateral carotid artery arteriographically in four and by oculoplethysmography in one. One patient demonstrated preferential flow from contralateral to the ipsilateral hemisphere, but not the reverse; one patient demonstrated pericallosal collaterals. Immediate endarterectomy of the severely diseased carotid artery contralateral to a hemisphere with a computed tomographic scan-positive stroke causing neurologic deficit resulting from a severe carotid stenosis is a safe treatment option and may be beneficial in those with fluctuating neurologic deficits. |
University-Industry Relations At Washington State University
In his book Impure Cultures Daniel Lee Kleinman (2003) addresses the relationships between the culture of the scientific laboratory that he was a participant observer in and the larger outside world of economic and industrial interests. He argues that the ideal of research institutions and places of higher learning as an “Ivory Tower” immune to the outside influences of society and industry in their pursuit of truth is, and always has been, a myth (Kleinman 2003:35). According to Kleinman, the scientific community has always been influenced by commercial and industrial interests to varying degrees over the years since the inception of the public research university (2003:37). Kleinman further argues that the culture of commerce and industry are unavoidably and pervasively influential on the culture of science (2003:31, 32).
In support of his contention that the culture of scientific research is influenced by commercial and industrial culture Kleinman gives several very specific examples of this influence. He addresses the problems and difficulties that can arise when a laboratory needs to rely on an external company to process samples due to the prohibitive costs involved in buying the equipment to do the tests itself (2003:113). The reliance of laboratories on commercially developed “kits” is another area of potential influence by industry on scientific methodology (2003:113). The ownership of Intellectual Property and associated relationships and controversy are yet another area where the scientific community is unavoidably influenced by commercial interests who are granted power through patent law (2003:136). Finally, Kleinman addresses the division and relationship between the technical and social realms, concluding that there are times when “…social factors have temporal and explanatory priority over technical factors” (2003:157)
So do these assertions hold true at Washington State University? A brief survey of web sites associated with the University finds a plethora of anecdotal support for many of Kleinman’s claims. Among a list of special grants available through the Agricultural Research Center is a program intended to develop technology that can help US asparagus producers compete with producers from South America, where worker’s wages are significantly lower (WSU:2009); the WSU Research Foundation states that its goal is to “facilitate the efficient transfer of technology, proprietary information and inventions from WSU laboratories into the marketplace for the benefit of the University, the inventors and society” (WSURF:2009); and the University’s main site showcases agricultural research that aims to “help sustain the U.S. apple industry in the face of economic and environmental challenges” (WSU:2009). Clearly the commercial and industrial sectors have a strong stake in much of the research being conducted at WSU, and also appear to exercise at least some form of control over the direction of research.
Does this influence wielded by industry and commerce pose a threat to the objectivity, free exchange of ideas, and values that are idealized by scientific academia? I think that without proper attention given to minimizing the drawbacks of these University-Industry Relations (URIs) they can pose a threat to some of these academic ideals, most notably curtailing the free exchange of information through patents and other methods of intellectual property control. However, I agree with Kleinman that “if social common sense suggests that without patenting there will be no innovation or commercialization, then there will not be” (2003:137). Although on the surface it may seem that patents and a focus on intellectual property work against the ideals of academia, and it is undeniable that they do pose that risk if misused, it is also important to remember that without some form of commercialization to bring the science to the masses, most of the research that scientists are doing is useless.
If science is to be used for the betterment of humanity and the general good of society, then someone needs to implement it in a form that humanity and society can utilize. Often this implementation costs money. Without the backing of commercial interests to turn the science into something for popular consumption where would this money come from? Therefore I believe that, while undeniably conflicting at times with the ideals of scientific academia, UIRs are a sort of necessary evil. I fully expect in the future to continue to see an increase in the number and breadth of UIRs as universities attempt to further secure their financial standing and simultaneously see that their output, in the form of scientific knowledge, is used for the betterment of society as a whole. |
Lund EZ Bracket Custom Mounting Kit included for an easy installation in under an hour
Lifetime Warranty
Dress up your truck or SUV with Lund TrailRunner Aluminum Running Boards. These steps are available in industrial diamond plate or extruded aluminum styles, with molded end caps that complement your vehicle's looks. They're custom-built to your vehicle, ensuring a perfect fit and easy installation.
Your Lund TrailRunner Running Boards are crafted from durable aluminum for great looks and strength at a light weight. They come in two styles, Extruded Aluminum in polished Brite or subtle Black, and Diamond Plate in Brite. Most Lund TrailRunner Aluminum Running Board Kits include the EZ Bracket Custom Mounting Kit for a simple installation that takes under an hour, with no drilling on most vehicles.
Lund TrailRunner Running Boards come in the perfect length to match your vehicle. They're built to last, and come backed with a Lifetime Warranty. |
The only star to attend the posh do, organised with military precision, was Fame Academy host Patrick Kielty.
He jokingly said to Jodie: "There's still time to change your mind."
About 60 family and friends attended the service in the village of Twineham, West Sussex.
Polo-loving Jodie, 26, held a sheet over her face when she arrived while security men held up a tarpaulin.She and the 28-year-old groom are believed to have sold the rights to a magazine.The marriage took place of entrepreneur Mr Aidan Butler, and celebrated polo player and model Miss Jodie Kidd, at 16th Century St Peter's Church, Twineham, West Sussex.
The bride wore an ivory-coloured, beaded 1930s-style dress and veil.
After the ceremony a reception was held at the All England Jumping Course, Hickstead. |
Zbigniew Kowalski
Zbigniew Kowalski (born December 10, 1970) is a Polish professional footballer, who plays as a defender for Polish second-tier side Znicz Pruszków.
External links
Player profile Znicz Pruszków
Category:1970 births
Category:Living people
Category:Polish footballers
Category:Jagiellonia Białystok players
Category:Górnik Łęczna players
Category:KSZO Ostrowiec Świętokrzyski players
Category:Znicz Pruszków players
Category:People from Świecie
Category:Sportspeople from Kuyavian-Pomeranian Voivodeship
Category:Association football defenders |
Q:
Comparing version numbers with JavaScript
I have written a function that compares two version number strings (e.g. 1.2.0 and 1.2.2) and return 1 if the first string is greater, -1 if the second string is greater and 0 if the strings are equal for a code challenge that I'm attempting.
Also, it's guaranteed that both strings contain an equal number of numeric fields and all decimals are non-negative.
So,
1.2.0 and 1.2.2 should return -1.
1.05.4 and 1.5.3 should return 1.
1.2.6.76 and 1.2.06.0076 should return 0.
My logic for the function was to simply split the string at each occurrence of the period ., compare each number and then add a character (e for equal, m for more and l for less) to a temporary variable z depending on the comparison result.
I then simply use some basic regex to return 1, -1 or 0 based on the content of the z variable as can be seen in the following Code Snippet:
function checkVersion(a,b) {
let x=a.split('.').map(e=> parseInt(e));
let y=b.split('.').map(e=> parseInt(e));
let z = "";
for(i=0;i<x.length;i++) {
if(x[i] === y[i]) {
z+="e";
} else
if(x[i] > y[i]) {
z+="m";
} else {
z+="l";
}
}
if (!z.match(/[l|m]/g)) {
return 0;
} else if (!z.match(/[l]/g)) {
return 1;
} else {
return -1;
}
}
console.log(checkVersion("1.2.2","1.2.0")); // returns 1 as expected
console.log(checkVersion("1.0.5","1.1.0")); // returns -1 as expected
console.log(checkVersion("1.0.5","1.00.05")); // returns 0 as expected
console.log(checkVersion("0.9.9.9.9.9.9","1.0.0.0.0.0.0")) // returns -1 as expected;
The above function seems to be working fine with any random two version numbers that I've tried so far but when I try to submit the above function for the challenge, there is always one hidden test with two unknown version numbers that keeps failing. What logic am I missing in the above code?
EDIT:
Thanks to @RomanPerekhrest's comment above, I have found out that my regex is the problem. Instead of using the 2nd regex, I just remove any occurence of e from the z variable using the split() method and then just check if the first character is m or l and now the function is working correctly as seen in the following Code Snippet:
function checkVersion(a,b) {
let x=a.split('.').map(e=> parseInt(e));
let y=b.split('.').map(e=> parseInt(e));
let z = "";
for(i=0;i<x.length;i++) {
if(x[i] === y[i]) {
z+="e";
} else
if(x[i] > y[i]) {
z+="m";
} else {
z+="l";
}
}
if (!z.match(/[l|m]/g)) {
return 0;
} else if (z.split('e').join('')[0] == "m") {
return 1;
} else {
return -1;
}
}
console.log(checkVersion("2.0.5","1.0.15")); // returns 1 as expected
console.log(checkVersion("1.2.2","1.2.0")); // returns 1 as expected
console.log(checkVersion("1.0.5","1.1.0")); // returns -1 as expected
console.log(checkVersion("1.0.5","1.00.05")); // returns 0 as expected
console.log(checkVersion("0.9.9.9.9.9.9","1.0.0.0.0.0.0")) // returns -1 as expected;
However, I still feel like there must be a shorter, more concise and cleaner way of doing this though. Any suggestions?
A:
A small review;
Once you know that one version digit is larger than the other, you can exit immediately
You did not declare i with const or let
I would advise the use of a beautifier for your code, it's a bit compact in some places
The code does not handle well versions with different counts of digits
You should always pass the base, when you call parseInt
I wrote an alternative version with 2 extra tests;
function checkVersion(a, b) {
const x = a.split('.').map(e => parseInt(e, 10));
const y = b.split('.').map(e => parseInt(e, 10));
for (const i in x) {
y[i] = y[i] || 0;
if (x[i] === y[i]) {
continue;
} else if (x[i] > y[i]) {
return 1;
} else {
return -1;
}
}
return y.length > x.length ? -1 : 0;
}
console.log(checkVersion("1.2.2", "1.2.0"), 1); // returns 1 as expected
console.log(checkVersion("1.0.5", "1.1.0"), -1); // returns -1 as expected
console.log(checkVersion("1.0.5", "1.00.05"), 0); // returns 0 as expected
console.log(checkVersion("0.9.9.9.9.9.9", "1.0.0.0.0.0.0"), -1) // returns -1 as expected;
console.log(checkVersion("1.0.5", "1.0"), 1); // returns 1 as expected
console.log(checkVersion("1.0", "1.0.5"), -1); // returns -1 as expected
console.log(checkVersion('2019.09', '2019.9'), 0) // returns 0
|
The electronic version of this article is the complete one and can be found at: <http://f1000.com/prime/reports/m/6/82>
The burden of pneumococcal disease {#s01}
==================================
A number of significant challenges remain with regard to the diagnosis, treatment, and prevention of infections with *Streptococcus pneumoniae* (pneumococcus) \[[@bib-001]\]. Pneumococcal infections are particularly common in younger children and in older adults and may be divided broadly into invasive and non-invasive disease; the former refers to infections in which the microorganism is isolated from normal sterile body sites, such as the blood or the cerebrospinal fluid \[[@bib-001]\]. Pneumonia is one of the most common clinical presentations of pneumococcal infection and may itself be invasive (i.e. bacteremic) or non-invasive. Importantly, since much of our understanding of the burden of pneumococcal pneumonia comes from studies of bacteremic infections (because they are easy to identify), it needs to be recognized that the true adult burden of pneumococcal pneumonia, when extrapolated from bacteremic cases alone, seriously underestimates the true overall burden of pneumococcal pneumonia. Studies undertaken to develop a conceptual and quantitative strategy for estimating the burden of non-bacteremic infections have suggested that for every bacteremic case there are three non-bacteremic infections \[[@bib-002]\].
Management of pneumococcal infections is potentially being compromised by increasing resistance of the pathogen to antibiotics commonly used to treat these infections \[[@bib-003]-[@bib-005]\]. However, there has been considerable debate about the true impact of current levels of antibiotic resistance, particularly intermediate resistance, on the outcome of pneumococcal infections in patients treated with the different antibiotic classes. In the case of pneumococcal meningitis, poorer outcomes are much more likely to occur in the presence of antimicrobial resistance; however, the situation is less clear-cut with infections such as pneumonia \[[@bib-003]\]. In general, most researchers suggest that, in the case of community-acquired pneumonia (CAP), the use of appropriate β-lactam agents in adequate doses is unlikely to be associated with a poorer outcome but that this is not the case with regard to macrolide resistance (particularly high-level macrolide resistance) or with regard to fluoroquinolone resistance, in which failure of antibiotic therapy in patients treated with these classes of agents in the presence of antibiotic resistance is much more likely to occur \[[@bib-003]-[@bib-005]\].
In the US and Europe, pneumococcal disease carries a high clinical and economic burden, particularly in adults at least 50 years of age, and the mortality of invasive pneumococcal disease has remained unchanged at about 12% since the 1950s despite advances in antibiotic therapy and the introduction of pneumococcal vaccination \[[@bib-001]\]. In the case of human immunodeficiency virus (HIV) infection in the setting of sub-Saharan Africa, pneumococcal disease is second only to *Mycobacterium tuberculosis* infection as a cause of mortality \[[@bib-006]\]. The present article will review some of the recent advances that have been documented in our understanding of the diagnosis, management, and prevention of pneumococcal infection, concentrating particularly on patients with CAP.
Community-acquired pneumonia and pneumococcal infection {#s02}
=======================================================
Lower respiratory tract infections---and, in particular, pneumonia---remain a major cause of morbidity and mortality throughout the world, being the leading infectious disease cause of death \[[@bib-007],[@bib-008]\]. Despite routine microbiological testing, the microbial etiology of CAP is not always identified, but with current laboratory investigations a diagnosis usually can be made in up to 60% of patients \[[@bib-009]\]. Studies investigating CAP etiology have consistently documented that *S. pneumoniae* (the pneumococcus) is the most common microbial cause in the vast majority of cases \[[@bib-009]\]. This holds true whether the severity of the infection is such that the patient may be treated in the community or whether hospitalization or even intensive care unit admission is required. It is also irrespective of the severity of the infection as determined objectively by the use of a severity-of-illness score, such as the pneumonia severity index \[[@bib-009]\]. More recently, it is being increasingly recognized that both seasonal and pandemic influenza may be complicated by secondary bacterial infection, frequently by the pneumococcus. For example, one study of 128 patients during the recent H1N1 swine-origin influenza A virus pandemic documented bacterial co-infection in 42 cases (33%), and the pneumococcus was the most frequently isolated pathogen (26 cases, 62%) \[[@bib-010]\]. Other studies have confirmed the pneumococcus as one of the common bacterial secondary infections in association with critical illness associated with the 2009 influenza A (H1N1) infection \[[@bib-011]-[@bib-013]\].
Pneumococcal virulence factors {#s03}
==============================
The pneumococcus is a formidable adversary, possessing an array of virulence factors that it uses not only for concealment but also to evade and frustrate host defenses. The consequence is the creation of a pro-inflammatory milieu in the lower airways, which, as opposed to being protective, predisposes to inflammation-mediated tissue damage, favoring extra-pulmonary dissemination of the pneumococcus. The most significant of these pneumococcal virulence factors, which were recently described in detail elsewhere \[[@bib-005]\], and the mechanisms used to promote concealment from or evasion of host defenses (or both) are summarized in [Table 1](#tbl-001){ref-type="table"}. It is well recognized that the polysaccharide capsule of the pneumococcus is an important virulence factor of the microorganism, and on the basis of differences in the immunochemistry of the capsule, it has been documented that there are more than 90 pneumococcal serotypes \[[@bib-014]\]. The importance of knowledge of these different serotypes is that it has been recognized more recently that certain serotypes are more virulent than others, are more likely to be associated with invasive disease or certain clinical disease presentations (or both), and are more likely to be associated with a poorer outcome when causing infection \[[@bib-014]-[@bib-017]\]. Furthermore, ongoing surveillance for the circulating serotypes is important in both the development and use of pneumococcal vaccines, such as the pneumococcal conjugate vaccine \[[@bib-014]-[@bib-017]\].
###### Major pneumococcal virulence factors

Factor Activity
-------------------------------- -------------------------------------------------------------------------------------
Polysaccharide capsule Attachment to respiratory epithelial cells (pro-adhesive), evasion of host defenses
Hydrogen peroxide Pro-invasive, evasion of host defenses
Pneumolysin Pro-invasive, evasion of host defenses
Pneumococcal surface adhesin C Pro-adhesive, pro-invasive, evasion of host defenses
Pneumococcal surface protein A Evasion of host defenses
Pneumococcal surface protein C Pro-adhesive, pro-invasive, evasion of host defenses
Diagnosis and prognostication of pneumococcal pneumonia {#s04}
=======================================================
As indicated above, despite fairly extensive microbiological investigation, the microbial etiology of CAP is identified in 60% of patients or less. Clearly, more effective diagnostic tools are required for determining likely etiology. More recently, it has been recognized that determination of the pneumococcal load by using quantitative polymerase chain reaction (PCR) may be a useful tool for the diagnosis of pneumococcal infection and also for assessment of severity of infection and for its prognostication \[[@bib-001],[@bib-018],[@bib-019]\]. An earlier study quantified *S. pneumoniae* DNA levels in blood by real-time PCR in 93 patients with confirmed pneumococcal CAP \[[@bib-018]\]. A positive *S. pneumoniae* PCR was associated with a significantly higher mortality, risk for shock, and need for mechanical ventilation (MV). Logistic regression with appropriate adjustments documented bacterial load as being independently associated with septic shock (adjusted odds ratio \[aOR\] 2.42, 95% confidence interval \[CI\] 1.10 to 5.80) and need for MV (aOR 2.71, 95% CI 1.17 to 6.27), whereas bacterial loads of at least 10^3^ copies per mL (occurring in 29% of patients) were associated with a significantly higher risk of septic shock (OR 8.00), need for MV (OR 10.50), and hospital mortality (OR 5.43). A more recent study documented that detection of pneumococcal DNA in the serum was associated with more severe disease and that there also appeared to be a dose-response effect with increasing bacterial loads being associated with increasing disease severity \[[@bib-019]\]. The authors did not find a similar association between bacterial load and disease severity with the use of sputum specimens, except for in one specific subgroup of patients, namely those who were previous or current smokers \[[@bib-019]\].
Cardiac complications in patients with community-acquired pneumonia, including pneumococcal community-acquired pneumonia {#s05}
========================================================================================================================
It has been recognized for some time that a relatively high incidence of cardiac events occurs in patients with CAP, involving up to a quarter of adults admitted to the hospital, and that the occurrence of such complications may be related to poorer short-term patient outcomes \[[@bib-020]--[@bib-022]\]. These complications may occur even in patients without underlying cardiac disease, and also in patients at low risk of complications, based on a low severity-of-illness score \[[@bib-022]\]. Among the cardiac complications documented is new-onset, or worsening, cardiac failure, new or worsening arrhythmia, or myocardial infarction \[[@bib-021]\]. In one study of 170 pneumococcal pneumonia patients who were admitted to a hospital for management of their infection, 33 cases (19.4%) had one or more of these cardiac complications \[[@bib-023]\]. An important additional finding was that among these pneumococcal pneumonia patients who had a cardiac event, there was a significantly higher mortality than among patients without such events (*P* \< 0.008). In a more recent study of 3,921 patients with CAP, of whom 315 (8%) had one or more acute cardiac events, multivariate analysis documented factors associated with these events, and among these parameters was pneumococcal etiology \[[@bib-024]\]. The authors derived a prediction rule based on these variables which could allow bedside evaluation of the likelihood of acute cardiac events \[[@bib-024]\]. Interestingly, in one study of 6,171 patients with CAP, of whom 175 (3%) developed acute coronary syndromes (ACSs), prior exposure to the polyvalent polysaccharide pneumococcal vaccine was independently associated with a 58% reduction in ACS events (adjusted hazard ratio 0.42, 95% CI 0.27 to 0.66) \[[@bib-025]\].
Sensitivity analysis suggested that these findings were related, at least in part, to a "healthy vaccinee" effect, and the authors concluded that because of this confounding the benefits of pneumococcal polysaccharide vaccine (PPV) were more likely to be much smaller than the initial analysis suggested but that the sensitivity analyses could not refute the existence of some, perhaps small, protective benefit of PPV \[[@bib-025]\]. It is now commonly recommended that CAP patients who are not reaching clinical stability in response to appropriate therapy should be evaluated for a possible cardiac event since early recognition and treatment of these events may improve patient outcomes.
Antimicrobial treatment of pneumococcal community-acquired pneumonia {#s06}
====================================================================
A myriad of guidelines have been developed globally describing the optimal management of CAP, including a consideration of the most appropriate antibiotic therapy \[[@bib-026]\]. Although differences are found in the recommendations from the different regions, recommendations usually include a β-lactam or a macrolide, or a fluoroquinolone, either alone or in certain combinations \[[@bib-026],[@bib-027]\]. Many guidelines recommend that in more severely ill, hospitalized patients with CAP, the choices of antibiotic therapy are either a β-lactam and macrolide combination or a fluoroquinolone alone. There is some debate as to whether these two alternative regimens are equally effective, and the data are somewhat contradictory. In a study among outpatients with pneumonia, patients receiving guideline-concordant therapy were less likely to die within 30 days than those receiving non-concordant treatment, and within the former group, those receiving macrolides were less likely to die compared with those treated with a fluoroquinolone alone (aOR 0.28, 95% CI 0.09 to 0.86; *P* = 0.03) \[[@bib-028]\]. A systematic review and meta-analysis by the same author among hospitalized patients with CAP documented that macrolide-based regimens were associated with a 22% reduction in mortality compared with non-macrolide-containing treatments, but the benefit was not seen in randomized controlled trials or in patients receiving guideline-concordant therapy, suggesting that guideline compliance was more important than the choice of antibiotic class \[[@bib-029]\]. Macrolide-based regimens were documented to be associated with better patient outcomes among patients hospitalized with bacteremic pneumonia (including pneumococcal pneumonia) \[[@bib-030]\]. In a recent systematic review and meta-analysis of critically ill patients with CAP, which retrieved 28 observational studies involving almost 10,000 patients, macrolide use was associated with a significant 18% relative and 3% absolute reduction in the mortality of patients compared with non-macrolide therapies \[[@bib-031]\]. Combination therapy has been shown to be of greater benefit compared with monotherapy in bacteremic pneumococcal CAP and in severely ill hospitalized patients with pneumococcal bacteremia \[[@bib-027],[@bib-032]\].
The reason that macrolide combination regimens may be associated with better outcomes is uncertain and may be multifactorial in origin. Possibilities include the following:Cover for atypical pathogensCover for polymicrobial therapyCover for antimicrobial resistanceAntibiotic synergyAnti-inflammatory, immunomodulatory activity of macrolides.
Many investigators, including these authors, believe that this may relate to the alternative activities of the macrolides, and the use of macrolides, in this fashion, as adjunctive therapy is described in more detail below.
Adjuvant anti-inflammatory strategies in severe pneumococcal disease {#s07}
====================================================================
As mentioned above, a significant percentage of patients with severe pneumococcal disease will die, despite the implementation of ostensibly effective antibiotic therapy. This is due, at least in part, to misdirected inflammatory responses orchestrated by the pneumococcus which not only disrupt epithelial and endothelial barriers but also counteract the harmonious interactions between antibiotics and host defenses which optimize the eradication of microbial pathogens \[[@bib-033]\]. In addition, the invasion of host cells, especially epithelial and endothelial cells \[[@bib-034]\], as well as erythrocytes \[[@bib-035]\], protects the pneumococcus against β-lactam antibiotics, which in comparison with more lipophilic agents such as macrolides are poorly taken up by eukaryotic cells \[[@bib-036]\]. Bactericidal antibiotics, such as β-lactams, may also exacerbate harmful inflammatory responses by causing disintegration of the pneumococcus, resulting in the release of pro-inflammatory cell wall components such as lipoteichoic acid and peptidoglycan, as well as the cytotoxin pneumolysin \[[@bib-037]\].
The primary goal of adjunctive anti-inflammatory therapy in severe pneumococcal disease is therefore to optimize antibiotic therapy and survival. Although many varied strategies have been tried, those considered to have the greatest potential are macrolide antibiotics, in particular, as well as corticosteroids and statins \[[@bib-005],[@bib-038]\].
Macrolide antibiotics {#s07_1}
---------------------
As mentioned earlier, combination therapy with a β-lactam and a macrolide is recommended in patients with more severe pneumococcal disease. Although this approach can be justified solely on the grounds of microbiological criteria, macrolides, in addition to their primary antimicrobial activities, also possess anti-inflammatory properties that are believed to contribute to their therapeutic efficacy in severe pneumococcal disease.
Macrolides possess an unusual, dual mechanism of anti-inflammatory activity targeting both the pathogen and inflammatory cells of the host. In the case of the former, macrolides via their primary, selective inhibitory effects on bacterial protein synthesis suppress the production of pneumococcal adhesins, invasins, cytotoxins, and immunosubversins. In addition, because they are bacteriostatic as opposed to bactericidal, macrolides do not cause abrupt, potentially pro-inflammatory disintegration of target pathogens.
Neutrophil-mediated inflammation is the major target of the secondary anti-inflammatory activity of macrolides, unrelated to antimicrobial activity. Neutrophils are the predominant type of leukocyte in the circulation. They are small phagocytic cells that circulate in a relatively quiescent state and are rapidly mobilized to sites of infection, a process that is orchestrated via regional, pro-adhesive alterations to vascular endothelium. These cells use an array of indiscriminate, toxic reactive oxygen species and proteases to eliminate ingested pathogens. If inappropriately activated, however, these same neutrophil-derived antimicrobial agents have the potential to cause considerable tissue damage \[[@bib-039]\].
Macrolides inhibit neutrophil influx by suppressing the synthesis of the neutrophil-mobilizing chemokines/cytokines interleukin-8 and tumor necrosis factor by various types of structural cells (epithelial cells, fibroblasts, and smooth muscle cells) in the airways as well as by resident lung macrophages \[[@bib-040],[@bib-041]\]. These effects appear to be achieved via interference with mechanisms involved in the transcription of genes encoding these pro-inflammatory proteins \[[@bib-040]-[@bib-043]\].
Evidence that the anti-inflammatory activities of macrolides are operative *in vivo* has been derived from both experimental animal studies and clinical studies in humans. In the case of the former, two studies are particularly noteworthy. In the first of these, in which the investigators used a murine model of secondary pneumonia caused by an antibiotic-sensitive strain of the pneumococcus following influenza virus infection, significantly improved survival was observed in animals treated with azithromycin (macrolide) or clindamycin (macrolide-like agent) alone or in combination with ampicillin (β-lactam) relative to those treated with ampicillin alone \[[@bib-044]\]. Improved survival in the azithromycin/clindamycin-treated groups was associated with a reduction in indices of pulmonary inflammation and tissue damage \[[@bib-044]\]. More recently, others using a murine model of primary pneumococcal pneumonia caused by an antibiotic-resistant strain of the pneumococcus reported essentially similar findings when comparing responses to treatment with ampicillin alone and in combination with azithromycin \[[@bib-045]\]. Although the secondary anti-inflammatory activity of azithromycin is likely to have contributed to the positive outcome in both of these studies, primary antimicrobial activity cannot be excluded, even in the setting of antibiotic resistance \[[@bib-046],[@bib-047]\].
In the clinical setting, justification for combination antibiotic therapy of CAP, most commonly a β-lactam with a macrolide, is based on a series of observational studies, prospective and retrospective, undertaken between 1999 and 2010 \[[@bib-005],[@bib-048]\]. The efficacy of combination therapy, which was associated with significantly lower in-hospital and intensive care unit mortality, was attributed to improved antimicrobial coverage, encompassing pathogens that were not susceptible to β-lactams. Although broadening of antimicrobial coverage explains, in part, the benefit of combination therapy, several noteworthy studies have documented the apparent involvement of macrolide-mediated anti-inflammatory activity. In these studies, macrolide therapy was associated with significantly increased survival in patients with (i) pneumonia and severe sepsis caused by macrolide-resistant pathogens, predominantly Gram-negative bacteria \[[@bib-049]\]; (ii) pneumonia caused by antibiotic-resistant strains of the pneumococcus, the so-called "*in vivo-in vitro* paradox" \[[@bib-050]\]; and (iii) acute lung injury secondary to pneumonia irrespective of the causative pathogen \[[@bib-051]\].
Although macrolides appear to be ideal adjuncts to β-lactams in the therapy of severe pneumococcal disease, acceptance of this strategy is not universal \[[@bib-052]-[@bib-054]\] and will depend on the acquisition of convincing data from large multicenter, prospective, randomized, controlled clinical trials. One such trial, currently ongoing, is the CAP-START trial (Community-Acquired Pneumonia-Study on the Initial Treatment With Antibiotics of Lower Respiratory Tract Infections -- NCT01660204). This trial, which involves 2,100 CAP patients admitted to one of seven Dutch hospitals, is designed to assess the comparative efficacy of therapy with a β-lactam alone or combined with a macrolide, and fluoroquinolone monotherapy, with all-cause mortality 90 days after hospital admission as the primary outcome (NCT01660204). It seems important, however, that such trials address the issue of subgroups of patients most likely to benefit from macrolide therapy, specifically those at the highest potential risk from the adverse consequences of neutrophilic inflammation. These include patients who smoke and those with pneumonia secondary to influenza infection, a combination of these risk factors, or acute lung injury.
Corticosteroids {#s07_2}
---------------
These are broad-spectrum anti-inflammatory agents that are commonly recommended for the adjunctive therapy of penicillin-susceptible meningitis \[[@bib-055]\]. The situation with regard to corticosteroid use in meningitis, though somewhat controversial, appears to be more clear-cut than is the case with patients with CAP. When all the evidence is taken into account, it appears that corticosteroid use in patients with acute meningitis may be associated with a lower mortality in adults and with fewer neurological and auditory sequelae in both adults and children, in high-income countries, and particularly in the subset of cases specifically with pneumococcal meningitis \[[@bib-056]-[@bib-059]\]. Earlier studies involving relatively small numbers of adult patients with severe CAP \[[@bib-060]-[@bib-062]\], and more recently in children \[[@bib-063]\], reported a benefit of adjunctive intravenous corticosteroid therapy with respect to duration of hospital stay or mortality or both. Somewhat disappointingly, however, the promise of this adjunctive strategy has not been confirmed in one large, randomized, double-blinded, placebo-controlled trial in adults with severe CAP \[[@bib-064]\] or in another large retrospective study \[[@bib-065]\]. Although the reasons for the apparent lack of efficacy of systemic administration of corticosteroids are unknown, it is noteworthy that neutrophils are relatively insensitive to the anti-inflammatory actions of corticosteroids \[[@bib-066]\]. In addition, it was recently reported that high levels of the endogenous corticosteroid, cortisol, are predictive of critical disease and mortality in patients with severe CAP \[[@bib-067]\].
A definitive answer on the adjunctive role of systemic administration of corticosteroids in severe CAP is likely to emerge on completion of three ongoing stringently controlled clinical trials: one in the US (Extended Steroids in CAPe-ESCAPe) (NCT01283009) and two others in Spain (NCT00908713) and Switzerland (NCT00973154).
Statins {#s07_3}
-------
These pharmacological agents inhibit the enzyme 3-hydroxy-3-methylglutaryl coenzyme A reductase, an activity which underpins their therapeutic efficacy in controlling hypercholesterolemia in the prevention of cardiovascular disease and stroke. Statins, however, also possess secondary anti-inflammatory properties which are achieved via (i) interference with G-protein receptor-mediated signaling mechanisms in immune and inflammatory cells \[[@bib-068]\] and (ii) induction of the enzyme heme oxygenase-1 which, in turn, mediates the synthesis of anti-inflammatory proteins \[[@bib-069]\]. Both mechanisms have the potential to control harmful neutrophilic inflammation.
Statin use for the prevention of cardiovascular disease has been reported in a number of largely retrospective studies to confer a significant survival advantage on patients with bacterial CAP (reviewed in \[[@bib-070],[@bib-071]\]) as well as in those with documented pneumococcal disease \[[@bib-072]\]. Although these protective effects of statins may result from their secondary anti-inflammatory activity, other mechanisms have also been proposed. These include protection against acute cardiac events triggered by pneumonia \[[@bib-070]\] as well as possible interference with the cytotoxic and pro-inflammatory activities of the cholesterol-binding pneumococcal toxin, pneumolysin \[[@bib-005]\].
Given the limitations of the largely observational studies reported to date, together with the uncertainty surrounding the exact therapeutic mechanisms involved, randomized controlled studies are essential to conclusively establish a link between current statin use and reduced mortality from CAP \[[@bib-071],[@bib-073]\].
Immunization strategies {#s08}
=======================
Pneumococcal vaccine development is targeted primarily at the anti-phagocytic, polysaccharide capsule, the major virulence determinant of the pathogen. The existence of about 94 immunogenic capsular variants (serotypes), however, has complicated vaccine development. The number of serotypes covered in polysaccharide-based vaccines is therefore determined by serotype virulence and prevalence. Two types of vaccine are currently available, those which contain a cocktail of unconjugated purified capsular polysaccharides and those in which the capsular polysaccharides are conjugated to a carrier protein to enhance immunogenicity. Of these vaccine types, those in current use are the pneumococcal polysaccharide vaccine 23 (PPV23), which contains unconjugated pneumococcal capsular polysaccharides from 23 different serotypes, and the more recently developed conjugate vaccine, PCV13 \[[@bib-074]\]. The latter vaccine contains capsular polysaccharides from 13 prevalent serotypes conjugated to an attenuated, common protein carrier immunogen, diphtheria toxin cross-reactive material 197 (CRM197) \[[@bib-074]\].
In addition to coverage of the predominant serotypes causing pneumonia and invasive pneumococcal disease, immunogenicity in high-risk groups is the primary criterion for vaccine efficacy. These include the very young and the elderly in particular as well as smokers, HIV-infected persons, and other high-risk groups associated with secondary immunosuppression. Limitations of PPV23 include poor efficacy in the very young and the elderly, who because of immature and senescent immune systems, respectively, respond poorly to unconjugated pneumococcal polysaccharides \[[@bib-074],[@bib-075]\]. The efficacy of PPV23 for adults in high-risk groups is enhanced when preceded by PCV13 in a so-called "prime-boost" strategy, with the two vaccines being administered at least 8 weeks apart \[[@bib-076]\].
Currently, PCV13 appears to be the most effective pneumococcal vaccine, having been introduced into childhood immunization programs in many countries. It is also licensed for use in other high-risk categories and for adults who are 50 years old or older. Importantly, in a very recently completed multi-center, double-blind, placebo-controlled trial to which 84,496 older Dutch patients (65 years old or older) were recruited (the CAPITA trial: Community-Acquired Pneumonia Immunization Trial in Adults), PCV 13 was found to be protective against a first episode of vaccine-type CAP and invasive disease \[[@bib-077]\].
On a cautionary note, the widespread use of PCVs has raised concerns about "serotype replacement", meaning nasopharyngeal colonization with non-vaccine serotypes which, in turn, can cause active infection. Although this appears to have been an issue with first-generation PCVs, specifically PCV7 \[[@bib-078]\], it is likely to be less so with the newer extended-coverage vaccines, PCV13 and PCV15, which include the most invasive serotypes of the pneumococcus \[[@bib-079]\]. Nonetheless, given the potential of vaccine-induced selective pressure to promote nasopharyngeal colonization with capsular-switch, penicillin-resistant variants, continued vigilance is essential \[[@bib-080],[@bib-081]\]. Pipeline and future vaccines are focused largely on highly conserved pneumococcal proteins as well as whole-cell vaccines, which may provide much broader, serotype-independent protection \[[@bib-074]\].
Conclusions {#s09}
===========
Much progress is being made in our understanding of the pneumococcus and of pneumococcal infections. The true burden of disease is now better recognized. New molecular mechanisms of investigation may well pave the way for better identification of the presence of pneumococcal colonization and of active infections. Additional factors that may be associated with poorer outcome of infections, such as cardiac complications, are being better recognized, and aspects of more optimal treatment, both with antibiotics and with adjunctive therapies, are being delineated. Additional strides in disease prevention in both children and adults, with the development of more effective vaccines, are taking place. It is hoped that all these advances in our understanding of the disease will ultimately lead to a better outcome among the patients.
Charles Feldman is supported by the National Research Council of South Africa.
Disclosures
===========
Charles Feldman has acted on the advisory boards of, and received honoraria for presentations and received support for congress travel from, pharmaceutical companies marketing and manufacturing macrolide antibiotics---Pfizer and Abbott---and pneumococcal vaccines (Pfizer). Ronald Anderson declares that he has no disclosures.
ACS
: acute coronary syndrome
aOR
: adjusted odds ratio
CAP
: community-acquired pneumonia
CI
: confidence interval
HIV
: human immunodeficiency virus
MV
: mechanical ventilation
OR
: odds ratio
PCR
: polymerase chain reaction
PCV
: pneumococcal conjugate vaccine
PPV
: pneumococcal polysaccharide vaccine
|
A slow clearing, fibrin-specific, PAI-1 resistant variant of t-PA (T103N, KHRR 296-299 AAAA).
Site directed mutagenesis was used to construct a t-PA variant that contains an additional glycosylation site in the first kringle domain (T103N) combined with a tetra-alanine substitution in the protease domain (KHRR 296-299 AAAA). This combination variant has a plasma clearance rate that is 4.5-fold slower in rats and 5.4-fold slower in rabbits than t-PA. It is also less than one tenth as active as t-PA towards plasminogen in the presence of fibrinogen, and has approximately twice the normal activity in the presence of fibrin. It shows substantial resistance to the fast acting inhibitor, plasminogen activator inhibitor-1 (PAI-1), requiring a 10-fold greater molar excess of PAI-1 to reduce its activity by 50%, compared to t-PA. This is the result of a reduction of nearly 100-fold in the second order rate constant for PAI-1 inactivation. These results show that it is possible to combine mutations in different domains of t-PA to construct a variant which is simultaneously slower clearing, less reactive towards plasminogen in the absence of a fibrin clot, and resistant to inactivation by PAI-1. |
Genie reaches Summit
Virgin Radio 953 (CKZZ-FM) is a Canadian radio station with
studios located in Richmond, British Columbia. It has a 71.3kW
transmitter, which is situated on the forward slopes of Mount
Seymour
facing out over the Greater Vancouver region.
“Mount Seymour is very remote and there are no IP or ISDN links in
that part of the world,” said Cody MacKay, Director of Engineering
for Astral Radio in Vancouver since 2009. “I manage the engineering
requirements for 3 stations and like many other stations in the
region we use a point-to-point microwave link between our studios
in Richmond and the transmitter site on Mount Seymour to transmit
the signal for CKZZ.”
“Our ageing studio-to-transmitter codecs were becoming increasingly
unreliable and a few months ago I decided to replace them with new
generation IP codecs. I was impressed by the features offered by
the Genie STL IP codec, so I called Tyler Everitt at Pippin
Technical with the intention of putting the codecs to the
test.”
“Tyler was very helpful in arranging the demo and when they arrived
I connected them up to the internet to see how they performed over
an unmanaged public IP link. I was very impressed. They were very
easy to configure and were rock steady over the open internet over
an extended test period, so I figured they would be pretty solid
over a dedicated microwave link with loads of bandwidth.”
“We ordered a pair of the Genie STLs and installed one at the
studio and the other at the transmitter. They were simple to
install and are connected using AAC encoding at 192Kbps. The codecs
are perfect for our purpose and probably the thing I was most
impressed with is the multiple levels of redundancy offered by the
Genies.”
“Dual power, dual Ethernet and audio backup are standard and the
codecs also include STL-grade alarm options. The network failure
detection feature also lets you switch seamlessly to an alternative
ISP backup connection if your primary network connection is
temporarily lost. This is managed by Tieline’s SmartStream PLUS
software which can stream simultaneous
redundant packet streams from each Ethernet port.”
“The codecs have been installed and connected to our Dragonwave
AirPair wireless backhaul link and on air continuously for months
now and they haven’t missed a beat! They have performed flawlessly
and sound great. When our other mission critical links need to be
replaced I would have no hesitation in installing Genie STLs at
these other sites.” |
Q:
how to use instance class in select body of linq
Customer cus=new customer();
from c in doc.Descendants(XName.Get("details", name))
select
{
cus.firstname =c.Element(XName.Get("to", name)).value;
}
how to use instance variable in select body of linq
HI,
I need to access cust instance variable name inside the select statement.
I don't want to create new instance like
select new customer
{
cus.firstname.
}
Any help in this.
A:
It should be much easier with method-based approach:
cus.firstname = doc.Descendants(XName.Get("details", name))
.Element(XName.Get("to", name))
.Value;
To fill more properties you can save you <details> element into a variable and use it later:
var details = doc.Descendants(XName.Get("details", name)).FirstOrDefault();
if(details != null)
{
cus.firstname = details.Element(XName.Get("to", name)).Value;
cus.lastname= details.Element(XName.Get("from", name)).Value;
}
This will prevent iterating through XML over and over again.
|
package main
import (
"fmt"
"net/http"
"github.com/codegangsta/negroni"
)
func index(w http.ResponseWriter, req *http.Request) {
fmt.Fprintf(w, "Welcome!")
}
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/", index)
n := negroni.Classic()
n.UseHandler(mux)
n.Run(":8080")
}
|
3243 Rancho RdMarysville, CA95901
Click the map to create a shape. To complete the area, click the indicator on the first point.
Click the map to select a corner. Click the other corner to end selection
Driving Directions
Start:
End:
Property Description for 3243 Rancho Rd, Marysville CA 95901
The subject property is 10 acres of M1/Industrial land located in the Yuba County Rancho Road Industrial and Commercial Park'' and has the added benefit of being in the Yuba County Enterprise Zone. This choice parcel fronts Hwy 65, and is almost directly across the Hwy from the Amphitheatre, proposed racing complex and American Indian gambling complex. Possible owner carry. Well on the property, electricity at the site.
All measurements and all calculations of area (i.e., Sq Ft and Acreage) are approximate. Broker has represented to MetroList that Broker has a valid listing signed by seller authorizing placement in the MLS. Above information is provided by Seller and/or other sources and has not been verified by Broker. Copyright 2016 MetroList Services, Inc. Based on information from MetroList Services, Inc. |
/* Copyright Fedor Indutny. All rights reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to
* deal in the Software without restriction, including without limitation the
* rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
* sell copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
* IN THE SOFTWARE.
*/
#include "http_parser.h"
#include <assert.h>
#include <stdint.h>
#include <stdio.h>
#include <string.h>
#include <sys/time.h>
/* 8 gb */
static const int64_t kBytes = 8LL << 30;
static const char data[] =
"POST /joyent/http-parser HTTP/1.1\r\n"
"Host: github.com\r\n"
"DNT: 1\r\n"
"Accept-Encoding: gzip, deflate, sdch\r\n"
"Accept-Language: ru-RU,ru;q=0.8,en-US;q=0.6,en;q=0.4\r\n"
"User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) "
"AppleWebKit/537.36 (KHTML, like Gecko) "
"Chrome/39.0.2171.65 Safari/537.36\r\n"
"Accept: text/html,application/xhtml+xml,application/xml;q=0.9,"
"image/webp,*/*;q=0.8\r\n"
"Referer: https://github.com/joyent/http-parser\r\n"
"Connection: keep-alive\r\n"
"Transfer-Encoding: chunked\r\n"
"Cache-Control: max-age=0\r\n\r\nb\r\nhello world\r\n0\r\n";
static const size_t data_len = sizeof(data) - 1;
static int on_info(http_parser* p) {
return 0;
}
static int on_data(http_parser* p, const char *at, size_t length) {
return 0;
}
static http_parser_settings settings = {
.on_message_begin = on_info,
.on_headers_complete = on_info,
.on_message_complete = on_info,
.on_header_field = on_data,
.on_header_value = on_data,
.on_url = on_data,
.on_status = on_data,
.on_body = on_data
};
int bench(int iter_count, int silent) {
struct http_parser parser;
int i;
int err;
struct timeval start;
struct timeval end;
if (!silent) {
err = gettimeofday(&start, NULL);
assert(err == 0);
}
fprintf(stderr, "req_len=%d\n", (int) data_len);
for (i = 0; i < iter_count; i++) {
size_t parsed;
http_parser_init(&parser, HTTP_REQUEST);
parsed = http_parser_execute(&parser, &settings, data, data_len);
assert(parsed == data_len);
}
if (!silent) {
double elapsed;
double bw;
double total;
err = gettimeofday(&end, NULL);
assert(err == 0);
fprintf(stdout, "Benchmark result:\n");
elapsed = (double) (end.tv_sec - start.tv_sec) +
(end.tv_usec - start.tv_usec) * 1e-6f;
total = (double) iter_count * data_len;
bw = (double) total / elapsed;
fprintf(stdout, "%.2f mb | %.2f mb/s | %.2f req/sec | %.2f s\n",
(double) total / (1024 * 1024),
bw / (1024 * 1024),
(double) iter_count / elapsed,
elapsed);
fflush(stdout);
}
return 0;
}
int main(int argc, char** argv) {
int64_t iterations;
iterations = kBytes / (int64_t) data_len;
if (argc == 2 && strcmp(argv[1], "infinite") == 0) {
for (;;)
bench(iterations, 1);
return 0;
} else {
return bench(iterations, 0);
}
}
|
- Corona.JPG
- Sail-01.JPG
- Sail-02.JPG |
Q:
How to fix the query errors
I want to put randomised (will later be substituted with real numbers) numbers and a timestamp in a mySQL database.
I am running the SQL Server on my PC, if I copy & paste the comand in the SQL Terminal it works, but with python it generates errors
import pymysql
import random
import time
import datetime
def dynamic_data_entry():
date = "10.07.19"
Temperatur = str(random.randint(0, 100))
Feuchtigkeit = str(random.randint(20, 80))
Operation = 'INSERT INTO messwerte_sensor1 (Time, Temperatur, Luftfeuchtigkeit) VALUES (%s, %s, %s);' , (date, Temperatur, Feuchtigkeit)
db = pymysql.connect("127.0.0.1","root","Root","tests")
cursor = db.cursor()
cursor.execute(Operation)
data = cursor.fetchone
print(data)
db.close()
dynamic_data_entry()
A:
The problem is with your date format. In mysql, standar date format is aaaa-mm-dd, sou you will need to change it. Also, i modify your code to use prepared statements:
import pymysql
import random
import time
import datetime
def dynamic_data_entry():
date = "2019-07-10"
Temperatur = str(random.randint(0, 100))
Feuchtigkeit = str(random.randint(20, 80))
Operation = 'INSERT INTO messwerte_sensor1 (Time, Temperatur, Luftfeuchtigkeit) VALUES (%s, %s, %s);'
db = pymysql.connect("127.0.0.1","root","Root","tests")
cursor = db.cursor()
cursor.execute(Operation,(date, Temperatur, Feuchtigkeit))
data = cursor.fetchone()
print(data)
db.close()
dynamic_data_entry()
|
<?php namespace system\database\migrations;
use houdunwang\database\build\Migration;
use houdunwang\database\build\Blueprint;
use houdunwang\database\Schema;
use houdunwang\db\Db;
class hd170602105904_modules_bindings extends Migration
{
//执行
public function up()
{
if ( ! Schema::tableExists('modules_bindings')) {
$sql
= <<<sql
CREATE TABLE `hd_modules_bindings` (
`bid` int(11) NOT NULL AUTO_INCREMENT,
`module` varchar(45) NOT NULL DEFAULT '' COMMENT '模块名称',
`entry` varchar(45) NOT NULL DEFAULT '' COMMENT '类型:封面/规则列表/业务',
`title` varchar(45) NOT NULL DEFAULT '' COMMENT '中文标题',
`controller` varchar(50) NOT NULL COMMENT '控制器名只对业务导航有效',
`do` text NOT NULL COMMENT '动作方法',
`url` varchar(100) NOT NULL DEFAULT '' COMMENT '自定义菜单的url',
`icon` varchar(80) NOT NULL DEFAULT '' COMMENT '自定义菜单的图标图标',
`orderby` tinyint(3) unsigned NOT NULL DEFAULT '0' COMMENT '排序',
`params` varchar(300) NOT NULL DEFAULT '' COMMENT '参数',
PRIMARY KEY (`bid`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=DYNAMIC COMMENT='模块动作';
sql;
Db::execute($sql);
}
}
//回滚
public function down()
{
Schema::drop('modules_bindings');
}
} |
Thyrotoxicosis: an unusual cause of syncope.
Syncope is a common emergency department (ED) chief complaint, with many known but also unknown causes. Here we present a novel ED presentation of a young woman with new-onset hyperthyroidism that masqueraded as a syncopal event with head trauma. A 21-year-old woman arrived in the ED with head trauma as the result of seemingly unprovoked syncope, due to her history as well as the nature of her trauma. Persistent tachycardia during her ED course after an unremarkable full trauma evaluation prompted ordering of additional lab testing, which revealed evidence of thyrotoxicosis. Here we consider the possibility of thyroid dysfunction resulting in syncope. |
Major manufacturing project could bring 1,200 jobs to Buncombe County
ASHEVILLE - The Biltmore Farms Co. has plans to build a 750,000-square-foot manufacturing facility on property in southwestern Buncombe County that could employ 1,200 people.
Called "Project Ranger" in permit applications on file with the N.C. Department of Environmental Quality and other state and federal agencies, the project also will include the construction of a 610-foot, five-lane bridge over the French Broad River. The proposed bridge would meet Brevard Road at the current entrance to the Blue Ridge Parkway access road, and it would require two sets of piers in the river.
Documents state the facility is for an existing company but give no details. The building will be erected on a 445-acre tract between the French Broad River and Interstate 26 owned by Biltmore Farms.
"I would love to be able to tell you what we're doing for this exciting project, but we're not at liberty to talk about it," said Ben Teague, vice president of strategic development with Biltmore Farms, the development company behind Biltmore Park and numerous local hotels, as well as other commercial development. "We're under nondisclosure agreements."
New bridge
Permit applications state Biltmore Farms will disturb about 0.67 of an acre of wetlands for the bridge, as well as 138 feet of riverbank on the French Broad. The bridge, with a water clearance of 20-30 feet, would be 1,000 feet downstream of the Blue Ridge Parkway.
More: Sandy Bottom wetlands to receive protection for 'national ecological significance'
The N.C. Division of Water Resources will hold a public hearing March 19 in Asheville to gather comments on the application for a water quality certification Biltmore Farms has submitted.
The project would be the largest economic development win in recent Buncombe County history, and the building would be one of the largest commercial facilities in the county. The building itself would comprise 17.2 acres, "with possible future expansion areas," with total parking spaces listed as 1,149 in one document.
Biggest project in recent memory
"To my knowledge, there's never been anything that big locating here," at least not in the past 20-30 years or even more, said K. Ray Bailey, a former president of A-B Tech Community College who has served as a county commissioner and a member of the Economic Development Coalition of Asheville-Buncombe County. "It would be something we would all be excited about it, because it’s going to provide, hopefully, top-wage jobs, quality jobs, for that many people."
The Citizen Times was unable to reach the EDC for comment on this project.
This century, some of the larger jobs announcements in the Asheville area have included GE Aviation, which announced in 2018 it would boost its workforce to approximately 555 employees; and Nypro, a medical plastics manufacturer in the Avery's Creek area that announced this year it will invest $18.5 million in its plant and add 68 jobs, bringing the total to nearly 400.
The New Belgium brewing company opened its $140 million Asheville facility in 2016, and employment has ranged from 140-175 people. In 2017, Avadim Technologies announced plans to build a $20.4 million facility in Black Mountain that ultimately will create 551 new jobs.
Bailey, 78, also mentioned Arvato, formerly Sonopress, the Weaverville manufacturer that made compact discs and at its peak employed about 1,500 people. But the company shuttered the disc operations in 2015 after a 32-year run.
Asheville has had larger employers, such as American Enka/BASF, a rayon and fiber producer, but those days of massive manufacturing facilities are mostly over.
The Biltmore Farms project, if it comes to fruition, should stimulate the local housing market and be a boost to the economy in general, Bailey said.
A sense of urgency
In a Jan. 9 letter from Biltmore Farms to the U.S. Fish and Wildlife Service, Biltmore Farms Vice President Lee Thomason notes that "Project Ranger is an economic development project with an extremely sensitive time schedule.
More: Nypro investing $18.5M, adding 68 new jobs
"As you may know, the Company (being recruited) has selected the Buncombe County site for their proposed expansion," Thomason wrote. "To meet the Company's prescribed schedule, we are going to have to complete clearing and grading for the first portions of the building pad no later than May 15, 2020. To meet this deadline, we plan to start work as as soon as possible."
But Thomason also noted that, "Beginning construction prior to completion of all consultation and coordination is not a standard practice for our company. However, in this case we believe this is the best course of action based on the known timing of the Gray Bat activity on the site."
The endangered gray bats' activity doesn't begin before April 15, Thomason noted, citing the agency's opinions for the upcoming I-26 widening project the North Carolina DOT is conducting.
In a Jan. 17 letter from the U.S. Army Corps of Engineers to Thomason, the Corps states starting work prior to completion of Endangered Species Act consultation and National Historic Preservation Act coordination "may unintentionally result in a delay of the Corps' final permit decision and additional project costs."
More: Developer hopes to build 687 housing units on Pond Road in Enka area
Project details in letter
A Jan. 31 letter from the N.C. Wildlife Resources Commission to the U.S. Army Corps of Engineers provides the most detail about the project, noting that the new bridge "would connect N.C. 191 (Brevard Road) with a new road on Biltmore Farms property. This road would be cleared and graded to accommodate a four-lane road, with only a two-lane road being constructed initially."
"The road would lead to an industrial facility that will be approximately 750,000 square feet (17.2 acres) with possible future expansion areas, which will be cleared and graded in association with the initial phase of work," the letter states. "Parking for approximately 1,200 employees will be provided, with 617 parking spaces providing initially; future parking is proposed to include another 532 spaces. Blasting (60 total blasts) may occur for site development for approximately 6 months."
The letter also notes that Old River Road on the Biltmore Farms property will be used to access the construction area from Schenck Road.
Teague said the new bridge, which would lead traffic from NC 191 onto the site, would be open to the general public and designed to carry all sorts of vehicles.
David Uchiyama, a spokesman for the N.C. DOT in the mountain region, said the bridge would be "a private property development."
"N.C. DOT's only involvement — as with any private property development — is to work with them to ensure their access to a state-maintained road, in this case N.C. 191, meets N.C. DOT standards so a driveway permit can be issued," Uchiyama said. "Also, we have agreed that if the bridge and roads meet our design and construction standards, then N.C. DOT could consider adding them to the state maintained system."
That's consistent "with any other private property development which might be interested in turning their roads over to the department," Uchiyama added.
Public hearing
The N.C. Division of Water Resources will hold a public hearing on March 19 in Asheville to gather comments on the application for a water quality certification Biltmore Farms has submitted to the N.C. Division of Water Resources.
The hearing starts at 6 p.m. and will be held at the Asheville-Buncombe Technical Community College Conference Center at 16 Fernihurst Drive in Asheville. Sign-in starts at 5:30 p.m.
The application is available online and is also available at the DWR Asheville Regional Office located at 2090 U.S. 70 in Swannanoa, and may be inspected with an appointment between 8 a.m. and 5 p.m. Monday-Friday. For questions or to schedule an appointment, contact Andrew Moore at 828-296-4500. |
---
abstract: 'Deep reinforcement learning (DRL) has been proven to be a powerful paradigm for learning complex control policy autonomously. Numerous recent applications of DRL in robotic grasping have successfully trained DRL robotic agents end-to-end, mapping visual inputs into control instructions directly, but the amount of training data required may hinder these applications in practice. In this paper, we propose a DRL based robotic visual grasping framework, in which visual perception and control policy are trained separately rather than end-to-end. The visual perception produces physical descriptions of grasped objects and the policy takes use of them to decide optimal actions based on DRL. Benefiting from the explicit representation of objects, the policy is expected to be endowed with more generalization power over new objects and environments. In addition, the policy can be trained in simulation and transferred in real robotic system without any further training. We evaluate our framework in a real world robotic system on a number of robotic grasping tasks, such as semantic grasping, clustered object grasping, moving object grasping. The results show impressive robustness and generalization of our system.'
author:
- |
Zhixin Chen, Mengxiang Lin\*, Zhixin Jia, Shibo Jian\
[^1]
bibliography:
- 'refs.bib'
title: Towards Generalization and Data Efficient Learning of Deep Robotic Grasping
---
Deep reinforcement learning, Visual grasp, Simulation and real-world, Generalization
Introduction {#intro}
============
As one of the most important manipulation skills, vision-based grasping has been studied intensely in the field of robotics for decades. Although robots performing pick and place tasks have been applied successfully in industry, creating autonomous robots for grasping objects in unstructured real-world scenes remains an open question. In recent years, deep reinforcement learning (DRL) has attracted increasing research attention in robotics since its success in video game. Combining with CNNs, DRL maps the features of visual observations directly into control policies by trial-and-error. This provides a general way for robots to learn manipulation skills by using information acquired from cameras [@simulation-robotic], [@dexterous-manipulation].
The typical way to train a visual-based DRL agent is in an end-to-end fashion, in which the reward signal of reinforcement learning is used to train both CNNs and policy networks synchronously. However, in order to achieve satisfying performance, large amounts of interaction data are required for training of a DRL agent. For example, to collect enough training data, [@hand-eye] executed 800,000 robotic grasping attempts in several months with 14 robots, and [@self-super] collected 700 hours robot grasping data with 50,000 grasping attempts. Moreover, DRL methods try to map raw visual observation into a lower dimensional latent space of control that preserves various types of information about manipulated objects. However, tangled and uninterpretable latent representation restricts the generalization across object and environment and further leads to poor control policy. Most works have to evaluate the trained DRL agents with the similar objects and environments as that of training [@robotic-autoencoder], [@dexterous-manipulation], since the networks trained before have to be fine tuned to adapt to change and hundreds of thousands of robotic manipulation experiences may be needed once more when transferring to a new environment. These limitations will definitely prohibit the use of DRL method in real-world robotic application.
A feasible way to alleviate data requirements is to train DRL agents in simulation, in which the interaction could be speed up easily by using programming techniques, such as multithreading. With this approach, large volumes of experiences can be captured efficiently than that of real world interactions and meanwhile many variants of environments could be constructed for generalization concern. However, there is a huge gap between the simulation and the real-world, which causes the agents trained in simulation to be hardly applied in real world conditions, especially in the context of vision-based robotic manipulation, where illumination changes and varying textures can have significant effects on the quality of the results. Therefore, some DRL based robotic control approaches are only verified in simulation due to difficulties in transferring from simulation to real robots [@no-real-robot2], [@no-real-robot1]. To alleviate the problem some techniques are proposed to allow for automatic adaptation to the real world environments [@simulation2real2], [@simulation2real].
In this paper, we propose a DRL-based visual grasping system aiming at improving generalization performance with the least cost of the acquisition of real world experiences. Following the typical visual based DRL paradigm, our framework consists of two major components: a CNN based visual *perception* and a DRL based control *policy*. The perception module extracts features from visual observation (i.e. raw images) and then the features are mapped into the action space by the policy module.
We train the perception and the policy separately instead of end-to-end. The perception is trained in a supervised setting to produce the semantic and spatial information of the grasped objects. In the meantime, the control policy is trained in a simulation environment where the class and pose of the object to be grasped can be read automatically. Training the policy with the quantitative description of manipulated objects can be beneficial to both generalization and transferability since the information irrelevant for control decision is discarded. In our work, after roughly **30 minutes** of training in simulation, the policy is directly transferred to a real robotic system **without any additional training**. The performance of our system is evaluated on challenging tasks including semantic grasping, clustered object and moving object grasping. The experimental results demonstrate the robustness and generalization of our approach.
Related work {#relatedwork}
============
Simulation environments can provide experiences data much more effective since the simulation could be accelerated by programming. And many robotic manipulation DRL algorithms are verified in simulation environments [@simulation-robotic], [@model-base]. Unfortunately, the gap between simulations and real-world makes the the agent trained in simulation can hardly use in physical robot. Many works had tried to bridge reality gap [@simulation2real], [@simulation2real2]. In [@simulation2real], the images came from simulations were rendered in randomization, and while the visual perception had seen enough variability over simulations, the real-world images may appear to the model just as another variation. Such randomization made a successful visual grasping model in real-word. [@simulation2real2] unified the visual inputs from simulation and real-world using an adaptation network. The adaptation network was trained to generalize canonical images from randomized images from simulation. And because of the randomization, the trained network could also generalize canonical images from real-world. The generalized canonical images which had been mapped into the same space were used to train the visual grasping DRL agents. Benefited from the adaptation network, DRL agents could be trained in simulation and used in real-world.
Many researches have tried to relieve data inefficiency by improving the efficiency of DRL training process and experiences data generation. Guided policy search (GPS) algorithm [@guided-policy-search] converts reinforcement learning into supervised learning, where a trained a local linear controller provided with full state observation (i.g., object poses) served as supervisor. And a global policy parameterized by neural networks derived from supervision. This allows a CNNs policy with 92,000 parameters to be trained in tens of minutes of real-world robotic manipulation time and in test stage the full state is no longer available that the policy trained in a supervised setting could handle several novel, unknown configurations. Another direction to improve sample efficiency is to accelerate model-free reinforcement learning with a learned dynamics models [@model-base]. The learned models can generate synthetic sample data to enrich the agent experiences efficiently which has no need to execute the physical robot, though it needs additional efficient model learning algorithms [@model-learn], [@model-learn-3]. However, the learned model would quite differ from the true dynamics and the induced error would weaken performance of learned policy.
These methods tried to train an optimal policy and visual perception simultaneously in an end-to-end style. However, it can hardly be generalized to different manipulated objects and different execution environments. Since the generalization is relied on the distribution of training data, it requires a huge experience data to achieve usable generalization ability [@e2eGeneralize]. It is impractical in a robotic grasping task to acquire enough data. An intuitive alternative is to train image representation and reinforcement agent separately [@auto-encoder], [@robotic-autoencoder]. With an auto encoder pretrained by an auxiliary reconstruct loss, the high dimension of image input is embedded into a low dimension, latent space and aggregate useful features before interacting with environment. This way the training of the reinforcement agent networks would be more easily with much less interaction experiences for there is no need to learn the state representation and the training would significantly speed up. However, the latent feature representation has no exact physical meanings and would be lack of interpretability as well the trained policy. From this perspective, meaningful feature representation would significantly improve generalization ability.
Framework
=========
We propose a robotic grasping framework based on deep reinforcement learning. Reinforcement learning enables agents (e.g., robots) to learn an optimal policy through interaction with environments by trial-and-error. In doing so, we formulate a robotic grasping problem as a Markov decision process: at time $t$, the robot receives the state of target objects and constructs environment state $s_t$ accordingly. After that, the robot chooses an action $a_t$ to move itself based on the current policy $\pi \left(a_{t}|s_{t}\right)$. Then the environment transits to a new state $s_{t+1}$ reacting to $a_t$ and an immediate reward $R_t \left(s_t,a_t,s_{t+1}\right)$ is offered by the environment. The goal of the robot is to find an optimal policy $\pi ^{*}\left(a_{t}|s_{t}\right)$ that maximizes the discounted future rewards
$$G_t=\sum _{i=t}^{\infty}\gamma ^{i-t}R_{i}\left(s_i,a_i,s_{i+1}\right)$$ where $0 < \gamma < 1$ is the discounted factor which reduces the weight of future rewards.
Similar to recent works [@robotic-autoencoder], [@guided-policy-search], our framework is composed of two stages, as shown in Fig.\[framework\_figure\].
{width="100.00000%"}
Raw RGB images from camera are input into the perception, where object semantic segmentation and pose estimation are made by Mask R-CNN and PCA respectively. The policy is a PPO [@ppo] agent which receives the control quantities of desired objects and decides which action will be taken to execute grasping. The pseudo code of grasping a single object with our framework is presented in Algorithm \[framework\_pseudo\]. The details of each component are discussed in the following subsection.
The perception and policy are trained separately. In particular, Mask R-CNN is trained in a supervised way, in which the labels are constructed manually using a tool LabelMe [@labelme]. There is no training stage for PCA as it is an unsupervised method. The PPO is trained in simulation for fast experience data acquisition. Since the semantic and position information can be read by an interface provided by the simulation environment, the training of PPO could proceed in parallel with that of Mask R-CNN.
$image$ ***Perception*** detect object class and mask from raw images $mask, class$ $\gets$ **mask-rcnn**($image$) get physical quantities from mask $center, direction$ $\gets$ **PCA**($mask$) ***Policy*** decide action via PPO $action$ $\gets$ **PPO**($center, direction$) grasp specific object and success check $success$ $\gets$ **grasp**($class$)
Perception
----------
The perception plays a sensor-like role that transforms raw image inputs into physical quantities binding with object semantic information (i.e., object class and its corresponding pose). We should note that this work focuses on a 3DOF grasp [@grasp-pose] given that the workspace of a robot is constrained to a tabletop.
### Semantic Segmentation
To grasp a target object, the robot must know where the target is. To achieve this, we leverage a popular semantic segmentation method Mask R-CNN [@maskrcnn] as the front part of the perception to detect and segment objects from raw images.
Based on Faster R-CNN [@fastrcnn], Mask R-CNN introduces a mask branch at the end of the original network for segmentation tasks. It proceeds in two stages: first, the region proposal network (RPN) [@fasterrcnn] is applied to scan the image to find the area where the target exists; secondly, the object class and its bounding box coordinates are predicted simultaneously. Finally, a pixel-wise binary mask for each bounding box is generated by a fully convolutional network (FCN) indicating whether each pixel in bounding box is the point of the detected object. As a result, masks on the original image exactly cover the areas where the objects exist. The class and mask of an object provide us with a good starting point for pose estimation.
### Object Pose
Since an object mask produced carries information about object pose, learning a DRL policy from masks is in principle possible, as what most DRL based approaches do. In realistic robotic applications however, we can not afford to collect such huge interaction data required by a policy learning algorithm. To avoid this difficulty, we further infer pose for an object instance based on the object mask obtained. In a 3DOF grasp setting, object pose can be represented by a 2-dimensional position coordinates of the object center and the direction of the object. Here, we develop a Principal Component Analysis (PCA) based method to estimate 3D object pose from a pixel-wise binary mask output by Mask R-CNN. In general, PCA is an unsupervised method that could identify the main components of data with largest variances from a big dataset. For our purpose, the center and main direction of a set of pixel points are inferred by using PCA.
The output of Mask R-CNN is an object with its covered mask which contains all pixel points formalized as $$mask=\left \{ \left(x_0,y_0\right), \left(x_1,y_1\right),...,\left(x_n,y_n\right)\right \}$$ where $n$ is the number of pixel points in the mask, i.e the number of samples in PCA. Firstly, we calculate the mean point of $mask$ as the center point of the mask: $$c=(x,y)=\frac{1}{n} \sum_{i=1}^n (x_i, y_i)$$ Note that, the mean point $c=(x,y)$ is the geometric center of a mask. After that, all the points in the $mask$ are subtracted by the $c$ resulting residual coordinates $$Res = mask - c$$ Thus, the covariance matrix of $Res$ and its corresponding eigenvalues and eigenvectors are calculated: $$\lambda _1, \lambda _2 = eigenvalues \left ( covMat\left(Res\right) \right )$$ $$\alpha _1, \alpha _2 = eigenvectors \left ( covMat\left(Res\right) \right )$$ Since the pixel points are in two dimensions, there are totally two eigenvalues and eigenvectors of $Res$ matrix. The $\lambda$ and $\alpha \in \mathbb{R}^{2\times 1}$ are sorted by the magnitude of eigenvalues in descending order. Finally, the main component with largest variance is calculated: $$M = Res \cdot \alpha _1 \cdot \alpha _1^\top + c$$ $M \in \mathbb{R}^{n\times 2}$ contains $n$ points on a straight line. We take two points from $M$ randomly to construct a straight line. $\theta$ represents the angle of the straight line respect to the horizontal axis.
Fig.\[PCA-result\] shows the results of PCA on a number of objects with various shapes. With the help of a calibrated camera, the position and orientation in pixel coordinates can be mapped into that of a physical coordinate system.

Policy
------
The policy is a deep reinforcement agent that receives the physical quantities from the perception and decides an optimal action to move the robot. For our framework, we adopt a policy gradient method called Proximal Policy Optimization (PPO) [@ppo] which is favorable for high dimension continuous robotic control problem. PPO significantly improves data efficiency over other policy gradient methods by updating multiple gradient steps with the same trajectory. Moreover, to avoid an increase in data variance, PPO introduces a clipping coefficient which stops the gradient when the difference between the updated and original policy is too large.
### State Representation
We concatenate the output from the perception $x, y, \theta$ (the pose of a target object) and the robotic configuration $x_r, y_r, \theta _r$ ( the pose of the end effector of a robot) to form the environment state $s_{t}$ as the input of the policy network PPO: $$s_{t} = \left(x,y,\theta,x_r, y_r, \theta _r\right)$$ Through several fully connected layers, PPO finally outputs an action distribution over current state $s_t$. Thereafter, the optimal action in the current state $s_t$ at time step $t$ is sampled from the action distribution: $$a_t \sim \pi\left (a|s_t \right )$$ The action is a three-dimensional continuous variable instructing the robot’s next moving direction and magnitude. The execution of the action would lead to a new environment state $s_{t+1}$ and an immediate reward $R_{t}$ offered by environment.
### Reward
The reward function for learning the policy $R_{t}$ is defined as: $$R_{t} = \left\{\begin{matrix}
-d_t-0.1 & away\\
-d_t+0.1 & approaching\\
1 & grasp~success\\
-1 & grasp~failed\\
\end{matrix}\right.$$ where $d_t$ is the distance between the end effector’s current and target position in time step $t$.
If $d_t$ is decreasing compared to the previous $d_{t-1}$, the end effector is $approaching$ the target and will receive a slightly positive reward addition, and otherwise, it is $away$ with a negative reward. In this way, we encourage the end effector to approach and trace the target object as soon as possible. When the policy decides actions bounded in a very small magnitude for several time steps, the policy will decide to execute the grasping, i.e., the end effector moves down on $z$ coordinate and closes the gripper. A grasping is counted as a success if the gripper is not fully closed. With a larger reward for a successful grasping, the policy could learn the tracing target policy and grasping policy simultaneously.
### Training Loss {#traing-loss}
PPO is an Actor-Critic style [@a3c] algorithm and typically contains a value function and a policy function. The value function $V_{s_t}$ which estimate the expected reward from a state $s_t$ is trained to minimize TD error [@rl-introduction], whose loss function is defined as: $$L_{V} = \left ( V\left(s_{t}\right)- \left (R_{t}+\gamma V\left(s_{t+1}\right)\right )\right )^{2}$$ where $\gamma $ is the discounted factor.
The policy function $\pi(a_t|s_t)$ which decides an optimal action over a state $s_t$ is trained to maximize a novel surrogate objective [@ppo] according to the value function: $$L_{a} = \textbf{min}\left ( r_t A_t, clip\left ( r_t, 1-\epsilon, 1+\epsilon \right ) A_t \right )$$ where $r_t = \frac{\pi \left (a_t|s_t \right )}{\pi_{old}\left (a_t|s_t \right )}$ is the importance sampling coefficient in which $\pi_{old}\left (a_t|s_t\right )$ is the behavior policy whose parameters are frozen during one update epoch. $A_t$ is the advantage function [@a3c] which indicates if the reward of current action is above average. And it could be estimated easily by $A_{t} =R_{t} + \gamma V\left(s_{t+1}\right)- V\left(s_{t}\right) $ or GAE method [@gae] according to the value function $V(s_t)$. And a *clip* is a function that limits the importance sampling value between $1-\varepsilon$ and $1+\varepsilon$ in order to avoid a large step update where $\varepsilon$ is the clipping coefficient which usually equals to $0.2$ [@ppo].
Therefore, the final loss function $L$ becomes $$L = L_V - L_a$$ and the parameters of network are updated through gradient descent method according to $L$.
Experimental Evaluation {#experiments}
=======================
Implementation
--------------
To evaluate our approach, we implemented a visual-based grasping system based on the framework shown in Fig.\[framework\_figure\]. The perception consists of a Mask R-CNN and a PCA procedure, which are executed in pipeline. The input images resized into $600\times 600$ are fed into the Mask R-CNN and a number of object instances covered with their masks are produced. For each mask produced, PCA is invoked to compute its position and orientation as the output of the perception. The implementation of the Mask R-CNN is based on [@maskrcnn_implementation]. Instead of using a pre-trained Mask R-CNN model on general objects datasets such as MSCOCO [@coco], we train the Mask R-CNN on our own dataset considering detection accuracy. To this end, 1000 images of 21 classes of objects are collected and labeled with their mask ground truth manually by the label tool LabelMe [@labelme].
For the policy, three fully-connected layers are stacked together to form a PPO agent. The first layer takes as input a six dimension vector concatenating the object position and the robot position and transforms the input into a 512 dimension latent vector. And the second layer transforms the 512 dimension vector into two streams: a 512 dimension action vector and a 512 dimension value vector. Then one stream is transformed into two 3-dimension vectors, representing the parameters of action distribution $\mu$ and $\sigma$, while another stream is transformed into a scalar representing the value of current environment state. For efficient training of PPO, we setup a simulation environment in V-REP [@vrep], as shown in Fig.\[simulation-environment\].
![Simulation environment set up in V-REP [@vrep]. []{data-label="simulation-environment"}](simulation.pdf)
Seven classes of objects from a robotic manipulation benchmarks YCB [@YCB] are used for PPO training in simulation, including a detergent bottle, an orange, a round can, a rectangular can, a cup, a pudding box and an electric drill. Since the class and pose of an object in the simulation environment can be obtained directly through software interfaces, PPO could be trained separately, without the help of the perception. The parameters of PPO are learned in a learning rate of $1e-5$ using Adam optimization method [@adam].
Both the training of PPO and Mask R-CNN is done on a PC with a RTX 2080Ti GPU. The average rewards of PPO training in simulation over 5 runs are shown in Fig.\[train-result\]. Very impressive results are obtained after about **30 minutes** training of PPO, indicating by the red arrow in Fig.\[train-result\].
![The process of policy training in simulation. The rewards converged very quickly and the model trained has achieved a good performance after about 30 minutes. The policy model used in all experiments is trained for 200 episodes, as indicated by the red arrow.[]{data-label="train-result"}](train_process.pdf)
By contrast, the interactions with the same number of episodes would take tens of hours for a real physical robot. The training of Mask R-CNN on our own dataset takes about 10 hours. This training may be not necessary since a pre-trained model on general dataset usually works well in many cases. It is worth noting that all the training above does not require a real-world robot and the trained networks will be transferred into a real-world robotic grasping system directly.
Real-world Evaluation {#real-world}
---------------------
The overall goal of our evaluation is to determine whether the trained networks can enable a real world robot to perform various grasping tasks without any further training. To this end, a number of grasp tasks commonly used in our daily life are designed to evaluate the ability to perform grasping skills and generalization over objects and situations. We use an industrial UR5 robot arm with an RG2 gripper to achieve two-finger rigid grip. A RealSense camera [@realsense] is located 100 cm above the work surface, producing RGB images for input. A laptop with a RTX 2080 GPU acceleration is used for real-time robotic control and communication with UR5 via TCP/IP protocol. The experimental hardware platform is shown in Fig.\[real-world-environment\]. It is worth note that the objects used in the experiments are totally different from that of PPO training in simulation.
![The hardware setup of our system. []{data-label="real-world-environment"}](real-world.pdf)
### Sim-to-Real Transfer
As mentioned before, the trained networks including Mask R-CNN and PPO are transferred into our robotic grasping system without any further training. We first examine the behavior of the system in a controlled manner. As shown in Fig.\[corn\], a target object (a corn) is placed on the work surface in various positions and orientations. The robot grasps the target successfully for 20 randomly chosen object locations.
Furthermore, in order to test the robustness of the control policy, we manually introduce external disturbances. As shown in Fig.\[trajectory\], the control policy could find its correct trajectory again and grasp the target successfully after a sudden change on the robot configuration during the robot’s execution, exhibiting good stability and robustness.
### Multi-object Grasping {#multiobj-grasp}
Multi-object grasping is a common task used to measure the performance for a vision based robotic grasping system. In our test setting, 10-13 objects are placed randomly on the table and the UR5 robot is requested to pick up all objects sequentially and then put them out of the workspace. In addition, the background color of the work surface is shifted from white into brown or green. Two example test settings in different backgrounds are shown in Fig.\[multiobj\]. A grasp is successful if an object is grasped and threw aside, while a remove completion means no objects are left on the table. We perform 10 tests for each background and grasp success rate and remove completion rate are presented in Table \[multiobj-result\].
[ccc]{}
scenarios & grasp success & remove completion\
brown & 100%(112/112) & 100%(10/10)\
green & 100%(120/120) & 100%(10/10)\
dense & 93.7%(104/111) & 80%(8/10)\
### Clustered object Grasping {#in-cluster}
A challenge task in robotic manipulation is to grasp objects clustered closely together. As shown in Fig.\[dense-cluster\], in a cluster scenario, the objects would block each other and some objects may be completely invisible. In such a task, the order of manipulations really matters if we want to remove all the objects in sequence. To decide the ordering of picking up, we define a mask ratio $r$ for each object recognized as follows: $$r = \frac{m}{M}$$ where $m$ is the recognized mask with possible occlusion and $M$ is the full mask of the object which is pre-determined. The larger the ratio, the more likely the object is to be picked up firstly as it is less occluded by others. For dense cluster scenarios, we perform 10 tests and grasp success rate and remove completion rate are presented in Table \[multiobj-result\]. The failure cases occur due to misidentifications by Mask R-CNN because of partially visible objects.
### Semantic Grasping {#semantic-grasp}
In a semantic grasping task, a robot is instructed to grasp a specified object among a set of candidates. The capability of semantic grasping is essential to allow autonomous robots to perform manipulations in an unstructured environment. Benefiting from the power of Mask R-CNN to detect objects, our system first identifies the class of an object before deciding how to pick up. Similar to the experiment setting in multi-object grasping, 10-13 objects are randomly placed on the table for each trial. For each run, we randomly specify one object and simply count the number of successful grasps. We perform five trails and the success rate achieves **100% (60/60)**.
### Moving Object Grasping {#semantic-tracking}
Grasping a moving object is still a challenging task in visual-based robotic manipulation [@moving-grasp]. Our learning based approach provides a promising way to approach this challenge. To demonstrate the effectiveness of our approach, a case study is conducted in a scenario where a small fake mouse is moving and the robot is ordered to pick up the mouse in motion.
To pick up the moving mouse, our robot needs to be able to track the target continuously and decide to execute a grasping once the action outputted by the control policy is smaller than the preset threshold. In order to further reduce the time between making a grasp decision and closing the gripper, we add a fixed movement in $z$ direction simultaneously with the movement in the $x-y$ plane, instead of moving down in $z$ direction after the decision making. This minor modification significantly improves the successful rate of picking up the mouse in our experiments. The example pictures of robot’s execution on picking up a moving mouse are shown in Fig.\[moving-mouse\]. However, due to the computation cost of the system and communication delay between the laptop and the robot, the delay time in our current implementation is about $200ms$, which limits the speed of moving objects in our experiments.
Conclusion and future work {#conclusion}
==========================
We presented a robotic grasping approach that combines visual perception and a DRL based control policy. Comparing with other alternatives, training on a real robot is avoided by decoupling the control from visual perception with the help of a physical representation of objects, which makes them easier to be trained. Moreover, the policy trained in simulation could be transferred to a real system without any further training. Real world experiments on UR5 demonstrate the robustness and generalization over a wide variation in challenging grasping tasks. However, in this work, we only consider 3DOF grasping in which objects are placed on a table and the grasping height is fixed. In future work, we would like to extend this work to a 6DOF grasping. To do so, it will be important to investigate the pose of gripper in 3D shape perception.
[^1]: \* Corresponding author
|
Timeline
1971 E.I. DuPont de Nemours and Company owned the house built in 1827-1828 by William Augustus Carson along with 2,100 acres of Dean Hall Plantation in Berkeley County. Their plan was to raze the house in order to build an industrial complex (1, p. 3).
In January, a nomination was submitted to place the house on the National Register. It was hoped that this status would help preserve the house. However, Commodore Charles C. Baggs purchased the house and decided to relocate it to his property. It was dismantled, loaded onto trucks, and delivered to Tommy John Plantation (2, p. 90).
1973 Commander Charles Baggs started to rebuild the house but due to lack of funds, was not able to complete the job.
1982 John and Mary Nash purchased the plantation and completed the restoration.
Land
Owners
Slaves
Buildings
In 1971, the William Augustus Carson house built at Dean Hall Plantation in Berkeley County was dismantled and moved to Tommy John. Restoration began in 1973 but was left uncompleted due to Colonel Charles Baggs' lack of funds. John and Mary Nash purchased the plantation in 1982 and completed the project.
Several outbuildings have been constructed in the original 19th century style to give the plantation a historic feel. Including slave quarters that are used as guest houses, carriage shed used as a garage, a glass house greenhouse, and two pigeonniers. |
If there is one thing you can usually count upon while working as a journalist in the United States – and in particular if you happen to be British like myself – is that Americans are not only unafraid of talking to the media, many do so without hesitation. It is an endearing characteristic of the American people, a wonderful sign that they are not afraid to stand up and be heard.
But in the six months that I spent working on my feature “For many Christians, it’s God before mortgage” that ran on Sept 21, I ran into a wall of silence for the first time since coming to work in the United States three years ago.
It all began back in February, while working on a series of feature stories that I compiled on the U.S. housing crisis. In interviews with non-profit counsellors in Chicago, Detroit, Cleveland, Atlanta and then Memphis, the subject of tithing and how some struggling home owners would rather lose their homes than cease their payments to the church kept coming up.
At first in Chicago, I confess that I all but ignored the topic. I was focused on trying to get a handle on the scale of the housing meltdown and its implications – the fallout of which has been all too evident on Wall Street in recent weeks. Interesting, I thought to myself, how someone’s obligation to God and the church would take precedence over their earthly home, and filed away the comments for later use.
But as February turned to March and April and interviews in Atlanta, Memphis, then St Louis, Dallas brought up the same topic again and again, I knew I had found a fascinating story. Getting counsellors, religious leaders, academics and researchers to comment on the story was no problem – but the difficult part was finding a home owner to talk about it.
Non-profit groups that have spoken to hundreds of thousands of stricken home owners around the country while trying to deal with the biggest housing slowdown since the Great Depression agreed to put me in touch with tithing home owners who had chosen to lose their homes rather than break off their commitment to God.
Again and again over the course of four months, I received an email from a counsellor from Atlanta or Memphis, upstate New York or southern California telling me that they had found a home owner I could talk to for my story. But more often than not, those home owners changed their minds when they answered the phone, or when I turned up on their doorstep to talk. “It’s too personal,” was the almost inevitable explanation.
Those who would talk did so warily and always – to my dismay – having stated quite clearly that anything they had to say was off-the-record and that under no circumstances did they want their names to appear in the press.
Finally, in August, I tracked down a woman in St Louis who said she would talk to me for my story and agreed to do so on-the-record. But as she was recovering from surgery, she asked me to call her in a week to talk. On the verge of what I saw as a key step – providing a real person as an illustration for my story – I readily agreed.
But when I called back a week later, she had changed her mind. “I don’t want people thinking I’m crazy,” she said. We talked at great length about her faith, her commitment to God and that after 30 years of tithing to the church she would rather face foreclosure than break that contract with her God.
She told me in detail about the good works of her church, why tithing mattered so much to her. She relished the chance to talk but after an hour on the phone it was clear there was nothing I could do to persuade her to let me use her name.
At this point I had reached a dead-end. After six months, I knew I was unlikely to find a home owner to talk on-the-record. Academics and religious researchers told me this came as no surprise because tithing is such a deeply personal and private issue and said I should give up on trying to find anyone to talk. So this left me and my bureau chief in Chicago, Peter Bohan, facing a dilemma.
What we had was a story that shed some light on how much faith matters to some Americans, to the extent where it is more important than their homes. But we had no one to link that story to. After much deliberation, we decided that the story was simply too interesting to let it go and we decided it had to go to print.
That said, I am still searching for a passionate, tithing American Christian who has lost their home rather than give up making payments to the church and is willing to talk to me about it. Next time, I’d like to use someone’s name.
Anyone out there ready to talk? |
Q:
Buying under my bid price
I buy low-priced and penny stocks a lot. I run into this situation constantly (even on higher-priced stocks.) I bid, say, $.10 (with no qualifiers) on 1000 shares on a stock currently selling for $.15. It will creep lower toward my bid (sometimes over a 6-month time-frame) and suddenly one day it sells—to someone else—for $.07, 3-cents below my bid. The next day it will pop back up to $.12 or $.15 and I get filled on no shares at my bid price. Is this not a "bidding process?" If I'm bidding higher, why don't I get filled first? Why does someone else get to buy the stock I want cheaper than my bid price?
A:
It definitely depends on the exchange you are trading on. I'm not familiar with Scottrade, but a standard practice is to fulfill limit orders in the order they are placed.
Most of the time, you wouldn't see stocks trade significantly under your bid price, but since penny stocks are very volatile, it's more likely their price could drop quickly past your bid and then return above it while only fulfilling a portion of the orders placed.
Example
1. Penny stock priced at $0.12
2. Others place limit orders to buy at $0.10
3. You place limit order to buy at $0.10
4. Stock price drops to $0.07 and some orders are filled (anything $0.07 or higher) based on a first-come first-served basis
5. Due to the increase in purchases of the penny stock, the price rises above $0.10 before your order is filled
***EDIT*** - Adding additional clarification from comment section.
A second example
If the price drops from $0.12 to $0.07, then orders for all prices from $0.07 and above will start to be filled from the oldest order first. That might mean that the oldest order was a limit buy order for 100 shares at $0.09, and since that is above the current ask price, it will be filled first. The next order might be for 800 shares at $0.07. It's possible for a subset of these to be filled (let's say 400) before the share's price increases from the increased demand. Then, if the price goes above $0.10, your bid will not be filled during that time.
|
---
abstract: 'We present a derivation of the orbital and spin sum rules for magnetic circular dichroic spectra measured by electron energy loss spectroscopy in a transmission electron microscope. These sum rules are obtained from the differential cross section calculated for symmetric positions in the diffraction pattern. Orbital and spin magnetic moments are expressed explicitly in terms of experimental spectra and dynamical diffraction coefficients. We estimate the ratio of spin to orbital magnetic moments and discuss first experimental results for the Fe $L_{2,3}$ edge.'
author:
- 'L. Calmels'
- 'F. Houdellier'
- 'B. Warot-Fonrose'
- 'C. Gatel'
- 'M. J. Hytch'
- 'V. Serin'
- 'E. Snoeck'
- 'P. Schattschneider'
title: Experimental application of sum rules for electron energy loss magnetic chiral dichroism
---
Electron energy loss spectroscopy (EELS) in a transmission electron microscope (TEM) gives access at high energy losses to the density of unoccupied valence states with a sub-nanometer spatial resolution [@batson93; @muller99]. The possibility of using EELS to measure an energy loss magnetic chiral dichroism (EMCD) spectrum analogous to the X-ray magnetic circular dichoism (XMCD) signal obtained with synchrotron radiation [@schutz87; @chen95] has been suggested in 2003 [@hebert03] and demonstrated recently [@schatt06]. The principles of an EMCD experiment are the following: after suitable orientation of the sample, the incident electron beam is first elastically diffracted by the crystal. Each diffracted beam is then inelastically scattered. The total inelastic signal can be written as the sum of two kinds of contributions: the first one is due to each single diffracted beam and can be written in terms of the dynamic form factors (DFF) $S\left(\textbf{q},\textbf{q},E\right)$, where $\textbf{q}$ is the momentum transfer which depends on the diffracted beam and on the location of the spectrometer aperture in the diffraction pattern, and $E$ is the energy loss. The second contribution involves all the possible pairs of diffracted beams and is described by the mixed dynamic form factors (MDFF) $S\left(\textbf{q},\textbf{q}',E\right)$ [@schatt96].
Inelastic scattering events are due to the coulomb interaction between the electrons of the probe and the sample electrons. In quantum electrodynamics, this interaction is described in terms of a virtual photon exchanged between the two electrons. The virtual photon associated to one of the DFF is linearly polarized in the direction of the transfer momentum vector (Lorentz Gauge). The polarization of the virtual photon associated to one of the MDFF is more complicated for any couple of transfer momentum vectors $\textbf{q}$ and $\textbf{q}'$. It becomes right or left circularly polarized when the phase difference between the diffracted beams is $\pi/2$, and when the momentum transfer vectors $\textbf{q}$ and $\textbf{q}'$ are orthogonal with identical modulus. This is the case for the vectors $\left\{\textbf{q}_{1},\textbf{q}'_{1}\right\}$ and $\left\{\textbf{q}_{2},\textbf{q}'_{2}\right\}$ shown in Fig. \[fig:diffraction\]a for which $\left(\textbf{q}_{1},\textbf{q}'_{1}\right)=\pi/2$ and $\left(\textbf{q}_{2},\textbf{q}'_{2}\right)=-\pi/2$. The EMCD signal is in this case obtained by subtracting the spectra measured at the two positions pos1 and pos2 shown in Fig. \[fig:diffraction\]a. An accurate description of the EMCD spectra is not trivial, firstly because all the pairs of diffracted beams must be considered together, secondly because the propagation of the diffracted beams must be described within the fast electron dynamical diffraction theory, the incident and scattered electron beams behaving like Bloch waves inside the crystal [@spence92].
Magnetic circular dichroism has been measured in a TEM on the $L_{2,3}$ edges of 3$d$ magnetic metals [@schatt06]. The most recent experimental papers describe the configurations which give the highest dichroic signal as well as dichroic/noise ratio. Several configurations have been tested to reach this aim, like using convergent instead of parallel incident beam to increase the total current (LACDIF configuration [@midgley99; @morniroli07; @warot07]), or choosing the sample orientation and searching for the positions in the diffraction pattern which enhance the dichroic signal. This experimental investigation has been done by moving the diffraction pattern over the spectrometer aperture [@schatt06], or with the energy spectrum imaging technique (ESI), which consists in recording the whole diffraction pattern for successive energy windows of typically 1 eV running over the $L_{2,3}$ edges [@warot07]. The EMCD signal has also been calculated theoretically. These calculations, which are based on the first principles determination of the fast electron Bloch wave functions [@spence92; @schatt96] and transition matrix elements [@schatt06; @rusz07] have been very helpful to find the experimental conditions and sample characteristics which give the highest dichroic signal.
Up to now, EMCD experiments have only been analysed quantitatively in terms of dichroism. A quantitative interpretation of the spectra requires the determination of new sum rules which take into account the dynamical diffraction effects. In this paper, we present the analytical derivation of the orbital and spin sum rules for magnetic chiral dichroic spectra measured by EELS, and we discuss to which extent these sum rules can be applied to experimental results.
The EELS spectra measured in a TEM can be described by the differential cross section $\frac{\partial^{2}\sigma}{\partial E\partial\Omega}$ for scattering of a fast probe electron with the energy loss $E$ and scattering angle $\Omega$. When the spectrometer aperture is located at a given position in the $\left\{x,y\right\}$ plane of the diffraction pattern, the differential cross section for the core electron excitation edges can be written as [@hebert03] $$\frac{\partial^{2}\sigma}{\partial E\partial\Omega}=\sum_{\textbf{q}}\frac{A^
{det}_{\textbf{q};\textbf{q}}}{q^{4}}S\left(\textbf{q},\textbf{q},E\right)+\sum_{\textbf{q}}\sum_{\textbf{q}'\neq\textbf{q}}2Re\left[\frac{A^{det}_{\textbf{q};\textbf{q}'}}{q^{2}q'^{2}}S\left(\textbf{q},\textbf{q}',E\right)\right]\label{eq:one},$$ where the mixed dynamic form factors of one atom are given by $$S\left(\textbf{q},\textbf{q}',E\right)=\sum_{i,f}\left\langle i\right|\textrm{exp}\left(-i\textbf{q}\cdot\textbf{r}\right)\left|f\right\rangle\left\langle f\right|\textrm{exp}\left(i\textbf{q}'\cdot\textbf{r}\right)\left|i\right\rangle\delta\left(E-E_{f}+E_{i}\right).$$ $\left|i\right\rangle$ and $\left|f\right\rangle$ are the initial core states and the final unoccupied valence states with energies $E_i$ and $E_f$. $\textbf{q}=\textbf{OS}-\textbf{g}+q_{z}\textbf{e}_{z}$ and $\textbf{q}'=\textbf{OS}-\textbf{g}'+q_{z}\textbf{e}_{z}$ are the momentum transfer vectors which depend on the vector $\textbf{OS}$ connecting the transmitted beam and the spectrometer aperture in the diffraction pattern, on the reciprocal lattice vectors $\textbf{g}$ and $\textbf{g}'$, and on the momentum $q_{z}<0$ which is transferred in the incident beam direction $\left(Oz\right)$. The first and second terms in the right hand side of Eq. (\[eq:one\]) describe respectively the contributions from the DFF and MDFF. The double sum over $\textbf{q}$ and $\textbf{q}'$ implies that the pairs of Bragg spots are not counted twice. The coefficients $A^{det}_{\textbf{q};\textbf{q}'}$ contain all the information on the Bloch wave eigenvectors and eigenvalues which is needed to describe the fast incident and scattered electron beams within the framework of the dynamical diffraction theory. They can be calculated as shown recently [@rusz07]. They depend on the momentum transfers $\textbf{q}$ and $\textbf{q}'$, on the location of the spectrometer aperture, on the atomic structure of the crystal, on the thickness and orientation of the sample, and on the location of the ionized atom inside the sample. For more complex unit cells, Eq. (\[eq:one\]) needs to be generalized by summing over the different atom species. The operators $r_{+}=x+iy$, $r_{-}=x-iy$, and $r_{0}=z$ can be used to express the mixed dynamic form factors within the electric dipole approximation as $$S\left(\textbf{q},\textbf{q}',E\right)=\frac{q_{x}q'_{x}+q_{y}q'_{y}}{4}\left
(\mu_{+}+\mu_{-}\right)+q^{2}_{z}\mu_{0}+i\frac{q_{x}q'_{y}-q_{y}q'_
{x}}{4}\left(\mu_{+}-\mu_{-}\right)$$ where $$\mu_{+}=\sum_{i,f}\left|\left\langle i\right|r_{+}\left|f\right\rangle\right|^
{2}\delta\left(E-E_{f}+E_{i}\right),$$
$$\mu_{-}=\sum_{i,f}\left|\left\langle i\right|r_{-}\left|f\right\rangle\right|^
{2}\delta\left(E-E_{f}+E_{i}\right),$$
and $$\mu_{0}=\sum_{i,f}\left|\left\langle i\right|r_{0}\left|f\right\rangle\right|^
{2}\delta\left(E-E_{f}+E_{i}\right),$$ $z$ being the quantization axis. In the following, we have considered a four-fold diffraction pattern with distance $g$ between Bragg spots and the two spectrometer aperture positions pos1 and pos2 which are indicated in Fig. \[fig:diffraction\]b. Such a diffraction pattern can be observed with *bcc* Fe or *fcc* Ni crystals oriented in the (100) zone axis. The reciprocal lattice vectors are given by $\textbf{g}=ng\textbf{e}_{x}+mg\textbf{e}_{y}$ ($n$ and $m$ being the integers associated to each Bragg spot), and the momentum transfer vectors are written as $\textbf{q}=g\left(\delta-n\right)\textbf{e}_{x}+g\left(\epsilon-m\right)\textbf{e}_{y}+q_{z}\textbf{e}_{z}$ for position 1, and by $\textbf{q}=g\left(\delta-n\right)\textbf{e}_{x}-g\left(\epsilon+m\right)\textbf{e}_{y}+q_{z}\textbf{e}_{z}$ for position 2 ($\delta$ and $\epsilon>0$ being real). The difference and the sum between the EELS signals measured at the two symmetric positions of the spectrometer aperture described above are given by $$\sigma_{2}\mp\sigma_{1}=$$ $$\frac{1}{4g^{2}}
\sum_{\left(n,m\right)}
\frac{A^{pos2}_{n,-m;n,-m}\mp A^{pos1}_{n,m;n,m}}
{\left[\left(\delta-n\right)^{2}+\left(\epsilon-m\right)^{2}+
\frac{q^{2}_{z}}{g^{2}}\right]^{2}}
\left\{\left[\left(\delta-n\right)^{2}+\left(\epsilon-m\right)^{2}\right]\left
(\mu_{+}+\mu_{-}\right)+4\frac{q^{2}_{z}}{g^{2}}\mu_{0}\right\}$$ $$+\frac{1}{2g^{2}}
\sum_{\left(n,m\right)}\sum_{\left(n',m'\right)\neq\left(n,m\right)}
\frac{\textrm{Re}\left(A^{pos2}_{n,-m;n',-m'}\mp A^{pos1}_{n,m;n',m'}\right)}
{\left[\left(\delta-n\right)^{2}+\left(\epsilon-m\right)^{2}+\frac{q^{2}_{z}}{g^
{2}}\right]
\left[\left(\delta-n'\right)^{2}+\left(\epsilon-m'\right)^{2}+\frac{q^{2}_{z}}
{g^{2}}\right]}$$ $$\times\left\{\left[\left(\delta-n\right)\left(\delta-n'\right)+\left(\epsilon-
m\right)\left(\epsilon-m'\right)\right]\left(\mu_{+}+\mu_{-}\right)+4\frac{q^{2}
_{z}}{g^{2}}\mu_{0}\right\}$$ $$+\frac{1}{2g^{2}}
\sum_{\left(n,m\right)}\sum_{\left(n',m'\right)\neq\left(n,m\right)}
\frac{\textrm{Im}\left(A^{pos2}_{n,-m;n',-m'}\pm A^{pos1}_{n,m;n',m'}\right)}{\left[\left
(\delta-n\right)^{2}+\left(\epsilon-m\right)^{2}+\frac{q^{2}_{z}}{g^{2}}\right]
\left[\left(\delta-n'\right)^{2}+\left(\epsilon-m'\right)^{2}+\frac{q^{2}_{z}}
{g^{2}}\right]}$$ $$\times\left[\left
(\delta-n\right)\left(\epsilon-m'\right)-\left(\delta-n'\right)\left(\epsilon-m\right)\right]
\left(\mu_{+}-\mu_{-}\right)\label{eq:seven},$$ where $\sigma_{2}=\left(\frac{\partial^{2}\sigma}{\partial E\partial\Omega}\right)_{pos2}$, $\sigma_{1}=\left(\frac{\partial^{2}\sigma}{\partial E\partial\Omega}\right)_{pos1}$, and the pairs of Bragg spots $\left(n,m\right)$ and $\left(n',m'\right)$ are not counted twice in the double sum. In the perfect zone axis configuration, this equation can be simplified using $$A^{pos1}_{n,m;n',m'}=A^{pos2}_{n,-m;n',-m'}\label{eq:eight}.$$ These equations remain valid in the systematic row configuration which is reached by tilting the sample around the $\left(Ox\right)$ axis. This tilt modifies the value of all the coefficients $A_{n,m;n',m'}$. In particular, contribution from the Bragg spots which are not located on the diffraction row can be neglected and $A_{n,m;n',m'}\approx0$ if $m\neq0$ and/or $m'\neq0$. The two beam case is obtained after a second tilt of the sample around the $\left(Oy\right)$ axis. This tilt changes again the value of the coefficients $A_{n,m;n',m'}$ which become small except if $m=0$, $m'=0$, and small $n$, $n'$. In practice, this facilitates the numerical calculation of the essential Bloch wave coefficients. Eqs. (\[eq:seven\]) and (\[eq:eight\]) show that $\left(\sigma_{2}-\sigma_{1}\right)$ is proportional to $\left(\mu_{+}-\mu_{-}\right)$. To express $\left(\sigma_{2}+\sigma_{1}\right)$ in a form which can further be used to derive the EMCD spin and orbital sum rules, we use the two additional approximations $\left(\mu_{+}+\mu_{-}\right)\approx\frac{2}{3}\left(\mu_{+}+\mu_{0}+\mu_{-}\right)$ and $\mu_{0}\approx\frac{1}{3}\left(\mu_{+}+\mu_{0}+\mu_{-}\right)$. Thanks to these approximations, $\left(\sigma_{2}+\sigma_{1}\right)$ becomes proportional to $\left(\mu_{+}+\mu_{0}+\mu_{-}\right)$. The spin and orbital sum rules for an EMCD experiment can then be derived, using the sum rules which have been obtained by B. T. Thole et al. and P. Carra et al. to analyze XMCD spectra [@thole92; @carra93]. The new EMCD sum rules can be written as $$\frac{\int_{L_{3}}\left(\sigma_{2}-\sigma_{1}\right)dE-2\int_{L_{2}}\left(\sigma_{2}-\sigma_{1}\right)dE}{\int_{L_{3}+L_{2}}\left(\sigma_{2}+\sigma_{1}\right)dE}=K\left(\frac{2}{3}\frac{\left\langle S_{z}\right\rangle}{N_{h}}+\frac{7}{3}\frac{\left\langle T_{z}\right\rangle}{N_{h}}\right)\label{eq:nine}$$ and $$\frac{\int_{L_{3}+L_{2}}\left(\sigma_{2}-\sigma_{1}\right)dE}{\int_{L_{3}+L_{2}}
\left(\sigma_{2}+\sigma_{1}\right)dE}=K\frac{1}
{2}\frac{\left\langle L_{z}\right\rangle}{N_{h}}\label{eq:ten}$$ where $\left\langle S_{z}\right\rangle/N_{h}$, $\left\langle L_{z}\right\rangle/N_{h}$ and $\left\langle T_{z}\right\rangle/N_{h}$ are respectively the ground state expectation values of spin momentum, orbital momentum, and magnetic dipole operators per hole in the $d$ bands. The coefficient $K$ contains all the information related to the dynamical effects. It can be expressed as $$K=3\sum_{\left(n,m\right)}\sum_{\left(n',m'\right)\neq\left(n,m\right)}\frac
{\textrm{Im}\left(A^{pos1}_{n,m;n',m'}\right)\left[\left(\delta-n\right)\left(\epsilon-
m'\right)-\left(\delta-n'\right)\left(\epsilon-m\right)\right]}{\left[\left
(\delta-n\right)^{2}+\left(\epsilon-m\right)^{2}+\frac{q^{2}_{z}}{g^{2}}\right]
\left[\left(\delta-n'\right)^{2}+\left(\epsilon-m'\right)^{2}+\frac{q^{2}_{z}}
{g^{2}}\right]}/$$ $$\{\sum_{\left(n,m\right)}\frac{A^{pos1}_{n,m;n,m}\left[\left(\delta-n\right)^{2}
+\left(\epsilon-m\right)^{2}+2\frac{q^{2}_{z}}{g^{2}}\right]}{\left[\left
(\delta-n\right)^{2}+\left(\epsilon-m\right)^{2}+\frac{q^{2}_{z}}{g^{2}}\right]
^2}$$ $$+2\sum_{\left(n,m\right)}\sum_{\left(n',m'\right)\neq\left(n,m\right)}\frac
{\textrm{Re}\left(A^{pos1}_{n,m;n',m'}\right)\left[\left(\delta-n\right)\left(\delta-
n'\right)+\left(\epsilon-m\right)\left(\epsilon-m'\right)+2\frac{q^{2}_{z}}{g^
{2}}\right]}{\left[\left(\delta-n\right)^{2}+\left(\epsilon-m\right)^{2}+\frac
{q^{2}_{z}}{g^{2}}\right]\left[\left(\delta-n'\right)^{2}+\left(\epsilon-
m'\right)^{2}+\frac{q^{2}_{z}}{g^{2}}\right]}\}\label{eq:eleven}.$$ $K$ can be calculated for a very well defined geometry. It will depend on the excitation error of the incident beam, the specimen thickness, the detector position and aperture size. Moreover, in the experiment one never can achieve a perfectly parallel beam. Convergence and partial coherence of the electron source make the precise calculation of $K$ untenable for the time being. Still, Eqs. (\[eq:nine\]) and (\[eq:ten\]) can be used to obtain $$\frac{\int_{L_{3}}\left(\sigma_{2}-\sigma_{1}\right)dE-2\int_{L_{2}}\left(\sigma_{2}-\sigma_{1}\right)dE}{\int_{L_{3}+L_{2}}
\left(\sigma_{2}-\sigma_{1}\right)dE}=\frac{4\left\langle S_{z}\right\rangle+14\left\langle T_{z}\right\rangle}{3
\left\langle L_{z}\right\rangle}\label{eq:twelve}$$ free from any dynamical coefficient, sample orientation and thickness. Eqs. (\[eq:nine\]), (\[eq:ten\]) and (\[eq:eleven\]) apply to a single absorbing atom of the sample. The extension of the foregoing derivation from a four-fold symmetric diffraction pattern to the general case is straightforward.
We now briefly describe the experimental applicability of the EMCD sum rules. Experiments were performed using the SACTEM Toulouse, a TECNAI F20 (FEI) equipped with a spherical aberration corrector (CEOS), an Imaging Filter (Gatan Tridiem) and a 2k\*2k Camera (Gatan). An iron sample was used as a test sample. By combining the techniques of tripod polishing and ion milling, we prepared a large flat area which was electron transparent. The magnetisation of the iron film is saturated in the $\left(Oz\right)$ direction by the field of the objective lens pole piece. The sample was oriented in (110) two beam configuration and the electron diffraction pattern was recorded using the ESI technique performed with a 1 eV slit in an energy range of \[645 eV, 745 eV\] for a total of 30 min exposure time [@warot07]. The diffraction pattern is taken using the LACDIF configuration [@midgley99; @morniroli07; @warot07] with a 7.8 mrad convergence angle which strongly increases the EMCD intensity and the signal/noise ratio. Post process corrections of isochromaticity and drift detected on the ESI data cube were applied using a home made software written in the scripting language of Digital Micrograph (Gatan). Finally, EELS spectra are extracted using the ESI data cube, for the two positions $\textbf{OS}=\frac{g}{2}\textbf{e}_{x}\pm\frac{g}{2}\textbf{e}_{y}$ located on the Thales circle which passes by the transmitted beam and the Bragg spot. Two circular apertures of semi-angle $\alpha=4.2$ mrad were used in the numerical integration, and the recorded spectra are shown in Fig. \[fig:spectra\]a.
The difference between the two spectra gives the dichroic signal which is represented in Fig. \[fig:spectra\]b. Our spectra have not been processed for removal of the background due to the 2$p$-state to continuum states transitions, because the aim of this paper is to demonstrate the feasability of the method. A quantitative analysis of spin/orbital moments would necessitate a better signal/noise ratio as well as more involved data treatment. We have applied Eq. (\[eq:twelve\]) to our experimental results, integrating the EMCD spectrum in the energy windows \[705 eV, 715 eV\] for the $L_{3}$ edge and \[719 eV, 729 eV\] for the $L_{2}$ edge. Neglecting the contribution of the magnetic dipole operator, this measurement has given $\left\langle L_{z}\right\rangle/\left\langle S_{z}\right\rangle=0.18\pm0.05$. This result is higher but with the same order of magnitude than the values 0.124 [@stearns86], 0.088 [@bonnenberg86], 0.133 [@carra93] and 0.086 [@chen95] which have been obtained from neutron scattering data, gyromagnetic ratio or XMCD spectra.
This comparison shows that EMCD is now on the way to giving quantitative magnetic information. Experiments do nevertheless deserve improvements, optimizing the angular and energy windows for integration in order to increase the still poor signal/noise ratio. Small background matching problems can also occur between the $L_{3}$ and $L_{2}$ edges. This can be seen near 715 eV where the dichroic signal does not perfectly vanish. These background problems are due to the fact that the non dichroic part of the signal is not perfectly the same at the two symmetric detector positions in the two beam case. In this case, Eq. (\[eq:eight\]) does not exactly describe the experimental configuration. This problem may be minimized by working at a higher voltage, in order to decrease the curvature of the Ewald sphere, or by looking for more symmetric experimental conditions for which Eq. (\[eq:eight\]) holds perfectly.
We have derived a set of sum rules for EMCD spectra which can be used to obtain orbital and spin moments of magnetic samples. Also dynamical diffraction effects of the electron beam in the specimen influence the dichroic spectra in a complicated way, the $\left\langle L_{z}\right\rangle/\left\langle S_{z}\right\rangle$ ratio can be extracted straightforwardly when the scattering conditions are properly chosen. The main advantage of using EELS instead of X-ray absorption for this quantitative analysis comes from the subnanometer probe size which can be reached in a TEM. This opens exciting perspectives for the local magnetic analysis of nanomaterials and nanodevices like magnetic tunnel junctions for spintronics applications or magnetic nanoparticles with enhanced anisotropy and magnetisation.
Acknowledments: The authors are grateful for support from the IP3 project of the 6th Framework Programme of the European Commission: ESTEEM (Enabling Science and Technology for European Electron Microscopy - Contract nr. 0260019), the French-Austria collaborative CNRS program (PHC-Amadeus). PS acknowledges support of the European commission, contract nr. 508971 (CHIRALTEM) and the CNRS Poste-Rouge program for funding his stay at CEMES-Toulouse.
![\[fig:diffraction\]Diffraction pattern for an EMCD experiment. (a): experimental diffraction pattern for an iron sample oriented in (110) two beam configuration. The transfer momentum vectors for the two symmetrical positions pos1 and pos2 are represented by arrows. (b): Four fold diffraction pattern which has been used to express the differential cross section. The two different positions of the spectrometer aperture ($\textbf{OS}=\delta g\textbf{e}_{x}\pm\epsilon g\textbf{e}_{y}$, with $\delta$ and $\epsilon$ real numbers) which have been considered are indicated by open circles. The Bragg spots are represented by filled circles. A pair of integers $\left(n,m\right)$ is associated to each Bragg spot, as shown for four of them.](fig16)
: EELS signal measured at the two symmetric positions pos1 and pos2 in the diffraction pattern of an iron sample oriented in the (110) two beam configuration; (b): corresponding dichroic signal](fig29)
[16]{} natexlab\#1[\#1]{}bibnamefont \#1[\#1]{}bibfnamefont \#1[\#1]{}citenamefont \#1[\#1]{}url \#1[`#1`]{}urlprefix\[2\][\#2]{} \[2\]\[\][[\#2](#2)]{}
, ****, ().
, , , , , , ****, ().
, , , , , , , , , ****, ().
, , , , , , , ****, ().
, ****, ().
, , , , , , , , , , ****, ().
, , , ****, ().
, ** (, ).
, , , , , , ().
, , , , , , ().
, ****, ().
, , , ().
, , , , ****, ().
, , , , ****, ().
, ** (, ).
, , , ** (, ).
|
/*
Copyright_License {
XCSoar Glide Computer - http://www.xcsoar.org/
Copyright (C) 2000-2016 The XCSoar Project
A detailed list of copyright holders can be found in the file "AUTHORS".
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
}
*/
#ifndef INTERFACE_BLACKBOARD_H
#define INTERFACE_BLACKBOARD_H
#include "LiveBlackboard.hpp"
#include "Util/Compiler.h"
class InterfaceBlackboard : public LiveBlackboard
{
public:
void ReadBlackboardBasic(const MoreData &nmea_info);
void ReadBlackboardCalculated(const DerivedInfo &derived_info);
gcc_const
SystemSettings &SetSystemSettings() {
return system_settings;
}
gcc_const
ComputerSettings& SetComputerSettings() {
return computer_settings;
}
gcc_const
UISettings &SetUISettings() {
return ui_settings;
}
inline void ReadCommonStats(const CommonStats &common_stats) {
calculated_info.common_stats = common_stats;
}
void ReadComputerSettings(const ComputerSettings &settings);
};
#endif
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.