text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Wilhelm August Eduard Johnson (1840:1903) published the first edition of his conversation manual for Attic Greek in 1889. Further editions appeared in 1902, 1912, and 1922 (posthumous). He skillfully supplemented the foundation from Aristophanes's comedies and Plato's dialogues with Koine and Katharevousa to give us a flexible tool to converse in Attic about any topic. This edition is conceived in the natural approach method developed by Hans Ørberg (1920-2010) for Latin. It uses forms or words from the Greek Core Vocabulary to provide explanatory side notes.
|
{
"pile_set_name": "OpenWebText2"
}
|
# Locally calculated
sha256 ae22ef11c934364be4fd2a0a1a7aadf4495a0251ec6979da280d342a89ca3c2f lshw-B.02.18.tar.gz
|
{
"pile_set_name": "Github"
}
|
Evaluations of the Carcinogenicity of Carbon Nanotubes, Fluoro-Edinite, and Silicon Carbide by the International Agency for Research on Cancer (IARC).
We reported the evaluations of the carcinogenicity of fluoro-edinite, silicon carbide, and carbon nanotubes performed by IARC working group in October 2014. For carbon nanotubes (CNTs), multi-walled carbon nanotube (MWCNT)-7 was classified as Group 2B, and MWCNTs without MWCNT-7 and single-walled carbon nanotubes (SWCNTs) were classified as not classifiable in terms of their carcinogenicity to humans. There is sufficient evidence of carcinogenicity for MWCNT-7 in experimental animals, limited evidence for other MWCNTs, and inadequate evidence for SWCNTs. The mechanic evidence for CNTs was not strong. Fluoro-edinite was classified as carcinogenic to humans (Group 1) on the basis of sufficient evidence of carcinogenicity to humans and experimental animals. Silicon carbide was classified into silicon carbide fibers and whiskers. Silicon carbide fibers were evaluated as possibly carcinogenic to humans (Group 2B) on the basis of limited evidence of carcinogenicity to humans. Silicon carbide whiskers were evaluated as probably carcinogenic to humans (Group 2A) on the basis of sufficient evidence of carcinogenicity to experimental animals and the similarity of their physicochemical properties to those of asbestos in terms of the mechanism of carcinogenicity. We report the process of progression in meeting and discuss how to determine the evidence and the evaluation of the carcinogenicity of the three materials.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Various mechanisms for adjusting the positions of the guiding vanes of a guiding grid of variable geometry have become known, such as in U.S. Pat. Nos. 4,179,247 or 5,146,752. Just the latter illustrates how difficult and tiresome it is to mount the individual parts of the guiding grid in a housing, because various parts have to be fitted into each other and have to be mounted and fixed to one another, particularly when assembling a turbocharger or at least one turbine unit.
From U.S. Pat. No. 5,028,208, a guiding grid has become known in which levers are situated on the adjustment shafts of the guiding vanes, the free end of these levers being provided with an opening between two fork arms. In this opening, a sliding block or pin slides and has its longitudinal axis about parallel to the central axis, while being moved by the unison ring (sliding block gear). The disadvantage of this gear or mechanism is that just when the force of the turbine driving fluid or exhaust gas exerts the highest turning torque onto the guiding vanes, the turning torque exerted by the unison ring is relatively small. This is not so great a problem with combustion motors of small power; however, it is a considerable problem (also in view of wear) particularly with combustion motors of an elevated power.
This becomes then a problem too with respect to automatic adjustment, particularly when controlling the vanes during a braking operation. In this respect, reference should also be made to U.S. Pat. Nos. 5,123,246; 5,444,980 and 6,148,793 which have all an electronic control.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Check out our new site Makeup Addiction
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
1776 FT? sounds like the perfect height.....for freedom
|
{
"pile_set_name": "OpenWebText2"
}
|
Chery is a sexy housewife with a cock addiction. Here's Chery, 56 years old, getting butt-fucked by a 24-year-old.
"I was very excited to try out such a young man," Chery said.
Chery showed up in our studio with her husband in tow and her children back home in South Florida. Here, this tall, MILFy blonde is wearing a short animal-print dress, red heels and red panties. The last time she was here, Chery described herself as an "anal sex beginner." Now, she says, "Anal sex can be very erotic. It just depends on the whole approach. I love to have my pussy rubbed while I'm having anal sex. There are ways to really make it sensual. The key is how it's done."
For example, eat her pussy, not her ass, but stick a finger in her asshole. Fuck her pussy then fuck her ass.
"There are many approaches but that works well," Chery said.
Chery's ass gets fucked a lot of ways in these photos. Which position is your favorite?
Related Tags
|
{
"pile_set_name": "OpenWebText2"
}
|
Bacterial antibiotic resistance studies using in vitro dynamic models: Population analysis vs. susceptibility testing as endpoints of mutant enrichment.
Emergence of bacterial antibiotic resistance is usually characterised either by population analysis or susceptibility testing. To compare these endpoints in their ability to demonstrate clear relationships with the ratio of 24-h area under the concentration-time curve (AUC24) to the minimum inhibitory concentration (MIC), enrichment of ciprofloxacin-resistant mutants of four clinical isolates of Pseudomonas aeruginosa was studied in an in vitro dynamic model that simulates mono-exponential pharmacokinetics of ciprofloxacin over a wide range of the AUC24/MIC ratios. Each organism was exposed to twice-daily ciprofloxacin for 3 days. Amplification of resistant mutants was monitored by plating on media with 2×, 4×, 8× and 16× MIC of ciprofloxacin. Population analysis data were expressed by the area under the bacterial mutant concentration-time curve (AUBCM). Changes in P. aeruginosa susceptibility were examined by daily MIC determinations. To account for the different susceptibilities of P. aeruginosa strains, post-exposure MICs (MICfinal) were related to the MICs determined with the starting inoculum (MICinitial). For each organism, AUC24/MIC relationships both with AUBCM and MICfinal/MICinitial were bell-shaped, but the latter were more strain-specific than the former. Using combined data on all four isolates, AUBCM showed a better correlation than MICfinal/MICinitial (r(2)=0.75 vs. r(2)=0.53). The shift of MICfinal/MICinitial relative to AUBCM vs. AUC24/MIC curves resulted in a weak correlation between AUBCM and MICfinal/MICinitial (r(2)=0.41). These data suggest that population analysis is preferable to susceptibility testing in bacterial resistance studies and that these endpoints should not be considered interchangeable.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Swee bridges Brunei together
Over the past 40 years, Swee has built some of Brunei’s most important infrastructure, including the country’s water supply networks. Today, Swee has linked up with a Korean firm to build two iconic structures: bridges that will provide better connectivity between Brunei’s capital and surrounding regions. Bobby Chua, Vice Chairman of Swee, tells us more.
How has Swee impacted Brunei’s landscape? Since starting the business, for 40 years we have participated in several large construction projects. Swee has built crucial water reservoirs, treatment plants and pipe networks; we have handled the majority of the water supply projects in the country. Swee also built the Muara to Jerudong part of the Muara-Tutong Highway, the country’s main cross-national roadway, as well as the Hassanal Bolkiah National Stadium.
Why did Korea’s Daelim choose you as a local partner for the Sungai Kebun Bridge? After Daelim found out that we have a long-standing construction track record and are on good terms with the Brunei government, they teamed up with us for the Sungai Kebun Bridge. This partnership was a success and we are now in our second project with Daelim as the contractor for the largest portion of the Temburong Bridge.
What does the Temburong Bridge mean for Brunei? It will save a lot of travelling time, allowing for drives from Muara to Temburong to take about 30 minutes. Once in place, Temburong can develop very quickly, be it in tourism or other industries.
How does the Royal government help investors? I’m Singaporean. During my 40 years in Brunei, I have found that the government is very approachable and genuinely looks to help local and foreign businessmen.
|
{
"pile_set_name": "Pile-CC"
}
|
Predictive validity of the pain and impairment relationship scale in a chronic nonmalignant pain population.
To examine the predictive and incremental validity of the Pain and Impairment Relationship Scale (PAIRS) and to determine its ability to measure changes in pain beliefs following interdisciplinary treatment. A before-after treatment design. A comprehensive interdisciplinary pain center at a large midwest university medical center. A cognitive-behavioral approach to pain management. The day-long program lasted 5 days a week for 4 weeks. Interventions were designed to improve physical functioning, reduce use of health care, and improve pain coping. Six-month follow-up outcome measures included interference with daily activity, pain severity, and life control as measured by the Multidimensional Pain Inventory, medication use measured by the Medication Quantification Scale, depression measured by the Beck Depression Inventory, and the number of health care visits and pain-related hospitalizations. Pretreatment PAIRS scores correlated significantly with interference with daily activities, pain severity, life control, health care visits, and depression. Stronger correlations were obtained between posttreatment PAIRS scores and all follow-up outcome measures. Posttreatment PAIRS scores accounted for a significant portion of the variance beyond that in demographic variables and pretreatment PAIRS scores in all but one of the follow-up measures. PAIRS scores changed significantly (p < .0001 ) in a positive direction after treatment. The PAIRS has excellent predictive validity, and can be used effectively to monitor individual and programmatic changes.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
"(TYPEWRITER KEYS CLACKING)" "WATSON:" "The year was 1891." "Storm clouds were brewing over Europe." "France and Germany were at each other's throats the result of a series of bombings" "Some said it was Nationalists... others, the anarchists" "But as usual my friend Sherlock Holmes had a different theory entirely." "MAN 1:" "Bombing in Strasbourg!" "Read all about it!" "MAN 2:" "Thank you." "MAN 1:" "Anarchists suspected in Strasbourg bombing!" "Bombing in Strasbourg!" "(CHATTERING INDISTINCTLY)" "(BELL TOLLING)" "(MAN WHISTLES)" "When did you start working for the postal service?" "That was you back there." "Shame your activities have landed you in the gutter." "A curious parcel." "Who's the intended recipient?" "Why don't we discuss that over dinner tonight?" " I'm free for lunch." " Hmm." "I'm not." "How about the Savoy, 8:00?" " Splendid." " Hmm." "And will you be coming as yourself?" "Most likely." "Three men have been following you for the last half mile their motives highly unsavory." "No." "(GASPS)" "Oh, and, by the way, they're not pursuing me, they're escorting me." "And instead of three, there seems to be, uh, four." "Heh." "Steady hands with that, Irene." "Oh, I don't think it's my hands you have to worry about." "Be careful with the face, boys." "We do have a dinner date tonight." "Don't fill up on bread." "(WHISTLING MOZART'S "EINE KLEINE NACHTMUSIK")" "(WHISTLING MOZART'S "EINE KLEINE NACHTMUSIK")" "(WHISTLING CONTINUES)" "I forgot the rest." "Oh, it's coming back now." "(GRUNTING)" "THUG:" "Aah!" "Aah!" "Peelers!" "(THUG WHISTLING)" "(WHISTLING CONTINUES)" "(GRUNTING)" "(BULLETS CLATTERING)" "AUCTIONEER:" "We now come to Lot 34 Egyptian sarcophagus of outstanding provenance retrieved from the Valley of the Kings." "Your payment, doctor." "He sends his thanks." "Who will bid 100 pounds?" "One hundred." "Thank you, sir." "HOFFMANSTAHL:" "Please, give this to him." "He's expecting it." "Tell him our friend thinks I delivered it to his sister." "Uh..." "Stay while I check the contents." "I was assured full payment would be there." "Yes, but assured by whom?" "Have you ever met him in person?" "Or like me, have you been...?" "Hold it, hold it." "Please, don't move it." "Judging from size and weight, it's not the payment you were expecting." "I'd wager the contents are rather more incendiary." " Who is this?" " It's..." "Hello, darling." "(WHIRRING)" "Oh, dear." "I told you not to move it." "It seems a secondary charge has been activated." "Sweet thing, I might need your help in the disposal of this parcel." "One thousand six hundred, 1700, 1800." " Well, good luck." "HOLMES:" "One million pounds." "(CROWD GASPS)" "Oh, and by the way, fire." "Fire!" "(CROWD CLAMORS)" "Leave my side, you'll be dead in an hour." "And don't be late for dinner." "My schedule will be quite tight because of these activities here." " I've never been late in my life, only early." " Fashionably." "Mm." "Mm-mm." "Mm!" "Very witty." "So confident, even in retreat." "I'll hold onto that." "We'll read it together over an aperitif." "Fine." "Dinner and a show." "Stay." "Trust me." "This is what I do for a living." "Herr Hoffmanstahl, you should count yourself lucky." "This faceless man with whom you find yourself in business is no ordinary criminal." "He's the Napoleon of crime." "Fortunately, you now have me as an ally." "I'm a consulting detective of some repute." "Perhaps you've heard of me?" "My name is Sherlock... (MUFFLED EXPLOSION)" "(COUGHS) ...Holmes." "MAN:" "Hyah!" "(HORSES WHINNYING)" "(CHATTERING)" "A fresh pot of tea." "Thank you, George." "GEORGE:" "Yes, Miss Adler." "MAN:" "Fine choice, this place." "Do you have the letter?" "It was taken." "MAN:" "Taken?" "Now, that is unfortunate." "During the chaos created by your package." "Thank you." "Perhaps if you had shared your plans." "You wish to know my plans now, do you?" "Did you imagine, Miss Adler, that something would happen to you?" "Is that why you chose to meet here in a public place?" "Your favorite restaurant?" "(CLINKING)" "(DOOR CLOSES)" "I don't blame you." "I blame myself." "It's been apparent to me for some time that you had succumbed to your feelings for him." "And this isn't the first occasion Mr. Holmes has inconvenienced me in recent months." "The question is what to do about it." "But that's my problem to solve now." "I no longer require your services." "(UTENSILS CLINKING SOFTLY)" "(DISHES CRASHING)" "(ADLER GRUNTS)" "(CHATTERING)" "(WOMAN CHUCKLES)" "(PEOPLE CHATTERING)" "(KNOCKS ON DOOR)" "Mrs. Hudson?" "Oh, Mrs. Hudson?" "(GLADSTONE BARKS)" "Holmes, you in there?" "(SIGHS)" "Your hedge needs trimming." "(GOAT BLEATS)" "HOLMES (WHISPERINGS) Where am I?" "WATSON:" "I don't care where you are as long as you're ready." "(BIRDS CHIRPING)" "HOLMES:" "I'm waiting." "(ANIMAL HOOTS)" "I'm not gonna play this game." "Remember, I have to catch the last... (BLEATS)" " ...train." "HOLMES (IN NORMAL VOICE):" "Uh-oh." " That's you dead, I'm afraid." " You win." "I lose." "Game over." "HOLMES:" "Still don't see me?" "(HOLMES LAUGHS)" "(SPEAKS IN FRENCH)" "I'm not going out with you dressed like that." "Would you prefer I joined you in the fashion faux pas of wearing fine military dress with that heinous handmade scarf clearly one of your fiancée's early efforts?" "Oh, how I've missed you, Holmes." "Have you?" "Why?" "I've barely noticed your absence." "Then again, I'm knee-deep in research." "Extracting fluids from the adrenal glands of sheep and designing my own urban camouflage all the while verging on a decisive breakthrough in the single most important case of my career, perhaps of all time." "(FOOTSTEPS APPROACH)" "Mrs. Hudson, how are you?" "Oh." "I'm so pleased to see you, doctor." "Thank you for inviting me tomorrow." "And thank you for looking after Gladstone." "Dear, dear sickly-sweet Nanny, might I have a word?" "Yummy." "Feed the snake, woman." "You feed it." "Touchy, touchy." "Doctor, you must get him to a sanatorium." "He's been on a diet of coffee, tobacco, and coca leaves." "He never sleeps." "I hear multiple voices as if he's rehearsing a play." "(CHUCKLES)" "Leave him to me." "Don't you have a goat that needs worming?" "Oh, how kind of you to remind me." "So much to look forward to." "What would I do without you?" "Good luck with your patient, doctor." "Why are you here?" "I'm getting married tomorrow." "Oh!" "Embrace me." "Watson's getting married." " You've lost a few pounds, Holmes." " Yes, and you've picked them up." " Noshing on Mary's muffins, no doubt." " Ha." "Pour us a brandy." "The stag party has begun." "It is our last adventure, Watson." "I intend to make the most of it." "WATSON:" "I see you've made good use of my old office." "HOLMES:" "Do you like my spider's web?" "WATSON:" "Is that what you call it?" "Follow that strand." "Question:" "What do a scandal involving an Indian cotton tycoon the overdose of a Chinese opium trader bombings in Strasbourg and Vienna and the death of a steel magnate in America all have in common?" "WATSON:" "Well, according to your diorama, Professor James Moriarty." "HOLMES:" "Indeed." "Mathematical genius." "Celebrated author and lecturer." "HOLMES:" "Boxing champion at Cambridge where he made friends with our current prime minister." "Do you have any evidence to substantiate your claim?" "(HOLMES CHUCKLES)" "This." "Now do you see?" "WATSON:" "Dr. Hoffmanstahl's death?" " Yes." "I've heard you speak of him, extolling his virtues." "Hoffmanstahl was at the forefront of medical innovations, a true pioneer." "Just the other day, I averted an explosion that was intended for him." "Says here he died of a heart attack." "Has all my instruction been for naught?" "You read the official statement and believe it." "It's a game, dear man, a shadowy game." "We're playing cat and mouse, the professor and I. Cloak and dagger." "I thought it was spider and fly?" "I'm not a fly, I'm a cat." "Not a mouse, but a dagger." "You're drinking embalming fluid." "Ooh." "Yes." "Care for a drop?" "You do seem..." " Excited?" " Manic." " I am." " Verging on..." " Ecstatic?" " Psychotic." " Should've brought a sedative." " I'll give my life to see his demise." "He must be stopped before his evil machinations come to a crescendo." "And how will he do all this?" "Don't be a dingy bird." "Bad people do bad things because they can." "No one, not the victims, the police, the governments, not anyone..." " Except the great Sherlock Holmes..." " Correct." " ...on this diet, will work it all out." " Right." " Or thereabouts." " Thereabouts, not quite there." "Here's to your good health." "Dingy bird." "(GLADSTONE WHIMPERS THEN THUDS)" "What have you done to Gladstone now?" "Ricinus communis." "The fruit is highly toxic." "He's barely breathing." "What an excellent opportunity." "This may be just the thing." "(GLADSTONE WHIMPERS)" "Sorry, do you mind terribly if I try my adrenal extract?" "How many times are you going to kill my dog, Holmes?" "(GRUNTS THEN BARKS)" "Took off like a monkey from a box." " Hmm." " I may need one of those in a few hours." "HOLMES:" "Consider it a wedding gift." "Watson, might we use an alternative exit?" "Is there something different about you?" "I'm under observation." "As you should be." "HOLMES:" "You drive." "WATSON:" "Will your beard be with us all night?" "HOLMES:" "I'll remove it once we're south of Trafalgar Square." "WATSON:" "If you believe Moriarty has you under observation isn't this a bit conspicuous?" "HOLMES:" "It's so overt, it's covert." "WATSON:" "Trafalgar Square." "You must be safe by now." "(GRUNTS)" "Why are you looking at me with such concern?" "I'm so very worried." "Your vitality's been drained from you." " Marriage is the end, I tell you." " I think of it as the beginning." " Armageddon." " Rebirth." " Restriction." " Structure." " Answering to a woman." " Being in a relationship." "A life in matrimony, the possibility of a family." "Who wants to die alone?" "We'll have a good old-fashioned romp tonight you'll settle down, have a family, and I'll die alone." "WATSON:" "Yes, that's about it." "Perhaps it's better for one to die alone than to live life in eternal purgatory." "Anyway..." "Not bad, that." "So where are we going?" "MYCROFT:" "In the future, there'll be one of those machines in every town in Europe." "Loitering in the woodshed again, are we, Myccie?" " Good evening, Sherly." " Well." "I see your bootmaker is ill, dear brother." "As I detect that you've recently changed the brand of soap with which you shave." "The chimney in the front room at Baker Street still needs a damn good sweeping up." "Were you aware that the hackney carriage by which you arrived had a damaged wheel?" "Yes, the left." "And it's plain to the meanest intelligence that you have recently acquired a new bow for your violin." "Same bow, new strings." "And may I deduce, Mycroft...?" "Good evening, by the way." "No." " He doesn't." " May I deduce that you who rarely strays from the path that runs from your home to the Diogenes Club and never on a Monday when they serve your favorite potted shrimps must be here for some far more important reason than my stag party?" "You know, he's nothing like as slow-witted as you'd been leading me to believe, Sherly." "No, you're quite right, Dr. Watson but with all the conflict in Europe at the moment, the whole situation could..." "Excuse me.... suddenly erupt." "I am here to avoid a dire catastrophe." "If the concerns of two nations which shall remain nameless but I can tell you they speak French and German are not dealt with tonight, I shall be forced to go to Switzerland to attend the ghastly peace summit in Reichenbach." "The worst thing about Switzerland is the altitude." "It gives me nosebleeds, exacerbates my asthma-1..." "I'm so glad you invited your brother." "(BAND PLAYING LIVELY MUSIC)" "(PEOPLE LAUGHING AND CHEERING)" "This looks promising." "WOMAN:" "And your poison of choice, gentlemen?" "We'll start with the champagne." "We may need several more chairs." "Perhaps a good cigar." "And don't bother with the chairs." "What is it your brother does exactly?" "He's the keeper of the broom cupboard of state." "No ambition, no energy yet I'm repeatedly told that he's indispensable to the British government particularly the Foreign Office." " I would like to propose a toast." " Really?" "To my dear friend, Dr. John um, Hamish Watson..." "I'm right here." "...On the eve of his wedding." "He has been the best companion." "Shouldn't we be waiting for the boys from my rugby club?" "He has always kept us..." "They couldn't attend." "...flat-footed on the ground." "All of them?" "Hmm." "The chaps from my medical school?" " They declined." " The lads from the regiment?" " No man's better worth having at your side..." " Who is it you're looking for?" "Because I don't know a single damn person here, do I?" "There's no need for hysterics." "You know me and Mycroft." " Don't be a ponce, Watson." " Ponce?" "You completely forgot about my stag party, didn't you?" " Why are we here?" " Your very good health, doctor." "Shame none of your friends could make it." "(HOLMES WATSON LAUGHING)" "(LAUGHING)" "I'm going to the gaming tables." "I refuse for this night to be a total loss." " Give me my money." " Happily." "Give me the wedding ring." "So now you're interested in being the best man." "You're supposed to keep the ring anyway." "Just as you're supposed to organize my stag party." " Don't want to lose it on a bet." " And invite my friends of which, by the way, there are many." "You're the one with no friends Sherly No Mates." "(CROWD CHEERING)" "He's all "me, me, me," isn't he?" "(LAUGHS)" "(CHATTERING)" "(CROWD CHEERING)" "(LAUGHING)" "MAN:" "I win!" "WOMAN:" "Please, sit." "Put your money on the table and we will begin." "Welcome." "I am Madam Simza." "Cards can illuminate your past clarify your present, and show you the future." "If you have a specific question, hold it in your mind." "HOLMES:" "Mm." "(SIGHS)" "I'm holding." "Let me know when you're ready." "Actually, I'd prefer to read your fortune." "Temperance inverted." "Indicative of volatility." "A woman who has recently taken her comfort in drink." "From what does she seek solace?" "What does she not wish to see?" " A fool embarrassing himself?" " Hmm." " Hmm." " Oh, yes." "The Fool." "Someone has been led astray, involved in something without their knowledge." "Not bad, but you have to make me believe you." "I have to see it in your eyes." " Right." "I can do better." " Uh-huh." "The Two of Cups, a powerful bond." "But between whom?" "A brother and sister perhaps?" "And I see a name." "Yes, it's Rene." "What do you want?" "The Devil." "Why are we playing this game?" "Where did you get this?" "I stole it from a woman in an auction room, but I believe it was intended for you." "SIM (IN FRENCH):" ""Found my purpose in life."" "So the question I've been holding is, what purpose is Rene fulfilling?" "(IN ENGLISH) Time is up." "I have other clients." "Though you may not have detected the wisp of astrakhan fur snagged on a nail over my left shoulder you couldn't have failed to notice the overpowering aroma of herring pickled in vodka in tandem with a truly unfortunate body odor." "There's a man concealed in the rafters above us." "A Cossack, renowned for their infeasible acrobatic abilities and are notorious for moonlighting as assassins." "So it's safe to presume that your next client is here to kill you." "Anything else?" "No?" "HOLMES:" "First, pillage the nest." "Clip wings." "Now blunt his beak." "Crack eggs." "Scramble." "Pinch of salt." "Touch of pepper." "Flip the omelet." "Additional seasoning required." "Breakfast is served." "Come with me." "I need you alive." "Now." "WOMAN:" "Oh!" "(WOMAN GASPING)" "(BAND PLAYING LIVELY MUSIC)" "(LAUGHS)" "(WOMEN SCREAMING)" "Aah!" "Didn't see that in the cards, did you?" "CROWD:" "Oh..." "(CROWD YELLING)" "PUNTER:" "Coming down, folks, coming down." "Looks like we've got ourselves our next cockfight." "(CROWD CHEERING)" "Five, four, three, two, one let him go!" "(CROWD CHEERING)" "PUNTER:" "Get up there!" "(LAUGHS)" "All mine?" "(CROWD YELLING)" "(PEOPLE YELLING)" "Now, wait a minute." "(CROWD YELLING)" "(SPEAKS INDISTINCTLY)" "(SIM PANTING)" "You're right." "He did stink." "WATSON:" "Hey, you can run..." "Where's you?" "Just had a fight." " Just had a fight." " Yes." " Where were you?" " I'm glad to see you're taking your best-man duties so seriously." "I was on my own!" "Not gonna get my monies!" "She was biting my leg." "I'll have Carruthers put some fuel into that motor carriage of yours." "You do have a wedding to attend." "Oh, I'll drive." "CARRUTHERS:" "Hmm." "(LAUGHS)" "Ho-honk." "Ha-ha-ha." "WATSON:" "Let's have another drink." " No, no, I think you've had quite enough." "(ENGINE BACKFIRES)" "(BAGPIPES PLAYING LOUDLY)" "(SNORING)" "(SNORTS)" "(CROWD APPLAUDING)" "SOLDIER:" "Present arms!" "(GLADSTONE BARKS)" "(ENGINE STARTS)" "MAN:" "I've been to a wedding here before." "Funeral too." "The professor wants to meet." "I'd expected to hear from him sooner, in light of recent events." "He was wondering if it'd be convenient for you to come by the college this afternoon." "His lecture concludes at 4." "Looking forward." "One side, chummy." "(HORN HONKS)" "(ENGINE BACKFIRES)" "(BELL TOLLING)" "(CHATTERING)" "(WOMAN SINGING IN GERMAN OVER SPEAKERS)" ""Fischerweise," Schubert, 1826." "(SPEAKS IN GERMAN)" " "Give up your foolish trickery." - "This fish you cannot cheat."" "I hope I'm not intruding." "Excuse me." "Matthew, take these up to Mr. Williams." "And make sure he packs my white tie and tails." " I'll take care of it, professor." " Thank you." "I do apologize." "I'm off on a blasted lecture tour." "Would you care for some tea or coffee?" " Neither." " Something stronger, perhaps?" "No, but might I trouble you for an inscription?" "(MORIARTY SCRIBBLING)" "I read that the good doctor was to be married today." "How was the service?" "Definitive." "He'll no longer be party to my investigations." "He's out of the equation." "I trust you'll take this into consideration." "MORIARTY:" "And what considerations will you grant me?" "Have you actually read the book?" "I found it compelling though I'm primarily interested in your more recent endeavors." "I take that as a compliment." "I have the utmost regard for your talents." "It's a pleasure to finally meet you officially." "HOLMES:" "Are you familiar with the study of graphology?" "I've never given it any serious thought, no." "The psychological analysis of handwriting." "The upward strokes on the P, the J, and the M indicate a genius-level intellect." "While the flourishes on the lower zone denote a highly creative yet meticulous nature." "But if one observes the overall slant and the pressure of the writing there's a suggestion of acute narcissism, a complete lack of empathy..." " ...and a pronounced inclination toward..." " No." "...moral insanity." "In answer to your previous request regarding Dr. Watson not being involved the answer is no." "The laws of celestial mechanics dictate that when two objects collide there is always damage of a collateral nature." "Exempli gratia." "Two gentlemen find themselves at cross-purposes." "A young woman torn between them." "(GASPS THEN COUGHS)" "The strain proves loo much for her, and she suddenly falls ill with tragic consequences." "A rare form of tuberculosis." "She succumbed in a matter of seconds." "Now are you sure you want to play this game?" "I'm afraid you'd lose." "Rest assured, if you attempt to bring destruction down upon me I shall do the same to you." "My respect for you, Mr. Holmes, is the only reason you're still alive." "You've paid me several compliments." "Let me pay you one in return when I say that if I were assured of the former eventuality I would cheerfully accept the latter." "I'll be sure to send my regards to the happy couple." "Another time, then." "(TRAIN HORN BLOWS)" "(INDISTINCT CHATTER)" "CONDUCTOR:" "All aboard for Brighton!" "All aboard!" "Which coach are we?" "We should be just here." "(GASPS)" "Ooh." "First class." "(MEN SPEAKING INDISTINCTLY)" "CONDUCTOR:" "All aboard for Brighton!" "All aboard!" "Hurry up, Dr. Watson, your wife needs you." "Coming, Mrs. Watson." "Ooh." "First class, champagne." "You do know how to spoil a girl, Mr. Watson." "You're not just any girl." "(KNOCK ON DOOR)" "I'm sorry, madam." "You can't use the lavatory while the train's in the station." "You're Mrs. Watson." "Give me that bottle." "John, there is nowhere else in the world I would rather be." "There's no one I'd rather be with." "Why do you have a gun stuffed down the back of your trousers?" "Heh." "Old habits." "(KNOCK ON DOOR)" "Ahem." "Come in." " Oh, yes, please." " We didn't order that." "With our compliments, sir." "Thank you." "Put it there." "(TRAIN HORN BLOWS)" "Open the door, John." "I think it's time for you to leave." "Sit down." "Shh." "(BLOWS LANDING)" "(GUN COCKS)" "I agree it's not my best disguise, but I had to make do." " My God." " They'll be back." " John, shut the door." " They'll only shoot through it." "HOLMES:" "He's right, you know." " Oh, my God." "(GUNSHOT)" " I understand." " Do you?" "Terribly inconvenient." "We don't have much time." " How many are we expecting?" " Half a dozen." "WATSON:" "Who are they?" " A wedding present from Moriarty." "Lovely ceremony, by the way." "Many a tear shed in joy." "MARY:" "Oh, John?" "(GUNSHOT)" "Yeah, just a minute, darling." " Do you trust me?" " No." "Well, then I shall have to do something about that." "(MARY SCREAMS)" "Who's up to bat next, you bastards?" "(GUNSHOT)" "Send out the fast bowler!" "John, do shut the door." "It had to be done." "She's safe now." "In my own defense, I timed it perfectly." "Did you kill my wife?" "!" "Did you just kill my new wife?" "!" "Of course not!" "What do you mean?" "How do you know that when you just threw her off a train?" "I told you, I timed it perfectly." "What does that mean?" "!" " Calm down." " Explain!" "By the time I've explained, we'd both be dead!" "I'm sorry, madam." "You can't use the lavatory while the train's in the station." "(TRAIN HORN BLOWS)" "(ALL COUGHING)" "(MAN SCREAMS)" "That was no accident." "It was by design." "Now, do you need me to elaborate or can we just crack on?" "Come on!" "(TRAIN HORN BLOWS)" "Don't worry, old boy, she's as safe as houses." "She's with my brother." "I'm on my honeymoon!" "Why did you lead them here?" "!" "Why did you involve us?" "!" "They aren't here for me!" "They're here for you!" "Fortunately so am I." "Now mind the door." "Good evening." "I think you'll find that second class is more comfortable." "The coast is clear." "To the south, quick march." "(WOMAN WHIMPERS)" "Lie down with me, Watson." " Why?" " I insist." "(GRUNTS)" "What are we doing down here?" "We are waiting." "I am smoking." " Patiently waiting." " For what?" "Your window of opportunity." "(CLICKING)" "Make it count." "(SCREAMING)" "I said make it count." "How many windows must I provide?" "(SCREAMING)" "Who'd have known that honeymooning in Brighton was such a dangerous notion?" "Is that what this is about?" "By your own admission, you've never enjoyed it there." "I've never been to Brighton." "Or you're just too fragile to remember at present." "Oh, shut up." "Tell me my wife's safe." "I can't do both." "I promise." "As I said, I timed it perfectly." "(MARY SCREAMS)" "MYCROFT:" "Over here, madam!" "I believe congratulations are in order, Mrs. Watson." "I'm the other Holmes." "You mean there's two of you?" "How marvelous." "Could this evening get any better?" "Why were Mary and I targeted at all?" "Excellent question." "The answer is twofold." "He's after us because of you." "I'm afraid you must bear half the responsibility." " Here it comes." "So predictable." " Had you and Mary not been hell-bent on wedding, we could've solved this case." " Oh, it's my fault now." " The argument could be made..." " No, it couldn't." " ...that your nuptials were poorly timed." "Thus, our relationship..." "Relationship?" "Very well, partnership." "...has not yet run its course." "My dear fellow, if you could be bothered to see this through to the end I shall never again ask you to assist me." "Once more unto the breach." "That's the spirit." "Now, to the question." "This is so deliciously complicated." "You may be asking yourself what does a criminal mastermind want with a simple gypsy fortune teller?" "It's her brother, I tell you." "When we find him, and we must..." "After you find my luggage." "Go on." "Wait." "Where is it we're going?" "Paris, the most sensible honeymoon destination of all." " So why Paris?" " Peaches." "Outside the city at Montreuil there's a Gypsy camp famous for its dried fruit, especially peaches." "And there we shall find our fortune teller and return her bag." "(SNIFFS)" "(SPEAKS IN FRENCH)" "(SPEAKS IN FRENCH)" "(MAN 1 SPEAKS IN FRENCH)" "(SPEAKS IN FRENCH)" "And my ticket?" "(MAN 2 SPEAKS IN FRENCH)" "(SPEAKS IN FRENCH)" "Unfortunately, you won't be needing yours." "That's a shame, professor." "I was looking forward to Don Giovanni." "(MAN 3 MORIARTY SPEAK IN FRENCH)" "Follow Meinhard." "(INDISTINCT CHATTERING)" "(MAN SPEAKS IN FRENCH)" "(SPEAKS IN FRENCH)" "(SPEAKING INDISTINCTLY)" "(HORSE NEIGHING)" "(MEN YELLING)" "(VIOLIN PLAYING LIVELY MUSIC)" "(WATSON SPEAKS IN FRENCH)" "(WATSON WHISTLES TWICE)" "Wake up, we're here." "Brace yourself." "We're about to be violated." "Don't be so cynical." "(SPEAKING IN FRENCH)" "(SPEAKING IN FRENCH)" "(SPEAKS IN FRENCH)" " They're taking my luggage." " Laugh them away, Watson." "I have her bag." "(SPEAKING IN FRENCH)" "(LAUGHS)" "WATSON:" "You had her bag." "Now they have my coat." "Where is Madam Simza?" "(SPEAKING IN FRENCH)" "(LAUGHS)" "TAMAS:" "This is Simza." "(GOOSE SQUAWKING)" "(LAUGHS)" "(LAUGHS)" "Sim is a goose." "(CROWD CHUCKLING)" "I am Sim." "Ha-ha-ha." "Nice scarf." "I like." "(HENS CLUCKING)" "(CHUCKLING)" "(IN FRENCH)" " You hungry?" " (IN ENGLISH) Famished." "Madam, this is a glorious hedgehog goulash." "I can't remember ever having had better." "Do tell me, when was the last time you had a hedgehog goulash?" "I told you, Watson, I can't remember." "(WHISPERINGS) Perhaps you've repressed it." "(CHUCKLES)" "That's where we differ." "Unlike you, I repress nothing." "(IN NORMAL VOICE) Perfectly normal." "How dare you be rude to this woman who has invited us into her tent offered us her hedgehog?" "Says the man who throws women from trains." "Who are you two?" "Concerned citizens." "Why did someone try to kill me?" "Your brother has become involved with a very dangerous man who clearly believes that Rene has told you something you shouldn't know." "I don't know anything." "I've been looking for him for over a year." "That was why I was in London." " It's the last place anyone saw him." " It's clear that your brother loves you." "He'd never send you a message that would put you in harm's way." "Any information, therefore, would be, by default, unintentional." "Has he sent you anything else?" "Just a few drawings." "Let's just see what they have to tell us." "Unusual choice of paper." "Thicker gauge, designed for a printing press." " And it's the same stock as the letter." " Mm." "They smell musty." "Must have been stored somewhere cold and damp." "What's that?" "Blood?" "Wine." "So a wine cellar located near a printing press." "That should narrow it down." "(IN FRENCH)" "There's a wine cellar used by the anarchist group Lapin Vert." "Rene was close to their leader." "Claude Ravache." " A bomb maker." " I sampled some of his work last week." "I was a part of the movement." "So was Rene." "Until it became too extreme for us." "Ravache knows me." "If my brother's back there, he will see us." "We will send a message." "(SIM SPEAKS IN FRENCH)" "Whatever you do, don't let these gypsies make you drink." "Of course." "You dance?" "For God's sake, don't dance." "It'll be the death of you." "You know what happens when you dance." "(BAND PLAYING LIVELY MUSIC)" "Huuh..." "Oh, good morning, Mrs. Watson." " Have you had breakfast?" " I..." "Stanley here does a wonderful deviled kidney." "(TRAY RATTLING)" "MARY:" "Ahem." " Carruthers?" " Morning, sir." "Telegram for Mrs. Watson." "Uh..." "It just doesn't make any sense." "Allow me." "Oh, yes." ""My most loathed Mary, I do not love you." "I never wish to see you again." "Every moment I count away from you is a blessing."" "Fret not." "It's a double encryption, my dear that Sherly and I have used since we were boys." "If the first letter of the message is a consonant then what follows is the mirrored truth." " I see." " Hmm." "Stanley!" "You know, although our time together has been but a brief interlude I'm beginning to understand how a man of particular disposition under certain circumstances, extreme ones perhaps might grow to enjoy the company of..." " ...a person of your gender." "Hmm." " Hmm." "Thank you so much." "Most charming." "May...?" "Terribly sorry." "Thank you." "Where are you going, Stanley?" "(BELL TOLLING)" "(HOOVES PATTERING)" "(PEOPLE CHATTERING)" "DRIVER:" "Whoa, whoa." "(SPEAKING IN FRENCH)" "(SPEAKING IN FRENCH)" "(CHATTERING)" "Still hiding in basements?" "RAVACHE (IN FRENCH):" "I'm not here to see you." "(IN ENGLISH) Yeah." "RAVACHE (IN FRENCH):" "(IN ENGLISH) ...with your English friends." "1189, a seminal vintage." "The year of our glorious revolution." " Is he here?" " When freedom triumphed over tyranny." "Is my brother here?" "I haven't seen him for a long time." "You're lying." "Sit, please." "A letter was received from Rene using this same paper." "Of course." "He took it with him wherever he went." "He's telling the truth." "Rene isn't here." " He was given another assignment by an..." " An anonymous benefactor." "Another Englishman with money, power, who supported our cause." "And now he dictates our every move demanding I take responsibility for his acts of terror." "I made a deal with the devil." "But after tonight, ahem it will be over." "My job is almost done." "He's had you plant another bomb, hasn't he?" "SIM:" "Claude, please." "These men can help you." "I wish they could." "You see, gentlemen he has my wife and children." "If you tell us where the bomb is..." " ..." "I'll find a way to help your family." " That's already taken care of." "We have a deal." "He and I." "No loose ends." "There's only one thing I can do to keep my family safe." " You have less than 10 minutes." " Don't!" "(GUNSHOT)" "(SPEAKING IN FRENCH)" "(EXHALES)" "He has no further need of that pistol." "Why don't you take it and cover the stairs?" "(MEN YELLING)" "WATSON:" "There's only one way out of this place." "Right you are." "Ah." "Ingenious." "That's the one." "Quickly as we can." "You know what to do with that sandbag, Watson." "Quick now." "(MEN YELLING)" "Doctor, could you secure that lever?" "You could have told me." "Ravache was strong." "He lived for liberty." "He would never take his own life." "WATSON:" "Calm yourself." "My brother, he's weak." "Sim, I need you to take a deep breath and follow us." "To the opera." "(SINGING IN ITALIAN)" "(INAUDIBLE DIALOGUE)" "(SINGING IN ITALIAN)" "(SINGING IN ITALIAN)" "I was mistaken." " What?" " I made a mistake." "(MEN SHOUTING INDISTINCTLY)" "(IN FRENCH)" "(PEOPLE SCREAMING)" "(SINGING IN ITALIAN)" "(CROWD YELLING)" "He took the shot from here." "Using a tripod and a shooting stick." "And realized there was a better position." "There's a faint scrape where he dragged his tripod and set it up here." " Six hundred yards?" "WATSON:" "Or 650?" "HOLMES:" "Not to mention a seven- or eight-mile-an-hour wind." "He would've needed a wind gauge." "Which he placed here." "HOLMES:" "And put a cigarette down here." "SIM:" "Can anyone shoot that far?" "Not more than half a dozen men in all of Europe." "How many of those men served in Afghanistan?" "WATSON:" "Why?" " Hirschsprung with a touch of Tekel." "Must have fallen out when he was rolling up." "Wasn't that the blend you all smoked?" " Didn't I read something about a colonel?" " Sebastian Moran." "Best marksman in the British army." "Dishonorable discharge." "He's likely now a gun for hire." "This is the second victim of his that I've encountered." "WATSON:" "What better way to conceal a killing?" "No one looks for a bullet hole in a bomb blast." " He's 20 minutes late." " He must come soon." "I don't have any papers." "WATSON:" "And I am a foreigner." "This climate is exactly what Moriarty wants." "Ahem." "The omelet fines herbes was divine but they spared every expense on the tea." "Now shall we compare moods, or consider what we know?" "Last night's bombing was clearly meant to look like Germany's retaliation for Strasbourg." "However, the bomb was also meant to conceal the murder of just one man." "The man killed by the gunshot was none other than Alfred Meinhard." "Ah." "He makes guns." "Big guns." "Only days ago, a large share of his company was bought by an unknown investor." "Moriarty." "The clues point in one direction, but to avoid repeating last night's debacle I was obliged to collect more sufficient data, hence my tardiness." "Train departs in 40 minutes, sir." "WAITER:" "Whoa!" "(HOLMES SNIFFS)" "(SPEAKS IN FRENCH)" " Just the bags." " But..." "We have enough time for me to indulge my little habit." "Yes." "HOLMES:" "His habit of feeding that urban species, the feral pigeon." "So there are seven mainline railway stations in Paris." "But taking 10 minutes to get to the Jardin des Tuileries where the largest concentration of the winged vermin may be found reduces there to one, the Gare du Nord where he will be just in time to catch the 11:04 train to Berlin." "It makes several stops along the way, one of which is..." "Heilbronn." "Exactly where we must go." "Where Meinhard's factory is." "HOLMES:" "It's Moriarty's factory now." "Unfortunately, due to the bombing the crossing between France and Germany is to be closed." "I'm afraid our pursuit is over unless we can happen upon a comrade who knows their way around borders." "Too English." "However, you do make a fantastic gypsy." "Certainly smell like a fantastic gypsy." "Now, now, no need to be demeaning." "It is a nice scarf." "No, no, too English." "It'll suit you more." "(SPEAKS IN FRENCH)" "Black one is yours." "Gray one is mine." " And this is for you." " Um..." "Hmm." "Right." " Where are the wagons?" " The wagon is too slow." "Can't you ride?" "(HORSE GRUNTS)" "It's not that he can't ride." "How is it you put it, Holmes?" "They're dangerous at both ends and crafty in the middle." "Why would I want anything with a mind of its own bobbing about between my legs?" "Then I shall require a bicycle, thank you very much." "It's 1891." "Could've chartered a balloon." "How can we make this more manageable?" "HOLMES:" "Where's the fire?" "(HOLMES WHIMPERING)" "HOLMES:" "It's not as if Germany is going somewhere." "We know another way." "HOLMES:" "Slow and steady wins the race." "(HORSES NEIGHING)" "(RIDERS YELLING)" "(HOLMES WHISTLING)" "HOLMES:" "Come on!" "WATSON:" "We slip in through the loading bay, find out what he's doing and we get out." "Getting out might be tricky." "We will get you out." "If my brother's in there, get him out alive." "(SOLDIERS CHATTERING)" "Are you happy?" " What?" " At this moment are you as happy as you would be on your honeymoon in Brighton?" "I'm not going to grace that question with an answer." " Are you happy?" " I think we're here for another reason." " Okay." " Shall we get on...?" " Simple question." " Will we do something?" " Or wait for them to come back round?" " What time is it?" " Three-fifteen." " Over there in the residential part of the complex should be a telegraph office." "Send this to Mycroft." "Be back here on the hour." "(DOG BARKING IN DISTANCE)" "(GUARDS CHATTERING)" "(LIQUID BUBBLING)" "(SNIFFS)" "MORAN:" "That's what you get, Mr. Holmes, when industry marries arms." "Now put your gun down." "It's a bit old-fashioned." "What you need is one of these." "Go on." "Pick one." "Machine pistol, self-repeating." "Takes 1.63 caliber rounds in one of these." "A 10-shot box magazine." " Easy enough to load." " Hmm." "I'd imagine one would have to retract the bolt to engage the first round." "Easier done than said." "Take him to the surgery." "I'll find the doctor." ""Come at once if convenient." "If inconvenient, come all the same."" "(SNIFFS)" "MAN:" "This is schnapps." "MORIARTY:" "A telegram was sent from here." "(HOLMES CLEARS THROAT)" "This isn't schnapps, it's aquavit, distilled from potato mash." "A common misconception." "Thank you, by the way." "Who was it sent to?" "My horror at your crimes is matched only by my admiration at the skill it took to achieve them." "Who was it sent to?" "HOLMES:" "You used the anarchists and their bombs to create a crisis in Europe nation against nation" "Under various pseudonyms, you bought, schemed, or murdered your way into numerous industries, assuring that none of it could be traced to you." "Cotton, opium, steel, now arms and chemical weaponry." "All to be shipped across Europe in less than a week." "Everything from bullets to bandages." "Now that you own the supply, you intend to create the demand." "A world war." "(TAPPING)" "MORIARTY:" "You are familiar with Schubert's work." "(GUNS COCK)" "(GUARD SPEAKS IN GERMAN)" "The Trout is perhaps my favorite." "(SPEAKS IN GERMAN)" "A fisherman grows weary of trying to catch an elusive fish." "Out the way, out the way." "So he muddies the water." "I'm warning you." "Confuses the fish." "(GUNSHOTS)" "You were warned." "It doesn't realize until too late that it has swum into a trap." "(GRUNTING)" "(HOLMES YELLS THEN GROANS)" "(ELECTRICITY BUZZING)" "(FEEDBACK SQUEALS)" "(SCHUBERT'S "DIE FORELLE" PLAYING OVER SPEAKERS)" "(MORIARTY SINGING "DIE FORELLE")" "(GUNSHOT)" "(MUSIC CONTINUES PLAYING)" "(HOLMES SCREAMING)" "(HOLMES SCREAMING OVER SPEAKERS)" "(GUNSHOT)" "(MUSIC STOPS)" "(GUNSHOT)" "Let's try this again, shall we?" "To whom did you send the telegram?" "To my..." "(GRUNTING)" "(HOLMES GASPS)" "To my brother Mycroft." "What are you playing at?" "That's not fair." "I've just got one more question for you." "Which one of us is the fisherman and which the trout?" "Holmes?" " Holmes?" "HOLMES:" "Unh." "Take your time." "Take your time." "(HOLMES GROANS)" "Uh... (GRUNTS)" "Always good to see you, Watson." " What were you thinking?" " Wait." "Wait?" "Well, if you must know, I was thinking I had him right where I wanted him." "Right." "Crack on, then." "Professor." "I'm all right, I'm all right." "Don't waste time attending to me." "(SHOUTING IN FRENCH)" "I'll find them." "I'll find them." "(SIM WHISTLES)" "Turn in three, two, one." "Come on, hurry up!" "MARKO:" "Go!" "(MEN YELLING)" "SIM:" "Did you see my brother?" "HOLMES:" "No, but I'm certain he's been here." "WATSON:" "Where are we going?" " Over that wall." " How did you know I'd find you?" "HOLMES:" "You didn't find me." "You collapsed a building on me." "(SOLDIERS SHOUTING IN GERMAN)" "(SOLDIERS CONTINUE SHOUTING)" "WATSON:" "Where are the horses?" " They're behind." " We need them." " You wanna go back?" "What's our way out?" "That's our way out." "(TRAIN WHISTLE BLOWING)" "(SHOUTING IN GERMAN)" "(IN GERMAN)" "(IN GERMAN)" "(SHOUTING IN GERMAN)" "(GRUNTS)" "(SHOUTS IN GERMAN)" "(COUGHS)" "(GRUNTING)" "(GUARD SHOUTS IN GERMAN)" "(GRUNTS)" "(TRAIN WHISTLE BLOWING)" "SIM:" "Go!" "Go!" "WATSON:" "Come on!" "(PANTS)" "(BREATHES DEEPLY)" "(GUNSHOT)" "Marko!" "Marko!" "(SIGHS)" "(SIM SINGING IN ROMANI)" "He's not breathing." "Cradle his head." "Raise his legs." "Bloody well not gonna die on me." "(WATSON GRUNTING)" "I'm not gonna make this easy on you." "Come on." "Come on." "Come on." "(GRUNTING)" "Come on." "I know you can hear me, you selfish bastard." "Come on!" "I know you can hear me, you bastard." "(SIGHS)" "His wedding gift." "(SCREAMING)" "HOLMES:" "Terrible dream." "You, Mary, Gladstone and I were in a restaurant." "That satanic pony was there as well, a massive fork in his hoof and he turned on me!" "What have you administered?" "Your wedding present." "Who's been dancing on my chest?" "!" "ME." "Why is my ankle so itchy?" "You have a large piece of wood sticking out of it." "Good Lord." "You, Tamas." "I have an important job to discuss with you." "Remind me of it later." "Sit down." "Drink this." "I need to get that out before it turns septic." " Did you call me "selfish bastard"?" " Probably." "Just leave it in." "Leave it...!" "(GROANS)" "You are a..." " Oh, you are some sort of..." " Be nice." "(SIGHS)" "I'm sorry you didn't get to Brighton." "Me too." " I think we should go home." " I concur." "We're going home." "Via Switzerland." "What better place to start a war than a peace summit?" "We'll drop in and see my brother." "I'm sure he's missed you." "Hm?" "I don't understand why you don't cancel the summit." "Fact is it's gonna happen whether we like it or not." "Everyone has already arrived." "Although these gentlemen may be talking peace believe me, they're readying their armies at home." "To cancel the summit now would be tantamount to war." " The telegram, wasn't it clear?" " We have doubled the security, sir." "Oh, doubled security." "That's comforting." "You don't understand the delicacy of the situation." "I passed the telegram on to my superiors." "But they brought Moriarty in to advise on the peace process in the first place." "He has positioned himself brilliantly." "He's one of our foremost intellectuals, a personal friend..." "Of the prime minister." "Yes, we all know that." "I believe you, but where's your evidence?" "He's too good to leave evidence." "He doesn't leave loose ends." "SIM:" "Oh, he's alive." "Sherly, put that down." "What is this contraption?" "May I have it?" "The effect is most invigorating." "That's my private and personal supply of oxygen, and you're not to touch it." "This argument is getting us nowhere." "I've arranged for documents to be prepared which allow you into the ball." "Carruthers." "Stanley, Stanley." "You haven't aged a day." "Is that my favorite chutney?" "Fact is, we don't really know what he's planning." "SIM:" "It won't be another bomb." "WATSON:" "No, it wouldn't be." "SIM:" "It doesn't make sense." "Why would he attack all the nations only to unite them?" "It'll be an assassination." "By alone gunman at close range." "Rene." "Unfortunately, yes." " You knew." " I had my suspicions." "But having seen who would be attending, I'm now certain." "MYCROFT:" "Well, at least we know who to look out for." "Rene will be the evidence." "If we can find him and stop him, we will perhaps not only save his life but prevent the collapse of Western civilization." "No pressure." "Welcome, ambassador." "Professor James Moriarty." "(WALTZ MUSIC PLAYING OVER SPEAKERS)" "MYCROFT:" "Now we're all present I can tell you that the targets are the German chancellor and his ambassador the French prime minister and his man." "And the other nations are really working out which side to take should hostilities erupt." "Prince Michael, a cousin of the czar, and the Russian ambassador." "The Archduke Karl Ludwig and the Austro-Hungarian ambassador." "The Romanian Prime Minister and his ambassador." "And of course our prime minister and the British ambassador." "He'll choose a moment when the dignitaries are assembled, preferably standing still." "Is there to be an official photograph?" "Indeed, yes." "In 38 minutes." "In which case, we might as well dance." "I've never done this before." "Just follow my lead." " What do you see?" " Everything." "(GUESTS CHATTERING)" "That is my curse." "But you don't see what you're looking for." "I thought you'd never ask." "Over my shoulder." "Young man, German uniform, ceremonial sword." "Got him." "HOLMES:" "Professional opinion?" "WATSON:" "Trauma." "Major injury." "But excellent repair work." "Dr. Hoffmanstahl." "HOLMES:" "You did say he was at the forefront of a medical innovation." "We've already seen an example of his skills." "Those twins weren't twins." "My suspicions were aroused in Heilbronn when one failed to go to the aid of the other." "I also noticed the discreet but unmistakable puckering behind the ear where his skin had been drawn back." "I should've realized then that they were a surgical experiment." "To see if it is possible to make one man look like another." "HOLMES:" "His face is no longer his own." "What better way to guarantee his world war than to make the assassin..." "One of the ambassadors." "(MUFFLED GRUNTING)" "That narrows down the possibility to one of six." "You and Sim shall find her brother." " Of this I have no doubt." " Holmes." "You know my methods." "And I know where you'll be." "No possible solution could be more congenial to me than this." "By the way, who taught you how to dance?" "You did." "Well, I've done a fine job." "Be careful." "(INAUDIBLE DIALOGUE)" "(INAUDIBLE DIALOGUE)" "(SPEAKING INDISTINCTLY)" "Shall we go to work?" "Ladies and gentlemen, please, gather for the portrait." "I'm sorry." "Is this a bad time?" "Never better." " Would you bring that clock?" " Heh." "We get to play that game after all." "Here we are." "Don't want you to catch a cold." "A five-minute game?" "If you think you can manage it." "(GUESTS CHATTERING)" "We both have two bishops." "I may be absent from the room, but my methods are not." "You can't mean Dr. Watson, surely." "That doesn't seem fair." "Right." "The surgery will have left scars." "Only four of them have the hairline to hide them." "The ambassador that you replaced with Rene, is he still alive?" "Would you like me to recommend your next move?" "They're all my brother's height, right build but their eyes." "Their eyes are wrong." "Rene has blue eyes." "He could be wearing glass lenses to change the color." "In which case, his eyes will be hurting." "Rene is left-handed." "HOLMES:" "Perhaps the assassin will take measures Io ensure he doesn't give himself away." "Like a gambler concealing a tell." "(INAUDIBLE DIALOGUE)" "I think it might be him." "You think?" "Your clock is ticking." "You have to be sure." "MORIARTY:" "May I remind you, this is blitz chess" "A single miscalculation will cost you the game." "If I tackle the wrong man to the ground, I could start a war." "HOLMES:" "Maybe it's less obvious." "A nervous tic." "A flutter of anxiety." "I expect everyone has a reason to be nervous tonight." "I don't know." "(INAUDIBLE DIALOGUE)" "HOLMES:" "So perhaps it's the opposite:" "A failure to behave naturally." "An actor so consumed with his performance that the one characteristic he cannot accommodate is spontaneous reaction." "(PEOPLE GASPING)" "(IN ROMANI)" "(IN ROMANI)" "(SHOUTS IN FRENCH)" "(PEOPLE SCREAMING)" "Carruthers, protect the prime minister." "(RENE SCREAMING)" "(IN ENGLISH) Germany will pay!" "Mark my words!" "That doesn't bode well, does it?" "Seems your bishop was of some benefit after all." "The game is still young." "Actually, it's in its adolescence." "(RENE CONTINUES SCREAMING)" "RENE:" "There are more of us!" "Germany will pay!" "(RENE GRUNTS)" "(WOMAN SHOUTING IN FRENCH)" "(PEOPLE MURMURING)" "No loose ends." "(PEOPLE CHATTERING IN FOREIGN LANGUAGE)" "What happened to him?" "I'm a doctor." "A doctor!" "(RENE GASPING)" "(CHATTERING)" "(GUARDS SHOUTING IN GERMAN)" "SIM (IN ENGLISH):" "What happened?" " Curare." " What's wrong with him?" "It's poison." "Do something!" "(SIM SPEAKS IN ROMANI)" "Doctor, do something!" "No." "(BOTH SPEAK IN ROMANI)" "(SHOUTS IN ROMANI)" "(SIM SHOUTING IN DISTANCE)" "I think you've just lost your most valuable piece." "But a winning strategy sometimes necessitates sacrifice." "A war has been averted." "Mm." "Oh, I disagree." "How so?" "Didn't you find it strange that the telegram you sent didn't inspire any action to stop me?" "You see, hidden within the unconscious is an insatiable desire for conflict." "So you're not fighting me so much as you are the human condition." "All I want to do is own the bullets and the bandages." "War on an industrial scale is inevitable." "They'll do it themselves within a few years." "All I have to do is wait." "I like Switzerland." "They respect a man's privacy here." "Particularly if he has a fortune." "Bishop takes knight." "Check." "The game is over." "You should get that shoulder looked at." "About that fortune of yours." "I believe it's just been substantially reduced." "King to rook two." "I attended several of your lectures." "The equations of motion, which you will find in my book." "The energy that is required to release these explosions is..." "HOLMES:" "It was in Oslo when I first caught a glimpse of your little notebook red leather-bound from Smythson of Bond Street." "Rook to king's rook three." "Check." "Bishop to rook three." "Its importance was not fully apparent to me until I observed your penchant for feeding pigeons." "Then it occurred that with an empire so enormous even you must keep a record of it somewhere." "Bishop takes bishop." "Rook to bishop four." "I then only required the notebook itself." "You didn't make it easy." "(HOLMES SPEAKS IN FRENCH)" "Just the bags." "I would need to endure a considerable amount of pain." "(GASPS)" "HOLMES:" "Mycroft care of Her Majesty's Secret Service." "But the notebook would undoubtedly be encoded, so how then to break the code?" " Rook takes rook." " Pawn takes rook." "Bishop to bishop seven." "Queen takes knight pawn." "Does The Art of Domestic Horticulture mean anything to you?" "How could a man as meticulous as you own such a book yet completely neglect the flowers in his own window box?" "Irony abounds." "Never mind, it's safe, in London where my colleagues are making good use of it." "The most formidable criminal mind in Europe has just had all his money stolen by perhaps the most inept inspector in the history of Scotland Yard." "Any chance of a cup of tea?" "Box 0403." "CLARK:" "Tick." "MARY:" "Box 0801." " How much more is there?" " That's the end of page two." "Page three." "He'll be making an anonymous donation to the Widows and Orphans of War Fund." "Bishop to bishop eight." "Discover check." "And, incidentally, mate." "I seem to have injured my shoulder." "Would you mind?" "Be my pleasure." "Once we've concluded our business here it's important you know I shall endeavor to find the most creative of endings for the doctor." "And his wife." "HOLMES:" "His advantage, my injury." "My advantage, his rage." "Incoming assault feral, but experienced." "Use his momentum to counter." "MORIARTY:" "Come now." "You really think you're the only one who can play this game." "Trap arm." "Target weakness." "Follow with haymaker." "HOLMES:" "Ah." "There we find the boxing champion of Cambridge." "MORIARTY:" "Competent, but predictable." "Now allow me to reply." "HOLMES:" "Arsenal running dry." "Adjust strategy." "(GROANS)" "MORIARTY:" "Wound taking its loll." "HOLMES:" "As I feared." "Injury makes defense untenable." "Prognosis increasingly negative." "MORIARTY:" "Let's not waste any more of one another's lime." "We both know how this ends." "HOLMES:" "Conclusion, inevitable." "(BOTH CHUCKLE)" "Unless..." "(GRUNTING)" "WATSON:" "A few words may suffice to tell the little that remains." "Any attempt at finding the bodies was absolutely hopeless." "And so there deep down in that dreadful caldron of swirling water and seething foam will lie for all lime the most dangerous criminal... (INAUDIBLE DIALOGUE) ...and the foremost champion of the law of their generation." "I shall' ever regard him as the best... (TYPEWRITER KEYS CLACKING)" "...and the wisest man whom I have ever known." "MARY:" "John?" " John." " Mm-hm." "You should probably pack." "It's half past 2..." " ...and the carriage is coming at 4." " Mm." "It's gonna be a beautiful week in Brighton." "Yes, it'll be fun." "I'm looking forward to it." "You know I miss him too.." "...In my own way." "He would have wanted us to go." "(CHUCKLES)" "He would have wanted to come with us." "When's Mrs. Hudson coming for Gladstone?" "Oh, soon." "Three o'clock." "Mary?" "Who delivered this parcel?" "MARY:" "The postman." "WATSON:" "The usual chap or did he look peculiar?" "(WHIMPERS)" "(SNORTS)"
|
{
"pile_set_name": "OpenSubtitles"
}
|
The effects of an ACTH (4-9) analogue on development of cisplatin neuropathy in testicular cancer: a randomized trial.
The efficacy of the ACTH (4-9) analogue Org 2766 in the prevention of subclinical cisplatin neuropathy was assessed in a double-blind placebo-controlled multi-centre study in patients with testicular cancer or adenocarcinoma of unknown primary. Forty-two patients received at least four cycles of cisplatin (100 mg/m2 per cycle), together with subcutaneous injections of Org 2766 (2 mg/day for 5 consecutive days) or placebo. Vibratory threshold was used as a measure of neuropathy. For each individual patient, the influence of cisplatin on vibratory perception was quantified by the slope of the regression line between the natural logarithm of the vibratory thresholds and the number of cycles. From the slopes, the proportional increase of vibratory threshold per cycle of cisplatin was calculated. On average, vibratory thresholds increased by 42% with each cycle of 100 mg/m2 of cisplatin in the placebo group, and by 19% during treatment with Org 2766. The influence of cisplatin on vibratory thresholds was highly significant in the placebo group (P < 0.0001), and of borderline significance in the group treated with Org 2766 (P = 0.06). The difference in slopes between the two groups was of borderline statistical significance (Wilcoxon's two-sample test: P = 0.06; analysis of variance: P = 0.04). These results show that Org 2766 cannot completely prevent cisplatin neuropathy in young men with testicular cancer, but nerve damage may be ameliorated by the use of this ACTH (4-9) analogue.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Heinrich Lades
Karl Heinrich Lades (4 July 1914 – 4 August 1990) was a German politician of the Christian Social Union (CSU) and mayor of Erlangen from 1959 to 1972.
Private and public life
Lades was born in Nuremberg, spending his childhood in Erlangen. From 1933 to 1939 he studied jurisprudence and economics in Munich and Erlangen, being sent to the Wehrmacht afterwards. After his return from war, he started his career as a politician in Munich, later moving to Bonn.
Mayor of Erlangen
After the death of his predecessor, Michael Poeschke, Heinrich Lades was elected as mayor of Erlangen on 5 July 1959, defeating his only competitor, Peter Zink, with 57.9% of all votes. Lades was reelected in 1965 with 65.1% and 1971 with 51.9%. As changes in territory raised the necessity for an early mayoral election, Lades eventually lost against his successor Dietmar Hahlweg.
References
Sources
Category:1914 births
Category:1990 deaths
Category:People from Nuremberg
Category:Christian Social Union in Bavaria politicians
Category:Mayors of places in Bavaria
Category:Mayors of Erlangen
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Introduction {#s1}
============
Secondhand tobacco smoke (SHS) consists of the side-stream smoke from the burning end of the cigarette, which contains the highest concentration of particulate matter, and the exhaled mainstream smoke [@pone.0034393-First1], [@pone.0034393-Spengler1]. Exposure to SHS is associated with diverse health effects in nonsmokers including heart disease, lung cancer, asthma flares, chronic obstructive pulmonary disease (COPD), and upper airway problems such as sinusitis [@pone.0034393-Eisner1], [@pone.0034393-Kawachi1], [@pone.0034393-Lam1], [@pone.0034393-Taylor1], [@pone.0034393-Eisner2], [@pone.0034393-Eisner3], [@pone.0034393-Pitsavos1], [@pone.0034393-Pitsavos2]. Occupational exposure to SHS presents a substantial health risk to workers [@pone.0034393-Hammond1], [@pone.0034393-Hammond2]. Flight attendants who worked on commercial aircraft before the ban on cigarette smoking (pre-ban FAs) experienced poor air quality and high levels of SHS in aircraft regardless of their class or cabin section [@pone.0034393-Lindgren1], [@pone.0034393-Neilsen1]. A pre-ban era chemical analysis of post-flight urine samples from these FAs showed elevated levels of urinary cotinine (a major metabolite of nicotine) close to levels currently observed in light or experimental smokers [@pone.0034393-Benowitz1], [@pone.0034393-Goniewicz1], which signifies that the FAs had been exposed to substantial levels of tobacco smoke on these aircraft [@pone.0034393-Repace1], [@pone.0034393-Samet1].
We previously showed a cohort of healthy never-smoking pre-ban FAs with significant history of exposure to SHS had abnormal lung function [@pone.0034393-Arjomandi1]. This cohort had curvilinear flow-volume curves (concave to the volume axis) and reduced airflow at mid and low lung volumes. More impressively, over half of the cohort had abnormal single breath carbon monoxide diffusing capacity (DcoSB) below the lower 95% prediction limit based on Crapo\'s reference equations [@pone.0034393-Crapo1].
To further characterize the pulmonary function abnormalities in this cohort of pre-ban FAs, we performed 1-min interval, progressive incremental, symptom-limited cardiopulmonary exercise testing in the supine posture and then measured diffusing capacity at incremental workloads during exercise. Our hypothesis was that since cardiopulmonary exercise is a more sensitive tool for detecting lung function abnormalities, all of pre-ban FAs would have an abnormal exercise response. In particular, we hypothesized that the pre-ban FAs with abnormal resting DcoSB (lower than 95% prediction limit) would have lower pulmonary capillary recruitment with exercise compared to those with normal levels of resting DcoSB (above the lower 95% prediction limit), and that at least some of the FAs with normal levels of resting DcoSB would also show lower exercise-induced increase in their diffusing capacity, indicating that even the FAs with "normal" resting DcoSB might have reduced pulmonary capillary recruitment.
Methods {#s2}
=======
Ethics Statement {#s2a}
----------------
The UCSF Institutional Review Board (IRB), the Committee on Human Research, approved this study. Written IRB-approved informed consent was obtained from all study participants.
Study Design {#s2b}
------------
This was an observational cross-sectional study with convenience sampling of pre-ban FAs. Full details of the study methods are available in ([Methods S1](#pone.0034393.s005){ref-type="supplementary-material"}).
Study Population {#s2c}
----------------
Between July 2003 and December 2010, we recruited pre-ban female FAs as part of a clinical investigation of the health effects of the cabin environment on flight attendants employed before and after the ban on smoking on commercial aircraft. Flight attendants were eligible to participate in the study if they had worked for at least five years on aircraft before the airline ban on cigarette smoking, were never-smokers (smoked less than 100 cigarettes lifetime), and had no previous clinical diagnosis of cardiac, pulmonary, or other diseases that could have adversely affected their pulmonary function. All subjects completed health and SHS exposure questionnaires [@pone.0034393-Arjomandi1], had a physical examination, and underwent pulmonary function testing and cardiopulmonary exercise testing. Full details of our methods are available in ([Methods S1](#pone.0034393.s005){ref-type="supplementary-material"}).
Cardiopulmonary Exercise testing {#s2d}
--------------------------------
Following an explanation of the exercise studies, the subject performed a physician-supervised, symptom-limited progressively increasing exercise test in the supine position on an electromagnetically braked, supine cycle ergometer (Medical Positioning Inc. Kansas City, MO). Subjects were advised to do their best, but otherwise were not encouraged; they could stop voluntarily at any time they believed they could not continue. We continuously monitored heart rate, blood pressure (BP), electrocardiogram (ECG), and breath-by-breath gas exchange.
The protocol consisted of 3-min rest, 1-min unloaded (freewheeling) cycling at 60 rpm, followed by increasing work rate of 20--30 Watts to a maximum tolerated, and 5-min of recovery. Twelve lead ECGs were monitored continuously and were recorded along with BP every 2 min. Oxyhemoglobin saturation (O~2~sat) determined by pulse oximetry was recorded continuously.
Subjects were rested for 30 min and a repeat exercise study was performed. In this second exercise study, incremental exercise in the supine posture on the same supine cycle ergometer was conducted using 6-min stages at 20, 40, 60, and 80% of maximum observed work, measuring within breath diffusing capacity (DcoWB), pulmonary blood flow (), and HR in duplicate at each stage. Measurements of DcoWB and were performed using a rapid infrared analyzer system via breath-by-breath metabolic measurement as described extensively previously [@pone.0034393-Newth1], [@pone.0034393-Huang1], [@pone.0034393-Martonen1], [@pone.0034393-Wilson1], [@pone.0034393-Ramage1].
Data Management and Analysis {#s2e}
----------------------------
Distributions of subjects\' characteristics (i.e., age, pulmonary function) were computed for all subjects. Measures of pulmonary function at rest as well cardiac and respiratory responses to exercise, based on percent predicted of normal, were calculated and examined. Differences in characteristics, pulmonary function, and exercise responses between the two groups of FAs with resting DcoSB below or above the lower 95% prediction limit were examined using Student\'s t-test.
The percent predicted values for DcoWB at 40% maximum observed exercise were calculated using reference equations from Huang et al measured at 40% maximum observed exercise (DcoWB at rest = −0.057\*age+0.221\*height-11.525; DcoWB at 40% exercise = −0.023\*age+0.324\*height-25.273; reference equations for women) [@pone.0034393-Huang1], and Charloux et al (DcoWB = 1.77\*+12.16; reference equation not stratified by gender) [@pone.0034393-Goniewicz2].
Generalized estimating equations were used to compute regression lines for changes in DcoWB and with increasing exercise as well as changes in DcoWB with . The differences in exercise-induced changes in DcoWb and between the groups of FAs were examined using an interaction term in the regression models.
Linear regression models were used to examine the association between resting DcoSB, DcoWB at baseline (0% work), and DcoWB at 40% maximum observed work and years of aircraft cabin SHS exposure. To account for other potential cabin factors [@pone.0034393-Lindgren1], [@pone.0034393-Rayman1], the years of SHS exposure (pre-ban years of employment) was adjusted for total years of employment in regression models. The association between lung function and years of cabin SHS exposure were modeled using LOWESS smoother (locally weighted scatterplot smoothing) analysis. Based on these models, a subgroup of pre-ban FAs with history of more than 10 years of cabin SHS exposure was identified and used for further analysis of the associations. All analyses were conducted in STATA (version 12.0).
Results {#s3}
=======
Subjects characteristics {#s3a}
------------------------
Characteristics of the pre-ban FAs are shown in [Table 1](#pone-0034393-t001){ref-type="table"}. Overall, 80 FAs were recruited for the study. Subjects were all healthy women between the ages of 41 and 76 who were never-smokers as defined by a lifetime history of less than 100 cigarettes use. None of the subjects were obese as defined by a body mass index (BMI)≥30, and none of them had any history of cardiopulmonary diseases or systemic diseases that may affect the cardiopulmonary function. All subjects exercised regularly (3 to 5 times weekly).
10.1371/journal.pone.0034393.t001
###### Characteristics of pre-ban flight attendants.
{#pone-0034393-t001-1}
Subject Characteristics All FAs FA with normal Dco FA with abnormal Dco p-value
-------------------------------------------------------- ------------ -------------------- ---------------------- --------------
Number 80 40 40 \-
Age (years) 60.3±6.7 61.2±6.0 59.4±7.3 0.231
Height (cm) 164±5 164±6 165±5 0.321
BMI (kg/m^2^) 23.7±3.1 23.6±2.8 23.8±3.3 0.794
Hemoglobin level (g/dl) 14.1±1.1 14.2±1.1 13.9±1.1 0.213
DcoSB adjusted for Hgb (ml/min/mmHg) 20.0±3.0 21.7±2.9 18.3±2.1 **\<0.0001**
DcoSB adjusted for Hgb (% predicted) 77.0±1.1 84.6±7.6 69.5±5.1 **\<0.0001**
DcoSB adjusted for Hgb & alveolar volume (ml/min/mmHg) 4.3±0.5 4.4±0.5 4.1±0.5 **0.004**
DcoSB adjusted for Hgb & alveolar volume (% predicted) 81.3±9.5 84.9±9.2 77.8±8.6 **0.0006**
FEV~1~ (L) 2.56±0.38 2.60±0.31 2.51±0.43 0.289
FEV~1~ (% predicted) 102.5±13.7 105.8±13.8 99.3±12.6 **0.032**
FVC (L) 3.38±0.52 3.46±0.48 3.30±0.55 0.152
FVC (% predicted) 106.8±14.2 110.4±14.1 103.3±13.6 **0.023**
FEV~1~/FVC 0.76±0.04 0.75±0.04 0.76±0.05 0.635
TLC (L) 5.14±0.65 5.23±0.66 5.05±0.63 0.270
V~A~ (L) 4.70±0.61 4.91±0.53 4.49±0.61 **0.001**
TLC (% predicted) 100.5±10.0 102.3±9.5 98.6±10.3 0.141
V~A~ (% predicted) 91.4±10.3 95.8±8.7 87.1±10.1 **0.0001**
Air trapping \[TLC -- V~A~\] (L) 0.46±0.34 0.34±0.39 0.58±0.24 **0.004**
Total length of employment (years) 26.8±10.0 26.5±10.6 27.1±9.5 0.840
Pre-ban length of employment (years) 18.4±8.2 18.4±7.6 18.5±8.8 0.940
Data is shown in mean ± standard deviation. Subjects were all female. Abbreviations: BMI: body mass index; DcoSB: single breath diffusing capacity; Hgb: hemoglobin; FEV~1~: forced expiratory volume in 1 second; FVC: forced vital capacity; TLC: total lung capacity measured by body plethysmography; V~A~: alveolar volume measured by single breath helium dilution.
Total years of airline employment varied in length between 6 and 40. The FAs\' estimated length of exposure to aircraft cabin SHS (pre-smoking ban employment) was between 3 and 33 years representing a range of 15% to 100% of the total length of their active duty employment.
As we had shown previously in a smaller cohort [@pone.0034393-Arjomandi2], half of the subjects had DcoSB at rest below the 95% prediction limit of their normal values for their sex, age, and height, based on Crapo\'s reference equations [@pone.0034393-Crapo1] (40 FAs had "abnormal Dco" and 40 had "normal" Dco). While all FAs had normal FEV~1~, FVC, and FEV~1~ to FVC ratio (FEV~1~/FVC), those with abnormal resting DcoSB had a slightly lower FEV~1~ and FVC but similar FEV~1~/FVC ([Table 1](#pone-0034393-t001){ref-type="table"}).
Exercise Capacity {#s3b}
-----------------
All FAs achieved a normal maximum exercise level based on maximum work and oxygen uptake (greater than 83% predicted value by Wasserman et al. [@pone.0034393-Wasserman1]). However, the FAs with abnormal resting DcoSB achieved lower levels of maximum exercise as indicated by lower maximum predicted work rate (mean±SD: 123.9±31.6 vs. 132.6±24.2%predicted watts, p = 0.020), and lower maximum oxygen uptake (max) (1.24±0.30 vs. 1.39±0.26 L/min, p = 0.019 and 88.7±2.9 vs. 102.5±3.1%predicted max, p = 0.001) ([Table 2](#pone-0034393-t002){ref-type="table"} & [Figure S1](#pone.0034393.s001){ref-type="supplementary-material"}). In regression models, the max was linearly associated with resting DcoSB (parameter estimate (PE)±SEM: 0.59±0.22; r = 0.29; p = 0.009) ([Figure 1A](#pone-0034393-g001){ref-type="fig"}) and with FEV~1~ (PE±SEM: 0.54±0.18; r = 0.33; p = 0.003) ([Figure 1B](#pone-0034393-g001){ref-type="fig"}) across all subjects. The Borg score for shortness of breath fatigue, and effort at maximum observed work [@pone.0034393-Borg1], [@pone.0034393-Belman1] was not significantly different between the two groups of FAs.
{#pone-0034393-g001}
10.1371/journal.pone.0034393.t002
###### Exercise Capacity.
{#pone-0034393-t002-2}
Subject Characteristics All FAs FA with normal Dco FA with abnormal Dco p-value
------------------------------------------- ------------ -------------------- ---------------------- -----------
Maximum work achieved (watts) 128.3±28.3 132.6±24.2 123.9±31.6 0.169
Maximum work achieved (% predicted watts) 128.9±33.2 137.4±30.2 120.3±34.3 **0.020**
Maximum (L/min) 1.32±0.29 1.39±0.26 1.24±0.30 **0.019**
Maximum (% predicted ) 95.6±20.2 102.5±19.7 88.7±18.6 **0.001**
Maximum (L/min) 1.60±0.42 1.67±0.38 1.52±0.45 0.154
R at maximum work 1.23±0.14 1.23±0.12 1.24±0.16 0.706
Shortness of Breath (Borg Scale) 4.2±2.0 4.5±2.1 3.8±1.9 0.158
Effort (Borg Scale) 5.0±1.9 5.2±2.0 4.7±1.8 0.278
Fatigue (Borg Scale) 4.6±2.0 4.9±2.1 4.1±1.8 0.103
Data is shown in mean ± standard deviation. N = 80; abbreviations: : Oxygen uptake; : carbon dioxide output; R: respiratory gas exchange ratio.
Cardiac Response to Exercise {#s3c}
----------------------------
The reduction in exercise capacity was associated with a significantly decreased maximum O~2~ pulse (oxygen uptake per heart beat) and decreased anaerobic threshold (AT) in FAs with lower resting DcoSB ([Table S1](#pone.0034393.s003){ref-type="supplementary-material"}). The stroke volume increased as expected with exercise in all FAs from a baseline of 0.067±0.022 (L/beat) measured in the supine posture at rest to 0.078±0.021 (L/beat) at 20% maximum observed exercise (p\<0.0001), and then plateaued with increasing levels of exercise. The stroke volume and its pattern of change with exercise was not significantly different between the two groups of FAs, which suggests that the decreased aerobic capacity observed in pre-ban FAs with lower resting DcoSB was due to a smaller arteriovenous (A-V) oxygen difference in this group [@pone.0034393-Wasserman1]. There was no difference in other cardiovascular measurements ([Table S1](#pone.0034393.s003){ref-type="supplementary-material"}).
Respiratory Response to Exercise {#s3d}
--------------------------------
The respiratory response to exercise in both groups was normal as reflected by the maximum levels of minute ventilation, respiratory gas exchange ratio (R), respiratory rate, tidal volume, total inspiratory time as a fraction of total respiratory cycle (Ti/Tot), and ventilatory equivalent of CO~2~ (/) ([Table S2](#pone.0034393.s004){ref-type="supplementary-material"}).
Diffusing Capacity during Exercise {#s3e}
----------------------------------
The mean absolute difference between DcoWB and DcoSB values measured at rest in all FAs was 1.54±1.96 ml/min/mmHg (p\<0.0001). There was a significant correlation between the DcoWB and DcoSB values measured at rest in all FAs (Pearson\'s correlation coefficient = 0.67, p\<0.0001) ([Figure S2](#pone.0034393.s002){ref-type="supplementary-material"}).
The DcoWB during exercise increased linearly with increasing work rate for all FAs. However the DcoWB in FAs with abnormal resting DcoSB increased less rapidly with increased work rate compared to the FAs with normal resting DcoSB (PE±SEM: 1.36±0.16 vs. 1.90±0.16 ml/min/mmHg per 20% increase in predicted watts; p = 0.020) ([Figure 2A](#pone-0034393-g002){ref-type="fig"}). The absolute and percent predicted (based on available reference equation measured at 40% maximum observed work [@pone.0034393-Huang1]) differences between DcoWB values measured at 40% of maximum observed exercise between the two groups of FAs were 4.9±1.0 ml/min/mmHg (p\<0.0001) and 13.8±3.0%predicted (p\<0.0001), respectively ([Table 3](#pone-0034393-t003){ref-type="table"}). Stratification of the FAs into tertiles or quartiles based on increasing resting DcoSB (15% or 10% increase in DcoSB, respectively) showed a similar pattern of lower increase in DcoWB with lower tertile or quartile of DcoSB ([Figures 2B and 2C](#pone-0034393-g002){ref-type="fig"}), suggesting that the effect of lower DcoSB on exercise-induced increase of DcoWB is incremental.
{#pone-0034393-g002}
10.1371/journal.pone.0034393.t003
###### Within-Breath Diffusing Capacity (DcoWB) at rest and with exercise.
{#pone-0034393-t003-3}
Subject Characteristics All FAs FA with normal Dco FA with abnormal Dco p-value
---------------------------------------------------------------------------------------------- ----------- -------------------- ---------------------- --------------
DcoWB at rest (ml/min/mmHg) 20.1±3.5 21.4±3.6 18.7±2.8 **0.0004**
DcoWB at rest (% predicted Huang[\*](#nt104){ref-type="table-fn"}) 93.8±14.9 100.8±14.7 86.5±11.2 **\<0.0001**
DcoWB at rest (% predicted Charloux[\*\*](#nt104){ref-type="table-fn"}) 96.3±21.4 103.8±20.3 88.7±20.0 **0.001**
DcoWB at 40% maximum observed work (ml/min/mmHg) 24.8±4.9 27.1±4.9 22.3±3.6 **\<0.0001**
DcoWB at 40% maximum observed work (% predicted Huang[\*](#nt104){ref-type="table-fn"}) 91.5±14.9 98.4±14.4 84.5±12.0 **\<0.0001**
DcoWB at 40% maximum observed work (% predicted Charloux[\*\*](#nt104){ref-type="table-fn"}) 91.7±18.0 98.8±18.2 84.0±14.3 **0.0002**
. Data is shown in mean ± standard deviation. Subjects were all female (N = 80).
: based on predicted values from Huang and Charloux, respectively [@pone.0034393-Crapo1], [@pone.0034393-Wilson1]. Abbreviation: DcoWB: within-breath diffusing capacity.
The pulmonary flow () increased with increasing work rate in both groups of FAs and there were no significant differences in the rate of increase between the FAs with normal and abnormal resting DcoSB (PE±SEM: 0.053±0.007 vs. 0.040±0.004 L/min/%predicted watts; p = 0.097) ([Figure 3A](#pone-0034393-g003){ref-type="fig"}). However, the DcoWB increased less rapidly with increasing in FAs with abnormal resting DcoSB than in those with normal resting DcoSB: (PE±SEM: 0.093±0.06 vs. 1.47±0.09 ml/min/mmHg/L/min; p = 0.0001) ([Figure 3B](#pone-0034393-g003){ref-type="fig"}).
{#pone-0034393-g003}
Association with Exposure to SHS {#s3f}
--------------------------------
The pre-ban length of employment (our proxy for aircraft cabin SHS exposure) was similar between the two groups of FAs with normal and abnormal DcoSB at rest. While neither DcoSB nor DcoWB at rest were associated with years of SHS exposure, DcoWb during exercise showed a trend towards inverse association with years of cabin SHS exposure. Using percent predicted equation by Huang et al [@pone.0034393-Huang1], the pre-ban FAs, DcoWB at 40% maximum observed workload showed a trend inverse association with years of cabin SHS exposure (PE±SEM: −0.64%±0.37%, p = 0.095). In a subgroup of FAs with more than 10 years of cabin SHS exposure, the inverse association was statistically significant (PE±SEM: −0.99%±0.48%, r = 0.32 p = 0.032), suggesting a decrease of 0.99% in DcoWB for every year of SHS exposure beyond the first 10 years ([Figure 4](#pone-0034393-g004){ref-type="fig"}). Using percent prediction equations by Charloux et al [@pone.0034393-Goniewicz2] produced similar results (PE±SEM: −1.25%±0.55%; p = 0.029 at 40% workload and −1.19%±0.59%; p = 0.050 at 60% workload in the subgroup with history of more than 10 years of SHS exposure).
{#pone-0034393-g004}
Discussion {#s4}
==========
In this study of 80 never-smoking pre-ban FAs with significant history of exposure to SHS, we confirmed our previous findings in a smaller cohort that about half of the pre-ban FAs had decreased resting diffusing capacity (DcoSB) below the 95% prediction limit as well as curvilinear flow-volume curves (concave to the volume axis) and decreased air flow at mid and low lung volumes. More importantly, we found that those FAs with reduced resting DcoSB had lower exercise capacity as indicated by their maximum predicted work (watts) and maximum oxygen uptake (). This lower exercise capacity was associated with decreased oxygen uptake per breath (O~2~ pulse) and decreased anaerobic threshold (anaerobic threshold was reached at lower absolute and lower % predicted value of maximum ). In addition, the exercise capacity was directly associated with their FEV~1~ at baseline. Furthermore, we found that while the two groups of FAs had similar pulmonary blood flow (), those with reduced DcoSB at rest increased their diffusing capacity with exercise (DcoWB) less with increasing workload and pulmonary blood flow, which indicates that despite exercise-induced increase in pulmonary blood flow, they had reduced pulmonary capillary recruitment. Finally, although no association between the resting diffusing capacity and SHS exposure was observed in our cohort, the diffusing capacity during exercise showed a trend association with the years of SHS exposure with the association reaching a significant level in those FAs with more than 10 years of exposure.
Our finding of decreased exercise capacity in the group of FAs with reduced resting diffusing capacity is interesting as none of FAs had any history of cardiopulmonary diseases and all reported exercising regularly 3 to 5 times weekly. Although the average maximum watts and average peak achieved by all the FAs were within the normal reference range, the FAs with reduced resting diffusing capacity achieved significantly lower levels compared to those with higher resting diffusing capacity, and many within the former group achieved maximum work levels well below the normal reference range (25% only achieved levels below the 77% maximum predicted ). The lower exercise capacity of this group of FAs is likely due to decreased aerobic capacity as reflected by decreased at AT and decreased O~2~ pulse. Since the stroke volume was similar between the two groups of FAs, the decreased aerobic capacity thus appears to be due to decreased arteriovenous (A-V) oxygen difference, which in turn suggests an abnormal distribution of oxygenated blood to non-essential tissues and reduced distribution of oxygenated blood to exercising muscle [@pone.0034393-Wasserman1]. We also demonstrated that FEV~1~ was a predictor of exercise capacity in a linear fashion. The correlation coefficient of 0.33 between exercise capacity and FEV~1~ reflects a medium effect size according to the criteria of Cohen [@pone.0034393-Cohen1], and thus is consistent with a physiologically meaningful association. Given the presence of curvilinearity in flow-volume loops and decreased flow at mid and low lung volumes in the cohort, this association suggests that dynamic airflow obstruction may play a role in decreased exercise capacity of the FAs.
The decreased exercise capacity and lower exercise-induced increase in diffusing capacity in the FAs with reduced resting diffusing capacity further substantiate our previous findings of abnormal resting pulmonary function tests (i.e. decreased flow in low- and mid-lung volumes, air trapping, and reduced resting diffusing capacity) in this cohort with significant history of SHS exposure. The lower increase in exercise diffusing capacity, its incremental nature based on resting diffusing capacity, and lower ratio of diffusing capacity to pulmonary blood flow during exercise suggest that these FAs have reduced pulmonary capillary bed recruitment. Further anatomic or physiologic studies such as CT imaging or assessment of the inspiratory flow-volume loop assessment during exercise could help elucidate the underlying cause.
The finding that the FAs with reduced resting diffusing capacity had a lesser exercise-induced increase in their diffusing capacity with various stratification confirms our hypothesis that even some of the FAs with resting diffusing capacity within the 95% "normal" prediction limit had reduced pulmonary capillary recruitment. In addition, it shows that the diffusing capacity during exercise is a more sensitive measure of underlying abnormalities in pulmonary capillary bed than resting diffusing capacity. Together, these results show that the observation of a normal diffusing capacity at rest may not indicate that the pulmonary capillary recruitment during exercise will be normal.
The association between diffusing capacity during exercise and cabin years of SHS exposure had a two-tailed p-value of 0.095; however, if we assume that the adverse event on lung function would only be seen with increased SHS exposure (a one-tail assumption), the association then becomes significant (one-tail p-value of 0.048). In addition, the LOWESS smoother analysis showed a significant lung function and SHS exposure association (two-tailed p-value of 0.032) in the subgroup of FAs who had a longer SHS exposure history, a finding that is supported by the plausible biologic mechanism that higher exposure could cause higher adverse events. The correlation coefficient (r) of 0.32 between diffusing capacity during exercise and cabin years of SHS exposure represents a medium effect size according to the criteria of Cohen [@pone.0034393-Cohen1], and thus is not only statistically significant, but also is consistent with a meaningful association. Although most FAs did report additional SHS exposure apart from cabin exposure, it is expected that their non-cabin related SHS exposure was relatively insignificant compared to the intensity of their exposure while aboard aircraft [@pone.0034393-Repace1]. In a previous study of this cohort, we investigated potential contribution of non-cabin related SHS exposure to subjects\' lung function via comparison of the subjects with only cabin SHS exposure and those reported additional non-airline SHS exposure (i.e. exposure during childhood, adulthood, and/or non-airline employments), and did not find any significant differences in lung function between the two groups [@pone.0034393-Arjomandi1], which also suggest that non-cabin SHS exposure in FAs was dwarfed by their cabin SHS exposure.
Overall, our findings provide strong physiologic evidence consistent with presence of emphysema and/or COPD in this cohort of never-smoking FAs who were exposed to high concentrations of SHS for extended periods of time in the aircraft cabin. It remains unclear whether the pulmonary function abnormalities seen in this cohort are stable or progressive.
Our study has several possible limitations. First, and from a technical standpoint, performing the within breath diffusing capacity (DcoWB) measurement during exercise requires excellent self-control of breathing by the subject to maintain a low and constant expiratory flow, even if the subject is able to see and monitor flow on a screen during the maneuver. The measurement becomes increasingly difficult to perform at high workloads. To improve distribution of blood flow and ventilation-perfusion matching, we elected to perform our studies in the supine posture [@pone.0034393-Stokes1]. We aimed to attain maximum recruitment of the pulmonary capillary bed and diffusing capacity at a lower work rate during supine exercise rather than in the erect posture, thus easing the demands on the subject to control breathing during the test maneuver. The FAs who participated in our study were able to perform the DcoWB technique reliably during exercise from rest to 60% maximum observed work rate, but few were able to reach 80% let alone near maximum work rates. However, as shown in the [results](#s3){ref-type="sec"} section, DcoWB increased with workloads and in a linear manner with no evidence of a plateau up to the maximum levels measured in FAs. Reproducibility of the DcoWB measurements was within 5%, which was considered satisfactory, and linear relationships were observed between DcoWB and and were similar to those reported previously by other investigators [@pone.0034393-Huang1], [@pone.0034393-Goniewicz2]. Second, in contrast to previous studies, we felt carbon monoxide (CO) backpressure on DcoWB measurement had to be considered. Stokes [@pone.0034393-Stokes2] and Huang [@pone.0034393-Huang2] concluded the effect was negligible in their studies. Charloux et al found carboxyhemoglobin levels increased from 0.3% to 5.2% after 12 measurements in 4 subjects. In our study, carboxyhemoglobin levels increased from 0.3% to 10% after 12 measurements, and thus, we adjusted DcoWB for changes in hemoglobin and carboxyhemoglobin. Third, our study, which was a cross-sectional study of a group of FAs with a remote and unique high SHS exposure, did not include a similar control population for comparison. However, we used the available established prediction formulas to determine whether the obtained physiologic measurements were within the "normal" range. The appropriate control groups for our pre-ban FAs would be post-smoking ban flight attendants, who have been exposed to aircraft cabin [@pone.0034393-Lindgren1], [@pone.0034393-Rayman1] except for SHS, and "ground-level" controls with no history of significant SHS exposure, both of which are challenging control groups as the post-ban flight attendants are in general younger and the "ground-level" controls do not have the specific exposure to non-SHS cabin factors that may contribute to lung function abnormalities. Of note, the normal predicted values include a wide range, and if one could show a longitudinal decline for an individual with time, even a value within the normal range may be considered to be abnormal. While our study was a cross-sectional one with measurements at a single time point, we were able to show that some FAs with normal resting diffusing capacity had abnormal physiologic responses to exercise, which suggest that despite having resting values within the "normal" range, they had abnormal pulmonary function. Fourth, the pulmonary function tests abnormalities of the FAs in this study do not meet the definition of COPD by GOLD criteria as the FAs had FEV~1~ within the normal predicted range and as they did not have any respiratory complaint at baseline. Traditionally, both COPD diagnosis and severity evaluation have been based on spirometry [@pone.0034393-Rabe1], [@pone.0034393-Celli1], and change in FEV~1~ over time is still the most widely accepted measure of disease progression. However, FEV~1~ has limitations as it measures only one aspect of the disease and is not predictive of disease progression, especially in early disease [@pone.0034393-Nishimura1], [@pone.0034393-Gelb1], [@pone.0034393-Franciosi1]. In addition, COPD patients with similar FEV~1~ may show very different underlying pathologies, for example predominantly airspace disease (i.e. emphysema) or disease of the airways, as manifested by increased airway wall thickness [@pone.0034393-Gelb1]. Thus, we believe that despite the "normal" GOLD classification of the FAs in our cohort, the physiologic abnormalities that we have observed in them are best explained and most consistent with presence of COPD and emphysema [@pone.0034393-Wan1]. Finally, we estimated the SHS exposure through the proxy of years of pre-ban employment using our occupational/employment questionnaire [@pone.0034393-Arjomandi2]. This method of SHS assessment may not be adequately sensitive for true amount of SHS exposure and may also be prone to recall bias. However, the cabin SHS exposure, which is relatively readily quantified using employment history, was much higher than levels experienced outside aircraft cabin in most circumstances [@pone.0034393-Repace1], and dwarfs the non-cabin SHS exposure for these pre-ban FAs.
In conclusion, in this cohort of never-smoking pre-ban FAs with remote but significant history of cabin SHS exposure, we found physiologic abnormalities consistent with presence of emphysema and/or COPD. The FAs with lower diffusing capacity had exercise limitation and lower increase in their diffusing capacity with increasing workload and increasing pulmonary blood flow suggesting that those with lower resting diffusing capacity had reduced pulmonary capillary bed recruitment. Exposure to SHS in the aircraft cabin seemed to be a predictor for lower diffusing capacity during exercise in those with higher history of SHS exposure.
Supporting Information {#s5}
======================
######
**Maximum work, maximum oxygen uptake (** **), and maximum ventilatory equivalent of carbon dioxide (** **/** **) for never smoking pre-smoking ban flight attendants.** Black and white bars represent flight attendants with normal and abnormal resting diffusing capacity, respectively.
(TIF)
######
Click here for additional data file.
######
**Correlation between single breath carbon monoxide diffusing capacity at rest (sitting position) and within breath diffusing capacity in supine position.**
(TIF)
######
Click here for additional data file.
######
**Cardiovascular response to exercise.** Data is shown in mean ± standard deviation. \* N = 80; subjects were all female. Abbreviations: SBP: systolic blood pressure; DBP: diastolic blood pressure; : Oxygen uptake; AT; anaerobic threshold.
(DOC)
######
Click here for additional data file.
######
**Respiratory response to exercise.** Data is shown in mean ± standard deviation. \* N = 80; subjects were all female. Abbreviations: SBP: systolic blood pressure; DBP: V~T~: tidal volume; diastolic blood pressure; : minute ventilation; : Oxygen uptake; /: ventilatory equivalent of CO~2~; AT: anaerobic threshold; R: Respiratory gas exchange ratio.
(DOC)
######
Click here for additional data file.
######
**Supplemental methods.**
(DOC)
######
Click here for additional data file.
We would like to thank Kizza Chadiha, Cecilia Yu, and Susan Beaulien for assistance with subject recruitment, Oliver Beech, Patricia Vollmer, and Emily Ghio for their help with performance of cardiopulmonary exercise testing, and Drs. Jay Nadel and Paul Blanc for their consultation. We also would like to appreciate the contribution of the flight attendants who took time out of their busy schedules to participate as research subjects in this study.
**Competing Interests:**The authors have declared that no competing interests exist.
**Funding:**Funding provided by The Flight Attendants Medical Research Institute, The National Institutes of Health (K23 HL083099), Northern California Institute for Research and Education and the University of California San Francisco Cardiovascular Research Institute Faculty Development Funds. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
[^1]: Conceived and designed the experiments: WMG MA. Performed the experiments: WMG MA. Analyzed the data: MA TH WMG NS. Contributed reagents/materials/analysis tools: WMG MA TH. Wrote the paper: MA WMG. Obtained funding: WMG MA RR. Recruited Subjects: RR MA WMG.
|
{
"pile_set_name": "PubMed Central"
}
|
873 F.2d 1181
UNITED STATES of America, Plaintiff-Appellee,v.Jerald Wayne DICKERSON, Claimant-Appellant,v.ONE CESSNA 421 B, AIRCRAFT, Defendant.
No. 87-6003.
United States Court of Appeals,Ninth Circuit.
Submitted Jan. 7, 1988*.Decided June 14, 1988.Second Amended Opinion April 26, 1989.
Victor Sherman, Santa Monica, Cal., for claimant-appellant.
James R. Sullivan, Asst. U.S. Atty., Civil Div., Los Angeles, Cal., for plaintiff-appellee.
Appeal from the United States District Court for the Central District of California.
Before PREGERSON, CANBY and WIGGINS, Circuit Judges.
WIGGINS, Circuit Judge:
1
Jerald Wayne Dickerson appeals the forfeiture of his Cessna airplane. The plane was seized by U.S. Customs agents pursuant to federal forfeiture statutes. 19 U.S.C. Sec. 1703; 21 U.S.C. Sec. 881(a)(4). The district court held that Dickerson's plane was subject to forfeiture under either statute. Under section 881(a)(4), the government must first demonstrate that there was probable cause to believe the conveyance seized was used or intended to be used in narcotics transport. We conclude that the government failed to demonstrate probable cause because it did not sufficiently demonstrate that it secured Dickerson's airplane between the time it was seized and when it was searched. We also conclude that the airplane is not subject to forfeiture under section 1703. We REVERSE.
FACTS
2
On February 27, 1986, at about 6:30 a.m., U.S. Customs and Marine Corps radar operators picked up a target aircraft in Mexico heading north toward the United States. The plane crossed into the United States near Mexicali. The plane did not stop in Calexico, California, the required Airport of Entry, for transition into the United States in that area. The plane proceeded to the Hemet-Ryan Airport where it landed about 7:18 a.m. A trailing customs aircraft identified the plane as a Cessna 421 and was able to make out the FAA tail registration number (N211PH). The plane left Hemet-Ryan three minutes later, without its pilot contacting anyone. A second Customs airplane was dispatched to intercept the suspect plane. At about 8:00 a.m. the Customs planes detected the target making numerous turns and course changes in the Banning Pass area. At about 8:30 a.m., the target turned north and proceeded over the San Bernardino mountains toward Apple Valley, California. The plane circled Apple Valley Airport and appeared to be entering the Airport's traffic pattern for landing when it made an abrupt 180 turn and proceeded back into Banning Pass. For the next 30 to 45 minutes, the plane circled and turned in the Banning Pass area, flying close to the contours of the mountains. The target then left Banning Pass and flew east. It circled the Thermal Airport and on its second pass lowered its gear to land. On its final approach, while over the end of the runway, it retracted its landing gear and headed south over the Salton Sea. The plane crossed back into Mexico at approximately 9:57 a.m.
3
Radar followed the plane to the Punta Penasco airstrip in Mexico where it landed. Customs aircraft maintained a border patrol and at 11:40 a.m. the plane again appeared on radar scopes heading north to the United States. The aircraft entered the United States at about 12:00 p.m. Again, the plane did not legally enter or declare, as required, at Calexico, California. Customs aircraft briefly intercepted the plane, but lost it as it rapidly descended to less than 100 feet above ground level. The airplane landed at Holtville Airport and remained on the ground for about 15 minutes. When the plane departed Holtville, a Customs aircraft again spotted the target and pursued it to Desert Air Sky Ranch. The plane landed and was blocked by a closely following Customs aircraft. Its registration number was N211PH. Dickerson, the pilot of the plane, was arrested and the plane was searched. No narcotics nor debris of narcotics were found. Inspection of the aircraft showed that its rear seats had been removed. A carpet was found rolled up in the back of the cargo space. The cargo space behind the front seats was 12 feet long, four feet wide, and five feet high. The plane was equipped with some advanced equipment, including: state-of-the-art programmable ground to air radios and a ham radio with an "omnidirectional" antenna. Also, the plane had been fitted with an "after-market" nose fuel tank and additional fuel tanks in the wings. The fuel tanks increased the Cessna's flying time by some two and one half hours--about a 50 percent gain. The Cessna's tanks were nearly exhausted. Fuel was transferred to the plane and it was flown by Customs agents to the Thermal Airport and then to the Customs air facility at North Island Naval Air Station. On March 4, 1986, some six days after the plane was seized, the plane was inventoried and searched. "Brutus", a narcotics detection dog, was brought to the plane. The dog alerted to a section of the carpet that was now found to be unrolled in the cargo area. The dog alerted to a two foot wide square of the carpet. However, no debris of any drug was found in the carpet or on the floor of the plane.
4
At trial, a Customs agent testified that the airplane's erratic flying pattern was not normal and that planes did not normally fly at such low altitudes. The agent also testified that he had followed other aircraft exhibiting similar "evasive" maneuvers and agents had found drugs on these planes 80 to 90 per cent of the time. The agent also testified that a Cessna 421 is particularly suitable for narcotics smuggling because of its large cargo area. In addition, this particular plane, due to its extended range, was even a better vehicle for narcotics transport. It was the agent's opinion that the airplane flew as it did in order to avoid detection. He also stated the aircraft was equipped in a typical manner used by narcotics smugglers.
5
The agent admitted, however, that many of these same facts were consistent with an innocent as well as an illegal purpose. The programmable radios were tuned to standard flight service and weather information frequencies and not to frequencies of significance to smuggling activities. He also admitted that the alterations to the aircraft were done with FAA approval while smugglers normally alter their planes in a clandestine and illegal way. Also, the plane was registered to Dickerson or to a company owned by Dickerson. The agent admitted that smugglers normally register their planes to fictitious entities or people. Also, he stated that smugglers normally bring with them an off-loading crew while this plane had none. He also admitted that he never saw this plane unload any contraband. He also noted that most smuggling operations take place at night while this flight took place during daylight hours--the period of maximum visibility.
6
Brutus' handler also testified at trial. He stated that, based on his dog's alert, in his opinion a large quantity--up to 50 pounds--of marijuana had been in the plane in the prior two weeks. He also testified that he did not believe that any drugs were actually then present in the plane. He did not know who had been in the plane during the six-day period between the initial seizure and the dog search. He argued that as far as he knew, anyone who had the scent of marijuana on them could have been in the plane during that period, thus causing Brutus to alert. He also testified that the carpet was not rolled up in the back of the plane but had been laid flat.
DISCUSSION
7
21 U.S.C. Sec. 881(a)(4) provides for the forfeiture of "[a]ll conveyances, including aircraft ... which are used, or are intended for use, to transport [controlled substances]...." In such a forfeiture proceeding, the government must first demonstrate that there is probable cause to believe that the plane was used or intended to be used in transporting narcotics.
8
In forfeiture proceedings, the district court's probable cause determination is reviewed de novo. United States v. $93,685.61 In U.S. Currency, 730 F.2d 571, 572 (9th Cir.), cert. denied, 469 U.S. 831, 105 S.Ct. 119, 83 L.Ed.2d 61 (1984). The standard of probable cause to support a seizure for forfeiture is similar to that required to obtain a search warrant. To meet its burden, the government must show that it had "reasonable grounds" to believe that the plane was used to transport drugs. United States v. One 56-Foot Motor Yacht Named Tahuna, 702 F.2d 1276, 1281-82 (9th Cir.1983). The government's belief must be based on more than mere suspicion. United States v. $5,644,540.00 In U.S. Currency, 799 F.2d 1357, 1362 (9th Cir.1986); Tahuna, 702 F.2d at 1282.
9
The facts known to the government at the time of the seizure give rise to a suspicion that the plane had been used in drug-related activity. The erratic flying pattern of the aircraft, its abrupt return to Mexico, the aborted landings and quick departures from various airports without contacting anyone on the ground, its failure to land at the designated area entry airport, and perhaps the alterations to the plane's cargo area and fuel systems all point to a less than innocent activity. However, these facts give rise to no more than a mere suspicion that the plane was involved in narcotics transport. The Customs Agents' belief, based on these facts, was nothing more than an "inchoate and unparticularized suspicion or 'hunch.' " Reid v. Georgia, 448 U.S. 438, 441, 100 S.Ct. 2752, 2754, 65 L.Ed.2d 890 (1980) (per curiam) (quoting Terry v. Ohio, 392 U.S. 1, 27, 88 S.Ct. 1868, 1883, 20 L.Ed.2d 889 (1968)). However, what certainly would provide probable cause to believe that the plane was involved in drug traffic was the alert of "Brutus" the drug dog. We find, however, for reasons explained below, that the probative value of the alert must be rejected.
10
To pass the point of mere suspicion and to reach probable cause, it is necessary to demonstrate by some credible evidence the probability that the plane was in fact used to transport a controlled substance. Tahuna, 702 F.2d at 1282. The information relied on by the government must be sufficiently reliable to support the probable cause finding. Id. The evidence provided by the alert showed that at some time prior to the alert a narcotics substance was on the rug. Brutus' alert, however, took place almost a week after the initial seizure of the airplane. Both customs agents that testified at trial admitted that they did not know who had been in the plane during the six-day period. The dog handler also testified that anyone with the smell of drugs on them could have been in the plane during this period causing the dog to alert. No debris or other evidence of drugs was found anywhere in the plane. There was also evidence of tampering with the contents of the plane. When initially seized, the cargo space's carpet was rolled or bunched up in the back of the plane. When the Customs agent arrived with Brutus six days later to search the plane, the carpet had been laid flat on the floor of the airplane.
11
The government had the burden of establishing that the plane was secured during the six days that it was in its custody. Tangible evidence of crime is admissible only when shown to be in substantially the same condition as when the crime was committed. Gallego v. United States, 276 F.2d 914, 917 (9th Cir.1960); see also United States v. Godoy, 528 F.2d 281, 283 (9th Cir.1975) (per curiam). An important factor to be considered is the likelihood of intermeddlers tampering with the evidence. Gallego, 276 F.2d at 917. If there is some evidence of tampering, then the government must show that acceptable precautions were taken to maintain the evidence in its original state. United States v. Anderson, 654 F.2d 1264, 1267 (8th Cir.1981), cert. denied, 454 U.S. 1127, 102 S.Ct. 978, 71 L.Ed.2d 115 (1981); United States v. Lane, 591 F.2d 961, 962 (D.C.Cir.1979) (citing Gallego ). Here, there was evidence of tampering. The carpet which Brutus alerted to had been moved from its original place in the plane. Neither Customs agent could testify whether and how the plane had been secured during the six-day period the government had the plane in custody. The government could not establish that "acceptable precautions," or any precautions at all, were taken to maintain the plane or its contents in their original state. One is left with the possibility that narcotics were introduced after the plane was seized or might have been introduced before the plane was seized. Either possibility is as credible as the other. The government did not have "reasonable grounds" to believe the plane was used to transport drugs. On this state of the record, probable cause to forfeit Dickerson's plane pursuant to 21 U.S.C. Sec. 881(a)(4) has not been established.
12
We also do not find that Dickerson's plane was subject to forfeiture under 19 U.S.C. Sec. 1703. Although the Sixth Circuit has applied section 1703 to aircraft, United States v. One (1) 1966 Beechcraft Baron, No. N242BS, 788 F.2d 384 (6th Cir.1986), this circuit has not decided the issue. Assuming, without deciding, that section 1703 applies to aircraft, none of the requirements for forfeiture are met in this case. There is no evidence that Dickerson failed to display his lights or failed to comply with an order or direction of a customs official to stop his airplane. See 19 U.S.C. Sec. 1703(c). Furthermore, the government failed to establish probable cause to believe that Dickerson's airplane was fitted out for smuggling. See id. Sec. 1703(a). Although the airplane had been altered, it was done with FAA approval. These facts give rise to no more than a mere suspicion that the airplane was fitted out for smuggling. As discussed above, the government did not have "reasonable grounds" to believe that the plane was involved in smuggling activities. Thus, probable cause to believe the plane was fitted out for smuggling has not been established. On this record, probable cause to forfeit Dickerson's plane pursuant to 19 U.S.C. Sec. 1703 has not been established.
CONCLUSION
13
We REVERSE the district court's decision forfeiting Dickerson's airplane.
*
The panel finds this case appropriate for submission without oral argument pursuant to Ninth Circuit Rule 34-4 and Fed.R.App.P. 34(a)
|
{
"pile_set_name": "FreeLaw"
}
|
Comparison of the effects of mizoribine with those of azathioprine, 6-mercaptopurine, and mycophenolic acid on T lymphocyte proliferation and purine ribonucleotide metabolism.
The immunosuppressive drug mizoribine has been demonstrated to inhibit T lymphocyte proliferation by depleting these cells of guanine ribonucleotides as a consequence of inhibiting the enzyme inosine monophosphate (IMP) dehydrogenase. Because the immunosuppressive agents azathioprine and 6-mercaptopurine (6MP) are both converted to the IMP analog 6-thio-IMP, we postulated that these drugs might inhibit T cell activation and/or proliferation by a similar mechanism. Incubation of isolated peripheral blood T cells with either mizoribine or the selective IMP dehydrogenase inhibitor mycophenolic acid caused a dose-dependent inhibition of T cell proliferation, which was reversible with the addition of 50 microM guanosine to replete guanine ribonucleotide pools. In contrast, guanosine exacerbated the inhibition of proliferation induced by azathioprine and restored proliferation at IC50 concentrations of 6MP by only 10%. Complete restoration of proliferation in the presence of 6MP, but not azathioprine, was achieved with the addition of adenine. The inhibitory effects of azathioprine, as well as those of mizoribine, 6MP, and mycophenolic acid, were identical in cells stimulated with antibody to the T cell receptor and in cells stimulated with phorbol ester and ionomycin. We conclude from these studies that mizoribine selectively inhibits guanine ribonucleotide formation in purified T cells, whereas the effect of 6MP appears to be more dependent on adenine ribonucleotide depletion. Azathioprine, on the other hand, inhibits proliferation by a mechanism independent of purine ribonucleotide depletion. None of these agents inhibits T cell proliferation by interfering with signal transduction mediated by the T cell receptor. Inhibition of guanine ribonucleotide biosynthesis appears to be a novel and perhaps more selective mechanism of inhibiting T cell proliferative responses after T cell activation.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Phyllis Lyon, Del Martin and the Daughters of Bilitis
“Phyllis Lyon, Del Martin, and the Daughters of Bilitis—provides extensive information on the founding and growth of the homophile movement, especially the Daughters of Bilitis and The Ladder, including early meeting minutes, correspondence, chapter records, membership data, and manuscripts unavailable elsewhere.”
“This collection documents many decades of Phyllis Lyon & Del Martin’s work for and leadership of, the LGBT movement and the women’s rights movement in both in San Francisco and nationally. Included are minutes, correspondence, and notes related to their work with the ACLU, the San Francisco Coalition for Human Rights, the Commission on Crime Control and Violence Protection, the Institute for the Advanced Study of Human Sexuality, the San Francisco Commission on the Status of Women, and the San Francisco Human Rights Commission. Lyon and Martin were also central to the struggle that pushed the National Organization for Women to an understanding of the centrality of the freedom to sexual expression.”
bibliographers: Sam Kirk and Nick Okrent
|
{
"pile_set_name": "Pile-CC"
}
|
Tom Tauke
Thomas Joseph "Tom" Tauke (born October 11, 1950) is an American politician, lawyer, and corporate executive from Iowa. He is a former member of the U.S. House of Representatives. Tauke represented the northeast corner of the state of Iowa (2nd district) as a Republican from 1979 to 1991, entering Congress as one of the youngest members. Tauke left active politics in 1991 following an unsuccessful bid to unseat U.S. Senator Tom Harkin. He has continued to establish himself as a leading voice and public policy advocate in the U.S. telecommunications industry. Jim Nussle followed him as the Representative for northeast Iowa.
From 1991 to 2013 he served as Executive Vice President for Public Affairs, Policy and Communications of Verizon. He has made recent news with his statements in opposition to the Net Neutrality Bill, which has been a recent source of debate among internet users. As a spokesman for Verizon, one of the main opponents of the bill, Tauke has expressed his discontent with Net Neutrality.
Prior to entering the House, he had served as a lawyer. He was also a two-term member of the Iowa House of Representatives from 1975 to 1979. Tauke's undergraduate degree was earned at Loras College in Dubuque, Iowa, and his law degree was earned at the University of Iowa College of Law in 1974.
Since retiring from Verizon he has served on many boards and committees (both non-profit and for-profit) and is past chair of the Board of Regents of Loras College and the Washington Center.
He currently resides in Alexandria, VA with his wife Beverly and children Joseph and Elizabeth. He serves on the Board of Directors of the Committee for a Responsible Federal Budget.
References
External links
Category:1950 births
Category:Living people
Category:Members of the United States House of Representatives from Iowa
Category:Iowa lawyers
Category:Members of the Iowa House of Representatives
Category:Loras College alumni
Category:University of Iowa College of Law alumni
Category:Politicians from Dubuque, Iowa
Category:Iowa Republicans
Category:Spokespersons
Category:Politicians from Alexandria, Virginia
Category:Republican Party members of the United States House of Representatives
Category:Committee for a Responsible Federal Budget
|
{
"pile_set_name": "Wikipedia (en)"
}
|
{#sp1 .204}
|
{
"pile_set_name": "PubMed Central"
}
|
module.exports = function buildEnvironment(environment) {
const ENV = {
modulePrefix: 'ember-example',
environment,
rootURL: '/',
locationType: 'auto',
EmberENV: {
FEATURES: {
// Here you can enable experimental features on an ember canary build
// e.g. 'with-controller': true
},
EXTEND_PROTOTYPES: {
// Prevent Ember Data from overriding Date.parse.
Date: false,
},
},
APP: {
// Here you can pass flags/options to your application instance
// when it is created
},
};
if (environment === 'development') {
// ENV.APP.LOG_RESOLVER = true;
// ENV.APP.LOG_ACTIVE_GENERATION = true;
// ENV.APP.LOG_TRANSITIONS = true;
// ENV.APP.LOG_TRANSITIONS_INTERNAL = true;
// ENV.APP.LOG_VIEW_LOOKUPS = true;
}
if (environment === 'test') {
// Testem prefers this...
ENV.locationType = 'none';
// keep test console output quieter
ENV.APP.LOG_ACTIVE_GENERATION = false;
ENV.APP.LOG_VIEW_LOOKUPS = false;
ENV.APP.rootElement = '#ember-testing';
ENV.APP.autoboot = false;
}
if (environment === 'production') {
// here you can enable a production-specific feature
}
return ENV;
};
|
{
"pile_set_name": "Github"
}
|
2 Wants to Know and WFMY News 2 Evening Anchor Frank Mickens spent weeks on the most detailed investigation you will find anywhere.
GREENSBORO, N.C.– November 1, 2006, a fire call is received into Guilford Metro 911 at 2:08 p.m. from Eastern Guilford High School.
Many of the 1,000 students at Eastern Guilford High School were in the 4th lunch period.
McLeansville firefighter Kirby Shepherd got there first.
“I’ve seen more smoke coming out of a chimney than what was coming out of the school that day. But it’s where it was coming out of the building that had me concerned and the color of the smoke,” Shepherd said.
What Shepherd and the entire Triad didn’t know was a small fire set by someone in the school’s chemistry lab would eventually become the largest arson case we’ve witnessed in our lifetime.
ASHEBORO — A fatality has been reported in a traffic accident south of Asheboro on Interstate 74.
GREENSBORO, N.C. — Police are investigating after somebody was stabbed and injured during a fight at a Cook Out restaurant in Greensboro early Saturday morning. Greensboro police said officers were called to the Cook Out at 1041 Summit Avenue at about 2:50 a.m. in reference to a fight involving several people. Arriving officers found a […]
|
{
"pile_set_name": "Pile-CC"
}
|
Qasimabad
Qasimabad or Qasemabad or Qasem Abad () may refer to:
Iran
Alborz Province
Qasemabad-e Aqa, village in Savojbolagh County, Alborz Province, Iran
Qasemabad-e Bozorg, village in Savojbolagh County, Alborz Province, Iran
Qasemabad-e Gorji, village in Nazarabad County, Alborz Province, Iran
Qasemabad-e Kuchek, village in Nazarabad County, Alborz Province, Iran
Ardabil Province
Qasemabad, Ardabil, a village in Parsabad County
Chaharmahal and Bakhtiari Province
Qasemabad, Chaharmahal and Bakhtiari, a village in Kuhrang County
Fars Province
Qasemabad, Bagh Safa, a village in Bavanat County
Qasemabad, Tujerdi, a village in Bavanat County
Qasemabad, Fasa, a village in Fasa County
Qasemabad-e Bikheh Deraz, a village in Fasa County
Qasemabad-e Olya, Fars, a village in Fasa County
Qasemabad-e Sofla, Fars, a village in Fasa County
Qasemabad, Marvdasht, a village in Marvdasht County
Qasemabad, Naqsh-e Rostam, a village in Marvdasht County
Qasemabad, Neyriz, a village in Neyriz County
Qasemabad, Sepidan, a village in Sepidan County
Gilan Province
Qasemabad-e Olya, Gilan, a village in Rudsar County
Qasemabad-e Sofla, Gilan, a village in Rudsar County
Pain Mahalleh-ye Qasemabad, a village in Rudsar County
Golestan Province
Qasemabad-e Yolmeh Salian, a village in Aqqala County
Hamadan Province
Qasemabad, Asadabad, a village in Asadabad County, Hamadan Province, Iran
Qasemabad-e Laklak, a village in Asadabad County, Hamadan Province, Iran
Qasemabad, Hamadan, a village in Hamadan County, Hamadan Province, Iran
Qasemabad, Tuyserkan, a village in Tuyserkan County, Hamadan Province, Iran
Hormozgan Province
Qasemabad, Hormozgan, a village in Parsian County, Hormozgan Province, Iran
Ilam Province
Qasemabad, Ilam, a village in Shirvan and Chardaval County, Ilam Province, Iran
Isfahan Province
Qasemabad, Aran va Bidgol, a village in Aran va Bidgol County
Qasemabad, Nain, a village in Nain County
Qasemabad, Shahin Shahr and Meymeh, a village in Shahin Shahr and Meymeh County
Qasemabad, Tiran and Karvan, a village in Tiran and Karvan County
Kerman Province
Qasemabad, Anar, a village in Anar County
Qasemabad, Anbarabad, a village in Anbarabad County
Qasemabad, Hoseynabad, a village in Anbarabad County
Qasemabad, Bardsir, a village in Bardsir County
Qasemabad, Narmashir, a village in Narmashir County
Qasemabad, Rafsanjan, a village in Rafsanjan County
Qasemabad, Koshkuiyeh, a village in Rafsanjan County
Qasemabad-e Deh Panah, a village in Rafsanjan County
Qasemabad Rural District, in Rafsanjan County
Qasemabad, Rigan, a village in Rigan County
Qasemabad-e Pir Almas, a village in Rigan County
Qasemabad, Rudbar-e Jonubi, a village Rudbar-e Jonubi County
Qasemabad, Sirjan, a village in Sirjan County
Qasemabad 1, a village in Sirjan County
Kermanshah Province
Qasemabad, Gilan-e Gharb, a village in Gilan-e Gharb County
Qasemabad, Gowdin, a village in Kangavar County
Qasemabad, Qazvineh, a village in Kangavar County
Khuzestan Province
Qasemabad, Andika, a village in Andika County
Qasemabad, Masjed Soleyman, a village in Masjed Soleyman County
Kohgiluyeh and Boyer-Ahmad Province
Qasemabad-e Jalil, a village in Boyer-Ahmad County
Kurdistan Province
Qasemabad, Bijar, a village in Bijar County
Qasemabad, Kurdistan,a village in Qorveh County
Lorestan Province
Qasimabad, alternate name of Tian, Azna, a village in Azna County
Qasemabad-e Cheshmeh Barqi, village in Selseleh County
Qasemabad, Aligudarz, village in Aligudarz County
Qasemabad, Khorramabad, village in Khorramabad County
Markazi Province
Qasemabad, Arak, village in Arak County, Markazi Province, Iran
Qasemabad, Khomeyn, village in Khomeyn County, Markazi Province, Iran
Qasemabad, Tafresh, village in Tafresh County, Markazi Province, Iran
Qasemabad-e Olya, village in Zarandieh County, Markazi Province, Iran
Qasemabad-e Sofla, Markazi, village in Zarandieh County, Markazi Province, Iran
Mazandaran Province
Qasemabad, Mazandaran, a village in Nur County, Mazandaran Province, Iran
North Khorasan Province
Qasemabad, North Khorasan, village in Esfarayen County, North Khorasan Province, Iran
Qazvin Province
Qasemabad, Qazvin (disambiguation), villages in Qazvin County, Qazvin Province, Iran
Qasemabad, Takestan, village in Takestan County, Qazvin Province, Iran
Qasemabad, Khorramdasht, village in Takestan County, Qazvin Province, Iran
Razavi Khorasan Province
Qasemabad, Bajestan, a village in Bajestan County
Qasemabad, Bardaskan, a village in Bardaskan County
Qasemabad, Fariman, a village in Fariman County
Qasemabad, Khaf, a city in Khvaf County
Qasemabad, Mashhad, a village in Mashhad County
Qasemabad, Piveh Zhan, a village in Mashhad County
Qasemabad, Razaviyeh, a village in Mashhad County
Qasemabad, Sarjam, a village in Mashhad County
Qasemabad, Tus, a village in Mashhad County
Qasemabad, Nishapur, a village in Nishapur County
Qasemabad, Miyan Jolgeh, a village in Nishapur County
Qasemabad, Quchan, a village in Quchan County
Qasemabad, Rashtkhvar, a village in Rashtkhvar County
Qasemabad, Sarakhs, a village in Sarakhs County
Qasemabad, Torbat-e Jam, a village in Torbat-e Jam County
Semnan Province
Qasemabad, Damghan, a village in Damghan County
Qasemabad-e Muqufeh, a village in Damghan County
Qasemabad, Semnan, a village in Semnan County
Qasemabad-e Khanlar Khan, a village in Shahrud County
Qasemabad-e Mirhash, a village in Shahrud County
Sistan and Baluchestan Province
Qasemabad, Bampur, a village in Bampur County
Qasemabad, Chabahar, a village in Chabahar County
Qasemabad-e Gonbad, a village in Dalgan County
South Khorasan Province
Qasemabad, Boshruyeh, a village in Boshruyeh County
Qasemabad, Darmian, a village in Darmian County
Qasemabad, Sarayan, a village in Sarayan County
Tehran Province
Qasemabad, Pishva, village in Pishva County
Qasemabad, Varamin, village in Varamin County
Ghasemabad, a quarter of Eslamshahr city
Qasemabad-e Akhavan, village in Varamin County
Qasemabad-e Eskander Beyk, village in Varamin County
Qasemabad-e Qanat Shur, village in Rey County
Qasemabad-e Shurabad, village in Rey County
Qasemabad-e Tehranchi, village in Rey County
Qaleh-ye Qasemabad, village in Varamin County
Yazd Province
Qasemabad, Khatam, a village in Khatam County
Qasemabad, Meybod, a village in Meybod County
Qasemabad, Saduq, a village in Saduq County
Zanjan Province
Qasemabad, Zanjan, a village in Mahneshan County
Pakistan
Qasimabad, Hyderabad, a town in Hyderabad, Sindh, Pakistan
Qasimabad Taluka, administrative subdivision (taluka) of Hyderabad District
Qasimabad, Karachi, a neighbourhood in Karachi, Sindh, Pakistan
Qasimabad, Punjab in Sahiwal District, Punjab, Pakistan
See also
Kazemabad (disambiguation), a different name also referring to several places
Kalateh-ye Qasemabad (disambiguation)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The development of regulatory behaviors necessary for state, motor, and emotion control may have certain underlying physiological processes in the parasympathetic nervous system that play a role in their functioning. One specific psychophysiological correlate of regulatory behavior that has been extensively studied in the existing literature is that of heart rate variability, or vagal tone. Low heart rate variability in children has been associated with maladaptive outcomes (i.e., conduct disorder;Pine et al., 1996) and high heart rate variability has been associated with better social competence (Eisenberg et al., 1995). Thus, it is critical to understand the trajectory of vagal tone from infancy to childhood and how it both influences and is influenced by development. The objectives of the current application are 1) to examine the stability of baseline vagal tone and vagal regulation longitudinally in infants from 3 months to 3 years of age, 2) to examine the concordance between infants'behavioral and vagal responses to challenge tasks, 3) to examine the influence of factors endogenous (i.e., temperament) and exogenous (i.e., maternal sensitivity) to the infant on vagal trajectories over time, 4) to examine factors related to ethnicity and family income as predictors of vagal trajectories and 5) to examine baseline vagal tone and vagal withdrawal trajectories as predictors of socio-emotional functioning assessed by maternal report at 36, 48, and 60 months of age. The Durham Child Health and Development Study has demographic, maternal report, behavioral, and physiological data on 199 infants and their families at seven time points (3, 6, 12, 18, 24, 30, and 36 months). At each visit, infant vagal tone and behavioral response was measured before, during, and immediately following various challenge tasks meant to elicit negative reactivity and regulation from infants. Further, maternal behavior toward her infant during a free play and puzzle task was video recorded for behavioral coding. Our current understanding of vagal tone as a physiological index of regulatory functioning is limited. It is important to move beyond concurrent assessments of vagal response and identify patterns and trajectories that develop over time. The proposed analyses will allow us to examine the development of vagal tone over the first three years as a predictor of typical and atypical socio-emotional outcomes. Relevance to Public Health: The proposed study is designed to provide longitudinal analyses of the development of infant heart rate variability (i.e., vagal tone), and the regulation of vagal tone, across the first three years of life. This physiological system may underlie the processes of emotion regulation and executive functioning and has been associated with both positive and maladaptive behavioral outcomes in children. Understanding the various child and family characteristics that are related to its development will provide new insights into individual differences in such areas as self-regulation of emotion, responses to challenge such as the transition to school, and the acquisition of social competency in peer groups.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Rep. Steve King and 11 of his House colleagues are calling on the Ways and Means Committee to include King’s “New IDEA (Illegal Deduction Elimination Act)” in the Republican tax reform plan for an estimated $254 billion increase in tax revenue over the next decade.
On Monday, King sent a letter to House Ways and Means chairman Kevin Brady petitioning him to include HR 176, the New IDEA Act, in HR 1, the Tax Cut and Jobs Act. King and eleven of his fellow members of Congress signed the letter.
“The New IDEA Act amends the Internal Revenue Code to make it unlawful for employers to deduct wages and benefits paid to and on behalf of an illegal alien,” reads a portion of the letter. “It would also make permanent the E-Verify program for verifying the employment eligibility of alien workers.”
King’s letter calls inclusion of HR 176 in the tax reform plan “the right action for the American taxpayer.” He also includes an estimate from the Center for Immigration Studies that this would “increase federal tax revenues by approximately $25.4 billion per year” for a total of $254 billion over ten years. He writes that the figure will pay for “any increase in the deficit over the limit set by reconciliation.”
King argued that inclusion of this “commonsense” legislation would help sell the bill on the merit that it relieves some of America’s fiscal challenges.
Co-signers of King’s letter are Reps. Louie Gohmert (TX), Paul Gosar (AZ), Mo Brooks (AL), Matt Gaetz (FL), Andy Biggs (AZ), Randy Weber (TX), Lou Barletta (PA), Scott DesJarlais (TN), Duncan Hunter (CA), and Brian Babin (TX).
King originally released the bill in February 2015, describing the driver behind the Act. If wages and benefits paid to illegal alien workers are not deductible by the employer, the incentive to hire cheap labor is diminished. The congressman provided an example of how this plays out — if an employer is paying an illegal alien worker $10 an hour but then cannot deduct that cost from his or her federal taxes, the worker would cost around $16 an hour.
GOP leadership has seemed apprehensive to pass legislation tough on certain areas of illegal immigration. In late October, Senate Republican leadership working on legislation addressing DACA illegal aliens have “all but ruled out including a mandatory workplace verification system known as E-Verify in a final DACA agreement,” lawmakers involved in the talks tell Politico. Mandatory E-Verify is among the Trump administration’s immigration priorities.
Follow Michelle Moons on Twitter @MichelleDiana.
|
{
"pile_set_name": "OpenWebText2"
}
|
Lepidodendron
Lepidodendron – also known as the scale trees – is an extinct genus of primitive, vascular, tree-like plants related to the isoetes (quillworts) and lycopsids (club mosses). They were part of the coal forest flora. They sometimes reached heights of over , and the trunks were often over in diameter. They thrived during the Carboniferous Period (about 359.2 ± 2.5 Mya (million years ago) and were found until the Late Triassic, about 205 Ma) before going extinct. Sometimes erroneously called "giant club mosses", the genus was actually more closely related to modern quillworts than to modern club mosses.
The name Lepidodendron comes from the Greek λεπίς , scale, and δένδρον dendron, tree.
Description and biology
Lepidodendron species were comparable in size to modern trees. The plants had tapering trunks as wide as at their base that rose to about , arising from an underground system of horizontally spreading branches that were covered with many rootlets. Though the height of the trees make the plants similar to modern trees, the constant dichotomy of branches created a habit that contrasts with that of modern trees. At the ends of branches were oval-shaped cones that had a similar shape to modern cones of a spruce or fir.
The stem of the trees had a unifacial vascular cambium, contrasting with the bifacial vascular cambium of modern trees. Though the bifacial cambium of modern trees produces both secondary phloem and xylem, the unifacial cambium of Lepidodendron trees produced only secondary xylem. As the trees aged, the wood produced by the unifacial cambium decreased towards the top of the plant such that terminal twigs resembled young Lepidodendron stems. The stems and branches of the trees contained little wood as compared to modern trees, with the majority of mature stems consisting of a massive cortical meristem. The near uniform growth of this cortical tissue indicates no difference in growth during changing seasons, and the absence of dormant buds further indicates the lack of seasonality in Lepidodendron species. The outermost cortex of oldest stems developed into the bark-like lycopodiopsid periderm. The bark of the trees was somewhat similar to that of Picea species, as leaf scars formed peg-like projections that stretched and tore as the bark stretched. To resist the bending force of wind, Lepidodendron trees depended on their outer bark rather than their vascular tissues, as compared to modern trees that rely mostly on their central mass of wood.
The leaves of the trees were needle-like and were densely spiraled about young shoots, each possessing only a single vein. The leaves were similar to those of a fir in some species and similar to those of Pinus roxburghii in others, though in general the leaves of Lepidodendron species are indistinguishable from those of Sigillaria species. The decurrent leaves formed a cylindrical shell around branches. The leaves were only present on thin and young branches, indicating that though the trees were evergreen they did not retain their needles for as long as modern conifers. The leaf-cushions were fusiform and elongated, growing at most to a length of and a width of . The middle of leaf-cushions were smooth, where leaf scars were created when an abscission layer cut a leaf from its base. Each leaf scar was composed of a central circular or triangular scar and two lateral scars that were smaller and oval-shaped. This central scar marks where the main vascular bundle of the leaf connected to the vascular system of the stem. This xylem bundle was composed only of primary trachea. The two outer scars mark the forked branches of a strand of vascular tissue that passed from the cortex of the stem into the leaf. This forked strand is sometimes referred to as the "parichnos". Surrounding this strand were parenchyma cells and occasionally thick-walled elements. Surrounding both conducting tissues was a broad sheath of transfusion tracheids. Below the leaf scar the leaf-cushion tapered to a basal position. In this tapering area circular impressions with fine pits were present. These impressions were continuous with the parichnos scars near the top of the tapering portion. This is because the impressions are formed by aerenchyma tissue that developed in closely with the parichnos. Above the leaf scar was a deep triangular impression known as the "ligular pit" for its similarities to the ligule of Isoetes. In some leaf-cushions a second depression was present above the ligular pit. Though its purpose is unclear, it has been suggested that the depression may mark the position of a sporangium. As the branch of a Lepidodendron tree grew the leaf-cushion only grew to a certain extent, past which the leaf-cushion stretched. This stretching widened the groove that separated the leaf-cushions, creating a broad, flat channel.
Hyphae are occasionally present in the tissues of Lepidodendron trees, indicating a susceptibility to fungal parasites.
Different fossil genera have been described to name the various levels of decay in Lepidodendron bark fossils. The name Bergeria describes stems that have lost their epidermises, Aspidiariu is used when cushions have been removed by deep decay, and Knorria is used when the leaf cushions and the majority of cortical tissues has decayed, with a shallow "fluted" surface remaining. However, it has been suggested that these are more likely growth forms than preserved bark types, as entire fossilized trunks have been discovered with dissimilar forms; if decay is assumed to be constant throughout the trunk, then different forms indicate growth rather than levels of decay. It is likely that the trunk of Lepidodendron trees were subject to the growth forms Knorria, Aspidiaria, and Bergeria progressing up the trunk respectively.
Reproduction
Lepidodendron species had a life cycle of 10 to 15 years composed of a growth cycle, in which the trees grew to a predetermined height, and a subsequent reproductive cycle, in which the trees produced reproductive organs, after which the trees died, similar to the life cycle of a Mauna Kea silversword.
Rather than reproduce with seeds, Lepidodendron trees reproduced with spores. The spores were stored in sporangia situated on fertile stems that grew on or near the main trunk. The fertile stems grew together in cone-like structures that clustered at the tips of branches.
Distribution
The lack of growth rings and of dormant buds indicate no seasonal growth patterns and modern plants with similar characteristics tend to grow in tropical conditions, but Lepidodendron species were distributed throughout subtropical conditions. The trees inhabited an extensive area compared to tropical flora of the same time period, with trees growing as far north as Spitsbergen and as far south as South America, in a latitudinal range of 120°.
Decline and extinction
By the Mesozoic era, the giant lycopsids had died out and were replaced by conifers as well as smaller quillworts.
This may have been the result of competition from the emerging woody gymnosperms. Lepidodendron is one of the more common plant fossils found in Pennsylvanian (Late Carboniferous) age rocks. They are closely related to other extinct lycopsid genera, Sigillaria and Lepidendropsis.
In popular culture
In the 19th century, due to the reptilian look of the diamond-shaped leaf scar pattern, petrified trunks of Lepidodendron were frequently exhibited at fairgrounds by amateurs as giant fossil lizards or snakes. Inversely, the fossil of a temnospondyl amphibian collected in a Triassic formation in Tasmania was described in 1885 as the cone of an ancient plant, with affinities to this genus, as Lepidostrobus muelleri.
Gallery
See also
Archaeopteris
Evolutionary history of plants
Fossil Grove
Glossopteris
Stigmaria
References
Further reading
"Plant fossils of the British Coal Measures" by Christopher J.Cleal and Barry A.Thomas, publ. The Palaeontological Association, London, 1994, 222 pages,
J. M. Anderson and H. M. Anderson. 1985. Palaeoflora of Southern Africa. Prodromus of South African Megafloras Devonian to Lower Cretaceous 1-423
Category:Lycophytes
Category:Prehistoric trees
Category:Pennsylvanian plants
Category:Carboniferous life of North America
Category:Fossils of Georgia (U.S. state)
Category:Paleozoic life of New Brunswick
Category:Paleozoic life of Newfoundland and Labrador
Category:Paleozoic life of the Northwest Territories
Category:Paleozoic life of Nova Scotia
Category:Paleozoic life of Nunavut
Category:Paleozoic life of Quebec
Category:Permian Africa
Category:Fossils of South Africa
Category:Paleozoic life of Oceania
Category:Permian Australia
Category:Fossils of Australia
Category:Paleozoic life of Asia
Category:Permian China
Category:Fossils of China
Category:Fossils of Indonesia
Category:Fossils of North Korea
Category:Fossils of Oman
Category:Fossils of South Korea
Category:Paleozoic life of Europe
Category:Fossils of Italy
Category:Fossil taxa described in 1820
Category:Lycophyte genera
|
{
"pile_set_name": "Wikipedia (en)"
}
|
import React from 'react';
import Grid from '@material-ui/core/Grid';
import * as PropTypes from 'prop-types';
import Box from '@material-ui/core/Box';
import Widget from '../components/Widget/Widget';
import DeploymentDetailsSection from '../components/DeploymentDetailsSection';
import { useDeploymentDetailsContext } from '../context/DeploymentDetailsContext';
import AlertsChartContainer from './AlertsChartContainer';
import AlertsIntegrationModal
from '../components/IntergationModals/AlertsIntegrationModal/AlertsIntegrationModal';
const Alerts = ({ kindIndex }) => {
const { data } = useDeploymentDetailsContext();
if (!data) {
return null;
}
const { alerts } = data.kinds[kindIndex];
let content;
// if no alerts configured
if (alerts.length === 0) {
content = (
<Grid item xs={12}>
<Widget>
<Box
mt={2}
mb={2}
display="flex"
justifyContent="space-around"
>
<AlertsIntegrationModal />
</Box>
</Widget>
</Grid>
);
} else {
content = (
<Grid container spacing={2}>
{
alerts.map(({ provider, tags }) => (
<Grid key={`${provider}-${tags}`} item xs={12}>
<Widget title={provider}>
<AlertsChartContainer deploymentTime={data.time} provider={provider} tags={tags} />
</Widget>
</Grid>
))
}
</Grid>
);
}
return (
<DeploymentDetailsSection title="Alerts" defaultExpanded>
{content}
</DeploymentDetailsSection>
);
};
Alerts.propTypes = {
kindIndex: PropTypes.number.isRequired,
};
export default Alerts;
|
{
"pile_set_name": "Github"
}
|
Pataua River
The Taiharuru River is a tidal river of the Northland Region of New Zealand's North Island. It flows northeast from its origins east of Whangarei, reaching the Pacific Ocean at the southern end of Ngunguru Bay. At its mouth, the river is flanked by the settlements of Pataua North and Pataua South, which are connected by a footbridge.
See also
List of rivers of New Zealand
References
Category:Rivers of the Northland Region
Category:Rivers of New Zealand
|
{
"pile_set_name": "Wikipedia (en)"
}
|
ララボ
アイテムを駆使して謎の研究所から脱出しよう!
3END
クリック → アイテム選択
アイテム選択+about item → アイテム拡大
読み込みが長いかもしれません。なかなか始まらない場合はページを更新してみてください。
音:魔王魂 ザ・マッチメイカァズ
↓ヒント(反転)↓
1.メモの動物:ペンギン、猿、犬、兎、熊、イモ虫
2.壁の模様に注意!
|
{
"pile_set_name": "OpenWebText2"
}
|
Bosnia's first gay festival to close after attacks
Maja Zuvela
2 Min Read
SARAJEVO (Reuters) - Bosnia’s first gay festival will close early after hooded men, some shouting Islamic slogans, attacked visitors on its opening night, injuring eight people, organizers said on Thursday.
<p>Bosnian policemen scuffle with protesters during the first-ever gay festival organised in Bosnia in central Sarajevo September 24, 2008. Bosnian police clashed on Wednesday with young men attacking the country's first gay festival in Sarajevo. Police said at least eight people were injured when attackers dragged some people from vehicles and beat others in the street. A policeman was also injured. REUTERS/Stringer</p>
About 70 men, some shouting “God is greatest” in Arabic, dragged festival-goers from their cars and beat others in the streets of the Bosnian capital on Wednesday.
Sarajevo, known for centuries for the peaceful coexistence of its Muslims, Christians and Jews, became a majority Muslim city after the 1992-95 war.
Djurkovic heads a group that promotes the rights of gay, lesbian, bisexual and transsexual groups.
<p>Protesters shout slogans against the first-ever gay festival organised in Bosnia in central Sarajevo September 24, 2008. Bosnian policemen stand in front of protesters during the first-ever gay festival organised in Bosnia in central Sarajevo September 24, 2008. Bosnian police clashed on Wednesday with young men attacking the country's first gay festival in Sarajevo. Police said at least eight people were injured when attackers dragged some people from vehicles and beat others in the street. A policeman was also injured. REUTERS/Stringer</p>
About 250 people attended the opening of the festival of art, film and workshops about sexual minorities, which was due to last four days. Police clashed with the attackers and said they would press charges against five men.
Slideshow (2 Images)
Srdjan Dizdarevic of the Bosnian branch of the Helsinki Committee for Human Rights said the attacks violated “civilized standards.”
|
{
"pile_set_name": "Pile-CC"
}
|
News
Thursday, December 06, 2012
Steve Horwitz Gives the Best Austrian Response I've Seen on Cantillon Effects
Some people have called me a "born-again Keynesian." Others have said I've "sold out to the dark side."
Uh-uh. What I really am is someone who found out that the "kindergarten Keynesianism" he was spoon-fed by various "pop-Austrian" authors was as inaccurate as the "kindergarten Hayekianism" he found amongst various scribes on the left. (And I discovered that when I had to teach Keynes, and, as an honest teacher, felt I had to really get his ideas as he saw them before I could properly teach them.)
So what I "really" am is a guy who now is working his ass off to grasp this whole debate, including the perspective of the hundreds of economists besides Keynes and Hayek who offered thoughts on the nature of the business cycle.
10 comments:
Well Gene I must say that for some over at FA, being an honest thinker IS selling out to the darkside.
As you remarked I've never been a Krugman fan. His arrant partisanship puts me off. I like blog trash talk games, but in articles it erodes trust. And I saw Mankiw and Landsburg nail him a few times. But when I arrived at Murphy's I ofetn emerged as a defender of PK, just as a result of trying to be honest. And the more I read him the more I see 1) yes he's a rabid partisan but 2) he makes cogent arguemtns well and 3) his arguments have little resemblance to what the Krugmaniacs portray.
Working through all the debt stuff and the OLG models etc I was continaully struck by the thought that little things PK said showed he had already worked this all out.
|
{
"pile_set_name": "Pile-CC"
}
|
Promotores e procuradores de MP, MPF e MPT vão emitir uma nota conjunta contra, entre outras coisas, a decisão do promotor de São Paulo, Cássio Conserino, que pediu a prisão preventiva do ex-presidente Lula. É que eles acreditam que deve haver uma reflexão sobre a atitude do promotor, para que o país não retroceda depois de "anos de ditadura, com perseguições política, sequestros, desaparecimentos e mortes".
Leia abaixo o documento e veja quem já o assinou:
"Os/as Promotores de Justiça, Procuradores/as da República e Procuradores/as do Trabalho abaixo nominados/as, integrantes do Ministério Público brasileiro, imbuídos da defesa da ordem jurídica, do regime democrático e dos direitos fundamentais, individuais e coletivos, previstos na Constituição Federal de 1988, vêm a público externar sua profunda preocupação com a dimensão de acontecimentos recentes na quadra política brasileira, e que, na impressão dos/as subscritores/as, merecem uma reflexão crítica, para que não retrocedamos em conquistas obtidas após anos de ditadura, com perseguições políticas, sequestros, desaparecimentos, torturas e mortes.
Cassio Roberto Conserino e Lula (Fotos: Marcos Alves e Edilson Dantas)
1. É ponto incontroverso que a corrupção é deletéria para o processo de desenvolvimento político, social, econômico e jurídico de nosso país, e todos os participantes de cadeias criminosas engendradas para a apropriação e dilapidação do patrimônio público, aí incluídos agentes públicos e privados, devem ser criteriosamente investigados, legalmente processados e, comprovada sua culpa, responsabilizados.
2. Mostra-se fundamental que as instituições que compõem o sistema de justiça não compactuem com práticas abusivas travestidas de legalidade, próprias de regimes autoritários, especialmente em um momento em que a institucionalidade democrática parece ter suas bases abaladas por uma polarização política agressiva, alimentada por parte das forças insatisfeitas com a condução do país nos últimos tempos, as quais, presentes tanto no âmbito político quanto em órgãos estatais e na mídia, optam por posturas sem legitimidade na soberania popular para fazer prevalecer sua vontade.
3. A banalização da prisão preventiva - aplicada, no mais das vezes, sem qualquer natureza cautelar - e de outras medidas de restrição da liberdade vai de encontro a princípios caros ao Estado Democrático de Direito. Em primeiro lugar, porque o indivíduo a quem se imputa crime somente pode ser preso para cumprir pena após o trânsito em julgado da sentença penal condenatória (CF, art. 5º, LVII). Em segundo, porque a prisão preventiva somente pode ser decretada nas hipóteses previstas no art. 312 do Código de Processo Penal, sob pena de violação ao devido processo legal (CF, art. 5º, LIV).
4. Operações midiáticas e espetaculares, muitas vezes baseadas no vazamento seletivo de dados sigilosos de investigações em andamento, podem revelar a relação obscura entre autoridades estatais e imprensa. Afora isso, a cobertura televisiva do cumprimento de mandados de prisão, de busca e apreensão e de condução coercitiva – também utilizada indiscriminada e abusivamente, ao arrepio do art. 260 do Código de Processo Penal – redunda em pré-julgamento de investigados, além de violar seus direitos à intimidade, à privacidade e à imagem, também de matriz constitucional (CF, art. 5º, X). Não se trata de proteger possíveis criminosos da ação estatal, mas de respeitar as liberdades que foram duramente conquistadas para a consolidação de um Estado Democrático de Direito.
5. A história já demonstrou que o recrudescimento do direito penal e a relativização de garantias não previnem o cometimento de crimes. Basta notar que já somos o quarto país que mais encarcera no mundo, com mais de 600 mil presos, com índices de criminalidade que teimam em subir, ano após ano. É certo também que a esmagadora maioria dos atingidos pelo sistema penal ainda é proveniente das classes mais desfavorecidas da sociedade, as quais sofrerão, ainda mais, os efeitos perversos do desrespeito ao sistema de garantias fundamentais.
6. Neste contexto de risco à democracia, deve-se ser intransigente com a preservação das conquistas alcançadas, a fim de buscarmos a construção de uma sociedade livre, justa e solidária. Em suma, como instituição incumbida da defesa da ordem jurídica, do regime democrático e dos interesses sociais e individuais indisponíveis, o Ministério Público brasileiro não há de compactuar com medidas contrárias a esses valores, independentemente de quem sejam seus destinatários, públicos ou anônimos, integrantes de quaisquer organizações, segmentos econômicos e partidos políticos.
Adriane Reis de Araújo – MPT
Afonso Henrique de Miranda Teixeira - MPMG
Afrânio Silva Jardim – MPRJ (Procurador de Justiça aposentado)
Alexander Martins Matias - MPSP
Antonio Alberto Machado – MPSP
Antonio Visconti – MPSP (Procurador de Justiça aposentado)
Arthur Pinto Filho - MPSP
Bettina Estanislau Guedes – MPPE
Cristiane de Gusmão Medeiros - MPPE
Daniela Maria Ferreira Brasileiro - MPPE
Daniel Serra Azul Guimarães – MPSP
Domingos Sávio Dresh da Silveira - MPF
Eduardo Dias de Souza Ferreira - MPSP
Eduardo Maciel Crespilho – MPSP
Eugênia Augusta Gonzaga – MPF
Eumir Ducler Ramalho - MPGO
Fabiano Holz Beserra - MPT
Fernanda Peixoto Cassiano – MPSP
Francisco Sales de Albuquerque – MPPE
Gilson Roberto Barbosa - MPPE
Gustavo Roberto Costa – MPSP
Helio José de Carvalho Xavier – MPPE
Inês do Amaral Buschel – MPSP
Jackson Zilio - MPPR
Janaína Pagan - MPRJ
João Porto Silvério Júnior – MPGO
José Roberto Antonini – MPSP (Procurador de Justiça aposentado)
Júlia Silva Jardim - MPRJ
Júlio José Araújo Junior – MPF
Jecqueline Guilherme Aymar – MPPE
João Bosco Araújo Junior - MPF
José Godoy Bezerra de Souza – MPF
Laís Coelho Teixeira Cavalcanti - MPPE
Maísa Melo – MPPE
Marcelo Pedroso Goulart – MPSP
Márcio Soares Berclaz - MPPR
Margaret Matos de Carvalho - MPT
Maria Ivana Botelho Vieira da Silva – MPPE
Maria Izabel do Amaral Sampaio Castro – MPSP
Nívia Mônica Silva - MPMG
Osório Silva Barbosa Sobrinho – MPF
Paulo Busato - MPPR
Plínio Antonio Britto Gentil - MPSP
Raphael Luis Pereira Bevilaqua – MPF
Renan Bernardi Kalil – MPT
Renan Severo Teixeira da Cunha – MPSP
Roberto Brayner Sampaio - MPPE
Rômulo de Andrade Moreira – MPBA
Sérgio de Abritta - MPMG
Silvia Amélia de Oliveira - MPPE
Sueli Riviera – MPSP
Thiago Alves de Oliveira - MPSP
Thiago Rodrigues Cardin - MPSP
Tiago Joffily – MPRJ
Tadeu Salgado Ivahy Badaró – MPSP
Taís Vasconcelos Sepulveda - MPSP
Westei Conde Y Martin Junior - MPPE
Aurelio Virgilio Veiga Rios - MPF
Luciano Mariz Maia - MPF
Paulo Gilberto Cogos Leiva - MPF
Compartilhar no
O Globo
É permitida a reprodução deste conteúdo (matéria) desde que um link seja apontado para a fonte!
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
CSS selector issues
I am very bad with selectors, I am trying to figure out how to make a transition happen on my form when I hover over the "create one" link. Can anyone help me?
http://jsfiddle.net/LyZxG/
body:hover .form{}
the fiddle above shows all of my code, I currently have it transitioning from "body:hover" so you can see the transition.
Thanks in advance!
ps. I have ready every form about selectors and cant figure it out, I know its simple I'm just not getting it, thank you again.
A:
OK with just css all you need to do is remove the
body:hover .form{}
add and in
.create-link:hover .form{
opacity:1.0;
width:260px;
}
After you do that you will need to update your create link html to this
<li class="create-link">
<a href="#">
<h1 class="account-links">Create One</h1></a>
<form class="form" action="demo_form.asp" method="get">
First name: <input type="text" name="fname"><br>
Last name: <input type="text" name="lname"><br>
Password: <input type="text" name="pass">
<input type="submit" value="Submit">
</form>
</li>
|
{
"pile_set_name": "StackExchange"
}
|
# Tests for special content of performance_schema.threads
#
# Show MySQL server related content in performance_schema.threads
--source include/freebsd.inc
# Every thread should be bound to an operating system thread
# (this test is not using the thread_pool)
# Note that this test will fail:
# - on platforms where my_thread_os_id() is not supported,
# which is not the case on FreeBSD
# - if some code in the server does not assign a THREAD_OS_ID
# to an instrumented thread, in which case this is a bug
# in the component instrumentation.
SELECT THREAD_ID, NAME, THREAD_OS_ID from performance_schema.threads
WHERE THREAD_OS_ID is NULL;
|
{
"pile_set_name": "Github"
}
|
A Bay Area rite returns this week with the commercial Dungeness crab season tentatively set to open on Tuesday - and the beloved crustaceans hitting markets shortly afterward.
"People are expecting a fairly decent season again," said Zeke Grader, executive director of the Pacific Coast Federation of Fisherman's Associations in San Francisco.
While the crabbing season north of Point Arena has been delayed by two weeks to Dec. 15, the start of the local season remains on track, and Grader expects there to be plenty of good-sized crab in time for Thanksgiving.
Crab populations tend to peak every six to 10 years, and he believes this season could be near the pinnacle of the current cycle. Last season was among the best in history, he said, with an emerging export market helping to bolster prices for the modest catch.
The possible downside?
"I don't think any of us want to see all our crab exported to mainland China just because they outbid everybody," Grader said.
Assuming the usual last-minute pricing negotiations are settled, look for Dungeness crab to show up in earnest over the next week.
My family grew up eating crab either steamed or stir-fried. The former, my favorite, highlights the sweet and delicate meat, especially when it's dressed with a sprinkling of lemon juice.
The latter we reserved for special occasions, messily - and happily - indulging in crab coated in a garlicky black bean sauce or XO sauce.
It's the kind I'll be serving company this year, in large part because of its hands-on, finger-licking nature. Savoring every morsel of meat and irresistible sauce requires getting messy. And I, for one, can't think of a more festive way to gather friends around the table.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
existence of de Rham complexes
I have a very basic question about the exterior derivative of differential forms and de Rham complexes. It is very basic, I know that the exterior derivative satisfies $d^2=0$. Knowing that, how is a de Rham complex even possible ?
My definition of a de Rham complex is the following :
Let $M$ be a manifold of dimension $n$, the de Rham complex is the following chain :
$$ 0 \xrightarrow[]{d} \Omega ^{0}(M) \xrightarrow[]{d} \Omega ^{1}(M) \xrightarrow[]{d} ... \xrightarrow[]{d} \Omega ^{m}(M) \xrightarrow[]{d} 0 $$
My question : since $d^2 =0$, shouldn't we always have that $\Omega ^2 (M) = 0$ ?
Thank you very much for your help
A:
$\Omega^2(M)$ is the space of all the differential $2$-forms on $M$. You have $d(\Omega^1(M))\subseteq\Omega^2(M)$ and $d^2(\Omega^0(M))\subseteq d(\Omega^1(M))\subseteq\Omega^2(M)$. As you said, $d^2(\Omega^0(M))=\{0\}$, but there's no reason why $d^2(\Omega^0(M))$ would be equal to $\Omega^2(M)$.
|
{
"pile_set_name": "StackExchange"
}
|
A couple months ago I woke up and started preparing myself to go to an industry daytime event at a local bar to go party with friends and colleagues. A much needed release from the craziness of being a server during the holidays. I was excited but had a sense that there was some further consideration that I needed, self-care...something more than the all too familiar, "Oh I won't drink too much this time...I can totally have self-control" HA! Riiiiiiiight ;) I knew I needed a plan, more proactivity. There was something rising to the surface, brewing and ready to be birthed. I could feel myself opening up to a new idea and THEN...it happened! The idea came in the form of doing readings at the bar. Whaaaaa??? Where did this idea come from? Instantly I was afraid. "No, I can't do that" I said. "Just bring your tarot cards and see what happens", the idea said."I'm not a tarot card reader", I said. "Just fucking do it", it said."OK. Fine." I said. Ideas are sometimes bossy.
Please keep in mind I feel very qualified to give readings in a professional setting and with plenty of time to delve deep into the unconscious mind. The sessions I provide in my office typically take up to two hours. I do not fear the unfolding of the psyche. I love it! I could spend all day in the unfolding. But in a bar? Could I do that? Answer: why the eff not!
What transpired blew my mind and heart wide open. I set up at a booth and opened myself to do readings and people sat down...to like get readings...from me! I didn't know if it would work or what it would look like even. The first time doing anything is a bit scary but its a good fear, right? I knew as long as I stayed in channel, I would be in alignment with the insight that people are yearning for and seeking. You know what? It worked.
What is channel you say? Being in channel or being a medium is something that we are all capable of when we are allowing ourselves to be in the moment and is especially powerful when connecting to the heart of another person. It's an opening up to higher consciousness and a willingness to trust whatever inspiration/information comes through. Seven years ago I became a certified psychic medium through my training at Delphi University, a spiritual/metaphysical school in Georgia. Yes, I went to wizard school :) I call it psychic camp to be cheeky but the school offers a wide range of legitness. At the end of the course I had tools that made me feel more confident in my inherent abilities but they also scared the crap out of me. I wasn't ready to take on what felt like a responsibility. I just wanted to party and play in bands and maybe like dabble in witchery and esoteric mystery when it was convenient for me...like a party trick or something I could pull out to sound cool.
At the end of training,( they don't tell you this when you sign up) you actually give readings to strangers. Going from doing readings and seances and weird cool astral shit with your cohort to working with people in the community is a shock to the system and leads to self-doubt and loads of heart racing which borders utter excitement and a crippling fear that you may ruin someones life. Here's how my first two readings went:
Dude #1 Big tough guy, dark eyes, scorpion tattoo on his neck, hunching over in the chair and looks at me saying, "I've been having some evil thoughts and I'm thinking about doing some evil things." Yeah. I should also mention that its Friday the 13th, there is a horrendous storm outside and the lights go out. Luckily, there were candles lit and I knew there were others near by that would hear my screams. The point is, I did what I was taught to do. I connected to his heart and stayed focused on his innocence, the part of him that is wanting a new experience and is yearning for love. I watched this burly character turn into a gentle child with kind eyes and hope for his future. We hugged and I felt relieved. Not only had I not been murdered but I had successfully given my first psychic reading. WOW! I felt high on life in a major way. I was excited for another.
Dudette #2This southern bell couldn't have been more opposite. Her perfectly flipped blond hair and the way she sat with her purse on her lap, hands gripping it tightly while she tried to look not afraid of me. I got a very strong image of water. I asked, "Do you love the water?" Rookie move. She said, "No. I hate the water." Oh shit. I suck at this...spiral...decent and then remembering....it's not about me or my ego. Connection to the heart of this woman and what she is yearning for. Create space for her higher consciousness...stay in channel. Theeeeeeeen, it came out that her child had drowned in a river. Theeeeennnnnnn, the spirit of her child entered the room. AHHHHHHHHH!!!! I had an out of body experience in which I was looking down on myself in this like, what the eff, this is your life now? Freak out. But, once again, I remembered my training and I refocused and stayed in channel. Her child had a lot of beautiful things to say and she received much needed healing and release of pain she was holding on to. It was profound, to say the least.
You should also know that I have had a life long fear of ghosts and always assumed if I saw one I would crap my pants, my hair would turn white and or I would just go crazy. Like drooling, mumbling to myself, lock me up in a padded room crazy. What I've come to understand is my fear is also connected to a strong part of me that likes believing in everything and nothing at the same time. If I were to see a ghost then I would have to believe in the spirit world right? It's just really hard for me to wrap my brain around that. I often feel like a bad "spiritual person" and like there is some sort of koolaid that I just haven't drank yet. I've had plenty of experiences to "prove" mystery and other realm stuff but I'm just not convinced nor do I pretend to understand. I digress. I recognize how I shut down the psychic part of myself. I turned it off....like a big, uh...no thanks...I'm good. I got enough this realm probs...don't need to worry about other realm shtuff. I'm good. She backs away slowly.
I can sense that I have untapped potential/powers due to fears and the more steps I take to unveiling fears to myself i.e. putting myself in challenging situations, seeking opportunity for growth, the less the fear controls me and the more open I become to things I was once closed to. That is why I went to psychic camp in the first place and why I chose to start doing readings in bars. Queue motivational music, she speaks with gusto into the headset mic and says, "You too can live your Dream Reality™!" Ha, kidding...kind of. But seriously, I have a pretty dazzling coordinating hand gesture to really drive that line home ;)
I don't claim to understand how this all works or what it all means man...trying to understand it is what keeps me from delving into it deeper...if that makes any sense. The more I surrender to the not knowing and embrace my own doubts, the more I can be a conduit. I like that. I have recently been asked to lead a class on mediumship and I instantly shot the idea down. Fear. Fear of what? For coming out as a psychic medium? Will people judge me? Blah blah blah all the ego stuff that keeps me from fully trusting myself and taking action.
One of the loudest voices I am learning to love within my psyche is the, "Who the hell do you think you are? You?! Ha, a therapist?! A medium?! HA! A blogger?! Right bro. Thats funny." You know the one. Damn, that voice is really afraid of trying new things. It keeps us small and it has a whole catalog of possible outcomes and they are all bad! This voice is a valuable part of yourself and it is afraid. We are the only ones that can give ourselves the gift of freedom. We can make choices! So, let's transmute our inner voices and lets help each other while were at it. Lets dare to share the things we want to try, to learn and explore with an openness and support for one another. Let's love the voice that tells us we can't, that we will fail, look stupid, loose everything and let it throw its little fit if it must... and then cuddle that baby and tell it its ok to be afraid...to doubt. Love that part of yourself vs shaming and spiraling with it. Teach it how to be daring. Teach it how to be ok with uncomfortable feelings. Teach it how to thrive in the unknowing, the doubt. Fear is how we know we are hot on the trail of transformation. The little charge we get when we are afraid is valuable information as to where loving energy is needed. Follow your fear vortex with consciousness and a deep desire to understand yourself. There is a sea of possibilities within you just waiting to be uncorked. Lets explode together. Stardust in our eyes and endless love in our hearts. We got this. We have each other.
Now I have more Heal That Shit Babe™ events unfolding and am developing a mediumship class and shit, I even have an apprentice now! All because I chose to enter the vortex of fear and trust it will lead me somewhere more expansive than I can ever imagine. I'm ready. Well, maybe not totally but I don't have to be right now. All I have to be is open to move through fear. Thank you for being there to hold my hand when I don't believe I am brave, to welcome me and tell me I am great. I am here for you to do the same. I love us.
Yeesh, with all this pressure to have our shit together all the time its no wonder we have warped vulnerability into being something of a weakness....to be accessed only in the worst case scenario, avoided and a last resort. When did needing help become a source of shame? When did having feelings make us intense and too much to handle? What if feelings are a wonderful source of information to allow deeper insight into ourselves and allow connectivity with others? Furthermore, the communication of this information encourages others to meet us where we actually are, in that moment...and maybe, just maybe provide us with the love we really need. *note: I do not claim to be an expert in communication or relationships. I am a person...trying to figure it all out man...so back off. I mean, come closer. I need your help. Just don't judge me and let's try it, together. Sound good? Good.
"I'm feeling scared and alone and am hoping you can be kind to me.""That hurt my feelings and I would like to talk about it to understand where you are coming from." "My mind is cycling negative thoughts and I would appreciate you helping me find clarity.""My feelings are really intense right now and we should revisit this when I am more calm." "I see my part in your difficulty and I am sorry I caused you pain. Let's use this as an opportunity to understand each other so we can continue to communicate more effectively."
Whoa. Radical right? But who the hell talks like that?! Wouldn't it be so awesome?! A girl can dream ;)Radical honesty and vulnerability are actually super powers and aid in allowing ourselves to get some pretty basic core needs met. You know, like love, understanding and a sense of belonging and connection. With mindfulness and radical self-acceptance we can transmute our triggers to become our allies in letting us know where the healing is needed and how to better communicate our actual needs.
So, what is stopping us from being real about our feelings? Sometimes we get so caught up in the feelings that we don't even allow ourselves to be real with ourselves as to why we are actually upset in the first place. For example, I was neglected as a child. My parents were alcoholics and drug addicts. They said they were going to do things and then, well...they didn't. I don't blame them, I love them very much but them are the facts. I have come a long way in my healing and it was recently that I was able to put together why I am so hurt when people blow me off, make me wait around and or say they are going to do things and well, don't. Not ideal behavior from others, but you know, shit happens. I'm a reasonable person so it started to become apparent that there was something more to my upset. Do I really need to let down the iron gate, pull up the drawbridge, fill the mote and release the dragon just because someone is late? Damn, it was so much easier when I got to feel justified in my disappointment and blame others for my frustrations. When allowing myself to get so upset, I fed the story that people will always disappoint me , I can't count on anyone, I am alone and have to do everything myself...and so on. At one point, as a child, I needed those thoughts to survive, to protect myself. As an adult, it is my job to know when I am projecting and learn to ask for what I really need. Revolution.
Accepting myself and my hair trigger reactions (vs denial and blame) allowed me to ask if maybe I was being too sensitive and limited in my beliefs...and ask myself why? What is the information my hurt feelings are providing? What is my subconscious mind trying to tell me? Soooooo, recently, when I was faced with opportunities ( withholding love from a late friend and blowing up with anger after having been blown off by a date) I went within and asked myself what this tendency is all about? I validated my feelings and created space for information to surface. My wounded inner child came forth and she had some shit to say.
Looking into my eyes in the mirror, (doesn't have to be in the mirror but I'm creepy like that) it went something like this:Caring Adult (me, the one who has learned to love and be free from past hurt): "I care about this pain. I want to know what is needed to be free."Wounded Inner Child (also me but traumatized and suffering me that lives within my psyche creating chaos until I finally listen and give her the love she needs to heal): "Don't abandon me."CA: "I'm so sorry that I did. I am here now. How can I make you feel safe?"WIC: "Show me love."CA: "I love you so much. I am here."
It's really really important to take caring action that will show your inner child that you do in fact care about their healing. I decided to read some self-help crap (just being cheeky but serious Tara Brach is a goddess) and relax in bed. This made me feel so much better. My thoughts became less anxious and I was able to create a new pathway for experience. Wounded inner child work for the win!
Just this small gesture was enough for me to reclaim a part of myself. The truth of who I really am...which I choose to believe is a person who has the ability to create a new reality for myself. When I am projecting onto others the disappointments I felt from my parents, not only am I keeping myself in a state of hurt which causes me to push play on the tape player of all my worst thoughts about humanity, it also signals the release of the all too familiar playlist of how it all probably means that I am unlovable and not worthy of having people in my life that I can rely on. This cycle causes my inner child to feel abandoned. Intense right? We all do this on different levels and in different contexts...its subtle and unconscious you see. Now, knowing this tendency within myself, I can choose to be transparent and share my struggles. Instead of shaming others, attacking and treating them poorly, I can give them the information as to why it is hard for me and let them know that I am working on being more understanding and forgiving.
Sure, there will still be times in which I just get pissed off, I've been this way for a long time but when I am in a place of transformation, I can take my finger off the trigger and give myself the love and care I need. This will allow me to be patient with others and I can be kind even if my initial feeling is to grab the drawbridge. I'm not suggesting accepting repeated disrespectful behavior from others and taking all the responsibility. Discernment is paramount in understanding what is ours and what is others areas of growth. I am advocating honesty, self-acceptance, vulnerability and talking about why we are upset by someones behavior, when it is actually happening.
If you are like me you often devalue your own feelings and tell yourself you shouldn't be as upset as you really are. It's not that big of a deal, we say to ourselves,...or we let other people tell us that our feelings aren't valid. Just relax they say, don't think so much they say. It wells up and becomes worse, ack! Feelings don't just go away the more we push them down. We are not trash compactors with built in incinerators. We need to talk about our feelings. It's not so scary. They are just feelings and feelings are more importantly, information that can lead us to empowerment and self-love.
There is one more aspect of this process I should mention. Sometimes, even when you do have all the right beautiful words and our intention is clear and you just splayed your heart out on a silver platter and handed it to someone...they, uh...well, may not be in a place to receive it. Do not fret my friend. YOU GOT THIS! You can still Heal That Shit Babe™ (more on this later) because you are the only one who can give you what you truly need anyway. The healthy and supportive folks in your life will be there with open hands, hold fast to these treasures, true loves are gold. But, if people in your life aren't able to hear your truth and listen to what you are deeply yearning for then you need to reevaluate if they are healthy to be connected to and alter your boundaries accordingly.
We can still be kind when feeling a persons lack of emotional availability/openness. There lack is again, important information that allows us to be clear on what we can ask of others. We don't have to explode and shame the other...what if instead we told them that we are sad and disappointed because we thought we could count on them and our feelings are hurt. Furthermore, when we stand in our truth, we allow others to be radically honest and share their feelings. We may even come to realize that perhaps we were asking too much of someone. Again, there is no need to keep putting yourself in situations in which your energy and love is not being reciprocated. Our understanding of everyones unique levels of development is a much needed consideration. Do the inner child work and truly connect with yourself, find compassion for those who can't and wish them well on their healing journey. In doing this soul work, we become more mindful of our feelings, there root cause and how to trust effective communication...and part of that trust is knowing that the other may not react the way we want but that we are going to be ok because we can give ourselves the love we need. Radical self-acceptance for the win!
May we all be brave enough to slide on to the slip n slide of consciousness. I welcome you, slip on into my heart baby. Its a garden that needs some tending...but perhaps you can help me pull some of these weeds? Let's lighten the load we all carry and open up to our true feelings. It's fun!!! We really need each other and thats a beautiful thing.
|
{
"pile_set_name": "Pile-CC"
}
|
Reliability Growth
Abstract:
Reliability Growth is a widely accepted useful concept used as the basis for
planning equipment reliability tests, assessing reliability improvement for
changing equipment configurations. This particular benefit this concept
brings up is the cost and time saving, with its future further attention in
simpler model and higher coverage test, comparing with the traditional
reliability demonstration test method. For embedded system, this concept
benefits with development process in helping with the validation determination,
particularly with critical systems such as medical, nuclear systems.
Introduction
The origin of reliability growth concept is generally attributed to J.T.Duane,
an engineer at the Aerospace Electronics Department of the General Electronic
Company. Duane developed the most commonly used model which is called the Duane
model, named after its developer, and was published a paper in 1964 on the
subject. In his paper, Duane brought up with a learning curve approach to
reliability monitoring. Duane observed that different complex
electromechanical and mechanical systems showed similar rates of improvement
during system development. He further observed that the equipment
development process could be characterized by continuing improvements in design
and refinements in both operating and maintenance. Based on his
observations, Duane concluded that he equipment development process was a
learning process and could be described by a classical learning model equation.
The learning curve theory is based on the observation that the cost of an item
is a function of where in the manufacturing sequence the item was
produced. The learning curve theory is usually attributed to J.P.Wright,
who introduced a mathematical model describing a learning curve in a 1936
article in The Journal of Aeronautical Science titled "Factors Affecting
the Cost of Airplane." Wright showed that the cumulative average
direct labor input for an aircraft manufactured on a production line decreased
in a predictable pattern. The decrease was obviously related to the
increased proficiency (i.e., learning) of the manufacturing people on the line
as they continued to perform the various repetitive tasks. The model that
was published described the learning as an exponential function. One
feature of the exponential function is that the relationship is linear when
plotted on log-log graph paper. Duane observed that the process
associated with improving equipment reliability during the early stages of
development " is one of learning through failures. Knowledge of the
applicable learning curve would provide a means of measuring and predicting
reliability during this period of change." He also suggested
this learning could be mathematically described by an exponential function,
which when plotted on log-log paper appeared as a straight line.
Correction of unexpected failure modes was how the learning would come
about. The learning is accomplished through a " test, analyze, and
fix" (TAAF) process, and the term TAAF became associated with, and almost
synonymous with reliability growth.
Key Concepts
As somehow the concepts of and closely associated with reliability growth has
been a jargon in the reliability research world for years, there are some
researchers feel obliged to give some clarification of those definitions and
their use, from their point of view.
Most often when the subject of reliability growth is discussed, it is
reliability growth testing that is the focus of the discussion. Certainly, this
focus on testing is neither surprising nor unreasonable. In general,
testing, to prove the merit of a design and the validity of the models and
analytical tools used to develop the design, is a necessary and standard part
of development. In regard to reliability growth testing, much work has gone
into developing the various statistical models developed for the purpose of
planning and tracking reliability growth achieved through testing. Given the
high cost of testing, the extensive effort to develop good models and the
attention paid to the reliability growth test process are natural.
Coming out of the discussion as of whether reliability growth can be
achieved without testing, generally speaking, the process is one of iteration.
Iterations of the design are needed because the various performance
requirements often conflict, optimizing the design to meet one requirement can
result in the design failing to meet another requirement. Balancing the
requirements is a demanding task. Iteration is also needed because not
all analyses can be done simultaneously. consequently, the design may be
changed as the result of a particular analysis, only to be changed again as the
results of a subsequent analysis are available. As these iterations take place,
the design is refined. Therefore, each revised design is an
improvement over its predecessor. Some of the analyses conducted during
the design process directly address the reliability of the design. So,
the reliability of the design improves as successive design changes are made
based on analytical evaluation.
Using the line of reasoning just presented, a broader definition of
reliability growth could be developed : the process by which the
reliability of an initial design is improved. Improvement can result as the
design is iterated either on the basis of analytical evaluation and assessment
or on test results. Ideally, when the product enters testing, all
deficiencies have been eliminated through the design changes made as a result
of analyses. So come up with this theory, the conclusion is that
reliability growth does not have to be achieved with testing.
However, seldom is this ideal completely realized, and some design changes
will be required as the result of design deficiencies discovered during
development testing. And this is why a specific type of development
testing often dedicated to the reliability growth process is brought up, the
Reliability Growth Test.
Issues around reliability growth testing are coverage of test generation
tool and testing results analysis specific to each type of testing.
Reliability Growth Model
As the trend during system development is the growing of system reliability,
reliability growth models, each of them is tend to represent the growing trend,
are acting as a guide help with measure and achieve this reliability growth
resulting from improved software reliability and recovery algorithms. Many
mathematical models exist nowadays, their basic working principle is to apply
the testing results, data points, to the model, and based on the degree of
matching or deviation from the model, judgment is made as of whether or not the
system's development is coming towards reliability growth, and how much amount
of refinement work need to be done right to this point of time.
The key that matters here with reliability growth model is how well each
model represent the real system development process so that the refinement work
done corresponding could really effectively and efficiently improve system
reliability growth.
Duane showed a reliability engineering test process followed a predictable
pattern, The underlying basis of this process is learning, in this case,
redesign where there are unexpected failures. As with any physical
process, randomness is to be expected. So our understanding from this is
that the key issue for reliability growth model is the degree of its
representing the system reliability growing trend. Now the fact is that
more and more mathematical models come out, and tend to make those models more
and more complex, which raises the question, is this diversity necessary.
With the discussion going on, people show the preference of choosing simpler
models.
As the concept of reliability growth has the in-born character of simplicity
and easy understandability, it gets real popularly used. But this
popularity also brings up the problem of improper applying of it in not a few
cases and conditions, which make some of the researchers feel urgent to give it
a clarification as of the use of this concept.
Conditions where reliability learning curve concept seems to fit:
models a single reliability development test activity; requires failure
analysis and corrective actions as part of test activity, and applies to
equipment that operates continuously.
Unreasonable use of this curve:
Predicting equipment reliability, either current or future; used to combine
different types of reliability tests
The Objectives of Reliability
Growth
The process of reliability growth has one primary objective - to improve the
reliability of the design through analysis and test. The degree of
possible improvement possible depends on the available resources, the
underlying technology of the parts, components, and subsystems, and the
knowledge of the design team.
Resources are always limited, so the reliability growth process must be as
efficient as possible. A collateral objective of reliability testing, indeed,
of all development testing, is to validate the models and tools used in
creating the design.
The underlying technology is an obvious limiting factor in the degree of
improvement possible in a design. Rather than relying on a continuous series of
technological breakthroughs, design engineers must focus on the fundamentals
and thoroughly understand the technologies at hand.
And the understanding of the design team is another constraint on the degree
of improvement possible in the reliability, or any other performance
characteristic, of a product. The models and tools used in creating a
design reflect the current level of understanding of the technical
community. To some extent, the models and tools are always inexact.
By using test results to validate the models and tools and to revise or update
them when we find they are not valid, our knowledge increases and the potential
improvements possible for design increase.
Available tools, techniques, and metrics (I need do more work here, ying)
Go through the last decade conference proceedings of Annual R&M Symposium,
vase amount of reliability growth models and testing methods/tools can be
easily found.
Relationship to other topics
Software
Reliability. The concept of reliability growth nowadays is more about
software, as software reliability tend to be stable after it gets into the
operational life stage, and so the pre-operational stage is the main emphasis
for software to improve the reliability, or to achieve the reliability growth.
Software
Testing. Reliability growth testing is one type of software testing
as reliability growth is more of a concept that is applied to software
reliability improvement during the system developing process.
Profit/Business
Model. As mentioned in the previous sessions, Reliability growth
model is providing information as to make a decision of where the system has
achieved in its development stage, and make a prediction as of when this
development process should end up due to the tradeoff between the system
reliability requirement and business profit.
Conclusions
Reliability growth is a process that begins with the first efforts to
conceptualize a design. As the design evolves, undergoing a series of analyses
and tradeoffs, the overall performance of the design should improve.
Reliability, one very important aspect of performance, also will improve.
At some point, analytical methods, without additional information, are
insufficient to continued improvement. Testing of a model or prototype product,
in its entirety or some part thereof, then begins, and it is the information
gained through testing that allow further improvements to be made.
Although
improvement of a design's reliability is the primary objective of the
reliability growth process, it is also an important means for improving our
models and tools used in creating a design. Reliability growth testing, one
aspect of the reliability growth process, is also being used to assess the
level of product reliability being achieved. This used of RGT creates a dilemma
for the developer. From the perspective of validating and understanding the
design, failures are welcome events. They present an opportunity for learning
and improvement. From the perspective of assessment, failures are not welcome.
To help deal with this dichotomy of purpose, the ground rules of all testing
must be well defined long before testing begins.
|
{
"pile_set_name": "Pile-CC"
}
|
Luv 2 Play
Luv 2 Play is a super-fun parent supervised indoor playground packed with age appropriate excitement for infants to tweens and everyone in-between! We provide a safe and secure climate controlled environment to allow children to be active whilst nurturing their imagination, growing their social skills, building creativity, getting some intellectual juices flowing and allowing kids to be kids!
Luv 2 Play provides specially designed play areas for each age group:
Baby Play Area (Ages 0-2) – This area is designed for the smallest among us, to get those motor and social skills started early with soft toys and cushioned climbing, allowing little sitters and crawlers to play safely.
Toddler Play Area (Ages 1-4) – Specially designed jungle gym with two wave slides, giant ball pit, crawler tube and hanging bags will bring those giggles on. A ride-on peanut go-around as well as banana swing will add to the fun your toddler will have.
Soft Climbing Wall (Ages 3-12) – Reaching for new heights kids get to show off their skills and inspire those a little bit smaller in a safe and fun activity.
Building Area (Ages 2-12) – Kinetic Sand is a three-dimensional building toy that mimics the physical properties of wet sand. In appearance, it resembles light brown sugar. Kinetic sand can be useful for kids with intellectual disability for self-stimulation, learning and soothing.
Gaming Area – Gamers love to game and Luv 2 Play’s arcade with ticket games which allows you to go home with prizes – the spoils of a big win!
LIFE IN FULL BLOOM
ABOUT US
Discover Loudoun County's favorite destination to shop, dine and play. Delight in more than 75 boutiques, restaurants and entertainment experiences including Wegmans, LA Fitness, Cobb Theatres, Bowlero, and Smokehouse Live - all in the welcoming, vibrant surroundings of Village at Leesburg.
|
{
"pile_set_name": "Pile-CC"
}
|
Incidence trends in oesophageal cancer by histological type: An updated analysis in Sweden.
We aimed to update incidence trends of oesophageal cancer by histological type in Sweden. Using data from the Swedish Cancer Registry, we examined incidence trends of oesophageal cancer by histological types in individuals aged ≥50 years in 1970-2014 using log-linear joinpoint regressions. The age-standardised incidence rate of oesophageal adenocarcinoma in men increased on average by 3.0% per year in 1970-1994, followed by a more rapid increase of 13.7% per year in 1994-2000, and a slower increase of 2.6% per year in 2010-2014. The rate of oesophageal adenocarcinoma in women increased on average by 4.2% per year during the entire period. The rate of squamous cell carcinoma generally decreased over the past 2-3 decades in both sexes. The incidence of oesophageal adenocarcinoma continues to rise in Sweden, although the increase seems to have slowed down in men since 2000. The incidence of oesophageal squamous cell carcinoma is decreasing.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Solving a pair of ODEs
I'm trying to solve a pair of ODEs for which I've obtained a solution. However, my problem is that my answer is slightly different from mathematica's answer.
$$ \frac{dA}{dt} = \theta - (\mu + \gamma)A, \ \ A(0) = G$$
$$ \frac{dT}{dt} = 2 \mu A - (\mu + \gamma)T, \ \ T(0) = B$$
Using an integrating factor of $e^{(\mu + \gamma)t}$, I got the following solution to the first ODE:
$$ A(t) = \frac{\theta}{\mu + \gamma} + \left(G -\frac{\theta}{\mu + \gamma}\right)e^{-(\mu + \gamma)t}$$
For simplicity, let $\mu + \gamma = \alpha$ such that:
$$ A(t) = \frac{\theta}{\alpha} + \left(G -\frac{\theta}{\alpha}\right)e^{-\alpha t}$$
For the second ODE (again using an integrating factor of $e^{(\mu + \gamma)t}= e^{\alpha t}$ ):
$$ e^{\alpha t}\frac{dT}{dt} + e^{\alpha t}\alpha T = 2 \mu A e^{\alpha t} $$
$$ T(t)e^{\alpha t} = \int 2 \mu e^{\alpha t}\left(\frac{\theta}{\alpha} + \left(G -\frac{\theta}{\alpha}\right)e^{-\alpha t}\right)dt $$
$$ T(t) = \frac{2 \mu \theta}{\alpha^2} + \left(B - \frac{2 \mu \theta}{\alpha^2}\right)e^{-\alpha t} $$
However, when I computed these two ODEs in mathematica, it gave back the following solution:
$$ T(t) = Be^{-\alpha t} + 2G \mu te^{-\alpha t}+ \frac{2 \mu \theta}{\alpha^2} - \frac{2 \mu \theta e^{-\alpha t}}{\alpha^2} - \frac{2 \mu \theta t e^{-\alpha t}}{\alpha} $$
I've tried solving my equation over and over again but I can't seem to understand why my solution is different from mathematica's. The only I thought about was possibly in the substitution of arbitrary constant. Am I missing something obvious here?
A:
You forgot the integration constant. Following on from your integral for $T(t)$, we find
\begin{align}
T(t)e^{\alpha t} &= \int 2 \mu e^{\alpha t}\left(\frac{\theta}{\alpha} + \left(G -\frac{\theta}{\alpha}\right)e^{-\alpha t}\right)dt \\
&= \int 2 \mu e^{\alpha t}\left(\frac{\theta}{\alpha}\right) + 2 \mu \left(G -\frac{\theta}{\alpha}\right) dt \\
&= 2 \mu e^{\alpha t}\left(\frac{\theta}{\alpha^{2}}\right) + 2 \mu \left(G -\frac{\theta}{\alpha}\right)t + C \\
\implies T(t) &= 2 \mu \left(\frac{\theta}{\alpha^{2}}\right) + 2 \mu \left(G -\frac{\theta}{\alpha}\right)t e^{-\alpha t} + Ce^{-\alpha t} \\
T(0) &= B \\
&= 2 \mu \left(\frac{\theta}{\alpha^{2}}\right) + C \\
\implies C &= B - 2 \mu \left(\frac{\theta}{\alpha^{2}}\right) \\
\implies T(t) &= 2 \mu \left(\frac{\theta}{\alpha^{2}}\right) + 2 \mu \left(G -\frac{\theta}{\alpha}\right)t e^{-\alpha t} + \bigg(B - 2 \mu \left(\frac{\theta}{\alpha^{2}}\right) \bigg)e^{-\alpha t} \\
&= \frac{2 \mu \theta}{\alpha^{2}} + 2 \mu G t e^{-\alpha t} - \frac{2 \mu G \theta}{\alpha}t e^{-\alpha t} + B e^{-\alpha t} - \frac{2 \mu \theta}{\alpha^{2}} e^{-\alpha t} \\
&= B e^{-\alpha t} + 2 \mu G t e^{-\alpha t} + \frac{2 \mu \theta}{\alpha^{2}} - \frac{2 \mu G \theta}{\alpha}t e^{-\alpha t} - \frac{2 \mu \theta}{\alpha^{2}} e^{-\alpha t}
\end{align}
|
{
"pile_set_name": "StackExchange"
}
|
Q:
What is the default 'backup' user for?
I am setting up multiple-machine backup plan and I was hoping to use a user called 'backup' on each machine as the backup destination.
My problem is, there is already a user called 'backup' on my machine.
What is it for, and can I hijack it for my own purposes?
root@frodo:~# useradd backup
useradd: user 'backup' already exists
A:
I can confirm it's in a default installation, see the /usr/share/base-passwd/passwd.master file provided by the base-passwd package.
According to the documentation from that package, it is used for backup accounts without requiring full root permissions (which is available at /usr/share/doc/base-passwd/users-and-groups.txt.gz, /usr/share/doc/base-passwd/users-and-groups.html and online):
backup
Presumably so backup/restore responsibilities can be locally delegated to
someone without full root permissions?
HELP: Is that right? Amanda reportedly uses this, details?
Note the keyword locally, for remote backups you have to enable a login shell first. You are free to use it for your own purposes, but note the above guide lines. Do not grant sudo policies for example that would allow the backup user to escalate its privileges to root.
|
{
"pile_set_name": "StackExchange"
}
|
On National Wear Purple for Peace Day, people don't wear purple to stop nuclear war or a particular conflict, and they don't aim for world peace just for the sake of it—they have a reason behind it. The day was made to get aliens to visit earth! Whoever thought it up believed that humans are too violent towards each other and that if we ever are going to get aliens to visit us, we better clean up our act. They also believed that wearing the color purple would help us achieve world peace, and would signal to aliens that we are on our way to reaching our goal.
How to Observe
Come on folks, we need to meet some aliens! Celebrate the day by wearing purple and working towards world peace. Maybe if aliens see enough of us are wearing purple they will think it is safe for them to visit us. Get ready!
Sponsor
This event does not currently have a sponsor. If you'd like to increase visibility for this event while gaining exposure for yourself or your brand, you can learn more here!
|
{
"pile_set_name": "Pile-CC"
}
|
As an image forming device for a printer, a facsimile machine, a reproducing unit, a plotter, and a multifunctional unit having these functions, an inkjet recording device is known as a liquid ejection recording-type image forming device which uses a recording head which ejects ink droplets, for example. The liquid ejection recording-type image forming device, which ejects the ink droplets from the recording head to a sheet to be conveyed to perform image forming (recording, print, imaging, printing also used interchangeably), includes a serial-type image forming device which ejects liquid droplets while the recording head moves in a main scanning direction to perform image forming and a line-type image forming device with the use of a line-type head which ejects liquid droplets while the recording head does not move to perform image forming.
Herein, an “image forming device” represents a device which sets ink onto a medium such as paper, thread, fiber, cloth, leather, metal, plastic, glass, wood, ceramics, etc., to perform image forming, and “image forming” represents not only providing a medium with an image which has a meaning (e.g., character or graphics), but also providing a medium with an image which does not have a meaning such as a pattern, etc. (merely impacting the liquid droplet onto the medium). Moreover, “ink” is not limited to what is called ink, so that it is used to generally represent all types of liquids which can perform image forming, such as what is called recording liquid, fixing solution, liquid, resin, etc. Furthermore, the “sheet”, a material of which is not limited to paper and which includes an OHP sheet, a cloth, etc., represents what the ink droplets are adhered to and is used to generally represent what includes a medium to be recorded on, a recording medium, recording paper, a recording sheet, etc. Moreover, an “image” is not limited to a planar one, so that it also includes an image provided to what is formed three-dimensionally, and also an image formed by three dimensionally shaping a solid itself.
Now, a liquid ejection-type image forming device includes a maintaining and restoring mechanism which includes a wiper member (also called a wiper blade, a wiping blade, a blade, etc.) which wipes off a nozzle face of a recording head for cleaning; and a cap which caps a nozzle face of the recording head in order to maintain ejection stability of a nozzle of the recording head, to prevent ink in the nozzle from drying and to prevent dust from mixing into the nozzle). A recovering operation is performed in which, for instance, after draining bodied-up ink from the nozzle into the cap, the device wipes off the nozzle face with the wiper member to form a nozzle meniscus and a non-contributing ejection operation is performed in which a liquid droplet which does not contribute to image forming is ejected from the recording head at a required timing.
A related-art non-contributing ejection receiving member for receiving non-contributing ejection droplets which are ejected in an non-contributing ejection operation is known, wherein a multi-porous sheet is arranged at a position which is in proximity to and which opposes a recording head and a waste liquid which is received at the multi-porous sheet is absorbed by an absorbing material (see Patent document 1).
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
An army probe into two separate shooting incidents involving settlers and Palestinians last month indicated that Israeli teens tied and beat a Palestinian who had been shot and wounded near the West Bank settlement of Yitzhar, a senior IDF officer told Haaretz on Saturday.
Last week, just one week following a similar clash was recorded, an Israeli settler shot and wounded a Palestinian man in a clash that began when a group of settlers set fire to fields belonging to a Palestinian village in the occupied West Bank.
Residents said about 25 settlers, some of them carrying guns, set fire to wheat fields in the village of Orif, which is near the northern West Bank city of Nablus.
Some villagers came out to extinguish the fire and clashed with the settlers, said Nablus official Ghassan Daglas. Israeli soldiers then came to the scene and broke up the clashes.
The Palestinian was shot in the stomach, medical officials said, and taken to the hospital.
In the wake of both incidents, the IDF confiscated the weapons of members of Yitzhar's security response team. West Bank police have opened investigations into the incidents.
The inquiry of the IDF's Judea and Samaria Brigade into the incidents – the first of which occurred on May 19 and the second a week later on May 26, found that members of the security response team operated against orders and regulations.
The inquiry into the first incident near Assira al-Kabaliya found that it began when both sides, the settlers and the Palestinians, hurled stones at one another, at a distance of some 50 meters from the village.
A small IDF force arrived at the scene. Its officer approached the Palestinians and attempted to prompt them to leave, when a settler fired in the air behind him. At that point, the officer turned back towards the settlers. As he was approaching, a settler fired his pistol at the Palestinians.
"The findings are that due to the way the shots were fired, they didn't pose an immediate threat to life, as can be seen from the fact that they shot in the air," a high ranking officer in the Division command said. "For this reason it is more appropriate that the police investigate the incident."
Colonel Yoav Yaron, commander of the Samaria Territorial Brigade, conducted the inquiry into the conduct of the settler response team, who claimed they fired over the Palestinians' heads. Regarding the claims that the officer on scene stood idly by as the settlers were shooting at the Palestinians, Colonel Yaron rejected the claim:
"[He] didn’t stand idly by, he ran and didn't stand about for a second, rushing into the scene right away. It is true that from the pictures it looks like he was standing around. If this in fact happened it was only for a second or two. He was in quite a hurry to take control of them and the behavior shows it. He walked towards the Palestinians, saw he was unable [to get them to settle down], and unfortunately wasn't able to prevent the injury that occurred."
The inquiry of the second incident, taking place May 26, found that a group of youths coming from Yitzhar tied the hands and beat a Palestinian that was shot by the settlement's response team. They weren't arrested – the army said that the unit on the scene was too busy.
According to a high ranking officer in the Judea and Samaria Division the torture of the wounded youth lasted seconds, and the military unit on scene arrived "quite immediately after the bullet was shot. They prevented what could have occurred."
The Inquiry of the second incident found that it also started with mutual incidents of arson. The inquiry states that some Palestinians from Urif made their way to the settlement while the settlement's response team was on its way to put out the fires accompanied by "youths that came to create friction," according to the officer.
Shortly after, both sides started throwing stones at each other, when the group of teenagers started shouting that they see an armed Palestinian. The IDF officer on scene radioed this in.
The response team which was located at the limits of its jurisdiction, decided to move in. The Israeli teenagers, located 15 meters from the Palestinians, laid low and directed the response team that was 50 meters away towards the place they claimed the armed Palestinian was seen. The response team fired at the Palestinian hitting him in the abdomen, at which point they ran towards the wounded Palestinian youth tied his hands together and began beating him.
Only once a company commander reached the scene did they stop. A soldier that accompanied the officer began treating the Palestinian, trying to stabilize his condition.
According to the high ranking officer from the division "the incident was very grave in respect to the teenagers' behavior that both tied him and held him down at that point. He was lucky that the army arrived relatively quickly, and once he was taken away the incident quieted down relatively."
The Palestinian had a knife among his belongings. And the military inquiry found that he broke his cell phone after being wounded. This is also being looked into by the military. When asked if the Palestinian's shooting was justified, the officer responded that the army had yet to conclude its investigation, but gave his estimate that it was "borderline."
"It isn't enough that someone shouts 'gunmen, gunmen,' a clear danger to life must be identified," the officer said.
|
{
"pile_set_name": "OpenWebText2"
}
|
Intermediate and senior phase training
Teen Persona Doll Training
In the context of high levels of HIV infections and the related stigma, prejudice, gender issues and abuse, crime and gender violence, there is urgent need for effective ways to address these challenges with young people.
TVET ECD training
E-learning
PDT offers an e-learning programme to promote inclusive practice and diversity. This is a stand-alone offering, comprising three modules: ‘Beginning with self’, ‘Anti-bias education’ and ‘Diversity and inclusion’.
|
{
"pile_set_name": "Pile-CC"
}
|
We Also Recommend:
Description:
Save ove 28% With This Kit!
(regular price $21)
These lickable, tasty treats will bring you hours of delight. No need to choose your favorite flavor with this kit--savor all three! Featuring our own signature body oils, almond-based so you can add oral enticements to your slippery play. Whether you're looking for fruity goodness or the luscious flavors of an elegant dessert, we've got you covered -- in delectable, erotic fun!
|
{
"pile_set_name": "Pile-CC"
}
|
Chronic drug administration can produce allostasis, a maladaptive state related to drug tolerance. This proposal investigates nitrous oxide (N2O)-induced allostatic changes and the motivational consequences of being in an allostatic state. Allostasis refers to a disordered form of homeostatic regulation wherein a regulated variable, or one or more of its controlling determinants, persistently functions at levels significantly different from control values, potentially compromising an individual's health or viability. An allostatic model of drug addiction posits that biobehavioral control systems regulate variables relevant to drug taking behavior and that these control systems are vulnerable to drug-induced allostatic changes which promote the development of addiction. The proposed studies use a sophisticated experimental model that combines direct and indirect calorimetry so that core temperature and its determinants (metabolic heat production and heat release) can be simultaneously measured, enabling rigorous determination of allostatic dynamics during repeated N2O administrations. This thermoregulatory model system also provides a sensitive method for determining the motivational consequences of allostasis. Preliminary data indicate that adolescent rats are especially prone to develop drug-induced allostatic changes, suggesting that increased susceptibility to allostasis development may be a critical etiological factor for the heightened vulnerability to drug addiction during adolescence. Specific Aim (SA) 1 compares allostasis development in adolescent versus mature rats over a range of N2O concentrations, determines whether these allostatic processes stabilize, and explores how they can be extinguished. SA 2 compares the thermally motivated effects of a range of N2O concentrations in adolescent versus mature rats and assesses the motivational effects of an allostatic state during adolescence. In addition, the relationship between initial sensitivity, allostasis development and N2O self-administration behavior will be investigated. SA 3 examines whether factors measured in the allostatic state (N2O concentration, core temperature, heat loss, heat production) can be used as predictors of motivated behavior. This work has practical and theoretical importance for understanding the mechanisms underlying drug addiction. The proposed research has the added relevance of investigating an abusable inhalant during the adolescent period which NIH has identified as an important, yet understudied, research area. PUBLIC HEALTH RELEVANCE: A form of homeostatic dysregulation known as allostasis is suspected to play an etiologic role in the development of drug addiction. The proposed research uses an understudied inhalant to investigate drug-induced allostasis during a developmental period (adolescence) that is known for its heightened susceptibility to drug addiction. The findings of this research will contribute to our understanding of the pathogenesis and treatment of drug addiction.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Maximization of signal derived from cDNA microarrays.
Microarray technology is a powerful tool for generating expression data on a large number of genes simultaneously. However, as for any assay, it must be reproducible to give confidence in the results. Using a classical statistical method--the factorial design of experiments--we have assessed the effects of different experimental factors in our system. Significant effects on signal were seen when the standard components were substituted with a different enzyme, fluorescent label, or RNA purification method. This has led to the implementation of an improved procedure that maximizes signal without affecting the variability of the system, thus increasing the signal-to-noise ratio. In addition, we were able to quantify the variability between microarrays and replicates within microarrays.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
[Study on the molecular mechanism of lingual epithelial cell apotosis and its related genes in different tongue furs].
To investigate the molecular mechanism ot lingual epithelial cell (LEC) apoptosis and its related genes expression in different tongue furs. The LEC apoptosis and its related genes expression including bax, fas, TGF-beta 3 mRNA and protein product in tongue fur was determined using terminal deoxynucleotidyl transferase-mediated deoxyuridine triphosphate nick end labelling technique (TUNEL), in situ hybridization, immunohistochemical technique and image analysis. LEC apoptosis could always be seen in 4 types commonly encountered tongue fur. The tendency of changing in thickness of tongue fur was opposite to that of apoptotic index. Compared with normal thin fur, bax and fas genes were over-expressed in exfoliative fur with increased apoptosis, while in thick fur, bax and TGF-beta 3 genes were low-expressed and accompanied with decreased apoptosis. The level of apoptosis promoting genes, bax, fas, TGF-beta 3 gene expression in LEC showed a tendency parallel to that of LEC apoptosis. Change of apoptosis related genes expression, bax, fas and TGF-beta 3 may effect the LEC apoptosis and be the important factor for changing of the thickness of tongue fur.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
[Spatial variability of soil C/N ratio and its influence factors at a county scale in hilly area of Mid-Sichuan Basin, Southwest China].
Spatial distribution characteristics of soil C/N ratio and its affecting factors at a county scale in hilly area of Middle Sichuan Basin were analyzed based on field sampling. Result indicated that soil C/N ranged from 4.84 to 21.79, with a mean value of 11.93. The coefficient of variation was 26.3%; which suggested soil C/N had moderate variability in this study area. The ratio of nugget to sill was 73.0%, which suggested the spatial variability of soil C/N was determined by both structural and random factors, and the random factors played a more important role. The soil C/N was higher in northeast and southwest while the central part of the study area was characterized by relatively lower values of soil C/N. The soil C/N ranged from 10.0 to 13.5 in most parts of the study area. Parent material, soil type, topographic factors and land use type had significant impacts on soil C/N (P<0.05). Soil C/N showed a significant positive correlation with elevation and slope (P<0.05). The soil parent materials were able to explain 8.7% of soil C/N spatial variability. The explanatory power of soil group, subgroup and soil genus were 3.8%, 5.0%, 8.7%, respectively. Topographic factors showed the lowest explanatory power of only 0. 8%. However, land use type could explain 23.9% of the spatial variability, which suggested that land use type was the dominant factor in controlling the spatial variability of soil C/N.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The authors wish to add Ka Fai Leung as the third author to the manuscript. The updated byline is: Kanwal Abbasi1, Kelly N. DuBois1, Ka Fai Leung1, Joel B. Dacks2, Mark C. Field1\*
The updated citation is: Abbasi K, DuBois KN, Leung KF, Dacks JB, Field MC (2011) A Novel Rho-Like Protein TbRHP Is Involved in Spindle Formation and Mitosis in Trypanosomes. PLoS ONE 6(11): e26890. doi:10.1371/journal.pone.0026890
Ka Fai Leung Performed the experiments, Contributed reagents/materials/analysis tools, and Wrote the Manuscript.
**Competing Interests:**No competing interests declared.
|
{
"pile_set_name": "PubMed Central"
}
|
146 N.W.2d 185 (1966)
Flora J. SCHMIDT, Appellant,
v.
Orville W. SCHMIDT, Respondent.
No. 39983.
Supreme Court of Minnesota.
November 10, 1966.
F. Gordon Wright, Minneapolis, for appellant.
Albertson, Norton & Jergens, and David K. Hebert, Stillwater, for respondent.
*186 OPINION
KNUTSON, Chief Justice.
Plaintiff and defendant were married on September 23, 1934. Two children were born as issue of the marriage but both are now of lawful age and married.
In July 1960 plaintiff commenced an action for divorce which culminated in a stipulation for settlement of property rights and alimony in October 1961. On November 8, 1961, a judgment and decree were entered granting plaintiff a divorce, which provided for the payment of alimony of $150 per month. In addition plaintiff was given the right to use the house owned by the parties as tenants in common as long as she remained unmarried but was required to make monthly payments on a mortgage amounting to $76.90 per month, which amount included taxes and insurance on the house. A few shares of stock theretofore owned by the parties in joint tenancy were left unchanged.
Defendant is employed by the Northwestern Bell Telephone Company in Minneapolis. He remarried in May 1962 and thereafter adopted three minor children of his newly acquired wife.
In March 1964 defendant served notice of motion for a change in the judgment and decree of divorce by eliminating the payment of alimony. Substantial affidavits by the parties showing their present financial condition were submitted to the court. Lengthy interrogatories were submitted by plaintiff and answered by defendant. Defendant also took a deposition of plaintiff, and an affidavit of one of the daughters of the parties was submitted. Some time after the return date of the motion the parties mutually agreed to submit the matter without oral argument. It appeared that plaintiff had substantially improved her position. While she was in ill health at the time of the divorce, she had regained her health at the time of the motion and was gainfully employed. During the year 1964 her take-home pay was $2,214.29, whereas at the time of the divorce her earnings were almost nothing. For some unknown reason the court made no decision on this motion. While it was pending, defendant discontinued payments of alimony in July, August, and half of September and December 1964, resulting in an arrearage of $450 by 1965. Plaintiff thereupon made a motion seeking to have defendant adjudged in contempt for failure to make the required alimony payments. The motion was returnable on January 18, 1965. On January 16 defendant served upon plaintiff's attorney a countermotion again seeking to have the alimony discontinued or reduced and the arrearages forgiven. This countermotion was made returnable on the same day as plaintiff's motion involving the contempt charge, and both came on for hearing together.
The court decided these motions on March 11, 1965. On plaintiff's motion the court found that "by reason of illness and circumstances beyond the control of the defendant, * * * there was no willful disobedience of the orders of this Court" and therefore defendant was not guilty of contempt. On defendant's motion the court amended the judgment and decree by reducing the alimony to the sum of $100 per month. On March 16 the court filed an amended judgment wherein it stated that the court would retain jurisdiction of the subject matter "insofar as alimony is concerned without prejudice to the rights of either party to seek modification of the alimony requirement or amendment thereof, by reason of any substantial change in the circumstances of the parties, or either of them."
Neither the original nor the amended judgment referred in any way to the default by defendant in payment of alimony. In order to collect this amount plaintiff commenced an action in the municipal court of the city of Minneapolis. Shortly thereafter the district court, on April 20, 1965, issued a corrective order forgiving defendant all amounts then due, which effectively terminated the action commenced in municipal court.
*187 Plaintiff now appeals from the amended judgment and the later order forgiving the defaulted payments. It is the contention of plaintiff that the court abused its discretion in reducing the alimony and in forgiving the defaulted payments although she concedes that the court's order finding the defendant not guilty of contempt was within the discretionary powers of the court and was not an abuse of discretion.
Plaintiff raises several technical objections to the proceedings. Among others, she complains of the long delay by the court in determining defendant's original motion for reduction in alimony. While we can see no excuse for a delay of some 9 months in deciding a motion of this kind, we fail to see how plaintiff has been prejudiced by it. During all of this time, excepting the months when defendant was in default, he continued to pay $150 per month. Had the court acted more expeditiously the payments might conceivably have been reduced earlier than they were.
Plaintiff also complains of the court's action on defendant's countermotion, which had been served only a few days before the hearing on January 18. Plaintiff appeared at this hearing and made no request for additional time to meet the claims of defendant. As a matter of fact, defendant's evidence supporting this motion was substantially the same as had been submitted in support of his original motion some 9 months previously, so it can hardly be said that the court and plaintiff were not aware of the claims of the defendant. We see no objection to hearing the countermotion at the same time as the motion to have defendant adjudged in contempt.
Additionally, plaintiff contends the court abused its discretion in issuing the order on April 20, 1965, forgiving the past-due installments of alimony. Such corrective order supplying an omission from the original order is permissible under Rule 60.01, Rules of Civil Procedure.
There are other technical objections which merit no discussion. Stripped to its essentials, the question before us is whether the court so far abused its discretion in reducing alimony and in granting forgiveness of past-due installments that we should interfere with it. An examination of the entire record requires a negative answer on both points.
1. The rules applicable to a proceeding of this kind are well established. The court has quite broad discretionary power to modify alimony payments when the conditions of the parties change. Here the record shows that defendant's health had materially deteriorated. He had a severe heart attack on July 3, 1964, following which he was hospitalized for 6 weeks and was unable to return to work for a long time thereafter. Prior to the heart attack he had suffered a back injury for which he was receiving medical treatment. As a result of these disabilities he has incurred medical and hospital expenses; and while his pay has continued as before, with some moderate raises since the divorce, the additional expenses accumulated to the point where the court found he was unable to make the payments. On the other hand plaintiff's condition has materially improved. She was not well enough to work at the time of the divorce, but since has regained her health and now is gainfully employed and earned in excess of $2,000 in 1964. She has the use of the house jointly owned by the parties and until shortly before these motions were heard had rented out one of the bedrooms. She can still do so. The improvement in her financial condition more than equals the reduction in alimony. We are convinced the record sustains the court's action.
2. Forgiveness of past-due installments was also within the discretionary power of the court. Hartigan v. Hartigan, 142 Minn. 274, 171 N.W. 925; Plankers v. Plankers, 178 Minn. 31, 225 N.W. 913; *188 Conklin v. Conklin, 223 Minn. 449, 27 N.W. 2d 275, 6 A.L.R.2d 1274.[1]
The court in passing upon plaintiff's motion to find defendant in contempt found that defendant was unable to pay during the time he was in default due to "illness and circumstances beyond the control of the defendant." The same reason may have impelled the court to forgive the past-due installments. If the court had timely acted upon defendant's original motion, there might not have been any necessity for the default. In any event, there is evidence to sustain the exercise of the court's discretionary power to grant the forgiveness, so it must be sustained.
We see no reason for interfering with the court's action.
Affirmed.
NOTES
[1] See Bensel v. Hall, 177 Minn. 178, 225 N.W. 104, as to the nature of alimony.
|
{
"pile_set_name": "FreeLaw"
}
|
Ethanol fraction of Aralia elata Seemann enhances antioxidant activity and lowers serum lipids in rats when administered with benzo(a)pyrene.
Aralia elata Seemann is an edible mountain vegetable in Korea containing saponin, alkaloid, palmitic acid, linoleic acid, methyl eicosanoate and hexacosol, and is known to manifest an effect on cardiac infarction, gastric ulcer, colitis, and enervation. This study has examined the effects of Aralia elata Seemann ethanol extract on antioxidant enzyme systems and lipid metabolism in rats along with benzo(a)pyrene (B(a)P) administration. Rats were divided into four groups: control (C), an extract fed group (CE), a B(a)P fed group (CB), and a B(a)P and extract fed group (CBE). The ethanol extracts of Aralia elata Seemann (50 mg/kg body weight) were fed to the rats for 4 weeks by stomach tubing. Extract administration increased the antioxidant activities of glutathione sulfur transferase (GST). Total superoxide dismutase (SOD) and Cu,Zn-SOD activities were stimulated. Catalase activities were increased by 50% with extract feeding. Cu,Zn-SOD was greatly enhanced from 0.10 unit to 0.18 unit and catalase activity also was increased. Serum alpha-tocopherol was markedly increased by the extracts. The ethanol fraction of Aralia elata Seemann decreased total serum cholesterol. However, serum HDL-cholesterol was increased by 35% (p<0.05). The results indicate that Aralia elata Seemann exerts antioxidant and strong hypocholesterolemic and hypolipidemic effects in vivo with the administration of B(a)P.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
1. Field of the Invention
This invention relates to a method for avoiding lump formation when hydrophilic gums are dispersed in aqueous systems and to compositions resulting therefrom.
2. The Prior Art
Hydrophilic gums are widely used in industry. They are formulated into pharmaceuticals, cosmetics, personal care products, papers and other diverse compositions. Their functions include acting as thickeners, binders, stabilizers, protective colloids, suspending agents and rheology or flow control agents. Generally, gums are blended directly into aqueous solutions. Upon contact with water, these materials swell and convert to viscous gel-like sols.
Rapid addition of hydrophilic gum to water is highly desirable. Unfortunately, rapid contact with water frequently results in lumping. More controlled addition only partially circumvents the problem. The lumps are gel-like substances, wet on the outside, dry in the center. Lumps usually resist dispersion even upon vigorous agitation or cooking. Once formed, extraordinary efforts are needed to effect their removal. Not only time, but considerable material is lost during removal.
Commercially, lumping has been avoided by pre-swelling the dry gums prior to addition into aqueous systems. Slow, careful wetting of gum with minor amounts water accomplishes the pre-swelling. Yet lumping is seldom totally avoided. The wetting process is time consuming. Production rates of end-product must be slowed to the rate limiting step, i.e., the pre-swell process.
Numerous patents record attempts to solve the problem by designing more readily dispersible gums. For instance, U.S. Pat. No. 2,662,882 modifies the gum by pre-wetting with water, agglomerating, regrinding and drying at room temperature. Dry-mixing gum with sodium bicarbonate or carbonate and an acid such as sodium bisulfite yields readily dispersible powders according to U.S. Pat. No. 2,807,591. In U.S. Pat. No. 4,309,535, sodium carboxymethyl cellulose, hereinafter referred to as CMC, was treated with aluminum chloride dissolved in aqueous isopropanol; drying afforded easily dispersible particles. British Pat. No. 926,409 disclosed that treatment of CMC with a fine water spray in a pulsating trough yielded a power of 5% moisture content with improved dispersibility. Other easily dispersible powders have been reported obtainable where CMC has undergone treatment either with aqueous sodium sulfate, been sprayed with aqueous Sorbit, or been stirred with aqueous mono- and di-glycerides, see Japanese Patent Nos. 78:45,358, 78:65,489 and 80:61,928, respectively. In Japanese Patent No. 73:52,848 cellulose derivatives were swelled with approximately an equivalent weight of water containing a small amount polyethylene glycol. After drying, gum granules were obtained that upon dissolution in water afforded lump-free solutions.
All the aforementioned art has pertained to modifying gum powders to enhance their water solubility. In contrast, the literature is relatively silent concerning direct methods to improve processing of hydrophilic gums into aqueous consumer products. Even with modified powders, blending difficulties are often noted. New techniques are still needed to increase gum-water blending efficiency that avoids lumping.
It is an object of this invention to present a process for dispersing hydrophilic gums swiftly into water containing formulations while avoiding the lumping problem.
It is a further object to provide lump-free compositions comprising hydrophilic gums, water and alcohol.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Ricky Laureano
Ricky Laureano (born August 3, 1969) is a Puerto Rican musician most known for being the guitarist and one of the main songwriters of the Rock en Español band Fiel a la Vega.
Biography
Ricky Laureano met Tito Auger in the late 80s. Together they formed another band called Farenheitt. The band recorded a single with the first writing collaborations of Auger and Laureano. Their first songs were titled "Maryann" and "I'd Been Looking". In 1990, Laureano and Auger decide to seriously pursue a career in music and they moved to the United States, specifically in New Jersey. Three months later, Auger's father died and he returned to Puerto Rico. Laureano stayed there and started playing with a band called Pure Myth. Two years later, upon Auger's return they reunited again.
After returning to Puerto Rico, Laureano and Auger reunited with friends Jorge and Pedro Arraiza, with whom they had played before and formed Fiel a la Vega. The band quickly achieved great success in the island releasing several radio hits and winning several awards. As of 2019, the band has released five studio albums, three live albums, a compilation, and has performed hundreds of concerts through Puerto Rico and the United States. They have also won several awards.
Since 2010, the band has reduced their presentations, which has allowed Laureano to work on his own music. Through the last years, he has recorded and released numerous singles and EPs which he has made available through his own website. In 2017, Laureano recorded his first full-length album in which he sang and recorded all the instruments. The eponymous album features twelve songs, all written by Laureano.
See also
Music in Puerto Rico
Puerto Rican rock
References
External links
Ricky Laureano at Allmusic
Category:1969 births
Category:Living people
Category:People from Vega Alta, Puerto Rico
Category:Puerto Rican guitarists
Category:Fiel a la Vega members
Category:20th-century American guitarists
|
{
"pile_set_name": "Wikipedia (en)"
}
|
<?xml version="1.0" encoding="UTF-8"?>
<document xmlns="http://v8.1c.ru/8.2/data/spreadsheet" xmlns:style="http://v8.1c.ru/8.1/data/ui/style" xmlns:v8="http://v8.1c.ru/8.1/data/core" xmlns:v8ui="http://v8.1c.ru/8.1/data/ui" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<languageSettings>
<currentLanguage>ru</currentLanguage>
<defaultLanguage>ru</defaultLanguage>
<languageInfo>
<id>ru</id>
<code>Русский</code>
<description>Русский</description>
</languageInfo>
<languageInfo>
<id>en</id>
<code>English</code>
<description>English</description>
</languageInfo>
</languageSettings>
<columns>
<size>8</size>
</columns>
<rowsItem>
<index>0</index>
<row>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Тип</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Вид</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>ИмяПеременной</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>ТЧ</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Реквизит</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Значение</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Режим</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>ДополнительныйТипЗначения</v8:content>
</v8:item>
</tl>
</c>
</c>
</row>
</rowsItem>
<rowsItem>
<index>1</index>
<row>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Справочник</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>ИерархическийСправочник</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Группа1</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<i>5</i>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Группа1</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Предопределенный</v8:content>
</v8:item>
</tl>
</c>
</c>
</row>
</rowsItem>
<rowsItem>
<index>2</index>
<row>
<c>
<i>4</i>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Ссылка</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>b4ac232c-746a-11e8-9aa1-704d7b8af3d1</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<i>7</i>
<c>
<f>0</f>
<tl/>
</c>
</c>
</row>
</rowsItem>
<rowsItem>
<index>3</index>
<row>
<c>
<i>4</i>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Наименование</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Группа1</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
</c>
</c>
<c>
<c>
<f>0</f>
<tl/>
</c>
</c>
</row>
</rowsItem>
<rowsItem>
<index>4</index>
<row>
<c>
<i>3</i>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>xddMods</v8:content>
</v8:item>
</tl>
</c>
</c>
</row>
</rowsItem>
<rowsItem>
<index>5</index>
<row>
<c>
<i>4</i>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Режим</v8:content>
</v8:item>
</tl>
</c>
</c>
<c>
<c>
<f>0</f>
<tl>
<v8:item>
<v8:lang>ru</v8:lang>
<v8:content>Группа</v8:content>
</v8:item>
</tl>
</c>
</c>
</row>
</rowsItem>
<templateMode>true</templateMode>
<defaultFormatIndex>1</defaultFormatIndex>
<height>6</height>
<vgRows>6</vgRows>
<format>
<width>72</width>
</format>
</document>
|
{
"pile_set_name": "Github"
}
|
‘Diane Abbott, who received more abuse than any other MP during the last election, argues that it is the abuse that needs to be stopped, not people’s right to vote.’
Photograph: Chris J Ratcliffe/Getty Images
The British government’s claim to legitimacy rests entirely on the existence of universal suffrage. Theoretically, at least, we accept the state’s power to fine, imprison and otherwise penalise us not only because it happens to be the best at wielding power, but because all adult citizens have some input into the laws we are governed by. That’s pretty much the central principle of representative democracy.
Voting rights are not a special privilege. They are not something the state should be able to take away as a form of petty discipline, like a parent deciding an obstinate child should go to bed without dessert. So it’s worrying to see the Electoral Commission recommend that “social media trolls” be punished in this manner, treating a core civil right as something that can be blithely withdrawn.
Let’s treat online abuse as a public health hazard | Sonia Sodha
Read more
It’s not that I don’t take online trolling seriously – I have experienced more than my fair share of it. Like most women with strong opinions and some sort of public profile, I’ve been sent rape threats, death threats and been called every name under the sun. Strangers have done bizarre and unsettling things to photographs of my face. I’ve felt scared for my physical safety because of communications I’ve received online.
Many such messages are already illegal according to existing laws – probably rightly so. I’m generally wary of the creation of new criminal offences, but persistent, targeted, credible threats of violence aren’t acceptable in any other context, so why should the internet be any different? Others, though, were just unpleasant. I don’t enjoy being bombarded with sexist slurs but I don’t think anyone should be incarcerated for it. “Trolling” has become an incredibly nebulous term which incorporates everything from graphic rape fantasies and stalking to being called a “fat prick”.
The UK already removes voting rights from people convicted of offences, of course, providing they are given a custodial sentence. The Electoral Commission’s recommendation appears to be that this should be extended to cover crimes too trivial to receive time in prison. The European court of human rights has condemned the UK’s blanket ban on voting for convicted prisoners, and there does seem to be something deeply wrong about barring people from participating in the very democracy they’re being punished by.
(If you find it hard to get too worked up about the rights of murderers and child abusers, remember there are also many people in prison for non-violent offences. Remember also that it’s our legal system that determines who is, for example, the legitimate occupant of a home, and who is a squatter deserving of imprisonment.)
Further extending the use of voting bans as a form of punishment would undermine the UK’s status as a functioning democracy. Given how widespread internet trolling is, it’s inevitable that questions will be asked about who is and isn’t targeted. The Electoral Commission’s recommendation was part of an inquiry into the intimidation of political candidates. But what makes trolling an MP qualitatively different from trolling a fellow citizen? The argument needs to be made, if one warrants the removal of a civil right and the other doesn’t.
Before embarking on a measure such as this, it’s worth gathering evidence about who is most likely to be abusive or angry towards politicians online. I’d guess: people at the end of their tether. Individuals who have been failed by the state in some way and are lashing out as a result. Arguably, the people whose needs politicians should most take into account.
People who have faced particular difficulties are already disproportionately likely to end up in prison and lose their voting rights on that basis. Poorer people and those in unstable living situations are also the most likely to be hit by Conservative plans to make photo ID a requirement for voting – even though the form of electoral fraud it’s ostensibly intended to prevent is basically non-existent in this country.
It’s up to all of us to fight back against the pernicious, gradual erosion of our democracy
However well-meaning the suggestion, what this recommendation seems to suggest is that our establishment takes voting rights rather lightly. It’s up to all of us to fight back against the pernicious, gradual erosion of our democracy. Poor people and those with chaotic lives shouldn’t be prevented from voting because of expensive photo ID requirements, designed to solve a problem it’s widely accepted does not actually exist. Prisoners should be granted voting rights. And, certainly, we must resist the expansion of voting bans as punishment for more trivial offences. It’s important not to let reasonable concern about the online abuse suffered by MPs blind us to the implications of such a move. Diane Abbott, Labour’s shadow home secretary, who received more abuse than any other MP during the last election, has opposed the suggestion.
Politicians are elected to represent us. Their mandate derives from the democratic legitimacy our votes invest them with. Nobody deserves to receive abuse while carrying out their job, but meddling with the basic principles underpinning our political system is not an acceptable (or, in all likelihood, a particularly effective) solution. As they consider this proposal, I’d like to remind the government that it’s the electorate who grant them their power. For society to continue to function properly, there are certain rules they must not disregard.
|
{
"pile_set_name": "Pile-CC"
}
|
A father-of-two has been banned from every pub in Queensland as the courts try to curb his alleged anti-social behaviour.
The move to block Tannum Sands resident Steve Parnell from entering any hotel in the state has been praised by police.
Steve Parnell leaves Gladstone Magistrates Court. Credit:Paul Braven/Gladstone Observer
Mr Parnell is facing five charges, including two counts of serious assault, after police were called to his residence in the early hours Sunday to respond to noise complaints.
Mr Parnell allegedly became aggressive and punched an officer in the face before the officer used a Taser on the accused.
On Tuesday, Magistrate Mark Morrow granted bail with conditions including that Mr Parnell was banned for every licensed premises in Queensland and had to submit to the breath test every week.
Read more at the Gladstone Observer
|
{
"pile_set_name": "OpenWebText2"
}
|
Corneal incision architecture after IOL implantation with three different injectors: an environmental scanning electron microscopy study.
To evaluate by Environmental Scanning Electron Microscopy (ESEM) the corneal incision architecture after intraocular lens (IOL) implantation in pig eyes, using manual, automated injectors or preloaded delivery systems. Twenty-four pig eyes underwent IOL implantation in the anterior chamber using three different injectors: manual (Monarch III) (n = 8), automated (AutoSert) (n = 8), or a preloaded system (UltraSert) (n = 8). Acrysof IQ IOLs, 21 Dioptres (D) (n = 12) and 27D (n = 12), were implanted through 2.2 mm clear corneal incisions. Incision width was measured using corneal calipers. The endothelial side of the incision was analyzed with ESEM. In each group, the final size of the corneal wound after IOL implantation, measured by calipers, was 2.3-2.4 mm. The incision architecture resulted more irregular in the Monarch group compared with the other injectors. In every group the 27D IOL-implanted specimens showed more alterations than in 21D IOL-implanted samples, and this was less evident in the UltraSert group. The Descemet tear length was higher in the Monarch group than AutoSert and UltraSert group. The automated and preloaded delivery systems provided a good corneal incision architecture; after high-power IOL implantation the incisions were more regular and less damaged with the preloaded system than with the other devices.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
TestNG class with Factory and Dataprovider never works
I have a jar calculator library. I made a simple class to test 'sum' function with Factory and DataProvider like in many examples. But when i run it i see: no test's executed. If i delete Factory and write DataProvider to a Test annotation - everything works fine.
public class SumTest {
Calculator calc = new Calculator();
private final double a;
private final double b;
@Factory(dataProvider = "getValues")
public SumTest(double aValue, double bValue) {
this.a = aValue;
this.b = bValue;
this.calc = new Calculator();
}
@Test
public void testSum() {
Assert.assertEquals(a + b, calc.sum(a, b));
}
@DataProvider
public Object[][] getValues() {
return new Object[][]{
{10, 5},
{-10, 5},
{11.55, -10.55},
{-5, -6},
{99999.8d, 1l},
{9223372036854775807L, 9223372036854775807L}
};
}
}
A:
DataProvider needs to be Static to make Factory Work.
|
{
"pile_set_name": "StackExchange"
}
|
176 N.W.2d 266 (1970)
Benjamin S. TAYLOR, et al., Respondents,
v.
ALLSTATE INSURANCE COMPANY and Ian M. MacCallum, Appellants,
Hardware Mutual Casualty Company and Velie Motor Co., Appellants,
Heggie F. Nelson, individually and as trustee for heirs of Lilly Nelson, deceased, Respondent.
Nos. 41796, 41805.
Supreme Court of Minnesota.
April 3, 1970.
*268 Hoppe & Healy, Minneapolis, for Allstate Ins. Co.
Miller & Neary, Minneapolis, for Hardware Mutual Cas. Co.
Faegre & Benson, and Wright Brooks, Minneapolis, for Taylor and others.
Swanson & Christoffersen, St. Paul, for Nelson.
Heard before KNUTSON, C. J., and NELSON, MURPHY, OTIS, and FRANK T. GALLAGHER, JJ.
OPINION
NELSON, Justice.
Appeals from a declaratory judgment that policies of insurance issued by Allstate Insurance Company (hereinafter referred to as Allstate) and Hardware Mutual Casualty Company (hereinafter Hardware Mutual) afforded primary coverage to Benjamin S. Taylor and his son, James A. Taylor, and that a policy issued by Aetna Casualty and Surety Company (hereinafter Aetna) afforded excess insurance; and from the trial court's order denying motions by Hardware Mutual for amended findings and by Allstate and Ian M. MacCallum for a new trial.
The facts according to a stipulation of the parties and the testimony which was taken by deposition are as follows: On February 10, 1966, Benjamin S. Taylor brought his automobile to Velie Motor Company's service garage for repairs. Velie Motor Company had a practice of providing its customers with vehicles while their automobiles were in for repairs. Ian MacCallum, the foreman of the Velie body shop, furnished Benjamin Taylor with one of the "loaners" without charge, whereupon Taylor signed a Velie printed form entitled "Agreement for Loan of Courtesy Car." Taylor drove the courtesy car a short distance and upon becoming dissatisfied with its performance returned it to the shop and requested a different vehicle. MacCallum decided to allow Taylor to use his personally owned 1955 Oldsmobile as a loaner. Taylor signed another "Agreement for Loan of Courtesy Car" covering MacCallum's automobile, which included a provision that he was "[n]ot to allow or cause the vehicle to be loaned, rented, or operated by any person other than myself."
On February 11, 1966, Taylor's son, James Taylor, asked and received permission from his father to use MacCallum's 1955 Oldsmobile to drive to the Navy recruiting station in Crystal, Minnesota. While returning home later that same afternoon, James Taylor was involved in an accident with an automobile owned and operated by Heggie F. Nelson, in which his wife was a passenger. Mrs. Nelson died as a result of injuries sustained in that accident. Nelson brought suit individually for personal injuries sustained, and as trustee for the heirs of his deceased wife for her death, against James Taylor, Benjamin *269 Taylor, Ian MacCallum, and Velie Motor Company.
At the time of the accident, Aetna had in force and effect an automobile liability policy issued to Benjamin Taylor as named insured, describing the car he had in the Velie shop for repairs. In addition to providing coverage for its ownership, maintenance, and use by the named insured and any person using the vehicle with permission of the owner, the policy provided coverage for the use of any temporary substitute automobile, the latter coverage being "excess insurance over any other valid and collectible insurance."
Hardware Mutual had in force and effect a garage liability policy issued to Velie Motor Company as named insured which insured among other things the use of any automobile for the purpose of garage operations.
Allstate had in force and effect an automobile policy issued to MacCallum as named insured which provided coverage for any other person using his 1955 Oldsmobile, provided its use was with the permission of the named insured.
When Hardware Mutual and Allstate denied that their policies afforded coverage for the liability of James Taylor or Benjamin Taylor and refused to defend them in the suit brought by Nelson, the Taylors and Aetna commenced a declaratory judgment action requesting the court to determine what, if any, coverage was afforded by the respective policies.
The trial court determined that the Taylors were covered as additional insureds under the Allstate and Hardware Mutual policies and that both policies provided primary coverage for any legal liability that either of them had on account of the accident, while the Aetna policy provided "excess" insurance with respect to both the Allstate and Hardware Mutual policies. These appeals by Hardware Mutual, Velie Motors, Allstate, and MacCallum followed.
The issues involved in these appeals are as follows: (1) Was MacCallum's automobile being driven at the time of the accident with his implied permission so as to entitle the driver, James Taylor, to coverage as an additional insured under the Allstate automobile liability policy even though the agreement under which the car was loaned to Benjamin Taylor recited that the customer was not to allow the vehicle to be operated by any person other than himself? (2) Where a garage follows the practice of loaning cars to customers while their automobiles are in its shop for repairs, and the garage foreman loans his personal automobile to a customer, no suitable garage-owned car being available at the time, has the garage liability insurer avoided being a primary insurer for an accident involving the automobile during the time it was in the customer's possession by limiting the coverage afforded to another person using an automobile for a purpose incidental to the business of the garage with an "escape" clause which is to apply where there is other valid and collectible insurance available? (3) Assuming the garage liability policy affords primary coverage for the accident, what are the applicable limits of its liability?
1. Allstate contends that when MacCallum loaned his automobile to Benjamin Taylor the permission to use the car did not extend to his son, James Taylor, especially since the father signed the agreement which included a provision that he was not to allow the vehicle to be operated by any person other than himself. There is no dispute over the fact that permission was given by Benjamin Taylor to his son to use the automobile. The ultimate issue is whether MacCallum gave his permission to James Taylor to use the automobile.
It is not essential that express permission be given for use of an automobile in order to give the operator protection as an additional insured under an omnibus clause. Permission for such use may be inferred from all the facts and circumstances *270 of the case. Anderson v. Hedges Motor Co., 282 Minn. 217, 164 N.W. 2d 364; 7 Appleman, Insurance Law and Practice, § 4365.
The deposition testimony presented a fact issue as to whether Benjamin Taylor was informed of any limitation being placed on the use of the 1955 Oldsmobile. He testified that he had made the Velie people aware at the time he brought his car to the garage for repairs that his family would need another automobile to use. The Velie people knew that members of Benjamin Taylor's family drove his car. Mr. Taylor also testified that he did not read the agreement which he signed and that he did not recall being told that he was not allowed to let anyone else drive the automobile. It is undisputed that he was not given a copy of the loan agreement. On the other hand, Ian MacCallum testified that he reviewed the agreement with Benjamin Taylor and specifically the clause prohibiting use of the car by anyone else. He claimed that Benjamin Taylor had ample opportunity to read the agreement and did in fact read it in his presence. MacCallum acknowledged that he knew there was a good likelihood that when a customer was loaned an automobile to use while the family car was being repaired, there would be other members of the family driving the car. Another Velie employee acknowledged that it was not his practice to stress the provision about not loaning the car to anyone else.
The trial court found that Benjamin Taylor signed the agreement without reading it; that MacCallum did not tell Taylor not to let anyone else use the car; that Taylor's attention was not called to the provision in the form prohibiting anyone other than the customer from driving the car; that in loaning a car to a customer to use while the family car was being repaired, Velie and MacCallum could naturally expect other members of the customer's family to operate the car; and that at the time of the accident James Taylor was using the 1955 Oldsmobile with the permission of his father and with the implied permission of both MacCallum and Velie Motors.
2. This court has construed the term "consent" as used in the phrase "operated * * * by any person other than the owner, with the consent of the owner, express or implied" in Minn.St. 170.54 of the Safety Responsibility Act to include the situation where a bailee is a member of the bailor's immediate family or is the bailor's employee and he gives a third person permission to drive the automobile in contravention of instructions by the bailor forbidding anyone else to drive it, while the bailee remains as passenger in the vehicle. Lange v. Potter, 270 Minn. 173, 132 N.W.2d 734; Mullin v. The Fidelity & Casualty Co., 271 Minn. 551, 136 N.W.2d 613. The term "consent" in the Safety Responsibility Act has been treated by this court synonymously with the term "permission" as used in customary omnibus clauses. Allied Mutual Casualty Co. v. Nelson, 274 Minn. 297, 143 N.W.2d 635. Although in both the Lange and Mullin cases the first permittee, as passenger, was in a real sense "using" the automobile due to his "control" over the driver, the same reasoning applies in the instant situation where the first permittee was not present in the car. Although Benjamin Taylor did not have control over the actual mechanical operation of the car, he still had control over who would drive and for what purpose.
We conclude that where the 1955 Oldsmobile was lent by MacCallum to Benjamin Taylor for general use, and Taylor in turn permitted its use by his son, such use is deemed to be with permission of MacCallum. It is the clear implication that Taylor was authorized to use the car as his personal car ordinarily would be used. MacCallum and Velie should have been on notice that a personal passenger automobile would be used in the way the 1955 Oldsmobile was used in this case. See, Utica Mutual Ins. Co. v. Rollason (4 Cir.) 246 F.2d 105. We believe that the trial *271 court was justified on the evidence in finding that MacCallum impliedly permitted James Taylor to use his vehicle.
3. The fact that Benjamin Taylor signed a loan agreement which contained a provision prohibiting him from allowing anyone else to use the vehicle does not change our holding. The trial court found that Taylor was not made aware of this provision, nor did he receive a copy of what he had signed. This provision was therefore legally ineffective under the circumstances of this case. See, Miller v. Macalester College, 262 Minn. 418, 115 N.W.2d 666; Financial Indemnity Co. v. Hertz Corp., 226 Cal.App. 2d 689, 38 Cal.Rptr. 249.
4. With regard to the second issue, Hardware Mutual and Velie Motors contend that since Allstate is the primary insurer of the Taylors, such primary liability activates the "escape" clause of Hardware Mutual's policy providing that it affords no coverage if there is "other valid and collectible automobile liability insurance, either primary or excess" available.
The Hardware Mutual policy issued to Velie Motors had the following applicable provisions:
"PART ILIABILITY
* * * * * *
"Garage Operations Hazard
"The ownership, maintenance or use of the premises for the purposes of a garage, and all operations necessary or incidental thereto, hereinafter called `garage operations'.
"Automobile Hazards
"1. All Automobiles
"(a) The ownership, maintenance or use of any automobile for the purpose of garage operations, and the occasional use for other business purposes and the use for non-business purposes of any automobile owned by or in charge of the named insured and used principally in garage operations, and
"(b) The ownership, maintenance or use of any automobile owned by the named insured while furnished for the use of (i) the named insured, a partner therein, an executive officer thereof or, if a resident of the same household, the spouse of any of them, or (ii) any other person or organization to whom the named insured furnishes automobiles for their regular use.
* * * * * *
"Persons Insured
"Each of the following is an insured under Part I, except as provided below:
* * * * * *
"(3) With respect to the Automobile Hazard:
"(a) any person while using, with the permission of the named insured, an automobile to which the insurance applies under paragraph 1(a) or 2 of the Automobile Hazards, provided such person's actual operation or (if he is not operating) his other actual use thereof is within the scope of such permission,
"(b) any person while using an automobile to which the insurance applies under paragraph 1(b) of the Automobile Hazards with the permission of the person or organization to whom such automobile is furnished, provided such person's actual operation or (if he is not operating) his other actual use thereof is within the scope of such permission."
The policy also contained the following endorsement:
"In consideration of the reduced rate of premium made applicable to the insurance under Part I, it is agreed that this policy section is amended as follows:
"1. Paragraph 3 of `Persons Insured' is amended to read as follows, and Paragraphs 4 and 5 below are added, all *272 subject to exceptions (i), (ii), (iii) and (iv) as set forth in this policy section.
"`(3) With respect to an automobile to which the insurance applies under paragraph 1(a) of the Automobile Hazards, any of the following persons while using such automobile with the permission of the named insured, provided such person's actual operation or (if he is not operating) his other actual use thereof is within the scope of such permission:
* * * * * *
"`(b) any other person, but only if no other valid and collectible automobile liability insurance, either primary or excess, with limits of liability at least equal to the minimum limits specified by the financial responsibility law of the state in which the automobile is principally garaged, is available to such person * * *.
"`(4) With respect to an automobile to which the insurance applies under paragraph 1(b) of the Automobile Hazards, any person while using such automobile with the permission of the person or organization to whom such automobile is furnished, provided such person's actual operation or (if he is not operating) his other actual use thereof is within the scope of such permission * * *.'"
Appellants Hardware Mutual and Velie contend that the 1955 Oldsmobile was a 1(a) automobile and as such is excluded from coverage under the "escape" clause in the endorsement. They reason that the automobile must be a 1(a) automobile due to the requirement that a vehicle must be owned by the named insured in order to be classified 1(b) and the 1955 Oldsmobile was not owned by Velie.
We disagree and find that the 1955 Oldsmobile is a 1(b) automobile to which the "escape" clause is inapplicable. The first portion of paragraph 1(a) includes automobiles which are owned, maintained, or used for the purpose of garage operations. The second portion includes automobiles owned by or in charge of the named insured and used for nonbusiness purposes even though they are used principally in garage operations. The automobile involved in the instant case was owned by MacCallum personally. Consequently, it was not used "principally" in garage operations as required by the second portion of the 1(a) classification. Since the intent of the insurance company in drafting this clause in its "Automobile Hazards" section probably was to deal with automobiles which were principally used in garage operations as evidenced by the second portion of the 1(a) clause, this intent we presume was necessarily present throughout the drafting of the entire clause. Thus, the first portion of the 1(a) clause is interpreted to encompass automobiles owned, maintained, or used principally in garage operations. Again, since MacCallum's automobile was owned and used as his personal automobile, it was not owned, used, or maintained principally for garage operations and was not, therefore, a 1(a) automobile.
Although the trial court did not specifically classify the 1955 Oldsmobile as 1(a) or 1(b) under the Hardware Mutual policy, its finding that Benjamin Taylor was within the class of persons to whom Velie furnished automobiles for their regular use is consistent with the latter classification.
The words "owned by the named insured" are not defined in the policy. In Quaderer v. Integrity Mutual Ins. Co., 263 Minn. 383, 116 N.W.2d 605, the insurer had denied coverage under an automobile liability policy on the ground that the accident-involved car was not owned by the named insured, but by his son, and so was not an "owned automobile" within the policy meaning. When the named insured later sued for expenses he had incurred in successfully defending a lawsuit brought against him and his son on account of the accident, this court allowed him to recover *273 because the terms "owned by the named insured" and "ownership" were ambiguous in their context and could be deemed to include anyone with an insurable interest, i. e., anyone who might be held liable for damages on account of the operation of the car.
Thus, where a garage loans automobiles to customers, as Velie does in this case, the words "owned by the named insured," as used in paragraph 1(b) of Automobile Hazards, we construe to include not only the automobiles which Velie legally owns and uses for loans to customers but also automobiles, such as MacCallum's, which are occasionally loaned to customers. It is significant to note that even though the 1955 Oldsmobile was technically owned by MacCallum, it was loaned to Benjamin Taylor under a Velie loan agreement. This loan arrangement further buttresses our conclusion that the accident-involved automobile was an automobile "owned by the named insured" under paragraph 1(b).
Since the accident-involved vehicle was a 1(b) automobile to which the "escape" provision is inapplicable, it is unnecessary to rule on the legal effectiveness of such provision. The case of Federal Ins. Co. v. Prestemon, 278 Minn. 218, 153 N.W.2d 429, is not authority for invalidating the clause under the circumstances of the instant case since Prestemon dealt with two insurance policies which were mutually repugnant to each otherone policy containing an "excess insurance" clause and the other policy containing a "no liability" clause. The policy containing the "no liability" clause was found to provide primary coverage. In the instant case, we do not have inconsistent policies but rather a policy which provides primary coverage (Allstate) and a policy with a "no liability" provision. We reserve ruling on the legal effectiveness of this type of exculpatory clause. We point out, however, that Minnesota requires automobile liability insurance policies to contain omnibus insurance coverage. Minn.St. 170.40. Other state supreme courts have expressed a policy of not altering omnibus insurance clauses and of providing permissive users with the same coverage as the named insured. Willis v. Security Ins. Group, 104 N.J.Super. 410, 250 A.2d 158, affirmed, 53 N.J. 260, 250 A. 2d 129; American Motorists Ins. Co. v. Kaplan, 209 Va. 53, 161 S.E.2d 675.
Hardware Mutual also contends that if it is to be required to share responsibility with Allstate on a pro rata basis, then the applicable limit of its liability should be placed at $10,000/$20,000/ $5,000 under a policy endorsement. This endorsement limits liability only with respect to certain persons using a 1(a) automobile. Thus, for precisely the same reasons that Hardware Mutual cannot avoid primary coverage, it cannot avoid having its pro rata liability calculated on the basis of the Hardware Mutual limits of liability, $250,000/$500,000/$100,000.
After a very careful consideration of the record herein, we reach the conclusion that the findings must be sustained. Where there is evidence reasonably tending to sustain the findings of the trial court, such findings must be sustained. The function of a court of review is not to weigh the evidence as if trying the matter de novo but to determine from an examination of the record if the evidence as a whole sustains the trial court's findings, and, if so sustained, it is immaterial that the record might also provide a reasonable basis for inferences and findings to the contrary. Bolduc v. New York Fire Ins. Co., 244 Minn. 192, 69 N.W.2d 660.
We conclude that the trial court has properly resolved the issues of this case, and the judgment is affirmed.
Affirmed.
|
{
"pile_set_name": "FreeLaw"
}
|
Michael D. Cohen, President Trump’s former lawyer, released a secret recording on Tuesday of a conversation between Mr. Cohen and Mr. Trump in which Mr. Trump appears to have knowledge of payments to a former Playboy model who said she had an affair with him.
The recording provides details on payments to the former model, Karen McDougal, but it does not definitively answer the question of whether Mr. Trump directed Mr. Cohen to make the payments in cash or by check.
The recording’s release contradicts repeated statements from Mr. Trump and his aides, and it shows how those in Mr. Trump’s orbit have used falsehoods to try to protect themselves from unflattering coverage and tough questions.
|
{
"pile_set_name": "OpenWebText2"
}
|
1 Oz. Tequila Shooter - 40% Off at ReStockIt.comLibbey products combine quality and durability in a wide range of glassware products. ReStockIt.com has libbey 1 oz tequila shooter at up to 40% discount. Libbey glassware, flatware and dinnerware are also available. ReStockIt.com is the source for Libbey products.
ReStockIt.com Quick View
Get Social With Us!
You're now signed up for emails to get exclusive discounts!Take an extra 5% OFF today's order! Use coupon code W932
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
glBindAttribLocation whats next?
I'm struggling to find OpenGL/GLSL examples that don't require glew or glut or what have you.
I'm trying to work with only using glfw3 (if possible I would like to use no other libraries) and I'm struggling to understand what to do once I use glBindAttribLocation? I've written code to pass an image as a texture into shaders, but I can't figure how to pass vertices.
I have a vertex shader and fragment shader I want to make a triangle and then color it red, I can create the shader programs and object program and link everything, but how do I pass things to the shaders.
// vert
in vec3 vPosition;
void main()
{
gl_Position = vec4(vPosition,1.0);
}
// Frag
out vec4 color;
void main()
{
color = vec4(1.0,0.0,0.0,1.0);
}
I don't understand what I need to do after I call glBindAttribLocation
glBindAttribLocation(p,0,"vPosition");
glUseProgram(p);
now how do I pass the vertices of a triangle into the shader?
more code, I'm calling my own library to read in the files so the textread won't work if anyone tries to run it
#include <GLFW/glfw3.h>
#include <stdlib.h>
#include <stdio.h>
#include "src/textfile.h"
GLuint v,f,p;
void printLog(GLuint obj)
{
int infologLength = 0;
int maxLength;
if(glIsShader(obj))
glGetShaderiv(obj,GL_INFO_LOG_LENGTH,&maxLength);
else
glGetProgramiv(obj,GL_INFO_LOG_LENGTH,&maxLength);
char infoLog[maxLength];
if (glIsShader(obj))
glGetShaderInfoLog(obj, maxLength, &infologLength, infoLog);
else
glGetProgramInfoLog(obj, maxLength, &infologLength, infoLog);
if (infologLength > 0)
printf("%s\n",infoLog);
}
static void error_callback(int error, const char* description)
{
fputs(description, stderr);
}
static void key_callback(GLFWwindow* window, int key, int scancode, int action, int mods)
{
if (key == GLFW_KEY_ESCAPE && action == GLFW_PRESS)
glfwSetWindowShouldClose(window, GL_TRUE);
}
void setShaders() {
char *vs = NULL,*fs = NULL;
v = glCreateShader(GL_VERTEX_SHADER);
f = glCreateShader(GL_FRAGMENT_SHADER);
vs = textFileRead("toon.vert");
fs = textFileRead("toon.frag");
const char * ff = fs;
const char * vv = vs;
glShaderSource(v, 1, &vv,NULL);
glShaderSource(f, 1, &ff,NULL);
free(vs);free(fs);
glCompileShader(v);
glCompileShader(f);
p = glCreateProgram();
glAttachShader(p,f);
glAttachShader(p,v);
glLinkProgram(p);
//glUseProgram(p);
}
int main(void)
{
GLFWwindow* window;
glfwSetErrorCallback(error_callback);
if (!glfwInit())
exit(EXIT_FAILURE);
window = glfwCreateWindow(640, 480, "Simple example", NULL, NULL);
if (!window)
{
glfwTerminate();
exit(EXIT_FAILURE);
}
glfwMakeContextCurrent(window);
glfwSetKeyCallback(window, key_callback);
while (!glfwWindowShouldClose(window))
{
int height, width;
float ratio;
glfwGetFramebufferSize(window, &width, &height);
ratio = width / (float) height;
glViewport(0, 0, width, height);
setShaders();
glBindAttribLocation(p,0,"vPosition");
glUseProgram(p);
/* Now What */
glfwSwapBuffers(window);
glfwPollEvents();
}
glfwDestroyWindow(window);
glfwTerminate();
exit(EXIT_SUCCESS);
}
A:
you "pass vertices into the shaders" by making a draw call, most typically glDrawArrays().
when glDrawArrays() hits, the currently bound vertex array gets sent off to GPU-land. the vertices will be processed by the currently bound program (which you seem to have figured out) and each vertex attribute will flow into the vertex shader variables based on whether or not the shader variable's attribute index matches the vertex attribute's glVertexAttribPointer() "index" parameter (which you seem on the way to figuring out).
so, look into glVertexAttribPointer() to describe your array of vertices, glEnableAttributeArray() to enable your array of vertices to be sent on the next draw call, and then glDrawArrays() to kick off the party.
|
{
"pile_set_name": "StackExchange"
}
|
Breakthrough varicella infection in a healthcare worker despite immunity after varicella vaccination.
Although varicella vaccination is recommended for varicella-susceptible healthcare workers (HCWs), breakthrough infection after vaccination is not unusual, especially following household exposures. We report breakthrough varicella in a vaccinated HCW and review the data on breakthrough infection and concerns for the healthcare setting.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Galactooligosaccharides find widespread use in the industry as prebiotic compounds. A number of processes have been developed for the production of galactooligosaccharides. Some processes involve the use of μ-galactosidase enzyme obtained from different microbial sources, example Aspergillus oryzae, Bullera singularis, Candida, Kluveromyces sp., Bacillus circulans, Lactobacillus bulgaricus, Streptococcus thermophilus, and Bifidobacterium sp., (Akiyama et. al., 2001, Rabiu et. al., 2001, Tzortiz et. al., 2005, Jorgensen et al., 2001, Shin et. al., 1998, U.S. Pat. No. 5,032,509, EP 0 272 095 A2).
Use β-galactosidase enzyme or whole cells in immobilized matrices in place of free whole cells or enzymes has also been reported (Akiyama et. al., 2001, Rabiu et. al., 2001, Tzortiz et. al., 2005, Jorgensen et al., 2001, Shin et. al., 1998, U.S. Pat. No. 5,032,509, EP 0 272 095 A2). A combination of β-galactosidase enzyme and Saccharomyces cerevisiae cells has been co-immobilized in calcium alginate beads to produce ethanol from whey (Axelsson et al., 1991, Lewandoska et al., 2003 and Tanaka et al., 1986). The objective was to cleave lactose to glucose and galactose and thereby yeast can produce more ethanol.
The processes involving immobilized whole cells or enzyme over the free enzyme has certain advantages (1) catalytic power is stabilized (2) the immobilized matrices can be recycled which reduces cost and (3) products can be isolated in a simple manner. However, the use of immobilized enzymes depends upon the cost benefit and technical feasibility factors. In some processes, the extraction and purification of enzyme is costly and in some cases the enzyme denatures after extraction. Under such conditions, the use of immobilized or coimmobilized whole cells has added advantages over the immobilized enzymes (Yuan et al., 1992, Kiss et al., 1999).
The most prevalent method of whole cell immobilization is cell entrapment in hydrocolloids like alginate, carrageenan, polyacrylamide, agarose, gelatin, gellan gum (U.S. Pat. No. 5,175,093, U.S. Pat. No. 5,288,632, U.S. Pat. No. 5,093,253, U.S. Pat. No. 4,572,897, U.S. Pat. No. 5,070,019, U.S. Pat. No. 5,759,578, U.S. Pat. No. 5,939,294 and U.S. Pat. No. 5,034,324, Birnbaum et al., 1981). JP2005042037, JP5815243, and JP56113289 describe the use of polyvinyl alcohol with polyethylene glycol and boric acid as a successfully alternative to other hydrocolloids.
U.S. Pat. No. 5,766,907 mixed microbial cells in calcium chloride solution containing small amount of xanthan gum and then dropped into sodium alginate. The capsule membrane formed by ionic bond between calcium and alginate prevented swelling of the membrane and resulted in a high concentration of microbes within the capsule.
U.S. Pat. No. 5,034,324 discloses that polyvinyl alcohol has a high affinity for microorganisms and provides mechanical strength and durability sufficiently high for use in any reactor, and high resistance to water and chemicals. Jianlong et al., (1995) used acryl amide as polymerizing agent in the polyvinyl alcohol matrix with boric acid as cross-linking agent to overcome the swelling of polyvinyl alcohol gels in aqueous solution.
However use of immobilized cells has following disadvantages; a. The matrix and Cross linking agents must comply regulatory approval for the use in food grade conditions. b. Mechanical stability of immobilized beads with cells is poor c. Constraints in the diffusion of substrate and products and hence the efficiency of bioconversion is less than in free cells. d. Because of low conversion efficiency, the product separation form unreacted substrate and impurities is a challenging task
U.S. Pat. No. 716,451 describe mixing of the saccharide solution, obtained after hydrolysis, with ethanol and passing through activated carbon column to remove the mono and disaccharide components. The galactooligosaccharide component is eluted using pure ethanol. This downstream processing results in substantially pure galactooligosaccharide solution However, this process is not efficient due to the loss in the yield of galactooligosaccharides. Also, it is not economical due to the use of ethanol.
To overcome the limitation of activated carbon column treatment, EP 0 272 095 A2 and U.S. Pat. No. 5,032,509 describe loading of the saccharide solution on a strong cation exchange resin followed by elution of galactooligosaccharides with water at 60 to 80° C. This process can improve the yield of galalctooligosaccharide. However, it is not cost effective because of the use of costly strong cation exchange resin.
Therefore, the need for a cost effective process that results in the production galactooligosaccharides of high purity and yield galactooligosaccharides continues to prevail.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
#!/bin/bash
##===----------------------------------------------------------------------===##
##
## This source file is part of the SwiftNIO open source project
##
## Copyright (c) 2019 Apple Inc. and the SwiftNIO project authors
## Licensed under Apache License v2.0
##
## See LICENSE.txt for license information
## See CONTRIBUTORS.txt for the list of SwiftNIO project authors
##
## SPDX-License-Identifier: Apache-2.0
##
##===----------------------------------------------------------------------===##
set -eu
here="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
tmp_dir="/tmp"
while getopts "t:" opt; do
case "$opt" in
t)
tmp_dir="$OPTARG"
;;
*)
exit 1
;;
esac
done
nio_checkout=$(mktemp -d "$tmp_dir/.swift-nio_XXXXXX")
(
cd "$nio_checkout"
git clone --depth 1 https://github.com/apple/swift-nio
)
shift $((OPTIND-1))
tests_to_run=("$here"/test_*.swift)
if [[ $# -gt 0 ]]; then
tests_to_run=("$@")
fi
"$nio_checkout/swift-nio/IntegrationTests/allocation-counter-tests-framework/run-allocation-counter.sh" \
-p "$here/../../.." \
-m NIO \
-m NIOHTTP1 \
-m NIOHTTP2 \
-t "$tmp_dir" \
-d <( echo '.package(url: "https://github.com/apple/swift-nio.git", from: "2.0.0"),' ) \
"${tests_to_run[@]}"
|
{
"pile_set_name": "Github"
}
|
2611.1.1 = {
holder = 1836031
}
2651.1.1 = {
holder = 1836000
}
|
{
"pile_set_name": "Github"
}
|
Firm myocardium in cardiopulmonary resuscitation.
Firm myocardium in cardiopulmonary resuscitation (CPR) is a rarely described yet potentially important condition. To investigate the clinical nature and implications of firm myocardium in CPR, we retrospectively analyzed 59 adult patients with nontraumatic out-of-hospital cardiac arrest who underwent open-chest CPR in the emergency department and had heart consistency recorded. Consistency of the myocardium varied considerably between patients. Firm myocardium was noticed in 36 cases, mainly in the left ventricle (firm myocardium group). The remaining 23 hearts were not firm (soft myocardium group). Some hearts had an increase in their consistency during CPR. Patient characteristics were similar in the two groups. The firm myocardium group showed greater base deficit on arterial blood gas analysis, suggesting more severe ischemic injury. Very firm heart had a close association with an extremely low end-tidal CO2 tension. Histopathological examination revealed hypertrophy and fibrosis common to the two groups. Both groups received similar treatment except for a shorter duration of direct cardiac massage in the firm myocardium group, although a reasonably prolonged effort was made in most cases. The firm myocardium group responded poorly to treatment. Very firm myocardium never contracted, whereas less firm myocardium usually showed some, albeit insufficient, activity. Most cases in the soft myocardium group regained a pulse. Our results suggest that firm myocardium: (1) is common in patients who receive CPR in the emergency department, (2) indicates ischemic contracture, (3) is not uniform in firmness, reflecting the degree of ischemia and (4) is a grave prognostic factor in cardiac resuscitation.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Escape behavior under tonic inhibitory control of histamine H(2)-receptor mediated mechanisms in the midbrain tectum.
The dorsal periaqueductal gray matter (DPAG), superior and inferior colliculus have been implicated in the control of defense reactions in the midbrain. Electrical and chemical stimulation of these structures induces escape behavior, usually accompanied by autonomic responses and antinociception. GABA, 5-HT, opioids, excitatory amino acids and neuropeptides have been postulated to participate in the organization of such defensive reactions in the midbrain tectum. However, little attention has been given to a possible involvement of histamine in the generation of such behavior. To examine this issue in the present study, we assessed the effects of injections into the midbrain tectum of histamine and the H(1) and H(2) receptor antagonists, chlorpheniramine and ranitidine on the behavioral manifestations of the defense reaction. The effects of these drugs were also examined on antinociception, which has been considered to be an inherent component of the defense reaction. Thus, the animals were submitted to an open field test and after 30 min, antinociceptive behavior was measured with the aid of the tail-flick test. The results show that histamine reduced exploratory activity without causing motor deficit, as evaluated by the rotarod test. Ranitidine led to a dose-dependent behavioral activation, with clear signs of fear, whereas no apparent effect was observed following injections of chlorpheniramine. Antinociception always followed the escape reaction induced by the H(2) receptor blocker ranitidine. The present results suggest that H(2) receptors may be involved in the control of escape behavior and antinociception following activation of the neural substrates of fear in the midbrain tectum.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Goldgeben
Goldgeben is a village with 546 inhabitants in the Korneuburg District in Lower Austria. It was incorporated on 1 January 1972. as a cadastral municipality Marktleiinde Hausleiten.
The village was first mentioned in the first third of the 12th-century. Its name refers to gold deposits in ancient times, long before the Danube regulation, when the shores and islands of the branched arms of the Danube River were populated by gold miners. For the production of gold, felt wipes were used to catch dust in the fibers.
The family of Leopoldus de Goldgeben took its name after the village around the years 1120-30.
Originally, the Bishop of Passau was the owner of the land. From 1582 Goldgeben was subject to Count Hardegg in Stetteldorf. The village chapel, built of wood in 1841, was rebuilt with bricks in 1855.
References
External links
Official Website
Category: Populated places in Lower Austria
|
{
"pile_set_name": "Wikipedia (en)"
}
|
import os
import freeOrionAIInterface as fo
from common.timers import Timer
from common.option_tools import get_option_dict, check_bool, DEFAULT_SUB_DIR
from common.option_tools import TIMERS_TO_FILE, TIMERS_USE_TIMERS, TIMERS_DUMP_FOLDER
import sys
# setup module
options = get_option_dict()
try:
USE_TIMERS = check_bool(options[TIMERS_USE_TIMERS])
DUMP_TO_FILE = check_bool(options[TIMERS_TO_FILE])
TIMERS_DIR = os.path.join(fo.getUserDataDir(), DEFAULT_SUB_DIR, options[TIMERS_DUMP_FOLDER])
except KeyError:
USE_TIMERS = False
def make_header(*args):
return ['%-8s ' % x for x in args]
def _get_timers_dir():
try:
if os.path.isdir(fo.getUserDataDir()) and not os.path.isdir(TIMERS_DIR):
os.makedirs(TIMERS_DIR)
except OSError:
sys.stderr.write("AI Config Error: could not create path %s\n" % TIMERS_DIR)
return False
return TIMERS_DIR
class DummyTimer:
"""
Dummy timer to be used if timers are disabled.
"""
def __init__(self, *args, **kwargs):
pass
def stop(self, *args, **kwargs):
pass
def start(self, *args, **kwargs):
pass
def stop_and_print(self):
pass
def stop_print_and_clear(self):
pass
def clear_data(self):
pass
def print_flat(self):
pass
def print_aggregate(self):
pass
def print_statistics(self):
pass
class AILogTimer(Timer):
"""A Timer with a FO AI engine dependent extension that logs timer results to a file each turn.
"""
def __init__(self, timer_name, write_log=False):
"""
Creates timer. Timer name is name that will be in logs header and part of filename if write_log=True
If write_log true and timers logging enabled (DUMP_TO_FILE=True) save timer info to file.
"""
Timer.__init__(self, timer_name)
self.headers = None
self.write_log = write_log
self.log_name = None
def _write(self, text):
if not _get_timers_dir():
return
if not self.log_name:
empaire_id = fo.getEmpire().empireID - 1
self.log_name = os.path.join(_get_timers_dir(), '%s-%02d.txt' % (self.timer_name, empaire_id))
mode = 'w' # empty file
else:
mode = 'a'
with open(self.log_name, mode) as f:
f.write(text)
f.write('\n')
def stop_print_and_clear(self):
"""
Stop timer, output result, and clear timers.
If dumping to file, if headers are not match to prev, new header line will be added.
"""
Timer.stop_and_print(self)
if self.write_log and DUMP_TO_FILE:
turn = fo.currentTurn()
headers = make_header('Turn', *[x[0] for x in self.timers])
if self.headers != headers:
self._write(''.join(headers) + '\n' + ''.join(['-' * (len(x) - 2) + ' ' for x in headers]))
self.headers = headers
row = []
for header, val in zip(self.headers, [turn] + [x[1] for x in self.timers]):
row.append('%*s ' % (len(header) - 2, int(val)))
self._write(''.join(row))
AITimer = AILogTimer if USE_TIMERS else DummyTimer
|
{
"pile_set_name": "Github"
}
|
Q:
Proving that the derivative of an odd function is even.
For an assignment I had, I had to prove that the derivative of an odd function is even. In the assignment we also had to prove that $F(x)=\int_0^x f(t)dt$ is odd given that $f$ is even, which I did do. Using that fact I stated the following:
Let us define $F(x)=\int_0^xf(t)dt$ such that $F(x)$ is odd.
\begin{equation}
F'(x)=\frac{d}{dx}\int_0^xf(t)dt=f(x) \nonumber
\end{equation}
Using 1.1 (the section where I proved that $F(x)=\int_0^x f(t)dt$ is odd given that $f$ is even) we know that $f(x)$ is even.
However, the teacher felt that the answer was not rigorous enough and that I was simply going backwards. Am I indeed simply moving backwards and not proving anything in which case: could someone point out places where I could make it more succinct and rigorous or alternatively supply better proof altogether.
A:
The proof is quite simple from the definition of the derivative: if $f$ is odd then
$$
f'(-x) = \lim\limits_{h\to 0}\frac{f(-x+h)-f(-x)}{h} = -\lim\limits_{h\to 0}\frac{f(x-h)-f(x)}{h} = -f'(x).
$$
W.r.t. your proof. You have showed that if $f$ is even, then $F = \int f$ is odd. You proved it - but you didn't prove that any odd function is an anti-derivative of the even function. That would be a reverse statement, as Alex has already told you.
Generally, you have $A\Rightarrow B$ where $A = \{f\text{ is even}\}$ and $B = \{F\text{ is odd}\}$ but to prove that the derivative of the odd function is even you need $B\Rightarrow A$ which you don't know at the moment.
|
{
"pile_set_name": "StackExchange"
}
|
---
abstract: 'A new tetrad introduced within the framework of geometrodynamics for non-null electromagnetic fields allows for the geometrical analysis of the Lorentz equation and its solutions. This tetrad, through the use of the Frenet-Serret formulae and Fermi-Walker transport, exhibits explicitly the set of solutions to the Lorentz equation in a curved spacetime.'
address: '1. Instituto de Física, Facultad de Ciencias, Iguá 4225, esq. Mataojo, Montevideo, Uruguay.'
author:
- 'Alcides Garat$^{1}$'
date: 'August 15th, 2006'
title: The Lorentz equation in geometrodynamics
---
\#1[\#1]{}
\#1[\#1]{}
Introduction
============
The new tetrads introduced in [@A], yield maximum simplification in the expression of a non-null electromagnetic field in a curved spacetime, for instance. It is through this simplified expression of the electromagnetic field that we will get to the geometry associated with the Lorentz equation and its solutions. It is the purpose of this manuscript two-fold. On one hand we will prove that the Lorentz equation has its origin in the Fermi-Walker transport of the electromagnetic tetrads already mentioned. On the other hand we will study different kinds of solutions to the Lorentz equation from a geometric point of view through the use of the electromagnetic tetrads previously introduced. If $F_{\mu\nu}$ is the electromagnetic field and $f_{\mu\nu}= (G^{1/2} / c^2) \: F_{\mu\nu}$ is the geometrized electromagnetic field, then the Einstein-Maxwell equations can be written,
$$\begin{aligned}
f^{\mu\nu}_{\:\:\:\:\:;\nu} &=& 0 \label{EM1}\\
\ast f^{\mu\nu}_{\:\:\:\:\:;\nu} &=& 0 \label{EM2}\\
R_{\mu\nu} &=& f_{\mu\lambda}\:\:f_{\nu}^{\:\:\:\lambda}
+ \ast f_{\mu\lambda}\:\ast f_{\nu}^{\:\:\:\lambda}\ , \label{EM3}\end{aligned}$$
where $\ast f_{\mu\nu}={1 \over 2}\:\epsilon_{\mu\nu\sigma\tau}\:f^{\sigma\tau}$ is the dual tensor of $f_{\mu\nu}$. The symbol $``;''$ stands for covariant derivative with respect to the metric tensor $g_{\mu\nu}$. At every point in spacetime there is a duality rotation by an angle $-\alpha$ that transforms a non-null electromagnetic field into an extremal field,
$$\xi_{\mu\nu} = e^{-\ast \alpha} f_{\mu\nu}\ = \cos(\alpha)\:f_{\mu\nu} - \sin(\alpha)\:\ast f_{\mu\nu}.\label{dref}$$
The local scalar $\alpha$ is known as the complexion of the electromagnetic field. Extremal fields are essentially electric fields and they satisfy,
$$\xi_{\mu\nu} \ast \xi^{\mu\nu}= 0\ . \label{i0}$$
They also satisfy the identity given by equation (64) in [@MW],
$$\begin{aligned}
\xi_{\alpha\mu}\:\ast \xi^{\mu\nu} &=& 0\ .\label{i1}\end{aligned}$$
As antisymmetric fields the extremal fields also verify the identity,
$$\begin{aligned}
\xi_{\mu\alpha}\:\xi^{\nu\alpha} -
\ast \xi_{\mu\alpha}\: \ast \xi^{\nu\alpha} &=& \frac{1}{2}
\: \delta_{\mu}^{\:\:\:\nu}\ Q \ ,\label{i2}\end{aligned}$$
where $Q=\xi_{\mu\nu}\:\xi^{\mu\nu}=-\sqrt{T_{\mu\nu}T^{\mu\nu}}$ according to equations (39) in [@MW]. $Q$ is assumed not to be zero, because we are dealing with non-null electromagnetic fields. $T_{\mu\nu} = \xi_{\mu\lambda}\:\:\xi_{\nu}^{\:\:\:\lambda}
+ \ast \xi_{\mu\lambda}\:\ast \xi_{\nu}^{\:\:\:\lambda}$ is the electromagnetic stress-energy tensor [@MW]. In geometrodynamics, the Maxwell equations,
$$\begin{aligned}
f^{\mu\nu}_{\:\:\:\:\:;\nu} &=& 0 \label{L1}\nonumber\\
\ast f^{\mu\nu}_{\:\:\:\:\:;\nu} &=& 0 \ , \label{L2}\end{aligned}$$
are telling us that two potential vector fields exist,
$$\begin{aligned}
f_{\mu\nu} &=& A_{\nu ;\mu} - A_{\mu ;\nu}\label{ER}\nonumber\\
\ast f_{\mu\nu} &=& \ast A_{\nu ;\mu} - \ast A_{\mu ;\nu} \ .\label{DER}\end{aligned}$$
We can define then, a tetrad,
$$\begin{aligned}
U^{\alpha} &=& \xi^{\alpha\lambda}\:\xi_{\rho\lambda}\:A^{\rho} \:
/ \: (\: \sqrt{-Q/2} \: \sqrt{A_{\mu} \ \xi^{\mu\sigma} \
\xi_{\nu\sigma} \ A^{\nu}}\:) \label{UO}\\
V^{\alpha} &=& \xi^{\alpha\lambda}\:A_{\lambda} \:
/ \: (\:\sqrt{A_{\mu} \ \xi^{\mu\sigma} \
\xi_{\nu\sigma} \ A^{\nu}}\:) \label{VO}\\
Z^{\alpha} &=& \ast \xi^{\alpha\lambda} \: \ast A_{\lambda} \:
/ \: (\:\sqrt{\ast A_{\mu} \ast \xi^{\mu\sigma}
\ast \xi_{\nu\sigma} \ast A^{\nu}}\:)
\label{ZO}\\
W^{\alpha} &=& \ast \xi^{\alpha\lambda}\: \ast \xi_{\rho\lambda}
\:\ast A^{\rho} \: / \: (\:\sqrt{-Q/2} \: \sqrt{\ast A_{\mu}
\ast \xi^{\mu\sigma} \ast \xi_{\nu\sigma} \ast A^{\nu}}\:) \ .
\label{WO}\end{aligned}$$
The four vectors (\[UO\]-\[WO\]) have the following algebraic properties,
$$-U^{\alpha}\:U_{\alpha}=V^{\alpha}\:V_{\alpha}
=Z^{\alpha}\:Z_{\alpha}=W^{\alpha}\:W_{\alpha}=1 \ .\label{TSPAUX}$$
Using the equations (\[i1\]-\[i2\]) it is simple to prove that (\[UO\]-\[WO\]) are orthogonal. When we make the transformation,
$$\begin{aligned}
A_{\alpha} \rightarrow A_{\alpha} + \Lambda_{,\alpha}\ , \label{G1}\end{aligned}$$
$f_{\mu\nu}$ remains invariant, and the transformation,
$$\begin{aligned}
\ast A_{\alpha} \rightarrow \ast A_{\alpha} +
\ast \Lambda_{,\alpha}\ , \label{G2}\end{aligned}$$
leaves $\ast f_{\mu\nu}$ invariant, as long as the functions $\Lambda$ and $\ast \Lambda$ are scalars. Schouten defined what he called, a two-bladed structure in a spacetime [@SCH]. These blades are the planes determined by the pairs ($U^{\alpha}, V^{\alpha}$) and ($Z^{\alpha}, W^{\alpha}$). It was proved in [@A] that the transformation (\[G1\]) generates a “rotation” of the tetrad vectors ($U^{\alpha}, V^{\alpha}$) into ($\tilde{U}^{\alpha}, \tilde{V}^{\alpha}$) such that these “rotated” vectors ($\tilde{U}^{\alpha}, \tilde{V}^{\alpha}$) remain in the plane or blade one generated by ($U^{\alpha}, V^{\alpha}$). It was also proved in [@A] that the transformation (\[G2\]) generates a “rotation” of the tetrad vectors ($Z^{\alpha}, W^{\alpha}$) into ($\tilde{Z}^{\alpha}, \tilde{W}^{\alpha}$) such that these “rotated” vectors ($\tilde{Z}^{\alpha}, \tilde{W}^{\alpha}$) remain in the plane or blade two generated by ($Z^{\alpha}, W^{\alpha}$). Once we introduced all these elements found in [@A], we state the purpose of this manuscript. A particle of charge $q$ and mass $m$ in the presence of the electromagnetic field $f_{\mu\nu}$ is going to follow a timelike curve determined by the Lorentz equation [@ROH][@JAW][@DeWB][@DeWCM][@MC1]. It will be proved that the set of all curves that satisfy the Lorentz equation can be generated through Fermi-Walker transport.
Fermi-Walker transport in geometrodynamics
==========================================
The Frenet-Serret formulae for a tetrad associated for instance with a timelike curve $x^{\beta}(s)$ in spacetime [@SY][@HS] are,
$$\begin{aligned}
{\delta A^{\alpha} \over \delta s} &=& b \: B^{\alpha} \label{A}\\
{\delta B^{\alpha} \over \delta s} &=& c \: C^{\alpha} + b \: A^{\alpha} \label{B}\\
{\delta C^{\alpha} \over \delta s} &=& d \: D^{\alpha} - c \: B^{\alpha} \label{V}\label{C}\\
{\delta D^{\alpha} \over \delta s} &=& -d \: C^{\alpha} \label{D} \ ,\end{aligned}$$
where $ A^{\alpha}( x^{\beta}(s)) = {dx^{\alpha} \over ds}$ is the unit timelike tangent vector to the curve. The triad $( B^{\alpha}, C^{\alpha}, D^{\alpha})$ is formed by unit spacelike vector fields. We know that when the local scalar functions $b$, $c$ and $d$ are equal to zero, the curve is a geodesic [@MM]. If $b \neq 0$, then we can define the Fermi-Walker transport of a vector $F^{\alpha}$ as,
$${\delta F^{\alpha} \over \delta s} = b \: F_{\rho} \: (A^{\alpha} \: B^{\rho} - A^{\rho} \: B^{\alpha}) \ , \label{FWT}\\$$
where $B^{\alpha}$ and $b$ are the first normal and first curvature to the timelike curve $x^{\beta}_{t}(s)$. The “absolute derivative” ${\delta \over \delta s}$ is defined in [@SY]. Analogously, Fermi-Walker transport of a vector $F^{\alpha}$ can be defined along a spacelike curve as [@SY],
$${\delta F^{\alpha} \over \delta s} = - d \: F_{\rho} \: (C^{\alpha} \: D^{\rho} - C^{\rho} \: D^{\alpha}) \ . \label{FWS}\\$$
Fermi-Walker transport given by (\[FWS\]) is along the spacelike curve $x^{\beta}_{s}(s)$, whose unit spacelike tangent vector is $D^{\alpha}$. In [@A] we defined a new orthonormal tetrad, expressions (\[UO\]-\[WO\]) for spacetimes where non-null electromagnetic fields are present $ (U^{\alpha}, V^{\alpha}, Z^{\alpha}, W^{\alpha})$. Written in terms of these tetrad vectors, the electromagnetic vector field is,
$$f_{\alpha\beta} = -2\:\sqrt{-Q/2}\:\:\cos\alpha\:\:U_{[\alpha}\:V_{\beta]} +
2\:\sqrt{-Q/2}\:\:\sin\alpha\:\:Z_{[\alpha}\:W_{\beta]}\ .\label{EMF}$$
It is precisely the tetrad structure of (\[EMF\]) that allows for a “connection” to the Fermi-Walker transport. It is also the possibility of “rotating” through a scalar angle $\phi$ on blade one, the tetrad vectors $U^{\alpha}$ and $V^{\alpha}$, such that $U_{[\alpha}\:V_{\beta]}$ remains invariant [@A], that we have the freedom to build timelike curve congruences as a function of the “angle” $\phi$ on blade one. Similar on blade two. A “rotation” of the tetrad vectors $Z^{\alpha}$ and $W^{\alpha}$ through an “angle” $\varphi$, such that $Z_{[\alpha}\:W_{\beta]}$ remains invariant [@A], entails the freedom to build spacelike curve congruences as a function of the “angle” $\varphi$ on blade two. We must remember that to each local function $\phi$ there corresponds, through an isomorphic relationship, an electromagnetic gauge transformation local scalar $\Lambda$ as a counterpart to $\phi$ on blade one [@A]. Similar for $\varphi$ on blade two. That is, an electromagnetic local gauge transformation of the vectors $(U^{\alpha}, V^{\alpha})$ generates a “rotation” of these vectors on blade one at every point in spacetime, such that these vectors remain on blade one after the “rotation”. We called the Abelian group of “rotations” on blade one, $LB1$. Similar for $(Z^{\alpha}, W^{\alpha})$ on blade two, under the group $LB2$.
Summarizing the above ideas, we are going to find for each tetrad, solution to the Einstein-Maxwell equations, congruences of timelike curves, solutions to the Lorentz equation.
The Lorentz equation {#Lorentzequation}
====================
We are going to consider a timelike curve in spacetime, such that at each point, the tangent to this curve is given by the unit timelike vector $ u^{\alpha} = u\:U^{\alpha}_{(\phi)} + v\:V^{\alpha}_{(\phi)} + z\:Z^{\alpha}_{(\varphi)} + w\:W^{\alpha}_{(\varphi)}$; $\:\:\:u^{\alpha}\: u_{\alpha} = -1$. The functions $u$, $v$, $z$ and $w$ are local scalars. The “angles” $(\phi,\varphi)$ are also local scalars and we are introducing them in order to express $u^{\alpha}$ in the most general way. The tetrad vectors $ (U^{\alpha}, V^{\alpha}, Z^{\alpha}, W^{\alpha})$ are provided through (\[UO\]-\[WO\]). Simultaneously, we are going to consider the “rotated” tetrad $(\tilde{U}^{\alpha}, \tilde{V}^{\alpha}, \tilde{Z}^{\alpha}, \tilde{W}^{\alpha})$ defined below through expressions (\[uUO\]-\[uWO\]). For the sake of simplicity we are going to assume that the transformation of the two vectors $(U^{\alpha},\:V^{\alpha})$ on blade one, given in (\[UO\]-\[VO\]) by the “angle” $\phi$ is a proper transformation. For improper transformations the result follows the same lines [@A]. Therefore we can write,
$$\begin{aligned}
U^{\alpha}_{(\phi)} &=& \cosh(\phi)\: U^{\alpha} + \sinh(\phi)\: V^{\alpha} \label{UT} \\
V^{\alpha}_{(\phi)} &=& \sinh(\phi)\: U^{\alpha} + \cosh(\phi)\: V^{\alpha} \label{VT} \ .\end{aligned}$$
The transformation of the two tetrad vectors $(Z^{\alpha},\:W^{\alpha})$ on blade two, given in (\[ZO\]-\[WO\]) by the “angle” $\varphi$, can be expressed as,
$$\begin{aligned}
Z^{\alpha}_{(\varphi)} &=& \cos(\varphi)\: Z^{\alpha} - \sin(\varphi)\: W^{\alpha} \label{ZT} \\
W^{\alpha}_{(\varphi)} &=& \sin(\varphi)\: Z^{\alpha} + \cos(\varphi)\: W^{\alpha} \label{WT} \ .\end{aligned}$$
We can define then, a “rotated” orthonormal tetrad with respect to the tetrad (\[UO\]-\[WO\]), along the integral timelike curve as,
$$\begin{aligned}
\tilde{U}^{\alpha} &=& \xi^{\alpha\lambda}\:\xi_{\rho\lambda}\:u^{\rho} \:
/ \: (\: \sqrt{-Q/2} \: \sqrt{u_{\mu} \ \xi^{\mu\sigma} \
\xi_{\nu\sigma} \ u^{\nu}}\:) \label{uUO}\\
\tilde{V}^{\alpha} &=& \xi^{\alpha\lambda}\:u_{\lambda} \:
/ \: (\:\sqrt{u_{\mu} \ \xi^{\mu\sigma} \
\xi_{\nu\sigma} \ u^{\nu}}\:) \label{uVO}\\
\tilde{Z}^{\alpha} &=& \ast \xi^{\alpha\lambda} \: u_{\lambda} \:
/ \: (\:\sqrt{ u_{\mu} \ast \xi^{\mu\sigma}
\ast \xi_{\nu\sigma} u^{\nu}}\:)
\label{uZO}\\
\tilde{W}^{\alpha} &=& \ast \xi^{\alpha\lambda}\: \ast \xi_{\rho\lambda}
\: u^{\rho} \: / \: (\:\sqrt{-Q/2} \: \sqrt{ u_{\mu}
\ast \xi^{\mu\sigma} \ast \xi_{\nu\sigma} u^{\nu}}\:) \ ,
\label{uWO}\end{aligned}$$
where $u^{\alpha}$ is the tangent along the timelike curve. We must be careful about the definition of tetrad vectors (\[uZO\]-\[uWO\]). There is the possibility that the timelike tangent vector $u^{\alpha}$ does not have non-zero components on blade two. We solve this particular problem as an example in the next section. As a comment we can say that if we replace the two tetrad vectors (\[uZO\]-\[uWO\]) for the vectors (\[ZO\]-\[WO\]), we would have an orthonormal tetrad too. We proceed then, to write the Frenet-Serret expressions associated to the timelike curve whose tangent is $u^{\alpha}$.
$$\begin{aligned}
{\delta u^{\alpha} \over \delta s} &=& A\:\left(u_{\beta}\: \xi^{\alpha\beta}\right) + B\:\left(u_{\beta}\: \ast \xi^{\alpha\beta}\right) + C\: \left( (u_{\beta}\:\tilde{W}^{\beta})\:\tilde{U}^{\alpha} - (u_{\beta}\:\tilde{U}^{\beta})\:\tilde{W}^{\alpha} \right)
\label{FSE} \ ,\end{aligned}$$
where $ \tilde{U}^{\alpha}$ and $ \tilde{W}^{\beta}$ are provided by expressions (\[uUO\]) and (\[uWO\]). The functions $A$, $B$ and $C$ are local scalars. It is very simple to prove that $u_{\alpha}$ is orthogonal to $u_{\beta}\: \xi^{\alpha\beta}$, $u_{\beta}\: \ast \xi^{\alpha\beta}$, and $(u_{\beta}\:\tilde{W}^{\beta})\:\tilde{U}^{\alpha} - (u_{\beta}\:\tilde{U}^{\beta})\:\tilde{W}^{\alpha}$. It is also very simple to prove using the tetrad vectors (\[uUO\]-\[uWO\]) and the identities (\[i1\]-\[i2\]) that the three vectors $u_{\beta}\: \xi^{\alpha\beta}$, $u_{\beta}\: \ast \xi^{\alpha\beta}$, and $(u_{\beta}\:\tilde{W}^{\beta})\:\tilde{U}^{\alpha} - (u_{\beta}\:\tilde{U}^{\beta})\:\tilde{W}^{\alpha}$ are orthogonal among them. The extremal field and its dual can be written as [@A],
$$\begin{aligned}
\xi_{\alpha\beta} &=& -2\:\sqrt{-Q/2}\:U_{[\alpha}\:V_{\beta]}\label{ET}\\
\ast \xi_{\alpha\beta} &=& 2\:\sqrt{-Q/2}\:Z_{[\alpha}\:W_{\beta]}\ .\label{DET}\end{aligned}$$
Because of gauge invariance we also know that [@A],
$$\begin{aligned}
U^{[\alpha}_{(\phi)}\:V^{\beta]}_{(\phi)} = U^{[\alpha}\:V^{\beta]} = \tilde{U}^{[\alpha}\:\tilde{V}^{\beta]} \label{GEQ1}\\
Z^{[\alpha}_{(\varphi)}\:W^{\beta]}_{(\varphi)} = Z^{[\alpha}\:W^{\beta]} = \tilde{Z}^{[\alpha}\:\tilde{W}^{\beta]} \label{GEQ2} \ .\end{aligned}$$
We can consider the curvature associated scalars to be, $A = (q/m)\:\cos(\alpha)$, $B = (q/m)\:\sin(\alpha)$ and $C = 0$ where $q$ is the charge and $m$ is the mass of the particle following the integral timelike curve to which $u^{\alpha}$ is tangent. We would like to emphasize that expression $\left( \tilde{W}^{\beta}\:\tilde{U}^{\alpha} - \tilde{W}^{\alpha}\:\tilde{U}^{\beta} \right)$ is not invariant under gauge transformations of the tetrad vectors. Therefore, we have one further justification for considering the case where the curvature scalar $C = 0$. Then, we can rewrite (\[FSE\]) as,
$$\begin{aligned}
{\delta u^{\alpha} \over \delta s} &=& -(q/m)\:\sqrt{-Q/2}\:\cos(\alpha) \:u_{\beta}\: \left(U^{\alpha}\:V^{\beta}- U^{\beta}\:V^{\alpha}\right) + (q/m)\:\sqrt{-Q/2}\:\sin(\alpha)\:u_{\beta}\: \left(Z^{\alpha}\:W^{\beta}- Z^{\beta}\:W^{\alpha}\right) \label{FSESIMPALPHA} \ .\end{aligned}$$
Making use of the expression for the electromagnetic field (\[EMF\]) we can write (\[FSESIMPALPHA\]) as,
$$\begin{aligned}
{\delta u^{\alpha} \over \delta s} = (q/m)\:u_{\beta}\:f^{\alpha\beta} \label{FSEMF} \ .\end{aligned}$$
A particular case {#anotherview}
=================
We are going to consider a curve in spacetime, such that at each point, the projection of its tangent vector on blade one is given by ${dx_{1}^{\alpha}(s) \over ds}$, and on blade two by ${dx_{2}^{\alpha}(s) \over ds} = 0$. It is our objective to find special congruences of solutions to the Lorentz equation through Fermi-Walker transport, if they exist at all. Then, we are going to proceed as follows. For a “generic” scalar “angle” $\phi_{1}$ on blade one, and a “generic” scalar “angle” $\varphi_{1}$ on blade two, we are going to study the Frenet-Serret formulae associated to the timelike curve on blade one, whose tangent at every point is given by the unit timelike vector $U^{\alpha}_{(\phi_{1})} = {dx_{1}^{\alpha}(s) \over ds}= (u\:U^{\alpha}_{(\phi)} + v\:V^{\alpha}_{(\phi)})/\sqrt{u^2-v^2} $. Therefore, we are going to analyze the Frenet-Serret formulae for the tetrad $(U^{\alpha} _{(\phi_{1})},\:V^{\alpha} _{(\phi_{1})},\:Z^{\alpha} _{(\varphi_{1})},\:W^{\alpha} _{(\varphi_{1})})$. For the sake of simplicity we are going to assume that the transformation of the two vectors $(U^{\alpha},\:V^{\alpha})$ on blade one, given in (\[UTAV\]-\[VTAV\]) by the “angle” $\phi_{1}$ is a proper transformation. For improper transformations the result follows the same lines [@A]. Therefore we can write,
$$\begin{aligned}
U^{\alpha}_{(\phi_{1})} &=& \cosh(\phi_{1})\: U^{\alpha} + \sinh(\phi_{1})\: V^{\alpha} \label{UTAV} \\
V^{\alpha}_{(\phi_{1})} &=& \sinh(\phi_{1})\: U^{\alpha} + \cosh(\phi_{1})\: V^{\alpha} \label{VTAV} \ .\end{aligned}$$
The transformation of the two tetrad vectors $(Z^{\alpha},\:W^{\alpha})$ on blade two, given in (\[ZTAV\]-\[WTAV\]) by the “angle” $\varphi_{1}$, can be expressed as,
$$\begin{aligned}
Z^{\alpha}_{(\varphi_{1})} &=& \cos(\varphi_{1})\: Z^{\alpha} -\sin(\varphi_{1})\: W^{\alpha} \label{ZTAV} \\
W^{\alpha}_{(\varphi_{1})} &=& \sin(\varphi_{1})\: Z^{\alpha} + \cos(\varphi_{1})\: W^{\alpha} \label{WTAV} \ .\end{aligned}$$
We proceed then, to write the Frenet-Serret expressions associated to the timelike curve on blade one $x_{1}^{\alpha}(s)$ whose tangent is $U^{\alpha}_{(\phi_{1})}$,
$$\begin{aligned}
{\delta U^{\alpha}_{(\phi_{1})} \over \delta s} &=& a_{1} \: V^{\alpha}_{(\phi_{1})} + b_{1}\: Z^{\alpha}_{(\varphi_{1})} + q_{1}\:W^{\alpha}_{(\varphi_{1})} \label{FSU1}\\
{\delta V^{\alpha}_{(\phi_{1})} \over \delta s} &=& a_{1} \: U^{\alpha}_{(\phi_{1})} + p_{1}\: Z^{\alpha}_{(\varphi_{1})} + d_{1}\: W^{\alpha}_{(\varphi_{1})} \label{FSV1}\\
{\delta Z^{\alpha}_{(\varphi_{1})} \over \delta s} &=& c_{1} \: W^{\alpha}_{(\varphi_{1})} - p_{1} \: V^{\alpha}_{(\phi_{1})} + b_{1} \: U^{\alpha}_{(\phi_{1})} \label{FSZ1}\\
{\delta W^{\alpha}_{(\varphi_{1})} \over \delta s} &=& -c_{1} \: Z^{\alpha}_{(\varphi_{1})} - d_{1} \: V^{\alpha}_{(\phi_{1})} + q_{1}\:U^{\alpha}_{(\phi_{1})} \label{FSW1} \ .\end{aligned}$$
The functions $a_{1}$, $b_{1}$, $c_{1}$, $d_{1}$, $p_{1}$ and $q_{1}$ are local scalars. In addition, we are also going to introduce the auxiliary scalar variables, $$\begin{aligned}
A_{z} &=& Z_{\alpha}\:U^{\alpha}_{\:\:\:;\beta}\:U^{\beta} \label{ASz} \\
B_{z} &=& Z_{\alpha}\:U^{\alpha}_{\:\:\:;\beta}\:V^{\beta} \label{BSz} \\
C_{z} &=& Z_{\alpha}\:V^{\alpha}_{\:\:\:;\beta}\:U^{\beta} \label{CSz} \\
D_{z} &=& Z_{\alpha}\:V^{\alpha}_{\:\:\:;\beta}\:V^{\beta} \label{DSz} \\
A_{w} &=& W_{\alpha}\:U^{\alpha}_{\:\:\:;\beta}\:U^{\beta} \label{ASw} \\
B_{w} &=& W_{\alpha}\:U^{\alpha}_{\:\:\:;\beta}\:V^{\beta} \label{BSw} \\
C_{w} &=& W_{\alpha}\:V^{\alpha}_{\:\:\:;\beta}\:U^{\beta} \label{CSw} \\
D_{w} &=& W_{\alpha}\:V^{\alpha}_{\:\:\:;\beta}\:V^{\beta} \label{DSw} \ .\end{aligned}$$
Now comes the core on the idea to find this special solution to the Lorentz equation. Let us demand or impose in (\[FSU1\]) the following equations,
$$\begin{aligned}
Z_{\alpha(\varphi_{1})} \:{\delta U^{\alpha}_{(\phi_{1})} \over \delta s} &=& 0 \label{eq1b1} \\
W_{\alpha(\varphi_{1})} \:{\delta U^{\alpha}_{(\phi_{1})} \over \delta s} &=& 0 \ .\label{eq2b1} \end{aligned}$$
These equations (\[eq1b1\]-\[eq2b1\]) represent equations for the two local scalar functions $(\phi_{1},\varphi_{1})$. If we replace in (\[eq1b1\]-\[eq2b1\]) expressions (\[UTAV\]-\[VTAV\]) and (\[ZTAV\]-\[WTAV\]), work out the algebraic equations, and make use of (\[ASz\]-\[DSw\]) we find,
$$\begin{aligned}
\tan(\varphi_{1}) &=& {\left(\cosh^{2}(\phi_{1})\:A_{z} + \sinh^{2}(\phi_{1})\:D_{z} + \cosh(\phi_{1})\:\sinh(\phi_{1})\:(B_{z} + C_{z})\right) \over \left(\cosh^{2}(\phi_{1})\:A_{w} + \sinh^{2}(\phi_{1})\:D_{w} + \cosh(\phi_{1})\:\sinh(\phi_{1})\:(B_{w} + C_{w})\right)} \label{eqvarphi1b1} \end{aligned}$$
$$\begin{aligned}
\tan(\varphi_{1}) &=& - { \left(\cosh^{2}(\phi_{1})\:A_{w} + \sinh^{2}(\phi_{1})\:D_{w} + \cosh(\phi_{1})\:\sinh(\phi_{1})\:(B_{w} + C_{w})\right) \over \left(\cosh^{2}(\phi_{1})\:A_{z} + \sinh^{2}(\phi_{1})\:D_{z} + \cosh(\phi_{1})\:\sinh(\phi_{1})\:(B_{z} + C_{z})\right) } \ .\label{eqvarphi2b1}\end{aligned}$$
Now, in order for both equations (\[eqvarphi1b1\]-\[eqvarphi2b1\]) to be compatible, it can be readily noticed that the following equality would have to be true, $\tan(\varphi_{1}) = - 1 / \tan(\varphi_{1})$. Then, there are no solutions to the “pure” blade one Lorentz equation problem.
A more general example {#anothergenview}
======================
It is our objective to find special congruences of solutions to the Lorentz equation through Fermi-Walker transport, as a more general example. We are increasing the level of complexity following a pedagogical scheme. Thus, we are going to proceed as follows. For a “generic” scalar “angle” $\phi_{1}$ on blade one, and a “generic” scalar “angle” $\varphi_{1}$ on blade two, we are going to study the Frenet-Serret formulae associated to the timelike curve, whose projection on blade one at every point is given by the timelike vector $(M / \sqrt{M^2 - N^2}\:)\:U^{\alpha}_{(\phi_{1})} = (M / \sqrt{M^2 - N^2}\:)\: (u\:U^{\alpha}_{(\phi)} + v\:V^{\alpha}_{(\phi)})/\sqrt{u^2-v^2} $ and its projection on blade two is given by $(N / \sqrt{M^2 - N^2}\:)\:W^{\alpha}_{(\varphi_{1})} = (N / \sqrt{M^2 - N^2}\:)\: (z\:Z^{\alpha}_{(\varphi)} + w\:W^{\alpha}_{(\varphi)})/\sqrt{z^2+w^2} $. Both $M$ and $N$ are local scalars. We have already analyzed the Frenet-Serret formulae for the tetrad $(U^{\alpha} _{(\phi_{1})},\:V^{\alpha} _{(\phi_{1})},\:Z^{\alpha} _{(\varphi_{1})},\:W^{\alpha} _{(\varphi_{1})})$. We are simply going to take advantage of this previous analysis to find solutions to the Lorentz equation of a more general nature. For brevity we are going to call $A = M / \sqrt{M^2 - N^2}$ and $B = N / \sqrt{M^2 - N^2}$. We proceed then, to write the Frenet-Serret expressions associated to the projections of the curve both on blade one and two,
$$\begin{aligned}
{\delta \left( A\:U^{\alpha}_{(\phi_{1})}\right) \over \delta s} &=& {\delta \left( A \right) \over \delta s}\: U^{\alpha}_{(\phi_{1})} + A\:{\delta U^{\alpha}_{(\phi_{1})} \over \delta s}\label{GEN1}\\
{\delta U^{\alpha}_{(\phi_{1})} \over \delta s} &=& a_{1} \: V^{\alpha}_{(\phi_{1})} + b_{1}\: Z^{\alpha}_{(\varphi_{1})} + q_{1}\:W^{\alpha}_{(\varphi_{1})} \label{GEN11}\\
{\delta V^{\alpha}_{(\phi_{1})} \over \delta s} &=& a_{1} \: U^{\alpha}_{(\phi_{1})} + p_{1}\: Z^{\alpha}_{(\varphi_{1})} + d_{1}\: W^{\alpha}_{(\varphi_{1})} \label{GEN2}\\
{\delta Z^{\alpha}_{(\varphi_{1})} \over \delta s} &=& c_{1} \: W^{\alpha}_{(\varphi_{1})} - p_{1} \: V^{\alpha}_{(\phi_{1})} + b_{1} \: U^{\alpha}_{(\phi_{1})} \label{GEN3}\\
{\delta W^{\alpha}_{(\varphi_{1})} \over \delta s} &=& -c_{1} \: Z^{\alpha}_{(\varphi_{1})} - d_{1} \: V^{\alpha}_{(\phi_{1})} + q_{1}\:U^{\alpha}_{(\phi_{1})} \label{GEN44}\\
{\delta \left( B\:W^{\alpha}_{(\varphi_{1})}\right) \over \delta s} &=& {\delta \left( B \right) \over \delta s}\: W^{\alpha}_{(\varphi_{1})} + B\:{\delta W^{\alpha}_{(\varphi_{1})} \over \delta s} \label{GEN4} \ .\end{aligned}$$
The functions $a_{1}$, $b_{1}$, $c_{1}$, $d_{1}$, $p_{1}$ and $q_{1}$ are again local scalars.
Once more comes the core on the idea to find these more general solutions to the Lorentz equation. Let us demand or impose in (\[GEN1\]-\[GEN4\]) the following equations,
$$\begin{aligned}
{\delta \left( A \right) \over \delta s} &=& 0 \label{SCALAR1} \\
{\delta \left( B \right) \over \delta s} &=& 0 \label{SCALAR2} \\
W_{\alpha(\varphi_{1})} \:{\delta U^{\alpha}_{(\phi_{1})} \over \delta s} &=& 0 \ .\label{ORTHO2} \end{aligned}$$
These equations (\[SCALAR1\]-\[SCALAR2\]) represent equations for the two local scalar functions $(M, N)$. Expression (\[ORTHO2\]) is just one equation for $(\phi_{1},\varphi_{1})$. In order to find one solution for the pair $(\phi_{1},\varphi_{1})$ we need another equation. It can be supplemented by different additional equations, for instance, $Z_{\alpha(\varphi_{1})} \:{\delta V^{\alpha}_{(\phi_{1})} \over \delta s} = 0$. Each possible choice for an additional equation yields different solutions $(\phi_{1},\varphi_{1})$ to the Lorentz equation.
The problem is posed as follows. First, we are supposed to know the tetrad vectors and their covariant derivatives from solutions to the Einstein-Maxwell equations (\[EM1\]-\[EM3\]). Second, we solve equations (\[SCALAR1\],\[SCALAR2\]) for the scalars $(M, N)$. Then we have available equation (\[ORTHO2\]) for the pair $(\phi_{1},\varphi_{1})$. As mentioned above we can supplement this last equation (\[ORTHO2\]) with another one in order to find $(\phi_{1},\varphi_{1})$. We finally see that Frenet-Serret equations (\[GEN11\]) and (\[GEN44\]) turn out to be,
$$\begin{aligned}
{\delta U^{\alpha}_{(\phi_{1})} \over \delta s} &=& a_{1} \: V^{\alpha}_{(\phi_{1})} + b_{1}\: Z^{\alpha}_{(\varphi_{1})} \label{RED11} \\
{\delta W^{\alpha}_{(\varphi_{1})} \over \delta s} &=& -c_{1} \: Z^{\alpha}_{(\varphi_{1})} - d_{1} \: V^{\alpha}_{(\phi_{1})} \label{RED44}
\ . \end{aligned}$$
Our intention is to Fermi-Walker transport the timelike vector $A\:U^{\alpha}_{(\phi_{1})} + B \: W^{\alpha}_{(\varphi_{1})} $ along the integral timelike curve whose tangent is this same vector that in turn satisfies equations (\[SCALAR1\]-\[SCALAR2\]),
$$\begin{aligned}
{\delta \left( A\: U^{\alpha}_{(\phi_{1})} + B\: W^{\alpha}_{(\varphi_{1})} \right) \over \delta s} &=& A \: {\delta U^{\alpha}_{(\phi_{1})} \over \delta s} + B \: {\delta W^{\alpha}_{(\varphi_{1})} \over \delta s} \ . \label{GENEQ1}\end{aligned}$$
Now, using equations (\[RED11\]-\[RED44\]) we can write,
$$\begin{aligned}
{\delta \left( A\: U^{\alpha}_{(\phi_{1})} + B\: W^{\alpha}_{(\varphi_{1})} \right) \over \delta s} &=& A \: \left( a_{1} \: V^{\alpha}_{(\phi_{1})} + b_{1}\: Z^{\alpha}_{(\varphi_{1})} \right) + B \: \left( -c_{1} \: Z^{\alpha}_{(\varphi_{1})} - d_{1} \: V^{\alpha}_{(\phi_{1})} \right) \ . \label{GENEQ2}\end{aligned}$$
It is simple to see that equation (\[GENEQ2\]) can be rewritten,
$$\begin{aligned}
{\delta \left( A\: U^{\alpha}_{(\phi_{1})} + B\: W^{\alpha}_{(\varphi_{1})} \right) \over \delta s} = (q/m) \: \left( A \: U_{\rho(\phi_{1})} + B\: W_{\rho(\varphi_{1})} \right) \nonumber \\ \nonumber \\ \left( - \sqrt{-Q/2}\:\:\cos\alpha\:\: \left( U^{\alpha}_{(\phi_{1})}\:V^{\rho}_{(\phi_{1})} - U^{\rho}_{(\phi_{1})}\:V^{\alpha}_{(\phi_{1})} \right) +
\sqrt{-Q/2}\:\:\sin\alpha\:\:\left( Z^{\alpha}_{(\varphi_{1})}
\:W^{\rho}_{(\varphi_{1})} - Z^{\rho}_{(\varphi_{1})}
\:W^{\alpha}_{(\varphi_{1})} \right)\right)\ , \label{GENEQ3}\end{aligned}$$
as long as we ask for the scalar functions $a_{1}$, $b_{1}$, $c_{1}$ and $d_{1}$ to satisfy the following algebraic equations,
$$\begin{aligned}
-\:\sqrt{-Q/2}\:\:\cos\alpha\:A\:q/m &=& A\:a_{1} - B\:d_{1} \label{algeb1}\\
\:\sqrt{-Q/2}\:\:\sin\alpha\:B\:q/m &=& A\:b_{1} - B\:c_{1} \label{algeb2}\ .\end{aligned}$$
We can also remind ourselves of the gauge invariant equalities [@A],
$$\begin{aligned}
U^{[\alpha}_{(\phi_{1})}\:V^{\beta]}_{(\phi_{1})} = U^{[\alpha}\:V^{\beta]} = U^{[\alpha}_{(\phi)}\:V^{\beta]}_{(\phi)} \label{GEQphi1}\\
Z^{[\alpha}_{(\varphi_{1})}\:W^{\beta]}_{(\varphi_{1})} = Z^{[\alpha}\:W^{\beta]} = Z^{[\alpha}_{(\varphi)}\:W^{\beta]}_{(\varphi)} \label{GEQvarphi2} \ .\end{aligned}$$
Therefore, equation (\[GENEQ3\]) can be expressed as,
$$\begin{aligned}
{\delta \left( A\: U^{\alpha}_{(\phi_{1})} + B\: W^{\alpha}_{(\varphi_{1})} \right) \over \delta s} &=& \left( A \: U_{\rho(\phi_{1})} + B\: W_{\rho(\varphi_{1})} \right) \: \left( -2\:\sqrt{-Q/2}\:\:\cos\alpha\:\:U^{[\alpha}\:V^{\rho]} +
2\:\sqrt{-Q/2}\:\:\sin\alpha\:\:Z^{[\alpha}\:W^{\rho]}\right)\ . \label{GENEQ4}\end{aligned}$$
Calling $u^{\alpha} = A\: U^{\alpha}_{(\phi_{1})} + B\: W^{\alpha}_{(\varphi_{1})}$, reminding equation (\[EMF\]), and taking into account the orthogonality relations, $U_{\rho}\:Z^{\rho} = U_{\rho}\:W^{\rho} = W_{\rho}\:V^{\rho} = 0$, we can rewrite (\[GENEQ4\]) as,
$${\delta u^{\alpha} \over \delta s} = (q/m)\: u_{\rho}\: f^{\alpha\rho}\ , \label{Lorentz}\\$$
that is, the Lorentz “force” equation for the particle of mass $m$ and charge $q$, through Fermi-Walker transport of the timelike vector $u^{\alpha}$ along the integral timelike curve whose tangent is $u^{\alpha} = A\: U^{\alpha}_{(\phi_{1})} + B\: W^{\alpha}_{(\varphi_{1})}$.
Conclusions
===========
The introduction of new tetrads for non-null electromagnetic fields in [@A] allows for the geometrical analysis of the Lorentz equation. Through Fermi-Walker transport and Frenet-Serret expressions it is possible to identify curvature scalars in terms of the local scalar functions associated to the non-null electromagnetic field present in the curved spacetime. A blade one “pure” solutions are studied through the use of Frenet-Serret expressions, and more general solutions are found for solutions with non-trivial projections on both blades. The new tetrads allow for a better insight regarding the relationship between traditional Abelian gauge theories on one hand, and traditional Riemannian geometry on the other hand. The key lies upon the two theorems proved in [@A] relating through isomorphisms the groups $U(1)$ and LB1, LB2. The local “internal” transformations that leave invariant the electromagnetic field are proved to be isomorphic to the local tetrad transformations either on blade one or two. In other words, the local “internal” group of transformations is isomorphic to a subgroup of the local group of Lorentz tetrad transformations. This was not known before. It is precisely this “gauge geometry” the tool that allows for a new understanding of a traditional equation like the Lorentz equation. Other future applications are possible. For instance, the study of the kinematics in these spacetimes [@RG][@RW][@MC2][@EJKS], that is, the search for a “connection” to the theory of embeddings, time slicings [@KK][@JDBKK][@FM][@FAEP], the initial value formulation [@JWY1][@JWY2][@NOMJWY][@HY][@JY][@LICH][@YCB][@CMDWYCB], the Cauchy evolution [@ADM][@LSJWY], etc. If there is a geometry such that the gradient of the complexion is a timelike vector field, then there would be the possibility of finding a slicing such that the leaves of constant complexion foliate spacetime, and potentially could be a simplification tool.
Simplicity is the most sought after quality in all these geometrical descriptions, and the previously introduced tetrads, blades, isomorphisms, prove to be practical and useful. We quote from [@MW] “The question poses itself insistently to find a point of view which will make Rainich-Riemannian geometry seem a particularly natural kind of geometry to consider”.
I am grateful to R. Gambini and J. Pullin for reading this manuscript and for many fruitful discussions.
A. Garat, J. Math. Phys. [**46**]{}, 102502 (2005).
C. Misner and J. A. Wheeler, Annals of Physics [**2**]{}, 525 (1957).
J. A. Schouten, [*Ricci Calculus: An Introduction to Tensor Calculus and Its Geometrical Applications*]{} (Springer, Berlin, 1954).
F. Rohrlich, [*Classical Charged Particles*]{} (Addison Wesley Publishing Company, 1965).
J. A. Wheeler, Rev. Mod. Phys. [**33**]{}, 63 (1961).
B. S. DeWitt and R. W. Brehme, Annals of Physics [**9**]{}, 220 (1960).
B. S. DeWitt and C. M. DeWitt, Physics [**1**]{}, 3 (1964).
M. Carmeli, Phys. Rev, [**138**]{}, 1003 (1965).
J. L. Synge , [*Relativity: The General Theory*]{} (North Holland Publishing Company, Amsterdam, 1960).
H. Stephani , [*General Relativity*]{} (Cambridge University Press, Cambridge, 2000).
F. K. Manasse and C. W. Misner, J. Math. Phys. [**4**]{}, 735 (1963).
R. Geroch, [*General Relativity: From A to B*]{} [(University of Chicago Press, Chicago, 1978)]{}.
R. Wald, [*General Relativity*]{} (University of Chicago Press, Chicago, 1984).
M. Carmeli, [*Classical Fields: General Relativity and Gauge Theory*]{} (J. Wiley & Sons, New York, 1982).
J. Ehlers, P. Jordan, W. Kundt and R. Sachs, Akad. Wiss. Lit. Mainz Abh. Math.-Natur. Kl, [**11**]{} (Mainz 4), 793 (1961).
K. Kuchař, J. Math. Phys. [**13**]{}, 768 (1972); [**17**]{}, 777 (1976); [**17**]{}, 792 (1976); [**17**]{}, 801 (1976);[**18**]{}, 1589 (1977); Phys. Rev D, [**4**]{}, 955 (1971).
J. D. Brown and K. Kuchař, Phys. Rev D, [**51**]{}, 5600 (1995).
A. E. Fischer and J. E. Marsden, J. Math. Phys. [**13**]{}, 546 (1972).
F. A. E. Pirani, [*Les Theories Relativistes de la Gravitation*]{} (CNRS, Paris, 1962).
J. W. York, J. Math. Phys. [**13**]{}, 125 (1972); [**14**]{}, 456 (1973)
J. W. York, Phys. Rev D, [**10**]{}, 428 (1974).
N. O‘Murchadha and J. W. York, [**14**]{}, 1551 (1973).
H. P. Pfeiffer and J. W. York, Phys. Rev D, [**67**]{}, 044022 (2003).
R. T. Jantzen and J. W. York /gr-qc 0603069 (2006).
A. Lichnerowicz, J. Math. Pure and Appl. [**23**]{}, 37 (1944).
Y. Choquet-Bruhat in [*Gravitation: An Introduction to Current Research*]{} edited by L. Witten (Wiley, New York, 1962).
C. M. DeWitt and Y. Choquet-Bruhat [*Analysis, Manifolds and Physics*]{} edited by (North-holland, The Netherlands , 1982).
R. Arnowitt, S. Deser and C. W. Misner, [*“The Dynamics of General Relativity”*]{} in [*Gravitation: An Introduction to Current Research*]{} edited by L. Witten (Wiley, New York, 1962).
L. Smarr and J. W. York, Phys. Rev. D [**17**]{}, 2529 (1978).
|
{
"pile_set_name": "ArXiv"
}
|
W
128
// -0.045024
0xFA3CAA88
// 0.046108
0x05E6DDC5
// -0.005518
0xFF4B3119
// -0.001981
0xFFBF12F3
// -0.038977
0xFB02CBE3
// 0.013770
0x01C33652
// 0.022191
0x02D72850
// -0.004936
0xFF5E45B8
// 0.004681
0x0099613E
// 0.005962
0x00C35D39
// -0.029572
0xFC36FBFC
// -0.013674
0xFE3FF0F0
// -0.008424
0xFEEBF8A9
// -0.002905
0xFFA0D307
// -0.004478
0xFF6D4301
// -0.017219
0xFDCBC382
// -0.032171
0xFBE1D49E
// 0.036714
0x04B30AD5
// 0.024556
0x0324A6E8
// -0.021022
0xFD4F2528
// 0.014041
0x01CC14A7
// 0.040050
0x05205AE8
// -0.000473
0xFFF08353
// -0.035016
0xFB84996D
// -0.021649
0xFD3A9CF3
// 0.000931
0x001E833F
// -0.022572
0xFD1C5D7A
// -0.011697
0xFE80B56B
// -0.026139
0xFCA779AC
// -0.062500
0xF8000000
// 0.014998
0x01EB7799
// -0.026607
0xFC9821A1
// 0.012617
0x019D6F20
// -0.013898
0xFE3897E2
// -0.016025
0xFDF2E106
// -0.007288
0xFF112DFD
// 0.002148
0x00465FCA
// 0.007141
0x00E9FC98
// 0.004629
0x0097AE22
// 0.006311
0x00CECDC1
// 0.019539
0x02803D08
// 0.020409
0x029CC704
// 0.007967
0x01050F39
// 0.038292
0x04E6BCCA
// -0.008905
0xFEDC3719
// 0.031910
0x0415A14E
// 0.009390
0x0133AEF4
// -0.007193
0xFF144BEB
// -0.036107
0xFB60D916
// -0.029846
0xFC2E0253
// -0.038256
0xFB1A69A3
// 0.043397
0x058E0821
// -0.036692
0xFB4DAB10
// 0.003615
0x007672DA
// 0.022644
0x02E5FFC3
// -0.008464
0xFEEAA618
// -0.027485
0xFC7B627E
// -0.001681
0xFFC8EDE0
// 0.001901
0x003E4B85
// 0.004249
0x008B3E95
// -0.001772
0xFFC5ED47
// 0.000738
0x00183283
// 0.032575
0x042B6C96
// -0.020489
0xFD60A15C
// -0.026118
0xFCA82E68
// -0.029348
0xFC3E52F8
// 0.015388
0x01F83BC6
// 0.006581
0x00D7A84C
// -0.008489
0xFEE9D528
// 0.009443
0x01356C14
// 0.022189
0x02D716F0
// 0.029608
0x03CA302D
// 0.011098
0x016BAC46
// -0.023327
0xFD039D90
// 0.011935
0x01871461
// 0.011493
0x01789A33
// 0.046769
0x05FC886A
// -0.009995
0xFEB87BEE
// 0.024153
0x031774C3
// 0.043754
0x0599B7D1
// 0.015782
0x0205239E
// 0.018761
0x0266BFA1
// 0.000344
0x000B47A5
// -0.017226
0xFDCB8DF3
// 0.035044
0x047C52BA
// 0.014161
0x01D003D2
// -0.021739
0xFD37A3DF
// 0.001891
0x003DF4B5
// 0.009611
0x013AECC7
// 0.023945
0x0310A4E0
// 0.036746
0x04B416BD
// 0.002962
0x006112D0
// -0.035411
0xFB77A7BD
// -0.027997
0xFC6A9BA3
// -0.005034
0xFF5B09AF
// -0.011976
0xFE779583
// -0.009062
0xFED70C93
// 0.001921
0x003EF485
// 0.017655
0x02428612
// -0.026215
0xFCA4FC89
// 0.005113
0x00A78DB3
// -0.042869
0xFA8346EB
// -0.007024
0xFF19D448
// 0.030816
0x03F1C3A2
// -0.039548
0xFAF01992
// 0.012374
0x01957808
// -0.002806
0xFFA40F85
// -0.017335
0xFDC7F6A0
// 0.019470
0x027DFF34
// 0.005651
0x00B92D06
// 0.021392
0x02BCF9AD
// 0.001910
0x003E97D0
// -0.008242
0xFEF1EB7C
// -0.012722
0xFE5F23D8
// -0.052280
0xF94EE3A8
// 0.010351
0x01532F10
// 0.008536
0x0117B83F
// 0.012385
0x0195D70A
// 0.008113
0x0109D5A7
// -0.012143
0xFE721548
// -0.027261
0xFC82B58B
// 0.007296
0x00EF16D3
// 0.013338
0x01B50F97
// 0.015936
0x020A313B
// -0.004867
0xFF608155
// -0.051131
0xF974890E
// -0.014064
0xFE33259C
// -0.038572
0xFB101099
|
{
"pile_set_name": "Github"
}
|
We haven’t seen any major band reunions in a while but, ‘90s boy band lovers heard some pretty fantastic news last week: Lance Bass from *NSYNC told Entertainment Tonight that the band may or may not be reuniting for a performance in honor of their 20th anniversary.
Then fans had to quickly say, “Bye, bye, bye” to those sweat dreams because a reunion isn’t actually happening––well, not a musical one at least.
In a recent interview with ET Lance told host Katie Krause that the band is planning a special music release to coincide with an album anniversary and an upcoming non-musical reunion.
“We’re doing something [special], I don’t know if I can announced it yet…We’re coming out with a really cool vinyl edition of our Christmas album because it’s coming up on the 20 years of that album,” said Lance. “And then we’re going to be getting our star on the (Hollywood) Walk of Fame this year at some point.”
Of course, “NSYNC-ers” went crazy over this news. Fans started making nostalgic posts on their social media pages and reminiscing about the days when our most pertinent debate was *NSYNC vs Backstreet Boys for greatest boy band. Just when the level of fandom couldn’t reach any higher, *NSYNC’s verified twitter account had to go tweet, “We always appreciate the love and excitement from our fans. Unfortunately Lance’s comments to the press were taken out of context. When there is real news from *NSYNC you will hear it from all of us.”
UGH! Why you gotta go tearin’ up our hearts?
So, what does this actually mean for all of us boy band junkies? It seems that the only thing we can confirm is that *NSYNC will be reuniting to receive their star on the Hollywood Walk of Fame, and that’s about it. It doesn’t seem like a performance will happen anytime soon. The last time that *NSYNC performed together was on the 2013 MTV Video Music Awards as part of Justin Timberlake’s 15 minute performance, when he received the Michael Jackson Video Vanguard Award. But that was for two seconds and was clearly not satisfying enough. And we haven’t gotten new music from *NSYNC since 2001’s Celebrity. Tragic.
Just last week, Justin was interviewed by The Hollywood Reporter and shared that he left *NSYNC 15 years ago because he “was growing out of it. I felt like I cared more about the music than some of the other people in the group…I felt like I had other music I wanted to make and that I needed to follow my heart.”
While Justin’s comment may have come off as a little stab at a few of his band members, Bass ensured us all that the guys are still the best of friends. That doesn’t mean he agreed with what Justin said. “I don’t think it’s true…Obviously, we cared about the music, but I understand where he’s coming from for sure,” Lance told ET.
It looks like we won’t get the reunion that we were hoping for after all. To help myself get through this tragedy, I plan on watching Justin Timberlake’s 2000 movie, Model Behavior, and jam out to “It’s Gonna Be *May*.” All in an attempt to bring back the frosted tips craze that made people’s hair look like Ramen Noodles.
|
{
"pile_set_name": "Pile-CC"
}
|
Terminalia novocaledonica
Terminalia novocaledonica is a species of plant in the Combretaceae family. It is endemic to New Caledonia.
References
Category:Endemic flora of New Caledonia
novocaledonica
Category:Vulnerable plants
Category:Taxonomy articles created by Polbot
|
{
"pile_set_name": "Wikipedia (en)"
}
|
How do I unlock Facebook Messenger Dark Mode?
Facebook slimmed down its Messenger app in March, 2019. The social network giant brought the app back to basics by hiding all the distractions that were bloating the messaging service. Facebook also made the app a little easier on the eyes by adding a Dark Mode option, but got creative with how users have to access it. Instead of just adding a Dark Mode option to the Settings users first have to perform a little trick to activate the option. Here's how:
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Flask WTForms validate_on_submit not working
I am new in Web Development and I am using Flask to create a property price prediction website.
I have a function validate_on_submit that is not working. It does not show any error, the form is submitted, it just does not validate. When the submit form is clicked, it needs to go to the next page. Here is the code:
@app.route('/route1', methods=['POST', 'GET'])
def predict():
form = Form_1()
# These errors, submitted and validated just for some context, not in the actual code
print(form.errors) # Returns {}
if form.submit():
print("submitted") # Returns "submitted"
if form.validate():
print("validated") # Page shows error 'NoneType' object is not iterable
# more code
if form.validate_on_submit():
print("validated on submit") # This is not working
# more code
return redirect(url_for('page_x'))
return render_template('page_x.html', title='Page X', form=form)
Here is the HTML:
<div class="content" align="center">
<div class="content-section">
<form method = "POST" action="">
{{ form.hidden_tag() }}
<table style="width:15%">
<tr>
<td>{{ form.select_field.label() }}</td>
<td>:</td>
<td>{{ form.select_field() }}</td>
</tr>
<tr>
<td></td>
<td></td>
<td>{{ form.submit() }}</td>
</tr>
</table>
</form>
</div>
</div>
It is weird because I have another code similar to this that worked:
@app.route('/route2', methods=['POST', 'GET'])
def add_data():
form = Form_2()
if form.validate_on_submit():
# more code
return redirect(url_for('page_y')
return render_template('page_y.html', title='Page Y', form=form)
HTML:
<div class="content" align="center">
<h1>Help Us Improve by Uploading a New Dataset</h1>
<div class="content-section">
<form method="POST" action="" enctype="multipart/form-data">
{{ form.hidden_tag() }}
{{ form.add_file() }} {{ form.submit() }}
</form>
</div>
</div>
I am not sure what went wrong. Any help would be appreciated. Thank you.
A:
I found the problem. It is with the SelectField form that I use. I place a coerce arguments and it works.
Article that helped me: Not a Valid Choice for Dynamic Select Field WTFORMS
|
{
"pile_set_name": "StackExchange"
}
|
/*
* Copyright (c) 2007, 2008, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package java.net;
import java.io.IOException;
import java.io.FileDescriptor;
/*
* On Unix systems we simply delegate to native methods.
*
* @author Chris Hegarty
*/
class PlainSocketImpl extends AbstractPlainSocketImpl
{
static {
initProto();
}
/**
* Constructs an empty instance.
*/
PlainSocketImpl() { }
/**
* Constructs an instance with the given file descriptor.
*/
PlainSocketImpl(FileDescriptor fd) {
this.fd = fd;
}
native void socketCreate(boolean isServer) throws IOException;
native void socketConnect(InetAddress address, int port, int timeout)
throws IOException;
native void socketBind(InetAddress address, int port)
throws IOException;
native void socketListen(int count) throws IOException;
native void socketAccept(SocketImpl s) throws IOException;
native int socketAvailable() throws IOException;
native void socketClose0(boolean useDeferredClose) throws IOException;
native void socketShutdown(int howto) throws IOException;
static native void initProto();
native void socketSetOption(int cmd, boolean on, Object value)
throws SocketException;
native int socketGetOption(int opt, Object iaContainerObj) throws SocketException;
native void socketSendUrgentData(int data) throws IOException;
}
|
{
"pile_set_name": "Github"
}
|
[Neonatal renal vein thrombosis in a heterozygous carrier of both factor V Leiden and the MTHFR gene mutation].
Renal vein thrombosis (RVT) is a rare but potentially serious neonatal disease. Its epidemiology and its clinical and biological expression are currently well known, but its etiological exploration, like that of venous thromboembolism, is increasingly complex. Perinatal risk factors such as prematurity, dehydration, and birth asphyxia have lost their direct accountability at the expense of their interaction with constitutional disorders of hemostasis. We report a case of RVT in a newborn who was a heterozygous carrier of both factor V Leiden and the methylene tetrahydrofolate reductase (MTHFR) gene mutation. We recall the clinical and epidemiological characteristics. A search for inborn blood coagulation disorders should be systematic in the newborn infant with venous thrombosis because of the risk of recurrence, taking into account perinatal factors and maternal thrombophilia (especially if RVT is established during the prenatal period).
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Pays someone to custom build him a computer Says he's an Expert on custom pc building
165 shares
|
{
"pile_set_name": "OpenWebText2"
}
|
Blog
Why sex makes up happier. A new study.
Sex makes us happy. Duh. know a this isn’t a big news flash but there are a couple of interesting new studies that finally explain why doing the horizontal bop puts a smile on our faces. As a sex therapist I tell my clients that they need to keep their sex lives active or run the risk of losing their sexuality. The usual use it or lose it mantra. There is current research that explains that sex makes us feel closer, is physically one of the things we can do to stay healthy and generally just feels good.But how it makes us happier is the subject of much debate and countless research grants. For women who are sexually satisfied, it makes us happier. This fact my be obvious (and doesn’t need a sex expert to explain it), but the reasons why may surprise you.
The first, a study out of The University of Colorado Boulder suggests that we are happy when we know that we are having a better sex life than our neighbors. That na nannana kind of glee that knows you are hotter than your acquaintances. “There is an overall sense of well-being that comes with engaging in sex more frequently”. Having sex makes us happy, but thinking that we are having more sex than other people makes us even happier.” And you thought it was just your lawn mower your neighbor coveted.
A second study from the State University in New York says that it is the chemistry of semen (absorbed or ingested) that makes us happier. The fact that that women who are exposed to their partner’s semen during sex may find themselves feeling happier than those who use a condom,” say scientists.
So despite the need to practice safe sex (a infection-free partner is the key here), the mood-altering hormones in semen absorbed through the vagina can help to boost women’s mood.Semen contains a range of hormones, including testosterone and estrogen, both of which have been shown to make us happier. It goes with the study that shows that the chemicals in semen are actually good for our teeth (but I digress).
The new article from Men’s Health suggests that HUSBANDS ARE HAPPIER WHEN THEIR WIVES ARE SEXUALLY SATISFIED. The cliché says a happy wife is a happy life, and new research confirms it’s pretty much true. Researchers have found that a wife’s sexual satisfaction can predict her husband’s happiness. To find this, researchers from Ohio State University interviewed married couples to find out how much of an impact intimacy had on their relationship. They discovered that men reported higher levels of relationship satisfaction when their wives were sexually satisfied. Experts say this is because many men feel their main job in a relationship is to satisfy their wives sexually. Researchers say her sexual satisfaction is not just based on whether or not she orgasms, but also on the quality of foreplay, duration and frequency of sex and her partner’s adventurousness in the bedroom.
Finally there is an article from a new paper published by the Institute for the Study of Labor who reports that researchers have come to the groundbreaking conclusion that yes, sexual activity does indeed have a strong correlation with happiness. Not only that, but having more sex means better health and higher wages, so that whole evolutionary perpetuating-the-human-race thing is now sitting in solid fourth place on the list of top 10 reasons you should get it on regularly.
According to the study, “individuals who had sex more than four times a week had 5% higher wages than those who didn’t, which means your coworkers that are always skipping out early from work to have some good old fashioned intercourse with their partners are not only getting laid more often than you are, they’re making more money too. The higher wage effect remained true even when other factors came into play, like education or sexual orientation.”
So what doesn’t make us happy about sex?
The University of Texas study finds that women are more likely than men to regret having casual sex, moving too fast in a relationship, or sleeping with the wrong person. I think dialing drunk should be up there too.
Men, meanwhile, just regret not having sex with more people. Think about it. As a woman you regret the mercy hump, or jumping into bed too soon. Men tend to regret what they didn’t do – the red head, the threesome, or not having crazy monkey sex whenever possible.
But overall happiness can be elusive. Is it as simple as having more sex (and better) sex? I think sex is an important part of happiness. But it’s only one part. I loved Gretchen Rubin’s books The Happiness Project, and Happier at Home. She researched happiness, and while she didn’t spend her year on her back, she has some insights into how sex can add to your happiness. Gretchen had lots really great things to say. Listen to my interview with her that explores this issue of happiness in greater detail. gretchen rubin- the happiness project author talking about a year of happiness
So no matter what makes you happy (semen, comparing your sex life to the Jones’s, or that it makes you more money) you may want to explore your current reasons for grabbing a quickie.
Navigation
A little something about us
Sue, “Sex with Sue” McGarvie, is a Clinical Sex and Relationship Therapist, and an International Expert in the area of Low Libido and Sexual Desire. She is the founder of The Ottawa Sex Therapy and Libido Clinic and YOUR sex and relationship therapist..
|
{
"pile_set_name": "Pile-CC"
}
|
Namantar Andolan
Namantar Andolan (English: Name Change Movement) was a Dalit and Neo-Buddhist movement to change the name of Marathwada University, in Aurangabad, Maharashtra, India, to Dr. Babasaheb Ambedkar University. It achieved a measure of success in 1994, when the compromise name of Dr. Babasaheb Ambedkar Marathwada University was accepted. The movement was notable for the violence against Dalits and Navayana Buddhists.
Background
Namantar means name change and andolan means social movement. The Namantar Andolan was a 16-year-long Dalit campaign to rename Marathwada University in recognition of B. R. Ambedkar, the jurist, politician and social reformer who had proposed that untouchability should be made illegal.
Non-Dalit student groups initially supported the demand to have the university renamed but did so less for reasons of dogma than for the pragmatic desire to bring the Dalit, mostly Mahar (now Buddhists), students into the general fold. Dalit students traditionally showed no interest in supporting such causes as lower fees and cheaper textbooks, but they constituted around 26 percent of the student population and anticipated quid pro quo. A march involving Dalit and non-Dalit students was organised, with the intent of petitioning the council of the university for the change. The procession met with another, headed by Gangadhar Gade, a Dalit Panther leader, who launched a tirade of abuse at the non-Dalit contingent as he asserted the right of the Dalits to take all the credit for the change in name. This alienated the non-Dalit students and, according to Dipankar Gupta, "the division was caused not so much by Hindu caste prejudices and reticence to support the renaming of the University, but rather by the splittist and sectarian position taken by Gadhe," who might also be concerned that any alliance between Dalits and non-Dalits could affect the potency of the Panthers. Among left-wing organisations, only the Students' Federation of India and Yukrant continued to support the campaign.
In 1977, the chief minister of Maharashtra, Vasantdada Patil, promised that the renaming would occur, and in July 1978, the Maharashtra Legislature approved it. Uttara Shastree notes that the campaign at this time reflected the desire of neo-Buddhists for an improved image and position in society, as a significant part of which they called on the symbolic ideas of Ambedkar, that had preceded his rise to prominence. The University Executive Body passed a resolution to rename the university and this series of decisions was the catalyst for rioting, which began on 27 July 1978 and lasted several weeks.
Commentators such as Gail Omvedt believe that the violence was a caste war based on hatred; whilst others, such as Gupta, believe that the causes were more varied. Both Omvedt and Gupta noted that the violence was aimed at the Mahars (now Buddhists) and did not extend to other Dalit groups, while Gupta also notes that it was concentrated in the three districts of Marathwada — Aurangabad, Nanded and Parbhani — where Dalit registrations in schools and colleges were particularly high, and economic competition was the most fierce. In particular, the centres of the unrest were urban areas, where the impact of Mahar aspirations would most deeply affect the employment, social, and economic roles which Hindu castes considered to be their preserve. Troubles were largely absent from the other two districts, Beed and Osmanabad, and the spill of problems into rural areas generally was patchy. These issues of geographic and demographic targeting, according to Gupta, indicate that the real causes of the violence were more subtle than war between caste Hindu and Dalit. There were also instances of violent acts taking place under the pretext of the riots elsewhere but in fact to settle very local and personal scores unrelated to the broader causes. In contradiction to these views, Y. C. Damle maintains that the violence "specially affected the Scheduled Caste people in the villages although the agitation for renaming the Marathwada University after Dr. Ambedkar was spearheaded by Dalit Panthers and such leaders mainly in urban centres. In giving a call for agitation, hardly any effort was made to protect the villages or villagers."
Attacks
Riots affected 1,200 villages in Marathwada, impacting on 25,000 Marathi Buddhist Dalits and causing thousands of them to seek safety in jungles. The terrorised Dalits did not return to their villages, despite of starvation. This violence was allegedly organised by members of the Maratha community and took many forms, including killings, molestation, rape of Dalit women, burning of houses and huts, pillaging of Dalit colonies, forcing Dalits out of villages, polluting drinking water wells, destruction of cattle, and refusal to employ. This continued for 67 days. According to the Yukrant leader, attacks on Dalit were collective and pre-planned. In many villages, Dalit colonies were burned. The burning houses in Marathwada region affected 900 Dalit households. Upper caste rioters demolished essential household items that the Dalit possessed. They even burned the fodder stocks owned by Dalits. The bridges and culverts were intentionally broken or damaged to paralyse the military and police aid in villages during the time of the attacks. Upper caste mobs attacked government property including government hospitals, railway stations, gram panchayat offices, state transport buses, District Council-operated school buildings, the telephone system and the government go downs. 30 crore worth property was damaged. The Marathwada region was under siege of violence for over two years. The Dalits were wrecked economically and psychologically. Many Dalit protesters were physically injured and nineteen died including five protesters who lost their lives during the police repression.
Much of the violence occurred in Nanded district. Examples include:
Sonkhed village: The mob burned a Dalit residential area. Two women were raped and three children were killed.
Sugaon village: Janardhan Mavde was killed.
Bolsa and Izzatgaon villages: women were raped and tortured (one woman had her breast cut off).
The elder son of the martyr Pochiram Kamble, Chandar Kamble, lost his life during the Andolan.
Koklegaon: A Dalit teacher, local social activist, was tortured with his wife. Dalit habitations were set on fire.
Violence also occurred in Parbhani district. Examples include:
Parbhani town: Hindu students and youths destroyed the statue of Ambedkar at Bhim Nagar.
Parbhani City: On 17 July 1978, agitators stopped buses and trains and even cut the telephone lines. The police did not intervene, and after 30 July Dalit habitations were targeted.
Adgaon Village: Dalits were threatened; cattle shed and agricultural equipments were torched.
Samiti observed similar violent incidents (like Nanded district) in Koregaon, Kaulgaon, Nandgaon, Sodgaon, Halta, Cohgaon, Nandapur, and many other villages of Parbhani district.
Examples of violence in Aurangabad district included:
Aurangabad City: Non-Dalits destroyed public property by burning buses, blowing up bridges to paralyze the social life.
Aurangabad City: Many professors opposed renaming the university. On the other hand, prof. Desarda, a Marxist teacher, was beaten by Maratha students for supporting the Namantar.
Akola Village: Mahajanrao Patil, a Lingayat, an upper caste Hindu, helped Dalits so he was beaten badly. Police did not react after his complaint. Kashinath Borde, neo-Buddhist police Patil, a flour mill owner, who officially reported complaints of harassment against Hindus was targeted. His bullock cart, household goods and house were burned.
Examples of violence in Beed district included:
Ambejogai: : Followers of Sharad Pawar got assaulted.
Examples of violence in Osmanabad district included:
Tuljapur: Dalit women were specifically attacked. Upper caste women helped in the torching of Dalit houses.
Dalits were terrorised by damaging the road bridges, telephone lines and the roads connecting between Kalam and Yermala.
Dalits in Tulzapur, Savargaon, Bavi, Pthrud, and Wagholi attacked.
A group of almost 900 violent upper caste youths attacked Dalits.
Example of violence in Hingoli district included:
Basmath: After the attacks, the tahsildar did not provide meals for the victims. Instead, he advised them to beg for it.
Examples of violence in Nashik district included:
Nashik city: The attempts were made to garland the statue of Shivaji with footwear, to criticize Neo-Buddhists and to activate riots.
Vihit village: The statue of Ambedkar was damaged.
Examples of violence in Nagpur included:
The police shot Avinash Dongre, a child, in his head when he was chanting the slogan Change the name at Indora Bridge 10.
Along with Dongre, Dilip Ramteke, Abdul Sattar, Roshan Borkar and Ratan Mendhe sacrificed their lives in Namantar struggle at Nagpur.
In Jalgot Village, Fauzdar Bhurevar was beaten and then burned alive by a mob at a police outpost. Violence was reported in Pune. Demonstrators in Mumbai teargassed. Statues of Ambedkar and Buddha through the region were also damaged or destroyed.
Role of media, political parties and bureaucrats
Media
The regional press played a biased role during the violence. The Marathi Newspaper, Prajawani and Godatir Samachar, opposed the Namantar "by giving wide publicity to the riots in the cities and suppressing news in the rural areas." According to Aurangabad daily, Marathwada the Namantar was a cultural violation for Marathwada existence. The press did not publish about rural violence news. They did not report the declarations by the Republican Party of India and Dalit Panther. The front page of a famous Marathi newspaper published a notice for upper caste Hindus to support the agitation. Similarly, people were urged through letters, flyers, and hand-outs to join the agitation. The Parliamentary Committee advised to reinforce the police intelligence with radio communication, telephones, and motor vehicles in talukas. But the media intensified on allegations that the PCR Act was being misused. Bhalchandra Nemade commented "All Marathi newspapers are communal and they thrive on the so-called 'freedom of press' to serve their own aims." The chief minister of Maharashtra admitted the one-sided role of the press.
Political parties
Shiv Sena, the Hindutva political party, initially declared itself opposed to the Namantar. During the agitation, the supporters of Bal Thackeray burnt homes of the Dalits. People were physically harmed, including by attacks with swords. Interviewers explained that the attackers were from the Maratha community, who also burned Dalit properties in Nanded district. Supporters of the Peasants and Workers Party of India (PWP) and Indian National Congress were involved in these burnings. In the same area, there were allegations of two women raped and three children killed, but no legal action instigated. According to Gopal Guru:
But later in 2011, Bal Thackeray cleared that he never opposed the Namantar. He said in an interview that:
Bureaucrats
Many Dalits were harassed by the police as they continued to campaign for the change. The police allegedly reacted by adopting tactics such as delay and suppression of evidence. In a few villages, Hindu police patils and sarpanchs of all riot-affected villages teamed up with rich Hindu caste landowners to attack Dalit's poor peasants and agricultural labourers. The police joined the mob in a violent way. The District Collector of Nanded was from Dalit community, and was powerless when his assistant officers refused his commands. In Akola Village, the police intentionally refused to lodge complains during violence against upper caste Hindus. In Nanded City, the curfew was enforced during agitation. The sons of the resident Deputy Collector, Home Inspector and Circle Inspector took part in the riot. During restriction timings, the Dalit homeguards interrupted them. A complaint was registered contrary to the homeguards. The complaints lodged by the Dalits were taken cold-bloodedly by the police. A Parliamentary Committee concluded that the police were "mere spectators to the incidents" during the atrocities.
Effects
After the riots, many landlords refused to employ Dalits, even at public places such as hotels. They discriminated against them. Rioters created a silent boycott. Because of fearful environment the Dalits migrated to the cities, and did not return to their villages. Dalit-grown crops got set on fire. In 1985, in the Wakod village of Sillod taluka, the standing crops owned by Dalits on their land were ploughed up by the Sarpanch himself. A few college teachers and academicians formed a samiti to rehabilitate Dalit victims to restore harmony to the community. Muslims of Marathwada opposed the bandhs declared by Shiv Sena. They did not close their commercial establishments to show their support for Namantar. The Parliamentary Committee revealed that humanitarian aid provided to help Dalits was not sufficient to recover the losses. Moreover, Samiti observed the corruption in it.
Sooner after the atrocities, authorities brought around 3000 individuals into the police custody, but victims reported that very few went into the court, and the remaining cases weren't much faster. Even natives pressured to dismiss all cases. The parliamentary committee advised "an automatic judicial inquiry in all cases of large-scale arson and looting involved Dalits". But, the judicial inquiry was opposed by the Maharashtra government.
Long March
On 4 August 1978, Jogendra Kawade led a march from Deekshabhoomi to the District magistrate's office in Nagpur to rename the university. On the same day, there was a meeting in Aakashwani Chowk that was attended by a large student crowd. Following, the people were going back home zestfully. The provoked violence started when some anti-social elements pelted stones at transportation links. The police opened fire to overcome turbulence. After this incident, the Long March was declared. Dalit protestors from Delhi, Haryana, Bihar, Madhya Pradesh, Andhra Pradesh, Karnataka and Tamil Nadu reached to Nagpur.
The violence caused the Dalits to suspend their campaign for a while, but when a new incumbent as Chief Minister, Sharad Pawar, found various reasons to postpone the renaming, the reaction was the organisation of a Long March and instigating the Namantar Andolan. The march was inspired by the Chinese Long March and intended to end symbolically with convergence in Aurangabad on 6 December 1979, on Ambedkar's death anniversary. According to Omvedt, "Long March was organised by very factionalised committees that included the Dalit Panthers, smaller Dalit organisations, the Republican Party factions, socialist individuals and groups, and the Communist parties." The protest march was led by Jogendra Kawade and caused the arrest of thousands of protesters as well as prominent leaders. According to Kawade "this was the fight for the protection of democracy and humanism".
The Long March began on a Dhamma Chakra Pravartan Din from Deekshabhoomi, Nagpur, an area populated by many Buddhists, towards Aurangabad, blessed by Bhadant Anand Kausalyan. Each day, protesters marched 30 kilometres to cover a distance of 470 kilometres in 18 days in the bitter cold. This was one of the most remarkable andolan in Indian history, after the 1927 Indian Independence movement due to Dalit women's active key role–they took part in the Jail Bharo Andolan with pride. At every village, masses of people joined the Long March. "This march was the world's third largest Long March." According to Yukrant leader, around 3 lakhs of people were expected to join the Long March to rename the university after Ambedkar's name. A small percentage reached to Aurangabd, but minimum 3 lakhs organized the mass protest – The protesters clashed with the police between 25 November to 6 December. Thousands of Long March activists walking from Nagpur, Udgir, and Satara were taken into custody at the boundaries of Marathwada. Thousands were arrested during the staygraha struggle at their towns and cities. During 6 December, Ambedkar's death anniversary, protesters were lathi charged and police fired shots on them. On the same day, Vidarbha bandh was observed. On 27 November, police stopped the protesters at Khadakpurna River Bridge in the afternoon. Thousands of protesters started a sit-in at the Khadakpurna River Bridge. They were lathi charged after 12 AM in their sleep. During the course, many ran away, and hundreds were arrested.
On 3 December, there was a protest by Dalit youths who burned buses. 4 of them died in clashes with the police at Nagpur. Police arrested around 12,000 demonstrators, who planned to march towards the University from Kranti Chowk, at Auragabad. Demonstrators of Dalit Panthers were arrested at Bhadkal Gate and at the university entrance. Leaders and activists arrested, physically harmed, lathi charged, shot with tear gas, and air firing to disperse the crowd. The intention of the state was to control and disperse demonstrators and keep them from anti Dalits, who formed the Namantar Virodhi Group (a group opposing renaming). Most of them were freed from jails on the same evening but few refused to leave the jails to continue satyagraha. The main agenda of this Long March was to battle against caste oppression.
The movement became a part of Dalit literature. According to Omvedt, "the upsurge, turmoil's and frustration of the long march campaign brought the movement to a new turning point. The readiness for action shown by Dalit masses provided a demonstration of their powerful urge for revolutionary change". During the Long March, men sung songs of martyrs. Women even joined children to boost this revolution. The andolan gradually turned out in Agra, Delhi, Bangalore, Hyderabad, where people protested marching. For 16 years, many meetings were held, people protested marching, and they were arrested many times.
Namvistar Din
Govindbhai Shroff was against renaming the university, but he requested people to accept the new name with non-violence. Concurrently, he pressed a requirement to withdraw the Scheduled Caste and Scheduled Tribe (Prevention of Atrocities) Act cases against non-Dalits, specifically the malafide ones. Tight security was deployed on the eve of the announcement with a few incidents reported in Parbhani and Amravati. The police imposed a curfew at Tuljapur and shots fired by the police were reported in Beed. After renaming the university, at least four Dalits were stabbed, Dalit property was set on fire and statues of Ambedkar dishonoured at Parbhani and Osmanabad. However, in Osmanabad district, at Kathi Savargaon, the renaming decision was welcomed with celebration by Maratha sarpanch in village. A similar case was reported in Lohara.
Marathwda region has a diverse cultural and historical background, so many names were suggested. Finally the "university was renamed as Dr. Babasaheb Ambedkar Marathwada University to pay homage to the work done by Dr. Babasaheb Ambedkar for the educational development of the Marahwada region." The university name was eventually altered on 14 January 1994. The chosen form — Dr. Babasaheb Ambedkar Marathwada University — represents an expansion of the existing name (a Namvistar) rather than complete change (Namanatar). Sharad Pawar also announced that it would be a policy to encourage higher education for everyone, irrespective of caste, class, religion, and ethnicity. Moreover, the newly named university was developed with improved facilities in some departments to conceptualize the dream of Ambedkar, which was one of the important parameters for the University. At the same time, the university adopted the Ajanta arch, with elephants as its primary logo, reflecting the Buddhist cultural significance of the Ajanta Caves.
Every 14 January, the followers of Ambedkar throng the university. The political parties and organizations, based on Ambedkar's thinking, celebrate this day. Many people visit the university to celebrate the Namvistar Din, so political parties arrange their rallies traditionally. The University building and gate is decorated with lights. Many people visit the Buddhist caves on this occasion. Women greet each other by applying Nil (Indigo colour powder). This day is celebrated in other educational institutes other than Dr. Babasaheb Ambedkar Marathwada University as well.
Legacy
People come to the University gate to have Darśana, which resembles the Sanchi Stupa gate, and leave an offering as if the University were a place of pilgrimage. In 2013, the Nagpur Municipal Corporation erected the Namantar Shahid Smarak (Martyrdom Memorial) dedicated to Dalits who died in the movement at Nagpur.
See also
Dalit Buddhist movement
History of the Indian caste system
Self-Respect Movement
Caste politics in India
National Campaign on Dalit Human Rights
References
Notes
Citations
External links
How a 20-year-long Dalit movement to rename Marathwada University was met with violence (An excerpt from activist Eknath Awad’s autobiography, now translated into English.)
Caste System and Caste related Violence in Indian Culture
Category:History of Maharashtra (1947–present)
Category:History of Aurangabad, Maharashtra
Category:Political movements in India
Category:Social movements in India
Category:Nonviolent resistance movements
Category:Movements for civil rights
Category:Revolutionary movements
Category:Protests in India
Category:Protest marches
Category:Civil rights protests
Category:Riots and civil disorder in India
Category:Caste-related violence in India
Category:Dalit history
Category:Dalit politics
Category:Hinduism and politics
Category:Arson in India
Category:Anti-caste movements
Category:Dr. Babasaheb Ambedkar Marathwada University
|
{
"pile_set_name": "Wikipedia (en)"
}
|
<!DOCTYPE html>
<html>
<head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
<title>class Celluloid::Task - celluloid-0.15.2 Documentation</title>
<link type="text/css" media="screen" href="../rdoc.css" rel="stylesheet">
<script type="text/javascript">
var rdoc_rel_prefix = "../";
</script>
<script type="text/javascript" charset="utf-8" src="../js/jquery.js"></script>
<script type="text/javascript" charset="utf-8" src="../js/navigation.js"></script>
<script type="text/javascript" charset="utf-8" src="../js/search_index.js"></script>
<script type="text/javascript" charset="utf-8" src="../js/search.js"></script>
<script type="text/javascript" charset="utf-8" src="../js/searcher.js"></script>
<script type="text/javascript" charset="utf-8" src="../js/darkfish.js"></script>
<body id="top" class="class">
<nav id="metadata">
<nav id="home-section" class="section">
<h3 class="section-header">
<a href="../index.html">Home</a>
<a href="../table_of_contents.html#classes">Classes</a>
<a href="../table_of_contents.html#methods">Methods</a>
</h3>
</nav>
<nav id="search-section" class="section project-section" class="initially-hidden">
<form action="#" method="get" accept-charset="utf-8">
<h3 class="section-header">
<input type="text" name="search" placeholder="Search" id="search-field"
title="Type to search, Up and Down to navigate, Enter to load">
</h3>
</form>
<ul id="search-results" class="initially-hidden"></ul>
</nav>
<div id="file-metadata">
<nav id="file-list-section" class="section">
<h3 class="section-header">Defined In</h3>
<ul>
<li>lib/celluloid/tasks.rb
<li>lib/celluloid/tasks/task_thread.rb
</ul>
</nav>
</div>
<div id="class-metadata">
<nav id="parent-class-section" class="section">
<h3 class="section-header">Parent</h3>
<p class="link">Object
</nav>
<!-- Method Quickref -->
<nav id="method-list-section" class="section">
<h3 class="section-header">Methods</h3>
<ul class="link-list">
<li ><a href="#method-c-current">::current</a>
<li ><a href="#method-c-new">::new</a>
<li ><a href="#method-c-suspend">::suspend</a>
<li ><a href="#method-i-backtrace">#backtrace</a>
<li ><a href="#method-i-create">#create</a>
<li ><a href="#method-i-exclusive">#exclusive</a>
<li ><a href="#method-i-exclusive-3F">#exclusive?</a>
<li ><a href="#method-i-guard">#guard</a>
<li ><a href="#method-i-inspect">#inspect</a>
<li ><a href="#method-i-resume">#resume</a>
<li ><a href="#method-i-running-3F">#running?</a>
<li ><a href="#method-i-suspend">#suspend</a>
<li ><a href="#method-i-terminate">#terminate</a>
</ul>
</nav>
</div>
<div id="project-metadata">
<nav id="classindex-section" class="section project-section">
<h3 class="section-header">Class and Module Index</h3>
<ul class="link-list">
<li><a href="../Celluloid.html">Celluloid</a>
<li><a href="../Celluloid/AbortError.html">Celluloid::AbortError</a>
<li><a href="../Celluloid/AbstractProxy.html">Celluloid::AbstractProxy</a>
<li><a href="../Celluloid/Actor.html">Celluloid::Actor</a>
<li><a href="../Celluloid/Actor/Sleeper.html">Celluloid::Actor::Sleeper</a>
<li><a href="../Celluloid/ActorProxy.html">Celluloid::ActorProxy</a>
<li><a href="../Celluloid/AsyncCall.html">Celluloid::AsyncCall</a>
<li><a href="../Celluloid/AsyncProxy.html">Celluloid::AsyncProxy</a>
<li><a href="../Celluloid/BlockCall.html">Celluloid::BlockCall</a>
<li><a href="../Celluloid/BlockProxy.html">Celluloid::BlockProxy</a>
<li><a href="../Celluloid/BlockResponse.html">Celluloid::BlockResponse</a>
<li><a href="../Celluloid/CPUCounter.html">Celluloid::CPUCounter</a>
<li><a href="../Celluloid/CPUCounter/RbConfig.html">Celluloid::CPUCounter::RbConfig</a>
<li><a href="../Celluloid/Call.html">Celluloid::Call</a>
<li><a href="../Celluloid/CallChain.html">Celluloid::CallChain</a>
<li><a href="../Celluloid/ClassMethods.html">Celluloid::ClassMethods</a>
<li><a href="../Celluloid/Condition.html">Celluloid::Condition</a>
<li><a href="../Celluloid/Condition/Waiter.html">Celluloid::Condition::Waiter</a>
<li><a href="../Celluloid/ConditionError.html">Celluloid::ConditionError</a>
<li><a href="../Celluloid/DeadActorError.html">Celluloid::DeadActorError</a>
<li><a href="../Celluloid/DeadTaskError.html">Celluloid::DeadTaskError</a>
<li><a href="../Celluloid/ErrorResponse.html">Celluloid::ErrorResponse</a>
<li><a href="../Celluloid/EventedMailbox.html">Celluloid::EventedMailbox</a>
<li><a href="../Celluloid/ExitEvent.html">Celluloid::ExitEvent</a>
<li><a href="../Celluloid/FSM.html">Celluloid::FSM</a>
<li><a href="../Celluloid/FSM/ClassMethods.html">Celluloid::FSM::ClassMethods</a>
<li><a href="../Celluloid/FSM/State.html">Celluloid::FSM::State</a>
<li><a href="../Celluloid/FSM/UnattachedError.html">Celluloid::FSM::UnattachedError</a>
<li><a href="../Celluloid/FiberStackError.html">Celluloid::FiberStackError</a>
<li><a href="../Celluloid/Future.html">Celluloid::Future</a>
<li><a href="../Celluloid/Future/Result.html">Celluloid::Future::Result</a>
<li><a href="../Celluloid/FutureProxy.html">Celluloid::FutureProxy</a>
<li><a href="../Celluloid/Incident.html">Celluloid::Incident</a>
<li><a href="../Celluloid/IncidentLogger.html">Celluloid::IncidentLogger</a>
<li><a href="../Celluloid/IncidentLogger/Severity.html">Celluloid::IncidentLogger::Severity</a>
<li><a href="../Celluloid/IncidentReporter.html">Celluloid::IncidentReporter</a>
<li><a href="../Celluloid/IncidentReporter/Formatter.html">Celluloid::IncidentReporter::Formatter</a>
<li><a href="../Celluloid/InstanceMethods.html">Celluloid::InstanceMethods</a>
<li><a href="../Celluloid/InternalPool.html">Celluloid::InternalPool</a>
<li><a href="../Celluloid/LinkingRequest.html">Celluloid::LinkingRequest</a>
<li><a href="../Celluloid/LinkingResponse.html">Celluloid::LinkingResponse</a>
<li><a href="../Celluloid/Links.html">Celluloid::Links</a>
<li><a href="../Celluloid/LogEvent.html">Celluloid::LogEvent</a>
<li><a href="../Celluloid/Logger.html">Celluloid::Logger</a>
<li><a href="../Celluloid/Mailbox.html">Celluloid::Mailbox</a>
<li><a href="../Celluloid/MailboxDead.html">Celluloid::MailboxDead</a>
<li><a href="../Celluloid/MailboxShutdown.html">Celluloid::MailboxShutdown</a>
<li><a href="../Celluloid/Method.html">Celluloid::Method</a>
<li><a href="../Celluloid/NamingRequest.html">Celluloid::NamingRequest</a>
<li><a href="../Celluloid/NotActorError.html">Celluloid::NotActorError</a>
<li><a href="../Celluloid/NotTaskError.html">Celluloid::NotTaskError</a>
<li><a href="../Celluloid/Notifications.html">Celluloid::Notifications</a>
<li><a href="../Celluloid/Notifications/Fanout.html">Celluloid::Notifications::Fanout</a>
<li><a href="../Celluloid/Notifications/Subscriber.html">Celluloid::Notifications::Subscriber</a>
<li><a href="../Celluloid/PoolManager.html">Celluloid::PoolManager</a>
<li><a href="../Celluloid/Properties.html">Celluloid::Properties</a>
<li><a href="../Celluloid/Receiver.html">Celluloid::Receiver</a>
<li><a href="../Celluloid/Receivers.html">Celluloid::Receivers</a>
<li><a href="../Celluloid/Registry.html">Celluloid::Registry</a>
<li><a href="../Celluloid/Registry/actor;.html">Celluloid::Registry::actor;</a>
<li><a href="../Celluloid/Response.html">Celluloid::Response</a>
<li><a href="../Celluloid/ResumableError.html">Celluloid::ResumableError</a>
<li><a href="../Celluloid/RingBuffer.html">Celluloid::RingBuffer</a>
<li><a href="../Celluloid/SignalConditionRequest.html">Celluloid::SignalConditionRequest</a>
<li><a href="../Celluloid/Signals.html">Celluloid::Signals</a>
<li><a href="../Celluloid/StackDump.html">Celluloid::StackDump</a>
<li><a href="../Celluloid/StackDump/ActorState.html">Celluloid::StackDump::ActorState</a>
<li><a href="../Celluloid/StackDump/DisplayBacktrace.html">Celluloid::StackDump::DisplayBacktrace</a>
<li><a href="../Celluloid/StackDump/TaskState.html">Celluloid::StackDump::TaskState</a>
<li><a href="../Celluloid/StackDump/ThreadState.html">Celluloid::StackDump::ThreadState</a>
<li><a href="../Celluloid/SuccessResponse.html">Celluloid::SuccessResponse</a>
<li><a href="../Celluloid/SupervisionGroup.html">Celluloid::SupervisionGroup</a>
<li><a href="../Celluloid/SupervisionGroup/Member.html">Celluloid::SupervisionGroup::Member</a>
<li><a href="../Celluloid/Supervisor.html">Celluloid::Supervisor</a>
<li><a href="../Celluloid/SyncCall.html">Celluloid::SyncCall</a>
<li><a href="../Celluloid/SyncProxy.html">Celluloid::SyncProxy</a>
<li><a href="../Celluloid/SystemEvent.html">Celluloid::SystemEvent</a>
<li><a href="../Celluloid/Task.html">Celluloid::Task</a>
<li><a href="../Celluloid/Task/TerminatedError.html">Celluloid::Task::TerminatedError</a>
<li><a href="../Celluloid/Task/TimeoutError.html">Celluloid::Task::TimeoutError</a>
<li><a href="../Celluloid/TaskFiber.html">Celluloid::TaskFiber</a>
<li><a href="../Celluloid/TaskSet.html">Celluloid::TaskSet</a>
<li><a href="../Celluloid/TaskThread.html">Celluloid::TaskThread</a>
<li><a href="../Celluloid/TerminationRequest.html">Celluloid::TerminationRequest</a>
<li><a href="../Celluloid/Thread.html">Celluloid::Thread</a>
<li><a href="../Celluloid/ThreadHandle.html">Celluloid::ThreadHandle</a>
<li><a href="../Celluloid/TimeoutError.html">Celluloid::TimeoutError</a>
<li><a href="../Celluloid/UUID.html">Celluloid::UUID</a>
<li><a href="../Fiber.html">Fiber</a>
<li><a href="../Thread.html">Thread</a>
<li><a href="../org.html">org</a>
<li><a href="../org/jruby.html">org::jruby</a>
<li><a href="../org/jruby/ext.html">org::jruby::ext</a>
<li><a href="../org/jruby/ext/fiber.html">org::jruby::ext::fiber</a>
<li><a href="../org/jruby/ext/fiber/ThreadFiber.html">org::jruby::ext::fiber::ThreadFiber</a>
</ul>
</nav>
</div>
</nav>
<div id="documentation">
<h1 class="class">class Celluloid::Task</h1>
<div id="description" class="description">
<p>Tasks are interruptable/resumable execution contexts used to run methods</p>
</div><!-- description -->
<section id="5Buntitled-5D" class="documentation-section">
<!-- Attributes -->
<section id="attribute-method-details" class="method-section section">
<h3 class="section-header">Attributes</h3>
<div id="attribute-i-chain_id" class="method-detail">
<div class="method-heading attribute-method-heading">
<span class="method-name">chain_id</span><span
class="attribute-access-type">[RW]</span>
</div>
<div class="method-description">
</div>
</div>
<div id="attribute-i-guard_warnings" class="method-detail">
<div class="method-heading attribute-method-heading">
<span class="method-name">guard_warnings</span><span
class="attribute-access-type">[RW]</span>
</div>
<div class="method-description">
</div>
</div>
<div id="attribute-i-meta" class="method-detail">
<div class="method-heading attribute-method-heading">
<span class="method-name">meta</span><span
class="attribute-access-type">[R]</span>
</div>
<div class="method-description">
</div>
</div>
<div id="attribute-i-status" class="method-detail">
<div class="method-heading attribute-method-heading">
<span class="method-name">status</span><span
class="attribute-access-type">[R]</span>
</div>
<div class="method-description">
</div>
</div>
<div id="attribute-i-type" class="method-detail">
<div class="method-heading attribute-method-heading">
<span class="method-name">type</span><span
class="attribute-access-type">[R]</span>
</div>
<div class="method-description">
</div>
</div>
</section><!-- attribute-method-details -->
<!-- Methods -->
<section id="public-class-5Buntitled-5D-method-details" class="method-section section">
<h3 class="section-header">Public Class Methods</h3>
<div id="method-c-current" class="method-detail ">
<div class="method-heading">
<span class="method-name">current</span><span
class="method-args">()</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Obtain the current task</p>
<div class="method-source-code" id="current-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 18</span>
<span class="ruby-keyword">def</span> <span class="ruby-keyword">self</span>.<span class="ruby-identifier">current</span>
<span class="ruby-constant">Thread</span>.<span class="ruby-identifier">current</span>[<span class="ruby-value">:celluloid_task</span>] <span class="ruby-keyword">or</span> <span class="ruby-identifier">raise</span> <span class="ruby-constant">NotTaskError</span>, <span class="ruby-string">"not within a task context"</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- current-source -->
</div>
</div><!-- current-method -->
<div id="method-c-new" class="method-detail ">
<div class="method-heading">
<span class="method-name">new</span><span
class="method-args">(type, meta) { || ... }</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Create a new task</p>
<div class="method-source-code" id="new-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 31</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">initialize</span>(<span class="ruby-identifier">type</span>, <span class="ruby-identifier">meta</span>)
<span class="ruby-ivar">@type</span> = <span class="ruby-identifier">type</span>
<span class="ruby-ivar">@meta</span> = <span class="ruby-identifier">meta</span>
<span class="ruby-ivar">@status</span> = <span class="ruby-value">:new</span>
<span class="ruby-ivar">@exclusive</span> = <span class="ruby-keyword">false</span>
<span class="ruby-ivar">@dangerous_suspend</span> = <span class="ruby-ivar">@meta</span> <span class="ruby-operator">?</span> <span class="ruby-ivar">@meta</span>.<span class="ruby-identifier">delete</span>(<span class="ruby-value">:dangerous_suspend</span>) <span class="ruby-operator">:</span> <span class="ruby-keyword">false</span>
<span class="ruby-ivar">@guard_warnings</span> = <span class="ruby-keyword">false</span>
<span class="ruby-identifier">actor</span> = <span class="ruby-constant">Thread</span>.<span class="ruby-identifier">current</span>[<span class="ruby-value">:celluloid_actor</span>]
<span class="ruby-ivar">@chain_id</span> = <span class="ruby-constant">CallChain</span>.<span class="ruby-identifier">current_id</span>
<span class="ruby-identifier">raise</span> <span class="ruby-constant">NotActorError</span>, <span class="ruby-string">"can't create tasks outside of actors"</span> <span class="ruby-keyword">unless</span> <span class="ruby-identifier">actor</span>
<span class="ruby-identifier">guard</span> <span class="ruby-string">"can't create tasks inside of tasks"</span> <span class="ruby-keyword">if</span> <span class="ruby-constant">Thread</span>.<span class="ruby-identifier">current</span>[<span class="ruby-value">:celluloid_task</span>]
<span class="ruby-identifier">create</span> <span class="ruby-keyword">do</span>
<span class="ruby-keyword">begin</span>
<span class="ruby-ivar">@status</span> = <span class="ruby-value">:running</span>
<span class="ruby-identifier">actor</span>.<span class="ruby-identifier">setup_thread</span>
<span class="ruby-constant">Thread</span>.<span class="ruby-identifier">current</span>[<span class="ruby-value">:celluloid_task</span>] = <span class="ruby-keyword">self</span>
<span class="ruby-constant">CallChain</span>.<span class="ruby-identifier">current_id</span> = <span class="ruby-ivar">@chain_id</span>
<span class="ruby-identifier">actor</span>.<span class="ruby-identifier">tasks</span> <span class="ruby-operator"><<</span> <span class="ruby-keyword">self</span>
<span class="ruby-keyword">yield</span>
<span class="ruby-keyword">rescue</span> <span class="ruby-constant">Task</span><span class="ruby-operator">::</span><span class="ruby-constant">TerminatedError</span>
<span class="ruby-comment"># Task was explicitly terminated</span>
<span class="ruby-keyword">ensure</span>
<span class="ruby-ivar">@status</span> = <span class="ruby-value">:dead</span>
<span class="ruby-identifier">actor</span>.<span class="ruby-identifier">tasks</span>.<span class="ruby-identifier">delete</span> <span class="ruby-keyword">self</span>
<span class="ruby-keyword">end</span>
<span class="ruby-keyword">end</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- new-source -->
</div>
</div><!-- new-method -->
<div id="method-c-suspend" class="method-detail ">
<div class="method-heading">
<span class="method-name">suspend</span><span
class="method-args">(status)</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Suspend the running task, deferring to the scheduler</p>
<div class="method-source-code" id="suspend-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 23</span>
<span class="ruby-keyword">def</span> <span class="ruby-keyword">self</span>.<span class="ruby-identifier">suspend</span>(<span class="ruby-identifier">status</span>)
<span class="ruby-constant">Task</span>.<span class="ruby-identifier">current</span>.<span class="ruby-identifier">suspend</span>(<span class="ruby-identifier">status</span>)
<span class="ruby-keyword">end</span></pre>
</div><!-- suspend-source -->
</div>
</div><!-- suspend-method -->
</section><!-- public-class-method-details -->
<section id="public-instance-5Buntitled-5D-method-details" class="method-section section">
<h3 class="section-header">Public Instance Methods</h3>
<div id="method-i-backtrace" class="method-detail ">
<div class="method-heading">
<span class="method-name">backtrace</span><span
class="method-args">()</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<div class="method-source-code" id="backtrace-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 135</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">backtrace</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- backtrace-source -->
</div>
</div><!-- backtrace-method -->
<div id="method-i-create" class="method-detail ">
<div class="method-heading">
<span class="method-name">create</span><span
class="method-args">(&block)</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<div class="method-source-code" id="create-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 65</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">create</span>(<span class="ruby-operator">&</span><span class="ruby-identifier">block</span>)
<span class="ruby-identifier">raise</span> <span class="ruby-node">"Implement #{self.class}#create"</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- create-source -->
</div>
</div><!-- create-method -->
<div id="method-i-exclusive" class="method-detail ">
<div class="method-heading">
<span class="method-name">exclusive</span><span
class="method-args">() { || ... }</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Execute a code block in exclusive mode.</p>
<div class="method-source-code" id="exclusive-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 103</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">exclusive</span>
<span class="ruby-keyword">if</span> <span class="ruby-ivar">@exclusive</span>
<span class="ruby-keyword">yield</span>
<span class="ruby-keyword">else</span>
<span class="ruby-keyword">begin</span>
<span class="ruby-ivar">@exclusive</span> = <span class="ruby-keyword">true</span>
<span class="ruby-keyword">yield</span>
<span class="ruby-keyword">ensure</span>
<span class="ruby-ivar">@exclusive</span> = <span class="ruby-keyword">false</span>
<span class="ruby-keyword">end</span>
<span class="ruby-keyword">end</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- exclusive-source -->
</div>
</div><!-- exclusive-method -->
<div id="method-i-exclusive-3F" class="method-detail ">
<div class="method-heading">
<span class="method-name">exclusive?</span><span
class="method-args">()</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Is this task running in exclusive mode?</p>
<div class="method-source-code" id="exclusive-3F-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 131</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">exclusive?</span>
<span class="ruby-ivar">@exclusive</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- exclusive-3F-source -->
</div>
</div><!-- exclusive-3F-method -->
<div id="method-i-guard" class="method-detail ">
<div class="method-heading">
<span class="method-name">guard</span><span
class="method-args">(message)</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<div class="method-source-code" id="guard-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 146</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">guard</span>(<span class="ruby-identifier">message</span>)
<span class="ruby-keyword">if</span> <span class="ruby-ivar">@guard_warnings</span>
<span class="ruby-constant">Logger</span>.<span class="ruby-identifier">warn</span> <span class="ruby-identifier">message</span> <span class="ruby-keyword">if</span> <span class="ruby-identifier">$CELLULOID_DEBUG</span>
<span class="ruby-keyword">else</span>
<span class="ruby-identifier">raise</span> <span class="ruby-identifier">message</span> <span class="ruby-keyword">if</span> <span class="ruby-identifier">$CELLULOID_DEBUG</span>
<span class="ruby-keyword">end</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- guard-source -->
</div>
</div><!-- guard-method -->
<div id="method-i-inspect" class="method-detail ">
<div class="method-heading">
<span class="method-name">inspect</span><span
class="method-args">()</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Nicer string inspect for tasks</p>
<div class="method-source-code" id="inspect-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 142</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">inspect</span>
<span class="ruby-node">"#<#{self.class}:0x#{object_id.to_s(16)} @type=#{@type.inspect}, @meta=#{@meta.inspect}, @status=#{@status.inspect}>"</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- inspect-source -->
</div>
</div><!-- inspect-method -->
<div id="method-i-resume" class="method-detail ">
<div class="method-heading">
<span class="method-name">resume</span><span
class="method-args">(value = nil)</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Resume a suspended task, giving it a value to return if needed</p>
<div class="method-source-code" id="resume-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 96</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">resume</span>(<span class="ruby-identifier">value</span> = <span class="ruby-keyword">nil</span>)
<span class="ruby-identifier">guard</span> <span class="ruby-string">"Cannot resume a task from inside of a task"</span> <span class="ruby-keyword">if</span> <span class="ruby-constant">Thread</span>.<span class="ruby-identifier">current</span>[<span class="ruby-value">:celluloid_task</span>]
<span class="ruby-identifier">deliver</span>(<span class="ruby-identifier">value</span>)
<span class="ruby-keyword">nil</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- resume-source -->
</div>
</div><!-- resume-method -->
<div id="method-i-running-3F" class="method-detail ">
<div class="method-heading">
<span class="method-name">running?</span><span
class="method-args">()</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Is the current task still running?</p>
<div class="method-source-code" id="running-3F-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 139</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">running?</span>; <span class="ruby-ivar">@status</span> <span class="ruby-operator">!=</span> <span class="ruby-value">:dead</span>; <span class="ruby-keyword">end</span></pre>
</div><!-- running-3F-source -->
</div>
</div><!-- running-3F-method -->
<div id="method-i-suspend" class="method-detail ">
<div class="method-heading">
<span class="method-name">suspend</span><span
class="method-args">(status)</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Suspend the current task, changing the status to the given argument</p>
<div class="method-source-code" id="suspend-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 70</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">suspend</span>(<span class="ruby-identifier">status</span>)
<span class="ruby-identifier">raise</span> <span class="ruby-string">"Cannot suspend while in exclusive mode"</span> <span class="ruby-keyword">if</span> <span class="ruby-identifier">exclusive?</span>
<span class="ruby-identifier">raise</span> <span class="ruby-string">"Cannot suspend a task from outside of itself"</span> <span class="ruby-keyword">unless</span> <span class="ruby-constant">Task</span>.<span class="ruby-identifier">current</span> <span class="ruby-operator">==</span> <span class="ruby-keyword">self</span>
<span class="ruby-ivar">@status</span> = <span class="ruby-identifier">status</span>
<span class="ruby-keyword">if</span> <span class="ruby-identifier">$CELLULOID_DEBUG</span> <span class="ruby-operator">&&</span> <span class="ruby-ivar">@dangerous_suspend</span>
<span class="ruby-identifier">warning</span> = <span class="ruby-string">"Dangerously suspending task: "</span>
<span class="ruby-identifier">warning</span> <span class="ruby-operator"><<</span> [
<span class="ruby-node">"type=#{@type.inspect}"</span>,
<span class="ruby-node">"meta=#{@meta.inspect}"</span>,
<span class="ruby-node">"status=#{@status.inspect}"</span>
].<span class="ruby-identifier">join</span>(<span class="ruby-string">", "</span>)
<span class="ruby-constant">Logger</span>.<span class="ruby-identifier">warn</span> [<span class="ruby-identifier">warning</span>, <span class="ruby-operator">*</span><span class="ruby-identifier">caller</span>[<span class="ruby-value">2</span><span class="ruby-operator">..</span><span class="ruby-value">8</span>]].<span class="ruby-identifier">join</span>(<span class="ruby-string">"\n\t"</span>)
<span class="ruby-keyword">end</span>
<span class="ruby-identifier">value</span> = <span class="ruby-identifier">signal</span>
<span class="ruby-ivar">@status</span> = <span class="ruby-value">:running</span>
<span class="ruby-identifier">raise</span> <span class="ruby-identifier">value</span> <span class="ruby-keyword">if</span> <span class="ruby-identifier">value</span>.<span class="ruby-identifier">is_a?</span>(<span class="ruby-constant">Celluloid</span><span class="ruby-operator">::</span><span class="ruby-constant">ResumableError</span>)
<span class="ruby-identifier">value</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- suspend-source -->
</div>
</div><!-- suspend-method -->
<div id="method-i-terminate" class="method-detail ">
<div class="method-heading">
<span class="method-name">terminate</span><span
class="method-args">()</span>
<span class="method-click-advice">click to toggle source</span>
</div>
<div class="method-description">
<p>Terminate this task</p>
<div class="method-source-code" id="terminate-source">
<pre><span class="ruby-comment"># File lib/celluloid/tasks.rb, line 117</span>
<span class="ruby-keyword">def</span> <span class="ruby-identifier">terminate</span>
<span class="ruby-identifier">raise</span> <span class="ruby-string">"Cannot terminate an exclusive task"</span> <span class="ruby-keyword">if</span> <span class="ruby-identifier">exclusive?</span>
<span class="ruby-keyword">if</span> <span class="ruby-identifier">running?</span>
<span class="ruby-constant">Celluloid</span>.<span class="ruby-identifier">logger</span>.<span class="ruby-identifier">warn</span> <span class="ruby-node">"Terminating task: type=#{@type.inspect}, meta=#{@meta.inspect}, status=#{@status.inspect}"</span>
<span class="ruby-identifier">exception</span> = <span class="ruby-constant">Task</span><span class="ruby-operator">::</span><span class="ruby-constant">TerminatedError</span>.<span class="ruby-identifier">new</span>(<span class="ruby-string">"task was terminated"</span>)
<span class="ruby-identifier">exception</span>.<span class="ruby-identifier">set_backtrace</span>(<span class="ruby-identifier">caller</span>)
<span class="ruby-identifier">resume</span> <span class="ruby-identifier">exception</span>
<span class="ruby-keyword">else</span>
<span class="ruby-identifier">raise</span> <span class="ruby-constant">DeadTaskError</span>, <span class="ruby-string">"task is already dead"</span>
<span class="ruby-keyword">end</span>
<span class="ruby-keyword">end</span></pre>
</div><!-- terminate-source -->
</div>
</div><!-- terminate-method -->
</section><!-- public-instance-method-details -->
</section><!-- 5Buntitled-5D -->
</div><!-- documentation -->
<footer id="validator-badges">
<p><a href="http://validator.w3.org/check/referer">[Validate]</a>
<p>Generated by <a href="https://github.com/rdoc/rdoc">RDoc</a> 4.0.0.
<p>Generated with the <a href="http://deveiate.org/projects/Darkfish-Rdoc/">Darkfish Rdoc Generator</a> 3.
</footer>
|
{
"pile_set_name": "Github"
}
|
Jacques Christian-Michel Widerkehr was born in Strasbourg on April 18th, 1759 and died in Paris in April 1823. As a pupil of F.X. judge and Dumonchau (cello) it came 1783 to Paris as teachers, composer and freelance musician. A regular publication of its compositions is provable as of 1790. Return attained primarily fame as a composer for instrumental music, particularly its symphony concertantes for wind instruments were very praised. The symphony concertante presented here was made it is dedicated approximately for the citizens (Citoyen) Frederic Duvernoy (1765 - 1835) and Heinrich Domnich (1767 - 1844) at 1797. Both were hornists at the Parisian opera and teacher at the Conservatoire. Duvernoy was a very successful Solohornist, he grew the mid-position of the horn (cor mixed) this used particularly successfully in his own compositions. Domnich was hornist second, also composed for his instrument. Both published very successful school works for the horn in your time.
|
{
"pile_set_name": "Pile-CC"
}
|
268 Cal.App.2d 47 (1968)
THE PEOPLE, Plaintiff and Respondent,
v.
WILLIAM JUNIOR CONLEY, Defendant and Appellant.
Crim. No. 4756.
California Court of Appeals. Third Dist.
Dec. 9, 1968.
Robert Y. Bell for Defendant and Appellant.
Thomas C. Lynch, Attorney General, Edsel W. Haws, Edward A. Hinz, Jr., and Charles P. Just, Deputy Attorneys General, for Plaintiff and Respondent.
FRIEDMAN, J.
In October 1964 a jury in Mendocino County found defendant Conley guilty of the first degree murder of Elaine McCool and her husband, Clifton McCool. Defendant was sentenced to life imprisonment. In March 1966 *51 the judgment of conviction was reversed by the State Supreme Court. (People v. Conley, 64 Cal.2d 310 [49 Cal.Rptr. 815, 411 P.2d 911].) A second trial in Mendocino County culminated in a deadlocked jury. On defendant's motion venue was changed to Tehama County and he was tried a third time in January and February 1967. The jury found him guilty of the first degree murder of both victims, and concurrent life sentences were imposed. He appeals.
The statement of facts in People v. Conley, supra, 64 Cal.2d at pages 314 and 315, summarizes the evidence in detail. Suffice it to say here: Defendant was involved in an affair with Mrs. McCool, who wished to terminate it and return to her husband. After she told him she was ending the relationship, defendant indulged in several days of heavy drinking, then traded his automobile for a rifle, bought ammunition and shot both husband and wife. His blood alcohol level at the time of the shooting was high enough to indicate a possibility of impaired judgment. Psychiatric evidence pointed to a somewhat disordered personality but was characterized by conflicting claims regarding his capacity to entertain malice and to premeditate. Although he claimed to remember nothing of the shooting, several psychiatrists testified that he had been conscious of his actions. The jury found him guilty of two premeditated murders, then rejected his insanity plea.
Jury Instructions
Conley's first conviction was reversed by the Supreme Court for absence of a jury instruction on "nonstatutory" voluntary manslaughter. Footnote 4 of the Conley opinion (64 Cal.2d at pp. 324-326) consists of a suggested comprehensive jury instruction, defining the various kinds of murder and manslaughter as affected by evidence of diminished capacity and unconsciousness attributable to mental defect or voluntary intoxication. A portion of that instruction describes two kinds of voluntary manslaughter recognized by California law: first, the "heat of passion" or "sudden quarrel" variety expressed in Penal Code section 192, subdivision 1; second, the nonstatutory variety, where "due to diminished capacity caused by mental illness, mental defect, or intoxication, the defendant did not attain the mental state constituting malice."
[1] On Conley's first appeal, on substantially identical evidence as here, the Supreme Court held that absence of the instruction on nonstatutory voluntary manslaughter required *52 reversal. A careful examination of the record of the last trial indicates omission of this very instruction. The same result--reversal--must follow here.
The Attorney General urges that the trial judge gave the equivalent of this instruction by telling the jurors that they could not find defendant guilty of first or second degree murder if, by reason of diminished mental capacity, he did not harbor malice aforethought. Repeating the argument under another heading of the law, he urges the error's harmlessness. As in People v. Aubrey, 253 Cal.App.2d 912, 919 [61 Cal.Rptr. 772], this combination of instructions gave the jury an opportunity to acquit defendant if they found no malice, but none to find him guilty of nonstatutory voluntary manslaughter. Whatever deductions legal reasoning might draw from the combination of instructions, the pivotal fact is that only one kind of voluntary manslaughter was defined for the jury, that described in Penal Code section 192, subdivision 1. The jury were not informed that diminished capacity due to voluntary intoxication might reduce the killing to voluntary manslaughter. As a matter of law, the error requires reversal. [2] "The denial of the right to have a significant issue determined by the jury is in itself a miscarriage of justice within the meaning of article VI [section 13] of the Constitution and requires reversal." (People v. Conley, supra, 64 Cal.2d at pp. 319-320; see also People v. Modesto, 59 Cal.2d 722, 730 [31 Cal.Rptr. 225, 382 P.2d 33].)
We turn to other claims of error which might arise on retrial.
Defendant charges error in the instructions on intoxication. In substance, the trial court gave both CALJIC 78 (Rev.) and CALJIC 319 (Rev.), both of which convey the idea expressed in the first sentence of Penal Code section 22: "No act committed by a person while in a state of voluntary intoxication is less criminal by reason of his having been in such condition." The Supreme Court has criticized such instructions where the crime charged (such as murder) involves specific intent. (People v. Ford, 60 Cal.2d 772, 796 [36 Cal.Rptr. 620, 388 P.2d 892]; People v. Spencer, 60 Cal.2d 64, 87 [31 Cal.Rptr. 782, 383 P.2d 134].) In Conley's trial the juxtaposition of these two instructions with those on diminished capacity could not but leave the jurors in a state of hopeless confusion. As pointed out in Spencer, 60 Cal.2d at page 87, jurors should not be called upon to perform the intricate analysis necessary to reconcile these instructions. *53
[3] When there is an issue of diminished capacity due to intoxication, an instruction in the language of Penal Code section 22 is not necessarily error. (People v. Sievers, 255 Cal.App.2d 34, 37 [62 Cal.Rptr. 841].) There is no need for such an instruction superimposed upon the Conley instruction framed by the Supreme Court. The basic notion of section 22--that intoxication does not exculpate but may affect specific intent--is suffused throughout the Conley instruction. A homicide case featured by a defense of diminished capacity attributable to a mixture of intoxication and mental disorder inevitably involves the jury in complex and subtly differentiated notions. If a trial judge can convey these notions to lay jurors in more simple terms than those articulated in footnote 4 of the Conley opinion, he is welcome to the attempt. If he cannot, he should give the Conley instruction with no more emendation than the evidence demands.
[4] The last paragraph of the Conley instruction, dealing with a type of involuntary manslaughter, will confront the judge retrying this case with a special problem. [fn. 1] That paragraph presupposes evidence of unconsciousness due to voluntary intoxication but not mental disorder or defect. (People v. Chapman, 261 Cal.App.2d 149, 173-174 [67 Cal.Rptr. 601] (hg. den.).) It describes a partial defense to the homicide charge. Unconsciousness due to mental disorder is a complete, not a partial, defense. (People v. Wilson, 66 Cal.2d 749, 761 [59 Cal.Rptr. 156, 427 P.2d 820]; People v. Baker, 42 Cal.2d 550, 575 [268 P.2d 705].) Where there is evidence of unconsciousness involving both voluntary intoxication and mental disorder, instructions on both theories are appropriate. (People v. Baker, supra, 42 Cal.2d at pp. 573-575) On retrial there may or may not be a claim of unconsciousness. That claim may or may not be premised on evidence of mental disorder as well as voluntary intoxication.
At this point the trial judge's problems become quite esoteric. He will face the task of fitting psychiatric testimony into instructions on several kinds of unconsciousness classified *54 by legal effect. [5] He must bear in mind that "an instruction that does not distinguish unconsciousness caused by voluntary intoxication from that induced by other causes is erroneous." (People v. Conley, supra, 64 Cal.2d at p. 324.) In addition to the sua sponte instruction on nonstatutory voluntary manslaughter, he encounters the alternatives of giving or withholding the involuntary manslaughter instruction embodied in the last paragraph of the Conley footnote, as well as the instruction on unconsciousness due to mental disorder. These latter alternatives involve both the judge's obligations and tactical choices for the defense. If the jury is about to be offered two kinds of voluntary manslaughter, the defendant may wish to eschew the additional option of involuntary manslaughter described in the last paragraph of the Conley instruction, preferring to rely on the theory of unconsciousness due to mental disorder. [fn. 2] On the other hand, by sua sponte omission of the last paragraph of the Conley instruction, the trial judge opens the record to attack on appeal. As this court pointed out in People v. Chapman, supra, 261 Cal.App.2d at pages 173-174, the circumstances of the trial may call for a defense request for the last paragraph of the Conley instruction and not force it upon the trial judge sua sponte. To the extent that the Supreme Court has not imposed sua sponte obligations, the judge retrying this case might well involve counsel in some of these alternatives.
[6] In two instructions the trial court told the jury, in effect, that insanity was not a question in the guilt trial and that it must assume the defendant's sanity. Although abstractly correct, these instructions shared the vice of the intoxication instructions, confounding the jury's task of considering diminished capacity. Such instructions should be avoided where the defense of diminished capacity due to mental disorder is presented to the jury. If they are given, it is incumbent upon the trial judge to preserve the integrity of the diminished capacity defense by a careful explanation of the relationship between the two concepts. [fn. 3] There is a virtue in salvaging such shreds of simplicity as may be available.
Defendant contends that the trial judge should have instructed the jury sua sponte on the relationship of the diminished capacity defense to the defense of legal insanity *55 by means of an instruction modeled upon that portion of the opinion in People v. Henderson, 60 Cal.2d 482, 490-491 [35 Cal.Rptr. 77, 386 P.2d 677], quoted in People v. Goedecke, 65 Cal.2d 850, 855 [56 Cal.Rptr. 625, 423 P.2d 777, 22 A.L.R.3d 1213]. [fn. 4] He urges such an instruction as a necessary feature of the bifurcated trial system. (See fn. 3.) He also argues inadequacy of the traditional concept of malice aforethought as embodied in the instructions. Again, he seeks an instruction dealing with diminished capacity caused by involuntary intoxication attributable to alcoholism, as contrasted with voluntary intoxication. [fn. 5]
Such contentions challenge this court with doctrinal demands not yet voiced by the California Supreme Court. This court is more concerned with the practical demands of this prolonged litigation. In People v. Conley, supra, the Supreme Court essayed a suggested instruction illustrating that court's concept of a rational communication to the jury. The judge retrying this case would be well advised to adopt the Supreme Court's suggestion without the doctrinal extensions now urged by defendant.
[7] Defendant charges error in the trial court's rejection of his request for CALJIC 303-A (New). [fn. 6] That instruction was evolved in response to People v. Wolff, supra, 61 Cal.2d at pages 821-822, which--by adding the element of mature and meaningful reflection--gave greater verbal precision to the concept of mental capacity to premeditate killing. The Wolff *56 formulation is now settled California law. (See People v. Nicolaus, 65 Cal.2d 866, 877-878 [56 Cal.Rptr. 635, 423 P.2d 787]; People v. Goedecke, supra, 65 Cal.2d at pp. 855-856.) It was justified by the evidence, and the trial court erred in rejecting it. (See People v. Stewart, 267 Cal.App.2d 366, 374 [73 Cal.Rptr. 484].) For the purpose of retrial, we point out that the suggested instruction in People v. Conley, supra, makes distinct provision for this or other appropriate instructions on deliberation and premeditation.
[8] The court did not err in giving the standard instruction on flight, since there was evidence permitting the inference that defendant left the scene of the shooting to avoid arrest. (See People v. Crawford, 259 Cal.App.2d 874, 879 [66 Cal.Rptr. 527].)
[9] The court gave the jury CALJIC 24 (Rev.) and CALJIC 26 (Rev.), dealing with circumstantial evidence. Contrary to defendant's claim, there is no inconsistency between these two instructions. (See People v. Goldstein, 139 Cal.App.2d 146, 151-152 [293 P.2d 495].) Although it was not error to give Number 26 before Number 24, it would have been preferable to reverse the order.
[10] There is no merit to defendant's claim that the last sentence of CALJIC 26 (Rev.) is inconsistent with the remainder of that instruction.
Defendant assails an instruction permitting the jury to consider his prior Oregon felony conviction. At his trial the court admitted the conviction over his objection that the record failed to show an intelligent waiver of counsel in Oregon. The trial court's action in overruling defendant's objections will be discussed infra. On retrial the court should consider the propriety of the jury instruction in the light of People v. Coffey, 67 Cal.2d 204, 218 [60 Cal.Rptr. 457, 430 P.2d 15].
Sufficiency of the Evidence
[11] Defendant seeks reversal with limiting directions to the trial court, on the theory that there is no substantial evidence of premeditation and mental capacity to premeditate.
Although the jury were not instructed in terms of the "mature and meaningful reflection" standard enunciated in Wolff, that standard applies as a matter of law. Hence evidentiary sufficiency must be measured by it. This is not a bizarre killing, explainable only in terms of psychotic impulses short of legal insanity. (Cf. People v. Bassett, 69 Cal.2d 122 [70 Cal.Rptr. 193, 443 P.2d 777]; People v. Wolff, supra,; People *57 v. Goedecke, supra; People v. Nicolaus, supra.) Reasonable jurors could attribute Conley's actions, however primitive, to a simple, understandable motive--he was bereaved by the loss of his paramour and decided that if he couldn't possess her, no one else would.
On the day of the crime he indulged in a series of actions indicative of preparations to kill. He traded his car for a rifle, bought ammunition, tested the weapon's sights. His words matched his actions, for he twice told persons that he planned to kill the McCools. Although his heavy drinking in the days preceding the killing could be ascribed to other impulses, it was also consistent with an effort to generate courage for the fateful act. Four psychiatrists testified at the trial. All four testified to some degree of personality disorder and impaired judgment. One of these witnesses, Dr. Marshall Dunham, expressed the opinion that Conley had weighed the considerations for and against the killing, that he recognized and was willing to suffer the consequences of his act, that he did not act out of impulse. Other psychiatric testimony was weaker or contrary. Since appellate review stops with the ascertainment of substantial evidence to support the verdict, the inconsistent psychiatric testimony need not be described. From the circumstantial evidence supplied by Conley's acts and statements preceding the shooting and from the opinion evidence of Dr. Dunham, reasonable fact triers could find that defendant had the capacity to kill and did in fact kill, as a consequence of mature and meaningful reflection and premeditation. The first degree murder verdict was supported by substantial evidence.
Impeachment by Prior Felony Conviction
Defendant contends that the trial court erred in overruling an objection to his impeachment by evidence of a prior felony conviction in Oregon. The objection was based upon the ground that the Oregon judgment showed a waiver of counsel and plea of guilty, but contained no entries showing that the accused had been informed of his right to counsel and had intelligently waived it.
[12] Decisions following Conley's last trial now demonstrate that a witness may not be impeached by evidence of a conviction obtained through the denial of his constitutional right to counsel. (People v. Coffey, supra, 67 Cal.2d 204, 218.)proceeding upon the thesis that "presuming waiver from a silent record is impermissible," Burgett v. Texas, 389 U.S. 109 [19 L.Ed.2d 319, 88 S.Ct. 258], holds that a judgment *58 reflecting the accused's appearance without counsel raises a presumption of unconstitutional denial of counsel. Where the Burgett rule applies, the prosecution must apparently go forward with proof of waiver as a constitutional foundation for evidence of the judgment. As beneficiary of the presumption, the defendant may apparently utilize the Burgett doctrine to remain silent, even though he was the only person in the courtroom who actually participated in the earlier proceeding. In this case the Oregon judgment was not completely silent. It recited a waiver of counsel, but not an intelligent and knowing one. Hence the present case poses the question whether the defendant may remain silent when the question is not one of waiver, but of its intelligent and knowing character.
It is often said that in order to establish a waiver of counsel, the record must indicate that the defendant was advised of his right to counsel and to remain silent or that he knew of his rights and intelligently and knowingly waived them. (People v. Harris, 67 Cal.2d 866, 869 [64 Cal.Rptr. 313, 434 P.2d 609]; In re Smiley, 66 Cal.2d 606, 614-615 [58 Cal.Rptr. 579, 427 P.2d 179].) Such pronouncements reflect a set of realistic expectations when the record of oral proceedings upon arraignment and sentence is before the court. To impeach a defendant by evidence of a prior felony conviction, the prosecution need produce only a certified copy of the judgment, not a record of the antecedent courtroom activities. (Evid. Code, 788; Witkin, Cal. Evidence (2d ed. 1966) 1247, p. 1150.) A judgment, after all, is only a judgment, not a chronicle of the preceding courtroom events. Although not without hesitation, it may be suggested that Burgett does not permit the defendant to sit in silence in the face of a judgment reciting waiver of counsel; that, as a personal participant in the prior proceeding, he has the burden of going forward with evidence or an offer to prove the waiver's falsity or inadequacy; that only in the face of such evidence, must the prosecution fortify the judgment with proof of the waiver's adequacy. So to hold would rest on the assumption that Burgett does not jettison California case law requiring a defendant who challenges his prior conviction to supply clear allegations of nonrepresentation or nonwaiver. (People v. Coffey, supra, 67 Cal.2d at p. 215; People v. Merriam, 66 Cal.2d 390, 397 [58 Cal.Rptr. 1, 426 P.2d 161]; see also People v. Pineda, 253 Cal.App.2d 443, 479 [62 Cal.Rptr. 144].)
If our thesis is correct, defendant Conley failed to establish *59 the necessary foundation for the constitutional challenge by failing to testify or offer to prove the waiver's falsity or inadequacy. [13] For the purpose of retrial, it is enough to suggest that Burgett v. Texas beclouds admissibility of the Oregon judgment unless it is preceded by extrinsic evidence of an intelligent and knowing waiver.
Other Claims of Error
Defendant raises an evidentiary objection to photographs of his victim's bodies, a claim made on his first appeal, rejected there and rejected here. (People v. Conley, supra, 64 Cal.2d at p. 326.)
[14] There is substance to a claim that the prosecutor indulged in improper cross-examination in asking whether Conley had ever used a switch on one of Mrs. McCool's children. Unless opened by direct examination, this line of inquiry should be avoided at the retrial. (Evid. Code, 773.)
[15] Dr. Dunham, one of the psychiatric witnesses, had interviewed Conley after the killing, had examined numerous documents and had testified at the earlier trials. Among the papers he saw was a written statement of the accused which the court excluded as the possible product of an inadmissible extrajudicial admission. Defendant now urges that Dr. Dunham's psychiatric opinion was based "in significant part" on the inadmissible writing, hence should have been excluded.
There are two reasons for rejecting the contention. First is the general rule permitting an expert to express an opinion based upon information not itself in evidence. (Evid. Code, 801, subd. (b); People v. Chapman, supra, 261 Cal.App.2d at p. 178.) Second, even if the general rule is qualified by constitutional restrictions implicit in the "fruit of the poisonous tree" doctrine, the document in question was only cumulative of other data before Dr. Dunham indicating Conley's preparations for the killing.
He assigns error in the rejection of his challenge to the jury panel, made on the ground that selection from voters' lists resulted in the exclusion of minorities and poor persons. He claims no minority status for himself. [16] Although a person outside the excluded class may conceivably have standing to challenge the systematic exclusion of that class, his conviction by a nonrepresentative jury is not a ground for reversal. (Fay v. New York, 332 U.S. 261, 287 [91 L.Ed. 2043, 2059, 67 S.Ct. 1613]; People v. White, 43 Cal.2d 740, 753 [278 P.2d 9]; see 78 Harv.L.Rev. 667.) [17] At any rate, the *60 challenge for racial, ethnic and economic discrimination was carefully investigated by the trial court and testimony taken from witnesses. The trial court found no systematic exclusion of racial or ethnic minorities; found that the panel, considered in relation to the county's relatively narrow socio-economic range, included adequate representation of wage earners as well as persons on welfare. In effect, the trial court found no factual basis for the challenge. (See People v. Carter, 56 Cal.2d 549, 569 [15 Cal.Rptr. 645, 364 P.2d 477].) This court's review of the record reveals ample justification for that finding.
[18] The defense requested that representatives of the news media be excluded from the courtroom whenever legal arguments were occurring outside the jury's presence. The trial court ruled that it could not constitutionally exclude the press, but would direct the jurors to avoid all extrajudicial information touching the case. California law vests trial courts with a narrow discretion to close limited phases of a criminal trial to the public. (People v. Cash, 52 Cal.2d 841, 846 [345 P.2d 462]; Kirstowsky v. Superior Court, 143 Cal.App.2d 745 [300 P.2d 163].) In effect, the trial court refused to exercise its discretion. While technically incorrect, the court's refusal was not prejudicial. There is no claim that extrajudicial information reached any of the jurors.
[19] No error occurred when the trial court permitted the prosecution, during the impanelment of jurors, to comment without emphasis on the fact that the death penalty was not in issue. (See People v. Borja, 122 Cal.App. 646, 648 [10 P.2d 477].)
Other assignments of error arise from events which will not or need not characterize defendant's retrial.
Judgment reversed.
Pierce, P. J., and Regan, J., concurred.
NOTES
[fn. 1] 1. The last paragraph of the Supreme Court's Conley instruction appears in the footnote on page 326 of 64 Cal.2d and reads: "Thus, if you find that the defendant killed while unconscious as a result of voluntary intoxication and was therefore unable to formulate a specific intent to kill or to harbor malice, his killing is involuntary manslaughter. The law does not permit him to use his own vice as a shelter against the normal legal consequences of his act. An ordinary and prudent man would not, while in possession of a dangerous weapon, permit himself to reach such a state of intoxication as to be unconscious of his actions."
[fn. 2] 2. Voluntary and involuntary manslaughter call for the same sentence, a maximum of 15 years. (Pen. Code, 193.)
[fn. 3] 3. See People v. McDowell, 69 Cal.2d 737, 747 [73 Cal.Rptr. 1, 447 P.2d 97].
[fn. 4] 4. That part of the Henderson opinion declares: "It can no longer be doubted that the defense of mental illness not amounting to legal insanity is a 'significant issue' in any case in which it is raised by substantial evidence. Its purpose and effect are to ameliorate the law governing criminal responsibility prescribed by the M'Naughton rule. ... Under that rule a defendant is not insane in the eyes of the law if at the time of the crime he knew what he was doing and that it was wrong. ... [E]ven though a defendant be legally sane according to the M'Naughton test, if he was suffering from a mental illness that prevented his acting with malice aforethought or with premeditation and deliberation, he cannot be convicted of murder of the first degree. This policy is now firmly established in the law of California [citations] ...."
[fn. 5] 5. Compare Powell v. Texas, 392 U.S. 514 [20 L.Ed.2d 1254, 88 S.Ct. 2145]; see also, comment in People v. Wolff, 61 Cal.2d 795, 814 [40 Cal.Rptr. 271, 394 P.2d 959], dealing with the somewhat analogous problem of "irresistible impulse" in California law.
[fn. 6] 6. CALJIC 303-A (New) declares: "Before you may find the defendant guilty of wilful, deliberate and premeditated murder of the first degree, you must determine that at the time the crime allegedly was committed he not only had sufficient mental capacity to form the specific intent to kill but also had sufficient mental capacity to maturely and meaningfully deliberate, premeditate and reflect upon the gravity of his contemplated act and to harbor malice aforethought."
|
{
"pile_set_name": "FreeLaw"
}
|
# qt components used (also by qglviewer): Core Gui Xml OpenGL Widgets
include_directories(${CSPARSE_INCLUDE_DIR}
${QGLVIEWER_INCLUDE_DIR}
${Qt5Core_INCLUDE_DIRS}
${Qt5Gui_INCLUDE_DIRS}
${Qt5Xml_INCLUDE_DIRS}
${Qt5Widgets_INCLUDE_DIRS}
${Qt5OpenGL_INCLUDE_DIRS}
${CMAKE_BINARY_DIR} ${CMAKE_CURRENT_BINARY_DIR} ${CMAKE_CURRENT_SOURCE_DIR}
)
QT5_WRAP_UI(UI_HEADERS base_main_window.ui)
QT5_WRAP_CPP(UI_SOURCES main_window.h)
add_executable(slam2d_g2o
main_window.cpp
slam2d_viewer.cpp
slam2d_viewer.h
slam2d_g2o.cpp
draw_helpers.cpp
${UI_HEADERS}
${UI_SOURCES}
)
set_target_properties(slam2d_g2o PROPERTIES OUTPUT_NAME slam2d_g2o${EXE_POSTFIX})
if(Qt5_POSITION_INDEPENDENT_CODE)
set_property(TARGET slam2d_g2o PROPERTY COMPILE_FLAGS -fPIC)
message(STATUS "Generating position indpendent code for slam2d because Qt5 was built with -reduce-relocations")
# Note: using
# set(CMAKE_POSITION_INDEPENDENT_CODE ON)
# does not seem to work: This generates some libraries with -fPIE which is not enough for Qt...
endif()
target_link_libraries(slam2d_g2o core solver_csparse types_slam2d
${QGLVIEWER_LIBRARY}
${Qt5Core_LIBRARIES}
${Qt5Gui_LIBRARIES}
${Qt5Xml_LIBRARIES}
${Qt5Widgets_LIBRARIES}
${Qt5OpenGL_LIBRARIES}
${OPENGL_gl_LIBRARY} ${OPENGL_glu_LIBRARY}
)
|
{
"pile_set_name": "Github"
}
|
Macedonia, Serbia to build alternative aircraft landing sites
Helicopter landing sites and water landing strips will improve safety and the economy.
By Ivana Jovanovic and Miki Trajkovski for Southeast European Times in Belgrade and Ohrid -- 04/03/14
A helipad atop a commercial building in Belgrade will become operational once the construction of the building is completed. [Nikola Barbutov/SETimes]
Serbia and Macedonia are constructing alternative aircraft landing strips to improve transportation of citizens in cases of accidents, natural and man-made disasters, as well as to develop tourism. Serbia's civil aviation directorate has asked 130 municipalities to register possible landing areas for helicopters, popularly called helipads.
Two of the 55 municipalities that responded, Knjazevac and Cajetina, already received construction permits.
There are nine helipads in Serbia owned by private companies but they do not lend them for others to use.
Civil aviation directorate officials said helipads offer multiple benefits and are inexpensive to build and operate compared to airport runways.
"Such landing platforms are ... especially needed in emergency situations when it is crucial to act quickly, as well as when access to some sites is possible only by helicopters. In such instances, it is very important to have registered, known places that are safe for take-off and landing," the directorate told SETimes in a statement.
The directorate said it covers the costs of helipad registration and ground control and also advises participating municipalities.
Serbia needs a modern, safe and reliable air traffic system that will satisfy the country's increasing transportation needs but also satisfy the EU's standards of ecological sustainability and financial responsibility, said Olja Cokorilo, an assistant professor at the Faculty of Transport and Traffic Engineering in Belgrade.
"Developing and establishing a network of helipads is of strategic importance for the development of air traffic for a number of reasons," Cokorilo told SETimes.
Cokorilo said one main reason to construct helipads in cities and tourist centres is to improve citizen safety and quality of life.
"[That includes] faster transport to hospitals, assistance in emergency situations such as evacuations and delivery of food, search and rescue, transport of human organs intended for transplantation, especially following road accidents, as well as surveillance of highways," she said.
Experts said alternative landing strips will provide greater mobility to better integrate regions in the Balkans.
Macedonia announced it wants to build a hydroport for aircraft on Lake Ohrid that will connect it with destinations that have water-landing capability in Croatia, Turkey, Greece and beyond.
"The Macedonian government will choose a private partner or concessionaire responsible to implement the project through awarding a concession or offering an agreement for a public-private partnership," the Macedonia ministry of transport and communications said.
Having a hydroport is important for developing tourism, especially with EU countries like Germany, where surface coal digs were turned into water landing sites, said Donco Taneski, president of the Hotel Association of Macedonia.
Taneski said the optimal approach will be to develop water-landing capability on all larger water surfaces in Macedonia.
Related Articles
Loading
"They do not take much space and there is no construction with solid materials," Taneski said.
Experts said accessibility is a key issue in cases of forest fires and other disasters frequently affecting the Balkans, where hydroports offer the added possibility to develop fire-fighting capability from the air.
"Certain areas in Ohrid are inaccessible and [the authorities] cannot act in case of fires," Saso Tockov, president of the Red Cross in Ohrid, told SETimes. "But constructing a hydroport requires a deeper analysis and specific regulation. Our institution, which also deals with water safety, will have a contribution."
What can the Balkan countries do to develop alternative landing sites? Share your opinion in the comments section.
We welcome your comments on SETimes's articles.
It is our hope that you will use this forum to interact with other readers across Southeast Europe. In order to keep this experience interesting, we ask you to follow the rules outlined in the comments policy. By submitting comments, you are consenting to these rules. While SETimes.com encourages discussion on all subjects, including sensitive ones, the comments posted are solely the views of those submitting them. SETimes.com does not necessarily endorse or agree with the ideas, views, or opinions voiced in these comments. SETimes.com welcomes constructive discussion but discourages the use of copy-pasted materials, unaccompanied links and one-line slogans. This is a moderated forum. Comments deemed abusive, offensive, or those containing profanity may not be published.
|
{
"pile_set_name": "Pile-CC"
}
|
//===-- ExecutionEngine.cpp - Common Implementation shared by EEs ---------===//
//
// The LLVM Compiler Infrastructure
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// This file defines the common interface used by the various execution engine
// subclasses.
//
//===----------------------------------------------------------------------===//
#include "llvm/ExecutionEngine/ExecutionEngine.h"
#include "llvm/ADT/STLExtras.h"
#include "llvm/ADT/SmallString.h"
#include "llvm/ADT/Statistic.h"
#include "llvm/ExecutionEngine/GenericValue.h"
#include "llvm/ExecutionEngine/JITEventListener.h"
#include "llvm/ExecutionEngine/RTDyldMemoryManager.h"
#include "llvm/IR/Constants.h"
#include "llvm/IR/DataLayout.h"
#include "llvm/IR/DerivedTypes.h"
#include "llvm/IR/Mangler.h"
#include "llvm/IR/Module.h"
#include "llvm/IR/Operator.h"
#include "llvm/IR/ValueHandle.h"
#include "llvm/Object/Archive.h"
#include "llvm/Object/ObjectFile.h"
#include "llvm/Support/Debug.h"
#include "llvm/Support/DynamicLibrary.h"
#include "llvm/Support/ErrorHandling.h"
#include "llvm/Support/Host.h"
#include "llvm/Support/MutexGuard.h"
#include "llvm/Support/TargetRegistry.h"
#include "llvm/Support/raw_ostream.h"
#include "llvm/Target/TargetMachine.h"
#include <cmath>
#include <cstring>
using namespace llvm;
#define DEBUG_TYPE "jit"
STATISTIC(NumInitBytes, "Number of bytes of global vars initialized");
STATISTIC(NumGlobals , "Number of global vars initialized");
ExecutionEngine *(*ExecutionEngine::MCJITCtor)(
std::unique_ptr<Module> M, std::string *ErrorStr,
std::shared_ptr<MCJITMemoryManager> MemMgr,
std::shared_ptr<RuntimeDyld::SymbolResolver> Resolver,
std::unique_ptr<TargetMachine> TM) = nullptr;
ExecutionEngine *(*ExecutionEngine::OrcMCJITReplacementCtor)(
std::string *ErrorStr, std::shared_ptr<MCJITMemoryManager> MemMgr,
std::shared_ptr<RuntimeDyld::SymbolResolver> Resolver,
std::unique_ptr<TargetMachine> TM) = nullptr;
ExecutionEngine *(*ExecutionEngine::InterpCtor)(std::unique_ptr<Module> M,
std::string *ErrorStr) =nullptr;
void JITEventListener::anchor() {}
void ExecutionEngine::Init(std::unique_ptr<Module> M) {
CompilingLazily = false;
GVCompilationDisabled = false;
SymbolSearchingDisabled = false;
// IR module verification is enabled by default in debug builds, and disabled
// by default in release builds.
#ifndef NDEBUG
VerifyModules = true;
#else
VerifyModules = false;
#endif
assert(M && "Module is null?");
Modules.push_back(std::move(M));
}
ExecutionEngine::ExecutionEngine(std::unique_ptr<Module> M)
: DL(M->getDataLayout()), LazyFunctionCreator(nullptr) {
Init(std::move(M));
}
ExecutionEngine::ExecutionEngine(DataLayout DL, std::unique_ptr<Module> M)
: DL(std::move(DL)), LazyFunctionCreator(nullptr) {
Init(std::move(M));
}
ExecutionEngine::~ExecutionEngine() {
clearAllGlobalMappings();
}
namespace {
/// \brief Helper class which uses a value handler to automatically deletes the
/// memory block when the GlobalVariable is destroyed.
class GVMemoryBlock final : public CallbackVH {
GVMemoryBlock(const GlobalVariable *GV)
: CallbackVH(const_cast<GlobalVariable*>(GV)) {}
public:
/// \brief Returns the address the GlobalVariable should be written into. The
/// GVMemoryBlock object prefixes that.
static char *Create(const GlobalVariable *GV, const DataLayout& TD) {
Type *ElTy = GV->getType()->getElementType();
size_t GVSize = (size_t)TD.getTypeAllocSize(ElTy);
void *RawMemory = ::operator new(
RoundUpToAlignment(sizeof(GVMemoryBlock),
TD.getPreferredAlignment(GV))
+ GVSize);
new(RawMemory) GVMemoryBlock(GV);
return static_cast<char*>(RawMemory) + sizeof(GVMemoryBlock);
}
void deleted() override {
// We allocated with operator new and with some extra memory hanging off the
// end, so don't just delete this. I'm not sure if this is actually
// required.
this->~GVMemoryBlock();
::operator delete(this);
}
};
} // anonymous namespace
char *ExecutionEngine::getMemoryForGV(const GlobalVariable *GV) {
return GVMemoryBlock::Create(GV, getDataLayout());
}
void ExecutionEngine::addObjectFile(std::unique_ptr<object::ObjectFile> O) {
llvm_unreachable("ExecutionEngine subclass doesn't implement addObjectFile.");
}
void
ExecutionEngine::addObjectFile(object::OwningBinary<object::ObjectFile> O) {
llvm_unreachable("ExecutionEngine subclass doesn't implement addObjectFile.");
}
void ExecutionEngine::addArchive(object::OwningBinary<object::Archive> A) {
llvm_unreachable("ExecutionEngine subclass doesn't implement addArchive.");
}
bool ExecutionEngine::removeModule(Module *M) {
for (auto I = Modules.begin(), E = Modules.end(); I != E; ++I) {
Module *Found = I->get();
if (Found == M) {
I->release();
Modules.erase(I);
clearGlobalMappingsFromModule(M);
return true;
}
}
return false;
}
Function *ExecutionEngine::FindFunctionNamed(const char *FnName) {
for (unsigned i = 0, e = Modules.size(); i != e; ++i) {
Function *F = Modules[i]->getFunction(FnName);
if (F && !F->isDeclaration())
return F;
}
return nullptr;
}
GlobalVariable *ExecutionEngine::FindGlobalVariableNamed(const char *Name, bool AllowInternal) {
for (unsigned i = 0, e = Modules.size(); i != e; ++i) {
GlobalVariable *GV = Modules[i]->getGlobalVariable(Name,AllowInternal);
if (GV && !GV->isDeclaration())
return GV;
}
return nullptr;
}
uint64_t ExecutionEngineState::RemoveMapping(StringRef Name) {
GlobalAddressMapTy::iterator I = GlobalAddressMap.find(Name);
uint64_t OldVal;
// FIXME: This is silly, we shouldn't end up with a mapping -> 0 in the
// GlobalAddressMap.
if (I == GlobalAddressMap.end())
OldVal = 0;
else {
GlobalAddressReverseMap.erase(I->second);
OldVal = I->second;
GlobalAddressMap.erase(I);
}
return OldVal;
}
std::string ExecutionEngine::getMangledName(const GlobalValue *GV) {
assert(GV->hasName() && "Global must have name.");
MutexGuard locked(lock);
SmallString<128> FullName;
const DataLayout &DL =
GV->getParent()->getDataLayout().isDefault()
? getDataLayout()
: GV->getParent()->getDataLayout();
Mangler::getNameWithPrefix(FullName, GV->getName(), DL);
return FullName.str();
}
void ExecutionEngine::addGlobalMapping(const GlobalValue *GV, void *Addr) {
MutexGuard locked(lock);
addGlobalMapping(getMangledName(GV), (uint64_t) Addr);
}
void ExecutionEngine::addGlobalMapping(StringRef Name, uint64_t Addr) {
MutexGuard locked(lock);
assert(!Name.empty() && "Empty GlobalMapping symbol name!");
DEBUG(dbgs() << "JIT: Map \'" << Name << "\' to [" << Addr << "]\n";);
uint64_t &CurVal = EEState.getGlobalAddressMap()[Name];
assert((!CurVal || !Addr) && "GlobalMapping already established!");
CurVal = Addr;
// If we are using the reverse mapping, add it too.
if (!EEState.getGlobalAddressReverseMap().empty()) {
std::string &V = EEState.getGlobalAddressReverseMap()[CurVal];
assert((!V.empty() || !Name.empty()) &&
"GlobalMapping already established!");
V = Name;
}
}
void ExecutionEngine::clearAllGlobalMappings() {
MutexGuard locked(lock);
EEState.getGlobalAddressMap().clear();
EEState.getGlobalAddressReverseMap().clear();
}
void ExecutionEngine::clearGlobalMappingsFromModule(Module *M) {
MutexGuard locked(lock);
for (Function &FI : *M)
EEState.RemoveMapping(getMangledName(&FI));
for (GlobalVariable &GI : M->globals())
EEState.RemoveMapping(getMangledName(&GI));
}
uint64_t ExecutionEngine::updateGlobalMapping(const GlobalValue *GV,
void *Addr) {
MutexGuard locked(lock);
return updateGlobalMapping(getMangledName(GV), (uint64_t) Addr);
}
uint64_t ExecutionEngine::updateGlobalMapping(StringRef Name, uint64_t Addr) {
MutexGuard locked(lock);
ExecutionEngineState::GlobalAddressMapTy &Map =
EEState.getGlobalAddressMap();
// Deleting from the mapping?
if (!Addr)
return EEState.RemoveMapping(Name);
uint64_t &CurVal = Map[Name];
uint64_t OldVal = CurVal;
if (CurVal && !EEState.getGlobalAddressReverseMap().empty())
EEState.getGlobalAddressReverseMap().erase(CurVal);
CurVal = Addr;
// If we are using the reverse mapping, add it too.
if (!EEState.getGlobalAddressReverseMap().empty()) {
std::string &V = EEState.getGlobalAddressReverseMap()[CurVal];
assert((!V.empty() || !Name.empty()) &&
"GlobalMapping already established!");
V = Name;
}
return OldVal;
}
uint64_t ExecutionEngine::getAddressToGlobalIfAvailable(StringRef S) {
MutexGuard locked(lock);
uint64_t Address = 0;
ExecutionEngineState::GlobalAddressMapTy::iterator I =
EEState.getGlobalAddressMap().find(S);
if (I != EEState.getGlobalAddressMap().end())
Address = I->second;
return Address;
}
void *ExecutionEngine::getPointerToGlobalIfAvailable(StringRef S) {
MutexGuard locked(lock);
if (void* Address = (void *) getAddressToGlobalIfAvailable(S))
return Address;
return nullptr;
}
void *ExecutionEngine::getPointerToGlobalIfAvailable(const GlobalValue *GV) {
MutexGuard locked(lock);
return getPointerToGlobalIfAvailable(getMangledName(GV));
}
const GlobalValue *ExecutionEngine::getGlobalValueAtAddress(void *Addr) {
MutexGuard locked(lock);
// If we haven't computed the reverse mapping yet, do so first.
if (EEState.getGlobalAddressReverseMap().empty()) {
for (ExecutionEngineState::GlobalAddressMapTy::iterator
I = EEState.getGlobalAddressMap().begin(),
E = EEState.getGlobalAddressMap().end(); I != E; ++I) {
StringRef Name = I->first();
uint64_t Addr = I->second;
EEState.getGlobalAddressReverseMap().insert(std::make_pair(
Addr, Name));
}
}
std::map<uint64_t, std::string>::iterator I =
EEState.getGlobalAddressReverseMap().find((uint64_t) Addr);
if (I != EEState.getGlobalAddressReverseMap().end()) {
StringRef Name = I->second;
for (unsigned i = 0, e = Modules.size(); i != e; ++i)
if (GlobalValue *GV = Modules[i]->getNamedValue(Name))
return GV;
}
return nullptr;
}
namespace {
class ArgvArray {
std::unique_ptr<char[]> Array;
std::vector<std::unique_ptr<char[]>> Values;
public:
/// Turn a vector of strings into a nice argv style array of pointers to null
/// terminated strings.
void *reset(LLVMContext &C, ExecutionEngine *EE,
const std::vector<std::string> &InputArgv);
};
} // anonymous namespace
void *ArgvArray::reset(LLVMContext &C, ExecutionEngine *EE,
const std::vector<std::string> &InputArgv) {
Values.clear(); // Free the old contents.
Values.reserve(InputArgv.size());
unsigned PtrSize = EE->getDataLayout().getPointerSize();
Array = make_unique<char[]>((InputArgv.size()+1)*PtrSize);
DEBUG(dbgs() << "JIT: ARGV = " << (void*)Array.get() << "\n");
Type *SBytePtr = Type::getInt8PtrTy(C);
for (unsigned i = 0; i != InputArgv.size(); ++i) {
unsigned Size = InputArgv[i].size()+1;
auto Dest = make_unique<char[]>(Size);
DEBUG(dbgs() << "JIT: ARGV[" << i << "] = " << (void*)Dest.get() << "\n");
std::copy(InputArgv[i].begin(), InputArgv[i].end(), Dest.get());
Dest[Size-1] = 0;
// Endian safe: Array[i] = (PointerTy)Dest;
EE->StoreValueToMemory(PTOGV(Dest.get()),
(GenericValue*)(&Array[i*PtrSize]), SBytePtr);
Values.push_back(std::move(Dest));
}
// Null terminate it
EE->StoreValueToMemory(PTOGV(nullptr),
(GenericValue*)(&Array[InputArgv.size()*PtrSize]),
SBytePtr);
return Array.get();
}
void ExecutionEngine::runStaticConstructorsDestructors(Module &module,
bool isDtors) {
const char *Name = isDtors ? "llvm.global_dtors" : "llvm.global_ctors";
GlobalVariable *GV = module.getNamedGlobal(Name);
// If this global has internal linkage, or if it has a use, then it must be
// an old-style (llvmgcc3) static ctor with __main linked in and in use. If
// this is the case, don't execute any of the global ctors, __main will do
// it.
if (!GV || GV->isDeclaration() || GV->hasLocalLinkage()) return;
// Should be an array of '{ i32, void ()* }' structs. The first value is
// the init priority, which we ignore.
ConstantArray *InitList = dyn_cast<ConstantArray>(GV->getInitializer());
if (!InitList)
return;
for (unsigned i = 0, e = InitList->getNumOperands(); i != e; ++i) {
ConstantStruct *CS = dyn_cast<ConstantStruct>(InitList->getOperand(i));
if (!CS) continue;
Constant *FP = CS->getOperand(1);
if (FP->isNullValue())
continue; // Found a sentinal value, ignore.
// Strip off constant expression casts.
if (ConstantExpr *CE = dyn_cast<ConstantExpr>(FP))
if (CE->isCast())
FP = CE->getOperand(0);
// Execute the ctor/dtor function!
if (Function *F = dyn_cast<Function>(FP))
runFunction(F, None);
// FIXME: It is marginally lame that we just do nothing here if we see an
// entry we don't recognize. It might not be unreasonable for the verifier
// to not even allow this and just assert here.
}
}
void ExecutionEngine::runStaticConstructorsDestructors(bool isDtors) {
// Execute global ctors/dtors for each module in the program.
for (std::unique_ptr<Module> &M : Modules)
runStaticConstructorsDestructors(*M, isDtors);
}
#ifndef NDEBUG
/// isTargetNullPtr - Return whether the target pointer stored at Loc is null.
static bool isTargetNullPtr(ExecutionEngine *EE, void *Loc) {
unsigned PtrSize = EE->getDataLayout().getPointerSize();
for (unsigned i = 0; i < PtrSize; ++i)
if (*(i + (uint8_t*)Loc))
return false;
return true;
}
#endif
int ExecutionEngine::runFunctionAsMain(Function *Fn,
const std::vector<std::string> &argv,
const char * const * envp) {
std::vector<GenericValue> GVArgs;
GenericValue GVArgc;
GVArgc.IntVal = APInt(32, argv.size());
// Check main() type
unsigned NumArgs = Fn->getFunctionType()->getNumParams();
FunctionType *FTy = Fn->getFunctionType();
Type* PPInt8Ty = Type::getInt8PtrTy(Fn->getContext())->getPointerTo();
// Check the argument types.
if (NumArgs > 3)
report_fatal_error("Invalid number of arguments of main() supplied");
if (NumArgs >= 3 && FTy->getParamType(2) != PPInt8Ty)
report_fatal_error("Invalid type for third argument of main() supplied");
if (NumArgs >= 2 && FTy->getParamType(1) != PPInt8Ty)
report_fatal_error("Invalid type for second argument of main() supplied");
if (NumArgs >= 1 && !FTy->getParamType(0)->isIntegerTy(32))
report_fatal_error("Invalid type for first argument of main() supplied");
if (!FTy->getReturnType()->isIntegerTy() &&
!FTy->getReturnType()->isVoidTy())
report_fatal_error("Invalid return type of main() supplied");
ArgvArray CArgv;
ArgvArray CEnv;
if (NumArgs) {
GVArgs.push_back(GVArgc); // Arg #0 = argc.
if (NumArgs > 1) {
// Arg #1 = argv.
GVArgs.push_back(PTOGV(CArgv.reset(Fn->getContext(), this, argv)));
assert(!isTargetNullPtr(this, GVTOP(GVArgs[1])) &&
"argv[0] was null after CreateArgv");
if (NumArgs > 2) {
std::vector<std::string> EnvVars;
for (unsigned i = 0; envp[i]; ++i)
EnvVars.emplace_back(envp[i]);
// Arg #2 = envp.
GVArgs.push_back(PTOGV(CEnv.reset(Fn->getContext(), this, EnvVars)));
}
}
}
return runFunction(Fn, GVArgs).IntVal.getZExtValue();
}
EngineBuilder::EngineBuilder() : EngineBuilder(nullptr) {}
EngineBuilder::EngineBuilder(std::unique_ptr<Module> M)
: M(std::move(M)), WhichEngine(EngineKind::Either), ErrorStr(nullptr),
OptLevel(CodeGenOpt::Default), MemMgr(nullptr), Resolver(nullptr),
RelocModel(Reloc::Default), CMModel(CodeModel::JITDefault),
UseOrcMCJITReplacement(false) {
// IR module verification is enabled by default in debug builds, and disabled
// by default in release builds.
#ifndef NDEBUG
VerifyModules = true;
#else
VerifyModules = false;
#endif
}
EngineBuilder::~EngineBuilder() = default;
EngineBuilder &EngineBuilder::setMCJITMemoryManager(
std::unique_ptr<RTDyldMemoryManager> mcjmm) {
auto SharedMM = std::shared_ptr<RTDyldMemoryManager>(std::move(mcjmm));
MemMgr = SharedMM;
Resolver = SharedMM;
return *this;
}
EngineBuilder&
EngineBuilder::setMemoryManager(std::unique_ptr<MCJITMemoryManager> MM) {
MemMgr = std::shared_ptr<MCJITMemoryManager>(std::move(MM));
return *this;
}
EngineBuilder&
EngineBuilder::setSymbolResolver(std::unique_ptr<RuntimeDyld::SymbolResolver> SR) {
Resolver = std::shared_ptr<RuntimeDyld::SymbolResolver>(std::move(SR));
return *this;
}
ExecutionEngine *EngineBuilder::create(TargetMachine *TM) {
std::unique_ptr<TargetMachine> TheTM(TM); // Take ownership.
// Make sure we can resolve symbols in the program as well. The zero arg
// to the function tells DynamicLibrary to load the program, not a library.
if (sys::DynamicLibrary::LoadLibraryPermanently(nullptr, ErrorStr))
return nullptr;
// If the user specified a memory manager but didn't specify which engine to
// create, we assume they only want the JIT, and we fail if they only want
// the interpreter.
if (MemMgr) {
if (WhichEngine & EngineKind::JIT)
WhichEngine = EngineKind::JIT;
else {
if (ErrorStr)
*ErrorStr = "Cannot create an interpreter with a memory manager.";
return nullptr;
}
}
// Unless the interpreter was explicitly selected or the JIT is not linked,
// try making a JIT.
if ((WhichEngine & EngineKind::JIT) && TheTM) {
Triple TT(M->getTargetTriple());
if (!TM->getTarget().hasJIT()) {
errs() << "WARNING: This target JIT is not designed for the host"
<< " you are running. If bad things happen, please choose"
<< " a different -march switch.\n";
}
ExecutionEngine *EE = nullptr;
if (ExecutionEngine::OrcMCJITReplacementCtor && UseOrcMCJITReplacement) {
EE = ExecutionEngine::OrcMCJITReplacementCtor(ErrorStr, std::move(MemMgr),
std::move(Resolver),
std::move(TheTM));
EE->addModule(std::move(M));
} else if (ExecutionEngine::MCJITCtor)
EE = ExecutionEngine::MCJITCtor(std::move(M), ErrorStr, std::move(MemMgr),
std::move(Resolver), std::move(TheTM));
if (EE) {
EE->setVerifyModules(VerifyModules);
return EE;
}
}
// If we can't make a JIT and we didn't request one specifically, try making
// an interpreter instead.
if (WhichEngine & EngineKind::Interpreter) {
if (ExecutionEngine::InterpCtor)
return ExecutionEngine::InterpCtor(std::move(M), ErrorStr);
if (ErrorStr)
*ErrorStr = "Interpreter has not been linked in.";
return nullptr;
}
if ((WhichEngine & EngineKind::JIT) && !ExecutionEngine::MCJITCtor) {
if (ErrorStr)
*ErrorStr = "JIT has not been linked in.";
}
return nullptr;
}
void *ExecutionEngine::getPointerToGlobal(const GlobalValue *GV) {
if (Function *F = const_cast<Function*>(dyn_cast<Function>(GV)))
return getPointerToFunction(F);
MutexGuard locked(lock);
if (void* P = getPointerToGlobalIfAvailable(GV))
return P;
// Global variable might have been added since interpreter started.
if (GlobalVariable *GVar =
const_cast<GlobalVariable *>(dyn_cast<GlobalVariable>(GV)))
EmitGlobalVariable(GVar);
else
llvm_unreachable("Global hasn't had an address allocated yet!");
return getPointerToGlobalIfAvailable(GV);
}
/// \brief Converts a Constant* into a GenericValue, including handling of
/// ConstantExpr values.
GenericValue ExecutionEngine::getConstantValue(const Constant *C) {
// If its undefined, return the garbage.
if (isa<UndefValue>(C)) {
GenericValue Result;
switch (C->getType()->getTypeID()) {
default:
break;
case Type::IntegerTyID:
case Type::X86_FP80TyID:
case Type::FP128TyID:
case Type::PPC_FP128TyID:
// Although the value is undefined, we still have to construct an APInt
// with the correct bit width.
Result.IntVal = APInt(C->getType()->getPrimitiveSizeInBits(), 0);
break;
case Type::StructTyID: {
// if the whole struct is 'undef' just reserve memory for the value.
if(StructType *STy = dyn_cast<StructType>(C->getType())) {
unsigned int elemNum = STy->getNumElements();
Result.AggregateVal.resize(elemNum);
for (unsigned int i = 0; i < elemNum; ++i) {
Type *ElemTy = STy->getElementType(i);
if (ElemTy->isIntegerTy())
Result.AggregateVal[i].IntVal =
APInt(ElemTy->getPrimitiveSizeInBits(), 0);
else if (ElemTy->isAggregateType()) {
const Constant *ElemUndef = UndefValue::get(ElemTy);
Result.AggregateVal[i] = getConstantValue(ElemUndef);
}
}
}
}
break;
case Type::VectorTyID:
// if the whole vector is 'undef' just reserve memory for the value.
auto* VTy = dyn_cast<VectorType>(C->getType());
Type *ElemTy = VTy->getElementType();
unsigned int elemNum = VTy->getNumElements();
Result.AggregateVal.resize(elemNum);
if (ElemTy->isIntegerTy())
for (unsigned int i = 0; i < elemNum; ++i)
Result.AggregateVal[i].IntVal =
APInt(ElemTy->getPrimitiveSizeInBits(), 0);
break;
}
return Result;
}
// Otherwise, if the value is a ConstantExpr...
if (const ConstantExpr *CE = dyn_cast<ConstantExpr>(C)) {
Constant *Op0 = CE->getOperand(0);
switch (CE->getOpcode()) {
case Instruction::GetElementPtr: {
// Compute the index
GenericValue Result = getConstantValue(Op0);
APInt Offset(DL.getPointerSizeInBits(), 0);
cast<GEPOperator>(CE)->accumulateConstantOffset(DL, Offset);
char* tmp = (char*) Result.PointerVal;
Result = PTOGV(tmp + Offset.getSExtValue());
return Result;
}
case Instruction::Trunc: {
GenericValue GV = getConstantValue(Op0);
uint32_t BitWidth = cast<IntegerType>(CE->getType())->getBitWidth();
GV.IntVal = GV.IntVal.trunc(BitWidth);
return GV;
}
case Instruction::ZExt: {
GenericValue GV = getConstantValue(Op0);
uint32_t BitWidth = cast<IntegerType>(CE->getType())->getBitWidth();
GV.IntVal = GV.IntVal.zext(BitWidth);
return GV;
}
case Instruction::SExt: {
GenericValue GV = getConstantValue(Op0);
uint32_t BitWidth = cast<IntegerType>(CE->getType())->getBitWidth();
GV.IntVal = GV.IntVal.sext(BitWidth);
return GV;
}
case Instruction::FPTrunc: {
// FIXME long double
GenericValue GV = getConstantValue(Op0);
GV.FloatVal = float(GV.DoubleVal);
return GV;
}
case Instruction::FPExt:{
// FIXME long double
GenericValue GV = getConstantValue(Op0);
GV.DoubleVal = double(GV.FloatVal);
return GV;
}
case Instruction::UIToFP: {
GenericValue GV = getConstantValue(Op0);
if (CE->getType()->isFloatTy())
GV.FloatVal = float(GV.IntVal.roundToDouble());
else if (CE->getType()->isDoubleTy())
GV.DoubleVal = GV.IntVal.roundToDouble();
else if (CE->getType()->isX86_FP80Ty()) {
APFloat apf = APFloat::getZero(APFloat::x87DoubleExtended);
(void)apf.convertFromAPInt(GV.IntVal,
false,
APFloat::rmNearestTiesToEven);
GV.IntVal = apf.bitcastToAPInt();
}
return GV;
}
case Instruction::SIToFP: {
GenericValue GV = getConstantValue(Op0);
if (CE->getType()->isFloatTy())
GV.FloatVal = float(GV.IntVal.signedRoundToDouble());
else if (CE->getType()->isDoubleTy())
GV.DoubleVal = GV.IntVal.signedRoundToDouble();
else if (CE->getType()->isX86_FP80Ty()) {
APFloat apf = APFloat::getZero(APFloat::x87DoubleExtended);
(void)apf.convertFromAPInt(GV.IntVal,
true,
APFloat::rmNearestTiesToEven);
GV.IntVal = apf.bitcastToAPInt();
}
return GV;
}
case Instruction::FPToUI: // double->APInt conversion handles sign
case Instruction::FPToSI: {
GenericValue GV = getConstantValue(Op0);
uint32_t BitWidth = cast<IntegerType>(CE->getType())->getBitWidth();
if (Op0->getType()->isFloatTy())
GV.IntVal = APIntOps::RoundFloatToAPInt(GV.FloatVal, BitWidth);
else if (Op0->getType()->isDoubleTy())
GV.IntVal = APIntOps::RoundDoubleToAPInt(GV.DoubleVal, BitWidth);
else if (Op0->getType()->isX86_FP80Ty()) {
APFloat apf = APFloat(APFloat::x87DoubleExtended, GV.IntVal);
uint64_t v;
bool ignored;
(void)apf.convertToInteger(&v, BitWidth,
CE->getOpcode()==Instruction::FPToSI,
APFloat::rmTowardZero, &ignored);
GV.IntVal = v; // endian?
}
return GV;
}
case Instruction::PtrToInt: {
GenericValue GV = getConstantValue(Op0);
uint32_t PtrWidth = DL.getTypeSizeInBits(Op0->getType());
assert(PtrWidth <= 64 && "Bad pointer width");
GV.IntVal = APInt(PtrWidth, uintptr_t(GV.PointerVal));
uint32_t IntWidth = DL.getTypeSizeInBits(CE->getType());
GV.IntVal = GV.IntVal.zextOrTrunc(IntWidth);
return GV;
}
case Instruction::IntToPtr: {
GenericValue GV = getConstantValue(Op0);
uint32_t PtrWidth = DL.getTypeSizeInBits(CE->getType());
GV.IntVal = GV.IntVal.zextOrTrunc(PtrWidth);
assert(GV.IntVal.getBitWidth() <= 64 && "Bad pointer width");
GV.PointerVal = PointerTy(uintptr_t(GV.IntVal.getZExtValue()));
return GV;
}
case Instruction::BitCast: {
GenericValue GV = getConstantValue(Op0);
Type* DestTy = CE->getType();
switch (Op0->getType()->getTypeID()) {
default: llvm_unreachable("Invalid bitcast operand");
case Type::IntegerTyID:
assert(DestTy->isFloatingPointTy() && "invalid bitcast");
if (DestTy->isFloatTy())
GV.FloatVal = GV.IntVal.bitsToFloat();
else if (DestTy->isDoubleTy())
GV.DoubleVal = GV.IntVal.bitsToDouble();
break;
case Type::FloatTyID:
assert(DestTy->isIntegerTy(32) && "Invalid bitcast");
GV.IntVal = APInt::floatToBits(GV.FloatVal);
break;
case Type::DoubleTyID:
assert(DestTy->isIntegerTy(64) && "Invalid bitcast");
GV.IntVal = APInt::doubleToBits(GV.DoubleVal);
break;
case Type::PointerTyID:
assert(DestTy->isPointerTy() && "Invalid bitcast");
break; // getConstantValue(Op0) above already converted it
}
return GV;
}
case Instruction::Add:
case Instruction::FAdd:
case Instruction::Sub:
case Instruction::FSub:
case Instruction::Mul:
case Instruction::FMul:
case Instruction::UDiv:
case Instruction::SDiv:
case Instruction::URem:
case Instruction::SRem:
case Instruction::And:
case Instruction::Or:
case Instruction::Xor: {
GenericValue LHS = getConstantValue(Op0);
GenericValue RHS = getConstantValue(CE->getOperand(1));
GenericValue GV;
switch (CE->getOperand(0)->getType()->getTypeID()) {
default: llvm_unreachable("Bad add type!");
case Type::IntegerTyID:
switch (CE->getOpcode()) {
default: llvm_unreachable("Invalid integer opcode");
case Instruction::Add: GV.IntVal = LHS.IntVal + RHS.IntVal; break;
case Instruction::Sub: GV.IntVal = LHS.IntVal - RHS.IntVal; break;
case Instruction::Mul: GV.IntVal = LHS.IntVal * RHS.IntVal; break;
case Instruction::UDiv:GV.IntVal = LHS.IntVal.udiv(RHS.IntVal); break;
case Instruction::SDiv:GV.IntVal = LHS.IntVal.sdiv(RHS.IntVal); break;
case Instruction::URem:GV.IntVal = LHS.IntVal.urem(RHS.IntVal); break;
case Instruction::SRem:GV.IntVal = LHS.IntVal.srem(RHS.IntVal); break;
case Instruction::And: GV.IntVal = LHS.IntVal & RHS.IntVal; break;
case Instruction::Or: GV.IntVal = LHS.IntVal | RHS.IntVal; break;
case Instruction::Xor: GV.IntVal = LHS.IntVal ^ RHS.IntVal; break;
}
break;
case Type::FloatTyID:
switch (CE->getOpcode()) {
default: llvm_unreachable("Invalid float opcode");
case Instruction::FAdd:
GV.FloatVal = LHS.FloatVal + RHS.FloatVal; break;
case Instruction::FSub:
GV.FloatVal = LHS.FloatVal - RHS.FloatVal; break;
case Instruction::FMul:
GV.FloatVal = LHS.FloatVal * RHS.FloatVal; break;
case Instruction::FDiv:
GV.FloatVal = LHS.FloatVal / RHS.FloatVal; break;
case Instruction::FRem:
GV.FloatVal = std::fmod(LHS.FloatVal,RHS.FloatVal); break;
}
break;
case Type::DoubleTyID:
switch (CE->getOpcode()) {
default: llvm_unreachable("Invalid double opcode");
case Instruction::FAdd:
GV.DoubleVal = LHS.DoubleVal + RHS.DoubleVal; break;
case Instruction::FSub:
GV.DoubleVal = LHS.DoubleVal - RHS.DoubleVal; break;
case Instruction::FMul:
GV.DoubleVal = LHS.DoubleVal * RHS.DoubleVal; break;
case Instruction::FDiv:
GV.DoubleVal = LHS.DoubleVal / RHS.DoubleVal; break;
case Instruction::FRem:
GV.DoubleVal = std::fmod(LHS.DoubleVal,RHS.DoubleVal); break;
}
break;
case Type::X86_FP80TyID:
case Type::PPC_FP128TyID:
case Type::FP128TyID: {
const fltSemantics &Sem = CE->getOperand(0)->getType()->getFltSemantics();
APFloat apfLHS = APFloat(Sem, LHS.IntVal);
switch (CE->getOpcode()) {
default: llvm_unreachable("Invalid long double opcode");
case Instruction::FAdd:
apfLHS.add(APFloat(Sem, RHS.IntVal), APFloat::rmNearestTiesToEven);
GV.IntVal = apfLHS.bitcastToAPInt();
break;
case Instruction::FSub:
apfLHS.subtract(APFloat(Sem, RHS.IntVal),
APFloat::rmNearestTiesToEven);
GV.IntVal = apfLHS.bitcastToAPInt();
break;
case Instruction::FMul:
apfLHS.multiply(APFloat(Sem, RHS.IntVal),
APFloat::rmNearestTiesToEven);
GV.IntVal = apfLHS.bitcastToAPInt();
break;
case Instruction::FDiv:
apfLHS.divide(APFloat(Sem, RHS.IntVal),
APFloat::rmNearestTiesToEven);
GV.IntVal = apfLHS.bitcastToAPInt();
break;
case Instruction::FRem:
apfLHS.mod(APFloat(Sem, RHS.IntVal));
GV.IntVal = apfLHS.bitcastToAPInt();
break;
}
}
break;
}
return GV;
}
default:
break;
}
SmallString<256> Msg;
raw_svector_ostream OS(Msg);
OS << "ConstantExpr not handled: " << *CE;
report_fatal_error(OS.str());
}
// Otherwise, we have a simple constant.
GenericValue Result;
switch (C->getType()->getTypeID()) {
case Type::FloatTyID:
Result.FloatVal = cast<ConstantFP>(C)->getValueAPF().convertToFloat();
break;
case Type::DoubleTyID:
Result.DoubleVal = cast<ConstantFP>(C)->getValueAPF().convertToDouble();
break;
case Type::X86_FP80TyID:
case Type::FP128TyID:
case Type::PPC_FP128TyID:
Result.IntVal = cast <ConstantFP>(C)->getValueAPF().bitcastToAPInt();
break;
case Type::IntegerTyID:
Result.IntVal = cast<ConstantInt>(C)->getValue();
break;
case Type::PointerTyID:
if (isa<ConstantPointerNull>(C))
Result.PointerVal = nullptr;
else if (const Function *F = dyn_cast<Function>(C))
Result = PTOGV(getPointerToFunctionOrStub(const_cast<Function*>(F)));
else if (const GlobalVariable *GV = dyn_cast<GlobalVariable>(C))
Result = PTOGV(getOrEmitGlobalVariable(const_cast<GlobalVariable*>(GV)));
else
llvm_unreachable("Unknown constant pointer type!");
break;
case Type::VectorTyID: {
unsigned elemNum;
Type* ElemTy;
const ConstantDataVector *CDV = dyn_cast<ConstantDataVector>(C);
const ConstantVector *CV = dyn_cast<ConstantVector>(C);
const ConstantAggregateZero *CAZ = dyn_cast<ConstantAggregateZero>(C);
if (CDV) {
elemNum = CDV->getNumElements();
ElemTy = CDV->getElementType();
} else if (CV || CAZ) {
VectorType* VTy = dyn_cast<VectorType>(C->getType());
elemNum = VTy->getNumElements();
ElemTy = VTy->getElementType();
} else {
llvm_unreachable("Unknown constant vector type!");
}
Result.AggregateVal.resize(elemNum);
// Check if vector holds floats.
if(ElemTy->isFloatTy()) {
if (CAZ) {
GenericValue floatZero;
floatZero.FloatVal = 0.f;
std::fill(Result.AggregateVal.begin(), Result.AggregateVal.end(),
floatZero);
break;
}
if(CV) {
for (unsigned i = 0; i < elemNum; ++i)
if (!isa<UndefValue>(CV->getOperand(i)))
Result.AggregateVal[i].FloatVal = cast<ConstantFP>(
CV->getOperand(i))->getValueAPF().convertToFloat();
break;
}
if(CDV)
for (unsigned i = 0; i < elemNum; ++i)
Result.AggregateVal[i].FloatVal = CDV->getElementAsFloat(i);
break;
}
// Check if vector holds doubles.
if (ElemTy->isDoubleTy()) {
if (CAZ) {
GenericValue doubleZero;
doubleZero.DoubleVal = 0.0;
std::fill(Result.AggregateVal.begin(), Result.AggregateVal.end(),
doubleZero);
break;
}
if(CV) {
for (unsigned i = 0; i < elemNum; ++i)
if (!isa<UndefValue>(CV->getOperand(i)))
Result.AggregateVal[i].DoubleVal = cast<ConstantFP>(
CV->getOperand(i))->getValueAPF().convertToDouble();
break;
}
if(CDV)
for (unsigned i = 0; i < elemNum; ++i)
Result.AggregateVal[i].DoubleVal = CDV->getElementAsDouble(i);
break;
}
// Check if vector holds integers.
if (ElemTy->isIntegerTy()) {
if (CAZ) {
GenericValue intZero;
intZero.IntVal = APInt(ElemTy->getScalarSizeInBits(), 0ull);
std::fill(Result.AggregateVal.begin(), Result.AggregateVal.end(),
intZero);
break;
}
if(CV) {
for (unsigned i = 0; i < elemNum; ++i)
if (!isa<UndefValue>(CV->getOperand(i)))
Result.AggregateVal[i].IntVal = cast<ConstantInt>(
CV->getOperand(i))->getValue();
else {
Result.AggregateVal[i].IntVal =
APInt(CV->getOperand(i)->getType()->getPrimitiveSizeInBits(), 0);
}
break;
}
if(CDV)
for (unsigned i = 0; i < elemNum; ++i)
Result.AggregateVal[i].IntVal = APInt(
CDV->getElementType()->getPrimitiveSizeInBits(),
CDV->getElementAsInteger(i));
break;
}
llvm_unreachable("Unknown constant pointer type!");
}
break;
default:
SmallString<256> Msg;
raw_svector_ostream OS(Msg);
OS << "ERROR: Constant unimplemented for type: " << *C->getType();
report_fatal_error(OS.str());
}
return Result;
}
/// StoreIntToMemory - Fills the StoreBytes bytes of memory starting from Dst
/// with the integer held in IntVal.
static void StoreIntToMemory(const APInt &IntVal, uint8_t *Dst,
unsigned StoreBytes) {
assert((IntVal.getBitWidth()+7)/8 >= StoreBytes && "Integer too small!");
const uint8_t *Src = (const uint8_t *)IntVal.getRawData();
if (sys::IsLittleEndianHost) {
// Little-endian host - the source is ordered from LSB to MSB. Order the
// destination from LSB to MSB: Do a straight copy.
memcpy(Dst, Src, StoreBytes);
} else {
// Big-endian host - the source is an array of 64 bit words ordered from
// LSW to MSW. Each word is ordered from MSB to LSB. Order the destination
// from MSB to LSB: Reverse the word order, but not the bytes in a word.
while (StoreBytes > sizeof(uint64_t)) {
StoreBytes -= sizeof(uint64_t);
// May not be aligned so use memcpy.
memcpy(Dst + StoreBytes, Src, sizeof(uint64_t));
Src += sizeof(uint64_t);
}
memcpy(Dst, Src + sizeof(uint64_t) - StoreBytes, StoreBytes);
}
}
void ExecutionEngine::StoreValueToMemory(const GenericValue &Val,
GenericValue *Ptr, Type *Ty) {
const unsigned StoreBytes = getDataLayout().getTypeStoreSize(Ty);
switch (Ty->getTypeID()) {
default:
dbgs() << "Cannot store value of type " << *Ty << "!\n";
break;
case Type::IntegerTyID:
StoreIntToMemory(Val.IntVal, (uint8_t*)Ptr, StoreBytes);
break;
case Type::FloatTyID:
*((float*)Ptr) = Val.FloatVal;
break;
case Type::DoubleTyID:
*((double*)Ptr) = Val.DoubleVal;
break;
case Type::X86_FP80TyID:
memcpy(Ptr, Val.IntVal.getRawData(), 10);
break;
case Type::PointerTyID:
// Ensure 64 bit target pointers are fully initialized on 32 bit hosts.
if (StoreBytes != sizeof(PointerTy))
memset(&(Ptr->PointerVal), 0, StoreBytes);
*((PointerTy*)Ptr) = Val.PointerVal;
break;
case Type::VectorTyID:
for (unsigned i = 0; i < Val.AggregateVal.size(); ++i) {
if (cast<VectorType>(Ty)->getElementType()->isDoubleTy())
*(((double*)Ptr)+i) = Val.AggregateVal[i].DoubleVal;
if (cast<VectorType>(Ty)->getElementType()->isFloatTy())
*(((float*)Ptr)+i) = Val.AggregateVal[i].FloatVal;
if (cast<VectorType>(Ty)->getElementType()->isIntegerTy()) {
unsigned numOfBytes =(Val.AggregateVal[i].IntVal.getBitWidth()+7)/8;
StoreIntToMemory(Val.AggregateVal[i].IntVal,
(uint8_t*)Ptr + numOfBytes*i, numOfBytes);
}
}
break;
}
if (sys::IsLittleEndianHost != getDataLayout().isLittleEndian())
// Host and target are different endian - reverse the stored bytes.
std::reverse((uint8_t*)Ptr, StoreBytes + (uint8_t*)Ptr);
}
/// LoadIntFromMemory - Loads the integer stored in the LoadBytes bytes starting
/// from Src into IntVal, which is assumed to be wide enough and to hold zero.
static void LoadIntFromMemory(APInt &IntVal, uint8_t *Src, unsigned LoadBytes) {
assert((IntVal.getBitWidth()+7)/8 >= LoadBytes && "Integer too small!");
uint8_t *Dst = reinterpret_cast<uint8_t *>(
const_cast<uint64_t *>(IntVal.getRawData()));
if (sys::IsLittleEndianHost)
// Little-endian host - the destination must be ordered from LSB to MSB.
// The source is ordered from LSB to MSB: Do a straight copy.
memcpy(Dst, Src, LoadBytes);
else {
// Big-endian - the destination is an array of 64 bit words ordered from
// LSW to MSW. Each word must be ordered from MSB to LSB. The source is
// ordered from MSB to LSB: Reverse the word order, but not the bytes in
// a word.
while (LoadBytes > sizeof(uint64_t)) {
LoadBytes -= sizeof(uint64_t);
// May not be aligned so use memcpy.
memcpy(Dst, Src + LoadBytes, sizeof(uint64_t));
Dst += sizeof(uint64_t);
}
memcpy(Dst + sizeof(uint64_t) - LoadBytes, Src, LoadBytes);
}
}
/// FIXME: document
///
void ExecutionEngine::LoadValueFromMemory(GenericValue &Result,
GenericValue *Ptr,
Type *Ty) {
const unsigned LoadBytes = getDataLayout().getTypeStoreSize(Ty);
switch (Ty->getTypeID()) {
case Type::IntegerTyID:
// An APInt with all words initially zero.
Result.IntVal = APInt(cast<IntegerType>(Ty)->getBitWidth(), 0);
LoadIntFromMemory(Result.IntVal, (uint8_t*)Ptr, LoadBytes);
break;
case Type::FloatTyID:
Result.FloatVal = *((float*)Ptr);
break;
case Type::DoubleTyID:
Result.DoubleVal = *((double*)Ptr);
break;
case Type::PointerTyID:
Result.PointerVal = *((PointerTy*)Ptr);
break;
case Type::X86_FP80TyID: {
// This is endian dependent, but it will only work on x86 anyway.
// FIXME: Will not trap if loading a signaling NaN.
uint64_t y[2];
memcpy(y, Ptr, 10);
Result.IntVal = APInt(80, y);
break;
}
case Type::VectorTyID: {
auto *VT = cast<VectorType>(Ty);
Type *ElemT = VT->getElementType();
const unsigned numElems = VT->getNumElements();
if (ElemT->isFloatTy()) {
Result.AggregateVal.resize(numElems);
for (unsigned i = 0; i < numElems; ++i)
Result.AggregateVal[i].FloatVal = *((float*)Ptr+i);
}
if (ElemT->isDoubleTy()) {
Result.AggregateVal.resize(numElems);
for (unsigned i = 0; i < numElems; ++i)
Result.AggregateVal[i].DoubleVal = *((double*)Ptr+i);
}
if (ElemT->isIntegerTy()) {
GenericValue intZero;
const unsigned elemBitWidth = cast<IntegerType>(ElemT)->getBitWidth();
intZero.IntVal = APInt(elemBitWidth, 0);
Result.AggregateVal.resize(numElems, intZero);
for (unsigned i = 0; i < numElems; ++i)
LoadIntFromMemory(Result.AggregateVal[i].IntVal,
(uint8_t*)Ptr+((elemBitWidth+7)/8)*i, (elemBitWidth+7)/8);
}
break;
}
default:
SmallString<256> Msg;
raw_svector_ostream OS(Msg);
OS << "Cannot load value of type " << *Ty << "!";
report_fatal_error(OS.str());
}
}
void ExecutionEngine::InitializeMemory(const Constant *Init, void *Addr) {
DEBUG(dbgs() << "JIT: Initializing " << Addr << " ");
DEBUG(Init->dump());
if (isa<UndefValue>(Init))
return;
if (const ConstantVector *CP = dyn_cast<ConstantVector>(Init)) {
unsigned ElementSize =
getDataLayout().getTypeAllocSize(CP->getType()->getElementType());
for (unsigned i = 0, e = CP->getNumOperands(); i != e; ++i)
InitializeMemory(CP->getOperand(i), (char*)Addr+i*ElementSize);
return;
}
if (isa<ConstantAggregateZero>(Init)) {
memset(Addr, 0, (size_t)getDataLayout().getTypeAllocSize(Init->getType()));
return;
}
if (const ConstantArray *CPA = dyn_cast<ConstantArray>(Init)) {
unsigned ElementSize =
getDataLayout().getTypeAllocSize(CPA->getType()->getElementType());
for (unsigned i = 0, e = CPA->getNumOperands(); i != e; ++i)
InitializeMemory(CPA->getOperand(i), (char*)Addr+i*ElementSize);
return;
}
if (const ConstantStruct *CPS = dyn_cast<ConstantStruct>(Init)) {
const StructLayout *SL =
getDataLayout().getStructLayout(cast<StructType>(CPS->getType()));
for (unsigned i = 0, e = CPS->getNumOperands(); i != e; ++i)
InitializeMemory(CPS->getOperand(i), (char*)Addr+SL->getElementOffset(i));
return;
}
if (const ConstantDataSequential *CDS =
dyn_cast<ConstantDataSequential>(Init)) {
// CDS is already laid out in host memory order.
StringRef Data = CDS->getRawDataValues();
memcpy(Addr, Data.data(), Data.size());
return;
}
if (Init->getType()->isFirstClassType()) {
GenericValue Val = getConstantValue(Init);
StoreValueToMemory(Val, (GenericValue*)Addr, Init->getType());
return;
}
DEBUG(dbgs() << "Bad Type: " << *Init->getType() << "\n");
llvm_unreachable("Unknown constant type to initialize memory with!");
}
/// EmitGlobals - Emit all of the global variables to memory, storing their
/// addresses into GlobalAddress. This must make sure to copy the contents of
/// their initializers into the memory.
void ExecutionEngine::emitGlobals() {
// Loop over all of the global variables in the program, allocating the memory
// to hold them. If there is more than one module, do a prepass over globals
// to figure out how the different modules should link together.
std::map<std::pair<std::string, Type*>,
const GlobalValue*> LinkedGlobalsMap;
if (Modules.size() != 1) {
for (unsigned m = 0, e = Modules.size(); m != e; ++m) {
Module &M = *Modules[m];
for (const auto &GV : M.globals()) {
if (GV.hasLocalLinkage() || GV.isDeclaration() ||
GV.hasAppendingLinkage() || !GV.hasName())
continue;// Ignore external globals and globals with internal linkage.
const GlobalValue *&GVEntry =
LinkedGlobalsMap[std::make_pair(GV.getName(), GV.getType())];
// If this is the first time we've seen this global, it is the canonical
// version.
if (!GVEntry) {
GVEntry = &GV;
continue;
}
// If the existing global is strong, never replace it.
if (GVEntry->hasExternalLinkage())
continue;
// Otherwise, we know it's linkonce/weak, replace it if this is a strong
// symbol. FIXME is this right for common?
if (GV.hasExternalLinkage() || GVEntry->hasExternalWeakLinkage())
GVEntry = &GV;
}
}
}
std::vector<const GlobalValue*> NonCanonicalGlobals;
for (unsigned m = 0, e = Modules.size(); m != e; ++m) {
Module &M = *Modules[m];
for (const auto &GV : M.globals()) {
// In the multi-module case, see what this global maps to.
if (!LinkedGlobalsMap.empty()) {
if (const GlobalValue *GVEntry =
LinkedGlobalsMap[std::make_pair(GV.getName(), GV.getType())]) {
// If something else is the canonical global, ignore this one.
if (GVEntry != &GV) {
NonCanonicalGlobals.push_back(&GV);
continue;
}
}
}
if (!GV.isDeclaration()) {
addGlobalMapping(&GV, getMemoryForGV(&GV));
} else {
// External variable reference. Try to use the dynamic loader to
// get a pointer to it.
if (void *SymAddr =
sys::DynamicLibrary::SearchForAddressOfSymbol(GV.getName()))
addGlobalMapping(&GV, SymAddr);
else {
report_fatal_error("Could not resolve external global address: "
+GV.getName());
}
}
}
// If there are multiple modules, map the non-canonical globals to their
// canonical location.
if (!NonCanonicalGlobals.empty()) {
for (unsigned i = 0, e = NonCanonicalGlobals.size(); i != e; ++i) {
const GlobalValue *GV = NonCanonicalGlobals[i];
const GlobalValue *CGV =
LinkedGlobalsMap[std::make_pair(GV->getName(), GV->getType())];
void *Ptr = getPointerToGlobalIfAvailable(CGV);
assert(Ptr && "Canonical global wasn't codegen'd!");
addGlobalMapping(GV, Ptr);
}
}
// Now that all of the globals are set up in memory, loop through them all
// and initialize their contents.
for (const auto &GV : M.globals()) {
if (!GV.isDeclaration()) {
if (!LinkedGlobalsMap.empty()) {
if (const GlobalValue *GVEntry =
LinkedGlobalsMap[std::make_pair(GV.getName(), GV.getType())])
if (GVEntry != &GV) // Not the canonical variable.
continue;
}
EmitGlobalVariable(&GV);
}
}
}
}
// EmitGlobalVariable - This method emits the specified global variable to the
// address specified in GlobalAddresses, or allocates new memory if it's not
// already in the map.
void ExecutionEngine::EmitGlobalVariable(const GlobalVariable *GV) {
void *GA = getPointerToGlobalIfAvailable(GV);
if (!GA) {
// If it's not already specified, allocate memory for the global.
GA = getMemoryForGV(GV);
// If we failed to allocate memory for this global, return.
if (!GA) return;
addGlobalMapping(GV, GA);
}
// Don't initialize if it's thread local, let the client do it.
if (!GV->isThreadLocal())
InitializeMemory(GV->getInitializer(), GA);
Type *ElTy = GV->getType()->getElementType();
size_t GVSize = (size_t)getDataLayout().getTypeAllocSize(ElTy);
NumInitBytes += (unsigned)GVSize;
++NumGlobals;
}
|
{
"pile_set_name": "Github"
}
|
The Big Sky Conference and TopFan, Inc., a leading fan social media application company, have collaborated to launch a new Big Sky Conference application.The new app, which is now available for free on both the App Store and Google Play, has been designed to bring the streaming sporting events on WatchBigSky.com, and Eversport.TV, to an app, along with adding access to other sought-after Big Sky-related content.Jon Kasper, the Big Sky’s Assistant Commissioner over media partnerships, said the app will give the conference office a better platform to market league-wide initiatives to fans.“TopFan has created a Big Sky Conference app that not only will provide access to our live streaming events, but will also allow us ways to engage with our fans,” he said. “We’re excited to see where we can take this app in the coming months as we integrate exclusive video content, information for our men’s and women’s basketball championships, and other elements.’’Sports that will be streaming on the app this weekend include football, volleyball and soccer. Men’s and women’s basketball, along with softball and select track and field events will also be available, throughout the season. Fans will also be able to stream the Big Sky’s Men’s-and-Women’s-Basketball Media Days, running Oct. 20-21, on the app.TopFan’s Paul Rappoport said the organization is pleased to partner with the Big Sky Conference.“TopFan is excited to be partnering with the Big Sky Conference to bring live video streaming to its thousands of sports fans through the Big Sky Conference community app,” he said. “We look forward to creating the one mobile destination where Big Sky fans and followers can enjoy all content related to the conference, and interact every day in fun and engaging ways.”The app will help tie in the league’s social media outlets, with plans to introduce exclusive video content for fans to access solely through the app. Also, the app will be used to help promote the Big Sky Men’s and Women’s Basketball Championships, with a specially-designed #RoadToReno section to be rolled out later in the fall.TopFan, Inc., specializes in creating applications that help create interactive fan communities, making their apps a one-stop shop for all things related to the client. The app also can provide a premium paid experience, with access to exclusive content produced by the league.###The Big Sky Conference is a Division-I FCS conference, located in Ogden, Utah. The conference has 12 full members, two football affiliate members and two men’s golf affiliate members. The Big Sky Conference was established in 1963 by six charter members - Idaho, Idaho State, Gonzaga, Montana, Montana State and Weber State. Idaho State, Montana, Montana State and Weber State have been members throughout the history of the league. The league’s current commissioner, Andrea Williams, began her tenure as the conference’s sixth commissioner on July 1, 2016.
|
{
"pile_set_name": "OpenWebText2"
}
|
A LITTLEABOUT US
The Jazz Revisited Radioshow
Broadcast premiere; until now
the series has only been broadcast in the USA.
The purchase of exclusive rights on a national level is possible.
These are complete radio broadcasts. No additional editing is necessary.
You receive approximately 1,500 jazz broadcasts with a total of more than
700 hours of broadcast time and about 9,000 jazz titles.
Jazz Revisited presents the entire range of artists and orchestras of the
prolific jazz era from 1917 through 1947.
Jazz Revisited will thrill both certified jazz fans as well as listeners simply
interested in jazz music who have not yet dealt extensively with this era.
A thorough documentation featuring themes and contents is provided for
every single broadcast in the accompanying book "The Register".
This is a continuing program series. The sequence of the broadcast can
be freely determined; a selection of individual broadcasts is also easily
available.
Successful, internationally renowned and famous U.S. radio show.
English language
The legendary radio host Hazen Schumacher is an absolute jazz expert accompanying listeners through the broadcasts in an entertaining way with masterful flair an instinct.
In a nutshell: The radio programs consist of 1.600 individual radio shows presenting the full range of orchestras and artists from the productive jazz era starting 1917 and lasting till 1947. Over 700 hours with around 9.000 tracks are available for selection.
JAZZ REVISITED IS BACK
If you want to learn more about or even become a part of the legendary radio show Jazz Revisited, visit www.bixrevisited.com
HERE ARE OUR JAZZ SECTIONS
Below you can find 24 sections concerning ‚The Good Old Jazz‘. Some are especially just about ‚Jazz Revisited‘, some are about the old jazz labels. However, what 23 have in common is that they all have one show of Jazz Revisited as their background music: also updated in regular intervals! (except for the section "Backroads of Jazz 01.1"). A prerequisite for you being able to listen to these shows is, however, that you have the latest version of your browser installed (chrome, safari, firefox, explorer)! And don't forget to pause the melody, you hear right now!
“There are two kinds of music. Good music, and the other kind.“ - Duke Ellington
LET´S HAVE A LOOKBACK IN TIME
This is a video in remembrance of The Jazz Museum Bix Eiben Hamburg, the company without which this whole website would have never been possible! Plus from minute 10:00 on, this video will introduce Hazen Schumacher, the host of Jazz Revisited!
A lifetime spent with classic, early jazz.
Dear Jazz-Friend, read the personal letter from our founder. Right here, right now.
|
{
"pile_set_name": "Pile-CC"
}
|
Directly to production after 6 hours of coding
This one is probably more of a personal story about Rust than the rest of the articles here. And it is a half-in-joke (as opposed to the usual half-serious).
Sometimes, I write about the things that frustrate me about Rust. While I can ramble about it for some time and with due passion, it’s mostly a positive thing ‒ I’m frustrated by whatever language or tool I use. I wish things were better. I question the sanity of its authors (especially if the author of the tool is me). But this makes the improvements possible. And I write about the frustration in Rust because I care. I’ve given up on many other languages and tools as lost causes.
Anyway, today I want to share a positive story. It’s not about 1000× speedup of something (I’ve done that already with the matrices), or saving millions to a company (I hope to do that one day). It’s about a very small and mundane thing, but I want to illustrate why it is I care about Rust.
The background: the minimalistic music player
When I work, I like to listen to music. The old-style way, by having a collection of songs on my disk, so it works even when I’m offline. When writing a software that should run on a router and testing things out, this happens a lot. When I travel, this happens a lot. I still have to find a hotel where the WiFi works for 10 minutes without disconnecting. I don’t really need fancy playlists or collections sorted by the genre and the ability to rate the music. I simply throw the whole set at the player, tell it to shuffle and then press the Next button on the keyboard whenever I don’t like the song.
Over the time, I’ve tried many full-featured players. WinAmp back at the times when I still had Windows on my computer. Something with a name starting with x that imitated WinAmp when I switched to my first Linux (at the times when Fedora was still called Red Hat). One player that came bundled with Kde 3. The other player that came bundled with Kde 3. The yet another player that came bundled with Kde 4. I tried mpd and gave up in the middle of the tutorial, telling me how to set up my music database and let it scan the songs and how to move the songs from the database to a playlist (I guess this was more of a documentation issues, someone told me mpd was in fact easy to use some years later). This all felt too bloated and heavy-weight. I don’t need no music database, I just want to play songs. And I don’t want to give the player 1GB of RAM just to sit there (even now one of the machines I use is a cheap netbook with only 4GBs, it’s enough Firefox takes 2.5 of that for itself).
So eventually I wrote a program that got fed with a list of songs and listened on a unix socket so I could bind a shell command that sends next
into it to a global shortcut in the window manager. The program used mpg321 (or maybe it was aplay at the time, now it is mpv ) to actually play. The first version was written in Perl if I remember correctly.
And, over the years, every time I was learning a new programming language, or when the old version didn’t feel just right, I rewrote it in the new language or using some new trick. I could find a C version with threads, highly optimised C version that mmap ped the file with a list of songs into the memory and pre-indexed that so it saved RAM, Haskell version, Python version, another Perl version I was using until recently… Well, I could find it if I really wanted to go looking, but some of it might be still on some DVD backups in my parents’ house. In short, it became a kind of learning-something-new ritual.
Except for Rust. For some reason, I was using Rust for almost 2 years now, considering it the go-to language for most of my needs (at least when nobody else had any say in the decision) without rewriting the player in it. Until this Sunday.
So, how did it go?
I spend about 6 hours writing it. I tried using the 2018 edition for that and it felt good (the biggest change for me is probably that I don’t have to write extern crate any more). I even used the much discussed match ergonomic thing on purpose at some place and knew it at the time.
I used my own corona for the asynchronous stuff, to test it some more ‒ eating own dog food and such. And also because this is the kind of thing the library is for anyway: nobody cares about performance that much, with about 5 events per second and 2 simultaneous connections, but it is more convenient that bare-bones tokio or bare-bones juggling with threads and mutexes, and besides, application that does close to nothing doesn’t deserve more than 1 thread. Using more than one thread without a performance need is not elegant.
I cursed a little when I discovered that I have to use either a thread local storage or a mutex in a single-threaded application to store some mutable globally-accessible object.
I cursed some more when I discovered the standard library or tokio don’t even consider the existence of unix named pipes, the mechanism the previous version used to talk to mpv (by talk to I mean „pause“ and „quit“). A named pipe is like an ordinary unix pipe, but it sits on the file system, so two independent programs can connect to it (repeatedly). It needs to be created and then opened like a file. But it acts like a pipe, so it can return EAGAIN (unlike files, which claim to be ready to be read and written all the time even if they aren’t and then they block). And there doesn’t seem to be any obvious way to open a file and then plug it into tokio and tell it „treat it somewhat like a socket“. Thinking about it, tokio probably has only unix domain sockets, but not unidirectional pipes at all. I mean, I could put something together with all these AsRawFd traits and Evented , but:
I had to spend about an hour and a half, debugging a lockup, blaming it on Rust not knowing what to do with pipes and playing with strace only to discover that even opening the write end of the pipe blocks until there’s the other side ready to read it and that the Perl version launched the mpv first and only after that opened the pipe (I guess I know why now ‒ I have the feeling I might have spent several hours on that when writing the Perl version back then too ‒ reminder to use the great invention of code comments sometimes). And then I spent another 10 minutes switching to unnamed unix domain socket pair and screwing that one onto the file descriptor 4 of the mpv -to-be to be done with the damn pipes.
So, what’s the big deal?
If you read the above, you might think that I could have written it with the same amount of time and cursing in any other language I know. And it’s probably true. Well, maybe not make and bash might be a challenge too (hmm, thinking about that… 😇).
However, in every previous version, there was something, some nudging feeling, that something in the code is a bit off. Every previous version was glitchy for the first two weeks of using and I had to fix it several times during that period. The previous Perl version had a bug I never managed to find ‒ sometimes, the program just terminated. No crash dump, no error message, it just gave up and I don’t know why. Every previous version felt like a temporary solution until the next attempt.
No previous version ever had the prev/next navigation entirely correct, I always had some scenario of going forward and backward through the history where a song got played twice in a row or skipped. One of the previous versions sometimes started to play two songs at once for no apparent reason. Having to express myself in Rust’s Option s and encoding the state in the forgiving-nothing type system made me think about it long enough to do it right this time, in a way Perl’s „everything quacks like a string“ attitude never would (or C’s „… like an int“).
The Rust version went straight „to production“. From the Sunday evening, I discovered no glitch and the thing feels finished, at piece.
I mean, what program ever feels finished? And I’ll probably do some thing with it eventually (I’m already thinking about keeping the list of song files in memory as a compressed inverse radix tree to save some of the RAM ‒ not that I would have any need of that), but I wouldn’t have to. Whenever comes the time someone makes a better language than Rust and I move to it, I’ll have a hard time finding the reason to rewrite it in that language. The bye-I-give-up bug was bothering me for ages, but eventually it was the excuse for the rewrite.
And this feeling ‒ the feeling that I think the program is correct, despite plenty of experience telling me no program is ever correct, is the reason why I care about Rust and why I like to use it. That I can finish the program, try it once or twice, put it into production and forget about it. Yes, it is longer than the Perl version. It probably took more effort to write. But hey, it’s worth it (and besides, it isn’t that much more effort).
Wouldn’t it be great if we were able to write programs the admins have to touch only when the hardware the programs run on goes to the silicon heaven and they need to install them onto new servers? Rust gives me hope this dream might one day be possible.
The result
You know, this is not about the destination, it’s about the journey. Or mostly. At least for me.
Alright, if you insist, the code lives in the github repo. Go find that bug and tell me it is not correct, if you have to.
It doesn’t contain the shell commands to control it, though. I was too lazy to take them out of my system and import them I thought it would be a nice exercise for the reader to reverse-engineer them, they are quite simple.
Anyway, it might be less work to spend the time writing your own instead of trying to integrate this into your own work flow and window manager.
|
{
"pile_set_name": "OpenWebText2"
}
|
Explore
Valspar Adds Pearlescent Accents to Salt Lake City Public Safety Building
Created to house the city’s police department, fire department, and emergency dispatchers, the Salt Lake City Public Safety Building (PSB) is designed to function in both everyday and not-so-everyday circumstances. In addition to its use as a regular office space for 400 employees, the 174,000-square-foot building can withstand a magnitude-7.5 earthquake and remain operational. The PSB is a net-zero energy facility, meaning it creates as much energy as it uses, another key element in its ability to keep on running when outside systems may have failed.
Much of the PSB’s energy efficiency is achieved through its extensive use of windows and daylighting to reduce the need for electrical lighting indoors. A massive curtainwall on the building’s northwest side not only allow occupants ample daylight, but also reduces the facility’s need for back-up generators in the event of a power outage. Low E coatings on the glass help block heat, so the curtainwall adds light without driving up cooling bills.
The design of the wall is a signature architectural feature of the building, with a serpentine shape that cants backward through an S-curve. LCG Facades acted as the glazing contractor—a job the company took on even after others had turned it down due to the project’s complexity. LCG enlisted the help of Wausau Window and Wall Systems to engineer the curtainwall and window system. Each of the glass panels is a unique size and shape, which required customized design engineering, machining, fabrication, glazing and shipping.
In addition to the curtainwall, Wausau Window also engineered interior light shelves and exterior sun shades—integral parts of the daylighting and climate control systems. The light shelves and sun shades, as well as the aluminum frames for the curtainwall, all feature Valspar’s Fluropon Classic II Coating in MC Platinum, adding a pearlescent finish to the project that will provide long-lasting brilliance. Fluropon Classic II is a two-coat 70% PVDF fluropolymer resin based system that offers outstanding residence to ultraviolet radiation resulting in exceptional color retention, plus stubbornness to chalking and chemical degradation. Furthermore, the coating offers great flexibility and formability to adhere with the unique design of the building.
In an effort to continue to adhere with LEED criteria, Linetec was selected as the aluminum coating applicator as the company takes pride in being an environmentally conscious finisher, ensuring it extinguishes all volatile organic compounds found in liquid solvent-based paints before arrival on the development site.
CST Covers based in Conroe, Texas, designed and fabricated the entry canopy that extends off the front of the building, and enlisted LCG Facades to assemble the structure and glaze it with Photovoltaic glass from Schott Glass.
“One of our favorite types of projects is when an architect chooses to use both aluminum composite materials (ACM) and glass to create a harmonious final product,” said Tom Ratway, Architectural Regional Sales Manager, ALPOLIC. “The Salt Lake City Public Safety Building is an excellent example of how the ACM, in this case coated in Mica Platinum, works in tandem with the curtainwall to create a distinguished façade that also mirrors its aesthetic demeanor throughout the interior space.”
Ted Derby of LCG Facades noted that the “Mica Platinum coating was selected for its color uniformity and sense of quality that the color emitted.” The Valflon FEVE Coil Coating is featured on nearly 23,000 square-feet of material and designed with durability and attraction in mind. A variety of alluring palettes make this product line a great choice for an array of exteriors. From schools to service stations, ValflonCoil Coating resists weathering, fading and chalking. Valflon also has terrific resistance to airborne chemicals, acid rain and most cleaning solvents. Offering beauty with benefits, it is clear the illustrious appearance does not sacrifice performance.
Completed in 2013, the PSB is the first net-zero energy public safety building in the U.S. It has achieved an Energy Star performance rating of 100 (the highest possible score) and LEED Platinum certification, and was also honored with an “Outstanding Award” from The Utah Pollution Prevention Association and Clean Utah.
At the building’s ribbon-cutting ceremony, Salt Lake City Major Ralph Becker summed up hopes for the building by stating it would help the city “lean forward into the arch of the possible and beneficial.” With its innovative design and efficient engineering, the PSB is an outstanding example of both the possible and beneficial.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
jQuery - Event by scroll
The goal of my script is that when user scrolls down, my page should scroll to the next div. For this, the script distinguishes if the user scrolls up and down. After, when he scrolls, it should remove the class active of my first div and add to the next. Then it's scrolling to the new div with the class active. The problem is that it's working for the first scroll only, not the next.
My code:
$(window).load(function() {
var tempScrollTop, currentScrollTop = 0;
var $current = $("#container > .active");
var next = $('.active').next();
var prev = $('.active').prev();
$(window).scroll(function() {
currentScrollTop = $(window).scrollTop();
if (tempScrollTop < currentScrollTop) { //scrolling down
$current.removeClass('active').next().addClass('active');
$.scrollTo(next, 1000);
}
else if (tempScrollTop > currentScrollTop ) { //scrolling up
$current.removeClass('active').prev().addClass('active');
$.scrollTo(prev, 1000);
}
tempScrollTop = currentScrollTop;
});
});
Can anybody help me?
A:
I found the answer
var lastScrollTop = 0;
var isDoingStuff = false;
$(document).scroll(function(event) {
//abandon
if(isDoingStuff) { return; }
if ($(this).scrollTop() > lastScrollTop) {
//console.log('down');
$('.active').removeClass('active').next('div').addClass('active');
isDoingStuff = true;
$('html,body').animate( {scrollTop: $('.active').offset().top }, 1000, function() {
setTimeout(function() {isDoingStuff = false;}, 100);
console.log('off');
});
} else {
//console.log('up');
}
lastScrollTop = $(this).scrollTop();
})
|
{
"pile_set_name": "StackExchange"
}
|
Childcare
Harrisburg Gym Offers On-Site Childcare
Unfortunately, fitting in a fitness routine can fall by the wayside for busy parents, especially when it’s difficult to find someone you can trust to watch your children. Here at our Harrisburg Gym we know how that can be, and we have you covered with safe, secure and fun on-site childcare! It’s open to all children ages 3 months to 13 years for a nominal monthly fee. There are lots of activities for them that they are sure to enjoy- they may not even want to leave!
We have everything you need to work on your healthy lifestyle here at our health club! Don’t let a busy life get in the way of your fitness! Ask one of our fitness professionals about adding childcare to your membership.
|
{
"pile_set_name": "Pile-CC"
}
|
Increased locomotor activity in estrogen-treated ovariectomized rats is associated with nucleus accumbens dopamine and is not reduced by dietary sodium deprivation.
Estrogens are well known to increase locomotor activity in laboratory rodents; however, the underlying mechanism remains unclear. We used voluntary wheel running by female rats as an index of locomotor behavior to investigate this issue. We first determined whether the estrogen-induced increase in locomotion was susceptible to inhibition by a physiological challenge, and next whether it was associated with dopaminergic activation in the central reward area, nucleus accumbens. Ovariectomized rats were given estradiol or the oil vehicle and housed in cages with or without running wheels. All rats were given regular rodent chow for 1 week, a sodium-deficient diet for the next week, and then were returned to a regular diet for another week. At the end of the last week, all rats were killed, brains were extracted and dopamine levels in the nucleus accumbens were measured. As expected, estradiol treatment increased distance run. Surprisingly, dietary sodium deprivation further increased running, but this appeared to be related to experience with wheel running, rather than to sodium deprivation, per se. Dopamine was greater in the nucleus accumbens of estradiol-treated rats that ran compared to all other groups. Thus, the estrogen-induced increase in locomotion is a robust phenomenon that is not inhibited by a body sodium challenge and is associated with elevated levels of dopamine in reward pathways. These findings raise the possibility that the estrogen-induced increase in locomotor activity, which occurs during a hormonal milieu conducive to reproduction, may reflect mate-seeking behavior and, thereby, maximize reproductive success.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
About Radio Rentals
Radio Rentals is a South Australian owned and operated retailer of electrical and furniture goods. We help people get the appliances, technology and furniture they need or want by enabling you to Buy, Rent or Interest Free.
Live the good life with Radio Rentals
Owned and operated in South Australia for over 50 years, Radio Rentals is a trusted and highly recognised household name.
Our huge range of big brand electrical, appliances, devices and furniture come with free delivery, free installation, and a 30-day price match guarantee that ensures you always receive a fair and competitive price. We’ll also protect you, covering you for repairs, fire damage, and theft throughout the life of your rental term.
We are the experts when it comes to rental, in South Australia. We have a massive range of products that can be rented from all the leading brands which include: Furniture Rental, Camera Rental, TV Rental, Washing Machine Rental, Computer Rental, Laptop Rental and Fridge Rental.
If you’ve seen some negative news coverage about Radio Rentals recently you may have thought it’s us. It’s not. There are two companies called Radio Rentals operating in Australia which is confusing for us as well as you! For clarification on this, click for more info.
Four easy ways to get what you want
Purchase what you need outright, both in store or online.
If you have a deposit saved, take advantage of our interest free options.
Our Rent & Upgrade it plan is ideal if you rent hi-tech or audio visual items as new models are released regularly. With Rent & Upgrade it, you can upgrade to a newer model sooner - talk to our expert in store staff to choose a rental plan that suits you.
Our Rent & Keep it plan allows you to keep what you’ve rented at the end of your term, with no more to pay.
Choosing a rental plan is just the beginning. Find out all the other benefits of renting here.
If you're ready to rent then you can apply from anywhere on any device. Get started here.
Whichever way you want it, you can be sure to get the best deal. Learn more here. T&Cs apply.
Our Product Range
We have a huge range of different products for you to choose from all the leading brands such as LG, Samsung, Beko, Panasonic and more. Browse our categories in our menu, or visit some of our popular categories by clicking below and don't forget to sign up so you never miss a special offer again!
We also offer a range of pre-owned goods for sale or rent, so if you’re just starting out, or even starting over, we can help you get situated and work towards building or rebuilding your credit record.
|
{
"pile_set_name": "Pile-CC"
}
|
977 F.2d 569
Steve (Samuel)v.Sher (Dr.), Mailroom Officials
NO. 92-1231
United States Court of Appeals,Third Circuit.
Sept 11, 1992
Appeal From: E.D.Pa.,
Bechtle, J.
1
AFFIRMED.
|
{
"pile_set_name": "FreeLaw"
}
|
/*
* Asqatasun - Automated webpage assessment
* Copyright (C) 2008-2019 Asqatasun.org
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* Contact us by mail: asqatasun AT asqatasun DOT org
*/
package org.asqatasun.rules.rgaa22;
import org.asqatasun.entity.audit.TestSolution;
import org.asqatasun.rules.rgaa22.test.Rgaa22RuleImplementationTestCase;
/**
* Unit test class for the implementation of the rule 5.34 of the referential RGAA 2.2.
*
* @author jkowalczyk
*/
public class Rgaa22Rule05341Test extends Rgaa22RuleImplementationTestCase {
/**
* Default constructor
*/
public Rgaa22Rule05341Test (String testName){
super(testName);
}
@Override
protected void setUpRuleImplementationClassName() {
setRuleImplementationClassName(
"org.asqatasun.rules.rgaa22.Rgaa22Rule05341");
}
@Override
protected void setUpWebResourceMap() {
// getWebResourceMap().put("Rgaa22.Test.5.34-1Passed-01",
// getWebResourceFactory().createPage(
// getTestcasesFilePath() + "rgaa22/Rgaa22Rule05341/RGAA22.Test.5.34-1Passed-01.html"));
// getWebResourceMap().put("Rgaa22.Test.5.34-2Failed-01",
// getWebResourceFactory().createPage(
// getTestcasesFilePath() + "rgaa22/Rgaa22Rule05341/RGAA22.Test.5.34-2Failed-01.html"));
// getWebResourceMap().put("Rgaa22.Test.5.34-3NMI-01",
// getWebResourceFactory().createPage(
// getTestcasesFilePath() + "rgaa22/Rgaa22Rule05341/RGAA22.Test.5.34-3NMI-01.html"));
// getWebResourceMap().put("Rgaa22.Test.5.34-4NA-01",
// getWebResourceFactory().createPage(
// getTestcasesFilePath() + "rgaa22/Rgaa22Rule05341/RGAA22.Test.5.34-4NA-01.html"));
getWebResourceMap().put("Rgaa22.Test.5.34-5NT-01",
getWebResourceFactory().createPage(
getTestcasesFilePath() + "rgaa22/Rgaa22Rule05341/RGAA22.Test.5.34-5NT-01.html"));
}
@Override
protected void setProcess() {
// assertEquals(TestSolution.PASSED,
// processPageTest("Rgaa22.Test.5.34-1Passed-01").getValue());
// assertEquals(TestSolution.FAILED,
// processPageTest("Rgaa22.Test.5.34-2Failed-01").getValue());
// assertEquals(TestSolution.NEED_MORE_INFO,
// processPageTest("Rgaa22.Test.5.34-3NMI-01").getValue());
// assertEquals(TestSolution.NOT_APPLICABLE,
// processPageTest("Rgaa22.Test.5.34-4NA-01").getValue());
assertEquals(TestSolution.NOT_TESTED,
processPageTest("Rgaa22.Test.5.34-5NT-01").getValue());
}
@Override
protected void setConsolidate() {
// assertEquals(TestSolution.PASSED,
// consolidate("Rgaa22.Test.5.34-1Passed-01").getValue());
// assertEquals(TestSolution.FAILED,
// consolidate("Rgaa22.Test.5.34-2Failed-01").getValue());
// assertEquals(TestSolution.NEED_MORE_INFO,
// consolidate("Rgaa22.Test.5.34-3NMI-01").getValue());
// assertEquals(TestSolution.NOT_APPLICABLE,
// consolidate("Rgaa22.Test.5.34-4NA-01").getValue());
assertEquals(TestSolution.NOT_TESTED,
consolidate("Rgaa22.Test.5.34-5NT-01").getValue());
}
}
|
{
"pile_set_name": "Github"
}
|
This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.Need a new registration confirmation email? Click here
OMAHA, Neb., July 12, 2010 (GLOBE NEWSWIRE) -- During the second quarter of 2010, America First Tax Exempt Investors, L.P. (Nasdaq:ATAX) (the "Company") raised approximately $41.8 million in net proceeds from an underwritten public offering of Beneficial Ownership Units ("BUCs") to provide funding for new investments. Recent credit and real estate market conditions have created significant investment opportunities which the Company intends to aggressively pursue.
"The Company continues to evaluate opportunities to invest in quality tax-exempt mortgage bonds and other multi-family real estate assets at attractive pricing," stated Chad Daffer, Fund Manager. "The recent investment transactions are examples of the Company's ability to acquire quality assets at attractive valuations for the long-term benefit of our investors."
Recent Investment Activity
During the second quarter of 2010, the Company acquired two new tax-exempt mortgage bond investments.
In May 2010, the Company acquired the tax-exempt mortgage revenue bond for a 261 unit multi-family apartment complex in San Antonio, Texas known as The Villages at Lost Creek for approximately $16.4 million which represented 100% of the bond issuance. The bond par value is $18.5 million with an annual interest rate of 6.25%. The bond purchase price results in a yield to maturity of approximately 7.55% per annum. The bond matures in June 2041.
In June 2010, the Company acquired 100% of the $18.3 million tax-exempt mortgage revenue bonds issued by the Ohio Housing Finance Agency as part of a plan of financing for the acquisition and rehabilitation of Crescent Village, Post Woods (I and II) and Willow Bend apartments in Ohio (the "Ohio Properties"). The tax-exempt mortgage bonds secured by the Ohio Properties were acquired by the Company at par and consisted of two series. The Series A bond has a par value of $14.7 million and bears interest at an annual rate of 7.0%. The Series B bond has a par value of $3.6 million and bears interest at an annual interest rate of 10.0%. Both series of bonds mature in June 2050. The Company had previously acquired a 99% interest in the Ohio Properties as part of its strategy of acquiring existing multifamily apartment properties that it expects will be partially financed with new tax-exempt mortgage bond at the time the properties become eligible for the issuance of additional low-income housing tax credits. In connection with the issuance of the new tax-exempt bonds, the Ohio properties were sold to an unaffiliated party who financed the acquisition through the issuance of the new bonds and tax credits. The Ohio properties were sold for a total purchase price of $16.2 million. Proceeds from the sale were used to retire the $12.8 million mortgage debt associated with the Ohio Properties.
|
{
"pile_set_name": "Pile-CC"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.