text
stringlengths
8
5.77M
Q: Orthogonality of Characters What does it mean for characters to be orthogonal? For example, if we take the following definition of the Orthogonality relation for characters: $$ \sum_{r = 1}^{n}\overline{f}_r(a_i)f_r(a_j) = \begin{cases} n, & \text{if $a_i$ = $a_j$}\\ 0, & \text{if $a_i \neq a_j$} \end{cases} $$ As defined in 6.12 of Apostol's Introduction to Analytic Number Theory. My question is about the syntax $\overline{f}_r(a_i)$. What does character orthogonality actually look like? Or is the definition literally just any function $\overline{f}$ such that it fulfils the above relationship? A: Here $\bar{f}_r(a_i)$ simply denotes the complex conjugate of $f_r(a_i)$. So there is no separate function $\bar{f}$ in this equation; it's just an equation about the functions $f_r$.
Tonny Vilhena Tonny Emilio Trindade de Vilhena (; ; born 3 January 1995), more commonly known as simply Tonny Vilhena, is a Dutch professional footballer who plays for Russian Premier League side FC Krasnodar. Career Feyenoord (2012—2019) Vilhena is a product of the Feyenoord Rotterdam youth academy, joining the club in 2003. His father is from Angola and his mother is from the Netherlands. After nine years in the club's youth ranks, he moved up to join parent-club Feyenoord in January 2012. He made his debut for the Rotterdam-based club on January 23 2012 versus VVV Venlo. He scored his first goal for Feyenoord in the Eredivisie on 25 November 2012 against AZ Alkmaar, a game that finished 2–0. On 3 February 2013, in Feyenoord's 3–1 win against Willem II, he became the youngest player for the club to ever score at least two goals in a single Eredivisie-match; he accomplished this feat at the age of 18 years and 31 days. Vilhena became a first team regular for coach Ronald Koeman during his time at the club, featuring in a then career-high 32 league games including 29 starts in the 2013-14 Eredivisie. On May 2016 Feyenoord announced that Vilhena will not be part of the team due to his high wage demands. However a month later the club announced Vilhena had agreed to a new two-year deal, running until mid-2018.. He would extend it a further two years in the final year of his initial contract, committing to the club until 2020. On April 22, 2018 he played as Feyenoord won the 2018 KNVB Cup Final 3–0 against AZ Alkmaar. FC Krasnodar (2019–) On 20 June 2019, Russian club FC Krasnodar announced that Vilhena signed a long-term contract with the club. International career Vilhena is of partial Angolan descent which made him eligible to play for either Netherlands or Angola national teams per FIFA eligibility rules. Vilhena opted to debut for Netherlands at the senior level. Vilhena has represented the Netherlands up to Under-21 level. He won the 2011 UEFA European Under-17 Football Championship with the Netherlands U-17 team and was also the tournament's joint top scorer with 3 goals. He also won the 2012 UEFA European Under-17 Football Championship after scoring the fifth and final penalty in the penalty shootout against Germany. On 5 February 2013, Vilhena scored a goal in his debut for the Netherlands U-21 side. On 6 March 2013, Vilhena was called up for the preliminary squad of the Dutch national team for the first time, only aged 18. Career statistics Club Honours Club Feyenoord Eredivisie: 2016–17 KNVB Cup: 2015–16, 2017–18 Johan Cruijff Shield: 2017, 2018 International Netherlands UEFA European Under-17 Championship (2): 2011, 2012 References External links Voetbal International profile Category:1995 births Category:Living people Category:Association football midfielders Category:Dutch footballers Category:Feyenoord players Category:FC Krasnodar players Category:Eredivisie players Category:Russian Premier League players Category:Footballers from Maassluis Category:Netherlands youth international footballers Category:Netherlands under-21 international footballers Category:Netherlands international footballers Category:Dutch people of Angolan descent Category:Dutch expatriate footballers Category:Expatriate footballers in Russia
Cats wins six Razzie awards for 'worst films' of the year Cats, based on Andrew Lloyd Webber's hit Broadway musical. (Photo: Supplied) LOS ANGELES: The movie musical Cats on Monday dominated the Razzie Awards for the worst movies of 2019, winning six trophies including worst film, screenplay and director. The results capped a dismal performance for the big screen adaptation of Andrew Lloyd Webber's hit stage show Cats. The movie, with an all-star cast including Judi Dench, Taylor Swift and Idris Elba, who were costumed in digitally-produced fur, was ridiculed by critics and proved a box-office flop, taking in just US$70 million (2.2 billion baht). The tongue-in-cheek Razzies, or Golden Raspberries, were created in 1980 as an antidote to Hollywood's awards season. Nominees were announced in February, a day before the Oscars, the highest honours in the movie industry. Razzie nominees and winners are voted for online by around 1,100 Razzie members from more than two dozen countries, who sign up online and pay a $40 membership fee. The six Razzie awards for Cats included supporting actor wins for James Corden and Rebel Wilson. Tom Hooper was named worst director.
78 Wn.2d 922 (1971) 481 P.2d 1 THE STATE OF WASHINGTON, Respondent, v. GEORGE D. MALONEY, JR., Appellant.[*] No. 40882. The Supreme Court of Washington, En Banc. February 18, 1971. Gordon E. Cornelius, for appellant. Donald C. Brockett and LeRoy C. Kinnie, for respondent. HAMILTON, C.J. Appellant, by jury trial in superior court, was convicted on separate counts of violating RCW 9.87.010(7) and 9.87.010(13),[1] respectively. He was sentenced to pay a fine of $100 on each count, with the fine on the count lodged under RCW 9.87.010(13) suspended. He appeals. The circumstances giving rise to his convictions may be summarized as follows: On February 19, 1968, the Board of Trustees of the Spokane Community College adopted an administrative policy statement relating to the free distribution of handbills, leaflets, and other materials on the college campus by nonstudents and off-campus organizations. This statement required that such distributors register with the Dean of Students, who then would designate areas on the campus where distribution could be made. The next day the policy *924 statement was further implemented by the requirement that all sales of periodicals, magazines, and books on campus be channelled through the college book store. Appellant attended the board of trustees' meeting at which the initial policy statement was announced. On April 17, 1968, appellant entered upon the college campus and commenced to sell a publication entitled "Spokane Natural," characterized in the statement of facts as a "so-called underground newspaper." Appellant was not a student at the school, neither was he otherwise affiliated with the institution. He made no effort whatsoever to comply with the requirements of the policy statement of February 19th or the implementary rule regarding commercial publications. As appellant proceeded with his sales efforts, he was approached by college officials, advised of the school policy requirements, informed he could give away the periodical at designated areas on the campus or that he could sell it on the street, and asked to comply with the college rules. He refused and continued his sales attempts. He was then asked to leave, and, upon his refusal, the police were called. Arrest, charge, and conviction followed. Appellant challenges his convictions under RCW 9.87 .010(7), the "lewd, disorderly or dissolute" provision, and RCW 9.87.010(13), the willful loitering provision of the vagrancy statute. He contends that the respective provisions are unconstitutionally vague, overbroad and inapplicable to his activities on the campus on the day in question. In addition, he questions the sufficiency of the evidence to support a finding of guilt under either provision. [1] In State v. Harlowe, 174 Wash. 227, 24 P.2d 601 (1933), we considered RCW 9.87.010(7), recognized the common and ordinary meaning of the terms employed and held that the provision was not vague and uncertain. Since that time, we have further considered and somewhat limited or narrowed the meaning of the word "disorderly" as used in the context of the provision. In these later decisions we have held that the word, in its context, connotes *925 overt misconduct contrary to the rules of good order and behavior, which is violative of the public peace. Seattle v. Franklin, 191 Wash. 297, 70 P.2d 1049 (1937); State v. Finrow, 66 Wn.2d 818, 405 P.2d 600 (1965); State v. Levin, 67 Wn.2d 988, 410 P.2d 901 (1966). As so construed and applied we can perceive no fatal vagueness. In State v. Oyen, 78 Wn.2d 909, 480 P.2d 766 (1971), we were confronted with and considered contentions of vagueness, overbreadth and inapplicability of RCW 9.87.010(13) as applied to a factual situation analogous to the one existing in this case. Our conclusions were contrary to appellant's contentions here and are dispositive of his arguments with respect thereto as applied to both RCW 9.87.010(7) and 9.87.010(13). We turn to appellant's challenges going to the sufficiency of the evidence to sustain the verdicts of guilt under either of the cited subdivisions of RCW 9.87.010. We are satisfied that within the purport of RCW 9.87 .010(13), as defined in State v. Oyen, supra, the evidence concerning his unauthorized presence and conduct on the campus on the date in question, is sufficient to sustain the verdict under that count of the complaint. On the state of the record before us, however, we cannot say the same with respect to the count lodged under RCW 9.87.010(7), considering the interpretation and application given to the term "disorderly" in our prior decisions. [2] There is no evidence that appellant in undertaking to sell the periodical, Spokane Natural, on the campus was loud, boisterous or tumultuous. Neither is there any indication in the record that his confrontation with the school authorities or the police was blatant, vociferous, or belligerent. In fact, one of the school officials involved testified that he was courteous and polite. For the most part classes were in session, and the testimony reveals that, except for some momentary and limited student curiosity generated by the assemblage of appellant, the school officials and the police on the campus, the peace and order of the educational process was not otherwise disturbed. Under these circumstances, *926 we do not deem that appellant's behavior can fairly or properly be characterized as overt misconduct violative of the public peace within the contemplation of RCW 9.87.010(7). Cf. State v. Levin, supra. [3] In addition, although the point has not been raised on this appeal, we are dubious of the propriety of the state erecting two counts of vagrancy and seeking to exact two penalties predicated upon identical and indivisible circumstances and events occurring at the same time and place. RCW 9.87.010 contains 13 subdivisions each defining a course of conduct which may constitute one a vagrant. Certainly it is conceivable that a person may become a vagrant by breaching two or more of the subdivisions at one and the same time, but we are not inclined to the view that it necessarily follows that one cooperative indivisible act or transaction gives rise and permits multiple counts, convictions, and penalties predicated upon the single indivisible act or transaction. Cf. People v. Roberts, 40 Cal.2d 483, 254 P.2d 501 (1953); People v. Fowler, 1 Cal.3d 335, 82 Cal. Rptr. 363, 461 P.2d 643 (1969); see, Larceny — Identity of offenses, Annot., 28 A.L.R.2d 1182 (1953). We sustain appellant's challenge to the sufficiency of the evidence to support his conviction on the count of the complaint charging a violation of RCW 9.87.010(7). The conviction and sentence under that provision is, therefore, set aside. At the commencement of trial in the superior court, which came there for trial de novo on appeal from municipal court, appellant requested that he be entitled to waive trial by jury. In support of his request, he asserted that because of certain publicity relating to the Spokane Natural adverse feeling existed in the community which would preclude selection of an unprejudiced and impartial jury. The trial court denied appellant's request. Appellant assigns error to this action of the trial court. We do not have the voir dire examination of the jury before us, or any data bearing upon appellant's claim that a fair and impartial jury could not be obtained. Consequently, *927 we are unable to intelligently evaluate any claim of prejudice accruing to appellant as a result of the denial of his request for a nonjury trial. RCW 10.01.060 provides, in pertinent part: [E]xcept in capital cases, where the person informed against or indicted for a crime is represented by counsel, such person may, with the assent of the court, waive trial by jury and submit to trial by the court. [4, 5] We have held, in State v. Jones, 70 Wn.2d 591, 424 P.2d 665 (1967), that this statute, at least insofar as serious offenses be concerned, invests the trial court with discretion in ruling upon a defendant's request for a nonjury trial, and that an appellate court will not disturb a trial court's refusal of such a request absent a showing that the trial court manifestly abused its discretion. The United States Supreme Court, in Singer v. United States, 380 U.S. 24, 13 L.Ed.2d 630, 85 S.Ct. 783 (1965), also considered a defendant's contention that the right to waive a jury trial, as set forth in Rule 23 (a) of the Federal Rules of Criminal Procedure (8 J. Moore, Federal Practice (2d ed. 1968)),[2] could not be conditioned upon the assent of the trial court or the prosecuting attorney. In rejecting this contention, the court stated, at page 36: In light of the Constitution's emphasis on jury trial, we find it difficult to understand how the petitioner can submit the bald proposition that to compel a defendant in a criminal case to undergo a jury trial against his will is contrary to his right to a fair trial or to due process. A defendant's only constitutional right concerning the method of trial is to an impartial trial by jury. We find no constitutional impediment to conditioning a waiver of this right on the consent of the prosecuting attorney and the trial judge when, if either refuses to consent, the result is simply that the defendant is subject to an impartial trial by jury — the very thing that the Constitution guarantees him. *928 There being no showing whatsoever that appellant was prejudiced in any manner in having his cause heard before a jury, nor any indication that the trial court manifestly and untenably abused its discretion in denying his request for a nonjury trial, we find no reversible error on this score. Lastly, appellant contends that the policy statement of the Board of Trustees of the Spokane Community College with respect to the distribution of free and commercial periodicals on the campus lacks any efficacy because the board of trustees, in promulgating and adopting the administrative policy measure, failed to comply with the procedural requirements of RCW 34.04, the Administrative Procedure Act, and more particularly the notice requirements of RCW 34.04.025 and 34.04.027.[3] [6] We do not reach and pass upon the merits of this contention. Appellant did not raise this issue in the trial court. He advances it for the first time on appeal. Assuming arguendo that the Administrative Procedure Act is applicable to the board of trustees of a community college in establishing administrative policy and practices with respect to nonschool related activities in and about the college, we would have to speculate as to the procedures followed in the promulgation of the challenged measure in the instant case, for no evidence or testimony concerning compliance *929 or noncompliance with the Administrative Procedure Act was adduced at the trial. We have often stated that issues not put forth at the trial level will not be considered for the first time on appeal. State v. Ashby, 77 Wn.2d 33, 459 P.2d 403 (1969); State v. Bullock, 71 Wn.2d 886, 431 P.2d 195 (1967); State v. Garrison, 71 Wn.2d 312, 427 P.2d 1012 (1967). The judgment and sentence as to the breach of RCW 9.87.010(13) is affirmed. The judgment and sentence with respect to a breach of RCW 9.87.010(7) is reversed. FINLEY, ROSELLINI, HUNTER, HALE, McGOVERN, and STAFFORD, JJ., and HILL, J. Pro Tem., concur. NOTES [*] Reported in 481 P.2d 1. [1] RCW 9.87.010 in pertinent part provides: "Every — "... "(7) Lewd, disorderly or dissolute person; or, "... "(13) Person, except a person enrolled as a student in or parents or guardians of such students or person employed by such school or institution, who without a lawful purpose therefor wilfully loiters about the building or buildings of any public or private school or institution of higher learning or the public premises adjacent thereto — "Is a vagrant, ..." [2] Rule 23(a) of the Federal Rules of Criminal Procedure (8 J. Moore, Federal Practice (2d ed. 1968)) provides: "(a) Trial by Jury. Cases required to be tried by jury shall be so tried unless the defendant waives a jury trial in writing with the approval of the court and the consent of the government." [3] In pertinent part RCW 34.04.025 provides: "(1) Prior to the adoption, amendment or repeal of any rule, each agency shall: "(a) Give at least twenty days notice of its intended action by filing the notice with the code reviser, mailing the notice to all persons who have made timely request of the agency for advance notice of its rule-making proceedings, and giving public notice as provided in RCW 42.32 .010, ... "... "(2) No rule hereafter adopted is valid unless adopted in substantial compliance with this section, ..." RCW 34.04.027 provides: "When twenty days notice of intended action to adopt, amend or repeal a rule has not been filed with the code reviser, as required in RCW 34.04.025, the code reviser shall not publish such rule and such rule shall not be effective for any purpose."
bsmphilly.com Topics: jose gomez-lopezhttp://www.bsmphilly.com/topics/jose-gomez-lopez/?utm_medium=RSS2013-09-18T20:35:31+00:00Bell’s Corner raid nets 360 grams of heroin2013-09-18T20:35:31+00:00William Kennyhttp://www.bsmphilly.com/2013/sep/18/bells-corner-raid-nets-360-grams-heroin2/?utm_source=RSS_Feed&utm_medium=RSS<p>Philadelphia police and FBI agents arrested four men during the raid of an alleged heroin packaging operation inside a Bell&rsquo;s Corner apartment on Sept. 12.</p> <p>The raid occurred inside an apartment building at 1822 Benton St. and resulted in the confiscation of 360 grams of heroin with a &ldquo;street value&rdquo; ...
/* * Copyright 2013-2019 consulo.io * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package consulo.ui.web.internal; import consulo.localize.LocalizeValue; import javax.annotation.Nonnull; /** * @author VISTALL * @since 2019-02-19 */ public class WebLabelImpl extends WebLabelBase<WebLabelImpl.Vaadin> { public static class Vaadin extends VaadinLabelComponentBase { } public WebLabelImpl(LocalizeValue text) { super(text); } @Nonnull @Override public Vaadin createVaadinComponent() { return new Vaadin(); } }
GREEN BAY — A good keepsake from a bad situation inspired a Notre Dame Academy student to give back to others. Sophomore Sydney Ditscheit recently led an effort to make 55 tie fleece blankets for American Family Children’s Hospital in Madison, where she was a patient less than two years ago. Volunteers work on a Star Wars tie fleece blanket Jan. 24 at the Notre Dame Academy library. Dozens of volunteers, led by NDA sophomore Sydney Ditscheit, made 55 tie fleece blankets for American Family Children’s Hospital in Madison. (Sam Lucero | The Compass) “When I was there, I received a blanket,” said Ditscheit, a member of St. Elizabeth Ann Seton Parish in Green Bay. “A while later, I was trying to think with my friends how I could help my community. I saw my blanket and thought that maybe we could get something together, to organize something and donate more blankets.” Ditscheit was airlifted to the hospital following a UTV (utility terrain vehicle) accident in 2016. She was hospitalized for three days, including a night in the intensive care unit. “It was pretty scary. It happened at our cabin,” said Dan Ditscheit, Sydney’s father. “They hit a tree with the UTV. She was in and out, in and out. Paramedics came and really didn’t know what was going on, so they called for Flight for Life.” Sydney was diagnosed with a severe concussion. Her younger sister, Riley, broke her arm in the accident. “I don’t remember any of it,” said Sydney. “I don’t remember the hospital.” Raising money for blanket fabric was the first task of the service project. Sydney and her friends held a fundraiser at Notre Dame. She also received a $500 grant from Youth Service America and the Walt Disney Company. Sydney Ditscheit, a sophomore at Notre Dame Academy in Green Bay, is assisted by her father, Dan, as she works on a tie fleece blanket Jan. 24 at the Catholic high school library. Sydney received a $500 grant to purchase material to make 55 blankets for American Family Children’s Hospital in Madison. (Sam Lucero | The Compass) “I found it online. You could apply online,” said Sydney “It’s given (annually) to 1,000 teenagers and kids in the U.S. It was about a month and half from the time I submitted my application to the email informing me that I received it. I was very surprised and overjoyed when I got it. That bought all the blankets, some extra scissors and ribbon.” Sydney had previously made a couple of tie fleece blankets with her mother Kayt. She found plenty of volunteers for her project. “I sent out information to all the GRACE (Green Bay Area Catholic Education) schools. They all put something in the newsletter or hung up posters,” she explained. “I am a part of ASTRA (Ability, Service, Training, Responsibility and Achievement), the service club at school. I made this into an ASTRA event.” Volunteers, led by Sydney, cut and tied fleece blankets after school on Jan. 24 and 25 at Notre Dame Academy. Handmade cards were created and attached to the blankets. “I definitely learned the importance of service and community,” said Sydney. “If I had one without the other, this wouldn’t have happened. I couldn’t have done this by myself. I definitely needed everyone’s help. Without people putting their hearts into it, we couldn’t get this done. “It’s fun with friends,” she added. “It’s like an arts and crafts project with your friends.” The blankets were delivered to American Family Children’s Hospital on Saturday, Jan. 27. The trip was Sydney’s first to the hospital since the accident. “It’s sentimental,” she said. “I also know family friends who have spent time there so that adds another level.” Sydney, who is a member of the cross country and track and field teams at Notre Dame, has provided outreach through ASTRA, including volunteering at the Children’s Museum of Green Bay and for Prevea events. She has also assisted Bright Young Dyslexics, an organization co-founded by her friend and classmate Caragan Olles. The blanket project was her first in a leadership role. “I’ve definitely stepped up and learned a lot about directing people, but not taking control,” said Sydney. “I want to keep this going; maybe have similar events and donate more blankets or other things to the hospital.”
<?xml version="1.0" encoding="UTF-8" standalone="no"?> <process version="5.0"> <context> <input/> <output/> <macros/> </context> <operator activated="true" class="process" expanded="true" name="Root"> <description>The most simple way to determine attribute weights is to use one of the attribute weighting schemes provided by RapidMiner. Please note that not all weighting schemes can be used for all data sets, some rely on specific conditions as a classification label or numerical feature values.</description> <parameter key="logverbosity" value="3"/> <parameter key="random_seed" value="2001"/> <parameter key="send_mail" value="1"/> <parameter key="process_duration_for_mail" value="30"/> <parameter key="encoding" value="SYSTEM"/> <process expanded="true" height="604" width="846"> <operator activated="true" class="generate_data" expanded="true" height="60" name="ExampleSetGenerator" width="90" x="45" y="30"> <parameter key="target_function" value="polynomial classification"/> <parameter key="number_examples" value="1000"/> <parameter key="number_of_attributes" value="10"/> <parameter key="attributes_lower_bound" value="-10.0"/> <parameter key="attributes_upper_bound" value="10.0"/> <parameter key="use_local_random_seed" value="false"/> <parameter key="local_random_seed" value="1992"/> <parameter key="datamanagement" value="0"/> </operator> <operator activated="true" class="weight_by_chi_squared_statistic" expanded="true" height="76" name="ChiSquaredWeighting" width="90" x="179" y="30"> <parameter key="normalize_weights" value="true"/> <parameter key="number_of_bins" value="10"/> </operator> <connect from_op="ExampleSetGenerator" from_port="output" to_op="ChiSquaredWeighting" to_port="example set"/> <connect from_op="ChiSquaredWeighting" from_port="weights" to_port="result 1"/> <connect from_op="ChiSquaredWeighting" from_port="example set" to_port="result 2"/> <portSpacing port="source_input 1" spacing="0"/> <portSpacing port="sink_result 1" spacing="0"/> <portSpacing port="sink_result 2" spacing="0"/> <portSpacing port="sink_result 3" spacing="0"/> </process> </operator> </process>
A cross between our own Afghan Kush, a 100% indica strain which comes from kush strains grown in a small area of northern Afghanistan in the Hindu Kush mountain range, and a stabilised White Widow hybrid, which is a cross between Indian and Brazilian genetics, White Widow dominated the worldwide cannabis scene for more than 10 years. Afghan Kush x White Widow is a compact, medium-sized plant that produces a copious amount of highly therapeutic trichomes that give off a unique aroma of forest fruits. While White Widow is, in herself, a blessing for her therapeutic benefits, blending her with Afghan Kush makes her highly recommended for medicinal applications.
Syfy's 'Helix' renewed for second season Syfy announced on Friday that freshman thriller Helix has been renewed for a second season. The show premiered on Jan. 10 and has done well for Syfy on Friday nights. Helix is the top scripted drama on cable in its timeslot. The series averages 2.1 million viewers, with 1.1 million in the 25-54 adult demographic and 1 million in the advertiser important 18-49 demo. "Helix has built one of our most loyal and consistent audiences in its first season on Syfy," Bill McGoldrick, executive vp original programming, said. "The incredibly talented writing and producing team have crafted a thriller that consistently delivered suspense, twists and high quality drama." Helix followed a team of scientists from the CDC who were tasked with investigating a mysterious breakout at a remote base in the Arctic. Billy Campbell, Hiroyuki Sanada, Kyra Zagorsky and Mark Ghanime starred. The series was executive produced by showrunner Steven Maeda, Ronald D. Moore and Lynda Obst. Production on the second season is set to begin later in 2014 and the series will likely return at the end of 2015. The first season ends its run on Friday.
Expanded Homicide Data Download Printable Document The FBI’s Uniform Crime Reporting (UCR) Program collects supplementary homicide data that provide the age, sex, and race of the murder victim and offender; the type of weapon used; the relationship of the victim to the offender; and the circumstance surrounding the incident. Statistics gleaned from these supplemental data are provided in this section. This section also includes information about justifiable homicide—certain willful killings that must be reported as justifiable or excusable. In the UCR Program, justifiable homicide is defined as and limited to: The killing of a felon by a peace officer in the line of duty. The killing of a felon, during the commission of a felony, by a private citizen. Because these killings are determined through law enforcement investigation to be justifiable, they are tabulated separately from murder and nonnegligent manslaughter. Justifiable homicide information can be found in Expanded Homicide Data Table 14, “Justifiable Homicide, by Weapon, Law Enforcement, 2009–2013” and Expanded Homicide Data Table 15, “Justifiable Homicide, by Weapon, Private Citizen, 2009–2013.” Overview
Q: Shortcode is not returned correctly I've created a shortcode that should be showing an image depending on the day of the week. function custom_shortcode() { return '<img src="/wp-content/themes/coworker/images/daily-social-image-' . the_weekday() . '.gif" width="100%" />'; } add_shortcode( 'weekday', 'custom_shortcode' ); The issue being that the function the_weekday() is not working - the rest of the code appears to be working correctly. A: You should not echo any content in your shortcode. the_weekday() function echos the date. You can use output buffering or directly get the date: Output buffering: function custom_shortcode() { ob_start(); the_weekday(); $week = ob_get_contents(); ob_end_clean(); return '<img src="/wp-content/themes/coworker/images/daily-social-image-' . $week . '.gif" width="100%" />'; } add_shortcode( 'weekday', 'custom_shortcode' ); Or use the global $wp_locale to filter the post's date: By using globals: This is the way the original function gets its contents: function custom_shortcode() { global $wp_locale; $weekday = $wp_locale->get_weekday( mysql2date( 'w', get_post()->post_date, false ) ); $week = apply_filters( 'the_weekday', $weekday ); return '<img src="/wp-content/themes/coworker/images/daily-social-image-' . $week . '.gif" width="100%" />'; } add_shortcode( 'weekday', 'custom_shortcode' );
# CMAKE generated file: DO NOT EDIT! # Generated by "Unix Makefiles" Generator, CMake Version 2.8 # Default target executed when no arguments are given to make. default_target: all .PHONY : default_target #============================================================================= # Special targets provided by cmake. # Disable implicit rules so canonical targets will work. .SUFFIXES: # Remove some rules from gmake that .SUFFIXES does not remove. SUFFIXES = .SUFFIXES: .hpux_make_needs_suffix_list # Suppress display of executed commands. $(VERBOSE).SILENT: # A target that is always out of date. cmake_force: .PHONY : cmake_force #============================================================================= # Set environment variables for the build. # The shell in which to execute make rules. SHELL = /bin/sh # The CMake executable. CMAKE_COMMAND = /usr/bin/cmake # The command to remove a file. RM = /usr/bin/cmake -E remove -f # Escaping for special characters. EQUALS = = # The top-level source directory on which CMake was run. CMAKE_SOURCE_DIR = /home/ewenwan/ewenwan/catkin_ws/src # The top-level build directory on which CMake was run. CMAKE_BINARY_DIR = /home/ewenwan/ewenwan/catkin_ws/build #============================================================================= # Targets provided globally by CMake. # Special rule for the target edit_cache edit_cache: @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Running interactive CMake command-line interface..." /usr/bin/cmake -i . .PHONY : edit_cache # Special rule for the target edit_cache edit_cache/fast: edit_cache .PHONY : edit_cache/fast # Special rule for the target install install: preinstall @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Install the project..." /usr/bin/cmake -P cmake_install.cmake .PHONY : install # Special rule for the target install install/fast: preinstall/fast @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Install the project..." /usr/bin/cmake -P cmake_install.cmake .PHONY : install/fast # Special rule for the target install/local install/local: preinstall @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Installing only the local directory..." /usr/bin/cmake -DCMAKE_INSTALL_LOCAL_ONLY=1 -P cmake_install.cmake .PHONY : install/local # Special rule for the target install/local install/local/fast: install/local .PHONY : install/local/fast # Special rule for the target install/strip install/strip: preinstall @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Installing the project stripped..." /usr/bin/cmake -DCMAKE_INSTALL_DO_STRIP=1 -P cmake_install.cmake .PHONY : install/strip # Special rule for the target install/strip install/strip/fast: install/strip .PHONY : install/strip/fast # Special rule for the target list_install_components list_install_components: @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Available install components are: \"Unspecified\"" .PHONY : list_install_components # Special rule for the target list_install_components list_install_components/fast: list_install_components .PHONY : list_install_components/fast # Special rule for the target rebuild_cache rebuild_cache: @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Running CMake to regenerate build system..." /usr/bin/cmake -H$(CMAKE_SOURCE_DIR) -B$(CMAKE_BINARY_DIR) .PHONY : rebuild_cache # Special rule for the target rebuild_cache rebuild_cache/fast: rebuild_cache .PHONY : rebuild_cache/fast # Special rule for the target test test: @$(CMAKE_COMMAND) -E cmake_echo_color --switch=$(COLOR) --cyan "Running tests..." /usr/bin/ctest --force-new-ctest-process $(ARGS) .PHONY : test # Special rule for the target test test/fast: test .PHONY : test/fast # The main all target all: cmake_check_build_system cd /home/ewenwan/ewenwan/catkin_ws/build && $(CMAKE_COMMAND) -E cmake_progress_start /home/ewenwan/ewenwan/catkin_ws/build/CMakeFiles /home/ewenwan/ewenwan/catkin_ws/build/lsd_slam/lsd_slam_core/CMakeFiles/progress.marks cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/all $(CMAKE_COMMAND) -E cmake_progress_start /home/ewenwan/ewenwan/catkin_ws/build/CMakeFiles 0 .PHONY : all # The main clean target clean: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/clean .PHONY : clean # The main clean target clean/fast: clean .PHONY : clean/fast # Prepare targets for installation. preinstall: all cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/preinstall .PHONY : preinstall # Prepare targets for installation. preinstall/fast: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/preinstall .PHONY : preinstall/fast # clear depends depend: cd /home/ewenwan/ewenwan/catkin_ws/build && $(CMAKE_COMMAND) -H$(CMAKE_SOURCE_DIR) -B$(CMAKE_BINARY_DIR) --check-build-system CMakeFiles/Makefile.cmake 1 .PHONY : depend # Convenience name for target. lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/rule: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/rule .PHONY : lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/rule # Convenience name for target. dataset: lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/rule .PHONY : dataset # fast build rule for target. dataset/fast: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/build .PHONY : dataset/fast # Convenience name for target. lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/rule: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/rule .PHONY : lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/rule # Convenience name for target. live_slam: lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/rule .PHONY : live_slam # fast build rule for target. live_slam/fast: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/build .PHONY : live_slam/fast # Convenience name for target. lsd_slam/lsd_slam_core/CMakeFiles/lsd_slam_core_gencfg.dir/rule: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/CMakeFiles/lsd_slam_core_gencfg.dir/rule .PHONY : lsd_slam/lsd_slam_core/CMakeFiles/lsd_slam_core_gencfg.dir/rule # Convenience name for target. lsd_slam_core_gencfg: lsd_slam/lsd_slam_core/CMakeFiles/lsd_slam_core_gencfg.dir/rule .PHONY : lsd_slam_core_gencfg # fast build rule for target. lsd_slam_core_gencfg/fast: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsd_slam_core_gencfg.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsd_slam_core_gencfg.dir/build .PHONY : lsd_slam_core_gencfg/fast # Convenience name for target. lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/rule: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f CMakeFiles/Makefile2 lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/rule .PHONY : lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/rule # Convenience name for target. lsdslam: lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/rule .PHONY : lsdslam # fast build rule for target. lsdslam/fast: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build .PHONY : lsdslam/fast src/DataStructures/Frame.o: src/DataStructures/Frame.cpp.o .PHONY : src/DataStructures/Frame.o # target to build an object file src/DataStructures/Frame.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/Frame.cpp.o .PHONY : src/DataStructures/Frame.cpp.o src/DataStructures/Frame.i: src/DataStructures/Frame.cpp.i .PHONY : src/DataStructures/Frame.i # target to preprocess a source file src/DataStructures/Frame.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/Frame.cpp.i .PHONY : src/DataStructures/Frame.cpp.i src/DataStructures/Frame.s: src/DataStructures/Frame.cpp.s .PHONY : src/DataStructures/Frame.s # target to generate assembly for a file src/DataStructures/Frame.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/Frame.cpp.s .PHONY : src/DataStructures/Frame.cpp.s src/DataStructures/FrameMemory.o: src/DataStructures/FrameMemory.cpp.o .PHONY : src/DataStructures/FrameMemory.o # target to build an object file src/DataStructures/FrameMemory.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/FrameMemory.cpp.o .PHONY : src/DataStructures/FrameMemory.cpp.o src/DataStructures/FrameMemory.i: src/DataStructures/FrameMemory.cpp.i .PHONY : src/DataStructures/FrameMemory.i # target to preprocess a source file src/DataStructures/FrameMemory.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/FrameMemory.cpp.i .PHONY : src/DataStructures/FrameMemory.cpp.i src/DataStructures/FrameMemory.s: src/DataStructures/FrameMemory.cpp.s .PHONY : src/DataStructures/FrameMemory.s # target to generate assembly for a file src/DataStructures/FrameMemory.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/FrameMemory.cpp.s .PHONY : src/DataStructures/FrameMemory.cpp.s src/DataStructures/FramePoseStruct.o: src/DataStructures/FramePoseStruct.cpp.o .PHONY : src/DataStructures/FramePoseStruct.o # target to build an object file src/DataStructures/FramePoseStruct.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/FramePoseStruct.cpp.o .PHONY : src/DataStructures/FramePoseStruct.cpp.o src/DataStructures/FramePoseStruct.i: src/DataStructures/FramePoseStruct.cpp.i .PHONY : src/DataStructures/FramePoseStruct.i # target to preprocess a source file src/DataStructures/FramePoseStruct.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/FramePoseStruct.cpp.i .PHONY : src/DataStructures/FramePoseStruct.cpp.i src/DataStructures/FramePoseStruct.s: src/DataStructures/FramePoseStruct.cpp.s .PHONY : src/DataStructures/FramePoseStruct.s # target to generate assembly for a file src/DataStructures/FramePoseStruct.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DataStructures/FramePoseStruct.cpp.s .PHONY : src/DataStructures/FramePoseStruct.cpp.s src/DepthEstimation/DepthMap.o: src/DepthEstimation/DepthMap.cpp.o .PHONY : src/DepthEstimation/DepthMap.o # target to build an object file src/DepthEstimation/DepthMap.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DepthEstimation/DepthMap.cpp.o .PHONY : src/DepthEstimation/DepthMap.cpp.o src/DepthEstimation/DepthMap.i: src/DepthEstimation/DepthMap.cpp.i .PHONY : src/DepthEstimation/DepthMap.i # target to preprocess a source file src/DepthEstimation/DepthMap.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DepthEstimation/DepthMap.cpp.i .PHONY : src/DepthEstimation/DepthMap.cpp.i src/DepthEstimation/DepthMap.s: src/DepthEstimation/DepthMap.cpp.s .PHONY : src/DepthEstimation/DepthMap.s # target to generate assembly for a file src/DepthEstimation/DepthMap.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DepthEstimation/DepthMap.cpp.s .PHONY : src/DepthEstimation/DepthMap.cpp.s src/DepthEstimation/DepthMapPixelHypothesis.o: src/DepthEstimation/DepthMapPixelHypothesis.cpp.o .PHONY : src/DepthEstimation/DepthMapPixelHypothesis.o # target to build an object file src/DepthEstimation/DepthMapPixelHypothesis.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DepthEstimation/DepthMapPixelHypothesis.cpp.o .PHONY : src/DepthEstimation/DepthMapPixelHypothesis.cpp.o src/DepthEstimation/DepthMapPixelHypothesis.i: src/DepthEstimation/DepthMapPixelHypothesis.cpp.i .PHONY : src/DepthEstimation/DepthMapPixelHypothesis.i # target to preprocess a source file src/DepthEstimation/DepthMapPixelHypothesis.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DepthEstimation/DepthMapPixelHypothesis.cpp.i .PHONY : src/DepthEstimation/DepthMapPixelHypothesis.cpp.i src/DepthEstimation/DepthMapPixelHypothesis.s: src/DepthEstimation/DepthMapPixelHypothesis.cpp.s .PHONY : src/DepthEstimation/DepthMapPixelHypothesis.s # target to generate assembly for a file src/DepthEstimation/DepthMapPixelHypothesis.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/DepthEstimation/DepthMapPixelHypothesis.cpp.s .PHONY : src/DepthEstimation/DepthMapPixelHypothesis.cpp.s src/GlobalMapping/FabMap.o: src/GlobalMapping/FabMap.cpp.o .PHONY : src/GlobalMapping/FabMap.o # target to build an object file src/GlobalMapping/FabMap.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/FabMap.cpp.o .PHONY : src/GlobalMapping/FabMap.cpp.o src/GlobalMapping/FabMap.i: src/GlobalMapping/FabMap.cpp.i .PHONY : src/GlobalMapping/FabMap.i # target to preprocess a source file src/GlobalMapping/FabMap.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/FabMap.cpp.i .PHONY : src/GlobalMapping/FabMap.cpp.i src/GlobalMapping/FabMap.s: src/GlobalMapping/FabMap.cpp.s .PHONY : src/GlobalMapping/FabMap.s # target to generate assembly for a file src/GlobalMapping/FabMap.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/FabMap.cpp.s .PHONY : src/GlobalMapping/FabMap.cpp.s src/GlobalMapping/KeyFrameGraph.o: src/GlobalMapping/KeyFrameGraph.cpp.o .PHONY : src/GlobalMapping/KeyFrameGraph.o # target to build an object file src/GlobalMapping/KeyFrameGraph.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/KeyFrameGraph.cpp.o .PHONY : src/GlobalMapping/KeyFrameGraph.cpp.o src/GlobalMapping/KeyFrameGraph.i: src/GlobalMapping/KeyFrameGraph.cpp.i .PHONY : src/GlobalMapping/KeyFrameGraph.i # target to preprocess a source file src/GlobalMapping/KeyFrameGraph.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/KeyFrameGraph.cpp.i .PHONY : src/GlobalMapping/KeyFrameGraph.cpp.i src/GlobalMapping/KeyFrameGraph.s: src/GlobalMapping/KeyFrameGraph.cpp.s .PHONY : src/GlobalMapping/KeyFrameGraph.s # target to generate assembly for a file src/GlobalMapping/KeyFrameGraph.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/KeyFrameGraph.cpp.s .PHONY : src/GlobalMapping/KeyFrameGraph.cpp.s src/GlobalMapping/TrackableKeyFrameSearch.o: src/GlobalMapping/TrackableKeyFrameSearch.cpp.o .PHONY : src/GlobalMapping/TrackableKeyFrameSearch.o # target to build an object file src/GlobalMapping/TrackableKeyFrameSearch.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/TrackableKeyFrameSearch.cpp.o .PHONY : src/GlobalMapping/TrackableKeyFrameSearch.cpp.o src/GlobalMapping/TrackableKeyFrameSearch.i: src/GlobalMapping/TrackableKeyFrameSearch.cpp.i .PHONY : src/GlobalMapping/TrackableKeyFrameSearch.i # target to preprocess a source file src/GlobalMapping/TrackableKeyFrameSearch.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/TrackableKeyFrameSearch.cpp.i .PHONY : src/GlobalMapping/TrackableKeyFrameSearch.cpp.i src/GlobalMapping/TrackableKeyFrameSearch.s: src/GlobalMapping/TrackableKeyFrameSearch.cpp.s .PHONY : src/GlobalMapping/TrackableKeyFrameSearch.s # target to generate assembly for a file src/GlobalMapping/TrackableKeyFrameSearch.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/TrackableKeyFrameSearch.cpp.s .PHONY : src/GlobalMapping/TrackableKeyFrameSearch.cpp.s src/GlobalMapping/g2oTypeSim3Sophus.o: src/GlobalMapping/g2oTypeSim3Sophus.cpp.o .PHONY : src/GlobalMapping/g2oTypeSim3Sophus.o # target to build an object file src/GlobalMapping/g2oTypeSim3Sophus.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/g2oTypeSim3Sophus.cpp.o .PHONY : src/GlobalMapping/g2oTypeSim3Sophus.cpp.o src/GlobalMapping/g2oTypeSim3Sophus.i: src/GlobalMapping/g2oTypeSim3Sophus.cpp.i .PHONY : src/GlobalMapping/g2oTypeSim3Sophus.i # target to preprocess a source file src/GlobalMapping/g2oTypeSim3Sophus.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/g2oTypeSim3Sophus.cpp.i .PHONY : src/GlobalMapping/g2oTypeSim3Sophus.cpp.i src/GlobalMapping/g2oTypeSim3Sophus.s: src/GlobalMapping/g2oTypeSim3Sophus.cpp.s .PHONY : src/GlobalMapping/g2oTypeSim3Sophus.s # target to generate assembly for a file src/GlobalMapping/g2oTypeSim3Sophus.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/GlobalMapping/g2oTypeSim3Sophus.cpp.s .PHONY : src/GlobalMapping/g2oTypeSim3Sophus.cpp.s src/IOWrapper/OpenCV/ImageDisplay_OpenCV.o: src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.o .PHONY : src/IOWrapper/OpenCV/ImageDisplay_OpenCV.o # target to build an object file src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.o .PHONY : src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.o src/IOWrapper/OpenCV/ImageDisplay_OpenCV.i: src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.i .PHONY : src/IOWrapper/OpenCV/ImageDisplay_OpenCV.i # target to preprocess a source file src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.i .PHONY : src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.i src/IOWrapper/OpenCV/ImageDisplay_OpenCV.s: src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.s .PHONY : src/IOWrapper/OpenCV/ImageDisplay_OpenCV.s # target to generate assembly for a file src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.s .PHONY : src/IOWrapper/OpenCV/ImageDisplay_OpenCV.cpp.s src/IOWrapper/ROS/ROSImageStreamThread.o: src/IOWrapper/ROS/ROSImageStreamThread.cpp.o .PHONY : src/IOWrapper/ROS/ROSImageStreamThread.o # target to build an object file src/IOWrapper/ROS/ROSImageStreamThread.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/ROS/ROSImageStreamThread.cpp.o .PHONY : src/IOWrapper/ROS/ROSImageStreamThread.cpp.o src/IOWrapper/ROS/ROSImageStreamThread.i: src/IOWrapper/ROS/ROSImageStreamThread.cpp.i .PHONY : src/IOWrapper/ROS/ROSImageStreamThread.i # target to preprocess a source file src/IOWrapper/ROS/ROSImageStreamThread.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/ROS/ROSImageStreamThread.cpp.i .PHONY : src/IOWrapper/ROS/ROSImageStreamThread.cpp.i src/IOWrapper/ROS/ROSImageStreamThread.s: src/IOWrapper/ROS/ROSImageStreamThread.cpp.s .PHONY : src/IOWrapper/ROS/ROSImageStreamThread.s # target to generate assembly for a file src/IOWrapper/ROS/ROSImageStreamThread.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/ROS/ROSImageStreamThread.cpp.s .PHONY : src/IOWrapper/ROS/ROSImageStreamThread.cpp.s src/IOWrapper/ROS/ROSOutput3DWrapper.o: src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.o .PHONY : src/IOWrapper/ROS/ROSOutput3DWrapper.o # target to build an object file src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.o .PHONY : src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.o src/IOWrapper/ROS/ROSOutput3DWrapper.i: src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.i .PHONY : src/IOWrapper/ROS/ROSOutput3DWrapper.i # target to preprocess a source file src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.i .PHONY : src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.i src/IOWrapper/ROS/ROSOutput3DWrapper.s: src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.s .PHONY : src/IOWrapper/ROS/ROSOutput3DWrapper.s # target to generate assembly for a file src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.s .PHONY : src/IOWrapper/ROS/ROSOutput3DWrapper.cpp.s src/IOWrapper/Timestamp.o: src/IOWrapper/Timestamp.cpp.o .PHONY : src/IOWrapper/Timestamp.o # target to build an object file src/IOWrapper/Timestamp.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/Timestamp.cpp.o .PHONY : src/IOWrapper/Timestamp.cpp.o src/IOWrapper/Timestamp.i: src/IOWrapper/Timestamp.cpp.i .PHONY : src/IOWrapper/Timestamp.i # target to preprocess a source file src/IOWrapper/Timestamp.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/Timestamp.cpp.i .PHONY : src/IOWrapper/Timestamp.cpp.i src/IOWrapper/Timestamp.s: src/IOWrapper/Timestamp.cpp.s .PHONY : src/IOWrapper/Timestamp.s # target to generate assembly for a file src/IOWrapper/Timestamp.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/IOWrapper/Timestamp.cpp.s .PHONY : src/IOWrapper/Timestamp.cpp.s src/LiveSLAMWrapper.o: src/LiveSLAMWrapper.cpp.o .PHONY : src/LiveSLAMWrapper.o # target to build an object file src/LiveSLAMWrapper.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/LiveSLAMWrapper.cpp.o .PHONY : src/LiveSLAMWrapper.cpp.o src/LiveSLAMWrapper.i: src/LiveSLAMWrapper.cpp.i .PHONY : src/LiveSLAMWrapper.i # target to preprocess a source file src/LiveSLAMWrapper.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/LiveSLAMWrapper.cpp.i .PHONY : src/LiveSLAMWrapper.cpp.i src/LiveSLAMWrapper.s: src/LiveSLAMWrapper.cpp.s .PHONY : src/LiveSLAMWrapper.s # target to generate assembly for a file src/LiveSLAMWrapper.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/LiveSLAMWrapper.cpp.s .PHONY : src/LiveSLAMWrapper.cpp.s src/SlamSystem.o: src/SlamSystem.cpp.o .PHONY : src/SlamSystem.o # target to build an object file src/SlamSystem.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/SlamSystem.cpp.o .PHONY : src/SlamSystem.cpp.o src/SlamSystem.i: src/SlamSystem.cpp.i .PHONY : src/SlamSystem.i # target to preprocess a source file src/SlamSystem.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/SlamSystem.cpp.i .PHONY : src/SlamSystem.cpp.i src/SlamSystem.s: src/SlamSystem.cpp.s .PHONY : src/SlamSystem.s # target to generate assembly for a file src/SlamSystem.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/SlamSystem.cpp.s .PHONY : src/SlamSystem.cpp.s src/Tracking/Relocalizer.o: src/Tracking/Relocalizer.cpp.o .PHONY : src/Tracking/Relocalizer.o # target to build an object file src/Tracking/Relocalizer.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/Relocalizer.cpp.o .PHONY : src/Tracking/Relocalizer.cpp.o src/Tracking/Relocalizer.i: src/Tracking/Relocalizer.cpp.i .PHONY : src/Tracking/Relocalizer.i # target to preprocess a source file src/Tracking/Relocalizer.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/Relocalizer.cpp.i .PHONY : src/Tracking/Relocalizer.cpp.i src/Tracking/Relocalizer.s: src/Tracking/Relocalizer.cpp.s .PHONY : src/Tracking/Relocalizer.s # target to generate assembly for a file src/Tracking/Relocalizer.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/Relocalizer.cpp.s .PHONY : src/Tracking/Relocalizer.cpp.s src/Tracking/SE3Tracker.o: src/Tracking/SE3Tracker.cpp.o .PHONY : src/Tracking/SE3Tracker.o # target to build an object file src/Tracking/SE3Tracker.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/SE3Tracker.cpp.o .PHONY : src/Tracking/SE3Tracker.cpp.o src/Tracking/SE3Tracker.i: src/Tracking/SE3Tracker.cpp.i .PHONY : src/Tracking/SE3Tracker.i # target to preprocess a source file src/Tracking/SE3Tracker.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/SE3Tracker.cpp.i .PHONY : src/Tracking/SE3Tracker.cpp.i src/Tracking/SE3Tracker.s: src/Tracking/SE3Tracker.cpp.s .PHONY : src/Tracking/SE3Tracker.s # target to generate assembly for a file src/Tracking/SE3Tracker.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/SE3Tracker.cpp.s .PHONY : src/Tracking/SE3Tracker.cpp.s src/Tracking/Sim3Tracker.o: src/Tracking/Sim3Tracker.cpp.o .PHONY : src/Tracking/Sim3Tracker.o # target to build an object file src/Tracking/Sim3Tracker.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/Sim3Tracker.cpp.o .PHONY : src/Tracking/Sim3Tracker.cpp.o src/Tracking/Sim3Tracker.i: src/Tracking/Sim3Tracker.cpp.i .PHONY : src/Tracking/Sim3Tracker.i # target to preprocess a source file src/Tracking/Sim3Tracker.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/Sim3Tracker.cpp.i .PHONY : src/Tracking/Sim3Tracker.cpp.i src/Tracking/Sim3Tracker.s: src/Tracking/Sim3Tracker.cpp.s .PHONY : src/Tracking/Sim3Tracker.s # target to generate assembly for a file src/Tracking/Sim3Tracker.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/Sim3Tracker.cpp.s .PHONY : src/Tracking/Sim3Tracker.cpp.s src/Tracking/TrackingReference.o: src/Tracking/TrackingReference.cpp.o .PHONY : src/Tracking/TrackingReference.o # target to build an object file src/Tracking/TrackingReference.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/TrackingReference.cpp.o .PHONY : src/Tracking/TrackingReference.cpp.o src/Tracking/TrackingReference.i: src/Tracking/TrackingReference.cpp.i .PHONY : src/Tracking/TrackingReference.i # target to preprocess a source file src/Tracking/TrackingReference.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/TrackingReference.cpp.i .PHONY : src/Tracking/TrackingReference.cpp.i src/Tracking/TrackingReference.s: src/Tracking/TrackingReference.cpp.s .PHONY : src/Tracking/TrackingReference.s # target to generate assembly for a file src/Tracking/TrackingReference.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/TrackingReference.cpp.s .PHONY : src/Tracking/TrackingReference.cpp.s src/Tracking/least_squares.o: src/Tracking/least_squares.cpp.o .PHONY : src/Tracking/least_squares.o # target to build an object file src/Tracking/least_squares.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/least_squares.cpp.o .PHONY : src/Tracking/least_squares.cpp.o src/Tracking/least_squares.i: src/Tracking/least_squares.cpp.i .PHONY : src/Tracking/least_squares.i # target to preprocess a source file src/Tracking/least_squares.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/least_squares.cpp.i .PHONY : src/Tracking/least_squares.cpp.i src/Tracking/least_squares.s: src/Tracking/least_squares.cpp.s .PHONY : src/Tracking/least_squares.s # target to generate assembly for a file src/Tracking/least_squares.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/Tracking/least_squares.cpp.s .PHONY : src/Tracking/least_squares.cpp.s src/main_live_odometry.o: src/main_live_odometry.cpp.o .PHONY : src/main_live_odometry.o # target to build an object file src/main_live_odometry.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/src/main_live_odometry.cpp.o .PHONY : src/main_live_odometry.cpp.o src/main_live_odometry.i: src/main_live_odometry.cpp.i .PHONY : src/main_live_odometry.i # target to preprocess a source file src/main_live_odometry.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/src/main_live_odometry.cpp.i .PHONY : src/main_live_odometry.cpp.i src/main_live_odometry.s: src/main_live_odometry.cpp.s .PHONY : src/main_live_odometry.s # target to generate assembly for a file src/main_live_odometry.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/live_slam.dir/src/main_live_odometry.cpp.s .PHONY : src/main_live_odometry.cpp.s src/main_on_images.o: src/main_on_images.cpp.o .PHONY : src/main_on_images.o # target to build an object file src/main_on_images.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/src/main_on_images.cpp.o .PHONY : src/main_on_images.cpp.o src/main_on_images.i: src/main_on_images.cpp.i .PHONY : src/main_on_images.i # target to preprocess a source file src/main_on_images.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/src/main_on_images.cpp.i .PHONY : src/main_on_images.cpp.i src/main_on_images.s: src/main_on_images.cpp.s .PHONY : src/main_on_images.s # target to generate assembly for a file src/main_on_images.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/dataset.dir/src/main_on_images.cpp.s .PHONY : src/main_on_images.cpp.s src/util/SophusUtil.o: src/util/SophusUtil.cpp.o .PHONY : src/util/SophusUtil.o # target to build an object file src/util/SophusUtil.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/SophusUtil.cpp.o .PHONY : src/util/SophusUtil.cpp.o src/util/SophusUtil.i: src/util/SophusUtil.cpp.i .PHONY : src/util/SophusUtil.i # target to preprocess a source file src/util/SophusUtil.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/SophusUtil.cpp.i .PHONY : src/util/SophusUtil.cpp.i src/util/SophusUtil.s: src/util/SophusUtil.cpp.s .PHONY : src/util/SophusUtil.s # target to generate assembly for a file src/util/SophusUtil.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/SophusUtil.cpp.s .PHONY : src/util/SophusUtil.cpp.s src/util/Undistorter.o: src/util/Undistorter.cpp.o .PHONY : src/util/Undistorter.o # target to build an object file src/util/Undistorter.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/Undistorter.cpp.o .PHONY : src/util/Undistorter.cpp.o src/util/Undistorter.i: src/util/Undistorter.cpp.i .PHONY : src/util/Undistorter.i # target to preprocess a source file src/util/Undistorter.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/Undistorter.cpp.i .PHONY : src/util/Undistorter.cpp.i src/util/Undistorter.s: src/util/Undistorter.cpp.s .PHONY : src/util/Undistorter.s # target to generate assembly for a file src/util/Undistorter.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/Undistorter.cpp.s .PHONY : src/util/Undistorter.cpp.s src/util/globalFuncs.o: src/util/globalFuncs.cpp.o .PHONY : src/util/globalFuncs.o # target to build an object file src/util/globalFuncs.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/globalFuncs.cpp.o .PHONY : src/util/globalFuncs.cpp.o src/util/globalFuncs.i: src/util/globalFuncs.cpp.i .PHONY : src/util/globalFuncs.i # target to preprocess a source file src/util/globalFuncs.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/globalFuncs.cpp.i .PHONY : src/util/globalFuncs.cpp.i src/util/globalFuncs.s: src/util/globalFuncs.cpp.s .PHONY : src/util/globalFuncs.s # target to generate assembly for a file src/util/globalFuncs.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/globalFuncs.cpp.s .PHONY : src/util/globalFuncs.cpp.s src/util/settings.o: src/util/settings.cpp.o .PHONY : src/util/settings.o # target to build an object file src/util/settings.cpp.o: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/settings.cpp.o .PHONY : src/util/settings.cpp.o src/util/settings.i: src/util/settings.cpp.i .PHONY : src/util/settings.i # target to preprocess a source file src/util/settings.cpp.i: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/settings.cpp.i .PHONY : src/util/settings.cpp.i src/util/settings.s: src/util/settings.cpp.s .PHONY : src/util/settings.s # target to generate assembly for a file src/util/settings.cpp.s: cd /home/ewenwan/ewenwan/catkin_ws/build && $(MAKE) -f lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/build.make lsd_slam/lsd_slam_core/CMakeFiles/lsdslam.dir/src/util/settings.cpp.s .PHONY : src/util/settings.cpp.s # Help Target help: @echo "The following are some of the valid targets for this Makefile:" @echo "... all (the default if no target is provided)" @echo "... clean" @echo "... depend" @echo "... dataset" @echo "... edit_cache" @echo "... install" @echo "... install/local" @echo "... install/strip" @echo "... list_install_components" @echo "... live_slam" @echo "... lsd_slam_core_gencfg" @echo "... lsdslam" @echo "... rebuild_cache" @echo "... test" @echo "... src/DataStructures/Frame.o" @echo "... src/DataStructures/Frame.i" @echo "... src/DataStructures/Frame.s" @echo "... src/DataStructures/FrameMemory.o" @echo "... src/DataStructures/FrameMemory.i" @echo "... src/DataStructures/FrameMemory.s" @echo "... src/DataStructures/FramePoseStruct.o" @echo "... src/DataStructures/FramePoseStruct.i" @echo "... src/DataStructures/FramePoseStruct.s" @echo "... src/DepthEstimation/DepthMap.o" @echo "... src/DepthEstimation/DepthMap.i" @echo "... src/DepthEstimation/DepthMap.s" @echo "... src/DepthEstimation/DepthMapPixelHypothesis.o" @echo "... src/DepthEstimation/DepthMapPixelHypothesis.i" @echo "... src/DepthEstimation/DepthMapPixelHypothesis.s" @echo "... src/GlobalMapping/FabMap.o" @echo "... src/GlobalMapping/FabMap.i" @echo "... src/GlobalMapping/FabMap.s" @echo "... src/GlobalMapping/KeyFrameGraph.o" @echo "... src/GlobalMapping/KeyFrameGraph.i" @echo "... src/GlobalMapping/KeyFrameGraph.s" @echo "... src/GlobalMapping/TrackableKeyFrameSearch.o" @echo "... src/GlobalMapping/TrackableKeyFrameSearch.i" @echo "... src/GlobalMapping/TrackableKeyFrameSearch.s" @echo "... src/GlobalMapping/g2oTypeSim3Sophus.o" @echo "... src/GlobalMapping/g2oTypeSim3Sophus.i" @echo "... src/GlobalMapping/g2oTypeSim3Sophus.s" @echo "... src/IOWrapper/OpenCV/ImageDisplay_OpenCV.o" @echo "... src/IOWrapper/OpenCV/ImageDisplay_OpenCV.i" @echo "... src/IOWrapper/OpenCV/ImageDisplay_OpenCV.s" @echo "... src/IOWrapper/ROS/ROSImageStreamThread.o" @echo "... src/IOWrapper/ROS/ROSImageStreamThread.i" @echo "... src/IOWrapper/ROS/ROSImageStreamThread.s" @echo "... src/IOWrapper/ROS/ROSOutput3DWrapper.o" @echo "... src/IOWrapper/ROS/ROSOutput3DWrapper.i" @echo "... src/IOWrapper/ROS/ROSOutput3DWrapper.s" @echo "... src/IOWrapper/Timestamp.o" @echo "... src/IOWrapper/Timestamp.i" @echo "... src/IOWrapper/Timestamp.s" @echo "... src/LiveSLAMWrapper.o" @echo "... src/LiveSLAMWrapper.i" @echo "... src/LiveSLAMWrapper.s" @echo "... src/SlamSystem.o" @echo "... src/SlamSystem.i" @echo "... src/SlamSystem.s" @echo "... src/Tracking/Relocalizer.o" @echo "... src/Tracking/Relocalizer.i" @echo "... src/Tracking/Relocalizer.s" @echo "... src/Tracking/SE3Tracker.o" @echo "... src/Tracking/SE3Tracker.i" @echo "... src/Tracking/SE3Tracker.s" @echo "... src/Tracking/Sim3Tracker.o" @echo "... src/Tracking/Sim3Tracker.i" @echo "... src/Tracking/Sim3Tracker.s" @echo "... src/Tracking/TrackingReference.o" @echo "... src/Tracking/TrackingReference.i" @echo "... src/Tracking/TrackingReference.s" @echo "... src/Tracking/least_squares.o" @echo "... src/Tracking/least_squares.i" @echo "... src/Tracking/least_squares.s" @echo "... src/main_live_odometry.o" @echo "... src/main_live_odometry.i" @echo "... src/main_live_odometry.s" @echo "... src/main_on_images.o" @echo "... src/main_on_images.i" @echo "... src/main_on_images.s" @echo "... src/util/SophusUtil.o" @echo "... src/util/SophusUtil.i" @echo "... src/util/SophusUtil.s" @echo "... src/util/Undistorter.o" @echo "... src/util/Undistorter.i" @echo "... src/util/Undistorter.s" @echo "... src/util/globalFuncs.o" @echo "... src/util/globalFuncs.i" @echo "... src/util/globalFuncs.s" @echo "... src/util/settings.o" @echo "... src/util/settings.i" @echo "... src/util/settings.s" .PHONY : help #============================================================================= # Special targets to cleanup operation of make. # Special rule to run CMake to check the build system integrity. # No rule that depends on this can have commands that come from listfiles # because they might be regenerated. cmake_check_build_system: cd /home/ewenwan/ewenwan/catkin_ws/build && $(CMAKE_COMMAND) -H$(CMAKE_SOURCE_DIR) -B$(CMAKE_BINARY_DIR) --check-build-system CMakeFiles/Makefile.cmake 0 .PHONY : cmake_check_build_system
Participatory probabilistic assessment of the risk to human health associated with cryptosporidiosis from urban dairying in Dagoretti, Nairobi, Kenya. We carried out a participatory risk assessment to estimate the risk (negative consequences and their likelihood) from zoonotic Cryptosporidium originating in dairy farms in urban Dagoretti, Nairobi to dairy farm households and their neighbours. We selected 20 households at high risk for Cryptosporidium from a larger sample of 300 dairy households in Dagoretti based on risk factors present. We then conducted a participatory mapping of the flow of the hazard from its origin (cattle) to human potential victims. This showed three main exposure pathways (food and water borne, occupational and recreational). This was used to develop a fault tree model which we parameterised using information from the study and literature. A stochastic simulation was used to estimate the probability of exposure to zoonotic cryptosporidiosis originating from urban dairying. Around 6 % of environmental samples were positive for Cryptosporidium. Probability of exposure to Cryptosporidium from dairy cattle ranged from 0.0055 for people with clinical acquired immunodeficiency syndrome in non-dairy households to 0.0102 for children under 5 years from dairy households. Most of the estimated health burden was born by children. Although dairy cattle are the source of Cryptosporidium, the model suggests consumption of vegetables is a greater source of risk than consumption of milk. In conclusion, by combining participatory methods with quantitative microbial risk assessment, we were able to rapidly, and with appropriate 'imprecision', investigate health risk to communities from Cryptosporidium and identify the most vulnerable groups and the most risky practices.
The international Biomedical and Astronomical Signal Processing (BASP) Frontiers workshop was created to promote synergies between selected topics in astronomy and biomedical sciences, around common challenges for signal processing. Building on the success of the first two workshops in 2011 and 2013, the BASP Frontiers 2015 workshop will open its floor to many interesting hot topics in theoretical, astrophysical, and biomedical signal processing, with a particular focus on imaging. The workshop is run by an internationally recognized scientific organizing committee and will gather around 75 participants. Following our tradition, BASP Frontiers 2015 will take place in a very nice resort in the Swiss Alps named Villars-sur-Ollon, close to Lausanne and Lake Geneva. All participants will be accommodated in 4 star hotel in a full board regime. We believe that the most fruitful discussions often take place after the sessions themselves, on the terrace, or during breakfast, lunch, or dinner. We hope that the winter atmosphere will further promote discussion and creativity. November 28: Please note that detailed programme now includes precise schedule of talks and posters in each session. November 28: Hurry up, workshop registration closes on December 12, please remember to book your hotel by this date too. November 2014: We are pleased to announce that the BASP workshop will open with a general talk from Professor Anthony Lasenby of the University of Cambridge on "The Search for Gravitational Waves in the Early Universe".
Paris St. Germain sporting director Leonardo this week saw his nine-month ban for pushing a referee increased to 13 months after a failed appeal. The super-rich Ligue champion has yet to decide whether to appeal the decision to the national sporting and Olympic committee (CNOSF), the highest sports authority in France. Leonardo was handed a nine-month band for pushing referee Alexandre Castro in the tunnel following a Ligue 1 clash with Valenciennes on May 5. After the initial appeal failed, the ban was raised to 13 months, which means the Brazilian would not be able to return to his duties until June 30, 2014. "Paris St Germain ... regrets the harshness of the sanction against Leonardo, who still has the full confidence of the club," the French champions said in a statement on Friday. "The club will decide whether they file a possible appeal [to the CNOSF] after examining the reasoned decision." Read the original story...
Field of Art The disclosure generally relates to the field of application search, and more particularly to providing customizable application search. Description of the Related Art In recent years, use of computers, smartphones, and other Internet-connected devices has grown exponentially. Correspondingly, the number of available applications for such devices has also grown. Today, many diverse applications can be accessed on any number of different devices, including, but not limited to, smartphones, personal computers, wearable devices, refrigerators, automobiles, and televisions. These diverse applications can range from business driven applications, games, educational applications, news applications, shopping applications, efficiency applications, messaging applications, video chatting applications, media streaming applications, social networking applications, and so much more.
Screening tools for frailty in primary health care: a systematic review. Frailty is the loss of resources in several domains leading to the inability to respond to physical or psychological stress. The evaluation of frailty is generally carried out using the Comprehensive Geriatric Assessment. For this evolving and potentially reversible syndrome, screening and early intervention are a priority in primary health care, and general practitioners require a simple screening tool. The aim of the present work was to review the literature for validated screening instruments for frailty in primary health care setting. A search was carried out on PubMed and Cochrane Central in June 2011. A total of 10 instruments screening for frailty in primary health care were listed, analysed and compared. It is difficult to show which tool today is the best for screening for frailty in the elderly in primary care settings. Two instruments are potentially suitable - the Tilburg Frailty Indicator and the SHARE Frailty Index. In addition, these instruments require validation in larger studies in primary health care settings and with more quality criteria.
Monday, November 01, 2010 Except a Gleam Across the Dreamer's Face I'm a little late on this since I've been exhausting my mana ranting elsewhere, but rest assured I've been thinking about this a lot during the shower in the morning. I mean... wait... there's a less awkward way of saying that... PC World has declared that the Linux desktop missed its opportunity to gain market share, and that opportunity has passed. To a point this is true... the Linux desktop was a viable alternative when Vista was rejected by the public at large. It didn't matter if users had even tried Vista in their lifetime - public opinion had spoken, and Vista wasn't invited to the consumer PC party. A huge market share vacuum was left behind and Linux tried to fill it as rapidly as possible, but it simply had too much ground to cover. By the time the Linux desktop caught up (and they did catch up in my opinion) it was simply too late for inclusion by OEMs into netbooks - the hardware platform that was absolutely made for Linux. Gosling ends up agreeing but on a different premise: the economics of OSS don't work for desktop software that "just works" out of the box. This has some truth as well - a pay-per-support model cannot sustain an OSS desktop when the expectation is that the desktop should simply "work" without the need to call for support. By the time the user picks up the phone for help the desktop environment has already failed. Desktops must install and operate without a need for any hand-holding. PC World did make one important point that shouldn't be glossed over - the traditional, monolithic desktop is dying off. I'm not saying that the desktop is going away by any measure... but people are returning to the time where they see desktops, laptops, mobile phones and TV's as "appliances" and no longer as "computers." Each serves a function of its own and is expected to work in concert with the rest of the electronic family. I hope these blogs o' doom don't have a chilling effect on writing applications for the Linux desktop. Linux is only going to see greatly increasing deployments in the future, not diminishing ones. The desktop is not simply going to be defined as KDE 4 or Gnome, but instead is going to exist as Hulu Desktop and/or MythTV. The desktop creates and consumes content - the lines between OS' are starting to dissolve.
The computer I am using is not very good with JavaScript which is why the comment I was going to write is not working out on the game. As it turns out, I do not really think MySpace is the type of company for Spock and Kirk. I would love for Christopher Pike to know there is a cure for paralysis which I devised and cured myself of. I would be willing to bring, deliver or mail the exact roots and substances I use (I really have a very COMPLICATED story of how I'm not really living on the Planet I'm from and would love to visit others). I was almost as bad as Pike but had a little more movement than him. The neck, spine, arms, shoulders, legs and organs within are all cured as well as bone marrow / bones. He would be cured in LESS THAN a week, I guarantee this! Anyway, I would love to talk to anyone who wants to talk, yet I could not possibly support McCoy. I always grew up with people who said someone is the real McCoy if he or she is the baddest soul that could possibly have stayed alive. After seeing that McCoy would really put "neuro-paralyzers" in a gun for Kirk and Spock battling one another, and knowing also that those plastic bags don't come off that are beamed on, I know he's very heartless! Everyone acted liked paralyzers for me, but I cured EVERY body part and can't possibly feel pain in any right now. The real Kirk, Spock and Pike are much better! Sincerely, Magda XXXX From: Webmaster To: Magda XXXX [mailto:soul_of_happiness@XXXXX.com]Subject: RE: Please beam this mail to the real Planet Kirk and Spock work on Dear Magda, I was afraid we'd have these kinds of problems when we started airing Star Trek.
There are two very important things that you must know about this cow: 1) Her name is Milkshake, 2) She thinks she’s a dog—aka the cutest animal identity issue ever. The 1,200 pound, 8-year-old cow spent the first two years of her life living in a 10×10 pen until she was rescued by the Grace Foundation. She had never been introduced to other cows, so upon her rescue, she took to acting like rancher Beth DiCaprio’s dog Riley. “Milkshake is still not convinced she is a cow and has never been a fan of grazing,” DiCaprio told Caters. “I think she thinks it’s pointless finding her own food when she can wait on us bringing it to her in a bowl, like her dog friends.” Milkshake follows DiCaprio around—sometimes into the bathroom, scaring herself upon seeing her own reflection—and moos when she hears her master is on her way home. Aw, Milkshake the cow think s she's a dog http://t.co/kWfqClUCl5 — Shirley Anne Edwards (@ShirlAwriter) June 9, 2014 Contact us at letters@time.com.
Q: Validating parameters to create a class, parameters created in the controller arn't being added. I create a class that takes two input parameters from the user, these input parameters are then used to create five others, the problem is that the five others don't show up when I check my validated paramaters only the first ones. I know that all of the new parameters are added to the params but they don't show up in the model time_delta_params hash when I check what's in it only the first two. Thanks for any help! My create method for the controller def create # XXX Add these columns to the model and populate them # finalRating, positiveTweets, negativeTweets, neutralTweets, totalTweets tweetRatings = {:finalRating => 0, :positiveTweets => 0, :negativeTweets => 0, :neutralTweets => 0} @stock = Stock.find(params[:stock_id]) tweets = getTweets(@stock.hashtag, time_delta_params[:start], time_delta_params[:length].to_i) tweets.each do |tweet| case processTweet(tweet) when 1 tweetRatings[:positiveTweets] += 1 tweetRatings[:finalRating] += 1 when -1 tweetRatings[:negativeTweets] += 1 tweetRatings[:finalRating] -= 1 else tweetRatings[:neutralTweets] += 1 end end params[:final] = tweetRatings[:finalRating] params[:positive] = tweetRatings[:positiveTweets] params[:negative] = tweetRatings[:negativeTweets] params[:neutral] = tweetRatings[:neutralTweets] params[:total] = tweets.count # printSomthingToRender(time_delta_params) @time_delta = @stock.time_deltas.create(time_delta_params) redirect_to stock_path(@stock) end My validation: def time_delta_params params.require(:time_delta).permit( :start, :length, :final, :positive, :negative, :neutral, :total ) end A: You're calling create with the time_delta_params that isn't going to contain the tweetRatings data. You would need to do something like params['time_delta'][:final] = tweetRating[:finalRating]. You could also call create and create your hash there or rename the values in the tweetRatings hash to match what is in the model.
· Phil Hughes pitched 6.0-plus innings for the 18th time this season…he did not factor into the decision for the first time since July 16 vs. Toronto. · Derek Jeter extended his season-high hitting streak to 19 games (since September 4) and is hitting .365 (31-for-85) during the streak…it is the longest active streak in the Majors…it ties the third longest of his career (May 5-25, 2007). · Jeter has 165 career hits against the Twins, which is the sixth-most among actives…he is hitting .325 (165-for-507) lifetime against Minnesota. · Ichiro Suzuki is hitting .326 (62-for-190) since joining the Yankees…he is hitting .500 (17-for-34) in his last eight games. · Nick Swisher has homered in four of his last six games…19 of his 24 home runs have come against right-handers…seven of his last 15 home runs have given the Yankees the lead…each of his last six home runs have come with men on base. · Robinson Cano recorded his eighth game with three-or-more hits, five of them have come on the road…fifth career three-hit game against the Twins, first since 2006. · Russell Martin hit his 19th home run, matching his single season career-high, done in 2007 with the Dodgers…he has three home runs in his last five games at Target Field. · The Yankees have homered in each of their last 11 games against the Twins, totaling 24 in that span…33 of their 62 runs scored against the Twins in that time have come via home run…they have scored all of 10 of their runs this series on homers. · Andrew Jones hit his second pinch hit home run of the season and fifth of his career. TWINS NOTES: ­ · The Twins snapped their four-game home losing streak, winning at Target Field for the first time since September 13. · Tonight marked the Twins 34th come from behind win this season. · Esmerling Vasquez recorded his first career quality start tonight (fifth career start)…his five strikeouts tied a career-high, previously done on June 4, 2010 vs. Colorado (with Arizona). · Joe Mauer (3-for-4) is hitting .418 (28-for-67) in 18 games this month…Mauer’s batting average on the season is now .326, three points behind AL-leader Miguel Cabrera, who finished his night 0-for-3 and is now hitting .329. · Mauer recorded his 22nd three-hit game of the season (AL-most)…the Twins are 19-3 when he gets three hits…the most three-hit games he has ever recorded in one season was 23, in 2009. · Mauer threw out two runners attempting to steal, marking the first time since July 28, 2011 at Texas…Mauer entered tonight having thrown out three runners all season (59 attempts). · Chris Parmelee recorded one RBI tonight, giving him 14 this month in 16 games played (51 at-bats). · 33 of Jared Burton’s last 36 appearances have been scoreless (since June 12), posting a 0.76 ERA (35.2 IP, 3 ER) in that span. · Glen Perkins has converted his 11th consecutive save…he is now 15-for-18 in save opportunities this season. • Jamey Carroll (1-for-3) is hitting .375 (21-for-56) in 15 games this month…he entered today third in the AL in September batting average. • Denard Span (1-for-4) has hit safely in 21 of his last 24 home games, batting .376 (35-for-93) with a .431 on-base percentage in that time.
I'm not so convinced it is supernatural. Methinks it's the natural shapeshifting ability of the Bamfs combined with Azazel's blood magic. They did stand around in a sorcery circle before fusing together, and that's not unlike what was happening when Azazel had his offspring in his thrall when trying to create the portal to bring over his army in "The Draco." The interruption of that spell left Kurt with his hand fused to the hand of a dead half-sibling, much like how the Bamfs' hands alone were shown fusing together before they turned into the blob that became Kurt. I don't think he's unwelcome back in the afterlife. I think it's more that the chances of him getting to return are slim because he's tied his life to the continued existence of a massive colony of hell beasts. As long as they live, he lives. I'm with you, though, in that I would've preferred something simpler. They got Colossus out of being cremated with a body snatch, so why not do the same with Kurt? They all think he's dead while the alien/sorcerer/whatever that took him fixes him up, and a whole rescue scenario for a big adventure can be put together if it's that Kurt's held captive/mind-controlled/whatever. Or we could find out that it was a kindly alien/sorcerer/whatever who just needed Kurt's help for a little while, which he gladly gave because he's nice like that. From reading the interviews, I think Aaron, when he requested the return of Nightcrawler, was told he'd have to have a solid story behind it before it was allowed. I, for one, am glad this isn't just another random comic resurrection and that there is some meat to it. As far as the impact on Kurt, I think something was also indicated in the last issue of Amazing during his conversation with Mystique. She remarked on him being different, so I believe this will be a time of change for the character, like when he woke back up from the coma to launch Excalibur. Issue no.002 is a much needed improvement, but it's still far from what I imagined the series to be like. Is anyone else getting annoyed that Kurt keeps "saving" Amanda, taking credit for it, and completely and full of hubris, reminding her at every opportunity? He seems to always be saving her... I'm pretty sure she outpowers him by quite a bit, even with a gaggle of Bamfs. I've always felt Claremont writes empowered, but undeserving-of-said-power-thus-weak women, but this is a stretch even for him. What I mean is, Claremont writes women who have lots of power but either zero personality or a complete inability to use the power properly. But they're always wonderful people. I keep getting this vibe that Amanda is going to be proven to be like... a facade or unreal. She seems so 2-dimensional. Looks like a fun cover, for sure. Being a teacher is a role that most of the X-Men have had a chance to fill by now, so seeing Nightcrawler assume the position (hee hee) will be a fun read. Also, we can presume the Amanda/origin backstory arc will be done be now. So that's good... I hope there's time to improve this title. Had a conversation with a Twitter friend of mine in between the 1st & 2nd issues, ... we both sorta hope after about 5 maybe 6 issues, Claremont moves along and another writer (James Asmus anybody?) could come along. Not to sound ungrateful for Marvel bringing Kurt back, even giving him his own book! But seriously... this writing is so ... dated. I kinda like dated... What I have issue with is the story itself. I figured the first storyline would have been stronger and more central to the actual resurrection of Nightcrawler. Ramifications, acclamation, etc... Ult_Sm86 wrote:Issue no.002 is a much needed improvement, but it's still far from what I imagined the series to be like. Is anyone else getting annoyed that Kurt keeps "saving" Amanda, taking credit for it, and completely and full of hubris, reminding her at every opportunity? He seems to always be saving her... I'm pretty sure she outpowers him by quite a bit, even with a gaggle of Bamfs. I've always felt Claremont writes empowered, but undeserving-of-said-power-thus-weak women, but this is a stretch even for him. What I mean is, Claremont writes women who have lots of power but either zero personality or a complete inability to use the power properly. But they're always wonderful people. I keep getting this vibe that Amanda is going to be proven to be like... a facade or unreal. She seems so 2-dimensional. Yep, I see where you're coming from with that. I'd seen someone else saying the same -- that the whole bit felt kind of unreal, like a product of manipulation or something pulled from his head. So, issue 3 came out yesterday, and man, this is a big improvement. We dive into Nightcrawler's struggle with his loss of spiritual status, and an awesome speech from Wolverine. Great stuff. Also, our worries about Amanda are addressed. Fun stuff. My faith is beginning to be restored I was ... happy with the way the story turned out. Happy is a good way to put it. The events were... muddy... but the end result left me happy. However... I have to bring up again that this narration of action that is clearly being drawn by a very competent artist (Nauck) on Claremont's behalf is just more evidence, in my opinion, that Claremont's scripts are wildly out of fashion. It's sad that I can't wait for him, a legend in comic books, to get dropped like a hot potato from this series in order to save an X-Title they desperately need. They cancelled plans for X-Men Legacy for this book. They gave Claremont his own Nightcrawler series and that's a gamble 'cause the character didn't die in his peek popularity 'nor did he return to increased fan fervor (though definitely we as a close group demanded it enough times). If they are going to pull this off and look like they're not just tickling our fancies and selling books just for money with characters we will read, regardless of the quality of story (or in some books -- art... see All-New Ultimates), then perhaps it's time Marvel steps it up and show they're not selling covers like they have accused the Distinguished Competition, or even selling books solely on the talent behind the book, but rather the highest quality comic they can deliver, all things included. That said, HEY! Tom Brevoort! Dump Claremont. Bring on Waid. Until a new writer comes on, I'm not paying for this book anymore. I suppose this just isn't the story I wanted. Space stuff and X-Men always turns into a snore for me. But I'm not trying to come off as harsh and will add that as happenstance as the whole scenario is, I'm glad he's getting out of that school. I thought I wanted him there, re-learning what it is to be a teacher at Xavier's but the first few pages of that were over-the-top and not what I had expected. Seems Claremont's Kurt is better suited for missions, and it's always fun when a student sneaks onto one of those. I will say the scantily clad Rachel is a strange thing to see after her characterization in Wood's "X-Men." I didn't think her go-to DR style of dress was similar to Red Sonja's. Or is that just Claremont writing for the 80's again? I will say the scantily clad Rachel is a strange thing to see after her characterization in Wood's "X-Men." I didn't think her go-to DR style of dress was similar to Red Sonja's. Or is that just Claremont writing for the 80's again? That was a tongue in cheek reference to a classic Kurt/Rachel scene from Claremont's last comeback, which in turn was based on an old Excalibur issue. In short, a kind of inside joke between old friends. Yes, those continuity-centric little prize eggs getting thrown in there are nice for us old-timers, though based on the mentor role and the inclusion of the younger generation, I think CC is setting up a nice formula to appeal to old and new readers. I mean, as an old reader it doesn't annoy me to see Mercury or Rico in the book -- far from it. I haven't seen it yet. I only go to the comic shop once a month...the week Previews comes out, which is this week I believe...unless a title is so awesome I have to have it as soon as I can get my grubby little mitts on it. I can't recall the last time that was... I mean, as an old reader it doesn't annoy me to see Mercury or Rico in the book -- far from it. Yeah... I sorta hate Rico. He has yet to grow on me. Mercury is cool but she could definitely be holding her own book. Her character is far more intense and developed than what Claremont has depicted in my reads thus far. I think this book is just not my flavor. Again, it could all fall down on the writing style and have nothing to do with his characterization or anything. I just dread picking it up. It's not for me. Eh, I'm not going to argue that point. I kind of feel like there was room enough for both, considering how different their motivations, MO, etc were, but then again I think Darkhölme would've made a better sympathetic villain in the long run. /shrug I'm sorry the solo isn't to your taste. I expect Claremont is waging an uphill battle to not only attempt his own comeback, but to also bring a character that was reduced to irrelevancy over a decade ago back to the forefront enough for other writers to pick him up and make him relevant again. I'll be supporting him through it and sincerely hope for the best for him as well as the character. I expect Claremont is waging an uphill battle to not only attempt his own comeback, but to also bring a character that was reduced to irrelevancy over a decade ago back to the forefront enough for other writers to pick him up and make him relevant again. I'll be supporting him through it and sincerely hope for the best for him as well as the character. You've actually clearly identified my biggest problem with the book. While he was surely on the back-burner, Fraction's grasp on him was clear. The writers of X-Books at the time knew what to do with him... they also chose to kill him, which was a total shame. But two years later, the best writers out there for X-Books who could've handled him are all gone. Jason Aaron is doing "bigger, better things" Remender's work with any Nightcrawler seems to start/stop at Darkholme, & meanwhile this character is getting the "olde style" treatment from Claremont. Yeah, it probably is an uphill battle. But there's a reason for that. I know it makes me sound cranky and grouchy, but longboxes are where that sort of comic book storytelling belongs. The stories and how we make characterizations, realize a person on a page (and with that sentiment I am referring to female persons), and how we tell a story in general -- it's all evolved. It makes me sound like a hard-ass but in turn, I say stories now are better than they ever have been. The artwork is at it's most stunning and I firmly feel there's a comic bookfor everyone and not every comic book needs to be that "anyone can read it" book. 'Nor should it be. But "Nightcrawler" by Christ Claremont has a very limited demographic of fan-appeal and they need to change that or it's going to get cancelled. Sorry, but that's the way it is. The attraction for that sort of book? The numbers are simply not going to be there. Finish this arc out, bring in a new writer. ... Preferably Gail Simone, who I think could do wonders for the book. I like Claremont's older stuff. Heck, i even enjoyed the first arcs of Extreme x-men (left when Larocca left). I like the easter eggs for older fans but the story in general has been a real let down. At least the baseball reference was a little different this time. I really like the idea of Gail writing Kurt, and loved it when Aaron was writing Amazing. Heck, I'd pay triple cost to get Alan Davis to write and draw the series (and would throw some extra dough if he could get the Clan Destine as guests). Ultsm86, i have to ask. When you talk about the art being better than ever what exactly do you mean? And stories being better than ever, i'd have to respectfully disagree. I'd say that just like in the past there are some good and some bad. Admittedly some great past stories cannot hold up because you know what is going to happen or that the character comes back (ie Dark Phoenix Saga, which i read through reprints in the 90's).
In vivo direct monitoring of interstitial norepinephrine levels at the sinoatrial node. We assessed in vivo interstitial norepinephrine (NE) levels at the sinoatrial node in rabbits, using microdialysis technique. A dialysis probe was implanted adjacent to the sinoatrial node of an anesthetized rabbit and dialysate was sampled during sympathetic nerve stimulation. Atrial dialysate NE concentration correlated well with heart rate. Desipramine significantly increased dialysate NE concentrations both before and during sympathetic nerve stimulation compared with the absence of desipramine. However, desipramine did not affect the relation between heart rate and dialysate NE concentration. These results suggest that atrial dialysate NE level reflects the relative change of NE concentration in the synaptic cleft. Microdialysis is a powerful tool to assess in vivo interstitial NE levels at the sinoatrial node.
{ "images" : [ { "idiom" : "universal", "filename" : "login.jpeg", "scale" : "1x" }, { "idiom" : "universal", "scale" : "2x" }, { "idiom" : "universal", "scale" : "3x" } ], "info" : { "version" : 1, "author" : "xcode" } }
/* * Copyright (c) 2015-2017,2019-2020 Yubico AB * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following * disclaimer in the documentation and/or other materials provided * with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */ #ifndef OPENSSL_UTIL_H #define OPENSSL_UTIL_H #include "openssl_types.h" #include "pkcs11y.h" CK_RV do_rand_seed(CK_BYTE_PTR data, CK_ULONG len); CK_RV do_rand_bytes(CK_BYTE_PTR data, CK_ULONG len); CK_RV do_rsa_encrypt(ykcs11_pkey_t *key, int padding, const ykcs11_md_t* oaep_md, const ykcs11_md_t* oaep_mgf1, unsigned char *oaep_label, CK_ULONG oaep_label_len, CK_BYTE_PTR data, CK_ULONG data_len, CK_BYTE_PTR enc, CK_ULONG_PTR enc_len); CK_RV do_store_cert(CK_BYTE_PTR data, CK_ULONG len, ykcs11_x509_t **cert); CK_RV do_generate_ec_key(int curve_name, ykcs11_pkey_t **pkey); CK_RV do_create_ec_key(CK_BYTE_PTR point, CK_ULONG point_len, int curve_name, ykcs11_pkey_t **pkey); CK_RV do_create_rsa_key(CK_BYTE_PTR mod, CK_ULONG mod_len, CK_BYTE_PTR exp, CK_ULONG exp_len, ykcs11_pkey_t **pkey); CK_RV do_create_public_key(CK_BYTE_PTR in, CK_ULONG in_len, CK_ULONG algorithm, ykcs11_pkey_t **pkey); CK_RV do_sign_empty_cert(const char *cn, ykcs11_pkey_t *pubkey, ykcs11_pkey_t *pvtkey, ykcs11_x509_t **cert); CK_RV do_create_empty_cert(CK_BYTE_PTR in, CK_ULONG in_len, CK_ULONG algorithm, const char *cn, CK_BYTE_PTR out, CK_ULONG_PTR out_len); CK_RV do_check_cert(CK_BYTE_PTR in, CK_ULONG in_len, CK_ULONG_PTR cert_len); CK_RV do_get_raw_cert(ykcs11_x509_t *cert, CK_BYTE_PTR out, CK_ULONG_PTR out_len); CK_RV do_get_raw_name(ykcs11_x509_name_t *name, CK_BYTE_PTR out, CK_ULONG_PTR out_len); CK_RV do_get_raw_integer(ykcs11_asn1_integer_t *serial, CK_BYTE_PTR out, CK_ULONG_PTR out_len); CK_RV do_delete_cert(ykcs11_x509_t **cert); CK_RV do_store_pubk(ykcs11_x509_t *cert, ykcs11_pkey_t **key); CK_KEY_TYPE do_get_key_type(ykcs11_pkey_t *key); CK_ULONG do_get_key_size(ykcs11_pkey_t *key); CK_ULONG do_get_signature_size(ykcs11_pkey_t *key); CK_BYTE do_get_key_algorithm(ykcs11_pkey_t *key); CK_RV do_get_public_exponent(ykcs11_pkey_t *key, CK_BYTE_PTR data, CK_ULONG_PTR len); CK_RV do_get_public_key(ykcs11_pkey_t *key, CK_BYTE_PTR data, CK_ULONG_PTR len); CK_RV do_get_modulus(ykcs11_pkey_t *key, CK_BYTE_PTR data, CK_ULONG_PTR len); CK_RV do_get_curve_parameters(ykcs11_pkey_t *key, CK_BYTE_PTR data, CK_ULONG_PTR len); CK_RV do_delete_pubk(ykcs11_pkey_t **key); CK_RV do_apply_DER_encoding_to_ECSIG(CK_BYTE_PTR signature, CK_ULONG_PTR len, CK_ULONG buf_size); CK_RV do_strip_DER_encoding_from_ECSIG(CK_BYTE_PTR data, CK_ULONG len, CK_ULONG sig_len); #endif
Send this page to someone via email Canada’s ambassador to China says there is a chill in relations between the two countries since the People’s Republic imprisoned two Canadians, but his top priority is winning their release and resetting the relationship. Dominic Barton offered that assessment in testimony on Wednesday before the special House of Commons committee studying the fraught relationship between the two countries, which was already tense when he was named to the post last fall. Barton said that his main concern is winning the release of Michael Kovrig and Michael Spavor, both detained by China in December 2018 in what is widely seen as retaliation for Canada’s arrest of Chinese high-tech executive Meng Wanzhou. The RCMP arrested Meng in Vancouver on an American extradition request and nine days later Kovrig and Spavor were detained and accused of violating China’s national security. Story continues below advertisement Neither Kovrig nor Spavor has seen a lawyer or been permitted visits from their families, while Meng has been released on bail and is living in a luxurious Vancouver home while her extradition hearing plays out. Barton says other priorities include clemency for Canadian Robert Schellenberg, who was given a death sentence in January 2019 after having been previously sentenced to prison for drug smuggling. 3:34 Freeland says detention of Kovrig, Spavor top of duties for new ambassador to China Freeland says detention of Kovrig, Spavor top of duties for new ambassador to China “The chill is real,” Barton said. He said both sides were shaking with anger during his first diplomatic meeting with Chinese officials. “The first conversation I had was probably one of the most unpleasant conversations I have ever had.” China has also blocked imports of Canadian agricultural products, lifting a months-long ban on Canadian pork and beef late last year, but it is still not allowing canola imports. Story continues below advertisement “I do think that was a punishment,” he said. Canada is trying to reverse China’s decision through an action in the World Trade Organization. While he said Canada has the support of some countries in its fight with China, he said he agreed with one questioner who asked him about the fact many more have not come to Canada’s defence. “I have a feeling like we are a bit alone in the world,” he said. “It was surprising to me.” Barton said he has now met with all three imprisoned Canadian men and is impressed with how they are holding up. He said he plans to make further personal visits. “I hope that our efforts will soon bear fruit,” he said, without elaborating. “I am unbelievably inspired by their resilience.” Opposition MPs on the committee clashed over whether Barton, not a career diplomat, was the right person for the job. His long tenure as the global managing director of consulting giant McKinsey & Co. drew sharp criticism from Conservative and New Democrat MPs. Story continues below advertisement Conservative MP Garnett Genuis said he was “a completely inappropriate choice as ambassador,” and said his time with the company — and the work it did for Chinese firms — raises a “big red flags for me.” 1:40 Crown lays out arguments at Meng Wanzhou extradition hearing Crown lays out arguments at Meng Wanzhou extradition hearing Genuis referred to a New York Times investigation from December 2018 that headlined how McKinsey held a lavish 2018 retreat in remote western China a short drive from where a large prison had been built to hold ethnic Muslim Uighurs. He asked Barton to submit a list of state-owned Chinese firms that McKinsey worked with. “I’m very proud of my career and time in the private sector,” Barton replied in a measured tone. “We’re known for telling truth to power.” NDP MP Jack Harris questioned whether the business relationship of Barton’s wife with Chinese firms was a problem. Story continues below advertisement Barton said he has been “extraordinarily diligent” with the government’s conflicts and ethics vetting. “My integrity matters a lot to me.” Bloc Quebecois MP Stephane Bergeron defended Barton, saying he could not hide his “unease” with the attacks on Barton. “The worst thing to do is to undermine the credibly of the person that is representing Canada before Chinese authorities,” said Bergeron. “You are very qualified for the delicate mission that has been given to you.” 0:54 Trudeau says Canada remains focused on Canadian citizens detained in China Trudeau says Canada remains focused on Canadian citizens detained in China The special committee was the result of a Conservative motion passed in December, supported by other opposition parties in the minority Parliament. It wants the prime minister, cabinet ministers and diplomats to appear as witnesses as the committee sees fit. Story continues below advertisement Barton was appointed last fall after a long career in business, which included working in China and across Asia. China also faces significant challenges despite its strong economic growth and its new assertive posture on the international stage, said Barton. These include poverty, a polluted environment and demographic challenges that come with being one of the world’s most quickly aging societies. Barton said he has not been shy about pressing Canada’s concerns over China’s human rights situation, singling out the treatment of China’s ethnic Muslim community. Human rights organizations have said that as many as one million ethnic Uighur Muslims in China’s western Xinjiang region have been rounded up and placed in camps. China says it is trying to re-educate and integrate the Uighurs to make them better contributors to Chinese society. “Journalists, diplomats, and Chinese civil society representatives I spoke to agree that 2019 witnessed an increased crackdown on dissent and on expressions of disagreement about China’s human rights record, within and outside the country,” Barton said. The government is concerned by the “credible reports of the mass detention, repressive surveillance, and family separation affecting Uighurs and other Muslim minorities in Xinjiang, under the pretext of countering extremism, terrorism and separatism.” Story continues below advertisement 0:56 Freeland stresses Canada will follow ‘rule of law’ in Meng Wanzhou case Freeland stresses Canada will follow ‘rule of law’ in Meng Wanzhou case
INTRODUCTION {#s1} ============ Osteoarthritis (OA) is a degenerative joint disease characterised by cartilage damage, subchondral bone remodelling and associated inflammation \[[@R1]\]. It is the most common form of arthritis and is accompanied by joint pain and stiffness, which can affect work and normal daily activities. Oral or topical nonsteroidal anti-inflammatory drugs or tramadol can relieve OA symptoms \[[@R2]\]. However, joint replacement surgery is often the only effective treatment for terminal OA. Considering that few pharmacological therapies can delay OA development, new strategies for the treatment of OA are urgently needed. Several studies have suggested that OA development is related to age, obesity, inflammation, trauma, and hereditary factors \[[@R3], [@R4]\], but the fundamental causes of OA remain unclear. Inflammatory cytokines such as interleukin (IL)-1β and tumour necrosis factor (TNF)-α have been reported to be involved in the development of OA \[[@R5]\]. Therefore, inhibition of inflammation may be effective in treating OA. However, newer biological therapies such as anti-TNF-α therapy are very expensive and could have numerous side effects \[[@R6]\]. Natural compounds have recently attracted increasing attention owing to their various bioactivities in human diseases. Several natural compounds including schisantherin A, thymoquinone, taraxasterol, sesamin, and astragalin have shown anti-OA properties \[[@R7]--[@R11]\], and our reach group has had a long-standing interest in the application of natural compounds \[[@R12]--[@R14]\]. Sanguinarine (SA), an alkaloid found in the roots of *Sanguinaria canadensis*, is approved by the U.S. Food and Drug Administration (FDA) \[[@R15]\]. It presents a wide range of biological activities including anti-inflammatory, antitumour, antimicrobial, anti-platelet, and anti-hypertensive effects, as well as inhibition of osteoclast formation \[[@R16]--[@R19]\]. *Sanguinaria*-containing toothpaste and oral rinse products have been used to reduce plaque and gingival inflammation \[[@R19]\]. In the present study, considering its widespread use and potential for suppressing inflammation, the therapeutic effect of SA against OA was investigated *in vitro*, *ex vivo*, and *in vivo* to determine its potential for future clinical applications. RESULTS {#s2} ======= Catabolic protease expressionin human cartilage tissue {#s2_1} ------------------------------------------------------ First, the expression of catabolic proteases in human cartilage tissue was evaluated. Safranin Orange staining was used to assess the cartilage samples. Compared with the cartilage samples from patients with OA, the cartilage tissue from healthy individuals contained more Safranin Orange-positive proteoglycan (Figure [1A](#F1){ref-type="fig"}). Second, the catabolic proteases were evaluated using immunohistochemistry. The results showed there were more catabolic proteases in the samples from patients with OA than in samples from patients without OA, based on the number of matrix metalloproteinase 1 (MMP1)-, MMP3-, MMP13-, and A disintegrin and metalloproteinase with thrombospondin motifs (ADAMTS)-5-positive cells (Figure [1B](#F1){ref-type="fig"} and [1C](#F1){ref-type="fig"}). The mRNA levels of MMP1, MMP3, MMP13, and ADAMTS-5 in the cartilage samples were consistent with the immunohistochemistry results (Figure [1D](#F1){ref-type="fig"}). ![Safranin Orange staining and expression of catabolic proteases and extracellular matrix proteins in cartilage samples from human patients with or without osteoarthritis (OA)\ **(A)** Safranin Orange staining of cartilage samples from human patients with or without OA. Scale bar = 100 mm. **(B)** Immunohistochemistry of matrix metalloproteinase (MMP)-1, MMP3, MMP13 and A disintegrin and metalloproteinase with thrombospondin motifs (ADAMTS)-5 in normal and OA human cartilage samples. Scale bar = 100 mm. **(C)** Quantification of MMP1-, MMP3-, MMP13 and ADAMTS-5-positive cells in normal and OA human cartilage samples. **(D)** Relative mRNA expression of MMP1, MMP3, MMP13 and ADAMTS-5 in OA and normal human cartilage samples; n = 6, \*p \< 0.05 and \*\*p \< 0.01 (Student\'s *t*-test).](oncotarget-08-62900-g001){#F1} Effects of SA on IL1-β-induced MMP1a, MMP3, MMP13, and ADAMTS-5 expression in chondrocytes {#s2_2} ------------------------------------------------------------------------------------------ Before investigating the effects of SA on IL1-β-induced MMP1a, MMP3, MMP13, and ADAMTS-5 expression in chondrocytes, the potential cytotoxicity of SA against chondrocytes was evaluated using the cell counting kit-8 (CCK-8) assay. The results showed that cell viability was not affected by SA at concentrations lower than 1.25 μM at both 24 and 48 h (Figure [2B](#F2){ref-type="fig"}). The calculated half-maximal inhibitory concentration (IC~50~) values for SA in chondrocytes at 24 and 48 h were 3.253 and 3.396 μM, respectively (Figure [2C](#F2){ref-type="fig"}). Therefore, 1.25 and 0.625 μM were chosen as the high and low doses, respectively, for chondrocyte treatment. At these doses, SA had no effect on the expression of SRY-box 9 (Sox9), collagen type II α 1 (COL2A1), and aggrecan in chondrocytes (Figure [2D](#F2){ref-type="fig"}). As shown in Figure [3A](#F3){ref-type="fig"}, the mRNA expression of MMP1a, MMP3, MMP13, and ADAMTS-5 increased following stimulation with IL-1β (10 ng/mL). However, SA significantly decreased the expression of catabolic proteases in a dose-dependent manner. Similar changes were confirmed using western blot analysis, as shown in Figure [3B](#F3){ref-type="fig"} and [3C](#F3){ref-type="fig"}. Taken together, these results demonstrate that SA suppressed the expression of IL1-β-induced catabolic proteases in a dose-dependent manner. ![Effects of sanguinarine (SA) on viability of chondrocytes\ **(A)** Chemical structural formula of SA. **(B)** Cells were cultured with 0--40 μM SA for 24 or 48 h, and viability was determined using a cell counting kit (CCK)-8 assay. **(C)** Calculated half-maximal inhibitory concentration (IC~50~) values of SA in chondrocytes for 24 or 48 h was 3.253 and 3.396 μM, respectively. **(D)** Cells were cultured with 1.25 or 0.625 μM SA; subsequent expression of SRY-box 9 (SOX9), collagen type II α 1 (COL2A1), and aggrecan were detected using quantitative real-time polymerase chain reaction (qPCR); n = 6, \*p \< 0.05 and \*\*p \< 0.01 versus control (one-way analysis of variance, ANOVA).](oncotarget-08-62900-g002){#F2} ![Sanguinarine (SA) inhibited interleukin (IL)-1β-induced matrix metalloproteinase-1 (MMP1), MMP3, MMP13, and A disintegrin and metalloproteinase with thrombospondin motifs (ADAMTS)-5 expression in chondrocytes\ **(A)** Effects of SA on mRNA expression of MMP1a, MMP3, MMP13, and ADAMTS-5 after treatment with IL-1β (10 ng/mL) for 24 h. **(B)** Western blot analysis of MMP1a, MMP3, MMP13, and ADAMTS-5 protein expression levels after treatment with different doses of SA (with or without IL-1 (10 ng/mL) stimulation) for 48 h. **(C)** Signal intensities of MMP1a, MMP3, MMP13, and ADAMTS-5 were detected using ImageJ program; n = 6, \*p \< 0.05 and \*\*p \< 0.01 versus IL-1β-stimulated group (one-way analysis of variance, ANOVA).](oncotarget-08-62900-g003){#F3} SA inhibits IL-1β-induced NF-κB and JNK activation in chondrocytes {#s2_3} ------------------------------------------------------------------ To elucidate the mechanism by which SA stimulated IL-1β-stimulated chondrocytes, we investigated the key signalling pathways such as those mediated by the mitogen-activated protein kinases (MAPKs), including extracellular signal-regulated kinase (ERK), p38, and Jun N-terminal kinase (JNK), and the NF-κB pathway, which are involved in the production of ADAMTSs and MMPs. As shown in Figure [4A](#F4){ref-type="fig"}, the MAPK and NF-κB pathways were clearly activated by IL-1β. However, phosphorylation of JNK and NF-κB decreased following treatment with SA. These observations were confirmed using quantitative analysis (Figure [4B](#F4){ref-type="fig"}). In contrast, SA showed no obvious effect on ERK and P38 activation. These results indicate that SA inhibited IL-1β-induced catabolic proteases, which involved the nuclear factor (NF)-κB and c-Jun N-terminal kinase (JNK) signalling pathways. ![Sanguinarine (SA) inhibits interleukin (IL)-1β-induced nuclear factor (NF)-κB and c-Jun N-terminal kinase (JNK) activation in chondrocytes\ **(A)** Chondrocytes were treated with or without 1.25 μm SA for 4 h and then 10 ng/mL IL-1β for indicated time. Phosphorylated (p)-p38, extracellular signal-regulated kinase (ERK), JNK, inhibitor of NF-Κb (IκB)-α, total p38, ERK, JNK, IκB-α, and β-actin were evaluated using western blot analysis. **(B)** Signal intensities of p-P38, ERK, JNK, and IκB-α were quantified and normalized to total ERK, P38, JNK, and IκB-α using ImageJ, n = 6, \*p \< 0.05 and \*\*p \< 0.01 versus IL-1β-stimulated group (Student\'s *t*-test).](oncotarget-08-62900-g004){#F4} Effect of SA on IL-1β-induced cartilage matrix degradation *ex vivo* {#s2_4} -------------------------------------------------------------------- Considering that SA inhibited the IL-1β-induced catabolic protease expression *in vitro*, we hypothesized that it could prevent IL-1β-induced cartilage matrix degradation *ex vivo*. Therefore, mouse knee joint cartilage was placed in an explant culture medium and stimulated with IL-1β to induce matrix degradation. Samples were then randomly divided into four groups and treated with PBS, IL-1β, and IL-1β with low or high concentration SA. The level of matrix degradation was evaluated using Safranin Orange staining. Compared to the IL-1β-treated group, the cartilage of the group simultaneously treated with IL1-β and SA exhibited more Safranin Orange-positive proteoglycan, which was dose-dependent (Figure [5A](#F5){ref-type="fig"}). We further investigated the expression of catabolic proteases in cartilage matrix using immunohistochemistry. Quantitative analysis demonstrated that SA significantly decreased the number of MMP1a-, MMP3-, MMP13-, and ADAMTS-5 positive cells (Figures [5A](#F5){ref-type="fig"} and [6B](#F6){ref-type="fig"}). The *ex vivo* findings indicate that SA protected cartilage against degradation partly by inhibiting MMP1a, MMP3, MMP13, and ADAMTS-5. ![Effect of sanguinarine (SA) on interleukin (IL)-1β-induced cartilage matrix degradation *ex vivo*\ **(A)** Safranin Orange staining of *ex vivo* cartilage samples. Scale bar = 100 mm. **(B)** Immunohistochemistry was performed to assess expression of matrix metalloproteinase (MMP)-1a, MMP3, MMP13, and A disintegrin and metalloproteinase with thrombospondin motifs (ADAMTS)-5 in different samples. Scale bar = 100 mm. **(C)** Quantification of MMP1a-, MMP3-, MMP13-, and ADAMTS-5-positive cells in different samples. Scales bar = 100 mm; n = 6, \*p \< 0.05 and \*\*p \< 0.01 versus IL-1β-stimulated group (one-way ANOVA). Control, dimethyl sulphoxide (DMSO); IL-1β, 10 ng/mL; L-SA, 10 ng/mL IL-1β+ 0.625 μM SA; H-SA, 10 ng/mL IL-1β + 1.25 μM SA.](oncotarget-08-62900-g005){#F5} ![Effect of sanguinarine (SA) on anterior cruciate ligament transection (ACLT)-induced osteoarthritis (OA)\ **(A)** Safranin Orange staining of cartilage samples 6 weeks after OA induction. Scale bar = 100 mm. **(B)** OARSI score of samples 6 weeks after OA induction. **(C)** mRNA expression of matrix metalloproteinase (MMP)-1a, MMP3, MMP13 and A disintegrin and metalloproteinase with thrombospondin motifs (ADAMTS)-5 in different groups; n = 6, \*p \< 0.05 and \*\*p \< 0.01 versus OA group (one-way analysis of variance, ANOVA). Control, sham group; OA, ACLT-induced OA group; L-SA, ACLT-induced OA treated with 0.625 μM intra-articularly administered SA twice a week; H-SA, ACLT-induced OA treated with 1.25 μM intra-articularly administered SA twice a week.](oncotarget-08-62900-g006){#F6} Effect of SA on anterior cruciate ligament transection (ACLT)-induced OA {#s2_5} ------------------------------------------------------------------------ The preceding results demonstrated the effect of SA on chondrocytes *in vitro* and *ex vivo*. To determine whether SA delayed the progression of OA *in vivo*, low and high concentrations were administered intra-articularly to mice with anterior cruciate ligament transection (ACLT)-induced OA. Six weeks after surgery, Safranin Orange staining was used to evaluate the degradation of the cartilage matrix. SA improved the cartilage surfaces of ACLT-induced OA mice in a dose-dependent manner (Figure [6A](#F6){ref-type="fig"}). Quantitative analysis using the Osteoarthritis Research Society International (OARSI) scoring indicated that even a low concentration of SA (0.625 μM) yielded significantly lower OARSI scores than those reported for the OA group (Figure [6B](#F6){ref-type="fig"}). The mRNA expression levels of MMP1a, MMP3, MMP13, and ADAMTS-5 were evaluated in each group (Figure [6C](#F6){ref-type="fig"}). The OA group showed higher levels of MMP1a, MMP3, MMP13, and ADAMTS-5 expression than the sham surgery control group did. Furthermore, treatment with SA decreases all of the catabolic proteases investigated and the immunohistochemistry results were consistent with the mRNA data (Figure [7A](#F7){ref-type="fig"} and [7B](#F7){ref-type="fig"}). These results indicated that SA could inhibit OA progression *in vivo*. ![Effect of sanguinarine (SA) on cartilage matrix degradation *in vivo*\ **(A)** Immunohistochemistry of matrix metalloproteinase (MMP)-1a, MMP3, MMP13, and A disintegrin and metalloproteinase with thrombospondin motifs (ADAMTS)-5 in cartilage samples 6 weeks after surgery. Scale bar = 100 mm. **(B)** Quantification of MMP1a-, MMP3-, MMP13-, and ADAMTS-5-positive-cells in cartilage samples 6 weeks after surgery; n = 6, \*p \< 0.05 and \*\*p \< 0.01 versus osteoarthritis (OA) group (one-way analysis of variance, ANOVA).](oncotarget-08-62900-g007){#F7} DISCUSSION {#s3} ========== SA has a long history of use in the treatment of infections and as an analgesic, expectorant, sedative, and emetic \[[@R20]\]. Recently, the anti-inflammatory effects of SA were reported in animal models of acetic acid-induced colitis and lipopolysaccharide (LPS)-induced endotoxic shock \[[@R21], [@R22]\]. The present study showed, for the first time, that SA might be useful in treating OA. Inflammatory cytokines are involved in the pathogenesis of OA. IL-1β is generated by inflamed synovium and invading leukocytes, and induces the release of MMPs and ADAMTS from both the synovium and cartilage \[[@R5], [@R23], [@R24]\]. This phenomenon is supported by our results, which showed that the expression of MMP1, MMP3, MMP13, and ADAMTS-5 was higher in samples from patients with OA than in those from patients without OA (Figure [1A](#F1){ref-type="fig"}). ADAMTS and MMPs are catabolic proteases capable of degrading all types of extracellular matrix proteins, and the proteoglycan aggrecan and COL2 are the two major structural components of the cartilage extracellular matrix \[[@R25]\]. In particular, ADAMTS-5 is regarded as the main enzyme contributing to the degradation of aggrecan \[[@R26], [@R27]\]. Among the MMPs, MMP1, MMP3, and MMP13 are the main proteases involved in the degradation of COL2 \[[@R28], [@R29]\]. Our results showed that SA decreased the expression of MMP1, MMP3, MMP13, and ADAMTS-5 in chondrocytes. ERK, JNK, and the NF-κB signalling pathways are well-known to be involved in the pathogenesis of OA \[[@R30], [@R31]\]. NF-κB and JNK signalling are the major upstream mediators of the expression of catabolic factors \[[@R32]\]. It has been shown that aggrecan degradation is mainly regulated by the JNK2 pathway \[[@R33]\]. Previous studies have demonstrated that the inhibition of MAPK and NF-κB activity reduces the production of inflammatory mediators in chondrocytes \[[@R8], [@R10]\]. In concurrence with these studies, we found that SA suppressed IL1-β-induced NF-κB and JNK activation, which presented a high level of specificity in repressing the production of catabolic factors. This finding is partially supported by the results of Chaturvedi et al. \[[@R34]\] that SA is a potent suppressor of NF-κB activation In addition, Niu et al. \[[@R35]\] found that SA inhibited the phosphorylation of p38 and ERK, which altered the synthesis and release of inflammatory mediators in peritoneal macrophages. In contrast, SA had no influence on p38 and ERK in our study. This is because the study by Niu et al. \[[@R35]\] investigated the effects of SA using peritoneal macrophages, while we demonstrated the SA-induced inhibition of IL1-β-induced NF-κB and JNK activation in chondrocytes. There is considerable scope for further investigation of the effects of SA against OA. First, we investigated the effects of SA on chondrocytes alone. The remodelling of subchondral bone and the associated inflammation in the synovium are typical pathological features of OA, and recent studies have shown that SA inhibited the formation of osteoclasts. Therefore, an investigation focusing on the subchondral bone and synovium would be required to completely elucidate the role of SA in OA. Furthermore, decreasing the frequency of intra-articular treatment administration with a more practical delivery system will be valuable for potential clinical applications. In conclusion, our study showed that SA suppressed the expression of catabolic proteases *in vitro*, *ex vivo*, and *in vivo*, indicating its potential value in the treatment of OA. MATERIALS AND METHODS {#s4} ===================== Chemicals and reagents {#s4_1} ---------------------- SA and dimethyl sulphoxide (DMSO) were purchased from Sigma-Aldrich (St Louis, MO, USA). Dulbecco\'s modified Eagle\'s medium (DMEM), foetal bovine serum (FBS), and penicillin/streptomycin were purchased from Gibco-BRL (Gaithersburg, MD, USA). The CCK-8 was obtained from Dojindo Molecular Technology (Kumamoto, Japan). SA was dissolved in DMSO and stored at −20°C. The experiments were carried out in the absence of visible light to prevent photosensitivity. SA was diluted with cell culture medium to obtain a final DMSO concentration \< 0.1% of the total volume. The following antibodies against ERK (sc-292838), c-Jun N-terminal kinase (JNK, sc-572), p38 (sc-535), phospho-ERK (Thr202/Tyr204, sc-16981), phospho-JNK (Thr183/Tyr185, sc-6254), phospho-p38 (Thr180/Tyr182, sc-17852), MMP3 (sc6839), MMP-13 (sc30073), ADAMTS-5 (sc83186), aggrecan (sc25674), and β-actin (sc25674) were from Santa Cruz (Santa Cruz, CA, USA). While antibodies against IκB-α (ab32518), phospho-IκB-α (ab133462), MMP1 (ab137332), and Col2A1 (ab34712) were purchased from Abcam (Cambridge, UK). All other reagents were purchased from Sigma-Aldrich (St Louis, MO, USA) unless stated otherwise. Human cartilage {#s4_2} --------------- Human cartilage samples were collected according to protocols approved by the Ethics Committee of Sir Run Run Shaw Hospital and the methods were carried out in accordance with the approved guidelines. Written informed consent was obtained from all subjects. Six control (healthy) cartilages were harvested from human cadavers without a history of OA while six pathological cartilages were acquired from patients with end-stage symptomatic knee OA at the time of surgery for total knee replacement. The human cartilage samples were graded based on the modified 5-point Collins scale. In the OA group, all the samples were classified as grade 3 while those in the control group were all grade 0. Human cartilage samples were obtained using previously described methods \[[@R13]\]. Cell culture {#s4_3} ------------ Primary articular cartilage was isolated from the femoral condyles and tibial plateaus of C57B/6 mice on postnatal day 5--6, according to a previous study \[[@R36]\]. Chondrocytes were cultured in DMEM containing 10% (v/v) FBS, 100 U/mL penicillin, and 100 μg/mL streptomycin at 37°C with 5% CO~2~. Third-passage cartilage cells were used in all of the experiments. Cell viability assay {#s4_4} -------------------- The cytotoxic effects of SA were assessed using CCK-8 assays. Chondrocytes were seeded in 96-well plates at a density of 8 × 10^3^ cells/well in triplicate and cultured in complete DMEM for 24 h. The cells were treated with different concentrations of SA (0, 0.15625, 0.3125, 0.625, 1.25, 2.5, 5, 10, 20, or 40 μM) for 24 or 48 h, 10 μL CCK-8 buffer was added to each well, and then the cells were incubated at 37°C for 2 h. This was followed by measurement of the absorbance at 450 nm (650 nm reference) using an ELX800 absorbance reader (Bio-Tek, Winooski, VT, USA). The cell viability was calculated relative to that of the control cells from the optical density (OD) data using the following formula: cell viability = (experimental group OD -- zeroing OD)/(control group OD -- zeroing OD). The experiments were performed six times, and the significance was determined as indicated in the figure legend. Quantitative real-time polymerase chain reaction (qPCR) {#s4_5} ------------------------------------------------------- Total RNA was extracted from chondrocytes or cartilage samples using the TRIzol reagent (Invitrogen Inc., Carlsbad, CA, USA) according to the manufacturer\'s instructions. cDNA was synthesized from 1 μg total RNA using reverse transcriptase (TaKaRa Biotechnology, Otsu, Japan). The real-time polymerase chain reaction (PCR) was performed using the SYBR Premix Ex Taq kit (TaKaRa, Biotechnology, Otsu, Japan) and an ABI 7500 sequencing detection system (Applied Biosystems, Foster City, CA, USA). The following cycling conditions were used: 40 cycles of denaturation at 95°C for 5 s and amplification at 60°C for 24 s. The relative level of expression of each target gene was calculated using the 2^−ΔΔCT^ method. Each real-time PCR included six different experimental samples. The data were represented as target gene expression normalized to the reference gene. Error bars indicate the SD of the mean of replicates. All pairs of primer sequences were designed using the primer 5.0 software and are listed in Table [1](#T1){ref-type="table"}. ###### Polymerase chain reaction (PCR) primers Gene Strand Primer sequences Origin ------------ --------- ---------------------------- -------- *GAPDH* forward 5′-AGGGCCCTGACAACTCTTTT-3′ human reverse 5′-AGGGGTCTACATGGCAACTG-3′ *MMP1* forward 5′-CAAGTGCTGTGGCACTGTTT-3′ human reverse 5′-ACTTGTCCCAGCATTGAACC-3′ *MMP3* forward 5′-CTGGGAAAATCAGCCATTGT-3′ human reverse 5′-AGGTTCTGGAGGGACAGGTT-3′ *MMP13* forward 5′-AACATCCAAAAACGCCAGAC-3′ human reverse 5′-TTGGCAATATGCAGAAGCAG-3′ *ADAMTS-5* forward 5′-TAGGCGTCTTTGGCTTCAGT-3′ human reverse 5′-GCTTTCAGGCTGACCAGTTC-3′ *Col2A1* forward 5′-CAACCAGACCGTGCTTTTCA-3′ human Reverse 5′-CAACCGTAGCAATCGACCAG-3′ *Aggrecan* forward 5′-TCCCCGTAGAAGAGGAGACA-3′ human reverse 5′-AAGACAGGGGTATGCAGCTT-3′ *GAPDH* forward 5′-ACCCAGAAGACTGTGGATGG-3′ mouse reverse 5′-CACATTGGGGGTAGGAACAC-3′ *MMP1a* forward 5′-CTAAGGCAGGAGGATTGCTG-3′ mouse reverse 5′-TGCGAAGGGCTTAGTGTCTT-3′ *MMP3* forward 5′-CTCAGAGGAGCAAGGGTTTG-3′ mouse reverse 5′-CAACTGCGAAGATCCACTGA-3′ *MMP13* forward 5′-GAGCCACAGATGAGCACAGA-3′ mouse reverse 5′-ATGTAAGGCCACCTCCACTG-3′ *ADAMTS-5* forward 5′-CAAGTTAGCTGGCTGGGAAG-3′ mouse reverse 5′-TCCAGATGCAGCAAACAAAG-3′ *Sox 9* forward 5′-AGAAAGGAGTGAGGGGGTGT-3′ mouse reverse 5′-TGCCGGTTCTCAGTAGCTTT-3′ *Col2A1* forward 5′-CTGGGCCACAGGTGAGTATT-3′ mouse reverse 5′-CCAGGATACCAACTGCCTGT-3′ *Aggrecan* forward 5′-AAGGACGAGTTCCCTGGAGT-3′ mouse reverse 5′-CTGGGGATGTCGCATAAAAG-3′ Western blot analysis {#s4_6} --------------------- To investigate the effect of SA on the IL1-β-induced expression of MMP1, MMP3, MMP13, and ADAMTS-5, chondrocytes were seeded in six-well plates at a density of 5 × 10^5^ cells/well. When the cells were confluent, they were treated with SA with and without IL-1 (10 ng/mL) stimulation, for 48 h. Then, total protein was extracted from cultured cells using radio-immunoprecipitation assay (RIPA) lysis buffer (Sigma-Aldrich, St Louis, MO, USA) containing 50 mM Tris-hydrochloride (HCl), 150 mM sodium chloride (NaCl), 5 mM ethylenediaminetetraacetic acid (EDTA), 1% Triton X-100, 1 mM sodium fluoride, 1 mM sodium vanadate, 1% deoxycholate, and a protease inhibitor cocktail. Lysates were centrifuged at 12,000 × g for 15 min, and the supernatants that contained the proteins were collected. To examine the target signalling pathway of SA, chondrocytes were seeded in six-well plates at a density of 5 × 10^5^ cells/well. When the cells were confluent, they were either untreated or pre-treated with 1.25 μM SA for 4 h. The cells were then stimulated with 10 ng/mL IL1-β for 0, 10, and 30 min, followed by the collection of the total protein as above. Protein concentrations were determined using the bicinchoninic acid (BCA, Thermo Fisher, Waltham, MA, USA) assay. Then, 30 μg of each protein lysate was resolved using 10% sodium dodecyl sulphate-polyacrylamide gel electrophoresis (SDS-PAGE, Sigma-Aldrich, St Louis, MO, USA) and then transferred to polyvinylidene difluoride membranes (Millipore, Bedford, MA, USA). Then, the membranes were blocked with 5% skimmed milk in Tris-buffered saline plus Tween (TBST, 0.05 M Tris/0.15 M NaCl \[pH 7.5\] and 0.2% Tween-20; Invitrogen, San Diego, CA, USA) for 1 h, and then incubated with primary antibodies diluted in 1% (w/v) skimmed milk in TBST overnight at 4°C. The membranes were then washed and incubated with the appropriate secondary antibodies conjugated with IRDye 800CW (molecular weight: 1162 Da). The antibody reactivity was detected via exposure in an Odyssey infrared imaging system (LI-COR, Inc., Lincoln, NE, USA). Quantitative analysis of the band intensity was carried out using the ImageJ software. Cartilage explant cultures {#s4_7} -------------------------- The animal experiments in this study were performed in accordance with the principles and procedures of the National Institutes of Health (NIH) Guide for the Care and Use of Laboratory Animals and the guidelines for animal treatment of Sir Run Run Shaw Hospital. All experimental protocols in this study were approved by the Ethics Committee of Sir Run Run Shaw Hospital. Femoral condyle cartilage was obtained from 12-week-old C57BL/6 mice without the bone, periosteum, or synovium and cultured in DMEM containing 10% FBS (v/v), antibiotics, and 2 mM L-glutamine (Invitrogen) in 5% CO~2~ at 37°C. After 2 days of culturing, the explants were washed with serum-free medium and dispensed into tissue-culture dishes with serum-free medium containing 10 ng/mL IL1-β with or without 0.625 or 1.25 μM SA. Furthermore, there were six explants in each group, and after a 72-h incubation, the samples were removed from the culture wells and fixed in 10% formalin. ACLT surgery-induced OA and intra-articular delivery of SA {#s4_8} ---------------------------------------------------------- Twenty-four 8-week-old male C57BL/6 mice were divided into four groups and those in group I underwent a sham knee surgery. The mice in the other three groups were subjected to ACLT surgery of the knees, as previously described \[[@R37]\]. Then, 10 days later, intra-articular injections of normal saline (group II), low- and high-dose SA (0.625 and 1.25 μM, groups III and IV, respectively) were administered to the mice twice a week. Six weeks later, the distal femur of each mouse was dissected, embedded in paraffin, and examined using Safranin Orange and immunostaining. Histological analysis and immunohistochemistry of murine knee joints {#s4_9} -------------------------------------------------------------------- The knee joints were examine using histological and immunohistochemical assays. We used 4% (v/v) neutral buffered formalin to fix the tissue samples for 24 h and neutral 10% EDTA solution to decalcify for 1 month at room temperature. Next, the samples were dehydrated in a graded series of ethanol solutions, embedded in paraffin blocks, and sagittal serial sections were cut from across the entire knee joint. Six 8-μm histological sections from different depths of each joint were cut at five-slide intervals, stained with Safranin O-fast green, and then the OARSI histopathology grading and staging system was used to grade the tissue degeneration \[[@R38]\]. Five sequential sections per joint from each group were immunostained. The sections were incubated at 4°C with antibodies against MMP1, MMP3, MMP13, and ADAMTS-5 overnight, and then incubated for 2 h at room temperature with the secondary antibodies (Beyotime Institute of Biotechnology Inc., Jiangsu, China). The number of positively stained cells on the entire articular surface (including the femoral condyle and tibial plateau area) per specimen was counted and the percentage positive cells was calculated \[[@R12]\]. Statistical analysis {#s4_10} -------------------- All data are presented as the mean ± standard deviation (SD). The statistical data were analysed using a one-way analysis of variance (ANOVA)/Tukey\'s post-hoc test or Student\'s *t*-tests. A \*p \< 0.05 or \*\*p \< 0.01 was considered statistically significant. This study was sponsored by grants from the National Nature Science Fund of China (81171739, 81101378, 81271971, 81271972, 81601925 and 31270997), the Natural Science Fund of Zhejiang Province (Y2110372), funds of the Science and Technology Department of Zhejiang Province (2009C03014-1), and the Zhejiang Provincial Program for the cultivation of high-level innovative health talents. Medical Science and Technology Project of Zhejiang Province (2017179447). **CONFLICTS OF INTEREST** All authors declare that they have no conflicts of interest.
Ray Gun November 26th marks the return of the Ray Gun. On the Miiverse post it is pointed out that the smash logo is reversed because the gun will function like a stamp. Possibly shooting lasers of the logo in the correct position.
Control of protein synthesis in yeast mitochondria: the concept of translational activators. Mitochondria contain their own genome which codes for a small number of proteins. Most mitochondrial translation products are part of the membrane-embedded reaction centers of the respiratory chain complexes. In the yeast Saccharomyces cerevisiae, the expression of these proteins is regulated by translational activators that bind mitochondrial mRNAs, in most cases to their 5'-untranslated regions, and each mitochondrial mRNA appears to have its own translational activator(s). Recent studies showed that these translational activators can be part of feedback control loops which only permit translation if the downstream assembly of nascent translation products can occur. In several cases, the accumulation of a non-assembled protein prevents further synthesis of this protein but not translation in general. These control loops prevent the synthesis of potentially harmful assembly intermediates of the reaction centers of mitochondrial enzymes. Since such regulatory feedback loops only work if translation occurs in the compartment in which the complexes of the respiratory chain are assembled, these control mechanisms require the presence of a translation machinery in mitochondria. This might explain why eukaryotic cells maintained DNA in mitochondria during the last two billion years of evolution. This review gives an overview of the mitochondrial translation system and summarizes the current knowledge on translational activators and their role in the regulation of mitochondrial protein synthesis. This article is part of a Special Issue entitled: Protein import and quality control in mitochondria and plastids.
A Closer Look at the Higgs Boson By FRANK JORDANS and JOHN HEILPRINAssociated PressGENEVAScientists working at the world’s biggest atom smasher near Geneva have announced they are confident that the new subatomic particle discovered last summer is a version of the long-sought Higgs boson. The particle bears key attributes of the so-called “God particle” that was theorized nearly a half-century ago as fundamental to the creation of the universe. It took thousands of scientists from around the world to hunt the particle in the atom-smasher operated by CERN, the European Organization for Nuclear Research. advertisement WHAT EXACTLY IS THE GOD PARTICLE? Everything is made of atoms, inside of which are electrons, protons and neutrons. And those, in turn, are made of quarks and other subatomic particles. Scientists have wondered how these tiny building blocks of the universe acquire mass. Without mass, the particles wouldn’t hold together _ and there would be no matter. One theory proposed by British physicist Peter Higgs and teams in Belgium and the United States nearly a half-century ago is that a new particle must be creating a “sticky” energy field that acts as a drag on other particles. The atom-smashing experiments have now confirmed that this particle exists in a form that is similar to _ but perhaps not exactly like _ what was proposed. WHY DOES THIS MATTER? The Higgs is part of many theoretical equations underpinning scientists’ understanding of how the world came into being. If the particle didn’t exist, then those theories would have needed to be fundamentally overhauled. The fact that it does exist, in some form, means scientists have been on the right track with their theories. So far the measurements seem to line up with was expected under the so-called Standard Model of particle physics. This is disappointing for scientists who were hoping to see new discoveries including a theory known as “super-symmetry” where particles don’t just come in pairs _ think matter and anti-matter _ but quadruplets, all with slightly different characteristics. HOW MUCH DID IT COST? CERN’s atom smasher, the Large Hadron Collider, which forms a 17-mile (27-kilometer) tunnel beneath the Swiss-French border, cost some $10 billion to build and run. This includes the salaries of thousands of scientists and support staff around the world who collaborated on the two experiments that independently pursued the Higgs. WHAT IF ANY PRACTICAL RESULTS MIGHT COME FROM THE SEARCH? None directly. But the massive scientific effort that led up to the discovery paid off in other ways, including the creation of the World Wide Web. CERN scientists developed it to make it easier to exchange information among each other. The vast computing power needed to crunch all of the data produced by the atom smasher also boosted the development of distributed _ or cloud _ computing, that is now entering mainstream services. Advances in solar energy capture, medical imaging and proton therapy _ used in the fight against cancer _ also resulted from the work of particle physicists at CERN and elsewhere. WHAT COMES NEXT It remains an open question, CERN says, whether this is exactly the Higgs boson of the Standard Model of particle physics, or possibly the lightest of several bosons predicted in some theories that go beyond the Standard Model. Finding the answer to this question will take time, as scientists keep probing the new particle until they fully understand how it works. And in doing so, they hope to understand the 96 percent of the universe that remains hidden from view. This may result in the discovery of new particles and even unknown forces of nature.
87, -136897, -171087, -205251? -239383 What comes next: -6047, -24198, -54451, -96806, -151263, -217822, -296483? -387246 What is the next term in -242132, -242127, -242122? -242117 What is the next term in -6658, -13292, -19924, -26554, -33182? -39808 What is the next term in 15497, 31101, 46703, 62303, 77901, 93497? 109091 What comes next: 501915, 501914, 501913, 501912? 501911 What is the next term in 3114, 3329, 3688, 4191, 4838, 5629? 6564 What is next in -370, -400, -446, -508? -586 What is the next term in -3345, -3155, -2965, -2775? -2585 What is next in -8, -161, -598, -1463, -2900, -5053, -8066? -12083 What is next in 132, 237, 280, 231, 60, -263, -768, -1485? -2444 What comes next: -1284476, -2568964, -3853440, -5137898, -6422332, -7706736, -8991104? -10275430 What comes next: 1977, 4597, 7217, 9837, 12457? 15077 What is next in -2287, -9137, -20553, -36535, -57083? -82197 What comes next: -307, -356, -405, -454, -503? -552 What is next in 308, 578, 774, 860, 800, 558, 98? -616 What is next in 140388, 561602, 1263626, 2246460, 3510104, 5054558, 6879822? 8985896 What comes next: -680714, -680717, -680720, -680723, -680726, -680729? -680732 What comes next: -1027, -1735, -2443, -3151, -3859? -4567 What is next in 320, 727, 1222, 1805, 2476, 3235, 4082? 5017 What is the next term in 3533, 14097, 31705, 56357, 88053? 126793 What comes next: 1214, 1742, 2270, 2798, 3326, 3854? 4382 What is the next term in -865, -907, -987, -1123, -1333, -1635? -2047 What is next in -162, -614, -1374, -2454, -3866? -5622 What is next in 295, 304, 319, 340? 367 What comes next: 791, 1570, 2327, 3050, 3727, 4346? 4895 What is next in 2212, 3974, 5736, 7498? 9260 What comes next: -240, -243, -246? -249 What is the next term in -71, -168, -365, -674, -1107, -1676, -2393, -3270? -4319 What is the next term in 6191, 12602, 19013, 25424, 31835? 38246 What is the next term in 217, 393, 505, 529, 441, 217, -167? -735 What is the next term in -32, -4, 72, 196, 368, 588, 856? 1172 What comes next: -3750, -15062, -33926, -60336, -94286, -135770, -184782? -241316 What is the next term in 5677, 5685, 5685, 5677, 5661? 5637 What is the next term in 1080, 959, 832, 693, 536, 355, 144? -103 What is the next term in 649, 1269, 1885, 2497, 3105, 3709? 4309 What is the next term in -158, -266, -256, -68, 358, 1082? 2164 What is next in 1293, 2478, 3651, 4806, 5937, 7038, 8103, 9126? 10101 What is next in -40330, -80666, -121002, -161338, -201674? -242010 What comes next: -1333, -1299, -1247, -1177, -1089, -983, -859? -717 What comes next: -1319, -1644, -2185, -2942, -3915? -5104 What is the next term in 24969, 24971, 24973? 24975 What is the next term in -69, -255, -561, -987? -1533 What comes next: 664483, 664489, 664497, 664507? 664519 What is the next term in -994439, -994440, -994441, -994442? -994443 What is next in -20, -84, -232, -500, -924? -1540 What is the next term in 2505, 10001, 22497, 39999, 62513, 90045, 122601? 160187 What comes next: 120, 614, 1438, 2592, 4076? 5890 What is the next term in 5, 7, 11, 11, 1, -25, -73? -149 What comes next: -351, -1267, -2737, -4761? -7339 What comes next: 27728, 27729, 27730? 27731 What is the next term in -657, -692, -749, -840, -977? -1172 What comes next: -751, -630, -511, -394, -279? -166 What is next in 5516, 5651, 5786, 5921, 6056, 6191? 6326 What comes next: -587, -685, -853, -1091? -1399 What is the next term in 43, 155, 321, 541, 815, 1143, 1525? 1961 What is next in -106, -64, -22, 20? 62 What comes next: 8942, 8944, 8946, 8948, 8950, 8952? 8954 What is next in -39577, -39608, -39639, -39670? -39701 What is next in 18, 199, 718, 1749, 3466, 6043? 9654 What comes next: -14, 1384, 5622, 14122, 28306? 49596 What comes next: -329440, -329439, -329438? -329437 What is next in -4038, -4021, -3978, -3897, -3766? -3573 What comes next: 17432, 69776, 157020, 279170, 436232, 628212? 855116 What is next in -2451, -4906, -7361, -9816, -12271? -14726 What is the next term in -2286, -4579, -6872, -9165, -11458? -13751 What comes next: -180734, -361467, -542198, -722927, -903654, -1084379? -1265102 What is the next term in 90, 123, 164, 213, 270, 335? 408 What is next in -4196, -4447, -4858, -5423, -6136, -6991, -7982? -9103 What is the next term in 1670, 3337, 5004? 6671 What is the next term in 31, 68, 159, 328, 599, 996? 1543 What is the next term in 1426, 1438, 1450, 1462, 1474, 1486? 1498 What comes next: 76208, 76215, 76226, 76241, 76260? 76283 What is next in 16222, 32443, 48664, 64885, 81106, 97327? 113548 What is the next term in -58717, -234870, -528459, -939484, -1467945? -2113842 What is the next term in 1187, 1097, 949, 743, 479, 157? -223 What is the next term in 61, 126, 237, 394, 597? 846 What is next in 1398, 1946, 2492, 3036? 3578 What comes next: -11152, -10980, -10808, -10636? -10464 What is the next term in 530, 0, -530, -1060, -1590, -2120? -2650 What is next in -95, -533, -1273, -2315, -3659, -5305, -7253? -9503 What is the next term in -711, -1444, -2181, -2922, -3667, -4416, -5169? -5926 What is the next term in 3, -220, -873, -2172, -4333, -7572, -12105, -18148? -25917 What is the next term in 231, 1467, 4811, 11319, 22047, 38051, 60387? 90111 What comes next: -7455, -7547, -7639, -7731, -7823, -7915? -8007 What is next in 1357138, 1357133, 1357116, 1357081, 1357022, 1356933, 1356808, 1356641? 1356426 What comes next: 9169, 8899, 8629, 8359? 8089 What is next in 9614, 38166, 85752, 152372? 238026 What is next in -286, -276, -260, -238, -210? -176 What is next in -240, -489, -722, -933, -1116, -1265? -1374 What comes next: -92, -541, -1348, -2507, -4012? -5857 What comes next: 1597, 1671, 1749, 1831, 1917, 2007? 2101 What is next in 17168, 17170, 17186, 17222, 17284, 17378, 17510? 17686 What is next in 1260, 1275, 1290? 1305 What comes next: 1204, 739, 274, -191? -656 What is the next term in 82375, 82374, 82373, 82372? 82371 What is next in -739, -498, -271, -64, 117? 266 What comes next: 190695, 381388, 572081, 762774, 953467? 1144160 What is the next term in 4677, 9426, 14175, 18924, 23673, 28422? 33171 What is the next term in -21, 8, 125, 372, 791, 1424, 2313, 3500? 5027 What is next in 12467, 12445, 12415, 12377, 12331? 12277 What comes next: -810, -1816, -2822, -3828, -4834? -5840 What comes next: -180, -400, -620, -840, -1060? -1280 What is next in 11223, 22440, 33657, 44874, 56091, 67308? 78525 What is next in -2598, -10368, -23324, -41472, -64818, -93368? -127128 What comes next: -1132, -2282, -3438, -4600, -5768? -6942 What is next in -645339, -645351, -645365, -645381, -645399? -645419 What is the next term in 1136, 1110, 1064, 986, 864? 686 What is the next term in 6481273, 6481271, 6481269, 6481267, 6481265? 6481263 What comes next: 8209, 8198, 8183, 8164, 8141? 8114 What is next in 6233, 6225, 6217? 6209 What comes next: 1797, 3610, 5423, 7236? 9049 What comes next: -1600, -3151, -4626, -5989, -7204, -8235, -9046, -9601? -9864 What comes next: 5508, 5509, 5510? 5511 What is next in 576, 697, 892, 1155, 1480, 1861, 2292, 2767? 3280 What is the next term in 445, 889, 1333, 1777, 2221, 2665? 3109 What is next in -1341048, -1341050, -1341052, -1341054? -1341056 What is the next term in 108, 548, 1280, 2304? 3620 What is the next term in 118, 423, 954, 1717, 2718, 3963? 5458 What is next in 14009, 28020, 42031, 56042? 70053 What comes next: 92, 553, 1804, 4241, 8260, 14257, 22628? 33769 What comes next: -2152, -8472, -18960, -33616, -52440, -75432, -102592? -133920 What is next in -452533, -452535, -452537? -452539 What is next in -1603, -1671, -1739, -1807, -1875? -1943 What comes next: 74741, 74749, 74757, 74765, 74773? 74781 What is the next term in 8668, 8630, 8592, 8554, 8516? 8478 What comes next: -6226, -12465, -18714, -24973? -31242 What is the next term in 2242, 2026, 1658, 1132, 442? -418 What is next in 175647, 175658, 175683, 175728, 175799, 175902, 176043, 176228? 176463 What is next in 1182, 1225, 1298, 1401, 1534, 1697, 1890? 2113 What is next in -9067, -9064, -9067, -9082, -9115, -9172, -9259, -9382? -9547 What is the next term in -30617, -61235, -91853? -122471 What is the next term in -81, -184, -299, -426? -565 What is next in -147219, -147221, -147225, -147231, -147239?
One of the men charged in the first-degree murder of a McMaster University student says police have a video of the killing — and he's not the one pulling the trigger. Josh Barreira, one of six accused in the shooting death of Tyler Johnson, says security cameras captured the moment of the murder and show one of his co-accused firing the fatal shot. He says the co-accused pulls a gun from the waistband of his pants, "pivots and walks right past me toward Tyler." According to Barreira, the video then shows his co-accused being punched in the face by Tyler. "He stumbles down, gets back up and shoots him ... He shoots him once." Tyler, who had just earned a scholarship for a master's degree in mechanical engineering at Mac, was gunned down Nov. 30, 2013, outside Vida La Pita on King Street West. Tyler was 30. Barreira, 26, his brother Brandon Barreira, 19, Chad Davidson, 34 and Louis Rebelo, 26 are charged with first-degree murder. Jennifer Dagenais, 28, (Josh's partner), and Ashley Dore-Davidson, 27, (Chad's partner), are charged with being an accessory after the fact to murder. Police described Tyler's murder as a "co-ordinated attack carried out by a number of suspects." Barreira requested I visit him at the Hamilton-Wentworth Detention Centre so he could tell me about the video. He says it proves he is innocent of murdering Tyler. "Just being with somebody when they kill somebody is not a crime," he says. "Why am I in jail?" I spent an hour with Barreira. He has a shaved head, a bit of facial hair, tattoos on his arms, black rimmed glasses. He spoke softly and slowly. His claim of innocence is interesting on many levels. First, it has never been made public that the moment of the murder was captured on video. Tyler's mom Linda Johnson confirms it is true. She says she has been told what is on the video but has not been able to bring herself to watch her son's final moments. "For obvious reasons," she says. Neither Barreira's lawyer, Daniel Moore of Toronto, assistant Crown attorney Cheryl Gzik, nor Hamilton police Staff Sergeant Paul Hamilton would confirm the murder is on video. Hamilton, the major case manager, did say however that the brief video images police released at the time of the murder in the hopes of identifying suspects was only "a snippet" of the video they have. Barreira says he has his own copy of the video with him at the jail, part of the disclosure he requested from police. (Usually it is defence counsel who receives the disclosure. In this case, it appears Barreira has a copy as well.) I have not seen the video so I am not going to name the man Barreira alleges pulled the trigger. The existence of the video is also interesting because of what it may mean for the men accused of murder. Barreira believes it proves only one of the four is guilty, because one person pulled the trigger. Barreira says he is innocent, but was in the wrong place at the wrong time. (Selling crack cocaine, he says, to the very same co-accused he alleges shot Tyler.) He admits to driving away in his own car with the three other accused murderers. "Everyone runs down and hops in my Jaguar," says Barreira. The shooter gets in and yells to him, "Yo, dog, get in the car!" Barreira tells me the shooter fired two shots at him too, to force him into his car. "Missed both times, thank God. I heard them hit the wall behind me. I told this to police." Those shots, he says, were not captured on video. When I ask Hamilton about shots fired at Barreira, he says detectives investigated all leads. Barreira admits to being within feet of Tyler when he was shot. He admits to driving away from the scene with all of the accused in his car and admits to not reporting any of it to police. "Yes, I'm guilty of accessory after the fact to murder," he tells me. Loading... Loading... Loading... Loading... Loading... Loading... I do not know if Barreira is guilty of first-degree murder. What I do know, however, is you do not have to squeeze the trigger to be found guilty of it. If you actively participate in a murder — plan it, act as a lookout, provide the weapon, drive the getaway car, for example — you can be charged with first-degree murder. Barreira's claim is also interesting because of his past. He admits to having a hefty criminal record: trafficking convictions for selling cocaine and weed; break-ins, possession of stolen property and possession of a firearm. He was also charged, in 2008, with conspiracy to commit murder. He and two others were accused of plotting to kill a Hamilton man. Police stumbled on the plan while investigating the 2006 murder of Michael Walsh in a Waterdown hotel. Barreira eventually pleaded to the lesser charge of counselling to commit murder. Barreira was the target of a home invasion in 2006 when three men burst into his father's West Avenue house looking for drugs and money. Barreira was shot in the chest, his dad took a bullet in the leg. Barreira says that in the hours before the invasion, he and friends were drinking at his dad's place. One of those friends was Tyler. Everyone had cleared out by the time the invasion happened, but Tyler reappeared later that night at the hospital. He came there, says Barreira, to watch over him. Barreira nearly died that night. "The bullet's still lodged in my heart," he says. Tyler's mom calls Barreira "a scumbag liar." She insists Tyler was not there on the day of the invasion and they didn't know each other. Barreira says he and Tyler knew each other for years. They met, he says, when he was 15, though a group of guys involved "in gang stuff." Tyler was a few years older. "He was a Cripp," says Barreira. "He was the one we were all trying to be like ... He was a tough guy. If we were out and we got into a fight, we were going to win if Tyler was with us." He calls Tyler "T." Again, Tyler's mom says Barreira is lying. Her son was never in a gang. "Tyler's not here to defend himself," she says angrily. Barreira says Tyler got out of the gang. They bumped into each other occasionally. He saw Tyler and his mom at Ikea once and had lunch with them. Tyler's mom says that never happened. The jail guards warn us our time is up. Barreira tells me seeing Tyler die has affected him. He has post-traumatic stress disorder and is on medication for it, he says. "I'm starting to have dreams," he says. "I see Tyler standing by my bed saying, 'Hey bro, what? You couldn't save me?'" - Clairmont: Tears as mom accepts slain son's degree from Mac
African Commission Passes Resolution to Protect Sacred Natural Sites Benin is one of the few African countries that legally recognize Sacred Natural Sites. Natural Justice works with local partners to support the custodians of these forests, for example through the development of community protocols. Resolution calls on state parties to recognise sacred natural sites and territories and their customary governance systems. In this resolution, the African Commission recognises that sacred natural sites are one of the oldest forms of cultural conservation, and often harbour rich biodiversity. It highlights the role that custodian communities and their customary systems play in preserving traditional values, and that they require legal recognition and support to do so. At the same time, it expresses concern about the continued rapid growth of environmentally damaging industrial activity and infrastructure development causing irreparable damage in these sacred sites. The Resolution therefore calls on state parties to recognise sacred natural sites and territories and their customary governance systems, as well as to uphold their commitments under regional and international law and the rights of custodian communities. It urges state parties and other stakeholders, including businesses, to recognise and respect the intrinsic value of sacred natural sites and territories. In developing this resolution, the African Commission drew on a “Call for Legal Recognition of Sacred Natural Sites and Territories, and their Customary Governance Systems”, which carried the voices of custodian communities from six African countries. Natural Justice was able to facilitate the presentation of this report by the Gaia Foundation to the African Commission’s Working Group on Indigenous Populations/Communities. In a joint press release with the African Biodiversity Network, Liz Hoskins, the Director of the Gaia Foundation, states that “in this landmark resolution, the African Commission opens a space for affirming plurilegal systems, which recognise the Earth as the primary source of law. The Commission positions itself with other progressive initiatives to transform the dominant industrial jurisprudence and recognize indigenous rights and Nature’s rights.”
Marijuana-Infused Vodka and Other Pot Recipes This week, several interested parties asked, "How do I bake with pot?" A timely question, with the recent passage of Prop 203 and the potential business opportunities for supplying baked goods to medical marijuana dispensaries. Budding entrepreneur, are you? (Note: We're not saying we've tried any of this firsthand. That would be illegal -- for a while longer here in Arizona, anyway.) Quality baking results depend on an understanding of the chemical reactions of ingredients and the time, baking temperature, and methods applied to those ingredients. The THC (a psychoactive substance) in marijuana is not water-soluble. Adding ground pot to a recipe adds only the unpleasant texture of the ground weed, not the THC. more on pot baking techniques -- and a recipe for pot-infused vodka! -- after the jump THC is soluble in fat and alcohol. To bake or cook with marijuana successfully, butter, oil or alcohol is used to extract the active ingredients and act as a transfer agent. The potency of the "bud butter", oil or alcohol depends on the potency and the quantity of the marijuana. Ingesting marijuana had a different effect than smoking. Eating marijuana baked goods or foods is preferred to smoking by medical marijuana users because of the harm of smoking on the body. Ingested marijuana delivers a longer-term experience than smoking, a benefit for use in control of pain and nausea. The caveat in eating versus smoking is that you must take care in the quantity of consumption. When smoking pot, the user quickly takes notice of the impact of the pot. Pot that is ingested takes from 30 to 90 minutes to take effect. In other words, ingesting doesn't give a quick high, be patient not greedy. Clarify butter: In a medium heavy bottom saucepan, over medium heat, slowly bring the butter to a boil. Reduce the heat. Skim the foam from the top with a fine mesh strainer. Discard the foam. Continue to remove any foam that forms. Cool. Clean the saucepan. Add the clarified butter and several ounces of finely ground marijuana to the pan. Heat the mixture over medium low heat, slowly, cook together until the mixture is slightly thick, is green in color and gives off an herbal aroma. Strain the mixture through a fine mesh strainer. The strained weed can be discarded or saved and simmered with milk, alcohol and honey for hot toddy. In a large saucepan combine water, clarified butter or ghee and marijuana. Bring mixture to a low boil and boil for 30 minutes. Skim the foam and ground weed from the mixture. Cool and refrigerate until the butter solidifies. Skim the butter from the surface. Discard the water. Notes on technique: Make sure to grind buds to a powder. Do not rush cooking time by turning up the heat. Longer, slower cooking is recommended for Method I. Infused Oil 1 oz marijuana buds 2 cups canola oil Place the buds in a large heavy bottomed saucepan Cover with oil Heat the mixture, keeping the oil below boiling point Stir mixture occasionally The color of the oil will change from a light green to a darker almost brown color during the cooking time. Cook on low heat (DO NOT ALLOW TO BOIL) for 2 hours. Strain the mixture through a fine mesh strainer into a sterilized jar. Cool to room temperature. Tightly seal the jar and store in a cool dark place. Alcohol Infusion 1/8 oz of marijuana buds 1 litre vodka Place the marijuana in a clean large bowl. Pour vodka over the buds. Cover the mixture tightly. Store the mixture for 2 weeks. Strain the vodka through a fine mesh strainer removing all the debris. Store in a sterilized air- tight jar with a tight fitting lid.Note: This mixture is ONLY recommended to be use as an ingredient in beverage mixtures or baking, not to be consumed on its own.
TLE Optional Top Lip or (TLE) This optional plate increases the standard 3" lip to become 9", allowing the ramp to clear the rear bumper of SUVs and vans by simply attaching to the top lip. Shipped as a pair.
Keith Storey Keith Storey (15 May 1905 – 6 August 1979) was an Australian rules footballer who played with St Kilda in the Victorian Football League (VFL). Notes External links Category:1905 births Category:1979 deaths Category:Australian rules footballers from Victoria (Australia) Category:St Kilda Football Club players Category:Brighton Football Club players
/** * Copyright (C) 2015 Red Hat, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package io.fabric8.kubernetes.api.model; import com.fasterxml.jackson.annotation.JsonInclude; import com.fasterxml.jackson.annotation.JsonPropertyOrder; import com.fasterxml.jackson.databind.JsonDeserializer; import com.fasterxml.jackson.databind.annotation.JsonDeserialize; import io.sundr.builder.annotations.Buildable; import io.sundr.builder.annotations.Inline; import javax.annotation.Generated; import java.util.ArrayList; import java.util.Collections; import java.util.List; /** * * */ @JsonInclude(JsonInclude.Include.NON_NULL) @Generated("org.jsonschema2pojo") @JsonPropertyOrder({ "apiVersion", "kind", "metadata", "items", }) @JsonDeserialize(using = JsonDeserializer.None.class) @Buildable(editableEnabled = false, validationEnabled = false, generateBuilderPackage=true, builderPackage = "io.fabric8.kubernetes.api.builder", inline = @Inline(type = Doneable.class, prefix = "Doneable", value = "done")) public class KubernetesList extends BaseKubernetesList implements KubernetesResource { /** * No args constructor for use in serialization */ public KubernetesList() { super(); } public KubernetesList(String apiVersion, List<HasMetadata> items, String kind, ListMeta metadata) { super(apiVersion, items, kind, metadata); } //Let's just override those, cause some IDEs can't handle extending a generated class and can't see those and get crazy. @Override public String getKind() { return super.getKind(); } @Override public String getApiVersion() { return super.getApiVersion(); } @Override public List<HasMetadata> getItems() { List<HasMetadata> sortedItems = new ArrayList<>(super.getItems()); Collections.sort(sortedItems, new HasMetadataComparator()); return sortedItems; } }
Adam Whitehead is Dragonmount's TV blogger. Adam has been writing about film and television, The Wheel of Time, and other genre fiction for over fifteen years. Be sure to check out his websites, The Wertzone and Atlas of Ice and Fire (including The Wheel of Time Atlas!) as well as his Patreon. The Wheel of Time appears to be the latest TV production to sadly be impacted by the spreading coronavirus pandemic. Sony TV have now confirmed that production of The Wheel of Time is indefinitely suspended. The Czech Republic, where production for the series is based, began clamping down on the outbreak earlier this week, closing schools and restricting large gatherings of people. This led to Disney cancelling a one-week filming stint for their Marvel show The Falcon and the Winter Soldier, which will instead film those scenes elsewhere. On Thursday this was followed by the news that Wheel of Time’s sister-show, Carnival Row (shooting at Barrandov Studios in Prague), would shut down roughly halfway through the shoot for its second season. This morning the Czech government announced draconian measures to control the outbreak. They have sealed their borders to travellers from other countries affected by the virus, including the UK where numerous Wheel of Time cast and crewmembers are based. The situation with citizens from those countries already in Prague and other Czech cities is unclear, but it appears that flights out of the country are not affected so far. Based on some crew posts on social media, The Wheel of Time is gearing up for the shutdown from the end of today. Given the status of other filming projects in Prague and the measures introduced by the Czech government, it was hard to see how it could continue. Filming on the first season began on 16 September and was due to run until at least early May, meaning the bulk of the filming for the season was complete. Looking at the turnaround of directors and when they were in Prague, it also looks like the season was shooting in approximate chronological order. This means that, even if the series cannot be remounted in the next few months to complete the final scenes, it should hopefully be possible to air a truncated, shorter season (assuming, of course, that the coronavirus outbreak does not impact on post-production facilities in the United States and elsewhere), with the remaining material held back for a second season. Of course, the situation remains very fluid and estimates for the time of the pandemic range from months to a couple of years, which would have a much bigger impact on the timescale for the series (and, of course, everything else). So, the news is unfortunate, but the team at Amazon Prime Video have amassed a huge amount of material over six months of filming (so far) and hopefully we will get to see that at some point. In other news (and there is some!), to celebrate International Women’s Day last week, The Wheel of Time TV show’s resident book advisor and expert Sarah Nakamura tweeted out thanks and respect to the cast and crew who are working on the show, including several actresses who’d previously been rumoured to be appearing but not confirmed. This message was widely retweeted and liked by others involved in the production, so we can take it as confirmation these actresses will indeed be appearing, although not in which roles. Helena Westerman’s involvement has been unofficially known for some time: she appeared in the table read video released a few months ago and her own account has been following and retweeting Wheel of Time news for a few months. Westerman is a young British actress who has been appearing on stage and in short films for a few years. She also has credits as a producer and writer of theatre material and short films, and is co-director of the Rascal Theatre. Juliet Howland is an actress and composer, best-known for roles in Colditz, Skins and Doctors. According to some rumours, she will be playing the relatively small role of Natti Cauthon, mother of Mat Cauthon, but this is not yet confirmed. Naana Agyei-Ampadu is an actress whose previous credits include the TV show GameFace and the film Ready Player One. Ampadu was also seen in the table read video. Lolita Chakrabarti is an English actress and writer. A graduate of the Royal Academy of Dramatic Art (RADA), she has appeared in Criminal, Rviera, The Casual Vacancy, Intruders, Bodies, Hustle, Extras, Silent Witness and a regular character on The Bill. In additional news, Priyanka Bose, who is playing Alanna, confirmed that she wrapped filming and headed home for the season before the shutdown. The shutdown may also impact the show’s premiere date. Amazon has remained tight-lipped on when the show could air, with projections being divided between an optimistic view that the series could air at the tail end of 2020 and a possibly more realistic one that the show could air in the first few months of 2021. Netflix’s The Witcher wrapped shooting on 29 May 2019 and was on air in December 2019, but The Wheel of Time is being shot by a different company with likely different (and probably more elaborate) post-production requirements, so this is not a precedent. A recent interview with Rosamund Pike (who plays Moiraine and is an executive producer on the series) seemed to be leaning on the 2021 date as well, but this has not been confirmed by Amazon. Still, it may be wiser to temper expectations of a release any sooner, especially given the delay to filming. It may even be possible that the show will air sooner if the season is indeed not remounted and they go with the material that is already completed, but this is highly speculative. As always, Dragonmount will keep you informed about developments as they happen on our Dragonmount TV page. Please also let us know your thoughts. Whilst the news is disappointing, I’m sure everyone will join us in agreeing that the health and wellbeing of the cast and crew of the show, and of the residents of the country hosting filming, must be paramount. To stress, this is a developing story and we will continue to cover it as more news emerges.
42 63 39 14 68 30 44 83 60 100 55 19 49 50 84 91 78 3 12 59 8 25 62 21 80 32 97 41 77 31 73 23 99 43 75 76 24 48 71 57 38 86 94 5 98 70 6 27 40 81 15 87 51 26 33 93 2 1 74 85 45 56 16 35 95 54 29 17 67 37 72 69 4 47 7 58 92 22 52 79 61 20 13 90 34 88 9 65 82 10 18 89 28 66 11 53 46 96 36 64
Authorised Dealer Quick Links About Us Company History PSN Group of companies was founded in the year 1922 by Sri. P.S.Narayana Iyer, former chief forest conservator of the princely state of Cochin. On developing an ambition to be an entrepreneur, he resigned from service and founded PSN. He started his operations in Fleet Management with 6 buses, on receiving a grant from the Kochi Maharaja under the 'PSN Motors' umbrella. This business was expanded by his son P.N.Krishna Iyer who expanded the operations by the 1970s by establishing the headquarters in Thrissur, Kerala. The company grew in to over 200 route permit buses and 150 trucks, second only to KSRTC in Kerala. The vision of Sri PN Krishna Iyer has played a very important role in establishing the PSN Brand and getting it to where it is today. Ever since its inception and all through its growth, the company has kept a clear sight of its values. The basic tenet of these core values is a strict adherence to ethics and a responsibility to all those who come within its domain - customers, channel partners, employees and society. PSN Documentary CURRENT OPERATIONS The PSN group went through a transition phase in the 80s and 90s. Due to nationalization of route permits in Kerala and a challenging economic environment, the group divested from fleet management and into dealership management operations. Since 1978, the group has been led by its Managing Director, Mr. P.K.Ananthanarayanan. He has been critical to setting a vision for the company and putting together a professional management team that has helped the Group grow to its current size. PSN currently employs over 1000 people and has an annual turnover of over Rs. 500 crores. The main focus of the Group is Dealership Operations for Commercial Vehicles & Construction Equipment. We are the Authorized Dealers of the entire range of Commercial Vehicles for Eicher Trucks an Buses, a Joint venture between Eicher and Volvo. We operate 3S (Sales, Service and Spares) dealerships in North and Central Kerala, Southwest Karnataka and Bangalore. In all, we operate over 20 Eicher Authorized service centers. We are also Authorized Dealers for Telcon (a TATA Hitachi Joint Venture) for Construction equipment in North and Soutwest Karnataka and Kerala. The group is also active in the fields of Training & development, IT and Construction PSN- EICHER SUCCESS In Feb. 1998 PSN joined hands with Eicher as their sole Spare Parts Distributor for Kerala In Feb.1999 Eicher vehicle dealership for Northern Kerala and for Central Kerala in Sep 99 In 2006 Expanded operations to Mangalore Area in Karnataka State In 2010 Expanded operations to Bangalore & Hubli Area in Karnataka State 15 years, 30 branches, 1000 employees , More than 3000 vehicle sale in a year ( Highest Selling Dealer Group of Eicher ) , Vehicle intake of more than 300 numbers in a day. PSN PRE OWNED TRUCKS & MACHINES First Time in India , a Show Room for Pre Owned Trucks Initiated to expand the market in favor of Eicher vehicle MISSION STATEMENT • We will continue to be a trusted partner to our customers by providing best in class solutions for delivering goods and services • This will enable us to maximize delight of our employees, customers, channel partners and other stakeholders VISION STATEMENT • To be a conglomerate providing Automotive and Construction solutions pan India
The present invention relates to a gaming device and a method of use. More specifically, the gaming device includes a container of display objects with a separate prize object display also positioned within the container. Gaming Devices Gaming devices are well known in the art and a large variety of gaming devices have been developed. In general, gaming devices allow users or players to play a game. In many casino-type gaming devices, the outcome of the game depends, at least in part, on a randomly generated event. For example, a gaming device may use a random number generator to generate a random or pseudo-random number. The random number may then be compared to a predefined table to determine the outcome of the event. If the random number falls within a certain range of numbers on the table, the player may win a predefined prize. The table may also contain display information that allows the gaming device to generate a display that corresponds to the outcome of the game. The gaming device may present the outcome of the game on a large variety of display devices, such as mechanical spinning reels or video screens. Bonus Prizes Some gaming devices award bonuses in addition to prizes that are awarded in the primary game. A bonus can be defined as an additional prize that is awarded to the player when a predefined event occurs. An example of a bonus game can be found in U.S. Pat. No. 5,848,932 issued to Adams. One of the gaming devices described in this document comprises three spinning reels and a spinning wheel bonus display. When predetermined indicia are displayed on the spinning reels of the primary game, the wheel can be activated to indicate a bonus prize. The bonus prize is awarded in addition to any prizes awarded in the primary game. Generally, bonus prizes are offered in such games in order to increase the excitement and enjoyment experienced by players. This attracts more players to the game and encourages players to play longer. When gaming devices attract more players and the players play longer, they tend to be more commercially successful relative to other gaming devices. Display Devices In addition, highly visible display devices are utilized on gaming devices in order to attract players. Once players are attracted to the gaming device, they tend to play longer because the display device enhances the stimulation and excitement experienced by players. It is, therefore, desirable for gaming devices to incorporate highly visible display devices. The applicants believe that display devices tend to be more successful if they are a derivation of a well-known game or theme. They are more successful because players tend to be drawn to games that they instantly recognize. Many players are reluctant to try completely new games because they must spend time to learn the new game. It is, therefore, desirable to provide display devices that are based on well-known games or themes. The applicants also believe that display devices also tend to be more successful if they utilize physical objects rather than simulations. Although video devices and electronic signs can be used for display devices, players are more attracted to display devices that utilize physical objects. Physical objects can be even more effective display devices if they are movable and they are used in combination with lights and sounds. U.S. Patent Application Publication No. 2004/0002373 appears to disclose a gaming device involving a display area with a plurality of aligned channels, each channel containing a movable object, an actuator at the base of each channel and a partitioner for dividing each channel into a plurality of sections. However, the disclosed gaming device does not provide for holding the objects in an individually controlled manner in an area separate from the channels before engagement with the actuator. Thus, the disclosed device does not allow for the increased control and ease of operation accrued to the game operator by the gaming devices of the present invention where (i) the prize objects are held in an individually controlled manner in a prize object holder separate from the display container and (ii) one prize object can be selected from a plurality of different prize objects for placement into the prize display. Jumbled Ball Displays Two references that disclose use of jumbled ball displays are U.S. Pat. No. 4,871,171 issued to Rivero and U.S. Pat. No. 5,380,007 issued to Travis et al. Rivero appears to disclose a game device with means for simulating the release of a ball. In this reference, a rotating drum 2 is provided with numbered balls 17. As the drum rotates, a ball is released into a transparent tube 16. However, Rivero is not intended to show the player the ball that is released from the drum. Rather, the ball is held in the tube, out of view of the player, and an electronic reproduction of the ball number is presented in a window 9. This is intended to give the player “the impression” that the ball has been counted. Rivero fails to disclose or suggest displaying actual balls to the player to indicate the outcome of the game or the value of a prize. In addition, in the Rivero device the balls are in a cage and quite exposed to the environment and tampering. The ball cage of Rivero is also mounted on the front side and well below the top of the gaming machine, hiding the ball cage from view of potential game players who are not in position to see the front side of the machine. Travis et al. appear to disclose a video lottery gaming device with numbered balls 48. However, all of the balls are reproductions generated by software and no physical balls are displayed to the player. Travis et al. also fails to disclose or suggest displaying actual balls to the player to indicate the outcome of the game or the value of a prize. One of the disadvantages with Rivero and Travis et al. is that no actual physical balls are used to display the outcome of a game. This is less desirable because players like to see physical objects rather than electronic reproductions of the physical objects. Moreover, players tend to believe that a game device is misleading when the device purports to display a reproduction of an object rather than the object itself. This is especially true when the object itself is supposedly available for viewing, as is the case in Rivero.
Bread is one of those foods that is truly universal. Travel virtually anywhere around the globe, and it is likely that you will find some sort of leavened or quick bread on the table. I have sampled many varieties and cannot think of one I wouldn’t enjoy a second time around. We are fortunate to have some great bakeries right here in Sioux Falls that offer an exceptional product. Traditional European style, homestyle sandwich type and everything in between can be found in about a 15-minute drive or less. Great offerings, reasonable prices and convenience usually cannot be beat. But there is something about baking bread right in your own kitchen. The intoxicating aroma of loaves baking in the oven is one of my favorite smells. And biting into a slice of freshly baked, warm, buttered bread is one of the simpler pleasures in life. Combine these factors, and you might think twice about running out to buy your next loaf. When it comes to bread, I personally enjoy one that is not too dense but also not too airy; a nice chew on the outside and somewhat soft on the inside. Even more important to me is that the recipe does not require 24 hours and a long list of ingredients. While I find the process to be rather exciting, I also want it to be brief enough so my patience does not wear too thin. I have tried several recipes in my own kitchen in the past few years, some complicated and some rather quick. None of those recipes have provided everything I desire in a homemade bread — until recently. This recipe really is rather quick when it comes to a yeasted bread. With just six ingredients and a couple of hours, you will have a warm, crusty, fresh-baked loaf of rustic bread right out of your very own oven. No intense kneading, proofing, punching or shaping required here. In terms of flavor, this bread is subtle and familiar; nicely balanced with a faint hint of sweetness and saltiness. The texture is just right, with a slight crust on the outside and a softer chew inside. This is thanks in part to baking it, for the first portion, in a covered pot or Dutch oven and finishing the baking uncovered. For me, making different foods from scratch is therapeutic. Being able to create something delicious with my own hands leaves me with a sense of pride and accomplishment — and being able to enjoy that creation with others truly feeds my soul. Baking your own bread provides that great kitchen experience. And this recipe is the perfect way to get a dose of kitchen therapy. Straightforward and simple with an exceptional result, it does not get much better than that. Regardless of who you choose to break this bread with, I have no doubt you and your company will be delighted with the result. Simple Artisan Bread •11/3 cups warm water (105 to 110 degrees) •1 tablespoon honey or granulated sugar •1 package active dry yeast (or 21/4 teaspoons active dry yeast) •2 tablespoons olive oil •11/2 teaspoons kosher salt •32/3 cups bread flour (see note below) Combine water, honey or sugar and yeast in a large mixing bowl. Allow to set for about 5 minutes until the mixture becomes slightly foamy. Stir in the remaining three ingredients with a sturdy wooden spoon to incorporate all of the flour and the mixture forms a rough ball. Cover the bowl with plastic wrap and allow dough to rise until doubled in size and collapsed (about 45 minutes to an hour). Meanwhile, prepare a 4- to 5-quart pot with an oven safe lid by cutting a piece of parchment slightly larger than the bottom of the pot. Sprinkle the bottom of the pot with a few teaspoons of flour, followed by the piece of parchment. Sprinkle an additional 2 teaspoons of flour on top of the parchment. (I use an enamel-coated cast iron Dutch oven, but a heavy bottomed stainless steel pot would also work). Once the dough has risen and collapsed, turn onto a well-floured surface, making sure to coat all sides. Shape into a smooth ball by stretching the surface of the dough and tucking underneath, rotating as you go. If dough gets sticky, dust with additional flour. Place the smooth ball of dough into the prepared pot atop the floured parchment. Cover with lid and allow to rest for another 40 minutes or so, until the dough has doubled in size. After the dough has doubled in size, sprinkle lightly with another teaspoon or so of flour. Make three or four parallel 1/4-inch-deep cuts across the top of the dough, about 11/2 inches apart; or as a variation, you can cut an X in the top of the dough, also only 1/4 inch deep. In a 400-degree preheated oven, bake the dough in the covered pot for 30 minutes. After 30 minutes, remove the lid and bake an additional 15 to 25 minutes until the bread is golden brown and sounds hollow when tapped. Allow to cool in the uncovered pot for about 15 minutes before removing. Cool an additional 10 to 15 minutes or so before slicing. Serve while slightly warm. Enjoy. Note: You may use a combination of whole wheat and regular white bread flour for a more rustic bread. I have done the recipe with 1 cup of whole wheat flour and the remaining 22/3 cups white bread flour.
This offer is valid for first-time email subscribers only. To take advantage of this offer, enter your email address before closing this window. You can unsubscribe at any time. 12% off promo code will be sent via email, and will be valid for a one-time use within 30 days of email signup. Some promo code restrictions apply. You can opt-out any time by clicking the "unsubscribe" link in your email. Certain designs cross the threshold from interesting and glamorous all the way over to nothing less than a design icon. You’re looking at it. And you could be sitting in it! Black stained, veneered wood shell Fully welded chromed steel base More colors ... This lovely counter height chair will be a great addition to your casual dining and entertaining area. The casual contemporary design is simple and timeless. A vertically slatted back and square legs create the look, while a contoured wooden seat adds to the ...
To the point of collapse, and beyond by Maria on April 8, 2014 I spent last week in a posh beach hut somewhere very hot, sleeping off the latest ICANN meeting and reading a stack of books. But mostly just sleeping. ICANN meetings are inhuman. The nice ‘back to school’ bit, exchanging cheery hellos in the hallways with people you’ve not seen for months, is over in the first eighteen hours. From then it’s an unmerciful eight or nine day slog through jetlag, air conditioning, bad tempers, disinformation, misinformation and information overload. Forget about having time for meals, exercise or sufficient sleep; I ration my fluid intake because there literally isn’t enough time to go to the loo. (This is bad; I nearly always get what I now call my Tuesday Migraine.) I did not get outside in daylight from the afternoon I took the Piccadilly Line to Heathrow to a ten-minute walk to an external meeting, seven days later. That’s not at all unusual. The meetings are scheduled and conducted as if the people taking part don’t occupy human bodies. The topic of ICANN volunteer burnout is an evergreen, especially people who aren’t paid lobbyists of one sort or another. As a friend wrote to me this morning: “The result (of fewer volunteers doing an increasing amount of policy work) is that the organization retreats from its roots as a bottom-up, multistakeholder policy body to a staff-driven stakeholder interest-based policy organization. If that transition takes place, then the fundamental position of ICANN in the Internet’s management ecosystem may change significantly.” But that’s not what I want to talk about. Other people’s books are always more interesting than the book you’re reading. This is how I came to cast aside Eleanor Catton’s ‘The Luminaries’ in favour of Ron Chernow’s 1989 history of international finance, ‘The House of Morgan’. (I’d actually thought there would be a lot more about Keynes in it than there was and, yes, I wanted to read all about Jack Morgan’s yachts.) One odd little strain running through the book was the strain of over-work, and how it was to be expected and dealt with. Collapse from nervous exhaustion and working too hard – by WASP bankers, of course, not their cleaning ladies – was so common as to be a frequent topic of conversation and correspondence. Pierpoint Morgan himself suffered constant ailments all his life and was well known to both dislike and be addicted to his job. He took large chunks of time off and was quite open about working only nine months of the year. It wasn’t just the hereditary rulers of JP Morgan who took months off at a time. Several of the partners profiled in Chernow’s book worked to the point of damaging their health, took a few months off and came back. One was quite open about the fact that he only wanted to work nine months in twelve, and was subsequently invited to do just that. No less a personage than CT’s own very occasional contributor, Montagu Norman, then head of the Bank of England, worked himself into a burnout over the Gold Standard. Jack Morgan kindly offered Monty the use of his yacht to cross the Atlantic for a few months of wartime leave in the early 1940s. (Old Monty declined, saying he was already en route to Quebec.) But now I think of it, the Victorians were all over this. Florence Nightingale repeatedly worked herself into exhausted collapse, and then took to the chaise longue for weeks or months. Dickens, too, had a thing where nervous collapse and physical depletion would just kind of come to a head every now and then. Then he would rest, rest, rest, and after a while, resume. I don’t know if chimney sweeps got it, too. But somewhere in the late twentieth century we forgot about all this. With antibiotics and behaviourism and god knows what else, the mind body connection got disjointed. People stopped having a good excuse to say they were spent. When burnout and chronic fatigue were ‘discovered’ in the 1980s, the popular view was – and still is, for the most part – incredulity and a sense that people whose bodies had suddenly and seemingly inexplicably forgotten how to be well were somehow faking it. Or asking for it. An old friend who was dean of students at a US university told me that at the start of her career students who got mononucleosis – which often presages chronic fatigue – would just go home for a semester and sleep it off. The following term they’d be back, fighting fit. But by the 1990s, they would fight it and fight it and lose, and two years later still be dragging about campus, white-faced and heavy-footed and trailing incompletes. Put it this way, when’s the last time you heard of someone actually convalescing? There are all sorts of structural economic reasons why the over-achieving classes are no longer allowed to recover from the illnesses and exhaustions whose slow and windy pace we once had a humdrum familiarity with. And it’s hard to tell if extended periods of inactivity or sub-par abilities are purely the preserve of the Nightingales and the Morgans and the Woolfs, or if they’re just the ones whose day to day productivity is better chronicled. (Early research into ‘yuppy flu’ showed it was anything but; the most frequently afflicted US demographic was working age, working class Hispanic women.) When something stops having a name, it gets harder to track and compare across generations. Nowadays, it seems easier to categorise fatigue or burnout as depression, as if it’s somehow anomalous and not something entirely to be expected. When the only tool you have is antidepressants, every indeterminate ailment becomes the nail. How many cases of post-natal depression, for example, are purely the symptoms of hard core sleep deprivation? Exhaustion lowers inhibitions and mood, and drastically affects judgement. But we have a working culture that pretends it simply doesn’t matter. 11pm conference call? Sure. Five hour show and tell? No problem. Working lunch? What other kind is there? But the one thing we are not allowed to say is that we are tired. Too. Damn. Tired. For all their whacky notions and prudery, the Victorians were far ahead of us. Share this: “When burnout and chronic fatigue were ‘discovered’ in the 1980s, the popular was – and still is, for the most part – incredulity and a sense that people whose bodies had suddenly and seemingly inexplicably forgotten how to be well were somehow faking it. Or asking for it.” Great post Maria. The above line particularly speaks to me. It seems like you cannot take a day off without being accused of malingering. Burnout-level work is a kind of theatrical performance expected in certain professional cultures. It seems to serve as an effective justification for excessive compensation in modern society, despite the obvious diminishing returns associated with sleep deprivation. It is ironic that the logic of F.W. Taylor’s pioneering scientific management studies documenting the substantial productivity benefits of forced rest breaks has never been accepted by knowledge workers. The burnout work style is the modern white collar workplace equivalent of ritual warfare among primitive peoples. It is a symbolic display of ferocious commitment with dubious practical benefits. Jim Hightower has a quip about the weary waitress watching Bush on the teevee proclaiming how many jobs he’s created. “Yeah, I have three of them, myself.” Burnout is a distinctly management-class thing. The rest of the world calls it ‘having to work for a living’ and when most don’t even get sick days, let alone time to recuperate from illnesses, and a huge number of them work more than one job to stay afloat, it means your life expectancy is significantly shorter. What those chimney sweeps did was die young, often of diseases like cancer or TB exacerbated by malnutrition. (the first identification of a chemical carcinogen was the linkage of polycyclic aromatic hydrocarbons in soot with testicular cancer in London chimney sweeps) Dickens himself had to go to work in a blacking factory (as in boot blacking, iirc) for about a year as a boy, something he never forgot. It was more tedious and humiliating than life-threatening (and thus different from being a chimney sweep). In Lords of Finance , Benjamin Strong the president of the NY Fed was shown to be chronically ill , a man who routinely took long stretches of time away to convalesce. Montagu Norman the governor of the Bank of England took months off as well to vacation in France ( to rest his nerves) or travel across the Atlantic to the US. It was shocking how often they were away from their respective institutions. However rest time didn’t help them make the right decisions to avoid the Great Depression. In my personal experience , long hours in the office are preferable to the midnight shift. Tony Robinson (‘Baldrick on Blackadder) has an awesome series about jobs in various eras. It’s amazing how dangerous and toxic (and ofttimes sheerly disgusting) many jobs were in bygone eras. “The Worst Jobs in History”. SN, yes. I *believe* that burnout and various forms of combined physical and mental collapse are not just experienced by those more likely to be written about. The notion that they are only for people who can, or used to be able to, take to bed is pretty diminishing. Thanks, MPA and MSM. I’m afraid I know more about this topic than I’d like to admit. Straightwood; I think you really nail it with this: “Burnout-level work is a kind of theatrical performance expected in certain professional cultures”. There’s a prideful complicity that shuts down anyone who lacks what must be above average stamina. How many cases of post-natal depression, for example, are purely the symptoms of hard core sleep deprivation? I remember I was in a very weird place for some time after my mother died. Without getting too reductionist – I mean, the grieving itself was a whole-body response to a shock – I have wondered since how much of what I experienced was symptomatic of sleep deprivation (for about a year afterwards I was getting six hours on a good night). When your body kicks back, it kicks back hard. My father told me once that when he’d been awake for 40-odd hours (at his mother’s deathbed) he suddenly started talking French to everyone; it’s just that they were all speaking French and he thought he should make the effort to join in. (They weren’t.) 1. I have just a fairly ordinary office job, but both my father and father-in-law are surprised by the amount of vacation time I have. My dad in particular, recalls that it was many years into his career (big company, white collar job with a graduate degree) before he got his first week of paid vacation. A generation later, my fist job started me with 4 weeks. That makes me think that while we like to complain about how we are all more overworked and more stressed than people used to be, maybe that’s not the case. 2. For the headline people — JP Morgan, Winston Churchill, etc. — I wonder whether there has been a change due to rising population. There are roughly 4x as many people in the world today as when JP was active, and a much higher percentage of them matter — in the sense of being part of global news and society — but there still can only be one head of the Fed, a handful of top level global investment banking heads, etc. So there is a lot more competition for those jobs. Another (fuzzy) way of saying the same thing is that the reach of our institutions has gotten larger over time in such a way that the ratio of “top-level jobs” to “globally involved population” has fallen over time, though in the process absorbing some of the unused attention space that had existed previously. One thing to keep track of is class – if certain jobs are only open to 0.1% of society, they’ll probably be less competitive than if they are open to 1%, let alone 5%. I’m wondering how many deaths due to ‘ordinary’ sickness, back in the day, were actually caused by exhaustion leading to a fatal illness. I imagine for the bottom half of society, a huge proportion were. And as a recent article by Jim can’tspellhisname economist in the New Yorker showed, all this bravado is inversely related to productivity. In management it seems closely linked to pure performance, as both the tough boss and the tough employee engage in an odd minuet to determine not who can do more or better work, but who will survive. And yes much of it is about sleep: plenty of data on average hours of sleep and illness. Less than six will kill you. Or, if the person not sleeping is an intern or resident, will kill me. @6: Burnout is a distinctly management-class thing. The rest of the world calls it ‘having to work for a living’ and when most don’t even get sick days, let alone time to recuperate from illnesses, and a huge number of them work more than one job to stay afloat, it means your life expectancy is significantly shorter….Only the wealthy could lead a life like Dickens. While the achievement of time off was certainly limited to the management class, the aspiration to time off didn’t have class limits. As a certain Victorian gentleman once wrote: “In communist society, where nobody has one exclusive sphere of activity but each can become accomplished in any branch he wishes, society regulates the general production and thus makes it possible for me to do one thing today and another tomorrow, to hunt in the morning, fish in the afternoon, rear cattle in the evening, criticize after dinner, just as I have a mind, without ever becoming hunter, fisherman, shepherd or critic.” “In communist society, where nobody has one exclusive sphere of activity but each can become accomplished in any branch he wishes, society regulates the general production and thus makes it possible for me to do one thing today and another tomorrow, to hunt in the morning, fish in the afternoon, rear cattle in the evening, criticize after dinner, just as I have a mind, without ever becoming hunter, fisherman, shepherd or critic.” You know all these years later that still sounds like a good foundation for living a happy, varied life. 17: Work hours were reduced and vacation time increased during much of the 20th century but the tendency is now in the opposite direction (certainly for those having to work multiple jobs) or stagnating at best. It is unlikely that those entering the workforce today get more vacation time than their parents. Correct me if I’m wrong. Well what a certain Victorian gentleman wrote and what came of his writings were two very different things. The dictatorship of the proletariat turned out in the end to not look a whole lot different than the dictatorship of the plutocrat. Of COURSE everyone would like leisure time. Whether we get to enjoy it or not is very much a class-based thing. (and political/social, in the case of Europe vs. the US) What’s not down on paper is the subtle (and sometimes not-so-subtle) business culture that enforces taking the most minimal time off whatever, and when you’re gone, check in by email, and “by the way, your TPS reports are still due while you’re away.” all hanging with the threat that you are expendable, and oh yes, you DO know there are still 4-6 job seekers for every job opening. Voilà, a recipe for working your employees to death. Yes, it’s domonstrably inefficient and money-losing proposition to run a business that way…at least one that doesn’t grade success by the quarterly P/L statement. But we live in an age when the people at the top, setting those policies are rewarded handsomely pretty much regardless of their actual results. Look at Wal-Mart, for example. They cut employee hours to the point that their shelves started looking like Soviet ones circa 1984, and yet it took them well over a year of such dismal results to recognize the problem because *short term* profits were up, thanks to lowered labor costs. Even now they’re only kind of coming around to the idea that they actually DO need workers in their stores. “Of COURSE everyone would like leisure time. Whether we get to enjoy it or not is very much a class-based thing. (and political/social, in the case of Europe vs. the US) “ The second part of your sentence is key. There is no reason why those of us in North America shouldn’t all get 6 weeks paid vacation. We simply lack the political will. Even the socialist party (NDP) here doesn’t include that as part of their platform. Depression is also something to be expected under worse enough conditions. I think i recally some study that only about 30% have the genetical makeup to take almost everything without mental health side effects. Here in Germany, burnout is the new word, not the old one. Burnout is something to admit to, the upper class depression that is ok because it came from working hard. Ah, yes. Compelled to work yourself to a nubbin to pump up the trust funds of generations yet unborn. Imho, the argument — back when the argument could be had about labor and its place in society — shouldn’t have been about equity and fairness, who deserved what size piece of ‘the pie.’ At some point argument really should have been about the fucking pie. “My partner is a contract worker and so gets no paid vacation whatsoever. Not one fucking day.” Are you saying that your partner’s contract allows for no vacation time, or that any vacation taken is unpaid? My son is also a contract worker and also has had “no paid vacation whatever”. However, his contract has been for X working days per calendar/fiscal year. He has been paid for the days he works. Period. He has therefore been responsible for budgeting his income so that, during the 365-X days per year when he has not been working (weekends, holidays, “vacation”, illness, whatever), he has had the wherewithal to meet his needs. I know that this is getting off-topic–and do not minimize the importance of vacations (and if your partner’s contract allows for no vacation, I think that’s really shitty)–but I’ve long thought that the concept of “paid vacation” was more than a little paternalistic … that my employer felt it had to hold back (defer paying) part of the income I’d earned so that, when the time came for me to take my vacation, I could afford to. When I worked at a regular job, I started with 3 weeks, one of which had to be at Christmas, which was considered generous as most jobs only offered two. I worked my way up to 4 weeks after some years. But the problem was you couldn’t actually use your vacation a lot of the time, and we could only accumulate 4 weeks. When you got up to 4 weeks you had to start cashing some in. When I did take vacation (between projects) I usually took 3 or 4 weeks at once since it would be a long time until I got another chance. I am from Europe, and I can say that I have too much holidays. At some point in the long gone, contracts in my sector were changed to a (nominal) 38 hours instead of 40, to make room for the unemployed. Pay is based on the 38 hours. This means normal working weeks (typically in the 40 to 45 hours, excluding breaks, never really below 40), but the 2 hours are turned into extra holidays. This results in 8 weeks total( including Christmas etc). I don’t want that much holidays, and neither do most people. But it acts as a good buffer against the expectations curse. You can take 4 or 5 weeks of holidays a year, and you’re still seen as a responsible employee who takes their job serious. Outside the US, by the sounds of it. I just started a new job and I get 26 days as standard plus one more day for each year I work here. Plus I’m on flexi-time, which means I can build up more if I work over my contracted 37.5 hours a week. Generally I don’t because of small child, but it’s nice to know. Another job in this organisation that comes without the flexi-time that was advertised recently came with 38 days. I thought that was a typo, but apparently not. The worst holiday allocation I ever had was 20 days. Slightly off topic – or on? – what the hell is ICANN doing with that ridiculous schedule? They can’t possibly think that is going to get the best results. Is it about saving money on conference facilities? Or really about keeping out the plebs who can’t handle it? The Pompidou had a fantastic Joan Miro retrospective once. He’d go in a certain accessible direction for a few years, then he’d tear everything up and do ugly incomprehensible things, and then suddenly start being beautiful again in a completely different and original way, over and over. The ugly stuff was so disturbing that I thought he must have been bipolar, but it seems that disorder has a shorter period; it’s more that he couldn’t resist exploring different solution spaces. My town has an artistic tradition and First Thursday Art Walks, free wine in most galleries, which I’ve given up because pretty much every painter keeps cranking out the same thing, evidently not suffering from Miro’s itch. @Peter King 44 ” I’ve long thought that the concept of “paid vacation” was more than a little paternalistic … that my employer felt it had to hold back (defer paying) part of the income I’d earned so that, when the time came for me to take my vacation, I could afford to.” The problem is that, on the long run, if wages go down, people with just “unpaid leave” will be forced to use their free time to do another job. It’s a bit like piecework: it sounds rational but in the long run it’s a way to screw workers. “My son is also a contract worker and also has had “no paid vacation whatever”. However, his contract has been for X working days per calendar/fiscal year. He has been paid for the days he works. Period. He has therefore been responsible for budgeting his income so that, during the 365-X days per year when he has not been working (weekends, holidays, “vacation”, illness, whatever), he has had the wherewithal to meet his needs.” Consider a standard 9 to 5 job where the annual salary is $52,000, with the employer sending you a check for $2000 every two weeks. You get two weeks of paid vacation per year, so for one of these periods the employer sends you $2000 even though you are on vacation. Now consider a 50 week contract where you work for $52000, with no vacation but the same benefits as in the first job otherwise. As far as vacation is concerned, the conditions of the two jobs are exactly the same. The key factor is that the annual pay is the same in both jobs. I make the point that structuring work around long term contracts in principle wouldn’t screw the workers at all (in fact, there is a benefit for some in terms of not being bombarded with emails ect. during your “time off”). The problem is that everything has become so stacked against workers that any change in managment-employee relations now, even ones that should be innocuous or beneficial, screw workers. Its easy to get to much into the details and lose sight of this. @47 “The problem is that, on the long run, if wages go down, people with just “unpaid leave” will be forced to use their free time to do another job.” If wages go down, so will people with “paid leave”. The problem here is the adequacy of the wages, not the schedule on which it’s paid. @48 ” The problem is that everything has become so stacked against workers that any change in managment-employee relations now, even ones that should be innocuous or beneficial, screw workers.” I hesitate to go further off-topic, but …. Assume that I work a nominal 35-hour week (i.e. five 7-hour days) and that my employer allows me the option of working an extra half hour on the days I come in and to take a day off every second week. Remember, it’s optional … if coming in half an hour later, leaving half an hour earlier, or taking a full lunch hour is more important to me (for whatever reason) than an extra day off every two weeks, I can. I do not see how this screws me. And I’m afraid that to argue that this would not constitute a “change in management-employee relations” but that matter of whether or not one has a portion of one’s salary deferred so that one can have “paid” vacation would is to make too fine a distinction for me. Peter King, if paid vacation is paternalistic, what else do you think is paternalistic? Mandatory breaks and 40 hour-weeks and overtime rules and what else? Unless you are a hard-core libertarian suggesting to just let everything be “negotiated” between employer and employee – and that is so ludicrous that it really doesn’t deserve rebuttal – I don’t see your point at all. 49: the flex-time arrangement you are describing is quite common in let’s say progressive work environments. How is that related to the vacation question? This seems to translate as “I can’t think of anything better to do with my time than what my manager tells me.” Which seems terribly sad. Make some new friends. Travel. Do a MOOC. Write a novel. There are jobs that are pretty good, and jobs in which you feel it’s satisfying to do well not because of a manager, but because it’s a good thing that needs doing. I’m not suggesting that such jobs are common – the world screams that they are not – but I understand just not taking the vacation because you’re happy enough. I tend to forget to take all of mine. Except for today. @Peter King 49 “If wages go down, so will people with “paid leave”. The problem here is the adequacy of the wages, not the schedule on which it’s paid.” Not if paid leave is mandatory, as is in many countries. Not very different from a minimum wage, as a logic. Incidentially, one of the ways that Marx envisaged for the capitalists to increase the profit share was an increase in the workday (as he assumed that wages weren’t going to increase with the workday). He also believed that an increase in unemployment was a way to keep wages low (the “reserve army of workers” idea). Now we have: an increase in the workday, in the working life (people retire later) and in the workyear (less holydays). In countries where there were stronger protections, those protections had been removed in the name of “flexibility”: for example here in Italy up to a few years ago malls had restrictions on their opening hours, whereas now they are mostly open on the weekend (as is the norm in the USA I think); contingent contracts, outlawed up to two decades ago, are becoming the norm (and those contract are often temporary in a way that is similar to your son’s contract, so they basically dodge legal provision on mandatory paid vacations, plus a lot of other provisions), and austerity is providing the “reserve army of workers” with new enrollees. So I tend to think that, in the present period, this stuff of an increase in the workday and decrease of vacation is not coincidental. @TM: What seems paternalistic is the notion that workers are (apt to be) so incapable of ordering their financial affairs that their employer must hold back a portion of the money that they have earned this pay period so that it can be given to them when they are on vacation (and therefore not doing whatever it is that earns them their wages). It’s a mandatory vacation lay-away plan. I just think it should be optional, so that a biweekly employee with four weeks’ vacation, let’s say, could arrange to get 2/48 = 1/24 of her salary when she is working (and nothing when she’s not working, as opposed to 1/26 of her salary every two weeks both when she’s working and when she’ s on vacation) but assume responsibility of banking the difference between 1/24 and 1/26 and having the benefit of whatever interest that investing that difference might yield. As it is, the difference stays in the employer’s bank account, and, in effect, the employer keeps the interest on it as an administrative fee. Mandatory breaks, 40-hour work weeks, etc. have to do with one’s working conditions. What I’m talking about here is a matter of the details how one receives one’s compensation … more on the order of whether one is paid weekly versus biweekly versus monthly etc. The flex-time issue has nothing to do with the vacation question. I offered it as a challenge to Ed’s assertion (seconded by MPAVictoria) that “any change[s] in managment-employee relations now, even ones that should be innocuous or beneficial, screw workers.” Like you, I have understood this to be a feature of “let’s say progressive work environments”. I think people are talking past each other. There are four key factors: 1. Minimum wage per hour 2. Maximum hours 3. Working environment (mainly it should be safe) 4. Nature of the work itself (eg we criminalize some careers, such as gladiators, even if there are people willing to work in them) I think Peter King’s point is that it is easy to get distracted into arguments about the bureaucratic means to enforce these things. Like in anything, bad bureaucracy can get in the way of improving working conditions, and there was alot of problems with the 1950s style 9-5 workplace. Zamfir: “I don’t want that much holidays, and neither do most people. “ I disagree. Most people like vacation time, and people with children need those days off. Peter King 04.10.14 at 5:08 pm ” @TM: What seems paternalistic is the notion that workers are (apt to be) so incapable of ordering their financial affairs that their employer must hold back a portion of the money that they have earned this pay period so that it can be given to them when they are on vacation (and therefore not doing whatever it is that earns them their wages). “ PK, I don’t think your proposition is terribly practical. It would make it harder to verify whether your boss is paying you right (and yep that is a big deal for many employees) and it would create a strong incentive against taking vacation, which brings us back to the starting point. As to paternalism, that seems a red herring except in the curious case of the construction workers in Quebec (see 36) which certainly amounts to paternalism – the timing of their vacation is fixed! But there are reasons for that arrangement. It was afaik introduced to stop rampant abuse by employers. It was simply too easy for employers to cheat, and those who cheated gained a competitive advantage. I work in an FE college in the UK. Admin and other support staff start on 29 days and, although some only have term-time contracts which work slightly differently. Teaching staff get 44 days but have to work considerably over their contracted hours to complete the work they are expected to. They’ll also spend some leave time working at home or might nigh use all of their entitlement. Some teaching staff are employed through an internal agency for short periods or term-time only and receive holiday pay at at least the statutory minimum level. For the teaching staff though it seems to be the burnout-rest model. My eldest sister is just completing her first year as a primary school teacher and it is similar for her. There is often criticism of teachers for complaining about working conditions when they get good holiday entitlement. Besides the fact their complaints are usually unrelated to working hours it seems impossible to me that good standards could be maintained without teachers getting some time to rest. What seems paternalistic is the notion that workers are (apt to be) so incapable of ordering their financial affairs that their employer must hold back a portion of the money that they have earned this pay period so that it can be given to them when they are on vacation (and therefore not doing whatever it is that earns them their wages). It’s a mandatory vacation lay-away plan. This is the typical drivel that comes out from terminally myopic minds. And I think I’m being nice here. I mean – are you serious? Philip, Teaching staff get 44 days but have to work considerably over their contracted hours to complete the work they are expected to. One of the tragedies of mankind is that people (like the teaching staff you mention) just put up with this kind of circumstances instead of revolting. Mario, yes and teaching is one of the professions more strongly represented by unions in the UK. However, contrary to popular belief they do not take the decision to strike lightly, partly because they’ll still have to do the work from when they were out on strike. Philip : “My eldest sister is just completing her first year as a primary school teacher and it is similar for her. There is often criticism of teachers for complaining about working conditions when they get good holiday entitlement. Besides the fact their complaints are usually unrelated to working hours it seems impossible to me that good standards could be maintained without teachers getting some time to rest.” I remember as a teenager dropping by the house of a teaching couple, and seeing the dining room table covered one foot deep with papers to read and grade. I hadn’t before realized that teachers put in massive amounts of work after hours and on the weekends. On the other hand, I was a teenager, and ignorant. Right-wingers who think that teachers don’t work hard enough don’t have that excuse. “On the other hand, I was a teenager, and ignorant. Right-wingers who think that teachers don’t work hard enough don’t have that excuse.” It is my belief that RWNJs know exactly what they are doing when they bash teachers, and let’s face it, workers of any kind. To bow down before the altar of shareholder value, one must first diminish the value of workers in order to diminish their pay, which increases profits. By trashing teachers, there is the added value trashing education, which creates an under- / uneducated pool of people who will be desperate to take low-pay jobs.
4 Oversold Stocks to Buy The names highlighted here have fallen by more than 15% this year. Yet all have recently received at least two upgrades from analysts. The U.S. stock market is trading near all-time highs, but there are some recent markdowns to be found. Among companies large and small in the Standard & Poor's 1500 Composite index, 168 have suffered share-price declines of at least 15% so far this year. Over the past month, 33 of these have attracted ratings upgrades from at least one analyst, according to FactSet. Some of these are minority opinions. Whole Foods Market (ticker: WFM), which has slashed its earnings guidance amid rising competition from both organic...
When the long-running procedural drama Bones first debuted on FOX, the network was hoping for something a little more like The X-Files, star David Boreanaz revealed during a recent convention panel. Boreanaz appeared at New York Comic Con last month, and as part of a wide-ranging talk about his career, shared some recollections about the early days of Bones. Boreanaz followed up Buffy and Angel with a 12-year stint on the hit, in which he appeared opposite Emily Deschanel. He told fans that the network didn't really see what it would ultimately become in the beginning. "The network saw it as an X-Files type show, they were just coming off of X-Files," Boreanaz said. "For us, it was relationship relationship relationship. As seasons went on we created it and they were all for it." The show would later have a little fun with the X-Files connection in the 2010 episode "The X in the File," in which Bones would lovingly lampoon The X-Files. In the episode, FBI Agent Seeley Booth (Boreanaz) and scientist Temperance Brennan (Deschanel) traveled to New Mexico to investigate when a body is found in the desert near Roswell. This episode featured several allusions to The X-Files, which centered on mysterious and unexplainable cases FBI agents Fox Mulder and Dana Scully would investigate, most notably with an overarching storyline about governmental cover-ups of alien activity on earth. Dean Haglund, who played Richard Langley (one of the Lone Gunmen) on The X-Files, appeared in the Bones episode as the owner of a UFO-themed diner. A few bars of the X-Files theme tune acutally played at various points in the episode, too. At the time of the episode, The X-Files as a franchise was largely dormant, still recovering from an underwhelming outing at the box office with the 2008 movie The X-Files: I Want to Believe. In 2013, IDW Publishing would release The X-Files: Season Ten from writer Joe Harris, who would go on to write X-Files comics for several more years. An actual tenth season for the series would air in 2016, contradicting much of what Harris had created, but the cast of the series still came together to dramatize some of Harris's stories for Audible-exclusive audiobooks.
Q: Knowing a geography coordinate nearby I am using geographic coordinates (latitude, longitude). I have the coordinates of each corner of a wall. I would like to know the coordinates of a point 10cm to the right of the lower left. I am not sure if it is possible. Thanks. A: Simple method Since latitude and longitude are a system of coordinates on a non-Euclidian surface (spherical 2-space), they are pretty awkward to work with directly. I'd suggest the following. Convert your two coordinates to 3D Cartesian vectors: z = R * sin(latitude); Rcoslat = R * cos(latitude); x = Rcoslat * cos(longitude); y = Rcoslat * sin(longitude); with R = 6378 km the (mean) radius of the Earth. Note that most trig functions in most computer languages take their argument in radians, so you'll have to multiply any degrees you have by pi/180 before taking their sin() or cos(). Doing this for both coordinates of a side of the wall gives you two vectors v1 = (x1 y1 z1) v2 = (x2 y2 z2) The difference between these vectors will give you the proper direction to go in: v3 = v1-v2 (if v1 is your leftmost coordinate) v3 = v2-v1 (if v2 is your leftmost coordinate) The length of v3 is the width of your wall. Extend it by 10cm to get a new vector: L = sqrt( v3x*v3x + v3y*v3y + v3z*v3z ) (width of the wall) v4 = v3/L * (L+10cm) = v3 * (1 + 10cm/L) Note that you'll have to do some unit juggling there, since if you take R in kilometers, L will be in kilometers, too. Now that you have the new vector, you can convert it back to latitude/longitude: hypotxy = hypot( v4x, v4y) latitude = atan2( v4z, hypotxy ) longitude = atan2( v4y, v4x ) Where atan2 is the four-quadrant arctangent, and hypot(a,b) is just a fairly standard way to compute sqrt(a*a+b*b) with a greatly reduced risk of numerical over/underflow. Note again that the output of atan2 in most computer languages will be in radians, so if you want your latitude/longitude in degrees, you'll have to multiply the outcome by 180/pi. Any more accurate method The method above makes a few errors due to some simplifications that are hardly noticeable on small scales (like your ordinary everyday wall). But of your wall is actually the Great Wall of China, then you'll find that these errors become pretty unacceptable. The errors made are due to these assumptions: Latitude and longitude are coordinates on a sphere. Usually, they're not. If they come from a GPS receiver of some quality, they describe coordinates on the reference ellipsoid of the Earth. The conversion between these coordinates and a Cartesian vector is slightly more involved. The difference vector v3 is just that, a vector. A vector is a straight line segment, while the actual line connecting the points v1 and v2 is slightly curved (because the Earth is not flat). Extending v3 to find v4 will therefore introduce an error. You'll actually have to extend the curved line. Again, this can be done simply (by assuming the Earth is a sphere again, and using cross and dot products), or more accurately (by extending the line on the Earth's reference ellipsoid). These corrections are pretty specific and can get very long and very ugly, so I'll leave it at this. I think the "simple method" above suffices for your need anyway. Nevertheless, if you ever need to do it with more accuracy: If you're smart, you'll use some existing Geo software library for it. If you're smarter, you'll look up all the formulas and relevant information and make the implementation yourself, discover that your implementation has errors and side effects, correct them and learn from this again :)
EXITCYCLE: QLD emergency lighting battery recycling trial launched Released: 26-Oct-2015 Nickel cadmium (NiCD), Nickel Metal Hydride (NI MH) & Sealed lead acid (SLA) battery recycling is now on trial in Queensland for 12 months under a new EXITCYCLE partnership between the Queensland Government and the Lighting Council of Australia following the launch by the Queensland Minister for Environment and Heritage Protection, the Hon Dr Steven Miles. Emergency and exit lighting is used in a wide range of commercial and industrial buildings. Almost all rely on batteries for back-up power. The Lighting Council of Australia, the peak body representing lighting manufacturers, suppliers, hopes to migrate the pilot scheme to a fully-fledged national voluntary recycling program at the end of the 12 month trial. According to the Lighting Council’s CEO, Bryan Douglas around five million nickel cadmium batteries are sent to landfill in Australia each year, which equates to some 90,000 kg of cadmium’, he said. ‘When it comes to heavy metals most attention is focused on mercury. However it should be remembered that in most respects cadmium rivals mercury in its toxicity and potential harm to human health and the environment’, Mr Douglas said. EXITCYCLE will operate along similar lines to the successful FluoroCycle program run by Lighting Council Australia to recycle mercury-containing lamps. Queensland private and government sector organisations such as shopping centres, offices, universities, sporting venues, ports, airports, hospitals, manufacturing plants, industrial sites and local government are encouraged to become Commercial User Signatories under the scheme. Electrical contractors, emergency lighting and fire companies, battery recyclers and collectors are encouraged to sign up to the scheme as Facilitators. The Two QLD battery recyclers operating the trial are CMA Ecocycle and MRI E-cycle solutions. What does this mean for enLighten customers in QLD? enLighten Australia is a commercial collector under the Fluorocycle scheme in NSW and welcomes the announcement. Tony Arhanic, QLD Sales Executive will actively encourage our installation partners in Queensland to sign up for the EXITCYCLE trial and commit to recycle all their end-of-life emergency and exit lighting batteries extracted from site in lighting retrofits.
[The application of modified fetal biophysical profile scoring for prenatal monitoring]. High risk pregnancy 649 cases with gestational age 35 weeks and above were evaluated by modified fetal biophysical profile scoring (BPS) prospectively with B-ultrasonography and electronic fetal monitor mode 115. A total of 1,066 BPS were done. There were 6 fetal deaths with a perinatal mortality rate of 9.24/1000, of whom 4 died from fatal congenital abnormality, 1 was still birth of 35 weeks prematurely delivered, and one was postterm (> 42 weeks) intrauterine death. The corrected perinatal mortality was 3.00/1000. The clinical significance of BPS in predicting fetal hypoxia was discussed. As a predictive method it did help to prevent and treat fetal hypoxic damage at an earlier stage, so that the perinatal mortality rate declined remarkably. The 4 parameters in BPS by ultrasonography were more sensitive for positive predicting than NST.
Moby – Extreme Ways / Natural Blues / The Stars / We Are All Made Of Stars I AM God’s Divine LOVE in Action I AM God’s Divine WILL and POWER in Action. I AM God’s Divine WISDOM and INTELLIGENCE in ACTION. and I intend to bring PEACE, Love and Light to BALANCE the powers in the world – NOW! I AM APOLLO SOLARIS WE ARE ALL MADE OF STARS•´¨¸.•★★★❤ The reference to the Venus is the AS ABOVE of which Lucifer, AKA Phosphorus is the AS BELOW. The facts are that we are made of stardust” or star debris and are therefore “one with the universe.” This is where we get the AS ABOVE, in the SO BELOW and the AS WITHIN , of the AS WITHOUT. It is that star dust hidden inside you in the form of Phosphorus, which I have already stated is essential for life. The phosphate is a component of DNA, RNA, ATP, and also the phospholipids that form all cell membranes. This is the ‘spark’ in our DNA that makes us human. LUCIFER IS IN ALL OF US in the form of Phosphorus. This may be where our souls access our divine consciousness and thus we become divine like Saint John or a Christ like Jesus. Or is this what the church calls evil in Lucifer because a conscious soul and spirit is a dangerous one and maybe that is why Jesus was crucified? READ MORE BACH? We Are The Music-Makers♬♫♪♬♪ – Poem by Arthur William Edgar O’Shaughnessy We are the music-makers, And we are the dreamers of dreams, Wandering by lone sea-breakers, And sitting by desolate streams. World-losers and world-forsakers, Upon whom the pale moon gleams; Yet we are the movers and shakers, Of the world forever, it seems. With wonderful deathless ditties We build up the world’s great cities, And out of a fabulous story We fashion an empire’s glory: One man with a dream, at pleasure, Shall go forth and conquer a crown; And three with a new song’s measure Can trample an empire down. We, in the ages lying In the buried past of the earth, Built Nineveh with our sighing, And Babel itself with our mirth; And o’erthrew them with prophesying To the old of the new world’s worth; For each age is a dream that is dying,OR ONE THAT IS COMING TO BIRTH. Arthur William Edgar O’ShaughnessyLINK
--- abstract: 'We investigate the evolution of a target qubit caused by its multiple random collisions with $N$-qubit clusters. Depending on the cluster state, the evolution of the target qubit may correspond to its effective interaction with a thermal bath, a coherent (laser) drive, or a squeezed bath. In cases where the target qubit relaxes to a thermal state its dynamics can exhibit a quantum advantage, whereby the target-qubit temperature can be scaled up proportionally to $N^2$ and the thermalization time can be shortened by a similar factor, provided the appropriate coherence in the cluster is prepared by non-thermal means. We dub these effects quantum super-thermalization due to its analogies to super-radiance. Experimental realizations of these effects are suggested.' author: - Angsar Manatuly - Wolfgang Niedenzu - 'Ricardo Román-Ancheyta' - 'Bar[i]{}ş Çakmak' - 'Özgür E. Müstecapl[i]{}oğlu' - Gershon Kurizki date: 'May 2, 2019' title: Collectively enhanced thermalization via multiqubit collisions --- Introduction ============ Heat flow or exchange between systems is an abundant resource, yet its control is subtle, particularly in the quantum domain [@kosloff2014quantum; @gelbwaser2015thermodynamics; @goold2016role; @vinjanampathy2016quantum]. A major motivation for the study of such control is the quest for quantum advantage in the exploitation of this resource for useful purposes, e.g., in heat engines [@alicki1979quantum; @kosloff1984quantum; @scully2003extracting; @quan2007quantum; @abah2012single; @kosloff2014quantum; @gelbwaser2015thermodynamics; @uzdin2015equivalence; @goold2016role; @rossnagel2016single; @vinjanampathy2016quantum; @klaers2017squeezed; @klatzow2019experimental; @guff2018power] or heat diodes [@ordonez2017quantum; @kargi2019quantum; @ronzani2018tunable]. A prerequisite for such studies is our ability to control thermalization. According to the open-system approach, thermalization occurs whenever one can decompose the Hilbert space into a small subspace (“system”) and a much larger subspace (“bath”), assuming their interaction is weak enough to be treated perturbatively [@breuerbook]. It is much less clear what are the criteria for thermalization in system-bath complexes subject to nonclassical state preparation, driving or measurements, even if they are describable by a master equation [@breuerbook; @scullybook]. Such is the case of the micromaser setup [@filipowicz1986theory] wherein the cavity mode (the “system”) sequentially and randomly interacts with a “bath” composed of quantum objects (atoms [@filipowicz1986theory] or atomic clusters [@dag2016multiatom; @dag2019temperature]) that are traced out after each interaction [@scullybook]. Here we examine the issue of thermalization and heat exchange for a composite system consisting of a target qubit (the system) that randomly, repeatedly, interacts with a cluster of $N$ *identical* spin-$1/2$ (qubit) particles (the bath). In such a composite system asymptotic thermalization or its absence turns out to be strongly dependent on the initial state of the $N$-qubit cluster: We allow for *multi-qubit coherences* in the cluster bath and show that depending on the type of coherences the bath may drive the target qubit into either a thermal or a coherently-displaced state. Even in cases where the target qubit thermalizes, it can exhibit a *quantum advantage*, whereby the target-qubit temperature can be scaled up with $N^2$, and the thermalization time can be shortened by a similar factor, provided the appropriate coherence in the cluster is prepared by non-thermal means. We dub these effects quantum super-thermalization because of their similarity (but also differences) with superradiance. Experimental realizations of these effects are suggested. In addition to the insights provided by this study into thermalization and non-thermalization conditions for composite quantum systems, the controllability of their thermalization rates by subspace-state preparation has potential technological significance that has only sporadically been explored so far: heat engines [@alicki1979quantum; @kosloff1984quantum; @scully2003extracting; @quan2007quantum; @abah2012single; @kosloff2014quantum; @gelbwaser2015thermodynamics; @uzdin2015equivalence; @goold2016role; @rossnagel2016single; @vinjanampathy2016quantum; @klaers2017squeezed; @klatzow2019experimental; @guff2018power] and heat diodes [@ordonez2017quantum; @kargi2019quantum; @ronzani2018tunable] based on quantum systems require the ability to turn thermalization on and off as fast as possible, in order to maximize the heat flow (power) through the device. The basic questions in this context that may be partly elucidated by our study are: What are the criteria for the division of energy exchange between a quantum system and a bath into heat and work [@niedenzu2016operation; @niedenzu2018quantum]? What are the criteria for quantum thermalization enhancement? A growing trend is aimed at identifying quantum coherence/entanglement as a resource that can provide quantum advantages (supremacy) in a thermodynamic process [@brandner2017universal], so that the present study contributes to this trend. It extends previous works with featured baths consisting of entangled-qubit pairs [@dag2019temperature] or triples [@dag2016multiatom] as resources that can yield quantum advantage in either heat-transfer/thermalization or work. In Sec. \[sec\_master\] we develop a master equation for repeated random interactions of the target qubit with multi-qubit clusters. Classification of multi-qubit persistent quantum coherences in the cluster according to their effect on the target qubit is presented in Sec. \[sec\_classification\]. In Sec. \[sec\_qubit\_temperature\] we focus on the role of heat-exchange coherences (HEC) in the cluster and their preparation as regards the scaling of the target-qubit temperature and thermalization time. We discuss the results and their possible realizations in Sec. \[sec\_conclusions\]. Master equation {#sec_master} =============== ![Interaction of a single (target) qubit with an atomic cluster (bath). The coupling $g$ of the target qubit to each bath qubit is supposed to be identical. After each interaction the state of the bath is reset (see text).[]{data-label="fig_spins"}](spinstar){width="0.5\columnwidth"} We adopt the commonly encountered central spin model [@gaudin1976diagonalisation; @prokofev2000theory; @mukhopadhyay2017dynamics; @guo2014dissipative] wherein a target qubit interacts at random times with a cluster of $N$ qubits, as shown in Fig. \[fig\_spins\]. The total Hamiltonian reads $H=H_\mathrm{free}+H_\mathrm{int}$, where $$\label{eq_H_free} H_\mathrm{free}=\frac{\hbar\omega_0}{2}\sigma _0^z+\frac{\hbar\omega_\mathrm{b}}{2}\sum_{i=1}^N\sigma _i^z$$ is the free Hamiltonian of the target qubit and the $N$ bath qubits; $\sigma _i^z=|e_i\rangle\langle e_i|-|g_i\rangle\langle g_i|$ is the Pauli $z$ matrix for the $i$th qubit. For simplicity, we assume system-bath resonance, $\omega_0=\omega_\mathrm{b}$, and identical couplings such that $$\label{eq_H_int} H_{\mathrm{int}}=\hbar g \sum_{i=1}^N (\sigma _i^+ \sigma _0^- + \sigma _i^- \sigma _0^+)=\hbar g (J_+\sigma _0^-+J_-\sigma _0^+),$$ where $\sigma_i^-=|g_i\rangle\langle e_i|$ and $\sigma_i^+=|e_i\rangle\langle g_i|$ are the individual lowering and raising operators and $J_{\pm}=\sum_{i=1}^{N}\sigma_i^{\pm}$ are the collective raising and lowering spin operators of the bath [@breuerbook], respectively. We consider the evolution of the system in the interaction picture with respect to the free Hamiltonian . During the interaction time $\tau$, the system evolves unitarily according to the propagator $U(\tau)=\exp(-i H_{\mathrm{int}} \tau/\hbar)$ which, to second order in $g\tau$, reads $$\begin{gathered} \label{eq_U} U(\tau)\approx\mathds{1} -ig\tau(J_+\sigma _0^-+J_-\sigma _0^+) \\ -\frac{(g\tau)^2}{2}(J_+J_-\sigma _0^-\sigma _0^++J_-J_+\sigma _0^+\sigma _0^-).\end{gathered}$$ Before each interaction, the system-bath density operator is supposed to be factorized, $\rho (t)=\rho _\mathrm{q}(t)\otimes \rho _\mathrm{b} $. This means that after each interaction the state of the bath is either reset or another replica of the bath is injected into the setup (see Sec. \[sec\_conclusions\]). Since the target qubit interacts randomly with the bath qubits at a rate $p$, in a given time interval $\delta t$ the system either evolves according to Eq.  or remains invariant [@dag2016multiatom; @cakmak2017thermal; @scullybook], $$\rho(t+\delta t)=p\delta tU(\tau)\rho(t)U^\dagger(\tau)+(1-p\delta t)\rho(t).$$ In the limit $\delta t \rightarrow 0$, the master equation describing the dynamics of the target qubit is obtained by tracing out the degrees of freedom of the bath qubits, yielding [@cakmak2017thermal] $$\begin{aligned} \label{eq_master} \dot{\rho}_\mathrm{q}(t) & ={\operatorname{Tr}}_\mathrm{b}[p(U(\tau)\rho(t)U^\dagger(\tau)-\rho(t))] \notag\\ & =\frac{1}{i\hbar}[H_{\mathrm{eff}},\rho _\mathrm{q}]+\mathcal{L} _\mathrm{s} \rho_\mathrm{q} +\mathcal{L}_\mathrm{h} \rho_\mathrm{q},\end{aligned}$$ where the effective Hamiltonian and the Lindblad operators are \[eq\_H\_L\] $$\begin{aligned} H_{\mathrm{eff}}&=\hbar pg\tau (\lambda \sigma ^+ +\lambda ^* \sigma ^-) \label{eq_master_Heff}\\ \mathcal{L} _\mathrm{s} \rho_\mathrm{q}&=\mu(\varepsilon \sigma ^+ \rho _\mathrm{q} \sigma ^+ +\varepsilon ^* \sigma ^- \rho _\mathrm{q} \sigma ^-)\label{eq_master_Ls} \\ \mathcal{L}_\mathrm{h} \rho_\mathrm{q}&=\frac{\mu r_\mathrm{d}}{2}\big(2\sigma ^- \rho _\mathrm{q} \sigma ^+-\sigma ^+ \sigma ^- \rho _\mathrm{q}- \rho _\mathrm{q} \sigma ^+ \sigma ^-\big) \notag\\ &\quad+\frac{\mu r_\mathrm{e}}{2}\big(2\sigma ^+ \rho _\mathrm{q} \sigma ^--\sigma ^- \sigma ^+ \rho _\mathrm{q}- \rho _\mathrm{q} \sigma ^- \sigma ^+\big),\label{eq_master_Lh} \end{aligned}$$ where $\mu=p(g\tau)^2$. The other coefficients are defined in  Table \[table\]. [|P[1cm]{}|P[2.5cm]{}|P[3.5cm]{}|]{} $\lambda$ & $\langle J_-\rangle$ & displaced bath\ $\varepsilon$ & $\langle J_-^2\rangle$ & squeezed bath\ $r _\mathrm{e}$ & $\langle J_+J_-\rangle$ & thermal bath (HEC)\ $r _\mathrm{d}$ & $\langle J_-J_+\rangle$ & thermal bath (HEC)\ The structure of the master equation  is in full analogy to the one obtained for the interaction of a single cavity field mode (harmonic oscillator) with a beam of $N=2$ or $N=3$ two-level atoms in a micromaser setup [@dag2016multiatom; @dag2019temperature]. Effects of bath coherences on the target-qubit evolution {#sec_classification} ======================================================== Table \[table\] plays an important role in the forthcoming discussions on the thermalization dynamics of the target qubit. It relates the coefficients of the master equation  to expectation values of the collective spin formed by the bath qubits. Each of these coefficients pertains to a different physical process: - *Displacement coherences:* These are coherences associated with the mean total polarization $\langle J_\pm \rangle$ of the collective bath spin that couples bath states differing by a single excitation. They occur in the effective Hamiltonian  that coherently drives the target-qubit transition with strength $|pg\tau\langle J_-\rangle|$ (analog to a laser drive [@gardinerbook]). Hence, the bath clearly performs work on the system [@niedenzu2016operation]. - *Squeezing coherences:* These coherences are associated with the mean values of the two-excitation transitions in the bath, $\langle J_\pm^2\rangle$. They occur in the Liouvillian  which describes the interaction of the target qubit with an effective squeezed bath [@breuerbook; @cakmak2017thermal; @dag2016multiatom]. - *Heat-exchange coherences (HEC):* These are coherences associated with $\langle J_\pm J_\mp\rangle$ that couple bath states with the same amount of excitations. They occur in the Liouvillian  which describes the de-excitation or the excitation of the target qubit with rates $\mu r_\mathrm{d}$ and $\mu r_\mathrm{e}$, respectively. This Liouvillian thus describes the interaction of the target qubit with an effective thermal bath. Thus, depending on the structure of the bath state, the target qubit may effectively be exposed to a coherently-displaced, squeezed or thermal environment (or any combination thereof). In contrast to earlier works [@dag2016multiatom; @dag2019temperature], we here found the rapport between the structure and coefficients of the master equation  and many-body expectation values of the collective bath spin (Table \[table\]). The insights from Table \[table\] expose the intimate connection to superradiance, where the superradiance intensity of an ensemble of $N$ qubits is proportional to $\langle J_+J_-\rangle$ [@lambert2016superradiance]. Superradiance manifests itself by an $N$ times faster relaxation rate than a single qubit such that the intensity scales as $N^2$ [@breuerbook]. Analogous behavior will be shown here for collectively-enhanced thermalization. The insights from Table \[table\] allow us to answer for any $N$ (rather than only for $N\leq 3$ as in Ref. [@dag2016multiatom]): How are the different coherences (displacement, squeezing and heat-exchange) distributed in the density matrix $\rho_\mathrm{b}$ of the bath? In the product-state basis the HECs are located in the off-diagonals of blocks of size $$\label{eq_p_k} p_k=\binom{N}{k}$$ in the main diagonal of $\rho_\mathrm{b}$. Here $k=0, 1,\dots, N$ is the number of excitations of each state in block $k$. These blocks are shown as solid red squares in Fig. \[fig\_density\] and their size  can in a straightforward manner be determined from Pascal’s triangle depicted in Fig. \[fig\_pascal\]. The other coherences appearing in the master equation , i.e., the displacement (squeezing) coherences, pertain to states differing by one (two) excitations and are shown in blue (grey) in Fig. \[fig\_density\]. The remaining coherences are ineffective as they do not contribute to the second-order Lindblad master equation . Some of these ineffective coherences are scattered within the driving, squeezing and heat-exchange blocks (Fig. \[fig\_example\]). The only ineffective coherences that appear in a HEC block correspond to the anti-diagonal of $\rho_\mathrm{b}$. These ineffective coherences also do not contribute to the generation of multi-partite correlations in a scenario where multi-qubit clusters repeatedly interact with independent qubits [@daryanoosh2018quantum]. ![Density matrix of the bath qubits in the product-state basis. As described by the master equation , different coherences in the bath have a specific role in the evolution of the target qubit. The main diagonal red squares are the states representing heat-exchange coherences (HEC) and populations that thermalize the target qubit by acting as an effective thermal bath. The numbers inside the red blocks indicate the number of excited qubits pertaining to the states in these blocks. Blue squares with vertical lines represent displacement coherences (corresponding to a coherently-displaced bath), and grey squares with a grid are the squeezing coherences (corresponding to an effective squeezed bath).[]{data-label="fig_density"}](density){width="0.95\columnwidth"} ![The sizes of the red HECs blocks in Fig. \[fig\_density\] can be determined from Pascal’s triangle; each cell in a line corresponds to $N,N-1,\dots,1,0$ excitations. The number in each cell (i.e., the size of the corresponding HEC block) is the sum of the two numbers in the two cells above it.[]{data-label="fig_pascal"}](pascal){width="0.6\columnwidth"} Qubit temperature and thermalization time {#sec_qubit_temperature} ========================================= In this work we wish to focus on the effects of HECs in the bath state. To this end we consider the scenario where only the thermal component  exists in the master equation  by setting $\lambda=\varepsilon=0$. We then ask: How do different bath states influence the coefficients $r_\mathrm{e}$ and $r_\mathrm{d}$ and hence the final temperature and the thermalization time of the target qubit? In this scenario, the elements of the target qubit density matrix evolve as [@breuerbook] \[eq\_rho\_t\] $$\begin{aligned} \rho_{eg}(t)&=\rho_{eg}(0)e^{-t/(2t_\mathrm{q})}\\ \rho_{ge}(t)&=\rho_{eg}^*(t)\\ \rho_{gg}(t)&=1-\rho_{ee}(t) \label{eq_rho_t_gg}\\ \rho_{ee}(t)&=\frac{r_\mathrm{e}+c_0e^{-t/t_\mathrm{q}}}{r_\mathrm{e}+r_\mathrm{d}},\label{eq_rho_t_ee} \end{aligned}$$ where $c_0=r_\mathrm{d}\rho_{ee}(0)-r_\mathrm{e}\rho_{gg}(0)$. From Table \[table\], the characteristic qubit thermalization time $t_\mathrm{q}^{-1}{\mathrel{\mathop:}=}\mu(r_\mathrm{e}+r_\mathrm{d})$ then evaluates to $$\label{eq_time} t_\mathrm{q}^{-1}=\mu\left(\langle J_+J_-\rangle+\langle J_-J_+\rangle\right).$$ The steady-state of Eqs.  is $$\label{eq_rho_ss} \rho_{\mathrm{ss}}=\frac{1}{r_\mathrm{e}+r_\mathrm{d}} \begin{pmatrix} r_\mathrm{e} & 0\\ 0 & r_\mathrm{d} \end{pmatrix},$$ which for $r_\mathrm{d}>r_\mathrm{e}$ corresponds to a thermal state with the well-defined temperature $$\label{eq_temp} T_\mathrm{q}=-\frac{\hbar \omega_0}{{k_\mathrm{B}}\ln \left(\frac{r_\mathrm{e}}{r_\mathrm{d}}\right)}=-\frac{\hbar \omega_0}{{k_\mathrm{B}}\ln \left(\frac{\langle J_+J_-\rangle}{\langle J_-J_+\rangle}\right)}.$$ It can be seen that both the final temperature  of the qubit and its thermalization time  explicitly depend on the many-body quantum state of the bath, as will be illustrated in several generic cases. We note that the diagonal character of the state  straight-forwardly allows the attribution of the temperature  to this state. While one can always attribute a temperature to a diagonal two-level system, we are confident that this is also possible for an extension to higher-dimensional target systems, in analogy to our previous studies [@dag2016multiatom; @dag2019temperature] of a resonator mode (harmonic oscillator) that is driven by clusters of correlated or entangled atoms in a micromaser setup. Incoherent bath qubits ---------------------- First, we consider the simplest case in which every bath qubit is prepared in an incoherent mixture $$\label{eq_rho_i_mix} \rho_i^\mathrm{mix}=p_g{{\left|{g_i}\middle\rangle\middle\langle{g_i}\right|}}+p_e{{\left|{e_i}\middle\rangle\middle\langle{e_i}\right|}}$$ of its excited and ground state with probabilities $p_{e}$ and $p_{g}>p_e$, respectively, such that $$\label{eq_rhob_mix} \rho_\mathrm{b}=\bigotimes_{i=1}^N \rho_i^\mathrm{mix}.$$ The states  may have been individually prepared by a thermal environment at temperature $T$, in this case $p_e=p_g \exp[-\hbar\omega_0/({k_\mathrm{B}}T)]$. For the state  we find $r_\mathrm{e}=Np_e$ and $r_\mathrm{d}=Np_g$ such the target qubit temperature  evaluates to $$T_\mathrm{q}^\mathrm{mix}=-\frac{\hbar\omega_0}{{k_\mathrm{B}}\ln\left(\frac{p_e}{p_g}\right)}=T,$$ which is the temperature of an individual bath qubit. The corresponding thermalization time  of the target qubit is $$\label{eq_time_mix} t_\mathrm{q}^\mathrm{mix}=\frac{1}{\mu N}.$$ Hence, the target qubit thermalizes to the temperature of each bath qubit, but $N$-times faster. The decrease of the thermalization time with $N^{-1}$ shows that no quantum advantage applies here. A similar result was obtained in [@turkpence2019tailoring] for a bosonic single-mode field (oscillator) instead of the target qubit. Thermally-prepared HECs ----------------------- Next we consider a correlated state of the bath qubits with non-vanishing HECs. Such a state may either be prepared by *thermal* or *non-thermal* means. We first dwell on the former case which may be realized by collectively (rather than individually as above) coupling the $N$ bath qubits to a thermal photon environment, thus giving rise to the master equation [@breuerbook; @cakmak2017thermal; @shammah2018open] $$\begin{gathered} \label{eq_master_bath} \dot{\rho}_\mathrm{b}=\frac{\gamma_0}{2}(\bar{n}+1)\left(2J_-\rho_\mathrm{b} J_+-J_+J_-\rho_\mathrm{b}-\rho_\mathrm{b} J_+J_-\right)\\ +\frac{\gamma_0}{2}\bar{n}\left(2J_+\rho_\mathrm{b}J_--J_-J_+\rho_\mathrm{b}-\rho_\mathrm{b}J_-J_+\right),\end{gathered}$$ where $\gamma_0$ is the single-atom spontaneous emission rate and $\bar{n}$ the mean number of photons in mode $\omega_\mathrm{b}$ of the environment at temperature $T$. Assuming that all the bath qubits were initially prepared in their ground state, the dynamics can then only populate the fully-symmetric Dicke states [@breuerbook], which correspond to the HECs depicted in Fig. \[fig\_density\] (see Appendix \[app\_dicke\]). The steady state of the bath qubits then reads $$\label{eq_rhob_hec_thermal} \rho_\mathrm{b}= \begin{pmatrix} D_{N} & 0 &\dots & 0 &0\\ 0 & D_{N-1} & \dots & 0 & 0\\ \vdots & \vdots & \ddots & \vdots & \vdots \\ 0 & 0 & \dots & D_1 & 0\\ 0 & 0 & \dots & 0 & D_0 \end{pmatrix},$$ with the $(p_k\times p_k)$-dimensional matrices $D_k=d_k U_k$ \[cf. Eq. \]. Here $U_k$ denotes the matrix whose elements are all $1$ (which means that only the fully-symmetric Dicke states are populated) and the coefficients $d_k$ evaluate to (see Appendix \[app\_dicke\]) $$d_k=\frac{(1-r)r^k}{(1-r^{N+1})p_{k}},$$ where $r{\mathrel{\mathop:}=}\bar{n}/(\bar{n}+1)$. We now consider the thermally-prepared block-diagonal state  as the bath for the target qubit. We then find $r_\mathrm{e}/r_\mathrm{d}=r$, which only depends on $\bar{n}$ (the explicit expressions are given in Appendix \[app\_coefficients\]). Consequently, the target qubit attains the same temperature $T_\mathrm{q}^\mathrm{HEC}=T$ \[Eq. \] as the environment that was used to prepare the coherent bath qubits in the state . Hence, such thermally-prepared bath clusters do not show any quantum superiority in the final temperature of the target qubit. The thermalization time  of the target qubit evaluates to $$\label{eq_time_hec} t_\mathrm{q}^\mathrm{HEC}=\frac{1}{\gamma_\mathrm{eff}(2\bar{n}+1)},$$ where $\gamma_{\rm eff}{\mathrel{\mathop:}=}\mu r_\mathrm{e}/\bar{n}=\mu r_\mathrm{d}/(\bar{n}+1)$ is the effective spontaneous emission rate that depends on the number of qubits (see Appendix \[app\_coefficients\]) and, basically, increases linearly with $N$. Hence, regardless of whether the bath consists of $N$ independent thermal spins \[Eq. \] or a thermal collective spin \[Eq. \], the thermalization rate is sped up linearly in $N$ in either case, which is also expected in a classical setting. Furthermore, the temperature attained by the target qubit always coincides with the environment temperature used to prepare the bath. This leads to the conclusion that a *non-thermal* generation of the HECs is required in order to exhibit possible quantum advantages of the bath. Non-thermally prepared HECs: Dicke bath --------------------------------------- We now consider a different type of $N$-qubit bath, namely, a fully-symmetric Dicke state with $k$ excitations, such that only one of the blocks in the state  is populated, $$\label{dmcenter} \rho_\mathrm{b}= \begin{pmatrix} 0 & \dots &\dots & 0 \\ \vdots & \ddots & \dots & 0 \\ \vdots & \vdots & D_k & \vdots \\ 0 & 0 & \dots & 0 \\ \end{pmatrix},$$ where normalization now implies $D_k=U_k/p_k$. A possible preparation method of such states has been recently proposed in Ref. [@cakmak2019robust]. For the state  we find $$\begin{aligned} r_\mathrm{e}&=\langle J_+J_-\rangle=k(N-k+1)\\ r_\mathrm{d}&=\langle J_-J_+\rangle=(k+1)(N-k). \end{aligned}$$ Thus, the steady-state temperature of the target qubit is $$\label{eq_Tq_k} T_\mathrm{q}^\mathrm{D}=-\frac{\hbar\omega_0}{{k_\mathrm{B}}\ln\left[\frac{k(N-k+1)}{(k+1)(N-k)}\right]},$$ which is positive as long as $r_\mathrm{d}>r_\mathrm{e}$, yielding the non-inversion condition $$k\leq \lceil N/2\rceil-1.$$ Namely, there must always be more bath qubits in the ground state than in the excited state. The temperature  depends on the number of excitations $k$ and the number of bath qubits $N$. For large $N$ and large $k$ (such that $r_\mathrm{d}/r_\mathrm{e}\gtrsim 1$) the Laurent expansion yields $$\label{eq_T_dicke} \frac{{k_\mathrm{B}}T_\mathrm{q}^\mathrm{D}}{\hbar\omega_0}\approx\frac{(k+1)(N-k)}{(k+1)(N-k)-k(N-k+1)}-\frac{1}{2}.$$ Since the temperature  depends on $N$, also the target qubit’s entropy $S=-{k_\mathrm{B}}{\operatorname{Tr}}(\rho_\mathrm{ss}\ln\rho_\mathrm{ss})$ explicitly depends on the amount of bath qubits. In the high-temperature limit of Eq.  this dependence, however, becomes marginal as $S=k_\mathrm{B}\ln 2-\mathcal{O}\left(\middle[1-r_\mathrm{e}/r_\mathrm{d}]^2\right)$, consistent with the fact that the qubit levels are almost equally populated. If we consider a block containing a relatively small number of excitations, i.e., away from the central block, for example $k=N/4$ (assuming $N$ is an integer multiple of $4$), we find $$\label{eq_T_dicke_linear} \frac{{k_\mathrm{B}}T_\mathrm{q}^\mathrm{D}}{\hbar\omega_0}\approx 1+\frac{3N}{8}.$$ Hence, in this case, the scaling of the temperature is linear with the number of qubits in the bath cluster. On the other hand, increasing the number of excitations to $k=N/2-1$, i.e., choosing the closest allowed block to the central one, yields $$\label{eq_T_dicke_quadratic} \frac{{k_\mathrm{B}}T_\mathrm{q}^\mathrm{D}}{\hbar\omega_0}\approx \frac{N^2+2N}{8}-\frac{1}{2}.$$ Here we observe a clear *quadratic scaling* with $N$. Hence, by varying the number of excitation in the bath, the temperature scaling may exhibit a strong *collective quantum advantage* by growing quadratically with the bath-ensemble size $N$. This constitutes the second main result of this work. This favorable scaling is also manifest in the corresponding thermalization time , which for the Dicke state  is found to be $$\label{eq_time_dicke} t_\mathrm{q}^\mathrm{D}(k)=\frac{1}{\mu(N+2kN-2k^2)}.$$ Hence, contrary to the previous cases of thermally-prepared bath states, the thermalization time may be sped-up quadratically in $N$. For the examples above, $k=N/4$ and $k=N/2-1$, we find $$t_\mathrm{q}^\mathrm{D}(N/4)=[\mu(N+3N^2/8)]^{-1}$$ and $$t_\mathrm{q}^\mathrm{D}(N/2-1)=[\mu(N+N^2/2-2)]^{-1},$$ respectively. Therefore, coherences in the $N$-qubit bath prepared by *non-thermal* means allow us to thermalize the the target qubit faster (optimally with $N^{-2}$ dependence) than their thermal (individual or collective) counterparts (optimally with $N^{-1}$ dependence), as shown in Fig. \[fig\_thermalization\]. ![Decay term $\exp(-t/t_\mathrm{q})$ \[Eq. \] as a function of the scaled time $\mu t$ when the $N$-qubit bath is in a fully-symmetric Dicke state with $k=N/4$ excitations (black-solid) or in a mixed state (blue-dashed) for $N=4$ and $N=8$, respectively. The respective thermalization times are $t_\mathrm{q}^\mathrm{mix}$ \[Eq. \] and $t_\mathrm{q}^\mathrm{D}(k)$ \[Eq. \]. The black-dotted line is for a fully-symmetric Dicke state of $N=8$ spins with $k=N/2-1=3$ excitations.[]{data-label="fig_thermalization"}](DickeIncoh2){width=".9\columnwidth"} In principle, the bath state  could also be used to cool the target qubit below its initial temperature by adjusting $N$ and $k$. The $N^2$ speedup, however, would only occur if $k\sim N$, which also implies larger temperatures. An option to optimize cooling in terms of final temperature and cooling time would be to investigate more general bath states, similar to Ref. [@dag2019temperature]. Finally, we now investigate whether the observed quantum advantage in the target qubit temperature is present throughout the entire dynamics or only at steady state when interacting with the Dicke bath . If the target qubit is prepared in a state devoid of coherences, we can define its time-dependent temperature as $T_q(t):=(\hbar\omega_0/k_B)\ln[\rho_{gg}(t)/\rho_{gg}(t)]^{-1}$. For the initial state being the ground state ($\rho_{eg}(0)=\rho_{ee}(0)=0$ and $\rho_{gg}(0)=1$), Eqs.  and  yield $$\label{temperature_time} T_q(t)=\frac{\hbar\omega_0}{k_B}\left[\ln\left(\frac{1+r_d/r_e}{1-e^{-t/t_q}}-1 \right) \right]^{-1}.$$ The time-dependent temperature  is shown in Fig. \[fig\_thermalization\_temperature\] for different sizes of incoherent and Dicke baths, respectively. The quantum advantage of the Dicke bath is present at all times, meaning that the target qubit temperature always surpasses the one generated by an incoherent bath. ![Temperature  of the target qubit as a function of the scaled time $\mu t$. Initially in its ground state (zero temperature), the qubit evolves to a thermal state defined by the $N$-qubit bath. Black solid lines: Dicke bath \[Eq. \] with $k=N/2-1$ excitations; blue dashed lines: Incoherent bath state  with $T_\mathrm{q}^\mathrm{mix}=T_\mathrm{q}^\mathrm{D}$. Horizontal red dashed lines: Temperature estimate  for $N=\{4,8,12\}$, depicting the quadratic dependence on $N$.[]{data-label="fig_thermalization_temperature"}](Dicke_vs_Incoh_quadratic){width="0.98\columnwidth"} Conclusions {#sec_conclusions} =========== We have investigated a collisional model wherein a single target qubit repeatedly interacts with clusters of $N$ bath qubits. We have observed that the evolution of the target qubit strongly depends on the quantum state of the bath. We have established the dependence of the qubit evolution on the first and second moments (linear and quadratic means) of the collective spin of the bath (Table \[table\]), and showed that according to the class of multi-qubit coherences in the bath clusters, the bath can thermalize, cause its coherent drive or simulate squeezed-bath effects on the target qubit. Focusing on the case of thermalization dynamics of the target qubit, we have considered different types of coherent and incoherent bath clusters; either thermally or non-thermally prepared. We have shown that thermally-prepared bath states cause thermalization of the target qubit to the temperature of the environment that was used to create them. Whether the bath consists of $N$ independent thermal qubits \[Eq. \] or thermally prepared coherent qubits \[Eq. \], both cases show a decrease in the target qubit thermalization time proportional to $N^{-1}$. On the other hand, non-thermally-prepared bath states with only one non-zero Dicke block yield either linear \[Eq. \] or quadratic \[Eq. \] scaling of the target qubit temperature  with the number of qubits in the bath ensemble, depending on the number of excitations in the chosen block. The largest quantum advantage corresponds to quadratic scaling $T\propto N^2$. Likewise, the relaxation time may decrease quadratically, $t_\mathrm{q}\propto N^{-2}$. These results are the main contribution of the present work since they explicitly show a broad control in the thermalization temperature of a target system and its time, using a structured quantum bath, which otherwise would not be possible by utilizing classical resources. This $N^2$ quantum advantage obtained here is reminiscent of superradiance. Yet, whereas superradiance occurs for the collective interaction of an ensemble of qubits with a common bath [@breuerbook], here it is the bath that exhibits collective behavior such that the constituents of the bath interact with the single target qubit at the same time. It is interesting to note that the bath states that depict a quantum advantage, i.e., the Dicke bath state , are multipartite entangled $W$-type states whereas the incoherent and thermally prepared HEC states without quantum advantage are separable. It would be interesting to further investigate the role of multipartite entanglement on thermalization via multi-qubit collistions in the spirit of Refs. [@dag2019temperature; @daryanoosh2018quantum]. The Hamiltonian  effectively describes various systems, e.g., nuclear spin baths in quantum dots [@chekhovich2013nuclear; @jing2018decoherence], nitrogen-vacancy (NV) centers [@reinhard2012tuning], nuclear magnetic resonance systems [@pal2018temporal], microcavities hosting multi-atom systems [@hartmann2007effective; @wan2009tunable] or multiple superconducting qubits [@niskanen2007quantum; @cakmak2019robust], and molecular nanomagnets [@ardavan2007will; @chiesa2014molecular]. However, it is not straightforward in the above-mentioned scenarios to mimic the effect of repeated impulsive interactions of a target qubit and non-thermally prepared $N$-qubit bath states. The required protocol would then consist of multiple steps, each step involving: controlled preparation of the $N$-qubit (entangled) bath state, abrupt on- and off-switching of its interaction with the target qubit followed by resetting of the $N$-qubit bath to its initial state. There is, however, a simpler and more natural scenario where the described process can be implemented: It concerns a cold-atom cloud with, upon absorbing a few quanta, attains a superradient (symmetric) Dicke state [@mazets2007multiatom; @araujo2016superradiance; @guerin2016subradiance]. Following such state preparation, an impurity atom passing near or within this cloud will, to a good approximation, realize the described model. A future extension to non-Markovian baths [@mccloskey2014nonmarkovianity; @cakmak2017nonmarkovianity] may be interesting. Acknowledgements {#acknowledgements .unnumbered} ================ Ö.E.M. acknowledges support by TUBITAK (Grant No. 116F303) and by the EU-COST Action (CA15220). W.N. acknowledges support from an ESQ fellowship of the Austrian Academy of Sciences (ÖAW). G.K. acknowledges support from ISF, SAERI and DFG. Ö.E.M. would like to thank C.B.Dağ and F.Ozaydin for initial discussions on the problem. Thermal preparation of HECs {#app_dicke} =========================== We may express the density matrix $\rho_\mathrm{b}$ of the bath spins in either the product-state basis or the total-spin (Dicke) basis $|j,m\rangle$ where $j=0,\dots,N/2$ ($j=1/2,\dots,N/2$) for even (odd) $N$ and $m=-j,\dots,j$ [@breuerbook]. Each $m$ corresponds to a distinct HEC block in the product-state basis. If, as in the main text, the atoms are initially prepared in their ground state $|g_1,g_2,\dots,g_N\rangle\equiv |j=N/2,m=-N/2\rangle$, the dynamics governed by the master equation  do not mix the different $j$, i.e., $$\begin{gathered} \rho_\mathrm{b}(0)={{\left|{\frac{N}{2},-\frac{N}{2}}\middle\rangle\middle\langle{\frac{N}{2},-\frac{N}{2}}\right|}} \longrightarrow \\\rho_\mathrm{b}(t)=\sum\limits_{m=-N/2}^{N/2}\rho_{m}(t){{\left|{\frac{N}{2},m}\middle\rangle\middle\langle{\frac{N}{2},m}\right|}}.\end{gathered}$$ The time evolution according to Eq.  then thermally populates every ${\left|{N/2,m}\right\rangle}$ such that in steady state (see Fig. \[lindblad\]) $$\rho_m=\frac{1}{Z}\exp\left(-\frac{m\hbar\omega_0}{{k_\mathrm{B}}T}\right)$$ with $$Z=\sum_{m=-N/2}^{N/2}\exp\left(-\frac{m\hbar\omega_0}{{k_\mathrm{B}}T}\right).$$ ![Time evolution in the Dicke basis.[]{data-label="lindblad"}](lindblad){width=".9\columnwidth"} ![Transformation from the Dicke basis to the product-state basis.[]{data-label="fig_transform"}](transform){width=".9\columnwidth"} Upon transforming to the product-state basis by a unitary transformation $U$, the population $\rho_m$ of every fully-symmetric state $|N/2, m\rangle$ is transferred to the corresponding HEC block (Fig. \[fig\_transform\]). Each such block has dimensionality $(p_k\times p_k)$ \[Eq. \] and may be written $D_k=d_k U_k$, where $U_k$ denotes the matrix whose elements are all $1$. Hence, the population ratio $\rho_{m+1}/\rho_m$ is directly reflected in the ratio of the traces of two consecutive blocks, $$\frac{ {\operatorname{Tr}}[D_{m+1}]}{ {\operatorname{Tr}}[D_{m}]}=\frac{\rho_{m+1}}{\rho_m}=\exp\left(-\frac{\hbar\omega_0}{{k_\mathrm{B}}T}\right)=\frac{\bar{n}}{\bar{n}+1}{=\mathrel{\mathop:}}r,$$ From the normalization condition $$\label{trac} 1={\operatorname{Tr}}(\rho_\mathrm{b})=\sum_{k=0}^{N} {\operatorname{Tr}}[D_k]=\sum_{k=0}^{N} r^k{\operatorname{Tr}}[D_0]$$ follows $${\operatorname{Tr}}[D_0]=\frac{1-r}{1-r^{N+1}}.$$ Since $D_k=d_kU_k$, we have $d_k={\operatorname{Tr}}[D_k]/{\operatorname{Tr}}[U_k]$. Using ${\operatorname{Tr}}[D_k]=r^k{\operatorname{Tr}}[D_0]$ and ${\operatorname{Tr}}[U_k]=p_k$ then yields $$d_k=\frac{(1-r)r^k}{(1-r^{N+1})p_{k}}.$$ Explicit form of the rates {#app_coefficients} ========================== For the state  the coefficients in Table \[table\] evaluate to [@cakmak2017thermal] $$\begin{aligned} \label{re_hec} r_\mathrm{e} &= {\operatorname{Tr}}[J_-\rho_\mathrm{b}J_+]=\sum_{k=0}^{N}d_k{\operatorname{Tr}}[J_-U_k J_+] \notag\\ &= \sum_{k=1}^{N}d_k (N-k+1)^2 p_{k-1} \notag\\ &= \sum_{k=1}^{N}\frac{(1-r) r^{k}k(N-k+1)}{1-r^{N+1}}\end{aligned}$$ and $$\begin{aligned} \label{rd_hec} r_\mathrm{d} &= {\operatorname{Tr}}[J_+\rho_\mathrm{b}J_-]=\sum_{k=0}^{N}d_k{\operatorname{Tr}}[J_+U_k J_-] \notag\\ &= \sum_{k=0}^{N-1}d_k(k+1)^2 p_{k+1} \notag\\ &= \sum_{k=1}^{N}\frac{(1-r)r^{k-1}k(N-k+1)}{1-r^{N+1}}.\end{aligned}$$ [50]{}ifxundefined \[1\][ ifx[\#1]{} ]{}ifnum \[1\][ \#1firstoftwo secondoftwo ]{}ifx \[1\][ \#1firstoftwo secondoftwo ]{}“\#1”@noop \[0\][secondoftwo]{}sanitize@url \[0\][‘\ 12‘\$12 ‘&12‘\#12‘12‘\_12‘%12]{}@startlink\[1\]@endlink\[0\]@bib@innerbibempty “,” [****, ()](\doibase 10.1146/annurev-physchem-040513-103724) “,” [****,  ()](\doibase 10.1016/bs.aamop.2015.07.002) “,” [****,  ()](\doibase 10.1088/1751-8113/49/14/143001) “,” [****,  ()](\doibase 10.1080/00107514.2016.1201896) “,” [****,  ()](\doibase 10.1088/0305-4470/12/5/007) “,” [****,  ()](\doibase 10.1063/1.446862) “,” [****,  ()](\doibase 10.1126/science.1078955) “,” [****,  ()](\doibase 10.1103/PhysRevE.76.031105) “,” [****,  ()](\doibase 10.1103/PhysRevLett.109.203006) “,” [****,  ()](\doibase 10.1103/PhysRevX.5.031044) “,” [****,  ()](\doibase 10.1126/science.aad6320) “,” [****,  ()](\doibase 10.1103/PhysRevX.7.031044) “,” [****,  ()](\doibase 10.1103/PhysRevLett.122.110601) “,” [ ()](https://arxiv.org/abs/1810.08319) “,” [****,  ()](\doibase 10.1103/PhysRevE.95.022128) “,” [****,  ()](\doibase 10.1103/PhysRevE.99.042121) “,” [****,  ()](\doibase 10.1038/s41567-018-0199-4) @noop [**]{} (, , ) @noop [**]{} (, , ) “,” [****,  ()](\doibase 10.1103/PhysRevA.34.3077) “,” [****,  ()](\doibase 10.3390/e18070244) “,” [****,  ()](\doibase 10.1021/acs.jpcc.8b11445) “,” [****,  ()](\doibase 10.1088/1367-2630/18/8/083012) “,” [****,  ()](\doibase 10.1038/s41467-017-01991-6) “,” [****,  ()](\doibase 10.1103/PhysRevLett.119.170602) “,” [****,  ()](\doibase 10.1051/jphys:0197600370100108700) “,” [****,  ()](\doibase 10.1088/0034-4885/63/4/204) “,” [****,  ()](\doibase 10.1103/PhysRevA.96.052125) “,” [****,  ()](\doibase 10.1140/epjd/e2014-40597-5) “,” [****,  ()](\doibase 10.1103/PhysRevA.96.032117) @noop [**]{},  ed. (, , ) “,” [****,  ()](\doibase 10.1103/PhysRevB.94.224510) “,” [****,  ()](\doibase 10.1103/PhysRevA.98.062104) “,” [****,  ()](\doibase 10.1364/JOSAB.36.001252) “,” [****,  ()](\doibase 10.1103/PhysRevA.98.063815) “,” [****,  ()](\doibase 10.1103/PhysRevA.99.012319) “,” [****,  ()](\doibase 10.1038/nmat3652) “,” [****,  ()](\doibase 10.1038/s41598-018-19977-9) “,” [****,  ()](\doibase 10.1103/PhysRevLett.108.200402) “,” [****,  ()](\doibase 10.1103/PhysRevLett.120.180602) “,” [****,  ()](\doibase 10.1103/PhysRevLett.99.160501) “,” [****,  ()](\doibase 10.1088/1674-1056/18/9/012) “,” [****,  ()](\doibase 10.1126/science.1141324) “” [****,  ()](\doibase 10.1103/PhysRevLett.98.057201) “,” [****,  ()](\doibase 10.1038/srep07423) “,” [****,  ()](\doibase 10.1088/0953-4075/40/6/F01) “,” [****,  ()](\doibase 10.1103/PhysRevLett.117.073002) “,” [****,  ()](\doibase 10.1103/PhysRevLett.116.083601) “,” [****,  ()](\doibase 10.1103/PhysRevA.89.052120) “,” [****,  ()](\doibase 10.1103/PhysRevA.96.022109)
KIDWARE SOFTWAREhas been publishing high-quality award-winning computer programming tutorials to schools, homeschools, and computer enthusiasts for over 30 years. We currently publish a series of Microsoft®Small Basic, Visual Basic®, Visual C#®, and Oracle®​ JavaTM self-study computer programming tutorials for Middle School & High School Computer Science Teachers, Homeschool Parents and Self-Study Adult Computer Enthusiasts. We help you to help your students to become successful programmers! ​Public School Teacher Packs Our Public School Computer Science Teacher's Kits are a fully customizable computer programming curriculum for Public Middle School and High School Computer Science Teachers. These Tutorials are annually renewable "Unlimited User" Site Licensed Teacher Editions that allow a teacher to customize and distribute the self-study or instructor-led computer programming curriculum and all the associated source code to all the students in your computer science classes for an entire school year. This Beginning Computer Science for Kids seriesis a at home self-study computer programming curriculum designed for the computer entusiast . We offer four different self-study computer programming language tracks for Homeschool students. It can also be used by self-study beginning adult computer enthusiats who would like to learn computer programming at home.
Aerodynamic factors affecting rebreathing in infants. The rebreathing of expire air, with high carbon dioxide and low oxygen concentrations, has long been implicated in unexplained Sudden Infant Death Syndrome (SIDS) when infants are placed to sleep in a prone (facedown) position. This study elucidates the effect of the aerodynamic parameters Reynolds number, Strouhal number, and Froude number on the percentage of expired air that is reinspired (rebreathed). A nasal module was designed that served as a simplified geometric representation of infant nostrils and placed above a hard, flat surface. Quantitative and flow visualization experiments were performed to measure rebreathing, using water as the working medium, under conditions of dynamic similarity. Different anatomic (e.g., tidal volume, nostril diameter), physiological (e.g., breathing frequency), and environmental (e.g., temperature, distance from the surface) factors were considered. Increases in Strouhal number (simultaneously faster and shallower breathing) always produced higher rebreathed percentages, because rolled-up vortices in the vicinity of the nostrils had less time to move away by self-induction. Positively and negatively buoyant flows resulted in significant rebreathing. In the latter case, consistent with a warm environment and a high percentage of rebreathed CO2, denser gas pooled in the vicinity of the nostrils. Reynolds numbers below 200 also dramatically increased rebreathing because the expired gas pooled much closer to the nostrils. These results clearly elucidated how the prone position dramatically increases rebreathing by a number of different mechanisms. Furthermore, the results offer plausible explanations of why a high-temperature environment and low birthweight are SIDS risk factors. NEW & NOTEWORTHY A fundamentally new aerodynamics-based approach to the study of rebreathing of expired air in infants is presented. Rebreathing is implicated in unexplained Sudden Infant Death Syndrome (SIDS) when infants sleep in a prone position. This is the first time that aerodynamic parameters are systematically varied and their effects on rebreathing quantified. The study provides us with a deeper understanding of the effects of breathing frequency, tidal volume (birthweight) and environmental conditions.
# Copyright (c) 2007 Intel Corporation. All Rights Reserved. # # Permission is hereby granted, free of charge, to any person obtaining a # copy of this software and associated documentation files (the # "Software"), to deal in the Software without restriction, including # without limitation the rights to use, copy, modify, merge, publish, # distribute, sub license, and/or sell copies of the Software, and to # permit persons to whom the Software is furnished to do so, subject to # the following conditions: # # The above copyright notice and this permission notice (including the # next paragraph) shall be included in all copies or substantial portions # of the Software. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS # OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. # IN NO EVENT SHALL PRECISION INSIGHT AND/OR ITS SUPPLIERS BE LIABLE FOR # ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, # TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE # SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. SUBDIRS = AM_CPPFLAGS = \ -I$(top_srcdir) \ -DVA_DRIVERS_PATH="\"$(LIBVA_DRIVERS_PATH)\"" LDADD = \ $(LIBVA_LT_LDFLAGS) libva_source_c = \ va.c \ va_compat.c \ va_fool.c \ va_str.c \ va_trace.c \ $(NULL) libva_source_h = \ va.h \ va_backend.h \ va_backend_vpp.h \ va_compat.h \ va_dec_av1.h \ va_dec_hevc.h \ va_dec_jpeg.h \ va_dec_vp8.h \ va_dec_vp9.h \ va_drmcommon.h \ va_egl.h \ va_enc_hevc.h \ va_enc_h264.h \ va_enc_jpeg.h \ va_enc_vp8.h \ va_fei.h \ va_fei_h264.h \ va_enc_mpeg2.h \ va_fei_hevc.h \ va_enc_vp9.h \ va_str.h \ va_tpi.h \ va_version.h \ va_vpp.h \ $(NULL) libva_source_h_priv = \ sysdeps.h \ va_fool.h \ va_internal.h \ va_trace.h \ $(NULL) libva_ldflags = \ $(LDADD) -no-undefined \ -Wl,-version-script,${srcdir}/libva.syms \ $(NULL) libva_cflags = \ -Wall \ $(NULL) if USE_SSP libva_cflags += -fstack-protector endif lib_LTLIBRARIES = libva.la libvaincludedir = ${includedir}/va libvainclude_HEADERS = $(libva_source_h) noinst_HEADERS = $(libva_source_h_priv) libva_la_SOURCES = $(libva_source_c) libva_la_CFLAGS = $(libva_cflags) libva_la_LDFLAGS = $(libva_ldflags) libva_la_DEPENDENCIES = libva.syms libva_la_LIBADD = $(LIBVA_LIBS) -ldl if USE_DRM SUBDIRS += drm lib_LTLIBRARIES += libva-drm.la libva_drm_la_SOURCES = libva_drm_la_CFLAGS = $(libva_cflags) libva_drm_la_LDFLAGS = $(LDADD) libva_drm_la_DEPENDENCIES = libva.la drm/libva_drm.la libva_drm_la_LIBADD = libva.la drm/libva_drm.la \ $(LIBVA_LIBS) $(DRM_LIBS) -ldl endif if USE_X11 SUBDIRS += x11 lib_LTLIBRARIES += libva-x11.la libva_source_h += va_x11.h libva_x11_la_SOURCES = libva_x11_la_CFLAGS = $(libva_cflags) libva_x11_la_LDFLAGS = $(LDADD) libva_x11_la_DEPENDENCIES = libva.la x11/libva_x11.la libva_x11_la_LIBADD = libva.la x11/libva_x11.la \ $(LIBVA_LIBS) $(X11_LIBS) $(XEXT_LIBS) $(XFIXES_LIBS) $(DRM_LIBS) -ldl endif if USE_GLX SUBDIRS += glx lib_LTLIBRARIES += libva-glx.la libva_glx_la_SOURCES = libva_glx_la_CFLAGS = $(libva_cflags) libva_glx_la_LDFLAGS = $(LDADD) libva_glx_la_DEPENDENCIES = libva.la glx/libva_glx.la libva-x11.la libva_glx_la_LIBADD = libva.la glx/libva_glx.la libva-x11.la \ $(GLX_LIBS) -ldl endif if USE_WAYLAND SUBDIRS += wayland lib_LTLIBRARIES += libva-wayland.la libva_wayland_la_SOURCES = libva_wayland_la_CFLAGS = $(libva_cflags) libva_wayland_la_LDFLAGS = $(LDADD) libva_wayland_la_DEPENDENCIES = libva.la wayland/libva_wayland.la libva_wayland_la_LIBADD = libva.la wayland/libva_wayland.la \ $(WAYLAND_LIBS) $(DRM_LIBS) -ldl endif DIST_SUBDIRS = x11 glx drm wayland DISTCLEANFILES = \ va_version.h \ $(NULL) EXTRA_DIST = \ libva.syms \ va_version.h.in \ meson.build \ $(NULL)
Antigenic specificities of glomerular-bound autoantibodies in membranous glomerulopathy induced by mercuric chloride. The present study describes the development of membranous glomerulopathy (MGP) with high proteinuria in DZB rats exposed to mercuric chloride (HgCl2). IgG1 and IgG2a antibodies, eluted from glomeruli with subepithelial immune deposits, bind to the interface of the GBM and epithelial cells. High reactivity to GBM was demonstrated by ELISA and Western blotting, which could be absorbed for 30% by laminin or laminin-associated extracellular matrix components. No reactivity was found with type IV collagen, fibronectin, heparan sulfate proteoglycans, or tubular brush border antigens. Absorption to GBM removed the reactivity to renal antigens. Passively transferred eluted antibodies bind in a predominantly linear pattern along the GBM, causing focal ultrastructural transformations of the podocytes. These results suggest that this type of HgCl2-induced MGP, associated with epithelial cell injury and proteinuria, is caused by autoantibodies to basement membrane components which are located at the epithelial cell-basement membrane interface and may be involved in cell-matrix binding.
client auth-user-pass /config/openvpn-credentials.txt ping 5 dev tun resolv-retry infinite nobind ;user nobody ;group nobody persist-key persist-tun ;http-proxy-retry # retry on connection failures ;http-proxy [proxy server] [proxy port #] ;mute-replay-warnings ns-cert-type server verb 3 ;mute 20 route-metric 1 comp-lzo yes comp-noadapt cipher AES-256-CBC <ca> -----BEGIN CERTIFICATE----- MIIGVjCCBD6gAwIBAgIJAOmTY3hf1Bb6MA0GCSqGSIb3DQEBCwUAMIGSMQswCQYD VQQGEwJVSzEPMA0GA1UECAwGTG9uZG9uMQ8wDQYDVQQHDAZMb25kb24xEzARBgNV BAoMClByaXZheCBMdGQxFDASBgNVBAsMC0hNQSBQcm8gVlBOMRYwFAYDVQQDDA1o aWRlbXlhc3MuY29tMR4wHAYJKoZIhvcNAQkBFg9pbmZvQHByaXZheC5jb20wHhcN MTYwOTE0MDk0MTUyWhcNMjYwOTEyMDk0MTUyWjCBkjELMAkGA1UEBhMCVUsxDzAN BgNVBAgMBkxvbmRvbjEPMA0GA1UEBwwGTG9uZG9uMRMwEQYDVQQKDApQcml2YXgg THRkMRQwEgYDVQQLDAtITUEgUHJvIFZQTjEWMBQGA1UEAwwNaGlkZW15YXNzLmNv bTEeMBwGCSqGSIb3DQEJARYPaW5mb0Bwcml2YXguY29tMIICIjANBgkqhkiG9w0B AQEFAAOCAg8AMIICCgKCAgEAxWS4+bOnwzGsEZ2vyqfTg7OEJkdqlA+DmQB3UmeD xX8K+87FTe/htIudr4hQ19q2gaHU4PjN1QsJtkH+VxU6V5p5eeWVVCGpHOhkcI4X K0yodRGn6rhAPJYXI7pJHAronfmqfZz/XM+neTGHQ9VF9zW6Q1001mjT0YklFfpx +CPFiGYsQjqZ+ia9RvaXz5Eu1cQ0EWy4do1l7obmvmTrlqN26z4unmh3HfEKRuwt NeHsSyhdzFW20eT2GhvXniHItqWBDi93U55R84y2GNrQubm207UB6kqbJXPXYnlZ ifvQCxa1hz3sr+vUbRi4wIpj/Da2MK7BLHAuUbClKqFs9OSAffWo/PuhkhFyF5Jh OYXjOMI1PhiTjeSfBmNdC5dFOGT3rStvYxYlB8rwuuyp9DuvInQRuCC62/Lew9pI TULaPUPTU7TeKuk4Hqqn2LtnFTU7CSMRAVgZMxTWuC7PT+9sy+jM3nSqo+QaiVtM xbaWXmZD9UlLEMmM9IkMdHV08DXQonjIi4RnqHWLYRY6pDjJ2E4jleXlS2laIBKl mKIuyxZ/B5IyV2dLKrNAs7j9EC7J82giBBCHbZiHQjZ2CqIi+afHKjniFHhuJSVU e7DY+S/B/ePac7Xha8a5K2LmJ+jpPjvBjJd+2Tp2Eyt8wVn/6iSqKePDny5AZhbY +YkCAwEAAaOBrDCBqTAdBgNVHQ4EFgQU4MZR0iTa8SoTWOJeoOmtynuk8/cwHwYD VR0jBBgwFoAU4MZR0iTa8SoTWOJeoOmtynuk8/cwDwYDVR0TAQH/BAUwAwEB/zAL BgNVHQ8EBAMCAaYwEQYJYIZIAYb4QgEBBAQDAgEWMBoGA1UdEQQTMBGBD2luZm9A cHJpdmF4LmNvbTAaBgNVHRIEEzARgQ9pbmZvQHByaXZheC5jb20wDQYJKoZIhvcN AQELBQADggIBAG+QvRLNs41wHXeM7wq6tqSZl6UFStGc6gIzzVUkysVHwvAqqxj/ 8UncqEwFTxV3KiD/+wLMHZFkLwQgSAHwaTmBKGrK4I6DoUtK+52RwfyU3XA0s5dj 6rKbZKPNdD0jusOTYgbXOCUa6JI2gmpyjk7lq3D66dATs11uP7S2uwjuO3ER5Czt m12RcsrAxjndH2igTgZVu4QQwnNZ39Raq6v5IayKxF0tP1wPxz/JafhIjdNxq6Re P4jsI5y0rJBuXuw+gWC8ePTP4rxWp908kI7vwmmVq9/iisGZelN6G5uEB2d3EiJB B0A3t9LCFT9fKznlp/38To4x1lQhfNbln8zC4qav/8fBfKu5MkuVcdV4ZmHq0bT7 sfzsgHs00JaYOCadBslNu1xVtgooy+ARiGfnzVL9bArLhlVn476JfU22H57M0IaU F5iUTJOWKMSYHNMBWL/m+rgD4In1nEb8DITBW7c1JtC8Iql0UPq1PlxhqMyvXfW9 4njqcF4wQi6PsnJI9X7oHDy+pevRrCR+3R5xWB8C9jr8J80TmsRJRv8chDUOHH4H YjhF7ldJRDmvY+DK6e4jgBOIaqS5i2/PybVYWjBb7VuKDFkLQSqA5g/jELd6hpUL yUgzpAgr7q3iJghthPkS4oxw9NtNvnbQweKIF37HIHiuJRsTRO4jhlX4 -----END CERTIFICATE----- </ca> <cert> -----BEGIN CERTIFICATE----- MIIGMjCCBBqgAwIBAgICAQIwDQYJKoZIhvcNAQELBQAwgZIxCzAJBgNVBAYTAlVL MQ8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkxvbmRvbjETMBEGA1UECgwKUHJp dmF4IEx0ZDEUMBIGA1UECwwLSE1BIFBybyBWUE4xFjAUBgNVBAMMDWhpZGVteWFz cy5jb20xHjAcBgkqhkiG9w0BCQEWD2luZm9AcHJpdmF4LmNvbTAeFw0xNjEwMTgx NDE4MThaFw0yNjEwMTUxNDE4MThaMIGNMQswCQYDVQQGEwJVSzEPMA0GA1UECAwG TG9uZG9uMQ8wDQYDVQQHDAZMb25kb24xEzARBgNVBAoMClByaXZheCBMdGQxFDAS BgNVBAsMC0hNQSBQcm8gVlBOMREwDwYDVQQDDAhobWF1c2VyMjEeMBwGCSqGSIb3 DQEJARYPaW5mb0Bwcml2YXguY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEA5XY3ERJYWs/YIeBoybivNlu+M32rJs+CAZsh7BnnetTxytI4ngsMRoqX ETuis8udp2hsqEHsglLR9tlk9C8yCuKhxbkpdrXFWdISmUq5sa7/wqg/zJF1AZm5 Jy0oHNyTHfG6XW61I/h9IN5dmcR9YLir8DVDBNllbtt0z+DnvOhYJOqC30ENahWk TmNKl1cT7EBrR5slddiBJleAb08z77pwsD310e6jWTBySsBcPy+xu/Jj2QgVil/3 mstZZDI+noFzs3SkTFBkha/lNTP7NODBQ6m39iaJxz6ZR1xE3v7XU0H5WnpZIcQ2 +kmu5Krk2y1GYMKL+9oaotXFPz9v+QIDAQABo4IBkzCCAY8wCQYDVR0TBAIwADAR BglghkgBhvhCAQEEBAMCB4AwCwYDVR0PBAQDAgeAMCwGCWCGSAGG+EIBDQQfFh1P cGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU2LKFPHjFUzLf sHIMWi0VukhBgTEwgccGA1UdIwSBvzCBvIAU4MZR0iTa8SoTWOJeoOmtynuk8/eh gZikgZUwgZIxCzAJBgNVBAYTAlVLMQ8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcM BkxvbmRvbjETMBEGA1UECgwKUHJpdmF4IEx0ZDEUMBIGA1UECwwLSE1BIFBybyBW UE4xFjAUBgNVBAMMDWhpZGVteWFzcy5jb20xHjAcBgkqhkiG9w0BCQEWD2luZm9A cHJpdmF4LmNvbYIJAOmTY3hf1Bb6MBoGA1UdEQQTMBGBD2luZm9AcHJpdmF4LmNv bTAaBgNVHRIEEzARgQ9pbmZvQHByaXZheC5jb20wEwYDVR0lBAwwCgYIKwYBBQUH AwIwDQYJKoZIhvcNAQELBQADggIBAKeGVnbL3yu2fh1T0ATbgyHx9rnFGRW1o/xf F5ssfRInlopsGDejrk9goyJErVxuzSzLp8AhxSOrVZJp6Tlpssj3B4FbGB0BIH+L crID9pb+r2LqrTeYfMwYo6zRLNQ5NmMyxQCf6XrdxihUTiZBV31LKlWNkhOLMlHr 2eXwAEXjqYMXjYwN+WE8I7SlUm5WCwj7PTiF7BpdDP5Ut4y5Dj8A2m1zXt36rr5h xvbgo2JAeFwVEG4ch67PI+uM0G2GilxnjuK2wKgjBKFMAUfLs7tigzSgx8PEfYCc +bgWpPyfG5hYM9n94zd2VTDN4sam12Bxvhw8zn20L6eT+Skfa8BN7eesrV5opABt /IImZ4Q1HShKKc5EiBN8CKGDydojkNrXuFfsyv7S9VHch0e5cS+Annhr4ARaH0O5 fPOD5PBVajdbV6/Rf7NzB5b/raJcUK5BD6KWWRCsmaNYzaabJjUpCmigrOMmkdAx eKCY/oEFpU3+7VeKfNyxBTIiGFt5RjNqTQXmMVjiRN97VN7fqAaFTQB2OF7E3hrt qU9jXkeN8Tvu/FF0LNyt87orewecC0Ujz7Hto9fchPH0roP+DVzoAEP8axD9RV5p M/kgubu3hMD6lLsbx4GOD11GQplvuygURxAYsyjbgFydbk1ZIpeE2OeGXXrfuQWF bNtjLJTu -----END CERTIFICATE----- </cert> <key> -----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA5XY3ERJYWs/YIeBoybivNlu+M32rJs+CAZsh7BnnetTxytI4 ngsMRoqXETuis8udp2hsqEHsglLR9tlk9C8yCuKhxbkpdrXFWdISmUq5sa7/wqg/ zJF1AZm5Jy0oHNyTHfG6XW61I/h9IN5dmcR9YLir8DVDBNllbtt0z+DnvOhYJOqC 30ENahWkTmNKl1cT7EBrR5slddiBJleAb08z77pwsD310e6jWTBySsBcPy+xu/Jj 2QgVil/3mstZZDI+noFzs3SkTFBkha/lNTP7NODBQ6m39iaJxz6ZR1xE3v7XU0H5 WnpZIcQ2+kmu5Krk2y1GYMKL+9oaotXFPz9v+QIDAQABAoIBAQCcMcssOMOiFWc3 MC3EWo4SP4MKQ9n0Uj5Z34LI151FdJyehlj54+VYQ1Cv71tCbjED2sZUBoP69mts T/EzcsjqtfiOwgrifrs2+BOm+0HKHKiGlcbP9peiHkT10PxEITWXpYtJvGlbcfOj Ixqt6B28cBjCK09ShrVQL9ylAKBearRRUacszppntMNTMtN/uG48ZR9Wm+xAczIm dG6CrG5sLI/++JwM5PDChLvn5JgMGyOfQZdjNe1oSOVLmqFeG5uu/FS4oMon9+Ht fjHJr4ZgA1yQ2wQh3GvEjlP8zwHxEpRJYbxpj6ZbjHZJ2HLX/Gcd9/cXiN8+fQ2z PIYQyG9dAoGBAPUUmt2nJNvl7gj0GbZZ3XR9o+hvj7bJ74W2NhMrw6kjrrzHTAUQ d1sBQS8szAQCLqf2ou1aw9AMMBdsLAHydXxvbH7IBAla7rKr23iethtSfjhTNSgQ LJHVZlNHfp3hzNtCQZ7j0qVjrteNotrdVF7kKPHDXAK00ICy6SPNjvrXAoGBAO+v dnO15jLeZbbi3lQNS4r8oCadyqyX7ouKE6MtKNhiPsNPGqHKiGcKs/+QylVgYvSm m7TgpsCAiEYeLSPT+Yq3y7HtwVpULlpfAhEJXmvn/6hGpOizx1WNGWhw7nHPWPDz f+jqCGzHdhK0aEZR3MZZQ+U+uKfGiJ8vrvgB7eGvAoGAWxxp5nU48rcsIw/8bxpB hgkfYk33M5EnBqKSv9XJS5wEXhIJZOiWNrLktNEGl4boKXE7aNoRacreJhcE1UR6 AOS7hPZ+6atwiePyF4mJUeb9HZtxa493wk9/Vv6BR9il++1Jz/QKX4oLef8hyBP4 Rb60qgxirG7kBLR+j9zfhskCgYEAzA5y5xIeuIIU0H4XUDG9dcebxSSjbwsuYIge Ldb9pjMGQhsvjjyyoh8/nT20tLkJpkXN3FFCRjNnUWLRhWYrVkkh1wqWiYOPrwqh 5MU4KN/sDWSPcznTY+drkTpMFoKzsvdrl2zf3VR3FneXKv742bkXj601Ykko+XWM HcLutisCgYBSq8IrsjzfaTQiTGI9a7WWsvzK92bq7Abnfq7swAXWcJd/bnjTQKLr rvt2bmwNvlWKAb3c69BFMn0X4t4PuN0iJQ39D6aQAEaM7HwWAmjf5TbodbmgbGxd sUB4xcCIQQ1mvTkigXWrCg0YAD2GZSoaslXAAVv6nR5qWEIa0Hx9GA== -----END RSA PRIVATE KEY----- </key> proto udp ping-exit 30 remote ag.hma.rocks 553
Contact LAWRENCE — Former Congressman Bob Inglis, executive director of the Energy & Enterprise Initiative (E&EI), will discuss climate change, environmental policy and energy at the Dole Institute of Politics at the University of Kansas for the event “The Environment & Energy: The Role of Free Enterprise and the Government” at 7:30 p.m. Tuesday, April 23. It is free and open to the public. “Bob Inglis lost his seat in Congress in part for believing in climate change and advocating for environmental and energy action based on the principles of limited government and free enterprise,” Dole Institute Director Bill Lacy said. “This perspective on climate change might be new to many folks but is an interesting approach to long-term, stable energy policy in America.” Inglis was elected to the U.S. Congress in 1992, having never run for office before. He represented Greenville-Spartanburg, South Carolina, from 1993-1998, unsuccessfully challenged U.S. Senator Fritz Hollings in 1998, and returned to Congress in 2005 and served until 2011. He served on the Foreign Affairs Committee and as ranking member of the Energy and Environment subcommittee of the House Science Committee. Both in and out of Congress, Inglis has championed free-enterprise solutions to America's energy-security and climate-change challenges. “I'm excited for the opportunity to speak to KU students at the Dole Institute because the younger generation of our country is in tune to the environment and aware of climate change going on around them," Inglis said. "And young folks on college campuses, especially young conservatives, are great ambassadors to their parents and grandparents and are our next generation of leaders. "They are hungry for action and our conservative solution directly involves them and free enterprise. A free-enterprise solution is better for our economy and the environment than clumsy EPA mandates, wasteful energy subsidies, or massive tax increases like cap and trade." Inglis founded and launched the national, grass-roots organization July 10, 2012. E&EI is guided by the conservative principles of free enterprise and economic growth, limited government, liberty, accountability and reasonable risk avoidance to solve the nation’s energy and climate challenges. The University of Kansas is a major comprehensive research and teaching university. The university's mission is to lift students and society by educating leaders, building healthy communities and making discoveries that change the world. The KU News Service is the central public relations office for the Lawrence campus.
Carboxyl terminal region of the MukB protein in Escherichia coli is essential for DNA binding activity. The purified MukB protein of Escherichia coli has DNA binding activity and nucleotide binding activity. We have isolated a mutation, mukB1013, causing a substitution of valine at position 1379 to leucine. This mutant MukB protein was defective for DNA binding, while the ATP binding activity remained unaffected. A truncated MukB protein that is short of 109 amino acids from the C-terminus failed to bind DNA.
Q: Do ISO grammars follow a specific format Here is a extract from the grammar section of the C# Language Specification: Is this written in a specific format? I looked at the grammar section in an old C++ ISO I found and it seemed to follow the same format, so is there some standard being used here for writing this grammar? I ask because I would like to be able to create a tool where I can paste the grammar directly and have a working C# parser immediately. Microsoft seem to release their C# spec for free, but I can't find the C++11 format anywhere. Am I going to have to buy this to view it? A: It's a variant of BNF that used by Yacc. Yacc normally has ; as part of its syntax, but changing that makes things simpler with a language like C# and C++ in which ; is very significant in itself. Unlike most BNF variants, it has a : where often BNF uses = (see also Van Wijngaarden grammar and you'll soon know much more than the little bit of knowledge that this answer is coming from). ISO don't have a rule on which grammar must be used in their standards, so others use BNF, ABNF, EBNF, Wirth syntax and perhaps others. ISO standards often originate as national or other standards that are then adopted by ISO. Since different standards bodies use different grammars (The IETF use ABNF in RFCs [itself defined in RFC 5234], BSI and the W3C use different variants of EBNF, and so on) the grammar in an ISO often reflects its origins. This is the case here. Kernigan and Ritchie used this format in their book, The C Programming Language. While the ANSI standard and later ISO standards differed in the grammar itself, they used the same format, and it's been used since for other C-like languages.
Effects of the calcium antagonists diltiazem, verapamil and nitrendipine on the contractile responses of guinea-pig isolated ileum to electrical stimulation or carbachol. The effects of the organic Ca2+ antagonists nitrendipine, verapamil and diltiazem on the cholinergic contractile responses induced by field electrical stimulation or carbachol (0.1 microM) and on contractions evoked by high concentration KCl (30 mM) were studied in isolated preparations from the guinea-pig ileum. The three Ca2+ antagonists dose-dependently suppressed the contractile responses showing the same order of potency (nitrendipine greater than verapamil greater than diltiazem) with the three different types of stimulation. Comparison of the IC50 values of the Ca2+ antagonists for carbachol-, KCl- and electrically-evoked contractions demonstrated that the carbachol-evoked contractions were most sensitive to the inhibitory action of the antagonists tested. The presynaptic inhibitory effect of (Met)enkephalin (10 nM) on the electrically-evoked cholinergic contractions was only slightly potentiated by high concentrations (1 or 10 microM) of nitrendipine and diltiazem and remained unchanged by verapamil. The results suggest that the Ca2+ antagonists tested block mainly the carbachol-activated L-type Ca2+ channels on the smooth muscle cells, while the effects on the N-type Ca2+ channels are insignificant, except for the high concentrations of nitrendipine and diltiazem.
Tumblr was never explicitly a space for porn, but, like most things on the internet, it is chock full of it anyway. Or at least it was. On Monday, to the shock of the millions of users who had used the microblogging site to consume and share porn GIFs, images, and videos, Tumblr banned the “adult content” that its CEO, David Karp, had defended five years prior. In the hours after the announcement, sex workers panicked, users threatened to leave, and—in classic Tumblr fashion—online petitions calling for change gained hundreds of thousands of signatures. But Tumblr’s porn ban isn’t about porn or Tumblr at all, really. It’s about the companies and institutions who wield influence over what does and doesn’t appear online. When Melissa Drew, an adult content creator and model, logged in to Tumblr Monday afternoon, she was greeted by a deluge of unfamiliar posts and notifications. Her usual feed, perfectly curated after nearly a decade of tinkering, was awash with panicked posts from fellow adult models, memes about the policy change, and goodbye posts. Drew’s personal blog, which she had relied on as a public-facing way to tease the content available to her Patreon subscribers, was lit up with notifications from Tumblr informing her that most of her posts violated the new rules. When Yahoo bought Tumblr for $1.1 billion in 2013, critics warned that premium advertisers wouldn't exactly be clamoring to run ads in a sea of porn. Yahoo CEO Marissa Mayer disagreed, arguing that targeting tools would keep content that isn't "brand-safe" (read: porn) away from ads. In an interview shortly after the acquisition, Karp doubled down on the platform’s openness to porn. “When you have … any number of very talented photographers posting tasteful photography,” said Karp, “I don't want to have to go in there to draw the line between this photo and the behind the scenes photo of Lady Gaga and like, her nip." But the nip line has indeed been drawn, and it’s a doozy. Though Tumblr’s Monday announcement had technically only prohibited depictions of sex acts, “human genitalia,” and “female-presenting nipples,” a much wider swath of Drew’s feed was quickly caught up in the ban. “I had everything from nude, censored nudity, and lingerie photos flagged,” she told WIRED. “I still haven’t dealt with removing all of them yet—I just sort of heavy sighed and closed the tab.” Safe Space In interviews and messages with WIRED, more than 30 sex workers, porn consumers, and creators on Tumblr lamented the loss of what they described as a unique, safe space for curated sexually themed GIFs, photos, and videos. Many users who had used the microblogging site as their primary source for porn were at a loss when asked where they would go after Tumblr’s ban on “adult content” goes into effect on December 17. For the thousands of sex workers who used the site to share their own explicit content in a controlled, relatively contained manner—not to mention the countless others who used that content to fill the hyper-curated feeds of some of the site’s most popular porn blogs—the crackdown’s consequences are even more difficult to unpack. And researchers say the ban could shrink Tumblr’s user base, which already appears in turmoil over the decision. The move comes less than two weeks after Apple pulled Tumblr from the iOS App Store after child pornography was found on the site. Though the offending illegal content was removed quickly, according to Tumblr, the app has yet to return to the App Store (it was never removed from the Google Play Store). In its most recent blog post, Tumblr stated that its longstanding no-tolerance policy against child pornography should not be conflated with the move to ban adult content. The latter, Tumblr argued, was inspired by a drive to create “a better Tumblr.” But these sorts of decisions aren’t made in a vacuum.
Potentiation by ouabain of catecholamine secretion from bovine adrenal chromaffin cells in culture induced by pituitary adenylate cyclase-activating polypeptide: evidence for involvements of Na+ and Ca2+ movements. The effect of pituitary adenylate cyclase-activating polypeptide (PACAP) on catecholamine secretion with ouabain, an inhibitor of Na(+)-K+ ATPase, in cultured bovine adrenal chromaffin cells was examined, to determine whether movement of Na+, as well as Ca2+, is involved in the secretory process. PACAP (10(-10)-10(-6)M)-induced catecholamine secretion was markedly potentiated by addition of ouabain (10(-5)M). When cultured cells were preincubated with PACAP for 30 min in Ca(2+)-free medium in the presence of ouabain and then stimulated for 15 min with Ca(2+)-containing medium without PACAP or ouabain, their catecholamine secretion was dependent on the external Ca2+ concentration, and 45Ca2+ influx into the cells was increased. When the cells had been preincubated with PACAP and ouabain in Na(+)-free sucrose medium, their Ca(2+)-induced catecholamine secretion was greatly reduced. PACAP increased 22Na+ influx into cells treated with ouabain. These results suggest that stimulation by PACAP and inhibition of the Na(+)-pump both increase the intracellular Na+ level, resulting in increase in Ca2+ influx and catecholamine secretion.
remainder when 324 is divided by d. 28 Let u be (-1)/8 - 741/(-104). Let t be u - (-2 + -4 + 4). Suppose 0 = 17*i - t*i - 88. What is the remainder when i is divided by 4? 3 Let h(i) = -2*i**3 + 30*i**2 + i - 15. Let n be h(15). Suppose n = m - 10*q + 5*q - 99, -3*m + 229 = 2*q. Calculate the remainder when m is divided by 21. 16 Suppose -237 = -4*w - m + 2471, -5*w + 3360 = -5*m. Calculate the remainder when w is divided by 85. 81 Suppose 12 + 0 = -6*d. Let p(y) = 4*y**2 + 7*y + 9. Let r(i) = -i**2 - 7*i + 6. What is the remainder when p(d) is divided by r(-7)? 5 Let t be (((-2)/4 - -1) + -1)*-22. Let n(q) = q**2 - 12*q. Let p be n(t). Calculate the remainder when (6/(-4))/(-2 - p/6) is divided by 5. 4 Let c be (-4)/((-96)/18) + (-410)/(-8). Let s = -51 + c. What is the remainder when (-774)/3*s/(-2) is divided by 33? 30 Let d(a) = 4*a**2 + 70*a - 1102. Calculate the remainder when d(17) is divided by 410. 14 Suppose 0 = -9*d + 3*d - 162. Let h = -97 + 111. What is the remainder when (-18)/d - 112/(-3) is divided by h? 10 Suppose -39*p + 2397 = 50*p - 95. What is the remainder when 3078 is divided by p? 26 Suppose -29*c + 3540 - 887 + 8396 = 0. What is the remainder when c is divided by 115? 36 Suppose -775 = 7*r + 499. Let t = 249 + r. Calculate the remainder when t is divided by 18. 13 Let d(a) = -7*a + 89. Suppose -x + 57 = 5. What is the remainder when x is divided by d(11)? 4 Let s = -7447 - -7473. What is the remainder when 129 is divided by s? 25 Suppose 3*v = 14 - 38. Let m = 1981 - 1952. Let u = v + m. Calculate the remainder when 37 is divided by u. 16 Suppose -5*j + c = -66, 2*j - 21 = -c + 4. Let g(t) = -1342*t - 8046. Calculate the remainder when j is divided by g(-6). 1 Suppose -18*d + 202 + 33 = -13*d. Calculate the remainder when 278 is divided by d. 43 Let a(q) = -1202*q - 22827. Let w = 35 + -7. Calculate the remainder when w is divided by a(-19). 6 Suppose 0*z + 407 = 13*z - 3597. Calculate the remainder when z is divided by 53. 43 Let u = 1260 + -44. Suppose 8*y = 24*y - u. Calculate the remainder when y is divided by 26. 24 Suppose 0 = -m - 3*t + 257, m = -t + 50 + 217. Suppose 5*r + 15 - 245 = 0. Calculate the remainder when m is divided by r. 42 Let b(z) = 106*z - 682. Let p = -95 - -135. Calculate the remainder when b(7) is divided by p. 20 Let p = 376 - 345. Calculate the remainder when 2384 is divided by p. 28 Suppose -25*u + 10*u + 16236 = 117*u. Calculate the remainder when 614 is divided by u. 122 Suppose 3*c - 14 = -4*c. Suppose 2 = -4*u + j + 3, c*u + 3 = -3*j. Let y = 102 + u. What is the remainder when y is divided by 26? 24 Let c(l) = 86*l - 1558. What is the remainder when c(19) is divided by 42? 34 Suppose 2*c - 934 = -3*i - 0*i, -4*c - 16 = 0. Suppose 6*p - 65 = 5*p + 4*f, 0 = -4*p - 2*f + i. What is the remainder when 304 is divided by p? 73 Let s(o) = 12*o**2 + 160*o + 740. Calculate the remainder when s(-5) is divided by 11. 9 Let b(l) = l**3 - 3*l**2 + 0 + 3*l + 0*l - 2*l + 11. Let d = -53 + 58. Calculate the remainder when b(d) is divided by 17. 15 Let l(q) = 21*q + 270. Calculate the remainder when l(-3) is divided by 50. 7 Suppose 48 = 7*y - 3*y. Suppose 7*o - 9*o + 66 = 0. What is the remainder when o is divided by y? 9 Let l = 315 + -249. Suppose -l = -z + v, 0 = 4*z + 4*v - 2*v - 294. What is the remainder when z is divided by 4? 3 Let z(d) = -d**2 - 40*d + 444. Calculate the remainder when 93 is divided by z(9). 0 Let m = -129 + 137. Suppose -m*z = 2*i - 13*z - 232, 0 = -5*i - z + 526. What is the remainder when i is divided by 54? 52 Suppose 0*x + 6 = 3*j - 3*x, -3*x - 30 = 5*j. What is the remainder when 53 is divided by 31/1 + (j - 0/1)? 25 Calculate the remainder when (5/10)/(-4 + 2461869/164124 + -11) is divided by 8. 6 Suppose -5*o - 2*u + 43 = 0, 2*o - 2*u = -4*u + 16. Let q = 35 - -55. Suppose -2*d - 4*d + q = 0. Calculate the remainder when d is divided by o. 6 Let l = -3 - -20. Let g = 40 - l. Suppose -30*u + 34*u - 356 = 0. Calculate the remainder when u is divided by g. 20 Let d be (-11 - 1)/((-81)/54). Let t(k) = d*k - 31*k + k**2 - 27 + 16*k. What is the remainder when t(13) is divided by 14? 9 Let d = -134 - -195. What is the remainder when 912 is divided by d? 58 Suppose -677 = -5*z + 5*w + 518, 3*z = 5*w + 707. What is the remainder when z is divided by 81? 1 Suppose -4*m + 26 - 2 = 0. Suppose -2280 = -43*o + 429. What is the remainder when o is divided by (-94)/(-3) - m/(-9)? 31 Let a be 49/7 - 6 - 3 - 485. Let r = a + 549. Let h(x) = -4*x - 3. What is the remainder when r is divided by h(-3)? 8 Let u = -8980 + 9084. What is the remainder when u is divided by 8? 0 Let o(y) = 2*y**2 + 2*y - 12. Let f be o(-5). Suppose 5*q + 23*x = f*x + 175, -3*q = -x - 101. What is the remainder when q is divided by 12? 9 Suppose 5*f = -4*b + 42, -2*f + 10 - 34 = -12*b. Calculate the remainder when 24/(-10)*(-25)/1 is divided by f. 0 Suppose -7*n + 3*n + 28 = 0. Suppose -255 = -14*o + 81. Calculate the remainder when o is divided by n. 3 Suppose 14*w = 11*w + 21. What is the remainder when 3*(-60)/(-9 - -3) is divided by w? 2 Let j(v) = 2*v**2 - 2*v**2 - 39*v - 18 - v**2 + 63*v. Let u be j(23). Suppose -u*d = -110 + 35. What is the remainder when 33 is divided by d? 3 Let g be (1/3)/((-5)/45) - -7. Suppose -2*u + s - g*s = -37, 3*u - 4*s - 81 = 0. Calculate the remainder when 85 is divided by u. 16 Let f = -3410 + 3532. What is the remainder when 247 is divided by f? 3 Suppose 0 = 5*c - 4*u + 4, 4*c - 2*u = -0*u - 2. Suppose c = -3*r + 17*r - 210. What is the remainder when 43 is divided by r? 13 Let w be (-1 - 2)*(4 - 5) - -269. Suppose -4*f = -4*y - 0*f + w, 3*f + 62 = y. Calculate the remainder when y is divided by 24. 23 Let s(w) = 486*w + 115. What is the remainder when s(3) is divided by 19? 15 Suppose -3*m + 91 + 41 = 0. Calculate the remainder when m is divided by (30/(-270))/((-830)/414 - -2). 21 Calculate the remainder when 314 is divided by (-9)/((-63)/665) - 2. 35 Let g(i) = 0*i**2 + i**2 - 6*i - 1 + 0 - 2*i**2. Let h be g(-5). Suppose -u + 45 = h*u. What is the remainder when 16 is divided by u? 7 Let i be 1060/(-8) - 9/18. Let o = i - -144. What is the remainder when 54 is divided by o? 10 Suppose 0 = u - 6*u + 230. Let f be ((-2)/(-2))/(-8 + 50/6). Suppose 5*l - 453 = -5*n + 3*l, -f*l + 12 = 0. What is the remainder when n is divided by u? 43 Suppose 0 = 2*o + 83*b - 87*b - 356, -4*o = -b - 733. What is the remainder when 497 is divided by o? 129 Let g(a) = -4*a**3 - a - 13 - 17*a**2 + 4*a**3 + a**3 - 2*a**3. Let d be g(-17). Let l(b) = 3*b - 2. What is the remainder when 24 is divided by l(d)? 4 Suppose -12001 = -18*x + 5027. What is the remainder when x is divided by 106? 98 Let j = -1400 + 1542. What is the remainder when j is divided by 6? 4 Let z = 1443 - 1046. What is the remainder when z is divided by 16? 13 Let w(j) = 304*j**3 - 17*j**2 + 107*j - 97. What is the remainder when w(5) is divided by 36? 33 Let s = 238 - -22173. What is the remainder when s is divided by 31? 29 Suppose -2*t + 3*r = 1 - 23, 0 = 5*r + 20. Suppose -2 = -b - t*w + 15, -5*w = 15. What is the remainder when 76 is divided by b? 12 Let n(r) = 4 + 10 + 6*r - 45 - 55. What is the remainder when 24 is divided by n(15)? 0 Let l be (-2)/(-13) + 112/(-52). Let a(i) = -1 - 55*i**3 + 0*i**2 - i**2 - i**2 + 52*i**3 - i. Calculate the remainder when 22 is divided by a(l). 5 Let u(t) = -12*t**3 + 12*t**2 + 4*t + 2. Suppose 3*v = 4*v - 19. Suppose -3*y + g = 7 - 27, 2*y + 5*g = v. Calculate the remainder when u(-1) is divided by y. 1 Suppose 5*o = 5*w - 220, -9*w + 4*w = 3*o + 164. Let f be 124*(2/(-4) - -1). Let p = f + o. What is the remainder when 33 is divided by p? 5 Suppose 15*g + 48 = 12*g. Let h = g - -18. Calculate the remainder when ((-75)/h)/(4/(-8)) is divided by 26. 23 Let b(u) = 2*u**3 - 54*u**2 + 398*u - 1. Calculate the remainder when b(15) is divided by 163. 80 Suppose 5*w - 15 = 5*j - 110, 19 = j + 3*w. Suppose -4*q - 41 = -3*k, 19*q + j = k + 15*q. What is the remainder when 87 is divided by k? 10 Let d(w) = w**3 + 13*w**2 - 6*w - 32. Let t be d(-13). Let n = t + -44. Suppose 306 = 4*h + n*h. Calculate the remainder when h is divided by 27. 24 Let z(n) = 25*n**2 + 8*n - 13. Suppose -3*s =
Shashi Kumar is working as Scientist in Photogrammetry & Remote Sensing Department of Indian Institute of Remote Sensing (IIRS), ISRO, Dehradun. His research work is focused on SAR Remote Sensing with special emphasis on Polarimetric SAR (PolSAR), Polarimetric SAR Interferometry (PolInSAR) and SAR Tomography for structural and biophysical characterization of forest area. Shashi Kumar has supervised several research works on SAR Remote Sensing and its utilization for forest parameter retrieval. He is also actively involved in NISAR related activities to process the PolSAR & PolInSAR data and its utilization for various applications. He has carried out several research projects on SAR data and some of the major highlights are enumerated below.• PolSAR and PolInSAR based model development for stem volume and aboveground biomass (AGB) estimation of forest.• PolSAR Tomography for vertical tree structure of tropical forest.• Processing of Hybrid-Pol (RISAT-1, FRS-1) and Quad-Pol (RISAT-1, FRS-2) SAR data for semi-empirical modeling for forest AGB estimation.• Integration of PolSAR, PolInSAR and Terrestrial Laser Scanner (TLS) data for tree height estimation and modelling for forest AGB estimation.• Polarimetric modeling of Lunar Surface for scattering information retrieval using Chandrayaan-1, Mini-SAR• Hyperspectral Remote Sensing for Extraction of Aqueous Minerals on Mars and Optical Maturity Estimation of Titanium Dioxide & Ferrous Oxide on Lunar Surface. Publications (16) This will count as one of your downloads. You will have access to both the presentation and article (if available). Urban areas due to their dynamic nature often pose serious threats to environment causing overutilization of resources like ground water. The depleting ground water table often causes land subsidence leading to cracks in buildings. This subsidence can be easily mapped using PSInSAR (Persistent Interferometric Synthetic Aperture RADAR). In urban areas, there are many buildings per square kilometer which give permanent scatter and act as good corner reflectors at boundaries right angle to ground and walls. Rudrapur city, which is the headquarters, of Udham Singh Nagar district of Uttarakhand state in India, is also a major industrial hub and attracts skilled and unskilled labour force from the adjoining areas and this is leading to an unprecedented growth of urban sprawl. The city shows sprawling dense urban settlements and huge industrial setups on the outskirts, surrounded by agricultural fields and orchards. Main source of water supply is through bore wells and tube wells. Here, it was found that over the years, ground water has been harnessed for not only household supplies but also for agriculture and industrial purposes which has led to lowering of water table down from around 33.5 m to 45.7 m. This is leading to cracks developing in buildings particularly around the industrial area. The changes over a period of a year from 4th December 2014 till 2nd December 2015, were mapped using PSInSAR technique, with X-band TerraSAR-X datasets. Airborne synthetic aperture radar (SAR) data have been successfully used for forest height inversion; however, there is limited applicability in spaceborne scenarios due to high temporal decorrelation. This study investigates the potential of a high-resolution fully polarimetric interferometric pair of TerraSAR-X/TanDEM-X SAR data with no temporal decorrelation to analyze the backscatter and coherence response and to implement polarimetric SAR interferometry-based height inversion algorithms. The data were acquired over Barkot forest region of Uttarakhand state in India. Yamaguchi decomposition was implemented onto the dataset to express total backscatter as a sum of different scattering components from a single SAR resolution cell. Coherency matrix was used to compute complex coherence for different polarization channels. Forest areas suffered from low coherence due to volume decorrelation, whereas a dry river bed had shown high coherence. The coherence amplitude inversion approach overestimated the forest height and also resulted in false heights for this dry river bed. These limitations were overcome by implementing three-stage inversion modeling, which assumes polarization-independent volume coherence. The results were validated using ground truth data available for 49 plots, and the latter was found to be more accurate with an overall accuracy of 90.15% and root-mean-square error of 2.42 m. Forest height plays a crucial role in investigating the biophysical parameters of forests and the terrestrial carbon. PolInSAR-based inversion modeling has been successfully implemented on airborne and spaceborne synthetic aperture radar (SAR) data. SAR tomography is a recent approach to separate scatterers in the cross-range direction and generate its vertical profile. This study highlights the potential of tomographic processing of multibaseline fully polarimetric Radarsat-2 C-band SAR data to estimate radar reflectivity at different forest height levels. A teak patch of Haldwani forest in Uttarakhand state of India was chosen as the test site to perform tomography. Since SAR tomography is a spectral estimation problem, Fourier transform (FT), beamforming (BF), and Capon-based spectral estimators were applied on the dataset to obtain the backscattering power contributions at different forest height levels. Fourier showed high backscatter power retrieval at different forest heights. The radar reflectivities at different heights were significantly reduced by BF followed by Capon. Tomographic profile of FT severely suffered from high sidelobes, which was drastically reduced by implementing BF. Capon further reduced the sidelobes and achieved a substantially improved tomographic profile. The height maps were generated for these algorithms and validated with ground truth data. Forest height plays a crucial role to investigate the bio-physical parameters of forest and the terrestrial carbon. PolInSAR based inversion modeling has been successfully implemented on airborne and space-borne SAR data. SAR tomography, which is an extension of cross-track interferometric processing is a recent approach to separate scatterers in cross range direction, thus generates its vertical profile. This study highlighted the potential of tomographic processing of fully polarimetric Radarsat-2 SAR system to retrieve backscatter power at different height levels. Teak forest in Haldwani forest division of Uttarakhand state of India was chosen as the test site. Since SAR tomography is a spectral estimation problem, Fourier transform and beamforming based spectral estimations were applied on the dataset to obtain their vertical profiles. Fourier severely suffered from high side lobes which was drastically reduced by implementing beam-forming by taking into account the multi-looking effect at the expense of radiometric accuracy. Backscattered power values were found to be different at different height levels of the forest vegetation. Vertical profile for Fourier as well as beam-forming were also retrieved. Oceans are considered as the important source for oil reserves and continuous activities like oil extraction and transportation may sometimes cause the accidental release of oil into the sea surface which causes a major threat to the marine ecosystems, economy and human life. The prime focus of this study is to explore the potential of the fully polarimetric SAR data and analyze the different scattering mechanisms for the oil spilled regions. In this study the fully polarized and orthorectified, L band data of UAVSAR airborne sensor is used which is captured on June 22nd 2010, during which the Deepwater Horizon oil spill occurred in the Gulf of Mexico. For the detection of oil spill different decomposition techniques such as Freeman, Yamaguchi and H/A/α are studied and classified using Wishart classification. Freeman and Yamaguchi decomposition helped in understanding the type of scattering mechanism taking place in slick covered regions, sea surface and in the presence of ships/rig. A set of polarimetric parameters such as magnitude of correlation coefficient, cross product of co polarized channels, anisotropy, alpha ,entropy and the intensity of the coherency matrix are studied which helped in distinguishing the oil spills, sea surface and the look-alikes. The Wishart classification result of Freeman and Yamaguchi decompositions showed more reliable results in comparison to the K-means classification results obtained through segmentation of combined H/A/α decomposition. The entropy, anisotropy and magnitude of correlation coefficient are dependent on the angle of incidence. At low incidence angle the entropy value of oil spills are similar to that of the sea surface whereas the magnitude of correlation coefficient which is a function of dielectric constant, increases for oil spills at low incidence angle. The polarimetric parameter, intensity of the coherency matrix utilizes the whole coherency matrix by calculating its determinant and proven to provide good discrimination between the oil spills and the sea surface. The main objective of this study was to explore the potential of the multi-temporal PolSAR data in LULC mapping and to evaluate the accuracy of classification using single date and multi-temporal data. Multi-temporal data acquired on three different dates were used. Advanced classification techniques Support Vector Machine and Rule Based Hierarchical approaches were performed on multitemporal ALOS PALSAR data to classify features at different temporal combinations. In this study, SVM classification was applied on the derived output of Yamaguchi decomposition model, for which kernel approach of second order polynomial was used. In Rule Based Hierarchical approach, Backscattering coefficients, Yamaguchi and H/A/Alpha decomposition statistics are computed and analyzed to estimate the decision boundaries of the features to separate feature at different hierarchical levels. SVM classified the PolSAR data efficiently of single data, highest overall accuracy and kappa statistics achieved was 67.65% and 0.61 from the individual image. Rule based classified map of single date, highest overall accuracy and kappa statistics achieved was 68% and 0.67. Based on the accuracy assessment, SVM and Rule Based classification both are approximately of same accuracy but comparatively Rule Based classification was accurate temporally. Rule Based classification was further considered for multi-temporal classification and achieved high overall accuracy and kappa statistics of 80% and 0.76. This proves that multi-temporal PolSAR data helps to increase the accuracy of classification in LULC mapping. Polarimetric SAR data has proven its potential to extract scattering information for different features appearing in single resolution cell. Several decomposition modelling approaches have been developed to retrieve scattering information from PolSAR data. During scattering power decomposition based on physical scattering models it becomes very difficult to distinguish volume scattering as a result from randomly oriented vegetation from scattering nature of oblique structures which are responsible for double-bounce and volume scattering , because both are decomposed in same scattering mechanism. The polarization orientation angle (POA) of an electromagnetic wave is one of the most important character which gets changed due to scattering from geometrical structure of topographic slopes, oriented urban area and randomly oriented features like vegetation cover. The shift in POA affects the polarimetric radar signatures. So, for accurate estimation of scattering nature of feature compensation in polarization orientation shift becomes an essential procedure. The prime objective of this work was to investigate the effect of shift in POA in scattering information retrieval and to explore the effect of deorientation on regression between field-estimated aboveground biomass (AGB) and volume scattering. For this study Dudhwa National Park, U.P., India was selected as study area and fully polarimetric ALOS PALSAR data was used to retrieve scattering information from the forest area of Dudhwa National Park. Field data for DBH and tree height was collect for AGB estimation using stratified random sampling. AGB was estimated for 170 plots for different locations of the forest area. Yamaguchi four component decomposition modelling approach was utilized to retrieve surface, double-bounce, helix and volume scattering information. Shift in polarization orientation angle was estimated and deorientation of coherency matrix for compensation of POA shift was performed. Effect of deorientation on RGB color composite for the forest area can be easily seen. Overestimation of volume scattering and under estimation of double bounce scattering was recorded for PolSAR decomposition without deorientation and increase in double bounce scattering and decrease in volume scattering was noticed after deorientation. This study was mainly focused on volume scattering retrieval and its relation with field estimated AGB. Change in volume scattering after POA compensation of PolSAR data was recorded and a comparison was performed on volume scattering values for all the 170 forest plots for which field data were collected. Decrease in volume scattering after deorientation was noted for all the plots. Regression between PolSAR decomposition based volume scattering and AGB was performed. Before deorientation, coefficient determination (R<sup>2</sup>) between volume scattering and AGB was 0.225. After deorientation an improvement in coefficient of determination was found and the obtained value was 0.613. This study recommends deorientation of PolSAR data for decomposition modelling to retrieve reliable volume scattering information from forest area. Forests act as sink of carbon and as a result maintains carbon cycle in atmosphere. Deforestation leads to imbalance in global carbon cycle and changes in climate. Hence estimation of forest biophysical parameter like biomass becomes a necessity. PolSAR has the ability to discriminate the share of scattering element like surface, double bounce and volume scattering in a single SAR resolution cell. Studies have shown that volume scattering is a significant parameter for forest biophysical characterization which mainly occurred from vegetation due to randomly oriented structures. This random orientation of forest structure causes shift in orientation angle of polarization ellipse which ultimately disturbs the radar signature and shows overestimation of volume scattering and underestimation of double bounce scattering after decomposition of fully PolSAR data. Hybrid polarimetry has the advantage of zero POA shift due to rotational symmetry followed by the circular transmission of electromagnetic waves. The prime objective of this study was to extract the potential of Hybrid PolSAR and fully PolSAR data for AGB estimation using Extended Water Cloud model. Validation was performed using field biomass. The study site chosen was Barkot Forest, Uttarakhand, India. To obtain the decomposition components, m-alpha and Yamaguchi decomposition modelling for Hybrid and fully PolSAR data were implied respectively. The RGB composite image for both the decomposition techniques has generated. The contribution of all scattering from each plot for m-alpha and Yamaguchi decomposition modelling were extracted. The R2 value for modelled AGB and field biomass from Hybrid PolSAR and fully PolSAR data were found 0.5127 and 0.4625 respectively. The RMSE for Hybrid and fully PolSAR between modelled AGB and field biomass were 63.156 (t ha-1) and 73.424 (t ha-1) respectively. On the basis of RMSE and R2 value, this study suggests Hybrid PolSAR decomposition modelling to retrieve scattering element for AGB estimation from forest. SAR and LiDAR remote sensing have already shown the potential of active sensors for forest parameter retrieval. SAR sensor in its fully polarimetric mode has an advantage to retrieve scattering property of different component of forest structure and LiDAR has the capability to measure structural information with very high accuracy. This study was focused on retrieval of forest aboveground biomass (AGB) using Terrestrial Laser Scanner (TLS) based point clouds and scattering property of forest vegetation obtained from decomposition modelling of RISAT-1 fully polarimetric SAR data. TLS data was acquired for 14 plots of Timli forest range, Uttarakhand, India. The forest area is dominated by Sal trees and random sampling with plot size of 0.1 ha (31.62m*31.62m) was adopted for TLS and field data collection. RISAT-1 data was processed to retrieve SAR data based variables and TLS point clouds based 3D imaging was done to retrieve LiDAR based variables. Surface scattering, double-bounce scattering, volume scattering, helix and wire scattering were the SAR based variables retrieved from polarimetric decomposition. Tree heights and stem diameters were used as LiDAR based variables retrieved from single tree vertical height and least square circle fit methods respectively. All the variables obtained for forest plots were used as an input in a machine learning based Random Forest Regression Model, which was developed in this study for forest AGB estimation. Modelled output for forest AGB showed reliable accuracy (RMSE = 27.68 t/ha) and a good coefficient of determination (0.63) was obtained through the linear regression between modelled AGB and field-estimated AGB. The sensitivity analysis showed that the model was more sensitive for the major contributed variables (stem diameter and volume scattering) and these variables were measured from two different remote sensing techniques. This study strongly recommends the integration of SAR and LiDAR data for forest AGB estimation. Polarization orientation angle (POA) shift in the backscattered SAR wave induced, due to irregularity of the target surface. Polarimetric signatures of the backscatter SAR wave gets affected by the POA shift, causes error in the decomposition modelling as shift in POA makes coherency matrix asymmetric. POA shift compensation is very necessary to avoid misinterpretation of decomposition modelling results. POA shift effect has been observed using coherency matrix and decomposition model results. This study is conducted over Dudhwa National Park in the state of Uttar Pradesh, using high resolution, TDM SAR COSSC Product of TerraSAR-X and TanDEM-X in Bistatic mode. Present study mainly focused on the comparative analysis of resultant scattering component of decomposition model before and after POA shift compensation. Shift in POA is investigated using circular polarization technique. Yamaguchi four component decomposition model is used to express total backscatter information in terms of volume, double bounce, surface and helix scattering. Volume scattering is overestimated however double bounce and surface scattering is under estimated in decomposition model due to POA shift present in the backscatter SAR wave. Different scattering mechanisms resulted after POA compensation were analyzed using 100 random points taken from forest structure. The results obtained by TerraSAR-X and TanDEM-X shows an overall increase in double bounce scattering and decrease in volume scattering component after POA shift compensation. It is observed that there is negligible effect of POA shift on surface scattering. POA shift compensation necessarily required to improve the accuracy of decomposition models used in the forest parameter retrieval applications. Airborne SAR data has been successfully used for forest height inversion, however there is limited applicability in space borne scenario due to high temporal decorrelation. This study investigates the potential of high resolution fully polarimetric pair of TerraSAR-X/TanDEM-X SAR data acquired over Barkot forest region of Uttarakhand state in India to analyze the backscatter and coherence and to test the height inversion algorithms. Yamaguchi decomposition was implemented onto the dataset to express total backscatter as a sum of different scattering components from a single SAR resolution cell. Coherency matrix was used to compute complex coherence for different polarization channels. Forest areas suffered from low coherence due to volume decorrelation whereas dry river bed had shown high coherence. Appropriate perpendicular baseline and hence the interferometric vertical wavenumber was selected in forest height estimation. Coherence amplitude inversion (CAI) approach overestimated the forest height and also resulted in false heights for dry river bed. This limitation was overcome by implementing three stage inversion modeling (TSI) which assumes polarization independent volume coherence and the heights in dry river bed were completely eliminated. The results were validated using ground truth data available for 49 plots, and TSI was found to be more accurate with an average accuracy of 90.15% and RMSE of 2.42 m. Fully Polarimetric SAR (PolSAR) data is used for scattering information retrieval from single SAR resolution cell. Single SAR resolution cell may contain contribution from more than one scattering objects. Hence, single or dual polarized data does not provide all the possible scattering information. So, to overcome this problem fully Polarimetric data is used. It was observed in previous study that fully Polarimetric data of different dates provide different scattering values for same object and coefficient of determination obtained from linear regression between volume scattering and aboveground biomass (AGB) shows different values for the SAR dataset of different dates. Scattering values are important input elements for modelling of forest aboveground biomass. In this research work an approach is proposed to get reliable scattering from interferometric pair of fully Polarimetric RADARSAT-2 data. The field survey for data collection was carried out for Barkot forest during November 10th to December 5th, 2014. Stratified random sampling was used to collect field data for circumference at breast height (CBH) and tree height measurement. Field-measured AGB was compared with the volume scattering elements obtained from decomposition modelling of individual PolSAR images and PolInSAR coherency matrix. Yamaguchi 4-component decomposition was implemented to retrieve scattering elements from SAR data. PolInSAR based decomposition was the great challenge in this work and it was implemented with certain assumptions to create Hermitian coherency matrix with co-registered polarimetric interferometric pair of SAR data. Regression analysis between field-measured AGB and volume scattering element obtained from PolInSAR data showed highest (0.589) coefficient of determination. The same regression with volume scattering elements of individual SAR images showed 0.49 and 0.50 coefficients of determination for master and slave images respectively. This study recommends use of interferometric PolSAR data for reliable scattering retrieval. Synthetic Aperture Radar (SAR) is one of the most recent imaging technology to study the forest parameters. The invincible characteristics of microwave acquisition in cloudy regions and night imaging makes it a powerful tool to study dense forest regions. A coherent combination of radar polarimetry and interferometry (PolInSAR) enhances the accuracy of retrieved biophysical parameters. This paper attempts to address the issue of estimation of forest structural information caused due to instability of radar platforms through simulation of SAR image. The Terai Central Forest region situated at Haldwani area in Uttarakhand state of India was chosen as the study area. The system characteristics of PolInSAR dataset of Radarsat-2 SAR sensor was used for simulation process. Geometric and system specifications like platform altitude, center frequency, mean incidence angle, azimuth and range resolution were taken from metadata. From the field data it was observed that average tree height and forest stand density were 25 m and 300 stems/ha respectively. The obtained simulated results were compared with the sensor acquired master and slave intensity images. It was analyzed that for co-polarized horizontal component (HH), the mean values of simulated and real master image had a difference of 0.3645 with standard deviation of 0.63. Cross-polarized (HV) channel showed better results with mean difference of 0.06 and standard deviation of 0.1 while co-polarized vertical component (VV) did not show similar values. In case of HV polarization, mean variation between simulated and real slave images was found to be the least. Since cross-polarized channel is more sensitive to vegetation feature therefore better simulated results were obtained for this channel. Further the simulated images were processed using PolInSAR inversion modelling approach using three different techniques DEM differencing, Coherence Amplitude Inversion and Random Volume over Ground Inversion. DEM differencing technique calculates tree height by generating Digital Elevation Models (DEM) from interferograms in different polarizations and differences in DEM estimates the vegetation height. In CAI technique the phase of coherence is ignored and volume scattering is mainly considered for estimating height. The RVoG model considers both vegetation layer and ground interactions. In this model, the vertical distribution of scatterers do not change with the change in polarization. It was found that with vertical wavenumber values between 0.2113 to .2249 rad/m for mean incidence angle 34.226 degrees the range of tree height achieved by Coherence Amplitude Inversion and RVoG was better among the three inversion techniques. A new approach to reconstruction of pseudo quad-polarized data from hybrid polarimetric data has been presented in this research. The algorithm is based on certain assumptions which were validated upon testing the aptness of the results and their comparison with true optical images of the region under study. This involved direct construction of the 3X3 coherency matrix from the 2X1 scattering matrices obtained from the hybrid polarimetric data. The reasonableness of the assumptions were tested by decomposing the reconstructed pseudo quad-pol data using a coherent decomposition mechanism. The data set used in this project was Level-1 FRS-1 Hybrid Polarimetric data and FRS-2 Quad-pol data of RISAT-1. Reliable scattering retrieval from SAR data involves the calibration of the data. Polarimetric calibration was performed on real and imaginary channels of the single look complex SAR data. The newly developed algorithm was implemented on calibrated data. To extract complete information of different scattering elements of any location, second order derivative of scattering matrix is the most suitable and widely used matrix. Coherency matrix of pseudo quad-pol obtained from hybrid polarimetric data using reconstruction algorithm was decomposed using Yamaguchi four component decomposition for scattering information extraction. The obtained surface, double-bounce and volume scattering were compared with the scattering elements of hybrid-polarimetric decomposition, m-alpha and decomposition of quad-pol data of RISAT-1. The comparison revealed that the results obtained were satisfactory and thus the assumptions made during the reconstruction of pseudo quad-pol data were reasonable for specific purposes. Further comparisons of results using different decompositions technique at pixel level comparison can help better understand the aptness of the algorithm. Surface maturity estimation of the lunar regolith revealed selenological process behind the formation of lunar surface, which might be provided vital information regarding the geological evolution of earth, because lunar surface is being considered as 8-9 times older than as that of the earth. Spectral reflectances data from Moon mineralogy mapper (M3), the hyperspectral sensor of chandrayan-1 coupled with the standard weight percentages of FeO from lunar returned samples of Apollo and Luna landing sites, through data interpolation techniques to generate the weight percentage FeO map of the target lunar locations. With the interpolated data mineral maps were prepared and the results are analyzed. 100 t/ha), remains a challenging task for the researchers worldwide. The retrieval of AGB over a tropical forest area in India using Envisat advanced synthetic aperture radar C-band backscatter, interferometric synthetic aperture radar (InSAR) coherence and semi-empirical models viz., water cloud model (WCM) and interferometric water cloud model (IWCM), is studied. In process, the model parameters, i.e., backscatter from vegetation and ground, two-way tree transmissivity, and coherence from vegetation and ground were retrieved. The model training procedure to retrieve the model parameters consisted of an iterative regression of WCM and IWCM. High AGB accuracy (R2=0.73) with low root mean square error (RMSE=53.76 t/ha) was achieved through multidate weighted averaging using RMSE-based weighting coefficients and WCM. Multidate data and InSAR coherence images showed better results (R2=0.90, RMSE=35.92 t/ha) compared to individual coherence images. The InSAR coherence was found to be better for AGB retrieval than SAR backscatter as the former did not saturate for high AGB values. My Library You currently do not have any folders to save your paper to! Create a new folder below. Keywords/Phrases Keywords in Remove in Remove in Remove + Add another field Search In: Proceedings Volume Journals + Volume Issue Page Journal of Applied Remote SensingJournal of Astronomical Telescopes Instruments and SystemsJournal of Biomedical OpticsJournal of Electronic ImagingJournal of Medical ImagingJournal of Micro/Nanolithography, MEMS, and MOEMSJournal of NanophotonicsJournal of Photonics for EnergyNeurophotonicsOptical EngineeringSPIE Reviews
Where I Sell My Photos Search my blog Visitors Here Search 30.1.11 A seed library operates just like your local library, but instead of stocking books it carries vegetable, annual and perennial seeds. The idea behind them is to encourage seed saving, the exchange of seed history, nurture new gardeners, exchange gardening information and build communities through seeds. Seed libraries are also great ways to acquire heirloom and open pollinated seeds. The biggest benefit though of a seed library, in my opinion, is how it can help foster a feeling of community among people who may have little else in common. 27.1.11 Hippeastrum, say it out loud, Hippeastrum. What an ugly name for an Amaryllis, right? Hippeastrum is a genus in the Amaryllidaceae family. Depending on the source Hippeastrum means either "horseman's star," "knight's star" or "horse's Star". Why? Nobody really knows. What the experts, fancy gardeners and botanists know is that Amaryllis isn't the proper name for these bulbs, and yet we persist on using the name. Maybe it is because the word sounds as beautiful as the blooms look. 'Lemon Lime' is my latest Amaryllis to bloom and it looks remarkably like my 'Mont Blanc,' but greener. 'Lemon Lime' is one of the "green" hybrid Amaryllis bulbs, the coloration and shape of the bloom can vary from bulb to bulb. 22.1.11 This week I attended the Mid-America Horticultural Trade Show and saw number of really cool garden products and plants. The highlight of the event was the garden writers luncheon hosted by Proven Winners and Spring Meadow Nursery with a presentation by Tom Carruth of Weeks Roses. If you're a rosarian Tom probably doesn't need an introduction. For those gardeners, like me, for whom roses aren't an obsession, Tom Carruth has been described as "King of the roses" for creating more All-America roses than any other living hybridizer. I should note here that hybrids in the rose world don’t have the same stigma as they do in the annual and vegetable world. Hybrid roses make rose growing possible for people who live in areas that aren’t ideal living conditions for roses. These roses are usually heartier, bloom more prolifically, and are less prone to diseases. 5.1.11 I find the tropical bulbs commonly referred to as Amaryllis to be almost the perfect houseplant for any indoor gardener. I can't sing the praises of the Amaryllis enough. Well, technically of the Hippeastrum, but Amaryllis just sounds so much nicer. The inflorescence-flower stalk-emerges from a bulb and puts on a showy display of exotic, colorful flowers. If pollinated, the blooms can produce seeds pods, otherwise the flowers wither and die and are replaced by strappy green leaves. Once you've observed that first bloom, of even the most common Amaryllis bulb, you'll be left wanting more. Over the past few years I've collected several bulbs and my latest is "Charisma."
Telopea, New South Wales Telopea is a suburb of Sydney, in the state of New South Wales, Australia. Telopea is located 23 kilometres north-west of the Sydney central business district, in the local government area of the City of Parramatta. The suburb is bordered by Kissing Point Road to the south and Pennant Hills Road to the north. Name Telopea is named from Telopea speciosissima, the New South Wales waratah, a plant that was abundant in the area before it was colonised and which became the floral emblem of New South Wales. Transport Telopea railway station is on the Carlingford Line of the Sydney Trains network. The area is serviced by State Transit route 545 A conversion of the Camellia to Carlingford section of the Carlingford railway line to light rail was announced in 2015 as part of the Parramatta Light Rail project. Commercial area Waratah Shopping Centre, located on Benaud Place, has many retail shops including an IGA supermarket, newsagent, chemist, kebab shop, post office, bakery and a hair and beauty salon. A small group of shops is also located opposite the railway station on Adderton Road. Housing Telopea is mainly low to low-medium density housing with most of the dwellings having been built after the Second World War. The suburb is bisected by the Carlingford railway line with most of the medium-density housing lying adjacent to the train line. Parks Telopea contains a large tract of bushland on its western edge, backing onto the Oatlands golf course. The bushland, the Vineyard Creek Reserve as it is known contains a spring-fed creek and has several waterfalls on its course before it disappears beneath Kissing Point road to the south. The creek and the bushland are protected as environmental areas. Places of Worship The local Anglican Church meets in Telopea on Saturday evenings and at Dundas on Sundays. Telopea Christian Centre is another local Church. Community Facilities Local facilities include a primary school, an alternative educational facility, a library, community hall and a community garden. Heritage listings Telopea has a number of heritage-listed sites, including: 34 Adderton Road: Redstone Population At the , Telopea recorded a population of 5,426. Of these: The age distribution was quite similar to the country in general. The median age was 38 years, identical to the national median. Children aged 0–14 years made up 17.8% of the population (national average is 18.7%) and people aged 65 years and over made up 14.0% of the population (national average is 15.8%). 46.0% of people were born in Australia. The most common countries of birth were China 14.8%, South Korea 7.2%, Lebanese/Iran 33%, and Hong Kong 2.2%. 40.7% of people only spoke English at home. Other languages spoken at home included Mandarin 14.3%, Korean 9.9%, Cantonese 9.0%, Arabic 17.6% and Persian 12.4%. The most common responses for religion were No Religion 30.7%, Catholic 18.6% and Anglican 8.6%. References Category:Suburbs of Sydney Category:City of Parramatta
Embodiments of the invention are directed, in general, to communication systems and, more specifically, to sensor assisted GNSS receivers. Any satellite-based navigation system suffers significant performance degradation when satellite signal is blocked, attenuated and/or reflected (multipath), for example, indoor and in urban canyons. As MEMS technologies advance, it becomes more interested to integrate sensor-based inertial navigation system (INS) solutions into global navigation satellite system (GNSS) receivers, in pedestrian applications as well as in vehicle applications. As GNSS receivers become more common, users continue to expect improved performance in increasingly difficult scenarios. GNSS receivers may process signals from one or more satellites from one or more different satellite systems. Currently existing satellite systems include global positioning system (GPS), and the Russian global navigation satellite system (Russian: OHACC, abbreviation of OaHaHABaOHHaCyTHKOBaCCTeMa; tr.: GLObal'naya NAvigatsionnaya Sputnikovaya Sistema; “GLObal NAvigation Satellite System” (GLONASS). Systems expected to become operational in the near future include Galileo, quasi-zenith satellite system (QZSS), and the Chinese system Beidou. For many years, inertial navigation systems have been used in high-cost applications such as airplanes to aid GNSS receivers in difficult environments. One example that uses inertial sensors to allow improved carrier-phase tracking may be found in A. Soloviev, S. Gunawardena, and F. van Graas, “Deeply integrated GPS/Low-cost IMU for low CNR signal processing: concept description and in-flight demonstration,” Journal of the Institute of Navigation, vol. 55, No. 1, Spring 2008; incorporated herein by reference. The recent trend is to try to integrate a GNSS receiver with low-cost inertial sensors to improve performance when many or all satellite signals are severely attenuated or otherwise unavailable. The high-cost and low-cost applications for these inertial sensors are very different because of the quality and kinds of sensors that are available. The problem is to find ways that inexpensive or low-cost sensors can provide useful information to the GNSS receiver. Low-cost sensors may not be able to provide full navigation data. Or they may only work in some scenarios. In the past, most integration techniques for GNSS receivers and sensors assumed the sensors constituted a complete stand-alone navigation system or that its expensive components allow it to give precise measurements. Low-cost sensors cannot always allow for these assumptions. In addition, traditionally the INS is assumed to be fully calibrated, which is not always possible. What is needed is low-complexity GNSS/IMU integration apparatus and methods to improve GNSS performance in harsh environments such as indoors, parking garages, deep urban canyons, and the like.
Risk factors for infection and immunoglobulin replacement therapy in adult nephrotic syndrome. Infection has been recognized as an important cause of morbidity and mortality in children with nephrotic syndrome. However, the incidence and severity of infection and the mechanisms responsible for the increased susceptibility to infection are still unclear in adults. We studied 86 consecutive adult patients with nephrotic syndrome but no diabetic nephropathy. Risk factors for infection were evaluated by logistic regression analysis. Infections were found in 16 patients (19%), of whom six died of infection and two developed end-stage renal failure associated with infection. The relative risk for bacterial infection among patients with serum immunoglobulin G (IgG) levels below 600 mg/dL was 6.74 compared with that for patients with serum IgG levels over 600 mg/dL (95% confidence interval, 1.22 to 36.32; P = 0.029). In patients with serum creatinine levels over 2.0 mg/dL, the relative risk of bacterial infection was 5.31 compared with patients with serum creatinine levels below 2.0 mg/dL (95% confidence interval, 1.08 to 26.09; P = 0.040). Intravenous immunoglobulin (10 to 15 g) was administered prospectively every 4 weeks to 18 patients with serum IgG levels below 600 mg/dL until serum IgG levels increased to over 600 mg/dL. Administration of immunoglobulin resulted in a decreased rate of bacterial infections to a level equal to that in patients with endogenous levels over 600 mg/dL. These data indicate that hypogammaglobulinemia and renal insufficiency are independent risk factors for bacterial infection in adult patients with nephrotic syndrome. The effects of intravenous immunoglobulin suggest that maintenance of serum IgG levels over 600 mg/dL may reduce the risk of infection.
After teasing the collaboration in its Spring/Summer 2020 lookbook, Commonwealth has now given an official look at its upcoming release with K-Swiss. Taking on the Classic 66 silhouette, the brand has used a variety of different textures and materials across the sneaker. The silhouette features different materials on every panel, with no two panels constructed from the same textile. This includes a mix of suede, leather, synthetic and textile across the upper, all of which come in a variety of white and off-white tones. Elsewhere, the sneaker features creped rubber outsole, metal D-rings, branded sockliners and printed Commonwealth lace tips. Speaking about the collaboration, Commonwealth Design Director Omar Quaimbao explained that, “One of our goals with this project was to create an every day all white sneaker, where the details aren’t just the details, but the product.”
I get this question a lot from friends and acquaintances alike, and since the fifth season is about to start up, I’d thought I’d give you the down-low on one of the BBC’s most successful family shows. Who doesn’t love a good legend retelling, right? Especially one for King Arthur. Where Merlin is his BFF instead of The Original Gandalf. (Spoilers for all of Merlin.) In keeping with Hollywood and television’s current bromance obsession, Merlin builds its premise on the concept that Arthur (a prince rather than a king at the start of the series) and Merlin are peers, living in a Camelot that is hostile toward any and all forms of magic. Merlin (Colin Morgan) must keep his budding powers a secret all while being Arthur’s (Bradley James) manservant – saving the future king’s royal backside and never allowed to let anyone know he’s special. There’s a lot to recommend the series in that regard: the U.K. has always seemed to favor the brain rather than the jock in their fiction, and the show loves to poke fun at young Arthur’s macho posturing, setting Merlin up as the true hero, a character who speaks to every young geek who ever felt outcast because they were different. He may be clumsy and gawky, but he’s loyal to a fault and makes comrades quickly, even winning Arthur over by the end of the first season, despite the prince’s insistence that a member of the royal household and a servant could never possibly be friends. Practically every British stock actor has passed through the show, and you’re bound to recognize a host of friendly faces if you have any love for U.K. television or film. (Especially if you love Doctor Who. Never mind the guest actors, the majority of the starring cast had spots on Who, from Anthony Stewart Head’s outstanding performance as Mr. Finch in “School Reunion” to Colin Morgan’s stint as the teeenaged goth angst well, Jethro, in “Midnight.”) In addition, the BBC’s policy of colorblind casting has allowed some actors who would normally never be considered for leading roles due to the time period to step up to the plate – Guinevere is played by a black actress, the elegant Angel Coulby, whose brother Elyan (Adetomiwa Edun) becomes a knight of Camelot. In the past, women tend to come off badly in these stories, always the villains, and always leading men off their appropriate path unless they are chaste and good and lovely. While Merlin does not shy away from this pantheon of female evil-doers, their desires in this universe are much more warranted: magic users have been hunted down for years by Arthur’s father, Uther (Anthony Stewart Head), after he asked a sorceress to help Arthur’s mother conceive and lost his wife in childbirth. When Lady Morgana (Katie McGrath), first introduced as the king’s ward, begins to realize she has magic abilities, her descent into anger (and, arguably, madness) is earned because of what she knows will happen to her if Uther ever finds out. It’s a surprisingly deft persecution allegory, and if Merlin happens to be on the side of good, it could have a lot to do with the fact that being a man in his situation leaves him certain advantages that women do not have. Of course, the real interest is in the retelling, watching how this show chooses to pick up aspects of Arthurian legend and re-spin it for a younger, more modern audience. They’ve dealt with the Lady of the Lake, Mordred, Lancelot’s love for Guinevere, the introduction of the Round Table, and the Sword in the Stone, among other things. It looks as though we might be preparing for a fight between the Red and White dragons in season 5 as well. Has the show handled all of these bits of myth with aplomb? Well… it depends. Some have been tackled in a particularly clever way, while others have failed to live up to the western world’s veritable library extolling the history of Camelot. Part of the problem lies in the medium: family entertainment does not lend itself well to tales of adultery, married couples who can’t conceive, and complicated love triangles. It’s here were Merlin falters most. The handling of Guinevere and Lancelot’s “affair” in the 4th season is blunderous and resolved even more poorly. (In short, evil Morgana’s magic made them do it, but that’s never brought to light, which makes Arthur and Guinevere’s reconciliation horribly awkward.) Those gritty details hung over the fourth season like a cloud, putting a damper on the show’s usual lively upbeat-edness. Merlin’s sense of humor is honestly its saving grace, and that humor counts for a lot where the show is concerned. Their willingness to make make Arthur look the fool when he’s trying to be cool, to get Merlin involved in magic he cannot control, to make sure every character gets their laugh, is part of Merlin’s enduring charm, and undoubtedly what keeps its audience returning. Okay, the cool magic and John Hurt-as-a-dragon probably help a bit too. Also the stunning fight sequences and the fact that it’s filmed in a real castle in France. In addition, it plays with a very important lesson for children and adults alike: that true heroes evolve, rather than emerge fully formed with their ideals intact. Instead of wizened Merlin’s thoughtful lessons to young Wart, we have an Arthur who is essentially a frat boy bully, who learns humility, kindness, and integrity through friends who see more in him than just a spoiled royal brat. It gives the show enormous heart, and builds its characters into a wonderful, unlikely family. With all of this in mind, I thought I’d do a little breakdown of the seasons for you, and let you get to watching. And if you’ve got it queued up on Netflix or some other viewing implement, I encourage you to give it a shot, if only for unapologetic fantasy fun in adorable 45 minute increments. Stop here if you don’t want to be spoiled on the series. If you want to jump right into season 5, though, keep reading. Season 1: Merlin journeys to Camelot to stay with his Uncle Gaius (Richard Wilson), the Court Physician, and begins to develop his magic powers in secret. He becomes Arthur’s manservant after saving his life from a sorceress’s attack. He meets the Great Dragon, imprisoned below Camelot, and finds out that he and Arthur have a great destiny to restore magic to Camelot and bring about the land of Albion. Lancelot (Santiago Cabrera) briefly becomes a knight, but is banished when it is discovered that he has no noble parentage. After Arthur is poisoned by the Questing Beast, Merlin asks Nimueh (Michelle Ryan) for a cure, then battles her after her help proves false, and destroys her. Season 2: Morgana’s magic abilities begin to come to the forefront, frightening her with prophetic dreams. She is manipulated by the druid child Mordred (Asa Butterfield). Lancelot and Guinevere have a brief romance before Lancelot realizes Gwen’s feelings for Arthur and leaves. Merlin agrees to set the Great Dragon free after he forges Excalibur to help Arthur. The sword is misused by Uther and Merlin throws it in a lake. Morgause (Emilia Fox) makes her first appearance. Merlin eventually releases the Dragon, who proceeds to destroy Camelot. Arthur and Merlin search for the last Dragonlord (Merlin’s father, who Merlin never knew was alive), but he dies after they reach him, passing his gifts to his son. The Great Dragon and Merlin meet and form a truce and bond. Season 3: Takes place a full year after season 2. Morgana joins with Morgause (her half sister) to try and drive Uther insane. She finds out that she is his daughter and also Arthur’s half sister, making her a potential heir to Camelot’s throne. Gwaine (Eoin Macken) is introduced, but banished. The romance between Arthur and Gwen grows, but she is convinced she cannot become queen after spending her life as a servant. Uther agrees and almost has Gwen killed when he finds out about the affair, until Arthur pretends he had been put under a spell by a sorcerer. Morgana briefly deposes Uther with the help of Morgause and King Cenred (Tom Ellis). Merlin helps Arthur rally knights and take back the kingdom. Merlin uses Excalibur once again, and then places it in a stone in the forest. Season 4: Morgause dies. Lancelot sacrifices himself to prevent Arthur from doing so after Morgana opens the veil between the living and the dead. Agravaine, Arthur’s uncle, comes to help the prince rule Camelot now that Morgana’s betrayal has destroyed Uther. Agravaine (Nathaniel Parker) is truly working for Morgana, and Uther is murdered saving his son’s life. The Great Dragon is no longer the last one once Merlin finds a dragon egg, and names the white dragon Aithusa. Arthur and Guinevere get engaged, and Morgana revives Lancelot, casting a spell on him and Gwen to provoke an affair in order to ruin the impending marriage. Guinevere is banished and Lancelot is returned to the world of the dead, appearing to commit suicide. Morgana strikes Camelot with a mighty army and Agravaine’s betrayal comes to light. Merlin tells Arthur a “legend” of a special sword in a stone to restore the king’s confidence, and lets Arthur retrieve it and fight off Morgana. Aithusa comes to Morgana’s aid after her defeat. Guinevere and Arthur are reunited and married. Tune in this Saturday for Merlin’s Season 5 premiere on the BBC! Emmet Asher-Perrin is seriously considering getting the chainmail together to cosplay Arthur some day. You can bug her on Twitter and read more of her work here and elsewhere.
Colorado Springs Colorado Springs, city, seat (1873) of El Paso county, central Colorado, U.S. It stands on a mesa (6,008 feet [1,831 metres]) near the eastern base of Pikes Peak, east of Pike National Forest. Founded in 1871 as Fountain Colony by General William J. Palmer, builder of the Denver and Rio Grande Western Railroad, it was renamed for the nearby Manitou mineral springs. Growth of the area followed the Cripple Creek gold strikes in the 1890s and the promotion of tourism related to the health-resort trade. In 1917 Colorado Springs consolidated with Colorado City (founded 1859 as El Dorado City). The establishment of military installations gave further impetus to development. The North American Aerospace Defense Command (NORAD) and the U.S. Space Command are headquartered at Peterson Air Force Base (1942). The hollowed-out interior of nearby Cheyenne Mountain houses the command and control facilities of NORAD and of other agencies; since 1966 it has been a primary base for aerospace defense and for the tracking of orbiting objects. Fort Carson (1942) is on the city’s southern edge, while the U.S. Air Force Academy (1958) is set against a backdrop of the Rampart Range. Like other cities along the Front Range, Colorado Springs experienced tremendous growth in the 1980s and 1990s. Within a span of seven years (1990–97), the population of Colorado Springs increased from about 280,000 to more than 330,000, and much of the city’s large (186 square miles [482 square km]), formerly open, incorporated area was developed during this time. The city is the site of Colorado College (1874), the University of Colorado at Colorado Springs (1965), and Nazarene Bible College (1967) and is well served by rail, road, and air links. The Garden of the Gods, a 1,350-acre (546-hectare) natural park with red sandstone monoliths, now a National Landmark, is one of many scenic attractions in the area. Of cultural and historical interest are the Colorado Springs Pioneers Museum, the Colorado Springs Fine Arts Center, and the May Natural History Museum. The U.S. Olympic Complex, near the city centre, is the headquarters of many national amateur-athletic associations and a training ground for athletes preparing for Olympic competition. Inc. town, 1872; city, 1886. Pop. (2000) 360,890; Colorado Springs Metro Area, 537,484; (2010) 416,427; Colorado Springs Metro Area, 645,613.
namespace Microsoft.ApplicationInsights.Tests { #if NETCOREAPP using System; using System.Collections.Generic; using System.Diagnostics; using System.Linq; using System.Net.Http; using System.Threading; using System.Threading.Tasks; using Microsoft.ApplicationInsights.Common; using Microsoft.ApplicationInsights.DataContracts; using Microsoft.ApplicationInsights.DependencyCollector; using Microsoft.ApplicationInsights.DependencyCollector.Implementation; using Microsoft.ApplicationInsights.Extensibility; using Microsoft.ApplicationInsights.Extensibility.Implementation; using Microsoft.ApplicationInsights.Extensibility.Implementation.ApplicationId; using Microsoft.ApplicationInsights.TestFramework; using Microsoft.ApplicationInsights.Web.TestFramework; using Microsoft.AspNetCore.Builder; using Microsoft.AspNetCore.Hosting; using Microsoft.AspNetCore.Http; using Microsoft.VisualStudio.TestTools.UnitTesting; /// <summary> /// .NET Core specific tests that verify Http Dependencies are collected for outgoing request /// </summary> [TestClass] public class DependencyTrackingTelemetryModuleTestNetCore { private const string IKey = "F8474271-D231-45B6-8DD4-D344C309AE69"; private const string FakeProfileApiEndpoint = "https://dc.services.visualstudio.com/v2/track"; private const string localhostUrl = "http://localhost:5050"; private const string expectedAppId = "cid-v1:someAppId"; private readonly OperationDetailsInitializer operationDetailsInitializer = new OperationDetailsInitializer(); private readonly DictionaryApplicationIdProvider appIdProvider = new DictionaryApplicationIdProvider(); private StubTelemetryChannel channel; private TelemetryConfiguration config; private List<DependencyTelemetry> sentTelemetry; /// <summary> /// Initialize. /// </summary> [TestInitialize] public void Initialize() { Activity.DefaultIdFormat = ActivityIdFormat.W3C; Activity.ForceDefaultIdFormat = true; this.sentTelemetry = new List<DependencyTelemetry>(); this.channel = new StubTelemetryChannel { OnSend = telemetry => { // The correlation id lookup service also makes http call, just make sure we skip that DependencyTelemetry depTelemetry = telemetry as DependencyTelemetry; if (depTelemetry != null) { this.sentTelemetry.Add(depTelemetry); } }, EndpointAddress = FakeProfileApiEndpoint }; this.appIdProvider.Defined = new Dictionary<string, string> { [IKey] = expectedAppId }; this.config = new TelemetryConfiguration { InstrumentationKey = IKey, TelemetryChannel = this.channel, ApplicationIdProvider = this.appIdProvider }; this.config.TelemetryInitializers.Add(new OperationCorrelationTelemetryInitializer()); this.config.TelemetryInitializers.Add(this.operationDetailsInitializer); } /// <summary> /// Cleans up. /// </summary> [TestCleanup] public void Cleanup() { while (Activity.Current != null) { Activity.Current.Stop(); } } /// <summary> /// Tests that dependency is collected properly when there is no parent activity. /// </summary> [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionWithLegacyHeaders() { using (var module = new DependencyTrackingTelemetryModule()) { module.EnableLegacyCorrelationHeadersInjection = true; module.Initialize(this.config); var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } // DiagnosticSource Response event is fired after SendAsync returns on netcoreapp1.* // let's wait until dependency is collected Assert.IsTrue(SpinWait.SpinUntil(() => this.sentTelemetry != null, TimeSpan.FromSeconds(1))); this.ValidateTelemetryForDiagnosticSource( this.sentTelemetry.Single(), url, request, true, "200", true, true, true); } } /// <summary> /// Tests that dependency is collected properly when there is no parent activity. /// </summary> [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionNoParentActivity() { using (var module = new DependencyTrackingTelemetryModule()) { module.Initialize(this.config); var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } // DiagnosticSource Response event is fired after SendAsync returns on netcoreapp1.* // let's wait until dependency is collected Assert.IsTrue(SpinWait.SpinUntil(() => this.sentTelemetry != null, TimeSpan.FromSeconds(1))); this.ValidateTelemetryForDiagnosticSource( this.sentTelemetry.Single(), url, request, true, "200", false, true, true); } } [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionBackOffsWhenTraceparentHeaderIsPresent() { Activity.DefaultIdFormat = ActivityIdFormat.Hierarchical; Activity.ForceDefaultIdFormat = true; using (var module = new DependencyTrackingTelemetryModule()) { module.Initialize(this.config); var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); request.Headers.Add("traceparent", "00-0123456789abcdef0123456789abcdef-0123456789abcdef-01"); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } // DiagnosticSource Response event is fired after SendAsync returns on netcoreapp1.* // let's wait until dependency is collected Assert.IsTrue(SpinWait.SpinUntil(() => this.sentTelemetry.Count > 0, TimeSpan.FromSeconds(1))); } } [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionWhenTraceparentHeaderIsPresentAndW3COff() { using (var module = new DependencyTrackingTelemetryModule()) { module.Initialize(this.config); var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); request.Headers.Add("traceparent", "00-0123456789abcdef0123456789abcdef-0123456789abcdef-01"); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } Assert.IsFalse(this.sentTelemetry.Any()); } } /// <summary> /// Tests that dependency is collected properly when there is parent activity. /// </summary> [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionWithParentActivity() { using (var module = new DependencyTrackingTelemetryModule()) { module.Initialize(this.config); var parent = new Activity("parent").AddBaggage("k", "v").SetParentId("|guid.").Start(); var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } // DiagnosticSource Response event is fired after SendAsync returns on netcoreapp1.* // let's wait until dependency is collected Assert.IsTrue(SpinWait.SpinUntil(() => this.sentTelemetry != null, TimeSpan.FromSeconds(1))); this.ValidateTelemetryForDiagnosticSource( this.sentTelemetry.Single(), url, request, true, "200", false, true, true, true, parent); parent.Stop(); } } /// <summary> /// Tests dependency collection when request procession causes exception (DNS issue). /// </summary> [TestMethod] public async Task TestDependencyCollectionDnsIssue() { using (var module = new DependencyTrackingTelemetryModule()) { module.Initialize(this.config); var url = $"http://{Guid.NewGuid()}:5050"; var request = new HttpRequestMessage(HttpMethod.Get, url); await new HttpClient().SendAsync(request).ContinueWith(t => { }); // As DNS Resolution itself failed, no response expected this.ValidateTelemetryForDiagnosticSource( this.sentTelemetry.Single(), new Uri(url), request, false, "Faulted", false, true, true, responseExpected: false); } } /// <summary> /// Tests that dependency is collected properly when there is parent activity. /// </summary> [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionW3COff() { Activity.DefaultIdFormat = ActivityIdFormat.Hierarchical; Activity.ForceDefaultIdFormat = true; using (var module = new DependencyTrackingTelemetryModule()) { module.Initialize(this.config); var parent = new Activity("parent") .AddBaggage("k", "v") .Start(); parent.TraceStateString = "state=some"; var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } // DiagnosticSource Response event is fired after SendAsync returns on netcoreapp1.* // let's wait until dependency is collected Assert.IsTrue(SpinWait.SpinUntil(() => this.sentTelemetry.Count > 0, TimeSpan.FromSeconds(1))); this.ValidateTelemetryForDiagnosticSource( this.sentTelemetry.Single(), url, request, true, "200", false, false, true, responseExpected: true, parent); parent.Stop(); } } /// <summary> /// Tests that dependency is collected properly when there is parent activity. /// </summary> [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionWithW3COnRequestIdOff() { using (var module = new DependencyTrackingTelemetryModule()) { module.EnableRequestIdHeaderInjectionInW3CMode = false; module.Initialize(this.config); var parent = new Activity("parent") .Start(); var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } // DiagnosticSource Response event is fired after SendAsync returns on netcoreapp1.* // let's wait until dependency is collected Assert.IsTrue(SpinWait.SpinUntil(() => this.sentTelemetry != null, TimeSpan.FromSeconds(1))); this.ValidateTelemetryForDiagnosticSource( item: this.sentTelemetry.Single(), url: url, request: request, success: true, resultCode: "200", expectLegacyHeaders: false, expectW3CHeaders: true, expectRequestId: false, responseExpected: true, parentActivity: parent); parent.Stop(); } } /// <summary> /// Tests that dependency is collected properly when there is parent activity. /// </summary> [TestMethod] [Timeout(5000)] public async Task TestDependencyCollectionWithW3CHeadersWithState() { using (var module = new DependencyTrackingTelemetryModule()) { module.Initialize(this.config); var parent = new Activity("parent") .Start(); parent.TraceStateString = "some=state"; var url = new Uri(localhostUrl); var request = new HttpRequestMessage(HttpMethod.Get, url); using (new LocalServer(localhostUrl)) { await new HttpClient().SendAsync(request); } // DiagnosticSource Response event is fired after SendAsync returns on netcoreapp1.* // let's wait until dependency is collected Assert.IsTrue(SpinWait.SpinUntil(() => this.sentTelemetry != null, TimeSpan.FromSeconds(1))); this.ValidateTelemetryForDiagnosticSource( this.sentTelemetry.Single(), url, request, true, "200", false, true, true, responseExpected: true, parent); parent.Stop(); } } private void ValidateTelemetryForDiagnosticSource( DependencyTelemetry item, Uri url, HttpRequestMessage request, bool success, string resultCode, bool expectLegacyHeaders, bool expectW3CHeaders, bool expectRequestId, bool responseExpected = true, Activity parentActivity = null) { Assert.AreEqual(url, item.Data); Assert.AreEqual($"{url.Host}:{url.Port}", item.Target); Assert.AreEqual("GET " + url.AbsolutePath, item.Name); Assert.IsTrue(item.Duration > TimeSpan.FromMilliseconds(0), "Duration has to be positive"); Assert.AreEqual(RemoteDependencyConstants.HTTP, item.Type, "HttpAny has to be dependency kind as it includes http and azure calls"); Assert.IsTrue( item.Timestamp.UtcDateTime < DateTime.UtcNow.AddMilliseconds(20), // DateTime.UtcNow precision is ~16ms "timestamp < now"); Assert.IsTrue( item.Timestamp.UtcDateTime > DateTime.UtcNow.AddSeconds(-5), "timestamp > now - 5 sec"); Assert.AreEqual(resultCode, item.ResultCode); Assert.AreEqual(success, item.Success); Assert.AreEqual( SdkVersionHelper.GetExpectedSdkVersion(typeof(DependencyTrackingTelemetryModule), "rdddsc:"), item.Context.GetInternalContext().SdkVersion); if (parentActivity != null) { if (parentActivity.IdFormat == ActivityIdFormat.W3C) { Assert.AreEqual(parentActivity.TraceId.ToHexString(), item.Context.Operation.Id); Assert.AreEqual(parentActivity.SpanId.ToHexString(), item.Context.Operation.ParentId); if (parentActivity.TraceStateString != null) { Assert.IsTrue(item.Properties.ContainsKey("tracestate")); Assert.AreEqual(parentActivity.TraceStateString, item.Properties["tracestate"]); } else { Assert.IsFalse(item.Properties.ContainsKey("tracestate")); } } else { Assert.AreEqual(parentActivity.RootId, item.Context.Operation.Id); Assert.AreEqual(parentActivity.Id, item.Context.Operation.ParentId); Assert.IsTrue(item.Id.StartsWith('|' + item.Context.Operation.Id + '.')); } } else { Assert.IsNotNull(item.Context.Operation.Id); Assert.IsNull(item.Context.Operation.ParentId); } if (request != null) { #if DEBUG var requestIdHeader = request.Headers.GetValues(RequestResponseHeaders.RequestIdHeader).Single(); #endif if (expectW3CHeaders) { var traceId = item.Context.Operation.Id; var spanId = item.Id; var expectedTraceParentHeader = $"00-{traceId}-{spanId}-00"; var expectedRequestId = $"|{traceId}.{spanId}."; Assert.AreEqual(expectedTraceParentHeader, request.Headers.GetValues(W3C.W3CConstants.TraceParentHeader).Single()); if (parentActivity?.TraceStateString != null) { Assert.AreEqual(parentActivity.TraceStateString, request.Headers.GetValues(W3C.W3CConstants.TraceStateHeader).Single()); } if (expectRequestId) { Assert.AreEqual(expectedRequestId, request.Headers.GetValues(RequestResponseHeaders.RequestIdHeader).Single()); } else { #if NETCOREAPP2_1 // even though we don't inject back-compatible request-id, .NET Core 2.0 will inject one that will look like traceparent Assert.AreEqual(expectedTraceParentHeader, request.Headers.GetValues(RequestResponseHeaders.RequestIdHeader).Single()); #elif NETCOREAPP3_1 // It appears that .NET CORE 3 does not inject a Request-Id header. Need to verify with Liudmila. #else #error This condition is unexpected #endif } } else { Assert.IsFalse(request.Headers.Contains(W3C.W3CConstants.TraceParentHeader)); Assert.IsFalse(request.Headers.Contains(W3C.W3CConstants.TraceStateHeader)); Assert.AreEqual(item.Id, request.Headers.GetValues(RequestResponseHeaders.RequestIdHeader).Single()); } if (expectLegacyHeaders) { Assert.AreEqual(item.Id, request.Headers.GetValues(RequestResponseHeaders.StandardParentIdHeader).Single()); Assert.AreEqual(item.Context.Operation.Id, request.Headers.GetValues(RequestResponseHeaders.StandardRootIdHeader).Single()); } else { Assert.IsFalse(request.Headers.Contains(RequestResponseHeaders.StandardParentIdHeader)); Assert.IsFalse(request.Headers.Contains(RequestResponseHeaders.StandardRootIdHeader)); } if (parentActivity != null && parentActivity.Baggage.Any()) { var correlationContextHeader = request.Headers.GetValues(RequestResponseHeaders.CorrelationContextHeader) .Single() .Split(',') .ToArray(); var baggage = Activity.Current.Baggage.Select(kvp => $"{kvp.Key}={kvp.Value}").ToArray(); Assert.AreEqual(baggage.Length, correlationContextHeader.Length); foreach (var baggageItem in baggage) { Assert.IsTrue(correlationContextHeader.Contains(baggageItem)); } } else { Assert.IsFalse(request.Headers.Contains(RequestResponseHeaders.CorrelationContextHeader)); } } // Validate the http request was captured this.operationDetailsInitializer.ValidateOperationDetailsCore(item, responseExpected); } private sealed class LocalServer : IDisposable { private readonly IWebHost host; private readonly CancellationTokenSource cts; public LocalServer(string url) { this.cts = new CancellationTokenSource(); this.host = new WebHostBuilder() .UseKestrel() .UseStartup<Startup>() .UseUrls(url) .Build(); Task.Run(() => this.host.Run(this.cts.Token)); } public void Dispose() { this.cts.Cancel(false); try { this.host.Dispose(); } catch (Exception) { // ignored, see https://github.com/aspnet/KestrelHttpServer/issues/1513 // Kestrel 2.0.0 should have fix it, but it does not seem important for our tests } } private class Startup { public void Configure(IApplicationBuilder app) { app.Run(async (context) => { await context.Response.WriteAsync("Hello World!"); }); } } } } #endif }
Posts It’s easy enough to understand the phrase “Pagan Pride Day” by just breaking it down into its elements. Pagan is the trickiest part to define. A religion can be considered “Pagan” if its roots predate Christianity, if it has an Earth focus, or if it entails the worship of many gods. Not everyone who follows a system like that uses the term “Pagan” (it’s polite to ask!) but we’re trying to cast a wide net and welcome people from many minority traditions. Pride is what we want Pagans — and those who hang around them — to be able to show. Most Pagan religions don’t involve proselytizing or witnessing, and many practitioners are solitary. Pride is about expressing that we are part of society, and it’s also about finding out which of your neighbors might also be Pagan. Day is the “when” part of this equation, as in when Pagans are being asked to publicly show their pride. This is about being in public, and exercising our First Amendment rights of assembly, speech, religion, and the press (because we will be inviting reporters from local newspapers and television stations to cover the event). There have been Pagan Pride days in the United States for decades, with rumors of Pagan Pride events as early as 1992. Many of them are organized under the auspices of Pagan Pride Project, which gives event planners an umbrella nonprofit to help get all the administrivia addressed. That’s why most of them around the United States are harvest-themed with a food drive. Public outreach is another important part of any Pagan Pride Day, particularly at a time when there is a high level of misunderstanding and suspicion regarding minority religious practices. We want non-Pagans to 1) recognize that Pagans are positive additions to the local faith community and 2) be able to get their questions answered, as a curious onlooker or as a potential seeker. The New Paltz Pagan Pride committee is thus far sponsored by the Church of the Eternal Circle, the members of which have provided meeting space, technical and financial support to the effort. Their assistance is appreciated. Organizers of the New Paltz Pagan Pride Day want to know: are there authors, local to the Mid-Hudson Valley, who have written books of interest to the Pagan community? It is sometimes said that it is wiser never to ask a question to which one does not have an answer. The answer to the above question is, “Yes.” The next question — for which the NPPPD organizers do not yet have an answer — is who among them would like to meet potential readers and fans in New Paltz? A local Pagan Pride Day provides an opportunity to get in front of Pagans without spending a night away from home. This could take the form of a book signing, answering questions before an audience, or leading a related ritual or workshop. If you are such an author, or you are the fan of one, fill in the form below. There are Pagans in the Mid-Hudson Valley. There are Pagans in New Paltz. Not all of us are private about our religion, but one thing that might be a common thread among the many Pagan paths is that there’s no particular recruitment requirement. Without that, it’s easy to slip into the shadows, unnoticed. Being able to talk with other members of minority faiths is generally a good thing, even if one doesn’t choose to worship alongside of them. One of the benefits of a New Paltz Pagan Pride Day will be to get local Pagans to recognize each other, and possibly build relationships. However, there’s no need to wait for that. There are various groups on meetup.com that arrange social events in the region, and there’s also the Facebook group Mid-Hudson Pagans. (If you wish to join, expect to be challenged if there’s nothing blatantly Pagan displayed in your profile and you have no friends presently in the group. It’s just a precaution.) Reach out to find local Pagans. Connect. Conspire. This is your moment. Work has started on putting together the first-ever New Paltz Pagan Pride Day! A lot of information is still tentative, but there’s an answers page which will be updated as often as necessary. If you don’t see a question that you believe needs answering, go ahead and ask away! This event will serve the Pagan community throughout the Mid-Hudson Valley if all goes well.
Minggu, 06 September 2015 Rayman 2 is a great platforming game with some of the best graphics the PS1 has to offer. Rayman 2 is a 3d platformer, and a good one. The visuals are cool, the music is great, and the platforming is as good as it gets Download Rayman 2 - The Great Escape [U] [SLUS-01235] ROM / ISO for PlayStation (PSX) from Rom Hustler. 100% Fast Download.
To the Editor: Using President Obama’s own words, “Elections Have Consequences”, the consequences of a radical liberal agenda are that Americans have had enough. We are tired of divisive political rhetoric that cause hate and anger. We are tired of failed economic policies. We have witnessed controversial and unconstitutional laws, executive orders and overreach of federal regulations which erode our freedom. We have witnessed pay to play corruption to pass regulations based on what is good for special interests, rather than what’s good for America. We have seen racial and social unrest used by political operatives as a tool to advance a radical agenda. We are tired of seeing cities burned to the ground in the name of progressiveness. We are tired of tax dollars going to fund Planned Parenthood’s legalized murder and selling of body parts. Our military is weaker. Our capability to sustain major wars is questionable. Our adversaries are rapidly expanding their forces and taunting our planes and ships knowing that we have a weak leader. Our position as the world’s foremost technological and industrial leader has been weakened by trade deals. Our national debt is a major threat to our security and the solvency of Social Security, Medicaid and other social nets. With continued revelations of unethical, evil and even criminal activities of Hillary Clinton, the Clinton Global Initiative and the Clinton Foundation, we question her suitability as Commander in Chief. We remember her past, her weakness as a leader, and her promises of more of the same. And we will never forget Benghazi and the Americans who died there because no one in the Obama Administration, including Hillary Clinton herself, had the backbone to defend them. Admittedly some polls may have favored Mrs. Clinton. However, the recent Brexit vote in England proved that when people realize that their country is being fundamentally changed to suit a corrupt political agenda, the overwhelming desire to defend one’s nation from control by evil tyrants will prevail. We will never elect a candidate who promises more of the same failed policies and an even larger tax bite. With the revelation that the FBI is reopening its investigation into her email scandal, voters should look beyond partisan rancor and elect the candidate who has a proven track record of success. America is going to elect a president who will respect the inherent rights that we are guaranteed by the blood of many Americans who fought so that this nation would never become a third world nation. Since elections do indeed have consequences, we are going to elect a president who will help turn America away from the social and moral rot that is now infecting her. We are going to elect a president who will appoint Supreme Court Justices that respect the sanctity of life, respect the Constitution and value our nation’s heritage. We are going to elect a president who will unite us, grow our economy and provide opportunity for everyone. And we will elect Donald Trump. Garry Terry Ahoskie
Description Certain things remind you of a tranquil haven away from all the chaotic rush of the world: the secluded beach where you spent your first vacation together or the morning canoe excursion on a crisp mountain lake soaking in the natural surroundings. But the most treasured place to rest and feel loved is in the arms of your special someone. There is no substitute for the calm and acceptance that you experience when in her embrace. Much like this extraordinary 4.78 carat natural untreated oval greenish blue sapphire, peacock blue sapphire from Ceylon. Its remarkable hue, tone, and strong saturation combine with its considerable weight to make it your personal place of serenity. At the Natural Sapphire Company we specialize in providing our customers with the finest quality natural sapphires. Our sapphires are not synthetic, heated to extreme temperatures, diffused, irradiated, glass filled or oiled. Our natural untreated sapphires offer true beauty, rarity and superior value compared to treated sapphires. We offer a vast selection of blue sapphires, pink sapphires, yellow sapphires, white sapphires and other unique natural sapphires. All of our sapphires are cut on our premises and are available loose or mounted in a custom setting. Our jewelry and gemological specialists will work with you from start to finish to create your custom sapphire jewelry. We invite you to view our full selection of sapphires, blue sapphire rings and custom sapphire jewelry and discover what makes the Natural Sapphire Company the world's greatest collection of natural sapphires. Good Reading: Why Natural Sapphires?
/* * Copyright © 2014 Intel Corporation * * Permission is hereby granted, free of charge, to any person obtaining a * copy of this software and associated documentation files (the "Software"), * to deal in the Software without restriction, including without limitation * the rights to use, copy, modify, merge, publish, distribute, sublicense, * and/or sell copies of the Software, and to permit persons to whom the * Software is furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice (including the next * paragraph) shall be included in all copies or substantial portions of the * Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS * IN THE SOFTWARE. */ #ifndef DISK_CACHE_H #define DISK_CACHE_H #ifdef HAVE_DLFCN_H #include <dlfcn.h> #include <stdio.h> #include "util/build_id.h" #endif #include <assert.h> #include <stdint.h> #include <stdbool.h> #include <sys/stat.h> #include "util/mesa-sha1.h" #ifdef __cplusplus extern "C" { #endif /* Size of cache keys in bytes. */ #define CACHE_KEY_SIZE 20 #define CACHE_DIR_NAME "mesa_shader_cache" typedef uint8_t cache_key[CACHE_KEY_SIZE]; /* WARNING: 3rd party applications might be reading the cache item metadata. * Do not change these values without making the change widely known. * Please contact Valve developers and make them aware of this change. */ #define CACHE_ITEM_TYPE_UNKNOWN 0x0 #define CACHE_ITEM_TYPE_GLSL 0x1 typedef void (*disk_cache_put_cb) (const void *key, signed long keySize, const void *value, signed long valueSize); typedef signed long (*disk_cache_get_cb) (const void *key, signed long keySize, void *value, signed long valueSize); struct cache_item_metadata { /** * The cache item type. This could be used to identify a GLSL cache item, * a certain type of IR (tgsi, nir, etc), or signal that it is the final * binary form of the shader. */ uint32_t type; /** GLSL cache item metadata */ cache_key *keys; /* sha1 list of shaders that make up the cache item */ uint32_t num_keys; }; struct disk_cache; static inline char * disk_cache_format_hex_id(char *buf, const uint8_t *hex_id, unsigned size) { static const char hex_digits[] = "0123456789abcdef"; unsigned i; for (i = 0; i < size; i += 2) { buf[i] = hex_digits[hex_id[i >> 1] >> 4]; buf[i + 1] = hex_digits[hex_id[i >> 1] & 0x0f]; } buf[i] = '\0'; return buf; } #ifdef HAVE_DLADDR static inline bool disk_cache_get_function_timestamp(void *ptr, uint32_t* timestamp) { Dl_info info; struct stat st; if (!dladdr(ptr, &info) || !info.dli_fname) { return false; } if (stat(info.dli_fname, &st)) { return false; } if (!st.st_mtime) { fprintf(stderr, "Mesa: The provided filesystem timestamp for the cache " "is bogus! Disabling On-disk cache.\n"); return false; } *timestamp = st.st_mtime; return true; } static inline bool disk_cache_get_function_identifier(void *ptr, struct mesa_sha1 *ctx) { uint32_t timestamp; #if defined(HAVE_DL_ITERATE_PHDR) && defined(HAVE_LD_BUILD_ID) const struct build_id_note *note = NULL; if ((note = build_id_find_nhdr_for_addr(ptr))) { _mesa_sha1_update(ctx, build_id_data(note), build_id_length(note)); } else #endif if (disk_cache_get_function_timestamp(ptr, &timestamp)) { _mesa_sha1_update(ctx, &timestamp, sizeof(timestamp)); } else return false; return true; } #endif /* Provide inlined stub functions if the shader cache is disabled. */ #ifdef ENABLE_SHADER_CACHE /** * Create a new cache object. * * This function creates the handle necessary for all subsequent cache_* * functions. * * This cache provides two distinct operations: * * o Storage and retrieval of arbitrary objects by cryptographic * name (or "key"). This is provided via disk_cache_put() and * disk_cache_get(). * * o The ability to store a key alone and check later whether the * key was previously stored. This is provided via disk_cache_put_key() * and disk_cache_has_key(). * * The put_key()/has_key() operations are conceptually identical to * put()/get() with no data, but are provided separately to allow for * a more efficient implementation. * * In all cases, the keys are sequences of 20 bytes. It is anticipated * that callers will compute appropriate SHA-1 signatures for keys, * (though nothing in this implementation directly relies on how the * names are computed). See mesa-sha1.h and _mesa_sha1_compute for * assistance in computing SHA-1 signatures. */ struct disk_cache * disk_cache_create(const char *gpu_name, const char *timestamp, uint64_t driver_flags); /** * Destroy a cache object, (freeing all associated resources). */ void disk_cache_destroy(struct disk_cache *cache); /* Wait for all previous disk_cache_put() calls to be processed (used for unit * testing). */ void disk_cache_wait_for_idle(struct disk_cache *cache); /** * Remove the item in the cache under the name \key. */ void disk_cache_remove(struct disk_cache *cache, const cache_key key); /** * Store an item in the cache under the name \key. * * The item can be retrieved later with disk_cache_get(), (unless the item has * been evicted in the interim). * * Any call to disk_cache_put() may cause an existing, random item to be * evicted from the cache. */ void disk_cache_put(struct disk_cache *cache, const cache_key key, const void *data, size_t size, struct cache_item_metadata *cache_item_metadata); /** * Retrieve an item previously stored in the cache with the name <key>. * * The item must have been previously stored with a call to disk_cache_put(). * * If \size is non-NULL, then, on successful return, it will be set to the * size of the object. * * \return A pointer to the stored object if found. NULL if the object * is not found, or if any error occurs, (memory allocation failure, * filesystem error, etc.). The returned data is malloc'ed so the * caller should call free() it when finished. */ void * disk_cache_get(struct disk_cache *cache, const cache_key key, size_t *size); /** * Store the name \key within the cache, (without any associated data). * * Later this key can be checked with disk_cache_has_key(), (unless the key * has been evicted in the interim). * * Any call to disk_cache_put_key() may cause an existing, random key to be * evicted from the cache. */ void disk_cache_put_key(struct disk_cache *cache, const cache_key key); /** * Test whether the name \key was previously recorded in the cache. * * Return value: True if disk_cache_put_key() was previously called with * \key, (and the key was not evicted in the interim). * * Note: disk_cache_has_key() will only return true for keys passed to * disk_cache_put_key(). Specifically, a call to disk_cache_put() will not cause * disk_cache_has_key() to return true for the same key. */ bool disk_cache_has_key(struct disk_cache *cache, const cache_key key); /** * Compute the name \key from \data of given \size. */ void disk_cache_compute_key(struct disk_cache *cache, const void *data, size_t size, cache_key key); void disk_cache_set_callbacks(struct disk_cache *cache, disk_cache_put_cb put, disk_cache_get_cb get); #else static inline struct disk_cache * disk_cache_create(const char *gpu_name, const char *timestamp, uint64_t driver_flags) { return NULL; } static inline void disk_cache_destroy(struct disk_cache *cache) { return; } static inline void disk_cache_put(struct disk_cache *cache, const cache_key key, const void *data, size_t size, struct cache_item_metadata *cache_item_metadata) { return; } static inline void disk_cache_remove(struct disk_cache *cache, const cache_key key) { return; } static inline uint8_t * disk_cache_get(struct disk_cache *cache, const cache_key key, size_t *size) { return NULL; } static inline void disk_cache_put_key(struct disk_cache *cache, const cache_key key) { return; } static inline bool disk_cache_has_key(struct disk_cache *cache, const cache_key key) { return false; } static inline void disk_cache_compute_key(struct disk_cache *cache, const void *data, size_t size, const cache_key key) { return; } static inline void disk_cache_set_callbacks(struct disk_cache *cache, disk_cache_put_cb put, disk_cache_get_cb get) { return; } #endif /* ENABLE_SHADER_CACHE */ #ifdef __cplusplus } #endif #endif /* CACHE_H */
var callbacks = ['done', 'cb', 'callback', 'next'] module.exports = function isNamedCallback (potentialCallbackName, exceptions) { for (var i = 0; i < exceptions.length; i++) { callbacks = callbacks.filter(function (item) { return item !== exceptions[i] }) } return callbacks.some(function (trueCallbackName) { return potentialCallbackName === trueCallbackName }) }
BEIJING – The Chinese capital plans to build 1,000 new minimarkets and convenience stores before it hosts the 2008 Summer Olympics, the Beijing Economic Daily said on Sunday. The news follows last week&#039s announcement that the city is to launch “the largest toilet revolution in its history” to make life better for its 15 million residents and the expected hordes of Olympic tourists. In addition to the new stores, Beijing intends to renovate 55 shopping centres, supermarkets and small shops to ensure access for the disabled, the newspaper said. Also on the cards is creation of 500 franchised laundry and pressing shops, it added. On Thursday, the city unveiled plans to upgrade 1,263 public lavatories in central districts before the end of this year. Xinhua news agency said the massive program would see the replacement of Beijing&#039s “notoriously fetid back-street latrines with clean, well-maintained flush ones”.
When is it religious discrimination? I am a truck driver and have been on “light duty” for the past several weeks. Last week my supervisor told me to take one of the office girls to the bank to make a company deposit. The other employees made crude remarks about her and me. I then refused to take her. I explained to my supervisor that I felt it would be inappropriate for me (being married) to take her because of my religious beliefs. After yelling and swearing at me in front of the other employees he told me to go home without the overtime pay. Then he told another employee (with less seniority) to take her, which he did. Was I wrong to say no? Was he wrong to send me home? Ann Kiernan replies: If your religious beliefs forbid you to be in a car with a woman you are not married to, then from a religious standpoint you were correct. But you were also insubordinate in refusing a legitimate direction from your boss. Just because your motives were religious doesn’t automatically excuse you from discipline, since an employer has only a minimal obligation to accommodate religious beliefs. A case similar to yours was decided on appeal in January, 2000. There, a male truck driver who was a devout Jehovah’s Witness refused to work overnight runs with female drivers, giving his religious beliefs as his reason. His termination was upheld by the courts, since his refusal to work with women disrupted the other drivers’ schedules. However, you do not have to put up with crude remarks from your co-workers. You have a right to work in a respectful, harassment-free environment. You can let your coworkers and your boss know that you are offended by their remarks, make a complaint through your company’s procedures, file a grievance if you belong to a union, or file a claim with the Equal Employment Opportunity Commission. Good luck. Employer not required to accommodate religious pilgrimage Mary Tiano sued her employer Dillard Department Stores for failure to make reasonable accommodation of her religious beliefs. Tiano was a top sales person for many years and a devout Roman Catholic. In late August of 1988, she learned of a pilgrimage to Medjugorje, Yugoslavia taking place between October 17 and October 26. Several people have claimed that visions of the Virgin Mary appeared to them in Medjugorje, although the Catholic Church has not designated Medjugorje an official pilgrimage site of the Church. Tiano testified that on August 22, 1988, she had a “calling from God” to attend this pilgrimage. Tiano requested an unpaid leave of absence to attend. Dillard’s vacation policy prohibited employees from taking leave between October and December, the store’ s busy holiday season. As a result, Tiano’s request was denied. She went anyway, and when she returned to work she was informed that she had voluntarily resigned and would not be offered reemployment. The Court of Appeals held that the employee must establish a prima facie case by proving that she had a bona fide religious belief, the practice of which conflicted with an employment duty. The court said that the evidence showed only a bona fide religious belief that she needed to go to Medjugorje at some time; she failed to prove she was required by her religion to go on the specific dates she requested in October. The Court said in this case, she was asking her employer to accommodate her personal preferences about the timing of the trip, which is not protected by law. Employee takes religious freedom too far A supervisor who was an evangelical Christian sent letters to her manager and one of her subordinates in which she told them they were not pleasing God and that they should stop sinning before it is too late. After investigating, the employer terminated the supervisor’s employment because the letters deeply offended the people who received them, disrupted the workplace and invaded their privacy. The supervisor sued for failure to reasonably accommodate her religion. The Court of Appeals held that this was not the type of behavior an employer was required to accommodate, and upheld the termination. The court relied heavily on the fact that this person was a supervisor, with additional responsibilities as a result. Chalmers v. Tulon Corp., 72 FEP Cases 747 (4th Cir, 1996) Don’t force workers to celebrate birthdays The EEOC has sued Chi Chi’s Mexican Restaurant in Baltimore for firing a waitress who was fired allegedly for refusing to sing “Happy Birthday” to customers. The waitress is a Jehovah’s Witness and the religion forbids celebrating birthdays. The case will go to trial later this year. This is a good reminded to managers everywhere that not all cultures and religions celebrate birthdays. When managing in a multi-cultural context, do not assume that all employees want to participate in birthday parties. If your group likes to have birthday parties, when a new employee joins, you can say, “Our group likes to celebrate birthdays. If you would like to participate, let me know.” That leaves it open for the employee to decline. First Amendment overrides religious harassment policy What should an employer do about proselytizing by religious employees? In this case, the employer prohibited employees from discussing religion while on the premises. The employer also prohibited religious displays in employee offices and cubes. In this case, the employer was the State of California, which like all government employers is subject to the First Amendment. The Ninth Circuit Court of Appeals held that the right to freedom of speech overrode the employer’s rules. Employees could not be prohibited from discussing religion (although reasonable time, place and manner restrictions could be allowed). Private employers take note: although you are not subject to the First Amendment, you are liable to a successful First Amendment claim. If you say you are prohibiting religious speech in order to follow the law to provide a harassment-free environment, the accused harasser may be able to argue successfully that the law violates his or her right to free speech. If, on the other hand, you say you are enforcing your policy, independent of any law, then the First Amendment is not implicated. For case excerpts: Monte Tucker, the plaintiff-appellant, is a deeply religious man who works as a computer analyst in the California State Department of Education. He contends that orders promulgated by his supervisors that forbid employees in his division from engaging in any oral or written religious advocacy in the workplace and displaying any religious artifacts, tracts or materials outside their offices or cubicles violate his rights to freedom of speech guaranteed by the First Amendment. Although the government may have legitimate interests in preventing a number of the activities in which Tucker has engaged or wants to continue to engage, the challenged orders are overbroad and impermissibly infringe on First Amendment rights. Accordingly we reverse the district court order granting summary judgment for the government and direct that summary judgment be issued in favor of Tucker. Facts and Procedural History Tucker has worked as a computer analyst for the State Department of Education since 1977. He is currently employed in the Child Nutrition and Food Distribution Division. His religious beliefs command him to give credit to God for the work he performs. In 1988, he decided to comply with this command by placing the phrase “Servant of the Lord Jesus Christ” and the acronym “SOTLJC” after his name on the label of a software program he was working on. The program, with the acronym, was distributed within the department. Tucker began placing the acronym on other material he was working on. Shortly thereafter, his supervisor, James Phillips, instructed him not to use the acronym. After a series of orders and warnings, Tucker was suspended for five days in May 1988. On February 7, 1989 Balakshin issued the following orders to all employees of the Child Nutrition and Food Distribution Division, including Tucker, which provide that they may not: Store or display any religious artifacts, tracts, information or other materials in any part of the workplace other than in their own closed offices or defined cubicles; Engage in any religious advocacy, either written or oral, during the work hours or in the workplace. Place any personal acronym, title, symbol, logo, or declaration unrelated to the business of the Department on any official communication or work product. Conclusion Because the state’s justifications for the ban [on religious advocacy] are meritless, we hold that its asserted interests do not outweigh “the interests of both potential audiences and a vast group of present and future employees in a broad range of present and future expression”. Treasury Employees, 115 S.Ct. at 1014). Nor does the banned expression have a ” ‘necessary [adverse] impact on the actual operation of the Government.’ ” Id. (quoting Pickering, 391 U.S. at 571). Accordingly, we hold that the order violates the free speech clause of the Constitution. Our analysis of the second challenged order, which prevents the display of religious materials outside employees’ cubicles or offices, is similar to our analysis of the restrictions on religious advocacy. There are, however, important distinctions between restricting employees’ speech at the workplace and prohibiting employees from using the state’s walls, tables or other space to post messages or place materials. The government has a greater interest in controlling what materials are posted on its property than it does in controlling the speech of the people who work for it, especially when its employees are engaged in private conversation among themselves. There is a greater likelihood that materials posted on the walls of the corridors of government offices would be interpreted as representing the views of the state than would private speech by individual employees walking down those same corridors. We conclude that it is not reasonable to allow employees to post materials around the office on all sorts of subjects, and forbid only the posting of religious information and materials. The challenged ban not only prevents employees from posting non-controversial information that might interest some or all employees — such as bulletins announcing the time and location of church services, invitations to children of employees to join a church youth group, and newspaper clippings praising Billy Graham, Mother Theresa or Cardinal Bernardin — it would also ban religious messages on controversial subjects such as abortion, abstinence of various types, family values, and the v-chip. Material that addresses controversial topics from a non-religious viewpoint would, however, be permissible, as would signs inviting employees to motorcycle rallies, swap meets, x-rated movies, beer busts, burlesque shows, massage parlors or meetings of the local militia. The prohibition is unreasonable not only because it bans a vast amount of material without legitimate justification but also because its sole target is religious speech. The state has simpler and far less restrictive alternatives available to it, such as setting up employee bulletin boards and limiting all employee postings to those sites, or permitting postings generally in the parts of the building not ordinarily visited by the public. Reasonable content-neutral restrictions on the space to be used and the duration of the posting would not be inconsistent with the first amendment. Any regulations would of course be subject to the principles governing content and viewpoint discrimination. The state might also, in a properly drawn order, ban the exhibition of religious symbols, artifacts or other similar items, which might reasonably convey an impression of state endorsement — or at least it might do so in areas outside of the employees’ private office space. The constitutionality of any such order would depend of course on all of the circumstances involved in the particular case. Small facility ordered to accommodate Sabbath Employers are required to allow employees days off for religious observances, unless it would create an undue hardship. In this case, the employer was an agricultural inspection station at the border in Yerma, California. There were 15 agents who worked around the clock, 365 days a year. By law, their schedules were randomly assigned so that truckers wouldn’t know who was scheduled to work to decrease the probability of bribery. The job posting said employees must work nights, holidays and Sundays. An employee who was a Seventh Day Adventist was hired. He asked for sundown Friday through sundown Saturday off each week. The employer took an “informal poll” (undocumented) in which employees reportedly said they might consider occasionally switching schedules with the new employee. The employer thought it over and decided reasonable accommodation was impossible. As you can imagine, the Ninth Circuit had a field day with this one. See case excerpts for what the court said the employer should have done. Small Facility Ordered to Accommodate Sabbath, case excerpts. Although the State negotiated in good faith, there is no evidence that it ever made any proposal to [the employee] Opuku-Boateng. Therefore, the next issue is whether Opuku-Boateng’s proposed accommodations would have resulted in undue hardship to the State or his co-workers. As we have noted, the proposed accommodations included excusing him from Sabbath work and scheduling him instead for other equally undesirable shifts, adopting a system of voluntary or mandatory shift trades, employing a combination of the above procedures, arranging a transfer to another department, and making a temporary accommodation, which would have allowed the State to experiment with the various proposals while permitting both it and Opuku-Boateng to make efforts to find him other employment with the Department or another State agency. Second, the evidence introduced by the State as to its ability (or lack thereof) to accommodate other employees’ scheduling desires was wholly inadequate. Third, hypothetical morale problems are clearly insufficient to establish undue hardship. “Even proof that employees would grumble about a particular accommodation is not enough to establish undue hardship.” Anderson v. General Dynamics Convair Aerospace Div., 589 F.2d 397, 402 (1978), cert. denied in International Ass’n of Machinists and Aerospace Workers AFL-CIO, 442 U.S. 921 (1979); Burns v. Southern Pac. Transp. Co., 589 F.2d 403, 407 (9th Cir. 1978), cert. denied, 439 U.S. 1072 (1979).[FOOTNOTE 24] Likewise, the mere possibility that there would be an unfulfillable number of additional requests for similar accommodations by others cannot constitute undue hardship. See Burns, 589 F.2d at 407 (rejecting contention that “accommodating [the plaintiff] would open the gate to excusing vast numbers of persons who claimed to share [the plaintiff’s] beliefs,” where the record established that only three of the union’s members were Seventh Day Adventists). Can we require 24-hour availability? Have you heard about a court case (possibly in 1996) in which someone filed a discrimination claim and won because the potential employer had a statement on the job application that said something like: “You must be available for any 24-hour shift any day of the week.” We are trying to determine if it is discriminatory to have such a statement on the application form or if it’s legal as long as there is a genuine business reason and it is a BFOQ. Rita Risser’s Response: Good memory! The case is OPUKU-BOATENG v. STATE OF CALIFORNIA, ___ F.4th ____, 96 C.D.O.S. 7003 (9th Cir.,1996). The case did not hold that such language was illegal, but it did limit how you could use that restriction in practice. The case involved a member of the Seventh Day Adventist faith who applied for a position where 24-hour availability was required by federal law. After he was hired, he told the employer he could not work from sundown Friday through sundown Saturday each week. The employer took an “informal poll” (undocumented) in which employees reportedly said they might consider occasionally switching schedules with the new employee. The employer thought it over and decided reasonable accommodation was impossible. As you can imagine, the Ninth Circuit had a field day with this one. Employers are required to allow employees days off for religious observances, unless it would create an undue hardship. The Court said there were many accommodations that could have been made, including excusing him from Sabbath work and scheduling him instead for other equally undesirable shifts, adopting a system of voluntary or mandatory shift trades, employing a combination of the above procedures, or arranging a transfer to another department (this for a new employee!) The Court also said, “Hypothetical morale problems are clearly insufficient to establish undue hardship. Even proof that employees would grumble about a particular accommodation is not enough to establish undue hardship. . . . Likewise, the mere possibility that there would be an unfulfillable number of additional requests for similar accommodations by others cannot constitute undue hardship.” So, you can have the statement you propose on your application, and legitimately reject any applicant who can’t meet that requirement, unless the applicant has a religious reason for not working certain hours. You also may be required to accommodate someone with a disability who can’t work all hours. As a precaution, I suggest you include a statement on your application that “If you have a religious or medical reason you cannot meet this requirement, reasonable accommodation will be made as required by law.” If you are faced with a request for accommodation, do contact an employment lawyer. Good luck! What is the legal relationship between my work and my religious beliefs ? I work at a major retail store in Indiana. I like my job, but alcoholic beverages are sold at the store. Because of my spiritual beliefs; I don’t want to handle the alcoholic beverages. I feel this could be a source of conflict between my employer and me. Do I have any recourse in regards to this issue? Rita Risser’s Response: The U.S. Supreme Court ruled in Ansonia Board of Education v. Philbrook, 479 U.S. 60, that employers are required to reasonably accommodate employee’s religious beliefs if to do so would not create an undue hardship on the employer. The employer is not required to give the employee the accommodation he wants; any accommodation will do. In another case like yours, some postal workers had religious objections to registering young men for the draft. For a while, the post office allowed these clerks to refer a draft registrant to the next available clerk. But then the postal service said do it or we will give you another assignment (no loss in pay, but it was in the back room). The clerks sued and lost. APWU v. Postmaster General, 781 F.2d 772 (9th Cir. 1986). In your case, it depends upon how many other positions are available for you. They do not have to create a new position, or throw the whole place into chaos. But neither can they dismiss you out of hand. They must give your request serious consideration. I have a question, though. Why work in a place that sells liquor? Wouldn’t you feel better in a more wholesome environment? Information here is correct at the time it is posted. Case decisions cited here may be reversed. Please do not rely on this information without consulting an attorney first. JobinHouston.Net Houston is the most populous city in Texas and the fourth most populous city in the United States, located in Southeast Texas near the Gulf of Mexico. Find best job or candidate for your company in Houston. Start your perfect career with JobinHouston.Net job site.
1. Field of the Invention The present invention relates to a drive control circuit for a motor. More specifically, the present invention pertains to a drive control circuit that protects contacts of switches for controlling rotational directions of the motor. 2. Description of the Related Art A conventional direct current motor of this type is employed for driving wipers mounted on a vehicle. As shown in FIG. 9, the conventional direct current motor 51 for driving wipers is electronically connected between a power supply 57 and a ground 58. The motor 51 has two connection terminals, a first terminal and a second terminal. The first terminal is connected with a first relay Ry52, and the second terminal with a second relay Ry53, respectively. A contact 55 of the first relay Ry52 is connected with the power supply 57, and a contact 56 thereof is connected with the ground 58. A movable contact 54 of the first relay Ry52 is selectively connected with either one of the contacts 55 or 56, by means of a switching control circuit (not shown). A contact 60 of the second relay Ry53 is connected with the power supply 57, and a contact 61 thereof is connected with the ground 58. A movable contact 59 of the second relay Ry53 is selectively connected with either one of the contacts 60 or 61, by means of the switching control circuit (not shown). Therefore, when the movable contact 54 of the first relay Ry52 is connected with the contact 55, and the movable contact 59 of the second relay Ry53 is connected with the contact 61, by means of the switching control circuit, the motor 51 rotates in the forward direction in response to current I10 flowing from the power supply 57 to the motor 51. On the contrary, when the movable contact 54 of the first relay Ry52 is connected with the contact 56, and the movable contact 59 of the second relay Ry53 is connected with the contact 60, by means of the switching control circuit, the motor 51 rotates in the reverse direction, in response to current I11 flowing from the supply 57 to the motor 51. On the other hand, in order to cause the motor 51 to be stopped, the movable contacts 54 and 59 of the first and second relays Ry52 and Ry53 are respectively connected with the contacts 56 and 61, and each first and second connection terminals of the motor 51 is connected with the ground 58. Consequently, a closed loop including the motor 51 is formed. A current flow is generated in the motor in the opposing direction to the direction of the current flow during the motor 51 is regularly rotated. The current flow is caused by electromotive force generated by means of the force of inertia of the motor 51. Therefore, the motor 51 is immediately stopped. However, when the movable contact 54 of the relay Ry52 is disconnected from the contact 55, and then connected with the contact 56, in order to stop the motor 51, electric discharge may occurs between the movable contact 54 and the contact 55, because of the potential difference between the contacts 55 and 56, which may cause the contacts 55 and 56 to electrically connect each other. In such a case, short-circuit current I12 flows to a motor drive circuit, from the power supply 57 via the contacts 55 and 56, a problem arises in that each of the contacts 55 and 56 is melted down and the first relay is damaged.
Spurs Beat Heat 104-87 in Game 5 to Win NBA Title SAN ANTONIO (AP) - The San Antonio Spurs won their fifth NBA championship, beating the Miami Heat 104-87 on Sunday night to win the series in five games. Kawhi Leonard had 22 points and 10 rebounds for the Spurs, who added this title to the ones they won in 1999, 2003, '05 and '07. They nearly had another last year, but couldn't hold off the Heat and lost in seven games. The rematch was no match at all. San Antonio rebounded from an early 16-point deficit by outscoring the Heat 37-13 from the start of the second quarter to midway in the third. LeBron James had 31 points and 10 rebounds as Miami's two-year title reign ended. Copyright 2015 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. Online Public Information File Viewers with disabilities can get assistance accessing this station's FCC Public Inspection File by contacting the station with the information listed below. Questions or concerns relating to the accessibility of the FCC's online public file system should be directed to the FCC at 888-225-5322, 888-835-5322 (TTY), or fccinfo@fcc.gov.
This PDF file contains the front matter associated with SPIE Proceedings Volume 9703, including the Title Page, Copyright information, Table of Contents, Introduction, and the Conference Committee listing. We are establishing a new paradigm in mid-infrared molecular sensing, mapping and imaging to open up the midinfrared spectral region for in vivo (i.e. in person) medical diagnostics and surgery. Thus, we are working towards the mid-infrared optical biopsy (‘opsy’ look at, bio the biology) in situ in the body for real-time diagnosis. This new paradigm will be enabled through focused development of devices and systems which are robust, functionally designed, safe, compact and cost effective and are based on active and passive mid-infrared optical fibers. In particular, this will enable early diagnosis of external cancers, mid-infrared detection of cancer-margins during external surgery for precise removal of diseased tissue, in one go during the surgery, and mid-infrared endoscopy for early diagnosis of internal cancers and their precision removal. The mid-infrared spectral region has previously lacked portable, bright sources. We set a record in demonstrating extreme broad-band supercontinuum generated light 1.4 to 13.3 microns in a specially engineered, high numerical aperture mid-infrared optical fiber. The active mid-infrared fiber broadband supercontinuum for the first time offers the possibility of a bright mid-infrared wideband source in a portable package as a first step for medical fiber-based systems operating in the mid-infrared. Moreover, mid-infrared molecular mapping and imaging is potentially a disruptive technology to give improved monitoring of the environment, energy efficiency, security, agriculture and in manufacturing and chemical processing. This work is in part supported by the European Commission: Framework Seven (FP7) Large-Scale Integrated Project MINERVA: MId-to-NEaR- infrared spectroscopy for improVed medical diAgnostics (317803; www.minerva-project.eu). Pathologists find it notoriously difficult to provide both inter- and intra-observer agreement on a diagnosis of early gastrointestinal cancers. Vibrational spectroscopic approaches have shown their value in providing molecular compositional data from tissue samples and therefore enabling the identification of disease specific changes, when combined with multivariate techniques. Mid-infrared microscopic imaging is undergoing rapid developments in sources, detectors and spectrometers. Here we explore the use of high magnification FTIR for GI cancers and consider how the MINERVA (MId- to NEaR infrared spectroscopy for improVed medical diAgnostics) project, which is developing discrete frequency IR imaging tools will enable histopathologists to obtain rapid molecular images form unstained tissue sections. The extension of supercontinuum (SC) sources into the mid-infrared, via the use of uoride and chalcogenide optical fibers, potentially offers the high radiance of a laser combined with spectral coverage far exceeding that of typical tunable lasers and comparable to traditional black-body emitters. Together with advances in mid-IR imaging detectors and novel tunable filter designs, such supercontinua hold considerable potential as sources of illumination for spectrally-resolved microscopy targeting applications such as rapid histological screening. The ability to rapidly and arbitrarily select particular wavelengths of interest from a broad emission spectrum, covering a wide range of biologically relevant targets, lends itself to image acquisition only at key relevant wavelengths leading to more manageable datasets. However, in addition to offering new imaging modalities, SC sources also present a range of challenges to successful integration with typical spectral microscopy instrumentation, including appropriate utilisation of their high spatial coherence. In this paper the application of SC sources to spectrally-resolved microscopy in the mid-IR is discussed and systems-integration considerations specific to these sources highlighted. Preliminary results in the 3-5μm region, obtained within the European FP7 project MINERVA, are also presented here. FTIR spectroscopy is an emerging technology with high potential for cancer diagnosis but with particular physical phenomena that require special processing. Little work has been done in the field with the aim of registering hyperspectral Fourier-Transform Infrared (FTIR) spectroscopic images and Hematoxilin and Eosin (HE) stained histological images of contiguous slices of tissue. This registration is necessary to transfer the location of relevant structures that the pathologist may identify in the gold standard HE images. A two-step registration framework is presented where a representative gray image extracted from the FTIR hypercube is used as an input. This representative image, which must have a spatial contrast as similar as possible to a gray image obtained from the HE image, is calculated through the spectrum variation in the fingerprint region. In the first step of the registration algorithm a similarity transformation is estimated from interest points, which are automatically detected by the popular SURF algorithm. In the second stage, a variational registration framework defined in the frequency domain compensates for local anatomical variations between both images. After a proper tuning of some parameters the proposed registration framework works in an automated way. The method was tested on 7 samples of colon tissue in different stages of cancer. Very promising qualitative and quantitative results were obtained (a mean correlation ratio of 92.16% with a standard deviation of 3.10%). FTIR is a well-established technique and there is significant interest in applying this technique to medical diagnostics e.g. to detect cancer. The introduction of focal plane array (FPA) detectors means that FTIR is particularly suited to rapid imaging of biopsy sections as an adjunct to digital pathology. Until recently however each pixel in the image has been limited to a minimum of 5.5 µm which results in a comparatively low magnification image or histology applications and potentially the loss of important diagnostic information. The recent introduction of higher magnification optics gives image pixels that cover approx. 1.1 µm. This reduction in image pixel size gives images of higher magnification and improved spatial detail can be observed. However, the effect of increasing the magnification on spectral quality and the ability to discriminate between disease states is not well studied. In this work we test the discriminatory performance of FTIR imaging using both standard (5.5 µm) and high (1.1 µm) magnification for the detection of colorectal cancer and explore the effect of binning to degrade high resolution images to determine whether similar diagnostic information and performance can be obtained using both magnifications. Results indicate that diagnostic performance using high magnification may be reduced as compared to standard magnification when using existing multivariate approaches. Reduction of the high magnification data to standard magnification via binning can potentially recover some of the lost performance. The rapid inspection of suspicious skin lesions for pathological cell types is the objective of optical point of care diagnostics technologies. A marker free fast diagnosis of skin malignancies would overcome the limitations of the current gold standard surgical biopsy. The time consuming and costly biopsy procedure requires the inspection of each sample by a trained pathologist, which limits the analysis of potentially malignant lesions. Optical technologies like RAMAN or infrared spectroscopy, which provide both, localization and chemical information, can be used to differentiate malignant from healthy tissue by the analysis of multi cell structures and cell type specific spectra. We here report the application of midIR spectroscopy towards fast and reliable skin diagnostics. Within the European research project MINERVA we developed standardized in vitro skin systems with increasing complexity, from single skin cell types as fibroblasts, keratinocytes and melanoma cells, to mixtures of these and finally three dimensional human skin equivalents. The standards were characterized in the established midIR range and also with newly developed systems for fast imaging up to 12 μm. The analysis of the spectra by novel data processing algorithms demonstrated the clear separation of all cell types, especially the tumor cells. The signals from single cell layers were sufficient for cell type differentiation. We have compared different midIR systems and found all of them suitable for specific cell type identification. Our data demonstrate the potential of midIR spectroscopy for fast image acquisition and an improved data processing as sensitive and specific optical biopsy technology. We developed crystalline AgClBr fibers of diameters 0.7-0.9mm that are flexible, non-toxic, insoluble in water and highly transparent between 4-15µm. We used these fibers for various sensing applications. Highly sensitive absorption measurements in the mid-IR may be carried out by Fiber-optic Evanescent Wave Spectroscopy (FEWS). A typical FEWS system is based on three mid-IR components: a tunable source, a detector and a AgClBr fiber sensor that is brought in contact with the samples. We used FTIR spectrometers or tunable gas lasers or quantum cascade lasers (QCLs) as mid-IR sources. We used this FEWS system for measurements on gases, liquids and solids. In particular we used it for several biomedical applications. Measurements in vivo: (1) Early detection of skin diseases (e.g. melanoma). (2) Measurements on cells and bacteria. (3) Measurements on cornea. Measurements in vitro: (4) Characterization of urinary and biliary stones. (5) Blood measurements. The FEWS method is simple, inexpensive and does not require sample processing. It would be useful for diagnostic measurements on the outer part of the body of a patient, as well as for endoscopic measurements. It would also useful for measurements on tissue samples removed from the body. In addition we develop Scanning Near-field Infrared Microscope that will be used for spectral imaging with sub-wavelength resolution in the mid-IR. The various AgClBr fiber-optic sensors are expected to be important diagnostic tools at the hand of physicians in the future. In the UK, it is now recognised that 1 in 2 people born after 1960 will develop some form of cancer during their lifetime. Diagnosing patients whilst in the early stages drastically improves their chances of survival but up until now the gold standard for cancer detection is via a lengthy excision biopsy procedure, which relies on the skill of a histopathologist. Evidently, the need for a faster solution is paramount. The mid-infrared (MIR) spectral region covers the wavelengths 3-25 μm and characteristic vibrational spectra unique to each molecular type. Subtle changes in the specific spectral response within this region are indicative of changes within the cells relative to normal cells, signifying the presence or absence of a disease. Our goal is to carry out disease diagnosis in vivo. Reaching these wavelengths has previously presented difficulties as conventional MIR blackbody light sources are weak and optical fibers for transmitting MIR light to/from tissue in vivo can be limited by strong material absorption such as silica glass >2.4 μm and tellurite, and heavy metal fluoride, >4.75 μm. However, chalcogenide glasses have been shown to transmit MIR light out to 25 μm. This paper reports on a glass composition in the Ge-Sb-Se system and its suitability as an optical fiber for the transmission of MIR to and from tissue samples, enabling in vivo mapping for an immediate diagnostic response- a technique termed ‘optical biopsy’. We report on an experimental demonstration of mid-infrared cascaded supercontinuum generation in commercial silica, fluoride, and chalcogenide fibers as a potentially cheap and practical alternative to direct pumping schemes. A pump continuum up to 4.4 μm was generated in cascaded silica and fluoride fibers by an amplified 1.55 μm nanosecond diode laser. By pumping a commercial Ge10As22Se68 single-material photonic crystal fiber with 135.7 mW of the pump continuum from 3.5- 4.4 μm, we obtained a continuum up to 7.2 μm with a total output power after the collimating lens of 54.5 mW, and 3.7 mW above 4.5 μm. spectroscopy has until now been greatly limited by the availability of lightsources. The choice has generally stood between a laser whose narrow spectrum limits flexibility or a globar, whose low brightness limits signal to noise ratio. Mid-IR supercontinuum sources, which can deliver an ultra-broad spectrum with a million times higher brightness than a globar, are now appearing to fill the performance gap between the traditional lightsources. The generation of a supercontinuum is a highly nonlinear process produced by high peak power pulses propagating through a nonlinear medium. Since the underlying processes are fundamentally random there will normally be some pulse to pulse fluctuation in the output light which can cause problems in spectroscopy. Most of the mid-IR supercontinuum sources shown to date have also been limited to pulse repetition rates of only a few tens of kilohertz which makes it difficult to apply them to the popular FTIR spectroscopy techniques. Here we will demonstrate a fully packaged, all-fiber, turn-key, low noise, 4.8W, 1.8-4.2 μm supercontinuum source, which can operate with variable repetition rates of up to 30 MHz. In addition we will discuss ways to reduce and counter the effects of pulse fluctuations and we demonstrate optimization of the output spectrum of the source for various applications. Such a source can give any mid-IR optics lab access to a performance which has previously only been available from dedicated beamlines at huge synchrotron facilities. Unacceptably large percentage (20-40%) of breast cancer lumpectomy patients are required to undergo multiple surgeries when positive margins are found upon post-operative histologic assessment. If the margin status can be determined during surgery, surgeon can resect additional tissues to achieve tumor-free margin, which will reduce the need for additional surgeries. Spectrally encoded confocal microscopy (SECM) is a high-speed reflectance confocal microscopy technology that has a potential to image the entire surgical margin within a short procedural time. Previously, SECM was shown to rapidly image a large area (10 mm by 10 mm) of human esophageal tissue within a short procedural time (15 seconds). When used in lumpectomy, SECM will be able to image the entire margin surface of ~30 cm2 in around 7.5 minutes. SECM images will then be used to determine margin status intra-operatively. In this paper, we present results from a study of testing accuracy of SECM for diagnosing malignant breast tissues. We have imaged freshly-excised breast specimens (N=46) with SECM. SECM images clearly visualized histomorphologic features associated with normal/benign and malignant breast tissues in a similar manner to histologic images. Diagnostic accuracy was tested by comparing SECM diagnoses made by three junior pathologists with corresponding histologic diagnoses made by a senior pathologist. SECM sensitivity and specificity were high, 0.91 and 0.93, respectively. Intra-observer agreement and inter-observer agreement were also high, 0.87 and 0.84, respectively. Results from this study showed that SECM has a potential to accurately determine margin status during breast cancer lumpectomy. FFOCT (Full Field Optical Coherence Tomography) is a novel optical technology that gives access to very high resolution tomography images of biological tissues within minutes, non-invasively. This makes it an attractive tool to bridge the gap between medical imaging modalities (MRI, ultrasound, CT) used for cancer lesion identification or targeting and histological diagnosis. Clinical tissue specimens, such as surgical cancer margins or biopsies, can potentially be assessed rapidly, by the clinician, in the aim to help him decide on the course of action. A fast FFOCT prototype was built, that provides 1cm2 images with 1 µm resolution in 1 minute, and can accommodate samples up to 50mm diameter. Specific work was carried out to implement a large sample holder, high-speed image acquisition system, optimized scanning, and accelerated GPU tiles stitching. Results obtained on breast, urology, and digestive tissues show the efficiency of the technique for the detection of cancer on clinical tissue specimens, and reinforce the clinical relevance of the technique. The technical and clinical results show that the fast FFOCT system can successfully be used for a fast assessment of cancer excision margins or biopsies providing a very valuable tool in the clinical environment. Intraoperative margin assessment to evaluate resected tissue margins for neoplastic tissue is performed to prevent reoperations following breast-conserving surgery. High resolution microendoscopy (HRME) can rapidly acquire images of fresh tissue specimens, but is limited by low image contrast in tissues with high optical scattering. In this study we evaluated two techniques to reduce out-of-focus light: HRME image acquisition with structured illumination (SI-HRME) and topical application of Lugol’s Iodine. Fresh breast tissue specimens from 19 patients were stained with proflavine alone or Lugol’s Iodine and proflavine. Images of tissue specimens were acquired using a confocal microscope and an HRME system with and without structured illumination. Images were evaluated based on visual and quantitative assessment of image contrast. The highest mean contrast was measured in confocal images stained with proflavine. Contrast was significantly lower in HRME images stained with proflavine; however, incorporation of structured illumination significantly increased contrast in HRME images to levels comparable to that in confocal images. The addition of Lugol’s Iodine did not increase mean contrast significantly for HRME or SI-HRME images. These findings suggest that structured illumination could potentially be used to increase contrast in HRME images of breast tissue for rapid image acquisition. We created a line-scanning, stage scanning confocal microscope as part of a new procedure: video assisted micrographic surgery (VAMS). The need for rapid pathological assessment of the tissue on the surface of skin excisions very large since there are 3.5 million new skin cancers diagnosed annually in the United States. The new design presented here is a confocal microscope without any scanning optics. Instead, a line is focused in space and the sample, which is flattened, is physically translated such that the line scans across its face in a direction perpendicular to the line its self. The line is 6mm long and the stage is capable of scanning 50 mm, hence the field of view is quite large. The theoretical diffraction-limited resolution is 0.7um lateral and 3.7um axial. However, in this preliminary report, we present initial results that are a factor of 5-7 poorer in resolution. The results are encouraging because they demonstrate that the linear array detector measures sufficient signal from fluorescently labeled tissue and also demonstrate the large field of view achievable with VAMS. We present a novel method, based on encoder mapping OCT imaging, for real-time guidance of core biopsy procedures. This method provides real-time feedback to the interventional radiologist, such that he/she can reorient the needle during the biopsy and sample the most representative area of the suspicious mass that is being investigated. This aspect is very important for tailoring therapy to the specific cancer based on biomarker analysis, which will become one of the next big advances in our search for the optimal cancer therapy. To enable individualized treatment, the genetic constitution and the DNA repair status in the affected areas is needed for each patient. Thus, representative sampling of the tumor is needed for analyzing various biomarkers, which are used as a tool to personalize cancer therapy. The encoder-based OCT enables samping of large size masses and provides full control on the imaging probe, which is passed through the bore of the biopsy guidance needle. The OCT image is built gradually, based on the feedback of an optical encoder which senses the incremental movement of the needle with a few microns resolution. Tissue mapping is independent of the needle speed, while it is advanced through the tissue. The OCT frame is analyzed in real-time and tissue cellularity is reported in a very simple manner (pie chart). Our preliminary study on a rabbit model of cancer has demonstrated the capability of this technology for accurately differentiating between viable cancer and heterogeneous or necrotic tissue. Background: Routine urological surgery frequently requires rapid on-site histopathological tissue evaluation either during biopsy or intra-operative procedure. However, resected tissue needs to undergo processing, which is not only time consuming but may also create artifacts hindering real-time tissue assessment. Likewise, pathologist often relies on several ancillary methods, in addition to H&E to arrive at a definitive diagnosis. Although, helpful these techniques are tedious and time consuming and often show overlapping results. Therefore, there is a need for an imaging tool that can rapidly assess tissue in real-time at cellular level. Multiphoton microscopy (MPM) is one such technique that can generate histology-quality images from fresh and fixed tissue solely based on their intrinsic autofluorescence emission, without the need for tissue processing or staining. Design: Fresh tissue sections (neoplastic and non-neoplastic) from biopsy and surgical specimens of bladder and kidney were obtained. Unstained deparaffinized slides from biopsy of medical kidney disease and oncocytic renal neoplasms were also obtained. MPM images were acquired using with an Olympus FluoView FV1000MPE system. After imaging, fresh tissues were submitted for routine histopathology. Results: Based on the architectural and cellular details of the tissue, MPM could characterize normal components of bladder and kidney. Neoplastic tissue could be differentiated from non-neoplastic tissue and could be further classified as per histopathological convention. Some of the tumors had unique MPM signatures not otherwise seen on H&E sections. Various subtypes of glomerular lesions were identified as well as renal oncocytic neoplasms were differentiated on unstained deparaffinized slides. Conclusions: We envision MPM to become an integral part of regular diagnostic workflow for rapid assessment of tissue. MPM can be used to evaluate the adequacy of biopsies and triage tissues for ancillary studies. It can also be used as an adjunct to frozen section analysis for intra-operative margin assessment. Further, it can play an important role for pathologist for guiding specimen grossing, selecting tissue for tumor banking and as a rapid ancillary diagnostic tool. Widely used methods for preparing and viewing tissue specimens at microscopic resolution have not changed for over a century. They provide high-quality images but can involve time-frames of hours or even weeks, depending on logistics. There is increasing interest in slide-free methods for rapid tissue analysis that can both decrease turn-around times and reduce costs. One new approach is MUSE (microscopy with UV surface excitation), which exploits the shallow penetration of UV light to excite fluorescent signals from only the most superficial tissue elements. The method is non-destructive, and eliminates requirement for conventional histology processing, formalin fixation, paraffin embedding, or thin sectioning. It requires no lasers, confocal, multiphoton or optical coherence tomography optics. MUSE generates diagnostic-quality histological images that can be rendered to resemble conventional hematoxylin- and eosin-stained samples, with enhanced topographical information, from fresh or fixed, but unsectioned tissue, rapidly, with high resolution, simply and inexpensively. We anticipate that there could be widespread adoption in research facilities, hospital-based and stand-alone clinical settings, in local or regional pathology labs, as well as in low-resource environments. We have developed an automated, wide-field optical coherence tomography (OCT)-based imaging device (OTISTM Perimeter Medical Imaging) for peri-operative, ex-vivo tissue imaging. This device features automated image acquisition, enabling rapid capture of high-resolution (15 μm) OCT images from samples up to 10 cm in diameter. We report on the iterative progression of device development from phantom and pre-clinical (tumor xenograft) models through to initial clinical results. We discuss the challenges associated with proving a novel imaging technology against the clinical “gold standard” of conventional post-operative pathology. INVITED TALK Advances in imaging tissue microstructure in living subjects, or in freshly excised tissue with minimum preparation and processing, are important for future diagnosis and surgical guidance in the clinical setting, particularly for application to cancer. Whilst microscopy methods continue to advance on the cellular scale and medical imaging is well established on the scale of the whole tumor or organ, it is attractive to consider imaging the tumor environment on the micro-scale, between that of cells and whole tissues. Such a scenario is ideally suited to optical coherence tomography (OCT), with the twin attractions of requiring little or no tissue preparation, and in vivo capability. OCT’s intrinsic scattering contrast reveals many morphological features of tumors, but is frequently ineffective in revealing other important aspects, such as microvasculature, or in reliably distinguishing tumor from uninvolved stroma. To address these shortcomings, we are developing several advances on the basic OCT approach. We are exploring speckle fluctuations to image tissue microvasculature and we have been developing several parametric approaches to tissue micro-scale characterization. Our approaches extract, from a three-dimensional OCT data set, a two-dimensional image of an optical parameter, such as attenuation or birefringence, or a mechanical parameter, such as stiffness, that aids in characterizing the tissue. This latter method, termed optical coherence elastography, parallels developments in ultrasound and magnetic resonance imaging. Parametric imaging of birefringence and of stiffness both show promise in addressing the important issue of differentiating cancer from uninvolved stroma in breast tissue. When used for intra-operative imaging of residual basal cell carcinomas (BCCs), reflectance confocal microscopy (RCM) is limited to detection of relatively large tumors. Small tumors remain hidden in the surrounding bright dermis. Fluorescence confocal microscopy (FCM) may improve the sensitivity for detecting small tumors. Fluorescein enhances cell cytoplasm contrast in fluorescence confocal images, but has had limited clinical impact on imaging BCCs in vivo because there is a lack of a well-defined protocol (concentration and application time) that can be effectively used for intraoperative imaging. We conducted an ex vivo study, using discarded tissue from Mohs surgery and a benchtop FCM with 488nm wavelength for excitation and 521nm detection for imaging Concentrations of 6, 0.6 and 0.6 mM with immersion times of 5, 15, 30, and 60 seconds were repeatedly tested (total of 76 specimens).. The 0.6 mM and immersion time of 60 seconds showed that cellular cytoplasm can be labeled with controlled saturation and without leaving the yellow color on the surface of the tissue. Initial results show that, fluorescein may enhance cellular structures contrast relative to other normal dermal structures, improving the detection of small BCCs. This study provide an optimized set of parameters for subsequently testing of topical application in vivo for intraopertive imaging of BCCs. The use of multiphoton interactions in biological tissue for imaging contrast requires highly sensitive optical measurements. These often involve signal processing and filtering steps between the photodetector and the data acquisition device, such as photon counting and lock-in amplification. These steps can be implemented as real-time digital signal processing (DSP) elements on field-programmable gate array (FPGA) devices, an approach that affords much greater flexibility than commercial photon counting or lock-in devices. We will present progress toward developing two new FPGA-based DSP devices for multiphoton and time-resolved microscopy applications. The first is a high-speed multiharmonic lock-in amplifier for transient absorption microscopy, which is being developed for real-time analysis of the intensity-dependence of melanin, with applications in vivo and ex vivo (noninvasive histopathology of melanoma and pigmented lesions). The second device is a kHz lock-in amplifier running on a low cost ($50--$200) development platform. It is our hope that these FPGA-based DSP devices will enable new, high-speed, low-cost applications in multiphoton and time-resolved microscopy. Confocal mosaicing microscopy (CMM) enables rapid imaging of large areas of fresh tissue ex vivo without the processing that is necessary for conventional histology. When performed with fluorescence mode using acridine orange (nuclear specific dye) it enhances nuclei-to-dermis contrast that enables detection of all types of BCCs including thin strands of infiltrative basal cell carcinomas (BCCs). Thus far, this technique has been mostly validated in research setting for the analysis of BCC tumor margins. Recently, CMM has been adopted and implemented in real clinical settings by some surgeons as an alternative tool to frozen section (FS) during Mohs surgery. In this review article we summarize the development of CMM guided imaging of ex vivo tissues from bench to bedside. We also present its current state of application in routine clinical workflow not only for the assessment of BCC margin but also for other skin cancers such as melanoma, SCC, and some infectious diseases where FS is not routinely performed. Lastly, we also discuss the potential limitations of this technology as well as future developments. As this technology advances further, it may serve as an adjunct to standard histology and enable rapid surgical pathology of skin cancers at the bedside. In this report, optical biopsy was applied to diagnose human brain cancer in vitro for the identification of brain cancer from normal tissues by native fluorescence and Stokes shift spectra (SSS). 77 brain specimens including three types of human brain tissues (normal, glioma and brain metastasis of lung cancers) were studied. In order to observe spectral changes of fluorophores via fluorescence, the selected excitation wavelength of UV at 300 and 340 nm for emission spectra and a different Stokes Shift spectra with intervals Δλ = 40 nm were measured. The fluorescence spectra and SSS from multiple key native molecular markers, such as tryptophan, collagen, NADH, alanine, ceroid and lipofuscin were observed in normal and diseased brain tissues. Two diagnostic criteria were established based on the ratios of the peak intensities and peak position in both fluorescence and SSS spectra. It was observed that the ratio of the spectral peak intensity of tryptophan (340 nm) to NADH (440 nm) increased in glioma, meningioma (benign), malignant meninges tumor, and brain metastasis of lung cancer tissues in comparison with normal tissues. The ratio of the SS spectral peak (Δλ = 40 nm) intensities from 292 nm to 366 nm had risen similarly in all grades of tumors. Automated and unbiased methods of non-invasive cell monitoring able to deal with complex biological heterogeneity are fundamentally important for biology and medicine. Label-free cell imaging provides information about endogenous fluorescent metabolites, enzymes and cofactors in cells. However extracting high content information from imaging of native fluorescence has been hitherto impossible. Here, we quantitatively characterise cell populations in different tissue types, live or fixed, by using novel image processing and a simple multispectral upgrade of a wide-field fluorescence microscope. Multispectral intrinsic fluorescence imaging was applied to patient olfactory neurosphere-derived cells, cell model of a human metabolic disease MELAS (mitochondrial myopathy, encephalomyopathy, lactic acidosis, stroke-like syndrome). By using an endogenous source of contrast, subtle metabolic variations have been detected between living cells in their full morphological context which made it possible to distinguish healthy from diseased cells before and after therapy. Cellular maps of native fluorophores, flavins, bound and free NADH and retinoids unveiled subtle metabolic signatures and helped uncover significant cell subpopulations, in particular a subpopulation with compromised mitochondrial function. The versatility of our method is further illustrated by detecting genetic mutations in cancer, non-invasive monitoring of CD90 expression, label-free tracking of stem cell differentiation, identifying stem cell subpopulations with varying functional characteristics, tissue diagnostics in diabetes, and assessing the condition of preimplantation embryos. Our optimal discrimination approach enables statistical hypothesis testing and intuitive visualisations where previously undetectable differences become clearly apparent. Imaging technologies working in the spatial frequency domain are becoming increasingly popular for generating wide-field optical property maps, enabling further analysis of tissue parameters such as absorption or scattering. While acquisition methods have witnessed a very rapid growth and are now performing in real-time, processing methods are yet slow preventing information to be acquired and displayed in real-time. In this work, we present solutions for rapid inverse problem solving for optical properties by use of advanced look-up tables. In particular, we present methods and results from a dense, linearized look-up table and an analytical representation that currently run 100 times faster than the standard method and within 10% in both absorption and scattering. With the resulting computation time in the tens of milliseconds range, the proposed techniques enable video-rate feedback of real-time techniques such as snapshot of optical properties (SSOP) imaging, making full video-rate guidance in the clinic possible. In this study, Stokes shift spectroscopy (S3) is used for measuring the aggressiveness of malignant tumors. S3 is an optical tool which utilizes the difference between the emission wavelength (λem) and the absorption wavelength (λabs) (the Stokes shift) to give a fixed wavelength shift (Δλs).Our analysis of tumor samples using S3 shows grade 3 (high grade) cancers consistently have increased relative tryptophan content compared to grade 1 or 2 tumors. This technique may be a useful tool in the evaluation of a patient’s cancer. Tryptophan is an extremely important amino acid for a variety of biological functions in living organisms. Changes in the concentration of this amino acid can point to identification of cancerous tissues or even confirm symptoms of depression in patients. Therefore it is extremely important to identify and quantify tryptophan concentrations in human blood as well as in in-vivo diagnostic studies. Here a reflection based terahertz pulsed spectroscopy system was used to study the interaction of THz pulses with cancerous cells to gauge the possibility of using L-tryptophan as a biomarker for THz sensing of diseases. Initial measurements were performed on human colon adenocarcinoma cells and human breast cancer cells cultivated on glass slides. The glass slides utilized in the growth process limited the measurements not only to reflection based geometries but also limited the analysis of the samples in the frequency domain due to the highly absorbing nature of glass in the THz region. The useful bandwidth was limited to frequencies below 0.6THz which prohibited us from investigating the effects of L-tryptophan in these samples. Even with the limited frequency range the measurements show that there are slight differences in the transmission of the THz pulse through different samples. The purpose of this study is to evaluate the effect of a high-lipid diet on elasticity of adipose tissue. We employed dual Raman/Brillouin microspectroscopy to analyze brown and white adipose tissues obtained from adult rats. The rats were divided into two groups, one of which received a high-fat feed, while the other served as a control. We hypothesized that the changes in the elasticity of adipose tissues between the two groups can be successfully assessed using Brillouin spectroscopy. We found that the brown adipose tissue possessed a lesser Brillouin shift than the white adipose within each group and that the elastic modulus of both adipose tissues increases in the high-fat diet group. The Raman spectra provided supplementary chemical information and indicated an increase in the lipid-to-protein ratio in the brown adipose, but not in the white adipose. We explored the depth penetration in tissue-mimicking intralipid-based phantoms in SWIR (800-1650 nm) using a hyperspectral imaging system composed from a 2D CCD camera coupled to a microscope. Hyperspectral images in transmission and reflection geometries were collected with a spectral resolution of 5.27 nm and a total acquisition time of 3 minutes or less that minimized artifacts from sample drying. Michelson spatial contrast was used as a metric to evaluate light penetration. Results from both transmission and reflection geometries consistently revealed the highest spatial contrast in the wavelength range of 1300 to 1350 nm. Inducing angiogenesis is one hallmark of cancer. Tumor induced neovasculature is often characterized as leaky, tortuous and chaotic, unlike a highly organized normal vasculature. Additionally, in the course of carcinogenesis, angiogenesis precedes a visible lesion. Tumor cannot grow beyond 1-2 mm in diameter without inducing angiogenesis. Therefore, capturing the event of angiogenesis may aid early detection of pre-cancer –important for better treatment prognoses in regions that lack the resources to manage invasive cancer. In this study, we imaged the neovascularization in vivo in a spontaneous hamster cheek pouch carcinogen model using a, non-invasive, label-free, high resolution, reflected-light spectral darkfield microscope. Hamsters’ cheek pouches were painted with 7,12-Dimethylbenz[a]anthracene (DMBA) to induce pre-cancerous to cancerous changes, or mineral oil as control. High resolution spectral darkfield images were obtained over the course of pre-cancer development and in control cheek pouches. The vasculature was segmented with a multi-scale Gabor filter with an 85% accuracy compared with manually traced masks. Highly tortuous vasculature was observed only in the DMBA treated cheek pouches as early as 6 weeks of treatment. In addition, the highly tortuous vessels could be identified before a visible lesion occurred later during the treatment. The vessel patterns as determined by the tortuosity index were significantly different from that of the control cheek pouch. This preliminary study suggests that high-resolution darkfield microscopy is promising tool for pre-cancer and early cancer detection in low resource settings. Particle size analyzers based on laser scattering commonly make use of light diffraction and scattering around the particle considered in its medium. For particle size below 50 μm, Fraunhofer theory must be abandoned in favor of Mie model, which requires to know the complex refractive index of both the particle and the medium. In this paper, we demonstrate that particle size characterization can be realized by measuring the macroscopic Raman spectral response of the whole set of particles excited by a laser beam. We use a home-made setup based on coherent anti-Stokes Raman scattering (CARS) and having a 0.36 cm-1 spectral resolution, in which the laser source is a dual-output infrared nanosecond supercontinuum source (1064 nm monochromatic pump wave, 1100-1640 nm broadband Stokes wave). The samples are latex beads in water with different diameters (20 nm, 50 nm, 100 nm, 5 μm). The C-H stretching line around 3050 cm-1 is studied. For this vibration, we study the variation of both the CARS central frequency and linewidth as a function of the particles size. A quasi linear increase of the linewidth with the inverse of the diameter is measured. A difference of 15 cm-1 is obtained between beads with diameters of 5 μm and 20 nm respectively. The physical phenomena at the origin of this difference are discussed, especially considering the contributions of the center and of the boundaries of the object to the global Raman response. Optical spectroscopy and hyperspectral imaging have shown the theoretical potential to discriminate between cancerous and non-cancerous tissue with high sensitivity and specificity. To date, these techniques have not been able to be effectively translated to endoscope platforms. Hyperspectral imaging of the fluorescence excitation spectrum represents a new technology that may be well-suited for endoscopic implementation. However, the feasibility of detecting differences between normal and cancerous mucosa using fluorescence excitation-scanning hyperspectral imaging has not been evaluated. The objective of this pilot study was to evaluate the changes in the fluorescence excitation spectrum of resected specimen pairs of colorectal adenocarcinoma and normal colorectal mucosa. Patients being treated for colorectal adenocarcinoma were enrolled. Representative adenocarcinoma and normal colonic mucosa specimens were collected from each case. Specimens were flash frozen in liquid nitrogen. Adenocarcinoma was confirmed by histologic evaluation of H&E permanent sections. Hyperspectral image data of the fluorescence excitation of adenocarcinoma and surrounding normal tissue were acquired using a custom microscope configuration previously developed in our lab. Results demonstrated consistent spectral differences between normal and cancerous tissues over the fluorescence excitation spectral range of 390-450 nm. We conclude that fluorescence excitation-scanning hyperspectral imaging may offer an alternative approach for differentiating adenocarcinoma and surrounding normal mucosa of the colon. Future work will focus on expanding the number of specimen pairs analyzed and will utilize fresh tissues where possible, as flash freezing and reconstituting tissues may have altered the autofluorescence properties. Both Optical Coherence Tomography (OCT) and Single Fiber Reflectance Spectroscopy (SFR) are used to determine various optical properties of tissue. We developed a method combining these two techniques to measure the scattering anisotropy (g1) and γ (=1-g2/1-g1), related to the 1st and 2nd order moments of the phase function. The phase function is intimately associated with the cellular organization and ultrastructure of tissue, physical parameters that may change during disease onset and progression. Quantification of these parameters may therefore allow for improved non-invasive, in vivo discrimination between healthy and diseased tissue. With SFR the reduced scattering coefficient and γ can be extracted from the reflectance spectrum (Kanick et al., Biomedical Optics Express 2(6), 2011). With OCT the scattering coefficient can be extracted from the signal as a function of depth (Faber et al., Optics Express 12(19), 2004). Consequently, by combining SFR and OCT measurements at the same wavelengths, the scattering anisotropy (g) can be resolved using µs’= µs*(1-g). We performed measurements on a suspension of silica spheres as a proof of principle. The SFR model for the reflectance as a function of the reduced scattering coefficient and γ is based on semi-empirical modelling. These models feature Monte-Carlo (MC) based model constants. The validity of these constants - and thus the accuracy of the estimated parameters - depends on the phase function employed in the MC simulations. Since the phase function is not known when measuring in tissue, we will investigate the influence of assuming an incorrect phase function on the accuracy of the derived parameters. We present an ultra-simple miniature fiber optic probe to measure spatially and spectrally resolved diffuse reflectance in the sub-diffuse regime (i.e. measurements with source-detector separation less than a transport mean free path) in-vivo. This probe has a robust and simple design with a small footprint (<.5 mm diameter). We show that our probe has sensitivity to structures scattering light an order of magnitude smaller than the diffraction limit, and thus can be used to quantify alterations in the very smallest structures in tissue (e.g. organelles, chromatin, collagen fibers, etc.). Specifically, the probe samples the spatial profile of diffuse reflectance in the sub-diffusion regime (P(r), r<<1 mm). P(r) can be used to quantify the entire shape of the phase function, F(θ). The shape of the refractive index correlation function Bn(rd) (through which the spatial distribution of mass is defined) can be analytically derived from the shape of F(θ) through application of the Born approximation. Therefor measurements of P(r) can elucidate F(θ) and Bn(rd). This ability has tremendous potential for use as a diagnostic tool and broad applications for probing the nanoscale environment of tissue in-vivo. Mueller matrix imaging along with polar decomposition method was employed for the colonic cancer detection by polarized light in the near-infrared spectral range (700–1100 nm). A high-speed (<5s) Muller matrix imaging system with dual-rotating waveplates was developed. 16 (4 by 4) full Mueller matrices of the colonic tissues (i.e., normal and caner) were acquired. Polar decomposition was further implemented on the 16 images to derive the diattentuation, depolarization, and the retardance images. The decomposed images showed clear margin between the normal and cancerous colon tissue samples. The work shows the potential of near-infrared Mueller matrix imaging for the early diagnosis and detection of malignant lesions in the colon. Polarization gating is a popular and widely used technique in biomedical optics to sense superficial tissues (collinear detection), deeper volumes (cross-linear detection), and also selectively probe deeper volumes (using elliptically polarized light). As opposed to the conventional linearly polarized illumination, we propose a new protocol of polarization gating that combines co-elliptical and counter-elliptical measurements to selectively enhance contrast of the images. In vivo experiments were performed on skin abnormalities of volunteers (to selectively probe and access subsurface information). Polarization imaging techniques are recognized as potentially powerful tools to detect the structural changes of biological tissues. Meanwhile, spectral features of the scattered light can also provide abundant microstructural information, therefore can be applied in biomedical studies. In this paper, we adopt the polarization reflectance spectral imaging to analyze the microstructural changes of hydrolyzing skeletal muscle tissues. We measure the Mueller matrix, which is a comprehensive description of the polarization properties, of the bovine skeletal muscle samples in different periods of time, and analyze its behavior using the multispectral Mueller matrix transformation (MMT) technique. The experimental results show that for bovine skeletal muscle tissues, the backscattered spectral MMT parameters have different values and variation features at different stages. We can also find the experimental results indicate that the stages of hydrolysis for bovine skeletal muscle samples can be judged by the spectral MMT parameters. The results presented in this work show that combining with the spectral technique, the MMT parameters have the potential to be used as tools for meat quality detection and monitoring. Degradation and destruction of articular cartilage is the etiology of osteoarthritis (OA), an entity second only to cardiovascular disease as a cause of disability in the United States. Joint mechanics and cartilage biochemistry are believed to play a role in OA; an optical tool to detect structural and chemical changes in articular cartilage might offer benefit for its early detection and treatment. The objective of the present study was to identify the spectral changes in intrinsic ultraviolet (UV) fluorescence of cartilage that occur after proteolytic digestion of cartilage. Bovine articular cartilage samples were incubated in varying concentrations of collagenase ranging from 10ug/mL up to 5mg/mL for 18 hours at 37°C, a model of OA. Pre- and post-incubation measurements were taken of the UV excitation-emission spectrum of each cartilage sample. Mechanical tests were performed to determine the pre- and post-digestion force/displacement ratio associated with indentation of each sample. Spectral changes in intrinsic cartilage fluorescence and stiffness of the cartilage were associated with proteolytic digestion. In particular, changes in the relative intensity of fluorescence peaks associated with pentosidine crosslinks (330 nm excitation, 390 nm emission) and tryptophan (290 nm excitation, 340 nm emission) were found to correlate with different degrees of cartilage digestion and cartilage stiffness. In principle, it may be possible to use UV fluorescence spectral data for early detection of damage to articular cartilage, and as a surrogate measure for cartilage stiffness. Lower extremity ulcers are one of the most common complications that not only affect many people around the world but also have huge impact on economy since a large amount of resources are spent for treatment and prevention of the diseases. Clinical studies have shown that reduction in the wound size of 40% within 4 weeks is an acceptable progress in the healing process. Quantification of the wound size plays a crucial role in assessing the extent of healing and determining the treatment process. To date, wound healing is visually inspected and the wound size is measured from surface images. The extent of wound healing internally may vary from the surface. A near-infrared (NIR) optical imaging approach has been developed for non-contact imaging of wounds internally and differentiating healing from non-healing wounds. Herein, quantitative wound size measurements from NIR and white light images are estimated using a graph cuts and region growing image segmentation algorithms. The extent of the wound healing from NIR imaging of lower extremity ulcers in diabetic subjects are quantified and compared across NIR and white light images. NIR imaging and wound size measurements can play a significant role in potentially predicting the extent of internal healing, thus allowing better treatment plans when implemented for periodic imaging in future. In recent conflicts, battlefield injuries consist largely of extensive soft injuries from blasts and high energy projectiles, including gunshot wounds. Repair of these large, traumatic wounds requires aggressive surgical treatment, including multiple surgical debridements to remove devitalised tissue and to reduce bacterial load. Identifying those patients with wound complications, such as infection and impaired healing, could greatly assist health care teams in providing the most appropriate and personalised care for combat casualties. Candidate technologies to enable this benefit include the fusion of imaging and optical spectroscopy to enable rapid identification of key markers. Hence, a novel system based on IR negative contrast imaging (NCI) is presented that employs an optical parametric oscillator (OPO) source comprising a periodically-poled LiNbO3 (PPLN) crystal. The crystal operates in the shortwave and midwave IR spectral regions (ca. 1.5 – 1.9 μm and 2.4 – 3.8 μm, respectively). Wavelength tuning is achieved by translating the crystal within the pump beam. System size and complexity are minimised by the use of single element detectors and the intracavity OPO design. Images are composed by raster scanning the monochromatic beam over the scene of interest; the reflection and/or absorption of the incident radiation by target materials and their surrounding environment provide a method for spatial location. Initial results using the NCI system to characterise wound biopsies are presented here. Many research works based on fluorescence spectroscopy have proven its potential in the diagnosis of various diseases using the spectral signatures of the native key fluorophores such as tryptophan, tyrosine, collagen, NADH, FAD and porphyrin. These fluorophores distribution, concentration and their conformation may be changed depending upon the pathological and metabolic conditions of cells and tissues. In this study, we have made an attempt to characterize the blood plasma of normal subject and oral cancer patients by native fluorescence spectroscopy at 280 nm excitation. Further, the fluorescence data were analyzed by employing the multivariate statistical method - linear discriminant analyses (LDA) using leaves one out cross validation method. The results illustrate the potential of fluorescence spectroscopy technique in the diagnosis of oral cancer using blood plasma. Urine is considered diagnostically important for tits native fluorophores and they vary in their distribution, concentration and physiochemical properties, depending upon the metabolic condition of the subject. In this study, we have made an attempt, to characterize the urine of normal subject and diabetic patients under medication by native fluorescence spectroscopy at 280 nm excitation. Further, the fluorescence data were analyzed employing the multivariate statistical method linear discriminant analysis (LDA) using leave one out cross validation method. The results were promising in discriminating diabetic urine from that of normal urine. This study in future may be extended to check the feasibility in ruling out the coexisting disorders such as cancer. Colorectal cancer is the United States 3rd leading cancer in death rates.1 The current screening for colorectal cancer is an endoscopic procedure using white light endoscopy (WLE). There are multiple new methods testing to replace WLE, for example narrow band imaging and autofluorescence imaging.2 However, these methods do not meet the need for a higher specificity or sensitivity. The goal for this project is to modify the presently used endoscope light source to house 16 narrow wavelength LEDs for spectral imaging in real time while increasing sensitivity and specificity. The process to do such was to take an Olympus CLK-4 light source, replace the light and electronics with 16 LEDs and new circuitry. This allows control of the power and intensity of the LEDs. This required a larger enclosure to house a bracket system for the solid light guide (lightpipe), three new circuit boards, a power source and National Instruments hardware/software for computer control. The results were a successfully designed retrofit with all the new features. The LED testing resulted in the ability to control each wavelength’s intensity. The measured intensity over the voltage range will provide the information needed to couple the camera for imaging. Overall the project was successful; the modifications to the light source added the controllable LEDs. This brings the research one step closer to the main goal of spectral imaging for early detection of colorectal cancer. Future goals will be to connect the camera and test the imaging process. The supercontinuum laser light source has many advantages over other light sources, including broad spectral range. Transmission images of paired normal and malignant breast tissue samples from two patients were obtained using a Leukos supercontinuum (SC) laser light source with wavelengths in the second and third NIR optical windows and an IR- CCD InGaAs camera detector (Goodrich Sensors Inc. high response camera SU320KTSW-1.7RT with spectral response between 900 nm and 1,700 nm). Optical attenuation measurements at the four NIR optical windows were obtained from the samples. The paper focus on the various algorithms on to unravel the fluorescence spectra by unmixing methods to identify cancerous and normal human tissues from the measured fluorescence spectroscopy. The biochemical or morphologic changes that cause fluorescence spectra variations would appear earlier than the histological approach; therefore, fluorescence spectroscopy holds a great promise as clinical tool for diagnosing early stage of carcinomas and other deceases for in vivo use. The method can further identify tissue biomarkers by decomposing the spectral contributions of different fluorescent molecules of interest. In this work, we investigate the performance of blind source un-mixing methods (backward model) and spectral fitting approaches (forward model) in decomposing the contributions of key fluorescent molecules from the tissue mixture background when certain selected excitation wavelength is applied. Pairs of adenocarcinoma as well as normal tissues confirmed by pathologist were excited by selective wavelength of 340 nm. The emission spectra of resected fresh tissue were used to evaluate the relative changes of collagen, reduced nicotinamide adenine dinucleotide (NADH), and Flavin by various spectral un-mixing methods. Two categories of algorithms: forward methods and Blind Source Separation [such as Principal Component Analysis (PCA) and Independent Component Analysis (ICA), and Nonnegative Matrix Factorization (NMF)] will be introduced and evaluated. The purpose of the spectral analysis is to discard the redundant information which conceals the difference between these two types of tissues, but keep their diagnostically significance. The facts predicted by different methods were compared to the gold standard of histopathology. The results indicate that these key fluorophores within tissue, e.g. tryptophan, collagen, and NADH, and flavin, show differences of relative contents of fluorophores among different types of human cancer and normal tissues. The sensitivity, specificity, and receiver operating characteristic (ROC) are finally employed as the criteria to evaluate the efficacy of these methods in cancer detection. The underlying physical and biological basis for these optical approaches will be discussed with examples. This ex vivo preliminary trial demonstrates that these different criteria from different methods can distinguish carcinoma from normal tissues with good sensitivity and specificity while among them, we found that ICA appears to be the superior method in predication accuracy. Cervical cancer is considered as the second most commonly occurring malignancy among women, next to breast cancer. It is well known that most of the cancer patients diagnosed with advanced stages and there is a pressing need for improved methods to detect cancer at its initial stages. Many techniques have been adopted for the diagnosis of cervical cancer. Among these, fluorescence polarization spectroscopy is a complementary technique of fluorescence spectroscopy which helps us to elucidate the spectral characteristics which highly depend on pH, viscosity and local environment. Since urine has many metabolites and the measurement of native fluorescence of urine, in principle, able to provide an indication of a number of health conditions, attempts were made to study fluorescence anisotropic characterization of the human urine of cervical cancer patients and normal subjects. Significant differences were observed between the anisotropic and polarization values of cancer subjects and normal subjects. Stokes shift spectroscopy has been considered as a potential tool in characterization of multiple components present in tissues and biofluids. Since, the intensity and resolution of the fluorophores depends on the Stokes shift, different opinion has been reflected by the researchers in fixing the Stokes shift. Also, not many studies have been reported on the characterization of biofluids and especially on the diagnosis of cancer. Urine is considered as an important diagnostic biofluid as it is rich in many metabolites where many of them are native fluorophores. In this study, we aimed at characterizing the urine of normal subjects and patients with cervical cancer as function of different Stokes shift. It is observed that Neopterin and Riboflavin are the main fluorophores contribute to the variation between normal and cervical cancer subjects. Ratio variables based linear discriminant analysis shows that the Stokes shift of 40 nm and 60 nm may be considered for better characterization with better signal to noise ratio when compared to others. Raman spectroscopy has become widely used for diagnostic purpose of breast, lung and brain cancers. This report introduced a new approach based on spatial frequency spectra analysis of the underlying tissue structure at different stages of brain tumor. Combined spatial frequency spectroscopy (SFS), Resonance Raman (RR) spectroscopic method is used to discriminate human brain metastasis of lung cancer from normal tissues for the first time. A total number of thirty-one label-free micrographic images of normal and metastatic brain cancer tissues obtained from a confocal micro- Raman spectroscopic system synchronously with examined RR spectra of the corresponding samples were collected from the identical site of tissue. The difference of the randomness of tissue structures between the micrograph images of metastatic brain tumor tissues and normal tissues can be recognized by analyzing spatial frequency. By fitting the distribution of the spatial frequency spectra of human brain tissues as a Gaussian function, the standard deviation, σ, can be obtained, which was used to generate a criterion to differentiate human brain cancerous tissues from the normal ones using Support Vector Machine (SVM) classifier. This SFS-SVM analysis on micrograph images presents good results with sensitivity (85%), specificity (75%) in comparison with gold standard reports of pathology and immunology. The dual-modal advantages of SFS combined with RR spectroscopy method may open a new way in the neuropathology applications. Resonance Raman (RR) spectroscopic technique has a high potential for label-free and in-situ detection of biomedical lesions in vivo. This study evaluates the ability of RR spectroscopy method as an optical histopathology tool to detect the atherosclerotic plaque states of abdominal aorta in vitro. This part demonstrates the RR spectral molecular fingerprint features from different sites of the atherosclerotic abdominal aortic wall tissues. Total 57 sites of five pieces aortic samples in intimal and adventitial wall from an autopsy specimen were examined using confocal micro Raman system of WITec 300R with excitation wavelength of 532nm. The preliminary RR spectral biomarkers of molecular fingerprints indicated that typical calcified atherosclerotic plaque (RR peak at 964cm-1) tissue; fibrolipid plaque (RR peaks at 1007, 1161, 1517 and 2888cm-1) tissue, lipid pool with the fatty precipitation cholesterol) with collagen type I (RR peaks at 864, 1452, 1658, 2888 and 2948cm-1) in the soft tissue were observed and investigated. ion for various disease diagnosis including cancers. Oral cancer is one of the most common cancers in India and it accounts for one third of the global oral cancer burden. Raman spectroscopy of tissues has gained much attention in the diagnostic oncology, as it provides unique spectral signature corresponding to metabolic alterations under different pathological conditions and micro-environment. Based on these, several studies have been reported on the use of Raman spectroscopy in the discrimination of diseased conditions from their normal counterpart at cellular and tissue level but only limited studies were available on bio-fluids. Recently, optical characterization of bio-fluids has also geared up for biomarker identification in the disease diagnosis. In this context, an attempt was made to study the metabolic variations in the blood, urine and saliva of oral cancer patients and normal subjects using Raman spectroscopy. Principal Component based Linear Discriminant Analysis (PC-LDA) followed by Leave-One-Out Cross-Validation (LOOCV) was employed to find the statistical significance of the present technique in discriminating the malignant conditions from normal subjects. Actinic cheilitis is a potentially malignant disorder that mostly affects the vermilion border of the lower lip and can lead to squamous cell carcinoma. Because of its heterogeneous clinical aspect, it is difficult to indicate representative biopsy area. Late diagnosis is a limiting factor of therapeutic possibilities available to treat oral cancer. The diagnosis of actinic cheilitis is mainly based on clinical and histopathological analysis and it is a time consuming procedure to get the results. Information about the organization and chemical composition of the tissues can be obtained using fluorescence lifetime spectroscopy techniques without the need for biopsy. The main targeted fluorophores are NADH (nicotinamide adenine dinucleotide) and FAD (flavin adenine dinucleotide), which have free and bound states, each one with different average lifetimes. The average lifetimes for free and bound NADH and FAD change according to tissue metabolic alterations and allow a quick and non-invasive clinical investigation of injuries and to help clinicians with the early diagnosis of actinic cheilitis. This study aims to evaluate the fluorescence lifetime parameters at the discrimination of three degrees of epithelial dysplasia, the most important predictor of malignant development, described in up to 100% of actinic cheilitis cases. Diffuse reflectance spectroscopy has been widely used in diagnostic oncology and characterization of laser irradiated tissue. However, still accurate and simple analytical equation does not exist for estimation of diffuse reflectance from turbid media. In this work, a diffuse reflectance lookup table for a range of tissue optical properties was generated using Monte Carlo simulation. Based on the generated Monte Carlo lookup table, an empirical formula for diffuse reflectance was developed using surface fitting method. The variance between the Monte Carlo lookup table surface and the surface obtained from the proposed empirical formula is less than 1%. The proposed empirical formula may be used for modeling of diffuse reflectance from tissue.
When considering my personal preferences, I find myself impossibly divided on Best Actress. I admire Amy Adams, Sandra Bullock, and Cate Blanchett’s performances almost equally. External factors knock Bullock down a peg (I’d rather pretend she won that other Oscar for “Gravity” than have her win a second), but I’d still be equally happy to see Adams or Blanchett win. Best Director is an impossible choice for me also. The artistry of McQueen and Cuaron is hard to choose between, and both wins would be historic. I think this is the first year in the last couple years where I personally wouldn’t choose anyone to tie. If I HAD to choose one, it would be a tie between Cate Blanchett and Sandra Bullock, but other than that nothing comes to mind. Now this differs greatly from the last couple of years where I think a tie would have been deserved for: If I could only choose one best actor I would go with Matthew McConaughy but I would be happy for Leonardo DiCaprio to win too so both actors would be winning for the best performances they have yet given in their careers. I would not bet money that a tie will happen again for a long time, especially on the preferential voting system. There have only been six in the Oscars history of over 86 years. So, I am not counting on it.
In what may be an unprecedented outage, all of Google’s services briefly went dark about 4:52 on Friday afternoon Pacific time. The outage, which reportedly affected most of Google’s services worldwide, led to a staggering 40% drop in global Internet traffic (pageviews), according to analytics firm GoSquared (via Eric Mack of CNET). The official downtime was between 1 and 5 minutes, according to Google. One observer estimates that even this brief blip might have cost Google $US500,000 in lost revenue. The impact on the rest of the digital economy was likely far greater. In case you needed a reminder how powerful Google has become–and how much of the digital economy depends on it–this would be it. Although this level of dominance is alarming, other companies offer most if not all of the services Google provides. If the company ever had a prolonged outage, Internet activity would likely recover quickly as companies and users switched to other services. That said, the fact that one company touches this much of such a massive and important an industry is unsettling. Single points of failure and control concentrate power in the hands of a few. And they weaken the integrity of the entire system. Follow Business Insider Australia on Facebook and Twitter Business Insider Emails & Alerts Site highlights each day to your inbox. Email Address Join Follow Business Insider Australia on Facebook, Twitter, LinkedIn, and Instagram.
/* * PXA255 clock specific using the System Timer * * RTEMS uses IRQ 26 as Clock Source */ /* * By Yang Xi <hiyangxi@gmail.com> * * The license and distribution terms for this file may be * found in the file LICENSE in this distribution or at * http://www.rtems.org/license/LICENSE. */ #include <rtems.h> #include <rtems/clockdrv.h> #include <rtems/libio.h> #include <stdlib.h> #include <bsp.h> #include <bspopts.h> #include <bsp/irq.h> #include <pxa255.h> #if ON_SKYEYE==1 #define CLOCK_DRIVER_USE_FAST_IDLE 1 #endif static unsigned long period_num; /** * Enables clock interrupt. * * If the interrupt is always on, this can be a NOP. */ static void clock_isr_on(const rtems_irq_connect_data *unused) { /*Clear the interrupt bit */ XSCALE_OS_TIMER_TSR = 0x1; /* enable timer interrupt */ XSCALE_OS_TIMER_IER |= 0x1; #if ON_SKYEYE==1 period_num = (TIMER_RATE* rtems_configuration_get_microseconds_per_tick())/100000; #else period_num = (TIMER_RATE* rtems_configuration_get_microseconds_per_tick())/10000; #endif XSCALE_OS_TIMER_MR0 = XSCALE_OS_TIMER_TCR + period_num; } /** * Disables clock interrupts * * If the interrupt is always on, this can be a NOP. */ static void clock_isr_off(const rtems_irq_connect_data *unused) { /*Clear the interrupt bit */ XSCALE_OS_TIMER_TSR = 0x1; /* disable timer interrupt*/ XSCALE_OS_TIMER_IER &= ~0x1; } /** * Tests to see if clock interrupt is enabled, and returns 1 if so. * If interrupt is not enabled, returns 0. * * If the interrupt is always on, this always returns 1. */ static int clock_isr_is_on(const rtems_irq_connect_data *irq) { /* check timer interrupt */ return XSCALE_OS_TIMER_IER & 0x1; } void Clock_isr(rtems_irq_hdl_param arg); rtems_irq_connect_data clock_isr_data = { .name = XSCALE_IRQ_OS_TIMER, .hdl = Clock_isr, .handle = NULL, .on = clock_isr_on, .off = clock_isr_off, .isOn = clock_isr_is_on, }; #define Clock_driver_support_install_isr( _new ) \ BSP_install_rtems_irq_handler(&clock_isr_data) static void Clock_driver_support_initialize_hardware(void) { period_num = TIMER_RATE* rtems_configuration_get_microseconds_per_tick(); #if ON_SKYEYE==1 period_num /= 100000; #else period_num /= 10000; #endif } #define Clock_driver_support_at_tick() \ do { \ /* read the status to clear the int */ \ XSCALE_OS_TIMER_TSR = 0x1; \ \ /*Add the match register*/ \ XSCALE_OS_TIMER_MR0 = XSCALE_OS_TIMER_TCR + period_num; \ } while (0) #define CLOCK_DRIVER_USE_DUMMY_TIMECOUNTER #include "../../../shared/dev/clock/clockimpl.h"
Ovarian Endometrioma An ovarian endometrioma is a cyst that is attached to the ovaries and that contains tissue similar to the uterine lining (endometrial tissue). Endometriomas (also called endometrial or "chocolate" cysts) typically range in size from 0.4 in. (1 cm) to 4 in. (10.2 cm). By Healthwise Staff Primary Medical Reviewer Sarah Marshall, MD - Family Medicine Specialist Medical Reviewer Kirtly Jones, MD - Obstetrics and Gynecology Current as of March 12, 2014 WebMD Medical Reference from Healthwise Last Updated: March 12, 2014 This information is not intended to replace the advice of a doctor. Healthwise disclaims any liability for the decisions you make based on this information.
I[NTRODUCTION]{.smallcaps} {#sec1-1} ========================== In the era of precision medicine, human biospecimens are an important resource for basic, translational, and clinical research and are increasingly needed to advance our understanding of human physiology, disease, treatment response, and outcomes. The field of biobanking has undergone significant optimization efforts by national and international communities to improve and harmonize biospecimen curation to support this need.\[[@ref1][@ref2]\] However, the operationalization and maintenance of biobanks is resource-intensive and often cost prohibitive for many institutions. In addition, long-term biobanking may be suboptimal for some types of testing, such as for studies that rely on labile analytes.\[[@ref3][@ref4]\] As a result, comprehensive access to human biospecimens remains limited, and there is a persistent need for efficient solutions that can provide access to high quality and recently acquired human biospecimens.\[[@ref5]\] Human biospecimens can always be found in clinical laboratories, but access for the research is complicated by a series of technical, logistic, regulatory, and ethical challenges. Beyond the demands of delivering clinical results, laboratories lack efficient processes for biospecimen identification, human resources for sample acquisition, and procedural infrastructure for biospecimen collection under the provisions of human interventional ethics committees. Despite these challenges, the clinical laboratory is a promising resource for the acquisition of biospecimens, and researchers are beginning to investigate curation methods that can integrate with existing clinical workflows and leverage EHR metadata for biospecimen identification and annotation.\[[@ref6][@ref7]\] One of the first-automated biospecimen identification systems was Crimson; an application used to identify the discarded blood samples accessioned into the clinical laboratory by querying the laboratory information system. Samples, which met predetermined inclusion criteria, were electronically reaccessioned into a deidentified research database that could be accessed by researchers with IRB approval.\[[@ref8]\] While biobanks routinely link health information between specimen and participant postenrollment, such solutions demonstrate how EHR integration and associated metadata can be used for targeted and automated biospecimen selection. However, examples of this framework remain limited, both in the literature and in practice, which typically focus on retrospective specimen identification for long-term biobanking. With increased digitization of healthcare and modern data architectures that allow for real-time analysis of clinical data, biospecimens can be identified as samples that are processed through the clinical laboratory. This approach offers the benefit of increasing access to specimens of interest, including those with labile analytes, while not disrupting routine clinical workflows.\[[@ref4]\] In this report, we present Prism, a new tool built on open-source technology that can efficiently identify and notify the investigators of biospecimen availability in near real time. We describe the pipeline architecture and our experience with two IRB-approved pilot projects within our department (IRB Protocol IDs: Babesia -- 2000023123; Diabetic biomarkers -- 2000022266). M[ETHODS]{.smallcaps} {#sec1-2} ===================== Prism platform architecture {#sec2-1} --------------------------- We implemented a real-time pipeline, called Prism, that consists of three key components: real-time data acquisition, stream processing, and end-user alerting, to support case and specimen identification \[[Figure 1](#F1){ref-type="fig"}\]. Parameterized NiFi processors were used to filter and identify the clinical specimens based on study-specific inclusion criteria extracted from corresponding laboratory result metadata. NiFi is an open-source application designed for stream processing. Specimens that met inclusion criteria were indexed within Elastic search (Elastic NV; Mountain View, CA, United States). Alerting was done through Watcher (Elastic NV; Mountain View, CA, United States) and secure E-mail, with a reporting dashboard built in Kibana (Elastic NV; Mountain View, CA, United States). ![Dataflow diagram for laboratory results in using NiFi and Elasticsearch. (A) Existing laboratory result dataflow. (B) "Prism" specimen identification dataflow. BI: Business Intelligence, HDFS: Hadoop-Distributed File System, HL7: Health-Level 7, JSON: Java Script Object Notation](JPI-11-14-g001){#F1} This framework was deployed within our organization\'sss computational health-care platform, Baikal, which has been previously described \[Supplemental Figure 1\].\[[@ref9]\] The Baikal platform is built on open-source technology and provides a mechanism to manage and analyze high-volume and high-frequency clinical data in real-time, including laboratory results. Throughput assessment {#sec2-2} --------------------- Scalability and computing resource needs for Prism were estimated through the deployment in a standalone workstation environment with a single CPU with 6 cores (Intel Core i7-6850K CPU @ 3.60GHz) and 256 GiB of memory. Apache NiFi was deployed within a Docker (version 19.03.2, build 6a30dfc; Docker, Inc., San Francisco, CA, United States) container under the Ubuntu (Version: 16.04.6 LTS (Xenial); Canonical Ltd; London, UK) operating system. We ran a modified version of the Prism dataflow using file-based record I/O instead of streaming data from a network interface. Data for the assessment were obtained by randomly selecting data from our production Health-Level 7 (HL7) feed that were assembled into three data sets of increasing size. These data sets contained 1 × 10^5^, 1 × 10^6^, and 1 × 10^7^ Java Script Object Notation-transformed HL7 ORU messages, resulting in 0.75 GB, 7.27 GB, and 72.8 GB of data, respectively. Two series of five trials were performed with the 1 × 10^6^ record data set. In the first series, all five trials were run consecutively. In the second series, Docker was restarted between each trial to assess for any possible performance impacts in long-running containers. Throughput was measured using built-in NiFi monitoring tools to assess record count and throughput. R[ESULTS]{.smallcaps} {#sec1-3} ===================== Babesia specimen identification {#sec2-3} ------------------------------- Babesia is a tick-borne hemoprotozoan, which infects human erythrocytes and can be life-threatening for patients who are asplenic, immunocompromised, or elderly. The gold standard for the laboratory diagnosis is microscopic analysis of peripheral blood smear. For research into the automation of digital microscopic analysis using the computer vision, the researcher needed peripheral blood smears, which were identified as containing Babesia. Incoming HL7 messages corresponding to a Babesia result record with a "Positive" result values were flagged and sent to the Prism index in Elasticsearch \[[Figure 2](#F2){ref-type="fig"}\]. Researchers were securely notified of all "Positive" Babesia specimens identified every 4 h. ![Laboratory result monitoring for positive Babesia specimens. Incoming HL7 observations are transformed to denormalized JSON documents and stored to HDFS. Prism dataflow ingests streaming JSON result records and filters "Positive" Babesia results to the "Prism" Specimen Surveillance Index from which secure notifications of positive Babesia results are generated. HDFS: Hadoop-Distributed File System, HL7: Health-Level 7, JSON: Java Script Object Notation](JPI-11-14-g002){#F2} Specimen identification for positive Babesia specimens went live in May 2018. In a collection period of 16 months (June 2018--September 2019), Prism identified 131 unique lavender-top tubes, belonging to 44 unique patients, which were identified as positive for Babesia by manual light microscopy. The collection period for this project was extended beyond the anticipated time requirement as Babesia exhibits a strong seasonal prevalence, and positive specimen rates dropped over the colder months \[[Figure 3](#F3){ref-type="fig"}\]. ![Total number of unique patients and specimens identified for Babesia and A1C-LGT specific use cases within the specified date range. Columns represent count of unique specimens per week. Right Y-axis: HbA1c-LGT, Left Y-axis: Babesia. HbA1c: Hemoglobin A1c, LGT: Light-green top](JPI-11-14-g003){#F3} Diabetic biomarker specimen identification {#sec2-4} ------------------------------------------ The development of type 2 diabetes can be prevented or delayed in prediabetic individuals with lifestyle modifications such as dietary changes or increased physical activity. Accordingly, there is a need to identify the biomarkers to guide preventative interventions.\[[@ref10][@ref11]\] To identify possible biomarkers, a researcher at our institution was interested in obtaining blood specimens from patients with and without diabetes, with borderline cases excluded, as a prelude to a larger prospective biomarker study. The deidentified samples would undergo metabolomic analysis by the liquid chromatography-mass spectrometry to identify the metabolites that were significantly changed between the two groups as candidate biomarkers. Hemoglobin A1C values \< 5.7 and \> 6.5 were used to delineate between diabetic and nondiabetic patients, with additional inclusion criteria of outpatient specimen collection and patient age range 18--70 years. Of note, the preferred collection container for Hgb A1c at our institution is a lavender-top tube, which does not contain gel-separation barriers. In an effort to optimize biomarker recovery, plasma from light-green-top tubes was requested for this study. Accordingly, LGT tubes were flagged when a paired sample with an Hgb A1c within the appropriate range was found within the past 7 days \[[Figure 4](#F4){ref-type="fig"}\]. Researchers were securely notified every morning by the E-mail of all matching LGT specimens present in the Prism index reported within the past 24 h. ![Laboratory result processing diagram for diabetic biomarker monitoring. Incoming HL7 observations are transformed to denormalized Java Script Object Notation documents and stored to HDFS. The Prism dataflow ingests streaming Java Script Object Notation result records and filters hemoglobin A1C results in the "Normal" (\<5.7) and "Diabetic" (\>6.5) cohorts to the "Prism" Specimen Surveillance Index in Elastic. Results from CMP/BMP panels (light-green top specimens) are sent to the Prism index. Secure notifications are sent for A1C specimen IDs with related light-green specimen info. BMP: Basic Metabolic Panel, CMP: Comprehensive Metabolic Panel, HbA1c: Hemoglobin A1c; HDFS: Hadoop-Distributed File System, HL7: Health-Level 7, JSON: Java Script Object Notation](JPI-11-14-g004){#F4} Specimen identification for diabetic biomarker discovery went live in December 2018. In a collection period of 4 months (December 2018 and March 2019), Prism identified 2,861 unique LGT specimens from 2,771 unique patients \[[Figure 3](#F3){ref-type="fig"}\]. Throughput assessment {#sec2-5} --------------------- We assessed the processing throughput to ensure the pipeline could scale to large environments and consistently manage high-volume data. Our institution\'s computational health platform processes approximately 350,000 discrete HL7 ORU messages per day. Accordingly, we evaluated processing time across five trials and observed an average execution time of approximately 8 min for one million records, which represents slightly \<3 days of laboratory result volume. Processing time was observed to be linear over two orders of magnitude in dataset size \[[Figure 5a](#F5){ref-type="fig"}\], and the average total execution time to process one million messages differed by 2% between runs with (494 s) and without (483 s) Docker container restart \[[Figure 5b](#F5){ref-type="fig"}\]. ![(a) Average number of seconds (Left Y-axis) required to process the laboratory JSON result records and average processing rate (kB/sec) across five consecutive trials, without container restart, for JSON record datasets increasing in size by factor of 10. JSON: Java Script Object Notation, kB: Kilobyte. (b) Average number of seconds required to process 10^6^ Java Script Object Notation result records across five consecutive trials, with and without Docker container restart between trials](JPI-11-14-g005){#F5} D[ISCUSSION]{.smallcaps} {#sec1-4} ======================== In this report, we describe a novel data analysis pipeline, called Prism that can be used to improve the efficiency of biospecimen collection. This workflow has been deployed to identify the biospecimens in near real-time for two biomedical research use cases. We demonstrated that this solution is highly scalable to meet the needs of even large academic centers and reference laboratories. We also found, consistent with our prior work, that virtualization of this workflow within a microservices environment does not introduce a performance penalty.\[[@ref12]\] In 2000, it was estimated that 300 million human biospecimens were preserved in the United States, with a projected 7% annual growth rate.\[[@ref13]\] However, researchers continue to report difficulty in obtaining specimens for biomedical research and express underlying concerns in the validity of their results when using specimens subjected to long-term storage conditions.\[[@ref5]\] In addition, while many biospecimens are being stored, a large proportion is expected to remain unused, and there is increasing concern that untargeted collection of biospecimens consumes resources that could be better allocated.\[[@ref14][@ref15][@ref16]\] Accordingly, as institutions seek to expand biomedical research efforts, particularly in the era of personalized medicine, novel approaches for improving access to high-quality human biospecimens should be evaluated. The quality of biomedical research is dependent on the integrity of biospecimens and as with clinical testing, analyte recovery is subject to a significant number of preanalytical considerations.\[[@ref4]\] While biobanking procedures have seen significant optimization in recent years, poor reproducibility of studies that use biospecimens has been thought to be caused, in part, by the variable quality and inadequate documentation of biospecimen metadata.\[[@ref5]\] To this end, biobanks are beginning to emulate testing procedures found in the clinical laboratory to optimize the analyte recovery and test reproducibility.\[[@ref17][@ref18]\] Tools that can identify the samples accessioned to the clinical laboratory, such as Prism, would align with these efforts by identifying the specimens that have been collected and processed under clinical conditions. Despite ongoing adoption of clinical procedures in biospecimen science, the collection and processing of labile analytes remain challenging, and some components may require unique processing protocols.\[[@ref17][@ref19]\] Proteomic and molecular analytes are particularly sensitive to specimen transport delays, matrix effects, and optimal-storage environments.\[[@ref20]\] Accordingly, some components of interest may require sample processing techniques that exist outside routine clinical workflows. In this setting, real-time streaming analytics could also be envisioned to identify patients which match study-specific inclusion criteria to guide targeted subject enrollment and subsequent collection. In addition to specimen identification and collection, annotation with patient metadata remains an important and challenging facet of contemporary biobanking. Large scale biobanks such as the U. K. Biobank rely on a combination of data sources for curating specimen metadata including participant enrollment surveys, physical measures (e.g., blood pressure and spirometry), and linkage to digital health information.\[[@ref21][@ref22]\] Indeed, while the majority of national biobanking resources capture data from both inpatient and outpatient medical records, there is also interest in capturing data that is not stored in the EHR.\[[@ref21][@ref23][@ref24]\] As digital health information continues to expand, health-care systems are increasingly working to develop clinically integrated data-management tools for the centralization of disparate data resources.\[[@ref9]\] Deployment of automated specimen identification tools in these frameworks may facilitate correlation with these data and would align with national efforts to do so. It should be noted that the use cases described in this report were selected based on the immediate needs among researchers in our department. However, similar open-source tools could be similarly envisioned to integrate with anatomic pathology data and the EHR, to automatically phenotype tissue specimens as they are processed in the laboratory. While the majority of data elements in the clinical laboratory are discrete, identifying tissue specimens in the anatomic pathology laboratory may require technologies such as natural language processing (NLP) to process semistructured and unstructured data, such as those commonly found in pathology reports.\[[@ref25]\] While not used for this implementation, custom NiFi-processors would allow the users to develop more complex filters and integrate NLP or machine learning-based technology for free text or nested data structures commonly found in anatomic pathology. Similarly, the platform can also be used to identify the patients who may be eligible to consent and enroll in studies, rather than simply for biospecimen collection. In the era of digital and personalized medicine, novel approaches to increase the efficiency of biospecimen identification will be crucial to accelerate discovery. Modern data architectures as described here can be used to address the fundamental challenges in the procurement of biospecimens in support of biomedical research. Future work will seek to integrate additional data types, including the analysis of unstructured data, to enable more complex case and biospecimen identification. Disclosure {#sec2-6} ---------- Wade Schulz was an investigator for a research agreement, through Yale University, from the Shenzhen Center for Health Information for work to advance intelligent disease prevention and health promotion; collaborates with the National Center for Cardiovascular Diseases in Beijing; is a technical consultant to HugoHealth, a personal health information platform, and co-founder of Refactor Health, an AI-augmented data management platform for healthcare; is a consultant for Interpace Diagnostics Group, a molecular diagnostics company. Financial support and sponsorship {#sec2-7} --------------------------------- Nil. Conflicts of interest {#sec2-8} --------------------- There are no conflicts of interest. ###### System architecture for Baikal. (A) Health-Level 7 messages generated by the laboratory information system and received by clinical integration engine. (B) Health-level 7 messages validated by custom emissary service and mapped to Java Script Object Notation. (C) Java Script Object Notation submitted to Kafka for downstream processing. (D) Custom Python scripts executed in NiFi to parse and denormalize messages. (E) Denormalized data are stored in Hadoop-distributed File System. (F) Java Script Object Notation and quality improvement metrics are stored in Elasticsearch. (G) Watcher runs scheduled queries on Elasticsearch data and generates notifications. (H) Kibana is used for visualizations and dashboards Available FREE in open access from: <http://www.jpathinformatics.org/text.asp?2020/11/1/14/284660>
1. Field of the Invention The present invention relates to high-frequency complex components and mobile communication devices including the same, and more particularly, the present invention relates to a high-frequency complex component obtained by connecting a receiving-side LC parallel resonant-type filter to a surface acoustic wave filter in a cascade arranged and to a mobile communication device including the same. 2. Description of the Related Art In Japan, a PDC (Personal Digital Cellular) method operating in the 800 MHz band or the 1.5 GHz band is presently adopted in mobile communication devices and corresponding frequency bands are reserved for mobile transmission and station transmission. That is, the transmission band and the reception band of mobile devices are reserved, so that simultaneous transmission and reception are performed using one channel for the transmission band and one channel for the reception band. The interval between the operating channel for transmission and the operating channel for reception is controlled so as to be always constant. At this time, most duplexers, which are used for sharing one antenna for transmission and reception, often have a construction, in which a dielectric filter is used, as proposed in Japanese Unexamined Patent Application Publication No. 9-83214. FIG. 8 shows a block diagram of a conventional duplexer disclosed in Japanese Unexamined Patent Application Publication No. 9-83214. A duplexer 50 includes a branch circuit 51, a receiving-side dielectric filter 52 having a dielectric coaxial resonator, a surface acoustic wave filter 53, and a transmitting-side dielectric filter 54 having a dielectric coaxial resonator. The branch circuit 51, the receiving-side dielectric filter 52, and the surface acoustic wave filter 53 are connected between a first terminal 501 and a second terminal 502. The branch circuit 51 and the transmitting-side dielectric filter 54 are connected between the first terminal 501 and a third terminal 503. In such a construction, an antenna ANT is connected to the first terminal 501, the second terminal 502 is connected to a reception circuit Rx, and the third terminal 503 is connected to a transmission circuit Tx. However, according to the conventional duplexer, use of a dielectric filter causes the duplexer to become large and adjustment of the central frequency becomes difficult. As a result, an increase in the size of a mobile communication device and deterioration of the characteristics thereof become problems. This is because the length of the dielectric filter is equal to xcex/4, where xcex is the wavelength of a reception signal or the wavelength of a transmission signal. For example, the length of the filter is 5 cm in the 1.5 GHz band and it is as long as 9.375 cm in the 800 MHz. Although the dielectric element constituting the dielectric filter must be chiseled in order to adjust the central frequency of the dielectric filter, it is very difficult to apply fine adjustment to the dielectric. In order to overcome the problems described above, preferred embodiments of the present invention provide a duplexer which is easy to miniaturize and in which the central frequency is easily adjusted, and also provide a mobile communication device including such a novel duplexer. According to a first preferred embodiment of the present invention, a duplexer preferably includes a branch circuit connected to an antenna and arranged to branch to a receiving side and a transmitting side, a receiving-side LC parallel resonant-type filter connected to the receiving-side of the branch circuit and arranged to cause a reception signal to be passed and a transmission signal to be attenuated, a surface acoustic wave filter connected to the receiving-side LC parallel resonant-type filter defining a subsequent stage of the receiving-side LC parallel resonant type filter and arranged to cause the reception signal to be passed and the area of the high-frequency side of the reception signal to be attenuated, and a transmitting-side LC parallel resonant-type filter connected to the transmitting-side of the branch circuit and arranged to cause the transmission signal to be passed and the reception signal to be attenuated. Use of an LC parallel resonant-type filter enables the duplexer to be easily adapted to the frequency of the reception signal or the frequency of the transmission signal by changing the values of the inductors and the capacitors without changing the sizes or the appearances of the inductors and the capacitors that constitute the LC parallel resonant-type filter. Therefore, miniaturization of the duplexer is facilitated along with the adjustment of the central frequency. The branch circuit may include a balun element. Since a branch circuit preferably includes a balun element, both of a terminal connected to a transmission circuit observed from a terminal connected to a reception circuit and the terminal connected to the reception circuit observed from the terminal connected to the transmission circuit are open in terms of a high frequency. Therefore, since complete isolation is obtained between these terminals, the reception signal is prevented from interfering with the transmission signal side, and vice versa. Consequently, the reliability of the duplexer is improved. A duplexer may further include a multi-layer substrate defined by a laminated body having a plurality of dielectric layers. In the duplexer, the branch circuit, the receiving side LC parallel resonant-type filter, and the transmitting side LC parallel resonant-type filter may be integrated in the multi-layer substrate and the surface acoustic wave filter may be mounted on the multi-layer substrate. A multi-layer substrate is preferably formed by laminating a plurality of dielectric layers, the multi-layer substrate which the branch circuit, a receiving-side LC parallel resonant-type filter, and a transmitting-side LC parallel resonant-type filter are integrated therein and a surface acoustic wave filter is mounted thereon. Accordingly, matching adjustment can be easily performed between the branch circuit and the receiving-side LC parallel resonant-type filter, between the receiving-side LC parallel resonant-type filter and the surface acoustic wave filter, and between the branch circuit and the transmitting side LC parallel resonant-type filter. This eliminates the necessity of matching circuits that perform corresponding matching adjustment. Therefore, the duplexer can be further miniaturized. In addition, loss due to wiring between the branch circuit and the receiving-side LC parallel resonant-type filter, between the receiving-side LC parallel resonant-type filter and the surface acoustic wave filter, and between the branch circuit and the transmitting-side LC parallel resonant-type filter can be minimized. Therefore, the overall loss of the duplexer is greatly minimized. The connection of each of the branch circuit, the receiving-side LC parallel resonant-type filer, the surface acoustic wave filter, and the transmitting-side LC parallel resonant-type filter can be provided and contained within the multi-layer substrate. Therefore, further miniaturization of the duplexer is achieved. According to a second preferred embodiment of the present invention, a mobile communication device includes a duplexer according to the first preferred embodiment of the present invention. Since the duplexer which can be easily miniaturized and which can have easily the central frequency adjusted is included, a miniaturized and high-performance mobile communication device can be obtained. Other features, elements, characteristics and advantages of the present invention will become apparent from the following detailed description of preferred embodiments with reference to the attached drawings.
Introduction {#Sec1} ============ The properties of solids depend on their microstructure, chemical composition, lattice structure, and even size^[@CR1]^. The knowledge of phase transformation^[@CR2]--[@CR4]^ tells us that the misfit stress-free strain of a newly formed phase in a matrix can seriously affect the behavior of phase transformation and microstructure of the material, such as the autocatalytic nucleation of martensitic transformation in bulk^[@CR3]^ and nucleation barrier of phase transformation in nano-sized materials^[@CR4]^. In Li-ion batteries, the microstructures are more complex because of non-conservation of chemical composition and more occurring phase transformations during insertion and extraction of Li-ions^[@CR5],[@CR6]^. Many experiments and theories have proved that the stress-strain field generated by misfit stress-free strain between the lithiated and delithiated regions can significantly influence the evolution of phase morphology in Li-ion batteries^[@CR7]--[@CR12]^. For example, the stress changes the behavior of phase transformation^[@CR7],[@CR8]^ and Li-ion diffusion-rate^[@CR9]^ and induces fracture of electrode^[@CR10]--[@CR12]^. Non-uniform distribution of Li-ion concentration will cause stress-strain field in electrodes of lithium batteries. The stress-strain field is very sensitive to the high-rate of Li-ion exchange^[@CR13],[@CR14]^. The high-rate exchange of Li-ion can generate steep gradients of stresses and strains that ultimately lead to fracture of electrodes and performance degradation of batteries^[@CR13],[@CR14]^. In order to explain the fracture of electrode, Christensen and Newman^[@CR10],[@CR11]^ calculated the stress-strain field in active electrode material of Li-ion cell using a similar model used by Meng *et al*.^[@CR4]^. They predict that fracture of Li~y~Mn~2~O~4~ depends only upon the ratio of the two phases, LiMn~2~O~4~/Li~2~Mn~2~O~4~, as if they do not relate to the size of electrode. Christensen and Newman's conclusion is not consistent with the experimental observations^[@CR15],[@CR16]^. Analysis indicates that Christensen and Newman's calculations have two issues: (1) the model in their calculations only includes two uniform regions (see Fig. [1(a))](#Fig1){ref-type="fig"}^[@CR4],[@CR10],[@CR11]^. In α~1~ and α~2~ region shown in Fig. [1(a)](#Fig1){ref-type="fig"}, the chemical composition is uniform. For real Li-ion electrodes, the distribution of Li-ion concentration is non-uniform with a gradient from surface to center of electrode during lithiation and delithiation. Figure [1(b)](#Fig1){ref-type="fig"} schematically shows the non-uniform distribution. Consequently, the calculated results based on the model shown in Fig. [1(a)](#Fig1){ref-type="fig"} will have its limitation. (2) The evolution of stress-strain field with time was not considered; therefore, the effect of diffusion velocity of Li-ion and size of electrode was not included in Christensen and Newman's calculations.Figure 1A spherical particle consisting of (**a**) two phases of α1 and α2 phase, and (**b**) gradient distribution of concentration. The dished line in (**a**) is the profile of α1 phase before its change. The color bar in (**b**) shows the change of concentration. A number of theoretical models have been developed to obtain a strain field of non-uniform distribution^[@CR17]--[@CR20]^. Johnson^[@CR17]^ uses his model to study the spinodal decomposition for small, isotropic, radially symmetric spherical and mass conservation system. Using similar to Johnson's theory, other researchers^[@CR18]--[@CR20]^ calculated the stresses and strains in Li-ion electrodes. In addition to these analytical calculations^[@CR18]--[@CR20]^, some numerical methods using commercial software package COMSOL^[@CR21]^ and ABAQUS finite element package^[@CR22]^ are used to study Li-ion battery. Comparing these analytical calculations^[@CR18]--[@CR20]^ with some numerical calculated results^[@CR21],[@CR22]^, some discrepancies are found. For example, the stress field is always a monotonic function of radius in analytical calculations, but it is not in numerical methods. In this study, we develop a new analytical method on the stress-strain field of the non-uniform concentration distribution in a symmetrical spherical particle and mass non-conservation system, as shown in Fig. [1(b)](#Fig1){ref-type="fig"}. Although this geometrical constraint is not realized in many experimental systems, the results of the analysis provide insight and guidance for actual material systems. In our method, a general solution is obtained, and some assumptions which should be made in the prior analytical and numerical method, such as elastic modulus non-uniformity, are not necessary using our derivations. Further, we shall apply our model to the strain field in battery electrode during lithiation process and discuss these calculated results. The mathematical model of non-uniformed strain {#Sec2} ============================================== Mathematical model {#Sec3} ------------------ The traditional method of calculating restricted strain from known stress-free strains is Eshelby's inclusion theory^[@CR23],[@CR24]^. This theory assumes that an inclusion with uniform stress-free strains was embedded in an infinite homogeneous body. Using Eshelby's theory for our issue, a two-layered shell-structured spherical particle is first considered, as shown in Fig. [1(a)](#Fig1){ref-type="fig"}. We assume that the inner part *α*~2~ of the particle will have a stress-free volumetric strain *ε*~2~ relative to the outside part *α*~1~ when Li-ions are inserted; and then the radius of the inner part *α*~2~ will change from the original radius *r*~2~ to$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${r}_{2}^{{\alpha }_{2}}=(1+{\varepsilon }_{2}){r}_{2}$$\end{document}$$ According to Eshelby's method^[@CR23],[@CR24]^, for spherical symmetry, we know that the stress field is a function of radius *r* only. Therefore, the equation of displacement equilibrium^[@CR25]^ is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\frac{{\partial }^{2}\omega }{\partial {r}^{2}}+\frac{2}{r}\frac{\partial \omega }{\partial r}-\frac{2\omega }{{r}^{2}}=0$$\end{document}$$where *ω* is the displacement. The general solution of Eq. ([2](#Equ2){ref-type=""}) is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\omega ={C}_{1}r+\frac{{C}_{2}}{{r}^{2}}$$\end{document}$$ The values of *C*~1~ and *C*~2~ can be determined from the boundary conditions. In the inner part *α*~2~, *C*~2~ = 0 because the displacement *ω* should remain finite as *r* → 0. The displacements *ω* in the two parts respectively are$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\omega }^{{\alpha }_{1}}={C}_{1}^{{\alpha }_{1}}r+\frac{{C}_{2}^{{\alpha }_{1}}}{{r}^{2}}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\omega }^{{\alpha }_{2}}={C}^{{\alpha }_{2}}{\varepsilon }_{2}r$$\end{document}$$ From Eq. ([4.2](#Equ5){ref-type=""}), the displacement of the free strain in the *α*~2~ resulting from the constraint of *α*~1~ is $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$({C}^{{\alpha }_{2}}-1){\varepsilon }_{2}$$\end{document}$, and, for this state, the stress in *α*~2~^[@CR26],[@CR27]^ is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=3{K}^{{\alpha }_{2}}({C}^{{\alpha }_{2}}-1){\varepsilon }_{2}$$\end{document}$$ The stress in the *α*~1~ is found to be as follows:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\sigma }_{rr}^{{\alpha }_{1}}=(3{\lambda }^{{\alpha }_{1}}+2{\mu }^{{\alpha }_{1}}){C}_{1}^{{\alpha }_{1}}-\frac{4{\mu }^{{\alpha }_{1}}}{{r}^{3}}{C}_{2}^{{\alpha }_{1}}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\sigma }_{\theta \theta }^{{\alpha }_{1}}={\sigma }_{\varphi \varphi }^{{\alpha }_{1}}=(3{\lambda }^{{\alpha }_{1}}+2{\mu }^{{\alpha }_{1}}){C}_{1}^{{\alpha }_{1}}+\frac{2{\mu }^{{\alpha }_{1}}}{{r}^{3}}{C}_{2}^{{\alpha }_{1}}$$\end{document}$$where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${K}^{{\alpha }_{2}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }^{{\alpha }_{1}}$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mu }^{{\alpha }_{1}}$$\end{document}$ are the bulk modulus of *α*~2~ and the Lamé constant of *α*~1~, respectively. The coefficients $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{2}}$$\end{document}$ are obtained as follows from the boundary conditions. The mechanical balance of forces at the interface^[@CR28]^$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{\boldsymbol{\sigma }}}^{\alpha }\cdot {{\bf{n}}}^{\alpha }+{{\boldsymbol{\sigma }}}^{\beta }\cdot {{\bf{n}}}^{\beta }-\nabla \cdot {\bf{f}}=0$$\end{document}$$where the superscripts *α* and *β* denote, respectively, the two different regions on the opposite sides of an interface, ***σ***^*α*^ and ***σ***^*β*^ are the stress tensors of these two regions, respectively, and **n**^*α*^ and **n**^*β*^ are the exterior normal to the *α* and *β* sides of the interface (**n**^*α*^ = −**n**^*β*^), respectively. **f** is the surface's stress tensor. In the case of spherical symmetry, the components of **f** are **f**~*θθ*~ = **f**~*rr*~^[@CR26]^ and$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\nabla \cdot {\bf{f}}=-\frac{2f{{\bf{n}}}^{\beta }}{{r}_{i}}$$\end{document}$$where *r*~*i*~ is the radius of the spherical interface. The subscripts *i* =  1, 2 correspond, respectively, to the surface of the particle and the interface of *α*~1~/*α*~2~. The equations of mechanical balance of the particle surface and the *α*~1~/*α*~2~ interface are obtained from Eq. ([7](#Equ9){ref-type=""}).$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(3{\lambda }^{{\alpha }_{1}}+2{\mu }^{{\alpha }_{1}}){C}_{1}^{{\alpha }_{1}}-\frac{4{\mu }^{{\alpha }_{1}}}{{r}_{1}^{3}}{C}_{2}^{{\alpha }_{1}}+\frac{2f}{{r}_{1}}=0$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(3{\lambda }^{{\alpha }_{1}}+2{\mu }^{{\alpha }_{1}}){C}_{1}^{{\alpha }_{1}}-\frac{4{\mu }^{{\alpha }_{1}}}{{r}_{2}^{3}}{C}_{2}^{{\alpha }_{1}}=3{K}^{{\alpha }_{2}}({C}^{{\alpha }_{2}}-1){\varepsilon }_{2}$$\end{document}$$ In Eq. ([9.2](#Equ12){ref-type=""}), we ignore the interfacial stress of the *α*~1~/*α*~2~ interface because we assume the changes of chemical compositions or of phase structure between the two sides of an interface are so small that we will transform discrete variables into continuous ones. The equation of the continuity of the normal displacement of the *α*~1~/*α*~2~ interface can be obtained from Eqs ([4](#Equ4){ref-type=""}--[5](#Equ6){ref-type=""}):$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}{r}_{2}+\frac{{C}_{2}^{{\alpha }_{1}}}{{r}_{2}^{2}}={C}^{{\alpha }_{2}}{\varepsilon }_{2}{r}_{2}$$\end{document}$$ Solving Eqs ([9.1](#Equ11){ref-type=""}--[9.3](#Equ13){ref-type=""}), $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{2}}$$\end{document}$, respectively, are$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}=\frac{{D}_{1}{r}_{1}^{3}{\varphi }_{1}^{(31)}-{D}_{2}{r}_{2}^{3}{\varphi }_{2}^{(31)}}{{r}_{1}^{3}{\phi }_{1}^{(3)}-{r}_{2}^{3}{\phi }_{2}^{(3)}}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}={r}_{1}^{3}{r}_{2}^{3}\frac{{D}_{1}{\varphi }_{1}^{(32)}-{D}_{2}{\varphi }_{2}^{(32)}}{{r}_{1}^{3}{\phi }_{1}^{(3)}-{r}_{2}^{3}{\phi }_{2}^{(3)}}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{2}}=\frac{{D}_{1}{r}_{1}^{3}{\varphi }_{1}^{(33)}-{D}_{2}({r}_{1}^{3}{\varphi }_{2}^{(33)}+{r}_{2}^{3}{\varphi }_{3}^{(33)})}{{r}_{1}^{3}{\phi }_{1}^{(3)}-{r}_{2}^{3}{\phi }_{2}^{(3)}}$$\end{document}$$where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${D}_{1}=-2f/{r}_{1}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${D}_{2}=-3{K}^{{\alpha }_{2}}{\varepsilon }_{2}$$\end{document}$, and the expressions for the other parameters, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{k}^{(ij)}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\phi }_{i}^{(3)}$$\end{document}$ (*i*, *j*, and *k* is 1, 2 or 3), are written in Appendix A. This result was found by others^[@CR25],[@CR26]^ if interfacial stress was not considered. The influence of interfacial stress was discussed by Meng *et al*.^[@CR4]^. Based on these results in Eqs ([10.1](#Equ14){ref-type=""}--[10.3](#Equ16){ref-type=""}), the displacement, strain, and stress of the shell-structured particle can be determined. In the above model, the chemical composition or phase structure between the inner and outside regions is a step function, i.e., the change of composition or phase structure is not continuous (shown in Fig. [1(a)](#Fig1){ref-type="fig"}). For a continuous change of chemical composition or phase structure shown in Fig. [1(b)](#Fig1){ref-type="fig"}, such as Li-ion battery, we will develop a new calculated method based on the above model. First, we insert a new core *α*~3~ into the center of the particle, i.e., inside region α~2~. For insertion processing, we use Eshelby's method^[@CR2],[@CR23]^, described as follows:We cut a concentric sphere *α*~3~ centered on the origin, and take the region *α*~3~ out of the parent particle. During this processing, the stress states of other parts of the original particle are kept unchanged.For this case, there exists a stress $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=3{K}^{{\alpha }_{2}}({C}^{{\alpha }_{2}}-1){\varepsilon }_{2}$$\end{document}$ in *α*~3~. If *α*~3~ has a new stress-free transformational strain due to a change of chemical composition or structure, we let the *α*~3~ change in keeping the stress *P* state.Let a surface traction be applied to the cut sphere to restore the shape it had previously. The restoration of the shape of *α*~3~ requires a homogeneous strain *ε*~3~.Let *α*~3~ be reintroduced into the hole left in the parent particle after the *α*~3~ was removed.Weld *α*~3~ back on to the parent particle.Let the system relax by introducing the equilibrium elastic strain into the particle. After the processing described above, the stress in the *α*~1~ still can be expressed by Eq. ([6](#Equ7){ref-type=""}), but the constants $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$ must be re-determined by the new boundary conditions. The radial stress in *α*~2~, based on the superposition principle, can be written as follows:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\sigma }_{rr}^{{\alpha }_{2}}=(3{\lambda }^{{\alpha }_{2}}+2{\mu }^{{\alpha }_{2}}){C}_{1}^{{\alpha }_{2}}-\frac{4{\mu }^{{\alpha }_{2}}}{{r}^{3}}{C}_{2}^{{\alpha }_{2}}+3{K}^{{\alpha }_{2}}({C}^{{\alpha }_{2}}-1){\varepsilon }_{2}$$\end{document}$$where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{2}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{2}}$$\end{document}$ are parameters that must be determined from the new boundary conditions, but $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{2}}$$\end{document}$ has been calculated in Eq.([10.3](#Equ16){ref-type=""}). The stress in *α*~3~ is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=3{K}^{{\alpha }_{3}}({C}^{{\alpha }_{3}}-1)({\varepsilon }_{3}-{\varepsilon }_{2})+3{K}^{{\alpha }_{2}}({C}^{{\alpha }_{2}}-1){\varepsilon }_{2}$$\end{document}$$ The displacements in *α*~2~ and *α*~3~ are$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\omega }^{{\alpha }_{2}}={C}_{1}^{{\alpha }_{2}}r+\frac{{C}_{2}^{{\alpha }_{2}}}{{r}^{2}}+{C}^{{\alpha }_{2}}{\varepsilon }_{2}r$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\omega }^{{\alpha }_{3}}={C}^{{\alpha }_{3}}({\varepsilon }_{3}-{\varepsilon }_{2})r+{C}^{{\alpha }_{2}}{\varepsilon }_{2}r$$\end{document}$$ The boundary conditions used to determine the coefficients $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{2}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{2}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{3}}$$\end{document}$ are$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }_{1}{C}_{1}^{{\alpha }_{1}}-\frac{{\mu }_{1}}{{r}_{1}^{3}}{C}_{2}^{{\alpha }_{1}}={D}_{1}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }_{1}{C}_{1}^{{\alpha }_{1}}-\frac{{\mu }_{1}}{{r}_{2}^{3}}{C}_{2}^{{\alpha }_{1}}-{\lambda }_{2}{C}_{1}^{{\alpha }_{2}}+\frac{{\mu }_{2}}{{r}_{2}^{3}}{C}_{2}^{{\alpha }_{2}}=3{K}^{{\alpha }_{2}}({C}^{{\alpha }_{2}}-1){\varepsilon }_{2}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }_{2}{C}_{1}^{{\alpha }_{2}}-\frac{{\mu }_{2}}{{r}_{3}^{3}}{C}_{2}^{{\alpha }_{2}}=3{K}^{{\alpha }_{3}}({C}^{{\alpha }_{3}}-1)({\varepsilon }_{3}-{\varepsilon }_{2})$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}{r}_{2}+\frac{{C}_{2}^{{\alpha }_{1}}}{{r}_{2}^{2}}-{C}_{1}^{{\alpha }_{2}}{r}_{2}-\frac{{C}_{2}^{{\alpha }_{2}}}{{r}_{2}^{2}}={C}^{{\alpha }_{2}}{\varepsilon }_{2}{r}_{2}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${r}_{3}{C}_{1}^{{\alpha }_{2}}+\frac{{C}_{2}^{{\alpha }_{2}}}{{r}_{3}^{2}}={C}^{{\alpha }_{3}}({\varepsilon }_{3}-{\varepsilon }_{2}){r}_{3}$$\end{document}$$ To simplify this expression, we use $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }_{1}=3{\lambda }^{{\alpha }_{1}}+2{\mu }^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mu }_{1}=4{\mu }^{{\alpha }_{1}}$$\end{document}$, and so on. If we let *ε*~3~ = *ε*~2~, then Eqs ([14.3](#Equ23){ref-type=""}) and ([14.5](#Equ25){ref-type=""}) become$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }_{2}{C}_{1}^{{\alpha }_{2}}-\frac{{\mu }_{2}}{{r}_{3}^{3}}{C}_{2}^{{\alpha }_{2}}=0$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${r}_{3}{C}_{1}^{{\alpha }_{2}}+\frac{{C}_{2}^{{\alpha }_{2}}}{{r}_{3}^{2}}=0$$\end{document}$$ Generally, *λ*~2~ + *μ*~2~ ≠ 0 because *λ*~2~ and *μ*~2~ always are positive, so $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{2}}={C}_{2}^{{\alpha }_{2}}=0$$\end{document}$. Eqs ([14.1](#Equ21){ref-type=""})--([14.5](#Equ25){ref-type=""}) naturally turn into Eq. ([9.1](#Equ11){ref-type=""})--([9.3](#Equ13){ref-type=""}). It can prove the correction of Eqs ([14.1](#Equ21){ref-type=""})--([14.5](#Equ25){ref-type=""}). Because $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{2}}$$\end{document}$ has been obtained from Eq. ([10.3](#Equ16){ref-type=""}), $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{2}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{2}}$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{3}}$$\end{document}$ are obtained from solving Eqs ([14.1](#Equ21){ref-type=""})--([14.5](#Equ25){ref-type=""}). Repeatedly, inserting a new core into the center of particle as before, and then setting up a new system of equations that are like Eqs ([14.1](#Equ21){ref-type=""})--([14.5](#Equ25){ref-type=""}). In principle, we can use this method to obtain the strain field of the multilayered shell structure. However, the number of equations in these systems will increase with increasing numbers of layers in the shell structure of the particles, and solving these equations will become more laborious and complicated. Therefore, some simplifications will be made in this paper. First, we will assume that the elastic moduli of the particles are constants, i.e., independent of the position coordinates. Eshelby also used this hypothesis in his well-known papers^[@CR23]^ because the hypothesis can greatly simplify the theoretical derivations. We shall see that our method also can be used for a condition of inhomogeneous elastic moduli provided that the elastic moduli are functions of the position coordinates. After using the hypothesis of homogeneous elastic moduli, a general system of equations can be written as follows:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\lambda {C}_{1}^{{\alpha }_{1}}-\frac{\mu }{{r}_{1}^{3}}{C}_{2}^{{\alpha }_{1}}={D}_{1}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{array}{rrr}\lambda {C}_{1}^{{\alpha }_{1}}-\frac{\mu }{{r}_{2}^{3}}{C}_{2}^{{\alpha }_{1}}-\lambda {C}_{1}^{{\alpha }_{2}}+\frac{\mu }{{r}_{2}^{3}}{C}_{2}^{{\alpha }_{2}} & = & 3K({C}^{{\alpha }_{2}}-1)({\varepsilon }_{2}-{\varepsilon }_{1})\\ & \vdots & \end{array}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\lambda {C}_{1}^{{\alpha }_{n-1}}-\frac{\mu }{{r}_{n}^{3}}{C}_{2}^{{\alpha }_{n-1}}-\lambda {C}_{1}^{{\alpha }_{n}}+\frac{\mu }{{r}_{n}^{3}}{C}_{2}^{{\alpha }_{n}}=3K({C}^{{\alpha }_{n}}-1)({\varepsilon }_{n}-{\varepsilon }_{n-1})$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\lambda {C}_{1}^{{\alpha }_{s-1}}-\frac{\mu }{{r}_{s}^{3}}{C}_{2}^{{\alpha }_{s-1}}=3K({C}^{{\alpha }_{s}}-1)({\varepsilon }_{s}-{\varepsilon }_{s-1})$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{array}{rrr}{C}_{1}^{{\alpha }_{1}}{r}_{2}+\frac{{C}_{2}^{{\alpha }_{1}}}{{r}_{2}^{2}}-{C}_{1}^{{\alpha }_{2}}{r}_{2}-\frac{{C}_{2}^{{\alpha }_{2}}}{{r}_{2}^{2}} & = & {C}^{{\alpha }_{2}}({\varepsilon }_{2}-{\varepsilon }_{1}){r}_{2}\\ & \vdots & \end{array}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{array}{rrr}{C}_{1}^{{\alpha }_{n-1}}{r}_{n}+\frac{{C}_{2}^{{\alpha }_{n-1}}}{{r}_{n}^{2}}-{C}_{1}^{{\alpha }_{n}}{r}_{n}-\frac{{C}_{2}^{{\alpha }_{n}}}{{r}_{n}^{2}} & = & {C}^{{\alpha }_{n}}({\varepsilon }_{n}-{\varepsilon }_{n-1}){r}_{n}\\ & \vdots & \end{array}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{s-1}}{r}_{s}+\frac{{C}_{2}^{{\alpha }_{s-1}}}{{r}_{s}^{2}}={C}^{{\alpha }_{s}}({\varepsilon }_{s}-{\varepsilon }_{s-1}){r}_{s}$$\end{document}$$wherein subscript *s* is the innermost layer. In Eqs ([16.2](#Equ29){ref-type=""}) and ([16.2s-1](#Equ34){ref-type=""}), we bring in *ε*~1~ that is the stress-free strain of the outermost layer. Usually, we assume *ε*~1~ = 0 because we choose the outermost layer as the reference state. The 2*s*−1 unknown variables, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$, ...... $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{s-1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{s-1}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{s}}$$\end{document}$ must be determined from Eqs ([16.1](#Equ28){ref-type=""})--([16.2s-1](#Equ34){ref-type=""}); the other variables, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{n}}$$\end{document}$ (*n* \< *s*), have be obtained from the previous system of equations. We note that the system of equations Eqs ([16.1](#Equ28){ref-type=""})--([16.2s-1](#Equ34){ref-type=""}) can also extend to a particle embedded in an infinite matrix. At this case, Eq. ([16.1](#Equ28){ref-type=""}) will be rewritten as$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\lambda {C}_{1}^{{\alpha }_{1}}-\frac{\mu }{{r}_{1}^{3}}{C}_{2}^{{\alpha }_{1}}+\frac{\mu }{{r}_{1}^{3}}{C}^{M}={D}_{1}$$\end{document}$$and then we need to add a new equation$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}{r}_{1}+\frac{{C}_{2}^{{\alpha }_{1}}}{{r}_{1}^{2}}-\frac{{C}^{M}}{{r}_{1}^{2}}=0$$\end{document}$$ *C*^*M*^ is another variable that will be determined. In this paper, we will not discuss the case of the particle embedded in an infinite matrix. We now deduce a general formula for these coefficients above when the discrete layers of the multilayer shell structure are transformed into a continuously changing layer structure. Firstly, we solve the coefficients of the first several layers of structures according to our previous discussion. For example, the coefficients, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{2}}$$\end{document}$, of two-layer structure are obtained which we have shown in Eqs ([10.1](#Equ14){ref-type=""})--([10.3](#Equ16){ref-type=""}); then substituting $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{2}}$$\end{document}$ into Eqs ([14.2](#Equ22){ref-type=""}) and ([14.4](#Equ24){ref-type=""}), and solving the system of Eqs ([14.1](#Equ21){ref-type=""})--([14.5](#Equ25){ref-type=""}), $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{2}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{2}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{3}}$$\end{document}$ are obtained. Repeating this process will give the coefficients of the first several layers of structures. From these coefficients, we will find a general rule to determine the coefficients, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{n}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{n}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{n}}$$\end{document}$ of an arbitrary layer. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{n}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{n}}$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{n}}$$\end{document}$ are the functions of the radius of every layer, in addition their elastic constants. We can substitute *r*~1~ = *r*, *r*~2~ = *r* − Δ*r*, *r*~3~ = *r* − 2Δ*r* ...... and *r*~*s*~ = *r* − (*s* − 1)Δ*r* into $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{1}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{1}}$$\end{document}$, *r*~1~ = *r* + Δ*r*, *r*~2~ = *r* and *r*~3~ = *r* − Δ*r* ...... and *r*~*s*~ = *r* − (*s* − 2)Δ*r* into $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{2}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{2}}$$\end{document}$, ......, finally *r*~1~ = *r* + (*s* − 1)Δ*r*, *r*~2~ = *r* + (*s* − 2)Δ*r*, ...... and *r*~*s*~ = *r* into $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{s}}$$\end{document}$. The coefficients $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{n}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{n}}$$\end{document}$ of the *nth* layer, and the $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{s}}$$\end{document}$ of the innermost layer are found in this manner. If we use the nomenclature Δ*ε*~*n*~ = *ε*~*n*~ − *ε*~*n* − 1~, and keep terms linear in Δ*r*, we have the following:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{n}}=\frac{(\mu +3K){D}_{1}+3K\mu \sum _{i=2}^{s}{\rm{\Delta }}{\varepsilon }_{i}+9{K}^{2}\sum _{i=2}^{n}{\rm{\Delta }}{\varepsilon }_{i}-3K(\mu +3K)\sum _{i=2}^{n}{C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}+{\theta }_{1}^{{\alpha }_{n}}{\rm{\Delta }}r}{(\lambda +\mu )(3K+{\eta }^{{\alpha }_{2}}{\rm{\Delta }}r)}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{n}}={r}_{n}^{3}\frac{(\lambda -3K){D}_{1}+3K\lambda \sum _{i=2}^{s}{\rm{\Delta }}{\varepsilon }_{i}-9{K}^{2}\sum _{i=2}^{n}{\rm{\Delta }}{\varepsilon }_{i}-3K(\lambda -3K)\sum _{i=2}^{n}{C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}+{\theta }_{2}^{{\alpha }_{n}}{\rm{\Delta }}r}{(\lambda +\mu )(3K+{\eta }^{{\alpha }_{2}}{\rm{\Delta }}r)}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{s}}=\frac{{D}_{1}(1+\frac{3(s-1){\rm{\Delta }}r}{{r}_{s}})+3K\sum _{i=2}^{s}{\rm{\Delta }}{\varepsilon }_{i}-3K\sum _{i=2}^{s}{C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}+{\theta }^{{\alpha }_{s}}{\rm{\Delta }}r}{3K{\rm{\Delta }}{\varepsilon }_{s}+\frac{3\lambda (s-1){\rm{\Delta }}r}{(\lambda +\mu ){r}_{s}}(\mu +3K){\rm{\Delta }}{\varepsilon }_{s}}$$\end{document}$$where,$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\eta }^{{\alpha }_{n}}=\frac{3}{(\lambda +\mu )r}[(n-1)(\mu +3K)\lambda +(s-n)(\lambda -3K)\mu ]$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{array}{rl}{\theta }_{1}^{{\alpha }_{n}}\,= & \frac{3\mu (\mu +3K)(3K-\lambda )}{(\lambda +\mu )r}[\sum _{i=2}^{n-1}(n-i){C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}+\sum _{i=n+1}^{s-1}(s-i){C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}]\\ & +\frac{9K\mu (\mu +3K)}{(\lambda +\mu )r}[\sum _{i=2}^{n-1}(n-i){\rm{\Delta }}{\varepsilon }_{i}+\sum _{i=n+1}^{s-1}(i-n){\rm{\Delta }}{\varepsilon }_{i}]\\ & +\frac{3}{(\lambda +\mu )r}\{3K\mu (\lambda -3K)(s-n)\sum _{i=n+1}^{s-1}{\rm{\Delta }}{\varepsilon }_{i}\\ & -(\mu +3K)(n-1)[3K\lambda \sum _{i=2}^{n}{\rm{\Delta }}{\varepsilon }_{i}-\lambda (\mu +3K)\sum _{i=2}^{n}{C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}]\}\\ & +\frac{3}{r}[(n-1)(\mu +3K){D}_{1}+3K\mu (s-n){\rm{\Delta }}{\varepsilon }_{s}]\end{array}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{array}{rl}{\theta }_{2}^{{\alpha }_{n}}\,= & \frac{3\lambda (3K-\lambda )(3K+\mu )}{(\lambda +\mu )r}[(s-2n+1)\sum _{i=2}^{n}{C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}+\sum _{i=n+1}^{s-1}(s-i){C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}]\\ & -\frac{9K(3K-\lambda )}{(\lambda +\mu )r}[\lambda (s-2n+1)\sum _{i=2}^{s-1}{\rm{\Delta }}{\varepsilon }_{i}+\mu \sum _{i=2}^{n}(s-2n+i){\rm{\Delta }}{\varepsilon }_{i}]\\ & +\frac{3}{(\lambda +\mu )r}[\mu {(\lambda -3K)}^{2}\sum _{i=2}^{n}(s-2n+i){C}^{{\alpha }_{i}}{\rm{\Delta }}{\varepsilon }_{i}+3K\lambda (\mu +3K)\sum _{i=n+1}^{s-1}(i-2n+1){\rm{\Delta }}{\varepsilon }_{i}]\\ & -\frac{3(s-2n+1)}{r}[(3K-\lambda ){D}_{1}-3K\lambda {\varepsilon }_{s}]\end{array}$$\end{document}$$and,$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\theta }^{{\alpha }_{s}}=\frac{3}{(\lambda +\mu ){r}_{s}}[\mu (\lambda -3K)\sum _{i=2}^{s-1}(s-i){C}^{{\alpha }_{i}}\Delta {\varepsilon }_{i}-\lambda (\mu +3K)(s-1)\sum _{i=2}^{s-1}{C}^{{\alpha }_{i}}\Delta {\varepsilon }_{i}]+\frac{9K}{(\lambda +\mu ){r}_{s}}[\lambda (s-1)\sum _{i=2}^{s}\Delta {\varepsilon }_{i}-\mu \sum _{i=2}^{s-1}(s-i)\Delta {\varepsilon }_{i}]$$\end{document}$$ Eq. ([18.3](#Equ39){ref-type=""}) is the equation describing $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{i}}$$\end{document}$. When Δ*r* → 0, and *s* → ∞, we have *s*Δ*r* = *r*~1~ − *r*~*s*~, and *i*Δ*r* = *r*~1~ − *r*~*i*~, where *r*~*s*~ is the radius of innermost layer, and *r*~*i*~ is the radius of the arbitrary *i*th layer. If the stress-free strain is a function of the radius, Δ*ε*~*n*~ = *ε*~*n*~ − *ε*~*n* − 1~ can be written as Δ*ε*~*n*~ = *ε*′(*r*~*n*~)Δ*r*. Then, *ε*′(*r*~*n*~) is the derivative of the stress-free strain. Eq. ([18.3](#Equ39){ref-type=""}) may be written as an integral equation:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${D}_{1}(3{r}_{1}-2{r}_{s})=3K{\int }_{{r}_{1}}^{{r}_{s}}[{r}_{s}+\frac{3\lambda ({r}_{1}-{r}_{s})+3\mu (r-{r}_{s})}{\lambda +\mu }][C(r)-1]\varepsilon \text{'}(r)dr+\frac{3\lambda \mu }{\lambda +\mu }{\int }_{{r}_{1}}^{{r}_{s}}({r}_{1}-r)C(r)\varepsilon \text{'}(r)dr$$\end{document}$$ In Eq. ([20](#Equ44){ref-type=""}) and the following one, we transform the discrete variables, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{i}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{n}}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{n}}$$\end{document}$, into the continuous variables *C*, *C*~1~, and *C*~2~ respectively. Eq. ([20](#Equ44){ref-type=""}) is a Volterra integral equation. We can transfer the Volterra integral equation into an ordinary differential equation^[@CR29]^,$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$({A}_{1}x+{A}_{2}{r}_{1})\frac{d\phi }{dx}+{A}_{3}\phi +{A}_{4}\varepsilon ^{\prime} (x)+({A}_{5}x-{A}_{6})\varepsilon ^{\prime\prime} (x)=0$$\end{document}$$with boundary condition$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\phi ({r}_{1})=\varepsilon ^{\prime} ({r}_{1})-\frac{2{D}_{1}}{3K{r}_{1}}$$\end{document}$$where *φ* = *Cε*′(*x*), and *A*~*i*~ (*i* =  1, 2, ... 6) are constants related to elastic constants, and are written explicitly in appendix B. Eq. ([21.1](#Equ45){ref-type=""}) can be solved with boundary condition if *ε*′(*x*) and *ε*′′;(*x*) are known. Substituting the solution of Eq. ([21.1](#Equ45){ref-type=""}) into Eqs ([18.1](#Equ37){ref-type=""}), ([18.2](#Equ38){ref-type=""}), ([19.2](#Equ41){ref-type=""}), and ([19.3](#Equ42){ref-type=""}), *C*~1~ and *C*~2~ can be obtained.$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}=\frac{(\mu +3K)[3{r}_{1}-2r]{D}_{1}+3Kr\{\mu [\varepsilon ({r}_{s})-\varepsilon ({r}_{1})]+3K[\varepsilon (r)-\varepsilon ({r}_{1})]-(\mu +3K){\int }_{{r}_{1}}^{r}\varphi (x)dx\}+{{\rm{\Theta }}}_{1}(r)}{3Kr(\lambda +\mu )+3[\lambda (\mu +3K)({r}_{1}-r)+\mu (\lambda -3K)(r-{r}_{s})]}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}={r}^{3}\frac{(\lambda -3K)[3{r}_{1}-2r]{D}_{1}+3Kr\{\lambda [\varepsilon ({r}_{s})-\varepsilon ({r}_{1})]-3K[\varepsilon (r)-\varepsilon ({r}_{1})]-(\lambda -3K){\int }_{{r}_{1}}^{r}\varphi (x)dx\}+{{\rm{\Theta }}}_{2}(r)}{3Kr(\lambda +\mu )+3[\lambda (\mu +3K)({r}_{1}-r)+\mu (\lambda -3K)(r-{r}_{s})]}$$\end{document}$$ where the function Θ~1~(*r*) and Θ~2~(*r*) are defined as follows:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{array}{ccl}{{\rm{\Theta }}}_{1}(r) & = & \frac{3\mu (\mu +3K)(3K-\lambda )}{\lambda +\mu }[{\int }_{{r}_{1}}^{r}(x-r)\phi (x)dx+{\int }_{r}^{{r}_{s}}(x-{r}_{s})\phi (x)dx]\\ & & +\frac{9K\mu (\mu +3K)}{\lambda +\mu }[{\int }_{{r}_{1}}^{r}(x-r)\varepsilon \text{'}(x)dx+{\int }_{r}^{{r}_{s}}(r-x)\varepsilon \text{'}(x)dx]\\ & & +\frac{9K\mu (\lambda -3K)}{\lambda +\mu }(r-{r}_{s})[\varepsilon ({r}_{s})-\varepsilon (r)]\\ & & -\frac{3({r}_{1}-r)(\mu +3K)}{\lambda +\mu }\{[3K\lambda [\varepsilon (r)-\varepsilon ({r}_{1})]-\lambda (\mu +3K){\int }_{{r}_{1}}^{r}\phi dx]\}\end{array}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{\rm{\Theta }}}_{2}(r)=\frac{3\lambda (3K-\lambda )(3K+\mu )}{\lambda +\mu }[(2r-{r}_{1}-{r}_{s}){\int }_{{r}_{1}}^{r}\phi (x)dx+{\int }_{r}^{{r}_{s}}(x-{r}_{1})\phi (x)dx]-\frac{9K(3K-\lambda )}{\lambda +\mu }[\lambda (2r-{r}_{1}-{r}_{s})[\varepsilon ({r}_{s})-\varepsilon ({r}_{1})]+\mu {\int }_{{r}_{1}}^{r}(2r-{r}_{s}-x)\varepsilon ^{\prime} (x)dx]+\frac{3(\mu +3K)}{\lambda +\mu }[\mu (\lambda -3K){\int }_{{r}_{1}}^{r}(2r-{r}_{s}-x)\phi (x)dx+3K\lambda {\int }_{r}^{{r}_{s}}(2r-x-{r}_{1})\varepsilon ^{\prime} (x)dx]$$\end{document}$$ When *C*, *C*~1~, and *C*~2~ are obtained, the restricted strains are$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varepsilon }_{rr}={C}_{1}-\frac{2{C}_{2}}{{r}^{3}}+{\int }_{{r}_{1}}^{r}C(x)\varepsilon ^{\prime} (x)dx$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varepsilon }_{\theta \theta }={\varepsilon }_{\phi \phi }={C}_{1}+\frac{{C}_{2}}{{r}^{3}}+{\int }_{{r}_{1}}^{r}C(x)\varepsilon ^{\prime} (x)dx$$\end{document}$$for *r*~1~ ≥ *r* \> *r*~*s*~; and,$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varepsilon }_{rr}={\varepsilon }_{\theta \theta }={\varepsilon }_{\phi \phi }={\int }_{{r}_{1}}^{{r}_{s}}C(x)\varepsilon ^{\prime} (x)dx$$\end{document}$$for *r* \< *r*~*s*~, and they are constants. Two simple examples {#Sec4} ------------------- As applications of mathematical model in section Mathematical model, we will give two simple examples to check our derivation and explain our calculated process in this section. ### Example 1: {#FPar1} *ε*(*r*) is a constant. In this case, the system becomes a two-layered shell-structure. The radius of innermost layer *r*~*s*~ = *r*~2~. *ε*(*r*) is written as$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon (r)=\{\begin{array}{ll}\varepsilon & {r}_{s} < r < {r}_{1}\\ 0 & r < {r}_{s}\end{array}$$\end{document}$$ and the derivative of *ε*(*r*) is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon ^{\prime} (r)=\varepsilon \delta (r-{r}_{s})$$\end{document}$$where *δ*(*r* − *r*~*s*~) is Dirac delta function. Substituting Eq. ([26](#Equ55){ref-type=""}) into Eqs ([18](#Equ37){ref-type=""})--([20](#Equ44){ref-type=""}), we have$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$C({r}_{s})=\frac{{D}_{1}(3{r}_{1}-2{r}_{s})+3K\varepsilon [{r}_{s}+\frac{3\lambda }{\lambda +\mu }({r}_{1}-{r}_{s})]}{3\varepsilon [K({r}_{s}+\frac{3\lambda }{\lambda +\mu }({r}_{1}-{r}_{s}))+\frac{\lambda \mu }{\lambda +\mu }({r}_{1}-{r}_{s})]}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}({r}_{1})=\frac{{D}_{1}(\mu +3K)+3K\mu \varepsilon (1-3\frac{{r}_{1}-{r}_{s}}{{r}_{1}})}{3(\lambda +\mu )[K+\frac{{r}_{1}-{r}_{s}}{{r}_{1}}\frac{\mu (\lambda -3K)}{\lambda +\mu }]}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}({r}_{1})={r}_{1}^{3}\frac{[{D}_{1}(\lambda -3K)+3K\lambda \varepsilon ](1-3\frac{{r}_{1}-{r}_{s}}{{r}_{1}})}{3(\lambda +\mu )[K+\frac{{r}_{1}-{r}_{s}}{{r}_{1}}\frac{\mu (\lambda -3K)}{\lambda +\mu }]}$$\end{document}$$ Eqs ([27.1](#Equ56){ref-type=""})--([27.3](#Equ58){ref-type=""}) are the same as Eqs ([10.1](#Equ14){ref-type=""})\~([10.3](#Equ16){ref-type=""}) if Δ*r* = *r*~1~ − *r*~*s*~ is a small quantity compared with *r*~1~, and only the linear terms of Δ*r* are kept. The results verify the correction of mathematical derivations in section Mathematical model. ### Example 2: {#FPar2} $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon (r)$$\end{document}$ is a linear function of radius $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r$$\end{document}$. In this case, we assume $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon (r)$$\end{document}$ as$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon (r)=\{\begin{array}{c}0\\ -\frac{{\varepsilon }_{0}r}{{r}_{1}-{r}_{0}}+\frac{{\varepsilon }_{0}{r}_{1}}{{r}_{1}-{r}_{0}}\\ {\varepsilon }_{0}\end{array}\quad \begin{array}{c}r={r}_{1}\\ {r}_{0} < r < {r}_{1}\\ r < {r}_{1}\end{array}$$\end{document}$$where *ε*~0~ is the stress-free strain at *r* ≤ *r*~0~. The slope of the stress-free strain is a constant, i.e.$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon ^{\prime} =-\frac{{\varepsilon }_{0}}{{r}_{1}-{r}_{0}}$$\end{document}$, and *ε*″(*r*) = 0. Eq. ([21](#Equ45){ref-type=""}) be solved as$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$C(r)=-\frac{{A}_{4}}{{A}_{3}}+[\frac{{A}_{4}}{{A}_{3}}+\frac{\phi ({r}_{1})}{\varepsilon^ {\prime}}]{[\frac{{A}_{1}r+{A}_{2}{r}_{1}}{({A}_{1}+{A}_{2}){r}_{1}}]}^{-\frac{{A}_{3}}{{A}_{1}}}$$\end{document}$$ Substituting *C* into Eq. ([22.1](#Equ47){ref-type=""}) and ([22.2](#Equ48){ref-type=""}), the other two parameters, *C*~1~, and *C*~2~, can be obtained. We do not write them here because their calculations are simple, but their expression is unduly long. Before beginning the numerical calculation using our model, we will give some discussions about coefficient *C*. First, we consider a case which surface tension be ignored. In this case, *C* is independent of the stress-free strain. This result implies that the displacement and pressure in the innermost shell only are linear functions of the radius. Usually, the surface tension *f* of solids is about $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \sim 1N/m$$\end{document}$^[@CR30]^. At the nanoscale, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$-{D}_{1}=2f/{r}_{1}$$\end{document}$ becomes comparable to *K*Δ*ε*^[@CR4]^. The surface tension can occasions an extra compression strain that will neutralize a part of the tensile strain. For phase transformation with volume expansion, the nucleation barrier of phase transformation in nano-sized crystals increases due to the actions of interfacial tension^[@CR4]^. At here, the restricted strain will be modified by the interfacial tension in nanoscale materials. Figure [2](#Fig2){ref-type="fig"} shows some calculated results of the variation of *C*, *C*~1~, and *C*~2~ with the stress-free strain in Eq. ([28](#Equ59){ref-type=""}). The dashed- and solid-black-lines in Fig. [2(a)](#Fig2){ref-type="fig"} are merged into one line because *C* is independent on stress-free strain. From Fig. [2](#Fig2){ref-type="fig"}, we see these coefficients exhibit large changes near the particle's surface. Figure [3](#Fig3){ref-type="fig"} displays the variation of the restricted strains with radius using the *C*, *C*~1~, and *C*~2~ shown in Fig. [2](#Fig2){ref-type="fig"}. The difference of the change between *ε*~*rr*~ and *ε*~*θθ*~, *ε*~*φφ*~ will distort the lattice, such as from a cubic- to a tetragonal-shape. Our calculated results indicate that the strains are not monotonous function with radius. These results are consistence with the numerical calculations^[@CR21],[@CR22]^. These calculated examples also tell us that the sign of the restricted strains may differ from the stress-free strains. For example, the restricted strain may be a compressive strain, although the stress-free strain is a tensile one in the area. Usually, some researchers estimate the change of chemical composition based on the located strain from observation of transmission electron microscopy. Our results indicate that this method will cause confusion.Figure 2Calculated results for *C* (**a**), *C*~1~ (**b**), and *C*~2~ (**c**). The solid- and dashed-lines correspond respectively to *ε*~0~ = 0.05 and −0.05 in Eq. ([28](#Equ59){ref-type=""}). The black lines represent *D*~1~ = 0, the red lines are for *D*~1~ = −0.01. Values of other required parameters are *K* = 1, *λ* = 1, *μ* = 1, *r*~1~ = 5, *r*~0~ = 2.Figure 3The restricted strains, using the results of Fig. ([2](#Fig2){ref-type="fig"}). (**a**) Radial strain *ε*~*rr*~; (**b**) axial strain *ε*~*θθ*~ and *ε*~*φφ*~. The solid- and dashed-lines correspond *ε*~0~ = 0.05 and −0.05 respectively. The black lines are for *D*~1~ = 0, red lines for *D*~1~ = −0.01. The values of the other required parameters are same as in Fig. [2](#Fig2){ref-type="fig"}. Here, we should emphasize that Eq. ([28](#Equ59){ref-type=""}) is only an artificial stress-free strain. An actual stress-free strain originated the non-uniform of chemical components or other variables of the system must lead to a minimum energy. For Li-ion battery, the Butler-Volmer equation determines the insertion of Li-ion at electrolyte/electrode interface and Cahn-Hilliard equation controls the diffusion of Li-ion in electrode^[@CR8],[@CR31]--[@CR33]^. In section Applications to Li-ion battery, we will calculate the evolution of strain-field during lithiation processing using phase field model and our strain-field theory, and discuss our calculated results. Inhomogeneous elastic moduli {#Sec5} ---------------------------- Although we discussed only the case for homogeneous elastic moduli in section Mathematical model, our method can be extended easily to the inhomogeneous case. For non-uniform elastic moduli, we can write, such as ...$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }^{{\alpha }_{n-2}}={\lambda }^{{\alpha }_{n}}+2\frac{d{\lambda }^{{\alpha }_{n}}}{dr}{\rm{\Delta }}r$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }^{{\alpha }_{n-1}}={\lambda }^{{\alpha }_{n}}+\frac{d{\lambda }^{{\alpha }_{n}}}{dr}{\rm{\Delta }}r$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }^{{\alpha }_{n}}={\lambda }^{{\alpha }_{n}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }^{{\alpha }_{n+1}}={\lambda }^{{\alpha }_{n}}-\frac{d{\lambda }^{{\alpha }_{n}}}{dr}{\rm{\Delta }}r$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }^{{\alpha }_{n+2}}={\lambda }^{{\alpha }_{n}}-2\frac{d{\lambda }^{{\alpha }_{n}}}{dr}{\rm{\Delta }}r$$\end{document}$, in the expressions for $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}^{{\alpha }_{n}}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}^{{\alpha }_{n}}$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{2}^{{\alpha }_{n}}$$\end{document}$, and then, using the same process as described in section the mathematical model of non-uniformed strain, the sums or integrals of elastic moduli and derivatives of elastic moduli can be included in Eqs. ([18.1](#Equ37){ref-type=""}--[18.3](#Equ39){ref-type=""}). The rest of the process will be exactly the same as detailed in Section Mathematical model. Applications to Li-ion battery {#Sec6} ============================== The evolution of Li-ion concentration (*c*) inside the electrode can be determined from Cahn-Hilliard equation^[@CR7],[@CR8],[@CR33]^:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\frac{\partial c}{\partial t}=\nabla Mc\nabla ({\rm{\Delta }}\mu )$$\end{document}$$and$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\rm{\Delta }}\mu =\frac{\partial f}{\partial c}-\kappa {\nabla }^{2}c$$\end{document}$$where *M* is the mobility tensor (here taken to be isotropic and constant) and the internal chemical potential Δ*μ* derives from the homogeneous concentration dependent free energy *f* and the Cahn-Hilliard gradient energy coefficient *κ*^[@CR33]^. The free energy includes the chemical free energy dependent on the chemical composition and the elastic energy arising from the lattice misfit-strain between Li-poor and Li-rich areas. In our simulation, we assume a maximum solubility of Li-ion is rescaled to one. For simplifying, two polynomial functions are used to describe the chemical free energy function in our calculation.$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${f}_{ch}(c)=a{(c-0.5)}^{2}$$\end{document}$$to describe the chemical free energy function of the case which only has one minimum point at *c* = 0.5. It means that the function describes a solid solution case without phase separation.$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${f}_{ch}(c)=a{(c-0.2)}^{2}{(c-0.8)}^{2}$$\end{document}$$to describe the case that has two minimum points at *c* = 0.2 and *c* = 0.8. It means that phase separation will occur at range 0.2--0.8 of Li-ion concentration. The coefficient *a* in Eq. ([32](#Equ63){ref-type=""}) is a parameter to determine the value of chemical free energy. For the case of Eq. ([32.2](#Equ64){ref-type=""}), the *a* determines the barrel between Li-poor *c* = 0.2 and Li-rich *c* = 0.8 phase. The elastic energy is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${f}_{el}(c)=\frac{1}{2}{C}_{ijkl}({\varepsilon }_{ij}-{\varepsilon }_{ij}^{0}(c))({\varepsilon }_{kl}-{\varepsilon }_{kl}^{0}(c))$$\end{document}$$where *C*~*ijkl*~ is the elastic constants which is assumed to be composition-independent here. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varepsilon }_{ij}^{0}(c)$$\end{document}$ represents the composition-dependent stress-free strain of lithium compounds due to lattice expansion upon Li insertion. In this paper, we assume the unit cell volume has a linear Li concentration dependence, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varepsilon }_{ij}^{0}(c)={\rm{\Delta }}{\varepsilon }_{ij}^{0}c$$\end{document}$, where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta {\varepsilon }_{ij}^{0}$$\end{document}$ is the linear misfit strain with maximum Li-ion concentration. For spherical symmetry and with the isotropic approximation, Eq. ([33](#Equ65){ref-type=""}) becomes$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${f}_{el}(c)=(\frac{K}{2}-\frac{\mu }{3}){({\varepsilon }_{rr}+2{\varepsilon }_{\theta \theta }-3{\varepsilon }^{0}(c))}^{2}+\mu {({\varepsilon }_{rr}-{\varepsilon }^{0}(c))}^{2}+2\mu {({\varepsilon }_{\theta \theta }-{\varepsilon }^{0}(c))}^{2}$$\end{document}$$where *ε*~*rr*~ and *ε*~*θθ*~ will be calculated using theory of section: Mathematical model. Generally, Li-ion insertion on the electrode-electrolyte interface is determined by the Butler-Volmer equation^[@CR8],[@CR31],[@CR32]^. Also for simplifying our calculation, we assume the rate of Li insertion is a constant; and once the concentration of Li-ion at the interface of electrode/electrolyte reach to one, it is held fixed. Simulations are performed using the following non-dimensional forms of the length, energy and time units, a length scale *l*~0~ is angstrom, energy scale *E*~0~ is electron volt, and time scale $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${t}_{0}=\frac{{l}_{0}^{5}}{M{E}_{0}}$$\end{document}$. This yields a dimensionless radial position $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\frac{r}{{l}_{0}}$$\end{document}$, and dimensionless time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\frac{t}{{t}_{0}}$$\end{document}$ . The evolution equations are solved numerically using an explicit, finite difference technique. The central difference formulae with fourth order error are used for the spatial derivative and backwards difference formula is used for the time derivative. Using parameters of materials in our simulations are listed in Table [1](#Tab1){ref-type="table"} and the elastic constants of Li~x~FePO~4~^[@CR34]^ are used.Table 1List of Model Parameters to Using Our Calculation.parametersphysical meaningValuesKBulk modulus93.9 GPaGShear modulus48.4 GPaaCoefficient of free energy function1.6 × 10^12^ J/m^3^κConcentration gradient coefficient4.8 × 10^−9^ J/m$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\rm{\Delta }}{\varepsilon }_{ij}^{0}$$\end{document}$The maximum misfit strain0.05 Figure [4(a--f)](#Fig4){ref-type="fig"} show the two calculated results using different free energy functions: Eq. ([32.1](#Equ63){ref-type=""}) (left column) and (32.2) (right column). The first row is concentration profile with various average concentrations in sample; the second and third rows are radial strain *ε*~*rr*~ and axial strain *ε*~*θθ*~ = *ε*~*φφ*~ respectively. We use different colors, black, red, green, blue, cyan and magenta, to respectively symbolize six different average concentrations, 0.0037, 0.074, 0.25, 0.42, 0.62 and 0.80, in Fig. [4](#Fig4){ref-type="fig"}. The curves of the radial strains in the middle row of Fig. [4](#Fig4){ref-type="fig"} are plotted using dashed lines in order to distinguish the curves of concentration and axial strain. The continuous evolution of the concentration, radial strain and axial strain are shown in the video in Supplementary information. At the beginning stage of Li-ion insertion, the profile of Li-ion concentration and of strains is similar for the two free energy functions (Eq. [32.1](#Equ63){ref-type=""} and [32.2](#Equ64){ref-type=""}). However, the evolutions of Li-ion concentration will become sensitively dependent on the free energy functions when Li-ion concentration is over 0.2 because of phase separation. For free energy function without phase separation (Eq. [32.1](#Equ63){ref-type=""}), the contour of concentration is gentle increase from Li-free to completely lithiation phase (see Fig. [4(a)](#Fig4){ref-type="fig"}). The width from Li-free to completely lithiation phase can cross the whole sample. However, for the free energy function with phase separation, a marked reaction front exists from Li-rich (more than 0.8 of Li-ion concentration) to Li-poor (less than 0.2 of Li-ion concentration) phase (see Fig. [4(d)](#Fig4){ref-type="fig"}), i.e., the phase separation occur. From our simulation, the strain curves of the two free energy functions are similar. The largest strain always occurs at surface of electrode and can exceed 15% (see Fig. [4(b,c) and (e,f)](#Fig4){ref-type="fig"}) although the maximum stress-free misfit strain is only 5%. The largest strain value at the surface is enough large to touch off crack of battery electrode of some materials.Figure 4Radial distributions of the Li-ion concentration (first row), radial strain *ε*~*rr*~ (second row) and axial strain *ε*~*θθ*~ = *ε*~*φφ*~ (third row) using the free energy function (Eq. [32.1](#Equ63){ref-type=""}) (left column) and (Eq. [32.2](#Equ64){ref-type=""}) (right column) respectively. The *c1, c2,...*, and *c6* in (**a**) and (**d**) and corresponding colors symbolize six different average concentrations 0.0037, 0.074, 0.25, 0.42, 0.62 and 0.80 in whole sample. The theory in the section Mathematical model tells us that the restricted strain inside sample is decrease with decreasing with the gradient of stress-free strain. For that reason, decreased the gradient of stress-free strain is advantageous to obtain small restricted strain and avoid the crack of electrode. Two factors can determine the gradient of stress-free strain: 1) the diffusion of Li-ion and 2) the rate of Li-ion insertion. In our program code, a variable, loop number (LN) for calculating Li-ion distribution after each step of Li-ion insertion in particle surface, can equivalently describe the diffusion coefficient of Li-ion or the rate of Li-ion insertion. Increasing LN means increasing the diffusion coefficient and decreasing the rate of Li-ion insertion. Experiments have proven that the scope of the diffusion coefficient of Li-ion at electrode may cover several orders of magnitude^[@CR35]^. Figure [5](#Fig5){ref-type="fig"} shows the profile of concentration and of strains with average concentration 0.5 in whole sample when LN is respectively 1 and 1000. LN from 1 to 1000 means the diffusion coefficient of Li-ion increases 1000 times or the rate of Li-ion insertion decreases 1000 times. Figure [5(a)](#Fig5){ref-type="fig"} indicates that the large LN can efficiently decrease the gradient of concentration in the sample without phase separation. The gradient of concentration almost approximate zero (red line of Fig. [5(a)](#Fig5){ref-type="fig"}) when LN is 1000, and then the corresponding restricted strain (see red line of Fig. [5(b) and (c)](#Fig5){ref-type="fig"}) is also near zero. However, for the sample with phase separation, a phase interface with great gradient of concentration (see Fig. [5(d)](#Fig5){ref-type="fig"}) always exists from Li-rich to Li-poor phase whatever the LN change. Therefore, the restricted strain cannot productively decrease with increasing LN. The results in Fig. [5(e) and (f)](#Fig5){ref-type="fig"} show that phase separation is disadvantage to prevent the crack of battery electrode although phase separation is good for obtaining a stable output voltage in Li-ion battery. However, comparing the red and black line in Fig. [5(e) and (f)](#Fig5){ref-type="fig"}, the largest strain at the surface still decreases if the difference of concentration between Li-rich and Li-poor phase is small.Figure 5Radial distributions of the Li-ion concentration (first row), radial strain *ε*~*rr*~ (second row) and axial strain *ε*~*θθ*~ = *ε*~φφ~ (third row) with average concentration 0.5 in whole sample when the loop number (LN) is respectively 1 and 1000. Same as Fig. [4](#Fig4){ref-type="fig"}, the left column and right column respectively correspond to the free energy function (Eq. [32.1](#Equ63){ref-type=""}) and (Eq. [32.2](#Equ64){ref-type=""}). In order to find the effect of particle size, the evolution of concentration and of strain in particle radius 100 Å are also calculated and shown in Fig. [6](#Fig6){ref-type="fig"} using free energy function Eq. ([32.2](#Equ64){ref-type=""}). Comparing the curves of the right column of Fig. [4](#Fig4){ref-type="fig"} and Fig. [6](#Fig6){ref-type="fig"}, we surprisedly found that the evolution of strain with average concentration is almost unchanged with changing the particle size (Figures [S1](#MOESM1){ref-type="media"} and [S2](#MOESM1){ref-type="media"} that are similar to Fig. [6](#Fig6){ref-type="fig"} in other particle radius 75 and 200 Å are supplied in Supplementary information). It means that the evolution of strain in sample is a function of ratio of Li-rich and Li-poor phase, not dependent on particle size. The result agrees with Christensen and Newman's calculation^[@CR10],[@CR11]^. However, Liu *et al*. and Ryu *et al*.'s experiments^[@CR15],[@CR16]^ found there is a critical size below which the lithiation-induced strain can be accommodated without fracture in a Si electrode. Our results shown in Fig. [6](#Fig6){ref-type="fig"} seem inconsistent with the experimental observations of Liu *et al*.^[@CR15]^ and Ryu *et al*.^[@CR16]^. The critical diameters of Liu *et al*.'s and Ryu *et al*.'s observations are respectively 150 nm and 300 nm. Obviously, the deviation of their observations about the critical diameters is big. According to our calculation, the largest strain at surface is mainly dependent upon the difference of concentration from surface to center of sample. The difference of concentration is controlled by the rate of Li-ion insertion, diffusion velocity of Li-ion and electrode size. If the Li-ions have diffused to the center of electrode before the largest strain at surface does not exceed the fracture strain, the electrode of this size will not crack because the difference of concentration between Li-rich and Li-poor regions will not increase. On the contrary, crack will produce. For their experiments, we can assume that the diffusion velocity of Li-ion in Si electrode is same in their experiment observations, but the rate of Li-ion insertion may be big different. The big difference of the rate of Li-ion insertion leads to the largest difference of concentration at different critical diameter. It is reason that Liu *et al*.^[@CR15]^ and Ryu *et al*.'s^[@CR16]^ observation is big different about the critical diameter. In addition, the shape of electrode probably brings about difference of the critical size since radial and axial diffusion is much different in nanowire^[@CR35]^.Figure 6The evolution of concentration (**a**), radial (**b**) and axial strain (**c**) of particle radius 100 Å. The free energy function in the simulation is Eq. ([32.2](#Equ64){ref-type=""}). Except particle size, other calculated parameters and average concentration *c1*, *c2* ... and *c6* are same as Fig. [4](#Fig4){ref-type="fig"}. The fracture of electrode eliminates the useful capacity of battery associated with the growth of a passivating layer on the newly formed surface that leads to isolation of active materials from the conducting matrix^[@CR10],[@CR11]^. The fracture of electrode can be observed in large volumetric swelling of up to 300% of the nonlithiated electrode materials, such as silicon and tin^[@CR15],[@CR16],[@CR36]^, even has been found in commercial electrodes that undergo small volumetric expansion, for example LiCoO~2~, LiMn~2~O~4~ and LiFePO~4~^[@CR37]--[@CR42]^. However, Liu *et al*.^[@CR15]^ have proven that silicon particles with diameter below 150 nm neither cracked nor fractured upon first lithiation although silicon undergoes \~280% volumetric expansion. On the other hand, the fracture can occur in the cubic phase of Li~x~Mn~2~O~4~ (x \< 1)^[@CR40]^ and LiFePO~4~^[@CR41]^ in which the volume change is only 6.5% and 5%. It implies that large volume expansion due to Li-ion insertion is not a crucial reason to determine the crack of battery materials. Our theory and simulations confirm that the gradient of the stress-free strain dominates the maximum strain at surface of electrode; and the gradient of stress-free strain is only dependent on the gradient of the concentration, so making uniform distribution of Li-ion concentration is a key to prevent the crack of electrode. The large diffusion velocity, the slow rate of Li-ion insertion and the lithiation processing without phase separation in electrode is advantageous to prevent the crack of electrode. Conclusions {#Sec7} =========== The non-uniform stress-free strain caused by change of chemical composition or phase transformation sensitively affects the microstructures of materials. It is crucial to understand the effect of non-uniform stress-free strain. We developed a new analytical method to calculate the restricted strain field in a spherically symmetric particle. Our analytical result shows that the gradient of stress-free strain in sample dominates the restricted strain field. The results of the numerical calculation using our theory indicate that the change of the restricted strain field is more complex than our expectation. Even when the stress-free strain is expansion, the restricted strain field can be compression in some areas and tensile in others. This means that we cannot simply use the measured strain to estimate the change of chemical composition. Appling our theory to the lithiation process of Li-ion batteries, the evolution of strain with Li-ion insertion is calculated. The results indicate that the largest restricted strain always occurs at surface of electrode, and mainly depends upon the difference of Li-ion concentration between the surface and center of the electrode. If phase separation in the electrode does not occur during lithiation process, the larger diffusion velocity of Li-ion or the slower rate of Li-ion insertion can lead to a lesser difference in concentration from surface to center of the electrode; and then the maximum strain at surface of electrode is smaller. Otherwise, if phase separation occurs during lithiation, the difference of concentration both side of the phase interface is only dependent on the equilibrium concentration of two phases, no matter how fast the diffusion of Li-ion or how slow of Li-ion insertion. For large difference of equilibrium concentration of two phases, the large strain will produces at the surface of sample, suggesting the phase separation is disadvantageous to prevent the formation cracks in electrode. Our calculations also tell us that the fracture in an electrode is determined by not only particle size but also diffusion velocity of Li-ion or the rate of Li-ion insertion. Appendix A {#Sec8} ---------- The $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{k}^{(ij)}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\phi }_{i}^{(3)}$$\end{document}$ in Eq. (10) are$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\phi }_{1}^{(3)}={\lambda }_{1}{\xi }_{1}^{(3)}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\phi }_{2}^{(3)}={\mu }_{1}{\xi }_{2}^{(3)}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{1}^{(31)}={\xi }_{1}^{(3)}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{2}^{(31)}={\mu }_{1}{\varepsilon }_{2}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{1}^{(32)}={\xi }_{2}^{(3)}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{2}^{(32)}={\lambda }_{1}{\varepsilon }_{2}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{1}^{(33)}={\mu }_{1}+{\lambda }_{1}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{2}^{(33)}={\lambda }_{1}$$\end{document}$$$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varphi }_{3}^{(33)}={\mu }_{1}$$\end{document}$$where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\xi }_{1}^{(3)}={\mu }_{1}-{D}_{2}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\xi }_{2}^{(3)}={\lambda }_{1}+{D}_{2}$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\lambda }_{1}=3{\lambda }^{{\alpha }_{1}}+2{\mu }^{{\alpha }_{1}}$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mu }_{1}=4{\mu }^{{\alpha }_{1}}$$\end{document}$. Appendix B {#Sec9} ---------- $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${A}_{1}=3K-\frac{3\lambda (3K+\mu )}{\lambda +\mu }$$\end{document}$$ $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${A}_{2}=\frac{3\lambda (3K+\mu )}{\lambda +\mu }$$\end{document}$$ $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${A}_{3}=-3K-\frac{3\lambda (3K+\mu )}{\lambda +\mu }$$\end{document}$$ $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${A}_{4}=3K+\frac{9K\lambda }{\lambda +\mu }$$\end{document}$$ $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${A}_{5}=-3K+\frac{9K\lambda }{\lambda +\mu }$$\end{document}$$ $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${A}_{6}=-\frac{9K\lambda }{\lambda +\mu }$$\end{document}$$ Electronic supplementary material ================================= {#Sec10} Supplementary information The evolution of concentration, radial and axial strain **Electronic supplementary material** **Supplementary information** accompanies this paper at 10.1038/s41598-018-23320-7. **Publisher\'s note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This research was supported by the U. S. Department of Energy, Office of Basic Energy Science, Materials Science and Engineering Division, under Contract No. DE-AC02-98CH10886. Qingping Meng also acknowledges Dong Su for helpful discussions. Q.M. conceived the idea and presented the overall theoretical derivation. Y.Z. supervised the project. L.W., D.W. and M.T. analyzed and discussed the results. Q.M. and Y.Z. wrote the paper. Competing Interests {#FPar3} =================== The authors declare no competing interests.
Falling Flowers Bundle, It’s Your Day Woohoo! I’m actually posting a card class design. I was on vacation last week and was able to get many of my “to do” list items completed. This being one of them. I went outside my usual comfort zone with this design and love how it turned out. Also, I’ve been wanting to design with my Falling Flowers Bundle so I was able to kill two birds with one stone (as the saying goes). Lol! BASE: I started the base with Soft Sky layered with a Soft Sky Foil Frenzy Specialty Designer Series Paper Square. I just love this new Specialty Designer Series Paper!!! FLOWER BUNCH: The leaf stem was created from a piece of Lemon Lime Twist clear embossed then die cut. [TIP: After die cutting an embossed shape heat the edges slightly with the heat tool to smooth over the edges.] Next I die cut the Soft Sky flower, it was a little to big for my liking so I trimmed away the outer ring of petals. Finally I stamped two flowers onto Whisper White with Soft Sky ink and die cut one and then fussy cut the center from the second flower. Oh, I almost forgot, I popped the center flower with the Dimensional and placed a 1/4″ Dazzling Diamonds circle in the center. Hey, the flower needed something. [smile] SENTIMENT: For the sentiment I stamped “it’s your day” from the the Happy Birthday Gorgeous Stamp Set onto a Whisper White strip with Crumb Cake ink. I popped with with Dimensionals as well. It needed “more height”. Lol! Thank you for stopping by today. I hope you have a stamping-ly wonderful Monday and until next time……keep on stampin’!
Steele Johnson Steele Alexander Johnson (born June 16, 1996) is an Olympic silver medal-winning American diver. He has won multiple national titles at both the junior and college levels. Johnson made his Olympic debut at the 2016 Rio Games, where he won a silver medal with David Boudia in the men's 10 m synchronized platform diving competition. Early life and family Johnson was born in Indianapolis, Indiana to Bill and Jill Johnson. He has an older brother named Race and a younger sister named Hollyn. He earned his high school diploma from Laurel Springs School, an accredited, private, online school based in Ojai, California. Early diving experience Johnson began diving at age seven. He suffered a potentially fatal head injury on January 21, 2009 at the age of 12. While attempting a reverse 3 somersault in tuck position, he struck his head on the concrete platform. After falling 33 feet into the water below, Johnson was motionless until being rescued by his coach, John Wingfield. According to Johnson, Wingfield helped to limit his blood loss. Johnson has stated that he was hospitalized, that his scalp wound was stapled shut, and that he was diagnosed with only a minor concussion. Johnson resumed diving a month following the accident. In 2016, Johnson revealed that he still suffered from short- and long-term memory loss due to the accident. In the summer of 2014, with his future Olympic diving teammate, David Boudia, Johnson represented USA Diving at the FINA Diving World Cup. Johnson and Boudia won a bronze medal in the synchronized 10-meter platform. College diving career (2014-2018) Johnson attended college at Purdue University. In 2015, Johnson became the first diver since Purdue alumnus David Boudia in 2009 to win NCAA titles on springboard and platform in the same year. Johnson also won CSCAA Diver of the year, Big Ten Diver of the Year, Purdue Male Athlete of the Year, Two-time All American (1-meter and platform diving), and Honorable Mention All-American (3-meter Diving); he was also a World Championships Qualifier (Synchronized 10-meter). Johnson was selected as the Big 10 Diver of the Week eight times during the 2014-2015 season and was named Diver of the Year for 2015. Johnson redshirted the 2015-2016 diving season to train for the 2016 Summer Olympics in Rio de Janeiro. In December 2016, Johnson received a silver medal on the one-meter springboard at the USA Diving Winter National Championships and qualified for the 2017 World Aquatics Championships in Budapest, Hungary. During the 2016 season, Johnson won bronze on three-meter and finished in the top four of all three diving events at the Big 10 Diving Championships. Steele scored a 470.05 points on one-meter, surpassing Boudia's previous record of 468.55 set in 2010. Additionally, Johnson won his first Big 10 conference title for platform diving with a score of 547.8. Johnson was also named First Team All-Big Ten. In March 2018, Johnson won his fifth NCAA championship, scoring 499.35 points to win his second championship in a row on the three-meter board. Johnson underwent surgeries in September 2018 and February 2019 to remedy stress fractures in his right foot and subsequent complications. The foot injury and ensuing surgeries caused him to miss the entire college diving season. Johnson opted out of his final year of college diving eligibility to turn professional. Olympic diving At the June 2016 Olympic trials, Johnson and partner David Boudia achieved a score of 491.01 in men's synchronized 10-meter platform diving; this total was the highest ever for an American team. Johnson and Boudia went on to win a silver medal in that event at the 2016 Summer Olympics. The pair were in second place following each of the six rounds of the competition. The team of Chen Aisen and Lin Yue of China won the gold, while the bronze went to Britain’s Thomas Daley and Daniel Goodfellow. Johnson and Boudia scored a 457.11. In the 10-meter platform individual event, Johnson placed 13th with a score of 447.85. Professional career (2019-) In 2019, Johnson started diving with Ben Bramley on the platform synchro (Johnson's Olympic diving partner, David Boudia, decided to switch to springboard diving). Johnson and Bramley finished eighth in the 10m synchro at the 2019 World Championships held in Gwangju, Korea. Other work At the age of 15, Johnson began posting daily vlogs onto his YouTube channel, TheSteeleJohnson. Occasionally, during his live vlog, he has discussed his 2009 head injury. In one post, he said that the reverse 31⁄2 somersault in tuck position—the dive he was attempting when he was injured—is his favorite dive to practice: "Something which almost killed me has become the thing I'm best at." Johnson made his acting debut in a student film entitled "Blood And Water". Personal life Johnson married Hilary Nussbaum in Colorado on June 23, 2017. He is a Christian. Johnson has stated that his Christian faith affected his perspective on his 2009 injury: "I wanted to be the kid that had the big injury and came back from it and made the Olympics and all that stuff. So it’s kind of embarrassing. But now I’ve kind of realized that God had his hand over all of it to help me come to the realization, like, that’s not why at all."“He gave me this ability to dive. Yes, I had that accident. I had that injury. It happens. But I still had the ability to dive, and I still had the passion for diving. So now it’s gone from a selfish desire to be like some cool story to a selfless desire, like, God kept me alive and He is still giving me the ability to do what I do." Johnson was a six-time senior national champion with USA Diving. He won the 10-meter platform at the 2013 USA Diving Winter Nationals, was a 15-time junior national champion, and was a four-time champion at the Junior Pan American Games. References External links Steele Johnson at Team USA Category:1996 births Category:Divers at the 2016 Summer Olympics Category:Living people Category:American male divers Category:Medalists at the 2016 Summer Olympics Category:Olympic divers of the United States Category:Olympic silver medalists for the United States in diving Category:People from Carmel, Indiana Category:Purdue Boilermakers men's divers Category:Sportspeople from Indianapolis
#! /usr/bin/env python # -*- coding: utf-8 -*- # vim: set ts=4 sw=4 tw=0 et : #====================================================================== # # stardict.py - # # Created by skywind on 2011/05/13 # Last Modified: 2019/11/09 23:47 # #====================================================================== from __future__ import print_function import sys import time import os import io import csv import sqlite3 import codecs try: import json except: import simplejson as json MySQLdb = None #---------------------------------------------------------------------- # python3 compatible #---------------------------------------------------------------------- if sys.version_info[0] >= 3: unicode = str long = int xrange = range #---------------------------------------------------------------------- # word strip #---------------------------------------------------------------------- def stripword(word): return (''.join([ n for n in word if n.isalnum() ])).lower() #---------------------------------------------------------------------- # StarDict #---------------------------------------------------------------------- class StarDict (object): def __init__ (self, filename, verbose = False): self.__dbname = filename if filename != ':memory:': os.path.abspath(filename) self.__conn = None self.__verbose = verbose self.__open() # 初始化并创建必要的表格和索引 def __open (self): sql = ''' CREATE TABLE IF NOT EXISTS "stardict" ( "id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL UNIQUE, "word" VARCHAR(64) COLLATE NOCASE NOT NULL UNIQUE, "sw" VARCHAR(64) COLLATE NOCASE NOT NULL, "phonetic" VARCHAR(64), "definition" TEXT, "translation" TEXT, "pos" VARCHAR(16), "collins" INTEGER DEFAULT(0), "oxford" INTEGER DEFAULT(0), "tag" VARCHAR(64), "bnc" INTEGER DEFAULT(NULL), "frq" INTEGER DEFAULT(NULL), "exchange" TEXT, "detail" TEXT, "audio" TEXT ); CREATE UNIQUE INDEX IF NOT EXISTS "stardict_1" ON stardict (id); CREATE UNIQUE INDEX IF NOT EXISTS "stardict_2" ON stardict (word); CREATE INDEX IF NOT EXISTS "stardict_3" ON stardict (sw, word collate nocase); CREATE INDEX IF NOT EXISTS "sd_1" ON stardict (word collate nocase); ''' self.__conn = sqlite3.connect(self.__dbname, isolation_level = "IMMEDIATE") self.__conn.isolation_level = "IMMEDIATE" sql = '\n'.join([ n.strip('\t') for n in sql.split('\n') ]) sql = sql.strip('\n') self.__conn.executescript(sql) self.__conn.commit() fields = ( 'id', 'word', 'sw', 'phonetic', 'definition', 'translation', 'pos', 'collins', 'oxford', 'tag', 'bnc', 'frq', 'exchange', 'detail', 'audio' ) self.__fields = tuple([(fields[i], i) for i in range(len(fields))]) self.__names = { } for k, v in self.__fields: self.__names[k] = v self.__enable = self.__fields[3:] return True # 数据库记录转化为字典 def __record2obj (self, record): if record is None: return None word = {} for k, v in self.__fields: word[k] = record[v] if word['detail']: text = word['detail'] try: obj = json.loads(text) except: obj = None word['detail'] = obj return word # 关闭数据库 def close (self): if self.__conn: self.__conn.close() self.__conn = None def __del__ (self): self.close() # 输出日志 def out (self, text): if self.__verbose: print(text) return True # 查询单词 def query (self, key): c = self.__conn.cursor() record = None if isinstance(key, int) or isinstance(key, long): c.execute('select * from stardict where id = ?;', (key,)) elif isinstance(key, str) or isinstance(key, unicode): c.execute('select * from stardict where word = ?', (key,)) else: return None record = c.fetchone() return self.__record2obj(record) # 查询单词匹配 def match (self, word, limit = 10, strip = False): c = self.__conn.cursor() if not strip: sql = 'select id, word from stardict where word >= ? ' sql += 'order by word collate nocase limit ?;' c.execute(sql, (word, limit)) else: sql = 'select id, word from stardict where sw >= ? ' sql += 'order by sw, word collate nocase limit ?;' c.execute(sql, (stripword(word), limit)) records = c.fetchall() result = [] for record in records: result.append(tuple(record)) return result # 批量查询 def query_batch (self, keys): sql = 'select * from stardict where ' if keys is None: return None if not keys: return [] querys = [] for key in keys: if isinstance(key, int) or isinstance(key, long): querys.append('id = ?') elif key is not None: querys.append('word = ?') sql = sql + ' or '.join(querys) + ';' query_word = {} query_id = {} c = self.__conn.cursor() c.execute(sql, tuple(keys)) for row in c: obj = self.__record2obj(row) query_word[obj['word'].lower()] = obj query_id[obj['id']] = obj results = [] for key in keys: if isinstance(key, int) or isinstance(key, long): results.append(query_id.get(key, None)) elif key is not None: results.append(query_word.get(key.lower(), None)) else: results.append(None) return tuple(results) # 取得单词总数 def count (self): c = self.__conn.cursor() c.execute('select count(*) from stardict;') record = c.fetchone() return record[0] # 注册新单词 def register (self, word, items, commit = True): sql = 'INSERT INTO stardict(word, sw) VALUES(?, ?);' try: self.__conn.execute(sql, (word, stripword(word))) except sqlite3.IntegrityError as e: self.out(str(e)) return False except sqlite3.Error as e: self.out(str(e)) return False self.update(word, items, commit) return True # 删除单词 def remove (self, key, commit = True): if isinstance(key, int) or isinstance(key, long): sql = 'DELETE FROM stardict WHERE id=?;' else: sql = 'DELETE FROM stardict WHERE word=?;' try: self.__conn.execute(sql, (key,)) if commit: self.__conn.commit() except sqlite3.IntegrityError: return False return True # 清空数据库 def delete_all (self, reset_id = False): sql1 = 'DELETE FROM stardict;' sql2 = "UPDATE sqlite_sequence SET seq = 0 WHERE name = 'stardict';" try: self.__conn.execute(sql1) if reset_id: self.__conn.execute(sql2) self.__conn.commit() except sqlite3.IntegrityError as e: self.out(str(e)) return False except sqlite3.Error as e: self.out(str(e)) return False return True # 更新单词数据 def update (self, key, items, commit = True): names = [] values = [] for name, id in self.__enable: if name in items: names.append(name) value = items[name] if name == 'detail': if value is not None: value = json.dumps(value, ensure_ascii = False) values.append(value) if len(names) == 0: if commit: try: self.__conn.commit() except sqlite3.IntegrityError: return False return False sql = 'UPDATE stardict SET ' + ', '.join(['%s=?'%n for n in names]) if isinstance(key, str) or isinstance(key, unicode): sql += ' WHERE word=?;' else: sql += ' WHERE id=?;' try: self.__conn.execute(sql, tuple(values + [key])) if commit: self.__conn.commit() except sqlite3.IntegrityError: return False return True # 浏览词典 def __iter__ (self): c = self.__conn.cursor() sql = 'select "id", "word" from "stardict"' sql += ' order by "word" collate nocase;' c.execute(sql) return c.__iter__() # 取得长度 def __len__ (self): return self.count() # 检测存在 def __contains__ (self, key): return self.query(key) is not None # 查询单词 def __getitem__ (self, key): return self.query(key) # 提交变更 def commit (self): try: self.__conn.commit() except sqlite3.IntegrityError: self.__conn.rollback() return False return True # 取得所有单词 def dumps (self): return [ n for _, n in self.__iter__() ] #---------------------------------------------------------------------- # startup MySQLdb #---------------------------------------------------------------------- def mysql_startup(): global MySQLdb if MySQLdb is not None: return True try: import MySQLdb as _mysql MySQLdb = _mysql except ImportError: return False return True #---------------------------------------------------------------------- # DictMysql #---------------------------------------------------------------------- class DictMySQL (object): def __init__ (self, desc, init = False, timeout = 10, verbose = False): self.__argv = {} self.__uri = {} if isinstance(desc, dict): argv = desc else: argv = self.__url_parse(desc) for k, v in argv.items(): self.__argv[k] = v if k not in ('engine', 'init', 'db', 'verbose'): self.__uri[k] = v self.__uri['connect_timeout'] = timeout self.__conn = None self.__verbose = verbose self.__init = init if 'db' not in argv: raise KeyError('not find db name') self.__open() def __open (self): mysql_startup() if MySQLdb is None: raise ImportError('No module named MySQLdb') fields = [ 'id', 'word', 'sw', 'phonetic', 'definition', 'translation', 'pos', 'collins', 'oxford', 'tag', 'bnc', 'frq', 'exchange', 'detail', 'audio' ] self.__fields = tuple([(fields[i], i) for i in range(len(fields))]) self.__names = { } for k, v in self.__fields: self.__names[k] = v self.__enable = self.__fields[3:] self.__db = self.__argv.get('db', 'stardict') if not self.__init: uri = {} for k, v in self.__uri.items(): uri[k] = v uri['db'] = self.__db self.__conn = MySQLdb.connect(**uri) else: self.__conn = MySQLdb.connect(**self.__uri) return self.init() return True # 输出日志 def out (self, text): if self.__verbose: print(text) return True # 初始化数据库与表格 def init (self): database = self.__argv.get('db', 'stardict') self.out('create database: %s'%database) self.__conn.query("SET sql_notes = 0;") self.__conn.query('CREATE DATABASE IF NOT EXISTS %s;'%database) self.__conn.query('USE %s;'%database) # self.__conn.query('drop table if exists stardict') sql = ''' CREATE TABLE IF NOT EXISTS `%s`.`stardict` ( `id` INT PRIMARY KEY NOT NULL AUTO_INCREMENT, `word` VARCHAR(64) NOT NULL UNIQUE KEY, `sw` VARCHAR(64) NOT NULL, `phonetic` VARCHAR(64), `definition` TEXT, `translation` TEXT, `pos` VARCHAR(16), `collins` SMALLINT DEFAULT 0, `oxford` SMALLINT DEFAULT 0, `tag` VARCHAR(64), `bnc` INT DEFAULT NULL, `frq` INT DEFAULT NULL, `exchange` TEXT, `detail` TEXT, `audio` TEXT, KEY(`sw`, `word`), KEY(`collins`), KEY(`oxford`), KEY(`tag`) ) '''%(database) sql = '\n'.join([ n.strip('\t') for n in sql.split('\n') ]) sql = sql.strip('\n') sql += ' ENGINE=MyISAM DEFAULT CHARSET=utf8;' self.__conn.query(sql) self.__conn.commit() return True # 读取 mysql://user:passwd@host:port/database def __url_parse (self, url): if url[:8] != 'mysql://': return None url = url[8:] obj = {} part = url.split('/') main = part[0] p1 = main.find('@') if p1 >= 0: text = main[:p1].strip() main = main[p1 + 1:] p1 = text.find(':') if p1 >= 0: obj['user'] = text[:p1].strip() obj['passwd'] = text[p1 + 1:].strip() else: obj['user'] = text p1 = main.find(':') if p1 >= 0: port = main[p1 + 1:] main = main[:p1] obj['port'] = int(port) main = main.strip() if not main: main = 'localhost' obj['host'] = main.strip() if len(part) >= 2: obj['db'] = part[1] return obj # 数据库记录转化为字典 def __record2obj (self, record): if record is None: return None word = {} for k, v in self.__fields: word[k] = record[v] if word['detail']: text = word['detail'] try: obj = json.loads(text) except: obj = None word['detail'] = obj return word # 关闭数据库 def close (self): if self.__conn: self.__conn.close() self.__conn = None def __del__ (self): self.close() # 查询单词 def query (self, key): record = None if isinstance(key, int) or isinstance(key, long): sql = 'select * from stardict where id = %s;' elif isinstance(key, str) or isinstance(key, unicode): sql = 'select * from stardict where word = %s;' else: return None with self.__conn as c: c.execute(sql, (key,)) record = c.fetchone() return self.__record2obj(record) # 查询单词匹配 def match (self, word, limit = 10, strip = False): c = self.__conn.cursor() if not strip: sql = 'select id, word from stardict where word >= %s ' sql += 'order by word limit %s;' c.execute(sql, (word, limit)) else: sql = 'select id, word from stardict where sw >= %s ' sql += 'order by sw, word limit %s;' c.execute(sql, (stripword(word), limit)) records = c.fetchall() result = [] for record in records: result.append(tuple(record)) return result # 批量查询 def query_batch (self, keys): sql = 'select * from stardict where ' if keys is None: return None if not keys: return [] querys = [] for key in keys: if isinstance(key, int) or isinstance(key, long): querys.append('id = %s') elif key is not None: querys.append('word = %s') sql = sql + ' or '.join(querys) + ';' query_word = {} query_id = {} with self.__conn as c: c.execute(sql, tuple(keys)) for row in c: obj = self.__record2obj(row) query_word[obj['word'].lower()] = obj query_id[obj['id']] = obj results = [] for key in keys: if isinstance(key, int) or isinstance(key, long): results.append(query_id.get(key, None)) elif key is not None: results.append(query_word.get(key.lower(), None)) else: results.append(None) return tuple(results) # 注册新单词 def register (self, word, items, commit = True): sql = 'INSERT INTO stardict(word, sw) VALUES(%s, %s);' try: with self.__conn as c: c.execute(sql, (word, stripword(word))) except MySQLdb.Error as e: self.out(str(e)) return False self.update(word, items, commit) return True # 删除单词 def remove (self, key, commit = True): if isinstance(key, int) or isinstance(key, long): sql = 'DELETE FROM stardict WHERE id=%s;' else: sql = 'DELETE FROM stardict WHERE word=%s;' try: with self.__conn as c: c.execute(sql, (key,)) except MySQLdb.Error as e: self.out(str(e)) return False return True # 清空数据库 def delete_all (self, reset_id = False): sql1 = 'DELETE FROM stardict;' try: with self.__conn as c: c.execute(sql1) except MySQLdb.Error as e: self.out(str(e)) return False return True # 更新单词数据 def update (self, key, items, commit = True): names = [] values = [] for name, id in self.__enable: if name in items: names.append(name) value = items[name] if name == 'detail': if value is not None: value = json.dumps(value, ensure_ascii = False) values.append(value) if len(names) == 0: if commit: try: self.__conn.commit() except MySQLdb.Error as e: self.out(str(e)) return False return False sql = 'UPDATE stardict SET ' + ', '.join(['%s=%%s'%n for n in names]) if isinstance(key, str) or isinstance(key, unicode): sql += ' WHERE word=%s;' else: sql += ' WHERE id=%s;' try: with self.__conn as c: c.execute(sql, tuple(values + [key])) except MySQLdb.Error as e: self.out(str(e)) return False return True # 取得数据量 def count (self): sql = 'SELECT count(*) FROM stardict;' try: with self.__conn as c: c.execute(sql) row = c.fetchone() return row[0] except MySQLdb.Error as e: self.out(str(e)) return -1 return 0 # 提交数据 def commit (self): try: self.__conn.commit() except MySQLdb.Error as e: self.out(str(e)) return False return True # 取得长度 def __len__ (self): return self.count() # 检测存在 def __contains__ (self, key): return self.query(key) is not None # 查询单词 def __getitem__ (self, key): return self.query(key) # 取得所有单词 def dumps (self): return [ n for _, n in self.__iter__() ] #---------------------------------------------------------------------- # CSV COLUMNS #---------------------------------------------------------------------- COLUMN_SIZE = 13 COLUMN_ID = COLUMN_SIZE COLUMN_SD = COLUMN_SIZE + 1 COLUMN_SW = COLUMN_SIZE + 2 #---------------------------------------------------------------------- # DictCsv #---------------------------------------------------------------------- class DictCsv (object): def __init__ (self, filename, codec = 'utf-8'): self.__csvname = None if filename is not None: self.__csvname = os.path.abspath(filename) self.__codec = codec self.__heads = ( 'word', 'phonetic', 'definition', 'translation', 'pos', 'collins', 'oxford', 'tag', 'bnc', 'frq', 'exchange', 'detail', 'audio' ) heads = self.__heads self.__fields = tuple([ (heads[i], i) for i in range(len(heads)) ]) self.__names = {} for k, v in self.__fields: self.__names[k] = v numbers = [] for name in ('collins', 'oxford', 'bnc', 'frq'): numbers.append(self.__names[name]) self.__numbers = tuple(numbers) self.__enable = self.__fields[1:] self.__dirty = False self.__words = {} self.__rows = [] self.__index = [] self.__read() def reset (self): self.__dirty = False self.__words = {} self.__rows = [] self.__index = [] return True def encode (self, text): if text is None: return None text = text.replace('\\', '\\\\').replace('\n', '\\n') return text.replace('\r', '\\r') def decode (self, text): output = [] i = 0 if text is None: return None size = len(text) while i < size: c = text[i] if c == '\\': c = text[i + 1:i + 2] if c == '\\': output.append('\\') elif c == 'n': output.append('\n') elif c == 'r': output.append('\r') else: output.append('\\' + c) i += 2 else: output.append(c) i += 1 return ''.join(output) # 安全转行整数 def readint (self, text): if text is None: return None if text == '': return 0 try: x = long(text) except: return 0 if x < 0x7fffffff: return int(x) return x # 读取文件 def __read (self): self.reset() filename = self.__csvname if filename is None: return False if not os.path.exists(self.__csvname): return False codec = self.__codec if sys.version_info[0] < 3: fp = open(filename, 'rb') content = fp.read() if not isinstance(content, type(b'')): content = content.encode(codec, 'ignore') content = content.replace(b'\r\n', b'\n') bio = io.BytesIO() bio.write(content) bio.seek(0) reader = csv.reader(bio) else: reader = csv.reader(open(filename, encoding = codec)) rows = [] index = [] words = {} count = 0 for row in reader: count += 1 if count == 1: continue if len(row) < 1: continue if sys.version_info[0] < 3: row = [ n.decode(codec, 'ignore') for n in row ] if len(row) < COLUMN_SIZE: row.extend([None] * (COLUMN_SIZE - len(row))) if len(row) > COLUMN_SIZE: row = row[:COLUMN_SIZE] word = row[0].lower() if word in words: continue row.extend([0, 0, stripword(row[0])]) words[word] = 1 rows.append(row) index.append(row) self.__rows = rows self.__index = index self.__rows.sort(key = lambda row: row[0].lower()) self.__index.sort(key = lambda row: (row[COLUMN_SW], row[0].lower())) for index in xrange(len(self.__rows)): row = self.__rows[index] row[COLUMN_ID] = index word = row[0].lower() self.__words[word] = row for index in xrange(len(self.__index)): row = self.__index[index] row[COLUMN_SD] = index return True # 保存文件 def save (self, filename = None, codec = 'utf-8'): if filename is None: filename = self.__csvname if filename is None: return False if sys.version_info[0] < 3: fp = open(filename, 'wb') writer = csv.writer(fp) else: fp = open(filename, 'w', encoding = codec, newline = '') writer = csv.writer(fp) writer.writerow(self.__heads) for row in self.__rows: newrow = [] for n in row: if isinstance(n, int) or isinstance(n, long): n = str(n) elif not isinstance(n, bytes): if (n is not None) and sys.version_info[0] < 3: n = n.encode(codec, 'ignore') newrow.append(n) writer.writerow(newrow[:COLUMN_SIZE]) fp.close() return True # 对象解码 def __obj_decode (self, row): if row is None: return None obj = {} obj['id'] = row[COLUMN_ID] obj['sw'] = row[COLUMN_SW] skip = self.__numbers for key, index in self.__fields: value = row[index] if index in skip: if value is not None: value = self.readint(value) elif key != 'detail': value = self.decode(value) obj[key] = value detail = obj.get('detail', None) if detail is not None: if detail != '': detail = json.loads(detail) else: detail = None obj['detail'] = detail return obj # 对象编码 def __obj_encode (self, obj): row = [ None for i in xrange(len(self.__fields) + 3) ] for name, idx in self.__fields: value = obj.get(name, None) if value is None: continue if idx in self.__numbers: value = str(value) elif name == 'detail': value = json.dumps(value, ensure_ascii = False) else: value = self.encode(value) row[idx] = value return row # 重新排序 def __resort (self): self.__rows.sort(key = lambda row: row[0].lower()) self.__index.sort(key = lambda row: (row[COLUMN_SW], row[0].lower())) for index in xrange(len(self.__rows)): row = self.__rows[index] row[COLUMN_ID] = index for index in xrange(len(self.__index)): row = self.__index[index] row[COLUMN_SD] = index self.__dirty = False # 查询单词 def query (self, key): if key is None: return None if self.__dirty: self.__resort() if isinstance(key, int) or isinstance(key, long): if key < 0 or key >= len(self.__rows): return None return self.__obj_decode(self.__rows[key]) row = self.__words.get(key.lower(), None) return self.__obj_decode(row) # 查询单词匹配 def match (self, word, count = 10, strip = False): if len(self.__rows) == 0: return [] if self.__dirty: self.__resort() if not strip: index = self.__rows pos = 0 else: index = self.__index pos = COLUMN_SW top = 0 bottom = len(index) - 1 middle = top key = word.lower() if strip: key = stripword(word) while top < bottom: middle = (top + bottom) >> 1 if top == middle or bottom == middle: break text = index[middle][pos].lower() if key == text: break elif key < text: bottom = middle elif key > text: top = middle while index[middle][pos].lower() < key: middle += 1 if middle >= len(index): break cc = COLUMN_ID likely = [ (tx[cc], tx[0]) for tx in index[middle:middle + count] ] return likely # 批量查询 def query_batch (self, keys): return [ self.query(key) for key in keys ] # 单词总量 def count (self): return len(self.__rows) # 取得长度 def __len__ (self): return len(self.__rows) # 取得单词 def __getitem__ (self, key): return self.query(key) # 是否存在 def __contains__ (self, key): return self.__words.__contains__(key.lower()) # 迭代器 def __iter__ (self): record = [] for index in xrange(len(self.__rows)): record.append((index, self.__rows[index][0])) return record.__iter__() # 注册新单词 def register (self, word, items, commit = True): if word.lower() in self.__words: return False row = self.__obj_encode(items) row[0] = word row[COLUMN_ID] = len(self.__rows) row[COLUMN_SD] = len(self.__rows) row[COLUMN_SW] = stripword(word) self.__rows.append(row) self.__index.append(row) self.__words[word.lower()] = row self.__dirty = True return True # 删除单词 def remove (self, key, commit = True): if isinstance(key, int) or isinstance(key, long): if key < 0 or key >= len(self.__rows): return False if self.__dirty: self.__resort() key = self.__rows[key][0] row = self.__words.get(key, None) if row is None: return False if len(self.__rows) == 1: self.reset() return True index = row[COLUMN_ID] self.__rows[index] = self.__rows[len(self.__rows) - 1] self.__rows.pop() index = row[COLUMN_SD] self.__index[index] = self.__index[len(self.__rows) - 1] self.__index.pop() del self.__words[key] self.__dirty = True return True # 清空所有 def delete_all (self, reset_id = False): self.reset() return True # 更改单词 def update (self, key, items, commit = True): if isinstance(key, int) or isinstance(key, long): if key < 0 or key >= len(self.__rows): return False if self.__dirty: self.__resort() key = self.__rows[key][0] key = key.lower() row = self.__words.get(key, None) if row is None: return False newrow = self.__obj_encode(items) for name, idx in self.__fields: if idx == 0: continue if name in items: row[idx] = newrow[idx] return True # 提交变更 def commit (self): if self.__csvname: self.save(self.__csvname, self.__codec) return True # 取得所有单词 def dumps (self): return [ n for _, n in self.__iter__() ] #---------------------------------------------------------------------- # 词形衍生:查找动词的各种时态,名词的复数等,或反向查找 # 格式为每行一条数据:根词汇 -> 衍生1,衍生2,衍生3 # 可以用 Hunspell数据生成,下面有个日本人做的简版(1.8万组数据): # http://www.lexically.net/downloads/version4/downloading%20BNC.htm #---------------------------------------------------------------------- class LemmaDB (object): def __init__ (self): self._stems = {} self._words = {} self._frqs = {} # 读取数据 def load (self, filename, encoding = None): content = open(filename, 'rb').read() if content[:3] == b'\xef\xbb\xbf': content = content[3:].decode('utf-8', 'ignore') elif encoding is not None: text = content.decode(encoding, 'ignore') else: text = None match = ['utf-8', sys.getdefaultencoding(), 'ascii'] for encoding in match + ['gbk', 'latin1']: try: text = content.decode(encoding) break except: pass if text is None: text = content.decode('utf-8', 'ignore') number = 0 for line in text.split('\n'): number += 1 line = line.strip('\r\n ') if (not line) or (line[:1] == ';'): continue pos = line.find('->') if not pos: continue stem = line[:pos].strip() p1 = stem.find('/') frq = 0 if p1 >= 0: frq = int(stem[p1 + 1:].strip()) stem = stem[:p1].strip() if not stem: continue if frq > 0: self._frqs[stem] = frq for word in line[pos + 2:].strip().split(','): p1 = word.find('/') if p1 >= 0: word = word[:p1].strip() if not word: continue self.add(stem, word.strip()) return True # 保存数据文件 def save (self, filename, encoding = 'utf-8'): stems = list(self._stems.keys()) stems.sort(key = lambda x: x.lower()) import codecs fp = codecs.open(filename, 'w', encoding) output = [] for stem in stems: words = self.get(stem) if not words: continue frq = self._frqs.get(stem, 0) if frq > 0: stem = '%s/%d'%(stem, frq) output.append((-frq, u'%s -> %s'%(stem, ','.join(words)))) output.sort() for _, text in output: fp.write(text + '\n') fp.close() return True # 添加一个词根的一个衍生词 def add (self, stem, word): if stem not in self._stems: self._stems[stem] = {} if word not in self._stems[stem]: self._stems[stem][word] = len(self._stems[stem]) if word not in self._words: self._words[word] = {} if stem not in self._words[word]: self._words[word][stem] = len(self._words[word]) return True # 删除一个词根的一个衍生词 def remove (self, stem, word): count = 0 if stem in self._stems: if word in self._stems[stem]: del self._stems[stem][word] count += 1 if not self._stems[stem]: del self._stems[stem] if word in self._words: if stem in self._words[word]: del self._words[word][stem] count += 1 if not self._words[word]: del self._words[word] return (count > 0) and True or False # 清空数据库 def reset (self): self._stems = {} self._words = {} return True # 根据词根找衍生,或者根据衍生反向找词根 def get (self, word, reverse = False): if not reverse: if word not in self._stems: if word in self._words: return [word] return None words = [ (v, k) for (k, v) in self._stems[word].items() ] else: if word not in self._words: if word in self._stems: return [word] return None words = [ (v, k) for (k, v) in self._words[word].items() ] words.sort() return [ k for (v, k) in words ] # 知道一个单词求它的词根 def word_stem (self, word): return self.get(word, reverse = True) # 总共多少条词根数据 def stem_size (self): return len(self._stems) # 总共多少条衍生数据 def word_size (self): return len(self._words) def dump (self, what = 'ALL'): words = {} what = what.lower() if what in ('all', 'stem'): for word in self._stems: words[word] = 1 if what in ('all', 'word'): for word in self._words: words[word] = 1 return words def __len__ (self): return len(self._stems) def __getitem__ (self, stem): return self.get(stem) def __contains__ (self, stem): return (stem in self._stems) def __iter__ (self): return self._stems.__iter__() #---------------------------------------------------------------------- # DictHelper #---------------------------------------------------------------------- class DictHelper (object): def __init__ (self): self._exchanges = {} self._exchanges['p'] = u'过去式' self._exchanges['d'] = u'过去分词' self._exchanges['i'] = u'现在分词' self._exchanges['3'] = u'第三人称单数' self._exchanges['r'] = u'比较级' self._exchanges['t'] = u'最高级' self._exchanges['s'] = u'复数' self._exchanges['0'] = u'原型' # best 的原型是 good self._exchanges['1'] = u'类别' # best 的类别是 good 里的 t self._pos = {} self._pos['a'] = (u'代词', 'pron.') self._pos['c'] = (u'连接词', 'conj.') self._pos['d'] = (u'限定词', 'determiner') self._pos['i'] = (u'介词', 'prep.') self._pos['j'] = (u'形容词', 'adj.') self._pos['m'] = (u'数词', 'num.') self._pos['n'] = (u'名词', 'n.') self._pos['p'] = (u'代词', 'pron.') self._pos['r'] = (u'副词', 'adv.') self._pos['u'] = (u'感叹词', 'int.') self._pos['t'] = (u'不定式标记', 'infm.') self._pos['v'] = (u'动词', 'v.') self._pos['x'] = (u'否定标记', 'not') # 返回一个进度指示条,传入总量,每走一格调用一次 next def progress (self, total): class ProgressIndicator (object): def __init__ (self, total): self.count = 0 self.percent = -1 self.total = total self.timestamp = time.time() self.counter = {} def next (self): if self.total: self.count += 1 pc = int(self.count * 100 / self.total) if pc != self.percent: self.percent = pc print('progress: %d%%'%pc) def inc (self, name): if name not in self.counter: self.counter[name] = 1 else: self.counter[name] += 1 def done (self): t = (time.time() - self.timestamp) keys = list(self.counter.keys()) keys.sort() for key in keys: print('[%s] -> %d'%(key, self.counter[key])) print('[Finished in %d seconds (%d)]'%(t, self.count)) return ProgressIndicator(total) # 返回词典里所有词的 map,默认转为小写 def dump_map (self, dictionary, lower = True): words = {} for _, word in dictionary: if lower: word = word.lower() words[word] = 1 return words # 字典差异导出 def discrepancy_export (self, dictionary, words, outname, opts = ''): existence = self.dump_map(dictionary) if os.path.splitext(outname)[-1].lower() in ('.txt', '.csv'): db = DictCsv(outname) else: db = StarDict(outname) db.delete_all() count = 0 for word in words: if word.lower() in existence: continue if '(' in word: continue if '/' in word: continue if '"' in word or '#' in word: continue if '0' in word or '1' in word or '2' in word or '3' in word: continue if 's' in opts: if word.count(' ') >= 2: continue if 't' in opts: if ' ' in word: continue if 'p' in opts: if '-' in word: continue try: word.encode('ascii') except: continue db.register(word, {'tag':'PENDING'}, False) count += 1 db.commit() print('exported %d entries'%count) return count # 字典差异导入 def discrepancy_import (self, dictionary, filename, opts = ''): existence = self.dump_map(dictionary) if os.path.splitext(filename)[-1].lower() in ('.csv', '.txt'): db = DictCsv(filename) else: db = StarDict(filename) count = 0 for word in self.dump_map(db, False): data = db[word] if data is None: continue if data['tag'] != 'OK': continue phonetic = data.get('phonetic', '') definition = data.get('definition', '') translation = data.get('translation', '') update = {} if phonetic: update['phonetic'] = phonetic if definition: update['definition'] = definition if translation: update['translation'] = translation if not update: continue if word.lower() in existence: if 'n' not in opts: dictionary.update(word, update, False) else: dictionary.register(word, update, False) count += 1 dictionary.commit() print('imported %d entries'%count) return count # 差异比较(utf-8 的.txt 文件,单词和后面音标释义用tab分割) def deficit_tab_txt (self, dictionary, txt, outname, opts = ''): deficit = {} for line in codecs.open(txt, encoding = 'utf-8'): row = [ n.strip() for n in line.split('\t') ] if len(row) < 2: continue word = row[0] deficit[word] = 1 return self.deficit_export(dictionary, deficit, outname, opts) # 导出星际译王的词典文件,根据一个单词到释义的字典 def export_stardict (self, wordmap, outname, title): mainname = os.path.splitext(outname)[0] keys = [ k for k in wordmap ] keys.sort(key = lambda x: (x.lower(), x)) import struct pc = self.progress(len(wordmap)) position = 0 with open(mainname + '.idx', 'wb') as f1: with open(mainname + '.dict', 'wb') as f2: for word in keys: pc.next() f1.write(word.encode('utf-8', 'ignore') + b'\x00') text = wordmap[word].encode('utf-8', 'ignore') f1.write(struct.pack('>II', position, len(text))) f2.write(text) position += len(text) with open(mainname + '.ifo', 'wb') as f3: f3.write("StarDict's dict ifo file\nversion=2.4.2\n") f3.write('wordcount=%d\n'%len(wordmap)) f3.write('idxfilesize=%d\n'%f1.tell()) f3.write('bookname=%s\n'%title.encode('utf-8', 'ignore')) f3.write('author=\ndescription=\n') import datetime ts = datetime.datetime.now().strftime('%Y.%m.%d') f3.write('date=%s\nsametypesequence=m\n'%ts) pc.done() return True # 导出 mdict 的源文件 def export_mdict (self, wordmap, outname): keys = [ k for k in wordmap ] keys.sort(key = lambda x: x.lower()) size = len(keys) index = 0 pc = self.progress(size) with codecs.open(outname, 'w', encoding = 'utf-8') as fp: for key in keys: pc.next() word = key.replace('</>', '').replace('\n', ' ') text = wordmap[key].replace('</>', '') if not isinstance(word, unicode): word = word.decode('gbk') if not isinstance(text, unicode): text = text.decode('gbk') fp.write(word + '\r\n') for line in text.split('\n'): line = line.rstrip('\r') fp.write(line) fp.write('\r\n') index += 1 fp.write('</>' + ((index < size) and '\r\n' or '')) pc.done() return True # 导入mdx源文件 def import_mdict (self, filename, encoding = 'utf-8'): import codecs words = {} with codecs.open(filename, 'r', encoding = encoding) as fp: text = [] word = None for line in fp: line = line.rstrip('\r\n') if word is None: if line == '': continue else: word = line.strip() elif line.strip() != '</>': text.append(line) else: words[word] = '\n'.join(text) word = None text = [] return words # 直接生成 .mdx文件,需要 writemdict 支持: # https://github.com/skywind3000/writemdict def export_mdx (self, wordmap, outname, title, desc = None): try: import writemdict except ImportError: print('ERROR: can\'t import writemdict module, please install it:') print('https://github.com/skywind3000/writemdict') sys.exit(1) if desc is None: desc = u'Create by stardict.py' writer = writemdict.MDictWriter(wordmap, title = title, description = desc) with open(outname, 'wb') as fp: writer.write(fp) return True # 读取 .mdx 文件,需要 readmdict 支持: # https://github.com/skywind3000/writemdict (包含readmdict) def read_mdx (self, mdxname, mdd = False): try: import readmdict except ImportError: print('ERROR: can\'t import readmdict module, please install it:') print('https://github.com/skywind3000/writemdict') sys.exit(1) words = {} if not mdd: mdx = readmdict.MDX(mdxname) else: mdx = readmdict.MDD(mdxname) for key, value in mdx.items(): key = key.decode('utf-8', 'ignore') if not mdd: words[key] = value.decode('utf-8', 'ignore') else: words[key] = value return words # 导出词形变换字符串 def exchange_dumps (self, obj): part = [] if not obj: return None for k, v in obj.items(): k = k.replace('/', '').replace(':', '').strip() v = v.replace('/', '').replace(':', '').strip() part.append(k + ':' + v) return '/'.join(part) # 读取词形变换字符串 def exchange_loads (self, exchg): if not exchg: return None obj = {} for text in exchg.split('/'): pos = text.find(':') if pos < 0: continue k = text[:pos].strip() v = text[pos + 1:].strip() obj[k] = v return obj def pos_loads (self, pos): return self.exchange_loads(pos) def pos_dumps (self, obj): return self.exchange_dumps(obj) # 返回词性 def pos_detect (self, word, pos): word = word.lower() if pos == 'a': if word in ('a', 'the',): return (u'冠词', 'art.') if word in ('no', 'every'): return (u'形容词', 'adj.') return (u'代词', 'pron.') if pos in self._pos: return self._pos[pos] return (u'未知', 'unknow') # 返回词形比例 def pos_extract (self, data): if 'pos' not in data: return None position = data['pos'] if not position: return None part = self.pos_loads(position) result = [] for x in part: result.append((x, part[x])) result.sort(reverse = True, key = lambda t: int(t[1])) final = [] for pos, num in result: mode = self.pos_detect(data['word'], pos) final.append((mode, num)) return final # 设置详细内容,None代表删除 def set_detail (self, dictionary, word, item, value, create = False): data = dictionary.query(word) if data is None: if not create: return False dictionary.register(word, {}, False) data = {} detail = data.get('detail') if not detail: detail = {} if value is not None: detail[item] = value elif item in detail: del detail[item] if not detail: detail = None dictionary.update(word, {'detail': detail}, False) return True # 取得详细内容 def get_detail (self, dictionary, word, item): data = dictionary.query(word) if not data: return None detail = data.get('detail') if not detail: return None return detail.get(item, None) # load file and guess encoding def load_text (self, filename, encoding = None): content = None try: content = open(filename, 'rb').read() except: return None if content[:3] == b'\xef\xbb\xbf': text = content[3:].decode('utf-8') elif encoding is not None: text = content.decode(encoding, 'ignore') else: text = None guess = [sys.getdefaultencoding(), 'utf-8'] if sys.stdout and sys.stdout.encoding: guess.append(sys.stdout.encoding) for name in guess + ['gbk', 'ascii', 'latin1']: try: text = content.decode(name) break except: pass if text is None: text = content.decode('utf-8', 'ignore') return text # csv 读取,自动检测编码 def csv_load (self, filename, encoding = None): text = self.load_text(filename, encoding) if not text: return None import csv if sys.version_info[0] < 3: import cStringIO sio = cStringIO.StringIO(text.encode('utf-8', 'ignore')) else: import io sio = io.StringIO(text) reader = csv.reader(sio) output = [] if sys.version_info[0] < 3: for row in reader: output.append([ n.decode('utf-8', 'ignore') for n in row ]) else: for row in reader: output.append(row) return output # csv保存,可以指定编码 def csv_save (self, filename, rows, encoding = 'utf-8'): import csv ispy2 = (sys.version_info[0] < 3) if not encoding: encoding = 'utf-8' if sys.version_info[0] < 3: fp = open(filename, 'wb') writer = csv.writer(fp) else: fp = open(filename, 'w', encoding = encoding, newline = '') writer = csv.writer(fp) for row in rows: newrow = [] for n in row: if isinstance(n, int) or isinstance(n, long): n = str(n) elif isinstance(n, float): n = str(n) elif not isinstance(n, bytes): if (n is not None) and ispy2: n = n.encode(encoding, 'ignore') newrow.append(n) writer.writerow(newrow) fp.close() return True # 加载 tab 分割的 txt 文件, 返回 key, value def tab_txt_load (self, filename, encoding = None): words = {} content = self.load_text(filename, encoding) if content is None: return None for line in content.split('\n'): line = line.strip('\r\n\t ') if not line: continue p1 = line.find('\t') if p1 < 0: continue word = line[:p1].rstrip('\r\n\t ') text = line[p1:].lstrip('\r\n\t ') text = text.replace('\\n', '\n').replace('\\r', '\r') words[word] = text.replace('\\t', '\t').replace('\\\\', '\\') return words # 保存 tab 分割的 txt文件 def tab_txt_save (self, filename, words, encoding = 'utf-8'): with codecs.open(filename, 'w', encoding = encoding) as fp: for word in words: text = words[word] text = text.replace('\\', '\\\\').replace('\n', '\\n') text = text.replace('\r', '\\r').replace('\t', '\\t') fp.write('%s\t%s\r\n'%(word, text)) return True # Tab 分割的 txt文件释义导入 def tab_txt_import (self, dictionary, filename): words = self.tab_txt_load(filename) if not words: return False pc = self.progress(len(words)) for word in words: data = dictionary.query(word) if not data: dictionary.register(word, {'translation':words[word]}, False) else: dictionary.update(word, {'translation':words[word]}, False) pc.inc(0) pc.next() dictionary.commit() pc.done() return True # mdx-builder 使用writemdict代替MdxBuilder处理较大词典(需64为python) def mdx_build (self, srcname, outname, title, desc = None): print('loading %s'%srcname) t = time.time() words = self.import_mdict(srcname) t = time.time() - t print(u'%d records loaded in %.3f seconds'%(len(words), t)) print(u'building %s'%outname) t = time.time() self.export_mdx(words, outname, title, desc) t = time.time() - t print(u'complete in %.3f seconds'%t) return True # 验证单词合法性 def validate_word (self, word, asc128): alpha = 0 for ch in word: if ch.isalpha(): alpha += 1 if ord(ch) >= 128 and asc128: return False elif (not ch.isalpha()) and (not ch.isdigit()): if ch not in ('-', '\'', '/', '(', ')', ' ', ',', '.'): if ch not in ('&', '!', '?', '_'): if len(word) == 5 and word[2] == ';': continue if not ord(ch) in (239, 65292): # print 'f1', ord(ch), word.find(ch) return False if alpha == 0: if not word.isdigit(): return False if word[:1] == '"' and word[-1:] == '"': return False if word[:1] == '(' and word[-1:] == ')': if word.count('(') == 1: return False if word[:3] == '(-)': return False for ch in ('<', '>', '%', '*', '@', '`'): if ch in word: return False if '%' in word or '\\' in word or '`' in word: return False if word[:1] in ('$', '@'): return False if len(word) == 1: x = ord(word) if (x < ord('a')) and (x > ord('z')): if (x < ord('A')) and (x > ord('Z')): return False if (' ' not in word) and ('-' not in word): if ('?' in word) or ('!' in word): return False if word.count('?') >= 2: return False if word.count('!') >= 2: return False if '---' in word: return False try: word.lower() except UnicodeWarning: return False return True #---------------------------------------------------------------------- # Helper instance #---------------------------------------------------------------------- tools = DictHelper() # 根据文件名自动判断数据库类型并打开 def open_dict(filename): if isinstance(filename, dict): return DictMySQL(filename) if filename[:8] == 'mysql://': return DictMySQL(filename) if os.path.splitext(filename)[-1].lower() in ('.csv', '.txt'): return DictCsv(filename) return StarDict(filename) # 字典转化,csv sqlite之间互转 def convert_dict(dstname, srcname): dst = open_dict(dstname) src = open_dict(srcname) dst.delete_all() pc = tools.progress(len(src)) for word in src.dumps(): pc.next() data = src[word] x = data['oxford'] if isinstance(x, int) or isinstance(x, long): if x <= 0: data['oxford'] = None elif isinstance(x, str) or isinstance(x, unicode): if x == '' or x == '0': data['oxford'] = None x = data['collins'] if isinstance(x, int) or isinstance(x, long): if x <= 0: data['collins'] = None elif isinstance(x, str) or isinstance(x, unicode): if x == '' or x == '0': data['collins'] = None dst.register(word, data, False) dst.commit() pc.done() return True # 从 ~/.local/share/stardict 下面打开词典 def open_local(filename): base = os.path.expanduser('~/.local') for dir in [base, base + '/share', base + '/share/stardict']: if not os.path.exists(dir): os.mkdir(dir) fn = os.path.join(base + '/share/stardict', filename) return open_dict(fn) #---------------------------------------------------------------------- # testing #---------------------------------------------------------------------- if __name__ == '__main__': db = os.path.join(os.path.dirname(__file__), 'test.db') my = {'host':'??', 'user':'skywind', 'passwd':'??', 'db':'skywind_t1'} def test1(): t = time.time() sd = StarDict(db, False) print(time.time() - t) # sd.delete_all(True) print(sd.register('kiss2', {'definition':'kiss me'}, False)) print(sd.register('kiss here', {'definition':'kiss me'}, False)) print(sd.register('Kiss', {'definition':'BIG KISS'}, False)) print(sd.register('kiss', {'definition':'kiss me'}, False)) print(sd.register('suck', {'definition':'suck me'}, False)) print(sd.register('give', {'definition':'give me', 'detail':[1,2,3]}, False)) sd.commit() print('') print(sd.count()) print(sd.query('kiSs')) print(sd.query(2)) print(sd.match('kis', 10)) print('') print(sd.query_batch(['give', 2])) print(sd.match('kisshere', 10, True)) return 0 def test2(): t = time.time() dm = DictMySQL(my, init = True) print(time.time() - t) # dm.delete_all(True) print(dm.register('kiss2', {'definition':'kiss me'}, False)) print(dm.register('kiss here', {'definition':'kiss me'}, False)) print(dm.register('Kiss', {'definition':'kiss me'}, False)) print(dm.register('kiss', {'definition':'BIG KISS'}, False)) print(dm.register('suck', {'definition':'suck me'}, False)) print(dm.register('give', {'definition':'give me'}, False)) print(dm.query('kiss')) print(dm.match('kis')) print('') print(dm.query('KiSs')) print(dm.query_batch(['give', 2, 9])) print('count: %d'%len(dm)) print(dm.match('kisshere', 10, True)) return 0 def test3(): csvname = os.path.join(os.path.dirname(__file__), 'test.csv') dc = DictCsv(csvname) dc.delete_all() print(dc.register('kiss2', {'definition':'kiss me'}, False)) print(dc.register('kiss here', {'definition':'kiss me'}, False)) print(dc.register('Kiss', {'definition':'kiss me'}, False)) print(dc.register('kiss', {'definition':'kiss me'}, False)) print(dc.register('suck', {'definition':'suck me'}, False)) print(dc.register('word', {'definition':'WORD WORD'}, False)) print(dc.query('kiss')) print('') dc.remove('kiss2') print(dc.match('kis')) print(dc.match('kisshere', 10, True)) dc.commit() return 0 def test4(): lemma = LemmaDB() t = time.time() lemma.load('lemma.en.txt') print('load in %s seconds'%str(time.time() - t)) print(len(lemma)) for word in ('be', 'give', 'see', 'take'): print('%s -> %s'%(word, ','.join(lemma.get(word)))) for word in ('gave', 'taken', 'looked', 'teeth', 'speak'): print('%s <- %s'%(word, ','.join(lemma.word_stem(word)))) lemma.save('output.txt') return 0 def test5(): print(tools.validate_word('Hello World', False)) test3()
A Seattle Sounders FC spokesman told Seattle Times reporter Joshua Mayers on Saturday evening that more than 43,000 tickets have been sold for Sunday's Western Conference Championship Second Leg between Seattle and the LA Galaxy. At the present capacity, the match would not only set a Sounders FC postseason attendance record, but also be the highest attended playoff game -- that was not a final -- in MLS history, The prospect of the number increasing dramatically through a walk-up crowd is unlikely as the weather, a bridge closure as well as LA's 3-0 victory in the first leg are expected to take a toll on attendance.
'Silent Hill: Revelation 3D' Gives You a New Clip and Image See the new image up above? That's just one of many creepy frames from the sequel to the popular and twisted 2006 video game movie 'Silent Hill.' But is it just as creepy and nerve-wracking as the original? Judge for yourself with this brand new clip from the movie that was just released. 'Silent Hill: Revelation 3D' is the follow-up to the 2006 movie and stars Adelaide Clemens and Sean Bean. Carrie-Anne Moss, Malcolm McDowell, and Martin Donovan also star. The official synopsis is below: Based on the groundbreaking video game franchise, SILENT HILL: REVELATION 3D is the sequel to the hit film SILENT HILL, which opened to number one at the U.S. box office and took in nearly $100 million at the worldwide box office. Featuring an unparalleled horror experience, Konami’s Silent Hill franchise has captivated fans for more than a decade and has spawned a hit comic book series, graphic novels, collectible action figures and numerous soundtracks from rock bands. In SILENT HILL: REVELATION 3D, Heather Mason (Clemens) and her father (Bean) have been on the run, always one step ahead of dangerous forces that she doesn’t fully understand. On the eve of her 18th birthday, plagued by horrific nightmares and the disappearance of her father, Heather discovers she’s not who she thinks she is. The revelation leads her deeper into a demonic world that threatens to trap her forever. Take a look at the following clip. 'Silent Hill: Revelation 3D' opens in theaters on October 26th, 2012.
Hyperthermia-associated carboplatin resistance: differential role of p53, HSF1 and Hsp70 in hepatoma cells. Due to substantial technical improvements, clinical application of heat as a co-adjuvant in cancer treatment is acquiring new interest. The effect of hyperthermia on hepatoma cell lines Hep3B (p53 defective) and HepG2 (p53 wild type) when investigated led to an interesting observation that Hep3B cells are more susceptible to heat stress than HepG2 cells. In addition, heat-induced carboplatin resistance was observed in HepG2 cells only. To investigate the reasons, heat shock response was explored and it was observed that heat stress augmented heat shock protein 70 (Hsp70) expression levels in HepG2 and not in Hep3B cells. Furthermore, in HepG2 cells, induced Hsp70 is regulated by both p53 and heat shock transcription factor 1 (HSF1) wherein HSF1 levels are modulated by p53. The data implies that Hep3B are more susceptible to death upon heat stress than HepG2 cells because of non-induction of Hsp70. In addition, it was observed that inhibition of heat-induced p53/HSF1 diminishes Hsp70 levels, thereby restoring the sensitivity of heat-stressed HepG2 cells to carboplatin-triggered cell death. Collectively, the present study establishes interplay of p53, HSF1, and Hsp70 upon heat stress in HepG2 cells and also defines novel strategies to overcome constraints of utility of hyperthermia in cancer therapy through p53/HSF1-targeted therapeutic intervention.
J-S73011-18 NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37 COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF : PENNSYLVANIA Appellee : : v. : : JAMES R. TURNER, JR. : : Appellant : No. 294 WDA 2018 Appeal from the PCRA Order January 30, 2018 In the Court of Common Pleas of Beaver County Criminal Division at No(s): CP-04-CR-0001944-2014 BEFORE: GANTMAN, P.J., BENDER, P.J.E., and OLSON, J. MEMORANDUM BY GANTMAN, P.J.: FILED: March 11, 2019 Appellant, James R. Turner, Jr., appeals from the order entered in the Beaver County Court of Common Pleas, which denied his first petition filed under the Post Conviction Relief Act (“PCRA”), at 42 Pa.C.S.A. §§ 9541-9546. We affirm. The relevant facts and procedural history of this case are as follows. On the night of August 14, 2014, Appellant and his girlfriend (“Victim”) went to a bar. After a few drinks, Victim left the bar and did not return, leaving Appellant behind. Appellant obtained a ride to Victim’s home and confronted Victim about leaving him at the bar. In the course of this confrontation, Appellant repeatedly stabbed Victim in multiple parts of her body. Appellant left Victim’s home, taking her car and the knife he used to stab her. Later, Appellant discarded the knife in the Ohio River. The stab wounds to Victim’s J-S73011-18 left carotid artery and vein caused her to bleed out slowly and die. Appellant surrendered to police the next day, claiming he had acted in self-defense because Victim attacked him first with a knife. Evidence indicated Appellant was intoxicated when he attacked Victim, and Appellant claimed he was also intoxicated when he gave his statement to the police. On the day of Appellant’s arrest, the police obtained a search warrant to collect blood samples from Appellant to compare to blood samples obtained from the scene of the attack. The Commonwealth utilized the blood samples for DNA analysis and the crime lab later destroyed them pursuant to lab protocol. On February 12, 2016, a jury convicted Appellant of third-degree murder. The court sentenced Appellant on March 3, 2016, to twenty (20) to forty (40) years’ imprisonment. On March 11, 2016, Appellant timely filed post-sentence motions, followed by numerous pro se and counseled filings and extensions of time. The court denied Appellant’s post-sentence motions on November 2, 2016. On November 23, 2016, Appellant filed a petition for appointment of new counsel. On December 2, 2016, Appellant’s prior counsel timely filed a notice of appeal on Appellant’s behalf. Appellant filed a motion to withdraw the notice of appeal on December 9, 2016. Following a hearing on the same day, the court allowed Appellant to discontinue his direct appeal and appointed conflict counsel to pursue a PCRA petition instead. Appellant first filed a pro se petition, and new counsel filed an amended PCRA petition on June 19, 2017. -2- J-S73011-18 At a PCRA hearing on September 25-26, 2017, the court heard testimony from Appellant’s sister, brother-in-law, son, and trial counsel. Also at the PCRA hearing, Appellant made an oral motion to reinstate his direct appeal rights nunc pro tunc, which the court denied on December 5, 2017. On January 30, 2018, the court also denied PCRA relief. Appellant filed a pro se notice of appeal on February 12, 2018. On February 15, 2018, the court ordered Appellant to file a concise statement of errors complained of on appeal, pursuant to Pa.R.A.P. 1925(b). Counsel timely filed an amended notice of appeal on February 26, 2018, and a timely Rule 1925(b) statement on March 8, 2018. Appellant raises the following issues on appeal: 1. WHETHER THE PRIOR LEGAL TRIAL COUNSEL WAS INEFFECTIVE FOR FAILING TO TAKE ACTION TO PRESERVE, OBTAIN AND ANALYZE (A) THE SAMPLE OF [APPELLANT’S] BLOOD SEIZED BY POLICE IMMEDIATELY AFTER THE SEIZURE OF [APPELLANT’S] INCULPATORY STATEMENT TO POLICE AND (B) THE FOOTAGE OF VIDEO SURVEILLANCE OF [APPELLANT] ENTERING AND EXITING THE POLICE STATION IMMEDIATELY BEFORE AND AFTER THE POLICE SEIZURE OF [APPELLANT’S] INCULPATORY STATEMENT FOR ADMISSION TO CORROBORATE [APPELLANT’S] INTOXICATED AND CONFUSED STATE ON THE ISSUE OF WHETHER IT WAS A KNOWING, INTELLIGENT AND VOLUNTARY STATEMENT? 2. WHETHER PRIOR LEGAL TRIAL COUNSEL WAS INEFFECTIVE FOR FAILING TO MARSHAL AND INTRODUCE, DURING BOTH (A) A HEARING TO SUPPRESS AND (B) TRIAL, AVAILABLE EVIDENCE FROM AT LEAST THREE WITNESSES IN THE COMPANY OF [APELLANT] IMMEDIATELY PRIOR TO THE POLICE SEIZURE OF [APPELLANT’S] STATEMENT AS TO [APPELLANT’S] INTOXICATED AND CONFUSED STATE ON THE ISSUE OF -3- J-S73011-18 WHETHER IT WAS A KNOWING, INTELLIGENT AND VOLUNTARY STATEMENT? 3. WHETHER PRIOR LEGAL TRIAL COUNSEL WAS INEFFECTIVE FOR FAILING TO MOVE TO SUPPRESS OR PROHIBIT THE EVIDENTIARY USE AT TRIAL OF ANY EVIDENCE INVOLVING THE ANALYSIS OF [APPELLANT’S] BLOOD SEIZED BY POLICE FOR A VIOLATION OF [APPELLANT’S] FEDERAL AND STATE CONSTITUTIONAL DUE PROCESS RIGHTS OF MEANINGFUL OPPORTUNITY TO PRESENT A DEFENSE? 4. WHETHER PRIOR LEGAL TRIAL COUNSEL WAS INEFFECTIVE FOR FAILING TO OBJECT TO ALL TESTIMONY OF THE COMMONWEALTH FORENSIC PATHOLOGIST NOT EXPLICITLY CONTAINED WITHIN HIS EXPERT AUTOPSY REPORT, ESPECIALLY HIS EXPERT OPINIONS THAT THE DECEDENT WAS UNCONSCIOUS AND PRONE WHILE STABBED MULTIPLE TIMES? 5. WHETHER PRIOR LEGAL TRIAL COUNSEL WAS INEFFECTIVE FOR FAILING TO MARSHAL, LOCATE, SECURE THE ATTENDANCE OF, AND INTRODUCE TESTIMONY OF AVAILABLE WITNESSES AND OTHER CHARACTER EVIDENCE OF THE DECEDENT’S VIOLENT PROPENSITIES IN GENERAL AND A SPECIFIC STATEMENT OF INTENTION OF VIOLENCE TOWARD [APPELLANT]? 6. WHETHER PRIOR LEGAL TRIAL COUNSEL WAS INEFFECTIVE FOR FAILING TO REQUEST A JURY INSTRUCTION OF AN ADVERSE INFERENCE FROM THE DESTRUCTION OF [APPELLANT’S] BLOOD SEIZED BY POLICE AND THE POLICE VIDEO AS IT RELATES TO BOTH (A) WHETHER [APPELLANT’S] INCULPATORY STATEMENT TO POLICE WAS KNOWING, INTELLIGENT AND VOLUNTARY, AND (B) WHETHER [APPELLANT] WAS CAPABLE OF FORMING A SPECIFIC INTENT TO KILL? 7. WHETHER PRIOR LEGAL TRIAL COUNSEL WAS INEFFECTIVE FOR FAILING TO REQUEST A JURY INSTRUCTION TO THE EFFECT THAT A DEFENDANT CANNOT BE FOUND TO HAVE ACTED WITH MALICE UNLESS IT FINDS THAT THE VICTIM’S INJURIES WERE CAUSED BY THE DEFENDANT’S INTENTIONAL AND VOLUNTARY -4- J-S73011-18 ACTION(S)−INVOLUNTARY ACTION IS NOT SUFFICIENT? (Appellant’s Brief at 4-5).1 Our standard of review of the denial of a PCRA petition is limited to examining whether the evidence of record supports the court’s determination and whether its decision is free of legal error. Commonwealth v. Conway, 14 A.3d 101 (Pa.Super. 2011), appeal denied, 612 Pa. 687, 29 A.3d 795 (2011). This Court grants great deference to the findings of the PCRA court if the record contains any support for those findings. Commonwealth v. Boyd, 923 A.2d 513 (Pa.Super. 2007), appeal denied, 593 Pa. 754, 932 A.2d 74 (2007). We give no such deference, however, to the court’s legal conclusions. Commonwealth v. Ford, 44 A.3d 1190 (Pa.Super. 2012). Traditionally, credibility issues are resolved by the trier of fact who had the opportunity to observe the witnesses’ demeanor. Commonwealth v. Abu-Jamal, 553 Pa. 485, 720 A.2d 79 (1998), cert. denied, 528 U.S. 810, 120 S.Ct. 41, 145 L.Ed.2d 38 (1999). Where the record supports the PCRA court’s credibility resolutions, they are binding on this Court. Id. Pennsylvania law presumes counsel has rendered effective assistance. ____________________________________________ 1 In his PCRA petitions, Appellant failed to raise any claim of trial counsel’s ineffectiveness for failure to move to suppress or preclude the Commonwealth’s use of any evidence involving the analysis of Appellant’s blood sample. Thus, Appellant’s third issue is waived. See Commonwealth v. Williams, 909 A.2d 383, 386 (Pa.Super. 2006) (holding issues not raised in PCRA petition are waived on appeal); Commonwealth v. Brown, 767 A.2d 576, 585 (Pa.Super. 2001) (stating same). -5- J-S73011-18 Commonwealth v. Williams, 597 Pa. 109, 950 A.2d 294 (2008). When asserting a claim of ineffective assistance of counsel, the petitioner is required to demonstrate that: (1) the underlying claim is of arguable merit; (2) counsel had no reasonable strategic basis for his action or inaction; and, (3) but for the errors and omissions of counsel, there is a reasonable probability that the outcome of the proceedings would have been different. Commonwealth v. Kimball, 555 Pa. 299, 724 A.2d 326 (1999). The failure to satisfy any prong of the test for ineffectiveness will cause the claim to fail. Williams, supra. “The threshold inquiry in ineffectiveness claims is whether the issue/argument/tactic which counsel has foregone and which forms the basis for the assertion of ineffectiveness is of arguable merit….” Commonwealth v. Pierce, 537 Pa. 514, 524, 645 A.2d 189, 194 (1994). “Counsel cannot be found ineffective for failing to pursue a baseless or meritless claim.” Commonwealth v. Poplawski, 852 A.2d 323, 327 (Pa.Super. 2004). Once this threshold is met we apply the ‘reasonable basis’ test to determine whether counsel’s chosen course was designed to effectuate his client’s interests. If we conclude that the particular course chosen by counsel had some reasonable basis, our inquiry ceases and counsel’s assistance is deemed effective. Pierce, supra at 524, 645 A.2d at 194-95 (internal citations omitted). Prejudice is established when [an appellant] demonstrates that counsel’s chosen course of action had an adverse effect on the outcome of the proceedings. The [appellant] must show that there is a reasonable probability that, but for counsel’s unprofessional errors, the result of the proceeding would have been different. A reasonable probability is a probability sufficient to undermine confidence in the -6- J-S73011-18 outcome. In [Kimball, supra], we held that a “criminal [appellant] alleging prejudice must show that counsel’s errors were so serious as to deprive the defendant of a fair trial, a trial whose result is reliable.” Commonwealth v. Chambers, 570 Pa. 3, 21-22, 807 A.2d 872, 883 (2002) (some internal citations and quotation marks omitted). Regarding Appellant’s issues one, two, four, five, and seven, after a thorough review of the record, the briefs of the parties, the applicable law, and the well-reasoned opinion of the Honorable James J. Ross, we conclude these issues merit no relief. The PCRA court opinion comprehensively discusses and properly disposes of the questions presented (See PCRA Court Opinion, dated January 30, 2018, at 20-29) (finding: Appellant’s complaints of trial counsel’s ineffectiveness for failing to preserve, obtain, and analyze blood sample, to obtain surveillance video, and to request jury instruction on involuntariness defense lacked arguable merit and counsel’s strategy cannot be challenged simply by comparing in hindsight trial strategy employed with alternatives not pursued; claims of counsel’s failure to call Appellant’s relatives as witnesses, counsel’s failure to object to certain testimony of pathologist, and counsel’s failure to utilize evidence of Victim’s propensity for violence were explained by counsel’s reasonable trial strategy). Accordingly, as to issues one, two, four, five, and seven, we affirm on the basis of the PCRA court’s opinion. In Appellant’s remaining issue (six), Appellant argues trial counsel failed to request an adverse inference instruction relating to the destruction of -7- J-S73011-18 Appellant’s blood sample and the police station surveillance video. Appellant avers counsel should have requested an instruction specifically addressing the loss of this evidence to allow the jury to infer that the missing evidence would have been unfavorable to the Commonwealth and favorable to Appellant. Appellant alleges an adverse inference instruction could have partially mitigated counsel’s initial failure to obtain, preserve, and analyze the blood sample and to obtain the video. Appellant concludes this Court should “arrest judgment on the count of Murder−3° and grant him a new trial.” (See Appellant’s Brief at 47.) We disagree. “Under Brady [v. Maryland, 373 U.S. 83, 83 S.Ct. 1194, 10 L.Ed.2d 215 (1963)] and subsequent decisional law, a prosecutor has an obligation to disclose all exculpatory information material to the guilt or punishment of an accused, including evidence of an impeachment nature.” Commonwealth v. Roney, 622 Pa. 1, 22, 79 A.3d 595, 607 (2013), cert. denied, ___ U.S. ___, 135 S.Ct. 56, 190 L.Ed.2d 56 (2014). “To establish a Brady violation, an appellant must prove three elements: (1) the evidence at issue was favorable to the accused, either because it is exculpatory or because it impeaches; (2) the evidence was suppressed by the prosecution, either willfully or inadvertently; and (3) prejudice ensued.” Id. When the Commonwealth fails to preserve “potentially useful” evidence, as opposed to “materially exculpatory” evidence, no due process violation occurs unless the defendant can prove the Commonwealth acted in bad faith. Commonwealth v. -8- J-S73011-18 Chamberlain, 612 Pa. 107, 30 A.3d 381 (2011), cert. denied, 566 U.S. 986, 132 S.Ct. 2377, 182 L.Ed.2d 1017 (2012). “Potentially useful evidence is that of which no more can be said than that it could have been subjected to tests, the results of which might have exonerated the defendant.” Id. at 143, 30 A.3d at 402 (internal quotations marks omitted). Instantly, Appellant wanted to use both the blood sample and the police station video to show he was intoxicated when he gave his inculpatory statement to police. The video surveillance and the blood evidence obtained from Appellant at the time of his statement, however, were only “potentially useful,” as the evidence could have been subjected to tests that might have assisted in Appellant’s defense. See id. Because the evidence was potentially useful at best, Appellant was required to show that the Commonwealth acted in bad faith regarding the destruction of the evidence at issue. See id. Here, Appellant failed to submit any evidence that the Commonwealth acted in bad faith or to contradict the assertions that the video evidence was recycled in due course. Trial counsel indicated only that by the time he requested the video surveillance, it was no longer available. As for the blood samples, the Commonwealth utilized them for DNA analysis, whereas Appellant wanted the blood samples to show he was inebriated when he made his statement to the police. The crime lab, however, disposed of the blood samples pursuant to lab protocol, which provided for specimens to be retained for thirty days. The blood evidence might have been -9- J-S73011-18 “potentially useful” but, absent more, the evidence was not “materially exculpatory.” Appellant failed to prove any due process violation occurred as a result of the disposal of the blood evidence. See id. As to the potential to use the evidence to demonstrate Appellant’s incapacity to form the specific intent to kill, we observe the jury convicted Appellant of third-degree murder, which does not require the specific intent to kill. See Commonwealth v. Clemons, ___ A.3d ___, 2019 WL 286565 (Pa. filed January 23, 2019) (reiterating voluntary intoxication for diminished capacity purposes serves only to reduce first-degree murder to third-degree murder); Commonwealth v. Reed, 583 A.2d 459 (Pa.Super. 1990), appeal denied, 528 Pa. 629, 598 A.2d 282 (1991) (explaining evidence of voluntary intoxication may reduce first-degree murder to third-degree murder, but cannot reduce third-degree murder to manslaughter). Appellant’s voluntary intoxication had already been used to mitigate the specific intent to kill. Thus, Appellant’s claim regarding an adverse inference instruction related to the surveillance video and blood samples lacks arguable merit. Because Appellant’s underlying claim lacks arguable merit, he fails to meet the first prong of the test for ineffective assistance of counsel. See Williams, supra; Kimball, supra; Pierce, supra. Therefore, counsel cannot be deemed on PCRA review as ineffective for failing to pursue a meritless claim and Appellant’s sixth issue warrants no relief. Accordingly, we affirm. Order affirmed. - 10 - J-S73011-18 Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 3/11/2019 - 11 - Circulated 02/22/2019 11:59 AM IN THE COURT OF COMMON PLEAS OF BEAVER COUNIY PENNSYLVANIA CRIMINAL DMSION COMMONWEALTH OF PENNSYLVANIA vs. No. 1944-2014 JAMES R. TURNER, JR. ROSS, J. January 30, 2018 MEMORANDUM OPINION INTRODUCTION Defendant, James R. Turner, Jr., was charged in this case with a general charge of homicide, and a jury trial was held on that charge before this Court in February, 2016. On February 12, 2016, the jury entered a guilty verdict of third degree murder against defendant. On March 3, 2016, this Court sentenced defendant to 20-40 years in a state correctional facility. Post-sentence motions were timely filed, and this Court addressed all post-sentence motions in an Opinion and Order dated November 2, 2016, which denied all of the points raised by defendant in his motions. On November 23, 2016, defendant filed a pro se petition requesting that the Court dismiss his trial counsel, that the Court appoint new counsel for him and that he be permitted to withdraw his direct appeal to the Pennsylvania Superior Court and pursue a Post-Conviction Relief Act (hereinafter "PCRA") petition instead. Trial counsel timely filed a notice of appeal with the Clerk of this Court on December 2, 2016. The Court ordered that defendant be transported from his state correctional facility and brought before this Court on December 9, 2016. At that hearing, the Court conducted a lengthy colloquy with defendant, advising him of all of his rights in connection with the direct appeal and the dangers associated with withdrawing the appeal and pursuing only a PCRA petition. After the colloquy was completed and defendant was given the opportunity to have private consultation with his trial counsel, defendant expressly stated that he understood all of his rights, that he desired his trial counsel withdraw his direct appeal and that he only desired that new counsel be appointed to pursue a PCRA petition. In light of the foregoing, this Court entered an Order on December 9, 2016, acknowledging that defendant wanted his direct appeal withdrawn, which was in fact done, and ordering that conflicts counsel be appointed to pursue a PCRA petition on defendant's behalf upon discontinuance of the direct appeal. By subsequent Order, the Court appointed conflicts counsel, who was permitted to supplement the PCRA petition previously filed by the defendant pro se. The Court . scheduled a hearing on the PCRA petition for Monday, September 25 and Tuesday, September 26, 2017. At that hearing, the Court received evidence and testimony with regard to the issues raised in the PCRA petitions. Also at that hearing, there was a discussion concerning defendant's waiver of his direct appeal rights before the Court on December 9, 2016. At that hearing, new counsel for defendant made an oral motion for reinstatement of the direct appeal rights. The Court permitted both counsel to brief that issue, and the Court received the briefs of the parties. After considering the briefs of the parties and applicable law, the Court addressed the issue of reinstatement of defendant's appeal rights in a Memorandum Opinion and Order of December 5, 2017. In that Opinion and Order, the Court denied the oral motion for reinstatement of defendant's appeal rights, finding that defendant made a knowing, voluntary and intentional decision to withdraw those rights. In this Memorandum Opinion, the Court will address the defendant's PCRA petitions. Based upon the discussion below, the Court will deny the petitions. TESTIMONY ATTRIAL At the trial of this case, Melissa Lay testified as a Commonwealth witness. She testified that her mother was Patricia Thompson, who went out for drinks in the evening hours of August 14, 2014. (See pp. 55-57 of Vol. III of trial transcript). Ms. Lay came home in the early morning hours of August 15, 2014 and found her mother dead on the kitchen floor with a pool of blood surrounding her. (See pp. 67-69 of Vol. III of trial transcript). Ms. Lay testified that there were signs of a struggle in the kitchen (See p. 85 of Vol. Ill of trial transcript), and Ms. Lay called 911. (See pp. 78-79 of Vol. III of trial transcript). Captain Douglas Edgel of the Aliquippa Police Department testified as a Commonwealth witness. Captain Edgel testified that he received a call from 911 and arrived at the scene. Upon arrival, he found the body of Patricia Thompson dead in the kitchen area of the residence. (See pp.95-98 of Vol. III of trial transcript). Another Commonwealth witness, Tyrone Reddick, testified that he was at Dave's Bar in Aliquippa during the evening hours of August 14, 2014. Defendant James Turner requested a ride home, and Mr. Reddick drove Mr. Turner to Patricia Thompson's residence. On the ride home, defendant Turner stated "I should beat that bitch's ass." (Seep. 13 of Vol. IV of trial transcript). Dr. James Smith was called as a Commonwealth witness. He is a forensic pathologist, who testified that the cause of Patricia Thompson's death was blood loss. (See p. 103 of Vol. V of trial transcript). Dr. Smith testified that there were eight stab wounds to Ms. Thompson's neck, all contained within a limited area. (See pp. 105-06 of -3- Vol V of trial transcript). While testifying and referring to autopsy photographs, specifically Exhibit 62, Dr. Smith stated as follows: Sometimes we see areas where it appears as though a knife may have penetrated the same wound twice or a knife sometimes is partially withdrawn and then plunged down again causing the wound to be much bigger than the width of the blade of the knife. (See pp. 105-106 of Vol. V of trial transcript). Dr. Smith further testified that the victim was unconscious at the time she was stabbed based upon his assessment of the evidence. (See p. 107 of Vol. V of trial transcript). Dr. Smith found no defensive wounds on the victim during the autopsy or through the photographs. � p. 108 of Vol. V of trial transcript). Dr. Smith further testified that the assailant was moving around and stabbing from different directions. He specifically stated that any one of the wounds could have been fatal. Dr. Smith also testified that there were stab wounds to the carotid artery, which supplies blood to the brain. (See p. 109 of Vol. V of trial transcript). He opined that these wounds were inflicted while the victim was unconscious.I'See p. 107 of Vol. V, Trial Transcript). When referring to Exhibit 63 (a photograph of the victim), Dr. Smith noted three stab wounds to the victim's scalp, which were not life threatening. (Seep. 112 of Vol. V of trial transcript). Referring to Exhibit 65 (a photograph), Dr. Smith noted two wounds to the back of the victim which were superficial slashing wounds. (Seep. 115 of Vol. V of trial transcript). Dr. Smith also referred to Exhibit 62 (a photograph) and noted blunt force trauma behind Patricia Thompson's left eye. (Seep. 117of Vol. V of trial transcript). Dr. Smith noted blunt force trauma to the victim's ear when reviewing Exhibit 69 (a photograph). (Seep. 122 of Vol V of trial transcript). Finally, Dr. Smith testified that the cause of Patricia Thompson's death was bleeding from the carotid artery secondary to knife wounds. According to Dr. Smith's testimony, the "manner of death was homicide." � p. 124 of Vol. Vof trial transcript). The defendant testified in his own behalf at trial. He testified that his wife died in 2013 and that he moved around that time from Oklahoma City, Oklahoma, to Aliquippa. In 2014, Mr. Turner established a relationship with Patricia Thompson. � p. 170 of Vol. V of trial transcript). Mr. Turner stated that he lived with Patricia Thompson at her Aliquippa residence while he restored a house of his own in Aliquippa. (S�e pp. 176-77 of Vol. V of trial transcript). Turner stated that on the evening of August 14, 2014, he went to Dave's Bar in Aliquippa with Patricia Thompson. (See p. 186 of Vol. V of trial transcript). He went on to state that both he and the victim, Patricia Thompson, had drinks at Dave's Bar and that the victim left Dave's Bar and did not return. Mr. Turner was left behind. (See pp. 186-88 of Vol. V of trial transcript). Mr. Turner confirmed that Tyrone Reddick took him to Patricia Thompson's home, but he cannot recall the time that he went there. � p. 190 of Vol. V of trial transcript). Defendant Turner stated that when he got home, Patricia Thompson was sitting at the kitchen table and smoking crack cocaine. � p. 193 of Vol. V of trial transcript). Defendant Turner claims that Patricia Thompson attacked him in the kitchen when she came at him with a knife. (See p. 197 of Vol. V of trial transcript). Turner stated that there was a struggle during which he wrestled the knife from the victim, and both be and the victim fell to the floor. Mr. Turner admitted to stabbing Patricia Thompson in the back. � pp. 199-204 of Vol. V of trial transcript). -5- Turner stated that he then left the residence, taking the knife and Patricia Thompson's car, and traveled to the North Side of Pittsburgh to see a friend. (See pp. 205-06 of Vol. V of trial transcript). Tomer testified that he was not able to reach the friend in Pittsburgh and began to drive back to Aliquippa. � pp. 207-08 of Vol. V of trial transcript). Mr. Turner stated that on his way back to Aliquippa, he ran out of gas in Sewickley, Pennsylvania, in the morning hours of August 15 and began to walk to his sister's residence in Moon Township. While walking across the Sewickley Bridge, he threw a towel that he was carrying and the knife into the Ohio River and continued to walk to his sister's residence, where he showered. � pp. 209-11 of Vol. V of trial transcript). When questioned about the struggle, defendant Turner stated that he acted in self-defense because he believed he would be killed. � pp. 13-14 of Vol. VI of trial transcript). On cross-examination, defendant Turner conceded that he did not seek help for the victim after the incident. � p. 37 of Vol. VI of trial transcript). Also on cross- examination, Turner confirmed that he threw the knife off the bridge into the Ohio River.� p. 39 of Vol. VI of trial transcript). During the jury charge, the Court charged the jury, at page 45 of Vol. VII of the trial transcript, that it could find that the use of a deadly weapon to a vital organ of the body can supply the requisite malice for a conviction on third degree murder. The Court defined malice for the jury as taking action while consciously disregarding a serious risk, thereby demonstrating an extreme indifference to the value of human life. (See p. 44 of Vol. VII of trial transcript). The jury returned a verdict of guilty on third degree murder on February 12, 2016. -6- FACTS AND EVIDENCE ADDUCED AT THE PCRA HEARING HELD ON SEPTEMBER 25 and 26, 2017 The Court conducted a hearing on defendant's PCRA petitions on Monday, September 25 and Tuesday, September 26, 2017. There were multiple witnesses who testified at that hearing. The Court will set forth the relevant testimony by each witness in separate subsections below. 1. Lori Turner-Williams Lori Turner-Williams is the defendant's sister. She lives in Moon Township and is employed by Allegheny County. � pp. 12-13 of Vol. I, PCRA transcript). She confirmed that the defendant was at her residence on August 15, 2014, the date of the incident in question. (See p. 16 of Vol. I, PCRA transcript). Ms. Turner arrived home from work at around 1;00 p.m. and found the defendant sleeping on the couch in her house. (Seep. 19 of Vol. I, PCRA transcript). She saw a pill bottle on the table and once the defendant woke up, he appeared intoxicated/disoriented.� pp. 20-21 of Vol. I, PCRA transcript). Ms. Williams testified that she and her husband, Major Williams, drove the defendant from her residence in Moon Township to his residence in Aliquippa, Beaver County, on August 15, 2014. En route to the defendant's residence, they stopped to buy him a 40 oz. beer. Ms. Williams testified that she made no complaints about buying him beer, even though the defendant was intoxicated and disoriented. �pp. 24-25 of Vol. I, PCRA transcript). Ms. Williams testified that after she and her husband dropped defendant off at his residence, she went to her daughter's home in Aliquippa, stayed there for a while and never saw the defendant again that day. (See pp. 25-26 of Vol. I, PCRA transcript). Williams stated that she never spoke to the defense lawyers about what she saw. � p. 27 of Vol. I, PCRA transcript). Ms. Williams further stated that she was available to testify throughout the proceedings in this case regarding her observations on August 15, 2014. (See p. 29 of Vol. I, PCRA transcript). She also testified that she heard the victim, Patricia Thompson, say on one occasion to the defendant, "You are not going to kill me, I'm going to kill you." (Seep. 30 of Vol. I, PCRA transcript). On cross-examination, Williams admitted that she never went to the lawyers to tell them what she saw. She was confronted with her signed statement to the police, which revealed that some of the things that she testified to were not in the police statement.� pp. 34-36 of Vol. I, PCRA transcript). She also admitted that she never went to the lawyers to tell them what she knew. � pp. 29 and 39 of Vol. I, PCRA transcript). Williams also admitted that police detectives questioned her on August 16, 2014. � p. 37 of Vol. I, PCRA transcript). 2. Major Williams Major Williams is the husband of Lori Turner-Williams and the brother-in-law of the defendant. He testified that he did not work on August 15, 2014. � p. 53 of Vol. I, PCRA transcript). Major Williams stated that the defendant came to his residence on that date, at which time the defendant looked stunned (See p. 55 of Vol. I, PCRA transcript). Mr. Williams testified that he was with the defendant throughout the day and that the defendant drank beer and took pills most of the day.� pp. 56-57 of Vol. I, PCRA transcript). According to Williams, the defendant was disoriented. (See p. 58 of Vol. I, PCRA transcript), Williams stated that, while the defendant was at his residence, he left to go to Pittsburgh to pick up his wife from work. She was to finish work at 1:00 p.m. that day. -8- The defendant was sleeping on the couch at the Williams' residence when Williams left. (See pp. 59-60 of Vol. I, PCRA transcript). Williams also testified that the defendant was high and exhibited slurred speech when he (Williams) returned from his trip to Pittsburgh. (See pp. 61-62 of Vol. I, PCRA transcript). Williams testified that he drove the defendant home on August 15, 2014 and en route bought him two 40 oz. beers. � p. 63 of Vol. I, PCRA transcript).1 Williams drove the defendant to a residence and picked him up at a later point in the day to take him to the Aliquippa police station. At the time he picked the defendant up, the defendant was still intoxicated according to Williams. � pp. 69-71 of Vol. I, PCRA transcript). Williams stated that the defendant was still drinking beer and taking pills at that time, and the defendant still exhibited signs of intoxication.� pp. 71-72 of Vol. I, PCRA transcript). Major Williams also testified that he was questioned by the detectives and told them that the defendant was intoxicated on the date of the incident.� p. 75 of Vol. I, PCRA transcript). Williams testified that he also heard the victim threaten the defendant, quoting the same words and the same incident as those used by his wife, namely that the victim said to the defendant, "You're not going to kill me, I'm going to kill you."� p. 77 of Vol. I, PCRA transcript). Williams stated he would have testified if called. � p. 78 of Vol. I, PCRA transcript). Finally, at the end of cross-examination, Major Williams became confrontational with the Assistant District Attorney and had to be escorted out of the courtroom by the Sheriff at the conclusion of his testimony. (See pp. 85-89 of Vol. I, PCRA transcript). 1 The Court notes that this testimony is inconsistent with the testimony of Lori Turner-Williams, who testified that only one 40 oz. beer was purchased. The Court questions why any rational person would buy an allegedly intoxicated person 80 oz. of beer. -9- 3. Jamie Tumer Jamie Turner is the defendant's son. � p. 94 of Vol. I, PCRA transcript). Jamie Turner stated that he was stopped by the Hopewell Police on August 15, 2014 and advised that he was a suspect in the murder. The police released him after discovering they had the wrong individual. � pp. 101-102 of Vol I, PCRA transcript). Jamie Turner accompanied Lori Turner-Williams and Major Williams, his aunt and uncle, to the defendant's residence on August 15th to pick him up and drive him to the police station. According to Turner, the defendant reeked of alcohol and was drinking beer. � pp. 108-09 of Vol. I, PCRA transcript). Jamie Turner stated that he had to help his father out of the house and to the car, because his father was stumbling, and had to help his father out of the car at the police station for the same reason.� pp. 110-12 of Vol. I, PCRA transcript). Jamie Turner stated that he told defense counsel about his father's condition and was willing to testify to that condition if called. (See pp. 116-17 of Vol. I, PCRA transcript). When confronted with a statement signed for present defense counsel at the PCRA proceeding, it was established on cross-examination that Jamie Turner did not say the same things in the statement. At this point it should be noted that Jamie Turner stated that he, his aunt and uncle, and the defendant were all in the car and they took the defendant to the police station. (See pp. 124-25 of Vol. I, PCRA transcript). This testimony should be compared and contrasted with the testimony of Lori Turner- Williams cited above, in which she stated that she stayed at her daughter's house while Major Williams left that residence to drive defendant to the police station, leaving her behind. She stated that she never saw the defendant again that day, but went to the police station later and learned that the defendant was already in the station. In other -10- words, she was not in the car when the defendant was taken to the police station by Major Williams. � pp. 25-26 of Vol. I, PCRA transcript). Major Williams also confirmed that Lori Turner-Williams was not in the car when the defendant was taken to the police station on August 15, 2014. � pp. 68-69 of Vol. I, PCRA transcript). 4. Frank Paganie Frank Paganie is an Assistant Beaver County Public Defender, who has worked in that office for six years. � p. 129 of Vol. I, PCRA transcript). He was assigned to represent the defendant and had his first meeting with the defendant at the Beaver County Jail shortly after the defendant's arrest. {Seep. 132 of Vol. I, PCRA transcript). At the time Mr. Paganie was assigned to this case, he had never handled a homicide case, but had tried 3-4 cases to jury verdict.� pp. 133-34 of Vol. I, PCRA transcript). There was a second attorney, William Braslawsce, who assisted Mr. Paganie. Early on in the case, after meeting with the defendant at the jail, the defense team determined that it was appropriate to pursue a self-defense theory. (Seep. 135 of Vol. I, PCRA transcript). Paganie requested discovery from the Commonwealth by discovery letter, which was admitted into evidence as defense Exhibit Cat the PCRA hearing.� pp. 138-40 of Vol. I, PCRA transcript). As a result of the discovery request, the defense received a tape recording of defendant's statement to the police on August 15, 2014. � p. 141 of Vol. I, PCRA transcript). In that statement, the defendant gave differing versions of the events.� p. 142 of Vol. I, PCRA transcript). Mr. Paganie determined it was appropriate to move to suppress the statement on the basis that the defendant was not in a proper condition to give the statement due to intoxication. Accordingly, he filed a suppression motion. (Seep. 143 of Vol. I, PCRA transcript). -11- The defendant did advise Paganie that other people witnessed his condition, namely Lori Turner-Williams, Major Williams and Jamie Turner. (See pp. 144-45 of Vol. I, PCRA transcript). Paganie advised that he did not interview these individuals for purposes of asking them to testify, but admitted that these individuals told him that the defendant was intoxicated. � pp. 146-47 of Vol. I, PCRA transcript). Paganie admitted that it would have been beneficial to keep defendant's different versions of the events in his statement from the jury and that this served as his reason for filing the suppression motion. � p. 149 of Vol. I, PCRA transcript). Paganie stated that he did not think it was a good idea to call these witnesses because they were with the defendant for an extended period of time while he (the defendant) was being sought by, and potentially avoiding, the police. Paganie thought this would be a negative for the defendant.� p.150 of Vol. I, PCRA transcript). Paganie did state that the defendant wanted all three witnesses called, but Paganie believed the witness' account of the events sounded rehearsed and almost identical.� p. 152 of Vol. I, PCRA transcript). Paganie believed that Major Williams and Jamie Turner were 'very passionate about the defendant and felt their judgment could be clouded. (See pp. 154-55 of Vol. I, PCRA transcript). Paganie also stated that be did not view the video surveillance at the police station to see if it captured the defendant's ability to walk, etc. (See p. 155 of Vol. I, PCRA transcript). Jamie Turner told Attorney Paganie that the defendant took four pills and drank beer.� p. 156 of Vol. I, PCRA transcript). Attorney Paganie was questioned about the autopsy report in this case, which was admitted into evidence as defense Exhibit Eat the PCRA hearing.� p. 159 of Vol. I, PCRA transcript). Paganie admitted that there is nothing in the autopsy report that -12- states that the victim was stabbed while unconscious. � pp. 160-61 of Vol. I, PCRA transcript). Paganie stated that he was surprised when Dr. James Smith, the forensic pathologist, testified to this.� p. 163 of Vol. I, PCRA transcript}. Paganie admitted that he did not object to or challenge this testimony in court. (Seep. 166 of Vol. I, PCRA transcript}. Paganie stated that he did not challenge the testimony because he thought the wounds were throughout the body and not concentrated, thereby indicative of a struggle. Specifically, Paganie testified that the wounds went from the lower back to the top of the head of the victim, as well as to the neck.� pp. 170-71 of Vol. I, PCRA transcript). Paganie stated that if the victim was knocked unconscious there was no need to have wounds all over her body, and that the blood all over the body and the scene confirmed a struggle. � p. 172 of Vol. I, PCRA transcript). Paganie stated that he believed he cross-examined Dr. Smith on these issues. � p. 173 of Vol. I, PCRA transcript).2 Attorney Paganie testified that he did not object to Dr. Smith's testimony that the cause of death was homicide because he believed Dr. Smith was allowed to testify to this. According to Paganie, homicide simply means killing. (See pp. 180-81 of Vol. I, PCRA transcript). There were vials of blood taken from the defendant on the date of his arrest. The vials of blood were destroyed after testing at the Pennsylvania State Police Crime Laboratory. Attorney Paganie admitted that the defendant asked that the vials of blood be preserved because of his state of intoxication. � pp. 183-85 of Vol. I, PCRA transcript). Paganie stated that he wanted to have the blood tested for both alcohol 2 The clear inference that arises from the Paganie testimony is that Paganie did not object to this testimony because, in Paganie's mind, the testimony was not consistent with the evidence, and Paganie wanted to challenge it on cross-examination rather than to object to its admission. -13- content and any other substances that the defendant may have had in his body. Paganie stated that he did not have this opportunity because the vials of blood were destroyed on November 26, 2014, the defendant was not arraigned until December 2, 2014 and he (Paganie) could not make the discovery request until after arraignment. � pp. 187-89 . of Vol. I, PCRA transcript). Paganie also stated that he did not even know who was in possession of the blood evidence until April 2015. � p. 191 of Vol. I, PCRA transcript). With regard to the assertions by Lori Turner-Williams and Major Williams, that the victim had previously made threatening comments about the defendant ("I'm going to kill you"), Paganie said that he did not put these two individuals on the stand because, in his estimation, they were close family members and not credible witnesses. (See pp. 194-95 of Vol. I, PCRA transcript). Paganie acknowledged that the defendant did not make a good witness on his own behalf at trial, but Paganie still chose not to put these individuals on the stand because of their credibility issues. � p. 197 of Vol. I, PCRA transcript). On cross-examination, Paganie stated that the clear theory of defense in this case was self-defense.� p. 202 of Vol. I, PCRA transcript). Paganie discussed with the defendant testifying on his own behalf, with regard to the self-defense theory, early on. � p. 203 of Vol. I, PCRA transcript). Moreover, once Paganie learned that the vials of blood bad been destroyed, he filed a motion to quash the first degree murder charge. (See p. 206 of Vol. I, PCRA transcript). Paganie also moved to suppress the defendant's statement to the police on the basis of intoxication and requested that the Court give an instruction to the jury on intoxication as a defense to first degree murder. (See pp. 208- 10 of Vol. I, PCRA transcript). -14- With regard to strategy, Paganie stated on cross-examination that he requested the blood vials in a discovery motion.� pp. 6-7 of Vol II, PCRA transcript). That discovery motion was admitted into evidence at the PCRA hearing as Commonwealth Exhibit 4. With regard to the pre-trial motions, Paganie testified that he had the defendant testify to the issue of intoxication, rather than Lori Turner-Williams, Major Williams and Jamie Turner, because he believed that the defendant was more credible than these other individuals. Paganie also stated that he believed that the testimony of the other witnesses was too similar and appeared fabricated. � pp. 7-8 of Vol. II, PCRA transcript). Paganie stated that be tried to secure any video surveillance tape of the Aliquippa police station but was not successful. � pp. 8-9 of Vol. II, PCRA transcript). Paganie did secure the services of an investigator to try to obtain records regarding the victim's history of aggressive behavior. The investigator was not able to find anything worth using. (See pp. 9-10 of Vol. II, PCRA transcript). Paganie further testified that he hired a forensic toxicologist to establish that there was both cocaine and alcohol in the victim's system, and this toxicologist gave opinions at trial as to the effect of the combination of these substances on an individual. (See pp. 14-15 of Vol. II, PCRA transcript). He intended to use this testimony along with the defendant's testimony to verify that a struggle occurred. (See p. 16 of Vol. II, PCRA transcript). The defendant also testified to his intoxication to challenge that the statement he gave at the police station was voluntary. (See p. 16 of Vol. II, PCRA transcript). -15- Paganie testified that he did request jury instructions on the failure to produce evidence and voluntary intoxication from the Court. � p. 18 of Vol. II, PCRA transcript). Paganie stated that he thought the Commonwealth's destruction of the vials of blood in November of 2014 was completely wrong and would have challenged the destruction in a direct appeal, but the defendant's insistence that Paganie withdraw the direct appeal voided the ability to make such a challenge. (Seep. 19 of Vol. II, PCRA transcript). On re-direct examination, Paganie was questioned about two Aliquippa police reports involving the police investigation of incidents in which the victim, Patricia Thompson, was the subject. Paganie did not use these reports because they were both remote (2008) and involved property damage and not injuries to persons. � pp. 22- 25 of Vol. II, PCRA transcript). Paganie was also questioned about medical records that he had seen or secured involving a diagnosis of the victim's depression. Paganie stated that he did not use these records because his understanding and research indicated that depression does not equate to aggressive behavior. � pp. 28-30 of Vol. II, PCRA transcript). 5. J@llles Turner The defendant testified on his own behalf. He began his testimony by stating his understanding that a PCRA petition is different from a direct appeal. (Seep. 38 of Vol. II, PCRA transcript). The defendant stated that he filed his own PCRA petition initially through his own due diligence. (See pp. 38-39 of Vol. II, PCRA transcript). With regard to this case, the defendant stated that he met with Attorneys Paganie and Braslawsce at the Beaver County Jail approximately 72 hours after the incident and before the preliminary hearing.� p. 40 of Vol II, PCRA transcript). The defendant -16- testified that he has a Bachelor of Science in electrical engineering from Point Park University. He had important engineering jobs over the years. He stated that he was both well-educated and honorably discharged from the military.-� pp. 42-46 of Vol. II, PCRA transcript). This testimony was evidently elicited for purposes of showing the defendant's knowledge and ability to comprehend matters and intelligently discuss them with his defense attorneys. The defendant stated that he told his defense lawyers of his struggle with the victim at the very first meeting at the jail in August, 2014. He also told them of the statement he gave to police. He told them about the blood that was drawn on the day of his arrest, August 15, 2014. If this meeting occurred approximately 72 hours after the arrest, he would have made these statements to defense counsel before the end of August 2014. (See pp. 46�48 of Vol. II, PCRA transcript). The defendant further stated that he told his attorneys of the video at the police station and of the witnesses who could confirm his intoxication at this first meeting. He also stated that he advised them that an analysis of his blood would confirm his intoxication. According to the defendant, the attorneys gave no response to these matters at that meeting. (See pp. 48-49 of Vol. II, PCRA transcript). With regard to the struggle and theory of self-defense, .defendant stated that he wanted to be clear in his discussions with his attorneys at this first meeting that he was not the aggressor. He told the attorneys that when he arrived home in the early morning hours of August 15, 2014, he asked the victim (Patricia Thompson) why she had left him at the bar and she immediately became aggressive. He told the lawyers that he never intentionally stabbed the victim. (See pp. 52�55 of Vol. II, PCRA transcript). -17- The defendant stated that he received discovery from his attorneys and read it at the jail. He stated that he advised the attorneys of the witnesses who could be called to testify at the suppression hearing and these witnesses were, in fact, in the courtroom during the hearing.� pp. 56-60 of Vol. II, PCRA transcript). Once the suppression motion was denied, the defendant stated that he wanted these witnesses to be called at trial regarding the voluntariness of the statement because it was still an issue at that point, but the witnesses were never called at trial. � pp. 63-66 of Vol. II, PCRA transcript). According to the defendant, Attorney Braslawsce stated, "Who's going to believe them. '7 � pp. 67 and 76·77 of Vol. II, PCRA transcript). The defendant also stated that, after reviewing the autopsy report, he advised Attorney Paganie that the wounds were superficial, indicative of a struggle. According to the defendant, Paganie did not respond.� pp. 68-69 of Vol. II, PCRA transcript). The defendant testified that he wanted scientific proof of his intoxication. He stated that he brought up these and many other points because he is an engineer who pays close attention to detail. � pp. 72 and 77·78 of Vol. II, PCRA transcript). The defendant stated that he made it known from day one that he was willing to testify. (Seep. 84 of Vol. II, PCRA transcript). He wrote letters to his attorneys from the jail, and they wrote back. � p. 90 of Vol. II, PCRA transcript). Defendant's attorneys filed motions to suppress and also filed a motion to quash the first degree murder charge.� pp. 94-96 of Vol. II, PCRA transcript). GENERAL LAW REGARDING PCRA PETIDONS Defendant contends that his trial counsel rendered ineffective assistance and that he is therefore entitled to either a new trial or dismissal of the charges against him. {See 116, p. 4 of defendant's Amended Petition for Post-Conviction Relief). -18- "It is well-established that counsel is presumed effective, and to rebut that presumption, the PCRA petitioner must demonstrate that counsel's performance was deficient and that such deficiency prejudiced him." Commonwealth v. Koehler, 36 A.3d 121, 132 (Pa. 2012) (citing Strickland v. Washington, 466 U.S. 668, 687-91, 104 S.Ct. 2052, _____, 80 L.Ed.2d 674, (1984). The Pennsylvania Supreme Court set forth a three-part test to determine whether a defendant has received ineffective assistance of counsel, with those three parts being as follows: (1) the underlying legal issue has arguable merit; (2) counsel's actions lacked an objective reasonable basis; and (3) the defendant was prejudiced by counsel's act or omission. Koehler, 36 A.3d at 132 (citing Commonwealth v. Pierce, 515 Pa. 153, ______, 527 A.2d 973, 975 (1987). The Court must analyze defendant's seven claims under these parameters. LEGAL ANALYSIS The defendant's PCRA petition has raised seven claims. Those seven claims are as follows: 1. Trial counsel was ineffective for not objecting to certain expert testimony of James Smith, M.D. 2. Trial counsel was ineffective in that defendant was denied a full and effective cross-examination opportunity of the expert testimony of James Smith, M.D., as it related to the alleged unconsciousness of the defendant and the prone position of decedent while she was stabbed. 3. Trial counsel was ineffective for failing to request a charge regarding the involuntariness of defendant's action as it related to malice, a necessary element in proving third degree murder. 4. Trial counsel was ineffective for not objecting to that portion of the testimony of James Smith, M.D. where he -19- quoted from the autopsy report regarding manner of death and thereby allowed Dr. Smith to testify at trial that the manner of death was homicide. 5. Trial counsel was ineffective for failing to procure the testimony of available witnesses and in failing to preserve evidence to support the claim that the August 15, 2014 statement of the defendant was involuntary. 6. Trial counsel was ineffective for failing to preserve blood evidence or to request an adverse inference instruction due to the missing evidence. 7. Trial counsel was ineffective for failing to procure testimony of available witnesses and for failing to present character evidence of the decedent as permitted by Pa.R.Evid. 404. These are the contentions on which testimony and evidence was received at the PCRA hearing and are the issues that will be addressed by the Court in separate subsections below.a 1. Defendant Alleges Trial Counsel Was Ineffective for Not Qbiectingto Certain Expert Testimony of James Smith, M,D. Defendant complains that the forensic pathologist, Dr. James Smith, testified to certain matters that were not disclosed in the autopsy report. The defendant contends that this violated Pa.R.Crim.P. 573(E) and precluded the defendant from effective cross- examination of Dr. Smith. The defendant further contends that trial counsel's failure to object rendered counsel ineffective. Specifically, Dr. Smith testified that the number of stab wounds in a small area of the neck indicated that the defendant was unconscious at the time of the stab wounds and that the defendant was moving about the victim when the stab wounds were inflicted, while the victim was unable to resist. 3 Defendant raised other issues in his original pro se petition, but these are the seven issues, and the only real issues, pursued at the hearing. -20- Defense counsel Paganie acknowledged that there was nothing specifically in the autopsy report that stated that the victim was unconscious at the time that the stab wounds were inflicted. He stated that he did not object to the testimony because the wounds were not concentrated in a specific area. The wounds went from the lower back to the top of the head, the front of the head and neck area. Paganie stated that if the victim were truly knocked unconscious, there was no basis for wounds al] over the body, and it was Paganie's belief that Dr. Smith's testimony and the location of the wounds was indicative of a struggle. Paganie cross-examined Dr. Smith on these issues. (See pp. 127-32 and 136-37 of Vol. I, Trial transcript). This testimony of defense counsel clearly raises a matter of strategy and tactics. "Generally, where matters of strategy and tactics are concerned, counsel's assistance is deemed constitutionally effective if he chose a particular course that had some reasonable basis designed to effectuate his client's interests." Commonwealth v. Howard, 553 Pa. 266, , 719 A.2d 233, 237 (1998). The Howard Court also noted that a claim for ineffective assistance of counsel cannot succeed by simply comparing, by hindsight, the trial strategy employed with alternatives not pursued. "A finding that a chosen strategy lacked a reasonable basis is not warranted unless it can be concluded that an alternative not chosen offered a potential for success substantially greater than the course actually pursued." Id. Here, defendant did not establish that an alternative basis offered a potential for success substantia11y greater than the course chosen. In this case, it must be remembered that the defense was one of self-defense, with the defendant actually testifying to the events in question. The defendant's version of the events and the struggle was consistent with the multiple stab wounds throughout -21- the body of the victim, and there was a reasonable basis for defense counsel to take the position chosen. Moreover, a careful review of the autopsy report entered into evidence as Exhibit E at the PCRA hearing reveals that it is a five-page document that details not only the final anatomical diagnosis in the first two pages, but also details the wounds and their locations in a three-page attachment. A similar case was presented in Commonwealth v. Davida, 630 Pa. 217, 242�43, 106 A.3d 611, 626 (Pa. 2014). In Davida, there was a PCRA petition filed on a similar basis. In that case, the Commonwealth's medical expert testified to certain matters not necessarily contained within bis report. The Pennsylvania Supreme Court held that there was no discovery violation under Rule 573(E) and that the doctor's testimony should have been expected based upon the doctor's report. The same can be said here in light of a reading of the autopsy report and attachment. For this reason, defendant's petition on this basis will be denied. 2. Defendant's Allegation that Trial Counsel Was Ineffective for Failing to Effectively Cross-Examine James Smith, M.D. as it Related to the Alleged Unconsciousness of the Decedent and the Prone Position of the Defend@nt When She Was Stabh!:d In this contention, defendant raises many of the same allegations as raised in the first allegation for relief. It must be noted that defense counsel did cross-examine Dr. Smith on the basis that all of the wounds were not concentrated. (See pp. 127�32 and 136-37 of Vol. V, Trial transcript). Paganie's, and the defendant's, theory was that the wounds were not concentrated and it makes no sense to have wounds throughout the body inflicted upon someone who was unconscious, as opposed to two people engaged -22- in a struggle. The same discussion and logic set forth in the preceding section applies here, and the Court will deny defendant's petition on that basis. 3. Defendant Alleges Trial Counsel Was Ineffective For Falling to Request a Charge Regarding the Involuntariness of Defendant's Action as it Relates to Malice, a Necessary Element in Proving Third Degree Murder Defendant next a1leges that his trial counsel was ineffective for failing to request the Court to charge the jury that the defendant could not be liable for third degree murder due to defendant's testimony and conduct in stabbing the victim after the altercation began and after the defendant and the victim fell to the floor. Defendant asserts that his conduct was involuntary and accidental, not sufficient to prove malice, a required element for third degree murder. Defendant relies primarily upon the Pennsylvania Superior Court decision in Commonwealth v. Fierst, 423 Pa. Super. 232, 620 A.2d 1196 (1993). In that case, the Pennsylvania Superior Court addressed a PCRA situation in which the defendant's alleged involuntary actions, as they related to malice necessary for third degree murder, were drawn into question because he suffered from seizures. The defendant was convicted of aggravated assault, vehicular homicide and third degree murder. The defendant was driving a car in a reckless fashion that resulted in the death of his passenger. Id. at 237, 620 A.2d at 1198. The Superior Court held that trial counsel was ineffective in that case for failing to request a jury charge that the defendant could not be guilty of third degree murder and aggravated assault because of his involuntary actions due to seizures that would not be sufficient to prove malice. The defendant was granted a new trial. Id. at 248-49, 620 A.2d a 1205-06. -23- This case is a far cry from Fierst. This case is factually distinguishable in that there was no evidence of seizures here.s Moreover, defense counsel Paganie asserted that defendant's theory was one of self-defense, and not involuntariness. As the Howard Court notes above, it is not sufficient for a defendant to succeed in a PCRA by simply comparing, in hindsight, the trial strategy employed with alternatives not pursued. 553 Pa. at , 719 A.2d at 237. The issue of involuntarines.s was factored into, and covered by, the asserted self-defense theory, and this claim by the defendant lacks merit. Accordingly, the petition will be denied on this basis. 4. Defendant Alleges Trial Counsel Was Ineffective For Not Objecting to that Portion of the Testimony of James Smith, M.D. When Dr. Smith Quoted from the Autopsy Report Stating that the Manner of Death wu Homicide In this case, Dr. James Smith, a forensic pathologist, testified that the manner of death was homicide. That statement is clearly contained in the autopsy report entered into evidence at the PCRA hearing as Exhibit E. Webster's Dictionary defines homicide as a person who kills another or a killing of one human being by another. Defense Counsel Paganie testified that he did not object because he understood homicide to mean a killing, which is the definition referenced above. The statement, "the manner of death was homicide," is contained in the autopsy report. The forensic pathologist, Dr. Smith, was called to testify to the manner of death, which is required in 4 To the extent that defendant claims his intoxication renders his conduct involuntary, the law is clear that intoxication is not a basis to negate intent. Commonwealth v. Graves, 461 Pa. 118, 394 A.2d 661 (1975). -24- homicide prosecutions,s He was simply doing his job, and his report and his testimony at trial both gave reasons for this opinion. The Court believes that this is a meritless position asserted by defendant and rejects it as a basis for ineffective assistance of counsel. 5. Defendant Alleges That Trial Counsel Was Ineffective For Failing to Procure Testimony of Available Witnesses and in Failing to Preserve Evidence to Support the Claim that Defendant's August 15, 2014 Statement to the Police Was Involuntaty Defendant asserts essentially three contentions in this argument. First, he argues that defense counsel was ineffective for not calling certain witnesses who allegedly observed defendant's state of intoxication before going to the police station on August 15. Second, defendant claims that counsel was ineffective for failing to preserve blood samples taken from him (defendant) on the date of his arrest that allegedly would have confirmed the level of his intoxication. Third, defendant claims that counsel was ineffective for failing to secure video surveillance from the Aliquippa police station to show the manner in which he walked into the police station on August 15, as evidence of his intoxication. The Court will address each contention below. First, defendant claims that his trial counsel was ineffective for not producing the testimony of Lori Turner-Williams, Major Williams and Jamie Turner, either at the pre- trial motions stage or at trial to confirm defendant's level of intoxication. Defense counsel testified that he did not produce these witnesses because of their relationship with, and allegiance to, the defendant and because their testimony appeared rehearsed 5 The Commonwealth is required to prove that the victim is dead, that the defendant killed her and that the killing was done with malice to prove third-degree murder. s« 18 Pa.C.S.A. §2502(c) and Pa. Suggested Standard Criminal Jury Instructions, 15.2502C. Smith's testimony was relevant to that end. -25- to him. In hearing the testimony at the PCRA hearing, the Court noted that the witnesses testified to events in a very similar fashion. For example, both Lori Turner- Williams and Major Williams testified that the defendant was intoxicated, disoriented and confused on the day of the incident before going to the police station. They both testified that defendant consumed 40 oz. beers and pills. In fact, their testimony was so similar that the Court questioned whether it was rehearsed. Moreover, there were implicit inconsistencies within the testimony. For example, Lori Turner-Williams testified that her brother, the defendant, was so intoxicated at her residence that he was confused and disoriented. Major Williams testified to the same. Nevertheless, they both testified that while driving the defendant to his home from their residence while in this state, they stopped and bought him more beer. This defies logic in the Court's mind. Moreover, that testimony was inconsistent with Lori Turner-Williams testifying that Major Williams bought the defendant one 40 oz. beer while driving defendant home. Major Williams testified that he bought two 40 oz. beers. Further, Jamie Turner testified that he, Lori Turner-Williams, Major Williams and the defendant were all in the car when they drove the defendant to the police station. Lori Turner-Williams testified that she was not in the car at that point, but instead stayed behind at another residence. Defense counsel testified that he did not believe these individuals to be credible and chose to go with the testimony of the defendant alone. There is reasonableness in this choice in light of the discussion above, and it should not be second-guessed under the Howard language and decision cited above. Second, defendant challenges his trial counsel's effectiveness on the basis that counsel did not secure the vials of blood before they were destroyed at the Pennsylvania State Police Crime Laboratory. Defense attorney Paganie explained what he attempted -26- to do in that regard. He specifically stated that the blood was destroyed in late November, 2014 and there was not an opportunity to file pre-trial motions or discovery requests until after the defendant's arraignment in early December. The Court acknowledges that defendant testified that he advised attorneys Paganie and Braslawsce of the availabi1ity of this blood at a meeting in mid-August, several days after the incident in 2014. His claim is that counsel failed to take any steps to preserve the evidence between August and November of 2014. Defense counsel Paganie testified that he intended to challenge the destruction of the materials in a direct appeal of this case, but was denied that opportunity by defendant's insistence and vo]untary and intentional decision to withdraw the direct appeal and pursue this PCRA. Given these circumstances, it cannot be said that defense counsel was ineffective in that regard. Third, defendant testified that his counsel was ineffective for failing to secure videotape surveillance at the Aliquippa police station that would have revealed him stumbling and staggering into the police station before questioning. Attorney Paganie indicated that the video was requested, but was not avai1able. This basis alone does not render counsel ineffective, and counsel did file a suppression motion challenging the statement on the basis of intoxication. Accordingly, the Court finds no merit in this contention and rejects it as well. 6. Defendant Alleges Ineffective Assistance of Counsel Due to Counsel's Failure to Preserve Blood Evidence or to Request an Adverse Inference instruction Due to the Missing Evidence This again deals with the vials of blood secured from the defendant on the date of his arrest. The Court addressed this issue in the preceding section. Defense counsel did file a motion to quash the first degree murder charge on the basis of the missing vials of blood. He also raised this issue in the suppression motion. Trial counsel stated his intention to pursue this on a direct appeal that he filed with the Superior Court. That appeal was withdrawn upon the insistence and direction of the defendant after an extensive and formal colloquy advising him (defendant) of his rights. Again, the Court finds no merit in this position and rejects it as a basis for ineffective assistance of counsel. 7. Defendant's Allegation that Trial Counsel was Ineffective for Failing to Procure Testimony and Available Evidence and to Present Character Evidence of the Decedent under Pa.R.Evid. 404 Finally, defendant alleges that trial counsel was ineffective for not calling Lori Turner-Williams and Major Williams as witnesses at trial to testify to a statement that the victim, Patricia Thompson, allegedly made in their presence. That statement was allegedly directed at James Turner in which Patricia Thompson stated "You ain't gonna kill me, I'm gonna kill you." Defendant also alleges that counsel was ineffective for failing to offer into evidence the contents of Aliquippa police reports regarding incidents involving the victim and also failing to put into evidence mental health records regarding the victim. As to the statements and potential testimony of Lori Turner-Williams and Major Williams, defense attorney Paganie stated that he felt the testimony was rehearsed because it was identical. The Court agrees with that assessment. A review of the PCRA hearing transcript reflects that both witnesses said the very same thing in the very same manner. While this may be some evidence of the victim's intentions, there was no surrounding testimony as to the circumstances under which these statements were made. For example, there was no indication as to whether the victim was serious or -28- joking at the time. Moreover, the testimony almost seemed rehearsed when given at the PCRA hearing. Defense counsel Paganie said that he questioned the credibility of these statements and also considered the relationship of the witnesses to the defendant and their reasons for this testimony. In fact, attorney Paganie stated that Major Williams was too passionate about the case, giving rise to the inference that Attorney Paganie believed that Major Williams may say anything to assist his brother-in-law. It must also be recalled that when Major Williams testified at the PCRA hearing, he became irate and confrontational with the Assistant District Attorney during his cross-examination. Williams had to be escorted out of the courtroom by the Sheriff. This exchange at the PCRA hearing gives credence to Attorney Paganie's assessment of Mr. Williams. With regard to attorney Paganie's failure to present evidence of the two incidents m 2008 contained in Aliquippa police reports, Attorney Paganie stated that both incidents were not only remote, but also involved only damage to property and not harm to any individuals. This was a strategy decision by Attorney Paganie and must be viewed under the Howard standard set forth above. There is no indication that the use of this evidence, if admitted, offered a potential for success substantially greater than the course actually pursued. With regard to the mental health records> Attorney Paganie gave a very valid reason for not using mental health records of depression, namely because they do not equate to aggression or violent propensities. For these reasons, the final contention of defendant in his PCRA petition is rejected. -29- CONCLUSION An Order consistent with this Memorandum Opinion will be entered this same date. BY THE COURT: c; -- "'":-:. - ,.._. 00 L... ::,> c� --< .. ( �. �;.' :z. -I . ..., L•J ...... .""'(:.:. ;·1·1 0 ·=QQ; ·x� C1 .?', /"':-.. ,. .•. c: "O 0 c ::a ',I ··-· C,"'. V) Y:-' -1 0 ...D -29-
Q: vnstat: print current network activity to a file How can i print the output of vnstat -l to a file? what i've tried: vnstat -l &> file but it just hangsup A: Remove the l option. From the vnstat man page: -l, --live mode Display current transfer rate for the selected interface in real time until interrupted. Statis‐ tics will be shown after interruption if the runtime was more than 10 seconds. An optional mode parameter can be used to select between the displaying of packets per second (mode 0) and trans‐ fer counters (mode 1) during execution. --style can also be used to affect the layout of the output. So, the -l makes vnstat display output in "live mode", constantly updating, that's why you can't capture the output. If you want an easily parseable format use vnstat --dumpdb To just save the standard output do vnstat > log.txt If what you want is the current upload and download rate, vnstat is not the right tool for the job. Try sar from the sysstat package (see man sar for more info): sudo apt-get install sysstat sudo sar -n DEV 1 1 To extract the current* download and upload rate for the interface wlan0 from sar's output do: sudo sar -n DEV 1 1 | grep wlan0 | tail -n 1 | gawk '{print "Down: "$5,"Up: "$6}' * What does "current" mean? sar (and any other method) will take some milliseconds to generate output.