text stringlengths 8 5.77M |
|---|
Modi’s charisma versus Bihar BJP
Two chief ministers from the Bharatiya Janata Party recently completed their first year in office – Manohar Lal Khattar in Haryana and Devendra Fadnavis in Maharashtra. It’s customary for chief ministers to address the media on achieving such a milestone. Khattar courted controversy in the interview he gave to the Indian Express, where he did not make politically palatable remarks on the issue of eating beef. This remark even got him an invite from party chief Amit Shah for an in-person dressing down.
Fadnavis conducted himself better, channel hopping and giving interviews to newspapers but at the same time effectively either skirting tricky issues bothering his government or answering them with ample caution. Your reporter was there at one such television show with Maharashtra’s young chief minister where he gave a very queer answer to a question regarding his stature.
He was asked whether he would ever come out of the shadow of towering Maharashtrian leaders from his party like Nitin Gadkari, who was like a banyan tree. Given that the party leadership had initially overlooked the demand of many party legislators to make Gadkari chief minister, Fadnavis said that there was just one banyan tree in his party, and everyone lived peacefully under his shadow.
No prizes for guessing that he was referring to Prime Minister Narendra Modi. Both Fadnavis and Khattar owe their office and status to the Prime Minister; similar to a Narayan Dutt Tiwari or for that matter a Giani Zail Singh, who had no qualms about wearing their loyalty to their leader on their sleeves. Tiwari, as chief minister of Uttar Pradesh during the Emergency days, did not hesitate for a minute to pick Prime Minister Indira Gandhi’s sleepers. A few years later on being nominated President of the nation, Giani Zail Singh had said that Gandhi would continue to be his leader and he could even pick a broom on her calling.
Before I am railed for being anti-Modi, let me illustrate a trend from the political campaign in the ongoing Bihar elections. The newspapers in the state are full of stories about who could be Bihar’s Khattar. In other words, if the BJP does come to power, which unknown entity would the party leadership foist as the chief minister. There are talks of one Rajendra Singh contesting from Dinara seat in Rohtas district becoming the chief minister. He is only the third serving “Pracharak” (full-time volunteer) of the RSS to have been allowed to contest polls— the other two being Narendra Modi and Manohar Lal Khattar.
He is not the only “Khattar” in the poll, the other being Rameshwar Chaurasia. Not a “Pracahark” but like Modi and Khattar he too is a bachelor. He belongs to the extremely backward castes community and has been appearing on television channels on behalf of the party. But that by no means makes him a political heavyweight in the state.
Such stories are finding space because the BJP campaign in Bihar has totally been Modi-Amit Shah centric with no Bihari leader making an appearance on any of the huge hoardings. To those who have followed the rise of BJP in the state, the complete short shrift given to the local leaders especially former Deputy Chief Minister Sushil Kumar Modi is somewhat indigestible.
Sushil Kumar Modi for seven years regularly featured alongside chief minister Nitish Kumar when the BJP and the Janata Dal (United) ran the coalition government. More than that Sushil Kumar Modi has been BJP’s and Sangh Parivar’s most recognisable face since the time Jayaprakash Narayan launched a movement against the Emergency in 1975. There are other leaders too in the state, who are capable of providing able leadership in case the BJP coming to power and the party doesn’t need to look for a Khattar.
But then the search for “Khattars” is fuelled by the need to have subservient leadership in the states; what else explains the destruction of local party structure in Delhi. A similar phenomenon is being witnessed in Uttarakhand where all the Lok Sabha MPs, which includes three former chief ministers – Major General BC Khanduri, Bhagat Singh Koshiyari and Ramesh Pokhriyal Nishank, have been consigned to the cold-storage. The Himalayan state goes for Vidhan Sabha polls in January-February 2017.
In Punjab, another state going to the polls in 2017, there is no recognisable face of the party who can provide leadership. With both Navjot Singh Sidhu and Vinod Khanna out of favour, the party is not in a position to utilise its most charismatic Sikh and Hindu faces. Probably, it’s the party strategy to not allow any other leader’s charisma share space with that of the Prime Minister’s. But will the name and appeal of the Prime Minister alone provide sufficient arsenal to party in its electoral battles?
The state assembly polls in Bihar would provide a definite answer to the above query. The BJP leadership, especially the Prime Minister and party president, managed to overcome the adverse results in Delhi assembly polls. However, if the party suffers reverses in Bihar too, the leadership would have to do away with the policy of going to the battlefield with leaders looking to prosper in the shade of a banyan tree. Nitish Kumar still has enough friends in the BJP. If he does come back to power, Kumar is capable of doing more damage to present BJP leadership from inside than outside. Who are Nitish Kumar’s friends are anybody’s guess?
(The author is president Centre for Reforms, Development & Justice and Consulting Editor, Millennium Post. Views expressed are personal) |
Back in January, in an attempt to lessen the incidence of concussion in their sport, World Rugby introduced heavier sanctions for high tackles. If the head area was hit, referees were mandated to dish out more penalties, more yellow cards and more red cards to the worst offenders.
A recent study of Premiership rugby in England concluded that rates of concussion have gone from 6.7 concussions per 1,000 player hours in 2012-13 to 15.8 concussions per 1,000 player hours in 2015-16 - or one brain injury in every couple of matches. The number of concussions has risen every year for the last four years. Of all match-day injuries, concussion now accounts for 25% of the total.
"We're back to the Wild West"
For a few weeks after the new sanctions were introduced in January referees flashed cards of both colours, then the Six Nations arrived and everything went quiet. An international rugby coach, who does not wish to be named, has said that rugby's "Wild West" has returned. What he meant was that the zero tolerance approach has been watered-down and that high tackles are going unpunished, or not sufficiently punished, in the way that World Rugby's sanctions demand.
Dr Stewart is a consultant neuropathologist at Glasgow's Queen Elizabeth University hospital. He is also an associate professor at the University of Glasgow and the University of Pennsylvania and is a member of World Rugby's concussion advisory group. He is a former amateur rugby player and has been working in the field of brain injury for more than 15 years.
"For the first few weekends after the new sanctions came in the cards were out of the pockets," said Dr Stewart. "A point was being made and it looked like we were going to get somewhere. You could see the tackles going lower, but we seem to have drifted back. Cards were being dished out for high tackles, but where is that now? It doesn't exist. You can say that players have adapted. No, they haven't. Referees have adapted because they've stopped enforcing it with the same vigour.
"It's back to the Wild West, that's correct. My sense is that there was a brief flurry of activity to demonstrate that things were happening and then the foot was taken off the gas and we've gone back to where we were before. So, effectively, nothing has happened. There's been no meaningful change."
World Rugby disagree with Dr Stewart's view. "This opinion is not supported by the data, which confirms that the new tackle law application guideline is being consistently and accurately applied across elite competitions and this was also the opinion of international coaches and referees attending a recent World Rugby workshop.
"The sanctioning of high tackles and dangerous charging has increased, with March representing the highest number to date of yellow cards and high tackles per match (punished), so it would be inaccurate to state that application may have eased off. Overall, when comparing January to March 2016 to the same period in 2017, there has been a two-fold increase in the number of high tackles and a 2.2-fold increase in the number of yellow cards issued for high tackles."
In their games against France and England in this season's Six Nations, Scotland suffered seven separate concussions. "That's crazy," said Dr Stewart. "That's unacceptably high." Dan Biggar, announced in Warren Gatland's Lions squad on Wednesday, is the latest high-profile player to be involved in such an incident.
Earlier this month, while playing for the Ospreys against Leinster in the Pro 12, Biggar took a bang to the head, left the field for examination, passed his Head Injury Assessment (HIA) and returned to play. Just after the game finished he admitted that he "couldn't remember much of the last 10 minutes, to be honest. I was a little bit dazed." It raises the argument about how effective the HIA system truly is if players are passing the test while being unable to remember what they were doing on the field subsequently.
"Whether it's concussion, or any other injury, the game of rugby is now becoming virtually unplayable," said Dr Stewart. "When I was playing rugby people ran into each other and accidents happened, but what we now have is people setting out to collide with each other, people who go into a ruck with a shoulder to clear people out, people who go into a tackle forearm first or high - all that stuff is going on which could be taken care of.
"You can't go on playing a game where there is a reasonable expectation that a player who steps out that day is going to get a brain injury - and that is what they are."
Three reviews, no action
It's not just what he sees as a relaxation of January's high-tackle sanctions that is concerning Dr Stewart, it's the situation surrounding reviews into three on-field incidents in December and January.
George North appeared to be knocked out when playing for Northampton against Leicester on December 3. After a HIA North was allowed to play on.
A week later, TJ Ioane was permitted to continue playing for Sale against Harlequins despite showing concussive symptoms. In the Untoward Incident Review (UIR) of the Ioane case, it emerged that two independent match-day doctors, suggesting that the player should be removed for concussion assessment, were over-ruled by the player's own team medic after administering the Maddocks questions (to determine if the player knew where he was and what time of day it was).
Dr Willie Stewart describes the review into the handling of Conor Murray's head injury against Glasgow as a 'miserable, shocker' of a report
On January 14, in a Champions Cup game between Glasgow and Munster at Scotstoun, there was another incident, this time involving Munster's Conor Murray.
The incident happened just after the hour-mark. Murray was tackled by Tim Swinson and hit the ground like a falling plank. A Munster team-mate, Andrew Conway, rapidly indicated that something was wrong with Murray. Glasgow's Ali Price looked at the ref to take some action. Luke Pearce, the referee, blew his whistle seven times to illustrate that there was a potentially serious situation unfolding. He promptly waved the medics on to the field.
With the player still on the field, the Munster medics then went through the Maddocks questions with Murray and cleared him to play on. Straight away, Murray took another hit, this time from Josh Strauss. He was slow to get back up. It was only then that Munster removed him from the field. He passed his immediate HIA, then another and then another.
Untoward Incident Reviews were conducted by Premiership Rugby in the North and Ioane cases and by European Professional Club Rugby in Murray's case. No action was taken against any of the clubs and no changes were brought to the HIA protocol.
"The buck stops with World Rugby"
Dr Stewart claims these reports suggest the review system is not fit for purpose, with the Murray example a "miserable, shocker" of a report.
"Look at the detail," he said. "It doesn't bother to speak to anybody who might have witnessed the incident, it just takes a statement from the player's team.
"If they had done this properly and taken all the statements, other than from the team, then they would have heard why the referee was so concerned that he blew the whistle so many times, they would have heard why the other players were so concerned, they might have taken a statement from the Glasgow medics who may have seen something different.
What is a pitch-side head injury assessment?
1. Player must correctly answer a series of simple questions including: What venue are we at? Which half is it?
2. Immediate memory test: Player must remember and repeat a sequence of five words.
3. Player must remember sequences of numbers and repeat them in reverse.
4. Balance evaluation: Player must walk by putting one foot directly behind the other.
"The report should have taken a statement from everybody, not because we're trying to build a case against the medics - everybody makes mistakes - but because we're trying to find out where this system might have failed the player and how it could be prevented from happening again.
"In the Murray report, the (Munster) evidence quite clearly states, after checking for a neck injury 'he was further assessed for any possible head injury. He answered all his Maddocks questions correctly,……and was cleared to return to play'.
"As soon as you ask those questions you are asking is the brain functioning and you are at least thinking there's been an injury that may have led to concussion. And if you are thinking that then in rugby it's an HIA and he has to be off the park while that assessment is taking place. World Rugby is very clear about this. That should have been a red line in the report that said, 'No, no , no'. Instead, the report agrees with the on-field management.
World Rugby said it would be "inappropriate to comment on specific cases" but confirmed that Maddocks questions should not be asked on the field of play.
Northampton and Wales wing George North has been at the centre of several incidents where the treatment of head injuries has been questioned
"While World Rugby might argue these competitions and reviews are run by various other organisations," says Dr Stewart, "for the wider public World Rugby is "rugby". The buck stops with World Rugby when it comes to the HIA and its perceived success or failures."
The sport's governing body commented: "Prior to the HIA's implementation in 2012, 56% of players assessed and cleared to play on were later determined to have sustained a concussion. With its combination of symptom recognition, video review and off-field screening, the HIA process has driven a significant improvement in the identification and removal of players with possible and confirmed concussions.
"The data are compelling, illustrating a move from 13% of concussed players mistakenly left on the field in 2013/14 to 4.5% at Rugby World Cup 2015 and an average of just 8% across 22 elite competitions worldwide in 2015/16."
The ultimate goal for Dr Stewart is simple - "to make sure that no concussed player stays on the field."
"Mistakes will happen, we all know that," he says. "There will be failings, but in each of these failings we must learn something - and I'm not sure I can see rugby learning the lessons." |
This invention pertains to a ski rest which may be permanently associated with the ski pole and the combination thereof with the ski rest having an operative position extending outwardly from the ski pole for engagement with the chair of a chair lift to permit a skier to rest his attached skis on the basket of the ski pole whereby the weight of the skier's legs, boots, and skis is transferred to the chair to enable resting of the legs while the skier is travelling on the lift. |
The upset becomes even more remarkable when you consider how it happened. This wasn’t the case of an upset UAE redefining perceptions of the underdog. Instead, Japan outshot the Emiratis 35 to 3. It put eight shots on target to the UAE’s two. Twenty of Japan’s shots came from inside the box, and Japan had 68.1 percent of the game’s possession. Yet thanks to a ninth minute goal from Ali Mabkhout (his fourth of the tournament), UAE held the lead for 72 minutes in regulation, with only a late goal from young Japanese midfielder Gaku Shibasaki allowing the heavy favorites to survive into extra time.
UAE, Iraq, South Korea, and Australia are through to the semifinals. Australia v Japan would likely have been a better game, but what a result for UAE. |
Woman Sentenced for Embezzlement of Tribal Funds
Juneau, AK (KINY) - Delia Commander, 64-years-old of Oregon, was sentenced by U.S. District Judge Sharon L. Gleason to serve 18 months in prison, followed by three years of supervised release.
She will also be paying restitution in the amount of $297,731. Commander pleaded guilty to one count of embezzlement from an Indian tribal Organization.
The woman had been an employee for the Village of Skagway as the Tribal Administrator for the Skagway Traditional Council, where she received a $45k annual salary, plus benefits and free housing. Commander's day-to-day included managing tribal housing, environmental and
waste management, and managing finances for the STC tribal government, among other things.
Commander embezzled the money by using a tribal credit card to make unauthorized cash advances at casinos and other locations, as well as making unauthorized personal purchases. Some of those purchases included a trip to Hawaii, online university courses, personal credit card bills, personal vehicle maintenance, and personal shopping. The Tribal Council had become suspicious due to the frequent travel and lack of financial documents.
She resigned in 2014, which is when her activities were discovered. Judge Gleason, at sentencing, noted that the system of federal funding for tribal
organizations relies heavily on trust, which Commander had violated.
Share
More from News of the North
Juneau, Alaska (KINY) - Juneau Representative Sara Hannan is waiting for the outcome in the race for House District One in Fairbanks to determine whether she will be a member of a majority or minority caucus in the 31st Alaska Legislature.
Juneau, Alaska (KINY) - Juneau Representative-elect Sara Hannan said she is heart broken and very concerned by the call of incoming Governor Mike Dunleavy to have all at will state employees tender their resignations. |
Designing a toilet for an aircraft poses challenges that do not generally occur in ground-based toilet designs. For instance, in an aircraft, space and weight are at a premium, and using regular water-flush toilets is not practical. There are additional drawbacks associated with existing systems. For instance, existing systems allow waste material to splash up under the shroud and over the toilet bowl, and producing an odor and potentially corrosion related damage. Also, performing routine maintenance and cleaning is much more difficult, since space restrictions make access to plumbing nearly impossible. |
A Canadian court has ordered three big tobacco firms to pay $CA15.5 billion ($16.1 billion) to smokers in Quebec province who claimed they were never warned about the health risks associated with smoking.
Imperial Tobacco Canada, Rothmans Benson & Hedges and JTI-MacDonald said they would appeal the award for moral and punitive damages, which is the largest in Canadian history.
They must, however, put a portion of the award in a trust pending the outcome.
A hearing must also be held to determine how the funds will be disbursed.
The two class action lawsuits behind the award were originally filed in 1998, but only went to trial recently.
They represented nearly 1 million smokers who were unable to quit or who suffered from throat or lung cancer, or emphysema.
At a nationally televised press conference, the wife of a deceased smoker showed a photo of her husband appearing gaunt and frail in his final years due to a smoking-related illness.
The plaintiffs argued in court the tobacco companies neglected to properly warn their customers about the dangers of smoking, and failed in their general duty "not to cause injury to another person", according to the Quebec Superior Court decision.
They also accused the firms of unscrupulous marketing and of having destroyed documents relevant to the case.
The companies, however, said the court's decision was not supported by the evidence presented at trial, and vowed to try to overturn it on appeal.
JTI-Macdonald said in a statement: "Since the 1950s, Canadians have had a very high awareness of the health risks of smoking."
"That awareness has been reinforced by the health warnings printed on every legal cigarette package for more than 40 years."
The firm also said "every facet" of the tobacco industry has been regulated by government, and the rules were strictly followed.
Imperial Tobacco Canada, which must pay the bulk of the award, said the judgment "ignores reality" by wrongly seeking to "relieve adult consumers of any responsibility for their actions".
It said the plaintiffs' claims were based on a notion that tobacco products should be banned.
The company, which is a subsidiary of British American Tobacco, pointed to a 1963 Gallup poll that showed 96 per cent of Canadians were aware that smoking might cause lung cancer.
Rothmans Benson & Hedges, meanwhile, lamented that not a single class action member testified at the trial.
"Not one showed up to say that he or she was unaware of the risks of smoking," the company said.
In his ruling, Judge Brian Riordan noted: "Over the nearly 50 years of the class period, and in the 17 years since, the companies earned billions of dollars at the expense of the lungs, the throats and the general wellbeing of their customers."
"If the companies are allowed to walk away unscathed now, what would be the message to other industries that today or tomorrow find themselves in a similar moral conflict?"
AFP |
Q:
How can I get only the executable name after using GetModuleFileNameEx
I want to store the executable name without the directory (i.e. system.exe).
How can I do this?
HANDLE Handle = OpenProcess(PROCESS_ALL_ACCESS, 0, ProcessID);
if (GetModuleFileNameEx(Handle, 0, (LPWSTR)exename, sizeof(exename) - 1))
{
ProcessName = (wchar*)exename; // I want to store only the executable name without "C:\\..."
}
A:
Did you search MSDN?
There you can find the functions PathFindFileName and PathFindExtension that you can utilize to build your file name.
|
The symposium, called "Stalled!," ran Feb. 7-8. Taubman College partnered with the U-M Initiative on Disability Studies, the U-M Spectrum Center, and the U-M Women’s Studies department for the symposium. Speakers from Yale; the University of California, Berkeley; and the United Kingdom were also in attendance.
Adam Smith and Lisa Sauve, designers and owners of Ann Arbor design studio Synecdoche, also attended to talk about designing a gender-neutral bathroom for Nightcap bar, a first for the city of Ann Arbor.
Jonathan Massey, dean and professor at the Taubman College, says the symposium started with controversies around gendered bathrooms and transgender individuals because they're a concrete example of how design can be inclusive or not. But he says the topic was just a launching pad to "open up bigger conversations."
Massey says people with different gender identities and especially disabled people generate knowledge about cities and architecture by the creative methods they devise to get around.
"They're hacking the city," Massey says. "They have to come up with creative workarounds just to enjoy access to things other people take for granted."
For example, speaker Joel Sanders from Yale began working with a trans activist on gender-inclusive restrooms. But the pair quickly began to understand there were other challenges and opportunities for inclusion in restrooms, such as including foot-washing stations for Muslims who need to do their daily ablutions in airport bathrooms.
Smith and Sauve talked about building a restroom for Nightcap that was both beautiful and inclusive, combining a shared washing area with sinks and a mirror and individual rooms for the toilets.
"In one way, it was no big deal, just a small shift in what we're used to," Massey says. "But they talked in the panel about how much negotiation it took to get planning approval and permits. Ultimately, the city of Ann Arbor was happy to work with them, once they all got on the same page."
Massey says building gender-neutral or accessible bathrooms in new buildings isn't difficult or particularly expensive, but retrofitting old buildings can be.
"But the Americans with Disabilities act was passed in 1991, and people have had more than 25 years to get used to this idea. It shouldn't be a surprise or a big deal," Massey says. Architects and building owners need to start thinking of accessibility requirements on the same level as other safety code upgrades like needing a better sprinkler system for a larger space, he says.
Massey says there is a social justice component to these issues, but these issues also force architects and designers to be more creative in a way that could benefit everyone. He says the best outcome of the symposium was building relationships between individuals and departments that don't often get together.
"There were lots of new faces that had never been to Taubman College, and they were learning about us and what we do here and vice versa," he says.
Massey says he hopes that in two or three years, Taubman will become the sort of place where nobody would think of building binary gender restrooms.
"Right now, there's a culture here of teaching standard practice and then adding on disability access as a second phase or afterthought," he says. "This was the beginning of a conversation that will help us to pivot the college to a condition where people start from the premise of maximizing opportunity for everyone."
Sarah Rigg is a freelance writer and editor in Ypsilanti Township. You may reach her at sarahrigg1@gmail.com. |
Schumer Unveils Small BREW Act in Watkins Glen Monday
12/3/2013 5:49:48 AM
By Lucas Day
Senator Charles Schumer made a stop in Watkins Glen Monday to announce a bill that would give tax breaks to small brewers.
While at Rooster Fish Brewing, Schumer unveiled the Small BREW Act of 2013 that would cut the excise tax rate from $7 to $3.50 per barrel on the first 60-THOUSAND barrels brewed every year, resulting in the savings of more than 200-THOUSAND dollars per year, per brewery. Schumer's bill would also cut the excise tax by two dollars per barrell on the next 1.9-MILLION barrels produced, resulting in a savings of more 3.8-MILLION dollars.
Schumer said the goal of the tax cut is for brewers to be able to reinvest in their businesses and communities. |
Q:
Compute $\lim_{n\to\infty }\int_E \sin^n(x)dx$
Let $E$ Lebesgue measurable of finite measure. Compute $$\lim_{n\to\infty }\int_E\sin^n(x)dx.$$
I already have the solution, but I did differently, and I would like to know if it's correct or not.
We can see that $\sin^n(x)\longrightarrow 0$ pointwise.
Let $\varepsilon>0$. By Egoroff theorem there is a closed set $F\subset E$ s.t. $m(E\backslash F)<\varepsilon$ and $\sin^n(x)\to 0$ uniformly. Therefore, $$\int_E|\sin^n(x)|dx\leq \int_{F}|\sin^n(x)|dx+\int_{E\backslash F}dx=m(E\backslash F)+\int_{F}|\sin^n(x)|dx\underset{n\to\infty }{\longrightarrow} m(E\backslash F)<\varepsilon$$
Therefore $$\lim_{n\to\infty }\int_E\sin^n(x)dx=0.$$
Do you think it work ?
A:
Yes, this is a fine proof (modulo the fact that when you write pointwise, it really should be "pointwise almost everywhere"). It can be simplified significantly, though: Use the dominated convergence theorem with dominating function $\chi_E$.
It's also worth remarking that a slight reworking of your proof gives a proof of the dominated convergence theorem (on spaces of finite measure) from Egoroff's theorem; some knowledge about continuity of measures is needed to control integral over $F$, but it's not too much extra effort.
|
LOCAL BRIEFS: Aggies win Red River Invite
LUBBOCK, Texas – The New Mexico State women's golf team pulled away from the competition on Tuesday and won the Red Raider Invitational by nine strokes. The team fired a final round of 295 (+7), which led the field. Four Aggies finished the invitational in the top-10.
Kennedie Montoya and Camille Orito led the team and finished tied for fourth as they carded a 3-over (219). Montoya led the field with 38 holes for par, and hit five birdies and one eagle over two days. Orito led the team in the final round firing a one-under (71), which included four birdies, putting her total up to 11 for the tournament. Kristen Cline finished tied for sixth (220) after firing a three-over, 75, in Tuesday's final round. Vale Macias also fired a 75 on Tuesday and finished tied for 10th place (222). Maria Prado rounded out the Aggies contingent and finished in 70th place (246).
NMSU (880) won the team title and was plus-16 for the invitational. Host Texas Tech (889) took second place and 17th-ranked Oregon (890) was third. Augusta (899) and East Tennessee St. (905) completed the top five.
Football
Las Cruces Kings to hold tryouts
Tryouts for the 2016 Las Cruces Kings season will be held Sept. 17 at 10 a.m., at Sierra Middle School.
Players are asked to bring a $10 tryout fee, but the event is open to the public. The tryout will include timed events, combine style one-on-one and team drills.
For more information, contact General Manager Richard Brown at 575-520-0297.
Soccer
Aggies ready for UNM Friday
LAS CRUCES – Fresh off their second shutout of the season, the New Mexico State women’s soccer team looks to build on that momentum as they get set to square off against Battle of I-25 rival New Mexico at 7 p.m. on Friday in Albuquerque before returning home to host Nevada at 1 p.m. on Sunday.
Friday’s contest in Albuquerque will also be broadcast on the Mountain West Network. |
Introduction
============
Speech production is a complex form of motor control, requiring articulation, perception, and language processing. Previous studies have revealed that several brain areas involved in motor, auditory, and verbal processing become concurrently active in coordination during speech production (Hirano et al., [@B12], [@B13]; McGuire et al., [@B21]; Paus et al., [@B24]). Speech production is controlled on the basis of feedback from one's own monitored speech. In a noisy environment, the voice becomes louder and its fundamental frequency becomes higher, a phenomenon known as the Lombard effect (Lane and Tranel, [@B16]). Speech becomes disturbed and dysfluent in the presence of delayed feedback of the utterance i.e., under conditions of delayed auditory feedback (DAF; Lee, [@B17]).
These observations clearly suggest the existence of an audio-vocal monitoring system that plays an important role in speech production, on the basis of auditory feedback of one's own voice. Levelt ([@B18]) proposed a model incorporating internal and external feedback loops. Furthermore, Guenther et al. ([@B5]) proposed a model in which speech production is regulated by comparing internally generated expectations before the utterance is made and sounds that are externally perceived. In this model, the dysfluency associated with the DAF conditions arises from an error in the comparison between the external perception and the internal modeling.
Generally, a motor command is accompanied by an efference copy to the sensory area where corollary discharge brought by the efference copy collates with the sensory feedback by the movements. The mechanism contributes to error detection between an expected action and the motor execution in spontaneous movements and also helps to suppress an expected sensory input. Considering the model mentioned above, replanning of the motor commands may occur if the system receives unexpected auditory feedback relative to the efference copy, which may increase repeated information processing in the motor cortex and the corollary discharge. Previous studies found that proper auditory feedback regulates motor control in speech production (e.g., Heinks-Maldonado et al., [@B10]).
Several neuroimaging techniques, magnetoencephalography (MEG) and functional magnetic resonance imaging (fMRI), can be used for measuring brain activation during overt and/or covert speech production (Hirano et al., [@B12], [@B13]; Wildgruber et al., [@B36]; Huang et al., [@B14]; Sakurai et al., [@B31]; Blank et al., [@B1]). Recent developments in frequency domain analysis techniques may provide a useful tool for analyzing brain activation during speech production. Such studies have typically been focused on robust event-related desynchronization (ERD) and event-related synchronization (ERS), that is, decreases or increases of the power within a particular frequency range in electroencephalography (EEG) or MEG.
Event-related desynchronization and ERS occur contingently with body movements. ERD occurs in brain areas corresponding to the parts of the body while they are in motion, subsequently followed by ERS in mainly the alpha band (around 10 Hz) and the beta band (around 20 Hz; electrocorticography, ECoG: Crone et al., [@B3],[@B4]; surface EEG: Pfurtscheller and Lopes da Silva, [@B27]; surface EEG: Neuper and Pfurtscheller, [@B22]; MEG: Salmelin et al., [@B32]). An MEG study reported that the ERD and ERS around 10 Hz appeared to originate from the somatosensory cortex, while those around 20 Hz originate from the motor cortex (Caetano et al., [@B2]). A pattern of movement-related changes in power around 10 Hz and 20 Hz is referred to as "mu-rhythm" activity (Pfurtscheller and Neuper, [@B28]; Salmelin et al., [@B32]).
Gunji et al. ([@B7]) used MEG to observe the ERD/ERS combination in the sensorimotor area. They have examined the MEG responses in a number of frequency bands while subjects spoke in the usual way (speaking), sang (singing), hummed (humming), and imagined (imagining) singing a popular song with normal auditory feedback in a blocked design. One trial consisted of four time stages: waiting interval (7 s), task interval (7 s), stop interval (7 s), and rest interval (10 s). Each subject performed eight trials in each condition. There were several advantages in focusing on ERD/ERS in the previous study examining the motor activity. ERD/ERS elicited by MEG is useful in identifying the cortical activities associated with a behavior, because MEG has advantages in identifying the localization of cortical sources with high spatial resolution. Also, the recording time was remarkably reduced compared with our previous studies using event related-potentials (ERP; Gunji et al., [@B8], [@B6]). As a result, we confirmed the ERD/ERS combination of alpha (8--15 Hz), beta (15--30 Hz), and low-gamma (30--60 Hz) frequency bands during and after overt speech production (singing, speaking, and humming). The sources of the ERD/ERS combination in alpha and beta were estimated in the bilateral sensorimotor area. Also, it has been reported that imagining movement without actual movement, covert speech production, generates similar brain activation that can be reliably detected. In particular, recent reports have demonstrated that imagining movement induces patterns of ERD and ERS similar to actual movement (Pfurtscheller et al., [@B29], [@B25]). Actually, Gunji et al. ([@B7]) succeeded to detect ERD and ERS patterns in covert speech production similar to overt speech production.
Thus, in this study, we extended Gunji et al.'s ([@B7]) study with EEG by investigating the cortical oscillatory changes in covert speech production and analyzed ERD/ERS changes while participants performed a task involving DAF and Lombard conditions. This would be a first report, to the authors' knowledge, to identify ERD/ERS associated with continuous vocalization with EEG. Also, this paradigm allows us to examine whether interference to speech such as DAF and Lombard effect can be reflected by ERD/ERS in speech production.
In Experiment 1, we confirmed ERD and post-movement ERS during a conventional finger-tapping task and during overt and covert vocalization, using the frequency domain analysis of EEG. Here we also examined whether the same patterns of motor and/or auditory responses were exhibited between the overt and covert vocalization. In Experiment 2, we examined whether the same patterns of motor responses were exhibited while participants read reading (covert reading) and listened to reading. We investigated if ERD and post-movement ERS reflect an error in the comparison between unexpected external auditory feedback by DAF and Lombard effect and the internal motor plan.
Experiment 1
============
We recorded EEG with (1) finger-tapping, as a body movement, (2) tongue exercise, as a similar movement to articulation, (3) articulation without vocalization, and (4) vocalization. The purpose of Experiment 1 was to examine the occurrence of ERD during speech production and post-movement ERS distributed around the sensorimotor area of the brain corresponding to the previous MEG study (Gunji et al., [@B7]).
Materials and methods
---------------------
### Participants
Sixteen healthy right-handed adults (12 males and 4 females, 22--37 years old) participated in the experiment. Each participant gave written informed consent before the experiment, and was naive to the purpose of the study. The experimental protocol was approved by the committee for human subject studies at Toyohashi University of Technology (TUT), and the ethical committee at National Center of Neurology and Psychiatry (NCNP).
### Recordings
EEG was recorded while the participants were resting and performing motor tasks. We used a Polymate AP-1000 EEG system, recording from eleven active electrodes (F8, Fz, F7, T3, C3, Cz, C4, T4, T5, Pz, and T6) placed according to the international 10--20 system, referenced to the bilateral earlobe, at a sampling frequency of 1000 Hz. Active electrodes with pre-amplifiers were used to minimize noise related to body, oral, and facial movements. The electrode impedances were below 5 kΩ although we used active electrodes. Speech sounds, videos of participants' body movements, and electromyography (EMG) were recorded simultaneously to pick up cues about the timing of the initiation of movements. EMG was recorded from electrodes on the wrist or throat.
### Procedure
Each trial consisted of three intervals: a 10-s long "before-movement" rest interval, a 10-s long "during-movement" activation interval, and a 10-s long "after-movement" rest interval. Thus, an individual trial lasted 30 s. After instruction on task movement of the trial, a black cross was presented at the center of the monitor. Upon presentation of the cross, the participant was asked to fixate on it, then remain motionless (the before-movement rest interval). The cross changed from black to red 10 s later, signaling initiation of the task movement. The participant performed one of five movement tasks while the cross remained red (the during-movement activation). The cross was again changed from red to black 10 s later, signaling cessation of the task movement. After the participant ceased the movement, they were required to remain motionless (the after-movement rest interval). After an "after-movement" rest interval, the black cross disappeared and the subsequent trial started with the instruction.
The five motor tasks were finger-tapping with the right hand (task 1), with the left hand (task 2), tongue exercise (task 3), articulation without vocalization (task 4), and vocalization (task 5). For the finger-tapping tasks (tasks 1 and 2), the participant placed their arm on a table and moved their index finger up and down at their own pace. We found that the average tapping speed was 2.4 taps per second, which corresponds to 24 taps in one 10 s long movement activation interval. For the tongue exercise task (task 3), the participant repeated a cycle of moving the tip of the tongue back and forth twice, left and right twice, and up and down twice. For articulation without vocalization (task 4), the participant performed articulatory movements without actual vocalization for each of all the Japanese syllables, composed of vowels or consonant-vowel pairs, exhaustively in the "alphabetical" order beginning with "a." For the vocalization task (task 5), the participant vocalized each of all the Japanese syllables exhaustively in the same "alphabetical" order beginning with "a." The syllables were presented at a rate of 17.5 syllables in one 10 s long movement activation interval. Tasks 1 through 5 were performed in this order, which was repeated five times. Thus there were 25 trials.
### Analysis
Trials exceeding 120 μV in the peak-to-peak amplitude were excluded from further analyses for each recording site. A trigger signal timing the initiation of the observed movement was considered to mark the onset of the task, and was manually identified by inspection of the recorded speech sounds, video monitoring, and EMG. Hereafter, we refer to the 10-s pre-trigger interval the *pre-task* interval, the 10-s post-trigger interval the *task* interval, and the 10-s interval starting 10 s after the trigger the *post-task* interval.
A notch filter at the power line frequency was applied and no baseline correction was performed; the subsequent frequency analysis effectively eliminated the noise in the frequency bands of no interest and the baseline drift which basically consisted of a DC component. A fast Fourier transform (FFT) was performed for each interval after the artifact rejection, followed by averaging of the power spectra.
To detect the mu-rhythm arising from the sensorimotor strip, the peak frequency band was defined as a 2 Hz window centered at the frequency with the maximum power in the 8--16 Hz range during the pre-task interval (Figure [1](#F1){ref-type="fig"}). We then calculated the mean peak band power for the pre-task and task intervals, and their log ratio i.e., log (*P*~task-interval~) − log (*P*~pre-task-interval~) as the ERD/S score, where *P*~interval~ denotes the mean peak band power in the interval. A positive score indicated ERS, while a negative score indicated ERD during the task interval. The post-task mu-rhythm in the sensorimotor strip was detected in the same manner. The peak frequency band was defined in the same way for the post-task interval. We then calculated the post-task ERD/S score as log (*P*~post-task-interval~) −* *log (*P*~task-interval~). A positive score indicated a post-task ERS, while a negative score indicated a post-task ERD.
{#F1}
Statistical significance was evaluated using Student's paired *t*-tests between the mean peak band power values during the pre-task and task intervals or the post-task and task intervals. Bonferroni correction was used for the correction for multiple comparisons.
Results and discussion
----------------------
After the artifact rejection, the number of epochs for the analysis was 4.3 ± 1.6 (mean ± SD) in the right finger-tapping, 4.3 ± 1.5 in the left finger-tapping, 3.5 ± 1.9 in the tongue movements, 2.9 ± 2.1 in the articulation without vocalization, and 3.2 ± 1.9 in the speaking for individual participants. The ERD/S score for the peak band in the alpha band (8--16 Hz range; i.e., the sensorimotor response) is shown topographically in Figure [2](#F2){ref-type="fig"}. We observed robust ERD during the task interval and ERS during the post-task interval in the finger-tapping task. Specifically, with finger-tapping of the right hand, the ERD and the post-task ERS were observed at F7, Fz, F8, T3, C3, Cz, C4, T4, and T5 (uncorrected *p *\< 0.05; with the correction for multiple comparisons, the ERD was significant at F7, Fz, F8, T3, C3, Cz, C4, T4, and T5 and the post-task ERS was significant at T3, C3, and T5, *p *\< 0.05; see Figure [3](#F3){ref-type="fig"}). For finger-tapping of the left hand, the ERD was observed at Fz, T3, C3, Cz, C4, T4, Pz, and T6 (uncorrected *p *\< 0.05; with the correction for multiple comparisons, at C3, Cz, C4, Pz, and T6, *p *\< 0.05), and the post-task ERS was observed at C3, Cz, C4, T4, Pz, and T6 (uncorrected *p *\< 0.05; with the correction for multiple comparisons, at C4, *p *\< 0.05). In contrast, the ERD was observed only at Fz (uncorrected *p *\< 0.05; n.s. with the correction for multiple comparisons), and the post-task ERS was observed only at C3 (uncorrected *p *\< 0.05; n.s. with the correction for multiple comparisons) in tongue exercise. For articulation without vocalization, the ERD was observed only at C4 (uncorrected *p *\< 0.05; n.s. with the correction for multiple comparisons). In the vocalization task, the significant ERD was observed at Fz, C4, and T6 (uncorrected *p *\< 0.05; n.s. with the correction for multiple comparisons), and the significant post-task ERS was observed at F8 (uncorrected *p *\< 0.05; n.s. with the correction for multiple comparisons). The apparent ERD and post-task ERS were observed in the finger tasks. The post-task ERS should correspond with the contralateral dominancy of the motor and somatosensory function. Orofacial movement tasks also resulted in a similar combination of ERS/ERD, though the post-task ERS did not reach statistical significance except for C3 in the tongue task, conceivably due to the shorter analyzed time-window in the orofacial movements compared with the other tasks. Weaker but significant ERD was observed for tongue movements, articulation without vocalization and for vocalization.
{#F2}
{ref-type="fig"})**.](fpsyg-03-00225-g003){#F3}
Global ERD during the task interval in the alpha band (8--16 Hz) was observed in the finger-tapping task. There was no statistically significant difference between the corresponding left and right sites (i.e., laterality) or between the midline and lateral sites. In contrast, the post-task ERS was prominent at T3 and C3 for right and C4 for left finger-tapping. As these recording sites correspond to the primary hand sensorimotor areas, we consider this post-task ERS to reflect an alpha mu-rhythm related to finger-tapping. Post-task ERS was stronger for the right than left finger at C3 and vice versa at C4, in accord with previous reports of cross lateralization associated with the motor control (Salmelin et al., [@B32]). We did not observe lateralization in the ERD during the movement interval, which may be consistent with reports of the absence of lateralization in the movement mu-rhythm in the alpha band (Salmelin et al., [@B32]; Ishii et al., [@B15]). Some other previous studies have reported cross lateralized mu-rhythm activity in the alpha band during the movement interval (Pfurtscheller et al., [@B26]), which may correspond to the post-task ERS we observed here.
For the tongue exercise and vocalization tasks involving movements of the phonatory organs, we observed a global ERD during the task interval, particularly at Fz. While many unresolved issues remain with respect to the control of tongue movements, the bilateral control has been consistently reported in earlier studies (e.g., Wohlert and Larson, [@B37]), in agreement with the prominent power change over the central regions of the motor cortex in the present study.
ERD at C4 in the right hemisphere was prominent for articulation without vocalization. ERD at Fz in midline, C4 and T6 in the right hemisphere were prominent for vocalization (Figure [3](#F3){ref-type="fig"}). While the oral and facial motor control including that of the tongue and throat is thought to be bilateral, Gunji et al. ([@B7]) reported more prominent alpha band ERD in the sensorimotor cortex related to speech production in the right hemisphere during singing, compared with simple sentence utterance or humming. Right hemisphere dominance was also reported in a transcranial magnetic stimulation (TMS) study (Triggs et al., [@B35]). The present results might indicate right hemisphere dominance for the articulation and vocalization tasks.
Overall, this experiment successfully demonstrated the ERD and the post-task ERS for finger-tapping (Pfurtscheller and Lopes da Silva, [@B27]; Neuper and Pfurtscheller, [@B22]). In addition, the similar pattern of ERD/ERS was also successfully detected in the tongue exercise, articulation without vocalization, and actual vocalization tasks although the power of the oscillatory change was slightly weak. A reason for the attenuated power should be that the EEG during the oral and facial movements might have been contaminated with movement artifacts, resulting in reduced ERD. Thus, we added Experiment 2 to evaluate motor-related oscillatory change in covert speech production which does not require oral and facial movements. While it is generally difficult to detect the sensorimotor mu-rhythm for actual speech production in the overt reading task due to the movement-related artifacts, Gunji et al. ([@B7]) reported the mu-rhythm in the primary sensorimotor cortex by motor imagery alone in the covert reading task (see also Pfurtscheller et al., [@B30]; Hanakawa et al., [@B9]). Thus we expected that the mu-rhythm associated with speech production might be detected by actively generating motor imagery, and that the motor imagery with externally generated auditory information would enhance the oscillatory change by the motor imagery commands. Motor plans for speech production would be activated to generate the mu-rhythm activity if the participants listened to their own voice as simulated feedback of natural vocalization, even without actual vocalization. In addition, we might detect effects of the quality of feedback using the DAF and Lombard paradigms to investigate the relationship between the altered feedback-related mu-rhythms, which surely represents evidence of the audio-vocal monitoring system (Figure [4](#F4){ref-type="fig"}). Thus, we examined four feedback conditions: "normal," "delayed," "noise," and "none" for a covert reading task.
{#F4}
Experiment 2
============
The purpose of Experiment 2 was to examine occurrence of the ERD and the post-task ERS in the alpha band (8--16 Hz range) in speaking imagery alone, the "none" condition, and to identify the difference of ERD/S changes between speaking imagery with altered auditory feedback in the "normal," "delayed," and "noise" conditions. For the covert reading in the "delayed"-auditory feedback condition, we used the vocalization recorded during overt reading in the DAF condition as a stimulus. Because the vocalization with DAF is dysfluent and prolonged in each mora, it sounds distorted as compared to the normal recordings (Lee, [@B17]). The covert reading in the "noise" condition was adopted to determine if disturbance to auditory feedback affected the motor control process of vocalization.
Materials and methods
---------------------
### Participants
Eleven participants of Experiment 1 (seven males and four females, 22--37 years old) participated in Experiment 2. They gave written informed consent before taking part in the study, and were naive to the purpose of the experiment. The experimental protocol was approved by the committee for human participant studies at TUT and the ethical committee at NCNP.
### Recordings
The same methods and apparatus in Experiment 1 were used to record EEG while the participant was resting and performing tasks.
### Procedure
The procedure is depicted schematically in Figure [4](#F4){ref-type="fig"}. There were four feedback conditions: "normal," "delayed," "noise," and "none." Before the experiment participants' own speech sounds were recorded during overt reading as follows, which were presented as feedback stimuli during covert reading and EEG recording.
#### Sound recording
The participant read aloud sentences that were presented on a monitor. The sentences were taken from a novel (a Japanese translation of "Harry Potter"). Seven sentences were displayed on average at once for 10 s as a task interval, followed by a blank screen for 10 s as a rest interval. After the rest interval, another set of sentences was displayed for 10 s. There were three feedback conditions in the task interval: normal, delayed, and noise. In the normal feedback condition, the vocalization of the participant was auditorily fed back to him-/herself through a headset without modification. In the delayed feedback condition, the participant's voice was fed back with a 400 ms delay using a digital signal processor. In the noise feedback condition, pink noise of 75 dB SPL was fed back. In each participant, the combination of task/rest was repeated 15 times, that is, five trials were collected in each condition. Different sentences were used for different feedback types to avoid the effects of adaptation and learning.
The recorded participants' voice was presented as the feedback stimuli during covert reading for the subsequent EEG measurements.
#### EEG measurements in listening tasks
In the normal, delayed and noise feedback conditions, the participants listened to the corresponding one of the three recorded own voice sounds while EEG was recorded. The participants were displayed visually with the same sentences in the same manner as during the sound recording, and were instructed to covertly read the displayed sentences as they listened to their own previous readings. In the normal and delayed feedback conditions, the recorded voice was re-played. In the noise conditions, the recorded voice was re-played but mixed with the corresponding noise.
Note that listening to one's own recorded voice is not the same as listening to one's own voice during vocalizing. While one listens to own voice during vocalization, one does so through the air conduction and the bone conduction. In contrast, while one listens to own recorded voice, one does so only through the air conduction without the bone conduction. It makes a difference in the sound spectrum. To simulate the air-and-bone conduction under the air-only conduction, the recorded participants' voice was re-played with attenuation by 3 dB below 1,000 Hz and boost by 3 dB above 1,000 Hz (see Shuster and Durrant, [@B34]). As a result, the pre-recorded voice stimuli sounded like the participants' own real-time utterance through the headphones.
Covert reading task: In the no feedback condition, the participants were visually presented with the same sentences in the same manner as during the sound recording and instructed to read them silently without any auditory input while EEG was recorded. The no feedback condition was repeated three times using the same sentences as the normal, delayed and noise feedback conditions.
### Analysis
The same artifact rejection was performed on the data as in Experiment 1. Data from F7 and F8 were excluded from the analyses, because recordings from these sites had to be rejected due to artifacts for most participants. The number of epochs for the analyses was 4.0 ± 1.7 (mean ± SD) in the normal condition, 4.0 ± 1.8 in the delayed feedback condition, 3.6 ± 2.0 in the noise condition, and 3.8 ± 2.0 in the no feedback condition. Frequency analysis in the 8--16 Hz range similar to Experiment 1 was performed for each of four 5 s intervals: a pre-reading 5 s interval was considered as a pre-task interval, the first 5 s as the first half task interval, the following 5 s as the second half task interval, and a 5-s post-reading interval as the post-task interval. The intervals were determined *post hoc*, and might explain a temporal influence of short term adaptation working in hearing unexpected one's own voice of speech. The pre-task and post-task intervals were used to identify the peak frequency bands. In addition, to detect responses from the auditory cortex we evaluated the peak power in the 2--10 Hz range (see Herdman et al., [@B11]). The ERD/S score and the rebound ERD/S score were calculated for the auditory response in the same manner as those for the sensorimotor response.
To evaluate statistical significance, Student's paired *t*-tests between the mean peak band power values were performed. Bonferroni correction was used for the correction for multiple comparisons. An ANOVA was performed on the non-transformed ERD/S scores, with the feedback type and the recording site as factors, for the first half task intervals, the second half task interval and the post-task interval. There were three levels of feedback type: normal, delayed and noise. The no feedback condition was not included in the ANOVA, because we used the same sentences for the with-feedback and no feedback conditions. Thus, activation in this condition may have been influenced by learning and adaptation, which could confound the results. On the other hand, since we used the same sentences in these conditions, we were able to make direct comparisons between the with-feedback and no-feedback conditions, as discussed above.
Results and discussion
----------------------
### Sensorimotor response
A combination of ERD during the task interval and post-task ERS was elicited in the alpha band (8--16 Hz range) over the sensorimotor strip at C3, Cz, and C4 in all the feedback conditions with a few exceptions (uncorrected *p *\< 0.05; with Bonferroni correction for multiple comparisons, at Cz during the first half task interval for the normal feedback, at Cz and C4 during the first half task interval, at C3 and Cz during the second half task interval and at Cz and C4 during the post-task interval for the delayed feedback, at C3 during the post-task interval for the noise feedback, and at C3 and Cz during the second half task interval and at C3, Cz, and C4 during the post-task interval for the no feedback, *p *\< 0.05; see Figures [5](#F5){ref-type="fig"} and [6](#F6){ref-type="fig"} for details). We successfully observed the motor-related mu-rhythm in response to the audio-visual or visual stimulation simulating speech production alone. The frequency range was almost the same as Gunji et al. ([@B7]) reporting the mu-rhythm for vocalization (8--15 Hz). The ERD and post-task ERS we observed may indicate that the speech plans were evoked spontaneously and implicitly by auditory stimulation or covert reading.
{#F5}
{ref-type="fig"})**.](fpsyg-03-00225-g006){#F6}
Our results demonstrated that it was possible to observe the motor-related mu-rhythm using a realistic simulation of speech production. Thus, the mu-rhythm activity can be evoked by the audio-visual stimulation alone.
We also observed differential mu-rhythms depending on the auditory input. The two-way ANOVA with the feedback type and the recording site as factors showed a significant interaction for the first half task interval \[*F*(16,112) = 2.268, *p *\< 0.01; the corresponding *post hoc* pair-wise comparison between the noise and the other feedback types at C4 with Bonferroni correction *p *\< 0.05\], but not for the second half task interval \[*F*(16,112) = 0.957, n.s.\]. Namely, the mu-rhythm for the first half interval of the task recorded at C4 was stronger during stimulation by speech with normal or DAF than with speech with noise as shown in Figure [7](#F7){ref-type="fig"}. This may imply that the clarity of the simulation affects the vividness of the motor imagery as reflected in the strength of the motor-related mu-rhythm. We did not observe the same effects on the second half task interval, conceivably because of short term adaptation. The reduced mu-rhythm in the noise condition for the first half task interval may be due to incomplete acquisition of efference copy in the orofacial area of the sensorimotor cortex. Since a key to help covert reading in the noise condition was only visual cues as the sentences presented on the monitor, covert reading onset might have been delayed compared with the other tasks. Furthermore, loud noise may have distracted the participants from their covert reading. Mazard et al. ([@B20]) reported that the performance of a mental imagery task was lower in a noisy environment than a silent environment. Thus, the developing mu-rhythm in the noise condition for the second half task interval may also indicate a temporal influence of adaptation to the loud noise. Further studies would be required to identify the temporal threshold.
{#F7}
Similarly, the results of the ANOVA for the post-task interval showed a significant interaction \[*F*(16,112) = 2.009, *p *\< 0.05\]. Namely, we found a stronger post-task ERS at Fz with the stimulation by distorted than normal feedback (the corresponding *post hoc* pair-wise comparison with Bonferroni correction *p *\< 0.1), conceivably because there was greater involvement of the supplementary motor area with DAF. The present results suggested that disturbance to hearing imagery of one's own voice might seriously affect the primary stage of vocalization.
### Auditory response
We did not observe an auditory response in the 2--10 Hz range. To confirm this lack of auditory response, we calculated the differences in the ERD/S scores between the conditions with and without feedback. Because the participants read text in both the novel stimulus (no auditory feedback) and imagined vocalization (normal, delayed, or noise feedback) conditions, the only difference between the two cases was the simulated auditory feedback. We did not find significantly greater ERS in any of the conditions with auditory feedback as compared with those without auditory feedback during the task intervals. A two-way ANOVA did not show significant effects of the feedback type \[*F*(2,10) = 0.291 for the first half task interval, *F*(2,10) = 0.365 for the second half task interval, *F*(2,10) = 0.554 for the post-task interval\] or any interactions between the feedback type and the recording site (*F*(16,80) = 1.125 for the first half task interval, *F*(16,80) = 0.847, or the second half task interval, *F*(16,80) = 1.013 for the post-task interval). While the lack of the auditory response to the auditory stimulation may appear odd, it should be noted that our auditory stimulus was the participants' own voice, which is known to suppress auditory processing (Gunji et al., [@B7]).
Also, the lack of the auditory response might be caused by the signal-to-noise ratio of the analyzed frequency band and the number of averaged epochs should be considered. In a previous study (Herdman et al., [@B11]), ERS related to the simple auditory response in 2--10 Hz was obtained using an analysis time-window of maximal 50 s (250 ms × 200 epochs). However, our previous study did not obtain the ERS during overt speech vocalization using an analysis time-window of maximal 56 s (7 s × 8 epochs). Thus, the discrepancy of the results may reflect the difference of the number of analyzed epochs rather than the analyzed length. That is, we might not necessarily locate an oscillatory 2--10 Hz response in the auditory area equivalent to the N1/N100 component of ERP as an onset response to each auditory stimulus. To elucidate this problem should be a direction of further studies.
General Discussion
==================
In Experiment 1, we confirmed the mu-rhythms for a conventional finger-tapping task and speech production. We successfully observed the mu-rhythm activity in the alpha (8--16 Hz) band for articulation and vocalization, as well as finger-tapping. In Experiment 2, we examined the electrophysiological activity for imagined speech production. We tested whether the same pattern of the motor mu-rhythm activity was exhibited when the participants listened to their own voice and were engaged in covert reading. We successfully observed the mu-rhythms for imagined vocalizations.
We observed a central dominant ERD in the alpha band during the task interval for 8--16 Hz, in the similar range as previous reports (Hanakawa et al., [@B9]; Gunji et al., [@B7]). Interestingly, in the present study we found that the ERD, which allegedly originates in the sensorimotor cortex in the imagined vocalization for listening or covert reading, was larger in Experiment 2 than the ERD for actual vocalization in Experiment 1. While the mu-rhythm activity associated with the motor imagery is thought to be weak compared with the actual movement, it can be strengthened with training (c.f. Pantev et al., [@B23]; Schulz et al., [@B33]). Participants were expected to be trained to a greater extent with reading, than with vocalization of individual syllables. Alternatively, the pattern of activity may be related to the content of the stimuli (e.g., the amount and complexity of articulation and language). Previous studies have reported that complex articulation produces larger motor potentials originating from areas associated with speech production (Masaki et al., [@B19]). It remains possible that stronger motor commands are generated compared with limb movements in speech recognition and production.
In summary, the present study examined the frequency and the scalp distribution of the motor-related mu-rhythm activity for real and imagined speech production. These findings may be used as basic data in a real-time analysis of brain activation for speech production in communication such as conversation. We have also clarified that the mu-rhythms are observed not only for the overt vocalization but also for the imagined vocalization in the form of covert reading, as well as when listening to simulated auditory feedback of overt reading of sentences with normal verbal comprehension. In addition, we also revealed that the mu-rhythm for listening was boosted and attenuated with the distorted and noise feedback conditions, respectively. It is consistent with the notion that auditory feedback is important for an audio-vocal monitoring system in speech production. This paradigm may help clarify the way in which auditory feedback supports motor planning as indexed by the motor mu-rhythm.
Conflict of Interest Statement
==============================
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
This work was supported in part by the Nissan Science Foundation (for Michiteru Kitazaki), by the Grant-in-Aid for Scientific Research (B; for Shigeki Nakauchi, 22300076), and by the Research Institute of Science and Technology for Society (RISTEX) of the Japan Science and Technology Agency (JST; for Sachiko Koyama). Some parts of this study were conducted at the Global Center of Excellence "Frontiers of Intelligent Sensing" (Toyohashi University of Technology) supported by the Ministry of Education, Culture, Sports, Science and Technology (MEXT) Japan. We thank Hidehiko Matsumoto for advice regarding data collection, Kota Arai for data collection, Naoyuki Matsuzaki for discussion and Hiroaki Mizutori for data analysis.
[^1]: Edited by: Marcela Pena, Catholic University of Chile, Chile
[^2]: Reviewed by: Yang Zhang, University of Minnesota, USA; Stéphanie Massol, Basque Center of Cognition, Brain and Language, Spain
[^3]: This article was submitted to Frontiers in Language Sciences, a specialty of Frontiers in Psychology.
|
Q:
Regex interpretation and javascript's replace function. Why do we need the capture group?
var cleaned_input = input.replace(/(\s{2,}\n|\t)/g," ")
I have this line. This regex seems to replace any space of two or more, any newline, and any tab globally with just a single space. But why do I need the capture group? What is captured?
A:
This regex does replace by a single space all "contiguous spaces (2 or more) followed by a line-feed" OR "individual tabs".
The capturing group is unnecessary in this case, but I believe it was put there because of a false assumption that or (|) statements always need to be within parenthesis.
|
Q:
What is the time limit of an inings?
What is maximum time limit of an innings in t20 and one day format? If time is wasted by batting team or by any natural way like time waste in large number of unexpected extra boundaries (huge sixes) will bowling side captain still be fined?
A:
The time limit for a limited-overs innings will be specified in the regulations covering that competition.
The T20i regulations are here, and they state that each session should be 1 hour 25 minutes in duration, with a minimum over-rate of 14.11 per hour.
The ODI regulations are here, and they state that each session should be 3 hours 30 minutes in duration, with a minimum over-rate of 14.28 per hour.
Umpires are permitted to extend the allowed time to cover things like delays due to injury, lost balls etc.
|
---
author:
- 'M.S. Pshirkov[^1]'
- 'G.I. Rubtsov [^2]'
title: 'Variable gamma-ray sky at 1 GeV'
---
[We search for the long-term variability of the $\gamma$-ray sky in the energy range $E >$ 1 GeV with 168 weeks of Fermi-LAT data. ]{} [We perform a full sky blind search for regions with variable flux looking for deviations from uniformity. We bin the sky into 12288 bins using Healpix package and use Kolmogorov-Smirnov test to compare weekly photon counts in each bin with a constant flux hypothesis. The weekly exposure of Fermi-LAT for each bin is calculated with the Fermi-LAT tools. We consider flux variations in the bin significant if statistical probability of uniformity is less than $4\times 10^{-6}$, which corresponds to 0.05 false detections in the whole set.]{} [ We identified 117 variable sources, variability of 27 of which has not been reported before. Among the sources with previously unidentified variability there are 25 AGNs belonging to blazar class (11 BL Lacs and 14 FSRQs), one AGN of uncertain type and one pulsar PSR J0633+1746 (Geminga). The observed long term flux variability of Geminga has a statistical significance of 5.1$\sigma$.]{}
Introduction {#sec:intro}
============
Time domain astronomy at different wavelengths from radio to very high-energy gamma-rays is developing very rapidly nowadays. In the high energy (HE) range ($\ge 100$ MeV) great progress was achieved with advent of the gamma-ray telescope Fermi-LAT [@Atwood2009]. Its high sensitivity and almost uniform sky coverage allow one to study variability of large number of sources at these energies on time scales from seconds to years. Sources that demonstrate the most variable behaviour are active galactic nuclei (AGN), primarily of the blazar type [@Abdo2010a]. It is well known that these sources exhibit variability on different time scales and at different wavelengths [@Carini1991; @Ulrich1997; @Welsh2011; @Rani2009; @Bonning2009; @Soldi2008; @Ghisellini2008; @Raiteri2005; @Ciprini2003; @Urry1993]. Studies of time variability of these sources are very important for better understanding of AGN engines; they are also essential for assessing the quality of spectral energy distributions obtained from multiwavelength observations made at different epochs.
In this paper we perform a full sky blind search for variable sources. We bin the sky into equal area pixels and search for deviations of photon number counts from the uniformity in time.
Data and method {#sec:data_method}
===============
The LAT Pass 7 weekly all-sky data publicly available at Fermi mission website[^3] were used in this work. The analysis covers the time period of 168 weeks from August 04, 2008 to October 18, 2011, corresponding to mission elapsed time (MET) from 239557417 s to 340622181 s. We use the ’Pass 7 Source’ event class photons with $E>1$ GeV and impose an Earth relative zenith angle cut of $100^\circ$ and rocking angle cut of $52^\circ$.
We bin the data week by week using <span style="font-variant:small-caps;">HEALPIX</span> package [@Healpix] into a map of resolution $N_{\mathrm{side}} = 32$ in galactic coordinates with ’RING’ pixel ordering. Total number of pixels is equal to 12288 and the area of each pixel is 3.6 sq. deg, chosen according to the size of Fermi-LAT point-spread function (PSF) above 1 GeV which is approximately $1^{\circ}$. We estimate integral weekly exposure for each pixel using the standard Fermi-LAT tools [ *gtltcube*]{} and [*gtexpcube*]{} (ScienceTools-v9r23p1-fssc-20110726).
For each pixel we count the number of photons in each of 168 weeks and consider corresponding values of weekly exposure. Typically there are 2–10 photons in a pixel per week except bins with the brightest sources. Cumulative distribution functions (CDFs) $\mathcal{P}(t),\mathcal{E}(t)$ for both photon counts and exposure are constructed. In the absence of variability, the photon counts would represent a random process with CDF proportional to $\mathcal{E}(t)$ and thus $\mathcal{P}(t)$ would follow $\mathcal{E}(t)$ with deviations caused by a finite number of observed photons. Otherwise $\mathcal{P}(t)$ would not be statistically compatible with $\mathcal{E}(t)$. A Kolmogorov-Smirnov (KS) test is a natural and straightforward way to examine statistical compatibility of the observed photon counts with the distribution given by CDF $\mathcal{E}(t)$. The probability that both sets represent the same distribution could be estimated from the maximal value of distance between the functions $\mathcal{P}(t)$ and $\mathcal{E}(t)$. An example CDFs for one of the pixels is shown in Figure \[fig:cdf\] and the corresponding flux is shown in Figure \[fig:flux\].
Implemented KS test is most sensitive to the variability at long scales (longer than a week), while transient bursts and flares at shorter time scales may be missed if they are not overwhelmingly strong. On the other hand, our method is sensitive to gradual moderate changes in photon fluxes without any prominent bursts, which could be missed by burst searching techniques.
![Plot of the cumulative functions $\mathcal{E}(t)$ and $\mathcal{P}(t)$ for pixel no.54 ($l=261^{\circ}, ~b=82.^{\circ}69$). The difference could be easily seen and probability that the photon rate is constant is only $P=4\times10^{-80}$. []{data-label="fig:cdf"}](cdf_54.eps){width="6.5"}
![Flux of photons with energies larger than 1 GeV for pixel no.54 (4C+21.35, see Figure \[fig:cdf\]). The flux is in $\mathrm{photons~cm^{-2}~s^{-1}}$ units. []{data-label="fig:flux"}](flux_54.eps){width="6.5"}
KS probability is calculated for each pixel – we are interested in pixels with probabilities smaller than the threshold value $P_0=4\times10^{-6}$. This threshold value is set to allow for penalty coming from the large number ($N_{\mathrm{pix}}=12288$) of trials: the detection criterion is chosen in such a way that the entire search would give a single false detection with the probability of $P_0\times N_{\mathrm{pix}}~\sim~0.05$. A map of the probabilities is presented in Figure \[fig:map\].
Results {#sec:results}
=======
The total number of bins with probabilities smaller than the threshold value $P_0$ is 151. The source identification for each of these bins is performed as follows. We consider the photons that arrived during several weeks at the epoch of the maximal flux. The center of mass of the spatial distribution of these photons is used as an initial estimate of the source location. We search for sources from 2FGL [@2FGL] catalog in the circle with a radius equal to the error of center of mass estimation which is usually about 10’-15’ for $\sim
20$ photons). For 34 pixels no source is found with the initial estimate: in 31 of them the variability time pattern and photon spatial distribution leads us to identification of the source located in the neighbouring bin and already identified there. In three cases (pixels 2877 and 2749, PMN J1532-1315, and pixel 2299, SBS 0846+513) we have found no counterpart in 2FGL catalog and use Simbad astronomical database. Gamma-ray flares from the latter two sources (PMN J1532-1315 and SBS 0846+513) have been recently reported by Fermi-LAT [@AT3579; @AT3452], but the activity period is outside of the time region of 2FGL catalog. In order to avoid false identifications we performed an additional check in four cases when two different sources are residing in adjacent pixels: significant difference in the observed luminosity curves confirms that these detections are real. The results are presented in Table \[table:high\].
The total number of identified sources is 117; variability of 55 of them was reported in [@Abdo2010a; @Tanaka2011; @Schinzel2011], 35 additional detections were made in numerous Astronomers’s telegrams (ATels, see Appendix) and on the Fermi-LAT blog [^4]. That leaves us with 27 sources for which the variability has not been previously detected (see Table \[table:undetected\] and Figures \[fig:flux1\]–\[fig:flux5\]). We have explicitly checked that flux from these sources is not contaminated with the contribution from the Sun.
For convenience we assign a variability type to the source: a gradual change in the photon flux is referred to as ’rate’, if the whole variability is dominated by one or several flares we call it ’flare’ and if these flares are observed by more or less prolonged time span (typically, more than 20 weeks) we designate it as ’activity’. This morphological distinction is not totally unambiguous: several bright consequent flares could be defined as ’activity’. On the other hand, gradual changes could take place on a time scales of several tens of weeks, thus fitting the ’activity’ type as well.
The BL Lacs and the flat-spectrum radio quasars (FSRQs) are represented almost equally in the set of previously unidentified sources: there are 11 BL Lacs, 14 FSRQs, and one AGN of uncertain type (PKS 0644-671). Also there is one pulsar (Geminga) in the list (see Table \[table:undetected\] and Figures \[fig:flux1\]–\[fig:flux5\]). Both BL Lacs and FSRQs demonstrate two types of variability: gradual change of photon flux (10 out of 25) and flares or increased activity (15 out of 25). Variability of several sources was observed before in other energy ranges: a flare in the near infrared region was observed for B2 1732+38A (ATel \#3504 [@AT3504], 1 July 2011), VHE flares of 1ES0806+524 were observed by MAGIC (ATel \#3192 [@AT3192], 24 February 2011), and EGRET observed a very bright flare of PKS 2255-282 in December 1997 [@Macomb1999]. Pulsed $\gamma$-rays from the Geminga pulsar were observed with 1 year of Fermi-LAT data [@Abdo2010b], while the source were considered non-variable. In this paper the long term flux change of Geminga pulsar is detected with KS probability of $2.3\times
10^{-7}$. In present study Geminga is the only pulsar demonstrating variability above our threshold. For comparison the KS probabilities for bins containing Vela, PSR J1709-4429, and Crab pulsars are 25%, 78% and 1.2% respectively. In Crab case it was shown that the observed variability is caused by processes in the Crab nebula rather than the pulsar itself [@Buehler2011]. Fermi-LAT collaboration also presented results of observations of three other gamma-ray pulsars (J1836+5925, PSR J2021+4026, and PSR J0007+7303) where no flux variability was observed [@Abdo2010c; @SP2010; @Abdo2012]. That makes the case of Geminga even more intriguing.
We note that while 2FGL catalog contains 577 unidentified sources (out of 1873), 153 of which have flux higher than $2\times 10^{-9}~
\mathrm{photons~cm^{-2}~s^{-1}}$, none of them show variability above our threshold.
It is also worth noting that sources not included in the Table \[table:undetected\] because of being reported either in ATels or on the Fermi blog could have the variability patterns that differ considerably from the reported one. As an example, the flare from the source MG2 J130304+2434 that took place on 3 July 2009 (week no. 56) was reported in ATel \#2110 [@AT2110]. On the other hand, Figure \[fig:flux\_23\] shows that the flare occured during the high state of the source, with its flux slowly increasing from the start of the Fermi observations till approximately the 80-th week when it began to decrease.
![Variability of MG2 J130304+2434. Change of rate could be easily seen.[]{data-label="fig:flux_23"}](flux_23.eps){width="6.5"}
Conclusions {#sec:conclusions}
===========
A method for variable sources detection is proposed that uses the KS statistical test. The method is implemented for a full sky blind search for regions with variable flux at energies above 1 GeV using Fermi-LAT 168 weeks data. The search leads to identification of 117 variable sources, the variability of 27 of which has not been reported before. Among the sources with previously unidentified variability there are 25 AGNs belonging to blazar class (11 BL Lacs and 14 FSRQs), one AGN of uncertain type (PKS 0644-671), and one pulsar PSR J0633+1746 (Geminga). The observed long term flux variability of Geminga pulsar has a statistical significance of 5.1$\sigma$.
Appendix {#appendix .unnumbered}
========
The following ATels are cited in the text: ATel \#1933 [@AT1933], ATel \#2048 [@AT2048], ATel \#2049 [@AT2049], ATel \#2104 [@AT2104], ATel \#2110 [@AT2110], ATel \#2136 [@AT2136], ATel \#2243 [@AT2243], ATel \#2316 [@AT2316], ATel \#2402 [@AT2402], ATel \#2413 [@AT2413], ATel \#2539 [@AT2539], ATel \#2583 [@AT2583], ATel \#2669 [@AT2669], ATel \#2783 [@AT2783], ATel \#2829 [@AT2829], ATel \#2860 [@AT2860], ATel \#2907 [@AT2907], ATel \#2943 [@AT2943], ATel \#3002 [@AT3002], ATel \#3026 [@AT3026], ATel \#3171 [@AT3171], ATel \#3192 [@AT3192], ATel \#3207 [@AT3207], ATel \#3452 [@AT3452], ATel \#3445 [@AT3445], ATel \#3504 [@AT3504], ATel \#3579 [@AT3579], ATel \#3670 [@AT3670], ATel \#3793 [@AT3793].
We are indebted to P. Tinyakov for numerous helpful discussions at all stages of this work. We thank M. Gustafsson, B. Stern, I. Tkachev and S. Troitsky for useful comments and suggestions. The work was supported in part by the RFBR grants 10-02-01406a, 11-02-01528a, 12-02-91323-SIGa (GR), by the grants of the President of the Russian Federation NS-5525.2010.2 (GR), MK-1632.2011.2 (GR), MK-1582.2010.2 (MP). The work of M.P is supported in part by the IISN project No. 4.4509.10 and the Belgian Science Policy (IAP VI-11). GR is grateful for the hospitality of ULB Service de Physique Theorique where this study was initiated. The analysis is based on data and software provided by the Fermi Science Support Center (FSSC). The numerical part of the work is performed at the cluster of the Theoretical Division of INR RAS. This research has made use of NASA’s Astrophysics Data System and SIMBAD database, operated at CDS, Strasbourg, France.
[51]{} natexlab\#1[\#1]{}
, A. A., [Ackermann]{}, M., [Ajello]{}, M., [et al.]{} 2010, , 722, 520
, A. A., [Ackermann]{}, M., [Ajello]{}, M., [et al.]{} 2010, , 712, 1209
, A. A., [Ackermann]{}, M., [Ajello]{}, M., [et al.]{} 2010, , 720, 272
, A. A., [Wood]{}, K. S., [DeCesar]{}, M. E., [et al.]{} 2012, , 744, 146
, A. 2011, The Astronomer’s Telegram, 3207, 1
, A. & [D’Ammando]{}, F. 2010, The Astronomer’s Telegram, 3026, 1
, W. B., [Abdo]{}, A. A., [Ackermann]{}, M., [et al.]{} 2009, , 697, 1071
, E. W., [Bailyn]{}, C., [Urry]{}, C. M., [et al.]{} 2009, , 697, L81
, R., [Scargle]{}, J. D., [Blandford]{}, R. D., [et al.]{} 2011, ArXiv e-prints
, S. & [Bastieri]{}, D. 2011, The Astronomer’s Telegram, 3171, 1
, A. & [D’Ammando]{}, F. 2010, The Astronomer’s Telegram, 2907, 1
, M. T., [Miller]{}, H. R., [Noble]{}, J. C., & [Sadun]{}, A. C. 1991, , 101, 1196
, L., [Carraminana]{}, A., [Escobedo]{}, G., [et al.]{} 2011, The Astronomer’s Telegram, 3504, 1
, S. 2009, The Astronomer’s Telegram, 2049, 1
, S. 2009, The Astronomer’s Telegram, 2136, 1
, S. 2009, The Astronomer’s Telegram, 2048, 1
, S. 2010, The Astronomer’s Telegram, 2943, 1
, S., [Tosti]{}, G., [Raiteri]{}, C. M., [et al.]{} 2003, , 400, 487
, S. & [Reyes]{}, L. C. 2009, The Astronomer’s Telegram, 1933, 1
, S. 2010, The Astronomer’s Telegram, 2669, 1
, F. 2010, The Astronomer’s Telegram, 2860, 1
, F. 2010, The Astronomer’s Telegram, 2783, 1
, F. & [Vandenbroucke]{}, J. 2010, The Astronomer’s Telegram, 3002, 1
, D. 2010, The Astronomer’s Telegram, 2583, 1
, D. & [Perkins]{}, J. S. 2011, The Astronomer’s Telegram, 3452, 1
, D. 2011, The Astronomer’s Telegram, 3445, 1
, D. & [Cutini]{}, S. 2011, The Astronomer’s Telegram, 3579, 1
, G. & [Tavecchio]{}, F. 2008, , 386, L28
, K. M., [Hivon]{}, E., [Banday]{}, A. J., [et al.]{} 2005, , 622, 759
, E. & [Escande]{}, L. 2009, The Astronomer’s Telegram, 2316, 1
, E. & [Marelli]{}, M. 2009, The Astronomer’s Telegram, 2110, 1
, A. B. & [Vandenbroucke]{}, J. 2010, The Astronomer’s Telegram, 2413, 1
, F., [Iafrate]{}, G., [Hays]{}, E., & [Marelli]{}, M. 2009, The Astronomer’s Telegram, 2104, 1
, D. J., [Gehrels]{}, N., & [Shrader]{}, C. R. 1999, , 513, 652
, M. 2011, The Astronomer’s Telegram, 3192, 1
, R., [Dutka]{}, M., & [Torresi]{}, E. 2011, The Astronomer’s Telegram, 3793, 1
, C. M., [Villata]{}, M., [Ibrahimov]{}, M. A., [et al.]{} 2005, , 438, 39
, B., [Wiita]{}, P. J., & [Gupta]{}, A. C. 2009, , 696, 2170
, P., [Becker]{}, W., [Carrami[ñ]{}ana]{}, A., [et al.]{} 2010, in Bulletin of the American Astronomical Society, Vol. 42, AAS/High Energy Astrophysics Division \#11, 679
, F. K. 2010, The Astronomer’s Telegram, 2829, 1
, F. K. & [Ciprini]{}, S. 2011, The Astronomer’s Telegram, 3670, 1
, F. K., [Sokolovsky]{}, K. V., [D’Ammando]{}, F., [et al.]{} 2011, , 532, A150
, K. V., [Schinzel]{}, F. K., & [Wallace]{}, E. 2010, The Astronomer’s Telegram, 2402, 1
, S., [T[ü]{}rler]{}, M., [Paltani]{}, S., [et al.]{} 2008, , 486, 411
, Y. T., [Stawarz]{}, [Ł]{}., [Thompson]{}, D. J., [et al.]{} 2011, , 733, 19
, Y. T., [Takahashi]{}, H., & [Healey]{}, S. E. 2009, The Astronomer’s Telegram, 2243, 1
. 2011, ArXiv e-prints
, M.-H., [Maraschi]{}, L., & [Urry]{}, C. M. 1997, , 35, 445
, C. M., [Maraschi]{}, L., [Edelson]{}, R., [et al.]{} 1993, , 411, 614
, E. 2010, The Astronomer’s Telegram, 2539, 1
, B. Y., [Wheatley]{}, J. M., & [Neil]{}, J. D. 2011, , 527, A15
=
[|c|c|c|c|c|c|c|c|c|c|]{} no&Pixel no. & $l^{\circ}$ & $b^{\circ}$ &$N_{\mathrm{phot}}$ &$\Phi_{-8} $& $P$ & source& 2FGL &ref 1&23 & 345.0 & 85.6 & 264& 0.29 &$2.8\times10^{-13}$ & MG2 J130304+2434 & J1303.1+2435 & AT2110\
2&44 & 81.0 & 82.7 & 454& 0.48 &$6.5\times10^{-14}$ & OP 313 &J1310.6+3222 &P\
3& 51& 207.0& 82.7& 467& 0.50& $1.4\times10^{-6}$& W Comae & J1221.4+2814 &P\
4&54 & 261.0 & 82.7 & 1700& 1.86 &$4.3\times10^{-80}$ & 4C+21.35&J1224.9+2122&P2\
5& 66& 97.5& 81.2& 194& 0.20& $3.9\times10^{-6}$& 5C 12.291 & J1308.5+3547&\
6&76 & 247.5 & 81.2 & 935& 1.02 &$2.4\times10^{-159}$ & 4C+21.35&J1224.9+2122 &P2\
7&77 & 262.5 & 81.2 & 475& 0.52 &$1.3\times10^{-27}$ & 4C+21.35&J1224.9+2122 &P2\
8& 103& 250.7& 79.7& 216& 0.23& $1.4\times10^{-6}$& 4C +21.35& J1224.9+2122&P2\
9&129 & 196.9 & 78.3 & 783& 0.84 &$7.7\times10^{-40}$ & Ton 599 &J1159.5+2914 &P\
10&335 & 162.7 & 70.9 & 468& 0.48 &$1.9\times10^{-16}$ & S4 1144+40 &J1146.9+4000 &B165\
&&&&&&&&&\
11& 373& 61.1& 69.4& 188& 0.20& $1.8\times10^{-9}$& J1424+3615& J1424+3615 &\
12& 378& 93.2& 69.4& 332& 0.33& $4.2\times10^{-10}$& B3 1343+451 & J1345.4+4453&AT3793\
13&381 & 112.5 & 69.4 & 433& 0.43 &$1.9\times10^{-11}$ & GB 1310+487 &J1312.8+4828 &AT2316\
14&438 & 111.0 & 67.9 & 343& 0.33 &$2.1\times10^{-22}$ & GB 1310+487 &J1312.8+4828 &AT2316\
15& 532& 295.3& 66.4& 461& 0.54& $7.3\times10^{-9}$& MG1 J123931+0443& J1239.5+0443&AT3445\
16& 564& 108.5& 64.9& 201& 0.19& $1.4\times10^{-7}$& CLASS J1333+5057& J1333.5+5058&\
17&571 & 145.6 & 64.9 & 370& 0.36 &$7.5\times10^{-61}$ & OM 484&J1153.2+4935&B153\
18&598 & 288.5 & 64.9 & 855& 1.00 &$3.3\times10^{-56}$ & 3C 273 &J1229.1+0202 &P\
19& 670& 292.5& 63.4& 301& 0.35& $2.1\times10^{-6}$& 3C 273& J1229.1+0202&P\
20&998 & 304.8 & 57.4 & 1925& 2.26 &$5.1\times10^{-57}$ & 3C 279 &J1256.1-0547&P\
&&&&&&&&&\
21&1014 & 9.8 & 55.9 & 967& 1.10 &$6.3\times10^{-123}$ & PKS 1502+106 &J1504.3+1029&P\
22&1106 & 9.4 & 54.3 & 598& 0.68 &$2.0\times10^{-62}$ & PKS 1502+106 &J1504.3+1029&P\
23&1107 & 13.1 & 54.3 & 1414& 1.60 &$4.1\times10^{-212}$ & PKS 1502+106&J1504.3+1029&P\
24& 1159& 208.1& 54.3& 443& 0.48& $3.4\times10^{-11}$& MG2 J101241+2439& J1012.6+2440&P\
25&1203 & 12.6 & 52.8 & 358& 0.41 &$4.1\times10^{-24}$ & PKS 1502+106&J1504.3+1029 &P\
26&1448 & 148.3 & 49.7 & 744& 0.64 &$3.5\times10^{-60}$ & S4 1030+61 &J1033.9+6050 &P\
27& 1483& 265.0& 49.7& 321& 0.38& $2.0\times10^{-10}$& PKS 1118-05 & J1121.5-0554&B71\
28& 1499& 318.3& 49.7& 310& 0.36& $8.1\times10^{-7}$& PMN J1332-1256 & J1332.5-1255&\
29&1585& 236.2& 48.1& 267& 0.31& $3.0\times10^{-12}$ & PMN J1016+0512 & J1016.0+0513&P\
30& 1631& 23.3& 46.6& 374& 0.42& $7.6\times10^{-10}$& PKS 1551+130 & J1553.5+1255 &P\
&&&&&&&&&\
31& 1654& 94.7& 46.6& 465& 0.40& $1.4\times10^{-9}$& GB6 J1542+6129& J1542.9+6129&P\
32&1700& 237.4& 46.6& 283& 0.33& $3.3\times10^{-12}$ & PMN J1016+0512 & J1016.0+0513&P\
33&1798 & 175.5 & 45.0 & 729& 0.73 &$1.2\times10^{-44}$ & S4 0917+44&J0920.9+4441&P\
34&1970 & 320.8 & 43.4 & 538& 0.62 &$8.3\times10^{-15}$ & PMN J1344-1723&J1344.2-1723&\
35&2005 & 60.5 & 41.8 & 1193& 1.23 &$2.7\times10^{-22}$ & 4C+38.41 &J1635.2+3810&P\
36& 2006& 63.3& 41.8& 808& 0.82& $1.7\times10^{-6}$& NRAO 512 & J1640.7+3945&P3\
37&2237 & 351.6 & 40.2 & 2977& 3.47 &$1.5\times10^{-61}$ & PKS 1510-08 &J1512.8-0906&P\
38&2299& 167.3& 38.7& 276& 0.26& $8.1\times10^{-13}$ &SBS 0846+513 & &AT3452\
39&2338 & 277.0 & 38.7 & 527& 0.60 &$2.4\times10^{-33}$ & PKS 1124-186&J1126.6-1856 &AT3207\
40& 2392& 67.5& 37.2& 254& 0.25& $1.1\times10^{-7}$& B3 1708+433 & J1709.7+4319&AT3026\
&&&&&&&&&\
41& 2475& 300.9& 37.2& 940& 1.06& $1.4\times10^{-11}$& PKS 1244-255& J1246.7-2546&P\
42&2520 & 68.9 & 35.7 & 498& 0.50 &$1.9\times10^{-26}$ & B3 1708+433&J1709.7+4319 &AT3026\
43& 2569& 206.7& 35.7& 551& 0.60& $8.9\times10^{-12}$&OJ 287 & J0854.8+2005&P\
44& 2683& 165.9& 34.2& 258& 0.24& $4.7\times10^{-7}$& 1ES 0806+524& J0809.8+5218&VHE AT3192\
45&2749 & 351.6 & 34.2 & 628& 0.73 &$1.4\times10^{-77}$ & PMN J1532-1319 & &AT3579\
46& 2810& 164.5& 32.8& 254& 0.24& $1.9\times10^{-7}$& 1ES 0806+524& J0809.8+5218&VHE AT3192\
47&2811 & 167.3 & 32.8 & 537& 0.51 &$9.6\times10^{-16}$ & 1ES 0806+524 &J0809.8+5218 &VHE AT3192\
48& 2815& 178.6& 32.8& 735& 0.74&$1.2\times10^{-6}$& S4 0814+42& J0818.2+4223&P\
49& 2844& 260.2& 32.8& 290& 0.33& $1.3\times10^{-7}$& 1RXS J102658.5-174905& J1026.7-1749&\
50&2877 & 353.0 & 32.8 & 431& 0.50 &$3.9\times10^{-15}$ & PMN J1532-1319 & &AT3579\
&&&&&&&&&\
51&2903 & 64.7 &31.4& 404& 0.41& $2.1\times10^{-16}$ & B2 1732+38A&J1734.3+3858&IR AT3504\
52&2916 & 101.2& 31.4& 466& 0.38& $9.2\times10^{-21}$ & S4 1749+70&J1748.8+7006&AT3171\
53& 3043& 99.8& 30.0& 830& 0.67& $4.0\times10^{-8}$&S4 1749+70 & J1748.8+7006&AT3171\
54&3150 & 39.4 & 28.6 & 371& 0.40 &$1.9\times10^{-21}$ & PKS 1717+177 &J1719.3+1744 &P\
55& 3187& 143.4& 28.6& 1845& 1.49& $4.0\times10^{-10}$& S5 0716+71 & J0721.9+7120&P\
56&3194 & 163.1 & 28.6 & 756& 0.69 &$1.7\times10^{-50}$ & GB6 J0742+5444 &J0742.6+5442&AT3445\
57& 3246& 309.4& 28.6& 451& 0.50& $2.7\times10^{-10}$& PKS 1313-333& J1315.9-3339&B122\
58& 3489& 272.8& 25.9& 247& 0.28& $1.3\times10^{-7}$& PKS B1043-291&J1045.5-2931&\
59&3540& 57.7& 24.6& 557& 0.58& $1.1\times10^{-16}$ & RX J1754.1+3212&J1754.3+3212&\
60&3554 & 97.0 & 24.6 & 896& 0.73 &$1.1\times10^{-50}$ & S4 1849+67 & J1849.4+6706&P\
&&&&&&&&&\
61& 3598& 220.8& 24.6& 439& 0.50& $1.4\times10^{-7}$& PKS 0829+046 & J0831.9+0429&\
62& 3963& 165.9& 20.7& 462& 0.44& $5.9\times10^{-9}$& GB6 J0654+5042 & J0654.5+5043&P\
63&4000& 270.0& 20.7& 325& 0.36& $1.7\times10^{-15}$ & PKS 1021-323 & J1023.8-3248&\
64&4021 & 321.1 & 20.7 & 813& 0.90 &$1.8\times10^{-44}$ & PKS 1454-354 & J1457.4-3540&P\
65& 4092& 170.2& 19.5& 457& 0.45& $5.9\times10^{-10}$& B3 0650+453 &J0654.2+4514 &P\
66& 4097& 184.2& 19.5& 613& 0.64& $9.7\times10^{-8}$& B2 0716+33 & J0719.3+3306 &P\
67& 4110& 220.8& 19.5& 324& 0.37& $2.0\times10^{-8}$& OJ 014& J0811.4+0149 &\
68& 4116& 237.7& 19.5& 412& 0.48& $5.7\times10^{-8}$& BZQ J0850-1213& J0850.2-1212&B102,114\
69& 4149& 330.5& 19.5& 463& 0.51& $2.6\times10^{-7}$& PKS 1454-354& J1457.4-3540&P\
70&4402 & 322.0 & 17.0 & 1495& 1.63 &$7.8\times10^{-36}$ & PKS B1424-418 & J1428.0-4206&AT2104,2583\
&&&&&&&&&\
71&4541& 351.6& 15.7& 1505& 1.69& $1.5\times10^{-19}$ & PKS 1622-253 & J1625.7-2526&P\
72& 4614& 198.3& 14.5& 338& 0.37& $1.2\times10^{-6}$&MG2 J071354+1934 & J0714.0+1933&P\
73&4616& 203.9& 14.5& 799& 0.88& $4.0\times10^{-19}$& 4C+14.23&J0725.3+1426 &AT2243\
74& 4625& 229.2& 14.5& 402& 0.46& $1.1\times10^{-6}$&PKS 0805-07 & J0808.2-0750&AT2048,2136\
75&4742& 196.9& 13.2& 413& 0.44& $5.7\times10^{-17}$& MG2 J071354+1934&J0714.0+1933&P\
76& 4744& 202.5& 13.2& 353& 0.38& $1.9\times10^{-6}$&4C+14.23 &J0725.3+1426 &AT2243\
77&4753& 227.8& 13.2& 707& 0.82& $5.5\times10^{-16}$& PKS 0805-07&J0808.2-0750&AT2048,2136\
78&4881& 229.2& 12.0& 556& 0.64& $3.4\times10^{-14}$& PKS 0805-07&J0808.2-0750&AT2048,2136\
79&4932& 11.2& 10.8& 1337& 1.54& $2.7\times10^{-16}$& PKS 1730-13&J1733.1-1307&AT3002\
80& 5119& 178.6& 9.6& 619& 0.64& $9.9\times10^{-8}$& B2 0619+33 &J0622.9+3326&AT2829\
&&&&&&&&&\
81& 5165& 308.0& 9.6& 1011& 1.06& $2.6\times10^{-7}$& PMN J1326-5256&J1326.7-5254&\
82& 5637& 195.5& 4.8& 52455& 56.6& $2.3\times10^{-7}$& PSR J0633+1746& J0633.9+1746&\
83&5248 & 180.0 & 8.4 & 1212& 1.26 &$1.1\times10^{-46}$ & B2 0619+33 & J0622.9+3326&AT2829\
84&5777& 227.8& 3.6& 2002& 2.3& $3.2\times10^{-12}$ & PKS 0727-11& J0730.2-1141 &AT2860\
85& 6596& 12.7& -4.8& 1854& 2.1& $4.6\times10^{-7}$& PKS 1830-211& J1833.6-2104 & AT2943\
86& 6608& 46.4& -4.8& 1198& 1.3& $3.6\times10^{-7}$& RX J1931.1+0937 & J1931.1+0938&\
87& 6711& 336.1& -4.8& 1717& 1.8& $2.6\times10^{-9}$&PMN J1650-5044& J1650.1-5044 &\
88&6724& 11.2& -6.0& 1945& 2.2& $2.9\times10^{-15}$ & PKS 1830-211 &J1833.6-2104 &AT2943\
89&7101 & 351.6 & -8.4 & 1553& 1.71 &$5.4\times10^{-38}$ & PMN J1802-3940& J1802.6-3940&\
90& 7155& 144.8& -9.6& 696& 0.67& $3.4\times10^{-7}$& 4C+47.08 & J0303.5+4713&\
&&&&&&&&&\
91&7265 & 92.8 & -10.8 & 1664& 1.65 &$1.9\times10^{-46}$ & BL Lac &J2202.8+4216&P\
92& 7413& 150.5& -12.0& 931& 0.93& $1.2\times10^{-8}$& NGC 1275& J0319.8+4130&P\
93& 7494& 16.9& -13.2& 868& 0.98& $1.2\times10^{-7}$& PKS B1908-201& J1911.1-2005&P\
94& 7542& 151.9& -13.2& 1202& 1.21& $6.7\times10^{-9}$&NGC 1275& J0319.8+4130&P\
95& 7569& 227.8& -13.2& 539& 0.61& $2.3\times10^{-8}$& PKS 0627-199 &J0629.3-2001&B174\
96&7662 & 130.8 & -14.5 & 868& 0.84 &$9.1\times10^{-23}$ & OC 457 & J0136.9+4751&P\
97&7750 & 16.9 & -15.7 & 801& 0.91 &$7.5\times10^{-36}$ & TXS 1920-211 & J1923.5-2105&P\
98& 7921& 139.2& -17.0& 2228& 2.2& $3.6\times10^{-10}$& 3C 66A & J0222.6+4302&P\
99& 7993& 341.7& -17.0& 512& 0.54& $3.5\times10^{-6}$& PKS 1821-525& J1825.1-5231&\
100&8030& 84.4& -18.2& 677& 0.70&$5.8\times10^{-17}$ & B2 2155+31& J2157.4+3129 &P\
&&&&&&&&&\
101&8197& 195.5& -19.5& 896& 1.01& $4.9\times10^{-20}$ & TXS 0506+056 & J0509.4+0542&\
102&8525& 36.6& -23.3& 431& 0.50& $8.0\times10^{-16}$ & PKS 2023-07 & J2025.6-0736&P\
103&8653 & 38.0 & -24.6 & 563& 0.65 &$1.3\times10^{-31}$ & PKS 2023-07 & J2025.6-0736&P\
104&8675 & 99.8 & -24.6 & 658& 0.68 &$4.8\times10^{-23}$ & B2 2308+34&J2311.0+3425&AT2783\
105&8867& 278.4& -25.9& 508& 0.50& $1.1\times10^{-13}$ & PKS 0644-671&J0644.2-6713&\
106&9074& 140.6& -28.6& 428& 0.44& $1.4\times10^{-17}$ & B2 0200+30&J0204.0+3045&B134\
107&9077 & 149.1 & -28.6 & 821& 0.86 &$1.2\times10^{-31}$ & 4C+28.07&J0237.8+2846&AT3670\
108&9094 & 196.9 & -28.6 & 466& 0.53 &$1.6\times10^{-22}$ & PKS 0440-00&J0442.7-0017&AT2049\
109&9197& 128.0& -30.0& 512& 0.53& $1.1\times10^{-17}$ & 4C 31.03&J0112.8+3208&\
110&9369 & 250.3 & -31.4 & 3416& 3.67 &$1.6\times10^{-90}$ & PKS 0537-441&J0538.8-4405&P\
&&&&&&&&&\
111& 9431& 66.1& -32.8& 395& 0.44& $1.1\times10^{-8}$& PKS 2144+092 & J2147.3+093&P\
112&9477& 195.5& -32.8& 588& 0.67& $1.9\times10^{-15}$ & PKS 0420-01&J0423.2-0120&AT2402\
113&9498 & 254.5 & -32.8 & 946& 1.01 &$7.7\times10^{-101}$ & PMN J0531-4827 &J0532.0-4826 &AT2907\
114& 9615& 222.2& -34.2& 259& 0.30& $3.6\times10^{-8}$& PKS 0454-234& J0457.0-2325 &P\
115&9616& 225.0& -34.2& 341& 0.38& $7.5\times10^{-14}$ &PKS 0454-234&J0457.0-2325 &P\
116&9743 & 223.6 & -35.7 & 1282& 1.43 &$5.8\times10^{-118}$ & PKS 0454-234&J0457.0-2325 &P\
117&9776& 316.4& -35.7& 483& 0.50& $2.4\times10^{-17}$ & PKS 2142-75 &J2147.4-7534&AT2539\
118&9822 & 84.4 & -37.2 & 782& 0.85 &$5.2\times10^{-23}$ & 3C 454.3 & J2253.9+1609&P\
119&9823 & 87.2 & -37.2 & 1832& 1.98 &$1.5\times10^{-72}$ & 3C 454.3 &J2253.9+1609&P\
120&9904& 315.0& -37.2& 530& 0.55& $1.8\times10^{-15}$ & PKS 2142-75&J2147.4-7534&AT2539\
&&&&&&&&&\
121&9947& 77.3& -38.7& 500& 0.55& $4.2\times10^{-13}$ & CTA 102 &J2232.4+1143&P\
122& 9951& 88.6& -38.7& 417& 0.45& $1.8\times10^{-6}$& 3C 454.3& J2253.9+1609&P\
123&9950 & 85.8 & -38.7 & 10048& 11.0 &$7.4\times10^{-539}$ & 3C 454.3&J2253.9+1609&P\
124&9975 & 156.1 & -38.7 & 1097& 1.19 &$7.5\times10^{-247}$ & AO 0235+164&J0238.7+1637&P\
125& 10094& 129.4& -40.2& 838& 0.89& $4.4\times10^{-8}$& S2 0109+22 & J0112.1+2245&P\
126&10104 & 157.5 & -40.2 & 522& 0.57 &$4.0\times10^{-37}$ & AO 0235+164&J0238.7+1637&P\
127&10108& 168.8& -40.2& 564& 0.62& $1.8\times10^{-12}$ & PKS 0306+102&J0309.1+1027&\
128& 10173& 351.6& -40.2& 648& 0.70& $8.4\times10^{-11}$& PKS 2052-47 &J2056.2-4715&P\
129&10368& 187.3& -43.4& 339& 0.39& $4.1\times10^{-15}$ & PKS 0336-01&J0339.4-0144&\
130&10386 & 239.5 & -43.4 & 1411& 1.54 &$1.8\times10^{-50}$ & PKS 0426-380&J0428.6-3756&P\
&&&&&&&&&\
131& 10387& 242.4& -43.4& 440& 0.48& $8.9\times10^{-7}$& PKS 0426-380 & J0428.6-3756&P\
132&10508& 241.5& -45.0& 683& 0.75&$1.3\times10^{-6}$ & PKS 0426-380&J0428.6-3756&P\
133& 10692& 91.6& -48.1& 289& 0.32& $4.8\times10^{-9}$& PKS 2325+093&J2327.5+0940&P\
134&10711 & 152.7 & -48.1 & 569& 0.63 &$6.2\times10^{-22}$ & MG1 J021114+1051&J0211.2+1050&P\
135&10775& 358.4& -48.1& 582& 0.64& $1.1\times10^{-12}$ & MH 2136-428&J2139.3-4236&P\
136& 10779& 11.7& -49.7& 263& 0.29& $1.2\times10^{-7}$& PMN J2145-3357& J2144.8-3356&\
137& 10840& 215.0& -49.7& 186& 0.21& $1.1\times10^{-7}$& PKS 0347-211 & J0350.0-2104&P\
138& 10847& 238.3& -49.7& 337& 0.37& $3.5\times10^{-6}$& PKS 0402-362 & J0403.9-3604&AT2413\
139& 10889& 19.0& -51.3& 1101& 1.24& $6.0\times10^{-8}$& PKS 2155-304 & J2158.8-3013&P\
140& 10965& 282.1& -51.3& 294& 0.29& $2.9\times10^{-7}$& PKS 0235-618 & J0237.1-6136&AT2669\
&&&&&&&&&\
141& 10992& 16.2& -52.8& 1217& 1.36& $2.2\times10^{-7}$&PKS 2155-304 & J2158.8-3013 &P\
142&11131& 163.1& -54.3& 454& 0.52& $7.3\times10^{-17}$ & PKS 0215+015&J0217.9+0143&P\
143& 11495& 213.7& -60.4& 572& 0.64& $5.2\times10^{-11}$&PKS 0301-243 & J0303.4-2407&P\
144& 11506& 263.2& -60.4& 470& 0.51& $9.1\times10^{-8}$&PKS 0244-470 & J0245.9-4652 &P\
145& 11572& 210.8& -61.9& 563& 0.63& $1.9\times10^{-9}$&PKS 0250-225& J0252.7-2218 &AT1933\
146&11586& 277.1& -61.9& 625& 0.67& $3.5\times10^{-13}$ & PKS 0208-512& J0210.7-5102&P\
147& 11597& 329.2& -61.9& 267& 0.28& $3.2\times10^{-11}$&PKS 2326-502 & J2329.2-4956&AT2783\
148&11598 & 333.9 & -61.9 & 508& 0.55 &$1.5\times10^{-27}$ & PKS 2326-502&J2329.2-4956&AT2783\
149&11670 & 332.5 & -63.5 & 805& 0.87 &$9.0\times10^{-62}$ & PKS 2326-502&J2329.2-4956&AT2783\
150& 11680& 23.8& -64.9& 387& 0.43& $2.1\times10^{-7}$& PKS 2255-282 & J2258.0-2759 &\
&&&&&&&&&\
151&11933 & 65.8 & -70.9 & 953& 1.09 &$1.4\times10^{-90}$ & PMN J2345-1555&J2345.0-1553&P\
no Pixel no. $l^{\circ}$ $b^{\circ}$ $N_{\mathrm{phot}}$ $\Phi_{-8} $ $P$ source source type variability weeks
---- ----------- ------------- ------------- --------------------- --------------- --------------------- ----------------------- ------------- ------------- ------------------
1 66 97.5 81.2 194 0.20 $3.9\times10^{-6}$ 5C 12.291 Q A 30–60
2 373 61.1 69.4 188 0.20 $1.8\times10^{-9}$ J1424+3615 B A 140–160
3 564 108.5 64.9 201 0.19 $1.4\times10^{-7}$ CLASS J1333+5057 Q R -
4 1499 318.3 49.7 310 0.36 $8.1\times10^{-7}$ PMN J1332-1256 Q R -
5 1970 320.8 43.4 538 0.62 $8.3\times10^{-15}$ PMN J1344-1723 Q R -
6 2811 167.3 32.8 537 0.51 $9.6\times10^{-16}$ 1ES 0806+524 B R -
7 2844 260.2 32.8 290 0.33 $1.3\times10^{-7}$ 1RXS J102658.5-174905 B R,F 176
8 2903 64.7 31.4 404 0.41 $2.1\times10^{-16}$ B2 1732+38A B F 40–50
9 3489 272.8 25.9 247 0.28 $1.3\times10^{-7}$ PKS B1043-291 Q A 100–120
10 3540 57.7 24.6 557 0.58 $1.1\times10^{-16}$ RX J1754.1+3212 B F 149–153
11 3598 220.8 24.6 439 0.50 $1.4\times10^{-7}$ PKS 0829+046 B F 73
12 4000 270.0 20.7 325 0.36 $1.7\times10^{-15}$ PKS 1021-323 Q R -
13 4110 220.8 19.5 324 0.37 $2.0\times10^{-8}$ OJ 014 B R -
14 5165 308.0 9.6 1011 1.06 $2.6\times10^{-7}$ PMN J1326-5256 B F 9,32
15 5637 195.5 4.8 52455 56.6 $2.3\times10^{-7}$ PSR J0633+1746 PSR R -
16 6608 46.4 -4.8 1198 1.3 $3.6\times10^{-7}$ RX J1931.1+0937 B R -
17 6711 336.1 -4.8 1717 1.8 $2.6\times10^{-9}$ PMN J1650-5044 Q R -
18 7101 351.6 -8.4 1553 1.71 $5.4\times10^{-38}$ PMN J1802-3940 Q A 60-100
19 7155 144.8 -9.6 696 0.67 $3.4\times10^{-7}$ 4C+47.08 B A 100-140
20 7993 341.7 -17.0 512 0.54 $3.5\times10^{-6}$ PKS 1821-525 Q R -
21 8197 195.5 -19.5 896 1.01 $4.9\times10^{-20}$ TXS 0506+056 B A 137-140, 169-172
22 8867 278.4 -25.9 508 0.50 $1.1\times10^{-13}$ PKS 0644-671 AGN R -
23 9197 128.0 -30.0 512 0.53 $1.1\times10^{-17}$ 4C 31.03 Q A 30-50,148
24 10108 168.8 -40.2 564 0.62 $1.8\times10^{-12}$ PKS 0306+102 Q F 141-147
25 10368 187.3 -43.4 339 0.39 $4.1\times10^{-15}$ PKS 0336-01 Q F 131
26 10779 11.7 -49.7 263 0.29 $1.2\times10^{-7}$ PMN J2145-3357 Q A 74,91,121
27 11680 23.8 -64.9 387 0.43 $2.1\times10^{-7}$ PKS 2255-282 Q A 60–80, 136
: List of sources with previously unreported variability. Additional columns describe source type: BL Lac (B), FSRQ (Q), AGN of uncertain type (AGN), or pulsar (PSR), variability type: gradual increase or decrease in photon flux rate (R), flares (F) or longer period of increased activity (A); in case of flares or activity the temporal localization of events is given in the last column. []{data-label="table:undetected"}
![Map of Fermi-LAT variability at 1 GeV in galactic coordinates. Pixel color represents base 10 logarithm of Kolmogorov-Smirnov probability of the uniformity of the observed flux. The galactic center is in the center of the figure, $l=180^{\circ}$ is on the left.[]{data-label="fig:map"}](KSprob.eps){width="17cm"}
![Luminosity curves for variable sources listed in the Table \[table:undetected\]. The flux is in $\mathrm{photons~cm^{-2}~s^{-1}}$ units. []{data-label="fig:flux1"}](flux_66.eps "fig:"){width="6.0cm"} ![Luminosity curves for variable sources listed in the Table \[table:undetected\]. The flux is in $\mathrm{photons~cm^{-2}~s^{-1}}$ units. []{data-label="fig:flux1"}](flux_373.eps "fig:"){width="6.0cm"}\
![Luminosity curves for variable sources listed in the Table \[table:undetected\]. The flux is in $\mathrm{photons~cm^{-2}~s^{-1}}$ units. []{data-label="fig:flux1"}](flux_564.eps "fig:"){width="6.0cm"} ![Luminosity curves for variable sources listed in the Table \[table:undetected\]. The flux is in $\mathrm{photons~cm^{-2}~s^{-1}}$ units. []{data-label="fig:flux1"}](flux_1499.eps "fig:"){width="6.0cm"}\
![Luminosity curves for variable sources listed in the Table \[table:undetected\]. The flux is in $\mathrm{photons~cm^{-2}~s^{-1}}$ units. []{data-label="fig:flux1"}](flux_1970.eps "fig:"){width="6.0cm"} ![Luminosity curves for variable sources listed in the Table \[table:undetected\]. The flux is in $\mathrm{photons~cm^{-2}~s^{-1}}$ units. []{data-label="fig:flux1"}](flux_2811.eps "fig:"){width="6.0cm"}
![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux2"}](flux_2844.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux2"}](flux_2903.eps "fig:"){width="6.0cm"}\
![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux2"}](flux_3489.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux2"}](flux_3540.eps "fig:"){width="6.0cm"}\
![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux2"}](flux_3598.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux2"}](flux_4000.eps "fig:"){width="6.0cm"}
![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux3"}](flux_4110.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux3"}](flux_5165.eps "fig:"){width="6.0cm"}\
![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux3"}](flux_5637.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux3"}](flux_6608.eps "fig:"){width="6.0cm"}\
![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux3"}](flux_6711.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux3"}](flux_7101.eps "fig:"){width="6.0cm"}
![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux4"}](flux_7155.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux4"}](flux_7993.eps "fig:"){width="6.0cm"}\
![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux4"}](flux_8197.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux4"}](flux_8867.eps "fig:"){width="6.0cm"}\
![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux4"}](flux_9197.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\].[]{data-label="fig:flux4"}](flux_10108.eps "fig:"){width="6.0cm"}
![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux5"}](flux_10368.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux5"}](flux_10779.eps "fig:"){width="6.0cm"}\
![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux5"}](flux_11680.eps "fig:"){width="6.0cm"} ![The same as in Figure \[fig:flux1\]. []{data-label="fig:flux5"}](empty.eps "fig:"){width="6.0cm"}
[^1]: pshirkov@ulb.ac.be
[^2]: grisha@ms2.inr.ac.ru
[^3]: http://fermi.gsfc.nasa.gov/ssc/data/access/
[^4]: http://fermisky.blogspot.com/
|
Q:
How to add an image to an svg container using D3.js
I've created a sample Asp.Net MVC 4 application where I've used D3.js to append an SVG element and then inside the SVG I've appended a text element (see code below). This all works fine until I try to append an img to the SVG using a local png file. The img gets appended to the DOM, but the img is not rendered on the page. Any ideas what I'm doing wrong here, and how to go about fixing it?
@{
ViewBag.Title = "Home Page";
}
<script src="~/Scripts/d3.v3.js"></script>
<script type="text/javascript">
var svg = d3.select("body")
.append("svg")
.attr("width", 200)
.attr("height", 100)
.style("border", "1px solid black");
var text = svg.selectAll("text")
.data([0])
.enter()
.append("text")
.text("Testing")
.attr("x", "40")
.attr("y", "60");
var imgs = svg.selectAll("img").data([0]);
imgs.enter()
.append("img")
.attr("xlink:href", "@Url.Content("~/Content/images/icons/refresh.png")")
.attr("x", "60")
.attr("y", "60")
.attr("width", "20")
.attr("height", "20");
</script>
@Richard Marr - Below is an attempt to do the same thing in straight HTML, which gives me the same result. I'm not sure about my code to get the refresh.png file from the local drive this way.
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<script src="http://d3js.org/d3.v2.js"></script>
</head>
<body>
<script type="text/javascript">
var svg = d3.select("body")
.append("svg")
.attr("width", 200)
.attr("height", 100)
.style("border", "1px solid black");
var text = svg.selectAll("text")
.data([0])
.enter()
.append("text")
.text("Testing")
.attr("x", "40")
.attr("y", "60");
var imgs = svg.selectAll("img").data([0]);
imgs.enter()
.append("svg:img")
.attr("xlink:href", "file:///D:/d3js_projects/refresh.png")
.attr("x", "60")
.attr("y", "60")
.attr("width", "20")
.attr("height", "20");
</script>
</body>
</html>
A:
nodeEnter.append("svg:image")
.attr('x', -9)
.attr('y', -12)
.attr('width', 20)
.attr('height', 24)
.attr("xlink:href", "resources/images/check.png")
A:
In SVG (contrasted with HTML), you will want to use <image> instead of <img> for elements.
Try changing your last block with:
var imgs = svg.selectAll("image").data([0]);
imgs.enter()
.append("svg:image")
...
A:
My team also wanted to add images inside d3-drawn circles, and came up with the following (fiddle):
index.html:
<!doctype html>
<html>
<head>
<link rel="stylesheet" type="text/css" href="timeline.css">
<script src="https://cdnjs.cloudflare.com/ajax/libs/d3/3.5.17/d3.js"></script>
<script src="https://code.jquery.com/jquery-2.2.4.js"
integrity="sha256-iT6Q9iMJYuQiMWNd9lDyBUStIq/8PuOW33aOqmvFpqI="
crossorigin="anonymous"></script>
<script src="./timeline.js"></script>
</head>
<body>
<div class="timeline"></div>
</body>
</html>
timeline.css:
.axis path,
.axis line,
.tick line,
.line {
fill: none;
stroke: #000000;
stroke-width: 1px;
}
timeline.js:
// container target
var elem = ".timeline";
var props = {
width: 1000,
height: 600,
class: "timeline-point",
// margins
marginTop: 100,
marginRight: 40,
marginBottom: 100,
marginLeft: 60,
// data inputs
data: [
{
x: 10,
y: 20,
key: "a",
image: "https://unsplash.it/300/300",
id: "a"
},
{
x: 20,
y: 10,
key: "a",
image: "https://unsplash.it/300/300",
id: "b"
},
{
x: 60,
y: 30,
key: "a",
image: "https://unsplash.it/300/300",
id: "c"
},
{
x: 40,
y: 30,
key: "a",
image: "https://unsplash.it/300/300",
id: "d"
},
{
x: 50,
y: 70,
key: "a",
image: "https://unsplash.it/300/300",
id: "e"
},
{
x: 30,
y: 50,
key: "a",
image: "https://unsplash.it/300/300",
id: "f"
},
{
x: 50,
y: 60,
key: "a",
image: "https://unsplash.it/300/300",
id: "g"
}
],
// y label
yLabel: "Y label",
yLabelLength: 50,
// axis ticks
xTicks: 10,
yTicks: 10
}
// component start
var Timeline = {};
/***
*
* Create the svg canvas on which the chart will be rendered
*
***/
Timeline.create = function(elem, props) {
// build the chart foundation
var svg = d3.select(elem).append('svg')
.attr('width', props.width)
.attr('height', props.height);
var g = svg.append('g')
.attr('class', 'point-container')
.attr("transform",
"translate(" + props.marginLeft + "," + props.marginTop + ")");
var g = svg.append('g')
.attr('class', 'line-container')
.attr("transform",
"translate(" + props.marginLeft + "," + props.marginTop + ")");
var xAxis = g.append('g')
.attr("class", "x axis")
.attr("transform", "translate(0," + (props.height - props.marginTop - props.marginBottom) + ")");
var yAxis = g.append('g')
.attr("class", "y axis");
svg.append("text")
.attr("class", "y label")
.attr("text-anchor", "end")
.attr("y", 1)
.attr("x", 0 - ((props.height - props.yLabelLength)/2) )
.attr("dy", ".75em")
.attr("transform", "rotate(-90)")
.text(props.yLabel);
// add placeholders for the axes
this.update(elem, props);
};
/***
*
* Update the svg scales and lines given new data
*
***/
Timeline.update = function(elem, props) {
var self = this;
var domain = self.getDomain(props);
var scales = self.scales(elem, props, domain);
self.drawPoints(elem, props, scales);
};
/***
*
* Use the range of values in the x,y attributes
* of the incoming data to identify the plot domain
*
***/
Timeline.getDomain = function(props) {
var domain = {};
domain.x = props.xDomain || d3.extent(props.data, function(d) { return d.x; });
domain.y = props.yDomain || d3.extent(props.data, function(d) { return d.y; });
return domain;
};
/***
*
* Compute the chart scales
*
***/
Timeline.scales = function(elem, props, domain) {
if (!domain) {
return null;
}
var width = props.width - props.marginRight - props.marginLeft;
var height = props.height - props.marginTop - props.marginBottom;
var x = d3.scale.linear()
.range([0, width])
.domain(domain.x);
var y = d3.scale.linear()
.range([height, 0])
.domain(domain.y);
return {x: x, y: y};
};
/***
*
* Create the chart axes
*
***/
Timeline.axes = function(props, scales) {
var xAxis = d3.svg.axis()
.scale(scales.x)
.orient("bottom")
.ticks(props.xTicks)
.tickFormat(d3.format("d"));
var yAxis = d3.svg.axis()
.scale(scales.y)
.orient("left")
.ticks(props.yTicks);
return {
xAxis: xAxis,
yAxis: yAxis
}
};
/***
*
* Use the general update pattern to draw the points
*
***/
Timeline.drawPoints = function(elem, props, scales, prevScales, dispatcher) {
var g = d3.select(elem).selectAll('.point-container');
var color = d3.scale.category10();
// add images
var image = g.selectAll('.image')
.data(props.data)
image.enter()
.append("pattern")
.attr("id", function(d) {return d.id})
.attr("class", "svg-image")
.attr("x", "0")
.attr("y", "0")
.attr("height", "70px")
.attr("width", "70px")
.append("image")
.attr("x", "0")
.attr("y", "0")
.attr("height", "70px")
.attr("width", "70px")
.attr("xlink:href", function(d) {return d.image})
var point = g.selectAll('.point')
.data(props.data);
// enter
point.enter()
.append("circle")
.attr("class", "point")
.on('mouseover', function(d) {
d3.select(elem).selectAll(".point").classed("active", false);
d3.select(this).classed("active", true);
if (props.onMouseover) {
props.onMouseover(d)
};
})
.on('mouseout', function(d) {
if (props.onMouseout) {
props.onMouseout(d)
};
})
// enter and update
point.transition()
.duration(1000)
.attr("cx", function(d) {
return scales.x(d.x);
})
.attr("cy", function(d) {
return scales.y(d.y);
})
.attr("r", 30)
.style("stroke", function(d) {
if (props.pointStroke) {
return d.color = props.pointStroke;
} else {
return d.color = color(d.key);
}
})
.style("fill", function(d) {
if (d.image) {
return ("url(#" + d.id + ")");
}
if (props.pointFill) {
return d.color = props.pointFill;
} else {
return d.color = color(d.key);
}
});
// exit
point.exit()
.remove();
// update the axes
var axes = this.axes(props, scales);
d3.select(elem).selectAll('g.x.axis')
.transition()
.duration(1000)
.call(axes.xAxis);
d3.select(elem).selectAll('g.y.axis')
.transition()
.duration(1000)
.call(axes.yAxis);
};
$(document).ready(function() {
Timeline.create(elem, props);
})
|
It’s interesting how the attack on the Libyan embassy that resulted in the death of the US ambassador to Libya went from being an attack by a spontaneous and unorganized mob of angry Muslims pissed at a YouTube video to a terrorist attack by individuals who may have had connections to al-Qaeda or al-Qaeda affiliates. The question is, was this a deliberate attempt by the Obama administration to avoid labelling this a terrorist attack for political reasons, or was it simply the result of Western prejudices and the media jumping too quickly on the ‘Arab world is full of violent, angry Muslims ready to kill people at the drop of a hat’ bandwagon before all the fact were known? Maybe a bit of both?
Update (9/27/12, 3:45pm): According to a recent Yahoo News article, it looks as if the Obama administration may have known all along that it was most likely a terrorist attack organized and committed by extremists, many of whom were from outside of Libya. And yet many of President Obama’s top aides still “argued for days afterward that the violence was linked to an Internet video that ridicules Islam,” and many news agencies apparently followed suit. Way to perpetuate the ‘angry Muslim mob’ stereotype while knowing all along that the reality was most likely completely different and far more complicated. |
Analytical and rigorous method for analysis of an array of magnetically-biased graphene ribbons.
A sheet of graphene under magnetic bias attains anisotropic surface conductivity, opening the door for realizing compact devices such as Faraday rotators, isolators and circulators. In this paper, an accurate and analytical method is proposed for a periodic array of graphene ribbons under magnetic bias. The method is based on integral equations governing the induced surface currents on the coplanar array of graphene ribbons. For subwavelength size ribbons subjected to an incident plane wave, the current distribution is derived leading to analytical expressions for the reflection/transmission coefficients. The results obtained are in excellent agreement with full-wave simulations and predict resonant spectral effects that cannot be accounted for by existing semi-analytical methods. Finally, we extract an analytical, closed form solution for the Faraday rotation of magnetically-biased graphene ribbons. In contrast to previous studies, this paper presents a fast, precise and reliable technique for analyzing magnetically-biased array of graphene ribbons, which are one of the most popular graphene-based structures. |
The present invention relates to a new and distinct cultivar of Antirrhinum majus, and will be referred to hereafter by its cultivar name, ‘Snap Daddy Peach’. The new cultivar represents a new snapdragon, a half-hardy perennial grown as an annual in containers and garden beds.
‘Snap Daddy Peach’ arose as a naturally occurring meristematic mutation of a plant that was growing in a container derived from seed of Antirrhinum majus seed strain Liberty Classic Bronze (not patented) during bedding plant production at the Inventor's nursery in Alpharetta, Ga. ‘Snap Daddy Peach’ was selected as a single unique plant in Fall of 2011 after stable foliage variegation was obtained through multiple rounds of propagation by stem tip cuttings.
Asexual propagation of the new cultivar was first accomplished by stem cuttings in November of 2011 in Alpharetta, Ga. under the direction of the Inventor. Asexual propagation by stem cuttings has determined that the characteristics of the new cultivar are stable and are reproduced true to type in successive generations. |
Adam Coote
Adam Coote is an Australian rules football boundary umpire and sprinter. He has umpired 211 games, including 23 final matches and five grand finals (2006, 2008, 2009, 2010, 2010R) since making his debut in the 2005 season.
Coote is from Pomberneit, near Camperdown in south-western Victoria.
Coote began umpiring with the Colac and District Football Umpires Association when he was 14. Australian Football League (AFL) umpires manager Jeff Gieschen has said that Coote is one of the most powerful boundary umpires in the AFL. Coote practised throw-ins with half a brick at his house to build his strength.
Coote completed a Bachelor of Applied Science (Exercise and Sport Science) at Deakin University in 2004. Coote was named the Victorian Runners and Trainers association Athlete of the Year for the 2009/10 season. This came after he won the 800-metre title at the Stawell Gift in 2010.
For the 2011 Stawell Gift, Coote switched from middle distance to sprinting to contest the more prestigious 120-metre sprint. He made the semi finals, but came third and did not qualify for the final. In 2012 he again competed in the sprint, and despite umpiring an AFL game in Brisbane on the Thursday before, Coote won his heat and semi final before finishing third in the final. Coote again competed in the Stawell Gift in 2013, running second in his heat and earning a semi-final berth. He felt "flattened" from umpiring the Carlton vs Richmond game on the preceding Thursday. Coote was then scratched from the semi-final after tearing his hamstring in the warm up.
Coote returned to professional sprinting for the 2013/2014 season, recording a very narrow loss in the SAAL Bay Sheffield final on 28 December 2013 won by Queensland beach sprinter Ben Mispelhorn. Coote then ventured to Tasmania for the Burnie Gift on New Year's Day. He excelled in the wet and windy conditions, winning by 3 metres, the biggest winning margin in recent times, in a time of 12.78 seconds from his 9.50m handicap. When speaking to ABC reporter Ian Burrows regarding the win, Coote credited his form to his philosophy on beer. “Once I realised pints are the new pots, there was no stopping me.”
In 2019 Coote broke Rob Haala’s long standing cycle collective absenteeism record, a feat most thought impossible at the time. Despite the record, the birth of his second child and umpiring a preliminary final the highlight of Coote’s 2019 occurred in September. He was unanimously voted as head of marketing for the ‘more than a tag and release’ fishing club.
References
http://www.news.com.au/sport/breaking-news/queensland-beach-runner-ben-mispelhorn-and-was-kiara-reddingius-are-bay-sheffield-winners/story-fnect155-1226791192389
http://www.examiner.com.au/story/2001071/afl-boundary-umpire-coote-wins-burnie-gift/
Category:Australian Football League umpires
Category:Living people
Category:Year of birth missing (living people) |
Q:
Memory layout of vector of POD objects
Suppose I have a simple C++ class,
class Data {
public:
float data[3];
void clear() { data[0] = 0.0f; data[1] = 0.0f; data[2] = 0.0f }
}
And a vector of Data's,
std::vector<Data> v(10);
Is it safe to assume that &v[0].data[0] points to an array of 30 floats?
A:
From standard
23.3.6.1 Class template vector overview
The elements of a
vector are stored contiguously, meaning that if v is a vector where T is some type other
than bool, then it obeys the identity &v[n] == &v[0] + n for all 0 <= n < v.size()
so &v[0] indeed points to the beginning of 10 continuous Data objects.
but for the layout of Data we have
9.2.13 Class members
Nonstatic data members of a (non-union) class with the same access control (Clause 11) are allocated so
that later members have higher addresses within a class object. The order of allocation of non-static data
members with different access control is unspecified (11). Implementation alignment requirements might
cause two adjacent members not to be allocated immediately after each other; so might requirements for
space for managing virtual functions (10.3) and virtual base classes (10.1).
so we cannot be sure that sizeof(Data) == 3*sizeof(float), therefore general answer should be: it's not save to assume 30 continuous floats.
|
(4) Statements of Recommended Practice, issued by industry or sectoral bodies recognised for this purpose by the Accounting Standards Board;
(5) international accounting standards within the meaning of EC Regulations No. 1606/2002 of the European Parliament and of the council of 19 July 2002 on the application of international accounting standards, adopted from time to time by the European Commission in accordance with that Regulation;
(6) the Companies Act 1985; and
(7) the Companies Act 2006,
as applicable to the firm for the purpose of its external financial reporting (or as would be applicable if the firmwas a company with its head office in the UK).
(1) in relation to a company incorporated in the UK under the Companies Acts, means the accounting reference date of that company determined in accordance with section 391 of the Companies Act 2006; and(2) in relation to any other body, means the last day of its financial year.
means a with-profits policy which has a readily identifiable current benefit, whether or not this benefit is currently realisable, which is adjusted by an amount explicitly related to the amount of any premium payment and to which additional benefits are added in respect of participation in profits by additions directly related to the current benefit, or a policy with similar characteristics.
means Directive 2011/61/EU of the European Parliament and of the Council of 8 June 2011 on Alternative Investment Fund Managers and amending Directives 2003/41/EC and 2009/65/EC and Regulations (EC) No 1060/2009 and (EU) No 1095/2010.
means analogous non-reinsurance financing agreements, including contingent loans, securitisations and any other arrangements in respect of contracts of insurance that are analogous to contracts of reinsurance in terms of the risks transferred and the finance provided.
(1) (in relation to a company incorporated in the UK) an annual report and annual accounts as those terms are defined in section 471 of the Companies Act 2006 together with an auditor's report prepared in relation to those accounts under sections 495 to 497A of the same Act;(2) (in relation to any other body) any similar or analogous documents which it is required to prepare whether by its constitution or by the law under which it is established.
(a) that subsidiary is wholly owned by the Society and if from time to time the subsidiary has an asset or cash flow deficiency such that the subsidiary is unable to meet any of the liabilities which it has reinsured, the Society is legally obliged to pay to the subsidiary a sum equal to that deficiency; and
(b) at the effective date of the agreement, the relevant syndicate year has been open for at least two years after the date at which it would normally have been closed in accordance with the policies and practices in relation to the syndicate concerned.
(1) any security issued or guaranteed by, or the repayment of the principal of which, or the interest of which, is guaranteed by, and any loans to or deposits with, any government, public or local authority or national industry or undertaking, which belongs to an approved State;
means a management company within the meaning of Article 2(1)(b) of the UCITS Directive, as well as an undertaking the registered office of which is not in an EEA State and which would require authorisation in accordance with Article 6(1) of the UCITS Directive if it had its registered office within an EEA State. |
/*
* Copyright 2014 JBoss Inc
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.apiman.manager.api.rest;
import io.apiman.manager.api.beans.gateways.GatewayBean;
import io.apiman.manager.api.beans.gateways.NewGatewayBean;
import io.apiman.manager.api.beans.gateways.UpdateGatewayBean;
import io.apiman.manager.api.beans.summary.GatewayEndpointSummaryBean;
import io.apiman.manager.api.beans.summary.GatewaySummaryBean;
import io.apiman.manager.api.beans.summary.GatewayTestResultBean;
import io.apiman.manager.api.rest.exceptions.GatewayAlreadyExistsException;
import io.apiman.manager.api.rest.exceptions.GatewayNotFoundException;
import io.apiman.manager.api.rest.exceptions.NotAuthorizedException;
import io.swagger.annotations.Api;
import java.util.List;
import javax.ws.rs.Consumes;
import javax.ws.rs.DELETE;
import javax.ws.rs.GET;
import javax.ws.rs.POST;
import javax.ws.rs.PUT;
import javax.ws.rs.Path;
import javax.ws.rs.PathParam;
import javax.ws.rs.Produces;
import javax.ws.rs.core.MediaType;
/**
* The Gateway API.
*
* @author eric.wittmann@redhat.com
*/
@Path("gateways")
@Api(tags = "Gateways")
public interface IGatewayResource {
/**
* This endpoint is used to test the Gateway's settings prior to either creating
* or updating it. The information will be used to attempt to create a link between
* the API Manager and the Gateway, by simply trying to ping the Gateway's "status"
* endpoint.
* @summary Test a Gateway
* @servicetag admin
* @param bean Details of the Gateway for testing.
* @statuscode 200 If the test is performed (regardless of the outcome of the test).
* @return The result of testing the Gateway settings.
* @throws NotAuthorizedException when attempt to do something user is not authorized to do
*/
@PUT
@Produces(MediaType.APPLICATION_JSON)
@Consumes(MediaType.APPLICATION_JSON)
public GatewayTestResultBean test(NewGatewayBean bean) throws NotAuthorizedException;
/**
* This endpoint returns a list of all the Gateways that have been configured.
* @summary List All Gateways
* @statuscode 200 If the gateways are successfully returned.
* @return A list of configured Gateways.
*/
@GET
@Produces(MediaType.APPLICATION_JSON)
public List<GatewaySummaryBean> list();
/**
* This endpoint is called to create a new Gateway.
* @summary Create a Gateway
* @servicetag admin
* @param bean The details of the new Gateway.
* @statuscode 200 If the Gateway is created successfully.
* @return The newly created Gateway.
* @throws GatewayAlreadyExistsException when the gateway already exists
* @throws NotAuthorizedException when attempt to do something user is not authorized to do
*/
@POST
@Consumes(MediaType.APPLICATION_JSON)
@Produces(MediaType.APPLICATION_JSON)
public GatewayBean create(NewGatewayBean bean) throws GatewayAlreadyExistsException, NotAuthorizedException;
/**
* Call this endpoint to get the details of a single configured Gateway.
* @summary Get a Gateway by ID
* @servicetag admin
* @param gatewayId The ID of the Gateway to get.
* @statuscode If the Gateway is returned successfully.
* @return The Gateway identified by {gatewayId}
* @throws GatewayNotFoundException when gateway is not found
* @throws NotAuthorizedException when attempt to do something user is not authorized to do
*/
@GET
@Path("{gatewayId}")
@Produces(MediaType.APPLICATION_JSON)
public GatewayBean get(@PathParam("gatewayId") String gatewayId) throws GatewayNotFoundException, NotAuthorizedException;
/**
* Use this endpoint to update an existing Gateway. Note that the name of the
* Gateway cannot be changed, as the name is tied closely with the Gateway's
* ID. If you wish to rename the Gateway you must delete it and create a new
* one.
* @summary Update a Gateway
* @servicetag admin
* @param gatewayId The ID of the Gateway to update.
* @param bean The Gateway information to update. All fields are optional.
* @statuscode 204 If the update is successful.
* @throws GatewayNotFoundException when gateway is not found
* @throws NotAuthorizedException when attempt to do something user is not authorized to do
*/
@PUT
@Path("{gatewayId}")
@Consumes(MediaType.APPLICATION_JSON)
public void update(@PathParam("gatewayId") String gatewayId, UpdateGatewayBean bean)
throws GatewayNotFoundException, NotAuthorizedException;
/**
* This endpoint deletes a Gateway by its unique ID.
* @summary Delete a Gateway
* @servicetag admin
* @param gatewayId The ID of the Gateway to delete.
* @statuscode 204 If the delete is successful.
* @throws GatewayNotFoundException when gateway is not found
* @throws NotAuthorizedException when attempt to do something user is not authorized to do
*/
@DELETE
@Path("{gatewayId}")
public void delete(@PathParam("gatewayId") String gatewayId)
throws GatewayNotFoundException, NotAuthorizedException;
/**
* This endpoint delivers the gateway endpoint for the corresponding gateway id
* @param gatewayId gateway id
* @return The corresponding gateway endpoint
* @throws GatewayNotFoundException when gateway is not found
*/
@GET
@Path("{gatewayId}/endpoint")
@Produces(MediaType.APPLICATION_JSON)
public GatewayEndpointSummaryBean getGatewayEndpoint(@PathParam("gatewayId") String gatewayId) throws GatewayNotFoundException;
}
|
The role of right ventricular endomyocardial biopsy in the long-term management of heart-lung transplant recipients.
Right ventricular endomyocardial biopsy remains the gold standard for the diagnosis of acute rejection of the heart allograft. Surveillance right ventricular endomyocardial biopsies are performed routinely at 3-month intervals in heart-lung transplant patients with uncomplicated conditions who have long-term follow-up. Recent observations of asynchronous heart and lung rejection, plus the impression that acute rejection was a rare phenomenon in long-term heart-lung transplant survivors, led us to analyze our experience with this technique to determine its clinical role. During the first 6 years of the heart-lung transplantation program at Stanford University Medical Center, only one episode of moderate acute rejection has occurred at greater than 4 months after heart-lung transplantation, despite greater than 160 surveillance right ventricular endomyocardial biopsies. This was in a patient who was recovering from a viral illness and had a subtherapeutic cyclosporine level of 38 ng/ml (as measured by radioimmunoassay). Fourteen patients (40%) have never had acute rejection, but freedom from acute rejection did not correlate with freedom from obliterative bronchiolitis or concentric coronary artery intimal hyperplasia. We conclude that in the long-term management phase (greater than 6 months after heart-lung transplantation), right ventricular endomyocardial biopsy should be performed for specific indications, rather than as a surveillance procedure. |
Fourth Circuit uphold harsh piracy punishment against Eighth Amendment challenge - CapitalistCartr
https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/08/24/fourth-circuit-upholds-harsh-piracy-punishment-against-eighth-amendment-challenge/
======
LeoSolaris
Given the forum, I was expecting yet another copyright infringement case being
mislabeled as piracy. Nice to see a story about actual pirates in
international waters.
|
Q:
htaccess redirect virtual alias to url
I have a php page:
www.mydomain.com/subfolder/subfolder/thepage.php
I want to access it via:
www.mydomain.com/page
How is that possible using the .htaccess file?!I want to use an alias or virtual name to replace the long directory url.
A:
RewriteEngine On
RewriteBase /
RewriteRule ^page$ /subfolder/subfolder/thepage.php [L]
|
The two brothers stood, one against the other
Looking across the vast divide.
Long ago, they crossed fists as lads,
Here on this very land,
Two different promises etched on their blows,
One, to kill, and another, to save,
Alas, a victor was not decided,
And so they went, on with their burdens,
Damaged, but not broken.
Their hardships and their trials took them afar
Journeys filled with happiness and sorrow,
Until here once again they stood,
Ready to finally decide who would be the victor,
With the same promises once again, as men,
One to kill, and another to save.
Blades of wind met forks of lightning in an explosive clash
The shockwaves resonated throughout the land,
As blue eyes met red, a thousand words were exchanged.
Words of anger, and words of rage.
Words of sadness, and words of pain.
A team once perfect by design now lay shattered among dreams.
A team once held together by bonds, now permanently put to sleep.
A team once united, now stood divided,
Not torn apart by enemies, but broken inside.
The world lost two great men that day,
Men that gave everything for what they believed in,
One the sun and the other the moon,
And when the news came the following afternoon,
While the world rejoiced for the end of the war,
Far away, in a little spot in the village hidden in leaves,
A woman wept, clutching a photograph close,
Knowing that her perfect team had burnt to ashes,
Lost to the memory of time. |
//
// Generated by class-dump 3.5 (64 bit) (Debug version compiled Jun 6 2019 20:12:56).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard.
//
#import <AppKit/NSPathCell.h>
#import <IDEKit/DVTFilteringMenuDelegate-Protocol.h>
#import <IDEKit/DVTInvalidation-Protocol.h>
#import <IDEKit/NSDraggingSource-Protocol.h>
#import <IDEKit/NSMenuDelegate-Protocol.h>
@class DVTDelayedInvocation, DVTStackBacktrace, IDEPathCellNavigableItemObserver, IDEPathComponentCell, NSMenu, NSMutableArray, NSMutableSet, NSString;
@interface IDEPathCell : NSPathCell <DVTFilteringMenuDelegate, NSMenuDelegate, NSDraggingSource, DVTInvalidation>
{
struct CGSize _cachedSizeWanted;
NSMenu *_trackingMenu;
IDEPathComponentCell *_clickedIDEPathComponentCell;
IDEPathCellNavigableItemObserver *_itemObserver;
NSMutableArray *_itemsObservedForChildItems;
NSMutableSet *_cellsWithDirtyImages;
NSMutableSet *_cellsWithDirtyNames;
DVTDelayedInvocation *_dirtyCellInvocation;
struct {
unsigned int _lastComponentFillsWidth:1;
unsigned int _delegateRespondsToWillDisplayChildrenWithMostProximateChildItem:1;
unsigned int _delegateRespondsToWillDismissMenuDisplayingItems:1;
unsigned int _delegateRespondsToShouldSeparateDisplayOfChildItemsForItem:1;
unsigned int _delegateRespondsToChildItemsForItem:1;
unsigned int _delegateRespondsToShouldPopUpMenuForPathComponentCell:1;
unsigned int _delegateRespondsToBeginDrag:1;
unsigned int _delegateRespondsToTitleForPathComponentCellAtIndex:1;
unsigned int _delegateRespondsToPerformAlternateReveal:1;
unsigned int _delegateProvidesMenuItems:1;
unsigned int _delegateProvidesAccessibilityDescriptions:1;
unsigned int _delegateProvidesToolTips:1;
unsigned int _delegateResponseToTextAlignmentForTitleOfPathComponentCellAtIndex:1;
unsigned int _delegateRespondsToShouldDisplayChildrenForItem:1;
} _idePathCellFlags;
BOOL _needsToUpdateComponentCells;
int _gradientStyle;
}
+ (void)initialize;
+ (unsigned long long)defaultFocusRingType;
@property(nonatomic) int gradientStyle; // @synthesize gradientStyle=_gradientStyle;
- (void).cxx_destruct;
- (id)ide_accessibilityPopUpMenuParent:(id)arg1;
- (id)ide_accessibilityChildMenuForChild:(id)arg1;
- (void)ide_accessibilityPerformPressForChild:(id)arg1;
- (id)ide_accessibilitySizeOfChild:(id)arg1;
- (id)ide_accessibilityPositionOfChild:(id)arg1;
- (struct CGRect)ide_accessibilityScreenRectForPathComponent:(id)arg1;
- (id)accessibilityActionNames;
- (id)accessibilityHitTest:(struct CGPoint)arg1;
- (id)accessibilityAttributeValue:(id)arg1;
- (id)ide_accessibilityObjectForComponentCell:(id)arg1 atIndex:(unsigned long long)arg2;
- (id)toolTipManager:(id)arg1 toolTipForView:(id)arg2 location:(struct CGPoint)arg3 tipSourceRect:(struct CGRect *)arg4;
- (void)menu:(id)arg1 willHighlightItem:(id)arg2;
- (void)menuDidClose:(id)arg1;
- (void)menuWillOpen:(id)arg1;
- (BOOL)trackMouse:(id)arg1 inRect:(struct CGRect)arg2 ofView:(id)arg3 untilMouseUp:(BOOL)arg4;
- (BOOL)_handleClickInComponentCell:(id)arg1 atPoint:(struct CGPoint)arg2 inRect:(struct CGRect)arg3 ofView:(id)arg4 event:(id)arg5;
- (BOOL)_trackMouseInComponentCell:(id)arg1 atPoint:(struct CGPoint)arg2 inRect:(struct CGRect)arg3 ofView:(id)arg4 event:(id)arg5;
- (BOOL)acceptsFirstResponder;
- (unsigned long long)draggingSession:(id)arg1 sourceOperationMaskForDraggingContext:(long long)arg2;
- (void)_performDragInComponentCell:(id)arg1 inRect:(struct CGRect)arg2 ofView:(id)arg3 event:(id)arg4;
- (void)filterItems:(id)arg1 inMenu:(id)arg2 forSearchString:(id)arg3;
- (void)_openURLInFinder:(id)arg1;
- (BOOL)popUpMenuForComponentCell:(id)arg1 inRect:(struct CGRect)arg2 ofView:(id)arg3;
- (void)_handlePressureClickForCell:(id)arg1;
- (BOOL)_revealInPopover:(id)arg1 ofCell:(id)arg2 fromFrame:(struct CGRect)arg3 ofView:(id)arg4;
- (BOOL)_representsDocumentInteriorContent:(id)arg1;
- (id)_fileURLForItem:(id)arg1;
- (void)_populatePopUpMenuWithPath:(id)arg1 withFileURL:(id)arg2;
- (void)_populatePopUpMenu:(id)arg1 withItems:(id)arg2;
- (void)menuNeedsUpdate:(id)arg1;
- (void)cancelMenuTracking;
- (id)_menuItemWithItem:(id)arg1 additionalItems:(id *)arg2 currentGroupIdentifier:(id *)arg3;
- (id)_menuItemWithItem:(id)arg1 additionalItems:(id *)arg2 currentGroupIdentifier:(id *)arg3 indentationLevel:(long long)arg4;
- (void)_setupSubmenuForMenuItem:(id)arg1;
- (void)_selectItem:(id)arg1;
- (BOOL)_delegate_shouldDisplayChildrenForItem:(id)arg1;
- (BOOL)_delegate_shouldSeparateDisplayOfChildItemsForItem:(id)arg1;
- (void)observeValueForKeyPath:(id)arg1 ofObject:(id)arg2 change:(id)arg3 context:(void *)arg4;
- (void)stopObservingChildItemsOfItems:(id)arg1;
- (void)stopObservingChildItemsOfAllItems;
- (void)startObservingChildItemsOfMenuItems:(id)arg1;
- (id)_peerItemsForComponentCell:(id)arg1;
- (id)childItemsForItem:(id)arg1;
- (void)invalidateNameForPathComponentCell:(id)arg1;
- (void)invalidateImageForPathComponentCell:(id)arg1;
- (void)setNeedsDisplayForCell:(id)arg1;
- (id)pathComponentCellForRepresentedObject:(id)arg1;
- (void)updateComponentCells;
- (struct CGSize)sizeWantedForFrame:(struct CGRect)arg1 inView:(id)arg2;
- (id)_componentCellsForCurrentlyObservedItems;
- (void)_updateDirtyCells:(id)arg1;
- (id)lineageForItem:(id)arg1 rootItems:(id)arg2;
- (id)_componentCellsFromItems:(id)arg1;
- (unsigned long long)_delegate_textAlignmentForTitleOfPathComponentCell:(id)arg1 atIndex:(unsigned long long)arg2;
- (id)_delegate_titleForPathComponentCell:(id)arg1 atIndex:(unsigned long long)arg2;
- (id)_noSelectionComponentCell;
- (id)_componentCellWithRepresentedObject:(id)arg1;
- (void)invalidateComponentCells;
- (struct CGRect)grabRectInView:(id)arg1;
- (void)drawWithFrame:(struct CGRect)arg1 inView:(id)arg2;
- (id)pathComponentCellAtPoint:(struct CGPoint)arg1 withFrame:(struct CGRect)arg2 inView:(id)arg3;
- (struct CGRect)rectOfPathComponentCell:(id)arg1 withFrame:(struct CGRect)arg2 inView:(id)arg3;
@property BOOL lastComponentFillsWidth;
- (void)setFont:(id)arg1;
- (void)primitiveInvalidate;
- (void)setDelegate:(id)arg1;
- (void)reset;
- (id)initWithCoder:(id)arg1;
- (id)init;
- (void)_IDEPathCellCommonInit;
// Remaining properties
@property(retain) DVTStackBacktrace *creationBacktrace;
@property(readonly, copy) NSString *debugDescription;
@property(readonly, copy) NSString *description;
@property(readonly) unsigned long long hash;
@property(readonly) DVTStackBacktrace *invalidationBacktrace;
@property(readonly) Class superclass;
@property(readonly, nonatomic, getter=isValid) BOOL valid;
@end
|
Q:
match lines with leading 0s in date
I am trying to grep strings in a file, which has filename and trying to extract that are older than 3 weeks old from the current date and i am having trouble with the leading 0s in the month or date format.
Here are the filenames and format that i am trying to extract the data from.
ABC_CTL_Xtra_05-12-2019.csv
ABC_Supp_rep_Income_Xtra_05-23-2020.csv
ABC_Full_Elig_Xtra_05-12-2019.csv
ABC_Supp_Rels_Xtra_05-26-2012.csv
ABC_Full_Elig_Xtra_06-26-2012.CSV
ABC_Full_Elig_Xtra_07-12-2019.csv
ABC_Full_Elig_Xtra_07-11-2019.csv
ABC_Supp_Rels_Xtra_06-26-2012.csv
ABC_Supp_Race_Xtra_06-26-2012.csv
ABC_Full_Elig_Xtra_07-10-2019.csv
ABC_Supp_rep_Income_Xtra_06-26-2012.csv
ABC_Supp_rep_Income_Xtra_06-26-2012.sha256
ABC_CTL_Xtra_06-26-2012.csv
ABC_CTL_Xtra_07-12-2019.csv
ABC_CTL_Xtra_07-30-2019.csv
ABC_Supp_rep_Income_Xtra_07-29-2012.sha256
cat abc.log | grep '^ABC_.*Xtra_*.*'
This basically gives me all the filenames. Could someone help me how do i filter the list to 3 weeks old files.
A:
awk to the rescue
awk -v today="$(date -d "today 0" +%s)" -F"[_.-]" '
{ts = mktime($(NF-1) " " $(NF-2) " " $(NF-3) " 00 00 00")}
(today - ts >= 1814400) # 1814400s = 3 weeks
' file
Returns
ABC_Supp_Rels_Xtra_05-26-2012.csv
ABC_Full_Elig_Xtra_06-26-2012.CSV
ABC_Supp_Rels_Xtra_06-26-2012.csv
ABC_Supp_Race_Xtra_06-26-2012.csv
ABC_Supp_rep_Income_Xtra_06-26-2012.csv
ABC_Supp_rep_Income_Xtra_06-26-2012.sha256
ABC_CTL_Xtra_06-26-2012.csv
ABC_Supp_rep_Income_Xtra_07-29-2012.sha256
How does it work ?
-v today="$(date -d "today 0" +%s)" -> creates variable today = timestamp of today at midnight
-F"[_.-]"-> sets three different separator of columns, -, _ or .
{ts = mktime($(NF-1) " " $(NF-2) " " $(NF-3) " 00 00 00")} this block is executed on each line of your file. It uses mktime function and creates a variable ts = timestamp of the date on the line. $NF is the last column , $(NF-1) the column before ....
(today - ts >= 1814400){print} -> this block is executed only when condition (today - ts >= 1814400) is reached i.e when the line has a date older than 3 weeks. {print} prints the line, this code is optional because it is the default action.
|
hello,
is it possible to have an addon or plugin to change these values ?
i explain my problem : these values are sometimes reseted and i need to redo all of them and logout properly for files to be updated
i can play on 2 different computers and i use software to sync these files
i think these values are saved to server too because, if i start play on a different computer, when i'm coming back to my 2 "regular" computers, these settings are reseted
(i don't want to talk of all my manual inventories which are reseted too just because i log to a different computer when i was on vacation)
i would like to have an addon to update at least config/chat filters and config/logs since it's them which cost a little work
I have created an addon for Ashita v3 to save/load filters on the fly, however it is not 100% guaranteed to work all the time. It has some hiccups but it should do enough to help restore things when needed. |
Red grouse
The red grouse, Lagopus lagopus scotica, is a medium-sized bird of the grouse family which is found in heather moorland in Great Britain and Ireland. It is usually classified as a subspecies of the willow ptarmigan but is sometimes considered to be a separate species, Lagopus scotica. It is also known as the moorcock, moorfowl or moorbird. Lagopus is derived from Ancient Greek (), meaning "hare", + (), "foot", in reference to the feathered feet and toes typical of this cold-adapted genus, and scoticus is "of Scotland".
The red grouse is widely known as the logo of The Famous Grouse whisky and an animated bird is a character in a series of its adverts. The red grouse is also the emblem of the journal British Birds.
Description
The red grouse is differentiated from the willow ptarmigan and rock ptarmigan by its plumage being reddish brown, and not having a white winter plumage. The tail is black and the legs are white. There are white stripes on the underwing and red combs over the eye. Females are less reddish than the males and have less conspicuous combs. Young birds are duller and lack the red combs.
Birds in Ireland are sometimes thought to belong to a separate subspecies L. l. hibernica. They are slightly paler than those in Britain and the females have yellower plumage with more finely barred underparts. This may be an adaptation to camouflage them in moorland with higher grass and sedge content and less heather.
It is identified by its chut!chut!chut!chut!chut!chuttt.... call, or the Goback, goback, goback vocalisation. The wings make a whirring sound when the bird is disturbed from a resting place.
Grouse populations display periodic cycling, where the population builds up to very high densities only to crash a few years later, and then recover. The main driver of this cyclic pattern is thought to be the parasitic nematode worm Trichostrongylus tenuis.
However, in his book, V. C. Wynne-Edwards suggests that the primary reason for mortality in grouse population is homeostasis depending largely on food availability and that the 'Grouse disease', due to the parasitic worm Trichostrongylus tenuis is a mistaken diagnosis of the after effects of social exclusion.
Distribution and habitat
The red grouse is endemic to the British Isles; it has developed in isolation from other subspecies of the willow ptarmigan which are widespread in northern parts of Eurasia and North America.
It is found across most parts of Scotland, including Orkney, Shetland and most of the Outer Hebrides. They are only absent from urban areas, such as in the Central Belt.
In Wales there are strong populations in places but their range has retracted. They are now largely absent from the far south, their main strongholds being Snowdonia, the Brecon Beacons and the Cambrian Mountains. There are reports of Welsh birds crossing the Bristol Channel to Exmoor.
In England it is mainly found in the north – places such as the Lake District, Northumberland, County Durham, much of Yorkshire, the Pennines and the Peak District, as far south as the Staffordshire Moorlands. There is an isolated introduced population on Dartmoor, and overspill Welsh birds visit the Shropshire Hills such as Long Mynd, where they breed. The Exmoor population would now appear to be extinct, with the last birds sighted as recently as 2005. An introduced population in Suffolk died out by the early 20th century, though a population on Cannock Chase in Staffordshire lasted longer.
In Ireland it is found locally in most parts of the country: it is commonest in Mayo, where the population is increasing, and on the Antrim plateau, with other healthy populations in the Slieve Bloom mountains and the Knockmealdown mountains; a few pairs still breed in south County Dublin.
The small population in the Isle of Man is mostly concentrated in the southern hills but conservation work is ongoing throughout the uplands to ensure the species' continued viability.
Its typical habitat is upland heather moors away from trees. It can also be found in some low-lying bogs and birds may visit farmland during hard weather.
The British population is estimated at about 250,000 pairs with around 1–5,000 pairs in Ireland. Numbers have declined in recent years and birds are now absent in areas where they were once common. Reasons for the decline include loss of heather due to overgrazing, creation of new conifer plantations and a decline in the number of upland gamekeepers. Some predators such as the hen harrier feed on grouse and there is ongoing controversy as to what effect these have on grouse numbers.
Red grouse have been introduced to the Hautes Fagnes region of Belgium but the population there died out in the early 1970s.
Behaviour
Diet
The red grouse is herbivorous and feeds mainly on the shoots, seeds and flowers of heather. It will also feed on berries, cereal crops and sometimes insects.
Breeding
The birds begin to form pairs during the autumn and males become increasingly territorial as winter progresses. The nest is a shallow scrape up to 20 cm across which is lined with vegetation. About six to nine eggs are laid, mainly during April and May. They are oval, glossy and pale yellow with dark brown blotches. The eggs are incubated for 19 to 25 days, the chicks can fly after 12 to 13 days after hatching and are fully grown after 30 to 35 days.
Conservation
Member States of the European Union are obliged by virtue of Council Directive 2009/147/EC on the conservation of wild birds (popularly called the Birds Directive ) to take the requisite measures for the protection of the red grouse; but as it is a species to which Annex II of the Directive applies, Article 7 permits hunting under national law, provided population levels are not threatened as a result. In 2002, Ireland was found by the European Court of Justice to be in breach of its obligations under the earlier Directive to protect the red grouse, in that it had allowed a crucial breeding ground to become degraded through overgrazing by sheep. Conservation measures taken on foot of the judgment have seen the population in the area double from 400 to 800.
As a game bird
The red grouse is considered a game bird and is shot in large numbers during the shooting season which traditionally starts on August 12, known as the Glorious Twelfth. There is a keen competition among some London restaurants to serve freshly killed grouse on August 12, with the birds being flown from the moors and cooked within hours.
Shooting can take the form of 'walked up' (where shooters walk across the moor to flush grouse and take a shot) or 'driven' (where grouse are driven, often in large numbers, by 'beaters' towards the guns who are hiding behind a line of 'butts'). Many moors are managed to increase the density of grouse. Areas of heather are subjected to controlled burning; this allows fresh young shoots to regenerate, which are favoured by the grouse. Extensive predator control, including illegal killing of raptors, is a feature of grouse moor management: foxes, stoats and crows are usually heavily controlled on grouse moors. The extent to which it occurs on grouse moors is hotly contested between conservation groups and shooting interests, and the subject generates a lot of media attention in relation to grouse moors and shooting.
In recent decades the practice of using medicated grit and direct dosing of birds against an endoparasite, the strongyle worm or threadworm (Trichostrongylus tenuis), has become part of the management regime on many moors.
As food
The flavour of grouse, like most game birds, develops if the bird is hung for a few days after shooting and before eating. Roasting is the most common way to cook a grouse.
The Cookery Book of Lady Clark of Tillypronie (1909) has 11 recipes for using grouse. The recipe "To cook old birds" runs as follows:
Scientific study
Because of their economic and social importance and some interesting aspects of their biology, red grouse have been widely studied. They were the subject of some of the earliest studies of population biology in birds, as detailed in The Grouse in Health and in Disease by Lord Lovat in 1911. Since the mid-20th century they have been subject to ongoing study by many organisations and individuals. Much work has been conducted by the Institute of Terrestrial Ecology in the eastern Cairngorms, and by the Game & Wildlife Conservation Trust in the Central Highlands. There are a wide range of research activities still going on today and a wealth of published literature exists on all aspects of grouse biology.
Parasites and viruses
The red grouse may be infected by parasites and viruses which severely affect populations. Strongylosis or 'grouse disease' is caused by the strongyle worm, which induces damage and internal bleeding after burrowing into the cecum. This endoparasite is often eaten with the tops of young heather shoots and can lead to mortality and poor condition, including a decrease in the bird's ability to control the scent it emits.
First diagnosed in the UK in 2010, respiratory cryptosporidiosis, caused by Cryptosporidium baileyi, is present in approximately half the grouse moors in northern England, where it reduces natural survival and productivity of red grouse.
Louping ill virus is a flavivirus (RNA virus), also known as sheep encephalomyelitis virus. Flaviviruses are transmitted by arthropods, and louping ill virus is transmitted by ticks. In red grouse, this virus can cause mortality as high as 78%. The main tick vector is the sheep tick Ixodes ricinus. Although traditionally tick-borne diseases are thought to be caused when the parasite bites its host, it has been shown that red grouse chicks can be affected when they eat ticks with which they come into contact. This virus may be a significant factor in red grouse populations.
References
External links
RSPB Red Grouse page
GWCT Red Grouse page
red grouse
red grouse
Category:Birds of Europe
red grouse
red grouse
Category:Subspecies
pl:Pardwa mszarna#Systematyka |
ive m(-1).
-5
Suppose -3*c + 5 = -4*w - 0, -4*c + 13 = w. Let u be 1 + w*(3 - 4). Suppose -5*i = -n + 21, 4*i + u - 6 = -3*n. Let j(a) = a**2 - 5*a - 6. Determine j(n).
0
Let m = -26 + 29. Let u(w) be the third derivative of 3*w**2 - 1/6*w**4 - 1/6*w**m + 0 + 0*w. Calculate u(-1).
3
Suppose 2*q = 6*q - 20. Let f(o) = o**3 - 2*o**2 + 7*o + 4. Let t(v) = v**2 + v. Let n(u) = f(u) - 4*t(u). Calculate n(q).
-6
Suppose 3*h + 5*c - 31 = 0, 0 = -h - 4*c + c + 9. Let t = h + -12. Let f(j) = 2*j**2 + 15 - 3*j**2 - 5. Determine f(t).
10
Let x(p) = -p - 2. Suppose -3*c + 3 = r, -3*r + 5*r - 5*c + 5 = 0. Determine x(r).
-2
Let m(n) = 4*n**2 - 15*n + 24. Let v(q) = -q**2 + 5*q - 8. Let o(g) = -2*m(g) - 7*v(g). Determine o(-6).
2
Let q(y) = 1 - 1 + 2*y. Suppose -f - 4 + 1 = 0. Let o(j) = -j**2 - j + 2. Let x be o(f). Determine q(x).
-8
Let r = 8 + -5. Let k(q) = 0*q**2 + 5*q + q**2 - 4*q + r*q. Calculate k(-4).
0
Let m(f) be the third derivative of f**4/24 - 7*f**3/6 + f**2. Let s be 20 - 0 - (-1 + 3). Let a = s - 13. Give m(a).
-2
Suppose 10*o + 5 = 9*o. Let i(f) = -f - 2. Let r be i(-4). Let k(z) = -2 + 1 + r*z + 5. Determine k(o).
-6
Let i(p) = p. Let m(k) = -10*k. Let v(f) = 8*i(f) + m(f). Let y(s) = -s + 4. Let c(w) = 2*w**2 - 2*w + 3. Let x be c(2). Let l be y(x). Determine v(l).
6
Let v(b) = b**3 - 4*b**2 + 2*b. Let s = 14 + -8. Suppose -r - r = y - s, 3*y - 10 = -2*r. Suppose 5*l + 21 = -2*f, f + 2*f - r*l = 16. Calculate v(f).
-4
Let g(k) = k**2 - 2*k + 1. Let s be 3/(-2)*2/(-1). Let d be g(s). Suppose 35 = -d*c + 8*x - 3*x, -4*x = -4*c - 32. Let q(n) = -2*n - 4. Give q(c).
6
Let g(d) be the first derivative of -1/30*d**5 + 2/3*d**3 - 1/24*d**4 + 0*d + 1/360*d**6 - 2 + 0*d**2. Let i(k) be the third derivative of g(k). Determine i(5).
4
Let p(u) = u + 2. Let k(c) = -c**2 + 3*c + 2. Let f be k(3). Let r(y) = -8*y - f*y**3 + 11 + y**3 + y + 10*y**2 - 3*y. Let m be r(9). Give p(m).
4
Let m be 9/27 + 11/3. Let g(q) = 4 + 2*q**2 + q**2 - 7*q**2 - q**2 + q**3 + 5*q. What is g(m)?
8
Let w(s) = -s**2 + s + 4. Let j(l) = 6*l**2 + 2*l + 1. Let h be j(-1). Suppose 29 = 5*m + r, -6*r + 26 = 2*m - 2*r. Let n = h - m. What is w(n)?
4
Let b(l) = -8*l**3 + 2*l**2 - l. Let p(q) be the third derivative of -q**5/60 + q**4/12 + 2*q**3/3 - 4*q**2. Let g be p(3). What is b(g)?
-7
Let z(c) = -c**2 - 8*c + 4. Let g be z(-8). Let m(t) = t**3 - 4*t**2 - 2*t + 5. What is m(g)?
-3
Let y(p) = 4*p**3 + p**2 + 8*p + 6. Let r(z) = 6*z**3 + z**2 + 12*z + 9. Let l(k) = -5*r(k) + 8*y(k). What is l(-2)?
-9
Let x(n) = -4*n + 1 - n + n**2 + 5*n + n. Determine x(2).
7
Let p(r) be the first derivative of r**2/2 - 1. Suppose 4*n - 3 = n. Determine p(n).
1
Let l(g) be the first derivative of -2*g**3/3 - 4. Suppose -2*t + 29 = 9. Suppose -t = 4*f + f. Give l(f).
-8
Suppose f = -f. Suppose -2*k - k - 3 = f. Let d(p) be the first derivative of -5*p**3/3 + p**2 + p - 5. What is d(k)?
-6
Let w = 0 + 2. Let t(y) = -3*y**2 + y**2 + 3 - 1 + 2*y. Give t(w).
-2
Suppose -p + 36 = 3*p. Let c(o) = -o**3 + 9*o**2 - 4. Let v be c(p). Let g(z) be the first derivative of -3*z**2/2 - 3*z + 2. Give g(v).
9
Let y(l) = -5*l**2 + 11*l - 17. Let g(h) = 2*h**2 - 5*h + 8. Let d(r) = -7*g(r) - 3*y(r). Let a(s) = -s - 1. Let m be a(-3). Suppose -u - 6 = -m. What is d(u)?
3
Let m(k) = 7*k**3 - 7*k**2 - 15*k + 4. Let z be 3/(1/8*6). Let h(y) = -4*y**3 - 2 + 4*y + z*y**2 + y + 3*y. Let d(f) = 5*h(f) + 3*m(f). Determine d(3).
5
Let h(a) = -2*a**2 + 7*a + 1. Suppose -2 = -q + 3. Give h(q).
-14
Let u(d) = 4*d - 3. Let z(t) = 11*t - 9. Let j(r) = 17*u(r) - 6*z(r). Suppose 2*q - b = -q - 14, 3*b - 24 = 3*q. Calculate j(q).
-3
Let o = -20 + 35. Suppose 0 = -4*r + 7*r - o. Let k(u) = -u**3 + 5*u**2 - u - 5. Calculate k(r).
-10
Let t(m) = -m + 6. Let d(y) = 2*y - 2. Let h be d(3). Suppose -l - h - 2 = 0. Let k be (-4)/l - 104/(-24). Give t(k).
1
Let z = -1 + 2. Let a(t) be the second derivative of -t**5/60 + t**3/6 - 13*t**2/2 + 5*t. Let g(j) be the first derivative of a(j). Calculate g(z).
0
Let m be 0 + 0 + (-52)/(-13). Let a(u) = -2 + 6*u - 10 - u**2 + m. Calculate a(6).
-8
Let k(j) = -5*j**2 - 3*j + 5. Let u(g) = 2*g**2 + 2*g - 3. Let h(b) = -3*k(b) - 5*u(b). Let i(r) = r**3 - 11*r**2 - 27*r + 12. Let d be i(13). Give h(d).
6
Let c(k) = -9*k - 6. Let z(q) be the first derivative of 5*q**2/2 + 3*q - 1. Suppose 0 = 2*b - 4 + 14. Let r(j) = b*z(j) - 3*c(j). What is r(-2)?
-1
Suppose -f - f - 14 = 0. Let q be (f/3 - -2)*-9. Suppose q*g - 18 = -3. Let d(z) = z**2 - 5*z - 2. Calculate d(g).
-2
Let f(i) be the second derivative of i**4/12 + 7*i**3/6 - i**2/2 - 3*i. Calculate f(-7).
-1
Let w(p) be the third derivative of p**6/120 + p**5/12 + p**4/8 + 5*p**3/6 - 10*p**2. Determine w(-4).
9
Let k(b) = 3*b + 9. Let s(v) = 3*v + 10. Let m(d) = 6*k(d) - 5*s(d). Suppose -r + 2*r + 3 = 0. Determine m(r).
-5
Let f(j) = -j**2 + 1. Let h(b) = -b**2. Let r(z) = -4*f(z) + 3*h(z). Let k be 4 + -1*2 + 1. Let m = 3 - k. What is r(m)?
-4
Let z(a) = -5*a - 1. Let w be (-6)/(-12) + 39/2. Let q = w + -19. Calculate z(q).
-6
Let d(f) be the second derivative of f**3/3 + 8*f. Let b be 10/(-2)*9/(-15). Give d(b).
6
Let a(g) = 8*g**3 + g**2 - 1. Suppose -2*h = 4*m + 318, -h - 1 = 4. Let j be m/(-63) + (-2)/9. What is a(j)?
8
Let i(q) = 3*q - 4. Let m(n) be the third derivative of -n**4/24 - n**3/6 - 2*n**2. Let y be m(-4). Determine i(y).
5
Let j(a) = -3*a - 11. Let h(n) = n + 4. Let y(b) = -11*h(b) - 4*j(b). What is y(-3)?
-3
Suppose 7 - 42 = 5*j. Let f be 9/j + (-2)/(-7). Let i(r) = 3*r + 1. What is i(f)?
-2
Let s(r) = 2*r**2 + r - 4. Let p(i) = i**2. Let f(l) = p(l) - s(l). Give f(0).
4
Let u(m) = m - 10. Let j(q) = -4*q - 9. Let i(o) = 3*o + 9. Let t(y) = -5*i(y) - 4*j(y). Let x(z) = 6*t(z) - 5*u(z). Determine x(6).
2
Let s(f) be the second derivative of 2*f - 1/6*f**3 + 0 - 1/2*f**2. Calculate s(-2).
1
Let d(z) = z + 2 + 0*z**2 + z**2 + z**3 + 4 - 2*z**3. Let r(y) = -y**2 - 6*y - 5. Let t be 5/(-2*(-1)/(-2)). Let h be r(t). What is d(h)?
6
Let f(p) be the third derivative of p**5/60 - p**4/6 + 2*p**3/3 + 18*p**2. Give f(3).
1
Let v(g) be the second derivative of -g**5/20 - g**4/2 - g**3 + g**2/2 + 19*g. Calculate v(-5).
6
Let d(r) = -r**2 + 1. Let u(f) = f**2 - 8. Let i(j) = -2*d(j) - u(j). What is i(0)?
6
Let f(j) = 3*j + 35. Let i be f(-11). Let n(c) be the first derivative of -c**4/2 + 2*c**3/3 + c**2 - c + 3. What is n(i)?
-5
Suppose 0 = 4*t - 12 - 0, t - 11 = -4*z. Let h be 4 - 3 - (-1 + z). Let c(m) = m**3 + m**2 + m + 4. Give c(h).
4
Let p = -75 + 81. Let s(j) = -3*j + 14. What is s(p)?
-4
Let s(w) = 6*w - 5. Let x(c) = -1. Let b(l) = -s(l) + 6*x(l). Give b(1).
-7
Let x(y) = y**2 + 11*y + 5. Let g(u) = -u**2 - 12*u - 5. Let f(l) = -3*g(l) - 4*x(l). Calculate f(-6).
7
Let y be (2/(-7))/(1/(-7)). Let v(q) = -7*q + 3 - 4*q**2 + 2*q**y + 3*q**2 + 3. Give v(6).
0
Let s = 2 - 0. Let l(f) = f**2 + f + 10. Let r(m) = -2. Let h(b) = -2*l(b) - 11*r(b). Calculate h(s).
-10
Suppose 5*k = 5*y - 35, -k - 2*k - 25 = -4*y. Suppose y*m - 8 - 4 = 0. Let b(s) = 2*s**2 - 3*s + 1. What is b(m)?
10
Let p(f) = 4*f**2 - 3*f - 80*f**3 - 2 + 41*f**3 + 38*f**3. Suppose 3*v + 27 = 3*d, 3*d + 2*v = 2*d - 6. What is p(d)?
-14
Let x(i) = -i**3 + 1. Let k be x(1). Let m = 2 - k. Suppose 0*j - 3*j + 13 = 5*f, -4*j = -f - m. Let a(u) = -7*u**2 + 2*u - 1. Give a(j).
-6
Let i(q) = -2*q + 5*q**3 + 7*q**2 - 4*q**3 - 10*q**2. Determine i(3).
-6
Let q(o) = -8 + 6 + 6*o - 2*o - 2*o. Let y(v) = 6*v + 7 + v**2 - 1 + 0. Let f be y(-4). What is q(f)?
-6
Let k(j) = j**3 - 2. Let i(h) be the first derivative of -h**2 + h + 2. Let a be i(-2). Suppose -9*t = -a*t. Determine k(t).
-2
Suppose 4*t + 2*h = -2*h + 4, h + 2 = 0. Let z be (t/4)/((-5)/20). Let a(q) = q**2 + 4*q + 4. Calculate a(z).
1
Let u(a) be the second derivative of a**3/6 + 4*a**2 + 2*a. Suppose 0 = -3*x - 21 + 3. What is u(x)?
2
Let f(p) = 13*p**2 - 4*p + 3. Let u(q) = -2*q**2 - q + 1. Let g(r) = -f(r) - 6*u(r). Give g(10).
-9
Let c(m) = -m**2 + m + 3. Let h(n) = -3*n**2 + 3*n + 7. Let d(l) = 5*c(l) - 2*h(l). Suppose -z - 4*a - a = -11, -2*z + 4 = a. Suppose -u + z = -0. What is d(u)?
1
Let n(b) be the second derivative of b**5/20 + b**4/3 - 2*b**3/3 - b**2/2 - 38*b. Give n(-5).
-6
Let j be 4/(-8) - (-2)/4. Let h(w) be t |
At Red Panthers PostgreSQL is our go to database we use it everywhere. So thinking about how to optimize our database performance is one of the most talked about topic at our office. The best way to speed up report generation and data retrieval within a rails application is to leave it to the database, as they have algorithms and…
Rails Generate is one of the features provided by Rails that would speed up the application development. However, we won’t be needing all the files generated by rails when running the generate command. For example: rails generate controller Home Index new create, would create the following set of files: As one knows from experience, the helper;…
Displaying the number of tasks under a project or the number of comments in a post or the number of users in an organization or anything similar is a common requirement in most rails applications. The code for doing it is also simple- @project.tasks.count; but the problem with this code is that every time you run it, you are counting the number of tasks of that… |
Q:
Getting users from an Active Directory group
I have been banging my head for hours trying to figure out why this wont' work. I found an example of getting a list of users from an AD group but I can't get it to work. Here is what I've been trying to do:
DirectoryEntry de = new DirectoryEntry("LDAP://DC=" + domain + ",DC=com");
DirectorySearcher ds = new DirectorySearcher(de);//, "(objectClass=person)");
ds.Filter = "(&(objectCategory=person)(objectclass=user)(memberOf=CN=!CityNameGroup))";
ds.PropertiesToLoad.Add("givenname");
ds.PropertiesToLoad.Add("samaccountname");
ds.PropertiesToLoad.Add("sn");
ds.PropertiesToLoad.Add("useraccountcontrol");
foreach (SearchResult sr in ds.FindAll())
{//stuff goes here}
but ds.FindAll always brings back 0 results with this filter. I can do simpler filters that bring back results, but I never get anything back from the above filter. I just want all my users that are in the !CityNameGroup. I appreciate the help!
A:
If .NET 3.5 is an option, stop banging your head and look here:
Everything in Active Directory via C#.NET 3.5 (Using System.DirectoryServices.AccountManagement)
Seriously, AD handling in .NET 3.5 is another world. It will change everything. For the better, of course.
Update
Also, there's a ready answer here ( Active Directory User Group Memberships GroupPrincipal ). I will have the decency of not copying it. :)
It uses .NET 3.5, BTW.
|
The UK steel industry is "drowning" in a flood of cheap Chinese imports, which will get worse after the United States decided to impose new tariffs, a union leader has warned.
Community said the US announcement of tariffs of 266% on Chinese steel contrasted starkly with the "measly" 16% Europe introduced last month.
Commenting ahead of the first meeting of a Government-convened Steel Council, general secretary Roy Rickhuss said: "At every opportunity the Business Secretary says he supports a level playing field for UK steel producers, but his government continues to block moves to scrap the Lesser Duty Rule which stops the European Commission imposing meaningful tariffs to prevent Chinese dumping.
"Unless the Secretary of State is prepared to join others in Europe and stand up for our industry soon the debate will be over as we will have no industry left to save. We are drowning in this flood of Chinese imports and the US action will only serve to divert more Chinese steel towards Europe."
Mr Rickhuss said he will ask Business Secretary Sajid Javid how he intends to respond as another market is closed off to UK producers already "fighting for survival".
"With nearly half of the UK's steel industry employed in Wales, we know all too well the human cost of this to Welsh steel workers and their families.
"The Government is fighting unfair trade practices, helping energy costs and supporting those losing their jobs to find employment.
"But we also need a long-term plan to ensure steel-making is sustainable in Britain for decades to come. Steel companies and unions need to be part of that solution, and that's why today's Steel Council is so important."
Gareth Stace, director of trade body UK Steel, said: "The US is showing the way in which to deal with under-priced, unfairly traded and state-supported imports from China.
"It is acting decisively, swiftly and at a level that stops China dumping steel with impunity. By contrast, the meek and mild response in the EU is looking increasingly inadequate.
"It begs the question why the UK Government continues to block EU-level attempts to impose higher tariffs. The UK must lift its opposition to the Lesser Duty Rule so that the EU can aspire to Uncle Sam's strong stance and stand up to the increasing threat posed by China.
"Warm words and limited incremental action are not enough given the crisis conditions faced by steel makers across Europe today." |
---
abstract: 'The explosive growth and increasing sophistication of Android malware call for new defensive techniques that are capable of protecting mobile users against novel threats. In this paper, we first extract the runtime Application Programming Interface (API) call sequences from Android apps, and then analyze higher-level semantic relations within the ecosystem to comprehensively characterize the apps. To model different types of entities (i.e., *app*, *API*, *IMEI*, *signature*, *affiliation*) and the rich semantic relations among them, we then construct a structural heterogeneous information network (HIN) and present meta-path based approach to depict the relatedness over apps. To efficiently classify nodes (e.g., apps) in the constructed HIN, we propose the *HinLearning* method to first obtain in-sample node embeddings and then learn representations of out-of-sample nodes without rerunning/adjusting HIN embeddings at the first attempt. Afterwards, we design a deep neural network (DNN) classifier taking the learned HIN representations as inputs for Android malware detection. A comprehensive experimental study on the large-scale real sample collections from Tencent Security Lab is performed to compare various baselines. Promising experimental results demonstrate that our developed system *AiDroid* which integrates our proposed method outperforms others in real-time Android malware detection. *AiDroid* has already been incorporated into Tencent Mobile Security product that serves millions of users worldwide.'
author:
- |
\
$^{1}$Department of Computer Science and Electrical Engineering\
West Virginia University, Morgantown, WV, USA\
yanfang.ye@mail.wvu.edu, {shhou, lgchen}@mix.wvu.edu\
$^{2}$Tencent Security Lab, Tencent, Guangdong, China\
{lingfonglei, johnnywan, luciferwang, keonxiong, joeyshao}@tencent.com\
bibliography:
- 'AiDroid\_Ye.bib'
title: '*AiDroid*: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection'
---
1. Introduction
===============
Due to the mobility and ever expanding capabilities, smart phones have become increasingly ubiquitous in people’s everyday life performing tasks such as social networking, online banking, and entertainment. Android, as an open source and customizable operating system (OS) for smart phones, is currently dominating the smart phone market by 77.32% [@Statcounter:2018]. However, due to its large market share and open source ecosystem of development, Android attracts not only the developers for producing legitimate Android applications (apps), but also attackers to disseminate malware (***mal***icious soft***ware***) that deliberately fulfills the harmful intent to the smart phone users (e.g., stealing user credentials, pushing unwanted apps or advertisements). Because of lacking trustworthiness review methods, developers can easily upload their Android apps including repackaged apps and malware to the official marketplace (i.e., Google Play). The presence of other third-party Android markets (e.g., Opera Mobile Store, Wandoujia) makes this problem worse. Driven by the considerable economic profits, there has been explosive growth of Android malware which posed serious threats to the smart phone users - i.e., it’s reported that there have been $4,687,008$ newly generated Android malware that infected more than $61$ million smart phones in the first half of 2018 [@TencentSecurityReport]. To evade the detection of mobile security products (e.g., Norton, Lookout and Tencent Mobile Security), Android malware has turned to be increasingly sophisticated. For example, as shown in Figure \[fig:example\], the “TigerEyeing” trojan is a new kind of Command and Control (C&C) malware that pretends to be legitimate apps (e.g., mobile games, system tools) and only executes to perform the profitable tasks on-demand. The explosive growth and increasing sophistication of Android malware call for new defensive techniques that are capable of protecting smart phone users against novel threats.
![Increasingly sophisticated Android malware.[]{data-label="fig:example"}](example.png){width="\linewidth"}
{width="\linewidth"}
To combat the evolving Android malware attacks, by collaboration with smart phone vendors, in this paper, we first extract the Application Programming Interface (API) call sequences from runtime executions of Android apps in users’ smart phones to capture their behaviors. To comprehensively characterize Android apps, we further analyze higher-level semantic relationships within the ecosystem, such as whether two apps have similar behaviors, whether they co-exist in the same smart phone that can be identified by its unique International Mobile Equipment Identity (IMEI) number, whether they are signed by the same developer or produced by the same company (i.e., affiliation), etc. To model such complex relationships, we present a structured heterogeneous information network (HIN) [@sun2012mining] and use meta-path based approach [@Yizhou11] to build up relatednesses over apps. To efficiently classify nodes (e.g., apps) in the constructed HIN, HIN embedding methods [@fu2017hin2vec; @dong2017metapath2vec; @KDD2018] have been proposed. However, most of these existing methods are primarily designed for static networks, where all nodes are known before learning. As our application requires real-time prediction of new coming nodes (i.e., unknown apps) to detect Android malware, it is infeasible to rerun HIN embeddings whenever new nodes arrive, especially considering the fact that rerunning HIN embeddings also results in the need of retraining the downstream classifier. How to efficiently learn the representations of out-of-sample nodes in HIN, i.e. nodes that arrive after the HIN embedding process, remains largely unanswered. To solve this problem, we propose the *HinLearning* method to first obtain in-sample node embeddings and then learn the representations of out-of-sample nodes in HIN, which is capable to preserve the heterogeneous property of HIN and also allows fast and scalable learning. Afterwards, we design a deep neural network (DNN) classifier leveraging the advantages of convolutional neural networks (CNNs) and Inception for Android malware detection. We develop a system *AiDroid* for real-time Android malware detection, which has the following major traits:
- Besides runtime behaviors extracted from Android apps, we further analyze the complex relationships within the ecosystem (i.e., *app-API*, *app-IMEI*, *app-signature*, *app-affiliation*, *IMEI-signature*, *IMEI-affiliation* relations) to characterize Android apps. We then present HIN to represent the Android apps and exploit meta-path based approach to depict the relatednesses over apps. This provides a comprehensive solution that is capable to be more resilient against Android malware’s evasion tactics.
- We are the first to propose the method (denoted as *HinLearning*) to efficiently learn the representations for out-of-sample nodes in HIN using in-sample node embeddings while without rerunning/adjusting them, which makes the downstream classifier feasible for classifying new arriving nodes (e.g., apps) without retraining. Though it’s proposed for real-time Android malware detection, the *HinLearning* method is a general framework which is able to learn desirable node representations in HIN (i.e., including in-sample and out-of-sample nodes) and thus can be further applied to various speed-sensitive dynamic network mining tasks (e.g., node classification, clustering).
- We provide a comprehensive experimental study based on the large-scale real sample collections from Tencent Security Lab, which demonstrates the effectiveness and efficiency of our developed system *AiDroid*. It has already been incorporated into Tencent Mobile Security product that server millions of users worldwide.
2. System Overview {#systemArt}
==================
The overview of our developed system *AiDroid* for real-time Android malware detection is shown in Figure \[fig:system\], mainly consisting of the following components:
- **Feature Extractor.** Through the installed Tencent Mobile Security product, smart phone users can upload the extracted API call sequences of Android apps as well as the meta-data to *AiDroid*. It will then analyze various relationships among different types of entities (i.e., *app*, *API*, *IMEI*, *signature*, *affiliation*) to depict the Android apps. (See Section 3.1. for details.)
- **HIN Constructor.** In this module, based on the features extracted from the previous component, a structural HIN is first presented to model the relationships among different types of entities; and then different meta-paths are built from the HIN to capture the relatedness over apps from different views (i.e., with different semantic meanings). (See Section 3.2. for details.)
- **HIN Representation Learner.** In *HinLearning*, based on the meta-path schemes built from the previous module, a heterogeneous in-sample node embedding method HINE is first proposed to learn the low-dimensional representations for in-sample nodes in HIN; then, Hin2Img method is devised to learn representations of out-of-sample nodes using learned in-sample node embeddings, which is also capable to enrich representations of in-sample nodes. (See Section 3.3. for details.)
- **DNN Classifier.** After representation learning using *HinLearning*, the learned representations of in-sample nodes with type of app will be fed to the designed DNN (see Section 3.4. for details) to train the classification model, based on which new arriving nodes (i.e., out-of-sample nodes with type of app) can be predicted as either benign or malicious.
3. Proposed Method {#method}
==================
In this section, we introduce the detailed approaches of how we represent the Android apps, and how to solve Android malware detection (i.e., classification) problem based on the representations.
3.1. Feature Extraction {#FeatureExtraction}
-----------------------
**Dynamic Behavior Extraction.** API calls are used by Android apps in order to access Android OS functionality and system resources. Therefore, we extract the sequences of API calls in the application framework from runtime executions of Android apps to capture their behaviors. For example, a sequence of API calls (*StartActivity*, *checkConnect*, *getPhoneInfo*, *receiveMsg*, *sendMsg*, *finishActivity*) extracted from the previous mentioned “TigerEyeing” trojan represents its typical behaviors of connecting to the C&C server in order to fetch the configuration information; while another sequence of its extracted API calls (*startActivity*, *checkConnect*, *sendSMS*, *finishActivity*) denotes its intention of sending SMS messages without user’s concern. Note that, to simplify the further computation, each API call in the extracted sequences will be mapped to an integer ID.
**Relation-based Feature Extraction.** Besides the API call sequences extracted from an Android app that can be used to represent its behaviors, to detect the increasingly sophisticated Android malware, we further consider the following kinds of relationships.
- ***R1***: To describe the relation between an app and an API call it invokes during runtime execution, we build the ***app-invoke-API*** matrix ${\bf I}$ where each element $i_{i,j} \in \{0,1\} $ denotes if app *i* invokes API call *j*.
- ***R2***: To describe the relation that an app exists (i.e., is installed) in a smart phone (i.e., IMEI), we generate the ***app-exist-IMEI*** matrix ${\bf E}$ where each element $ e_{i,j} \in \{0,1\} $ means if app *i* exists in phone *j*.
- ***R3***: Every app run on the Android platform must be signed by the developer. To depict such relationship, we build the ***app-certify-signature*** matrix ${\bf C}$ whose element $ c_{i,j} \in \{0,1\} $ denotes if app *i* is certified by signature *j*.
- ***R4***: Package name (a.k.a. Google Play ID) is the unique identifier for an Android app. Companies conventionally use their reversed domain name to begin their package names (e.g., “com.tencent.mobileqq”). We extract the domain name from the package name to denote the relation between an app (e.g., “mobileqq”) and its affiliation (e.g., “tencent.com”); and then we generate the ***app-associate-affiliation*** matrix ${\bf A}$ where each element $ a_{i,j} \in \{0,1\} $ indicates whether app *i* is associated with affiliation *j*.
- ***R5***: To represent the relation that a smart phone has a set of apps signed by a particular developer, we create the ***IMEI-have-signature*** matrix ${\bf H}$ where each element $h_{i,j} \in \{0,1\} $ denotes if smart phone *i* has signature *j*.
- ***R6***: To denote the relation that a smart phone installs a set of apps associated with a specific affiliation, we generate the ***IMEI-possess-affiliation*** matrix ${\bf P}$ where each element $ p_{i,j} \in \{0,1\} $ denotes whether smart phone *i* possesses affiliation *j*.
3.2. HIN Construction {#subsec:hin}
---------------------
In order to depict apps, APIs, IMEIs, signatures and affiliations as well as the rich relationships among them (i.e., *R1*-*R6*), it is important to model them in a proper way so that different kinds of relations can be better and easier handled. We introduce how to use HIN, which is capable to be composed of different types of entities and relations, to represent the apps by using the features extracted above. We first present the concepts related to HIN as follows.
A ***heterogeneous information network (HIN)*** [@sun2012mining] is defined as a graph ${\mathcal G} = ({\mathcal V}, {\mathcal E})$ with an entity type mapping $\phi$: ${\mathcal V} \to \mathcal A$ and a relation type mapping $\psi$: ${\mathcal E} \to \mathcal R$, where ${\mathcal V}$ denotes the entity set and ${\mathcal E}$ is the relation set, $\mathcal A$ denotes the entity type set and $\mathcal R$ is the relation type set, and the number of entity types $|\mathcal A|>1$ or the number of relation types $|\mathcal R|>1$. The ***network schema*** [@sun2012mining] for a HIN $\mathcal G$, denoted as $\mathcal T_{\mathcal G} = (\mathcal A, \mathcal R)$, is a graph with nodes as entity types from $\mathcal A$ and edges as relation types from $\mathcal R$.
HIN not only provides the network structure of the data associations, but also provides a high-level abstraction of the categorical association. For our case, we have five entity types (i.e., app, API, IMEI, package, signature) and six types of relations among them (i.e., *R1*-*R6*). Based on the definitions above, the network schema for HIN in our application is shown in Figure \[fig:networkschema\], which enables the apps to be represented in a comprehensive way that utilizes their semantic and structural information.
![Network schema for HIN in our application.[]{data-label="fig:networkschema"}](schema.png){width="0.85\linewidth"}
To formulate the relatedness among entities in HIN, the concept of meta-path has been proposed [@Yizhou11]: a ***meta-path*** $ \mathcal{P} $ is a path defined on the graph of network schema $\mathcal T_{\mathcal G}=(\mathcal{A, R}) $, and is denoted in the form of $ A_{1} \xrightarrow{R_{1}} A_{2} \xrightarrow{R_{2}} ... \xrightarrow{R_{L}} A_{L+1} $, which defines a composite relation $R = R_1 \cdot R_2 \cdot \ldots \cdot R_L$ between types $A_1$ and $A_{L+1}$, where $\cdot$ denotes relation composition operator, and $L$ is length of $\mathcal P$. In our application, based on the HIN schema shown in Figure \[fig:networkschema\], incorporated the domain knowledge from anti-malware experts, we design six meaningful meta-paths to characterize the relatedness over apps at different views (i.e., *PID1-PID6* shown in Figure \[fig:metapaths\]).
![Meta-paths built for Android malware detection (the symbols are the abbreviations shown in Figure \[fig:networkschema\]).[]{data-label="fig:metapaths"}](metapaths.png){width="0.85\linewidth"}
For example, *PID1* depicts that two apps are related if they both invoke the same API (e.g., two malicious mobile video players both invoke the API of “*requestAudioFocus*”); while *PID5* describes that two apps are connected if their associated affiliations are possessed by (i.e., co-occur in) the same phone. To measure the relatedness over HIN entities (e.g., apps), traditional representation learning for HIN [@Yizhou11] mainly focuses on factorizing the matrix (e.g., adjacency matrix) of a HIN to generate latent-dimension features for the nodes in this HIN. However, the computational cost of decomposing a large-scale matrix is usually very expensive, and also suffers from its statistical performance drawback [@grover2016node2vec]. Since Android malware detection is a speed sensitive application and requires cost-effective solutions, scalable representation learning method for HIN, especially for out-of-sample nodes, is in need.
3.3. *HinLearning*: Representation Learning of In-Sample and Out-of-Sample Nodes in HIN {#subsec:detection}
---------------------------------------------------------------------------------------
To address the above challenge, we first formalize the problem of HIN representation learning as follow.
***HIN Representation Learning*** [@fu2017hin2vec; @dong2017metapath2vec]. Given a HIN ${\mathcal G} = ({\mathcal V}, {\mathcal E})$, the representation learning task is to learn a function $f: \mathcal{V} \rightarrow \mathbb{R}^d $ that maps each node $v \in \mathcal{V}$ to a vector in a *d*-dimensional space $ \mathbb{R}^d $, $d\ll |\mathcal V| $ that are capable to preserve the structural and semantic relations among them.
To solve the problem of HIN representation learning, due to the heterogeneous property of HIN (i.e., network consisting of multi-typed entities and relations), it is difficult to directly apply the conventional homogeneous network embedding techniques (e.g., DeepWalk [@perozzi2014deepwalk], LINE [@tang2015line], node2vec [@grover2016node2vec]) to learn the latent representations for HIN. To address this issue, HIN embedding methods [@fu2017hin2vec; @dong2017metapath2vec; @KDD2018] have been proposed, which are capable to preserve the semantic and structural correlations between different types of nodes . However, most of these existing methods are primarily designed for static networks, where all nodes are known before learning. In our application (i.e., real-time Android malware detection), it is infeasible to rerun HIN embeddings whenever new nodes arrive, especially considering the fact that rerunning HIN embeddings also results in the need of retraining the downstream classifier. How to efficiently learn the representations of out-of-sample nodes in HIN, i.e. nodes that arrive after the HIN embedding process, remains largely unanswered. To solve this problem, we first propose heterogeneous in-sample node embedding (HINE) model to learn in-sample node embeddings that is able to preserve the heterogeneous property of HIN; then, we devise Hin2Img to learn out-of-sample node representations and also enrich in-sample node representations using previous learned in-sample node embeddings without rerunning/adjusting HIN embeddings.
**HINE: Heterogeneous In-sample Node Embedding.** We first propose a random walk strategy guided by different meta-paths to map the word-context concept in a text corpus into a HIN; then we exploit skip-gram to learn effective in-sample node representations for a HIN.
Given a source node $v_j$ in a homogeneous network, the traditional random walk is a stochastic process with random variables $v_j^1, v_j^2,...,v_j^k$ such that $v_j^{k+1}$ is a node chosen at random from the neighbors of node $v_k$. The transition probability $p(v_j^{i+1}|v_j^i)$ at step $i$ is the normalized probability distributed over the neighbors of $ v_j^i $ by ignoring their node types. However, this mechanism is unable to capture the semantic and structural correlations among different types of nodes in a HIN. Here, we show how we use different built meta-paths to guide the random walker in a HIN to generate the paths of multiple types of nodes. Given a HIN ${\mathcal G} = ({\mathcal V}, {\mathcal E})$ with schema $\mathcal T_{\mathcal G} = (\mathcal A, \mathcal R)$, and a set of different meta-paths $\mathcal{S} = \{\mathcal{P}_{j}\}^{n}_{j=1}$, each of which is in the form of $A_{1} \rightarrow ... A_{t} \rightarrow A_{t+1} ... \rightarrow A_{l}$, we put a random walker to traverse the HIN. The random walker will first randomly choose a meta-path $\mathcal{P}_{k}$ from $\mathcal{S}$ and the transition probabilities at step *i* are defined as:
$$\label{eq:randomwalk}
\small
\begin{split}
&p(v^{i+1}|v_{A_{t}}^{i}, \mathcal{S}) = \\
&\begin{cases}
\frac{\lambda}{|\mathcal{S}|}\frac{1}{|N_{A_{t+1}}(v_{A_{t}}^{i})|} \\
\ \ \ \ \ \ \ \ \ \mathrm{if}\ (v^{i+1},v^{i}_{A_{t}}) \in \mathcal{E},\phi(v^{i}_{A_{t}}) = A_{app}, \phi(v^{i+1}) = A_{t+1}\\
\frac{1}{|N_{A_{t+1}}(v_{A_{t}}^{i})|} \\
\qquad\qquad\quad \qquad\qquad\mathrm{if}\ (v^{i+1},v^{i}_{A_{t}}) \in \mathcal{E},\phi(v^{i}_{A_{t}}) \ne A_{app}, \\
\qquad\qquad\quad\qquad \ \ \ \ \ \ \ \phi(v^{i+1}) = A_{t+1}, (A_{t},A_{t+1}) \in \mathcal{P}_{k} \\
0 \qquad\qquad\quad \qquad\qquad\quad \qquad\quad \qquad \qquad\ \ \ \operatorname{otherwise},
\end{cases}
\end{split}$$
where $\phi$ is the node type mapping function, $N_{A_{t+1}}(v_{A_{t}}^{i})$ denotes the $A_{t+1}$ type of neighborhood of node $v_{A_{t}}^{i}$, $A_{app}$ is entity type of *app*, and $\lambda$ is the number of meta-paths starting with $A_{app} \rightarrow A_{t+1}$ in the given meta-path set $\mathcal{S}$. The walk paths generated by the above strategy are able to preserve both the semantic and structural relations between different types of nodes in the HIN.
After mapping the word-context concept in a text corpus into a HIN via the above proposed meta-path guided random walk strategy (i.e., a sentence in the corpus corresponds to a sampled path and a word corresponds to a node), skip-gram [@word2vec; @perozzi2014deepwalk] is then applied on the paths to minimize the loss of observing a node’s neighbourhood (within a window *w*) conditioned on its current representation. The objective function of skip-gram is:
$$\label{eq:log}
\arg\min_{X}\sum_{-w\leq k\leq w, j\neq k} -\log p(v_{j+k}|X(v_j)),$$
where $X(v_j)$ is the current representation vector of $v_j$, and $p(v_{j+k}|X(v_j))$ is defined using the softmax function: $$\label{eq:softmax}
p(v_{j+k}|X(v_j))=\dfrac{\exp(X(v_{j+k})\cdot X(v_j))}{\sum_{q=1}^{|\mathcal{V}|} \exp(X(v_q)\cdot X(v_j))}.$$ Due to its efficiency, we first apply hierarchical softmax technique [@mikolov2013distributed] to solve Eq. \[eq:softmax\], and employ the stochastic gradient descent to train the skip-gram.
**Hin2Img: Out-of-sample node representation learning.** Can we use in-sample node embeddings learned by the above proposed HINE to efficiently learn representations of out-of-sample nodes in HIN and also enrich in-sample node representations? To answer this question, we first present the concept of $k$-order neighbors in HIN as following.
***k-order Neighbors in HIN***. Given a HIN ${\mathcal G} = ({\mathcal V}, {\mathcal E})$, let 1-order neighbors of a node $v_{i} \in {\mathcal V}$ be $S^{(1)}(v_{i})$ so that $S^{(1)}(v_{i}) = \{v_{j}|(v_{i}, v_{j}) \in {\mathcal E}\}$; then, $k$-order neighbors $S^{(k)}(v_{i})$ of a node $v_{i}$ ($k > 1$) can be denoted as $S^{(k)}(v_{i}) = \{S^{(1)}(v_{z})\setminus S^{(k-2)}(v_{i}), v_{z} \in S^{(k-1)}(v_{i})\}$.
By the above definition, each node (i.e., either in-sample or out-of-sample) in HIN is represented by the following representation matrix:
$$\label{eq:X}
\mathbf{X}(v_{i}) = [X(v_{i}), X(S^{(1)}(v_{i})),..., X(S^{(k)}(v_{i}))],$$
where $\mathbf{X} \in \mathbb{R}^{t \times d}$, each of which denotes $d$-dimensional node embedding. In our application, as illustrated in Figure \[fig:testing\], for each $k$, we exploit breadth-first search (BFS) method to find the $t_{k}$ neighbors in the order of type app, signature, package, IMEI and API, and $t = 1 + \sum_{1}^{k} t_{k}$. Empirically we found $k = 2$ and $t = d$ perform the best in our application, and apply them to our problem throughout the paper. Note that we zero-pad the representation matrix in the corresponding rows when the node embeddings cannot be found (i.e., out-of-sample nodes) or $t < d$.
![*HinLearning*: node representation learning in HIN.[]{data-label="fig:testing"}](testing.png){width="\linewidth"}
Based on the in-sample node embeddings which can be learned offline using the proposed HINE, when a new node (e.g., a testing app) arrives, it only take $O(t \times d)$ time to obtain its representation using the proposed Hin2Img; furthermore, the representation learning for the new arriving node doesn’t require rerunning HIN embeddings, which makes the downstream classifier workable for classifying the new arriving node without retraining.
3.4. Deep Neural Network
------------------------
CNNs [@LeCun_Nature_2015] have achieved great success in learning salient features for classification tasks; while the crafty architecture of Inception [@szegedy2015going] has shown high performance and low computational cost under strict constraints on memory and computational budget. Therefore, taking the generated representations of Android apps from previous section as inputs, we devise our deep learning framework leveraging the advantages of CNNs and Inception for real-time detection of Android malware, which is illustrated in Figure \[fig:hincnn\]. In our designed DNN, for training, we take the generated $t \times d$ representation matrix $\mathbf{X}$ of each in-sample node (with type of app) in HIN as input fed to the multilayer architecture to learn the higher level concept. In this multilayer architecture, the designed DNN first stacks pairs of convolutional layers and normalization layers with different filter sizes and strides followed by maxpoolings to capture universal features, such as curves and edges [@huang2018cost]. It then comes with an Inception module [@szegedy2015going] to generate more task-specific features, such as discriminative properties for malicious and benign apps. In the Inception module, the general features will be passed through the mixture of convolutional layers in parallel to take advantage of multi-level feature extraction, in which $1\times1$ convolutions and $3\times3$ maxpooling are configured for dimensionality reduction prior to $1\times1$, $3\times3$, and $5\times5$ convolutions that are used for feature learning, followed by a concatenation layer to concatenate the resulting feature representations. After the global maxpooling, based on a pair of fully connected layer and a softmax layer, the designed DNN will train the model for classifying any new arriving node (i.e., out-of-sample node with type of app represented as a $t \times d$ matrix $\mathbf{X}$) as either benign or malicious.
![Our designed DNN for malware detection.[]{data-label="fig:hincnn"}](hincnn.png){width="\linewidth"}
Algorithm \[alg:algorithm\] illustrates the implementation of our developed system *AiDroid* which integrates the above proposed method in detail.
Learn in-sample node embeddings $X(v_{i}) \in \mathbb{R}^d$ ($i = 1, ..., |{\mathcal V}|$) using HINE Train DNN using $\mathbf{X}$s $\in \mathbb{R}^{t \times d}$ return $\mathbf{y}$
4. Experimental Results and Analysis {#experiment}
====================================
In this section, we fully evaluate the performance of our developed system *AiDroid* for Android malware detection.
4.1. Data Collection
--------------------
We obtain the large-scale real sample collection from Tencent Security Lab, which contains 190,696 training app (i.e., 83,784 benign and 106,912 malicious). After feature extraction and based on the designed network schema, the constructed HIN has 286,421 nodes (i.e., 190,696 nodes with type of app, 331 nodes with type of API, 70,187 nodes with type of IMEI, 8,499 nodes with type of signature, and 16,708 with type of affiliation) and 4,170,047 edges including relations of *R1*-*R6*. The new coming 17,746 unknown apps are used as testing data (to obtain the ground truth, they are further analyzed by the anti-malware experts, 13,313 of which are labeled as benign and 4,433 are malicious).
4.2. Baseline Methods
---------------------
We validate the performance of our proposed method in *AiDroid* for Android malware detection by comparisons with different groups of baseline methods.
First, based on the constructed HIN described above, we evaluate our proposed HIN representation learn method *HinLearning* by comparisons with following baselines.
**In-sample node embedding.** We compare our proposed HINE with other network embedding methods including:
- **DeepWalk** and **LINE**: For DeepWalk [@perozzi2014deepwalk] and LINE [@tang2015line], we ignore the heterogeneous property of HIN and directly feed the HIN for embedding.
- **metapath2vec**: We use each meta-path scheme separately to guide random walks in metapath2vec [@dong2017metapath2vec].
For HINE, we divide the designed meta-paths into three sets (i.e., $\mathcal{S}_{1}$ = $\{$*PID1*$\}$, $\mathcal{S}_{2}$ = $\{$*PID3, PID4*$\}$, $\mathcal{S}_{3}$ = $\{$*PID2, PID5, PID6*$\}$) and use the proposed strategy to guide random walks. The parameter settings used for HINE are in line with DeepWalk, LINE and metapath2vec, which are empirically set as: vector dimension $d = 64$ (LINE: 64 for each order (1st- and 2nd-order)), walks per node $r = 20$, walk length $l = 50$ and window size $w = 5$.
**Out-of-sample node representation learning.** We compare our proposed Hin2Img for out-of-sample node representation learning with following baselines:
- **LocalAvg**: The out-of-sample nodes are represented by averaging embeddings of neighboring in-sample nodes.
- **LabelProp**: Label propagation proposed for multivariate regression problem can be used to learn the representations of out-of-sample nodes. As it has been demonstrated [@ma2018depthlgp] that the vanilla version of label propagation [@vanillaLP] outperforms others, we hence use it as a baseline.
- **Rerunning**: For comparisons, we also run a baseline by rerunning all node embeddings when new nodes arrive.
Second, we evaluate different types of features for Android malware detection. Our proposed method is general for HINs. Thus, a natural baseline is to see whether the knowledge we add in should be represented as HIN instead of other features. Here we compare two types of features: behavioral sequences and HIN-based features.
- **Behavioral Sequences (*f-1*)**: We devise three baselines based on the extracted API call sequences of Android apps: (1) we build support vector machine (SVM) classifier based on binary (i.e., if an API call is invoked by an app) feature vectors (i.e., Bin+SVM); (2) we exploit Long Short-term Memory (LSTM) [@Sutskever] for sequence modeling, based on which SVM classifier is then built (i.e., LSTM+SVM); and (3) we also train our proposed DNN based on the extracted API call sequences for evaluation (i.e., Seq+DNN).
- **HIN-based Features (*f-2*)**: Based on the constructed HIN, the proposed *HinLearning* is applied for representation learning (i.e., both in-sample and out-of-sample nodes), based on which the designed DNN is used to train the classification model for prediction (i.e., *AiDroid*).
4.3. Comparisons and Analysis
-----------------------------
Based on the HIN constructed from the training data, using the developed DNN as downstream classifier and the new coming nodes (i.e., apps) for testing, from Table \[table:comparisons1\], we can observe that different combinations of in-sample node embedding and out-of-sample representation learning show different performances in Android malware detection: (1) For in-sample node embedding methods, our proposed HINE outperforms all baselines in terms of *ACC* and *F1*. That is to say, HINE learns significantly better node (i.e., app) representation in HIN than current state-of-the-art methods. The success of HINE lies in the proper consideration and accommodation of the heterogeneous property of HIN (i.e., the multiple types of nodes and relations), and the advantage of random walk guided by different meta-paths for sampling the node paths. (2) For out-of-sample representation learning, our proposed Hin2Img consistently and significantly outperforms all baselines (i.e., the detection performance achieve superb 0.9908 *ACC* and 0.9817 *F1*), which even surpasses the rerunning HIN embeddings. Obviously, $t \times d$ representation matrices learned by Hin2Img utilizing 1- and 2-order neighbors are more expressive than other embeddings in depicting the apps for the problem of real-time Android malware detection.
\[table:comparisons1\] =1.5pt
------------- --------------- -------------- --------------- ----------------- --------
[In-sample]{}
(lr)[3-5]{} [Embedding]{} [LocalAvg]{} [LabelProp]{} [**Hin2Img**]{}
DeepWalk 0.9057 0.9214 0.9506 0.9516
LINE 0.9111 0.9307 0.9690 0.9602
metapath2vec 0.9289 0.9448 0.9799 0.9722
**HINE** 0.9389 0.9533 **0.9908** 0.9843
DeepWalk 0.8267 0.8547 0.9055 0.9076
LINE 0.8364 0.8705 0.9398 0.9234
metapath2vec 0.8669 0.8954 0.9606 0.9459
**HINE** 0.8849 0.9094 **0.9817** 0.9691
------------- --------------- -------------- --------------- ----------------- --------
: Comparisons of different methods.
We also show the comparisons in Table \[table:comparisons2\] for different features in Android malware detection. From the results, we can see that: (1) Based on the extracted API call sequences (i.e., *f-1*), LSTM provides significant improvement in sequence modeling while our proposed DNN outperforms others in detection Android malware. (2) Compared with content-based features only, HIN-based features (i.e., *f-2*) indeed perform better. The reason behind this is that HIN-based features are more expressive to characterize a complex and comprehensive relatednesses over apps through the designed meta-paths which consist of not only relationships between apps and their invoked API calls, but also higher-level semantics within the ecosystem.
\[table:comparisons2\] =2.5pt
Feature Method TP TN FP FN
----------- --------------- -------- ----------- -------- --------
Bin+SVM 3,926 11,828 1,485 507
LSTM+SVM 4,115 12,339 974 318
Seq+DNN 4,168 12,504 809 265
***f-2*** ***AiDroid*** 4,395 13,188 125 38
Feature Method Recall Precision ACC F1
Bin+SVM 0.8856 0.7255 0.8877 0.7976
LSTM+SVM 0.9282 0.8086 0.9271 0.8642
Seq+DNN 0.9402 0.8374 0.9394 0.8858
***f-2*** ***AiDroid*** 0.9914 0.9723 0.9908 0.9817
: Comparisons of different types of features.
4.4. Parameter Sensitivity, Scalability and Stability
-----------------------------------------------------
In this set of experiments, we systematically evaluate the parameter sensitivity, scalability and stability of our developed system *AiDroid*. We first examine how latent dimensions (*d*) and neighborhood size (*w*) affect the performance in Android malware detection. As shown in Figure \[fig:experiment\].(a) and (b), we can see that *AiDroid* is not strictly sensitive to these parameters and is able to reach high performance under a cost-effective parameter choice. We then run the experiments using new arriving apps from Aug. 1-10, 2018 to assess the average detection time and accuracy. Figure \[fig:experiment\].(c) and (d) demonstrate *AiDroid* is scalable and stable over a long time span in detecting newly generated Android malware (i.e., average prediction time: 4.3 ms/app and 0.9891 ACC on average). Figure \[fig:experiment\].(e) shows the ROC curve of *AiDroid* based on the data described in Section 4.1 which achieves an impressive 0.9914 true positive rate (*TPR*) at 0.0094 false positive rate (*FPR*). We can conclude that *AiDroid* is indeed feasible in practical use for real-time Android malware detection.
![Parameter sensitivity, scalability and stability.[]{data-label="fig:experiment"}](experiment.png){width="0.98\linewidth"}
5. Related Work {#relatedwork}
===============
In recent years, there have been ample research studies on developing intelligent Android malware detection systems using machine learning and data mining techniques [@DroidMat; @DroidDolphin; @DroidDelver:2016; @chen2017securedroid; @Ye:CSUR; @Madam_2018]. For example, DroidDolphin [@DroidDolphin] built classifiers based on dynamic analysis, while DroidMat [@DroidMat] and DroidMiner [@DroidMiner] constructed their models based on static analysis. However, most of the existing systems merely utilize content-based features for the detection. To further address the challenges of Android malware detection, in our preliminary work, HinDroid [@hou2017hindroid] was proposed which considered higher-level semantic relations among apps and APIs and introduced HIN for the first time in Android malware detection; but HinDroid was primarily designed for static HIN without considering new arriving nodes.
To solve the problem of network representation learning, after DeepWalk [@perozzi2014deepwalk], LINE [@tang2015line] and node2vec [@grover2016node2vec] that were proposed for homogeneous network embedding, HIN2vec [@fu2017hin2vec], metapath2vec [@dong2017metapath2vec], metagraph2vec [@KDD2018], and PME [@PME_KDD2018] have been proposed for HIN representation learning. However, few of them can deal with out-of-sample nodes, i.e., nodes that arrive after the HIN embedding process. Though algorithms [@chang2015heterogeneous; @zhao2018optimization] have been proposed to infer embeddings for out-of-sample nodes in HIN, they necessitate adjusting in-sample node embeddings and also the downstream classifier retraining. Efficient representation learning for out-of-sample nodes in HIN without rerunning/adjusting HIN embeddings is in need for our application in real-time Android malware detection.
6. Conclusion
=============
To combat the evolving Android malware attacks, in this paper, we first extract the API call sequences from runtime executions of Android apps and further analyze higher-level semantic relationships within the ecosystem. To depict such complex relations, we introduce HIN for modeling and use meta-path based approach to build up relatednesses over apps. To efficiently classify nodes (i.e., apps) in HIN, we propose the *HinLearning* method to first gain in-sample node embeddings and then learn representations of out-of-sample nodes without rerunning/adjusting HIN embeddings for the first time. Afterwards, we design a DNN classifier leveraging the advantages of CNNs and Inception for Android malware detection. A comprehensive experimental study on the large-scale real data collections from Tencent Security Lab is performed to compare various baselines. Promising experimental results demonstrate that our developed system *AiDroid* outperforms others in real-time Android malware detection, which has been incorporated into Tencent Mobile Security product that serves millions of users worldwide.
Acknowledgement
===============
The authors would also like to thank the anti-malware experts of Tencent Security Lab (Yinming Mei, Yuanhai Luo, Hong Yi, and Kui Wang) for helpful discussion and implementation. Y. Ye, S. Hou, and L. Chen’s work is partially supported by the U.S. National Science Foundation under grants CNS-1618629, CNS-1814825 and OAC-1839909, WV HEPC.dsr.18.5, and WVU Research and Scholarship Advancement Grant (R-844).
|
Q:
Why are not some of the constant fields in java enum values?
The documentation about the ScrollPane uses no enum values for the scrollbar policy (and neither does any other class for constant field values), is there a reason for that?
Is there a more in depth meaning of the values for these constant field values or are they just in ascending order? Because in my opinion having a constructor like public ScrollPane(int scrollbarDisplayPolicy) looks not as meaningful as for example public ScrollPane(ScrollPane.ScrollbarDisplayPolicy scrollbarDisplayPolicy)
Or is this just to have not multiple enums with only a few values?
A:
The answer is simple: enums were only introduced in Java 5 and these constants are older than that.
Unfortunately there is no way to retro-fit the API without breaking code compatibility. (Retro-fitting an API for new features sounds an impossible task in general, but an example of when this was possible is the introduction of generics, also in Java 5.)
|
A Quarter-Century After Primary Direct Arterial Switch Operation: Four-D-Flow MRI Video Imaging of Blood Flow Dynamics Outcomes.
Four-dimensional (4-D) flow magnetic resonance imaging (MRI) examination was performed 25 years after a neonatal direct arterial switch operation for simple transposition of the great arteries. The 4-D flow MRI video shows physiological spiral anatomical configuration and laminar streamlines in the great arteries. |
The action of lithium carbonate on the sleep-waking cycle in the cat.
The therapeutic effect of lithium carbonate on manic-depressive psychosis is now universally recognized. In view of this positive action on the cyclic endogenous manifestations, it was interesting to investigate the possible effects of lithium on the sleep-waking cycle in the cat. Polygraphic recording from three adults cats was carried out during 24 h periods before, and on different days after, beginning treatment with lithium carbonate. With low doses (30 and 50 mg/kg/day), important morphological changes were observed 5 days later while a new balance of the sleep-waking stages occurred. The EEG of each stage was characterized by slowing and amplitude increase of the different frequencies. The rhythms which appeared in long runs during quiet wakefulness and paradoxical sleep (PS) in the somaethetic cortex (mu rhythm) and the visual areas (alpha rhythm) were increased, slowed and almost continuously present. From the quantitative point of view, the percentage of time of deep slow wave sleep (DSWS) was increased from 38% to 55%. Conversely, the waking and PS times were both reduced, the latter from 18% to 10%. In contrast with human data, the mean duration of PS episodes was unchanged. Furthermore, lithium induced a slight dissociation between EEG activity and waking behaviour. With toxic dose (90 mg/kg/day) all the above changes were again observed, but more conspicuously. During wakefulness and SWS, bursts of generalized paroxysmal events appeared, in frequent association with a myoclonic jerk. SP became atypical and its percentage of time was drastically reduced. |
Q:
Laravel 5.1 - Socialite - Fetching User
Using official Laravel Docs 5.1 - Socialite, I set my routed and edited my AuthController.
public function redirectToProvider()
{
return Socialite::driver('facebook')
->scopes(['public_profile', 'email'])->redirect();
}
It works perfectly and returns
http://domain.dev/auth/facebook/callback?code=AQDLFlYr...
Then I used Laracasts' Socialite - Laravel 5.0, I tried turn my one into a proper Facebook authentication. I did everything until (min. 12.11, specifically) in the video. (At 12.11 he recaps the stuff in 15 sec). This is what I am trying to do.
Now, when I change my AuthController to:
public function redirectToProvider(AuthenticateUser $authenticateUser, Request $request)
{
return $authenticateUser->execute($request->has('code'));
}
...and have my AuthenticateUser class like this:
use Illuminate\Contracts\Auth\Guard; (PS. I changed Authenticator to Guard)
class AuthenticateUser {
private $users;
private $socialite;
private $auth;
public function __construct(UserRepository $users, Socialite $socialite, Guard $auth)
{
$this->users = $users;
$this->socialite = $socialite;
$this->auth = $auth;
}
public function execute($hasCode)
{
// dd($hasCode) *First dd
if ( ! $hasCode) return $this->getAuthorizationFirst();
$user = $this->socialite->driver('facebook')->user();
// dd($hasCode) *Second dd
// dd($user) *Third dd
}
private function getAuthorizationFirst()
{
return $this->socialite->driver('facebook')
->scopes(['public_profile', 'email'])->redirect();
}
}
*UserRepository is currently empty.
When I use *First dd, I receive False on the screen.
When I use *Second dd, I receive True.
When I use *Third dd, I receive nothing.
In all of these instances, now, I am receiving http://domain.dev/auth/facebook?code=9329409329042.
Edit:
I added returnand now the link includes ?code=9390249032..., however when I use *Third dd - dd($user), still nothing gets returned
I managed to come until here:
public function execute($hasCode)
{
dd($hasCode); // returns FALSE now
if ( ! $hasCode) return $this->getAuthorizationFirst();
dd($hasCode); // returns TRUE now
$user = $this->socialite->driver('facebook')->user();
dd($user); // BUT STILL RETURNS NOTHING
}
.. and link includes ?code=9943290...
Basically, $user = $this->socialite->driver('facebook')->user(); is the part not working/converting as dd($user) is not returning anything..
A:
It looks like you might have forgot the return.
return $authenticateUser->execute($request->has('code'));
|
Evaluation of the Biotyper MALDI-TOF MS system for identification of Staphylococcus species.
The Bruker Biotyper MALDI-TOF MS (Biotyper) system, with a modified 30 minute formic acid extraction method, was evaluated by its ability to identify 216 clinical Staphylococcus isolates from the CDC reference collection comprising 23 species previously identified by conventional biochemical tests. 16S rDNA sequence analysis was used to resolve discrepancies. Of these, 209 (96.8%) isolates were correctly identified: 177 (84.7%) isolates had scores ≥2.0, while 32 (15.3%) had scores between 1.70 and 1.99. The Biotyper identification was inconsistent with the biochemical identification for seven (3.2%) isolates, but the Biotyper identifications were confirmed by 16S rDNA analysis. The distribution of low scores was strongly species-dependent, e.g. only 5% of Staphylococcus epidermidis and 4.8% of Staphylococcus aureus isolates scored below 2.0, while 100% of Staphylococcus cohnii, 75% of Staphylococcus sciuri, and 60% of Staphylococcus caprae produced low but accurate Biotyper scores. Our results demonstrate that the Biotyper can reliably identify Staphylococcus species with greater accuracy than conventional biochemicals. Broadening of the reference database by inclusion of additional examples of under-represented species could further optimize Biotyper results. |
Facebook Removed Nearly 3.4 Billion Fake Accounts In 6 Months
Enlarge this image toggle caption Francois Mori/AP Francois Mori/AP
Facebook says it removed 3.39 billion fake accounts from October to March. That's twice the number of fraudulent accounts deleted in the previous six-month period.
In the company's latest Community Standards Enforcement Report, released Thursday, Facebook said nearly all of the fake accounts were caught by artificial intelligence and more human monitoring. They also attributed the skyrocketing number to "automated attacks by bad actors who attempt to create large volumes of accounts at one time."
The fake accounts are roughly a billion more than the 2.4 billion actual people on Facebook worldwide, according to the company's own count.
"Most of these accounts were blocked within minutes of their creation before they could do any harm," Facebook CEO Mark Zuckerberg told reporters in a call on Thursday.
While acknowledging that Facebook "knows that there's a lot of work ahead," Zuckerberg also touted the company's progress in curbing hate speech and graphic violence across the platform.
"We are increasingly catching it before people report it to us," he said, adding that 65% of the hate speech on the site was removed before any users alerted the company. That is an increase from about 24% a year ago, Zuckerberg said.
During the same period, Facebook identified about 83% of posts and comments trying to sell drugs, before the company was informed about them, he added.
Facebook is facing a number of controversies on its platform including election interference, misinformation and privacy concerns. And a growing number of critics, including politicians and one of its co-founders, are calling for the company to be broken up. They argue Facebook, which has acquired Instagram and WhatsApp in recent years, wields far too much power and has a monopoly in the industry. (Facebook is among NPR's financial supporters.)
Chris Hughes, who co-founded the company in 2004, told NPR earlier this month that Zuckerberg "is unaccountable."
"He's unaccountable to his shareholders. He's unaccountable to his users, and he's unaccountable to government. And I think that that's fundamentally un-American. And I think government should step up, break up the company and regulate it," he said.
He added that the company "totally dominates the social networking space."
"Of every dollar that's spent on ads and social networking, 84% goes to Facebook," Hughes said. "If you look at the time spent on the site, you know, the average user [is] spending an hour on Facebook and another 53 minutes on Instagram, not to mention what they're spending on WhatsApp."
Dipayan Ghosh, co-director of the Platform Accountability Project at Harvard University's Kennedy School, previously served as Facebook's privacy and policy adviser. "Without some sort of public transparency into steps the company takes to take down nefarious accounts, we should not conclude it's doing enough," he told NPR.
But on Thursday, Zuckerberg argued the new report is evidence of the company's efforts to be more transparent. He also asserted that breaking up Facebook would only make it harder to quash fake news and phony accounts across the site. |
# c_panama
# County Title
title = c_panama
# Settlements
max_settlements = 5
b_panama_PAN = castle
b_arraijan_PAN = city
b_neuvo_emperador_PAN = temple
#b_san_miguelito_PAN = castle
#b_pacora_PAN = city
# Misc
culture = istmeno
religion = gracia_divina
#History
2600.1.1 = {
b_panama_PAN = ca_shipyard_1
b_panama_PAN = ca_shipyard_2
} |
A key survival strategy of RNA viruses is their ability to populate a diverse sequence space that creates a 'cloud'of potentially beneficial mutations at the population level, affording the viral quasispecies a greater probability of evolving and adapting to new environments and challenges during infection. One established mechanism relies on high mutation rates of viral RNA replication. It is becoming increasingly clear that an additional mechanism to expand the evolutionary repertoire relies on the exchange of genetic material between RNA viruses, as well as with genes from their hosts. Furthermore, these recombination mechanisms may provide viruses with two advantages: (i) purge their genomes of accumulated deleterious changes and (ii) create or spread beneficial combinations of mutations in an efficient manner. Despite its importance, the mechanism of viral recombination is not well-understood. Genetic experiments have suggested that homologous RNA recombination occurs by dissociation of the RNA-dependent RNA polymerase and nascent RNA strand before replication completes, and the re-association of that nascent strand-polymerase complex with another template. However, this mechanism remains largely untested. We propose to combine genetics, biochemistry and ultra-deep sequencing approaches with classical virology experiments in cell culture and animal models to define the mechanism of viral recombination and determine its role in virus evolution and pathogenesis. The central hypothesis in this application is that RNA recombination plays a critical role in the generation of virus diversity and evolution and is critical for viral fitness and pathogenesis. PUBLIC HEALTH RELEVANCE: Enteroviruses are a subfamily of small, pathogenic, icosahedral viruses. They have been associated with many clinically recognized, life-threatening syndromes, including poliomyelitis and polioencephalitis, respiratory illnesses, aseptic meningitis, pleurodynia, gastroenteritis, hepatitis, and acute hemorrhagic conjunctivitis. There are no known treatments for these diseases and the only vaccine available to protect against these diseases is the poliovirus vaccine. Virus evolution is at the core of virus drug resistant, immunological survey escape and pathogenesis. RNA recombination is one of the two mechanisms to generate diversity to power evolution. Understanding RNA recombination will help us to understand virus diversity, evolution and pathogenesis, and it may allow the development of safe and effective vaccines and antiviral drugs. |
Monday, April 10, 2006
Before saying anything I'd be interested in feedback on whether the mathematical symbols below are visible in your browser. Things like right arrow ⇒, infinity ∞ and union ∪.
Anyway, I've been trying to understand exactly what coindunction is all about. In particular I've been trying to figure out exactly what the duality is between induction and coinduction. The problem I was having was that induction and coinduction seemed not to be dual to each other at all, and weirder still, almost every discussion of coindunction that I looked at seemed to completely ignore the issue.
So here's my problem: in order to carry out an induction argument over the naturals, say, we find a predicate on the naturals, P, such that
P(0) and P(n) ⇒ P(s(n))
We can then conclude that P holds for all naturals.
In order to carry out a coindunction argument over the set of streams over A, say, we find a binary relation R (called a bisimulation) such that
R(a,b) ⇒ head(a)=head(b) and R(tail(a),tail(b)).
I can point out a certain amount of duality: The naturals form an initial F-algebra which is a fancy way of saying that they form a least fixed point to some equation, in this case N≅1+N. Here '1' means the type with one element called '*' and '+' is the disjoint union. We have a map s:1+N→N where s(*) = 0 and s(n) = n+1. s canbe thought of as a 'constructor'. Given something of type 1+N it shows how to construct an object of type N from it. Loosely speaking we can now see that induction is about forming a predicate that still holds after we apply a constructor.
Now consider the coinduction over all streams. A stream is a final F-coalgebra which is a fancy way of saying it's a greatest fixed point of the equation S≅A×S. We have a map (head,tail):S→A×S which maps a stream to its head (an element of A) and its tail (another stream). We can think of these as 'destructors' which reduce a stream back down to its component parts. And now we can see that coinduction is essentially about finding a binary predicate that still holds after applying a destructor.
But to my eyes, despite the duality there is a glaring difference: induction is about a unary predicate and coindunction is about a binary predicate. And through no amount of messing about with categories and their opposites was I able to find a way to see a unary predicate to be dual to a binary predicate.
So I gave in and tried to find something on the web about this subject and eventually was led to Bart Jacobs' paper Mongruences and Cofree Coalgebras. Inductive predicates aren't dual to bisimulations at all, rather inductive predicates are dual to what Jacobs calls mongruences. Unsurprisingly, this horrible neologism was dropped in favour of the term τ-invariant or just invariant in later papers. But I'm going to use the term out of sheer perversity.
But this paper still doesn't explicitly talk about coinduction over the naturals leaving me to work out the details. After chasing round the diagrams, including a nice demonstration of left and right adjoint functors (about which I seem to have managed to develop a crude intuition, who said you can't teach an old dog new tricks?) I managed to figure out what I think is the fairly simple definition of a congruence predicate for the naturals.
So instead of working over the naturals we actually work over N'=N∪{∞}, the set of 'conaturals'. The reason is that we are now looking at the final F-coalgebra that is the greatest fixed point to the equation X≅X+1, not the least fixed point. N' is equipped with a map p:N'→1+N' where p(0)=*, p(∞)=&infin and p(n)=n-1 otherwise. With this in mind a coinductive predicate for the conaturals (ie. a mongruence or invariant) turns out to be a P such that
P(n) ⇒ n=0 or n=∞ or P(n-1).
At least I think so. (This could be embarassing.) And now I can see why coinduction talks about bisimulations - mongruences aren't very interesting for the conaturals. Bit of a letdown really!
On the other hand there are some mongruences that are of mild interest in a more general setting. For example consider a finite state automaton with some terminal states. You can define a state to be safe if at no future point it's possible to reach the terminal state. So a state is safe if it isn't terminal and if all of its successor states are safe. If you think of a finite state automaton as a function f:X→(X×O)I, where X is the set of states, I is the set of inputs and O is the set of outputs, then f is a 'destructor' and you can see that this definition fits into the same general pattern for coinductive definitions. So safety is a mongruence.
The obvious next question is: what is the dual of a bisimulation? These are called congruences but I haven't yet worked through the details of what these are.
My next question is this: given an inductive predicate you get to apply "proof by induction". What is the corresponding "proof by coinduction" for the conaturals? I'm not sure there is one. I have a vague sense of what proof by coinduction might look like for a more general mongruence but haven't figured out a non-trivial example yet.
But despite having learned about a concept that was uninteresting, and a proof method that I can't figure out how to apply, I have picked up something useful. The standard notions of proof by induction and proof by coinduction aren't straightforwardly dual to each other. So now I can stop worrying about it and get on with reading Vicious Circles.
It seems ironic that soon after writing this on the subject of 'quoting' code within code I'm facing it as a problem.
In order to make a symbol appear in a post you need to type in the 'quoted' form of it which is turned into the actual symbol.
In order to explain this in detail I need to enter the quoted form of the quoted form. But for some reason the doubly quoted form is being unquoted twice. This is pretty weird behaviour - it makes me wonder of blogger.com iterates your source until it reaches a fixed point. Anyway let me explain how to enter A⇒x⊗y using a quoted form it has no chance of unquoting. You type 'A' followed by ampersand followed by "rArr;x" followed by another ampersand followed by "otimes;y".
I've just stumbled across your post having been struggling with the same issues as you describe in your post. Yes, the conaturals do seem a little disappointing.
Proof by induction relies on the initiality of N as an algebra of F(X) = 1 + X. Any monomorphism into an initial object is an isomorphism. So a predicate carving out a subset of N, and defining a subalgebra is going to have to be the whole of N.
So coinduction ought to rely on the finality of the conaturals, and that any epimorphism out of them will be an isomorphism. Hence the effort to find a binary relation compatible with the destructors. If one exists, it can only relate pairs of the same element. Rutten puts it to use to prove commutativity of addition on the conaturals on page 36 of Universal coalgebra: a theory of systems.
But, as you note, the duality isn't so apparent. There can't be an equivalence relation on the conaturals with more than one element in the same class. So if I have two expressions for conaturals and I suppose they are related, then either I will be led to contradiction by deducing that predecessors of each are related, or else the original conaturals were identical.
Tricky to imagine using it. What if I say that ((sum of i from 1 to n) - s) relates to (1/2 n(n+1) - s), for all n, all 0 less than or equal to s less than n. Then given any such pair, the predecessors of each are obviously related, the only cases to check being when s = n-1.
In that case we check that (sum of i from 1 to n) - n) = (sum of i from 1 to n-1). And (1/2 n(n+1) - n) = (1/2 (n-1)n), and we know that this pair is related.
So equivalence classes must be individuals, hence (sum i from 1 to n) = 1/2 n(n+1). |
Leaving your legacy
Tuesday, November 21, 2006
Do you ever wonder what it is you’re remembered for? What is the one thing people keep in mind after they first meet you? What do your close friends say about you? Any idea what your acquaintances from work and school really thought about you? I wonder about this stuff all the time.
Perhaps I need more jobs to fill my time.
Perhaps I’m being vain. Perhaps a second thought is never given to me. Maybe my interactions with others are quickly overlooked. Would you be disappointed to learn that people forgot about you as quickly as they met you? As I sit and ponder this I then think about how I treat others.
Perhaps I think too much?
How do I interact with others? Do I always treat people with respect? Do I always act in a manner in which I’d be proud? Or my parents would be proud? If someone were to interview the people in my life what would they say? Am I nice, funny, selfish, arrogant, kind, cheerful, cold, insincere? Would they say “oh yeah, Devin was a good guy” or would they say “great guy”? Neither?
I really don’t know what people have, do, and will think about me. I’ve asked some people before but candor is hard to come by. Trust and honesty don’t come easily. Some of the best feedback I’ve received has come from people in drunken stupors. Was everything said true? I’d like to think so, but I really don’t know. So, I sometimes try to play out the documentary illustrating my life. Which details are highlighted? Am I known as the guy who napped? The kid with a bunch of jobs? He never said no. He was too busy for this or that.
Then I go on to think more. I’ve “only” been on the planet for two decades. What is that underlying theme surrounding me and my life? In order to answer that I suppose I’d need a passion. Artists are passionate about their art. Entrepreneurs are passionate about their company. Parents can be passionate about their children. But what are accountants passionate about? What is a geek like myself passionate about?
I wonder about the more successful people I can imagine. Directors. Architects. Musicians. Their passion and their life become one. In fact, other aspects of life suffer. Families are forgotten. Friends disappear. It’s all about the work sometimes.
So, I’m faced with this dichotomy. Fill my life with meaningful relationships? Work hard and with passion towards being the greatest at something? Can you do both? History suggests no. Is life really that simple? A or B? Black or white? |
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef SERVICES_TRACING_RECORDER_H_
#define SERVICES_TRACING_RECORDER_H_
#include <memory>
#include <string>
#include "base/callback_forward.h"
#include "base/logging.h"
#include "base/macros.h"
#include "base/memory/ref_counted.h"
#include "base/memory/weak_ptr.h"
#include "base/values.h"
#include "mojo/public/cpp/bindings/binding.h"
#include "services/tracing/public/mojom/tracing.mojom.h"
namespace tracing {
class Recorder : public mojom::Recorder {
public:
// The tracing service creates instances of the |Recorder| class and send them
// to agents. The agents then use the recorder for sending trace data to the
// tracing service.
//
// |data_is_array| tells the recorder whether the data is of type array or
// string. Chunks of type array are concatenated using a comma as the
// separator; chuunks of type string are concatenated without a separator.
//
// |on_data_change_callback| is run whenever the recorder receives data from
// the agent or when the connection is lost to notify the tracing service of
// the data change.
Recorder(mojom::RecorderRequest request,
mojom::TraceDataType data_type,
const base::RepeatingClosure& on_data_change_callback);
~Recorder() override;
const std::string& data() const { return data_; }
void clear_data() { data_.clear(); }
const base::DictionaryValue& metadata() const { return metadata_; }
bool is_recording() const { return is_recording_; }
mojom::TraceDataType data_type() const { return data_type_; }
private:
friend class RecorderTest; // For testing.
// mojom::Recorder
// These are called by agents for sending trace data to the tracing service.
void AddChunk(const std::string& chunk) override;
void AddMetadata(base::Value metadata) override;
void OnConnectionError();
std::string data_;
base::DictionaryValue metadata_;
bool is_recording_;
mojom::TraceDataType data_type_;
base::RepeatingClosure on_data_change_callback_;
mojo::Binding<mojom::Recorder> binding_;
base::WeakPtrFactory<Recorder> weak_ptr_factory_;
DISALLOW_COPY_AND_ASSIGN(Recorder);
};
} // namespace tracing
#endif // SERVICES_TRACING_RECORDER_H_
|
The Bocci 28 series is a result of a glass blowing technique developed by Omer Arbel whereby air pressure is intermittently introduced into and then removed from an heated and then rapidly cooled glass matrix. The result is a distorted spherical shape with a composed collection of inner shapes, one of which is made of opaque milk glass and houses a low voltage 20watt xenon bulb. Each pendant is unique in composition, diameter and sometimes shape. They can also be customized in a variety of glass color options. The Bocci 28.5 Random can be used as a single fixture or grouped to create dynamic clusters. |
Statistical mechanics of the "Chinese restaurant process": lack of self-averaging, anomalous finite-size effects, and condensation.
The Pitman-Yor, or Chinese restaurant process, is a stochastic process that generates distributions following a power law with exponents lower than 2, as found in numerous physical, biological, technological, and social systems. We discuss its rich behavior with the tools and viewpoint of statistical mechanics. We show that this process invariably gives rise to a condensation, i.e., a distribution dominated by a finite number of classes. We also evaluate thoroughly the finite-size effects, finding that the lack of stationary state and self-averaging of the process creates realization-dependent cutoffs and behavior of the distributions with no equivalent in other statistical mechanical models. |
Quote Center: St. John's Pregame @ Georgetown
COURTESY OF ST. JOHN’S RED STORM ATHLETIC COMMUNICATIONS
St. John’s Head Coach Chris Mullin…
On Tuesday’s win over No. 16/18 Marquette:
“I thought it was a great game. Marquette’s a high-potent offensive team and I thought our defense was good and we stuck to our game plan. The ball moved and we shared the ball. From that loss [at Seton Hall], we made a lot of adjustments on the court and emotionally we moved on, which is important. It was a great win.”
On how the team has grown over the season:
“I think it’s been a steady progress in all areas. In some games, there are things that we do well and there’s something else that we don’t do well and we correct it the next day. That doesn’t mean that it always produces a perfect game, but I think in that particular game [against Marquette], we really concentrated on how we were going to guard them personnel-wise and the players did a really good job on it. We rebound well and most importantly we shared the ball.”
On what impresses him with the consistency of this team:
“I think their preparation has been steady. I think with the veteran leadership we have in Shamorie [Ponds], Justin [Simon], Marvin [Clark II], and Mustapha [Heron], they can basically lead practice by example and the young guys follow through. It’s really a testament to their experience and leadership.”
On their upcoming matchup with Georgetown:
“I watched them last night. They had a great road win at Butler. They’re courageous. They play aggressive. They’re much like Georgetown teams of the past. We’re going to have to keep playing better and better as each game goes along. It’s only going to get tougher as we go along.”
On the how the players and fans treat the rivalry with Georgetown:
“I can speak for myself. I don’t know about the people, but it’s always the ultimate respect. It was always a huge, heated rivalry. Intense. I probably would say it’s a healthy hatred, in a good way, just from a competitive standpoint. Obviously Patrick [Ewing] and I go way, way back, going back to high school together so there’s a long history.”
On Sedee Keita’s role against Georgetown:
“We hope to increase him as his physical ability increases. I wouldn’t say he’s on a minutes restriction, but we have to monitor where he is physically. As we go into each game, it will hopefully increase but it will depend on how he is physically that day.”
On Shamorie Ponds’ leadership:
“As a player, what Shamorie has been able to do is find his balance. He’s got this great gift of scoring. He’s an incredible passer and has the support of his teammates. We’re at the point now where some of these guys have been here for three-plus years. They’ve been through some tough losses and big wins together. They can go to each other and talk about what exactly is on their minds and they don’t take it personally or get their feelings hurt. I think when you have the ability to do that, it allows you to move on and keep building when you feel good about each other. That takes time and it takes natural maturity as a person.”
St. John’s Redshirt Senior Forward Marvin Clark II…
On Georgetown rivalry:
“I’d consider it more like a healthy hatred. I think Coach Mullin and Coach Ewing's relationship speak volumes to that. They are friends today and were rivals back then, but when we step between those lines, it's a rivalry.”
On 15-year losing streak in Washington D.C.:
“I think it's our program and have had some down years. Last year, we came close, but close wasn't good enough. It takes an elite level of focus to come home with a win.”
On the differences with this year’s team:
"I think we learned from last year and the Seton Hall game was a reminder. We came out clicking on all cylinders, playing well on the road and out playing them in the first half. We came out in the second half, we didn't play to the level we played [in the first half], I fouled out and we lost the game late. It's a learning lesson for us and what we went through last season and the veterans we have on this team, if we utilize that and play to full [potential], we can win like we did against Marquette."
On the correlation between practice and in-game success:
"I think a lot of it is me settling down and knowing my role with the team. My teammates have helped me get into a rhythm and it's starting to show. I've been at peace. Especially in the last eight games, I've been going out there and playing free. I'm not thinking about anything and relying on the work I put in and relying on my teammates.”
St. John’s Junior Guard Shamorie Ponds…
On the game against No. 16/18 Marquette:
“We came out energetic. We lost a tough one to Seton Hall and we were looking to bounce back. We showed a lot of resilience. We tried not to hold our head up to that game because after last year, we weren’t trying to do that again. We knew the game against Marquette was a must-win.”
On bouncing back after the loss to Seton Hall:
“We have more focus on the game plan. Coach [Mullin] came up with a great game plan of don’t let Markus Howard get a lot of threes off and we executed.”
On Georgetown:
“We have to have the same focus. We’re 1-1 [in the BIG EAST] and we haven’t proved anything yet. We are going to keep going higher. We have to stick to the game plan and hope for the win.”
On team’s strengths:
“We are coming together collectively as a team. I feel like if we want to win, we have to stick together.”
On his teammates:
“We have great guys around me on and off the court. These are my brothers and we gel together during the game.”
On the improvements he’s made this season:
“I’ve become more mature, a better teammate and a better leader. In order for us to win games, as a point guard, I have to be a leader and be more vocal and I have to keep working on that.”
St. John’s Junior Guard Mustapha Heron…
On the next game against Georgetown:
“We play fast, play hard and play tough. That’s a good combination. … It’s an intense game. They have great guard play. [Georgetown center] Jessie [Govan] is one of the best bigs in the country. Our game plan is going to be really good going in and we just have to execute.”
On consistency with Shamorie Ponds:
“I think playing hard and communication between him and I, along with Marvin [Clark II] and Justin [Simon] and being the four older guys on the team as leaders, we have to be vocal, communicate, set the bar high, and hope everyone will follow.”
On fan support:
They’re the sixth man on the floor. Once the students come back to campus, whether at Carnesecca or the [Madison Square] Garden, they’re going to be loud.” |
Q:
What is the correct jargon for a class that has no functions but is used to store data
Is there any special jargon word for a class that has no functions but is used to store data?
A:
One of the examples is Data Transefer Object (DTO), although it, of course, still can have methods.
A:
Plain old data structure (POD) seems to be an appropriate term. Though rarer than POJO/POCO, from what I've seen, it seems to be the best fit for your criteria.
|
In reality, the photo appeared in story about Playboy’s “Charter Yacht Party: How to Have a Ball on the Briny with an Able-Bodied Complement of Ship’s Belles.” As seen in the below page from the November 1967 issue, the Playboy photo is in color. The “Exclusive” TMZ image is the same photo, just reproduced in black and white.
She said the comment referred to the reaction in the 60-90 minutes after the suspect attempted to blow up the plane. Up until that point, did the system fail miserably, Matt Lauer asked. “It did,” she responded.
Homeland Security Secretary Janet Napolitano said Sunday that the thwarting of the attempt to blow up an Amsterdam-Detroit airline flight Christmas Day demonstrated that “the system worked.”
Asked by CNN’s Candy Crowley on “State of the Union” how that could be possible when the young Nigerian who has been charged with trying to set off the bomb was able to smuggle explosive liquid onto the jet, Napolitano responded: “We’re asking the same questions.”
Napolitano added that there was “no suggestion that [the suspect] was improperly screened.”
So, back in June 28, it took the Obama administration less time than that to declare Zelaya’s constitutional ousting a military coup. Secretary of State Hillary Clinton had, by early afternoon, said that “the action taken against Honduras’ president should be condemned by everyone.”
is the former economics minister of Nigeria. He retired earlier this month as the chairman of the First Bank of Nigeria but is still on the boards of several of Nigeria’s biggest firms, including Jaiz International, a holding company for the Islamic Bank. The 70-year-old, who was also educated in London, holds the Commander of the Order of the Niger as well as the Italian Order of Merit.
Umaru had alerted US authorities on his son’s radical views six months ago.
Abdul had graduated from University College London, and previously lived in a $4 million flat in London the rest of us poor slobs sitting in coach can only dream of.
After graduation he had left the country but when he tried to go back to the UK,
his visa request was refused. He applied to return for a six-month course, but was barred by the UK Border Agency which judged that the college he applied to was “not genuine”.
He smuggled the explosives through Nigeria and Netherlands security checks:
The high explosive Abdulmutallab used was identified by the FBI as Pentaerythritol, better known as PETN – a major component of Semtex. He injected a detonating liquid into the PETN with a syringe, but the bomb failed to explode.
He had enogh explosives to blow up the plane.
The explosives were sewn into his underwear. Mark Steyn calls him the pantybomber.
Apparently he had a valid US visa even when his name was for at least two years in the US list of people with known or suspected contacts or ties to a terrorist or terrorist organization.
Among other steps being imposed, passengers on international flights coming to the United States will apparently have to remain in their seats for the last hour of a flight without any personal items on their laps. Overseas passengers will be restricted to only one carry-on item aboard the plane, and domestic passengers will probably face longer security lines.
Explain to me, please, how do any of these measures prevent in any way an al-Qaeda operative wearing explosives in his underwear from carrying them on the plane.
Obama is golfing and going to the gym because it’s strategy, not incompetent, to trivialize a terrorist attempt.
The men eager to self-detonate on infidel airliners are not goatherds from the caves of Waziristan but educated middle-class Muslims who have had the most exposure to the western world and could be pulling down six-figure salaries almost anywhere on the planet. And don’t look to “assimilation” to work its magic, either. We’re witnessing a process of generational de-assimilation: In this family, yet again, the dad is an entirely assimilated member of the transnational elite. His son wants a global caliphate run on Wahhabist lines.
1. According to early reports, the suspect is 23-year-old Abdul Farouk Abdulmutallab, and his name “appears to be included in the government’s records of terrorist suspects, according to a preliminary review.” The first question, then, is how he managed to get a visa to come to the United States.
2. One report suggested that the visa was granted to attend a religious meeting. Is there some political correctness problem that makes State reluctant to deny visas for such travel?
3. A visa might have been granted for a good reason (a chance to interrogate or arrest him) but only in circumstances where he was watched closely. At a minimum, data about him should have gone to DHS and FBI from State. Did it?
4. Even if it didn’t, TSA and DHS should have identified him as a possible risk from his travel reservations. Did they? If not, why not?
5. If they did, was he screened specially at Schiphol? Did DHS put an air marshal on his flight?
Venezuelan President Hugo Chávez, beset by a recession that is hurting his popularity, has turned his sights on international car companies, threatening them with nationalization and pledging to ramp up government intervention in their local businesses.
The populist leader has threatened to expropriate Toyota Motor Corp.’s local assembly plant if the Japanese car maker doesn’t produce more vehicles designed for rural areas and transfer new technologies and manufacturing methods to its local unit. He said other car companies were also guilty of not transferring enough technology, mentioning Fiat SpA of Italy, which controls Chrysler Group LLC, and General Motors Co.
And who’s going to take over the Toyota plant? The Chinese!
The president ordered his trade minister, Eduardo Saman, to inspect the Toyota plant. He said if the inspection shows Toyota isn’t producing what he thinks it should and isn’t transferring technology, the government may consider taking over its plant and have a Chinese company operate it.
“We’ll take it, we’ll expropriate it, we’ll pay them what it is worth and immediately call on the Chinese,” Mr. Chávez said in a televised address late Wednesday.
Curiously, the article doesn’t mention what the Chinese have to say – if anything – about this proposed arrangement.
The announcement, however, didn’t take the Japanese entirely by surprise:
Any move to nationalize would have little impact on Toyota’s bottom line. The company’s Venezuelan operations are the smallest of the four Latin American markets where it produces cars, and the Venezuelan market has dropped sharply in the past year, while other markets in the region, such as Argentina, Brazil and Mexico, have either held steady or grown despite the global recession.
Toyota produced about 13,000 vehicles in Venezuela last year, and sold roughly 30,000 for a market share of 11%, lower than the Japanese car maker’s share in the U.S. Globally, Toyota sold nearly nine million vehicles in 2008.
In a typical Communist move, this will adversely affect Venezuelans (who soon enough will only have Venezuela-Iran Venirauto to choose from) more than it will Toyota or the other companies.
Still, it’s a Merry Christmas message from Hugo to China, and yet another f**k you to private enterprise, Japan, Italy and the US.
The initial impression is that the suspect was acting alone and did not have any formal connections to organized terrorist groups, said the official, who is familiar with the investigation.
Obviously he forgot to wear his al-Qaeda credentials with photo ID with bold lettering saying, “OFFICIAL MEMBER OF AL-QAEDA SINCE 2001” on a lanyard on his neck.
Security check in Amsterdam? Nope:
He did not undergo secondary security screening in Amsterdam, an administration official said.
Acting alone? Don’t think so:
British counterterrorism police officers were searching houses Saturday in central London in relation to the airline incident, a Metropolitan Police spokeswoman told CNN.
The heroes of Christmas days are the people who stopped him, particularly Jasper Schuringa and the cabin crew”
“Everybody got a little bit startled,” he said. “After a few seconds or so … there was … kind of a flamish light and there was fire” and people around the immediate area began to panic.
Schuringa said he heard a big bang that sounded like a firecracker going off. He told CNN that he was the one who was able to subdue Abdulmutallab. CNN was not able to independently confirm Schuringa’s account.
Schuringa said someone started yelling: “Fire! Fire!”
Then there was smoke. That’s when Schuringa said he knew something was terribly wrong.
When he noticed that Abdulmutallab was not moving, he grew suspect. He jumped over the passenger next to him and lunged over Abdulmutallab’s seat.
Schuringa said he saw that Abdulmutallab had his pants open and he was holding a burning object between his legs.
“I pulled the object from him and tried to extinguish the fire with my hands and threw it away,” Schuringa said.
He said he managed to pull an object tucked between Abdulmutallab’s legs.
“Water! Water,” Schuringa screamed. He heard fire extinguishers as he pulled Abdulmutallab out of his seat and dragged him to the front of the plane.
Schuringa said Abdulmutallab seemed dazed. “He was staring into nothing.”
Schuringa said he stripped off Abdulmutallab’s clothes to make sure he did not have other explosives on his body. A crew member helped handcuff him.
He said other passengers applauded as he walked back to his own seat.
“My hands are pretty burned. I am fine,” he said. “I am shaken up. I am happy to be here.” |
Og Mandino
Treasure the love you receive above all. It will survive long after your good health has vanished.
Og Mandino
Count your blessings.
Og Mandino
Discover More Quotes From Your Favorite Authors
God gives nothing to those who keep their arms crossed.
Bambara Proverb
When you love someone all your saved-up wishes start coming out.
Elizabeth Bowen
The more we grow in love, virtue and holiness, the more we see love, virtue and holiness outside.
Swami Vivekananda
The most powerful symptom of love is a tenderness which becomes at times almost insupportable.
Victor Hugo
Love is like a mountain, hard to climb, but once you get to the top the view is beautiful.
Daniel Monroe Tuttle
Be more concerned with your character than your reputation, because your character is what you really are, while your reputation is merely what others think you are.
John Wooden
See how nature - trees, flowers, grass - grows in silence , see the stars, the moon and the sun, how they move in silence we need silence to be able to touch souls.
Mother Teresa
Never put off until tomorrow what you can do today.
Thomas Jefferson
I love thee, I love but thee with a love that shall not die till the sun grows cold and the stars grow old.
William Shakespeare
You're happiest while you're making the greatest contribution.
Robert F. Kennedy
Go confidently in the direction of your dreams. Live the life you have imagined.
Henry David Thoreau
The difference between ordinary and extraordinary is that little extra.
Unknown
The daily grind of hard work gets a person polished.
Anonymous
If you can't accept losing, you can't win.
Vince Lombardi
Never discourage anyonewho continually makes progress, no matter how slow.
Plato
You were made perfectly to be loved - and surely I have loved you, in the idea of you, my whole life long.
Elizabeth Barrett Browning
The gem can not be polished without friction, nor man be perfected without trials.
Danish Proverb
And he can make, so say the wise, no claim who makes no sacrifice.
Samuel Coleridge
I have seen so many of these, and lived with them, and travelled with them, and oftentimes felt as if I should starve to death on an equal allowance, that I am fully convinced I am correct in saying that the North American Indians, taking them in the aggregate, even where they have an abundance to subsist on, eat less than any civilized population of equal numbers, that I have ever travelled amongst.
George Catlin
He who has learned how to obey will know how to command.
Solon
Success is the ability to go from failure to failure without losing your enthusiasm.
Winston Churchill
Hold fast to dreams, for if dreams die, life is a broken winged bird that cannot fly.
Langston Hughes
Ideas attract money, time, talents, skills, energy and other complementary ideas that will bring them into reality.
Mark Victor Hansen
The greatest thing you'll ever learn is to love and be loved in return.
Natalie Cole
Love is the enchanted dawn of every heart.
Alphonse Marie De Lamartine
An error gracefully acknowledged is a victory won.
Caroline L. Gascoigne
The will to win is important, but the will to prepare is vital.
Joe Paterno
God does not care about our mathematical difficulties. He integrates empirically.
Albert Einstein
There may be peace without joy, and joy without peace, but the two combined make happiness
John Buchan
Truth can be stated in a thousand different ways, yet each one can be true.
Swami Vivekananda
Live as if you were to die tomorrow , Learn as if you were to live forever.
Mahatma Gandhi
A small house will hold a hundred friends.
African Proverb
Only in his own way and not in any other can the one who strives perfect himself. He who lays hold of the rung of his companion and lets go of his own rung, through him neither the one nor the other will be realized.
Martin Buber
Et cetera, et cetera, et cetera.
King Mongkut, The King And (1956)
We judge of man's wisdom by his hope.
Ralph Waldo Emerson
World is the great gymnasium where we come to make ourselves strong.
Swami Vivekananda
Now is the only time there is. Make your now wow, your minutes miracles, and your days pay. Your life will have been magnificently lived and invested, and when you die you will have made a difference.
Mark Victor Hansen
There is no limit to what a man can do or where he can go if he doesn't mind who gets the credit.
Robert Woodruff
When you become detached mentally from yourself and concentrate on helping other people with their difficulties, you will be able to cope with your own more effectively. Somehow, the act of self-giving is a personal power-releasing factor.
Norman Vincent Peale
That love is all there is is all we know of love.
Emily Dickinson
Action is the antidote to despair.
Joan Baez
Jane. Tarzan. Jane. Tarzan.
Tarzan, Tarzan The Ape Man (1932)
Adversity is wont to reveal genius, prosperity to hide it.
Horace
Advice after the mischief is like medicine after death.
Danish Proverb
There is no cure for birth and death save to enjoy the interval.
George Santayana
Love consists in this, that two solitudes protect and touch and greet each other.
Rainer Maria Rilke
Our inheritance of well-founded, slowly conceived codes of honor, morals, and manners, the passionate convictions which so many hundreds of millions share together of the principles of freedom and justice, are far more precious to us than anything which scientific discoveries could bestow.
Winston Churchill
Immaturity can last a lifetime.
Robert Half
Till I loved, I never lived, enough.
Emily Dickinson
Far better is it to dare mighty things, to win glorious triumphs, even though checkered by failure, than to rank with those poor spirits who neither enjoy much nor suffer much, because they live in a gray twilight that knows not victory nor defeat.
Theodore Roosevelt
Fantasy love is much better than reality love. Never doing it is very exciting. The most exciting attractions are between two opposites that never meet.
Andy Warhol
Peace and friendship with all mankind is our wisest policy, and I wish we may be permitted to pursue it.
Thomas Jefferson
I have spread my dreams under your feet , Tread softly because you tread on my dreams.
William Butler Yeats
Remember the difference between a boss and a leader a boss says "Go ! '' -- a leader says "Let's go ! ''
E.M. Kelly
I am poor and naked but I am the chief of a nation. We do not want riches but we do want to train our children right. Riches would do us no good. We could not take them with us to the other world. We do not want riches. We want peace and love.
Red Cloud
Learned that no matter what happens, or how bad it seems today, life does go on, and it will be better tomorrow.
Maya Angelou
You are what you repeatedly do. Excellence is not an event - it is a habit.
Aristotle
If a profound gulf separates my neighbor's belief from mine, there is always the golden bridge of tolerance.
Anonymous
Love does not conquer all things, but it does set all things right.
Unknown
The ideas I stand for are not mine. I borrowed them from Socrates. I swiped them from Chesterfield. I stole them from Jesud. And I put them in a book. If you don't like their rules whose would you use ?
Dale Carnegie
You come to love not by finding the perfect person, but by seeing an imperfect person perfectly.
Sam Keen
You need a good bedside manner with doctors or you will get nowhere.
William S. Burroughs
Today is the first day of the rest of your life.
Unknown
I think it pisses god off when you walk by the color purple in a field and don't notice it.
Shug, The Color Purple (1985)
Take heed : you do not find what you do not seek.
Unknown
I never knew how to worship until I knew how to love.
Henry Ward Beecher
Love is, above all, the gift of oneself.
Jean Anouilh
The man who follows the crowd will usually get no further than the crowd. The man who walks alone is likely to find himself in places no one has ever been.
Alan Ashley-Pitt
You have the power to think what you want. No matter what the circumstance.
Anonymous
And let the peace of God rule in your hearts, to the which also ye are called in one body, and be yet thankful.
Colossians 315
Each person born into this world represents something new, something that never existed before, something original and unique.
Martin Buber
Charity is injurious unless it helps the recipient to become independent of it.
John Davidson Rockefeller
Man is a ladder placed on the earth and the top of it touches heaven. And all his movements and doings and words leave traces in the upper world.
Martin Buber
To be a great leader and so always master of the situation, one must of necessity have been a great thinker in action. An eagle was never yet hatched from a goose's egg.
James Thomas
There are two ways of meeting difficulties you alter the difficulties, or you alter yourself to meet them.
Phyllis Battome
People are like stained glass windows, they sparkle and shine when the sun is out, but when darkness sets in their true beauty is revealed only if there is a light from within.
Elizabeth Kubler-Ross
You know you are in love when you see the world in her eyes, and her eyes everywhere in the world.
David Levesque
Dreams are the reality of tomorrow.
Dean Marshall
You have available to you, right now, a powerful supercomputer. This powerful tool has been used through-out history to take people from rags to riches, from poverty and obscurity to success and fame, from unhappiness and frustration to joy and self-fulfillment, and it can do the same for you. |
Growth stimulation of human head and neck squamous cell carcinoma cell lines by interleukin 4.
Interleukin 4 (IL-4) has been reported recently to inhibit growth of acute lymphoblastic lymphoma, non-Hodgkin's lymphoma, melanoma, sarcoma, breast, gastric, colon, and renal tumor cell lines, and treatment of murine tumors with IL-4 gene-transduced cells has been therapeutically successful. Therefore, we sought to determine the effect of IL-4 on the growth of human squamous cell carcinoma of the head and neck (SCCHN) cell lines. Growth of SCCHN cell lines incubated in the presence of various concentrations of IL-4 was measured in 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide colorimetric assays and by cell counts. Specific binding of IL-4 to SCCHN cells was demonstrated by flow cytometry with phycoerythrin-labeled IL-4, blocking studies with antibodies to IL-4, and using the radiolabeled ligand 125I-labeled IL-4. Reverse transcription PCR for IL-4 and IL-4 receptor (IL-4R) mRNA was performed. SCCHN tissue biopsies were examined by immunohistology and in situ hybridization for the presence of IL-4 protein and IL-4 mRNA in the tumor, respectively. In contrast to earlier reports, we observed growth stimulatory effects of IL-4 consistently in 6 of 13 SCCHN cell lines tested. Growth stimulation by IL-4 ranged from 20 to 200% of control (P < 0.05) and was IL-4 dose dependent. The growth-promoting effect of IL-4 was inhibited completely by incubation of tumor cells in the presence of antibodies specific for IL-4. Reverse transcription PCR analysis of mRNA obtained from the SCCHN cell lines and ELISA performed with SCCHN cell supernatants respectively indicated that the tumor cells did not transcribe or secrete IL-4 actively. The SCCHN cell lines expressed 260-540 IL-4Rs/cell with a dissociation constant of 100 +/- 8 pM. SCCHN cell lines also contained IL-4R mRNA. Immunostaining of SCCHN tissue biopsies indicated that IL-4 may be produced and secreted within these tumors by tumor-infiltrating lymphocytes. In situ hybridization for IL-4 mRNA indicated the presence of positive cells in the tumor stroma. Our data suggest that IL-4 may regulate the growth of SCCHN cells by a paracrine mechanism. These data also indicate that immunotherapy with exogenous IL-4 or IL-4 gene therapy to treat head and neck cancer may not be effective, given the potential tumor growth-stimulatory effects of this cytokine. |
# Copyright (c) 2006-2009 Mitch Garnaat http://garnaat.org/
#
# Permission is hereby granted, free of charge, to any person obtaining a
# copy of this software and associated documentation files (the
# "Software"), to deal in the Software without restriction, including
# without limitation the rights to use, copy, modify, merge, publish, dis-
# tribute, sublicense, and/or sell copies of the Software, and to permit
# persons to whom the Software is furnished to do so, subject to the fol-
# lowing conditions:
#
# The above copyright notice and this permission notice shall be included
# in all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
# IN THE SOFTWARE.
#
"""
Automated installer to attach, format and mount an EBS volume.
This installer assumes that you want the volume formatted as
an XFS file system. To drive this installer, you need the
following section in the boto config passed to the new instance.
You also need to install dateutil by listing python-dateutil
in the list of packages to be installed in the Pyami seciont
of your boto config file.
If there is already a device mounted at the specified mount point,
the installer assumes that it is the ephemeral drive and unmounts
it, remounts it as /tmp and chmods it to 777.
Config file section::
[EBS]
volume_id = <the id of the EBS volume, should look like vol-xxxxxxxx>
logical_volume_name = <the name of the logical volume that contaings
a reference to the physical volume to be mounted. If this parameter
is supplied, it overrides the volume_id setting.>
device = <the linux device the EBS volume should be mounted on>
mount_point = <directory to mount device, defaults to /ebs>
"""
import boto
from boto.manage.volume import Volume
from boto.exception import EC2ResponseError
import os, time
from boto.pyami.installers.ubuntu.installer import Installer
from string import Template
BackupScriptTemplate = """#!/usr/bin/env python
# Backup EBS volume
import boto
from boto.pyami.scriptbase import ScriptBase
import traceback
class Backup(ScriptBase):
def main(self):
try:
ec2 = boto.connect_ec2()
self.run("/usr/sbin/xfs_freeze -f ${mount_point}", exit_on_error = True)
snapshot = ec2.create_snapshot('${volume_id}')
boto.log.info("Snapshot created: %s " % snapshot)
except Exception, e:
self.notify(subject="${instance_id} Backup Failed", body=traceback.format_exc())
boto.log.info("Snapshot created: ${volume_id}")
except Exception, e:
self.notify(subject="${instance_id} Backup Failed", body=traceback.format_exc())
finally:
self.run("/usr/sbin/xfs_freeze -u ${mount_point}")
if __name__ == "__main__":
b = Backup()
b.main()
"""
BackupCleanupScript= """#!/usr/bin/env python
import boto
from boto.manage.volume import Volume
# Cleans Backups of EBS volumes
for v in Volume.all():
v.trim_snapshots(True)
"""
TagBasedBackupCleanupScript= """#!/usr/bin/env python
import boto
# Cleans Backups of EBS volumes
ec2 = boto.connect_ec2()
ec2.trim_snapshots()
"""
class EBSInstaller(Installer):
"""
Set up the EBS stuff
"""
def __init__(self, config_file=None):
super(EBSInstaller, self).__init__(config_file)
self.instance_id = boto.config.get('Instance', 'instance-id')
self.device = boto.config.get('EBS', 'device', '/dev/sdp')
self.volume_id = boto.config.get('EBS', 'volume_id')
self.logical_volume_name = boto.config.get('EBS', 'logical_volume_name')
self.mount_point = boto.config.get('EBS', 'mount_point', '/ebs')
def attach(self):
ec2 = boto.connect_ec2()
if self.logical_volume_name:
# if a logical volume was specified, override the specified volume_id
# (if there was one) with the current AWS volume for the logical volume:
logical_volume = Volume.find(name = self.logical_volume_name).next()
self.volume_id = logical_volume._volume_id
volume = ec2.get_all_volumes([self.volume_id])[0]
# wait for the volume to be available. The volume may still be being created
# from a snapshot.
while volume.update() != 'available':
boto.log.info('Volume %s not yet available. Current status = %s.' % (volume.id, volume.status))
time.sleep(5)
instance = ec2.get_only_instances([self.instance_id])[0]
attempt_attach = True
while attempt_attach:
try:
ec2.attach_volume(self.volume_id, self.instance_id, self.device)
attempt_attach = False
except EC2ResponseError, e:
if e.error_code != 'IncorrectState':
# if there's an EC2ResonseError with the code set to IncorrectState, delay a bit for ec2
# to realize the instance is running, then try again. Otherwise, raise the error:
boto.log.info('Attempt to attach the EBS volume %s to this instance (%s) returned %s. Trying again in a bit.' % (self.volume_id, self.instance_id, e.errors))
time.sleep(2)
else:
raise e
boto.log.info('Attached volume %s to instance %s as device %s' % (self.volume_id, self.instance_id, self.device))
# now wait for the volume device to appear
while not os.path.exists(self.device):
boto.log.info('%s still does not exist, waiting 2 seconds' % self.device)
time.sleep(2)
def make_fs(self):
boto.log.info('make_fs...')
has_fs = self.run('fsck %s' % self.device)
if has_fs != 0:
self.run('mkfs -t xfs %s' % self.device)
def create_backup_script(self):
t = Template(BackupScriptTemplate)
s = t.substitute(volume_id=self.volume_id, instance_id=self.instance_id,
mount_point=self.mount_point)
fp = open('/usr/local/bin/ebs_backup', 'w')
fp.write(s)
fp.close()
self.run('chmod +x /usr/local/bin/ebs_backup')
def create_backup_cleanup_script(self, use_tag_based_cleanup = False):
fp = open('/usr/local/bin/ebs_backup_cleanup', 'w')
if use_tag_based_cleanup:
fp.write(TagBasedBackupCleanupScript)
else:
fp.write(BackupCleanupScript)
fp.close()
self.run('chmod +x /usr/local/bin/ebs_backup_cleanup')
def handle_mount_point(self):
boto.log.info('handle_mount_point')
if not os.path.isdir(self.mount_point):
boto.log.info('making directory')
# mount directory doesn't exist so create it
self.run("mkdir %s" % self.mount_point)
else:
boto.log.info('directory exists already')
self.run('mount -l')
lines = self.last_command.output.split('\n')
for line in lines:
t = line.split()
if t and t[2] == self.mount_point:
# something is already mounted at the mount point
# unmount that and mount it as /tmp
if t[0] != self.device:
self.run('umount %s' % self.mount_point)
self.run('mount %s /tmp' % t[0])
break
self.run('chmod 777 /tmp')
# Mount up our new EBS volume onto mount_point
self.run("mount %s %s" % (self.device, self.mount_point))
self.run('xfs_growfs %s' % self.mount_point)
def update_fstab(self):
f = open("/etc/fstab", "a")
f.write('%s\t%s\txfs\tdefaults 0 0\n' % (self.device, self.mount_point))
f.close()
def install(self):
# First, find and attach the volume
self.attach()
# Install the xfs tools
self.run('apt-get -y install xfsprogs xfsdump')
# Check to see if the filesystem was created or not
self.make_fs()
# create the /ebs directory for mounting
self.handle_mount_point()
# create the backup script
self.create_backup_script()
# Set up the backup script
minute = boto.config.get('EBS', 'backup_cron_minute', '0')
hour = boto.config.get('EBS', 'backup_cron_hour', '4,16')
self.add_cron("ebs_backup", "/usr/local/bin/ebs_backup", minute=minute, hour=hour)
# Set up the backup cleanup script
minute = boto.config.get('EBS', 'backup_cleanup_cron_minute')
hour = boto.config.get('EBS', 'backup_cleanup_cron_hour')
if (minute is not None) and (hour is not None):
# Snapshot clean up can either be done via the manage module, or via the new tag based
# snapshot code, if the snapshots have been tagged with the name of the associated
# volume. Check for the presence of the new configuration flag, and use the appropriate
# cleanup method / script:
use_tag_based_cleanup = boto.config.has_option('EBS', 'use_tag_based_snapshot_cleanup')
self.create_backup_cleanup_script(use_tag_based_cleanup);
self.add_cron("ebs_backup_cleanup", "/usr/local/bin/ebs_backup_cleanup", minute=minute, hour=hour)
# Set up the fstab
self.update_fstab()
def main(self):
if not os.path.exists(self.device):
self.install()
else:
boto.log.info("Device %s is already attached, skipping EBS Installer" % self.device)
|
JUICE BOMB
NORTHEASTERN IPA
YEAR ROUND
ABV: 6.5%AMERICAN barleyAMERICAN hops
Juice bomb is a hazy, golden, unfiltered IPA.The low bitterness and late hopping showcases the citrusy, juicy notes that many American hops contain. A blast of tropical aroma is followed by a resiny and balanced flavor. Juice bomb features all the aspects and nuances of full hop flavor, not just bitterness — providing an upfront but easy drinking beer.
Because us Northeasterners shouldn’t just ape the West Coast. Just don’t ask Justin for the IBUs. |
Weather Forecast
AREA GIRLS HOCKEY: Northern Lakes advances to section semifinals
BREEZY POINT — Fourth-seeded Northern Lakes scored the final five goals en route to a 7-2 win over the fifth-seeded Long Prairie-Grey Eagle/Wadena-Deer Creek Blue Devils in the opening round of the Section 6-1A tournament Saturday.
Madison Galligan made 15 saves for the Lightning, who outshot the Blue Devils 54-17.
LPGEWDC drew first blood at 2:09 of the opening period before Bailee Englund and Ines St. Martin scored power-play goals for a 2-1 lead at the end of the first.
After Sam Killian tied it with a short-handed goal for the Blue Devils 1:53 into the second, the Lightning responded with Englund’s second score and the game-winner by Alex Palm to lead 3-2 going into the final stanza.
Adding insurance goals in the third were Mandy Carlson, Palm and Megan Snyder. Mariah Reed and Kaylyn Eggena each had two assists.
I've worked at the Brainerd Dispatch with various duties since Dec. 7, 1983. Starting off as an Ad Designer and currently Director of Audience Development. The Dispatch has been an interesting and challenging place to work. I'm fortunate to have made many friends, both co-workers and customers. |
Glaucoma is a family of diseases characterized by degenerative optic neuropathy, usually related to an elevation in intraocular pressure (IOP), resulting in irreversible blindness. It is a leading cause of vision loss worldwide. Given that elevated IOP is the most common factor associated with retinal damage, pharmacological treatments directed at glaucoma have focused upon increasing the drainage of the aqueous humor or reducing its production by the ciliary epithelium. Yet, a clear understanding of the physiological mechanisms by which the aqueous is produced remains elusive. The driving forces for fluid secretion across the ciliary epithelium are the osmotic gradient created by ionic transport and a hydrostatic pressure difference, with their relative contributions undetermined. Although extensive work has identified the ions that are transported for the creation of the osmotic gradient, published data suggest that the transport rates may be insufficient to account for the rate of fluid production (implying the importance of ultrafiltration) and a transport model consistent with all of the available experimental data does not exist. This may be due to the complexity of the ciliary epithelium as well as variations in transport elements among the species studied. Actual measurements of fluid movement across the isolated ciliary epithelium have not been attempted as commonly done with other water transporting epithelia such as those of the kidney, urinary bladder and corneal endothelium. Our preliminary, experiments show that we can measure fluid transport in this isolated tissue. Therefore, the aims of this proposal are 1) to measure fluid transport across isolated ciliary epithelia from bovine and rabbit, two well characterized tissues manifesting distinct electrolyte transport properties; 2) to study the effects of stimulants and inhibitors of electrolyte transport on the rate of fluid transport in the two model tissues; and 3) to study the effects of ion replacement and depletion on the rate of fluid transport. These relatively simple experimental approaches will fill a void in the present understanding of ciliary epithelial physiology and should provide a quantification of the contribution of ionic transport to aqueous formation. |
The Use of X Rays in the Treatment of Bronchial Asthma: A Historical Assessment.
This article provides a historical assessment of the role of X-ray therapy in the treatment of bronchial asthma. This analysis revealed that X-ray therapy in the treatment of bronchial asthma spanned the first six decades of the 20th century, and involved nearly 6,000 patients in published clinical case studies. Patients selected typically had at least moderate to severe asthma and were refractory to other commonly employed treatments. The results of more than 60 studies indicated that about 70% of patients had rapid and marked reductions in clinical symptoms with about half of these patients showing complete symptom relief. The duration of the beneficial responses was variable but was approximately 1-6 months for about 50% of the benefited patients, and between 1 to 4 years for the upper 25% of benefited patients. The use of X rays to treat such patients fell into disfavor during the 1950s due to mounting concerns over possible enhanced risks of cancer that coincided with the discoveries and use of antihistamine medications, antibiotics and the methyl xanthine bronchodilators aminophylline and theophylline. |
Immunoblot examination of humoral response of chickens infected with Mycoplasma gallisepticum at various ages.
Mycoplasma gallisepticum- and Mycoplasma synoviae-free chickens were infected with 0.2 ml broth culture of M. gallisepticum strain 1226 intra air sac at 3, 14, 18, 28, 42, 49 and 65 days of age. Blood samples were taken 0-5 weeks before infection and 1-6 weeks after infection (depending on age of infection). The antibody response was examined by Western blot. As a control of infection, serum plate agglutination test (SPA), pathological lesions, and presence of Mycoplasma in air sacs were used. Antibodies to p64-67 kDa appeared in all groups of birds on the first week post-infection. Antibodies to p56 were detected from the second week post-challenge if infection was performed at 3 or 14 days of age, while on first week if challenge was done at 18, 28, 42, 49 or 65 days of age. Antibodies to p200, p120, p98, p80, p75, p72, p60, p50, p45, p40, p35, p33, p31, p28, p26, p24 and p22 were also detected. |
Q:
Check if folder is in use in C#
Consider a network folder:
\\desiis\c$\Company\B2b\Monitor
On that machine, any process that tries to delete the directory Monitor receives an error because a user on the LAN has that directory open (likely with Windows Explorer).
Can I detect, via C# and .NET framework, if any user (and which user) has a particular directory open/in use?
A:
I'm not sure if you can obtain the particular user in the directory but the DirectoryInfo class in C# .NET would probably be the best way to go.
http://msdn.microsoft.com/en-us/library/system.io.directoryinfo_members.aspx
Review the API at this link and you'll notice there is a method to get the information about WHEN the directory was last accessed but not by who. Also you can catch any exception when trying to delete a directory as it being unavailable (an exception will be thrown as you are probably well aware).
Also note that exception catching is costly and you should evaluate any slowdowns in your process by doing this.
|
1. Field of the Invention
The present invention relates to an electrostatic chuck capable of clamping fixed substrates such as semiconductor wafers, metal wafers or glass substrates used in the production of semiconductor devices and liquid crystal devices, etc. using electrostatic force.
2. Background Technology
In the past, examples of apparatuses for clamping substrates such as semiconductor wafers, metal wafers or glass substrates used in the production of semiconductor devices and liquid crystal devices, etc. (to be referred to as xe2x80x9cfixed substratesxe2x80x9d) included a vacuum chuck capable of clamping fixed substrates by physically clamping the substrates using vacuum force, and a clamp capable of mechanically clamping fixed substrates.
However, in the case of using a vacuum chuck to clamp fixed substrates, due to difference in pressure between the external atmosphere and vacuum chuck under vacuum conditions, there was the problem of being unable to clamp the fixed substrates. In addition, in the case of mechanically clamping fixed substrates using a clamp, there were problems such as the locations on the fixed substrates where the clamp makes contact being unable to be used as a device, the occurrence of partial distortion in the fixed substrates, and the generation of particles caused by raising and lowering of the clamp.
Therefore, in order to solve the above problems, an electrostatic chuck is proposed that is capable of clamping fixed substrates using electrostatic force. An electrostatic chuck is mainly composed of a planar electrode and a pair of insulating members disposed in mutual opposition between which the electrode is interposed. As a result of placing a fixed substrate on one of the pair of insulating members and applying a prescribed voltage to the electrode, the fixed substrate can be clamped using electrostatic force.
In the past, compound sintered bodies, in which ceramics comprised of one type selected from titanium oxide, titanium nitride and silicon carbide were contained in ceramics such as aluminum oxide, or aluminum nitride-based sintered bodies and so forth, were proposed for the insulating members that compose such an electrostatic chuck.
However, in the case of using the above electrostatic chuck installed in an apparatus that uses plasma such as a plasma CVD apparatus, plasma etching apparatus, sputtering apparatus or ion injection apparatus, an electrical charge accumulates on the fixed substrate due to long-term plasma irradiation, and this accumulated electrical charge can cause an abnormal discharge. As a result, the electrostatic chuck may be damaged or destroyed, the fixed substrate may be damaged, or particles may be generated that have a detrimental effect on product performance.
Therefore, measures were employed in the prior art in order to prevent this abnormal discharge, examples of which include installing a ground wire on the surface of the fixed substrate to allow the electrical charge to escape, installing an electrically conductive ring around the outside of the fixed substrate to allow the electrical charge to escape, or installing an ionizer on the fixed substrate to allow the electrical charge to escape.
However, in the case of employing these measures, since it was necessary to install a ground wire, electrically conductive ring or ionizer and so forth on the fixed substrate, there was the problem of increased production costs of the electrostatic chuck.
In addition, in the case of employing the above measures, although the occurrence of abnormal discharge can be reduced, since abnormal discharge cannot be completely prevented, there was the problem of being unable to adequately prevent damage and destruction of the electrostatic chuck, damage of the fixed substrate, and the generation of particles.
The present invention was conceived to solve the above problems, and its object is to provide an electrostatic chuck that is able to completely prevent abnormal discharge that not only causes damage and destruction of the electrostatic chuck, but also causes damage of the fixed substrate as well as the generation of particles, without increasing the production cost of the electrostatic chuck.
As a result of conducting various studies to develop an electrostatic chuck having superior heat resistance and thermal shock resistance, which in addition to being able to completely prevent abnormal discharge, has at least an insulating member on the side on which the fixed substrate is placed that has low temperature dependency of electric conductivity, superior corrosion resistance to halogen gas and plasma, high strength and high hardness, the inventor of the present invention found that at least the insulating member on the side on which the fixed substrate is placed should be composed with a specific compound sintered body having for its main components silicon carbide particles and aluminum particles, thereby leading to invention of the electrostatic chuck of the present invention.
The electrostatic chuck of the present invention is an electrostatic chuck provided with a pair of insulating members disposed in mutual opposition between which an electrode is interposed, wherein a first insulating member of the above pair of insulating members at least on the side on which the fixed substrate is placed is composed of a compound sintered body having for its main components 4% by weight to 12% by weight of silicon carbide particles and aluminum particles, and the first insulating member has varistor characteristics.
The above varistor characteristics are such that the volumetric specific resistance value of the above first insulating member is from 1xc3x97109 to 1xc3x971012 xcexa9xc2x7 cm when the potential difference between the surface of the above first insulating member on which the fixed substrate is placed and the above electrode is 1000 V or less, and from 1xc3x97107 to 1xc3x97108 xcexa9xc2x7 cm when the potential difference between the surface of the above first insulating member on the side on which the fixed substrate is placed and the above electrode is 3000 V or more.
Furthermore, in the present invention, having for its main components silicon carbide particles and aluminum particles is defined as meaning that the content of silicon carbide particles and aluminum particles combined is 98% by weight or more.
The inventor of the present invention also found that by controlling the content of silicon carbide particles in the compound sintered body that composes the first insulating member on the side on which the fixed substrate is placed, the volumetric specific resistance of the first insulating member can be controlled. They also found that by making the content of silicon carbide particles in the above compound sintered body from 4% by weight to 12% by weight, the volumetric specific resistance value of the first insulating member could be made to be from 1xc3x97109 to 1xc3x971012 xcexa9xc2x7 cm when the potential difference between the surface of the first insulating member on which the fixed substrate is placed and the electrode is 1000 V or less, and from 1xc3x97107 to 1xc3x97108 xcexa9xc2x7 cm when the potential difference between the surface of the first insulating member on the side on which the fixed substrate is placed and the above electrode is 3000 V or more.
Namely, it was found that the first insulating member is provided with varistor characteristics by composing the first insulating member on the side on which the fixed substrate is placed in the manner described above, and since electrical charge accumulated on the fixed substrate can be easily discharged by providing a connecting wire and so forth to the first insulating member even in cases in which plasma is irradiated onto the electrostatic chuck for a long period of time, there is no accumulation of electrical charge on the fixed substrate, thereby making it possible to completely prevent abnormal discharge.
In addition, in the case of using the electrostatic chuck of the present invention, since electrical charge that accumulates on the fixed substrate can be easily discharged by providing a connecting wire and so forth on the first insulating member, it is not necessary to install a ground wire, electrically conductive ring or ionizer and so forth on the fixed substrate as in the prior art, thereby making it possible to reduce the production cost of the electrostatic chuck.
In addition, the inventor of the present invention found that by making the content of silicon carbide particles in the compound sintered body that composes the first insulating member from 4% by weight to 12% by weight, the hardness and strength of the first insulating member are remarkably improved, thereby reducing the generation of particles.
Moreover, the inventor of the present invention found that a first insulating member having the above composition has low temperature dependency of its electrical conductivity, superior corrosion resistance to halogen gas, superior heat resistance and thermal shock resistance, and is free of risk of damage due to thermal stress even during use at high temperatures.
In addition, the inventor of the present invention found that, in the case the average particle size of the silicon carbide particles contained in the compound sintered body that composes the first insulating member exceeds 0.5 xcexcm, the effect of improving the strength of the first insulating member due to addition of silicon carbide particles is diminished, resulting in the risk of an electrical field during plasma irradiation concentrating in the portion of silicon carbide particles and causing the area around the silicon carbide particles to be susceptible to damage.
Thus, it is preferable that the average particle size of the silicon carbide particles contained in the compound sintered body that composes at least the first insulating member of the pair of insulating members of the electrostatic chuck of the present invention be 0.5 xcexcm or less, and preferably 0.2 xcexcm or less.
In addition, the inventor of the present invention found that, in the case the average particle size of the aluminum oxide particles contained in the compound sintered body that composes the first insulating member exceeds 2 xcexcm, the first insulating member is easily etched by plasma resulting in the formation of sputtering scars on the surface of the first insulating member on the side on which the fixed substrate is placed, increased surface roughness and reduced electrostatic adsorption force of the electrostatic chuck.
Thus, it is preferable that the average particle size of the aluminum oxide particles contained in the compound sintered body that composes at least the first insulating member of the pair of insulating members of the electrostatic chuck of the present invention be 2 xcexcm or less.
In addition, the inventor of the present invention found that, in the case at least a portion of the silicon carbide particles are present within the aluminum oxide particles in the compound sintered body that composes the first insulating member, together with the plasma resistance of the first insulating member being improved, due to the gap between the silicon carbide particles becoming narrower, varistor effects can be demonstrated by adding only a small amount of silicon carbide particles.
Thus, it is preferable that at least a portion of the silicon carbide particles be formed within the aluminum oxide particles in the compound sintered body that composes at least the first insulating member of the pair of insulating members of the electrostatic chuck of the present invention.
Furthermore, a small amount of impurities are permitted in the compound sintered body that composes the first insulating member. However, in the case the fixed substrate is used in the production of semiconductor devices, the decreases in life time and gate voltage in the semiconductor device production process are caused by transition metal elements and alkaline metals. In addition, it was verified through research conducted by the inventor of the present invention that, if the amount of metal impurities other than aluminum or silicon exceeds 0.1% by weight, together with the potential for contaminating the wafer or other fixed substrate increasing, the temperature dependency of the electrical resistance of the first insulating member also becomes larger, thereby making this undesirable.
Thus, the content of metal impurities other than aluminum and silicon in the compound sintered body that composes at least the first insulating member of the pair of insulating members of the electrostatic chuck of the present invention is preferably 0.1% by weight or less.
Furthermore, although the second insulating member of the pair of insulating members in the present invention on the side on which the fixed substrate is not placed may be composed of an insulating member having a structure that differs from that of the first insulating member, it is preferable that the second insulating member also be composed of a compound sintered body having the same structure as the first insulating member.
By giving the second insulating member the same structure as the first insulating member, in addition to enabling the second insulating member to have superior corrosion resistance to halogen gas and plasma, high strength and hardness and superior heat resistance and thermal shock resistance, the production process of the electrostatic chuck can be simplified.
According to the present invention, since at least a first insulating member on the side on which a fixed substrate is placed is composed with a compound sintered body of a specific composition having satisfactory varistor characteristics, together with the occurrence of abnormal discharge in the plasma atmosphere, which causes damage and destruction of the electrostatic chuck, damage of the fixed substrate and the generation of particles, being able to be completely prevented, at least the first insulating member on the side on which the fixed substrate is placed has little temperature dependency of its electrical conductivity, superior corrosion resistance to halogen gas and plasma, high strength and hardness, and superior heat resistance and thermal shock resistance, and an electrostatic chuck can be provided that has superior response of adsorption and release of the fixed substrate.
In addition, in the case of using the electrostatic chuck of the present invention, since electrical charge that has accumulated on the fixed substrate can be easily discharged by providing a connecting wire and so forth on the first insulating member, it is no longer necessary to install a ground wire, electrically conductive ring or ionizer and so forth on the fixed substrate as in the prior art, thereby making it possible to reduce the production cost of the electrostatic chuck. |
Q:
Is 'Avoid creating a clustered index based on an incrementing key' a myth from SQL Server 2000 days?
Our databases consist of lots of tables, most of them using an integer surrogate key as a primary key. About half of these primary keys are on identity columns.
The database development started in the days of SQL Server 6.0.
One of the rules followed from the beginning was, Avoid creating a clustered index based on an incrementing key, as you find in these Index Optimization Tips.
Now using SQL Server 2005 and SQL Server 2008, I have the strong impression that the circumstances changed. Meanwhile, these primary key columns are perfect first candidates for the clustered index of the table.
A:
The myth goes back to before SQL Server 6.5, which added row level locking. And hinted at here by Kalen Delaney.
It was to do with "hot spots" of data page usage and the fact that a whole 2k page (SQL Server 7 and higher use 8k pages) was locked, rather then an inserted row
Edit, Feb 2012
Found authoritative article by Kimberly L. Tripp
"The Clustered Index Debate Continues..."
Hotspots were something that we greatly tried to avoid PRIOR to SQL Server 7.0 because of page level locking (and this is where the term hot spot became a negative term). In fact, it doesn't have to be a negative term. However, since the storage engine was rearchitected/redesigned (in SQL Server 7.0) and now includes true row level locking, this motivation (to avoid hotspots) is no longer there.
Edit, May 2013
The link in lucky7_2000's answer seems to say that hotspots can exist and they cause issues.
However, the article uses a non-unique clustered index on TranTime. This requires a uniquifier to be added. Which means the index in not strictly monotonically increasing (and too wide). The link in that answer does not contradict this answer or my links
On a personal level, I have woked on databases where I inserted tens of thousands of rows per second into a table that has a bigint IDENTITY column as the clustered PK.
A:
To sum it up, in modern SQL Server versions a clustered key on an identity column is the preferred option these days.
A:
Kimberly Tripp has a fantastic blog post about just this topic. I could paraphrase, but trust me, I wouldn't do it justice. Have a read. http://www.sqlskills.com/BLOGS/KIMBERLY/post/Ever-increasing-clustering-key-the-Clustered-Index-Debateagain!.aspx
While there, check out some of her other posts on the topic of clustering keys. There is a good wealth of knowledge to be had from her site.
|
/**
* Copyright (c) 2017-present, Facebook, Inc.
* All rights reserved.
*
* This source code is licensed under the BSD-style license found in the
* LICENSE file in the root directory of this source tree. An additional grant
* of patent rights can be found in the PATENTS file in the same directory.
*
* @noflow
* @format
*/
'use strict';
/* eslint nuclide-internal/no-commonjs: 0 */
module.exports = {
rules: {
'api-spelling': require('./api-spelling'),
'atom-apis': require('./atom-apis'),
'consistent-import-name': require('./consistent-import-name'),
'disallowed-modules': require('./disallowed-modules'),
'dom-apis': require('./dom-apis'),
'flow-fb-oss': require('./flow-fb-oss'),
'import-type-style': require('./import-type-style'),
'jsx-simple-callback-refs': require('./jsx-simple-callback-refs'),
'license-header': require('./license-header'),
'modules-dependencies': require('./modules-dependencies'),
'no-commonjs': require('./no-commonjs'),
'no-cross-atom-imports': require('./no-cross-atom-imports'),
'no-fb-deps-from-oss': require('./no-fb-deps-from-oss'),
'no-unnecessary-disposable-wrapping': require('./no-unnecessary-disposable-wrapping'),
'no-unobserved-gk': require('./no-unobserved-gk'),
'no-unresolved': require('./no-unresolved'),
'prefer-nuclide-uri': require('./prefer-nuclide-uri'),
'react-virtualized-import': require('./react-virtualized-import'),
'require-universal-disposable': require('./require-universal-disposable'),
'use-nuclide-ui-components': require('./use-nuclide-ui-components'),
'unused-subscription': require('./unused-subscription'),
},
rulesConfig: {
'api-spelling': 0,
'atom-apis': 0,
'consistent-import-name': 0,
'disallowed-modules': 0,
'dom-apis': 0,
'flow-fb-oss': 0,
'import-type-style': 0,
'jsx-simple-callback-refs': 0,
'license-header': 0,
'modules-dependencies': 0,
'no-cross-atom-imports': 0,
'no-fb-deps-from-oss': 0,
'no-unnecessary-disposable-wrapping': 0,
'no-unobserved-gk': 0,
'no-unresolved': 0,
'prefer-nuclide-uri': 0,
'react-virtualized-import': 0,
'require-universal-disposable': 0,
'use-nuclide-ui-components': 0,
'unused-subscription': 0,
},
};
|
IN THE SUPREME COURT OF MISSISSIPPI
NO. 2003-CA-00456-SCT
PHE, INC. d/b/a
ADAM & EVE, INC.,
ZJ GIFTS, LLC d/b/a
CHRISTAL'S,
JIM HILLEGAS,
MIKE MILLER,
and JANE DOE
v.
STATE OF MISSISSIPPI AND
JIM HOOD, IN HIS OFFICIAL
CAPACITY AS THE ATTORNEY GENERAL
OF THE STATE OF MISSISSIPPI
DATE OF JUDGMENT: 3/7/2003
TRIAL JUDGE: HON. WILLIAM HALE SINGLETARY
COURT FROM WHICH APPEALED: HINDS COUNTY CHANCERY COURT
ATTORNEYS FOR APPELLANTS: ROBERT B. McDUFF
DANIEL MACH
JULIE M. CARPENTER
ATTORNEY FOR APPELLEES: HAROLD EDWARD PIZZETTA, III
NATURE OF THE CASE: CIVIL - CONSTITUTIONALITY OF STATUTE
DISPOSITION: AFFIRMED - 03/18/2004
MOTION FOR REHEARING FILED:
MANDATE ISSUED:
BEFORE WALLER, P.J., COBB AND GRAVES, JJ.
WALLER, PRESIDING JUSTICE, FOR THE COURT:
¶1. Section 97-29-105 of the Mississippi Code provides that knowingly selling, advertising, publishing
or exhibiting any three-dimensional device designed or marketed as useful primarily for the stimulation of
human genitalia ("sexual devices") is illegal.1 Miss. Code Ann. § 97-29-105 (Rev. 2000). PDE, Inc. d/b/a
Adam & Eve, Inc., and ZJ Gifts, LLC d/b/a Christal's ("vendor plaintiffs") sell the type of sexual device
which is prohibited by the statute. Adam & Eve uses the United States Postal Service to advertise and sell
its products. Christal's was a store operating in Southaven, Mississippi, which sold, inter alia, the prohibited
sexual devices, lingerie, novelties, greeting cards, video cassettes, and magazines to customers over 18
years of age. Christal's alleges that it is now out of business due to governmental efforts to enforce § 97-
29-105.2 Jane Doe, Jim Hillegas and Mike Miller ("user plaintiffs") are Mississippi residents who wish to
buy the sexual devices.
¶2. The vendor plaintiffs and the user plaintiffs sued the State of Mississippi and its Attorney General
in Hinds County Chancery Court seeking a declaratory judgment that § 97-29-105 violates Article 3,
sections 13, 14 and 32 of the Mississippi Constitution.3 The vendor plaintiffs allege that the statute unduly
1
Miss. Code Ann. § 97-29-105 (Rev. 2000) provides as follows:
A person commits the offense of distributing unlawful sexual
devices when he knowingly sells, advertises, publishes or exhibits to
any person any three-dimensional device designed or marketed as
useful primarily for the stimulation of human genital organs, or offers to
do so, or possesses such devices with the intent to do so. A person
commits the offense of wholesale distributing unlawful sexual devices
when he distributes for the purpose of resale any three-dimensional
device designed or marketed as useful primarily for the stimulation of
human genital organs, or offers to do so, or possesses such devices
with the intent to do so. . . .
2
The City of Southaven was originally a defendant to the suit, but it was dismissed.
3
Article 3, § 13: "The freedom of speech and of the press shall be held sacred; . . . .
Article 3, § 14: "No person shall be deprived of life, liberty, or property except by due process
of law."
Article 3, § 32: "The enumeration of rights in this constitution shall not be construed to deny and
2
burdens their rights to advertise truthfully their products. The user plaintiffs allege that the statute violates
their right to be free from unwarranted governmental intrusion into their private and legal sexual practices.
They also seek a permanent injunction ordering governmental entities to cease taking actions to enforce the
statute.
¶3. The State filed a motion for summary judgment contending that
1. Limiting the commercial distribution of sexual devices to matters
of medical, scientific, or historical concern does not violate any
recognized constitutional right. The right to privacy does not
require the state to provide unfettered access to any and all sexual
devices under the guise of "sexual freedom"; and
2. Restricting advertisements regarding sexual devices to promotions
associated with medical, scientific, or historical endeavors serves
a substantial government interest consistent with the contours of
regulated commercial speech.
¶4. The chancellor granted summary judgment to the State, finding that the plaintiffs had failed in their
burden to prove that the statute was unconstitutional. He held that "the Mississippi statute . . . merely limits
the commercial distribution of sexual devices when such distribution is unrelated to a valid medical, scientific
or historical purpose," and that there was no "precedent for extending the right to privacy to include the
commercial distribution of sexual devices for any purpose." Finally, the chancellor found that the
restrictions on
advertising and distribution were "limited and directly advance the substantial government interest of
protecting public physical and mental health and supporting public morality."
¶5. From this judgment, the vendor plaintiffs and the user plaintiffs appeal.
STANDARD OF REVIEW
impair others retained by, and inherent in, the people."
3
¶6. A Mississippi court may strike down an act of the legislature "only where it appears beyond all
reasonable doubt" that the statute violates the clear language of the constitution. James v. State, 731 So.
2d 1135, 1136 (Miss. 1999). "All doubts must be resolved in favor of validity of a statute," and any
challenge will fail if the statute "does not clearly and apparently conflict with organic law after first resolving
all doubts in favor of validity." Cities of Oxford, Carthage, Starkville & Tupelo v. Northeast
Miss. Elec. Power Ass'n, 704 So. 2d 59, 65 (Miss. 1997). As we have stated,
The rule is well established that any exercise of police power is valid if it
has for its object the protection and promotion of the public health, safety,
morality or welfare, if it is reasonably related to the attainment of that
object, and if it is not oppressive, arbitrary or discriminatory.
Hollywood Cemetery Ass'n v. Bd. of Mayor & Selectmen of City of McComb City, 760 So. 2d
715, 718-19 (Miss. 2000).
¶7. We employ a de novo standard of review of a trial court's grant or denial of a summary judgment
and examine all the evidentiary matters before it--admissions in pleadings, answers to interrogatories,
depositions, affidavits, etc. The evidence must be viewed in the light most favorable to the party against
whomthe motion has been made. If, in this view, there is no genuine issue of material fact, and the movant
is entitled to judgment as a matter of law, summary judgment should forthwith be entered for the movant.
Otherwise, the motion should be denied. Hurdle v. Holloway, 848 So. 2d 183, 185 (Miss. 2003).
DISCUSSION
I. WHETHER § 97-29-105's BAN ON THE SALE OF
SEXUAL DEVICES VIOLATES THE USER
PLAINTIFFS' CONSTITUTIONAL RIGHT TO
PRIVACY.
The Right to Privacy
4
¶8. "The positive law of this state affords each person a substantial zone of freedom which, at his
election, he may keep private. This zone surrounds person and place and without his consent may not be
invaded by other persons . . . or by the state." Young v. Jackson, 572 So. 2d 378, 381 (Miss. 1990)
(citations omitted). This right of privacy is the "most comprehensive and guarded right emanating from the
Mississippi Constitution," Pro-Choice Miss. v. Fordice, 716 So. 2d 645, 654 (Miss. 1998), and "the
right most valued by civilized man." In re Brown, 478 So. 2d 1033, 1039 (Miss. 1985) (citation
omitted).
¶9. The right to privacy includes the right to "autonomous bodily integrity." Pro-Choice, 716 So. 2d
at 653. "[A] right to privacy exists for citizens and that right entitles citizens 'to be left alone.'" Miller v.
State, 636 So. 2d 391, 394 (Miss. 1994) (quoting Warren and Brandeis, The Right to Privacy, 4
Harv. L. Rev. 193, 193, 195 (1890)). "It requires little awareness of personal prejudice and human nature
to know that, generally speaking, no aspects of life [are] more personal and private than those having to
do with one's sexual organs and reproductive system." Young, 572 So. 2d at 382. "The right to privacy
is so personal that its protection does not require the giving of a reason for its exercise. That one is a
person, unique and individual, is enough." In re Brown, 478 So. 2d at 1040.
Whether the Right to Privacy Includes Access to Sexual Devices
¶10. We find that there is no "independent fundamental right of access to purchase [sexual devices],"
just as the United States Supreme Court found that there was no independent fundamental right of access
to purchase contraceptives. Carey v. Population Servs. Int'l, 431 U.S. 678, 688, 97 S. Ct. 2010,
2018, 52 L. Ed. 2d 675 (1977).4 However, the plaintiffs argue that "such access is essential to the exercise
4
Although there are no federal constitutional claims before us in this case, we do consider
federal precedents in construing the Mississippi Constitution.
5
of the constitutionally protected right [of privacy to engage in adult consensual sexual activities]." Id., 97
S. Ct. at 2018.
¶11. Indeed, the United States District Court of the Northern District of Alabama, in finding that a similar
statute was unconstitutional, concluded that the "prohibition of the sale of sexual devices imposes a
significant burden on the right of married and unmarried persons to sexual privacy, in that it severely limits
their ability to access, and thus to use, sexual devices within their sexual relationships." Williams v.
Pryor, 220 F. Supp. 2d 1257, 1298 (N.D. Ala. 2002). We find persuasive the decisions of the Georgia,
Louisiana and Texas courts which have explicitly rejected attempts to redefine expand the right to privacy
to include the commercial distribution of sexual devices. See Pierce v. State, 239 S.E.2d 28, 29 (Ga.
1977); State v. Brenan, 772 So. 2d 64 (La. 2000); Yorko v. State, 690 S.W.2d 260 (Tex. Crim.
App. 1985). The Alabama federal court compared access to sexual devices to access to contraceptives.
Williams, 220 F. Supp. 2d at 1298. We disagree and find that society's interest in protecting the right
to control conception is of greater magnitude than the interest in protecting the right to purchase sexual
devices.
¶12. People who are sexually dysfunctional (presumably those people who cannot achieve sexual
enjoyment and fulfillment without a sexual device) should be treated by a physician or a psychologist.5
Sexual dysfunction may be caused by medicinal side effects, diabetes, hormonal problems, endocrine
problems, cardiovascular illness, neurological impairments, psychological problems or hypertension. Miss.
5
In his affidavit in the record before us, Stanley Smith, Ph.D., the Director of Psychology for the
State Department of Mental Health at Ellisville State School and the Clinical/Forensic Director at the
Centurion Counseling Center in Hattiesburg, states that medical standards of practice require a patient
suffering a sexual dysfunction to be thoroughly evaluated by a physician to determine if there is a
medical cause of the dysfunction.
6
Code Ann. § 97-29-107(1)(b) (Rev. 2000) expressly provides that physicians and psychologists may
prescribe sexual devices for their patients, and the patients may purchase the sexual devices from the
physicians and psychologists. The novelty and gag gifts which the vendor plaintiffs sell have no medical
purpose.
¶13. The only conclusion we can reach is that the sale of or access to sexual devices sold by novelty
stores is not protected under the right to privacy guaranteed under the Mississippi Constitution.
¶14. Plaintiffs contend that we must apply the strictest level of scrutiny when we analyze § 97-29-105.
Because we conclude that access to sexual devices is not protected by the constitutional right to privacy,
this issue is moot.
II. WHETHER § 97-29-105's PROHIBITION OF THE
ADVERTISEMENT, SALE AND DISTRIBUTION OF
SEXUAL DEVICES VIOLATES THE VENDOR
PLAINTIFFS' CONSTITUTIONAL RIGHT TO FREE
SPEECH.
The Sale and/or Distribution of Sexual Devices
¶15. The United States Supreme Court has held that certain sexually expressive items are "entitled to
some quantum of protection under the First Amendment [the right to free speech]." City of Erie v. Pap's
A.M., 529 U.S. 277, 285, 120 S. Ct. 1382, 1388-89, 146 L. Ed. 2d 265 (2000). The items sold by
Adam & Eve and Christal's, however, are at best "symbolic speech," falling within the "outer ambit of the
protection" and subject to evaluation under United States v. O'Brien, 391 U.S. 367, 88 S. Ct. 1673,
20 L. Ed. 2d 672 (1968). As Justice Scalia has stated, "[T]he sordid business of pandering is
constitutionally unprotected[.] [T]he sale of material solely to produce sexual arousal does not escape
regulation because the [sexual devices] has been dressed up as speech, or in other contexts might be
7
recognized as speech." FW/PBS, Inc. v. City of Dallas, 493 U.S. 215, 225-26, 110 S. Ct. 596, 604-
05, 107 L. Ed. 2d 603 (1990) (Scalia, J., concurring).
¶16. Under the four-part O'Brien content-neutral test used for analyzing symbolic speech, government
regulation is sufficiently justified if (1) it is within the constitutional power of the government; (2) it furthers
an important or substantial governmental interest; (3) the governmental interest is unrelated to the
suppression of free expression; and (4) the incidental restriction on alleged freedom of speech is no greater
than is essential to the furtherance of that interest. O'Brien, 391 U.S. at 377, 88 S. Ct. at 1679.
¶17. Applying these factors to the case at hand, the plaintiffs have not questioned the State's
constitutional power to regulate businesses which sell and/or distribute sexual devices. As discussed under
Issue I, the statute furthers important or substantial governmental interests. The plaintiffs do not contend
that the purpose of the Legislature in enacting the statute was to suppress free speech. Finally, the
prohibition on the sale and/or distribution constitutes only an incidental restriction on the vendor plaintiffs'
alleged right to freedom of speech which is no greater than is essential to the furtherance of the State's
governmental interests.
The Advertisement of Sexual Devices
¶18. The advertising done by the vendor plaintiffs is a paradigm of purely commercial speech. It is
speech which does "no more than propose a commercial transaction," and which is "related solely to the
economic interests of the speaker and its audience." Central Hudson Gas & Elec. Corp. v. Public
Service Comm'n, 447 U.S. 557, 561, 100 S. Ct. 2343, 2349, 65 L. Ed. 2d 341, 348 (1980); Va.
State Bd. of Pharmacy v. Va. Citizens Consumer Council, Inc., 425 U.S. 748, 762, 96 S. Ct.
1817, 1825, 48 L. Ed. 2d 346, 358 (1976). Not all commercial speech enjoys First Amendment
protection. Central Hudson, 447 U.S. at 566, 100 S. Ct. at 2351, 65 L. Ed. 2d at 351. Only
8
commercial speech which concerns lawful activity and which is not misleading is protected by the First
Amendment. Id. at 566, 100 S. Ct. at 2351, 65 L. Ed. 2d at 351. States may ban commercial speech
which is related to illegal activity. Id. at 564, 100 S. Ct. at 2350, 65 L. Ed. 2d at 349.
¶19. We find that, since § 97-29-105 makes the sale of sexual devices illegal, advertising the sexual
devices is not protected by the right to free speech. In other words, the advertisements would propose an
illegal transaction -- i.e., an unlawful sale of sexual devices.
CONCLUSION
¶20. Because it does not appear beyond all reasonable doubt that Miss. Code Ann. § 97-29-105
violates the clear language of the Mississippi Constitution, we affirm the chancellor's grant of summary
judgment to the State.
¶21. AFFIRMED.
PITTMAN, C.J., SMITH, P.J., COBB, EASLEY AND CARLSON, JJ., CONCUR.
GRAVES AND DICKINSON, JJ., CONCUR IN RESULT ONLY. DIAZ, J., NOT
PARTICIPATING.
9
|
Moores Bridge, Alabama
Moores Bridge, also spelled Moors Bridge, is an unincorporated community in Tuscaloosa County, Alabama, United States. Moores Bridge is located along Alabama State Route 171, north-northwest of Tuscaloosa.
History
Moores Bridge is named for the bridge built by Duncan Taney Moore over the Sipsey River. A post office operated under the name Moores Bridge from 1853 to 1966.
Notable person
James Jefferson Mayfield, Associate Justice of the Alabama Supreme Court from 1908 to 1920
References
Category:Unincorporated communities in Tuscaloosa County, Alabama
Category:Unincorporated communities in Alabama |
1. Introduction {#sec1-materials-09-00410}
===============
Due to their industrial scale of production, fly ash and slag are now presented as low life cycle CO~2~ emissions, environmentally-friendly and sustainable solid precursors for alkali-activated cement, mortar and concrete \[[@B1-materials-09-00410],[@B2-materials-09-00410]\]. A wide variety of such industrial wastes is described in the literature with very variable composition \[[@B3-materials-09-00410],[@B4-materials-09-00410]\] thus making their alkali-activation a complex issue. Apart from coal fly ash, blast furnace slag, calcined kaolins, and few others for which it can be said confidently that are suitable for EN 197 cements and can also be properly and successfully employed in the production of geopolymers or hybrid alkaline cements, few recent works have been aimed at valorization of poorly reactive/not-recycled waste materials \[[@B5-materials-09-00410],[@B6-materials-09-00410]\]. In the present study two different steel slags were used with metakaolin and sand to generate an aluminosilicatic matrix via alkali activation. This aluminosilicatic matrix was designed to attain a good chemical stability taking into account the existing models on mixed C--S--H (CaO--SiO~2~--H~2~O) structure. In fact, the chemical and mechanical stability of alkali-activated materials is based on some equilibrium between the geopolymer gel phase and the reacted aggregate that constitutes the alkali activated matrix. The stability of silicates-based binders, including ordinary Portland cement, has been found to be improved by the presence of Al ions during the polycondensation reactions \[[@B1-materials-09-00410],[@B7-materials-09-00410]\]. Aluminum cations incorporated in C--S--H gel were found to improve the resistance to carbonation. It was observed that all aluminum present in the silicate tetrahedra chains were five-fold coordinated species in interlayer and six-fold coordinated at the surface and theywere incorporated into the amorphous silica phase forming fully condensed tetrahedral Al(-SiO)~3~ sites \[[@B1-materials-09-00410],[@B7-materials-09-00410]\]. Myers *et al.* \[[@B1-materials-09-00410]\] identified in granulated blast furnace slag three distinct tetrahedral Al sites: Q^3^(1Al), Q^4^(3Al) and Q^4^(4Al) which are indicative on the cross-linking degree in the calcium (alkali) aluminosilicate hydrate (C--(N--)A--S--H) gels and the presence of additional highly polymerized aluminosilicate products. For appropriate Si/Al ratio, the amount of non-bridging oxygen (NBO) is a function of SiO~2~/Na~2~O molar ratio. Low value of SiO~2~/Na~2~O is consistent with the increasing number of NBO sites where SiQ^2^ and SiQ^1^ structural units were preferentially formed from silicate chains, dimers and monomers. High SiO~2~/Na~2~O molar ratio generates a decreasing number of NBO sites with structures consisting principally of SiQ^3^ and SiQ^4^ structural units which form silicate 3D frameworks and sheets \[[@B7-materials-09-00410]\]. When CaO is present, C--S--H is the principal hydration product and primary binding phase; it can be described as a single chain structure that faces polymerization decreasing with the increase of Ca content \[[@B8-materials-09-00410]\].
While pure geopolymer (N--A--S--H or K--A--S--H) and ordinary Portland cement (C--S--H) phases are generally formed from pure metakaolin and kaolin-calcite respectively, the industrial and natural wastes (fly ash, slag, incinerator bottom ash, volcanic ash, rice husk ash, *etc.*) are complex mixes of geopolymers and OPC forming elements. The high temperature of process, the level of vitrification and melting, the cooling rate and the initial bulk composition will result in the formation of amorphous or partially crystalline phases, as mullite, anorthite, plagioclase, pyroxene *etc.* \[[@B9-materials-09-00410],[@B10-materials-09-00410],[@B11-materials-09-00410]\]. The better crystallized phases will not dissolve even in high alkaline media, thus hindering the polycondensation. Therefore, the appropriate mode to design the alkali-activated materials should not be generalized to a simple activation of finely grounded powder with the alkaline solution, but a more complex mix-design approach is necessary.
Slag from ferrous metallurgy are generally calcium- and iron-rich (40 wt %--52 wt % CaO; 70 wt %--80 wt % FeO; 20 wt %--30 wt % Fe~2~O~3~ \[[@B9-materials-09-00410]\]) with limited Si and Al content (10 wt %--19 wt % SiO**~2~**; 1 wt %--3 wt % Al~2~O~3~ \[[@B9-materials-09-00410]\]). The main minerals consist of C~3~S, C~2~S, C~4~AF, C~12~A~7~, RO~ss~ (R = Ca, Fe, Mn, Mg solid solution) and free CaO \[[@B9-materials-09-00410],[@B10-materials-09-00410],[@B11-materials-09-00410]\] embedded in a variable amount of amorphous phase depending on the slag cooling practice. Steel slag has a large amount of non-active compounds such as RO and Fe~3~O~4~. In the high alkaline context, like that of inorganic polymer cement, the non-active components as well as the others crystalline phases of the slag are dissolved in an incongruent manner essentially at their surfaces. With their fine particle size, they seem attractive for the mechanical reinforcement of the matrices through the filler effect and densification. Additionally, they can ideally act as nucleation sites to optimize the reaction of geopolymerization.
Starting from the considerations listed above, the approach used for this research was to consider the slag powder as binder precursor, finer and more amorphous particles, as well as fine aggregates, non-reactive particles. We also operated to obtain a geopolymeric paste with Si/Al close to 2.0--2.5 and Na/Al equal to 1, with the addition of a minimum amount of metakaolin. The larger unreacted slag phases remained embedded in such a matrix as aggregate in a mortar.
The two different steel slags from Electric Arc Furnace (EAF) steelmaking industry (Italy), used in this study, were prepared in an industrial process of production of manufactured aggregates. The presence of slag's reactive phases, eventually metals, in alkaline environment were supposed to produced geopolymeric cements with a relevant porosity suitable for application as passive phase change humidity control material, which can moderate the indoor moisture. In fact our formulations were expected to be close to vesuvianite, sepiolite and zeolite which are all used as hygroscopic base materials in the manufacturing of moisture control materials for indoor wall coatings. Actually, it is generally observed that materials produced with cold setting processes as cement based mortars, concretes, *etc.* is capable to collect up to 8 wt %--10 wt % of humidity after complete curing and exposure to ambient environment. So for, aside the determination of the adsorption/desorption capacity and the permeable voids assessed with water absorption for these steel slag based inorganic polymer mortars, we also evaluated the morphology and the microstructure using several techniques, in particular X-ray diffraction (XRD), Fourier Infrared spectroscopy (FIT-IR), Mercury Intrusion Porosimeter (MIP), three-point flexural strength and Environmental Scanning Electronic Microscope (ESEM).
2. Materials and Methods {#sec2-materials-09-00410}
========================
2.1. Characterization of Ferricalsialic and Calsialic Slags {#sec2dot1-materials-09-00410}
-----------------------------------------------------------
Two steel slags from EAF steelmaking process were provided by Acciaierie Bertoli Safau in Italy and identified as ABS black (BSS) and ABS white (WSS). The first slag is obtained by the primary process in production of steel (melting of scrap in EAF furnace), while the second is obtained by the secondary metallurgical process (final steel alloy in ladle furnace). Additionally, BSS can be classified as an oxidation slag, while WSS is a reduction slag. Both slags, also indicated as SS, coming out from the furnaces, after cooling process, constitute the raw materials for production of aggregates. The cooling of slags is realized in a two-step process: Firstly the hot material is placed underneath water sprinklers of in order to rapidly reduce its temperature, and second the material is stocked in a pile to conclude the cooling process by air. Especially for black slag, the cooling process is very important and necessary to reduce the amount of free lime and to determine a high mechanical resistance for material. The black slag is generally considered as not suitable for the use in production of cement, while it is considered a good material to produce aggregates for concrete, bituminous conglomerate and civil constructions. Due to its high content of free lime and poor mechanical resistance, the white slag is instead suitable for the production of cement and may substitute the lime itself in stabilization of soils. The steel slags used in this study were provided as manufactured aggregates, obtained by processing the raw materials with the following operations: ageing storage, removing of scrap particles by magnetic separation, reduction of dimension by crushing, calibration of different products by screening.
The chemical compositions of the slag were determined by X-ray fluorescence (ARL™ QUANT\'X EDXRF, Thermo Fisher Scientific, Waltham, MA, USA) are presented in [Table 1](#materials-09-00410-t001){ref-type="table"}. Both slags had negligible content of C. The S content is 0.3% for BSS and 1.6% for WSS. The sulphur content is reported as SO~3~ according to XRF analysis. The chemical dissolution of white ABS slag performed using concentrated NaOH (8M) (extended description of the test method is reported in Ref. \[[@B12-materials-09-00410]\]) allowed to determine 35.89 wt % of reactive species, while the remaining 64.11 wt % could be accounted as of aggregates. For the black slag, 72.96 wt %was reactive species while only 27.04 wt % was identified as aggregates.
The mineralogical phases as determined by XRD analysis, using X-ray (X'Pert PRO---PANAlytical, Eindhoven, The Netherland) CuKα, Ni-filtered radiation (λ = 1.54184 Å) are given in [Figure 1](#materials-09-00410-f001){ref-type="fig"}a. Based on the chemical compositions in [Table 1](#materials-09-00410-t001){ref-type="table"}, the SS can be classified as calsialic for the white and ferricalsialic for the black slag specimens. The particle size distributions which were measured by a laser particle size instrument (MASTER SIZER 2000, Malvern, UK) arepresented in [Figure 1](#materials-09-00410-f001){ref-type="fig"}b. The morphology of the grains as observed by ESEM is presented in [Figure 1](#materials-09-00410-f001){ref-type="fig"}c. It is evident that the black slag is finer than the white sample in the range of small particles, up to 32 µm ([Figure 1](#materials-09-00410-f001){ref-type="fig"}b). Between 32 and 283 µm the B specimen is finer and when the particle size was greater than 283 µm the black slag is coarser. The white slag with low iron content and highest CaO presents particles size similar to that of ordinary Portland cement \[[@B2-materials-09-00410]\] while the particle size distribution of the black sample is typical of steel slag. The iron oxide and RO phases constitute the essential of the coarse particles.
The specific surface area as determined using nitrogen sorption method, BET (Brunauer-Emmet-Teller, method by nitrogen absorption on a GEMINI 2360, Micromeritics Instrument Corp., Norcross, GA, USA) gave 3.39 m^2^/g for the white ABS slag and 2.06 m^2^/g for the black ones. Under thermal analysis ([Figure 2](#materials-09-00410-f002){ref-type="fig"}), both slags presented endothermic peak around 106 °C related to the physico-absorbed water present within the samples. White slag showed peaks of decomposition at 256, 324, 413, and 487 °C. Peaks consecutive to transformation of hydrated for of Fe~2~O~3~. xH~2~O, y-FeOH(OH) and Mg(OH)~2~ \[[@B4-materials-09-00410]\]. These compounds formed during the water granulation processes through the pouring into larger quantity of water to avoid excessive foaming. The peak situated at 760 °C corresponds to the decomposition of the Ca based phases of the slag. The peak at 1119 °C is related to the crystallization of aluminosilicate type mullite. The weight decrease for both steel slags ([Figure 2](#materials-09-00410-f002){ref-type="fig"}b) is indicative for the percentage of volatile materials into the samples (Ca(OH)~2~, H~2~O, CO~2~, *etc.*).
The metakaolin (MK) was obtained from a standard kaolin used for glaze formulation in the ceramic industry after calcinations at 700 °C for 4 hand ground finely down to 30 µm (D90). The oxide molar composition of the metakaolin, determined by XRF, gave a value of Si/Al = 1.3 in terms of the mass ratio \[[@B13-materials-09-00410]\].
2.2. Mix-Design and Preparation of Inorganic Polymer Mortars {#sec2dot2-materials-09-00410}
------------------------------------------------------------
### 2.2.1. Mix-Design {#sec2dot2dot1-materials-09-00410}
The white and black ABS slags presented 40.31 wt % and 36.52 wt % of CaO but the SiO~2~ contents of both materials were 11.33 wt % and 12.78 wt %, respectively. These contents result in Ca/Si molar ratios of 5.45 for the WSS and 4.38 for BSS. The main oxide content, *i.e.*, SiO~2~ + Al~2~O3 + Fe~2~O~3~, are less than 40 wt % for the white ABS and \<50 wt % for the black sample, far from the \~80 wt % proposed by Davidovidts \[[@B14-materials-09-00410]\] as requirement for the formulation of polysialates.
We proposed to adjust the bulk chemical composition with addition of metakaolin, MK, in a mix with semi-crystalline particles of silica sand. The white and black ABS slags, SS, were used with metakaolin in the following proportions: 1 SS:1 MK(B60 and W60), 2 SS:1 MK (B90 and W90) and 3 SS:1 MK (B120 and W120). The obtained solid precursors were finely ground down to 60 µm and used to form inorganic polymer mortars with sand representing two times the mass of slag-metakaolin, SS-MK, powder. The sand was also ground to reduce the particles size below 400 µm for research sake, but to improve the economy of the process the natural sand can be replaced with fine gravel.
### 2.2.2. Sample Preparation {#sec2dot2dot2-materials-09-00410}
NaOH (laboratory grade of pellets from Sigma Aldrich, Milan, Italy) was dissolved in deionized water to reach a concentrated 8M solution. This solution, after having been stored for a minimum of 48 h, was mixed with sodium silicate (SiO~2~/Na~2~O, molar ratio = 2.98; industrial grade from Ingessil, Verona, Italy) in volume proportion of 2:3. The final mix was used to prepare the inorganic polymer pastes with proportions reported in [Table 2](#materials-09-00410-t002){ref-type="table"}. The variation in the liquid: solid weight ratio (liquid = soda plus Na-silicate solution; solid = SS plus MK plus sand) as indicated into the [Table 2](#materials-09-00410-t002){ref-type="table"} as well as the NaOH:Na~2~SiO~3~ volume ratio were chosen considering the behavior of the steel slag into the alkaline solution and the objective to draw pastes with similar final viscosity. The difference between the series B and W was dependant on the difference between the potential reactive fraction of each steel slag. The pastes for the six formulations were mixed in a bench mixer for approximately 10 min and poured in 1 × 1 × 14 cm^3^ polyurethane molds. Soon after pouring, the specimens were isolated from air into closed plastic films for the first 72 h. The curing continued in ambient conditions, room temperature around 21 ± 2 °C and 54% ± 1% of humidity (usual indoor environment) for up to 365 days. This curing procedure was considered optimal for the samples prepared in the laboratory with no defects. The mechanical characterization was performed on the specimens cured for 28 and 365 days.
2.3. Characterization of the Cured Steel Slag-BasedAlkali-Activated Mortars {#sec2dot3-materials-09-00410}
---------------------------------------------------------------------------
The mineralogical analysis of the alkali-activated steel slag, AAS, mortars were carried out with an X-ray powder diffractometer, XRD (see above) from 5° to 70°, 2theta steps and integrated at the rate of 2 s per step.
Fourier transformed infrared spectroscopy, FT-IR, (Avatar 330 FTIR, Thermo Nicolet, Waltham, MA, USA) was performed on each sample analyzing fine powders of ground specimens (ф \< 80 µm) collected from samples used for the mechanical test after curing for 28 days. A minimum of 32 scans between 4000 and 500 cm^−1^ were averaged for each spectrum at intervals of 1 cm^−1^.
An Autopore IV 9500, Micromeritics, 33000 psi (228 MPa) Mercury Intrusion Porosimeter (MIP, Manchester, UK) covering the pore diameter range from approximately 360 to 0.005 μm having two low-pressure ports and one high-pressure chamber was used for the pores analysis. Pieces were prepared from the bulk of each sample with specimens of \~1 cm^3^ of volume for the MIP. Apart from the pore volume and size, the equipment software also automatically evaluated the tortuosity as the ratio of the length of the path described by the pore space to the length of the shortest path across a porous mass.
Specimens (10 for each composition to reduce the error within 20%) with nominal size of 10 ± 0.10 mm in width, 10 ± 0.10 mm thick and a length of 140 ± 0.10 mm were used for the mechanical tests by using a three-point bending configuration with span equal to 40 mm according to ASTM C1161-02c standard. The specimens were loaded by a universal testing machine, type MTS 810, (MTS Systems Corporation, Eden Prairie, MN, USA) with cross-head speed of 5 mm/min.
The microstructure of the inorganic polymer cement specimens was studied using an Environmental Scanning Electron Microscope (ESEM, Model Quanta 200, FEI, Hillsboro, OR, USA) at low vacuum. Both fractured pieces from mechanical testing and etched polished specimens were used. The specimens were preliminarily coated with 10 nm thick gold layer. The ESEM was equipped with an Oxford Instruments energy dispersive spectrometer (EDS) for the microanalysis thus facilitating the investigation of phase distribution in the matrix.
To evaluate the capability to help in the control of indoor humidity in buildings, the adsorption/desorption behavior of the AAS mortars was evaluated on two specimens aged 28 days per each formulation dried at room temperature for 24 h and then soaked in deionizer water for 24 h accordingly to previous studies \[[@B15-materials-09-00410]\]. Specimens of prismatic shape as those used for mechanical characterization were weighted in their saturated condition and the time of the first measurement was considered as *t*~0~. After each hour---for the first 10 h---the measurement was repeated, then weight measurement of the sample continued every 24 h for 1000 h. This measurement was repeated four times (four cycles, also indicated as water cycles) in the laboratory conditions (T = 21 ± 2 °C, R.H. (Room Humidity) 54% ± 1%). Finally, water absorption was determined as ratio of the water saturated specimen with respect to the dry one; variation of the water release after saturation is expressed as rate of weight change and the humidity content coincides with the water retained by the sample after the 1000 h test time. Additionally, the shrinkage and expansion were monitored, however, changes in dimensions were not identified.
3. Results {#sec3-materials-09-00410}
==========
3.1. Phases Development {#sec3dot1-materials-09-00410}
-----------------------
The XRD patterns of both white and black slag-based AAS mortars exhibited amorphous structure and higher peak intensities of crystalline phases ([Figure 3](#materials-09-00410-f003){ref-type="fig"}a,b). The halo that generally characterizes the fully reacted and amorphous structure of alkali-activated materials is visible around 2θ = 27° for all formulations. These broad diffuse halos in XRD patterns correspond to three-dimensional networks for low angle values (2θ \< 30°) \[[@B5-materials-09-00410],[@B16-materials-09-00410]\]. In our study, these halos were centered at 28.42°, 28.16° and 27.64° respectively for 1:1, 1:2 and 1:3 MK:WSS; and at 27.33°, 27.30° and 27.31° for MK:BSS. Typical metakaolin based inorganic polymer cement generally shows 2θ \< 27° \[[@B17-materials-09-00410]\]. Thus it can be deduced that the introduction of the steel slag, with low aluminosilicate content, reduced the degree of typical N--A--S--H gel formation and polymerization of aluminosilicates (geopolymerization).The shift toward higher 2θ values by introducing steel slag is also confirmed by Bignozzi *et al.* \[[@B13-materials-09-00410]\] for geopolymers with ladle slag (white slag).
The formation of only amorphous phases peculiar of MK geopolymers is no longer ensured after the introduction of steel slags. In fact, the as-received steel slag are partially composed of crystalline phases, such as C~3~S, C~2~S, C~4~AF, and C~12~A~7~ as well as RO (R = Ca, Fe, Mn) solid solution \[[@B18-materials-09-00410]\], which contributed to modify the level of disorder and crystallinity into matrix. Their participation into the geopolymerization process is limited to the surface reactivity that contribute to the densification of the mortars, nevertheless no quantitative calculation of the crystallinity/amorphicity ratio was done in this study.
From the FT-IR spectra ([Figure 3](#materials-09-00410-f003){ref-type="fig"}c,d), it is observed that all samples show two bands related to O--H stretching: (i) at 3347 cm^−1^ for B series and 3386 cm^−1^ for W series; and (ii) \~1646 cm^−1^ for W series and 1654 cm^−1^ for B series. The increase in steel slag content decrease the intensity of both peaks related to the O--H stretching. This is related to the reduction of typical N--A--S--H phases from metakaolin-based geopolymers that decrease with the increase of the steel slag. The behavior of the bands can be correlated with the evolution of the peaks around 1400--1450 cm^−1^, generally ascribed to three-fold-coordinated aluminum that decreases in intensity with the increase of the steel slag content ([Figure 3](#materials-09-00410-f003){ref-type="fig"}c,d). B60 and W60, which presented the higher intensity for the OH-stretching peaks, have the principal peaks of alkali-activated aluminosilicates (Si--O--Si(Al)) at \~980 cm^−1^ and 982 cm^−1^ respectively \[[@B19-materials-09-00410]\].
By increasing the slag content, the peaks of B series moves to 994 cm^−1^ for B120 and 995 cm^−1^ for W120. The shift of the principal band towards higher wavenumber with the increase of the steel slag content indicates that with the introduction of the slag, very limited content of aluminum available and the possibility of their incorporation into the geopolymer network decrease \[[@B19-materials-09-00410],[@B20-materials-09-00410],[@B21-materials-09-00410],[@B22-materials-09-00410],[@B23-materials-09-00410]\]. The bands with small intensities between 690 and 850 cm^−1^ are attributed to geopolymer products. They are related to the symmetric stretching vibration of Si--O--Si (or Si--O--Al) bridges as well as the cyclosilicates vibrations \[[@B19-materials-09-00410],[@B20-materials-09-00410]\]. They are also affected by the variation of the slag content. The band between 880 and \~900 cm^−1^, presented as a small shoulder on the main Si--O--T band, is assigned to the stretching vibration mode of Al--O bonds in condensed AlO~4~^−^ groups.
3.2. Porosity and Pore Size Distribution {#sec3dot2-materials-09-00410}
----------------------------------------
### 3.2.1. Pore Permeable to Mercury in MIP Tests {#sec3dot2dot1-materials-09-00410}
The variations of the cumulative pore volume of the white and black slag-based AAS mortars are summarized in [Figure 4](#materials-09-00410-f004){ref-type="fig"}. B60 presents 0.160 mL/g of cumulative pore volume. This value decreases to 0.122 mL/g and 0.118 mL/g, respectively for B90 and B120. A similar trend is observed for the W series: the cumulative pore volume decreases from 0.180 mL/g for W60 to 0.170 and 0.160 mL/g for W90 and W120, respectively. In general, the pores volume for the W series is more important than for B series. However, the pores volume in both inorganic polymer mortars is lower than in typical metakaolin based inorganic polymer cement (\~0.300 mL/g) \[[@B21-materials-09-00410],[@B22-materials-09-00410]\]. These values are pretty reliable as far as our experience is related since we usually operate after careful calibration of the equipment \[[@B17-materials-09-00410]\].
Focusing on the cumulative pores volume curves ([Figure 4](#materials-09-00410-f004){ref-type="fig"}), the progressive decrease in the pore (larger capillary pores with size \>1 µm) volume noted has important values for B120 with respect to B90. Similarly, the larger capillary pores in W120 are significantly bigger than in W90. The understanding of the relative decrease in cumulative pore volume with the increase of the slag content needs two important factors to be considered: (i) both slags contain a fraction of aggregates (27 wt % for the black slag and 64 wt % for the white one) which in this study are presented as fine aggregates \[[@B17-materials-09-00410]\]; and (ii) the role of metallic iron in the dissolution and polymerization reactions \[[@B23-materials-09-00410],[@B24-materials-09-00410]\]. As described above, the finer particles of the steel slags are essentially composed of RO~ss~ (R = Ca, Fe, Mn, and Mg solid solution) of semi-crystalline nature. These fines undergo to incongruent dissolution, *i.e.*, they react essentially on the surface, during the dissolution, thus participating in the chemical-physical reactions typical of geopolymeric consolidation, reducing the volume of air voids and bubbles as generally observed in metakaolin-based inorganic polymer cement \[[@B15-materials-09-00410],[@B19-materials-09-00410]\]. The role of fines in the reduction of pores volume has already been demonstrated by Kamseu *et al.* \[[@B15-materials-09-00410]\]. The fines into the context of inorganic reactions are known to accelerate the hydration acting as nucleation sites for binding phases (C--S--H, C--(N)--A--S--H, N--A--S--H, *etc.*) \[[@B25-materials-09-00410]\].
The small particles of metals still present in the slags are corroded by the alkaline media enhancing the heat of reaction and thus the kinetic of the reactions. These metallic particles are also responsible for the increase of the fraction of the larger capillary pores due to hydrogen evolution similarly to what shown for the case of aluminum metal in concentrated alkaline solutions \[[@B26-materials-09-00410]\]. The major fraction of pores of the W series is concentrated between 0.01 and 0.1 µm ([Figure 5](#materials-09-00410-f005){ref-type="fig"}). Such pores correspond to those generally described for the fly ash and metakaolin based inorganic polymer cements \[[@B17-materials-09-00410],[@B21-materials-09-00410]\]. The coarser capillary pores with size between 1 and 10 µm that are not generally observed in the IPC, are ascribed to pores developed from the corrosion reactions of the metallic iron contained in the slag. This class of pores is more important for the B specimens than for W ones in agreement with the iron content accounting for 12.3 wt % and 31.9 wt % for W and B, respectively. In the W series the dominance of the gel pores (size between 0.01 and 0.1 µm) make the cumulative pore curves present the typical characteristics of the IPC mortars: apart from a small increase in the region of the capillary pores due to iron residues (1--10 µm), a significant increase is observed at 0.1 µm. The fraction of the pores between 1--10 µm in W series increased from 16.7 vol % for W60 to 17.6 vol % and 18.8 vol % for W90 and W120, respectively. From the behavior of the cumulative pores volume and the particles size distribution ([Figure 4](#materials-09-00410-f004){ref-type="fig"} and [Figure 5](#materials-09-00410-f005){ref-type="fig"}) the two classes of pores into W series are isolated, hence the interconnection degree is very limited. In the B series the cumulative pore volume curves evidence the effect of the corrosion of metallic iron on the fraction of the pores \>0.1 µm. Only \~16 vol % of pores have size \<0.1 µm in B90 and B120 specimens, with the percentage raising to 18.8 vol % for B60. Pores with size \>0.1 µm dominate the total porosity of the specimens of the B series. This is completely different in series W where most of the pores have size \<0.1 µm. Consequently, the structure of the B series materials corresponds to a matrix with interconnected pores as confirmed in the [Figure 4](#materials-09-00410-f004){ref-type="fig"} and [Figure 5](#materials-09-00410-f005){ref-type="fig"}. The increase of the fraction of larger capillary pores with the steel slag content in both B and W series confirms the role of the metallic iron during the alkali-activation of the steel slag mortars. The difference between the two samples shows that the Fe particles action on porosity can be tuned using the mix-design.
### 3.2.2. Pores Permeable to the Moisture and Liquid Water {#sec3dot2dot2-materials-09-00410}
After 365 days curing at room temperature, the white and black slag-based AAS mortars release 2.5 wt %, 5.9 wt % and 4.1 wt % moisture for W60, W90 and W120, respectively, when treated at 100 °C for 24 h. The moisture released in similar conditions for B60, B90 and B120 were 6.6 wt %, 5.7 wt % and 4.4 wt % respectively. It is clear that moisture content increases with the amount of white slag while the behavior is opposite with black slag. W60 specimen with the lower moisture release (2.5 wt %) possesses the higher specific cumulative pore volume (0.18 mL/g). B60 specimen with the higher moisture release (6.6 wt %) presents the highest volume of larger capillary pores with size \>1 µm. It is observed that the specimens of the series B reabsorbed the moisture with a higher rate compared to the specimens of the W series ([Figure 6](#materials-09-00410-f006){ref-type="fig"}). These observations are correlated to the pore network structure of the two AAS mortars: B series samples present a larger fraction of pores with size \>0.1 µm (\>70 vol %) while W series specimens possess only \~16 vol % pores with size \>0.1 µm and more than 80 vol % pores with size \<0.1 µm. The large fraction of pores with size \>0.1 µm explains the higher degree of pore connectivity in series B with respect to series W. Specifically, the fraction of pores with size between 1 and 10 µm that are supposed to be developed from the Fe particles corrosion during the alkali-activated reactions ([Figure 4](#materials-09-00410-f004){ref-type="fig"} and [Figure 5](#materials-09-00410-f005){ref-type="fig"}) are more important in the series B. The important volume of these pores can be considered as the origin of pores coalescence, hence significantly reducing the gel pores. B60, B90 and B120 specimens cured at room temperature for 365 days at ambient relative humidity (R.H. 54% ± 1%) absorb 5.9 wt %, 4.5 wt % and 3.3 wt % water, respectively,. This decrease in water absorption with the amount of steel slag for B series can be correlated with the decrease of the cumulative pore volume ([Figure 4](#materials-09-00410-f004){ref-type="fig"}).
Water absorption of the W series is 3.5%, 5.5%, 9.7% for W60, W90 and W120, respectively. It is observed that the presence of steel slag in W samples increases the ability to absorb water, as it can be appreciated from the variation of the moisture content ([Figure 6](#materials-09-00410-f006){ref-type="fig"}). These results demonstrate that the permeability of the steel slag based mortars can be interpreted for B samples with the cumulative pore volume variation: the reduction of the cumulative pore volume implies a reduction of the water absorption.
The reduction of the water absorption is in agreement with the reduction of the volume of the larger capillary pores with size \>0.1 µm. In the W series, although the cumulative pore volume reduces with the white steel slag, water absorption increases. Here, a better correlation is made between water absorption and the volume of the larger capillary pores. This volume increases from 16.7% for W60 to 17.6% and 18.8%, for W90 and W120, respectively. This means that the permeability in W series is mostly affected by the development of larger capillary pores from the corrosion in the pore solution of the iron metal particles. Finally, it can be mentioned that the presence of the steel slag reduces the capacity of the metakaolin based geopolymer to accumulate moisture. The specimens with SS:MK = 1:1 (B60 e W60) remain after 1000 h with \~1 wt % moisture at room temperature while specimens with SS:MK = 2:1 and 3:1 (B90, B120, W90 and W120) reduce the moisture content down to \~0.25 wt %.
The collected results make this class of slag (EAF white and black steel slag) as promising additive materials for the moisture control capacity of geopolymeric mortars. It seems that the mechanism of the moisture control capacity enhancement is focused essentially to the formation of the particular class of pores (1--10 µm) in the geopolymeric matrix.
3.3. Density and Flexural Strength {#sec3dot3-materials-09-00410}
----------------------------------
The physical and mechanical properties of the white and black slag-based AAS mortars are summarized in [Table 3](#materials-09-00410-t003){ref-type="table"}. In general, the bulk density of standard metakaolin based IPC is \~1.50 g/cm^3^ \[[@B27-materials-09-00410],[@B28-materials-09-00410]\]. The presence of fine aggregates (64.1 wt % for W and 27.0 wt % for B) is the primary reason of the density increase. The presence of sand also plays a significant role together with the presence of iron (12.3 wt % for W and 31.9 wt % for B). The relative increase in density corresponds to higher flexural strength, raising from \~4 MPa \[[@B17-materials-09-00410],[@B21-materials-09-00410]\] to 6.8 MPa for W60 specimen. White ABS contains higher aggregates and this favors the reactivity reduction and polycondensation, thus reducing the flexural strength ([Figure 7](#materials-09-00410-f007){ref-type="fig"}). In addition, increasing the curing time up to 365 days does not change this tendency. ForB series the high reactivity of the black slag can explain the continuous increase of the polycondensation, thus increasing the flexural strength with the steel slag amount. The difference in the strength development between the white and black slag can be justified by different aggregates fractions (27 wt % for B sample and 64 wt % for W). Actually, since the two SS presented these two different sand fractions, we adopted different paste/sand ratios in order to optimize the final consolidated product in terms of chemical stability and strength. The optimum ratio corresponds to the best ITZ features.
Commenting the relationship between porosity and flexural strength, we can say that according to our experience on geopolymers and ceramics, we noticed that in general when the total porosity is determined with the mercury intrusion porosimeter, the values obtained are generally higher when compared to others methods. This is particularly true for geopolymers, due to the fact that the nanoporosity of these materials are takeninto account. At the same time we also noticed from literature data that this nanoporosity does not affect the materials during the mechanical solicitation.
Concerning the chemical reactivity and chemical bonding in relation to mechanical strength, we noticed that although the incongruent dissolution of these aggregates in the pore solution can be pointed out as well as their participation in the surface physical-chemical reactions, their high proportion limits the strength when amount of binder is not enough to embed the aggregates. On the other hand, both white and black steel slags show similar silica (SiO~2~) content. However, the white specimenscontain15 wt % Al~2~O~3~, three times larger than in the black ones (5 wt %) ([Table 1](#materials-09-00410-t001){ref-type="table"}). The high temperatures at which slags are produced (\>1600 °C), allow the formation of more stable aluminosilicates as glass-ceramics in the white specimens. These phases have limited dissolution in alkaline media, meaning relatively low soluble silica and alumina and low gel formed for the polycondensation optimization. The relative increase in strength in both B and W series with curing time from 28 to 365 days is related to the additional pozzolanic reactions that take place with very low rate. The completely dissolved metakaolin and steel slag finer particles contribute to the formation of oligomers, that convert to polymerized small clusters of aluminosilicates or calcium silicates/calcium-aluminosilicate hydrated gels (5--10 nm) \[[@B17-materials-09-00410],[@B29-materials-09-00410]\]. The effectiveness of these gels to enhance strength depends on the gels/aggregates ratio, their interfaces and chemical equilibrium. The aggregates dissolution level and the strain generated by the surrounding matrix play a significant role in determining the final strength since it affects cross-linking among phases. In the metakaolin based IPC, the reactive phases are generally N--A--S--H gels leading to a flexural strength near 4 MPa \[[@B17-materials-09-00410]\]. Increasing the available soluble silica (in the range of Si/Al = 2--2.5 molar ratio), the mechanical strength increases as a result of the pores volume and size reduction \[[@B17-materials-09-00410],[@B29-materials-09-00410]\]. For both steel slags in W series, an improvement of the flexural strength was observed as the result of the cumulative pore volume reduction although the presence of a new class of pores between 1 and 10 µm is formed, (not significant) ([Figure 5](#materials-09-00410-f005){ref-type="fig"}). The larger amount of pores with size \>0.1 µm in B series limits the strength increase. The strengthening mechanism in this case includes a reduction of the cumulative pore volume. A possible improvement of the mechanical performance could have been reached extending the first step of curing of 72 h. The laboratory environment might have brought to excessive desaturation of samples in the very early age.
3.4. Microstructure {#sec3dot4-materials-09-00410}
-------------------
[Figure 8](#materials-09-00410-f008){ref-type="fig"} and [Figure 9](#materials-09-00410-f009){ref-type="fig"} show the microstructure of the inorganic polymer mortars with ABS white and ABS black, respectively. The micrographs, taken on polished samples, point out larger quartz grains (dense and compact) and the aggregates form the steel slag (highly porous). The matrix is compact and homogeneous with well-embedded aggregates. At limited magnification, no crack can be observed. The fracture surface of the specimens with white ([Figure 10](#materials-09-00410-f010){ref-type="fig"}a) and black ABS ([Figure 10](#materials-09-00410-f010){ref-type="fig"}b) show that the aggregates are well covered by the geopolymer matrix composed of calcium-aluminosilicate gels. In this case, aggregates are not clearly visible, same as in the polished samples: this demonstrates the good capacity of the steel slag based IPC to embed aggregates with significant adhesion bond strength. At higher magnification ([Figure 11](#materials-09-00410-f011){ref-type="fig"} and [Figure 12](#materials-09-00410-f012){ref-type="fig"}), the microporous network structure in B series can observed. The matrix is dominated by homogeneously dispersed pores with sizes in the range of 1 to 10 µm. This is the origin of the difference in microstructure between B and W series. Pores between 1 and 10 µm can also be observed in W specimens; however, the concentration is too low to be relevant for the mechanical performance of the matrix.
As already mentioned, the importance of the specific pores range (1--10 µm) is directly related to the iron content, which is 12.3 wt % for the ABS white and 31.9 wt % for the ABS black. Additionally, the residues of metallic iron formed in the slag are corroded by the NaOH solution during the dissolution phase of geopolymerization. The evolved gas is responsible for the formation of pores with size between 1 and 10 µm for W series and 0.1 and 10 µm for B series.
The homogeneous dispersion of pores from the exothermic reactions of iron corrosion is due to the efficient mixing operation of steel slag, metakaolin and sand particles for the preparation of the AAS paste. Jointly with the proper mixing operation, the presence of iron particles in a homogeneous mortar system resulted well distributed in the way to produce the corrosion reaction at isolated sites avoiding extensive pores coalescence. The limited fraction of the metallic form of the iron justified the behavior observed for both B and W series, althoughthe micrographs of the B series although this class of interpores demonstrated a high compactness into the interpores partitions ([Figure 11](#materials-09-00410-f011){ref-type="fig"} and [Figure 12](#materials-09-00410-f012){ref-type="fig"}). The W series maintained the global compactness of the conventional IPC mortars as a result of dissolution of the major fraction of the slag to highly reactive oligomer species. The oligomers participate in the formation of new phases: N--A--S--H, C--(A)--S--H which form, with the residues of non-reacted phases, a compact structure due to the adhesion bonds capacity of these particles as well as that of the river sand. The steel slag dissolution allows the formation of Fe^3+^ ions that also participate to the formation of geopolymeric phases with their insertion into the network structure of N--A--S--H or C--(A)--S--H resulting into ferrosialtes \[[@B14-materials-09-00410]\]. The similarity of Fe^3+^ with Al^3+^ ion, explains why Fe^3+^ acts as network former that can occupied a tetrahedric site. Both the energy of the dissolution of the metallic iron and the potential insertion of its cations into the geopolymer network can explain the strength enhancement observed for the AAS mortars, mainlyin the BSS formulations that shows higher strength, although the considerable fraction of capillary pores between 1 and 10 µm ([Figure 7](#materials-09-00410-f007){ref-type="fig"}). The RO crystalline particles in the steel slag refer to crystalline Fe^2+^ bearing mineral phases as ferronforsterite, augite, and others pyroxene type.
According to Lemougna *et al.* \[[@B23-materials-09-00410]\], a portion of these minerals, as augite, react with the alkaline solution to form new ferric sites which may be located in amorphous gel-like phase. This situation may explain why the steel slag to metakaolin mass ratio did not appear as the significant parameter governing the geopolymerization and strength behavior of the steel slag mortars. It is suggested that in the formulations range adopted in this study, the increase of slag content reduces the alumina oligomers formed during the dissolution process due to the reduction of metakaolinthat provides the alumina oligomers inthe mortars. Thus a fully reacted and cured matrix of the steel slag based inorganic polymer mortars can then be described as a continuous and homogeneous solid solution (gel-like structure) comparable to that based on metakaolin or fly ash, with the particularity of the pore network that can be controlled with mix-design and compensated with the strengthening effects of the iron into the adhesive bonds. The presence of metakaolin and semi-crystalline silica sand has the effects to increase the homogeneity and the compactness of the microstructure avoiding micro cracks and unreacted alkali \[[@B17-materials-09-00410],[@B21-materials-09-00410]\].
4. Discussion and Conclusions {#sec4-materials-09-00410}
=============================
Astutingsih and Liu \[[@B30-materials-09-00410]\] indicated that in alkali-activated slag, alkali ions (K^+^, Na^+^, *etc.*) are located at a non-bridging oxygen site \[[@B31-materials-09-00410],[@B32-materials-09-00410],[@B33-materials-09-00410]\]. The use of amorphous alumina and silica from metakaolin and semi-crystalline silica sand generates structural matrices with high flexural strength as the result of the cracks stabilization, reduction of the cumulative pore volume and improvement of the microstructure. The strengthening mechanism is focused on the existence of both N--A--S--H and C--N--(A)--H suitable adhesive bonds to embed the various aggregates in the matrix. The metallic particles content of the various mix acts at first through its corrosion in alkaline environment to enhance the reactions heat thus densifying the inter-pores partitions although the porosity between 1 and 10 µm results from the iron activities. Fe^3+^ and Fe^2+^ from the corrosive reactions and the dissolution of some RO minerals react with the alkaline solution to form new ferric sites which may be located at amorphous gel-like phase \[[@B23-materials-09-00410]\].
Kotama *et al.* \[[@B34-materials-09-00410]\] correlated the moisture control capacity with pore size distribution makethe difference between the gel pores and the capillary pores. They designed ideal construction materials with pores distributed between those with size \<0.1 µm, considered as pores responsible for the absorption, and capillary pores (0.1 µm \< ф \< 10 µm) responsible for desorption. The detailed analysis of the pores in the AAS mortars show that the BSS series present 15.6 vol % for B60 and 17 vol % for B90 and B120 of pores with size 0.1 µm. For WSS series, apart from W90, the specimens present pores having 60% with size \<0.1 µm. The analysis of moisture absorption--desorption performance indicates the potential absorption up to \~6% moisture in the context of maximum humidity. In general, increasing the gel pores content (ф \< 0.1 µm) will increase moisture absorption. Pores with size between 0.1 and 10 µm contribute to enhance the moisture desorption capacity. In fact, the moisture absorbed was found to be desorbed almost totally within \~8 h. Less than 2.5 vol % moisture remains in B60 and W60. The moisture percentage decreases below 0.5 vol % for B90, B120, W90 and W120. It can be concluded that the presence of the steel slag improves the moisture control capacity leading to the production of pore network that enable regulation of absorption and desorption within a short range of time ([Figure 6](#materials-09-00410-f006){ref-type="fig"}). The above described pore network allows: (i) no accumulation of moisture within the bulk structure of the mortars and by the way high exchange capacity; and (ii) by using the geopolymer process technology, the surface thickness described by Kotama *et al.* \[[@B34-materials-09-00410]\] can be achieved with the molding design in relation to the viscosity of the alkali-activated pastes making the surface thick enough to avoid the ingress of aggressive agents while improving the exchange rate between the environment and the bulk.
The above-described formulations based on the steel slag with particular class of capillary porosity have shown that alkali activation accompanied by an appropriate mix design is a procedure capable of reusing a high amount of end-of-waste materials or byproducts as steel slag. Apart from the low embodied energy, since the activation of slag and its consolidation required very low amount of energy with respect to the energy required for conventional fired bricks and cement clinker, these AAS mortars also showed an interesting adsorption/desorption behavior that suggested their use as coating material to maintain the stability of indoor relative humidity.
All of these characteristics are in line with the challenges of the EU Framework Programme Horizon 2020 \[[@B35-materials-09-00410]\] for the eco-efficient construction and building materials research.
Authors wish to thank Magdalena Gualtieri from DIEF, University of Modena and Reggio Emilia for the FT-IR characterization of the samples of this study and Chiara Ponzoni from the same department for the evaluation of the reactive fraction of steel slag.
Isabella Lancellotti, Vincenzo M. Sglavo, Cristina Leonelli, equally contributed to this paper. Elie Kamseu did most of the experimental work, elaborated the data and wrote the manuscript. Luca Modolo contributed for steel slag materials.
The authors declare no conflict of interest.
{#materials-09-00410-f001}
{#materials-09-00410-f002}
{#materials-09-00410-f003}
{#materials-09-00410-f004}
{#materials-09-00410-f005}
{#materials-09-00410-f006}
{#materials-09-00410-f007}
{#materials-09-00410-f008}
{#materials-09-00410-f009}
{#materials-09-00410-f010}
{#materials-09-00410-f011}
{#materials-09-00410-f012}
materials-09-00410-t001_Table 1
######
Chemical compositions (wt %) of black and white steel slag (EUROPEAN STANDARD EN 15309 by XRF).
Oxides ABS Black Oxides ABS White
----------- ----------- ----------- -----------
CaO 36.52 CaO 40.31
Fe~2~O~3~ 31.87 Fe~2~O~3~ 12.28
SiO~2~ 12.78 SiO~2~ 11.33
MnO 5.90 MnO 2.19
Al~2~O~3~ 5.04 Al~2~O~3~ 15.43
MgO 3.26 MgO 11.54
Cr~2~O~3~ 2.15 Cr~2~O~3~ 0.73
TiO~2~ 0.41 TiO~2~ 0.31
SO~3~ 0.31 SO~3~ 1.68
V~2~O~5~ 0.28 Be\...F 0.36
P~2~O~5~ 0.50 Others 3.84
Others 0.98
materials-09-00410-t002_Table 2
######
Mix-design of steel slag (SS) inorganic polymer mortars with similar value in the cone-fluidity test.
Formulation SS:MK ^1^ (Slag + MK):Sand Solid:Liquid NaOH:Na~2~SiO~3~
------------- ----------- ------------------ -------------- ------------------
B60 1:1 1:2 1.3:0.4 2:3
B90 2:1 1:2 1.3:0.4 2:3
B120 3:1 1:2 1.3:0.4 2:3
W60 1:1 1:2 1:0.4 2:3
W90 2:1 1:2 1:0.4 2:3
W120 3:1 1:2 1:0.4 2:3
^1^: MKmetakaolin.
materials-09-00410-t003_Table 3
######
Microstructural data as determined by MIP of all the formulations aged 28 daysand mechanical properties at 1 year aging.
Formulation Bulk Density (g·cm^−3^) Median Pore Diameter (µm) Total Porosity/% Tortuosity (a.u.) Flexural Strength at 365 Days (MPa)
------------- ------------------------- --------------------------- ------------------ ------------------- -------------------------------------
B60 2.13 1.4 34.0 29.6 7.7
B90 2.22 0.8 29.0 39.8 6.9
B120 2.39 0.9 28.1 39.0 8.1
W60 1.74 0.1 31.9 38.1 6.8
W90 1.77 0.1 29.8 42.4 6.2
W120 1.82 0.1 28.6 49.8 5.6
[^1]: These authors contributed equally to this work.
|
Discussions on an Austin MLS stadium contract are making progress, according to Austin and Precourt Sports Ventures officials.
Last month, the Austin City Council approved the term sheet for a McKalla Place land lease, clearing the way for Columbus Crew SC investor-operator Anthony Precourt to finance a $200 million MLS stadium at the city-owned site. Precourt’s PSV is working to move the Crew to Austin as early as the 2019 MLS season, but the process of converting the term sheet into a finalized lease must be completed.
It appears that Austin and PSV have made progress since the August 15 vote by the city council. There is still some work that has to take place, but officials from both PSV and the City of Austin believe that discussions will continue to progress over the coming weeks, and there have been no apparent obstacles thus far. More from the Austin American-Statesman:
A lot of fine-tuning was required because there were so many changes to the original term sheet presented to council members.
“We have begun drafting the lease and development agreement,” said David Green, media relations manager for the city. “Thanks to the approved term sheet being so detailed, we anticipate making good progress on it during the month of September.”
MLS lobbyist Richard Suttle, who works for PSV, said there have not been any significant hang-ups.
“The drafting schedule is on target, and I think we may see something by the 18th, and then we’ll look to red-line it,” Suttle said. “We hope it can all be wrapped up by early October.”
The Crew’s potential relocation is not set in stone at this point, and the two sides still have to convert the term sheet into a final agreement. However, if the plans move forward, it is anticipated that the new stadium at McKalla Place could open in time for the 2021 MLS season. If the Crew moves in time for next season, it would play at least two years at a yet-to-be-determined venue in the Austin area while awaiting the completion of the new stadium.
Rendering courtesy Precourt Sports Ventures. |
/**
* @namespace WORKAREA.activeBySegmentTooltips
*/
WORKAREA.registerModule('activeBySegmentTooltips', (function () {
'use strict';
var hiddenInput = JST['workarea/core/templates/hidden_input'],
getSelectedOptionText = function ($select) {
return $select.find('option:selected').map(function (_i, option) {
return $.trim($(option).text());
}).toArray();
},
updateMessages = function ($link, $content) {
var $message = $link.find('.active-field__segments-message'),
names = getSelectedOptionText($content.find('select')),
text = I18n.t('workarea.admin.shared.active_field.by_segment', {
count: names.length,
name: names[0],
more_count: names.length - 1
});
if (_.isEmpty(names)) {
$message.html($('<span />').text(text));
} else {
$message.html($('<strong />').text(text));
}
},
buildInput = function (name, value) {
var input = hiddenInput({ name: name, value: value });
return $(input).data('activeBySegmentInput', true);
},
addHiddenInputs = function ($form, $content) {
$content
.find('select')
.each(function (index, select) {
var $select = $(select);
if (_.isEmpty($select.val())) {
$form.append(buildInput(select.name, ''));
} else {
_.forEach($select.val(), function (value) {
$form.append(buildInput(select.name, value));
});
}
});
},
removeHiddenInputs = function ($form) {
$form
.find('[type=hidden]')
.filter(function (index, input) {
return $(input).data('activeBySegmentInput') === true;
})
.remove();
},
updateFields = function ($content, $trigger) {
var $form = $trigger.closest('form');
removeHiddenInputs($form);
addHiddenInputs($form, $content);
updateMessages($trigger, $content);
},
getConfig = function (trigger, $content) {
return _.assign({}, WORKAREA.config.tooltipster, {
interactive: true,
content: $content,
trigger: 'custom',
triggerOpen: {
click: true
},
triggerClose: {
mouseleave: true
}
});
},
setup = function (index, trigger) {
var $content = $(trigger.hash),
$select = $content.find('[data-select]'),
handleChange = _.partial(updateFields, $content, $(trigger));
$select.on('change', handleChange);
$(trigger).tooltipster(getConfig(trigger, $content));
},
/**
* @method
* @name init
* @memberof WORKAREA.activeBySegmentTooltips
*/
init = function ($scope) {
$('[data-active-by-segment-tooltip]', $scope)
.each(setup)
.on('click', function (event) {
event.preventDefault();
});
};
return {
init: init
};
}()));
|
Background {#Sec1}
==========
Contamination of soil and water by a nitroaromatic explosive 2, 4, 6-trinitrotoluene (TNT) and its metabolites toxic and mutagenic to humans, animals, plants, and microorganisms represents a worldwide environmental problem (Lewis et al. [@CR19]; Claus [@CR6]). There are many physical and chemical tools and approaches suggested for remediation of soils contaminated with TNT, but all of them are very expensive. Bioremediation, in particular, mycoremediation is considered as an economical and environmentally friendly approach to detoxify TNT-contaminated soils. Several studies have shown that the white-rot basidiomycetes (WRB) degrade a wide variety of recalcitrant and toxic chemicals and they are capable of the oxidative destruction and mineralization an aromatic nucleus of TNT (Fernando et al. [@CR11]; Van Aken et al. [@CR26], [@CR27]). The model organism, *Phanerochaete chrysosporium* has been the subject of intensive studies; however, growth of this fungus was inhibited with relatively low concentrations of TNT (Esteve-Núñez et al. [@CR10]).
Evidences were gathered suggesting involvement of the wood- and litter-decaying basidiomycetes ligninolytic system in the TNT mineralization process under different nutrient starvation conditions; especially significant level of MnP is an important factor in ensuring high biodegradation rates (Fernando et al. [@CR11]; Scheibner et al. [@CR23]; Van Aken et al. [@CR26], [@CR27]; Kim and Song [@CR17], [@CR18]; Rho et al. [@CR21]). Recently, Anasonye et al. ([@CR1]) showed that *Gymnopilus luteofolius*, *Kuehneromyces mutabilis*, and *Phanerochaete velutina* produced high amounts of manganese peroxidase (MnP) in TNT contaminated non-sterile soil. The most efficient fungus, *P. velutina* degraded 80 % of TNT during 2.5 months.
The WRB produce the nonspecific lignin-degrading system including lignin peroxidase (EC 1.11.1.14), MnP (EC 1.11.1.13), and laccase (EC 1.10.3.2) in different combinations and a number of the accessory enzymes and metabolites. Although many reports have been published about the mineralization of TNT by WRB and litter decay fungi, very scarce information is available on these enzymes synthesis in response to the TNT presence in nutrient media. Only Cheong et al. ([@CR5]) showed the increased expression of the laccase gene during early stage of TNT transformation by *Trametes versicolor* without estimation of enzyme activity. Moreover, effect of TNT on the laccase and MnP production by *Cerrena unicolor* and *T. versicolor* was elucidated, but without simultaneous determination of xenobiotic degradation (Elisashvili et al. [@CR9]). Therefore, the main objective of this study was to evaluate a capability of six WRB belonging to different taxonomic groups to express the lignin-modifying enzymes (LME) activity in response to TNT supplementation, to tolerate and to remove comparatively high concentrations of this xenobiotic. In addition, the laccase and MnP secretion modulation by varying TNT concentration and xenobiotic elimination by *C. unicolor* BCC 300 were examined for the first time in the short-term experiments. Moreover, the significance of nutrient medium composition for the target enzymes activity expression was also assessed.
Methods {#Sec2}
=======
Organisms and inoculum preparation {#Sec3}
----------------------------------
The following WRB from the basidiomycete's culture collection of the Department of Plant Substrates Bioconversion have been used in this study: *C. unicolor* BCC 300, *C. unicolor* BCC 302, *Fomes fomentarius* BCC 38, *Funalia trogii* BCC 146, *Pycnoporus coccineus* BCC 310, and *T. versicolor* BCC 775. For the identification all selected strains have been undergone to genomic DNA extraction, PCR and Internal Transcribed Spacer (ITS) sequencing. DNAs were analyzed with FlashGel™ DNA Cassettes; amplification of the ITS fragments was performed according to the CIRM-CF protocol using two universal primers ITS 1 (TCC GTA GGT GAA CCT GCG G) and ITS 4 (TCC TCC GCT TAT TGA TAT GC). Molecular identification was performed using NCBI BLAST with the counting as query sequence. Nomenclatural update was made according to the Index Fungorum (<http://www.indexfungorum.org/>) and MycoBank (<http://fr.mycobank.org/>).
The fungi are maintained on agar plates containing 1 % malt extract, 0.2 % peptone, 0.2 % yeast extract, and 2 % wheat bran and they are subcultured at regular intervals. The 1--3 weeks-old mycelium scraped from the agar surface was used for inocula preparation. The fungal inocula were prepared by growing their mycelia on a rotary shaker at 27 °C and 150 rpm in 250-ml flasks containing 100 ml of the medium appropriate for cultivation of WRB and sufficient biomass accumulation (g/l): glucose, 10; NH~4~NO~3~, 2; KH~2~PO~4~, 1; MgSO~4~·7H~2~O, 0.5; yeast extract, 2. After 7 days of cultivation the fungal biomass was homogenized in a Waring laboratory blender.
Cultivation conditions {#Sec4}
----------------------
The submerged cultivation of fungus was conducted in the Innova 44 shaker (New Brunswick Scientific, USA) at 27 °C and 150 rpm. The homogenized mycelium (3 ml) was used to inoculate the 250-ml flasks containing 50 ml of the basal medium (g/l): ammonium tartrate, 2; KH~2~PO~4~, 1; yeast extract (Acumedia, Michigan, USA), 3; CuSO~4~·5H~2~O, 0.02; MnSO~4~, 0.01; pH 5.8. Copper and manganese have been added to the medium to stimulate, respectively, laccase and MnP production (Bertrand et al. [@CR2]; Janusz et al. [@CR14]). Glycerol (synthetic medium) in concentration of 10 g/l or milled to powder mandarin peels (lignocellulose-containing medium) in an amount of 40 g/l were used as growth substrates.
To evaluate the effect of TNT on the selected fungi growth and LME expression this compound was added at concentration of 0.2 mM to the synthetic or mandarin peels (MP) containing media before inoculation. Submerged cultivation of fungi was carried out during 14 days. In these experiments, 1 ml samples were taken after 5, 7, 10, and 14 days of fungi cultivation and the solids were separated by centrifugation (Eppendorf 5417R, Germany) at 10,000*g* for 5 min at 4 °C. The enzyme activities and pH were analyzed in the supernatants. In addition, some short-term experiments have been conducted in the glycerol-based medium to control of the fungus biomass accumulation and to study the initial effect of TNT concentration on the *C. unicolor* BCC 300 LME accumulation profiles. In this case, 20 ml of homogenized mycelium was inoculated in flasks containing 80 ml of basal medium with 10 g/l glycerol. After 24 h cultivation, 25 ml of these cultures with small pellets were inoculated to 25 ml of the same medium with double concentration of all components (basal medium, glycerol and TNT). At the indicated time, 1 ml samples were taken from the flasks and after centrifugation, the enzyme activities were analyzed in the supernatants.
Analytical methods {#Sec5}
------------------
After *C. unicolor* cultivation in the glycerol-containing medium the fungal biomass was measured gravimetrically after recovering mycelium with centrifugation of whole cultures at 8000*g* for 20 min and drying at 70 °C for 24 h. When the fungus was cultivated in mandarin peels based medium the total nitrogen was determined according to Kjeldahl method with the Nessler reagent after pre-boiling of samples in 0.5 % solutions of trichloroacetic acid for 15 min to remove non-protein content. Protein was calculated as total N × 6.25.
Since, the mandarin peels contain various phenolic compounds interfering in analysis, the TNT content was determined only in the synthetic medium by a colorimetric assay (Jenkins [@CR15]). One milliliter of sample was added to 1 ml of acetone; then 5--10 μl of 2 M KOH was added to make the solution alkaline and then 5 mg of sodium sulfite was added to stabilize the reaction product. After 5 min incubation at room temperature, the mixture's A~462~ was read.
The laccase activity was determined spectrophotometrically (Camspec M501, UK) at 420 nm as the rate of 0.25 mM ABTS (2,2′-azino-bis-\[3-ethyltiazoline-6-sulfonate\]) oxidation in 50 mM Na-acetate buffer (pH 3.8) at room temperature (Bourbonnais and Paice [@CR4]). MnP activity was measured at 270 nm by following the formation of a Mn^3+^-malonate-complex (Wariishi et al. [@CR28]). One unit of laccase or MnP activity was defined as the amount of enzyme that oxidized 1 μmol of substrate per minute.
Microbiological experiments were performed twice using three replicates each time. All enzyme activity measurements were performed twice. Data presented correspond to the mean values with the standard deviations of the means shown as ± values.
Results {#Sec6}
=======
Effect of TNT on the enzyme production by the selected fungi {#Sec7}
------------------------------------------------------------
Six WRB strains have been selected to study the TNT effect on enzyme production in synthetic and lignocellulose-containing media. These fungi, with the exclusion of *P. coccineus*, usually express appreciable levels of the laccase and MnP activities in the mandarin peels-based medium (Elisashvili and Kachlishvili [@CR7]). All fungi grew well in form of pellets in both media producing 3.2--4.3 g mycelial biomass/l in the presence of glycerol. Their growth accompanied with increase of the media pH from 5.8 to 6.0--7.3.
Detection of the fungi laccase activity revealed their capability to secrete this enzyme in the both tested media, although *P. coccineus* distinguished with low productivity in synthetic medium (Table [1](#Tab1){ref-type="table"}). By contrast, *C. unicolor* BCC 300 followed by *T. versicolor* produced high levels of laccase in glycerol-based medium. Supplementation of this medium with 0.2 mM TNT provided more than twofold increase of laccase activity in cultures of *C. unicolor*, *P. coccineus*, and *T. versicolor*. However, the stimulation of the laccase production by TNT was not observed when *F. fomentarius* and *F. trogii* were cultivated in presence of this compound in the synthetic medium. As expected, substitution of glycerol in the nutrient medium with the mandarin peels as a growth substrate significantly promoted laccase expression by all fungi 3- to 45-fold increasing the enzyme activity. Especially both strains of *C. unicolor* were very potent laccase producers. The data obtained show the fungi differential response to the addition of 0.2 mM TNT to the mandarin peels-based medium. Enzyme production significantly strengthened in cultures of *C. unicolor* and *F. trogii*. Like the synthetic medium, no positive effect of TNT on the laccase synthesis was observed in fermentation of mandarin peels by *F. fomentarius*, *P. coccineus*, and *T. versicolor*.Table 1WRB enzyme activity and TNT removal in dependence on the media compositionFungiMedia compositionLaccase (U/ml)MnP (U/ml)TNT removal (%)*C. unicolor* BCC 300Glycerol15.6 ± 2.2^10a^1.34 ± 0.2^5^Glycerol + TNT38.1 ± 5.2^10^1.36 ± 0.2^7^95 ± 2Mandarin peels96.3 ± 13.3^14^2.42 ± 0.4^7^Mandarin peels + TNT206.3 ± 35.0^14^2.29 ± 0.4^7^ND*C. unicolor* BCC 302Glycerol3.7 ± 0.4^14^0.63 ± 0.1^7^Glycerol + TNT10.7 ± 1.6^10^0.78 ± 0.1^10^96 ± 3Mandarin peels80.2 ± 12.0^14^1.56 ± 0.3^14^Mandarin peels + TNT121.8 ± 19.2^7^1.95 ± 0.4^10^ND*F. fomentarius* BCC 38Glycerol5.5 ± 0.7^14^0Glycerol + TNT5.3 ± 1.0^10^066 ± 3MP16.2 ± 2.5^10^1.06 ± 0.2^10^MP + TNT19.2 ± 3.6^14^1.24 ± 0.2^10^ND*F. trogii* BCC 146Glycerol3.5 ± 0.5^14^0Glycerol + TNT4.2 ± 0.5^14^070 ± 3MP14.0 ± 2.0^14^0.17 ± 0.03^10^MP + TNT30.4 ± 4.8^14^0.15 ± 0.03^10^ND*P. coccineus* BCC 310Glycerol0.1 ± 0.02^5^0Glycerol + TNT0.7 ± 0.1^7^027 ± 2MP4.5 ± 0.7^7^0MP + TNT3.6 ± 0.7^7^0ND*T. versicolor* BCC 775Glycerol7.6 ± 1.0^7^0.14 ± 0.02^5^Glycerol + TNT13.6 ± 2.1^7^0.11 ± 0.02^5^92 ± 3MP21.6 ± 3.3^14^0.34 ± 0.05^14^MP + TNT17.8 ± 3.5^7^0.45 ± 0.09^5^ND^a^The numbers indicate the days of the peak activity. 0.2 mM TNT was added to the glycerol and mandarin peels containing media before inoculation
As it was predicted, no MnP was detected in *P. coccineus* cultivation in the synthetic or lignocellulose-containing media. However, *F. fomentarius* and *F. trogii* also did not secrete this enzyme in the submerged cultivation in glycerol-based synthetic medium. By contrast, both strains of *C. unicolor* appeared to be efficient producers of MnP in the same cultivation conditions accumulating 0.63--1.34 U/ml of enzyme activity. Practically no stimulating effect of TNT on the enzyme expression was revealed in these and other cultures grown in synthetic medium. The mandarin peels provided a considerable increase of the MnP activity in all of studied fungal cultures capable to produce this enzyme increasing 2- to 3-fold *C. unicolor* and *T. versicolor'*s enzyme activity. It is noteworthy that in the cultures of *F. fomentarius* and *F. trogii* induction of MnP synthesis was revealed. However, supplementation of 0.2 mM TNT in this medium did not significantly affect the tested fungi MnP production.
At the end of cultivation (after 14 days), the TNT content was measured in the tested fungi culture liquids. The data in Table [1](#Tab1){ref-type="table"} indicate that both strains of *C. unicolor* and *T. versicolor* appeared to be the most appropriate fungi for the xenobiotic elimination. *F. trogii* and *F. fomentarius* also caused extensive TNT degradation, while *P. coccineus* inefficiently removed this compound.
Effect of the TNT concentration {#Sec8}
-------------------------------
In this study, the TNT concentrations up to 0.4 mM were tested to determine their effect on the laccase and MnP production in the submerged fermentation of mandarin peels with the best enzyme producer and TNT degrader, *C. unicolor* BCC 300. It is worth noting that in the medium with the highest concentration of xenobiotic, the fungus mycelial pellets formation was delayed for 3 days. However, the maximum levels of the biomass accumulation were practically the same in all media after 10 and 14 days of the fermentation (data not shown).
Increasing of the TNT concentration from 0 to 0.4 mM resulted in considerable increase in laccase activity, the highest value being 240.7 U/ml at 0.4 mM TNT (Table [2](#Tab2){ref-type="table"}). However, the profiles of laccase accumulation significantly differed in dependence on the aromatic compound concentration. In particular, the data received show that elevation of TNT concentration from 0 to 0.2 mM accelerated the laccase production during the first 5 days cultivation. When the TNT content was increased to 0.4 mM a significant reduction in the laccase activity was observed due to toxic effect on the fungus growth and after 5 days it was more than 2- to 3-fold lower as compared with those in the control and 0.2 mM TNT-containing media. In the following days, the fungal culture overcome the xenobiotic toxic effect and the level of secreted laccase in 0.4 mM TNT-containing medium appeared higher than in the other media. Another picture was revealed in the MnP activity measurement. Supplementation of nutrient medium with TNT did not favor MnP secretion and accumulation of this enzyme activity. On the contrary, even 0.2 mM TNT delayed MnP secretion during first 5 days fermentation while enzyme activity was not detected in medium containing 0.4 mM TNT. Hence, the MnP biosynthesis is more sensitive to the toxic action of TNT. It is worth noting that during the fungus subsequent cultivation the enzyme expression was triggered and the active secretion of MnP was occurred.Table 2Effect of the TNT concentration on the *C. unicolor* BCC 300 laccase and MnP production in the mandarin peels submerged fermentationTNT (mM)Laccase (U/ml)MnP (U/ml)Days of cultivation571014571014036.8 ± 3.176.8 ± 8.789.4 ± 8.192.4 ± 10.30.91 ± 0.11.98 ± 0.32.31 ± 0.31.48 ± 0.20.143.0 ± 4.5108.2 ± 13.1127.5 ± 14.8139.4 ± 21.00.93 ± 0.21.63 ± 0.32.49 ± 0.41.79 ± 0.30.250.4 ± 7.0122.0 ± 20.1182.0 ± 23.0197.2 ± 33.60.62 ± 0.11.51 ± 0.32.30 ± 0.31.87 ± 0.30.415.5 ± 2.891.7 ± 18.1173.4 ± 22.3240.7 ± 34.200.49 ± 0.11.24 ± 0.21.81 ± 0.3
When *C. unicolor* BCC 300 was cultivated in the glycerol-based medium the fungus initial growth was significantly reduced in the medium containing 0.3 mM TNT (Table [3](#Tab3){ref-type="table"}). Obviously this concentration had a detrimental effect on the organism because of toxic effect of xenobiotic and the fungus biomass level after 2 days cultivation in the presence of 0.3 mM TNT was threefold lower as compared to the control medium. Nevertheless, after 6 days of the submerged cultivation the fungus biomass reached the same values in all media. MnP activity appeared after 24 h in all variants of experiment; the enzyme activity gradually increased and achieved approximately the same values at the end of cultivation. The lower concentrations of TNT did not interfere in the MnP secretion by *C. unicolor* while at the highest concentration of this compound the enzyme activity after 2 days of fungus cultivation was three times lower than it was in other media. However, the enzyme production was not delayed since the fungus productivity for MnP after 48 h cultivation in the presence of 0.3 mM TNT (0.67 U/mg biomass) was as high as it was in the control medium (0.62 U/mg biomass). Unlike MnP, the *C. unicolor* laccase activity was detected already after 8 h of growth and practically no delay in the enzyme secretion was observed (Fig. [1](#Fig1){ref-type="fig"}a). Moreover, the higher was the TNT concentration the higher acceleration of laccase production and enzyme activity was observed after 72 h of fungus cultivation. Almost threefold increase of the laccase activity was achieved in the fungus cultivation in presence of 0.3 mM TNT (48.6 U/ml) as compared with the control medium (17.1 U/ml). An assay of TNT content in culture medium revealed the gradual decrease of the xenobiotic concentration till the end of experiment (Fig. [1](#Fig1){ref-type="fig"}b). After the 6 days of *C. unicolor* cultivation in media containing 0.1 and 0.3 mM TNT, respectively, only 6 and 15 % of the initial TNT content was detected.Table 3Effect of the TNT concentration on the *C. unicolor* BCC 300 growth and MnP activity in short-term cultivation in the glycerol-based mediumTNT (mM)Biomass gain (mg/ml)MnP\
(U/ml)Days of cultivation26123601.2 ± 0.13.2 ± 0.20.23 ± 0.031.43 ± 0.12.08 ± 0.32.37 ± 0.30.031.3 ± 0.13.3 ± 0.20.24 ± 0.031.55 ± 0.22.06 ± 0.32.42 ± 0.40.11.1 ± 0.13.2 ± 0.20.25 ± 0.041.51 ± 0.31.95 ± 0.32.55 ± 0.50.30.4 ± 0.13.2 ± 0.20.07 ± 0.011.01 ± 0.21.54 ± 0.32.29 ± 0.4Fig. 1Kinetics of *C. unicolor* BCC 300 laccase activity (**a**) and TNT removal (**b**) in dependence on the xenobiotics concentration in the glycerol-containing medium
Discussion {#Sec9}
==========
In the present study, the LME activity of the five WRB species has been found to be highly influenced with growth substrate and TNT. Glycerol and mandarin peels have been used as cheap and best carbon and energy sources to provide the fungi growth and target enzymes production and as co-substrates for TNT transformation. It is worth noting that in the fungi cultivation in the medium without glycerol or mandarin peels, 0.2 mM TNT didn't serve as the sole carbon source and not to growth of fungi was observed (data not shown). Other authors also used co-substrates like mono-, disaccharides, sugar alcohols, organic acids, and molasses to provide TNT transformation (Stahl and Aust [@CR25]; Boopathy et al. [@CR3]; Rho et al. [@CR21]; Cheong et al. [@CR5]).
Some conclusions can be drawn from the data obtained in this study. Firstly, these data clearly indicate that the tested fungal strains belonging to different taxonomic groups display a wide diversity in their response to growth substrate in the nutrient medium (Table [1](#Tab1){ref-type="table"}). When the WRB cultivation was conducted in the glycerol-containing medium, *P. coccineus* BCC 310, like *Ganoderma* spp. and *Pleurotus tuber*-*regium* (Elisashvili and Kachlishvili [@CR7]), secreted very low laccase activity, whereas other fungal strains produced significant laccase activity ranging from 3.5 U/ml (*F. trogii*) to 15.6 U/ml (*C. unicolor* BCC 300) in the same synthetic medium. In the other studies, *C. unicolor* C-139 accumulated 1.1 U/ml (Janusz et al. [@CR13]) and 1.7 U/ml (Rola et al. [@CR22]) laccase in the synthetic media with glucose and maltose, respectively. Secondly, only the *C. unicolor* strains and with lesser extent *T. versicolor* BCC 775 were capable to express MnP activity in the synthetic medium. By contrast, Michniewicz et al. ([@CR20]) showed that *C. unicolor* C-137 did not secrete the peroxidase activity in both glucose-containing synthetic and in complex tomato juice-based media. However, our finding is in a good agreement with observations of other researchers. For example, Hibi et al. ([@CR12]) showed that *Cerrena* sp. was capable of secreting laccase and three peroxidases in submerged cultivation in a glucose-containing medium. Thirdly, the present study highlights the role of growth substrate in the LME activity expression. Replacement of glycerol with mandarin peels promoted the MnP secretion by these fungi and manifold increased the laccase activity in all tested WRB. More interesting is that the mandarin peels containing medium provided induction of the MnP synthesis by *F. fomentarius* BCC 38 and *F. trogii* BCC 146 suggesting that the presence of the lignocellulose in the nutrient medium is a prerequisite for this enzyme production by these fungi. In this respect, our results are in agreement to the earlier findings reporting that MnP activity was lacking during cultivation of fungi in the synthetic media and appeared only during growth in the presence of plant materials (Schlosser et al. [@CR24]; Kapich et al. [@CR16]; Elisashvili et al. [@CR8]). Kapich et al. ([@CR16]) proved that the presence of extractive aromatic/phenolic substances, derived from straw, was essential for the MnP production by *P. chrysosporium* in submerged cultures. A number of other reports indicate that aromatic compounds, especially structurally related to lignin, play an important role in regulation of the LME production in basidiomycetous fungi (Elisashvili and Kachlishvili [@CR7]; Bertrand et al. [@CR2]). Finally, unlike many other WRB, *C. unicolor* BCC 300 has ability to synthesize high levels of LME under high carbon and high nitrogen conditions and it secretes high laccase (Fig. [1](#Fig1){ref-type="fig"}) and MnP (Table [3](#Tab3){ref-type="table"}) activities during trophophase as it has been shown in the short-term experiments. Undoubtedly, this strain of *C. unicolor* accumulating in the shake-flasks experiments as high as 240 U laccase/ml and simultaneously 2 U MnP/ml is a good candidate for scaling up LME production in the laboratory fermenter.
The data received in this study show that with the exclusion of *F. fomentarius* BCC 38 and *F. trogii* BCC 146 laccase formation by other fungi was strongly affected with TNT. Laccase productivity of the *C. unicolor* strains, *P. coccineus*, and *T. versicolor* increased 2.4--2.9-, 7-, and 1.8-fold, respectively, when 0.2 mM TNT was supplemented in the synthetic medium. These results suggest that enhancement of laccase production in response to TNT differs greatly among the different WRB. However, the TNT supplementation to the nutrient medium failed to increase the MnP activity. The reason for differential effect of TNT is not obvious, but the most likely explanation is that, this compound or some TNT transformation metabolites specifically trigger laccase production by *C. unicolor* BCC 300 and other fungi to eliminate their toxic action. Finally, stimulation of laccase production by this fungus with TNT is concentration-dependent since the activity of the secreted enzyme gradually increased with an elevation of TNT concentration. In particular, supplementation of 0.2 and 0.4 mM TNT in the mandarin peels-based medium increased of the laccase activity more than twofold as compared to it was in the control medium (Table [2](#Tab2){ref-type="table"}). When *C. unicolor* BCC 300 was cultivated in the synthetic medium, addition of 0.03, 0.1, and 0.3 mM TNT did not affect the fungus biomass level and the MnP activity (Table [3](#Tab3){ref-type="table"}), but specifically stimulated the laccase production (Fig. [1](#Fig1){ref-type="fig"}) and increased the fungus productivity from 6.8 to 9.8, 12.7 and 26.8 U/mg biomass, respectively. Recently, it has been shown that 0.3 mM TNT became toxic to *C. unicolor* grown in the mannitol-containing medium; however, at this exact concentration of xenobiotic the highest differential rate of laccase synthesis was observed (Elisashvili et al. [@CR9]). In this study, 0.3 mM TNT only delayed the fungus growth in the glycerol-containing medium during the first day of the submerged cultivation and provided the highest laccase activity since 3 days of growth. The mechanism which TNT or the TNT metabolites specifically affect the laccase production by certain fungi, in particular by *C. unicolor* BCC 300, is unclear. We assume that the sensitivity of these fungi to TNT and chemical stress are responsible for such a response to the xenobiotic presence. It should be noted that Stahl and Aust ([@CR25]) pointed out that the extracellular detoxification of TNT can be maximized at starting with significant amounts of *P. chrysosporium* mycelium. Taking into account this circumstance, TNT was fed to the immobilized *P. chrysosporium* only after the 7th day of growth period (Rho et al. [@CR21]). Moreover, TNT and its catabolites were added only to the 5-day-old culture of *T. versicolor* since the fungus could not grow when these compounds have been supplemented to the medium at inoculation time (Cheong et al. [@CR5]). In this study, *C. unicolor* and other fungi were capable to survive at comparatively high concentrations of TNT supplemented to the media at the time of inoculation and could efficiently produce the LME.
There are few reports on the TNT biodegradation with the white-rot and litter-decaying basidiomycetes. Successful degradation and significant mineralization of this recalcitrant compound was achieved with *P. chrysosporium* and other WRB (Fernando et al. [@CR11]; Van Aken et al. [@CR27]; Kim and Song [@CR17]; Cheong et al. [@CR5]). Usually the LME are considered to be implicated in the degradation of TNT and its catabolites because many these enzymes genes are expressed in presence of the diverse recalcitrant organic pollutants. In particular, Van Aken et al. ([@CR26], [@CR27]) showed that a concentrated preparation of MnP from *Phlebia radiata* was able to transform TNT (22 % mineralization) and 2-amino-4, 6-dinitrotoluene (76 % mineralization). However, none of the earlier studies evaluated the TNT effect on the LME production. Cheong et al. ([@CR5]) determined the laccase gene expression by *T. versicolor* during degradation of TNT and established that the expression levels of the laccase gene in cultures containing TNT and its catabolites were fourfold higher than that in the control culture. The increase of the gene expression was the most prominent at the early phase of addition (6 h) and the laccase gene from this fungus was considered to be implicated in the degradation of xenobiotic. Our results are in agreement with this conclusion. In this study, a direct demonstration of the TNT mineralization by the tested fungi was not performed. However, among them, two strains of *C. unicolor* followed by *T. versicolor* BCC 775 produced high levels of laccase in addition to the appreciated MnP activity and almost completely removed TNT from the synthetic medium (Table [1](#Tab1){ref-type="table"}). It is not excluded that the presence of both enzymes provided a cooperative effect on the TNT removal. Two fungi, *F. fomentarius* BCC 38 and *F. trogii* BCC 146, also secreted the high laccase activity, but MnP was not produced. Obviously, this circumstance explains their moderate efficiency in the TNT elimination. Finally, *P. coccineus* BCC 310 did not produced MnP and expressed comparatively low laccase activity in the synthetic medium and, respectively, this fungus removed only 27 % from the initial TNT content. In the short-term experiments, a certain reduction in the TNT concentration was observed after initial 8 h cultivation likely due to the compound adsorption by the fungal mycelium and action of enzymes present in the inoculum (Fig. [1](#Fig1){ref-type="fig"}). However, during the next days, laccase and MnP contributed in the TNT significant disappearance. The data have shown a correlation between the TNT removal and laccase and especially MnP activity of the tested fungi. Nevertheless, a fundamental work with the isolated enzyme preparations having different ratio of individual LME and purified enzymes are needed to establish their role in the TNT mineralization chain. It is obviously that there are the other enzymes and factors governing degradation of this compound which should be established.
Thus, this study has shown a high applicability of *C. unicolor* BCC 300 not only for the LME production, but also for the TNT and other xenobiotics biodegradation. Our finding that this strain has been resistant to the high concentration of TNT (0.3 mM in glycerol-containing medium and 0.4 mM in mandarin peels-based medium) and has ability to produce in such environmental conditions high levels of extracellular laccase and MnP is important for a rapid and efficient bioremediation of the TNT polluted areas.
Conclusions {#Sec10}
===========
Six strains of WRB belonging to the different taxonomic groups exerted a wide diversity in their response to carbon source and the TNT supplementation to the nutrient medium. Firstly, while all tested fungi were capable to produce laccase in both glycerol and mandarin peels-containing media, only *C. unicolor* BCC 300 and *T. versicolor* BCC 775 secreted MnP in the glycerol-containing medium. Secondly, replacement of glycerol by mandarin peels leaded to increase of the fungi laccase activity, promoted *C. unicolor* and *T. versicolor* MnP secretion and induced this enzyme production by *F. fomentarius* BCC 38 and *F. trogii* BCC 146. Thirdly, differential response of the WRB strains to the TNT addition also was observed. In particular, *C. unicolor* BCC 300 laccase activity increased 2- to 3-fold in both media whereas the stimulation of laccase production was not revealed in cultivation of *F. fomentarius* BCC 38. Moreover, TNT practically did not affect the MnP secretion. Fourthly, while two strains of *C. unicolor* followed by *T. versicolor* BCC 775 almost completely removed 0.2 mM TNT from the synthetic medium, *P. coccineus* BCC 310 degraded only 27 % of xenobiotic indicating involvement of MnP in this process. Finally, this study revealed *C. unicolor* BCC 300 as an appropriate candidate for the LME production and TNT biodegradation. This strain tolerates high concentration of toxic compound and has been capable to synthesis at such conditions high titers of the target enzymes.
EK, MA and AK conceived the study, evaluated enzyme activity and were involved in the data analysis. VE designed and planned the study and prepared the manuscript. All authors read and approved the final manuscript.
Acknowledgments {#FPar1}
===============
This work was financially supported by the Science & Technology Centre in Ukraine under project number STCU 3740. We are grateful to Drs. Anne Favel and Laurence Lessage-Meessen and other researchers of the laboratory of Biotechnologie des Champignons Filamenteux, INRA/Aix-Marseille Université (France) for their help in the taxonomic identification of number WRB.
Competing interests {#FPar2}
===================
The authors declare that they have no competing interests.
|
You need only qualify with one semi-auto to be approved to carry all semi-auto pistols, and the same goes for a revolver.
Note: We have eye and ear protection available. We also have ammo available for qualifications at a modest additional charge.
ABOUT LEOSA
A Qualified Retired Law Enforcement Officer (QRLEO) is an individual who:
1) Is separated in good standing from service with a public agency as a law enforcement officer; and
2) Before such separation, was authorized by law to engage in or supervise the prevention, detection, investigation, prosecution, or the incarceration of any person for, any violation of law, and had statutory powers of arrest or apprehension; and
3) Either:
(a) Before such separation, served as a law enforcement officer for an aggregate of 10 years or more; or
(b) Separated from service with such agency after completing any applicable probationary period of such service due to a service-connected disability, as determined by such agency.
AND
4) During the most recent 12-month period has met, at the expense of the individual, the standards for qualification in firearms training for active law enforcement officers, as determined by:
(a) The individual's former agency, or
(b) The State in which the individual resides, or
(c) If the State has not established such standards, either (1) a law enforcement agency within the State in which the individual resides; or (2) the standards used by a certified firearms instructor that is qualified to conduct a firearms qualification test for active duty officers within the State;
AND
5) EITHER:
(a) Has not been officially found by a qualified medical professional employed by the agency to be unqualified for reasons relating to mental health and as a result of this finding will not be issued the photographic identification for LEOSA; or
(b) Has not entered into an agreement with the agency from which the inidividual is separating from service in which the individual acknowledges he or she is not qualified under this section for reasons relating to mental health and for those reasons will not receive or accept the photographic identification for LEOSA;
AND
6) Is not under the influence of alcohol or another intoxicating or hallucinatory drug or substance; and
7) Is not prohibited by Federal law from receiving a firearm.
The identification needed for a QRLEO to carry under LEOSA is:
1) A photo ID that:
(a) Is issued by the agency that the individual worked for; and
(b) Identifies the individual as having been employed as a police officer or law enforcement officer;
AND EITHER OF THE FOLLOWING:
2) The ID indicates that the individual has been tested or otherwise found by the agency to meet the active duty standards for qualification in firearms training as established by the agency to carry a firearm of the same type as the concealed firearm less than one year before the date the individual is carrying the concealed firearm; or
3) The retired officer possesses as certification:
(a) Issued by:
(i) The state where the individual resides; or
(ii) By a certified firearms instructor that is qualified to conduct a firearms qualification test for active duty officers within that State;
AND
(b) That indicates he individual has, not less recently than one year before the date the individual is carrying the concealed firearm, been tested or otherwise found by the agency to meet the active duty standards for qualification in firearms training as established by the state or a certified firearms instructor that is qualified to conduct a firearms qualification test for active duty officers within the state to have met:
(i) The active duty standards for qualification in firearms training, as established by the state, to carry a firearm of the same type as the concealed firearm; or
(ii) If the state has not established such standards, standards set by any law enforcement agency within the state to carry a firearm of the same type as the concealed firearm. |
package org.carlspring.strongbox.event.repository;
import org.carlspring.strongbox.event.AbstractEventListenerRegistry;
import org.springframework.stereotype.Component;
/**
* @author carlspring
*/
@Component
public class RepositoryEventListenerRegistry
extends AbstractEventListenerRegistry
{
public void dispatchEmptyTrashEvent(String storageId,
String repositoryId)
{
RepositoryEvent event = new RepositoryEvent(storageId,
repositoryId,
RepositoryEventTypeEnum.EVENT_REPOSITORY_EMTPY_TRASH.getType());
dispatchEvent(event);
}
public void dispatchEmptyTrashForAllRepositoriesEvent()
{
RepositoryEvent event = new RepositoryEvent(null,
null,
RepositoryEventTypeEnum.EVENT_REPOSITORY_EMTPY_TRASH_FOR_ALL_REPOSITORIES.getType());
dispatchEvent(event);
}
public void dispatchUndeleteTrashEvent(String storageId,
String repositoryId)
{
RepositoryEvent event = new RepositoryEvent(storageId,
repositoryId,
RepositoryEventTypeEnum.EVENT_REPOSITORY_UNDELETE_TRASH.getType());
dispatchEvent(event);
}
public void dispatchUndeleteTrashForAllRepositoriesEvent()
{
RepositoryEvent event = new RepositoryEvent(null,
null,
RepositoryEventTypeEnum.EVENT_REPOSITORY_UNDELETE_TRASH_FOR_ALL_REPOSITORIES.getType());
dispatchEvent(event);
}
}
|
(*
**
** A proof of the equivalence of two definitions
** of the Ackermann function
**
** Author: Hongwei Xi (hwxi AT cs DOT bu DOT edu)
** Time: December 2, 2009
**
*)
(* ****** ****** *)
(*
** The code is ported to ATS2 on 2012-06-11 by Hongwei Xi
** There is actually no change made for porting this example.
*)
(* ****** ****** *)
(*
The following two functions are proven to be the same
(in the set-theoretic sense):
fun ack
(m:int, n:int): int =
case+ m of
| 0 => n+1
| _ => begin case+ n of
| 0 => ack (m-1, 1) | _ => ack (m-1, ack (m, n-1))
end // end of [_]
// end of [ack1]
fun ackf (m: int): int -<cloref1> int = let
fun helper
(f: int -<cloref1> int): int -<cloref1> int =
lam n => if n = 0 then f (1) else f (helper f (n-1))
// end of [helper]
in
case+ m of
| 0 => lam n => n+1 | _ => helper (ackf (m-1))
end // end of [ackf]
*)
(* ****** ****** *)
dataprop ACK (int, int, int) =
| {n:nat} ACK1 (0, n, n+1) of ()
| {m:nat} {r:int} ACK2 (m+1, 0, r) of ACK (m, 1, r)
| {m,n:nat} {r1,r2:int}
ACK3 (m+1, n+1, r2) of (ACK (m+1, n, r1), ACK (m, r1, r2))
// end of [ACK]
prfun ACK_nat_nat_nat {m,n:nat}
{r:int} .<m,n>. (pf: ACK (m, n, r)): [r >= 0] void =
case+ pf of
| ACK1 () => ()
| ACK2 pf1 => ACK_nat_nat_nat (pf1)
| ACK3 (pf1, pf2) => let
prval () = ACK_nat_nat_nat pf1
prval () = ACK_nat_nat_nat pf2
in
// nothing
end // end of [ACK3]
// end of [ACK_nat_nat_nat]
prfun ACK_isfun {m,n:nat} {r1,r2:int} .<m,n>.
(pf1: ACK (m, n, r1), pf2: ACK (m, n, r2)): [r1==r2] void =
case+ (pf1, pf2) of
| (ACK1 (), ACK1 ()) => ()
| (ACK2 (pf11), ACK2 (pf12)) => ACK_isfun (pf11, pf12)
| (ACK3 (pf11, pf12), ACK3 (pf21, pf22)) => let
prval () = ACK_nat_nat_nat (pf11)
prval () = ACK_isfun (pf11, pf21) in ACK_isfun (pf12, pf22)
end // end of [ACK3, ACK3]
// end of [ACK_isfun]
(* ****** ****** *)
sortdef int2rel = (int, int) -> prop
dataprop SUCC (int, int) = {n:nat} SUCC1 (n, n+1) of ()
dataprop HELPER (rel:int2rel, int, int) =
| {r:int} HELPER1 (rel, 0, r) of rel (1, r)
| {n:nat} {r1,r2:int}
HELPER2 (rel, n+1, r2) of (HELPER (rel, n, r1), rel (r1, r2))
// end of [HELPER]
dataprop ACKF (int, int2rel) =
| ACKF1 (0, SUCC) of ()
| {m:nat} {rel:int2rel}
ACKF2 (m+1, lam (r1:int, r2:int) => HELPER (rel, r1, r2)) of ACKF (m, rel)
// end of [ACKF]
prfun ACKF_istot
{m:nat} .<m>. (): [rel:int2rel] ACKF (m, rel) =
sif m > 0 then ACKF2 (ACKF_istot {m-1} ()) else ACKF1 ()
// end of [ACKF_istot]
propdef int2rel_istot
(rel: int2rel) = {n:nat} () -<prf> [r:nat] rel (n, r)
// end of [int2rel_istot]
prfn HELPER_istot
{rel:int2rel} (fpf: int2rel_istot rel)
: int2rel_istot (lam (r1:int,r2:int) => HELPER (rel, r1, r2)) = let
prfun fpf_res {n:nat} .<n>. (): [r:nat] HELPER (rel, n, r) =
sif n > 0 then let
prval [r1:int] pf1 = fpf_res {n-1} ()
in
HELPER2 (pf1, fpf {r1} ())
end else // n = 0
HELPER1 (fpf {1} ())
// end of [sif]
// end of [pf_res]
in
fpf_res
end // end of [HELPER_istot]
prfun ACKF_rel_istot
{m:nat} {rel:int2rel} .<m>.
(pf: ACKF (m, rel)): int2rel_istot (rel) =
sif m > 0 then let
prval ACKF2 pf1 = pf
prval fpf1 = ACKF_rel_istot {m-1} (pf1)
in
HELPER_istot (fpf1)
end else let // m = 0
prval ACKF1 () = pf // rel = SUCC
in
lam {n:nat} () =<prf> SUCC1 {n} ()
end // end of [sif]
// end of [ACKF_rel_istot]
(*
** this lemma means that applying ackf (m) to n gives
** ack (m, n)
*)
prfun ackf_ack_lemma
{m,n:nat} {rel:int2rel} {r:int} .<m,n+1>.
(pf1: ACKF (m, rel), pf2: rel (n, r)): ACK (m, n, r) =
case pf1 of
| ACKF1 () => let
prval SUCC1 () = pf2 in ACK1 {n} ()
end // end of [ACKF1]
| ACKF2 pf11 => ackf_ack_lemma2 (pf11, pf2)
// end of [ackf_ack_lemma]
(*
** this lemma means that applying ackf (m) n times to 1
** yields ack (m+1, n)
*)
and ackf_ack_lemma2
{m,n:nat} {rel:int2rel} {r:int} .<m+1,n>.
(pf1: ACKF (m, rel), pf2: HELPER (rel, n, r)): ACK (m+1, n, r) =
sif n > 0 then let
prval HELPER2 (pf21, pf22) = pf2
prval pf_ack = ackf_ack_lemma2 (pf1, pf21) // ACK (m+1, n-1)
prval () = ACK_nat_nat_nat (pf_ack)
in
ACK3 (pf_ack, ackf_ack_lemma (pf1, pf22))
end else let // n == 0
prval HELPER1 (pf21) = pf2
in
ACK2 (ackf_ack_lemma (pf1, pf21))
end // end of [sif]
// end of [ackf_ack_lemma2]
(* ****** ****** *)
prfun ack_ackf_lemma
{m,n:nat} {r:int} .<>. (pf: ACK (m, n, r))
: [rel:int2rel] (ACKF (m, rel), rel (n, r)) = let
prval pf_ackf = ACKF_istot {m} ()
prval fpf_rel = ACKF_rel_istot (pf_ackf)
prval pf_rel = fpf_rel {n} ()
prval pf_alt = ackf_ack_lemma (pf_ackf, pf_rel)
prval () = ACK_isfun (pf, pf_alt)
in
(pf_ackf, pf_rel)
end // end of [ack_ackf_lemma]
(* ****** ****** *)
(*
**
** By [ackf_ack_lemma] and [ack_ackf_lemma], it is clearly
** one can go from ACKF to ACK and vice versa.
**
*)
(* ****** ****** *)
(* end of [Ackermann.dats] *)
|
Top 10 female amateurs: No. 3 Stephanie Meadow
The amateur season roared in with talk of the Curtis Cup in Scotland, and died down with the Women’s World Amateur Team Championship in Turkey, which made patriotism a big part of 2012. But in terms of women’s amateur golf, 2012 also was the year of the Kiwi (read: Lydia Ko) and the last summer of the Jutanugarn sisters.
Golfweek will spend 10 days counting down the top amateur players of the past year. Who will be No. 1? Who else will make the list? Check back each day.
No. 3: Stephanie Meadow
R&A’s World Amateur Golf Ranking: 13
2012 in review: Member of Alabama’s national championship-winning team; one collegiate victory; GB&I Curtis Cup team; won Ladies British Amateur; qualified for U.S. Women’s Open
The biggest sign that Meadow had made it big in 2012 was when, in early July, her name was thrown in with Graeme McDowell and Rory McIlroy. Meadow made so many headlines late in the spring that she became known as the next great golf prodigy of Northern Ireland.
Meadow was crucial in Alabama’s romp to the national title. She opened with rounds of 69-73 at the Vanderbilt Legends Club in Franklin, Tenn., to help the Crimson Tide take the early-week lead. Weeks later, she was even more crucial in GB&I’s Curtis Cup victory in Nairn, Scotland.
Meadow not only secured three points for her team that week, but she made the final putt to give her team the victory. The match came down to Meadow and Amy Anderson in Sunday singles, and Meadow never let up against Anderson, who turned out to be the strongest American player that week. Meadow won on the 16th green, 4 and 2, and her teammates erupted.
Her success continued at the Ladies British Amateur at the end of the month. Meadow had to defeat Georgia sophomore Rocio Sanchez Lobato in the final match, and won, 4 and 3. She played in the U.S. Women’s Open just three days later (gaining entry courtesy of the Ladies British victory), but missed the cut. She didn’t make another transatlantic flight for the Women’s British. Meadow, after all, also had summer school to worry about.
The only stumble for Meadow during the summer was at the U.S. Women’s Amateur, where she failed to make match play. When school resumed, however, Meadow came back to lead the team in scoring through the fall. Seems she’s back to her normal self.
The U.S. Golf Association has revealed that Robin Burke will captain the U.S. team at the 2016 Curtis Cup. Burke will lead the Americans as they try to retain the cup at Dun Laoghair Golf Club near Dublin, Ireland.
Burke to captain Americans at 2016 Curtis Cup
The U.S. team gathers before the start of Saturday four-ball matches at the 2014 Curtis Cup.
(
USGA
)
Julia Potter, last year's U.S. Mid-Amateur champion, and Margaret Shirley, last year's runner-up, both won their semifinal matches early Thursday morning and will meet for a second straight year in the championship match.
Potter, Shirley to meet again in Women's Mid-Am final
Julia Potter will look to capture her second straight U.S. Women's Mid-Amateur title Thursday, and she'll have to beat Margaret Shirley again to do it.
(
USGA
) |
King's Quest III: To Heir Is Human Redux
At a Glance
AGD Interactive has lovingly preserved and updated the third installment of this classic point-and-click adventure game.
Your days enslaved to the wicked wizard Manannan are coming to an end, but can you lead Gwydion beyond his clutches and into the world of Llewdor beyond? AGD Interactive has lovingly preserved and updated the third installment in the classic King’s Quest series of adventure games originally produced by Sierra On-Line and made it available as a free download called King’s Quest III: To Heir Is Human Redux.
King’s Quest III is a classic point-and-click adventure game rendered in a pseudo-3D side scrolling format. The adventure begins in Manannon’s home, your prison for now. A control bar across the top of the screen enables you to change control from things like a hand to manipulate objects in your environment or boots to wander about. You’ll explore your environment searching for clues and interacting with objects that will help you escape. You have Save Game feature at your disposal; plan on using it often as peril is around every corner.
While the game has been modified to run on modern computers with an updated soundtrack and delightful voice narrations, King’s Quest III’s graphics are definitely old-school. Fans of the original game will feel right at home, but younger gamers might be put off by the pixelated graphics. Even back in 1986, reviewers felt the low-res graphics made tasks difficult like finding and identifying clues hidden throughout the game. There’s an upside to the low-res graphics, though: it requires only minimal system requirements to run the game smoothly, so nearly any Mac made in the past few years should work just fine. Don’t let the dated graphics fool you though. There is plenty of challenge here, and thankfully there are many walk-throughs online should you get stuck.
Macworld’s buying advice
AGD Interactive should be applauded for its heroic efforts to preserve a significant genre in computer game history. King’s Quest III Redux is a fitting tribute that will reward fans and expose younger gamers to an adventure classic.
[James Savage is the host of the RetroMacCast a weekly podcast devoted to older Macintosh computers. He used to play Sierra On-Line games on his Apple IIe.] |
Most Hated And Most Loved States In America [Nationwide Polling]
Americans travelling to other states for their next vacation are more likely to pick Hawaii and Colorado over California and Illinois if their decision is based solely on the states they like and the states they want to avoid.
Public Policy Polling interviewed 1,200 people and in their questions they asked how each person felt about each of the 50 states, they then arranged those responses to create a list of the 50 states in terms of popularity.
As the numbers revealed Hawaii, Colorado, Tennessee, South Dakota and Virginia were overwhelmingly liked while California, Illinois, New Jersey, Mississippi and Utah ended up with negative polling numbers.
What might be most interesting isn’t which states are loved and hates but rather the fact that most states were seen as “indifferent” by responding parties. In fact two-thirds of responding parties said they were “not sure” about most states.
The study also found that political affiliation plays a big part in which states are chosen as liked or disliked.For example Democrats liked California 91 points more than Republicans while Republicans liked Texas 92 points more than Democrats.
The study in general found that Democrats and Republicans differed greatly on which states they preferred with responses falling squarely into what we call the “red” and “blue” states.
Here’s the top 5 most popular and top 5 least liked states:
Most popular:
Hawaii—54-10 (+44)
Colorado—44-9 (+35)
Tennessee—48-14 (+34)
South Dakota—42-8 (+34)
Virginia—45-13 (+32)
Least popular:
California—27-44 (-17)
Illinois—19-29 (-10)
New Jersey—25-32 (-7)
Mississippi—22-28 (-6)
Utah—24-27 (-3)
Do you have your own list of favorite and most hated states? Feel free to share your favorites in our comments section. |
Plate fin and tube heat exchangers or externally finned tube exchangers have long been employed to recover process heat. These exchangers are most often employed to heat or cool a low density gas stream located on the finned side against a denser fluid with higher heat transfer coefficient within the tubes. The extended surface on the finned exterior pass allows greater heat transfer surface than a bare tube and provides greater heat transfer at a low-pressure drop.
The art has not heretofore recognized the unexpected advantage of applying a catalyst coating on the heat transfer fins, or support tubes and surrounding internal surface of the heat exchanger vessel/housing, to allow effective heat transfer while also allowing a catalytic reaction has not been recognized in the art. |
Selective kinetic spectrophotometric method for determination of gatifloxacin based on formation of its N-vinyl chlorobenzoquinone derivative.
A selective and simple kinetic spectrophotometric has been developed, for the first time, for the determination of gatifloxacin (GAT) in its dosage forms. The method was based on the formation of a colored N-vinyl chlorobenzoquinone derivative of GAT by its reaction with 2,3,5,6-tetrachloro-1,4-benzoquinone in presence of acetaldehyde. The formation of the colored product was monitored spectrophotometrically by measuring the absorbances at 655 nm. The factors affecting the reaction were studied and optimized. The stoichiometry of the reaction was determined, and the reaction pathway was postulated. Under the optimized conditions, the initial rate and fixed time (at 5 min) methods were utilized for constructing the calibration graphs. The graphs were linear in the concentration ranges of 2-100 and 10-140 microg ml(-1) with limits of detection of 0.84 and 3.5 microg ml(-1) for the initial rate and fixed time methods, respectively. The analytical performance of both methods was fully validated, and the results were satisfactory. The proposed methods were successfully applied to the determination of GAT in its commercial dosage forms. The label claim percentages were 99.7-100.5 and 98.2-99.5% for the initial rate and fixed time methods, respectively. Statistical comparison of the results with those of the reference method showed excellent agreement and proved that there was no significant difference in the accuracy and precision between the reference and the proposed methods. The proposed methods are superior to all the previously reported spectrophotometric methods in terms of the procedure simplicity and assay selectivity. |
Q:
printf continuously printing
Trying out another example from KandR, I have the following C code:
#include <stdio.h>
int main(){
double nc = 5;
printf("%*.0f",nc);
return 0;
}
This prints 5 and then it keeps moving (printing blank characters) from left to right and then a newline until stopped by pressing Ctrl + C). When I change the printf line to printf("%.0f",nc) it works as expected i.e. it just prints 5 and stops.
According to http://www.cplusplus.com/reference/cstdio/printf/ printf's syntax is:
%[flags][width][.precision][length] specifier.
I changed the [width] to * so that printf does not limit the digits in the output.
1) Why does it keep printing blank characters until stopped?
2) When I do not give any width, what does printf assume by default?
3) I also modified the above code to set nc = 500, then printf
does not print anything except the continuous blank characters!
When I change it to 500.00, it prints 500 and after that it keeps printing blank characters until stopped. Why is there no output when I set nc=500 and why is there an output when I set nc=500.00?
A:
The format specifier "%*.0f" expects two arguments: one is width specifier and the another is for double. Since you pass only one, it invokes undefined behaviour.
If you correct it, for example:
printf("%*.0f",5, nc); // width 5
It'll work fine.
|
# Local Privilege Escalation
## CVE-2019-16897
### Affected Products
* K7 Antivirus Premium from version 16.0.xxx up to and including 16.0.0120
* K7 Total Security from version 16.0.xxx up to and including 16.0.0120
* K7 Ultimate Security from version 16.0.xxx up to and including 16.0.0120
### Vulnerability Type
Improper Access Control
### Impact
Privileged Registry Write
### Summary
Improper access controls allow an attacker to access and control the inter-process communication between a low privileged process and a SYSTEM service process. This can result in an arbitrary registry write to facilitate an escalation of privilege.
### Exploitation
#### Auto Exploit PoC
**Disclaimer**: Only works for K7 Ultimate Security.
1. Drop `payload.dll` onto the desktop (PoC is hardcoded to use username `Standard-User`,
2. Navigate the AV UI to the landing/home page,
3. Run `SelfProtDisable.exe`,
4. Run `PWN.EXE`.
#### Article
https://0x00sec.org/t/anti-virus-exploitation-local-privilege-escalation-in-k7-security-cve-2019-16897/17655
### Demo

|
;============================================================
; File: Intellicast.ini
; Plugin: Weather
;============================================================
[Ceiling]
Высота облаков
[Mon]
ПН
[Tue]
ВТ
[Wed]
СР
[Thu]
ЧТ
[Fri]
ПТ
[Sat]
СБ
[Sun]
ВС
[Full]
Полнолуние
[Sunny]
Солнечно
[Waning Crescent]
Убывающая Луна
[Waning Gibbous]
Убывающая Луна
[Waxing Crescent]
Растущая Луна
[Waxing Gibbous]
Растущая Луна
[Last Quarter]
Последняя четверть Луны
[First Quarter]
Первая четверть Луны
[Partly Sunny]
Местами солнечно
[Mostly Sunny]
Преимущественно солнечно
[Partly Cloudy]
Местами облачно
[Mostly Cloudy]
Преимущественно облачно
[Mostly Clear]
Преимущественно ясно
[Scattered Thunderstorms]
Редкие грозы
[Feel]
Ощущение
[Forecast Day 1]
Прогноз: День 1
[Forecast Day 2]
Прогноз: День 2
[Forecast Day 3]
Прогноз: День 3
[Forecast Day 4]
Прогноз: День 4
[Forecast Day 5]
Прогноз: День 5
[Forecast Day 6]
Прогноз: День 6
[Forecast Day 7]
Прогноз: День 7
[Forecast Day 8]
Прогноз: День 8
[Forecast Day 9]
Прогноз: День 9
[Forecast Day 10]
Прогноз: День 10
[Forecast today]
Прогноз: сегодня
[Heat Index]
Индекс жары
[Moon]
Луна
[MoonRise]
Луна: восход
[MoonSet]
Луна: закат
[Update1]
Обновить 1
[Update2]
Обновить 2
[Wind Chill]
С учётом ветра
[Wind Direction]
Ветер: направление
[Wind Speed]
Ветер: скорость
[N]
С
[W]
З
[S]
Ю
[E]
В
[NW]
СЗ
[NE]
СВ
[SW]
ЮЗ
[SE]
ЮВ
[NNW]
ССЗ
[NNE]
ССВ
[SSW]
ЮЮЗ
[SSE]
ЮЮВ
[ENE]
ВСВ
[WSW]
ЗЮЗ
[WNW]
ЗСЗ
[ESE]
ВЮВ
[WindDir1]
Ветер: направление 1
[WindDir2]
Ветер: направление 2
[Broken Clouds]
Малооблачно
[Scattered Clouds]
Переменная облачность
[North]
Север
[East]
Восток
[South]
Юг
[West]
Запад
[Northwest]
Северо-запад
[Northeast]
Северо-восток
[Southwest]
Юго-запад
[Southeast]
Юго-восток
|
Essential role of EDHF in the initiation and maintenance of adrenergic vasomotion in rat mesenteric arteries.
The possible roles of endothelial intracellular Ca(2+) concentration ([Ca(2+)](i)), nitric oxide (NO), arachidonic acid (AA) metabolites, and Ca(2+)-activated K(+) (K(Ca)) channels in adrenergically induced vasomotion were examined in pressurized rat mesenteric arteries. Removal of the endothelium or buffering [Ca(2+)](i) selectively in endothelial cells with BAPTA eliminated vasomotion in response to phenylephrine (PE; 10.0 microM). In arteries with intact endothelium, inhibition of NO synthase with N(omega)-nitro-l-arginine methyl ester (l-NAME; 300.0 microM) or N(omega)-nitro-l-arginine (l-NNA; 300.0 microM) did not eliminate vasomotion. Neither inhibition of cGMP formation with 10.0 microM 1H-[1,2,4]oxadiazolo[4,3-a]quinoxalin-1-one (ODQ) nor inhibition of prostanoid formation (10.0 microM indomethacin) eliminated vasomotion. Similarly, inhibition of AA cytochrome P-450 metabolism with an intraluminal application of 17-octadecynoic acid (17-ODYA) or 6-(2-propargyloxyphenyl)hexanoic acid (PPOH) failed to eliminate vasomotion. In contrast, intraluminal application of the K(Ca) channel blockers apamin (250.0 nM) and charybdotoxin (100.0 nM), together, abolished vasomotion and changed synchronous Ca(2+) oscillations in smooth muscle cells to asynchronous propagating Ca(2+) waves. Apamin, charybdotoxin, or iberiotoxin (100.0 nM) alone did not eliminate vasomotion, nor did the combination of apamin and iberiotoxin. The results show that adrenergic vasomotion in rat mesenteric arteries is critically dependent on Ca(2+)-activated K(+) channels in endothelial cells. Because these channels (small- and intermediate-conductance K(Ca) channels) are a recognized component of EDHF, we conclude therefore that EDHF is essential for the development of adrenergically induced vasomotion. |
Tag: mac
With the weather getting warmer day by day, I’ve started thinking more about fashion and less about what makeup to wear. Due to this, my makeup’s started to look a lot lighter, glowy and really fresh looking – something that I’m not complaining about. If I do decide to wear a less colourful outfit, I’ll […]
We’ve got upcoming festivals, summer party’s and for some of us (me) a whole lot of weddings – including my own! I find that a bronzed look just goes with everything, no matter the occasion or what you’re wearing. Here I’ve created a glam, yet subtle, makeup look which oozes bronzed goddess vibes. It’s the […]
There are some days where you really can’t be bothered to do anything, especially your makeup. But on the other hand, you still want to look put together and like you’ve made an effort (when deep down, you know you haven’t even tried). After seeing Jamie Genevieve’s Lazy Girl Makeup and Hair tutorial, I knew […]
Back when I was a teenager, a bubblegum pink lip was my go-to. Especially if it ‘chalked’ out my lips a little – oh those were the days right!? These days, I still enjoy a pink lip, but I tend to lean towards the more muted slightly brown-toned ones. As I assume most of us […]
Subway’s oat & raisin cookies are one of my faves (alongside the rainbow ones). When scouring one of my vegan cookbooks, I came across a muesli cookie recipe which I thought would make the perfect alternative and vegan version of one of my favourite kind of cookies. I’ve followed the recipe almost to the T, […]
Before I start to talk about anything, I’m going to talk about why Glycolic acid is a thing. Glycolic acid is an exfoliator, which removes the top layer of dead cells. In turn, this means your skin will look fresher and brighter. It’s also said to treat scars, discoloration and even signs of aging. I’d […]
Don’t you just love a product that claims to be 24-hour wear because honestly, on how many occasions have you worn the same makeup for that length of time? I mean, even at a festival we all use baby wipes to take our makeup off right? Anyway, I thought I’d start a bit of a […]
A little bit of sun and I feel like the whole country goes into Summer mode, well I know that I do. I live for the warmer months and in turn, glowy and bronzed makeup. Seen as we’ve had the teeniest bit of sunshine, I thought I’d show you my current go to makeup that’s […]
I’ve been blogging for four years now (I think) and although I have a steady following, I know that being motivated to write posts or continuing the blog when things just don’t seem to be growing can be hard. It’s so so important to remember that you don’t write a blog for people to follow […]
There’s so much makeup around these days that I personally find that I’ll buy stuff from the shops without even thinking – do I already have something like this? 90% of the time, yes. Yes I do. For this makeup look I decided to use some of my old favourites and products that I rarely […] |
Amityville's Park Avenue Memorial Elementary School students were in for a special treat when team members from the New York Islanders Hockey Team visited their school to talk about an important concept - teamwork. More...
Amityville's Northeast Elementary students were in for a special treat when Principal Pauline Collins and Library AIS teacher Tina Smith hosted the building's first "Prime Time Reading" night to encourage literacy and reading for pleasure. More... |
Saturday, December 29, 2007
Seriously, though: That an NYTimes blogger put perhaps too much stock in a white supremacist's claims of ties to Ron Paul means RP is definitely not a racist extremist, just an extremist. The support RP receives from white supremacists, such as David Duke (no link to any of his hate, but support for RP is all over Duke's home site), isn't significant. That this whole episode reeks of a low quality attempt to paper over RP's ties by discrediting one particular set of claims, in the model of rat-fucking Dan Rather in Memogate to negate the AWOL from National Guard duty issue, should not raise any suspicions. It certainly doesn't for Megan.
Who cheated whom?: ... *sigh* Megan simply will not hear of possibly blaming banks for any portion of the subprime loan crisis. Neither will a famous product of the U of Chicago Economics dep't, who is above reproach because of awards.
The housing bubble was a great national folie-a-deux. Buyers and lenders alike were deluded by long years of easy credit into thinking that risks were lower than they actually were. It is not plausible to argue that the banks knew the loans would go bad . . . and nonetheless jammed billions of them into their portfolios.
Don't blame the banks, they made the same mistake as the people they extended credit to. Blame the people who accepted that credit, instead, who were operating under the exact same mistaken beliefs. I'd say why, but I can't snark that well.
To many people, of course, this cries out for regulations to keep the bankers from being stupid: force them to up their loan quality. This is likely to just replace one kind of error with another. Most people who got subprime loans are not in default, and I will be very, very surprised if the number of defaulters even gets near the 50% mark. Why would we want to cut off credit to the sensible majority who can meet their payments, in order to protect those who take out loans they can't afford? There is no way to tell Class A from Class B--or believe me, the banks would already have weeded the latter group out.
A month ago, Megan was claiming 15% default was no biggie and had to actually update to admit that she was being flip, by being flip and joking about a "financial holocaust", as M. noted at the time. Now, she's claiming a 50% default rate wouldn't justify denying, or not aggressively pushing, credit on people unqualified for it. I'm no economist, but this strikes me as extremely fucking stupid.But Megan is more worried about whether people will be able to put themselves in massive debt in the future.
It is characteristic of major economic problems that whatever problem you're having now seems like the only problem worth solving, no matter what the cost. But the cost of denying credit to millions of people is very high--and tellingly, it will not be borne by any of the people who are advocating it.
Are you willing to bear the costs of forcing bankers to perform due diligence? Could you live with yourself?
Why shouldn't we punish rich people who renounce their citizenship?: Maybe because their wealth was generated by participation in our economy and would not exist without it? Or the fact that the rich folk at issue here are often, usually, trying to continue earning income from US holdings but avoid paying taxes on them?This is an excellent example of the shallow nature of Megan's glibertarianism.
Ron Paul on taxes: This is probably the longest post Megan has produced for The Atlantic, and it amounts to saying RP's batshit crazy beliefs on taxation and the Dep't of Education are a different flavor from Megan's batshit crazy beliefs on taxation and the Dep't of Education. This is two schizophrenics arguing over what God's voice sounds like.
In general, I try to assume that when someone does something professionally, they have some passing familiarity with the subject. This prevents me from looking like an utter fool when I triumphantly catch, say, a science journalist in some "error" that turns out to be my own misunderstanding.
In fact, I have caught professional economists and journalists in errors, sometimes embarassing ones; and in turn, I have been caught in a few bloopers of my own.
......I could link to examples of posts where Megan disproves her own claims here, but that'd be roughly of half everything we've ever posted on this blog. Instead, I'm going to stop, because Megan's degree of self-deception in this makes my head hurt.
17 comments:
Great job... particularly the analysis of the RP/NYT situation. Far beyond the scope of a blog such as this, but I hope to read someday a thorough analysis of the strange history of the NYT in promoting the conservative ascendancy of the past decade or more. From Judith and WMD to today's bit whitewashing the WH's role in the CIA tape debacle to hiring Kristol (for the love of God) the grey lady has either been artfully manipulated or an active participant in some of the most shameless propaganda efforts of our times.
It is not plausible to argue that the banks knew the loans would go bad . . . and nonetheless jammed billions of them into their portfolios.
Um, yes it is plausible, if the banks assumed there'd be a bailout at the end of the party. They would naturally want to get while the getting was good, working under the very reasonable assumption that the Bush administration would look the other way when everything came crashing down.
"In general, I try to assume that when someone does something professionally, they have some passing familiarity with the subject."
I used to assume that, too. Then the Atlantic hired Megan as an "econoblogger." Then again, "passing familiarity" is a somewhat apt description of her economic analysis. Most of it does, after all, read as if it were copied from the synopsis of chapter 2 in my high school economics text book.
hi!,I really like your writing [url=http://pandorauk-shop.co.uk]pandora bracelets uk[/url] very a lot! share we be in contact extra approximately your article on AOL? [url=http://pandorauk-shop.co.uk]pandora charms uk[/url] , I require an expert in this house to solve my problem. May be that is you! Looking forward to see you.
must look at this aMHWjnlL [URL=http://www.chanel--replica.tumblr.com/]chanel discount[/URL] for more detail dTgSpsbA [URL=http://www.chanel--replica.tumblr.com/ ] http://www.chanel--replica.tumblr.com/ [/URL]
Hі there! I сoulԁ haνe sworn I've visited this blog before but after going through a few of the posts I realized it's new to me. Anyways, ӏ'm certainly delighted I found it and I'll be book-mаrkіng it and chеcκing baсk οftеn!
About us
McMegan is awful, just awful, but at least she's no longer employed by The Atlantic. Still, no one can read her every day and live, so we've all but given up trying. Let's just be glad her upwards failure has leveled off.Posts here will likely remain few and far between, as will my tweets. M. is still at his place and twitter and now also Whiskey Fire, and Clem maintains well deserved alumnus privileges. |
Hearing in adult-onset diabetes mellitus.
Hearing acuity and otologic symptoms were examined in 200 patients with adult-onset diabetes mellitus. Data were analyzed according to sex and age and were compared with values of other documented studies; values were within normal limits except in two instances. Speech testing revealed that median speech reception thresholds and median discrimination scores were at the lower limits of normal. Hearing loss and otologic problems did not occur with any increased frequency in patients with adult-onset diabetes mellitus. |
const reduceWords = require('./_reduceWords')
const reduceTags = require('./_reduceTags')
const topk = require('./_topk')
/** store a parsed document for later use */
const exportFn = function() {
let phraseList = this.json({ text: false, trim: false, terms: { tags: true, whitespace: true } })
let allTags = []
let allWords = {}
phraseList = phraseList.map(p => {
return p.terms.map(t => {
allWords[t.text] = allWords[t.text] || 0
allWords[t.text] += 1
allWords[t.pre] = allWords[t.pre] || 0
allWords[t.pre] += 1
allWords[t.post] = allWords[t.post] || 0
allWords[t.post] += 1
//remove any implied tags, first
t.tags = reduceTags(t.tags, this.world)
allTags = allTags.concat(t.tags)
return [t.pre, t.text, t.post, t.tags]
})
})
// compress the top tags
allTags = topk(allTags)
let tagMap = {}
allTags.forEach((a, i) => {
tagMap[a[0]] = i
})
//compress the top words
let wordMap = reduceWords(allWords)
phraseList.forEach(arr => {
arr.forEach(a => {
// use index numbers instead of redundant tag-names
a[3] = a[3].map(tag => tagMap[tag]).join(',')
// use index numbers instead of re-used words
a[0] = wordMap[a[0]] !== undefined ? wordMap[a[0]] : a[0]
a[1] = wordMap[a[1]] !== undefined ? wordMap[a[1]] : a[1]
a[2] = wordMap[a[2]] !== undefined ? wordMap[a[2]] : a[2]
})
})
// pivot wordlist
let wordList = []
Object.keys(wordMap).forEach(k => {
wordList[wordMap[k]] = k
})
return {
tags: Object.keys(tagMap),
words: wordList,
list: phraseList,
}
}
module.exports = exportFn
|
Indoor Tanning Industry Sedona AZ
In United States of America and Canada, indoor tanning products are very usual. Moreover, the indoor tanning businesses have appreciably grown in the last 25 years and are still increasing, getting more and more sophisticated.
Indoor Tanning Industry
It's hard to compete with the global beauty industry. Surprisingly or not, the American population is spending more time and money on beauty than on their education. Thus, regardless of sex, nationality, age or occupation, Americans are extremely attached to indoor tanning salons. The usual surveys reveal the extent of the indoor tanning business in local communities. Americans and Canadians are satisfied with the fact that indoor salons provide a rigurously controlled tanning process, gradual and under supervision. Thanks to these factors, sunburns and health problems are almost out of the question. For instance, 85 percent of those surveyed admit that they really believe in indoor tanning safety. A lot of people also appreciate the privacy and the comfort they get in a tanning salon, which offers them a real break from all the daily tasks they have to attend.
The latest surveys reveal a more balanced male/female profile as compared to a few years ago. Unlike nowadays, in 1996, in most cases women were usual clients. But in the recent years men have become accustomed to indoor tanning facilities and tanning tips.
Many Americans have experienced at least one indoor tanning session in the last ten years. It is said that more than 10 percent of the American population will visit an indoor salon facility. On the other hand, women hold the supremacy of ownership. Surveys point out that more than 50 percent of the indoor salons have female ownership. Neither the age of the tanners nor the nationality is an obstacle for Americans and Canadians. Now, 70 percent of all indoor tanners are over 25 years old. It is no longer a taboo. A lot of people want to cure themselves (from psoriasis, for instance) and to be fit.
Presently there are 25,000 Professional Indoor Tanning Facility Businesses and also 160,000 employees in this industry. The number of clients is encouraging, too: 28 millions. As a matter of fact, a professional indoor tanning salon is operating in almost every town of the USA. There have been reports saying that Hispanic and Afro-American groups share the trend and their number is rising.
About the Author:
Dana Scripca writes for http://www.sunlesstanning.ws where you can find more information about Sunless Tanning.
Please feel free to use this article in your Newsletter or on your website. If you use this article, please include the resource box and send a brief message to let me know where it appeared: mailto:danascri@gmail.com
Whether it is outsourcing your payroll needs, or finding better tactics to make the job easier, payroll is something every business needs to deal with. Your employees will need a paycheck that comes in every week, and without any errors. Finding the right help or better process to do so will make your whole business run more smoothly. |
Properties of a novel carboxymethyl chitosan derived from silkworm pupa.
In this study, a carboxymethyl chitosan derived from silkworm pupa (SP-carboxymethyl chitosan) was prepared. The physical characteristics of the SP chitin, chitosan, and carboxymethyl chitosan were analyzed. The scanning electron microscopy results showed that the surfaces of the samples from SP were more uneven, with more surface fractures compared with those of the reference substance (RS). Thermal analysis, X-ray photoelectron spectroscopy, and Fourier transform infrared spectroscopy analysis showed that the main molecular chain structures of SP samples and RSs had no substantial differences. However, the crystallinity and thermal decomposition temperature of the SP samples were lower compared with those of the RSs. All of these results provide a theoretical basis for the development of applications for the SP-carboxymethyl chitosan. |
export default {
lang: 'English',
helloworld: 'hello world',
}
|
Q:
Implementation of DAO vs JPA
I would like to know the difference between JPA and Hibernate. I have read the very interesting question posted by @Anthony with interest but still I do not understand the full picture.
I have implemented my application in Spring MVC and Hibernate (see below). My DAOs are an implementation of services which have been built using HQL queries.
@Service("messagesService")
public class MessagesService
{
private MessagesDAO messagesDAO;
@Autowired
public void setMessagesDAO(MessagesDAO messagesDAO)
{
this.messagesDAO = messagesDAO;
}
public List<Message> getAllMessages()
{
return messagesDAO.getAllMessages();
}
...
--------
import org.hibernate.Criteria;
import org.hibernate.Query;
import org.hibernate.Session;
import org.hibernate.SessionFactory;
import org.hibernate.criterion.Restrictions;
import org.springframework.stereotype.Component;
import org.springframework.stereotype.Repository;
import org.springframework.transaction.annotation.Transactional;
@Repository
@Transactional
@Component("messagesDAO")
public class MessagesDAO
{
@Autowired
private SessionFactory sessionFactory;
public Session session()
{
return sessionFactory.getCurrentSession();
}
@SuppressWarnings("unchecked")
public List<Message> getAllMessages()
{
Criteria crit = session().createCriteria(Message.class);
crit.createAlias("usernameSender", "u").add(Restrictions.eq("u.enabled",true));
return crit.list();
}
...
I really like the statement "JPA is the dance, Hibernate is the dancer." but in my specific case I do not fully get why my example is not JPA. MessageService is the dance and MessagesDAO the dancer(Implementation).
As @Kevin states:
Think of JPA as the guidelines that must be followed or an interface,
while Hibernate's JPA implementation is code that meets the API as
defined by the JPA specification and provides the under the hood
functionality.
I know I have not defined my service as an interface but this still lets me think that my code complies with the JPA specification requirements.
Now a concern arises
What is the difference between my example and the following from the pet clinic example
package org.springframework.samples.petclinic.repository;
import java.util.List;
import org.springframework.dao.DataAccessException;
import org.springframework.samples.petclinic.model.BaseEntity;
import org.springframework.samples.petclinic.model.Pet;
import org.springframework.samples.petclinic.model.PetType;
public interface PetRepository {
List<PetType> findPetTypes() throws DataAccessException;
-------
@Repository
public class JpaPetRepositoryImpl implements PetRepository {
@PersistenceContext
private EntityManager em;
@Override
@SuppressWarnings("unchecked")
public List<PetType> findPetTypes() {
return this.em.createQuery("SELECT ptype FROM PetType ptype ORDER BY ptype.name").getResultList();
}
The reason why I am asking all this questions is because I am using MySql in my application and I am thinking to change it in the future.
Therefore, I am trying to build my implementation layer to avoid any problem later on.
I was looking at nosql options and I discovered spring data jpa for the integration layer. I then started to learn a bit more about JPA and DAOs and the questions above suddenly arose
If I implement spring data jpa, can I use MySql for the moment and change it later to another database (Cassandra, MongoDb)?
What is the difference between Spring data JPA and Spring Data Mongodb
(The first is the specification and the second one the implementation?)
Thank you for your help
A:
To keep the terminology: In your DAO you can't change your dancing partner.
Why? Because you are referencing Hibernate explicitly. If you would like to change the dancer some day you would have to change your whole implementation. Thats why you usually use only classes of the dance - JPA or Spring Data in your case.
|
3. Hanging Hip Rotations
3. Hang from a chin-up bar or use a dip station. Bring thighs up to parallel, rotate legs to the right with body facing forward, slowly twist to the other side then drop slowly. Repeat for three sets of 20. |
[The economical and political consequences of generative behaviour (author's transl)].
Since safe contraceptives were developed the generative behaviour of man become the most important factor in economic, technological and political progress, previously only war, disease and epidemics were able to check the excess population pressure. The social and political conflicts were ameliorated through these means, temporarily. In the future the methods of contraception will reduce battles for power and priviledges to a human tolerable level. The emancipation of the society from the state appears promising since the development means the critical behaviour and distance from politics. |
Sections of a building collapse into rubble in the Italian town of Norcia on Sunday morning after a 6.6 magnitude earthquake hit the area overnight. The quake was felt in Rome as well as over the border in Croatia and Slovenia. Norcia, which was near the epicentre of the earthquake, saw its basilica destroyed and nuns from a nearby church were forced to scramble to safety |
Transdermal delivery of forskolin from emulsions differing in droplet size.
The skin permeation of forskolin, a diterpene isolated from Coleus forsholii, was studied using oil in water (O/W) emulsions as delivery formulations and also an oil solution for comparative purposes. Two forskolin-loaded emulsions of water/Brij 72:Symperonic A7/Miglyol 812:Isohexadecane, at 0.075 wt% forskolin concentration were prepared with the same composition and only differing in droplet size (0.38 μm and 10 μm). The emulsions showed high kinetic stability at 25 °C. In vitro study of forskolin penetration through human skin was carried out using the MicroettePlus(®) system. The concentration of the active in the receptor solution (i.e. ethanol/phosphate buffer 40/60, v/v) was analyzed by high performance liquid chromatography with UV detection. The obtained results showed that forskolin permeation from the emulsions and the oil solution, through human skin, was very high (up to 72.10%), and no effect of droplet size was observed. |
Powers:Normal human who can turn into a Jack O'Lantern with the help of an unknown demon.
Bio:he was caught by the cops but freed by Norman Osborn who recruited him in his army. It was mentioned he was the brother of one of the previous Jack O'Lanterns, but which one exactly is at this point unknown. |
Release and activation of human neutrophil matrix metallo- and serine proteinases during phagocytosis of Fusobacterium nucleatum, Porphyromonas gingivalis and Treponema denticola.
The phagocytic ingestion of reference strains and clinical isolates of Fusobacterium nucleatum, Porphyromonas gingivalis, and Treponema denticola by polymorphonuclear leukocytes (PMNs) and the concomitant release of PMN granule proteinases were studied by specific functional and immunological assays. PMNs were incubated with the microorganisms anaerobically at 37 degrees C for indicated time periods. The suspensions and pellets were used for phagocytic ingestion assay and electron microscopic study, respectively. The supernatants were used for the measurements of the amounts and activities of the released PMN enzymes including PMN gelatinase (MMP-9), collagenase (MMP-8), serine proteases (elastase and cathepsin G), and lactate dehydrogenase (LDH). Both fluorescence microscopy and transmission electron microscopy showed that F. nucleatum, P. gingivalis and T. denticola were ingested by the PMNs in comparable numbers. However, measurements of the enzymes released from the triggered PMNs revealed major differences among the three species. High amount of elastase was released from the PMNs triggered by F. nucleatum, but not by P. gingivalis or T. denticola. The treatment of PMNs with P. gingivalis whole cells resulted in the release of gelatinase partly in the 82 kD active form, suggesting proteolytic activation of the degranulated 92 kD proMMP-9. The 82 kD active form of gelatinase was not detected upon triggering the PMNs with F. nucleatum and T. denticola. The PMN-bacteria interaction did not result in release of LDH from triggered PMNs indicating the proteinase release was not due to the PMN cell death. The results show that the susceptibilities of the 3 potentially periodontopathogenic microorganisms, F. nucleatum, P. gingivalis and T. denticola to phagocytic ingestion are not directly related to the amounts and activities of PMN enzymes released during the bacteria-PMN interactions. As PMN degranulation is considered as one of the major pathogenic mechanisms in periodontitis, the observed differences among the microorganisms may be important virulence characteristics of these species. |
Q:
How to call a method of a javascript object inside ajax
Given this code,
var submit = {
send:function (form_id) {
var url = $(form_id).attr("action");
$.ajax({
type: "POST",
url: url,
data: $(form_id).serialize(),
dataType: 'json',
success: function(result) {
this.ret(result.message);
},
error: function(result) {
// Some error message
}
});
},
ret:function (result) {
this.result_data = result;
},
result_data:""
};
will send a data from the form to a controller which if will return a json
$result['message'] = validation_errors();
echo json_encode($result);
I try to call this javascript object in this code,
var res = submit.send(form_id);
wherein form_id is the form id, and look for the output using
console.log(res);
In the console, it shows undefined. After searching for an explaination using google and stackoverflow itself I got the idea that,
this.ret(result.message);
is being called inside ajax which is another object, indicating that it's not part of it's method.
My problem is, how to call the method ret() inside ajax?
Is anyone can explain it to me?
A:
There is several ways to deal with it.
One is ES5 compatible (and this is actually quite common pattern):
var submit = {
send: function (form_id) {
var url = $(form_id).attr("action");
var self = this; // << this is binded to self varialble
$.ajax({
type: "POST",
url: url,
data: $(form_id).serialize(),
dataType: 'json',
success: function(result) {
self.ret(result.message); // << replaced this to self so it has all the methods from the submit object.
},
error: function(result) {
// Some error message
}
});
},
ret:function (result) {
this.result_data = result;
},
result_data:""
};
And another is using arrow function from ES2015 plus deferred object returned by $.ajax:
var submit = {
send: function (form_id) {
var url = $(form_id).attr("action");
$.ajax({
type: "POST",
url: url,
data: $(form_id).serialize(),
dataType: 'json'
})
.then((result) => {
this.ret(result.message); // << arrow function is called in context of the parent function, so no needs to change anything.
})
.fail(function(result) {
// Some error message
});
},
ret:function (result) {
this.result_data = result;
},
result_data:""
};
Explanation: context of this in callback function will be bind to global scope not to the object's one. So you need somehow to change it.
You can actually match and mix these two methods.
You can also use bind or put success as a object method. As it mentioned in other answers. Same thing, you want to keep this to be object's context.
There is a good article about this in javascript.
|
Identification and characterization of five new subunits of TRAPP.
TRAPP (transport protein particle), a multiprotein complex containing ten subunits, plays a key role in the late stages of endoplasmic reticulum to Golgi traffic in the yeast Saccharomyces cerevisiae. We previously described the identification of five TRAPP subunits (Bet5p, Trs20p, Bet3p, Trs23p and Trs33p). Now we report the identification of the remaining five subunits (Trs31p, Trs65p, Trs85p, Trs120p and Trs130p) as well as an initial characterization of the yeast complex and its human homologue. We find that three of the subunits are dispensable for growth and a novel sequence motif is found in Bet3p, Trs31p and Trs33p. Furthermore, biochemical characterization of both yeast and human TRAPP suggests that this complex is anchored to a Triton X-100 resistant fraction of the Golgi. Differences between yeast and human TRAPP as well as the relationship of TRAPP subunits to other docking/tethering factors are discussed. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.