text stringlengths 8 5.77M |
|---|
1. Introduction {#sec1}
===============
Basic helix-loop-helix (bHLH) transcription factors belong to a large family of genes present in the shared ancestor of plants, animals, and fungi, and this family has undergone an expansion in the land plant lineage \[[@B1]\]. Often referred to as helix-loop-helix (HLH) proteins, a loosely defined basic domain is involved in DNA binding \[[@B2]\] and present in the great majority of characterized proteins in this family \[[@B1]\]; thus the term bHLH factors is used henceforth. bHLH transcription factors have been implicated in numerous biological processes in plants including responses to light, cold, and hormones, epidermal cell fate determination, developmental patterning in roots and flowers, and anthocyanin biosynthesis \[[@B3]--[@B14]\]. In many cases, the bHLH family is critically important for correct developmental and environmental responses, as demonstrated by a large number of mutants in*Arabidopsis* with severe phenotypes as a result of a lesion in a bHLH-encoding gene. Development and dehiscence of the seed and seed pod (silique) \[[@B13], [@B15], [@B16]\] and responses to light quality and photoperiod \[[@B9], [@B17]--[@B21]\] are particularly known to be under the control of bHLH factors, and these phenomena are important to soybean agronomic performance. Characterization of the bHLH-encoding gene family can therefore be a useful step in the detailed functional characterization of the soybean genome.
The bHLH transcription factors have been extensively characterized at the sequence and structural level. In animals, the best-known and most thoroughly characterized bHLHs are well-known regulators and proto-oncogenes such as c-Myc, Max, and E47, where in many cases structural data on the proteins and their interaction with DNA molecules is available \[[@B2]\]. Many animal bHLHs show a binding preference for the so-called "E-box" motif (CANNTG) and the residues within the protein that are required for sequence specific recognition are well defined (reviewed in \[[@B2], [@B22], [@B23]\]). A number of plant bHLH proteins have been demonstrated to show a particular preference for binding the G-box (CACGTG) sequence (a subset of E-box) \[[@B3], [@B19], [@B24]--[@B27]\]. Homo- and heterodimer formation are also ubiquitous and required for DNA binding within the bHLH family, a property that increases the combinatorial possibilities for regulation of transcription. The *α*-helices in the bHLH domain and the other motifs outside the conserved bHLH domain are required for protein-protein interactions and function \[[@B28]--[@B32]\].
Classification of bHLH proteins is usually based on sequence homology within the conserved bHLH domain. In recent years, a number of proteins have been identified genetically that represent novel and atypical bHLH proteins that were not previously classified by homology-based approaches, in some cases because a basic domain was lacking \[[@B31], [@B33]--[@B36]\]. An intriguing feature of the bHLH family is that the proteins can often be very divergent outside of the highly conserved bHLH domain and contain a range of other motifs, not all of which have known functions \[[@B1], [@B37]\]. For this reason, a sequence-homology-based search approach using the entire gene sequence (such as BLAST of the canonical bHLHs from*Arabidopsis*) may not be the most appropriate tool to identify all the bHLH-encoding genes in a genome such as soybean. An alternative approach is to use data from the conserved HLH motif across the kingdoms of life to develop a hidden Markov model (HMM) that allows the detection of the bHLH domain across highly divergent sequences without the need for extensive sequence identity \[[@B38]\]. This type of approach has been successfully deployed for identifying conserved motifs in distantly related proteins and allows more sensitive and accurate discovery of a specific motif like the bHLH domain. The PFAM project (<http://pfam.sanger.ac.uk/>) uses a curated alignment approach to provide constantly updated HMMs for most characterized protein families, including the HLHs. HMMs for the subsidiary motifs of the different bHLH families can be generated using protein alignments.
Several recent genome-wide studies have examined and classified the bHLH protein family in*Arabidopsis thaliana*, rice, poplar, and other plants with whole-genome sequences, but these studies have not examined the conservation and diversification of this family in the soybean \[[@B1], [@B33], [@B37], [@B39]--[@B42]\]. The bHLH transcription factor family is the second largest family of transcription factors in plants (behind the myb family), and the complete whole-genome sequence of soybean revealed a number of genes predicted to encode bHLH proteins \[[@B43]--[@B45]\]. A study of this family of genes in soybean and classification of the bHLHs into subfamilies orthologous with those present in other species is useful in order to provide a list of candidate genes that are likely to be upstream regulators of a number of processes. Such lists of candidate genes enable association mapping approaches to proceed with knowledge of potential functions for regulatory genes likely involved in conferring seed and agronomic traits \[[@B46]\]. They are also very helpful as a means to rapidly identify candidate genes within positional genomic intervals defined by conventional genetic fine mapping in mutant studies or as quantitative trait loci (QTL) in recombinant inbred populations of soybean.
2. Materials and Methods {#sec2}
========================
2.1. Identification of bHLH Sequences Using Hidden Markov Models {#sec2.1}
----------------------------------------------------------------
Soybean,*Arabidopsis*, and rice gene models were originally identified from annotation versions contained in the Phytozome v7.0 package. The most recent version of the soybean assembly (Assembly v.2.0 and gene models for Phytozome v.10) was compared with our data; however since stringent new rules for inclusion of genes in the newer assembly and annotation resulted in the loss of 62 conserved bHLH genes including several with confirmed expression data, the legacy annotation and assembly were retained for this analysis (<http://www.phytozome.net/>) \[[@B44], [@B47], [@B48]\]. To identify bHLH transcription factors in the soybean genome, a hidden Markov model search (hmmsearch v. 3.0; <http://hmmer.janelia.org/>) was applied to the predicted open reading frames (ORFs) of soybean (genome and assembly version Gmax109; \[[@B44]\]) using the PFAM HLH hidden Markov model (PF00010; <http://pfam.sanger.ac.uk>). No *e*-value cutoff was initially applied in order to maximize detection of poorly annotated and orphan bHLH sequences. A cutoff was applied during manual curation (see next section). A total of 329 hits to unique predicted proteins containing putative HLH domains were initially identified. These included 31 ORFs not annotated as bHLHs by the soybean genome annotation and a small group of HLH proteins that lack the basic domain (see [Section 3](#sec3){ref-type="sec"}). Data on expression of soybean bHLH genes was obtained from <http://www.soybase.org/> and is described in \[[@B49]\].
2.2. Curation of bHLH Sequences {#sec2.2}
-------------------------------
Sequences were manually curated to identify mispredictions of splice sites, which often led to omission of part of the bHLH domain in the genome annotation, reducing the hidden Markov model score. Sequences that included in-frame stop codons in the Williams-82 genomic sequence or were missing part of the HLH domain were removed, and these soybean gene models are listed in Additional File 2 (see Additional File 2 in Supplementary Material available online at <http://dx.doi.org/10.1155/2015/603182>). We then examined the revised list for sequences that were atypical or were unlikely to be true bHLHs. Several studies have used a stringent cutoff restricting the number of mismatches to the canonical bHLH motif found in mammals \[[@B22], [@B39], [@B40], [@B50]\]. Other studies have used a less stringent cutoff to identify additional, atypical bHLHs in characterized genomes \[[@B33]\]. Empirically, it was observed in the soybean bHLH domains that such a cutoff of 6 mismatches to the core 11 residues or 11 mismatches to the larger 19 defined residues \[[@B51]\] would eliminate the soybean homologs of functionally characterized, bHLH-related proteins, and this also corresponded to the maximum number of mismatches observed in the soybean bHLH domains. Therefore, no cutoffs were used, other than those previously described (i.e., the HMM search had to hit the sequence (at any *e*-value) and no sequences with incomplete bHLH domains or that contained stop codons were included).
2.3. Multiple Sequence Alignment {#sec2.3}
--------------------------------
Alignments were performed using MAFFT v.6.811b \[[@B52]\] with the following parameters: alignments were visualized and edited using Geneious Pro v.5.4.6 for the Macintosh (Biomatters Ltd., Auckland, New Zealand).
2.4. Phylogenetic Analysis {#sec2.4}
--------------------------
The construction of the bootstrapped maximum likelihood phylogenetic tree was performed using the HPC-MPI version of RAxML version 7.3.0 \[[@B53]\] with Geneious used to manage, curate, and reformat the MAFFT alignment files. The program was run in an MPI environment on 96 processors. The PROTCAT option was used to select the appropriate model, and appropriate gamma model parameters were automatically selected by the software as was a maximum likelihood estimate of 25 per-site rate categories. The Dayhoff substitution matrix was used. 1052 bootstrap trees were generated, and the highest-scoring tree was visualized using the TreeExplorer utility of MEGA 5.0 and used together with bootstrap confidence values (as a percentage of trees) to create the figures. All trees were unrooted.
2.5. Secondary Motif Detection {#sec2.5}
------------------------------
Assignment of subsidiary motifs in the bHLH or HLH proteins was performed using the alignment of motifs provided in Supplemental Material by Pires and Dolan \[[@B1]\]. Hidden Markov models were generated from script-reformatted versions of these alignments using hmmbuild 2.3.2 (the 3.0 version of hmmbuild lacks import filters for alignments in formats other than Stockholm or SELEX \[[@B54]\]). The presence of motifs was detected by running the full-length predicted proteins against each model using hmmsearch as described above, using a bash shell script for automation. For the APB domain, the sequences in the alignment described by Khanna et al. \[[@B55]\] were realigned (using MAFFT*-*-auto*-*-reorder*-*-clustalout) and models generated and used for searching as described for the other motifs.
2.6. MEME Search and New Motif Detection {#sec2.6}
----------------------------------------
Using MEME (<http://meme.sdsc.edu>) we searched for up to 10 new sites between 2 and 300 residues wide. Using "discriminative motif discovery" a file was supplied containing the bHLH motif plus the sequences used to create the hidden Markov models from the known bHLH secondary motifs. A single strongly significant motif, Motif 40, was detected. As above, the alignment supplied by MEME for the new motif was used to create a hidden Markov model, and this model was used to search the soybean bHLHs to determine which of them contained the motif. As before no *e*-value cutoff was applied, however the Family X sequences all showed *e* \< 10^−7^ while the two Family IX sequences GmbHLH262 and 261 showed *e*-values of 0.0025 and 0.003, respectively.
3. Results {#sec3}
==========
3.1. The bHLH Domain Is Highly Conserved in Soybean bHLH Transcription Factors {#sec3.1}
------------------------------------------------------------------------------
In total, 319 gene models were identified as encoding bHLH transcription factors in soybean (see [Section 2](#sec2){ref-type="sec"}). Each soybean bHLH sequence in the alignment was assigned a number, as is the convention in other species \[[@B41]\]. A table showing the correspondence of the GmbHLH numbers to the soybean gene models from Glyma version 1.1 as well as version 2.0 and other bHLH classification information in tabular form can be found in Additional File 1. The bHLH domain consists of an N-terminal basic region of approximately 13 amino acids, followed by two alpha helices (14-15 residues in length) separated by a loop that ranges from 5 to 14 amino acids ([Figure 1](#fig1){ref-type="fig"}, Additional File 3). (Position numbers in [Figure 1](#fig1){ref-type="fig"} and Additional File 3 follow the convention of \[[@B22]\], with the exception of the numbering of the second HLH domain which is numbered consistent with our soybean alignment.) This pattern is conserved in multiple plant species as well as soybean \[[@B50], [@B51]\]. Within the two *α*-helices, several hydrophobic residues are thought to be required to stabilize the secondary structure of the protein, and these residues are highly conserved in both plant and animal sequences \[[@B22], [@B23]\]. At position 23, over 99% of soybean bHLHs have a characteristic L residue. At position 55, 96.8% of soybean bHLHs contain L residue. Positions 45 and 52 are occupied by either I, L, or V, in 98.4% and 94% of soybean bHLH proteins, respectively ([Figure 1](#fig1){ref-type="fig"}). Additional File 3 contains a full text multiple sequence alignment for all of the soybean bHLH domains.
The conservation of key residues within the basic region of the bHLH domain can predict both the potential to bind DNA and the preferred recognition sequence. The E residue at position 9 within the basic domain has been shown in protein crystal structures to make contact with the major groove of the DNA (reviewed in \[[@B23]\]). This position is conserved in 245 of 319 of the bHLHs identified in soybean (77%) and has previously been shown to be present in 74% of bHLH sequences from other plants \[[@B1]\]. It has been shown that E at position 9 and R at position 12 are required for the recognition of an E-box sequence \[[@B56]\]---244 of the soybean bHLHs have this configuration and can be classed as E-box binding. Another pattern has been described that includes H or K at position 5, E at position 9, and R at position 13 (H~5~-E~9~-R~13~); in animals these bHLHs recognize the E-box subset CACGTG \[[@B22]\]. This sequence is a commonly occurring promoter motif in plant genomes, where it is referred to as the G-box, and a number of plant bHLH proteins have demonstrated G-box binding activity \[[@B3], [@B24], [@B26], [@B27]\]. 186 (58%) of soybean bHLH proteins have a conserved H/K~5~-E~9~-R~13~ motif and thus could be candidates for binding the G-box sequence. The conservation of these residues that are potentially involved in protein-DNA interaction within soybean is an indication that the DNA-binding function and also the recognition sequence may be conserved.
Of the soybean bHLH proteins that lack the E~9~ residue (74 proteins) only eight have five or more basic residues within the basic region. The number of basic residues has been previously used as a criterion to classify HLH proteins as having the potential to bind DNA \[[@B40]\]. Since the E~9~ residue is thought to be required for E-box binding, it is possible that these proteins bind DNA at a non-E-box DNA sequence, although this has not yet been demonstrated for plant bHLHs \[[@B40]\]. The remaining 66 HLH domains, which contain 4 or fewer basic residues within the basic region, are classified as HLH proteins and are unlikely to bind DNA directly. Many proteins identified through mutant studies in recent years in plants as "atypical" or nonbasic bHLHs have few or no basic residues in this region \[[@B7], [@B31], [@B34], [@B35], [@B57]\]. They do not bind DNA but in some cases act in concert with the more typical bHLHs to regulate gene expression by negative interference, and similar non-DNA binding HLHs exist in animal systems \[[@B22], [@B31], [@B58], [@B59]\]. Since these helix-loop-helixes are related to the bHLHs and are involved in many of the same pathways, they are included in our characterization of soybean bHLHs if they are recognized by the HLH HMM.
Most plant bHLHs have a conserved intron structure with three introns within the bHLH domain \[[@B33], [@B39], [@B40]\]. The intron/exon patterns were examined for soybean bHLH-encoding genes, and it was determined that 31% of soybean bHLHs contain the pattern of three conserved introns (pattern A, [Figure 2](#fig2){ref-type="fig"}). 43% of the soybean bHLHs contain only one of these introns (pattern D), and 4% of soybean bHLHs have another subset of these conserved introns (patterns B, C, and E). Only 8.7% of soybean bHLHs exhibit a different splicing pattern, which fall into other distinct classes ([Figure 2](#fig2){ref-type="fig"}, patterns F, G, H, or other). 12% of soybean bHLHs have no introns within the bHLH domain. The proportions of distinct intron patterns in soybean genes are consistent with the intron structure distribution in the*Arabidopsis* and rice bHLH families \[[@B33], [@B39], [@B40]\]. As previously observed for the bHLH superfamily, intron distribution tends to be conserved within bHLH subfamilies and lends additional credence to these class distinctions. The intron pattern for each soybean bHLH is listed in Additional File 1.
3.2. Phylogenetic Relationships of Soybean bHLH Domains {#sec3.2}
-------------------------------------------------------
The bHLH superfamily in plants is composed of between 14 and 32 subfamilies based on phylogenetic analysis of the bHLH region \[[@B1], [@B33], [@B37], [@B39], [@B40]\]. Supporting these classifications, it has been found that both the intron patterns, other domains of sequence homology outside the bHLH region, and DNA binding potential are often conserved within these subfamilies. A phylogenetic reconstruction of the soybean bHLHs shown in [Figure 1](#fig1){ref-type="fig"}, together with at least one*Arabidopsis* bHLH sequence representing each of the major subfamilies, was generated based on the alignment of the bHLH domain ([Figure 1](#fig1){ref-type="fig"} and Additional File 3). The alignment used to generate the phylogenetic tree, which contains representative*Arabidopsis* sequences and excludes all but one of any identical soybean sequences, is supplied as Additional File 7. A bootstrapped maximum likelihood tree (1,052 bootstraps) was constructed from this alignment using RAxML \[[@B53]\]. The best scoring tree is displayed in [Figure 3](#fig3){ref-type="fig"} using a summary radiation diagram to show branch lengths and provide an overview of the similarities within 24 bHLH subfamilies found in soybean. The full phylogeny including bootstrap support values (expressed as percentages) is presented in Additional File 4. A number of intriguing aspects of the soybean bHLH proteins are apparent from this tree. Firstly, soybean appears not to contain any representatives of Family XIV. Family XIV has one functionally characterized member in*Arabidopsis*, SAC51/AtbHLH142, which is involved in spermidine synthase-mediated stem elongation \[[@B60]\]. Secondly, Family VIIa/b has been repeatedly shown to be involved in light signalling \[[@B9], [@B17]--[@B21]\]. Interestingly, PIF3 \[[@B20]\] (AtbHLH008), which interacts directly with phytochromes and mediates light-responsive gene expression, has a number of highly conserved homologs in soybean Family VIIa/b. The short branch lengths within this family may indicate higher levels of sequence or structural constraint. However, HFR1 \[[@B29]\] (AtbHLH026), also involved in light signalling and normally placed in Family VIIa/b, has only very distant similarity to any soybean protein and, in our analysis, appears as an outlier of Family XV ([Figure 3](#fig3){ref-type="fig"}, Additional File 4). HFR1 lacks a clear basic domain and may not be able to bind DNA \[[@B29]\]. We did not observe any atypical bHLH proteins or families in soybean that clearly do not fit into one of the characterized*Arabidopsis* families; however several ambiguous sequences were observed in the phylogeny ([Figure 3](#fig3){ref-type="fig"}, Additional File 4). We were able to assign families to all these sequences using branch length data, additional motif information, and BLAST searches; however not all families formed monophyletic groups (see Additional File 4).
In addition to the bHLH domain analysis, any of the bHLH subfamilies can also be distinguished by the presence of one or more characteristic motifs outside the bHLH domain \[[@B1], [@B33], [@B37], [@B55]\]. To identify these motifs in the predicted full-length sequences of the soybean bHLHs, HMMs were created from alignments of the motifs from across the plant kingdom that were previously published \[[@B1]\]. The soybean bHLHs and subfamilies that possess these defined motifs are highlighted in Additional File 1. All of the previously described motifs were detected with the exception of Motif 28, which is associated with Family XIV, which was also found to be absent from soybean. The HMM created from the alignment of the active phytochrome binding (APB) domain described in \[[@B55]\] matched precisely the same protein motifs as those identified using the HMM for Motif 14 \[[@B1]\]. A search was conducted using MEME (<http://meme.sdsc.edu>) for new motifs, by excluding the known secondary motifs plus the bHLH domain. A single motif was detected with the consensus sequence GLCLVPVScTqqVgseNGADYWAPayggg (Additional File 8). This sequence is strongly conserved in all the GmbHLH sequences 165--184 (Family X). In the Supplemental Material this is named Motif 40, although it follows closely the distribution of Motif 20; the NGADYWAP portion of this motif is similar to Motif 20 and it likely represents an expanded version of this motif. Much weaker similarity to Motif 40 is also observed in GmbHLH261 and GmbHLH262 of Family XI. This motif is also conserved in several*Arabidopsis* bHLHs in Family X.
3.3. Soybean bHLH Proteins Have Close Homologs in Other Plants {#sec3.3}
--------------------------------------------------------------
To compare the soybean bHLHs to*Arabidopsis* and*O. sativa* homologs, BLAST searches of the predicted*Arabidopsis* and rice proteomes were conducted with the predicted full-length coding sequences of the soybean bHLHs \[[@B47]\]. A total of 141 soybean bHLHs hit*Arabidopsis* proteins with \>50% amino acid sequence identity, and 288 had hits with an *e*-value of less than 10^−25^ (Additional File 5). A total of 151 soybean bHLHs shared \>50% sequence identity with rice, 255 with an *e*-value of less than 10^−25^. In order to increase confidence that true orthologs were detected, a reciprocal BLAST search of the soybean genome was performed using full-length*Arabidopsis* and rice bHLH sequences, and the orthologs are presented in Additional File 5. Of the*Arabidopsis* bHLHs identified as matching soybean bHLHs, all but one of the*Arabidopsis* sequences are known from previous classification of bHLH proteins in*Arabidopsis* \[[@B33], [@B37], [@B40]\]. The one*Arabidopsis* protein not previously classified as a bHLH is At2g40435, a protein with homology to 5 soybean HLH proteins. The soybean proteins lack a complete basic domain, show a reasonably conserved HLH motif but have some divergence from previously described consensus sequences, and match the HLH HMM with relatively low scores. At2g40435 has strong similarity to these soybean proteins in this predicted HLH region, but HMMER does not find a match to the HLH HMM at all. Five rice proteins (corresponding to 16 soybean genes, all of which were identified as similar to known*Arabidopsis* bHLHs) were also not in previous classifications of rice bHLH proteins (Additional File 5) \[[@B33], [@B39]\]. All but one of these proteins have a HLH domain predicted by the HMM search as used here for soybean; the fifth has no HMM similarity to the HLH but does have similarity to the HLHMycN conserved domain.
3.4. bHLHs and Genome Duplication {#sec3.4}
---------------------------------
Because of the recent duplication of the soybean genome \[[@B44]\], many soybean bHLH proteins have closely related homeologs (recently duplicated paralogs arising as a result of polyploidy) which may be as much as 98% identical at the DNA sequence level. To determine which bHLHs were recent homeologs, we combined the data on recently duplicated genomic regions of soybean and validated potential homeologs by sequence identity (tabulated data provided by Dr. Jessica Schuleter of the University of North Carolina, Charlotte) \[[@B44]\]. 213 of the soybean bHLHs exist in more than one homeologous copy. 135 are present as two copy loci, 21 are present in three copies, 52 are present in 4 copies, and 6 are present in 6 copies. Information on the homeologous groups of soybean bHLHs is included in the table in Additional File 1.
3.5. Expression of bHLHs in Soybean {#sec3.5}
-----------------------------------
Using a survey of the publicly available transcriptome data for soybean \[[@B49]\], it was investigated what fraction of the soybean bHLHs were actively expressed at some stage of plant development. It was determined that 281 of 319 (88%) bHLHs showed some evidence of expression at the mRNA level ([Figure 4](#fig4){ref-type="fig"}). 47% of these are expressed across root and leaf, as well as developing seed tissues, while the remaining genes showed some evidence of tissue specific expression (one or more tissue types). Notably, this included 5 soybean bHLH mRNAs that are expressed preferentially in nodules and are mostly absent from aerial tissues (Additional File 6). The closest*Arabidopsis* orthologs of these preferentially nodule-expressed bHLHs do not have known biological functions and do not cluster in any particular subfamily. Fifteen bHLH transcription factors are enriched in expression during soybean seed development. Among these are homologs of*TARGET OF MONOPTEROS 5* and*TRANSPARENT TESTA 8*, both of which have known roles in*Arabidopsis* embryo development (Additional File 6) \[[@B61], [@B62]\].
4. Discussion {#sec4}
=============
The whole-genome duplication events in soybean that occurred 59 million years ago and 13 million years ago have clearly had a substantial impact on the size of the bHLH family in soybean when compared to other plant species \[[@B1], [@B37], [@B39], [@B40], [@B44]\]. Most of the soybean bHLHs (213) were present in homeologous copies duplicated two or more times. Expression evidence was identified for 281 of the bHLH genes, and 122 bHLHs were expressed in leaf, seed, and root tissue. Fully 106 genes are present in only a single copy. These single-copy genes are likely the result of deletion of the homeolog after whole-genome duplication, perhaps because of negative selection due to deleterious effects from multigene dosage. Speculatively, these genes may be involved in critical developmental or other processes in which these deleterious effects are seriously disadvantageous, and thus selection for loss of the homeologous copy has already taken place. Several of the genes with strong evidence for expression and/or conservation were omitted from the current soybean genome annotation, suggesting that this version of the annotation omits a relatively large number of bHLH genes.
Based on sequence conservation within the basic domain, it can be predicted that the majority of soybean bHLHs (77%) have the potential to bind DNA, and 58% of all soybean bHLHs are likely to recognize the core G-box sequence, of which there are over 17,000 represented in the promoters of actively transcribed genes in the soybean genome (MEH, unpublished data). There is experimental evidence that different bHLH proteins have a preference for certain nucleotides flanking the core G-box sequence and that residues in the second *α*-helix may also be involved in DNA contact, increasing specificity of genomic sequence targets \[[@B24], [@B56], [@B63]\]. All but one of the bHLH subfamilies represented in other land plants are present in soybean, and the proportion of bHLHs in each subfamily was largely consistent between*Arabidopsis* and soybean, although soybean contains many more bHLH-encoding genes, implying a broadly similar set of functions for each bHLH family may be conserved. All but one of the conserved motifs identified in bHLH subfamilies were found in soybean bHLH genes. A small number of these motifs are known to be involved interactions with other proteins (such as the APB and leucine zipper motifs) \[[@B32], [@B55]\].
Using MEME a long, highly conserved motif was identified, which we term Motif 40. This sequence is strongly conserved in all Family X bHLHs in soybean. Much weaker similarity was found in two Family XI proteins. The sequence is also strongly conserved in*Arabidopsis* Family X proteins. The strongly conserved NGADYWAP portion of this motif is similar to Motif 20, with which it shares very similar distribution. Motif 40 also contains the GLCL sequence contained in Motif 22. We do not believe Motif 40 is related to Motif 22 because flanking conserved residues of Motif 22 are very different to those of Motif 40, and because the distribution of Motif 40 is strongly correlated with and predictive of membership in Family X. Motif 20 also correlates with Family X but is not found in all members with strong significance, perhaps due to greater discriminative power and sensitivity for the longer motif.
Recently a number of "atypical" bHLH genes have been described. The HMM method identified the bHLH domain in the closest soybean homologs of several of these genes including*KIDARI*,*ATBS1*, and*PRE1*, and these were used in our analysis. In the case of*LONESOME HIGHWAY*, a clear ortholog was present in soybean (Glyma12g31460, at a BLASTP *e*-value of 10^−134^) but this gene was not predicted to contain a bHLH domain using our HMM search. In the case of*PAR1* and*PAR2*, by contrast, no homolog was apparent within the soybean bHLH proteins identified here using the HMM. While*PAR1*and*PAR2* have BLAST hits in soybean, they are not clearly orthologs. The BLASTP *e* values of the best hits are in the range 10^−15^ to 10^−16^, which represents strong similarity but is a lower level of confidence than for the orthologs of other genes such as*KIDARI*. This may indicate that the putative HLH domains of*LONESOME HIGHWAY, PAR1,* and*PAR2* are divergent to an extent where structural similarity to canonical bHLHs is limited, or it could indicate that the HMM we used is not sensitive to this type of HLH domain, since it did not include representatives of this type of atypical bHLH.
However, five soybean predicted HLH genes were identified, highly similar to an*Arabidopsis* gene (with greater than 50% amino acid sequence identity and BLAST *e*-value of less than 2*e* − 33) not within the set of classified bHLH proteins. Interestingly, while all five soybean proteins are predicted to contain a HLH domain using the HMM approach, the same method does not predict a bHLH domain in the highly similar At2g40435 protein. The amino acid similarity between these proteins is very strong in the predicted HLH region of the soybean proteins, and the HMM score for the HLH prediction in the soybean proteins is not strong. The putative HLH domain is located at the extreme N-terminus of the soybean proteins, which fall into bHLH subfamily III but are not predicted to bind DNA. The At2g40435 protein is thus a candidate for an atypical bHLH. The intriguingly high level of sequence conservation in these genes across*Arabidopsis* and soybean may point to an important, previously unknown biological function, possibly connected with the bHLH similarity.
5. Conclusions {#sec5}
==============
We have identified a large number of candidate genes from a family with likely regulatory roles in many processes critical for soybean growth and genetic improvement. These results establish a foundation for future functional genomics studies to target bHLH-controlled processes for modification and improvement in soybean.
Supplementary Material {#supplementary-material-sec}
======================
######
As Supplementary Material we have included the following. Addititional File 1: an Excel spreadsheet file that includes names and expression data for all of the soybean bHLH-encoding gene models.
Additional File 2: A list of soybean gene models excluded from the analysis due to an incomplete bHLH domain or predicted in-frame stop codon.
Additional File 3: A full-text alignment of all 319 soybean bHLH domains in pdf format.
Additional File 4: a detailed phylogenetic tree of the soybean bHLH genes including full names and predicted family membership.
Additional File 5: An Excel spreadsheet showing the presumptive rice and Arabidopsis orthologs of the soybean bHLH genes.
Additional File 6: An Excel spreadsheet containing a list of bHLHs enriched for expression in seed or nodules.
Additional File 7: The alignment of 319 soybean bHLH genes in PHYLIP format for computer analysis.
Additional File 8: A LOGO illustration of the putative Motif 40.
Funding for this work was provided through the USDA-ARS Current Research Information System 3602-21000-006-00D to Karen A. Hudson and by the United Soybean Board Grant no. 1279 to Matthew E. Hudson. The authors would like to thank Dr. J. Schlueter for data on soybean duplicated genes and Christina Fliege for help in converting alignment images to text for HMM generation.
Disclosure
==========
Product names are necessary to report factually on available data. However the USDA neither guarantees nor warrants the standard of the product, and use of the names implies no approval of the product to the exclusion of others that may also be suitable.
Conflict of Interests
=====================
The authors declare that there is no conflict of interests regarding the publication of this paper.
Authors\' Contribution
======================
Karen A. Hudson curated protein domains, splicing, expression data, and sequence homology, constructed some figures, and drafted the paper. Matthew E. Hudson constructed HMMs, alignments, phylogenetic trees, and some figures and edited the paper.
{#fig1}
{#fig2}
{#fig3}
{#fig4}
[^1]: Academic Editor: Martine A. Collart
|
Technological innovations in speech processing applications have led to widespread development of speech-based automated systems and applications using automated speech recognition (ASR) and/or natural language understanding techniques. For example, speech recognition systems are being implemented to support hands-free command and control of various functions within a car environment. Moreover, speech recognition systems may be implemented for dictation/transcription applications to record and recognized spoken input from one or more persons and automatically generate a textual transcription that is stored and subsequently used for various applications (archiving, indexing, etc.).
There are various factors that can negatively affect the decoding accuracy of spoken input by ASR systems. For instance, in ASR applications, speech decoding accuracy can vary depending on the type of microphone system that is used to capture spoken input, the manner in which a person uses the microphone system and/or the varying environmental conditions that may exists at different times during capture and recordation of audio input by the microphone system. For instance, when a person uses a microphone having a manual talk switch (to manually turn on/off the microphone), the manual operation of the talk switch may lead to poor synchronisation between the time at which the talk switch button is pressed and the user begins speaking. For example, it a user simultaneously presses the talk switch button and begins to speak, the first spoken utterance may be chopped-off, or if the user begins speaking too late, environmental noise may be added to the audio input, leading to decreased decoding accuracy.
In other circumstances, the decoding accuracy of an ASR system can be adversely affected when the distance between the speaker's mouth and the microphone is varied during a speech session. For instance, for lip microphone devices, the distance between the lip microphone and the persons' mouth can change during a session resulting in possible degradation in decoding accuracy. Similar problems exists when using fixed microphones (e.g., in a car) which are sensitive to how a person is positioned near the microphone and the direction that the person faces when speaking.
Other causes of decreased decoding accuracy in ASR systems due to microphones that the ASR applications typically require the microphone parameters to be adapted and adjusted to the ASR system, as well as adapted and adjusted based on the speaker. For example, some conventional speech applications require the microphones to be set and re-adapted to the speech recognition system each time a new person begins a new dictation session. If certain adjustments and adaptations are not made for each new person using the speech recognition system, the error rate of the speech recognition can significantly increase.
For example, an ASR system may require various steps for adjusting the microphone system so as to optimize the speech recognition decoding accuracy. First, the ASR system determines an average level of static environmental noise in a given environment (no speech). Next, the system, may request spoken input by a person in the given environment, which allows the system to determine the volume of the speaker's voice relative to the static environmental noise, which is then used to adjust the sensitivity and volume of the microphone input. Typically, after the system adjusts the volume input level, other additional parameters in the ASR system may be adapted to an individual speaker when reading a particular prepared passage. In particular, each new user may be required to read a prepared passage after the volume has been, adjusted so as to adjust an array of parameters to fine tune adjust the microphone and better adapt the ASR system to the current user.
These microphone adjustment procedures of the ASR system may be problematic and impractical in certain applications. For example, when an ASR system is used for transcription of conferences, these microphone adjustment procedures may be too burdensome and thus not followed. In particular, at conferences and meetings, a microphone and ASR system is typically located on the podium or in the middle of a meeting table. In some instance, the microphone is head-mountable and located at the speaker's lips for accurate input. When speaking at a conference, each speaker may have time to activate his/her user-specific (pre-trained) speech model that was previously trained and stored in the ASR system, but there is typically no time for each speaker to perform a microphone adjustment process (as described above), which may foe needed to adjust the parameters of the ASR system to the speaker's personal speech patterns to obtain an optimal transcription.
The decoding accuracy of an ASR system can also foe affected depending on the type of microphone that was used when training the ASR system or when using the ASR system. For example, decoding accuracy can be decreased when the type of microphone used by a person to train the ASR system is different from the type of microphone used by that person when giving a lecture during a transcription or dictation session. By way of specific example, a person will typically train an ASR system by providing speech training data using a wired microphone connected to the ASR system, while the same speaker may actually use a wireless microphone when using the ASR system during a lecture, meeting, conference, which can lead to decreased decoding accuracy. |
---
abstract: 'On an arbitrary asymptotically complex hyperbolic (ACH) Einstein manifold, we consider a certain variational problem for almost complex structures compatible with the metric, for which the linearized Euler–Lagrange equation at Kähler-Einstein structures is given by the Dolbeault Laplacian acting on $(0,1)$-forms with values in the holomorphic tangent bundle. Thus we can enhance an already known assignment of an Einstein ACH metric to a given (possibly non-integrable) CR structure on the boundary at infinity by attaching a critical almost complex structure. It is also shown that the asymptotic expansion of a critical almost complex structure is determined by the CR structure up to a certain order.'
address:
- 'Department of Mathematics, Graduate School of Science, Osaka University, Toyonaka, Osaka 560-0043, Japan'
- 'Department of Mathematics, Stanford University, Stanford, CA 94305-2125, USA'
author:
- Yoshihiko Matsumoto
bibliography:
- 'myrefs.bib'
title: |
Canonical almost complex structures on\
ACH Einstein manifolds
---
Introduction
============
The study of asymptotically complex hyperbolic (ACH) Einstein spaces, the complex analog of asymptotically hyperbolic (AH) Einstein spaces, has been developed by some authors. The main issue is to describe the interplay between the space itself and the induced Cauchy–Riemann (CR) structure on the boundary (the *conformal infinity*): the fundamental problems are such as to determine all the CR structures on the boundary that are induced by *some* ACH Einstein metric and to describe analytic/geometric properties of ACH Einstein spaces in terms of the conformal infinity.
The AH setting, in which the role of CR structures is instead played by conformal structures, has been enthusiastically pursued—partly because of physical interest in the field of AdS/CFT correspondence. By contrast, the ACH setting, which is mathematically one step more intricate, needs further attention. These two settings can be seen as the first two instances of “asymptotically symmetric” spaces (see Biquard [@Biquard-99; @Biquard-00] and Biquard–Mazzeo [@Biquard-Mazzeo-06]); hence the study of ACH spaces serves as an attempt at a fuller appreciation of this general perspective.
While our subject can be placed in such a context, it can also be seen as a generalization of the classical studies of complete Kähler-Einstein metrics on bounded strictly pseudoconvex domains in complex manifolds (of dimension $n\ge 2$). Fefferman [@Fefferman-76] pioneered the field, and then the global existence of such metrics (on domains in Stein manifolds) was proved by Cheng and Yau [@Cheng-Yau-80]. Significant applications for those Kähler-Einstein metrics are made possible by the fact that their asymptotic behavior at the boundary can be analyzed fairly well in terms of the CR structure of the boundary, which was actually the point made in [@Fefferman-76].
In this article, we consider the problem of introducing an almost complex structure to a given ACH Einstein space, to extend the CR structure on the boundary in an appropriate sense and in a canonical manner. Doing so generalizes the Cheng–Yau situation described above.
The significance of this idea is recognized by recalling the work of Burns and Epstein [@Burns-Epstein-90]. They studied certain renormalized integrals of the Chern forms of the Cheng–Yau complete Kähler-Einstein metric, and they were able to express such an integral as the sum of a CR invariant of the boundary and a topological term. (This construction was recently revisited and made more accessible by Marugame [@Marugame-16].) Because the Chern forms are needed, it is crucial for this construction that the domain carries not only a metric but also a complex structure, which is, in this case, naturally inherited from the ambient complex manifold. This is the first obstacle to extending the Burns–Epstein construction to general ACH Einstein spaces. In 4-dimensional spaces, Biquard and Herzlich [@Biquard-Herzlich-05] resolved the issue by constructing a formal asymptotic expansion of a complex structure with respect to which the metric is asymptotically Kähler. This approach makes sense because any almost CR structure on 3-dimensional boundary automatically satisfies the formal integrability condition. In higher dimensions, the conformal infinities of ACH spaces are not necessarily integrable but just *compatible almost CR structures* adapted to a contact structure (the definition is given in Section \[subsec:compatible-almost-CR\]), and one has to find another condition on almost complex structures that replaces Kählerness.
To obtain an appropriate condition, we consider functionals of almost complex structures $J$. More precisely, we consider those $J$ that are compatible with a given ACH metric $g$ (in the sense that $g$ is Hermitian with respect to $J$) and are extensions of the conformal infinity of $g$ (whose meaning is made precise later). In this case, we call the pair $(g,J)$ an *ACH almost Hermitian structure*.
Then, there is one functional that serves our purpose: $$\label{eq:Functional-for-almost-complex-structure}
\mathcal{E}_g[J]=\int_X\left({\lvertN\rvert}^2+\frac{1}{2}{\lvert\tau\rvert}^2\right)dV_g.$$ Here, $N$ is the Nijenhuis tensor, and $\tau$ is the trace of $T$, where $T$ is the $(2,1)$-part of the exterior derivative of the fundamental 2-form $F(\mathord{\cdot},\mathord{\cdot})=g(J\mathord{\cdot},\mathord{\cdot})$ (see Section \[sec:Ehresmann-Libermann-connection\] for our normalization). It should be noted that the integral diverges in general in our setting and has to be taken as a formal expression. However, the associated Euler–Lagrange equation makes sense. In terms of the canonical Hermitian connection $\nabla$ on $(X,g,J)$ called the Ehresmann–Libermann connection, the Euler–Lagrange equation of $\mathcal{E}_g$ is $$\label{eq:Euler-Lagrange-for-almost-complex-structure}
\tensor{S}{_i_j}:=
i\left((\tensor{\nabla}{^k}+\tensor{\tau}{^k})\tensor{N}{_[_i_j_]_k}
+\frac{1}{2}\tensor{\nabla}{_[_i}\tensor{\tau}{_j_]}
+\frac{1}{2}\tensor{N}{_[_i_|_k_l}\tensor{T}{_|_j_]^k^l}
-\frac{1}{4}\tensor{N}{_k_i_j}\tensor{\tau}{^k}
+\frac{1}{4}\tensor{T}{^k_i_j}\tensor{\tau}{_k}\right)=0,$$ where $i$, $j$, $k$, and $l$ are holomorphic indices, and Einstein’s summation convention is observed. Obviously, $J$ is a critical point of $\mathcal{E}_g$ if $N=0$ and $\tau=0$ are satisfied, in which case $(g,J)$ is called *semi-Kähler* by Gauduchon [@Gauduchon-84]. (Note, however, that it is unclear whether there exists an ACH almost Hermitian structure $(g,J)$ that is semi-Kähler Einstein and not Kähler.)
Owing to our choice of the functional, the linearization $P_S$ of the mapping $J\mapsto S$, which can be seen as a differential operator acting on anti-Hermitian 2-forms (i.e., 2-forms $A$ satisfying $A(J\mathord{\cdot},J\mathord{\cdot})=-A(\mathord{\cdot},\mathord{\cdot})$) $$P_S\colon\Gamma(X,\mathord{\wedge}^2_\mathrm{aH})\to\Gamma(X,\mathord{\wedge}^2_\mathrm{aH}),$$ is a Laplace-type operator. Let us focus on the linearization at Kähler-Einstein structures for more specificity. In this case, if we identify $\Gamma(X,\mathord{\wedge}^2_\mathrm{aH})$ with a subspace of the set of $(0,1)$-forms with values in the holomorphic tangent bundle $T^{1,0}$ using the duality induced by the metric, then $P_S$ is identical to the Dolbeault Laplacian $\Delta_{{\overline{\partial}}}$: if ${\mathord{\mathrm{Ric}}}(g)=\lambda g$ (where $\lambda=-(n+1)$ for ACH Kähler-Einstein metrics), then $$\label{eq:linearized-Euler-Lagrange}
\tensor{(P_SA)}{_i_j}=\frac{1}{2}\tensor{(\Delta_{{\overline{\partial}}}A)}{_i_j}
=-\frac{1}{2}(\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_i_j}+\lambda\tensor{A}{_i_j}).$$ This is the property of our $\mathcal{E}_g$ that is important for us. Without it, our construction of solutions of below will be much more complicated, although not necessarily impossible. This property is also preferable from an aesthetic viewpoint because, on compact complex manifolds, the set of infinitesimal deformations of complex structures is identified with the space of harmonic $T^{1,0}$-valued $(0,1)$-forms, or equivalently, with the cohomology group $H^1(X,\Theta)$, $\Theta$ being the sheaf of germs of holomorphic vector fields (see, e.g., Kodaira [@Kodaira-05]).
We now formulate a perturbative global existence result for the system $$\label{eq:system-of-equations}
{\mathord{\mathrm{Ric}}}(g)=-(n+1)g,\qquad S=0.$$ Let us recall the result of Roth [@Roth-99-Thesis] and Biquard [@Biquard-00] (see also the English translation [@Biquard-00-English]) on deformations of Einstein ACH metrics, because our result will be its generalization: an Einstein ACH metric $g$ can be deformed into a family of such metrics parametrized by the conformal infinity when $\ker_{(2)}P_{\Hat{E}}=0$ is satisfied, where $P_{\Hat{E}}$ is the linearized gauged Einstein operator $\nabla_g^*\nabla_g-2\mathring{R}_g$ acting on symmetric 2-tensors (here, $\nabla_g$ is the Levi-Civita connection, and $\mathring{R}_g$ is the pointwise linear action of the curvature tensor) and $\ker_{(2)}P_{\Hat{E}}$ denotes its $L^2$-kernel. It can be easily observed that $\ker_{(2)}P_{\Hat{E}}=0$ is satisfied when $g$ has negative sectional curvature (see [@Roth-99-Thesis]\*[Proposition 4.8]{} and the comment following [@Biquard-00]\*[Définition I.1.6]{}). Moreover, the author proved in [@Matsumoto-preprint16] that, if $n\ge 3$, then the Cheng–Yau metric on any smoothly bounded strictly pseudoconvex domain in a Stein manifold of dimension $n$ satisfies $\ker_{(2)}P_{\Hat{E}}=0$.
Our claim in the theorem below is roughly the following: if what is given in the beginning is not only a metric $g$ but an ACH almost Hermitian structure $(g,J)$ that is Kähler-Einstein (or an *ACH Kähler-Einstein structure* for short), then under the same assumption $\ker_{(2)}P_{\Hat{E}}=0$, one can construct a family of deformed ACH almost Hermitian structures satisfying parametrized by the conformal infinity.
In the statement of the theorem, the set of all compatible almost CR structures adapted to a contact distribution $H$ is denoted by $\mathcal{C}_H$. Our terminology regarding classes of, and smooth families of, ACH metrics and ACH almost Hermitian structures is discussed in detail in Section \[sec:ACH\]. For $\delta\in(0,1]$, the set of ACH metrics (resp. ACH almost Hermitian structures) of “class $C^{2,\alpha}_\delta$” is denoted by $\mathcal{M}_\delta^{2,\alpha}$ (resp. $\tilde{\mathcal{M}}_\delta^{2,\alpha}$). It is always assumed that $n\ge 2$ in the sequel, and $\alpha\in(0,1)$ is arbitrarily fixed.
\[thm:global-existence\] Let $\overline{X}$ be a compact smooth manifold-with-boundary of dimension $2n$ whose boundary ${\partial}{X}$ is equipped with a contact distribution $H$. Suppose that $(g,J)\in\tilde{\mathcal{M}}_\delta^{2,\alpha}$ is an ACH Kähler-Einstein structure on the interior $X$ satisfying $\ker_{(2)}P_{\Hat{E}}=0$, whose conformal infinity is denoted by $\gamma_0$. Then, for a sufficiently small $C^{2,\alpha}$-neighborhood $\mathcal{U}$ of $\gamma_0$ in $\mathcal{C}_H$, there exists a family $(g_\gamma,J_\gamma)$ of elements of $\tilde{\mathcal{M}}_\delta^{2,\alpha}$ smoothly parametrized by the conformal infinity $\gamma\in\mathcal{U}$ with the following properties:
(i) $(g_{\gamma_0},J_{\gamma_0})=(g,J)$.
(ii) $(g_\gamma,J_\gamma)$ satisfies for each $\gamma\in\mathcal{U}$.
Moreover, the family can be constructed in such a way that, for each $\gamma$, there exists a $C^{2,\alpha}_\delta$-neighborhood $\mathcal{V}$ of $(g_\gamma,J_\gamma)$ in $\tilde{\mathcal{M}}_\delta^{2,\alpha}$, such that if $(g',J')\in\mathcal{V}$ satisfies , then there exists $\Phi\in\operatorname{Diff}(X)\cap\operatorname{Homeo}(\overline{X})$ for which $\Phi|_{{\partial}X}=\operatorname{id}_{{\partial}X}$ and $\Phi^*(g',J')=(g_\gamma,J_\gamma)$.
For future applications, knowing the asymptotic expansion of $(g,J)$ that (approximately) solves is also important. This is achieved with the following theorem. Note that the assertion regarding the metric $g$ and the Einstein equation is nothing but what is shown in [@Matsumoto-14; @Matsumoto-13-Thesis]; our focus here lies on the expansion of $J$.
\[thm:formal-existence\] Let $\overline{X}$ be a compact smooth manifold-with-boundary of dimension $2n$ whose boundary is equipped with a contact distribution $H$. Then, for any prescribed conformal infinity $\gamma\in\mathcal{C}_H$, there exists an ACH almost Hermitian structure $(g,J)$ that is smooth up to the boundary satisfying $${\mathord{\mathrm{Ric}}}(g)=-(n+1)g+O(x^{2n})\qquad\text{and}\qquad
S=O(x^{2n}),$$ where $x$ is any boundary defining function of $\overline{X}$. Up to the action of diffeomorphisms on $\overline{X}$ that restricts to the identity on ${\partial}{X}$, such $(g,J)$ is uniquely determined up to an $O(x^{2n})$ ambiguity, in such a way that the local geometry of $\gamma$ determines $(g,J)$ locally.
The remainder of this article is organized as follows. Basic facts regarding the Ehresmann–Libermann connection are summarized in the first half of Section \[sec:Ehresmann-Libermann-connection\], and in its second half we discuss the integration-by-parts formula expressed in terms of this connection and the variations of the torsion for deformations of almost complex structures. In Section \[sec:Euler-Lagrange-equation\], we explicitly derive the Euler–Lagrange equation of the functional $\mathcal{E}_g$ and compute its linearization at Kähler-Einstein structures (that is, we verify ). It is worth noting that there is also a way to obtain without writing down the Euler–Lagrange equation itself (see Remark \[rem:linearized-Euler-Lagrange-equation\]). Section \[sec:ACH\] is devoted to our precise definitions regarding ACH metrics and ACH almost Hermitian structures. Moreover, we offer a slightly modified version of the Fredholm theorem of Roth [@Roth-99-Thesis] and Biquard [@Biquard-00] regarding geometric linear differential operators, and we calculate the indicial roots of $P_S$. Then, Theorems \[thm:global-existence\] and \[thm:formal-existence\] are proved in Sections \[sec:proof-of-global-existence\] and \[sec:approximate-solutions\], respectively. We conclude the article by discussing a partial characterization of our functional in Section \[sec:possible-functionals\].
I am thankful to Rafe Mazzeo and Olivier Biquard for fruitful discussions. As a visiting scholar, I am also grateful to Stanford University for its warm and helpful working environment. This work was partially supported by JSPS KAKENHI Grant Number JP17K14189 and JSPS Overseas Research Fellowship.
Ehresmann–Libermann connection {#sec:Ehresmann-Libermann-connection}
==============================
The Ehresmann–Libermann connection $\nabla$ on almost Hermitian manifolds is a natural generalization of the Chern connection on Hermitian manifolds. It is the unique linear connection that respects the almost Hermitian structure whose torsion has vanishing $(1,1)$ part.
In this section, we begin by constructing the Lichnerowicz connection, another canonical Hermitian connection on almost Hermitian manifolds. Then we describe the Ehresmann–Libermann connection $\nabla$ in terms of it. This makes the relation between $\nabla$ and the Levi-Civita connection clear, which is useful for deriving the integration-by-parts formula in the latter part of this section. We will also establish variational formulae of the torsion of $\nabla$.
The main references for this section are Gauduchon [@Gauduchon-97], Kobayashi [@Kobayashi-03], and Tosatti–Weinkove–Yau [@Tosatti-Weinkove-Yau-08].
Lichnerowicz connection
-----------------------
Let $(g,J)$ be an almost Hermitian structure on a manifold of dimension $2n$, that is, a pair of a Riemannian metric $g$ and an almost complex structure $J$ such that $g(J\mathord{\cdot},J\mathord{\cdot})=g(\mathord{\cdot},\mathord{\cdot})$. Take the eigendecomposition $T_\mathbb{C}=T^{1,0}\oplus{\overline{T^{1,0}}}$ of the complexified tangent bundle with respect to $J$, and let $\pi_{1,0}\colon T_\mathbb{C}\to T^{1,0}$ be the natural projection. The *Lichnerowicz connection* of $(g,J)$ is the Hermitian connection ${\fourIdx{\mathrm{L}}{}{}{}{\nabla}}$ given by setting, for any vector field $V$ and any $(1,0)$ vector field $W$, $${\fourIdx{\mathrm{L}}{}{}{}{\nabla}}_VW=\pi_{1,0}({\fourIdx{*}{}{}{}{\nabla}}_VW),$$ where ${\fourIdx{*}{}{}{}{\nabla}}$ is the Levi-Civita connection of $g$. Note that ${\fourIdx{\mathrm{L}}{}{}{}{\nabla}}$ is uniquely extended to $T_\mathbb{C}$ by claiming that it is a real connection.
We can also express the definition in terms of the connection forms as follows. Take a local frame $\set{Z_i}$ of $T^{1,0}$, and set $Z_{{\overline{i}}}={\overline{Z_i}}$ so that $\set{Z_i,Z_{{\overline{i}}}}$ is a local frame of $T_\mathbb{C}$. Then, the components of the Levi-Civita connection form ${\fourIdx{*}{}{}{}{\omega}}$ with respect to this frame are classified into four types, $$\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_i^j},\qquad
\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_i^{{\overline{j}}}},\qquad
\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_{{\overline{i}}}^j},\qquad
\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_{{\overline{i}}}^{{\overline{j}}}},$$ satisfying $$\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_{{\overline{i}}}^j}={\overline{\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_i^{{\overline{j}}}}}}
\qquad\text{and}\qquad
\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_{{\overline{i}}}^{{\overline{j}}}}={\overline{\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_i^j}}}.$$ The Lichnerowicz connection form ${\fourIdx{\mathrm{L}}{}{}{}{\omega}}{_i^j}$ is given by $\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\omega}}}{_i^j}=\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_i^j}$.
Let $\set{\theta^i}$ be the dual coframe of $\set{Z_i}$. The first structure equation of the Levi-Civita connection reads $$d\theta^i
=\theta^j\wedge\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_j^i}
+\theta^{{\overline{j}}}\wedge\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_{{\overline{j}}}^i}.$$ This implies that the torsion form of the Lichnerowicz connection is given by $$\label{eq:Lichnerowicz-torsion-and-Levi-Civita}
{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}^i
=\theta^{{\overline{j}}}\wedge\tensor{{\fourIdx{*}{}{}{}{\omega}}}{_{{\overline{j}}}^i}.$$ In particular, ${\fourIdx{\mathrm{L}}{}{}{}{\Theta}}^i$ has no $(2,0)$ component.
We define the Nijenhuis tensor $N$ by setting $$\label{eq:definition-of-Nijenhuis-tensor}
[Z_i,Z_j]=-\tensor{N}{^{{\overline{k}}}_i_j}Z_{{\overline{k}}}\mod T^{1,0}.$$ Then, we derive the following:[^1] $$\label{eq:Lichnerowicz-torsion-20}
{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}^{{\overline{k}}}(Z_i,Z_j)
=d\theta^{{\overline{k}}}(Z_i,Z_j)
=-\theta^{{\overline{k}}}([Z_i,Z_j])
=\tensor{N}{^{{\overline{k}}}_i_j}.$$ We define the tensor $T$ by $$\label{eq:Lichnerowicz-torsion-11}
{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}^{k}(Z_i,Z_{{\overline{j}}})=\frac{1}{2}\tensor{T}{_i^k_{{\overline{j}}}}.$$ (The order of the indices here appears bizarre, but this will ultimately be a good convention; see .)
We will raise/lower the indices of various tensors using the metric $g$, as $\tensor{T}{^{{\overline{k}}}_{{\overline{i}}}_{{\overline{j}}}}
=\tensor{g}{^l^{{\overline{k}}}}\tensor{g}{_m_{{\overline{i}}}}\tensor{T}{_l^m_{{\overline{j}}}}$. Furthermore, any tensor that shows up in this article is real unless otherwise stated. Hence, for example, $\tensor{T}{^k_i_j}$ is automatically set to be the complex conjugate of $\tensor{T}{^{{\overline{k}}}_{{\overline{i}}}_{{\overline{j}}}}$.
Obviously, $\tensor{N}{^{{\overline{k}}}_i_j}$ is skew-symmetric in $i$ and $j$. This is also the case for $\tensor{T}{^k_i_j}$: $$\label{eq:T-skew-symmetry}
\tensor{T}{^k_i_j}=-\tensor{T}{^k_j_i}.$$ In fact, implies that $\tensor{{\fourIdx{*}{}{}{}{\Gamma}}}{^k_i_{{\overline{j}}}}=-\frac{1}{2}\tensor{T}{_i^k_{{\overline{j}}}}$, where $\tensor{{\fourIdx{*}{}{}{}{\Gamma}}}{^k_i_{{\overline{j}}}}$ is the Levi-Civita connection coefficient, and hence follows from the metric compatibility of the Levi-Civita connection.
Let $a$, $b$, and $c$ be indices running through $\set{1,2,\dots,n,{\overline{1}},{\overline{2}},\dots,{\overline{n}}}$. We introduce the index notation for the torsion by setting $${\fourIdx{\mathrm{L}}{}{}{}{\Theta}}^c=\frac{1}{2}\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}}{^c_a_b}\theta^a\wedge\theta^b$$ and requiring that $\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}}{^c_a_b}$ is skew-symmetric in $a$ and $b$. Hence, $\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}}{^k_{{\overline{i}}}_{{\overline{j}}}}=\tensor{N}{^k_{{\overline{i}}}_{{\overline{j}}}}$, $\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}}{^k_i_{{\overline{j}}}}=\frac{1}{2}\tensor{T}{_i^k_{{\overline{j}}}}$, and $\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}}{^k_i_j}=0$.
Ehresmann–Libermann connection {#ehresmannlibermann-connection}
------------------------------
We can construct the Ehresmann–Libermann connection $\nabla$ by adding correction terms to ${\fourIdx{\mathrm{L}}{}{}{}{\nabla}}$ as follows (cf. the proof of [@Kobayashi-03]\*[Theorem 2.1]{}). If the connection forms of $\nabla$ and ${\fourIdx{\mathrm{L}}{}{}{}{\nabla}}$ with respect to $\set{Z_i,Z_{{\overline{i}}}}$ are written as $$\tensor{\omega}{_i^j}=\tensor{\Gamma}{^j_k_i}\theta^k+\tensor{\Gamma}{^j_{{\overline{k}}}_i}\theta^{{\overline{k}}}
\qquad\text{and}\qquad
\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\omega}}}{_i^j}
=\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Gamma}}}{^j_k_i}\theta^k+\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Gamma}}}{^j_{{\overline{k}}}_i}\theta^{{\overline{k}}},$$ then $\Gamma$ should be set as $$\label{eq:EL-connection-construction}
\tensor{\Gamma}{^j_k_i}
=\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Gamma}}}{^j_k_i}-\frac{1}{2}\tensor{T}{^j_i_k},\qquad
\tensor{\Gamma}{^j_{{\overline{k}}}_i}
=\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Gamma}}}{^j_{{\overline{k}}}_i}+\frac{1}{2}\tensor{T}{_i^j_{{\overline{k}}}}.$$
Let the torsion be expressed as $\Theta^c=\frac{1}{2}\tensor{\Theta}{^c_a_b}\theta^a\wedge\theta^b$, as before. Then, $$\tensor{\Theta}{^k_i_{{\overline{j}}}}
=\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}}{^k_i_{{\overline{j}}}}-\frac{1}{2}\tensor{T}{_i^k_{{\overline{j}}}}=0$$ as required. (This computation also shows that $\nabla$ is characterized among almost Hermitian connections by the fact that $\tensor{\Theta}{^k_i_{{\overline{j}}}}=0$.) The compensation is that the $(2,0)$ component of the torsion is generally non-vanishing: $$\label{eq:Ehresmann-Libermann-torsion-20}
\tensor{\Theta}{^k_i_j}
=\tensor{{\fourIdx{\mathrm{L}}{}{}{}{\Theta}}}{^k_i_j}-\frac{1}{2}\tensor{T}{^k_j_i}+\frac{1}{2}\tensor{T}{^k_i_j}
=\tensor{T}{^k_i_j}.$$ The $(0,2)$ component of the torsion remains unchanged: $\tensor{\Theta}{^k_{{\overline{i}}}_{{\overline{j}}}}=\tensor{N}{^k_{{\overline{i}}}_{{\overline{j}}}}$.
The trace of $T$ is denoted by $\tau$: $$\tensor{\tau}{_i}=\tensor{T}{^j_i_j}.$$ Furthermore, we write ${\lvertN\rvert}^2=N_{ijk}N^{ijk}$ and ${\lvert\tau\rvert}^2=\tau_i\tau^i$. Now the functional makes sense.
We remark the following fact regarding the fundamental 2-form (cf. [@Kobayashi-03 Section 6]). The first equality below justifies our explanation of $T$ in the introduction.
Let $F$ be the fundamental 2-form associated with an almost Hermitian structure $(g,J)$, i.e., $F(\mathord{\cdot},\mathord{\cdot})=g(J\mathord{\cdot},\mathord{\cdot})$. Then, $$\label{eq:exterior-derivative-of-F}
dF=-i(\tensor{N}{_i_j_k}\theta^i\wedge\theta^j\wedge\theta^k
-\tensor{T}{_{{\overline{i}}}_j_k}\theta^{{\overline{i}}}\wedge\theta^j\wedge\theta^k
+\tensor{T}{_i_{{\overline{j}}}_{{\overline{k}}}}\theta^i\wedge\theta^{{\overline{j}}}\wedge\theta^{{\overline{k}}}
-\tensor{N}{_{{\overline{i}}}_{{\overline{j}}}_{{\overline{k}}}}\theta^{{\overline{i}}}\wedge\theta^{{\overline{j}}}\wedge\theta^{{\overline{k}}})$$ and $$\label{eq:divergence-of-F}
d^*F=-i(\tensor{\tau}{_i}\theta^i-\tensor{\tau}{_{{\overline{i}}}}\theta^{{\overline{i}}}).$$
Note that $F=i\tensor{g}{_i_{{\overline{j}}}}\theta^i\wedge\theta^{{\overline{j}}}$. By the first structure equation $d\theta^i=\theta^j\wedge\tensor{\omega}{_j^i}+\Theta^i$ and the metric compatibility, we obtain $$dF=i(d\tensor{g}{_i_{{\overline{j}}}}\wedge\theta^i\wedge\theta^{{\overline{j}}}
+\tensor{g}{_i_{{\overline{j}}}}d\theta^i\wedge\theta^{{\overline{j}}}
-\tensor{g}{_i_{{\overline{j}}}}\theta^i\wedge d\theta^{{\overline{j}}})
=i\tensor{g}{_i_{{\overline{j}}}}(\Theta^i\wedge\theta^{{\overline{j}}}-\theta^i\wedge\Theta^{{\overline{j}}}),$$ and follows. The proof of is deferred to the next subsection.
Furthermore, the curvature of $\nabla$ will be needed in Section \[sec:possible-functionals\]. The curvature 2-form $\Omega$ of the Ehresmann–Libermann connection is defined by $\tensor{\Omega}{_i^j}=d\tensor{\omega}{_i^j}-\tensor{\omega}{_i^k}\wedge\tensor{\omega}{_k^j}$. We express its coefficients as $\tensor{\Omega}{_i^j}=\frac{1}{2}\tensor{R}{_i^j_a_b}\theta^a\wedge\theta^b$, where $\tensor{R}{_i^j_a_b}$ is skew-symmetric in $a$ and $b$, whence $$\tensor{\Omega}{_i^j}
=\tensor{R}{_i^j_k_{{\overline{l}}}}\theta^k\wedge\theta^{{\overline{l}}}
+\frac{1}{2}\tensor{R}{_i^j_k_l}\theta^k\wedge\theta^l
+\frac{1}{2}\tensor{R}{_i^j_{{\overline{k}}}_{{\overline{l}}}}\theta^{{\overline{k}}}\wedge\theta^{{\overline{l}}}.$$ Note that our convention for $\tensor{R}{_i^j_a_b}$ amounts to saying that $$(\tensor{\nabla}{_{Z_a}}\tensor{\nabla}{_{Z_b}}
-\tensor{\nabla}{_{Z_b}}\tensor{\nabla}{_{Z_a}}
-\tensor{\nabla}{_{[Z_a,Z_b]}})Z_i
=\tensor{R}{_i^j_a_b}Z_j,$$ or in the index notation, $$\label{eq:commutation-covariant-derivatives}
(\tensor{\nabla}{_a}\tensor{\nabla}{_b}-\tensor{\nabla}{_b}\tensor{\nabla}{_a})V^i
=\tensor{R}{_j^i_a_b}V^j-\tensor{\Theta}{^c_a_b}\tensor{\nabla}{_c}\tensor{V}{^i}.$$
We write $\tensor{R}{_i_{{\overline{j}}}}=\tensor{R}{_k^k_i_{{\overline{j}}}}$ and $R=\tensor{R}{_i^i}=\tensor{R}{_i^i_j^j}$, and we moreover define $\tensor{R}{_{{\overline{i}}}_j}={\overline{\tensor{R}{_i_{{\overline{j}}}}}}$ as usual. Because $\nabla$ is a Hermitian connection, it follows that $\tensor{R}{_{{\overline{i}}}_j}=\tensor{R}{_j_{{\overline{i}}}}$.
The first Bianchi identity reads
$$\begin{aligned}
\label{eq:first-Bianchi-30}
\tensor{R}{_\{_j^i_k_l_\}}
&=\tensor{\nabla}{_\{_j}\tensor{T}{^i_k_l_\}}+\tensor{T}{^i_p_\{_j}\tensor{T}{^p_k_l_\}},\\
\label{eq:first-Bianchi-21}
\tensor{R}{_j^i_k_{{\overline{l}}}}-\tensor{R}{_k^i_j_{{\overline{l}}}}
&=\tensor{\nabla}{_{{\overline{l}}}}\tensor{T}{^i_j_k}
+\tensor{N}{^i_{{\overline{q}}}_{{\overline{l}}}}\tensor{N}{^{{\overline{q}}}_j_k},\\
\label{eq:first-Bianchi-12}
\tensor{R}{_j^i_{{\overline{k}}}_{{\overline{l}}}}
&=\tensor{\nabla}{_j}\tensor{N}{^i_{{\overline{k}}}_{{\overline{l}}}}
+\tensor{N}{^p_{{\overline{k}}}_{{\overline{l}}}}\tensor{T}{^i_p_j},\\
\label{eq:first-Bianchi-03}
0
&=\tensor{\nabla}{_\{_{{\overline{j}}}}\tensor{N}{^i_{{\overline{k}}}_{{\overline{l}}}_\}}
+\tensor{N}{^i_{{\overline{p}}}_\{_{{\overline{j}}}}\tensor{T}{^{{\overline{p}}}_{{\overline{k}}}_{{\overline{l}}}_\}},\end{aligned}$$
where $\set{\cdots}$ denotes the cyclic summation (see [@Tosatti-Weinkove-Yau-08]\*[Equations (2.8)–(2.11)]{}; the coefficients are modified in accordance with our normalization).
Integration by parts
--------------------
Here, for simplicity, we assume that we are in a setting in which boundary terms do not appear. The content here is discussed by Streets and Tian [@Streets-Tian-11]\*[Lemma 10.10]{} for Hermitian manifolds (i.e., for integrable almost complex structures).
Suppose that $\alpha$ is a $(1,0)$-form (so $\tensor{\alpha}{_{{\overline{i}}}}=0$). Then, by $$\tensor{\nabla}{^i}\tensor{\alpha}{_i}
=\tensor{{\fourIdx{*}{}{}{}{\nabla}}}{^i}\tensor{\alpha}{_i}-\frac{1}{2}\tensor{T}{_i^j^i}\tensor{\alpha}{_j}
=\tensor{{\fourIdx{*}{}{}{}{\nabla}}}{^i}\tensor{\alpha}{_i}-\frac{1}{2}\tensor{\tau}{^i}\tensor{\alpha}{_i},$$ where ${\fourIdx{*}{}{}{}{\nabla}}$ is the Levi-Civita connection. Moreover, since $\tensor{{\fourIdx{*}{}{}{}{\Gamma}}}{^k_i_{{\overline{j}}}}=-\frac{1}{2}\tensor{T}{_i^k_{{\overline{j}}}}$ by , $$\tensor{{\fourIdx{*}{}{}{}{\nabla}}}{^{{\overline{i}}}}\tensor{\alpha}{_{{\overline{i}}}}
=\tensor{\nabla}{^{{\overline{i}}}}\tensor{\alpha}{_{{\overline{i}}}}
+\frac{1}{2}\tensor{T}{^{{\overline{i}}}^j_{{\overline{i}}}}\tensor{\alpha}{_j}
=\frac{1}{2}\tensor{\tau}{^i}\tensor{\alpha}{_i}.$$ Therefore, the Levi-Civita divergence of $\alpha$ equals $-(\tensor{\nabla}{^i}\tensor{\alpha}{_i}+\tensor{\tau}{^i}\tensor{\alpha}{_i})$, and hence $$\label{eq:divergence-formula}
\int(\tensor{\nabla}{^i}+\tensor{\tau}{^i})\tensor{\alpha}{_i}dV_g=0.$$
We can use this formula in various ways. The simplest is the following: if $\alpha$ is a 1-form and $f$ is a function, then by applying to $f\tensor{\alpha}{_i}$, we obtain $$\int\tensor{\alpha}{^i}\tensor{\nabla}{_i}f\,dV_g
=-\int((\tensor{\nabla}{_i}+\tensor{\tau}{_i})\tensor{\alpha}{^i})f\,dV_g.$$ Likewise, if $\beta$ is a 2-tensor and $\alpha$ is a 1-form, then $$\int\tensor{\beta}{^i^j}\tensor{\nabla}{_i}\tensor{\alpha}{_j}\,dV_g
=-\int((\tensor{\nabla}{_i}+\tensor{\tau}{_i})\tensor{\beta}{^i^j})\tensor{\alpha}{_j}\,dV_g$$ (the index $j$ can also be replaced with ${\overline{j}}$). Similar operations are applicable to higher-rank tensors as well.
As an application, we compute the divergence of a real $(1,1)$-form $\beta=\tensor{\beta}{_i_{{\overline{j}}}}\theta^i\wedge\theta^{{\overline{j}}}$. If $\alpha=\tensor{\alpha}{_a}\theta^a$ is a real 1-form, then because the torsion of $\nabla$ has vanishing $(1,1)$-part, the $(1,1)$-part of $d\alpha$ is given by $$(d\alpha)^{(1,1)}
=(\tensor{\nabla}{_i}\tensor{\alpha}{_{{\overline{j}}}}-\tensor{\nabla}{_{{\overline{j}}}}\tensor{\alpha}{_i})
\theta^i\wedge\theta^{{\overline{j}}}$$ and hence $$(d\alpha,\beta)
=\int(\tensor{\nabla}{^{{\overline{j}}}}\tensor{\alpha}{^i}-\tensor{\nabla}{^i}\tensor{\alpha}{^{{\overline{j}}}})
\tensor{\beta}{_i_{{\overline{j}}}}\,dV_g
=\int(-((\tensor{\nabla}{^{{\overline{j}}}}+\tensor{\tau}{^{{\overline{j}}}})
\tensor{\beta}{_i_{{\overline{j}}}})\tensor{\alpha}{^i}
+((\tensor{\nabla}{^i}+\tensor{\tau}{^i})
\tensor{\beta}{_i_{{\overline{j}}}})\tensor{\alpha}{^{{\overline{j}}}})dV_g.$$ This equals $(\alpha,d^*\beta)$. Therefore, $\tensor{(d^*\beta)}{_i}=-(\tensor{\nabla}{^{{\overline{j}}}}+\tensor{\tau}{^{{\overline{j}}}})\tensor{\beta}{_i_{{\overline{j}}}}$ follows; we obtain as a special case.
Variations
----------
Suppose that $J_t$ is a smooth one-parameter family of almost complex structures compatible with a Riemannian metric $g$. We write $J=J_0$, and consider the derivative of $J_t$ at $t=0$. By differentiating $J_t^2=-1$, we see that the derivative $\dot{J}$ is an anti-Hermitian section of the endomorphism bundle $\operatorname{End}(T)$, and the metric compatibility of $J_t$ implies that $g(\dot{J}\mathord{\cdot},\mathord{\cdot})$ is skew-symmetric. We set $$\label{eq:first-variation-of-J}
g(\dot{J}\mathord{\cdot},\mathord{\cdot})=A(\mathord{\cdot},\mathord{\cdot}).$$ Then $A$ is an anti-Hermitian 2-form. Using a local $(1,0)$ coframe $\set{\theta^i}$ and its complex conjugate $\set{\theta^{{\overline{i}}}}$, we can write $$A=\frac{1}{2}\tensor{A}{_i_j}\theta^i\wedge\theta^j
+\frac{1}{2}\tensor{A}{_{{\overline{i}}}_{{\overline{j}}}}\theta^{{\overline{i}}}\wedge\theta^{{\overline{j}}},$$ where $\tensor{A}{_{{\overline{i}}}_{{\overline{j}}}}={\overline{\tensor{A}{_i_j}}}$, and $\tensor{A}{_i_j}$ is skew-symmetric in $i$ and $j$. Then, is expressed as $\tensor{\dot{J}}{_i^{{\overline{k}}}}\tensor{g}{_j_{{\overline{k}}}}=\tensor{A}{_i_j}$, or simply as $\tensor{\dot{J}}{_i_j}=\tensor{A}{_i_j}$.
Let $\nabla_t$ be the Ehresmann–Libermann connection of $(g,J_t)$. As an intermediate step toward the variational formulae of the torsion, we express the derivatives of the connection coefficients $\tensor{\Gamma}{^c_a_b}$ of $\nabla_t$ in terms of $\tensor{A}{_i_j}$. In the computation that follows, $\tensor{\Gamma}{^c_a_b}$ will be the connection coefficients of $\nabla_t$ *with respect to a fixed local frame $\set{Z_i,Z_{{\overline{i}}}}$ and the dual coframe $\set{\theta^i,\theta^{{\overline{i}}}}$*, where $Z_i$ are $(1,0)$ vector fields with respect to the original almost complex structure $J$ (and $Z_{{\overline{i}}}={\overline{Z_i}}$). We also remark that $\tensor{\dot{\Gamma}}{_a_b_c}$, which appears below, can be understood either as $\tensor{g}{_a_d}\tensor{\dot{\Gamma}}{^d_b_c}$ or as the derivative of $\tensor{g}{_a_d}\tensor{\Gamma}{^d_b_c}$, because $g$ is independent of $t$.
We begin with generalities that apply to all almost Hermitian connections. It follows from the metric compatibility that $\tensor{\dot{\Gamma}}{_c_a_b}+\tensor{\dot{\Gamma}}{_b_a_c}=0$. The compatibility with almost complex structures implies $\tensor{\nabla}{_c}\tensor{\dot{J}}{_a^b}-\tensor{\dot{\Gamma}}{^d_c_a}\tensor{J}{_d^b}
+\tensor{\dot{\Gamma}}{^b_c_d}\tensor{J}{_a^d}=0$. Therefore, we get $$\tensor{\nabla}{_i}\tensor{A}{_j^{{\overline{k}}}}+2i\tensor{\dot{\Gamma}}{^{{\overline{k}}}_i_j}=0
\qquad\text{and}\qquad
\tensor{\nabla}{_{{\overline{i}}}}\tensor{A}{_j^{{\overline{k}}}}+2i\tensor{\dot{\Gamma}}{^{{\overline{k}}}_{{\overline{i}}}_j}=0,$$ and hence,
$$\label{eq:complex-compatibility}
\tensor{\dot{\Gamma}}{^{{\overline{k}}}_i_j}
=\frac{i}{2}\tensor{\nabla}{_i}\tensor{A}{_j^{{\overline{k}}}},\qquad
\tensor{\dot{\Gamma}}{^{{\overline{k}}}_{{\overline{i}}}_j}
=\frac{i}{2}\tensor{\nabla}{_{{\overline{i}}}}\tensor{A}{_j^{{\overline{k}}}}.$$
Next, we use the definition of the Ehresmann–Libermann connection. Its torsion $\Theta$ has vanishing $(1,1)$ component, which means $\tensor{\Theta}{^c_a_b}+\tensor{J}{_a^d}\tensor{J}{_b^e}\tensor{\Theta}{^c_d_e}=0$. Since $\tensor{\dot{\Theta}}{^c_a_b}=2\tensor{\dot{\Gamma}}{^c_[_a_b_]}
=\tensor{\dot{\Gamma}}{^c_a_b}-\tensor{\dot{\Gamma}}{^c_b_a}$, this implies $$\tensor{\dot{\Gamma}}{^c_[_a_b_]}
+\tensor{J}{_a^d}\tensor{J}{_b^e}\tensor{\dot{\Gamma}}{^c_[_d_e_]}
+\frac{1}{2}\tensor{\dot{J}}{_a^d}\tensor{J}{_b^e}\tensor{\Theta}{^c_d_e}
+\frac{1}{2}\tensor{J}{_a^d}\tensor{\dot{J}}{_b^e}\tensor{\Theta}{^c_d_e}=0.$$ Consequently, we obtain $$\tensor{\dot{\Gamma}}{^k_i_{{\overline{j}}}}-\tensor{\dot{\Gamma}}{^k_{{\overline{j}}}_i}
+\frac{i}{2}\tensor{N}{^k_{{\overline{j}}}^l}\tensor{A}{_i_l}
+\frac{i}{2}\tensor{T}{^k_i^{{\overline{l}}}}\tensor{A}{_{{\overline{j}}}_{{\overline{l}}}}=0$$ and hence, by the second equality of , $$\tensor{\dot{\Gamma}}{^k_{{\overline{i}}}_j}
=\frac{i}{2}(\tensor{\nabla}{_j}\tensor{A}{_{{\overline{i}}}^k}
+\tensor{N}{^k_{{\overline{i}}}^l}\tensor{A}{_j_l}
+\tensor{T}{^k_j^{{\overline{l}}}}\tensor{A}{_{{\overline{i}}}_{{\overline{l}}}}).$$ Then, since $\tensor{\dot{\Gamma}}{_{{\overline{k}}}_i_j}=-\tensor{\dot{\Gamma}}{_j_i_{{\overline{k}}}}$, we also obtain $$\tensor{\dot{\Gamma}}{^k_i_j}
=-\frac{i}{2}(\tensor{\nabla}{^k}\tensor{A}{_i_j}
-\tensor{N}{_j_i^{{\overline{l}}}}\tensor{A}{^k_{{\overline{l}}}}
-\tensor{T}{_j^k^l}\tensor{A}{_i_l}).$$
Thus we have obtained the complete formula of $\tensor{\dot{\Gamma}}{^c_a_b}$.
We now turn to the torsion. Recall once again that $\tensor{\dot{\Theta}}{^c_a_b}=2\tensor{\dot{\Gamma}}{^c_[_a_b_]}$. Because $\tensor{N}{^c_a_b}=\frac{1}{2}(\tensor{\Theta}{^c_a_b}+\tensor{J}{_b^d}\tensor{J}{_e^c}\,\tensor{\Theta}{^e_a_d})$ and $\tensor{T}{^c_a_b}=\frac{1}{2}(\tensor{\Theta}{^c_a_b}-\tensor{J}{_b^d}\tensor{J}{_e^c}\,\tensor{\Theta}{^e_a_d})$, by a straightforward computation we obtain
\[eq:variation-Nijenhuis\] $$\begin{aligned}
\tensor{\dot{N}}{^k_i_j}
&=-\frac{i}{2}\tensor{N}{^{{\overline{l}}}_i_j}\tensor{A}{^k_{{\overline{l}}}},\\
\tensor{\dot{N}}{^k_i_{{\overline{j}}}}
&=-\frac{i}{2}\tensor{N}{^k_{{\overline{j}}}^l}\tensor{A}{_i_l},\\
\tensor{\dot{N}}{^k_{{\overline{i}}}_{{\overline{j}}}}
&=-i\left(\tensor{\nabla}{_[_{{\overline{i}}}}\tensor{A}{_{{\overline{j}}}_]^k}
-\frac{1}{2}\tensor{T}{^{{\overline{l}}}_{{\overline{i}}}_{{\overline{j}}}}\tensor{A}{^k_{{\overline{l}}}}\right)\end{aligned}$$
and
\[eq:variation-torsion\] $$\begin{aligned}
\label{eq:variation-torsion-20}
\tensor{\dot{T}}{^k_i_j}
&=
-i\left(\tensor{\nabla}{^k}\tensor{A}{_i_j}
+\tensor{N}{_[_i_j_]^{{\overline{l}}}}\tensor{A}{^k_{{\overline{l}}}}
+\tensor{T}{_[_i^k^l}\tensor{A}{_j_]_l}
-\frac{1}{2}\tensor{N}{^{{\overline{l}}}_i_j}\tensor{A}{^k_{{\overline{l}}}}\right),\\
\tensor{\dot{T}}{^k_i_{{\overline{j}}}}
&=-\frac{i}{2}\tensor{T}{^k_i_l}\tensor{A}{_{{\overline{j}}}^l},\\
\tensor{\dot{T}}{^k_{{\overline{i}}}_{{\overline{j}}}}
&=-\frac{i}{2}\tensor{T}{^{{\overline{l}}}_{{\overline{i}}}_{{\overline{j}}}}\tensor{A}{^k_{{\overline{l}}}}.\end{aligned}$$
Furthermore, it follows from that $$\label{eq:variation-tau}
\tensor{\dot{\tau}}{_i}=
-i\left(\tensor{\nabla}{^j}\tensor{A}{_i_j}
+\frac{1}{2}\tensor{N}{_i^{{\overline{j}}}^{{\overline{k}}}}\tensor{A}{_{{\overline{j}}}_{{\overline{k}}}}
+\frac{1}{2}\tensor{T}{_i^j^k}\tensor{A}{_j_k}
+\frac{1}{2}\tensor{\tau}{^j}\tensor{A}{_i_j}\right).$$
The functional and the Euler–Lagrange equation {#sec:Euler-Lagrange-equation}
==============================================
Suppose a Riemannian metric $g$ is fixed, and consider the set $\mathcal{J}_g$ of compatible almost complex structures. In this section, we first assume that our space is a closed manifold, and we define the functional $\mathcal{E}_g$ on $\mathcal{J}_g$ by ; that is, $$\mathcal{E}_g=\mathcal{E}^N_g+\frac{1}{2}\mathcal{E}^\tau_g,$$ where $$\mathcal{E}_g^N[J]=\int{\lvertN\rvert}^2dV_g
\qquad\text{and}\qquad
\mathcal{E}_g^\tau[J]=\int{\lvert\tau\rvert}^2dV_g.$$ We shall compute the Euler–Lagrange equation of $\mathcal{E}_g$. Then, the equation itself also makes sense on noncompact manifolds (or, on noncompact manifolds, we can interpret this as we are considering the relative values of the functional under compactly supported variations).
Let $J_t$ be a one-parameter smooth family of elements of $\mathcal{J}_g$ and introduce the tensor $A$ by . We write $$\left.\frac{d}{dt}\mathcal{E}_g[J_t]\right|_{t=0}
=\int((\dot{\mathcal{E}}_g)^{ij}\tensor{A}{_i_j}
+(\dot{\mathcal{E}}_g)^{{\overline{i}}{\overline{j}}}\tensor{A}{_{{\overline{i}}}_{{\overline{j}}}})dV_g
=\int 2{\operatorname{Re}}((\dot{\mathcal{E}}_g)^{ij}\tensor{A}{_i_j})dV_g,$$ where $\dot{\mathcal{E}}_g$ is skew-symmetric, and we introduce $\dot{\mathcal{E}}^N_g$ and $\dot{\mathcal{E}}^\tau_g$ similarly. Moreover, we omit $g$ from the notation when there is no fear of confusion.
\[prop:termwise-Euler-Lagrange\] Under the notation above, $$\begin{aligned}
\label{eq:Euler-Lagrange-Nijenhuis}
\dot{\mathcal{E}}^N_{ij}
&=i\left((\tensor{\nabla}{^k}+\tensor{\tau}{^k})\tensor{N}{_[_i_j_]_k}
+\frac{1}{2}\tensor{N}{_[_i_|_k_l}\tensor{T}{_|_j_]^k^l}\right),\\
\label{eq:Euler-Lagrange-tau}
\dot{\mathcal{E}}^\tau_{ij}
&=i\left(\tensor{\nabla}{_[_i}\tensor{\tau}{_j_]}
-\frac{1}{2}\tensor{N}{_k_i_j}\tensor{\tau}{^k}
+\frac{1}{2}\tensor{T}{^k_i_j}\tensor{\tau}{_k}\right).
\end{aligned}$$ Thus $\tensor{\dot{\mathcal{E}}}{_i_j}=\dot{\mathcal{E}}^N_{ij}+\frac{1}{2}\dot{\mathcal{E}}^\tau_{ij}$ equals $\tensor{S}{_i_j}$ in equation .
These are consequences of and . First, $$\left.\frac{d}{dt}\mathcal{E}^N[J_t]\right|_{t=0}
=\int 2{\operatorname{Re}}(\tensor{N}{^k^i^j}\tensor{\dot{N}}{_k_i_j})dV_g
=\int{\operatorname{Im}}(\tensor{N}{^k^i^j}(-\tensor{\nabla}{_i}\tensor{A}{_j_k}+\tensor{\nabla}{_j}\tensor{A}{_i_k}
+\tensor{T}{^l_i_j}\tensor{A}{_k_l}))dV_g,$$ and, using , we obtain $$\begin{split}
\left.\frac{d}{dt}\mathcal{E}^N[J_t]\right|_{t=0}
&=\int{\operatorname{Im}}(((\tensor{\nabla}{_i}+\tensor{\tau}{_i})\tensor{N}{^k^i^j})\tensor{A}{_j_k}
-((\tensor{\nabla}{_j}+\tensor{\tau}{_j})\tensor{N}{^k^i^j})\tensor{A}{_i_k}
+\tensor{N}{^k^i^j}\tensor{T}{^l_i_j}\tensor{A}{_k_l})dV_g\\
&=\int 2{\operatorname{Im}}\left(((\tensor{\nabla}{_k}+\tensor{\tau}{_k})\tensor{N}{^i^j^k})\tensor{A}{_i_j}
+\frac{1}{2}\tensor{N}{^i^k^l}\tensor{T}{^j_k_l}\tensor{A}{_i_j}\right)dV_g.
\end{split}$$ That is, $$\tensor{(\dot{\mathcal{E}}^N)}{^i^j}
=-i\left((\tensor{\nabla}{_k}+\tensor{\tau}{_k})\tensor{N}{^[^i^j^]^k}
+\frac{1}{2}\tensor{N}{^[^i^|^k^l}\tensor{T}{^|^j^]_k_l}\right).$$ Then, we obtain by taking the complex conjugate. Similarly, $$\begin{split}
\left.\frac{d}{dt}\mathcal{E}^\tau[J_t]\right|_{t=0}
&=\int 2{\operatorname{Re}}(\tensor{\tau}{^i}\tensor{\dot{\tau}}{_i})dV_g\\
&=\int {\operatorname{Re}}(\tensor{\tau}{^i}(-2i\tensor{\nabla}{^j}\tensor{A}{_i_j}
-i\tensor{N}{_i^{{\overline{j}}}^{{\overline{k}}}}\tensor{A}{_{{\overline{j}}}_{{\overline{k}}}}
-i\tensor{T}{_i^j^k}\tensor{A}{_j_k}
-i\tensor{\tau}{^j}\tensor{A}{_i_j}))dV_g\\
&=\int{\operatorname{Im}}(2\tensor{\tau}{^i}\tensor{\nabla}{^j}\tensor{A}{_i_j}
-\tensor{\tau}{^{{\overline{k}}}}\tensor{N}{_{{\overline{k}}}^i^j}\tensor{A}{_i_j}
+\tensor{\tau}{^k}\tensor{T}{_k^i^j}\tensor{A}{_i_j}
+\tensor{\tau}{^i}\tensor{\tau}{^j}\tensor{A}{_i_j})dV_g\\
&=\int{\operatorname{Im}}(-2((\tensor{\nabla}{^j}+\tensor{\tau}{^j})\tensor{\tau}{^i})\tensor{A}{_i_j}
-\tensor{N}{_{{\overline{k}}}^i^j}\tensor{\tau}{^{{\overline{k}}}}\tensor{A}{_i_j}
+\tensor{T}{_k^i^j}\tensor{\tau}{^k}\tensor{A}{_i_j}
+\tensor{\tau}{^i}\tensor{\tau}{^j}\tensor{A}{_i_j})dV_g\\
&=\int{\operatorname{Im}}(2(\tensor{\nabla}{^i}\tensor{\tau}{^j})\tensor{A}{_i_j}
-\tensor{N}{_{{\overline{k}}}^i^j}\tensor{\tau}{^{{\overline{k}}}}\tensor{A}{_i_j}
+\tensor{T}{_k^i^j}\tensor{\tau}{^k}\tensor{A}{_i_j})dV_g,
\end{split}$$ where the last equality is because of the skew-symmetry of $\tensor{A}{_i_j}$. Hence $$\tensor{(\dot{\mathcal{E}}^\tau)}{^i^j}
=-i\left(\tensor{\nabla}{^[^i}\tensor{\tau}{^j^]}
-\frac{1}{2}\tensor{N}{_{{\overline{k}}}^i^j}\tensor{\tau}{^{{\overline{k}}}}
+\frac{1}{2}\tensor{T}{_k^i^j}\tensor{\tau}{^k}\right),$$ and this implies .
Let us compute the linearization of the tensor $S$ with respect to $J$. Because of our formulation of Theorem \[thm:global-existence\], we are exclusively concerned with the linearization at Kähler structures, for which $N=0$ and $T=0$. (Note that, in this case, the Levi-Civita, Lichnerowicz, and Ehresmann–Libermann connections are the same.) By and , $$\begin{aligned}
\ddot{\mathcal{E}}^N_{ij}
&=i\tensor{\nabla}{^k}\tensor{\dot{N}}{_[_i_j_]_k}
=-\frac{1}{2}\tensor{\nabla}{^k}
(\tensor{\nabla}{_[_j}\tensor{A}{_k_]_i}-\tensor{\nabla}{_[_i}\tensor{A}{_k_]_j})
=-\frac{1}{2}(\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_i_j}
-\tensor{R}{_[_i^k}\tensor{A}{_j_]_k}
+\tensor{\nabla}{_[_i}\tensor{\nabla}{^k}\tensor{A}{_j_]_k}),\\
\ddot{\mathcal{E}}^\tau_{ij}
&=i\tensor{\nabla}{_[_i}\tensor{\dot{\tau}}{_j_]}
=\tensor{\nabla}{_[_i}\tensor{\nabla}{^k}\tensor{A}{_j_]_k}\end{aligned}$$ and therefore, $$\label{eq:linearized-Euler-Lagrange-for-Kahler}
\dot{S}_{ij}=-\frac{1}{2}(\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_i_j}
-\tensor{R}{_[_i^k}\tensor{A}{_j_]_k}).$$
The operator $P_S\colon A\mapsto\dot{S}$ has a close connection to the Dolbeault Laplacian $\Delta_{{\overline{\partial}}}={\smash{\overline{\partial}}}^*{\overline{\partial}}+{\overline{\partial}}\,{\smash{\overline{\partial}}}^*$ acting on $(0,1)$-forms with values in the holomorphic tangent bundle $T^{1,0}$. If we identify the anti-Hermitian 2-form $A$ with $\tensor{A}{_{{\overline{i}}}^j}\theta^{{\overline{i}}}\otimes Z_j$, then $$\begin{aligned}
\tensor{({\smash{\overline{\partial}}}^*{\overline{\partial}}A)}{_{{\overline{i}}}^j}
&=-2\tensor{\nabla}{^{{\overline{k}}}}\tensor{\nabla}{_[_{{\overline{k}}}}\tensor{A}{_{{\overline{i}}}_]^j}
=-\tensor{\nabla}{^{{\overline{k}}}}\tensor{\nabla}{_{{\overline{k}}}}\tensor{A}{_{{\overline{i}}}^j}
+\tensor{\nabla}{^{{\overline{k}}}}\tensor{\nabla}{_{{\overline{i}}}}\tensor{A}{_{{\overline{k}}}^j},\\
\tensor{({\overline{\partial}}\,{\smash{\overline{\partial}}}^*A)}{_{{\overline{i}}}^j}
&=-\tensor{\nabla}{_{{\overline{i}}}}\tensor{\nabla}{^{{\overline{k}}}}\tensor{A}{_{{\overline{k}}}^j},\end{aligned}$$ and hence $$\label{eq:Dolbeault-Laplacian}
\tensor{(\Delta_{{\overline{\partial}}}A)}{_{{\overline{i}}}^j}
=-(\tensor{\nabla}{_{{\overline{k}}}}\tensor{\nabla}{^{{\overline{k}}}}\tensor{A}{_{{\overline{i}}}^j}
+\tensor{R}{_k^j}\tensor{A}{_{{\overline{i}}}^k}).$$ This means that $\dot{S}$ is (if also regarded as a $T^{1,0}$-valued $(0,1)$-form) half of the skew-symmetric part of $\Delta_{{\overline{\partial}}}A$. In particular, we obtain , which we reproduce below.
\[prop:linearized-Euler-Lagrange-for-Kahler-Einstein\] If $(g,J)$ is Kähler-Einstein, with ${\mathord{\mathrm{Ric}}}(g)=\lambda g$, then the operator $$\label{eq:linearized-Euler-Lagrange-definition}
P_S\colon\Gamma(X,\mathord{\wedge}^2_\mathrm{aH})\to\Gamma(X,\mathord{\wedge}^2_\mathrm{aH}),\qquad
A=\dot{J}\mapsto\dot{S}$$ is given by $$\label{eq:linearized-Euler-Lagrange-bis}
\tensor{(P_SA)}{_i_j}
=-\frac{1}{2}(\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_i_j}+\lambda\tensor{A}{_i_j}).$$ If $A$ and $P_SA$ are regarded as $T^{1,0}$-valued $(0,1)$-forms, then $$\label{eq:equality-of-linearized-Euler-Lagrange-and-Dolbeault-Laplacian}
P_SA=\frac{1}{2}\Delta_{{\overline{\partial}}}A.$$
This claim is obvious from and . A little more conceptual way to put is as follows: Equations and show that $2\dot{S}$ equals $(\Delta_{{\overline{\partial}}}A)_\mathrm{skew}$, the skew-symmetric part of $\Delta_{{\overline{\partial}}}A$, at Kähler structures in general. Now, at Kähler-Einstein structures, $\Delta_{{\overline{\partial}}}$ respects the decomposition of the space of $T^{1,0}$-valued $(0,1)$-forms, which is identified with the space of anti-Hermitian 2-tensors, into the symmetric and the skew-symmetric parts. Therefore, in this situation, $2\dot{S}$ is nothing but $\Delta_{{\overline{\partial}}}A$ itself.
\[rem:linearized-Euler-Lagrange-equation\] The claim that $\dot{S}=\frac{1}{2}(\Delta_{{\overline{\partial}}}A)_{\mathrm{skew}}$ for Kähler structures has the following alternative proof, which does not depend on the explicit formula of $S$. Note that, if $A$, $N$, $\tau$ are understood as the $(0,1)$-, $(0,2)$-, $(0,0)$-forms with values in $T^{1,0}$ given by $$\tensor{A}{_{{\overline{i}}}^k}\theta^{{\overline{i}}}\otimes Z_k,\qquad
\frac{1}{2}\tensor{N}{^k_{{\overline{i}}}_{{\overline{j}}}}\theta^{{\overline{i}}}\wedge\theta^{{\overline{j}}}\otimes Z_k,\qquad
\tensor{\tau}{^k}Z_k,$$ respectively, then at Kähler structures, and may be written as $$\dot{N}=-\frac{i}{2}\,{\overline{\partial}}A,\qquad
\dot{\tau}=-i\,{\smash{\overline{\partial}}}^*A.$$ This implies that $N_t=-\frac{i}{2}t\,{\overline{\partial}}A+O(t^2)$ and $\tau_t=-it\,{\smash{\overline{\partial}}}^*A+O(t^2)$, and hence $$\mathcal{E}[J_t]
=\frac{1}{2}t^2(({\overline{\partial}}A,{\overline{\partial}}A)
+({\smash{\overline{\partial}}}^*A,{\smash{\overline{\partial}}}^*A))+O(t^3)
=\frac{1}{2}t^2(\Delta_{{\overline{\partial}}}A,A)+O(t^3).$$ Consequently, $$\frac{d}{dt}\mathcal{E}[J_t]=t(\Delta_{{\overline{\partial}}}A,A)+O(t^2)
=t\int\tensor{(\Delta_{{\overline{\partial}}}A)}{_{{\overline{i}}}^j}\tensor{A}{^{{\overline{i}}}_j}dV_g+O(t^2)
=t\int{\operatorname{Re}}(\tensor{(\Delta_{{\overline{\partial}}}A)}{_{{\overline{i}}}^j}\tensor{A}{^{{\overline{i}}}_j})dV_g+O(t^2).$$ This implies that $\dot{S}=\frac{1}{2}(\Delta_{{\overline{\partial}}}A)_{\mathrm{skew}}$.
ACH almost Hermitian structures {#sec:ACH}
===============================
In this section, we first describe our basic definitions regarding ACH metrics, and we present the concept of ACH almost Hermitian structures. Then, the Fredholm theorem for geometric differential operators is given, which is a modification of the one (more or less) considered by Roth [@Roth-99-Thesis] and Biquard [@Biquard-00]. Lee [@Lee-06] gives another useful reference on this matter, in the AH setting, which is also referred to to discuss the details here. Finally, we compute the indicial roots of the operator $P_S$. This is a requisite to applying the Fredholm theorem in the next section.
Compatible almost CR structures {#subsec:compatible-almost-CR}
-------------------------------
Let $(M,H)$ be a contact manifold of dimension $2n-1$, where $n\ge 2$. An *almost CR structure* $\gamma$ on the contact distribution $H$ is a (smooth) section of $\operatorname{End}(H)$ satisfying $\gamma^2=-\operatorname{id}_H$. We say that $\gamma$ is *compatible* when the *Levi form* with respect to a contact 1-form $\theta$, $$h_{\theta,\gamma}(V,W):=d\theta(V,\gamma W),\qquad
V,\,W\in H,$$ is symmetric and has definite signature. The condition is irrelevant to the choice of the 1-form $\theta$ because $h_{f\theta,\gamma}=fh_{\theta,\gamma}$.
Because $d\theta(V,\gamma W)=-\theta([V,\gamma W])$, $h_{\theta,\gamma}$ is symmetric if and only if $$[\Gamma(T^{1,0}_\gamma M),\Gamma(T^{1,0}_\gamma M)]\subset\Gamma(T^{1,0}_\gamma M\oplus{\overline{T^{1,0}_\gamma M}}),$$ where $H_\mathbb{C}=T^{1,0}_\gamma M\oplus{\overline{T^{1,0}_\gamma M}}$ is the eigenbundle decomposition of the complexification $H_\mathbb{C}$ of $H$ with respect to $\gamma$. This condition is called the *partial integrability* in the literature (e.g., [@Cap-Schichl-00; @Cap-Slovak-09; @Matsumoto-14; @Matsumoto-16; @Matsumoto-preprint16]). It is obvious that integrable almost CR structures are partially integrable, but it must be noted that the partial integrability itself is a pointwise condition. The definiteness of $h_{\theta,\gamma}$ is usually referred to as the *strict pseudoconvexity* of $\gamma$. Therefore our “compatible almost CR structures” are the same as strictly pseudoconvex partially integrable almost CR structures; our new terminology is meant for brevity and to avoid possible confusion. Compatible almost CR structures are generically non-integrable if $n\ge 3$.
In what follows, when $\gamma$ is a compatible almost CR structure, we always (implicitly) choose $\theta$ so that $h_{\theta,\gamma}$ is positive definite. For each fixed $\gamma$, there is a one-to-one correspondence between such contact forms and representative metrics of the natural conformal class $[h_{\theta,\gamma}]$ of metrics of $H$.
A contact form $\theta$ determines the *Reeb vector field* $T$, which is transverse to $H$, by the following conditions: $d\theta(T,\mathord{\cdot})=0$ and $\theta(T)=1$.
ACH metrics {#subsec:ACH-metrics}
-----------
Let $\overline{X}$ be a compact smooth manifold-with-boundary of dimension $2n$, where $n\ge 2$, and let $X$ be its interior. The boundary is denoted by ${\partial}X$. We assume that ${\partial}X$ is equipped with a contact distribution $H$, and the set of compatible almost CR structures of $H$ is denoted by $\mathcal{C}_H$.
The most general definition of ACH metrics can be stated as follows.
For $\gamma\in\mathcal{C}_H$ and a contact form $\theta$, we define the metric $g_{\theta,\gamma}$ on ${\partial}X\times(0,\varepsilon)_x$ by $$\label{eq:model-metric}
g_{\theta,\gamma}=\frac{1}{2}\left(4\frac{dx^2}{x^2}+\frac{\theta^2}{x^4}+\frac{h_{\theta,\gamma}}{x^2}\right),$$ where we extend $h_{\theta,\gamma}$ to $T{\partial}X$ by setting $h_{\theta,\gamma}(T,\mathord{\cdot})=0$ for the Reeb vector field $T$. A Riemannian metric $g$ on $X$ is called an *ACH metric* with *conformal infinity* $\gamma$ when $g$ is asymptotic to $g_{\theta,\gamma}$ for some contact form $\theta$, in the sense that there exists a diffeomorphism $\Phi$ from an open neighborhood $\mathcal{U}$ of ${\partial}X\subset\overline{X}$ to ${\partial}X\times[0,\varepsilon)_x$ such that the following are satisfied:
(i) $\Phi|_{{\partial}X}$ is the identity map on ${\partial}X$, where ${\partial}X\times\set{0}\subset{\partial}X\times[0,\varepsilon)$ is identified with ${\partial}X$.
(ii) ${\lvertg-\Phi^*g_{\theta,\gamma}\rvert}_{\Phi^*g_{\theta,\gamma}}$ uniformly tends to zero as $x\to 0$.
We call such $\Phi$ an *admissible collar neighborhood diffeomorphism* of an ACH metric $g$ with respect to $\theta$.
\[rem:Theta-tangent-bundles\] When $g$ is an ACH metric, an admissible collar neighborhood diffeomorphism actually exists for any choice of $\theta$. This is because, for $\theta$ and $\Hat{\theta}=e^{2u}\theta$, the model metrics $g_{\theta,\gamma}$ and $g_{\Hat{\theta},\gamma}$ are asymptotic to each other in the sense that, if we identify neighborhoods of the boundaries of two copies of ${\partial}X\times[0,\varepsilon)$ by a certain diffeomorphism that restricts to $\operatorname{id}_{{\partial}X}$, then the difference between $g_{\theta,\gamma}$ and $g_{\Hat{\theta},\gamma}$ tends to $0$ uniformly. Namely, a diffeomorphism $$\Psi=\Psi(q,x)=(\psi(q,x),\Hat{x}(q,x))\colon\mathcal{U}\to\Hat{\mathcal{U}},$$ where $\mathcal{U}$ and $\Hat{\mathcal{U}}$ are open neighborhoods of the boundary of ${\partial}X\times[0,\varepsilon)$, has the desired property if and only if $$\label{eq:collar-neighborhood-equivalence-1}
\varphi(\mathord{\cdot},0)=\operatorname{id}_{{\partial}X},\qquad
\left.\frac{\partial\Hat{x}}{\partial x}\right|_{{\partial}X\times\set{0}}=e^u,$$ and $$\label{eq:collar-neighborhood-equivalence-2}
(d\psi)_{(q,x)}(\partial_x)=xY+O(x^2) \qquad\text{for some $Y\in H_q$}.$$ Such a diffeomorphism $\Psi$ certainly exists—for example, we can take $\Psi(q,x)=(q,xe^{u(q)})$.
Let $\set{Y_1,\dots,Y_{2n-2}}$ be any local frame of $H$. The conditions and imply that the functions describing the change of basis from (the push-forward of) $\set{x\partial_x,x^2T,xY_1,\dots,xY_{2n-2}}$ to $\set{\Hat{x}\partial_{\Hat{x}},\Hat{x}^2\Hat{T},\Hat{x}Y_1,\dots,\Hat{x}Y_{2n-2}}$, where $T$ and $\Hat{T}$ are the Reeb vector fields of $\theta$ and $\Hat{\theta}$, respectively, are smooth up to the boundary, and the boundary values are given by $$\begin{pmatrix}
1 \\
& 1 \\
& & e^u \\
& & & \ddots \\
& & & & e^u
\end{pmatrix}.$$ The situation is geometrically better illustrated using the notion of $\Theta$-tangent bundle of Epstein, Melrose, and Mendoza [@Epstein-Melrose-Mendoza-91], but the author decided against using it in this article.
For technical reasons, we need subtler definitions of some classes of ACH metrics. We first introduce the notion of ACH metrics that are smooth up to the boundary. In the definition below, $\set{Y_1,\dots,Y_{2n-2}}$ is any local frame of $H$.
\[dfn:smooth-ACH-metric\] An ACH metric $g$ on $X$ is said to be *smooth up to the boundary* when, for some $\theta$, if $T$ is the Reeb vector field of $\theta$ and $\Phi\colon\mathcal{U}\to{\partial}X\times[0,\varepsilon)_x$ is an admissible collar neighborhood diffeomorphism with respect to $\theta$, then the components of $(\Phi^{-1})^*g$ with respect to $\set{x\partial_x,x^2T,xY_1,\dots,xY_{2n-2}}$ are smooth up to the boundary.
The content of Remark \[rem:Theta-tangent-bundles\] implies that, if $g$ is smooth up to the boundary (as an ACH metric), then the required smoothness of the components holds for any $\theta$ and any associated $\Phi$.
Next, let $E=\operatorname{Sym}^2T^*X$ be the bundle of symmetric 2-tensors over $X$. Given an ACH metric $g$ that is smooth up to the boundary, $C^{k,\alpha}(X,E)$ denotes the Hölder space of $C^k$ sections of $E$ with bounded $C^{k,\alpha}$ norm. For $\delta\in\mathbb{R}$, the weighted Hölder space is defined by $$C^{k,\alpha}_\delta(X,E)=x^\delta C^{k,\alpha}(X,E).$$ The notation above is used for other ${\mathit{GL}}(2n)$-invariant subbundles of $(TX)^{\otimes r}\otimes(T^*X)^{\otimes s}$ as well, or under the existence of some fixed ACH metric, for its $O(2n)$-invariant subbundles (and for $U(n)$-invariant subbundles of $(T_{\mathbb{C}}X)^{\otimes r}\otimes(T_{\mathbb{C}}^*X)^{\otimes s}$, if there is some fixed ACH almost Hermitian structure, as introduced in Section \[subsec:ACH-almost-Hermitian-structures\]).
\[dfn:ACH-metric-of-Holder-class\] For $\delta\in(0,1]$, an ACH metric $g$ on $X$ (which we assume to be smooth in $X$) is said to be *of class $C^{k,\alpha}_\delta$* if $g$ can be expressed as $$g=g_0+\sigma,$$ where $g_0$ is an ACH metric that is smooth up to the boundary and $\sigma\in C^{k,\alpha}_\delta(X,\operatorname{Sym}^2 T^*X)$, where $C^{k,\alpha}_\delta(X,\operatorname{Sym}^2 T^*X)$ is defined by $g_0$. The set of all ACH metrics on $X$ of class $C^{k,\alpha}_\delta$ is denoted by $\mathcal{M}^{k,\alpha}_\delta$.
In Definition \[dfn:ACH-metric-of-Holder-class\], we require that $g$ is smooth in the interior $X$. It might also be natural to weaken this smoothness condition. We do not, however, because our primary interest is directed toward those metrics that are smooth in $X$.
On any bounded strictly pseudoconvex domain $\Omega$ in a Stein manifold, the Cheng–Yau metric [@Cheng-Yau-80] is an ACH metric of class $C^{k,\alpha}_1$ for any $k$ and $\alpha$, if $\overline{X}$ is taken to be the square root of $\overline{\Omega}$ in the sense of Epstein–Melrose–Mendoza [@Epstein-Melrose-Mendoza-91]. This is because, if we express the metric in terms of a Kähler potential $\log(1/\varphi)$, then $\varphi$ has polyhomogeneous expansion at the boundary that involves only logarithmic singularity, as shown by Lee and Melrose [@Lee-Melrose-82]. (For the same reason, the Bergman metric on any bounded strictly pseudoconvex domain in $\mathbb{C}^n$ is also an ACH metric of class $C^{k,\alpha}_1$ for any $k$ and $\alpha$, owing to the result of Fefferman [@Fefferman-74].)
Finally, we introduce the notion of smooth families of elements of $\mathcal{M}^{k,\alpha}_\delta$.
A one-parameter family $g_t$ of ACH metrics of class $C^{k,\alpha}_\delta$ is called *smooth* if $g_t$ can be expressed as $$g_t=g_{0,t}+\sigma_t,$$ where $g_{0,t}$ and $\sigma_t$ have the following properties:
(i) \[item:smoothness-of-family-of-smooth-ACH-metrics\] Each $g_{0,t}$ is an ACH metric that is smooth up to the boundary, and for some (and hence for any) $\theta$, an admissible collar neighborhood diffeomorphism $\Phi$ can be taken for all $g_{0,t}$ independently on $t$. Moreover, the components of $(\Phi^{-1})^*g_{0,t}$ with respect to the local frame $\set{x\partial_x,x^2T,xY_1,\dots,xY_{2n-2}}$ are smooth in $t$ in the $C^{k,\alpha}$ topology on $\overline{X}$.
(ii) The additional term $\sigma_t$ belongs to $C^{k,\alpha}_\delta$ for all $t$, and $\sigma_t$ is smooth in $t$ as elements of $C^{k,\alpha}_\delta$. (Note that $C^{k,\alpha}_\delta$ is the same space for all $g_{0,t}$, according to \[item:smoothness-of-family-of-smooth-ACH-metrics\].)
In particular, by \[item:smoothness-of-family-of-smooth-ACH-metrics\], the conformal infinity $\gamma_t$ is automatically smooth in $t$ in the $C^{k,\alpha}$ topology.
A family of ACH metrics $g_\gamma\in\mathcal{M}^{k,\alpha}_\delta$ parametrized by the conformal infinity $\gamma\in\mathcal{U}$, where $\mathcal{U}$ is a $C^{k,\alpha}$-open subset of $\mathcal{C}_H$, is *smooth* if $g_{\gamma_t}$ is smooth in $t$ for any smooth 1-parameter family $\gamma_t$ of elements of $\mathcal{U}$.
ACH almost Hermitian structures {#subsec:ACH-almost-Hermitian-structures}
-------------------------------
As above, let $\overline{X}$ be a compact smooth manifold-with-boundary of dimension $2n$ whose boundary ${\partial}X$ is equipped with a contact distribution $H$. Let $g$ be an ACH metric on $X$. We set up our terminology regarding extensions of the conformal infinity $\gamma\in\mathcal{C}_H$ into almost complex structures on $X$ compatible with $g$, emphasizing the parallelism with the previous subsection.
Again, we start with a standard model on ${\partial}X\times[0,\varepsilon)_x$. For $\gamma\in\mathcal{C}_H$ and a contact form $\theta$, the almost complex structure $J_{\theta,\gamma}$ is defined as follows. Let $\set{Z_1,\dots,Z_{n-1}}$ be a local frame of the CR holomorphic tangent bundle $T^{1,0}{\partial}X\subset H_\mathbb{C}$, which is the $i$-eigenbundle of $\gamma$, and let $\set{Z_{{\overline{1}}},\dots,Z_{{\overline{n-1}}}}$ be its complex conjugate. Moreover, let $T$ be the Reeb vector field of $\theta$. We set $$\begin{aligned}
{3}
J_{\theta,\gamma}\left(\frac{1}{2}x\partial_x\right)&=x^2T,&\qquad
J_{\theta,\gamma}(x^2T)&=-\frac{1}{2}x\partial_x,\\
J_{\theta,\gamma}(xZ_\alpha)&=ixZ_\alpha,&\qquad
J_{\theta,\gamma}(xZ_{{\overline{\alpha}}})&=-ixZ_{{\overline{\alpha}}},&\qquad
\alpha&=1,\,\dots,\,n-1.\end{aligned}$$ This is in fact compatible with $g_{\theta,\gamma}$. Alternatively we can say that $J_{\theta,\gamma}$ is the almost complex structure whose holomorphic tangent bundle is spanned by $\set{\bm{Z}_0,\bm{Z}_1,\dots,\bm{Z}_{n-1}}$, where $$\bm{Z}_0=\frac{1}{2}x\partial_x+ix^2T\qquad\text{and}\qquad
\bm{Z}_\alpha=xZ_\alpha,\quad
\alpha=1,\,\dots,\,n-1.$$
\[dfn:ACH-almost-Hermitian\] An *ACH almost Hermitian structure* with *conformal infinity* $\gamma\in\mathcal{C}_H$ is a pair $(g,J)$ comprising an ACH metric $g$ with conformal infinity $\gamma$ and a compatible almost complex structure $J$ that is asymptotic to $(g_{\theta,\gamma},J_{\theta,\gamma})$ in the sense that, for some contact form $\theta$, there exists an admissible collar neighborhood diffeomorphism $\Phi\colon\mathcal{U}\to{\partial}X\times[0,\varepsilon)_x$ such that ${\lvertJ-\Phi^*J_{\theta,\gamma}\rvert}_{\Phi^*g_{\theta,\gamma}}$ uniformly tends to zero as $x\to 0$.
Note that, by claiming that $\Phi$ is an admissible collar neighborhood diffeomorphism, we are already assuming that ${\lvertg-\Phi^*g_{\theta,\gamma}\rvert}_{\Phi^*g_{\theta,\gamma}}$ uniformly tends to zero as $x\to 0$.
Remark \[rem:Theta-tangent-bundles\] again implies that the condition in Definition \[dfn:ACH-almost-Hermitian\] remains equivalent if we replace “for some contact form $\theta$” with “for any contact form $\theta$.”
An ACH almost Hermitian structure $(g,J)$ is said to be *smooth up to the boundary* when, for some (and hence for any) $\theta$, if $T$ is the Reeb vector field of $\theta$ and $\Phi\colon\mathcal{U}\to{\partial}X\times[0,\varepsilon)_x$ is some (and hence any) admissible collar neighborhood diffeomorphism with respect to $\theta$, then the components of $(\Phi^{-1})^*g$ and those of $(\Phi^{-1})^*J$ with respect to $\set{x\partial_x,x^2T,xY_1,\dots,xY_{2n-2}}$ are smooth up to the boundary.
The notions of ACH almost Hermitian structures of class $C^{k,\alpha}_\delta$ and smooth families thereof are introduced as before.
\[dfn:ACH-almost-Hermitian-structure-of-Holder-class\] For $\delta\in(0,1]$, an ACH almost Hermitian structure $(g,J)$ on $X$ (which we assume to be smooth on $X$) is said to be *of class $C^{k,\alpha}_\delta$* if $g$ and $J$ can be expressed as $$g=g_0+\sigma\qquad\text{and}\qquad
J=J_0+\psi$$ where $(g_0,J_0)$ is an ACH almost Hermitian structure that is smooth up to the boundary and $\sigma\in C^{k,\alpha}_\delta(X,\operatorname{Sym}^2T^*X)$, $\psi\in C^{k,\alpha}_\delta(X,\operatorname{End}(TX))$, where $C^{k,\alpha}_\delta(X,\operatorname{Sym}^2T^*X)$ and $C^{k,\alpha}_\delta(X,\operatorname{End}(TX))$ are defined by $g_0$. The set of all ACH almost Hermitian structures on $X$ of class $C^{k,\alpha}_\delta$ is denoted by $\tilde{\mathcal{M}}^{k,\alpha}_\delta$.
A one-parameter family $(g_t,J_t)$ of ACH almost Hermitian structures of class $C^{k,\alpha}_\delta$ is called *smooth* if $g_t$ and $J_t$ can be expressed as $$g_t=g_{0,t}+\sigma_t\qquad\text{and}\qquad
J_t=J_{0,t}+\psi_t$$ where
(i) \[item:smoothness-of-family-of-smooth-ACH-almost-Hermitian-structures\] Each $(g_{0,t},J_{0,t})$ is an ACH almost Hermitian structure that is smooth up to the boundary, and for some (and hence for any) $\theta$, a common admissible collar neighborhood diffeomorphism $\Phi$ can be taken for all $(g_{0,t},J_{0,t})$. Moreover, the components of $(\Phi^{-1})^*g_{0,t}$ and those of $(\Phi^{-1})^*J_{0,t}$ with respect to $\set{x\partial_x,x^2T,xY_1,\dots,xY_{2n-2}}$ are smooth in $t$ in the $C^{k,\alpha}$ topology on $\overline{X}$.
(ii) $\sigma_t\in C^{k,\alpha}_\delta$ and $\psi_t\in C^{k,\alpha}_\delta$ for all $t$. Moreover, $\sigma_t$ and $\psi_t$ are both smooth in $t$ as elements of these function spaces.
A family of ACH almost Hermitian structures $(g_\gamma,J_\gamma)\in\tilde{\mathcal{M}}^{k,\alpha}_\delta$ parametrized by the conformal infinity $\gamma\in\mathcal{U}$, where $\mathcal{U}$ is a $C^{k,\alpha}$-open subset of $\mathcal{C}_H$, is *smooth* if $(g_{\gamma_t},J_{\gamma_t})$ is smooth in $t$ for any smooth one-parameter family $\gamma_t$ of elements of $\mathcal{U}$.
The Fredholm theorem
--------------------
In order to prove Theorem \[thm:global-existence\], we need to invert the linearized operator in an appropriate function space. This is made possible by the following Fredholm theorem.
Suppose that each of $E$ and $F$ is a vector bundle of the form $(T_\mathbb{C}X)^{\otimes r}\otimes (T^*_\mathbb{C}X)^{\otimes s}$, or its $U(n)$-invariant subbundle, or the direct sum of such vector bundles, over an almost Hermitian manifold $(X,g,J)$. A linear differential operator $P\colon\Gamma(E)\to\Gamma(F)$ is called *geometric* of *order* $m$ if $Pu$ is given by a universal expression “of order $m$” in terms of the Ehresmann–Libermann connection $\nabla$, that is, as the sum of contractions of tensor products of $\nabla^lu$, $\nabla^{l-2}R$, $\nabla^{l-1}N$, $\nabla^{l-1}T$, and $g$, $g^{-1}$, where $l$ (which can be different from factor to factor) is at most $m$. If $k\ge m$ and $(g,J)$ is an ACH almost Hermitian structure of class $C^{k,\alpha}_\nu$ for some $\nu\in(0,1]$, then any geometric linear differential operator $P\colon\Gamma(E)\to\Gamma(F)$ of order $m$ naturally defines a bounded operator $$C^{k,\alpha}_\delta(X,E)\to C^{k-m,\alpha}_\delta(X,F)$$ for an arbitrary $\delta\in\mathbb{R}$.
There is a notion of *indicial roots* associated with any geometric linear differential operator $P$ that does not depend on $(X,g,J)$ but only on the universal expression of $P$. We refer the reader to [@Matsumoto-preprint16]\*[Section 1]{} for the definition. (Note that [@Matsumoto-preprint16] considered geometric operators associated with ACH metrics, rather than ACH almost Hermitian structures, but the definition of the indicial roots there applies to our case without any change.) Let $\Sigma_P\subset\mathbb{C}$ be the set of indicial roots; then, $$R_P:=\min_{s\in\Sigma_P}{\lvert{\operatorname{Re}}s-n\rvert}\ge 0$$ is called the *indicial radius* of $P$.
\[thm:Fredholm\] Let $X$ be equipped with an ACH almost Hermitian structure of class $C^{k,\alpha}_\nu$ for some $\nu\in(0,1]$. Let $P\colon\Gamma(X,E)\to\Gamma(X,E)$ be a formally self-adjoint geometric elliptic linear differential operator of order $m$, and assume that it satisfies, on $\mathbb{C}H^n$, $$\label{eq:coerciveness}
{\lVertu\rVert}_{L^2}\le C{\lVertPu\rVert}_{L^2},\qquad
u\in\operatorname{dom}P\subset L^2(\mathbb{C}H^n,E)$$ for some constant $C>0$, where $\operatorname{dom}P$ denotes the domain of the maximal closed extension of $P$ as an unbounded operator $L^2\to L^2$. Then, for $k\ge m$, the bounded operator $$P\colon C^{k,\alpha}_\delta(X,E)\to C^{k-m,\alpha}_\delta(X,E)$$ is a Fredholm operator of index zero if $n-R_P<\delta<n+R_P$, where $R_P$ is the indicial radius of $P$. Moreover, the kernel of $P$ within this range of $\delta$ is the same as $\ker_{(2)}P$, the $L^2$ kernel of $P$.
Note that the operator obviously satisfies the coerciveness assumption .
Versions of this theorem are given by Roth [@Roth-99-Thesis]\*[Proposition 4.15]{} and by Biquard [@Biquard-00]\*[Proposition I.3.5]{}. The expositions in these two references are restricted to certain second-order operators, but they are readily extended to general geometric operators *associated with ACH metrics*. Theorem \[thm:Fredholm\] is more general than that, for it concerns geometric operators *associated with ACH almost Hermitian structures*. The modification to the proof is minor, but it may not be totally trivial. We illustrate it in the following sketch of the proof.
Note that we omit the proof of the assertions on the Fredholm index of $P$ and that the kernel equals $\ker_{(2)}P$. We can follow [@Biquard-00]\*[pp. 34–35]{} or [@Lee-06]\*[pp. 50–56]{} for this part.
The assumption implies that the operator $P$ defines an isomorphism $H^m(\mathbb{C}H^n,E)\to L^2(\mathbb{C}H^n,E)$, where $H^m(\mathbb{C}H^n,E)$ is the $L^2$-Sobolev space of exponent $m$ (see [@Roth-99-Thesis]\*[Proposition 4.8]{}, [@Biquard-00]\*[Sections I.2.B and I.2.C]{}). Let $P^{-1}\colon L^2\to H^m$ be the inverse. Then, the boundary asymptotic behavior of the Green kernel of $P$ (i.e., the Schwartz kernel of $P^{-1}$) on $\mathbb{C}H^n$ can be determined using the indicial polynomial of $P$, and we conclude that $P$ also defines an isomorphism $C^{k,\alpha}_\delta\to C^{k-m,\alpha}_\delta$ in the range $n-R_P<\delta<n+R_P$ (cf. [@Roth-99-Thesis]\*[Proposition 4.12]{}, [@Biquard-00]\*[Proposition I.2.5]{}, and [@Lee-06]\*[Chapter 5]{}).
We identify $\mathbb{C}H^n$ with the Siegel upper-half space $X_0=\set{(z,w)\in\mathbb{C}^{n-1}\times\mathbb{C}|{\operatorname{Im}}w>{\lvertz\rvert}^2}$, and we equip $\overline{X}_0=\set{{\operatorname{Im}}w\ge{\lvertz\rvert}^2}$ with the square-root smooth structure: we set $r={\operatorname{Im}}w-{\lvertz\rvert}^2$, $t={\operatorname{Re}}w$ and $x=\sqrt{r/2}$, by which $(x,z,t)$ is a smooth global coordinate system on $\overline{X}_0$. The complex hyperbolic metric and the standard complex structure on $X_0$ are denoted by $g_0$ and $J_0$, respectively.
We now take coordinate neighborhoods in $\overline{X}$ near ${\partial}X$ modelled on open neighborhoods of $(0,0)\in\overline{X}_0$ such that $(g,J)$ is close to $(g_0,J_0)$ on them. (For what follows, see Sections 2.4, 2.5 and the beginning of the proof of Proposition 4.15 in [@Roth-99-Thesis]; the beginning of the proof of the Fredholm property in [@Biquard-00]\*[Proposition I.3.5]{}; and Chapter 2 and Lemma 6.1 in [@Lee-06]. Two minor adjustments are made here: we give an estimate for $J$, which is straightforward, and we use $\varepsilon^\nu$ instead of $\varepsilon$, which is necessary because of our definition of ACH metrics/almost Hermitian structures.) We fix a smooth boundary defining function $\tilde{x}$ of $\overline{X}$, and for $\varepsilon>0$, we set $\mathcal{U}_\varepsilon=\set{\tilde{x}\leq\varepsilon}\subset\overline{X}$. Then, we can take a diffeomorphism $\Phi_q\colon U_q\to V_1$, for each point $q\in{\partial}X$, where $U_q$ is an open neighborhood of $q$ in $\overline{X}$ and $$V_\rho=\set{(x,z,t)|x<\rho,\,{\lvertz\rvert}<\rho,\,{\lvertt\rvert}<\rho^2}
\subset\overline{X}_0,$$ such that $\mathcal{A}_\varepsilon=\set{U_q}_{q\in{\partial}X}$ covers $\mathcal{U}_\varepsilon$ and $$\begin{gathered}
{\lVert(\Phi_q)_*g-g_0\rVert}_{C^{k,\alpha}(V_1)}<C\varepsilon^\nu,\qquad
\sup_{V_1}{\lvert((\Phi_q)_*g)^{-1}\rvert}<C,\\
{\lVert(\Phi_q)_*J-J_0\rVert}_{C^{k,\alpha}(V_1)}<C\varepsilon^\nu
\end{gathered}$$ are satisfied, where the constant $C>0$ is independent of $q\in{\partial}X$ and of $\varepsilon>0$ (the norms on the left-hand sides pertain to $g_0$).
As a result, for any section $u\in C^{k,\alpha}_\delta(X,E)$ supported in $U_q$, we can establish an estimate of $Pu-\mathring{P}_qu$, where we define $\mathring{P}_q$ by “implanting” $P_0$ onto $U_q$, as follows. (The argument here corresponds to [@Roth-99-Thesis]\*[Proposition 4.14]{} and [@Biquard-00]\*[Equation (3.7)]{}, and [@Lee-06]\*[Equation (6.5)]{} in the AH case. Note that, in our setting, we need to use an identification of the holomorphic tangent bundles over $U_q$ and $V_1$.) Let $s$ be a fixed local smooth section of ${\mathit{GL}}(2n)\to{\mathit{GL}}(2n)/U(n)$ near the origin. For each $p\in U_q$, $((\Phi_q)_*(g,J))(\Phi_q(p))$ can be regarded as a point in ${\mathit{GL}}(2n)/U(n)$ by regarding $(g_0,J_0)(\Phi_q(p))$ as the origin, and under the assumption that $\varepsilon>0$ is sufficiently small, it is lifted by $s$ to an element of ${\mathit{GL}}(2n)$. This naturally defines a principal $U(n)$-bundle isomorphism $\mathcal{F}|_{U_q}\to \mathcal{F}_0|_{V_1}$ between the unitary frame bundles, inducing an isomorphism $\tilde{\Phi}_q\colon E|_{U_q}\to E_0|_{V_1}$ between the vector bundles. Let $\Psi_qu\in\Gamma(V_1,E_0)$ be defined by $$\Psi_qu=\tilde{\Phi}_q\circ u\circ\Phi_q^{-1},$$ by which we define $\mathring{P}_qu$ by $$\mathring{P}_qu=\Psi_q^{-1}(P_0(\Psi_qu)).$$ Then it can be shown that $${\lVertPu-\mathring{P}_qu\rVert}_{C^{k-m,\alpha}_\delta(U_q)}
\le C\varepsilon^\nu{\lVertu\rVert}_{C^{k,\alpha}_\delta(U_q)},$$ where $C>0$ does not depend on $q\in{\partial}X$ or $\varepsilon>0$.
At this moment, we need to look back and re-examine our construction of the family $\mathcal{A}_\varepsilon=\set{U_q}_{q\in{\partial}X}$. The construction of $\mathcal{A}_\varepsilon$ can be carried out so that there exists $N\in\mathbb{N}$, which is independent of $\varepsilon$, with the following property:
> For any $\varepsilon>0$, there is a finite subfamily $\mathcal{A}'_\varepsilon=\set{U_{q_\lambda}}_{\lambda\in\Lambda}$ of $\mathcal{A}_\varepsilon$ such that $\mathcal{U}_{\varepsilon/2}$ is covered by $\set{\Phi_{q_\lambda}^{-1}(V_{1/2})}$, and, for any $p\in\mathcal{U}_{\varepsilon}$, the number of $\lambda\in\Lambda$ for which $p\in U_{q_\lambda}$ is at most $N$.
(In [@Roth-99-Thesis], this is mentioned at the beginning of the proof of Proposition 4.15, and it is more carefully discussed in [@Lee-06]\*[Lemma 2.2]{}.) We take a subfamily $\mathcal{A}'_\varepsilon$ having the property above, and, instead of writing $\Phi_{q_\lambda}$, $U_{q_\lambda}$, and $\mathring{P}_{q_\lambda}$, we merely write $\Phi_\lambda$, $U_\lambda$, and $\mathring{P}_\lambda$, respectively.
Let $\varphi\colon V_1\to[0,1]$ be a smooth bump function that equals $1$ in $V_{1/2}$ and $0$ outside $V_{3/4}$. Let $\varphi_\lambda=\Phi_\lambda^*\varphi$, which is supported in $U_q$. Moreover, let $\varphi_0\colon X\to[0,1]$ be a compactly supported function that equals $1$ in $X\setminus\mathcal{U}_{\varepsilon/2}$. We set $$\chi_\lambda=\frac{\varphi_\lambda}{\displaystyle\sqrt{\varphi_0^2+\sum_{\lambda\in\Lambda}\varphi_\lambda^2}}
\qquad
\text{and}\qquad
\chi_0=\frac{\varphi_0}{\displaystyle\sqrt{\varphi_0^2+\sum_{\lambda\in\Lambda}\varphi_\lambda^2}}.$$ Then, $\set{\chi_\lambda^2}_{\lambda\in\Lambda}\cup\set{\chi_0^2}$ is a smooth partition of unity subordinate to the covering $\set{U_\lambda}_{\lambda\in\Lambda}\cup\set{X\setminus\mathcal{U}_{\varepsilon/2}}$ of $X$ such that ${\lVert\nabla\chi_\lambda\rVert}_{C^{k-1,\alpha}_1}<C$ and ${\lVert\chi_0\rVert}_{C^{k,\alpha}}<C$, where $C>0$ is independent of $\varepsilon$ (cf. the proof of [@Roth-99-Thesis]\*[Proposition 4.15]{}, the proof of the Fredholm property of [@Biquard-00]\*[Proposition I.3.5]{}, and [@Lee-06]\*[p. 47]{}). We define the bounded operator $Q\colon L^2\to H^m$, which is also a bounded operator as $C_\delta^{k-m,\alpha}\to C_\delta^{k,\alpha}$ for $n-R_P<\delta<n+R_P$, by $$Qu=\sum_{\lambda\in\Lambda}\chi_\lambda\mathring{P}_\lambda^{-1}(\chi_\lambda u)+\chi_0Q_0(\chi_0u).$$ Then, we obtain $$QPu=u+\sum_{\lambda\in\Lambda}\chi_\lambda\mathring{P}_\lambda^{-1}(P-\mathring{P}_\lambda)(\chi_\lambda u)
-\sum_{\lambda\in\Lambda}\chi_\lambda\mathring{P}_\lambda^{-1}([P,\chi_\lambda]u)
-\chi_0^2u+\chi_0Q_0(\chi_0Pu).$$ We write $$\begin{gathered}
Su=\sum_{\lambda\in\Lambda}\chi_\lambda\mathring{P}_\lambda^{-1}(P-\mathring{P}_\lambda)(\chi_\lambda u),\qquad
Tu=-\sum_{\lambda\in\Lambda}\chi_\lambda\mathring{P}_\lambda^{-1}([P,\chi_\lambda]u),\\
Ku=-\chi_0^2u+\chi_0Q_0(\chi_0Pu).
\end{gathered}$$ Then, $K$ is obviously a compact operator (as an operator $C^{k,\alpha}_\delta\to C^{k,\alpha}_\delta$). The first term, $Su$, has an estimate $${\lVertSu\rVert}_{C^{k,\alpha}_\delta}\le C\varepsilon^\nu{\lVertu\rVert}_{C^{k,\alpha}_\delta},$$ and, if $\delta'$ is such that $n-R_P<\delta<\delta'<n+R_P$, then $${\lVertTu\rVert}_{C^{k,\alpha}_\delta}\le C\varepsilon^{\min(1,\delta'-\delta)}{\lVertu\rVert}_{C^{k,\alpha}_\delta},$$ where $C>0$ is independent of $\varepsilon>0$. Therefore, if we take a sufficiently small $\varepsilon$, the operator norm of $S+T$ becomes less than $1$ and therefore $I+S+T$ is invertible. We set $Q_1=(I+S+T)^{-1}Q$ and $K_1=(I+S+T)^{-1}K$ to derive $Q_1Pu=u+K_1u$, where $K_1$ is compact. Similarly, we can show that $PQ_2u=u+K_2u$ for some bounded $Q_2$ and compact $K_2$; therefore, $P$ is a Fredholm operator. (This is the approach of [@Biquard-00]. One can also use the fact that $C^{k+1,\alpha}_\delta\hookrightarrow C^{k,\alpha}_{\delta'}$ is a compact embedding if $\delta>\delta'$; see [@Lee-06]\*[Section 6]{}.)
We need to specify the indicial radius of the operator .
\[lem:indicial-roots\] The indicial roots of the operator $P\colon\Gamma(X,\mathord{\wedge}^2_\mathrm{aH})\to\Gamma(X,\mathord{\wedge}^2_\mathrm{aH})$ given by are $n\pm\sqrt{n^2+2n+5}$ and $n\pm\sqrt{n^2+8}$, and hence, its indicial radius is $\sqrt{n^2+8}$.
Although the indicial roots are introduced in [@Matsumoto-preprint16] by using the polar coordinates associated with the representation $\mathbb{C}H^n={\mathit{PSU}}(n,1)/U(n)$, they are computable by expressing $P$ (on $\mathbb{C}H^n$) in the Siegel upper-half space coordinates. See the discussion following [@Matsumoto-preprint16]\*[Proposition 1.4]{}.
Let $X_0=\set{(z,w)\in\mathbb{C}^{n-1}\times\mathbb{C}|{\operatorname{Im}}w>{\lvertz\rvert}^2}$ and set $r={\operatorname{Im}}w-{\lvertz\rvert}^2$, $t={\operatorname{Re}}w$, and $x=\sqrt{r/2}$. Then, the complex hyperbolic metric, normalized so that ${\mathord{\mathrm{Ric}}}=-(n+1)g$, is $$g=\frac{1}{2}\left(4\frac{dx^2}{x^2}+\frac{\theta^2}{x^4}
+\frac{2}{x^2}\sum_{\alpha=1}^{n-1}dz^\alpha d{\smash{\overline{z}}}^\alpha\right),$$ where $\theta=\frac{1}{2}
(dt+i\sum_{\alpha=1}^{n-1}(z^\alpha d{\smash{\overline{z}}}^\alpha-{\smash{\overline{z}}}^\alpha dz^\alpha))$. We define the frame $\set{\bm{Z}_0,\bm{Z}_1,\dots,\bm{Z}_{n-1}}$ of $T^{1,0}$ by $$\bm{Z}_0=\frac{1}{2}x\partial_x+2ix^2\partial_t,\qquad
\bm{Z}_\alpha=x(\partial_{z^\alpha}+i{\smash{\overline{z}}}^\alpha\partial_t),\quad\alpha=1,\,\dots,\,n-1$$ so that $$\tensor{g}{_i_{{\overline{j}}}}=
\begin{cases}
1, & i=j=0,\\
1/2, & i=j=1,\,\dots,\,n-1,\\
0, & i\not=j.
\end{cases}$$ Then, the Christoffel symbols are given as follows (cf. [@Matsumoto-16]\*[Equation (5.2)]{}): $$\begin{aligned}
{4}
\tensor{\Gamma}{^0_0_0}&=-1,&\qquad
\tensor{\Gamma}{^0_{{\overline{0}}}_0}&=1,&\qquad
\tensor{\Gamma}{^0_\alpha_0}&=0,&\qquad
\tensor{\Gamma}{^0_{{\overline{\alpha}}}_0}&=0,\\
\tensor{\Gamma}{^\gamma_0_0}&=0,&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{0}}}_0}&=0,&\qquad
\tensor{\Gamma}{^\gamma_\alpha_0}&=-\tensor{\delta}{_\alpha^\gamma},&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{\alpha}}}_0}&=0,\\
\tensor{\Gamma}{^0_0_\beta}&=0,&\qquad
\tensor{\Gamma}{^0_{{\overline{0}}}_\beta}&=0,&\qquad
\tensor{\Gamma}{^0_\alpha_\beta}&=0,&\qquad
\tensor{\Gamma}{^0_{{\overline{\alpha}}}_\beta}&=\tfrac{1}{2}\tensor{\delta}{_\alpha_\beta},\\
\tensor{\Gamma}{^\gamma_0_\beta}&=-\tfrac{1}{2}\tensor{\delta}{_\beta^\gamma},&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{0}}}_\beta}&=\tfrac{1}{2}\tensor{\delta}{_\beta^\gamma},&\qquad
\tensor{\Gamma}{^\gamma_\alpha_\beta}&=0,&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{\alpha}}}_\beta}&=0.
\end{aligned}$$ By using these, we can show that, if we omit the terms involving derivatives of $A$ in the directions of $t$ and $z^\alpha$, ${\smash{\overline{z}}}^\alpha$ (which do not contribute to the indicial polynomial), $$\begin{aligned}
\tensor{\nabla}{_0}\tensor{\nabla}{_{{\overline{0}}}}\tensor{A}{_0_\alpha}
&=\frac{1}{4}(x\partial_x+1)(x\partial_x-3)\tensor{A}{_0_\alpha}
+(\text{tangential derivatives}),\\
\tensor{\nabla}{_\gamma}\tensor{\nabla}{_{{\overline{\sigma}}}}\tensor{A}{_0_\alpha}
&=\frac{1}{4}\tensor{h}{_\gamma_{{\overline{\sigma}}}}(x\partial_x-3)\tensor{A}{_0_\alpha}
-\tensor{h}{_[_\alpha_|_{{\overline{\sigma}}}}\tensor{A}{_0_|_\gamma_]}
+(\text{tangential derivatives}),\\
\tensor{\nabla}{_0}\tensor{\nabla}{_{{\overline{0}}}}\tensor{A}{_\alpha_\beta}
&=\frac{1}{4}x\partial_x(x\partial_x-2)\tensor{A}{_\alpha_\beta}
+(\text{tangential derivatives}),\\
\tensor{\nabla}{_\gamma}\tensor{\nabla}{_{{\overline{\sigma}}}}\tensor{A}{_\alpha_\beta}
&=-\frac{1}{4}\tensor{h}{_\gamma_{{\overline{\sigma}}}}(x\partial_x-2)\tensor{A}{_\alpha_\beta}
+(\text{tangential derivatives}).
\end{aligned}$$ Consequently, $$\begin{aligned}
\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_0_\alpha}
&=\frac{1}{4}((x\partial_x)^2-2nx\partial_x+(2n-1))\tensor{A}{_0_\alpha}
+(\text{tangential derivatives}),\\
\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_\alpha_\beta}
&=\frac{1}{4}((x\partial_x)^2-2nx\partial_x+(4n-4))\tensor{A}{_\alpha_\beta}
+(\text{tangential derivatives})
\end{aligned}$$ and hence, $$\begin{aligned}
P\tensor{A}{_0_\alpha}
&=-\frac{1}{4}((x\partial_x)^2-2nx\partial_x-(2n+5))\tensor{A}{_0_\alpha}
+(\text{tangential derivatives}),\\
P\tensor{A}{_\alpha_\beta}
&=-\frac{1}{4}((x\partial_x)^2-2nx\partial_x-8)\tensor{A}{_\alpha_\beta}
+(\text{tangential derivatives}).
\end{aligned}$$ This implies that the indicial roots are the roots of $s^2-2ns-(2n+5)$ and $s^2-2ns-8$; hence the claim.
Deformation of Kähler-Einstein structures {#sec:proof-of-global-existence}
=========================================
Again, let $\overline{X}$ be a compact smooth manifold-with-boundary of dimension $2n$ whose boundary ${\partial}X$ is equipped with a contact distribution $H$. Let $\alpha\in(0,1)$ be arbitrary but fixed.
In order to show Theorem \[thm:global-existence\], we must recall the gauge-fixing technique employed for deforming Einstein metrics by Roth [@Roth-99-Thesis] and Biquard [@Biquard-00]. We use the approach of [@Biquard-00]\*[Section I.1.C]{} here (compare with [@Roth-99-Thesis]\*[p. 31]{}). The following condition is imposed in addition to ${\mathord{\mathrm{Ric}}}(\tilde{g})=-(n+1)\tilde{g}$, where $g$ is some fixed Einstein ACH metric of class $C^{2,\alpha}_\delta$ with ${\mathord{\mathrm{Ric}}}(g)<0$ (and $\delta_g$ is the divergence operator): $$\label{eq:Bianchi-gauge}
\delta_g\tilde{g}+\frac{1}{2}d\operatorname{tr}_g\tilde{g}=0.$$ This is known to be a slice condition for the action of diffeomorphisms [@Biquard-00]\*[Proposition I.4.6]{}, meaning that the mapping $$\label{eq:slice-condition-for-metrics}
(\text{a neighborhood of $(0,g)$ in $C^{3,\alpha}_\delta(X,TX)\times
\set{\tilde{g}\in g+C^{2,\alpha}_\delta
|\text{$\tilde{g}$ satisfies \eqref{eq:Bianchi-gauge}}}$})
\to g+C^{2,\alpha}_\delta$$ defined by $(\xi,\tilde{g})\mapsto(\exp_g\xi)^*\tilde{g}$ is a homeomorphism near $(0,g)$. Because the Einstein equation is invariant under the diffeomorphism action, it is reasonable to solve the equation under , which is equivalent (see [@Biquard-00]\*[Lemme I.1.4]{}) to solving $$\label{eq:gauged-Einstein-equation}
\Hat{E}
=\Hat{E}_g(\tilde{g})
:={\mathord{\mathrm{Ric}}}(\tilde{g})+(n+1)\tilde{g}+\delta_{\tilde{g}}^*\left(\delta_g\tilde{g}+\frac{1}{2}d\operatorname{tr}_g\tilde{g}\right)
=0.$$ Once is solved “locally uniquely,” the discussion above implies that the original Einstein equation has a locally unique solution up to the diffeomorphism action.
The linearization of $\Hat{E}$ under the change of $\tilde{g}$ is the linearized gauged Einstein operator $P_{\Hat{E}}=\nabla_g^*\nabla_g-2\mathring{R}_g$ (half of it, strictly speaking) that appeared in the introduction. If $\ker_{(2)}P_{\Hat{E}}=0$, then Theorem \[thm:Fredholm\] implies that $P_{\Hat{E}}$ is also an isomorphism between some appropriate function spaces, which makes the implicit function theorem applicable. This is the outline of the argument of [@Roth-99-Thesis] and [@Biquard-00] (which is what Graham and Lee [@Graham-Lee-91] argued in the AH case).
Now suppose that $(g,J)\in\tilde{\mathcal{M}}^{2,\alpha}_\delta$ is such that ${\mathord{\mathrm{Ric}}}(g)<0$. The same argument for proving that is a local homeomorphism can be used to show that the mapping $$\begin{split}
&(\text{a neighborhood of $(0,(g,J))$ in $C^{3,\alpha}_\delta(X,TX)\times
\set{(\tilde{g},\tilde{J})\in (g,J)+C^{2,\alpha}_\delta
|\text{$\tilde{g}$ satisfies \eqref{eq:Bianchi-gauge}}}$})\\
&\to (g,J)+C^{2,\alpha}_\delta
\end{split}$$ defined similarly is a local homeomorphism near $(0,(g,J))$. Therefore, if we can solve the system $$\label{eq:gauged-aKE-system}
\Hat{E}=0,\qquad S=0$$ locally uniquely, then Theorem \[thm:global-existence\] follows. The system will be solved by the implicit function theorem, just like .
In order to carry this out, we need a preliminary approximate solution to .
\[lem:first-approximate-solution\] Let $(g,J)$ be any ACH almost Hermitian structure of class $C^{2,\alpha}_\delta$. Then $(g,J)$ is automatically an approximate solution of in the sense that $$\Hat{E}_g(g)=O(x^\delta)\qquad\text{and}\qquad
S=O(x^\delta),$$ where $x$ is an arbitrary boundary defining function of $\overline{X}$.
The claim on $\Hat{E}$ is essentially proved in [@Biquard-00]\*[Section I.4.B]{} (see also [@Roth-99-Thesis]\*[p. 32]{}). What is considered there is a particular $g$, smooth up to the boundary, that is associated with an arbitrarily given $\gamma\in\mathcal{C}_H$, and it is shown that $\Hat{E}=O(x)$. A general $g\in\mathcal{M}^{2,\alpha}_\delta$ is different from such a metric by an element of $C^{2,\alpha}_\delta$, and hence $\Hat{E}$ is $O(x^\delta)$.
We can take a similar approach to show $S=O(x^\delta)$. Any $(g,J)\in\tilde{\mathcal{M}}^{2,\alpha}_\delta$ can be expressed as $g=g_{\theta,\gamma}+\sigma$ and $J=J_{\theta,\gamma}+\psi$, where $\sigma\in C^{2,\alpha}_\delta$ and $\psi\in C^{2,\alpha}_\delta$, for the model metric $g_{\theta,\gamma}$ (see ) and the model almost complex structure $J_{\theta,\gamma}$ (see Section \[subsec:ACH-almost-Hermitian-structures\]). Recall that, if $\set{Z_\alpha}$ is a local frame of $T^{1,0}{\partial}X$ and $T$ is the Reeb vector field for $\theta$, then $$\bm{Z}_0=\frac{1}{2}x\partial_x+ix^2T,\qquad
\bm{Z}_\alpha=xZ_\alpha,\quad\alpha=1,\,\dots,\,n-1$$ span the holomorphic tangent bundle for $J_{\theta,\gamma}$.
The connection coefficients $\Gamma$ and the torsion of the Ehresmann–Libermann connection $\nabla$ of $(g_{\theta,\gamma},J_{\theta,\gamma})$ with respect to $\set{\bm{Z}_0,\bm{Z}_\alpha}$ are computed below, which implies $S=O(x)$ for $(g_{\theta,\gamma},J_{\theta,\gamma})$. Then the difference between $\Gamma$ and $\Gamma^{(g,J)}$ is expressed in terms of $\sigma$, $\psi$ and the connection $\nabla$. By the way they are expressed, we can conclude that the difference between the tensor $S$ for those two almost Hermitian structures is $O(x^\delta)$, thereby showing $S=O(x^\delta)$ for $(g,J)$.
Recall the Tanaka–Webster connection of the compatible almost CR structure $\gamma$ in the sense defined in [@Matsumoto-14]\*[Proposition 3.1]{}, which we write as $\Hat{\nabla}$. The first structure equation is[^2] $$d\theta^\gamma
=\theta^\beta\wedge\tensor{\Hat{\omega}}{_\beta^\alpha}
-\tensor{\Hat{A}}{_{{\overline{\alpha}}}^\gamma}\theta^{{\overline{\alpha}}}\wedge\theta
+\frac{1}{2}\tensor{\Hat{N}}{^\gamma_{{\overline{\alpha}}}_{{\overline{\beta}}}}
\theta^{{\overline{\alpha}}}\wedge\theta^{{\overline{\beta}}}.$$ We can check that the Ehresmann–Libermann connection of $(g_{\theta,\gamma},J_{\theta,\gamma})$ is given by the following coefficients with respect to the frame $\set{\bm{Z}_0,\bm{Z}_\alpha,\bm{Z}_{{\overline{0}}},\bm{Z}_{{\overline{\alpha}}}}$: $$\begin{aligned}
{4}
\tensor{\Gamma}{^0_0_0}&=-1,&\qquad
\tensor{\Gamma}{^0_{{\overline{0}}}_0}&=1,&\qquad
\tensor{\Gamma}{^0_\alpha_0}&=0,&\qquad
\tensor{\Gamma}{^0_{{\overline{\alpha}}}_0}&=0,\\
\tensor{\Gamma}{^\gamma_0_0}&=0,&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{0}}}_0}&=0,&\qquad
\tensor{\Gamma}{^\gamma_\alpha_0}&=-\tensor{\delta}{_\alpha^\gamma},&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{\alpha}}}_0}&=ix^2\tensor{\Hat{A}}{_{{\overline{\alpha}}}^\gamma},\\
\tensor{\Gamma}{^0_0_\beta}&=0,&\qquad
\tensor{\Gamma}{^0_{{\overline{0}}}_\beta}&=0,&\qquad
\tensor{\Gamma}{^0_\alpha_\beta}&=ix^2\tensor{\Hat{A}}{_\alpha_\beta},&\qquad
\tensor{\Gamma}{^0_{{\overline{\alpha}}}_\beta}&=\tfrac{1}{2}\tensor{h}{_\alpha_{{\overline{\beta}}}},\\
\tensor{\Gamma}{^\gamma_0_\beta}
&=ix^2\tensor{\Hat{\Gamma}}{^\gamma_0_\beta}-\tfrac{1}{2}\tensor{\delta}{_\beta^\gamma},&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{0}}}_\beta}
&=-ix^2\tensor{\Hat{\Gamma}}{^\gamma_0_\beta}+\tfrac{1}{2}\tensor{\delta}{_\beta^\gamma},&\qquad
\tensor{\Gamma}{^\gamma_\alpha_\beta}&=x\tensor{\Hat{\Gamma}}{^\gamma_\alpha_\beta},&\qquad
\tensor{\Gamma}{^\gamma_{{\overline{\alpha}}}_\beta}&=x\tensor{\Hat{\Gamma}}{^\gamma_{{\overline{\alpha}}}_\beta}.
\end{aligned}$$ Therefore, we obtain $\tensor{N}{^{{\overline{\gamma}}}_0_\beta}=ix^2\tensor{\Hat{A}}{_\beta^{{\overline{\gamma}}}}$, $\tensor{N}{^{{\overline{\gamma}}}_\alpha_\beta}=x\tensor{\Hat{N}}{^{{\overline{\gamma}}}_\alpha_\beta}$, and $T=0$. This implies that $S=O(x)$ for $(g_{\theta,\gamma},J_{\theta,\gamma})$.
One more remark is needed before starting the proof of Theorem \[thm:global-existence\]. Let $(g_\gamma,J_\gamma)$ be a family of elements of $\tilde{\mathcal{M}}^{2,\alpha}_\delta$ smoothly parametrized by the conformal infinity $\gamma\in\mathcal{U}$, where $\mathcal{U}$ is an open $C^{2,\alpha}$-neighborhood of $\gamma_0\in\mathcal{C}_H$. Then for each $\gamma$ there is the unitary frame bundle $\mathcal{F}_\gamma$, and, by shrinking $\mathcal{U}$ if necessary, we can identify $\mathcal{F}_\gamma$ with $\mathcal{F}_{\gamma_0}$ as principal $U(n)$-bundles. Essentially, we have already seen this in the proof of Theorem \[thm:Fredholm\]. Take a local smooth section $s$ of ${\mathit{GL}}(2n)\to{\mathit{GL}}(2n)/U(n)$ near the origin. For any $p\in X$, $(g_\gamma,J_\gamma)_p$ can be regarded as a point in ${\mathit{GL}}(2n)/U(n)$ by regarding $(g,J)_p=(g_{\gamma_0},J_{\gamma_0})_p$ as the origin, which is lifted to an element of ${\mathit{GL}}(2n)$ by $s$. This naturally defines an isomorphism $\mathcal{F}_\gamma\to\mathcal{F}_{\gamma_0}$. Note that the identification is inherited by any associated vector bundle induced by a $U(n)$-representation.
We can also introduce the following identification. Let $(g,J)\in\tilde{\mathcal{M}}^{2,\alpha}_\delta$. Then, almost complex structures $\tilde{J}$ compatible with $g$ are sections of the fiber bundle associated with the orthonormal frame bundle of $g$ induced by $O(2n)/U(n)$, and this fiber bundle can also be seen as an associated bundle of the unitary frame bundle of $(g,J)$. On the other hand, the bundle $\mathord{\wedge}^2_\mathrm{aH}$ of anti-Hermitian 2-forms is associated with the unitary frame bundle of $(g,J)$ by the representation $\mathfrak{m}$, where $\mathfrak{o}(2n)=\mathfrak{u}(n)\oplus\mathfrak{m}$ is an $U(n)$-invariant decomposition of the Lie algebra $\mathfrak{o}(2n)$. Since there is a diffeomorphism between neighborhoods of $0\in\mathfrak{m}$ and of the origin of $O(2n)/U(n)$, compatible almost complex structures pointwisely close enough to $J$ can be identified with anti-Hermitian 2-forms pointwisely close to $0$. In particular, if we set $$\mathcal{J}^{2,\alpha}_{g,\delta}=
\set{\tilde{J}\in J+C^{2,\alpha}_\delta|\text{$\tilde{J}$ is an almost complex structure
compatible with $g$}},$$ then a neighborhood of $J\in\mathcal{J}^{2,\alpha}_{g,\delta}$ can be identified with that of $0\in C^{2,\alpha}_\delta(X,\mathord{\wedge}^2_\mathrm{aH})$.
Take any family $(g_\gamma,J_\gamma)$ of ACH almost Hermitian structures of class $C^{2,\alpha}_\delta$ smooth in $\gamma\in\mathcal{U}$ such that $(g_{\gamma_0},J_{\gamma_0})=(g,J)$. Then, they uniformly satisfy $\Hat{E}=O(x^\delta)$ and $S=O(x^\delta)$ by Lemma \[lem:first-approximate-solution\]. Note that $n-R_{P_S}<\delta<n+R_{P_S}$ by Lemma \[lem:indicial-roots\], and also that $n-R_{P_{\Hat{E}}}<\delta<n+R_{P_{\Hat{E}}}$ because $R_{P_{\Hat{E}}}=n$ (see the discussion following [@Matsumoto-preprint16]\*[Proposition 1.4]{}).
Let $\mathord{\wedge}^2_{\mathrm{aH}}$ be the bundle of 2-forms that are anti-Hermitian with respect to the almost complex structure $J$. We define the mapping $$Q\colon\mathcal{U}\times\mathcal{V}_1\times\mathcal{V}_2
\to C^{0,\alpha}_\delta(X,\operatorname{Sym}^2T^*)\oplus C^{0,\alpha}_\delta(X,\mathord{\wedge}^2_\mathrm{aH}),$$ where $\mathcal{V}_1$ (resp. $\mathcal{V}_2$) is a neighborhood of $0\in C^{2,\alpha}_\delta(X,\operatorname{Sym}^2T^*)$ (resp. a neighborhood of $0\in C^{2,\alpha}_\delta(X,\mathord{\wedge}^2_\mathrm{aH})$), as follows. According to the discussion preceding this proof, by shrinking $\mathcal{U}$ and $\mathcal{V}_1$ if necessary, we can identify a neighborhood of $0\in C^{2,\alpha}_\delta(X,\mathord{\wedge}^2_\mathrm{aH})$ with a neighborhood of $J_\gamma\in\mathcal{J}^{2,\alpha}_{g_\gamma+\sigma,\delta}$, and this identification can be made smooth in $\gamma$ and $\sigma$. If $J_\gamma+\chi$ denotes the almost complex structure corresponding to $\chi$ in the neighborhood of $0\in C^{2,\alpha}_\delta(X,\mathord{\wedge}^2_\mathrm{aH})$, then $Q$ is defined by $$Q(\gamma,\sigma,\chi)=(\Hat{E}_{g_\gamma}(g_\gamma+\sigma),S_{g_\gamma+\sigma}(J_\gamma+\chi)).$$
We now use Theorem \[thm:Fredholm\]. The linearization of $\Hat{E}_{g_\gamma}(g_\gamma+\sigma)$ at $(\gamma_0,0,0)$ with respect to the second parameter $\sigma$ is $P_{\Hat{E}}$, and it is an isomorphism as a mapping $C^{2,\alpha}_\delta\to C^{0,\alpha}_\delta$ (because $\ker_{(2)}P_{\Hat{E}}=0$ by the assumption); likewise, the linearization of $S_{g_\gamma+\sigma}(J_\gamma+\chi)$ at $(\gamma_0,0,0)$ with respect to the third parameter $\chi$ is $P_S$, and it is an isomorphism as a mapping $C^{2,\alpha}_\delta\to C^{0,\alpha}_\delta$ (because $\ker_{(2)}P_S=0$, which is obvious from ). Consequently, the linearization of $Q$ at $(\gamma_0,0,0)$ with respect to the second and the third parameters is an isomorphism as a mapping $C^{2,\alpha}_\delta\oplus C^{2,\alpha}_\delta\to C^{0,\alpha}_\delta\oplus C^{0,\alpha}_\delta$, and hence, by the implicit function theorem, if $\mathcal{U}$ is sufficiently small, for each $\gamma\in\mathcal{U}$ there exists only one $(\sigma,\chi)$ in an appropriate neighborhood of $(0,0)\in\mathcal{V}_1\times\mathcal{V}_2$ for which $Q(\gamma,\sigma,\chi)=0$ is satisfied, or equivalently, is satisfied by $(g_\gamma+\sigma,J_\gamma+\chi)$.
Approximate solutions of higher order {#sec:approximate-solutions}
=====================================
Now we turn to the proof of Theorem \[thm:formal-existence\]. Some part of the theorem is already shown by the author in [@Matsumoto-14]. Specifically, we use the following version, proved in [@Matsumoto-13-Thesis]; see also [@Matsumoto-16]\*[Theorem 2.5]{}.
\[thm:approximate-solution-of-Einstein-equation\] Let $\overline{X}$ be a manifold-with-boundary whose boundary is equipped with a contact distribution $H$, and let $\gamma\in\mathcal{C}_H$. Then, there exists an ACH metric $g$ on $X$, with conformal infinity $\gamma$, that is smooth up to the boundary satisfying $${\mathord{\mathrm{Ric}}}(g)=-(n+1)g+O(x^{2n}).$$ Up to the action of diffeomorphisms of $\overline{X}$ that restricts to the identity on the boundary, such an ACH metric is unique modulo $O(x^{2n})$ ambiguity.
Without losing generality, we can identify a neighborhood of ${\partial}X$ in $\overline{X}$ with ${\partial}X\times[0,\varepsilon)_x$ from the beginning. Then, by using diffeomorphisms from ${\partial}X\times[0,\varepsilon)_x$ to itself that restricts to the identity on ${\partial}X$ ($={\partial}X\times\set{0}$), it is known that we can further normalize $g$ in such a way that $\partial_x$ is orthogonal to the level sets of $x$ (Guillarmou–Sá Barreto [@Guillarmou-SaBarreto-08]\*[Section 3.2]{}). Under this additional gauge-fixing condition, the metric $g$ is unique modulo $O(x^{2n})$ ambiguities, and the proof of Theorem \[thm:approximate-solution-of-Einstein-equation\] shows that the expansion of $g$ in $x$ up to the $(2n-1)$-st order has a local formula in terms of the Tanaka–Webster connection of $(\gamma,\theta)$. In this sense, the expansion of $g$ is locally determined by the geometry of the boundary.
Therefore, in order to show Theorem \[thm:formal-existence\], it suffices to prove the following. Let $\bm{Z}_\alpha$ and $\bm{Z}_{{\overline{\alpha}}}$ ($\alpha=1$, $\dotsc$, $n-1$) be as in the beginning of Section \[subsec:ACH-almost-Hermitian-structures\].
Let $\overline{X}$ be a compact manifold-with-boundary of dimension $2n$ whose boundary is equipped with a contact distribution $H$, with a fixed identification of an open neighborhood of the boundary and ${\partial}X\times[0,\varepsilon)_x$. Suppose that its interior $X$ is equipped with an ACH metric $g$ that is smooth up to the boundary and normalized in the sense described above satisfying ${\mathord{\mathrm{Ric}}}(g)=-(n+1)g+O(x^{2n})$. Then, there exists an almost complex structure $J$, for which $(g,J)$ is an ACH almost Hermitian structure that is smooth up to the boundary, satisfying $$S=O(x^{2n}).$$ Moreover, such $J$ is uniquely determined modulo $O(x^{2n})$ ambiguity, and the components of $J$ with respect to the frame $\set{x\partial_x,x^2T,\bm{Z}_1,\dots,\bm{Z}_{n-1},\bm{Z}_{{\overline{1}}},\dots,\bm{Z}_{{\overline{n-1}}}}$, if expanded in $x$, have coefficients up to the $(2n-1)$-st order given by certain universal expressions in terms of the Tanaka–Webster local invariants of $(\gamma,\theta)$.
By Lemma \[lem:first-approximate-solution\], any almost complex structure $J$ for which $(g,J)$ is an ACH almost Hermitian structure that is smooth up to the boundary satisfies $$S=O(x).$$ We shall argue inductively. Supposing that $J_l$ is an almost complex structure that is smooth up to the boundary for which $S=O(x^l)$ is satisfied, where $1\le l\le 2n-1$, we construct $J_{l+1}$ satisfying $S=O(x^{l+1})$. In addition, we will show that the coefficients of the components of $J_l$ with respect to $\set{x\partial_x,x^2T,\bm{Z}_\alpha,\bm{Z}_{{\overline{\alpha}}}}$ expanded in $x$ are, up to the $(l-1)$-st order, given in terms of the Tanaka–Webster local invariants. For notational simplicity, let $J_0=J_{\theta,\gamma}$.
Let $J_l$ be given for some $l\ge 1$. We want to modify $J_l$ to obtain $J'_l$, which also satisfies $S=O(x^l)$, so that the $l$-th coefficients of the expansions of the components of $J'_l$ in $x$ are explicitly known. For this purpose, we first truncate the expansions of the components of $J_l$ so that all the components becomes polynomials in $x$ of degree (at most) $l-1$. The resulting section of $\operatorname{End}(TX)$ (defined only near ${\partial}X$) is denoted by $J^\mathrm{trc}_l$. If we add $Bx^l$ to it, where $B\in\operatorname{End}(TX)$ is constant in $x$ when expressed in terms of $\set{x\partial_x,x^2T,\bm{Z}_\alpha,\bm{Z}_{{\overline{\alpha}}}}$, then for any $V$, $W\in\set{x\partial_x,x^2T,\bm{Z}_1,\dots,\bm{Z}_{n-1},\bm{Z}_{{\overline{1}}},\dots,\bm{Z}_{{\overline{n-1}}}}$, we obtain $$\label{eq:effect-of-adding-l-term}
\begin{split}
&g((J^\mathrm{trc}_l+Bx^l)V,(J^\mathrm{trc}_l+Bx^l)W)\\
&=g(J^\mathrm{trc}_lV,J^\mathrm{trc}_lW)+x^lg(J^\mathrm{trc}_lV,BW)+x^lg(BV,J^\mathrm{trc}_lW)+O(x^{l+1})\\
&=g(J^\mathrm{trc}_lV,J^\mathrm{trc}_lW)+x^lg(J_0V,BW)+x^lg(BV,J_0W)+O(x^{l+1}).
\end{split}$$ Here, by the construction, if we write $$\label{eq:l-term-to-be-modified}
g(J^\mathrm{trc}_lV,J^\mathrm{trc}_lW)=g(V,W)+O(x^l)=g(V,W)+x^lD(V,W)+O(x^{l+1}),$$ then $D$ is given in terms of the Tanaka–Webster local invariants. Comparing and , we see that $g((J^\mathrm{trc}_l+Bx^l)V,(J^\mathrm{trc}_l+Bx^l)W)=g(V,W)+O(x^{l+1})$ is satisfied if and only if $$(\text{the symmetric part of $g(J_0\mathord{\cdot},B\mathord{\cdot})$})=\frac{1}{2}D.$$ By claiming that the skew-symmetric part of $g(J_0\mathord{\cdot},B\mathord{\cdot})$ must be zero, $B$ is uniquely determined, and its components are given in terms of the Tanaka–Webster local invariants. We construct $J'_l$ by adding an $O(x^{l+1})$ term to $J^\mathrm{trc}_l+Bx^l$ so that it becomes an almost complex structure compatible with $g$.
We now modify $J'_l$ to obtain $J_{l+1}$. As in Section \[sec:proof-of-global-existence\], we can identify $C^0$-neighborhoods of $J'_l$ in the space of compatible almost complex structures $0\in\Gamma(X,\mathord{\wedge}_{\mathrm{aH}}^2)$ (where $\mathord{\wedge}_{\mathrm{aH}}^2$ is the bundle of anti-Hermitian 2-forms for $J_0$). If $A$ is a section of $\mathord{\wedge}_{\mathrm{aH}}^2$ that is $O(x^l)$, then the computation in the proof of Lemma \[lem:indicial-roots\] shows that, for the corresponding almost complex structure $J_l+A$, the tensor $S$ is given as follows (in terms of $S'$, which is $S$ for $J'_l$) $$\begin{aligned}
\tensor{S}{_0_\alpha}
&=S'_{0\alpha}
-\frac{1}{4}(l^2-2nl-(2n+5))\tensor{A}{_0_\alpha}+(\text{quadratic terms in $A$})+O(x^{l+1}),\\
\tensor{S}{_\alpha_\beta}
&=S'_{\alpha\beta}
-\frac{1}{4}(l^2-2nl-8)\tensor{A}{_\alpha_\beta}+(\text{quadratic terms in $A$})+O(x^{l+1}).
\end{aligned}$$ Moreover, the quadratic terms are expressed in terms of $A$ itself and its derivatives in $x\partial_x$, $x^2T$, $xZ_\alpha$, $xZ_{{\overline{\alpha}}}$ with coefficients that are smooth up to the boundary. Therefore, we obtain $$\begin{aligned}
\tensor{S}{_0_\alpha}&=-\frac{1}{4}(l^2-2nl-(2n+5))\tensor{A}{_0_\alpha}+O(x^{l+1}),\\
\tensor{S}{_\alpha_\beta}&=-\frac{1}{4}(l^2-2nl-8)\tensor{A}{_\alpha_\beta}+O(x^{l+1}).
\end{aligned}$$ Since $l^2-2nl-(2n+5)$ and $l^2-2nl-8$ are never zero, $A$ mod $O(x^{l+1})$ is uniquely determined by the requirement that $S=O(x^{l+1})$. We define $J_{l+1}=J'_l+A$ by using such $A$. The construction of $J'_l$ implies that the expansion of $S'$ is expressed in terms of the Tanaka–Webster connection up to $l$-th order, and hence, the $l$-th order coefficients in the expansion of $J_{l+1}$ are determined by the Tanaka–Webster connection as well.
A discussion on general second-order functionals {#sec:possible-functionals}
================================================
We here establish a partial characterization of our functional $\mathcal{E}$ to give some justification for our choice. The most general reasonable choice of functionals is given by the integral of a linear combination of complete contractions of tensor products of the form $$(\tensor{R}{_i_{{\overline{j}}}_k_{{\overline{l}}}})^{\otimes m_1}
\otimes (\tensor{R}{_i_{{\overline{j}}}_k_l})^{\otimes m_2}
\otimes (\tensor{R}{_i_{{\overline{j}}}_{{\overline{k}}}_{{\overline{l}}}})^{\otimes m_3}
\otimes (\tensor{N}{_i_j_k})^{\otimes m_4}\otimes(\tensor{N}{_{{\overline{i}}}_{{\overline{j}}}_{{\overline{k}}}})^{\otimes m_5}
\otimes (\tensor{T}{_{{\overline{i}}}_j_k})^{\otimes m_6}\otimes(\tensor{T}{_i_{{\overline{j}}}_{{\overline{k}}}})^{\otimes m_7}.$$ If we require that the Euler–Lagrange equation is a second-order partial differential equation, then the integrand must be a linear combination of $$R=\tensor{R}{_i^i_j^j},\qquad
\tensor{R}{_i^j_j^i},\qquad
{\lvertN\rvert}^2,\qquad
\tensor{N}{_i_j_k}\tensor{N}{^j^i^k},\qquad
{\lvertT\rvert}^2,\qquad
{\lvert\tau\rvert}^2,\qquad
\delta=\tensor{\nabla}{^i}\tensor{\tau}{_i}.$$ Because of , we have $\tensor{R}{_i^j_j^i}=R+\delta-\tensor{N}{_i_j_k}\tensor{N}{^j^i^k}$, and implies that the integral of $\delta$ equals that of $-{\lvert\tau\rvert}^2$. Hence, we may exclude $\tensor{R}{_i^j_j^i}$ and $\delta$ from the list. Moreover, because the difference between the Levi-Civita and the Ehresmann–Libermann connections is given in terms of $N$ and $T$, the Riemannian scalar curvature of $g$ equals $2R$ plus a linear combination of ${\lvertN\rvert}^2$, $\tensor{N}{_i_j_k}\tensor{N}{^j^i^k}$, ${\lvertT\rvert}^2$, ${\lvert\tau\rvert}^2$. We can also reasonably omit $R$, because its integral is invariant under a change of $J$.
Rather than ${\lvertN\rvert}^2$ and $\tensor{N}{_i_j_k}\tensor{N}{^j^i^k}$, we prefer to use the squared norms of $\tensor{({{N_\mathrm{sym}}})}{_i_j_k}=\tensor{N}{_(_i_j_)_k}$ and $\tensor{({{N_\mathrm{skew}}})}{_i_j_k}=\tensor{N}{_[_i_j_]_k}$, which is possible by the relations ${\lvertN\rvert}^2={\lvert{{N_\mathrm{sym}}}\rvert}^2+{\lvert{{N_\mathrm{skew}}}\rvert}^2$ and $\tensor{N}{_i_j_k}\tensor{N}{^j^i^k}={\lvert{{N_\mathrm{sym}}}\rvert}^2-{\lvert{{N_\mathrm{skew}}}\rvert}^2$. Thus, the list becomes $${\lvert{{N_\mathrm{sym}}}\rvert}^2,\qquad
{\lvert{{N_\mathrm{skew}}}\rvert}^2,\qquad
{\lvertT\rvert}^2,\qquad
{\lvert\tau\rvert}^2.$$ We call the integral of any linear combination of these four quantities a *second-order functional* of almost complex structures compatible with a given Riemannian metric $g$. Let $$\mathcal{E}_{(a,b,c,d)}
=\int (a{\lvert{{N_\mathrm{sym}}}\rvert}^2+b{\lvert{{N_\mathrm{skew}}}\rvert}^2+c{\lvertT\rvert}^2+d{\lvert\tau\rvert}^2)dV_g.$$ Then, the functional $\mathcal{E}$ is $\mathcal{E}_{(1,1,0,1/2)}$.
Our partial characterization of $\mathcal{E}$ is the following.
\[prop:characterization\] A second-order functional $\mathcal{E}_{(a,b,c,d)}$ has Euler–Lagrange equation whose linearization equals $\frac{1}{2}\Delta_{{\overline{\partial}}}$ if and only if $$a=1+s,\qquad
b=1-3s,\qquad
c=s,\qquad
d=\frac{1}{2}-2s$$ for some $s\in\mathbb{R}$.
To show Proposition \[prop:characterization\], let us write $$\mathcal{E}^\bullet=\int{\lvert\bullet\rvert}^2dV_g$$ for $\bullet={{N_\mathrm{sym}}}$, ${{N_\mathrm{skew}}}$, $T$, $\tau$, and $$\left.\frac{d}{dt}\mathcal{E}^\bullet[J_t]\right|_{t=0}
=\int((\dot{\mathcal{E}}^\bullet)^{ij}\tensor{A}{_i_j}
+(\dot{\mathcal{E}}^\bullet)^{{\overline{i}}{\overline{j}}}\tensor{A}{_{{\overline{i}}}_{{\overline{j}}}})dV_g$$ as in Section \[sec:Euler-Lagrange-equation\]. Then, a computation akin to the proof of Proposition \[prop:termwise-Euler-Lagrange\] gives the following formulae (actually is already given there).
Under the notation above,
$$\begin{aligned}
\label{eq:Euler-Lagrange-Nijenhuis-sym-anti-Hermitian}
\dot{\mathcal{E}}^{{N_\mathrm{sym}}}_{ij}
&=i\left(-\frac{1}{4}(\tensor{\nabla}{^k}+\tensor{\tau}{^k})\tensor{N}{_k_i_j}
+\frac{1}{4}(\tensor{\nabla}{^k}+\tensor{\tau}{^k})\tensor{({{N_\mathrm{skew}}})}{_i_j_k}
+\frac{1}{2}\tensor{({{N_\mathrm{sym}}})}{_[_i_|_k_l}\tensor{T}{_|_j_]^k^l}\right),\\
\label{eq:Euler-Lagrange-Nijenhuis-skew-anti-Hermitian}
\dot{\mathcal{E}}^{{N_\mathrm{skew}}}_{ij}
&=i\left(\frac{1}{4}(\tensor{\nabla}{^k}+\tensor{\tau}{^k})\tensor{N}{_k_i_j}
+\frac{3}{4}(\tensor{\nabla}{^k}+\tensor{\tau}{^k})\tensor{({{N_\mathrm{skew}}})}{_i_j_k}
+\frac{1}{2}\tensor{({{N_\mathrm{skew}}})}{_[_i_|_k_l}\tensor{T}{_|_j_]^k^l}\right),\\
\label{eq:Euler-Lagrange-T-anti-Hermitian}
\dot{\mathcal{E}}^T_{ij}
&=i\left(-(\tensor{\nabla}{^{{\overline{k}}}}+\tensor{\tau}{^{{\overline{k}}}})\tensor{T}{_{{\overline{k}}}_i_j}
+\tensor{N}{_k_l_[_i}\tensor{T}{_j_]^k^l}
-\frac{1}{2}\tensor{N}{_[_i_|_k_l}\tensor{T}{_|_j_]^k^l}\right),\\
\label{eq:Euler-Lagrange-tau-anti-Hermitian}
\dot{\mathcal{E}}^\tau_{ij}
&=i\left(\tensor{\nabla}{_[_i}\tensor{\tau}{_j_]}
-\frac{1}{2}\tensor{N}{_k_i_j}\tensor{\tau}{^k}
+\frac{1}{2}\tensor{T}{^k_i_j}\tensor{\tau}{_k}\right).
\end{aligned}$$
Next, recall from and that, under the Kähler-Einstein assumption, $$\begin{aligned}
{3}
\tensor{\dot{N}}{^k_i_j}&=0,&\qquad
\tensor{\dot{N}}{^k_i_{{\overline{j}}}}&=0,&\qquad
\tensor{\dot{N}}{^k_{{\overline{i}}}_{{\overline{j}}}}
&=-i\tensor{\nabla}{_[_{{\overline{i}}}}\tensor{A}{^k_{{\overline{j}}}_]},\\
\tensor{\dot{T}}{^k_i_j}
&=-i\tensor{\nabla}{^k}\tensor{A}{_i_j},&\qquad
\tensor{\dot{T}}{^k_i_{{\overline{j}}}}&=0,&\qquad
\tensor{\dot{T}}{^k_{{\overline{i}}}_{{\overline{j}}}}&=0.\end{aligned}$$ As a consequence of the first line, we also have $$\begin{aligned}
{3}
\tensor{({{\dot{N}_\mathrm{sym}}})}{^k_i_j}&=0,&\qquad
\tensor{({{\dot{N}_\mathrm{sym}}})}{^k_i_{{\overline{j}}}}&=0,&\qquad
\tensor{({{\dot{N}_\mathrm{sym}}})}{^k_{{\overline{i}}}_{{\overline{j}}}}
&=-\frac{i}{4}(\tensor{\nabla}{^k}\tensor{A}{_{{\overline{i}}}_{{\overline{j}}}}
+\tensor{\nabla}{_{{\overline{i}}}}\tensor{A}{^k_{{\overline{j}}}}),\\
\tensor{({{\dot{N}_\mathrm{skew}}})}{^k_i_j}&=0,&\qquad
\tensor{({{\dot{N}_\mathrm{skew}}})}{^k_i_{{\overline{j}}}}&=0,&\qquad
\tensor{({{\dot{N}_\mathrm{skew}}})}{^k_{{\overline{i}}}_{{\overline{j}}}}
&=\frac{i}{4}(\tensor{\nabla}{^k}\tensor{A}{_{{\overline{i}}}_{{\overline{j}}}}
-\tensor{\nabla}{_{{\overline{i}}}}\tensor{A}{^k_{{\overline{j}}}}
+2\tensor{\nabla}{_{{\overline{j}}}}\tensor{A}{^k_{{\overline{i}}}}).\end{aligned}$$ Using these formulae, we can now compute the linearizations of $\dot{\mathcal{E}}^\bullet$.
\[lem:second-variation-of-second-order-functionals\] The linearizations of $\dot{\mathcal{E}}^\bullet$ at Kähler-Einstein structures are given by $$\begin{aligned}
\ddot{\mathcal{E}}^{{N_\mathrm{sym}}}_{ij}
&=-\frac{1}{8}\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_i_j}
-\frac{3}{8}\lambda\tensor{A}{_i_j}
+\frac{1}{8}\tensor{\nabla}{_[_i}\tensor{\nabla}{^k}\tensor{A}{_j_]_k},\\
\ddot{\mathcal{E}}^{{N_\mathrm{skew}}}_{ij}
&=-\frac{3}{8}\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_i_j}
-\frac{1}{8}\lambda\tensor{A}{_i_j}
-\frac{5}{8}\tensor{\nabla}{_[_i}\tensor{\nabla}{^k}\tensor{A}{_j_]_k},\\
\ddot{\mathcal{E}}^T_{ij}
&=-\tensor{\nabla}{_k}\tensor{\nabla}{^k}\tensor{A}{_i_j},\\
\ddot{\mathcal{E}}^\tau_{ij}
&=\tensor{\nabla}{_[_i}\tensor{\nabla}{^k}\tensor{A}{_j_]_k},
\end{aligned}$$ where ${\mathord{\mathrm{Ric}}}(g)=\lambda g$.
Because of Lemma \[lem:second-variation-of-second-order-functionals\] and , the linearized Euler–Lagrange equation of the functional $\mathcal{E}_{(a,b,c,d)}$ equals $\frac{1}{2}\Delta_{{\overline{\partial}}}$ when $$-\frac{1}{8}a-\frac{3}{8}b-c=-\frac{1}{2},\qquad
-\frac{3}{8}a-\frac{1}{8}b=-\frac{1}{2},\qquad
\frac{1}{8}a-\frac{5}{8}b+d=0.$$ The solutions are $(a,b,c,d)=(1+s,1-3s,s,1/2-2s)$, $s\in\mathbb{R}$; hence, we obtain Proposition \[prop:characterization\].
Among the one-parameter family $\mathcal{E}_{(1+s,1-3s,s,1/2-2s)}$, it seems that there is no special reason to select $\mathcal{E}=\mathcal{E}_{(1,1,0,1/2)}$, apart from the simplicity of the expression of the functional.
[^1]: Our convention is such that $(\alpha\wedge\beta)(V,W)=\alpha(V)\beta(W)-\alpha(W)\beta(V)$ for 1-forms $\alpha$ and $\beta$.
[^2]: Here, we use the opposite sign for the CR Nijenhuis tensor compared to [@Matsumoto-14], for compatibility with our convention .
|
Introduction {#sec1_1}
============
Posterior staphyloma is a type of localized scleral ectasia in the posterior segment associated with myopia \[[@B1]\] in which the superior border of the inferior posterior staphyloma (IPS) lies across the macula and may be accompanied by atrophy of the retinal pigment epithelium (RPE), serous retinal detachment (SRD), choroidal neovascularization (CNV), or polypoidal choroidal vasculopathy \[[@B2],[@B3],[@B4],[@B5],[@B6]\]. Substantial percentages of eyes with IPS (37-41%) had SRDs that may be long-lasting and result in severe visual loss \[[@B3],[@B6]\]. Although laser photocoagulation, anti-vascular endothelial growth factor (anti-VEGF) drugs, and photodynamic therapy had been attempted, SRDs with IPS were refractory to those treatments \[[@B2],[@B7],[@B8],[@B9]\]. We report a patient with bilateral SRD with IPS treated successfully with scleral shortening and followed for 9 months.
Case Report {#sec1_2}
===========
A 63-year-old woman reported bilateral visual impairment of 6 months\' duration. At the first examination, the best-corrected visual acuity was 0.6 (20/30) in the right eye and 0.5 (20/40) in the left eye. The refractive error in the right eye was sphere −3.50 dpt and cylinder −0.50 × 60 dpt and in the left eye it was sphere −3.75 dpt and cylinder −1.25 × 93 dpt. A dilated fundus examination showed bilateral IPS with crescent borders and retinal detachments at the foveae. Both foveae were on the edge of the IPS. The axial length (AL) measured by laser interference biometry (IOLMaster 500, Carl Zeiss Meditec Inc., Dublin, Calif., USA) was 24.81 mm in the right eye and 24.70 mm in the left eye. There was no visual field defect. Optical coherence tomography (Heidelberg Engineering, Heidelberg, Germany) showed SRDs and shallow RPE detachments bilaterally. The retina and choroid protruded into the vitreous cavity at the upper IPS border. The choroidal thickness in the staphyloma decreased compared to that in the superior fovea. Fluorescein angiography (FA) showed a granular hyperfluorescence pattern and diffuse hyperfluorescence in the late phase along the superior staphyloma border. We did not observe obvious dye leakage or signs of CNV in either fovea. Late-phase indocyanine green angiography (ICGA) showed belt-like hypofluorescence on the superior staphyloma borders. We did not detect hyperfluorescence indicating CNV on late-phase ICGA images (fig. [1](#F1){ref-type="fig"}). The patient opted to undergo scleral shortening with vitrectomy and provided informed consent preoperatively after she had been informed that anti-VEGF therapy and photodynamic therapy were ineffective for this type of retinal detachment in eyes with IPS \[[@B7],[@B8]\], that scleral shortening may improve the anatomic abnormalities of posterior staphyloma, as well as about the possible adverse events associated with the procedure and the possible ineffectiveness even after successful scleral shortening with vitrectomy.
We performed the surgery with written informed consent. Shortly after the cataract surgery, a bridle suture was placed at each rectus muscle, and the lamellar scleral crescent was resected 4 mm in width from the 5- to the 8-o\'clock positions. Seven interrupted 5-0 polyester preplaced mattress sutures (Marciline, Ethicon, West Somerville, N.J., USA) were placed at the edge of the lamellar scleral crescent. After vitrectomy with induction of posterior vitreous detachment (PVD), the mattress suture was tightened.
The curvature of the protrusion at the fovea flattened postoperatively. The SRD height gradually resolved and the RPE detachment decreased over 3 months postoperatively. The choroidal thickness decreased in the superior flat area of the retina but increased slightly in the staphyloma (fig. [2](#F2){ref-type="fig"}). The best-corrected visual acuity improved to 0.8 (20/25); the refractive error was sphere −1.50 dpt and cylinder −2.50 × 175 dpt. FA 6 months postoperatively showed that the diffuse foveal hyperfluorescence in the right eye decreased slightly (fig. [1](#F1){ref-type="fig"}). The area of belt-like hypofluorescence and the caliber of the choroidal vessels were the same as preoperatively on ICGA images. The AL shortened from 24.81 mm preoperatively to 24.19 mm at 9 months postoperatively. The SRD remained in OS.
Discussion {#sec1_3}
==========
We describe an eye treated with vitrectomy and inferior scleral shortening in a patient with bilateral SRD associated with IPS.
SRDs accompanied by IPS are rare \[[@B2]\]. In those eyes, the SRD is refractory to several treatments. To the best of our knowledge, bilateral SRDs associated with IPS are very rare \[[@B5]\]. Scleral shortening or imbrication is performed to treat macular hole retinal detachment in eyes with high myopia \[[@B10]\]. The morphologic abnormality at the junction of the IPS is assumed to disrupt the choriocapillaris and pigment epithelium resulting in an SRD. Maruko et al. \[[@B6]\] reported that relative scleral thickening at the fovea might cause the SRD in tilted disc syndrome. The scleral shortening might cause the SRD to decrease because its procedure changed the foveal scleral thickening. After substantial discussion with the patient, we performed this procedure on her right eye. The AL was shortened by 0.62 mm and the angle of the staphyloma edge decreased postoperatively. The choroidal thickness also decreased, especially the outer upper border of the staphyloma. These changes may contribute to the resolution of SRDs. Because the perifoveal vitreous was detached in the current case, PVD induction may have contributed to the SRD resolution. The relationship between PVDs and SRDs associated with IPS is unclear. Since the effect of scleral shortening decreases over subsequent years, SRDs may recur. Further observation and accumulation of cases are needed.
Bilateral SRDs associated with IPS may be rare. With no adequate available treatment for this disorder, scleral shortening with vitrectomy was considered.
Statement of Ethics {#sec1_4}
===================
The authors have no ethical conflicts to disclose.
Disclosure Statement {#sec1_5}
====================
None of the authors have any financial/conflicting interests to disclose.
{#F1}
{#F2}
|
Fairview Microwave waveguide to coaxial adapter (also known as a waveguide coaxial transition) 42AEL86 is manufactured with a end launch design. End launch waveguide to coaxial adapter / transition has a waveguide size of WR-42 and square cover flange. This WR-42 waveguide to coax adapter / transition is constructed with a 2.92mm coaxial connecter that is 50 and female gender.
WR-42 waveguide to coaxial transition adapter with 2.92mm connector has a minimum frequency of 18 GHz and a maximum frequency of 26.5 GHz. Fairview WR-42 2.92mm transition adapter for coax is designed with a body material of aluminum and connector body material of passivated stainless steel. Our WR-42 to 2.92mm female connector waveguide to coax adapter is manufactured based on precise radio frequency industry specs and you can find more waveguide adapter / transition datasheet specifications above.
Fairview Microwave WR-42 waveguide transition adapter to coaxial 2.92mm part number 42AEL86 is currently in stock at our Allen, TX location. Our end launch wave guide WR-42 to 2.92mm coaxial cable transition adapter is part of over 1 million in-stock components for RF, microwave and millimeter wave applications that are ready to ship same day worldwide. |
Once the very symbol of American industrial might, Detroit became the biggest U.S. city to file for bankruptcy Thursday, its finances ravaged and its neighbourhoods hollowed out by a long, slow decline in population and auto manufacturing.
The filing, which had been feared for months, put the city on an uncertain course that could mean laying off municipal employees, selling off assets, raising fees and scaling back basic services such as trash collection and snow plowing, which have already been slashed.
[IMAGEGALLERY galleryid=4696 size=small]
"Only one feasible path offers a way out," Gov. Rick Snyder said in a letter approving the move.
Kevyn Orr, a bankruptcy expert hired by the state in March to stop Detroit's fiscal free-fall, made the filing in federal bankruptcy court.
"Services will remain open, paycheques will be made, bills will be paid," Orr said at a news conference Thursday afternoon.
Michael Sweet, a bankruptcy attorney in Fox-Rothschild's San Francisco office, said the city would pay current employees. But "beyond that, all bets are off."
"They don't have to pay anyone they don't want to," Sweet said. "And no one can sue them."
Detroit lost a quarter-million residents between 2000 and 2010. A population that in the 1950s reached 1.8 million now struggles to stay above 700,000. Much of the middle-class and scores of businesses also have fled Detroit, taking their tax dollars with them.
In recent months, the city has relied on state-backed bond money to meet payroll for its 10,000 employees.
Orr was unable to persuade a host of creditors, unions and pension boards to take pennies on the dollar to help facilitate the city's massive financial restructuring. If the bankruptcy filing is approved, city assets could be liquidated to satisfy demands for payment.
Snyder determined earlier this year that Detroit was in a financial emergency and without a plan for improvement. He made it the largest U.S. city to fall under state oversight when a state loan board hired Orr. His letter was attached to Orr's bankruptcy filing.
"One of the things that I want to say to our citizens is that as tough as this is — I really didn't want to go in this direction — but now that we are here, we have to make the best of it," Detroit Mayor Dave Bing said.
Detroit needs to 'radically restructure'
"The citizens of Detroit need and deserve a clear road out of the cycle of ever-decreasing services," Snyder wrote. "The city's creditors, as well as its many dedicated public servants, deserve to know what promises the city can and will keep. The only way to do those things is to radically restructure the city and allow it to reinvent itself without the burden of impossible obligations."
The governor's letter said the decision comes on the heels of 60 years of decline for Detroit, "a period in which reality was often ignored."
Snyder noted that at this point, the city can't meet its basic obligations to citizens or creditors. He characterized the filling as an opportunity for a fresh start in a city burdened with debt "it cannot hope to fully pay."
The governor highlighted some of the services that are struggling to keep up in the border city. Detroit has roughly 78,000 abandoned structures — a public safety hazard that "reduces the quality of life" in the city, the governor said. Streetlights were another issue, with roughly 40 per cent of them found to be not functioning in the first quarter of this year.
Police, fire and ambulance fleets are in disrepair and police response times lag the national average by a large margin, Snyder said, noting that a resident of Detroit waits an average of 58 minutes for police to respond to a call, while the national average is just 11 minutes.
A turnaround specialist, Orr represented automaker Chrysler LLC during its successful restructuring. He issued a warning early on in his 18-month tenure in Detroit that bankruptcy was a road he preferred to avoid.
He laid out his plans in June meetings with debt holders, in which his team warned there was a 50-50 chance of a bankruptcy filing. Some creditors were asked to take about 10 cents on the dollar of what the city owed them. Underfunded pension claims would have received less than the 10 cents on the dollar under that plan.
Orr's team of financial experts said that proposal was Detroit's one shot to permanently fix its fiscal problems. The team said Detroit was defaulting on about $2.5 billion in unsecured debt to "conserve cash" for police, fire and other services.
"Despite Mr. Orr's best efforts, he has been unable to reach a restructuring plan with the city's creditors," the governor wrote. "I therefore agree that the only feasible path to a stable and solid Detroit is to file for bankruptcy protection."
Detroit's budget deficit is believed to be more than $380 million. Orr has said long-term debt was more than $14 billion and could be between $17 billion and $20 billion.
Lawyer Kevyn Orr, a bankruptcy expert, submitted the bankruptcy filing for Detroit in a federal bankruptcy court. (Rebecca Cook/Reuters)
Orr's decision to file now may have been influenced by lawsuits filed by some city workers and retirement systems to prevent Snyder from approving a bankruptcy request from the emergency manager, said Detroit-area turnaround specialist James McTevia.
They have argued that bankruptcy could change pension and retiree benefits, which are guaranteed under state law.
Orr has said federal bankruptcy laws trump state law in this matter.
A bankruptcy judge will stay all the litigation, McTevia said.
"One court will adjudicate all these," McTevia said.
Some are concerned that a bankrupt Detroit will cause businesses large and small to reconsider their operations in the city. But General Motors, which filed and emerged from a Chapter 11 bankruptcy, does not anticipate any impact to its daily operations, the automaker said Thursday in a statement.
"GM is proud to call Detroit home and today's bankruptcy declaration is a day that we and others hoped would not come," the statement said. "We believe, however, that today also can mark a clean start for the city.
Detroit has more than double the population of the Northern California community of Stockton, California, which until Detroit had been the largest U.S. city ever to file for bankruptcy when it did so in June 2012.
Before Detroit, the largest municipal bankruptcy filing had involved Jefferson County, Alabama, which was more than $4 billion in debt when it filed in 2011. Another recent city to have filed for bankruptcy was San Bernardino, California, which took that route in August 2012 after learning it had a $46 million deficit. |
New Zealand father & son filmmaking-team Lance and James Morcan recently told New Zealand website Voxy that their long-planned biopic on South African weightlifter Precious McKenzie, The Precious One, is still on hold, due to financial constraints.
If, and when, the film is ever made, actors Kevin Hart and Tatyana Ali will play the roles of McKenzie and his wife, Elizabeth. The Morcans have secured the directorial services of Roger Spottiswoode(Shoot To Kill, Tomorrow Never Dies), and have signed on actors Nick Nolte, Kim Basinger, and John Rhys-Davies, as well. Lord Of The Rings Executive Producer Mark Ordesky is to co-produce.
Born in 1936, Precious McKenzie is a former weightlifter who, along with his young family, fled apartheid-gripped South Africa for England. Overcoming similar adversity in his new home, McKenzie, standing at a mere 4’9”, won Commonwealth titles representing both England and New Zealand and has won several World powerlifting and Masters World powerlfting titles.
From what I gather, this project has been seeking financial backing since as far back as 2008, if not earlier. The New Zealand father-and-son team told Voxy that they’ll “continue to seek finance to greenlight their biopic based on the life story of Precious McKenzie, MBE.”
James Morcan told Voxy, “The Precious One is a real passion project for us. We have invested almost a decade of our lives into it, from initial development meetings with Precious, to writing and perfecting the screenplay over many years, to eventually finding the right director, cast and crew. We consider it one of the best scripts we have written and firmly believe this underdog story has a real X-factor. Precious’ life contains universal themes that we predict will transcend borders and touch audiences worldwide upon release.”
Morcan told Voxy that he and his father “have been on the verge of fully financing the US$7.9 million film production on several occasions, only to have the deal fall apart at the 11th hour on each occasion.”
“One deal fell through because of the global financial crisis, and another was due to a high level Kiwi investor abruptly deciding he would only finance the film provided Lance and I were not part of the production.”
The Morcans aren’t sure, but believe that the investor’s issue might have originated in a misunderstanding.
“It’s bizarre that somebody would love the screenplay we wrote,” says James, “and be keen to invest in a production we ourselves created from scratch, yet want us off that production before financing it. Now obviously this film can never be made without us, but it is a tricky thing to educate investors who have had no prior experience with the film industry.”
Regardless, James says the production team are now approaching other potential financiers and have total faith they will eventually be standing on South African soil filming The Precious One.
“Unfortunately, the film does not qualify for NZFC funding. Financing it is obviously a big challenge, but everything in the film industry always is. You have to be committed to each project for the long haul.
“It took Sir Richard Attenborough 15 years to finance Gandhi. And like Gandhi, this film has to be made.” |
Q:
multile if and or conditions in excel formula
I need to check If cell D8's value:
Starts with a number or a letter,
ends with -f or -m
Then if the 7th digit in the sequence is less than 5, but only if it does in fact start with a number, if it start with a letter it must check the ending -f or - m part...
Here is what I have:
=IF(ISNUMBER(VALUE(LEFT(D8,1), IF(--MID(D8,7,1)<5,"F","M"),IF(IFERROR(FIND("-F",D8),FALSE),"F","M"))
EDIT: If start with number, then check if digit 7 is < 5, if start with letter, see if value ends with -f or -m
if digit 7 < 5 result = F else M
if ends with -f result = F else M
both ID and Passport are captured in D8, ID are numeric only, passports starts with letters.
A:
Your formula doesn't work because you forgot some ().
Try this one
=IF(ISNUMBER(VALUE(LEFT(D8,1))), IF(--MID(D8,7,1)<5,"F","M"),IF(IFERROR(FIND("-F",D8),FALSE),"F","M"))
|
User/register page issue-TEMPLATE-48498
Menu
You are here
We Are The Dead
Something kind of hit me today
I looked at you and wondered
If you saw things my way
People will hold us to blame
It hit me today, it hit me today
We're taking it hard all the time
Why don't we pass it by
Just reply you've changed your mind
We're fighting with the eyes of the blind
Taking it hard taking it hard yet now
We feel that we are paper choking on you nightly
They tell me, Son, we want you be elusive
But don't walk far
For we're breaking in the new boys
Deceive your next of kin
For you're dancing
Where the dogs decay defecating ecstasy
You're just an ally of the leecher
Locator for the virgin king
But I love you in your fuck-me pumps
And your nimble dress that trails
Oh dress yourself my urchin one
For I hear them on the rails
Because of all we've seen, because of all we've said
We are the dead
One thing kind of touched me today
I looked at you and counted
All the times we had laid
Pressing our love through the night
Knowing it's right knowing it's right
Now I'm hoping someone will care
Living on the breath of a hope to be shared
Trusting on the sons of our love
That someone will care, someone will care
But now we're today's scrambled creatures
Locked in tomorrow's double feature
Heaven is on the pillow
Its silence competes with hell
It's a twenty-four hour service
Guaranteed to make you tell
And the streets are full of pressman
Bend on gettin' hung and buried
And the legendary curtains
Are drawn round baby bankrupt
Who sucks you while you're sleeping
Its the theater of financiers
Count them fifteen round the table
White and dressed to kill
Oh caress yourself my juicy
For my hands are all but withered
Oh dress yourself my urchin one
For I hear them on the stairs
Because of all we've seen, because of all we've said
We are the dead
We Are The Dead
We are the dead
And ... in the death - as the last few corpses lay rotting on the slimy thoroughfare - the shutters lifted in
inches in Temperance Building - high on Poachers Hill and red mutant eyes gazed down on Hunger City -
no more big wheels - fleas the size of rats sucked on rats the size of cats and ten thousand peoploids split
into small tribes coveting the highest of the sterile skyscrapers - like packs of dogs assaulting the glass
fronts of Love Me Avenue - ripping and re-wrapping mink and shiny silver fox - now leg warmers - family
badge of sapphire and cracked emeralds - any day now - the year of the Diamond Dogs
As they pulled you out of the oxygen tent
You asked for the latest party
With your silicone hump and your ten-inch stump
Dressed like a priest you was
Tod Browning's freak you was
Crawling down the alley on your hands and knees
I’m sure you’re not protected for it’s plain to see
The Diamond Dogs are poachers and they hide behind trees
Hunt you to the ground they will
Mannequins with kill appeal
Will they come - I’ll keep a friend serene
Will they come - Oh baby come unto me
Will they come - Well, she’s come, been and gone
Come out of the garden baby
You’ll catch your death in the fog
Young girl - they call them the Diamond Dogs
Young girl - they call them the Diamond Dogs
Now Halloween Jack is a real cool cat
and he lives on top of Manhattan Chase
The elevator's broke so he slides down a rope
Onto the street below
Oh Tarzie go man go
Meets his little hussy with his ghost-town approach
Her face is sans feature but she wears a Dali brooch
Sweetly reminiscent, something mother used to bake
Wrecked up and paralyzed
Diamond Dogs are sable-ized
Will they come - I’ll keep a friend serene
Will they come - Oh baby come unto me
Will they come - Well, she’s come, been and gone
Come out of the garden baby
You’ll catch your death in the fog
Young girl - they call them the Diamond Dogs
Young girl - they call them the Diamond Dogs
In the year of the scavenger the season of the bitch
Sashay on the boardwalk, scurry to the ditch
Just another future song, lonely little kitsch
There’s gonna be sorrow
Try and wake up tomorrow
Will they come - I’ll keep a friend serene
Will they come - Oh baby come unto me
Will they come - Well, she’s come, been and gone
It’s safe in the city
To love in a doorway
To wrangle some screams from the room
And isn’t it me
Putting pain in a stranger?
Like a portrait in flesh
Who trails on a leash
Will you see
That I’m scared and I’m lonely?
So I’ll break up my room
and yawn and I’ll run to the center
Of things where the knowing one says
If you want it, boys
Get it here thing
Boys, boys it’s a cheap thing, cheap thing
I’m glad that you’re older than me
Makes me feel important and free
Does that make you smile, isn’t that me?
I’m in your way
And I’ll steal every moment
If this trade is a curse
Then I’ll bless you and run
To the crossroads and hamburgers
Boys, boys it’s a sweet thing
Boys, boys it’s a sweet thing
If you want it boys
Get it here thing
Oh boy it’s a cheap thing
Cheap thing
I’ll make you a deal
Like any other candidate
We’ll pretend we’re walking home
‘Cause your future’s at stake
My set is amazing
It even smells like a street
There’s a bar at the end
Where I can meet you and your friend
Someone scrawled on the wall
I smell the blood
Of les tricoteuses
Who wrote up scandals
In other bars
I’m having so much fun
With the
Poisonous people
Spreading rumours and lies and stories they made up
Some make you sing
And some make you scream
One makes you wish
That you’d never been seen
But there’s a shop on the corner
That’s selling papier mache
Making bullet proof faces
Charles Manson Cassius Clay
If you want it boys
Get it here thing
So you scream out of line
I want you I need you
Anyone out there any time
A tres butch little number whines
Hey dirty I want you
When it’s good
It’s really good and when it’s
Bad I go to pieces
If you want it boys
Get it here thing
Well on the street where you live
I could not hold up my head
For I put all I have in another bed
On another floor in the back of a car
In a cellar like a church with the door ajar
Well I guess we must be looking for a different kind
But we can’t stop trying till we break up our minds
Till the sun drip blood on the seedy young knights
Who press you on the ground while shaking in fright
I guess we could cruise down one more time
With you by my side it should be fine
We’ll buy some drugs and watch a band
Then jump in a river holding hands
If you want it boys get it here thing
Hope boys is a cheap thing cheap thing
Is it nice in your snowstorm,
Freezing your brain?
Do you think that your face looks the same?
Well let it be
It’s all I ever wanted
It’s a street with a deal
It’s got taste
It’s got claws
It’s got me
It’s got you.
You've got your mother in a whirl
She’s not sure if you’re a boy or a girl
Hey Babe, your hair’s alright
Hey Babe, let’s go out tonight
You like me and I like it all
We like dancing and we look divine
You love bands when they're playing hard
You want more and you want it fast
They put you down, they say I’m wrong
You tacky thing
You put them on.
Rebel Rebel you’ve torn your dress
Rebel Rebel your face is a mess
Rebel Rebel how could they know
Hot tramp, I love you so
You’ve torn your dress
Your face is a mess
You can’t get enough but enough ain't the test
You’ve got your transmission and a live wire
You’ve got your cue lines and a handful of ludes
You wanna be there when they count up the dudes
And I love your dress
You’re a juvenile success
Because your face is a mess
So how could they know?
I said, how could they know?
So what you wanna know
Calamity's child, chi-chile, chi-chile
Where'd you wanna go?
What can I do for you? Looks like you've been there too
'Cause you've torn your dress
And your face is a mess
Ooo, your face is a mess
Ooo, ooo, so how could they know?
Eh, eh how could they know?
Eh, eh
You always were the one that knew
They sold us for the likes of you
I always wanted new surroundings
A room to rent
While the lizards lay crying in the heat
Trying to remember who to meet
I would take a foxy kind of stand
While tens of thousands found me in demand
When you rock 'n roll with me
No one else I'd rather be
Nobody here can do it for me
I'm in tears again
When you rock 'n roll with me
Gentle hearts are counted down
The queue is out of sight and out of sounds
Me, I'm out of breath but not quite doubting
I've found a door which lets me out
When you rock 'n roll with me
No one else I'd rather be
Nobody down here can do it for me
I'm in tears again
When you rock 'n roll with me
Something kind of hit me today
I looked at you and wondered
If you saw things my way
People will hold us to blame
It hit me today, it hit me today
We're taking it hard all the time
Why don't we pass it by
Just reply you've changed your mind
We're fighting with the eyes of the blind
Taking it hard taking it hard yet now
We feel that we are paper choking on you nightly
They tell me, Son, we want you be elusive
But don't walk far
For we're breaking in the new boys
Deceive your next of kin
For you're dancing
Where the dogs decay defecating ecstasy
You're just an ally of the leecher
Locator for the virgin king
But I love you in your fuck-me pumps
And your nimble dress that trails
Oh dress yourself my urchin one
For I hear them on the rails
Because of all we've seen, because of all we've said
We are the dead
One thing kind of touched me today
I looked at you and counted
All the times we had laid
Pressing our love through the night
Knowing it's right knowing it's right
Now I'm hoping someone will care
Living on the breath of a hope to be shared
Trusting on the sons of our love
That someone will care, someone will care
But now we're today's scrambled creatures
Locked in tomorrow's double feature
Heaven is on the pillow
Its silence competes with hell
It's a twenty-four hour service
Guaranteed to make you tell
And the streets are full of pressman
Bend on gettin' hung and buried
And the legendary curtains
Are drawn round baby bankrupt
Who sucks you while you're sleeping
Its the theater of financiers
Count them fifteen round the table
White and dressed to kill
Oh caress yourself my juicy
For my hands are all but withered
Oh dress yourself my urchin one
For I hear them on the stairs
Because of all we've seen, because of all we've said
We are the dead
We Are The Dead
We are the dead
Someday they will get you now you must agree
The times they are a telling
And the changing isn't free
You've read it in the tea leaves
and the tracks are on TV
Beware the savage lure of 1984
They'll split your pretty cranium
And fill it full of air
And tell you that you're eighty
But brother you won't care
You'll be shooting up on anything
tomorrow's never there
Beware the savage lure of 1984
Come see, come see remember me?
We played an all night movie role
You said it would last
But I guess we enrolled in 1984, 1984
I'm looking for a vehicle I'm looking for a ride
I'm looking for a party I'm looking for a side
I'm looking for the treason that I knew in '65
Beware the savage lure of 1984
He'll build a glass asylum
With just a hint of mayhem
He'll build a better whirlpool
We'll be living from sin
Then we can really begin
Please saviour, saviour show us
Hear me, I'm graphically yours
Someone to claim us - someone to follow
Someone to shame us - some brave apollo
Someone to fool us - someone like you
We want you Big Brother - Big Brother
I know you think you're awful square
But you made everyone and you've been everywhere
Lord I think you'd overdose if you knew what's going down
Someone to claim us - someone to follow
Someone to shame us - some brave apollo
Someone to fool us - someone like you
We want you Big Brother - Big Brother |
N-acetylcysteine: short-term clinical benefits after coronary angiography in high-risk renal patients.
Previous studies on the role of N-acetylcysteine in the prevention of contrast-induced nephropathy after coronary angiography and on the drug's long-term effects have produced contradictory findings. The aim of this study was to clarify the benefits of N-acetylcysteine. A prospective, randomized, double-blind study was carried out in patients with chronic renal failure (plasma creatinine= >or=1.4 mg/dL) who underwent coronary angiography. This study concerns the second arm of the main study. Findings on the arm involving patients with normal renal function have been published previously. As before, patients were randomly assigned to receive either N-acetylcysteine, 600 mg every 12 h intravenously, or placebo. The primary end-point was the development of contrast-induced nephropathy. The study included 81 patients (39 on N-acetylcysteine, 42 on placebo) with comparable baseline clinical characteristics. The overall incidence of contrast-induced nephropathy was 14.8% (12 patients): 5.1% (2 patients) in the N-acetylcysteine group and 23.8% (10 patients) in the placebo group (odds ratio [OR]=0.17; 95% confidence interval [CI], 0.03-0.84; P=.027). One patient (1.2%) in the latter group required dialysis while in the coronary unit. Multivariate analysis showed that N-acetylcysteine was an independent protective factor against the composite end-point of contrast-induced nephropathy, need for dialysis and mortality during the coronary unit stay (OR=0.20; 95% CI, 0.04-0.97; P=.04). Nevertheless, no significant difference was observed between the N-acetylcysteine and placebo groups in the rates of in-hospital (10.3% vs. 16.7%, respectively) or 1-year mortality (15.4% vs. 21.4%, respectively). Prophylactic administration of N-acetylcysteine provided significant short-term clinical benefits in high-risk renal patients who underwent coronary angiography. |
Median -- hero twin boys once conjoined but surgically separated at four months old got to hang out with their favorite celebrity and Florida. Four year old -- Hussein -- Both Wear prosthetic legs just like their hero -- the Dawson from the movie dolphin tale. Let's and then in -- -- environment -- is mummy -- just like. The boys both each have one prosthetic leg and winter the dolphin has a prosthetic tail. Their parents say it was a dream for some time now and that they came all -- -- from Ireland to visit winter. They say the story of the dolphin with -- static has helped the twins and their own rehabilitation. In fact they'd love their heroes so much their first word was winter.
This transcript has been automatically generated and may not be 100% accurate.
{"id":23461895,"title":"Formerly Conjoined Twins Meet Celebrity Dolphin","duration":"0:49","description":"The 4-year-old boys' prosthetic legs and Winter's prosthetic tail were made by the same team.","section":"GMA","mediaType":"Default"} |
Complete the lighting and decor of your Christmas tree with Kurt Adler's ivory angel treetop. This beautiful 12" angel is wearing a soft, innocent ivory gown with feathered wings to match. She is lit with 10 lights, from her candles to her gown. She comes with 4 spare bulbs and 1 fuse. |
Breaking News
Kaizer Chiefs goalkeeper Itumeleng Khune says he made a promise to the club that he will not represent another football team for the remainder of his career. The Amakhosi first-choice stopper is widely regarded as one of the best goalkeepers in Africa and has long been linked with moves overseas. The 29-year-old has picked up 12 major trophies during his time with the club, including three league titles, while registering an incredible 109 clean sheets in 234 games. "I made a promise to the KC [Kaizer Chiefs] faithful, the chairman and everyone at the club and this is where I want to retire," he said on the club's official YouTube channel. "It's been a special journey for me. If I have to combine all the years; five years with the development squad, 13 years with the first team, so you can see it's a great, great milestone." |
Introduction {#sec1-1}
============
Modern healthcare organizations are facing many organizational as well as procedural challenges. Indeed, along with increasing complexity of care delivery and increased technical and technological competences required for supply adequate care, healthcare organizations are facing also challenges which derive from changes in the cultural composition of society. This article focuses on the study of some processes that are implicated in the ways in which healthcare organizations deal with these challenges.
Interprofessional collaboration and effective interprofessional team functioning are recognized as two of the principal factors trough which healthcare systems may effectively face the increased complexity of care process. Accordingly, research on interprofessional collaboration is constantly increasing ([@ref1]), and it has been shown that better interprofessional collaboration improves clinical, organizational and individual health outcomes ([@ref2],[@ref3]). Beside increased complexity of healthcare processes, health organizations are also facing an increasing in cultural diversity of society composition ([@ref4]). This challenges health system in two ways at least: a) to take into account the role of cultural heritage of patients on the care processes ([@ref5]); b) to consider that healthcare professionals may belong to different cultures so that teamwork are becoming intercultural and interprofessional groups. In the present paper, we are particularly committed with the latter point given that the increasing ethno-cultural difference inside the teamwork may limit collaboration and obstacle the achievement of care unit's goals. Indeed, prejudiced professionals may be reluctant, intentionally or not, to interact and collaborate with colleagues form different cultures. In such a way, team functioning and quality of supplied care may be damaged ([@ref6],[@ref7]). Moreover, it has been showed that anti-immigrant prejudice is a detectable phenomenon also in Italian hospitals ([@ref8]).
In sum, healthcare systems are required to boost interprofessional collaboration and effective team functioning in order to face the increased complexity of care, but at the same time, increased cultural diversity in healthcare professionals may hinder collaboration and team functioning. Thus, is it possible to increase team functioning when professionals belong to different cultural or ethnic groups?
Intergroup contact and positive intergroup outcomes {#sec1-2}
===================================================
Some recent works have tried to apply theories from social psychology to the relationship between professionals in healthcare settings (6,9--11) showing promising results. Social psychology offers some theoretical accounts that may be useful for trying to increase collaboration among professionals in general ([@ref10],[@ref12]), and from different cultural or ethnic groups in particular. Among those, intergroup contact is widely recognized as a way to reduce intergroup enmity and increase intergroup collaboration ([@ref13],[@ref14]). According to intergroup contact theory ([@ref15]), intergroup contact (that is to say face-to-face encounter between persons belonging to different groups) is able to decrease prejudice, intergroup hostility, intergroup anxiety and perception of threat when groups 1) are equal in status, 2) encounter in a cooperative context, 3) share common goals and 4) an institutional support exists. Subsequently research has shown that these four conditions may help, but are not necessary to allow intergroup contact to increase intergroup harmony and decreased conflict, stereotypes and prejudice ([@ref14]). Nowadays, there is robust evidence that mere intergroup contact can improve intergroup relations ([@ref16],[@ref17]), especially when contact is positive. Some of that evidence come also from work settings and, in particular, healthcare settings ([@ref6]). For example, Voci and Hewstone ([@ref18]) showed that, in a supermarket as well as in a hospital, intergroup contact reduced the prejudice against migrants in the workplace. Similar results has been supplied with sample of nurses ([@ref19],[@ref20]). More recently, it has been shown that intergroup contact can extend its positive effect beyond prejudice and stereotyping. Indeed, it has been shown that, among healthcare professionals, frequent and positive contact with non-native colleagues decreased prejudice against immigrant in general, but also increased the perception of effective team functioning ([@ref21]). This effect was mediated by the perception of ingroup threat: positive and frequent contact with non-native coworkers, decreased Italian professionals' perception of threat that, in turn, increased the perception of effective team functioning.
Accordingly, the aim of the present work was to investigated whether contact during practical training would lead nursing students to increase perception of team functioning and decrease prejudice against migrants in general. Practical training is a particular moment for healthcare students who begin to experience interaction with other professionals and enter actively into the care unit (i.e., teamwork) ([@ref22]). In such a time, students have many opportunities to enter in contact with students, professionals or patients with other cultural or ethnical groups.
For prejudice, we expected that, according with literature and evidences discussed thus far, frequent and positive contact with non-native professionals during practical training would reduce prejudice against immigrants in general (hypothesis 1).
With respect to team functioning, our reasoning is that frequent and positive intergroup contact would help to improve relations between coworkers in terms of better communication, participation and collaboration among members. The aspects of groups dynamics have been linked to improved team functioning and effectiveness ([@ref23],[@ref24]). Thus, positive and frequent contact would drive to better perception of team functioning (hypothesis 2).
Finally, we considered the mediating role of intergroup anxiety. Intergroup anxiety is considered one of the principal mediator of intergroup contact. Intergroup anxiety refers to a negative affective state experienced by people when are interacting, or when merely anticipating interaction, with members of different groups ([@ref25]). This sense of anxiety determines avoidance of the outgroup members and increasing prejudice and stereotyping against the outgroup. Accordingly, Pettigrew and Tropp ([@ref17]) meta-analyses showed that intergroup anxiety mediates the relationship between the contact and prejudice even more strongly than empathy and outgroup knowledge. More precisely, intergroup contact is able to reduce the anxiety often aroused by intergroup encounters ([@ref26],[@ref27]), which in turn reduces prejudice and negative outcomes against outgroup ([@ref20],[@ref28]). Thus, we expected to find that contact would reduce intergroup anxiety (hypothesis 3), which in turn should mediate the relations between intergroup contact and both prejudice and team functioning (hypothesis 4 and 5). [Figure 1](#F1){ref-type="fig"} shows the expected path model.
{#F1}
Method {#sec1-3}
======
Participants and procedure {#sec2-1}
--------------------------
The research enrolled 96 nursing students. Of those, 13 were excluded because had not Italian citizenship. The analyzed sample was then composed by 83 nursing students of whom 60 (72%) were women (mean age = 23.86, SD = 2.60). A cross-sectional survey design was used, and participants were asked to voluntarily complete a questionnaire.
Measures {#sec2-2}
--------
***Quantity of contact with non-native healthcare professionals***. Quantity of contact was measured with two items (e.g. 'In the CU in which you done your practical training, how often do you have contact with migrant professionals?') on a five-point Likert scale (0 = never to 4 = very often; Cronbach's alpha = .89).
***Quality of contact with non-native healthcare professionals*** Participants were asked to describe the kind of contact they had with migrant colleagues during the practical training using four semantically opposed adjectives (e.g. pleasant-unpleasant, natural-unnatural). Ratings were on a 5-point Likert-type scale (-2 = negative adjective, +2 = positive adjective; Cronbach's alpha = .76).
In order to obtain one single score of intergroup contact, we followed the common procedure to multiply quantity of contact scores by quality of contact scores ([@ref18],[@ref20],[@ref21]). In this way, a new score ranging from -8 (frequent negative contact) to +8 (frequent positive contact) was used as measure of intergroup contact.
***Intergroup anxiety***. As suggested by Stephan and Stephan ([@ref25]), intergroup anxiety was measured asking participants to imagine a hypothetical situation at work in which the majority of professionals was immigrants, and then indicate how they would feel using seven adjectives (e.g., happy, cautious, relaxed). Rates were on a 5-point Likert scale (1 = not at all; 5 = very much; Cronbach's alpha = .79).
***Teamwork functioning***. Perception of team functioning was measured with 14 items from the Interprofessional Team Collaboration Scale ([@ref29]). Participants were asked to think about the CU in which they done, or had done, their practical training and to express their agreement with statements (i.e., 'Team members focus on understanding the perspectives of others rather than defending their own specific opinions') on a five-point Likert-type scale (1 = completely disagree to 5 = completely agree; Cronbach's α = .90).
***Attitude against migrants.*** This was measured by asking participants to indicate their general attitude toward immigrants on a thermometer ranging from 0 (extremely negative attitude) to 10 (extremely positive attitude). Scores were reversed so that higher score indicated more negative attitude toward immigrants.
In the last part of the questionnaire, participants were asked to indicate some socio-demographic characteristics such as gender and age.
All but prejudice measures were computed as the average values of the intended items so that higher scores indicate higher values of the measured construct.
Results {#sec1-4}
=======
Correlation and descriptive statistics {#sec2-3}
--------------------------------------
Data inspection indicated that some individual scores were suspicious to be outliers (i.e., near of over 3ds of the mean score). In order to maintain as participants as possible and to be cautious about estimations, we choose to winsorize all measures at 5%. [Table 1](#T1){ref-type="table"} shows descriptive statistics and zero-order correlations among measured constructs.
As one can see, according with hypothesis 1, intergroup contact was negatively related with prejudice, albeit this correlation was not significant at statistical level. According with hypotheses 2 and 3, instead, intergroup contact was significantly and positively correlated with team functioning and negatively and positively related with intergroup anxiety. This latter was positively correlated with negative attitude toward migrants and negatively related with team functioning, as expected.
Model testing {#sec2-4}
-------------
The hypothesized relations among variables were tested trough structural equation modelling approach with maximum likelihood estimation and robust standard error. Results are shown in [figure 1](#F1){ref-type="fig"}. As expected from hypothesis 3, intergroup contact significantly decreased intergroup anxiety, *b* = -.16, *SE* = .03, *Z* = -4.88, *p*\< .001. Intergroup anxiety, in turn, significantly increased negative attitude toward immigrants, *b* = 1.18, *SE* = .38, *Z* = 3.09, *p* = .002 and decreased team functioning *b* = -.24, *SE* = .11, *Z* = -2.26, *p* = .024. Moreover, contrary to the hypothesis 1 and 2 direct effects of contact on both negative attitude toward immigrants, *b* = 0.01, *SE* = 0.14, *Z* = .08, *p* = .94, and team functioning, *b* = .03, *SE* = .03, *Z* = .81, *p* = .42, were not significant. This occurred because effects of contact were completely mediated by intergroup anxiety. Indeed, according with hypotheses 4 and 5, indirect effect of intergroup contact on negative attitude toward immigrants was significant, *b* = -0.18, *SE* = .07, *Z* = -2.60, *p* = .009 as well as the indirect effect of contact on team functioning, *b* = .04, *SE* = .02, *Z* = 2.00, *p* = .045. The model without path between intergroup contact and both negative attitude toward migrants and team functioning had satisfactory fit, *χ*^*2*^([@ref2]) = .56, *p* = .76. CFI = 1.00, TLI = 1.00, RMSEA = .000, 90%CI = .000 - .123, *p* = .845, SRMR = .020.
Discussion and conclusion {#sec1-5}
=========================
The present research supplies further evidence that intergroup contact can extend its effect beyond the usual intergroup processes (i.e., prejudice) ([@ref13],[@ref14],[@ref21]). Indeed, results indicated that nursing students who had frequent and positive contact with non-native professionals or students during their practical training perceived the teamwork in which training was done as more collaborative. This effect, however, was completely mediated by intergroup anxiety, that is to say a negative feeling that people may experience when meet people belonging to different cultural or ethnic group. This results is coherent with literature which shows that intergroup contact is able to reduce negative feeling toward immigrants ([@ref18],[@ref20],[@ref30]), but represents one of the few available evidence that intergroup contact, by reducing intergroup anxiety, may help to improve healthcare and organizational outcomes such as team functioning.
######
Zero-order correlations and descriptive statistics among considered variables.
Contact Anxiety Negative attitude toward migrants *M* *SD* *Mw* *SDw* range
----------------------------------- ------------------------------------- ---------------------------------------- --------------------------------------- ------ ------ ------ ------- -------
Teamwork functioning .23[\*](#t1f1){ref-type="table-fn"} -.33[\*\*](#t1f2){ref-type="table-fn"} -.07 3.23 0.60 3.22 0.53 1-5
Contact -.46[\*\*](#t1f2){ref-type="table-fn"} -.17 1.93 2.02 1.88 1.8 -8 +8
Anxiety .38[\*\*](#t1f2){ref-type="table-fn"} 1.95 0.63 1.95 0.61 1-5
Negative attitude toward migrants 6.76 1.95 6.80 1.85 0-10
p \< .05
p \< .01. Mw = winsorised mean; SDw = winsorised standard deviation.
Present research has some limitations of course. First, the cross-sectional design and the derived correlational nature of data do not permit to exclude other relations between variables. Moreover, this kind of design is affected by the common method bias ([@ref31]) which can affect estimated relations among measures. Another shortcoming lies on the small sample size and on the fact that we considered nursing students only. As indicated by some research, nursing students and nurses represent an intermediate-status group ([@ref32],[@ref33]) in the health profession hierarchy ([@ref34],[@ref35]) which has some particular features with respect to other professions such as physicians and healthcare operators. These aspects may pose some limitations to the generalizability of present results. For this reason, further research is needed in order to deeper analyze the relationship between intergroup contact and organizational outcome (i.e., team functioning and collaboration) among other healthcare professions.
Despite these shortcomings, we believe that, from an applicative point of view, present results may be of interest for the management of healthcare and educational organizations. Indeed, findings indicate that frequent and positive contact may help future professionals to be more effective into teamwork, and that positive effect of contact may be detectable since educational time, at least in nursing students.
|
All data files are available from the University of Bristol Research Data Repository (DOI: <http://dx.doi.org/10.5523/bris.qyvpsu8ckprr1n1cmro9t141j>).
Introduction {#sec001}
============
Deliberately eating slowly appears to promote satiation \[[@pone.0147603.ref001]--[@pone.0147603.ref003]\] and foods that are eaten quickly tend to be eaten in larger portions \[[@pone.0147603.ref004], [@pone.0147603.ref005]\] and have lower expected satiation \[[@pone.0147603.ref006]\]. For a recent systematic review see Robinson *et al*. \[[@pone.0147603.ref002]\]. These acute effects might also accumulate over time. People who eat at a faster rate tend to have a higher body mass index (BMI) \[[@pone.0147603.ref007]--[@pone.0147603.ref009]\]. Indeed, a recent clinical intervention suggests that a reduction in eating rate produces a significant and sustained (12-months post treatment) reduction in BMI and body fat in adolescents \[[@pone.0147603.ref010]\]. Despite its importance, rather little is known about the process that governs our rate of eating and the mechanism that supports a relationship between eating rate and meal size.
Simply infusing food directly into the stomach has very little effect on appetite and fullness \[[@pone.0147603.ref011]\]. Broadly, this tells us that the process of eating plays a causal role in satiation. One possibility is that eating quickly reduces the level of orosensory stimulation (sometimes referred to as orosensory exposure). In animal studies, Davis and colleagues have shown that orosensory stimulation can both inhibit and promote food intake \[[@pone.0147603.ref012]\]. When food is allowed to drain from the stomach via a gastric fistula then meal size increases dramatically. However, and critically, the initial post-surgery meal is not dissimilar to that observed in real-feeding animals. This demonstrates that in the absence of other feedback, orosensory stimulation can inhibit food intake. However, over time, 'sham feeding' animals relearn that orosensory stimulation no longer reliably predicts the ingestion of food, and in the absence of this 'conditioned satiation,' meal size increases \[[@pone.0147603.ref013]\].
Observations of this kind are very revealing. However, they also generate broader questions about ways in which orosensory stimulation and oral metering might operate in humans. Unlike other animals, we often plan our meal size in advance \[[@pone.0147603.ref014], [@pone.0147603.ref015]\]. Therefore, the need to rely on direct orosensory feedback in the control of meal size may have been largely superseded by an ability to plan and to use other pre-ingestive cues based on semantic and visual information, both before and during a meal. Accordingly, several studies show that information about a food can have a meaningful effect on feelings of fullness after it has been consumed \[[@pone.0147603.ref016]--[@pone.0147603.ref018]\].
In one study a passive self-refilling soup bowl was used to remove visual feedback during a meal. Remarkably, meal size increased by 73% yet had little effect on satiation \[[@pone.0147603.ref019]\]. Consistent with this role for 'meal monitoring,' distraction appears to reduce the fullness that is experienced at the end of a fixed meal \[[@pone.0147603.ref020], [@pone.0147603.ref021]\]. Importantly, we note that distraction has also been found to affect eating rate \[[@pone.0147603.ref022], [@pone.0147603.ref023]\], as has hunger \[[@pone.0147603.ref024], [@pone.0147603.ref025]\], portion size \[[@pone.0147603.ref026], [@pone.0147603.ref027]\], and palatability \[[@pone.0147603.ref028], [@pone.0147603.ref029]\]. For example, when presented with a larger portion of the same food, participants take larger bite sizes and demonstrate a faster eating rate \[[@pone.0147603.ref027]\]. Together, these observations support a novel theoretical proposition. As noted above, eating rate has been thought to influence satiation by moderating orosensory stimulation. In this context, researchers have tended to focus on the physical and textural properties of food (e.g., \[[@pone.0147603.ref004], [@pone.0147603.ref030], [@pone.0147603.ref031]\]). However, these effects of distraction, hunger, portion size, and food liking highlight an alternative (but not mutually exclusive) possibility---that eating rate is also under cognitive control. This study explores the prospect that rate of eating might also be governed by a hitherto unexplored process that uses ongoing estimates of the volume of food remaining in a container to adjust food intake during a meal. Consistent with this idea, it appears that manipulations to perceived volume have a marked effect on the rate of beer consumption \[[@pone.0147603.ref032]\]. In the present study, we sought to determine whether a similar process operates when eating a semi-solid food.
To explore this idea, we manipulated visual information about the amount of food consumed in a meal. This was achieved using a peristatic pump that controlled the amount of food that covertly entered or left a bowl as participants ate. In congruent conditions, the participants saw and consumed either 300ml or 500ml. In incongruent conditions, the participants saw either 300ml or 500ml at the start of the meal and then went on to consume a different amount, either 500ml or 300ml. At a constant eating rate, the volume in the bowl will reduce faster in the see 500ml/eat 300ml condition than in see 300ml/eat 500ml condition. If eating rate is governed by a process that meters intake and corrects for faster- or slower-than-anticipated changes in perceived volume then we would expect to observe compensation for the mismatch. Accordingly, we anticipated a faster eating rate in the see 300ml/eat 500ml condition relative to the see 500ml/eat 300ml condition, and for eating rate to be at an intermediate pace in the two congruent conditions. To demonstrate that this effect generalises across different types of semi-solid food, we compared eating rate using both a savoury soup (tomato soup) and a sweet dessert (custard).
Materials and Methods {#sec002}
=====================
Experiment overview {#sec003}
-------------------
We decided to test 80 participants in a between-subjects design. On arrival they were shown either 300ml or 500ml of tomato soup or custard. Participants then consumed either a 300ml or 500ml portion. An orthogonal combination of seeing either 300ml or 500ml and then eating either 300ml or 500ml and two different food types rendered eight separate conditions (10 participants allocated to each condition). For each food type (custard and tomato soup), there were two congruent conditions (participants both saw and ate the same amount---either 300ml or 500ml) and two incongruent conditions (participants saw and ate different amounts---they either saw 300ml and ate 500ml or they saw 500ml and ate 300ml). Incongruent eating was achieved by covertly manipulating the amount of soup or custard entering or leaving the bowl during the meal. Eating duration was recorded. In addition, measures of hunger and fullness were taken immediately before the meal and periodically for 60 minutes after it had been consumed.
Participants {#sec004}
------------
Eighty participants (50 women and 30 men) were recruited from the staff and student populations at the University of Bristol (United Kingdom). To reduce demand awareness, participants were told that the purpose of the study was to determine 'do liquid foods quench thirst?' Prior to participation, participants were informed that they could not take part in the study if they; i) were vegan, ii) were allergic to custard or tomato soup, or iii) had previously assisted with studies involving our self-refilling/draining soup-bowl apparatus. Our sample had a mean age of 24.8 years (*S*.*D*. = 8.7; Range = 18--62) and a mean BMI of 23.2 kg/m^2^ (*S*.*D*. = 3.8; Range = 16.3--40.4). All participants received £5 (Sterling) for their assistance. Ethical approval was granted by the University of Bristol's Faculty of Science Human Research Ethics Committee and all participants provided written informed consent before assisting with the study.
Test foods and apparatus {#sec005}
------------------------
Following a previous study \[[@pone.0147603.ref033]\], soup or custard was added or removed from a transparent bowl using a peristaltic pump (see [Fig 1](#pone.0147603.g001){ref-type="fig"}). The bowl was presented in front of the volunteers and it was fixed to a table. A tall screen was positioned at the back of the table. This separated the participant from both the experimenter and a second table, which supported the pump and a reservoir containing the test food. Throughout the experiment, the volunteers were unable to see the pump or the reservoir.
{#pone.0147603.g001}
The bottom of the transparent bowl was connected to a length of temperature-insulated food-grade tubing. The tubing fed through a hole in the table (1cm diameter; immediately under the bowl) and connected to the pump and then to a reservoir of either soup or custard via a hole in the screen. This set up was hidden from the participants using a heat-proof cover and a tablecloth. The experimenter manipulated the direction and flow rate using an adjustable motor controller that was attached to the pump. With experience, the experimenter was able to monitor eating rate and to match this with a flow rate that ensured that the pump was in operation over the duration of the meal. Both the soup and the custard were consumed using a dessert spoon.
Two different test foods were included in this experiment--one savoury and one sweet. The savoury food was a warm 'Sainsbury's Basics creamed tomato soup' (39 kcal / 100 g, Sainsbury's Supermarkets Ltd, London, U.K.). The sweet food was a warm 'Sainsbury's Basics instant custard' (77 kcal / 100 g, Sainsbury's Supermarkets Ltd, London, U.K.).
Measures {#sec006}
--------
### Hedonic ratings {#sec007}
Depending on condition, a taster portion (10ml) of either tomato soup or custard was provided in a 20ml glass bowl with a teaspoon. Using a computer, participants were asked to rate the pleasantness and their desire-to-eat the sample. Specifically, participants were shown 100-mm visual-analogue rating scales and were asked 'How PLEASANT is the taste of this food right now?' and 'How strong is your DESIRE TO EAT this food right now?' with anchor points 'Not at all' and 'Extremely.' All measures were elicited using custom software (available from the authors on request) written in Visual Basic (version 6.0 distributed by Microsoft; Microsoft Corp, Redmond, WA).
### Eating rate {#sec008}
Participants were instructed to start eating at their own time of choosing and to eat at their own natural pace. They were also told that they should stay in the booth when they had finished their meal. A stopwatch was placed in each sensory booth. Participants were instructed "You will see that there is a stop watch in your booth. We would like you to press start on the stop watch when you begin eating and press stop on the stop watch when you have reached the lower black line." Therefore, they were aware that meal duration was being monitored. However, they were told that "we are asking people to do this because some people eat at different paces to others so we have to make a note so we know who is who. We need you to operate the stop watch because we don't want to be looking over your shoulder while you are eating."
### Assessment of hunger, fullness and thirst {#sec009}
Computerised 100-mm visual-analogue rating scales were used to assess hunger (Heading: \'How hungry do you feel right now?\'; Anchor points: \'Not at all hungry\' and \'Extremely hungry\') and fullness (Heading: \'How full do you feel right now?\'; Anchor points: \'Not at all full\' and \'Extremely full\'). From each pair of values, a composite \'fullness score\' was calculated using the formula ((100 --hunger) + fullness)/2). Ratings were taken at the beginning of each session and immediately after eating. Participants were also given further sets of hunger and fullness ratings 20 minutes, 40 minutes, and 60 minutes after meal termination. To generate a single \'satiety score,\' for each participant, the total area under the curve (AUC) was calculated based on composite fullness scores at 0, 20, 40, and 60 minutes. AUC was computed using the trapezoidal rule. Thirst was also rated in combination with hunger and fullness. This measure was included only to reinforce the cover story and to check for baseline differences across groups.
Procedure {#sec010}
---------
Participants were asked to abstain from eating for three hours prior to arrival at their test session. Testing took place on weekdays between 11:00 and 14:45 hours. On arrival, the participants read an information sheet and signed a consent form. Baseline ratings of hunger, fullness, and thirst were taken. Participants were then asked to provide hedonic ratings for their allocated test food. They were then taken to a testing booth where a bowl of one of the foods was waiting. They were instructed to avoid touching the bowl and to eat until the volume of soup/custard remaining matched a line on the side of the bowl. The line ensured that eating terminated with 100ml of soup/custard remaining, thereby obscuring the bottom of the bowl. To accommodate for this amount, across conditions, the initial starting portion was 100ml greater than the amount to be consumed. All participants were informed that eating their prescribed portion was a mandatory part of the procedure. In the incongruent conditions, the peristaltic pump was switched on at the beginning of the meal. At the end of the meal the participants again rated their hunger, fullness, and thirst. After 20 minutes, these ratings were repeated and participants completed the Three Factor Eating Questionnaire (TFEQ) \[[@pone.0147603.ref034]\]. Further sets of ratings were issued after 40 minutes and 60 minutes. Over this period the participants were permitted to engage in light reading. At the end of the session the participants were asked to respond to the question 'What was the aim of the experiment?' No participants demonstrated any level of demand awareness. Finally, a measure of height and weight was taken. Participants were fully debriefed at the end of the study by email. Testing sessions lasted approximately 75 minutes.
Data analysis {#sec011}
-------------
In the first instance, the raw data were converted to *z*-scores and screened for outliers. Scores falling outside 99.9% of a normal distribution were entered as missing data \[[@pone.0147603.ref035]\]. We found no outliers in our measure of eating duration. Only one rating was classed as an outlier. This pleasantness rating was entered as a missing datum.
To explore across-condition differences in baseline measures, hedonic ratings of the test food, and participant characteristics, we ran ten 2 (food type; custard or tomato soup) x 2 (amount eaten; 300ml or 500ml) x 2 (amount seen; congruent, incongruent) between-subjects ANOVAs. Analyses were performed on baseline fullness, baseline thirst, pleasantness of the test food, desire-to-eat the test food, BMI, age, gender, TFEQ restraint, TFEQ disinhibition, and TFEQ hunger.
For each meal, a measure of eating rate was calculated by dividing the amount eaten (ml) by the duration (s) of the meal. To explore effects on eating rate we ran a 2 (food type; custard or tomato soup) x 2 (amount eaten; 300ml or 500ml) x 2 (amount seen; congruent, incongruent) between-subjects ANOVA. Tukey's *post hoc* analysis was used to explore the interaction between amount eaten and amount seen. Specifically, eating rate was compared across amounts eaten (300ml *vs* 500ml) in the congruent and incongruent contexts, separately. We also carried out comparisons of eating rate when the amount seen was congruent or incongruent with the amount consumed---separate tests were carried out for 300ml and 500ml portions. We also recognise an alternative approach in which measures of meal duration are assessed rather than eating rate (ml/s). Since eating rate is derived from meal duration both approaches yield near identical results. Where we observed significant findings relating to eating rate we confirmed the same result in an analysis of meal duration.
An identical data analysis strategy was used to explore the effect of amount seen and amount eaten on composite fullness scores immediately after eating and on the satiety scores derived from responses over a 60-minute post-meal duration.
All data were analysed using IBM SPSS statistics version 21 (IBM, New York, USA). In all analyses we applied a critical *p*-value of \< .05.
Results {#sec012}
=======
Baseline measures, hedonic ratings, and participant characteristics {#sec013}
-------------------------------------------------------------------
[Table 1](#pone.0147603.t001){ref-type="table"} details baseline measures and participant characteristics (means ± *S*.*D*.) for the eight groups, separately. [S1 Table](#pone.0147603.s001){ref-type="supplementary-material"} (see [supporting information](#sec017){ref-type="sec"}) provides statistical values associated with the ten 2 (food type; custard or tomato soup) x 2 (amount eaten; 300ml or 500ml) x 2 (amount seen; congruent, incongruent) between-subjects ANOVAs. All *F* ratios failed to reach statistical significance with three exceptions. In each case, we suspect these can be attributed to chance. First, we observed a significant main effect of food type on age (years)--participants who ate the tomato soup were older (M = 26.7 years, *S*.*D*. = 11.0) than participants who ate the custard (M = 22.9 years, *S*.*D*. = 5.0). Second, we found a significant interaction between food type (tomato soup or custard) and amount seen (congruent or incongruent) in TFEQ-hunger scores. For custard, participants who ate in the congruent condition had higher scores than those who ate in the incongruent condition. By contrast, for tomato soup, we found the converse. Both of these baseline differences do not relate to our key hypotheses and are theoretically uninteresting. Third, for desire-to-eat (mm), we observed a significant interaction between amount eaten (300ml or 500ml) and amount seen (congruent or incongruent). In the eat 300ml condition participants showed a greater desire to eat the test food in the incongruent condition (M = 75.7 mm, *S*.*D*. = 23.0) than in the congruent condition (M = 56.7 mm, *S*.*D*. = 26.4). By contrast, in the eat 500ml condition, responses were broadly similar in the case of congruent and incongruent eating (respectively, M = 78.4 mm, *S*.*D*. = 12.4 and M = 71.1 mm, *S*.*D*. = 24.4).
10.1371/journal.pone.0147603.t001
###### Mean (± *S*.*D*.) scores of baseline fullness (mm), baseline thirst (mm), pleasantness of the test food (mm), desire-to-eat the test food (mm), BMI (kg/m^2^), age (years), TFEQ restraint, TFEQ disinhibition, and TFEQ hunger, in each condition, separately.
The number of males and females in each condition are also displayed.
{#pone.0147603.t001g}
Congruent Incongruent
------------------------------------ ------------- ------------- ------------- ------------- ------------- ------------- ------------- -------------
Baseline fullness (mm) 22.1 (9.8) 20.4 (14.4) 25.4 (21.4) 21.3 (13.3) 29.0 (25.0) 28.8 (20.9) 27.9 (16.1) 28.9 (18.1)
Baseline thirst (mm) 63.9 (21.0) 65.2 (26.1) 71.8 (30.1) 43.2 (25.1) 64.1 (26.2) 58.3 (9.3) 60.9 (18.3) 66.3 (27.4)
Pleasantness of the test food (mm) 60.5 (17.8) 78.6 (14.2) 71.3 (18.7) 79.1 (10.3) 71.1 (22.7) 73.5 (20.5) 83.4 (18.2) 80.8 (15.0)
Desire-to-eat the test food (mm) 59.4 (24.4) 79.0 (14.2) 54.0 (29.3) 77.7 (11.2) 65.6 (29.1) 72.1 (27.1) 76.5 (18.4) 79.3 (18.7)
BMI (kg/m^2^) 23.3 (2.6) 21.9 (2.7) 22.9 (4.3) 25.3 (6.5) 23.5 (4.7) 22.4 (1.7) 23.9 (3.1) 22.5 (3.2)
Age (years) 22.5 (2.1) 25.4 (12.6) 25.6 (5.9) 22.2 (4.5) 27.7 (10.0) 31.3 (14.5) 21.9 (6.1) 21.9 (2.2)
Gender 9 F / 1 M 5 F / 5 M 6 F / 4 M 6 F / 4 M 7 F / 3 M 6 F / 4 M 6 F / 4 M 5 F / 5 M
TFEQ restraint 7.6 (4.9) 6.8 (5.3) 6.4 (5.3) 8.0 (4.8) 7.7 (4.3) 7.8 (4.9) 9.9 (5.3) 8.6 (5.5)
TFEQ disinhibition 6.9 (4.2) 5.2 (4.2) 6.3 (3.0) 9.3 (2.5) 7.5 (3.0) 6.1 (3.8) 7.1 (3.1) 6.9 (4.0)
TFEQ hunger 6.7 (3.1) 4.1 (2.6) 7.6 (4.7) 6.8 (2.8) 6.4 (3.2) 6.4 (3.7) 3.7 (2.2) 5.8 (2.6)
Eating rate {#sec014}
-----------
Participants who consumed the tomato soup ate at a significantly faster rate (*M* = 1.00 ± 0.41 ml/s) than those who ate the custard (*M* = 0.85 ± 0.22 ml/s; *F*(1, 72) = 5.06, *p* = .03, *η*~*p*~^*2*^ = .07). Irrespective of food type, participants who consumed the 500ml portion ate at a significantly faster rate (*M* = 1.03 ± 0.34 ml/s) than those who received the 300ml portion (*M* = 0.83 ± 0.30 ml/s; *F*(1, 72) = 9.58, *p* = .003, *η*~*p*~^*2*^ = .12). Eating rate was not significantly different when the amount seen was congruent with the amount eaten (*M* = 0.90 ± 0.31 ml/s) or incongruent with the amount eaten (*M* = 0.96 ± 0.36 ml/s; *F*(1, 72) = 0.78, *p* = .38, *η*~*p*~^*2*^ = .01). However, the main effect of amount eaten (300ml or 500ml) was qualified by an interaction with the type of food eaten (tomato soup or custard), (*F*(1, 72) = 4.47, *p* = .04; *η*~*p*~^*2*^ = .06). Tukey\'s *post hoc* tests (critical difference at 5% = 0.25 and 1% = 0.30) revealed that 300ml of tomato soup was eaten at a significantly slower rate than a 500ml portion (mean difference = 0.35, *p* \< .001, Cohen's *d* = 0.93). By contrast, 300ml of custard was eaten at a similar rate as a 500ml portion (mean difference = 0.07, Cohen's *d* = 0.29). We also found that a 500ml portion of tomato soup was eaten at a significantly faster rate than a 500ml portion of custard (mean difference = 0.29, Cohen's *d* = 0.94). Conversely, there was no difference in eating rate between the 300ml portion of tomato soup and the 300ml portion of custard (mean difference = 0.01, Cohen's *d* = 0.03). This interaction is theoretically uninteresting and probably reflects differences in the viscosity of the two foods. Importantly, the main effect of amount eaten (300ml or 500ml) was also qualified by an interaction with amount seen (congruent and incongruent) (See [Fig 2](#pone.0147603.g002){ref-type="fig"}, *F*(1, 72) = 5.92, *p* = .02, *η*~*p*~^*2*^ = .08). Note that our analysis of meal durations yielded a very similar and significant F ratio for this interaction, (*F*(1, 72) = 6.06, *p* = .02, *η*~*p*~^*2*^ = .08).
{#pone.0147603.g002}
Tukey's *post hoc* tests (critical difference at 5% = 0.25 and 1% = 0.30) revealed that participants who saw 300ml but actually consumed 500ml ate at a significantly faster rate than participants who saw 500ml but consumed 300ml (mean difference = 0.37, *p* \< .001, Cohen's *d* = 1.19). By contrast, eating rate for the 300ml and 500ml portions was not different when the amount consumed was congruent with the amount seen (mean difference = 0.04, Cohen's *d* = 0.14). Participants who saw 300ml but consumed 500ml ate at a faster rate than those who saw 500ml and consumed 500ml. However, this effect failed to reach statistical significance (mean difference = 0.22, Cohen's *d* = 0.68). Similarly, participants who saw 500ml but consumed 300ml ate at a slower rate than those who saw 300ml and ate 300ml but again this did not reach the criteria for significance (mean difference = 0.10, Cohen's *d* = 0.34). Both the interaction between amount seen (congruent or incongruent) and type of food eaten (tomato soup or custard) (*F*(1, 72) = 0.47, *p* = .50, *η*~*p*~^*2*^ = .01) and the three-way interaction between type of food eaten, amount eaten and amount seen (*F*(1, 72) = 1.81, *p* = .18, *η*~*p*~^*2*^ = .03), failed to reach significance.
Fullness {#sec015}
--------
Consumption of custard was associated with greater fullness than consumption of soup, both immediately after eating (*F*(1, 72) = 7.60, *p* = .007, *η*~*p*~^*2*^ = .10) and for up to one hour after meal termination (*F*(1, 72) = 6.49, *p* = .01, *η*~*p*~^*2*^ = .08). [Fig 3](#pone.0147603.g003){ref-type="fig"} shows the means and associated standard errors for fullness composite scores immediately after eating (Panel A) and satiety scores (AUC; Panel B) in each condition, separately. Irrespective of food type, participants reported greater fullness at the end of the meal if they had consumed the 500ml portion compared to participants who had eaten the 300ml portion (*F*(1, 72) = 5.08, *p* = .03, *η*~*p*~^*2*^ = .07). A similar trend was observed in our measure of satiety; participants reported greater satiety up to 60 minutes after eating the 500ml portion (*F*(1, 72) = 2.86, *p* = .10, *η*~*p*~^*2*^ = .04). There was no effect of the congruency of the amount seen with the amount eaten on fullness scores immediately after eating (*F*(1, 72) = .12, *p* = .73, *η*~*p*~^*2*^ = .002) or fullness AUC (*F*(1, 72) = .26, *p* = .61, *η*~*p*~^*2*^ = .004). In addition, the effect of congruence on fullness would be revealed by an interaction between amount seen (congruent or incongruent) with amount of food eaten (300ml or 500ml). However, this interaction was not significant, either immediately after eating (*F*(1, 72) = .04, *p* = .84, *η*~*p*~^*2*^ = .001) or for up to 60 minutes after eating (*F*(1, 72) = .33, *p* = .57, *η*~*p*~^*2*^ = .005). The interaction between amount seen and food eaten was also not significant immediately after eating (*F*(1, 72) = 2.40, *p* = .13, *η*~*p*~^*2*^ = .03) or 60 minutes later (*F*(1, 72) = 2.55, *p* = .12, *η*~*p*~^*2*^ = .03). There was also no significant interaction between amount eaten and food eaten immediately after eating (*F*(1, 72) = .33, *p* = .57, *η*~*p*~^*2*^ = .005) or 60 minutes later (*F*(1, 72) = 0.20, *p* = .66, *η*~*p*~^*2*^ = .003). Finally, the three-way interaction between amount seen, amount eaten and food eaten was not significant either immediately after eating (*F*(1, 72) = 2.91, *p* = .09, *η*~*p*~^*2*^ = .04) or 60 minutes after eating (*F*(1, 72) = 1.42, *p* = .24, *η*~*p*~^*2*^ = .02).
{#pone.0147603.g003}
Discussion {#sec016}
==========
Previously, eating rate has been thought to be governed by the physical properties of a food \[[@pone.0147603.ref004], [@pone.0147603.ref030], [@pone.0147603.ref031]\], and by changes in hunger \[[@pone.0147603.ref024], [@pone.0147603.ref025]\] and food palatability \[[@pone.0147603.ref028], [@pone.0147603.ref029]\]. Our data suggest that eating rate (averaged across the meal) is also affected by within-meal monitoring of the amount of food consumed based on visual feedback. Specifically, we found that eating rate was unaffected by the volume (300ml or 500ml) of food consumed in the two congruent conditions. However, when we introduced a mismatch between meal size and perceived volume (the two incongruent conditions) then participants moderated their eating rate. When offered a small portion in apparently larger volume participants ate at a slower rate than they did when offered an apparently small portion in a larger volume. It is as if either consciously or unconsciously, our participants observed the portion disappear faster or slower than ideal and tempered their rate of eating accordingly. Under normal circumstances (*i*.*e*., in our congruent conditions) we may be unaware of this proactive metering of eating rate. It is only by 'tricking' the system (in this case, using a refilling/draining soup bowl) that this cognitive process is exposed. In the present study, we assessed average eating rate across the meal by dividing quantity consumed (ml) by meal duration (s). While this methodology is commonly employed to assess the relationship between eating rate and energy intake \[[@pone.0147603.ref002]\], we recognize that, in future it might be instructive to include continuous assessments of eating rate and other oral-processing behaviours throughout a meal. If the effect that we have observed is driven by participants implicitly or explicitly noticing that the bowl is emptying quicker or slower than ideal then we would predict that the difference in eating rate should become evident as the meal progresses rather than at the beginning of a meal.
The prospect that visual feedback plays this role in moderating eating rate has not been observed or considered previously. In a previous study in our lab \[[@pone.0147603.ref033]\], participants were asked to consume tomato soup through a self- refilling/draining soup bowl apparatus. A 2 (amount seen; 300ml or 500ml) x 2 (amount eaten; 300ml or 500ml) between-subjects design was employed (25 participants in each condition). As a control measure, meal duration was recorded using an identical methodology to the present study (self-timed by the participant). To evaluate whether our effects are robust, we decided to conduct a *post-hoc* re-analysis of this existing dataset. We observed a consistent pattern of results. Specifically, participants ate at a faster rate when confronted with the larger portion, *F*(1, 94) = 22.79, *p* \< .001, *η*~*p*~^*2*^ = .20. On average, participants ate faster in the incongruent conditions, *F*(1, 94) = 4.86, *p* = .03, *η*~*p*~^*2*^ *=* .05. However, the main effect of amount eaten (300ml versus 500ml) was also qualified with a significant interaction with amount seen (congruent and incongruent) (*F*(1, 94) = 8.27, *p* = .005, *η*~*p*~^*2*^ = .081). Tukey--Kramer *post hoc* tests revealed that participants who saw 300ml but actually consumed 500ml ate at a significantly faster rate (M = 1.70 ml / s, *S*.*D*. = 0.60) than participants who saw 500ml but consumed 300ml (M = 0.99 ml / s, *S*.*D*. = 0.42; critical difference at 5% = 0.34 and 1% = 0.42). By contrast, eating rate for the 300ml (M = 1.05 ml / s, *S*.*D*. = 0.43) and 500ml (M = 1.23 ml / s, *S*.*D*. = 0.33) portions was not different when the amount consumed was congruent with the amount seen (critical difference at 5% = 0.34 and 1% = 0.41). Consistent with the trend observed in this study, eating rate for the 500ml portion was significantly faster in the incongruent condition (M = 1.69 ml / s, *S*.*D*. = 0.60) relative to the congruent condition (M = 1.23 ml / s, *S*.*D*. = 0.33; critical difference at 5% = 0.34 and 1% = 0.41). This 'retrospective replication' provides reassurance that the effect of visual feedback on eating rate is robust across different pools of participants.
Our findings are also consistent with recent evidence that glass shape affects the rate of consumption of alcoholic beverages \[[@pone.0147603.ref032]\]. In this study, beer was served in either a straight sided or a curved glass. A psychophysical procedure demonstrated that participants underestimated the half-way point, and this was the case to a greater extent in the curved glass than the straight-sided glass. In an intake test the participants took 60% longer to consume the beer from the straight glass. The authors attribute this effect to a perceptual bias--participants titrated their drinking based on perceptual judgments of volume. When these are distorted, then drinking rate is affected. Future research should explore the extent to which food container shape (*e*.*g*., the angle of different bowls with the same volume) can elicit a similar perceptual bias and affect eating rate for a fixed portion of food. The authors also note that the same effect of glass size on drinking rate was not observed when the protocol was repeated using a non-alcoholic beverage. In this study, social alcohol consumers were recruited and we suspect that they prized the opportunity to consume alcohol over a non-alcoholic beverage. Although this explanation is speculative, it is consistent with the observation that participants in the beer conditions demonstrated a greater subjective craving than participants in the soft drink conditions. This may be important, because it suggests that rate of ingestion is governed by visual information, but only when a food or beverage has a high valence. One possibility is that the tendency to consume a valued food slowly reflects an active process of 'reward metering' that serves to prolong the experience of eating in order to maximize the pleasure that is experienced throughout a meal. Eating quickly may be very pleasurable, but only over a short period. Eating too slowly achieves the converse. It is in this context that we envisage the 'ideal' eating rate that we allude to earlier. If correct, then we would expect to see greater effects of our manipulation in foods that have higher value, either by dint of their sensory-affective characteristics or maybe even their monetary value. An alternative to reward metering is that eating rate increased in response to a concern that the test meal would not be finished 'on time.' This assumes that people have prior beliefs about the appropriate duration of a specific meal and that they use this to guide their eating behaviour. For now, we are unable to distinguish between these alternative accounts.
Although not the primary focus of our study, we were surprised that the interaction between amount eaten (300ml versus 500ml) and amount seen (congruent versus incongruent) on eating rate was not mirrored in fullness ratings at the end of the meal. Satiation was similar irrespective of whether our participants ate a 500ml meal quickly (seeing 300ml) or at a 'normal' rate (seeing 500ml). Likewise, eating a 300ml meal slower than normal (seeing 500ml) had little effect on rated fullness. Previously, a clear association has been observed between eating rate and satiation \[[@pone.0147603.ref002]\]. However, these studies have tended to explore effects of eating rate by instructing participants to consume a single food faster or slower, or by modifying the texture of food \[[@pone.0147603.ref001]--[@pone.0147603.ref003]\]. In relation to this difference, it is perhaps worth noting that these manipulations generate a large difference in eating rate across conditions, typically around 60% (grams / minute; range: 17 to 143%) \[[@pone.0147603.ref002]\]. By contrast, a 38% difference was observed across the two incongruent conditions.
In addition, our decision to use semi-solid foods reflected practical limitations around the use of solid foods in combination with a peristaltic pump. A potential concern is that this choice of test food compromised our opportunity to expose a causal relationship between eating rate and satiation. Consistent with previous evidence \[[@pone.0147603.ref036]\], our semi-solid foods were consumed very quickly (approximately 7.5 minutes). The largest effect of incongruence was observed when the participants ate 500ml portions. In absolute terms this extended the meal by approximately 60 seconds. We suspect this was insufficient to generate a meaningful difference in satiation. In future, studies might explore ways to maximize the effects of incongruence on meal duration and reward metering, possibly by issuing a larger meal and/or by slowing eating rate by using a solid food form that requires mastication and bolus formation.
Supporting Information {#sec017}
======================
###### Statistical values associated with the analyses of baseline measures and participant characteristics.
(DOCX)
######
Click here for additional data file.
[^1]: **Competing Interests:**Nicolas Godinot and Nathalie Martin are employed by Nestlé Research Centre (co-funders of this work). There are no patents, products in development, or marketed products to declare. Nestlé Research Centre imposed no restrictions on the design, implementation, analysis, or interpretation of the data. This does not alter the authors\' adherence to all the PLOS ONE policies on sharing data and materials, as detailed online in the guide for authors. All other co-authors declare no conflicts of interest.
[^2]: Conceived and designed the experiments: LLW DF MLB NG NM PJR JMB. Performed the experiments: LLW. Analyzed the data: LLW DF MLB JMB. Wrote the paper: LLW DF MLB JMB. Provided critical revisions to the manuscript and approved the final version prior to submission: LLW DF MLB NG NM PJR JMB.
[^3]: Current address: Department of Psychology, Swansea University, Swansea, United Kingdom
[^4]: ‡ These authors are joint first authors on this work.
|
Q:
How to use FloatingPoint generic type for Float/Double
I'd like to make the function below work both with Float and Double values:
func srgb2linear(_ S: Float) -> Float {
if S <= 0.04045 {
return S / 12.92
} else {
return pow((S + 0.055) / 1.055, 2.4)
}
}
The Swift 4 Documentation says that what I need is a FloatingPoint generic, to represent both Float and Double classes, like:
func srgb2linear<T: FloatingPoint>(_ S: T) -> T
However when I try to do this, it doesn't compile with the following errors:
Error: binary operator '<=' cannot be applied to operands of type 'T' and 'Double'
Error: binary operator '/' cannot be applied to operands of type 'T' and 'Double'
Error: binary operator '+' cannot be applied to operands of type 'T' and 'Double'
How is it possible that for a generic representing floating point numbers such operators are not implemented? And if not like this, how can I write this function in Swift?
A:
One problem is that FloatingPoint is not a subprotocol of ExpressibleByFloatLiteral, so your floating-point literals cannot necessarily be converted to T. You can solve this either by changing FloatingPoint to BinaryFloatingPoint (which is a subprotocol of ExpressibleByFloatLiteral) or by adding ExpressibleByFloatLiteral as a separate requirement.
Then you will run into the problem that there is no pow function that is generic over FloatingPoint, and no member of FloatingPoint or BinaryFloatingPoint that performs exponentiation. You can solve this by creating a new protocol and conforming the existing floating-point types to it:
protocol Exponentiatable {
func toPower(_ power: Self) -> Self
}
extension Float: Exponentiatable {
func toPower(_ power: Float) -> Float { return pow(self, power) }
}
extension Double: Exponentiatable {
func toPower(_ power: Double) -> Double { return pow(self, power) }
}
extension CGFloat: Exponentiatable {
func toPower(_ power: CGFloat) -> CGFloat { return pow(self, power) }
}
Note that there is also a Float80 type, but the standard library doesn't provide a pow function for it.
Now we can write a working generic function:
func srgb2linear<T: FloatingPoint>(_ S: T) -> T
where T: ExpressibleByFloatLiteral, T: Exponentiatable
{
if S <= 0.04045 {
return S / 12.92
} else {
return ((S + 0.055) / 1.055).toPower(2.4)
}
}
|
Start Date: 12/19/01; HourAhead hour: 5; No ancillary schedules awarded. No variances detected.
LOG MESSAGES:
PARSING FILE -->> O:\Portland\WestDesk\California Scheduling\ISO Final Schedules\2001121905.txt |
Analgesic and antiinflammatory properties of vitamins.
A number of various mechanisms are prone to develop pain symptomatology. Among them infection, inflammation, degeneration, metabolic deviations, and traumas may be at the origin of complex reactions currently gathered under the terminology "rheumatism." For some time now, practitioners have introduced vitamins in the array of their antalgic supply; these were mainly vitamins of the B-group. Meanwhile research has enlarged knowledge about the oxidative mechanisms that are at the origin of inflammation, and has suggested the use of antioxidant substances, among them 9 vitamins. Finally, most of the antalgic drugs used for relief of pains have prooxidative effects, which in turn should be controlled by antioxidant substances. These different interrelations are discussed within the limits of the field of vitamins. |
Q:
javascript use requestAnimationFrame to define both size and color
I wanted my program to create a circle that shrinks until it disappears. The circle should do this in an infinite loop while changing colors(from a starting color to and ending color). The circle works fine but to make the color effects I changed my code, now it only do it a few times while changing colors really fast and then the animation disappears and I don't understand why. The code is unfinished but I needed help to know why can't it change colors while animating the circle. Here's the most recent code:
<script>
var mainCanvas = document.getElementById("myCanvas");
var mainContext = mainCanvas.getContext('2d');
var canvasWidth = mainCanvas.width;
var canvasHeight = mainCanvas.height;
var angle = 0;
var color='#006699';
//var colorend='#000000';
var steps=100;
var requestAnimationFrame = window.requestAnimationFrame ||
window.mozRequestAnimationFrame ||
window.webkitRequestAnimationFrame ||
window.msRequestAnimationFrame;
function main(){
var interval = setInterval(function () {
drawCircle();
changeColor();
}, 10);//if i change to a larger value the animation dosen't show
}
function changeColor(){
var hexc = color.substring(1);
var decimalc = parseInt(hexc, 16);
decimalc=decimalc-steps;
hexc = decimalc.toString(16);
color= '#'.concat(hexc);
mainContext.fillStyle = color;
mainContext.fill();
}
function drawCircle() {
mainContext.clearRect(0, 0, canvasWidth, canvasHeight);
// color in the background
mainContext.fillStyle = "#EEEEEE";
mainContext.fillRect(0, 0, canvasWidth, canvasHeight);
// draw the circle
mainContext.beginPath();
var radius = 10 * Math.abs(Math.cos(angle));
mainContext.arc(225, 225, radius, 0, Math.PI * 2, false);
mainContext.closePath();
// color in the circle
mainContext.fillStyle = color;
mainContext.fill();
angle += Math.PI / 40;
if(radius<=0.1){
return;//exit animation
}
requestAnimationFrame(drawCircle);
}
main();
</script>
A:
You need to evalute color by separate bytes, not by sum
colorRange={
create: function(a,b){
var o = Object.create(this);
o.a = a.split('').slice(1);
o.b = b.split('').slice(1);
var i;
for(i=0 ; i<3 ; ++i){
o.a[i] = parseInt( o.a[i], 16 );
o.b[i] = parseInt(o.b[i], 16) - o.a[i];
}
return o;
},
get: function(f){ // f is 0..1 color factor
var n=0;
return "#"+('00'+(
+((this.a[n] + this.b[n++]*f) >> 0)
+( ( this.a[n] + this.b[n]*f) << (n++*4) )
+( ( this.a[n] + this.b[n]*f) << (n*4) )
).toString(16)).slice(-3);
},
};
var mainCanvas = document.getElementById("myCanvas");
var mainContext = mainCanvas.getContext('2d');
var canvasWidth = mainCanvas.width;
var canvasHeight = mainCanvas.height;
var angle = 0;
var steps=100;
var requestAnimationFrame = window.requestAnimationFrame ||
window.mozRequestAnimationFrame ||
window.webkitRequestAnimationFrame ||
window.msRequestAnimationFrame;
function main(){
q = colorRange.create('#f00', '#00f');
var x=0;
var interval = setInterval(function () {
x += 1/16;
//drawCircle();
mainContext.fillStyle = q.get(Math.min(x,1));
mainContext.arc(50,50, 20, 0,Math.PI*2, 0);
mainContext.fill();
changeColor();
}, 200);//if i change to a larger value the animation dosen't show
}
function changeColor(){
var hexc = color.substring(1);
var decimalc = parseInt(hexc, 16);
decimalc=decimalc-steps;
hexc = decimalc.toString(16);
color= '#'.concat(hexc);
mainContext.fillStyle = color;
mainContext.fill();
}
main();
Work sample of your code http://jsfiddle.net/b4zuY/1/
Sorry for my english
|
Theresa May’s claims over the Government’s record on school funding were immediately and embarrassingly contradicted by one of her own MPs at PMQs.
Labour leader Jeremy Corbyn asked the Prime Minister why the Government is giving “tax giveaways to the richest corporations while our children’s schools are starved” – pointing out some schools have resorted to sending out letters to parents begging for extra cash.
In response, May said: “There are record levels of funding going into schools.”
But only moments after she had finished her exchanged with Corbyn, Tory MP Michelle Donelan stood up to demand more money for schools in her constituency.
“For years I’ve been campaigning for fairer funding in Wiltshire schools. Will the Prime Minister please re-affirm her commitment to this?”
In reality, the Institute for Fiscal Studies says that English schools are facing the biggest funding cuts since Thatcher was in Downing Street.
The PM might have a problem on the campaign trail if she can’t even get Tory MPs to buy her spin… |
| 创建人 | 知乎论文阅读专栏 | 个人博客 | 其他相关链接 |
| ---- | ---- | ---- | ---- |
| ming71 | [论文笔记入口](https://zhuanlan.zhihu.com/c_1113860303082704896) | [chaser](https://ming71.github.io/) | [CSDN](https://blog.csdn.net/mingqi1996)
<span id="inline-blue">论文发布日期:2018 [CVPR]<p/span>
## 1. Motivation
* 提出问题:
  <u>提出不同尺度特征图的感受野固定的问题(和TridentNet的角度类似)</u>,相比真实世界的目标尺度变化,固定感受野特征图出现了<font color=red>**inconsistency**</font>的问题(也可以理解为特征图固定的感受野无法很好match真实多尺度变化的物体);
  指出FPN类的问题:融合全部特征,时间开销大。(很多文章论述FPN缺点都会说这个,但是实际性能上问题也是有短板的,如大目标检测的tradeoff,应该还有,可以思考一下 )(作者提到了<u>all scale的融合方式</u>,但是没有质疑这样对不对,我觉得这其中**是有问题的**!参考NAS-FPN就知道了,这个地方能做工作)
<!-- more -->
* 个人思考:
  这个问题一直都是检测的难点,就目前我所了解的来看,有两种思路和路线:
  (1)<u>**从特征角度改进**</u>。主要是探索更好表达能力的特征,使特征表示能够应对尺度的变化,如FPN,TDM等,使不同尺度特征图本身能够更好融合多尺度特征的不同语义信息。
  (2)<u>**从感受野角度改进**</u>。主要着眼于解决特征图和多尺度目标的inconsistency问题,核心多是剑指anchor,如当下很火的各种anchor-free框架,或者是anchor特征选择上采取自适应融合的PANet;思路比较有趣的是TridentNet,摆脱FPN从感受野上设计多分支提取多尺度特征(至于效果...不见得那么神奇,不过思路值得赞一下)
## 2. Related work
  这部分有两点值得关注和思考。
* 多尺度信息融合方式讨论。
  目前像yolov3,DenseNet,MS RCNN用的都是concat,即便是DSSD说product好,他也只是和sum比较,没做concat的实验(已经很慢了,没法concat了)。综合来看,<u>concat融合的效果肯定是最好的</u>。那么有个问题:concat引入额外的学习参数,所以效果更好,这是一种解释,那么真的只是参数多的量变吗?其中会不会有什么质变,也就是简单的参数引入背后能达到怎样的改变数据分布的效果?(当然也不用抱太大希望给,TDM能学的很多了,也没产生惊世骇俗的效果,虽然和他单层预测也许有关系)大道至简,这一点可以思考一下。
* **浅层信息不能单独使用的思考**。
  说玄乎点,就是高层信息的抽象语义很关键,可以进行检测分类等,而浅层的信息虽然定位信息多,但是没有语义信息,导致网络还不知道这些东西到底是干什么的;所以单独用高层特征可以做一些工作,而单独用底层特征就不行了;这也印证了FPN的top-down合理性(将必要的高层信息向下传播)。我自己做的自适应实验也发现这个问题,网络会自动搜索高级特征图,而不会怎么会向下搜索。
  说简单点,很好理解,浅层就好使了,要那么深的网络干吗??所以单独用浅层必然不行,高层才是正解,但是结合起来有额外好处(也有坏处,如FPN的大尺度问题)
## 3. Scale-Transferrable Detection Network
<center><img src="http://chaserblog.test.upcdn.net/blogs/paper/STDN/net.png" alt="" style="width:100%"/></center>
  先简单说一下网络结构。采用的是DenseNet-169作backbone,取其最后一个block作为特征组合基础;选取其中某一层的输入作为基准直接当做单位1的特征图,比他小的特征图生成方式是采用上面层的输入作max/mean pooling,比他大的特征图生成采取后面更深的特征图进行通道展平,相当于reshape的操作得到。(参加下图最后一张,倒数第二层为基准层,最高一层为reshape得到的大尺度图。)然后每个尺度进行anchor-based检测分类和回归。
<center><img src="http://chaserblog.test.upcdn.net/blogs/paper/STDN/str1.png" alt="" style="width:70%"/></center>
### 3.1 Base Network : DenseNet
<center><img src="http://chaserblog.test.upcdn.net/blogs/paper/STDN/str2.png" alt="" style="width:100%"/></center>
#### 3.1.1 DenseNet回顾
  先回顾一下DenseNet的部分知识,很有必要,之前论文看的不仔细,导致在这里重新看了半天DenseNet。明确一下几个观点:
* growth rate:设置一个block内的每层输出通道数,本文的DenseNet-169为32,意味着每个层输出都是32通道
* block内输入:输入通道数是k0+(l-1)*growth rate,因为组合特征的方式是concat所以越往后输入通道越多。
* bottlenecks:DenseNet-169一个block内设置了32个bottlenecks,其中的1*1卷积会对输入的超厚特征图进行通道压缩为32.
#### 3.1.2 DenseNet-169
  结合上面结构图,DBstage4_concat5意思是第五个bottlenecks,这里是800层,可以推断其输入叠加了前面五个层共计32x5=160,也就是说初始输入到本block的k0=800-160=640,结合论文给的结构图来看确实如此(Denseblock4的输入是640x9x9)。最后的输出是DBstage4_concat32为1664x9x9,结合了前面的32x32+660=1664.
  提一句,上面的网络结构图只展示了最后一个block,但是实际上前面还有其他block进行融合和压缩的。
#### 3.1.3 改动
  在backbone上将原来的输入7x7/2卷积层+3x3/2最大值池化替换为3x3/2卷积+3x3/1卷积+3x3/1卷积+2x2/2均值池化。经过实验发现这样的改进效果非常好,涨点很明显。
  **思考和分析**:
* 作者的观点:
  连续的两次下采样会导致大量的信息坍缩和丢失,而在其间插入卷积进行信息重组有利于缓和这种信息丢失。<u>中心思想是网络层之间要避免过度急剧的特征压缩(参数减少)</u>。这个观点在inceptionv2也提出过。
* 我的理解:
  还有可能是因为输入是300x300的小尺度特征图,采用7x7大感受野可能从一开始就造成了尺度mismatch的问题。即:如果按照thundenet模型320x320输入的标准,DenseNet也应该算小模型了,所以输入自然要小,而感受野也不应该选大才对,ThunderNet就用的3x3,所以这里也许小卷积核比较合适。
【<u>注意一个区别</u>:DenseNet内存占用大,但是参数少模型小,两者不矛盾!因为是相同的特征concat所以内存消耗大,但是参数是一样的】
#### 3.1.4 Backbone的分析
  选择DenseNet是STDN展开的核心。全部工作都基于<u>一个DenseNet的假设上进行:DenseNet具有很好的多尺度特征复用能力,因此可以直接选择最后一个block进行多尺度特征构建</u>。这个假设持保留意见(<u>我认为还是存在inconsistency的问题,作者并没有解决</u>),有机会再review原paper再作答(~~如果记得起来~~),但是需要明确的是,这个观点是大前提。
<center><img src="http://chaserblog.test.upcdn.net/blogs/paper/STDN/str3.png" alt="" style="width:50%"/></center>
### 3.2 High Efficiency Scale-Transfer Module
  该模块用于在denseblock内生成大尺度特征图。结合上图和最开始的网络结构图分析,以最后一层1664通道的4x特征图为例,1x特征图是直接利用denseblock内的第20个bottleneck输入:1280x9x9,那么4x特征图大小应为36x36,所以将1664分成1664/32=104份,每份一组厚度36(和R-FCN位置敏感特征图很像),该36x9x9的一份通过reshape进行调整成为1x36x36即可。
  其它大尺度层类似处理,而小尺度特征图就很简单了直接在对应位置进行池化降采样,得到不同尺度的特征图,然后分配anchor进行检测。可见整个过程没有数学插值运算或者转置卷积,所以不引入额外的计算开销,速度快,但是也完全依赖DenseNet本身的特征,即上面提到的前提假设。
## 4. Experiment
  实验没什么好说的,作者也没公布具体和ssd比的时候怎么修改的结构,所以看不出到底能差多少,毕竟傍上了DenseNet这个大腿,效果不会太差。比较值得关注的是,stem block将大尺度7x7卷积核和连续下采样换成3x3分别下采样后涨点不少,至于到底是那个原因可以试验分析一下。
  速度来看还可以,有单阶段检测器的样子,但是看tradeoff效果,其实并没有太多的提升,也可以说有一点平平无奇。
## Conclusion
我是没有太get到这篇文章实质性的intuition,只说说个人的感受。
* **提到了固定感受野特征图面对多尺度物体的inconsistency问题**(但是没解决)
* 利用DenseNet的优良性能,采用一种巧妙的方式在不增加额外计算前提下生成了大尺度的特征图。(该方法往往用于SR任务中)
* <u>**前面的个人分析总结和思考比这篇论文更重要**</u>
<br>
<hr /> |
Doubled full shot noise in quantum coherent superconductor-semiconductor junctions.
We performed low temperature shot noise measurements in superconductor (TiN) strongly disordered normal metal (heavily doped Si) weakly transparent junctions. We show that the conductance has a maximum due to coherent multiple Andreev reflections at low energy and that the shot noise is then twice the Poisson noise (S = 4eI). When the subgap conductance reaches its minimum at finite voltage the shot noise changes to the normal value (S = 2eI) due to a large quasiparticle contribution. |
Attention Joseph Isitt, last heard of in 1995
Joseph, In 1995 you wrote to my late father, George Julian Isitt, asking if he could help you with your research into the Isitt family.He replied that he was unable to help as his father died when he (my father) was an infant and he had no knowledge of any Isitt relations. I remember your name but have lost your letter and your address. I wonder if you have any knowledge of my paternal grandfather and ggf - please see my message entitled "George Isitt - Ship's Cook".If so, I should be pleased to hear from you. |
/**
******************************************************************************
* @file : main.c
* @brief : Main program body
******************************************************************************
* This notice applies to any and all portions of this file
* that are not between comment pairs USER CODE BEGIN and
* USER CODE END. Other portions of this file, whether
* inserted by the user or by software development tools
* are owned by their respective copyright owners.
*
* Copyright (c) 2018 STMicroelectronics International N.V.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted, provided that the following conditions are met:
*
* 1. Redistribution of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
* 3. Neither the name of STMicroelectronics nor the names of other
* contributors to this software may be used to endorse or promote products
* derived from this software without specific written permission.
* 4. This software, including modifications and/or derivative works of this
* software, must execute solely and exclusively on microcontroller or
* microprocessor devices manufactured by or for STMicroelectronics.
* 5. Redistribution and use of this software other than as permitted under
* this license is void and will automatically terminate your rights under
* this license.
*
* THIS SOFTWARE IS PROVIDED BY STMICROELECTRONICS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS, IMPLIED OR STATUTORY WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
* PARTICULAR PURPOSE AND NON-INFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY
* RIGHTS ARE DISCLAIMED TO THE FULLEST EXTENT PERMITTED BY LAW. IN NO EVENT
* SHALL STMICROELECTRONICS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
* OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
******************************************************************************
*/
/* Includes ------------------------------------------------------------------*/
#include "main.h"
#include "stm32l4xx_hal.h"
/* USER CODE BEGIN Includes */
/* USER CODE END Includes */
/* Private variables ---------------------------------------------------------*/
ADC_HandleTypeDef hadc1;
ADC_HandleTypeDef hadc2;
ADC_HandleTypeDef hadc3;
DCMI_HandleTypeDef hdcmi;
DFSDM_Channel_HandleTypeDef hdfsdm1_channel1;
DFSDM_Channel_HandleTypeDef hdfsdm1_channel2;
I2C_HandleTypeDef hi2c1;
I2C_HandleTypeDef hi2c2;
UART_HandleTypeDef hlpuart1;
UART_HandleTypeDef huart1;
UART_HandleTypeDef huart2;
DMA_HandleTypeDef hdma_lpuart_rx;
DMA_HandleTypeDef hdma_lpuart_tx;
QSPI_HandleTypeDef hqspi;
SAI_HandleTypeDef hsai_BlockA1;
SAI_HandleTypeDef hsai_BlockB1;
SD_HandleTypeDef hsd1;
SPI_HandleTypeDef hspi1;
SPI_HandleTypeDef hspi2;
SRAM_HandleTypeDef hsram1;
SRAM_HandleTypeDef hsram2;
/* USER CODE BEGIN PV */
/* Private variables ---------------------------------------------------------*/
/* USER CODE END PV */
/* Private function prototypes -----------------------------------------------*/
void SystemClock_Config(void);
void MX_GPIO_Init(void);
void MX_DMA_Init(void);
static void MX_ADC1_Init(void);
static void MX_ADC2_Init(void);
static void MX_ADC3_Init(void);
static void MX_DCMI_Init(void);
static void MX_DFSDM1_Init(void);
static void MX_FMC_Init(void);
static void MX_I2C1_Init(void);
static void MX_I2C2_Init(void);
static void MX_LPUART1_UART_Init(void);
static void MX_USART1_UART_Init(void);
static void MX_USART2_UART_Init(void);
static void MX_QUADSPI_Init(void);
static void MX_SAI1_Init(void);
static void MX_SDMMC1_SD_Init(void);
static void MX_SPI1_Init(void);
static void MX_SPI2_Init(void);
/* USER CODE BEGIN PFP */
/* Private function prototypes -----------------------------------------------*/
/* USER CODE END PFP */
/* USER CODE BEGIN 0 */
/* USER CODE END 0 */
/**
* @brief The application entry point.
*
* @retval None
*/
/**
* @brief This function handles DMA1 channel4 global interrupt.
*/
void DMA2_Channel6_IRQHandler(void)
{
krhino_intrpt_enter();
USART_DMA_TX_IRQHandler(LPUART1);
krhino_intrpt_exit();
}
/**
* @brief This function handles DMA1 channel5 global interrupt.
*/
void DMA2_Channel7_IRQHandler(void)
{
krhino_intrpt_enter();
USART_DMA_RX_IRQHandler(LPUART1);
krhino_intrpt_exit();
}
/**
* @brief System Clock Configuration
* @retval None
*/
void SystemClock_Config(void)
{
RCC_OscInitTypeDef RCC_OscInitStruct;
RCC_ClkInitTypeDef RCC_ClkInitStruct;
RCC_PeriphCLKInitTypeDef PeriphClkInit;
/**Configure LSE Drive Capability
*/
HAL_PWR_EnableBkUpAccess();
__HAL_RCC_LSEDRIVE_CONFIG(RCC_LSEDRIVE_LOW);
/**Initializes the CPU, AHB and APB busses clocks
*/
RCC_OscInitStruct.OscillatorType = RCC_OSCILLATORTYPE_LSE|RCC_OSCILLATORTYPE_MSI;
RCC_OscInitStruct.LSEState = RCC_LSE_ON;
RCC_OscInitStruct.MSIState = RCC_MSI_ON;
RCC_OscInitStruct.MSICalibrationValue = 0;
RCC_OscInitStruct.MSIClockRange = RCC_MSIRANGE_9;
RCC_OscInitStruct.PLL.PLLState = RCC_PLL_ON;
RCC_OscInitStruct.PLL.PLLSource = RCC_PLLSOURCE_MSI;
RCC_OscInitStruct.PLL.PLLM = 5;
RCC_OscInitStruct.PLL.PLLN = 71;
RCC_OscInitStruct.PLL.PLLP = RCC_PLLP_DIV2;
RCC_OscInitStruct.PLL.PLLQ = RCC_PLLQ_DIV2;
RCC_OscInitStruct.PLL.PLLR = RCC_PLLR_DIV6;
if (HAL_RCC_OscConfig(&RCC_OscInitStruct) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Initializes the CPU, AHB and APB busses clocks
*/
RCC_ClkInitStruct.ClockType = RCC_CLOCKTYPE_HCLK|RCC_CLOCKTYPE_SYSCLK
|RCC_CLOCKTYPE_PCLK1|RCC_CLOCKTYPE_PCLK2;
RCC_ClkInitStruct.SYSCLKSource = RCC_SYSCLKSOURCE_PLLCLK;
RCC_ClkInitStruct.AHBCLKDivider = RCC_SYSCLK_DIV4;
RCC_ClkInitStruct.APB1CLKDivider = RCC_HCLK_DIV1;
RCC_ClkInitStruct.APB2CLKDivider = RCC_HCLK_DIV1;
if (HAL_RCC_ClockConfig(&RCC_ClkInitStruct, FLASH_LATENCY_0) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
PeriphClkInit.PeriphClockSelection = RCC_PERIPHCLK_USART1|RCC_PERIPHCLK_USART2
|RCC_PERIPHCLK_LPUART1|RCC_PERIPHCLK_SAI1
|RCC_PERIPHCLK_I2C1|RCC_PERIPHCLK_I2C2
|RCC_PERIPHCLK_DFSDM1|RCC_PERIPHCLK_USB
|RCC_PERIPHCLK_SDMMC1|RCC_PERIPHCLK_ADC;
PeriphClkInit.Usart1ClockSelection = RCC_USART1CLKSOURCE_PCLK2;
PeriphClkInit.Usart2ClockSelection = RCC_USART2CLKSOURCE_PCLK1;
PeriphClkInit.Lpuart1ClockSelection = RCC_LPUART1CLKSOURCE_PCLK1;
PeriphClkInit.I2c1ClockSelection = RCC_I2C1CLKSOURCE_PCLK1;
PeriphClkInit.I2c2ClockSelection = RCC_I2C2CLKSOURCE_PCLK1;
PeriphClkInit.Sai1ClockSelection = RCC_SAI1CLKSOURCE_PLLSAI1;
PeriphClkInit.AdcClockSelection = RCC_ADCCLKSOURCE_PLLSAI1;
PeriphClkInit.Dfsdm1ClockSelection = RCC_DFSDM1CLKSOURCE_PCLK;
PeriphClkInit.UsbClockSelection = RCC_USBCLKSOURCE_PLLSAI1;
PeriphClkInit.Sdmmc1ClockSelection = RCC_SDMMC1CLKSOURCE_PLLSAI1;
PeriphClkInit.PLLSAI1.PLLSAI1Source = RCC_PLLSOURCE_MSI;
PeriphClkInit.PLLSAI1.PLLSAI1M = 5;
PeriphClkInit.PLLSAI1.PLLSAI1N = 20;
PeriphClkInit.PLLSAI1.PLLSAI1P = RCC_PLLP_DIV2;
PeriphClkInit.PLLSAI1.PLLSAI1Q = RCC_PLLQ_DIV2;
PeriphClkInit.PLLSAI1.PLLSAI1R = RCC_PLLR_DIV2;
PeriphClkInit.PLLSAI1.PLLSAI1ClockOut = RCC_PLLSAI1_SAI1CLK|RCC_PLLSAI1_48M2CLK
|RCC_PLLSAI1_ADC1CLK;
if (HAL_RCCEx_PeriphCLKConfig(&PeriphClkInit) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure the main internal regulator output voltage
*/
if (HAL_PWREx_ControlVoltageScaling(PWR_REGULATOR_VOLTAGE_SCALE1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure the Systick interrupt time
*/
HAL_SYSTICK_Config(HAL_RCC_GetHCLKFreq()/1000);
/**Configure the Systick
*/
HAL_SYSTICK_CLKSourceConfig(SYSTICK_CLKSOURCE_HCLK);
/**Enable MSI Auto calibration
*/
HAL_RCCEx_EnableMSIPLLMode();
/* SysTick_IRQn interrupt configuration */
HAL_NVIC_SetPriority(SysTick_IRQn, 0, 0);
}
/* ADC1 init function */
static void MX_ADC1_Init(void)
{
ADC_MultiModeTypeDef multimode;
ADC_ChannelConfTypeDef sConfig;
/**Common config
*/
hadc1.Instance = ADC1;
hadc1.Init.ClockPrescaler = ADC_CLOCK_ASYNC_DIV1;
hadc1.Init.Resolution = ADC_RESOLUTION_12B;
hadc1.Init.DataAlign = ADC_DATAALIGN_RIGHT;
hadc1.Init.ScanConvMode = ADC_SCAN_DISABLE;
hadc1.Init.EOCSelection = ADC_EOC_SINGLE_CONV;
hadc1.Init.LowPowerAutoWait = DISABLE;
hadc1.Init.ContinuousConvMode = DISABLE;
hadc1.Init.NbrOfConversion = 1;
hadc1.Init.DiscontinuousConvMode = DISABLE;
hadc1.Init.ExternalTrigConv = ADC_SOFTWARE_START;
hadc1.Init.ExternalTrigConvEdge = ADC_EXTERNALTRIGCONVEDGE_NONE;
hadc1.Init.DMAContinuousRequests = DISABLE;
hadc1.Init.Overrun = ADC_OVR_DATA_PRESERVED;
hadc1.Init.OversamplingMode = DISABLE;
if (HAL_ADC_Init(&hadc1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure the ADC multi-mode
*/
multimode.Mode = ADC_MODE_INDEPENDENT;
if (HAL_ADCEx_MultiModeConfigChannel(&hadc1, &multimode) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure Regular Channel
*/
sConfig.Channel = ADC_CHANNEL_4;
sConfig.Rank = ADC_REGULAR_RANK_1;
sConfig.SamplingTime = ADC_SAMPLETIME_2CYCLES_5;
sConfig.SingleDiff = ADC_SINGLE_ENDED;
sConfig.OffsetNumber = ADC_OFFSET_NONE;
sConfig.Offset = 0;
if (HAL_ADC_ConfigChannel(&hadc1, &sConfig) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* ADC2 init function */
static void MX_ADC2_Init(void)
{
ADC_ChannelConfTypeDef sConfig;
/**Common config
*/
hadc2.Instance = ADC2;
hadc2.Init.ClockPrescaler = ADC_CLOCK_ASYNC_DIV1;
hadc2.Init.Resolution = ADC_RESOLUTION_12B;
hadc2.Init.DataAlign = ADC_DATAALIGN_RIGHT;
hadc2.Init.ScanConvMode = ADC_SCAN_DISABLE;
hadc2.Init.EOCSelection = ADC_EOC_SINGLE_CONV;
hadc2.Init.LowPowerAutoWait = DISABLE;
hadc2.Init.ContinuousConvMode = DISABLE;
hadc2.Init.NbrOfConversion = 1;
hadc2.Init.DiscontinuousConvMode = DISABLE;
hadc2.Init.ExternalTrigConv = ADC_SOFTWARE_START;
hadc2.Init.ExternalTrigConvEdge = ADC_EXTERNALTRIGCONVEDGE_NONE;
hadc2.Init.DMAContinuousRequests = DISABLE;
hadc2.Init.Overrun = ADC_OVR_DATA_PRESERVED;
hadc2.Init.OversamplingMode = DISABLE;
if (HAL_ADC_Init(&hadc2) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure Regular Channel
*/
sConfig.Channel = ADC_CHANNEL_9;
sConfig.Rank = ADC_REGULAR_RANK_1;
sConfig.SamplingTime = ADC_SAMPLETIME_2CYCLES_5;
sConfig.SingleDiff = ADC_SINGLE_ENDED;
sConfig.OffsetNumber = ADC_OFFSET_NONE;
sConfig.Offset = 0;
if (HAL_ADC_ConfigChannel(&hadc2, &sConfig) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* ADC3 init function */
static void MX_ADC3_Init(void)
{
ADC_ChannelConfTypeDef sConfig;
/**Common config
*/
hadc3.Instance = ADC3;
hadc3.Init.ClockPrescaler = ADC_CLOCK_ASYNC_DIV1;
hadc3.Init.Resolution = ADC_RESOLUTION_12B;
hadc3.Init.DataAlign = ADC_DATAALIGN_RIGHT;
hadc3.Init.ScanConvMode = ADC_SCAN_DISABLE;
hadc3.Init.EOCSelection = ADC_EOC_SINGLE_CONV;
hadc3.Init.LowPowerAutoWait = DISABLE;
hadc3.Init.ContinuousConvMode = DISABLE;
hadc3.Init.NbrOfConversion = 1;
hadc3.Init.DiscontinuousConvMode = DISABLE;
hadc3.Init.ExternalTrigConv = ADC_SOFTWARE_START;
hadc3.Init.ExternalTrigConvEdge = ADC_EXTERNALTRIGCONVEDGE_NONE;
hadc3.Init.DMAContinuousRequests = DISABLE;
hadc3.Init.Overrun = ADC_OVR_DATA_PRESERVED;
hadc3.Init.OversamplingMode = DISABLE;
if (HAL_ADC_Init(&hadc3) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure Regular Channel
*/
sConfig.Channel = ADC_CHANNEL_13;
sConfig.Rank = ADC_REGULAR_RANK_1;
sConfig.SamplingTime = ADC_SAMPLETIME_2CYCLES_5;
sConfig.SingleDiff = ADC_SINGLE_ENDED;
sConfig.OffsetNumber = ADC_OFFSET_NONE;
sConfig.Offset = 0;
if (HAL_ADC_ConfigChannel(&hadc3, &sConfig) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* DCMI init function */
static void MX_DCMI_Init(void)
{
hdcmi.Instance = DCMI;
hdcmi.Init.SynchroMode = DCMI_SYNCHRO_HARDWARE;
hdcmi.Init.PCKPolarity = DCMI_PCKPOLARITY_FALLING;
hdcmi.Init.VSPolarity = DCMI_VSPOLARITY_LOW;
hdcmi.Init.HSPolarity = DCMI_HSPOLARITY_LOW;
hdcmi.Init.CaptureRate = DCMI_CR_ALL_FRAME;
hdcmi.Init.ExtendedDataMode = DCMI_EXTEND_DATA_8B;
hdcmi.Init.JPEGMode = DCMI_JPEG_DISABLE;
hdcmi.Init.ByteSelectMode = DCMI_BSM_ALL;
hdcmi.Init.ByteSelectStart = DCMI_OEBS_ODD;
hdcmi.Init.LineSelectMode = DCMI_LSM_ALL;
hdcmi.Init.LineSelectStart = DCMI_OELS_ODD;
if (HAL_DCMI_Init(&hdcmi) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* DFSDM1 init function */
static void MX_DFSDM1_Init(void)
{
hdfsdm1_channel1.Instance = DFSDM1_Channel1;
hdfsdm1_channel1.Init.OutputClock.Activation = ENABLE;
hdfsdm1_channel1.Init.OutputClock.Selection = DFSDM_CHANNEL_OUTPUT_CLOCK_SYSTEM;
hdfsdm1_channel1.Init.OutputClock.Divider = 2;
hdfsdm1_channel1.Init.Input.Multiplexer = DFSDM_CHANNEL_EXTERNAL_INPUTS;
hdfsdm1_channel1.Init.Input.DataPacking = DFSDM_CHANNEL_STANDARD_MODE;
hdfsdm1_channel1.Init.Input.Pins = DFSDM_CHANNEL_SAME_CHANNEL_PINS;
hdfsdm1_channel1.Init.SerialInterface.Type = DFSDM_CHANNEL_SPI_RISING;
hdfsdm1_channel1.Init.SerialInterface.SpiClock = DFSDM_CHANNEL_SPI_CLOCK_INTERNAL;
hdfsdm1_channel1.Init.Awd.FilterOrder = DFSDM_CHANNEL_FASTSINC_ORDER;
hdfsdm1_channel1.Init.Awd.Oversampling = 1;
hdfsdm1_channel1.Init.Offset = 0;
hdfsdm1_channel1.Init.RightBitShift = 0x00;
if (HAL_DFSDM_ChannelInit(&hdfsdm1_channel1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
hdfsdm1_channel2.Instance = DFSDM1_Channel2;
hdfsdm1_channel2.Init.OutputClock.Activation = ENABLE;
hdfsdm1_channel2.Init.OutputClock.Selection = DFSDM_CHANNEL_OUTPUT_CLOCK_SYSTEM;
hdfsdm1_channel2.Init.OutputClock.Divider = 2;
hdfsdm1_channel2.Init.Input.Multiplexer = DFSDM_CHANNEL_EXTERNAL_INPUTS;
hdfsdm1_channel2.Init.Input.DataPacking = DFSDM_CHANNEL_STANDARD_MODE;
hdfsdm1_channel2.Init.Input.Pins = DFSDM_CHANNEL_FOLLOWING_CHANNEL_PINS;
hdfsdm1_channel2.Init.SerialInterface.Type = DFSDM_CHANNEL_SPI_RISING;
hdfsdm1_channel2.Init.SerialInterface.SpiClock = DFSDM_CHANNEL_SPI_CLOCK_INTERNAL;
hdfsdm1_channel2.Init.Awd.FilterOrder = DFSDM_CHANNEL_FASTSINC_ORDER;
hdfsdm1_channel2.Init.Awd.Oversampling = 1;
hdfsdm1_channel2.Init.Offset = 0;
hdfsdm1_channel2.Init.RightBitShift = 0x00;
if (HAL_DFSDM_ChannelInit(&hdfsdm1_channel2) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* I2C1 init function */
static void MX_I2C1_Init(void)
{
hi2c1.Instance = I2C1;
hi2c1.Init.Timing = 0x00000E14;
hi2c1.Init.OwnAddress1 = 0;
hi2c1.Init.AddressingMode = I2C_ADDRESSINGMODE_7BIT;
hi2c1.Init.DualAddressMode = I2C_DUALADDRESS_DISABLE;
hi2c1.Init.OwnAddress2 = 0;
hi2c1.Init.OwnAddress2Masks = I2C_OA2_NOMASK;
hi2c1.Init.GeneralCallMode = I2C_GENERALCALL_DISABLE;
hi2c1.Init.NoStretchMode = I2C_NOSTRETCH_DISABLE;
if (HAL_I2C_Init(&hi2c1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure Analogue filter
*/
if (HAL_I2CEx_ConfigAnalogFilter(&hi2c1, I2C_ANALOGFILTER_ENABLE) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure Digital filter
*/
if (HAL_I2CEx_ConfigDigitalFilter(&hi2c1, 0) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* I2C2 init function */
static void MX_I2C2_Init(void)
{
hi2c2.Instance = I2C2;
hi2c2.Init.Timing = 0x00000E14;
hi2c2.Init.OwnAddress1 = 0;
hi2c2.Init.AddressingMode = I2C_ADDRESSINGMODE_7BIT;
hi2c2.Init.DualAddressMode = I2C_DUALADDRESS_DISABLE;
hi2c2.Init.OwnAddress2 = 0;
hi2c2.Init.OwnAddress2Masks = I2C_OA2_NOMASK;
hi2c2.Init.GeneralCallMode = I2C_GENERALCALL_DISABLE;
hi2c2.Init.NoStretchMode = I2C_NOSTRETCH_DISABLE;
if (HAL_I2C_Init(&hi2c2) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure Analogue filter
*/
if (HAL_I2CEx_ConfigAnalogFilter(&hi2c2, I2C_ANALOGFILTER_ENABLE) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/**Configure Digital filter
*/
if (HAL_I2CEx_ConfigDigitalFilter(&hi2c2, 0) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* LPUART1 init function */
static void MX_LPUART1_UART_Init(void)
{
hlpuart1.Instance = LPUART1;
hlpuart1.Init.BaudRate = 209700;
hlpuart1.Init.WordLength = UART_WORDLENGTH_7B;
hlpuart1.Init.StopBits = UART_STOPBITS_1;
hlpuart1.Init.Parity = UART_PARITY_NONE;
hlpuart1.Init.Mode = UART_MODE_TX_RX;
hlpuart1.Init.HwFlowCtl = UART_HWCONTROL_NONE;
hlpuart1.Init.OneBitSampling = UART_ONE_BIT_SAMPLE_DISABLE;
hlpuart1.AdvancedInit.AdvFeatureInit = UART_ADVFEATURE_NO_INIT;
if (HAL_UART_Init(&hlpuart1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* USART1 init function */
static void MX_USART1_UART_Init(void)
{
huart1.Instance = USART1;
huart1.Init.BaudRate = 115200;
huart1.Init.WordLength = UART_WORDLENGTH_8B;
huart1.Init.StopBits = UART_STOPBITS_1;
huart1.Init.Parity = UART_PARITY_NONE;
huart1.Init.Mode = UART_MODE_TX_RX;
huart1.Init.HwFlowCtl = UART_HWCONTROL_RTS_CTS;
huart1.Init.OverSampling = UART_OVERSAMPLING_16;
huart1.Init.OneBitSampling = UART_ONE_BIT_SAMPLE_DISABLE;
huart1.AdvancedInit.AdvFeatureInit = UART_ADVFEATURE_NO_INIT;
if (HAL_UART_Init(&huart1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* USART2 init function */
static void MX_USART2_UART_Init(void)
{
huart2.Instance = USART2;
huart2.Init.BaudRate = 115200;
huart2.Init.WordLength = UART_WORDLENGTH_8B;
huart2.Init.StopBits = UART_STOPBITS_1;
huart2.Init.Parity = UART_PARITY_NONE;
huart2.Init.Mode = UART_MODE_TX_RX;
huart2.Init.HwFlowCtl = UART_HWCONTROL_NONE;
huart2.Init.OverSampling = UART_OVERSAMPLING_16;
huart2.Init.OneBitSampling = UART_ONE_BIT_SAMPLE_DISABLE;
huart2.AdvancedInit.AdvFeatureInit = UART_ADVFEATURE_NO_INIT;
if (HAL_UART_Init(&huart2) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* QUADSPI init function */
static void MX_QUADSPI_Init(void)
{
/* QUADSPI parameter configuration*/
hqspi.Instance = QUADSPI;
hqspi.Init.ClockPrescaler = 255;
hqspi.Init.FifoThreshold = 1;
hqspi.Init.SampleShifting = QSPI_SAMPLE_SHIFTING_NONE;
hqspi.Init.FlashSize = 1;
hqspi.Init.ChipSelectHighTime = QSPI_CS_HIGH_TIME_1_CYCLE;
hqspi.Init.ClockMode = QSPI_CLOCK_MODE_0;
hqspi.Init.FlashID = QSPI_FLASH_ID_1;
hqspi.Init.DualFlash = QSPI_DUALFLASH_DISABLE;
if (HAL_QSPI_Init(&hqspi) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* SAI1 init function */
static void MX_SAI1_Init(void)
{
hsai_BlockA1.Instance = SAI1_Block_A;
hsai_BlockA1.Init.Protocol = SAI_FREE_PROTOCOL;
hsai_BlockA1.Init.AudioMode = SAI_MODEMASTER_TX;
hsai_BlockA1.Init.DataSize = SAI_DATASIZE_24;
hsai_BlockA1.Init.FirstBit = SAI_FIRSTBIT_MSB;
hsai_BlockA1.Init.ClockStrobing = SAI_CLOCKSTROBING_FALLINGEDGE;
hsai_BlockA1.Init.Synchro = SAI_ASYNCHRONOUS;
hsai_BlockA1.Init.OutputDrive = SAI_OUTPUTDRIVE_DISABLE;
hsai_BlockA1.Init.NoDivider = SAI_MASTERDIVIDER_ENABLE;
hsai_BlockA1.Init.FIFOThreshold = SAI_FIFOTHRESHOLD_EMPTY;
hsai_BlockA1.Init.AudioFrequency = SAI_AUDIO_FREQUENCY_192K;
hsai_BlockA1.Init.SynchroExt = SAI_SYNCEXT_DISABLE;
hsai_BlockA1.Init.MonoStereoMode = SAI_STEREOMODE;
hsai_BlockA1.Init.CompandingMode = SAI_NOCOMPANDING;
hsai_BlockA1.Init.TriState = SAI_OUTPUT_NOTRELEASED;
hsai_BlockA1.FrameInit.FrameLength = 8;
hsai_BlockA1.FrameInit.ActiveFrameLength = 1;
hsai_BlockA1.FrameInit.FSDefinition = SAI_FS_STARTFRAME;
hsai_BlockA1.FrameInit.FSPolarity = SAI_FS_ACTIVE_LOW;
hsai_BlockA1.FrameInit.FSOffset = SAI_FS_FIRSTBIT;
hsai_BlockA1.SlotInit.FirstBitOffset = 0;
hsai_BlockA1.SlotInit.SlotSize = SAI_SLOTSIZE_DATASIZE;
hsai_BlockA1.SlotInit.SlotNumber = 1;
hsai_BlockA1.SlotInit.SlotActive = 0x00000000;
if (HAL_SAI_Init(&hsai_BlockA1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
hsai_BlockB1.Instance = SAI1_Block_B;
hsai_BlockB1.Init.Protocol = SAI_FREE_PROTOCOL;
hsai_BlockB1.Init.AudioMode = SAI_MODESLAVE_RX;
hsai_BlockB1.Init.DataSize = SAI_DATASIZE_24;
hsai_BlockB1.Init.FirstBit = SAI_FIRSTBIT_MSB;
hsai_BlockB1.Init.ClockStrobing = SAI_CLOCKSTROBING_FALLINGEDGE;
hsai_BlockB1.Init.Synchro = SAI_SYNCHRONOUS;
hsai_BlockB1.Init.OutputDrive = SAI_OUTPUTDRIVE_DISABLE;
hsai_BlockB1.Init.FIFOThreshold = SAI_FIFOTHRESHOLD_EMPTY;
hsai_BlockB1.Init.SynchroExt = SAI_SYNCEXT_DISABLE;
hsai_BlockB1.Init.MonoStereoMode = SAI_STEREOMODE;
hsai_BlockB1.Init.CompandingMode = SAI_NOCOMPANDING;
hsai_BlockB1.Init.TriState = SAI_OUTPUT_NOTRELEASED;
hsai_BlockB1.FrameInit.FrameLength = 24;
hsai_BlockB1.FrameInit.ActiveFrameLength = 1;
hsai_BlockB1.FrameInit.FSDefinition = SAI_FS_STARTFRAME;
hsai_BlockB1.FrameInit.FSPolarity = SAI_FS_ACTIVE_LOW;
hsai_BlockB1.FrameInit.FSOffset = SAI_FS_FIRSTBIT;
hsai_BlockB1.SlotInit.FirstBitOffset = 0;
hsai_BlockB1.SlotInit.SlotSize = SAI_SLOTSIZE_DATASIZE;
hsai_BlockB1.SlotInit.SlotNumber = 1;
hsai_BlockB1.SlotInit.SlotActive = 0x00000000;
if (HAL_SAI_Init(&hsai_BlockB1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* SDMMC1 init function */
static void MX_SDMMC1_SD_Init(void)
{
hsd1.Instance = SDMMC1;
hsd1.Init.ClockEdge = SDMMC_CLOCK_EDGE_RISING;
hsd1.Init.ClockBypass = SDMMC_CLOCK_BYPASS_DISABLE;
hsd1.Init.ClockPowerSave = SDMMC_CLOCK_POWER_SAVE_DISABLE;
hsd1.Init.BusWide = SDMMC_BUS_WIDE_1B;
hsd1.Init.HardwareFlowControl = SDMMC_HARDWARE_FLOW_CONTROL_DISABLE;
hsd1.Init.ClockDiv = 0;
if (HAL_SD_Init(&hsd1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
if (HAL_SD_ConfigWideBusOperation(&hsd1, SDMMC_BUS_WIDE_4B) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* SPI1 init function */
static void MX_SPI1_Init(void)
{
/* SPI1 parameter configuration*/
hspi1.Instance = SPI1;
hspi1.Init.Mode = SPI_MODE_MASTER;
hspi1.Init.Direction = SPI_DIRECTION_2LINES;
hspi1.Init.DataSize = SPI_DATASIZE_4BIT;
hspi1.Init.CLKPolarity = SPI_POLARITY_LOW;
hspi1.Init.CLKPhase = SPI_PHASE_1EDGE;
hspi1.Init.NSS = SPI_NSS_HARD_OUTPUT;
hspi1.Init.BaudRatePrescaler = SPI_BAUDRATEPRESCALER_2;
hspi1.Init.FirstBit = SPI_FIRSTBIT_MSB;
hspi1.Init.TIMode = SPI_TIMODE_DISABLE;
hspi1.Init.CRCCalculation = SPI_CRCCALCULATION_DISABLE;
hspi1.Init.CRCPolynomial = 7;
hspi1.Init.CRCLength = SPI_CRC_LENGTH_DATASIZE;
hspi1.Init.NSSPMode = SPI_NSS_PULSE_ENABLE;
if (HAL_SPI_Init(&hspi1) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/* SPI2 init function */
static void MX_SPI2_Init(void)
{
/* SPI2 parameter configuration*/
hspi2.Instance = SPI2;
hspi2.Init.Mode = SPI_MODE_MASTER;
hspi2.Init.Direction = SPI_DIRECTION_2LINES;
hspi2.Init.DataSize = SPI_DATASIZE_4BIT;
hspi2.Init.CLKPolarity = SPI_POLARITY_LOW;
hspi2.Init.CLKPhase = SPI_PHASE_1EDGE;
hspi2.Init.NSS = SPI_NSS_SOFT;
hspi2.Init.BaudRatePrescaler = SPI_BAUDRATEPRESCALER_2;
hspi2.Init.FirstBit = SPI_FIRSTBIT_MSB;
hspi2.Init.TIMode = SPI_TIMODE_DISABLE;
hspi2.Init.CRCCalculation = SPI_CRCCALCULATION_DISABLE;
hspi2.Init.CRCPolynomial = 7;
hspi2.Init.CRCLength = SPI_CRC_LENGTH_DATASIZE;
hspi2.Init.NSSPMode = SPI_NSS_PULSE_ENABLE;
if (HAL_SPI_Init(&hspi2) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/**
* Enable DMA controller clock
*/
void MX_DMA_Init(void)
{
/* DMA controller clock enable */
__HAL_RCC_DMA2_CLK_ENABLE();
/* DMA interrupt init */
/* DMA2_Channel6_IRQn interrupt configuration */
HAL_NVIC_SetPriority(DMA2_Channel6_IRQn, 0, 0);
HAL_NVIC_EnableIRQ(DMA2_Channel6_IRQn);
/* DMA2_Channel7_IRQn interrupt configuration */
HAL_NVIC_SetPriority(DMA2_Channel7_IRQn, 0, 0);
HAL_NVIC_EnableIRQ(DMA2_Channel7_IRQn);
}
/* FMC initialization function */
static void MX_FMC_Init(void)
{
FMC_NORSRAM_TimingTypeDef Timing;
/** Perform the SRAM1 memory initialization sequence
*/
hsram1.Instance = FMC_NORSRAM_DEVICE;
hsram1.Extended = FMC_NORSRAM_EXTENDED_DEVICE;
/* hsram1.Init */
hsram1.Init.NSBank = FMC_NORSRAM_BANK2;
hsram1.Init.DataAddressMux = FMC_DATA_ADDRESS_MUX_DISABLE;
hsram1.Init.MemoryType = FMC_MEMORY_TYPE_SRAM;
hsram1.Init.MemoryDataWidth = FMC_NORSRAM_MEM_BUS_WIDTH_16;
hsram1.Init.BurstAccessMode = FMC_BURST_ACCESS_MODE_DISABLE;
hsram1.Init.WaitSignalPolarity = FMC_WAIT_SIGNAL_POLARITY_LOW;
hsram1.Init.WaitSignalActive = FMC_WAIT_TIMING_BEFORE_WS;
hsram1.Init.WriteOperation = FMC_WRITE_OPERATION_DISABLE;
hsram1.Init.WaitSignal = FMC_WAIT_SIGNAL_DISABLE;
hsram1.Init.ExtendedMode = FMC_EXTENDED_MODE_DISABLE;
hsram1.Init.AsynchronousWait = FMC_ASYNCHRONOUS_WAIT_DISABLE;
hsram1.Init.WriteBurst = FMC_WRITE_BURST_DISABLE;
hsram1.Init.ContinuousClock = FMC_CONTINUOUS_CLOCK_SYNC_ONLY;
hsram1.Init.WriteFifo = FMC_WRITE_FIFO_ENABLE;
hsram1.Init.PageSize = FMC_PAGE_SIZE_NONE;
/* Timing */
Timing.AddressSetupTime = 15;
Timing.AddressHoldTime = 15;
Timing.DataSetupTime = 255;
Timing.BusTurnAroundDuration = 15;
Timing.CLKDivision = 16;
Timing.DataLatency = 17;
Timing.AccessMode = FMC_ACCESS_MODE_A;
/* ExtTiming */
if (HAL_SRAM_Init(&hsram1, &Timing, NULL) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
/** Perform the SRAM2 memory initialization sequence
*/
hsram2.Instance = FMC_NORSRAM_DEVICE;
hsram2.Extended = FMC_NORSRAM_EXTENDED_DEVICE;
/* hsram2.Init */
hsram2.Init.NSBank = FMC_NORSRAM_BANK1;
hsram2.Init.DataAddressMux = FMC_DATA_ADDRESS_MUX_DISABLE;
hsram2.Init.MemoryType = FMC_MEMORY_TYPE_SRAM;
hsram2.Init.MemoryDataWidth = FMC_NORSRAM_MEM_BUS_WIDTH_16;
hsram2.Init.BurstAccessMode = FMC_BURST_ACCESS_MODE_DISABLE;
hsram2.Init.WaitSignalPolarity = FMC_WAIT_SIGNAL_POLARITY_LOW;
hsram2.Init.WaitSignalActive = FMC_WAIT_TIMING_BEFORE_WS;
hsram2.Init.WriteOperation = FMC_WRITE_OPERATION_ENABLE;
hsram2.Init.WaitSignal = FMC_WAIT_SIGNAL_DISABLE;
hsram2.Init.ExtendedMode = FMC_EXTENDED_MODE_DISABLE;
hsram2.Init.AsynchronousWait = FMC_ASYNCHRONOUS_WAIT_DISABLE;
hsram2.Init.WriteBurst = FMC_WRITE_BURST_DISABLE;
hsram2.Init.ContinuousClock = FMC_CONTINUOUS_CLOCK_SYNC_ONLY;
hsram2.Init.WriteFifo = FMC_WRITE_FIFO_ENABLE;
hsram2.Init.PageSize = FMC_PAGE_SIZE_NONE;
/* Timing */
Timing.AddressSetupTime = 15;
Timing.AddressHoldTime = 15;
Timing.DataSetupTime = 255;
Timing.BusTurnAroundDuration = 15;
Timing.CLKDivision = 16;
Timing.DataLatency = 17;
Timing.AccessMode = FMC_ACCESS_MODE_A;
/* ExtTiming */
if (HAL_SRAM_Init(&hsram2, &Timing, NULL) != HAL_OK)
{
_Error_Handler(__FILE__, __LINE__);
}
}
/** Configure pins as
* Analog
* Input
* Output
* EVENT_OUT
* EXTI
PI6 ------> S_TIM8_CH2
PH15 ------> TIM8_CH3N
PH13 ------> TIM8_CH1N
PB9 ------> S_TIM4_CH4
PA8 ------> LPTIM2_OUT
*/
void MX_GPIO_Init(void)
{
GPIO_InitTypeDef GPIO_InitStruct;
/* GPIO Ports Clock Enable */
__HAL_RCC_GPIOI_CLK_ENABLE();
__HAL_RCC_GPIOH_CLK_ENABLE();
__HAL_RCC_GPIOE_CLK_ENABLE();
__HAL_RCC_GPIOB_CLK_ENABLE();
__HAL_RCC_GPIOA_CLK_ENABLE();
__HAL_RCC_GPIOG_CLK_ENABLE();
HAL_PWREx_EnableVddIO2();
__HAL_RCC_GPIOD_CLK_ENABLE();
__HAL_RCC_GPIOC_CLK_ENABLE();
__HAL_RCC_GPIOF_CLK_ENABLE();
/*Configure GPIO pin Output Level */
HAL_GPIO_WritePin(LCD_BL_GPIO_Port, LCD_BL_Pin, GPIO_PIN_RESET);
/*Configure GPIO pin Output Level */
HAL_GPIO_WritePin(GPIOH, MFX_WAKEUP_Pin|LCD_PWR_ON_Pin|MIC_VDD_Pin, GPIO_PIN_RESET);
/*Configure GPIO pin Output Level */
HAL_GPIO_WritePin(Audio_RST_GPIO_Port, Audio_RST_Pin, GPIO_PIN_RESET);
/*Configure GPIO pin Output Level */
HAL_GPIO_WritePin(LED1_GPIO_Port, LED1_Pin, GPIO_PIN_RESET);
/*Configure GPIO pins : JOY_DOWN_Pin JOY_LEFT_Pin JOY_UP_Pin */
GPIO_InitStruct.Pin = JOY_DOWN_Pin|JOY_LEFT_Pin|JOY_UP_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_INPUT;
GPIO_InitStruct.Pull = GPIO_PULLDOWN;
HAL_GPIO_Init(GPIOI, &GPIO_InitStruct);
/*Configure GPIO pin : STMOD_INT_Pin */
GPIO_InitStruct.Pin = STMOD_INT_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_IT_RISING;
GPIO_InitStruct.Pull = GPIO_NOPULL;
HAL_GPIO_Init(STMOD_INT_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : LCD_BL_Pin */
GPIO_InitStruct.Pin = LCD_BL_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_OUTPUT_PP;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
HAL_GPIO_Init(LCD_BL_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : ARD_D6_Pin */
GPIO_InitStruct.Pin = ARD_D6_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_AF_PP;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
GPIO_InitStruct.Alternate = GPIO_AF3_TIM8;
HAL_GPIO_Init(ARD_D6_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pins : ARD_D3_Pin ARD_D9_Pin */
GPIO_InitStruct.Pin = ARD_D3_Pin|ARD_D9_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_AF_PP;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
GPIO_InitStruct.Alternate = GPIO_AF3_TIM8;
HAL_GPIO_Init(GPIOH, &GPIO_InitStruct);
/*Configure GPIO pin : ARD_D5_Pin */
GPIO_InitStruct.Pin = ARD_D5_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_AF_PP;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
GPIO_InitStruct.Alternate = GPIO_AF2_TIM4;
HAL_GPIO_Init(ARD_D5_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : LCD_TE_Pin */
GPIO_InitStruct.Pin = LCD_TE_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_INPUT;
GPIO_InitStruct.Pull = GPIO_NOPULL;
HAL_GPIO_Init(LCD_TE_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pins : MFX_WAKEUP_Pin LCD_PWR_ON_Pin MIC_VDD_Pin */
GPIO_InitStruct.Pin = MFX_WAKEUP_Pin|LCD_PWR_ON_Pin|MIC_VDD_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_OUTPUT_PP;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
HAL_GPIO_Init(GPIOH, &GPIO_InitStruct);
/*Configure GPIO pin : Audio_RST_Pin */
GPIO_InitStruct.Pin = Audio_RST_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_OUTPUT_PP;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
HAL_GPIO_Init(Audio_RST_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : CTP_INT_Pin */
GPIO_InitStruct.Pin = CTP_INT_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_IT_RISING;
GPIO_InitStruct.Pull = GPIO_NOPULL;
HAL_GPIO_Init(CTP_INT_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : DCMI_CLK_Pin */
GPIO_InitStruct.Pin = DCMI_CLK_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_AF_PP;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
GPIO_InitStruct.Alternate = GPIO_AF14_LPTIM2;
HAL_GPIO_Init(DCMI_CLK_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : MFX_IRQ_OUT_Pin */
GPIO_InitStruct.Pin = MFX_IRQ_OUT_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_IT_RISING;
GPIO_InitStruct.Pull = GPIO_NOPULL;
HAL_GPIO_Init(MFX_IRQ_OUT_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : JOY_RIGHT_Pin */
GPIO_InitStruct.Pin = JOY_RIGHT_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_INPUT;
GPIO_InitStruct.Pull = GPIO_PULLDOWN;
HAL_GPIO_Init(JOY_RIGHT_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : STMOD_RESET_Pin */
GPIO_InitStruct.Pin = STMOD_RESET_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_INPUT;
GPIO_InitStruct.Pull = GPIO_NOPULL;
HAL_GPIO_Init(STMOD_RESET_GPIO_Port, &GPIO_InitStruct);
/*Configure GPIO pin : LED1_Pin */
GPIO_InitStruct.Pin = LED1_Pin;
GPIO_InitStruct.Mode = GPIO_MODE_OUTPUT_OD;
GPIO_InitStruct.Pull = GPIO_NOPULL;
GPIO_InitStruct.Speed = GPIO_SPEED_FREQ_LOW;
HAL_GPIO_Init(LED1_GPIO_Port, &GPIO_InitStruct);
}
/* USER CODE BEGIN 4 */
/* USER CODE END 4 */
/**
* @brief This function is executed in case of error occurrence.
* @param file: The file name as string.
* @param line: The line in file as a number.
* @retval None
*/
void _Error_Handler(char *file, int line)
{
/* USER CODE BEGIN Error_Handler_Debug */
/* User can add his own implementation to report the HAL error return state */
while(1)
{
}
/* USER CODE END Error_Handler_Debug */
}
#ifdef USE_FULL_ASSERT
/**
* @brief Reports the name of the source file and the source line number
* where the assert_param error has occurred.
* @param file: pointer to the source file name
* @param line: assert_param error line source number
* @retval None
*/
void assert_failed(uint8_t* file, uint32_t line)
{
/* USER CODE BEGIN 6 */
/* User can add his own implementation to report the file name and line number,
tex: printf("Wrong parameters value: file %s on line %d\r\n", file, line) */
/* USER CODE END 6 */
}
#endif /* USE_FULL_ASSERT */
/**
* @}
*/
/**
* @}
*/
/************************ (C) COPYRIGHT STMicroelectronics *****END OF FILE****/
|
All states except Mississippi and West Virginia allow parents to opt out of their children’s otherwise-mandatory vaccinations for religious reasons.
In California, those with a religious exemption don’t even need to seek a health practitioner’s signature, unlike others. That’s because of a vaccine policy change implemented by Gov. Jerry Brown.
But a review of religious policy reveals that few, if any, religions actually oppose vaccination, according to research by the California Immunization Coalition, a nonprofit, public-private partnership dedicated to full immunization protection for all Californians.
These are the policies of various religions on vaccination, according to research by the coalition and others:
Mainstream Christian denominations: No scriptural or canonical objection to the use of vaccines. These include Eastern Orthodox and Oriental Orthodox churches, Anglican, Baptist, the Church of Jesus Christ of Latter-day Saints, Congregational, Episcopalian, Lutheran, Methodist (including African Methodist Episcopal), Pentecostal, Presbyterian, and Seventh-Day Adventist Church. Roman Catholics recognize the importance of vaccinations and support their use to protect both individuals and the larger community.
Amish: While a minority of Amish parents do not vaccinate their children, vaccination is not prohibited by their religion.
Christian Science: There are some faith-healing groups — of which the Church of Christ, Scientist (Christian Science) is the most prominent — that believe prayer can heal, making vaccines unnecessary. But the church does not oppose vaccinations.
Hindu: There is no formal statement from Hindu authorities on vaccination, as Hinduism has several hundreds of sects, each with its traditions and rules. But many areas of the world with large Hindu populations, such as India, have taken proactive efforts to eradicate vaccine-preventable diseases like polio.
Muslim: Many imams and other Islamic leaders have issued clear statements saying that vaccination is consistent with Islamic principles. In particular, a 1995 conference of Islamic scholars concluded: “The transformation of pork products into gelatin alters them sufficiently to make it permissible for observant Muslims to receive vaccines containing pork gelatin.”
However, some specific select Muslim communities throughout the world have opposed vaccinations, including the Nation of Islam, whose leader Minister Louis Farrakhan once said that the 2009 H1N1 flu vaccine was designed to kill people. While Nation of Islam members call themselves Muslims, mainstream Muslims reject the group’s beliefs.
In Pakistan and Afghanistan, the Taliban oppose vaccination as a plot to sterilize Muslims. The Taliban have kidnapped, beaten and assassinated vaccination officials, including the head of Pakistan’s vaccination campaign.
Jehovah’s Witnesses: According to the Watch Tower Bible and Tract Society of Pennsylvania, the main legal entity that organizes worldwide activities by Jehovah’s Witnesses, “We have no objection to vaccines in general.”
Jewish: While there is no single voice for Jewish communities, many rabbis have spoken out in favor of vaccinations, noting the importance of preserving life (pikuakh nefesh). The rabbis also point out that, according to Jewish law, there is no objection to porcine or other animal-derived ingredients in non-oral products, such as injectable vaccines.
Sikh: There is no official statement on immunization from Sikh authorities. But generally Sikhs do not have religious or societal issues against vaccination.
Lisa M. Krieger is a science writer at The Mercury News, covering research, scientific policy and environmental news from Stanford University, the University of California, NASA-Ames, U.S. Geological Survey and other Bay Area-based research facilities. Lisa also contributes to the Videography team. She graduated from Duke University with a degree in biology. Outside of work, she enjoys photography, backpacking, swimming and bird-watching.
More in News
By William Booth | Washington Post LONDON – At $1 billion it is the most expensive embassy ever constructed. But its designers say the new American chancery on the Thames River marks a paradigm shift in design: the U.S. Embassy here will exude openness, while hiding all the clever ways it defends itself from attack. After decades of building American...
State regulators are due to consider a plan to replace power from the Metcalf Energy Center in south San Jose with alternative electricity sources, including battery storage. If implemented, the plan could boost PG&E customers’ utility bills. |
Q:
Where are Eclipse configuration options documented?
In trying to troubleshoot a configuration.ini issue, I ran into where I didn't have the osgi.bundlefile.limit value set high enough for the application we are using. What puzzled me is looking at the Eclipse documentation, I see where they are using:
-D
and
-X
in front of various settings, yet I cannot find in the Eclipse documentation what -D or -X mean. Anybody know what they mean or even where they are documented?
A:
These are Java configuration options rather than Eclipse see for example here
-D defines a system property - -Dproperty=value
-Xmx1024m is the Java option to set the maximum heap size.
Eclipse doesn't know anything about what these options are it just passes them to the Java command used to run the application.
|
Big Game Review
Big Game Review (Indian Critics)
Average Rating: 2.83/5
Reviews Counted: 4
Positive: 2
Negative: 2
From All the Indian reviews on the web
Ratings:3/5Review By:Mohar BasuSite:Times Of India
Big Game is a film which, despite its hackneyed writing, is imbued with charm and humour. Yes, the plot-line doesn’t really bow down to the logic of physics but the story’s endearing quality works as its saving grace. In its 91 minutes, Big Game can pass for junk cinema to go well with your popcorn. Its picturesque setting, exaggerated lines and well-drawn action sequences are fun while it lasts but not compelling enough to desire a repeat.
With all the trappings of an adventure film that takes place within a time frame of 24 hours, there is something charming about this outrageously fake tale which is based on an original story written by Finnish director Jalmari Helander. he narrative is straightforward, simple and obviously predictable. Except for some elevated and underwater action sequences, the treatment lacks adrenaline rushing moments. This one is worth a watch, even though you don’t invest emotionally in the film.
Though it may not be perfect, BIG GAME is a ton of fun for the fans of mindless action films, who don’t mind being stunned when some semblance of a story begins to form. However, a drawback is when the film ends, the viewer is left with a feeling of wanting more of this absurd journey.
The film lacks punch in terms of story, but makes up with Tommila and Jackson’s on screen camaraderie and the beautiful locales of Finland. Director Jalmari Helander impresses with his jaw dropping set pieces, and the supporting cast of Felicity Huffman and Jim Broadbent also does well. Why Should You Watch the Film? Catch Big Game if you’re looking to see Samuel L. Jackson on screen again, and a few super slow-motion scenes. Wait for the ejector seat scene and a more than a few things bursting into flames |
A collection of JavaScript asynchronous patterns - bredele
http://bredele.github.io/async
see http://github.com/bredele
======
malandrew
People interested in this should also check out these links:
[0] Designing APIs for Asynchrony by izs
[https://news.ycombinator.com/item?id=7494393](https://news.ycombinator.com/item?id=7494393)
[1] Callbacks, synchronous and asynchronous,
[https://news.ycombinator.com/item?id=7494396](https://news.ycombinator.com/item?id=7494396)
[2] Generators and other async patterns in node.js
[https://news.ycombinator.com/item?id=7494390](https://news.ycombinator.com/item?id=7494390)
|
[Usefulness and mission of health education].
The concept of "education" and "health" is discussed in the presented article. The role of health education in the common medical praxis and the long-term health promotion are stressed. Authors define (a) health education aimed at the patients and diseases, (b) health education oriented at major risk factors, and (c) education to well being. Authors emphasize the essential need of health education and the necessity of its development in all forms. |
A comparison of intact and in-vitro locomotion in an adult amphibian.
Locomotion was compared in an intact and in-vitro preparation of the adult mudpuppy (Necturus maculatus). The intact animals walked on an aquatic treadmill while in-vitro preparations were made to walk with a bath application of the excitatory amino acid NMA (N-methyl DL-aspartate). EMG recordings of shoulder muscles (pectoralis, latissimus dorsi, dorsalis scapulae, and procoracohumeralis) and elbow muscles (brachialis and extensor ulnae) were obtained from intact animals while recordings were made from only the elbow muscles in-vitro. The in-vitro preparation required magnesium in the bath to initiate and maintain locomotion, consistent with an NMDA mediated response. Also consistent with an NMDA response was the finding that glycine potentiated the NMA induced locomotion in-vitro. The range of cycle durations seen in-vitro was well within the range seen in the intact animal, while gait analysis demonstrated the similarity of intact and in-vitro locomotor cycles. In spite of these very similar locomotor patterns there are interesting differences in the patterned output seen in-vitro, such as the absence of a second burst in the brachialis muscle in-vitro. |
In situ synthesis and cell performance of a Si/C core-shell/ball-milled graphite composite for lithium ion batteries.
A high-capacity silicon-carbon core-shell (Si/C) supported by ball-milled graphite (BMG) was synthesized in situ using a hydrosilylation reaction and tested as an anode material for lithium ion batteries (LIBs) in the investigation of the effects of dual buffer layers of carbon shell and BMG. The Si/C/BMG sample effectively absorbed high volumetric expansion/contraction generated during charge/discharge process due to the assistance of dual elastic buffers of carbon shell and BMG. As a result, after 50 charge/discharge cycles, the Si/C/BMG electrodes still had a very high capacity of 1615 mAh/g, whereas raw Si, Si/C, and a mechanical mixture of Si/C and BMG were less than 500 mAh/g. The results of various electrochemical characterization techniques revealed that the dual buffer layers were favorable in decreasing electron and ion transfer resistance. It was also shown from ex situ TEM results that the carbon layers behaved as anti-amorphization layers decreasing the amorphization rate of crystalline Si during the alloying/dealloying of Li with Si. |
Decoding the Homeland Security Plan for Reuniting Migrant Families
Sofia Casini was just leaving the T. Don Hutto detention facility in central Texas — where she had posted bond for a detained migrant mom — when she spoke to us about the government’s promise to reunite migrant families.
“Based on what I’ve heard from mothers, the government had no intention to reunite families in the first place,” Sofia Casini tells us.
Casini is a campaign organizer for Grassroots Leadership, a non-profit that fights against for-profit prisons and detention centers. She tells Brit + Co that there is “desperation” among mothers at Hutto who have been separated from their children.
Casini’s assessment that there is no official plan to reunite families comes after the Department of Homeland Security (which oversees ICE), released a thinly outlined plan to reunite families. Over the weekend, the DHS released a “Fact Sheet” regarding “zero tolerance prosecution and family reunification,” which came on the heels of a Friday report that the DHS created an “unaccompanied children reunification task force.”
According to POLITICO, the task force was created by the Assistant Secretary for Preparedness and Response, a division that typically handles public health crises. The internal document that POLITICO obtained states that the task force will assist “the ACF Office of Refugee Resettlement with Unaccompanied Children Reunification.” But migrant parents and advocates say that it’s hard to tell what that process will actually look like, or whether a change is in motion yet at all.
The “fact sheet” states that the DHS and the Department of Health and Human Services “have a process established to ensure that family members know the location of their children and have regular communication after separation to ensure that those adults who are subject to removal are reunited with their children for the purposes of removal.” The fact sheet does not clarify what this “process” even is, or when families can expect to be reunited.
The sheet adds that Customs and Border Patrol has reunited 522 migrant children with their parents. Casini says that it’s true some families have been reunited, but that it’s important to understand the circumstances.
She explains, for example, that the mom she posted bond for on Tuesday morning will be reunited with her children, who are already with her husband. The mother and her family have lawyers and advocates working on their behalf, which is necessary given how complicated and unclear processes are at this time. But not all families will have the exact right circumstances or resources to be reunited the way things are currently operating.
I spoke to two people who work in the shelters top level. In different parts of the country. Both said their orgs want to reunite the children. Both said administration has no plan. Both said admin is dragging its feet & has no plan whatsoever on how to reunite these children.
Maria Hinojosa, a journalist and founder of the Futuro Media Group, has echoed Casini’s doubts about the administration’s intentions. Hinojosa tweeted Monday morning that she spoke with people at the “top level” of two shelters helping migrants, and there’s a general sense that the administration doesn’t actually have a plan for family reunification.
“Both said their orgs want to reunite the children,” Hinojosa tweeted, “Both said the administration has no plan. Both said the admin is dragging its feet and has no plan whatsoever on how to reunite these children.”
Even after 32 parents who were separated from their children were freed from detention on Monday in Texas, there is still a lack of understanding as to how they will end up back with their kids. The parents who have been released have said they do not know where their kids are being detained or if they will in fact be reunited with them, according to the Associated Press. The parents are currently receiving services from the Annunciation House in El Paso.
Casini says that at Hutto, where she has worked with a few dozen moms, most parents do not even know where their children are. “If they do know where [their kids] are,” she says, “they have no way of getting in contact with them.”
Further actions by the DHS and ICE indicate that family deportations and detention are still the top priority for this administration. The fact sheet states that parents who are ordered to be deported “may request that his or her minor child accompany them.” Some parents are already being told that they can get their detained children back, but only if they agree to leave the US via “voluntary deportation.” An asylum-seeker from Honduras who spoke to the Texas Tribune anonymously said that he gave up his case for asylum out of “desperation” to be with his child.
Casini says that this promise has proven to be a lie for migrants she has heard from.
“One caregiver, who raised her brother like a son, was told that if she agreed to voluntarily deport, she would be reunited with her brother,” Casini tells us. “She signed the papers, then was told she would not be able to see her brother.”
Casini adds that some parents were told that they could see their children if they confessed to criminal charges, only to later find out their children had already been taken away.
Family detention update: @ICEgov has issued an RFI "seeking information regarding potential facilities to accommodate up to 15,000 beds." For context, the current family detention capacity is ~2400. https://t.co/cLRj3INpP2
The same day that POLITICO obtained the document regarding the reunification task force, New York Times immigration reporter Caitlin Dickerson tweeted that ICE made a request for information “regarding potential facilities to accommodate up to 15,000 beds.” Dickerson added that “The current detention capacity is [around] 2,400.” This indicates that ICE could be seeking to incarcerate an additional 12,600 migrants who are members of families.
Asked what’s next, Casini says that the fight for migrants’ rights must continue, and that detention centers must close down. Noting that Williamson County commissioners voted today to end the contract they hold with ICE for the Hutto detention center, she says community members need to “keep speaking out loudly about what’s happening in these detention centers, and push counties to close centers.”
Elizabeth King is a politics, history, and culture writer based in the Twin Cities. She is generally pretty cranky but still enjoys traveling, music from the early 2000's, and plotting the resistance. Feel free to say hi on Twitter at @ekingc or check out some of her work at www.elizabethcking.com. |
Staff have had to deal with angry calls from people unable to file returns.
Accountants have been threatening to file GST returns on paper after Inland Revenue suffered problems with its online systems.
Accountants around the country have reported widespread problems. Some said they could not log on to Inland Revenue's online MyIR tax system at all – although GST returns are due to be filed on Thursday.
There were also problems with GST returns being processed. Staff were told 10,000 phone calls to Inland Revenue were not answered last week.
One Inland Revenue employee who did not want to be identified said staff were subjected to angry calls earlier in the week – some accountants threatened to file their returns on paper because they could not get into the system.
READ MORE: Accountants fume over 'perfect storm' at Inland Revenue
Inland Revenue said on Wednesday it believed the problems with GST processing had been resolved.
"Initially the problems had appeared to affect only a few customers, it had been growing, but it was thought the problem was with customer log-ins. However some very specific customer feedback yesterday led IR investigations to the problem with the provider's network load rebalancer. That was quickly fixed by the provider," it said in a statement.
"IR apologises to affected customers and we understand how frustrating it has been in the lead up to the GST filing date. Most customers are now managing to file their GST returns, for example 18,000 did yesterday, which is around what we would expect.
"This hasn't impacted other types of tax, for example income tax or people seeking tax refunds. Last week there were over 700,000 logins to our online services, with 98.9 per cent within our service standard of six seconds."
Revenue Minister Stuart Nash said it was a "perfect storm" as people who were filing GST monthly, two-monthly and six-monthly all filed on June 28.
It was not an issue of computer systems needing to be changed, he said.
Spokesman Rowan McArthur said there were intermittent problems with the MyIR platform "but it is working. As problems arise they are dealt with as part of normal systems management."
National's revenue spokesman Paul Goldsmith was not impressed.
"The Minister's casual dismissal of concerns is particularly galling, given the extra pressure his Government has imposed on IR's systems by insisting that they also process the Best Start tax credit payments.
"Chartered Accountants Australia and New Zealand have raised the issue with IR but have yet to receive an explanation as to why the problem is occurring, how widespread the issue is and what steps are being taken to fix it.
"IRD collects $70 billion worth of taxpayers' dollars each year and we must have reassurance the system is working without glitches that prevent New Zealanders from fulfilling their tax obligations.
"The Minister needs to assure New Zealanders that IR is not in a state of crisis and is able to cope without causing significant disruption for taxpayers."
Craig Macalister, tax advisory partner at Crowe Howarth, said the GST problem was one of many the department had to contend with.
"There's been a number of ongoing issues with the change to the new system."
The department had also changed the way it processed tax credits and was automatically applying them to any money people owed - sometimes even if that amount had not yet fallen due, he said. Some clients had been confused by the change.
People were no longer being sent paper statements, so tax agents had to log in to the systems to check whether clients had received any communication.
But one tax agent could have thousands of clients and could not check every day for them all, he said.
"There are a lot of things that are causing tax compliance to be more difficult than it should be ... the smallest things are the hardest to resolve; getting an IR number, changing balance dates.
"They should be simple things to get done." |
Tehelka case: Tarun Tejpal not quizzed by Goa cops
A three-member Goa police team returned on Sunday without questioning Tehelka founder-editor Tarun Tejpal, who is accused of sexually assaulting a junior colleague at an event in Goa earlier this month. Latest in Tehelka case | Timeline: how the tehelka unfolded | Won't defend friend Tejpal: Jethmalani
A three-member Goa Police team returned on Sunday without questioning Tehelka founder-editor Tarun Tejpal, who is accused of sexually assaulting a junior colleague at an event in Goa earlier this month.
“We have not established contact with Tarun Tejpal yet,” deputy inspector general of police OP Mishra said at a press conference at the police headquarters in Panaji.
The cops, however, examined Tehelka managing editor Shoma Chaudhury and three other employees who the woman journalist spoke to soon after allegedly being sexually assaulted by Tejpal.
The police also did not rule out the possibility of pressing additional charges against Tejpal. “…If additional charges are required, they will be added according to the development in the course of action,” Mishra said. “They have also taken relevant documents in possession and some electronic items,” he added.
The National Commission for Women (NCW), meanwhile, asked the Mumbai police to ensure security of the woman journalist. The move comes following a statement issued by the woman, who is based in Mumbai, that she fears “intimidation and harassment” as Tejpal’s family is putting pressure on her family.
“NCW is concerned following the statement and have spoken to Mumbai police chief Himanshu Roy to ensure the girl’s security,” said NCW member Nirmala Samant. She said the Mumbai police have assured her to provide all necessary protection to the woman in case she approaches them. “NCW is there to ensure her safety and security,” she said.
Police at the residence of Tarun Tejpal, the founder of Tehelka in New Delhi. (PTI Photo)
Chaudhury, who was questioned for nine hours by the Goa Police team in the case, on Sunday said she "fully cooperated" with the police and hoped it will bring "clarity and justice" to the case.
“Yesterday (Saturday), at the Tehelka office, the Goa Police took my deposition for about 9 hours, it was extremely courteous experience and I fully cooperated and showed every document that was relevant, every email exchange that was there between my colleagues, the management, it was shared, it was a good experience and I hope it helps bring clarity and justice to the entire case,” Chaudhury said.
Tejpal’s troubles mounted on Saturday as the colleague who has accused him of sexual assault revealed that a family member of the Tehelka founder-editor had visited her mother, and said she feared further intimidation and harassment. The Goa Police, which has registered a case of rape against the 50-year-old, conducted a search-and-seize operation at the publication’s office on Saturday.
“On the night of November 22, 2013, a member of Mr Tejpal’s immediate family came to my mother’s house in New Delhi, asking my mother to protect Mr Tejpal,” the journalist said in a statement released to the media. She said the visitor “demanded to know who I was seeking legal help from” and “what I ‘wanted’ as the result of my complaint”.
“This visit has placed tremendous emotional pressure on my family and I at an intensely traumatic time. I fear this may be the beginning of… further intimidation and harassment,” she said. “I call upon all persons connected to Mr Tejpal and his associates to refrain from approaching me or my family members.”
The Tehelka editor-in-chief, who was locked in lengthy meetings with lawyers on Saturday, is understood to be contemplating moving the court to get the probe transferred from the Goa Police to an independent investigating agency, sources said. Media reports had earlier quoted him as saying that the victim was lying and that he was being framed. “Political forces are driving much of it,” he alleged.
A joint team of the Goa and Delhi Police had on Saturday took Tehelka managing editor Shoma Chaudhury’s statement at her south Delhi residence and took away laptops, iPads and hard disk drives from the magazine’s GK office. Chaudhury, who was questioned for three hours, later said, “I have given all information demanded of me. We are cooperating to the best of our ability.” |
I have made a tool handle for some carbide insert tools I bought online.Here are the tools:
(202.53 KiB)
They sell a handle for them, which I bought:
(186.82 KiB)
However I was not impressed with it, its made from an aluminium tube and uses 2 grub screws to hold the shaft of the tool. It is so light that I find it a has a bad vibration problem, so I looked round for alternative possibilities. I found what is sold as collet extension that uses ER20 collets.
(115.97 KiB)
I got a 12 mm collet for it:
(198.05 KiB)
And a length of steel tube with a 20mm ID:
(188.98 KiB)
I drilled and tapped 2 holes for grub screws to hole the collet holder in place:
(166.5 KiB)
I tried this out and it was a major improvement over the bought handle, so to make it more comfortable to use I bought a length of foam sold for the handles on gym equipment:
(196.65 KiB)
I then turned a wooden knob to fit in the other end of the tube:
(115.19 KiB)
I drilled a hole for a screw to hold it in place:
(116.89 KiB)
Then I slid the foam over the pipe and fitted a screw:
(113.13 KiB)
Here is the finished tool, it works well and is quite nice in the hand as well:
Nice job. I’ve also made my own tools and handles. I use thick wall alloy tube or wood with ER20 chucks. With the tubular ones you can easily add a steel slug in the handle to increase the weight but I’ve not found it necessary so far. |
252 U.S. 496 (1920)
BOEHMER
v.
PENNSYLVANIA RAILROAD COMPANY.
No. 191.
Supreme Court of United States.
Argued March 10, 11, 1920.
Decided April 19, 1920.
CERTIORARI TO THE CIRCUIT COURT OF APPEALS FOR THE SECOND CIRCUIT.
*497 Mr. Edwin C. Brandenburg and Mr. Thomas A. Sullivan for petitioner.
Mr. Frederic D. McKenney, with whom Mr. John Spalding Flannery was on the brief, for respondent.
MR. JUSTICE McREYNOLDS delivered the opinion of the court.
Relying upon the Federal Employers' Liability Act, petitioner sought damages for personal injuries sustained by him November 8, 1915, while employed by respondent as brakesman. He claimed that the railroad was negligent in using a freight car not equipped with handholds or grab irons on all four outside corners; and also in failing to instruct him that he would be required to work about cars not so equipped. The car in question had secure and adequate handholds on the diagonally opposite corners. Being of opinion that this equipment sufficed to meet the commands of the statute and that, under the circumstances disclosed, failure to instruct the petitioner concerning possible use of such car did not constitute negligence, the trial court directed verdict for respondent.
The Circuit Court of Appeals affirmed the consequent judgment. 252 Fed. Rep. 553.
*498 Section 4 of the Safety Appliance Act of 1893 (27 Stat. 531), provides:
"That from and after the first day of July, eighteen hundred and ninety-five, until otherwise ordered by the Interstate Commerce Commission, it shall be unlawful for any railroad company to use any car in interstate commerce that is not provided with secure grab irons or handholds in the ends and sides of each car for greater security to men in coupling and uncoupling cars."
Petitioner insists that the Act of 1893 was designed for the safety of employees and specified grab irons or handholds in the end and sides of each car as one of the essential requirements. That while it did not specifically command that these should be placed at all four corners, this was the obvious intent. But the courts below concurred in rejecting that construction, and we cannot say they erred in so doing. Section 4 must be interpreted and applied in view of practical railroad operations; and having considered these the courts below ruled against petitioner's theory.
Likewise we accept the concurrent judgment of the lower courts that the carrier was not negligent in failing to give warning concerning the use of cars with handholds only at two diagonal corners. Whether this constituted negligence depended upon an appreciation of the peculiar facts presented, and the rule is well settled that in such circumstances where two courts have agreed we will not enter upon a minute analysis of the evidence. Chicago Junction Ry. Co. v. King, 222 U.S. 222.
The judgment is
Affirmed.
|
This is, obviously, not a MIL-STD AR. I don’t know of any AR pistol in a unit’s MTOE. Beyond that, the guts of the Ruger AR-556 pistol are a little different.
JWT for TTAG
Ruger chose the bolt carrier type found on the old Colt SP1. Essentially, the carrier has material removed from under the firing pin leaving it “un-shrouded.” In the picture above, the Colt bolt carrier group is on the left, the darker Ruger BCG on the right.
When used with a notched hammer, which the Ruger pistol also has, this carrier style was billed as a safety feature in the case of a malfunctioning, or perhaps removed trigger disconnector.
In that case, this set-up would catch the firing pin on the notched hammer, interrupting a potential slam fire. I have never actually seen this happen on an unmodified trigger, but in theory, it could.
JWT for TTAG
If you want, you can swap out the BCG entirely. I threw in a Colt BCG in the Ruger pistol without issue. However, you can’t just swap out the firing pins. They’re different.
In the photo above, the smaller-collared Ruger pin is the darker pin on the bottom left, the bright Colt pin is on top. If you’re particularly worried about firing pin breakage (I’m not), buy another pin from Ruger.
JWT for TTAG
The barrel is cold hammer-forged 4140 chome-moly with a five-groove 1:8″ twist rate. The feed ramps are standard M4 type. The bolt is 9310 tool steel.
There’s the infinite debate there, and it’s purely academic, but in terms of quality, I prefer 9310 over Carpenter 158. When properly heat treated, it’s tougher than Carpenter 158, but only by a small margin.
According to Ruger, the bolts are shot peened and pressure tested. The bolt carrier and gas key are both chromed and the gas key itself is well staked in.
JWT for TTAG
The Ruger website states that the BCG has a “matte black oxide finish.” That likely works fine, but it’s not phosphate coated. The receivers themselves are 7075-T6 aluminum forgings and include the classic Type III anodizing. The upper receiver includes the familiar forward assist.
JWT for TTAG
Instead of what has become the almost de facto grip on budget brand name AR’s, this one didn’t come with Magpul furniture. The pistol grip is Ruger branded and I don’t recognize the manufacturer, assuming Ruger isn’t molding the grips themselves.
The nylon grip is firm, without spongy give, and is hollow in the center. There is no floor plate on the grip to use the hollow space as a storage area. That’s disappointing, as I’d definitely store an extra set of earplugs in there, just in case. Firing a 10 1/2″ barreled 5.56 NATO without ear protection means instant and long-lasting damage to your hearing.
JWT for TTAG
The hand guard is M-LOK compatible, and its 9-inch length extends to just short of the muzzle. The pistol doesn’t come with any additional rail pieces, but has slots at the standard 3, 6, and 9 o’clock positions.
In front of that muzzle is Ruger’s own flash hider. Although this looks a lot like a traditional M4 birdcage hider, it’s not quite. Those MIL-STD hiders are solid at the bottom, providing a very small amount of a muzzle brake effect (at least that’s the theory). The Ruger brake has slats cut along its full circumference.
JWT for TTAG
If you look closely, you’ll see the pistol uses a carbine-length “direct impingement” gas system, extending almost to the end of the rail. That is much appreciated, as the carbine-length gas system has always seemed easier to get right and more reliable than the pistol-length systems.
I really can’t stand a 10.5″ barrel unless it has a silencer attached to the end of it. There’s just so much noise and flash that any indoor shooting is unpleasant.
Fortunately, the Ruger AR-556 pistol‘s barrel is already threaded so you can put a silencer on it to tame the flash and boom. Be careful in your silencer selection. Some silencer companies don’t rate their 5.56 cans for such a short barrel.
JWT for TTAG
The key feature making this gun a pistol is the fancy new SB Tactical SBA3 adjustable brace. I’m not a big fan of pistol braces when used as a stock. Do they work well enough? Maybe, but they’re a poor make-do alternative to a real stock.
That said, the SBA3 adjustable is definitely my favorite of the pistol braces. It’s robust, adjustable, and doesn’t dig into my chest if I shoulder it.
Of course, according to the Ruger manual, when I shoulder the pistol I’m misusing the brace:
This brace is designed and intended to provide the user with additional support for better control of the pistol while firing from a singlehanded shooting position. NOTE: The pistol brace is not intended for use as a shoulder stock. The brace should only be used as outlined in this Manual. (See “Pistol Brace Adjustment & Function” section, p. 27.)
JWT for TTAG
I have a few friends who are missing an arm, hand, or who, because of injury, have diminished use of their hands. The SB Tactical brace is a game-changer for them.
They worked OK until SB Tactical started making them a little more solid and made them adjustable. Now they fit extremely well and don’t wobble on the arm when canted.
Ruger has offered different triggers on its ARs in the past. This one definitely has a mil-spec feel to it. It breaks at about 8 lbs and there’s tons of grit and squishy-ness in it.
Ruger offers their 452 trigger as a drop-in replacement and it, or something like it, would be one of the first things (other than adding a silencer) I’d do to this gun.
JWT for TTAG
The Ruger AR-556 pistol ran perfectly. As usual, I put 500 rounds through the gun for testing. I used the supplied Magpul polymer magazine, several of my own, a Surefire 60-round magazine and several GI style metal magazines.
I shot 55gr FMJ, green tip, 75 and 77gr OTM, as well as my own home-rolled 64gr soft point rounds I use for white tail culling. No round failed to load, fire or eject. No magazine failed to lock in, stay locked in during firing, or fail to easily release. As usual, I did not clean the firearm at all during the entire test cycle.
JWT for TTAG
I spent most of my time with this gun with the Aimpoint Patrol Rifle Optic mounted to it. Even with a brace instead of a stock, the 5.56 NATO has so little recoil that keeping the 2 MOA dot centered on targets for multiple shots out to 100 yards wasn’t particularly challenging.
That said, it’s closer in where the short-barreled guns really shine. It’s nothing to move the muzzle for fast transitions. In fact, the challenge is stopping the muzzle fully when firing.
JWT for TTAG
Where AR pistols don’t shine is the previously mentioned flash and noise, especially indoors. I have a few SBR’s, but they are all at least 12.5”. It makes a difference.
I assume the reason many folks settle on 10.5” is that this is the length of the original Colt Commando. Those are awesome, handy little guns, but it’s important to remember the originals came with a 4 1/4” “sound modulator” that helped with the blast and noise. Currently, the ATF considers those “sound modulators” in the same category as a traditional suppressor.
Of course, you could go the other way and put an aggressive muzzle brake on the AR-556 pistol. You’d effectively have a firearm that debilitates everything in front as well as to both sides of the muzzle. Success!
JWT for TTAG
On the bench, the AR-556 pistol performs adequately. Mounting a US Optics 10X scope (which looks ridiculous), I shot four 5-round groups at 100 yards, all with the pistol mounted in a Caldwell Stinger Shooting rest.
Several store-bought rounds hovered at the 1.5” mark.The best-shooting round, as always it seems, was IMI’s 77gr Razor Core ammunition, which averaged right at 1.5”. Really, this is still the best stuff I can find on the market.
There are a lot of great things about AR pistols. First, the brace allows those with limited mobility to enjoy shooting and hunting with an AR. The rest of us get the benefit of a fairly small firearm with tons of capability out to reasonable ranges, all in a small package that’s legal to own without having to jump through the NFA hoops. They’re a win for everyone.
JWT for TTAG
Ruger’s AR-556 pistol is a solid offering with good basic features. The quality SB Tactical Brace means that the gun will fit everyone, but won’t be particularly cheap. The MSRP is $899, but the pistol has a street price of around $750.
Customization * * *
If you want to legally put a stock on it, get permission from our benevolent overlords first. Be mindful of changing BCG parts, as the BCG is not the standard MIL-STD carrier or firing pin.
Reliability * * * * *
Runs like a champ.
Accuracy * * * *
Better than any of the guns the Army ever issued to me, but right on par with commercial offerings in this price range.
Overall * * *
A decent gun at a decent price. The non-standard BCG is both a feature and a bug, so that washes out on the rating.
comments
A gun review? It’s another unpaid ad for another AR-15. Really. Who could possibly care? I got a couple of paragraphs into it, went back to my search engine and started looking for a Randall #10 Saltwater Fisherman, 7″, Rosewood. Good+ condition for sale. Anyone?
jw, I actually read the whole article before I started looking for a Randall #10 again. I think they called that “literary license” when I was in my English writing class after my ETS. The intent was the same. It’s another AR-15. This one with a 10″ barrel and a “pistol” grip that could easily go the way of bump stocks. Reminds me of buying eggs in the grocery store. Unless one is obviously cracked, they all look the same. Sorry.
And I was first issued the AR platform in 1979 and was forced to use them, off and on, until 2014. Even owned a few private ones. They all malfunctioned to excess. My H&KS and Galils are bigger, heavier and more expensive. But they work.
Gadsen Flag, I have no issue with “it’s just another AR15” portion of your comment. Believe me, it’s not easy writing about the same platform, over and over again. Which is why the minor differences, like pointing out the BCG cut and the uses of the brace and why the adjustable brace matters, are actually the important parts of the review. I went back and read a few other reviews of this gun since I published it. None of them mention those things. They all just pointed out how great the gun is. And it’s a mediocre gun, as I wrote.
That’s where TTAG has been different. At least that is how it is supposed to be different, and why I still continue writing for this publication. I have had, and continue to have, many offers with other publications, but they don’t let me just write it as I see it.
That’s why your accusation that this is just an ad is so insulting. You’ve accused me of simply being a mouthpiece for a vendor instead of doing real objective work. You’ve accused me of having no integrity. And you did it after saying you only read the first two paragraphs. That is juvenile, and just shitty.
I’ve generally enjoyed your comments in the past, and usually they are fairly well thought out and presented. But here, you were just being an asshole for the sake of being an asshole, insulting me and my work.
Jw, I didn’t realize you were the author. My sincere apologies to you. No offense was intended. No matter who the author was. It just that I’m tired of reading about ARs. Any AR. The difference from one to another is not worth mentioning. As I said my experience with the system began in ’79 and ended in ’14. It’s a mediocre weapon. When the concept of the “patrol carbine” was coming on line I took a class presented by the Florida SWAT Association. They insisted you shoot an AR. It was all the instructors were familiar with. I brought a department issued Colt M-4. I was prone and clearing another malfunction when one of the instructors asked me, “What’s wrong with that rifle?” I looked up and said, “It’s a fucking M-16! That’s what’s wrong!” He walked away without comment. I too have enjoyed your comments. I get the feeling you have seen the elephant. Yesterday you mentioned the Ruger Bisley. That would be interesting reading. Not just a range session. Hit the backcountry with one and tell us about it. Again, I’m sorry if I offended you. I’m really not an asshole. I just play one on TV.
Also jw, you have to understand. I’m an old fart and have my prejudices. I came of age when HKs, FN FALs, BM 59/62s, etc. were as common as dirt and could be had for less than retail. And I’ve owned them all and then some. After a $50 factory rebate I had $350 in my first HK 91. That would have been 82-83 because my platoon sergeant gave me the check at mail call. To be honest I’ve thought about buying an AR. My policy is if I’m more than a tank of gas from home I take a rifle and support gear. I wouldn’t like it, but I could absorb a $1000 AR being stolen from my car/hotel room. I couldn’t afford to replace much of what I now own. Once I met a friend in Panama City to do a little diving and spear fishing over the weekend. I checked out of the hotel and, like the dumb ass I am, left an Eagle discreet carry bag containing a Galil AR with a four cell chest pouch w/mags. When I realized it I turned around, called the hotel and considered myself lucky to recover it. My ex left several thousands of dollars of jewelry in the Hard Rock Hotel Casino Biloxi. We never saw that again. Anyway, the AR. I just can’t bring myself to bet my life on one. I do understand why many do. Unfortunately, it’s about the only thing available a working man can afford. At least there are better mags today.
Gadsden Flag, thank you for the apology sir, and I apologize for replying so strongly and so quickly.
If you get bored with ARs, imagine how bored I get. But when you look at the traffic from the site, what readers mostly want to read about are ARs and polymer frame striker-fired pistols.
I do my best to make those reviews valuable and interesting for the reader.
Since the most common complaint on my reviews is tldr, I removed a lot about the BCG cut, the notched hammer, and the small collared firing pin.
I find it difficult to believe that the intention was to make sure that people could not turn this into a full auto gun, since a BCG swap is pretty simple. Moreover, slamfire detonation on a factory trigger is phenomenally rare. Hell, if people want to turn their ARs into slam fire weapons, they should just start setting their primers high.
Since this is a less common cut, I can’t imagine it would be less expensive. I am at a loss as to why Ruger would not just go with a mil-spec BCG, or at least one closer to that.
There are perfectly reliable AR platform weapons out there. I’ve seen one from Sons of Liberty go 17000 rounds without a cleaning, much less a malfunction. I have several that have gone through a 2000 round course without issue.
That said, the guns that I have that are in my truck, and that I would take anywhere, are usually not Stoners design.
Gov, don’t know about on paper, but in the real world here’s a hypothetical. You’re in the woods with things that have teeth, claws and an affinity for meat. Maybe yours. You have a choice. A 10″ barreled .223 caliber spitting out 55 grain softpoint, or a 6 1/2″ .44 mag loaded with 300 grain Buffalo Bore hard cast semi wadcutter. Don’t bother to answer. The question was rhetorical.
Yeah, I figure with the warm loads (not +p) the .44 has the power of XM193 out of a 16″ barrel, and you’d get much deeper penetration out of the heavier bullets in .44. But on the other hand, if I had to make a 200 yard shot the AR pistol would probably be better. It would help if it had the 3-1/2 lbs trigger that the Blackhawk has though.
At two hundred yards the tooth and claw is not an issue. .223/556 are good for two things. Varmints and humans within their respective range and bullet type. Stick with bigger, deeper holes. They work better.
Which brings me to the real issue I’d have with AR pistols – this thing weighs 6.2 pounds, the AR-556 weighs 6.5 pounds. The only advantage this thing has over an AR rifle is it’s 7 inches shorter (collapsed). If you could come up with a <4 pound (with optic) pistol capable of reaching out a couple hundred yards with sufficient accuracy I'd be interested, but I just don't see the appeal of these.
That said, I would consider saying the GP was the revolver equivalent to the Glock 17/19 to be an apt description. (Or would that be the Glock is the semi-auto equivalent to the GP?) Still prettier though.
Gov, you misunderstand. I know GP 100s work and they’re as strong as an I bream of steal. I just don’t care for them. Love a Security Six. Just a personal thing. And yes, they will out last the three or four Smith .357s I own. Even my Python. I won’t care though. They’ll be patting me in the face with a shovel before that happens. In the meantime, let’s just enjoy shooting what we own and like.
I can see the Security 6 appeal. The GP does depend a bit on the furniture, kind of like an AR. My wife inherited an AR from her brother (who was smart enough to take an argument with his girlfriend out in public and now subsequently can’t own firearms) and it was a real yawner IMHO. But when I dressed it up in Magpul OD furniture and dropped a Timney trigger in it it magically transformed into a semi-OK rifle… I really like the Altamont grips (rubber with wood side panels) and really hate the Hogues. Of course, with the Glocks you don’t get to change out the furniture. Now the Blackhawk came with rubber grips but now it wears laminated rosewood grips and it’s just damn pretty.
If Ruger would make a Bisley framed gun, just like their Bisley hunter in 44 Magnum, but chambered in 45 Colt and built to handle the pressures that cartridge is capable of, I have to believe that they would be huge sellers.
I base that opinion off of what I have been willing to pay for Linebaugh’s gun and what many people are willing to pay for a Freedom Arms 45 Colt.
If they could keep the price under $1,500 they couldn’t keep them on the shelves.
That is the gun that I would pick. and effectively have picked, for brown bear country.
But I’ll tell you this, now that I’ve spent a little time with Grizzlies in the wild and up-close, no handgun is enough. Few rifles are enough.
I will never forget the first time I watched a furry Volkswagen running down the mountain. It was big, and it was fast.
Did I mention it was big?
Jw, I didn’t see your reply to my Bisley post until a minute ago. I agree. The Ruger Bisley will sell. However, I believe it would be more a discerning shooter’s revolver. Unfortunately, many of today’s shooters think if it’s not a Tubberware pistol it’s not a real pistol. And the Bisley, any modern single action revolver, is an outdoorsman’s firearm. There are precious few of us left. I had a Freedom Arms Field Grade in .454 Casull. Sent back to have it refitted with micarta grips. Most accurate handgun I ever owned. Even though we have a few black bears around here it was a bit much. 7 1/2″ barrel was a little longer than I like too. Besides, have a 4″ Mountain Gun and 6″ 629 that will handle them and the odd pig. Agree with your statement about the rifle. Sometimes though, I’m moving tree stands, planting food plots, just working. Need both hands free. Finally, if I ever see a 5 1/2-6″ Freedom Arms in .44 mag at a reasonable price…
The benefit of Ar “pistols” is that you can keep it loaded in your vehicle if you live somewhere you can not have a loaded rifle . You can cross state lines without having to notify the Atf that you are travelling with an sbr & you can essentially have an “sbr” without having to pay a tax stamp if you have a want or need to own one .
As to why someone would want this particular model is because they don’t know any better or will only shoot 100 rounds a year and don’t care that most Ar rifles under $1k are not milspec and use sub par components and bad qc and will have malfunctions , not if but when . This Ruger bcg along with the original Colt Sp1 bcg are colossal design failures and will cause the firing pin head to lock the hammer back not the carrier itself as it was designed and will cause damage to the firing pin and in all probability your bcg and trigger group . This was a huge mistake on Ruger’s part using a horrible design by Colt that was a fear related decision on neutering scary full auto carriers for the public back in the day .
Sorry rant over
Specialist, we don’t often agree, but these AR pistols are the next thing to useless. You’re right, I’d rather have a lever action carbine. Looking at a Marlin Texan now I bought recently. I want to put a set of ghost ring sights on it before I deploy it. Too many irons in the fire.
Specialist, we often don’t agree, but on this we do. If I had only one rifle it would be a Scout. Had mine built by Jim Brockman on a stainless Winchester Model 70 action before the Styer came out. Jeff Cooper and I discussed it at SHOT. A friend has a Styer. Still prefer my Brockman 70. If you don’t own a Scout, of some configuration, you don’t a general purpose rifle.
I own two different AR pistols, a 5.7 and a 556. And I love to shoot both regularly.
They may be useless to you but they shoot fine for me, accurate to about 150-200 yards with a red dot, which, given my eyesight, is about the same for my 16 and 18 inch barreled AR rifles.
Smaller so easier to maneuver in small spaces, no ATF tax stamp, fun to shoot. Am I a mall ninja? Probably 🙂
Doesn’t matter though, if someone wants one, and it legal to own, they can buy it, because freedom.
Having said that I’ve built my 556 platform one for less than the price of this Ruger, but with a 2 stage match trigger, a vortex red dot, nickel boron BCG ( cause I hate to clean) and a flaming pig (cause I like it :)… I know their market but people need to look into just building their own, even new gun owners.
PSA has pistol kits on sale (including 300 AAC) regularly for about 250-300 with a BCG, Lowers go for about 40-60, red dot is 100-150 including finding one used online, flaming pig is 120, and a decent trigger for about 85….. building your own? Priceless.
In 556, I have to agree with you. From 16″ to 10″ you lose almost 500fps. They never fall down into pistol territory, but it’s horribly wasteful. OTOH, give me 300blk in an 8in with the ballistic profile of 45acp at subsonic and I’m all in for the AR pistol format. 30 rounds of medicine.
I also have a Sub2000. Not because I think it does any better, but for the fact that 9mm is ubiquitous. Everybody needs something in 9mm.
It’s “brake,” as others have said.
Unfortunately, though, the author got this wrong.
The flash hider without the slot on the bottom is designed that way to act as a compensator as well as a flash hider, keeping the muzzle down, and not as a brake.
Otherwise, a pretty good review, even though I, personally, don’t agree with the rationale behind the desire to own one. Seriously, if you think the short length will allow you more maneuverability as you clear your house, you just don’t know that you shouldn’t be clearing your house. If you watch as teams train to clear buildings, you would understand that clearing a building isn’t something you do alone. Far, far better to hunker down and ambush the perp, rather than inviting the perp to ambush you.
I do see the idea of using one as a truck gun where you can’t use a SBR, but, IMO, a pistol is far better in this role, as it would be easier to put someplace you can get to it easily, and is far more maneuverable within the confines of a vehicle. Of course, if you can’t keep a handgun loaded in your car, you can’t have one of these either.
That said, I’m not against someone having one. It’s just that I don’t want one.
Thank you for the spot on application of the “pistol”. I know a guy who lost his right hand and most of his right leg, and the left is pretty scarred as well, but mostly functional, and he rants about these things all the time.
Cool gun for the price. Would love to see some more like it. Maybe an SBR next?
Meet the next insturment to be used in a mass shooting by a leftist nutjob then subsequently banned. (Pistol brace)
Why the hell do y’all need a fully semi automatic Machine pistol. You can’t hunt with it.
Mark my words.
I don’t know about the rest of you, but I can’t stand being next to one of these AR “pistols” at the range.
Especially indoors, the blast and fire are awful!
It ruins my range day if one of these 10.5 or 7.5 inch monsters is going off in the next couple of lanes.
I personally have never seen one with a silencer on it.
They are just like a giant boom box turned up to max.
It’s Like punching everyone around you with each shot.
I’m going to have to try a 12.5” SBR Upper. I’ve heard from a few other people that it’s their favorite length for a short 5.56 if running unsuppressed. I have a PSA CHF 10.5” and it’s a high quality upper, I just don’t enjoy shooting it.
This Ruger looks ok, but they really need to ditch that carrier for a std. full auto profile carrier like everybody else uses. I thought these and notched hammers went extinct in the 1990’s. They also need to nitride their barrels. There is no excuse not to.
As things are now, I’d rather have a PSA 10.5” A2 kit. You can get one with the SBA3 brace a nitrided barrel and carrier (full auto profile) and their enhanced trigger for around $329 shipped when there is a sale. Their lowers are also on sale right now for $29. I don’t feel the need to free float a 10.5” barrel, but PSA has cheap kits for that too. Their budget rails are just ok, not great.
I was glad to see this review. I just recently purchased a Ruger AR556 pistol. I like it a lot. Put a hundred rounds through it last week. It worked fine with the Pmags, but the Brownell’s 20 round metal mag caused some problems. The mags were very difficult to remove and there was one fail to feed with it. I knew about the different style BCG, but didn’t realize the firing pin was different. I really like the AR556 pistol and got a good deal on it for $570 shipped, but the 10.5: barrel is still too long for my liking. So I bought a 7.5″ 300 Blackout upper from Palmetto State Armory. To me it is more pleasant to shoot. Not quite as loud and hardly any muzzle flash.
Thanks for the article jwt. I have purchased this Ruger, but have not received it yet. I found this review very informative and well written. I am not sorry that I bought this pistol. I have been shooting ARs and M16s for 50 years and am still a big fan. Thanks again.
Two quick questions please. Assume limited funds for firearm purchase. Given this Ruger AR pistol is maybe 3 to 4 inches shorter than its full-sized cousin, is there any real reason to buy it other than novelty or being able to have a really big pistol? And given I already own an AR or two, would you be more inclined to try something new, like an M1 Carbine? Both are good arms for the intended range. |
// Copyright (c) 2015 Dave Collins <dave@davec.name>
//
// Permission to use, copy, modify, and distribute this software for any
// purpose with or without fee is hereby granted, provided that the above
// copyright notice and this permission notice appear in all copies.
//
// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
// ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
// ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
// OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
// NOTE: Due to the following build constraints, this file will only be compiled
// when the code is running on Google App Engine, compiled by GopherJS, or
// "-tags safe" is added to the go build command line. The "disableunsafe"
// tag is deprecated and thus should not be used.
// +build js appengine safe disableunsafe
package spew
import "reflect"
const (
// UnsafeDisabled is a build-time constant which specifies whether or
// not access to the unsafe package is available.
UnsafeDisabled = true
)
// unsafeReflectValue typically converts the passed reflect.Value into a one
// that bypasses the typical safety restrictions preventing access to
// unaddressable and unexported data. However, doing this relies on access to
// the unsafe package. This is a stub version which simply returns the passed
// reflect.Value when the unsafe package is not available.
func unsafeReflectValue(v reflect.Value) reflect.Value {
return v
}
|
Keiichi Itakura
is an organic chemist and a Professor in the Department of Molecular and Cellular Biology at the Beckman Research Institute at City of Hope National Medical Center.
Itakura was born in Tokyo, Japan on February 18, 1942. He obtained a PhD in Organic Chemistry at Tokyo Pharmaceutical College in 1970. He then accepted a fellowship with Saran A. Narang at the Division of Biological Sciences, National Research Council of Canada, to work on DNA synthesis.
In 1975, Itakura joined City of Hope National Medical Center. There he was part of a team of scientists including Arthur Riggs who developed recombinant DNA technology. By 1976, the first artificial gene had been synthesized, by Har Gobind Khorana at MIT, and the possibility of synthesizing insulin through bacterial fermentation by incorporating a gene for insulin into a bacterium such as E. coli had been suggested.
Itakura and others succeeded in synthesizing a plasmid containing chemically synthesized lac operator in 1976, using a technique they called "linker technology".
In 1977, Itakura successfully synthesized the gene for somatostatin. Production of somatostatin, a hormone produced in the human brain, was not expected to be commercially significant. However, the work was considered a possible first step towards the creation of a synthetic insulin. Building on Khorana's work, Itakura developed a technique that reduced the time involved in successful synthesis from years to weeks. He then inserted the gene for somatostatin into E. coli. This was the first demonstration of a foreign gene inserted into E. coli.
By 1978 Herbert Boyer's biotechnology startup Genentech had contracted with Riggs and Itakura, and Boyer and Itakura had created a plasmid coded for human insulin. Genentech signed a joint-venture agreement with Eli Lilly and Company to develop and market the technology. Their product, Humulin, approved in 1982 by the FDA, was the first biotechnology product to be marketed. Genentech patented techniques that list Itakura and Riggs as the inventors, and are known as the Riggs-Itakura patents.
As their principal organic chemist, Keiichi Itakura was essential to the success of Genentech's development of synthetic insulin. His work on recombinant DNA technology has had a significant impact in molecular biology and biochemistry.
Keiichi Itakura became a senior research scientis at City of Hope in 1980. In 1982, he formed the Department of Molecular Genetics (later the Department of Molecular and Cellular Biology). Itakura became director of City of Hope's genetics laboratory in 1989. he continues to work and teach at City of Hope.
Awards and honours
1991, Member, New York Academy of Sciences
1979, David Rumbough Scientific Award, Juvenile Diabetes Research Foundation
References
Category:Living people
Category:1942 births
Category:Japanese molecular biologists |
1. Field of the Invention
The present invention relates to a solid fuel burner and furnace construction.
2. Description of the Prior Art
In the prior art, various furnace constructions having been advanced for burning solid fuel, including coal. Many have also used stepped burner grates, but the problems with complex drives, complex mounting, and inadequate movement of the grates have continued to limit their success. For example, in the prior art, a typical stoker-actuated coal burning apparatus is shown in U.S. Pat. No. 4,007,697 which utilizes a furnace cabinet having a burner with a rotating disk thereon. This shows a heat exchanger that provides for a curved path for the heated products of combustion and a separate burner blower.
U.S. Pat. No. 945,469 issued to Mapel on Jan. 4, 1910 shows a stepped grate in an automatic stoker apparatus wherein the grate assembly is mounted on wheels that can be moved in and out of the furnace, and includes a crank mechanism which has a double-acting lever arrangement to reciprocate the adjacent stepped grates in opposite direction when the crank rotates. However, the drive requires a complex lever system and the grate plates themselves are supported only on the lever arrangement, thus increasing wear on the actuating members, and tending to cause jamming and excessive loads in the heated, ash-filled environment in which the grates must work.
U.S. Pat. No. 1,644,953 issued to Seyboth on Oct. 11, 1927 is typical of a number of patents in the prior art which show a stepped grate where every other grate plate is fixed, and then the intermediate plates or bars forming the steps are driven to reciprocate. Very complex gear drives are utilized, and the grates are separated into sections for movement, resulting in the need for a large number of links, bell cranks, and levers.
U.S. Pat. No. 505,748 issued to Campbell on Sept. 26, 1983 shows a grate assembly that has a plurality of bars that are mounted on side plates and which interfit between stationary bars and reciprocate as a unit. The unit is mounted on roller-type bearings, and all of the movable grate bars thus reciprocate as a unit relative to the interfitting stationary bars.
U.S. Pat. No. 2,137,158 to Douglass issued Nov. 15, 1938 shows a "clinker cooling" arrangement using stepped grates and having reciprocating step members with a cooling fluid going through the plates. Every other grate bar is fixed. The unit is used primarily for cooling Portland cement clinkers.
U.S. Pat. No. 795,388 issued to Googins on July 25, 1905 shows a reciprocating terraced furnace grate, and in particular in FIGS. 9 and 11, the end edges of the grates are shown to be tapered. However, the grate bars also appear to be supported on lower rollers of car-type structures so that the grate bars on one of the cars interfit or interleaf with the grate bars of the other car, and then they are oscillated in opposite directions as they are used. The grate bar surfaces incline slightly downwardly.
U.S. Pat. No. 4,103,627 to Mainka issued Aug. 1, 1978 shows a grate construction which has reciprocal grate members made up into individual sections that are pivotally mounted to their supporting members. Some of the grate bars reciprocate relative to other grate bars.
The use of holes or openings through burner grates is also shown in the prior art, for example, U.S. Pat. No. 2,137,158 mentioned above, illustrates holes in the grates, but tapered in opposite direction from those disclosed in the present application. U.S. Pat. No. 1,403,609 issued to Leonard et al on Jan. 17, 1922 also shows reciprocating grates with tapered holes, but which are mounted in a substantially different manner than the present device. The grates in U.S. Pat. No. 1,403,609 do not reciprocate although pusher members are provided between the vertically spaced grates. U.S. Pat. No. 703,068 issued to King on June 24, 1902 illustrates a mechanism for driving sliding grate members from a type of feed auger, as does U.S. Pat. No. 2,119,937 issued to Banfield on June 7, 1938. In the Banfield Patent a rotating grate is driven from the stoker auger.
U.S. Pat. No. 527,453 issued to Richards on Oct. 16, 1894 shows a traveling floor furnace where there are elongated grate members which move, and which are inclined rather than stepped.
U.S. Pat. No. 804,457 issued to Cox on Nov. 14, 1905 shows an ash conveyor for furnaces which uses reciprocating stepped members, and U.S. Pat. No. 1,186,971 issued to Davis on June 13, 1916 shows a grate member that has plates that tilt under mechanical action to move materials.
U.S. Pat. No. 2,294,269 issued to Bennett on Aug. 25, 1942 shows a stepped, movable, water-cooled stoker having plates that slide relative to support shelves, but designed to include the water cooling for absorbing heat quickly.
U.S. Pat. No. 4,172,425 issued to Sheridan on Oct. 30, 1979 shows an incinerator that has movable members for transferring waste through the incinerator, but not a stepped grate construction such as the present invention, and U.S. Pat. No. 3,413,938 issued to Dvirka on Dec. 3, 1968 shows another form of a stepped grate member where the material is primarily moved by pushing grates against the material to cause it to move downwardly as it is burned.
The prior art, while showing a wide variety of stepped grates and furnace constructions, fails to teach or suggest a unit arranged with the stepped grate construction of the present invention in a furnace cabinet that provides for a high efficiency of air flow and heat exchange. |
Field
The invention relates generally to generating an exercise presentation of a recorded exercise and displaying the exercise presentation.
Description of the Related Art
Nowadays people like to analyze their training data afterwards via a display, such as a computer screen. However, the current way of showing the information of a training event (which may have a considerable length) to the viewer does not illustrate the training data in a clear, readily understandable manner. Furthermore, the traditional presentation of recorded training data using static graphs, bars and texts is considered as rather serious and not entertaining. Therefore, an improved manner of showing the training data is needed. |
Hodgkin's disease: complications of therapy and excess mortality.
The long-term survival of patients treated for Hodgkin's disease permits careful evaluation of long-term complications and excess mortality. Between 1960 and 1995, 2498 patients who were treated for Hodgkin's disease at Stanford University were evaluated. Survival, freedom from relapse, and important complications of therapy (cardiac disease and secondary cancers) were analyzed, and risk of mortality from all causes was calculated utilizing absolute excess risk calculations. The risk of death from Hodgkin's disease is 17% at 15 years of follow-up and increases only slightly thereafter. The risk of death from other causes is also 17% at 15 years, but increases sharply thereafter. The major causes of mortality (other than Hodgkin's disease) are secondary cancers and cardiac disease. Second cancers with significant increase in risk include leukemia (acute nonlymphocytic), non-Hodgkin's lymphoma, lung/pleural cancer, breast cancer, melanoma, soft tissue and bone sarcomas, stomach cancer, salivary gland tumors, thyroid cancer, and pancreatic cancer. The absolute excess risk of death from causes other than Hodgkin's disease increases during each five-year follow-up interval for at least 25 years. However, the absolute excess risk of death during similar follow-up periods is less for patients treated in more recent years (1980-1995) than in the prior treatment era (1962-1980). Mortality for causes other than Hodgkin's disease is important in the long-term follow-up of patients. Causes of death are often treatment related. Changes in treatment programs can reduce the long-term excess risk of death from complications of therapy. |
Entertainers have been announced and ticket sales begun for the 2014 Los Angeles Pride festival, which Christopher Street West (CSW) is billing as a “TLGB” celebration, with the T-first letter reflecting a focus on transgender issues.
“This year, Christopher Street West decided to make a bold statement about our commitment to education by leading with a capital T,” Steve Ganzell said in a March press release. Ganzell is a co-president of CSW, the nonprofit that organizes Pride.
The event, which will take place June 6-8 in West Hollywood, will feature Jennifer Hudson, Azealia Banks, the Bangles, Mary Lambert and Betty Who. The festival will include a “TranStation” lounge with trans-oriented programming. The moment of silence during Sunday’s parade, done each year in honor of lives lost, this year will be dedicated to transgender lives lost to hate violence, a tribute to the annual Day of Remembrance.
Ganzell recalls sitting near Zoey, a young trans girl, and her mother, Ofelia Barba Navarro, at the 2013 Transgender Day of Remembrance. The mother and daughter (both now members of the CSW coalition) spoke at the event about Zoey’s experiences being bullied at school. During the Day of Remembrance program, community members read the names and stories of trans people killed because of their gender identity. Ganzell was moved by how hard it must be for the parent of a trans child to hear such stories.
“We’re all a part of this community,” said Ganzell, who hopes to “shine a light” on trans people’s stories and “put the laser focus on all of this.”
Pride has been criticized for its ticket prices, entertainment lineup and programming. Ganzell said that he and co-president Patti DiLuigi—both longtime board members who took the helm late last year, succeeding longtime president Rodney Scott—wanted to listen to community members who have felt left out of Pride.
Among those they’ve heard from are transgender people who felt Pride could do more to include the trans community. This year, CSW organized a volunteer transgender coalition to brainstorm and work on initiatives, including a recent transgender history tour at the ONE Archives and an upcoming Trans 101 panel for media (which will be co-sponsored by several media groups).
E. Jaye Johnson, vice chair of the city’s Transgender Advisory Board, wrote an Advocate.com commentary about Pride’s focus on the trans community.
“No longer will trans people sit idly by and quietly wait for anyone to acknowledge, approve, support, or empower them. The trans movement is passionately pushing forward. It’s a young movement and ideally benefits from the experience and knowledge of our LGB community members and our allies and we cannot wait any longer,” Johnson wrote. “Christopher Street West gets this, hence the creation of the Transgender Coalition to utilize the power of LA PRIDE to educate and celebrate, and the reason I am honored and proud to be a part of it.”
The topic is timely, with trans issues in the media a lot in recent months. Actress Laverne Cox and model Carmen Carrera recently called out Katie Couric for focusing on trans people’s bodies rather than their lives, which often include violence and job discrimination. The use of a slur for trans people on RuPaul’s “Drag Race” sparked a lot of online discussion. And Facebook added an array of choices for users to define their gender identities.
Ganzell said that he’s received a lot of input about what people would like to see at Pride, and he hopes to continue to meet with people from different communities and hear about what they’d like to see at the event in the future. For example, he’d like to address the needs of older LGBT people and people with disabilities.
WEHOville contributing editor Stevie St. John is a member of the CSW Transgender Coalition, a volunteer group that includes trans leaders, students and allies. She is also on the board of the local chapter of the National Lesbian & Gay Journalists Association, one of the co-sponsoring organizations for the Trans 101 media panel.
|
**While we encourage visitors to taste the wines, craft beers, ciders, and spirits found all over the Commonwealth, you should always use a designated driver when drinking. Please use good judgement traveling between the wineries, breweries, cideries, and distilleries mentioned in this article. For Nelson County, check out the different tour options through Hop on Cville**
A hidden gem in the Blue Ridge Mountains, Nelson County is known for an abundance of outdoor recreation, from trail hiking through the mountains to cycling the challenging curves of the winding roadways. But the county has also become a mecca for craft beer, wine, and spirits enthusiasts, containing almost a dozen wineries, three cideries, six craft breweries, and three distilleries, with new additions opening each year. Follow the Brew Ridge Trail through Nelson County to get the full tasting experience during your visit. Use our comprehensive guide to Nelson County for an easy and affordable three-day getaway in Virginia!
—TRIP PLANNING OVERVIEW—
Stay at: Wintergreen Resort, starting at $135 per night.
Sitting on 11,000 acres atop the picturesque Blue Ridge Mountains, Wintergreen Resort has accommodations for every size group, whether you’re traveling solo or you’ve convinced a dozen friends to wise up and take a day off work with you. They even have exclusive luxury property rentals with up to nine bedrooms for an unforgettable group getaway.
While Wintergreen has all the typical winter resort sports like skiing, snowboarding, snow tubing, and ice skating, the remaining three seasons offer plenty of activities for visitors, with the added bonus of avoiding the crowds that often flock to snow-covered slopes on the weekends. Two golf courses, indoor and outdoor tennis, a full service spa with both indoor and outdoor pools, and on-site hiking trails are all within the resort grounds, providing hours of active entertainment during the resort’s warmer seasons.
Get a taste of the additional outdoor offerings at the Discovery Ridge Adventure Center, where you can try the climbing tower, bungee trampoline, 900-foot downhill zipline, summer tubing, and mini golf for $59. Plus, this five-pack of fun is transferrable, so if you’re feeling a nap, a friend can step in and finish out the activities.
For extreme sports enthusiasts, the resort opens their mountain biking trails in May. These cross-country trails are for experienced riders only, and are not suitable for beginners or novice mountain bikers.
Four restaurants on the property serve up everything from upscale fare to casual quick bites. We got the inside scoop that James Beard awarded Chef Edwin Scholly will be joining the culinary team at Wintergreen Resort, so you won’t even have to leave the mountain to get world-class cuisine during your visit.
Keep an eye out on the Wintergreen Resort website, as they often announces special deals and packages, like a Buy 2 Nights, get the 3rd night free deal, which will cut the cost of your Thursday through Sunday stay by a third (we even did that math there to save you the trouble).
Suggested Prior Reservations: Services at the Spa at Wintergreen, Tours at the Virginia Distillery Company, Tee times at Stoney Creek or Devils Knob Golf Courses
—FRIDAY—
Start your mini-vacation the right way with a few wine tastings in Nelson County. There are currently ten wineries in the region open for tastings, so you’ll need to narrow it down quite a bit or you’ll be spending days two and three recovering.
We picked three total, and for our first stop chose Veritas Vineyard & Winery, partly because they have a giant Instagram-worthy LOVEwork made out of corks hanging in the tasting room. While you can certainly order a wine tasting at their hammered copper bar, it’s very possible that many other people had the same idea to trade in their Friday coffee for a glass of vino, and you may have to wait. If that’s the case and you’re feeling a bit impatient, purchase a bottle and head outside to the patio area where the mountains create an idyllic backdrop. If you get hungry, pack a picnic blanket and order from the Terrace menu, featuring gourmet sandwiches, salads, and small plates (the charcuteries and cheese plates are the perfect snack to tide you over ‘till lunch).
Just down the road from Veritas, Afton Mountain Vineyards feels more like the cozy, elegant home of a wealthy friend than a tasting room, but that doesn’t stop them from producing some of the most incredible wines in Virginia. During the tasting, we found ourselves saying, “No, THAT one is the best so far” after every pour. Do your best to narrow it down to a single favorite, order a glass, and head out to their stunning glass pavilion or the outdoor patio for some corn hole or just to admire the sweeping views.
For our last winery stop before lunch, we cruised over to Hill Top Berry Farm & Winery, known for crafting an extensive array of fruit or berry-based meads. If, like most of our staff, you’ve never tried mead before, Hill Top is the place to start. We expected overwhelmingly sweet flavors, but every single mead was refreshingly drinkable and true to the fruits, berries, and herbs they were made with. After trying roughly a dozen different options, from the summery Lavender Metheglin to the spiced pumpkin Hunter’s Moon (one of the few pumpkin spice crazes we can honestly say would be fantastic year-round), you’ll find yourself a newly converted mead lover upon leaving Hill Top Berry Farm and Winery.
At about this point, you’ll probably be needing to get some food to balance out your morning, so head to Blue Mountain Brewery & Restaurant for lunch. Start with the Buffalo Chicken Dip, served with house-made tortilla chips and thinly sliced celery sticks. When it comes to the main course, their brick oven pizzas are the way to go if you’re looking to share (or want to crush a whole pie yourself–no judgement here). Those with smaller appetites should think about ordering one of their spectacular sandwiches. Ask for a seat on the patio on sunny days and after restoring your food/drinks balance, order one of the brewery flights to get a thorough education on Blue Mountain’s craft beer creations.
Keep the food coma at bay with an after-lunch walk along the Rockfish River Loop Trail, a network of public trails along the South Fork of the Rockfish River. Several circuits make up a total of six miles of hiking trails in the network, all relatively accessible and approachable, even for hiking beginners or individuals that just ate an entire pizza.
Next up on the agenda is Silverback Distillery, expertly concocting premium vodkas, gins, whiskeys, and bourbons. The mother/daughter duo behind the products are a rare team when it comes to the distilling industry, even more so when you taste the internationally-renowned spirits they produce. Don’t miss sampling the Smoked S’mores or the Smoked Old Fashioned, both made with real smoke from a charred barrel. Have your phone out and ready to shoot a video before ordering; the making of the cocktails is an art form that you’ll rarely get the chance to see up close. If they aren’t too busy pouring, ask them about the unique history behind the business; the storytelling skills almost rival distilling abilities when it comes to the family behind Silverback Distillery.
After a full first day, journey up the mountain to Wintergreen Resort to check into your room. Once settled, grab a swimsuit for a visit to the Spa at Wintergreen Resort. Whether indulging in a massage, taking a dip in the indoor or outdoor pools, or relaxing in the saunas or steam rooms, spending a few hours at the spa is the ultimate way to cap off a Friday out of the office.
For dinner, head back down the mountain to Wild Wolf Brewing Company & Restaurant. Catch the sunset from the outdoor patio, which transforms into one of the most magical spots to eat in all of Nelson County when illuminated by the strings of lights looped through the trees surrounding the terrace. You can’t go wrong with one of the restaurant’s sizeable burgers, made using locally sourced beef, buns, and produce when in season. The menu recommends the Czeched Out Pils as a potential pairing, but we couldn’t get enough of the Blonde Hunny, a Belgian style Blonde Ale brewed with Orange Blossom and Texas wildflower honey. Unwind over a few Friday evening beers, then travel back to Wintergreen for a much-needed night of sleep.
—SATURDAY—
You’ll need a hearty breakfast for your Saturday activities, so stop in to Devils Backbone Brewing Company & Restaurant at the base of the mountain to eat. Their Basecamp location in Nelson has become more of a beer lover’s mecca than a brewery and restaurant combination, with numerous smaller outpost cabins surrounding the large lodge-style structure at the center of the property. One of these smaller structures, The Summit, serves quick but filling breakfast options as well as gourmet coffees and espressos. Need a quick dose of caffeine? Order a Latte or go with the small but powerful Cortaditio, a double espresso with a bit of cream and foam. For food, we like the Buttermilk Biscuit Egg Sandwich or, for a more nutritious yet still delicious alternative, the Healthy Bowl, which tastes more like a decadent dessert than a healthy breakfast alternative.
Now that you’re awake and energized, venture into the Great Outdoors of Nelson County with a hike at Crabtree Falls Trail, one of the most popular and scenic hikes in the region. A total of 3.4 miles round-trip, the hike begins with a short paved section to the waterfalls, and then zigzags back and forth alongside the falls. Stick with it through the many staircase sections, as they tend to wear you out the quickest. After that, the remainder of the hike follows switchbacks through the shaded mountain forests that hikers of any skill level will find doable. Your payoff at the peak is the incredible views of the Blue Ridge Mountains, but with waterfalls along the entire trail, you’ll enjoy every minute hiking Crabtree Falls.
Refuel back in the valley at Basic Necessities Café, a quaint cottage bistro that you’d expect to find in the French countryside rather than the mountains of Virginia. A favorite spot for locals, this charming restaurant is one of the best-kept secrets in Nelson County. There may be a brief wait for a table due to the shortage of space in the dining area, but you can fill your time perusing the eclectic gift shop, featuring wines from around the world, locally sourced goods, and a wide range of food products. Plus, you’ll find it well worth the wait after trying the food. Although the menu consists of only a few dishes, the owner follows the common phrase, “Quality over Quantity”, serving up flavorful meals made with ingredients like fresh mozzarella cheese, crispy French baguettes, and spring greens from a neighboring farm.
Hit the road to Virginia Distillery Company, which houses a distillery, tasting room, and whisky museum on the pristine rolling grounds. The distillery takes pride in crafting award-winning Virginia-Highland Whisky, and in addition to offering tastings and tours, they also teach visitors about the history behind Whisky and the distillation of spirits in America at the Virginia Distillery Museum. Book ahead of time if possible, as space is limited and they often book up on weekends for the tours. After getting a look at the practice and history that goes behind the whisky, try the resulting products at the tasting room, where bartenders whip up seasonal cocktails, whisky flights, and sampler tastings.
Heading back towards the resort, make a quick detour to Sweet Bliss Bakery to satisfy that sweet tooth. The Mini Cheesecakes are the perfect bite-sized treat to keep your appetite in check until dinner. We recommend the White Chocolate Raspberry or the Chocolate Peanut Butter Truffle cheesecakes.
Next, travel to Bold Rock Hard Cider and snag a seat outside while sipping on a cider flight. In the heart of the Blue Ridge Mountains, Bold Rock is a cider drinker’s paradise, complete with a state-of-the-art bottling area visible through an expansive glass wall. After a tasting, visit Bold Rock’s Cider Museum to gain the facts and history behind your beverage.
Grab dinner at Devils Backbone Brewing Company before traveling back up the mountain. Be sure to drop into latest addition to the Basecamp, Devils Backbone Distilling Company, an epic distillery and tasting room creating rum, gin, and whiskey products. If you’re not feeling another cocktail or tasting, just take a peek into the distilling room for a look at the massive copper and silver stills that could double as polished works of art.
—SUNDAY—
Your three-day weekend is almost over, but there are still plenty of activities to keep you from thinking about the inevitable return to work.
Enjoy a leisurely breakfast at Copper Mine Bistro & Lounge at Wintergreen Resort before checking out, then pack up the car for the final descent down the winding mountain roads.
We decided to end the trip to Nelson County with a sort of “Choose-Your-Own-Adventure” twist:
Option #1: Get in a round of golf at Stoney Creek Golf Course at Wintergreen Resort. The course has a total of 27 holes set against the dramatic background of the Blue Ridge Mountains. Even if you’re no golf pro, each of the three 9-hole courses are fun and fairly beginner-friendly (although if you’re like us, you may want to let others play through to save them from an excruciatingly slow game pace).
Option #2: Spend more time in the stunning wilderness of Nelson County with a hike to Humpback Rocks. Although only a 1-mile hike to the peak, the trail is fairly strenuous with a steep climb all the way to the top, but the views from the rock formations found at the end of the trail make for an epic summit.
Depending on your route home, consider driving through Crozet to get lunch at Dr. Ho’s Humble Pie, another staple for the local dining scene. Order one of the specialty pizzas, even if dining alone; you’ll thank us later when you come across the leftovers at dinnertime.
Looking for more travel ideas around Virginia? Below are a few more 72-hour guides to help you plan your next visit. |
Q:
jQuery Validation: If one input is entered, others should become mandatory
I have a form with several lines of 4 input fields, it looks like this:
<tr>
<td><input name="company01" id="company01" /></td>
<td><input name="description01" id="description01" /></td>
<td><input name="costs01" id="costs01" class="sum" /></td>
<td><input name="file01" id="file01" /></td>
</tr>
<tr>
<td><input name="company02" id="company02" /></td>
<td><input name="description02" id="description02" /></td>
<td><input name="costs02" class="sum" id="costs02" /></td>
<td><input name="file02" id="file02" /></td>
</tr>
Now, when the user enters one of the inputs of the row (for example the costs field), it should be mandatory to enter the company and the descripton (but not the attachment).
File-Upload is never mandatory. However, the user has to complete at least on row with company, description and costs.
Could someone tell me how I can check if at least one row has been completed? And how would I go about checking if the other 2 have been completed using jQUery Validation Plugin?
A:
can be done with required method and dependency expressions
....
rules : {
company01 : { required : "#company02:blank" },
description01 : { required : "#company01:filled" },
costs01: { required : "#company01:filled" },
// now company 2
company02 : { required : "#company01:blank" },
description02 : { required : "#company02:filled" },
costs02: { required : "#company02:filled" }
}
....
A:
Didn't solve it with the validate method. What I did was, checking all inputs within a row to see if they are all empty or all filled out. If any row doesn't match, I just create an alert dialog.
Not really nice, but at least it gets the validation done.
|
Q:
Sort videos by bitrate
I have a folder with some 300 videos. I want to sort these by their video bitrate. I use a command 'mediainfo' to obtain the bitrate info of a file . Is it possible to write a script (possibly in python) to sort these videos using this command . I dont know much about scripts, so please do explain :) .Thanks in advance.
A:
I quickly made a python script which calls mediainfo process for each file in a search criteria and sorts then by sorting criteria and prints out the results. Modify for your own needs.
This uses pure string sorting for the values. You could also add reverse=True for sorted method if wanted or do whatever you want with the code otherwise. This script requires you to pass arguments with ' around them. Sort criteria argument can be any value that mediainfo returns from the files.
import os, sys, glob
import pprint
# Call: python mediainfo_sort.py 'search_criteria' 'sort_criteria'
# Call example: python mediainfo_sort.py '*.avi' 'Bit rate'
files = glob.glob(sys.argv[1])
criteria = sys.argv[2]
# Will have data in format: {'file_path': {'Media Attribute', 'Value'}}
file_datas = {}
# Contruct data by calling mediainfo for all files in
for file_path in files:
mediainfo = os.popen('mediainfo "%s"' % file_path).read()
file_data = {}
infos = mediainfo.splitlines()
for info in infos:
if ':' in info:
info_split = info.split(':')
file_data[info_split[0].strip()] = info_split[1].strip()
file_datas[file_path] = file_data
# function for sorted, uses Media attribute (sort_criteria) value as sorting key
def getKey(item):
return item[1][criteria]
sorted_files = sorted(file_datas.items(), key=getKey)
# In the end just join the keys (filenames) with newline and print
print '\n'.join([x[0] for x in sorted_files])
|
Characterization of novel vascular endothelial growth factor (VEGF) receptors on tumor cells that bind VEGF165 via its exon 7-encoded domain.
Vascular endothelial growth factor (VEGF), a potent angiogenic factor, uses two receptor tyrosine kinases, FLK/KDR and FLT, to mediate its activities. We have cross-linked 125I-VEGF165 to the cell surface of various tumor cell lines and of human umbilical vein endothelial cells. High molecular mass (220 and 240 kDa) and/or lower molecular mass (165 and 175 kDa) labeled complexes were detected depending on the cell type. The 220- and 240-kDa labeled complexes were shown to contain FLT and FLK/KDR receptors, respectively. On the other hand, the 165- and 175-kDa complexes did not seem to contain FLK/KDR or FLT but instead appeared to contain novel VEGF receptors with relatively low molecular masses of approximately 120 and 130 kDa. These receptors were further characterized in breast cancer MDA MB 231 cells (231), which did not form the high molecular mass complexes and which did not express detectable amounts of flk/kdr or flt mRNA. The 231 cells displayed one VEGF165 binding site, with a Kd of 2.8 x 10(-10) M and 0.95 1.1 x 10(5) binding sites per cell. By comparison, human umbilical vein endothelial cells had two binding sites, one with a Kd of 7.5 x 10(-12) M, presumably FLK/KDR, and the other with a Kd of 2 x 10(-10) M, a value similar to the VEGF binding sites on 231 cells. These lower affinity/molecular mass receptors on 231 cells cross-linked 125I-VEGF165 but not 125I-VEGF121. Accordingly, exon 7 of VEGF, which encodes the 44 amino acids present in VEGF165 that are absent in VEGF121, was fused to glutathione S-transferase (GST). The GST-VEGF-exon 7 fusion protein bound to heparin-Sepharose with a similar affinity as VEGF165 and inhibited the binding of 125I-VEGF165 to 231 cells. Cross-linking of 125I-GST-VEGF-exon 7 to 231 cells resulted in the formation of 150- and 160-kDa labeled complexes that presumably contained the 120- and 130-kDa lower affinity/molecular mass VEGF165 receptors. It was concluded that certain tumor-derived cell lines express novel surface-associated receptors that selectively bind VEGF165 via the exon 7-encoded domain, which is absent in VEGF121. |
Q:
Keep footer at the bottom of the page but make the page grow as needed
I have this CSS code for a footer:
.footer {
width:100%;
margin:0 auto;
padding-top:20px;
padding-bottom:40px;
position:absolute !important;
bottom:0; !important;
}
What I need to do is to be able to make the page to grow as the elements above the footer grows like textbox or something above it. However the code above makes the footer stick and the elements above overlaps with the footer.
Is there a quick CSS fix for this kind of scenario or jQuery is needed for this?
A:
You're looking for a sticky footer: take a look at my article.
It's written in polish but you have both CSS and XHTML extra easy to understand. Feel free to use it. :)
|
Q:
What's the best way to draw loop invariants in LaTeX?
I want to draw a picture similar to this one for divide part of Quicksort.
What's the best method to do so? Is there a package for it or should I use Tikz to do it? If Tikz can you point me to some reference on drawing similar pictures as the one above?
A:
Here's one way to do it with TikZ (am I wrong in assuming the arrows are supposed to point at the separators between the boxes?):
\documentclass{article}
\usepackage{tikz}
\usetikzlibrary{matrix}
\begin{document}
\begin{tikzpicture}
\matrix[matrix of nodes,
name=matrix,
draw, % Outer border
inner sep=0pt,
minimum width=2cm, % Width of boxes
text depth=.5ex, % To ensure that lower edges line up correctly
minimum height=.75cm, % Height of boxes
]{
$<$ pivot & $\ge$ pivot & ?\\ % The nodes
};
% Separators
\draw (matrix-1-2.south west) -- (matrix-1-2.north west);
\draw (matrix-1-3.south west) -- (matrix-1-3.north west);
% Define a style for all arrows, then draw the arrows with nodes
% This can be used to change the thickness or the tips for all arrows at once
\tikzstyle{arrowstyle}=[latex-]
\draw [arrowstyle] (matrix-1-1.south west) -- +(-90:0.8) node [anchor=north] {left};
\draw [arrowstyle] (matrix-1-2.south west) -- +(-90:0.8) node [anchor=north] {pivotLocation};
\draw [arrowstyle] (matrix-1-3.south west) -- +(-90:0.8) node [anchor=north] {i};
\draw [arrowstyle] (matrix-1-3.south east) -- +(-90:0.8) node [anchor=north] {right};-
\end{tikzpicture}
\end{document}
A:
One could come up with similar results with just some TeX:
\documentclass{article}
\begin{document}
\vbox{
\offinterlineskip\sf
\def\mapup{$\Big\uparrow$}
\halign{&\vrule\vphantom{$\bigg($}\hbox to 1.5in{\hfil#\hfil}\vrule\cr
\noalign{\hrule}
$<$pivot&$>=$pivot&?\cr
\noalign{\hrule}
\omit\mapup&\omit\llap{\mapup}&\omit\mapup&\omit\llap{\mapup}\cr
\omit\strut Left&\omit\hidewidth\llap{pivotLocation\qquad}\hidewidth&\omit $i$&\omit\llap{Right}\cr
}
}
\end{document}
A:
run it with xelatex or use latex->dvips->ps2pdf
\documentclass{article}
\usepackage[T1]{fontenc}
\usepackage{pst-node,tabularx,ragged2e}
\SpecialCoor
\renewcommand\tabularxcolumn[1]{>{\Centering}m{#1}}
\begin{document}
\sffamily\def\arraystretch{2}
\begin{tabularx}{\textwidth}{|X|X|X|}\hline
\rnode[lb]{l1}{}\hfill <pivot \hfill\rnode[rb]{r1}{} & >=pivot &
\rnode[lb]{l3}{}\hfill ? \hfill\rnode[rb]{r3}{}\\\hline
\end{tabularx}
\psset{arrowscale=2,arrows=<-,offsetA=-10pt,offsetB=-15mm}
\ncline{l1}{l1}\ncline{r1}{r1}\ncline{l3}{l3}\ncline{r3}{r3}
\uput{16mm}[-90](l1){Left}
\uput{16mm}[-90](r1){pivot Location}
\uput{16mm}[-90](l3){i}
\uput{16mm}[-90](r3){Right}
\end{document}
|
---
abstract: 'Here it is shown how to combine two generically globally rigid bar frameworks in $d$-space to get another generically globally rigid framework. The construction is to identify $d+1$ vertices from each of the frameworks and erase one of the edges that they have in common.'
author:
- |
R. Connelly [^1]\
Department of Mathematics, Cornell University\
Ithaca, NY 14853, USA
bibliography:
- 'NSF-10.bib'
- 'framework.bib'
title: Combining Globally Rigid Frameworks
---
Introduction and definitions {#section:introduction}
============================
Suppose that a finite configuration $\pn$ of labeled points in Euclidean $d$-dimensional space $\E^d$ is given, together with a corresponding graph $G$ whose vertices correspond to the points of $\p$. Each edge of $G$, called a *member*, is designated as a *cable*, *strut*, or *bar*. All this data is denoted as $G(\p)$, and it is called a *tensegrity*, or if all the members of $G$ are bars, $G(\p)$ is called a *bar framework*.
We say the tensegrity $G(\p)$ *dominates* the tensegrity $G(\q)$, and write $G(\q) \le G(\p)$, for two configurations $\q$ and $\p$, if $$\begin{aligned}
|\p_i -\p_j| &\ge& |\q_i -\q_j| \quad\mbox{for $\{i,j\}$ a cable,} \nonumber \\
|\p_i -\p_j| &\le& |\q_i -\q_j| \quad\mbox{for $\{i,j\}$ a strut and} \label{tens-constraints}\\
|\p_i -\p_j| &=& |\q_i -\q_j| \quad\mbox{for $\{i,j\}$ a bar.} \nonumber \end{aligned}$$
This just means that going from $\p$ to $\q$, cables don’t get longer, struts don’t get shorter, and bars stay the same length. For bar frameworks, we say $G(\p)$ *is equivalent to* $G(\q)$ if $G(\q) \le G(\p)$ and $G(\p) \le G(\q)$ and we write $G(\q) \simeq G(\p)$.
Two configurations $\p$ and $\q$ are *congruent*, in $\E^d$, and we write $\p \cong \q$, if there is a $d$-by-$d$ orthogonal matrix $A$ and a vector ${\mathbf}{b} \in \E^d$ such that for all $i$, $\q_i = A\p_i + {\mathbf}{b}$. Equivalently, $\p \cong \q$, if and only if $K(\p) \simeq K(\q)$, where $K$ is the complete graph on the vertices of $\p$ and $\q$.
A tensegrity $G(\p)$ is defined to be *globally rigid* in $\E^d$ if for every tensegrity $G(\q)$ in $\E^d$ that is dominated by $G(\p)$, $\q$ is congruent to $\p$. In other words, $G(\q) \le G(\p)$ implies $\p \cong \q$. So a bar framework $G(\p)$ is globally rigid in $\E^d$ if, for all configurations $\q$ in $\E^d$, $G(\q) \simeq G(\p)$ implies $\p \cong \q$. A tensegrity or a bar framework $G(\p)$ in $\E^d$ is *universally globally rigid* or just *universally rigid* if it is globally rigid in $\E^D \supset \E^d$ for all $D \ge d$.
A tensegrity $G(\p)$ is defined to be *(locally) rigid* in $\E^d$ if there is an $\epsilon > 0$ and for $|\p-\q| < \epsilon$, any tensegrity $G(\q)$ in $\E^d$ that is dominated by $G(\p)$, $\q$ is congruent to $\p$. In other words, $\q$ close enough to $\p$ and $G(\q) \le G(\p)$ implies $\p \cong \q$. So a bar framework $G(\p)$ is locally rigid in $\E^d$ if there is an $\epsilon > 0$ such that $|\p-\q| < \epsilon$, $\q$ in $\E^d$, and $G(\q) \simeq G(\p)$ implies $\p \cong \q$.
A configuration $\p$ is said to be *generic* if the coordinates of $\p$ in $\E^d$ are *algebraically independent over the rational numbers*, which means that there is no non-zero polynomial with rational coordinates satisfied by the coordinates of $\p$. This implies that no $d+2$ nodes lie in a hyperplane, for example, and a lot more. Figure \[fig:general-examples\] shows several examples of tensegrities and frameworks with and without the properties discussed here.
![The top row shows tensegrities, where dashed lines are cables, solid lines struts. The bottom row shows bar framworks. All these examples are locally rigid, (a) and (b) are universally globally rigid, while (c), (d), and (e) are not globally rigid in the plane. Example (f) is not globally rigid in the plane when the central point lies on the diagonal of the surrounding rectangle, but it is globally rigid in the plane when the configuration is generic.[]{data-label="fig:general-examples"}](general-examples){width=".8\textwidth"}
Basic previous results
======================
There has been a lot of work developing computationally feasible criteria for both local and global rigidity that involve purely combinatorial calculations for the graph $G$ and numerical criteria involving, additionally, the configuration $\p$. A graph $G$ is called *$m$-connected* if it takes the removal of, at least, $m$ vertices to disconnect $G$. For example, in the plane $\E^2$ there is a popular algorithm, the pebble game, to compute, for a bar framework, whether $G(\p)$ is locally rigid when $\p$ is generic. This algorithm is purely combinatorial, only depends on the graph $G$, and is polynomial in $n$, the number of vertices of $G$. For information about this theory, see [@Graver-Servatius; @Graver; @Jacobs-Hendrickson; @Whiteley-union]. For all dimensions, determining whether a given bar framework $G(\p)$ is locally rigid at a generic configuration is also quite feasible, although it is not known to be feasible purely combinatorially. For every bar framework $G(\p)$ in $\E^d$ with $n \ge d$ vertices, there is an associated $e$-by-$dn$ matrix $R(\p)$, the *rigidity matrix*, such that $G(\p)$ is locally rigid in $\E^d$ if and only if the rank of $R(\p)$ is $ dv - d(d+1)/2$.
In order to understand some of the results about global rigidity it is helpful to look at the case of tensegrities, and in order to understand that it is helpful to understand stresses and stress matrices. For any tensegrity $G(\p)$, a *stress* $\omega = (\dots, \omega_{ij}, \dots)$ is a scalar $\omega_{ij}=\omega_{ji}$ associated to each member $\{i,j\}$ that connects vertex $i$ to vertex $j$ of $G$. If vertex $i$ is not connected to vertex $j$, then $\omega_{ij}=0$. We say the a stress $\omega$ for the tensegrity or framework $G(\p)$ is an *equilibrium stress* if for all $j$, the following vector equation holds:
$$\label{equilibrium}
\sum_i \omega_{ij}(\p_i-\p_j) = {{\mathbf}0}.$$
If $G(\p)$ is a tensegrity, we say that $\omega$ is a *proper stress* if $\omega_{ij} \ge 0$ for all cables $\{i,j\}$, and $\omega_{ij} \le 0$ for all struts $\{i,j\}$. If $\omega$ is a stress for $G(\p)$, and $G$ has $n$ vertices, form an $n$-by-$n$ symmetric matrix $\Omega$, called the *stress matrix*, as follows: Each off-diagonal entry of $\Omega$ is $-\omega_{ij}$, and the diagonal entries are such that the row and column sums are $0$. Figure \[fig:square\] shows a simple example of a tensegrity with a proper equilibrium stress indicated.
![A square tensegrity with its diagonals, where a proper equilibrium stress is indicated.[]{data-label="fig:square"}](square){width=".3\textwidth"}
The stress matrix for this stress is
$$\label{stress-matrix}
\begin{pmatrix}
\,\,\,\,1& -1 & \,\,\,\,1 & -1 \\
- 1& \,\,\,\,1 & -1 & \,\,\,\,1 \\
\,\,\,\,1& -1 & \,\,\,\,1 & -1 \\
- 1& \,\,\,\,1 & -1 & \,\,\,\,1
\end{pmatrix}.$$
In order to understand a fundamental theorem that implies universal global rigidity, we define the following concept. Let $\v_1, \dots, \v_k$, be vectors in $\E^d$. Regard these vectors as points in the real projective space $\R\P^{d-1}$ of lines through the origin in $\E^d$. We say that $\v_1, \dots, \v_k$ *lie on a conic at infinity* if, as points in $\R\P^{d-1}$ they lie on a conic (or quadric) hypersurface. For example, in the plane $\E^2$, a conic at infinity consists of at most two points. In $3$-space $\E^3$, if we project the vectors into a plane, not through the origin, the conic is the usual notion of a conic, including the degenerate case of two lines. The following is a fundamental result that has motivated a lot of the later results about global rigidity. This can be found in [@Connelly-energy; @Connelly-Whiteley].
\[thm:fundamental\] Let $G(\p)$ be a tensegrity, where the affine span of $\p=(\p_1, \dots, \p_n)$ is all of $\E^d$, with a proper equilibrium stress $\omega$ and stress matrix $\Omega$. Suppose further
1. \[condition:positive\] $\Omega$ is positive semi-definite.
2. \[condition:rank\] The rank of $\Omega$ is $n - d - 1$.
3. \[condition:quadric\] The set of vectors $\{\p_i - \p_j \mid \omega_{ij} \ne 0 \}$ do not lie on a conic at infinity.
Then $G(\p)$ is universally globally rigid.
In many cases, Condition \[condition:quadric\].) is easy to verify. The difficulty usually lies with Condition \[condition:positive\].) and Condition \[condition:rank\].). When the affine span of $\p$ is $d$-dimensional, then the rank of $\Omega$ is at most $n - d - 1$, because of the equilibrium conditions (\[equilibrium\]). When the three conditions of Theorem \[thm:fundamental\] are satisfied we say that the tensegrity is *super stable*.
A partial converse to Theorem \[thm:fundamental\] is the following result of S. Gortler, A. D. Healey, and D. Thurston [@Gortler-Thurston].
\[thm:Gortler-Thurston\] Let $G(\p)$ be a universally globally rigid bar framework in $\E^d$, where $\p$ is generic and $G$ has at least $d+2$ vertices. Then $G(\p)$ is super stable.
So this means that under the conditions of Theorem \[thm:Gortler-Thurston\], there is an equilibrium stress such that the three conditions of Theorem \[thm:fundamental\] hold. So if the bars are converted to cables or struts to follow the sign of that stress, the bar constraints can be replaced by the much weaker inequality tensegrity constraints in (\[tens-constraints\]).
Figure \[fig:general-examples\](a) and Figure \[fig:general-examples\](b) are super stable, while Figure \[fig:general-examples\](c) satisfies Condition \[condition:positive\].) and Condition \[condition:quadric\].), but not Condition \[condition:rank\].) and, indeed, Figure \[fig:general-examples\](c) is not even globally rigid in the plane.
In order to understand Condition \[condition:rank\].) and use it, it helps to interpret the rank condition on $\Omega$. One very useful way to do this uses the following concept. Suppose $\p$ is configuration with $n$ vertices in $\E^d$ with an equilibrium stress $\omega$. We say the configuration $\p$ is *universal with respect to $\omega$* if, when $\q$ is any other configuration on the same number of vertices such that $\omega$ is an equilibrium stress for $\q$, then the configuration $\q$ is an affine image of the configuration $\p$. In other words, there is a $d$-by-$d$ matrix $A$ and a vector ${{\mathbf}v} \in \E^d$ such that $A\p_i + {{\mathbf}v} = \q_i$ for all $i=1, \dots, n$. The following result in [@Connelly-energy] relates the notion of a universal configuration to the rank of the stress matrix. We assume that the affine span of the configuration $\p$ is $d$-dimensional.
A non-zero equilibrium stress $\omega$ for a configuration $\p$ with $n$ vertices in $\E^d$ is universal if and only if the rank of the associated stress matrix $\Omega$ is $n-d-1$.
A basis, including the vector of all one’s, for the kernel of $\Omega$, $\ker(\Omega)$, can be used to construct a universal configuration as shown in [@Connelly-energy]. For example, in $\E^d$ when the configuration $\p$ is universal with respect to the stress corresponding to $\Omega$, the $d$ vectors consisting of the $i$-th coordinates, for $i = 1, \dots, d$ and the vector of $n$ one’s correspond to a basis for $\ker(\Omega)$. When the emphasis is on a fixed configuration rather than a fixed equilibrium stress, we say $\Omega$ is of *maximal rank* if its rank is $n-(d+1)$.
Combining tensegrities {#sect:combining-tensegrities}
======================
The stress matrix, since it is symmetric, can be regarded as a quadratic form on the space of all configurations $\p$, and we can add these quadratic forms as functions. (Technically, though it is the tensor product of $\Omega$ with the identity matrix $I^d$, $\Omega \otimes I^d$, that corresponds to the quadratic form on the configurations $\p$.) When we add positive semi-definite quadratic forms, the sum is positive semidefinite, and Condition \[condition:quadric\].) is also easy to verify in most cases. It is also possible to check Condition \[condition:rank\].), when it is true. For example, it is easy to see that Figure \[fig:general-examples\](c) is obtained by superimposing the rightmost strut in Figure \[fig:general-examples\](a) and the leftmost cable in \[fig:general-examples\](b). If the stresses for (a) and (b) are adjusted by positive rescaling, the stress vanishes on the overlap. But the rank of the stress matrix of the sum is $6 - (2+1) - 1 = 4$, one less than is needed for super stability. Nevertheless, in any configuration dominated by Figure \[fig:general-examples\](c), in any dimension, is such that any pair of vertices both coming from either Figure \[fig:general-examples\](a) or both coming from Figure \[fig:general-examples\](b) have their distances preserved. On the other hand if the overlap of two tensegrities consists of at least $d+1$ vertices, then the maximal rank Condition \[condition:rank\].) is preserved.
\[prop:combining-tensegrities\] Suppose that $G_1(\p)$ and $G_2(\q)$ are two super stable tensegrities in $\E^d$ with at least $d+1$ vertices in common, such that the $d+1$ vertices do not lie in a $(d-1)$-dimensional hyperplane, and such that one cable in $G_1$ overlaps with a strut in $G_2$. Then the tensegrity $G(\p \cup \q)$ obtained by superimposing their common vertices and members, but erasing the one common cable and strut, is also superstable.
It is understood that in $G$, if two other cables overlap, the resulting member in $G$ is a cable; if two struts overlap, the resulting member is a strut; and if another cable and strut overlap, the resulting member can be either a cable or strut or disappear, depending on the stresses of $G_1(\p)$ and $G_2(\q)$. Figure \[fig:overlapping-tensegrities\] shows an example of this.
![Figure (a) is combined with Figure (b) to get Figure (c) as with Proposition \[prop:combining-tensegrities\]. The stress in the $\{2,4\}$ strut in Figure (a) is scaled to cancel with the stress in the $\{2,4\}$ cable in Figure (b). Note that the stress in the $\{1,4\}$ cable of in Figure (a) does not cancel with the stress in the $\{1,4\}$ strut in Figure (b). The final stress in the $\{1,4\}$ member is negative and it is a strut in Figure (c) because of convexity of the five points and the equilibrium condition (\[equilibrium\]).[]{data-label="fig:overlapping-tensegrities"}](overlapping-tensegrities){width=".8\textwidth"}
The example of Figure \[fig:overlapping-tensegrities\] is one case of a *Cauchy polygon*, and Proposition \[prop:combining-tensegrities\] is explained in more detail in [@Connelly-energy]. Note that with this process, it is necessary to match a strut with a cable.
Globally rigid generic bar frameworks
=====================================
For bar frameworks the story for global rigidity is different. The starting point is to assume that the configuration $\p$ is generic, which has advantages and disadvantages. An advantage is that, in principle, generic global rigidity in $\E^d$ can be calculated with the help of some numerical calculation, but the downside is that the generic condition is hard to work with computationally. For the case of local rigidity, the condition of being generic can be replaced by some polynomial conditions on the coordinates that are to be avoided. For the case of global rigidity in $\E^d$, for $d \ge 3$, there are some polynomial conditions also that are to be avoided, but they seem to be intrinsically difficult to calculate. The following basic result can serve as a starting point. The “if" part of the statement is due to [@Connelly-global], and the “only if" part is due to S. Gortler, A. D. Healy, and D. P. Thurston [@Gortler-Thurston].
\[thm:generic-global\] Let $G(\p)$ be a bar framework at a generic configuration $\p$ in $\E^d$ with $n \ge d + 2$ vertices. It is globally rigid in $\E^d$ if and only if there is a non-zero equilibrium stress whose stress matrix $\Omega$ has rank $n-d-1$.
The only globally rigid (generic) frameworks $G(\p)$ not covered in Theorem \[thm:generic-global\] are when $G$ is the complete graph on less than $d+2$ vertices. Note that Theorem \[thm:generic-global\] essentially involves Condition \[condition:rank\].) of Theorem \[thm:fundamental\]. Condition \[condition:quadric\].) follows easily from the generic hypothesis and the equilibrium stress.
Note that a consequence of (the “only if" part of and that the stress rank condition is a generic property) Theorem \[thm:generic-global\] is that if $G(\p)$ is globally rigid at one generic configuration $\p$, then $G(\q)$ is globally rigid at all other generic configurations $\q$. Furthermore, although generic configurations are hard to calculate concretely, it is enough to verify that for some configuration $\p$ the rank of the rigidity matrix $R(\p)$ is $dn - d(d+1)/2$, and the rank of a stress matrix is $n - d - 1$, as mentioned in [@Connelly-global; @Connelly-Whiteley-coning].
In dimension two the situation is even better, depends on the local rigidity properties of $G(\p)$ and depends on the combinatorics of $G$ only. If $G(\p)$ is a bar framework in $\E^d$, is locally rigid and remains locally rigid after the removal of any bar, we say that $G(\p)$ is *redundantly rigid* in $\E^d$.
\[thm:global-dim-2\] A bar framework $G(\p)$ with $\p$ generic is globally rigid in $\E^2$ if and only if $G(\p)$ is redundantly rigid and $3$-connected.
The “only if" part of Theorem \[thm:global-dim-2\] is due to B. Hendrickson in [@Hendrickson-unique]. The “if" part of Theorem \[thm:global-dim-2\] is by A. Berg and T. Jordan; B. Jackson and T. Jordan; R. Connelly [@Berg-Jordan; @Jackson-Jordan; @Connelly-global]. The pebble game of [@Jacobs-Hendrickson] provides an efficient purely combinatorial algorithm to compute generic redundant rigidity in the plane, and the computation of connectedness is known to have efficient polynomial time algorithms, so Theorem \[thm:global-dim-2\] essentially provides a computationally effective method for computing generic global rigidity in the plane.
We say that a graph $G$ has the *Hendrickson property* in $\E^d$ if $G$ is $(d+1)$-connected and $G(\p)$ is redundantly rigid in $\E^d$, when $\p$ is generic. In [@Hendrickson-unique] B. Hendrickson shows the following:
\[thm:Hendrickson\] If a bar framework $G(\p)$ with $\p$ generic is globally rigid in $\E^d$ then $G(\p)$ is redundantly rigid and $(d+1)$-connected.
Originally Hendrickson conjectured the converse of Theorem \[thm:Hendrickson\] for $d\ge 3 $, but that is false since, in [@Connelly-K33], it is shown that the complete bipartite graph $K(5,5)$ has the Hendrickson property in $\E^3$, but it is not globally rigid in $\E^3$, and there are other examples shown by S. Frank and J. Jiayang [@Frank-Jiayang]. In particular for $\E^5$, there are infinitely many examples, and similarly there are infinitely many examples for each $d \ge 5$.
Combining generic globally rigid bar frameworks
===============================================
In $\E^d$ for $d \ge 3$, there is no known efficient deterministic combinatorial algorithm to compute generic global rigidity. So it is reasonable to consider special combinatorial ways to create generically globally rigid bar frameworks from others especially in the spirit of Section \[sect:combining-tensegrities\].
One very natural way to combine two frameworks is to assume some overlap of the vertices and remove some of the members joining the common vertices. If some members belong to one side, but not the other, the following natural result by K. Ratmanski [@Ratmanski] is useful.
\[thm:combining-frameworks-Ratmanski\] Suppose that $G_1(\p)$ and $G_2(\q)$ are globally rigid bar frameworks in $\E^d$ with $d+1$ vertices (or more) in common such that $\p \cup \q$ is generic. Let $G$ be the graph obtained by taking the union of their vertices and members, but deleting those members from $G_2$ not in $G_1$. Then the bar framework $G(\p \cup \q)$ is also globally rigid in $\E^d$.
This follows directly from the statement of global rigidity. Suppose that the framework $G(\p \cup \q)$ is equivalent to $G(\hat{\p} \cup \hat{\q})$ in $\E^d$. Since $G_1(\p)$ is globally rigid, the configurations $\p$ and $\hat{\p}$ are congruent. So all the lengths of members in $\p \cap \q$ are preserved. So $\q$ and $\hat{\q}$ are congruent since $G_2(\q)$ is globally rigid. Since $\p \cup \q$ are generic and there are $d+1$ vertices in common, $\hat{\p} \cup \hat{\q}$ is congruent to $\p \cup \q$.
In order to treat the case when we delete a common member, first consider the following. We need an elementary Lemma from linear algebra.
\[lem:sum\] Suppose that $\Omega_1$ and $\Omega_2$ are two $n$-by-$n$ symmetric matrices, such that the dimension of $\ker \Omega_1 \cap \ker \Omega_2$ is $k$, and the rank of $ \mathrm{rank}\{ \Omega_i\} = r_i, \,\, i=1, 2$, where $r_1 + r_2 = n-k$. Then $$\label{eqn:span} \mathrm{rank} \{ t \Omega_1 + (1-t) \Omega_2\} = n-k , \,\, t \ne \pm1.$$
Since $\Omega_1$ and $\Omega_2$ are symmetric, and $\ker \Omega_1 \cap \ker \Omega_2$ is an invariant subspace of both $\Omega_1$ and $\Omega_2$, we can restrict to the orthogonal complement of $\ker \Omega_1 \cap \ker \Omega_2$. So we may assume, without loss of generality, that $k=0$.
Again, since $\Omega_1$ and $\Omega_2$ are both symmetric, the orthogonal complements $(\ker \Omega_1)^{\perp}$ and $(\ker \Omega_2)^{\perp}$ are the images $\mbox{Im}\, \Omega_1 = (\ker \Omega_1)^{\perp}$, $\mbox{Im}\, \Omega_2 = (\ker \Omega_2)^{\perp}$, respectively. Because $[(\ker \Omega_1)^{\perp} + (\ker \Omega_2)^{\perp}]^{\perp} = \ker \Omega_1 \cap \ker \Omega_2 = \{{\mathbf}{0}\}$, then $(\ker \Omega_1)^{\perp} + (\ker \Omega_2)^{\perp} = \R^n$. In other words, the combined images of $\Omega_1$ and $\Omega_2$ span. Since $r_1+r_2 = n$ these spaces are complementary in $\R^n$. Thus for all $t \ne 0, 1$, $ t \Omega_1 + (1-t) \Omega_2$ is non-singular.
We next apply this to stress matrices.
\[lem:overlap\]Suppose that $G_1(\p)$ and $G_2(\q)$ are two bar frameworks in $\R^d$, with $n_1$ and $n_2$ vertices, respectively, that share exactly $d+1$ vertices not lying in a $(d-1)$-dimensional hyperplane, and with corresponding stress matrices $\Omega_1$ and $\Omega_2$. Extend $\Omega_1$ to $\tilde{\Omega}_1$ to include the vertices $\q$ of $G_2$ not in $G_1$, but with $0$ stress on all the extra pairs of vertices. Similarly extend $\Omega_2$ to $\tilde{\Omega}_2$. If each $\Omega_i$ has maximal rank $n_i - (d+1)$, then for all values of $t \ne 0, 1$, $t \tilde{\Omega}_1+ (1-t) \tilde{\Omega}_2$ has maximal rank $n_1 + n_2 - 2(d+1)$.
By the maximal rank condition, $\dim (\ker \Omega_1)= \dim (\ker \Omega_2) = d+1$, and $\dim (\ker \tilde{\Omega}_1) = d+1 + n_2-(d+1)$ while $\dim (\ker \tilde{\Omega}_2) = d+1 + n_1-(d+1)$. Each of these kernels corresponds to a universal configuration that has the vertices of $\p$ and $\q$, for $\tilde{\Omega}_1$ and $\tilde{\Omega}_2$, respectively, such that they lie in a $d$-dimensional affine linear space, while the extra vertices each correspond to a higher dimensional configuration.
The union of the vertices of $\p$ and $\q$, $\p \cup \q$, is a configuration that satisfies the equilibrium equations of the stresses corresponding to both $\tilde{\Omega}_1$ and $\tilde{\Omega}_2$. If $\bar{\p} \cup \bar{\q}$ is another configuration that satisfies the equilibrium equations of the stresses corresponding to both $\tilde{\Omega}_1$ and $\tilde{\Omega}_2$, then $\bar{\p}$ is an affine image of $\p$ and $\bar{\q}$ is an affine image of $\q$, since $\p$ and $\q$ are universal with respect to the stresses corresponding to $\Omega_1$ and $\Omega_2$, respectively. Thus, by extending the correspondence between $\p \cap \q$ and $\bar{\p} \cap \bar{\q}$, we get an affine map from $\p \cup \q$ to $\bar{\p} \cup \bar{\q}$. Thus $\p \cup \q$ corresponds to a basis for the intersection of the kernels of $\tilde{\Omega}_1$ and $\tilde{\Omega}_2$. The affine span of $\p$ and $\q$ are both $d$-dimensional with $d+1$ affine independent points in the intersection, so $\p \cup \q$ has a $d$-dimensional affine span. In other words, $\ker\tilde{\Omega}_1 \cap \ker \tilde{\Omega}_2$ has dimension $d+1$. Then Lemma \[lem:sum\] implies the conclusion with $k= d+ 1$, and $ \mathrm{rank}\{ \Omega_i\} = r_i, \,\, i=1, 2$, since $n=n_1+n_2 - (d+1)$, and $r_1 +r_2 = n_1 -(d+1) + n_2 -(d+1) = n - (d+1)$.
The main theorem
================
\[thm:combining-frameworks\] Suppose that $G_1(\p)$ and $G_2(\q)$ are globally rigid bar frameworks in $\E^d$, with $\p \cup \q$ generic, exactly $d+1$ vertices in common, each with at least $d+2$ vertices, and a bar $\{i,j\}$ in $G_1$ and $G_2$. Then the bar framework $G(\p \cup \q)$ obtained by superimposing their common vertices and bars, but erasing the bar $\{i,j\}$, is also globally rigid in $\E^d$.
By Theorem \[thm:generic-global\] there are non-zero stress matrices $\Omega_1$ for $G_1(\p)$, and $\Omega_2$ for $G_2(\q)$ such that $\mathrm{rank}\{ \Omega_1\} = n_1- (d+1) \ge 1$, and $\mathrm{rank}\{ \Omega_2\} = n_2- (d+1) \ge 1$ where $n_1$ is the number of vertices of $G_1$, and $n_2$ is the number of vertices of $G_2$. Then Lemma \[lem:overlap\] implies that for $t \ne 0, 1$, $t \tilde{\Omega}_1+ (1-t) \tilde{\Omega}_2$ has maximal rank $n_1 + n_2 - 2(d+1)$. Let $\omega_{ij}(1)$ and $\omega_{ij}(2)$ be the stresses corresponding to $\Omega_1$ and $\Omega_2$, respectively for the bar $\{i,j\}$. If either $\omega_{ij}(1)=0$ or $\omega_{ij}(2)=0$, Theorem \[thm:combining-frameworks-Ratmanski\] implies that $G(\p \cup \q)$ is globally rigid in $\E^d$. Otherwise by rescaling $\Omega_1$ and $\Omega_2$, if necessary, we can assume that $\omega_{ij}(1)= 1$ and $\omega_{ij}(2) = -1$. Then Lemma \[lem:overlap\], with $t=1/2$, implies that there is a stress matrix, with maximal rank, such that the stress on $\{i,j\}$ is $0$, which allows us to remove it. Then Theorem \[thm:generic-global\] applies again to show that the resulting framework with $\{i,j\}$ deleted is globally rigid in $\E^d$.
Figure \[fig:overlapping-tensegrities\] is a typical example in the plane of Theorem \[thm:combining-frameworks\], but where the members are interpreted as bars.
It would be interesting to consider the case when there are more than $d+1$ vertices in common, but the method here does not seem to apply directly, since there may be linear combinations of the two stresses that are of lower, and we can’t zero out a stress on a given member keeping the maximal rank condition. For example, when there are $d+2$ vertices in common in $\E^d$, and there is a vertex in the intersection of degree $d+1$, no maximal rank linear combination of the two stresses can zero out the stress on one bar . (This is an observation of Tibor Jordán.)
\[quest:hendricson\] Suppose that we combine two graphs that have the Hendrickson property as in Theorem \[thm:combining-frameworks\]. Does the resulting framework have the Hendrickson property.
It seems that the connectivity property holds for the resulting framework. I don’t know about the redundant rigidity property for $d \ge3$. For $d=2$, the statement of Question \[quest:hendricson\] is true because the Hendrickson property and generic global rigidity are equivalent by [@Jackson-Jordan]. But, for $d=2$, the redundant rigidity condition holds by itself, without the need of the connectivity condition by a recent result of Bill Jackson and Tibor Jordán.
The proof of Lemma \[lem:sum\] and Lemma \[lem:overlap\] was inspired by a draft Lemma in [@Connelly-Jordan-Whiteley] that was incorrect. The author is very grateful for Dylan Thurston and Tibor Jordán for pointing out a previous incorrect statement (and proof of course) of Lemma \[lem:sum\]. The author also thanks Igor Gorbovickis for several useful comments and corrections. For other related results, see [@Jacobs; @Sun-Ye; @Gortler-Thurston2; @Jackson-linked; @Connelly-Whiteley-coning; @Jordan-Szabadka; @Jackson-linked; @Alfakih-Ye].
[^1]: Research supported in part by NSF Grant No. DMS–0209595 (USA). e-mail: connelly@math.cornell.edu
|
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Is there a way to get this stencil look from a picture?
I want to know if I can get this type of stencil drawing look in artrage without drawing. Also what about create stencil from whats on the canvas why does it only take the outline and not the lines in the drawing like get this look from a regular picture
To get what you're looking for I believe you will have to use the various selection tools to select the portions of the image you want. Then on a new layer, fill those area selected areas with a solid color. Then right click the layer menu in the thumbnail and choose "create stencil from layer contents". I'm not sure if that is exactly what it says but it's close. There is no one button option to create a stencil from a photo and get what you're looking for. There is no way the software can know what you want included in the stencil and what you don't. Using the freehand selection tool and the selection brush I think you should be able to get what you want.
It won't result in something as smooth as that (it looks like the black and white image was some sort of vector conversion), but you could use the Color Adjuster to make a black and white image from the colored version. The steps would be something similar to this:
Import the image as a new painting or as a layer.
With the image layer selected, go to Edit > Adjust Layer Colors.
With the Adjust Colors panel opened, locate and drag the Color slider all the way to the left (-100%), making the image grayscale.
Now locate and drag the Contrast slider all the way to the right (100%).
Lastly, locate the Brightness slider. This step is going to take tweaking or your part, as moving the slider to either the right or left, will either increase or decrease the amount of black or white in the image.
When you're done, click "OK" to accept the changes.
Optional Steps:
If you'd like the white of the image to be transparent, right click the layer the image is on and select Blend Mode > Multiply
You may now add textures on a new layer beneath the image layer (See examples below).
The image of the left is the result from the first set of steps. The image on the right is result of the second set of steps.
WOW! Someonesane that is brilliant! You're understanding of the depth of this program never ceases to amaze me. I rarely think about these kinds of capabilities when it comes to ArtRage. Thanks for peeling away another layer of the onion. |
Securing the financing you need to grow your business isn’t as simple as it sounds. Not only does it take time to establish a business credit history that stands alone from your personal credit, most traditional lenders require that a business have at minimum, a formal business plan and documented proof of steady income before they’ll extend small business loans. Because of these capital challenges, alternative financing options geared to small business owners are gaining in popularity. Here’s a look at four alternative lenders who may provide the affordable and fast access to cash that you need to maintain and grow your business.
Fundbox. When customers and clients are slow to pay, it can impact your ability to pay business vendors, and staff. Fundbox offers small business owners credit-on-demand that works in tandem with popular accounting software including Xero, QuickBooks, Wave, and FreshBooks. Applying for an account can be done in seconds online, and once established, the account is easily connected to the accounting app (from providers noted above). Fundbox users can then clear any invoice immediately and receive the money they’re owed (even if the vendor doesn’t pay for several weeks). Though there is a fee for such liquidity, the amount associated with each transaction is provided upfront, so borrowers can determine whether the reward of fast cash outweighs the cost. Repayment of credit on demand takes place over 12 weeks, in installments.
Behalf. This lender provides merchants with credit lines of up to $10,000. The money can be used to pay vendors for a variety of products or services (including legal counsel, or marketing projects) related to the business (but cannot be used to fund existing debt). Repayment terms extend up to 120 days, with customizable payment schedules. The site boasts the highest approval rate in the alternative financing industry, and claims that its customers have reported a 20% increase in sales with the additional credit line access.
Bluevine. Bluevine offers businesses access to credit lines up to $100,000. Like Fundbox, it also connects with Xero, QuickBooks and FreshBooks. Unlike Fundbox, it facilitates the collection of invoices on the businesses’ behalf. To do so, merchants select which vendors Bluevine will collect from directly, based on payment schedules and amounts owed. A remittance PO Box is assigned, so the payor is unaware they are paying Bluevine directly. When the money is received, Bluevine transfers the amount paid electronically to the businesses’ bank account (less fess), often within 24 hours of payment receipt. Because the funds are not actually “borrowed” (outstanding invoices serve as the “collateral”), there is no repayment schedule. If a vendor doesn’t pay an invoice, however, the business owner must pay Fundbox for the amount owed.
Kabbage. Kabbage offers fast access to working capital for online sellers, with credit lines ranging from $2,000 to $100,000. Because the approval process is based on data provided by other popular business resources, like Square, Paypal, Stripe, Etsy, Amazon, Yahoo, and QuickBooks; it’s a perfect fit for businesses who need inventory, and have a proven online business presence—but may lack credit history. Though there is no penalty for early repayment, fees do range from 1% to 13.5% of the loan amount the first two months; they reduce to 1% of the loan amount for each of the remaining four months.
Guidant Financial. Through Guidant Financial’s “ROBS” (rollovers for business startups) lending product, small business owners under the age of 59 ½ can access retirement funds to invest in a business (new or existing), without being subject to penalty and fees for early withdrawal of retirement funds. Because a ROBS lending model leverages retirement funds as the source of funding, money isn’t borrowed, and there are no repayment plans associated with the transaction. That said, there is risk: should the business fail, the business owner could lose the retirement funds that were put forth. Unlike the alternative financing models noted above, establishing a ROBS takes about a month complete. As such, it’s intended for larger and long-term borrower needs (like buying a warehouse, storefront or expensive equipment) as opposed to short-term access to cash.
Buy Supplies - Related Items
Questions & Answers (0)
Question + Answer. Here you can ask or answer questions All questions are queued and answered quickly during business hrs. You can also answer questions posted by other customers if you have valuable information.
0 Question(s) Shown Below
No items listed at this time, please check back often as we are adding kits/items everyday. |
Beat Magnus' record time
Achievement Guide for I am speed
Achievement won on 13 Dec 15TA Score for this game: 4,299
Posted on 27 December 15 at 08:05
This solution has 8 positive votes and 0 negative votes. Please log in to vote.
This achievement is story related.
In the Speed (green) storyline with Spike, there will be a time trial event called "Angel At The Redline". The race itself isn't that difficult, and once you complete it in under 3:50, the achievement will pop. |
Q:
Metal Gear Solid Story
I just have one question, I've played Metal Gear Solid 3, that's the only MGS game I've played to completion (and it was awesome) but I have a question about the story in Metal Gear Solid 4.
It's obvious that the "Snake" character in MGS4 is not the same Snake character in MGS3 that turned into "Big Boss", after defeating "The boss". So I am very confused on this. Are there two Snakes? Or three? because in the recent addition to the series "MGS5" there's an entirely different Snake that is called "Big Boss" but I thought (According to MGS4) that "Big Boss" died? Now I'm all confused.
I would really appreciate it if any of you out there who are familiar with this game could help me understand this. Thanks!
A:
So I am very confused on this, there are two snakes?
Five, actually. Unmarked spoilers ahead.
Big Boss (Naked Snake) is the original Snake. He is the main protagonist of MGS3. The other Snakes are cloned from or based off him.
Solid, Liquid, and Solidus are imperfect clones made by the "Les Enfants Terribles" Project.
Solid Snake is the protagonist of MGS1, part of MGS2, and MGS4. Usually, "Snake" refers to him. Unlike his brothers, he is almost identical in appearance to Big Boss.
Liquid Snake was killed in MGS1. Revolver Ocelot stole his arm and had it transplanted to replace his, which he lost. Liquid later took control of Ocelot through this arm to become Liquid Ocelot.
Solidus Snake appears in MGS2.
The Snake in MGSV is Venom Snake, a body double of Big Boss. He is not a clone- the resemblance was created by plastic surgery so he could impersonate Big Boss.
A:
It might help if you look at the series timeline to get to grips with the Snakes:
1964 – MGS3: Snake Eater
1970 – Portable Ops
1974 – Peace Walker
1975 – MGSV: Ground Zeroes
1984 – MGSV: The Phantom Pain
1995 – Metal Gear
1999 – Metal Gear 2: Solid Snake
2005 – Metal Gear Solid (The Twin Snakes)
2007/09 – MGS2: Sons of Liberty
2014 – MGS4: Guns of the Patriots
2018 – Revengeance
There are a few Snakes that fall into this timeline:
Naked Snake
MGS3 (1964) to MGSV (1984)
aka Big Boss aka Venom Snake
MGSV Spoiler:
Venom Snake turns out to be a body double of Big Boss, and actually not related.
Solid Snake
Metal Gear (1995) to MGS4 (2014)
Genetic clone of Naked Snake.
Liquid Snake
Antagonist of MGS1 (2005)
Genetic clone of Naked Snake.
MGSV Spoiler:
Appears in MGSV as a child called Eli
Solidius Snake
Antagonist of MGS2 (2009)
Genetic clone of Naked Snake
|
You’re filtering on:
Telehealth pilot projects and trial implementations are numerous but are often not fully evaluated, preventing construction of a sound evidence base and so limiting their adoption. The authors describe the need for a generic telehealth project evaluation framework, within which evaluation is undertaken based on existing health systems performance indicators, using appropriately chosen measures.
They provide two case studies explaining how this approach could be applied, in Australian and Canadian settings. It is argued that this framework type of approach to evaluation offers better potential for incorporating the learnings from resultant evaluations into business decisions by “learning organisations”, through alignment with organisational performance considerations. |
I don't know if other PCB's will be compatible or not but if not then QMK is a must for me. I'm so ready to order one of these when the GB drops because the case is one of the most beautiful things I've laid my eyes on.
Looking at the build log album, there is a lot of space inside the case. I'm concerned that this will amplify and resonate sounds.Is it possible to change the design so only plate space is machined out?
Everything else is fine, but the sound resonance might be a deal breaker for me.
Looking at the build log album, there is a lot of space inside the case. I'm concerned that this will amplify and resonate sounds.Is it possible to change the design so only plate space is machined out?
Everything else is fine, but the sound resonance might be a deal breaker for me.
Hard question to answer. The loudness made from typing were just normal to me.There were some reasons why CA66 was designed like this. Mostly was due to CNC issue.So it is not changeable.Thanks for asking.
Looking at the build log album, there is a lot of space inside the case. I'm concerned that this will amplify and resonate sounds.Is it possible to change the design so only plate space is machined out?
Everything else is fine, but the sound resonance might be a deal breaker for me.
Looking at the build log album, there is a lot of space inside the case. I'm concerned that this will amplify and resonate sounds.Is it possible to change the design so only plate space is machined out?
Everything else is fine, but the sound resonance might be a deal breaker for me.
Fill it with dampening material.
Not as effective as appropriately sized space. Someone I know already tried.
Looking at the build log album, there is a lot of space inside the case. I'm concerned that this will amplify and resonate sounds.Is it possible to change the design so only plate space is machined out?
Everything else is fine, but the sound resonance might be a deal breaker for me.
Hard question to answer. The loudness made from typing were just normal to me.There were some reasons why CA66 was designed like this. Mostly was due to CNC issue.So it is not changeable.Thanks for asking.
Doesn't removing that much material just make the case take longer to build? Like instead of having rounded out cutouts where the bolts connect to the top/bottom, couldn't you just make the walls thicker?
Just seems like you are increasing manufacturing cost to reduce weight and make a less rigid case.
Have you considered adding some bolt holes to allow an internal weight to the giant hollow section?
Looking at the build log album, there is a lot of space inside the case. I'm concerned that this will amplify and resonate sounds.Is it possible to change the design so only plate space is machined out?
Everything else is fine, but the sound resonance might be a deal breaker for me.
Hard question to answer. The loudness made from typing were just normal to me.There were some reasons why CA66 was designed like this. Mostly was due to CNC issue.So it is not changeable.Thanks for asking.
Doesn't removing that much material just make the case take longer to build? Like instead of having rounded out cutouts where the bolts connect to the top/bottom, couldn't you just make the walls thicker?
Just seems like you are increasing manufacturing cost to reduce weight and make a less rigid case.
Have you considered adding some bolt holes to allow an internal weight to the giant hollow section?
I am not the designer, so what I replied was basically based on our daily conversation.I myself won't ask anything relates to design and manufacturing, since there is always a reason for "why it's been made like this".There is one thing confirmed: Yock did reduce more material for reducing weight. He didn't want this keyboard to be as heavy as other keyboard kits.If there is anything we can improve, that will be put in the next keyboard.Thanks for the comment. |
Iona Announces 2013 Lacrosse Schedule and Captains
NEW ROCHELLE, NY - Iona College lacrosse head coach Michelle Mason has announced a 16-game slate which features seven home games and a trip to the west coast.
Prior to the start of training camp, Mason also announced that seniors Kylie Gregory and Lauren Henwood will be this seasons co-captains. Gregory was named to the All-MAAC First Team last season after scoring a team-high 42 goals, finishing with 58 points overall. Henwood started 11 games last season and won 13 draw controls.
The Gaels will begin the season at Northeast Conference foe Sacred Heart on Feb. 20 before making their home debut three days later to take on the Huskies of the University of Connecticut on Feb. 23 to close out the opening month of play.
Continuing with the early season New England regional trend, Iona makes a trip to NCAA Tournament participant Massachusetts on Mar. 2 and then hosts Quinnipiac on Mar 6. The Bobcats will join the MAAC next season as a full sport member.
Big East member Cincinnati travels to Mazzella Field on Mar. 9, as the Bearcats return the series to New Rochelle. Last season, the Gaels came away with the road win 21-13.
The squad will play their next two games on the west coast, beginning with California on Mar. 13 and then UC Davis on Mar. 15. The next road match will be played at the site of the 2012 NCAA Division I National Championship game – Stony Brook on Mar. 20.
Iona will conclude the non-conference portion of the schedule with a home game against St. Bonaventure on Mar. 23 and a road contest at New Hampshire on Mar. 27.
The six-game MAAC schedule will see Iona play host to three of the six dates, beginning with Manhattan (Apr. 3), followed by Niagara (Apr. 13) and wrapping up with Siena (Apr. 20) on Senior Day. The Gaels' road conference slate includes games with Canisius (Mar. 30), Fairfield (Apr. 10) and Marist (Apr. 17).
The 2013 MAAC Women's Lacrosse Championship will be held the weekend of May 3-5 at Marist College in Poughkeepsie, N.Y. The semifinals will be played on Friday and the Championship game on Sunday. |
A Solution-Processed Resonance Host for Highly Efficient Electrophosphorescent Devices with Extremely Low Efficiency Roll-off.
Solution-processible N-P=O resonance-host molecules are applied successfully in spin-coated phosphorescent light-emitting diodes (PHOLEDs) to selectively and self-adaptively tune the electrical properties for balanced charge transportation. The resonance-molecule-hosted PHOLEDs exhibit a high maximum quantum efficiency of 16.5% and a low efficiency roll-off down to 0.7%, highlighting the significant progress of these solution-processed PHOLEDs with high efficiency and flat efficiency roll-off achieved simultaneously. |
In 2009, the International Education Society wanted to increase traffic to its Czech website, www.Skoly.cz. View Summary
In 2009, the International Education Society wanted to increase traffic to its Czech website, www.Skoly.cz. The site provides information on the different types and levels of education available to Czechs. The objectives of the campaign were to increase views of the website by 200% in order to tackle the larger economic problems in the country caused by a lack of skilled labour. The campaign was targeted at young people deciding on their future education and workers seeking new skills. The campaign tapped into the Czech sense of humour with the well-known phrase, ‘should you not learn more, you end up digging’. This message was displayed on T-shirts worn by ten men digging in the centre of Prague where they could be seen by thousands. The campaign gained a large amount of media and public attention and was a success; reaching a large amount of people.
Belgacom TV, the Belgium television company, had been successful in attracting customers through its ownership football rights and it saw a similar sales potential in increasing awareness of its paid movie offers. View Summary
Belgacom TV, the Belgium television company, had been successful in attracting customers through its ownership football rights and it saw a similar sales potential in increasing awareness of its paid movie offers. Belgacom’s objective was to link its brand image to movies in the most convincing and appealing way possible, thereby boosting sales. Movie watchers are a large group, so the campaign had to have a wide appeal while focusing on families with children as this group had been identified as the most likely to purchase a movie. The campaign consisted of a televised advert showing the story of a Belgium man sharing a house with several big Hollywood stars. In order for him to communicate with them he must speak ‘Flenglish’ – a mixture of English and Flemish. This campaign was supported by a mini-site and an exhibition at the country’s largest campsite which reached around 10,000 people.
SCA-owned toilet paper brand Triple Velvet was number two in the UK market and needed to increase awareness of its new environmental strategy: for every tree it used it would replant three more. View Summary
SCA-owned toilet paper brand Triple Velvet was number two in the UK market and needed to increase awareness of its new environmental strategy: for every tree it used it would replant three more. They wanted to target mums with children aged between 5 and 7 who were interested in the environment and wanted to educate their children about it. An interactive brand experience featuring the brand’s well-known spokesperson Baby MD was created using an artificial forest installation which toured shopping centres across the UK which invited children to become a tree detective. A log book was given to children who participated, which was used to promote a microsite designed to mirror the interactive forest activity. Parents of the children were also given a discount coupon for their next purchase of Triple Velvet. The objectives of the campaign included having an ROI payback inside of two years and a 1.5% conversion to purchase.
Kofola is a soft drink from the Czech Republic, where it serves as the market leader for cola-flavoured drinks. View Summary
Kofola is a soft drink from the Czech Republic, where it serves as the market leader for cola-flavoured drinks. The brand wanted to further promote itself to consumers of all ages in the Czech Republic and Slovakia via the internet. The campaign was based around a microsite, featuring an actress famous in both countries, which allowed users to personalise a “Christmas Prophecy” to send to a friend. These e-cards could then be shared on Facebook and the site itself was promoted through online banners, social media, via direct mail and a limited edition Kofola bottle. The campaign succeeded in its goal of reaching more users than the previous year’s campaign.
The lemon-flavoured soft-drink Gini, owned by Orangina Schweppes Belgium, had been declining for several years because of young people preferring sweeter soft drinks. View Summary
The lemon-flavoured soft-drink Gini, owned by Orangina Schweppes Belgium, had been declining for several years because of young people preferring sweeter soft drinks. In response, Gini launched a sweeter flavour called “Passion” and wanted to promote both its “Lemon” and “Passion” variants to 18-24 year old Belgians, but in a way that didn’t exclude the over 30s. The campaign revolved around the ‘Angel or Demon’ concept and was promoted on public transport, online, social media and in key target areas (such as universities and cinemas). Further promotion occurred through the use of branded items and drink samples in clubs, pubs and food outlets. The campaign led to an increase sales of 9%.
Publishing house Klewer were looking for a cover design for the International Advertising Festival in Cannes Belgian edition of its advertising/marketing magazine PUB. View Summary
Publishing house Klewer were looking for a cover design for the International Advertising Festival in Cannes Belgian edition of its advertising/marketing magazine PUB. The recession meant many Belgians would be following the event from home, which led to the concept that PUB magazine would use its cover to make consumers feel like they were part of the festival. Using augmented reality technology the cover led to a promotional website which allowed consumers to pose with their own ‘Cannes Lion’ trophy. The pictures were collated to an online “Hall of Fame” that led it to news of the site spreading virally online.
The savoury snack brand Doritos, owned by PepsiCo, wanted to promote the launch of its new mystery flavour crisps in the UK, alongside increasing sales and creating consumer engagement. View Summary
The savoury snack brand Doritos, owned by PepsiCo, wanted to promote the launch of its new mystery flavour crisps in the UK, alongside increasing sales and creating consumer engagement. The strategy aimed to create a digital gaming experience that would appeal to its target consumers, which are predominantly male 16-24 year old online gaming enthusiasts. The first part of the campaign allowed consumers to try to guess the mystery flavour for the chance to win £20k. This was supported by an online advergame which consumers could progress through by entering unique codes available on promotional Doritos packs. If the game was completed, it gave the consumer a chance to win prizes including a cash prize of £50k. In order to promote the game, a cinematic trailer was seeded across the web and influential bloggers were given unique codes for use in the advergame that they could share with their readers.
Chiquita, the Czech banana brand was worried about losing out to competitors and wanted to defend its place on supermarket shelves. View Summary
Chiquita, the Czech banana brand was worried about losing out to competitors and wanted to defend its place on supermarket shelves. Chiquita’s bananas are more expensive than the other brands in the Czech Republic, however it did not wish to lower its prices; it also wanted to maintain or increase sales during the summer period where banana consumption traditionally slows. Chiquita’s main consumers are mothers so it decided to tap into emotions connected to family relationships. The campaign involved the handing out of stickers in stores. These stickers were similar to the ones on Chiquita’s bananas but had messages of love written on them; the idea was to place a declaration of love on a banana and give it to a loved one. Total sales of Chiquita bananas increased by 34% during the promotional period.
Come a Casa, the maker of premium ready-made meals in Belgium, wanted to shift the way its brand was perceived. View Summary
Come a Casa, the maker of premium ready-made meals in Belgium, wanted to shift the way its brand was perceived. Ready meals were traditionally viewed as the food of bachelors and students; a quick and convenient way to eat a meal, often alone and with no emotional value attached. Come a Casa wanted to challenge these perceptions and to emphasise the social dimensions of its convenience meals. As its products were Mediterranean meals, Come a Casa linked its campaign to the Italian national holiday Festa Della Repubblica; as Italians are well known for embracing large social dinners with family. The campaign involved an online search for Belgium’s biggest family, which when identified would receive a family dinner. This campaign was supported by adverts in newspapers, online and on Come a Casa packs which advertised the products as perfect for large meals with family.
In 2009 LEO of Kraft Foods, the makers of the famous Belgium waffle, wanted to launch a campaign that would allow it to continue to hold its own in a very competitive market with a budget of around 10% of that which its competitors enjoyed. View Summary
In 2009 LEO of Kraft Foods, the makers of the famous Belgium waffle, wanted to launch a campaign that would allow it to continue to hold its own in a very competitive market with a budget of around 10% of that which its competitors enjoyed. LEO’s target audience was young mothers who bought the waffles for their children, it therefore wanted the campaign to emphasise a feeling of wholesomeness while tapping into the nostalgia people felt about the original LEO advert in 1989. The campaign consisted of the original character, Rudi searching for his replacement and enlisting the help of the Belgium public. The person selected won the chance to record a song with a famous music producer. This campaign was accompanied by a partnership with a national reality TV show and Rudi went on to host his own television programme.
Sales in GlaxoSmithKline’s soft drink brand Ribena were declining because of increased competition from Oasis, as well as Ribena not being seen as a lunchtime drink. View Summary
Sales in GlaxoSmithKline’s soft drink brand Ribena were declining because of increased competition from Oasis, as well as Ribena not being seen as a lunchtime drink. Therefore Ribena wanted to drive penetration of the brand amongst lunchtime drinkers by targeting more affluent consumers aged 25-35 who worked full-time, had no kids and lived in major conurbations. It hoped that this would increase sales of Ribena by 10%. The campaign was based around the ‘Out For Lunch’ concept which gave those who purchased Ribena a chance to win 1 of a million inflatable lunchtime assistants. The idea was designed to encourage workers to escape their desks for their lunch break, allowing the assistant to ‘do their work’ whilst they were away, as well as incentivising purchase.
The second largest supermarket chain in the UK, ASDA, has over 370 stores nationwide. There were concerns that the recession would affect ASDA’s ability to fundraise with charitable donations dropping by 25% across the whole sector. View Summary
The second largest supermarket chain in the UK, ASDA, has over 370 stores nationwide. There were concerns that the recession would affect ASDA’s ability to fundraise with charitable donations dropping by 25% across the whole sector. As a result, they needed an innovative strategy to get shoppers to donate to annual British charity appeal, Children in Need. Capitalising on the revival of home baking, the campaign targeted children aged 5-11 and their parents in ASDA stores by handing out a free ‘Bake the Bear’ kit. The kit was sponsored by Flora and children could use it to make cookies to sell and raise money for Children in Need. The campaign was promoted in official fundraising packs, ASDA stores, its magazine and online. The Bake the Bear campaign meant ASDA exceeded their fundraising target of £1.5 million by over 12%, despite the recession.
Pepsi Co International was looking to increase the market share its carbonated soft drink 7UP had on the ‘Impulse’ sector in Ireland, where it was number three at the time. View Summary
Pepsi Co International was looking to increase the market share its carbonated soft drink 7UP had on the ‘Impulse’ sector in Ireland, where it was number three at the time. The campaign, ‘7Up Natural Wonders,’ revolved around 7UP officially supporting the Irish Cliffs of Moher’s bid to be one of the new 7 Natural Wonders of the World. The first phase of the campaign was based online, with and social media directing people a promotional website featuring viral videos and social media pages of a “Moher Man” character. The second phase incorporated in-store activity where trips to one of the existing 7 Natural Wonders of the World were given away. The campaign was further publicised by branding on over 6.9 million bottles, on-street activity, PR, TV, radio and print. Researched showed there was an 87% awareness level for the campaign.
Kraft Food’s German chocolate brand Milka wanted to raise awareness of its expanded line of praline chocolates and its new “Kleines Dankeschön” (A Small Thank You) range to its core audience of most female, 30-59 year olds. View Summary
Kraft Food’s German chocolate brand Milka wanted to raise awareness of its expanded line of praline chocolates and its new “Kleines Dankeschön” (A Small Thank You) range to its core audience of most female, 30-59 year olds. The campaign involved a “Sag es mit Milka” (Say It with Milka) microsite which allowed consumers could send somebody a box of chocolates with a personalised greeting and encouraged participation through the inclusion of prize draws. The promotion was advertised online, the radio and through a branded ‘letter box’ stand to be displayed in shops.
Soft drink giant Coca-Cola wanted to create a digital reward programme that engaged the target audience of teenagers, young adults and mums in the UK during a time of increasing economic uncertainty. View Summary
Soft drink giant Coca-Cola wanted to create a digital reward programme that engaged the target audience of teenagers, young adults and mums in the UK during a time of increasing economic uncertainty. The promotion, Coke Zone, allowed consumers to collect points from codes on bottles, which could be redeemed for prizes via an online account. The key communication tool was email, with a monthly e-newsletter sent to encourage the earning and redeeming of points. The content of the email varied by audience which was split into three sections: teenagers, male adults and female adults. The campaign resulted in a 10% growth in consumption by active members after three months and an increased propensity to purchase Coca-Cola from regular site users of up to 30% (compared to one time users).
During the economic recession, automotive manufacturer Volkswagen was looking to promote its new-style campervans in the UK, for the first since time since 2003. View Summary
During the economic recession, automotive manufacturer Volkswagen was looking to promote its new-style campervans in the UK, for the first since time since 2003. The vans sit in a market of its own between MPVs and motor-homes and come equipped with a cooker, coolbox, sink and comfortably sleep up to four adults. The core audience being targeted were grown-up campers (55+ with no kids at home), active families (35+ with kids at home) and outdoor adventurers (25-54 with no kids at home). The campaign revolved around the concept of ‘escaped VW campervans’ which aimed to show how consumers could go on holiday with the vans. They were loaned to celebrities (including British radio DJ Jo Whiley and Olympic medallist Bryony Shaw) who shared their experiences via social media. Publicity was also generated through POS material in campervan outlets, a microsite and appearance of the van at summer events relevant to the target audience. The campaign received positive feedback on social media platforms.
Albert Heijn, the largest food retailer in the Netherlands, was enjoying good sales but realised that families with children were unrepresented in stores and decided to remedy this. View Summary
Albert Heijn, the largest food retailer in the Netherlands, was enjoying good sales but realised that families with children were unrepresented in stores and decided to remedy this. Its objectives were to increase brand awareness, preference and likeability amongst families with children and also increase market share and weekly sales. In a climate of supermarket price wars and price slashing, Albert Heijn decided to be different and launch an added-value campaign; shoppers would be given a set of football stickers for every 10 Euros spent at Albert Hejin stores. This promotion was accompanied by a television advert that showed Premier League footballers working in Albert Heijn stores. The TV commercial was supported by videos of the players released on YouTube to create an online buzz then outdoor and in-store adverts. There was also an accompanying online quiz as well as swap events and prizes for the best collectors.
Premium automotive brand Mercedes-Benz, a division of Daimler MG, wanted to improve its customer service and employee engagement in the UK during a time of economic recession. View Summary
Premium automotive brand Mercedes-Benz, a division of Daimler MG, wanted to improve its customer service and employee engagement in the UK during a time of economic recession. The campaign needed to be aimed at all 6,047 staff in both Mercedes-Benz and Smart dealers, meaning its target audience was very diverse, ranging from maintenance staff to the dealer principal. In order to meet this objective, the ‘Allstars’ programme was launched. The website explained to staff how their customer service was being measured and offered rewards to both individuals and teams that showed outstanding performance or improvement. It also featured an online quiz focusing on critical issues every quarter and a series of retro style online games in which dealerships could win prizes if their team performed well. As a result of the campaign, Mercedes–Benz came 4th in the JD Power survey, one of the main methods of measuring customer service experienced by motorists.
The Dutch don’t really eat many ice lollies compared to the rest of Europe; they view them as an unhealthy treat. View Summary
The Dutch don’t really eat many ice lollies compared to the rest of Europe; they view them as an unhealthy treat. It was because of this fact that OLA, owned by Unilever, wanted to change public perception of lollies and inform people exactly what they contained. OLA’s objectives were to distribute 4 million copies of its Snack-o-meter and to make at least 50% of its target audience aware of the campaign. The Snack-o-meter was an independent calorie counter that compared the amount of calories in various snacks, showing that many of OLA’s products had fewer calories than people generally thought. OLA wanted sales to rise by at least 3% and sales of the products advertised on the Snack-o-meter to rise by 15%. The campaign was supported by adverts on television, magazines, shop floors, online, promotional teams and an iPhone application. The campaign was a success; the iPhone app alone was downloaded 8,166 times.
The Italian NGO Cesvi needed an effective strategy to raise funds in order to teach those affected by the famine in Uganda how to grow their own food. View Summary
The Italian NGO Cesvi needed an effective strategy to raise funds in order to teach those affected by the famine in Uganda how to grow their own food. The campaign involved contacting previous donors with a mailing resembling a recipe book, with the ingredients being ones which Cesvi could teach Ugandans the grow. A follow-up email was sent several weeks later thanking those who’d donated and asking those who hadn’t to donate. As a thank you gesture, those which donated were emailed printable Ugandan recipes. Donations after the follow-up email guaranteed an ROI of 264%.
Coca-Cola’s fruit flavoured soft drink launched a six-month promotional programme called “Con Poco Me Lo Monto” (“I get by with little”) designed to engage young people in Spain aged 16 to 22, by allowing them to take part in games on a microsite which gave them the chance to win prizes. View Summary
Coca-Cola’s fruit flavoured soft drink launched a six-month promotional programme called “Con Poco Me Lo Monto” (“I get by with little”) designed to engage young people in Spain aged 16 to 22, by allowing them to take part in games on a microsite which gave them the chance to win prizes. The campaign was publicised on Fanta products as well as press, out door, radio, internet and TV. There were more than 2.5 million visits to the microsite and 80% of participants were from the target age group.
Procter and Gamble-owned laundry detergent Ariel wanted to raise awareness in Germany of their win of the SitWa award for the second year running. View Summary
Procter and Gamble-owned laundry detergent Ariel wanted to raise awareness in Germany of their win of the SitWa award for the second year running. It partnered with the number-one food retailer in Germany, the Edeka Group, in its aim to engage mothers and their children in the promotion. Based on the German’s love of football, Ariel and Edeka launched a competition to win youth football jerseys. Promotion was done through posters, standees, online and organising promotional events. The campaign increased Ariel’s volume share of the market by over 20%.
Belgian beer Maes, owned by manufacturer Alken-Maes, had suffered a negative trend in growth over the last 25 years, largely owing to from increased competition from Inbev-owned beer Jupiler. View Summary
Belgian beer Maes, owned by manufacturer Alken-Maes, had suffered a negative trend in growth over the last 25 years, largely owing to from increased competition from Inbev-owned beer Jupiler. Maes had recently been relaunched with new packaging and a new taste and it was looking for an innovative way to target 18-35 year old beer drinkers without excluding women. The campaign asked people to put an empty crate in front of their window, and if one of their teams spotted it, they were given a full crate of Maes. Promotion was done through TV, press, radio, blogs and social networks.
Diageo-owned wine brand Blossom Hill wanted to be able to differentiate itself in the cluttered UK wine market where brand loyalty is low. View Summary
Diageo-owned wine brand Blossom Hill wanted to be able to differentiate itself in the cluttered UK wine market where brand loyalty is low. Rosé wine tends to be the most popular in the summer period but it was under increasing competition from other ‘summer’ drinks as well as being affected by the recession. Therefore, Blossom Hill became the official sponsor of the Wimbledon tennis tournament for the ‘Let Play Begin a Wimbledon’ campaign, aimed at 30-45 year old women with higher-than-average incomes and children. The strategy was executed at the event by serving a Rosé-based tall drink, a prize draw to win silverware and through branded rickshaws. Furthermore, limited edition Wimbledon bottles being sold in stores across the country and a microsite offered the chance to win Wimbledon Ladies Final tickets. The campaign resulted in a 135% increase on year-on-year sales.
In 2009, McDonalds sought to improve its image in Belgium in order to counter the negative perception of its food quality. View Summary
In 2009, McDonalds sought to improve its image in Belgium in order to counter the negative perception of its food quality. Its objective was to show to people that its food was of good quality and had nothing to hide. ‘Nothing to hide’ was the creative message used in the campaign which consisted of radio and cinema advertising leading up to a Kitchen Open Doors event. The adverts involved McDonalds’ employees and customers speaking about the good quality of its food and emphasising the message of ‘nothing to hide’ by doing radio spots completely naked. The campaign culminated in an event where McDonalds opened its kitchen doors to the press to show it had nothing to hide. The campaign generated media coverage worth an estimated 1,050,000 Euros and resulted in an increase in the quality image of the brand. |
Evaluation of current regulation and guidelines of pharmacogenomic drug labels; opportunities for improvements.
Pharmacogenomic drug labels in summary of product characteristics (SmPCs) provide an instrument for clinical implementation of pharmacogenomics. We compared pharmacogenomic guidance by CPIC, DPWG, FDA, and by the European agencies EMA, CBG-MEB and FIDMD, collectively assigned as EMA/FM. Out of 54 drugs with an actionable gene-drug interaction in the CPIC and DPWG guidelines, only 50 % had actionable pharmacogenomic information in the SmPCs and the agencies were in agreement in only 18 % of the cases. We further compared 450 additional drugs, lacking CPIC or DPWG guidance, and found 126 actionable gene-drug labels by FDA and/or EMA/FM. Based on these 126 drugs in addition to the 54 above the consensus of actionable pharmacogenomic labelling between FDA and EMA/FM was only 54 %. In conclusion, guidelines provided by CPIC/DPWG are only partly implemented into the SmPCs and the implementation of pharmacogenomic drug labels into the clinics would strongly gain from a higher extent of consensus between agencies. |
---
title: Bug Check 0xB9 CHIPSET_DETECTED_ERROR
description: The CHIPSET_DETECTED_ERROR bug check has a value of 0x000000B9.This bug check appears very infrequently.
ms.assetid: 21d92ea9-dae3-41f1-b0e7-3701c420f7ca
keywords: ["Bug Check 0xB9 CHIPSET_DETECTED_ERROR", "CHIPSET_DETECTED_ERROR"]
ms.date: 05/23/2017
topic_type:
- apiref
api_name:
- CHIPSET_DETECTED_ERROR
api_type:
- NA
ms.localizationpriority: medium
---
# Bug Check 0xB9: CHIPSET\_DETECTED\_ERROR
The CHIPSET\_DETECTED\_ERROR bug check has a value of 0x000000B9.
This bug check appears very infrequently.
> [!IMPORTANT]
> This topic is for programmers. If you are a customer who has received a blue screen error code while using your computer, see [Troubleshoot blue screen errors](https://www.windows.com/stopcode).
## Resolution
The [**!analyze**](-analyze.md) debug extension displays information about the bug check and can be very helpful in determining the root cause.
|
Adult community acquired bacterial meningitis in a Singaporean teaching hospital. A seven-year overview (1993-2000).
The objective of this study is to describe the bacteriological, clinical and laboratory features of community acquired bacterial meningitis in adults admitted to a Singapore tertiary-care hospital. Two hundred sixty-nine cases of meningitis or meningoencephalitis admitted between 1993 and 2000 were identified by their discharge diagnosis codes. All case records except for 57 which could not be retrieved were retrospectively reviewed. Patients less than 14 years or with skull fractures, post-neurosurgery or with indwelling intracranial devices were excluded. Inclusion criteria was a clinical picture compatible with a diagnosis of bacterial meningitis with either (1) positive cerebral-spinal fluid (CSF) cultures or latex coagglutination or CSF neutrophilic pleocytosis accompanied by positive blood cultures or (2) in the absence of positive blood cultures, CSF cultures and latex agglutination, presence of CSF pleocytosis of at least 100 neutrophils per microL. Fifteen "culture-positive" and 11 "culture negative" cases were identified. Six (55%) of the "culture-negative" cases received antibiotics prior to admission. Cultures grew Streptococcus pneumoniae in four cases, three cases each of Group B streptococci and Neisseria meningitides. Listeria monocytogenes and Klebsiella pneumoniae were each seen twice and Streptococcus suis once. All cases of Group B streptococci occurred in the year 1998. Mortality was 19% (n = 5), six developed infections in other sites, three epileptic seizures, three developed hydrocephalus, and two hearing loss. Pathogens are similar to those reported in other studies but for an outbreak of Group B Streptococcus in 1998. There were a high number of "culture-negative" cases which may be due to preceding antibiotic intervention. |
o convex_0
v -0.643059 -1.321918 -1.028985
v 0.945668 -3.284153 1.120535
v 0.914525 -3.284153 1.120535
v 0.478309 0.859383 1.058205
v 1.039098 0.858938 -0.935277
v -0.985635 0.859383 0.995876
v -0.985635 -3.626999 -0.966442
v 0.976812 -3.689335 -0.966442
v -0.954492 -3.689335 0.995876
v -1.048132 0.859383 -0.997607
v 0.976812 0.859383 0.996089
v 0.976812 -3.689335 1.120535
v 1.101595 0.827770 -0.218699
v 0.073446 0.859383 -1.060150
v -1.048132 0.578427 0.559781
v -0.954492 0.859383 1.027254
v 1.007955 -3.533496 1.089370
v 1.101595 0.266749 -0.561299
v 0.789952 -2.878527 -0.997607
v 1.039098 0.858938 0.653276
v -0.985635 -2.878972 0.902595
v -0.954492 -1.103743 1.027254
v -0.424846 -0.137987 -1.059936
v -1.048132 0.142523 -0.997607
v 0.945668 0.859383 -0.966442
v 1.007955 -2.940863 -0.904112
v 0.509452 -0.667394 1.089584
v -0.954492 -3.689335 0.497452
v 0.135733 -0.231490 -1.060150
v 0.976812 0.423033 1.027040
v -0.518276 0.859383 -1.059936
v 0.540595 -3.689335 -0.966442
v 0.883382 -3.689335 1.120535
v -0.829919 -2.660798 -0.997607
v -1.048132 0.859383 0.559781
v -0.985635 -3.626999 -0.685958
v 1.070241 0.858938 -0.810618
v 1.007955 -2.162113 -0.966442
v -0.424846 -3.657722 -0.966442
v 1.039098 -0.137987 0.715392
v 0.135733 0.828215 1.058205
v 1.007955 0.610040 0.871216
f 40 20 42
f 6 4 10
f 10 4 11
f 2 3 12
f 9 8 12
f 10 11 14
f 4 6 16
f 12 8 17
f 13 17 18
f 9 6 21
f 6 15 21
f 6 9 22
f 16 6 22
f 15 10 24
f 14 11 25
f 17 8 26
f 18 17 26
f 3 2 27
f 2 4 27
f 16 3 27
f 9 7 28
f 8 9 28
f 14 25 29
f 25 19 29
f 4 2 30
f 11 4 30
f 2 12 30
f 12 17 30
f 10 14 31
f 23 1 31
f 1 24 31
f 24 10 31
f 14 29 31
f 29 23 31
f 19 8 32
f 8 28 32
f 12 3 33
f 9 12 33
f 3 16 33
f 22 9 33
f 16 22 33
f 19 7 34
f 1 23 34
f 24 1 34
f 7 24 34
f 23 29 34
f 29 19 34
f 6 10 35
f 15 6 35
f 10 15 35
f 7 9 36
f 9 21 36
f 21 15 36
f 24 7 36
f 15 24 36
f 13 18 37
f 11 20 37
f 20 13 37
f 5 25 37
f 25 11 37
f 18 26 37
f 37 26 38
f 8 19 38
f 25 5 38
f 19 25 38
f 26 8 38
f 5 37 38
f 7 19 39
f 28 7 39
f 19 32 39
f 32 28 39
f 17 13 40
f 13 20 40
f 4 16 41
f 27 4 41
f 16 27 41
f 20 11 42
f 11 30 42
f 30 17 42
f 17 40 42
o convex_1
v 0.104604 1.731615 -2.026132
v 0.291547 1.046316 -1.247440
v 0.322672 1.046316 -1.247440
v 0.229232 1.108737 -3.085065
v -0.300407 1.139878 -2.399722
v -0.238029 1.607053 -1.060348
v -0.269218 1.607053 -3.085065
v 0.229232 1.731615 -3.053751
v 0.260357 1.762755 -1.060348
v -0.238029 1.108737 -1.060348
v -0.300407 1.139878 -3.022635
v 0.353861 1.139878 -1.060348
v 0.260357 1.731615 -2.711079
v -0.269218 1.544702 -1.247440
v 0.260357 1.108737 -2.897973
v -0.175714 1.108737 -2.617732
v -0.300407 1.357930 -2.181712
v -0.206839 1.638194 -3.085065
v 0.198043 1.762755 -1.060348
v 0.353861 1.046316 -1.060348
v -0.019897 1.108737 -3.053751
v -0.206839 1.638194 -2.088166
v 0.135729 1.731615 -2.866857
f 61 50 65
f 45 44 46
f 51 48 52
f 49 46 53
f 52 47 53
f 51 52 54
f 50 51 55
f 51 54 55
f 48 49 56
f 47 52 56
f 52 48 56
f 46 50 57
f 50 55 57
f 55 54 57
f 44 52 58
f 52 53 58
f 49 53 59
f 53 47 59
f 47 56 59
f 56 49 59
f 46 49 60
f 50 46 60
f 48 51 61
f 51 50 61
f 43 60 61
f 44 45 62
f 45 46 62
f 52 44 62
f 54 52 62
f 46 57 62
f 57 54 62
f 46 44 63
f 53 46 63
f 44 58 63
f 58 53 63
f 49 48 64
f 60 49 64
f 48 61 64
f 61 60 64
f 60 43 65
f 50 60 65
f 43 61 65
o convex_2
v -0.300407 1.202152 2.865316
v 0.353861 1.731676 3.020905
v 0.353861 1.139844 3.020905
v 0.291547 1.108722 1.058431
v -0.238029 1.638181 1.152026
v -0.238029 1.700490 3.083503
v -0.206839 1.077472 1.058431
v 0.198043 1.575873 1.058431
v -0.269218 1.202152 3.114701
v 0.353861 1.731676 2.771922
v -0.206839 1.077472 1.401210
v -0.238029 1.389077 1.058431
v -0.300407 1.357955 3.114701
v 0.353861 1.139844 2.460342
v 0.229232 1.607059 1.276819
v 0.042290 1.077472 1.089629
v 0.198043 1.139844 3.020905
v 0.104604 1.731676 2.989706
v 0.291547 1.202152 1.089629
v -0.238029 1.607059 1.058431
v -0.269218 1.607059 3.020905
f 78 71 86
f 69 72 73
f 68 67 74
f 67 68 75
f 66 72 76
f 74 66 76
f 72 66 77
f 73 72 77
f 67 71 78
f 74 67 78
f 66 74 78
f 68 69 79
f 75 68 79
f 73 70 80
f 70 75 80
f 69 68 81
f 72 69 81
f 68 76 81
f 76 72 81
f 68 74 82
f 76 68 82
f 74 76 82
f 71 67 83
f 70 71 83
f 67 75 83
f 75 70 83
f 69 73 84
f 79 69 84
f 75 79 84
f 73 80 84
f 80 75 84
f 70 73 85
f 77 66 85
f 73 77 85
f 66 78 85
f 78 70 85
f 71 70 86
f 70 78 86
o convex_3
v -2.107514 0.890538 0.466377
v -2.605863 2.012140 -0.405784
v -1.827217 1.980850 -0.405784
v -3.073091 0.952898 -0.530504
v -3.041969 1.825060 0.528737
v -1.079495 0.952898 -0.468035
v -1.079495 1.856240 0.590987
v -1.079495 0.890648 0.528737
v -3.104213 0.921828 0.497557
v -1.079495 1.949670 -0.436964
v -2.948404 1.980850 -0.468144
v -2.450055 1.264479 -0.530504
v -3.104213 1.108689 0.528737
v -1.079495 0.890648 0.154797
v -2.979724 1.980850 -0.187744
v -1.235105 1.825170 -0.468035
v -2.948404 1.825060 0.559807
v -3.073091 1.108689 -0.530504
v -1.235105 1.700450 0.590987
v -3.041969 1.856240 0.466377
v -1.079495 1.887420 0.372837
v -2.387613 0.952898 -0.530504
v -3.104213 0.921828 0.154907
v -2.636787 0.984078 0.528737
v -2.948404 2.012140 -0.343424
v -2.169758 1.856240 0.559807
v -3.073091 1.638200 0.497557
v -3.041969 1.326839 -0.530504
v -3.041969 1.856240 0.310697
f 104 113 115
f 92 93 94
f 87 94 95
f 88 89 96
f 93 92 96
f 88 96 97
f 87 90 100
f 92 94 100
f 94 87 100
f 96 92 102
f 97 96 102
f 91 99 103
f 98 90 104
f 94 93 105
f 103 99 105
f 93 103 105
f 91 103 106
f 89 88 107
f 96 89 107
f 93 96 107
f 90 98 108
f 100 90 108
f 92 100 108
f 102 92 108
f 98 102 108
f 90 87 109
f 87 95 109
f 95 99 109
f 104 90 109
f 95 94 110
f 99 95 110
f 94 105 110
f 105 99 110
f 88 97 111
f 97 101 111
f 101 106 111
f 107 88 111
f 93 107 111
f 103 93 112
f 106 103 112
f 93 111 112
f 111 106 112
f 99 91 113
f 91 106 113
f 109 99 113
f 104 109 113
f 101 97 114
f 97 102 114
f 102 98 114
f 98 104 114
f 104 101 114
f 101 104 115
f 106 101 115
f 113 106 115
o convex_4
v 1.039046 0.859383 0.653085
v -0.580826 1.545032 -1.059942
v -0.580826 1.731557 -1.059942
v -0.985793 2.323620 1.058224
v 1.039046 2.417044 -0.935332
v -0.985793 0.859545 0.995815
v 0.976924 2.323620 0.964714
v 1.039046 0.859383 -0.935332
v -1.079297 2.510630 -0.997533
v -1.047915 0.859545 -0.997533
v 0.821085 0.859383 1.026916
v -0.113309 2.479434 0.310563
v -1.079297 0.890578 0.528475
v 1.101595 2.011991 0.466273
v 0.353781 1.046393 -1.059942
v 1.101595 0.859383 -0.592602
v -1.079297 1.856338 0.590884
v 0.478239 0.859383 1.058224
v 0.415904 1.793786 1.058224
v 0.260278 1.762752 -1.059942
v -0.954626 2.354815 1.058224
v 1.101595 0.952969 0.559783
v 0.976924 0.859383 0.995815
v 1.070214 2.323620 -0.904231
v -0.518490 0.859545 -1.059942
v -0.954626 0.859545 1.026916
v -0.767619 2.510630 -0.997533
v -1.079297 0.952969 -0.436891
v -1.079297 2.510630 -0.841823
v 1.101595 1.918405 -0.592602
v 0.821085 2.354653 0.871412
v -0.954626 1.762752 1.058224
v 0.852253 2.230196 0.995815
v -0.923458 2.292425 -1.028634
v 0.478239 2.448077 -0.966433
v 0.914588 0.859383 -0.966433
v 1.039046 2.385849 -0.312281
v -0.237980 2.479434 0.310563
v 0.976924 1.700361 0.995815
v 0.073271 0.859383 -1.059942
v 0.166775 0.859383 1.058224
f 155 133 156
f 123 116 126
f 125 121 128
f 117 118 130
f 116 123 131
f 121 119 132
f 128 121 132
f 124 128 132
f 123 126 133
f 133 126 134
f 119 133 134
f 130 118 135
f 120 130 135
f 119 134 136
f 129 122 137
f 116 131 137
f 131 129 137
f 126 116 138
f 116 137 138
f 123 120 139
f 131 123 139
f 117 130 140
f 119 121 141
f 124 125 143
f 128 124 143
f 125 128 143
f 132 119 144
f 124 132 144
f 119 136 144
f 127 142 144
f 142 124 144
f 129 131 145
f 139 129 145
f 131 139 145
f 120 127 146
f 136 122 146
f 127 136 146
f 133 119 147
f 119 141 147
f 122 136 148
f 136 134 148
f 118 117 149
f 125 124 149
f 135 118 149
f 140 125 149
f 117 140 149
f 124 142 149
f 142 135 149
f 127 120 150
f 120 135 150
f 142 127 150
f 135 142 150
f 120 123 151
f 130 120 151
f 123 133 151
f 122 129 152
f 139 120 152
f 129 139 152
f 120 146 152
f 146 122 152
f 136 127 153
f 144 136 153
f 127 144 153
f 134 126 154
f 137 122 154
f 126 138 154
f 138 137 154
f 148 134 154
f 122 148 154
f 121 125 155
f 125 140 155
f 140 130 155
f 130 151 155
f 151 133 155
f 141 121 156
f 133 147 156
f 147 141 156
f 121 155 156
o convex_5
v 3.001867 1.638200 0.559923
v 1.101790 1.700450 -0.592816
v 2.098574 0.890538 -0.561642
v 1.101790 0.952898 0.559923
v 3.095358 2.012140 -0.592816
v 1.101790 2.012140 0.466286
v 3.033096 0.921828 0.310648
v 3.033096 0.921828 -0.592816
v 1.101790 0.890538 -0.499294
v 2.877342 1.980850 0.591097
v 1.101790 1.918600 -0.592816
v 3.033096 0.952898 0.435228
v 3.001867 1.980850 0.528749
v 1.257544 2.012140 0.497575
v 1.382069 1.949670 -0.592816
v 1.288578 0.890538 -0.250019
v 3.033096 0.890538 -0.436946
v 2.098574 1.544660 0.591097
v 3.095358 2.012140 -0.436946
v 1.101790 0.921828 0.310648
v 1.101790 1.170939 0.559923
v 3.033096 1.077618 0.466286
v 3.095358 1.793990 -0.530468
v 1.101790 2.012140 0.372996
v 2.659327 0.890538 -0.592816
v 1.226510 0.952898 0.559923
v 2.877342 1.762810 0.591097
v 2.659327 1.980850 0.591097
f 177 174 184
f 158 160 162
f 158 161 164
f 158 159 165
f 160 158 165
f 161 158 167
f 158 162 167
f 166 157 169
f 161 162 170
f 166 169 170
f 161 167 171
f 165 159 172
f 172 159 173
f 163 172 173
f 161 170 175
f 170 169 175
f 163 160 176
f 160 165 176
f 172 163 176
f 165 172 176
f 162 160 177
f 170 162 177
f 160 174 177
f 169 157 178
f 168 175 178
f 175 169 178
f 164 161 179
f 168 163 179
f 163 173 179
f 173 164 179
f 175 168 179
f 161 175 179
f 162 161 180
f 167 162 180
f 161 171 180
f 171 167 180
f 159 158 181
f 158 164 181
f 164 173 181
f 173 159 181
f 160 163 182
f 163 168 182
f 174 160 182
f 168 178 182
f 182 178 183
f 157 166 183
f 166 174 183
f 178 157 183
f 174 182 183
f 166 170 184
f 174 166 184
f 170 177 184
|
CLEVELAND, Ga. (TMCNews) — As he ushered cars in the quiet parking lot, Van Sanders found himself at an impasse. The high school senior had long-since abandoned church, and a life stressed with drug abuse and physical ailments continued to take its toll. However, through the fog a small voice beckoned him.
"I remember standing on the road, directing traffic, asking the Lord Jesus to save me," said Sanders, associate professor of missions and evangelism at Truett-McConnell College.
No one in his family was a committed Christian, but when God saved Sanders and immediately called him to Africa, Sanders said, "There wasn't any fear in my heart about it."
In the following weeks, Sanders bought a Bible, quit his job, and enrolled in college, where he was discipled by Campus Crusade and Navigators.
Freshly founded in the faith, Sanders struggled in overcoming his past sins. "I had highs and lows, but I wanted to share with my friends what God had done in my life," he said.
"God brought people into my life who helped me process any question I had because it was a big transition," Sanders said. "My parents could see the change, but they weren't sure how to be involved and help me through it."
Sanders finished his studies and applied for the International Mission Board's Journeyman Program. He was soon headed to Zambia to plant churches.
During his farewell party, Sanders encountered Beth -- a young woman who donated to his missionary venture. IMB officials encouraged Sanders not to date prior to going overseas, but "she gave me a check, and I needed to thank her," Sanders said. "So, I asked her out to thank her." After a few dates, the two committed to marry upon Sanders' return, which they did.
Following the Zambia stint, the young couple moved to Fort Worth, Texas, where Sanders enrolled at Southwestern Baptist Theological Seminary. After seminary, Sanders returned to Africa with his young family.
Commissioned to Kenya, Sanders and fellow missionaries planted churches and discipled the Pokot people group in northwest Kenya. They planted about 20 churches among the Pokot and also taught and discipled pastors from other churches and people groups.
Sanders also taught at Kenya Baptist Theological College. "We had a seminary there in Nairobi, Kenya, that was non- residential," Sanders said. "So students would come in for two-to-three weeks every three or four months, get their classes, and go back to their home area and apply what they had learned either as pastors or church planters."
The challenges for Sanders were learning the new language, adjusting to a new culture, understanding different worldviews and "trying to communicate the Gospel across these different cultures and worldviews," he said.
"God taught me that a good amount of my Christianity was cultural more than biblical," Sanders said. "When I had to communicate what it meant to be a Christian in another culture, it was eye-opening to see how much of what I wanted to communicate was from my culture, not from the Bible."
Ten years later, the Sanders family returned to the States, where Sanders worked as a visiting professor of missions at Southern Seminary in Louisville, Ky. Additionally, he served as minister of missions at a nearby church.
Sanders later accepted a position in church planting at the North American Mission Board (NAMB), and moved to Georgia in 2000. During his 11-year stint at NAMB, Sanders identified immigrant people groups in the U.S., and assisted local churches to evangelize and plant churches among immigrant people groups like Somalis, Gujarati , Vietnamese or "whatever people groups were nearby," he said.
"When I was overseas in Kenya, around 1990, I said, 'Sometime in the future, I want to teach at a Christian seminary or college,'" recalled Sanders, who decided to pursue a doctorate in missiology.
When the position at Truett-McConnell arose, Sanders said, "Man, this is what the Lord wants."
In addition to other courses, Sanders teaches World Religions, History of Missions, and Introduction to Great Commission Studies. He is also director of mobilization for Truett-McConnell's World Missions Center.
"Though I'll be leading mission trips overseas," Sanders said, "I want to focus on unreached people groups here as well as overseas."
Also serving as director of TMC's Quality Enhancement Plan, Sanders said he wants to "weave everything together and help our students understand that part of being transformed into Christlikeness at a worldview level comes about through submission to Jesus."
"I want to see [students] transformed at their root so they bear more fruit," Sanders said. "That root -- our worldview -- changes into Christlikeness, therefore our outward expression and fruit increases in that Christlikeness."
Addressing biblically based education, Sanders said that, if God is the creator of anything that is true, then God is the foundation of all classroom subjects.
"When we come at any truth from His perspective, then our understanding of those subjects is going to be better and more accurate because we're starting with the God who created that subject," said Sanders, who added that in training students, he recognizes not all are "called to be a missionary or called to be a pastor, but everyone is called to witness."
"Christianity in the U.S. the last 50 years or more has made this false dichotomy between those who do ministry and those who support the ministers, but we're all ministers," Sanders said. "We just need to recognize the different gifts believers have and encourage one another to use those gifts and do the calling God has given us." |
Imagine a life with less: less stuff, less clutter, less stress, less debt, less
discontent. A life with fewer distractions. Now imagine a life with more: more
time, more meaningful relationships, more growth, more contribution, more
contentment. A life of passion that is unencumbered by the trappings of the
chaotic world around you.
What you’re imagining is an intentional life. Not a perfect life—not an easy life—but a simple life. Minimalism: A Documentary About the Important Things, a feature-length documentary from the popular simple living duo The Minimalists, examines the many flavors of minimalism by taking the audience inside the lives of minimalists from all walks of life.
From minimalist architects, designers, and musicians, to businessmen, authors,
and minimalist families, this film explores various recipes for how to live a more
meaningful, deliberate life. Not a perfect life—not an easy life—but a simple one.
Released: 2016 – Rating: NR – Duration: 79 minutes |
Fatal Dane County highway crash involves up to 29 vehicles
Feb. 12, 2018
VERONA, Wis. (AP) — Authorities say the number of vehicles involved in a fatal crash in the fog on a southern Wisconsin highway is now up to 29.
Dane County sheriff's spokeswoman Elise Schaffer says one person — a 53-year-old woman — died and six others were injured in the pileup on eastbound Highway 18/151 just south of Verona Monday morning. One of the six injured was transported to the hospital by helicopter. Sheriff's officials say poor visibility due to heavy patches of fog is believed to be a contributing factor.
The sheriff's office says uninjured drivers and passengers were taken to the Verona Fire Department. |
/*
Copyright 2008-2010 Gephi
Authors : Yi Du <duyi001@gmail.com>
Website : http://www.gephi.org
This file is part of Gephi.
DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
Copyright 2011 Gephi Consortium. All rights reserved.
The contents of this file are subject to the terms of either the GNU
General Public License Version 3 only ("GPL") or the Common
Development and Distribution License("CDDL") (collectively, the
"License"). You may not use this file except in compliance with the
License. You can obtain a copy of the License at
http://gephi.org/about/legal/license-notice/
or /cddl-1.0.txt and /gpl-3.0.txt. See the License for the
specific language governing permissions and limitations under the
License. When distributing the software, include this License Header
Notice in each file and include the License files at
/cddl-1.0.txt and /gpl-3.0.txt. If applicable, add the following below the
License Header, with the fields enclosed by brackets [] replaced by
your own identifying information:
"Portions Copyrighted [year] [name of copyright owner]"
If you wish your version of this file to be governed by only the CDDL
or only the GPL Version 3, indicate your decision by adding
"[Contributor] elects to include this software in this distribution
under the [CDDL or GPL Version 3] license." If you do not indicate a
single choice of license, a recipient has the option to distribute
your version of this file under either the CDDL, the GPL Version 3 or
to extend the choice of license to its licensees as provided above.
However, if you add GPL Version 3 code and therefore, elected the GPL
Version 3 license, then the option applies only if the new code is
made subject to such option by the copyright holder.
Contributor(s):
Portions Copyrighted 2011 Gephi Consortium.
*/
package org.gephi.desktop.importer;
import javax.swing.JPanel;
public final class WizardVisualPanel2 extends JPanel {
public WizardVisualPanel2() {
initComponents();
}
@Override
public String getName() {
return "...";
}
/**
* This method is called from within the constructor to initialize the form.
* WARNING: Do NOT modify this code. The content of this method is always
* regenerated by the Form Editor.
*/
// <editor-fold defaultstate="collapsed" desc="Generated Code">//GEN-BEGIN:initComponents
private void initComponents() {
javax.swing.GroupLayout layout = new javax.swing.GroupLayout(this);
this.setLayout(layout);
layout.setHorizontalGroup(
layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADING)
.addGap(0, 500, Short.MAX_VALUE)
);
layout.setVerticalGroup(
layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADING)
.addGap(0, 360, Short.MAX_VALUE)
);
}// </editor-fold>//GEN-END:initComponents
// Variables declaration - do not modify//GEN-BEGIN:variables
// End of variables declaration//GEN-END:variables
}
|
New Delhi , Oct 14 : The All India Mahila Congress slammed Haryana Chief Minister Manohar Lal Khattar for his comments against Congress interim president Sonia Gandhi and asserted that it revealed his and BJP's disrespectful attitude towards women.
"I strongly and unequivocally condemn Haryana Chief Minister Manohar Lal Khattar's remarks against Congress president Sonia Gandhiji. His remarks against the Congress president are deplorable and unparliamentary, it is a clear reflection of his and the BJP's disrespectful attitude towards women," the letter written by AIMC president, Sushmita Dev read.
Khattar had on Sunday poked fun at Sonia Gandhi's return as the interim president of the Congress party.
Addressing an election rally, Chief Minister Khattar recalled "After losing the Lok Sabha elections, Rahul Gandhi resigned as the Congress president and started saying that the party should get new president from outside Gandhi family," Khattar said.
"We thought this was good, to move away from nepotism (parivarvad)... But they spent three months moving around the country in search of a new party president. After three months who became the president? Sonia Gandhi. Khoda Pahar Nikli Chuiya, Vo Bhi Mari Hui. This is their condition," added Khattar.
The AIMC president said that such loose comments were aimed at diverting the attention from the issues such as unemployment and economic slowdown which are prevailing in the country and asserted that crimes including rape are on the rise and it is due to this reason that Khattar is seeking to divert the matter.
"Lowering the discourse is an attempt to divert attention from the real issues that are being evaded like joblessness and acute economic slowdown. Can anyone deny that Haryana has become the rape capital of India. Kidnapping and abduction are also on the rise. The Chief Minister of Haryana has no answers to the real issues that are adversely impacting the people of Haryana specially the women," the letter read.
"ML Khattar of the 'Beti Bachao' gang have failed as Haryana has the fourth highest crime rate in the country, there is a shocking shortfall in police manpower. At 27 per cent, the shortfall is highest among the northern states, and almost 4 times as high as the deficit in Punjab," it added. |
/*******************************************************
* Copyright (c) 2014, ArrayFire
* All rights reserved.
*
* This file is distributed under 3-clause BSD license.
* The complete license agreement can be obtained at:
* http://arrayfire.com/licenses/BSD-3-Clause
********************************************************/
#pragma once
#include <common/defines.hpp>
#include <af/device.h>
#include <af/dim4.hpp>
#include <cstddef>
#include <vector>
af::dim4 calcStrides(const af::dim4& parentDim);
af::dim4 getOutDims(const af::dim4& ldims, const af::dim4& rdims,
bool batchMode);
/// Array Arrayementation Info class
// This class is the base class to all Array objects. The purpose of this class
// was to have a way to retrieve basic information of an Array object without
// specifying what type the object is at compile time.
class ArrayInfo {
private:
// The devId variable stores information about the deviceId as well as the
// backend. The 8 LSBs (0-7) are used to store the device ID. The 09th LSB
// is set to 1 if backend is CPU The 10th LSB is set to 1 if backend is CUDA
// The 11th LSB is set to 1 if backend is OpenCL
// This information can be retrieved directly from an af_array by doing
// int* devId = reinterpret_cast<int*>(a); // a is an af_array
// af_backend backendID = *devId >> 8; // Returns 1, 2, 4 for CPU,
// CUDA or OpenCL respectively int deviceID = *devId & 0xff; //
// Returns devices ID between 0-255
// This is possible by doing a static_assert on devId
//
// This can be changed in the future if the need arises for more devices as
// this implementation is internal. Make sure to change the bit shift ops
// when such a change is being made
unsigned devId;
af_dtype type;
af::dim4 dim_size;
dim_t offset;
af::dim4 dim_strides;
bool is_sparse;
public:
ArrayInfo(unsigned id, af::dim4 size, dim_t offset_, af::dim4 stride,
af_dtype af_type)
: devId(id)
, type(af_type)
, dim_size(size)
, offset(offset_)
, dim_strides(stride)
, is_sparse(false) {
setId(id);
static_assert(std::is_move_assignable<ArrayInfo>::value,
"ArrayInfo is not move assignable");
static_assert(std::is_move_constructible<ArrayInfo>::value,
"ArrayInfo is not move constructible");
static_assert(
offsetof(ArrayInfo, devId) == 0,
"ArrayInfo::devId must be the first member variable of ArrayInfo. \
devId is used to encode the backend into the integer. \
This is then used in the unified backend to check mismatched arrays.");
}
ArrayInfo(unsigned id, af::dim4 size, dim_t offset_, af::dim4 stride,
af_dtype af_type, bool sparse)
: devId(id)
, type(af_type)
, dim_size(size)
, offset(offset_)
, dim_strides(stride)
, is_sparse(sparse) {
setId(id);
static_assert(
offsetof(ArrayInfo, devId) == 0,
"ArrayInfo::devId must be the first member variable of ArrayInfo. \
devId is used to encode the backend into the integer. \
This is then used in the unified backend to check mismatched arrays.");
static_assert(std::is_nothrow_move_assignable<ArrayInfo>::value,
"ArrayInfo is not nothrow move assignable");
static_assert(std::is_nothrow_move_constructible<ArrayInfo>::value,
"ArrayInfo is not nothrow move constructible");
}
ArrayInfo() = default;
ArrayInfo(const ArrayInfo& other) = default;
ArrayInfo(ArrayInfo&& other) = default;
ArrayInfo& operator=(ArrayInfo other) noexcept {
swap(other);
return *this;
}
void swap(ArrayInfo& other) noexcept {
using std::swap;
swap(devId, other.devId);
swap(type, other.type);
swap(dim_size, other.dim_size);
swap(offset, other.offset);
swap(dim_strides, other.dim_strides);
swap(is_sparse, other.is_sparse);
}
const af_dtype& getType() const { return type; }
dim_t getOffset() const { return offset; }
const af::dim4& strides() const { return dim_strides; }
dim_t elements() const { return dim_size.elements(); }
dim_t ndims() const { return dim_size.ndims(); }
const af::dim4& dims() const { return dim_size; }
size_t total() const { return offset + dim_strides[3] * dim_size[3]; }
unsigned getDevId() const;
void setId(int id) const;
void setId(int id);
af_backend getBackendId() const;
void resetInfo(const af::dim4& dims) {
dim_size = dims;
dim_strides = calcStrides(dims);
offset = 0;
}
void resetDims(const af::dim4& dims) { dim_size = dims; }
void modDims(const af::dim4& newDims);
void modStrides(const af::dim4& newStrides);
bool isEmpty() const;
bool isScalar() const;
bool isRow() const;
bool isColumn() const;
bool isVector() const;
bool isComplex() const;
bool isReal() const;
bool isDouble() const;
bool isSingle() const;
bool isHalf() const;
bool isRealFloating() const;
bool isFloating() const;
bool isInteger() const;
bool isBool() const;
bool isLinear() const;
bool isSparse() const;
};
static_assert(std::is_standard_layout<ArrayInfo>::value,
"ArrayInfo must be a standard layout type");
af::dim4 toDims(const std::vector<af_seq>& seqs, const af::dim4& parentDims);
af::dim4 toOffset(const std::vector<af_seq>& seqs, const af::dim4& parentDims);
af::dim4 toStride(const std::vector<af_seq>& seqs, const af::dim4& parentDims);
|
{
"created_at": "2015-02-27T22:27:46.383860",
"description": "A binary whitelisting/blacklisting system for Mac OS X",
"fork": false,
"full_name": "google/santa",
"language": "Objective-C",
"updated_at": "2015-03-10T07:52:23.524621"
} |
Q:
Warning: getimagesize(image.jpg) [ ]: failed to open stream: no such file or directory
I have problem to crop the image, but this source work fine when i use for resize image before some code i change to crop.
This the source for Crop:
$filenames1 = stripslashes($_FILES['txtfile1']['name']);
$exts1 = substr($images1, strrpos($images1, '.')+1);
$idimgs = md5(uniqid() . time() . $filenames1) . "-1." . $exts1;
$target_files1 = $target_dir . basename($idimgs);
list($width, $height) = getimagesize($filenames1);
$realImages = imagecreatefromjpeg($_FILES['txtfile1']['tmp_name']);
if ($width > $height) {
$y = 0;
$x = ($width - $height) / 2;
$smallestSide = $height;
} else {
$x = 0;
$y = ($height - $width) / 2;
$smallestSide = $width;
}
$thumbSize = 200;
$thumbImage = imagecreatetruecolor($thumbSize, $thumbSize);
imagecopyresampled($thumbImage, $realImages, 0,0,$x,$y, $thumbSize, $thumbSize, $smallestSide, $smallestSide);
imagejpeg($thumbImage,$target_dir.$idimgs);
imagedestroy($realImages);
imagedestroy($thumbImage);
How to fix this?
A:
php can't access files from client system directly. Here you are trying to access $_FILES['txtfile1']['name'] instead try getimagesize($_FILES['txtfile1']['tmp_name'])
|
>>>>>>>>>>>>Please forward this to projects that you think may be relevant.
Hello from Ecotopia Biketour!
We are a mobile D.I.Y (Do It Yourself) international activist collective, cycling from Berlin to Romania (or Croatia) connecting projects and communities that are practicing aspects of socail justice and sustainable living, and projects that are particularly relevant to this years theme of ‘Beyond Borders’.
Your project has been recommended to us throught our networks, as we gather more information for this summers Ecotopia Biketour 2013: Beyond Borders!
We are looking at issues ranging from global economic inequality; global justice; immigration; the commons; anti-capitalism; basic income; solidarity; but also general Biketour themes such as environmentalist; ecology and de-growth. Some of these themes are beginning to be discussed on our blog.
As a sub theme this year, we are also looking into freedom on the net – and trying to move towards more Free Libre and Open Source software -so if you know any activist tech collectives or net activists who migh be interested to do a workshop with us please also forward this to them. To read more about this you can see our Lets Get FLOSS’y page and sub campaigns page. [currently in English]
If you have never heard of us: please go to www.ecotopiabiketour.netNow: What do we want from you? WE WOULD (MAYBE) LIKE TO JOIN / COLLABORATE WITH YOUR PROJECT THIS SUMMER!
We have to say “maybe” because our route will develop according to who else is willing to host us and other factors (such as distances, topography etc.). And depending on the response we get from YOU!!
So, first of all, we would like to know:
1) Would you generally like to host Ecotopia Biketour this summer?
What this could mean: We visit you with our mobile activist troop of 15 – 30 people
to learn more about your project – maybe through a tour, a discussion, a skills share workshop
to take part in an action with your cause / project – a critical mass, a creative demonstration or intervention…
to help towards your project – we are many hands! – we could help with practical hands on stuff – building projects, clearing spaces, gardening, food preparation, event planning, facilitation, bike workshops..
to promote your project or campaign through our online networks, website, mailing list, social media – and along the tour – if you want us to – or writing press releases, making a short video, designing a flyer…
to invite you to join us on our biketour!
We would also like to know:
2) When would be the best time (dates) for you to host us? When would it be completely impossible? 3) Is it o.k. to mention your project on our website and public route description? 4) Are there other projects you would recommend us visiting, in your area / country or in south / eastern Europe? 5) Is your project part of or close to an interesting route, trail or has ‘border’ related significance
6) Anything else that could be useful for us?
We have quite some ideas about places and events to visit already, which can be found on our Route Page – your project may already be included ;) – if not let us know. We cannot possibly visit everyone on this page -but are making a selection based on what we get in response from this email!!!!
And finally – if you, or someone you know could help us with translating our website and printed material – please ask them to get in touch and join our translation bank. |
Send all the necessary data in the application form via e-mail or fax, and a professional foreclosure serviceman will be dispatched to the property The serviceman opens the door, and changes the key-combination.
Once the job is finished, the serviceman will take photos of the property and leave the new keys in a lock box outside the property.You will receive an e-mail with the combination of the lock box and with the photos attached. This great offer only makes it easier for realtors to sell foreclosure residences without leaving the office.
How Do you Find a Reputable Locksmith Company?
Jax Locksmith Solutions is a dependable company with a long list of satisfied commercial clients. As Jacksonville is one of the most booming real estate cities in Florida, we value your business and look forward to a long and strong relationship.
At Jax Locksmith Solutions, we specialize in all emergency situations, including rekeying services. Our skillful technicians are on call 24 hours a day, and are spread throughout the state of Florida. Whether you need professional transponder key programming or rekeying services, we’ll be there for you.
All work is done on the spot, and we even save you the unnecessary trip of going to a local car dealership. You could wind up paying a lot more money for a simple job we can do for you. We also use professional GPS navigation to arrive faster. We can be by your side in less than 30 minutes. We can fix any problems with your car door or trunk, at any time, day or night. You no longer have to stay stranded on the side of the road because of lock issues. At Jax Locksmith Solutions, we place your safety above anything else.
If you’re having any difficulties opening your car door, you will need professional rekeying services. Door locks are very sensitive, and can break in an instant. That’s why you need a reliable auto locksmith. We’ve been helping our satisfied customers with their emergency auto situations for many years. We know it takes a skillful eye to carefully rekey the locks on your car.
Our expert technicians have undergone years of training to perfect their craft. We only work with the most qualified technicians, so that you always get the top notch services you deserve. In addition to our rapid and reliable services, we believe in being upfront with all of our customers. We will give you a fantastic quote in advance, which you can present to our friendly driver at the scene. We also use the safest methods and techniques when working on any vehicle. Please feel free to ask us any questions. We’re here to help you out!
Why Choose Us?
We are the most reputable auto locksmith company in the state of Florida. Our testimonials reflect upon our hard work and commitment to our job. We offer the most competitive prices on the market, and provide you with the high quality services you need. Whether you need an emergency door opening, chip key programming or emergency lock picking, we will always be there for you. Make sure you keep our number stored inside your mobile phone in case of an emergency situation. Don’t let an amateur company play around with your car or your safety. Let a professional auto locksmith company like Jax Locksmith Solutions, help get you safely back on the road. Get in touch with us today and let us show you firsthand why we’re the best!
I locked my car keys in the trunk of my car at the Publix parking lot (this seems to happen a lot there:) I called Jax Locksmith Solutions. The locksmith tech was there within 20 minutes! Not to mention their price was well under the other guys, I really enjoyed the professionalism. Thank you very much - great company and service! Brian Lefils
I needed to rekey my house in Orange Park Florida, so I called Jax Locksmith Solutions. They gave me an affordable rate over the phone. And they came to my home on time. The job was done accurately and I was so pleased with how friendly the locksmith technician was. I would tell anyone to call their company over any other locksmith in Orange Park. Stephanie Jefferson
Outstanding service, the locskmith was friendly, when my key broke off inside the ignition I called Jax Locksmith Solutions, the technician pulled the broken key and cut me a new chip key for my Honda Accord for a fair price, I’ll definitely use them again. Eric Romero
I needed to get the locks in my house rekeyed so I called Jax Locksmith Solutions. The price was very reasonable. They got my house rekeyed and they even made me two extra keys free of charge. Barbara Johnson
Jax Locksmith Solutions helped me get into my home when I locked myself out. When i called they gave me the best price and they arrived at my house in Jacksonville Beach pretty quickly. I would use their locksmith services again. They were great!!! George Kennebrew
Excellent experience! He responded to my call extremely quickly and was very professional. The locksmith tech was able to unlock my bedroom door quickly. Friendly encounter and would use him again for all lock/key needs. Kathy Keltner
Hello, my name is Amanda and I live in Jacksonville Florida, in the Mandarin area. I recently bought a new home and wanted to get the entire home changed for safety, and I called several locksmith companies including Jax Locksmith Solutions. They gave me the best quote over the phone and after the job was complete the final price never went up! The work was amazing quality and I would refer them to anyone. Amanda Brushenbell
I recently needed a key cut for my wife's Cadillac Escalade. Other than the dealership which is very expensive no other locksmith couldn't or wouldn't cut it. I called Jax Locksmith Solutions, technician arrived within 20 minutes and the key was perfectly cut. Thanks JLS for the superb and prompt service. Michael Sherman |
Q:
Magento 2: Is there any certification for Magento 2?
Is there any certification available for Magento 2 like we have for Magento1 ??
A:
For magento 2 as of now there is no certification avaialable Except (Trained Solution Parnter for magento2 Programm )
Refer this thread for more details - https://community.magento.com/t5/Off-Topic/Magento-2-certification-exams/td-p/176
Refer this link for available certification im Magento - https://magento.com/training/catalog/certification
For more details about Trained Solution Partner refer this link - https://magento.com/blog/magento-news/look-magento-2-trained-solution-partners
|
Les Promenades de l'Outaouais is a major shopping centre located in Canada's National Capital Region. It is located in the city of Gatineau near the intersection of Greber and Maloney Boulevards, one of the city's busiest intersections and just off Autoroute 50.
It is considered to be the second largest shopping centre in the area in terms of retail space trailing only St. Laurent Shopping Centre's 972,000 square feet (90,301.8 m2). The website claims it has about 845,000 square feet (78,503 m2) in total space including its three-story office building in the south side of the complex that houses a dental clinic and federal government offices.
The mall is sprawled out on one single level with several secondary corridors and sections lined up in different directions which makes it difficult to locate smaller boutiques. The shopping centre does have several anchor tenants which includes la Baie, Costco, Mega Meubles, Laura and Archambault.
It is located in the middle of a major shopping district in the Gatineau sector in which several other strip-malls and big-box stores are lined-up all along Maloney or Greber Boulevards in and around Les Promenades. The Village Greber is located just across Maloney and les Galeries Gatineau which includes Winners and Zellers is just across its eastern street.
Several small stores and restaurants are located scattered on its northern parking lot.
The Polyvalente Le Carrefour High School is located just across the street from Chemin de La Savane. During the lunch hours, numerous teens from the school cross the street to the mall.
According to various surveys, almost 80% of its shoppers are women and the average age is 38 .
History
The mall opened its doors in 1978, becoming instantly the former city of Gatineau's prime shopping destination.
During the 1990s and early 2000s, the mall did experience some difficulties as several large retail spaces were left vacant frequently as several stores and even anchor tenants closed their doors. In the 1990s, K-Mart, Eaton and Steinberg, which at one point were the mall's three anchor tenants, all closed their doors.
The K-Mart location is now occupied by a Mega Meubles as well as the Laura superstore. It was also, briefly, the Bay's appliance section location.
In the late 1990s, the shopping centre made a major expansion on its eastern end. Previously, the mall ended where the Famous Players cinemas were located. When the renovation process ended, a new anchor tenant was in place: la Baie. Also, a Dollarama, a food court, a new office building, a Christopher International hair salon and an artisan or small merchants (Boulevard des Artisans) zone were added.
Also during the 1990s, the Eaton store on the western end of the shopping centre closed its doors. During the next several years that area was for the most part left vacant except when Laura occupied the area for a small period. However, in March 2006, Costco had relocated its location from the north end of the city to its current location at les Promenades bringing a new life to its western end which was often plagued with numerous vacant spaces for several years. Archambault, a Quebec music franchise store also opened a location in 2005 near Costco and the Buffet Dragon, the mall's Chinese restaurant.
Steinberg also had a supermarket during the mall's first years, but closed when the company folded. It was later occupied by SuperC and Metro.
The mall during most of its existence had a movie theater although a small one. During the late 1990s, the Famous Players cinemas which occupied a location in the previously eastern end of the mall closed, in part due to the opening of the Cinema 9 theater located just a few minutes away from the centre. Most recently, a new movie theater, called Cine-Starz opened its doors at the same location.
Several retailers of various sizes have been added in various areas of the mall including Garage, Videotron, Bath and Body Works, Jack & Jones, Urban Planet, Fruits & Passions, Sirens, Thai Express, Second Cup, Terra Nostra, BCBG Maxzaria and Vision Underground.
Management team
Company : Canpro Investments
Owner/President : David J. Azrieli
General Manager : Dominique Guindon
Assistant Manager : Sylvie Courchesne
Marketing Director : Lucie Filiatrault
Assistant Marketing Director : Veronique Lepage
Retail Manager : Martine Mainville
Hours of operation
Monday-Tuesday : 09:30-17:30
Wednesday to Friday : 09:30-21:00
Saturday : 09:00-17:00
Sunday : 12:00-17:00
Transportation
Being at one of the city's busiest intersections and near the city's main highway, it is very easily accessible and parking space is abundant.
The Société de transport de l'Outaouais offers several routes that travel to various areas across the city from the shopping mall. It is considered, outside of the downtown core, the most important transit hub in the city. On average per day, 8 000 shoppers use public transit for shopping .
The STO has a major Park And Ride facility of over 500 parking spaces in proximity the mall. It has also recently rebuilt the transit terminal and built a new client service centre inside the mall.
Routes that serve the shopping centre include:
Routes 62, 63, 64, 66, 71, 74, 76 and 78 travel through local areas in the Gatineau sector. Route 64 ends at Freeman Park and Ride in the Hull sector. Route 62 serves a shuttle for workers at the Passeport Canada office.
Routes 67 and 77 travel to Ottawa and the 77 travels to local areas of the Gatineau sector
Route 33 also travel through local areas of the Gatineau sector. It also travels through various areas of the Hull sector and ends in Ottawa.
Route 57 travels to the Aylmer sector via downtown Gatineau
Route 96 travels to the Buckingham and Masson-Angers sector
Route 68 is a non-stop route that serves the Hull Cégep and serves as temporary shuttle route during construction at the Alonzo-Wright Bridge.
Various shuttle buses during events start here.
Starting in 2011, the Rapibus transit route will travel just north of the shopping centre alongside Maloney Boulevard. A transit station will be located there, although it is unlikely that it will serve as the future terminal due to the lack of space for buses and the dangerous nature of the Greber/Maloney intersection which includes an at-grade rail crossing. |
65 Free Crochet Amazing Baby Diaper For Outfits
Last Updated May 21, 2019
I have noticed that the little babies in summers cry and feel really irritate when they are completely covered. By crying they are asking you to undress them and let them get rid of the cold and be at peace. You can use diapers as the most easy baby wear in the summers and the crocheted diapers would be more darling in this regard. Yes made out of the soft yarns the crochet diapers would be gentle to your baby’s skin and make them feel quite comfy and comfortable. And here we have shared a huge collection of the lovely baby diaper patterns and ideas that you can crochet at home for a variety of designs and style update.
So we invite you check out these 65 DIY crochet baby diapers for outfits. The best thing about these crochet baby diaper ideas is that they offer you to play with a variety of the colors and patterns and thus you can create a bunch of them. Moreover these cutie creations would make one of the best gifts if you are to attend a baby shower party in next coming days. Pairing the diapers with hats would be a more adorable and drool worth outfit for your baby especially for the first day when you want to capture his/her first picture ever. Cute little, owl, bunny, panda, puppy, monkey, your little bundle of joy can be any of these with the respective free crochet patterns of hats and diapers given right below. |
Firefighters in Massachusetts, along with backup responders, spent two hours Thursday freeing a raccoon that had gotten stuck in a storm grate.
The Newton Fire Department tweeted a picture of the critter with its head sticking out of one of the grate's holes, and its paws grasping adjacent bars to support himself.
Newton Fire Lt. Phil McCully told NBC News that the department got a call about the trapped raccoon from a bicyclist riding to work.
A responding crew of four firefighters first tried to lubricate the raccoon's head with dish soap so he would "slip out," McCully said. Photos show the raccoon lathered with suds, its fur plastered to his face. |
/* ****************************************************************** **
** OpenSees - Open System for Earthquake Engineering Simulation **
** Pacific Earthquake Engineering Research Center **
** **
** **
** (C) Copyright 1999, The Regents of the University of California **
** All Rights Reserved. **
** **
** Commercial use of this program without express permission of the **
** University of California, Berkeley, is strictly prohibited. See **
** file 'COPYRIGHT' in main directory for information on usage and **
** redistribution, and for a DISCLAIMER OF ALL WARRANTIES. **
** **
** Developed by: **
** Frank McKenna (fmckenna@ce.berkeley.edu) **
** Gregory L. Fenves (fenves@ce.berkeley.edu) **
** Filip C. Filippou (filippou@ce.berkeley.edu) **
** **
** ****************************************************************** */
// $Revision: 1.6 $
// $Date: 2010-09-11 00:50:53 $
// $Source: /usr/local/cvs/OpenSees/SRC/material/uniaxial/PenaltyMaterial.cpp,v $
// Written: MHS
// Created: Aug 2001
//
// Description: This file contains the class definition for
// PenaltyMaterial. PenaltyMaterial adds a small stiffness to
// its wrapped UniaxialMaterial object. This wrapper can help you
// avoid a singular stiffness due to perfect plasticity and is a
// downsized approach to putting the wrapped material in parallel
// with an ElasticMaterial.
#include <stdlib.h>
#include <string.h>
#include <PenaltyMaterial.h>
#include <ID.h>
#include <Channel.h>
#include <FEM_ObjectBroker.h>
#include <Information.h>
#include <Parameter.h>
#include <OPS_Globals.h>
#include <elementAPI.h>
#define OPS_Export
OPS_Export void *
OPS_PenaltyMaterial(void)
{
// Pointer to a uniaxial material that will be returned
UniaxialMaterial *theMaterial = 0;
UniaxialMaterial *theOtherMaterial = 0;
int iData[2];
int argc = OPS_GetNumRemainingInputArgs();
if (argc < 2) {
opserr << "WARNING insufficient args, uniaxialMaterial Penalty $tag $otherTag $penalty" << endln;
return 0;
}
int numData = 2;
if (OPS_GetIntInput(&numData, iData) < 0) {
opserr << "WARNING invalid uniaxialMaterial Penalty $tag $otherTag $penalty" << endln;
return 0;
}
theOtherMaterial = OPS_GetUniaxialMaterial(iData[1]);
if (theOtherMaterial == 0) {
opserr << "WARNING invalid otherTag uniaxialMaterial Penalty tag: " << iData[0] << endln;
return 0;
}
double penalty = 0.0;
numData = 1;
if (OPS_GetDouble(&numData,&penalty) < 0) {
opserr << "WARNING invalid input uniaxialMaterial Penalty tag: " << iData[0] << endln;
return 0;
}
// Parsing was successful, allocate the material
theMaterial = new PenaltyMaterial(iData[0], *theOtherMaterial, penalty);
if (theMaterial == 0) {
opserr << "WARNING could not create uniaxialMaterial of type PenaltyMaterial\n";
return 0;
}
return theMaterial;
}
PenaltyMaterial::PenaltyMaterial(int tag, UniaxialMaterial &material, double mult)
:UniaxialMaterial(tag,MAT_TAG_Penalty), theMaterial(0), penalty(mult), parameterID(0)
{
theMaterial = material.getCopy();
if (theMaterial == 0) {
opserr << "PenaltyMaterial::PenaltyMaterial -- failed to get copy of material\n";
exit(-1);
}
}
PenaltyMaterial::PenaltyMaterial()
:UniaxialMaterial(0,MAT_TAG_Penalty), theMaterial(0), penalty(0.0), parameterID(0)
{
}
PenaltyMaterial::~PenaltyMaterial()
{
if (theMaterial)
delete theMaterial;
}
int
PenaltyMaterial::setTrialStrain(double strain, double strainRate)
{
return theMaterial->setTrialStrain(strain, strainRate);
}
int
PenaltyMaterial::setTrialStrain(double strain, double temp, double strainRate)
{
return theMaterial->setTrialStrain(strain, temp, strainRate);
}
double
PenaltyMaterial::getStress(void)
{
return theMaterial->getStress() + penalty*theMaterial->getStrain();
}
double
PenaltyMaterial::getTangent(void)
{
return theMaterial->getTangent() + penalty;
}
double
PenaltyMaterial::getDampTangent(void)
{
return theMaterial->getDampTangent();
}
double
PenaltyMaterial::getStrain(void)
{
return theMaterial->getStrain();
}
double
PenaltyMaterial::getStrainRate(void)
{
return theMaterial->getStrainRate();
}
int
PenaltyMaterial::commitState(void)
{
return theMaterial->commitState();
}
int
PenaltyMaterial::revertToLastCommit(void)
{
return theMaterial->revertToLastCommit();
}
int
PenaltyMaterial::revertToStart(void)
{
return theMaterial->revertToStart();
}
UniaxialMaterial *
PenaltyMaterial::getCopy(void)
{
PenaltyMaterial *theCopy =
new PenaltyMaterial(this->getTag(), *theMaterial, penalty);
return theCopy;
}
int
PenaltyMaterial::sendSelf(int cTag, Channel &theChannel)
{
int dbTag = this->getDbTag();
static ID dataID(3);
dataID(0) = this->getTag();
dataID(1) = theMaterial->getClassTag();
int matDbTag = theMaterial->getDbTag();
if ( matDbTag == 0) {
matDbTag = theChannel.getDbTag();
theMaterial->setDbTag(matDbTag);
}
dataID(2) = matDbTag;
if (theChannel.sendID(dbTag, cTag, dataID) < 0) {
opserr << "PenaltyMaterial::sendSelf() - failed to send the ID\n";
return -1;
}
static Vector dataVec(1);
dataVec(0) = penalty;
if (theChannel.sendVector(dbTag, cTag, dataVec) < 0) {
opserr << "PenaltyMaterial::sendSelf() - failed to send the Vector\n";
return -2;
}
if (theMaterial->sendSelf(cTag, theChannel) < 0) {
opserr << "PenaltyMaterial::sendSelf() - failed to send the Material\n";
return -3;
}
return 0;
}
int
PenaltyMaterial::recvSelf(int cTag, Channel &theChannel,
FEM_ObjectBroker &theBroker)
{
int dbTag = this->getDbTag();
static ID dataID(3);
if (theChannel.recvID(dbTag, cTag, dataID) < 0) {
opserr << "PenaltyMaterial::recvSelf() - failed to get the ID\n";
return -1;
}
this->setTag(int(dataID(0)));
// as no way to change material, don't have to check classTag of the material
if (theMaterial == 0) {
int matClassTag = int(dataID(1));
theMaterial = theBroker.getNewUniaxialMaterial(matClassTag);
if (theMaterial == 0) {
opserr << "PenaltyMaterial::recvSelf() - failed to create Material with classTag "
<< dataID(0) << endln;
return -2;
}
}
theMaterial->setDbTag(dataID(2));
static Vector dataVec(1);
if (theChannel.recvVector(dbTag, cTag, dataVec) < 0) {
opserr << "PenaltyMaterial::recvSelf() - failed to get the Vector\n";
return -3;
}
penalty = dataVec(0);
if (theMaterial->recvSelf(cTag, theChannel, theBroker) < 0) {
opserr << "PenaltyMaterial::recvSelf() - failed to get the Material\n";
return -4;
}
return 0;
}
void
PenaltyMaterial::Print(OPS_Stream &s, int flag)
{
s << "PenaltyMaterial tag: " << this->getTag() << endln;
s << "\tMaterial: " << theMaterial->getTag() << endln;
s << "\tPenalty: " << penalty << endln;
}
int
PenaltyMaterial::setParameter(const char **argv, int argc, Parameter ¶m)
{
if (strcmp(argv[0],"penalty") == 0) {
param.setValue(penalty);
return param.addObject(1,this);
}
return theMaterial->setParameter(argv, argc, param);
}
int
PenaltyMaterial::updateParameter(int parameterID, Information &info)
{
switch (parameterID) {
case -1:
return -1;
case 1:
this->penalty = info.theDouble;
break;
}
return 0;
}
int
PenaltyMaterial::activateParameter(int paramID)
{
parameterID = paramID;
return 0;
}
double
PenaltyMaterial::getStressSensitivity(int gradIndex, bool conditional)
{
// dsig = dsigma + dalpha*strain < + alpha*dstrain>
if (parameterID == 1)
return theMaterial->getStrain(); // dalpha*strain where dalpha=1
else
return theMaterial->getStressSensitivity(gradIndex,conditional);
}
double
PenaltyMaterial::getStrainSensitivity(int gradIndex)
{
return theMaterial->getStrainSensitivity(gradIndex);
}
double
PenaltyMaterial::getInitialTangentSensitivity(int gradIndex)
{
if (parameterID == 1)
return 1.0;
else
return theMaterial->getInitialTangentSensitivity(gradIndex);
}
double
PenaltyMaterial::getDampTangentSensitivity(int gradIndex)
{
theMaterial->getDampTangentSensitivity(gradIndex);
}
double
PenaltyMaterial::getRhoSensitivity(int gradIndex)
{
return theMaterial->getRhoSensitivity(gradIndex);
}
int
PenaltyMaterial::commitSensitivity(double strainGradient, int gradIndex, int numGrads)
{
return theMaterial->commitSensitivity(strainGradient, gradIndex, numGrads);
}
|
More Like This
Preview
One plausible thesis, stated using plural quantification, is that there are some things that are all things. Although widely accepted, in this chapter it is argued that that thesis is false. The argument involves three plausible claims: (1) There are two or more things; (2) for any things, there is a unique thing to which they correspond; (3) for any two or more things, there are fewer of them than there are pluralities of them. The first claim is obvious. Certain metaphysical views about the nature of propositions support the second. The third follows from a plural version of Cantor's...
One plausible thesis, stated using plural quantification, is that there are some things that are all things. Although widely accepted, in this chapter it is argued that that thesis is false. The argument involves three plausible claims: (1) There are two or more things; (2) for any things, there is a unique thing to which they correspond; (3) for any two or more things, there are fewer of them than there are pluralities of them. The first claim is obvious. Certain metaphysical views about the nature of propositions support the second. The third follows from a plural version of Cantor's Theorem and holds even in cases involving infinity. The argument from these three claims to the denial of the widely accepted thesis is explained and defended in this chapter. The conclusion of this argument has widespread ramifications in mereology, quantification, and theories of truth. |
In 1976, then–U.S. President Gerald Ford was mocked relentlessly and repeatedly on national TV as a clumsy buffoon who tripped over his own feet. Ford later wrote that while he did not particularly enjoy being portrayed as “an oafish ex-jock,” he had to admit that it was effective and, yes, funny.
Read More »
International students who come to study in the U.S. are surprised at how U.S. classes differ from those in many other countries. Students express their opinions in class and actively participate, instead of simply taking lecture notes.
Read More » |
*Enrollment fee is due upon initial enrollment and to re-enroll if you withdraw your child at any time. Enrollment fee will be charged annually (September 1).
Additional Fees
1st Child
2nd Child
Add. Child
Additional Day Fee (requires administrative approval)
$50.00
$50.00
$50.00
Late Pick-up Fee for each 10 minutes period after 6:10 p.m.
$5.00
$5.00
$5.00
Late Payment Fee
$20.00
Returned Checks
$20.00
**Our licensing standards by the State of West Virginia require all children to participate in our hot lunch program.
Absence coupons are issued for the enrollment term and are allotted according to the amount of attendance days based on your weekly commitment. This will be accounted for by turning in an absence coupon to cover the missed day. All missed days beyond your coupon allotment are subject to regular tuition fees. Charges will be applied on days when TVCDC is closed. All tuition fees are due on your child’s first scheduled day of the week. If payment is not received ahead of charges, a late fee of $20 will be added to your account. A one week written notice is required when withdrawing your child from our center. In lieu of proper notice, one week's tuition will be due at time of withdrawl. |
Arthur Chan wrote:
> Btw, I wouldn't try to use OCaml with Ubuntu,
I find the Ocaml support on Ubuntu to be excellent. This is mainly
due to the hard word of the Debian Ocaml maintainers.
> Support is generally flaky.
Sorry, thats not my experience.
> The mainline OCaml that comes with Ubuntu is fine, but the gl+gtk
> support is broken.
Use both lablgl and lablgtk (but not together) without problems.
What exactly is broken. Have you logged a bug with Ubuntu or with
the Debian Ocaml maintainers.
> version of Eclipse that ships with Ubuntu is freaking ancient and won't
> support the Scala plugin. From what I remember, 8.0.4 also shipped with
> some fossilized version of Scala itself.
I don't use Scala or Eclipse so I can't comment on that.
Erik
--
-----------------------------------------------------------------
Erik de Castro Lopo
-----------------------------------------------------------------
"If you need a piece of paper and a pen to explain it,
then its not bleedin' obvious" -- Erik's First Law |
Q:
Combinatorics, probability exercise
I have a couple of combinatorics and probability problems that I have so much uncertainty when solving. My concepts are not that clear. Please shed me some light
1a You throw two dice. Whats the probability that the sum is 8 and none of the dice shows a 1.
my attempt: 5/36
b. You have a coin you like to toss when you feel bored. Today your boredom corresponds to 8 throws in a row. Whats the probability, that you get exactly 4 times heads, under the constraint that
within the first 4 tosses there must be 2 heads already.
How about the case in which there must be 3 heads within the first 4 tosses?
my attempt: 2 heads already: (2^4/2^8)/(2^6/2^8) = 1/4
In the following games the experiment is repeated until a certain condition is met. We note down the
outcomes as strings. Denote the probability that a game lasts exactly N rounds (≥ 0).
1
a) You toss a coin. Heads is denoted by 0, tails by 1. The game is over when we toss
heads for the second time (e.g. 111011111110).
my attempt: NC2 * (1/2)^2 * (1/2)*(N-2) = NC2 * (1/2)^N
b) Same game, but the game stops if we toss heads for the k-th time (k ≤ N)
my attempt: NCk * (1/2)^k * (1/2)*(N-k) = NCk * (1/2)^N
c) We throw one dice. The game stops if the sum of the throws is dividable by 6.
d) We throw two dice. The game stops if both dice show the same number.
my attempt: i don't even know how to start please help
Calculate the expectation value of the following random experiments. You throw a dice and note down
the value and you are done. But if you throw a six, you throw once more and add the values. If the
throw after the six is again a six, you throw again and add the three throws up and so on. Calculate the
expectation value of the following random experiments if
a) you stop the game if you have the third six in a row.
my attempt: (1/6)^3 x 18
b) you go on arbitrarily long in case you throw sixes. Hint: Use the fact that Summation(i = 0->∞)
xi =1/1−x
and Summation(i = 0->∞) ixi = x/(1−x)^2 for −1 < x < 1.
my attempt: (1/6)^n * 6n, using the second formula with i = n, answer = 36/25
A:
We look at the expectation questions only.
With probability $1/6$, we get a second round. With probability $(1/6)^2$, we get a third round. On any round, the expected gain is $7/2$, so if the game cuts off at the third round, the expected gain is
$$(7/2)\left(1+\frac{1}{6}+\frac{1}{6^2}\right).$$
The case where an arbitrary number of rounds is allowed can be done in a similar way, by summing a simple infinite series. But we instead condition on the result of the first round.
Let our expectation be $e$. With probability $5/6$, our expectation is $3$. With probability $1/6$ it is $6+e$. Thus
$$e=(5/6)(3)+(1/6)(6+e).$$
Solve. We get $e=21/5$.
|
"use strict";var exports=module.exports={};"use strict";
exports.__esModule = true;
var _setPrototypeOf = require('../core-js/object/set-prototype-of.js');
var _setPrototypeOf2 = _interopRequireDefault(_setPrototypeOf);
var _create = require('../core-js/object/create.js');
var _create2 = _interopRequireDefault(_create);
var _typeof2 = require('./typeof.js');
var _typeof3 = _interopRequireDefault(_typeof2);
function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }
exports.default = function (subClass, superClass) {
if (typeof superClass !== "function" && superClass !== null) {
throw new TypeError("Super expression must either be null or a function, not " + (typeof superClass === "undefined" ? "undefined" : (0, _typeof3.default)(superClass)));
}
subClass.prototype = (0, _create2.default)(superClass && superClass.prototype, {
constructor: {
value: subClass,
enumerable: false,
writable: true,
configurable: true
}
});
if (superClass) _setPrototypeOf2.default ? (0, _setPrototypeOf2.default)(subClass, superClass) : subClass.__proto__ = superClass;
}; |
Latitude Run Pavonis Configurable Living Room Set
We have a good offer for the popular reclining living room set. If you interest to order this Latitude Run Pavonis Configurable Living Room Set now. You may be get special discount and and get free super saving shipping.
Latitude Run Pavonis Configurable Living Room Set is a popular product of this week and It's expected to be out of stock soon. If you plan to order the reclining living room set. We recommend that you should buy before the products are out of stock. If you would like to purchase it online but you are worried about the price will be reduced. I recommend that you should buy the reclining living room set before it's out of stock. If you would like to own Latitude Run Pavonis Configurable Living Room Set Now and you have enough money to order it. you should ask yourself, Why do you waiting to order?, If you don't have a great reason, I think you can buy now but you may would like to see any more information before to order.
If you want to view more images and read Latitude Run Pavonis Configurable Living Room Set 's detail or read more information from my recommend shop
Latitude Run Pavonis Configurable Living Room Set Reviews
Review #1
These reclining living room sets are so large and delicate. Is very pretty. I bought one for myself and my friend. I would definitely recommend this product if you are in the market for a cute reclining living room set. Great gift for any age! Looks a bit cheap, but still very cute!
Review #2
This is a great Latitude Run Pavonis Configurable Living Room Set and looks much more expensive than it is. I agree with some other reviewers that it does not smell good when it first came on, so I'm hoping it will go away. The smell left after my first time with him. Thinking about getting it in another color.
Review #3
These Latitude Run Pavonis Configurable Living Room Set was my first purchase. When I saw it online it really sparked an interest. When I received it I was so excited by the beauty of it. So simple but very personal. I am very impressed with him. It could have done better to fit the elegance of the reclining living room set.
What is the main reason for you to purchase Latitude Run Pavonis Configurable Living Room Set online?
Convenience - Where else can you do shopping, even at midnight, wearing your jammies? You don’t have to wait in a line or wait till the shop assistant helps you with your purchases. You can do your shopping in minutes even if you are busy, apart from saving time and avoiding crowds. Online shops give us the opportunity to shop 24 x 7 and also reward us with ‘no pollution’ shopping.
Better Prices - I get cheap deals and better prices from online stores because products come to you directly from the manufacturer or seller without middlemen involved. Many online shops offer discount coupons and rebates.
Variety - One can get several brands and products (Latitude Run Pavonis Configurable Living Room Set) from different sellers at one place. You can get in on the latest international trends without spending money on travel; you can shop from retailers in other parts of the country or even the world without being limited by geographic area... These stores offer a far greater selection of colors and sizes than you will find locally. If you find that the product you need is out of stock online, you can take your business to another online store where the product is available.
Fewer Expenses - Many times when we opt for conventional shopping we tend to spend a lot more than the required shopping expenses, on things like eating out, traveling, impulsive shopping etc.
Comparison of Prices - Online shops make Latitude Run Pavonis Configurable Living Room Set comparison and research of products and prices possible. Online stores also give you the ability to share information and reviews with other shoppers who have firsthand experience with a product or retailer.
Crowds - If you are like me, you would like to avoid the crowds when you do the shopping. Crowds force us to do a hurried shopping most of the time. Crowds also create a problem when it comes to finding a parking place nearby where you want to shop and going back to your vehicle later loaded with shopping bags.
Compulsive Shopping - Many times when we go out shopping we end up buying things which we do not require because of the shopkeepers’ upselling skills -- or we’ll compromise on our choices because of the lack of choices in those shops.
Discreet Purchases - Some things are better done in privacy. Online Shops enable me to purchase undergarments and lingerie or adult toys without the embarrassment that there are several people watching me and my choices. |
Table of Contents
This study is provided by ICPSR.
ICPSR provides leadership and training in data access, curation, and methods of analysis
for a diverse and expanding social science research community.
Estimates of Eligible Voters in Counties of the United States, 1972 (ICPSR 7528)
Principal Investigator(s):United States Department of Commerce. Bureau of the Census
Summary:
Census data on the number of eligible voters in the United
States in 1972 as well as the number and percentage of citizens who
voted for president in 1972 are presented in this data
collection. Both county-level and state-level records are provided,
with a unique numeric identification number assigned to each county or
independent city within each state. Individual state information is
presented in regional group order,(i.e., New England, Middle Atlantic,
East North Central, West North Central, ... (more info)
Census data on the number of eligible voters in the United
States in 1972 as well as the number and percentage of citizens who
voted for president in 1972 are presented in this data
collection. Both county-level and state-level records are provided,
with a unique numeric identification number assigned to each county or
independent city within each state. Individual state information is
presented in regional group order,(i.e., New England, Middle Atlantic,
East North Central, West North Central, Solid South, Border States,
Mountain States, Pacific States, and External States).
Access Notes
These data are available only to users at ICPSR member institutions. Because you are not
logged in, we cannot verify that you
will be able to download these data.
Dataset(s)
Study Description
Citation
United States Department of Commerce. Bureau of the Census. Estimates of Eligible Voters in Counties of the United States, 1972. ICPSR07528-v1. Ann Arbor, MI: Inter-university Consortium for Political and Social Research[distributor], 2002. http://doi.org/10.3886/ICPSR07528.v1
Methodology
Data Source:
United States Department of Commerce. Bureau of the
Census. "Language Minority, Illiteracy and Voting Data Used in Making
Determinations for the Voting Rights Act Amendments of 1975 (Public
Law 94-73)." CURRENT POPULATION REPORTS, SERIES P-25 no. 627 (June
1976).
Extent of Processing: ICPSR data undergo a confidentiality review and are altered when necessary to limit the risk of
disclosure. ICPSR also routinely creates ready-to-go data files along with setups in the major
statistical software formats as well as standard codebooks to accompany the data. In addition to
these procedures, ICPSR performed the following processing steps for this data collection: |
Editor's Note: This is a guest post by our friend and master bird photographer Tim Boyer.
Point of view is different than perspective. The lens and the depth in an image determine perspective.
Point of view is the relationship between the photographer and the bird (or subject). Point of view is important because getting the best angle for the bird impacts the story your image tells.
If you want the viewer of the image to instantly connect with the bird, take an image at eye level with the bird looking straight into the lens. The viewer will connect with the bird; there will be an emotional response and the viewer will “like” the image.
There are various ways to situate yourself in relation to your subject. Below, I offer insights into how to photograph birds.
Standing Up
If we’re standing up and shooting down on birds, the overall story of the image might be that we’re superior or above them. When a movie director wants to make a character seem weak, they shoot from above; if the director wants to make a character seem strong, they shoot from below, looking up at the actor. Shooting eye level doesn’t add an element of superiority or weakness - it’s neutral.
In this image of a Horned Grebe, I had my tripod fully extended and I was standing up on a dock that was a couple of feet above the bird, so I had about eight feet of height from the camera to the bird.
When I look at the image, I don’t learn that much about the bird, and I don’t connect with it.
In this image of a Horned Grebe, I was sitting on a dock and the height of the camera above the bird was about two feet.
In this image, we learn more about the bird's environment and habitat on the water, but we’re closer to eye level and there’s more of a connection to the bird.
Kneeling
For the Black-bellied Plover image shown below, I was kneeling behind my tripod, as shown above.
Sometimes it’s just not possible to get to eye level. The small rise of sand between the bird and my camera would have blocked out too much of the bird, so I needed to shoot from a higher point of view.
This will also be the case if you want to get a bird’s reflection in the frame. Shoot from slightly higher than eye level to get the reflection.
It should be mentioned that I used a Canon Angle Finder C, so the camera and lens can be a little lower. If you have a flip out LCD screen on your camera, you won’t need this extra tool, and you can get your camera lower.
Learn More:
Sitting
If I’m going to be someplace for an extended period of time, like waiting for some ducks to swim by, I’ll sit behind my tripod and relax until they come closer.
By not moving too much, being patient, and quiet, the birds will come back.
This image of a Northern Shoveler was taken after a 15 to 20 minute wait, but it was worth it.
The low point of view, the reflection of the fall colors, and the reflection of the bird all make it very approachable to the viewer.
Laying Down
For shorebirds and waterfowl, lying down will most often be the best option to really connect and show off the bird at its best.
In the image of a Western Sandpiper below, I wore chest waders and a waterproof jacket so I could lie in the wet sand long enough for the incoming tide to push the shorebirds towards me.
By the time they got to where I was laying in the sand, I was just part of the habitat, and I felt like I could reach out and touch them. That’s what this image says as well - we’re eye level, we’re in their world, so it is a great point of view.
Photography insurance is a vital part of your photography business, yet it can be a confusing topic. In this tutorial, learn the ins and outs of photography insurance so you're informed about what you need to protect your business.
If you're looking for a new subject to photograph to jump-start your creativity, you can find all kinds of inspiration in water reflections. Learn how to photograph water reflections in this quick tutorial. |
Epidemiology of unarmed threats in the emergency department.
To evaluate the precipitants, subject characteristics, nature and outcomes of unarmed threats in the ED. A 12 month prospective survey of security codes precipitated by an unarmed threat (Code Grey). Data were collected on 151 subjects. The Code Grey rate was 3.2/1000 ED presentations. They were most frequent on Saturday and in the late evening/early morning. There were verbal or physical threats of violence made to staff on 104 occasions (69%, 95% confidence interval [CI] 61-76) and a perceived threat of patient self-harm on 114 occasions (76%, 95% CI 68-82). Median time to be seen by a doctor was 8 min (interquartile range [IQR]: 2-21 min) and median time from presentation to Code was 59 min (IQR: 5-222 min). Sixteen subjects (11%, 95% CI 6-17) had a history of violence, 45 (30%, 95% CI 23-38) were affected by alcohol, 25 (17%, 95% CI 11-24) had used illicit drugs and 79 (52%, 95% CI 44-60) had a significant mental illness contributing to the Code Grey. Seventy-one patients (47%, 95% CI 39-55) required psychiatric admission, 49 (79%, 95% CI 66-88) involuntarily. Acutely agitated subjects pose a threat to themselves and the staff caring for them. The reason for the agitation is multifactorial and the majority arrive in a behaviourally disturbed state requiring early intervention. The times most likely to result in a Code Grey coincide with least available resources: ED and hospital risk management policies must account for this. A coherent approach by ED to this population is required to optimize patient and staff outcomes. |
SHARE
Bill for firefighters’ bargaining advances
DENVER — All firefighters in the state would have collective bargaining rights regardless of whether their communities voted against giving them those powers under a bill that won preliminary support in the Colorado Senate on Monday.
Opponents said the measure, SB25, takes a one-size-fits-all approach to the issue, and usurps local authority, including in home-rule cities such as Grand Junction, Colorado Springs and Denver.
The bill is nearly identical to one that cleared the Colorado Legislature in 2009 and later was vetoed by then-Gov. Bill Ritter, who said he did so because it went against those local votes.
This year’s bill, however, is seen as even more wide-reaching, particularly to smaller communities. It applies to fire departments that employ two or more people.
The 2009 measure was for departments with 50 or more full-time firefighters.
Sen. Lois Tochtrop, D-Thornton, said collective bargaining rights the firefighters would earn under the bill isn’t just about getting pay raises. It’s about their health and safety.
“I want to make sure that they are well equipped, that they have the right equipment, that they get the proper rest and work the proper hours and get the proper training,” Tochtrop said. “All they’re asking on this bill is the ability, if they chose to, and there’s no mandate that they have to, to go through the process ... of collective bargaining. They can sit at the table with their districts or with their cities and they can discuss safety issues.”
But Senate Minority Leader Bill Cadman, R-Colorado Springs, said the measure places an unfair and unneeded mandate on local communities, and assumes that only through collective bargaining do public safety workers in local communities get what they need and deserve.
“In my community, we voted not once, but twice on coercive bargaining by unions,” Cadman said. “We voted on a tax increase on ourselves for our public safety so we could put that money into our firefighters, into our policemen, into our training, into their retirements. We did it for ourselves. We didn’t need a coercive union bill to require us to take care of ourselves.”
Current law allows cities, towns and special fire protection districts in the state to place ballot measures before voters asking if they want to grant collective bargaining rights to their local firefighters.
Some have, but many others have rejected it. Grand Junction residents last voted against the idea by a wide margin in 2000.
Tochtrop’s bill bypasses those votes and grants the right regardless of local sentiments.
The bill requires a final Senate vote, which could come as early as today, before heading to the House. |
Hello everyone
I have a server configuration in a CSP Gateway installed on a PC (let's call it S2) different from the main one (let's call it S1). This configuration allows me to access a web application that is installed on S1, from a client C asking S2 for this webapp. But for now it works only in HTTP between C and S2, and we would like to use HTTPS (as it already works between S2 and S1).
First here are the tutos found in the doc:
https://docs.intersystems.com/latest/csp/docbook/DocBook.UI.Page.cls?KEY...
https://docs.intersystems.com/latest/csp/docbook/DocBook.UI.Page.cls?KEY...
https://docs.intersystems.com/latest/csp/docbook/DocBook.UI.Page.cls?KEY...
I have tried in many ways using certificates that I have got from a colleague, but I always get an ERR_SSL_PROTOCOL_ERROR or an "unavailable web page/server" error. Could you please take a look on what I've done and tell me if you see anything weird or wrong ? Tutorials in the doc lead me to try:
-Configuring the S2's CSP gateway server access (I notice that I can access to the webapp in HTTP from S2 only if the connection security level is set to "none" (not SSL) in this screen)
-Changing CGI environment variables in related webapp config
-Creating SSL/TLS configurations in S1's Healthshare portal (also tried with a %SuperServer... but where and how could I use them ? I haven't found it)
-Looking into S2's IIS installed certificates... but it seems not linked to S2's CSP Gateway as the HTTP webapp does not go down when I stop the default web site in IIS;
-configuring file SSLdefs.ini following this tutorial: https://community.intersystems.com/post/configuring-cach%C3%A9-client-ap... (...but once more it does not seem to have any effect on the webapp)
So what should I try next ?
Have a nice day !
Mathieu |
Q:
SQL Azure Transient Fault with Data Access Application Block 6.0
In one of our application, we are using Enterprise Library 6.0 data access block. We are initializing Database object as
DatabaseFactory.SetDatabaseProviderFactory(new DatabaseProviderFactory());
Database database = DatabaseFactory.CreateDatabase();
We required to set SqlAzureTransientErrorDetectionStrategy and/or RetryPolicy for above database object.
Is there any way to accomplish above with Data Access Application Block & Transient Fault Handling Application Block for Windows Azure SQL?
I know we can achieve it with ReliableSqlConnection but could not find any resource for Data Access Application Block & Transient Fault Handling Application Block.
A:
UPDATE START
I'm adding full class implementation here so that it can be useful to other user as well.
public class SqlAzureDatabase : SqlDatabase
{
public RetryPolicy _retryPolicy { get; set; }
public SqlAzureDatabase(string connectionString, RetryPolicy retryPolicy)
: base(connectionString)
{
this._retryPolicy = retryPolicy;
}
protected override DatabaseConnectionWrapper GetWrappedConnection()
{
return new DatabaseConnectionWrapper(GetNewOpenConnection());
}
private DbConnection GetNewOpenConnection()
{
SqlConnection connection = null;
try
{
connection = base.CreateConnection() as SqlConnection;
if (connection != null)
{
connection.OpenWithRetry(this._retryPolicy);
}
}
catch
{
if (connection != null && connection.State != System.Data.ConnectionState.Closed)
connection.Close();
throw;
}
return connection;
}
public override int ExecuteNonQuery(DbCommand command)
{
using (DatabaseConnectionWrapper wrapper = GetOpenConnection())
{
PrepareCommand(command, wrapper.Connection);
return DoExecuteNonQueryWithRetry(command);
}
}
private int DoExecuteNonQueryWithRetry(DbCommand command)
{
if (command == null) throw new ArgumentNullException("command");
SqlCommand sqlCommand = command as SqlCommand;
if (sqlCommand != null)
{
int rowsAffected = sqlCommand.ExecuteNonQueryWithRetry(this._retryPolicy);
return rowsAffected;
}
return 0;
}
public override IDataReader ExecuteReader(DbCommand command)
{
using (DatabaseConnectionWrapper wrapper = GetOpenConnection())
{
PrepareCommand(command, wrapper.Connection);
IDataReader realReader = DoExecuteReaderWithRetry(command, CommandBehavior.Default);
return CreateWrappedReader(wrapper, realReader);
}
}
private IDataReader DoExecuteReaderWithRetry(DbCommand command, CommandBehavior cmdBehavior)
{
if (command == null) throw new ArgumentNullException("command");
SqlCommand sqlCommand = command as SqlCommand;
if (sqlCommand != null)
{
IDataReader reader = sqlCommand.ExecuteReaderWithRetry(_retryPolicy);
return reader;
}
return null;
}
public override object ExecuteScalar(DbCommand command)
{
using (DatabaseConnectionWrapper wrapper = GetOpenConnection())
{
PrepareCommand(command, wrapper.Connection);
return DoExecuteScalarWithRetry(command);
}
}
private object DoExecuteScalarWithRetry(IDbCommand command)
{
if (command == null) throw new ArgumentNullException("command");
SqlCommand sqlCommand = command as SqlCommand;
if (sqlCommand != null)
{
object returnValue = sqlCommand.ExecuteScalarWithRetry(this._retryPolicy);
return returnValue;
}
return null;
}
}
SqlAzureDatabase class in action as explained below.
Database database = new SqlAzureDatabase(connectionString, retryPolicy);
UPDATE END
I had similar need, ended up creating an extension of SqlDatabase class and overriding GetWrappedConnection method as:
protected override DatabaseConnectionWrapper GetWrappedConnection()
{
return new DatabaseConnectionWrapper(GetNewOpenConnection());
}
GetNewOpenConnection() is a private method
private DbConnection GetNewOpenConnection()
{
SqlConnection connection = null;
try
{
connection = CreateConnection() as SqlConnection;
if(connection != null)
{
connection.OpenWithRetry(this._retryPolicy);
}
//instrumentationProvider.FireConnectionOpenedEvent();
}
catch
{
if (connection != null)
connection.Close();
throw;
}
return connection;
}
Download the SqlAzureDatabase class @ http://1drv.ms/SJft8o. It was primarily done to support Federation but you can modify it or just use the basic constructor which will take care of injecting retry policy
public SqlAzureDatabase(string connectionString)
: this(connectionString, FederationType.None, null, null, null)
{
}
|
Cobham MicrowavePriority listing
- Cobham Microwave has a long term experience in Microwave Systems and Components. Their five areas of capabilities are Systems and Components: Diodes & Modules, Ferrite Devices, RFFilters, and Waveguides.
IDSP
- IDSP is an app for IPHONE and IPOD Touch.
Made by 2 powerful filters, a band pass and a band stop with adjustable bandwidth. Filters are butterworth 4 and 8 poles, sample rate at 44,100 32 bit. Cancel every noise and hear only your qso.
5th order High Pass VHF Filter
- Sometimes many VHF-UHF modern transceivers have problems with BROADCAST Interference and CROSS-modulation from FM commercial broadcast stations this article shows a simple Batteworth HI-Pass VHF Filter to reduce this problem
KI5YN QLF Filter
- A microprocessor based interface designed to go between a standard Morse code key and a radio transmitter. The circuit receives a signal from the key, processes it, and re-transmits it to the radio.
The Rock-Mite CW Kit
- The Rock-Mite is a 40m CW kit offered by Small Wonder Labs . It features built-in keyer, direct conversion receiver with a crystal RF bandpass filter, 500 milliwatts of power, and switchable frequency offsets to work around QRM |
Receptor-specific binding of purified F4 to isolated villi.
Different procedures for preparing and purifying F4ac fimbriae of the enterotoxigenic Escherichia coli strain GIS 26 (O149:K91:F4ac LT+Sta+STb+) were performed and the purity and yield of F4ac were compared. Fimbriae were prepared by either mechanical shearing or heatshock treatment of concentrated bacterial suspensions (10(11) bacteria/ml). The mechanical shearing procedure resulted in approximately 1.7 mg fimbriae (i.e. 74.4% of the isolated protein) and 0.6 mg (25.6%) contaminating proteins per 10(12) bacteria, whereas the yield of fimbriae following heatshock treatment was lower (0.3 mg per 10(12) bacteria, i.e. 26.2%) and the relative contamination higher (1.0 mg per 10(12) bacteria, i.e. 73.8%). A further purification consisted of either anion exchange chromatography (AEC) or electro-elution from SDS-polyacrylamide gels. The electroelution procedure was performed under reducing and denaturing conditions, so that purified FaeG subunits, the major subunit of F4, were finally obtained. The binding activity of fimbriae, nonpurified as well as purified, and FaeG to F4-specific receptors on isolated intestinal villi was assessed in an inhibition adhesion assay. Native fimbriae as well as major subunits were able to bind to the receptors, and the specificity of the binding was demonstrated by blockage with F4ac-specific MAb. |
Hole 14 - Par 3: Nearest To PinTo qualify for the prizes, $20 dollars will be collected if you use sponsor's club. If you use your own club, $30 dollars will be collected. All collection will go to charity. |
Cell-induced leakage of liposome contents.
Using the principle of relief of self-quenching of carboxyfluorescein [Weinstein, J. N., Yoshikami, S., Henkart, P., Blumenthal, R., & Hagins, W. A. (1977) Science 195, 489-492] upon leakage of the dye from the interior of lipid vesicles, we investigated the integrity of sonicated small unilamellar vesicles in the presence of isolated hepatocytes, Zajdela ascites hepatoma cells, and plasma membranes of either cell type. We observed that cells as well as plasma membranes induce leakage of carboxyfluorescein from vesicles. Two parameters (initial rate and maximal level of induced leakage) were determined to quantitate the leakage events and were found to depend on cell density, vesicle concentration, and vesicle lipid composition. The magnitude of both parameters is shown to increase with cell density and to decrease with increasing vesicle lipid concentration and seems to be proportional to the number of vesicles found in close contact with the cell. For vesicles made of phosphatidylcholine and cholesterol, the degree of induced leakage increases steeply with cholesterol contents increasing from 30 to 40 mol %. In the case of simultaneous presence of 10 mol % phosphatidylserine, induced leakage can be observed at cholesterol contents exceeding 20 mol %. We show that leak-inducing activity resides in the plasma membrane and that it can be considerably reduced by treatment of the plasma membranes with neuraminidase or trypsin, suggesting the involvement of cell-surface glycoprotein(s). Release of activity from intact cells and isolated plasma membranes into the medium occurs spontaneously (at a slow rate) but can be facilitated by freezing and thawing; the activity can subsequently be recovered in a soluble form from the medium. |
Antegrade and retrograde cardioplegia with different reperfusion techniques in patients with multiple coronary artery lesions.
To evaluate the effectiveness of retrograde cardioplegia and reperfusion, a total of 266 patients undergoing coronary bypass surgery between Nov 1987 to Dec 1989 were divided into three groups depending on the method of cardioplegic fluid delivery and reperfusion. In group I (80 patients) antegrade cardioplegia and reperfusion was used. In group II (98 patients) antegrade and retrograde cardioplegia and antegrade reperfusion was used while in group III antegrade and retrograde cardioplegia and retrograde reperfusion was used. Myocardial functions were studied with the help of an on-line computer on the basis of mathematical model of heart before and after cardiopulmonary bypass. Biopsy specimens were collected before, during and after cardiopulmonary bypass in order to study myocardial structural changes. In group I patients there was decrease in myocardial function in the immediate post perfusion period while group II patients had considerable improvement in their myocardial function and groups III patients showed further improvement in it. Ultrastructural myocardial study revealed considerable detrimental changes in group I, minimal changes in group II and no change in group III patients. Thus in our experience retrograde cardioplegia and retrograde reperfusion with warm oxygenated blood provide maximum myocardial protection in patients with multiple coronary artery lesions. |
Timeline of LGBT history, 20th century
The following is a timeline of lesbian, gay, bisexual, and transgender (LGBT) history, in the 20th century.
==Timeline==
1900s
1903 – In New York City on 21 February 1903, New York police conducted the first United States recorded raid on a gay bathhouse, the Ariston Hotel Baths. 34 men were arrested and 12 brought to trial on sodomy charges; 7 men received sentences ranging from 4 to 20 years in prison.
1906 – Potentially the first openly gay American novel with a happy ending, Imre, is published.
1907 – Adolf Brand, the activist leader of the Gemeinschaft der Eigenen, working to overturn Paragraph 175, publishes a piece "outing" the imperial chancellor of Germany, Prince Bernhard von Bülow. The Prince sues Brand for libel and clears his name; Brand is sentenced to 18 months in prison.
1907–1909 – Harden–Eulenburg affair in Germany
1910s
1910 – Emma Goldman first begins speaking publicly in favor of homosexual rights. Magnus Hirschfeld later wrote "she was the first and only woman, indeed the first and only American, to take up the defense of homosexual love before the general public."
1912 – The first explicit reference to lesbianism in a Mormon magazine occurred when the "Young Woman's Journal" paid tribute to "Sappho of Lesbos "; the Scientific Humanitarian Committee of the Netherlands (NWHK), the first Dutch organization to campaign against anti-homosexual discrimination, is established by Dr. Jacob Schorer.
1913 – The word faggot is first used in print in reference to gays in a vocabulary of criminal slang published in Portland, Oregon: "All the faggots [sic] (sissies) will be dressed in drag at the ball tonight".
1917 – The October Revolution in Russia repeals the previous criminal code in its entirety—including Article 995. Bolshevik leaders reportedly say that "homosexual relationships and heterosexual relationships are treated exactly the same by the law."
1919 – In Berlin, Germany, Doctor Magnus Hirschfeld co-founds the Institut für Sexualwissenschaft (Institute for Sex Research), a pioneering private research institute and counseling office. Its library of thousands of books was destroyed by Nazis in May 1933.
1919 - Different from the Others, one of the first explicitly gay films, is released. Magnus Hirschfeld has a cameo in the film and partially funded its production.
1920s
1921 – In England, an attempt to make lesbianism illegal for the first time in Britain's history fails.
1922 – A new criminal code comes into force in the USSR officially decriminalizing homosexual acts.
1923 – The word fag is first used in print in reference to gays in Nels Anderson's The Hobo: "Fairies or Fags are men or boys who exploit sex for profit."
1923 – Lesbian Elsa Gidlow, born in England, published the first volume of openly lesbian love poetry in the United States, titled "On a Grey Thread."
1924 – The first homosexual rights organization in America is founded by Henry Gerber in Chicago— the Society for Human Rights. The group exists for a few months before disbanding under police pressure. Paraguay and Peru legalize homosexuality.
1926 – The New York Times is the first major publication to use the word homosexuality.
1927 - Karol Szymanowski, Poland's openly gay composer, is appointed chief of Poland's state-owned national music school, the Fryderyk Chopin Music Academy.
1928 – The Well of Loneliness by Radclyffe Hall is published in the UK and later in the United States. This sparks great legal controversy and brings the topic of homosexuality to public conversation.
1929 – On 22 May, Katharine Lee Bates, author of America the Beautiful dies. On 16 October, a Reichstag Committee votes to repeal Paragraph 175; the Nazis' rise to power prevents the implementation of the vote.
1930s
1931 - Mädchen in Uniform, one of the first explicitly lesbian films and the first pro-lesbian film, is released.
1931 - In Berlin in 1931, Dora Richter became the first known transgender woman to undergo vaginoplasty.
1932 – Poland codifies the homosexual and heterosexual age of consent equally at 15. Polish law never had criminalized homosexuality, although occupying powers had outlawed it in 1835.
1933 – New Danish penalty law decriminalizes homosexuality.
1933 – The National Socialist German Workers Party bans homosexual groups. Homosexuals are sent to concentration camps. Nazis burn the library of Magnus Hirschfeld's Institute for Sexual Research, and destroy the Institute; Denmark and Philippines decriminalizes homosexuality. Homosexual acts are recriminalized in the USSR.
1934 – Uruguay decriminalizes homosexuality. The USSR once again criminalizes muzhelozhstvo (specific Russian definition of "male sexual intercourse with male", literally "man lying with man"), punishable by up to 5 years in prison – more for the coercion or involvement of minors.
1936 – Mona's 440 Club, the first lesbian bar in America, opened in San Francisco in 1936. Mona's waitresses and female performers wore tuxedos and patrons dressed their roles.
1936 – Federico García Lorca, Spanish poet, is shot at the beginning of the Spanish civil war.
1937 – The first use of the pink triangle for gay men in Nazi concentration camps.
1938 – The word gay is used for the first time on film in reference to homosexuality in the film Bringing Up Baby.
1939 – Frances V. Rummell, an educator and a teacher of French at Stephens College, published an autobiography under the title Diana: A Strange Autobiography; it was the first explicitly lesbian autobiography in which two women end up happily together. This autobiography was published with a note stating "The publishers wish it expressly understood that this is a true story, the first of its kind ever offered to the general reading public".
1940s
1940 – Iceland decriminalizes homosexuality; the NWHK is disbanded in the Netherlands in May due to the German invasion, and most of its archive is voluntarily destroyed, while the rest is confiscated by Nazi soldiers.
1941 – Transsexuality was first used in reference to homosexuality and bisexuality.
1942 – Switzerland decriminalizes homosexuality, with the age of consent set at 20.
1944 – Sweden decriminalizes homosexuality, with the age of consent set at 18 and Suriname legalizes homosexuality.
1944 – The first prominent American to reveal his homosexuality was the poet Robert Duncan. This occurred when in 1944, using his own name in the anarchist magazine Politics, he wrote that homosexuals were an oppressed minority.
1945 – The Holocaust ends and it is estimated that between about 3,000 to about 9,000 homosexuals died in Nazi concentration and death camps, while it is estimated that between about 2,000 to about 6,000 homosexual survivors in Nazi concentration and death camps were required to serve out the full term of their sentences under Paragraph 175 in prison. The first gay bar in post-World War II Berlin opened in the summer of 1945, and the first drag ball took place in American sector of West Berlin in the fall of 1945. Four honourably discharged gay veterans form the Veterans Benevolent Association, the first LGBT veterans' group. Gay bar Yanagi opened in Japan.
1946 – "COC" (Dutch acronym for "Center for Culture and Recreation"), one of the earliest homophile organizations, is founded in the Netherlands. It is the oldest surviving LGBT organization.
1946 – Plastic surgeon Harold Gillies carries out sex reassignment surgery on Michael Dillon in Britain.
1947-1948 – Vice Versa, the first American lesbian publication, is written and self-published by Lisa Ben (real name Edith Eyde) in Los Angeles.
1948 – "Forbundet af 1948" ("League of 1948"), a homosexual group, is formed in Denmark.
1948 – The communist authorities of Poland make 15 the age of consent for all sexual acts, homosexual or heterosexual.
1950s
1950 – The Organization for Sexual Equality, now Swedish Federation for Lesbian, Gay, Bisexual and Transgender Rights (RFSL), is formed in Sweden; East Germany partially abrogates the Nazis' emendations to Paragraph 175; The Mattachine Society, the first sustained American homosexual group, is founded in Los Angeles (11 November); 190 individuals in the United States are dismissed from government employment for their sexual orientation, commencing the Lavender scare.
1951 – Greece decriminalizes homosexuality.
1951 – Jordan In 1951, a revision of the Jordanian Criminal Code legalized private, adult, non-commercial, and consensual sodomy, with the age of consent set at 16.
1952 – "Spring Fire," the first lesbian paperback novel, and the beginning of the lesbian pulp fiction genre, was published in 1952 and sold 1.5 million copies. It was written by lesbian Marijane Meaker under the false name Vin Packer.
1952 – In the spring of 1952, Dale Jennings was arrested in Los Angeles for allegedly soliciting a police officer in a bathroom in Westlake Park, now known as MacArthur Park. His trial drew national attention to the Mattachine Society, and membership increased drastically after Jennings contested the charges, resulting in a hung jury.
1952 – Christine Jorgensen becomes the first widely publicized person to have undergone sex reassignment surgery, in this case, male to female, creating a world-wide sensation.
1952 – In Japan the male homosexual magazine "Adonis" is launched with the writer Yukio Mishima as a contributor.
1953 – The Diana Foundation was founded on 19 March 1953 in Houston, TX by a small group of friends. The Diana Foundation is a nonprofit organization and recognized as the oldest continuously active gay organization in the United States and hosts two annual fundraising events including its Diana Awards.
1954 – 7 June–Mathematical and computer genius Alan Turing commits suicide by cyanide poisoning, 18 months after being given a choice between two years in prison or libido-reducing hormone treatment for a year as a punishment for homosexuality. A succession of well-known men, including Lord Montagu, Michael Pitt-Rivers and Peter Wildeblood, were convicted of homosexual offences as British police pursued a McCarthy-like purge of Society homosexuals. Arcadie, the first homosexual group in France, is formed.
1955 – The Daughters of Bilitis (DOB) was founded in San Francisco by four lesbian couples (including Del Martin and Phyllis Lyon) and was the first national lesbian political and social organization in the United States. The group's name came from "Songs of Bilitis," a lesbian-themed song cycle by French poet Pierre Louÿs, which described the fictional Bilitis as a resident of the Isle of Lesbos alongside Sappho. DOB's activities included hosting public forums on homosexuality, offering support to isolated, married, and mothering lesbians, and participating in research activities. Mattachine Society New York chapter founded.
1956 – The Ladder, the first nationally distributed lesbian publication in the United States, began publication.
1956 – Thailand decriminalizes homosexual acts.
1956 – Florida Legislative Investigation Committee (commonly known as the Johns Committee) established. Failing to find communist ties to civil rights organizations, it investigates homosexuals as a threat to national security.
1957 – The word "Transsexual" is coined by U.S. physician Harry Benjamin; The Wolfenden Committee's report recommends decriminalizing consensual homosexual behaviour between adults in the United Kingdom; Psychologist Evelyn Hooker publishes a study showing that homosexual men are as well adjusted as non-homosexual men, which becomes a major factor in the American Psychiatric Association removing homosexuality from its handbook of disorders in 1973. Homoerotic artist Tom of Finland first published on the cover of Physique Pictorial magazine from Los Angeles.
1958 – The Homosexual Law Reform Society is founded in the United Kingdom; Barbara Gittings founds the New York chapter of Daughters of Bilitis.
1958 – One, Inc. v. Olesen, 355 U.S. 371 (1958), was the first U.S. Supreme Court ruling to deal with homosexuality and the first to address free speech rights with respect to homosexuality. The Supreme Court reversed a lower court ruling that the gay magazine ONE magazine violated obscenity laws, thus upholding constitutional protection for pro-homosexual writing.
1958 - The first gay leather bar in the United States, the Gold Coast, opened in Chicago in 1958. It was founded by Dom Orejudos and Chuck Renslow.
1959 – ITV, at the time the UK's only national commercial broadcaster, broadcasts the first gay drama, South, starring Peter Wyngarde. The first homosexual uprising in the USA occurs at Cooper's Doughnuts in Los Angeles, USA; rioters were arrested by LAPD.
1960s
1960 – Cpls. Fannie Mae Clackum and Grace Garner, U.S. Air Force reservists in the late 1940s and early 1950s, became the first people to successfully challenge their discharges from the U.S. military for being gay, although the ruling turned on the fact that there wasn't enough evidence to show the women were lesbians. According to scholars, since at least as early as 1960, Executive Order 10450 was applied to ban transgender individuals from serving in the United States military.
1961 – Hungary decriminalizes sodomy; the Vatican declares that anyone who is "affected by the perverse inclination" towards homosexuality should not be allowed to take religious vows or be ordained within the Roman Catholic Church; The Rejected, the first documentary on homosexuality broadcast on American television, is first broadcast on KQED TV in San Francisco on 11 September 1961; José Sarria becomes the first openly gay candidate for public office in the United States when he runs for the San Francisco Board of Supervisors.
1962 – Illinois becomes the first U.S. state to remove sodomy law from its criminal code through passage of the American Law Institute's Model Penal Code. While the adopted code did not penalize private sexual relations, it criminalized acts of "Open Lewdness;" Czechoslovakia decriminalizes sodomy. The Tavern Guild, the first gay business association in the United States, was created by gay bar owners in 1962 as a response to continued police harassment and closing of gay bars (including the Tay-Bush Inn raid), and continued until 1995.
1963 – East Coast Homophile Organizations (ECHO) is established in Philadelphia; initial members include the regional chapters of Daughters of Bilitis, Janus Society, and Mattachine Society.
1963 – Israel de facto decriminalizes sodomy and sexual acts between men by judicial decision against the enforcement of the relevant section in the old British-mandate law from 1936 (which in fact was never enforced).
1964 – Canada sees its first gay-positive organization, ASK, and first gay magazines: ASK Newsletter (in Vancouver), and Gay (by Gay Publishing Company of Toronto). Gay was the first periodical to use the term 'Gay' in the title and expanded quickly, including outstripping the distribution of American publications under the name Gay International. These were quickly followed by Two (by Gayboy (later Kamp) Publishing Company of Toronto).
1964 – Canada: In March 1964, Ted Northe founds the 'Imperial Court of Canada' a monarchist society compromised primarily of drag personalities and becomes a driving force in the effort to achieve equality in Canada. The Courts of Canada now have over 14 chapters across the country and is the oldest, continuously running, LGBT Organization in Canada.
1964 – The first photograph of lesbians on the cover of lesbian magazine The Ladder was done in September 1964, showing two women from the back, on a beach looking out to sea.
1964 – The June 1964 Paul Welch Life article entitled "Homosexuality In America" was the first time a national publication reported on gay issues.
1964 – Created in 1964, the Council on Religion and the Homosexual was the first group in the U.S. to use the word "homosexual" in its name.
1965 – The Council on Religion and the Homosexual held an event where local politicians could be questioned about issues concerning gay and lesbian people, including police intimidation. The event marks the first known instance of "the gay vote" being sought.
1965 – Everett George Klippert, the last person imprisoned in Canada for homosexuality, is arrested for private, consensual sex with men. After being assessed "incurably homosexual", he is sentenced to an indefinite "preventive detention" as a dangerous sexual offender. This was considered by many Canadians to be extremely homophobic, and prompted sympathetic articles in Maclean's and The Toronto Star, eventually leading to increased calls for legal reform in Canada which passed in 1969.
1965 – Conservatively dressed gays and lesbians demonstrate outside Independence Hall in Philadelphia on 4 July 1965. This was the first in a series of Annual Reminders that took place through 1969.
1965 – Vanguard, an organization of LGBT youth in the low-income Tenderloin district, was created in 1965. It is considered the first Gay Liberation organization in the U.S.
1966 – The Mattachine Society stages a "Sip-In" at Julius Bar in New York City challenging a New York State Liquor Authority prohibiting serving alcohol to gays; the National Planning Conference of Homophile Organizations is established (to become NACHO—North American Conference of Homophile Organizations later that year); the Compton's Cafeteria Riot occurred in August 1966 by transgender women and Vanguard members in the Tenderloin district of San Francisco. This incident was one of the first recorded transgender riots in United States history, preceding the more famous 1969 Stonewall Riots in New York City by three years. Vanguard was founded to demonstrate for equal rights. The first lesbian to appear on the cover of the lesbian magazine The Ladder with her face showing was Lilli Vincenz in January 1966. A coalition of Homosexual organizations organized demonstrations for Armed Forces Day to protest the exclusion of LGBT from the U.S. armed services. The Los Angeles group held a 15-car motorcade, which has been identified as the nation's first gay pride parade. The National Transsexual Counseling Unit is created, becoming the first transgender organization ever and first American transgender organization ever. The Society for Individual Rights opened America’s first gay and lesbian community center.
1967 – The Black Cat Tavern in the Silver Lake neighborhood of Los Angeles is raided on New Year's Day by 12 plainclothes police officers who beat and arrested employees and patrons. The raid prompted a series of protests that began on 5 January 1967, organized by P.R.I.D.E. (Personal Rights in Defense and Education). It's the first use of the term "Pride" that came to be associated with LGBT rights.
1967 – The Advocate was first published in September as "The Los Angeles Advocate," a local newsletter alerting gay men to police raids in Los Angeles gay bars.
1967 – The Sexual Offences Act 1967 decriminalised homosexual acts between two men over 21 years of age in private in England and Wales.; The act did not apply to Scotland, Northern Ireland nor the Channel Islands; The book Homosexual Behavior Among Males by Wainwright Churchill breaks ground as a scientific study approaching homosexuality as a fact of life and introduces the term "homoerotophobia", a possible precursor to "homophobia"; The Oscar Wilde Bookshop, the world's first homosexual-oriented bookstore, opens in New York City; A raid on the Black Cat Tavern in Los Angeles, California promotes homosexual rights activity. The Student Homophile League at Columbia University is the first institutionally recognized gay student group in the United States.
1967 –Grupo Nuestro Mundo (English: "Our World Group") is formed in Greater Buenos Aires, the first gay rights organization in Argentina and Latin America. The Homosexuals, a 1967 episode of the documentary television series CBS Reports, was the first network documentary dealing with the topic of homosexuality.
1968 – Paragraph 175 is eased in East Germany decriminalizing homosexual acts over the age of 18; Bulgaria decriminalizes adult homosexual relations. In Los Angeles, following the arrest of two patrons in a raid, The Patch owner Lee Glaze organized the other patrons to move on the police station. After buying out a nearby flower shop, the demonstrators caravanned to the station, festooned it with the flowers and bailed out the arrested men. According to the online encyclopedia glbtq.com, "In the aftermath of the riot at Compton's, a network of transgender social, psychological, and medical support services was established, which culminated in 1968 with the creation of the National Transsexual Counseling Unit [NTCU], the first such peer-run support and advocacy organization in the world".
1969 – The Stonewall riots occur in New York City; Paragraph 175 is eased in West Germany; Bill C-150 is passed, decriminalizing homosexuality in Canada. Pierre Trudeau, the Prime Minister of Canada, is quoted as having said: "The state has no place in the bedrooms of the nation."; Poland decriminalizes homosexual prostitution; An Australian arm of the Daughters of Bilitis forms in Melbourne and is considered Australia's first homosexual rights organisation. The Gay Liberation Front is formed in America, and it is the first gay organization to use "gay" in its name. On 31 December 1969, the Cockettes perform for the first time at the Palace Theatre on Union and Columbus in the North Beach neighborhood of San Francisco.
1970s
1970 – The first Gay Liberation Day March is held in New York City; The first LGBT Pride Parade is held in New York; The first "Gay-in" held in San Francisco; Carl Wittman writes A Gay Manifesto; CAMP (Campaign Against Moral Persecution) is formed in Australia; The Task Force on Gay Liberation formed within the American Library Association. Now known as the GLBT Round Table, this organization is the oldest LGBTQ professional organization in the United States. In November, the first gay rights march occurs in the UK at Highbury Fields following the arrest of an activist from the Young Liberals for importuning.
1971 – Society Five (a homosexual rights organization) is formed in Melbourne, Australia; Homosexuality is decriminalized in Austria, Costa Rica and Finland; Colorado and Oregon repeal sodomy laws; Idaho repeals the sodomy law — Then re-instates the repealed sodomy law because of outrage among Mormons and Catholics. The Netherlands changes the homosexual age of consent to 16, the same as the straight age of consent; The U.S. Libertarian Party calls for the repeal of all victimless crime laws, including the sodomy laws; Dr. Frank Kameny becomes the first openly gay candidate for the United States Congress; The University of Michigan establishes the first collegiate LGBT programs office, then known as the "Gay Advocate's Office." The UK Gay Liberation Front (GLF) was recognized as a political movement in the national press and was holding weekly meetings of 200 to 300 people.; George Klippert, the last man jailed for homosexuality in Canada, is released from prison. Ken Togo ran for national election, in Japan. During a UCLA conference called "The Homosexual in America," Betty Berzon became the first psychotherapist in the country to come out as gay to the public. Boys in the Sand was the first gay porn film to include credits, to achieve crossover success, to be reviewed by Variety, and one of the earliest porn films, after 1969's Blue Movie by Andy Warhol, to gain mainstream credibility, preceding 1972's Deep Throat by nearly a year. It was promoted with an advertising campaign unprecedented for a pornographic feature, premiered in New York City in 1971 and was an immediate critical and commercial success. The Alice B. Toklas Democratic Club, founded in San Francisco in 1971, was the first gay Democratic club of the United States.
1972 – Sweden becomes the first country in the world to allow transsexuals to legally change their sex, and provides free hormone therapy; Hawaii legalizes homosexuality; In South Australia, a consenting adults in private-type legal defence was introduced; Norway decriminalizes homosexuality; East Lansing, Michigan and Ann Arbor, Michigan and San Francisco, California become the first cities in United States to pass a homosexual rights ordinance. Jim Foster, San Francisco and Madeline Davis, Buffalo, New York, first openly gay and lesbian delegates to the Democratic Convention, Miami, McGovern; give the first speeches advocating a gay rights plank in the Democratic Party Platform. "Stonewall Nation", the first gay anthem is written and recorded by Madeline Davis and is produced on 45 rpm record by the Mattachine Society of the Niagara Frontier. Lesbianism 101, the first lesbianism course in the U.S., is taught at the University of Buffalo by Margaret Small and Madeline Davis. Queens, NY schoolteacher Jeanne Manford marched with her gay son, gay rights activist Morty Manford, in New York's Christopher Street Liberation Day march. This was the origin of the straight ally movement and of PFLAG - (originally Parents of Gays, then Parents, Families and Friends of Lesbians and Gays, now simply PFLAG.) Nancy Wechsler became the first openly gay or lesbian person in political office in America; she was elected to the Ann Arbor City Council in 1972 as a member of the Human Rights Party and came out as a lesbian during her first and only term there. Also in 1972, Camille Mitchell became the first open lesbian to be awarded custody of her children in a divorce case, although the judge restricted the arrangement by precluding Ms. Mitchell's lover from moving in with her and the children. Freda Smith became the first openly lesbian minister in the Metropolitan Community Church (she was also their first female minister). Beth Chayim Chadashim was founded in 1972 as the first LGBT synagogue in the world, and the first LGBT synagogue recognized by the Union for Reform Judaism. A Quaker group, the Committee of Friends on Bisexuality, issued the "Ithaca Statement on Bisexuality" supporting bisexuals. The Statement, which may have been "the first public declaration of the bisexual movement" and "was certainly the first statement on bisexuality issued by an American religious assembly," appeared in the Quaker Friends Journal and The Advocate in 1972. Today Quakers have varying opinions on LGBT people and rights, with some Quaker groups more accepting than others. The first gay bar in San Francisco to have clear windows was Twin Peaks Tavern, which removed its blacked-out windows in 1972.
1973 – On 15 October the Australian and New Zealand College of Psychiatry Federal Council declares homosexuality not an illness – the first such body in the world to do so; in December the American Psychiatric Association removes homosexuality from its Diagnostic and Statistical Manual of Mental Disorders (DSM-II), based largely on the research and advocacy of Evelyn Hooker. The first formal meeting of PFLAG took place on 26 March 1973 at the Metropolitan-Duane Methodist Church in Greenwich Village (now the Church of the Village). Approximately 20 people attended, including founder Jeanne Manford, her husband Jules, son Morty, Dick and Amy Ashworth, Metropolitan Community Church founder Reverend Troy Perry, and more. Malta legalizes homosexuality; In West Germany, the age of consent is reduced for homosexuals to 18 (though it is 14 for heterosexuals).; Sally Miller Gearhart became the first open lesbian to obtain a tenure-track faculty position when she was hired by San Francisco State University, where she helped establish one of the first women and gender study programs in the country. Lavender Country, an American country music band, released a self-titled album which is the first known gay-themed album in country music history.
1974 – Chile allows a trans person to legally change her name and gender on the birth certificate after undergoing sex reassignment surgery, becoming the second country in the world to do so. Kathy Kozachenko becomes the first openly gay American elected to public office when she wins a seat on the Ann Arbor, Michigan city council; In New York City Dr. Fritz Klein founds the Bisexual Forum, the first support group for the Bisexual Community; Elaine Noble becomes the second openly gay American elected to public office when she wins a seat in the Massachusetts State House; Inspired by Noble, Minnesota state legislator Allan Spear comes out in a newspaper interview; Ohio repeals sodomy laws. Robert Grant founds American Christian Cause to oppose the "gay agenda", the beginning of modern Christian politics in America. In London, the first openly LGBT telephone help line opens, followed one year later by the Brighton Lesbian and Gay Switchboard; the Brunswick Four are arrested on 5 January 1974, in Toronto, Ontario. This incident of Lesbophobia galvanizes the Toronto Lesbian and Gay community; the National Socialist League (The Gay Nazi Party) is founded in Los Angeles, California. The first openly gay or lesbian person to be elected to any political office in America was Kathy Kozachenko, who was elected to the Ann Arbor City Council in April 1974. Also in 1974, the Lesbian Herstory Archives opened to the public in the New York apartment of lesbian couple Joan Nestle and Deborah Edel; it has the world's largest collection of materials by and about lesbians and their communities. Also in 1974, Angela Morley became the first openly transgender person to be nominated for an Academy Award, when she was nominated for one in the category of Best Music, Original Song Score/Adaptation for The Little Prince (1974), a nomination shared with Alan Jay Lerner, Frederick Loewe, and Douglas Gamley. The world's first gay softball league was formed in San Francisco in 1974 as the Community Softball League, which eventually included both women's and men's teams. The teams, usually sponsored by gay bars, competed against each other and against the San Francisco Police softball team.
1975 – Twelve women became the first group of women in Japan to publicly identify as lesbians, publishing one issue of a magazine called Subarashi Onna (Wonderful Women). Homosexuality is legalized in California due to the Consenting Adult Sex Bill, authored by and successfully lobbied for in the state legislature by State Assemblyman from San Francisco Willie Brown; Leonard Matlovich, a Technical Sergeant in the United States Air Force, becomes the first U.S. gay service member to purposely out himself to fight their ban; South Australia becomes the first state in Australia to make homosexuality legal between consenting adults in private. Panama is the third country in the world to allow transsexuals who have gone through gender reassignment surgery to get their personal documents reflecting their new sex; UK journal Gay Left begins publication; Minneapolis becomes the first city in the United States to pass trans-inclusive civil rights protection legislation; Clela Rorex, a clerk in Boulder County, Colorado, issues the first same-sex marriage licenses in the United States, issuing the very first of them to Dave McCord and Dave Zamora, on 26 March 1975. Six same-sex marriages were performed as a result of her giving out licenses, but all of the marriages were overturned later that year. Maureen Colquhoun becomes the UK's first out lesbian MP after coming out in 1975. She is the UK's first openly gay MP.
1976 – Robert Grant founds the Christian Voice to take his anti-homosexual-rights crusade national in United States; the Homosexual Law Reform Coalition and the Gay Teachers Group are started in Australia; the Australian Capital Territory decriminalizes homosexuality between consenting adults in private and equalizes the age of consent; Out Minnesota state legislator Allan Spear is reelected; and Denmark equalizes the age of consent. Association of homosexual liberation was founded in Japan. Tom Gallagher became the first United States Foreign Service officer to come out as gay; he quit the Foreign Service after that, as he would have been unable to obtain a security clearance. Patricia Nell Warren's third novel, The Fancy Dancer (1976) was the first bestseller to portray a gay priest and to explore gay life in a small town.
1977 – Harvey Milk is elected city-county supervisor in San Francisco, becoming the first openly gay or lesbian candidate elected to political office in California, the seventh openly gay/lesbian elected official nationally, and the third man to be openly gay at time of his election. Dade County, Florida enacts a Human Rights Ordinance; it is repealed the same year after a militant anti-homosexual-rights campaign led by Anita Bryant. Quebec becomes the first jurisdiction larger than a city or county in the world to prohibit discrimination based on sexual orientation in the public and private sectors; Croatia, Montenegro, Slovenia and Vojvodina legalise homosexuality. Welsh author Jeffrey Weeks publishes Coming Out; Publication of the first issue of Gaysweek, NYC's first mainstream gay weekly. Police raided a house outside of Boston outraging the gay community. In response the Boston-Boise Committee was formed. Anne Holmes became the first openly lesbian minister ordained by the United Church of Christ; Ellen Barrett became the first openly lesbian priest ordained by the Episcopal Church of the United States (serving the Diocese of New York). The first lesbian mystery novel in America was published; it was Angel Dance, by Mary F. Beal. The National Center for Lesbian Rights was founded. Shakuntala Devi published the first study of homosexuality in India. Platonica Club and Front Runners were founded in Japan. San Francisco hosted the world's first gay film festival in 1977. Peter Adair, Nancy Adair and other members of the Mariposa Film Group premiered the groundbreaking documentary on coming out, Word Is Out: Stories of Some of Our Lives, at the Castro Theater in 1977. The film was the first feature-length documentary on gay identity by gay and lesbian filmmakers. Beth Chayim Chadashim became the first LGBT synagogue to own its own building. On March 26, 1977, Frank Kameny and a dozen other members of the gay and lesbian community, under the leadership of the then-National Gay Task Force, briefed then-Public Liaison Midge Costanza on much-needed changes in federal laws and policies. This was the first time that gay rights were officially discussed at the White House.
1978 – San Francisco Supervisor Harvey Milk and Mayor George Moscone are assassinated by former Supervisor Dan White; the first Sydney Gay and Lesbian Mardi Gras is held, with 2000 people attending and 53 subsequently arrested and some seriously beaten by police. The rainbow flag is first used as a symbol of gay pride; Sweden establishes a uniform age of consent. Samois, the earliest known lesbian-feminist BDSM organization, is founded in San Francisco; well-known members of the group include Patrick Califia and Gayle Rubin; the group is among the very earliest advocates of what came to be known as sex-positive feminism; The International Lesbian and Gay Association (ILGA) is established. Robin Tyler became the first out lesbian on U.S. national television, appearing on a Showtime comedy special hosted by Phyllis Diller. The same year she released her comedy album, Always a Bridesmaid, Never a Groom, the first comedy album by an out lesbian. The San Francisco Lesbian/Gay Freedom Band was founded by Jon Reed Sims in 1978 as the San Francisco Gay Freedom Day Marching Band and Twirling Corp. Upon its founding in 1978, it became the first openly gay musical group in the world. San Francisco became the first city in America to have a recruitment drive for gay police officers, bringing in over 350 applications. Allen Bennett became the first openly gay rabbi in the United States.
1979 – The first national homosexual rights march on Washington, D.C. is held; The White Night riots occur, Harry Hay issues the first call for a Radical Faerie gathering in Arizona, and The Sisters of Perpetual Indulgence first appear in public on Easter Sunday in San Francisco. Cuba and Spain decriminalize homosexuality. Esta Noche, a gay bar located at 3079 16th & Mission Street in San Francisco, was the first gay Latino bar in San Francisco, and first opened in 1979. A number of people in Sweden called in sick with a case of being homosexual, in protest of homosexuality being classified as an illness. This was followed by an activist occupation of the main office of the National Board of Health and Welfare. Within a few months, Sweden became the first country in the world to remove homosexuality as an illness. Japan Gay Center was established in Japan. Grady Quinn and Randy Rohl became the first known gay couple to attend a high school prom when they attended the Lincoln High School prom in Sioux Falls, South Dakota on May 23, 1979.
1980s
1980 – The United States Democratic Party becomes the first major political party in the U.S. to endorse a homosexual rights platform plank; Scotland decriminalizes homosexuality; The Human Rights Campaign Fund is founded by Steve Endean; The Human Rights Campaign is America's largest civil rights organization working to achieve lesbian, gay, bisexual and transgender equality. Lionel Blue becomes the first British rabbi to come out as gay; "Becoming Visible: The First Black Lesbian Conference" is held at the Women's Building, from October 17 to 19, 1980. It has been credited as the first conference for African-American lesbian women. The Socialist Party USA nominates an openly gay man, David McReynolds, as its (and America's) first openly gay presidential candidate in 1980.
1981 – The European Court of Human Rights in Dudgeon v United Kingdom strikes down Northern Ireland's criminalisation of homosexual acts between consenting adults, leading to Northern Ireland decriminalising homosexual sex the following year; Victoria (Australia) and Colombia decriminalize homosexuality with a uniform age of consent; The Moral Majority starts its anti-homosexual crusade; Norway becomes the first country in the world to enact a law to prevent discrimination against homosexuals; Hong Kong's first sex-change operation is performed. The first official documentation of the condition to be known as AIDS was published by the US Centers for Disease Control and Prevention (CDC) on 5 June 1981. Tennis player Billie Jean King became the first prominent professional athlete to come out as a lesbian, when her relationship with her secretary Marilyn Barnett became public in a May 1981 "palimony" lawsuit filed by Barnett. Due to this she lost all of her endorsements. Mary C. Morgan became the first openly gay or lesbian judge in America when she was appointed by California Governor Jerry Brown to the San Francisco Municipal Court. Randy Shilts was hired as a national correspondent by the San Francisco Chronicle, becoming "the first openly gay reporter with a gay 'beat' in the American mainstream press." A Sergeant of the New York City Police Department (Charles H. Cochrane Jr.) came out as gay during a city council hearing. This made him the first New York City Police Department member to publicly announce his homosexuality.
1982 – Laguna Beach, CA elects the first openly gay mayor in United States history; France equalizes the age of consent; The first Gay Games is held in San Francisco, attracting 1,600 participants; Northern Ireland decriminalizes homosexuality; Wisconsin becomes the first US state to ban discrimination against homosexuals; New South Wales becomes the first Australian state to outlaw discrimination on the basis of actual or perceived homosexuality. The condition to be known as AIDS had acquired a number of names – GRID5 (gay-related immune deficiency), ‘gay cancer’, ‘community-acquired immune dysfunction’ and ‘gay compromise syndrome’ The CDC used the term AIDS for the first time in September 1982, when it reported that an average of one to two cases of AIDS were being diagnosed in America every day. Ken Togo founded the Deracine Party in Japan. New York City police sergeant Charles H. Cochrane Jr. and former Fairview, New Jersey sergeant Sam Ciccone formed the first group targeted at the needs of gay members of law enforcement, the Gay Officers Action League (GOAL). Portugal decriminalizes homosexuality for the second time in its history.
1983 – Massachusetts Representative Gerry Studds reveals he is gay on the floor of the House, becoming the first openly gay member of Congress; Guernsey (Including Alderney, Herm and Sark) decriminalizes homosexuality; AIDS is described as a "gay plague" by Reverend Jerry Falwell; BiPOL, the first and oldest bisexual political organization, is founded in San Francisco by bisexual activists Autumn Courtney, Lani Ka'ahumanu, Arlene Krantz, David Lourea, Bill Mack, Alan Rockway, and Maggi Rubenstein; Governor Jerry Brown appoints Herb Donaldson as the first openly gay male municipal court judge in the State of California; David Scondras becomes the first openly gay official elected to the Boston City Council.
1984 – The lesbian and gay association "Ten Percent Club" is formed in Hong Kong; Massachusetts voters reelect representative Gerry Studds, despite his revealing himself as homosexual the year before; New South Wales and the Northern Territory in Australia make homosexual acts legal; Chris Smith, newly elected to the UK parliament declares: "My name is Chris Smith. I'm the Labour MP for Islington South and Finsbury, and I'm gay", making him the first openly out homosexual male politician in the UK parliament (Maureen Colquhoun being the first openly out homosexual politician in the UK in 1975). The Argentine Homosexual Community (Comunidad Homosexual Argentina, CHA) is formed uniting several different and preexisting groups. Berkeley, California becomes the first city in the U.S. to adopt a program of domestic partnership health benefits for city employees; West Hollywood, CA is founded and becomes the first known city to elect a city council where a majority of the members are openly gay or lesbian. Reconstructionist Judaism became the first Jewish denomination to allow openly gay and lesbian rabbis and cantors. ILGA Japan is founded in Japan. On Our Backs, the first women-run erotica magazine and the first magazine to feature lesbian erotica for a lesbian audience in the United States, was first published in 1984 by Debi Sundahl and Myrna Elana, with the contributions of Susie Bright, Nan Kinney, Honey Lee Cottrell, Dawn Lewis, Happy Hyder, Tee Corinne, Jewelle Gomez, Judith Stein, Joan Nestle, and Patrick Califia. In 1984, BiPOL sponsored the first bisexual rights rally, outside the Democratic National Convention in San Francisco. The rally featured nine speakers from civil rights groups allied with the bisexual movement.
1985 – France prohibits discrimination based on lifestyle (moeurs) in employment and services; the first memorial to gay Holocaust victims is dedicated; Belgium equalizes the age of consent; the Restoration Church of Jesus Christ (informally called the Gay Mormon Church) is founded by Antonio A. Feliz. Actor Rock Hudson dies of AIDS. He is the first major public figure known to have died from an AIDS-related illness. Terry Sweeney becomes Saturday Night Live's first openly gay male cast member; Sweeney was "out" prior to being hired as a cast member. The Bisexual Resource Center (BRC) in Massachusetts has served the bisexual community since 1985. Liverpool-based soap opera, Brookside featured the first openly gay character on a British TV series this year.
1986 – Homosexual Law Reform Act passed in New Zealand, legalizing sex between males over 16; Haiti decriminalizes homosexuality, June in Bowers v. Hardwick case, U.S. Supreme Court upholds Georgia law forbidding oral or anal sex, ruling that the constitutional right to privacy does not extend to homosexual relations, but it does not state whether the law can be enforced against heterosexuals. Becky Smith and Annie Afleck became the first openly lesbian couple in America granted legal, joint adoption of a child. From 1 till 3 May, the 1986, ILGA Asia Conference took place in Japan's capital Tokyo. The Dutch Remonstrants are the world's first Christian denomination to perform same-sex unions and marriages. Canadian province Ontario passes anti-discrimination legislation. Hill Street Blues featured the first lesbian recurring character on a major network; the character was a police officer called Kate McBride, played by Lindsay Crouse.
1987 – AIDS Coalition to Unleash Power(ACT-UP) founded in the US in response to the US government's slow response in dealing with the AIDS crisis. ACT UP stages its first major demonstration, seventeen protesters are arrested; U.S. Congressman Barney Frank comes out. Boulder, Colorado citizens pass the first referendum to ban discrimination based on sexual orientation. In New York City a group of Bisexual LGBT rights activist including Brenda Howard found the New York Area Bisexual Network (NYABN); Homomonument, a memorial to persecuted homosexuals, opens in Amsterdam. David Norris is the first openly gay person to be elected to public office in the Republic of Ireland. A group of 75 bisexuals marched in the 1987 March On Washington For Gay and Lesbian Rights, which was the first nationwide bisexual gathering. The article "The Bisexual Movement: Are We Visible Yet?", by Lani Ka'ahumanu, appeared in the official Civil Disobedience Handbook for the March. It was the first article about bisexuals and the emerging bisexual movement to be published in a national lesbian or gay publication. Canadian province of Manitoba and territory Yukon ban sexual orientation discrimination.
1988 – Sweden is the first country to pass laws protecting homosexual regarding social services, taxes, and inheritances. The anti-gay Section 28 passes in England and Wales; Scotland enacts almost identical legislation; Canadian MP Svend Robinson comes out; Canada lowers the age of consent for sodomy to 18; Belize and Israel decriminalize (de jure) sodomy and sexual acts between men (the relevant section in the old British-mandate law from 1936 was never enforced in Israel). After losing an Irish High Court case (1980) and an Irish Supreme Court case (1983), David Norris takes his case (Norris v. Ireland) to the European Court of Human Rights. The European Court strikes down the Irish law criminalising male-to-male sex on the grounds of privacy. Stacy Offner became the first openly lesbian rabbi hired by a mainstream Jewish congregation, Shir Tikvah Congregation of Minneapolis (a Reform Jewish congregation).
1989 – Western Australia decriminalizes male homosexuality (but the age of consent is set at 21); Liechtenstein legalizes homosexuality; Denmark is the first country in the world to enact registered partnership laws (like a civil union) for same-sex couples, with most of the same rights as marriage (excluding the right to adoption (until June 2010) and the right to marriage in a church).
1990s
1990
Equalization of age of consent: Czechoslovakia (see Czech Republic, Slovakia)
Decriminalisation of homosexuality: UK Crown Dependency of Jersey and the Australian state of Queensland
LGBT Organizations founded: BiNet USA (USA), OutRage! (UK), Queer Nation (USA), The Humsafar Trust (India)
Homosexuality no longer an illness: The World Health Organization
Other: Justin Fashanu is the first professional footballer to come out in the press.
Reform Judaism decided to allow openly lesbian and gay rabbis and cantors.
Dale McCormick became the first open lesbian elected to a state Senate (she was elected to the Maine Senate).
In 1990, the Union for Reform Judaism announced a national policy declaring lesbian and gay Jews to be full and equal members of the religious community. Its principal body, the Central Conference of American Rabbis (CCAR), officially endorsed a report of their committee on homosexuality and rabbis. They concluded that "all rabbis, regardless of sexual orientation, be accorded the opportunity to fulfill the sacred vocation that they have chosen" and that "all Jews are religiously equal regardless of their sexual orientation."
The oldest national bisexuality organization in the United States, BiNet USA, was founded in 1990. It was originally called the North American Multicultural Bisexual Network (NAMBN), and had its first meeting at the first National Bisexual Conference in America. This first conference was held in San Francisco in 1990, and sponsored by BiPOL. Over 450 people attended from 20 states and 5 countries, and the mayor of San Francisco sent a proclamation "commending the bisexual rights community for its leadership in the cause of social justice," and declaring June 23, 1990 Bisexual Pride Day.
The first Eagle Creek Saloon, that opened on the 1800 block of Market Street in San Francisco in 1990 and closed in 1993, was the first black-owned gay bar in the city.
1991
Decriminalisation of homosexuality: Bahamas, Hong Kong and Ukraine
AIDS Related: The red ribbon is first used as a symbol of the campaign against HIV/AIDS.
Anti-discrimination legislation: Canadian province Nova Scotia (sexual orientation)
Sherry Harris was elected to the City Council in Seattle, Washington, making her the first openly lesbian African-American elected official.
The first lesbian kiss on television occurred; it was on L.A. Law between the fictional characters of C.J. Lamb (played by Amanda Donohoe) and Abby (Michele Greene).
The Chicago Gay and Lesbian Hall of Fame was created in June 1991. The hall of fame is the first "municipal institution of its kind in the United States, and possibly in the world."
1992
Equalization of age of consent: Iceland, Luxembourg and Switzerland
Decriminalisation of homosexuality: Estonia and Latvia
Repeal of Sodomy laws: UK Crown Dependency of Isle of Man (homosexuality still illegal until 1994)
End to ban on gay people in the military: Australia, Canada
Recriminalisation of homosexuality: Nicaragua (until Mar 2008)
Anti-discrimination legislation: Canadian provinces New Brunswick and British Columbia (sexual orientation)
Althea Garrison was elected as the first transgender state legislator in America, and served one term in the Massachusetts House of Representatives; however, it was not publicly known she was transgender when she was elected.
The Lesbian Avengers was founded in New York City by Ana María Simo, Sarah Schulman, Maxine Wolfe, Anne-Christine d'Adesky, Marie Honan, and Anne Maguire
Tokyo International Lesbian & Gay Film Festival was held in Japan.
1993
Civil Union/Registered Partnership laws:
Passed and Came into effect: Norway (without adoption until 2009, replaced with same-sex marriage in 2008/09)
Repeal of Sodomy laws: Australian Territory of Norfolk Island
Decriminalisation of homosexuality: Belarus, UK Crown Dependency of Gibraltar, Ireland, Lithuania, Russia (with the exception of the Chechen Republic);
Anti-discrimination legislation:
US state of Minnesota (gender identity)
New Zealand parliament passes the Human Rights Amendment Act which outlaws discrimination on the grounds of sexual orientation or HIV
Canadian province Saskatchewan (sexual orientation)
End to ban on gay people in the military: New Zealand
Significant LGBT Murders: Brandon Teena
Melissa Etheridge came out as a lesbian.
The Triangle Ball was held; it was the first inaugural ball in America to ever be held in honor of gays and lesbians.
The first Dyke March (a march for lesbians and their straight female allies, planned by the Lesbian Avengers) was held, with 20,000 women marching.
Roberta Achtenberg became the first openly gay or lesbian person to be nominated by the president and confirmed by the U.S. Senate when she was appointed to the position of Assistant Secretary for Fair Housing and Equal Opportunity by President Bill Clinton.
Lea DeLaria was "the first openly gay comic to break the late-night talk-show barrier" with her 1993 appearance on The Arsenio Hall Show.
In December 1993 Lea DeLaria hosted Comedy Central's Out There, the first all-gay stand-up comedy special.
Before the "Don't Ask Don't Tell" policy was enacted in 1993, lesbians and bisexual women and gay men and bisexual men were banned from serving in the military. In 1993 the "Don't Ask Don't Tell" policy was enacted, which mandated that the military could not ask servicemembers about their sexual orientation. However, until the policy was ended in 2011 service members were still expelled from the military if they engaged in sexual conduct with a member of the same sex, stated that they were lesbian, gay, or bisexual, and/or married or attempted to marry someone of the same sex.
1994
Unregistered Cohabitation recognition:
Passed and Came into effect: Israel (without adoption, without step-adoption until 2005)
Anti-discrimination legislation: South Africa (sexual orientation, interim constitution)
Decriminalisation of homosexuality: Bermuda, UK Crown Dependency of Isle of Man and Serbia, Commonwealth of Australia
Equalization of age of consent:
Partial: UK reduces the age of consent for homosexual men to 18;
Homosexuality no longer an illness: American Medical Association
LGBT Organizations founded: National Coalition for Gay and Lesbian Equality (South Africa)
Other : Canada grants refugee status to homosexuals fearing for their well-being in their native country; Toonen v. Australia decided by UN Human Rights Committee; fear of persecution due to sexual orientation becomes grounds for asylum in the United States.
Deborah Batts became the first openly gay or lesbian federal judge; she was appointed to the U.S. District Court in New York.
The Gay Asian Pacific Alliance and Asian Pacific Sister joined the Chinese New Year Parade in San Francisco, which was the first time that queer Asian American communities had attended in a publicly ethnic activity.
Gay Parade was held in Japan. (8.1994)
Wilson Cruz became the first gay actor to play an openly gay character in a leading role in a television series (My So-Called Life).
Steve Gunderson was outed as gay on the House floor by representative Bob Dornan (R-CA) during a debate over federal funding for gay-friendly curricula, making him one of the first openly gay members of the U.S. Congress and the first openly gay U.S. Republican representative.
Liverpool-based soap opera, Brookside, broadcast the UK's first pre-watershed lesbian kiss.
The broadcast of Pedro Zamora and Sean Sasser's commitment ceremony in 1994, in which they exchanged vows, was the first such same-sex ceremony in television history, and is considered a landmark in the history of the medium.
1995
Civil Union/Registered Partnership laws:
Passed and Came into effect: Sweden (with adoption, replaced with same-sex marriage in April 2009)
Anti-discrimination legislation: Canadian province Newfoundland and Labrador (sexual orientation)
Decriminalisation of homosexuality: Albania and Moldova
AIDS Related: Triple combination therapy of drugs such as 3TC, AZT and ddC shown to be effective in treating HIV, the virus responsible for AIDS
LGBT Organizations founded: Gay Advice Darlington/Durham was founded by local gay and bisexual men, and has developed into a Charity that works with and for the Lesbian, Gay, Bisexual and Transgender (LGBT) Community of County Durham and Darlington.
Other : The Human Rights Campaign drops the word "Fund" from their title and broadens their mission to promote "an America where gay, lesbian, bisexual and transgender people are ensured equality and embraced as full members of the American family at home, at work and in every community;"
Rachel Maddow became the first openly gay or lesbian American to win an international Rhodes Scholarship.
Kings Cross Steelers, the world's first gay rugby club, was founded.
Rabbi Margaret Wenig's essay "Truly Welcoming Lesbian and Gay Jews" was published in The Jewish Condition: Essays on Contemporary Judaism Honoring Rabbi Alexander M. Schindler; it was the first published argument to the Jewish community on behalf of civil marriage for gay couples.
Ed Flanagan served as Vermont's State Auditor from 1993 through 2001, becoming the first openly gay, statewide-elected official in the United States when he came out in 1995, before his 1996 reelection.
1996
Civil Union/Registered Partnership laws:
Passed and Came into effect: Iceland (with step-adoption, without joint adoption until 2006, replaced with same-sex marriage in 2010)
Unregistered Cohabitation recognition:
Passed and Came into effect: Hungary (replaced with registered partnerships in 2009)
Restriction of LGBT partnership rights: USA, (federal, see DOMA)
Equalization of age of consent: Burkina Faso
Decriminalisation of homosexuality: Romania, Macedonia, Macau
Anti-discrimination legislation: Canada (federal, sexual orientation)
The first lesbian wedding on television occurred, held for fictional characters Carol (played by Jane Sibbett) and Susan (played by Jessica Hecht) on the TV show "Friends".
The first openly gay speaker at a Republican National Convention was Log Cabin Republicans member Steve Fong of California in 1996.
Muffin Spencer-Devlin became the first LPGA player to come out as gay.
1997
Anti-discrimination legislation: Fiji (sexual orientation, constitution) and South Africa (sexual orientation, constitution)
Equalization of age of consent: Russia
Decriminalisation of homosexuality: Ecuador, Venezuela and the Australian state of Tasmania
Other : Israeli President Ezer Weizman compares homosexuality to alcoholism in front of high school students. The UK extends immigration rights to same-sex couples akin to marriage; Ellen DeGeneres came out as a lesbian, one of the first celebrities to do so. Furthermore, later that year her character Ellen Morgan came out as a lesbian on the TV show Ellen, making Ellen DeGeneres the first openly lesbian actress to play an openly lesbian character on television. Patria Jiménez became the first openly gay person to win a position in the Mexican Congress, doing so for the Party of the Democratic Revolution. The Gay and Lesbian Medical Association launched the Journal of the Gay and Lesbian Medical Association, the world's first peer-reviewed, multi-disciplinary journal dedicated to LGBT health. The first open-mouth kiss between two women on prime time television occurred, on ABC's Relativity.
1998
Anti-discrimination legislation: Ecuador (sexual orientation, constitution), Ireland (sexual orientation) and the Canadian provinces of Prince Edward Island (sexual orientation) and Alberta (court ruling only; legislation amended in 2009)
Significant LGBT Murders: Rita Hester, Matthew Shepard
Decriminalisation of homosexuality: Bosnia and Herzegovina, Kazakhstan, Kyrgyzstan, South Africa (retroactive to 1994), Southern Cyprus and Tajikistan
Equalization of age of consent: Croatia and Latvia
End to ban on gay people in the military: Romania, South Africa
Gender identity was added to the mission of Parents and Friends of Lesbians and Gays after a vote at their annual meeting in San Francisco. Parents and Friends of Lesbians and Gays is the first national LGBT organization to officially adopt a transgender-inclusion policy for its work.
Tammy Baldwin became the first openly gay or lesbian non-incumbent ever elected to Congress, and the first open lesbian ever elected to Congress, winning Wisconsin's 2nd congressional district seat over Josephine Musser.
Dana International became the first transsexual to win the Eurovision Song Contest, representing Israel with the song "Diva".
Robert Halford comes out as being the first openly gay heavy metal musician.
The first bisexual pride flag was unveiled on 5 December 1998.
Julie Hesmondhalgh first began to play Hayley Anne Patterson, British TV's first transgender character.
BiNet USA hosted the First National Institute on Bisexuality and HIV/AIDS.
1999
Civil Union/Registered Partnership laws:
Passed and Came into effect: US State of California (without adoption, without step adoption until 2001, same-sex marriage in June 2008-November 2008)
Passed and Came into effect: France
Decriminalisation of homosexuality: Chile
Equalization of age of consent: Finland (without adoption)
LGBT Organizations founded: "Queer Youth Alliance" (UK)
Other: Israel's supreme court recognizes a lesbian partner as another legal mother of her partner's biological son; South Africa grants spousal immigration benefits to same-sex partners.
Steven Greenberg publicly came out as gay in an article in the Israeli newspaper Maariv. As he has a rabbinic ordination from the Orthodox rabbinical seminary of Yeshiva University (RIETS), he is generally described as the first openly gay Orthodox Jewish rabbi. However, some Orthodox Jews, including many rabbis, dispute his being an Orthodox rabbi.
The Transgender Day of Remembrance was founded in 1999 by Gwendolyn Ann Smith, a trans woman who is a graphic designer, columnist, and activist, to memorialize the murder of Rita Hester in Allston, Massachusetts. Since its inception, TDoR has been held annually on 20 November, and it has slowly evolved from the web-based project started by Smith into an international day of action.
In 1999, the first Celebrate Bisexuality Day was organized by Michael Page, Gigi Raven Wilbur, and Wendy Curry.
2000s
2000
Civil Union/Registered Partnership laws:
Passed and Came into effect: US State of Vermont
Anti-discrimination legislation: South Africa (discrimination, hate speech, harassment; see PEPUDA)
Revoking of discrimination legislation: UK subdivision of Scotland (Section 28)
End to ban on gay people in the military: United Kingdom. See also: Sexual orientation and military service and Stonewall
Equalization of age of consent: Belarus, Israel and United Kingdom (passed eff. 2001)
Decriminalisation of homosexuality: Azerbaijan and Georgia
Other: In Germany the Bundestag officially apologizes to gays and lesbians persecuted under the Nazi regime, and for "harm done to homosexual citizens up to 1969"; Israel recognizes same-sex relations for immigration purposes for a foreign partner of an Israeli resident.
The Transgender Pride flag was first shown, at a pride parade in Phoenix, Arizona.
Hillary Clinton became the first First Lady to march in an LGBT pride parade.
See also
Timeline of LGBT history
Timeline of LGBT history, 19th century
Timeline of LGBT history, 21st century
List of years in LGBT rights
References
Category:20th century timelines |
Q:
BNE - I type instruction - Where does 'i' come into play?
I am trying to understand assembly a little better, and I am not really sure how the i (immediate) comes into play for BNE. Please forgive the noobness.
If BNE writes like this:
BNE $1, $2, loop
which means "goto loop if $1 does not equal $2" then I am assuming that the loop is the immediate part. Correct?
Is this just a program counter or a location of the loop? So, if the loop was set at some instruction count (let's just call it 0x0001), would this loop address (or instruction count) be set in this i?
Maybe it would be better if I wrote it out like this...
opcode = 5 | reg1 = whatever addr | reg2 = whatever addr | immediate = 0x0001
Does that look right, or am I just really confused?
A:
the assembler takes the address loop (that is really what it is a name for some address somewhere) it does the work for you to compute the offset, and encodes that offset into the instruction for you. Otherwise you would have to say bne $1, $2, +28, hand computed number and then every time you modify your code between these two points you would have to re-adjust every one of these offsets.
Some assemblers or linkers actually, may go so far as to add a trampoline for you. Say for example you have some instruction set that the relative jump is only 128 instructions, and you use a label that is not defined in that object. The assembler might be so kind as to place an unconditional branch within 128 instructions to the place you really wanted to go. some might not and you end up with an error that it cannot encode the offset in the instruction you asked for.
where I am headed is that you program with labels (addresses) and let the assembler do some of the work for you. As in this case it converts the label you have to a distance from the current instruction and encodes that.
|
A new excerpt from Michael Wolff’s upcoming book "Fire and Fury" claims that President Trump made provocative comments about White House communications director Hope Hicks that sent her running out of the room.
Hicks and former campaign manager Corey Lewandowski reportedly had an on-again, off-again relationship which appeared to be a source of controversy.
“And this is what the book says ‘Hicks sat in Trump Tower with Trump and his sons, worrying about Lewandowski’s treatment in the press and wondering aloud how she might help him,’” according to an exclusive excerpt obtained by MSNBC that was revealed on-air by anchor Chris Jansing on Wednesday.
“Trump, who otherwise seemed to treat Hicks in a protective and even paternal way, looked up and said, ‘Why? You’ve already done enough for him. You’re the best piece of tail he’ll ever have’ sending Hicks running from the room,” the excerpt continued.
Jansing noted reported exchange could be a source of controversy given Trump’s prior history of making inappropriate comments in regards to women.
A few weeks before the 2016 presidential election, the Washington Post released a 2005 hot mic exchange between Trump and Access Hollywood’s Billy Bush where he joked about grabbing women without consent. |
Affirmed and Memorandum Opinion filed August 16, 2005
Affirmed and Memorandum Opinion filed August 16, 2005.
In The
Fourteenth Court of Appeals
____________
NO. 14-03-01073-CR
____________
JOSE LUIS GONZALEZ, Appellant
V.
THE STATE OF TEXAS, Appellee
On Appeal from the 180th
District Court
Harris County, Texas
Trial Court Cause No. 914,191
M E M O R A N D U M O P I N I O N
Appellant, Jose Luis Gonzalez, was
indicted for possession with intent to deliver more than 400 grams of
cocaine. Appellant entered a plea of
guilty without an agreed recommendation as to sentencing, and the trial court,
after a pre-sentence investigation hearing, assessed punishment at thirty years= confinement in
the Texas Department of Criminal Justice, Institutional Division, and a $1,000
fine. After he was sentenced by the
trial court, appellant retained new counsel and filed a motion for new trial
arguing his guilty plea was involuntary due to his trial counsel=s alleged
ineffective assistance. Appellant=s trial counsel
testified at the new trial hearing and contradicted the majority of appellant=s claims. After the hearing, the trial court denied
appellant=s motion for new trial. Appellant contends his trial counsel rendered
ineffective assistance. We affirm.
INEFFECTIVE ASSISTANCE
In two points of error, appellant argues
the trial court erred when it failed to grant a new trial based on ineffective
assistance of counsel because: (1) his guilty plea was involuntary due to trial
counsel=s incorrect legal
advice; and (2) trial counsel failed to adequately investigate the facts and
circumstances of the case.
A. Standard
of Review
In reviewing claims of ineffective
assistance of counsel, we employ the standard of review set out in Strickland
v. Washington, 466 U.S. 668, 687 (1984).
See Goodspeed v. State, No. PD-1882-03, 2005 WL 766996, at *2
(Tex. Crim. App. Apr. 6, 2005) (citing Strickland). Under Strickland, appellant must prove
(1) his trial counsel=s representation was deficient, and (2)
his trial counsel=s deficient performance was so serious
that it prejudiced his defense. 466 U.S.
at 687; Goodspeed, 2005 WL 766996, at *2. To establish both prongs, appellant must
prove by a preponderance of the evidence that counsel=s representation
fell below the objective standard of prevailing professional norms, and there
is a reasonable probability that, but for counsel=s deficiency, the
result of the proceeding would have been different. Thompson v. State, 9 S.W.3d 808, 813
(Tex. Crim. App. 1999). Appellant must
identify specific acts or omissions of counsel that constitute the alleged
ineffective assistance and affirmatively prove that they fell below the
professional norm for reasonableness. McFarland
v. State, 928 S.W.2d 482, 500 (Tex. Crim. App. 1996), overruled on other
grounds, Mosley v. State, 983 S.W.2d 249, 263 (Tex. Crim. App.
1998). If appellant fails to satisfy
either prong of the test, we need not consider the remaining prong. Strickland, 466 U.S. at 697.
When evaluating an allegation of
ineffective assistance, the appellate court looks to the totality of the
representation and the particular circumstances of each case. Thompson, 9 S.W.3d at 813. Judicial scrutiny of counsel=s performance must
be highly deferential, and we indulge a strong presumption that counsel was
effective. See Goodspeed, 2005 WL
766996, at *2; Jackson v. State,
877 S.W.2d 768, 771 (Tex. Crim. App. 1994).
We presume counsel=s actions were reasonably professional and
motivated by sound trial strategy. Strickland, 466 U.S. at 689. Appellant must overcome this presumption by
illustrating why trial counsel did what he did. Belcher v. State, 93 S.W.3d 593, 595 (Tex.
App.CHouston [14th
Dist.] 2002, pet. dism=d).
The alleged ineffectiveness must be firmly
founded in the record. Bone v. State,
77 S.W.3d 828, 835 (Tex. Crim. App. 2002).
A reviewing court should not second guess trial counsel=s strategy in
hindsight; thus, an affidavit supporting a motion for new trial can be critical
to the success of a claim for ineffective assistance. Storr v. State, 126 S.W.3d 647, 651
(Tex. App.CHouston [14th Dist.] 2004, pet. ref=d). In the absence of a record explaining trial
counsel=s actions, a
reviewing court will not conclude trial counsel=s performance fell
below an objective standard of reasonableness unless the conduct was so
outrageous that no competent attorney would have engaged in it. Garcia v. State, 57 S.W.3d 436, 440
(Tex. Crim. App. 2001).
B. Voluntariness
of Confession
In his first point of error, appellant
contends the trial court abused its discretion in failing to grant a new trial
based on his assertion he received erroneous legal advice which rendered his
guilty plea involuntary.
When a defendant challenges the voluntariness
of a plea entered upon the advice of counsel, contending his counsel was
ineffective, Athe voluntariness of the plea depends on
(1) whether counsel=s advice was within the range of
competence demanded of attorneys in criminal cases and if not, (2) whether
there is a reasonable probability that, but for counsel=s errors, he would
not have pleaded guilty and would have insisted on going to trial.@ Ex parte Moody, 991 S.W.2d 856, 857B58 (Tex. Crim.
App.1999); see Nicholas v. State, 56 S.W.3d 760, 769 (Tex.
App.CHouston [14th
Dist.] 2001, pet. ref=d).
Appellant contends his trial counsel=s advice was not
within the range of competence demanded of an attorney in a criminal case
because: (1) his attorney advised him of an incorrect burden of proof; (2) his
attorney incorrectly informed him that a videotaped statement of his
co-defendant would be admitted against him at trial; (3) his attorney failed to
advise him as to the elements of the accomplice-witness rule and how it applied
to the instant case; (4) his attorney never informed him that a jury could have
convicted him of a lesser-included offense of possession only; and (5) his
attorney should have instructed him to withdraw his guilty plea.[1]
1. Alleged
Incorrect Burden of Proof
Appellant contends his trial counsel
advised him he could not take the case to trial without any defensive evidence
because the jury would not believe appellant=s testimony.
At the new trial hearing, counsel
testified he told appellant he would need to present some affirmative evidence
that appellant lacked knowledge of the presence of the cocaine in the
automobile in order to persuade the jury appellant was not guilty. Counsel said he discussed the facts of the
case with appellant numerous times and informed him of the strength of possible
evidence the State might introduce. Counsel
testified he thought appellant=s version of
events would not be believed by a jury unless appellant had evidence besides
his own testimony tending to show appellant did not know the car contained
cocaine when he drove it.
The trial judge heard all the evidence at
the hearing on appellant=s motion for a new trial, and was able to,
in her exclusive role as the fact-finder, evaluate the credibility of the
witnesses. Reissig v. State, 929
S.W.2d 109, 113 (Tex. App.CHouston [14th
Dist.] 1996, pet. ref=d).
In denying appellant=s motion for new
trial, the trial judge implicitly found counsel did not advise appellant of an
incorrect burden of proof. Cf.
Dusenberry v. State, 915 S.W.2d 947, 950B51 (Tex. App.CHouston [1st
Dist.] 1996, pet. ref=d) (holding trial court implicitly
believed trial counsel=s testimony over the defendant=s contradictory
testimony when the trial court denied the defendant=s motion for new
trial). Moreover, appellant has not
shown a reasonable probability that, but for his confusion on the burden of
proof, he would have insisted on going to trial considering the strength of the
State=s case and his
counsel=s belief that his
version of the events was not credible absent corroborating evidence.
Appellant has failed to satisfy both
prongs under Strickland.
2. Advice
Concerning Co-Defendant=s Videotaped
Statement
Appellant claims counsel gave incorrect
legal advice that an incriminating videotaped confession by his co-defendant
would be admitted at trial. Appellant
argues Texas Rule of Evidence 801(a) prohibits the admission of a videotaped
statement at trial without the co-defendant being present because it is
hearsay. See Tex. R. Evid. 801(a); Gannaway v.
State, 823 S.W.2d 675, 678 Tex. App.CDallas 1991, pet.
ref=d) (reversing a
murder conviction because the trial court allowed the prosecution to read an
out-of-court statement by a witness who was not fully subjected to
cross-examination).
The Supreme Court recently set a out a new
test for challenges to out-of-court statements based on the Confrontation
Clause. See Crawford v. Washington,
541 U.S. 36 (2004). The Crawford Court
noted that the Confrontation Clause Adoes not bar
admission of a statement so long as the declarant is present at trial to defend
or explain it.@ Id.
at 59 n.9. Thus, there is no violation
of the Confrontation Clause under Crawford when a witness actually
testifies at trial. Carter v. State,
150 S.W.3d 230, 231 n.13 (Tex. App.CTexarkana 2004, no
pet.); Crawford v. State, 139 S.W.3d 462, 464 (Tex. App.CDallas 2004, pet.
ref=d).
The testimony at the new trial hearing
shows appellant=s co-defendant was expected to testify
against him in court. Specifically,
appellant=s co-defendant already had pled guilty to
his charge and both the district attorney and the co-defendant=s attorney told
counsel the co-defendant would testify against appellant at trial. Counsel believed the co-defendant would
provide damaging testimony at trial and his videotaped confession would Aprobably be
presented.@
Because the record indicates the co-defendant was going to testify at
trial, admission of the videotape confession would not have violated the
Confrontation Clause. We cannot say
counsel=s belief that the
videotaped statement would probably be presented lacked any plausible
basis.
Even if counsel had been wrong about the
videotaped confession of the co-defendant, he was absolutely correct as to the
State=s ability to use
the co-defendant as a witness because the State could have subpoenaed appellant=s co-defendant and
compelled him to testify without violating the co-defendant=s constitutional
right against self-incrimination since the co-defendant already had pled guilty
to his charge. See Franco v. Smith,
491 S.W.2d 890, 890B91 (Tex. Crim. App. 1973); Bratton v.
State, 156 S.W.3d 689, 693B94 (Tex. App.CDallas 2005, no
pet.).
Appellant has failed to satisfy both
prongs under Strickland.
3. Failure
to Instruct Appellant on the Accomplice-Witness Rule
Appellant next contends counsel=s failure to
instruct him on the accomplice-witness rule and its ramifications prevented him
from making a reasoned decision about whether to plead guilty. It is clear from the record on the motion for
new trial hearing that counsel did not instruct appellant about the
accomplice-witness rule and was unable to define the rule on the stand.
Article 38.14 of the Code of Criminal
Procedure provides: AA conviction
cannot be had upon the testimony of an accomplice unless corroborated by other
evidence tending to connect the defendant with the offense committed; and the
corroboration is not sufficient if it merely shows the
commission of the offense.@ See Tex.
Code Crim. Proc. Ann. art. 38.14 (Vernon 1979). To corroborate accomplice-witness testimony, A[a]ll the law
requires is that there be some non-accomplice
evidence which tends to connect the accused to the commission of the
offense. While individually these
circumstances might not be sufficient to corroborate the accomplice testimony,
taken together, rational jurors could conclude that this evidence sufficiently tended
to connect appellant to the offense.@ Hernandez v. State, 939 S.W.2d 173,
178B79 (Tex. Crim.
App. 1997); see also Munoz v. State, 853 S.W.2d 558, 559 (Tex. Crim.
App. 1993) (stating that even apparently insignificant incriminating
circumstances may sometimes afford satisfactory evidence of
corroboration). If the combined weight
of the non-accomplice evidence tends to connect the defendant to the offense,
the requirements of Article 38.14 has been fulfilled. Gosch v. State, 829 S.W.2d 775, 777 (Tex.
Crim. App. 1991).
The record from appellant=s pre-sentence
investigation and new trial hearings establish that before appellant was
apprehended, the police had stopped a man driving a blue Volkswagen. Inside the car, police found 22 kilograms of
cocaine in a hidden compartment. The
driver of the car told police he was delivering the car to unidentified men,
appellant and the co-defendant, at a restaurant in Houston. The police removed all of the cocaine
except one kilogram and convinced the
driver to cooperate and continue with the delivery. The driver then met with appellant and the
co-defendant at a restaurant, and after the meeting, appellant got into the car
containing the cocaine and drove out of the parking lot. Appellant then drove the car to a house in a
residential neighborhood and pulled it directly into the garage. Another man immediately shut the garage door,
and two men removed the car=s dashboard and
removed the cocaine from the car.
Appellant testified he had learned of the cocaine only after he saw the
men remove it from the car and after he touched it. Shortly thereafter, officers, who had
followed appellant from the restaurant, looked through a garage window and saw
the cocaine lying on a trash can lid beside the car. When the officers entered the house, they
found appellant hiding in a bathroom, where he had changed shirts.
Based on the facts in the record linking
appellant to the cocaine, such as his pulling the car directly into the garage,
touching the cocaine, and avoiding the police, we cannot say counsel=s failure to
inform appellant about the accomplice-witness rule fell below the standard of
competence of an attorney in a criminal case because the combined weight of the
non-accomplice evidence tends to connect appellant to the offense. Here, because there was sufficient
corroborating evidence tending to connect appellant to the charged offense, the
accomplice witness rule would not have presented a bar to finding appellant
guilty. Appellant has failed to
demonstrate how counsel=s failure to instruct him as to the rule
prevented him from making a reasoned decision about whether to plead guilty.
Appellant has failed to satisfy both
prongs under Strickland.
4. Alleged
Failure to Instruct Appellant that a Jury Could Convict Him of a
Lesser-Included Offense
Appellant argues counsel was ineffective
in failing to explain to him that a jury could convict him of a lesser-included
offense. Appellant concedes counsel
discussed the possibility of a lesser-included offense with him, but appellant
thought he could only be convicted of a lesser-included offense if the
prosecution agreed. In support of this
argument, appellant relies on counsel=s testimony at the
new trial hearing that he told appellant if appellant went to trial under the current
charge, the minimum punishment a jury could assess was 15 years in prison.[2]
At the hearing on the motion for new
trial, counsel testified he knew appellant would be legally entitled to a
lesser-included offense instruction if the issue were raised during trial. Counsel testified that he tried to explain
this to appellant.
The trial judge heard both counsel=s and appellant=s testimony, and
was able to, in her exclusive role as the fact-finder, evaluate the credibility
of the witnesses. See Reissig,
929 S.W.2d at 113. In denying appellant=s motion for new
trial, the trial judge implicitly found that counsel did not fail to adequately
instruct appellant that a jury could have convicted him of a lesser-included
offense without the prosecution=s approval. Cf. Dusenberry, 915 S.W.2d at 951.
Appellant has failed to satisfy the first
prong under Strickland.
5. Failure to
Instruct Appellant to Withdraw his Guilty Plea
Appellant=s final contention
is that counsel failed to instruct him to withdraw his guilty plea. At appellant=s sentencing
hearing, appellant told the court he did not know drugs were in the car he was
driving until after he parked the car in the garage and saw another man remove
the drugs from the car. Appellant
testified at the new trial hearing that he pled guilty because he drove the car
and he thought his lawyer would get him probation.[3]
Once a court takes a case under
advisement, the defendant=s absolute right to withdraw his plea
expires. Jackson v. State, 590
S.W.2d 514, 515 (Tex. Crim. App. 1979); Stone v. State, 951 S.W.2d 205,
207 (Tex. App.CHouston [14th Dist.] 1997, no pet.). Passage of a case for pre-sentence
investigation constitutes Ataking the case
under advisement.@ Stone,
951 S.W.2d at 207; Thompson v. State, 852 S.W.2d 268, 270 (Tex. App.CDallas 1993, no
writ). After judgment has been
pronounced, the decision to allow a defendant to withdraw his guilty plea is
within the sound discretion of the court.
Jackson, 590 S.W.2d at 515.
In the instant case, appellant pled guilty, and the judge, finding
sufficient evidence to substantiate appellant=s guilt, reset the
case for a punishment hearing. Appellant
contends his testimony at the punishment hearing, after judgment was
pronounced, was sufficient to require counsel to instruct him to withdraw his
guilty plea.
The record shows counsel informed
appellant of all his options, and appellant chose to plead guilty in an attempt
to receive deferred adjudication.
Counsel believed appellant=s best chance to
achieve this objective was to plead guilty.
A plea of guilty is a matter of trial strategy, and a plea is not
rendered involuntary because the resulting sentence is greater than expected. Enard v. State, 764 S.W.2d 574, 575
(Tex. App.CHouston [14th Dist.] 1989, no pet.). We presume counsel=s actions were
reasonably professional and motivated by sound trial strategy. See Strickland v. Washington, 466
U.S. 668, 689 (1984) (stating that a fair assessment of attorney performance
requires every effort to eliminate the distorting effects of hindsight and to
evaluate the conduct from counsel=s perspective at
the time of trial). Appellant has failed
to show he would have withdrawn his guilty plea had counsel instructed him to
do so. Furthermore, the record supports
appellant=s conviction[4]
and appellant is unable to prove the trial court would have permitted him to
withdraw his guilty plea had it been requested since the decision was within the
trial court=s discretion.
Appellant has failed to satisfy both
prongs under Strickland.
After reviewing the record and considering
all of appellant=s claims of ineffective assistance, we
conclude appellant has not met his burden under Strickland. Appellant=s assertions that
trial counsel gave incorrect legal advice were contradicted by his trial
counsel at the new trial hearing. Appellant
has failed to demonstrate trial counsel rendered ineffective assistance making
his guilty plea involuntary. We hold the
trial court did not abuse its discretion in denying appellant=s motion for new
trial.
We overrule appellant=s first point of
error.
C. Alleged
Failure to Adequately Investigate
In his second point of error, appellant
claims he was denied effective assistance of counsel because counsel failed to
adequately investigate the facts and circumstances surrounding his reason for
driving the automobile which contained the cocaine. Specifically, appellant claims: (1) counsel
never obtained appellant=s wallet containing auction permits and
business cards which would have shown he was in the business of buying and
selling cars; and (2) counsel never called Bingo Auto Sales to verify appellant=s story that he
was hired to replace a flood-damaged computer in the vehicle and drive it from
Laredo to Houston. Appellant contends
counsel=s failure to make
any kind of investigation into his story clearly caused him prejudice.
ACounsel has a duty
to make reasonable investigations or to make a reasonable decision that makes
particular investigations unnecessary.@ Strickland, 466 U.S. at 691. A decision not to investigate Amust be directly
assessed for reasonableness in all the circumstances, applying a heavy measure
of deference to counsel=s judgments.@ Id.
In any event, we will not reverse a conviction unless the consequence of
the failure to investigate is that the
only viable defense available to the accused is not advanced and but for
counsel=s failure to
advance the defense, the result of the proceeding would have been
different. McFarland v. State,
928 S.W.2d 482, 501 (Tex. Crim. App. 1996) (citing Strickland, 466 U.S.
at 694).
Counsel testified he asked appellant and
his family to see the license that allowed appellant to attend auto
auctions. However, counsel was never
shown the license. According to counsel,
appellant said his wallet contained business cards. Counsel told appellant the business cards might
be beneficial but admits he never picked up the wallet. Counsel testified he did call Bingo Auto
Sales to find out who owned the dealership, but he did not ask about the car
appellant was hired to drive.
Without determining whether counsel was
deficient, we hold that appellant has failed to satisfy the prejudice prong of Strickland. The record in this case contains no evidence
of what information Bingo Auto Sales would have provided and the record is
devoid of any proof that appellant actually had an auction permit or business
cards that a reasonable investigation would have uncovered. Moreover, there is no showing here such
evidence, even if discovered, would have benefitted appellant. See Melancon v. State, 66 S.W.3d 375,
380B81 (Tex. App.CHouston [14th
Dist.] 2001, pet. ref=d) (holding record containing no evidence
reflecting what facts or testimony would have been provided had counsel been
effective fails to show any harm).
Appellant has failed to satisfy the second prong under the Strickland
test to demonstrate prejudice.
Accordingly, appellant=s second point of
error is overruled.
CONCLUSION
We affirm the judgment of the trial court.
/s/ John S. Anderson
Justice
Judgment
rendered and Memorandum Opinion filed August 16, 2005.
Panel
consists of Justices Anderson, Hudson, and Frost.
Do
Not Publish C Tex.
R. App. P. 47.2(b).
[1] On appeal,
appellant=s only argument concerning the Strickland prejudice
prong is that Ait is very likely@ he
would have insisted on pleading not guilty had his trial counsel discussed all
of these issues.
[2] If appellant
had been convicted by a jury as charged, the minimum punishment would be
15 years confinement and a fine not to exceed $250,000. Tex.
Health & Safety Code Ann. '
481.112(a), (f) (Vernon 2003).
[3] Counsel
testified he told appellant he could possibly get deferred adjudication from
the judge if he pled guilty to the charge.
We note that because appellant pled guilty, the trial judge could have
deferred adjudication
of appellant's guilt and placed appellant on community
supervision. See Tex. Code Crim. Proc. Ann. art. 42.12 ' 5(a) (Vernon Supp. 2004); Cabezas
v. State, 848 S.W.2d 693, 695 (Tex. Crim. App. 1993). Thus, counsel=s advice that probation was a
possibility was not incorrect.
[4] When appellant
enetered his guilty plea, he stipulated that the allegations in the indictment
were true. This judicial confession is
sufficient to establish appellant=s
guilt. Watson v. State, 974
S.W.2d 763, 764 (Tex. App.CSan Antonio 1998, pet. ref=d).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.