text
stringlengths 1
2.15M
| meta
dict |
|---|---|
Q:
Business user templating language for Java
I'm looking for a secure templating language for Java that business users can use.
When I say secure I mean you can't enter in something that will take down the server or hog a thread.
Ideally I would like looping and conditions but for looping I don't want them enter an infinite loop or something like 1 to 3 billion counter.
Know of any libraries (I'm hoping to avoid having modify any of templating evaluators like Velocity)
A:
I ended up picking Mustache. I chose the Java implementation mainly because Scalate seems to have many, many dependencies.
|
{
"pile_set_name": "StackExchange"
}
|
Suppliers At This Location
Opening Hours
Mon:
07:30 to 18:00
Tue:
07:30 to 18:00
Wed:
07:30 to 18:00
Thu:
07:30 to 18:00
Fri:
07:30 to 18:00
Sat:
09:00 to 12:00
Sun:
Closed to
Notes
The details for Mccollum Airport (RYY) car rental location in Georgia shown here are up to date at the time of writing. You are advised to check with the car hire companies in case the details have changed subsequently.
|
{
"pile_set_name": "Pile-CC"
}
|
We've heard rumors of a phablet in the works from Nokia for a while now. Back in May we even saw a (blurry) glimpse of what appeared to be a large-screened Nokia device, expected to see the light of day as the Lumia 1030.
This latest leak which supposedly comes from a factory floor in China brings the phablet one step closer to reality. It measures 6-inches in diagonal and is supposedly already being mass-produced by Nokia.
As you can tell from the image, it has a very thin bezel and looks to also feature a slot for a front-facing camera. Unfortunately there's nothing else that we can make out from it and the source didn't provide any additional specs either.
It's possible Nokia may be readying this device for the anticipated Windows Phone GDR3 update. The new release is set to start seeding by the end of the year and will add support for 1080p resolution to the Windows Phone 8 platform as well as an additional column of tiles - perfect for larger, phablet-esque displays.
Source | Via
|
{
"pile_set_name": "OpenWebText2"
}
|
/**CFile****************************************************************
FileName [sclSize.c]
SystemName [ABC: Logic synthesis and verification system.]
PackageName [Standard-cell library representation.]
Synopsis [Core timing analysis used in gate-sizing.]
Author [Alan Mishchenko, Niklas Een]
Affiliation [UC Berkeley]
Date [Ver. 1.0. Started - August 24, 2012.]
Revision [$Id: sclSize.c,v 1.0 2012/08/24 00:00:00 alanmi Exp $]
***********************************************************************/
#include "sclSize.h"
#include "map/mio/mio.h"
#include "misc/vec/vecWec.h"
#include "base/main/main.h"
#ifdef WIN32
#include <windows.h>
#endif
ABC_NAMESPACE_IMPL_START
////////////////////////////////////////////////////////////////////////
/// DECLARATIONS ///
////////////////////////////////////////////////////////////////////////
////////////////////////////////////////////////////////////////////////
/// FUNCTION DEFINITIONS ///
////////////////////////////////////////////////////////////////////////
/**Function*************************************************************
Synopsis [Finding most critical objects.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
Abc_Obj_t * Abc_SclFindCriticalCo( SC_Man * p, int * pfRise )
{
Abc_Obj_t * pObj, * pPivot = NULL;
float fMaxArr = 0;
int i;
assert( Abc_NtkPoNum(p->pNtk) > 0 );
Abc_NtkForEachCo( p->pNtk, pObj, i )
{
SC_Pair * pArr = Abc_SclObjTime( p, pObj );
if ( fMaxArr < pArr->rise ) fMaxArr = pArr->rise, *pfRise = 1, pPivot = pObj;
if ( fMaxArr < pArr->fall ) fMaxArr = pArr->fall, *pfRise = 0, pPivot = pObj;
}
if ( fMaxArr == 0 )
pPivot = Abc_NtkPo(p->pNtk, 0);
assert( pPivot != NULL );
return pPivot;
}
// assumes that slacks are not available (uses arrival times)
Abc_Obj_t * Abc_SclFindMostCriticalFanin2( SC_Man * p, int * pfRise, Abc_Obj_t * pNode )
{
Abc_Obj_t * pFanin, * pPivot = NULL;
float fMaxArr = 0;
int i;
Abc_ObjForEachFanin( pNode, pFanin, i )
{
SC_Pair * pArr = Abc_SclObjTime( p, pFanin );
if ( fMaxArr < pArr->rise ) fMaxArr = pArr->rise, *pfRise = 1, pPivot = pFanin;
if ( fMaxArr < pArr->fall ) fMaxArr = pArr->fall, *pfRise = 0, pPivot = pFanin;
}
return pPivot;
}
// assumes that slack are available
Abc_Obj_t * Abc_SclFindMostCriticalFanin( SC_Man * p, int * pfRise, Abc_Obj_t * pNode )
{
Abc_Obj_t * pFanin, * pPivot = NULL;
float fMinSlack = ABC_INFINITY;
SC_Pair * pArr;
int i;
*pfRise = 0;
// find min-slack node
Abc_ObjForEachFanin( pNode, pFanin, i )
if ( fMinSlack > Abc_SclObjGetSlack( p, pFanin, p->MaxDelay0 ) )
{
fMinSlack = Abc_SclObjGetSlack( p, pFanin, p->MaxDelay0 );
pPivot = pFanin;
}
if ( pPivot == NULL )
return NULL;
// find its leading phase
pArr = Abc_SclObjTime( p, pPivot );
*pfRise = (pArr->rise >= pArr->fall);
return pPivot;
}
/**Function*************************************************************
Synopsis [Printing timing information for the node/network.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
static inline void Abc_SclTimeNodePrint( SC_Man * p, Abc_Obj_t * pObj, int fRise, int Length, float maxDelay )
{
SC_Cell * pCell = Abc_ObjIsNode(pObj) ? Abc_SclObjCell(pObj) : NULL;
printf( "%8d : ", Abc_ObjId(pObj) );
printf( "%d ", Abc_ObjFaninNum(pObj) );
printf( "%4d ", Abc_ObjFanoutNum(pObj) );
printf( "%-*s ", Length, pCell ? pCell->pName : "pi" );
printf( "A =%7.2f ", pCell ? pCell->area : 0.0 );
printf( "D%s =", fRise ? "r" : "f" );
printf( "%6.1f", Abc_SclObjTimeMax(p, pObj) );
printf( "%7.1f ps ", -Abc_AbsFloat(Abc_SclObjTimeOne(p, pObj, 0) - Abc_SclObjTimeOne(p, pObj, 1)) );
printf( "S =%6.1f ps ", Abc_SclObjSlewMax(p, pObj) );
printf( "Cin =%5.1f ff ", pCell ? SC_CellPinCapAve(pCell) : 0.0 );
printf( "Cout =%6.1f ff ", Abc_SclObjLoadMax(p, pObj) );
printf( "Cmax =%6.1f ff ", pCell ? SC_CellPin(pCell, pCell->n_inputs)->max_out_cap : 0.0 );
printf( "G =%5d ", pCell ? (int)(100.0 * Abc_SclObjLoadAve(p, pObj) / SC_CellPinCapAve(pCell)) : 0 );
// printf( "SL =%6.1f ps", Abc_SclObjSlackMax(p, pObj, p->MaxDelay0) );
printf( "\n" );
}
void Abc_SclTimeNtkPrint( SC_Man * p, int fShowAll, int fPrintPath )
{
int fReversePath = 1;
int i, nLength = 0, fRise = 0;
Abc_Obj_t * pObj, * pPivot = Abc_SclFindCriticalCo( p, &fRise );
float maxDelay = Abc_SclObjTimeOne( p, pPivot, fRise );
p->ReportDelay = maxDelay;
#ifdef WIN32
printf( "WireLoad = \"%s\" ", p->pWLoadUsed ? p->pWLoadUsed->pName : "none" );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 14 ); // yellow
printf( "Gates =%7d ", Abc_NtkNodeNum(p->pNtk) );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 7 ); // normal
printf( "(%5.1f %%) ", 100.0 * Abc_SclGetBufInvCount(p->pNtk) / Abc_NtkNodeNum(p->pNtk) );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 10 ); // green
printf( "Cap =%5.1f ff ", p->EstLoadAve );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 7 ); // normal
printf( "(%5.1f %%) ", Abc_SclGetAverageSize(p->pNtk) );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 11 ); // blue
printf( "Area =%12.2f ", Abc_SclGetTotalArea(p->pNtk) );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 7 ); // normal
printf( "(%5.1f %%) ", 100.0 * Abc_SclCountMinSize(p->pLib, p->pNtk, 0) / Abc_NtkNodeNum(p->pNtk) );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 13 ); // magenta
printf( "Delay =%9.2f ps ", maxDelay );
SetConsoleTextAttribute( GetStdHandle(STD_OUTPUT_HANDLE), 7 ); // normal
printf( "(%5.1f %%) ", 100.0 * Abc_SclCountNearCriticalNodes(p) / Abc_NtkNodeNum(p->pNtk) );
printf( " \n" );
#else
Abc_Print( 1, "WireLoad = \"%s\" ", p->pWLoadUsed ? p->pWLoadUsed->pName : "none" );
Abc_Print( 1, "%sGates =%7d%s ", "\033[1;33m", Abc_NtkNodeNum(p->pNtk), "\033[0m" ); // yellow
Abc_Print( 1, "(%5.1f %%) ", 100.0 * Abc_SclGetBufInvCount(p->pNtk) / Abc_NtkNodeNum(p->pNtk) );
Abc_Print( 1, "%sCap =%5.1f ff%s ", "\033[1;32m", p->EstLoadAve, "\033[0m" ); // green
Abc_Print( 1, "(%5.1f %%) ", Abc_SclGetAverageSize(p->pNtk) );
Abc_Print( 1, "%sArea =%12.2f%s ", "\033[1;36m", Abc_SclGetTotalArea(p->pNtk), "\033[0m" ); // blue
Abc_Print( 1, "(%5.1f %%) ", 100.0 * Abc_SclCountMinSize(p->pLib, p->pNtk, 0) / Abc_NtkNodeNum(p->pNtk) );
Abc_Print( 1, "%sDelay =%9.2f ps%s ", "\033[1;35m", maxDelay, "\033[0m" ); // magenta
Abc_Print( 1, "(%5.1f %%) ", 100.0 * Abc_SclCountNearCriticalNodes(p) / Abc_NtkNodeNum(p->pNtk) );
Abc_Print( 1, " \n" );
#endif
if ( fShowAll )
{
// printf( "Timing information for all nodes: \n" );
// find the longest cell name
Abc_NtkForEachNodeReverse( p->pNtk, pObj, i )
if ( Abc_ObjFaninNum(pObj) > 0 )
nLength = Abc_MaxInt( nLength, strlen(Abc_SclObjCell(pObj)->pName) );
// print timing
Abc_NtkForEachNodeReverse( p->pNtk, pObj, i )
if ( Abc_ObjFaninNum(pObj) > 0 )
Abc_SclTimeNodePrint( p, pObj, -1, nLength, maxDelay );
}
if ( fPrintPath )
{
Abc_Obj_t * pTemp, * pPrev = NULL;
int iStart = -1, iEnd = -1;
Vec_Ptr_t * vPath;
// printf( "Critical path: \n" );
// find the longest cell name
pObj = Abc_ObjFanin0(pPivot);
i = 0;
while ( pObj && Abc_ObjIsNode(pObj) )
{
i++;
nLength = Abc_MaxInt( nLength, strlen(Abc_SclObjCell(pObj)->pName) );
pObj = Abc_SclFindMostCriticalFanin( p, &fRise, pObj );
}
// print timing
if ( !fReversePath )
{
// print timing
pObj = Abc_ObjFanin0(pPivot);
while ( pObj )//&& Abc_ObjIsNode(pObj) )
{
printf( "Path%3d --", i-- );
Abc_SclTimeNodePrint( p, pObj, fRise, nLength, maxDelay );
pPrev = pObj;
pObj = Abc_SclFindMostCriticalFanin( p, &fRise, pObj );
}
}
else
{
// collect path nodes
vPath = Vec_PtrAlloc( 100 );
Vec_PtrPush( vPath, pPivot );
pObj = Abc_ObjFanin0(pPivot);
while ( pObj )//&& Abc_ObjIsNode(pObj) )
{
Vec_PtrPush( vPath, pObj );
pPrev = pObj;
pObj = Abc_SclFindMostCriticalFanin( p, &fRise, pObj );
}
Vec_PtrForEachEntryReverse( Abc_Obj_t *, vPath, pObj, i )
{
printf( "Path%3d --", Vec_PtrSize(vPath)-1-i );
Abc_SclTimeNodePrint( p, pObj, fRise, nLength, maxDelay );
if ( i == 1 )
break;
}
Vec_PtrFree( vPath );
}
// print start-point and end-point
Abc_NtkForEachPi( p->pNtk, pTemp, iStart )
if ( pTemp == pPrev )
break;
Abc_NtkForEachPo( p->pNtk, pTemp, iEnd )
if ( pTemp == pPivot )
break;
printf( "Start-point = pi%0*d. End-point = po%0*d.\n",
Abc_Base10Log( Abc_NtkPiNum(p->pNtk) ), iStart,
Abc_Base10Log( Abc_NtkPoNum(p->pNtk) ), iEnd );
}
}
/**Function*************************************************************
Synopsis [Timing computation for pin/gate/cone/network.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
static inline void Abc_SclTimeFanin( SC_Man * p, SC_Timing * pTime, Abc_Obj_t * pObj, Abc_Obj_t * pFanin )
{
SC_Pair * pArrIn = Abc_SclObjTime( p, pFanin );
SC_Pair * pSlewIn = Abc_SclObjSlew( p, pFanin );
SC_Pair * pLoad = Abc_SclObjLoad( p, pObj );
SC_Pair * pArrOut = Abc_SclObjTime( p, pObj ); // modified
SC_Pair * pSlewOut = Abc_SclObjSlew( p, pObj ); // modified
Scl_LibPinArrival( pTime, pArrIn, pSlewIn, pLoad, pArrOut, pSlewOut );
}
static inline void Abc_SclDeptFanin( SC_Man * p, SC_Timing * pTime, Abc_Obj_t * pObj, Abc_Obj_t * pFanin )
{
SC_Pair * pDepIn = Abc_SclObjDept( p, pFanin ); // modified
SC_Pair * pSlewIn = Abc_SclObjSlew( p, pFanin );
SC_Pair * pLoad = Abc_SclObjLoad( p, pObj );
SC_Pair * pDepOut = Abc_SclObjDept( p, pObj );
Scl_LibPinDeparture( pTime, pDepIn, pSlewIn, pLoad, pDepOut );
}
static inline void Abc_SclDeptObj( SC_Man * p, Abc_Obj_t * pObj )
{
SC_Timing * pTime;
Abc_Obj_t * pFanout;
int i;
SC_PairClean( Abc_SclObjDept(p, pObj) );
Abc_ObjForEachFanout( pObj, pFanout, i )
{
if ( Abc_ObjIsCo(pFanout) || Abc_ObjIsLatch(pFanout) )
continue;
pTime = Scl_CellPinTime( Abc_SclObjCell(pFanout), Abc_NodeFindFanin(pFanout, pObj) );
Abc_SclDeptFanin( p, pTime, pFanout, pObj );
}
}
static inline float Abc_SclObjLoadValue( SC_Man * p, Abc_Obj_t * pObj )
{
// float Value = Abc_MaxFloat(pLoad->fall, pLoad->rise) / (p->EstLoadAve * p->EstLoadMax);
return (0.5 * Abc_SclObjLoad(p, pObj)->fall + 0.5 * Abc_SclObjLoad(p, pObj)->rise) / (p->EstLoadAve * p->EstLoadMax);
}
static inline void Abc_SclTimeCi( SC_Man * p, Abc_Obj_t * pObj )
{
if ( p->pPiDrive != NULL )
{
SC_Pair * pLoad = Abc_SclObjLoad( p, pObj );
SC_Pair * pTime = Abc_SclObjTime( p, pObj );
SC_Pair * pSlew = Abc_SclObjSlew( p, pObj );
Scl_LibHandleInputDriver( p->pPiDrive, pLoad, pTime, pSlew );
}
}
void Abc_SclTimeNode( SC_Man * p, Abc_Obj_t * pObj, int fDept )
{
SC_Timing * pTime;
SC_Cell * pCell;
int k;
SC_Pair * pLoad = Abc_SclObjLoad( p, pObj );
float LoadRise = pLoad->rise;
float LoadFall = pLoad->fall;
float DeptRise = 0;
float DeptFall = 0;
float Value = p->EstLoadMax ? Abc_SclObjLoadValue( p, pObj ) : 0;
Abc_Obj_t * pFanin;
if ( Abc_ObjIsCi(pObj) )
{
assert( !fDept );
Abc_SclTimeCi( p, pObj );
return;
}
if ( Abc_ObjIsCo(pObj) )
{
if ( !fDept )
{
Abc_SclObjDupFanin( p, pObj );
Vec_FltWriteEntry( p->vTimesOut, pObj->iData, Abc_SclObjTimeMax(p, pObj) );
Vec_QueUpdate( p->vQue, pObj->iData );
}
return;
}
assert( Abc_ObjIsNode(pObj) );
// if ( !(Abc_ObjFaninNum(pObj) == 1 && Abc_ObjIsPi(Abc_ObjFanin0(pObj))) && p->EstLoadMax && Value > 1 )
if ( p->EstLoadMax && Value > 1 )
{
pLoad->rise = p->EstLoadAve * p->EstLoadMax;
pLoad->fall = p->EstLoadAve * p->EstLoadMax;
if ( fDept )
{
SC_Pair * pDepOut = Abc_SclObjDept( p, pObj );
float EstDelta = p->EstLinear * log( Value );
DeptRise = pDepOut->rise;
DeptFall = pDepOut->fall;
pDepOut->rise += EstDelta;
pDepOut->fall += EstDelta;
}
p->nEstNodes++;
}
// get the library cell
pCell = Abc_SclObjCell( pObj );
// compute for each fanin
Abc_ObjForEachFanin( pObj, pFanin, k )
{
pTime = Scl_CellPinTime( pCell, k );
if ( fDept )
Abc_SclDeptFanin( p, pTime, pObj, pFanin );
else
Abc_SclTimeFanin( p, pTime, pObj, pFanin );
}
if ( p->EstLoadMax && Value > 1 )
{
pLoad->rise = LoadRise;
pLoad->fall = LoadFall;
if ( fDept )
{
SC_Pair * pDepOut = Abc_SclObjDept( p, pObj );
pDepOut->rise = DeptRise;
pDepOut->fall = DeptFall;
}
else
{
SC_Pair * pArrOut = Abc_SclObjTime( p, pObj );
float EstDelta = p->EstLinear * log( Value );
pArrOut->rise += EstDelta;
pArrOut->fall += EstDelta;
}
}
}
void Abc_SclTimeCone( SC_Man * p, Vec_Int_t * vCone )
{
int fVerbose = 0;
Abc_Obj_t * pObj;
int i;
Abc_SclConeClean( p, vCone );
Abc_NtkForEachObjVec( vCone, p->pNtk, pObj, i )
{
if ( fVerbose && Abc_ObjIsNode(pObj) )
printf( " Updating node %d with gate %s\n", Abc_ObjId(pObj), Abc_SclObjCell(pObj)->pName );
if ( fVerbose && Abc_ObjIsNode(pObj) )
printf( " before (%6.1f ps %6.1f ps) ", Abc_SclObjTimeOne(p, pObj, 1), Abc_SclObjTimeOne(p, pObj, 0) );
Abc_SclTimeNode( p, pObj, 0 );
if ( fVerbose && Abc_ObjIsNode(pObj) )
printf( "after (%6.1f ps %6.1f ps)\n", Abc_SclObjTimeOne(p, pObj, 1), Abc_SclObjTimeOne(p, pObj, 0) );
}
}
void Abc_SclTimeNtkRecompute( SC_Man * p, float * pArea, float * pDelay, int fReverse, float DUser )
{
Abc_Obj_t * pObj;
float D;
int i;
Abc_SclComputeLoad( p );
Abc_SclManCleanTime( p );
p->nEstNodes = 0;
Abc_NtkForEachCi( p->pNtk, pObj, i )
Abc_SclTimeNode( p, pObj, 0 );
Abc_NtkForEachNode1( p->pNtk, pObj, i )
Abc_SclTimeNode( p, pObj, 0 );
Abc_NtkForEachCo( p->pNtk, pObj, i )
Abc_SclTimeNode( p, pObj, 0 );
D = Abc_SclReadMaxDelay( p );
if ( fReverse && DUser > 0 && D < DUser )
D = DUser;
if ( pArea )
*pArea = Abc_SclGetTotalArea(p->pNtk);
if ( pDelay )
*pDelay = D;
if ( fReverse )
{
p->nEstNodes = 0;
Abc_NtkForEachNodeReverse1( p->pNtk, pObj, i )
Abc_SclTimeNode( p, pObj, 1 );
}
}
/**Function*************************************************************
Synopsis [Incremental timing update.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
static inline void Abc_SclTimeIncUpdateClean( SC_Man * p )
{
Vec_Int_t * vLevel;
Abc_Obj_t * pObj;
int i, k;
Vec_WecForEachLevel( p->vLevels, vLevel, i )
{
Abc_NtkForEachObjVec( vLevel, p->pNtk, pObj, k )
{
assert( pObj->fMarkC == 1 );
pObj->fMarkC = 0;
}
Vec_IntClear( vLevel );
}
}
static inline void Abc_SclTimeIncAddNode( SC_Man * p, Abc_Obj_t * pObj )
{
assert( !Abc_ObjIsLatch(pObj) );
assert( pObj->fMarkC == 0 );
pObj->fMarkC = 1;
Vec_IntPush( Vec_WecEntry(p->vLevels, Abc_ObjLevel(pObj)), Abc_ObjId(pObj) );
p->nIncUpdates++;
}
static inline void Abc_SclTimeIncAddFanins( SC_Man * p, Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanin;
int i;
Abc_ObjForEachFanin( pObj, pFanin, i )
// if ( !pFanin->fMarkC && Abc_ObjIsNode(pFanin) )
if ( !pFanin->fMarkC && !Abc_ObjIsLatch(pFanin) )
Abc_SclTimeIncAddNode( p, pFanin );
}
static inline void Abc_SclTimeIncAddFanouts( SC_Man * p, Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
int i;
Abc_ObjForEachFanout( pObj, pFanout, i )
if ( !pFanout->fMarkC && !Abc_ObjIsLatch(pFanout) )
Abc_SclTimeIncAddNode( p, pFanout );
}
static inline void Abc_SclTimeIncUpdateArrival( SC_Man * p )
{
Vec_Int_t * vLevel;
SC_Pair ArrOut, SlewOut;
SC_Pair * pArrOut, *pSlewOut;
Abc_Obj_t * pObj;
float E = (float)0.1;
int i, k;
Vec_WecForEachLevel( p->vLevels, vLevel, i )
{
Abc_NtkForEachObjVec( vLevel, p->pNtk, pObj, k )
{
if ( Abc_ObjIsCo(pObj) )
{
Abc_SclObjDupFanin( p, pObj );
Vec_FltWriteEntry( p->vTimesOut, pObj->iData, Abc_SclObjTimeMax(p, pObj) );
Vec_QueUpdate( p->vQue, pObj->iData );
continue;
}
pArrOut = Abc_SclObjTime( p, pObj );
pSlewOut = Abc_SclObjSlew( p, pObj );
SC_PairMove( &ArrOut, pArrOut );
SC_PairMove( &SlewOut, pSlewOut );
Abc_SclTimeNode( p, pObj, 0 );
// if ( !SC_PairEqual(&ArrOut, pArrOut) || !SC_PairEqual(&SlewOut, pSlewOut) )
if ( !SC_PairEqualE(&ArrOut, pArrOut, E) || !SC_PairEqualE(&SlewOut, pSlewOut, E) )
Abc_SclTimeIncAddFanouts( p, pObj );
}
}
p->MaxDelay = Abc_SclReadMaxDelay( p );
}
static inline void Abc_SclTimeIncUpdateDeparture( SC_Man * p )
{
Vec_Int_t * vLevel;
SC_Pair DepOut, * pDepOut;
Abc_Obj_t * pObj;
float E = (float)0.1;
int i, k;
Vec_WecForEachLevelReverse( p->vLevels, vLevel, i )
{
Abc_NtkForEachObjVec( vLevel, p->pNtk, pObj, k )
{
pDepOut = Abc_SclObjDept( p, pObj );
SC_PairMove( &DepOut, pDepOut );
Abc_SclDeptObj( p, pObj );
// if ( !SC_PairEqual(&DepOut, pDepOut) )
if ( !SC_PairEqualE(&DepOut, pDepOut, E) )
Abc_SclTimeIncAddFanins( p, pObj );
}
}
p->MaxDelay = Abc_SclReadMaxDelay( p );
}
void Abc_SclTimeIncCheckLevel( Abc_Ntk_t * pNtk )
{
Abc_Obj_t * pObj;
int i;
Abc_NtkForEachObj( pNtk, pObj, i )
if ( (int)pObj->Level != Abc_ObjLevelNew(pObj) )
printf( "Level of node %d is out of date!\n", i );
}
int Abc_SclTimeIncUpdate( SC_Man * p )
{
Abc_Obj_t * pObj;
int i, RetValue;
if ( Vec_IntSize(p->vChanged) == 0 )
return 0;
// Abc_SclTimeIncCheckLevel( p->pNtk );
Abc_NtkForEachObjVec( p->vChanged, p->pNtk, pObj, i )
{
Abc_SclTimeIncAddFanins( p, pObj );
if ( pObj->fMarkC )
continue;
Abc_SclTimeIncAddNode( p, pObj );
}
Vec_IntClear( p->vChanged );
Abc_SclTimeIncUpdateArrival( p );
Abc_SclTimeIncUpdateDeparture( p );
Abc_SclTimeIncUpdateClean( p );
RetValue = p->nIncUpdates;
p->nIncUpdates = 0;
return RetValue;
}
void Abc_SclTimeIncInsert( SC_Man * p, Abc_Obj_t * pObj )
{
Vec_IntPush( p->vChanged, Abc_ObjId(pObj) );
}
void Abc_SclTimeIncUpdateLevel_rec( Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
int i, LevelNew = Abc_ObjLevelNew(pObj);
if ( LevelNew == (int)pObj->Level && Abc_ObjIsNode(pObj) && Abc_ObjFaninNum(pObj) > 0 )
return;
pObj->Level = LevelNew;
Abc_ObjForEachFanout( pObj, pFanout, i )
Abc_SclTimeIncUpdateLevel_rec( pFanout );
}
void Abc_SclTimeIncUpdateLevel( Abc_Obj_t * pObj )
{
Abc_SclTimeIncUpdateLevel_rec( pObj );
}
/**Function*************************************************************
Synopsis [Read input slew and output load.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
void Abc_SclManReadSlewAndLoad( SC_Man * p, Abc_Ntk_t * pNtk )
{
if ( Abc_FrameReadMaxLoad() )
{
Abc_Obj_t * pObj; int i;
float MaxLoad = Abc_FrameReadMaxLoad();
// printf( "Default output load is specified (%.2f ff).\n", MaxLoad );
Abc_NtkForEachPo( pNtk, pObj, i )
{
SC_Pair * pLoad = Abc_SclObjLoad( p, pObj );
pLoad->rise = pLoad->fall = MaxLoad;
}
}
if ( Abc_FrameReadDrivingCell() )
{
int iCell = Abc_SclCellFind( p->pLib, Abc_FrameReadDrivingCell() );
if ( iCell == -1 )
printf( "Cannot find the default PI driving cell (%s) in the library.\n", Abc_FrameReadDrivingCell() );
else
{
// printf( "Default PI driving cell is specified (%s).\n", Abc_FrameReadDrivingCell() );
p->pPiDrive = SC_LibCell( p->pLib, iCell );
assert( p->pPiDrive != NULL );
assert( p->pPiDrive->n_inputs == 1 );
}
}
}
/**Function*************************************************************
Synopsis [Prepare timing manager.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
SC_Man * Abc_SclManStart( SC_Lib * pLib, Abc_Ntk_t * pNtk, int fUseWireLoads, int fDept, float DUser, int nTreeCRatio )
{
SC_Man * p = Abc_SclManAlloc( pLib, pNtk );
if ( nTreeCRatio )
{
p->EstLoadMax = 0.01 * nTreeCRatio; // max ratio of Cout/Cave when the estimation is used
p->EstLinear = 100; // linear coefficient
}
Abc_SclMioGates2SclGates( pLib, pNtk );
Abc_SclManReadSlewAndLoad( p, pNtk );
if ( fUseWireLoads )
{
if ( pNtk->pWLoadUsed == NULL )
{
p->pWLoadUsed = Abc_SclFindWireLoadModel( pLib, Abc_SclGetTotalArea(p->pNtk) );
if ( p->pWLoadUsed )
pNtk->pWLoadUsed = Abc_UtilStrsav( p->pWLoadUsed->pName );
}
else
p->pWLoadUsed = Abc_SclFetchWireLoadModel( pLib, pNtk->pWLoadUsed );
}
Abc_SclTimeNtkRecompute( p, &p->SumArea0, &p->MaxDelay0, fDept, DUser );
p->SumArea = p->SumArea0;
p->MaxDelay = p->MaxDelay0;
return p;
}
/**Function*************************************************************
Synopsis [Printing out timing information for the network.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
void Abc_SclTimePerformInt( SC_Lib * pLib, Abc_Ntk_t * pNtk, int nTreeCRatio, int fUseWireLoads, int fShowAll, int fPrintPath, int fDumpStats )
{
SC_Man * p;
p = Abc_SclManStart( pLib, pNtk, fUseWireLoads, 1, 0, nTreeCRatio );
Abc_SclTimeNtkPrint( p, fShowAll, fPrintPath );
if ( fDumpStats )
Abc_SclDumpStats( p, "stats.txt", 0 );
Abc_SclManFree( p );
}
/**Function*************************************************************
Synopsis []
Description []
SideEffects []
SeeAlso []
***********************************************************************/
void Abc_SclTimePerform( SC_Lib * pLib, Abc_Ntk_t * pNtk, int nTreeCRatio, int fUseWireLoads, int fShowAll, int fPrintPath, int fDumpStats )
{
Abc_Ntk_t * pNtkNew = pNtk;
if ( pNtk->nBarBufs2 > 0 )
pNtkNew = Abc_NtkDupDfsNoBarBufs( pNtk );
Abc_SclTimePerformInt( pLib, pNtkNew, nTreeCRatio, fUseWireLoads, fShowAll, fPrintPath, fDumpStats );
if ( pNtk->nBarBufs2 > 0 )
Abc_NtkDelete( pNtkNew );
}
/**Function*************************************************************
Synopsis [Printing out fanin information.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
int Abc_SclCheckCommonInputs( Abc_Obj_t * pObj, Abc_Obj_t * pFanin )
{
Abc_Obj_t * pTemp;
int i;
Abc_ObjForEachFanin( pObj, pTemp, i )
if ( Abc_NodeFindFanin( pFanin, pTemp ) >= 0 )
{
printf( "Node %d and its fanin %d have common fanin %d.\n", Abc_ObjId(pObj), Abc_ObjId(pFanin), Abc_ObjId(pTemp) );
printf( "%-16s : ", Mio_GateReadName((Mio_Gate_t *)pObj->pData) );
Abc_ObjPrint( stdout, pObj );
printf( "%-16s : ", Mio_GateReadName((Mio_Gate_t *)pFanin->pData) );
Abc_ObjPrint( stdout, pFanin );
if ( pTemp->pData )
printf( "%-16s : ", Mio_GateReadName((Mio_Gate_t *)pTemp->pData) );
Abc_ObjPrint( stdout, pTemp );
return 1;
}
return 0;
}
void Abc_SclPrintFaninPairs( SC_Man * p, Abc_Ntk_t * pNtk )
{
Abc_Obj_t * pObj, * pFanin;
int i, k;
Abc_NtkForEachNode( pNtk, pObj, i )
Abc_ObjForEachFanin( pObj, pFanin, k )
if ( Abc_ObjIsNode(pFanin) && Abc_ObjFanoutNum(pFanin) == 1 )
Abc_SclCheckCommonInputs( pObj, pFanin );
}
/**Function*************************************************************
Synopsis [Printing out buffer information.]
Description []
SideEffects []
SeeAlso []
***********************************************************************/
static inline int Abc_ObjIsBuffer( Abc_Obj_t * pObj ) { return Abc_ObjIsNode(pObj) && Abc_ObjFaninNum(pObj) == 1; }
int Abc_SclHasBufferFanout( Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
int i;
Abc_ObjForEachFanout( pObj, pFanout, i )
if ( Abc_ObjIsBuffer(pFanout) )
return 1;
return 0;
}
int Abc_SclCountBufferFanoutsInt( Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
int i, Counter = 0;
Abc_ObjForEachFanout( pObj, pFanout, i )
if ( Abc_ObjIsBuffer(pFanout) )
Counter += Abc_SclCountBufferFanoutsInt( pFanout );
return Counter + Abc_ObjIsBuffer(pObj);
}
int Abc_SclCountBufferFanouts( Abc_Obj_t * pObj )
{
return Abc_SclCountBufferFanoutsInt(pObj) - Abc_ObjIsBuffer(pObj);
}
int Abc_SclCountNonBufferFanoutsInt( Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
int i, Counter = 0;
if ( !Abc_ObjIsBuffer(pObj) )
return 1;
Abc_ObjForEachFanout( pObj, pFanout, i )
Counter += Abc_SclCountNonBufferFanoutsInt( pFanout );
return Counter;
}
int Abc_SclCountNonBufferFanouts( Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
int i, Counter = 0;
Abc_ObjForEachFanout( pObj, pFanout, i )
Counter += Abc_SclCountNonBufferFanoutsInt( pFanout );
return Counter;
}
float Abc_SclCountNonBufferDelayInt( SC_Man * p, Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
float Delay = 0;
int i;
if ( !Abc_ObjIsBuffer(pObj) )
return Abc_SclObjTimeMax(p, pObj);
Abc_ObjForEachFanout( pObj, pFanout, i )
Delay += Abc_SclCountNonBufferDelayInt( p, pFanout );
return Delay;
}
float Abc_SclCountNonBufferDelay( SC_Man * p, Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
float Delay = 0;
int i;
Abc_ObjForEachFanout( pObj, pFanout, i )
Delay += Abc_SclCountNonBufferDelayInt( p, pFanout );
return Delay;
}
float Abc_SclCountNonBufferLoadInt( SC_Man * p, Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
float Load = 0;
int i;
if ( !Abc_ObjIsBuffer(pObj) )
return 0;
Abc_ObjForEachFanout( pObj, pFanout, i )
Load += Abc_SclCountNonBufferLoadInt( p, pFanout );
Load += 0.5 * Abc_SclObjLoad(p, pObj)->rise + 0.5 * Abc_SclObjLoad(p, pObj)->fall;
Load -= 0.5 * SC_CellPin(Abc_SclObjCell(pObj), 0)->rise_cap + 0.5 * SC_CellPin(Abc_SclObjCell(pObj), 0)->fall_cap;
return Load;
}
float Abc_SclCountNonBufferLoad( SC_Man * p, Abc_Obj_t * pObj )
{
Abc_Obj_t * pFanout;
float Load = 0;
int i;
Abc_ObjForEachFanout( pObj, pFanout, i )
Load += Abc_SclCountNonBufferLoadInt( p, pFanout );
Load += 0.5 * Abc_SclObjLoad(p, pObj)->rise + 0.5 * Abc_SclObjLoad(p, pObj)->fall;
return Load;
}
void Abc_SclPrintBuffersOne( SC_Man * p, Abc_Obj_t * pObj, int nOffset )
{
int i;
for ( i = 0; i < nOffset; i++ )
printf( " " );
printf( "%6d: %-16s (%2d:%3d:%3d) ",
Abc_ObjId(pObj),
Abc_ObjIsPi(pObj) ? "pi" : Mio_GateReadName((Mio_Gate_t *)pObj->pData),
Abc_ObjFanoutNum(pObj),
Abc_SclCountBufferFanouts(pObj),
Abc_SclCountNonBufferFanouts(pObj) );
for ( ; i < 4; i++ )
printf( " " );
printf( "a =%5.2f ", Abc_ObjIsPi(pObj) ? 0 : Abc_SclObjCell(pObj)->area );
printf( "d = (" );
printf( "%6.0f ps; ", Abc_SclObjTimeOne(p, pObj, 1) );
printf( "%6.0f ps) ", Abc_SclObjTimeOne(p, pObj, 0) );
printf( "l =%5.0f ff ", Abc_SclObjLoadMax(p, pObj) );
printf( "s =%5.0f ps ", Abc_SclObjSlewMax(p, pObj) );
printf( "sl =%5.0f ps ", Abc_SclObjSlackMax(p, pObj, p->MaxDelay0) );
if ( nOffset == 0 )
{
printf( "L =%5.0f ff ", Abc_SclCountNonBufferLoad(p, pObj) );
printf( "Lx =%5.0f ff ", 100.0*Abc_SclCountNonBufferLoad(p, pObj)/p->EstLoadAve );
printf( "Dx =%5.0f ps ", Abc_SclCountNonBufferDelay(p, pObj)/Abc_SclCountNonBufferFanouts(pObj) - Abc_SclObjTimeOne(p, pObj, 1) );
printf( "Cx =%5.0f ps", (Abc_SclCountNonBufferDelay(p, pObj)/Abc_SclCountNonBufferFanouts(pObj) - Abc_SclObjTimeOne(p, pObj, 1))/log(Abc_SclCountNonBufferLoad(p, pObj)/p->EstLoadAve) );
}
printf( "\n" );
}
void Abc_SclPrintBuffersInt( SC_Man * p, Abc_Obj_t * pObj, int nOffset )
{
Abc_Obj_t * pFanout;
int i;
Abc_SclPrintBuffersOne( p, pObj, nOffset );
assert( Abc_ObjIsBuffer(pObj) );
Abc_ObjForEachFanout( pObj, pFanout, i )
if ( Abc_ObjIsBuffer(pFanout) )
Abc_SclPrintBuffersInt( p, pFanout, nOffset + 1 );
}
void Abc_SclPrintBufferTrees( SC_Man * p, Abc_Ntk_t * pNtk )
{
Abc_Obj_t * pObj, * pFanout;
int i, k;
Abc_NtkForEachObj( pNtk, pObj, i )
{
if ( !Abc_ObjIsBuffer(pObj) && Abc_SclCountBufferFanouts(pObj) > 3 )
{
Abc_SclPrintBuffersOne( p, pObj, 0 );
Abc_ObjForEachFanout( pObj, pFanout, k )
if ( Abc_ObjIsBuffer(pFanout) )
Abc_SclPrintBuffersInt( p, pFanout, 1 );
printf( "\n" );
}
}
}
void Abc_SclPrintBuffers( SC_Lib * pLib, Abc_Ntk_t * pNtk, int fVerbose )
{
int fUseWireLoads = 0;
SC_Man * p;
assert( Abc_NtkIsMappedLogic(pNtk) );
p = Abc_SclManStart( pLib, pNtk, fUseWireLoads, 1, 0, 10000 );
Abc_SclPrintBufferTrees( p, pNtk );
// Abc_SclPrintFaninPairs( p, pNtk );
Abc_SclManFree( p );
}
////////////////////////////////////////////////////////////////////////
/// END OF FILE ///
////////////////////////////////////////////////////////////////////////
ABC_NAMESPACE_IMPL_END
|
{
"pile_set_name": "Github"
}
|
Q:
Volume using Triple Integrals
Find the volume of solid enclosed by surfaces $x^2+y^2=9$ and $x^2+z^2=9$
I understand that these are two cylinders in XY and XZ planes respectively, that will cut each other above the XY plane. I get the following limits for triple integrals
$$\int_{\theta=0}^{2\pi}\int_{r=0}^3\int_{z=0}^{\sqrt{ 9-r^2\cos^2\theta}}rdzdrd\theta$$
Is it correct ?? If yes, the integral itself looks so complicates. some hints on solving it please !!
A:
I think it's better not to transform to cylindrical coordinates. Instead, first note that your region is $$\left\{(x,y,z)\in\mathbb R^3|-3\leq x\leq 3, -\sqrt{9-x^2}\leq y\leq\sqrt{9-x^2},-\sqrt{9-x^2}\leq z\leq\sqrt{9-x^2}\right\},$$ so your integral is equal to $$\int_{-3}^3\int_{-\sqrt{9-x^2}}^{\sqrt{9-x^2}}\int_{-\sqrt{9-x^2}}^{\sqrt{9-x^2}}dzdydx=8\int_0^3\int_0^{\sqrt{9-x^2}}\int_0^{\sqrt{9-x^2}}dzdydx=8\int_0^3(9-x^2)\,dx,$$ which is equal to $144$.
|
{
"pile_set_name": "StackExchange"
}
|
February 13, 2019 The FDA has completed its investigation of the multistate outbreak of E. coli O157:H7 illnesses linked to romaine lettuce grown in California in Fall 2018. On February 13, 2019, FDA released an overview of the investigation approach and factors that potentially contributed to the contamination of romaine lettuce with E. coli O157:H7 in this outbreak: Investigation Summary: Factors Potentially Contributing to the Contamination of Romaine Lettuce Implicated in the Fall 2018 Multi-State Outbreak of E. coli O157:H7. This document also provides recommendations to industry for prevention of pathogenic E. coli O157:H7 contamination that is based on the findings outlined in the document. Additionally, FDA offers the following recommendations to industry to develop and enhance commodity-specific procedures, policies and best practices to enhance the safety of leafy greens: FDA continues to advise leafy green growers, buyer/shippers, and retailers to develop real-time procedures to quickly explore the possible scope, source(s) and route(s) of contamination when human pathogens of public health significance are detected by routine pre-harvest or finished product verification testing. Local in-depth knowledge and actions are critical in helping determine likely potential routes of contamination of leafy greens in the regions in which they are grown. FDA strongly encourages the entire leafy greens supply chain to adopt traceability best practices and state-of-the-art technology to assure quick, accurate and easy access to key data elements from farm to fork when leafy greens are involved in a potential recall or outbreak. FDA believes that widespread industry adoption of existing and emerging technologies, that can be used to trace product from the field to the consumer’s kitchen in real time, is critical to protecting the public during a foodborne illness outbreak linked to leafy greens.
What Products are Recalled?
On December 13, 2018, Adam Bros. Farming, Inc., in Santa Barbara County, recalled products products that may have come into contact with water from the water reservoir where the outbreak strain was found. The firm recalled red leaf lettuce, green leaf lettuce and cauliflower harvested on November 27 through 30, 2018. According to the firm, the lettuce and cauliflower was distributed to wholesalers in the U.S. Mexico, and Canada.
The Adam Bros. recall has prompted a recall by Spokane Produce Inc. of Spokane, WA. The firm recalled sandwiches and other products under the Northwest Cuisine Creations and Fresh&Local labels.
What are the Symptoms of E. Coli Infections?
The symptoms of Shiga toxin-producing (STEC) E. coli infections vary for each person but often include severe stomach cramps and bloody diarrhea. If there is fever, it is usually not very high (less than 101 degrees Fahrenheit/less than 38.5 degrees Celsius). Most people get better within 5–7 days. Some infections are very mild, but others are severe or even life-threatening.
Around 5–10 percent of those who are diagnosed with STEC infection develop a potentially life-threatening complication, known as hemolytic uremic syndrome (HUS).
Symptoms of HUS include fever, abdominal pain, feeling very tired, decreased frequency of urination, small unexplained bruises or bleeding, and pallor. Most people with HUS recover within a few weeks, but some suffer permanent damage or die. People who experience these symptoms should seek emergency medical care immediately. Persons with HUS should be hospitalized because their kidneys may stop working (acute renal failure), but they may also develop other serious problems such as hypertension, chronic kidney disease, and neurologic problems.
Learn more:
Who is at Risk?
People of any age can become infected with Shiga toxin-producing (STEC) E. coli. Children under the age of 5 years, adults older than 65, and people with weakened immune systems are more likely than others to develop severe illness, including HUS, but even healthy older children and young adults can become seriously ill.
What Else Should Restaurants and Retailers Do?
Restaurants and retailers should always practice safe food handling and preparation measures. It is recommended that employees wash hands, utensils, and surfaces with hot, soapy water before and after handling food.
Regular frequent cleaning and sanitizing of food contact surfaces and utensils used in food preparation may help to minimize the likelihood of cross-contamination.
Wash and sanitize display cases and refrigerators regularly.
Wash and sanitize cutting boards, surfaces, and utensils used to prepare, serve, or store food.
Wash hands with hot water and soap following the cleaning and sanitation process.
What Else Should Consumers Do?
Consumers should always practice safe food handling and preparation measures. It is recommended that they wash hands, utensils, and surfaces with hot, soapy water before and after handling food. Produce items should be rinsed in clean, running water without the use of cleaners or soaps.
Previous Updates
January 9, 2019
As of January 9, 2019, the CDC reports that the outbreak appears to be over. Contaminated romaine that made people sick in this outbreak should no longer be available on the market. FDA will continue its investigation into potential sources and contributing factors that led to the outbreak in order to inform future prevention efforts.
The Public Health Agency of Canada (PHAC) and Canadian Food Inspection Agency (CFIA) also coordinated with U.S. agencies as they investigated a similar outbreak in Canada. On December 24, PHAC reported that the outbreak in Canada had ended.
December 17, 2018:
On December 13, 2018, Adam Bros. Farming, Inc., in Santa Barbara County, CA, recalled products that may have come into contact with water from the water reservoir where the outbreak strain was found. The firm recalled red leaf lettuce, green leaf lettuce and cauliflower harvested on November 27 through 30, 2018. According to the firm, cauliflower was distributed to wholesalers in the U.S., Mexico, and Canada.
The Adam Bros. recall has prompted a recall by Spokane Produce Inc. of Spokane, WA. The firm recalled sandwiches and other products under the Northwest Cuisine Creations and Fresh&Local labels.
December 13, 2018:
As of December 13, FDA has further refined the traceback investigation down to the farm level, which narrows the list of romaine growing areas that FDA recommends consumers and retailers avoid down to the following counties: Monterey, San Benito, and Santa Barbara.
San Luis Obispo, Santa Cruz and Ventura counties in California have been removed from the list at this time. Other growing areas, for example Florida, Mexico and the desert growing regions near Yuma, Imperial County, and Riverside County do not appear to be related to the current outbreak.
Investigation teams from FDA’s Produce Safety Network, California Department of Public Health, California Department of Food and Agriculture, and the CDC analyzed romaine lettuce, soil, water, sediment, and animal dropping samples at farms identified by the traceback investigation. Most of these samples tested negative for the outbreak strain, with some samples still undergoing analysis. However, the strain of E. coli O157:H7 causing the current outbreak was identified in one sample collected in the sediment of an agricultural water reservoir at one ranch owned and operated by Adam Bros. Farming, Inc., in Santa Barbara County. The strain isolated from this sample matched those collected from ill persons in this outbreak using Whole Genome Sequencing (WGS). FDA is able to confirm that Adam Bros. Farming, Inc. hasn’t shipped any romaine since November 20, 2018. Experts are working with the farm to determine how contamination occurred and what corrective actions need to be taken before their next growing season.
Adams Bros. is cooperating with the FDA and CDC in this outbreak investigation. They have committed to recalling products that may have come into contact with water from the water reservoir where the outbreak strain was found. Produce that did not come into contact with the reservoir water, because it was grown on other ranches within the farm, is not of concern to FDA at this time.
The finding on this farm, however, may not explain all illnesses. The FDA’s traceback activities of romaine lettuce will continue as FDA works to determine what commonalities this farm may have with other farms and areas that are being assessed as part of the investigation.
This information allows FDA to modify its recommendations slightly. Given the identification of the outbreak pathogen on the one farm, the location of farms identified in the traceback, and the fact that the lettuce on the market at the peak of the outbreak should be beyond shelf life, there is no longer a reason for consumers to avoid romaine from San Luis Obispo, Santa Cruz and Ventura Counties, in California.
Read the Statement from FDA Commissioner and FDA Deputy Commissioner from December 13, 2018.
December 6, 2018:
The FDA continues to conduct a traceback investigation, which involves reviewing shipping records and invoices to trace the romaine that ill people who are part of this outbreak consumed backwards through the supply chain to identify where it was grown and where in the supply chain it may have become contaminated.
Information collected through December 6, 2018, continues to indicate that contaminated romaine lettuce from the Central Coast growing regions of northern and central California is the likely source of the current outbreak of E. coli O157:H7 infections. The California counties FDA is including in this region remain the same: Monterey, San Benito, San Luis Obispo, Santa Barbara, Santa Cruz and Ventura. Counties may be added or removed as the investigation progresses.
Traceback information from four restaurants in three different states so far has implicated 10 different distributors, 12 different growers, and 11 different farms as potential sources of the contaminated lettuce. The information indicates that the outbreak cannot be explained by a single farm, grower, harvester, or distributor.
FDA’s Produce Safety Network (PSN) is assisting with this investigation. The PSN includes regionally-based personnel from FDA’s Center for Food Safety and Applied Nutrition that provide region-specific expertise on produce safety policy and science, and regionally-based personnel from FDA’s Office of Regulatory Affairs that specialize in conducting produce safety inspections and investigations. Members of the PSN work together to support industry and government partners on implementing the Food Safety Modernization Act (FSMA) Produce Safety Rule.
On November 23, 2018, staff from FDA’s Produce Safety Network, investigators from CA Department of Public Health and the CA Department of Food and Agriculture, and CDC began conducting on-site investigations of farms and lettuce cooling facilities in California that have been identified by the FDA, state, and Canadian tracebacks. The investigation teams have been collecting romaine lettuce, soil, water, and scat samples. To date, E. coli O157:H7 has not been found in any of the lettuce, soil or scat samples. Results of water testing being conducted by CDC are pending.
November 30, 2018:
Traceback activities in this romaine lettuce investigation are ongoing and new information continues to be gathered. Analysis of information available through November 30 has not narrowed the potential sources of contaminated romaine lettuce to a specific farm, processor, shipper or distribution center.
November 26, 2018:
The FDA has been conducting a traceback investigation, reviewing shipping records and invoices to trace the supply of romaine from the place where ill people were exposed to the place where that romaine was grown.
Preliminary traceback information indicates that ill people in several areas across the country were exposed to romaine lettuce harvested in California. Specifically, current evidence indicates this romaine was harvested in the Central Coast growing regions of northern and central California.
The specific California counties FDA identified in the traceback investigation are:
Monterey
San Benito
San Luis Obispo
Santa Barbara
Santa Cruz
Ventura
Currently, the FDA does not have enough traceback information to identify the source of the contamination that would allow us to request a targeted recall from specific suppliers. On November 20, FDA recommended that the most efficient way to ensure that contaminated romaine is off the market would be for industry to voluntarily withdraw product from the market, and to withhold distribution of romaine until public health authorities can ensure the outbreak is over and/or until FDA can identify a specific source of contamination.
On November 20, the United Fresh Produce Association and the Leafy Greens Marketing Agreement issued statements committing to withdraw the potentially contaminated romaine from the market.
Read the Statement from the FDA Commissioner from November 26, 2018.
November 20, 2018:
Genetic analysis of the E. coli O157:H7 strains tested to date from patients in this current outbreak are similar to strains of E. coli O157:H7 associated with a previous outbreak from the Fall of 2017 that also affected consumers in both Canada and the U.S. The 2017 outbreak of E. coli O157:H7 was associated with leafy greens in the U.S. and romaine in Canada. This year, romaine lettuce is the suspected vehicle for both the U.S. and Canadian outbreaks. There is no genetic link between the current outbreak and the E.coli O157:H7 outbreak linked to romaine that occurred in the Spring of 2018.
The FDA is conducting a traceback investigation to determine the source of the romaine lettuce eaten by people who became sick. Additionally, FDA and states are conducting laboratory analysis of romaine lettuce samples potentially linked to the outbreak.
Currently, the FDA does not have enough traceback information to identify the source of the contamination that would allow us to request a targeted recall from specific suppliers. At this stage in the investigation, the most efficient way to ensure that contaminated romaine is off the market would be for industry to voluntarily withdraw product from the market, and to withhold distribution of romaine until public health authorities can ensure the outbreak is over and/or until FDA can identify a specific source of contamination. Until then, the FDA advises that consumers should not eat and discard romaine, or any mixed salads containing romaine, until more information on the source of the contamination and the status of the outbreak can be determined.
|
{
"pile_set_name": "OpenWebText2"
}
|
Rachel Maddow shows how the drafters of the Civil Rights Act of 1964 anticipated future racial strife and allowed for the inclusion of a division within the Justice Department to offer "conciliatory assistance" when troubles arise.
|
{
"pile_set_name": "OpenWebText2"
}
|
/*
* Copyright (C) 2009 Google Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following disclaimer
* in the documentation and/or other materials provided with the
* distribution.
* * Neither the name of Google Inc. nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#ifndef SharedWorkerRepository_h
#define SharedWorkerRepository_h
#if ENABLE(SHARED_WORKERS)
#include <wtf/Forward.h>
#include <wtf/PassOwnPtr.h>
#include <wtf/PassRefPtr.h>
namespace WebCore {
class Document;
class URL;
class MessagePortChannel;
class SharedWorker;
typedef int ExceptionCode;
// Interface to a repository which manages references to the set of active shared workers.
class SharedWorkerRepository {
public:
// Returns true if the platform supports SharedWorkers, otherwise false.
static bool isAvailable();
// Connects the passed SharedWorker object with the specified worker thread, creating a new thread if necessary.
static void connect(PassRefPtr<SharedWorker>, PassOwnPtr<MessagePortChannel>, const URL&, const String& name, ExceptionCode&);
// Invoked when a document has been detached.
static void documentDetached(Document*);
// Returns true if the passed document is associated with any SharedWorkers.
static bool hasSharedWorkers(Document*);
private:
SharedWorkerRepository() { }
};
} // namespace WebCore
#endif // ENABLE(SHARED_WORKERS)
#endif // SharedWorkerRepository_h
|
{
"pile_set_name": "Github"
}
|
Semiconductor integrated circuit devices are designed using various computer aided means to produce a logical circuit in which various functional elements are identified and interconnected to form particular logic functions. Computer-aided design (CAD) or other design tools are typically used to generate lithography data based on the design and the lithography data is used to form a photomask set that is used in the actual fabrication of the semiconductor integrated circuit (IC) devices.
A standard cell type semiconductor IC device is an application specific integrated circuit (ASIC) device designed using multiple standard cells. Each standard cell may include a group of transistor and interconnect structures that provide a boolean logic function (e.g., AND, OR, XOR, XNOR, inverters) or a storage function (flipflop or latch, for example). In a standard cell system, the standard cells are advantageously maintained in a library and various integrated circuit devices can be designed by selecting desired standard cells from the library and combining them in various arrangements to form a most suitable cell arrangement pattern that forms part of the layout of the integrated circuit device.
The design process for standard cell semiconductor IC devices includes constructing the integrated circuit design out of the selected standard cells that are connected together electrically, i.e. routed, using wire interconnects which are also used to route the cells to input and output terminals. The standard cells and connections between them may be stored in databases called “netlists” (i.e., lists of symbolic interconnections). The netlist describes the connectivity of the standard cells within the semiconductor IC device design. One or more computer-aided design (CAD) tools may be used to generate the netlist of the selected standard cells and the interconnections between the cells and input/output. The netlist may be used by a floor planner, placement tool, or other design tool, to place the selected cells at particular locations in the layout of a standard cell integrated circuit device.
The design of the standard cell semiconductor IC device may be carried out by an APR (automatic placement and routing) design tool that includes a placer and a router, by selecting standard cells from the library of standard cells and placing and routing the cells according to design instructions provided to the APR tool such as in the netlist. The placer determines the optimum location of each standard cell of the integrated circuit on the semiconductor substrate, and the router optimizes the routing of input/output lines and the connection between standard cells so that the integrated circuit layout does not become overly congested by input/output and other routing lines. Other CAD tools are also available and may be used in the design of standard cell semiconductor IC devices.
In addition to the standard cells that may be selected from a library, the device design may include other standard cells such as user specified target cells with different operational characteristics. When such target cells are used along with the standard cells from the library to form a standard cell semiconductor IC device, additional challenges in the placement and routing of the cells is imposed. Target cells that operate at higher power consumption levels, for example, require the routing wires used to couple the target cells to ground and power sources, to operate at high power levels and carrying high currents. As such, these wires are especially susceptible to electromigration (EM) failure and even complete blowout of the wire, thus representing a significant shortcoming of conventional technology.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
An automobile has an openable/closable mechanism including a box and a lid such as a glove box. A damper is provided to the edge of a box the glove box. When a lid of the glove box is closed, the damper functions to suppress the collision shook between the lid and the box with the elastic force by abutting on the lid.
The damping part described in Patent Document 1 includes a casing having a bottomed cylindrical shape, a retainer having a bottomed cylindrical shape and housed in the casing, and a spring abutting on the bottom of the casing and the bottom of the retainer to bias the retainer in a direction that the retainer protrudes out from an opening portion of the casing. A retaining protrusion provided on a lateral face of the retainer is engaged into an engagement window provided on a lateral face of the casing, and thereby retaining the retainer the biasing force of the spring.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
A meta-analysis of the rates of Staphylococcus aureus and methicillin-resistant S aureus contamination on the surfaces of environmental objects that health care workers frequently touch.
Health care workers may potentially spread Staphylococcus aureus and methicillin-resistant S aureus (MRSA) to patients by contaminated high-touch items. We aimed to determine the pooled rates of S aureus and MRSA contamination and influencing factors. A literature search of the PubMed, ScienceDirect, Embase, Ovid, and Scopus databases was performed. Pooled contamination rates were determined using random effect models. Subgroup and meta-regression analyses were conducted to identify factors potentially influencing the rates of S aureus and MRSA contamination. Sensitivity and publication bias analyses were performed. Thirty-eight studies were included in the meta-analysis. The pooled contamination rates were 15.0% (95% confidence interval [CI], 9.8%-21.1%) for S aureus and 5.0% (95% CI, 2.7%-7.7%) for MRSA. The subgroup analyses indicated that the pooled rate of S aureus contamination was significantly higher for studies conducted in South America, in developing countries, and during 2010-2015. The pooled rate of MRSA contamination was significantly higher for studies conducted in Africa. The meta-regression analysis suggested that the pooled rate of S aureus contamination was lower for studies conducted in developed countries (odds ratio, 0.664; 95% CI, 0.509-0.867; P = .004). No bias was found in the publication of the rates of S aureus and MRSA contamination. S aureus and MRSA contamination statuses of high-touch items are worrisome and should be paid greater attention. Developing country status was a risk factor for S aureus contamination.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Blitzen wrote:Do you have something against me or do you just like to agitate people?
You're seriously asking whether or not I like to agitate people? Where do you think BrikWars came from?
Answer Version 1: I stand firm against anyone who thinks they're right about anything*, both on this website and in real life. It's kind of the conceptual seed from which all of BrikWars grows. You've just been unlucky lately because you let yourself get caught thinking you're right more often than most of the other folks around here, and my compulsion drives me to oppose it.
Answer Version 2: To look from a different angle, I do my best to disagree with almost everything, but really I think the people who are worried about being right are the only ones who are bothered by it.
* - footnote: I want to especially emphasize here that I make no distinction whether or not people are actually right about anything, because I can't be bothered. Also because that would be falling into exactly the same trap.
Here's my feeling on the subject: all the most terrible crimes and atrocities in human experience, from genocide to arguing with your spouse, can be traced to a single root cause: people who think they're right. All the greatest discoveries and innovations and advances, on the other hand, from inventing the transistor to raising children, can be traced to the opposite source: people who have no idea what the hell they're doing. Therefore as my primary principle, overriding all others, is that I'm against the idea that it's good to value being right about things. Once things start getting too right they need to be made wrong in a hurry. It's the only way to be safe.
Rayhawk wrote:I like this idea a lot, it simplifies that whole system perfectly. I'd just want to add some distinction about unfamiliar devices they be able to use badly as opposed to ones they absolutely wouldn't be able to use at all.
Blitzen wrote:Mike, I think I have a solution. If the means for operation a device is already there (as in pressing a button or pulling a trigger), any minifig can attempt it with a penalty. If the device needs user input (super computer, things that have keyboards) then a minifig can only attempt it if he has the proper training. Hopefully it isn't too hard to determine which it is.
Eh?
Often, literally, a pillow fight but may include similar situations like volleyball, particularly when wardrobe is skimpy and the action is bouncy.
aybraus wrote:If an object is unfamiliar to a minifig using it, rolls of both 2 and 1 count as critical failures.
This is almost perfect, I love it. However:
Rayhawk wrote:I'd just want to add some distinction about unfamiliar devices they be able to use badly as opposed to ones they absolutely wouldn't be able to use at all.
Maybe we should go on a case-by-case basis. Clearly there is a difference between a CaveMan operating a supercomputer and a SpaceMan operating a pile of rocks. And also there is a difference between a CaveMan operating a supercomputer and a CaveMan operating the SpaceMan's blaster gun. So it would have to be a "what I say goes roll" that determines when a certain minifig could not possibly figure out how to do whatever it is they're trying to do. But on the other hand, why would a CaveMan even want to operate a supercomputer, having absolutely no idea what one is or what it does?
But then...
aybraus wrote:I don't really think there should be any instance where a minifig can't use an item at all, since it could put a throttle on gameplay and reduce the amount of destruction.
So I propose the following addition:When the situation dictates*, any roll other than a critical success becomes a critical failure.
Yeah, because of course a CaveMan trying to draw a primitive buffalo in MSPaint would almost always end up with a blue screen and a lot of fried circuits. But you never know, there's always that 1 in 6 chance that he will accidentally run:
{
RedButton = pressed;
bomb.arm(NUKE);
Initiate: _LAUNCH_DA_NUKE(BOMBDABASE.bfb);
return 0;
}
Fingers crossed!
EDIT: I apologize for the above. As I write this I'm sitting here in a programming class bored out of my mind.
i like it, but i think it should be reserved for only the most SERIOUS endeavors in technological prowess. a caveman who finds a crossbow may still be able to get the gist of what's going on, but great sun-god help him if he stumbles across a particle accelerator.
Maybe the way we need to differentiate is between killing and non-killing devices, since all minifigs have a natural instinct for killing. No matter how complex or unfamiliar a device, if one minifig sees another minifig use it object to try and kill stuff, he gets the basic idea.
Well ok then, let's revert back to our old buddy the CaveMan. I'm pretty sure if he found a TL4 Rocket Launcher lying on the ground he would use it to bash someone's face in before he would ever dream of firing an RPG. But I get what you mean.
|
{
"pile_set_name": "Pile-CC"
}
|
A tribute to North Korean leader Kim Jong-il who recently passed away at the age of 69.
.
(via)
|
{
"pile_set_name": "OpenWebText2"
}
|
For those who do not know what Item song or number is, it is a dance song from Hindi, Tamil, and Telegu indian movies that showcases a beautiful indian woman with most popular dance moves at the time and help enhance the marketability of the movie.
It's all FREE! Enjoy Bollywood Item dance songs and more.
Recent changes:It's first version and in next version there will be more features available.
Bollywood Movie Item Songs by Bollywood CineTrailers App. This is the most Androide app for Bollywood Item Songs (aka numbers). This app helps you watch the latest Bollywood Dance songs from forthcoming Bollywood Movies and previously popular movies.
For those who do not know what Item song or number is, it is a dance song from Hindi, Tamil, and Telegu indian movies that showcases a beautiful indian woman with most popular dance moves at the time and help enhance the marketability of the movie.
It's all FREE! Enjoy Bollywood Item dance songs and more.
Recent changes:It's first version and in next version there will be more features available.
|
{
"pile_set_name": "Pile-CC"
}
|
Microsoft cloud across Europe…
Businesses and institutions in Europe are embracing the cloud to digitally transform… Microsoft state that while many are initially drawn to the cloud for cost savings, that greater agility and reduced IT complexity are quickly becoming fundamental to their competitiveness.
Microsoft cloud services – including Azure, Office 365 and Dynamics CRM online – became the first major cloud services to make the EU model clauses available to enterprise customers. Microsoft was also the first major provider to have its approach to commercial agreements validated by the European Union’s Article 29 Working Party, and adopted the world’s first international standard for cloud privacy. The British Standards Institute (BSI) has also independently verified that in addition to Microsoft Azure, both Office 365 and Dynamics CRM online are aligned with the standard’s code of practice for the protection of Personally Identifiable Information (PII) in the public cloud.
Hover over the dots on the map below to learn how customers across Europe are using the Microsoft cloud to help them achieve more.
|
{
"pile_set_name": "Pile-CC"
}
|
Sabres, Halloween-ish thoughts for late October
‘I think coach Ruff is one of the brightest coaches in the leagues. He’s proven it. When you look at the old NHL, it was difficult for the Sabres to compete with their payroll. But he did a great job based on what he had to work with.’
|
{
"pile_set_name": "Pile-CC"
}
|
Consilience (book)
Consilience: The Unity of Knowledge is a 1998 book by the biologist E. O. Wilson, in which the author discusses methods that have been used to unite the sciences and might in the future unite them with the humanities. Wilson uses the term consilience to describe the synthesis of knowledge from different specialized fields of human endeavor.
Definition of consilience
This book defines consilience as "Literally a 'jumping together' of knowledge by the linking of facts and fact-based theory across disciplines to create a common groundwork of explanation." (page 7)
Examples of consilience discussed by Wilson
Chapter 1
The "New Synthesis". Unification of Darwin's theory of evolution with genetics.
Gerald Holton's "Ionian Enchantment". The conviction that the world has a unified order and can be explained by natural laws.
Theory that water is fundamental. Thales of Miletus proposed that water is the unifying basis for all material things. Often cited as the first materialistic theory of a unified view of nature.
Unification of forces in modern physics.
Einstein's work. For example, unification of Brownian motion with atomic theory.
Unity of purpose for science and religion. To explain the universe and understand our role in the universe.
Chapter 2
Environmental protection. The need to link together knowledge from government regulators, ethics, social science, biology, and physical sciences like chemistry.
Unity of purpose for philosophy and science. Philosophers and scientists can work together at the borders between biology, social science and the humanities.
Liberal arts education. Recognition of the unity of knowledge as a way to revitalize education.
Government policy. The need to assemble unified knowledge from across specialized disciplines in the natural sciences, social sciences and humanities.
Chapter 3
The Enlightenment. In the context of scientific knowledge applied to human rights and social progress.
Marquis de Condorcet. Condorcet's systematic application of mathematics in the social sciences.
Francis Bacon. Early advocate of data collection and its analysis as the basis of sound knowledge (Baconian method) in fields that include social science and the humanities.
René Descartes. Believed that the universe is rational and united and that interconnected truths run from physics to biology to moral reasoning. Descartes unified geometry and algebra (see: Cartesian coordinate system).
Isaac Newton. Unified the laws of falling bodies with the laws of planetary motion (see: law of universal gravitation).
Origin of social science. The roles of Adolphe Quetelet and Auguste Comte in developing the idea of studying behavior with scientific methods.
Unity of purpose for Postmodernism and Science. Wilson argues that humanity is driven forward by the tension between those who upon viewing order create disorder and those who upon viewing disorder create order.
Chapter 4
The Greek Atomists. Greeks such as Leucippus and Democritus are credited with the reductionistic idea that matter has fundamental components. Scientific investigation of this idea has resulted in unification across the natural sciences. Example: the molecular structure of DNA accounts for genetic storage in living cells.
Experimental Epistemology. A modern attempt to unify neuroscience and epistemology. Discussed as a method for clarifying the Evolutionary basis of mismatches between physical reality and our mental models of reality.
Positivism. A method for comparing and unifying knowledge from different disciplines; gives priority to facts which are generated by experiment and objective observation rather than subjective speculations.
Pragmatism. A method for comparing and unifying knowledge from different disciplines; gives priority to methods and techniques that can be demonstrated to work and have pragmatic value.
Chapter 5
Reduction vs. synthesis. Many examples comparing consilience by reduction (dissect a phenomenon into its components) and consilience by synthesis (predicting higher-order phenomena from more basic physical principles). One specific example is Wilson's own work on the chemical signals that regulate insect social behavior.
Magician to Atom. An example of consilience by reduction in which Wilson tries to account for the prevalence of serpent symbols in human cultures. Incorporates the "activation-synthesis model" of dreaming.
Consilience between biology disciplines. Discussion of successes (cells explained in terms of their chemical components, embryo development in terms of interactions between the cells of an embryo) but also points to the remaining problem of dealing with complex systems as in neuroscience and ecology.
Statistical mechanics. A classical example in which the behavior of volumes of gas is explained in terms of the molecules of the gas (kinetic theory).
Quantum chemistry. Prediction of chemical properties by quantum mechanical calculations.
Chapter 6
Explaining consciousness and emotion in terms of brain activity. Wilson describes the neurobiological approach to accounting for consciousness and emotion in terms of brain physiology and how this effort is guided by collaboration between biologists, psychologists and philosophers.
Neurobiology of aesthetics. Wilson proposes that it will be possible to construct a neurobiological understanding of subjective experiences that are shared and explored by art. Common neural patterns of activity will be found to correspond to fundamental aesthetic experiences.
Artificial emotion. Wilson proposes that human-like artificial intelligence will require the engineering of a computational apparatus for processing an array of rich sensory inputs and the capacity to learn from those inputs in the way that children can learn. Requires consilience between biology, psychology and computer science.
Chapter 7
The relationship between genes and culture. Wilson posits that the basic element of culture is the meme. When a meme exists in a brain it has the form of a neuronal network that allows the meme to function within semantic memory. The link from genes to culture is that our genes shape our brains (in cooperation with the environment) and our brains allow us to work with memes as the basic units of culture.
Translations
The book has been translated into many languages. The Chinese language translation is seriously flawed.
See also
Wendell Berry wrote a comprehensive critique of Consilience in his essay collection Life is a Miracle.
Philosophy of science
The Two Cultures
The Hedgehog, the Fox, and the Magister's Pox by Stephen Jay Gould
References
Reviews
Eldredge, Niles and Stephen Jay Gould, "Biology Rules", Stephen Jay Gould Archive.
Fodor, Jerry. "Look!", London Review of Books, Vol. 20, No. 21, 29 October 1998.
Gillispie, Charles C. "E. O. Wilson's Consilience: A Noble, Unifying Vision, Grandly Expressed", American Scientist, May–June 1998.
Henriques, G. (in press). The problem of psychology and the integration of human knowledge: Contrasting Wilson’s Consilience with the Tree of Knowledge System. Final draft
Jamieson, Dale. "Consilience", Issues in Science and Technology, Vol. 15, No. 1, Fall 1998.
McGuire, Ron. Review, CNN, April 15, 1998.
Orr, H. Allen. "The Big Picture", Boston Review, October/November 1998.
Category:1998 non-fiction books
Category:American non-fiction books
Category:English-language books
Category:Science books
Category:Science studies
Category:Works by E. O. Wilson
|
{
"pile_set_name": "Wikipedia (en)"
}
|
1. Introduction {#sec1-sensors-18-03702}
===============
Displacement measurements are fundamentally important in industrial applications, and the displacement sensors are gaining more important attention in the increasing automated industry \[[@B1-sensors-18-03702]\]. Kinds of displacement sensors have been proposed, including capacitive displacement sensors \[[@B2-sensors-18-03702]\], eddy-current sensors \[[@B3-sensors-18-03702]\], linear variable displacement transformer (LVDTs) \[[@B4-sensors-18-03702]\], linear optical grating \[[@B5-sensors-18-03702]\], laser interferometers \[[@B6-sensors-18-03702]\], and magneto-strictive displacement sensors \[[@B7-sensors-18-03702]\]. The displacement measurement resolution of these sensors is as high as a nanometer level with hundreds of millimeters, which plays a key role in automation control application. Over the past few decades, optical fiber displacement sensors have been developed with considerable attention to their advantage of lightweight, high resolution immunity to electromagnetic interference, remote sensing ability, etc.; such sensors have been widely used in slope sliding monitoring, dam deformation, foundation settlement, steel corrosion, earthquakes and so on \[[@B8-sensors-18-03702]\].
Various types of optical fiber sensing techniques have been developed for displacement measurement, including Fabry-Perot interferometers \[[@B9-sensors-18-03702],[@B10-sensors-18-03702]\], multimode interference, fiber Bragg gratings \[[@B11-sensors-18-03702],[@B12-sensors-18-03702]\], surface plasmon resonance \[[@B13-sensors-18-03702]\], white light interferometers (WLI) \[[@B14-sensors-18-03702],[@B15-sensors-18-03702]\], and air-cavity methods \[[@B16-sensors-18-03702]\]. Most of these methods rely on the optical interference with high measurement resolution. However, such methods are usually unstable. In recent years, the microwave photonics (MWP) optical fiber sensing technology has raised increasing interest. The MWP technique combines the advantages of both the microwave and photonics techniques, which enable this technique to sense several parameters in a variety of sensing applications. This technique down-coverts the optical interference to the RF region to sense the measured parameters, which is far more stable and easier to control with fast sensing speed and low cost. Such a technique can achieve a larger dynamic range (DR) with a high measurement resolution. There are several types of optical fiber sensors based on the microwave photonic (MWP) technology. One method uses the opto-electric oscillator (OEO) to sense the displacement and other parameters \[[@B17-sensors-18-03702]\]. The displacement of the object to be tested produces a shift of the oscillator frequency of the output microwave signal from the OEO. The microwave frequency from the OEO has a high spectral purity and can be measured by the spectrum analyzer directly with high resolution over a large measurement range \[[@B18-sensors-18-03702]\]. MWP interferometry using a low coherence white light source has also been developed to be used in optical path difference sensing \[[@B19-sensors-18-03702]\]. This method uses microwave interference to demodulate the tested parameters. In addition, the MWP filter can also be used to measure the distance and position with a large range \[[@B20-sensors-18-03702]\]. [Table 1](#sensors-18-03702-t001){ref-type="table"} summarizes the characteristics of the above displacement sensors.
In this paper, a microwave photonics interferometric (MWPI) technique for a non-contact optical fiber displacement sensor was presented with large displacement measurement and high resolution. In addition, this sensor could measure the displacement and position simultaneously. The method adopted a microwave photonics optical fiber Michelson interferometer (MI) and used the microwave interference fringes to demodulate the displacement. A vector network analyzer (VNA) was used to measure and record the microwave response function (S21 parameter) of the sensing system. The displacement of the object to be tested in the sensing arm in the MI would change the phase of the interferometer, which would change the period of the microwave response function out of the interferometer. According to the principle that the phase difference in one free spectral rang (FSR) of the microwave response function is 360°, the displacement can be retrieved by the FSR from the recorded S21 parameters with a simple operation, rapid measurement time and high signal-to-noise ratio. We adopted a programmable path-switching true time delay line in the reference arm to decrease the microwave bandwidth of the devices used in the sensor, which can enlarge the application scope and decrease the cost of the sensor. The performance of the sensor was tested, and the experiment results showed that the measurement resolution of the sensor is 31 μm and the measurement range is larger than 3 m.
2. Materials and Methods {#sec2-sensors-18-03702}
========================
The schematic diagram of the optical fiber sensor based on the MWPI using a microwave photonics optical fiber MI is shown in [Figure 1](#sensors-18-03702-f001){ref-type="fig"}.
Linear polarized light from a broadband amplified spontaneous emission (ASE) light is injected into an electro-optic intensity modulator (EOM). The light is amplitude-modulated by an RF signal from a VNA, and the electro-optic intensity modulator (EOM) is biased at quadrature. The amplitude-modulated light from the EOM is launched into an optical fiber MI. The output light from Port 2 is received by a photodiode (PD), and the detected RF signal from the PD is amplified by a low noise amplifier (LNA). The amplified RF signal from the LNA is received by the VNA. The displacement variation of the mirror in the sensing arm will cause the phase shift of the microwave interference fringes at the output of the PD. The voltage injected into the EOM contains DC bias and the RF signal, which can be expressed as $$V_{in}(t) = V_{dc} + V_{RF}\cos(2\pi f_{m}t)$$ where $V_{dc}$ and $V_{RF}$ are the DC bias and RF signal voltage applied on the EOM, respectively, $f_{m}$ is the frequency of the RF signal. The optical intensity out of the EOM is $$I(t) = \xi I_{0}\cos^{2}\left( {\varphi(t)} \right) = \frac{1}{2}\xi I_{0}\left\lbrack {1 + \cos\left( {\frac{\pi V_{dc}}{V_{\pi}} + \frac{\pi V_{RF}\cos 2\pi f_{m}}{V_{\pi}}} \right)} \right\rbrack$$ where $\varphi(t) = {{\pi V_{dc}}/V_{\pi}} + {{\pi V_{RF}\cos 2\pi f_{m}}/V_{\pi}}$ is the phase shift induced by the EOM, $V_{\pi}$ is the half-wave voltage of the EOM, $\xi$ is the optical power loss factor of the EOM. The intensity-modulated light was injected into the MI. If the optical path from Port 1 to Port 3 is equal to that from Port 1 to Port 4, the two reflection lights from the reference and sensing arms can be expressed as $$I_{1}(t) = \frac{1}{4}\xi I_{0}\left\lbrack {1 + \cos\left( {\frac{\pi V_{DC}}{V_{\pi}} + \frac{\pi V\cos 2\pi f_{m}}{V_{\pi}}} \right)} \right\rbrack$$ $$I_{2}(t) = \frac{1}{4}\xi I_{0}\left\lbrack {1 + \cos\left( {\frac{\pi V_{DC}}{V_{\pi}} + \frac{\pi V\cos\left( 2\pi f_{m} + \Delta\phi \right)}{V_{\pi}}} \right)} \right\rbrack$$ where $\Delta\phi$ is the phase difference of the two arms in the MI and can be expressed as $$\Delta\phi = {{4\pi f_{m}L}/c}$$ where $L$ is the distance between the scanning mirror and the output of the Port 3, $c$ is the velocity of the light. The two lights were detected by the PD, and the RF signal out of the PD is $$I_{out}(t) = \xi R\rho J_{1}\left( \frac{\pi V_{RF}}{V_{\pi}} \right)\left\lbrack {\sin\left( {2\pi f_{m} + \Delta\phi} \right) + \sin\left( {2\pi f_{m}} \right)} \right\rbrack$$ where $R$ is the load, $\rho$ is the response of the PD, $J_{1}$ is the 1th-order Bessel function of the first kind. In the VNA, there is a local oscillator (LO) that can be expressed as $$V_{LO}(t) = V_{LO}\cos(2\pi f_{m}t)$$
The received RF signal from the PD is mixed with the LO signal by a mixer in the VNA, and the microwave response function of the sensor measured by the VNA can be expressed as $$H\left( f_{m} \right) \propto \left( {1 + \sin\left( \frac{4\pi f_{m}L}{c} \right)} \right)$$
From Equation (8) we know that the output of the PD is characterized by period spectral, and the frequency difference in one period is named the free spectral rang (FSR). In one period, the phase difference is 3600, namely, $$\frac{4\pi f_{m}L}{c} = 2\pi$$
The absolute position of the mirror from output end of Port 3 can be expressed as $$L = \frac{c}{2\Delta f_{m}}$$ where $\Delta f_{m}$ is the FSR of the output microwave response function. When the FSRs of the output microwave response function are $\Delta f_{m1}$ and $\Delta f_{m2}$ before and after a displacement has happened, the displacement of the mirror can be expressed as $$\Delta L = \frac{c}{2}\left( {\frac{1}{\Delta f_{m1}} - \frac{1}{\Delta f_{m2}}} \right)$$
3. Results {#sec3-sensors-18-03702}
==========
The experimental setup is shown in [Figure 1](#sensors-18-03702-f001){ref-type="fig"}. The light source was a pigtailed broadband amplified spontaneous emission (ASE), which emitted white light with a central wavelength of 1545 nm and with a spectral bandwidth of 42 nm. The output optical power of the ASE was 20 mW. The white light was polarized by an optical fiber polarizer and then amplitude-modulated by a RF signal from the output port of a vector network analyzer (VNA) using an electro-optic intensity modulator (EOM) that was biased at quadrature. The half-wave voltage of the EOM (EOspace, AX-OMKS-20-PFA-PFA-LV) was 3.6 V at 1 GHz with an insert loss of 3.1 dB and a bandwidth of 20 GHz, respectively. The bias of the EOM was controlled by a circuit module (YYLab, MCB1) at quadrature. The intensity-modulated light from the EOM was injected into one of the input ports of a 2 × 2 directional single-mode optical fiber coupler which was used as an MI. One of the output arms was the sensing arm that connected an optical fiber collimator and the output light from the collimator is incident on a scanning mirror directly. The reflection light from the mirror was coupled into the collimator again. The other output arm of the interferometer was a reference arm with a programmable optical delay line and the output end was connected to a Faraday mirror. The Faraday rotation mirror was used in the reference arm to eliminate the influence of polarization fluctuation on the performance of the sensor. There were variated optical attenuators (VOA) in the two output arms of the interferometer. The function of the two VOAs was to adjust the optical power of the two reflection lights to be equal. The two reflection lights from the two arms were received by a high-speed photodiode. The microwave interference fringes were formed by the high-speed photodiode. The microwave interference fringes signal from the PD was amplified by a low noise amplifier (LNA) and the amplified RF signal was injected into the VNA. The VNA was used to measure the microwave response function of the sensor, and the two ports of the VNA were connected to the EOM and the LNA.
In our measurement, the light intensity received by the PD was −0.4 dBm. In order to obtain a good measurement result, the gain of the LNA was chosen as 26 dB at 12 GHz. In such case, the measured maximum gain at 12 GHz was −22 dB.
The sensor was designed by using the optical fiber MI. In the sensing arm, the output end of the arm was an optical fiber collimator which was the sensing head of the sensor. The diameter of the lens in the collimator is 10 mm. The light from the collimator is directed toward the scanning mirror which served as the object to be tested. The waist diameter of the light beam out of the collimator is 3.6 mm and the divergence angle is 0.030. The back-coupling efficiency is about 70% when the distance from the mirror and the collimator is 3 m. The scanning mirror was mounted on a linear long travel motorized stage whose travel range is 3 m and the minimum achievable increase is 1 μm.
In the MI, the optical path from the optical fiber coupler to the optical fiber collimator in the sensing arm is equal to the optical path from the optical fiber coupler to the optical fiber Faraday mirror. The optical path difference (OPD) of the MI is small when the mirror is near the optical fiber collimator. In such case, the FSR is so large that it needs high bandwidth microwave photonics devices, so a programmable optical delay line was used to enlarge the OPD when the mirror is near the optical fiber collimator to decrease the FSR. The programmable optical fiber delay line is a 2-bit programmable path-switching true time delay line using switching in and out of varying length of the optical fiber by an optical switch. The setup of the 2-bit programmable optical fiber delay line is shown in [Figure 2](#sensors-18-03702-f002){ref-type="fig"}.
The delay line includes two 1 × 2 MEMS optical switches and one 2 × 2 MEMS optical switch. The optical path of the minimum delay path is L1 + L2 + L3 + L6, which is equal to the optical path of the sensing arm with no scanning mirror. The 2-bit programmable delay line can provide four time-delays and the four delay intervals are available as shown in [Table 2](#sensors-18-03702-t002){ref-type="table"}. Larger optical delay can be obtained by using larger bits in the delay line.
The total length of the minimum delay path is about 1 m; in that case, the temperature-induced optical delay variation is 0.4 ps when the temperature variation is 10 °C, which has no influence on the measurement. When the programmable optical delay line was used to decrease the microwave bandwidth, the Equation (11) can be rewritten as $$\Delta L = \frac{c}{2(n - 1)}\left( {\frac{1}{\Delta f_{m1}} - \frac{1}{\Delta f_{m2}}} \right)$$ where $n$ is the refractive index of the single mode optical fiber. The time delay range of the optical delay line is as large as several meters and the continuous delay line can hardly produce such large time delay.
To better understand the performance of the sensor, we moved the scanning mirror to cause a displacement of 540 mm and used the VNA to record the microwave response function of the sensor. [Figure 3](#sensors-18-03702-f003){ref-type="fig"} shows the measured microwave response function of the sensor before and after the displacement of the scanning mirror by the VNA. The sweep range is from 1 GHz to 10 GHz, the sample point is 4000 and the IF bandwidth is 1 KHz. From [Figure 3](#sensors-18-03702-f003){ref-type="fig"} we can find that the microwave response function shifts and the FSR changes when the position of the scanning mirror has a displacement. The FSR decreases when the scanning mirror is far away from the optical fiber collimator, which agrees well with the previous analysis. The optical loss in the sensing arm and the reference arm are different at different mirror positions; two VOAs were used to balance the optical power of the two arms to achieve a maximum visibility of the microwave interference patterns.
The FSR from [Figure 3](#sensors-18-03702-f003){ref-type="fig"} is 1.60712 GHz and 1.01807 GHz, and the calculated displacement is 540.029 mm, which agrees well with the displacement of the linear stage. We move the scanning mirror with several different displacements and record the microwave response function and then obtain the FSR at different displacements. [Figure 4](#sensors-18-03702-f004){ref-type="fig"} shows the relationship between the displacement and the FSR and their line fitting results. The fitting expression is $\Delta f = 149.78208L^{- 0.99965}$, and the correlation coefficient is 0.99995. The fitting result agrees well with Equation (10) where the theoretical expression is $\Delta f = 150L^{- 1}$.
To check the stability of the sensor, we move the scanning mirror with 10 mm ten times and use the proposed sensor to measure the displacement of the mirror. The measurement results are shown in [Figure 5](#sensors-18-03702-f005){ref-type="fig"}. The mean is 10.1052 mm and the standard deviation is 22 μm.
We also evaluate the displacement measurement standard deviation at different displacements from 200 mm to 3 m, and the measurement results are shown in [Figure 6](#sensors-18-03702-f006){ref-type="fig"}. The measurements at each displacement were conducted 10 times. As [Figure 6](#sensors-18-03702-f006){ref-type="fig"} shows, the largest measurement standard deviation is 31 μm when the displacement is within 3 m. The minimum achievable increase of the motorized linear stage is 1 μm whose displacement error can be ignored in the measurement result, so the displacement measurement resolution of the proposed sensor was 31 μm.
It can be seen from Equation (10) that the measurement resolution of this MWPI was mainly limited by the FSR resolution obtained by the VNA. The measurement resolution of the displacement can be determined by the following equation $$\delta(L) = L\sqrt{\frac{\left\lbrack {\delta(\Delta f_{m})} \right\rbrack^{2}}{\left( {\Delta f_{m}} \right)^{2}}}$$
The frequency resolution of the VNA is as high as 1 Hz, which assures that the displacement measurement resolution is very high. According to Equation (13), the theoretical measurement resolution is 60 nm, which is more ideal than the experimental results. The higher error impacted on the measurement accuracy and resolution was caused by the FSR error.
The maximum displacement measured $L_{\max}$ was determined by two factors, including the maximum travel of the linear motorized stage and the divergence angle of the light beam out of the optical fiber collimator. The small divergence angle and beam diameter of the light beam assure high back-coupling efficiency when the travel range of the motorized stage is large. In our measurement, the maximum displacement measured is 3 m which is determined by the motorized stage. Larger displacement measurement can be achieved in our measurement for the divergence angle of the light beam is very small. As the displacement increases, the back-coupling efficiency is lower, and the optical power of the two arms should be adjusted by the two VOAs to assure a high interference visibility. The minimum measured $L_{\min}$ was also determined by the FSR resolution. There is a blind area when the scanning mirror is very close to the optical fiber collimator. In such case, the FSR is so large that it exceeds the frequency span of the VNA. In our measurement, the frequency span of the VNA is 100 KHz to 20 GHz. From Equation (10) we know that the minimum OPD of the MI is 7.9 mm, namely, the minimum distance between the scanning mirror and the optical fiber collimator is 7.9 mm when the optical path in the reference arm is L1 + L2 + L3 + L6.
4. Discussion {#sec4-sensors-18-03702}
=============
MWPI is a simple and powerful technology to measure the displacement rather than the current optical fiber sensor for large DR and high stability. In our measurement, the displacement measurement resolution is 31 μm which is determined by the FSR accuracy. The FSR accuracy is affected seriously by two factors that are the dynamic range (DR) and the noise floor of the microwave response function.
First, when the DR of the microwave response function is low, the valley of the interference fringes is flat and that can impact on the FSR accuracy. There are also two main factors that can impact the DR. One is the microwave interference visibility out of the PD. The interference visibility decreases when the optical power difference of the two arms is not zero. When the scanning mirror is far from the optical fiber collimator or the programmable delay line switches, the optical power will change. We used two VOAs to assure the optical power of the two arms were equal. The other one is the bias point of the EOM. When the bias point deviates the quadrature point, the dynamic range of the microwave interference signal will decrease and a large harmonic wave will appear in the signal.
An inaccurate FSR result would be obtained if the interference visibility is low. [Figure 7](#sensors-18-03702-f007){ref-type="fig"} shows the microwave response function with different DR by adjusting the VOA to change the interference visibility of the MI. As shown in [Figure 7](#sensors-18-03702-f007){ref-type="fig"}, the valley area of the microwave response function becomes much flatter as the interference visibility decreases. In [Figure 7](#sensors-18-03702-f007){ref-type="fig"}b, K represents the optical power ratio of the two arms.
Secondly, the noise floor of the sensor can also affect the FSR accuracy. The noise source of the RF signal includes thermal noise, shot noise of the PD, and relative intensity noise (RIN) of the light source. In our measurement, the RIN is the main noise source. In such a case, more accurate FSR can be easily obtained by measuring the microwave response function several times and averaging the measured data. Decreasing the IF bandwidth of the VNA and using a DFB light source with low RIN can improve the SNR of the microwave interference signal.
The fiber length in the two arms was short, and the fiber was wound to form a ring with a suitable bending radius. Such bending had no impact on the measurement resolution of the sensor if the bending optical fiber was in a steady state and the optical losses of the two arms had no change with bending. We also tested the performance of the sensor when the bending condition of the optical fiber was changing dynamically. The measurement resolution changed largely, which means the dynamic change of the optical fiber condition of the two arms had a serious influence on the performance of the sensor.
The measurement method is based on a microwave response function measurement with a VNA, whose signal-to-noise ratio can be at least 90 dB among 100 KHz to 20 GHz, and the measurement time is about 5 s when the sample point is 4000 and the IF bandwidth is 1 KHz. Under such circumstances, the temperature-induced measurement error is too small to be ignored. By using a programmable path-switching true time delay line, lower bandwidth frequency response devices can be used in our measurement to achieve large displacement measurement and high resolution. The displacement measurement range is determined by the travel range of the linear motorized stage. In practical application, the displacement measurement range is determined by the back-coupling efficiency of the optical fiber collimator and the signal noise ratio of the sensor. The sensing head can be installed easily and the sensor can work when the output light from the sensing head illuminates the surface of the object to be tested with high reflectivity. If the divergence angle of the light out of the optical fiber collimator is so small that it assures the back-coupling efficiency is large, the measurement range of the proposed sensor can reach as high as several kilometers. When the measurement range is as large as hundred meters, the measurement resolution will decrease. In such a case, the programmable path-switching true time delay line can be used to decrease the OPD of the MI to improve the measurement resolution. In addition, the absolute position of the scanning mirror from the output end of the optical fiber collimator can also be obtained by Equation (10). Therefore, this sensor can measure the displacement and absolute position or distance simultaneously. Based on these performances, the proposed sensor is especially suitable in non-contact, remote displacement sensing with a large-scale range.
5. Conclusions {#sec5-sensors-18-03702}
==============
In summary, we proposed an MWPI method for a non-contact optical fiber displacement sensor with large dynamic range and high resolution. The sensor is fabricated by an optical fiber MI and the microwave response parameter was measured to calculate the displacement parameter. One arm of the interferometer is the sensing arm and the reference arm is a programmable path-switching true time delay line. The displacement variation of the object to be tested would change the phase of the interferometer, which will change the FSR of the microwave response function out of the interferometer. According to the principle that the phase difference in one FSR of the microwave response function is 360°, the displacement can be retrieved by the FSR calculated from the recorded S21 parameters. A programmable path-switching true time delay line was used in the reference arm to decrease the frequency response bandwidth of the devices and instruments. The measurement results show that the measurement resolution is 31 μm.
The method has the merits of high signal-to-noise ratio and rapid measurement time, and it is insensitive to environment fluctuation. The displacement can be obtained by a simple measurement process with large DR and high resolution. The main factors which limit the measurement accuracy are the interference visibility of the MI, the bias point of the EOM and the RIN of the light source.
This work was funded by the China Scholarship Council (CSC) to support the first author to conduct this research as an academic visitor in collaboration with the National University of Singapore.
Methodology, J.P.; investigation, H.D. and L.Y.; writing---original draft preparation, S.L.; writing---review and editing, H.D. and supervision, K.C.
This research was funded by the National Natural Science Foundation of China, grant number 11872208.
The authors declare no conflict of interest.
{#sensors-18-03702-f001}
{#sensors-18-03702-f002}
{#sensors-18-03702-f003}
{#sensors-18-03702-f004}
{#sensors-18-03702-f005}
{#sensors-18-03702-f006}
{#sensors-18-03702-f007}
sensors-18-03702-t001_Table 1
######
Summary of the characteristics of the major types of displacement sensors.
Sensor Type Dynamic Range Resolution Accuracy
------------------------ ---------------- ------------ ---------------
Capacitive sensors 10 μm--10 mm 2.4 nm 10 nm--1 μm
Eddy-current sensors 100 μm--80 mm 1 nm 100 nm--10 μm
LVDTs 0.5 mm--500 mm 5 nm 2 μm--1 mm
Linear optical grating 280 mm 1 nm ±140 nm
Laser interferometers 250 mm 0.49 nm ±100 nm
Optical fiber sensors meters nanometer nanometer
MWP sensors 3.5 km 3 μm 3.5 μm
sensors-18-03702-t002_Table 2
######
Optical path difference of the MI with no scanning mirror in the sensing arm.
Path Optical Path Difference
------------------- -------------------------
L1 + L2 + L3 + L6 0
L1 + L4 + L3 + L6 1.2
L1 + L2 + L5 + L6 2.08
L1 + L4 + L5 + L6 3.28
|
{
"pile_set_name": "PubMed Central"
}
|
YAOUNDE (Reuters) - Cameroon security forces killed some 40 Boko Haram militants in clashes in the country’s far north, state radio said on Sunday, shortly after the release of two Italian priests and a Canadian nun suspected to have been held by the Islamist group.
A presidency source confirmed the clashes, which took place west of the town of Kousseri, in the region bordering Nigeria and Chad. Cameroon, which has been criticised by Nigeria for not doing enough to fight the Nigeria-based Boko Haram, deployed some 1,000 troops to the far north this week as it steps up the fight against the Islamist militants.
|
{
"pile_set_name": "OpenWebText2"
}
|
When goods are carried from one point of Community territory to another under cover of a TIR (TIR Convention) or ATA (ATA Convention) carnet, import or export duties and levies are suspended, provided that the arrangements have not been terminated, or a debt incurred. The implementing provisions for the Community Customs Code contain specific rules for adapting the acquis to take account of the provisions of the agreements regarding these two procedures.
ACT
Commission Regulation (EEC) No 2454/93 of 2 July 1993 laying down provisions for the implementation of Council Regulation (EEC) No 2913/92 establishing the Community Customs Code.
SUMMARY
This regulation brings together the provisions for implementing the Community Customs Code in a single text. Part II, Title II, Chapter 9 of this regulation contains the provisions which are applicable to transport under the TIR or ATA procedures. Any matter concerning the application of this regulation may be examined by the Community Customs Code Committee provided for in the Council Regulation on the Customs Code.
Common provisions
When goods are transported inside the Community under TIR or ATA procedures, the Community is considered as forming a single territory for the purposes of the transport operation. For the purposes of using ATA carnets as transit documents, 'transit' means the transport of goods from a customs office situated in the customs territory of the Community to another customs office situated within the same territory.
Where, in the course of transport from one point in the customs territory of the Community to another, goods pass through the territory of a third country, the controls and formalities associated with the TIR or ATA procedure are carried out at the points where the goods temporarily leave the customs territory of the Community and where they re-enter that territory. Goods transported under cover of TIR of ATA carnets within the territory of the Community are regarded as non-Community goods *, unless their Community status is duly established.
The TIR procedure
The TIR procedure is an international customs transit system that applies to the transport of goods without intermediate reloading, between a customs office of departure and a customs office of destination, provided that part of the journey is made by road. The procedure allows goods to be transported across international borders without the payment of the duties and taxes that would normally be due at importation or exportation. As the Community is considered as a single territory, the TIR procedure can only be used within the Community where the movement either starts or ends in a third country, or where the goods move between two or more Community countries via the territory of a third country.
Recipients of goods sent under cover of a TIR carnet, if they are established in the Community, may at their request be granted the status of authorised consignee, if they regularly receive goods under the TIR procedure, provided they have not committed any serious or repeated infringements of customs or tax legislation.
Application of the TIR Convention in the Community
Since 1 January 2009, TIR procedure is treated electronically in the Community. Discharge of the TIR procedure in the Community must be carried out by the customs office of entry or departure after they have received confirmation from the office of destination or exit that the operation was terminated within the time limit prescribed by the customs office or entry or departure. If, after the expiry of the time limit for the office of exit or destination to give the information that the operation was terminated, the competent authorities for discharge still have no proof that the TIR operation has been terminated, an enquiry procedure is initiated.
The procedure is initiated immediately if the discharge authorities are informed in advance that the TIR operation has not been terminated, or when they suspect as much. The enquiry procedure is also initiated if it transpires subsequently that proof of the termination of the TIR operation was falsified. If the competent office does not receive the information enabling it to discharge the operation, it informs the guaranteeing association concerned and the holder of the TIR carnet, within 28 days after the start of the enquiry procedure with the customs office of destination or exit when the TIR operation cannot be discharged.
When infringements or irregularities committed during transport under cover of a TIR carnet result in a Community customs debt, the Member State identified as competent to recover duties or impose penalties initiates the procedure for recovery from the debtor.
When a TIR operation is carried out on the customs territory of the Community, any guaranteeing association established in the Community may become liable for the payment of the secured amount of the customs debt relating to the goods concerned in the TIR operation up to a limit per TIR carnet of EUR 60 000 or the national currency equivalent thereof. The guaranteeing association established in the Member State competent for recovery is liable for payment of the secured amount of the customs debt.
Where customs authorities of a Member State decide to exclude a person from the TIR procedure under the provisions of Article 38 of the TIR Convention, this decision shall apply throughout the customs territory of the Community.
The ATA procedure
The ATA carnet is used for temporary importation, transit and temporary admission of goods designed for specific purposes, duty-free and tax-free (such as professional equipment for presentations or trade fairs, for example).
Where offences or irregularities are committed during a transport operation under cover of an ATA carnet in a given Member State, that Member State is identified as competent to recover any duties and impose penalties. Where it is not possible to determine in which territory the offence or irregularity was committed, it is deemed to have been committed in the Member State where it was detected unless proof to the contrary is provided.
Findings made by the competent authorities of the different Member States, in applying this regulation, have the same force throughout the customs territory of the Community. Where necessary, the competent authorities are required to communicate to one another all information relating to TIR or ATA consignments and to any offences or irregularities noted.
Key terms used in the act
Community goods refers to goods:
entirely obtained in the customs territory of the Community, without the addition of goods from non-member countries or territories which are not part of the customs territory of the Community;
from countries or territories not forming part of the customs territory of the Community which have been released for free circulation in a Member State;
obtained in the customs territory of the Community either from the goods referred to exclusively in the second indent or from the goods referred to in the first and second indents.
Non-Community goods: goods other than those defined as Community goods. Goods reintroduced into the customs territory of the Community after being exported outside that territory are also considered to be non-Community goods.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
SAS EG DATE/TIME IN WHERE CLAUSE
I need to use a date/timestamp field in my where clause where it is >today()1pm
I'm setting it up to be a scheduled task, so the "today()" part is important
I dont know how to combine that with the time piece though
all I could come up with was this- and it seems like very inefficent code if it even works
datepart(fielda)=today() and timepart(fielda)>01:00:00pm
I need to be able to say here are the items with a timestamp of "today" after "1pm"
*I am passing my sql to an underlying database.
A:
If you're using PROC SQL directly (not pass-through) you can use the SAS dhms function:
proc sql noprint;
* Assume myData contains a var named datestamp;
create table selected as
select * from myData
where datestamp > dhms(today(), 13, 0, 0)
;
quit;
The function constructs a datetime value from the supplied Date, Hour, Minutes and Seconds values, hence dhms.
This won't work if your SQL is being passed through to the underlying database because it's unlikely to understand the dhms function.
|
{
"pile_set_name": "StackExchange"
}
|
This relates to the protection of integrated circuits from electrostatic discharge (ESD). More particularly, it relates to the protection of differential circuits from ESD.
ESD protection has been a main concern in the reliability of integrated circuit products in various sub-micron technologies. ESD is the transient discharge of static charge that can arise from activities such as human handling, machine contact or field-induced charging of a packaged IC. Specific models have been developed to represent these discharges such as the Human Body Model (HBM), the Machine Model (MM), and the Charged Device Model (CDM), respectively. See, for example, A. Amerasekera and C. Duvvury, ESD in Silicon Integrated Circuits, pp. 17-40 (2d Ed., Wiley, 2002), which is incorporated herein by reference.
FIG. 1 is a schematic diagram of an illustrative differential circuit 100 with conventional ESD protection circuitry. Differential circuit 100 comprises first and second transistors 110, 130, a clamp transistor 150 and a diode 170. Illustratively, first and second transistors 110, 130 are a low voltage differential signaling (LVDS) output pair. Each transistor 110, 130, 150 is a MOS transistor with a source and drain formed in a body of the transistor and an insulated gate over the body in the region between the source and drain. In the schematic diagram of FIG. 1, the bodies of transistors 110, 130, and 150 are identified as elements 112, 132, 152; the sources are identified as elements 114, 134, 154; the drains are identified as elements 116, 136, 156; and the gates are identified as elements 118, 138, 158, respectively. Sources 114 and 134 are connected together at a source node 190. Resistors 120, 140, 160 are schematic representations of the circuitry between gates 118, 138, 158, respectively, and a common node 180; and resistor 182 is a schematic representation of the circuitry between source node 190 and common node 180. As is known in the art, the actual circuitry represented by these resistors may be considerably more complicated than a simple resistance. Input terminals 122, 142 are connected to gates 118, 138, respectively; and output terminals 124, 144 are connected to drains 116, 136, respectively. Diode 170 may be implemented as a dedicated diode or as the body diode of a MOSFET clamp transistor similar to transistor 150 or as both devices connected in parallel.
As is known in the art, the differential circuit typically comprises several other circuit elements not shown in FIG. 1. For example, transistor 110 is typically driven by circuitry connected to input terminal 122. Additionally, other circuits are connected to output terminal 124 to pull this node up when transistor 110 is in the off state.
Typically, the transistors of differential circuit 100 are NMOS transistors with a P-type body and N-type source and drain regions. As a result, since the P-type body and the N-type source region of each transistor form a first P-N junction and the P-type body and the N-type drain region form a second P-N junction, a parasitic lateral bipolar transistor is present in each transistor. In the event of a positive voltage ESD event on the output terminal 124, circuit 100 is intended to operate so that the second P-N junction of clamp transistor 150 is driven into breakdown and avalanche and the parasitic transistor is triggered into conduction to discharge the ESD pulse.
However, during the ESD event, the body voltage of transistors 110 and 130 can easily float above the source voltage, also making possible bipolar triggering of transistors 110 and 130. For example, as shown in the voltage vs. time plot of FIG. 2A, in the case of a positive ESD event on output terminal 124, the voltages on nodes 180 and 190 will both rise until the voltage on node 180 reaches the threshold voltage of transistor 130 at time t1. Transistor 130 then begins to pull down the voltage at node 190 while the voltage at node 180 is basically pinned at one Vbe above ground by diode 170. While the voltage on node 190 keeps decreasing, the avalanche current in transistor 110 and the voltage at output terminal 124 keep increasing. Eventually, destructive bipolar triggering will occur in transistor 110 when the body-source junction becomes fully forward biased at time t2 leading to a rapid drop in the output voltage. To prevent this, the clamp transistor 150 must trigger before it happens; but it is difficult to assure consistent, timely triggering without significant additional circuitry.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Purely endoscopic resection of a choroid plexus papilloma of the third ventricle: case report.
The authors report an illustrative case of a purely endoscopic surgical approach to successfully remove a solid choroid plexus papilloma of the third ventricle in an infant. A 10-week-old male infant first presented with transient episodes of forced downward gaze, divergent macrocephaly, a tense anterior fontanel, diastasis of the cranial sutures, and papilledema. Brain MRI revealed a small, multilobulated contrast-enhancing mass situated within the posterior third ventricle, with resultant obstructive hydrocephalus. A purely endoscopic removal of the tumor was performed through a single right frontal bur hole. Intraoperatively, a unique vascular tributary was recognized coming from the tela choroidea and was controlled with coagulation and sharp dissection. Postoperative MRI confirmed complete tumor removal, and the tumor was classified as a choroid plexus papilloma. There has been no evidence of tumor recurrence over 42 months of follow-up. With this case report the authors intended to show that endoscopic surgery can be an additional tool to consider when planning a choroid plexus tumor approach. It seems to be of particular interest in selected cases in which there are concerns about the patient's total blood volume, as in infants with potential hemorrhagic tumors and when it is possible to preoperatively identify a single vascular pedicle that can be approached early in the surgery.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Activation of glucagon-like peptide-1 receptor inhibits growth and promotes apoptosis of human pancreatic cancer cells in a cAMP-dependent manner.
Glucagon-like peptide-1 (GLP-1) promotes pancreatic β-cell regeneration through GLP-1 receptor (GLP-1R) activation. However, whether it promotes exocrine pancreas growth and thereby increases the risk of pancreatic cancer has been a topic of debate in recent years. Clinical data and animal studies published so far have been controversial. In the present study, we report that GLP-1R activation with liraglutide inhibited growth and promoted apoptosis in human pancreatic cancer cell lines in vitro and attenuated pancreatic tumor growth in a mouse xenograft model in vivo. These effects of liraglutide were mediated through activation of cAMP production and consequent inhibition of Akt and ERK1/2 signaling pathways in a GLP-1R-dependent manner. Moreover, we examined GLP-1R expression in human pancreatic cancer tissues and found that 43.3% of tumor tissues were GLP-1R-null. In the GLP-1R-positive tumor tissues (56.7%), the level of GLP-1R was lower compared with that in tumor-adjacent normal pancreatic tissues. Furthermore, the GLP-1R-positive tumors were significantly smaller than the GLP-1R-null tumors. Our study shows for the first time that GLP-1R activation has a cytoreductive effect on human pancreatic cancer cells in vitro and in vivo, which may help address safety concerns of GLP-1-based therapies in the context of human pancreatic cancer.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How can I divide a div element's content with CSS selector?
Let's say i have something like that:
<div class="c1">
BlahBlahBlah Some text that I want to fetch.
<br/>
<div class="c2">something does not important.</div>
<a href="blabla.html">a link text</a>
</div>
I want to fetch just "BlahBlahBlah Some text that I want to fetch." text. When I use "div.c1" css selector, It gives "BlahBlahBlah Some text that I want to fetch. something does not important. a link text."
How can I fetch the text that I want?
(Note: HTML code does not contain any mistake, please do not suggest modification, it is certainly as I wrote. The site that I want to fetch text does not belong to me, so I can not change the code.)
A:
Simple answer. You can't. CSS selectors target Nodes, not specific letters in some text. There are small exceptions when you consider pseudo selectors, but you can't accomplish what you want with CSS alone.
The best advice I have is to modify the HTML and wrap the content you want to target in a <span> element and give it a CSS class that you can actually target.
Edit: (Since finding out you can't modify the page and you're using Jsoup to fetch it.)
Since you're using Jsoup to fetch the page and target your Node you simply have one more step to grab your text. Basically, after you select your node and grab the inner text, just run a regex over it and grab everything before the first period.
Your regex should look something like this in Java: "(.*\\.)"
|
{
"pile_set_name": "StackExchange"
}
|
Q:
how to pass format to google cloud translation API using the client library?
We are using google cloud translation API in our express application.
I am trying to do translations using the client library instead of making an API request every time.
1. What I want to know is how to pass the options like format (text or html) to the api while using the client library?
I can achieve this via making http requests using requestjs like this:
var request = require('request');
var url = 'https://translation.googleapis.com/language/translate/v2';
var options1 = {
q: 'amore mio',
target: 'hi',
format: 'text',
source: 'it',
key: 'my API key'
}
request.post({url:url, qs:options1}, (err, res, body)=> {
if(err) {
console.log('ERR: ', err);
}
console.log('RES: ', res.statusCode);
console.log('Body: ', body);
})
But the sample for using client library shows only this:
const {Translate} = require('@google-cloud/translate');
// Your Google Cloud Platform project ID
const projectId = 'YOUR_PROJECT_ID';
// Instantiates a client
const translate = new Translate({
projectId: projectId,
});
// The text to translate
const text = 'Hello, world!';
// The target language
const target = 'ru';
// Translates some text into Russian
translate
.translate(text, target)
.then(results => {
const translation = results[0];
console.log(`Text: ${text}`);
console.log(`Translation: ${translation}`);
})
.catch(err => {
console.error('ERROR:', err);
});
Is there a way I can pass options like 'format' using the client library?
How can I pass an array of strings to the q attribute (querystring) of the options object in the first method? If I pass an array directly like:
q: ['amore mio', 'grazie']
I get an error message :
RES: 400
Body: {
"error": {
"code": 400,
"message": "Required Text",
"errors": [
{
"message": "Required Text",
"domain": "global",
"reason": "required"
}
]
}
}
A:
With respect to question 2 about passing the array of input arguments, this works fine if you use cURL to send the POST request similar to this example. I have tried it myself with success. I have tried to do different manipulations with your code from snipper 1 with the request library, but it seems as if the request library is not passing the array correctly. I would generally suggest using the client library which can successfully handle arrays in the input text.
|
{
"pile_set_name": "StackExchange"
}
|
76th Venice International Film Festival
The 76th annual Venice International Film Festival was held from 28 August to 7 September 2019. Film director Lucrecia Martel was appointed as the President of the Jury. The Truth, directed by Hirokazu Kore-eda, was selected to open the festival. The Golden Lion was awarded to Joker, directed by Todd Phillips.
Jury
Main Competition (Venezia 76)
Lucrecia Martel, Argentine director and screenwriter (Jury President)
Piers Handling, Canadian film historian and critic, executive director of the Toronto International Film Festival
Mary Harron, Canadian director
Stacy Martin, French actress
Rodrigo Prieto, Mexican cinematographer
Shinya Tsukamoto, Japanese filmmaker and actor
Paolo Virzì, Italian director and screenwriter
Horizons
Susanna Nicchiarelli, Italian director and screenwriter (Jury President)
Mark Adams, artistic director of the Edinburgh International Film Festival
Rachid Bouchareb, French filmmaker
Álvaro Brechner, Uruguayan filmmaker
Eva Sangiorgi, artistic director of the Vienna International Film Festival
Luigi De Laurentiis Award for a Debut Film
Emir Kusturica, Serbian director, screenwriter and actor (Jury President)
Antonietta De Lillo, Italian director and screenwriter
Hend Sabry, Tunisian actress
Michael J. Werner, American-Hongkongese film producer
Terence Nance, American filmmaker
Venice Virtual Reality
Laurie Anderson, American composer, artist and director (Jury President)
Francesco Carrozzini, Italian photographer
Alysha Naples, Italian designer
Venice Classics
Costanza Quatriglio, Italian director and screenwriter
Official selection
In Competition
The following films were selected for the main international competition:
Out of competition
The following films were selected to be screened out of competition:
Horizons
The following films were selected for the Horizons () section:
{| class="wikitable" style="width:95%; margin-top:2px; margin-bottom:0px"
! colspan=4| Short films – In competition
|-
! English title
! Original title
! Director(s)
! Production country
|-
| After Two Hours, Ten Minutes Had Passed || Nach zwei Stunden waren zehn Minuten vergangen || data-sort-value="Goldkamp"| Steffen Goldkamp || Germany
|-
| Austral Fever || Fiebre austral || data-sort-value="Woodroffe"| Thomas Woodroffe|| Chile
|-style="background:#FFDEAD;"
| colspan=2| Darling || data-sort-value="Sadiq"| Saim Sadiq || Pakistan, United States
|-
| colspan=2| Delphine || data-sort-value="Robichaud"| Chloé Robichaud || Canada
|-
| colspan=2| The Diver || data-sort-value="Greenfield"| Jamie Helmer, Michael Leonard || France, Australia
|-
| Dogs Barking at Birds || Cães que ladram aos pássaros || data-sort-value="Teles"| Leonor Teles || Portugal
|-
| colspan=2| Give Up the Ghost || data-sort-value="Duraie"| Zain Duraie || Jordan, Sweden
|-
| colspan=2| Kingdom Come || data-sort-value="Dunn"| Sean Robert Dunn || United Kingdom
|-
| Sand || Morae || data-sort-value="Kim"| Kim Kyung-rae || South Korea
|-
| colspan=2| Sh_t Happens || data-sort-value="Štumpf"| David Štumpf, Michaela Mihályi || Czech Republic, Slovakia
|-
| Superheroes Without Superpowers || Supereroi senza superpoteri || data-sort-value="Baldacci"| Beatrice Baldacci || Italy
|-
| The Tears Thing || Le coup des larmes || data-sort-value="Poésy"| Clémence Poésy || France
|-
| colspan=2| Roqaia || data-sort-value="Baldacci"| Diana Saqeb Jamal || Afghanistan, Bangladesh
|}
Venice Classics
The following films were selected to be screened in the Venice Classics section:
Sconfini
The following films were selected for the Sconfini section:
Autonomous sections
International Critics' Week
The following films were selected for the 34th Venice International Critics' Week ():
Venice Days
The following films were selected for the 16th edition of the Venice Days () section:
Awards
Official selection
The following official awards were presented at the 76th edition:
In Competition
Golden Lion: Joker by Todd Phillips
Grand Jury Prize: An Officer and a Spy, by Roman Polanski
Silver Lion: Roy Andersson for About EndlessnessVolpi Cup for Best Actress: Ariane Ascaride for Gloria MundiVolpi Cup for Best Actor: Luca Marinelli for Martin Eden Best Screenplay Award: No.7 Cherry Lane, by Yonfan
Special Jury Prize: The Mafia Is No Longer What It Used to Be by Franco Maresco
Marcello Mastroianni Award: Toby Wallace, BabyteethHorizons (Orizzonti)
Best Film: Atlantis by Valentyn Vasyanovych
Best Director: Théo Court for White on WhiteSpecial Jury Prize: Verdict by Raymund Ribas Gutierrez
Best Actress: Marta Nieto for MadreBest Actor: Sami Bouajila for Bik eneich - Un filsBest Screenplay: Revenir by Jessica Palud
Horizons Prize for Best Short: Darling by Sam Sadiq
Lion of the Future
Luigi De Laurentiis Award for a Debut Film: You Will Die at 20 by Amjad Abu Alala
Venezia Classici Awards
Best Documentary on Cinema: Babenco: Tell Me When I DieBest Restored Film: Ecstasy (1933)
Special Awards
Golden Lion For Lifetime Achievement: Pedro Almodóvar and Julie Andrews
Autonomous sections
The following collateral awards were conferred to films of the autonomous sections:
Venice Days
SIAE Award: Marco Bellocchio for The Traitor GdA Director's Award: La Llorona by Jayro Bustamante
Europa Cinemas Label: Corpus Christi by Jan Komasa
Autonomous awards
Fondazione Mimmo Rotella Award: Donald Sutherland and Mick Jagger for The Burnt Orange Heresy''
Campari Passion for the Cinema Award: Luca Bigazzi for The New Pope
Bresson Award: Lucrecia Martel
References
External links
Category:2019 film festivals
Category:2019 in Italian cinema
Category:August 2019 events in Italy
Category:September 2019 events in Italy
76
Film
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Molecular design and preparation of bis-isophthalate electrochromic systems having controllable color and bistability.
New electrochromic systems based on bis-isophthalates were designed and prepared. They showed electrochromism behavior by two-electron reduction. The displayed colors showed greatly enhanced bistability and were dependent on the length of the conjugated bridge between the two isophthalate groups. We believe that the connection of two electrochromic systems with a conjugated bridge is a good basic strategy to obtain new bistable electrochromic systems.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
# Reviewed by [your name here]
dataset: analcatdata_fraud
description: None yet. See our contributing guide to help us add one.
source: None yet. See our contributing guide to help us add one.
publication: None yet. See our contributing guide to help us add one.
task: classification
keywords:
-
-
target:
type: categorical
description: None yet. See our contributing guide to help us add one.
code: None yet. See our contributing guide to help us add one.
features:
- name: AC1
type: binary
description: # optional but recommended, what the feature measures/indicates, unit
code: # optional, coding information, e.g., Control = 0, Case = 1
transform: # optional, any transformation performed on the feature, e.g., log scaled
- name: AC9
type: binary
description:
code:
transform:
- name: AC16
type: binary
description:
code:
transform:
- name: CL7
type: binary
description:
code:
transform:
- name: CL11
type: binary
description:
code:
transform:
- name: IJ2
type: binary
description:
code:
transform:
- name: IJ3
type: binary
description:
code:
transform:
- name: IJ4
type: binary
description:
code:
transform:
- name: IJ6
type: binary
description:
code:
transform:
- name: IJ12
type: binary
description:
code:
transform:
- name: Total
type: categorical
description:
code:
transform:
|
{
"pile_set_name": "Github"
}
|
Crownthorpe
Crownthorpe is a locality split between the South Burnett Region and the Gympie Region, in Queensland, Australia.
References
Category:South Burnett Region
Category:Gympie Region
Category:Localities in Queensland
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The acting FBI director will testify before the Senate Intelligence Committee on Thursday, two days after President Trump fired FBI Director James Comey.
Andrew McCabe will testify in lieu of Comey, the panel announced Wednesday.
National Intelligence Director Dan Coats Daniel (Dan) Ray CoatsThe Hill's Morning Report - Sponsored by The Air Line Pilots Association - Trump, Biden renew push for Latino support Former Intel chief had 'deep suspicions' that Putin 'had something on Trump': book Overnight Defense: Woodward book causes new firestorm | Book says Trump lashed out at generals, told Woodward about secret weapons system | US withdrawing thousands of troops from Iraq MORE and CIA Director Mike Pompeo will also also testify at the Intelligence Committee’s annual hearing on worldwide threats.
ADVERTISEMENT
McCabe, who became deputy FBI director in 2016, was promoted to acting agency head Tuesday after Trump’s surprise firing of Comey.
Democrats on the committee, including Sen. Mark Warner Mark Robert WarnerIntelligence chief says Congress will get some in-person election security briefings Overnight Defense: Trump hosts Israel, UAE, Bahrain for historic signing l Air Force reveals it secretly built and flew new fighter jet l Coronavirus creates delay in Pentagon research for alternative to 'forever chemicals' House approves bill to secure internet-connected federal devices against cyber threats MORE (D-Va.), signaled after the firing that they still wanted Comey to attend the hearing.
Sen. Ron Wyden Ronald (Ron) Lee WydenGOP senator blocks Schumer resolution aimed at Biden probe as tensions run high Republican Senators raise concerns over Oracle-TikTok deal Hillicon Valley: TikTok, Oracle seek Trump's approval as clock winds down | Hackers arrested for allegedly defacing U.S. websites after death of Iranian general | 400K people register to vote on Snapchat MORE (D-Ore.), also a member of the Intelligence Committee, told reporters, "I think we need to have Director Comey testify as soon as possible … and, by the way, we have an open worldwide threat hearing tomorrow."
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
What retro design, compact-sized digital cameras are there?
I've recently started shooting with the Canon AE-1 Program and am loving it. I do enjoy the film look (it's rather expensive in the long term though) but it's the way I use the camera that really appeals to me. Also I do miss the convenience of digital. Therefore I've been looking around for a digital equivalent that fulfills the following criteria:
compact size
has interchangeable lenses
large and bright viewfinder
ease in manual focusing (ideally, something built for manual focusing)
Basically, just a AE-1 with a digital sensor in place of film. So far I've looked at the Leica M9 and Fujifilm Finepix X100. While the M9 is what I would want, it's just way out of my budget (which is just around $1500, note that this refers to my budget and not how much the M9 costs), and suppose that of most people, whereas the X100 misses on the manual focusing, large viewfinder, and interchangeable lens part. (It still looks fun to use though; just don't wanna plunk down that much money for it.) However, if anyone who's used a X100 can address my concerns for it or workarounds, I'm all ears. :)
So are there any other cameras out there that I should have considered but missed?
I intend to use it solely for street photography.
A:
Considering you were happy using a film camera at least 27 years old, perhaps you could try hunting for a used Leica M8 or Epson R-D1 (here's a review by Steve Huff).
|
{
"pile_set_name": "StackExchange"
}
|
Q:
How to prevent dead-code removal of utility libraries in Haxe?
I've been tasked with creating conformance tests of user input, the task if fairly tricky and we need very high levels of reliability. The server runs on PHP, the client runs on JS, and I thought Haxe might reduce duplicative work.
However, I'm having trouble with deadcode removal. Since I am just creating helper functions (utilObject.isMeaningOfLife(42)) I don't have a main program that calls each one. I tried adding @:keep: to a utility class, but it was cut out anyway.
I tried to specify that utility class through the -main switch, but I had to add a dummy main() method and this doesn't scale beyond that single class.
A:
You can force the inclusion of all the files defined in a given package and its sub packages to be included in the build using a compiler argument.
haxe --macro include('my.package') ..etc
This is a shortcut to the macro.Compiler.include function.
As you can see the signature of this function allows you to do it recursive and also exclude packages.
static include (pack:String, rec:Bool = true, ?ignore:Array<String>, ?classPaths:Array<String>):Void
I think you don't have to use @:keep in that case for each library class.
I'm not sure if this is what you are looking for, I hope it helps.
Otherwise this could be helpful checks:
Is it bad that the code is cut away if you don't use it?
It could also be the case some code is inlined in the final output?
Compile your code using the compiler flag -dce std as mentioned in comments.
If you use the static analyzer, don't use it.
Add @:keep and reference the class+function somewhere.
Otherwise provide minimal setup if you can reproduce.
|
{
"pile_set_name": "StackExchange"
}
|
// Code generated by linux/mkall.go generatePtracePair(arm, arm64). DO NOT EDIT.
// +build linux
// +build arm arm64
package unix
import "unsafe"
// PtraceRegsArm is the registers used by arm binaries.
type PtraceRegsArm struct {
Uregs [18]uint32
}
// PtraceGetRegsArm fetches the registers used by arm binaries.
func PtraceGetRegsArm(pid int, regsout *PtraceRegsArm) error {
return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
}
// PtraceSetRegsArm sets the registers used by arm binaries.
func PtraceSetRegsArm(pid int, regs *PtraceRegsArm) error {
return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
}
// PtraceRegsArm64 is the registers used by arm64 binaries.
type PtraceRegsArm64 struct {
Regs [31]uint64
Sp uint64
Pc uint64
Pstate uint64
}
// PtraceGetRegsArm64 fetches the registers used by arm64 binaries.
func PtraceGetRegsArm64(pid int, regsout *PtraceRegsArm64) error {
return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
}
// PtraceSetRegsArm64 sets the registers used by arm64 binaries.
func PtraceSetRegsArm64(pid int, regs *PtraceRegsArm64) error {
return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
}
|
{
"pile_set_name": "Github"
}
|
Q:
Error when push into gitlab
in this case I have installed a turnkey linux with gitlab. I´ve setted a static ip.
When I push a file it goes ok, but when I push all my symfony project it return an error
$ git push
Counting objects: 7854, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (7449/7449), done.
Writing objects: 100% (7854/7854), 6.45 MiB | 2.08 MiB/s, done.
Total 7854 (delta 2669), reused 0 (delta 0)
error: RPC failed; HTTP 413 curl 22 The requested URL returned error: 413 Request Entity Too Large
fatal: The remote end hung up unexpectedly
fatal: The remote end hung up unexpectedly
Everything up-to-date
What I tried:
Modify the gitlab.yml inside /home/git/gitlab/config change the git max-size to 20971520 (20 mb)
Changed the postBuffer: git config --global http.postBuffer 524288000
also made different commits with a small portion of file, that works but not at all
A:
Another way to make it work as HTTP is to change the the config file og NGINX. The client_max_body_size default is 1M. So inside file /etc/nginx/nginx.conf add something like
http {
client_max_body_size 100M;
}
By this way you can push through HTTP up to 100 mb
|
{
"pile_set_name": "StackExchange"
}
|
A set of comprehensive neuropsychological test batteries is used to provide a complete assessment of various cognitive and sensory function that can be related to damage or dysfunction in different regions of the e brain. The adult battery comprises tests designed to tap the following aspects of behavior: attention, executive function, language, memory, motor functions, orientation, selected sensory and perceptual functions, vigilance and visual-spatial functions. In addition, adults are given a test of general intelligence and. In some studies, subjects are administered a structured psychiatric interview. Modified batteries have been developed for the assessment of infants, preschool children, and children ages 6-16. The data provided by these batteries are being used to construct a neuropsychological theory of the elements of attention that may be applied to the neurological and psychiatric diagnostic groups under study in the LPP. The LPP has as its major focus disorders involving impaired attention, including schizophrenia, epilepsy, eating disorders, affective disorders, head injuries, and AIDs dementia complex. Comparisons are being carries out between the neuropsychological profiles of various groups of psychiatric patients and those of patients with known cerebral lesions in specified brain regions. Our data are also being used to delineate neurobehaviorally-defined subgroups within diagnostic categories, an undertaking aimed at reducing variability in psychiatric diagnosis, treatment, and outcome. The data provided by this protocol provide a complete behavioral assessment that may be integrated with concurrently gathered electrophysiological, neuroradiological, and biochemical information.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Role of cannabinoid receptors in memory storage.
Studies have shown that delta 9-tetrahydrocannabinol, the principal psychoactive ingredient in marijuana, produces memory deficits similar to those produced by neurochemical lesions of the hippocampus. Such lesions impair performance in short-term spatial memory tasks learned prior to the lesion. Animals trained in the behavioral task following the lesion can still perform the task, but learn a different behavioral strategy. Cannabinoid agonists impair behavioral performance in a delay-dependent manner similar to that produced by lesions, but also shift the behavioral response strategy. A possible role for cannabinoid receptors and endogenous cannabinoids may thus be to regulate the storage (i.e., encoding) of information, as well as the means by which that information is retrieved.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
940 F.2d 653
1991 O.S.H.D. (CCH) P 29,462
Unpublished DispositionNOTICE: Fourth Circuit I.O.P. 36.6 states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Fourth Circuit.SOUTHERN OHIO COAL COMPANY, Petitioner,v.FEDERAL MINE SAFETY AND HEALTH REVIEW COMMISSION, ElizabethH. Dole, Secretary of Labor, Respondents.
No. 90-1827.
United States Court of Appeals, Fourth Circuit.
Argued March 6, 1991.Decided Aug. 14, 1991.
On Petition for Review of an Order of the Federal Mine Safety and Health Review Commission.
Henry Cajet, Jackson & Kelly, Washington, D.C. (Argued), for petitioner; Laura E. Beverage, Jackson & Kelly, Charleston, W.Va., David M. Cohen, Southern Ohio Coal Company, Lancaster, Ohio, on brief.
Eva Lee Clark, Office of the Solicitor, United States Department of Labor, Arlington, Va. (Argued), for respondents; Robert P. Davis, Solicitor of Labor, Edward P. Clair, Associate Solicitor, Dennis D. Clark, Counsel, Appellate Litigation, Office of the Solicitor, United States Department of Labor, Arlington, Virginia; L. Joseph Ferrara, Washington, D.C., on brief.
FMSHRC
AFFIRMED.
Before MURNAGHAN and NIEMEYER, Circuit Judges, and W. EARL BRITT, United States District Judge for the Eastern District of North Carolina, sitting by designation.
OPINION
PER CURIAM:
1
On 31 January 1989 an inspector of the Mine Safety and Health Administration ("MSHA") found Southern Ohio Coal Company ("SOCCO") to be in violation of regulations of the Department of Labor and issued an order of withdrawal pursuant to section 104(d)(2) of the Federal Mine Safety and Health Act of 1977, 30 U.S.C. Secs. 801 et seq. (1988) ("the Act"). SOCCO contested the validity of that order before an administrative law judge ("ALJ") who modified and affirmed the order. The decision of the ALJ was affirmed by the Federal Mine Safety And Health Review Commission ("the Commission"). SOCCO continued the review process, as is its right, before this court. See 30 U.S.C. Sec. 816(a)(1). Finding no error, we affirm.
2
* As is evident from its title, the Act was enacted to protect the safety and health of miners. 30 U.S.C. Sec. 801(a). Responsibility for enforcement of the Act rests with MSHA of the Department of Labor. See 30 U.S.C. Sec. 813(a). MSHA inspectors visit the mines regularly to assure compliance with the Act and regulations promulgated thereunder. 30 U.S.C. Sec. 813(a). They have extensive enforcement powers to issue citations and mine closure orders and may impose both civil and criminal penalties. 30 U.S.C. Secs. 814, 820.
3
An operator may contest a citation, order, or a proposed civil penalty assessment before the Commission. 30 U.S.C. Sec. 815(d). The initial proceeding is conducted before an ALJ. 30 U.S.C. Sec. 823(d). Appeals from decisions of the ALJ lie to the full five-member Commission and from the Commission to the court of appeals. 30 U.S.C. Secs. 823(d), 816(a).
II
4
Coal in the mines of SOCCO is removed by the longwall method by which a large shearing machine removes slices of coal from the face of a wall, known as the longwall face. The longwall face is the working end of a large block or panel of coal which, typically, is several hundred feet wide and several thousand feet long. Tunnels, also called "entries," are located along the longwall face (or width) and along each side (or length) of the block or panel. The entry on one end of the longwall face is referred to as the "headgate" entry and the one on the other end is referred to as the "tailgate" entry.
5
Along the length of the panel at the headgate side are two or more entries, in addition to the main headgate entry to the longwall face. One of these entries contains the conveyor belt which transports the extracted coal out of the mine. At least one of the entries serves as a passageway for fresh air to be pumped into the area and as an escape route in the event of an emergency. One or more entries along the other side, the tailgate side, allow the return air to exit the mine. Thus, fresh air is pumped into the mine through the intake entry on the headgate side, flows along the face entry to supply miners with fresh air, and moves out the tailgate entry carrying stale air and dangerous gasses such as methane.1 The tailgate entry also serves as an escape route in the event of an emergency.
6
The shearing machine makes passes back and forth along the longwall face removing about 30 inches of coal on each pass. Hydraulic shields are used to support the roof above the longwall face entry, moving forward as the coal is removed. As the shields move forward the previously supported roof (behind the shields) collapses and becomes a part of the gob, or mined out area. It was the accumulation of loose coal in the intersection of the longwall face and tailgate entries that gave rise to the violations at issue. The intersection of the longwall face and tailgate entries is at the end of the hydraulic shields and loose coal that accumulates there must be removed manually.
7
The accumulation was first observed by inspectors on 30 January 1989 in a pile measuring some 70-feet long, 7- to 8-feet wide, and 4 feet high. At least an 18-foot length of this pile was directly adjacent to the longwall face at the tailgate end, and blocked and impeded travel between the tailgate and longwall face entries. The next day the inspectors returned to the mine and found the accumulation of coal still there, although a small amount of rock dust had been applied to it. A sample taken proved to be 79.2% combustible. SOCCO was cited for violating the mandatory safety standard contained in 30 C.F.R. Sec. 75.400 which requires, in relevant part, that "loose coal, and other combustible materials, shall be cleaned up and not be permitted to accumulate in active workings...." "Active workings" is defined in 30 C.F.R. Sec. 75.2(g)(4) as "any place in a coal mine where miners are normally required to work or travel."
III
8
The findings of fact of the Commission, if supported by substantial evidence, are conclusive. 30 U.S.C. Sec. 816(a)(1). Questions of law are for this court although the Secretary of Labor's interpretation of the Act and mandatory safety standards, if reasonable, is entitled to deference. Chevron, U.S.A., Inc. v. NRDC, Inc., 467 U.S. 837 (1984).
IV
9
SOCCO's central contention is that substantial evidence does not support the finding that persons are normally required to work or travel in the 18-foot area where coal had accumulated and, therefore, it is not an area of "active workings." As previously noted, the 18-foot area is located directly adjacent to the longwall face at the intersection of the longwall face and the tailgate entry. Mining was taking place, and miners were required to be, at the longwall face, directly adjacent to the cited accumulations.
10
For several reasons, the 18-foot area is an area where persons normally work and travel. First, 30 U.S.C. Sec. 75.215 requires that a mine's roof control plan must specify methods that are to be used to maintain a safe travelway out of the longwall mining section through the tailgate side of the longwall. In its roof control plan, SOCCO designated this area as a travelway and required that it be maintained. A mine safety inspector testified that in the event of an emergency at the longwall face, this travelway would be used.
11
Second, 30 C.F.R. Sec. 75.302 requires persons to work and travel in the area to monitor and maintain ventilation controls. There was testimony that SOCCO maintained ventilation controls at the tailgate end of the longwall face. Its clean-up plan required that ventilation curtains be kept tight. In this regard the Commission found:
12
[Inspector] Mitchell testified without dispute that a ventilation curtain was maintained outby the end of the accumulation and that as the face advanced the curtain was moved further outby. He stated, "someone has to go back there to move that." ... It is not an unreasonable inference that miners would therefore normally travel through the intersection to reach the curtain.
13
Third, as previously noted, the tailgate entry is a return air entry and 30 C.F.R. Sec. 75.305 requires that the entry be inspected weekly for safety. There was testimony that a weekly inspection was conducted. And, as the Commission found, "[t]o enter the tailgate entry from the longwall face, a person must pass through the intersection of the face and the tailgate entry, specifically through the area immediately adjacent to the outby end of the accumulation."
14
There was substantial evidence to support the finding by the Commission that the area was one where miners normally work or travel and, thus, an "active working" within the meaning of the Act.
15
SOCCO argues that "[a] hazardous area in which the mining process contemplates continuous, systematic, planned roof falls where persons do not normally work or travel cannot be considered 'active workings' subject to compliance with 30 C.F.R. Sec. 75.400...." Of course, our holding that miners do normally work and travel in the area destroys a necessary underpinning of this argument. Even so, SOCCO seems to argue that there is more danger to miners from roof failure, if they are required to enter the area to clean it up, than from the fire or explosion hazard that the regulation is designed to prevent. This contention is meritless.
16
Congress has specifically identified ignition and explosion sources as being primary causes of deaths and injuries to coal miners. Secretary of Labor v. Old Ben Coal Co., 1 FMSHRC 1954, 19561957 (1979). 30 C.F.R. Sec. 75.400 addresses the hazard created when combustible materials are permitted to accumulate and is a codification of the statutory standard mandated by Congress in section 304(a) of the Coal Mine Health and Safety Act of 1969, 30 U.S.C. Secs. 801 et seq. (1976) (amended 1977), which is identical to section 304(a) of the present Act. Id. Through this standard, Congress hoped to achieve its goal of eliminating ignition and fuel sources for explosions and fires. Id.
17
SOCCO's interest in the safety of its miners who have to remove coal from the area is commendable. However, whether those miners face greater danger from roof cave-in than from fire, explosion and blocking of escape routes is a decision entrusted by the Congress to the Secretary so long as the decision is in accordance with law and supported by substantial evidence. The decision here meets both criteria and will not be disturbed.
18
AFFIRMED.
1
Methane is liberated when coal is cut
|
{
"pile_set_name": "FreeLaw"
}
|
---
abstract: 'The graviton localized on the $3$-brane is examined in Randall-Sundrum brane-world scenario from the viewpoint of one-dimensional singular quantum mechanics. For the Randall-Sundrum single brane scenario the one-parameter family of the fixed-energy amplitude is explicitly computed where the free parameter $\xi$ parametrizes the various boundary conditions at the brane. The general criterion for the localized graviton to be massless is derived when $\xi$ is arbitrary but non-zero. When $\xi=0$, the massless graviton is obtained via a coupling constant renormalization. For the two branes picture the fixed-energy amplitude is in general dependent on the two free parameters. The numerical test indicates that there is no massless graviton in this picture. For the positive-tension brane, however, the localized graviton becomes massless when the distance between branes are infinitely large, which is essentially identical to the single brane picture. For the negative-tension brane there is no massless graviton regardless of the distance between branes and choice of boundary conditions.'
address: 'Department of Physics, Kyungnam University, Masan, 631-701, Korea.'
author:
- 'D. K. Park and Hungsoo Kim'
title: 'Singular Quantum Mechanical Viewpoint of Localized Gravity in Brane-World Scenario'
---
Introduction
============
The first Randall-Sundrum(RS1) brane-world scenario[@rs99-1] was designed to solve the gauge hierarchy problem which is one of the longstanding puzzle in physics. To examine this problem they have introduced two branes located at the boundary of the compactified fifth dimension. The second Randall-Sundrum(RS2) scenario[@rs99-2] is followed from RS1 by remoting one of the brane to infinity. The most remarkable feature of RS2 scenario is that it leads to a massless graviton localized on the 3-brane at the linearized fluctuation level[@garr00; @duff00]. In this paper we will explore the localized RS graviton problem at RS1 and RS2 from the viewpoint of the singular quantum mechanics.
In addition to its good features on hierarchy and localized graviton problem, RS picture supports a non-static cosmological solution[@bine99; @csa99; @cline99] which leads to the conventional Friedmann equation if one introduces the bulk and brane cosmological constants and imposes a particular fine-tuning condition between them. Furthermore, RS scenario is also applied to the cosmological constant hierarchy[@kim01; @alex01] and black hole physics[@cham00; @emp00; @gidd00].
The bulk spacetime of RS scenario is two copies of $AdS_5$ glued in a $Z_2$-symmetric way along a boundary which is interpreted as the 3-brane world-volume. It is explicitly seen by examing the line elements; $$\begin{aligned}
\label{line}
ds^2&=&e^{-2kr_c |\phi|} \eta_{\mu \nu} dx^{\mu} dx^{\nu} + r_c^2
d\phi^2
\hspace{2.0cm} \mbox{(RS1)} \\ \nonumber
ds^2&=&e^{-2k |y|} \eta_{\mu \nu} dx^{\mu} dx^{\nu} + dy^2
\hspace{2.7cm} \mbox{(RS2)}\end{aligned}$$ where $|\phi| \leq \pi$ and $|y| < \infty$. The parameter $r_c$ is a radius of the compactified fifth dimension. The anology of RS scenario to $AdS$/CFT[@mal98] enables us to explore the finite temperature effect in RS brane-world scenario by extending $AdS_5$ bulk spacetime to Schwarzschild-$AdS_5$[@park01-1; @park01-2].
Inserting the small fluctuation equations $$\begin{aligned}
\label{fluctua}
ds^2&=&\left(e^{-2kr_c |\phi|} \eta_{\mu \nu} + h_{\mu \nu}(x, \phi) \right)
dx^{\mu} dx^{\nu} + r_c^2 d\phi^2
\hspace{1.5cm} \mbox{(RS1)} \\ \nonumber
ds^2&=&\left(e^{-2k |y|} \eta_{\mu \nu} + h_{\mu \nu}(y) \right)
dx^{\mu} dx^{\nu} + dy^2
\hspace{2.7cm} \mbox{(RS2)}\end{aligned}$$ to $5d$ Einstein equation one can derive a gravitational fluctuation equation $$\begin{aligned}
\label{grafluc}
& &\hat{H}_{RS} \hat{\psi}(z) = \frac{m^2}{2} \hat{\psi}(z) \\ \nonumber
& &\hat{H}_{RS} = -\frac{1}{2} \partial_z^2 + V_i(z)\end{aligned}$$ where $i=1.2$ represents $i^{th}$ RS scenario. For each RS scenario the potential becomes $$\begin{aligned}
\label{potential}
V_1(z)&=&\frac{15 k^2}{8(k|z| + 1)^2} - \frac{3}{2} k
\left[ \delta(z) - \delta(z - z_0) \right] \\ \nonumber
V_2(z)&=&\frac{15 k^2}{8(k|z| + 1)^2} - \frac{3}{2} k \delta(z)\end{aligned}$$ where $z_0 = (e^{k r_c \pi} - 1) / k$. The function $\hat{\psi}(z)$ is related to the linearized gravitational field $h$ as follows $$\begin{aligned}
\label{relation1}
h(x, \phi)&=& e^{-\frac{k}{2} r_c |\phi|} \hat{\psi} e^{ipx}
\hspace{2.0cm} \mbox{(RS1)} \\ \nonumber
h(x, y)&=&e^{-\frac{k}{2} |y|} \hat{\psi} e^{ipx}
\hspace{2.3cm} \mbox{(RS2)}\end{aligned}$$ where $m^2 = -p^2$ and $$\begin{aligned}
\label{changeofv}
z&=&\epsilon(\phi) \frac{e^{k r_c |\phi|} - 1}{k}
\hspace{2.8cm} \mbox{(RS1)} \\ \nonumber
z&=&\epsilon(y) \frac{e^{k|y|} - 1}{k}.
\hspace{3.1cm} \mbox{(RS2)}\end{aligned}$$ Since all components are same, Lorentz indicies $\mu$ and $\nu$ are suppressed in Eq.(\[relation1\]).
When deriving the linearized fluctuation equation (\[grafluc\]), we have used the RS gauge choice $$\label{gauge}
h^{\mu}_{\nu,\mu} = h^{\mu}_{\mu} = 0,
\hspace{2.0cm}
h_{55} = h_{\mu 5} = 0$$ for each RS scenario. This gauge choice, however, generally generates a non-trivial bending effect on the brane[@garr00]. The bending effect usually makes the linearized fluctuation equation (\[grafluc\]) to be non-homogeneous form, [*i.e.*]{} $(\hat{H}_{RS} - m^2/2) \hat{\psi} \neq 0$. Thus, inclusion of the bending effect makes the stroy to be more complicated. In this paper we will not consider the bending effect for simplicity.
The linearized fluctuation equation (\[grafluc\]) looks like usual Schrödinger equation. From the purely mathematical point of view the Hamiltonian operator $\hat{H}_{RS}$ in Eq.(\[grafluc\]) is a singular operator due to the singular $\delta$-function potential in $V_i$. In the path-integral framework[@fey65; @schul81] the $1d$ $\delta$-function potential was treated by Schulman about one and half decades ago as follows[@schul86].
Let us consider $1d$ Hamiltonian $$\label{example1}
H = H_V + v \delta(x)$$ where $$\label{example2}
H_V = \frac{p^2}{2} + V(x).$$ It is well-known that the Euclidean propagator $G[x_1, x_2; t]$ for $H$ obeys the following integral equation $$\label{inteq}
G[x_1, x_2; t] = G_V[x_1, x_2: t] - v \int_0^t ds \int dx
G_V[x_1, x; t-s] \delta(x) G[x, x_2; s]$$ where $G_V[x_1, x_2: t]$ is an Euclidean propagator for $H_V$. The Euclidean propagator $G[x_1, x_2; t]$ is related to the usual Feynman propagator(or Kernel) $K[x_1, x_2; t]$ as follows; $$\label{kerneldef}
K[x_1, x_2; t] = G[x_1, x_2; it].$$ Taking a Laplace transform $$\label{lapdef}
\hat{f} \equiv {\cal L} f(t) \equiv \int_0^{\infty} dt e^{-Et} f(t)$$ to both sides of Eq.(\[inteq\]) yields $$\label{example3}
\hat{G}[x_1, x_2; E] = \hat{G}_V[x_1, x_2; E] - v \hat{G}_V[x_1, 0; E]
\hat{G}[0, x_2; E]$$ which supports a solution $$\label{example4}
\hat{G}[0, x_2; E] = \frac{\hat{G}_V[0, x_2; E]}{1 + v \hat{G}_V[0, 0, E]}.$$ Inserting Eq.(\[example4\]) into Eq.(\[example3\]) again completes Schulman’s procedure; $$\label{schulman}
\hat{G}[x_1, x_2; E] = \hat{G}_V[x_1, x_2; E] -
\frac{\hat{G}_V[x_1, 0; E] \hat{G}_V[0, x_2; E]}
{\frac{1}{v} + \hat{G}_V[0, 0; E]}.$$ The usual energy-dependent Green’s function $\hat{K}[x_1, x_2; E]$ which is a Fourier transform of $K[x_1, x_2; t] \theta(t)$, where $\theta(t)$ is a step function, is also evaluated from the corresponding fixed-energy amplitude $\hat{G}[x_1, x_2; E]$ by a relation $$\label{example5}
\hat{K}[x_1, x_2; E] = -i \hat{G}[x_1, x_2; -E]$$ where $-E$ in $\hat{G}$ is a usual Euclidean nature. Of course, one can compute the Feynman propagator by taking an inverse Laplace transform to $\hat{G}[x_1, x_2; E]$ and using a relation (\[kerneldef\]).
Extension of Schulman’s procedure to higher dimensional cases is not straightforward due to the infinity arising from origin. In these cases we have to modify Eq.(\[schulman\]) appropriately to escape the ultraviolet divergence[@park95]. Especially, $2d$ case is very interesting because a lot of non-trivial effects are involved in $2d$ $\delta$-function potential such as scale anomaly and dimensional transmutation. In Ref.[@jack91] Jackiw explored the $2d$ $\delta$-function potential system by making use of the physically-oriented coupling constant renormalization and the mathematically-oriented self-adjoint extension[@capri85; @albev88]. He also derived the relation of the renormalized coupling constant to the self-adjoint extension parameter. His result is generalized within a path-integral or Green’s function formalism in Ref.[@park95; @gros93; @gros95; @park96; @park98].
The purpose of this paper is to examine the property of the localized gravity in RS1 and RS2 scenario by treating Eq.(\[grafluc\]) as a Schrödinger equation. In this paper we adopt $AdS$/CFT setting, [*i.e.*]{} single copy of $AdS_5$ spacetime with a singular brane on the boundary. The $AdS$/CFT setting generates non-trivial constraints. For RS1 and RS2 it generates $1d$ box($0\leq \phi \leq \pi$) and half-line($0 \leq y < \infty$) constraints respectively. These constraints makes the fixed-energy amplitude for $\hat{H}_{RS}$ to be crucially dependent on the boundary conditions(BCs). The combination of these constraints with a singular $\delta$-function potential makes the situation to be complicated. The fascinating fact is that Dirichlet BC requires a coupling constant renormalization to lead a non-trivial fixed-energy amplitude although our case is one-dimensional singular quantum mechanics.
The paper is organized as follows. In section 2 we will consider the free particle case with an half-line constraint and $\delta$-function potential at the boundary as a toy model of RS2 case. In this section we will show how BCs play important roles in this simple singular quantum mechanics. Also we will show why coupling constant renormalization is necessary to lead a non-trivial modification in the fixed-energy amplitude at Dirichlet BC. In section 3 we will compute the fixed-energy amplitude for RS2[@park01-3] which depends on a free parameter $\xi$ where $\xi=0$ and $\xi=1$ correspond respectively to pure Dirichlet and pure Neumann BC cases. We will derive in this section the general criterion in the parameter space for the localized graviton on the 3-brane to be massless. We will also show that the massless graviton at $\xi = 0$ is followed via a coupling constant renormalization. In section 4 we will consider the free particle case with an $1d$-box constraint and $\delta$-function potentials at the both boundaries as a toy model of RS1. The final expression is dependent on the two free parameters $\xi_1$ and $\xi_2$ which parametrize the BCs arising at both boundaries of $1d$ box. In section 5 we will compute the fixed-energy amplitude for RS1 which depends on two free parameters $\xi_1$ and $\xi_2$. We will show in this section that there is no localized massless graviton on both branes. For positive-tension brane, however, the massless graviton can appear when the width of $1d$ box is infinity, which is essentially identical to RS2. For the negative-tension brane our numerical calculation indicates there is no localized massless graviton regardless of the size of $1d$ box. In final section a brief conclusion is given.
Toy Model 1: Free Particle on a half-line with $\delta$-function Potential
==========================================================================
In this section as a toy model of RS2 we will examine Green’s function for the free particle system defined on a half-line($x \geq 0$) with $\delta$-function potential whose Hamiltonian is $$\label{toy1hamil1}
\hat{H} = \hat{H}_0^> - v \delta(x)$$ where $\hat{H}_0^>$ is a free particle Hamiltonian with the half-line constraint, [*i.e.*]{} $$\label{toy1hamil2}
\hat{H}_0^> = -\frac{1}{2} \partial_x^2
\hspace{2.0cm}
(x \geq 0).$$ Of course the main problem in this model is how to compute the fixed-energy amplitude for $\hat{H}_0^>$. Once this is completed, one can derive a fixed-energy amplitude for $\hat{H}$ by employing the Schulman procedure described in the previous section.
We start with a fixed-energy amplitude $\hat{G}_F[x, y; E]$ for free particle without any constraint $$\label{free1}
\hat{G}_F[x, y; E] = \frac{e^{-\sqrt{2E} |x - y|}}{\sqrt{2E}}.$$ Then, the fixed-energy amplitude for $\hat{H}_0^>$ can be computed as follows from $\hat{G}_F[x, y; E]$. First, we have to note that the fixed-energy amplitude for $\hat{H}_0^>$ is dependent on BC at $x = 0$ arising due to the half-line constraint. The usual Dirichlet or Neumann BCs at $x = 0$ are properly incorporated into the path-integral formalism using $\delta$- and $\delta^{\prime}$-function potentials with infinite coupling constant[@gros93; @gros95]; $$\begin{aligned}
\label{deldel}
\hat{G}_F^D[a, b; E]&=&\hat{G}_F[a, b; E] -
\frac{\hat{G}_F[a, 0; E] \hat{G}_F[0, b; E]}{\hat{G}_F[0^+, 0; E]}
\\ \nonumber
\hat{G}_F^N[a, b; E]&=&\hat{G}_F[a, b; E] -
\frac{\hat{G}_{F, b}[a, 0; E] \hat{G}_{F, a}[0, b; E]}{\hat{G}_{F, ab}[0^+, 0; E]}.\end{aligned}$$ where the superscripts $D$ and $N$ stand for Dirichlet and Neumann respectively. The explicit calculation shows $$\begin{aligned}
\label{toy1dn}
\hat{G}_F^D[a, b; E]&=&\frac{e^{-\sqrt{2E} |x - y|}}{\sqrt{2E}} -
\frac{e^{-\sqrt{2E}(|a| + |b|)}}{\sqrt{2E}} \\ \nonumber
\hat{G}_F^N[a, b; E]&=&\frac{e^{-\sqrt{2E} |x - y|}}{\sqrt{2E}} +
\frac{\epsilon(a) \epsilon(b) e^{-\sqrt{2E}(|a| + |b|)}}{\sqrt{2E}}.\end{aligned}$$ One can show easily $\hat{G}_F^D$ and $\hat{G}_F^N$ satisfy the following BCs; $$\begin{aligned}
\label{toy1bcs}
\hat{G}_F^D[a, 0; E]&=&\hat{G}_F^D[0, b; E] = 0
\\ \nonumber
\hat{G}_{F, b}^N[a, 0; E]&=&\hat{G}_{F, a}[0, b; E] = 0.\end{aligned}$$ Then, the general fixed-energy amplitude for $\hat{H}_0^>$ can be obtained by linearly combining $\hat{G}_F^D$ and $\hat{G}_F^N$; $$\label{toy1gen1}
\hat{G}_F^{\xi}[a, b; E] = \xi \hat{G}_F^N[a, b; E] + (1 - \xi)
\hat{G}_F^D[a, b; E]$$ where $\xi(0 \leq \xi \leq 1)$ is real parameter parametrizing the BCs at the origin. Of course $\xi=0$ and $\xi=1$ represent the pure Dirichlet and pure Neumann BCs respectively. Another interesting case is $\xi= 1/2$, in which the contribution of Neumann and Dirichlet have an equal weighting factors. Since the fixed-energy amplitude $\hat{G}_F^{\xi}$ is in general expressed in terms of eigenvalues $E_n$ and eigenfunctions $\phi_n$ of $\hat{H}_0^>$ as follows $$\label{toy1eigen}
\hat{G}_F^{\xi}[a, b; E] = \sum_n \frac{\phi_n(a) \phi_n^{\ast}(b)}{E - E_n},$$ the $\xi=1/2$ case should correspond to the free particle case without any constraint at the origin.
Following Schulman procedure one can calculate the fixed-energy amplitude $\hat{G}^{\xi}$ for $\hat{H}$ from $\hat{G}_F^{\xi}$ as follows; $$\label{toy1modi}
\Delta \hat{G}^{\xi}[a, b; E] \equiv
\hat{G}^{\xi}[a, b; E] - \hat{G}_F^{\xi}[a, b; E] =
\frac{4 \xi^2}{\frac{\sqrt{2E}}{v} - 2 \xi}
\frac{e^{-\sqrt{2E}(|a| + |b|)}}{\sqrt{2E}}.$$ At $\xi = 1$ and $\xi=1/2$ the fixed-energy amplitudes are simply reduced to $$\begin{aligned}
\label{toy1nrs}
\hat{G}^{\xi=1}[a, b; E]&=& \frac{e^{-\sqrt{2E} |a -b|}}{\sqrt{2E}} +
\frac{\frac{\sqrt{2E}}{v} + 2}{\frac{\sqrt{2E}}{v} - 2}
\frac{e^{-\sqrt{2E} (|a| + |b|)}}{\sqrt{2E}} \\ \nonumber
\hat{G}^{\xi=\frac{1}{2}}[a, b; E]&=& \frac{e^{-\sqrt{2E} |a -b|}}{\sqrt{2E}} +
\frac{e^{-\sqrt{2E} (|a| + |b|)}}{\sqrt{2E} \left(\frac{\sqrt{2E}}{v} - 1\right)
}\end{aligned}$$ and the corresponding bound state energies $B(\xi)$ arising due to the $\delta$-function potential are $$\begin{aligned}
\label{toy1bound1}
B(\xi = 1)&=& -2 v^2 \\ \nonumber
B(\xi = \frac{1}{2})&=& = - \frac{v^2}{2}.\end{aligned}$$
Finally, let us consider $\xi = 0$ case. In this case Eq.(\[toy1modi\]) shows that the modification term $\Delta \hat{G}^{\xi = 0}$ vanishes. This means the $\delta$-function potential in Eq.(\[toy1hamil1\]) does not play any important role. In fact this is obvious if we consider the fact that at $\xi = 0$ the Hamiltonian $\hat{H}^>_0$ describes the free particle system plus $\lim_{\alpha \rightarrow \infty} \alpha \delta(x)$ which makes the half-line constraint. Thus, the $\delta$-function potential in eq.(\[toy1hamil1\]) is absorbed to $\hat{H}^>_0$.
Even in this case, however, one can derive a non-trivial fixed-energy amplitude under the assumption that $v$ is infinite bare coupling constant by adopting the coupling constant renormalization. To show this explicitly we re-express the modification term $\Delta \hat{G}^{\xi = 0}$ as folllows; $$\label{toy1dmodi}
\Delta \hat{G}^{\xi = 0}[a, b; E] =
\lim_{\epsilon \rightarrow 0^+}
\frac{\hat{G}_F^{\xi = 0}[a, \epsilon; E] \hat{G}_F^{\xi = 0}[\epsilon, b; E]}
{\frac{1}{v} - \hat{G}_F^{\xi = 0}[\epsilon, \epsilon; E]}.$$ Expanding the denominator and numerator separately one can conclude $$\label{toy1dmodi2}
\Delta \hat{G}^{\xi = 0}[a, b; E] =
\frac{2}{\sqrt{2E} - v^{ren}} e^{-\sqrt{2E}(|a| + |b|)}$$ where the renormalized coupling constant $v^{ren}$ is defined as $$\label{toy1rencop}
v^{ren} = \frac{1}{2 \epsilon^2} \left( 2 \epsilon - \frac{1}{v} \right).$$ It is easy to show that $v^{ren}$ has a same dimension with the bare coupling constant $v$. Following the philosophy of renormalization we regard $v^{ren}$ as a finite quantity. Combining Eq.(\[toy1dn\]) and Eq.(\[toy1dmodi2\]) we get finally $$\label{toy1dfinal}
\hat{G}^{\xi = 0}[a, b; E] = \frac{e^{-\sqrt{2E} |a - b|}}{\sqrt{2E}}
+ \frac{\frac{\sqrt{2E}}{v^{ren}} + 1}
{\frac{\sqrt{2E}}{v^{ren}} - 1}
\frac{e^{-\sqrt{2E}(|a| + |b|)}}{\sqrt{2E}}$$ whose bound state energy is $B(\xi=0) = - (v^{ren})^2 / 2$.
In the next section we will apply the analysis in this toy model to the RS2 scenario.
Fixed-Energy Amplitude for RS2
==============================
Recently, one of the present authors computed the fixed-energy amplitude for RS2 at Ref.[@park01-3] which will be reviewed in this section briefly. Furthermore we will derive the general condition in the parameter space for the appearance of the localized massless graviton.
The Hamiltonian for RS2 can be read from Eq.(\[grafluc\]) and (\[potential\]) easily; $$\begin{aligned}
\label{rs2hamil1}
\hat{H}_{RS2}&=&\hat{H}_0 - v \delta(z) \\ \nonumber
\hat{H}_0&=& -\frac{1}{2} \partial_z^2 +
\frac{g}{(|z| + c)^2}.\end{aligned}$$ Of course, we can obtain the exact RS2 Hamiltonian by letting $g=15/8$, $c = 1/k \equiv R$ and $v = 3k / 2$, where $R$ is the radius of $AdS_5$. In this section, however, we do not require them from the beginning. In other words we will compute the fixed-energy amplitude for arbitrary $g$, $c$, and $v$ when the half-line constraint ($z \geq 0$) is imposed. This will give us the general condition for the localized graviton on the brane to be massless.
The half-line constraint makes $\hat{H}_0$ in Eq.(\[rs2hamil1\]) to be a following simple form; $$\label{rs2hamil2}
\hat{H}_0 = -\frac{1}{2} \partial_x^2 + \frac{g}{x^2}$$ where $x = z + c$. Thus our half-line constraint $z \geq 0$ is changed into $x \geq c$. If $c = 0$, the Euclidean propagator $G_{>0}[a, b; t]$ and the corresponding fixed-energy amplitude $\hat{G}_{>0}[a, b; E]$ for Hamiltonian (\[rs2hamil2\]) are given at Ref.[@schul81]; $$\begin{aligned}
\label{rs2schul}
G_{>0}[a, b; t]&=&\frac{\sqrt{a b}}{t} e^{-\frac{a^2 + b^2}{2 t}}
I_{\gamma}\left( \frac{a b}{t} \right) \\ \nonumber
\hat{G}_{>0}[a, b; E]&=& 2 \sqrt{a b}
I_{\gamma}\left( \sqrt{\frac{E}{2}} [(a + b) - |a - b|] \right)
K_{\gamma}\left( \sqrt{\frac{E}{2}} [(a + b) + |a - b|] \right)\end{aligned}$$ where $I_{\gamma}(z)$ and $K_{\gamma}(z)$ are the usual modified Bessel functions, and $\gamma = \sqrt{1 + 8 g} / 2$.
The main problem for the computation of the fixed energy amplitude for $\hat{H}_0$ in Eq.(\[rs2hamil2\]) is how to adopt an asymmetric constraint $x \geq c$ in terms of $x$. However, this is already explained at the previous section by introducing an infinite energy barrier. In the asymmetric barrier the fixed-energy amplitude will be dependent on the BC at $x = c$. Hence, the final form will be one parameter family type $$\label{rs2onepara}
\hat{G}_0^{\xi}[a, b; E] = \xi \hat{G}_0^N[a, b; E] +
(1 - \xi) \hat{G}_0^D[a, b; E]$$ where $\hat{G}_0^N$ and $\hat{G}_0^D$ are the fixed-energy amplitudes which obey the Neumann and Dirichlet BCs respectively at $x = c$. Of course, $\hat{G}_0^N$ and $\hat{G}_0^D$ can be calculated from $\hat{G}_{>0}[a, b; E]$ introducing $\delta$- and $\delta^{\prime}$-functions as we did in the previous section; $$\begin{aligned}
\label{rs2gdgn}
\hat{G}_0^D[a, b; E]&=&\hat{G}_{>0}[a, b; E] -
\frac{\hat{G}_{>0}[a, c; E] \hat{G}_{>0}[c, b; E]}
{\hat{G}_{>0}[c^+, c; E]} \\ \nonumber
\hat{G}_0^N[a, b; E]&=&\hat{G}_{>0}[a, b; E] -
\frac{\hat{G}_{>0, b}[a, c; E] \hat{G}_{>0, a}[c, b; E]}
{\hat{G}_{>0, ab}[c^+, c; E]}.\end{aligned}$$
Inserting Eq.(\[rs2schul\]) into Eq.(\[rs2gdgn\]) one can derive the explicit forms of $\hat{G}_0^D$ and $\hat{G}_0^N$; $$\begin{aligned}
\label{rs2gdgn2}
\hat{G}_0^D[a, b; E]&=&\hat{G}_{>0}[a, b; E] - 2 \sqrt{a b}
\frac{I_{\gamma}(\sqrt{2E} c)}{K_{\gamma}(\sqrt{2E} c)}
K_{\gamma}(\sqrt{2E} a) K_{\gamma}(\sqrt{2E} b)
\\ \nonumber
\hat{G}_0^N[a, b; E]&=&\hat{G}_{>0}[a, b; E] + 2 \sqrt{a b}
\frac{f_I(c, E)}{f_K(c, E)}
K_{\gamma}(\sqrt{2E} a) K_{\gamma}(\sqrt{2E} b)\end{aligned}$$ where $$\begin{aligned}
\label{fkfi}
f_K(x, E)&=& \frac{\gamma - \frac{1}{2}}{\sqrt{2E} x} K_{\gamma}(\sqrt{2E} x)
+K_{\gamma - 1}(\sqrt{2E} x) \\ \nonumber
f_I(x, E)&=&I_{\gamma - 1}(\sqrt{2E} x)
- \frac{\gamma - \frac{1}{2}}{\sqrt{2E} x} I_{\gamma}(\sqrt{2E} x).\end{aligned}$$ The useful relation which will be used frequently is $$\label{frequent}
f_K(x, E) I_{\gamma}(\sqrt{2E} x) + f_I(x, E) K_{\gamma}(\sqrt{2E} x)
= \frac{1}{\sqrt{2E} x}.$$
Following Schulman procedure it is straightforward to derive a fixed-energy amplitude for $\hat{H}_{RS2}$; $$\label{rs2schulman}
\hat{G}_{RS2}[a, b; E] = \hat{G}_0^{\xi}[a, b; E]
+ \frac{\hat{G}_0^{\xi}[a, c; E]\hat{G}_0^{\xi}[c, b; E]}
{\frac{1}{v} - \hat{G}_0^{\xi}[c^+, c; E]}$$ where $\hat{G}_0^{\xi}$ is given in Eq.(\[rs2onepara\]). The most convenient form of $\hat{G}_{RS2}$ is $$\begin{aligned}
\label{rs2conven}
\hat{G}_{RS2}[a, b; E]&=& \hat{G}_0^D[a, b; E]
+ \frac{\sqrt{a b}}{c v}
\frac{K_{\gamma}(\sqrt{2E} a) K_{\gamma}(\sqrt{2E} b)}
{K_{\gamma}^2(\sqrt{2E} c)} \\ \nonumber
& &
\hspace{3.0cm} \times
\left[ \left( \frac{\gamma - \frac{1}{2}}{2\xi c v} - 1 \right)
+ \frac{\sqrt{2E}}{2 \xi v}
\frac{K_{\gamma - 1}(\sqrt{2E} c)}
{K_{\gamma}(\sqrt{2E} c)} \right]^{-1}.\end{aligned}$$ Since $\hat{G}_0^D$ satisfies the usual Dirichlet BC, [*i.e.*]{} $\hat{G}_0^D[a, c; E] = \hat{G}_0^D[c, b; E] = 0$, the fixed-energy amplitude on the brane is simply reduced to $$\label{rs2onbrane}
\hat{G}_{RS2}[c, c; E] =
\left[ \left( \frac{\gamma - \frac{1}{2}}{2 \xi c} - v \right)
+ \frac{\sqrt{2E}}{2 \xi}
\frac{K_{\gamma - 1}(\sqrt{2E} c)}
{K_{\gamma}(\sqrt{2E} c)} \right]^{-1}.$$ If $(\gamma - 1/2) / (2 \xi c) - v = 0$, $\hat{G}_{RS2}[c, c; E]$ becomes $$\label{rs2simple}
\hat{G}_{RS2}[c, c; E] = \Delta_0 + \Delta_{KK}$$ where $$\begin{aligned}
\label{d0dkk}
\Delta_0&=&\frac{2 \xi (\gamma - 1)}{c E} \\ \nonumber
\Delta_{KK}&=&\frac{2 \xi}{\sqrt{2E}}
\frac{K_{\gamma - 2}(\sqrt{2E} c)}
{K_{\gamma - 1}(\sqrt{2E} c)}.\end{aligned}$$ Of course, $\Delta_0$ and $\Delta_{KK}$ represent the zero mode and the higher Kaluza-Klein excitations respectively. This means that the condition for the localized graviton to be massless is $$\label{rs2condi}
\frac{\gamma - \frac{1}{2}}{2 \xi c} - v = 0.$$ At the RS limit $\gamma = 2$, $c = R$ and $v = 3 / 2 R$ this condition really holds at $\xi = 1/2$. But for other valus of $\xi$ except $\xi = 0$ one can also obtain the massless graviton by changing $c$, $g$, and $v$ appropriately to obey Eq.(\[rs2condi\]).
At the pure Dirichlet BC case($\xi = 0$) Eq.(\[rs2condi\]) cannot hold unless $v = \infty$. Thus in this case we can get the massless graviton via a coupling constant renormalization as we did in the previous section.
To show explicitly we have to re-write Eq.(\[rs2schulman\]) by introducing a positive infinitesimal parameter $\epsilon$; $$\label{rs2d1}
\hat{G}_{RS2}^{\xi=0}[a, b; E] = \hat{G}_0^D[a, b; E]
+ \lim_{\epsilon \rightarrow 0^+}
\frac{\hat{G}_0^D[a, c + \epsilon; E] \hat{G}_0^D[c + \epsilon, b; E]}
{\frac{1}{v} - \hat{G}_0^D[c + \epsilon, c + \epsilon; E]}.$$ Explicit calculation shows that even in this case one can derive a massless graviton when $v^{ren} = -3 / (2 R)$, where $v^{ren}$ is a renormalized coupling constant defined as $$\label{rs2vren}
v^{ren} = \frac{1}{2 \epsilon^2}
\left( \frac{1}{v} - 2 \epsilon \right).$$
The coupling constant renormalization procedure in RS2 is in detail explained in Ref.[@park01-3]. In this case the fixed-energy amplitude and the corresponding gravitational potential is exactly same with that of the original RS result when $v^{ren} = -3 / (2 R)$. This result may provide us the compromise of the massless graviton with a small cosmological constant[@park01-3].
Toy Model 2: Free Particle in a Box with $\delta$-function Potentials
=====================================================================
In this section as a toy model of RS1 we will examine Green’s function for the free particle system in a $1d$ box($0 \leq x \leq L$) with $\delta$-function potentials at both end points.
The Hamiltonian for this system is $$\label{toy2hamil1}
\hat{H}_{\delta}^{Box} = \hat{H}_0^{Box} - v_1 \delta(x) + v_2 \delta(x - L)$$ where $$\label{toy2hamil2}
\hat{H}_0^{Box} = - \frac{1}{2} \partial_x^2
\hspace{2.0cm}
(0 \leq x \leq L).$$ The main problem in this toy model is of course to derive a fixed-energy amplitude $\hat{G}_0^{Box}$ for $\hat{H}_0^{Box}$. Once $\hat{G}_0^{Box}$ is obtained, the fixed-energy amplitude $\hat{G}_{\delta}^{Box}$ for the total Hamiltonian $\hat{H}_{\delta}^{Box}$ is straightforwardly obtained by performing the Schulman procedure twice; $$\label{toy2schul1}
\hat{G}_{\delta}^{Box}[a, b; E] =
\hat{{\cal G}}_0^{Box}[a, b; E] -
\frac{\hat{{\cal G}}_0^{Box}[a, L; E] \hat{{\cal G}}_0^{Box}[L, b; E]}
{\frac{1}{v_2} + \hat{{\cal G}}_0^{Box}[L, L^-; E]}$$ where $$\label{toy2schul2}
\hat{{\cal G}}_0^{Box}[a, b; E] = \hat{G}_0^{Box}[a, b; E]
+ \frac{\hat{G}_0^{Box}[a, 0; E] \hat{G}_0^{Box}[0, b; E]}
{\frac{1}{v_1} - \hat{G}_0^{Box}[0^+, 0; E]}.$$
The fixed-energy amplitude $\hat{G}_0^{Box}$ for $\hat{H}_0^{Box}$ is also obtained directly from that for free particle on half-line, [*i.e.*]{} $\hat{G}_F^{\xi_1}[a,b; E]$ in Eq.(\[toy1gen1\]). Of course, the parameter $\xi_1$ represents the type of BC at $x = 0$. Then, the fixed-energy amplitude $\hat{G}_0^{Box}$ can be computed by introducing an infinite barrier at $x = L$ to the half-line constraint system. As we commented in section 2 the infinite barrier is introduced by $\delta$- and $\delta^{\prime}$-functions potential at $x = L$ with assumption that the coupling constant is infinite. Thus the final form of $\hat{G}_0^{Box}$ is dependent on the two parameters as follows; $$\label{toy2box1}
\hat{G}_0^{Box}[a, b; E] = \xi_2 \hat{G}_0^{\xi_1, N}[a, b; E]
+ (1 - \xi_2) \hat{G}_0^{\xi_1, D}[a, b; E]$$ where $$\begin{aligned}
\label{toy2gdgn}
\hat{G}_0^{\xi_1, D}[a, b; E]&=&\hat{G}_F^{\xi_1}[a, b; E] -
\frac{\hat{G}_F^{\xi_1}[a, L; E] \hat{G}_F^{\xi_1}[L, b; E]}
{\hat{G}_F^{\xi_1}[L, L^-; E]}
\\ \nonumber
\hat{G}_0^{\xi_1, N}[a, b; E]&=&\hat{G}_F^{\xi_1}[a, b; E] -
\frac{\hat{G}_{F,b}^{\xi_1}[a, L; E] \hat{G}_{F, a}^{\xi_1}[L, b; E]}
{\hat{G}_{F, ab}^{\xi_1}[L, L^-; E]}.\end{aligned}$$ Of course the parameter $\xi_2$ in Eq.(\[toy2box1\]) parametrizes the various BCs at $x = L$.
Explicit calculation shows $$\begin{aligned}
\label{toy2explicit}
\hat{G}_0^{\xi_1, D}[a, b; E]&=&
\frac{1}
{\sqrt{2E} [\xi_1 \cosh \sqrt{2E} L + (1 - \xi_1) \sinh \sqrt{2E} L]}
\\ \nonumber
& & \times
\Bigg[ \xi_1 \bigg\{\sinh \sqrt{2E} (L - |a - b|) - \sinh \sqrt{2E} ((a + b)
- L) \bigg\}
\\ \nonumber
& & \hspace{1.0cm}
+ (1 - \xi_1) \bigg\{\cosh \sqrt{2E} (L - |a - b|) - \cosh
\sqrt{2E} ((a + b) - L) \bigg\}
\Bigg]
\\ \nonumber
\hat{G}_0^{\xi_1, N}[a, b; E]&=&
\frac{1}
{\sqrt{2E} [(1- \xi_1)\cosh \sqrt{2E} L + xi_1 \sinh \sqrt{2E} L]}
\\ \nonumber
& & \times
\Bigg[ \xi_1 \bigg\{\cosh \sqrt{2E} (L - |a - b|) + \cosh \sqrt{2E} ((a + b)
- L) \bigg\}
\\ \nonumber
& & \hspace{1.0cm}
+ (1 - \xi_1) \bigg\{\sinh \sqrt{2E} (L - |a - b|) + \sinh
\sqrt{2E} ((a + b) - L) \bigg\}
\Bigg].\end{aligned}$$ Inserting eq.(\[toy2explicit\]) into Eq.(\[toy2box1\]) we get $$\begin{aligned}
\label{toy2box2}
\hat{G}_0^{Box}[a, b; E]&=& \frac{1}{\sqrt{2E}}
\Bigg[ \left( \mu(\xi_1, \xi_2) + \mu(1 - \xi_1, 1 - \xi_2) \right)
\cosh \sqrt{2E} (L - |a - b|)
\\ \nonumber
& & \hspace{1.0cm}
+ \left( \mu(\xi_1, \xi_2) - \mu(1 - \xi_1, 1 - \xi_2) \right)
\cosh \sqrt{2E} ((a + b) - L)
\\ \nonumber
& & \hspace{1.0cm}
+ \left( \nu(\xi_1, \xi_2) + \nu(1 - \xi_1, 1 - \xi_2) \right)
\sinh \sqrt{2E} (L - |a - b|)
\\ \nonumber
& & \hspace{1.0cm}
+ \left( \nu(\xi_1, \xi_2) - \nu(1 - \xi_1, 1 - \xi_2) \right)
\sinh \sqrt{2E} ((a + b) - L)
\Bigg]\end{aligned}$$ where $$\begin{aligned}
\label{toy2munu}
\mu(z, w)&=& \frac{z w}{(1 - z) \cosh \sqrt{2E} L + z \sinh \sqrt{2E} L}
\\ \nonumber
\nu(z, w)&=& \frac{(1 - z) w}{(1 - z) \cosh \sqrt{2E} L + z \sinh \sqrt{2E} L}.\end{aligned}$$ It is interesting to note the following special cases; $$\begin{aligned}
\label{toy2special}
\hat{G}_0^{DD}[a, b; E]&=&
\frac{\cosh \sqrt{2E} (L - |a - b|) - \cosh \sqrt{2E} ((a + b) - L)}
{\sqrt{2E} \sinh \sqrt{2E} L}
\\ \nonumber
\hat{G}_0^{NN}[a, b; E]&=&
\frac{\cosh \sqrt{2E} (L - |a - b|) + \cosh \sqrt{2E} ((a + b) - L)}
{\sqrt{2E} \sinh \sqrt{2E} L}\end{aligned}$$ where the superscript $DD$(or $NN$) stands for Dirichlet-Dirichlet(or Neumann-Neumann) BCs at $x = 0$ and $x = L$. Similar results to Eq.(\[toy2special\]) are found at Ref.[@gros98]. Bound state energy spectrum is obtained from poles of $\hat{G}_0^{DD}$ and $\hat{G}_0^{NN}$ which indicates $B_n^{DD} = B_n^{NN} = n^2 \pi^2 / 2 L^2$ where $n$ is integer. Another interesting case is $\xi_1 = \xi_2 = 1/2$ case where $\hat{G}_0^{Box}$ is simply reduced to the free particle case without any constraint, [*i.e.*]{} $e^{-\sqrt{2E} |a - b|} / \sqrt{2E}$.
Inserting Eq.(\[toy2box2\]) into Eq.(\[toy2schul2\]) and subsequently Eq.(\[toy2schul1\]) we get the final form of $\hat{G}_{\delta}^{Box}$ for the Hamiltonian $\hat{H}_{\delta}^{Box}$. Since final expression is too long, we do not describe it explicitly in this paper. Instead we will consider two special cases.
The first case we will consider is $\xi_1 = \xi_2 = 1/2$. In this case Eq.(\[toy2schul1\]) and Eq.(\[toy2schul2\]) yield $$\begin{aligned}
\label{toy2xi1/2}
\hat{G}_{\delta, \xi_1=\xi_2=1/2}^{Box}[a, b; E]&=&
\frac{e^{-\sqrt{2E}|a - b|}}{\sqrt{2E}} +
\left( \frac{\sqrt{2E}}{v_1} - 1 \right)^{-1}
\frac{e^{-\sqrt{2E}(a + b)}}{\sqrt{2E}}
\\ \nonumber
& & -
\left[ \left( \frac{\sqrt{2E}}{v_1} - 1 \right)
\left( \frac{\sqrt{2E}}{v_2} + 1 \right)
+ e^{-2 \sqrt{2E} L} \right]^{-1}
\\ \nonumber
& & \times
\Bigg[ \left( \frac{\sqrt{2E}}{v_1} - 1 \right)
\frac{e^{\sqrt{2E}(a + b)}}{\sqrt{2E}} +
\frac{e^{\sqrt{2E}(a - b)}}{\sqrt{2E}} +
\frac{e^{-\sqrt{2E}(a - b)}}{\sqrt{2E}} +
\\ \nonumber
& & \hspace{6.0cm}
\left( \frac{\sqrt{2E}}{v_1} - 1 \right)^{-1}
\frac{e^{-\sqrt{2E}(a + b)}}{\sqrt{2E}}
\Bigg].\end{aligned}$$
The second case we will consider is $\xi_1 = \xi_2 = 0$. In this case $\hat{G}_0^{Box}$ is $\hat{G}_0^{DD}$ in Eq.(\[toy2special\]). As expected $\hat{G}_0^{DD}$ satisfies the usual Dirichlet-Dirichlet BCs; $$\label{toy2ddbcs}
\hat{G}_0^{DD}[0, b; E] = \hat{G}_0^{DD}[a, 0; E]
= \hat{G}_0^{DD}[L, b; E] = \hat{G}_0^{DD}[a, L; E] = 0.$$ If, therefore, $v_1$ and $v_2$ are finite, we arrive at a conclusion $\hat{G}_{\delta}^{Box}[a, b; E] = \hat{G}_0^{Box}[a, b; E]$.
If however, $v_1$ and $v_2$ are infinite and unphysical bare quantities, one can arrive at different conclusion via the coupling constant renormalization as we have seen in section 2 and 3. To adopt the coupling constant renormalization we introduce the infinitesimal positive constant $\epsilon$ as follows; $$\begin{aligned}
\label{toy2ddepsi}
\hat{G}_0^{Box}[0, 0; E]&\rightarrow&\hat{G}_0^{Box}[\epsilon^-, \epsilon, E]
= 2 \epsilon - 2 \sqrt{2E} \coth \sqrt{2E} L \epsilon^2 +
{\cal O} (\epsilon^3)
\\ \nonumber
\hat{G}_0^{Box}[L, L; E]&\rightarrow&\hat{G}_0^{Box}[L-\epsilon^-, L-\epsilon, E]
= 2 \epsilon - 2 \sqrt{2E} \coth \sqrt{2E} L \epsilon^2 +
{\cal O} (\epsilon^3)
\\ \nonumber
\hat{G}_0^{Box}[0, L; E]&\rightarrow&\hat{G}_0^{Box}[\epsilon, L-\epsilon, E] =
\frac{2 \sqrt{2E}}{\sinh \sqrt{2E} L} \epsilon^2 + {\cal O} (\epsilon^3)
\\ \nonumber
\hat{G}_0^{Box}[L, 0; E]&\rightarrow&\hat{G}_0^{Box}[L-\epsilon, \epsilon, E] =
\frac{2 \sqrt{2E}}{\sinh \sqrt{2E} L} \epsilon^2 + {\cal O} (\epsilon^3)
\\ \nonumber
\hat{G}_0^{Box}[a, 0; E]&\rightarrow&\hat{G}_0^{Box}[a, \epsilon, E] =
\frac{2 \sinh \sqrt{2E} (L-a)}{\sinh \sqrt{2E} L} \epsilon + {\cal O} (\epsilon^3)
\\ \nonumber
\hat{G}_0^{Box}[a, L; E]&\rightarrow&\hat{G}_0^{Box}[a, L-\epsilon, E] =
\frac{2 \sinh \sqrt{2E} a}{\sinh \sqrt{2E} L} \epsilon + {\cal O} (\epsilon^3)
\\ \nonumber
\hat{G}_0^{Box}[0, b: E]&\rightarrow&\hat{G}_0^{Box}[\epsilon, b; E] =
\frac{2 \sinh \sqrt{2E} (L-b)}{\sinh \sqrt{2E} L} \epsilon + {\cal O} (\epsilon^3)
\\ \nonumber
\hat{G}_0^{Box}[L, b; E]&\rightarrow&\hat{G}_0^{Box}[L-\epsilon, b; E] =
\frac{2 \sinh \sqrt{2E} b}{\sinh \sqrt{2E} L} \epsilon + {\cal O} (\epsilon^3).\end{aligned}$$ Inserting Eq.(\[toy2ddepsi\]) into Eq.(\[toy2schul2\]) and Eq.(\[toy2schul1\]), and defining the renormalized constants $$\begin{aligned}
\label{toy2rencoup}
v_1^{ren}&=&\frac{1}{2\epsilon^2}
\left( \frac{1}{v_1} - 2\epsilon \right) \\ \nonumber
v_2^{ren}&=&\frac{1}{2\epsilon^2}
\left( \frac{1}{v_2} + 2\epsilon \right),\end{aligned}$$ one can arrive at the following long expression after tedius calculation; $$\begin{aligned}
\label{toy2final}
\hat{G}_{\delta, \xi_1=\xi_2=0}^{Box}[a, b; E]&=&\hat{G}_0^{DD}[a, b; E]
\\ \nonumber
& &
+ 2 (v_1^{ren} + \sqrt{2E} \coth \sqrt{2E}L)^{-1}
\frac{\sinh \sqrt{2E} (L - a) \sinh \sqrt{2E} (L - b)}{\sinh^2 \sqrt{2E} L}
\\ \nonumber
&-&
2 \left[ (v_1^{ren} + \sqrt{2E} \coth \sqrt{2E} L) (v_2^{ren} -
\sqrt{2E} \coth \sqrt{2E} L)
+ \frac{2E}{\sinh^2 \sqrt{2E} L} \right]^{-1}
\\ \nonumber
&\times&
\Bigg[(v_1^{ren} + \sqrt{2E} \coth \sqrt{2E} L)
\frac{\sinh \sqrt{2E} a \sinh \sqrt{2E} b}{\sinh^2 \sqrt{2E} L}
\\ \nonumber
& & + \sqrt{2E}
\frac{\sinh \sqrt{2E} a \sinh \sqrt{2E} (L - b) +
\sinh \sqrt{2E} (L - a) \sinh \sqrt{2E} b}
{\sinh^3 \sqrt{2E} L}
\\ \nonumber
& & + 2E (v_1^{ren} + \sqrt{2E} \coth \sqrt{2E} L)^{-1}
\frac{\sinh \sqrt{2E} (L - a) \sinh \sqrt{2E} (L - b)}
{\sinh^4 \sqrt{2E} L} \Bigg]. \end{aligned}$$ In the next section we will apply the analysis in this toy model to the RS1 scenario.
Fixed-energy Amplitude for RS1
==============================
In this section we will examine the fixed-energy amplitude for RS1 whose linear gravitational fluctuation is given in Eq.(\[grafluc\]) and Eq.(\[potential\]). The Hamiltonian for RS1 can be read from these equations easily $$\begin{aligned}
\label{rs1hamil1}
\hat{H}_{RS1}&=&\hat{H}_0 - v_1 \delta(z) + v_2 \delta(z - z_0)
\\ \nonumber
\hat{H}_0&=&-\frac{1}{2} \partial_z^2 +
\frac{g}{(|z| + c)^2}.\end{aligned}$$ Of course, the exact RS1 Hamiltonian can be obtained by letting $g=15/8$, $c = 1/k \equiv R$, $v_1 = v_2 = 3 k /2$ and $z_0 = (e^{k r_c \pi} - 1) / k$. As we did in section 3, however, we will try to examine the fixed energy amplitude for arbitrary parameter as much as possible.
Next we impose $z$ is non-negative. This means we use the single copy of $AdS_5$ as a bulk spacetime. In this sense we have a same setting with that of $AdS$/CFT. In this setting Hamiltonian $\hat{H}_0$ in Eq.(\[rs1hamil1\]) becomes $$\label{rs1hamil2}
\hat{H}_0 = - \frac{1}{2} \partial_x^2 + \frac{g}{x^2}
\hspace{2.0cm}
(c \leq x \leq L)$$ where $L = c + z_0$.
Of course, the main problem is to compute the fixed-energy amplitude $\hat{G}_0[a, b; E]$ for $\hat{H}_0$ in Eq.(\[rs1hamil2\]). From $\hat{G}_0[a, b; E]$ it is simple to derive the fixed energy amplitude for $\hat{H}_{RS1}$ by applying the Schulman procedure twice; $$\label{rs1schul1}
\hat{G}_{RS1}[a, b; E] =
\hat{{\cal G}}_0[a, b; E] -
\frac{\hat{{\cal G}}_0[a, L; E] \hat{{\cal G}}_0[L, b; E]}
{\frac{1}{v_2} + \hat{{\cal G}}_0[L, L^-; E]}$$ where $$\label{rs1schul2}
\hat{{\cal G}}_0[a, b; E] =
\hat{G}_0[a, b;E] +
\frac{\hat{G}_0[a, c; E] \hat{G}_0[c, b; E]}
{\frac{1}{v_1} - \hat{G}_0[c^+, c; E]}.$$
The fixed-energy amplitude for $\hat{H}_0$ is also straightforwardly obtained from $\hat{G}_0^{\xi_1}$ in Eq.(\[rs2onepara\]) by introducing an infinite barrier at $x = L$ again. Then, the amplitude is dependent on the two parameters $\xi_1$ and $\xi_2$ which represent the various BCs at $x = 0$ and $x = L$ respectively; $$\begin{aligned}
\label{rs1twopara}
\hat{G}_0[a, b; E]&\equiv& \hat{G}_0^{\xi_1, \xi_2}[a, b; E]
\\ \nonumber
&=&
\xi_2 \hat{G}_0^{\xi_1, N}[a, b; E] + (1 - \xi_2)
\hat{G}_0^{\xi_1, D}[a, b; E]\end{aligned}$$ where $$\begin{aligned}
\label{rs1gdgn}
\hat{G}_0^{\xi_1, D}[a, b; E]&=&\hat{G}_0^{\xi_1}[a, b; E] -
\frac{\hat{G}_0^{\xi_1}[a, L; E] \hat{G}_0^{\xi_1}[L, b; E]}
{\hat{G}_0^{\xi_1}[L, L^-; E]}
\\ \nonumber
\hat{G}_0^{\xi_1, N}[a, b; E]&=&\hat{G}_0^{\xi_1}[a, b; E] -
\frac{\hat{G}_{0, b}^{\xi_1}[a, L; E] \hat{G}_{0, a}^{\xi_1}[L, b; E]}
{\hat{G}_{0, ab}^{\xi_1}[L, L^-; E]}.\end{aligned}$$ Explicit calculation shows $$\begin{aligned}
\label{rs1explicit}
\hat{G}_0^{\xi_1}[a, b; E]&=&2\sqrt{ab}
\Bigg[I_{\gamma}(\sqrt{2E} min(a, b)) K_{\gamma}(\sqrt{2E} max(a, b))
\\ \nonumber
& & \hspace{3.0cm}
+ g_1(\xi_1,E) K_{\gamma}(\sqrt{2E} a) K_{\gamma}(\sqrt{2E} b)
\Bigg]
\\ \nonumber
\hat{G}_0^{\xi_1, D}[a, b; E]&=&\hat{G}_0^{\xi_1}[a, b; E] -
2\sqrt{ab} g_D(\xi_1, E) [I_{\gamma}(\sqrt{2E} a) +
g_1(\xi_1,E) K_{\gamma}(\sqrt{2E} a) ]
\\ \nonumber
& & \hspace{3.0cm} \times
[I_{\gamma}(\sqrt{2E} b) +
g_1(\xi_1,E) K_{\gamma}(\sqrt{2E} b)]
\\ \nonumber
\hat{G}_0^{\xi_1, N}[a, b; E]&=&\hat{G}_0^{\xi_1}[a, b; E] -
2\sqrt{ab} g_N(\xi_1, E) [I_{\gamma}(\sqrt{2E} a) +
g_1(\xi_1,E) K_{\gamma}(\sqrt{2E} a) ]
\\ \nonumber
& & \hspace{3.0cm} \times
[I_{\gamma}(\sqrt{2E} b) +
g_1(\xi_1,E) K_{\gamma}(\sqrt{2E} b)]\end{aligned}$$ where $$\begin{aligned}
\label{rs1coeff}
g_1(\xi_1,E)&=&\xi_1 \frac{f_I(c,E)}{f_K(c, E)} -
(1 - \xi_1) \frac{I_{\gamma}(\sqrt{2E} c)}
{K_{\gamma}(\sqrt{2E} c)}
\\ \nonumber
g_D(\xi_1, E)&=&
\left( g_1(\xi_1,E) + \frac{I_{\gamma}(\sqrt{2E} L)}{K_{\gamma}(\sqrt{2E} L)}
\right)^{-1}
\\ \nonumber
g_N(\xi_1, E)&=&
\left( g_1(\xi_1,E) - \frac{f_I(L, E)}{f_K(L, E)} \right)^{-1}\end{aligned}$$ and, $f_K$ and $f_I$ are defined at Eq.(\[fkfi\]).
Inserting Eq.(\[rs1explicit\]) into Eq.(\[rs1twopara\]) one can obtain the fixed-energy amplitude for Hamiltonian (\[rs1hamil2\]); $$\begin{aligned}
\label{rs1xi1xi2}
\hat{G}_0^{\xi_1, \xi_2}[a, b; E]&=&\hat{G}_0^{\xi_1}[a, b; E]
- 2 \sqrt{a b} g_{Box}(\xi_1, \xi_2, E)
[I_{\gamma}(\sqrt{2E} a) +
g_1(\xi_1,E) K_{\gamma}(\sqrt{2E} a) ]
\\ \nonumber
& & \hspace{3.0cm} \times
[I_{\gamma}(\sqrt{2E} b) +
g_1(\xi_1,E) K_{\gamma}(\sqrt{2E} b)]\end{aligned}$$ where $$\label{rs1gbox}
g_{Box}(\xi_1, \xi_2, E) = \xi_2 g_N(\xi_1, E) + (1 - \xi_2)
g_D(\xi_1, E).$$ Thus inserting Eq.(\[rs1xi1xi2\]) into Eq.(\[rs1schul2\]) and subsequently Eq.(\[rs1schul1\]) we can derive the fixed-energy amplitude $\hat{G}_{RS1}[a,b; E]$. The expression is too long to describe it here. So, we rely on the numerical computation to check the occurrence of the localized massless graviton.
First, we will check the possibility for the appearance of the massless graviton at the brane located in $x = c$. Fig. 1 shows $m^2 \hat{G}_0^{\xi_1, \xi_2}[c, c; m^2 / 2]$ when $\xi_1 = \xi_2
= 1/2$ and $R = 1$. Of course we have taken RS limit, [*i.e.*]{} $c= 1$, $\gamma=2$, and $v_1 = v_2 = 1.5$. In order for the massless graviton to appear on the brane we need a pole in $\hat{G}_0^{\xi_1, \xi_2}[c, c; m^2 / 2]$ at $m^2 = 0$. This means the numerical value of $m^2 \hat{G}_0^{\xi_1, \xi_2}[c, c; m^2 / 2]$ should be non-zero and finite at $m^2 \rightarrow 0$. Fig. 1 indicates that the zero mass graviton appears only when L is infinitely large. In fact, this limit is effectively RS2 scenario.
Numerical calculation shows that there is no massless graviton on the brane located at $x = L$ regardless of $L$ if one chooses $\xi_1 = \xi_2 = 1/2$. One may conjecture that the condition (\[rs2condi\]) for the appearance of the massless graviton in RS2 may be modified to $$\label{rs1wrongcondi}
\frac{\gamma - \frac{1}{2}}{2 \xi_2 L} - v_2 = 0$$ for the appearance of the massless graviton on negative-tension brane. Fig. 2 shows $m^2 \hat{G}_0^{\xi_1, \xi_2}[L, L; m^2 / 2]$ where $\xi_1 = 1/2$ and $\xi_2$ is determined from Eq.(\[rs1wrongcondi\]). Fig. 2 shows again that there is no massless graviton. Although we have not tested all kinds of possibility, our numerical results strongly suggest that there is no room for the appearance of the massless graviton in negative-tension brane regardless of $\xi_1$, $\xi_2$, and $L$.
Of course, one can derive a fixed-energy amplitude for $\xi_1 = \xi_2 = 0$ case via the coupling constant renormalization in principle. However, long expression for $\hat{G}_{RS1}$ seems to make the calculation too tedious. So, we do not describe the result of this case in this paper.
Conclusion
==========
In this paper we have examined the localized gravity on the brane in RS brane-world scenario from the singular quantum mechanics. Choosing a single copy of $AdS_5$ as a bulk spacetime we have shown that the fixed-energy amplitude for RS1 and RS2 are non-trivially dependent on the BCs.
As a result the fixed-energy amplitude for RS2 is dependent on the free parameter $\xi$, which parametrize the BC at $y = 0$. Computing the fixed-energy amplitude explicitly one can derive the general criterion (\[rs2condi\]) for the appearance of the localized massless graviton on the brane when $\xi$ is arbitrary but non-zero. When $\xi = 0$, the massless graviton is obtained via the coupling constant renormalization.
In RS1 scenario the final expression of the fixed-energy amplitude is dependent on the two free parameters $\xi_1$ and $\xi_2$, which parametrize the various BCs at the end-points of $1d$ box. The appearance of the massless graviton is numerically tested by examing the pole at $m^2 = 0$. For the positive-tension brane our numerical test indicates that there is no massless graviton if the length of $1d$ box is finite. However, the infinite length of $1d$ box makes the graviton localized on the positive-tension brane to be massless, which is effectively identical to the RS2 scenario. For the negative-tension brane our numerical test shows that there is no massless graviton regardless of the length of $1d$ box and choice of BCs.
We can consider the various extension for this paper. Firstly, one may include the bending effect of the brane in the computation. In this case, however, the final expression of the linearized fluctuation does not seem to be like Schrödinger equation. Thus, we think the method used in Ref.[@garr00] is more convenient than the technique of singular quantum mechanics to treat the bending effect. One can extend the method presented in this paper to the higher-dimensional RS scenario[@leb01; @bur02]. If one can find a singular brane solution in the higher-dimensional case, one can apply the self-adjoint extension or a coupling constant renormalization to treat the higher-dimensional $\delta$-function potential. Of course, it is very interesting if we can find a singular solution in six dimension because two-dimensional $\delta$-function potential has various non-trivial properties such as scale anomaly and dimensional transmutation[@jack91]. One may extend the present paper to the moving brane picture[@kof02]. But it is unclear for us whether or not the path-integral solution is in this case analytically obtainable.
We think the most interesting problem is to understand the reason why there is no massless graviton in RS1 scenario. This means that the gauge hierarchy problem is not compatible with the massless graviton problem. Thus, it seems to be important to compromise these two distinct phenomena.
[99]{} L. Randall and R. Sundrum, Large Mass Hierarchy from a Small Extra Dimension, Phys. rev. Lett. [**83**]{} (1999) 3370 \[hep-ph/9905221\]. L. Randall and R. Sundrum, An Alternative to Compactification, Phys. Rev. Lett. [**83**]{} (1999) 4690 \[hep-th/9906064\]. J. Garriga and T. Tanaka, Gravity in the Randall-Sundrum Brane World, Phys. Rev. Lett. [**84**]{} (2000) 2778 \[hep-th/9911055\]. M. J. Duff and J. T. Liu, Complementarity of the Maldacena and Randall-Sundrum Pictures, Phys. Rev. Lett. [**85**]{} (2000) 2052 \[hep-th/0003237\]. P. Binetruy, C. Deffayet and D. Langlois, Non-conventional Cosmology from a brane universe, Nucl. Phys. [**B565**]{} (2000) 269 \[hep-th/9905012\]. C. Cs[á]{}ki, M. Graesser, C. Kolda, and J. Terning, Cosmology of One Extra Dimension with Localized Gravity, Phys. Lett. [**B462**]{} (1999) 34 \[hep-ph/9906513\]. J. M. Cline, C. Grojean, and G. Servant, Cosmological Expansion in the Presence of an Extra Dimension, Phys. Rev. Lett. [**83**]{} (1999) 4245 \[hep-ph/9906523\]. J. E. Kim, B. Kyae, and H. M. Lee, Model for self-tuning the cosmological constant, Phys. Rev. Lett. [**86**]{} (2001) 4223 \[hep-th/0011118\]. S. Alexander, Y. Ling, and L. Smolin, A thermal instability for positive brane cosmological constant in the Randall-Sundrum cosmologies \[hep-th/0106097\]. A. Chamblin, S. W. Hawking, and H. S. Reall, Brane-World black holes, Phys. Rev. [**D 61**]{} (2000) 065007 \[hep-th/9909205\]. R. Emparan, G. T. Horowitz, and R. C. Myers, Exact Description of Black Holes on Branes, JHEP [**0001**]{} (2000) 007 \[hep-th/9911043\]. S. B. Giddings, E. Katz, and L. Randall, Linearized Gravity in Brane Backgrounds, JHEP [**0003**]{} (2000) 023 \[hep-th/0002091\]. J. Maldacena, The large-N limit of superconformal field theories and supergravity, Adv. Theor. Math. Phys. [**2**]{} (1998) 231 \[hep-th/9711200\]. D. K. Park, H. S. Kim, Y. G. Miao, and H. J. W. Müller-Kirsten, Randall-Sundrum Scenario at Nonzero Temperature, Phys. Lett. [**B 519**]{} (2001) 159 \[hep-th/0107156\]. D. K. Park, H. S. Kim, and S. Tamaryan, Nonvanishing Cosmological Constant of Flat Universe in Brane-World Scenario, to appear in Phys. Lett. B \[hep-th/0111081\]. R. P. Feynman and A. R. Hibbs, [*Quantum Mechanics and Path Integrals*]{} (McGraw-Hill, New York, 1965). L. S. Schulman, [*Techniques and Applications of Path Integrals*]{} (Wiley, New York, 1981). L. S. Schulman, in [*Path Integrals from mev to MeV*]{}, edited by M. C. Gutzwiller, A. Inomata, J. R. Klauder, and L. Streit (World Scientific, Singapore, 1986). D. K. Park, Green’s-function approach to two- and three-dimensional delta-function potential and application to the spin-1/2 Aharonov-Bohm problem, J. Math. Phys. [**36**]{} (1995) 5453 \[hep-th/9405020\]. R. Jackiw, in [*M. A. Bég Memorial Volume*]{}, edited by A. Ali and P. Hoodbhoy (World Scientific, Singapore, 1991). A. Z. Capri, [*Nonrelativistic Quantum Mechanics*]{} (Benjamin/Cummings, Menlo Park, 1985). S. Albeverio, F. Gesztesy, R. Hoegh-Krohn, and H. Holden, [*Solvable Models in Quantum Mechanics*]{} (Springer, Berlin, 1988). C. Grosche, $\delta$-function perturbations and boundary problems by path integration, Ann. Physik [**2**]{} (1993) 557 \[hep-th/9302055\]. C. Grosche, $\delta^{\prime}$-Function Perturbations and Neumann Boundary-Conditions by Path Integration, J. Phys. [**A28**]{} (1995) L99 \[hep-th/9402110\]. D. K. Park, Proper incorporation of self-adjoint extension method to Green’s function formalism: one-dimensional $\delta^{\prime}$-function potential case, J. Phys. [**A29**]{} (1996) 6407 \[hep-th/9512097\]. D. K. Park and S. K. Yoo, Propagators for spinless and spin-1/2 Aharonov-Bohm-Coulomb Systems, Ann Phys. [**263**]{} (1998) 295 \[hep-th/9707024\]. D. K. Park and S. Tamaryan, Compromise of Localized Graviton with a Small Cosmological Constant in Randall-Sundrum Scenario, Phys. Lett. [**B532**]{} (2002) 305 \[hep-th/0108068\]. C. Grosche and F. Steiner, [*Handbook of Feynman Path Integrals*]{} (Springer, Berlin, 1998). F. Leblond, R. C. Myers, and D. J. Winters, Brane World sum rule and $AdS$ Soliton \[hep-th/0107034\]. C. P. Burgess, J. M. Cline, and N. R. Constable, and H. Firouzjahi, Dynamical Stability of Six-Dimensional Warped Brane-Worlds, JHEP [**0201**]{} (2002) 014 \[hep-th/0112047\]. G. Kofinas, New Perspectives on Moving Domain Wall in $(A)dS_5$ space, Nucl. Phys. [**B 622**]{} (2002) 347 \[hep-th/0103045\].
|
{
"pile_set_name": "ArXiv"
}
|
%%**********************************************************
%% SDPT3soln_SEDUMIsoln: convert SQLP solution in SDPT3 format to
%% SeDuMi format
%%
%% [xx,yy,zz = SDPT3soln_SEDUMIsoln(blk,X,y,Z);
%%
%% usage: load SEDUMI_data_file (containing say, A,b,c,K)
%% [blk,At,C,b,perm] = read_sedumi(A,b,c,K);
%% [obj,X,y,Z] = sdpt3(blk,At,C,b);
%% [xx,yy,zz] = SDPT3soln_SEDUMIsoln(blk,X,y,Z,perm);
%%
%% SDPT3: version 3.1
%% Copyright (c) 1997 by
%% K.C. Toh, M.J. Todd, R.H. Tutuncu
%% Last Modified: 16 Sep 2004
%%**********************************************************
function [xx,yy,zz] = SDPT3soln_SEDUMIsoln(blk,X,y,Z,perm);
yy = y;
xx = []; zz = [];
%%
%% extract unrestricted blk
%%
for p = 1:size(blk,1)
pblk = blk(p,:);
if strcmp(pblk{1},'u')
xx = [xx; X{p,1}];
zz = [zz; Z{p,1}];
end
end
%%
%% extract linear blk
%%
for p = 1:size(blk,1)
pblk = blk(p,:);
if strcmp(pblk{1},'l')
xx = [xx; X{p,1}];
zz = [zz; Z{p,1}];
end
end
%%
%% extract second order cone blk
%%
for p = 1:size(blk,1)
pblk = blk(p,:);
if strcmp(pblk{1},'q')
xx = [xx; X{p,1}];
zz = [zz; Z{p,1}];
end
end
%%
%% extract rotated cone blk
%%
for p = 1:size(blk,1)
pblk = blk(p,:);
if strcmp(pblk{1},'r')
xx = [xx; X{p,1}];
zz = [zz; Z{p,1}];
end
end
%%
%% extract semidefinite cone blk
%%
per = [];
len = 0;
for p = 1:size(blk,1)
pblk = blk(p,:);
if strcmp(pblk{1},'s')
sblk(p) = length(pblk{2});
per = [per, perm{p}];
len = len + sum(pblk{2}.*pblk{2});
end
end
sblk = sum(sblk);
cnt = 1;
Xsblk = cell(sblk,1); Zsblk = cell(sblk,1);
for p = 1:size(blk,1)
pblk = blk(p,:);
if strcmp(pblk{1},'s')
ss = [0,cumsum(pblk{2})];
numblk = length(pblk{2});
Xp = X{p,1};
Zp = Z{p,1};
xtmp = []; ztmp = [];
for tt = 1:numblk
if (numblk > 1)
idx = [ss(tt)+1: ss(tt+1)];
Xsblk{cnt} = full(Xp(idx,idx));
Zsblk{cnt} = full(Zp(idx,idx));
else
Xsblk{cnt} = Xp;
Zsblk{cnt} = Zp;
end
cnt = cnt + 1;
end
end
end
if ~isempty(per)
Xsblk(per) = Xsblk; Zsblk(per) = Zsblk;
xtmp = zeros(len,1); ztmp = zeros(len,1);
cnt = 0;
for p = 1:sblk
if strcmp(pblk{1},'s')
idx = [1:length(Xsblk{p})^2];
xtmp(cnt+idx) = Xsblk{p}(:);
ztmp(cnt+idx) = Zsblk{p}(:);
cnt = cnt + length(idx);
end
end
xx = [xx; xtmp];
zz = [zz; ztmp];
end
%%**********************************************************
|
{
"pile_set_name": "Github"
}
|
An Active Drimane-Type Lactone from Polygonum jucundum Attenuates Lipopolysaccharide-Induced Acute Lung Injury in Mice Through TLR4-MAPKs Signaling Pathway.
The herbs of Polygonum jucundum Lindex. (Polygonaceae) is a traditional Chinese medicine for inflammatory diseases. 2α-Hydroxyl-3β-angeloylcinnamolide (HAC), a drimane-type sesquiterpenoid, was the major active compound of the ethanol extract of P. jucundum which inhibited the production of inflammatory mediators. However, the biological mechanism of HAC for anti-inflammatory activity has not been reported. In the current study, we investigated whether HAC could suppress the production of inflammatory mediators in lipopolysaccharide (LPS)-induced acute lung injury in mice (ALI) through downregulation of Toll-like receptor 4 (TLR4) and activations of mitogen-activated protein kinases (MAPKs) and inducible protein nitric oxide synthase (iNOS). Moreover, our data indicated that HAC inhibits the overexpression of iNOS and TLR4 in LPS-treated RAW264.7, and also inhibits MAPK signal. These findings suggest that HAC shows anti-inflammatory effects in ALI mice through suppressing TLR4-mediated MAPK pathway in activated macrophages. In addition, six derivatives of HAC obtained by structure modification were investigated for their inhibitory effects on the production of nitric oxide (NO) and tumor necrosis factor-α (TNF-α), suggesting that the acetylation could increase the inhibition of HAC on TNF-α release in LPS-treated RAW264.7 cells. In summary, all these results showed that HAC may be a potential anti-inflammatory lead compound for the treatment of acute lung injury.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
// Copyright 2017 The Abseil Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#ifndef ABSL_BASE_INTERNAL_ATOMIC_HOOK_H_
#define ABSL_BASE_INTERNAL_ATOMIC_HOOK_H_
#include <atomic>
#include <cassert>
#include <cstdint>
#include <utility>
#ifdef _MSC_FULL_VER
#define ABSL_HAVE_WORKING_ATOMIC_POINTER 0
#else
#define ABSL_HAVE_WORKING_ATOMIC_POINTER 1
#endif
namespace absl {
namespace base_internal {
template <typename T>
class AtomicHook;
// AtomicHook is a helper class, templatized on a raw function pointer type, for
// implementing Abseil customization hooks. It is a callable object that
// dispatches to the registered hook.
//
// A default constructed object performs a no-op (and returns a default
// constructed object) if no hook has been registered.
//
// Hooks can be pre-registered via constant initialization, for example,
// ABSL_CONST_INIT static AtomicHook<void(*)()> my_hook(DefaultAction);
// and then changed at runtime via a call to Store().
//
// Reads and writes guarantee memory_order_acquire/memory_order_release
// semantics.
template <typename ReturnType, typename... Args>
class AtomicHook<ReturnType (*)(Args...)> {
public:
using FnPtr = ReturnType (*)(Args...);
// Constructs an object that by default performs a no-op (and
// returns a default constructed object) when no hook as been registered.
constexpr AtomicHook() : AtomicHook(DummyFunction) {}
// Constructs an object that by default dispatches to/returns the
// pre-registered default_fn when no hook has been registered at runtime.
#if ABSL_HAVE_WORKING_ATOMIC_POINTER
explicit constexpr AtomicHook(FnPtr default_fn)
: hook_(default_fn), default_fn_(default_fn) {}
#else
explicit constexpr AtomicHook(FnPtr default_fn)
: hook_(kUninitialized), default_fn_(default_fn) {}
#endif
// Stores the provided function pointer as the value for this hook.
//
// This is intended to be called once. Multiple calls are legal only if the
// same function pointer is provided for each call. The store is implemented
// as a memory_order_release operation, and read accesses are implemented as
// memory_order_acquire.
void Store(FnPtr fn) {
bool success = DoStore(fn);
static_cast<void>(success);
assert(success);
}
// Invokes the registered callback. If no callback has yet been registered, a
// default-constructed object of the appropriate type is returned instead.
template <typename... CallArgs>
ReturnType operator()(CallArgs&&... args) const {
return DoLoad()(std::forward<CallArgs>(args)...);
}
// Returns the registered callback, or nullptr if none has been registered.
// Useful if client code needs to conditionalize behavior based on whether a
// callback was registered.
//
// Note that atomic_hook.Load()() and atomic_hook() have different semantics:
// operator()() will perform a no-op if no callback was registered, while
// Load()() will dereference a null function pointer. Prefer operator()() to
// Load()() unless you must conditionalize behavior on whether a hook was
// registered.
FnPtr Load() const {
FnPtr ptr = DoLoad();
return (ptr == DummyFunction) ? nullptr : ptr;
}
private:
static ReturnType DummyFunction(Args...) {
return ReturnType();
}
// Current versions of MSVC (as of September 2017) have a broken
// implementation of std::atomic<T*>: Its constructor attempts to do the
// equivalent of a reinterpret_cast in a constexpr context, which is not
// allowed.
//
// This causes an issue when building with LLVM under Windows. To avoid this,
// we use a less-efficient, intptr_t-based implementation on Windows.
#if ABSL_HAVE_WORKING_ATOMIC_POINTER
// Return the stored value, or DummyFunction if no value has been stored.
FnPtr DoLoad() const { return hook_.load(std::memory_order_acquire); }
// Store the given value. Returns false if a different value was already
// stored to this object.
bool DoStore(FnPtr fn) {
assert(fn);
FnPtr expected = default_fn_;
const bool store_succeeded = hook_.compare_exchange_strong(
expected, fn, std::memory_order_acq_rel, std::memory_order_acquire);
const bool same_value_already_stored = (expected == fn);
return store_succeeded || same_value_already_stored;
}
std::atomic<FnPtr> hook_;
#else // !ABSL_HAVE_WORKING_ATOMIC_POINTER
// Use a sentinel value unlikely to be the address of an actual function.
static constexpr intptr_t kUninitialized = 0;
static_assert(sizeof(intptr_t) >= sizeof(FnPtr),
"intptr_t can't contain a function pointer");
FnPtr DoLoad() const {
const intptr_t value = hook_.load(std::memory_order_acquire);
if (value == kUninitialized) {
return default_fn_;
}
return reinterpret_cast<FnPtr>(value);
}
bool DoStore(FnPtr fn) {
assert(fn);
const auto value = reinterpret_cast<intptr_t>(fn);
intptr_t expected = kUninitialized;
const bool store_succeeded = hook_.compare_exchange_strong(
expected, value, std::memory_order_acq_rel, std::memory_order_acquire);
const bool same_value_already_stored = (expected == value);
return store_succeeded || same_value_already_stored;
}
std::atomic<intptr_t> hook_;
#endif
const FnPtr default_fn_;
};
#undef ABSL_HAVE_WORKING_ATOMIC_POINTER
} // namespace base_internal
} // namespace absl
#endif // ABSL_BASE_INTERNAL_ATOMIC_HOOK_H_
|
{
"pile_set_name": "Github"
}
|
The 80-year-old comedian now faces up to 30 years in prison if the judge hands down the maximum sentence.
AFP / Getty Images Bill Cosby exits the courthouse after the verdict was read on April 26, 2018.
Bill Cosby was convicted Thursday of drugging and raping Andrea Constand at his Pennsylvania home in 2004, marking a new fall from grace for a comedian who built his reputation as America's Dad. The jury for Cosby's first rape trial was unable to reach a verdict last year; however, this time, the jury of seven men and five women voted after about 14 hours of deliberation to convict the 80-year-old comedian on three counts of sexual assault after prosecutors were allowed to call five additional accusers to the stand. Cosby, who was on the edge of his seat before the verdict was read aloud to gasps in the courtroom, now faces the prospect of spending the rest of his life behind bars if he is given the maximum sentence of 30 years in prison.
Christine Cornell Bill Cosby listens as the verdict is read aloud in court on April 26, 2018.
After the verdict, Constand gave Montgomery County District Attorney Kevin Steele a long hug before exiting the court with a smile. He later told reporters that "today, we're finally in a place to say that justice was done." "What was revealed through this investigation was a man who had spent decades preying on women that he drugged and sexually assaulted and a man that had evaded this moment here today for far too long," Steele, with Constand looking on. "He used his celebrity, he used his wealth, and his network of supporters to help him conceal his crimes, and now we really know today who was behind that act, who the real Bill Cosby was, and a jury has spoken with one voice, in a court of law, and found the defendant guilty of drugging and sexually assaulting Andrea Constand in his home." Dolores Troiani, Constand’s chief attorney, spoke on her client’s behalf, telling reporters she came here 14 years ago for justice.
Mark Makela / Getty Images Andrea Constand reacts after the guilty verdict was delivered on April 26, 2018.
“I am so happy today that I can say, although justice was delayed, it was not denied,” Troiani said. She added: “This is a life altering experience for any woman, any victim, and the person who I think needs to be heralded for what she has done is Andrea.” Cosby, meanwhile, turned over his passport and was ordered to stay in Montgomery County. He will also have to pay for the cost of prosecution, although that assessment has yet to take place. He was whisked away in a black SUV without talking to reporters. Prosecutors had argued against his release, prompting Cosby to lash out at prosecutors and yell that "he doesn't have a plane you asshole!" No date was immediately set for his sentencing, which typically doesn't occur until weeks or even months after the verdict. But Cosby's chief defense attorney, Thomas Mesereau, told reporters he planned to file an appeal, saying he was “very disappointed by the verdict.” “We don't think Mr. Cosby's guilty of anything, and the fight is not over,” he said. Minutes earlier, those inside the courtroom, many of them Cosby accusers who had been attending the trial from the start, emerged outside in tears and embraces.
Incredible scenes as women run weeping from the courtroom immediately after Cosby is found GUITLY, and tearfully embrace one another. https://t.co/5GWThXycx9
Standing on the steps of the courthouse, an emotional Lili Bernard, who alleges Cosby drugged and raped her in the 1990s and has attended every day of the trial, told reporters she felt "like I'm dreaming." "I feel like my faith in humanity is restored," she added. Janice Baker-Kinney, who testified at the retrial that Cosby drugged and assaulted her in 1982 when she met him as a bartender in Reno, Nevada, said in a statement that she was "so grateful that this jury was able to distinguish the facts and really hear our true pain versus the defense’s shameful fictional nonsense, their vitriol and their stereotypical victim blaming."
Cosby never denied having sexual contact with Constand, but insisted it was consensual.
AFP / Getty Images Cosby defense attorneys Kathleen Bliss and Tom Mesereau leave after the retrial on April 26, 2018.
His defense team tried to paint Constand as a con artist who showed romantic interest in the comedian in order to concoct false assault allegations and secure a nearly $3.4 million civil settlement, at one point calling her a "pathological liar." But for the retrial, prosecutors were able to call on five other accusers who testified that they too were drugged by Cosby. Four of them, including model Janice Dickinson, said they were also sexually assaulted. More than 60 women have accused Cosby of drugging and sexually assaulting them over the span of decades, but Constand’s allegation was the only criminal case to be brought, in large part because most of the accusations were too old to prosecute. No criminal charges were brought at the time of Constand’s assault in 2004, and after she settled her civil lawsuit the next year in exchange for her silence, that’s where it would have likely stayed. But a decade later, a judge unsealed Cosby’s transcript for the deposition he gave in the civil case. In it, he admitted to giving women quaaludes, a powerful sedative, as a prelude to sex. Dozens of accusers pointed to the transcript as vindication of their claims, and public pressure to file charges in Constand’s case, which was still within the statute of limitations, increased. In 2017, Steele — who vowed to prosecute Cosby while campaigning for office — filed his case. For several weeks the trial was a media spectacle, but after spending more than 50 hours reviewing testimony, the sequestered jury of five women and seven men failed to reach a unanimous decision and the judge declared a mistrial. Victim-blaming was one of the reasons the jury couldn’t reach a verdict, with one of the holdouts telling the Philadelphia Inquirer he believed Constand’s actions contributed to what happened that night. “Let’s face it: She went up to his house with a bare midriff and incense and bath salts,” he said. “What the heck?” But that was summer of 2017. A few months later, the Harvey Weinstein sexual misconduct stories would break, sparking a firestorm of similar allegations against powerful Hollywood figures dating back decades. Experts told BuzzFeed News that the #MeToo reckoning that transpired would undoubtedly work against Cosby at his retrial. In an interview with BuzzFeed News, Bernard said a guilty verdict would represent "a real shift in humanity, in rape culture." Later, outside at the courthouse news conference, Bernard said last year's mistrial had left her "with such a tremendous sense of disappointment." "But today," she said, "this jury has shown that what the #MeToo movement is saying, is that women are worthy of being believed."
|
{
"pile_set_name": "OpenWebText2"
}
|
Must be 21 years of age or older to enter and present ID. Due to this type of event - no babies, no children, no strollers, no one under 21. $25 in advance | $30 at the door | Designated Driver tickets are $5 at the door
|
{
"pile_set_name": "Pile-CC"
}
|
Christian Pulisic has risen to prominence with Borussia Dortmund, but it appears the U.S. Men’s National Team forward could be ready to take the next step in his young professional career.
According to German site Sport1, Pulisic is considering a transfer or loan away from the club in search of more playing time. Recently, the 17-year-old forward was left off of the club’s matchday roster for Sunday’s German SuperCup loss to Bayern Munich. Pulisic did feature for the club throughout preseason, scoring the lone goal in an International Champions Cup clash with Manchester City last month.
Pulisic broke through into Dortmund’s first team in January and played 12 total matches for the German powerhouse. In those 12 matches, Pulisic contributed a pair of goals, becoming the youngest non-German and fourth-youngest overall player to score a goal in the Bundesliga.
However, the club has recently added several players capable of playing out wide following the departure of incumbent starter Henrikh Mkhitaryan. Recent signings Mario Gotze, Andre Schurrle, Ousmane Dembélé and Emre Mor could all push Pulisic further down the pecking order as the club looks to challenge Bayern for the Bundesliga title.
The 17-year-old has earned six caps with the USMNT and scored his first professional goal in May against Bolivia. Pulisic was a member of Jurgen Klinsmann’s roster for the Copa America, where he made a pair of appearances throughout the tournament.
What do you think of the news? Should Pulisic seek a move elsewhere? What leagues or teams would make sense for the young star?
Share your thoughts below.
|
{
"pile_set_name": "OpenWebText2"
}
|
Class of 2017 and Beyond
Students in the Class of 2017 and beyond minoring in psychology should take any four courses in psychology, at least one of which must be taken at the 300-level or higher, and PSY 202, Quantitative Research Methods.
|
{
"pile_set_name": "Pile-CC"
}
|
require "rails_helper"
describe Budgets::Ballot::LinesController do
describe "#load_budget" do
it "raises an error if budget slug is not found" do
controller.params[:budget_id] = "wrong_budget"
expect do
controller.send(:load_budget)
end.to raise_error ActiveRecord::RecordNotFound
end
it "raises an error if budget id is not found" do
controller.params[:budget_id] = 0
expect do
controller.send(:load_budget)
end.to raise_error ActiveRecord::RecordNotFound
end
end
end
|
{
"pile_set_name": "Github"
}
|
Hollywood's major movie studios have filed a lawsuit against Megaupload and several of its former employees, demanding millions of dollars in damages. In their complaint the studios describe the file-hosting service as a business that was set up to encourage piracy, which a nonsense claim according to Megaupload's legal team.
A few months ago the U.S. Department of Justice released a summary of its evidence against Megaupload, to assist civil parties who would want to start their own cases against the defunct file-hosting service.
Previously there have been some rumors that the MPAA was working on a lawsuit and this has now been confirmed. Twentieth Century Fox, Disney, Paramount Pictures, Universal, Columbia Pictures and Warner Bros. have teamed up and filed a complaint in a Virginia District Court.
The lawsuit is filed against Megaupload, Kim Dotcom and the former employees Mathias Ortmann and Bram Van Der Kolk. The same defendants are also part of the ongoing criminal proceedings by the U.S. Government, and the complaint itself raises many of the same allegations that were put forward in the indictment.
The movie studios describe Megaupload as a business that was designed to facilitate copyright infringement and are looking for millions of dollars in damages. One of the problems they describe is that, after a DMCA notice was received by Megaupload, it would only remove the URL while the actual file and other URLs pointing to that file would remain intact.
The movie studios claim that this was done to ensure that the most popular infringing files remained available. However, they fail to mention that removing the actual files would be overbroad and wrong in some instances. For example, if an artist stores his files on Hotfile but wants to take unauthorized copies offline, he or she would not want Megaupload to delete the original as well.
Megaupload’s reward program is also cited as a piracy promoting tool by the studios. According to the complaint it was set up to reward people who shared popular content, which would often be pirated movies. The rewards therefore served as an incentive to share links to Megaupload in public and advertise these through other sites.
This point is also raised by MPAA’s Steven Fabrizio, who notes that Megaupload wasn’t a cloud storage service but an “unlawful hub for mass distribution.”
“Megaupload was built on an incentive system that rewarded users for uploading the most popular content to the site, which was almost always stolen movies, TV shows and other commercial entertainment content. It paid users based on how many times the content was downloaded by others – and didn’t pay at all until that infringing content was downloaded 10,000 times,” Fabrizio explains.
TorrentFreak spoke to Megaupload lawyer Ira Rothken who believes that this new case might show that Hollywood and the U.S. Government have little faith in the criminal proceedings.
“Megaupload believes that the suit lacks merit and we will vigorously defend against the claims,” Rothken tells TF.
“The MPAA is apparently concocting a civil claim out of desperation two years after the indictment because it is likely that they and Department of Justice believe the pending criminal allegations lack merit, as there is no such thing as secondary criminal copyright infringement”
Rothken stresses that Megaupload was predominantly used for backup, and not for file-sharing as the complaint suggests. The movie studios paint a distorted picture of Megaupload according to the lawyer, who notes that the money paid out to uploaders was minimal, and that terminating the rewards program didn’t affect the number of visitors.
“The amount of money paid out in the rewards programs was tiny and a rounding error compared to revenue. The rewards program was halted about six months before the indictment with no resulting drop in traffic – it was copyright neutral,” Rothken explains to TF.
The case promises to be a vital one for the future of cloud hosting services in the United States, and a backup plan for when the criminal case fails.
The MPAA previously settled its lawsuit against Hotfile, and hopes for another win against Dotcom and his colleagues. Megaupload, however, believes it is protected by the DMCA safe harbor and is determined to show that the movie studio’s allegations are meritless.
In addition to the lawsuit filed this week, Megaupload has also been sued by Microhits in 2012. This case has been frozen pending the outcome of the criminal proceedings.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
I am trying to map IDs from inside a list of objects into a new list using React js
I want to make a new list from an existing one by fetching the IDs from the existing list of objects and copy it into a new list which is accessible throughout the component.
This existing list is being returned as part of response of a BE API
const key = [];
await RequestPortInService.fetchCurrentServices().then(response => {
response.currentServiceList.map(key => (
key = response.currentServiceList.serviceId
));
alert(key);
})
A:
your key values in the object response.currentServiceList.map will be on key so try using
var newSerivceIds = {};
await RequestPortInService.fetchCurrentServices().then(response => {
newSerivceIds= response.currentServiceList.map(key =>
{return key.serviceId});
})
alert(newSerivceIds)
|
{
"pile_set_name": "StackExchange"
}
|
While HIV/AIDS can be managed with antiretroviral drugs, these agents do not clear the virus and require life-long administration. Recently, we discovered a completely new class of compounds that interfere with the HIV-1 virulence factor called Nef. This viral protein is critical to HIV-1 replication in vivo, immune escape of HIV-infected cells, and AIDS progression. During the past year, we successfully completed Phase I of our STTR project aimed at development of Nef antagonists suitable for clinical testing. Working with the Fox Chase Chemical Diversity Center, we evaluated 50 analogs of our original diphenylpyrazolodiazene Nef inhibitor, some of which display tighter Nef binding while retaining potent antiretroviral activity and improved ADME properties. Several analogs prevent Nef-mediated downregulation of MHC-I on HIV-infected CD4+ T-cells, resulting in activation of autologous anti-HIV CD8+ CTLs. These data suggest that our Nef antagonists may restore recognition of HIV-infected cells by the patient's own immune system as a path to functional cure. In this Phase II application, we will expand our Nef drug development efforts with the following Specific Aims: Aim 1: Perform lead optimization medicinal chemistry. Based on SAR developed during Phase I, we propose to synthesize 100-150 new Nef inhibitor analogs to find suitable compounds for in vivo testing in Aim 3 using HIV-infected humanized mice. Our approach will employ structure-based design while considering analog ADMET and PK properties in parallel. All analogs will also be tested for Nef binding affinity, effects on Nef-mediated enhancement of HIV replication and reversal of CD4 and MHC-I downregulation by Nef in HIV-infected patient cells. Aim 2: Ensure suitable drug properties via in vitro and in vivo ADMET evaluation. Up to 15 compounds per year that meet Nef-binding and functional criteria (Aim 1) will be evaluated using in vitro ADMET assays including microsomal stability, CYP 3A4 inhibition, solubility and plasma protein binding. Three to six (IV) and 2-3 (PO) compounds will be evaluated in mouse PK studies, with the 2-3 most promising compounds advancing to in vitro non-GLP safety assays. These data are essential for choosing the best compounds for in vivo testing in humanized mouse models of HIV/AIDS (Aim 3). Aim 3: Test the hypothesis that Nef antagonists can suppress HIV replication and T-cell loss in a humanized mouse model of AIDS. Humanized mice infected with Nef-deleted HIV-1 exhibit dramatically lower viral loads and substantially less T cell depletion than those infected with wild-type virus. The most promising compounds identified in the first two Aims will therefore be administered to humanized mice to monitor effects on HIV replication, CD4+ T cell loss and immune system function. Successful completion of these goals will provide a comprehensive package to support advanced development, safety testing in large animals and advance the project further toward an IND submission for Phase I safety testing in normal volunteers.
|
{
"pile_set_name": "NIH ExPorter"
}
|
A No-Cook, and Almost No-Prep, Cold Melon Soup
In the market for finger food? (Who isn’t?) Need a party-friendly starter course? There’s an app for that, and every Tuesday we’ll bring you one from the BA recipe archive.
(Credit: Marshall Troy)
When the weather reaches above 90 degrees and your face feels like it’s melting off, it can be pretty difficult to choose something to serve at a dinner party. Our suggestion? Soup.
Wait a minute! We’re not crazy. We’re talking about a no-cook, no-stir, nearly no-prep soup that combines two of the most refreshing ingredients out there:
cantaloupe and cucumber. Yep, it’s a cantaloupe gazpacho, made savory with a bit of red onion, salt, and pepper. It’s all pureed together, and poof! It’s finished. Serve in shot glasses for an easy no-spoon-necessary appetizer, and make sure to garnish with the most refreshing herb of them all, mint.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Python: Parsing complex text file by delimiter
I'm quite new to Python and generally used to Java. I'm currently trying to parse a text file outputted by Praat that is always in the same format and looks generally like this, with a few more features:
-- Voice report for 53. Sound T1_1001501_vowels --
Date: Tue Aug 7 12:15:41 2018
Time range of SELECTION
From 0 to 0.696562 seconds (duration: 0.696562 seconds)
Pitch:
Median pitch: 212.598 Hz
Mean pitch: 211.571 Hz
Standard deviation: 23.891 Hz
Minimum pitch: 171.685 Hz
Maximum pitch: 265.678 Hz
Pulses:
Number of pulses: 126
Number of periods: 113
Mean period: 4.751119E-3 seconds
Standard deviation of period: 0.539182E-3 seconds
Voicing:
Fraction of locally unvoiced frames: 5.970% (12 / 201)
Number of voice breaks: 1
Degree of voice breaks: 2.692% (0.018751 seconds / 0.696562 seconds)
I would like to output something that looks like this:
0.696562,212.598,211.571,23.891,171.685,265.678,126,113,4.751119E-3,0.539182E-3,5.970,1,2.692
So essentially I want to print out a string of just the numbers between the colon and its following whitespace from each line, separated by commas. I know this might be a stupid question but I just can't figure it out in Python; any help would be much appreciated!
A:
Thank you for the help everyone! I actually came up with this solution:
import csv
input = 't2_5.txt'
input_name = input[:-4]
def parse(filepath):
data = []
with open(filepath, 'r') as file:
file.readline()
file.readline()
file.readline()
for line in file:
if line[0] == ' ':
start = line.find(':') + 2
end = line.find(' ', start)
if line[end - 1] == '%':
end -= 1
number = line[start:end]
data.append(number)
with open(input_name + '_output.csv', 'wb') as csvfile:
wr = csv.writer(csvfile)
wr.writerow(data)
parse(input)
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Dashing dashboard and batman.js binding
I'm writing a dashing widget to stream a video. I have a widget that works, however getting it to change the URL remotely with batman.js is eluding me. As far as I can tell, all I'm needing to do is modify the end of a URL inside an object, but I'm not sure if I'm even going about this the correct way.
I would like to use a command like dashing uses in its example:
curl -d '{ "auth_token": "YOUR_AUTH_TOKEN", "channel": "12345" }'\http://url:3030/widgets/twitch
the dashboard: twitch.erb
<li data-row="1" data-col="1" data-sizex="3" data-sizey="2">
<div data-id="twitch" data-view="twitch"></div>
</li>
the widget: twitch.html
<object type="application/x-shockwave-flash" height="700" width="990" id="live_embed_player_flash" data="http://www.twitch.tv/widgets/live_embed_player.swf?channel=CHANNEL"></object>
twitch.coffee
class Dashing.Twitch extends Dashing.Widget
ANSWERED
And of course, after playing with it for another 10 minutes I figured it out. But for anyone else, here is what I changed:
twitch.html
<object type="application/x-shockwave-flash" height="700" width="990" id="live_embed_player_flash" data-bind-data="channel | prepend 'http://www.twitch.tv/widgets/live_embed_player.swf?channel='"></object>
A:
And of course, after playing with it for another 10 minutes I figured it out. But for anyone else, here is what I changed:
twitch.html
<object type="application/x-shockwave-flash" height="700" width="990" id="live_embed_player_flash" data-bind-data="channel | prepend 'http://www.twitch.tv/widgets/live_embed_player.swf?channel='"></object>
|
{
"pile_set_name": "StackExchange"
}
|
Antiphospholipid antibodies bind to activated but not resting endothelial cells: is an independent triggering event required to induce antiphospholipid antibody-mediated disease?
Antiphospholipid antibodies (aPL) cause thrombotic disease and recurrent pregnancy loss. Despite their name it is now clear that the antigen for most antiphospholipid antibodies is the phospholipid-binding protein beta(2) glycoprotein I (beta(2)GPI). However, beta(2) glycoprotein I is only antigenic for antiphospholipid antibodies when the protein is immobilised on a suitable surface such as phosphatidyl serine. It has been suggested that antiphospholipid antibodies bind to beta(2) glycoprotein I on the surface of resting endothelial cells and this in turn leads to endothelial activation and the initiation of thrombosis. However, as phosphatidyl serine is absent from resting endothelial cell membranes, we questioned this hypothesis. The ability of human antiphospholipid antibody-containing sera and monoclonal antiphospholipid antibodies to interact with endothelial cells was examined using cell-based ELISAs employing human umbilical vein endothelial cells (HUVECs) as the antigen. The expression of adhesion molecules in response to treatment with antiphospholipid antibodies was also measured by a cell-based ELISA. Activation of NF kappa beta was examined using electrophoretic mobility shift assays (EMSAs). Neither monoclonal antiphospholipid antibodies nor human sera containing antiphospholipid antibodies bound to resting endothelial cells. In contrast, one monoclonal antiphospholipid antibody did bind to both activated and apoptotic endothelial cells. Antiphospholipid antibodies do not bind to resting endothelial cells nor do antiphospholipid antibodies activate resting endothelial cells. Rather, an independent triggering event is required to activate endothelial cells and subsequently some antiphospholipid antibodies may then bind to the activated endothelial cells and initiate a thrombogenic process.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
{
"pile_set_name": "PubMed Central"
}
|
|
The transition from egg to embryo involves major changes in cell fate and potential, including progression of the cell cycle from meiotic arrest through completion of meiosis to the initiation of mitosis (reviewed in [@bib12]; [@bib20]). This developmental transition involves major molecular changes in the egg including the polyadenylation of some maternal mRNAs (*e.g.*, for *Drosophila*: [@bib5]; [@bib13], [@bib14]) and the degradation of others (*e.g.*, [@bib10]; [@bib17]; [@bib25]), synthesis of new proteins, and phospho-modulation of others ([@bib18]; [@bib23]; [@bib33], [@bib34]). The molecular changes of "egg activation" are critical for pronuclear formation and cell cycle modulation, for embryonic patterning and morphogenesis, and for structural and chemical changes to the egg's outer coverings to block polyspermy and support the developing embryo.
Remarkably, most of this transition is driven or conducted entirely by parental (mostly maternal) molecules. In particular, maternally encoded mRNAs drive production of proteins needed for oocyte maturation and maintenance, for reversing this differentiated state after fertilization to permit totipotency, and for initiating early embryonic cell divisions and cell fate decisions. The maternal mRNAs needed for embryonic development must be kept stable until fertilization, and then must be translated at the appropriate time and place (*e.g.*, reviewed in [@bib24]; [@bib40], [@bib39]; [@bib43]; [@bib46]). At the same time, for embryogenesis to proceed normally, maternal RNAs must be eliminated at the appropriate time and place (*e.g.*, [@bib17]; [@bib25]) so that the zygotic genome can take over. For example, some cell cycle regulators must be eliminated in order for meiosis to resume (*e.g.*, [@bib38]; [@bib31]) and complete, in preparation for pronuclear fusion and embryonic mitoses; indeed many of the maternally stored mRNAs that are degraded at egg activation have roles in cell cycle regulation, (*e.g.*, meiotic cyclins; [@bib42]). Additionally, some mRNAs encoding localized proteins are initially present throughout the oocyte and undergo massive destabilization during egg activation except in protected local areas. Transcripts that fall into this latter category in *Drosophila* include those from the *[Hsp83](http://flybase.org/reports/FBgn0001233.html)*, *[nanos](http://flybase.org/reports/FBgn0002962.html)*, and *[Pgc](http://flybase.org/reports/FBgn0016053.html)* genes ([@bib1], [@bib2]). Destruction of maternal mRNAs occurs in two general phases (reviewed in [@bib26]). The first phase is maternally driven: products that had been loaded into the oocyte during oogenesis are activated, and they degrade certain RNAs; in *Drosophila*, 20% of stored maternal transcripts are subject to this degradation ([@bib40]). The second phase of degradation of maternal transcripts is dependent on zygotic gene expression. In *Drosophila*, an additional 15% of maternal transcripts are degraded under this control.
Identifying the regulators of stability and degradation of maternal RNAs has been challenging, both because egg activation is rapid and because many of its regulators are maternally encoded and therefore cannot be detected by looking for changes in the egg's transcriptome. However, studies in model systems have identified some regulators of the fate of maternal mRNAs. For example, in *Drosophila*, the maternal phase of degradation requires activity of the PAN GU (PNG) kinase complex, causing translation and activation of another key component the SMAUG (SMG) protein ([@bib42]). SMG binds to specific elements in certain maternal mRNAs, and targets these mRNAs for degradation by recruiting a deadenylase complex ([@bib4]; [@bib10]; [@bib36]). In another example, a zygotically encoded miR small-RNA has been shown to mediate the degradation of maternal RNAs in zebrafish ([@bib17]; [@bib3]). A similar mechanism, with a different miR, likely operates in *Drosophila* ([@bib7]), and the piRNA pathway is also involved in regulating maternal mRNA stability in *Drosophila* embryos ([@bib32]). But knowledge of the machinery that selectively degrades maternal mRNAs is incomplete.
A genetic approach, such as that taken by [@bib41] in *Drosophila melanogaster*, provides a way to identify important regulators of maternal mRNA stability. These authors identified several X-linked genes whose female sterile mutations affected the destabilization of maternally encoded *[Hsp83](http://flybase.org/reports/FBgn0001233.html)* mRNA in early embryos ([@bib41]). Many of these loci were linked to key pathways during egg activation. Among the molecules identified in this screen was a conserved GLD2 poly(A) polymerase, *[wispy](http://flybase.org/reports/FBgn0260780.html)*, which extends poly(A) tails of a large number of maternal mRNAs ([@bib13], [@bib14]; [@bib5]), permitting their stability and, where tested, their translation ([@bib5]; [@bib13]). Two loci were identified as *[grauzone](http://flybase.org/reports/FBgn0001133.html)* and *[cortex](http://flybase.org/reports/FBgn0000351.html)*, which were known to be required for completion of female meiosis ([@bib30]; [@bib28]; [@bib8]; [@bib38]). Genes encoding subunits of the early embryonic cell cycle regulator PNG kinase complex, including *[png](http://flybase.org/reports/FBgn0000826.html)*, *[plutonium (plu)](http://flybase.org/reports/FBgn0003114.html)*, and *[giant nuclei (gnu)](http://flybase.org/reports/FBgn0001120.html)* ([@bib27]), were also detected in the screen. Another mutation discovered in that screen was *[prg](http://flybase.org/reports/FBgn0027944.html)*, whose molecular identity was unknown. Offspring from *prg* mutant mothers fail to destabilize maternal *[Hsp83](http://flybase.org/reports/FBgn0001233.html)* mRNA, suggesting that PRG plays some role in maternal mRNA degradation. Here, we report molecular mapping and sequence analysis of *prg* mutant alleles that demonstrate that *prg* encodes a predicted RNA exonuclease, suggesting a role as part of the enzymatic machinery that degrades maternal mRNAs.
Materials and Methods {#s1}
=====================
Drosophila stocks and complementation tests {#s2}
-------------------------------------------
*prg^16A^*/*FM6* and *prg^32^*/*FM6* ([@bib41]) were kindly provided by W. Tadros and H. Lipshitz (Hospital for Sick Children, University of Toronto, Canada). *Drosophila* strains carrying deficiencies \[*[Df(1)BSC719](http://flybase.org/reports/FBab0045788.html)*/*Binsinscy*, *[Df(1)ED6565](http://flybase.org/reports/FBab0030194.html)*/*FM7h*, *[Df(1)A94](http://flybase.org/reports/FBab0000325.html)*/*FM6*, *[Df(1)BSC530](http://flybase.org/reports/FBab0045422.html)*/*Binsinscy*, *[Df(1)260-1](http://flybase.org/reports/FBab0000224.html)*/*FM4* and *[Df(1)AD11](http://flybase.org/reports/FBab0022059.html)*/*FM7c*\] or *P*-element insertion in the *prg* region (P{MaeUAS.6.11}*CG42666^GG01337^*, *P{EPgy2}CG42666^EY21466^* and *P{XP}CG42666^d10828^*) were obtained from the Bloomington Stock Center. For complementation tests, we crossed approximately five 3-d-old virgin females of each strain to *prg^16A^* and to *prg^32^* males, and scored the fertility of their *prg*/*Df* (or P-insertion) female progeny.
Nucleic acid extraction and PCRs {#s3}
--------------------------------
To identify the location of the mutant lesions in *prg*, whole fly genomic DNA was extracted from *prg^16A^* and *prg^32^* males as in [@bib37] and used as template to amplify target regions using GoTaq PCR amplification kit (Promega, Madison, WI). DNA sequencing was performed by Cornell Life Sciences Core Laboratories Center (Cornell University, Ithaca, NY). To examine *prg* expression, total RNA was extracted from 3- to 5-d-old adult males, adult females, and embryos collected 0−2, 2−4, or 4−6 hr after egg laying, cDNA was synthesized, and RT-PCR carried out as described previously ([@bib13]; [@bib15]). Primers for genomic and RT-PCRs are listed in Supplemental Material, [Table S1](http://www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.028415/-/DC1/TableS1.pdf).
Data availability {#s4}
-----------------
The authors state that all data necessary for confirming the conclusions presented in the article are represented fully within the article.
Results {#s5}
=======
prage alleles carry nonsense mutations in CG42666, a gene that encodes a predicted exonuclease {#s6}
----------------------------------------------------------------------------------------------
The *prg* gene was previously reported as in polytene chromosome region 1B4-1E2 ([@bib41]). To localize the *prg* gene more precisely, we carried out complementation analysis between both *prg* mutant alleles (*prg^16A^* and *prg^32^*) and six deficiencies in or near the 1B4-1E2 region ([Figure 1](#fig1){ref-type="fig"} and [Table S2](http://www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.028415/-/DC1/TableS2.pdf)). *[Df(1)BSC719](http://flybase.org/reports/FBab0045788.html)* failed to complement both *prg* alleles, while another line, *[Df(1)A94](http://flybase.org/reports/FBab0000325.html)*, carrying a partially overlapping deficiency complemented both alleles. These results suggested that the *prg* mutation was in chromosome region 2B12-13. Genomic DNA corresponding to the predicted exons of four genes in this region \[*[CG14812](http://flybase.org/reports/FBgn0026090.html)*, *[deltaCOP (CG14813)](http://flybase.org/reports/FBgn0028969.html)*, *[CG14814](http://flybase.org/reports/FBgn0023515.html)*, *[Med18 (CG14802)](http://flybase.org/reports/FBgn0026873.html)*\] was PCR-amplified and then sequenced in both *prg* mutant lines. We found no difference from wild type in these four genes for either *prg* allele. Considering the possibility that the cytological breakpoint in the deficiency might not have been perfectly annotated relative to the genome sequence, we expanded our search to include three additional genes \[*[CG42666](http://flybase.org/reports/FBgn0261548.html)* (originally called *CG14801*), *[CG14810](http://flybase.org/reports/FBgn0029589.html)*, *[CG14811](http://flybase.org/reports/FBgn0029590.html)*\] from the adjacent region, 2B10. No differences from wild-type sequence were seen in either *prg* mutant chromosome for *[CG14810](http://flybase.org/reports/FBgn0029589.html)* and *[CG14811](http://flybase.org/reports/FBgn0029590.html)*. However, as shown in [Figure 2](#fig2){ref-type="fig"} and [Figure 3](#fig3){ref-type="fig"} and detailed below, we found that both *prg* alleles have molecular lesions in the predicted ORF of *[CG42666](http://flybase.org/reports/FBgn0261548.html)*. Each mutant contains a C-to-T single nucleotide change. In each allele this change generates a premature stop codon in the reading frame that results in a truncated protein. These data suggest that *[CG42666](http://flybase.org/reports/FBgn0261548.html)* is the *prg* gene. Based on the *prg* mutant phenotype, one would expect *prg* RNA to be present in ovaries and early embryos. Our RT-PCR for *[CG42666](http://flybase.org/reports/FBgn0261548.html)* RNA confirmed this expected expression pattern ([Figure S1](http://www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.028415/-/DC1/FigureS1.pdf); see also [@bib16]).
{#fig1}
{#fig2}
{#fig3}
To confirm that the *prg* gene corresponds to CG42666, we carried out complementation tests of *prg* mutations with *P*-element insertions in *[CG42666](http://flybase.org/reports/FBgn0261548.html)*. We tested for complementation between both *prg* mutant alleles and three *P*-element insertion lines available from Bloomington Stock Center. Two insertions, *P{Mae UAS.6.11}CG42666^GG01337^* (Mae) and *[P{EPgy2}CG42666^EY21466^](http://flybase.org/reports/FBti0075984.html)* (EPgy2), failed to complement both *prg* mutant alleles. However, *[P{XP}CG42666^d10828^](http://flybase.org/reports/FBti0042960.html)* (XP) unexpectedly complemented both *prg* alleles. We confirmed, by RT-PCR with primers specific to the XP line, that this line had an insertion in *[CG42666](http://flybase.org/reports/FBgn0261548.html)* ([Figure S2](http://www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.028415/-/DC1/FigureS2.pdf)). Insertions Mae and EPyg2 are expected to disrupt all six RNA isoforms of *[CG42666](http://flybase.org/reports/FBgn0261548.html)*, whereas insertion XP only interrupts the PE isoform ([Figure 3](#fig3){ref-type="fig"}). Our data suggest that disruption of this single isoform by the XP insertion does not eliminate function of *[CG42666](http://flybase.org/reports/FBgn0261548.html)* gene; the other isoforms are likely expressed and produce functional PRG protein. Whether and how *[CG42666](http://flybase.org/reports/FBgn0261548.html)* isoforms can compensate for each other requires further study, but the results from the Mae and EPgy2 insertion lines confirm that *[CG42666](http://flybase.org/reports/FBgn0261548.html)* is the *[prg](http://flybase.org/reports/FBgn0027944.html)* gene.
*[CG42666](http://flybase.org/reports/FBgn0261548.html)* encodes 6 RNA isoforms (PE, PB, PD, PF, PC, PA) with differing 5′ ends, according to the latest annotation of the *Drosophila* genome (<http://www.flybase.org>) ([Figure 3](#fig3){ref-type="fig"}). The PA isoform, for example, encodes a predicted protein of 761 amino acids. Sequence similarity analysis reveals that the CG42666 protein (hereafter called the PRG protein) is a putative RNA exonuclease: Interpro sequence analysis and classification identified a single conserved domain near the C-terminal end of the protein with terms "Exonuclease" (IPR006055), "Ribonuclease H-like domain" (IPR012337), and "Exonuclease, RNase T/DNA polymerase III" (IPR013520). Each of the mutant *prg* alleles has a single base pair change toward the 3′ end of *[CG42666](http://flybase.org/reports/FBgn0261548.html)*, in the region that is shared by all six PRG isoforms. *prg^16A^* and *prg^32^* are both nonsense mutations, truncating their PRG proteins to 72 amino acids and 373 amino acids (relative to the PA isoform), respectively, and deleting the conserved exonuclease domain from each. Database searches revealed that the REX1_like exonuclease domain in the PRG protein is conserved among eukaryotes ([Figure 4](#fig4){ref-type="fig"}). In fruit flies, a domain of this type is also found in three additional genes. Of these three genes, the sequence of the predicted exonuclease domain of *[CG12877](http://flybase.org/reports/FBgn0039544.html)* is the most similar to that of *prg*.
{#fig4}
Discussion {#s7}
==========
Egg activation is a coordinated process that is critical to initiate embryo development (reviewed in [@bib12]; [@bib20]; [@bib22]; [@bib40]; [@bib43]; [@bib46]). Changes in the transcriptome during egg activation ([@bib17]; [@bib25]) are fundamental, as they will allow changes in the spectrum of proteins in the cell that transition its state from that of differentiated mature oocyte to totipotent dividing embryo. One enzymatic player in transcriptome dynamics during *Drosophila* egg activation is known: the GLD2-family poly(A) polymerase encoded by *[wispy](http://flybase.org/reports/FBgn0260780.html)* is essential for egg activation and early embryogenesis ([@bib5]; [@bib13]). WISPY polyadenylates a large fraction of the maternally loaded mRNAs in the egg ([@bib14]), presumably facilitating their efficient translation. But the machinery that catalyzes the degradation of maternal mRNAs during this transition is less fully understood. A genetic screen in *Drosophila* was successful in pinpointing candidates for roles in this degradation: genes whose mutants disrupted the destabilization of maternal mRNAs ([@bib41]). In this study we discovered that one of those genes, *prg*, encodes a predicted RNA exonuclease.
Approximately 55% of the *Drosophila* genome is represented as mRNA in the mature oocyte ([@bib43]). Approximately 1600 (20%) of these maternally stored mRNAs are degraded upon egg activation. Tadros *et al.* (2007a) showed that two-thirds of these destabilized transcripts are regulated through the SMG protein, and are enriched for elements critical for cell cycle regulation. The remaining one-third are enriched for genes required for oogenesis ([@bib43]). Evidence from yeast and *Xenopus* suggests that the first and often rate-limiting step in eukaryotic mRNA decay is the shortening of the poly(A) tail and the major deadenylase activity in *Drosophila* embryos is from the CCR4/POP2/NOT complex (reviewed in [@bib44]). For two different mRNAs, SMG has been shown to recruit the CCR4/POP2/NOT deadenylase complex to the target mRNA, which shortens the poly(A) tail ([@bib35]; [@bib47]). Specific sequences in the 3′ UTR can target cytoplasmic mRNA for deadenylation, followed by either exosome (3′ to 5′) degradation or exonuclease (5′ to 3′) decapping/degradation ([@bib21]). Both mechanisms require an exonucleolytic activity to complete the degradation ([@bib21]). It is not known which exonuclease(s) degrade maternal mRNAs in *Drosophila* embryos.
The function of REX1-like proteins like PRG is unknown in most organisms. The only role that has been reported is in yeast; its *REXO1* gene's function is required for RNA editing and maturation ([@bib29]; [@bib45]). The sequence data presented here, in conjunction with the phenotypic data reported by [@bib41] make it tempting to speculate that *prg* encodes an exonuclease that is actively involved in degrading maternal mRNA during the egg-to-embryo transition. Although it still remains to be demonstrated that the PRG protein has exonucleolytic activity, both *prg* alleles that fail to destabilize maternal mRNAs ([@bib41]) remove PRG's predicted exonuclease domain.
PRG's identity as a predicted RNA exonuclease raises several intriguing questions, beyond the obvious ones of its mechanism, potential partners, and targets. First, RNAseq ([@bib16]) and microarray ([@bib11]) data indicate that the *prg* gene is expressed in stages and tissues that are unrelated to the egg-to-embryo transition (for example, it is expressed in adult males); we have verified some of these data ([Figure S2](http://www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.028415/-/DC1/FigureS2.pdf)). Although the existing *prg* mutant alleles remove its exonuclease domain and thus are likely null for this function in the germline (supported by the fact that homozygotes and hemizygotes are equally sterile), both are viable. This suggests that either *prg*'s activity is not needed in later somatic tissues, or that there are compensatory activities (perhaps from *[CG12877](http://flybase.org/reports/FBgn0039544.html)* and/or the other two genes that encode proteins with exonuclease domains with some similarity to PRG's). Alternatively, PRG's translation might be regulated to restrict the protein's presence to the female's germline and early embryos. All of these will be fertile areas for future study.
Second, since some of the machinery required for the maternal/zygotic transition of the transcriptome is known, it will be intriguing to determine how *prg* relates to it. For example, the machinery includes the PNG kinase complex that upon egg activation triggers the translation of several maternal mRNAs including the one encoding SMG, the major factor that destabilizes maternal mRNAs in the early embryos ([@bib42]). How does *prg* activity interface with the SMG-dependent pathway? Are *prg* and *[smg](http://flybase.org/reports/FBgn0016070.html)* parts of independent pathways that act at different times? Or might *prg* control the stability of *[smg](http://flybase.org/reports/FBgn0016070.html)* mRNA (assuming that *[smg](http://flybase.org/reports/FBgn0016070.html)* mRNA must be translated upon egg activation), thus potentially regulating the amount of SMG or of components or assemblers of PNG kinase? Moreover, how is PRG itself regulated to act, including potentially to interface with the SMG pathway, so that it only degrades its targets after fertilization? Perhaps its targets are only modified appropriately at this time. Alternatively, perhaps PRG's translation requires progression past a critical stage of early development, such as the meiotic progression mediated by the products of the *[cortex](http://flybase.org/reports/FBgn0000351.html)* or *[grauzone](http://flybase.org/reports/FBgn0001133.html)* genes ([@bib28]; [@bib31]; [@bib38]), or requires elongation of its poly(A) tail by the WISPY cytoplasmic poly(A) polymerase, as is the case for BCD ([@bib13]; [@bib5]). It is also possible that PRG protein may be present in a nonfunctional state in oocytes, requiring post-translational modification during egg activation (*e.g.*, [@bib23]), or activation of a cofactor, or both, for its activity.
Finally, PolII binding assays ([@bib9]) have identified *prg* as one of ∼100 genes that start significant transcription during cycles 8--12. That *prg* mRNA is both maternally loaded and also zygotically transcribed prior to the maternal-to-zygotic transition (MZT) raises the intriguing possibility that PRG could play roles in regulating RNA stability before the MZT (potentially even contributing to the initiation of the MZT), and also in the second wave of maternal mRNA degradation that occurs subsequently. Our identification of *prg* as *[CG42666](http://flybase.org/reports/FBgn0261548.html)*, a predicted RNA exonuclease, permits the future investigation of these intriguing questions and further dissection of the molecular mechanisms that modulate maternal mRNA stability during the egg-to-embryo transition.
Supplementary Material
======================
###### Supplemental Material
We thank H. Lipshitz for *prg* mutant flies, J. Liu, M. Goldberg, K. Kemphues, and J. Schimenti for helpful discussions and for comments on an earlier version of this manuscript, and anonymous reviewers for helpful comments and suggestions. We also thank the Bloomington *Drosophila* Stock Center for deficiency and *P*-element insertion strains and FlyBase for curating the gene expression and gene structure data, We are grateful to National Institutes of Health (NIH) for grant R01-GM044659 and, subsequently, R01-HD072714 (to M.F.W.) for support of this work, and NIH training grant T32-GM07617 for partial support of C.V.S.
Supplemental material is available online at [www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.028415/-/DC1](http://www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.028415/-/DC1)
Communicating editor: H. K. Salz
[^1]: Present address: Department of Cell Biology and Neuroscience, Montana State University, Bozeman, MT 59717
[^2]: Present address: School of Pharmacology, University of California San Diego, La Jolla, CA 92093
[^3]: Present address: Center for Reproductive Biology, Washington State University, Pullman, WA 99164
[^4]: Present address: Pritzker School of Medicine, University of Chicago, Chicago, IL 60637
|
{
"pile_set_name": "PubMed Central"
}
|
Q:
Exporting a database to a different schema
I am creating an web application which is replacing the outdated one I currently use. The database is also outdated and horribly structured. For testing purposes I would like to export the old database and load it into the new one to have test data for the new web application. However, because of the schema changes to the database I need to manually change:
Table names
Column names
Example:
Old Database Table: part
id | date | user
New Database Table: apx_parts
id | date_created | user_id
Is there a MySQL tool or something to automate this? Would it have to be self-written in a scripting language?
Edit
Just to clarify, the reason I want it automated is because I want to use the most recent data that the old application is collecting.
A:
You're probably thinking about using mysqldump to copy the schema and data over. Instead, think about exporting the data by itself.
Create the new database and tables as you normally would.
Export the data from the old database using SELECT...INTO. Column names don't matter here. If there are new columns in the new database, you can compute their values in this SELECT or just ignore them.
Import the data into the new database using LOAD DATA
Good luck.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
How can I pass parameters to a view using cradle (CouchDB)
Using cradle, how am I able to pass parameters to a view in CouchDB?
Update
Say I want to return documents which match other properties than _key (the default)...
// document format
{
_key,
postHeading,
postBody,
postDate
}
What if I wanted to match documents against the postHeading property... How would I go about this? What would the view look like, and how would I pass a search string to that view?
At the moment I'm doing this...
database.get("980f2ba66d5c8f9c91b9204a4d00022a", function (error, document)
{
});
I would like to access a view instead, and instead of the 40 character long auto-generated key, I'd like to pass a string, matching another property.
Something along the lines of this...
database.save("_design/posts", {
single: {
map: function (document)
{
if (document.postHeading == PARAMETER_PASSED_GOES_HERE)
emit(null, document);
}
}
});
database.view("posts/single", function (error, documents)
{
});
A:
If you are querying a view try to pass second parameter as options object with your settings, for example:
db.view('characters/all', {descending: true}, function (err, res) {
res.forEach(function (row) {
sys.puts(row.name + " is on the " +
row.force + " side of the force.");
});
});
Also be aware of this:
Some query string parameters' values
have to be JSON-encoded.
EDIT:
As far as I know you can't create a view in CouchDB where you pass your custom parameter which will be used in map/reduce function code. You have to emit keys from your map function and based on them you can query the view with parameters like startkey and endkey. Try to look at Database Queries the CouchDB Way article.
|
{
"pile_set_name": "StackExchange"
}
|
The Queen will miss a New Year's Day church service at Sandringham because of a lingering "heavy cold", Buckingham Palace has said.
The monarch and Prince Philip both fell ill before Christmas, which forced them to delay their departure from London to the Norfolk estate for their annual festive break.
The Queen was also unable to attend a Christmas Day ceremony at St Mary Magdalene church for the first time since 1988.
Image: The Duke of Edinburgh was joined by Prince Charles and Prince Harry
Although she is thought to be up and about, she is still recovering from the persisting cold and felt unable to join other members of the Royal Family for today's 11am service.
A Palace spokeswoman said: "The Queen does not yet feel ready to attend church as she is still recuperating from a heavy cold."
The Duke of Edinburgh did attend the service, led by the Bishop of Norwich, after fully recovering from his cold.
He was joined by Prince Charles and Prince Harry, along with other members of the Royal Family.
At the service Princess Anne told well-wishers that her mother was feeling "better", the Daily Mirror reported.
The Queen, who turned 90 in April, traditionally spends Christmas at Sandringham with her family.
She and the Duke of Edinburgh eventually made it to Norfolk a day late after cancelling a train journey and flying by helicopter instead.
The Queen, who is the world's longest-reigning living monarch, said in December she would reduce the number of her patronages.
Her role with 25 organisations, including Battersea Dogs & Cats Home, Barnardo's and the Rugby Football Union, will be passed on to other members of the Royal Family this year.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
get src from every and set it to css as background
im trying to make jquery code which will get src from every image in html and set it to css for class for example number-1 and then set css for every img : visibility:hidden; I have coded function which add div before and will be wrapped into it. I have auto-generated html code and i dont want to edit every page.
var a = $('div.gallery > a > img');
for( var i = 0; i < a.length; i+=1 ) {
a.slice(i, i+1).wrapAll('<div class="grid-img"></div>');
}
$('.grid-img').each(function(i){
$(this).addClass('number-' + (i+1));
});
and then take every src from img add it to variable imgBgLink1,2,3,4 and set it as background-image for class number1,2,3,4
$("div.gallery a img").each(function(i){
var imgBgLink+'(i+1)' = $(this).attr("src");
$(".number+(i+1)").css("background-image", "url("imgBgLink+(i+1)")";
});
jsfiddle
A:
Your image selector is wrong, correct it to
var a = $('div.gallery > a > img'); // image is inside anchor tag
Also you can improve your jquery script like below
$(function(){
$('div.gallery > a > img').each(function(index){
$(this).addClass('number-' + (index+1));
$(this).wrapAll('<div class="grid-img"></div>');
});
});
Demo
EDIT : updated as per edited post
$(function(){
$('div.gallery > a > img').each(function(index){
var num = parseInt(index)+1;
var imageBG = $(this).attr('src')+num;
$(this).wrapAll('<div class="grid-img number-'+num+
'" style="background-image: url('+imageBG+')"></div>');
});
});
Demo
|
{
"pile_set_name": "StackExchange"
}
|
Abortion increases the risk of breast cancer. Abortion causes depression. Abortion isn’t safe.
These claims, repeated ad nauseam by the anti-choice movement, have found their way into legislative debates and even into court decisions.
But they aren’t true. In fact, they’ve been created and spread by a small, tightly knit group of doctors and scientists who have set up nonprofits, cite each other’s false research and provide “expert” testimony to bolster the cases of lawmakers trying to restrict abortion access.
In a new investigation, RH Reality Check’s Sofia Resnick and Sharon Coutts have uncovered the small network of “false witnesses” who are providing a sheen of respectability to the anti-choice movement’s unproven claims.
“What we’re seeing here is the same strategy that was used by big tobacco and by climate denialists,” Coutts said in a conference call unveiling the research this morning. Like in the efforts to deny climate change or cover up the risks of tobacco use, this small circle of activists “create the artifice that there is genuine disagreement” among doctors and scientists about the safety of abortion care, she added.
In the end, she said, “we are making decisions as a society that are based on literally fictional ideas about the dangers of abortion.”
From RH Reality Check’s report:
They create nonprofits, staffed with die-hard ideologues, and set about producing and promoting bogus science, to build the illusion of dissent or doubt over conclusions drawn by peer-reviewed scientific or medical research. They develop their own “research findings” to suit their ideological views. Then they deploy scare tactics, all with the goal of passing laws that suit their agenda. In this case, the agenda is to promote the theory that abortion harms women’s health—physically and mentally. It’s a strategy anti-choice activists have been working on for decades, but in recent years, sympathetic state attorneys general have been increasingly relying on a cadre of so-called experts who will defend and promote anti-choice laws. … Our investigation reveals the close connections between many of the ostensibly independent “research” groups that feature prominently in the anti-choice movement. Several groups, such as the Charlotte Lozier Institute, the Reproductive Research Audit, and the World Expert Consortium for Abortion Research and Education, share many of the same officers and experts. Our work details how the scientific and medical claims of these groups and individuals have been publicly discredited in episodes ranging from lying to the public, presenting false data in scientific journals, and being forced to retract articles that proved to be works of fiction presented as fact. Other doctors and professors catalogued in this gallery carry impressive credentials, appear to be apt in their fields, and are technically qualified to testify on reproductive-health issues. However, fueled by their religious or political beliefs (or both), many of these professionals have testified in support of unproven or discredited theories.
RH Reality Check’s profiles of the 14 key “false witnesses” are here.
|
{
"pile_set_name": "OpenWebText2"
}
|
Design by Community project by Nokia
Nokia has a brand new project known as Design by Community, where cellphone users are more than welcome to help the Finnish telecommunications giant create a “smartphone concept device of the future.” Basically, you are free to choose how a Nokia smartphone of the future would look like, ranging from display size to the operating system, construction materials, connectivity options, camera features and overall size and shape. Depending on the collective design choices, the Nokia Design team will come up with a 3D render of the final smartphone come this May. Hmmm, have they run out of ideas that they will need to get a democratic consensus of what goes into the next Nokia phone?
|
{
"pile_set_name": "Pile-CC"
}
|
I breathed deeply and stepped towards the centre of the ring. It was one of my earliest fights in England and my opponent was a popular local girl with vociferous support. I had trained hard for the bout. However, I lacked experience and had watched relatively few Muay Thai fights in person, relying instead on fight videos for inspiration. My opponent immediately started punching wildly—throwing big looping hooks.
Hold on—this isn’t what happens in the videos!
One problem with studying videos of professional fighters is it can leave you with unrealistic expectations of how your own fight will progress. In the bouts I had watched, especially those in Thailand, the boxers would start slowly—tentatively feeling each other out in the first round. I was foolishly unprepared for my opponent’s immediate onslaught—my guard low and insufficient. One of those big hooks connected with my left temple. And then the fight was over. It was less than a minute into the bout—probably even less than 30 seconds. I had—in boxing jargon—been “caught cold”. My memories of the event are patchy. I don’t recall experiencing any pain. I do remember my visual field gradually narrowing to darkness and the roar of the crowd petering out to silence. My next recollection is being in the changing rooms asking my trainer what happened. To this day I have no memory of the fight ending, congratulating my opponent, bowing and leaving the ring, and making my way backstage.
Brain MRI. Image source: Wikipedia.
During the time I was training for that fight, my “day job” was studying for a PhD in Neuroscience (the study of the brain) at Newcastle University. Given my academic background, one question I am often asked is whether the risk of damage to the brain caused by blows to the head has ever caused me concern. Before I address Muay Thai’s possible detrimental effects, I’ll start by discussing its positive effects. Often likened to a game of chess (with violence), Muay Thai involves complex strategies for attack, defence and counter, and a range of techniques. Therefore, to train in Muay Thai is mentally as well as physically stimulating. When a person learns a new skill, this encourages the generation of new nerve connections in the brain. During repeated practice, such as training drills, these connections are strengthened. The brain also has a regulatory process in which unused nerve cells are eliminated; so any activity that stimulates and encourages learning is beneficial to brain cell maintenance and function. The phrase “use it or lose it” is one that applies to the brain as much as to the muscles. According to research, vigorous exercise promotes the growth and survival of cells in an area of the brain involved in learning and memory. Increased blood flow during exercise has further beneficial effects of promoting the transport of oxygen and nutrients to brain cells.
But what happens to these brain cells after a punch to the head? A boxer can be on the receiving end of different grades of blows. A knockout (KO) blow to the head is a fight-finishing strike—often associated with loss of consciousness caused by trauma following the sharp rotation of the skull. Memory loss and concussion are other adverse effects. Strikes to the head can be concussive without causing a KO and these are more difficult to recognize—symptoms of headache, confusion, memory loss, or dizziness might not appear until several hours after a bout. Repeated subconcussive blows—which can be sustained within a fight or during sparring—can also cause changes within the brain and loss of cells.
According to the regulations, after a KO loss, a boxer should be restricted from competing for at least 30 days. From what I have observed in Thailand, this rule is not strictly enforced, especially in the provinces. Financial considerations tend to take precedence over safety considerations—fighters may have families to feed or gyms have overheads to be paid. About 5 years ago, I spent time training in Chiang Mai and remember one teenage boy there fighting 4 times within a 10-day period, losing by KO on 2 occasions. After one of those KOs, he was back in the ring only 2 days later, going on to win the ensuing bout. While I admired his tenacity, I did wonder what level of damage might have been inflicted on his adolescent brain.
The long-term effects of Muay Thai on the brain are unclear. Research is lacking—certainly in English language—on former Muay Thai fighters and permanent damage that might have resulted from head trauma sustained during fights. Most existing studies on the subject were conducted on international rules boxers. Dementia pugilistica or “punch drunk syndrome” is a form of dementia associated with boxing, and characterized by loss of memory and concentration, problems with coordination, and depression. Although Parkinson’s disease, mainly associated with tremor and movement disorder, has a range of proposed triggers, it has been famously linked to head trauma in boxing legends Muhammad Ali and Freddie Roach. Both dementia pugilistica and Parkinson’s disease can be difficult to diagnose, especially in their early stages. Without suggesting that all former Thai boxers are prone to alcoholism or substance abuse, rumours abound concerning ex-fighters and whisky and “yaa baa” (methamphetamine) habits, and therefore the distinguishing of changes in mental, physical, or psychiatric function deriving from Muay Thai-related head injuries from those caused by alcohol or substance abuse would be extremely problematic.
Losing a few brain cells sparring in Chiang Mai. Photo by Richard Crampton.
The medical community has different views on whether the wearing of a head guard actually offers any protection against head trauma. Some scientists have suggested that amateur boxing is safer than professional boxing because of the wearing of protective headgear and lower rate of KOs. Others have speculated that the head guard only protects against cuts and facial swellings and does not prevent brain trauma. Research findings have also suggested that it is the repeated subconcussive blows—not the KO blows—that cause most damage to brain health. One study evaluated 42 professional boxers using tests of attention, concentration, and memory. Poor performance in these tests was associated with the number of rounds of sparring a boxer had completed (when they were wearing head guards), and not with age, fight record, or history of KO.
After more than 11 years in the sport and 40+ fights, it is clear that I have not been deterred from training Muay Thai, despite its risks. Even after the KO loss, my feelings were of embarrassment and disappointment in myself rather than any particular concern for my health. Risk of head injury is associated with many other sports (including cycling, football and rugby) and several daily life activities. In Thailand, riding a motorbike without a helmet carries a far greater potential risk to health than fighting Muay Thai. Those who are concerned about head trauma should not be put off from the sport. It is quite possible to train without head contact and receive the same health benefits. Fighting is another matter but perhaps the risk is part of what makes it so exciting?
I am interested in hearing your views on the subject. Have you ever worried about damaging your brain through Muay Thai? How many of you have been knocked out during a fight and what are your memories of the experience? What are your views on wearing protective headgear—should it be made compulsory or do you feel it would “water down” a fight and makes it less interesting? It will take years of research before we can have clear answers on the effects of Muay Thai on the brain. For now, I’m not worried. When I consider the positive effects Muay Thai has had on my life—physical fitness, challenges and achievements, unique experiences, and a great deal of pleasure—these far outweigh any potential risks in my opinion.
Great article. I believe head gear and shin pads are a benefit for beginners and the sport. More people willing to take their first fight knowing they have protection… And the positives of training/fighting Muay thai out weigh the negatives…
Owenhttp://www.facebook.com/WarriorsOfTheMongkon
Great article! I’ve never been knocked out but there were a few times I’ve been rocked and couldn’t see for a round or two. I think wearing head gear as a professional (or even most amateur fights) would definitely take away from the sport. However if you’re just beginning and want to step into the ring before risking it all then head gear and shin guards isn’t the worst idea. Either way I agree that the positives of muay thai definitely out weigh the negatives!
I agree head guards would definitely take away from the sport for non-beginners. I don’t personally enjoy watching amateur Muay Thai fights nearly as much as professional bouts. The amateur boxing at the Olympics was still highly entertaining though….
I must thank you for the efforts you have put in piennng this blog. I really hope to see the same high-grade content from you in the future as well. In fact, your creative writing abilities has motivated me to get my very own site now
really enjoyed reading this, our health should be our main concern but we take that risk for the enjoyment of the sport and the buzz from training to progress and to win fights in the ring. with boxing i feel you are more at risk, in a fight and training you would take at least 60-70 % more shots to the head, but then u think strikes like elbows and knees could do a lot more damage then a punch. its a dangerous sport any contact sport is, what i am saying is them risks are there we take them regardless of how it may affect our health, we love the sport that much.
It would be interesting to know the comparative forces of an elbow and a punch to the head. I’m guessing the elbow could inflict greater force because if its rigidity and smaller area of contact, and a knee to the head even more. Couldn’t find any good information using a google search though! Thank you for your comment.
really interesting article Melissa! It’s amazing that you have a Phd in Neuroscience!
Although I was never knocked out during my Muay thai career by punches or elbows, I was recently hit by an elbow in a fight in a very dangerous spot, above my nose right in the middle of my eyes or eyebrows. For a few seconds I lost my eyesight. I had headaches afterwards and for a few days later and I had to travel by plane the next morning. People thought I had nothing and just cracked my nose. I found out later talking to my brother that that one of the most dangerous spots where you can hit someone in a street fight to defend yourself and it is so dangerous you might even kill someone.
It should be interesting to see the difference between the potential damage of an elbow strike and a punch strike.
Regarding a head guard I do also believe that when you wear one people tend to go harder or 100 percent and if anything it just blocks your vision making your moves and reaction slower. I do also recall the story of Adrienne, an American Amateur Muay thai fighter that died after an amateur fight in the States after receiving a few head punches in an Amateur fight, even though they said her injuries came more from heavy punches received before during sparring training.
So I don’t think a head guard really protects against brain damage.
I don’t see professional Muay thai with a head guard, it would make it another sport almost although I admit I really enjoyed watching a few Amateur World championship fights both at Ifma and WMF World championships. If Muay thai will ever be accepted in the Olympic games it will be with a head guard.
But again the rewards and life experience you can have from Muay thai doesn’t compare to anything else so it worth the risk.
Very interesting article, thank you. I am a professional Muay Thai boxer in the States, and I have been concussed in the sport. My last concussion was so severe that I had to take 3 weeks off my feet to recover. The funny thing is, I was never knocked out – I didn’t even fall down. I didn’t realize until the next day that something was wrong. Apparently, it’s not so much about one big hit as it is about the 2nd, 3rd and 10th big hits in a fight (or successive training sessions). From what I understand from the doctors I saw, concussions are like any other athletic injury, there is no way to tell when it might happen (the same way some people play long football careers relatively free from injury, while others tear their knee ligaments in high school practice), and so there isn’t really a way to protect against it. If you are sparring hard, headgear wont do a thing to save you from head injury, it’ll just obscure your vision. I think it’s one of those things where it is a dangerous sport, with tons of rewarding qualities, and you do it at your own risk.
I have only been knocked out once and my memory of the events is very sketchy.
The initial blow knocked me down and my head whiplashed into the canvas. It hurt, but I got up and told the referee I was okay to continue. We set to again… and that’s the last thing I remember until someone was putting a sponge full of cold water over the back of my head and I was on my knees.
The next thing I remember is after I had somehow got showered and dressed and was sitting in the bar nearby having an orange juice – with no idea how I got there from the ring.
I still have no recollection of those two missing time periods.
I spar in Muay Thai around three times a week without a headguard, but with 16oz gloves and shin guards, I’m 52 years old and I still seem to have all my faculties – unless I just haven’t remembered losing them?? *chuckles*
Excellent, clear, concise text in a truly accessible style. I would have expected no less. And you claimed that you were too far from your Doctorate to put it to use…… you underestimate your talents, which are many, and varied.
Hi there! I could have sworn I’ve visited your blog before but after going through some of the posts
I realized it’s new to me. Anyhow, I’m definitely happy I found it
and I’ll be bookmarking it and checking back frequently!
I am the parent of a 21 yr old son who is going to be having his first tournament in Feb I am terrified you have slightly helped me understand a bit but in this case he has had 18 concussions 3 of them where a grade 3 level .. all from football 3 yr ago he was or is labeled as having a brain injury you would never know it though is in great physical shape but I am still having a hard time with this…his dr that knows him would not sign for him to fight but he will just go to a dif dr who will say he is ok not knowing his past … I am very scared and confused as have been working in health care for years knows what the affects can happen to him but him being an adult not sure what I can do family is split on what I should do one says he happy let him other says if you don’t do everything you can to stop this fight how will feel if he becomes worse it will tear me up. Not sure what I am asking maybe for just some comment to either calm me or encourage me to fight harder to stop this ….
I can understand your concern – 18 does sound a high number of concussions to sustain. However, you should feel slightly reassured by the fact that your son suffered the injuries 3 years ago and no longer shows any symptoms. That would suggest he has fully recovered. I assume your son will be fighting in an amateur tournament and therefore wearing a head guard. A low rate of KO is associated with amateur fighting. Also, in Muay Thai the head is not the main target for strikes – kicks and knees are both scored more highly than punches. It is natural as a mother you will worry but, as you say, your son is an adult and can therefore make his own decisions on how he chooses to live his life. Risk is associated with so many sports and daily life activities – statistically higher than the risk associated with Muay Thai. And as I explained in my article, the benefits of Muay Thai far exceed the risks in my opinion. I think you should view your son’s passion for sports as a positive thing – better than him destroying his body with alcohol and drugs, for example.
I have accepted this is what he wants to do but bow I might just lose him any way a trainier I talked to phone the owner of the gym my son goes to and the oner called me and said no he cant fight in his gym and wanted to know who is so now he wont be able to and now he is going to hate me.
So from what you are saying, Melissa, the kid has 2 choices in life; 1) Participate in a “blood sport” where the object is to beat another human into submission (hopefully by knocking them unconscious), or, 2) destroy his own body with alcohol and drugs!?? Hummm, So a lack of martial arts participation leads to a life of alcohol and drugs? (I had actually read that it was the other way around, at least for pros in Thailand.) Life options sure have narrowed somewhat from when I was a kid.
Sorry, I don’t buy into the “great benefits” part of one-on-one combat. I’m sure there are immense physical, mental and spiritual health benefits from martial arts training, but the drive to actually use it on other people is a whole different matter.
One last thought. I don’t think that a parent is going to gain any level of comfort from the knowledge that Muay Thai favors kicking and kneeing over punching! Most KOs that I have seen in pro fights are the result of kicks, knees and elbows to the head. Any person who has sustained 18 concussions by the age of 21 already has brain damage and HAS NO BUSINESS participating in a kicking, kneeing, and punching sport. I would do just about anything to stop him if it were my kid. I really feel for the mom.
I’ve been trying to understand the scoring in Muay Thai. I recently had my first amateur fight, where my opponent wouldn’t/couldn’t throw kicks at me because I kept interrupting her with teeps to the solar plexus, which pushed her back. In Round 1, the combo I used was teep + roundhouse to the ribs, which she couldn’t defend against. She did manage to catch a roundhouse but I used it as a chance to keep punching her. Oh and she also managed a do a take down in Round 1.
During Round 2, she still didn’t do kicks. I got tired midway from all the kicking, so she took this opportunity to box me. I guess I panicked because I got cornered plus my headgear turned, completely blocking my vision. The ref did a standing knockdown count on me because I turned around (I know it’s dumb). I tried to “regain” points by kicking and clinching some more but I guess that didn’t work since, after the fight, she was declared winner by points.
This kind of confused me because what I know is that kicks to the body and neck garner the most points. Did that standing knockdown cause all my points from my clean hits to be “cancelled”?
I plan to fight again but I gotta understand how this thing works hahaha.
Thanks! Well, because of the count that round would have been scored 10-8 to your opponent so you would have had to really have dominated to pull back the deficit. The scoring is complicated especially considering the differences between scoring in Thailand and the rest of the world and the differences between amateur and professional fights. Good luck for your next fight!
Thank you very much for writing this. I ran across your piece in hopes of finding some encouragement because recently I suffered a minor concussion during a training session. My feelings are the same, super disappointment in myself because it wasn’t even a real fight. I’ve been training for a little over a year now and I’ve been picking up the pace in the last three months in hopes of doing a fight later this year. I’ve been hit a couple of times in the head, once really hard by a guy 3 times my size (I thought THAT was going to result in a concussion for sure!) but I lightly sparred w/ a person my size. Might I add that she has years of experience on me plus holds a title, but she was holding back, so what the heck?!
Here’s the rundown of what happened, and maybe you can help me understand what precautions I should take? We were practicing combos, most with head kicks. Because I knew what was coming, I guarded my head as instructed. Her kicks are killer, even when she is holding back. I was rocked quite a bit, but nothing I’m not used to. Later that day, I started getting concussion symptoms (blurred vision in the left eye, increased pain in the right). Long story short, before heading to the hospital, I was in bed unable to even cry because any movement made my head feel like it was going to explode. My temple was swollen and I threw up. About 2 hours later, the doctor had me do a few neuro tests (squeeze fingers, follow the light, etc.), but he wanted a CT Scan to be sure. Nothing was damaged, but I was prescribed some nausea medicine and ordered to lay off the Thai for 2 weeks.
I feel like weak sauce because I train with my heart in it. To get a serious injury like that is not funny, it was horrible and scary, but I don’t know anyone else who experiences that JUST training. I want to fight, but my trainer (and my parents, of course!) are concerned. I’ve read that head trauma can be helped with the right mouth guard. I currently have one by Shock Doctor. Maybe I need to clench my jaw tighter? I’m definitely going to use head gear when I get back into training, though, just in case. Do you have any suggestions for head covers? I’ve been told to lower my chin while covering my temple with one hand and resisting impact with the other.
Again, thanks for this piece. It really targets my specific situation and actually helps to understand the risks of the sport without the pessimism.
I think you might be just scared, anxiety and stress cause those symptoms too. If you are training just for fun, just tell your partners not to hit you hard, just touch; after all you do it for fun. If you plan to be a fighter… you have to get used to hits. Yes, clench your jaw tighter and lower your chin. But don’t think too much about it, as a fighter you are going to be hit in the head at least once, that’s the risk you are willing to take when you decide to be a fighter. Melissa is right in the article, I know people who have suffered more than one concussion and they are not fighters… everything has risks, you only live once… you want to fight? You are going to get blows to your head. Make sure you maximize your deffense so that this doesn’t happen regularly. Don’t expect blows to your head because you are going to get them if you do… just train your reflexes, enjoy and go with the flow. Muhammad Ali developed Parkinson but also did his father and he was not a boxer. On the other hand, Jack Dempsey keeped his brightness until the moment of his death. Nobody knows what life has planned for us!
The easy thing is to hit; what differences a great fighter from a good fighter, among other things, is the deffense. So train your reflexes to feel high kicks, and dodge them!
First let me apologise for the extremely delayed reply. My trainer and close friend died (after a stroke) and I had no heart for writing and haven’t logged onto this blog for several weeks. I can understand your concerns. It must have been terrifying to suffer such an acute injury after a seemingly minor strike. Unfortunately we have no way of knowing why one person’s body might react in one way to a situation or condition, whereas another person’s body might appear to have no effects. I think the key is to relax but it takes times to get over the psychological fears of reinjury after any type of serious injury. How are you doing now?
Hey I’ve read your article about head trauma and thai boxing it’s was great and recently was worried about it myself. I saw that you have 40 plus fights !!!? That’s awesome. From your experience and work as a Nero nurse ? What other conclusions have you drawn up is it safe ? I have 4 MMA fights under my belt with no kos but have had a concussion on dirt bike before
Actually I’ve never worked as a Neuro nurse. My PhD was in Neuroscience so I have some knowledge of the brain though my thesis project was not on head trauma. I would never go so far as to say Muay Thai is completely safe! It undoubtedly has risks but my point was that risk is associated with many other sports (eg. dirt biking!) and daily life activities and I believe the benefits of Muay Thai far outweigh the risks.
Thank you very much for your comment and good luck with your MMA training/fighting.
Thanks! I haven’t been able to find any epidemiological studies on Thai fighters (certainly not in English language). As I mentioned in my blog post, I also think it would be extremely problematic obtaining reliable data on brain injury associated with Muay Thai fighting because of the many other factors that influence brain function.
In Muay Thai it is very often comes to injuries in the brain, although nowdays, the rules are more ristrict than at the beginning of this sport, but you may still use the elbows for breaking the head like opening a cockonut when you realy have a good chance to hit with the elbows.
As a 20 year old knowing little about neuroscience and planning on taking up Muay Thai, I kinda wonder if one’s starting age has any effect on the brain injury risk potential. Could a younger practitioner’s brain adapt more easily and learn to recover from the damage, or is it just more vulnerable, making it a safer choise to start late?
Great article, so interesting on so many levels. I don’t fight, but my boyfriend does. He is 26 now, has been fighting since he was 9 years old. This worries me, I have to admit. He seems to be doing fine despite zoning out a lot, but I think that’s his nature. I do wonder, though, what it’ll be like for him in 30+ years…
Hi, so I have a problem with concussion symptoms. The first time I felt them was last year in April. They went away. I started training and sparring like usual. Didnt spar hard. Just did technical sparring. Had a fight in Fall 2013…I didnt get hit much but after the symptoms of concussion came back. I havent sparred hard since…until this week and got hit super hard in the head. Im feeling the symptoms again. This time around, I am not trying to cause added pressure to my head. Any advice? I never want to stop training and competing. What do you think about me just sparring technically and then competing 1-2 times a year depending on concussion symptoms? Thank you so much.
I think while you still have the symptoms you should actually stop training completely. When you are sure you are symptom-free, return to training in gradual stages (i.e., initially just jogging and skipping, then gradually working up to bag work, and later more intense pad work or technique drills with any contact). I would certainly advise staying off the sparring for some time – though for how long I am not really equipped to say. I completely understand that you never want to stop training and competing – I’ve experienced these same feelings when affected by injury. But as for competing, you really need to see how it goes when you reintroduce training and, at a much later stage, sparring. Recurring concussion symptoms is definitely a concern. Have you consulted a specialist?
Great blog, however, what about the damage you may be inflicting on your opponent?
Yes, it is a great sport and a great form of exercise, but although you can fight without getting hurt, your main objective in a fight is hurting your opponent, which means that only the best fighters will fight and not aquire brain damage.
On a brighter more positive note, I do understand that fighting is optional and you can receive the full benefits of the sport simply through training, while at the same time still being physically ready should you encounter a situation where you are forced to defend yourself.
Thanks! Well people will forever debate on that issue and I appreciate that not everyone understands why a person would want to fight and put themselves at risk. But yes, fighting is totally optional and the sport has a lot of benefits with or without that aspect.
My issue regarding concussion has to do with age. I am 53 and I love the sport and I love to spar. But If I get hit in the head with any amount of force. I get dizzy. I immediately stop sparring at that point. I spoke with my doctor. She says as you get older your brain is actually further from your skull which allows for more brain movement after a blow. Also, I played water polo for years in high school, college and after. I got hit in the head a lot with balls travelling 70 mph, elbows, etc… It never bothered me. I am wondering if all that abuse in my younger years is causing the problem I am having now. Anyone know anything about age and head trauma; even slight head trauma?
I know that subconcussive blows can have cumulative effects so it would make sense that you are increasingly experiencing symptoms as you get older. As for what you can do about that other than stop sparring I am not sure.
I’ve trained in martial arts for a long time as I love it, I started MT around 4 years ago, including sparring. I recently took a 6 month break from the sport while relocating to a new city for work and over the last few months I’ve started training at a new gym.
Last week I had my first sparring session in around 18 months, where the instructor had us pair off with various fighters of various sizes and experience, he told them I hadn’t sparred in a while. Definitely took a number of head shots as my defensive game was way off, plus some people were throwing down too, looking back I should of got out of the ring back and gone back to pads, but pride / stubbornness made me stay. I remember feeling quite depressed and empty afterwards – which at the time I put down to loss of pride/ego due to a poor show on my part, now I’m not so sure, this may have been the first onset of concussion. My forehead hurt to the touch the day after too – I’ve never had this before and I’m well used to taking part in contact sport. I appreciate risk of injury is part of the deal, which is usually far outweighed by all the positives – high levels of fitness, a great way to burn off stress, learning challenging skills/techniques, meeting new people, becoming proficient in self-defence and confidence.
This week I’ve been suffering with memory, focus, fatigue, problem solving, mental arithmetic and attention problems, plus feeling in a bit of a mental fog and it’s kind of got me a bit panicked / anxiety ridden – so much so that I went to A & E yesterday and they gave me a CT scan, which showed all clear. I rang the gym today and spoke to the trainer, explained things and he told me that apparently there is a bug going round the gym and he himself has been feeling out of sorts with the same symptoms I described. He told me not to worry and that he didn’t think it was concussion as most of the heavy shots were kicks to the legs.
I’m unsure though (as I did get clocked in the head a few times – possible cumulative concussive impacts), plus as I’ve only trained there for a few months I feel I don’t know the trainer well enough to be confident in his assessment or whether he may be just playing it all down to avoid any possible repercussions. I’m not sick physically in my body, just my head feels like its in a bubble and I’m disconnected from things. I have a very technical, mentally demanding job and I’m new to the company, which makes it doubly hard to get rest if it is concussion, obviously I am concerned about the long-term implications of this too.
When you went for the CT scan did you consult a doctor and explain your symptoms/activity? What did they say at the time? I can understand the trainer trying to put you at ease. In the end sparring was voluntary, and I imagine in most cases people come out of sparring sessions unscathed. Also, he’s a Muay Thai instructor, not a doctor, so I don’t think you should expect him to have the knowledge to give you an accurate assessment – you need a health expert for that. You mention that you have a demanding job and that you’re new to the company. Do you think it’s possible stress and anxiety from a combination of your new job and first sparring session in several months could be causing your symptoms? I don’t know you and am no expert but I think you should see a doctor again if you are still experiencing symptoms and concerned. I wish you the best.
Hey! I loved your article!
I am living in Thailand right now, on exchange. I’m sixteen, and have been training for about 2 months. The differences it has made for me are enourmous and I am planning to ramp up my training, 4-5 days a week, training runs about 3 hours a day. I have been going 2-3 days a week.
I think that in maybe 4 or 5 months, I might want to compete in a fight. I am hopelessly incompetent as of yet, sparred yesterday and completely failed to block kicks and was thrown several times. But I am getting better, and am utterly in love with the sport. I wondered if you had any advice about first fights, but also, I will be heading home in June and I want to continue training, do you have any thoughts or experience on finding muy Thai instructors in the U.S.?
Thanks! That’s great. I’m sure you’re not hopelessly incompetent — we all feel like that sometimes when sparring with Thais haha. Advice about first fights….relax. Actually that advice probably applies to all fights. I found my best fights were the ones in which I relaxed and enjoyed the moment, and my worst were the ones in which I was stressed and worried about the outcome. Where in the States are you from? I know a great guy who is a trainer at Renzo Gracie in NY and a friend of mine trains at NJMT in New Jersey. I also have friends who train at Coban’s gym in NY but am not too aware of gyms in other areas, sorry. Good luck with everything and thanks for reading and commenting. 🙂
I only just found this impressive post. I was addicted to boxing. It was so long ago that we never had headguards. I’ve been unable to find any good evidence that they make the sport any safer and I’ve been that the Olympics are dropping the requirement for headguards, at least for some weight classes, I suspect that their adoption, in the 1980s, was one reason why boxing went into a decline for a decade or so. What people like about combat sports is the intensity of the 6 – 30 minutes of action, and anything that reduces that intensity is undesirable for may people. After all, if yu wanted to be safe you’d wear padding all over your body, not just a pair of shorts. And what would be the point of that?
I recently tried to gather together my feelings about combat sports,under the title “Good toughness and bad toughness: why combat sports are fun and good for you” (see https://undertheropes.com/2016/04/18/good-toughness-and-bad-toughness/ ). To quote from that piece:
,
“People do contact sports because they are a bit dangerous, not despite the dangers.
It seems that many people have a sort of primeval urge to face danger and pain, and to conquer them.”
I was never professional, but we fought frequently from the age of 11 up to 37. I was KOed several times, but mostly fights were won by TKO or on points. The only really serious KO that I had was when I went over the handlebars of my bike, headfirst into a stone wall.
I suspect that if I were starting now I’d try muay thai or MMA (they didn’t exist in the west when I was active), In muay thai, you don’t take a s many punches as in boxing. And in MMA, a lot of the punches are with your head on the ground, so acceleration effects are much reduced (also, you can’t get the same force behind a punch as you can when standing).
Muhamed Ali’s Parkinson’s disease may or may not have been caused by taking hard punches, but most people who compete are not nearly as strong as professional heavyweights. If you want to test yourself, do for it. Just don’t get KOed too often,
Hi Melissa, My friend and I recently took up MT we go to different gyms he has a long background in ice hockey and i never did any sport. His gym is Chok Sabai in NYC mine is the UFC in Norwalk ct. My trainer is dead set against me sparring at the age of 60 and feels technical sparring and pad work is the only way to go. I disagree thinking the only way to practice the defense is to actually have to defend yourself from another actually trying to hit you. But case in point my friend (55) is sparring in Chok and got kicked n the face by a very tall guy(we are both in the 5’7″range) who is training for an upcoming fight and it blackened his eye and left the entire side of his face very swollen not out right concussion but…he complains about faulty memory etc …my question to you is it better and safer at our age to practice the MT without sparring…or do you think the only way to really master the sport is to spar. btw.. we are often complimented on our technical skills and physical ability..thanks
Well I suppose it depends on your objectives. If your aim is to fight then absolutely you need to spar. Otherwise you can still enjoy the sport without it. I kind of agree with your coach that technical sparring is the way to go…..I hate to use the phrase “at your age” but the body definitely changes as you get older — reflexes get slower, and injuries come easier and take longer to heal. Anyway, technical sparring is the way the Thais spar! Their sparring is much more playful then in the West. Not sure if what happened to your friend was accidental or intentional but no one should really be getting kicked in the head so they get a black eye/possible concussion in training, especially someone in their 50s. You leave the head kicks for the real fights. It’s good to hear that you have taken up Muay Thai and are enjoying it, James. I think it’s absolutely fine to stick to pad work and technical sparring and avoid the heavy contact stuff, doesn’t mean you haven’t mastered the sport at all. Thanks for reading my post and commenting 🙂
It’s asking too much to do full contact sparring at 60. My last fight was when I was 37 and. although I did some hard sparring after that, it got progressively more difficult to be really competitive.. If your 55 year old friend is having a fight, that’s remarkable. I just hope that it’s against someone of similar age and experience. It’s great that you are having a go, and I’m tempted to say that it’s never too late to start. In fact I did say it in https://undertheropes.com/2016/04/18/good-toughness-and-bad-toughness/
But getting problems with ‘faulty memory’ sounds dangerous to me. Although there’s is no clear relationship between blows to the head and dementia later, Alzheimer’s is such a frightful condition that it would be foolish to take a lot of punches/kicks to the head. As Melissa says, you don’t heal nearly as easily as you get older. When you’re 20 or 30 a punch in the face is something you can cope with and recover from pretty quickly. It’s all part of the challenge. Later you can’t do that.
It really might be better to treat your training as exercise, rather than preparation for fighting. It can still push your limits. My solution was to take to marathon running, It’s not the same, I know, but it’s quite challenging enough.
Personally I think headgear offers no brain protection. Same with gloves. The trauma is internal. I’ve been kicked and punched with clean shots, but never knocked out cold. I think I’m just as prone to brain injury without it. I don’t think padding mitigates it. I’ve got bare knuckle karate some time ago and the only difference is penetration power.
I am new to Muay Thai and only train once a week for about six months. The last month I have been getting headaches the day after training like clockwork. I don’t do hard sparing, so I am wondering if I am having issues from holding the pads wrong?
|
{
"pile_set_name": "Pile-CC"
}
|
Financial Times: What We Get Wrong About Technology. It cites boring advances like barbed wire and shipping containers to argue that some of the most transformative inventions are not the product of complicated high technology but just some clever hacks that manage to revolutionize everyday living. Throughout, it uses AI as a foil, starting with Rachel the android from Blade Runner and going on to people concerned about superintelligent AI:
Economists Erik Brynjolfsson and Andrew McAfee write of “the second machine age”, while the World Economic Forum’s Klaus Schwab favours the term “fourth industrial revolution”, following the upheavals of steam, electricity and computers. This coming revolution will be built on advances in artificial intelligence, robotics, virtual reality, nanotech, biotech, neurotech and a variety of other fields currently exciting venture capitalists. Forecasting the future of technology has always been an entertaining but fruitless game. Nothing looks more dated than yesterday’s edition of Tomorrow’s World. But history can teach us something useful: not to fixate on the idea of the next big thing, the isolated technological miracle that utterly transforms some part of economic life with barely a ripple elsewhere.
And:
If the fourth industrial revolution delivers on its promise, what lies ahead? Super-intelligent AI, perhaps? Killer robots? Telepathy: Elon Musk’s company, Neuralink, is on the case. Nanobots that live in our blood, zapping tumours? Perhaps, finally, Rachael? The toilet-paper principle suggests that we should be paying as much attention to the cheapest technologies as to the most sophisticated. One candidate: cheap sensors and cheap internet connections. There are multiple sensors in every smartphone, but increasingly they’re everywhere, from jet engines to the soil of Californian almond farms — spotting patterns, fixing problems and eking out efficiency gains. They are also a potential privacy and security nightmare, as we’re dimly starting to realise.
And:
Like paper, [mildly interesting warehouse management program] Jennifer is inexpensive and easy to overlook. And like the electric dynamo, the technologies in Jennifer are having an impact because they enable managers to reshape the workplace. Science fiction has taught us to fear superhuman robots such as Rachael; perhaps we should be more afraid of Jennifer.
I agree with the gist of this article. It’s correct to say that we often overlook less glorious technologies. It’s entirely right in pointing out things like barbed wire as good examples of these.
Also, it was written on a digital brain made of rare-earth metals consisting of billions of tiny circuits crammed into a couple of cubic inches, connected to millions of other such brains by underwater fiber optic cables that connect entire continents with one another at an appreciable fraction of the speed of light.
What I’m saying is, sometimes the exciting cool technologies are pretty great too.
I realize this isn’t a brilliant or controversial insight. Exciting-looking technologies that everybody agrees will be exciting turn out to be exciting, breaking news, more at eleven.
But then what am I to make of the original article? It points out some cases where simple boring technologies proved to be pretty important. In one or two cases, it describes a field where a simple boring technology proved to be more important than a flashier and superficially-much-more-promising technology. Then it concludes that “perhaps” we should be more afraid of simple voice recognition programs than of superintelligent AI.
I can come up with equally compelling anecdotes proving the opposite. For example, the humble stirrup was one of the most disruptive and important innovations in world history – read about the Great Stirrup Controversy sometime. Imagine a society of horses in 1890, where some especially wise horse relates the story, and concludes with “So perhaps we should be more concerned about simple innovations like new stirrups and more efficient reins, than of the motorcar.” Nice try, A+ for effort, you’re still going to end up as glue.
I don’t want to claim that flashy paradigm-shifting technologies are always more disruptive than simple boring technologies, or that technologies always deploy quickly. I do want to claim that the article hasn’t even tried to prove the opposite. So when it says “perhaps we should be more worried about warehouse management programs than superintelligent AIs”, it means “perhaps” in the weaselly sense, like “perhaps we should be more worried about a massive worldwide snake infestation than global warming. I have no evidence for this, but perhaps it is true.”
Part of me wants to let this pass. It’s obviously a throwaway line, not really meant to be a strong argument. But another part of me thinks that’s exactly the problem. There are so many good throwaway lines you could use to end a piece. If you have to halfheartedly make a not-strong argument for something, why would you choose the one where you randomly dismiss an impending threat that already has way too few people willing to pay any attention to it?
I worry there’s a general undersupply of meta-contrarianism. You have an obvious point (exciting technologies are exciting). You have a counternarrative that offers a subtle but useful correction (there are also some occasional exceptions where the supposedly-unexciting technologies can be more exciting than the supposedly-exciting ones). Sophisticated people jump onto the counternarrative to show their sophistication and prove that they understand the subtle points it makes. Then everyone gets so obsessed with the counternarrative that anyone who makes the obvious point gets shouted down (“What? Exciting technologies are exciting? Do you even read Financial Times? It’s the unexciting technologies that are truly exciting!”). And only rarely does anyone take a step back and remind everyone that the obviously-true thing is still true and the exceptions are still just exceptions.
And for some reason, any discussion of AI risk dials this up to eleven. It seems pretty obvious that smarter-than-human AI could be dangerous for humans. For a hundred years, every scientist and science fiction writer who’s considered the problem has concluded that smarter-than-human AI could be dangerous for humans. And so we get these constant hot takes, “Oh, you’re afraid of superintelligent AI? What if the real superintelligent AI was capitalism?” Or “What if the real superintelligent AI was the superintelligent AI in the heart of all humanity?” Or just “What if superintelligent AI turns out to be less important than a bunch of small humble technologies that don’t look like anything much?” And so I feel like I have to do the boring work of saying “hey, by the way, 10-20% of AI researchers believe their field will end in an ‘existential catastrophe’ for the human race, and this number is growing every year, Steven Hawking is a pretty smart guy and he says we could all die, and Nick Bostrom is an Oxford professor and he says we could all die, and Elon Musk is Elon Musk and he says we could all die, and this isn’t actually a metaphor for anything, we are actually seriously worried that we could all die here”.
But I worry even more that this isn’t an attempt to sound sophisticated. I worry that it’s trying to sound cautious. Like, “ah, yes, some firebrands and agitators say that we could all die here, but I think more sober souls can get together and say that probably things will continue much as they always have, or else be different in unpredictable ways because history is always inherently unpredictable”, or something like that.
I worry that people don’t adequately separate two kinds of caution. Call them local caution and global caution. Suppose some new spacecraft is about to be launched. A hundred experts have evaluated it and determined that it’s safe. But some low-ranking engineer at NASA who happens to have some personal familiarity with the components involved looks at the schematics and just has a really bad feeling. It’s not that there’s any specific glaring flaw. It’s not any of the known problems that have ever led to spacecraft failure before. Just that a lot of the parts weren’t quite designed to go together in exactly that way, and that without being entirely able to explain his reasoning, he would not be the least bit surprised if that spacecraft exploded.
What is the cautious thing to do? The locally cautious response is for the engineer to accept that a hundred experts probably know better than he does. To cautiously remind himself that it’s unlikely he would discover a new spacecraft failure mode unlike any before. To cautiously admit that grounding a spacecraft on an intuition would be crazy. But the globally cautious response is to run screaming into the NASA director’s office, demanding that he stop the launch immediately until there can be a full review of everything. There’s a sense in which this is rash and ignores all sorts of generally wise and time-tested heuristics like the ones above. But if by “caution” you mean you want as few astronauts as possible to end up as smithereens, it’s the way to go.
And part of me gets really happy when people say that we should avoid jumping to conclusions about AI being dangerous, because the future often confounds our expectations, and shocking discontinuous changes are less likely than gradual changes based on a bunch of little things, or any of a dozen other wise and entirely correct maxims. These are the principles of rationality that people should consider when making predictions, the epistemic caution that forms a rare and valuable virtue.
But this is the wrong kind of caution for this situation. It’s assuming that there’s some sort of mad rush to worrying about AI, and people need to remember that it might not be so bad. That’s the opposite of reality. As a society, we spend about $9 million yearly looking into AI safety, including the blue-sky and strategy research intended to figure out whether there’s other research we should be doing. This is good, but it’s about one percent of the amount that we spend on simulated online farming games. This isn’t epistemic caution. It’s insanity. It’s like a general who refuses to post sentries, because we can’t be certain of anything in this world, so therefore we can’t be certain the enemy will launch an attack tonight. The general isn’t being skeptical and hard-headed. He’s just being insane.
And I worry this is the kind of mindset that leads to throwaway phrases like “perhaps we should be more worried about this new warehouse management program than about superintelligent AI”. Sure, perhaps this is true. But perhaps it isn’t. “Perhaps” is a commutative term. So, “Perhaps we should be more worried about superintelligent AI than about a new warehouse management program”. But the warehouse management company makes more money each year than the entire AI safety field budget combined.
Perhaps we should spend more time worrying about this, and less time thinking of clever reasons why our inaction might turn out to be okay after all.
|
{
"pile_set_name": "OpenWebText2"
}
|
The present invention concerns a process and a catalyst for the hydrogenation of the carbon oxides carbon monoxide and carbon dioxide. More specifically, this invention relates to a process for reacting or removing carbon oxides by hydrogenation using a catalyst comprising a support and an active component being of the composition of alloys of Ni, Fe and Co metals in oxide or reduced form.
The presence of carbon monoxide in feed gases is undesired in a number of processes.
In a fuel cell, such as a Polymer Electrolyte Membrane Fuel Cell, the presence of carbon monoxide is very critical since it can poison the noble metal electrodes used in fuel cells and therefore reduce their effectiveness.
Preferably, the CO concentration for fuel cell feed should be less than 100 ppm, more preferably less then 50 ppm. However, the initial concentration of CO, as received from the fuel processor, can exceed 1 wt %. Therefore, further reduction of CO concentration is required. Some of the typical methods for reducing CO concentration are selective catalytic oxidation of CO, pressure swing adsorption, hydrogen separation by membrane and methanation of CO.
Similarly, in ammonia production plants, the presence of CO is also highly undesirable in the ammonia synthesis reactor and the carbon oxide concentrations should usually be reduced to values as low as 5-10 ppmv.
Reacting carbon monoxide and carbon dioxide with hydrogen may also be used in the preparation of methane/synthetic natural gas (SNG). SNG can be produced by gasification of biomass or coal and subsequent methanation.
Methanation is a process where carbon oxides are reacted with hydrogen in the presence of a catalyst to produce methane and possibly smaller amounts of other lower hydrocarbons and water. In the known methanation processes, precious metals supported on a carrier as Al2O3, SiO2 or TiO2 have been used as a catalyst for CO methanation (U.S. Pat. No. 3,615,164 and WO 01/64337). These catalysts are usually able to reduce CO concentrations to values of about 500-800 ppm. Nickel-alumina catalysts, which are presently used in conventional methanation processes, contain large proportions of nickel, generally in excess of about 20 wt %. This requirement places certain limitations on practical methods for manufacturing such catalysts. In ammonia plants, methanation is mainly performed in the temperature range of 250° C. to 350° C. in the presence of Ni/Al2O3 catalysts. Modifications of such catalysts are desirable to achieve reduction and reaction at relatively lower temperatures than in the conventional design.
Alloying an active metal with a second active or inactive metal can change the catalytic performance drastically. For example with a monometallic iron catalyst and bimetallic copper-iron catalysts (E. Boellard, F. Th. van Scheur, A. M. van der Kraan, J. W. Geus, Appl Catal. A 171 (1998) 333. It has further been demonstrated that the reduction profile, carbon monoxide chemisorption properties and the Fischer-Tropsch activity were substantially altered by adding copper to the iron phase.
French patent application FR 863473-A describes a process for the production of hydrocarbons by hydrogenation of carbon monoxide in which the catalyst contains iron and nickel with an atomic ratio of 1:1.
Patent application US 2005/0096211 describes a catalyst for fuel cell applications, which is highly selective in CO methanation, prevents the conversion of CO2 into CO and suppresses CO2 methanation. The catalyst comprises a metal selected from the group consisting of ruthenium, nickel, iron, cobalt, lead, tin, silver, iridium, gold, copper, manganese, zinc, zirconium, molybdenum, other metals that form metal-carbonyl species and combinations thereof on a support.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
.arch ev6
.text
.align 4
.globl GC_push_regs
.ent GC_push_regs 2
GC_push_regs:
ldgp $gp, 0($27)
lda $sp, -16($sp)
stq $26, 0($sp)
.mask 0x04000000, 0
.frame $sp, 16, $26, 0
/* $0 integer result */
/* $1-$8 temp regs - not preserved cross calls */
/* $9-$15 call saved regs */
/* $16-$21 argument regs - not preserved cross calls */
/* $22-$28 temp regs - not preserved cross calls */
/* $29 global pointer - not preserved cross calls */
/* $30 stack pointer */
# define call_push(x) \
mov x, $16; \
jsr $26, GC_push_one; \
ldgp $gp, 0($26)
call_push($9)
call_push($10)
call_push($11)
call_push($12)
call_push($13)
call_push($14)
call_push($15)
/* $f0-$f1 floating point results */
/* $f2-$f9 call saved regs */
/* $f10-$f30 temp regs - not preserved cross calls */
/* Use the most efficient transfer method for this hardware. */
/* Bit 1 detects the FIX extension, which includes ftoit. */
amask 2, $0
bne $0, $use_stack
#undef call_push
#define call_push(x) \
ftoit x, $16; \
jsr $26, GC_push_one; \
ldgp $gp, 0($26)
call_push($f2)
call_push($f3)
call_push($f4)
call_push($f5)
call_push($f6)
call_push($f7)
call_push($f8)
call_push($f9)
ldq $26, 0($sp)
lda $sp, 16($sp)
ret $31, ($26), 1
.align 4
$use_stack:
#undef call_push
#define call_push(x) \
stt x, 8($sp); \
ldq $16, 8($sp); \
jsr $26, GC_push_one; \
ldgp $gp, 0($26)
call_push($f2)
call_push($f3)
call_push($f4)
call_push($f5)
call_push($f6)
call_push($f7)
call_push($f8)
call_push($f9)
ldq $26, 0($sp)
lda $sp, 16($sp)
ret $31, ($26), 1
.end GC_push_regs
|
{
"pile_set_name": "Github"
}
|
1. Field of the Invention
The invention relates to a transparent composite system comprising polymethyl methacrylate (PMMA) plates and an intermediate layer of an elastomeric resin.
2. Discussion of the Background
Polymethyl methacrylate, and copolymers of methyl methacrylate, exhibit characteristics which are desirable for glazing materials: particularly high transparency and good weather resistance, and--in comparison with silicate glass--a lower weight. But these advantageous, optical characteristics of PMMA and its copolymers are diminished by the brittleness of these materials. This brittleness exhibits itself in the splintering off of shards or parts of the PMMA when it undergoes mechanical stress.
This intrinsic brittleness of PMMA (in addition to its poor scratch resistance and its flammability) naturally reduces its application, especially as a construction material or in areas of high traffic or public use. Several attempts to eliminate these disadvantages have been reported. (see H. Rauch-Puntigam, Th. Volker, Acryl- und Methacrylverbindungen, Springer-Verlag 1967, p. 291).
For example, German Patent Application 29 14 223 recommends, e.g. a clear, transparent synthetic resin composite plate consisting of a clear, transparent plastic base plate with a thickness of at least 1 mm and with parallel surfaces, at least one clear, transparent plastic foil with a scratch resistance not less than that of the base plate, and at least one clear, transparent adhesive resin layer positioned between the base plate and plastic foil, which adheres to the foil in fixed manner and which can be pulled off the base plate.
Japanese Application 61 132 343 (Chem. Abstr. 105, 154387e) discloses an acrylic glass laminate consisting of two exterior hard plastic plates and an intermediate plate of soft plastic with an electrically conductive layer on or near the surface. The intermediate layer is, e.g., an MMA-methacrylate-elastomer equipped on both sides with an antistatic agent and an acrylate adhesive.
German Application 31 28 985 discloses laminated, thermoplastic objects. The laminates are obtained by joining at least one PMMA film with at least one impact-resistant methacrylate polymer by calendaring.
European Patent 419 166 describes co-extruded multi-layer webs consisting of a complex configuration of individual layers with a thickness of 0.3 to 6 mm each. The first exterior layer consists of a blend of polyvinylidene fluoride with M.sub.n <250,000, 30-60% by weight C1-C8 alkyl methacrylate with M.sub.n .ltoreq.150,000, and possibly 10-30% by weight of a graft elastomer of C1-C8 alkyl acrylate, grafted and cross-linked with allylmethacrylate, as well as at least one second layer of an alkyl methacrylate homopolymer or copolymer. The co-extrusion is performed through a multiple extrusion nozzle.
There are also papers on laminates from different plastics. Illinger et al. in Polym. Sci. Technol. 1975, 9A (Adhes. Sci. Technol) 217-232, e.g., proposes laminates of acrylate-polyurethane-polycarbonate for the protection of windshields, whereby it is emphasized that the impact resistance and the optical clarity of the laminates depend on the chemical composition of the intermediate adhesion layer. European Patent Application 138 083 proposes polymer mixtures as an intermediate adhesion layer for laminates, said intermediate adhesion layers consisting of copolymers of firstly 81-99 weight parts olefin and unsaturated carboxylic acids and secondly of 1-19 weight parts thermoplastic elastomers, whereby the former are present dispersed as particles. The use of fiber inserts, particularly glass and carbon fiber inserts, has also been considered in attempting to improve the splintering safety of thermoplasts, such as acrylic glasses (cf. European Patent 0 510 927).
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
If you'd asked me when I was 10, I would have told you WITHOUT A SHADOW OF A DOUBT that by 2011 we'd all be shooting around in the sky with jetpacks on, crashing into each other, getting sucked into jet engines, and all around dying every way possible a person with a rocket strapped to their back can. But are we? Nooooooooooooo. Enter Martin Aircraft, the developer of a 'jetpack' (which actually functions with ducted fans and not jets) I've been reporting on since 2008, just waiting to get my hands on one and touch the sky. Oooooooor hover outside your bedroom window watching you change.
Jetpacks...have no passive ways of generating lift, so if you run into a mechanical issue, you're pretty well screwed. Martin Aircraft is well aware of this potentially fatal shortcoming, so they've installed a ballistic parachute system designed to get you to a safe landing no matter what happens.
A ballistic parachute is just like a normal parachute except that it uses a small explosive charge to deploy itself really, really fast. Since you don't have to wait for the parachute to open, it'll do its job even if you're close to the ground
There's still no official release date, but there is a video after the jump of a guy taking the thing to 5,000ft (you should have gone the extra 280-feet to a mile and played with yourself!) and deploying the emergency parachute. SPOILER: it worked. "Dammit!" You're sick.
UPDATE: Test dummy, not an actual person. Now even I'm pissed that shit didn't catch fire and explode.
Thanks to Mike, Joseph B., costy and Reed, who have all reached for the stars with over $100 of fireworks strapped to their backs. How'd that work out for you guys? Nothing but burnt buttcheeks? Shocking Smoldering.
|
{
"pile_set_name": "Pile-CC"
}
|
Micah Richards is set to feature for Aston Villa as they look for their first win in 17 Premier League games at Norwich on Monday afternoon.
Remi Garde's side came from behind to nab a point against West ham on Boxing Day, their second league draw in succession, but remain four points adrift of 19th-placed Sunderland at the foot of the table.
Norwich sit just outside the relegation zone on goal difference, level on points with 18th-place Newcastle, following their 3-0 defeat to Tottenham on Boxing Day.
Team news
Norwich duo Wes Hoolahan and Gary O'Neil are expected to return for Monday's clash at Carrow Road. The duo were rested for the defeat to Tottenham on Boxing Day, while Andre Wisdom is hoping to overcome a hamstring strain.
Image: Wes Hoolahan is set to make a return for Norwich at Carrow Road
Matt Jarvis is close to recovering from a knee injury, but the game against Aston Villa is likely to come too soon for the 29-year-old.
Carlos Sanchez, meanwhile, misses out for Villa with a hamstring injury sustained in Saturday's 1-1 draw against West Ham. He will be assessed ahead of the weekend's trip to Sunderland but will not make the trip to Norfolk.
Richards is close to a return from a knee injury and the skipper could feature at Carrow Road, while Jordan Amavi (knee) is a long-term absentee.
Aston Villa boss Remi Garde felt his side deserved more than just a draw against West Ham
Opta stats
Norwich have scored in all but two of their 27 league meetings with Aston Villa at home.
Gabriel Agbonlahor has had a hand in six goals (three goals, three assists) in six Premier League appearances against Norwich.
The Canaries have not won their final league game in a calendar year since 2010; losing in 2014, 2013 and 2012 and drawing in 2011.
Aston Villa have won just three of their last 12 Premier League games against newly-promoted opposition (D3 L6).
Norwich manager Alex Neil felt his side lacked some belief in their 3-0 loss to Tottenham
The Canaries have netted just four goals in their last five Premier League games at Carrow Road, three of which have been scored from corners.
Since winning away at Bournemouth on the opening day of the season, Aston Villa have picked up just two points in eight Premier League away games (D2 L6).
Merson's prediction
Norwich is not an easy place to go! Aston Villa could have been as good as down with defeat at home to West Ham on Saturday, but at least they managed to save a draw. If they had lost to the Hammers and then to Norwich that would surely have been it, but they're still alive.
You are talking about winning 10 games between now and the end of the season and not even Manchester United will do that! I can't see Remi Garde's side getting anything so I'm going for a 2-1 home win.
PAUL PREDICTS: 2-1 (15/2 with Sky Bet)
Betting
Sky Bet rate Norwich as the 11/10 favourites with Aston Villa 13/5 for a vital win at Carrow Road, while the draw is priced at 23/10. Remi Garde's men head into the clash as 1/12 favourites for relegation while the Canaries are fourth in the betting at 2/1 to face the drop.
|
{
"pile_set_name": "OpenWebText2"
}
|
---
abstract: |
In his *Foundations of a General Theory of Manifolds*, Georg Cantor praised Bernard Bolzano as a clear defender of actual infinity who had the courage to work with infinite numbers. At the same time, he sharply criticized the way Bolzano dealt with them. Cantor’s concept was based on the existence of a *one-to-one correspondence*, while Bolzano insisted on Euclid’s Axiom of *the whole being greater than a part*. Cantor’s set theory has eventually prevailed, and became a formal basis of contemporary mathematics, while Bolzano’s approach is generally considered a step in the wrong direction.
In the present paper, we demonstrate that a fragment of Bolzano’s theory of infinite quantities retaining the *part-whole principle* can be extended to a consistent mathematical structure. It can be interpreted in several possible ways. We obtain either a linearly ordered ring of finite and infinitely great quantities, or a a partially ordered ring containing infinitely small, finite and infinitely great quantities. These structures can be used as a basis of the infinitesimal calculus similarly as in Non-standard Analysis, whether in its full version employing ultrafilters due to Abraham Robinson, or in the recent “cheap version” avoiding ultrafilters due to Terrence Tao.
author:
- Kateřina Trlifajová
title: 'Bolzano’s Infinite Quantities'
---
Introduction
============
Existence of an actual infinity
-------------------------------
There are two major questions that anyone dealing with actual infinity has to address:
1. Is there any actual infinity?
2. If so, are there multiple infinities? How can we compare them?
An answer to the first question has been sought by many eminent thinkers, philosophers and mathematicians, starting from Aristotle, who formulated the question, to Cantor (Šebestík 1992). Aristotle rejected actual infinity, and traditional scholasticism responded similarly in the famous thesis of *Infinitum actu non datur.* It was not until the end of the 19th century that Georg Cantor introduced actual infinity in mathematics in the form of infinite sets. He gave a theological justification for their existence, placing them in the mind of God (Dauben 1979), (Halett 1986). A characteristic excerpt from Cantor’s letter to Jeiler from 1895, quoted in (Halett 1986, p. 21), says “in particular, there are transfinite cardinal numbers and transfinite ordinal types which, just as much as the finite numbers and forms, possess a definite mathematical uniformity, discoverable by men. All these particular modes of the transfinite have existed from eternity as ideas in the Divine intellect.” Once Cantor’s set theory was accepted and axiomatized, there has no longer been need to answer the questions above. The answer has ultimately been given in the form of an axiom: in the Zermelo-Fraenkel set theory, the axiom is called the *Axiom of Infinity:*[^1] $$(\exists z)((\emptyset \in z) \wedge (\forall x)(x \in z \Rightarrow x \cup \{x\} \in z)).$$
There is an important consequence of the Axiom of Infinity and of the *Axiom of the Power-set*: [^2] the existence of infinitely many infinite ordinal and cardinal numbers.
Measuring the actual infinity
-----------------------------
It is well-known that if we accept the existence of actual infinity and try to compare infinite collections, we have to choose one of the following two, mutually exclusive, principles:
1. The *part-whole principle,* also known as the 5th Euclid Axiom: The whole is greater than its part.
2. The *principle of one-to-one correspondence,* or Hume’s Principle: Two sets have the same size if and only if there is a one-to-one correspondence between them.
The two principles cannot be valid simultaneously for infinite collections. This fact is called the *Paradox of Reflexivity.* It was known already to Galileo Galilei who employed natural numbers and their squares to demonstrate it. Based on this paradox, Galileo claimed that the attributes of “equal”, “greater” and “smaller” could not be applied to infinite, but only to finite quantities. Similarly, Leibniz refused to compare infinite collections in size, although he did not reject actual infinity *per se*.[^3]
Cantor based his set theory on the second principle. The one-to-one correspondence is decisive: from its existence, one can derive the “size” of sets – Cantor calls it the *cardinality.* The part-whole principle then fails dramatically, for all infinite sets.
Bolzano built the foundations of his theory of infinity on the first principle. Here is a pertinent comment by Guillerrmina Waldegg, who investigated the approach of students to infinity and to comparison of infinite sets:
> Bolzano’s criterion, based on the part-whole correspondence is more “intuitive” because it is nearer to concrete (finite) experience (in fact it corresponds to the mainstream of the historical moment, and to common sense in all times). On the other hand, a one-to-one relationship is less visible. Cantor’s solution could only be reached by means of a total detachment from meaning and intuition; his solution is therefore more problematic and difficult to understand, but it was well accepted once it proved its potential in the mathematical field. (Waldegg 2005, p. 574).
Prior to Bolzano, there were several attempts to find alternative answers, by Grosseteste, Maignan, Rodrigo da Arriaga, and others, cf. the paper *Measuring the Size of Infinite Collections of Natural Numbers: Was Cantor’s Set Theory Inevitable?* (Mancosu 2009). Bolzano, however, went the farthest of all. The main part of Bolzano’s theory of infinity is contained in his last treatise, the *Paradoxes of the Infinite*, which he wrote in 1848, the year of his death. It was published only posthumously in 1851 (Bolzano 1851), (Russ 2004). We proceed primarily from this work, though we take Bolzano’s other books into consideration as well. The paragraph numbers given below refer to the paragraphs in the *Paradoxes of the Infinite*.
Opinions on Bolzano’s theory of infinity
----------------------------------------
Bolzano’s theory is usually perceived from the point of view of Cantor’s set theory. The latter is viewed as the only correct theory. Bolzano’s conception thus appears to be either incorrect, or an imperfect predecessor of Cantor’s.
Georg Cantor himself expressed this view, having read Bolzano’s *Paradoxes of the Infinite*. He mentioned them in his 1883 work *Foundations of a General Theory of Manifolds*. While praising Bolzano on the one hand as an intrepid supporter of actual infinity, he nonetheless considered Bolzano’s concept to be insufficient and erroneous.
> The genuine-infinite as we encounter it, for example in the case of well-defined point sets, …has found its most decisive defender in a philosopher and mathematician of our century with a most acute mind, Bernhard Bolzano, who has developed his views relevant to the subject especially in the beautiful and substantial essay, *Paradoxes of the Infinite.* …Bolzano is perhaps the only one who assigns the genuine-infinite numbers their rightful place. …However, the actual way in which he deals with them, without being able to advance any kind of real definition of them, is something about which I am not at all in agreement with him, and I regard for example Sections 29-33 of that book as *unfounded and erroneous*. The author lacks both the general concept of cardinality and the precise concept of number-of-elements for a real conceptual grasp of determinate infinite numbers. (Cantor 1976, p. 78).
This view of Cantor’s persists until today. For example, in his book *Labyrinth of Thought* José Ferreiros says of Bolzano
> He proposed to base mathematics on notions similar to the set. He made a clear defense of actual infinity and he proposed precise notions for treating infinite sets. In this way he even came quite close to such a central notion of set theory as cardinality. But after having been close to the *right* point of view, he departed from it in quite a *strange* direction. (Ferreiros 1999, p. 75).
The “right point of view” is the idea that cardinality is the only meaningful way to compare abstract sets with respect to the multiplicity of their elements, as Ferreiros explains in a note.
Experts on Bolzano are of a similar opinion. Paul Rusnock, who translated Bolzano’s *Theory of Science* into English, is very doubtful about Bolzano’s conception[^4]
> Bolzano did not see this point, and thus stopped on the boundary of Cantor’s set theory of cardinal numbers. …Bolzano falls short of a full and satisfactory treatment of the theory of the infinite. (Rusnock 2000, pp .194, 196).
Jan Šebestík believes that Bolzano’s interpretation is disputable as it wavers between two principles for comparing infinite sets.
> L’évidence intuitive de l’axiom \[du tout et de le part\], dérivée de la consideration des ensembles finis, interdit à Bolzano, comme à ces prédécesseurs, d’établir un critère d’équivalence par l’intermédiaire d’une bijection. Ce conflit profond, qui éclate presque dans chaque section des *Paradoxes de l’infini*, l’empêche de construire une arithmétique de l’infini qui soit cohérente. (Šebestík 1992, p. 464).
Jan Berg, an expert on Bolzano and publisher of his works, found a passage in one of Bolzano’s late letters to Robert Zimmermann which Berg interprets, in an effort to save Bolzano’s reputation, as Bolzano changing his opinion and accepting the existence of one-to-one correspondence as a sufficient criterion for the equality of sets.
> Hence, it seems that in the end Bolzano confined the doctrine that the whole is greater than its part to the finite case and accepted isomorphism as a sufficient condition for the identity of cardinalities of infinite sets. (Mancosu 2009, p. 625).
Both Rusnock (Rusnock (2000), pp. 194 - 196.) and Mancosu examine this passage and consider Berg’s interpretation to be groundless. Mancosu says, tongue-in-cheek
> Thus, Bolzano saved his mathematical soul in extremis and joined the rank of the blessed Cantorians by repudiating his previous sins. ... I must observe that the literature of infinity is replete with such ‘Whig’ history. (Mancosu 2009, p. 626).
The situation is similar that of the historiography of infinitesimals. After the scorching critique of Berkeley and the triumph of the “great triumvirate” - Weierstrass, Cantor, Dedekind - consequently after the introduction of the Archimedean continuum as the sole possible and analysis based on limits, they were mostly considered, at best, erroneous or, at worst, altogether inconsistent. Nevertheless the group of mathematicians around Mikhail Katz demonstrates in a number of papers that the view of infinitesimals through the lens of the Weierstrassian foundation is misguided. The title of the first paper is typical *Is mathematical history written by the victors?*(Bair et al. 2013) The framework of Robinson’s non-standard analysis is in many cases more helpful in understanding the work of Gregory, Fermat, Leibniz, Euler and Cauchy. (Blaszczyk et al. 2017), (Bair et al. 2017), (Bascelli et al. 2017).
Bolzano’s theory of infinite multitudes
=======================================
Bolzano writes that he wants to contribute to the question of what is the infinite in general. He deals with infinite pluralities because
> …if it should be proved that, strictly speaking, there is nothing other than pluralities to which the concept of infinity can be applied in its true meaning, i.e. if it should be proved that infinity is really only a property of a plurality or that everything which we have defined as *infinite* is only called so because, and in so far as, we discover a property in it which can be regarded as an infinite plurality. Now it seems to me that is really the case. (§10.)
Collections, multitudes, pluralities, series, quantities
--------------------------------------------------------
At the beginning of *Paradoxes of the Infinite*, Bolzano very precisely and thoroughly explains the basic notions in §§3 - 9. Nearly the same explanations can be found in the *Theory of Science* in §§82 - 86. The basic notion is “*a collection* of certain things or a whole consisting of certain parts,” which are connected by the conjunction “and”.
Bolzano had dealt with the concept of *collections* before, and there has been considerable professional discourse about his idea. (Simons 1998), (Rusnock 2000), (Behboud 1998), (Krickel 1995). This primarily concerns the question of whether we should interpret the objects contained in a collection as elements or as parts thereof. Peter Simons shows that Bolzano’s collections cannot be equated even with Cantor’s sets, nor can they serve as a basis for mereology, the study of parts and wholes, as Franz Krickel has proposed, but that they constitute a separate and specific notion
> Bolzano’s theory of collections is best interpreted as a distinct and distinctive theory of collections. (Simons 1998, p. 87).
In his previous works, Bolzano tried to define the concept of the collection as generally as possible. Problems and ambiguities arise in particular around collections containing concrete parts, as Paul Rusnock points out. These are not substantive for our purposes, as we will be dealing only with certain abstract types of collections. We will proceed from Bolzano’s quoted definition from the *Paradoxes of the Infinite.* What is important is that the parts contained in the collection are connected by a conjunction “and” and constitute a whole.
*Collections \[Inbegriff\]* can be given as a certain list, for instance “the sun, the earth and the moon, or the rose and the concept of a rose”. (§3). Collections can be also denoted by some idea $A$, which we call the collection of all $A$. (§14). Parts of the collections are different. [^5] The parts of the collections can, but need not be, arranged in some way.
*A multitude \[Menge\]*[^6] is a collection that is conceived such that the arrangement of its parts is unimportant. (§4). Bolzano uses the word *Menge*.[^7] The English translation *set* can be misleading, because it refers to the Cantor’s conception of a set. The “set” is on a different “higher” level than its elements. [^8] Bolzano’s multitude, \[Menge\], is on the “same level” as the things it contains, because it is given by the usage of the connective “and”. Therefore, it is meaningful to speak about *parts* of a collection. These parts, however, are not subsets. Subsets are also on a “higher” level than their elements.
Bolzano introduces multitudes for the same reason as Cantor introduces sets. In order to capture an infinite plurality altogether, it must be collected in a single collection, a single, currently infinite, whole.
A special type of a multitude is *a plurality \[Vielheit\]*. Its parts are considered units of a certain kind $A$. (§4).
*A series \[Reihe\]* is also a collection of things, but unlike a multitude, it is ordered. Bolzano denotes things which the series contains as $A, B, C, \dots, L, M, N \dots $. We can always determine the following term $N$ of the series from the preceding term $M$ by the special *rule of formation* (§7).
If we have a series in which the first term is a unit of the $A$ kind and every following term is derived from the previous one as a sum of its predecessor and a new unity of the kind $A$, then all of the terms of this series are *pluralities*, or, more straightforwardly, *numbers.* (§8). Some pluralities have so many terms, that they exhaust all the units and they have no last term.
Now it is more evident why Bolzano defines a collection as a whole consisting of certain parts. A series is an example of such a whole. Its sum is a quantity of the same kind, it is a sum of all its parts.
A plurality is called *infinite* if it is greater than every finite plurality, i.e. if every finite multitude represents only a part of it. (§9).
*A finite multitude* is not explicitly defined here. We find the explanation in §22. The numbers of its parts are equal to some natural number $n$.
> If we know that $A$ is finite, we designate some arbitrary thing in the multitude $A$ by 1, some other multitude by 2, etc. …, we must sometimes arrive at a thing in $A$ after which nothing remains which is still undesignated. Now let this last thing just spoken of in $A$ get the number $n$ for its designation, then the number of things in $A = n$.
Moreover, Bolzano speaks about *quantities*. This too is one of Bolzano’s complicated terms. (Simons 2004). Here we will stick to Bolzano’s definition as given in *Paradoxes of the Infinite*. A *quantity, \[Grosse\]*, belongs to a kind of thing of which every two can have no other relation to one another than either being equal to one another, or one of them presenting itself as a sum that includes a part equal to the other one (§6). We see that pluralities are also quantities.
*An infinite quantity* is greater than every finite number of the unit taken. An *infinitely small quantity* is so small that every finite multiple of it is smaller than the unit. (§10). [^9]
A quantity $A$ is *infinitely greater* than $B$, if $A$ is infinitely greater than every finite number of $B$; we will denote that here as $A >> B$.[^10]
Bolzano defended the existence of actual infinity decades before Cantor. Cantor underpinned his belief in the existence of infinite cardinal and ordinal numbers with theology. (Dauben 1979, pp. 228 - 232.) Bolzano also proves the existence of *the infinite multitude of truths in themselves*.[^11] He proceeds from a proposition which can be proved by contradiction: “There are truths.” Bolzano asserts that if we have any true proposition $A$, then the proposition “A is true” is also true and it is different. We can construct infinitely many truths by this way, in fact by induction. Bolzano finally uses the theological argument
> Thus we must attribute to Him \[God\] a power of knowledge that is true omniscience, that therefore comprehends an infinite multitude of truths. (§11.)
Nevertheless, Bolzano tries to get by without a theological argument. It could be made possible by the special mode of the existence of truths and propositions in themselves. (Šebestík 1992, pp. 446-447).
Bolzano then refers to the similarity of the multitude of these propositions and the multitude of natural numbers and infers that this multitude too must be infinite. He notes that there is no last number among natural numbers, nor can there be, as the very notion conceals a contradiction. (§15). Similarly, a multitude of all fractions (of rational numbers) and irrational numbers is also infinite. The multitude of all quantities including infinitely small and infinitely great quantities must be infinite too. (§16).
In all Bolzano’s demonstrations of infinite multitudes, the emphasis is not on their *existence* but on their *infiniteness.* The existence of collections (multitudes) follows from their definition. But it’s necessary to prove they are infinite.
Part-whole principle and one-to-one correspondence {#correspondence}
--------------------------------------------------
Bolzano claims unequivocally to the *part-whole principle.* Not all infinite multitudes are to be regarded as equal to one another with respect to their plurality. If one multitude is contained in another as a mere part of it then the former is smaller than the latter.
The example, “to whom must it not be clear,” is the straight line with two points $a$ and $b$. The length of the straight line from the point $a$ continuing without limit in the direction to the point $b$ is infinite. It may be called greater than the straight line from the point $b$ continuing without limit in the same direction, by the piece $ab$. And the straight line continuing without limit on both sides may be called greater by a quantity which is itself infinite. (§19).
Simultaneously Bolzano is also aware of the existence of the *one-to-one correspondence* between some infinite multitudes. He is aware that sometimes one multitude is a part of the other one simultaneously. The following quotation begins a little ambiguously.
> Let us now turn to the consideration of a highly remarkable peculiarity which *can occur*, indeed actually *always occurs*, in the relationship between two multitudes *if they are both infinite*, but which previously has been overlooked to the detriment of knowledge …(§20.)
Bolzano describes very carefully the one-to-one correspondence.[^12] He presents two examples of two multitudes such that, *on the one hand*, there is a one-to-one correspondence between them and, *on the other hand*, one of these multitudes contains the other within itself as a mere part (§20).
The first example are the multitudes of quantities[^13] in two open intervals $(0,5)$ and $(0,12)$. “Certainly the latter multitude is greater since the former is indisputably only a part of it.”
The one-to-one correspondence is defined by the equation $$5y = 12x.$$
The second example is similar: the infinite multitudes of points of line segments $ab$ and $ac$, where $b$ is an inner point of line $ac$. “The multitude of points which lie in $ac$ exceeds that of the points in $ab$, because in $ac$ as well as all the points of $ab$ there also lie that of $bc$ which do not occur in $ab$.”
Let $x$ be some point in $ab$ then it corresponds to the point $y$ in $ac$ if the following proportion holds $$ab : ac = ax : ay.$$
Bolzano emphatically warns against the assertion that one-to-one correspondence of two multitudes allows for the conclusion of the equal plurality of their parts if they are infinite.
> An equality of these multiplicities can only be concluded if some other reason is added, such as that both multitudes have exactly the same *determining ground \[Bestimmungsrűnde\]*, e.g. they have exactly the same *way of being formed \[Entstehungsweise\]*. (§21).
Bolzano doesn’t explain here what the *determining ground* means exactly. He speaks in other texts about *elements of determination, \[bestimmende Stűcke\]*, though it is not entirely clear there either. To determine an object means to describe all representations that the objects falls under. The determination is complete if the representation of an object is unique. Thus, a point, the area and the diameter completely determine a circle, because all of its properties can be uniquely determined. (Šebestík 1992, p. 460).
Bolzano shows that this is not the case in the examples mentioned. (§23). In the first Example, the distance of two quantities in $(0,5)$, say $3$ and $4$, is less than the distance of their corresponding quantities in $(0,12)$ which are $7\frac{1}{5}$ and $9\frac{3}{5}$. It is similar in the second example. The distance $ax$ is different (smaller) than the distance $ay.$ Obviously, Bolzano considers the distance to be a determining element. In this case we can speak about isometry rather than a mere one-to-one correspondence. An isometry is a distance-preserving transformation between two metric spaces.
On the other side, Bolzano presents the positive example of multitudes which have the same plurality of elements. (§29). He denotes the multitude of quantities between two numbers $a$ and $b$ as $Mult(b-a)$. This multitude is infinite and depends only on the distance of the boundary quantities and therefore must be equal whenever this distance is equal. Therefore, we have innumerable equations of the forms $$Mult(8 - 7) = Mult(13-12).$$ $$Mult(b - a) : Mult (d - c) = (b-a) : (d-c)$$
One-to-one correspondence is a necessary condition but not a sufficient one for the equality of two multitudes. The necessary condition in the cited examples is the *isometry*. In the case of geometrical objects, Bolzano says:
> Every spatial extension that is not only similar to another but also geometrically equal (i.e. coincides with it in all characteristics that are conceptually representable through comparison with a given distance) must also have an equal multitude of points. (§49. 2.)
At this point, Bolzano fundamentally breaks with Cantor. For Bolzano it is still true that *the whole is greater than its part* and the existence of the *one-to-one correspondence* does not attest to the equality of multitudes. We will see how Bolzano deals with this further on.
Calculation of the infinite
---------------------------
The sums of series represent infinite quantities. Is it possible to determine their relationship? Is it possible to compare them or to count them? Bolzano answers that
> a calculation of the infinite done correctly doesn’t aim at calculation of that which is determinable through no number, namely not a calculation of infinite pluralities in itself, but only a determination of the relationship of one infinity to another which is feasible, in certain cases, as we shall show in several examples. (§28).
In fact, our knowledge about Bolzano’s calculation of the infinite comes from examples. Nevertheless, they are clear enough that we can derive the rules. Bolzano makes an important assumption that all series have *one and the same multitude of terms*. (§33). He does not ask what the plurality of the terms is, but assumes it is *always the same.* The sum of the series represents a whole, a uniquely given quantity. If we add positive terms, then the quantity increases; if we take away positive terms, the quantity decreases.
It is similar when we consider the sum of the series $$1/2 + 1/4 + 1/8 + \dots + \text{in inf.}$$ We are not interested in the plurality of the terms, but we are interested in its sum, which is equal to $1$.[^14]
\[rady\]Bolzano introduces several examples of infinite series (§29, §33).
1. $N = 1 + 1 + 1 + 1 + \dots + \text{in inf.} $
2. $P = 1 + 2 + 3 + 4 + \dots + \text{in inf.} $
3. $S = 1 + 4 + 9 + 16 + \dots + \text{in inf.} $
4. $N_n = \dots 1 + 1 + 1 + \dots + \text{in inf.} $
The last series is similar to the first one, but we only add from the $(n+1)$-st term. The first $n$ terms are omitted. We designate this as $N_n$.
Bolzano shows several examples and explains how to count the infinite series.
\[n\] If we designate the number of natural numbers from the $n+1$ by $N_n$ then we obtain the equation. $$n = N - N_n.$$
Bolzano doesn’t prove this assertion, he calls it the “certain and quite unobjectionable equation from which we see how two infinite quantities $N$ and $N_n$ have a completely definite finite difference” (§29). His persuasion is based on the implicit assumption that the multitude of the terms of the series is always one and the same. Consequently, every term of the series is important. From the proof of the following theorem we see again the same principle.
\[e\] If $0 < e < 1$ then $$1 + e + e^2 + e^3 + \dots + \text{in inf.} = \frac{1}{1-e}$$
The proof begins like this
- $S = 1 + e + e^{n-1} + e^n + e^{n+1} + \dots + \text{in inf.}$
- $S = \ \quad \frac{1 - e^n}{1 - e} \quad + \quad e^n + e^{n+1} + \dots + \text{in inf.} \quad = \quad \frac{1 - e^n}{1 - e} + P^1 $, $P_1$ designates a positive quantity which is dependent on $n$ an $e$.
- $S = \ \quad \frac{1 - e^n}{1 - e} \quad + \quad e^n [1 + e + \dots + \text{in inf.}]$
> The quantity $[1 + e + \dots + \text{in inf.}]$ is not to be regarded as identical to $S$, since the set of terms is not the same, rather here it is indisputably $n$ terms less than in $S$. [^15]
The following theorem and its proof demonstrates Bolzano’s way of adding infinite series and the sufficient condition of their order. He employs Galileo’s example of the series of natural numbers and the series of their squares (second powers), so $P$ and $S$ from the example above. The question isn’t which series has more terms - the multitude of terms is the same - but which sum of the series is greater. $$P = 1 + 2 + 3 + 4 + \dots + \text{in inf.}$$ $$S = 1 + 4 + 9 + 16 + \dots + \text{in inf.}$$
\[S>P\] Let $P, S$ be the sums of infinite series from the example \[rady\]. Then
- $S$ is greater than $P$, $S > P$.
- $S$ is infinitely greater than $P$, $S >> P$. (§33).
Bolzano’s reasoning is: “The multitude of terms in both series is certainly the same. By raising every single term of the series $P$ to the square into the series $P$, we alter merely the nature (magnitude) of these terms, not their plurality.”
- Every term of $S$, except the first one, is greater than the corresponding term of $P$, consequently $$S > P.$$
- We shall prove that $S$ is infinitely greater than $P$. If we subtract successively the series $P$ from $S$ then we obtain the remainders
$S - P = 0 + 2 + 6 + 12 + \dots + \text{in inf.} $
$S - 2 P = -1 + 0 + 3 + 8 + \dots + \text{in inf.} $
$S - m P = (1-m) + \dots + (n^2-mn) + \dots + \text{in inf.} $
In these series, only a finite multitude of terms, namely $m-1$, is negative, and the $m$th term is 0, but all successive terms are positive and grow indefinitely. The sum of every series is positive. Thus $$S >> P.$$
Consequently, there is infinitely many infinite quantities. Sometimes we can determine their sum, difference, or order.
More infinite quantities
------------------------
Some infinite sequences represent finite quantities, although they are composed of an infinite multitude of fractions, for instance irrational quantities or geometrical series.
Let $e < 1$.
1. $$\frac{14}{10} + \frac{1}{100} + \frac{4}{1000} + \frac{2}{10000} + \dots + \text{in inf.} = \sqrt 2$$
2. $$a + ae + ae^2 + ae^3 + \dots + \text{in inf.} = \frac{a}{1-e}$$
Bolzano presents examples of infinite quantities of higher orders and infinite quantities which have any rational or irrational order. So he extends the notion of the infinite quantities.
Let $\alpha$ be any quantity then the following series are also quantities. $\alpha \cdot N$ is also a quantity. (§29).
1. $$\alpha \cdot N = \alpha + \alpha + \alpha + \dots + \text{in inf.}$$
2. $$N^2 = N + N + N + N + \dots + \text{in inf.}$$
3. $$N^3 = N^2 + N^2 + N^2 + N^2 + \dots + \text{in inf.}$$
\[pomer\]
1. Let $\alpha, \beta$ be two quantities then $$(\alpha \cdot N) : (\beta \cdot N) = \alpha : \beta.$$
2. $N^2$ is infinitely greater than $N$, $$N^2 >> N.$$
3. $N^3$ is infinitely greater than $N^2$, $$N^3 >> N^2.$$
In *Paradoxes of the Infinite* Bolzano investigates in particular series that have infinite sums. He investigated infinitely small quantities earlier in *Infinite Quantity Concepts*; see the following section. Nevertheless, he mentions them here as well.
If $N$ is any infinitely great quantity, then the infinitely small quantity is represented by $$1/N.$$
Obviously, Bolzano tries to create a general theory of quantities.
> We have infinitely many infinitely great and infinitely small quantities, of which they have every arbitrary ratio one to another. In particular, they can be infinitely greater or infinitely smaller. Therefore, there also exist infinite orders among infinitely large and infinitely small quantities, and it is indeed possible to find frequently correct equations between quantities of this kind. (§30)
Conditions for infinite series {#conditions}
------------------------------
Not all series can be considered quantities. The first condition was presented in the definition of the series. A *rule of formation* determines the following term from the previous one.
The further condition is presented in $\S 32$. Bolzano says
> I may draw attention to the fact, which is not itself incomprehensible, that there may be *quantity expressions* which designate *no actual quantity*.…In particular, a *series*, if we want to consider it only as a quantity …has such a nature that it undergoes no change in value when we make a change in the order of its terms. With quantities, it must be that $$(A + B) + C = A + (B + C) = (A + C) + B.$$
To put it in contemporary terms, the sum must be associative and commutative.
Bolzano’s counterexample is a series $$a - a + a - a + a - a + \dots \text{in inf.}.$$ If we change parentheses or the arrangement of the terms we obtain different quantities.
- $\ \ 0 = (a - a) + (a - a) + (a - a) + \dots \text{in inf.}$
- $\ \ a = a + (- a + a) + (- a + a) + \dots \text {in inf.}$
- $-a = -a + (a - a) + (a - a) + (a - a) + \dots \text{in inf.}$
Another counterexample is $$1 - 2 + 4 - 8 + \dots \text{in inf.}$$
The meaning of the criterion of the associativity and commutativity of series is not entirely clear. The question is, for instance, whether the following sequence would be considered a quantity or not. $$1 + 2 + 1 + 2 + 1 + 2 + \dots \text{in inf.}$$ Probably not, because then the series $2 + 1 + 2 + 1 + 2 + 1 + \dots \text{in inf.}$ would also be a quantity, and their difference would be the problematic series $1 - 1 + 1 - 1 + 1 - 1 + \dots \text{in inf.}$ So what does the requirement of associativity and commutativity mean? Bolzano’s aim was to create a general theory of quantities. He needed sums, differences, and maybe also products and ratios of quantities to be quantities as well.
Measurable numbers {#measurable}
------------------
Before we present an interpretation of this fragment of Bolzano’s theory of infinity, we should recall Bolzano’s theory of measurable numbers. It is found in the manuscript *Infinite Quantity Concepts*, the Seventh Section of *Pure Theory of Numbers* from the early 1830’s. It was not published until 1962, when it was discovered by Karel Rychlík and prepared for print. There was a great deal of dispute over it; perhaps we can conclude that it can be considered a theory of real numbers *cum grano salis*.[^16]
The construction is similar to the construction of infinite pluralities, but Bolzano employs not only infinite sums but infinitely many arithmetic operations used on integers. There is also an implicit assumption that the infinite multitude of operations is always the same. The basic notion is an infinite quantity expression, which is a generalization of the notion of rational numbers. While rational numbers can be considered *quantity expressions* in which only a finite number of arithmetic operations (addition, subtraction, multiplication and division) on integers is required, in *infinite quantity expressions* an infinite multitude of arithmetic operations is required.
Bolzano introduces several examples.
1. $1 + 2 + 3 + 4 + \dots \text{in inf.}$
2. ${1 \over 2} - {1 \over 4} + {1 \over 8} - {1 \over 16} + \dots \text{in inf.}$
3. $(1 - {1 \over 2})(1 - {1 \over 4})(1 - {1 \over 8})(1 - {1 \over 16}) \dots \text{in inf.}$
4. $a + \frac{b}{1+1+1+ \dots \text{in inf.}}$ where $a, b$ is a pair of whole numbers.
Bolzano designates a *measurable number* as an infinite quantity expression $S$ for which the following condition holds true. If for every positive integer $q$ we determine the integer $p$ such that $$S = \frac{p}{q} + P_1 = \frac{p+1}{q} - P_2.\footnote{This is the main defect of Bolzano's theory of measurable numbers. Everything would be entirely consistent if this condition was slightly different.
$$S = \frac{p-1}{q} + P_1 = \frac{p+1}{q} - P_2.$$ There are several possible explanations but that is not the subject of this paper.}$$ where $P_1$ and $P_2$ denote a pair of strictly positive quantity expressions (the former possibly being zero).
Infinite number expression is *infinitely small* if its absolute value is less than $1 \over q$ for any natural number $q$, and it is *infinitely great* if it is greater than any $q$.
Bolzano designates that two measurable numbers $S, P$ are *equal* or *equivalent* , if *their difference is infinitely small*.[^17] In contemporary terms, he makes a factorization by this relation. Nevertheless, Bolzano still calls them measurable numbers, which is slightly confusing. He introduces the *ordering* of measurable numbers: $P > S$, if their difference is positive and not infinitely small. Bolzano shows that measurable numbers defined in this way have all usual properties of real numbers: it is an *Archimedean, dense, linearly ordered field*, where the *Bolzano-Cauchy theorem*[^18] and the *supremum theorem* is valid.[^19]
Interpretation of measurable numbers
------------------------------------
If we wish to demonstrate the consistency of measurable numbers, we interpret infinite quantity expressions as sequences of partial results, so they correspond to sequences of *rational numbers*. It is easy to prove that measurable numbers correspond to Bolzano-Cauchy sequences, infinitely small quantities to sequences converging to 0 and infinitely great quantities to divergent sequences. Now, we can proceed in one of two ways. We can either follow the standard Cantor’s construction of real numbers or we can compare it with the non-standard construction of real numbers.
Cantor defines that two Bolzano-Cauchy (fundamental) sequences of rational numbers are equal if their difference is a sequence converging to 0. Bolzano defines that two measurable numbers are equal if their difference is infinitely small. The meaning is the same. Consequently measurable numbers with equality has the same structure as Cantor’s real numbers. It is formally suitable, but infinitely small numbers are lost in this interpretation.
The Bolzano’s construction of measurable numbers is somewhat similar to the non-standard construction of real numbers.[^20] Bolzano does not employ ultrafilters, of course. His measurable numbers (without equality) are sufficient in this case. It is a non-Archimedean commutative ring. The set of all infinitely small quantities, corresponding to sequences converging to 0, forms its maximal ideal. The introduction of equality of measurable numbers means the factorization by the equality relation, i.e. the factorization of the ring by its maximal ideal. The result is the linearly ordered field, isomorphic to the real numbers.
Bolzano’s measurable numbers are inconvenient for the introduction of calculus for the same reason as hyperrational numbers, because the transfer principle fails for them. Bolzano was obviously aware of this fact. He returned to his original idea of building the calculus on the basis of *quantities which can become smaller than any given quantities* which is the idea of the later Weierstassian “$\epsilon - \delta$ analysis”. In the *Theory of Functions* Bolzano defines all the key notions of analysis in this manner. For instance, this is the definition of the continuity of a function in a point $x$.
> Supposing the value $Fx$ is measurable, as well as the value $F(x + \Delta x)$[^21], but the difference $F(x + \Delta x) - Fx$, in its absolute value, becomes and remains smaller than any given fraction $1 \over N$, providing only that $\Delta x$ is taken small enough then I say that the function Fx varies continuously for the value $x$. (Russ 2004, p. 448).
While Bolzano concentrated on the arithmetization of continuum and the construction of measurable numbers in *Infinite Quantity Concepts*, in *Paradoxes of the Infinite* he investigated mainly the sums of infinite series of measurable numbers.
While we interpreted Bolzano’s infinite quantity expressions as sequences of *rational numbers* we will justifiably interpret Bolzano’s infinite sums as sequences of *real numbers*.
Interpretation of Bolzano’s infinite quantities
===============================================
Sequences
---------
Bolzano’s infinite series are interpreted as infinite sequences of partial sums, i.e. as elements of $\mathbb R^\mathbb N$. But we will keep in mind that these sequences represent single, exactly given *quantities*. There is a slight conceptual distinction between treating elements of $\mathbb R^\mathbb N$ as Bolzano’s quantities, and treating them as classical sequences. The two viewpoints are formally equivalent, but can lead to a somewhat different way of thinking about such objects. This is similar to the case of non-standard analysis, where we treat elements of ultraproducts as single quantities.
It is easy and unambiguous to pass from series to sequences and back. For every series there is exactly one corresponding sequence and vice versa.
Let $a_1 + a_2 + a_3 + \dots + \text{in inf.}$ be the Bolzano series of real numbers, $a_i \in \mathbb R.$ It corresponds to the sequence $(s_1, s_2, s_3, \dots ) \in \mathbb R^\mathbb N$ where for all $n \in \mathbb N, s_n = a_1 + \dots + a_n.$ $$a_1 + a_2 + a_3 + \dots + \text{in inf.} \sim (s_1, s_2, s_3, \dots ) = (s_n),$$
1. $N = 1 + 1 + 1 + 1 + \dots + \text{in inf.} \sim (1, 2, 3, \dots) = (n)$
2. $P = 1 + 2 + 3 + 4 + \dots + \text{in inf.} \sim (1, 3, 6, 10, \dots ) = (\frac {n \cdot (n+1)}{2})$
3. $S = 1 + 4 + 9 + 16 + \dots + \text{in inf.} \sim (1, 5, 16, 32, \dots ) = (\frac{n(n+1)(2n+1)}{6})$
4. $1 + e + e^2 + e^3 + \dots + \text{in inf.} \sim (\frac{1 - e^n}{1 - e})$
5. $n = 1 + 1 + \dots + 1 \sim (1, 2 \dots n, n, n, \dots)$
6. $N_n = \dots 1 + 1 + 1 + + \dots + \text{in inf.} \sim (0, 0, \dots 1, 2, 3, \dots )$
7. $r \cdot N = r + r + r + \dots + \text{in inf.} \sim (r, 2r, 3r, \dots) = (nr) $ where $r \in \mathbb R$.[^22]
Sequences express well the difference between the Bolzano series $N$ and $N_n$.
\[embedding\] There is a natural interpretation of any real number $r \in \mathbb R$ as a constant sequence $$r \sim (r) = \bf{r}$$ So real numbers $\mathbb R$ can be naturally embedded in sequences of real numbers. $$\mathbb R \longrightarrow \mathbb R^\mathbb N.$$
We saw how Bolzano counted up the sums of two series. He counted up the corresponding terms. There is no example of multiplication of series in the *Paradoxes of the Infinite*, nevertheless, we can suppose that their product should be the extension of the product of a finite amount of terms.
Let $(a_n), (b_n)$ be two sequences of real numbers. We define their sum and their product pointwise: $$(a_n) + (b_n) = (a_n + b_n).$$ $$(a_n) \cdot (b_n) = (a_n \cdot b_n).$$
If there are two Bolzano series $$a_1 + a_2 + a_3 + \dots + \text{in inf.} \sim (a_1, a_1+ a_2, a_1+ a_2+a_3, \dots)$$ $$b_1 + b_2 + b_3 + \dots + \text{in inf.} \sim (b_1, b_1+ b_2, b_1+ b_2+b_3, \dots)$$ then their sum and the product correspond to the sum and the product of sequences $$(a_1 + a_2 + a_3 + \dots + \text{in inf.})+(b_1 + b_2 + b_3 + \dots + \text{in inf.}) \sim (a_1 +b_1 , a_1+a_2+b_1+ b_2 , a_1+ a_2+a_3+b_1+ b_2+b_3, \dots)$$ $$(a_1 + a_2 + a_3 + \dots + \text{in inf.}) \cdot (b_1 + b_2 + b_3 + \dots + \text{in inf.}) \sim (a_1 \cdot b_1 , (a_1+a_2) \cdot(b_1+ b_2), (a_1+ a_2+a_3) \cdot (b_1+ b_2+b_3), \dots)$$
We will interpret the quantity that is designated by $N^2 = N + N + \dots + \text{in inf.}$ as $$N^2 = N \cdot N \sim (1, 2, 3, \dots) \cdot (1, 2, 3, \dots) = (n^2).$$
Equality and ordering
---------------------
Sequences of real numbers with pointwise operations of addition and multiplication form the ring $\mathbb R ^{\mathbb N}$, i.e. the countably infinite product of copies of the field $\mathbb R$. But this ring is not suitable for our purposes directly; we cannot define infinitely small and infinitely great quantities. In order to avoid this problem, we will not deal with all the sequences in $\mathbb R ^{\mathbb N}$ individually, but identify them by an equality relation respecting the arithmetic operations.
We can interpret the Bolzano’s conditions of commutativity and associativity of the series like this: If we change the order of the finite amount of terms of the series, the sum of the series does not change. Therefore, we define that two sequences are *equal* if their terms are the same from a sufficiently large index. The *order* is defined on the same principle. In fact, we use the Fréchet filter here that is the filter containing all complements of finite sets.
Let $(a_n), (b_n)$ be two sequences of real numbers. We define their equality and order $$(a_n) =_\mathcal F (b_n) \text{ if and only if } (\exists m)(\forall n)(n > m \Rightarrow a_n = b_n).$$ $$(a_n) <_\mathcal F (b_n) \text{ if and only if }(\exists m)(\forall n)(n > m \Rightarrow a_n < b_n).$$
The following definitions are in accordance with Bolzano’s own words in *Infinite Quantitative Concepts*, see \[measurable\]. *Infinite closeness* of two sequences corresponds to Bolzano’s equality (equivalence) of two measurable numbers.
Let $(a_n), (b_n)$ be two infinite series. Then $(a_n)$ is *infinitely smaller* than $(b_n)$ or $(b_n)$ is *infinitely greater* than $(a_n)$
$$(a_n) << (b_n) \text{ if and only if }(\forall k)(a_n) <_\mathcal F k \cdot (b_n)$$ where $k, n \in \mathbb N$.
Let $x, y$ be elements of $\mathbb R^\text{o}$.
(i) $(a_n)$ is *infinitely small* if and only if $(a_n) << \bf{1}.$
(ii) $(a_n)$ is *infinitely great* if and only if $(a_n) >> \bf{1}.$
(iii) $(a_n)$ and $(b_n)$ are *infinitely close*, $(a_n) \doteq (b_n)$ if and only if $(a_n - b_n)$ is infinitely small.
Bolzano’s theorems mentioned here \[n\], \[e\], \[S>P\], \[pomer\] are valid in this interpretation.
Let $n \in \mathbb N, r, s \in \mathbb R$.
1. $n = N - N_n$ or $n + N_n = N$ , because $$(n, n \dots n, n, n, \dots) + (0, 0, \dots 1, 2, 3, \dots ) =_\mathcal F (1, 2, 3, \dots n, n+1, n+2, \dots)$$
2. $\frac{1}{1 - e} - (\frac{1 - e^n}{1 - e})$ is infinitely small because $$(\forall q)(\exists n)(\forall m > n) |\frac{1}{1 - e} - \frac{1 - e^n}{1 - e}| = |\frac{e^n}{1 - e}| < \frac{1}{q}.$$
3. $S > P$, because $$n > 1 \Rightarrow \frac{n(n+1)(2n+1)}{6} > \frac{n(n+1)}{2}$$ $S >> P$, because $$(\forall k)(\forall n)(n > \frac{3k}{2}-\frac{1}{2} \Rightarrow \frac{n(n+1)(2n+1)}{6} > k \cdot \frac{n(n+1)}{2})$$
4. $(r \cdot N) : (s \cdot N) = r : s$ where $r, s \in \mathbb R$, because $$(r\cdot n) : (s \cdot n) = r : s$$ $N^2 >> N \sim (n^2) >> (n)$, because $$(\forall k)(\forall n)(n > k \Rightarrow n^2 > k \cdot n).$$ $N^3 >> N^2 \sim (n^3) >> (n^2)$, because $$(\forall k)(\forall n)(n > k \Rightarrow n^3 > k \cdot n^2).$$
The structure $\mathbb R^\text{o} = (\mathbb R ^\mathbb N, +, \cdot, =_\mathcal F, <_\mathcal F )$ is a partially ordered non-Archimedean commutative ring.
For all elements $a,b, c \in \mathbb R^\text{o}$ the following properties are clearly valid
(1) $(a + b) + c =_\mathcal F a + (b + c)$ associativity of $+$
(2) $a + b =_\mathcal F b + a$, commutativity of $+$
(3) $a + o =_\mathcal F a$, there is a neutral element with respect to $+$, where $o = (0,0,0, \dots)$
(4) $(\exists b)(a + b =_\mathcal F 0)$, existence of an inverse element, where $b = -a$.
(5) $(a \cdot b) \cdot c =_\mathcal F a \cdot (b \cdot c)$, associativity of $\cdot$
(6) $a \cdot b =_\mathcal F b \cdot a$, commutativity of $\cdot$
(7) $(\forall a)(a \cdot i =_\mathcal F a)$, there is a neutral element with respect to $+$, where $\cdot$, where $i = (1,1,1, \dots)$.
(8) $a \cdot (b + c) =_\mathcal F (a \cdot b) + (a \cdot c)$, distributivity.
(9) $\neg (a <_\mathcal F a)$, irreflexivity
(10) $((a <_\mathcal F b \wedge b <_\mathcal F c) \Rightarrow a <_\mathcal F c)$, transitivity.
Elements of $\mathbb R^\text{o}$ correspond to Bolzano’s series. They represent finite, infinitely great and infinitely small quantities.
But sequences corresponding to alternating series are not expelled, for example $$1 - 1 + 1 - 1 + \dots \text{in inf.} \sim (1, 0, 1, 0, \dots)$$ $$- 1 + 1 - 1 + 1 \dots \text{in inf.} \sim (0,1, 0, 1, \dots)$$
Such oscillating sequences have no inverse elements with respect to multiplications, they are divisors of zero and they are not ordered. Consequently $\mathbb R^\text{o}$ is neither a field nor an integer domain and it is not linearly ordered.
Polynomials
-----------
If we look for a consistent interpretation just for infinite quantities, there is a criterion that would expel oscillating sequences and still it would be a ring, even a linearly ordered integral domain.[^23]
The terms of the series are to be determined by a *rule of formation* that determines the following term from the preceding one. Let’s restrict the rule to the use of addition and multiplication of integers. The following term can then be determined by a polynomial function. Consequently, terms of the corresponding sequences are polynomials.
Let $p(n)$ be a polynomial the $k$-th degree. $$p(n) = a_0 + a_1 n + \dots a_k n^k,$$ where $a_i \in \mathbb R, i = 1, \dots, k.$ The following sequence is *polynomial*. $$(p(n)).$$
Polynomial sequences with the above defined operations form a non-Archimedean linearly ordered integral domain.
The sum and the product of two polynomial sequences is a polynomial sequence too, because the sum and the product of two polynomials is a polynomial. The product of two polynomial non-zero sequences is non-zero.
The ordering is linear, because if $p(n) = a_0 + a_1 n + \dots a_k n^k$ and $q(n) = b_0 + a_1 n + \dots b_k n^k$ then $$(p(n)) >_\mathcal F (q(n)) \Leftrightarrow (a_k, a_{k-1}, \dots a_0) > (b_k, b_{k-1}, \dots b_0) \text{ in a lexicographical order.}$$
The constant sequences $(r)$, $r \in \mathbb R$ are polynomial. For example, the sequence $(n) >> (r)$ for any real number $r$.
This is a consistent interpretation, but only of *infinitely great* quantities; no polynomial sequences are infinitely small.
Cheap version of non-standard analysis
--------------------------------------
We saw that Bolzano’s infinite expressions are not suitable for the foundation of differential calculus although they contain infinitely small numbers. What about infinite quantities introduced in *Paradoxes of the Infinite*?
Let’s return to the above defined structure of sequences of rational numbers $\mathbb R^\text{o}$. From now on, we work with the factorization of $\mathbb R ^\mathbb N$ by the Fréchet filter $\mathcal F$.[^24] $$\mathbb R^\text{o} = \mathbb R ^\mathbb N/\mathcal F.$$
Its elements are equivalence classes, for any $(a_n) \in \mathbb R^\mathbb N$ $$[(a_n)]_\mathcal F \in \mathbb R^0.$$
Of course, it is a partial ordered commutative ring too. Real numbers representing Bolzano’s measurable numbers (with equality) are naturally embedded in it, see the Remark \[embedding\] and the Footnote \[IQC\]. They are linearly ordered and form a field.
Terence Tao described the so-called “cheap version of non-standard analysis” which is defined on $\mathbb R^0$ (Tao, T. 2012a). It’s less powerful than the full version, it’s constructive because it doesn’t require any sort of axiom of choice and its assertions can be easily rewritten to the standard analysis. The *transfer principle* is valid only partially. The structure is countably saturated and, consequently, non-Archimedean.
Every function $f$ defined on real numbers $f: \mathbb R \longrightarrow \mathbb R$ can be extended to the function $f^*: \mathbb R^\text{o} \longrightarrow \mathbb R^\text{o}$ such that we define for all $x = [(x_n)]_\mathcal F \in \mathbb R^\text{o}$ $$f^*([(x_n)]_\mathcal F) = [(f(x_n))]_\mathcal F.$$
We define basic notions of mathematical analysis, for instance
(Tao, 2012a).
- The function $f$ is *continuous*, if and only for all $x \in \mathbb R$ and for all $y \in \mathbb R^\text{o}$ $$x \doteq y \Rightarrow f(x) \doteq f(y)$$
- The function $f$ is *uniformly continuous*, if and only for all $x, y \in \mathbb R^\text{o}$ $$x \doteq y \Rightarrow f(x) \doteq f(y)$$
- The function $f$ has a *derivative* $f'(x)$ in $x \in \mathbb R$, if and only if for all infinitely small $h \in \mathbb R^\text{o}$ $$f'(x) \doteq \frac{f(x+h)-f(x)}{h}$$
Infinitesimal calculus can be partially reconstructed in $\mathbb R^\text{o}$ as we see from the result of Terence Tao. Nevertheless this structure bears some disadvantages, it is not an integral domain and it contains infinitely many useless elements such as $[(1,0,1,0, \dots)]_\mathcal F$.
A full version of non-standard analysis
---------------------------------------
Factorization of the ring $\mathbb R ^{\mathbb N}$ by the Fréchet filter leads to the partially ordered ring $\mathbb R^\text{o}$ which is not an integral domain.
Should the ring $\mathbb R ^{\mathbb N}_{\mathcal F}$ contain no non-trivial zero-divisors such as $[(1,0,1,0 \dots)]_\mathcal F$, the filter $\mathcal F$ has to satisfy the following condition: for each subset $S$ of $\mathbb N$, either $S \in \mathcal F$ or $\mathbb N \setminus S \in \mathcal F$.
Indeed, if $1_S$ and $1_{\mathbb N \setminus S}$ denote the characteristic functions of the sets $S$ and $\mathbb N \setminus S$, respectively, then $1_S . 1_{\mathbb N \setminus S} = 0$, so either $1_S$ or $1_{\mathbb N \setminus S}$ has to be equivalent to the zero sequence. In the former case, $S \in \mathcal F$, in the latter $\mathbb N \setminus A \in \mathcal F$.
In other words, $\mathbb R^\text{o}$ contains no non-trivial zero-divisors, iff $\mathcal F$ is an ultrafilter on $\mathbb N$. If we add a further natural condition of equivalence for each pair of sequences that differ only at finitely many places, we see that the desired factor-rings $\mathbb R^\text{o}$ correspond to non-principal ultrafilters $\mathcal U$ on $\mathbb N$. Notice that the ultraproduct $$\mathbb R^* = \mathbb R^{\mathbb N} /{\mathcal U},$$ is even a field. Moreover, $\mathbb R$ embeds into $\mathbb R^*$ as the subfield of the equivalence classes of constant sequences. The immense bonus obtained thanks to Ł[o]{}ś Theorem, (Chang, Keisler 1992, p. 211.) is that not only $\mathbb R^*$ is a field, but it shares *all* first order properties with the field $\mathbb R$. And it contains the infinitesimals.
The ultraproduct is a consistent mathematical framework for differential and integral calculus which is based on infinitesimals, i.e. infinitely small quantities, as it was traditionally used until the end of the 19th century, and as it was justified in the non-standard analysis. (Robinson 1966).
Ultrafilters and their wonderful properties are the result of modern logic of the 20th century. We need the axiom of choice to prove their existence. Bolzano, of course, could not have known that.
Terence Tao speaks about *completions* of mathematical structures in (Tao, 2012b, p. 150-152). Every completed structure is much larger, it contains the original one and brings some new benefits. Thus, real numbers represent a *metric* completion of rational numbers. Every Bolzano-Cauchy sequence of rational numbers has a real limit. Complex numbers represent an *algebraic* completion of real numbers. Every algebraic equation has a solution. The non-standard real numbers represent an *elementary* completion of real numbers. Every sequence of statements of first-order logic that are potentially satisfiable are also actually satisfiable here.[^25] So, we proceed from natural numbers, step-by-step we complete the structures, and finally we obtain the non-standard real numbers as a basis for the infinitesimal calculus.
Conclusion
==========
Bolzano’s theory of infinite quantities can be extended to a consistent theory in several distinct ways, depending on what we require from the extended theory.
If we only wish to create a consistent theory of infinite quantities, we can interpret them as polynomial sequences. This results in a linearly ordered ring of finite and infinite quantities.
In case we want to avoid ultrafilters, we can define equality and order via the Fréchet filter. This approach also yields a compact theory of infinitely small and infinitely large quantities generalizing the real numbers. The resulting structure forms a ring, not a field, and it is only partially ordered, but it makes it possible to reconstruct large parts of the differential and integral calculi.
Certainly, the most effective and elegant approach is via ultrafilters. We obtain a theory of finite, infinitely great and infinitely small quantities. Infinitely great quantities are inverses of the infinitely small ones and vice versa. The principle that the whole is larger than a part holds true. All of the differential and integral calculi can naturally be developed on this basis, because the extended world containing infinitesimal quantities satisfies the same first order properties as the original setting.
Bolzano’s theory provides foundations for a more general theory containing both infinitely great and infinitely small quantities. It justifies Pascal’s belief in two types of infinity that reflect each other:
> Ces deux infinis quoique infiniment differents, sont néanmoins relatifs l’un à l’autre, de telle sorte que la connaissance de l’un mène nécessairement à la connaissance de l’autre. [^26]
Although Cantor’s and Bolzano’s approaches to comparing infinite sets are based on different principles, they are not incompatible. They merely describe different facets of infinite sets and could coexist within a single comprehensive theory. The concept of *multitude*, based on *par-whole* principle, as well as the concept of *cardinality*, based on *one-to-one correspondence*. However, I consider the Bolzano’s framework more suitable, both for the theory of infinite quantities and as a basis of mathematical analysis.
I am grateful to Mikhail Katz, Jan Šebestík and Petr K23 urka for helpful comments on an earlier version of the manuscript. Many thanks to my colleague Jan Starý for fruitfull discussions about ultrafilters and to my husband Jan Trlifaj for comments on the final version.
Albeverio, S., Hoegh-Kron, R., Febstad, J.E., Lindstrom, T., (1986) *Nonstandard Methods in Stochastic Analysis and Mathematical Physics*, Academic Press, Orlando, Florida. Bair, J., Blaszczyk, P., Ely, R., Henry, V., Kanovei, V., Katz, K., Katz, M., Kutateladze, S., McGaffey, T., Schaps, D., Sherry, D., Shnider, S. (2013) Is mathematical history written by the victors? *Notices of the American Mathematical Society* 60(7), 886-904. Bair, J., B³aszczyk, P., Ely, R., Henry, V., Kanovei, V., Katz, K., Katz, M., Kutateladze, S., McGaffey, T., Reeder, P., Schaps, D., Sherry, D., Shnider, S. (2017), Interpreting the infinitesimal mathematics of Leibniz and Euler. *Journal for General Philosophy of Science* 48/2, 195-238. Bascelli, T., B³aszczyk, P., Kanovei, V., Katz, K., Katz, M., Kutateladze, S., Nowik, T., Schaps, D., Sherry, D. (2016), Gregory’s sixth operation. *Foundations of Science*, Blaszczyk, P., Kanovei, V., Katz, K., Katz, M., Kutateladze, S., Sherry, D., (2016), Toward a history of mathematics focused on procedures. *Foundations of Science.* 21/3. Bolzano, B., (1837/2014). *Wissenschaftslehre*. Translation in (Rusnock, Rolf, 2014). *Theory of Science*, Oxford University Press, Oxford. Bolzano, B., (1851/2004). *Paradoxien des Unendlichen*. CH Reclam, Leipzig. Translation *Paradoxes of the Infinite* in (Russ 2004). Bolzano, Bernard., (1976). *Reine Zahlenlehre.* In Berg, J., (ed) Bernard Bolzano Gesamtausgabe Bd. 2A8, Frommann-Holzboog, Stuttgart-Bad Canstatt. Translation in (Russ 2004).
Behboud, A., (1998). Remarks on Bolzano’s Collections, *Bolzano and Analytic Philosophy*, edited by Wolfgang Kűnne, Mark Siebel and Mark Textor, Brill, Rodopi. Cantor, G., (1883/1976). *Grundlagen einer allgemeinen Mannigfaltigkeitslehre*. Translation Foundations of a General Theory of Manifolds by Georg Cantor, *The Campaigner*, Journal of the National Caucus of Labor Committees, 9(1-2), 69 - 97. Chang, C. C., Keisler, H. J. (1992). *Model Theory*, North-Holland Publishing Co., Amsterdam. Dauben, J. W., (1979). *Georg Cantor: His Mathematics and Philosophy of the Infinite*, Harvard University Press, Cambridge, Mass. Fraenkel, A., Bar-Hillel, Y., Ley, A., (1973). *Foundations of Set Theory*, Studies in Logic, Elesvier. Ferreiros, J., (1999). *Labyrinth of Thought. A History of Set theory and its Role in Modern Mathematics*, Birkhauser, Basel, Boston, Berlin. Hallett, M., (1986). *Cantorian Set Theory and Limitation of Size*, Clarendon Press, Oxford.
Katz, M. et al., (2017). *Toward a History of Mathematics Focused on Procedures*, Foundations of Science. Krickel, F., (1995). *Teil und Inbegriff. Bernard Bolzanos Mereologie*, St. Augustin. Mancosu P., (2009). Measuring the Size of Infinite Collections of Natural Numbers: Was Cantor’s Set Theory Inevitable?, *The Review of Symbolic Logic*, 2(4), 612-646. Pascal, B., (1866). *De l’ésprit géometrique*, Ch. Delagrave et C., Libraires- éditeurs, Paris. Robinson, A., (1966). *Non-standard analysis*, North-Holland Publishing Co., Amsterdam. Rusnock P., (2000). *Bolzano’s Philosophy and the Emergence of Modern Mathematics*, Rodopi. Rusnock, P., On Bolzano’s Concept of Sum, *History and Philosophy of Logic*, 2013, 34(2), 155-169. Rusnock, P., Rolf G., (2014). *Theory of Science*, Oxford University Press, Oxford. Russ, S., (2004). *The Mathematical Works of Bernard Bolzano*. Oxford University Press, Oxford. Russ, S., Trlifajová, K., (2016). Bolzano’s measurable numbers: are they real? In *Research in History and Philosophy of Mathematics*. Basel, Birkhäuser. Šebestík, J., (1992). *Logique et mathématique chez Bernard Bolzano*. Vrin, Paris. Simons, P., (1998). Bolzano on Collections. In *Bolzano and Analytic Philosophy*, ed. by W. Kűnne, M. Siebel and M. Textor, Brill, Rodopi. Simons P., (2004). Bolzano on Quantities. In *Bernard Bolzanos Leistungen in Logik, Mathematik und Physik*, Academia, Wien. Tao, T., (2012a). *A cheap version of non-standard analysis*,
https://terrytao.wordpress.com/2012/04/02/a-cheap-version-of-nonstandard-analysis/. Tao, T., (2012b). *Compactness and Contradiction*, American Mathematical Sciety.
Waldegg G., (2005). Bolzano’s Approach to the Paradoxes of Infinity: Implications for Teaching, *Science and Education*, 14(6), 559–577.
[^1]: For instance in (Fraenkel et al. 1973, p. 47).
[^2]: In symbols $(\forall a)(\exists y)(\forall x)(x \in y \Leftrightarrow x \subseteq a)$, (Fraenkel et al. 1973, p. 35). Of course the other axioms are important too, but these two are substantial for the construction of infinite ordinal and cardinal numbers.
[^3]: Both Bolzano and Cantor quote the famous passage from Leibniz’s letter to “I am so in favor of the actual infinite that instead of admitting that Nature abhors it, as is commonly said, I hold that Nature makes frequent use of it everywhere, in order to show more effectively the perfections of its Author” (Cantor 1976, p. 78), (Russ 2004, p. 593.)
[^4]: Rusnock argues using Bolzano’s own definition of the set, according to which it does not matter how its elements are ordered. At the same time, however, if we want to declare two sets to be equal in terms of the size of their elements, it is also necessary that they have the same determining ground \[Bestimmungsgrunde\]. Rusnock considers this a mistake and rejects Bolzano’s conception. See (Rusnock 2000). But Bolzano’s definitions are not contradictory. Even Cantor’s concept of sets could be rejected in a similar way. The existence of a one-to-one correspondence between two sets entails their ordering.
[^5]: This again poses a difficult question of how to interpret Bolzano’s statements about variety. But let us stick to this simple interpretation.
[^6]: This is difficult to translate and there is no clear-cut solution. We adhere to the translation proposed and substantiated by Peter Simons and used by Steve Russ: *Inbegriff = collection, Menge = multitude, Vielheit = plurality, Grosse = quantity.* We should point out that various English translations and articles use different terminology.
[^7]: Georg Cantor also uses the word in his articles from 1880 onwards instead of the original *Mannichfaltigkeit* or *Inbegriff*.
[^8]: This is also reflected in the method of notation in which we use curly brackets. The symbol $\{a,b,c\}$ denotes a multitude containing elements $a,b, c$, whereas Bolzano would have written it as $a + b + c$. Likewise, if we want to indicate that a group of three items comprises a multitude, we draw a circle around it.
[^9]: The seventh section of *Pure Theory of Numbers* is devoted to Infinite Quantity Concepts. Bolzano distinguishes infinitely small, measurable, and infinitely large Infinite Quantity Concepts. More on this in the next section.
[^10]: Bolzano doesn’t define this notion explicitly, but in §10 he speaks about “infinitely smaller and infinitely greater *quantities of higher order*, which all proceed from the same concept”. In §33 he proves that $S$ is infinitely greater than $P$ because $S - n \cdot P > 0$ for any finite number $n$, see Theorem \[S>P\].
[^11]: This proof has two variations of which one is included in the *Theory of Science* (Bolzano 1837/2014) and the other in the *Paradoxes of the Infinite* in §13.
[^12]: “It is possible to combine each thing belonging to one multitude with a thing of the other multitude, thus creating pairs, with the result being that no single thing remains without connection to a pair, and no single thing appears in two or more pairs (§20.)”
[^13]: \[IQC\] When Bolzano writes about quantities in the interval $(0, 5)$ he apparently has on mind his *measurable numbers*. Their construction is described in his *Infinite Quantity Concepts*, see the Section \[measurable\].
[^14]: It’s equal in the meaning of equality introduced by Bolzano in the *Infinite Quantity Concepts*, i.e. if their difference is infinitely small, see \[measurable\].
[^15]: The proof of this theorem is stated in the note in §18. Here is the end of Bolzano’s proof
- We designate $[1 + e + \cdots + \text{in inf.} ] = S - P^2$, in which we assume that $P^2$ designates a quantity which is positive and dependent on $n$. We obtain
- $S = \frac{1 - e^n}{1 - e} + e^n(S - P^2) = \frac{1 - e^n}{1 - e} + e^n S - e^n P^2 $
- $S (1 - e^n) = \frac{1 - e^n}{1 - e} - e^n P^2$
- $S = \frac{1}{1 - e} - \frac{e^n}{1 - e^n} P^2.$ Finally we have to prove that $\frac{e^n}{1 - e^n} P^2$ can be brought down below any $1/N$.
- $S = \frac{1 - e^n}{1 - e} + P^1 = \frac{1}{1 - e} - \frac{e^n}{1 - e^n} P^2$, thus $ \frac{e^n}{1 - e^n} P^2 + P^1 = \frac{e^n}{1 - e}.$
- If we take $n$ arbitrarily great, thereby the value $\frac{e^n}{1 - e}$ is brought down below under every arbitrary quantity $1/N$, and the quantities $ \frac{e^n}{1 - e^n} P^2$ and $P^1$ must themselves fall below any arbitrary value. Consequently
- $S = \frac{1}{1 - e}.$
[^16]: Russ, S., Trlifajová, K. 2016.
[^17]: It is a similar relation as the Leibniz equality *up to* denoted by the symbol “$\sqcap$” (Bascelli et al. 2016).
[^18]: This theorem in particular was essential. As early as 1817 in *Purely Analytical Proof* Bolzano defined a Bolzano-Cauchy sequence and wrote that such a sequence has a limit. He proved its uniqueness, but nevertheless he could not prove its existence. There was no theory of real numbers.
[^19]: Of course Bolzano does not use these terms. We write them as commonly known designations. Bolzano describes the properties explicitly, for instance the *Archimedean property*:
> If $A$ and $B$ are a pair of measurable and finite numbers, both of which we also consider positive or absolute, then there is always some multiple of one, which is *greater* than other, and some aliquot part of the same one which is *smaller* than other one. (Bolzano 1976, §74) or (Russ 2004, p.399).
Bolzano formulated and proved all substantial properties of real numbers.
[^20]: There is a nice construction of *real* numbers from *rational* numbers by means of non-standard analysis: we proceed the usual way, but start from sequences of *rational numbers* $\mathbb Q^\mathbb N$. We employ a non-principal ultrafilter $\mathcal U$ on natural numbers $\mathbb N$ and obtain an ultraproduct $$\mathbb Q^* = \mathbb Q^ \mathbb N/\mathcal U.$$
The elements of the ultraproduct are called hyperrational numbers. It is a linearly ordered field, non-Archimedean. We define, in the usual way its finite, infinite and infinitely small elements, and the relation of infinite closeness $\doteq$. Let $\mathbb Q_f$ denote the set of finite elements, $\mathbb Q_i$ the set of infinitely small elements. $$\mathbb Q_i \subseteq \mathbb Q_f \subseteq \mathbb Q^*.$$ By the factorization of this set by the relation of infinite closeness we obtain the structure isomorphic to real numbers. The result is the same as a factorization modulo $Q_i$. $$\mathbb Q_f/\doteq \quad \cong \quad \mathbb R.$$ Perhaps this is the most direct way of constructing the reals from rationals. (Albeverio, p.14). Nevertheless this structure is inconvenient for the introduction of the differential and integral calculus. The key *transfer principle* doesn’t hold between finite hyperrational numbers and real numbers. Functions defined on real numbers cannot be simply extended on hyperrationals.
[^21]: For Bolzano, $\Delta x$ is simply the difference between $x$ and any other modified value (Russ 2004, p. 438).
[^22]: We use the symbol $r$ for a real number instead of Bolzano’s symbol $\alpha$ for quantities.
[^23]: An integral domain is a commutative ring in which there are no non-zero divisors of zero.
[^24]: In fact, it is the same structure as before, only its formal description is a little different. The equality of sequences from $\mathbb R^\mathbb N$ was defined with help of Fréchet filter. Now we work with equivalence classes factorized by the Fréchet filter.
[^25]: It is also called a countable saturation property.
[^26]: (Pascal 1866, p. 295).
|
{
"pile_set_name": "ArXiv"
}
|
Liking this low tech 1 bit tablet http://www.noteslate.com/ thinking of this as a replacement to my paper sketching, you could sketch directly on this and then save this on your computer, or share this. It's not out yet but looks promising.
worst customer customer service, wasted 10 min trying to pay for my order, because the cashiers were completely clueless. I like to eat my food while it's still hot. Thanks for nothing, never coming to this place again.
|
{
"pile_set_name": "Pile-CC"
}
|
Effects on ionized calcium of a correction of acidosis with alkalinizing agents. A rational basis for the administration of calcium in cardiac resuscitation.
The effects on the ionized calcium concentration of a correction of various forms of acidosis with sodium bicarbonate or (tris-hydroxymethyl)aminomethane (THAM) were investigated in vitro in human plasma. Calculation of least square regression equations of ionized calcium (m mol) on pH yielded the following regression coefficients: hydrochloric acidosis: -0.65 +/- 0.06; lactic acidosis: -0.27 +/- 0.05; hydrochloric acidosis corrected with sodium bicarbonate: -0.65 +/- 0.02; lactic acidosis corrected with sodium bicarbonate: -0.51 +/- 0.03. The results indicate that after correction of lactic acidosis the ionized calcium concentration will be below the control values while pH is restored to the normal range. This effect is even more pronounced when THAM is used. The findings point to the need for calcium administration in cardiac resuscitation.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Demonstration of two pools of albumin-bound fatty acids.
The uptakes of albumin-bound nonesterified fatty acids and of [1-14C]palmitic acid complexed to albumin by the isolated perfused rat liver were compared. During perfusion, the rate of uptake of nonesterified fatty acids decreased and became zero when the fatty acid:albumin molar ratio reached 0.3, but the rate of uptake of radioactive palmitic acid remained constant. This finding suggests the existence of two pools of fatty acids bound to albumin with different fractional turnover rates. This view was supported by the fact that when delipidated albumin complexed in vitro to radioactive and nonradioactive fatty acids was used no difference was observed between the uptakes of nonesterified fatty acids and radioactive fatty acids by perfused liver. Similar results were found with albumin-bound radioactive fatty acid in vivo (obtained from rats fed radioactive palmitic acid), showing a homogeneous distribution of the label in both pools. The existence of two nonesterified fatty acid pools in plasma would arise from the differences in the nature of bonds between fatty acid and albumin molecules, which could determine the rate of exchange of fatty acids between the albumin-bound and soluble forms preceding their uptake by the cells.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
//
// Generated by class-dump 3.5 (64 bit) (Debug version compiled Oct 25 2017 03:49:04).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard.
//
#import "CAGridCellRecord.h"
@class PLHolder;
@interface CAPeopleCellRecord : CAGridCellRecord
{
PLHolder *_photos;
unsigned long long _count;
long long _keyIndex;
long long _drawIndex;
}
@property(nonatomic) long long drawIndex; // @synthesize drawIndex=_drawIndex;
@property(nonatomic) long long keyIndex; // @synthesize keyIndex=_keyIndex;
@property(nonatomic) unsigned long long count; // @synthesize count=_count;
@property(retain, nonatomic) PLHolder *photos; // @synthesize photos=_photos;
- (id)databaseForCell;
- (BOOL)isShowingPhotoWithKey:(unsigned long long)arg1;
- (id)debugDescription;
- (void)dealloc;
- (id)init;
@end
|
{
"pile_set_name": "Github"
}
|
Clinical and microbiological factors associated with mortality in candidemia in adult patients 2007-2016.
Background: Candidemia is a life-threatening infection with high mortality. Our aim was to evaluate the Candida species distribution, antifungal susceptibilities and risk factors associated with 30-day mortality in candidemia in Southern Finland. Methods: We present a retrospective analysis of candidemia cases from the hospital district of Helsinki and Uusimaa during 2007-2016. Patients younger than 18 years old were excluded. A total of 386 candida isolates from 374 episodes of candidemia were identified in 350 adult patients. Results: Candida albicans was the leading cause of candidemia (60.4%), followed by C. glabrata (21.5%), C. parapsilosis (5.2%) and C. dubliniensis (5.2%). There was no statistically significant change in the distribution of C. albicans vs non-albicans species during the study period. Thirty-day overall mortality was 30.7%. When patients who received no antifungal treatment were excluded from the mortality analysis, 30-day mortality was 23.0%. Severity of underlying illnesses (OR 20.55, 95% CI 5.98-70.60), ICU stay at the onset of candidemia (OR 5.06, 95% CI 1.75-14.68) and age >65 years (OR 3.98, 95% CI 1.97-8.02) were independent risk factors of 30-day mortality in multivariable analysis. However, there was no statistically significant association between 30-day mortality and an early start of an effective antifungal. Conclusion: There was not a significant shift to non-albicans species as the cause of candidemia in Southern Finland during the 10-year study period. Furthermore, we did not find an association between 30-day mortality and the early start of an antifungal treatment. Comorbidity considerably increased the risk of fatal outcome.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Category: Defective Products Injury in Texas
Defective Products Injury in Texas
The crayons and toys that contained asbestos were made in China and imported in the U.S., according to the package labels. Four brands of children’s crayons and two kids’ crime scene fingerprint kits were found to contain asbestos, according a report released Wednesday. Several were marketed under the names of the popular characters Mickey…
On Tuesday, nearly 34 million cars and trucks nationwide were declared defective because of deadly air bags made by auto-parts giant Takata. It is expected to be the biggest recall of any consumer product in U.S. history. This expanded recall is due to air bags which can blast out sharp metal shrapnel when deployed, a…
The recall on IKEA’s SULTAN and VYSSA crib mattresses have expanded due to a risk of entrapment. The recall states “the crib mattresses could create a gap between the mattress and crib ends larger than allowed by federal regulations, posing an entrapment hazard to infants.” The recall includes approximately 300,000 crib mattresses in the United States and about…
GM received another 57 claims for compensation for ignition switch defects in its cars in the past week, bringing the total to 4,237, according to the administrator of the company’s compensation program. Through Friday, GM had received 462 claims for death, 282 for catastrophic injuries and 3,493 for less-serious injuries requiring hospitalization, according to a…
|
{
"pile_set_name": "Pile-CC"
}
|
Joel Almeida (basketball)
Joel Freitas Almeida (born October 11, 1985) is a Cape Verdean and Portuguese basketball player who plays for Xuven Cambados, a Galician club that was in the Spanish Third Division as of the 2015/16 season.
University career
Joel Almeida went to the northeastern United States, where he attended Mohawk Valley Community College between 2006 and 2008 in Utica, New York and played for the NJCAA's Division III, in 2008, he played with Brockport State for one season, a college located west of Rochester which took part in the NCAA's Division III.
In his first season, he played with the Mountain Valley Conference and was the second best all-regional team. He was MVP for the team and the Athlete of the Week in February 2007. In his second season, he was elected the All-American 2007 in the preseason of the best team in the Mountain Valley Conference for the second time. He was the Athlete of the Week for the second time in December 2007 with 50 major games played in NJCAA's Division III.
With Brockport State Golden Eagles, he played 14 games and scored an average of 14.7 points and 6.1 rebounds. The team was champion of the SUNYAC Conference with the Golden Eagles.
Professional career
He came back to his native country in 2009 and played for two seasons with Seven Stars who went to the National Basketball Championships, there he was the Best Player of the Year. In-between, he played for Vagos Norbain Lusavouga for the Portuguese Basketball League where he played 23 games and his points average was 8.2 and rebound average was 3.4, his average playing time was 20.8. He was the Best National Players of Week 19 of the LPB (11 points, 9 rebounds, 2 assists in 22 minutes).
He returned to Portugal to play with Sampaense Basket for a season in 2010, he played 18 games, scored an average of 8.9 points (36.7% triple-pointer) and 1.9 rebounds and 16.5 minutes of playing. He was the Top 5 player of the most number of triple pointers. He was the Best Player of Week 13 (33 points, 7 rebounds, 1 assists and 1 steal in 35 minutes). His third return to play in his native country was om 2012 with ADESBA and the club was finalist in the national division.
Almeida later played for Atlético Sport Aviation in Luanda for the Angolan Division I Championships and was one of the first Cape Verdeans to play. Almeida scored 373 points (of which 38.4% were triple-pointers). For his fourth time, he played in his native country and second time with ADESBA.
In March 2013, he played for a Portuguese team again and with Vitória S.C./M.Couto Guimarães late in the season, he made the team won the Portuguese Basketball Cup. He played 10 games with the Guimarães's team with an average of 3.7 points and 2.3 rebounds in 11.7 minutes.
Almeida made his second appearance in Sampaense Basket for the 2013-14 season. He played 22 matches with the Coimbra's team with an average of 16.9 points (52% doubles and 34.8% triples), 4.4 rebounds, 1.1 assists, 1.8 steals and 28.5 minutes of play time. In the number of games played for Sampaense, he was the top ten players of the season.
Almeida played in Cyprus in September 14 and the team ForexTime Apollon Limassol in the country's First Division, a month later, he left. During his career in Cyprus, the team was the finalist in the Cypriot Super Cup.
On January 16, 2015, Almeida moved to play with Xuven Cambados in LEB Plata's Third Division in Spain. He played 15 games with the Galician club and had an average of 11 points (49.2% double points, 34.2% triple pointers), 2.6 rebounds, a steal and 21 minutes of play time. In August 2015, his contract was renewed for another season, he was the best player of the week for the team in weeks 1, 3, 14 and 16.
Honours
Vitória S.C./M.Couto Guimarães
Portuguese Basketball Cup: 2012–13
External links
RealGM Profile
Draft profile of Joel Almeida
Eurobasket profile with Xuven Cambados
Category:1985 births
Category:Living people
Category:Cape Verdean men's basketball players
Category:People from São Vicente, Cape Verde
Category:Portuguese people of Cape Verdean descent
Category:Portuguese men's basketball players
Category:Cape Verdean expatriates in Portugal
Category:Brockport Golden Eagles men's basketball players
Category:Shooting guards
Category:Small forwards
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Prediction of mass transfer coefficients in non-Newtonian fermentation media using first-principles methods.
Bubble flows in non-Newtonian fluids were analyzed using first-principles methods with the aim to compute and predict mass transfer coefficients in such fermentation media. The method we used is a Direct Numerical Simulation (DNS) of the reactive multiphase flow with deformable boundaries and interfaces. With this method, we are able for the first time to calculate mass transfer coefficients in non-Newtonian liquids of different rheologies without any experimental data. In the current article, shear-thinning fluids are considered. However, the results provide the basis for further investigations, such as the study of viscoelastic fluids.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Eevee Frost-Manyvids-Up close personal
Download porn video Eevee Frost-Manyvids-Up close personal
In this movie I attempted using my mirror for a diversity of different things that didn’t work. What I concluded up with was this, a flick where the concentrate is on my facial cumshot expressions as I bring myself to unloading and ejaculating, with my cunny in the foreground/reflection of the mirror. I jizz & unload
Eevee Frost
|
{
"pile_set_name": "Pile-CC"
}
|
An update on the pharmacotherapy for endometrial cancer.
Endometrial cancer (EC) is the seventh most common malignancy in women. Most cases have a favorable prognosis because they present an early stage disease at diagnosis. Treatment currently comprises surgery with or without adjuvant approaches. A combination of radiation therapy, chemotherapy or hormonal therapy (HT) is usually administered. This article gives an update concerning the role of synthetic drugs in EC, reviewing the most recent data from Phase III randomized-controlled trials onwards. Over the years, chemotherapy has become the treatment mainstay in both high-risk or locally advanced EC and in metastatic or recurrent disease. Carboplatin plus paclitaxel is currently considered the standard chemotherapy regimen with a well-tolerated toxicity profile. HT is an alternative option in women with advanced EC and important co-morbidities, and in young women with very early stage disease. Basic results of EC treatment during the last decade were collected. There is a need of more advances in treatment. The use of biomarkers, necessary for the success of a therapeutic strategy, and the identification of an ad-hoc population, are two important goals. In the authors' opinion, the development of comprehensive tumor bio-banks and international networks represent the right approach to foster translational studies and obtain improvement in patient outcomes.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
`SKScene.nodes()` giving too many nodes for touch location
I'm trying to get the nodes at at a touch location, but am running into problems with .nodes() returning parent nodes and other nodes at the same "location."
I've tried a dozen different code configurations, but can't seem to find the right sequence of using SKScene.convert() or SKScene.convertPoint() and others....
Basically, I have a hierarchical tree of nodes vertically.. the top is the parent and each underneath is a child of the one directly on top... (see pic below)
PROBLEM:
When I click on the very bottom node, I get multiple hits from running .nodes() in my scene... I'm trying to get ONLY the nodes at the exact location that I click... When I click somewhere I don't want the parent nodes or other nodes at the same "location" or same ".position" to print... I'm just trying to get ONLY the nodes at the EXACT position I touch...
Here is a picture of what I'm working with... when you click/tap the screen, it prints out which nodes are at the touch location:
Here is my code on click (remember, each node is in parent / child from top to bottom, and it's SKNode.name is just a number as an identifier):
override func touchesBegan(_ touches: Set<UITouch>, with event: UIEvent?) {
let allNodes = nodes(at: touches.first!.location(in: self))
for node in allNodes { print( node.name! ) }
}
I've tried a dozen different ways to convert the touch point to UIView or SKNode coords, etc.. I can't get it right... here is the output when I click the bottom-right node:
(again, the numbers are just the name of the node in creation order...):
8
7
5
4
2
1
There should only be 1-2 nodes printed when I click the bottom right node, but instead I am getting 6 nodes printed... and this is because of their .postion being the "same" I believe in the messed up coord system of SK at times =/
Workaround:
So, my workaround is to create a filter that work based on the Y values ... so in other words, only nodes around the general area of where I clicked will be printed... BUT my operation is already intensive, so I'm trying to NOT have to create a filter for this list...
I really think that there is a way to JUST GET THE NODES AT WHERE I CLICK
but I haven't been able to figure out the right combination of .nodes() and .location(in:) to get this right.
I've tried playing with .atPoint and using the .position from there, but no luck at all..
I'm lost right now, and don't want to have to create a filer :{
A:
If I've understand in your project you have nodes where each node have a different parent. When you click on the screen you touched a specific point, but this point is detected on the current scene 'self' (the class where you have touchesBegan) so when you touch the deepest node in releationship parent/child the node touched showed also his parents.
But you want only the node/nodes involved in the touch point visible zone, so I think you could doing in this case is to obtain the frame of each node converted to the current class (self) and check if the touch point is contained to this frame.
In this example below I use 4 nodes:
import SpriteKit
class GameScene: SKScene {
var node5:SKSpriteNode!
var node6:SKSpriteNode!
var node7:SKSpriteNode!
var node8:SKSpriteNode!
override func didMove(to view: SKView) {
let startPos = CGPoint(x:self.frame.midX,y:self.frame.midY)
node5 = SKSpriteNode.init(color: .yellow, size: CGSize(width:50,height:60))
self.addChild(node5)
node5.name = "5"
node5.position = CGPoint(x:startPos.x+35,y:startPos.y-180)
node6 = SKSpriteNode.init(color: .blue, size: CGSize(width:50,height:60))
node5.addChild(node6)
node6.name = "6"
node6.position = CGPoint(x:60,y:0)
node7 = SKSpriteNode.init(color: .green, size: CGSize(width:80,height:60))
node6.addChild(node7)
node7.name = "7"
node7.position = CGPoint(x:60,y:10)
node8 = SKSpriteNode.init(color: .red, size: CGSize(width:80,height:60))
node7.addChild(node8)
node8.name = "8"
node8.position = CGPoint(x:-10,y:20)
}
override func touchesBegan(_ touches: Set<UITouch>, with event: UIEvent?) {
let touch = touches.first
let positionInScene = touch!.location(in: self)
let allNodes = nodes(at: positionInScene)
for node in allNodes {
let nodePositionConverted = self.convert(node.position, from: node)
let nodeFrameConverted = CGRect(origin: CGPoint(x:nodePositionConverted.x-node.frame.maxX,y:nodePositionConverted.y-node.frame.maxY),size:node.frame.size)
if nodeFrameConverted.contains(positionInScene), let n = node.name {print(n)}
}
}
}
Output:
This output showed differents taps. The first tap involved 3 nodes, the red 8 , the green 7 and the blue 6. Indeed you will have to your debug console:
The second tap involved only the green 7 and the blue 6:
The third and the fourth taps involved only blue and yellow nodes so you have respectively only the number of each node touched.
The last tap involved the red 8 and the blue 6 so you have:
Hope this help to your touches handle.
|
{
"pile_set_name": "StackExchange"
}
|
Obstetric brachial plexus palsy (OBPP) is a flaccid paralysis mostly seen on arm due to the injury of brachial plexus during birth. It occurs as a result of distention and tear in the body of brachial plexus and avulsion of spinal roots \[[@ref1], [@ref2]\]. At every 1000 birth, OBPP incidence is 0.3--1.56%, recovery rate is 84%, and permanent damage rate is 0.5--25%. Hence, OBPP is an important neonatal morbidity cause \[[@ref3]-[@ref5]\]. The most observed form of OBPP is the involvement of upper brachial plexus (C5-6-7). In C5-6 injuries, shoulder abductors, internal rotators, and forearm flexor muscles are mostly affected, and the decline in forearm supination movement can be seen, but hand functions are retained. If an injury to C7 is added, then triceps and wrist extensors are also affected \[[@ref4], [@ref6], [@ref7]\].
Although an enough spontaneous recovery to use extremity functionally can be gained in most of the upper OBPP patients, all these patients are given an exercise program at the first stage. \[[@ref2], [@ref8]-[@ref10]\]. The aim to give exercises is mostly to prevent contracture formation and to avoid muscle imbalance \[[@ref4], [@ref7]\]. There are no accurate data on the effect of any particular exercise which is more than the other, or one has additional effects on recovery than others to prevent complication; besides, there is no consensus on what frequency, intensity, or duration should exercise therapy be given. While some authors claimed that exercises do not have any effect on the recovery of the patients, others suggested that exercises could contribute to recovery by positively affecting regenerative process \[[@ref4]\].
It was hypothesized that intense exercise programs given in cases with peripheral nerve or spinal cord injury may accelerate recovery by contributing to plasticity development \[[@ref11]-[@ref13]\]. When no improvement is gained in biceps muscle function in patients with OBPP in the first 3 months during follow-up, shoulder dysfunction or residual upper extremity incapability often develops. Therefore, some researchers recommend going further to surgical interventions in cases that recovery is not observed in biceps muscle function within 3--6 months \[[@ref9]\]. Therefore, the aim of this study was to examine how much recovery upper OBPP patients showed with exercises when they were 3, 6, and 12 months old and to evaluate whether the exercise treatment given at different frequencies contributes to this recovery or not.
MATERIALS AND METHODS {#sec1-2}
=====================
This study conducted in Physical Medicine and Rehabilitation Department of Balıkesir University between June and December 2014. The study was approved by the local research ethics committee of Selcuk University's Faculty of Medicine (No: 276/2014). Written informed consent was obtained from parents of all patients for being included in the study. 60 cases that were referred to Pediatric Rehabilitation and Pediatric Orthopedic Clinics with the diagnosis of Groups I and II OBPP according to Narakas classification were included in the study following a multidisciplinary approach, physical examination, and electromyography (EMG) assessments. The patients in Groups III and IV according to Narakas classification 2 and the ones who had another comorbid neurological problem, contracture, and/or fracture on the affected arm were excluded from the study. The parents of patients were elucidated with precise information about the study, and all of them signed approval forms.
Sixty patients were divided into two groups randomly (for the randomization-allocation concealment, all the randomization numbers were concealed in separate envelopes and marked by the patient number on the outer envelope. For randomization, the patients admitted into the program were divided into groups); the first group had intense exercise program 3 times daily (intensive exercise group \[IEG\] as a Group I), and the second group defined as a control group and had a standard exercise program once in a day (EG as Group II).
Exercise program {#sec2-1}
----------------
Passive range of motion (ROM) exercises were given to all joints of the upper extremities at first, and in the following months, active ROM and muscle enhancement exercises (according to the cooperation level of the children) were started. The duration time of exercises was related to the children's cooperation. Since biceps muscle force of 3 patients in the Group 1 and 1 patient in the Group II was weak, they were excluded from the study. The subjects were assessed using passive-active ROM degrees and hospital for sick children muscle grading system on their first clinic visit and every month after until they became 12 months old \[[@ref5]\].
Assessment Criteria {#sec2-2}
-------------------
### 1. Narakas classification {#sec3-1}
This classification is composed of four groups: Group I C5-6 shoulder and biceps paralysis, Group II C5-7 paralysis of shoulder, biceps, and forearm extensors, Group III C5-Th1 complete paralysis of the extremity, and Group IV C5-Th1 complete paralysis of extremity accompanying Horner's syndrome \[[@ref5]\].
### 2. Range of motion {#sec3-2}
ROM was evaluated both passively and actively with joint-specific movements: Shoulder ROM: Flexion, abduction, extension, and external/internal rotations; elbow ROM: Flexion, extension, supination, and pronation; and wrist ROM: Extension and flexion. Active ROM was measured on 3 different days following each other and calculated by averaging these measures by the same observer, which proved intraobserver reliability.
### 3. Muscle testing {#sec3-3}
Shoulder flexors and abductors, elbow flexor, and forearm supinator muscles were evaluated using hospital for sick children muscle grading system (Clarke and Curtis). This classification system is appropriate for children younger than 3 years old, which measures all joints without any commands. The hospital for sick children scale is not a "muscle grading system" but is an assessment of spontaneous active movement. There are seven stages totally, in which the gravity is eliminated until stage 4 ([Table 1](#T1){ref-type="table"}).
######
Hospital for sick children muscle grading system
Observation Muscle grade
-------------------- --------------
Gravity eliminated 0
No contraction 1
Motion \< ½ range 2
Motion \>½ range 3
Full motion 4
Against gravity
Motion \< ½ range 5
Motion \>½ range 6
Full motion 7
The families were educated in the hospital by a talented physiotherapist with a 5-day oral, visual, and applied training program, in which the parents were then tested. The patients were examined and exercise programs were checked by the same physician every month until they became 12 months old. It was ordered to make the exercises 3 times daily for the IEG and once daily for the EG.
Statistical Analysis {#sec2-3}
--------------------
Statistical evaluation was performed using SPSS 16 (SPSS Inc. Released 2007. SPSS for Windows, Version 16.0. Chicago, SPSS Inc.). The one-sample Kolmogorov--Smirnov test was applied for non-parametric values that comply with a normal distribution in inner-group assessments. Analysis of variance (ANOVA) was used in two-way repeated (time and groups) measurements to compare data from the parameters repeatedly measured in the inner group. In cases in which the variance analysis test result was significant, Bonferroni correction was performed to compare between groups as a post hoc test. The Bonferroni student t-test was used to detect different groups. The student t-test was used for independent groups to analyze data that complied with a normal distribution. P\<0.05 was considered to be statistically significant (p\<0.05).
RESULTS {#sec1-3}
=======
Since mean biceps muscle force of four patients was 1.42 when they were 4 months old, these children were referred to surgery and excluded from the study. Hence, a total of 62 patients (38 boys and 24 girls), with a mean age of 7.50±5.18 days, were included in the study. The affected side was the left in 42 cases and right in 20 cases. All infants were born vaginally, and 52 cases had difficult labor history. The average birth weight was 4388 g ([Table 2](#T2){ref-type="table"}). 97% of the subjects were in Group I, while 3% were in Group II according to Narakas classification.
######
Characteristics of patients of obstetric brachial plexus palsy
---------------------------- -----------
Age (days) 7.50±5.18
Sex (male/female) 38/15
Weight (gr) 4388
Affected side (left/right) 42:20
---------------------------- -----------
Statistical analysis inside the groups: In terms of active ROM, while a statistically significant improvement was gained in both groups between 1^st^--3^rd^ months, 3^rd^--6^th^ months, and 6^th^--12^th^ months in shoulder abduction, external rotation and flexion, and elbow flexion and forearm supination and between 1^st^--3^rd^ months and 3^rd^--6^th^ months in shoulder internal rotation and extension (p\<0.05); there was no significant difference in elbow extension, forearm pronation, and wrist extension since they already had nearly normal values at the beginning of the treatment (p\>0.05). Active ROM measures of the patients are shown in [Table 3](#T3){ref-type="table"}. There was a statistically significant improvement in the muscle strength in both groups between 1^st^--6^th^ months and 6^th^--12^th^ months in shoulder abduction, between 1^st^--3^rd^ and 6^th^--12^th^ months in shoulder flexion, and between 1^st^, 3^rd^, 6^th^, and 12^th^ months in elbow flexion and forearm supination (p\<0.05) ([Table 4](#T4){ref-type="table"}).
######
Measurements of active range of motion in patients with obstetric brachial plexus palsy
Birth 3 months 6 months 12 months
-------------------- --------------- --------------- ------------------------------------------------- ------------------------------------------------ ------------------------------------------------- ------------------------------------------------ ------------------------------------------------- ------------------------------------------------
Shoulder (°)
Abduction 11.92 (4.38) 12.82 (3.63) 38.71 (3.38)^[\*](#t3f1){ref-type="table-fn"}^ 38.04 (3.61)^[□](#t3f2){ref-type="table-fn"}^ 62.92 (2.46)^[\*](#t3f1){ref-type="table-fn"}^ 62.82 (2.53)^[□](#t3f2){ref-type="table-fn"}^ 87.63 (2.53)^[\*](#t3f1){ref-type="table-fn"}^ 87.40 (2.55)^[□](#t3f2){ref-type="table-fn"}^
External rotation 0 0 18.07 (2.46)^[\*](#t3f1){ref-type="table-fn"}^ 18.03 (2.24)^[□](#t3f2){ref-type="table-fn"}^ 23.92 (2.48)^[\*](#t3f1){ref-type="table-fn"}^ 23.47 (2.35)^[□](#t3f2){ref-type="table-fn"}^ 28.20 (2.42)^[\*](#t3f1){ref-type="table-fn"}^ 28.04 (2.49)^[□](#t3f2){ref-type="table-fn"}^
Internal rotation 39.74 (3.79) 39.56 (3.60) 60.38 (4.35)^[\*](#t3f1){ref-type="table-fn"}^ 60.21 (3.19)^[□](#t3f2){ref-type="table-fn"}^ 78.33 (2.38)^[\*](#t3f1){ref-type="table-fn"}^ 77.60 (2.56)^[□](#t3f2){ref-type="table-fn"}^ 79.23 (1.82)^[\*](#t3f1){ref-type="table-fn"}^ 78.96 (2.24)^[□](#t3f2){ref-type="table-fn"}^
Extension 0 0 18.84 (2.13)^[\*](#t3f1){ref-type="table-fn"}^ 17.60 (2.55)^[□](#t3f2){ref-type="table-fn"}^ 22.15 (2.13)^[\*](#t3f1){ref-type="table-fn"}^ 22.17 (2.53)^[□](#t3f2){ref-type="table-fn"}^ 22.53 (2.33)^[\*](#t3f1){ref-type="table-fn"}^ 22.04 (2.38)^[□](#t3f2){ref-type="table-fn"}^
Flexion 19.87 (3.34) 19.13 (3.88) 51.53 (2.33)^[\*](#t3f1){ref-type="table-fn"}^ 51.39 (2.55)^[□](#t3f2){ref-type="table-fn"}^ 66.53 (2.33)^[\*](#t3f1){ref-type="table-fn"}^ 65.43 (2.21)^[□](#t3f2){ref-type="table-fn"}^ 83.58 (2.27)^[\*](#t3f1){ref-type="table-fn"}^ 82.60 (2.45)^[□](#t3f2){ref-type="table-fn"}^
Elbow (°)
Flexion 0 0 68.07 (2.46)^[\*](#t3f1){ref-type="table-fn"}^ 67.60 (2.55)^[□](#t3f2){ref-type="table-fn"}^ 77.92 (2.46)^[\*](#t3f1){ref-type="table-fn"}^ 77.39 (2.54)^[□](#t3f2){ref-type="table-fn"}^ 102.82 (4.55)^[\*](#t3f1){ref-type="table-fn"}^ 102.78 (5.10)^[□](#t3f2){ref-type="table-fn"}^
Extension 103.07 (4.67) 103.47 (4.86) 115.89 (4.98)^[\*](#t3f1){ref-type="table-fn"}^ 115.65 (5.06)^[□](#t3f2){ref-type="table-fn"}^ 118.46 (3.65)^[\*](#t3f1){ref-type="table-fn"}^ 117.82 (4.21)^[□](#t3f2){ref-type="table-fn"}^ 118.46 (3.65)^[\*](#t3f1){ref-type="table-fn"}^ 117.82 (4.21)^[□](#t3f2){ref-type="table-fn"}^
Forearm (°)
Pronation 118.46 (2.33) 118.69 (2.24) 121.38 (5.05)^[\*](#t3f1){ref-type="table-fn"}^ 121.21 (5.10)^[□](#t3f2){ref-type="table-fn"}^ 121.38 (5.05)^[\*](#t3f1){ref-type="table-fn"}^ 121.21 (5.10)^[□](#t3f2){ref-type="table-fn"}^ 121.38 (5.05)^[\*](#t3f1){ref-type="table-fn"}^ 121.21 (5.10)^[□](#t3f2){ref-type="table-fn"}^
Supination 0 0 36.79 (2.42)^[\*](#t3f1){ref-type="table-fn"}^ 37.60 (2.55)^[□](#t3f2){ref-type="table-fn"}^ 72.79 (2.42)^[\*](#t3f1){ref-type="table-fn"}^ 72.60 (2.55)^[□](#t3f2){ref-type="table-fn"}^ 106.66 (4.77)^[\*](#t3f1){ref-type="table-fn"}^ 105.21 (5.10)^[□](#t3f2){ref-type="table-fn"}^
Wrist (°)
81.79 (2.42) 81.52 (2.35) 88.20 (2.42)^[\*](#t3f1){ref-type="table-fn"}^ 88.47 (2.35)^[□](#t3f2){ref-type="table-fn"}^ 88.20 (2.42)^[\*](#t3f1){ref-type="table-fn"}^ 88.47 (2.35)^[□](#t3f2){ref-type="table-fn"}^ 88.20 (2.42)^[\*](#t3f1){ref-type="table-fn"}^ 88.47 (2.35)^[□](#t3f2){ref-type="table-fn"}^
Flexion 71.46 (2.33) 71.95 (2.49) 71.46 (2.33)^[\*](#t3f1){ref-type="table-fn"}^ 71.95 (2.49)^[□](#t3f2){ref-type="table-fn"}^ 71.46 (2.33)^[\*](#t3f1){ref-type="table-fn"}^ 71.95 (2.49)^[□](#t3f2){ref-type="table-fn"}^ 71.46 (2.33)^[\*](#t3f1){ref-type="table-fn"}^ 71.95 (2.49)^[□](#t3f2){ref-type="table-fn"}^
: Statistically significant differences according to the Birth value inner Group I evaluations (p\<0.05).
: Statistically significant differences according to the Birth value inner Group II evaluations (p\<0.05). p\>0.05 for each between group evaluations; (°): Degree of movement at a joint.
######
Hospital for Sick Children muscle grading system in patients with obstetric brachial plexus palsy
Birth 3 months 6 months 12 months
------------- ------------- ------------- ----------------------------------------------- ---------------------------------------------- ----------------------------------------------- ---------------------------------------------- --------------------------------------------- ----------------------------------------------
Shoulder
Abduction 3.50 (0.46) 3.52 (0.51) 4.07 (0.57)^[\*](#t4f1){ref-type="table-fn"}^ 4.01 (0.73)^[□](#t4f2){ref-type="table-fn"}^ 5.51 (0.50)^[\*](#t4f1){ref-type="table-fn"}^ 5.56 (0.50)^[□](#t4f2){ref-type="table-fn"}^ 6.64 (0.48)[\*](#t4f1){ref-type="table-fn"} 6.56 (0.50)^[□](#t4f2){ref-type="table-fn"}^
Flexion 3.61 (0.49) 3.65 (0.48) 5.40 (0.46)^[\*](#t4f1){ref-type="table-fn"}^ 5.47 (0.51)^[□](#t4f2){ref-type="table-fn"}^ 5.43 (0.48)^[\*](#t4f1){ref-type="table-fn"}^ 5.48 (0.52)^[□](#t4f2){ref-type="table-fn"}^ 6.46 (0.42)[\*](#t4f1){ref-type="table-fn"} 6.30 (0.47)^[□](#t4f2){ref-type="table-fn"}^
Elbow
Flexion 0.56 (0.50) 0.52 (0.51) 4.71 (0.64)^[\*](#t4f1){ref-type="table-fn"}^ 4.82 (0.77)^[□](#t4f2){ref-type="table-fn"}^ 5.45 (0.64)^[\*](#t4f1){ref-type="table-fn"}^ 5.43 (0.50)^[□](#t4f2){ref-type="table-fn"}^ 6.38 (0.45)[\*](#t4f1){ref-type="table-fn"} 6.39 (0.49)^[□](#t4f2){ref-type="table-fn"}^
Forearm
Supination 0.41 (0.50) 0.43 (0.50) 2.58 (0.52)^[\*](#t4f1){ref-type="table-fn"}^ 2.60(0.49)^[□](#t4f2){ref-type="table-fn"}^ 5.53 (0.49)^[\*](#t4f1){ref-type="table-fn"}^ 5.52 (0.51)^[□](#t4f2){ref-type="table-fn"}^ 6.30 (0.40)[\*](#t4f1){ref-type="table-fn"} 6.34 (0.48)^[□](#t4f2){ref-type="table-fn"}^
: Statistically significant differences according to the Birth value inner Group I evaluations (p\<0.05).
: Statistically significant differences according to the Birth value inner Group II evaluations (p\<0.05). p\>0.05 for each between group evaluations.
Statistical analysis between the groups: No statistically significant improvement was observed between the groups in EMP measures and muscle force assessments (p\>0.05).
DISCUSSION {#sec1-4}
==========
In upper brachial plexus OBPP patients, there was no significant difference between the groups who had intensive exercise program and those who did not. Only four of the cases were further referred to surgery. In all the cases except for these four cases, good arm functions were observed while they were 3 months old, and nearly normal functions were found while they were 12 months old. Hence, almost exact recovery was gained in 94% of the cases with OBPP in our study. The patients with OBPP at the C5--6 level, generally, display improvement in a period from 3 months to 9 months of age \[[@ref3]-[@ref5], [@ref7]\]. It is reported that improvement period may continue until 12 months in some studies \[[@ref5]\].
The diagnosis of OBPP is based on a precise physical examination with a support of EMG study. The valid parameters used to evaluate improvement in OBPP cases are ROM measurements, EMG studies, and Clarke and Curtis muscle classification system for children under the age of \[[@ref3]-[@ref5]\]. If a common development cannot be gained in the shoulder and biceps muscles while the child is in 3 months and 6 months old, then he/she is referred to surgery \[[@ref4], [@ref7]\]. While 70--95% of the patients improve almost completely, 10% may require surgery \[[@ref4], [@ref7], [@ref14]\]. Likely 6% of our subjects had operations, 94% displayed a nearly complete improvement between 6 and 12 months. The increase in biceps and shoulder muscles showed a rapid incline in the 3^rd^ month and became almost normal in 6^th^--12^th^ months.
Physiotherapy program is the recommended treatment option for patients with C5-7 OBPP at the first stage. This conservative treatment includes exercise, splint, and electrical stimulation. The purpose of conservative treatment is mainly to prevent contracture formation, hypoplasic arm development, dislocation of the radial head, and negative psychosocial consequences \[[@ref1], [@ref2], [@ref4], [@ref7]\]. Although a spontaneous recovery can be seen in most of the cases, contracture formation in muscles and dislocation in shoulder and elbow may prevent functional recovery \[[@ref7]\]. At this point, exercise program substantially contributes to the recovery of most of the patients.
However, there are no accurate data about the frequency, intensity, and time-planning of exercise programs. It is suggested that permanent disability may develop in some of the cases despite physiotherapy treatment \[[@ref7]\]. This situation has raised more questions about the place of exercise in OBPP. Some authors suggested that exercises did not have much effect on recovery \[[@ref4]\]. However, the other some have defended that intensive exercise program has a positive impact on recovery. However, they have still not clearly explained how this effect occurs \[[@ref10]\].
When we examine the processes in the recovery of OBPP, we will observe that not only peripheral reconstruction but also central and spinal cord plasticity play a significant role in OBPP recovery \[[@ref6], [@ref8], [@ref15]\]. It is hypothesized that physical exercises increase plasticity, especially, in the spinal cord and central area by inclining ependymal cell proliferation and thus ensure functional recovery \[[@ref11]-[@ref13], [@ref16]\]. Therefore, the representation of the body parts in the motor cortex can be altered after injury and during motor learning, and changes in the brain may be related to activity \[[@ref15]\]. Plasticity increases due to the increased sensory input after exercises \_ENREF_6(6). Cortical remodeling was shown to be increased after hand injuries through exercises. Hence, it was suggested that exercises are critical after peripheral nerve or central nervous system injuries \[[@ref6]\]. Thus, our study looked at the effects of two different exercise programs for the upper brachial plexus lesions.
This study proved that there was no significant recovery difference between the groups in terms of time and degree and showed that intensive exercises did not have an additional contribution on peripheral nerve injuries, which meant that the frequency of the exercises did not have a significant effect on recovery. No complications developed in the patients during their follow-ups. However, further studies may be planned with some biochemical parameters as well as cranial and spinal cord imaging so that the effects of exercises on the recovery of cases with OBPP, especially, on the development of plasticity could be determined more accurately. Besides, further studies could be made on the effects of exercises on recovery with different intensity and duration as well as different frequencies.
Clinical Messages {#sec2-4}
-----------------
Exercises positively affect recovery rate and results and prevent possible complications that may occur in cases with OBPP.Intensive exercises did not have an additional contribution on peripheral nerve injuries, which means that the frequency of the exercises that the patients have daily did not have a significant effect on recovery.
**Conflict of Interest:** The authors declare no conflict of interest.
**Financial Disclosure:** The authors declared that this study has received no financial support.
**Authorship Contributions:** Concept -- N.S.; Design -- N.S.; Supervision -- N.S., A.Y.K.; Materials -- N.S., A.Y.K.; Data collection &/or processing -- N.S., A.Y.K.; Analysis and/or interpretation -- N.S., A.Y.K.; Writing -- N.S., A.Y.K.; Critical review -- N.S., A.Y.K.
|
{
"pile_set_name": "PubMed Central"
}
|
Viruses are intracellular pathogens that are subject to intense selective pressures during their ongoing battles within the host. To propagate successfully, they must exploit numerous machineries of the infected cell. Thus, studies of their replicative cycles have yielded fundamental insights into eukaryotic biology. A prime example is the human immunodeficiency virus (HIV), which is a lentivirus that causes the acquired immunodeficiency syndrome (AIDS). Unlike simpler oncoviruses that rely exclusively on host cell machinery, lentiviruses code for additional accessory and regulatory proteins that act as molecular switches at different stages of viral entry and exit from the infected cell. Studying the actions of these viral proteins has yielded understanding of diverse cellular functions such as the innate immunity against retroviruses, control of transcriptional elongation, export of macromolecules from the nucleus to the cytoplasm, and intracellular trafficking of proteins (reviewed in \[[@pbio-0030076-b1]\]).
The transcriptional transactivator (Tat) is a key regulatory protein of HIV. It is expressed early after the virus integrates into the cell, and stimulates the elongation of RNA polymerase II (RNAPII). This type of transcriptional control had not been previously appreciated; thus, work on Tat established a new paradigm in the field of eukaryotic biology. Moreover, these findings impacted greatly studies of cotranscriptional processing of nascent mRNA. To understand these processes better, we need to start with the basics of transcriptional control.
RNAPII is the enzyme that transcribes protein-coding genes in eukaryotic cells. Elegant studies in vitro first suggested that the simple recruitment of RNAPII to transcription units was not sufficient for the copying of genes and cotranscriptional processing of their transcripts. Rather, distinct steps could be defined, which began with the assembly of the preinitiation complex (PIC), promoter clearance, pausing, and arrest, and ended with efficient elongation of transcription (reviewed in \[[@pbio-0030076-b2]\]). The central component of PIC is the general transcription factor (GTF) TFIID, which contains the TATAbox- binding protein (TBP) and 12 to 15 TBP-associated factors (TAFs). TFIID acts as a "landing pad" for other GTFs and RNAPII to nucleate PIC assembly. Moreover, TAFs serve as coactivators to a diverse set of activators. Both an ordered stepwise assembly and the recruitment of the 100-plus-subunit "holoenzyme" have been proposed to be critical for the positioning of RNAPII at start sites of transcription.
Next, the GTF TFIIH unwinds the DNA, opens the transcription bubble, and phosphorylates serines at position 5 in the C-terminal domain (CTD) of the RPB1 subunit of RNAPII (reviewed in \[[@pbio-0030076-b2]\]). This phosphorylation is critical for the recruitment of complexes that put a 7-methylguanylate cap on the 5′ end of nascent transcripts. After the transcription complex clears the promoter, the negative transcription elongation factor (N-TEF) is recruited to the RNAPIIa (reviewed in \[[@pbio-0030076-b3]\]). It consists minimally of 5,6- dichloro-1-β-D-ribofuranosylbenzimidazole riboside (DRB)- sensitivity-inducing factor (DSIF) \[[@pbio-0030076-b4]\] and negative elongation factor (NELF) \[[@pbio-0030076-b5]\]. They bind and arrest RNAPII distal to the promoter cooperatively. Such arrested transcription complexes have now been found on many inducible genes in Drosophila melanogaster (reviewed in \[[@pbio-0030076-b6]\]) and humans \[[@pbio-0030076-b7]\].
The transition to robust elongation depends on the positive transcription elongation factor b (P-TEFb) (reviewed in \[[@pbio-0030076-b3]\]). P-TEFb contains the cyclin-dependent kinase 9 (CDK9) and one of four possible C-type cyclins. When recruited to stalled transcription complexes, P-TEFb phosphorylates serines at position 2 in the CTD \[[@pbio-0030076-b8]\], the Spt5 subunit of DSIF \[[@pbio-0030076-b9]\], and the RD subunit of NELF \[[@pbio-0030076-b10]\]. These modifications result in heavily phosphorylated RNAPII (RNAPIIo), the recruitment of the Elongator, which contains splicing and polyadenylation machineries, and the conversions of DSIF and NELF into elongation factors. RNAPIIo now copies the gene and directs the cotranscriptional processing, i.e., splicing and polyadenylation, of primary transcripts. Upon successful polyA addition, the CTD phosphatase FCP1 dephosphorylates RNAPIIo. RNAPIIa dissociates from DNA, and the transcription cycle starts all over again (reviewed in \[[@pbio-0030076-b2]\]).
Tat is unique among transcriptional activators in eukaryotic cells in that it functions via RNA rather than DNA promoter elements ([Figure 1](#pbio-0030076-g001){ref-type="fig"}). It binds the transactivation response element (TAR) that forms a stable RNA stem loop at the 5′ end of all viral transcripts. Thus, Tat requires minimally the transcription of TAR before it can stimulate HIV transcription from the long terminal repeat (LTR). Indeed, in the absence of Tat, RNAPIIa clears the HIV LTR successfully but soon arrests, yielding predominantly short viral transcripts \[[@pbio-0030076-b11]\]. Tat binds the 5′ bulge in TAR via its arginine-rich motif from positions 49 to 57, where a central arginine (R52) is key for this interaction. However, this binding is not sufficient for Tat\'s function in vivo. Adjacent to the arginine-rich motif lie N-terminal core and cysteine-rich regions, which form the activation domain of the protein. This activation domain binds cyclin T1 (CycT1) from P-TEFb, whose partner is CDK9 \[[@pbio-0030076-b12]\]. As a consequence, P-TEFb and Tat bind TAR cooperatively. The final proof that P-TEFb is the cellular cofactor for Tat came from studies of HIV transcription in murine cells, where the introduction of the human CycT1 protein restores Tat function \[[@pbio-0030076-b12]\]. The same effect can be achieved by substituting just the tyrosine with the cysteine at position 261, such as are found in murine and human CycT1 proteins, respectively \[[@pbio-0030076-b13]\]. A paper in this issue of *PLoS Biology* suggests that Tat and P-TEFb can also recruit TAF-independent transcription complexes to the HIV LTR \[[@pbio-0030076-b14]\] ([Figure 1](#pbio-0030076-g001){ref-type="fig"}). Possibly, this assembly reflects interactions between CycT1 and the unphosphorylated CTD of RNAPIIa \[[@pbio-0030076-b15]\].
![Activation of HIV Transcription by Tat\
Activators (red circles) that bind the HIV LTR promoter (light-blue rectangle) assemble the PIC and recruit RNAPIIa to the start site of transcription. For simplicity, only RNAPIIa in the PIC is presented. The yellow sphere with two open circles, depicting serines at position 5 and 2 within the CTD (S5 and S2, respectively), represents the unphosphorylated CTD of RNAPIIa (white sphere). TFIIH, which performs DNA-helicase and CTD-kinase activities, melts the DNA and phosphorylates S5 (red circle in the CTD; P-S5), resulting in promoter clearance. RNAPIIa transcribes TAR (red hairpin) and is paused by the binding of N-TEF, DSIF, and NELF, which are presented as blue spheres. The RD subunit of NELF binds the bottom stem in TAR. P-TEFb (comprising the red \[CDK9\] and pink \[CycT1\] spheres), which binds TAR together with Tat (small red sphere), phosphorylates S2 (red circle in the CTD; P-S2) to form elongating RNAPIIo (large red sphere). It also phosphorylates Spt5 in DSIF and RD in NELF, which become elongation factors, with the latter dissociating from TAR. In addition, P-TEFb, possibly independent of its kinase activity, assembles PIC via recruitment of TBP and RNAPIIa (dotted arrow). The phosphorylated CTD in RNAPIIo now binds the Elongator, which contains splicing machinery and polyadenylation factors. The red sphere at the 5′ end of the HIV transcript (red line) represents its cap. Finally, p300 acetylates Tat (magenta circle) and dissociates it from TAR. Acetylated Tat binds P-CAF and transfers it to RNAPIIo, possibly facilitating chromatin remodeling. Collectively, efficient RNAPII elongation of viral transcription ensues.](pbio.0030076.g001){#pbio-0030076-g001}
The assembly and disassembly of the complex between PTEFb, Tat, and TAR is a regulated process in vivo. Whereas the phosphorylation of CDK9 strengthens this complex \[[@pbio-0030076-b16]\], the acetylation of the lysine at position 50 in Tat weakens it \[[@pbio-0030076-b17]\]. Upon this disruption, acetylated Tat is liberated from P-TEFb and recruits the p300/CREB-binding protein-- associated factor (P-CAF) to the elongating RNAPIIo, most likely facilitating chromatin remodeling. In this issue of PLoS Biology, Pagans et al. now demonstrate that acetylated Tat is deacetylated by SIRT1 \[[@pbio-0030076-b18]\] ([Figure 1](#pbio-0030076-g001){ref-type="fig"}). In this way, Tat can reassemble with P-TEFb on TAR.
Clearly, P-TEFb plays a key role in the control of transcriptional elongation. Although Tat was the first activator known that could recruit P-TEFb to initiating RNAPII, additional members of this group were soon identified. They include the androgen receptor, c-Myc, the class II transactivator (CIITA), myoblast determination protein (MyoD), and nuclear factor κ-B (NF-κB). The last one is of great interest as it explains how the HIV genome can be transcribed before the synthesis of Tat \[[@pbio-0030076-b19]\]. Cellular activation triggers the nuclear translocation of NF-κB, where it binds the HIV enhancer, leading to the stimulation of viral transcription. It is not surprising that proviral latency, in which low levels of transcription or only short HIV transcripts containing TAR are observed, would in large part reflect the absence of these activators. Indeed, in many of these latently infected cells, the induction of NF-κB or the addition of Tat leads to the reactivation of viral replication and spreading of the infection \[[@pbio-0030076-b20],[@pbio-0030076-b21]\].
Recently, important aspects of the regulation of P-TEFb have been revealed ([Figure 2](#pbio-0030076-g002){ref-type="fig"}). Of interest, P-TEFb exists in two complexes in cells \[[@pbio-0030076-b22],[@pbio-0030076-b23]\]. The larger measures approximately 500 kDa and contains the hexamethylene bisacetamide (HMBA)--induced protein 1 (HEXIM1) and 7SK small nuclear RNA (snRNA) in addition to P-TEFb \[[@pbio-0030076-b24],[@pbio-0030076-b25]\]. In this large complex, Cdk9 is enzymatically inactive. HEXIM1 was identified as the inducible gene following the exposure of vascular smooth muscle cells to a potent differentiating agent, HMBA \[[@pbio-0030076-b26]\]. 7SK snRNA is one of the most abundant snRNA species, whose function remained a mystery for over a decade. Of interest, targeting of P-TEFb by HEXIM1 and 7SK snRNA contributes significantly to the control of cell growth and differentiation. For example, growth signals liberate P-TEFb from the large complex in the course of cardiac hypertrophy in mice, a disease characterized by the enlargement of myocytes due to a global increase in mRNA synthesis \[[@pbio-0030076-b27]\]. Also, following stress, ultraviolet light, or the administration of actinomycin D and DRB to cells, the large complex is converted to the small complex to stimulate transcription \[[@pbio-0030076-b22],[@pbio-0030076-b23]\].
{#pbio-0030076-g002}
How central is P-TEFb to eukaryotic transcription? In Saccharomyces cerevisiae, there are two candidates for PTEFb, CTDK-1 and Bur1/2. CTDK1-negative but not Bur1/Bur2-negative yeasts still grow, albeit poorly and only on rich media (reviewed in \[[@pbio-0030076-b2]\]). In Caenorhabditis elegans, genetic inactivation of CDK9 or CycT1 and CycT2 resulted in the inhibition of all RNAPII transcription \[[@pbio-0030076-b8]\]. Moreover, in D. melanogaster, following heat shock, PTEFb is recruited upstream of activated promoters \[[@pbio-0030076-b28]\]. Although no murine knockouts of subunits of P-TEFb have been reported, DRB and flavopiridol, two ATP analogs that inhibit the kinase activity of CDK9, can inhibit nearly all transcription by RNAPII in human cells \[[@pbio-0030076-b29]\]. Indeed, as P-TEFb is a coactivator of potent activators that mediate effects of enhancers and can itself activate transcription when placed on sites distal to promoter elements \[[@pbio-0030076-b15]\], it might mediate many more signaling events than those of heat shock, ultraviolet light, stress, and hypertrophy. Conversely, the inhibition of P-TEFb could explain the mode of action of some transcriptional repressors. Indeed, the global transcriptional repressor PIE-1, the regulator of embryogenesis in C. elegans, binds the histidine-rich stretch in CycT1, thus decoying P-TEFb away from RNAPII and blocking the elongation of transcription \[[@pbio-0030076-b30]\].
These are exciting findings and suggest a plethora of future experiments, including the genetic inactivation of subunits of P-TEFb and isoforms of HEXIM1 in the mouse. Of special interest are questions as to where to place this mechanism of transcriptional regulation in the hierarchy of competing or complementary processes. What roles do different P-TEFb complexes play in the transcription of specific genes? How central will the regulation of P-TEFb be to cellular growth, proliferation, and differentiation, and what roles will it play in normal development and disease states? As to HIV, how can we use our knowledge of P-TEFb to slow down viral replication and/or to eliminate the state of proviral latency in the host? Obviously, we are only at the beginning of this journey, which promises to change radically our view of eukaryotic transcription.
MB is supported by a fellowship from the American Foundation for AIDS Research. This work was supported by a grant from the National Institutes of Health (RO1 AI49104).
**Citation:** Barboric M, Peterlin BM (2005) A new paradigm in eukaryotic biology: HIV Tat and the control of transcriptional elongation. PLoS Biol 3(2): e76.
Matjaz Barboric and B. Matija Peterlin are in the Departments of Medicine, Microbiology, and Immunology, Rosalind Russell Medical Research Center, University of California, San Francisco, California, United States of America.
AIDS
: acquired immunodeficiency syndrome
CDK9
: cyclindependent kinase 9
CIITA
: class II transactivator
CTD
: C-terminal domain
CycT1
: cyclin T1
DRB
: 5,6-dichloro-1-β-D-ribofuranosylbenzimidazole riboside
DSIF
: 5,6-dichloro-1-β-D-ribofuranosylbenzimidazole riboside-sensitivity-inducing factor
GTF
: general transcription factor
HEXIM1
: hexamethylene-bisacetamideinduced protein 1
HIV
: human immunodeficiency virus
HMBA
: hexamethylene bisacetamide
LTR
: long terminal repeat
NF-κB
: nuclear factor κ-B
N-TEF
: negative transcription elongation factor
P-CAF
: p300/CREB-binding protein--associated factor
PIC
: preinitiation complex
P-TEFb
: positive transcription elongation factor b
RNAPII
: RNA polymerase II
snRNA
: small nuclear RNA
TAF
: TATA-boxbinding protein--associated factors
TAR
: transactivation response element
Tat
: transcriptional transactivator
TBP
: TATA-box-binding protein
|
{
"pile_set_name": "PubMed Central"
}
|
Centrolene hesperia
Centrolene hesperia is a species of frog in the family Centrolenidae.
It is endemic to Peru.
Its natural habitats are subtropical or tropical moist montane forests and rivers.
It is threatened by habitat loss.
References
hesperia
Category:Amphibians of Peru
Category:Taxonomy articles created by Polbot
Category:Amphibians described in 1990
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Numa carta dirigida ao presidente da Câmara do Porto na quinta-feira, e hoje divulgada, o primeiro-ministro diz ser “o primeiro a lamentar não ter sido possível candidatar o Porto porque muito gostaria de também, por esta via, contribuir para reforçar a crescente internacionalização da cidade”.
A “conveniência da proximidade do Infarmed” é outro dos fatores apontados por António Costa como justificação para candidatar Lisboa, e não o Porto, a acolher a sede da EMA que deve abandonar Londres com a saída do Reino Unido da União Europeia.
O presidente da Câmara do Porto, o independente Rui Moreira, revelou na reunião camarária de 16 de maio ter escrito ao primeiro-ministro a “mostrar o interesse” em acolher a sede da EMA.
Na sessão do executivo de hoje, Rui Moreira adiantou ter recebido a resposta na segunda-feira.
Na missiva, o primeiro-ministro revela que o Governo estudou “a possibilidade de candidatar as cidades de Lisboa e Porto” à EMA, tendo duas razões conduzido “à opção por Lisboa”.
Costa cita na carta “a conveniência da proximidade do Infarmed, agência nacional do medicamento” e o facto de “ser fator de preferência a existência de Escola Europeia, que só Lisboa poderá vir a ter, beneficiando da sinergia da preexistência de outras agências europeias”.
De acordo com António Costa, estas outras agências instaladas em Lisboa permitiriam “alcançar o número mínimo de funcionários das instituições europeias necessárias para a instalação da Escola”.
A Câmara do Porto aprovou hoje por unanimidade criar um grupo de trabalho para candidatar a cidade a acolher a Agência Europeia do Medicamento (EMA), mas apenas desde que o Governo garanta “rever” a decisão de candidatar Lisboa.
A deliberação foi tomada na reunião camarária pública com base numa proposta do PS, à qual, após amplo debate, o presidente da Câmara, Rui Moreira, sugeriu acrescentar a ressalva de que o Porto preparará candidatar-se “no prazo máximo de 30 dias”, apenas “desde que seja garantido que o Governo pode ainda rever a decisão tomada” de indicar Lisboa para a sede da EMA, que deve abandonar Londres com a saída do Reino Unido da União Europeia.
Inicialmente, Rui Moreira recusou “fazer de Calimero” e votar a favor da proposta do PS, referindo uma carta que recebeu do primeiro-minitro na segunda-feira e na qual, segundo o autarca, “o grande argumento para candidatar Lisboa é uma Escola Europeia que não existe em Lisboa”.
“É este o centralismo que temos de combater”, lamentou o autarca.
No caso de Espanha, que está a candidatar Barcelona à EMA, Moreira notou que o país tem uma Escola Europeia em Alicante, localidade “que fica mais longe de Barcelona do que o Porto fica de Lisboa”.
Depois do debate, a versão final da proposta do PS, aprovada por unanimidade, prevê que, “desde que seja garantido que o Governo pode ainda rever a decisão tomada”, seja criado “um grupo de trabalho encarregado de, no prazo máximo de 30 dias, elaborar um dossiê de candidatura do Porto ao acolhimento da sede da EMA, convidando para tal diversas entidades”.
A autarquia deliberou ainda mandatar o presidente da câmara “para estabelecer o diálogo adequado sobre este assunto no seio da Área Metropolitana do Porto, garantindo o envolvimento desta no processo”.
O vereador socialista Manuel Pizarro insistiu na necessidade de o Porto não se resignar, manifestando a “profunda convicção de que uma candidatura da cidade, se for bem participada e argumentada, pode inverter” a decisão do Governo.
“Não proponho um levantamento popular ou uma guerrilha política, mas um consenso multipartidário para a elaboração de uma candidatura bem sustentada”, frisou o vereador do PS, que recentemente se assumiu como candidato socialista à Câmara do Porto, rompendo com a coligação pós-eleitoral que tinha com o independente.
“E cá estarei para assumir as minhas responsabilidades como dirigente do PS [Pizarro é presidente da Federação Distrital do PS/Porto] e falar bem alto em nome da cidade”, assegurou.
Ricardo Valente, vereador da Economia, criticou a proposta “inócua e inconsequente” do PS, por representar o “papel triste de estar a mendigar”.
Ricardo Almeida, também do PSD, manifestou-se a favor da versão inicial da proposta do PS, mas lembrou que “há dois meses, o candidato social-democrata à Câmara do Porto, Álvaro Almeida”, falou sobre este assunto e foi “o silêncio absoluto”.
Também Pedro Carvalho, da CDU, considerou que a Câmara do Porto devia ter tomado uma posição mais cedo.
O Conselho de Ministros aprovou a 28 de abril a candidatura de Portugal a sede da Agência Europeia do Medicamento, e a resolução publicada a 05 de junho em Diário da República indica que o objetivo do Governo é instalar a EMA “na cidade de Lisboa”.
A Câmara do Porto pediu na quinta-feira ao Governo que divulgue publicamente e forneça os estudos que levaram à decisão de apenas candidatar Lisboa para instalar em Portugal a EMA, excluindo aquela cidade.
(Notícia atualizada às 13h36)
|
{
"pile_set_name": "OpenWebText2"
}
|
Commercial Real Estate for Lease in Victoria BC
Opening a new business or expanding on Vancouver Island? Hansbraun has a variety of commercial space for lease in Victoria, BC.
Whether you're looking for office space or a retail store, Hansbraun manages shopping centres and office parks with great access to major roads, bus routes and communities around the Greater Victoria area.
Why Choose Hansbraun Commercial Real Estate
Tenants are part of our family and we work hard to develop positive relationships with them, as well as the neighbourhoods we serve. We encourage local business and strive to be good members of our communities through encouraging bicycle commuting to our shopping centres, developing extensive recycling programs and making our properties greener.
Click the images below or visit our leasing opportunities page for all our commercial real estate currently available for lease in Victoria, BC.
|
{
"pile_set_name": "Pile-CC"
}
|
Doc's Place - Gateway Home to Entire Paso Robles Wine Region off Hwy 46 West
Visit Doc's Place and discover long time Paso Robles. Rural feel in very close to town setting with acreage and views. Minutes from wineries, downtown Paso Robles, restaurants, and shopping. Enjoy sunrises and sunsets, beautiful finishing details, privacy.Doc's Place has been in the family for generations and now they want to share the special ambiance with you. This 3BR/1.5BA home is in the perfect location--rural feeling with acreage and just minutes to town. Enjoy views from both the front and back patios, as well as back patio gas fire pit. Secluded and private, yet so close to shopping and wineries. Two minutes to Peachy Canyon Winery, Veris, Zenaida, Summerwood, and Castoro. Like having your own country home with all the amenities of town. Large bedrooms, hardwood floors, large fully stocked family kitchen, TV in master bedroom and living room. Off-street parking available in driveway. **Garage is not available to guests.
|
{
"pile_set_name": "Pile-CC"
}
|
No Time Like Present To Prepare For Sydney
October 02, 1999|By LORI RILEY; Courant Staff Writer
Nell Fortner was sad to see the ABL fold last winter. But its demise made her job as U.S. Olympic women's basketball coach that much easier.
``We would have had to work with the WNBA players during the ABL season and the ABL players during the WNBA season and then mesh them all together in August,'' Fortner said. ``I don't know how that would have worked.''
As it is, Fortner will not see her team together in the three months before the 2000 Olympics in Australia. The summertime WNBA season precludes that. Some players will end their seasons earlier than others, but the team will likely not be together until two weeks before the Olympics begin in mid-September.
``I might have to go hang out in the Bahamas,'' she said, laughing. ``I'll just be sitting around next summer getting nervous.''
Now is her time to prepare. The U.S. team will play the WNBA Select Stars in the Buick Regal Hall of Fame Enshrinement game tonight at 7 at the Civic Center. Then the team ----will embark on a 12- game college tour before heading to Europe for international play.
In April 1997, USA Basketball named Fortner, an up-and-coming coach at Purdue, as the first full-time women's national team coach. Unlike former Olympic coach Tara VanDerveer, who took a one-year leave from Stanford to coach the 1996 gold medal team, Fortner, 40, left Purdue to guide the national team for four years through the 2000 Olympics.
It was a new concept in the U.S., although teams from other countries have had national programs with full-time coaches for years.
``The idea was to build a core group of players and to have this group be consistent and play together time and time again, which we've done,'' Fortner said. ``I know them very well. They know me very well. They know what to expect in a practice. The consistency is what we need--.''
Prior to VanDerveer, coaches rotated through the national team system. Sometimes, a different person would coach different teams from summer to summer. ``Tara coached the '94 world championship team, then somebody else coached the '95 Pan American team,'' Fortner said.
After winning gold medals in 1984 and '88, the U.S. finished third in 1992, winning a bronze under then-Rutgers coach Theresa Grentz. After that, the system began to change.
VanDerveer's team barnstormed the United States and overseas, going 60-0 on its way to the gold. Fortner was there, too, as an assistant, watching everything.
The next year, she took over. Her style is very different from VanDerveer's serious persona.
``She's very positive, upbeat, outgoing,'' said 1996 Olympic team point guard Dawn Staley, who will be on the 2000 team.``You need to be that way. It's a breath of fresh air to have someone coach like this, at this level, because a lot of coaches are really intense and really want things done a certain way -- and now it's the same way, but different. There's so much positivity.''
Fortner said she loves her job, despite the constant travel. She makes her home in Colorado Springs.
``United [Airlines] loves me,'' she said. ``Oh, man. I can walk up to the counter and they punch my name in and all of a sudden, their whole attitude changes, `Oh yes, Ms. Fortner. . . . ' ''
In 1998, she went to Australia, Germany (for the World Championships), Taiwan (with the collegiate Jones Cup team) and went on a European tour with this national team over the winter.
Fortner also traveled extensively this summer, watching her charges in WNBA games. Speaking engagements also took much of her time.
She misses coaching full-time. So after the Olympics, in 2001, Fortner will coach the WNBA's team in Indiana that begins play next summer.
But Sydney looms first.
``It's going to be a real challenge,'' Fortner said. ``We're playing on a gold medal contender's home court. But I think we've got the right players. We've got good youth, good experience. We're excited.''
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Is it unethical to ask someone you know to review your posts?
Is it wrong if (hypothetically) person A asks person B to look at some of person A's best answers, hoping that person B will notice their quality and upvote them.
A:
It's not wrong to ask for review or guidance per se. For example, when I started out here, I didn't know much about OS X or Unix, and by the time, I learned more and more. I would have loved for knowledgeable users to review my answers and give constructive criticism.
However, that is not equal to asking for upvotes. It doesn't work anyway. Note that the system regularly checks voting behavior. Serial upvotes (that are due to person A upvoting person B's post in a short amount of time) can be removed by the system when it does its checks on a daily basis.
No matter what you do:
Don't pester people into checking out your latest answers. If they happen to see them, they will.
Don't expect them to mass-upvote you. If they think your posts are good, you will get upvotes.
Even if they do, don't expect these votes to last. This system was never meant to be a 1:1 "social network" type of thing. Votes should be cast by anybody.
After all, it's about maintaining good quality, so when you want people to "review" your posts, always strive for:
getting good critique
having your posts edited for quality
and not just getting upvotes
If you have any particular requests and want feedback on some posts of yours, I'd post them in our chatroom.
|
{
"pile_set_name": "StackExchange"
}
|
Answer: The files provided here are not
intended for any specific game.A
majority of “goodies” are for the gamer that is using a board/dice baseball game
and wants to replay a season.Thus,
Opening Day Rosters, Transactions, Multi-Team Players, As-Played Lineup
Files, Batters Faced Ratings, etc., are very helpful in that regard.However, if someone wants more information
around using players realistically, then you can also use Suggested Lineups,
Most Common Lineups, Inning
Numbers when pitchers typically pitched, Pinch-running and Pinch-hitting,
etc.
For the Ballstat/Ballscore program to keep track of stats, there are
specific formatted lineup files available.If you want to develop your own spreadsheet (or use Auto-Scoresheet) to print off as-played scoresheets
and then keep score by hand, you can use the Enhanced Lineup Files.
Most the goodies come from 3 main sources
of data.Retrosheet.org, Sean Lahman’s database and ATMgr for
BBW.The people that work on these
data sources deserve a huge THANK YOU!
There are a number of great baseball games out there,
in board/dice and/or PC.
NOTICES
Recipients of Retrosheet
data are free to make any desired use of the information, including (but not
limited to) selling it, giving it away, or producing a commercial product
based upon the data.Retrosheet has one requirement for any such transfer of
data or product development, which is that the following statement must
appear prominently:
The
information used here was obtained free of charge from and is copyrighted by Retrosheet.Interested parties may contact Retrosheet at
"www.retrosheet.org".
Retrosheet makes no guarantees of accuracy for the
information that is supplied. Much effort is expended to make our website as
correct as possible, but Retrosheet shall not be
held responsible for any consequences arising from the use the material
presented here. All information is subject to corrections as additional data
are received. We are grateful to anyone who discovers discrepancies and we
appreciate learning of the details.
|
{
"pile_set_name": "Pile-CC"
}
|
Bowed psaltery
The bowed psaltery is a type of psaltery or zither that is played with a bow. In contrast with the centuries-old plucked psaltery, the bowed psaltery appears to be a 20th-century invention.
History
Violin Zither
In 1925 a German patent was issued to the Clemens Neuber Company for a bowed psaltery which also included a set of strings arranged in chords, so that one could play the melody on the bowed psaltery strings, and strum accompaniment with the other hand. These are usually called "violin zithers".
Ukelin-type Instruments
Similar instruments were being produced by American companies of the same time period, often with Hawaiian-inspired names, such as Hawaiian Art Violin or Violin-Uke, and marketed for use in playing the Hawaiian music, which was popular in the United States in the 1920s. These instruments are not typically referred to as psalteries, but by the various trade names they were sold under, such as Ukelin.
The conventional bowed psaltery
Today, the bowed psaltery is most often produced without chord accompaniment strings (though some modern players retune the chromatic side to produce chords, and play it in the manner of the violin zither).
After the Second World War, Walter Mittman, a primary school teacher in Westphalia, popularized the conventional triangular bowed psaltery, which had earlier been advocated for use in education by the German Edgar Stahmer (1911-1996).
Description
The conventional bowed psaltery is triangular in shape, allowing each string to extend a little farther than the one before it, so that each can be individually bowed. Chromatic bowed psalteries have the sharps and flats on one side and the diatonic notes on the opposite.
It is a psaltery in the traditional sense of a wooden soundbox with unstopped strings over the soundboard. It significantly differs from the Medieval plucked psaltery only in that its strings are arranged to permit bowing. The soundboard has a soundhole or rose in the center. In the United States, it is normally played with a small bow, often made in the earlier semicircular style, whereas in Europe a reduced-size modern violin bow is used.
Method of playing
Performance styles vary, but the instrument may be played either one note at a time, with the instrument held with one hand and bowed with the other, as in instruments of the violin family, or it may be laid down and played with a bow in each hand, in a style reminiscent of the closely related hammered dulcimer. Some players will also hold two bows in one hand to facilitate double-stopping.
Besides bowing, the instrument may also be strummed or struck for additional tone colors. The strings are often too closely spaced for conventional finger picking, but may be plucked at the bowing end.
See also
Alexander violin
External links
Video "Introduction to the Bowed Psaltery" by James Jones
Psaltery Strings Online community of bowed psaltery players featuring photos, videos, listings and discussion forums.
Build A Bowed Psaltery - online construction plans.
A Psimple Psaltery Building a bowed psaltery from start to finish.
Fretless Zithers: Bowed Instruments Online collection of early to mid-20th-century American bowed psaltery variants.
Ukelin.com a site covering early 20th-century American bowed psalteries
Ringing Strings Bowed Psalteries Basic Instruction on how to play the bowed psaltery with video examples.
free plans for a Diatonic Bowed Psaltery Online plans.
Learn to play Learn to play.
Category:Bowed instruments
Category:Composite chordophones
Category:Bowed box zithers
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Case Investigation and Forensic Evidence for a New Plant Disease: The Case of Lettuce Corky Root.
The process of disease diagnosis reminds of the process of solving a crime. This starts with a so-called 'crime scene investigation' (CSI) carried out in a highly systematic manner. The CSI is followed by 'forensic investigation' in specialized laboratories. The final step in solving a crime is the 'crime scene reconstruction' process, which involves systematic elimination of unlikely scenarios and comparison of results from the analysis of physical evidence with eye witness accounts. If more evidence becomes available, an 'old case may be reactivated'. In this review, the same sequence of activities is followed to solve a plant disease problem using a case study of a disease that was difficult to diagnose, namely the 'case' of corky root of lettuce.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Srinagar:: Inspector General of Police Kashmir range Vijay Kumar Friday said that results of DNA samples of parents of three youth from Rajouri district have matched with those killed in Amshipora, Shopian on July 18 this year and police will now take further course of action.“We have received the DNA sample results of three families of Rajouri and they have matched with those killed in Amshipora, Shopian. We will now take further course of action and complete remaining formalities,” Kumar told media men at police control room (PCR) Srinagar.Police had collected six DNA samples from the parents of three slain youth killed in Amshipora, Shopian on July 18. A police team from Kashmir had visited Rajouri and collected DNA samples of parents of three youth. It is after a gap of 40 days, that the DNA samples matched between the families and the slain youth.On September 18, in a brief...
|
{
"pile_set_name": "OpenWebText2"
}
|
Credit: MH Stock/Shutterstock
As we endure the current COVID-19 crisis with its important measures of social isolation and distancing, those of us in the northern hemisphere can perhaps take some solace in seeing the arrival of spring.
As a biologist, I find one of the highlights of the year is seeing and hearing the natural world come alive again, with animals getting up close and personal for both breeding and aggressively defending territories. No social distancing for them.
Particularly captivating is the behaviour of newborn animals, a key aspect being their play behaviour. However, much remains unknown about the role of play in animals, and the reason it evolved has long been debated by people who study animal behaviour.
For example, it has been suggested that play fighting in early life prepares animals for later life aggression. This seems inherently intuitive but, while juvenile play fighting is often structurally compared to adult aggression, this link remains to be fully tested by scientists.
Recent research by my colleagues and me shows that play fighting when young can prepare animals for contests when they are older, suggesting play should be considered an important part of animal welfare. But we also found that wasn't always the case.
As someone who studies aggression and contest behaviour, I was keen to study this issue. Luckily for me, as part of a wider animal welfare project in pigs, we had the opportunity to explore it in detail, as newborn piglets engage in lots of play behaviour.
The joy of spring. Credit: MM.Wildlifephotos/Shutterstock
Our research provides evidence of an association between the amount that piglets play fight and their success in contests in later life, depending on the animal's sex. We found females tended to play fight less as piglets overall, but the female winners of adult contests had engaged in more play fighting in early life than losers. But in males it was the other way around, which contrasted with our initial predictions.
We think this may be related to sex differences in the pigs' social behaviour as adults. Under free-ranging conditions, female wild boar live in groups with a hierarchy enforced using aggression that is structurally similar to early life play fighting.
In contrast, male wild boar are more solitary and will engage in escalated contests with other males for access to breeding females. These contests can be very damaging, involving the use of their sharp tusks. So there is a difference between male play fighting and the aggressive behaviours performed in later life.
Alternative benefits
However, given that social play hasn't disappeared in male pigs as they have evolved, and the fact that overall it occurs at higher levels than in females, this indicates that males gain important alternative benefits from the performance of this behaviour. These include muscle development, coordination and cognition, as well as gaining experience in responding to unexpected situations.
Play fighting experience also influenced the ability of our pigs to gather and use information, known as "assessment strategy", in later life contests. Pigs that had gained high levels of early life play fighting had better knowledge of their own fighting ability, termed "self-assessment", in later life contests. In this way, the play experienced in early life had shaped their cognitive ability in later life.
Damaging contests. Credit: PhotocechCZ/Shutterstock
Put together, these results highlight the potential impact of juvenile play on adult social behaviour and suggest more focus should be given to early life predictors of aggression, a concept which is also important in human research.
Research in other animal species has been contradictory, with a study in meerkats finding that play fighting experience did not affect subsequent fighting success. But our pig findings still have wider application across the animal kingdom, given the importance of social play in diverse species. And our results support the prediction that social play has evolved for the development of social competence in later life, although much remains to be explored on this aspect.
These findings also have important implications for animal welfare. For example, current welfare policy highlights the importance of not just avoiding situations that have a negative effect on animals but also of providing them with positive experiences and a life worth living.
Play is likely to at least partly fulfil these criteria as it tends to be seen when animals' other needs are met, and is likely to be experienced as a positive emotion. So developing animal management environments and practices that promote play for farm and other captive species is important for their welfare.
With the advent of a pandemic virus thought to have originated from a wild animal kept for live trade, we are seeing more than ever why animal welfare matters. Indeed, animal scientists have coined the term "one welfare" to refer to the idea that human, animal and environmental welfare are all integrated. And during the current lockdown, I think we can all appreciate the importance of play.
Explore further Finding signs of happiness in chickens could help us understand their lives in captivity
This article is republished from The Conversation under a Creative Commons license. Read the original article.
|
{
"pile_set_name": "OpenWebText2"
}
|
True associations between resting fMRI time series based on innovations.
We calculated voxel-by-voxel pairwise crosscorrelations between prewhitened resting-state BOLD fMRI time series recorded from 60 cortical areas (30 per hemisphere) in 18 human subjects (nine women and nine men). Altogether, more than a billion-and-a-quarter pairs of BOLD time series were analyzed. For each pair, a crosscorrelogram was computed by calculating 21 crosscorrelations, namely at zero lag ± 10 lags of 2 s duration each. For each crosscorrelogram, in turn, the crosscorrelation with the highest absolute value was found and its sign, value, and lag were retained for further analysis. In addition, the crosscorrelations at zero lag (irrespective of the location of the peak) were also analyzed as a special case. Based on known varying density of anatomical connectivity, we distinguished four general brain groups for which we derived summary statistics of crosscorrelations between voxels within an area (group I), between voxels of paired homotopic areas across the two hemispheres (group II), between voxels of an area and all other voxels in the same (ipsilateral) hemisphere (group III), and voxels of an area and all voxels in the opposite (contralateral) hemisphere (except those in the homotopic area) (group IV). We found the following. (a) Most of the crosscorrelogram peaks occurred at zero lag, followed by ± 1 lag; (b) over all groups, positive crosscorrelations were much more frequent than negative ones; (c) average crosscorrelation was highest for group I, and decreased progressively for groups II-IV; (d) the ratio of positive over negative crosscorrelations was highest for group I and progressively smaller for groups II-IV; (e) the highest proportion of positive crosscorrelations (with respect to all positive ones) was observed at zero lag; and (f) the highest proportion of negative crosscorrelations (with respect to all negative ones) was observed at lag = 2. These findings reveal a systematic pattern of crosscorrelations with respect to their sign, magnitude, lag and brain group, as defined above. Given that these groups were defined along a qualitative gradient of known overall anatomical connectivity, our results suggest that functional interactions between two voxels may simply reflect the density of such anatomical connectivity between the areas to which the voxels belong.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
When it’s time for tip-off, you’re always ready to watch your Denver Nuggets fight for a victory on the court. Stock up on the latest and greatest Nuggets gear to help you stand out during your next trip to the Pepsi Center when you shop Lids’ selection of jerseys, apparel, hats and more! Emulate your favorite players on the current roster with Nikola Jokic, Jamal Murray and Paul Millsap jerseys and t-shirts for men, women and youth fans. If you’re feeling nostalgic, Lids has the best assortment of retro Denver Nuggets gear, including Dikembe Mutombo Hardwood Classics jerseys and Carmelo Anthony apparel. Fans looking to up their own hoops skills can scoop up Denver Nuggets Nike City Edition Jerseys to give them the look and feel of the pros.
Nuggets Hats
Whether you’re new to the fandom, or have been a member of Nuggets nation for years, Lids has just the right headwear to top off your ensemble. Here you’ll find adjustable, fitted and knit hats in a variety of styles to match your game day tee or jersey just right. You can show your devotion in a subtle way with Denver Nuggets accessories, like keychains, phone cases and tumblers, or pick up personalized Nuggets gifts for a fellow fan. Don’t forget to show you fan cave some love as well. Lids has an impressive selection of authentic Nuggets memorabilia, including autographed player photos and game-used basketballs.
|
{
"pile_set_name": "OpenWebText2"
}
|
With Firefox 22 now in beta Mozilla has decided not to enable its new third-party cookie-blocking feature by default. The feature, aimed at preventing cross-site tracking of browser users with cookies not originating from the sites users visit, will still be available in the next Firefox release (due in June) but will be turned off by default.
Cookies are small sets of data stored locally by the web browser, originally intended to help keep track of where a user was (his or her “state”) within a web application. They’re associated with a particular domain name and carry a set of values such as an application name, a unique identifying number or string for the user or the web session, and an expiration date. While most cookies are increasingly short-lived some can be essentially “immortal” (or last at least until a user purges them) with expiration dates far off in the future. Web sites can also query cookie data from a visiting web browser to gather analytical information about the user as well—and to target specific ads based on identity or web visit history data revealed by them.
Precision strike
In a blog post Mozilla Chief Technology Officer Brendan Eich explained the reasons for the delay in turning on the feature (a patch submitted by Stanford computer science graduate student Jonathan Meyer) by default. He said there were still issues to be resolved in how the feature avoided both “false positives," such as blocking cookies from the companies behind sites visited by the user because they were associated with a different domain name. There’s also still an issue with “false negatives”—unwanted cookies that users pick up from sites they’ve visited that then follow them to other sites.
“Just because you visit a site once does not mean you are ok with it tracking you all over the Internet on unrelated sites, forever more,” Eich wrote. “Suppose you click on an ad by accident, for example. Or a site you trust directly starts setting third-party cookies [such as those used by advertisers, delivered via JavaScript embedded in display ad code] you do not want. Our challenge is to find a way to address these sorts of cases.”
Thinking outside the browser
There are some significant changes in the internals of Firefox 22, some of which will drive whole new classes of web applications. One of those changes is full support for WebRTC, a real-time communications framework that allows JavaScript applications to communicate peer-to-peer, supporting anything from chat to video conferencing to multiplayer games. There's also an implementation of the Web Notifications API which allows in-browser applications to send desktop and mobile device notifications to the user's screen.
But perhaps more significant is the arrival of support Asm.js, an optimized subset of JavaScript for boosting the performance of generated JavaScript code, arriving in the new OdinMonkey just-in-time JavaScript compiler. (Ars Technica's Peter Bright is pulling together an in-depth analysis of Asm.js.) Mozilla is planning on using Asm.js in both its desktop and mobile browsers, and in the Firefox OS, to allow for what has been hyped as near-compiled performance for large applications including JavaScript apps generated from C and C++ code.
|
{
"pile_set_name": "OpenWebText2"
}
|
Apparently watching ABC mix up red state Bible bumpers and blue state body piercers wasn’t entertaining enough for America. Celebrity Wife Swap takes it up a notch, pairing outlandishly inappropriate celebrities against suffering wives. Our favorite? Professional scary uncle figure Gary Busey and definitely “not” gay disgraced pastor Ted Haggard. You know… the one who did meth with a manhooker in a massage parlor.
Over all, the show is a lot less exciting than what we’d expect from something called Wife Swap. Rather than watching it on TV, we’re looking to get into the real thing. But before that, we’re going to need to know what’s expected of us.
Become a Republican
A plurality of swingers are Republican and conservative. It’s not terribly surprising. Swinging has often been the prerogative of middle-class suburbanites. Compare this to the debauchery taking place in a sex or fetish club on a typical Saturday night in a major city. The whole notion of “swinging” has an inherently conservative bent to it. You aren’t going out and scoring gash from strangers. You’re calling Chad and Cindy next door, having them over for a bit of wine and cheese, and then screwing in each other’s presence.
Leave the Rubbers at Home
Dutch researchers recently cautioned swingers to wrap their meat before they pack it. Condom use isn’t exactly encouraged in the wife swapping community. In fact, it’s quite roundly discouraged among the suburban swinging set. Forget about putting on a condom to get head. That’s virtually unheard of. This all might sound pretty awesome, but after your wife or girlfriend has been balled by five different guys in a night, the one nut you busted in your buddy’s girl isn’t going to seem as awesome.
Swinging Is Threesome Central
Like most guys, swingers tend to be a little creeped out by bisexual men. And, like most people living in the 21st Century, swingers tend to be into some friendly girl-on-girl action. The upside of this is that it’s basically expected for women to engage in lesbionics in the swinging community. One of the trade offs of having your special lady friend be a party favor is that you can get a little quality time with a couple party favors at once. Best of all, one of them doesn’t even have to be your lady.
Swinging Couples Swing Together
While you two might (and probably will) break up at some point to pursue individual extra-curricular activity, it’s not encouraged to leave a man alone at a swinger party.
What to Wear
You’ve got outfits for the office, the beach, the gym, hiking, ballgames and every other situation you can think of. What you don’t have is a good swinging outfit. Don’t wait until the last minute and pace around your bedroom looking for the right outfit. Prepare yourself in advance. You’re going to want to wear casual, respectable Republican clothing to the swinger’s do. Once you get there, feel free to change into a bathrobe, sweatpants or something a little more comfortable. Like your old man on a Saturday afternoon, skip the boxer briefs and let Big Jim and the twins hang loose. Leave all your valuables and cash at home. If they get stolen your life sucks and your host is embarrassed.
Keep It Clean
While the sex might be dirty, you should be clean. Don’t forget to give your nether regions a good soaping, as well as the tits and pits. Wear deodorant, brush your teeth and put on clean drawers and socks. Maybe ru a scraping device in your crack. It might be a swinger party, but that doesn’t mean the women there are desperate. Quite the opposite. Despite the good ratio at such events, women are still prized commodities.
Yes Means Yes, No Means No
Don’t play around. If you’re approached by a snaggle-toothed hag you wouldn’t screw with someone else’s member, don’t tell her “maybe later” unless you actually mean “when I’m drunk enough.” On the other hand, accept a “no” gracefully, even when it isn’t explicit. If you’re hanging out at swinger parties you should be mature enough to know when a woman’s “maybe” actually means “leave me alone you Burt Reynolds-mustached, medallion-wearing creep.” If a woman gives you an explicit or implicit no, take it gracefully and walk away. There’s plenty of others hanging around.
Bedroom Etiquette
If you’re trying to get down in private, don’t go to the group room. Similarly, don’t lurk around different bedrooms trying to get a peek at something without engaging. When you want to make off with someone else’s lady, you need to talk to him first. Don’t wait for him to run off with another woman to make your move.
Keep It Positive
When you like the party, say so. If it’s not your thing, just leave. No one wants a Debbie Downer around talking about how everything sucks. This is doubly true at a swinger party.
|
{
"pile_set_name": "Pile-CC"
}
|
Variable valve activation (VVA) mechanisms for internal combustion engines are well known. It is known to lower the lift, or even to provide no lift at all, of one or more valves of a multiple-cylinder engine, during periods of light engine load. Such valve deactivation or valve lift switching can substantially improve fuel efficiency.
A Roller Finger Follower (RFF), as a type of rocker arm, acts between a rotating eccentric camshaft lobe and a pivot point on the engine, such as a Hydraulic Lash Adjuster (HLA), to open and close an engine valve. Switchable RFFs may be a “deactivation” type or a “two-step” type. The term switchable deactivation RFF, as used herein, means the switchable RFF is capable of switching from a valve lift mode to a no lift mode. The term switchable two-step RFF, as used herein, means the switchable RFF is capable of switching from a first valve lift mode to a second and lesser valve lift mode that is greater than no lift. When the term “switchable RFF” is used herein, by itself, it includes both types.
A typical switchable RFF includes an outer arm and an inner arm. The inner arm is movably connected to the outer arm. It can be switched by a locking member, from a coupled mode wherein the inner arm is immobilized relative to the outer arm, to a decoupled state wherein the inner arm can move relative to the outer arm. Typically, the outer arm of the switchable RFF is pivotally supported at a first end by the HLA. A second end of the outer arm operates against an associated engine valve for opening and closing the valve by the rotation of an associated eccentric cam lobe acting on an inner arm contact surface which may be a roller. The inner arm is connected to the outer arm for pivotal movement about the outer arm's second end with the contact surface of the inner arm disposed between the first and second ends of the outer arm. Typically, the locking member includes a locking pin disposed in a bore in the first end of the outer arm, the locking pin being selectively moved to engage the inner arm to thereby couple the inner arm to the outer arm when engaged, and decouple the inner arm from the outer arm when disengaged.
In a switchable two-step RFF, the outer arm typically supports a pair of rollers carried by a shaft. The rollers are positioned to be engaged by associated low-lift eccentric cam lobes that cause the outer arm to pivot about the HLA, thereby actuating an associated engine valve to a low-lift. The inner arm, in turn, is positioned to engage an associated high-lift eccentric cam lobe sandwiched between the aforementioned low-lift lobes. The switchable two-step RFF is then selectively switched between a coupled and a decoupled mode by the locking member. In the coupled mode, with the inner arm locked to the outer arm, the rotational movement of the central high-lift lobe is transferred from the inner arm, through the outer arm to cause pivotal movement of the RFF about the HLA, which, in turn, opens the associated valve to a high-lift. In the decoupled mode, the inner arm is no longer locked to the outer arm and is permitted to move relative to the outer arm against a lost motion spring that biases the inner arm away from the outer arm. In turn, the rollers of the outer arm engage their associated low-lift lobes. The rotational movement of the low-lift lobes is transferred directly through the outer arm, and the associated valve is reciprocated by the outer arm to a low-lift.
A switchable deactivation RFF typically includes an outer arm and an inner arm. The inner arm supports a roller carried by a shaft. The roller is engaged by an eccentric lifting cam lobe for actuating an associated engine valve. Like the switchable two-step RFF, the switchable deactivation RFF is selectively switched between a coupled and a decoupled mode by a movable locking member. In the coupled mode the inner arm of the switchable deactivation RFF is locked to the outer arm and the rotational movement of the associated lifting cam lobe is transferred from the inner arm, through the outer arm to cause pivotal movement of the RFF about the HLA, which, in turn, opens the associated valve to a prescribed lift. In the decoupled mode, the inner arm becomes unlocked from the outer arm and is permitted to pivot relative to the outer arm against a lost motion spring. In the decoupled mode, the rotational movement of the lifting cam lobe is absorbed by the inner arm in lost motion and is not transferred to the outer arm. Thus, the associated valve remains closed when the switchable deactivation RFF is in its decoupled mode.
In a first switchable deactivation RFF design, the inner arm makes contact with an associated cam lobe while the outer arm does not. The lost motion spring biases the inner arm away from the outer arm and, with the outer arm supported by the HLA, serves to load the inner arm against its associated cam lobe in the decoupled mode. In a switchable deactivation RFF having a lost motion spring with an effective force exerted on the HLA that is higher than the opposing force of an associated HLA spring, the opposing forces must be properly managed to prevent reactive pump-down of the HLA induced by the force of the lost motion spring. For this purpose, an expansion travel limiter is incorporated in the switchable deactivation RFF to limit the movement of the inner arm relative to the outer arm. Thus, when the switchable deactivation RFF is in its decoupled mode, and the inner arm of the RFF follows the cam lobe, the lost motion spring will push the outer arm until the expansion travel limiter is engaged. At that point, further movement of the outer arm relative to the inner arm ceases, HLA pump-down is prevented and HLA leak-down recovery is initiated. Moreover, at that point, since the effective preload force of the lost motion spring is greater than the expansion force of the HLA, pump-up of the HLA is prevented. Note also that, when the inner arm of the RFF follows the base circle of the associated cam lobe, the expansion travel limiter further serves to set a clearance gap or mechanical lash between the locking pin and the inner arm to assure proper alignment of the locking pin with the inner arm when the RFF switches between its decoupled and coupled modes and to define the total mechanical lash in the valve train.
In an alternate switchable deactivation RFF design, in order to increase its resistance to HLA pump-up beyond that provided by the installed load of the lost motion spring, null pads may be added on the outer arm of the switchable deactivation HLA for contacting zero-lift, constant radius null lobes disposed on either side of the associated lifting lobe. In this design, when the inner arm contacts the expansion travel limiter, the inner arm of the RFF is prevented from contacting the base circle of its associated cam lobe by the null pads first contacting with the zero-lift null lobes. Since the inner arm is held away from the base circle of the cam by the expansion travel limiter, the force of the lost motion spring cannot pump-down the HLA. By the null pads making contact with the zero-lift null pads, pump-up of the HLA is prevented by the opposing installed load of the associated valve closing spring. The expansion travel limiter establishes the mechanical lash between the locking pin and the inner arm; as well as the clearance (lash) between the inner arm and the base circle of the cam. The pin lash plus the cam lash establishes the total mechanical lash of the valve train.
Various lost motion expansion limiters used in switchable RFFs are known in the art. For example, in U.S. Pat. No. 6,532,920, a switchable two-step RFF is shown wherein the roller shaft of the outer arm contacts a throughbore in the inner arm to limit inner arm travel. As shown in U.S. Pat. Nos. 5,544,626, 5,653,198 and 6,314,928, bumper pads or projections formed at the lower end of the inner arm are used to limit inner arm travel of the switchable RFFs. The disadvantage of these devices in the prior art is that the stop position cannot be precisely controlled resulting in sometimes too small or too large of a mechanical lash between the locking pin and the inner arm or, in the case of a switchable deactivation RFF with null pads, resulting in a clearance between the inner arm and base circle of the associated cam lobe that is too too small, or even non-existing. A mechanical lash that is too small may result in the locking pin being unable to reliably engage the inner arm. A lash that is too large may permit excess pump-down of the HLA thereby delaying the opening point, decreasing the lift and advancing the closing point of the associated valve in the coupled mode which is known to contribute to engine roughness at idle and/or emission problems. A cam clearance that is too small (in the case of a switchable deactivation RFF with null pads), between the inner arm and its base circle, increases total lash when the inner arm is allowed to contact the cam base circle and may similarly affect the opening, closing and lift characteristics of its associated valve.
What is needed in the art is a device that precisely limits the amount of upward pivotable movement of the inner arm relative to the outer arm caused by the force of the lost motion spring.
It is a principal object of the present invention to provide an inner arm stop to precisely position the inner arm relative to the outer arm thereby controlling mechanical lash and HLA pump-down.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Transportation images add real value to search results
Written by
Originally published
Besides demonstrating that an A380 is a lot bigger and probably more comfortable than a 737, there’s not a lot of consumer value in showing an image of the airplane in a search result. Most of us know what to expect when we fly; we’re familiar with the planes, and with the on-board experience. But that’s not the case when it comes to other forms of transportation.
At Rome2rio, we suspect many people choose to fly even when apparently better (lower cost, more comfortable, faster door-to-door) options are available. The same goes for train travelers and self-drivers, who might be reluctant to choose bus or rideshare, even in cases where those options offer real benefits over their usual choice.
Therein lies the reasoning behind Rome2rio’s new Transportation Images feature, which is being progressively rolled out. By displaying images of the various transport offerings within our search results, we expect our users will look at alternatives more closely, perhaps deciding that their bias towards air (or rail, or self-drive) might be a prejudice that deserves closer examination.
This example demonstrates how the Transportation Images feature is integrated into our search results:
This image of the fast-train operating from downtown Milan to downtown Rome will convince many travelers it’s a better option than flying.
In some cases, we expect that seeing an image of the vehicle will dispel a fear that it might be antiquated, slow, or somehow uncomfortable. Buses are a case in point: they simply don’t enjoy a great reputation for luxury. Images like these help reduce those concerns:
Modern buses compete with trains for luxury, and often beat them on price.
With ferries, there is often the fear of the unknown. How big is it? Is it safe? Will I need to wear a life jacket? When people see the ferries that operate on many routes nowadays, they express surprise… which is not surprising, given their space-age designs, which positively ooze speed and comfort.
That’s not to say that all ferries are ocean-going liners, or that travelers are always looking for that type of experience. Sometimes, it’s good to know your travel experience will be authentic, and somehow connected to the history and culture of the place you’re visiting.
In many destinations, travelers are searching for the slow option.
Finally, there are some forms of transportation that are so specialised and site-specific that only a photograph or video can deliver a useful explanation. Funiculars, suspension railways and maglev railways all fit this bill.
Wuppertal’s suspension railway, and Schilthorn’s funicular: now you know.
As we continue to roll-out this feature over the coming months, we’ll be loading tens of thousands of images for trains, buses, ferries and other forms of transportation. As a result, we expect to see our users make journey plans with greater confidence to try something new: something that’s probably less expensive, possibly “greener”, and perhaps a change from their old travel habits.
Join our newsletter
Get regular access to our best deals and travel tips in your inbox.
Rome2rio will use the information you provide on this form to provide product updates and marketing offers. You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us.
Rome2rio, based in Melbourne, Australia, is organising the world’s transport information. We offer a multi-modal, door-to-door travel search engine that returns itineraries for air, train, coach, ferry, mass transit and driving options to and from any location. Discover the possibilities at rome2rio.com
|
{
"pile_set_name": "Pile-CC"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.