text stringlengths 8 5.77M |
|---|
Studies demonstrating that breastfeeding protected infants from respiratory infections began in the early 20th century. At the time, it was presumed that this was a result of nutritional deficiencies in formula ([@bib1]). In the mid-20th century, it became apparent that breast milk was more than a source of calories, but also a vehicle for the transmission of antibodies, immune cells, and oligosaccharides meant for microbial, rather than infant, nutrition ([@bib2]). As a consequence, infant formulas now include substances meant to promote a healthy microbiome, yet formula-fed infants are still more susceptible to respiratory infections ([@bib3]). Despite more than a century of data on the role of breast milk in protection from respiratory infections, we still do not know whether or how maternal antibodies help shape the composition of the upper respiratory tract microbiome, whether breast milk directly promotes the growth of some respiratory microbes over others, or whether protection from respiratory infections is primarily a consequence of immune maturation.
Mode of delivery also alters the oral and nasopharyngeal microbiota, and ultimately affects susceptibility to infection. Infants born by vaginal birth are quicker to acquire species such as *Corynebacterium* spp., *Moraxella* spp., and *Dolosigranulum* spp., which are associated with reduced colonization of respiratory pathogens, than their Caesarian-born counterparts ([@bib4]). How colonization of the nasopharynx by microbes that are not major components of the vaginal microbiota occurs is not clear, but may be a result of immune development as opposed to direct seeding of microbes ([@bib5]). Although the mechanisms of microbiome development are not fully elucidated, in this issue of the *Journal*, Man and colleagues (pp. [760--770](10.1164/rccm.201810-1993OC)) provide provocative evidence that both the composition of the infant microbiome and the ability to maintain the topography of the nasopharyngeal community are important for protection from respiratory infections early in life ([@bib6]).
Expanding a previous study of the nasopharyngeal microbiome from birth to 6 months ([@bib7]), Man and colleagues examined the oral microbiome in the same cohort and investigated whether changes in oral and nasopharyngeal communities were associated with respiratory tract infections in early life. They previously had confirmed findings that breastfeeding and mode of birth influences these microbial communities ([@bib5], [@bib8]), and identified that the presence of certain microbes such as *Neisseria* spp. and *Prevotella* spp. in the first month of life are predictive of future respiratory infection. These data might lead one to conclude that the presence of some microbes enriched by birth mode or breastfeeding protect against infections. Indeed, this is consistent with decades of carriage studies that demonstrate that carriage of some pathobionts will protect against colonization by others ([@bib9]). The surprising element of this study is that changes in the nasopharyngeal microbiome occurred up to a month before the occurrence of a respiratory infection and were characterized by an increase in primarily oral taxa (e.g., *Neisseria lactamica*, *Prevotella nanceiensis*, *Fusobacterium* spp.) in the nasopharyngeal microbiota. It is well documented, and Man and colleagues confirm, that the nasopharyngeal microbiome changes during a respiratory infection. These changes may be a result of direct microbial competition, leukocyte recruitment and concomitant changes in the oxidative environment ([@bib10]), and/or changes in mucus production ([@bib11]). It is possible, but not proven, that the infant nasopharyngeal microbiome becomes supportive of oral species, which include many anaerobic species, before infection as a result of changes in oxidative tension resulting from subclinical inflammation or immune involvement.
Limitations of the study include the fact that respiratory tract infections were confirmed by symptoms rather than definitive virologic testing. Timing of childhood vaccinations was also not recorded. The majority of the children in the study would have been vaccinated with the pneumococcal conjugate vaccine at 6--9 weeks, and again at 4 months ([@bib12]). Pneumococcal vaccination alters the composition of the respiratory tract microbiota, and could conceivably contribute to observed changes in the microbiota that precede infection ([@bib13]). In general, 16s rRNA sequencing does not provide sufficient resolution of *Streptococcus* spp. to determine whether acquisition of *S. pneumoniae* was one of the events that triggered a loss of topography.
Another counterintuitive finding was the role of daycare in microbial dysbiosis. As many parents will attest, having a child enter daycare can be the start of several months of fevers and runny noses. Five of the children in the study developed respiratory tract infections in their first month of daycare, but the loss of nasopharyngeal topography was apparent a month earlier. This implies that the loss of topography may predispose children to infections once there is a second insult, such as exposure to new microbes or the stress of beginning daycare.
Collectively, these data imply that the upper respiratory tract microbiome is modified by factors we do not yet understand. Despite the physiologic differences between the nasopharynx and oral cavity, the distinction between these topographies is blurred at times of immunological or possibly physiological stress. Older adults are also highly susceptible to respiratory infections and also lose topographical distinctions between the naso- and oropharynx ([@bib14]). Although the processes of immune development and immunosenescence are quite different, perhaps the end result, loss of topography preceding respiratory infections, is the same.
D.M.E.B. is the Canada Research Chair in Aging & Immunity. M.G.S. is the Canada Research Chair in Interdisciplinary Microbiome Research. Research in the D.M.E.B. and M.G.S. laboratories is supported by the M.G. DeGroote Institute for Infectious Disease Research, the Farncombe Institute for Digestive Health, and the McMaster Immunology Research Centre.
Originally Published in Press as DOI: [10.1164/rccm.201903-0687ED](http://dx.doi.org/10.1164/rccm.201903-0687ED) on April 12, 2019
[**[Author disclosures](http://www.atsjournals.org/doi/suppl/10.1164/rccm.201903-0687ED/suppl_file/disclosures.pdf)**]{.ul} are available with the text of this article at [www.atsjournals.org](http://www.atsjournals.org).
|
Estimating the impacts of financing support policies towards photovoltaic market in Indonesia: A social-energy-economy-environment model simulation.
This study develops a hybrid energy agent-based model that integrates the input-output analysis, environmental factors and socioeconomic characteristics of rural and urban households in Indonesia. We use the model to estimate the effects of four solar energy policy interventions on photovoltaic (PV) investments, government expenditure, economic outputs, CO2e emissions and the uses of steel, aluminium, concrete and energy. The results of our analysis call for the abolition of the PV donor gift policy, the improvement of production efficiency in the PV industry and the establishment of after-sales services and rural financing institutions. A 100 W peak (Wp) PV under this recommendation would be affordable for 80.6% of rural households that are projected to be without access to electricity in 2029. Net metering is the most effective policy for encouraging urban people to invest in PV in a situation where fossil energy prices are increasing and PV prices are declining. A donor gift policy may induce USD 51.9 new economic outputs for every Wp of PV operating to capacity in 2029, but would require a subsidy of USD 18.6/Wp. The recommended policies do not require subsidies and reduce CO2eq emissions and the consumption of aluminium, energy, steel and concrete by between 83.1% and 89.7% more than the existing policy. Several policy implications are discussed in response to these findings. As a contribution to energy modelling literature, the model can be used for other developing countries by merely changing its data. |
ABC’s harkening back to the days when it was “Still the One!” in a new slate of retro promos scheduled to air during Wednesday’s “Live in Front of a Studio Audience.”
In honor of the Norman Lear/Jimmy Kimmel special, which is re-creating 1975 episodes of “All in the Family” and “Good Times” with modern casts, ABC promos that evening will use throwback voiceovers, graphics and title treatments inspired by the Alphabet network’s actual on-air campaigns from that era. (Yes, that includes a voice-over actor emulating Ernie Anderson’s famous announcing from back then.)
ABC Entertainment and Walt Disney Studios marketing president Shannon Ryan said the idea came out of a conversation with Kimmel. “We hatched an idea to ‘retro-fit’ — get it? — all of our promos so that when viewers turn on ABC on Wednesday, it will appear as if they’re stepping back in time,” she said. “The graphics package, the logo, the voiceover, the music and the copy will all look and feel as if viewers are watching television in the ’70s.”
That means extra touches like utilizing the old television 4:3 ratio, and even mentioning the Mountain time zone (a practice that disappeared some time in the 1990s) in the spots.
The retro promos will include spots for “The Good Doctor,” “A Million Little Things,” “The Rookie,” “Stumptown,” “The Bachelor,” “Jimmy Kimmel Live,” “Jeopardy! The Greatest of All Time,” “The Oscars” and “New Year’s Rockin’ Eve,” the last two featuring actual footage from 1975. ABC also created combined spots from its Tuesday and Wednesday night comedy blocks.
To create the look, Ryan said her team tracked down the original ABC graphic packages and the ABC logo from 1975 and recreated them.
“The team went through so many classic TV spots from the ’70s for inspiration,” she said. “We pulled promos for ‘Charlie’s Angels’ and ‘Hart to Hart’ that served as inspiration for ‘Stumptown.’ ‘Starsky & Hutch,’ ‘The Streets of San Francisco,’ ‘Kojak’ and ‘The Rookies’ inspired ‘The Rookie’ spot. ‘Marcus Welby, M.D.’ inspired ‘The Good Doctor’ promo. Also, shows like ‘Family’ inspired ‘A Million Little Things’ and ‘The Dating Game’ inspired ‘The Bachelor’ and we’re using both of those theme songs in the spots. We also took inspiration from the big brand campaigns back in the day like ‘Come on Along with ABC,’ and we’re using that song in the Tuesday comedy combo spot.”
In the new spots, it’s Steve French doing an impersonation of classic VO announcer Ernie Anderson.
Meanwhile, Ryan’s team also shared the idea with ABC News, which created a retro-spot for GMA. ABC’s affiliate marketing team also recruited several stations are creating retro-spots for their local news.
Here is a sneak preview of some of the spots set to run on Wednesday:
Promo for Tuesday comedies:
Promo for “Stumptown”:
Promo for “The Rookie”:
Promo for “A Million Little Things”: |
Q:
Basic question on producing non-overlapping graph nodes in a graph
I am plotting a graph which has about 196 nodes.
GraphPlot[{1 -> 24, 2 -> 24, 20 -> 364, 20 -> 779, 21 -> 130, ...
378 -> 386, 492 -> 841, 779 -> 783, 839 -> 841},
DirectedEdges -> False, VertexLabeling -> True,
Method -> "SpringElectricalEmbedding",
PackingMethod -> "ClosestPackingCenter"]
However when the output is produced
it looks like below where many of the nodes are overlapping. How to tell Mathematica
to produce a large picture so that no nodes overlap. True this might not be practical
for very large graphs, but for 196 nodes, I would like no node to overlap another.
A:
You can adjust the image size using the option ImageSize->600 or ImageSize->800, whatever is needed. You might have missed this option when you look at the help for GraphPlot because it is listed indirectly: when you open up the Details section says: GraphPlot has the same options as Graphics, and under Graphics is where you find the ImageSize option.
|
Introduction {#Sec1}
============
Object handover between a passer and a receiver is probably one of the most basic collaborative motor tasks between humans. Handover is fundamental for a wide range of functional and social activities in which individuals help each other, sharing the same goal and a common plan of execution. Handover may be divided in three phases (Cutkosky and Hyde [@CR12]; MacKenzie and Iberall [@CR36]; Mason and MacKenzie [@CR37]). First, the passer and the receiver coordinate their movements, through non-verbal communication, to reach the exchange site, at a given time. The end of this phase is marked by a mild collision between the partners when the receiver makes contact with the object. Second, while the receiver increases grip force (GF) on the object the passer decreases it. During this time, both partners coordinate the modulation of GF to counteract gravitational and inertial load forces to prevent the object from slipping. Third, once the receiver stably holds the object, the handover action is completed and the passer removes his or her hand from the exchange site.
While simple prehensile movements such as reaching to grasp have been widely explored during both individual or joint actions (Castiello [@CR6]; Georgiou et al. [@CR17]; Becchio et al. [@CR3], [@CR4]), to date few investigators have studied the way GFs are modulated by two partners to handover an object. Unlike reaching to grasp, where feedforward and feedback mechanisms reside within a single control system (Jeannerod [@CR25]), handover involves multiple, disconnected control systems (Mason and MacKenzie [@CR37]). Thus, an important theoretical question is how the disconnected neural controllers are coordinated to produce fluent handover? A second important question is what are the relative contributions of feedforward vs. feedback mechanisms in the control of handover? Continuous closed-loop control of dynamic motor behaviours is severely limited by neural delays, and therefore, impractical at frequencies above 1 Hz (Hogan et al. [@CR21]). Hence, continuous modulation of GF based only on incoming tactile/haptic information (i.e. a purely feedback mechanism) cannot explain the coordination of rapid and stereotypical movements, such as those in handover. Predictive mechanisms combined with a neural system that mimics the motor control and the behaviour of objects in the external environment (internal models) (Kawato and Wolpert [@CR34]), must also be involved. Nevertheless, some feedback control is likely to be necessary given the actions of one partner cannot be fully predicted by the other (Mason and MacKenzie [@CR37]).
One of the motor control policies described in the literature, posits that motor programs of tasks, such as object manipulation, are organized in phases delimited by means of multi-modally encoded discrete sensory events, e.g. resulting from object contact, lift-off, etc. (Johansson and Edin [@CR26]; Randall Flanagan et al. [@CR47]; Johansson and Flanagan [@CR27]; Fang et al. [@CR14]). The nervous system predicts such events to launch in advance the appropriate motor commands, and monitors progress to initiate, if necessary, corrective actions that are suitable for the task and the current phase. Normally the task evolves in an open-loop fashion where the successful completion of each phase is signified by specific combinations of temporally correlated sensory signals. The prediction of the sensory events is used by the brain to proceed to the next phase without delays. This control policy may apply also for the handover, the predicted collision between the receiver and the object, held by the passer, being one of the key sensory events of the task.
Mason and MacKenzie ([@CR37]) suggested that passers use visual-feedback based anticipatory control to precisely trigger the handover and provided preliminary evidence that the receiver's reach towards the passer is used by the passer to update prediction. Quesque et al. ([@CR46]) showed that when two subjects manipulate an object in turn, the kinematics of the reaching to grasp movement of one partner may affect the motion of the arm of the other partner in the subsequent phase of the task. Furthermore, behaviour that adapts to speed has been demonstrated in other manipulative tasks such as collision (Turrell et al. [@CR54]) and catching (Savelsbergh et al. [@CR49]) tasks, however, to date it has not been formally assessed in handover actions. In particular, it is unclear whether the passer uses information about the dynamics of the receiver's reaching movement to anticipate and launch the appropriate release motor program. To address this general issue, we ask: (1) does a rapidly approaching receiver trigger faster handovers by the passer? (2) is a faster handover characterized by an earlier beginning of GF release or by a more rapid reduction in GF by the passer?
Previous works (Avenanti et al. [@CR1]; Sciutti and Sandini [@CR50]) provided evidences that action observation as well as the knowledge of the task and context in which the action takes place support the understanding and the anticipation of the other's movement, thus enabling the actual collaboration between agents. Therefore, prediction of the receiver's behaviour by the passer is likely to depend on the visually-derived perception of the other's action (how the passer expects the receiver will behave, within the current context) (Rizzolatti and Craighero [@CR48]) or memory of the outcome of previous handover actions. Studies of lifting and repositioning tasks show that, when visual input is obstructed, humans switch from a predictive to a purely feedback control, exhibiting immature GF profiles (Kawai et al. [@CR33]). In such cases, the GF to lift the object is primarily based on the somatosensory information acquired from the *initial contact* with the object (Johansson and Westling [@CR28]), whereas coarse online adjustments are triggered in reaction to perceived perturbations of the load force (Cole and Abbs [@CR10]). Similar mechanisms might explain the behaviour of a passer, during the handover, if he/she cannot see the partner's movements. Moreover, as observed in the blindfolded pick and lift, the magnitude of the collision with the receiver might be expected to affect modulation of the passer's GF.
In the first of the two experiments (Exp. 1) we sought to address for the first time these issues by investigating how changes in dynamics of the receiver's reaching movement would affect GF release by the passer, who kept his or her hand in fixed position during handover. We further explored the role of visual feedback for the passer by including normal and absent vision conditions. Our setup measured the grasp forces involved during the handover and the receiver's acceleration profiles. We expected that passers would integrate visual input about the receiver's dynamics into their sensorimotor control to predict the onset of the handover and to modulate their release dynamics accordingly.
In a second experiment (Exp. 2), we aimed to investigate the effects of such release dynamics on the fluency of the handover experienced by the receiver. Several studies involving robotic agents investigated humans' preferences and how their perception of fluency can be influenced during the handover task. The majority of these studies focused on the effects of the trajectory (Basili et al. [@CR2]; Prada et al. [@CR44]), and of the velocity profile (Huber et al. [@CR22], [@CR23]) of the reaching movement; on the effects of the position of both the passer's (Cakmak et al. [@CR5]; Strabala et al. [@CR53]; Huber et al. [@CR24]; Parastegari et al. [@CR42]) and the receiver's arm (Pan et al. [@CR39], [@CR40]) used to handover the object; on the effects of other subtle non-verbal clues used to initiate an handover (Strabala et al. [@CR52]; Moon et al. [@CR38]). Only few studies focused on the modulation of the GF during the object release. Parastegari et al. implemented a fail-safe release controller able to detect slippage events (Parastegari et al. [@CR41]) and assessed the effects of the minimum pulling force required to collect the object from the robot on the perceived smoothness of the handover (Parastegari et al. [@CR43]). Chan et al. ([@CR8]), using a feedback-based release controller, showed that handovers that are completed as soon as the receiver counterbalances the object weight are not perceived safe or coordinated by humans. However, neither of the previous studies investigated the effects of the release reactivity and of the handover duration on the fluency and quality of the handover perceived by the receiver.
To address this open issue, in Exp. 2, the passer was replaced by a robotic hand programmed to release the object following a stereotypical biomimetic GF trajectory (Endo et al. [@CR13]). In this way it was possible to manipulate the onset and the duration of the object release, thus simulating different behaviours of the passer. Because of the tight temporal coordination between the passer and the receiver in a smooth handover (Mason and MacKenzie [@CR37]), we expected that the participants would perceive handovers that are shorter or longer than average as unnatural.
Our results from Exp. 1 show that with visual input, passers clearly predict the nature and timing of the exchange adapting their onset and rate of grip force release to the contrasting receiver dynamics in the different conditions. When blindfolded the release is correlated with haptic input arising from the collision. In Exp. 2, handovers were deemed more fluent with more reactive release behaviours, shorter release durations, and shorter handover durations. Interestingly the handover was rarely experienced as too fast. These outcomes are interesting for neuroscientists and roboticists. They contribute understanding of the roles of sensory input in the strategy that empowers humans to perform smooth and safe handovers, and they may suggest ways to program robots working and interacting with humans.
Materials and methods {#Sec2}
=====================
Participants {#Sec3}
------------
Fourteen healthy participants (5 females, all right-handed) aged 26 ± 11 years old (mean ± standard deviation) took part in the first experiment. Eleven different participants (all male; all right-handed; age 29 ± 4 years old) took part in the second experiment. None of them reported any history of somatosensory or motor impairments and all claimed to have normal or corrected vision. Informed consent in accordance with the Declaration of Helsinki was obtained from each participant before conducting the experiments. This study was approved by the local ethical committee of the Scuola Superiore Sant'Anna, Pisa, Italy. The methods were carried out in accordance with the approved guidelines.
Experiment 1 {#Sec4}
------------
### Experimental set-up {#Sec5}
The experimental setup consisted of a test-object instrumented to measure grasp and interaction forces and acceleration, a three-axis inertial measurement unit IMU that measured the acceleration and orientation of the receiver's hand, and a PC (Fig. [1](#Fig1){ref-type="fig"}).
Fig. 1Experimental setup and test object. Subjects were seated opposite one another on two chairs. The passer was stationary while the receiver moved his upper limb toward the exchange site. A screen informed the receiver about the handover timing setup and it could not be seen by the passer. An IMU was fastened to the receiver's moving hand. The detailed view shows the test-object instrumented with two load cells
The test-object was a 3D printed symmetric plastic structure (dimensions 85 × 50 × 25 mm; weight 160 g) equipped with two six-axis force/torque (FT) sensors (model Nano17, ATI Inc., USA), similar to the object used in (Endo et al. [@CR13]). The FT sensors recorded the passer's and receiver's grip force, GF, defined as the force perpendicular to the grasp surfaces, developed by the thumb opposing the index and middle finger, and the interaction force, FI, defined as the resultant force obtained by combining the horizontal force and the vertical force, of the passer and the receiver (Fig. [2](#Fig2){ref-type="fig"}). The IMU (model *3-Space Sensor*, YEI Technology, USA) tracked the receiver's hand motion. The PC ran a custom application that acquired the data (1 kHz, NI-USB 6211, National Instruments, USA), stored it for off-line analysis, and guided the experimental protocol, in particular, by providing visual cues to the receiver (i.e. the experimenter) on the timing of the test trial.
Fig. 2On the top is shown an example of the signals and the metric analysed in this experiment. On the bottom the force diagram of the handover is displayed
### Experimental protocol {#Sec6}
In this test, the participants played the role of the passer in human--human handovers. The passer was seated comfortably on a chair wearing noise-blocking headphones and instructed to repeatedly "pass" the test-object to the receiver, sitting in front of him/her at a distance of \~ 100 cm (Fig. [1](#Fig1){ref-type="fig"}). The exchange site was at a distance of \~ 40 cm from the passer. To "pass" the object, the subject was instructed to maintain, for a maximum time of 5 s, a stationary arm posture (which was the same throughout the experiment), allowing the experimenter (the receiver) to reach towards it and take the object from his/her (the passer's) grasp. Between the trials the passer was asked to keep the arm on the arm rest of the chair, to avoid any side effects of fatigue. Both the passer and the receiver were also instructed to use only their thumb, index and middle fingers to grasp the object (tridigital grasp) throughout the experiment. The receiver, which was the same person throughout the tests (author H.S., male, age 28), was trained to reach for the exchange site at three fixed speeds (*slow, medium*, and *fast*) and did so based on the instructions displayed on the PC screen. Notably, the passer was not informed in advance about the handover speed. Once the speed indication was displayed (at *t*\*) to the receiver, after a random time between 1000 and 3000 ms (uniformly distributed), the receiver was prompted to begin the reaching out movement (a "go" signal). In the meanwhile, at *t*\*, an acoustic signal was played in the passer's headphones to alert him/her that within the next 5 s the receiver would start the handover. This procedure reduced the opportunity for the passer to anticipate the onset of the receiver's reaching movement. For the same reason (i.e. to reduce predictability) the reaching speed of the receiver was randomly selected before each trial began. The acceleration recorded by the IMU was used to validate the trial. Trials having an acceleration modulus in the ranges 0--0.2 G, 0.2--0.5 G and 0.5--0.7 G were considered acceptable for the slow, medium and fast movements, respectively. Trials outside these ranges were automatically deleted and repeated later. The duration of the receiver's reaching movement fell within a range of about 0.6--2 s (based on the acceleration level).
The protocol included two conditions. In one condition, the passer viewed the scene normally, and thus could use visual and tactile feedback to plan and execute the motor task (condition VT). In the other condition, the passer was blindfolded, and as such could not see the receiver's reaching movement and had to rely on tactile feedback only (condition *T*). Each condition included 30 trials, 10 at each speed. To prevent biases in the outcomes due to learning effects, half of the passers started the experiment under condition *T*, while the other half started under condition VT. In all cases a 5--10-min break was taken between the conditions.
### Data analysis {#Sec7}
#### Analysis {#Sec8}
All data were digitized and stored for off-line analysis. For each trial we identified the following relevant events of the handover: the receiver's movement onset (*t*~reaching~), the beginning of the handover (*t*~start~), the passer's release onset (*t*~release~), and the end of the handover (*t*~end~). *t*~reaching~ was identified using a threshold of 0.1 G on the acceleration of the receiver's hand movement (Fig. [2](#Fig2){ref-type="fig"}). *t*~start~, defined as the instant at which the receiver made contact with the object, was identified by finding the peak rate of the receiver GF and moving backward in the trial to the first instant where it dropped below 0.08 N/s, (Fig. [2](#Fig2){ref-type="fig"}). Similarly, *t*~release~, defined as the instant at which the passer began decreasing the GF, was determined going backward from the peak rate of the GF to the first frame when the passer's force rate exceeded − 1 N/s (Fig. [2](#Fig2){ref-type="fig"}). Notably, *t*~release~, described the passer's reactivity (or reaction time). The procedure for identifying *t*~start~ and *t*~release~ was the one suggested by Mason and MacKenzie ([@CR37]), and prevented noise spikes in the signals from affecting segmentation of the data. Finally, the end of the handover, *t*~end~, defined as the instant when the passer broke contact with the object, was identified as the first instant when the passer's GF fell below 5% of its maximum value (Fig. [2](#Fig2){ref-type="fig"}). The time series were synchronized on *t*~start~, i.e. when the receiver made contact with the object.
Once segmented, we also identified the following kinetic features specific to each phase of the handover: the peak absolute acceleration of the receiver during the reaching out movement (*A*), the absolute value of the peak rate of the passer's GF during the handover (dGF~max~), and the peak rate of the interaction force (dFI~max~) before dGF~max~. Specifically dGF~max~ quantified the passer's maximum releasing GF rate, whereas dFI~max~ the magnitude of the collision. For each subject, three Pearson's correlation coefficients (*r*~0~, *r*~1~, *r*~2~) were computed. *r*~0~ was calculated between A and dFI~max~, for both *T* and VT conditions, to verify the existence of a relationship between the receiver's reaching out speed and the magnitude of the haptic input. *r*~1~ was calculated between *A* and dGF~max~ under VT, while *r*~2~ was evaluated between dFI~max~ and dGF~max~ under *T*, to assess the influence of the sensory input (seen and/or perceived) on the modulation of the passer's GF. The average of the correlation coefficients across participants was calculated performing a Fisher transformation of *r* values of each subject and back-transforming the average of the resulting *z* scores.
#### Statistical analysis {#Sec9}
This study was characterized by two within-subjects factors, namely sensory input condition (VT and *T*) and receiver reaching speed (slow, medium, and fast). Hence a two way repeated measures ANOVA was used to assess the effects of the experimental conditions on the passer's reactivity (*t*~release~), on the duration of the handover (*t*~end~) and on its kinetics (dGF~max~). The ANOVAs were followed by Bonferroni corrected post-hoc tests. In particular, when both the sensory input and the reaching out speed proved statistically significant a total of nine comparisons were performed; between VT and *T* for each of the reaching out speeds (three comparisons) and among *slow, medium*, and *fast* for each sensory input condition (six comparisons).
In all cases a *p* value \< 0.05 was considered statistically significant. The nomenclature of the metrics used in this experiment is summarized in Table [1](#Tab1){ref-type="table"}.
Table 1Descriptive nomenclatureSymbolDescription*A*The peak acceleration of the receiverdFI~max~The peak rate of the passer interaction forcedGF~max~The peak rate of the passer grasp force*t* ~release~The time difference between the receiver's object contact and the time when the passer began releasing*t* ~end~The completion time of the transfer*r* ~0~Average Pearson's correlation coefficient between dFI~max~ and *Ar* ~1~Average Pearson's correlation coefficient between dGF~max~ and *Ar* ~2~Average Pearson's correlation coefficient between dGF~max~ and dFI~max~
Experiment 2 {#Sec10}
------------
### Experimental set-up {#Sec11}
The experimental set-up consisted of an anthropomorphic robotic hand, a three-axis force sensor, a host PC equipped with a data acquisition board and a test-object instrumented with sensors. The robotic hand was a left-handed version of the IH2 Azzurra robot hand (Prensilia Srl, Italy). Movements were limited to only flexion--extension of the thumb, index finger and middle fingers to allow stable pinch grasps between the three digits. The robotic hand included force sensors and encoders able to measure the GF and the grip aperture, respectively. The hand could implement force/position control by receiving commands from the host PC over a serial bus. The hand was fixed to a (unmoving) anthropomorphic robot arm by means of a three-axis force sensor (SOGEMI Srl, Italy), able to measure the forces exchanged between the hand and a human partner at the wrist level. The hand was placed 100 cm from the ground, in a way it could offer an object to a human partner (Fig. [3](#Fig3){ref-type="fig"}).
Fig. 3Experimental setup. **a** The robotic hand was placed in front of the receiver at a fixed height and oriented to present the test-object in a comfortable way. Force diagram of the handover. *F*~w~ is the sum of the weight of the object, *W*, with the interaction force of the receiver, *R*. The test-object is the same as used in Experiment 1. **b** Representative grip force release profile of the automatic controller used in this experiment. Release conditions differ in the threshold on the wrist force *F*~wT~ used to trigger the beginning of the handover that determines the time *T*~t~ or in the time release *T*~r~
The data from the sensors were recorded (rate 1 kHz) by means of the data acquisition board (NI-USB 6211, National Instruments) and used by a custom PC application to control the release of the robotic hand during handover trials. The test-object was the same used in Experiment 1.
The robotic hand was programmed to automatically release the object following a stereotypical grip force trajectory. The release was triggered when the modulus of the force measured by the wrist sensor (*F*~w~) exceeded a certain threshold (*F*~wT~). At this time (*t*~release~) the robotic hand began decreasing the GF following a third-order polynomial trajectory (Fig. [3](#Fig3){ref-type="fig"}), akin to that observed in human-to-human handovers (Endo et al. [@CR13]) (also confirmed by Experiment 1):$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$\begin{aligned} & {\text{GF}} ={a_0}+{a_1}{t^2}+{a_2}{t^3} \\ & {a_0} ={\text{G}}{{\text{F}}_0}, \\ & {a_1} = - \;\frac{{3{\text{G}}{{\text{F}}_0}}}{{T_{{\text{r}}}^{2}}}, \\ & {a_2} =\frac{{2{\text{G}}{{\text{F}}_0}}}{{{\text{T}}_{{\text{r}}}^{3}}}, \\ \end{aligned}$$\end{document}$$with *T*~r~, the release duration i.e. the time required to decrease the GF to zero (occurring at *t*~end~ = *t*~release~ + *T*~r~, defined as the duration of the handover). As both *F*~wT~ and *T*~r~ were fully programmable the robotic hand could implement different release behaviours by modulating two independent features: reactivity and speed. Indeed by changing *F*~wT~ it was possible to adjust *t*~release~, hence the beginning of the release, or in other words, the reactivity of the robot hand. In addition modulating *T*~r~ meant obtaining slower or faster releases.
### Experimental protocol {#Sec12}
In this test the robot hand played the role of the passer, while the participants of the receivers, in robot--human handovers. The participants, standing in front of the experimental materials on a marked position, were instructed to reach out, grasp and collect the test-object from the robotic hand, using their own dominant arm. In particular, for each experimental trial, the object was securely fixed in the hand (by the experimenter) using a pinch grip (GF~0~ = 6.5 N). Participants were instructed to execute the task at a self-paced speed and as naturally as possible.
The protocol included 12 conditions (C-*t*1,...,C-*T*4), randomized across participants, which differed based on the reactivity (*t*~release~) and speed (*T*~r~) exhibited by the robotic hand (Table [2](#Tab2){ref-type="table"}). Each condition included two consecutive series (S1 and S2), of 2 and 10 trials, respectively, for a total of 144 trials. After each series an evaluation questionnaire was completed (for a total of 24 questionnaires). The questionnaire after S1 aimed to assess the fluency of the handover experienced by the receiver to a semi-novel yet poorly predictable passer's behaviour (Huber et al. [@CR23], [@CR24]; Glasauer et al. [@CR18]). The questionnaire after S2 instead, assessed the perceived fluency for stereotyped and predictable handovers.
Table 2Handover conditionsCondition*F* ~wT~ (N)Handover reactivity (*t*~release~ (ms) mean ± standard error)Release duration\
*T* ~r~ (ms)Handover duration \[*t*~end~ (ms)\]C-*t*10.874 ± 15155229C-*t*20.874 ± 15355429C-*t*30.874 ± 15555629C-*t*40.874 ± 15755829C-*Tt*10.3429 ± 5200229C-*Tt*20.3429 ± 5400429C-*Tt*30.3429 ± 5600629C-*Tt*40.3429 ± 5800829C-*T*10.874 ± 15200274C-*T*20.874 ± 15400474C-*T*30.874 ± 15600674C-*T*40.874 ± 15800874
The questionnaire included the three following statements:
Q1: "I am satisfied with the handover";Q2: "The handover took place in a natural way";Q3: "I perceived the actions of the robot to be..."
For Q1 and Q2 the participants were asked to rate the extent to which the statements did or did not apply, using a nine-point analogue scale. On this scale, 1 meant "absolutely certain that it did not apply", 5 meant "uncertain whether it applied or not", and 9 meant "absolutely certain that it applied". Q3 had three possible answers:
"...early with respect to my action";"...coordinated with my action";"...delayed with respect to my action".
To test release behaviours characterized by different reactivity and different release or handover duration, the 12 conditions mixed two different values of *F*~wT~ (0.34 N; 0.8 N) with several values of *T*~r~ and, consequently, with several values of *t*~end~. In particular, each value of *F*~wt~ was paired both with four values of *t*~end~ (229, 429, 629, 829 ms; C-*t*1,...,C-*t*4, C-*Tt*1,...,C-*Tt*4 in Table [2](#Tab2){ref-type="table"}) and with four values of T~r~ (200, 400, 600, 800 ms, C-*Tt*1,...,C-*Tt*4, C-*T*1,...,C-*T*4 in Table [2](#Tab2){ref-type="table"}). The tested *F*~wT~ values were chosen after a pilot study and corresponded to *t*~release~ values of 29 ± 5 ms (for *F*~wT~ = 0.34 N) or 74 ± 15 ms (for *F*~wT~ = 0.8 N). The *T*~r~ values were chosen based on the GF release duration observed in healthy humans, which is known to range between \~ 200 and 400 ms (Chan et al. [@CR7], [@CR8]; Endo et al. [@CR13]). Nonetheless we also tested longer *T*~r~.
### Data analysis {#Sec13}
#### Statistical analysis {#Sec14}
The ratings on the perceived quality and timing of the handover were analysed using two three-way repeated measures ANOVAs. With the first ANOVA (ANOVA1), performed on controllers C-*t*1,...,C-*Tt*4, we tested the influence of *t*~release~, *t*~end~, and of the series. With the second ANOVA (ANOVA2), performed on controllers C-*Tt*1,...,C-*T*4, we tested the influence of *t*~release~, *T*~r~, and of the series. When the data violated the sphericity assumption, the Greenhouse--Geisser correction was used to adjust the degrees of freedom of the test. Moreover, the simple main effects of *t*~release~ at each level of *T*~r~ or *t*~end~ were tested applying the Bonferroni correction. Statistical significance was defined for *p* value \< 0.05.
Results {#Sec15}
=======
Experiment 1 {#Sec16}
------------
Passers successfully completed handovers initiated by the receiver using slow, medium or fast reaches, both with and without visual sensory input. Illustrative functions in Fig. [4](#Fig4){ref-type="fig"} show passer and receiver GF functions were consistently coordinated across receiver reach speeds, with passer reduction in GF starting earlier and progressing more steadily with vision. Without vision, the passer's GF decrease was slower in onset, and progressed initially at a slower, then later at a more rapid rate.
Fig. 4Representative outcomes from a single subject. **a** Representative profiles of receiver's acceleration, passer's and receiver's grip force (GF), rate of passer's GF and rate of interaction force during the fast receiver's reach, under VT and *T* conditions. Bold line represents the mean; shadowed area represents the standard deviation. **b** Handover coordination profiles: passer's vs. receiver's GFs. The shadowed area represents the 95% confidence interval
The passer's reactivity (*t*~release~) was affected by both the sensory input (repeated ANOVA, *F*(1,13) = 61.307, *p* \< 10^−5^) and by the reaching out speed (repeated ANOVA, *F*(2,26) = 5.338, *p* = 0.011) (Fig. [5](#Fig5){ref-type="fig"}a) and the interaction between the two factors was significant (repeated ANOVA, *F*(2,26) = 3.699, *p* = 0.039). As expected, the post-hoc tests revealed higher reactivity when vision was available (*p* values \< 10^−4^). Interestingly, the *t*~release~ did not differ across the three reaching out speeds (*p* values \> 0.6), exhibiting an average value of 4.6 ± 15.6 ms (mean ± SEM). When participants were blindfolded the average reactivity was 108 ± 5 ms and increased with the speed of the movement; however, a significantly lower *t*~release~ was found only between the slow and fast movements (Fig. [5](#Fig5){ref-type="fig"}a). The *p* values of the post-hoc comparisons are listed in Table [3](#Tab3){ref-type="table"}.
Fig. 5Effect of the visual condition and of the handover timing on the *t*~release~ (**a**), *t*~end~ (**c**), dGF~max~ (**d**) and *T*~t~ (**d**) and interaction between visual condition and group on *t*~release~ (**b**) (mean ± SEM)
Table 3Bonferroni corrected *p* values of post hoc multiple comparisonsPost hoc comparisonsVT + slow VT + mediumVT + slow VT + fastVT + medium VT + fast*T* + slow *T* + medium*T* + slow *T* + fast*T* + medium *T* + fastVT + slow *T* + slowVT + medium *T* + mediumVT + fast *T* + fast*t* ~release~0.6420.9890.9810.2070.003\*0.0660.000\*0.000\*0.000\*dGF~max~0.2130.000\*0.000\*0.012\*0.012\*0.0840.0180.003\*0.097*t* ~end~0.000\*0.000\*0.000\*0.003\*0.000\*0.000\*0.1160.002\*0.002\*\*Statistically significant comparison (i.e. *p* \< 0.05)
The kinetics of the handover (dGF~max~) was affected by the sensory input (repeated ANOVA, *F*(1,13) = 7.985, *p* = 0.014) and the reaching out speed (repeated ANOVA, *F*(2,26) = 30.026; *p* \< 10^−6^), however, there was no interaction between the two factors (Fig. [5](#Fig5){ref-type="fig"}b). Although the dGF~max~ increased with speed for both the sensory input conditions, this was statistically significant in all comparisons with the exception of those between medium and fast under condition *T* (*p* = 0.08) and between slow and medium under condition VT (*p* = 0.2) (Fig. [5](#Fig5){ref-type="fig"}b). Interestingly, participants released their hold on the object faster when blindfolded; this was statistically true when the receiver's reaching out movement was slow or medium (*p* values \< 0.019) (Fig. [5](#Fig5){ref-type="fig"}b).
As for *t*~release~, the handover duration (*t*~end~) was affected by the sensory input (repeated ANOVA, *F*(1,13) = 10.701, i = 0.006) and the reaching out speed (repeated ANOVA, *F*(2,26) = 87.124, *p* \< 10^−11^) with no significant interaction (Fig. [5](#Fig5){ref-type="fig"}c). The post hoc tests revealed that *t*~end~ decreased as the receiver moved faster for both the sensory input conditions (*p* values \< 0.004); *t*~end~ was statistically higher in *T* than in VT for medium and fast movements (Table [3](#Tab3){ref-type="table"}; Fig. [5](#Fig5){ref-type="fig"}c).
Figure [6](#Fig6){ref-type="fig"} shows illustrative scatter plots of the relations between (a) the peak interaction force rate and receiver's peak reach acceleration (across sensory conditions), (b) the passer's peak GF rate and receiver's reach acceleration and (c) the receiver's GF rate and the interaction force. Each of the three correlations is significantly greater than zero. The average correlation coefficient between the receiver's reaching out acceleration and the magnitude of the tactile/haptic input, *r*~0~, proved significant (*r*~0~^m^ = 0.6549, *p* \< 0.0001) (Fig. [6](#Fig6){ref-type="fig"}).
Fig. 6Representative linear correlation between dFI~max~ and *A* (*r*~0~), between dGF~max~ and *A* (*r*~1~) in condition VT and between dGF~max~ and dFI~max~ (*r*~2~) in condition *T* for one subject
The average correlation (*r*~1~) between the receiver's acceleration and the passer's releasing speed, under the VT condition, proved statistically significant (*r*~1~^m^ = 0.584, *p* \< 10^−3^), thus strengthening the outcomes of the statistics on dGF~max~ (Fig. [5](#Fig5){ref-type="fig"}b). The average correlation (*r*~2~) between the magnitude of the collision and the passer's releasing speed, under the *T* condition, proved statistically significant (*r*~2~^m^ = 0.444, *p* = 0.014), again, in agreement with the previous test (Fig. [5](#Fig5){ref-type="fig"}a).
Experiment 2 {#Sec17}
------------
For each condition and after each series, the ratings to questions Q1 and Q2 proved similar (Fig. [7](#Fig7){ref-type="fig"}). Though very short handovers were not judged as not coordinated (or unnatural), whereas long ones were so. Ratings of satisfaction, naturalness and perceived degree of coordination increased with: (1) more reactive release behaviours, (2) shorter release durations, and with (3) shorter handover durations (Fig. [7](#Fig7){ref-type="fig"}a, b).
Fig. 7Subjective ratings of handovers with robot conditions 1--4 varying in duration from short (fast) to long (slow), and conditions *t* and *T* involving high tangential trigger force for onset of GF release (low reactivity) and *Tt* involving low trigger force (high reactivity) (mean ± SEM) for Q1 (**a**), Q2 (**b**), and relative frequencies of ratings for Q3 (**c**). Answers to block B1 in black, block B2 in red. Asterisk indicates statistically significant comparisons (corrected *p* values \< 0.05); star indicates the series when at least one subject replied "early" to question Q3
In particular, the ratings of both Q1 and Q2 were statistically affected by *t*~release~ (ANOVA1, *F*(1,10)-values \> 9.82, *p* values \< 0.011; ANOVA2, *F*(1,10)-values \> 12.19, *p* values \< 0.01), *t*~end~ (ANOVA1 for Q1, *F*(3,30)-values \> 4.889, *p* values \< 0.01; ANOVA2 corrected for Q2, *F*(1.702,17.025) = 13.129, *p* \< 0.001) and *T*~r~ (ANOVA2 corrected for Q1 *F*(1.74,17.4) = 24.455, *p* \< 0.001; corrected for Q2, *F*(1.603,16.028) = 15.918, *p* \< 0.001). For question Q1, when comparing conditions with same handover duration (*t*~end~) but different reactivity (*t*~release~) we found a significant preference for more reactive releases in those handovers with *t*~end~ equal to 429 ms and 629 ms (*p* values \< 0.05). For the fastest (*t*~end~ = 229 ms) and the slowest (*t*~end~ = 829 ms) conditions it made no difference whether the handover was more or less reactive. Equivalent results were found when comparing conditions with same release duration (*T*~r~) but different *t*~release~ (Fig. [7](#Fig7){ref-type="fig"}a). Matched results were also found for Q2 (Fig. [7](#Fig7){ref-type="fig"}b).
The statistical analysis did not reveal significant main effects of the series (*F*(1,10)-values \< 2.93, *p* values \> 0.7) on neither ratings of Q1 and Q2. However, for both Q1 and Q2 a significant interaction was found between *T*~r~ and the series (ANOVA2 *F*(3,30)-values \> 3.823, *p* values \< 0.02) and between *t*~end~ and series (ANOVA1 *F*(3,30)-values \> 3.155, *p* values \< 0.04). In fact, for faster release behaviours participants provided larger ratings after S2 than after S1; for slower controllers, ratings proved higher after S1 than S2 (Fig. [7](#Fig7){ref-type="fig"}a, b).
The qualitative analysis of the answers to Q3 supported the outcomes of the statistical tests for Q1 and Q2. In particular, the number of participants who perceived the robot as "coordinated" decreased with: (1) decreased reactivity, (2) increased release time, and (3) increased completion time of the handover (Fig. [7](#Fig7){ref-type="fig"}c). Remarkably only two participants in S1 and one participant in S2 reported that fastest condition was early with respect to their actions.
Discussion {#Sec18}
==========
In this work, we investigated the passer's GF modulation with varying receiver's reaching out speeds and different sensory input conditions, as well as the receiver's perception of the fluency of the handover with different releasing behaviours. In the first experiment, we investigated whether the passer integrates the visual input about the receiver's approaching movement to select (in advance) the release motor program, and compared the GF profiles with those of a blindfolded passer.
Release behaviour with visual and tactile input {#Sec19}
-----------------------------------------------
Taken together our results are compatible with the control models for manipulative tasks (Johansson and Edin [@CR26]; Randall Flanagan et al. [@CR47]; Johansson and Flanagan [@CR27]; Fang et al. [@CR14]; Haruno et al. [@CR20]; Flanagan and Wing [@CR15]). In the first experiment, we observed that passers endowed with both visual and haptic/tactile input use predictive/anticipatory control purely based on vision to trigger the handover (Figs. [4](#Fig4){ref-type="fig"}b, [5](#Fig5){ref-type="fig"}c). This outcome extends Mason's and MacKenzie's ([@CR37]) study because it demonstrates that when vision is available the passer estimates and synchronizes the release of the object with the time of the collision, independently of the receiver's reaching out speed (Fig. [5](#Fig5){ref-type="fig"}a). Such a predictive behaviour shows similarities with the one observed during catching tasks at different speeds, hence similar mechanisms may explain it (Lacquaniti and Maioli [@CR35]; Savelsbergh et al. [@CR49]). For example Savelsbergh et al. ([@CR49]) suggested that the prediction of the collision is based on the time-to-contact and not on the distance-to-contact. The fact that the passer does not wait for the collision to begin the handover, implies that online tactile/haptic input is not used by the nervous system to select and launch the appropriate release motor program. Instead, such an input may be used only for monitoring the execution of the motor task and, if necessary, to initiate corrective actions (Johansson and Edin [@CR26]; Randall Flanagan et al. [@CR47]; Johansson and Flanagan [@CR27]; Fang et al. [@CR14]). This hypothesis is in agreement with the study of Endo et al. ([@CR13]), who showed that a partial corruption of the passer's tactile/haptic input does not affect the beginning of the release albeit it increases the passer's uncertainty at the end of the handover. However, it remains to be clarified how passers would change the way they release if they performed handovers in total absence of tactile input.
Our results show that in normal visual conditions a passer scales the releasing speed (dGF~max~) according to the acceleration of the receiver's reaching out movement (Figs. [5](#Fig5){ref-type="fig"}b, [6](#Fig6){ref-type="fig"}). This suggests that while the receiver reaches for the object the passer, observing the receiver's movement, infers the dynamics of the upcoming handover and thus selects the appropriate releasing speed. This hypothesis is in agreement with the theory of Quesque and his group (Quesque and Coello [@CR45]; Quesque et al. [@CR46]) that one's intention can be anticipated from the observation of the partner's action. In addition it is consistent with the kinematical correlations found between cooperative agents (Georgiou et al. [@CR17]) and with the hypothesis of *motor resonance*. The latter posits that when an individual observes other people's movements, his/her brain runs an internal motor simulation, used to understand the other's people intentions and to predict the future course of the observed action (Rizzolatti and Craighero [@CR48]; Springer et al. [@CR51]).
In their work, Mason and MacKenzie studied human-to-human handovers under normal visual conditions, identifying them as coordinated by demonstrating synchronized peaks of the GF rates. Here we suggested a more illustrative way to describe the coordination between the agents, which is the passer's GF expressed as a function of the receiver's GF (the graphs in Fig. [4](#Fig4){ref-type="fig"}b). This methodology borrows from the neuroscience literature, which presents similar metrics (the GF vs. the load force) to assess motor coordination during grasp (Flanagan et al. [@CR16]) and to compare, e.g. healthy vs. impaired participants, adults vs. children, unimpaired digits vs. anesthetized ones (Gordon et al. [@CR19]; Cipriani et al. [@CR9]). The coordination profiles observed under visual input confirm and once again extend the finding of Mason and MacKenzie, by showing that once collision has occurred the passer and the receiver modulate their GF in a synchronized manner, until the end of the handover, and regardless of the receiver's reaching out speed (Fig. [4](#Fig4){ref-type="fig"}b). Again, this could be explained by the motor resonance hypothesis. Nonetheless, it seems that such a coordination slightly decreased for the fast reaching out movement, as demonstrated by less correlated GFs (the curves in Fig. [4](#Fig4){ref-type="fig"}b become less linear with speed). This invites further studies in which faster handovers are tested, to assess whether the motor task becomes less coordinated.
Release behaviour with only tactile input {#Sec20}
-----------------------------------------
When only tactile feedback was available, the passers released the object exhibiting a sensory elicited (feedback-based) behaviour. The correlation found between the receiver's reaching out acceleration and the magnitude of the tactile/haptic suggests that the information associated to the receiver's movement may be transferred to the passer visually and/or via tactile/haptic interaction (Fig. [6](#Fig6){ref-type="fig"}). However, the tactile feedback was not enough for achieving coordinated movements, as clearly depicted by the coordination profiles (cf. the knees in the red curves in Fig. [4](#Fig4){ref-type="fig"}b). The delays observed when the passer was blindfolded, fell within the range of the latencies associated to automatically initiated responses elicited by somatosensory input during grasp (Johansson and Westling [@CR28], [@CR29], [@CR30], [@CR31]).
We also observed that the latency between the collision and the beginning of the release decreased with the speed of the receiver's reaching out movement (Fig. [5](#Fig5){ref-type="fig"}a), and in turn with the magnitude of the collision (Fig. [6](#Fig6){ref-type="fig"}). Opposite trends were observed for the grip force rate (dGF~max~) (Fig. [5](#Fig5){ref-type="fig"}b) which scaled with the magnitude of the collision (dFI~max~) (Fig. [6](#Fig6){ref-type="fig"}). Interestingly, this release behaviour shows similarities with the *impulsive catch-up response*. The latter is a rapid increase of GF that adult humans adopt to stabilize their grasp on an object, when unpredictable load force perturbations occur (Cole and Abbs [@CR10]; Cole and Johansson [@CR11]). In particular, Johansson et al. ([@CR32]) showed that the latency between the start of the perturbation and the onset of the catch-up response decreases with the rate of the perturbation (akin to Fig. [5](#Fig5){ref-type="fig"}a), and that the peak rate of the GF is proportional to the magnitude of the perturbation (akin to Fig. [6](#Fig6){ref-type="fig"}). The complementarity in the outcomes may be explained considering that the goal of the catch-up test (i.e. to stabilize the hold after an unexpected perturbation) is opposite to the goal of the blindfolded passer (i.e. to release the hold after an unexpected perturbation). These results suggest that when visual input is unavailable, the passer's neural system may involve fast feedback mechanisms akin to those involved in the catch-up response, to modulate the GF. Moreover, as already hypothesised by Johansson for explaining the catch-up response (Johansson et al. [@CR32]), the GF response in the blindfolded passer may be elicited only if the sensory input associated to the collision exceeds a certain threshold. Thus, when the receiver produces a more intense collision, for example due to a fast reaching out movement, tactile/haptic signals overcome sooner such a threshold and the passer begins the release earlier (Fig. [5](#Fig5){ref-type="fig"}a).
Perception of a fluent handover {#Sec21}
-------------------------------
In the second experiment, we investigated how the fluency of the handover perceived by the receiver reaching out at a self-paced speed is influenced by the reactivity, the speed of the release and the completion time of the handover. Results showed that control strategies with a lower *t*~release~ (i.e. a lower *F*~wT~ to trigger the release) were generally preferred.
The statistical analysis proved that the effect of *t*~release~ on the ratings was significant only when the handover was executed with the two intermediate levels of *T*~r~ and *t*~end~ (C-*t*2, C-*t*3, C-*tT*2, C-*tT*3, C-*T*2, C-*T*3) but not for the fastest and slowest conditions. This outcome advocates two discussion points. The first one is that the initial phase of the handover (immediately after the collision), influences the receiver's perception of fluency only when the interaction takes place at a natural pace, and this was expected since it is coherent with the reaching out speed of the participants. When a latency is present, even very small, this is perceived and cognitively processed by the receiver, and the interaction is experienced as less natural.
The second interesting point refers to the observed lack of sensibility to reaction time in the slowest and fastest conditions. This suggests (but is just an hypothesis) that we probably found the range of perceivable differences in the stimuli (with the experienced fluency being the stimulus) achievable with the present parameters. For the slowest conditions, this may be due to the time scales involved: the subtle difference in reaction times (roughly 40 ms) was one order of magnitude lower than the handover duration (*t*~end~ \> 800 ms); it is likely that for so slow handovers, the brain misses the saliency of slightly shorter or longer reaction times. For the fastest conditions instead, in view of the outcomes of Experiment 1, we argue that better ratings could be achieved for reaction times closer to zero. Indeed as observed in the first experiment, in normal conditions the reaction time is close to zero (predictive behaviour) for a wide range of handover dynamics. Hence handovers may be experienced as natural only when the passer uses a predictive behaviour and starts releasing the object at the time of the collision. With this in mind is was not surprising to learn that the experimental conditions were experienced as too fast only in three instances during the experiment. An additional reason may reside in the influence that an interaction with a robotic partner may have on the behaviour of the participants. Contrary to human--human handovers, in robot--human handovers it is likely that participants took the responsibility of the object stability with the result that they exploited a faster dynamics of the grasping force to mitigate the risk of dropping the object (that may occur if the robotic passer releases the object too soon). Thus, the release of the object occurred when the grasping force of the receiver was sufficient to stably hold the object, and fastest releases were judged as satisfactory and coordinated. In any case, the need of a predictive behaviour in a robot passer poses an important requirement to the designers of collaborative robots aimed to interact safely and naturally with humans. Vision or other sources of artificial sensory inputs may be used for achieving such a challenging goal.
The interaction found between the release duration (*T*~r~) and the level of confidence with the passer's behaviour (i.e. series S1 and S2) suggests a way to split the conditions between those that were deemed acceptable and those that were not. The acceptable conditions were probably those for which participants were prone to adapt and synchronize with the robot hand behaviour. Hence these conditions achieved a greater score after ten repetitions (the second series) than after the very first two trials (S1). Vice versa the unacceptable conditions were those that got a worse mark after the second series.
Further researches are necessary to investigate the fluency of the handover perceived by the receivers when they have to perform also a subsequent task with the object. In particular, it would be interesting to determine the effects of such a perception on the kinematic of the receiver not only during the handover but also during the following actions.
This work was funded by the European Research Council under the MYKI project (ERC-2015-StG, Grant no. 679820). Authors would like to acknowledge Markus Rank, Carlo Peccia and Ilaria Strazzulla for their help in the second experiment and all participants that participated in the study.
MC designed the study, developed the hand and the test object, performed the experiments, analysed the data and wrote the paper. HS designed the experimental protocol and performed experiment 1, and wrote the paper. FC analysed the data of both experiments and wrote the paper. TC designed the software, the test object and wrote the paper. AW designed the study and wrote the paper. CC designed the study, supervised the experiments and wrote the paper.
|
Mental health inpatient experiences of adults with intellectual disability.
This paper presents findings from a study exploring the mental health inpatient care of people with a dual disability of intellectual disability and mental health issues from the perspective of those people with the dual disability. A mixture of semi-structured interviews and focus group interviews were carried out with nine participants who had been admitted to an inpatient unit for mental health care exploring their experience of care. Interviews were transcribed and analyzed using open coding and Leximancer (an online data mining tool) analysis to identify dominant themes in the discourse. Analysis revealed themes around 'Therapeutic and Meaningful Activity', 'Emotion Focussed Care', and 'Feeling Safe?' Participants were able to identify the aspects of inpatient care that worked for them in terms of coping with time in hospital. This research suggests that there are several factors that should be considered in providing effective mental health inpatient care for people with dual disability. A number of strategies and recommendations for responding to their needs are identified and discussed. |
(let (rec)
(datatypebind (datatype
(tyvardecl Nat (type))
-- no arguments
match_Nat
(vardecl Zero Nat)
(vardecl Suc (fun Nat Nat))))
(let (nonrec)
(termbind (strict) (vardecl three Nat)
[Suc [Suc [Suc Zero]]])
(let (rec)
(termbind (strict) (vardecl stupidZero (fun Nat Nat))
(lam n Nat
[{[match_Nat n] Nat} Zero (lam pred Nat [stupidZero pred])]))
[stupidZero three]
)
)
)
)
|
Q:
Iteration stops after the first matching instance when I want it to carry on
So the idea here is that I'm comparing two ArrayLists. If the word from PirateDictionary matches the phrase from Phrase then you print Phrase +1, if it doesn't match you simply return the original word. Now my code does the comparing just fine, but when it gets to the first matching case it prints off Phrase +1 as intended but then it stops when there are still words to compare, and this is where I don't know what I'm missing. Here is the method that I'm using:
public void compareLists(){
String nameSearch;
for(PirateDictionary w: words){
nameSearch = w.toString();
Iterator<Phrase> it = phrases.iterator();
while(it.hasNext())
{
Phrase c = it.next();
if (c.getName().equals(nameSearch)) {
System.out.println( it.next().toString());
return;
}
}
System.out.println(w.toString());
}
}
IF anyone could have a look at this I would appreciate it.
A:
As you said your code works fine until the first matching case is reached. In your code this is the point at which the condition in the if-clause is evaluated to true:
if (c.getName().equals(nameSearch)) {
System.out.println( it.next().toString());
return;
}
If a match is found, the matched string is printed to System.out and then you return (leave the method)- hence no other comparison will take place. Please remove the return statement to continue checking the rest of the words.
|
Gypsum products such as a dental model, an industrial model, and a wall-plastering material are sometimes appropriately colored according to their application. For example, the dental model (teeth model) can be prepared by pouring gypsum that is mixed with water into a female impression of teeth formed from a plastic material or the like to cure the gypsum, and then removing the impression of teeth (see, for example, Patent Literature 1 and Patent Literature 2). In preparing the dental model, a pigment is added to a powder of gypsum as a raw material to color the dental model to be obtained into a desired color.
In order to improve the colorability of a gypsum product to be obtained, such as a dental model, it usually becomes necessary to increase the amount of the pigment added to the gypsum. However, when the addition amount of the pigment is increased, it sometimes occurs that the cost required for coloration increases and the strength of the gypsum product to be obtained, which is a hardened body, is lowered.
Moreover, in the case where, for example, a colored gypsum hardened body such as a dental model is produced, gypsum that is mixed with water, when poured into an impression of teeth, is given mechanical vibration using a vibrator or the like. Thereby, the fluidity of the gypsum is secured and bubbles inside are removed. However, there has been a problem that, when the mechanical vibration is given to the gypsum that is mixed with water, the pigments aggregate to make color unevenness liable to occur in the gypsum hardened body to be obtained. |
6.21.2004
"Madonna wants to be 'part of the order, not the chaos' of the world
Madonna has said US President George Bush and ex-Iraqi leader Saddam Hussein are alike because 'they are both behaving in an irresponsible manner'. " |
Thoughts on Perl and Emacs, technology and writing
Emacs and External Processes
Emacs has some nice facilities for interacting with external
processes. Recently I was working with an extremely long line with no
spaces that I wanted to split into lines of 72 characters. I banged
this out in about 20 seconds:
M-| (shell-command-on-region)
perl -e '$_=<>;s/(.{72})/$1\n/g;print'
Now,
Maybe I could have written this to a file and run perl on it using
the shell
Related
3 Responses
where the items in [] are keypresses. The regex is pretty much the same as what you have there in perl, except with more backslashes, and the “ctrl-q ctrl-j” thing is needed to get a newline into the replacement text.
Also, you could shorten your perl like this:
perl -pe ‘s/(.{72})/$1\n/g’
Lastly, I assume you used a prefix arg on your M-| too, since that would cause the perl output to replace the region directly.
[…] One thing that isn’t well highlighted (so to speak) is how well ediff drills down on the exact change. It doesn’t just say “this line is different to this line”, it focuses on the exact change within the line. You can easily see here the tags that have been added to an old revision of one of my earlier posts. […] |
Jimmy Carter: Bolton appointment 'a disaster for our country ...
Mar 26, 2018 ... “I think John Bolton is a disaster for our country,” Carter told “CBS This Morning” in an interview set to air in full on Tuesday. “Maybe one of the worst mistakes that President Trump has made since he's been in office is the employment of John Bolton, who has been advocating a war with North Korea for a ...
Bolton's appointment 'a disaster for our country': Jimmy Carter. Tue Mar 27, 2018 2:17PM. Home. Former US President Jimmy Carter signs a copy of his new book 'Faith: A Journey For All' at a book signing event at Barnes & Noble bookstore in Midtown Manhattan, March 26, 2018 in New York City. (Photo by AFP).
Mar 26, 2018 ... Carter said he was 'very much distressed' to see McMaster replaced by Bolton. 'I think John Bolton is a disaster for our country,' he told USA Today. 'Maybe one of the worst mistakes that President Trump has made since he's been in office is the appointment of John Bolton.' Read More. Carter described ...
Mar 26, 2018 ... NEW YORK — Former president Jimmy Carter, one of the few U.S. officials who has traveled to North Korea and met with its leaders, expresses hope for the planned White House summit with Pyongyang but warns that President Trump may have made “one of the worst mistakes” of his tenure by naming ... |
Q:
Help with Summation Inequality: $\sum a_i \sum b_i \ge \sum a_ib_i$
I can't find a reference to the fairly simple idea that:
$\Sigma (a_i) \Sigma(b_i) \geq \Sigma(a_ib_i)$ for $a_i,b_i \geq 0$
This is obviously equal for the case where $i$ goes only to 1 and for the n=2 case, the left hand side expands out to include every term on the right hand side plus a few cross terms. I just can't find its name or an elegant proof other than expanding the left hand side. It looks maybe related to the arithmetic-geometric mean inequality? Thanks
A:
$\sum{a_i}\sum{b_i} - \sum{a_i}{b_i} = \sum_{i\neq j}a_ib_j\geq0$
A:
You don’t have to expand the lefthand side completely:
$$\begin{align*}
\left(\sum_{i=1}^na_i\right)\left(\sum_{j=1}^nb_j\right)&=\sum_{i=1}^n\sum_{j=1}^na_ib_j\\
&=\sum_{1\le i,j\le n}a_ib_j\\
&=\sum_{1\le i=j\le n}a_ib_j+\sum_{{1\le i,j\le n}\atop{i\ne j}}a_ib_j\\
&\ge\sum_{1\le i=j\le n}a_ib_j\\
&=\sum_{i=1}^na_ib_i\;.
\end{align*}$$
|
Ak Bars edges thriller in Petersburg
SKA St. Petersburg 5 Ak Bars Kazan 6 (SO)
Ak Bars’ first period performance suggested that talk of problems in Kazan was laughably premature – but after sweeping into a 4-1 lead at SKA, Zinetula Bilyaletdinov saw his team fold in the closing stages to allow Oleg Znarok’s men to tie it up at 5-5.
The visitor rallied to claim a shoot-out victory: two saves from Emil Garipov denied Vadim Shipachyov and Ilya Kovalchuk before Fyodor Lukoyanov got the winner. But for two periods of Pavel Datysuk-inspired SKA dominance, this was a game that highlighted many of the weaknesses of Ak Bars in the opening weeks of the season.
Before the game there was much talk of the renewed rivalry between Bilyaletdinov and Znarok, the man who replaced him behind the bench of Team Russia. The two had memorably duelled in the 2010 Gagarin Cup final, when Bilyaletdinov’s Ak Bars got an almighty fright against Znarok’s unfancied MVD. And now they met as two of the most distinguished tacticians in the game but with Znarok seemingly in the ascendancy. SKA had made by far the brighter start to the season and since that 2010 Gagarin Cup win Bilyaletdinov had not won a major club trophy; Znarok, by contrast, had claimed two Gagarin Cups of his own in the interim.
Yet the early exchanges hinged on single incident early in the first period. SKA was leading 1-0 thanks to Shipachyov’s fourth-minute goal when Evgeny Ketov was ejected from the game for kneeing. During the subsequent major penalty, Ak Bars scored four goals in less than three-and-a-half minutes to build up a commanding lead.
Jiri Sekac tied the scores, then Anton Glinkin and Atte Ohtamaa combined twice in the space of 37 seconds to create goals for Vasily Tokranov and Andrei Popov. Vladimir Tkachyov added a fourth; starting goalie Igor Shestyorkin was pulled for Evgeny Ivannikov as SKA’s evening went alarmingly off course.
After a disastrous first period, SKA needed to start strongly in the second … but it was Maxim Lazarev who extended Ak Bars’ lead in the 23rd minute as the home team’s defensive frailties continued even at full strength. It wasn’t until the visitor ran into penalty trouble of its own that SKA managed to haul itself back into the game. Datsyuk fed Kovalchuk for a shot from the blue line that Sergei Shirokov tipped into the net to make it 2-5. Then Nikita Gusev converted the rebound from a Evgeny Dadonov shot to bring SKA back within two goals in time for the third period.
Yet another power play goal, this time when Datysuk touched in a Kovalchuk shot at the top of the crease, made it a one-goal game with five minutes to play and in a frenzied finale the Magic Man conjured up the equalizer on 59:55 with a sublime piece of play to ghost past two defensemen before flipping the puck over Emil Garipov’s shoulder. The goalie, though, held the edge in the shoot-out to help Ak Bars squeak a point from a game that looked like an easy win.
Holloway double helps CSKA to victory
CSKA Moscow 4 Neftekhimik Nizhnekamsk 1
Bud Holloway got his first two goals since arriving in the KHL to help the Army Men to a comfortable home win over Neftekhimik.
CSKA was dominant from the off, allowing just three shots on its net in a one-sided first period, but still had to wait until almost midway through the game to take the lead through Artyom Blazhiyevsky’s power play marker. Then Holloway got to work, adding two further power play goals. First he smashed home a mighty one-timer from the blue line; next he found the empty net off Kirill Petrov’s pass with seconds to play in the middle stanza.
Denis Denisov added a fourth in the 47th minute – CSKA’s first even-strength goal of the night – while Viktor Fasth’s hopes of a shut-out were ended by Igor Polygalov’s 57th-minute consolation goal.
Around the league
Georgy Belousov maintained Lada’s bright start to the season with a shoot-out winner at Sevestal. The Motormen looked to be cruising after two goals from Belousov and a third from Alexander Bugamin made it 3-0 inside 27 minutes, but the road turned rocky when Dmitry Kagarlitsky (2) and Evgeny Mons tied the game. That led to an epic shoot-out of 14 attempts – one of them referred to the video official – before Lada took the win.
Pavel Medvedev scored two for the second time this season, but his Ugra team went down at home to Salavat Yulaev. Two goals in a minute midway through the final stanza saw Igor Grigorenko and Denis Kulyash put the visitor 3-2 up and that lead lasted until the hooter.
KHL.ru is the official Web site of the Kontinental Hockey League. All KHL logos and marks as well as all other proprietary materials depicted herein are the property of the KHL and may not be reproduced without the prior written consent of KHL, ltd
KHL.ru is the official Web site of the Kontinental Hockey League. All KHL logos and marks as well as all other proprietary materials depicted herein are the property of the KHL and may not be reproduced without the prior written consent of KHL, ltd |
Q:
git ssh :Permission denied (publickey)
I tried to use github so I followed the help doc. But when I used this command : ssh -vT git@github.com I got error like this:
jacos@Jing:~/.ssh$ ssh -vT git@github.com
OpenSSH_5.8p1 Debian-7ubuntu1, OpenSSL 1.0.0e 6 Sep 2011
debug1: Reading configuration data /home/jacos/.ssh/config
debug1: Applying options for github.com
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Connecting to ssh.github.com [207.97.227.248] port 443.
debug1: Connection established.
debug1: identity file /home/jacos/.ssh/id_rsa type 1
debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
debug1: identity file /home/jacos/.ssh/id_rsa-cert type -1
debug1: identity file /home/jacos/.ssh/id_dsa type -1
debug1: identity file /home/jacos/.ssh/id_dsa-cert type -1
debug1: identity file /home/jacos/.ssh/id_ecdsa type -1
debug1: identity file /home/jacos/.ssh/id_ecdsa-cert type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1p1 Debian-5github2
debug1: match: OpenSSH_5.1p1 Debian-5github2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.8p1 Debian-7ubuntu1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-ctr hmac-md5 none
debug1: kex: client->server aes128-ctr hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Server host key: RSA 16:27:ac:a5:76:28:2d:36:63:1b:56:4d:eb:df:a6:48
debug1: Host '[ssh.github.com]:443' is known and matches the RSA host key.
debug1: Found key in /home/jacos/.ssh/known_hosts:4
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /home/jacos/.ssh/id_rsa
debug1: Remote: Forced command: gerve gnijuohz 54:da:c2:c1:ca:4a:b9:4d:21:10:5b:42:3f:5a:8e:f7
debug1: Remote: Port forwarding disabled.
debug1: Remote: X11 forwarding disabled.
debug1: Remote: Agent forwarding disabled.
debug1: Remote: Pty allocation disabled.
debug1: Server accepts key: pkalg ssh-rsa blen 279
Agent admitted failure to sign using the key.
debug1: Trying private key: /home/jacos/.ssh/id_dsa
debug1: Trying private key: /home/jacos/.ssh/id_ecdsa
debug1: No more authentication methods to try.
Permission denied (publickey).
Agent admitted to sign using the key? No more authentication methods to try?
Can someone explain what's wrong here?
Thanks.
A:
Searching google for "Agent admitted failure to sign using the key." suggests that logging out of your current session and then back in, or using ssh-add should solve the problem
Rationale: Ubuntu uses ssh-agent program:
ssh-agent is a program to hold private keys used for public key authentication (RSA, DSA, ECDSA). The idea
is that ssh-agent is started in the beginning of an X-session or a login session, and all other windows or
programs are started as clients to the ssh-agent program. Through use of environment variables the agent can
be located and automatically used for authentication when logging in to other machines using ssh(1).
If you just generated a key, ssh-agent does not know about it so it can't sign using the key - exactly what the error message says.
To add the key, you either need to restart ssh-agent (i.e. log out and log back in) or to use ssh-add to re-scan the keys.
See man ssh-add and man ssh-agent for more info
A:
Did you properly set up git and the ssh keys. If not see here.
Taken from github:
This problem can also be caused when ssh cannot find your keys. Make sure your key is in the default location, ~/.ssh. If you run ssh-keygen again and just press enter at all 3 prompts it will be placed here automatically. Then you can add the contents of id_rsa.pub to your account. If id_rsa.pub doesn’t work try id_dsa.pub. You might need to generate a new dsa key with ssh-keygen -t dsa if you just have an rsa key.
P.S. Also sometimes the URL is typed wrong. URLs are case sensitive. Make sure to type them properly.
See this also.
|
Q:
django-allauth: Module "accounts.forms" does not define a "SignupForm" class
I am getting the following error:
django.core.exceptions.ImproperlyConfigured: Module "accounts.forms"
does not define a "SignupForm" class
settings.py
(...)
ACCOUNT_SIGNUP_FORM_CLASS = 'accounts.forms.SignupForm'
(...)
accounts/forms.py
from allauth.account.forms import BaseSignupForm
class SignupForm(BaseSignupForm):
def __init__(self, *args, **kwargs):
self.sociallogin = kwargs.pop('sociallogin')
user = self.sociallogin.account.user
first_name = forms.CharField(label=_('First name'),
max_length=30,
min_length=2,
widget=forms.TextInput(attrs={
'placeholder':_('First name')}))
last_name = forms.CharField(label=_('Last name'),
max_length=30,
min_length=2,
widget=forms.TextInput(attrs={
'placeholder':_('Last name')}))
second_last_name = forms.CharField(label=_('Second last name'),
max_length=30,
empty='',
widget=forms.TextInput(attrs={
'placeholder':_('Second last name')}))
# TODO: Should become more generic, not listing
# a few fixed properties.
initial = {'email': user_email(user) or '',
'username': user_username(user) or '',
'first_name': user_field(user, 'first_name') or '',
'last_name': user_field(user, 'last_name') or ''}
kwargs.update({
'initial': initial,
'email_required': kwargs.get('email_required',
app_settings.EMAIL_REQUIRED)})
super(SignupForm, self).__init__(*args, **kwargs)
def save(self, request):
adapter = get_adapter()
user = adapter.save_user(request, self.sociallogin, form=self)
# TODO: Add request?
super(SignupForm, self).save(user)
return user
def raise_duplicate_email_error(self):
raise forms.ValidationError(
_("An account already exists with this e-mail address."
" Please sign in to that account first, then connect"
" your %s account.")
% self.sociallogin.account.get_provider().name)
A:
Sir you are victim of Circular Import. allauth tries to import your custom signup form class from accounts.forms but in the same file you are importing from allauth from allauth.account.forms import BaseSignupForm. You don't need to extend your SignupForm from BaseSignupForm. Just create a simple form and allauth will automatically extend it for you.
A:
Just inherit from forms.Form and add the signup function.
class CustomSignupForm(forms.Form):
def signup(self, request, user):
pass
ACCOUNT_SIGNUP_FORM_CLASS = 'app.forms.CustomSignupForm'
|
The status quo of the Green Lantern(s) of Sector 2814 is quite different than it was a few years ago, when there was the reliable four human Lanterns patrolling the skys: Hal Jordan, Guy Gardner, John Stewart, and Kyle Rayner. Now, there are two rookies – Simon Baz and Jessica Cruz – who have little to no experience, who are dangerous in their own ways, and are learning on the fly.
We are thrilled to share an exclusive first look at September 14’s “Green Lanterns’ #6 from our pals at DC Comics.
Written by Sam Humphries
Illustrated by Will Conrad and Jack Herbert “FAMILY DINNER”! The rookie Green Lanterns try to reconcile some of their differences, when Simon Baz makes a terrifying offer to Jessica by inviting her over for dinner with his family. Can the two survive this with the mysterious Guardian tracking the duo?
Thanks again to DC, and make sure to pick up the issue on Wednesday! |
Merck ($MRK) has landed a priority review for its top drug prospect, the PD-1 cancer drug MK-3475, giving the FDA a deadline of October 28 for making the first big marketing decision on a new wave of immuno-oncology therapies that is expected to be a game changer in the oncology market.
The looming PDUFA date for MK-3475 in melanoma--a drug that's won the FDA's breakthrough designation, promising a speedy regulatory review--puts Merck on track to gain the first market entry in the field, beating out the star team at Bristol-Myers Squibb ($BMY), which has been dogged by questions about its slow timing on the rival nivolumab.
Merck badly needs these bragging rights. The company has been pushing through a major reorganization, shedding thousands of research jobs after a years-long drought on major new drug approvals. Just days ago Merck had to acknowledge that vintafolide, heralded after an accelerated entry into Europe, failed its pivotal study, making MK-3475 more important than ever to its future.
Soon after his arrival last year, new R&D chief Roger Perlmutter quickly zeroed in on MK-3475 as a top prospect with wide-ranging cancer targets, and he's made the development program a top priority, racing through studies on the way to the FDA. Merck also said today that it will be filing for an approval in Europe before the end of this year.
Merck R&D chief Roger Perlmutter
In his R&D review today, Perlmutter spelled out plans for gaining a slate of new drug approvals and fresh filings this year. The twice-rejected anesthesia drug sugammadex is once again back on track, Perlmutter told analysts today, as is the long-delayed osteoporosis drug odanacatib. At one point odanacatib was the closely watched drug in Merck's late-stage pipeline. Today the company flagged an increased risk of atrial fibrillation and stroke in the Phase III data, raising questions about its long-term prospects. And then there's the sleep drug suvorexant, which Merck has had to refile with a lower dosage, limiting its commercial potential.
Trouble with all of those drugs, though, made it imperative for Merck to restructure R&D. Perlmutter can now lay claim to engineering the comeback. But you can still expect plenty of skeptical questions about how some of these therapies will perform on the market, provided they get past the FDA.
Among its late-stage prospects, Perlmutter highlighted a pair of hepatitis C drugs--MK-5172/MK-8742--which has been gaining increased attention. MK-3475, though, may well prove to be the crowning achievement in a watershed year for Merck.
At Merck, MK-3475 is more than just an experimental drug. It has to be seen as a portfolio in its own right. The program now covers 30 tumor types, both as a monotherapy and in combination with various drugs found among other Big Pharma companies. By the end of this year, the company projects that there will be 24 clinical trials underway with 6,000 patients, including four new Phase III trials.
Bristol-Myers, which had been tapped as the leader in the field, finds itself in second place
In its Q1 earnings report just days ago the big biotech said that it plans to begin a rolling submission of nivolumab in the next few days with plans to complete the NDA by the end of the year. The decision was made after investigators met with the FDA on the results of its 063 study, a Phase II trial for third-line squamous cell non-small cell lung cancer. That may be fast by most standards of modern-day drug development, but to analysts it looked like a delay, suggesting that there could be problems that are slowing studies.
Bristol-Myers, though, was stingy with details--a factor that only makes things worse for the company. The pressure to perform--or at least explain itself better--can only increase with Merck's presentation today. But on the bright side for Bristol-Myers, some analysts were expecting Merck execs to announce that they are accelerating their R&D plans for MK-3475 in lung cancer, and that didn't happen.
- here's the release from Merck on MK-3475
- here's the release on its R&D review |
In talking to physicians and other professional service providers, there are a few misconceptions about 401k plans, and these misconceptions not only prevent companies from offering a 401k, they end up costing these companies money.
The two biggest misconceptions regarding 401k’s are that they are only for larger companies, and that they are too costly. Neither of these are true, and in the text that follows, we’ll dispel them while also giving you five solid reasons to offer a 401k, no matter how small (or large) your business is.
Reason #1 – They Attract and Retain Better Employees
If your business has employees, it’s an unavoidable fact that you need more than just “warm bodies”. You need competent, motivated employees who will stay. Offering a 401k is, without question, an employee magnet. It attracts better people to your company, and it keeps them there longer. Employee turnover is astoundingly expensive*, and detrimental to growth. A 401k is a hedge against this.
Listen, if your business is beyond the “one-person” stage, you simply cannot succeed long term without smart, inspired employees who know their way around your company and your industry. Once an employee reaches a point where you really depend on them, they typically begin to truly understand their worth not only to you, but to the marketplace in general (including your competition) as well. So you need to make certain that the grass stays green right under their feet.
Reason #2 – Business Owners Need Them Too. Even Solopreneurs.
According to this article in Fortune**, more than a third of entrepreneurs have no retirement savings or defined retirement plan at all. This is why a 401k makes sense, even for a one-person business. A 401k can mean the difference between a good retirement, and one where you struggle. Yes, even the boss can contribute and benefit from a 401k.
Reason #3 – A 401k is Very Cost Effective (and Even Profitable).
A huge misconception is that 401k’s are expensive. The reality is, they can be if you aren’t careful. The best thing to do is hire a 401k specialist that knows the industry that can guide and direct you. I am not just talking about a financial advisor who can help you select investments, you will need a specialist that can help design and monitor the plan to save you taxes and reduce employee turnover.
Here are a few other tidbits that may interest you – most businesses who decide to offer a 401k will qualify for a $500 tax credit for the first three years. This can help offset (or perhaps even exceed) annual administration costs. Again, these are not complicated to set up and run.
Another large benefit is company funds used to match employee contributions is tax deductible. Combine this with the tax credit and the savings from not having to replace people every few months, and it becomes very clear that a 401k is nowhere near as expensive as some business owners think it is. In fact, I’ve had businesses owners literally shocked at how cost effective a 401k is.
Reason #4 – If You Don’t, You Are Falling Behind
I hate to bring up something like “keeping up with the Joneses”, but in this case, it makes a lot of sense. It’s a competitive business landscape out there, and currently, companies large and small are boosting their 401k offerings***. You wouldn’t be the only store on the street without a sign, would you? Or the only one who didn’t take credit cards? Well, that’s about where you are in not offering a 401k – it’s become a standard.
TrueNorth Retirement Services is a fee-only financial services firm that helps businesses get the most out of their retirement benefit plans. They provide clients a fee-only Fiduciary approach, and offer unrivaled expertise on an array of plan options ranging from 401k, Defined Benefit, Cash Balance, and Tax Exempt Plans. |
>From: "Maggie Beery" <m_beery@hotmail.com>
>To: aeh6375@hbu.edu, allisonspeed@hotmail.com, amy.clemons@enron.com,
>andrea_sorelle@hotmail.com, aria_brown@hotmail.com, battlecj@hotmail.com,
>Callie.Beery@kornferry.com, christina@gulfcoastentertainment.com,
>c_c_krebs@hotmail.com, christylederer@hotmail.com, cwunz@comscore.com,
>Derek_Davis@Dell.com, elizabethfenoglio@hotmail.com,
>emilycbrock@hotmail.com, Jill_Dalovisio@was.bm.com, jwunz@ncta.com,
>Kate.Delaney@lyondell.com, kawise@hotmail.com, kim.davidson@nbc.com,
>lyles65@hotmail.com, marcyrinehart@hotmail.com, mcgeeat@hotmail.com,
>me_levy@hotmail.com, mike.sewell@mail.house.gov, mmalone@loomissayles.com,
>mpincoffs@nada.org, nancy.c.hutcheson@bakerbotts.com,
>PDelaney@USChamber.com, rbeery@argohouston.com, rbeery@houstonisd.org,
>rencarey@aol.com, sarah.bass@gs.com, sneumeister@yahoo.com,
>BWare@rnchq.org, crosenth@central.uh.edu, ellie.bullard@mail.house.gov,
>janderson@rnchq.org, jsimons4@mindspring.com, kmcfall@ssk.com,
>mmcmullen@promarketdc.com, mollyradcliffe@hotmail.com
>Subject: Fwd: RV: Pull!
>Date: Tue, 01 May 2001 14:47:12
>
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com
- ATT195947.htm
- squirrell.mpeg |
High-performance liquid chromatographic assay for antiinflammatory agents diclofenac and flurbiprofen in ocular fluids.
An HPLC assay for diclofenac (DC) and flurbiprofen (FP) in a 100-microliters sample of aqueous humour is presented. After acetonitrile extraction, the residue is analyzed using a reversed-phase octyl column and ultraviolet detection. The method is simple and reproducible. Excellent selectivity and resolution are achieved using an acetic acid-acetonitrile-triethylamine mobile phase. The lower limit of detection, defined as the amount of drug required to produce a peak twice the threshold, was ca. 0.3 ng DC on column and ca. 0.4 ng on column FP. The utility of the method is demonstrated by determining drug levels in aqueous humour of normal rabbits and of patients undergoing cataract surgery. The assay should be applicable to other antiinflammatory agents. |
Q:
How to open a menu tied to ttk.Menubutton when hovering over it?
I wanted to make a custom menu bar in Tkinter, but since it was impossible to adjust, I had to make crutches. I made a custom menu from Frame,Button and Menubutton. But I met with a small problem - I can’t open the Menu when hovering over ttk.Menubutton. That is, I need that when hovering over Menubutton the Menu attached to this button opens (simulating clicking on Menubutton). How can this be implemented?
Code
import tkinter as tk
from tkinter import ttk
root = tk.Tk()
root.option_add("*Menu.borderWidth", "0")
root.option_add("*Menu.activeBorderWidth", "0")
root.option_add("*Menu.background", "black")
style = ttk.Style(root)
fr = ttk.Frame(root)
btn_menu = ttk.Menubutton(fr, text='fegvd')
btn_menu.grid(row=0, column=0)
btn =ttk.Button(fr, text='grfbvgfev')
btn.grid(row=0, column=1)
btn_menu_st = ttk.Menubutton(fr, text='Gds')
btn_menu_st.grid(row=0, column=2)
fr.pack(fill='x')
file = tk.Menu(btn_menu, tearoff=0, foreground='white')
file.add_command(label='ГЫГ')
style = tk.Menu(btn_menu_st, tearoff=0, foreground='white')
style.add_command(label='Ugu')
btn_menu.configure(menu=file)
btn_menu_st.configure(menu=style)
root.mainloop()
A:
Maybe there is better idea to achieve it.My idea is to send a mouse event.
import tkinter as tk
from tkinter import ttk
root = tk.Tk()
root.option_add("*Menu.borderWidth", "0")
root.option_add("*Menu.activeBorderWidth", "0")
root.option_add("*Menu.background", "black")
style = ttk.Style(root)
fr = ttk.Frame(root)
btn_menu = ttk.Menubutton(fr, text='fegvd')
btn_menu.grid(row=0, column=0)
def func1(e):
e.widget.event_generate("<Button-1>") # send a mouse press event
btn_menu.bind("<Enter>",func1) # when your mouse enter this widget
btn =ttk.Button(fr, text='grfbvgfev')
btn.grid(row=0, column=1)
btn_menu_st = ttk.Menubutton(fr, text='Gds')
btn_menu_st.grid(row=0, column=2)
fr.pack(fill='x')
file = tk.Menu(btn_menu, tearoff=0, foreground='white')
file.add_command(label='ГЫГ')
style = tk.Menu(btn_menu_st, tearoff=0, foreground='white')
style.add_command(label='Ugu')
btn_menu.configure(menu=file)
btn_menu_st.configure(menu=style)
root.mainloop()
I found .post can be a good way to do.
import tkinter as tk
from tkinter import ttk
root = tk.Tk()
root.option_add("*Menu.borderWidth", "0")
root.option_add("*Menu.activeBorderWidth", "0")
root.option_add("*Menu.background", "black")
style = ttk.Style(root)
fr = ttk.Frame(root)
btn_menu = ttk.Menubutton(fr, text='fegvd')
btn_menu.grid(row=0, column=0)
def func1(e):
file.post(e.widget.winfo_rootx(),e.widget.winfo_rooty()+e.widget.winfo_height())
btn_menu.bind("<Enter>",func1)
btn =ttk.Button(fr, text='grfbvgfev')
btn.grid(row=0, column=1)
btn_menu_st = ttk.Menubutton(fr, text='Gds')
btn_menu_st.grid(row=0, column=2)
fr.pack(fill='x')
file = tk.Menu(btn_menu, tearoff=0, foreground='white')
file.add_command(label='ГЫГ')
style = tk.Menu(btn_menu_st, tearoff=0, foreground='white')
style.add_command(label='Ugu')
btn_menu.configure(menu=file)
btn_menu_st.configure(menu=style)
root.mainloop()
But .unpost couldn't work in my PC,I found this question
|
Just past the whorehouse with the invisible walls, through the intersection of Was and Is, Johnnie's Pub and Pet Hospital sat nestled between two abandoned buildings which were, in every fashion, identical to the home in which Des Morris grew up. A Wyvern was hitched from the post in front of the Pub, right next to an eagle the size of a small elephant.
Des smacked the road-dust from his Levi's and pulled a cigarette from the inside pocket of his leather, burnt-orange vest. A crusted-cream colored mutt sat at his feet. The dog looked at Des' weathered face and whined.
"It's okay, Tween," Des said. "We're almost there."
The growth just above Tween's hind-leg was bigger than the day before, and the smell was far worse, that much was certain. It had started out as just a slight discoloration on his hair, a dirt brown patch that Des didn't pay much attention to at first. It wasn't until Tween started to favor his left leg over his right that the seriousness of the matter set in. Over the course of days and weeks and finally a month, the discoloration grew into a puffy, fungal, umber-tinted sore that stank of ammonia and rotted meat.
They'd been in the high country hunting the Questing Beast when the disease first appeared. Civilization had been a good hike away—more so because of the slow pace necessitated by Tween's wound—but they'd made it. They were out of food and water.
Des pushed open the swinging doors to the tavern and stepped inside. The tables were crowded with other Questors. Some wore full suits of armor. Others wore flight suits. All of them were armed. Cigar and cigarette smoke filled the air with a deep blue haze. The air stank of spilled beer and tobacco spit. In the back corner, a jukebox blared John Cougar Mellencamp while a man in a baseball uniform argued with someone in a safari hat over a stack of silver pieces sitting on the pinball machine. Behind the bar, Johnnie served up shots of whisky, occasionally wiping his hands on the blue surgical gown he always wore.
Des looked down at Tween sitting near his boot heel. He took another step and Johnnie looked up from behind the bar.
The smile of recognition dropped from Johnnie's face when he noticed Tween following behind. "Hey, sorry Des. You've got to leave the dog outside. New town ordinance." |
“The whole (birther) thing was crazy and mean-spirited, of course, its underlying bigotry and xenophobia hardly concealed,” former first lady Michelle Obama writes in her new book. "But it was also dangerous, deliberately meant to stir up the wingnuts and kooks." | Gerald Herbert/AP photo politics Michelle Obama: 'I'd never forgive' Trump for promoting birther conspiracy
Former first lady Michelle Obama writes in her forthcoming memoir that President Donald Trump's promotion of the so-called birther movement is something she will "never forgive him for," according to excerpts obtained by The Washington Post and other outlets, detailing the threats she said her family felt as a result of Trump's amplification of the conspiracy theory.
Trump pushed the unfounded theory beginning around 2011 that President Barack Obama was born in Kenya, rather than in Hawaii, and was therefore ineligible to be president. The accusations gained steam among some on the right with the help of Trump’s Twitter feed, culminating in repeated calls for Obama to release his birth certificate and his college admissions records. Trump at one point claimed to have seen the president’s birth certificate himself, which he said would back up his claims, although he never released the proof he claimed to have.
The issue fizzled out near the end of Trump’s run for president in 2016, when he held a press conference to announce that he did, in fact, believe that Obama was born in the U.S., but declined to take responsibility for promoting the conspiracy or apologize to Obama for spreading the false claim, seen by many as racist.
Trump has also spread the false claim that the Obamas are Muslims, a statement that has also been identified by many as a racist dog whistle.
Though then-President Obama poked fun at the conspiracy occasionally, Michelle Obama writes in her book that she worried Trump’s claims would incite violence against her husband and her family.
COUNTDOWN TO 2020 The race for 2020 starts now. Stay in the know. Follow our presidential election coverage. Email Sign Up By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
“The whole thing was crazy and mean-spirited, of course, its underlying bigotry and xenophobia hardly concealed. But it was also dangerous, deliberately meant to stir up the wingnuts and kooks,” she says in the book.
“What if someone with an unstable mind loaded a gun and drove to Washington? What if that person went looking for our girls? Donald Trump, with his loud and reckless innuendos, was putting my family’s safety at risk. And for this I’d never forgive him.”
The first lady's comments in her memoir mark a break from her typical rhetoric, which has largely steered away from criticizing the president by name even as she has continued to voice her condemnation for Trump's policies and bombast.
Michelle Obama also shared more personal details in her book, including that both of her daughters were conceived via in vitro fertilization, much of the process for which she handled on her own while Barack Obama was away serving in the Illinois state Legislature.
The former first lady's book is scheduled to be released on Tuesday.
Trump on Friday morning responded to Obama's criticisms, and hit back at her husband, former President Barack Obama instead.
"She got paid a lot of money to write a book and they always expect a little controversy," Trump said of the former first lady.
"I'll give you a little controversy back, I'll never forgive [President Barack] Obama for what he did to our U.S. military. It was depleted, and I had to fix it," Trump said. "What he did to our military made this country very unsafe for you and you and you." |
This invention relates to a device for aid in inserting and removing a contact lens, and more particularly, to a device which maintains a light transmitting path therethrough along which path a user may sight during operation.
Various devices have been designed in the past for aiding contact lens wearers to insert and remove contact lenses. Included in such prior devices are those which use a squeeze bulb type holder having a lens receiving cup at one end thereof, with resilient sides which may be manually squeezed together and released to provide a subatmospheric pressure within the bulb to hold the contact lens on the cup. For the most part, such prior devices have had no provision for providing a light transmitting path through the device along which the user may sight to maintain his eye in a desired orientation while operating the device. Those which may have had some provision for sighting have not been of such design so as to be able to maintain a light transmitting path through the device on pressing of opposed sides of the bulb together to evacuate the bulb.
A general object of the present invention is to provide a simple and economically constructed device for aid in inserting and removing contact lenses which overcomes the above set-out objections of prior art devices in a simple and effective manner.
More specifically, an object is to provide a novel device for inserting and removing contact lenses which includes an elongate, hollow tube having a lens holding portion at one of its ends and a light transmitting closure at the other end, with the interior of the device providing a light transmitting path from the lens holding portion to the closure. Opposite sides of an intermediate portion of the tube are flexible toward and away from each other to evacuate a portion of the interior of the tube to produce a subatmospheric pressure for holding a contact lens on the lens holding portion. An elongate, light transmitting shaft extends longitudinally through the intermediate flexible portion to prevent the opposite sides of the tube from being squeezed tightly together, and thus maintains a light transmitting path through the device along which the user may sight throughout operation. |
Your Take on War with Iraq
March 16, 2003
Assume, for a moment, that the U.S. goes to war in Iraq. What's your view on the following questions that swirl around such a scenario? As always, this is an unscientific survey, since anyone who wishes to can participate. With that caveat, please tell us what you think.
How justified will the U.S., Britain, and Spain be to attack Iraq without the explicit approval of the U.N. Security Council?
Very justified
Somewhat justfied
Justified enough to go war
Not very justified
Not justified at all
Not sure
Which of the following reasons that the Bush Administration has given for going to war do you think makes the most sense? (Please choose one):
To find and destroy Saddam Hussein's weapons of mass destruction
To ensure U.S. access to Middle East oil
To liberate the Iraqi people from the dictatorship of Saddam Hussein
To prevent terrorism against the U.S.
To force regime change
Other
None
How likely do you think it is that another month or two of U.N.
inspections would achieve the objective you chose in the previous question?
Very likely
Somewhat likely
Neither more likely or less
Somewhat unlikely
Not likely at all
Don't know
Once the war is concluded, how important do you think it will be for the U.S. to provide the world with a full accounting of Saddam Hussein's weapons of mass destruction?
Very important
Somewhat important
Not very important
Unimportant
Not sure
How long can war go on before you'll feel that it's taking too long?
A few days
A few weeks
Two months or more
Six months or more
Not sure
How many U.S. and British soldiers can be killed in the war before you'll feel that casualties are too high?
Any
Dozens
Hundreds
Thousands
Not sure
How many Iraqi civilians can be killed in the war before you'll feel that too many have died?
Any
Dozens
Hundreds
Thousands
Not sure
Do you think the war will make terrorism in the U.S.:
Much less likely
Less likely
Neither less nor more likely
More likely
Much more likely
Don't know
How prepared do you think the Bush Administration is to intercept/head off terrorism in the U.S.?
Very prepared
Somewhat prepared
Prepared enough
Not prepared enough
Totally unprepared
Not sure
What's an acceptable amount for the U.S. to spend on the war?
Nothing
No more than $10 billion
No more than $50 billion
No more than $100 billion
No more than $200 billion
More than $200 billion
Don't know
Once the war is over, how long should the U.S. maintain an occupational force in Iraq?
Less than six months
Up to one year
Up to two years
Up to three years
Up to four years
More than four years
Don't know
Over the long term, what effect do you think a non-U.N.-sanctioned war in Iraq will have on relations between the U.S. and its allies including France, Germany, Russia, and China that now oppose the Bush Administration's desire to attack? Relations between the U.S. and its allies will:
Improve significantly
Improve somewhat
Remain unchanged
Deteriorate somewhat
Deteriorate significantly
Not sure
Over the long term, what effect do you think a war in Iraq will have on relations between Americans and citizens of other countries? Relations between the two will:
Improve significantly
Improve somewhat
Remain unchanged
Deteriorate somewhat
Deteriorate significantly
Not sure
Up to this point, how would you rate the Bush Administration's handling of the Iraqi crisis?
Very good
Good
So-so
Not very good
Bad
Not sure
In his public comments on the Iraq crisis, President Bush frequently mentions his religion. How instrumental do you think his Christian beliefs are in his decision to attack or not? His beliefs are:
A major factor in favor or an attack
Some factor in favor of an attack
A neutral factor
Some factor against an attack
A major factor against an attack
Not sure
Taking into account everything you know about the Iraq crisis, do you feel that a war at this time is:
Very necessary
Somewhat necessary
Somewhat unnecessary
Unnecessary
Don't know
Assuming that the U.S. prevails quickly in Iraq, do you think the effect on the U.S. economy will be:
Very positive
Somewhat positive
Neutral
Somewhat negative
Very negative
Not sure
If the U.S. prevails quickly in Iraq, what would the effect be on your spending plans for the next six months? Would you:
Be likely to spend a lot more
Be likely to spend somewhat more
Not change your spending plans
Be likely to spend somewhat less
Be likely to spend a lot less
Not sure
If the U.S. prevails quickly in Iraq, what effect would it have on your investing plans? Would you:
Be very likely to buy stocks
Be somewhat likely to buy stocks
Not change your investing plans
Be somewhat less likely to buy stocks
Be much less likely to buy stocks
Not sure
Do you live:
In the U.S.
In another country
If you would like to be notified by e-mail of the results of this poll, please enter your e-mail address below. |
The Integration of Metabolomics and Next-Generation Sequencing Data to Elucidate the Pathways of Natural Product Metabolism in Medicinal Plants.
Plants have always been used as medicines since ancient times to treat diseases. The knowledge around the active components of herbal preparations has remained nevertheless fragmentary: the biosynthetic pathways of many secondary metabolites of pharmacological importance have been clarified only in a few species, while the chemodiversity present in many medicinal plants has remained largely unexplored. Despite the advancements of synthetic biology for production of medicinal compounds in heterologous hosts, the native plant species are often the most reliable and economic source for their production. It thus becomes fundamental to investigate the metabolic composition of medicinal plants to characterize their natural metabolic diversity and to define the biosynthetic routes in planta of important compounds to develop strategies to further increase their content. We present here a number of case studies for selected classes of secondary metabolites and we review their health benefits and the historical developments in their structural elucidation and characterization of biosynthetic genes. We cover the cases of benzoisoquinoline and monoterpenoid indole alkaloids, cannabinoids, caffeine, ginsenosides, withanolides, artemisinin, and taxol; we show how the "early" biochemical or the more recent integrative approaches-based on omics-analyses-have helped to elucidate their metabolic pathways and cellular compartmentation. We also summarize how the knowledge generated about their biosynthesis has been used to develop metabolic engineering strategies in heterologous and native hosts. We conclude that following the advent of novel, high-throughput and cost-effective analytical technologies, the secondary metabolism of medicinal plants can now be examined under the lens of systems biology. |
Experience Decompression
AntiGravity Fitness at Imagination Place is where you can find balance, harmony and energy renewal amidst the hectic bustle of everyday pressures and deadlines. Relax & enjoy a personalized experience in our comfortable playful sanctuary.
Vertebral Disc Hydration
In an inversion you will experience Decompression and Hydration of the vertebral discs within the spinal column, creating new space for the nerves and the vertebrae. AKA your back and neck will say “ahhh“.
Digestion and Circulation
Refresh the endocrine, lymphatic, digestive and circulatory systems. In other words A brand new YOU!
Increased Brain Function
Increased neuroplasticity of the brain by creating new synaptic connections and neural pathways. Great for Students of ALL ages! |
import { ArrowLeftIcon, ArrowRightIcon, color, Flex, Sans, space } from "palette"
import React from "react"
import { TouchableOpacity } from "react-native"
import styled from "styled-components/native"
export const FancyModalHeader: React.FC<{
hideBottomDivider?: boolean
leftButtonText?: string
onLeftButtonPress?: () => void
rightButtonText?: string
onRightButtonPress?: () => void
}> = ({
children,
hideBottomDivider = false,
leftButtonText,
onLeftButtonPress,
rightButtonText,
onRightButtonPress,
}) => {
return (
<Container hideBottomDivider={hideBottomDivider}>
<Flex mt={0.5} flexDirection="column" alignContent="center" alignItems="center">
{!!onLeftButtonPress && (
<LeftButtonContainer
hitSlop={{ top: space(1), bottom: space(1), left: space(1), right: space(1) }}
onPress={() => onLeftButtonPress()}
>
{leftButtonText ? <Sans size="3">{leftButtonText}</Sans> : <ArrowLeftIcon fill="black100" top="2px" />}
</LeftButtonContainer>
)}
</Flex>
<Sans mt={2} weight="medium" size="4" color="black100">
{children}
</Sans>
<Flex mt={0.5} flexDirection="column" alignContent="center" alignItems="center">
{!!onRightButtonPress && (
<RightButtonContainer
hitSlop={{ top: space(1), bottom: space(1), left: space(1), right: space(1) }}
onPress={() => onRightButtonPress()}
>
{rightButtonText ? <Sans size="3">{rightButtonText}</Sans> : <ArrowRightIcon fill="black100" top="2px" />}
</RightButtonContainer>
)}
</Flex>
</Container>
)
}
export const Container = styled(Flex)<{ hideBottomDivider?: boolean }>`
border: ${props => (props.hideBottomDivider ? `0` : `solid 0.5px ${color("black10")}`)};
border-left-width: 0;
border-right-width: 0;
border-top-width: 0;
flex-direction: row;
justify-content: space-between;
height: ${space(6)};
`
export const LeftButtonContainer = styled(TouchableOpacity)`
position: absolute;
left: ${space(2)};
top: 16px;
`
export const RightButtonContainer = styled(TouchableOpacity)`
position: absolute;
right: ${space(2)};
top: 16px;
`
|
How odd that the administration feels their efforts are some punishment from the God’s in a parallel of ‘Sisyphus’.
Isn’t it odd how observations can be the same, but in the ways of describing it are so different?
How interesting in some environment of narcissist where the egotism of leadership is consumed with self adulation, that the same social attributes magnify in the infantile personality development of those who are associated.
It is also interesting also that the concept of effort is identified as a constant task, consuming all the energy and effort of the government.
For the last year this concept I’ve also shared. Yet the purpose of the effort is slightly different. As the idea of using the effort of ‘Sisyphus’ of a task without reason, yet a continuum as rolling a stone for all perpetuity without effort is in error.
Rather the efforts of a dung beetle seem more appropriate. A dung beetle rolls up little balls of feces, and in his effort provides. The same result of all the effort of the present administration. Making programs that are of less value than fesses; placing the genesis of destruction in our governance, the time bomb of these little ball of sh*t.
The reference is not any reforms for this nation; the objective is the absolute destruction of this nation. And presenting this in some concept of political correctness, you are wrong if you are not assisting with the advancement of this destruction is beyond reason, or comprehension of a rational populace.
How any American can even consider that they would give their most trusted valued possession, the gift of having a vote in the governance of this nation to anyone bent on the destruction of that very same nation can’t even be considered; it is an effort in lunacy, the actions of people either ignorant, or so propagandized that reason and thinking are not part of their mental activity.
There can be no thought of any compromise in anything. As to-day we have an administration that lacks any positive to identify. This has resulted of course in those who by some confusion of reason supported any crazy who would fundamentally change the governance of this nation. The very concept is sufficient to classify one as mentally incompetent, in cognitive of the realities of the very environment in which they exist.
To have some illusion that this administration has even the slightest rationale to even identify the dangers to this nation, only extends some oblivion incomprehensible among a thinking environment.
This administration is driven to only one objective; and that objective is the destruction of this nation. The proof is in the actions of this nation. It is insanity to be placing increasing debt, and proposing programs in a nation where the economy is being destroyed by government actions. The attacks of the eco-radicals, the intrusion of the agencies such as the EPA, placing our industry and our nation is a subservient economic position compared to the world economy.
This administration has no goal greater than making entitlement programs for a few; that will require more taxation, for those who produce to provide for those who don’t. This is the very foundation of Saul Alinsky’s design to destroy the governance of a nation. Our culture, our religion, and our national greatness is attacked daily by this usurper. The exact design proposed for a nations destruction in the efforts of the Frankfurt School of political destruction. A man determined to take this nation down, destroy the wonder of this government, and pattern our existence in the same vacuum of a soulless future existing in the rest of the world.
America is an isolated country. Not by our choice, but by the reality that there is no other place on the face of this planet where the concept of personal freedom is the foundation of governance. Where the efforts of of government are to protect your rights, not to make some authoritarian dictatorship which will direct your every action, confine even you ability to make decisions, corrupt you thought, and steal from you even the inalienable rights that existed at your conception.
Any politician who votes for any program of this administration, who by their very actions has confirmed their only goal is the destruction of this nation, is as dangerous to this nation as the political activity of even the most grievous of our enemies.
We are in a sad day America, and as such it is the obligation of every American to do whatever they can to bring light to the blind. Bring knowledge where nothing but a mental illusion, a delusion of refuting reality exists. Some vacuum of magnified ignorance incomprehensible in a population with supposedly a free press, and universal education.
Every American should remember that the beginnings of our nation have more to do with taxation than any other reason. It was the concept of taxation that drove the uniting of the people to stand against the concept that any entity, even the absolute power of a monarch in a far away island had the right to take from the citizenry, even when there expenditure of that money was indirectly spent for the benefit of those same citizens.
This nation would not have existed without the original ‘Tea Party’ of uniting this nation against taxation. And yet so few in America even realize the history that drove this nation, this resolve in opposition, which eventually led to the determination not to only express our grievances, against taxes, but the concept that as a group of people in opposition took the step to create a nation to resolve this issue. A nation where the protection of the rights of individuals, and foremost among them was the protection of the wealth of those same people from the authoritarian hand of government theft.
Shocking yet is the fact that the populace in colonial America knew more about the government, and the fear of taxation, than the electorate of this nation today.
The first effort of consolidated effort was the people’s understanding of economics. Something that today in America has been lost, our indoctrination of social insanity having destroyed reason and mental rational in our populace to level of making our populace in understanding economics, business, and government spending to some level of not ignorance, but to some design of corruptive concept reaching the levels of mental deficiency.
The first taxation should rightfully be called the ‘tax on communication’, the ‘stamp tax’, where every instrument of letter writing was taxed, the paper the pen, the envelope the stamp, anything involved with the process.
How did the knowledgeable, understanding, educated population react? They boycotted every product that was imported from England. Thus they placed the economic vitality of the merchants of England in jeopardy. Which then these same business men, in their own interest petitioned the King and the government, resulting in the tax being repealed.
With the level of ignorance in America today is such a thing possible? Yet the radical segment can get the population to rally for concepts of illogical insignificance. How many times do we see our adolescent swept along on the tsunami of unmagnified ignorance, hugging trees, advocating the wolf, complaining of global warming, all of which have no research, no verification, and require that the individual participant doesn’t think, only is led, allowing someone with whatever invidious reason to lead.
How many of our population do you see rally against the taxation being imposed, rally against the insane government spending, and demand that reason and rational thought be required in governance? Is it the young, the ones who should be the most adamant, as it is their future being destroyed? No, they are so captured by the insanity of our educational propagandization that they capacity to reason is removed. Rather it is the older, educated where reality was required, who see the folly of insanity of governance spending without reason.
Whenever I read about anyone so ignorant to even consider or entertain any reason for taxation of value added, or any other tax it is a tragedy of unmagnified ignorance in a population that should know the fallacy of the concept the first minute the understand numbers measure things.
How or why anyone could exist in this society with some belief that ever product, every service, anything that you trade part of your life, your accumulated wealth for, isn’t in the price reflecting taxation for every step of the journey is less knowledgeable than an idiot. You would have to be some undeveloped entity lacking even the basic cognitive observation. You would be worse than some drug induced victim lacking reason or mental processing.
Creativity in making some new reasoning in how to steal from the wealth of the American populace is not the requirement. The requirement is to reduce the expenditure of the moneys spent by our government; supposedly in our name, on what we don’t need, haven’t asked for, and can’t afford.
There is only one redemption for this nation, and that is as an intelligent electorate we understand that this nation is bankrupt, we are in the hole to levels that numerical measurement have become meaningless. Numbers so large, that it beyond the mental comprehension of us mere mortals to even comprehend; let alone understand. This debt reaches beyond generations with no end in sight, destroying this nation’s economic system and the future of this nation.
I’m sorry fellow Americans, we are at a crossroad. We must make our decisions based on the evidence of this administration. There are two possibilities; this could be the accumulation of the most incompetent, least American, and amateurish destructive governance in our history, or we are being systematically dissected and separated, using our own ignorance against us in order to achieve some design of our destruction.
As these usurpers are from a ‘Chicago’ style group of radicals, confirmed ‘communist’ who in their illusion of authoritarian elitist are determined to use the concepts of ‘Rules for Radicals’ and destroy this nation. It is obvious that this is a designed deliberate destruction of this nation.
We today have a governance that ignores the actions of the court, ignores the governance of the Congress, and ignores the wishes of the people. This is the first time in America’s history where we have someone who is anti America, anti Christianity, and anti white people controlling our government. And yet there are so many in their oblivious ignorance that still support this destruction. Can we as an educated populace really be this ignorant?
Please, as Americans you must wake up. There is no guarantee that America will always be. We have people as ignorant as the radio personality ‘Ed Schultz’, a man who made the perfect icon of ignorance when he stated, ‘what’s wrong with communism, if we have that won’t American still exists?’
I hope there is no one who requires assistance with this answer; it’s very obvious, ‘NO’.
As if some natural catastrophe occurred with the ignorance of America electing leadership which lacked basic requirements of knowledge is sustaining and accelerating our slow erosion into some abyss of disintegration. Is there any means to prevent our destruction?
Sounds harsh doesn’t it? But does it even touch on the actual events that are facing our nation today?
Isn’t it interesting that the only areas of success this charlatan, this Equal Employment Opportunity, black, American Idol president has attached to his first year in office is the continuation of the policies of George Bush. Is there some parallel universe in which this charlatan somehow was able to get some 30% of the white population in this nation to vote for him? When they were so convinced that everything wrong in the world was Bush’s fault.
Are we as a nation really that ignorant? Have we succeeded to the point of watching MTV, and participating in recreational drug use that reason and thought are removed from our makeup?
The problems of this nation are beyond comprehension. Yet, so many in our society are convinced that the problem is that they are not given everything they require? Is that the task of so many; exist, and be provided for?
How can our governance have reached such a low level of rational thought? Have we so indoctrinated our society that we have lost the ability to think? To reason? To make sense out of what is happening in front of us?
Isn’t that where we are? Isn’t this nation’s population beyond comprehension? Can it possibly be that when we run a poll there is a population of half of us thinks this idiot is doing a good job? What could possibly be the reason for such insanity? Are we so indoctrinated in our society to remove engagement of mental processing to questions?
How do we find the answers to so many questions? Questions, that in their very nature provides no sustenance as to their genesis. Questions that in a rational world we could only measure and be termed as irrational.
In one year, our leadership has only succeeded in their own choice of action; increasing the debt on our great, great grandchildren that will reduce their standard of living, not only for their lifetime, but perhaps for all perpetuity. Driven a wedge between Americans and the National Progressive Ideology that are now reaching the stage of not only disagreement, but of absolute despite. Proposed programs which are designed to do nothing but increase the taxation on the America people in the guise of so many ridiculous arenas. The Medical health taxation program, the Cap and Trade taxation program, the tax and redistribute program of providing for those who provide nothing, to share in the equalization of wealth that by their very existence justifies their participation.
Never in the history of any nation at any time has there been such an incompetent leadership. And beyond that never in a society where the electorate, in a government of the people, by the people, and for the people has such a record of absolute ignorance of the administration, a lack of even understanding the basic concepts of the foundation of this nation, the way our governance is conducted, our peoples interaction with the representation of their government, and how our policies, and direction of government should occur is unknown.
We are as a nation facing a dire situation where the rules of the past political discourse are corrupted. No more can there be any easy corrections of past mistakes; no more can we expect some compromise of reason. Today we as a nation must be dedicated to the removal of all those who are un-American, those who believe in some progressive attitude of the government is the answer. Our goal today is the elimination of the Democratic Party as the power with any representation in our governance.
We must have a political body of people more interested in reducing government, instead of increasing government. A political body that’s most important requirement is the preservation of our governance, not the destruction. A political body that understands and respects the genius of those who created the foundation of this nation; identify the constitution as not a living changing document, but one that was designed with such restriction to prevent government absoluteness. A political body that spends more time in reducing the intrusion of government into the daily lives, the economic activity, the freedom of living our lives as we desire, not to some authoritarian design of someone else who will make those decisions for us.
Those who understand and stand idly by, not rejecting the actions of this administration, this government, are as compliant with the destruction of this nation, as the active participant actions of the associates and the administration, plus the Equal Employment Opportunity, American Idol President of this nation.
‘No’ is all that is standing between America’s solvency, and the catastrophic slide into socialistic financial ruin.
America’s demographic landscape is constantly changing. And in that change we are experiencing the absence of knowledge, or even concept of ideals which are paramount to insure this nation’s survival.
As a child, my memories were of the extended family, chicken dinners, after church, where weekly the men would retire to the sitting room, and as there were both Republicans and Democrats in the extended family, there was often more than discussion. Often voices would rise, and positioning to the point of very loud confirmation of what they saw the government was, and wasn’t doing.
On the couch in the reading room, you would find the following magazines; Time, U.S. News and World Report, Newsweek, and Life with the latest edition on top, lined the magazine area. My respite from swimming, biking, and hunting birds with my BB gun, read cover to cover, waiting for the next one to come.
This was the time of journalism in America, the era before the change in the 70’s when facts, and reality, not opinion and perception dominated.
There was then as now a large majority of our population that held the conviction that Franklin Roosevelt had obtained some status of political sainthood. For he had gotten America out of the ‘Great Depression’, something they had all experienced. While even then, there was the older generation, those who remembered the ‘Roaring Twenties’ when opportunity existed wherever the sun showed, who had an infinity for the government to worry about what they should, and get out of our lives.
What was interesting; was that everyone could interact, and identify the current political concerns of the day. When the price of grains dropped, they knew. When the drought effected beef production, they knew. When the government became more ‘nationalistic’ in steering what was or was not vital to America’s future, they reacted.
That awareness or even the casual cognitive knowledge of what is happening in government disappeared. Replaced by the National Progressive Liberal insanity of don’t talk about religion, money, or politics. If there was ever any concept that guarantees ignorance in reality this was it.
I was stunned that my son once said to me, you know the concept we should not talk about religion, money, or politics isn’t complete; it should also have, or anything else that is important.
There once was a challenge in this nation between states rights, and the preservation of the union. Today we are seeing the same challenge only from a different perspective. Today, we have the preservation of the union in the central corridor of America. The American ideals of retaining capitalism, a republic form of government, and the Federal Governments abusive intrusion rejected. We also have the states of insane government concepts, spending themselves to oblivion, buying votes with entitlement.
The most active standard bearer of retaining America is Oklahoma. How one state has kept their political compass so constant is a wonder. But they are, they are the first in combat, prepared to identify and reject the Federal Government intrusion.
Texas, one of the last bastions of America in this country, stands beside their neighbor, adding their rejection. They stand prepared to actively nullify the insanity of a Federal Government gone berserk.
We also as a nation experienced the separation of segments of our society. Today on tax day it is not something negative for 50% of our population. While 50% pay in, the other 50% receive. Confirmation that too many in America never vote for the nation, they vote for self.
What is a reality is that even in the most Democratic of states, the deciding vote is the large populations of those entitled. They are not part of the correction of the government problems, they are the problem.
The error in this nation is not the minority, or the entitled voting for self; it is the white people who did not vote. Now these same white folks that did not vote; recognize their error. Now they are actively involved. The ‘Tea Party’ concept is fraught with so many that never conceived that America would elect those of Progressive, or socialistic ideologies, would be elected was beyond concept. They did not vote because the major political parties had achieved something they had never accomplished before. It was no more a case to vote for the least of two evils, it was a vote for evils that were equal. This resulted in the perfect storm, allowing the most incompetent individual ever to gain the highest office in the land.
We need to have some qualification for voting in America. How anyone without any insight except some ‘American Idol Concept’ of whose cool; lacking any insight, knowledge or even the ideology of the candidate elects our leadership is beyond reason.
Ignorance is our enemy, and as Americans for our preservation, we better wake up.
There have been times in America’s past when the future of the nation was in question.
Can anyone say that the years between the ‘Boston Massacre’ and the genesis of Lexington and Concord occurred, weren’t a daily wonder to the people in America?
The question between our Revolutionary War and the final approval of the most important document every created in America, the ‘United States Constitution’, did out populace not wonder just where the actions of the American government would be?
An America that in its very beginning found itself challenged by acceptance in the world of nations, found armed conflict with a nation ill prepared. Our capital burned, our ships at sea attacked, and our very existence a question?
The scar of bondage our nation has struggles with, creating problems that the wisest of our nation pondered, finding no solution. Today we still are dealing with how to resolve this issue with no more concept of correction than when first posed.
As a nation we have been the sample set of experimentation; our constitutional government challenged by those who were above its guidance.
Our population mesmerized by charlatan after charlatan; their names icons of the measurement of America’s journey into insignificance. Woodrow Wilson, the first academic elitist lacking any insight into reality. Theory and idealism, instead of elbow grease and experience; enamored with his confused sense of reality. Franklin Roosevelt, the first truly power hungry individual whose plans for our nation’s destruction are coming to fruition.
The most destructive leadership of America, Lyndon Johnson’s irrational concepts of changing America forever, and beginning the only war that America not only lost, but in 50 years has found the original position worse that the beginning.
Yet today, America faces its most dangerous challenge. Electing a man whose whole life was either propagating racism, teaching others of racism, developing entitlement for racist reasons and from the pulpit of our nation is fracturing the American culture daily.
What are the real questions we must answer as we go forward? Daily we’ll take a journey together exploring the many points we should be considering. |
Cell differentiation in sacrococcygeal teratomas. An immunohistochemical and follow-up study.
The cell differentiation properties of thirty-four sacrococcygeal teratomas (SCT) and their five recurrences were immunohistochemically studied for the expression of different classes of intermediate filament proteins, muscle actin (MA) and S-100 protein. Out of thirty-nine tumors twenty-three were SCTs with only mature tissue elements, seven immature teratomas, five pure endodermal sinus tumors (EST) and four ESTs or embryonal carcinomas (EC) combined with mature components. Cytokeratin positivity was found in all epithelial structures and sometimes also in smooth muscle and primitive mesenchymal cells. An intense cytokeratin immunoreactivity was observed in EC and EST components. Muscle markers, desmin and MA were present in smooth and striated muscle cells. Focal desmin positivity was also found in some epithelial structures in two cases. Glial tissue positive for glial fibrillary acidic protein (GFAP) was found in twenty-eight out of thirty-nine tumors. Some cases with no apparent glial tissue in hematoxylin and eosin staining showed glial differentiation as proved by GFAP positivity. In six out of eleven choroid plexus-like tissues GFAP positive cells were observed. S-100 protein showed an intense distribution of immunoreactivity outside neural tissue, and focal positivity was observed in malignant epithelial structures. Immunohistochemical markers did not reveal any prognostic significance in teratomas. Our findings, however, showed some aberrant features of cell differentiation from normal mature tissue components but closely parallel to those found in normal fetal development. |
Retroviruses are a class of viruses which transport their genetic material as ribonucleic acid rather than as deoxyribonucleic acid. Retroviruses are associated with a wide variety of diseases in man, one of which is AIDS. Although there have been disclosures of other anti-viral agents useful in the treatment of AIDS, for example see patent applications EP 0 218 688, EP 0 352 000 and PCT/US 91/09741, the compounds of the present invention have not been previously disclosed. PCT/US 91/09741 is hereby incorporated by reference. |
Q:
Why did the Old Forest respond to the hobbits?
In the Fellowship of the Ring, why was the Old Forest able to respond to what the hobbits said or did? The forest is not composed of Ents, which can think, feel, and walk, yet the trees shift and change the paths and make ominous noises. Is this just a result of the hobbits imagination and fears?
Some Examples:
Pippin suddenly felt that he could not bear it any longer, and without warning let out a shout. 'Oi! Oi!' he cried. 'I am not going to do anything. Just let me pass through, will you!' The others halted startled; but the cry fell as if muffled by a heavy curtain. There was no echo or answer though the wood seemed to become more crowded and more watchful than before.
This is right before they find the Bonfire Glade:
But at that moment Merry gave a whistle of relief and pointed ahead. "Well, well!" he said. "These trees do shift. There is the Bonfire Glade in front of us (or I hope so), but the path to it seems to have moved away!"
(emphasis and parenthesis not mine.)
The third example is under Old Man Willow, yet another example of unexplained movements and actions by trees. Frodo and Sam are setting a fire near the tree. Apparently the tree can talk, at least to those inside it.
"Do you know, Sam," (Frodo) said at length, "the beastly tree threw me in! I felt it. The big root just twisted round and tipped me in!"
(emphasis not mine. Parenthesis mine.)
Merry was trapped: another crack had closed about his waist; his legs lay outside, but the rest of him was inside a dark opening, the edges of which gripped like a pair of pincers.
"Put it out! Put it out!" cried Merry. "He'll squeeze me in two, if you don't. He says so!"
Finally, why can these trees move of their own accord? Is it some great evil being controlling them and trying to obstruct the hobbits and the Ring from reaching Rivendell?
A:
The relevant part from TT is given in Book 3, Chapter 4 (Treebeard):
'The trees and the Ents,' said Treebeard. 'I do not understand all that goes on myself, so I cannot explain it to you. Some of us are still true Ents, and lively enough in our fashion, but many are growing sleepy, going tree-ish, as you might say. Most of the trees are just trees, of course; but many are half awake. Some are quite wide awake, and a few are, well, ah, well getting Entish. That is going on all the time.
'When that happens to a tree, you find that some have bad hearts. Nothing to do with their wood: I do not mean that. Why, I knew some good old willows down the Entwash, gone long ago, alas! They were quite hollow, indeed they were falling all to pieces, but as quiet and sweet-spoken as a young leaf. And then there are some trees in the valleys under the mountains, sound as a bell, and bad right through. That sort of thing seems to spread. There used to be some very dangerous parts in this country. There are still some very black patches.'
'Like the Old Forest away to the north, do you mean?' asked Merry.
'Aye, aye, something like, but much worse. I do not doubt there is some shadow of the Great Darkness lying there still away north; and bad memories are handed down...
Not everything bad in the world need be controlled by a great evil nor directed towards a single purpose; in this case the trees in the Old Forest are just "bad trees".
There are some other interesting references elsewhere in TT:
'We came down over the last ridge into Nan Curunir, after night had fallen,' Merry continued. 'It was then that I first had the feeling that the Forest itself was moving behind us. I thought I was dreaming an entish dream, but Pippin had noticed it too. We were both frightened; but we did not find out more about it until later.
'It was the Huorns, or so the Ents call them in "short language". Treebeard won't say much about them, but I think they are Ents that have become almost like trees, at least to look at. They stand here and there in the wood or under its eaves, silent, watching endlessly over the trees; but deep in the darkest dales there are hundreds and hundreds of them, I believe.
'There is a great power in them, and they seem able to wrap themselves in shadow: it is difficult to see them moving. But they do. They can move very quickly, if they are angry. You stand still looking at the weather, maybe, or listening to the rustling of the wind, and then suddenly you find that you are in the middle of a wood with great groping trees all around you. They still have voices, and can speak with the Ents, that is why they are called Huorns, Treebeard says, but they have become queer and wild. Dangerous. I should be terrified of meeting them, if there were no true Ents about to look after them.
(Chapter 9)
'So Saruman would not leave?' he said. 'I did not think he would. His heart is as rotten as a black Huorn's.
(Chapter 10)
It's quite obvious that these descriptions match nicely with the observed behaviour in the Old Forest, with Old Man Willow being a particularly nasty example (and, of course, with no true Ents around to look after him, he is quite terrifying and dangerous to meet).
|
A police dog handler talks with a colleague as his sniffer dog waits outside the GMEX (Greater Manchester Exhibition centre) in Manchester, northern England, September 21, 2006. REUTERS/Phil Noble
LONDON (Reuters) - A team of sniffer dogs set up at a British airport at a cost of 1.25 million pounds ($1.7 million) have proved adept at discovering small amounts of cheese and sausages but not so good at finding smuggled drugs, a report said on Thursday.
An inspection of border security at Manchester Airport in northern England found that during a seven-month period, the six dogs had failed to find any illegal class A drugs, those considered the most dangerous such as heroin or cocaine.
“The deterrent effect of the detection dogs was difficult to measure, but seizures alone represented a low return on investment, given 1.25 million spent on new kennels and the costs of operating the unit,” said the report by the Independent Chief Inspector of Borders and Immigration.
Each dog has its own speciality in detecting goods such as drugs, tobacco, cash and meat being illegally brought into the airport by the 22 million passengers who use it annually.
However the report found that although the sniffers had helped customs seize 46 kg of cigarettes and 181 kg of meat, they had uncovered no class A drugs between November 2014 and June 2015 even though this was a “very high” priority.
It said one dog trained to find smuggled animal products had made “multiple accurate detections, but most were of small amounts of cheese or sausages, wrongly brought back by returning British holidaymakers and posing minimal risk to UK public health”.
Managers are now examining how better to deploy the dogs, the report said. |
In short. There's a provision in the constitution that one of the houses of Parliament, the National Council of Provinces, must be ensure that there is adequate public deliberation on Bills that it is considering. In relation to some abortion reform legislation, the public hearings were patchy and inadequate. As a result the Constitutional Court declared the legislation unconstitutional and invalidated it (on a deferred basis). It's a touch more complex than that, but you get the basic gist!
An interesting contrast, I think, to New Zealand's frenzy of unbridled urgency and its deleterious effect on public participation and engagement in the law-making. The litigation does have its foundation in South Africa's very comprehensive constitution though. Personally, I'm not convinced about the courts having power like this to intervene in the parliamentary process - I'd prefer that Parliament itself took more responsibility to ensure process deliberative democracy. But food for thought at least.
1 comment:
Hanna Wilberg
said...
Just came across what I regard as another subversion of proper Parliamentary process, and thought this might be a good place to mention it: provision for an Act of Parliament to be brought into force by Order in Council, rather than on a date specified in the Act - see eg s 2 Immigration Act 2009. Surely when Parliament enacts legislation, this should normally come into force at a not too distant date determined by Parliament, rather than leaving it to executive discretion to bring it into force.
The Order in Council version has long been common practice in the UK, but I had thought we were doing better in NZ - I don't know whether it has been used in other Acts recently (anyone?). The problems it can cause are illustrated by the case of R v Secretary of State for the Home Department ex p Fire Brigades Union [1995] 2 AC 539 (HL). Parliament had enacted a compensation scheme, but left it to Order in Council to bring it into force. Government had subsequently gone cold on the idea, and simply never brought it into force. The Minister had then instituted a different non-statutory one instead. Surely that's not how we make law in a democracy?
Course Outline
"From time to time ... lawyers and judges have tried to define what constitutes fairness. Like defining an elephant, it is not easy to do, although fairness in practice has the elephantine quality of being easy to recognise. As a result of these efforts a word in common usage has acquired the trappings of legalism: 'acting fairly' has become 'acting in accordance with the rules of natural justice', and on occasion has been dressed up with Latin tags. This phrase in my opinion serves no useful purpose and in recent years it has encouraged lawyers to try to put those who hold inquiries into legal straitjackets.... For the purposes of my judgment I intend to ask myself this simple question: did the [decision-maker] act fairly towards the plaintiff?"
This course examines the elephantine concept of fairness in the law, along with other contemporary legal issues. |
// #Regression #Conformance #TypeRelatedExpressions #TypeAnnotations
// Regression test for FSHARP1.0:2346
//<Expects id="FS0001" span="(7,2-7,3)" status="error">This expression was expected to have type. 'obj' .but here has type. 'int'</Expects>
//<Expects id="FS0001" span="(8,2-8,9)" status="error">This expression was expected to have type. 'obj' .but here has type. 'string'</Expects>
//<Expects id="FS0001" span="(9,2-9,15)" status="error">This expression was expected to have type. 'seq<'a>' .but here has type. ''b list'</Expects>
(1 : obj)
("Hello" : obj)
([1.0;2.0;3.0] : seq<_>).GetEnumerator()
|
In the Western world, we are mostly isolated from the deadly effect of the AIDS virus. Those who have it usually don't make much publicity for themselves, and some hide it completely. In Africa, however, the disease is a plague that is slowly killing off their population. It makes orphans of children who then starve to death; it cripples food production as farmers are too sick to properly harvest the land. ...
Karen Armstrong is a brilliant woman, and her books on God are both highly interesting and profoundly insightful. I must admit, however, that as studies of religion have progressed, her focus has centered on compassion. She views this notion as universal, and believes the best elements of religion can be enhanced when the focus is placed on compassion rather than dogma. It's a nice notion, but it ignores th ...
I found this link and thought some of you might be interested in it. It's a detailed list of police raids that have caused the deaths of innocent people, or resulted in other similar tragedies. Although the CATO institute is a bit too libertarian for my taste (including their reverence for total 'laissez faire' capitalism), they nevertheless are a watchdog for abuse of power in government. Here's a few exam ...
I used to be a huge online dater. Let's just say it was insane enough that in the span of 2 years, I went on over 150 dates. So when I say I'm an online dating expert, I'm not joking. I tried out every major dating site, but the one I purposely avoided was eHarmony. I generally found their philosophy of being able to 'pair' people up was deeply flawed, and at the heart of it, they have extremely conservativ ...
I'm a big Shermer fan. I've read all his books, and apart from the fact his voice sounds like he has a giant phlegm ball, he's awesome. If I had the money, I would definitely subscribe to Skeptic Magazine, but alas... The video is hard to watch if you know anything about evolution. This woman is literally trying to find a way to explain why harmful pathogens existed before the 'fall' of Adam and Eve. It's t ...
I don't pay attention to World Net Daily, mostly because the people who write for it are religious scumbags who wouldn't hesitate to transform the world into a Christian Theocracy. Now they are outraged at Hasbro's online version of 'The Game of Life' which allows same sex marriages. It was too much for one woman to bear, apparently: "You know how kids are," the mother told WND. "My daughter noticed right a ...
In my own life, I have always sought out issues that are controversial. It's no secret I'm a highly opinionated individual; I've chosen to take a stand on issues I consider to be of fundamental importance. I know there are many out there, even some of my fans, who consider the issue of a person's religion to be a private affair. One fan accused me of being insensitive by 'outing' my sister on my radio show, ...
It's a shame I have to report this, since I am generally a fan of this magazine. However, the publication recently pulled an article from its site due to a complaint, and so I feel compelled to say something. The article in question was a simple piece: how to spot a creationist agenda. It was summarily pulled due to complaints, made supposedly by the very creationists the article was trying to expose. P.Z M ...
Ryan and I sometimes joke around that as attitudes about drug prohibitionism soften, others harden in a predictable, reactionary way. What isn't funny is when it turns into an overzealous cop who guns down a college kid during a bullshit 'drug bust'. Derek Copp (kind of an ironic name) is usually described by friends as an easy going 'hippie' who is friendly, nonchalant, and most obviously likes to smoke po ...
Turkey is a strange country. In the 1920s, a military commander, Mustafa Kemal Ataturk, started the Turkish national movement after the collapse of the Ottoman Empire and formed the country now known as Turkey. He made special provisions to make the country secular, in order to prevent the Islamic church from wrestling control away from him. Like in the United States, the population is highly religious, and ... |
Twelve million Americans killed, another 60 million dead within a year.
In the Soviet Union, 41 million dead, with an estimated 100 million more over the next year... Governments destroyed, economies obliterated, and no reliable medical care available.
These were the dire predictions of a classified commission during the 1950s whose sole objective was to estimate what would happen in the event of a full-scale nuclear war between the United States — which already had 7,000 nuclear warheads at the time — and the USSR, which was quickly stockpiling its own atomic arsenal.
From 1957 through 1963, a group called the Net Evaluation Subcommittee (NES) would present the President in office with its projections of what would happen in the event of a nuclear war with the Soviet Union.
The findings were classified for over 50 years until the National Security Archive finally won the appeal in court to have them declassified (partially) in late July. The projections were so dangerous that the government fought tooth and nail to keep them hushed.
In fact, when the NES slid another set of predictions across JFK's desk in 1961, his first words were, “And we call ourselves the human race.”
Uranium Panic
Even though our situation today isn't nearly as dire as the nuclear arms race of the '50s and '60s, the general public is still worried about uranium.
Iran has been under sanction from the U.S. and other nations on and off for over three decades, and North Korea's exact nuclear capabilities are still a mystery to us.
And we would be remiss if we didn't include the disasters at Chernobyl, Three Mile Island, and, most recently, Fukushima. The Fukushima disaster managed to bring nuclear power generation to a grinding halt in many countries.
In fact, you can see for yourself how nuclear power production has declined since the catastrophic Fukushima meltdown...
Just two weeks ago, a toxic spill from a mine in British Columbia, Canada caused uranium and other dangerous chemicals to flood into Quesnel Lake, critically damaging it and the land surrounding it.
Thing is, despite all of these problems facing the nuclear energy space due to the rampant fear over uranium...
It doesn’t have to be this way.
We don’t even need uranium to operate nuclear power plants.
~~ad_0~~
An End to Fear
As far-fetched as it sounds, it’s true.
There is another element that is abundant in the U.S., Australia, India, Turkey, Brazil, and a few other countries that has the power to produce even more power than uranium.
And it does so at a much lower cost…
The element I’m talking about is thorium.
As you can see in the chart above, it costs $80 per kilogram to mine thorium versus the $110 per kilogram to mine uranium.
Of course, the real kicker here is that thorium power generation doesn’t give off any weapons-grade by-products, and it has a much higher melting point.
In other words, it can’t be used to manufacture nuclear weapons like uranium and plutonium, but it can be used in a nuclear plant with the proper reactor (more on that in a moment) with much less chance of a meltdown.
In fact, the International Atomic Energy Agency has said that the melting point for thorium is 500o Celsius higher than that of uranium. This allows plant operators an extra margin of safety in the case of meltdowns or power failures.
Cornering the Thorium Market
Thorium is shaping up to become the future of nuclear power generation and could easily grow to a multi-billion dollar market in as little as two years' time.
My colleague, Christian DeHaemer, recently uncovered one of the few thorium companies out there that will have a stranglehold on its use in power plants.
You see, the company he found trades under $3 and has a patent on exclusive, state-of-the-art reactor technology that can efficiently and cheaply generate thorium energy.
It’s more powerful than uranium, it’s safer than other forms of nuclear, and it is about to completely alter our energy grid.
The logical next step is for early investors to take advantage of the situation before the investment herd starts pouring in. In fact, you can learn the full details behind Christian's $3 thorium stock in his latest investment report.
Imagine the impact on the nuclear industry when we don't have to worry about meltdowns and nuclear winters... Until then, invest accordingly.
Until next time,
Keith Kohl
@KeithKohl1 on Twitter
A true insider in the energy markets, Keith is one of few financial reporters to have visited the Alberta oil sands. His research has helped thousands of investors capitalize from the rapidly changing face of energy. Keith connects with hundreds of thousands of readers as the Managing Editor of Energy & Capital as well as Investment Director of Angel Publishing's Energy Investor. For years, Keith has been providing in-depth coverage of the Bakken, the Haynesville Shale, and the Marcellus natural gas formations — all ahead of the mainstream media. For more on Keith, go to his editor's page. |
Navicular Stress Reaction
The navicular stress reaction is a kind of condition that is characterized with an incomplete crack in your navicular bone. The term navicular is defined as an anatomical name that is given to a certain bone that is located in your mid-foot. The navicular bone is located at the top of your foot arch.
The navicular stress reaction usually occurs if a certain person encounters a navicular stress fracture in his or her navicular bone. The tibialis posterior is a kind of muscle present in your navicular bone. If this bone muscle contracts, there is a certain pulling force that is being exerted in your bone.
Weight activity will place a compressive force through your navicular and with the presence of that energy, your navicular bone can be damaged. The so-called bony damaged will lead to stress reaction and navicular stress fracture. Learn more about the navicular stress reaction and learn how to deal with it.
Causes of Navicular Stress Reaction and Fracture
The navicular stress reaction and stress fracture have the ability to occur over time and the common cause of this is the excessive weight activity that includes sprinting, running, dancing and jumping. It can also occur in the recent change of activity and training conditions like footwear technique changes and surface changes.
Signs and Symptoms of Navicular Stress Reaction and Fracture
The patients who have this kind of condition usually experience poor localized pain in the inner part of their ankle and foot whenever they increase their impact activity like jumping, running, hopping and sprinting.
As the symptoms become worse, they might experience limp especially during weight activity and they tend to stop their daily routines due to excessive pain. That sensation usually comes from the outer aspect of the patients’ foot, second toes and inner aspect of their heel bone.
In other cases, most specialists recommend standing and walking that will aggravate the symptoms. There are also other symptoms that they will encounter that include night pain or ache in the navicular bone.
Diagnosis of Navicular Stress Reaction and Fracture
A thorough objective and subjective examination from your physiotherapist is the best thing to do to diagnose this kind of condition. You are also required to undergone MRI, X-ray and bone scan or CT scan to confirm a certain diagnosis and it can easily determine if it is a kind of severity of an injury.
With the presence of the latest trend of technology and devices, you will not worry about in treating your navicular stress reaction that is usually due to navicular stress fracture.
Prognosis of Navicular Stress Reaction and Fracture
Most patients who have navicular stress reaction is recommended to undergone a physiotherapy management to attain full recovery. This process lasts about 3-9 months and after that you can return to full sport activities.
In other critical cases of navicular stress reaction, the recovery process will take for about 1 year that will still depend on the required intervention and factors. There are also cases wherein certain patients can still encounter ongoing complications and symptoms that require appropriate management. |
91 F.Supp.2d 1316 (2000)
Paul SCHNEIDER, et al., Plaintiffs,
v.
CALIFORNIA DEPARTMENT OF CORRECTIONS, et al., Defendants.
No. C 96-1739 SI.
United States District Court, N.D. California.
March 22, 2000.
*1317 *1318 Herman A.D. Franck, Franck & Associates, San Francisco, CA, Stephen T. Gargaro, Stephen T. Gargaro Law Offices, San Francisco, CA, Dan M. Himmelheber, San Mateo, CA, for Plaintiffs.
Allen R. Crown, California State Attorney General's Office, Sacramento, CA, Peter J. Siggins, Deputy Attorney General, Bruce M. Slavin, Deputy Attorney General, Morris Lenk, Bill Lockyer, Cal. Attorney General, San Francisco, CA, for Defendants.
ORDER GRANTING DEFENDANT'S MOTION FOR SUMMARY JUDGMENT AND DENYING PLAINTIFFS' MOTION FOR PRELIMINARY INJUNCTION
ILLSTON, District Judge.
On February 11, 2000, the Court heard argument on a motion for summary judgment by defendant C.A. Terhune, Director of the California Department of Corrections ("CDC") and a motion for preliminary injunction by plaintiffs. Having carefully considered the arguments of counsel and the papers submitted, the Court GRANTS defendant's motion for summary judgment and DENIES plaintiffs' motion for preliminary injunction.
BACKGROUND
1. Procedural History
Plaintiffs are fifteen current and former California inmates who have brought a § 1983 action against defendants California Department of Corrections ("CDC"), James Gomez, former Director of the CDC, and C.A. Terhune, current Director of the CDC. Plaintiffs allege that defendants committed an unconstitutional taking and violated prisoners' equal protection rights by failing to pay interest on funds deposited by prisoners in Inmate Trust Accounts ("ITAs").
On March 24, 1997, this Court held that plaintiffs did not possess a property interest in the interest income earned on money placed in ITAs and dismissed plaintiffs' complaint without leave to amend. See Schneider v. California Dept. of Corrections, 957 F.Supp. 1145, 1149 (N.D.Cal. 1997). After this Court denied reconsideration of its ruling, plaintiffs appealed. On August 4, 1998, the Court of Appeals for the Ninth Circuit reversed and remanded, holding that plaintiffs possessed a constitutionally cognizable property right in the interest earned on funds deposited into the ITAs. Because such a property right triggered Fifth Amendment takings scrutiny, the Court ordered further discovery and proceedings regarding accrual of actual or constructive interest on ITA funds. See Schneider v. California Dept. of Corrections, 151 F.3d 1194, 1201 (9th Cir.1998).
On May 14, 1999, plaintiffs filed an amended complaint, alleging § 1983 damages resulting from defendants' alleged unconstitutional taking and violation of plaintiffs' equal protection rights. Plaintiffs also requested injunctive relief. On August 20, 1999, this Court dismissed defendants CDC and James Gomez from this action. See Schneider v. California Dept. of Corrections, No. 96-1739 SI (N.D.Cal. Aug. 20, 1999) (Order Granting Motion to Dismiss). Now before the Court is defendant Terhune's motion for summary judgment, and plaintiffs' motion for preliminary injunction.
2. Factual History
Plaintiffs are current and former state inmates of Pelican Bay State Prison, California. Correctional Institution, and the Central California Women's Facility. The inmates allege that defendant Terhune has violated the Fifth Amendment Takings Clause and the Fourteenth Amendment Equal Protection Clause by failing to pay *1319 constructive interest on funds deposited by prisoners into ITAs, but offering interest to state parolees. See Compl. ¶¶ 30-31, 39-41.
For security reasons, state prisoners are not permitted to possess money while in prison. See 15 C.C.R. § 3006(b); Flores Decl. ¶ 3. Should prisoners wish to have access to funds while incarcerated,[1] inmates can choose to place their money in either an ITA, which does not earn interest to the prisoner, or in a Passbook Savings Account, which does earn interest.[2]See Flores Decl. ¶ 6; Response to Plffs' Second Set of Interrogatories, No. 1. Only those funds placed in an ITA are available to inmates for use in the prison Canteen[3] to purchase items such as soap and toothpaste. See Flores Decl. ¶ 6. The CDC does not charge the prisoners a fee for maintaining the ITAs. See id. ¶ 2.
The California Penal Code provides that, when specifically authorized on a separate written form by the inmate, the CDC may place ITA funds into an interest-bearing bank account. See Cal.Penal Code § 5008; Declaration of Counsel in Supp. of Mtn. for Prelim. Inj., Exh. E. Prior to October 1998, ITA funds that exceeded the estimated current needs of inmates were deposited into the Inmate Welfare Fund ("IWF"), a fund which is used to improve prison conditions and provide prisoner programs, such as movies and library materials. See Flores Decl. ¶¶ 7, 9. In turn, IWF funds in excess of the estimated needs of the IWF program were deposited into the State Treasury. See Flores Decl. ¶ 7. Any interest earned on these excess IWF funds was returned to the IWF account. See id.[4] However, as of October 1998, excess ITA funds are no longer transferred into the IWF account or the State Treasury. Rather, these funds remain in the individual inmates' non-interest-bearing ITAs.
Based upon a survey performed by R. Flores, Chief of the Inmate Welfare Fund and Trust Accounting Section of the CDC, defendant estimates that operating the current non-interest-bearing ITA system costs $1,1789,892 per year (or $7.84 per prisoner), no part of which is actually charged to the prisoners. See Flores Decl. ¶¶ 2, 11. The CDC further estimates that the annual interest earned on ITA funds would total $516, 116.28, or $3.43 per prisoner. See id. ¶ 12. In order to institute and maintain a system in which ITA funds earn interest and in which that interest is accounted for to each individual inmate, additional staffing, equipment, and office space costs may also be necessary. See id. ¶ 10. As such, interest-bearing ITA accounts would generate substantial, systemic net losses. See id. ¶ 13.
LEGAL STANDARD
A motion for summary judgment may be granted when "the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law." Fed.R.Civ.P. 56(c).
A party seeking summary judgment bears the initial burden of informing the *1320 court of the basis for its motion and of identifying those portions of the pleadings and discovery responses which demonstrate the absence of a genuine issue of material fact. See Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). Where the moving party will have the burden of proof on an issue at trial, the movant must affirmatively demonstrate that no reasonable trier of fact could find other than for the moving party. However, on an issue for which the nonmoving party will have the burden of proof at trial, the movant can prevail merely by pointing out that there is an absence of evidence to support the nonmoving party's case. Id. If the moving party meets its initial burden, the nonmoving party must then set forth, by affidavit or as otherwise provided in Rule 56, "specific facts showing that there is a genuine issue for trial." Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 250, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986); Fed.R.Civ.P. 56(e).
In judging evidence at the summary judgment stage, the Court does not make credibility determinations or weigh conflicting evidence and draws all inferences in the light most favorable to the nonmoving party. See T.W. Elec. Serv., Inc. v. Pacific Elec. Contractors Assn., 809 F.2d at 630-31. The evidence presented by the parties must be admissible. Fed.R.Civ.P. 56(e). Hearsay statements found in affidavits are inadmissible. See, e.g., Fong v. American Airlines, Inc., 626 F.2d 759, 762-63 (9th Cir.1980). Conclusory, speculative testimony in affidavits and moving papers is insufficient to raise genuine issues of fact and defeat summary judgment. See Falls Riverway Realty, Inc. v. Niagara Falls, 754 F.2d 49 (2d Cir.1985); Thornhill Publishing Co., Inc. v. General Telephone & Electronics Corp., 594 F.2d 730, 738 (9th Cir.1979).
DISCUSSION
1. Fifth Amendment Takings Clause
Defendant asserts that the questions on remand are "whether there has been a `taking,' whether there has been `just compensation' and whether, if the interest were paid to the [plaintiffs], there would be any `net interest.'" Dft's Mtn. for Summ.Judg., at 6. Defendant argues that, though ITA accounts do not currently bear interest, were these funds to be deposited into interest-earning accounts, the costs of administering those interest-bearing accounts would greatly exceed the amount of interest owed to individual plaintiffs. Therefore, if plaintiffs were to bear the economic consequences of such an interest-bearing system, the system would actually present a detriment, rather than a benefit, to plaintiffs. Furthermore, defendants contend, because plaintiffs have not been and are not now charged for the costs of administering the ITAs, they have received just compensation for any interest income not remitted to them.
Plaintiffs allege that defendant's failure to pay interest on funds deposited by prisoners in an ITA constitutes a taking in violation of the Fifth Amendment. Plaintiffs further counter that, as fiduciary and trustee of the ITA, Terhune has the duty to place the funds into interest bearing accounts. Therefore, these funds should be viewed as earning "constructive interest." See Mtn for Prelim.Inj., at 8. Plaintiffs assert that the "policy ... of placing inmates' funds into non-interest-bearing accounts" and not remitting "constructive interest" to plaintiffs is a violation of the Fifth Amendment. Compl. ¶ 19. Plaintiffs also argue that defendant's contention that the cost of operating such an interest-bearing ITA would exceed the interest owed is speculative, but plaintiffs provide no evidence or analysis that would produce a contrary result. Rather plaintiffs assert that the best evidence that an interest-bearing system would cause plaintiffs a net loss would be to actually operate an interest-bearing ITA system.
The Fifth Amendment provides that "private property [shall not] be taken *1321 for public use, without just compensation." U.S. Const. amend. V. The Fifth Amendment Takings Clause has been held to apply to the states through the due process clause of the Fourteenth Amendment. See Webb's Fabulous Pharmacies, Inc. v. Beckwith, 449 U.S. 155, 160, 101 S.Ct. 446, 450, 66 L.Ed.2d 358 (1980). However, "not every destruction or injury to property by governmental action has been held to be a `taking' in the constitutional sense." Armstrong v. United States, 364 U.S. 40, 48, 80 S.Ct. 1563, 4 L.Ed.2d 1554 (1960). The Fifth and Fourteenth Amendment property and due process guarantees apply only to situations in which an individual is deprived of property in which there exists a constitutionally protected property interest. See Board of Regents v. Roth, 408 U.S. 564, 569, 92 S.Ct. 2701, 2705, 33 L.Ed.2d 548 (1972). It is undisputed that plaintiffs hold such a property interest both in the funds that they deposit into ITAs and in any interest income earned therefrom. See Schneider, 151 F.3d at 1201.
The Supreme Court has "eschewed the development of any set formula for identifying" a Fifth Amendment taking which is not a "per se" taking of property. Connolly v. Pension Benefit Guaranty Corp., 475 U.S. 211, 224, 106 S.Ct. 1018, 89 L.Ed.2d 166 (1986). Instead, the Court has relied on a case-by-case, factual inquiry. See id. In making this assessment, the Court has identified three factors: (1) the economic impact on the plaintiff; (2) the extent of interference with plaintiff's investment-backed expectations; and (3) the character of the governmental action. See id. at 225, 475 U.S. 211, 106 S.Ct. 1018, 89 L.Ed.2d 166 (citing Penn. Central Transp. Co. v. City of New York, 438 U.S. 104, 124, 98 S.Ct. 2646, 57 L.Ed.2d 631 (1978)).
A. Economic Impact on Plaintiffs
Defendant asserts that the ITA system incurs annual operating expenses of over $1 million (or over $7.00 per inmate), costs which the CDC does not pass along to the plaintiffs in the form of charges or fees. See Flores Decl. ¶ 3, 11. Defendant further argues that the interest earned on ITA funds would represent a de minimis amount, averaging no more than $4.00 per prisoner. Therefore, defendant claims that any withheld interest income, real or constructive, can essentially be characterized as fees "for services rendered" by the CDC. Phillips v. Washington Legal Foundation, 524 U.S. 156, 171, 118 S.Ct. 1925, 141 L.Ed.2d 174 (1998) (quoting Webb's Fabulous Pharmacies, 449 U.S. at 157, 101 S.Ct. at 448-449). Plaintiffs counter that Washington Legal Foundation, Webb's Fabulous Pharmacies, and Schneider support their proposition that any use by the government of actual or constructively accrued interest constitutes a taking for public use without compensation.
Because interest does not actually accrue on the individual ITAs or on the IWF accounts, there is no "actual interest" used by the CDC. Although both Washington Legal Foundation and Schneider found property rights in the interest earned on the funds in question, neither Court decided the issue of whether the disputed use of funds constituted a taking in violation of the Fifth Amendment. See Washington Legal Foundation, 524 U.S. at 172, 118 S.Ct. 1925 (holding that the owner of the principal retained a property right in the interest earned from funds held in "IOLTA" accounts); see also Schneider, 151 F.3d at 1201 (holding that inmates maintain a property interest in any income earned on ITAs). Rather, the resolution of that issue was remanded to the district court.
Indeed, after a trial on the merits of the Washington Legal Foundation IOLTA case, the district court addressed the takings issue and held that plaintiffs' Fifth Amendment claim failed. See Washington Legal Foundation v. Texas Equal Access to Justice Foundation, 86 F.Supp.2d 624, 646-47 (W.D.Tex. 2000). Specifically, the Court found that the Interest on Lawyers' Trust Account ("IOLTA") program had no *1322 economic impact on plaintiffs, because the type of funds which generated interest while in IOLTA accounts would be incapable of generating interest absent IOLTA. See id. at 646.
Theoretically, the funds at issue in this case differ from those at issue in Texas Equal Access. However, in practice, there is great similarity. Just as the cost of placing money in a non-IOLTA account "would subsume the interest earned," id., the uncontradicted evidence in this case shows that the expense of administering an interest-bearing ITA system would dwarf the small quantity of interest generated, leaving nothing for distribution to individual prisoners. See Flores Decl. ¶ 11-13; see also Texas Equal Access, 86 F.Supp.2d at 640 (explaining that, though the cost of "operating an IOLTA account is zero," "in-firm pooling" produced $10 interest and generated $12 in fees). Moreover, here plaintiffs have the option of placing any money on which they wish to gain interest in a separate savings account. Therefore, Phillips and its related authorities do nothing to strengthen plaintiffs' argument.
The Webb's Fabulous Pharmacies case, cited by the Supreme Court in Washington Legal Foundation, did rule on the constitutionality of the issue before it, but the facts of that case are not particularly relevant to the claims here. In Webb's, nearly $2 million in interpled funds was remitted to the county clerk. See Webb's Fabulous Pharmacies, 449 U.S. at 166, 101 S.Ct. 446, 66 L.Ed.2d 358. After deducting $9,228.74 in fees, the clerk deposited the remaining funds into an interest-bearing account. See id. Upon resolution of the dispute, the clerk retained the more than $100,000 in interest earned on the deposited funds. See id. The Court held that, because "interest ... follows the principal" and because a service fee of $9,228.74 had already been deducted by the clerk, withholding the interest earned on the interpleader funds amounted to a taking in violation of the Fifth and Fourteenth Amendments. Id. at 162, 164, 101 S.Ct. 446. However, the Court took no position "as to the constitutionality of a statute that prescribes ... retention of interest earned, where the interest would be the only return ... for services ... rendered." Id. at 164, 101 S.Ct. 446; see also Washington Legal Foundation, 524 U.S. at 169, 118 S.Ct. 1925 (stating that the Court's "holding does not prohibit a State from imposing reasonable fees" on costs it "incurs in generating and allocating interest income"). Accordingly, Webb's appears to offer more aid to the defendant's argument than to plaintiffs.
Finally, Washlefske v. Winston, 60 F.Supp.2d 534 (E.D.Va.1999), the case most similar to the present circumstances, weighs against plaintiffs' argument. In Washlefske, plaintiffs argued that the Virginia Department of Corrections' ("VDOC") failure to pay to inmates interest earned on their individual interest-bearing checking accounts constituted a taking for public use without just compensation. The VDOC placed the interest earned on the inmates' interest-bearing checking accounts and on the excess inmate funds into the "local Commissary Account," which provides programs similar to California's Inmate Welfare Fund. The court found that, because (1) the local Commissary Account funds were used for the benefit of inmates, rather than for third-parties, (2) plaintiffs had other options for investing their funds but chose to use the inmate trust fund accounts, (3) the VDOC administered the accounts without charge to the inmates, and (4) plaintiffs receive a greater benefit from the pooling of the Commissary Account funds than they would from individual interest payments, the VDOC's failure to remit interest to the plaintiffs did not constitute a taking in violation of the Fifth Amendment. Washlefske, 60 F.Supp.2d at 541-43.
Defendant asserts that, because security concerns prohibit the use of cash within the prison, the CDC's ITA accounting *1323 system provides plaintiffs with a valuable service at no charge to them. Plaintiffs have not presented evidence countering or challenging defendant's cost estimates or showing that the cost to defendants in accounting for the funds in each inmates' ITA is not substantial, or that the offering of this service is not useful and valuable to plaintiffs. Plaintiffs have further not offered evidence that plaintiffs' present inability to earn interest on ITAs is not justly compensated by plaintiffs' access to the ITA accounting system.
Moreover, it appears that the economic impact of depositing funds into ITAs is small. The evidence shows that many prisoners would receive a minuscule amount of income from an interest-bearing account.[5] Should the state organize a system in which ITAs earn interest, the defendant's declaration provides estimates suggesting that the systemic costs would substantially exceed the total interest generated. See Flores Decl. ¶ 11-13. If the prisoners were to bear the cost of the operation of an interest-bearing accounting system, defendant's declaration suggest that their economic interests would be harmed rather than improved.[6]See Texas Equal Access, 86 F.Supp.2d at 646 (finding that the costs of administering money placed in interest-bearing non-IOLTA accounts "would subsume the interest earned").
Plaintiffs argue that defendant's calculations are speculative and unreliable, but plaintiffs provide no analysis or estimate of their own. Plaintiffs complain that in April 1999, defendant stated that some of the information now set forth in defendant's supporting declaration was not available.[7] However, in the over three months which elapsed between the filing of the Flores declaration and the hearing on the summary judgment motion, plaintiffs made no attempt to depose Mr. Flores or to obtain or examine any new information which may have been used in forming the his estimate of operating costs and potential interest accruals.[8]
Finally, on February 14, 2000, the week after oral argument, plaintiffs' moved this Court for a 60-day extension of time to allow plaintiffs to submit documentation regarding the Oregon State Department of Corrections, which "pays inmates interest on inmate trust accounts." Plffs' Ex Parte Application, at 2.[9] Thereafter, on February 22, 2000, plaintiffs submitted a request for judicial notice of Oregon Administrative Regulations, OAR §§ 291-158 through *1324 XXX-XXX-XXX. Section XXX-XXX-XXXX states that "[i]nterest on all inmate accounts which accrues from investments made by the State Treasurer will be credited monthly to each inmate's trust account." Request for Judicial Notice, at 2 Monthly trust statements are provided to each inmate, and additional copies are available for $1 per statement. OAR XXX-XXX-XXXX(3), attached to Request for Judicial Notice.
Plaintiffs, however, have not submitted evidence regarding the cost incurred by the Oregon State Department of Corrections in administering its system. Plaintiffs state that they have learned from Ms. Jay Sebastian, Fiscal Services Manager and Manager of the Oregon Inmate Trust Account Program, that the Oregon Department of Corrections does not have a record of the administrative expenses incurred in operating its ITA program. See Request for Judicial Notice, at 2. Moreover, plaintiffs apparently have no intention of either deposing Ms. Sebastian or conducting further investigations regarding the cost of Oregon's program. See id. However, absent some estimate of the costs and benefits of the Oregon system, the bare fact that Oregon administers such a program is inadequate to counter or disprove defendant's estimates regarding the costs specific to California's ITA system.
Defendant has set forth "rough" estimated costs and benefits analysis of an interest-bearing system. Plaintiffs have not responded with evidence which would show that these estimates are false, or that the lack of interest income operates to prisoners' overall economic detriment. Therefore, plaintiffs have failed to raise a genuine issue of material fact sufficient to survive summary judgment.
B. Plaintiffs' Investment-Backed Expectations
This factor in the takings analysis is most commonly used in disputes regarding real property. See Penn. Central Transp. Co. v. City of New York, 438 U.S. at 107, 98 S.Ct. at 2650 (deciding whether the application of municipal zoning ordinances to individual buildings for the purpose of preserving historic landmarks could effect "taking" which would require the payment of "just compensation"). Therefore, this factor is not as readily applicable to an analysis of purely monetary interests. However, the Supreme Court has reviewed investment-backed expectations in the context of monetary interests. See Connolly, 475 U.S. at 227, 106 S.Ct. at 1027 (finding that the retroactive application of withdrawal liability provisions to operating pension plans did not upset the investment-backed interests of employers who voluntarily participated in ERISA-regulated plans); see also Texas Equal Access, 86 F.Supp.2d at 643-44.
The defendant argues that, because interest-earning Passbook Savings Accounts are available to plaintiffs, no "taking" of interest has occurred. Plaintiffs counter that inmates are unconstitutionally forced to choose between earning interest via the Passbook Savings Account, which funds may not be used at the Canteen, and having access to the Canteen via their ITAs, which do not earn interest. They assert that access to the Canteen is a necessity of prison life.
Should plaintiffs wish to earn interest on their deposits, plaintiffs may invest funds in interest-bearing Passbook Savings Accounts. See Flores Decl. ¶ 4. Moreover, it appears that access to the Canteen is not absolutely necessary, because, in fact, some inmates choose not to utilize the ITAs, while others who do open ITAs carry a zero balance. See Flores Decl. ¶ 2. Plaintiffs have failed to submit evidence that they were not allowed access to passbook savings accounts, or that they were not permitted to keep accounts outside the jail with friends or family, or that they were not informed that they could do so. See, e.g., Leyva Decl., attached as Exh. E to Declaration of Counsel in Supp. of Prelim.Inj. (stating that she agreed to set up *1325 an ITA account because otherwise, she "could not get food items [from] the prison store"). Plaintiffs also have not stated that they expected to earn interest on the money deposited in their ITAs.
Additionally, as noted above, the uncontradicted evidence shows that plaintiffs would receive very little interest on their ITA deposits and that the costs of administering such a system, if charged back to the inmates, would more than consume the interest earned. Accordingly, any investment expectations plaintiffs may have would not be met by the institution of an interest-bearing ITA system. Therefore, plaintiffs have not proffered evidence sufficient to raise a triable issue of fact which could defeat summary judgment.
C. Character and Benefit of the Governmental Action
Though the plaintiffs do not argue this point, their claim of an unconstitutional taking implies the argument that plaintiffs have been singled out to bear the burden of providing funding for the IWF program. However, in light of the uncontradicted evidence that any interest earned by plaintiffs would be swallowed by fees, the Court finds that plaintiffs "are in fact bearing no burden at all." Texas Equal Access, 86 F.Supp.2d at 646 (finding that, because plaintiffs funds could not generate interest without IOLTA, the "program costs Plaintiffs nothing").
It should be noted that at of October 1998, in apparent response to the takings claims made in this lawsuit, defendant ceased transferring the excess ITA funds in order to generate interest for the IWF program. When that program was in effect, however, the pooling of interest earned in the IWF offered plaintiffs benefits that each individual prisoner's interest were it distributedwould not be able to provide. See Flores Decl. ¶¶ 7, 9 (stating the IWF funds are used to improve prison conditions and to provide library and visiting materials). More importantly, IWF offers these benefits to the prisoners themselves rather than transferring the benefits to a population outside of the prison. See Washlefske, 60 F.Supp.2d at 541-43 (noting that the VDOC-administered accounts provided greater benefit to prisoners than they would receive from their individual interest payments); compare Texas Equal Access, 86 F.Supp.2d at 646-47 (upholding the constitutionality of IOLTA, which transfers a paying client's interest benefit to the Texas Equal Access to Justice Foundation in order to provide legal services to poor);. Therefore, the Court concludes that application of the interest earned on excess ITA funds to the use of the Inmate Welfare Fund provided plaintiffs with a benefit rather than an unwarranted burden.
2. Qualified Immunity
Terhune argues that he is entitled to qualified immunity from damages because it was unclear whether plaintiffs had a constitutional right to have ITA funds placed in interest bearing accounts. Plaintiffs respond that the Constitution's prohibition against governmental taking without just compensation has been clearly established for centuries, and that, as a trustee, Terhune has a fiduciary duty to assure that funds in his care are invested productively. Therefore, plaintiffs argue, their due process right to trust account interest was well-established at all relevant times.
The defense of qualified immunity protects "government officials ... from liability for civil damages insofar as their conduct does not violate clearly established statutory or constitutional rights of which a reasonable person would have known." Harlow v. Fitzgerald, 457 U.S. 800, 818, 102 S.Ct. 2727, 73 L.Ed.2d 396 (1982). The rule of qualified immunity "`provides ample protection to all but the plainly incompetent or those who knowingly violate the law.'" Burns v. Reed, 500 U.S. 478, 494-95, 111 S.Ct. 1934, 114 L.Ed.2d 547 (1991) (quoting Malley v. Briggs, 475 U.S. 335, 341, 106 S.Ct. 1092, 89 L.Ed.2d 271 *1326 (1986)). "Therefore, regardless of whether the constitutional violation occurred, the [official] should prevail if the right asserted by the plaintiff was not `clearly established' or the [official] could have reasonably believed that his particular conduct was lawful." Romero v. Kitsap County, 931 F.2d 624, 627 (9th Cir.1991). The plaintiff bears the burden of proving the existence of a "clearly established" right at the time of the allegedly impermissible conduct. See Maraziti v. First Interstate Bank, 953 F.2d 520, 523 (9th Cir.1992). If the plaintiff meets this burden, then the defendant bears the burden of establishing that his actions were reasonable, even if he violated the plaintiff's constitutional rights. Doe v. Petaluma City Sch. Dist., 54 F.3d 1447, 1450 (9th Cir.1995); Neely v. Feinstein, 50 F.3d 1502, 1509 (9th Cir.1995); Maraziti, 953 F.2d at 523.
In a similar action, Washlefske v. Winston, 60 F.Supp.2d 534 (E.D.Va. 1999), the court was presented with the comparable issue of whether funds from prisoners' individual accounts and funds in excess of the inmates' day-to-day expenses could be pooled and the interest used to acquire items such as prison library materials and exercise equipment. See id. at 534. In that case, pursuant to Phillips, the court found that the plaintiffs did in fact have a property interest in the interest earned on their trust accounts. However, the Washlefske court held that because use of the "minuscule amount of interest earned" coupled with the facts that the Virginia Department of Corrections both did not charge a fee for administering the accounts and used the total interest for the benefit of the inmates as a whole (rather than for the advantage of a "third-party beneficiary"), there was not a taking in violation of the Fifth and Fourteenth Amendments. See 60 F.Supp.2d at 541-43.
Plaintiffs have not directed the Court's attention to any other cases which hold that it is unconstitutional for the state department of corrections to withhold de minimis interest accruals in lieu of charging an administrative service fee or to pool minimal interest accruals to provide funds for the collective benefit of inmates. Therefore, the Court concludes that defendant Terhune could have reasonably believed that failure to account for any interest accrued on funds from ITAs did not violate a clearly established constitutional right. Accordingly, the Court finds that defendant is entitled to qualified immunity from damages in the present suit.
3. Equal Protection Violation
Plaintiffs allege that state parolees are offered ITA accounts which earn interest, while inmates are denied interest payments. This difference in treatment between inmates and parolees, plaintiffs assert, constitutes an equal protection violation. Defendant argues that plaintiffs have neither presented evidence that the state maintains ITA for parolees, nor met their burden of showing an equal protection violation.
To establish an equal protection violation, plaintiffs must show that the alleged actions taken by the state (1) had a disparate impact on a suspect class and (2) was motivated by discriminatory intent. See Washington v. Davis, 426 U.S. 229, 238-239, 96 S.Ct. 2040, 48 L.Ed.2d 597 (1976).
Plaintiffs' complaint contends that the state "gives parolees interest on any accounts in the Inmate Trust Account, but not to time-serving inmates." Compl. ¶ 40. However, plaintiffs have not proffered evidence to the Court either that parolees are provided with ITAs that earn interest or that ITAs are maintained for parolees at all. Accordingly, the Court concludes that there exists no genuine dispute of material fact and GRANTS summary judgment for the defendant.
4. Preliminary Injunction
The Court has the authority to grant a preliminary injunction in the exercise *1327 of its equitable powers. See Fed. R.Civ.P. 65. As the Court is acting in equity, the decision to enter a preliminary injunction is largely left to its discretion. See Big Country Foods, Inc. v. Board of Educ. of Anchorage School Dist., 868 F.2d 1085, 1087 (9th Cir.1989). Traditionally, this rule has been interpreted to require the trial court to consider the likelihood that plaintiff will prevail on the merits and the possible harm to the parties from granting or denying the injunctive relief. See Arcamuzi v. Continental Air Lines, Inc., 819 F.2d 935, 937 (9th Cir.1987); Sierra On-Line, Inc. v. Phoenix Software, Inc., 739 F.2d 1415, 1421 (9th Cir.1984).
At the extremes, the party seeking injunctive relief must show either (1) a combination of probable success on the merits and the possibility of irreparable harm, or (2) that serious questions are raised and the balance of hardships tips sharply in the moving party's favor. See Miss World (UK) Ltd. v. Mrs. America Pageants, Inc., 856 F.2d 1445, 1448 (9th Cir.1988); Rodeo Collection, Ltd. v. West Seventh, 812 F.2d 1215, 1217 (9th Cir. 1987). "These are not two distinct tests, but rather the opposite ends of a single `continuum in which the required showing of harm varies inversely with the required showing of meritoriousness.'" Miss World, 856 F.2d at 1448 (quoting Rodeo Collection, 812 F.2d at 1217). However, in any situation, the Court must find that there is some threat of an immediate irreparable injury, even if that injury is not of great magnitude. Big Country, 868 F.2d at 1088 (citations omitted); Oakland Tribune, Inc. v. Chronicle Publishing Co., Inc., 762 F.2d 1374, 1376 (9th Cir.1985) (citations omitted).
In light of the Court's disposition on defendant's motion for summary judgment, the Court concludes that plaintiffs have not met their burden of showing a probability of success on the merits. Nor have plaintiffs presented any evidence of the possibility of irreparable harm or that the balance of hardships tips in plaintiffs favor. Accordingly, plaintiffs' motion for preliminary injunction is DENIED.
CONCLUSION
For the foregoing reasons, the Court GRANTS defendant's motion for summary judgment and DENIES plaintiffs' motion for preliminary injunction.
IT IS SO ORDERED.
NOTES
[1] Inmates retain the option of placing their funds outside the California Department of Corrections system with family, friends, institutional trustees, etc.
[2] The Passbook Savings Account program was implemented in response to the California Court of Appeal decision in In re Parker, 151 Cal.App.3d 583, 198 Cal.Rptr. 796 (1984). Because of a growing problem in the trafficking and use of narcotics and other contraband in prison, in 1981 California prison inmates were prohibited by regulation from establishing passbook savings accounts with outside banks, and were restricted to "long term investments" for their funds. The California court found that less restrictive alternatives were available to the prison authorities to afford protection against the narcotics and contraband threat, and this passbook savings program was developed as a result.
[3] The Canteen is the facility at the prison where inmates are able to purchase sundries.
[4] In the first six months of 1999, excess IWF funds earned interest at a rate of 5.134%.
[5] In fact, many inmates do not open ITAs and other ITAs regularly carry a zero balance. See Flores Decl. ¶ 2.
[6] Declarant Flores acknowledges that the "estimates are very rough and would need to be refined in order to be actually used." Flores Decl. ¶ 13. However, Flores declared that he could "make the following generalizations: (1) the costs of operating the ITA system clearly exceed the amount of interest which individual prisoners would receive if interest were paid to the individual prisoners; (2) the costs of operating the ITA system clearly exceed the amount of interest which is earned on the ITA funds; (3) if individual prisoners were charged the `average' costs of operating the ITA system, prisoners who received the `average' amount of interest earned on ITA accounts would be worse off than under the current system; (4) any prisoner who wishes to earn interest on his or her funds which are not in an ITA may do so." Flores Decl. ¶ 13
[7] Plaintiff attaches interrogatories and document request in which defendant responds to questions concerning the "total operating cost of the ITA deposit system" by stating that defendant "does not have documents which show the `total operational costs of administering the ITA deposit system.'" Response to Plff's Second Set of Interrogatories, at 3-4, attached as Exh. B to Declaration of Counsel in Supp. of Mtn. For Prelim.Inj. Plaintiffs apparently never pursued the inquiry further (i.e, with more specific interrogatories or a motion to compel further information about deposits).
[8] At oral argument, plaintiffs' counsel indicated that he had no plans to request further depositions.
[9] Plaintiffs' Ex Parte Application for Extension of Time to Permit Submission of Further Evidence is hereby GRANTED.
|
1. Field of the Invention
The invention relates to an eraser, composed of fillers, a thermoplastic material based on synthetic rubber as the binder and other additives.
2. Description of the Prior Art
In a known eraser of this type, as disclosed in Belgian Pat. No. 673,229, it is proposed to use polychloroprene, chlorosulfonated polyethylene, polybutadiene, polyacrylonitrile or polyisobutylene as the binder.
However, this eraser was found to be disadvantageous because an additional vulcanization process or a peroxidic crosslinking is required due to the selected binders. In addition, as a rule, softeners, such as, for example, chloroparaffins, which have a great tendency to migrate, are required.
In accordance with another proposal as disclosed in U.S. Pat. No. 3,738,951, a butadiene-styrene block polymer with a butadiene to styrene ratio of 4:1 to 1:1 (80:20 to 50:50%) is used as the binder. Furthermore, in this case, the use of a very high portion of factice and naphthenic oil is proposed as softeners.
Since factice as well as naphthenic oils are relatively expensive components, these known mixtures always result in relatively expensive final products. |
Q:
Stop unwanted repetition of a div while hovering it
Dear specialists,
I have a question. I am new to Jquery and I am trying to make use of div animation according to the example code given below. What happens is that while hovering the mouse various times in a short amount over the div the action reproduces itself and causes an usability behavior that I would like to avoid somehow. Is there a way to make the function check on the mouse behavior for example the div hovering in a given amount of time to avoid unwanted multiple activation?
I hope I explained well enough.
Thanks for your input.
$(document).ready(function() {
$("#expand_smoke").hover(
//on mouseover
function() {
$(this).animate({
height: '+=125' //adds 125px
}, 'slow' //sets animation speed to slow
);
},
//on mouseout
function() {
$(this).stop()
$(this).animate({
height: '60' //changes back to 60px
}, 'slow'
);
}
);
});
A:
Why don't you just do this?
$("#expand_smoke").hover(
function() {
$(this).stop().animate({ height: '200' }, 'slow');
},
function() {
$(this).stop().animate({ height: '60' }, 'slow');
}
);
|
Q:
Preventing Selection / Copy to Clipboard in Firefox
I need to prevent user from selecting text (select all or select a portion of text) in the browser Mozilla Firefox, using java script.
I have done this using Internet Explorer, but it seems doesn't work with Mozilla.
Any hints? URL? Sample?
TIA.
EDIT:
Actually, this ridiculous problem was requested by our client. And yes, we have explained them that there are thousand other ways to get the text. But they answer that they know about that, they just want to prevent for amateur user to do that.
I have done some googling and find similar problem with the solution here.
A:
Render the text to an image if you really want to prevent people from copy-pasting it. Javascript tricks can always be disabled and/or worked around.
Of course the best way to prevent people from copying text is to not show it at all - they might read it and retype! ;-)
A:
There is no way to fully protect content you publish, short of DRM schemes which are not widespread enough to be useful for a website. But to prevent simple copy-and-paste there are several approaches, each of which is very annoying to your users.
A simple way would be to cover the text with another element, such as a DIV, using CSS positioning. This would mean that when the user tries to click on the DIV to select the text there would be no text to select. Should work in any browser that supports CSS and in browsers that don't it will probably be completely invisible. Clicking on the page and hitting CTRL+A (or some other shortcut key) may select the text anyway, and it may be impossible to block all key and mouse events that can get at the text. But this DIV "lid" approach is at least unobtrusive and easy to generalize. However, this is trivially defeated by looking at the HTML source. It is less trivially defeated by turning off CSS (easy to do in Firefox, and many Firefox users are sophisticated enough to do it).
A more robust approach would be to render the text as a graphic, either using a regular image file or something like a PDF. However graphics can be OCR'ed. There are free tools for this.
Finally you could put your text in a Flash or Java applet, which would download the text from the server. Someone could steal your applet but would have difficulty making it talk to your webserver due to the same-origin security policy (note: this can also be worked around). This approach is not that much better than the PDF approach except that it makes it harder to grab entire documents, because the applet will only display a portion of the document at a time. To defeat this using OCR the attacker has to take screen-captures. Or they could reverse-engineer your applet and make a new applet (or even a regular program) which downloads all the content from your server.
All those approaches are only of the most basic use and I suspect you'll find that they don't help at all. You'd probably get more return on investment building useful features rather than this.
|
Robert S. Spilman and Fred O. Blue, both of Charleston, W.Va., for petitioner.
Mr. H. D. Rummel, of Charleston, W.Va., for respondents.
Mr. Justice ROBERTS delivered the opinion of the Court.
The Circuit Court of Appeals has decided that a District Court is without power to set aside its order dismissing a petition for reorganization under section 77B of the Bankruptcy Act, as amended (11
U.S. C.A. 207), and to rehear the cause after the ex-
[300
U.S. 131
, 133]
piration of the period allowed by the Act for appeal from the order.
1
To resolve a conflict of decision2 we granted certiorari.
229
U.S. 528, 57
S. Ct. 41.
November 25, 1935, the petitioner filed in the District Court for Southern West Virginia a petition and, on December 10th, an amended and supplemental petition for corporate reorganization under section 77B of the Bankruptcy Act, as amended.
3
February 7, 1936, the respondents filed objections and motions to dismiss. March 2d the petitions were dismissed. March 20th the petitioner presented to the Circuit Court of Appeals a petition for appeal, pursuant to section 24(b) of the Bankruptcy Act.
4
April 15th the court denied the appeal,5 holding that the petitioner should have proceeded under section 25(a).6 April 17th petitioner notified respondents that on April 24th it would present a petition to the District Court praying vacation of the order of March 2d and a rehearing and review of all matters arising in the proceedings because of errors committed by the court in dismissing its petitions, and that, upon rehearing, the court would be asked to enter an order approving the original and amended petitions. After presentation of the petition for rehearing and argument thereon the court directed
[300
U.S. 131
, 134]
that it be filed, took the matter under advisement, and, on May 12th, set aside the order of March 2d, granted a rehearing and review and fixed May 22d for a hearing on all questions arising on the record. The court found that good cause existed justifying vacation of its previous order and reconsideration of the cause. It further found that the application had been seasonably presented and no rights had vested under the order of March 2d which would be disturbed by setting the order aside. By leave of court the petitioner, on May 22d, presented a second amended and supplemental petition, which incorporated the earlier petitions for reorganization, and asked the court to find that the original and supplemental petitions were filed in good faith and complied with section 77B. The respondents objected. May 28th the court, after a hearing, sustained the respondents' objections and dismissed the petitions for reasons set forth in findings of fact and conclusions of law. June 11th petitioner's application to the judge of the District Court, under section 25(a) of the act, for an appeal, with supersedeas, was granted. The Circuit Court of Appeals, on respondents' motion, dismissed the appeal.
1. The respondents have moved to dismiss the writ of certiorari on the ground that the controversy has become moot. In support of the motion they show that for some time prior to the institution of the 77B proceedings the debtor's property had been in possession of a receiver appointed by a state court; that the trustee of a first mortgage had intervened in the receivership proceeding and sought foreclosure; that the state court had ordered a sale of all the debtor's property and the decree of sale had become final before the presentation of the petition for reorganization. They show that subsequent to the order of March 2d dismissing the petition for reorganization further action by the state court resulted in the confirmation of a commissioner's sale, payment of
[300
U.S. 131
, 135]
the purchase price partly in cash and partly in first mortgage bonds of the debtor and execution and delivery of a deed to the purchaser, a nominee of respondents. It appears not only that the respondents were parties to the 77B proceeding but that, prior to the consummation of the sale, the state court was fully advised of the steps taken in the federal courts and of the pendency of the petition for certiorari in this court to review the order of the Circuit Court of Appeals dismissing the appeal.
The respondents went forward with the proceedings in the state court, looking to a sale of the debtor's property, with full knowledge that a rehearing might be granted and that the order entered thereon might be appealed. They are not entitled, therefore, to rely on any status acquired in the state court suit as precluding further consideration of the petition for reorganization. The motion must accordingly be overruled.
2. The petitioner asserts that the grant or refusal of a rehearing rested in the sound discretion of the District Court and since in the proper exercise of that discretion the court entertained the application and reheard the case upon the merits, its action again dismissing the petition for reorganization was a final order and the appeal therefrom was timely. The respondents contend that the first order of dismissal having terminated the cause, and the thirty days allowed by the bankruptcy act for appeal from the order having expired, the District Court was without power to entertain a petition for rehearing and its second order of dismissal was a nullity. Wherefore they say the appeal taken more than thirty days from the date of the original order of March 2, 1936, if considered as challenging that order, was out of time, and the motion to dismiss was properly granted by the Circuit Court of Appeals. We hold the petitioner's position is sound and the appeal should have been entertained.
[300
U.S. 131
, 136]
Though a court of bankruptcy sits continuously and has no terms,7 respondents urge that, as courts of bankruptcy are courts of equity, the rules applicable to the rehearing of a suit in equity should be applied in bankruptcy cases, and as it appears the term of the District Court expired April 20, 1936, the court had lost its power to disturb the order of March 2d. A court of equity may grant a rehearing, and vacate, alter, or amend its decree, after an appeal has been perfected and after the time for appeal has expired, but not after expiration of the term at which the decree was entered.
8
It is true the bankruptcy court applies the doctrines of equity, but the fact that such a court has no terms, and sits continuously, renders inapplicable the rules with respect to the want of power in a court of equity to vacate a decree after the term at which it was entered has ended.
In the alternative the respondents argue that where, as here, an adjudication is refused, and the case is retired from the docket, the requirement that an appeal shall be perfected within thirty days from the order of dismissal deprives the court of power to reinstate and rehear the cause after the expiration of the time limited for appeal. They insist that the act contemplates the speedy disposition of causes in bankruptcy and therefore fixes a brief period for appealing from orders therein. To permit the court to rehear a cause after the time for appeal has expired, and to enter a fresh order which is appealable, would, they urge, tend unduly to extend the proceedings, create uncertainty as to the rights of the debtor and creditors, and ignore the intent of Congress.
[300
U.S. 131
, 137]
But we think the court has the power, for good reason, to revise its judgments upon seasonable application and before rights have vested on the faith of its action. Courts of law and equity have such power, limited by the expiration of the term at which the judgment or decree was entered and not by the period allowed for appeal or by the fact that an appeal has been perfected.
9
There is no controlling reason for denying a similar power to a court of bankruptcy or for limiting its exercise to the period allowed for appeal. The granting of a rehearing is within the court's sound discretion, and a refusal to entertain a motion therefor, or the refusal of the motion, if entertained, is not the subject of appeal.
10
A defeated party who applies for a rehearing and does not appeal from the judgment or decree within the time limited for so doing, takes the risk that he may lose his right of appeal, as the application for rehearing, if the court refuse to entertain it, does not extend the time for appeal.
11
Where it appears that a rehearing has been granted only for that purpose the appeal must be dismissed.
12
The court below evidently thought the case fell within this class. On the contrary, the rule which governs the case is that the bankruptcy court, in the exercise of a sound discretion, if no intervening rights will be prejudiced by its action, may grant a rehearing upon application diligently made and rehear the case upon the merits; and even though it reaffirm its former action and
[300
U.S. 131
, 138]
refuse to enter a decree different from the original one, the order entered upon rehearing is appealable and the time for appeal runs from its entry.
13
The District Court's action conformed to these conditions. Two days after the Circuit Court of Appeals dismissed the petition for allowance of appeal from the original order of March 2, 1936, petitioner notified respondents of its intention to apply for rehearing. Prompt application was made and the cause was promptly heard. A supplemental petition was presented and entered upon the files by leave of court. The original, the amended, and the supplemental petition were considered upon the merits, and the court made findings and announced conclusions of law with respect thereto. There is no indication that the petition for rehearing was not made in good faith or that the court received it for the purpose of extending petitioner's time for appeal. The court found that no rights had intervened which would render it inequitable to reconsider the merits. There was no abuse of sound discretion in granting the motion and reconsidering the cause.
The judgment is reversed and the cause is remanded to the Circuit Court of Appeals for further proceedings in conformity to this opinion. |
Q:
Abnormal rectangle block appears in marquee text with fading edge in android
Why abnormal square block appears on the edge of textview ?
when it has
Marquee enabled with fading edge.
The text view is set transparent.
TextView defination
<TextView
android:id="@+id/mytext"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_centerHorizontal="true"
android:layout_centerVertical="true"
android:ellipsize="marquee"
android:fadingEdge="horizontal"
android:text="@string/hello_world"
android:singleLine="true"
android:textSize="55sp" />
TextView property
TextView textView = (TextView) findViewById(R.id.mytext);
textView.setAlpha(0.7f);
This problem is not seen on android 4.1 but it's present on android 4.2 onwards if fading edge is enabled.
A:
After further research it was bug in android framework after uploading below change it is resolved.
https://android-review.googlesource.com/#/c/69101/
The issue is no longer appear in latest version of android.
|
.
-13
Calculate -13 - ((-8 - 14) + 13).
-4
Evaluate (-12 - -13) + -16 - (-3 + 0).
-12
Evaluate (10 + -30 - -14) + 10.
4
What is -16 + -12 + 28 - 2?
-2
What is -1 + 6 + -12 + 7 + -5 + 5?
0
What is the value of 24 - 19 - (1 + 10 - 4)?
-2
What is -5 + 4 - (-61 + 65)?
-5
Evaluate 63 + 48 + -108 + -10 + 2.
-5
Calculate 8 - (8 - 13 - -6).
7
(6 - (5 + -7) - -9) + (-2 - 4)
11
0 - 26 - (826 + -843)
-9
Evaluate (31 - 23) + (1 - -15) - -3.
27
Calculate 6 - (-1 - 8 - -23).
-8
What is the value of -6 - (-6 + 16 - 24) - 17?
-9
-6 - (6 - 8 - 10 - 3)
9
Evaluate -32 + (4 - 4) + (10 - -6) + -7.
-23
Evaluate (388 - 414) + (0 - 1 - (-1 - 0)).
-26
Evaluate (-3 - -5) + 3 + (-16 - -21).
10
Calculate -9 - -14 - 3 - -10.
12
Calculate -42 + 29 + (14 - (2 + 1)) + 4.
2
Calculate -2 + (1 + 6 - -7).
12
What is 0 - 0 - (8 - (-22 - -21))?
-9
What is the value of 8 - (5 + -3) - (-4 - 1)?
11
What is (-11 - -16) + (-1 - 6)?
-2
Evaluate 36 - (-3 + -5 + 18 + -6).
32
Evaluate -42 - (-5 - 13) - -18.
-6
11 + -3 + (-3 - -3) + -6 + 10
12
(-24 - -6 - 1) + 5 - 4
-18
Calculate -4 - (29 + -4 + -15).
-14
Evaluate -8 + -5 + 9 + -2 + -4.
-10
Evaluate (-2 - (-12 - -3)) + -6.
1
Evaluate (13 - 8) + (0 - 1).
4
What is (59 + -36 - 28) + 44?
39
What is the value of 3 - (2 + (30 - 58) + 0 + 10)?
19
What is the value of -2 + (-102 - -109 - (1 + 30)) - -6?
-20
-1 + -12 + (7 - 8 - -7)
-7
What is the value of (-39 - -18) + -7 + -1 + 0 + 6?
-23
(-6 - -11) + -5 + 8
8
-3 + 32 - (-4 + -8 - (-14 + 1))
28
Calculate 3 + 2 + -1 - (-2 + -7) - 2.
11
Evaluate -1 - (-11 - (1 + -4 + -10)).
-3
Evaluate -2 - ((-26 - -27) + (-5 - 3)).
5
-19 - (-5 + (11 - 28) - -11)
-8
What is the value of (-2 + 4 - 21) + -1135 + 1153?
-1
2 + 2 - (-8 + 16 + (-9 - 3))
8
What is (-7 - -10) + 18 + -17?
4
Calculate -30 + 17 + (-5 - 3 - -5).
-16
Calculate 13 + -3 + (1 - (4 - (-1 + 7))).
13
Calculate 9 - (-4 - (-1 - ((-3 - -1) + 5))).
9
Calculate (0 - 7) + -5 + -6 + 4.
-14
Calculate (7 - (-10 - -16)) + -5 - -10.
6
What is (34 - 18) + -1 + (-6 - -1)?
10
What is the value of 0 + -6 + 1 - ((0 - 4) + -1)?
0
Evaluate -2 + (2 - -16 - 2) - (40 + -46).
20
Calculate 24 + 13 + -67 - -28.
-2
Evaluate 17 + (10 - (10 + 20 - 8)).
5
Evaluate -3 + 3 + (-17 + 11 - 8).
-14
What is (-30 - 1) + (3644 - 3644)?
-31
What is the value of 3 - (5 + (22 - 8 - (-6 + 15)))?
-7
What is the value of -18 + (7 + 0 - -13) + -10?
-8
Evaluate (17 - 21) + 9 + -16.
-11
Calculate 0 + -3 + 3 + -2 + (6 - -13).
17
What is the value of -34 - (20 - (109 + -37))?
18
What is (-1 - (-8 - -14 - 5)) + -12?
-14
Evaluate -1 - (-3 + 3 + -6) - 15.
-10
What is 5 + -6 - (-5 + 7 - (-6 - 0))?
-9
Evaluate -1 + (-3 - (-4 + 5) - (1 - 1)).
-5
What is (16 + -14 - 6) + 13?
9
Calculate 30 - (0 + 16 - -25).
-11
Evaluate 10 - 1 - (-7 + -12 + 28).
0
Evaluate -14 + (35 - 31) - (2 + (2 - 3)).
-11
Evaluate -21 - (-2 + 3) - (-99 - -97).
-20
What is 4 - ((122 - 133) + (21 - -1))?
-7
What is 12 + (-30 - (35 + -35))?
-18
What is the value of -42 + 52 + -11 - (0 - (0 + 1))?
0
What is (-13 - -2) + -11 + 26?
4
What is the value of -8 + -13 + 6 + 8 + -7?
-14
Calculate 4 - 12 - (-1 - 12).
5
What is the value of 11 - ((25 - 17) + 4)?
-1
What is the value of -10 - (3 - ((6 - 0) + -23 + 24))?
-6
What is the value of 6 - -1 - (-7 + 6 + (-4 - -4))?
8
What is -12 - ((8 - 16) + 12 + -4)?
-12
Evaluate -24 + (23 + -8 - -6).
-3
Evaluate (-2 + 10 - 11) + -13 - -5.
-11
What is -15 + 11 + -8 + 23?
11
What is the value of -3 + 1 + -151 + 141?
-12
Calculate -1 - -2 - -3 - (-57 - -84) - 9.
-32
Calculate 12 - (7 - -3) - (-1 + 3 + 6).
-6
Evaluate 16 - ((-6 - -11) + 8).
3
-19 + (-15 - -39) - -14
19
What is the value of 7 - (-17 + 7 - -10) - (22 + -1)?
-14
What is (0 - -3) + (5 + -3 - -1 - 4)?
2
Calculate 16 - (12 - (-17 - (-23 - -17))).
-7
Evaluate -19 + (40 - (-33 - -80)).
-26
-2 + 9 + -5 - (0 + -6)
8
(0 - -4) + (6 + (-5 - -7) - 18)
-6
-16 - (-14 + -3 + 14)
-13
Calculate 38 - (9 - (-1 - -9 - (6 - 8))).
39
What is 10 + 13 + -21 - 7?
-5
What is (2 - -2) + (-14 - 3) - -23?
10
-5 + (7 + 2 + -3 - -11)
12
Evaluate -1 - (-5 - 3 - (0 - 2)).
5
What is (-562 - -532) + 15 + 0?
-15
(-22 - (2 - 11)) + (-25 - -27)
-11
Calculate -98 + 71 + (14 - 1).
-14
Calculate 3 - 6 - (-199 - -215).
-19
What is 9 - (-1 + (7 - (4 + -7)))?
0
Calculate -8 - (-17 + (12 - 14 - (-5 + -6))).
0
What is 0 - (-11 - -19 - 5)?
-3
What is the value of 3 - (74 + -81 + 0 + 1 - -9)?
0
Evaluate (4 + -9 - -5) + 3 + 0.
3
What is 22 + (0 - (-14 - -25)) + 11?
22
-1 - (7 + -9 + -12) - 12
1
Calculate -1 + -9 - ((-12 - 0) + 61 + -46).
-13
Calculate -29 + 20 - -8 - 10.
-11
-17 + -4 + 11 + 7
-3
What is the value of -4 - (-15 - -7) - 23?
-19
-25 - (-10 + 16 + -23)
-8
What is 35 - 56 - ((-8 - -3 - 0) + -1)?
-15
Evaluate (-2 + (8 - 9) - 5) + 2.
-6
Calculate (1 - -5) + -68 + 44 - (-2 - -7).
-23
What is (24 - (9 - -5)) + -15?
-5
What is (-8 - -10 - (3 - -1)) + 9 + 1?
8
What is 7 + (-1 - 3 - (76 - 88)) + 2?
17
(16 - 48) + 55 - (1 - 3)
25
Calculate -14 - ((29 - (16 - 1)) + -2).
-26
What is the value of ((-9 - -22) + -9 - 0) + -16?
-12
Evaluate (93 - 128) + 10 + 9.
-16
What is the value of 84 + -87 - (-14 - (-2 - -1))?
10
Evaluate 8 + -13 - (-1 + -5 + -8 + -3).
12
What is -3 - (16 - 10) - -1 - 1?
-9
Calculate 9 + -11 + (7 + -1 - 11).
-7
Evaluate -1 + (-10 + 13 - 0) - -10.
12
What is the value of -81 + 95 + (-47 - -12)?
-21
Calculate -20 + -4 + (5 - 7) + -1 + 0.
-27
Calculate (-8 + -14 + 27 - -1) + -12 + 1.
-5
Calculate -4 + 11 + -3 + 10 + 3.
17
Calculate -34 - (4 + -1 + (67 - 75) - 4).
-25
Evaluate -5 + (-7 - -14) + -2 - 12.
-12
7 - (2 + -9 - (-2 + (-5 - -4)))
11
Evaluate -3 + 3 - (-24 + 22).
2
Evaluate 2 + 0 - (-2 + -2) - (-738 + 743).
1
What is (2 - (-7 + 17)) + (2 - -2)?
-4
What is (0 - (-2 + 17)) + 23?
8
What is 12 - (2 + -4) - ((-7 - -16) + -7)?
12
-11 + (-53 - -51) + -2 + 0 + -3
-18
Evaluate -6 + 16 + 0 + -32 + 4.
-18
What is the value of 0 - -9 - (-15 + -1 + 52) - -8?
-19
What is -4 + 19 + -58 + 36?
-7
Calculate (2 - 2) + 2 + 6 - 5 - -3.
6
What is 18 + (-1 + 6 - 19)?
4
Calculate 1 + (-16 - -3 - -24).
12
2 - (-12 + 3 - -8 - (7 + -1))
9
What is the value of 2 - 12 - (-4 - (-9 - (-1 - 5)))?
-9
What is (569 + -576 - (-25 + -1 + 0)) + -5?
14
Calculate (12 - ((0 - (5 + -6)) + 6)) + -14.
-9
What is 0 - 3 - (-25 + 25 + 0)?
-3
Evaluate 3 + (1 - 8) + 1 + 5.
2
Calculate 11 + (-10 + 14 - 4).
11
What is 1 - (3 - (0 - -5 - (-27 - -24)))?
6
Evaluate 1 - (-17 - -7) - ((1 - 6) + 3).
13
-29 - (20 - 33 - 16)
0
-8 - (-388 + 420 + (-16 - -1))
-25
Evaluate -11 - -6 - (7 + -11 + 4).
-5
What is 4 + (-9 - -5) - ((4 - 1) + 5)?
-8
Evaluate 6 + 7 + -6 - 2 - 0.
5
What is (11 - -4) + -7 + -1?
7
What is -15 - 1 - (570 - 581)?
-5
16 + (12 + 4 - 54 - 6)
-28
Evaluate -52 - (9 + (-10 - 17) - 0).
-34
Calculate -27 - (-2 + -21) - (-1 + -7 - -1).
3
What is the value of 15 + 7 + 14 + -16?
20
What is 6 + (-19 + 2 - (12 + -18)) - -3?
-2
-2 + 10 + (-98 - -100)
10
Calculate -1 + -8 + 8 - (0 - -11).
-12
Calculate -72 + 48 + (-12 - (3 + 0)).
-39
Evaluate -23 + (10 - (11 + -13)).
-11
What is the value of 6 - (3 - (8 + -14) - 18 - -25)?
-10
12 + (-17 - (-11 - -9))
-3
What is the value of 28 + -29 - (-9 + 7 - (-1 + -5))?
-5
Evaluate 1 + 5 + -2 - (-11 - (-2 + -12)).
1
What is the value of -25 + (17 - (2 - -3)) - (-6 + -1)?
-6
-15 - (-15 + (-8 - -11))
-3
Evaluate (-3 - -30) + 452 + -454.
25
0 + 5 + -2 - (-4 + 2 + -2)
7
Evaluate -17 + 11 + -21 + 5.
-22
What is 4 - (-16 - (10 - (-7 + 22)))?
15
What is 1 + -2 - (19 + -7)?
-13
Evaluate 3 + (8 - (-3 - (-5 - (-5 - -1)))).
13
Calculate 1 - -34 - (21 - (-18 + 37 + -9)).
24
Evaluate -2 + (1 - 4) + 2 + -6 + 13.
4
Calculate (9 - 2) + -13 - (1 - -2).
-9
What is 21 - -10 - (1 - (-11 + 2))?
21
Evaluate -11 - (25 - (79 + -27)).
16
-19 + 17 + -6 - (-2 + 8)
-14
2 + -45 + 4 + (14 - -5 - 12)
-32
-273 + 274 - (4 + -27)
24
Evaluate 25 + -14 + (0 - 0).
11
What is the value of (198 - 218) + -8 + 13?
-15
Evaluate (-13 - -6 - -1) + -26 + 39.
7
Calculate (1 - 0) + -41 + 68 + -25.
3
What is the value of (3 - 0) + 0 + (5 - (-5 + 5))?
8
What is the value of (-2 - 7) + 8 - -8 - (-7 - -2)?
12
10 + 3 + 6 + -19 + 5
5
Calculate -2 - (2 + -3 + -2 + 8 + -12).
5
Evaluate (69 - 83) + -15 + -1.
-30
What is (-1 - -1) + -75 + 101?
26
3 - (-8 + 3 + -14 + 8)
14
What is the value of -3 + -1 + -3 - (-9 - -6 - -11)?
-15
What is th |
Money For Sale: 15 NBA Expiring Contracts That Could Be Moved This Season
Only in the wacky world that is the NBA is it possible to trade a player who is grossly overpaid and of absolutely no value to any team.
Why?
Because the structure of the collective bargaining agreement encourages teams to shed payroll to create salary cap space to sign a major free agent. But sometimes the only way this is possible is if they have a large amount of expiring contracts coming off the books.
That is why we see $20-plus million players like Tracy McGrady get traded even though they may not have played any significant basketball in over two seasons, often for nothing more than draft picks and other equally useless players with massive salaries. It's why the Magic were able to move Vince Carter and his $17.3 million in a blockbuster trade for Hedo Turkoglu and Jason Richardson, even though Carter's barely worth a third of that.
So in anticipation of an active NBA trading deadline, here's an early look at the 15 biggest expiring contracts that could be moved this season.
15. Caron Butler, Dallas Mavericks ($10.5 Million)
Ronald Martinez/Getty Images
The 30-year-old Butler seems to have adapted to his new role with the Dallas Mavericks quite well. The small forward is averaging 14.6 points and 4.3 rebounds per game on 45-percent shooting. He's been especially lethal from three where he is shooting 43 percent, well above his career average of 32 percent.
Butler may be the only player on this list who is earning his paycheck and the Mavericks don't really have a reason to move him unless his production falls off. Still, if Dallas wants to make a big move they'll have to surrender Butler and probably other pieces.
14. Mike Dunleavy, Indiana Pacers ($10.56 Million)
Kevin C. Cox/Getty Images
Dunleavy is a good player, but he's not an eight-figure type of player or anywhere close to one. The Pacers are going nowhere this season so Dunleavy will likely find himself in unfamiliar surroundings before the season is out.
The 6'9", 230-pound forward is averaging a respectable 12.1 points and 5.4 rebounds per game. He's regarded as a good shooter and is having another strong season by shooting 44.5 percent from the floor and 36.2 percent from three. He's not particularly athletic but creates mismatches with his size and range. Some playoff team will find a place for him in their rotation.
13. Tayshaun Prince, Detroit Pistons ($11.15 Million)
Kevin C. Cox/Getty Images
Prince has spent his entire career in a Detroit Pistons uniform and enjoyed phenomenal success. But the Pistons are a joke of a franchise these days and the 30-year-old Prince needs a change of scenery.
He's still putting up good numbers, though. The 6'9", 215-pound veteran out of Kentucky is averaging a solid 14.0 points and 4.8 rebounds per game. He's also contributing close to three assists while shooting just a shade under 50 percent from the floor and knocking down 44 percent of his threes. Prince is also a lock-down defender and could be an asset for just about any team in the NBA.
12. Eddy Curry, New York Knicks ($11.28 Million)
Al Bello/Getty Images
Curry's been overpaid seemingly since he came to the NBA nine years ago. But somehow the 7-foot, 295-pound behemoth of a man is still only 28 years old and could have several serviceable years ahead of him.
The Knicks can't wait to get rid of this guy. He's not a starter anymore and is barely getting minutes, averaging only 3.7 points and 1.9 rebounds per game. He's an excellent candidate for a salary dump to make room for New York's pursuit of Carmelo Anthony next offseason.
11. Troy Murphy, New Jersey Nets ($11.97 Million)
Marc Serota/Getty Images
Murphy was once a well-respected NBA big, but he's fallen out of favor with Nets coach Avery Johnson and now is barely getting any minutes. He's averaging just 3.5 pointsand 4.3 rebounds per game and shooting under 32 percent from the floor.
Murphy has the size (6'11", 245 pounds) and the range to be a productive player. But if he can't help New Jersey, then chances are he isn't going to help a contender either. Moving the 30-year-old for anything more than scraps will be difficult.
10. Tyson Chandler, Dallas Mavericks ($12.75 Million)
Ronald Martinez/Getty Images
The 28-year-old Chandler is still one of the best big men in the game, and he's finally getting a chance in Dallas to show everybody why. He's averaging 8.8 points, 8.9 rebounds and 1.3 blocks per game on 66.4 percent shooting.
The Mavericks have no reason to move Chandler unless they need to match salaries in a trade for someone else. They won't be able to get fair value for the big man, though, so chances are Chandler stays for the long haul.
9. Chauncey Billups, Denver Nuggets ($13.15 Million)
Streeter Lecka/Getty Images
He may be 34, but Billups is still one of the better guards in the NBA. He was great in the FIBA World Championships in Turkey and is having another good season for the Denver Nuggets, averaging 15.7 points and 5.3 assists per game.
He's not shooting the ball as well as he normally does (38 percent from the field, 37.3 percent from three), but he's still a dangerous scorer and a tenacious defender. There are several teams that could use an elite point guard, but how many can afford Billup's contract?
8. Samuel Dalembert, Sacramento Kings ($13.43 Million)
Chris Graythen/Getty Images
Dalembert is now a bench player with rookie DeMarcus Cousins playing so well, and he is one expensive bench player. He's playing about 20 minutes a game and averaging just 4.7 points and 7.2 rebounds per game.
Dalembert has never been much of a scorer but is steady on defense. He averages almost two blocks a game and is a smart defender. At 6'11", 250 pounds there are several teams that could use a veteran NBA center. But that price tag is hard to look at.
6. Peja Stojakovic, Toronto Raptors ($15.33 Million)
Stojakovic was already traded once this season, from the New Orleans Hornets to the Toronto Raptors. The 33-year-old swingman will likely be on the move again before the trading deadline.
He's not the same player he used to be, but the 6'10", 229-pound Stojakovic can still shoot the ball out of the gym. He's averaging 8.1 points per game in limited action and is shooting 48.8 percent from the floor and 48.4 percent from three. He's probably the best shooter available and could help a lot of teams.
5. Kenyon Martin, Denver Nuggets ($16.55 Million)
Ezra Shaw/Getty Images
The Denver Nuggets have a boatload of money coming off their checkbooks this upcoming offseason. Between Carmelo Anthony, Billups and Martin, the Nuggets could have more than $50 million to spend. Martin is a good player and the Nuggets would like him back at power forward next season, but not for $16 million.
The 32-year-old veteran has been struggling with a bad knee this season, but is still capable of putting up points in a hurry. He's averaging 6.0 points and 5.0 rebounds per game but his career line is closer to 14 and seven. If the Nuggets decide to blow up their team, then Martin could be the first one gone.
4. Zach Randolph, Memphis Grizzlies ($17.3 Million)
Christian Petersen/Getty Images
Randolph may be the best player on this list. Unfortunately, he's also one of the most overpaid.
The 6'9", 260-pound power forward for the Grizzlies is a force on the court. He's averaging 17.8 points, 12.6 rebounds per game, and is shooting an excellent 47.5 percent. There are few big men who can match Randolph's shooting stroke. The 29-year-old is also one of the NBA's best rebounders. Character issues are a concern but a market will definitely develop for Randolph if Memphis decides to part ways with him.
3. Yao Ming, Houston Rockets ($17.69 Million)
Jeff Gross/Getty Images
Yao Ming is out for the season, again. But that hasn't stopped teams from talking about him. The Rockets could trade Yao's massive contract and get some salary cap relief, maybe even a nice consolation prize as well.
It's unknown whether Yao will ever be back in an NBA uniform. But if he is, he's one of the best centers in the NBA with career averages of 19.0 points and 9.2 rebounds per game.
2. Andrei Kirilenko, Utah Jazz ($17.82 Million)
Kevin C. Cox/Getty Images
Kirilenko used to be one of the premier forwards in the NBA. He can't boast that title anymore, but the 29-year-old is still a very capable swingman for the Jazz. He's averaging 11.5 points, 5.2 rebounds, 2.9 assists per game and at least a steal and a block.
The Jazz are playing well and would need roughly equal value for Kirilenko for a trade to make sense. But with that kind of a contract Utah could receive several players in return that might be key in a playoff run.
1. Michael Redd, Milwaukee Bucks ($18.3 Million)
Jamie Squire/Getty Images
I don't know how much Michael Redd is worth, but I can guarantee it's nowhere close to the $18.3 million that that the Milwaukee Bucks will be paying him this season.
Still, the 31-year-old shooting guard is a good player and can help a lot of teams. He's only played in 18 games so far this year, but is averaging a respectable 11.9 points per game. Redd isn't regarded as much of a ball handler but he can score with the best of them, averaging at least 20 points per game each of the last six seasons. The Bucks have their work cut out for them to find a team able and willing to take Redd's contract off their hands. |
Epistemology & Skepticism What We Can and Cannot Know
about Absolute Realty
In epistemology (the study of knowledge - how do we know what we know? etc.), knowledge is the link between the world outside of us and the world within us. We each live inside our skulls, connected to the external world through the frail means of our sense perceptions. How can we be sure that the beliefs and opinions, shaped by our subjective experiences, are a reliable representation of what actually exists independently of our awareness? Indeed we can even question whether or not anything exists apart from our consciousness. The tenuousness and limited understanding of our grasp of reality fuels our desire for certainty, making the quest for knowledge one of the hallmarks of humanity. The universal human drive for the attainment of knowledge attests to the power and advantage of epistemic states.
In the modern era, science has provided tremendous benefits to the human condition, as well as reliable insight into the processes that produce the world around us. But what about the processes by which we know the world? Science, as usually construed, is not adequate to explore the subjective world, as science is, by definition, public and repeatable. Consciousness is, by definition, private and unique. It is the solitary nature of internal awareness which is the strongest argument for solipsism. Knowledge cannot be absorbed by any other means than subjective experience. This makes knowledge prey to the frailties and limitations of humanity.
It is from these human frailties and limitations which skepticism is born. It is our capacity for error, misunderstanding and self-delusion which calls knowledge into question. The ubiquitous struggle to achieve knowledge would indicate that knowledge does seem to exist, as does the impressive body of information compiled through cultural and scientific means, unless all of humanity is somehow deluded. If knowledge does exist, just how we can be sure our subjective interpretation of sense data is correct and accurately reflects reality? How can we really know, and know that we know, without the danger of self-delusion? As I see it, this is the heart of skepticism.
The Greatest Threat - The Representational Theory of Mind
In Descartes: The Project of Pure Inquiry, Bernard Williams explicates the main problems in the representational theory of mind. Unlike Cartesian "Evil Genius" Skepticism and Solipsism, which both doubt there is an external reality independent of the subjective experiencer, this form of skepticism assumes that there is some independently existing reality that our minds try to comprehend and represent.
The skepticism arises in the question of the accuracy of our limited subjective representations of an infinite, objective reality. This dilemma remains even if certainty is not the goal of knowledge. The existence of the gap between our minds and external reality severely hampers the authority of both our senses and our sciences. Even if the gap is small, it is still enough for error and delusion to creep in. With empiricism's credibility severally limited by human subjectivity, how can we ever be in a position to evaluate how accurately our beliefs and opinions reflect the actuality of existence?
The quest for knowledge is the search for what the cosmos is really like, independent of our minds. But a truly absolute conception of reality would entail an account of the subjective consciousness contained within it, not only because subjective critters inhabit it, but also because it is a conscious critter doing the investigating and conceptualizing. Consciousness cannot be abstracted out of a complete description of absolute reality. Any representation of absolute reality must account for subjectivity and multiple points of view if it is to avoid falling into solipsism (the belief that only I exist and you, dear reader, are a projection of my consciousness - or I am your projection...).
The representational theory of mind seeks to primarily deal with two problems:
the error problem, and
the subjectivity problem.
My interpretation of my sense data can be mistaken, my beliefs may be incorrect, or I may simply be deluded or in denial. The problem of error disconnects our minds from reality. This means that although external reality exists, I am denied access to it because I cannot traverse the gap between it and my mistaken mind. To have knowledge of reality, there must be some valid connection between the subjective self and the external reality. An accurate internalized representation of reality implies the existence of its opposite, that is, an inaccurate representation, or more simply put, error.
To have real knowledge of an objective reality, I must find an objective starting point within my subjective self, which is not liable for error, bias or delusion. But even that which we consider to be objective, is itself subject to our internal processes, which generate a gap between us and reality into which error can creep. Any human point of view is subjective- it can't be any other way. And to be subjective is to be liable to error and misconstrual. This leads to the second problem of the Representational Theory of Mind: the Problem of Subjectivity.
It seems impossible for limited, subjective creatures to truly comprehend absolute objectivity. Even if my beliefs are true, I may not believe the appropriate things. It is possible to occasionally be accurate without understanding. Even a broken clock is correct twice a day, as the old saying goes.
A conception of reality is intentional, not accidental. As long as my representation of reality can fail, there are grounds for skepticism. This bypasses the issues of certainty or evil geniuses. It is a question of whether we can formulate an idea of what exists apart from our limited monkey minds (but still inclusive of minds) that accurately reflects absolute reality.
An Absolute Conception of Reality (ACR) is itself an idea of what we suppose to exist. According to Williams, if knowledge is possible, it has to be possible to form a coherent conception of its object. This coherent concept of the absolute must also be independent of subjectivity and its constraints. An ACR is just a conception "of something." We must first get a conception of a thing, and then determine if our conception actually represents accurately what it is supposed to represent.
Williams claims that the ACR should not contain secondary properties as a primary aspect. Secondary qualities are to be included in the mental aspect of the ACR. The ACR should be a description of everything which exists-plus minds.
Although the body of theories and data produced by science is impressive, I believe Williams is mistaken in his dismissal of the threat of the Representational Theory of Mind to the question of the nature of reality. Our science could only be confirming what we are already constrained to discover by the limits of our minds. The actuality of reality could be far beyond our conceptions or comprehension. Physics allows us to make fairly reliable predictions about the world, but is this grounds to say that these predictions would hold true even without minds to make them?
The only way we have of dealing with this question is through the medium of our minds. Other cultures have had radically different conceptions of reality. Is our western empirical science true because it has amassed a lot of supporting data and all other views false because they have not? If all adherents of a world view are dead, does that mean that world view was mistaken? If a world view does not produce empirical data to bolster its concepts, does that mean it is wrong?
The Way Out
The Ancient Greeks resemble us moderns in the seriousness with which we regard skepticism. Plato, however, sidestepped a lot of the difficulties which have dogged modern epistemology. For Plato, the criteria of knowledge was not as rigorous as those applied in later eras. For Plato, knowledge consisted merely of a true belief and logos- that is, an explanation or reason in this view, understanding consists in seeing the connections between as opposed to the more contemporary search for justification and certainty. Understanding, to Plato, is a skill directed towards a body of material, not towards the truth value of a single proposition. Knowledge is the perception of how things fit together, and this skillful awareness of interconnection is what allows accomplishment. This is a very different goal than that of certainly or justification.
Plato's conception of the ideal forms served as his ACR. Plato thought the senses unreliable because the physical world is an impure mixture of all the forms. The forms (or coneptual ideals that reside in a holistic state) themselves are pure, but our world is all combined together. Multiple parts come together and our sense perception may or may not apprehend the different aspects of the combination.
But, Plato assures us that the mind can come to apprehend the pure forms through the process of reason. Under this view, mental apprehension has the potential to be more accurate than sense perception or empirical data. Apprehension of a form is a mental understanding of a pure expression, free from the contradictions and occlusions of particulars- this is what makes it knowledge, as opposed to true opinion.
This use of the forms as ACR matches at least one of Williams' criteria: that is, it is an objective view of a mind-independent reality which accounts for minds. As far as Williams' second criteria (that of accurately representing reality), that yet remains to be proven.
However, Plato's use of forms, for all the difficulties that entails, does allow for many things not included in other ACRs. Plato's forms, in their impure mixtures, allows for degrees of truth. The degree of a belief's rational coherence is equivalent to the percent of purity of form in the conception. Truth and falsehood is not always black or white in human experience. Shades of gray reflect the nearness to formal purity. Reason and the subjective apprehension of a larger order serve as the test of the truth of our beliefs.
Under Plato's position, the truth resides within us and we must refine it through the process of the dialectic. Hence, reason and introspection fill the gap between us and the ACR. I am reminded of Michelangelo's attitude toward sculpture: he believed that the finished piece of art existed inside the uncarved marble- his job was to remove what was not needed.
Likewise, the truth exists within us-but it remains for us to refine it from the raw ore of our beliefs and opinions. Of course, this view is dependent on rigorous mental training and constant internal questioning in order to determine what is true, but it put humanity in direct contact with the ACR through the medium of reason, producing knowledge.
Escaping Regress and Evil Geniuses
A Platonic view of knowledge avoids regress, as justification is unnecessary. A Platonic construal of knowledge assumes a direct connection between the cosmos and our minds. We can internally accesses the truth (provided we are trained in the process of asking ourselves the right questions), without the resort to the support of propositions.
A looser definition of knowledge, coupled with an ACR based on the forms, produces an epistemology more concerned with understanding the larger context, rather than trying to prove the truth value of a single proposition or group of propositions. E.g. skepticism is also quickly dispatched, as it relies on Cartesian dualism, which assumes an insurmountable chasm between mind and external reality. Under the Platonic model, this chasm is not only spanned, it is eliminated, as humanity holds the potential for knowledge within. Platonic knowledge is holistic and not dualistic.
Conclusion
The three main attacks of skepticism on epistemology are, at the bottom, only different facets of the same problem. All three arise from human uncertainty and fear of error. All three have a similar distrust of human mental capacities to recognize the truth. Plato not only transcends these fears and limitations, he provides the means for testing the accuracy of our representations of reality through the rigors of the dialectic.
But even if I am wrong in lumping together the three types of skepticism as one big problem, only Plato's position satisfies all three. According to the principles of parsimony, one simple solution is preferable to several more complex solutions.
Both foundationalism and coherentism are concerned with the justification of propositions, and not with any larger understanding of wider contexts. In this respect, they are dangerously shortsighted. By focusing on semantic minutiae, they ignore critical issues and risk irrelevance.
Plato's approach is not only more comprehensive, it is also more pragmatic and relevant to human experience. I recognize that Plato's theory of forms does have its share of difficulties, but it seems to me a more promising approach than any others we have explored thus far.
In the modern era, science has provided tremendous benefits to the
human condition, as well as reliable insight into the processes that
produce the world around us. But what about the processes by which we
know the world? Science, as usually construed, is not adequate to
explore the subjective world, as science is, by definition, public and
repeatable. Consciousness is, by definition, private and unique. It is
the solitary nature of internal awareness which is the strongest
argument for solipsism. Knowledge cannot be absorbed by any other means
than subjective experience. This makes knowledge prey to the frailties
and limitations of humanity.
It is from these human frailties and
limitations which skepticism is born. It is our capacity for error,
misunderstanding and self-delusion which calls knowledge into question.
The ubiquitous struggle to achieve knowledge would indicate that
knowledge does seem to exist, as does the impressive body of information
compiled through cultural and scientific means, unless all of humanity
is somehow deluded. If knowledge does exist, just how we can be sure our
subjective interpretation of sense data is correct and accurately
reflects reality? How can we really know, and know that we know, without
the danger of self-delusion? As I see it, this is the heart of
skepticism.
The Greatest Threat - The Representational Theory of Mind
In Descartes: The Project of Pure Inquiry, Bernard
Williams explicates the main problems in the representational theory of
mind. Unlike Cartesian Evil Genius Skepticism and Solipsism, which both
doubt there is an external reality independent of the subjective
experiencer, this form of skepticism assumes that there is some
independently existing reality that our minds try to comprehend and
represent.
The skepticism arises in the question of the accuracy
of our limited subjective representations of an infinite, objective
reality. This dilemma remains even if certainty is not the goal of
knowledge. The existence of the gap between our minds and external
reality severely hampers the authority of both our senses and our
sciences. Even if the gap is small, it is still enough for error and
delusion to creep in. With empiricism’s credibility severally limited by
human subjectivity, how can we ever be in a position to evaluate how
accurately our beliefs and opinions reflect the actuality of existence?
The
quest for knowledge is the search for what the cosmos is really like,
independent of our minds. But a truly absolute conception of reality
would entail an account of the subjective consciousness contained within
it, not only because subjective critters inhabit it, but also because
it is a conscious critter doing the investigating and conceptualizing.
Consciousness cannot be abstracted out of a complete description of
absolute reality. Any representation of absolute reality must account
for subjectivity and multiple points of view if it is to avoid falling
into solipsism (the belief that only I exist and you, dear reader, are a
projection of my consciousness - or I am your projection...).
The
representational theory of mind seeks to primarily deal with two
problems: 1) the error problem, and 2) the subjectivity problem.
My
interpretation of my sense data can be mistaken, my beliefs may be
incorrect, or I may simply be deluded or in denial. The problem of
error disconnects our minds from reality. This means that although
external reality exists, I am denied access to it because I cannot
traverse the gap between it and my mistaken mind. To have knowledge of
reality, there must be some valid connection between the subjective self
and the external reality. An accurate internalized representation of
reality implies the existence of its opposite, that is, an inaccurate
representation, or more simply put, error.
To have real knowledge
of an objective reality, I must find an objective starting point within
my subjective self, which is not liable for error, bias or delusion.
But even that which we consider to be objective, is itself subject to
our internal processes, which generate a gap between us and reality into
which error can creep. Any human point of view is subjective- it can’t
be any other way. And to be subjective is to be liable to error and
misconstrual. This leads to the second problem of the Representational
Theory of Mind: the Problem of Subjectivity.
It seems impossible
for limited, subjective creatures to truly comprehend absolute
objectivity. Even if my beliefs are true, I may not believe the
appropriate things. It is possible to occasionally be accurate without
understanding. Even a broken clock is correct twice a day, as the old
saying goes.
A conception of reality is intentional, not
accidental. As long as my representation of reality can fail, there are
grounds for skepticism. This bypasses the issues of certainty or evil
geniuses. It is a question of whether we can formulate an idea of what
exists apart from our limited monkey minds (but still inclusive of
minds) that accurately reflects absolute reality.
An Absolute
Conception of Reality (ACR) is itself an idea of what we suppose to
exist. According to Williams, if knowledge is possible, it has to be
possible to form a coherent conception of its object. This coherent
concept of the absolute must also be independent of subjectivity and its
constraints. An ACR is just a conception “of something.” We must first
get a conception of a thing, and then determine if our conception
actually represents accurately what it is supposed to represent.
Williams
claims that the ACR should not contain secondary properties as a
primary aspect. Secondary qualities are to be included in the mental
aspect of the ACR. The ACR should be a description of everything which
exists-plus minds.
Although the body of theories and data
produced by science is impressive, I believe Williams is mistaken in his
dismissal of the threat of the Representational Theory of Mind to the
question of the nature of reality. Our science could only be confirming
what we are already constrained to discover by the limits of our minds.
The actuality of reality could be far beyond our conceptions or
comprehension. Physics allows us to make fairly reliable predictions
about the world, but is this grounds to say that these predictions would
hold true even without minds to make them?
The only way we have
of dealing with this question is through the medium of our minds. Other
cultures have had radically different conceptions of reality. Is our
western empirical science true because it has amassed a lot of
supporting data and all other views false because they have not? If all
adherents of a world view are dead, does that mean that world view was
mistaken? If a world view does not produce empirical data to bolster its
concepts, does that mean it is wrong?
The Way Out
The Ancient Greeks resemble us moderns in the seriousness with which
we regard skepticism. Plato, however, sidestepped a lot of the
difficulties which have dogged modern epistemology. For Plato, the
criteria of knowledge was not as rigorous as those applied in later
eras. For Plato, knowledge consisted merely of a true belief and logos-
that is, an explanation or reason in this view, understanding consists
in seeing the connections between as opposed to the more contemporary
search for justification and certainty. Understanding, to Plato, is a
skill directed towards a body of material, not towards the truth value
of a single proposition. Knowledge is the perception of how things fit
together, and this skillful awareness of interconnection is what allows
accomplishment. This is a very different goal than that of certainly or
justification.
Plato’s conception of the ideal forms served as
his ACR. Plato thought the senses unreliable because the physical world
is an impure mixture of all the forms. The forms (or coneptual ideals
that reside in a holistic state) themselves are pure, but our world is
all combined together. Multiple parts come together and our sense
perception may or may not apprehend the different aspects of the
combination.
But, Plato assures us that the mind can come to
apprehend the pure forms through the process of reason. Under this view,
mental apprehension has the potential to be more accurate than sense
perception or empirical data. Apprehension of a form is a mental
understanding of a pure expression, free from the contradictions and
occlusions of particulars- this is what makes it knowledge, as opposed
to true opinion.
This use of the forms as ACR matches at least one
of Williams’ criteria: that is, it is an objective view of a
mind-independent reality which accounts for minds. As far as Williams’
second criteria (that of accurately representing reality), that yet
remains to be proven.
However, Plato’s use of forms, for all the
difficulties that entails, does allow for many things not included in
other ACRs. Plato’s forms, in their impure mixtures, allows for degrees
of truth. The degree of a belief’s rational coherence is equivalent to
the percent of purity of form in the conception. Truth and falsehood is
not always black or white in human experience. Shades of gray reflect
the nearness to formal purity. Reason and the subjective apprehension of
a larger order serve as the test of the truth of our beliefs.
Under
Plato’s position, the truth resides within us and we must refine it
through the process of the dialectic. Hence, reason and introspection
fill the gap between us and the ACR. I am reminded of Michelangelo’s
attitude toward sculpture: he believed that the finished piece of art
existed inside the uncarved marble- his job was to remove what was not
needed.
Likewise, the truth exists within us-but it remains for
us to refine it from the raw ore of our beliefs and opinions. Of
course, this view is dependent on rigorous mental training and constant
internal questioning in order to determine what is true, but it put
humanity in direct contact with the ACR through the medium of reason,
producing knowledge.
Escaping Regress and Evil Geniuses
A Platonic view of knowledge avoids regress, as justification is
unnecessary. A Platonic construal of knowledge assumes a direct
connection between the cosmos and our minds. We can internally accesses
the truth (provided we are trained in the process of asking ourselves
the right questions), without the resort to the support of propositions.
A
looser definition of knowledge, coupled with an ACR based on the forms,
produces an epistemology more concerned with understanding the larger
context, rather than trying to prove the truth value of a single
proposition or group of propositions. E.g. skepticism is also quickly
dispatched, as it relies on Cartesian dualism, which assumes an
insurmountable chasm between mind and external reality. Under the
Platonic model, this chasm is not only spanned, it is eliminated, as
humanity holds the potential for knowledge within. Platonic knowledge is
holistic and not dualistic.
Conclusion
The three main attacks of skepticism on epistemology are, at the
bottom, only different facets of the same problem. All three arise from
human uncertainty and fear of error. All three have a similar distrust
of human mental capacities to recognize the truth. Plato not only
transcends these fears and limitations, he provides the means for
testing the accuracy of our representations of reality through the
rigors of the dialectic.
But even if I am wrong in lumping
together the three types of skepticism as one big problem, only Plato’s
position satisfies all three. According to the principles of parsimony,
one simple solution is preferable to several more complex solutions.
Both
foundationalism and coherentism are concerned with the justification of
propositions, and not with any larger understanding of wider contexts.
In this respect, they are dangerously shortsighted. By focusing on
semantic minutiae, they ignore critical issues and risk irrelevance.
Plato’s
approach is not only more comprehensive, it is also more pragmatic and
relevant to human experience. I recognize that Plato’s theory of forms
does have its share of difficulties, but it seems to me a more promising
approach than any others we have explored thus far. |
KI Marine Dive Shop To Island of Mocaboc with Island Hopping Tour. It is close to the beach and small fishing village island surrounded by coral reefs, near by phantom island sand bar, is a good fishing ground and suitable for fishing.
Mocaboc Island
Island Name: Mocaboc IslandPopulation: 394Major Occupation: FishermenSea Shore Details: Near Island Rough
Coral Sand, About 200meters Shallow Coral,
North Side Beach is White SandTourist Accommodation: Class "C" Cottages
Available for Tourists PHP 1,000.00Snorkeling:B/C Shallow CoralDiving: Westside - 200 meters around
island is around 1 meter depth, drop-off with a
depth of 50 meters.Distance Estimate Travel Time: 1 hour
from MaribagoAttraction: Shallow CoralComments: Less Tourist in the Area Due to
Isolated Island and Small Cottage. Good only for BBQ and Snorkeling.Now no one maintenace 8/11 |
<?php
// This file is part of Moodle - http://moodle.org/
//
// Moodle is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Moodle is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Moodle. If not, see <http://www.gnu.org/licenses/>.
/**
* Definition of dropbox repository scheduled tasks.
*
* @package repository_dropbox
* @copyright 2019 Simey Lameze <simey@moodle.com>
* @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
*/
defined('MOODLE_INTERNAL') || die();
$tasks = array(
array(
'classname' => '\repository_dropbox\task\cron_task',
'blocking' => 0,
'minute' => '*',
'hour' => '*',
'day' => '*',
'month' => '*',
'dayofweek' => '*'
)
);
|
"KARA:" "When I was a child, my planet Krypton was dying." "I was sent to Earth to protect my cousin." "But my pod got knocked off-course and by the time I got here, my cousin had already grown up and become Superman." "And so, I hid my powers, until recently when an accident forced me to reveal myself to the world." "To most people I'm an assistant at Catco Worldwide Media." "But in secret, I work with my adoptive sister for the DEO to protect my city from alien life and anyone else that means to cause it harm." "I am Supergirl." "KARA:" "Previously on Supergirl..." "I've seen this picture." "It won a Pulitzer." "He actually posed for that." "I guess he likes me." "You're Jimmy Olsen." " He knows." " He knows?" "What if people figure out who you are?" "It's not safe." "MAXWELL ON TV:" "Forget about Supergirl's lack of experience," "national City does not need problems." " Who cares what that guy says?" " You do." "Isn't maxwell Lord your hero?" "CAT:" "I want a sit down with Supergirl." "Or the Planet gets their beloved photojournalist back." "Ms. Grant, your interview with Supergirl's already started." "Let's talk." "It's you." "Oh, no." "I'm sorry." "I meant to say, who are you?" "According to you, I'm Supergirl." "Trademark pending." "You have questions." "I'm ready to answer them." "Huh." "Do you mind if I record this?" "I suppose not." "Okay." "Supergirl." "Let's start with the generals." "Where are you from?" "I traveled to Earth from my home planet of..." " Krypton?" " SUPERGIRL:" "Yes." "When it was destroyed." "My parents sent me here where they thought I'd be safe." "(SIGHS) I feel like I've heard this story before." "This is my story." "So, I can assume that all of your powers are the same as the Man of Steel's?" "The flying, the super strength, the freezy breath thing?" "I'm still working on that last one." "Oh, so you're not up to his level yet?" "I wouldn't say that." "So, why are we just hearing from you now?" "I'm not sure I understand the question." "(SIGHS) Well, if you've been on Earth for years, why wait this long to start giving back?" "Where were you during the earthquake two years ago?" "Or the wildfires last September that killed eight people?" "This is not a job I take lightly." "I had to be ready." "Any plans to start a family?" "Nobody ever asks my cousin these questions." " Superman is your cousin?" " This interview is over." "Well, what do you do all day when you're not flying around town?" "Do you have a day job'?" "Mmm." "Mmm." "Thank you." "How can you eat sticky buns for breakfast every day and still stay so thin?" " I'm an alien." "(CHUCKLES)" " Hi." " Hey." "Are you okay?" "I called you like a bunch of times last night." "Where were you?" "I think I fell asleep last night." "Yesterday was a pretty long day." " Morning!" "HEY" " Hey." "Uh, what are you doing here?" "Oh, this is the only place that makes this really hard to find drink I like, tea." "(LAUGHING)" " That's really funny." "That's funny." "(JAMES CHUCKLES)" "Um, Alex, you remember, um, James Olsen?" " My friend from work." " Yeah." "How's the covert alien hunting business?" "Not as covert as we would prefer." "I didn't tell him." "Look, it's okay." "I can be trusted with a big secret." "Well, I hope you'lI extend the same courtesy to my sister." "Always." " Meet up back at the office?" " Yes." " Great seeing you, Alex." " Hmm." " What?" " You like Jimmy Olsen." "Stop it." "Um, first of all, he prefers James." " ALEX:" "Oh." " Mmm-hmm." " Okay." " Second, we're just friends." "(ALEX CHUCKLES)" " Just friends." "Please, you were looking at him like he was one of your sticky buns." "And seriously, you have got to stop telling people who you really are." "The less people know about Supergirl, the better." " WOMAN ON TV:" "In a shocker..." " Right." "...of a news item today..." "Cat Grant, CEO of Catco Media, is reporting that SupergirI and Superman are in fact related." "Kara?" "REPORTER:" "No one has been able to identify who or rather what she is." "Ah." "Interesting choice mentioning that in an interview." "Isn't that a little dangerous?" "I didn't mean to." "I got confused and it just popped out." "She..." "She tricked me." "She's like a villain." "She's like a super interviewing villain." "That is literally the most boring power ever." "CAT:" "Ker-rah!" "(SIGHS)" " Good morning, Ms. Grant." "lt's a big day for journalism." "The Daily Planet can suck it." " I scooped them." " Yes, I..." "I heard." "You told everyone that Supergirl and Superman are cousins." "Do you think maybe she might've kind of wanted that on the down low?" "Bulletproof." "Uh." "Are you asking me if I'm bullet" "Bulletproof Coffee." "It's made from unsalted grass-fed butter with an extract of coconut oil that improves brain energy." "I will need a cup of it every hour." "Crappy coffee has toxins in it that will rob me of my creativity and my vigor." "I'm going to need both if I am going to write a kick-ass exposé on Supergirl." "You're writing it?" " Yourself?" "I'm a writer." "It's like riding a bike, or severe childhood trauma." "You never really lose it." "And I must be pretty decent at it because... (CHUCKLES)" "We will be publishing a special issue of our monthly magazine, the day after tomorrow." "It is going to make that Caitlyn Jenner Vanity Fair look like a Penny Saver pullout." "We need a big party to launch it." "Throw something together." "Uh, a thousand guests." " Rent out a museum or something." " Um..." "And move Dave out there to another desk." "I find his hair distracting." "Um, Dave, I need a favor." "The story is spreading like wildfire across social media." "(BREATHING HEAVILY)" " Cat Grant's latest exclusive on national City's mysterious new arrival, Supergirl." "Everyone has questions about the so-called girl of Steel, and this first and only interview is promising answers, including intimate details about who she is, where she's from and what she's doing here." "(SUIT POWERING UP)" "It also confirms her relationship to the Man of steel himself." "That they are, indeed, cousins." "Cousins." "Have you lost your mind?" "What were you thinking giving interviews?" "I wouldn't say it was an interview exactly." "It was more of a private conversation that's being published." "What's next?" "A book deal?" "A reality show?" "Keeping Up with the Kryptonians?" " So, he's mad?" "lt's hard to tell with him." "Why did you give that interview?" " At first, I did it for James." " Oh, that explains it." "But I also did it for me." "I'm still trying to figure out what SupergirI means." "Guess I just thought talking to Ms. Grant would give me some perspective." "(SIGHS)" "Everybody wonders who they are at some point in their lives." "You're gonna figure it out, Kara." "You always have." "(ALARM BEEPING)" "VASQUEZ:" "Sir, we have a Code Gray." "It's coming from the NCH." "Looks like a multiple car collision." "Highway patrol officers and medical personnel are en route." "No sign of alien activity." "We're clear." "Run a thermal scan to be sure." "And Miss Danvers, next time you're thinking of talking to the press..." "She's excited." "It's her first pile-up." "Supergirl, the driver's still inside, she can't get out." "WOMAN: (SCREAMS) Help!" "(SUPERGIRI GRUNTS)" " Somebody!" "(CROWD MURMURING)" "(GASPING)" "I'm stuck." "lt's okay, I've got you, I've got you." "Thank you." "(SUPERGIRI SHOUTS)" "(CROWD EXCLAIMS)" "(ALI CLAMORING)" "Who are you?" "I'm just a ghost." "What do you want?" "I want the Man of steel to suffer." "I want him to know what it feels like to lose everything." "Starting with you." "(GRUNTS)" "(GROANS)" "(BREATHING HEAVILY)" "HANK HENSHAW: "Reactron" "At least that's what the Daily Planet colorfully dubbed him when he showed up in Metropolis a few years back." "Reactron?" "That's kind of a stupid name." "Who named him that?" " Jimmy Olsen." " Oh." " So, who is this guy really?" " HANK HENSHAW:" "Unknown." "He remains at large after a string of very public fights with your cousin." "Neither of them ever came out on top." "And no one knows why he's so obsessed with killing Superman." "So, what's the plan?" "How do we stop him?" "We don't." "So what are you saying?" "We just sit back and do nothing?" "Reactron, whoever he is, is human." "Which means this case falls outside the DEO's jurisdiction." "This man flies and shoots nuclear fireballs." "How is that not extra-normal?" "He's using advanced biomedical tech." "Man-made tech." "HANK HENSHAW:" "I can't risk exposing this organization every time some human criminal shows up at national City." "And I just can't let this man run wild." "HANK HENSHAW:" "call your cousin." "Superman fights for truth, justice and the American way." "Last time I checked, national City was in America." "KARA:" "Ms. Grant?" "(CHUCKLES) I'm just..." "I'm putting the finishing touches on that party," "and I need your okay on..." " Shh, shh, shh." "Do you hear that?" "(SILENCE)" "Uh, no." "You don't you hear that loud, high pitched, incessant humming coming from the vents that is making it impossible for me to think straight, let alone string together one coherent sentence?" "I have pretty good ears, and I don't hear anything." "Well, get maintenance to look into it because it's driving me crazy." "Sure thing, I'lI get them right on it." "I just need you to approve the appetizers for tomorrow." "Ker-rah, I am very proud of the fact that in my many years of being a CEO" "I have never thrown a phone at an assistant." "I would very much like to keep that record intact." "I'lI take care of it." "JAMES:" "She's pretty tense working on that article, huh?" "Yeah." "You could say that." "She always get like this when she's writing?" "People have been known to schedule their vacations around it." "(CHUCKLES)" " WINN:" "Psst." "Psst." "Why are you doing that?" "We're standing right here." "Follow me and act natural." "(ELEVATOR BELI DINGS)" "(ELEVATOR BELI DINGS)" " Where are you taking us?" " To your new office." "I think Ms. Grant prefers me to be within yelling distance." "WINN:" "Oh, no." "Not for that job." "For our other job." "This used to be Ed Flaherty's office from Actuaries but after he died of a heart attack behind his desk, nobody wants it." "Which makes it perfect for our needs." "Now, we can't just crowd around your desk every time we want to talk SupergirI stuff." "So, I loaded this office up with some, uh, state-of-the-art, top-of-the-line tech." "Winn, I can't believe you did all this for me." "Um, believe it. (CHUCKLES)" "Okay, so for our first mission, supergirl vs. Reactron." "(KEYBOARD CLACKING) -(KARA GASPING)" "Okay, so his true identity remains a mystery." "Right?" "We know Superman has fought him multiple times over the years." " KARA:" "Right." " I know." "I was there." "How could I forget?" "Anyway, he shoots these highly concentrated" " Bursts of nuclear energy." " From his gauntlets." "Uh, his chest plate provides an increase in strength" "and flight." " Yeah." "Now, I've written an algorithm that will sweep the city for any variable changes in radiation." "And maybe, we can use this to find him." "(CHUCKLES)" "And then what?" "And then Kara goes all SupergirI on him." "Kara, you might consider calling your cousin on this one." "I've seen what Reactron can do." "James, if I call for help now, I'm done." "We're done." "Every villain out there will think of national City as an easy target." " He nearly killed Clark once." " Clark?" "(STAMMERING) Clark Kent is Superman?" "(CLEARS THROAT) I'm just trying to keep you safe." "And, yes, I appreciate that." "But of all the things the "S" stands for," "safety is not one of them." " Clark Kent is Superman." " Winn..." "Winn." " Sorry, I can't..." "I'm still trying to figure out what being SupergirI means." "Who I am." "And now I know." "I'm not Superman's cousin." "I'm Supergirl." "And if I'm going to be defined, it's going to be by my victories and my losses." "No one else's." "I guess stubbornness runs in the family." "When I was a kid, I had a train with blue streaks." "Coolest toy I ever had." "(ALI CHUCKLING)" "I know a train that magnetically levitates is inherently cool, but still, the color's kind of bumming me out." "Let's paint blue streaks." "And while we're at it, it needs to go 500 kilometers an hour." "We've been working for three years, you know, to push it to 450." "The test is in six days." "Then it probably occurred to you over the last 36 months that if you used Hafnium instead of a Tungsten alloy in the vacuum tubes, you could decrease the weight of each car by 30 kilos" "(INHALES SHARPLY) and get it to 500." "But carl over there will see the job to the finish." "You can go." "You're done." " Mr. Lord..." " I said you're done." "(SIGHS)" " Keep up the good work, everyone." "(MACHINE WHIRRING)" "This train is a gift for national City." "To get people out of their gas guzzlers and accepting of clean, affordable transportation, it has to be perfect." "(LOUD EXPLOSION)" "(WOMAN SCREAMS)" "(GUARDS GROANING)" "Hello." "I'm looking for someone with a background in nuclear fission." "No volunteers?" "How about you?" "Stop!" "It's okay." "Everyone keep calm." "It's gonna be all right." "You don't need to hurt anyone." "(COUGHING)" "I need this man." "From the looks of things, what you need is a mechanical genius." "Compared to me, that guy's a dope." "Don't take him." "Take me." "Once again, Lord Technologies has been the target of an attack by the criminal known as Reactron." "is everyone all right?" "Mr. Lord." "He's been taken." "It's been 24 hours since tech billionaire, maxwell Lord, was abducted from his research facility by the Metropolis-based criminal known as Reactron." "Authorities still will not speculate whether Mr. Lord ls alive or dead." "KARA:" "Yes, yes, I'm still here." "Yes, Ms. Grant wants all of the hostesses dressed as Supergirl." "Right, red, blue, the" "Thank you." "This isn't on you, Kara." "I have to find this man." "How am I supposed to do that?" "With my help." "Do you have someplace private we can talk?" "Do we ever." "I used the DEO satellite to scan the highway where you fought Reactron." "And I was able to isolate the nuclear signature of his weapons system." "It's powered by Thorium 232" "which can only be found in one place." "(KEYBOARD CLACKING)" "(BEEPING)" " Bakerline Nuclear Power Station." " I remember this." "Terrorists tried to start a full-on meltdown like five years ago," "but then" " Superman stopped them." "Yeah, he prevented the core from going into overload." "Saved millions of people." "But two reactor engineers were killed when the facility was flooded with radiation." "Ben and Alyssa Krull." "They were married." "Ben KrulI is Reactron." "Yeah, he somehow survived the radiation exposure." "That's why he hates my cousin." "He blames him for the death of his wife." "But Superman still managed to prevent an American Chernobyl." "Chernobyl." "That gives me an idea on how we might find Krull." "(SPUTTERING)" "My housekeeper does a bang-up job on my penthouse." "Pretty sure she could get this place all shiny in a jiff." "(BREATHING HEAVILY) Do you see what's wrong?" "(SIGHS)" "The moderator's been damaged which is preventing neutron speed reduction." "It's clear you're sick." "Respiratory distress, the skin desquamation and ulcering." "How much radiation were you exposed to?" "More than enough to kill me." "How about we go back to my lab?" "Let my team analyze your case." "Find a way for you to regain a normal life." "I had a normal life." "(BREATHING HEAVILY)" "It didn't work out." "You're gonna repair my suit (GROANS) or they're gonna start building memorials to you." "Fine." "I'lI need Thorium, Cesium-137," "TributyI phosphate and a Dr. Pepper." "That last one's for me." "I'm thirsty." "Mmm." "I finished proofing the SupergirI article." "Please begin my compliments." "Well, uh, the writing is..." "The writing is beautiful." "Lyrical." "The kind of story they make you read in journalism school." "I distinctly heard a slight uplilt, which suggests a hesitation, a vacillation, and maybe an ambivalence?" "Isn't the tone kind of..." "A little nasty?" "(KARA GASPS)" "Uh, I mean, the headline." "Um, okay. "millennial Falcon."" ""Every Generation Gets the Superhero it Deserves."" "SupergirI didn't tell you how old she is." "How do you know she's a millennial?" "Well, if she's not, then I want the name of her surgeon." "What about this passage?" "Um..." ""SupergirI embodies the worst traits of her generation." ""The earnestness without purpose," ""the unshakable belief that she has a right to be heard," ""even when she has nothing to say."" "That is a magnificent point." "I transcribed your interview." "She's not like this." " You've taken her out of context." " I have given her context." "I hate to break it to you, but the world is tough." "What is she going to do when she has to face a real threat?" "Oh, I know, she'lI call her cousin." "Just like every other millennial who calls Mommy and Daddy the second things don't go their way." " She won't do that." " How do you know that?" "I think..." "I think maybe what she's trying to say is that when people are scared or hurt or in danger, they think of Superman." "But that it's okay to think of her too, and not just as some consolation prize." "She is every bit the hero he is." "She just needs the chance to prove it." "Well, I guess we'lI find out." "(DOOR OPENING)" " Sorry to interrupt." "Kara, it's the florist." "Uh, for the party." "Right." "I should probably handle that." " Winn found Krull." " What?" "How?" "There was a black mold that grew in the town of Chernobyl right after the meltdown." "Now, Winn found the same mold here in national City." "At a junkyard, 60 miles south." "tell Ms. Grant I'm putting the finishing touches on the party." "Kara." "Kara, just wait." "Wait." "Just get Lord out of there." "You don't have to take on Krull, too." "KrulI is not some crazed alien." "He's a human being." "Who's been hurt enough." "That's something my cousin never knew." "And that's why I'm gonna go talk to him, the way I would want someone to talk to me." "And if he doesn't want to talk?" "Then I'lI punch him real hard until he falls down." "That always seems to work." "(SOFTLY) Kara." "(AIR WHOOSHING)" "I'm not here to fight you." "I know who you are." "I know why you hate my cousin." "I know what you've lost, too." " You look taller on TV." " Where is he?" "He forced me to repair his suit." "I don't know where he is." "(SUPERGIRI GRUNTS)" "Get out of here." "Go!" "Ben, I don't think your wife would want you hurting anyone." "Ben KrulI is dead." "Superman saw to that." "Now he's gonna lose someone too." "(GRUNTS)" "(SHOUTING IN PAIN)" "(GRUNTING)" " And after you die..." "(GROANING) ...your city dies too." "(GROANS)" "(GROANS)" "(AIR WHOOSHING)" "(GASPS)" "Kara?" "Kara." "Hey." "Easy, easy, easy." "You're okay." "(SUPERGIRI BREATHING HEAVILY)" " SUPERGIRL:" "How long was I out?" " Just a few hours." "I was fighting Krull." " My cousin, where is he?" " He had to go." "Volcanic eruption in the South Pacific." "MAXWELL: (ON TV) Reactron is a great danger to everyone in this city." "Luckily, I wasn't harmed." "In fact, I'm lucky to be alive." "And I owe it all to the great hero who rescued me." "Superman." "I don't understand." "How did he know that I was fighting Krull?" " You called him." " Kara, he gave me this a long time ago." "If I ever got in trouble, I could contact him." "But you weren't in trouble." "When did you even call him?" "The second I left?" "Kara, I made a promise to your cousin." "If anything ever happened to you" "My cousin didn't have a "get out of a jam free" card when he first started." "Neither should I." "It feels like you don't believe in me." "Of course, I believe in you." "I wouldn't even be here if I didn't believe in you." "Maybe you shouldn't be here at all." "You know what, Kara?" "I'm sorry that you're mad at me." "But I'm not sorry you're still alive." "(DOOR OPENING)" "(DOOR CLOSES) -(SIGHS)" "(SNIFFLES)" " He was just protecting you." " I know, I know. lt's just..." "It wasn't supposed to be this way." "This is the reason my mother and father sent me to Earth." " They wanted you to live, Kara." " No, it's more than that." "I was supposed to be the one saving him, not the other way around." "How am I supposed to really become a hero if Superman has to keep saving me?" "Your story..." "Your story is just starting." "And someday, you're gonna be the one saving him." "(SIGHS) Oh, God!" "I..." "I have to be at Cat's party, like, now." "Like 10 minutes ago, now." "I don't have my dress." "Yes, I figured you would not have the time so, I borrowed one from the DEO closet." "Urn, not that you really need it, but..." "It is bulletproof." "(EXHALES)" "(MUSIC PLAYING)" "Oh, um..." "You don't fool me." "You're late." "I noticed because there was no one mumbling and shuffling three paces behind me." "I'm sorry." " Where are the magazines?" "(STAMMERING)" " The paper ones?" "The ones that can be framed?" "Right, the magazine." "Uh, the truth is," "Kara is probably just a little foggy because she was up all night autographing the magazines with the author's name." "Ah, it's as if I thought of it myself, Ker-rah." " Oh, my God, Winn, you just saved my life." "(WINN CHUCKLES)" "I owe you big time." "Well, you could, um, repay your debt right now." "Dance with me?" "(CHUCKLING) Sure." "(INDISTINCT CONVERSATION)" "(WOMAN LAUGHING)" "maxwell Lord." "Kidnapped one minute, rubbing elbows the next." " I'm surprised you came." " Cat Grant." "You're talking to the same guy who launched a top-selling tablet hours after surviving an avalanche on Everest." "Cocktails after a kidnapping?" "Tsk." "Breeze." "Are we dancing?" "CAT:" "Look at you." "all dressed up in your big boy suit." "Like James Bond making a living" "playing with toy trains." "(MAXWELI CHUCKLES)" "MAXWELL:" "So tell me." "How did you manage to get an exclusive with Supergirl?" "girl knows power when she sees it." "She flew right to me." "Are you going to tell me how you pulled it off?" "Or am I gonna have to get sneaky?" "You're very sexy, Max, but, as I recall, you're big on promises, but not much else." "Oh, look at the time." "Nothing says "powerful" more than leaving your own party early." "Alex." "(DOOR CLOSING)" " Director Henshaw." " Agent Danvers, what are you doing?" "I'm helping Kara to stop Reactron." "It's been increasingly difficult for you to follow orders since your sister flew onto the scene." "When you asked me to join the DEO, I didn't hesitate." "Because you told me that together we were going to save the world." "Except saving the world means everybody." "Aliens, humans, I can't separate them anymore." "Especially when my little sister's life is at stake." "Who else knows about this?" "No one." "Good." "Wouldn't want them getting any ideas." "So, how do we defeat this Reactron?" "(MUSIC PLAYING)" "KARA:" "No, wait." "Oh, my God!" "(LAUGHING)" "Yes, it's happening, girl!" "(KARA LAUGHING)" "KARA: (CHUCKLING) Okay." " It's..." " Do you mind if I cut in?" "It's fine, Winn." " Look, I don't like how we left things." " Yeah, neither do I." "Me pressing that button on my watch had nothing to do with you." "It was me." "I call him when things get tough." "I always have." "That's part of the reason I left Metropolis." "My safety net became my reflex." "I press that button when I get scared." "And I was scared that I was going to lose you." "(CHUCKLES)" "I really like that you care about me." "But you have to care enough to let me fly my own path, separate from his." "And trust that I'm going to save the day." "Kara, you are amazing." "You leap into the sky, headfirst into danger." "And you don't seem scared of falling." "Hmm, what's so bad about falling?" "(GLASS SHATTERING)" "(CROWD SCREAMING)" "Where is Supergirl?" "I'm going to slip into something more durable." " Do not do anything stupid." " No promises." "Don't suppose my fixing your nuke suit earns me a hall pass?" "(SUIT POWERING UP)" "(AIR WHOOSHING)" "(GRUNTS)" "Twice in two days." "I should put you on the payroll as a bodyguard." "Get somewhere safe." "Good idea." "I am sorry for what happened to you." "But you are going to jail." "I'm sure one day, I will." "(BREATHES HEAVILY)" "But you won't live to see it." "(GROANS)" "JAMES:" "Hey, Krull." "Krull." "Know who I am?" "Jimmy Olsen." "I'm the closest thing Superman has to a best friend." "You wanna see him hurt?" "Killing me would do that." "Come on." "Kara, we may have a way for you to stop Krull." "Krull's chest unit is powered by a Demon Core," "a subcritical mass of plutonium." " If you can remove it from his suit, it should shut down his weaponry." "But the core will melt down the very moment it's freed from its containment matrix." "There has to be some way to stop him without nuking the city." "You need to encase the core in lead before you rip it free." "Lead." "(GROANS)" "(INDISTINCT SCREAMING)" "(BOTH GRUNT)" "(SUPERGIRI GROANING)" "(GROANS)" "(BOTH GRUNTING)" "(STRAINING)" "(GASPING)" "(SUIT POWERING DOWN)" "You could have been killed." "No." "I knew you'd save the day." "(CHUCKLES)" "Thank you for your help." "Both of you." "Something tells me this isn't the last non-alien you'lI be taking on." "And since the threat of federal prison doesn't stop your sister disobeying my orders," "I guess in the future, we'lI just have to help SupergirI again." "Told you he'd come around on rne." "So, what does the girl of Steel do to celebrate after saving the day?" "Um..." "How about the Danvers sisters take in a movie tonight?" "Or, how about you go find a certain ex-photojournalist with a penchant for tight shirts who makes you smile more than anyone else I've ever seen do?" "Yeah, that." "(GIGGLING)" "Hey, James, do you have a minute?" "I wanted to ask..." "I'm sorry." "I didn't know you weren't..." "Kara, this is Lucy Lane." " Hey, it's nice to meet you, Kara." " Nice to meet you." "Lane." "Any relation?" "Yes." "Lois is my big sister." "Oh, I have one of those too." "(CHUCKLES)" "(INHALES SHARPLY)" "Uh, I'lI catch up with you later, Kara." "Sorry." "Bye." "I can't do this right now." "LUCY:" "Metropolis isn't around the corner, Jimmy." " I came a long way to see you." " And why did you?" "I didn't like the way we ended things." "Could we just get dinner?" "And talk?" "Yeah, sure." "Dinner." " Hey, you okay?" " Fine, yeah, fine." "Hey, you want to go down to our, uh," "(WHISPERING) our secret office, do some super sleuthing?" "Actually, I have a lot of work to do." "Maybe later?" "(LAPTOP BEEPING)" "(CHUCKLES)" "Thanks, Clark." "It means a lot to me." " No James Olsen tonight, huh?" " No, not tonight." "Pass me that last pot sticker." "Uh, no." "That one is mine." "You had four." "If that pot sticker is not in my mouth in two seconds, I will melt your face." " I hope you get fat." "(CHUCKLING) Not on this planet." "So, guess what I picked up on the way." "Did you actually read the article?" "Because she says horrible things about me." "Very well-crafted horrible things." "Deep beneath that seething disdain she respects you." " Really?" " Mmm-hmm." "Supergirl, I mean." "Her assistant, no, she couldn't give a rip about." " Oh, God." "(KARA LAUGHS)" "Right in the face." "(LAUGHING)" "Well, look, you should be proud of yourself." "I mean, you're doing things that Superman couldn't even do." "Well, I may not need Superman to be a hero, but," "I will always need you." "(SIREN BLARING)" "Isn't that your cue?" "(GRUNTS) Do not watch Homeland until I get back." "There's no promises." "English" " SDH" |
/*
* Default implementation for backend initialization from commandline.
*
* Copyright (C) 2011-2012 Lluís Vilanova <vilanova@ac.upc.edu>
*
* This work is licensed under the terms of the GNU GPL, version 2. See
* the COPYING file in the top-level directory.
*/
#include "trace/control.h"
void trace_print_events(FILE *stream, fprintf_function stream_printf)
{
fprintf(stderr, "warning: "
"cannot print the trace events with the current backend\n");
stream_printf(stream, "error: "
"operation not supported with the current backend\n");
}
void trace_event_set_state_dynamic_backend(TraceEvent *ev, bool state)
{
fprintf(stderr, "warning: "
"cannot set the state of a trace event with the current backend\n");
}
bool trace_backend_init(const char *events, const char *file)
{
if (events) {
fprintf(stderr, "error: -trace events=...: "
"option not supported by the selected tracing backend\n");
return false;
}
if (file) {
fprintf(stderr, "error: -trace file=...: "
"option not supported by the selected tracing backend\n");
return false;
}
return true;
}
|
Dr. Ben Carson speaks with 'Breitbart News Daily' host Alex Marlow about his trip to Detroit with Donald Trump planned for Saturday. He says Trump will emphasize the importance of education reform in addition to economics.
"Detroit is the perfect place to talk about it," Carson said. "Because it was once the most prosperous city in America, and from there it has gone and become the biggest bankrupcty after decades of progressive leadership. That should tell anyone --Democrat, Republican, Independent-- that there is something wrong with the course that we are on. We really need to stop and do something different."
"The definition of insanity is doing the same thing and expecting a different result. We need to stop being insane and start exercising common sense." |
Parallax
"A foreign land is a land of wolves"
Grisha
Description:
A nightmare of a Nomad that all garrison soldiers have heard of. He’s known for using guerrilla tactics and killing people before they can be aware of him. He’s responsible for the massacre of Garrison Red and he stole all the hands from all the soldiers there. He’s known to the Necromancers and will help them if asked. He is working with Ciar on the rebellion and seems not to get along with him. He is very attached to Soreza. While he has a fearsome reputation, he also seems to be quite friendly in person. He is also responsible for Arka’s rescue from Garrison Yellow. |
Kerry Sherman
Kerry Sherman (born Katherine O'Rene MacDonald, October 4, 1953, in Los Angeles, United States) is an American actress. She played Amy Perkins Wallace on the NBC soap opera Santa Barbara from 1984 to 1986.
Background
Sherman grew up in Hawaii. Her parents were Ray McDonald, a dancer and actor, and Peggy Ryan. Her father Ray died when she was young. She was not concerned with becoming an actress. Later she attended University of Hawaii for a period of time. She thought she may try a career as a veterinarian but the thought of cutting up small animals wasn't appealing to her. She worked as a stewardess for a short time, then later she thought about acting.
Career
1970s
Her earliest role was as Coline, in the "Bionic Boy" episode of The Six Million Dollar Man which aired on November 7, 1976. She played the girlfriend of the Bionic Boy (played by Vincent van Patten). The following year, she played the part of Patti in the exploitation film, Satan's Cheerleaders which was directed by Greydon Clark and starred John Ireland, Yvonne De Carlo, Jack Kruschen and John Carradine. She also appeared in a Barnaby Jones episode, "Gang War". In 1978, she played the part of Barbara in the Lou Grant episode "Hero" which also starred Marlene Warfield, Hazel Medina, Lola Mason and Jim McMullan. In 1979, she played the role of Cathy Ferguson, in the "How the west was won"'s first episode of season 3rd.
1980s
In 1982, she was in the hit movie, 48 Hrs. which starred Nick Nolte and Eddie Murphy.
In 1983, she appeared as Margaret Buchanan in the Avery Crounse directed period supernatural film, Eyes of Fire which starred Dennis Lipscomb.
She created the role of Amy Perkins on the NBC soap opera, Santa Barbara. She played that role from 1984 to 1986.
In 1988, she appeared in The Perfect Match, a romantic comedy about a man and woman pretending to be people they are not. It starred Marc McClure, Rob Paulsen, Jennifer Edwards, Wayne Woodson, Karen Witter, and was directed by Mark Deimel.
Filmography
References
External links
Category:American television actresses
Category:American soap opera actresses
Category:Actresses from Los Angeles
Category:Living people
Category:1953 births |
Q:
Why Lagrange multipliers don't help to find the minimum of $f(x,y)=x^2+y^2$ with the constraint $y=1$?
Please help me understand why the following doesn't work.
Say I want to find the minimum of the function $f(x,y)=x^2+y^2$ with the constraint $y=1$. So I declare the helper function $g(x,y)=(y-1)^2=0$. And by using the Lagrange multipliers method, what I get is $F=x^2+y^2+\lambda(y-1)^2, F_x=2x, F_y=2y+2\lambda(y-1)$ and
\begin{cases}
2x=0\\
2y+2\lambda(y-1)=0\\
(y-1)^2=0.
\end{cases}
The above has no solutions, although obviously $(0, 1)$ is a minimum value.
A:
One of the requirements of the method is that $\nabla g \not= 0$ on the surface $g(x,y) = 0$. But in your case $\nabla g(x,y) = (0,2(y-1))$ which is zero at every point on the surface $(y-1)^2 = 0$.
Moral of the story: use $g(x,y) = y-1$ instead.
|
1. Field of the Invention
The invention relates to electronic circuits and in particular to the condensed packaging of printed electronic circuits. The invention finds particular, but not exclusive application to the packaging of memory circuits in a circuit assembly.
2. Description of the Related Art
The trend in manufacturing of electronic equipment is to reduce the physical size of electronic circuits and electronic components while at the same time improving their performance and capability. Conventionally, electronic circuits, such as electronic memory circuits, have been mounted on rigid boards. This has meant that applications requiring a large amount of circuitry have also been mounted on large rigid boards which occupy a large amount of volume within the housing unit. The housing unit is the external cover of a computer or other electronic apparatus.
All electronic circuits generate heat while in operation and require cooling to keep them at optimum working conditions. Very often the cooling of circuit components is only achieved by the addition of further elements such as a heatsink block to conduct heat away from the components. Heatsink blocks also tend to occupy large volumes of space within housing units.
The compact packaging of electronic circuits is not easily achieved because of the considerations which have to be made to cool the circuit components. |
---
abstract: 'Ohm’s law is one of the most central transport rules stating that the total resistance of sequential single resistances is additive. Here we test additivity of resistances in classical systems of interacting colloids driven over two energetic barriers in a microchannel, using real-space microscopy experiments, particle-resolved simulations, and dynamical density functional theory. If the barrier separation is comparable to the particle correlation length, the resistance is highly non-additive, such that the added resistance of the second barrier can be significantly higher or lower than that of the first. Surprisingly, for a barrier separation comparable to the particle interaction range, the second barrier can add a [*negative*]{} resistance, such that two identical barriers are easier to cross than a single one. We explain our results in terms of the structuring of particles trapped between the barriers.'
author:
- Urs Zimmermann
- Hartmut Löwen
- Christian Kreuter
- Artur Erbe
- Paul Leiderer
- Frank Smallenburg
title: Negative resistance for colloids driven over two barriers in a microchannel
---
One of the basic characteristics of any transport situation is the resistance, commonly known from electric circuits, which is in general defined as the ratio of the transport flux and the driving force, typically in the linear-response regime of small drives. For both electric circuits and classical transport, Ohm’s law states that when resistors are put in series, their resistances simply add up. However, this macroscopic law is expected to break down on the microscopic scale, in particular when the distance between the two obstacles approaches the correlation length of the transported particles.
Knowing and controlling flow resistance is of particular importance when tuning the transport of solutes through channels. This type of transport is the basic situation in microfluidics [@micro], where the transported objects are typically micron-sized colloidal solutes, such that thermal fluctuations play a significant role [@Marchesoni_Haenggi_RMP]. Moreover, there are many other examples where individual “particles” (or agents) are propagating through channels. Examples include macroscopic objects like cars or pedestrians [@Helbing_review], animals [@animals] and bacteria [@PhysRevLett.101.018102; @Wensink_PNAS_2012; @Wensink_HL_PRE_2008] migrating collectively through channels, and the transport of ions through membranes via nanopores [@dzubiella2005electric]. Obstacles in such channels naturally inhibit the overall steady-state rate at which the particles are able to traverse the channel, providing an effective resistance to the flow. In channels with multiple obstacles, we expect Ohmic (i.e. additive) behavior of the corresponding resistances when the separation between the obstacles is large, and a breakdown of Ohm’s law for smaller distances. The crossover between these regimes is determined by the correlation length in the system, i.e. the length scale associated with local structure in the fluid of transported particles. Detailed knowledge of these non-additive effects is of vital importance for the design of efficient microfluidic devices, as well as for our broader understanding of constricted flow phenomena.
In this Letter, we explore the additivity of resistances in mesoscopic colloidal suspensions driven through a microchannel [@Microchannels_I]. We first perform an experiment on repulsive colloidal particles confined to microchannels containing two step-like barriers on the substrate, and measure the current through the channels as a function of the strength of the gravitational driving force. Subsequently, we employ Brownian dynamics simulations and dynamical density functional theory to systematically explore the interplay between the two barriers. Our results show strong deviations from additivity for the resistance of two barriers when the separation between the two obstacles is comparable to the correlation length of the system, which is on the order of several interparticle spacings. Amazingly, if the barrier separation is comparable to the interaction range, we discover that the resistance contributed by the second barrier can even be [*negative*]{}. We explain this counterintuitive effect of negative resistance via the long-ranged particle interactions and the ordering of the particles trapped between the two barriers. When these particles are disordered, they exhibit spontaneous fluctuations which modulate their interactions with particles crossing the barriers, significantly enhancing barrier crossing rates [@stein1989mean; @pechukas1994rates]. This surprising phenomenon provides a route for tuning and enhancing particle flow over an obstacle by the inclusion of additional barriers, reminiscent of the use of geometric obstacles to assist e.g. the flow of panicked crowds [@shiwakoti2013enhancing].
In our experiment, colloidal superparamagnetic particles are confined in a microchannel with obstacles, prepared using molds made via microlithography [@Microchannels_I; @PDMS], see Fig. \[fig:experiment\]. The experimental cell consists of two rectangular reservoirs, connected by multiple channels (to improve statistics). The colloidal particles are restricted to two-dimensional in-plane motion due to gravity. In each channel up to two U–shaped step-like barrier structures are implemented perpendicular to the channel, for details see Supplemental Material [@SI]. A uniform external magnetic field $\mathbf{B}_\text{ext}$ is applied in the direction perpendicular to the plane in which the particles move. This magnetic field induces purely repulsive interactions between the colloidal particles.
We measure the particle current in the channel as a function of the gravitational driving force, controlled by the tilt angle of the setup, for channels with zero, one, and two barriers. In the absence of barriers, the current shows a trivial linear dependence on the driving force, shown by the blue line in Fig. \[fig:experiment\]d. For a single barrier (green line in Fig. \[fig:experiment\]d), we observe a crossover from a zero-flow regime at small driving forces (where the driving force is too weak to push particles across the barrier) to an approximately linear regime for large driving forces [@Microchannels_I]. Hence, the barrier provides a resistance to the flow, which reduces the particle current. Adding a second barrier to a channel results in a clear non-additivity of the resistance of the two barriers. In particular, for two barriers separated by approximately 2.5 times the typical interparticle distance (red line in Fig. \[fig:experiment\]), the second barrier has a much stronger effect on the total particle current than the first one, indicating a higher effective resistance.
![a) Schematic setup of the experiment: two particle reservoirs are connected by a microfluidic channel through which particles are flowing due to gravity. b) Top view of the experimental system. c) Snapshots of a two barrier system for different times. The position of the barriers is indicated by a red vertical line. Two particles are highlighted in red and green. d) Flux as a function of tilt angle in a system with no barriers (blue line), single barrier (green line) and double barriers (red line). The initial density was $\rho_0 = (7.23 \pm 0.5)\times 10^{-3} \mu\text{m}^{-2}$, and the external field strength was $0.6$ mT. The separation between the two barriers was $30 \mu$m. []{data-label="fig:experiment"}](fig1.pdf){width="0.9\linewidth"}
To explore this non-additivity in detail, we make use of overdamped Brownian dynamics simulations and dynamical density functional theory (DDFT) calculations. We consider a two-dimensional system with periodic boundary conditions along the channel ($x$-direction), containing $N$ particles interacting via a dipolar repulsion $$\beta V_\text{int}(r) = \Gamma \left(\frac{a}{r}\right)^3,$$ where $\beta = 1 / k_B T$ with $k_B$ Boltzmann’s constant and $T$ the temperature, $\Gamma$ is the dimensionless interaction strength, and $a=\rho_0^{-1/2}$ sets the length scale of a typical interparticle spacing of a given mean number density $\rho_0$. The particles additionally experience a constant driving force $F \hat{\mathbf{x}}$ pushing the particles along the channel.
The confining channel and barriers are modeled as an external potential $V_\text{ext}(x,y) = V_\text{channel}(y) + V_{\text{barrier}}(x)$. The first term here is a steep repulsive wall potential confining the particles in one direction. $V_\text{barrier}$ represents one or two parabola-shaped potential barriers with width $a$ and height $V_0 = 10 \, k_\text{B}T$, see Fig. \[fig:Rplots\]b inset and Supplemental Material [@SI]. We choose the channel width $L_y = 4.65 a$, and the channel length $L_x$ such that the total number density $\rho_0 = N / (L_x L_y) = 1/a^{2}$ for a given particle number $N$.
In our DDFT calculations [@DDFT_Tarazona; @DDFT_Evans], we choose the Ramakrishnan–Yussouff functional [@RY_functional] to model interacting particles in a fluid state ($\Gamma = 5$). In addition to DDFT, we perform Brownian Dynamics simulations of particles experiencing the same potentials and external driving force. As a reference we provide an analytical solution for non-interacting particles ($\Gamma=0$). See Supplemental Material [@SI] for details.
Using both DDFT and simulations, we explore the relation between the total steady-state particle current $J$ along the channel, the driving force $F$ on the particles, and the distance $\Delta x$ between the two barriers. The ratio of the driving force and current characterizes the total resistance of the system, ${R^\text{tot}}= \frac{F}{J}$. In a channel without barriers, the particles trivially adopt the average drift current $J_0 = F \rho_0 L_y \xi^{-1}$, where $\xi$ is the friction coefficient of the background solvent, leading to an inherent background resistance ${R_\text{bg}}= \xi / (L_y\rho_0)$. In a single-barrier system, the resistance $R_1$ added by the barrier can be extracted from the total resistance ${R^\text{tot}}_{\mathrm{s}}= {R_\text{bg}}+ R_1$ by measuring the single-barrier current $J_{\mathrm{s}}$: $$\begin{aligned}
R_1 = {R^\text{tot}}_{\mathrm{s}}- {R_\text{bg}}= F\left(\frac{1}{J_{\mathrm{s}}} - \frac{1}{J_0}\right).\end{aligned}$$ Similarly, in a double-barrier system (with current $J_{\mathrm{d}}$), the total resistance is ${R^\text{tot}}_{\mathrm{d}}= {R_\text{bg}}+ R_1 + R_2$, and the effective resistance of the second barrier $R_2$ can be written as $$\begin{aligned}
R_2 = F\left(\frac{1}{J_{\mathrm{d}}} - \frac{1}{J_{\mathrm{s}}}\right).\end{aligned}$$ In the case of additivity, the resistance $R_2$ of the second barrier will be equal to $R_1$ (the resistance of the first barrier), while deviations from this rule will indicate non-additivity.
In Fig. \[fig:Rplots\], we plot $R_2/R_1$ for a range of barrier separations $\Delta x$ at different driving forces $F$, as obtained from analytical theory [@SI] (a), DDFT calculations (b), and computer simulations (c). For non-interacting particles $R_2$ is lowest when the two barriers are touching ($\Delta x = a$) and converges exponentially to $R_1$ for larger distances. In contrast, for interacting particles and for all investigated $F$, the resistance of the second barrier is highest at $\Delta x = a$. At this separation the resistance added by the second barrier can be many times higher than $R_1$, signaling strong non-additivity. More interestingly, for slightly larger separations ($\Delta x \simeq 1.5 a$), $R_2$ becomes smaller than $R_1$, and even negative for sufficiently weak driving forces. In this regime, the addition of the second barrier [*reduces*]{} the overall resistance in the channel. At larger $\Delta x$, $R_2$ shows decaying oscillations, converging towards the additive case ($R_2 = R_1$), as expected at sufficiently large distances.
![(Color online) Effective resistance $R_2$ of the second barrier relative to the resistance $R_1$ of the first barrier, as a function of the barrier spacing $\Delta x$, at different driving forces. The dashed lines highlight special values of $R_2$: the gray line shows Ohmic additivity and the red line marks the onset of negative effective resistance. Results are shown for analytical theory [@SI] at $\Gamma=0$ (a), DDFT at $\Gamma = 5$ (b), and simulations at $\Gamma = 5$ (c). A sketch of the barrier configuration is shown in inset b.[]{data-label="fig:Rplots"}](fig2.pdf "fig:"){width="0.8\linewidth"}\
We can understand this observation by considering the interactions between the particles. Since these are dipolar in nature, they are sufficiently long-ranged to span across the barrier. Hence, a particle on top of the barrier experiences forces from particles between the two barriers, which depend on the density and structuring of those particles. In Fig. \[fig:densprofs\] we plot the density profile of the particles $\rho_x(x)$, projected onto the long axis of the channel, for various barrier separations $\Delta x$, as well as for a single barrier. In the single-barrier case, we always observe a high density peak in front of the barrier, and a slightly lower peak just after the barrier (see Fig. \[fig:densprofs\]a). In the two-barrier cases, the additional peaks in between the two barriers vary in height based on $\Delta x$. For very small separations (Fig. \[fig:densprofs\]b), where the resistance of the second barrier is high ($R_2 > R_1$), we find a single sharp density peak between the barriers, which is significantly higher than the peak observed after a single barrier. Here, particles between the barriers are arranged in a single line with little room for fluctuations, and hence provide a strong and relatively constant force on particles crossing the first barrier, pushing them back. In the regime where $R_2 < R_1$ (Fig. \[fig:densprofs\]c), we instead see two much lower peaks, indicating a structure with two layers and significantly larger fluctuations. These larger fluctuations not only provide space for particles entering via the first barrier, but also modulate the force exerted on particles crossing the barriers, resulting in a fluctuating effective barrier height. For weak driving forces, barrier crossings are rare events, whose rate depends exponentially on the barrier height. Fluctuations in barrier height are known to lead to significantly higher crossing rates [@stein1989mean; @pechukas1994rates] and hence higher currents. Finally, for larger separations, where $R_2 > R_1$ again, we observe two higher peaks, indicating a more structured pair of layers between the barriers.
We confirm this intuitive picture by plotting in Fig. \[fig:peaks\] the relative height of the first peak after the first barrier $\delta \rho^\mathrm{peak} = \rho_{\mathrm{d}}^\mathrm{peak} / \rho_{\mathrm{s}}^\mathrm{peak}$, where $\rho_{\mathrm{s}}^\mathrm{peak}$ is the height of the first peak after a single barrier, and $\rho_{\mathrm{d}}^\mathrm{peak}$ is the height of the first peak after the first of two barriers. When plotted as a function of $\Delta x$, the peak height (blue in Fig. \[fig:peaks\]) indeed strongly correlates with the particle current (red) in both the DDFT framework and the simulations. In our particle-resolved simulations, the additional fluctuations of the particles in between the two barriers are clearly visible. Moreover, examining simulation trajectories demonstrates that for most barrier separations, whenever a particle crosses the first barrier, the sudden increase in density between the barriers typically leads to the rapid expulsion of a particle over the second barrier. This observation confirms that the first of the two barriers can indeed be considered as the main bottleneck for the overall flow process. However, for $\Delta x \lesssim 1.3$, the bottleneck is instead the crossing of the [*second*]{} barrier. Here, particles form a single narrow layer between the two barriers, which inhibits the possibility of collectively pushing a particle across the second barrier. This may explain the reduced correlation between $\delta \rho_\mathrm{peak}$ and $R_2 / R_1$ for small $\Delta x$ in Fig. \[fig:peaks\].
![ Local density profiles as a function of distance along the channel at the same interaction strength ($\Gamma = 5$) and driving force $F = 0.1 k_B T / a$, as obtained via DDFT. From top to bottom, we show a system with a single barrier, and systems with two barriers at separations $\Delta x / a = 1.0, 1.5$, and $2.0$. []{data-label="fig:densprofs"}](fig3.pdf){width="0.95\linewidth"}
![Height of the first density peak after the first barrier (normalized by the height of the peak after a single barrier) as a function of barrier separation at fixed driving force $F = 0.1 k_BT / a$ and interaction strength $\Gamma = 5$, as obtained from DDFT (top) and simulations (bottom).[]{data-label="fig:peaks"}](fig4.pdf){width="0.95\linewidth"}
In conclusion, we have explored the effect of sequential potential energy barriers on the flow of colloidal particles driven through microchannels. As our experiment shows, two barriers close together can result in drastically higher resistance than twice the resistance of a single barrier. Moreover, via a detailed investigation of this non-additivity using both simulations and dynamical density functional theory, we discover that depending on the barrier spacing, the second barrier can add an effective resistance that is higher than the resistance of a single barrier, lower, or even negative. In the negative regime, the presence of the second barrier helps particles cross the first barrier, contrary to what intuition would suggest. We show that this enhanced barrier-crossing rate can be attributed to the structuring of the layer of particles in between the two barriers: weaker structuring (evidenced by lower peaks in the density profile) increase the current. A vital component for this phenomenon is the requirement that particles on top of the barriers can still interact with the particles aggregated just before and after that barrier, necessitating sufficiently long-ranged interactions. Indeed, preliminary simulations show a clear reduction of the observed non-additivity when the barrier is wider in comparison to the interaction range. As a second requirement, the density should be high enough to enable significant ordering of particles. In the confined region between the barriers, the ordering will depend sensitively on the ratio of the barrier spacing $\Delta x$ and the preferred spacing between neighboring layers of particles, as long as $\Delta x$ is small compared to the correlation length in the system. Similar confinement effects have shown to result in oscillatory behavior in forces between plates or spheres immersed in a background of smaller particles [@roth2000depletion]. Interestingly, the effect of negative resistance is reminiscent of the interplay between reflecting barriers in quantum-mechanical systems, where interference is known to lead to enhanced transmission for certain barrier spacings, as used in e.g. Fabry-Perot interferometers [@vaughan1989fabry].
The sensitivity of the resistance to the barrier separation and microscopic particle interactions provide a method to tailor and control flow through channels [@lindner_schimanskygeier_prl2002; @gernert_klapp_pre2015; @carusela_rubi_jcp2017] or porous media [@spanner_franosch_prl2016]. Interestingly, [*geometric*]{} obstacles have similarly been shown to enhance flow [@alonso2012bottlenecks], as applied in e.g. the design of emergency exits [@tanimoto2010study; @shiwakoti2013enhancing]. However, in these cases, enhanced flow rate is typically observed when the added obstacle is placed [*before*]{} the bottleneck, rather than behind it.
The possibility of mitigating a flow-resisting barrier by placing another barrier behind it might have important implications in microfluidic devices. Moreover, the specificity of this approach to relatively long-ranged interactions suggests an opportunity for separating different particle species, or enhanced flow control via external fields modifying the interactions. Further applications include the directed transport of strongly charged dust particles in a plasma [@Morfill] and congestions in granulates [@granulates], as well as jammed flow situations of colloids [@kanehl_stark_prl2017], or agents through constrictions [@Liu_Nagel_Nature]. In particular, a jammed situation near an obstacle may be avoided by adding further obstacles. An interesting question for future research is whether the effective total resistance could be further tuned by using a combination of three, four, or an infinite number of obstacles [@siems_nielaba_pre2015] (forming e.g. a ratchet [@Haenggi; @evstigneev2009interaction]), or by using barriers of differing heights.
We gratefully acknowledge funding from the German Research Foundation (DFG) within project LO 418/19-1. We thank Arjun Yodh, Laura Filion, and Marco Heinen for helpful discussions.
[10]{}
T. M. Squires and S. R. Quake, Rev. Mod. Phys. [**77**]{}, 977 (2005).
P. H[ä]{}nggi, P. Talkner, and M. Borkovec, Rev. Mod. Phys. [**62**]{}, 251 (1990).
D. Helbing, Rev. Mod. Phys. [**73**]{}, 1067 (2001).
D. J. T. Sumpter, Phil. Trans. R. Soc. B [**361**]{}, 5 (2006).
M. B. Wan, C. J. Olson Reichhardt, Z. Nussinov, and C. Reichhardt, Phys. Rev. Lett. [**101**]{}, 018102 (2008).
H. H. Wensink, J. Dunkel, S. Heidenreich, K. Drescher, R. E. Goldstein, H. L[ö]{}wen, and J. M. Yeomans, Proc. Natl. Acad. Sci. USA [**109**]{}, 14308 (2012).
H. H. Wensink and H. L[ö]{}wen, Phys. Rev. E [**78**]{}, 031409 (2008).
J. Dzubiella and J.-P. Hansen, J. Chem. Phys. [**122**]{}, 234706 (2005).
C. Kreuter, U. Siems, P. Henseler, P. Nielaba, P. Leiderer, and A. Erbe, J. Phys.: Condens. Matter [**24**]{}, 464120 (2012).
D. L. Stein, R. G. Palmer, J. L. Van Hemmen, and C. R. Doering, Phys. Lett. A [**136**]{}, 353 (1989).
P. Pechukas and P. H[ä]{}nggi, Phys. Rev. Lett. [**73**]{}, 2772 (1994).
N. Shiwakoti and M. Sarvi, Transp. Res. Part C: Emerg. Technol. [**37**]{}, 260 (2013).
J. R. Anderson, D. T. Chiu, H. Wu, O. J. Schueller, and G. M. Whitesides, Electrophoresis [**21**]{}, 27 (2000).
See Supplemental Material at xxx for additional details on the experimental setup, model, DDFT calculations, analytic theory, and simulations.
U. M. B. Marconi and P. Tarazona, J. Chem. Phys. [**110**]{}, 8032 (1999).
A. J. Archer and R. Evans, J. Chem. Phys. [**121**]{}, 4246 (2004).
T. V. Ramakrishnan and M. Yussouff, Phys. Rev. B [**19**]{}, 2775 (1979).
R. Roth, R. Evans, and S. Dietrich, Phys. Rev. E [**62**]{}, 5360 (2000).
M. Vaughan, [*The Fabry-Perot Interferometer: History, Theory, Practice and Applications*]{}, [*Series in Optics and Optoelectronics*]{} (Taylor & Francis, New York (USA), 1989).
B. Lindner and L. Schimansky-Geier, Phys. Rev. Lett. [**89**]{}, 230602 (2002).
R. Gernert and S. H. L. Klapp, Phys. Rev. E [**92**]{}, 022132 (2015).
M. F. Carusela and J. M. Rubí, J. Chem. Phys. [**146**]{}, 184901 (2017).
M. Spanner, F. Höfling, S. C. Kapfer, K. R. Mecke, G. E. Schröder-Turk, and T. Franosch, Phys. Rev. Lett. [**116**]{}, 060601 (2016).
F. Alonso-Marroquin, S. I. Azeezullah, S. A. Galindo-Torres, and L. M. Olsen-Kettle, Phys. Rev. E [**85**]{}, 020301 (2012).
J. Tanimoto, A. Hagishima, and Y. Tanaka, Physica A [**389**]{}, 5611 (2010).
G. E. Morfill and A. V. Ivlev, Rev. Mod. Phys. [**81**]{}, 1353 (2009).
I. Zuriguel, A. Garcimart[í]{}n, D. Maza, L. A. Pugnaloni, and J. M. Pastor, Phys. Rev. E [**71**]{}, 051303 (2005).
P. Kanehl and H. Stark, Phys. Rev. Lett. [**119**]{}, 018002 (2017).
A. J. Liu and S. R. Nagel, Nature [**396**]{}, 21 (1998).
U. Siems and P. Nielaba, Phys. Rev. E [**91**]{}, 022313 (2015).
P. H[ä]{}nggi, F. Marchesoni, and F. Nori, Ann. Phys. [**14**]{}, 51 (2005).
M. Evstigneev, S. von Gehlen, and P. Reimann, Phys. Rev. E [**79**]{}, 011116 (2009).
|
Wealth inequality is escalating at an alarming rate not only within the U.S. but also in countries as diverse as Russia, India and Brazil. According to investment bank Credit Suisse, the fraction of global household wealth held by the richest 1 percent of the world's population increased from 42.5 to 47.2 percent between the financial crisis of 2008 and 2018. To put it another way, as of 2010, 388 individuals possessed as much household wealth as the lower half of the world's population combined—about 3.5 billion people; today Oxfam estimates that number as 26. Statistics from almost all nations that measure wealth in their household surveys indicate that it is becoming increasingly concentrated.
Although the origins of inequality are hotly debated, an approach developed by physicists and mathematicians, including my group at Tufts University, suggests they have long been hiding in plain sight—in a well-known quirk of arithmetic. This method uses models of wealth distribution collectively known as agent-based, which begin with an individual transaction between two “agents” or actors, each trying to optimize his or her own financial outcome. In the modern world, nothing could seem more fair or natural than two people deciding to exchange goods, agreeing on a price and shaking hands. Indeed, the seeming stability of an economic system arising from this balance of supply and demand among individual actors is regarded as a pinnacle of Enlightenment thinking—to the extent that many people have come to conflate the free market with the notion of freedom itself. Our deceptively simple mathematical models, which are based on voluntary transactions, suggest, however, that it is time for a serious reexamination of this idea.
In particular, the affine wealth model (called thus because of its mathematical properties) can describe wealth distribution among households in diverse developed countries with exquisite precision while revealing a subtle asymmetry that tends to concentrate wealth. We believe that this purely analytical approach, which resembles an x-ray in that it is used not so much to represent the messiness of the real world as to strip it away and reveal the underlying skeleton, provides deep insight into the forces acting to increase poverty and inequality today.
Oligarchy
In 1986 social scientist John Angle first described the movement and distribution of wealth as arising from pairwise transactions among a collection of “economic agents,” which could be individuals, households, companies, funds or other entities. By the turn of the century physicists Slava Ispolatov, Pavel L. Krapivsky and Sidney Redner, then all working together at Boston University, as well as Adrian Drgulescu, now at Constellation Energy Group, and Victor Yakovenko of the University of Maryland, had demonstrated that these agent-based models could be analyzed with the tools of statistical physics, leading to rapid advances in our understanding of their behavior. As it turns out, many such models find wealth moving inexorably from one agent to another—even if they are based on fair exchanges between equal actors. In 2002 Anirban Chakraborti, then at the Saha Institute of Nuclear Physics in Kolkata, India, introduced what came to be known as the yard sale model, called thus because it has certain features of real one-on-one economic transactions. He also used numerical simulations to demonstrate that it inexorably concentrated wealth, resulting in oligarchy.
Credit: Brown Bird Design
To understand how this happens, suppose you are in a casino and are invited to play a game. You must place some ante—say, $100—on a table, and a fair coin will be flipped. If the coin comes up heads, the house will pay you 20 percent of what you have on the table, resulting in $120 on the table. If the coin comes up tails, the house will take 17 percent of what you have on the table, resulting in $83 left on the table. You can keep your money on the table for as many flips of the coin as you would like (without ever adding to or subtracting from it). Each time you play, you will win 20 percent of what is on the table if the coin comes up heads, and you will lose 17 percent of it if the coin comes up tails. Should you agree to play this game?
You might construct two arguments, both rather persuasive, to help you decide what to do. You may think, “I have a probability of ½ of gaining $20 and a probability of ½ of losing $17. My expected gain is therefore:
½ x ($20) + ½ x (-$17) = $1.50
which is positive. In other words, my odds of winning and losing are even, but my gain if I win will be greater than my loss if I lose.” From this perspective it seems advantageous to play this game.
Or, like a chess player, you might think further: “What if I stay for 10 flips of the coin? A likely outcome is that five of them will come up heads and that the other five will come up tails. Each time heads comes up, my ante is multiplied by 1.2. Each time tails comes up, my ante is multiplied by 0.83. After five wins and five losses in any order, the amount of money remaining on the table will be:
1.2 x 1.2 x 1.2 x 1.2 x 1.2 x 0.83 x 0.83 x 0.83 x 0.83 x 0.83 x $100 = $98.02
so I will have lost about $2 of my original $100 ante.” With a bit more work you can confirm that it would take about 93 wins to compensate for 91 losses. From this perspective it seems disadvantageous to play this game.
The contradiction between the two arguments presented here may seem surprising at first, but it is well known in probability and finance. Its connection with wealth inequality is less familiar, however. To extend the casino metaphor to the movement of wealth in an (exceedingly simplified) economy, let us imagine a system of 1,000 individuals who engage in pairwise exchanges with one another. Let each begin with some initial wealth, which could be exactly equal. Choose two agents at random and have them transact, then do the same with another two, and so on. In other words, this model assumes sequential transactions between randomly chosen pairs of agents. Our plan is to conduct millions or billions of such transactions in our population of 1,000 and see how the wealth ultimately gets distributed.
What should a single transaction between a pair of agents look like? People have a natural aversion to going broke, so we assume that the amount at stake, which we call Δω (Δω is pronounced “delta w”), is a mere fraction of the wealth of the poorer person, Shauna. That way, even if Shauna loses in a transaction with Eric, the richer person, the amount she loses is always less than her own total wealth. This is not an unreasonable assumption and in fact captures a self-imposed limitation that most people instinctively observe in their economic life. To begin with—just because these numbers are familiar to us—let us suppose Δω is 20 percent of Shauna's wealth, ω, if she wins and –17 percent of ω if she loses. (Our actual model assumes that the win and loss percentages are equal, but the general outcome still holds. Moreover, increasing or decreasing Δω will just extend the time scale so that more transactions will be required before we can see the ultimate result, which will remain unaltered.)
If our goal is to model a fair and stable market economy, we ought to begin by assuming that nobody has an advantage of any kind, so let us decide the direction in which w is moved by the flip of a fair coin. If the coin comes up heads, Shauna gets 20 percent of her wealth from Eric; if the coin comes up tails, she must give 17 percent of it to Eric. Now randomly choose another pair of agents from the total of 1,000 and do it again. In fact, go ahead and do this a million times or a billion times. What happens?
If you simulate this economy, a variant of the yard sale model, you will get a remarkable result: after a large number of transactions, one agent ends up as an “oligarch” holding practically all the wealth of the economy, and the other 999 end up with virtually nothing. It does not matter how much wealth people started with. It does not matter that all the coin flips were absolutely fair. It does not matter that the poorer agent's expected outcome was positive in each transaction, whereas that of the richer agent was negative. Any single agent in this economy could have become the oligarch—in fact, all had equal odds if they began with equal wealth. In that sense, there was equality of opportunity. But only one of them did become the oligarch, and all the others saw their average wealth decrease toward zero as they conducted more and more transactions. To add insult to injury, the lower someone's wealth ranking, the faster the decrease.
This outcome is especially surprising because it holds even if all the agents started off with identical wealth and were treated symmetrically. Physicists describe phenomena of this kind as “symmetry breaking” [see The Physics of Inequality below]. The very first coin flip transfers money from one agent to another, setting up an imbalance between the two. And once we have some variance in wealth, however minute, succeeding transactions will systematically move a “trickle” of wealth upward from poorer agents to richer ones, amplifying inequality until the system reaches a state of oligarchy.
If the economy is unequal to begin with, the poorest agent's wealth will probably decrease the fastest. Where does it go? It must go to wealthier agents because there are no poorer agents. Things are not much better for the second-poorest agent. In the long run, all participants in this economy except for the very richest one will see their wealth decay exponentially. In separate papers in 2015 my colleagues and I at Tufts University and Christophe Chorro of Université Panthéon-Sorbonne provided mathematical proofs of the outcome that Chakraborti's simulations had uncovered—that the yard sale model moves wealth inexorably from one side to the other.
Does this mean that poorer agents never win or that richer agents never lose? Certainly not. Once again, the setup resembles a casino—you win some and you lose some, but the longer you stay in the casino, the more likely you are to lose. The free market is essentially a casino that you can never leave. When the trickle of wealth described earlier, flowing from poor to rich in each transaction, is multiplied by 7.7 billion people in the world conducting countless transactions every year, the trickle becomes a torrent. Inequality inevitably grows more pronounced because of the collective effects of enormous numbers of seemingly innocuous but subtly biased transactions.
The Condensation of Wealth
You might, of course, wonder how this model, even if mathematically accurate, has anything to do with reality. After all, it describes an entirely unstable economy that inevitably degenerates to complete oligarchy, and there are no complete oligarchies in the world. It is true that, by itself, the yard sale model is unable to explain empirical wealth distributions. To address this deficiency, my group has refined it in three ways to make it more realistic.
In 2017 Adrian Devitt-Lee, Merek Johnson, Jie Li, Jeremy Marcq, Hongyan Wang and I, all at Tufts, incorporated the redistribution of wealth. In keeping with the simplicity desirable in applied mathematics models, we did this by having each agent take a step toward the mean wealth in the society after each transaction. The size of the step was some fraction χ (or “chi”) of his or her distance from the mean. This is equivalent to a flat wealth tax for the wealthy (with tax rate χ per unit time) and a complementary subsidy for the poor. In effect, it transfers wealth from those above the mean to those below it. We found that this simple modification stabilized the wealth distribution so that oligarchy no longer resulted. And astonishingly, it enabled our model to match empirical data on U.S. and European wealth distribution between 1989 and 2016 to better than 2 percent. The single parameter χ seems to subsume a host of real-world taxes and subsidies that would be too messy to include separately in a skeletal model such as this one.
Credit: Jen Christiansen
In addition, it is well documented that the wealthy enjoy systemic economic advantages such as lower interest rates on loans and better financial advice, whereas the poor suffer systemic economic disadvantages such as payday lenders and a lack of time to shop for the best prices. As James Baldwin once observed, “Anyone who has ever struggled with poverty knows how extremely expensive it is to be poor.” Accordingly, in the same paper mentioned above, we factored in what we call wealth-attained advantage. We biased the coin flip in favor of the wealthier individual by an amount proportional to a new parameter, ζ (or “zeta”), times the wealth difference divided by the mean wealth. This rather simple refinement, which serves as a proxy for a multitude of biases favoring the wealthy, improved agreement between the model and the upper tail of actual wealth distributions.
The inclusion of wealth-related bias also yields—and gives a precise mathematical definition to—the phenomenon of partial oligarchy. Whenever the influence of wealth-attained advantage exceeds that of redistribution (more precisely, whenever ζ exceeds χ), a vanishingly small fraction of people will possess a finite fraction, 1 − χ/ζ, of societal wealth. The onset of partial oligarchy is in fact a phase transition for another model of economic transactions, as first described in 2000 by physicists Jean-Philippe Bouchaud, now at École Polytechnique, and Marc Mézard of the École Normale Supérieure. In our model, when ζ is less than χ, the system has only one stable state with no oligarchy; when ζ exceeds χ, a new, oligarchical state appears and becomes the stable state [see graphic above]. The two-parameter (χ and ζ) extended yard sale model thus obtained can match empirical data on U.S. and European wealth distribution between 1989 and 2016 to within 1 to 2 percent.
Such a phase transition may have played a crucial role in the condensation of wealth following the breakup of the Soviet Union in 1991. The imposition of what was called shock therapy economics on the former states of the U.S.S.R. resulted in a dramatic decrease of wealth redistribution (that is, decreasing χ) by their governments and a concomitant jump in wealth-attained advantage (increasing ζ) from the combined effects of sudden privatization and deregulation. The resulting decrease of the “temperature” χ/ζ threw the countries into a wealth-condensed state, so that formerly communist countries became partial oligarchies almost overnight. To the present day at least 10 of the 15 former Soviet republics can be accurately described as oligarchies.
As a third refinement, in 2019 we included negative wealth—one of the more disturbing aspects of modern economies—in our model. In 2016, for example, approximately 10.5 percent of the U.S. population was in net debt because of mortgages, student loans and other factors. So we introduced a third parameter, κ (or “kappa”), which shifts the wealth distribution downward, thereby accounting for negative wealth. We supposed that the least wealth the poorest agent could have at any time was –S, where S equals κ times the mean wealth. Prior to each transaction, we loaned wealth S to both agents so that each had positive wealth. They then transacted according to the extended yard sale model, described earlier, after which they both repaid their debt of S.
The three-parameter (χ, ζ, κ) model thus obtained, called the affine wealth model, can match empirical data on U.S. wealth distribution to less than a sixth of a percent over a span of three decades. (In mathematics, the word “affine” describes something that scales multiplicatively and translates additively. In this case, some features of the model, such as the value of Δω, scale multiplicatively with the wealth of the agent, whereas other features, such as the addition or subtraction of S, are additive translations or displacements in “wealth space.”) Agreement with European wealth-distribution data for 2010 is typically better than a third to a half of a percent [see box below].
To obtain these comparisons with actual data, we had to solve the “inverse problem.” That is, given the empirical wealth distribution, we had to find the values of (χ, ζ, κ) at which the results of our model most closely matched it. As just one example, the 2016 U.S. household wealth distribution is best described as having χ = 0.036, ζ = 0.050 and κ = 0.058. The affine wealth model has been applied to empirical data from many countries and epochs. To the best of our knowledge, it describes wealth-distribution data more accurately than any other existing model.
Credit: Jen Christiansen; Source: Bruce M. Boghosian; European Central Bank (country data)
Trickle Up
We find it noteworthy that the best-fitting model for empirical wealth distribution discovered so far is one that would be completely unstable without redistribution rather than one based on a supposed equilibrium of market forces. In fact, these mathematical models demonstrate that far from wealth trickling down to the poor, the natural inclination of wealth is to flow upward, so that the “natural” wealth distribution in a free-market economy is one of complete oligarchy. It is only redistribution that sets limits on inequality.
The mathematical models also call attention to the enormous extent to which wealth distribution is caused by symmetry breaking, chance and early advantage (from, for example, inheritance). And the presence of symmetry breaking puts paid to arguments for the justness of wealth inequality that appeal to “voluntariness”—the notion that individuals bear all responsibility for their economic outcomes simply because they enter into transactions voluntarily—or to the idea that wealth accumulation must be the result of cleverness and industriousness. It is true that an individual's location on the wealth spectrum correlates to some extent with such attributes, but the overall shape of that spectrum can be explained to better than 0.33 percent by a statistical model that completely ignores them. Luck plays a much more important role than it is usually accorded, so that the virtue commonly attributed to wealth in modern society—and, likewise, the stigma attributed to poverty—is completely unjustified.
Moreover, only a carefully designed mechanism for redistribution can compensate for the natural tendency of wealth to flow from the poor to the rich in a market economy. Redistribution is often confused with taxes, but the two concepts ought to be kept quite separate. Taxes flow from people to their governments to finance those governments' activities. Redistribution, in contrast, may be implemented by governments, but it is best thought of as a flow of wealth from people to people to compensate for the unfairness inherent in market economics. In a flat redistribution scheme, all those possessing wealth below the mean would receive net funds, whereas those above the mean would pay. And precisely because current levels of inequality are so extreme, far more people would receive than would pay.
Given how complicated real economies are, we find it gratifying that a simple analytical approach developed by physicists and mathematicians describes the actual wealth distributions of multiple nations with unprecedented precision and accuracy. Also rather curious is that these distributions display subtle but key features of complex physical systems. Most important, however, the fact that a sketch of the free market as simple and plausible as the affine wealth model gives rise to economies that are anything but free and fair should be both a cause for alarm and a call for action. |
advertisement
boules05
A little bit different from boules01. This time, points are calculated first then the scene is scaled to fit the "paths".
Click the custom Button to change the background from black to white.
Click anywhere or wait to restart.
To tweak this sketch, first download it.
Make your updates, then upload your tweak!
Embed Code
Copy and paste the html code below to embed the applet to your blog or website. |
Q:
How to process data from CSV File and put that data in the room database and show it in recylerview?
Check the repo https://github.com/vivekpanchal/BabyApp
I am reading data and updating the adapter like this
The CSV file is inside the repo in Raw folder
want help in processing the CSV data
private void readData() {
InputStream is = getResources().openRawResource(R.raw.babynames);
BufferedReader reader = new BufferedReader(
new InputStreamReader(is, Charset.forName("UTF-8"))
);
String line = "";
try {
reader.readLine();
String mGender,mMeaning,mName,mOrigin;
while ((line = reader.readLine()) != null) {
Log.d("MyActivity", "Line: " + line);
String[] tokens = line.split(",");
mGender=tokens[1];
mMeaning=tokens[2];
mName=tokens[3];
mOrigin=tokens[4];
BabyName babyName=new BabyName(mGender,mMeaning,mName,mOrigin);
babyName.setGender(mGender);
babyName.setName(mName);
babyName.setOrigin(mOrigin);
babyName.setMeaning(mMeaning);
database.babyDao().insert(babyName);
babyNames.add(babyName);
Log.d(TAG, "Just created: " + mGender+mMeaning+mName+mOrigin);
}
} catch (IOException e) {
Log.wtf("MyActivity", "Error reading data file on line" + line, e);
e.printStackTrace();
}
}
A:
I gone through your GitHub project link, your CSV file has more than 22K entries.
Other thing is you are not reading data from Room, you have just inserted those objects and updating adapter with ArrayList.
First of all you should not perform this CPU Intensive operation on main thread, This is blocking UI for long time. [Just tested code on my device]
Use worker thread or any other threading mechanism like RxJava to perform this CPU Intensive operation. Then return result to Main Thread and update your UI.
Taking this further, considering 22K entries you should consider using pagination provided with Android architecture libraries
Perform private void readData() operation on another thread, Create List of your objects and insert to database all at once. using another dao method like below
@Insert
void insertAll(List<BabyName> babyNames);
Observe List<BabyName> in Activity using database.babyDao().getAllData(); method and in that observer set BabyNames to adapter as adapter.setBabyNames(names) and call adapter.notifyDatasetChanged()
This is how you can observe LiveData - example ProductFragment
// Observe product data
model.getObservableProduct().observe(this, new Observer<ProductEntity>() {
@Override
public void onChanged(@Nullable ProductEntity productEntity) {
model.setProduct(productEntity);
// Update adapter data and notify dataset changed here
}
});
If you want to follow Android Architecture Guidelines considering you are using Room Database, go with MVVM architecture. You will start task for CSV Processing once the app is open and UI will observe for database changes using LiveData. So when your csv processing is completed and Database is updated you can view all those in your UI
Refer this for Pagination support - Android Pagination
Edit 1
I have create Pull Request on GitHub which fixes this problem.
Now app is running as expected.
It fixes following issues
CSV Processing In Background
BabyDao with required LiveData Methods
MainActivity with Observing Baby List
MainActivity processing CSV in background if already not inserted
RecyclerView working properly - LayoutManager bug fixed
|
You guys!
Here's some food!!
Where are you?
Here's your food!
(This is Rosé calling the
cats to eat breakfast)
(No answer)
(Spot Gray Baby kitten family)
You guys! Come here
and have some food!
Maybe they aren't coming
because there's no food.
Yeah, maybe they only come
when there's food.
Do you think they're nearby?
Maybe they're next door.
Where does this open...
Is it new...?
(Uh oh...Chaeng's in trouble)
What should I do!
It's all over the floor!
I should put it in here. Right?
I thought it was new.
I caused trouble...again!
(Spills...everywhere)
(Impossible to clean up ^^;;)
This is crazy!!
What are we going to
do about the floor??
Lisa, we're dead!
We?? What do you mean, we?
You're dead! ^^
What do you mean, we!
(Picking up the catfood
with all her strength)
This actually looks pretty good.
(Rosé's even eyeing the catfood now?!)
This looks good. I want to
try some!
(Still no cat in sight)
You guys!
What do I need to do
to make them come?
I need to temp them.
(Step 1: leave a trail of food)
Do you think they moved away?
Because we didn't feed them?
Are they here?
They're not here, Lisa.
Baby, let's eat!
(Step 2: call the kittens sweetly)
(Step 3: do the kitten dance?)
I don't think they're coming.
I think they already left.
Leave a video message
for them saying farewell.
No!
Don't leave!
Come back here
and have breakfast!
Please come back soon...
-from Rosé
Ready, start!
Hello~~~
BLINK!
(Not a quiet day at
Blankpink House)
It's my concert.
(News just in:
Chaeng's mini concert huge success!)
(Energizer Chaeng & Lisa)
What's that by your feet, Chaeng?
(Chaeng's animal massage sticks)
Can you hand that over?
Massage sticks!
Hello, hello!
(Black Pink's random lyrics)
I'm a rabbit, I have triangle ears!
Triangle, round ears
Triangle, round ears
(We've entered the EDM
part of the song ^^;)
It's round, round, round!!!!
It's such a moving song.
We're all hyper today.
What do you guys have planned
for today?
What should we do?
-I have plans.
Really?
You made plans by yourself?
What are you going to do?
I'm really into making
things these days.
I'm going to learn
from a professional.
Really?
-I'll make something for you, too.
Really?? Yes!!
-What are you guys going to do?
Us? I want to go on
trampolines!
You should go!
I need to make plans.
I wanted to do archery.
Then you guys should go together.
(The two of us?)
Look at them! They don't
like it!
Let's go separately!
Okay, I'll learn archery.
(The youngest girls
decide to stick together)
I wanted to...
You know that movie we watched...
"Our Times," and Tai Yu!
Oh, the male lead, Tai Yu...
You don't want to go roller
skating, do you?
No!!
I want to go!!
Don't you remember?
We were good at it during "Boombayah."
It was scary.
Four girls with four different tastes!
We'll show you Black Pink's interests!
Rosé's pick: Trampoline!
(Perfect for active Rosé)
Silly(?) pictures are
an added bonus!
Follow me!
(Jisoo's pick: rollerskating)
(Let's bring back the past
by rollerskating!)
Lisa's pick: archery
The winner of Black Pink's
Archery Competition?
Wow, you're good.
Jennie's pick: handmade jewelry
(Handmade by Jennie & Jisoo)
Isn't it fun?
-You're unleashing your skills.
#4girls4tastes
#sharing
#willwebeokaytoday?
So, we'll splitting up? Like this?
We have to help?
(Let's head out!!)
We're going out!!
(Let's take a sneak peak at
Jennie getting ready)
(Facial mist is a must
during dry weather)
Should I put something
on my lips?
(Which lip color
does she use?)
(Lots of spring colors)
They're all colors I like!
What should I do!
What do you think?
Do you like it?
(Yes! Of course)
I'll use the pink
for my cheeks.
(Putting some color into her cheeks...)
People do this a lot these days...
Using the same product for lips and cheeks.
It's not perfect but I put
some color into my cheeks.
(Jennie is done getting ready!)
That's it. I should hurry.
Bye!
(The younger girls are
quick to leave home)
Let's go.
Aren't you cold?
No. I'm completely warm.
It's so nice out today!
Archery, archery!! Archery cafe!
(Perfect weather for indoor(?) archery!)
I'm going to learn how to
shoot arrows today!
The girls seemed to find
their way around well...
until some fish-shaped cakes
stop them in their tracks.
We have to cross.
We have to cross. Wait.
(The girls definitely have similar
tastes for snacks)
Is it here?
I want some pho!
No, no! We have to
go somewhere!
Can we have pho?
(Chaeng just wants to eat)
(Lisa firmly goes on)
-I want pho!!
Concentrate!
Where do we need to go?
I'm hungry! I want some pho!
We have to go a little
further.
Sweet & salty! I need
something salty!!
We have to look for the sign
that says archery.
(Look for the sign that says
Archery Cafe)
Chaeyoung, look!
That pink padded-coat!
Oh, it's really cute.
Everything's pink!
Can we sit here?
(These girls are BLACK...
the store is PINK)
You can sit here!
Did you take it?
(They called their manager)
Let's take one more.
(Sharing same taste in color +1)
This is fun!
Where is this place?
(They seem to be close...)
It must be here.
(The girls have arrived fighting
off hunger and shopping desires)
We found it!
-It's here!
We found it!!
|
Professional Athletes do Cryotherapy but Should You?
Who doesn’t want more energy, less pain and better sleep all from a three minute treatment?
I’m standing naked, except for my boxer shorts, staring at the cryotherapy chamber that is about to engulf me in sub-freezing liquid nitrogen. I’m terrified. In fact, I can’t remember the last time I was this scared.
The 20-something year old woman standing next to me gives me two socks and two gloves to put on. “These will keep you from getting frostbite. It’s important you keep them on.”
I think, what about my other parts?
I walk into the chamber and she seals me in. It’s like standing in an upright tanning bed with my head poking out of the top.
I’m standing naked, except for my boxer shorts, staring at the cryotherapy chamber that is about to engulf me in sub-freezing liquid nitrogen. I’m terrified. In fact, I can’t remember the last time I was this scared.
I assume the fig leaf position and just like David Byrne I wonder, well, how did I get here?
I first heard about whole body cryotherapy when I was hanging out with some U.S. Navy SEALs in San Diego. They told me that some rich private citizen bought the SEALs some chambers from Japan and shipped them in so they could speed up recovery from injuries. At that time, it sounded to me like some kind of dangerous voodoo.
The second time I heard about cryotherapy chambers was when Tony Robbins mentioned he has one in each of his homes and starts every morning with a deep freeze. He talked about it shocking the system and curing inflammation problems including arthritis. Interesting, I thought, but was still skeptical.
The third time I saw a cryotherapy chamber was on episode nine of the HBO show, Billions. Hey, if a fictional hedge fund manager played by Damien Lewis is doing cryotherapy, I’m all in!
As I investigated cryotherapy further, I found all kinds of remarkable claims being made by manufacturers. Freezing your body apparently helps you to lose weight, tighten skin, relieve muscle pain, boost the immune system, and improve sleep quality. Of course, I really couldn’t find any proof of these claims.
The clinical research I did find was mixed, but there are studies showing a reduction in cell-signaling proteins that cause inflammation (specifically TNF-α, NF-κB, TGF-β and MMP-9). I learned that Lebron James, Floyd Mayweather Jr. and many professional athletes now use cryotherapy instead of old-fashioned ice baths. And I also learned that a 24-year old woman froze herself to death in Las Vegas last year.
So that’s how I ended up in the cryochamber.
It takes about 30 seconds to reach its maximum cold point. Nitrogen gas hugged my body and swirled out near my face. I ask the attendant just how cold it is.
“You hit negative 186 Celsius,” she answered.
That didn’t seem right to me. All the articles I read talked about typical temperatures being negative 100 degrees Fahrenheit with a maximum cold of negative 280 degrees Fahrenheit. But 186 Celsius is -303 Fahrenheit.
“Are you sure?” I ask.
She stared at the display panel for a moment. “I’m sure. That’s what it’s reading.”
After the first minute I think, this isn’t too bad.
After the second minute, I start shivering and think it’s kind of like running outside in your underwear in the middle of the night during winter. Not that I can I really know what that’s like.
My fingers begin to numb so I start doing jazz hands down by my waist.
The third minute was a bit harder to take. Very uncomfortable. It wasn’t exactly cold like you’re used to feeling. It was more like a light burning sensation on the skin.
I started a breathing meditation to keep my mind off the cold.
“That’s three minutes,” she pressed a button and then opened the door. The nitrogen gas escaped, flooded the room and quickly dissipated.
As I stepped out and began to dress, I realized that I didn’t feel all that cold. It’s nothing at all like emerging from a swimming pool and racing for the towel to dry off and warm up. And within another minute, fully dressed and walking out to my car, I didn’t feel cold at all.
But I also didn’t feel any different. I didn’t experience the energy rush so many people talk about. All my normal muscle pains and carpal tunnel wrist were still there. And nope, I didn’t sleep any better at night.
And I feel disappointed. I wanted cryotherapy to work. Who doesn’t want more energy, less pain and better sleep all from a three minute treatment?
For me, the jury is still out and I’ll definitely try it again. It certainly wasn’t as bad as I had feared, and perhaps with more frequent use, or freezing immediately after my workouts would get better results. But for now, I’m off to investigate another extreme productivity tactic that research indicates will increase dopamine in the mesocorticolimbic pathway resulting in an instant mood boost. Yes, there is indeed a scientific case for cold showers. |
Working Women Blues
27 Feb 2013
written by Carolyn
There’s been a lot of talk in the media lately about women in the workplace. From Anne-Marie Slaughter’s complaining about not “having it all,” to Facebook COO Sheryl Sandberg exhorting women to “lean in” to their careers (translation: suck it up) and not let little things like babies disrupt their rise to the top, to Yahoo CEO Marissa Meyer boasting about her two-week maternity leave and cancelling the company’s telecommuting policy — op-ed pages and Facebook news feeds are full of people, mostly women, debating who has it right, wrong, or in-between.
There’s much about this “debate” that irritates me.
I’m really annoyed that Slaughter, Sandberg and Meyer are the faces of women’s workplace issues. They represent a very narrow, elite segment of women in the workplace. Yes, there are still barriers to women making it to the top of organizations in both the public and private sector, and those issues are worth discussing. But it seems the issues of elite women workers are the only women’s workplace issues we ever get to discuss.
Take, for instance, Yahoo’s new ban on telecommuting. I disagree with Yahoo’s policy, but let’s face it — Yahoo’s policy has zero impact on two classes of workers — executives in the C-suite, like Meyer, against whom no one is going to ever enforce this policy; and lower-wage workers such as security, cleaning, mailroom, factory workers, and administrative staff — workers at the lowest levels of the corporate food chain, whose jobs are always among the most vulnerable , and for whom telecommuting isn’t an option, anyway.
Positioning Slaughter, Sandberg and Meyer as being anything other than on the same side of this faux “debate” is delusional. They are all privileged women at the top of their fields. All have influence and access to resources beyond what most women can even dream of.
And none of them is using her power and influence to shed light on the real issues that affect the majority of women in the workplace.
According to the U.S. Census, the number one job for women today is administrative assistant/secretary, same as it was in 1950. The second most common job for women is cashier, and the third is elementary or middle school teacher. These women aren’t leaning in to their careers — they’re trying to stay afloat. These workers are among the least protected members of the workforce. And the issues that matter most to these women — minimum wage, fair pay, maternity and child care, sexual harassment, and job security — either aren’t discussed, or are framed through an elite lens.
That’s what infuriates me the most. The “women in the workplace” discussions generally are limited to the concerns of married, cisgendered, heterosexual women, who have the luxury of either choosing to work, albeit perhaps at a lower salary grade than they would have otherwise preferred, or choosing to leave the workforce and live on their husband’s salary.
We women who complain that Sandberg, Slaughter and Meyer have resources we don’t, usually fail to acknowledge that our own resources far exceed those of most working women. For this, I can look to myself as an example. I’m a unicorn in my environment — a single mother of two children who has reached executive level status in a Fortune 500 corporation, without the support of a husband and/or extended family. But I’m hardly representative of single working mothers, especially single working mothers of color.
I gave up being a law firm partner after the birth of my second child because, under the circumstances I faced at the time — having two small children and a rapidly decomposing marriage, with no extended family support — I couldn’t make being both a full-time mother and a law firm partner work. Maybe it’s not fair that I had to give up being a law firm partner because my workplace was not as accommodating to me, as a soon-to-be-single working mother, as it might have been. Maybe I married the wrong dude (okay, there’s no maybe to that one.)
Knowing my own competitive nature, I doubt I would have left my law firm’s partnership a decade ago if I’d worked in an environment that supplanted the need for that supportive husband who was willing to stay at home, or who had a large enough income to pay for additional child care — resources many of my higher-achieving law school classmates have. I know that the lack of external support is why my current title is “VP” and not “SVP” or “EVP.” Maybe I should have “leaned in” and figured out a way to remain partner, or “leaned in” and gone for a general counsel position instead of staying at the VP level so I would be able to raise two kids by myself, with no help beyond the outside help I could pay for from time to time.
But to look at my own situation as representative of the hardships faced by women workers strikes me as the worst form of elitism imaginable. “Giving up” meant I left the law firm partnership and moved on to a pretty lucrative in-house job. It meant giving up the prospect of pulling in 7 figures. It didn’t mean being resigned to poverty. And I was able to pay others for the help my ex-husband refused to provide, and that my family, hundreds of miles away, could not provide. Many lower-income working women simply do not have that option.
Unlike many working mothers, I had extremely generous maternity leave — six months — with both kids. I was blessed to have healthy pregnancies, and worked close to the end of my term with each one. It never occurred to me that women today are still at risk of losing their jobs if their pregnancies require workplace accommodations, because, as a working mother, I never had an at-risk pregnancy, nor worked in an environment where my job was at risk because of my being pregnant. I have never worried that I’d lose my job because I had to leave work, or work from home, to deal with a sick kid. I even took two weeks off work when my mom died in 2009, and didn’t have to use vacation time to do it. The majority of America’s working women cannot say the same.
Women like me don’t think about issues like pregnancy discrimination because we’ve been deluded into thinking that those are the issues of the bad old days. We see Joan and Peggy struggling with workplace discrimination on shows like Mad Men, and we comfort ourselves into believing we have overcome. We focus on the issues at the top because we’ve been fooled into thinking the issues at the bottom already have been solved. Perhaps if we pay more attention to the issues faced by women at the lowest income levels in our society instead of only wringing our hands about the injustices still suffered by women at the top, we can effect real, meaningful change for all workers.
While I think the issues that limit women from holding leadership positions in the private and public sector are worth discussing, these are not the only issues facing women in the workplace. I really want to see more focus on the women who need the most help.
13 Comments on Working Women Blues
So, so true Carolyn! So funny. When I wrote about Mayer over at Lifetime, one of the first comments was something like “I built Mayer to be my hero” or something. To which I literally LAUGHED OUT LOUD. As a former single mom, Latina, woman of color, mother of 3, none of these women, Mayer among them are anything like what a hero of mine would EVER look like. I love that you talked about the socio-economics of this issue, because it is DEAD ON, and my obsession with these issues is because I WAS that worker too – the administrative, the secretary, the receptionist, the assistant and the most vulnerable. My opportunities of moving up were more than just my lack of ambition or ability to “lean in” and though as a single mother i would’ve benefited greatly from telecommuting, it was never, ever an option for me – though it certainly was for my higher ups. Great, great read.
Perhaps if we pay more attention to the issues faced by women at the lowest income levels in our society instead of only wringing our hands about the injustices still suffered by women at the top, we can effect real, meaningful change for all workers….. Brilliant!
I agree with what is said about the economics of it all and that this hardly addresses the plight of all women. BUT, Edgar says this:
While I think the issues that limit women from holding leadership positions in the private and public sector are worth discussing, these are not the only issues facing women in the workplace. I really want to see more focus on the women who need the most help.
So why is it that we can’t support a woman (Sandberg) who is trying to get a conversation going about these exact issues? Yes, there are terrible inequities in our country and they deserve attention, too. But my bet is that the most effective way to remedy those inequities (which I don’t see the majority of the people in this country rushing to remedy) is to make sure women are in positions of power in both the public and private sector. Maybe then we’ll see some improvement for all women – and all people – in this country and beyond. The economic disparity and lack of options have been a disgrace for a long time. Is the point that Sandberg’s two options were to write a book about that or not write a book at all? Since the book isn’t out yet and nobody has seen it yet, why don’t we wait until it comes out, read it, and then have a discussion? Rather than jumping on the ‘women bashing women’ bandwagon that has been killing us for so many generations already.
Spot on. Most women do not have the option of working from home. And that is the least they have to worry about at work. The cashier at the discount store who dares to speak up about workplace conditions only to be fired immediately. The mid level manager who is competent but has a boss who is insecure and proceeds to make life miserable. And let us not forget those women with male bosses where sexual harassment and job security go hand in hand. Again, spot on
Yes, I don’t think many social movements were started and sustained from the top down. The entire “work from home” debate does make me uncomfortable. Working from home is great, if you can afford an excellent nanny to be there at the same time, have a job that requires a home office, and have an equipped home office in your house, to begin with.
Jennifer: Ph.D. candidate and writer Tressie McMillan Cottom uses the phrase “trickle-down feminism” to describe the notion that if we have enough women in positions of leadership, they will work to improve matters for all women. Trickle-down feminism has proven to be about as effective as trickle-down economics — that is, not terribly effective at all. Having women in positions of power in the public and private sector is important, but if the women at the top focus only on the concerns of women at the top, they’re not doing much for women as a whole. The point is, we talk too much about women’s individual choices, and not nearly enough about the systemic problems and inequities that force women into making those choices in the first place.
I’m not sure how disproven this concept of “trickle-down feminism” is since we (women) have never had a critical mass in any position of power to try to make change. So I’m not sold on that. I’d like to see how this country would look if approximately 50% of congress, fortune 500 and middle managers were women. My guess is, the conversation for all women would be quite different.
But either way, I’m not sure why you think Sandberg’s goal is to only focus on women at the top getting to the very top. Sandberg does not appear to have done any press on this book yet. The book is not out. The website is not live. Everyone seems to be guessing what this is about and what goal she has – and for whom. I’m guessing her book isn’t going to try to solve all the problems faced by all women, but does that mean she can’t write a book about her experiences?
I don’t like that this entire conversation (throughout all media outlets, it seems) about Sandberg and her book has women fighting, yet again. And either you are in the “out of touch, elite” camp or the “misogynistic” camp. There are a lot of complex issues women face – women of different income levels face widely different ones at times. But Sandberg appears to be tackling one of them; one she claims she hopes will tackle another. Men write books about success and getting to the top all the time. They are never slammed or questioned. Nobody seems to be slamming the content of the book, since nobody has read it yet. People are slamming their image of her and what she might be saying? Give it a chance. Let’s go easier on each other and see if there isn’t something we can take away from this book. And if you want to talk more about the systemic problems and inequities that force women into doing anything – then start that conversation! I’m on board! Let’s do it! But I’m not sure why that means Sandberg can’t write her book, too.
Twitter and Facebook Followers
Social Networks
Carolyn's Latest Tweet
About Carolyn
Carolyn Edgar is an attorney, writer, and single mom. Her work has been published widely, including Huffington Post, CNN.com MarriedMySugarDaddy/Lifetime Moms, MyBrownBaby.com and Technorati. Carolyn’s personal essay Black and Blue was published in the college textbook Mirror on America: Short Essays and Images from Popular Culture (Bedford/St. Martin’s). Carolyn is a graduate of the University of Michigan-Ann Arbor and Harvard Law School. She lives in New York City with her two children. |
DeJay Lester
DeJay Lester (born December 14, 1988) is an American football wide receiver who is currently a free agent. He played college football at Wyoming
College career
Lester began his college career at Snow College, as a defensive back and played a great deal as a true freshman on a National Champion-Runner Up team. Following his freshman season, he moved to wide receiver with the foreknowledge that he would need to redshirt based on the depth that was already in place at that position.
In 2009, DeJay was an outstanding player Snow College. He was a great leader at his position group and played with the attitude and toughness that any coach would desire. He was a full-time starter and a great player but maintained his humility and work ethic necessary to be great.
Lester's play at Snow lead him to earn a scholarship offer from the University of Wyoming.
Professional career
Green Bay Blizzard
Utah Blaze
Utah Stealth
Played 3 games for the Utah Stealth Semi-Pro team of the Rocky Mountain Football League. Finished third on team with 12-184-2 in receiving, 8-182 on kick returning, and 4-88-1 for punt returns. Had a 73-yard punt return for a td.
Bemidji Axemen
Lester signed with the Bemidji Axemen of the IFL for 2014. He only played in a single game for the Axemen on February 22. On February 24, 2014, Lester was released by the Axemen.
Iowa Barnstormers
On February 25, 2014, Lester was assigned to the Iowa Barnstormers. He was released by the Barnstormers on April 16, 2015.
New Orleans VooDoo
On April 15, 2015, Lester was assigned to the New Orleans VooDoo. He was placed on reassignment on April 30, 2015.
Tri-Cities Fever
On May 7, 2015, Lester was signed by the Tri-Cities Fever. On May 2, 2016, Lester was released.
Cedar Rapids Titans
On May 18, 2016, Lester signed with the Cedar Rapids Titans. On June 28, 2016, Lester was released.
Return to Iowa
On March 16, 2017, Lester signed with the Barnstormers.
References
Category:Living people
Category:1988 births
Category:Wyoming Cowboys football players
Category:Snow Badgers football players
Category:Green Bay Blizzard players
Category:Utah Blaze players
Category:Bemidji Axemen players
Category:Iowa Barnstormers players
Category:New Orleans VooDoo players
Category:Tri-Cities Fever players
Category:Cedar Rapids River Kings players
Category:Players of American football from Utah |
As a blizzard whips outside Trinity Jubilee Center in Lewiston, Maine, inside it is steamy and hot, filled with the smells of African cooking.
This is no typical Northeastern soup kitchen. A refugee family who arrived four days ago from Angola tracks slush across the tile floor, waiting to receive plastic plates piled with spicy hot catfish, fruit salad, and grocery-store cupcakes.
Meanwhile homeless white men sit on old ripped couches, watching a soap opera playing silently on a small TV. Behind them, black women greet one another in Somali while shaking the snow off their hijabs.
In the middle of everything is Aba Abu, clipboard in hand, welcoming everyone with a smile and writing down the names of new visitors.
Ms. Abu also works as a bus driver – while raising two teenagers as a single mother. She is tired. But life is better here than in Atlanta, where the Department of Homeland Security originally settled her. There are locals who help her, along with Lewiston’s 7,000 other Somalis. In Ms. Abu’s 12 years here, she has seen local hostility dissolve into broad acceptance, helped by the Somali kids who propelled the high school soccer team to its first-ever state championship.
But President Trump, who on Monday released a revised travel ban against six Muslim-majority countries including Somalia, has strained some of those relationships. Immigrants and locals alike see signs that their community is sliding back into old attitudes of distrust.
“You see more angry people … especially since Trump came to Maine, and say things he should not have said to the people,” Abu says, as poor Mainers and immigrants mill around the humid church basement waiting for the food. “He said Somalis were taking all your benefits … and they said ‘Oh you know what? We can say what he says, and it’s OK. Cause he is our president.' ”
Then a white homeless man interrupts her to add his two cents about immigrants. “There are just too many of them, we need to send some of them back,” he says. As he walks toward the food, he turns back and smiles, revealing missing front teeth. “No offense, Aba!”
Abu laughs, but her eyes look hurt. “I’ve known him almost 10 years, he’s never said anything like that.… But before [Trump] everything was fine, Maine was fine.”
As Trump’s travel ban and immigrant raids cause tremors across America, this integrated community should represent a best-case scenario for coexistence under President Trump. It is not perfect; tensions and fears have resurfaced, and widened a divide the community had worked hard to close. But while Lewiston’s social fabric may be fraying in places, by and large it’s holding together.
“I wouldn’t say that Lewiston is fabulous, or has done everything right,” says Catherine Besteman, an African studies professor and author of a book on Somali refugees in Lewiston.
Still, she adds, it’s an example of how immigrants, including from the Muslim-majority countries targeted by Trump, have settled into life in America relatively smoothly.
“These small American towns are being transformed quietly without ruckus or violence – they are stories we don’t pay attention to…. When people are screaming and fighting about immigration, they aren’t looking at places like Lewiston and saying, ‘Huh, this is working.’”
Somalis bring home state championship
To be sure, Lewiston was not perfect before Trump. Of the 10 largest cities in Maine, Lewiston has the lowest per capita income, the second-highest poverty rate, and the smallest high school-educated population. And on Feb. 8, the American Civil Liberties Union sent a letter to the Lewiston school system following a two-year investigation that found discipline disparities for children of color.
However, Lewiston High’s soccer coach Mike McGraw says the boys’ soccer team is an example of how far the city has come.
Story Hinckley/Staff Aba Abu welcomes visitors Trinity Church's food pantry in Lewiston, Maine, where she works as a coordinator – in addition to her second job as a bus driver.
When Somali refugees first started populating Lewiston in 2001, there were “some touch-and-go years,” says Mr. McGraw. Black and white students rarely interacted and there were frequent “standoffs” in the cafeteria. By 2009, McGraw’s varsity team was 40 percent black. During practice breaks in the August heat, white players would huddle in the shade above the field, and the black players would claim the shade below the field.
“We are just too good not to take advantage of this,” McGraw remembers thinking. So two days into the season he called all the players onto the center of the field during a practice break and gave them assigned seats.
“I just grabbed kids and said, ‘You come sit over here,’ ‘You come sit over here,’” says McGraw, who says he “speckled” them into a mosaic of black and white. “And when I did that I said, ‘Look. You see how we are? This is how we have to play. We have to play together and we have to trust each other.’”
In 2015, the men’s high school soccer team won Lewiston’s first state championship with a starting lineup of black immigrants. Now soccer games are a town-wide event for everyone, says McGraw, with black and white fans cheering together. He remembers forcing players to high-five one another in the hallways, but now the team chooses to spend their weekends together playing video games and ping-pong.
“What they are displayed on the field, and off the field, was a togetherness and unity that grownups needed to see,” he says. “They really want to be accepted. Winning a championship allowed them to say, ‘Look. We can do good things.’”
But McGraw admits there is a new emotional undercurrent in Lewiston since the election that he hasn’t seen for years. On Nov. 9, one of McGraw’s players asked if he was allowed to be at school since Trump won the election – a question that really shook McGraw.
“My team has done so much good for the community,” he says. “[A]nd then after this election it is like we have gone backwards. The attitude toward the travel ban and Muslims has opened the door to people who are narrow-minded.”
'Two contradictory stories’ about immigration’s impact
Between two blocks of Lewiston’s Lisbon Street there is one adult novelty book store, three “For Rent” signs, and seven Halal markets.
Owner Jean-Pierre Tshamala sits behind the counter of one of the markets, shielded by shelves of products that reach the ceiling. He brags about one in particular: his wife’s sambousa, a pastry of beef, onions, and spices. They are so delicious, he says, that 20 white Mainers come in a week to buy them.
“Locals are really the most important people,” says Muhadin Libah, executive director of the Somali Bantu Community Association (SBCA). “They are the ones listening to us, welcoming us, showing us the way.”
Since the city helped piece together a patchwork of services in the early 2000s, its African community has grown exponentially. Today a local advisory board helps Mr. Libah connect immigrants with government assistance, and he helps newcomers learn basic skills – paying electricity bills, taking a shower with running water, and sorting their mail (so they don’t throw away important documents like Social Security cards).
“The city officials charged with providing assistance in those early years were really heroic,” says Professor Besteman, who is based an hour away at Colby College in Waterville, Maine. “They pioneered a city taking a responsibility instead of just voluntary agencies taking responsibility.”
Robert F. Bukaty/AP Mike McGraw teaches a biology class at Lewiston High School in Lewiston, Maine on Jan. 26, 2016. McGraw is also the coach of the varsity soccer team whose undefeated team featured players from Somalia, Kenya and Congo. 'It doesn't take long for kids to become Americanized. What I'm happy about my kids is that they have not lost touch with their culture,' McGraw said.
But some resent those efforts.
“My dad came [to Maine] from Canada and didn’t get all this help,” says Terry, an elderly Mainer shopping at the local Shaw’s grocery store. It’s not fair that the Somali refugees buy shopping carts full of food with the government’s money, she says with pursed lips. “That really gets me.”
Terry, who preferred not to give her last name because she has immigrant neighbors, is grateful Maine Gov. Paul LePage (R) and his protégé, three-term Mayor Robert MacDonald, “got strict” on the immigrant and refugee populations.
In 2012, Mr. MacDonald told the city’s immigrants: “You accept our culture and you leave your culture at the door.” A year later he was reelected, beating former mayor Larry Gilbert, who has testified at a Senate hearing in favor of immigration reform. And in November 2015, two months after proposing a bill to create an online registry of the names and addresses of Lewiston’s welfare recipients, MacDonald beat a young progressive, Ben Chin, a third-generation American whose family came from China.
“There are two contradictory stories about the impact of immigration in this country and they are at war with each other,” says Besteman. “And that contradiction is as true in Lewiston as it is in the country at large.”
Simone’s Hot Dog Stand
Rochelle Williams has worked at Simone’s Hot Dog Stand in downtown Lewiston for 18 years, over which the city has changed a lot. In a nod to the city’s growing Muslim immigrant population, for example, the diner has started selling pork-free versions of their famous hot dogs.
Somalia has become the third-largest source of refugees coming to the US since a civil war broke out between warring militia clans in the early 1990s. After passing background checks with US Immigration Services, Somali refugees are generally sent to urban areas such as Atlanta, St. Louis, and Fort Worth, Texas.
In 2001, a small group of Somalians moved farther north to Lewiston, attracted to the city’s walkable downtown area, good schools, and affordable rent. In recent years, refugees from other African countries have followed suit.
“We had a culture shock when they first came. ‘They’re taking our jobs’ – that was a big thing,” Ms. Williams recalls. “They couldn’t talk to anyone, it was rough.”
But gradually the community became more welcoming.
Back at the hot dog stand, third-generation owner Jimmy Simone proudly shows visitors framed photographs of Governor LePage, Sen. Susan Collins, and former Maine Sen. Olympia Snowe sitting at the diner’s counter – and the sweeping signature of Don Trump Jr. in the restaurant’s guestbook.
“Everything takes awhile, to understand each other,” he says while sharpening kitchen knives on the bottom of a coffee mug. “But now it’s a non-issue…. It’s just a part of life.”
Immigrants’ faith in the Constitution
Abu believes there are still “good and supporting” people in the town, but maybe not as many. She says locals on the street used to give her big, toothy grins as they passed but now they smile without showing their teeth.
“I wish Trump could meet me, and sit here with me in this chair and see how many people I help here every morning,” says Abu. “This is not my people I’m helping – it’s local people.”
Robert F. Bukaty/AP Austin Wing and Abdi Shariff check out pictures on Shariff's phone at Lewiston High School in Lewiston, Maine on Dec. 14, 2015. The two students were players on the state championship-winning soccer team.
Six weeks into Trump’s presidency the fear is still palpable. Libah says the travel ban “is the talk of the day, all the time.” If a white man drives slowly through the neighborhood, legal immigrants fear it is Homeland Security or the FBI coming back to revoke their green card.
However, some immigrants find calm in their basic knowledge of the US political system.
“We have lived in a place where Trump is the ultimate and nobody else can say anything about it. [But here] people are demonstrating, people are walking out, saying things about him,” says Libah. “The fact that we have all these systems that can say something about Trump, is what is hopeful.”
Libah says the power of United States’ “checks and balances” are valued by the refugee and immigrant community. “These systems can counterbalance if there is an issue, and that is what I am telling my people.”
Get the Monitor Stories you care about delivered to your inbox. By signing up, you agree to our Privacy Policy
Cleaning up from lunch at Trinity Jubilee Center in a bright red turban, Haibado Daher’s eyes grow big when she talks about the US political system.
“Here it is not like the other countries in the world. Here there is no person that is the most powerful in the country; the law is the most powerful,” says Ms. Daher, who moved here from Djibouti in August. “The Constitution is written very good and it will be OK.” |
//*****************************************************************************
//
// aes.c
//
// Driver for the AES module.
//
// Copyright (C) 2014 Texas Instruments Incorporated - http://www.ti.com/
//
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions
// are met:
//
// Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
//
// Redistributions in binary form must reproduce the above copyright
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the
// distribution.
//
// Neither the name of Texas Instruments Incorporated nor the names of
// its contributors may be used to endorse or promote products derived
// from this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
//
//*****************************************************************************
//*****************************************************************************
//
//! \addtogroup AES_Advanced_Encryption_Standard_api
//! @{
//
//*****************************************************************************
#include <stdbool.h>
#include <stdint.h>
#include "inc/hw_aes.h"
#include "inc/hw_dthe.h"
#include "inc/hw_ints.h"
#include "inc/hw_memmap.h"
#include "inc/hw_nvic.h"
#include "inc/hw_types.h"
#include "aes.h"
#include "debug.h"
#include "interrupt.h"
#define AES_BLOCK_SIZE_IN_BYTES 16
//*****************************************************************************
//
//! Configures the AES module.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui32Config is the configuration of the AES module.
//!
//! This function configures the AES module based on the specified parameters.
//! It does not change any DMA- or interrupt-related parameters.
//!
//! The ui32Config parameter is a bit-wise OR of a number of configuration
//! flags. The valid flags are grouped based on their function.
//!
//! The direction of the operation is specified with only of following flags:
//!
//! - \b AES_CFG_DIR_ENCRYPT - Encryption mode
//! - \b AES_CFG_DIR_DECRYPT - Decryption mode
//!
//! The key size is specified with only one of the following flags:
//!
//! - \b AES_CFG_KEY_SIZE_128BIT - Key size of 128 bits
//! - \b AES_CFG_KEY_SIZE_192BIT - Key size of 192 bits
//! - \b AES_CFG_KEY_SIZE_256BIT - Key size of 256 bits
//!
//! The mode of operation is specified with only one of the following flags.
//!
//! - \b AES_CFG_MODE_ECB - Electronic codebook mode
//! - \b AES_CFG_MODE_CBC - Cipher-block chaining mode
//! - \b AES_CFG_MODE_CFB - Cipher feedback mode
//! - \b AES_CFG_MODE_CTR - Counter mode
//! - \b AES_CFG_MODE_ICM - Integer counter mode
//! - \b AES_CFG_MODE_XTS - Ciphertext stealing mode
//! - \b AES_CFG_MODE_XTS_TWEAKJL - XEX-based tweaked-codebook mode with
//! ciphertext stealing with previous/intermediate tweak value and j loaded
//! - \b AES_CFG_MODE_XTS_K2IJL - XEX-based tweaked-codebook mode with
//! ciphertext stealing with key2, i and j loaded
//! - \b AES_CFG_MODE_XTS_K2ILJ0 - XEX-based tweaked-codebook mode with
//! ciphertext stealing with key2 and i loaded, j = 0
//! - \b AES_CFG_MODE_F8 - F8 mode
//! - \b AES_CFG_MODE_F9 - F9 mode
//! - \b AES_CFG_MODE_CBCMAC - Cipher block chaining message authentication
//! code mode
//! - \b AES_CFG_MODE_GCM - Galois/counter mode
//! - \b AES_CFG_MODE_GCM_HLY0ZERO - Galois/counter mode with GHASH with H
//! loaded and Y0-encrypted forced to zero
//! - \b AES_CFG_MODE_GCM_HLY0CALC - Galois/counter mode with GHASH with H
//! loaded and Y0-encrypted calculated internally
//! - \b AES_CFG_MODE_GCM_HY0CALC - Galois/Counter mode with autonomous GHASH
//! (both H and Y0-encrypted calculated internally)
//! - \b AES_CFG_MODE_CCM - Counter with CBC-MAC mode
//!
//! The following defines are used to specify the counter width. It is only
//! required to be defined when using CTR, CCM, or GCM modes, only one of the
//! following defines must be used to specify the counter width length:
//!
//! - \b AES_CFG_CTR_WIDTH_32 - Counter is 32 bits
//! - \b AES_CFG_CTR_WIDTH_64 - Counter is 64 bits
//! - \b AES_CFG_CTR_WIDTH_96 - Counter is 96 bits
//! - \b AES_CFG_CTR_WIDTH_128 - Counter is 128 bits
//!
//! Only one of the following defines must be used to specify the length field
//! for CCM operations (L):
//!
//! - \b AES_CFG_CCM_L_2 - 2 bytes
//! - \b AES_CFG_CCM_L_4 - 4 bytes
//! - \b AES_CFG_CCM_L_8 - 8 bytes
//!
//! Only one of the following defines must be used to specify the length of the
//! authentication field for CCM operations (M) through the \e ui32Config
//! argument in the AESConfigSet() function:
//!
//! - \b AES_CFG_CCM_M_4 - 4 bytes
//! - \b AES_CFG_CCM_M_6 - 6 bytes
//! - \b AES_CFG_CCM_M_8 - 8 bytes
//! - \b AES_CFG_CCM_M_10 - 10 bytes
//! - \b AES_CFG_CCM_M_12 - 12 bytes
//! - \b AES_CFG_CCM_M_14 - 14 bytes
//! - \b AES_CFG_CCM_M_16 - 16 bytes
//!
//! \return None.
//
//*****************************************************************************
void
AESConfigSet(uint32_t ui32Base, uint32_t ui32Config)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32Config & AES_CFG_DIR_ENCRYPT) ||
(ui32Config & AES_CFG_DIR_DECRYPT));
ASSERT((ui32Config & AES_CFG_KEY_SIZE_128BIT) ||
(ui32Config & AES_CFG_KEY_SIZE_192BIT) ||
(ui32Config & AES_CFG_KEY_SIZE_256BIT));
ASSERT((ui32Config & AES_CFG_MODE_ECB) ||
(ui32Config & AES_CFG_MODE_CBC) ||
(ui32Config & AES_CFG_MODE_CTR) ||
(ui32Config & AES_CFG_MODE_ICM) ||
(ui32Config & AES_CFG_MODE_CFB) ||
(ui32Config & AES_CFG_MODE_XTS_TWEAKJL) ||
(ui32Config & AES_CFG_MODE_XTS_K2IJL) ||
(ui32Config & AES_CFG_MODE_XTS_K2ILJ0) ||
(ui32Config & AES_CFG_MODE_F8) ||
(ui32Config & AES_CFG_MODE_F9) ||
(ui32Config & AES_CFG_MODE_CTR) ||
(ui32Config & AES_CFG_MODE_CBCMAC) ||
(ui32Config & AES_CFG_MODE_GCM_HLY0ZERO) ||
(ui32Config & AES_CFG_MODE_GCM_HLY0CALC) ||
(ui32Config & AES_CFG_MODE_GCM_HY0CALC) ||
(ui32Config & AES_CFG_MODE_CCM));
ASSERT(((ui32Config & AES_CFG_MODE_CTR) ||
(ui32Config & AES_CFG_MODE_GCM_HLY0ZERO) ||
(ui32Config & AES_CFG_MODE_GCM_HLY0CALC) ||
(ui32Config & AES_CFG_MODE_GCM_HY0CALC) ||
(ui32Config & AES_CFG_MODE_CCM)) &&
((ui32Config & AES_CFG_CTR_WIDTH_32) ||
(ui32Config & AES_CFG_CTR_WIDTH_64) ||
(ui32Config & AES_CFG_CTR_WIDTH_96) ||
(ui32Config & AES_CFG_CTR_WIDTH_128)));
ASSERT((ui32Config & AES_CFG_MODE_CCM) &&
((ui32Config & AES_CFG_CCM_L_2) ||
(ui32Config & AES_CFG_CCM_L_4) ||
(ui32Config & AES_CFG_CCM_L_8)) &&
((ui32Config & AES_CFG_CCM_M_4) ||
(ui32Config & AES_CFG_CCM_M_6) ||
(ui32Config & AES_CFG_CCM_M_8) ||
(ui32Config & AES_CFG_CCM_M_10) ||
(ui32Config & AES_CFG_CCM_M_12) ||
(ui32Config & AES_CFG_CCM_M_14) ||
(ui32Config & AES_CFG_CCM_M_16)));
//
// Backup the save context field before updating the register.
//
if(HWREG(ui32Base + AES_O_CTRL) & AES_CTRL_SAVE_CONTEXT)
{
ui32Config |= AES_CTRL_SAVE_CONTEXT;
}
//
// Write the CTRL register with the new value
//
HWREG(ui32Base + AES_O_CTRL) = ui32Config;
}
//*****************************************************************************
//
//! Writes the key 1 configuration registers, which are used for encryption or
//! decryption.
//!
//! \param ui32Base is the base address for the AES module.
//! \param pui8Key is an array of bytes, containing the key to be
//! configured. The least significant word in the 0th index.
//! \param ui32Keysize is the size of the key, which must be one of the
//! following values: \b AES_CFG_KEY_SIZE_128, \b AES_CFG_KEY_SIZE_192, or
//! \b AES_CFG_KEY_SIZE_256.
//!
//! This function writes key 1 configuration registers based on the key
//! size. This function is used in all modes.
//!
//! \return None.
//
//*****************************************************************************
void
AESKey1Set(uint32_t ui32Base, uint8_t *pui8Key, uint32_t ui32Keysize)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32Keysize == AES_CFG_KEY_SIZE_128BIT) ||
(ui32Keysize == AES_CFG_KEY_SIZE_192BIT) ||
(ui32Keysize == AES_CFG_KEY_SIZE_256BIT));
//
// With all key sizes, the first 4 words are written.
//
HWREG(ui32Base + AES_O_KEY1_0) = * ((uint32_t *)(pui8Key + 0));
HWREG(ui32Base + AES_O_KEY1_1) = * ((uint32_t *)(pui8Key + 4));
HWREG(ui32Base + AES_O_KEY1_2) = * ((uint32_t *)(pui8Key + 8));
HWREG(ui32Base + AES_O_KEY1_3) = * ((uint32_t *)(pui8Key + 12));
//
// The key is 192 or 256 bits. Write the next 2 words.
//
if(ui32Keysize != AES_CFG_KEY_SIZE_128BIT)
{
HWREG(ui32Base + AES_O_KEY1_4) = * ((uint32_t *)(pui8Key + 16));
HWREG(ui32Base + AES_O_KEY1_5) = * ((uint32_t *)(pui8Key + 20));
}
//
// The key is 256 bits. Write the last 2 words.
//
if(ui32Keysize == AES_CFG_KEY_SIZE_256BIT)
{
HWREG(ui32Base + AES_O_KEY1_6) = * ((uint32_t *)(pui8Key + 24));
HWREG(ui32Base + AES_O_KEY1_7) = * ((uint32_t *)(pui8Key + 28));
}
}
//*****************************************************************************
//
//! Writes the key 2 configuration registers, which are used for encryption or
//! decryption.
//!
//! \param ui32Base is the base address for the AES module.
//! \param pui8Key is an array of bytes, containing the key to be
//! configured. The least significant word in the 0th index.
//! \param ui32Keysize is the size of the key, which must be one of the
//! following values: \b AES_CFG_KEY_SIZE_128, \b AES_CFG_KEY_SIZE_192, or
//! \b AES_CFG_KEY_SIZE_256.
//!
//! This function writes the key 2 configuration registers based on the key
//! size. This function is used in the F8, F9, XTS, CCM, and CBC-MAC modes.
//!
//! \return None.
//
//*****************************************************************************
void
AESKey2Set(uint32_t ui32Base, uint8_t *pui8Key, uint32_t ui32Keysize)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32Keysize == AES_CFG_KEY_SIZE_128BIT) ||
(ui32Keysize == AES_CFG_KEY_SIZE_192BIT) ||
(ui32Keysize == AES_CFG_KEY_SIZE_256BIT));
//
// With all key sizes, the first 4 words are written.
//
HWREG(ui32Base + AES_O_KEY2_0) = * ((uint32_t *)(pui8Key + 0));
HWREG(ui32Base + AES_O_KEY2_1) = * ((uint32_t *)(pui8Key + 4));
HWREG(ui32Base + AES_O_KEY2_2) = * ((uint32_t *)(pui8Key + 8));
HWREG(ui32Base + AES_O_KEY2_3) = * ((uint32_t *)(pui8Key + 12));
//
// The key is 192 or 256 bits. Write the next 2 words.
//
if(ui32Keysize != AES_CFG_KEY_SIZE_128BIT)
{
HWREG(ui32Base + AES_O_KEY2_4) = * ((uint32_t *)(pui8Key + 16));
HWREG(ui32Base + AES_O_KEY2_5) = * ((uint32_t *)(pui8Key + 20));
}
//
// The key is 256 bits. Write the last 2 words.
//
if(ui32Keysize == AES_CFG_KEY_SIZE_256BIT)
{
HWREG(ui32Base + AES_O_KEY2_6) = * ((uint32_t *)(pui8Key + 24));
HWREG(ui32Base + AES_O_KEY2_7) = * ((uint32_t *)(pui8Key + 28));
}
}
//*****************************************************************************
//
//! Writes key 3 configuration registers, which are used for encryption or
//! decryption.
//!
//! \param ui32Base is the base address for the AES module.
//! \param pui8Key is a pointer to an array bytes, containing
//! the key to be configured. The least significant word is in the 0th index.
//!
//! This function writes the key 2 configuration registers with key 3 data
//! used in CBC-MAC and F8 modes. This key is always 128 bits.
//!
//! \return None.
//
//*****************************************************************************
void
AESKey3Set(uint32_t ui32Base, uint8_t *pui8Key)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Write the key into the upper 4 key registers
//
HWREG(ui32Base + AES_O_KEY2_4) = * ((uint32_t *)(pui8Key + 0));
HWREG(ui32Base + AES_O_KEY2_5) = * ((uint32_t *)(pui8Key + 4));
HWREG(ui32Base + AES_O_KEY2_6) = * ((uint32_t *)(pui8Key + 8));
HWREG(ui32Base + AES_O_KEY2_7) = * ((uint32_t *)(pui8Key + 12));
}
//*****************************************************************************
//
//! Writes the Initial Vector (IV) register, needed in some of the AES Modes.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8IVdata is an array of 16 bytes (128 bits), containing the IV
//! value to be configured. The least significant word is in the 0th index.
//!
//! This functions writes the initial vector registers in the AES module.
//!
//! \return None.
//
//*****************************************************************************
void
AESIVSet(uint32_t ui32Base, uint8_t *pui8IVdata)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Write the initial vector registers.
//
HWREG(ui32Base + AES_O_IV_IN_0) = *((uint32_t *)(pui8IVdata+0));
HWREG(ui32Base + AES_O_IV_IN_1) = *((uint32_t *)(pui8IVdata+4));
HWREG(ui32Base + AES_O_IV_IN_2) = *((uint32_t *)(pui8IVdata+8));
HWREG(ui32Base + AES_O_IV_IN_3) = *((uint32_t *)(pui8IVdata+12));
}
//*****************************************************************************
//
//! Reads the Initial Vector (IV) register, needed in some of the AES Modes.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8IVdata is pointer to an array of 16 bytes.
//!
//! This functions reads the initial vector registers in the AES module.
//!
//! \return None.
//
//*****************************************************************************
void
AESIVGet(uint32_t ui32Base, uint8_t *pui8IVdata)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Write the initial vector registers.
//
*((uint32_t *)(pui8IVdata+ 0)) = HWREG(ui32Base + AES_O_IV_IN_0);
*((uint32_t *)(pui8IVdata+ 4)) = HWREG(ui32Base + AES_O_IV_IN_1);
*((uint32_t *)(pui8IVdata+ 8)) = HWREG(ui32Base + AES_O_IV_IN_2);
*((uint32_t *)(pui8IVdata+12)) = HWREG(ui32Base + AES_O_IV_IN_3);
}
//*****************************************************************************
//
//! Saves the tag registers to a user-defined location.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8TagData is pointer to the location that stores the tag data.
//!
//! This function stores the tag data for use authenticated encryption and
//! decryption operations.
//!
//! \return None.
//
//*****************************************************************************
void
AESTagRead(uint32_t ui32Base, uint8_t *pui8TagData)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Read the tag data.
//
*((uint32_t *)(pui8TagData+0)) = HWREG((ui32Base + AES_O_TAG_OUT_0));
*((uint32_t *)(pui8TagData+4)) = HWREG((ui32Base + AES_O_TAG_OUT_1));
*((uint32_t *)(pui8TagData+8)) = HWREG((ui32Base + AES_O_TAG_OUT_2));
*((uint32_t *)(pui8TagData+12)) = HWREG((ui32Base + AES_O_TAG_OUT_3));
}
//*****************************************************************************
//
//! Used to set the write crypto data length in the AES module.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui64Length is the crypto data length in bytes.
//!
//! This function stores the cryptographic data length in blocks for all modes.
//! Data lengths up to (2^61 - 1) bytes are allowed. For GCM, any value up
//! to (2^36 - 2) bytes are allowed because a 32-bit block counter is used. For
//! basic modes (ECB/CBC/CTR/ICM/CFB128), zero can be programmed into the
//! length field, indicating that the length is infinite.
//!
//! When this function is called, the engine is triggered to start using
//! this context.
//!
//! \note This length does not include the authentication-only data used in
//! some modes. Use the AESAuthLengthSet() function to specify the
//! authentication data length.
//!
//! \return None
//
//*****************************************************************************
void
AESDataLengthSet(uint32_t ui32Base, uint64_t ui64Length)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Write the length register by shifting the 64-bit ui64Length.
//
HWREG(ui32Base + AES_O_C_LENGTH_0) = (uint32_t)(ui64Length);
HWREG(ui32Base + AES_O_C_LENGTH_1) = (uint32_t)(ui64Length >> 32);
}
//*****************************************************************************
//
//! Sets the optional additional authentication data (AAD) length.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui32Length is the length in bytes.
//!
//! This function is only used to write the authentication data length in the
//! combined modes (GCM or CCM) and XTS mode. Supported AAD lengths for CCM
//! are from 0 to (2^16 - 28) bytes. For GCM, any value up to (2^32 - 1) can
//! be used. For XTS mode, this register is used to load j. Loading of j is
//! only required if j != 0. j represents the sequential number of the 128-bit
//! blocks inside the data unit. Consequently, j must be multiplied by 16
//! when passed to this function, thereby placing the block number in
//! bits [31:4] of the register.
//!
//! When this function is called, the engine is triggered to start using
//! this context for GCM and CCM.
//!
//! \return None
//
//*****************************************************************************
void
AESAuthDataLengthSet(uint32_t ui32Base, uint32_t ui32Length)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Write the length into the register.
//
HWREG(ui32Base + AES_O_AUTH_LENGTH) = ui32Length;
}
//*****************************************************************************
//
//! Reads plaintext/ciphertext from data registers without blocking.
//! This api writes data in blocks
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8Dest is a pointer to an array of words of data.
//! \param ui8Length the length can be from 1 to 16
//!
//! This function reads a block of either plaintext or ciphertext out of the
//! AES module. If the output data is not ready, the function returns
//! false. If the read completed successfully, the function returns true.
//! A block is 16 bytes or 4 words.
//!
//! \return true or false.
//
//*****************************************************************************
bool
AESDataReadNonBlocking(uint32_t ui32Base, uint8_t *pui8Dest, uint8_t ui8Length)
{
volatile uint32_t pui32Dest[4];
uint8_t ui8BytCnt;
uint8_t *pui8DestTemp;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
if((ui8Length == 0)||(ui8Length>16))
{
return(false);
}
//
// Check if the output is ready before reading the data. If it not ready,
// return false.
//
if((AES_CTRL_OUTPUT_READY & (HWREG(ui32Base + AES_O_CTRL))) == 0)
{
return(false);
}
//
// Read a block of data from the data registers
//
pui32Dest[0] = HWREG(ui32Base + AES_O_DATA_IN_3);
pui32Dest[1] = HWREG(ui32Base + AES_O_DATA_IN_2);
pui32Dest[2] = HWREG(ui32Base + AES_O_DATA_IN_1);
pui32Dest[3] = HWREG(ui32Base + AES_O_DATA_IN_0);
//
//Copy the data to a block memory
//
pui8DestTemp = (uint8_t *)pui32Dest;
for(ui8BytCnt = 0; ui8BytCnt < ui8Length ; ui8BytCnt++)
{
*(pui8Dest+ui8BytCnt) = *(pui8DestTemp+ui8BytCnt);
}
//
// Read successful, return true.
//
return(true);
}
//*****************************************************************************
//
//! Reads plaintext/ciphertext from data registers with blocking.
//! This api writes data in blocks
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8Dest is a pointer to an array of words.
//! \param ui8Length is the length of data in bytes to be read.
//! ui8Length can be from 1 to 16
//!
//! This function reads a block of either plaintext or ciphertext out of the
//! AES module. If the output is not ready, the function waits until it
//! is ready. A block is 16 bytes or 4 words.
//!
//! \return None.
//
//*****************************************************************************
void
AESDataRead(uint32_t ui32Base, uint8_t *pui8Dest, uint8_t ui8Length)
{
volatile uint32_t pui32Dest[4];
uint8_t ui8BytCnt;
uint8_t *pui8DestTemp;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
if((ui8Length == 0)||(ui8Length>16))
{
return;
}
//
// Wait for the output to be ready before reading the data.
//
while((AES_CTRL_OUTPUT_READY & (HWREG(ui32Base + AES_O_CTRL))) == 0)
{
}
//
// Read a block of data from the data registers
//
pui32Dest[0] = HWREG(ui32Base + AES_O_DATA_IN_3);
pui32Dest[1] = HWREG(ui32Base + AES_O_DATA_IN_2);
pui32Dest[2] = HWREG(ui32Base + AES_O_DATA_IN_1);
pui32Dest[3] = HWREG(ui32Base + AES_O_DATA_IN_0);
//
//Copy the data to a block memory
//
pui8DestTemp = (uint8_t *)pui32Dest;
for(ui8BytCnt = 0; ui8BytCnt < ui8Length ; ui8BytCnt++)
{
*(pui8Dest+ui8BytCnt) = *(pui8DestTemp+ui8BytCnt);
}
return;
}
//*****************************************************************************
//
//! Writes plaintext/ciphertext to data registers without blocking.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8Src is a pointer to an array of words of data.
//! \param ui8Length the length can be from 1 to 16
//!
//! This function writes a block of either plaintext or ciphertext into the
//! AES module. If the input is not ready, the function returns false
//! If the write completed successfully, the function returns true.
//!
//! \return True or false.
//
//*****************************************************************************
bool
AESDataWriteNonBlocking(uint32_t ui32Base, uint8_t *pui8Src, uint8_t ui8Length)
{
volatile uint32_t pui32Src[4]={0,0,0,0};
uint8_t ui8BytCnt;
uint8_t *pui8SrcTemp;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
if((ui8Length == 0)||(ui8Length>16))
{
return(false);
}
//
// Check if the input is ready. If not, then return false.
//
if(!(AES_CTRL_INPUT_READY & (HWREG(ui32Base + AES_O_CTRL))))
{
return(false);
}
//
//Copy the data to a block memory
//
pui8SrcTemp = (uint8_t *)pui32Src;
for(ui8BytCnt = 0; ui8BytCnt < ui8Length ; ui8BytCnt++)
{
*(pui8SrcTemp+ui8BytCnt) = *(pui8Src+ui8BytCnt);
}
//
// Write a block of data into the data registers.
//
HWREG(ui32Base + AES_O_DATA_IN_3) = pui32Src[0];
HWREG(ui32Base + AES_O_DATA_IN_2) = pui32Src[1];
HWREG(ui32Base + AES_O_DATA_IN_1) = pui32Src[2];
HWREG(ui32Base + AES_O_DATA_IN_0) = pui32Src[3];
//
// Write successful, return true.
//
return(true);
}
//*****************************************************************************
//
//! Writes plaintext/ciphertext to data registers with blocking.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8Src is a pointer to an array of bytes.
//! \param ui8Length the length can be from 1 to 16
//!
//! This function writes a block of either plaintext or ciphertext into the
//! AES module. If the input is not ready, the function waits until it is
//! ready before performing the write.
//!
//! \return None.
//
//*****************************************************************************
void
AESDataWrite(uint32_t ui32Base, uint8_t *pui8Src, uint8_t ui8Length)
{
volatile uint32_t pui32Src[4]={0,0,0,0};
uint8_t ui8BytCnt;
uint8_t *pui8SrcTemp;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
if((ui8Length == 0)||(ui8Length>16))
{
return;
}
//
// Wait for input ready.
//
while((AES_CTRL_INPUT_READY & (HWREG(ui32Base + AES_O_CTRL))) == 0)
{
}
//
//Copy the data to a block memory
//
pui8SrcTemp = (uint8_t *)pui32Src;
for(ui8BytCnt = 0; ui8BytCnt < ui8Length ; ui8BytCnt++)
{
*(pui8SrcTemp+ui8BytCnt) = *(pui8Src+ui8BytCnt);
}
//
// Write a block of data into the data registers.
//
HWREG(ui32Base + AES_O_DATA_IN_3) = pui32Src[0];
HWREG(ui32Base + AES_O_DATA_IN_2) = pui32Src[1];
HWREG(ui32Base + AES_O_DATA_IN_1) = pui32Src[2];
HWREG(ui32Base + AES_O_DATA_IN_0) = pui32Src[3];
}
//*****************************************************************************
//
//! Used to process(transform) blocks of data, either encrypt or decrypt it.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8Src is a pointer to the memory location where the input data
//! is stored.
//! \param pui8Dest is a pointer to the memory location output is written.
//! \param ui32Length is the length of the cryptographic data in bytes.
//!
//! This function iterates the encryption or decryption mechanism number over
//! the data length. Before calling this function, ensure that the AES
//! module is properly configured the key, data size, mode, etc. Only ECB,
//! CBC, CTR, ICM, CFB, XTS and F8 operating modes should be used. The data
//! is processed in 4-word (16-byte) blocks.
//!
//! \note This function only supports values of \e ui32Length less than 2^32,
//! because the memory size is restricted to between 0 to 2^32 bytes.
//!
//! \return Returns true if data was processed successfully. Returns false
//! if data processing failed.
//
//*****************************************************************************
bool
AESDataProcess(uint32_t ui32Base, uint8_t *pui8Src, uint8_t *pui8Dest,
uint32_t ui32Length)
{
uint32_t ui32Count, ui32BlkCount, ui32ByteCount;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Write the length register first, which triggers the engine to start
// using this context.
//
AESDataLengthSet(AES_BASE, (uint64_t) ui32Length);
//
// Now loop until the blocks are written.
//
ui32BlkCount = ui32Length/16;
for(ui32Count = 0; ui32Count < ui32BlkCount; ui32Count += 1)
{
//
// Write the data registers.
//
AESDataWrite(ui32Base, pui8Src + (ui32Count*16) ,16);
//
// Read the data registers.
//
AESDataRead(ui32Base, pui8Dest + (ui32Count*16) ,16);
}
//
//Now handle the residue bytes
//
ui32ByteCount = ui32Length%16;
if(ui32ByteCount)
{
//
// Write the data registers.
//
AESDataWrite(ui32Base, pui8Src + (16*ui32BlkCount) ,ui32ByteCount);
//
// Read the data registers.
//
AESDataRead(ui32Base, pui8Dest + (16*ui32BlkCount) ,ui32ByteCount);
}
//
// Return true to indicate successful completion of the function.
//
return(true);
}
//*****************************************************************************
//
//! Used to generate message authentication code (MAC) using CBC-MAC and F9 mode.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8Src is a pointer to the memory location where the input data
//! is stored.
//! \param ui32Length is the length of the cryptographic data in bytes.
//! \param pui8Tag is a pointer to a 4-word array where the hash tag is
//! written.
//!
//! This function processes data to produce a hash tag that can be used tor
//! authentication. Before calling this function, ensure that the AES
//! module is properly configured the key, data size, mode, etc. Only
//! CBC-MAC and F9 modes should be used.
//!
//! \return Returns true if data was processed successfully. Returns false
//! if data processing failed.
//
//*****************************************************************************
bool
AESDataMAC(uint32_t ui32Base, uint8_t *pui8Src, uint32_t ui32Length,
uint8_t *pui8Tag)
{
uint32_t ui32Count, ui32BlkCount, ui32ByteCount;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Write the length register first, which triggers the engine to start
// using this context.
//
AESDataLengthSet(AES_BASE, (uint64_t) ui32Length);
//
// Write the data registers.
//
//
// Now loop until the blocks are written.
//
ui32BlkCount = ui32Length/16;
for(ui32Count = 0; ui32Count < ui32BlkCount; ui32Count += 1)
{
//
// Write the data registers.
//
AESDataWrite(ui32Base, pui8Src + ui32Count*16 ,16);
}
//
//Now handle the residue bytes
//
ui32ByteCount = ui32Length%16;
if(ui32ByteCount)
{
//
// Write the data registers.
//
AESDataWrite(ui32Base, pui8Src + (ui32Count*ui32BlkCount) ,ui32ByteCount);
}
//
// Wait for the context data regsiters to be ready.
//
while((AES_CTRL_SVCTXTRDY & (HWREG(AES_BASE + AES_O_CTRL))) == 0)
{
}
//
// Read the hash tag value.
//
AESTagRead(AES_BASE, pui8Tag);
//
// Return true to indicate successful completion of the function.
//
return(true);
}
//*****************************************************************************
//
//! Used for Authenticated encryption (AE) of the data. Processes and authenticates blocks of data,
//! either encrypt the data or decrypt the data.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pui8Src is a pointer to the memory location where the input data
//! is stored. The data must be padded to the 16-byte boundary.
//! \param pui8Dest is a pointer to the memory location output is written.
//! The space for written data must be rounded up to the 16-byte boundary.
//! \param ui32Length is the length of the cryptographic data in bytes.
//! \param pui8AuthSrc is a pointer to the memory location where the
//! additional authentication data is stored. The data must be padded to the
//! 16-byte boundary.
//! \param ui32AuthLength is the length of the additional authentication
//! data in bytes.
//! \param pui8Tag is a pointer to a 4-word array where the hash tag is
//! written.
//!
//! This function encrypts or decrypts blocks of data in addition to
//! authentication data. A hash tag is also produced. Before calling this
//! function, ensure that the AES module is properly configured the key,
//! data size, mode, etc. Only CCM and GCM modes should be used.
//!
//! \return Returns true if data was processed successfully. Returns false
//! if data processing failed.
//
//*****************************************************************************
bool
AESDataProcessAE(uint32_t ui32Base, uint8_t *pui8Src, uint8_t *pui8Dest,
uint32_t ui32Length, uint8_t *pui8AuthSrc,
uint32_t ui32AuthLength, uint8_t *pui8Tag)
{
uint32_t ui32Count;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Set the data length.
//
AESDataLengthSet(AES_BASE, (uint64_t) ui32Length);
//
// Set the additional authentication data length.
//
AESAuthDataLengthSet(AES_BASE, ui32AuthLength);
//
// Now loop until the authentication data blocks are written.
//
for(ui32Count = 0; ui32Count < ui32AuthLength; ui32Count += 16)
{
//
// Write the data registers.
//
AESDataWrite(ui32Base, pui8AuthSrc + (ui32Count),16);
}
//
// Now loop until the data blocks are written.
//
for(ui32Count = 0; ui32Count < ui32Length; ui32Count += 16)
{
//
// Write the data registers.
//
AESDataWrite(ui32Base, pui8Src + (ui32Count),16);
//
//
// Read the data registers.
//
AESDataRead(ui32Base, pui8Dest + (ui32Count),16);
}
//
// Wait for the context data regsiters to be ready.
//
while((AES_CTRL_SVCTXTRDY & (HWREG(AES_BASE + AES_O_CTRL))) == 0)
{
}
//
// Read the hash tag value.
//
AESTagRead(AES_BASE, pui8Tag);
//
// Return true to indicate successful completion of the function.
//
return(true);
}
//*****************************************************************************
//
//! Returns the current AES module interrupt status.
//!
//! \param ui32Base is the base address of the AES module.
//! \param bMasked is \b false if the raw interrupt status is required and
//! \b true if the masked interrupt status is required.
//!
//! \return Returns a bit mask of the interrupt sources, which is a logical OR
//! of any of the following:
//!
//! - \b AES_INT_CONTEXT_IN - Context interrupt
//! - \b AES_INT_CONTEXT_OUT - Authentication tag (and IV) interrupt.
//! - \b AES_INT_DATA_IN - Data input interrupt
//! - \b AES_INT_DATA_OUT - Data output interrupt
//! - \b AES_INT_DMA_CONTEXT_IN - Context DMA done interrupt
//! - \b AES_INT_DMA_CONTEXT_OUT - Authentication tag (and IV) DMA done
//! interrupt
//! - \b AES_INT_DMA_DATA_IN - Data input DMA done interrupt
//! - \b AES_INT_DMA_DATA_OUT - Data output DMA done interrupt
//
//*****************************************************************************
uint32_t
AESIntStatus(uint32_t ui32Base, bool bMasked)
{
uint32_t ui32Temp;
uint32_t ui32IrqEnable;
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Read the IRQ status register and return the value.
//
if(bMasked)
{
ui32Temp = HWREG(DTHE_BASE + DTHE_O_AES_MIS);
ui32IrqEnable = HWREG(ui32Base + AES_O_IRQENABLE);
return((HWREG(ui32Base + AES_O_IRQSTATUS) &
ui32IrqEnable) | ((ui32Temp & 0x0000000F) << 16));
}
else
{
ui32Temp = HWREG(DTHE_BASE + DTHE_O_AES_RIS);
return(HWREG(ui32Base + AES_O_IRQSTATUS) |
((ui32Temp & 0x0000000F) << 16));
}
}
//*****************************************************************************
//
//! Enables AES module interrupts.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui32IntFlags is a bit mask of the interrupt sources to enable.
//!
//! This function enables the interrupts in the AES module. The \e ui32IntFlags
//! parameter is the logical OR of any of the following:
//!
//! - \b AES_INT_CONTEXT_IN - Context interrupt
//! - \b AES_INT_CONTEXT_OUT - Authentication tag (and IV) interrupt
//! - \b AES_INT_DATA_IN - Data input interrupt
//! - \b AES_INT_DATA_OUT - Data output interrupt
//! - \b AES_INT_DMA_CONTEXT_IN - Context DMA done interrupt
//! - \b AES_INT_DMA_CONTEXT_OUT - Authentication tag (and IV) DMA done
//! interrupt
//! - \b AES_INT_DMA_DATA_IN - Data input DMA done interrupt
//! - \b AES_INT_DMA_DATA_OUT - Data output DMA done interrupt
//!
//! \note Interrupts that have been previously been enabled are not disabled
//! when this function is called.
//!
//! \return None.
//
//*****************************************************************************
void
AESIntEnable(uint32_t ui32Base, uint32_t ui32IntFlags)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32IntFlags == AES_INT_CONTEXT_IN) ||
(ui32IntFlags == AES_INT_CONTEXT_OUT) ||
(ui32IntFlags == AES_INT_DATA_IN) ||
(ui32IntFlags == AES_INT_DATA_OUT) ||
(ui32IntFlags == AES_INT_DMA_CONTEXT_IN) ||
(ui32IntFlags == AES_INT_DMA_CONTEXT_OUT) ||
(ui32IntFlags == AES_INT_DMA_DATA_IN) ||
(ui32IntFlags == AES_INT_DMA_DATA_OUT));
//
// Set the flags.
//
HWREG(DTHE_BASE + DTHE_O_AES_IM) &= ~((ui32IntFlags & 0x000F0000) >> 16);
HWREG(ui32Base + AES_O_IRQENABLE) |= ui32IntFlags & 0x0000ffff;
}
//*****************************************************************************
//
//! Disables AES module interrupts.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui32IntFlags is a bit mask of the interrupt sources to disable.
//!
//! This function disables the interrupt sources in the AES module. The
//! \e ui32IntFlags parameter is the logical OR of any of the following:
//!
//! - \b AES_INT_CONTEXT_IN - Context interrupt
//! - \b AES_INT_CONTEXT_OUT - Authentication tag (and IV) interrupt
//! - \b AES_INT_DATA_IN - Data input interrupt
//! - \b AES_INT_DATA_OUT - Data output interrupt
//! - \b AES_INT_DMA_CONTEXT_IN - Context DMA done interrupt
//! - \b AES_INT_DMA_CONTEXT_OUT - Authentication tag (and IV) DMA done
//! interrupt
//! - \b AES_INT_DMA_DATA_IN - Data input DMA done interrupt
//! - \b AES_INT_DMA_DATA_OUT - Data output DMA done interrupt
//!
//! \note The DMA done interrupts are the only interrupts that can be cleared.
//! The remaining interrupts can be disabled instead using AESIntDisable().
//!
//! \return None.
//
//*****************************************************************************
void
AESIntDisable(uint32_t ui32Base, uint32_t ui32IntFlags)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32IntFlags == AES_INT_CONTEXT_IN) ||
(ui32IntFlags == AES_INT_CONTEXT_OUT) ||
(ui32IntFlags == AES_INT_DATA_IN) ||
(ui32IntFlags == AES_INT_DATA_OUT) ||
(ui32IntFlags == AES_INT_DMA_CONTEXT_IN) ||
(ui32IntFlags == AES_INT_DMA_CONTEXT_OUT) ||
(ui32IntFlags == AES_INT_DMA_DATA_IN) ||
(ui32IntFlags == AES_INT_DMA_DATA_OUT));
//
// Clear the flags.
//
HWREG(DTHE_BASE + DTHE_O_AES_IM) |= ((ui32IntFlags & 0x000F0000) >> 16);
HWREG(ui32Base + AES_O_IRQENABLE) &= ~(ui32IntFlags & 0x0000ffff);
}
//*****************************************************************************
//
//! Clears AES module interrupts.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui32IntFlags is a bit mask of the interrupt sources to disable.
//!
//! This function clears the interrupt sources in the AES module. The
//! \e ui32IntFlags parameter is the logical OR of any of the following:
//!
//! - \b AES_INT_DMA_CONTEXT_IN - Context DMA done interrupt
//! - \b AES_INT_DMA_CONTEXT_OUT - Authentication tag (and IV) DMA done
//! interrupt
//! - \b AES_INT_DMA_DATA_IN - Data input DMA done interrupt
//! - \b AES_INT_DMA_DATA_OUT - Data output DMA done interrupt
//!
//! \note Only the DMA done interrupts can be cleared. The remaining
//! interrupts should be disabled with AESIntDisable().
//!
//! \return None.
//
//*****************************************************************************
void
AESIntClear(uint32_t ui32Base, uint32_t ui32IntFlags)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32IntFlags == AES_INT_DMA_CONTEXT_IN) ||
(ui32IntFlags == AES_INT_DMA_CONTEXT_OUT) ||
(ui32IntFlags == AES_INT_DMA_DATA_IN) ||
(ui32IntFlags == AES_INT_DMA_DATA_OUT));
HWREG(DTHE_BASE + DTHE_O_AES_IC) = ((ui32IntFlags >> 16) & 0x0000000F);
}
//*****************************************************************************
//
//! Registers an interrupt handler for the AES module.
//!
//! \param ui32Base is the base address of the AES module.
//! \param pfnHandler is a pointer to the function to be called when the
//! enabled AES interrupts occur.
//!
//! This function registers the interrupt handler in the interrupt vector
//! table, and enables AES interrupts on the interrupt controller; specific AES
//! interrupt sources must be enabled using AESIntEnable(). The interrupt
//! handler being registered must clear the source of the interrupt using
//! AESIntClear().
//!
//! If the application is using a static interrupt vector table stored in
//! flash, then it is not necessary to register the interrupt handler this way.
//! Instead, IntEnable() is used to enable AES interrupts on the
//! interrupt controller.
//!
//! \sa IntRegister() for important information about registering interrupt
//! handlers.
//!
//! \return None.
//
//*****************************************************************************
void
AESIntRegister(uint32_t ui32Base, void(*pfnHandler)(void))
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Register the interrupt handler.
//
IntRegister(INT_AES, pfnHandler);
//
// Enable the interrupt
//
IntEnable(INT_AES);
}
//*****************************************************************************
//
//! Unregisters an interrupt handler for the AES module.
//!
//! \param ui32Base is the base address of the AES module.
//!
//! This function unregisters the previously registered interrupt handler and
//! disables the interrupt in the interrupt controller.
//!
//! \sa IntRegister() for important information about registering interrupt
//! handlers.
//!
//! \return None.
//
//*****************************************************************************
void
AESIntUnregister(uint32_t ui32Base)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
//
// Disable the interrupt.
//
IntDisable(INT_AES);
//
// Unregister the interrupt handler.
//
IntUnregister(INT_AES);
}
//*****************************************************************************
//
//! Enables uDMA requests for the AES module.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui32Flags is a bit mask of the uDMA requests to be enabled.
//!
//! This function enables the uDMA request sources in the AES module.
//! The \e ui32Flags parameter is the logical OR of any of the following:
//!
//! - \b AES_DMA_DATA_IN
//! - \b AES_DMA_DATA_OUT
//! - \b AES_DMA_CONTEXT_IN
//! - \b AES_DMA_CONTEXT_OUT
//!
//! \return None.
//
//*****************************************************************************
void
AESDMAEnable(uint32_t ui32Base, uint32_t ui32Flags)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32Flags == AES_DMA_DATA_IN) ||
(ui32Flags == AES_DMA_DATA_OUT) ||
(ui32Flags == AES_DMA_CONTEXT_IN) ||
(ui32Flags == AES_DMA_CONTEXT_OUT));
//
// Set the flags in the current register value.
//
HWREG(ui32Base + AES_O_SYSCONFIG) |= ui32Flags;
}
//*****************************************************************************
//
//! Disables uDMA requests for the AES module.
//!
//! \param ui32Base is the base address of the AES module.
//! \param ui32Flags is a bit mask of the uDMA requests to be disabled.
//!
//! This function disables the uDMA request sources in the AES module.
//! The \e ui32Flags parameter is the logical OR of any of the
//! following:
//!
//! - \b AES_DMA_DATA_IN
//! - \b AES_DMA_DATA_OUT
//! - \b AES_DMA_CONTEXT_IN
//! - \b AES_DMA_CONTEXT_OUT
//!
//! \return None.
//
//*****************************************************************************
void
AESDMADisable(uint32_t ui32Base, uint32_t ui32Flags)
{
//
// Check the arguments.
//
ASSERT(ui32Base == AES_BASE);
ASSERT((ui32Flags == AES_DMA_DATA_IN) ||
(ui32Flags == AES_DMA_DATA_OUT) ||
(ui32Flags == AES_DMA_CONTEXT_IN) ||
(ui32Flags == AES_DMA_CONTEXT_OUT));
//
// Clear the flags in the current register value.
//
HWREG(ui32Base + AES_O_SYSCONFIG) &= ~ui32Flags;
}
//*****************************************************************************
//
// Close the Doxygen group.
//! @}
//
//*****************************************************************************
|
NHL Game Summary - Calgary at Vancouver
Vancouver, BC (SportsNetwork.com) - Eddie Lack turned aside 22-of-23 shots to
help lift the Vancouver Canucks to a much-needed win, a 2-1 decision over the
Calgary Flames at Rogers Arena.
Yannick Weber's goal five minutes into the third period was the difference in
only Vancouver's second victory since Jan. 26. The spiraling Canucks entered
the matchup -- the first between the clubs since a Jan. 18 clash marred by
all-out brawl right after the opening faceoff that led to eight ejections --
having gone 1-10-1 in their last 12 games.
Darren Archibald got Vancouver on the board with 5:45 left in the second
period with his first career NHL goal.
Brian McGrattan scored for Calgary and Joni Ortio came up with 12 saves in the
loss, the Flames' sixth in a row to the Canucks. |
A demographic overview of the ageing of First World populations.
The ageing of the UK population, and other similar populations, is now well advanced. The process is probably irreversible and may well be repeated across the globe. It is reasonable to assume that 40-50% of the UK adult population will be over 50 for the foreseeable future, and that the number of people in their 80s and 90s will continue to increase for some decades. Growing awareness of this may well lead to a reinterpretation of the life course with consequent changes in lifestyle and activity. In the past, the main focus of design, both of products and environments, has been the working population. There is clearly an urgent need to direct attention to older sectors of the population, including: fit and active people in retirement; affluent groups in old age; single households; women, who form a majority of the over 50s; and other groups which have been neglected in many work studies. |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!-- NewPage -->
<html lang="de">
<head>
<!-- Generated by javadoc -->
<title>FunctionArbitrary (documentation 1.3.3 API)</title>
<link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="Style">
<script type="text/javascript" src="../../../../script.js"></script>
</head>
<body>
<script type="text/javascript"><!--
try {
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="FunctionArbitrary (documentation 1.3.3 API)";
}
}
catch(err) {
}
//-->
var methods = {"i0":6};
var tabs = {65535:["t0","All Methods"],2:["t2","Instance Methods"],4:["t3","Abstract Methods"]};
var altColor = "altColor";
var rowColor = "rowColor";
var tableTab = "tableTab";
var activeTableTab = "activeTableTab";
</script>
<noscript>
<div>JavaScript is disabled on your browser.</div>
</noscript>
<!-- ========= START OF TOP NAVBAR ======= -->
<div class="topNav"><a name="navbar.top">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.top.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-all.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../../net/jqwik/api/arbitraries/FloatArbitrary.html" title="interface in net.jqwik.api.arbitraries"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../../../../net/jqwik/api/arbitraries/IntegerArbitrary.html" title="interface in net.jqwik.api.arbitraries"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../../index.html?net/jqwik/api/arbitraries/FunctionArbitrary.html" target="_top">Frames</a></li>
<li><a href="FunctionArbitrary.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_top">
<li><a href="../../../../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_top");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li>Constr | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li>Constr | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.top">
<!-- -->
</a></div>
<!-- ========= END OF TOP NAVBAR ========= -->
<!-- ======== START OF CLASS DATA ======== -->
<div class="header">
<div class="subTitle">net.jqwik.api.arbitraries</div>
<h2 title="Interface FunctionArbitrary" class="title">Interface FunctionArbitrary<F,R></h2>
</div>
<div class="contentContainer">
<div class="description">
<ul class="blockList">
<li class="blockList">
<dl>
<dt><span class="paramLabel">Type Parameters:</span></dt>
<dd><code>F</code> - The exact functional type to generate</dd>
<dd><code>R</code> - The return type of the functional interface</dd>
</dl>
<dl>
<dt>All Superinterfaces:</dt>
<dd><a href="../../../../net/jqwik/api/Arbitrary.html" title="interface in net.jqwik.api">Arbitrary</a><F></dd>
</dl>
<hr>
<br>
<pre>@API(status=MAINTAINED,
since="1.3.0")
public interface <span class="typeNameLabel">FunctionArbitrary<F,R></span>
extends <a href="../../../../net/jqwik/api/Arbitrary.html" title="interface in net.jqwik.api">Arbitrary</a><F></pre>
<div class="block">Fluent interface to configure arbitraries that represent functional types</div>
</li>
</ul>
</div>
<div class="summary">
<ul class="blockList">
<li class="blockList">
<!-- ======== NESTED CLASS SUMMARY ======== -->
<ul class="blockList">
<li class="blockList"><a name="nested.class.summary">
<!-- -->
</a>
<h3>Nested Class Summary</h3>
<ul class="blockList">
<li class="blockList"><a name="nested.classes.inherited.from.class.net.jqwik.api.Arbitrary">
<!-- -->
</a>
<h3>Nested classes/interfaces inherited from interface net.jqwik.api.<a href="../../../../net/jqwik/api/Arbitrary.html" title="interface in net.jqwik.api">Arbitrary</a></h3>
<code><a href="../../../../net/jqwik/api/Arbitrary.ArbitraryFacade.html" title="class in net.jqwik.api">Arbitrary.ArbitraryFacade</a></code></li>
</ul>
</li>
</ul>
<!-- ========== METHOD SUMMARY =========== -->
<ul class="blockList">
<li class="blockList"><a name="method.summary">
<!-- -->
</a>
<h3>Method Summary</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Method Summary table, listing methods, and an explanation">
<caption><span id="t0" class="activeTableTab"><span>All Methods</span><span class="tabEnd"> </span></span><span id="t2" class="tableTab"><span><a href="javascript:show(2);">Instance Methods</a></span><span class="tabEnd"> </span></span><span id="t3" class="tableTab"><span><a href="javascript:show(4);">Abstract Methods</a></span><span class="tabEnd"> </span></span></caption>
<tr>
<th class="colFirst" scope="col">Modifier and Type</th>
<th class="colLast" scope="col">Method and Description</th>
</tr>
<tr id="i0" class="altColor">
<td class="colFirst"><code><F_> <a href="../../../../net/jqwik/api/arbitraries/FunctionArbitrary.html" title="interface in net.jqwik.api.arbitraries">FunctionArbitrary</a><F_,<a href="../../../../net/jqwik/api/arbitraries/FunctionArbitrary.html" title="type parameter in FunctionArbitrary">R</a>></code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../../net/jqwik/api/arbitraries/FunctionArbitrary.html#when-java.util.function.Predicate-java.util.function.Function-">when</a></span>(java.util.function.Predicate<java.util.List<java.lang.Object>> parameterCondition,
java.util.function.Function<java.util.List<java.lang.Object>,<a href="../../../../net/jqwik/api/arbitraries/FunctionArbitrary.html" title="type parameter in FunctionArbitrary">R</a>> answer)</code> </td>
</tr>
</table>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.net.jqwik.api.Arbitrary">
<!-- -->
</a>
<h3>Methods inherited from interface net.jqwik.api.<a href="../../../../net/jqwik/api/Arbitrary.html" title="interface in net.jqwik.api">Arbitrary</a></h3>
<code><a href="../../../../net/jqwik/api/Arbitrary.html#allValues--">allValues</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#array-java.lang.Class-">array</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#asGeneric--">asGeneric</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#collect-java.util.function.Predicate-">collect</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#dontShrink--">dontShrink</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#edgeCases--">edgeCases</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#exhaustive--">exhaustive</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#exhaustive-long-">exhaustive</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#filter-java.util.function.Predicate-">filter</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#fixGenSize-int-">fixGenSize</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#flatMap-java.util.function.Function-">flatMap</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#forEachValue-java.util.function.Consumer-">forEachValue</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#generator-int-">generator</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#ignoreException-java.lang.Class-">ignoreException</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#injectDuplicates-double-">injectDuplicates</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#injectNull-double-">injectNull</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#isUnique--">isUnique</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#iterator--">iterator</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#list--">list</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#map-java.util.function.Function-">map</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#optional--">optional</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#sample--">sample</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#sampleStream--">sampleStream</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#set--">set</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#stream--">stream</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#tuple1--">tuple1</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#tuple2--">tuple2</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#tuple3--">tuple3</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#tuple4--">tuple4</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#tuple5--">tuple5</a>, <a href="../../../../net/jqwik/api/Arbitrary.html#unique--">unique</a></code></li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
<div class="details">
<ul class="blockList">
<li class="blockList">
<!-- ============ METHOD DETAIL ========== -->
<ul class="blockList">
<li class="blockList"><a name="method.detail">
<!-- -->
</a>
<h3>Method Detail</h3>
<a name="when-java.util.function.Predicate-java.util.function.Function-">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>when</h4>
<pre><F_> <a href="../../../../net/jqwik/api/arbitraries/FunctionArbitrary.html" title="interface in net.jqwik.api.arbitraries">FunctionArbitrary</a><F_,<a href="../../../../net/jqwik/api/arbitraries/FunctionArbitrary.html" title="type parameter in FunctionArbitrary">R</a>> when(java.util.function.Predicate<java.util.List<java.lang.Object>> parameterCondition,
java.util.function.Function<java.util.List<java.lang.Object>,<a href="../../../../net/jqwik/api/arbitraries/FunctionArbitrary.html" title="type parameter in FunctionArbitrary">R</a>> answer)</pre>
<dl>
<dt><span class="paramLabel">Type Parameters:</span></dt>
<dd><code>F_</code> - The exact functional type to generate. Must be same as <code>F</code></dd>
<dt><span class="paramLabel">Parameters:</span></dt>
<dd><code>parameterCondition</code> - A predicate that's true when for the given list of parameters
<code>answer</code> should be used to produce the function' result</dd>
<dd><code>answer</code> - A function that produces a concrete answer or throws an exception</dd>
<dt><span class="returnLabel">Returns:</span></dt>
<dd>A new instance of function arbitrary</dd>
</dl>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
</div>
<!-- ========= END OF CLASS DATA ========= -->
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<div class="bottomNav"><a name="navbar.bottom">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.bottom.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../../../../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../../../../deprecated-list.html">Deprecated</a></li>
<li><a href="../../../../index-all.html">Index</a></li>
<li><a href="../../../../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../../net/jqwik/api/arbitraries/FloatArbitrary.html" title="interface in net.jqwik.api.arbitraries"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../../../../net/jqwik/api/arbitraries/IntegerArbitrary.html" title="interface in net.jqwik.api.arbitraries"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../../index.html?net/jqwik/api/arbitraries/FunctionArbitrary.html" target="_top">Frames</a></li>
<li><a href="FunctionArbitrary.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_bottom">
<li><a href="../../../../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_bottom");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li>Constr | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li>Constr | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.bottom">
<!-- -->
</a></div>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
</body>
</html>
|
Q:
Thompson's construction, The empty-expression
Why this case exists in Thompson's construction algorithm?
Isn't just a special case of:
where the symbol a is replaced by ϵ?
A:
It's not a special case since $a$ is a symbol of the alphabet whereas $\epsilon$ is a symbol representing the empty word. However, you could lump the two cases together if you wish.
It all boils down to your recursive definition of regular expression. Most definitions will have three "axioms": $a$ for $a \in \Sigma$, $\epsilon$, and $\emptyset$. This necessitates three different base cases in the construction.
|
Q:
How to select text in an element before the particular child element
In my xml document, i have this below code. I need to select the text that is present before <br/> only. How to do that?
<div id='win0divDERIVED_SCC_AD_ADDRESSLONG$0'><span class='PSLONGEDITBOX' id='DERIVED_SCC_AD_ADDRESSLONG$0'>123 Main Street <br />
Boise, ID 83702</span>
</div>
I mean i need only '123 Main Street' not '123 Main Street Boise, ID 83702'
Any clue?
A:
You can use this:
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:output method="text" indent="yes"/>
<xsl:strip-space elements="*"/>
<xsl:template match="span">
<xsl:value-of select="text()[1]"/>
</xsl:template>
</xsl:stylesheet>
|
All relevant data are within the paper and its Supporting Information files.
Introduction {#sec005}
============
Triage decisions concerning intensive care unit (ICU) admission or continued management of wards is subject to intensivists' assessments. Rapidity of care in critical situations may have a direct impact on survival \[[@pone.0181808.ref001]\]. To confront in-hospital emergency situations, rapid response teams (RRTs) have been implemented in many hospitals \[[@pone.0181808.ref002]\]. The situations in which patients remain in the ward following RRT assessment frequently occur. A later evaluation may be needed, and ICU admission could then be decided after one or several subsequent referrals \[[@pone.0181808.ref003]\]. This raises the question of the impact of such a 'later admission' compared to that of an 'immediate admission'.
Among patients not admitted at the first RRT evaluation, we aimed to identify factors associated with an increased risk of later admission compared with those in patients never admitted to ICU and to assess the prognostic impact of such a later admission compared with an immediate admission. Secondary objectives included the identification of factors associated with hospital mortality present at the time of the first RRT call as it led to a non-admission and gain knowledge on the outcome of patients never admitted.
Patients and methods {#sec006}
====================
Study framework {#sec007}
---------------
The study was conducted at the 'Institut Paoli-Calmettes', a comprehensive cancer centre in Marseille (France), where approximately 10,000 patients are hospitalised every year. The institute has four haematology units, including a bone marrow transplantation unit, three medical oncology units, two surgical oncology units and one ICU. ICU is composed of eight intensive-care beds, seven intermediate care beds and one additional bed for life-threatening situations.
Patients {#sec008}
--------
All emergency ICU requests concerning admission or advice from 1 January 2012 to 31 August 2013 were prospectively included. Planned admissions in the context of postoperative surveillance were not considered. In case of multiple requests and/or multiple ICU stays for the same patient, only the first event was analysed. Initially, patients not admitted were divided into two groups: the 'later admission' group defined as a delayed ICU admission after subsequent request(s) during the same hospitalisation and the 'no admission' group defined as no ICU admission between the first RRT call and the end of the hospitalisation. These two groups extracted from a pool of patients initially not admitted represented our study population. Hospitalised patients who were immediately admitted after the first request and patients coming from outside the institute and directly admitted to ICU formed the control group, named 'immediate admission'. The institutional review board of the 'Institut Paoli--Calmettes' approved the study and waived the need for informed consent due to the observational nature of the study.
Definitions {#sec009}
-----------
A former ICU admission was defined as a recent (\< 3 months) ICU admission not during the ingoing hospitalization. A later ICU admission was defined as a subsequent ICU admission during the same hospitalization, following at least a first request for which no ICU admission was decided. Respiratory, haemodynamic and neurological clinical events were composed of one or several items ([Table 1](#pone.0181808.t001){ref-type="table"}). Hypoxemia was defined as an oxygen saturation of \<90% on room air. Dyspnoea was defined as a difficulty in breathing at rest and/or a respiratory rate of \>30 breaths per min and/or clinical signs of respiratory distress. Acute respiratory failure (ARF) was defined as oxygen saturation of \<90% or PaO2 of \<60 mmHg on room air combined with severe dyspnoea at rest combined with inability to speak in sentences or a respiratory rate of \>30 breaths per min or clinical signs of respiratory distress \[[@pone.0181808.ref004]\]. Hypotension (systolic blood pressure \< 90 mmHg or a decrease amounting to \>40 mmHg), severe sepsis (acute organ dysfunction secondary to documented or suspected infection) and shock (severe sepsis plus hypotension not reversed by fluid resuscitation) were defined according to the criteria of the Surviving Sepsis Campaign \[[@pone.0181808.ref005]\]. Acute kidney injury was defined according to the AKIN classification scheme\[[@pone.0181808.ref006]\] as either i) serum creatinine levels of ≥26.4 μmoL/L (0.3 mg/dL) occurring within 48 h, ii) an elevation in serum creatinine levels to ≥150% from baseline or iii) a urine output of \<0.5 mL/Kg/h for 6 h or more. A 'warning' was requested by the ward physician when he judged a patient to be at risk of deteriorating in the hours or days ahead. 'Simple medical advice' concerned non-emergency situations in which the ward physician asked the senior intensivist for advice. Neutropenia was defined as an absolute neutrophil count of \<0.5 x 10^9^/L. Control of the underlying malignant disease was categorised into five levels: controlled disease (response to therapy), complete remission (normalisation of bone marrow and peripheral blood counts for haematologic malignancies; absence of any clinical, biological or radiological sign of solid malignancy after treatment), initial phase of treatment (cancer diagnosed within the past four weeks), ongoing treatment (with no definition of a therapeutic response) and disease in progression (pejorative evolution despite curative treatment or palliative management).
10.1371/journal.pone.0181808.t001
###### Reasons for ICU requests among initially not admitted patients.
{#pone.0181808.t001g}
N (%)
----------------------------------------------------------- -------- ------------
**Clinical respiratory event** **92** **(45.3)**
Hypoxemia 66
Dyspnea 40
Acute respiratory failure 19
Bad tolerated pleural effusion 5
Acute asthma 1
**Clinical hemodynamic event** **83** **(40.9)**
Hypotension 35
Severe sepsis 26
Cardiac arrythmia or conducion disorders 23
Urine output \< 0.5 ml.kg-1.h 11
Bleeding 6
Cardiac arrest 5
Shock statement 4
**Clinical neurological event** **31** **(15.3)**
Coma 4
Confusion 15
Convulsions 7
Other neurological disorder 5
**Alteration of renal function or metabolic abnormality** **23** **(11.3)**
Acute kidney injury (AKIN classification) 17
Ionic trouble 7
**Warning** **22** **(10.8)**
**Unspecified reason** **11** **(5.4)**
**Simple medical advice** **8** **(3.9)**
Role of RRT and ICU admission {#sec010}
-----------------------------
RRT involves senior intensivists and is reachable 24 h a day and 7 days a week through a dedicated number. The team provides immediate help concerning in-hospital life-threatening situations or simple medical advice. During off hours, defined as the period from 6 pm to 8 am, weekends and national holidays, a single senior intensivist is on duty to take care of ICU patients and to assure the RRT service, whereas during office hours, defined as the period from 8 am to 6 pm during weekdays, three full-time physicians are present. Decisions to admit patients to ICU were made by referring oncologists or haematologists and a senior intensivist. ICU admission is usually considered when a patient has at least one organ dysfunction. Some patients are admitted for inaugural malignancies with a view to initiating treatment to reduce the risk organ failure: malignancies involving bulky tumours (essentially lymphoma) or patients aged ≤70 years presenting with acute leukaemia with both leucocytosis (\>50 x 10^9^/L) and thrombocytopenia (\<50 x 10^9^/L) at the time of diagnosis. After clinical examination, patients were considered to stay in wards if they presented with spontaneous respiration with oxygen need ≤ 4l O2/min with no need for non-invasive mechanical ventilation therapy; stable hemodynamics with no use of vasoactive drugs; no relevant neurologic impairment; no increased serum lactate; no significant (\< 2mg/dl)blood loss during the last 24h. During the ICU stay, life-supporting interventions, anti-infectious agents, prophylactic treatments, urate oxidase use and diagnostic procedures were administered at the discretion of the attending intensivists, who followed best clinical practice and guidelines \[[@pone.0181808.ref005]\]. Chemotherapy, corticosteroids, haematopoietic growth factors, immunosuppressive drugs and other cancer-related treatments were prescribed by the haematologist/oncologist in charge of each patient in accordance with institutional guidelines \[[@pone.0181808.ref005]\]. Decisions on ICU discharge were left at the discretion of the intensivists, and patients were discharged from ICU without any non-haematological organ failure. Patients remaining in the ward following RRT assessment were managed daily by both the physician in charge of the patient and the intensivist, who could offer medical advice and eventually propose to introduce new or modify ongoing therapeutics.
Data collection {#sec011}
---------------
For each non-admission throughout the study period, the on-call RRT intensivist prospectively filled out a register specifying information concerning the time and provenance of the request, the reason for it and the reason for the non-admission. The reasons for requesting could have variable degrees of severity and are listed in [Table 1](#pone.0181808.t001){ref-type="table"}. There could be several reasons for a single request. A simple medical advice was defined as medical advice not requiring an ICU hospitalisation. An unspecified reason was defined as a request for which the reason was not collected in the register. Reasons for non-admission could be a patient considered 'too well to benefit' from an ICU admission, a patient considered 'too sick to benefit', or the lack of bed availability. Data in the tables and figures were prospectively collected. The Simplified Acute Physiology Score II \[[@pone.0181808.ref007]\] and Charlson comorbidity index \[[@pone.0181808.ref008]\] were computed at ICU admission. These scores provide an estimate of the risk of death based on patient characteristics at admission. The last follow-up date was set on 15 August 2014.
Follow-up {#sec012}
---------
The patients were followed up for at least one year using the electronic system available at the hospital. The electronic system is used for administrative and medical purposes in all services and procedures, and visits, laboratory examinations, vital signs and other data gathered during hospitalization or outpatient visits are consistently recorded along with the date and a unique identifier. The Institut Paoli-Calmettes has a policy of following its patients, and as a general rule, at least one scheduled visit every three months is required for cancer patients to be discharged. During the study period, three patients were not treated in our ICU but were transferred to other ICUs. For these patients, some ICU parameters were not included in the analysis because of data unavailability. Among these patients, one patient was lost to follow-up on ICU discharge.
Statistical analysis {#sec013}
--------------------
Categorical data were reported as percentages and analysed using chi-squared test or Fisher's exact test, according to the sample size. Continuous variables were reported as medians and quartiles (interquartile ranges) and analysed using the Mann--Whitney U test or Wilcoxon signed rank test for related samples. To identify predictive factors of a later admission among patients initially not admitted, the groups 'later admission' and 'no admission' were compared. To identify factors associated with hospital mortality present at the time of the first request, two others groups were developed from the patients initially not admitted according to their vital status at hospital discharge. Univariate analysis and multivariate logistic regression analysis were performed for these two objectives. A p-value of \<0.05 was considered statistically significant. Statistically significant variables after univariate analysis and clinically relevant variables were entered into the multivariate analysis.
Kaplan--Meier survival curves were plotted, and the log-rank test was used to compare the 'later admission' group with the 'immediate admission' group and the patients initially not admitted presenting with respiratory events with those not presenting with respiratory events.
Statistical tests were performed using the SPSS statistics software package (SPSS, Version 16.0 Chicago, IL, USA).
Results {#sec014}
=======
Characteristics of patients at the first request {#sec015}
------------------------------------------------
The characteristics of patients are shown [Table 2](#pone.0181808.t002){ref-type="table"}. During the study period, we counted 203 (45.2%) patients for whom a request led to a non-admission at least once, and 246 (54.8%) patients immediately admitted ([Fig 1](#pone.0181808.g001){ref-type="fig"}). The median age of the cohort was 61 (53--69) years, and 284 patients (63.2%) were men. Totally, 205 patients (45.7%) were hospitalised in the haematology unit, including 56 who came from the bone marrow transplantation (BMT) unit. One hundred seventy (37.8%) patients came from the medical oncology unit, 43 (9.6%) came from in the surgical oncology unit and 31 (6.9%) were directly admitted to ICU from outside the Institute. Among the 203 patients initially not admitted, 54 (26.6%) were admitted at a subsequent request with a median delay from first request of 26 (7--72) h, and 149 (73.4%) were never admitted. Three patients included in the 'later admission' group were managed in the ward pending their transfer to another ICU outside the institute. One hundred fifty-nine (78.3%) patients were considered too well to benefit, 36 (17.7%) were considered too sick to benefit and eight (4%) were not admitted because of bed unavailability. The most common reason for requests was a clinical respiratory event present in 92 (45%) patients; in this situation, hypoxemia was present in 66 (72%) patients ([Table 1](#pone.0181808.t001){ref-type="table"}).
{#pone.0181808.g001}
10.1371/journal.pone.0181808.t002
###### Factors associated with a later ICU admission among initially not admitted patients.
{#pone.0181808.t002g}
-------------------------------------------------------------------------------- ---------------------------- ------------------------------ -------------
Univariate analysis « No admission » (n = 149) « Later Admission » (n = 54) P value
Age 61 \[52--70\] 58,5 \[51,75--67,5\] 0,28
Charlson Comorbidity Index 4 \[2--6\] 3 \[2--6\] 0,3
Former surgical procedure [^1^](#t002fn001){ref-type="table-fn"} 12 (8,1) 5 (9,3) 0,78
Therapeutic limitation at the first request 11 (7,4) 2 (3,7) 0,52
Former ICU stay [^1^](#t002fn001){ref-type="table-fn"} 15 (10,1) 11 (20,4) 0,052
Hematological malignancy VS solid tumor 68 (45,6) 35 (64,8) 0,02
*Acute Leukemia* 27 (18,1) 13 (24,1) 0,35
*Chronic Lymphocytic Leukemia* 5 (3,4) 2 (3,7) 1
*Lymphoma* 23 (15,4) 15 (27,8) 0,046
*Myeloma* 11 (7,4) 1 (1,9) 0,19
*Myelodysplastic syndrome* 2 (1,3) 4 (7,4) 0,049
Level of disease control:
*Initial phase of treatment* 20 (13,4) 11 (20,4) 0,22
*Ongoing treatment* 6 (4,0) 6 (11,1) 0,06
*Controlled disease* 23 (15,4) 8 (14,8) 0,91
*Complete remission* 13 (8,7) 4 (7,4) 1
*Disease in progression* 83 (55,7) 21 (38,9) 0,03
Allogeneic HSCT 22 (14,8) 10 (18,5) 0,52
Neutropenia 27 (18,1) 16 (29,6) 0,08
Request during off hours 80 (53,7) 27 (50,0) 0,64
Reasons for requests :
*Clinical respiratory event* 59 (39,6) 33 (61,1) \<0,01
*Hemodynamic event* 64 (43,0) 19 (35,2) 0,32
*Neurological event* 23 (15,4) 8 (14,8) 0,91
*Alteration of renal function or metabolic abnormality* 15 (10,1) 8 (14,8) 0,35
*Warning about a patient likely to deteriorate in the hours or days ahead* 20 (13,4) 2 (3,7) 0,07
*Hypoxemia* 38 (25,5) 28 (51,9) \<0,01
*Shock* 24 (16,1) 11 (20,4) 0,48
*Severe sepsis* 19 (12,8) 7 (13,0) 0,97
*Acute kidney injury* 10 (6,7) 7 (13,0) 0,15
**Multivariate Analysis** **OR** **95% CI** **P value**
Clinical respiratory event 2,6 1,35--5,02 \<0,01
Neutropenia 2,25 1,06--4,80 0,03
Former ICU stay[^1^](#t002fn001){ref-type="table-fn"} 2,75 1,12--6,75 0,03
-------------------------------------------------------------------------------- ---------------------------- ------------------------------ -------------
^1^ A former ICU admission is defined as a recent (\< 3 months) ICU admission not during the ingoing hospitalization, HSCT: Hematopoietic stem cell transplantation
Variables are reported as number (percentage) or median \[IQR\].
Predictive factors for later ICU admission {#sec016}
------------------------------------------
Factors associated with later ICU admission among patients initially not admitted are presented in [Table 2](#pone.0181808.t002){ref-type="table"}. Using univariate analysis, former ICU stay, haematologic malignancy, disease control level, neutropenia, a request based on a clinical respiratory event, hypoxemia and a warning about a patient being likely to deteriorate in the hours or days ahead were associated with later ICU admission. By multivariate analysis, a request based on a clinical respiratory event, a former ICU stay and neutropenia were independently associated with later ICU admission.
Impact of later ICU ADMISSION on outcome {#sec017}
----------------------------------------
Demographic data and patient characteristics at ICU admission and during ICU stay were did not differ between the 'later admission' and 'immediate admission' groups ([Table 3](#pone.0181808.t003){ref-type="table"}). ICU and hospital survival as well as overall survival were similar for the two groups of patients ([Fig 2](#pone.0181808.g002){ref-type="fig"}). The median delay from first request to ICU admission was similar among hospital survivors and non-survivors \[25 (7--102) h and 28 (10--72) h, respectively; *p* = 0.77). The median follow-up duration was 20 months \[95% CI (18--21)\]. A later admission was associated with a worsening clinical status of the event that leaded to the first ICU referral in 53 of 54 patients (98%) of the "later admission group". In this situation the SAPS II score significantly increased between the two referral times (45 (32.25--50.75) vs 47.5 (36.25--57.25), p\<0.0001 using Wilcoxon signed rank test).
{#pone.0181808.g002}
10.1371/journal.pone.0181808.t003
###### Characteristics of ICU stay for « immediate admission » and « late admission » groups.
{#pone.0181808.t003g}
« Immediate Admission » (n = 246) « Later Admission » (n = 54) P value
-------------------------------------------------------------------------------------- ----------------------------------- --------------------------------------------------- ---------
Age 62 \[54--69\] 58,5 \[51,75--67,5\] 0,23
Male 148 (60,2) 37 (68,5) 0,25
SAPS II [\*](#t003fn002){ref-type="table-fn"} 46 \[36--55,75\] 47,5 \[36,25--57,25\] 0,53
Hematology malignancy 151 (61) 34 (64.8) 0.83
Neutropenia 84 (34) 16 (29.6) 0.52
Allogeneic HSCT 54 (22) 10 (18.5) 0.58
Main reasons for ICU admission
Respiratory failure 135 (54.8) 33 (61.1) 0.19
Shock 54 (21.9) 11 (20.4) 0.79
Severe sepsis 47 (19.1) 7 (13) 0.29
Acute kidney injury 22 (9) 7 (13) 0.36
Support during ICU stay
Invasive mechanical ventilation[\*](#t003fn002){ref-type="table-fn"} 74 (30,1) 18 (35,3) 0,46
Duration of invasive mechanical ventilation[\*](#t003fn002){ref-type="table-fn"} 4 \[1,75--11,25\] 4 \[1--10\] 0,78
Non Invasive Ventilation[\*](#t003fn002){ref-type="table-fn"} 74 (30,1) 20 (39,2) 0,41
High Flow Oxygen Therapy[\*](#t003fn002){ref-type="table-fn"} 45 (18,3) 15 (29,4) 0,07
Norepinephrine[\*](#t003fn002){ref-type="table-fn"} 94 (38,2) 16 (31,4) 0,36
Epinephrine[\*](#t003fn002){ref-type="table-fn"} 11 (4,5) 2 (3,9) 0,61
Renal replacement therapy[\*](#t003fn002){ref-type="table-fn"} 45 (18,3) 13 (25,5) 0,24
Transfusion of blood products[\*](#t003fn002){ref-type="table-fn"} 125 (50,8) 31 (60,8) 0,19
ICU length of stay[\*](#t003fn002){ref-type="table-fn"} 5 \[3--10\] 6 \[4--12\] 0,051
ICU length of stay (ICU survivors only)[\*](#t003fn002){ref-type="table-fn"} 5 \[3--9\] 5,5 \[4--12\] 0,09
ICU mortality 53 (21.5) 16 (29.6) 0.20
Hospital mortality 64 (26) 18/53 (34)[\*\*](#t003fn003){ref-type="table-fn"} 0.24
Variables are reported as number (percentage) or median \[IQR\].
\* For ICU parameters, only patients who stayed at the ICU of the institute (n = 51) were described (3 patients transferred in other ICUs were excluded from the analysis, since information regarding ICU treatments was not available).
\*\*Total effective of 53 patients (vital status not known for 1 of the patients transferred to another hospital), HSCT: Hematopoietic stem cell transplantation.
Factors associated with mortality {#sec018}
---------------------------------
For patients initially not admitted, hospital mortality was 29.7% (60/202). Factors associated with hospital mortality among patients initially not admitted are shown in [Table 4](#pone.0181808.t004){ref-type="table"}. By multivariate analysis, disease in progression, allogeneic hematopoietic stem cell transplantation (HSCT) and a request based on clinically respiratory events were independently associated with hospital mortality, whereas a request based on severe sepsis was independently associated with survival. [Fig 3](#pone.0181808.g003){ref-type="fig"} displays data on the significantly worse survival of patients for whom the request was based on a respiratory event.
{#pone.0181808.g003}
10.1371/journal.pone.0181808.t004
###### Characteristics of initially not admitted patients according to hospital mortality.
{#pone.0181808.t004g}
-------------------------------------------------------------------------------- ------------------------------------------- ---------------------------------------------- ---------
Univariate analysis Survivors at hospital discharge (n = 142) Non-survivors at hospital discharge (n = 60) P value
Age 59,5 \[52--69\] 61,5 \[53--73,75\] 0,53
Charlson Comorbidity Index 3 \[2--6\] 6 \[3--6\] 0,03
Former surgical procedure [^1^](#t004fn003){ref-type="table-fn"} 16 (11,3) 1 (1,7) 0,03
Former ICU stay [^1^](#t004fn003){ref-type="table-fn"} 20 (14,1) 6 (10,0) 0,43
Later ICU admission 35 (25) 18 (30) 0,48
Hematological malignancy n(%) vs solid tumor 74 (52,1) 28 (46,7) 0,48
*Acute Leukemia* 30 (21,1) 10 (16,7) 0,48
*Chronic Lymphocytic Leukemia* 5 (3,5) 2 (3,3) 1
*Lymphoma* 27 (19,0) 13 (21,7) 0,09
*Myeloma* 11 (7,7) 1 (1,7) 0,43
*Myelodysplastic syndrome* 1 (0,8) 2 (3,3)
Level of disease control :
*Initial phase of treatment* 24 (16,9) 7 (11,7) 0,35
*Ongoing treatment* 10 (7,5) 2 (3,3) 0,31
*Controlled disease* 25 (17,6) 6 (10,0) 0,17
*Complete remission* 13 (9,2) 3 (5,0) 0,32
*Disease in progression* 62 (43,7) 42 (70,0) \<0,01
Allogeneic HSCT 17 (12,0) 14 (23,3) 0,04
Severe neutropenia 31 (21,8) 12 (20,0) 0,77
Request during off hours 81 (64,6) 25 (41,7) 0,06
Reasons for requests :
*Clinical respiratory event* 55 (38,7) 37 (61,7) \<0,01
*Hemodynamic event* 60 (42,3) 22 (36,7) 0,46
*Neurological event* 18 (12,7) 13 (21,7) 0,1
*Alteration of renal function or metabolic abnormality* 17 (12,0) 6 (10,0) 0,69
*Warning about a patient likely to deteriorate in the hours or days ahead* 17 (12,0) 5 (8,3) 0,45
*Hypoxemia* 39 (27,5) 27 (45,0) 0,02
*Hypotension* 26 (18,3) 9 (15,0) 0,57
*Severe sepsis* 23 (16,2) 3 (5,0) 0,04
*Acute kidney injury* 11 (7,7) 6 (10,0) 0,6
Multivariate analysis OR 95% CI P value
Disease in progression 3,15 1,6--6,19 \<0,01
Allogeneic HSCT 2,5 1,06--5,89 0,04
Clinical respiratory event 2,36 1,22--4,56 0,01
Severe sepsis 0,27 0,08--0,99 0,049
-------------------------------------------------------------------------------- ------------------------------------------- ---------------------------------------------- ---------
Variables are reported as number (percentage) or median \[IQR\], HSCT: Hematopoietic stem cell transplantation
Total effective of 202 patients (vital status not known for 1 of the patients transferred to another hospital)
^1^ A former ICU admission is defined as a recent (\< 3 months) ICU admission not during the ingoing hospitalization
Outcome of patients never admitted {#sec019}
----------------------------------
Of the 149 patients who were never admitted between the first denied ICU admission and hospital discharge, 31 (20.8%) were judged too sick to benefit, 114 (76.5%) were judged too well to benefit and four (2.6%) were not admitted because of bed unavailability. The survival rate of the patients never admitted because they were judged too sick to benefit was 25.8% (8/31 patients) at hospital discharge, while it was 12.9% (4/31 patients) after 90 days.
The mean survival of patients judged too well to benefit from ICU admission was significantly longer than that of patients judged too sick to benefit and was 443 days (95% CI, 368--517) and 38 days (95% CI, 6--71), respectively (*p* \< 0.0001, using log-rank test).
Discussion {#sec020}
==========
We reported a 20-month study of 203 hospitalised cancer patients who were referred and denied admission at least once to ICU. Twenty-seven percent of these patients initially not admitted were admitted at a later time. To the best of our knowledge, this study is the first designed to determine factors that are associated with hospital mortality and that present at the time of the first referral among patients initially not admitted to ICU and factors predictive of later ICU admission in such a situation. Factors independently associated with an increased risk of a later ICU admission among patients initially not admitted included a former ICU stay, a request based on a clinical respiratory event and neutropenia. For this population, the overall hospital mortality rate was 30% and associated with malignant disease in progression, a request based on a clinical respiratory event and a history of allogeneic HSCT. Compared with immediate ICU admission, later ICU admission was not associated with hospital mortality.
In accordance with previous studies \[[@pone.0181808.ref003],[@pone.0181808.ref009],[@pone.0181808.ref010]\], we showed a non-admission rate of 45%, while the main cause of non-admission to ICU was a too well to benefit consideration. The most common reason for requests was a clinical respiratory event (present in 45% of the patients). A request based on a clinical respiratory event was an independent risk factor for both a later ICU admission and hospital mortality. It has been shown that in ICU cancer patients, hypoxemia \[[@pone.0181808.ref011]\], acute respiratory failure \[[@pone.0181808.ref004],[@pone.0181808.ref012]\] and the need for invasive mechanical ventilation \[[@pone.0181808.ref013]--[@pone.0181808.ref015]\] are associated with a poor outcome. Along these lines, isolated respiratory symptoms such as polypnoea in leukemic patients hospitalised in wards appear to be predictive of serious clinical events \[[@pone.0181808.ref016]\] and outcome when appearing during the chemotherapy induction period \[[@pone.0181808.ref017]\]. In the present study, patients presenting with clinical respiratory events were hypoxemic in approximately 70% of the cases. This underlines the need for improving the management strategy of clinical respiratory events in cancer patients hospitalised in wards. A more precise evaluation of respiratory events could be performed, including radiological criteria with a view to more accurately assessing risk factors for the pejorative evolution of respiratory symptoms. It has been shown that the radiological extension of lung infiltrates is associated with a poor outcome in the context of ARF\[[@pone.0181808.ref018],[@pone.0181808.ref019]\]. We recently described \[[@pone.0181808.ref020]\] a significant increase in mortality rates in cancer patients admitted to ICU for more than two days after the onset of respiratory symptoms and a trend towards a worse outcome when at least three pathologic quadrants were observed on chest X-ray at ICU admission. Further studies are warranted to assess the potential benefit of an early admission on moderate clinical respiratory events including clinical and radiological evaluation criteria. Importantly, we showed that neutropenic patients represented a high-risk population for subsequent ICU admission after the first denial. Neutropenic patients represent up to 30% of critically ill cancer patients admitted to ICU \[[@pone.0181808.ref004]\], and recent studies strongly suggest that ICU admission denial based on neutropenia should be discouraged as they failed to demonstrate the impact of neutropenia on outcome \[[@pone.0181808.ref021]\]. In such conditions, accurate clinical evaluation is difficult because clinical inflammatory symptoms appear to be attenuated due to the lack of neutrophils and might explain failure to appropriately evaluate a patient's clinical status. To this end, neutropenia recovery represents a high-risk period during which the patient clinical status is likely to be worsened \[[@pone.0181808.ref022]\]. Neutropenia recovery silently occurs in the vast majority of patients; \[[@pone.0181808.ref022]\] however, deterioration in respiratory status has been reported during the resolution of leukopenia\[[@pone.0181808.ref023],[@pone.0181808.ref024]\]. In haematology patients, the suboptimal evaluation of wards may result in the undervaluation of disease severity followed by a clinical deterioration \[[@pone.0181808.ref025]\].
Compared with an immediate ICU admission, a subsequent ICU admission occurring after at least one denial was not associated with prognosis. On the contrary, previous studies have described an association between increased mortality rates and time from physiological derangement to ICU admission \[[@pone.0181808.ref001],[@pone.0181808.ref004],[@pone.0181808.ref026]\] or delayed ICU admission after the first refusal \[[@pone.0181808.ref003],[@pone.0181808.ref010],[@pone.0181808.ref027],[@pone.0181808.ref028]\]. In these situations, the main cause of refusal was the lack of bed availability \[[@pone.0181808.ref010],[@pone.0181808.ref027],[@pone.0181808.ref028]\]. In contrast, most of our patients denied ICU admission were considered too well to benefit. Similarly, O'Callaghan et al. \[[@pone.0181808.ref029]\] and Garrouste-Orgeas et al. \[[@pone.0181808.ref009],[@pone.0181808.ref030]\] did not observe any impact on mortality between patients admitted immediately and later. In these situations, refusal for ICU admission is related to the number of beds available and also to the ability of the triaging physician to examine the patient and ICU physician seniority \[[@pone.0181808.ref009]\]. These findings suggest that the current practice of the Institute's RRT triage strategy is appropriate because decisions to admit are always made by the senior intensivist in close collaboration with the referring haematologist/oncologist and after the systematic clinical examination of each proposed patient.
In contrast to previous studies that showed increased mortality in patients admitted to ICU with severe sepsis \[[@pone.0181808.ref011],[@pone.0181808.ref031]\], a request based on severe sepsis was associated with a lower hospital mortality rate in our study. Nevertheless, we studied prognostic factors existing prior to an eventual ICU admission. Our study population comprising patients initially denied admission to ICU mainly because of a too well to benefit assessment, makes our results difficult to compare with those obtained from the analysis of ICU cancer patients. However, we did not identify any negative impact on the outcome of patients referred for severe sepsis and initially denied admission, and this suggests a good triage policy and adequate management of patients with haemodynamic instability in the ward. An awareness campaign has been led by intensivists of the institute based on the recognition of the warning sign 'hypotension' and informing physicians about the need for the early treatment of severe sepsis in the ward in close collaboration with intensivists and how to do so. Moreover, the patients who met ICU admission criteria were immediately admitted and were therefore not included in the analysis. Among haemodynamic requests, the low rate of cardiac arrests should suggest the beneficial impact of the RRT system \[[@pone.0181808.ref032],[@pone.0181808.ref033]\], although we did not perform any before and after study in our centre. Surprisingly, in the present study neurologic events were not associated with prognosis. Accordingly, we have recently shown in a prospective multicentre observational study including 1011 haematology patients admitted to the ICU that neurologic events are not associated with outcomes \[[@pone.0181808.ref004]\]. In these situations, neurologic dysfunctions are commonly associated with metabolic disorders or seizures which are known to be associated with a favourable evolution.
As a previous study has reported an increased risk of mortality for patients admitted during off hours \[[@pone.0181808.ref034]\], we analysed if the time of request impacted patient outcome. We did not observe any difference in triage and hospital mortality among patients referred during off hours. Bone marrow transplantation is already known to be a major prognostic factor in critically ill cancer patients \[[@pone.0181808.ref004],[@pone.0181808.ref011],[@pone.0181808.ref012]\]. Consistent with previous studies, we reported a history of allogeneic bone marrow transplantation as an independent risk factor for hospital mortality, whereas the type of underlying malignancy did not influence the outcome of our study population \[[@pone.0181808.ref012],[@pone.0181808.ref035],[@pone.0181808.ref036]\]. Similar to Thiéry et al \[[@pone.0181808.ref003]\], the fact that hospital survival in patients never admitted because they were considered too sick to benefit from ICU admission was 25.8% suggests inaccurate clinical judgment by the intensivist. We conducted a further analysis and observed that only 13.8% were alive after 90 days and that survival rates dramatically decreased towards the end of the follow-up. It is uncertain whether there would be any benefit from an ICU stay for these patients.
Some limitations of our study should be considered. First, the study was performed at a single centre, and RRT role and triage may vary across hospitals. However, our admission rates were similar to those reported in other studies, and all RRT members were senior intensivists from the institute with experience in the management of cancer patients. Second, the comparison of the clinical status at the time of the first referral between patients never admitted and those later admitted could have been of critical importance to better investigate the factors associated with later admission. Unfortunately, we were not able to realize this comparison, due to the initial design of the study. Third, there are different numbers of RRT doctors who are on duty between off hours and office hours (1 vs 3, respectively), thus results should be interpreted cautiously since a statistical bias may be present in this situation. However, a request during off hours was not associated with a subsequent ICU admission or prognosis.
Conclusion {#sec021}
==========
In summary, 45% of the patients for whom RRT was requested were initially not admitted to ICU, mainly because of being evaluated as too well to benefit from ICU admission. Among these, up to a quarter were admitted at a later time. Compared with an immediate ICU admission, a subsequent ICU admission occurring after at least one denied admission was not associated with prognosis. An ICU request for a clinical respiratory event was an independent risk factor for both later ICU admission and hospital mortality. To assess the potential benefit of early ICU admission for moderate clinical respiratory events in hospitalised cancer patients, a prospective study is warranted.
Supporting information {#sec022}
======================
######
(XLS)
######
Click here for additional data file.
GRRR-OH (Groupe de Recherche en Réanimation Respiratoire en Onco-Hématologique, [www.grrroh.com](http://www.grrroh.com/)): Dr Magali Bisbal, Dr Djamel Mokart.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
|
Analysis of vesicular trafficking in primary neurons by live imaging.
Alzheimer's disease, the most common neurodegenerative disease, is characterized by a progressive loss of synapses and accumulation of amyloid-beta (Aβ) peptides in the brain. Previous studies demonstrated that acute increase in synaptic activity in cultured hippocampal slices and mouse brains (Cirrito et al. Neuron 48: 913-922, 2005; Kamenetz et al. Neuron 37: 925-937, 2003) enhanced secretion of Aβ. Since synaptic activity promotes Aβ secretion, it could also affect the trafficking and processing of its precursor, the amyloid precursor protein (APP). Here, we describe a method to investigate the effect of acute synaptic activation on APP trafficking within dendrites. |
Older women and mercy killing.
Mercy killing is usually defined as intentional killing, often by family members or friends, with the stated intent to end perceived suffering. International evidence suggests that mercy killing typically involves an older man killing his ailing wife. In this study, we examined U.S. cases of mercy killing recorded by The Hemlock Society for the period 1960-1993. We found that the typical case involved an older woman being killed by a man, often her husband, with her poor health as the justification for the killing. A firearm was often used in these incidents. These patterns of mercy killing are consistent with patterns of homicide-suicide among older adults. Future research should seek to understand why women are typically the targets, and men the agents of mercy killing. |
Q:
Ascii value corresponding to hex
The below lines does not write anything to the file, ascii.txt. Trying to write the ascii equivalent of hex "88". However nothing is written to the file, nor nothing is asssigned to the variable, ascii.
Dim ascii = ChrW(Convert.ToInt32("88", 16))
My.Computer.FileSystem.WriteAllText("e:\ascii.txt", ascii, True)
In excel or openoffice, you can get the ascii equivalent using the below formula. What is wrong with the code?
=CHAR(HEX2DEC("88"))
A:
ChrW doesn’t know ASCII, it only knows Unicode code points.
U+0088 is a control character, it’s non-printable (i.e. it doesn’t normally correspond to a displayable character). It’s therefore not surprising that the file appears empty.
Furthermore, even ChrW worked with ASCII, the character 0x88 is not ASCII, it’s outside its range. In case you were talking about the former standard Windows character set, codepage 1252, you can use the following code to retrieve the string representation of the character code:
Dim bytes = New Byte() { &H88 }
Dim text = System.Text.Encoding.GetEncoding(1252).GetString(bytes)
|
City Vows To Find Solution To Sewer Troubles 4-05-2011
Soaring sewer rates have Bay City residents looking for relief. Now the Bay City Commission appears to be listening. On Monday night, they approved funding for a study to look at ways to help ease the pain.The commission approved a $10,000 study that may bring customers some relief.[The] City Commission is looking to help families in need. That's why they commissioned that study," said Chris Girard, with the sewer fund advisory group.After some residents saw a hike in their bills which they couldn't afford to pay, the advisory group pushed the City Commission to do the study."Low-income families and low-income seniors may have the opportunity to pay less," said Girard.In previous stories, TV5 reported about homeowners who were upset with their sewer bills, but they aren't the only ones affected.Barneys Bakery told TV5s Tia Ewing that they use a lot of water, but it's not the water bill that's up, it's the sewer bill, and they hope this study can fix it.Girard said the sewer rates have also been a deciding factor in preventing businesses from moving to Bay City. "Hopefully we can attract business back into the community," said Girard.The overhaul on the sewer system doesn't stop there. The city commission also approved spending nearly $450,000 to hire an engineering firm to review the sewer system's solid handling process.Meanwhile, residents and businesses must continue to make their payments. The results of the study are expected to be back in 60 days. |
3 N.Y.3d 733 (2004)
In the Matter of the Estate of EDMUND J. McCORMICK, Deceased.
SUZANNE V. McCORMICK, Appellant;
BANKERS TRUST COMPANY et al., Respondents.
Court of Appeals of the State of New York.
Submitted August 16, 2004.
Decided October 21, 2004.
On the Court's own motion, appeal dismissed, without costs, upon the ground that it does not lie, appellant previously having appealed to the Court of Appeals from the Appellate Division orders from which she now has taken an appeal (lv dismissed 3 N.Y.3d 656 [2004]). Motion for leave to appeal dismissed upon the ground that the orders sought to be appealed from do not finally determine the proceeding within the meaning of the Constitution.
|
The present invention relates generally to systems and methods for controlling an electric motor and, more particularly, to a controller and associated drive assembly for controlling a brushless direct current (BLDC) motor.
Electrical machines are used throughout a great number of devices today, and typically consist of motors, which convert electrical energy into mechanical energy, and generators, which convert mechanical energy into electrical energy. Generally, electrical machines fall into one of three categories: polyphase synchronous machines, polyphase asynchronous (i.e., induction) machines and direct current (DC) machines. Typical machines consist of two main portions: a stationary, outside portion called a stator, and a rotating, inner portion called a rotor. The rotor of typical machines is mounted on a stiff rod, or shaft, that is supported in bearings so that the rotor is free to turn within the stator to produce mechanical energy.
In one type of synchronous machine, a permanent magnet, brushless direct current (BLDC) machine, the stator is composed of windings that are connected to a controller, and the rotor is composed of two or more permanent magnets of opposed magnetic polarity. The controller includes a driver that generates poly-phase alternating input currents to the stator windings. One conventional driver includes a series of Insulated Gate Bipolar Transistors (IGBT""s) electrically connected to the phase windings of a BLDC motor. For example, for a three-phase BLDC motor, a conventional driver includes six IGBT""s arranged in three half-bridges, where each half-bridge generates a drive for one phase of the motor.
As the rotor rotates within the stator, and the magnets of one polarity approach cores of the stator about which the windings are wound, and that conduct the opposed polarity, sensors signal the angular position of the rotor to the controller which, in turn, controls the alternating currents to switch the polarity of the magnetic field produced by windings of the stator. For example, a three-phase BLDC motor can have two, four or more permanent magnets with alternating magnetic polarities mounted on its rotor. The required rotating magnetic field is produced by current through the stator windings. And the three phases of the current are switched in sequence, which is dictated by the angular position of the rotor.
In many BLDC motor systems, the speed of the BLDC motor is controlled by the driver pulse modulating, such as pulse width modulating, the input voltage generated by the controller. By pulse-width-modulation (PWM) of the input voltage, the driver and, thus, the controller controls the average input currents to the windings by using xe2x80x9conxe2x80x9d and xe2x80x9coffxe2x80x9d states. During the time the input currents through the windings are increasing, the voltage supply provides constant voltage to the driver at a level at least as high as the motor voltage required for the desired speed of operation. Once the currents have reached the required levels for the desired speed of the motor, the duty cycle is changed to that required to maintain the currents at or near the required level of current.
Conventional BLDC motor systems that include a driver comprising a series of IGBT""s are adequate in controlling the speed of BLDC motors at low frequencies. A standard driver including six IGBT""s can drive a three-phase motor (two IGBT""s per phase) with a switching frequency up to approximately 20 kHz if the maximum current is not required for more than a few minutes. In this regard, each IGBT can typically operate with a maximum switching frequency of approximately 20 kHz. Whereas such drivers can control the speed of BLDC motors at low frequencies, such drivers that drive higher power (e.g., greater than one horsepower) and higher voltage (e.g., greater than 200 volts) three-phase motors cannot typically switch at a frequency higher than 20 kHz when the driver comprises IGBT""s. The limit in switching frequency is due to the losses associated with switching the IGBT""s and the average current being switched. What makes the IGBT poor at higher frequencies is that the gate of the transistor is not directly connected to the gate drive circuit (hence insulated gate) and, thus, the electrical charge cannot be quickly removed. The rate at which the electrical charge can be applied or removed fixes the time the IGBT is transitioning between its xe2x80x9coffxe2x80x9d and saturated xe2x80x9conxe2x80x9d states. As the switching frequency increases, the percentage of time that the IGBT is in these transitional regions increases. Also, as current is flowing while the IGBT transitions between states, the power dissipated while the IGBT is in these transitional regions increases. And while other, more advanced products are available that can run at higher frequencies, such products are factors of 50 times more expensive than conventional IGBT""s and are not production items.
In light of the foregoing, various embodiments of the present invention provide an improved controller and associated drive assembly for controlling a brushless direct current (BLDC) motor, where the motor includes a predetermined number of phase windings. Various embodiments of the controller and associated drive assembly of the present invention include a plurality of switching elements, such as IGBT""s, arranged such that the power dissipation of a conventional driver is spread among a plurality of drivers. As such, the motor can be driven at a frequency higher than the maximum frequency of any one switching element. Alternatively, the motor can be driven at an operational frequency while operating each switching element at a frequency less than the operational frequency. Thus, the efficiency of the switching elements is increased over conventional drivers.
According to one embodiment, a controller for controlling a BLDC motor controller includes a drive assembly, and a processing element. The processing element is in electrical communication with the drive assembly and the BLDC motor, and the processing element is capable of controlling operation of the drive assembly. The drive assembly, on the other hand, is in electrical communication with a power supply and the BLDC motor. As such, the drive assembly is capable of receiving a voltage output of the power supply and is capable of providing a pulse-width-modulated input voltage to the BLDC motor. The drive assembly includes a plurality of half-bridge assemblies that each include two switching elements, such as insulated gate bipolar transistors (IGBT""s), that are each capable of operating at no more than a redetermined frequency. In this regard, at least two half-bridge assemblies are electrically connected to each phase winding of the BLDC motor such that the half-ridge assemblies are capable of providing the pulse-width-modulated input voltage to the respective phase winding of the BLDC motor at a frequency higher than the predetermined frequency.
By electrically connecting at least two half-bridge assemblies to each phase winding, the switching elements are each capable of operating at an operating frequency that is less than the predetermined frequency. As such, the half-bridge assemblies that are electrically connected to each phase winding of the BLDC motor are capable of providing the pulse-width-modulated input voltage to the respective phase winding of the BLDC motor at a frequency equal to the product of the number of half-bridge assemblies electrically connected to the respective phase winding and the operating frequency.
According to another embodiment, the drive assembly comprises a plurality of drive elements that each include the predefined number of half-bridge assemblies. In this embodiment, each half-bridge assembly of each drive element is electrically connected to a respective phase winding of the BLDC motor. For example, the BLDC motor can include a first, a second and a third phase winding, where the drive assembly comprises a plurality of drive elements that each comprise a first half-bridge assembly, a second half-bridge assembly and a third half-bridge assembly. In this regard, the first half-bridge assemblies can be electrically connected to the first phase winding, the second half-bridge assemblies can be electrically connected to the second phase winding, and the third half-bridge assemblies can be electrically connected to the third phase winding.
According to yet another embodiment where the drive assembly comprises a predefined number of drive elements that each comprise a plurality of half-bridge assemblies, each half-bridge assembly of the drive elements is electrically connected to a respective phase winding of the BLDC motor. For example, the BLDC motor can include the first, second and third phase winding. In this regard, the drive assembly can comprise a first, a second and a third drive element that each comprise a plurality of half-bridge assemblies. Thus, the half-bridge assemblies of the first drive element can be electrically connected to the first phase winding, the half-bridge assemblies of the second drive element can be electrically connected to the second phase winding, and the half-bridge assemblies of the third drive element can be electrically connected to the third phase winding. |
Q:
simple_form sending parameter
I'm trying to send an extra parameter submiting a form in rails using simple_form
I thought this would do the trick:
<%= simple_form_for(@user, :groupId => 1) do |f| %>
but in tne controller, the parameter is ignored
I found an answer in here but I really like to have a better solution.
A:
How about:
<%= simple_form_for @user, url: user_path(@user, :groupId => 1) do |f| %>
simple_form_for has a similar usage to form_for. See http://apidock.com/rails/ActionView/Helpers/FormHelper/form_for
|
Q:
Replacing characters by chaining str.replace methods produces wrong result
I want to be able to replace certain characters. The desired replacement order should be
A -> U, T -> A, G -> C, C -> G.
But for some reason, C does not get replaced with G.
I've linked the code that I have so far.
v = "ATGC"
DNA = [v]
MRNA = []
for s in DNA:
MRNA.append(s.replace('A', 'U').replace('T', 'A').replace('C', 'G').replace('G', 'C'))
print(MRNA)
A:
Using MRNA.replace('C', 'G').replace('G', 'C') will replace any 'C' by a 'G' which is immediately replaced back with a 'C'.
Instead of multiple str.replace you should use a translation table with str.maketrans and str.translate. Since this works in a single pass, it both avoids undoing a replacement and gets more efficient as the number of call to str.replace increases.
def dna_to_rna(s):
trans_table = str.maketrans('ATCG', 'UAGC')
return s.translate(trans_table)
print(dna_to_rna('ACGTAC')) # 'UGCAUG'
|
A Perth father who doused his two children in petrol and set one on fire has been found guilty of five charges, including two of attempting to kill the children.
Edward John Herbert pleaded not guilty to the charges on the grounds of insanity, but WA Supreme Court Justice Lindy Jenkins rejected that defence.
Herbert's three-year-old daughter suffered burns to her upper body and face in the attack, which the court heard caused severe and life-threatening injuries and left her with permanent scarring.
The second child, aged seven, was doused in petrol before being rescued by an off-duty police officer who had rushed to help from the house across the street.
During the trial, the court was told Herbert had been drinking and smoking cannabis on the day of the offences.
A doctor testified it was probable Herbert suffered from bipolar affective disorder and there was "evidence of psychosis" on the day and night of the incident that could be linked to his substance consumption.
Partner feared for her life, court told
In a statement tendered to the court, Herbert's partner said he was "getting angry all the time" and had "doubled his cannabis use" in the lead-up to the incident.
She said Herbert's anger escalated throughout the night of the offences and she began to fear for her life.
She said that around midnight he told her: "That's it bitch, I am going to kill you" before getting a jerry can of petrol and entering his daughters' room.
He poured petrol over the younger child and set her alight, before he began to douse the older child in petrol.
An off-duty police officer held back tears during the trial as she told the court how she rescued the children while Herbert watched on silently.
Another neighbour Daniel McMillan said he entered the home to restrain Herbert and asked him what he had done.
He told the court Herbert responded by saying he set his daughter on fire because she was "too beautiful", and "don't worry, I wouldn't have lit my boy up".
In a letter Herbert wrote to his partner from jail, he said he could not remember any of what happened on the night and he would have to live with it for the rest of his life.
"WTF happened?" Herbert wrote.
"I love my kids more than life itself ... they said I had a mental illness and smoking weed is very bad for my type."
Herbert sat emotionless as the judge delivered her verdict.
He is expected to be sentenced in May. |
91 F.3d 137
U.S.v.Loper*
NO. 95-60274
United States Court of Appeals,Fifth Circuit.
May 27, 1996
Appeal From: S.D.Miss., No. 1:94-CV-560-PR
VACATED.
*
Fed.R.App.P. 34(a); 5th Cir.R. 34.2
|
About:
At Animal Human Connection, we like to celebrate animal life. We embrace and appreciate the lessons our pets teach us. This bond includes acknowledging that this shared life and death was meaningful both to the animal and their human partner. Many of us love our animals deeply and choose to welcome them in our hearts and homes. We try to take full moral responsibility for our relationship with them. Read more... |
Canadian who admitted to plotting terrorist attacks asks for ‘second chance’
A Canadian who admitted to plotting a terrorist attack on New York City is pleading for “a second chance” in a letter submitted to the court ahead of his upcoming sentencing.
In the letter filed to a New York court on Friday, Abdulrahman El Bahnasawy of Mississauga, Ont., outlined his personal history with addiction and mental illness, and explained that he felt American airstrikes against the Middle East drove him to jihadism.
The 20-year-old wrote that he felt that Americans were trying to disrupt the lives of people in the Middle East with airstrikes and he thought ”it was appropriate to use similar methods back until and unless they stop.”
The 24-page hand-written letter, addressed to the judge in his case and partially redacted, is part of a package his lawyers submitted ahead of his sentencing for multiple terrorism-related charges that he pleaded guilty to last year.
El Bahnasawy described his disenfranchisement with western society, including “so-called democracy and freedom.”
He said he chose to go to the U.S. to carry out the plan because Canada had recently stopped its airstrikes, “and it didn’t make sense to transgress back against them in such a way.”
Police secretly arrested El Bahnasawy, then 18, in what they said was a plot by Islamic State sympathizers to attack New York City concert venues, subway stations and Times Square. He was arrested after travelling from Canada to New Jersey in 2016. The records in his case were sealed for over a year as police tried to hunt down his accomplices.
Authorities announced the charges against him after two other suspects were arrested in Pakistan and the Philippines.
The Canadian didn’t discuss the specifics of the plot in the letter, instead focusing on why he decided to go to such extremes.
“My detailed reasons about this is in no way a justification for it, I merely am explaining my thought process at the time,” he wrote, adding that he no longer believes extremism is the answer.
“There are many issues in this world but I don’t want to lose my life or freedom to try fixing them, and I definitely do not want to resort to violence or harm to fix them. I sincerely apologize for my (behaviour) and I only ask for a second chance.”
El Bahnasawy also used the letter to outline his struggles with addiction and mental illness, including several trips into hospital psychiatric wards and rehab centres. He said he spent a month in a psych ward in Kuwait, and eight months in rehab in Egypt. Court records show he also spent time at the Centre for Addiction and Mental Health in Toronto.
“I want to experience life away from drugs and away from war and violence,” he wrote.
He wrote that he wondered where he would be if anyone who knew about his plans had encouraged him to find a more productive way to fight the injustice he saw in the world.
The young man’s lawyers, in a submission included in the package with the letter, requested the judge impose a sentence “no greater than necessary to comply with (the law).”
They suggested that his release might coincide with ”the onset of Abdulrahman’s mid-twenties when his cognitive development will be complete.” |
Obese yeast: triglyceride lipolysis is functionally conserved from mammals to yeast.
Storage and degradation of triglycerides are essential processes to ensure energy homeostasis and availability of precursors for membrane lipid synthesis. Recent evidence suggests that an emerging class of enzymes containing a conserved patatin domain are centrally important players in lipid degradation. Here we describe the identification and characterization of a major triglyceride lipase of the adipose triglyceride lipase/Brummer family, Tgl4, in the yeast Saccharomyces cerevisiae. Elimination of Tgl4 in a tgl3 background led to fat yeast, rendering growing cells unable to degrade triglycerides. Tgl4 and Tgl3 lipases localized to lipid droplets, independent of each other. Serine 315 in the GXSXG lipase active site consensus sequence of the patatin domain of Tgl4 is essential for catalytic activity. Mouse adipose triglyceride lipase (which also contains a patatin domain but is otherwise highly divergent in primary structure from any yeast protein) localized to lipid droplets when expressed in yeast, and significantly restored triglyceride breakdown in tgl4 mutants in vivo. Our data identify yeast Tgl4 as a functional ortholog of mammalian adipose triglyceride lipase. |
{
"data": [{
"description": "Test Event Details",
"end_time": "2013-06-30T22:00:00+0900",
"id": "552962794746679",
"is_date_only": false,
"location": "Yokohama-shi",
"name": "Test Event",
"owner": {
"category": "Software",
"id": "137246726435626",
"name": "F4J"
},
"privacy": "OPEN",
"start_time": "2013-06-30T19:00:00+0900",
"ticket_uri": "http://www.facebook.com/ajax/events/ticket.php?event_id=552962794746679&action_source=12",
"timezone": "Asia/Tokyo",
"updated_time": "2013-06-17T11:15:39+0000",
"venue": {
"id": "191903894154620",
"latitude": 35.45,
"longitude": 139.633,
"street": "",
"zip": ""
}
}],
"paging": {
"next": "https://graph.facebook.com/137246726435626/events?fields=ticket_uri,cover,is_date_only,owner,parent_group,privacy,updated_time,venue,description,end_time,id,location,name,start_time,timezone&access_token=access_token&limit=5000&until=1372586400&__paging_token=552962794746679",
"previous": "https://graph.facebook.com/137246726435626/events?fields=ticket_uri,cover,is_date_only,owner,parent_group,privacy,updated_time,venue,description,end_time,id,location,name,start_time,timezone&access_token=access_token&limit=5000&since=1372586400&__paging_token=552962794746679&__previous=1"
}
} |
package example.storefront
import example.api.v1.HealthStatus
import example.storefront.client.v1.Comment
import example.storefront.client.v1.CommentClient
import groovy.transform.CompileStatic
import io.reactivex.Single
import io.micronaut.http.HttpStatus
import io.micronaut.http.annotation.Body
import io.micronaut.http.annotation.Controller
import io.micronaut.http.annotation.Get
import io.micronaut.http.annotation.Post
import javax.inject.Inject
import javax.inject.Singleton
/**
* @author zacharyklein
* @since 1.0
*/
@Singleton
@Controller("/comment")
@CompileStatic
class CommentController {
final CommentClient commentClient
CommentController(CommentClient commentClient) {
this.commentClient = commentClient
}
@Get('/health')
Single<HealthStatus> health() {
commentClient.health().onErrorReturn({ new HealthStatus('DOWN') })
}
@Get('/{topic}')
List<Comment> topics(String topic) {
commentClient.list topic
}
@Get('/{topic}/{id}')
Map<String, Object> thread(String topic, Long id) {
commentClient.expand id
}
@Post('/{topic}')
HttpStatus addTopic(String topic, @Body Comment comment) {
commentClient.add topic, comment.poster, comment.content
}
@Post('/{topic}/{id}')
HttpStatus addReply(String topic, Long id, @Body Comment comment) {
commentClient.addReply id, comment.poster, comment.content
}
}
|
930 F.2d 34
Unpublished DispositionNOTICE: Tenth Circuit Rule 36.3 states that unpublished opinions and orders and judgments have no precedential value and shall not be cited except for purposes of establishing the doctrines of the law of the case, res judicata, or collateral estoppel.Paul F. RATHER and Randy S. Kailey, Plaintiffs-Appellants,v.Roy S. ROMER, Governor, Duane L. Woodard, Attorney General,Frank Gunter, John Enright, Rodney Cozzetto,Carlos Baca, Velma M. Garner, DavidSanchez, and Robert N.Shoemaker,Defendants-Appellees.
No. 90-1260.
United States Court of Appeals, Tenth Circuit.
April 8, 1991.
Before STEPHEN H. ANDERSON, TACHA and BRORBY, Circuit Judges.
ORDER AND JUDGMENT*
STEPHAN H. ANDERSON, Circuit Judge.
1
After examining the briefs and appellate record, this panel has determined unanimously that oral argument would not materially assist the determination of this appeal. See Fed.R.App.P. 34(a); 10th Cir.R. 34.1.9. The case is therefore ordered submitted without oral argument.
2
Paul F. Rather and Randy S. Kailey, inmates at Arkansas Valley Correctional Facility, filed a pro se action pursuant to 42 U.S.C. Sec. 1983 on behalf of themselves and others similarly situated against members of the Colorado State Board of Parole and various other state officials. The central allegation of the complaint relates to an opinion issued by the Colorado Attorney General which concludes that sex offenders can be excepted from the general parole practices under Colorado state law. The plaintiffs, who have been convicted of sex offenses, contend that such an exception violates their constitutionally protected liberty interest in a mandatory parole date under Colorado law.
3
Defendants filed a motion to dismiss. The United States Magistrate Judge to whom the case was referred recommended that the motion be granted on the grounds that plaintiffs lacked standing since neither was eligible for parole under any interpretation of Colorado law, that their claims for Sec. 1983 damages were factually unsupported, and that all defendants were immune from damages. Rather and Kailey filed objections to the Magistrate's recommendation, asserting that their complaint did not seek damages. They also filed a motion for leave to amend their complaint, adding a new plaintiff, one Tom Luther, to cure the standing defect identified by the magistrate on the grounds that Luther, who is also a convicted sex offender, was being held beyond the parole date allegedly applicable to those convicted of other crimes. The district court denied the motion for leave to file the amended complaint and granted the motion to dismiss. We affirm.
4
This action is defective for a variety of reasons. The district court correctly concluded that neither Rather nor Kailey have standing since neither was eligible for parole under any interpretation of Colorado law at the time they filed the complaint. Thus, there is no cognizable injury upon which a complaint could be based.
5
Perhaps more to the point, at its core, the action asserted here is in reality one for habeas corpus relief. Thus, even if the district court abused its discretion (and we do not believe that it did) in denying leave to amend the complaint to add Tom Luther as a plaintiff, the complaint, which seeks relief under Sec. 1983, would still be defective. The essence of Luther's complaint would be that he is illegally confined. "[W]hen a state prisoner is challenging the very fact or duration of his physical imprisonment, and the relief he seeks is a determination that he is entitled to immediate release or a speedier release from that imprisonment, his sole federal remedy is a writ of habeas corpus." Preiser v. Rodriguez, 411 U.S. 475, 500 (1973); Layton v. Willingham, 726 F.2d 631, 635 (10th Cir.1984); Henderson v. Secretary of Corrections, 518 F.2d 694, 695 (10th Cir.1975); Gregory v. Wyse, 512 F.2d 378, 381 (10th Cir.1975). Because "Congress has determined that habeas corpus is the appropriate remedy ... that specific determination must override the general terms of Sec. 1983." Preiser v. Rodriguez, 411 U.S. at 490.
6
A habeas corpus petitioner must exhaust available state remedies prior to seeking relief in the federal courts. 28 U.S.C. Sec. 2254(b); Rose v. Lundy, 455 U.S. 509, 518-19 (1982). The exhaustion requirement serves as a way for the federal courts to accommodate the states and give their courts an initial opportunity to correct violations of prisoners' federal rights, thus enhancing the integrity of both court systems. Id. at 518. Neither Luther nor the named plaintiffs have satisfied the exhaustion requirement. "It would wholly frustrate explicit congressional intent to hold that ... [plaintiffs] ... could evade this [exhaustion] requirement by the simple expedient of putting a different label on their pleadings." Preiser v. Rodriguez, 411 U.S. at 489-90.
7
Finally, even were we to reach the merits of the complaint in this case, the cause of action would fail. Although plaintiffs have alleged a variety of constitutional violations, only their argument for a constitutionally protected liberty interest in a mandatory parole date goes beyond bare and insufficient assertion. The Supreme Court has concluded that where the grant or denial of parole is a purely discretionary matter within the plain meaning of the statutes, no right to a mandatory parole date exists. And, where there is no right to a mandatory parole date, a protected liberty interest cannot be found. Jago v. VanCuren, 454 U.S. 14, 20-21 (1981) (per curiam). Cf. Board of Pardons v. Allen, 482 U.S. 369 (1987); Greenholtz v. Inmates of the Nebraska Penal and Correctional Complex, 442 U.S. 1 (1979).
8
A decision on the merits would turn, then, on whether the statutes in question do indeed guarantee a mandatory parole date, as plaintiffs allege. The Colorado Supreme Court has recently construed the precise statutory language comprising the basis of plaintiffs' complaint. The court concluded that "under the plain language of these sections, ... the Parole Board has discretion to deny or to grant parole to all persons sentenced for a sex offense as defined by section 16-13-202(5), even though they were not sentenced pursuant to the Sex Offenders Act." Thiret v. Kautzky, 792 P.2d 801, 807 (Colo.1990).
9
The Colorado court's reading of the statutes is unambiguous, leading to a plain conclusion. Absent any statutory guarantee of a mandatory parole date, we would not infer a constitutionally protected liberty interest. Plaintiffs' cause of action under 42 U.S.C. Sec. 1983 has no other grounds on which to stand and must fail. In referring to Thiret we do not mean to imply that exhaustion of remedies in state court is a futile exercise. Thiret did not address federal or state constitutional challenges. Cf. Foote v. Utah Board of Pardons, No. 900132, slip. op. at 1 (Utah Mar. 14, 1991) (reaching the state constitutional issue).
10
For the reasons stated above, the complaint was properly dismissed for failure to state a claim for which relief could be granted. The decision of the district court is accordingly AFFIRMED. Appellants' motion for sanctions is denied. The mandate shall issue forthwith.
*
This order and judgment has no precedential value and shall not be cited, or used by any court within the Tenth Circuit, except for purposes of establishing the doctrines of the law of the case, res judicata, or collateral estoppel. 10th Cir.R. 36.3
|
Vans Sk8-Hi Reissue - Picante
The classic Sk8-Hi arrives this fall in a spicy "Picante" suede. To balance out the hot Picante upper you'll get accents in a much sweeter "Marshmallow" shade of white for the Jazz Stripe and vulcanized midsole. Pick them up now from select Vans retailers, including Premier. |
The vitamin A metabolite, retinoic acid (RA), is known to play a crucial role in several developmental processes including axial patterning and differentiation. More recently, RA has been implicated in the regenerative ... |
Surface plasmon
Surface plasmons (SPs) are coherent delocalized electron oscillations that exist at the interface between any two materials where the real part of the dielectric function changes sign across the interface (e.g. a metal-dielectric interface, such as a metal sheet in air). SPs have lower energy than bulk (or volume) plasmons which quantise the longitudinal electron oscillations about positive ion cores within the bulk of an electron gas (or plasma).
The charge motion in a surface plasmon always creates electromagnetic fields outside (as well as inside) the metal. The total excitation, including both the charge motion and associated electromagnetic field, is called either a surface plasmon polariton at a planar interface, or a localized surface plasmon for the closed surface of a small particle.
The existence of surface plasmons was first predicted in 1957 by Rufus Ritchie. In the following two decades, surface plasmons were extensively studied by many scientists, the foremost of whom were T. Turbadar in the 1950s and 1960s, and Heinz Raether, E. Kretschmann, and A. Otto in the 1960s and 1970s. Information transfer in nanoscale structures, similar to photonics, by means of surface plasmons, is referred to as plasmonics.
Surface plasmon polaritons
Excitation
Surface plasmon polaritons can be excited by electrons or photons. In the case of photons, it cannot be done directly, but requires a prism, or a grating, or a defect on the metal surface.
Dispersion relation
At low frequency, an SPP approaches a Sommerfeld-Zenneck wave, where the dispersion relation (relation between frequency and wavevector) is the same as in free space. At a higher frequency, the dispersion relation bends over and reaches an asymptotic limit called the "plasma frequency" (see figure at right). For more details see surface plasmon polariton.
Propagation length and skin depth
As an SPP propagates along the surface, it loses energy to the metal due to absorption. It can also lose energy due to scattering into free-space or into other directions. The electric field falls off evanescently perpendicular to the metal surface. At low frequencies, the SPP penetration depth into the metal is commonly approximated using the skin depth formula. In the dielectric, the field will fall off far more slowly. SPPs are very sensitive to slight perturbations within the skin depth and because of this, SPPs are often used to probe inhomogeneities of a surface. For more details, see surface plasmon polariton.
Localized surface plasmons
Localize surface plasmons arise in small metallic objects, including nanoparticles. Since the translational invariance of the system is lost, a description in terms of wavevector, as in SPPs, can not be made. Also unlike the continuous dispersion relation in SPPs, electromagnetic modes of the particle are discretized.
LSPs can be excited directly through incident waves; efficient coupling to the LSP modes correspond to resonances and can be attributed to absorption and scattering, with increased local-field enhancements. LSP resonances largely depend on the shape of the particle; spherical particles can be studied analytically by Mie theory.
Experimental applications
The excitation of surface plasmons is frequently used in an experimental technique known as surface plasmon resonance (SPR). In SPR, the maximum excitation of surface plasmons are detected by monitoring the reflected power from a prism coupler as a function of incident angle or wavelength. This technique can be used to observe nanometer changes in thickness, density fluctuations, or molecular absorption. Recent works have also shown that SPR can be used to measure the optical indexes of multi-layered systems, where ellipsometry failed to give a result.
Surface plasmon-based circuits have been proposed as a means of overcoming the size limitations of photonic circuits for use in high performance data processing nano devices.
The ability to dynamically control the plasmonic properties of materials in these nano-devices is key to their development. A new approach that uses plasmon-plasmon interactions has been demonstrated recently. Here the bulk plasmon resonance is induced or suppressed to manipulate the propagation of light. This approach has been shown to have a high potential for nanoscale light manipulation and the development of a fully CMOS-compatible electro-optical plasmonic modulator, said to be a future key component in chip-scale photonic circuits.
Some other surface effects such as surface-enhanced Raman scattering and surface-enhanced fluorescence are induced by surface plasmon of noble metals, therefore sensors based on surface plasmons were developed.
In surface second harmonic generation, the second harmonic signal is proportional to the square of the electric field. The electric field is stronger at the interface because of the surface plasmon resulting in a non-linear optical effect. This larger signal is often exploited to produce a stronger second harmonic signal.
The wavelength and intensity of the plasmon-related absorption and emission peaks are affected by molecular adsorption that can be used in molecular sensors. For example, a fully operational prototype device detecting casein in milk has been fabricated. The device is based on monitoring changes in plasmon-related absorption of light by a gold layer.
See also
Biosensor
Dual-polarization interferometry
Extraordinary optical transmission
Free electron model
List of plasma (physics) articles
Multi-parametric surface plasmon resonance
Plasma oscillation
Plasmonic lens
Spinplasmonics
Surface plasmon resonance microscopy
Waves in plasmas
References
Category:Condensed matter physics
Category:Plasmonics |
Q:
Search twitter and obtain tweets by hashtag, maximizing number of returned search results
I am attempting to compile a corpus of all Tweets related to the World Cup on Twitter from their API using the twitteR package in R.
I am using the following code for a single hashtag (for example). However, my problem is that it appears I am only 'authorized' to access a limited set of the tweets (in this case, only the 32 most recent).
library(twitteR)
reqURL <- "https://api.twitter.com/oauth/request_token"
accessURL <- "https://api.twitter.com/oauth/access_token"
authURL <- "http://api.twitter.com/oauth/authorize"
#consumerKey <- Omitted
#consumerSecret <- Omitted
twitCred <- OAuthFactory$new(consumerKey=consumerKey,
consumerSecret=consumerSecret,
requestURL=reqURL,
accessURL=accessURL,
authURL=authURL)
options(RCurlOptions = list(cainfo = system.file("CurlSSL", "cacert.pem", package = "RCurl")))
twitCred$handshake()
#setwd("/Users/user/FIFA")
#save(twitCred, file="twitterAuthentication.Rdata")
#load("twitterAuthentication.Rdata")
registerTwitterOAuth(twitCred)
FIFA<-searchTwitter("#WorldCup", n=9999, since='2007-10-30')
Returns the following error:
Warning message:
In doRppAPICall("search/tweets", n, params = params, retryOnRateLimit = retryOnRateLimit, :
9999 tweets were requested but the API can only return 32
My question is: How do I access the maximum number of tweets using a specific hashtag? (Also, could someone clarify what the 'max' limit actually is? And why I can't seem to get anywhere close to this value of (~ 1500 tweets)?
I have tested OAuth within the Twitter Developer website and obtained signing results for the Signature base string, authorization header, and cURL commands respectively, indicating to me that I have the appropriate permissions & authorizations to draw the appropriate data from Twitter's servers. Please advise/correct me if I am wrong, or if you need further information on this.
My API Permissions are currently set to: Read, Write & Access direct messages
Session Info:
R version 3.0.2 (2013-09-25)
Platform: x86_64-apple-darwin10.8.0 (64-bit)
locale:
[1] en_US.UTF-8/en_US.UTF-8/en_US.UTF-8/C/en_US.UTF-8/en_US.UTF-8
attached base packages:
[1] stats graphics grDevices utils datasets methods base
other attached packages:
[1] RJSONIO_1.0-3 twitteR_1.1.7 rjson_0.2.12 ROAuth_0.9.3 digest_0.6.3 RCurl_1.95-4.1 bitops_1.0-5
[8] foreign_0.8-55
loaded via a namespace (and not attached):
[1] tools_3.0.2
Additional Resource/Source:
twitter package in R maximum tweets using searchTwitter()
This source states the max is 1500
Twitter api searching tweets for hashtags
This source states the max is 3200
A:
This is not possible,
Using the Twitter Search API
"The Search API is not complete index of all Tweets, but instead an
index of recent Tweets. At the moment that index includes between 6-9
days of Tweets."
|
Migration History, Language Acculturation, and Mammographic Breast Density.
Background: Breast cancer incidence is lower in many U.S. ethnic minority and foreign-born population groups. Investigating whether migration and acculturation patterns in risk are reflected in disease biomarkers may help to elucidate the underlying mechanisms.Methods: We compared the distribution of breast cancer risk factors across U.S.-born white, African American and Hispanic women, and foreign-born Hispanic women (n = 477, ages 40-64 years, 287 born in Caribbean countries). We used linear regression models to examine the associations of migration history and linguistic acculturation with mammographic breast density (MBD), measured using computer-assisted methods as percent and area of dense breast tissue.Results: The distribution of most breast cancer risk factors varied by ethnicity, nativity, and age at migration. In age- and body mass index-adjusted models, U.S.-born women did not differ in average MBD according to ethnicity, but foreign-born Hispanic women had lower MBD [e.g., -4.50%; 95% confidence interval (CI), -7.12 to -1.89 lower percent density in foreign- vs. U.S.-born Hispanic women]. Lower linguistic acculturation and lower percent of life spent in the United States were also associated with lower MBD [e.g., monolingual Spanish and bilingual vs. monolingual English speakers, respectively, had 5.09% (95% CI, -8.33 to -1.85) and 3.34% (95% CI, -6.57 to -0.12) lower percent density]. Adjusting for risk factors (e.g., childhood body size, parity) attenuated some of these associations.Conclusions: Hispanic women predominantly born in Caribbean countries have lower MBD than U.S.-born women of diverse ethnic backgrounds, including U.S.-born Hispanic women of Caribbean heritage.Impact: MBD may provide insight into mechanisms driving geographic and migration variations in breast cancer risk. Cancer Epidemiol Biomarkers Prev; 27(5); 566-74. ©2018 AACR. |
Kuwait Super Cup
The Kuwait Super Cup is an annual one-match association football competition in Kuwait organised by Kuwait Football Association (KFA). This competition serves as the season opener and is played between the Kuwaiti Premier League Champions and the Kuwait Emir Cup Winners of the previous season. The first game was played in 2008.
Competition Rules
League champions versus Emir's Cup winners, or Crown Prince Cup winners if one team won both League and Emir Cup in a single season.
One-legged match 90 minutes. If tied after 90 minutes, no extra time added on, straight to penalty shoot-out.
Results
Notes
^ Premier League champions, Kuwait Emir Cup winners and Kuwait Crown Prince Cup winners.
* Premier League champions and Kuwait Emir Cup winners.
# Kuwait Crown Prince Cup winners.
~ Premier League Runners-up.
Performances
Performances by club
logos
References
External links
http://www.goalzz.com/main.aspx?c=1092 - Kuwait Super Cup
Kuwait
Super
Category:Recurring sporting events established in 2008
Category:2008 establishments in Kuwait |
Q:
how to override a single inverted comma in awk command
How to override a single inverted comma in awk command.
cat a.txt |awk '{print "Students name is '"$1"'"}'
I want output as below:
Students name is 'Rajeev'
A:
You can do this:
echo ff | awk $'{print "Students name is \'" $1 "\'" }'
Words of the form $'string' are treated specially. The word expands to string, with backslash-escaped characters replaced as specified by the ANSI C standard. Backslash escape sequences, if present, are decoded as follows:
\\ backslash
\' single quote
\" double quote
\n new line
...
As explained here
|
Content-Length: 13
Content-Type: text/html; charset=utf-8
Date: Fri, 06 Oct 2017 09:02:08 GMT
Status: 404
X-Content-Type-Options: nosniff
X-Powered-By: hubot/netops1-stage
|
Gästebuch
13.12.2017 - Isreal(https://www.blackandwhitetrail.org/what-is-ciprodex-ear-drops-used-for-f3d4.pdf)
Where did you go to university? nutrex vitrix nts 5 reviews Because cancer may appear at a younger age and more aggressively in black women, doctors urge this demographic to educate themselves about the disease. Some doctors advise that black females should be offered genetic counseling and should undergo more frequent breast cancer screenings. Doctors typically advise women get a mammogram once every year after age 40. There also are hormone-blocking pills available and other options for women with a high predisposed risk to breast and ovarian cancer. scentuelle libido patch Singapore's Swiber Holdings, which owns the world's largestfleet of offshore construction vessels for shallow water andwants to venture into deepwater, is looking at Islamic bonds, orsukuk, after raising $754 million from corporate bond markets. donde puedo comprar femigra en argentina Liang Hong, vice president and operations manager of GSK(China) Investment Co Ltd, offered details on how he funnelledmoney through travel agencies by arranging conferences, some ofwhich were never held. donde comprar serophene en chile Cattrall said she hasnâÂÂt been as excited about a fitness trend since Jane FondaâÂÂs aerobics classes in the 1980s. She even encouraged Zotos to rename the practice âÂÂfizzy yogaâ because it sounds like more fun. intrinsa patches discontinued Israel says the moves are necessary to provide basic services that many nomadic Bedouins lack. The scattered, unrecognized villages do not have electric, water or sewer hookups, roads are bad and many Bedouins are illiterate.
13.12.2017 - Dwight(http://www.candidvip.com/betamethasone-dip-aug-cream-50gm-0485.pdf)
I'd like to transfer some money to this account donde puedo conseguir cytotec en costa rica Villa will kick off this season's campaign against Rotherham on Wednesday night and Lambert has revealed he is still haunted by the bitter memories of February's defeat to lower league opposition. aspirine masker waar te koop âÂÂWeâÂÂll stay here as long as it takes,â el-Shershaby, 44, said on July 22, standing beside stacks of rice bags as three of his assistances stirred massive pots of pasta and meat. âÂÂWe rely completely on donations and we feel support is rising.â lyrica vs provestra âÂÂI said, âÂÂa man?â â said Dorsey, who said his recent divorce depleted what heâÂÂd saved during the year he worked for Rahr. âÂÂThe pressure of waking up every morning â you never know when theyâÂÂre going to comeâ for eviction, he told Confidenti@l. ky jelly 55 gallon drum A couple of streets back from Manly's sun-drenched waterfront, Tim Hanrahan, the owner of the Aloha surf shop, unloads another consignment of high-end boards. I ask if his head is financially above water? "Just," he says, laughing. "I make OK money." intrinsa patch buy Kobler said that since the M23 rebellion began, the United Nations had sheltered nearly 200 combatants "who consistently and credibly claim to have been recruited on Ugandan but mainly on Rwandan territory."
13.12.2017 - Palmer(http://www.candidvip.com/kamagra-price-0485.pdf)
Which year are you in? kamagra kaufen aus deutschland Walsh, who formally replaced Tom Albanese at the helm in February after Rio posted its first annual loss in 18 years, said aggressive cost cutting meant the company was "firmly on the path toward becoming a leaner, more tightly-run business". abilify preis 10mg Even with the price difference, Imperial Capital analyst Jeff Kessler said it could take years for cable companies to gain consumers' trust in a market where security providers contact authorities in the event of an emergency. accutane ulcerative colitis lawsuit Porn queen Jenna Jameson reportedly wrapped around a pole - but instead of tips, she got a trip to jail. The XXX actress hit a light pole with her car around 1:30 a.m. on May 25 and was taken into custody for suspicion of drunken driving, TMZ.com reported. Jameson, 38, sustained minor injuries in the crash but refused medical treatment, according to the website. 10mg amitriptyline withdrawal Jennings knew the importance of establishing a one-on-one connection, especially with those who listened on the radio. This was not easy to do. The pace of a football game does not lend itself to storytelling. Jenningsâ style allowed him to make the link. He was critical when necessary, but never mean-spirited. buy rogaine 5 foam The agency's operations have come under intense scrutiny since disclosures this spring by former NSA contractor Edward Snowden that the U.S. government collects far more Internet and telephone data than previously publicly known.
13.12.2017 - Charlotte(https://www.blackandwhitetrail.org/sizepro-uk-f3d4.pdf)
US dollars himcolin gel se kya hota hai Clearly, in carrying extra fuel and landing gear, you take a hit on the rocketâÂÂs performance â the maximum payload you can carry to orbit is cut by about 30% if you try to return the first-stage to the launch site, says Musk. But the imperative is clear. prosvent scam Data firm ShopperTrak has forecast the slowest holiday sales growth since 2009, and last week, September retail sales showed U.S. shoppers were cautious, following a disappointing second quarter for many retailers. generic rogaine sam's club Volunteers look over their observation points on a map before starting their day in Detroit, Saturday, Sept. 21, 2013. Volunteers will be out Saturday and Sunday in an attempt to count the number of stray dogs as part of an Internet documentary series. It also is seen as a first step in finding a way to humanely deal with what has become a disease and safety risk for residents as the strays breed, increasing their population even as the city's population falls. (AP Photo/Carlos Osorio) codiovan 160/25 preisvergleich The top-shelf credit ratings of several bond insurers wereslashed during the economic crisis because of their venturesinto mortgage-backed securities in the years leading up to 2007.This dried up the supply of bond insurance. prijs sildenafil sandoz 50 mg Fearing a rigged vote or result skewed by threats or violence - as happened in the last election in 2008 - Zimbabweans have also set up sites to monitor the progress of the election and conduct of security forces.
13.12.2017 - Steep777(http://www.betisweb.com/foro/donde-comprar-viagra-sin-receta-accf.pdf)
Some First Class stamps scentuelle libido patch "Nobody - least of all Uncle Ian - could have guessed what could have come from that day in early 1952 when he sat down in front of his typewriter in Goldeneye [his estate in Jamaica] and wrote the first sentence of Casino Royale. legrand zeitschaltuhr maxirex The Tourism Ministry said it was launching a nationwide "I Respect Women" campaign to improve security and "raise awareness about the need for more sensitive behavior toward women." India is particularly worried about its image abroad, after a Swiss bicycle tourist was gang raped in March in central Madhya Pradesh state and an American woman was gang raped in June in the northern resort town of Manali. where to buy cytotec in uk A White House official said Obama will deliver remarks inthe White House Rose Garden on Monday to mark the fifthanniversary of the financial crisis, which was accelerated onSept. 15, 2008 when the Lehman Brothers firm filed forbankruptcy protection. ciprofloxacin eye drops for ear infection New England Patriots quarterback Tom Brady (12) throws a touchdown pass to Julian Edelman during the first half of an NFL football game against the Buffalo Bills, Sunday, Sept. 8, 2013, in Orchard Park. (AP Photo/Bill Wippert) ampicillin fiyat The views expressed in the following comments are not those of PharmaTimes or any connected third party and belong specifically to the individual who made that comment. We accept no liability for the comments made and always advise users to exercise caution. |
How will Trump policies impact the Nordic economies?
Senior analyst Las Olsen, Danske Bank, explains how the direction set by the upcoming Trump administration could have favourable and less favourable impacts on the Nordic economies, depending on the policies put in place. |
public enum e {
A, // should be 'e', not 'f'
B(), // should be 'e', not 'm'
C(1), // should be 'e', not missing
D, // should be 'e', not 'f'
E(), // should be 'e', not 'm'
F(1), // should be 'e', not missing
;
public String string;
public final Shape shape;
public final boolean twoKeywordsInARow;
public String getString() {
return string;
}
public final Shape getShape() {
return shape;
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.